Papers

Search results

    ConferenceTitleAuthor(s)
    WOOT '13FireDrill: Interactive DNS RebindingYunxing Dai, Ryan Resig
    WOOT '13Illuminating the Security Issues Surrounding Lights-Out Server ManagementAnthony Bonkoski, Russ Bielawski, J. Alex Halderman
    WOOT '13Bluetooth: With Low Energy Comes Low SecurityMike Ryan
    WOOT '13Subverting BIND's SRTT Algorithm Derandomizing NS SelectionRoee Hay, Jonathan Kalechstein, Gabi Nakibly
    WOOT '13From an IP Address to a Street Address: Using Wireless Signals to Locate a TargetCraig A. Shue, Nathanael Paul, Curtis R. Taylor
    WOOT '13“Weird Machines” in ELF: A Spotlight on the Underappreciated MetadataRebecca Shapiro, Sergey Bratus, Sean W. Smith
    WOOT '13Introducing Die Datenkrake: Programmable Logic for Hardware Security AnalysisDmitry Nedospasov, Thorsten Schroder
    WOOT '13The Page-Fault Weird Machine: Lessons in Instruction-less ComputationJulian Bangert, Sergey Bratus, Rebecca Shapiro, Sean W. Smith
    WOOT '12Under New Management: Practical Attacks on SNMPv3
    WOOT '12Abusing Notification Services on Smartphones for Phishing and Spamming
    WOOT '12Baseband Attacks: Remote Exploitation of Memory Corruptions in Cellular Protocol Stacks
    WOOT '12Security Analysis of Smartphone Point-of-Sale Systems
    WOOT '12WAFFle: Fingerprinting Filter Rules of Web Application Firewalls
    WOOT '12Off-Path Attacking the Web
    WOOT '12On the Fragility and Limitations of Current Browser-Provided Clickjacking Protection Schemes
    WOOT '12Microgadgets: Size Does Matter in Turing-Complete Return-Oriented Programming
    WOOT '12Frankenstein: Stitching Malware from Benign Binaries
    WOOT '12SMT Solvers in Software Security
    WOOT '12Web-based Attacks on Host-Proof Encrypted Storage
    WOOT '12Read It Twice! A Mass-Storage-Based TOCTTOU Attack
    WOOT '11Media Access Control Address Spoofing Attacks against Port SecurityAndrew Buhr, Dale Lindskog, Pavol Zavarsky, Ron Ruhl
    WOOT '11Fragmentation Considered Vulnerable: Blindly Intercepting and Discarding FragmentsYossi Gilad, Amir Herzberg
    WOOT '11Killing the Myth of Cisco IOS Diversity: Recent Advances in Reliable Shellcode DesignAng Cui, Jatin Kataria, Salvatore J. Stolfo
    WOOT '11SkyNET: A 3G-Enabled Mobile Attack Drone and Stealth BotmasterTheodore Reed, Joseph Geis, Sven Dietrich
    WOOT '11Getting the Face Behind the Squares: Reconstructing Pixelized Video StreamsLudovico Cavedon, Luca Foschini, Giovanni Vigna

Pages