Papers

Search results

    ConferenceTitleAuthor(s)
    WOOT '11Heat of the Moment: Characterizing the Efficacy of Thermal Camera-Based AttacksKeaton Mowery, Sarah Meiklejohn, Stefan Savage
    WOOT '11Packets in Packets: Orson Welles' In-Band Signaling Attacks for Modern RadiosTravis Goodspeed, Sergey Bratus, Ricky Melgares, Rebecca Shapiro, Ryan Speers
    WOOT '11Energy Attack on Server SystemsZhenyu Wu, Mengjun Xie, Haining Wang
    WOOT '11Putting Out a HIT: Crowdsourcing Malware InstallsChris Kanich, Stephen Checkoway
    WOOT '11All Your Droid Are Belong to Us: A Survey of Current Android AttacksTimothy Vidas, Daniel Votipka, Nicolas Christin
    WOOT '11Exploiting the Hard-Working DWARF: Trojan and Exploit Techniques with No Native Executable CodeJames Oakley
    WOOT '11DieHarder: Securing the HeapGene Novark, Emery D. Berger
    WOOT '11Vulnerability Extrapolation: Assisted Discovery of Vulnerabilities Using Machine LearningFabian Yamaguchi, Felix "FX" Lindner, Konrad Rieck
    WOOT '11Exposing iClass Key DiversificationFlavio D. Garcia, Gerhard de Koning Gans, Roel Verdult
    WOOT '10Zero-sized Heap Allocations Vulnerability AnalysisJulien Vanegue
    WOOT '10Recovering Windows Secrets and EFS Certificates OfflineElie Burzstein, Jean Michel Picod
    WOOT '10Crawling BitTorrent DHTs for Fun and ProfitScott Wolchok, J. Alex Halderman
    WOOT '10Practical Padding Oracle AttacksJuliano Rizzo, Thai Duong
    WOOT '10Smudge Attacks on Smartphone Touch ScreensAdam J. Aviv, Katherine Gibson, Evan Mossop, Matt Blaze, Jonathan M. Smith
    WOOT '10Framing Attacks on Smart Phones and Dumb Routers: Tap-jacking and Geo-localization AttacksBaptiste Gourdin
    WOOT '10Interpreter ExploitationDionysus Blazakis
    WOOT '10A Framework for Automated Architecture-Independent Gadget SearchThomas Dullien, Tim Kornau, Ralf-Philipp Weinmann
    WOOT '08Engineering Heap Overflow Exploits with JavaScriptMark Daniel, Jake Honoroff, Charlie Miller
    WOOT '08Experiences with Model Inference Assisted FuzzingJoachim Viide, Aki Helin, Marko Laakso, Pekka Pietikäinen, Mika Seppänen, Kimmo Halunen, Rauli Puuperä, Juha Röning
    WOOT '08Insecure Context Switching: Inoculating Regular Expressions for SurvivabilityWill Drewry, Tavis Ormandy
    WOOT '08There Is No Free Phish: An Analysis of "Free" and Live Phishing KitsMarco Cova, Christopher Kruegel, Giovanni Vigna
    WOOT '08Towards Systematic Evaluation of the Evadability of Bot/Botnet Detection MethodsElizabeth Stinson, John C. Mitchell
    WOOT '08Reverse Engineering Python ApplicationsAaron Portnoy, Ali-Rizvi Santiago
    WOOT '08Exploitable Redirects on the Web: Identification, Prevalence, and DefenseCraig A. Shue, Andrew J. Kalafut, Minaxi Gupta
    WOOT '08Modeling the Trust Boundaries Created by Securable ObjectsMatt Miller

Pages