WOOT '13 | FireDrill: Interactive DNS Rebinding | Yunxing Dai, Ryan Resig |
WOOT '13 | Illuminating the Security Issues Surrounding Lights-Out Server Management | Anthony Bonkoski, Russ Bielawski, J. Alex Halderman |
WOOT '13 | Bluetooth: With Low Energy Comes Low Security | Mike Ryan |
WOOT '13 | Subverting BIND's SRTT Algorithm Derandomizing NS Selection | Roee Hay, Jonathan Kalechstein, Gabi Nakibly |
WOOT '13 | From an IP Address to a Street Address: Using Wireless Signals to Locate a Target | Craig A. Shue, Nathanael Paul, Curtis R. Taylor |
WOOT '13 | “Weird Machines” in ELF: A Spotlight on the Underappreciated Metadata | Rebecca Shapiro, Sergey Bratus, Sean W. Smith |
WOOT '13 | Introducing Die Datenkrake: Programmable Logic for Hardware Security Analysis | Dmitry Nedospasov, Thorsten Schroder |
WOOT '13 | The Page-Fault Weird Machine: Lessons in Instruction-less Computation | Julian Bangert, Sergey Bratus, Rebecca Shapiro, Sean W. Smith |
WOOT '12 | Under New Management: Practical Attacks on SNMPv3 | |
WOOT '12 | Abusing Notification Services on Smartphones for Phishing and Spamming | |
WOOT '12 | Baseband Attacks: Remote Exploitation of Memory Corruptions in Cellular Protocol Stacks | |
WOOT '12 | Security Analysis of Smartphone Point-of-Sale Systems | |
WOOT '12 | WAFFle: Fingerprinting Filter Rules of Web Application Firewalls | |
WOOT '12 | Off-Path Attacking the Web | |
WOOT '12 | On the Fragility and Limitations of Current Browser-Provided Clickjacking Protection Schemes | |
WOOT '12 | Microgadgets: Size Does Matter in Turing-Complete Return-Oriented Programming | |
WOOT '12 | Frankenstein: Stitching Malware from Benign Binaries | |
WOOT '12 | SMT Solvers in Software Security | |
WOOT '12 | Web-based Attacks on Host-Proof Encrypted Storage | |
WOOT '12 | Read It Twice! A Mass-Storage-Based TOCTTOU Attack | |
WOOT '11 | Media Access Control Address Spoofing Attacks against Port Security | Andrew Buhr, Dale Lindskog, Pavol Zavarsky, Ron Ruhl |
WOOT '11 | Fragmentation Considered Vulnerable: Blindly Intercepting and Discarding Fragments | Yossi Gilad, Amir Herzberg |
WOOT '11 | Killing the Myth of Cisco IOS Diversity: Recent Advances in Reliable Shellcode Design | Ang Cui, Jatin Kataria, Salvatore J. Stolfo |
WOOT '11 | SkyNET: A 3G-Enabled Mobile Attack Drone and Stealth Botmaster | Theodore Reed, Joseph Geis, Sven Dietrich |
WOOT '11 | Getting the Face Behind the Squares: Reconstructing Pixelized Video Streams | Ludovico Cavedon, Luca Foschini, Giovanni Vigna |