Papers

Search results

    ConferenceTitleAuthor(s)
    WOOT '19Breaking Turtles All the Way Down: An Exploitation Chain to Break out of VMware ESXiHanqing Zhao, Yanyu Zhang, Kun Yang, Taesoo Kim
    WOOT '19Distributed Password Hash Computation on Commodity Heterogeneous Programmable PlatformsBranimir Pervan, Josip Knezovic, Katja Pericin
    WOOT '19Cross-Router Covert ChannelsAdar Ovadia, Rom Ogen, Yakov Mallah, Niv Gilboa, Yossi Oren
    WOOT '19MIN()imum Failure: EMFI Attacks against USB StacksColin O'Flynn
    WOOT '19Defeating Cisco Trust Anchor: A Case-Study of Recent Advancements in Direct FPGA Bitstream ManipulationJatin Kataria, Rick Housley, Joseph Pantoga, Ang Cui
    CSET '19Implementation of Programmable CPS Testbed for Anomaly DetectionHyeok-Ki Shin, Woomyo Lee, Jeong-Han Yun, HyoungChun Kim
    CSET '19Design and Implementation of a Cyber Physical Testbed for Security TrainingPaul Pfister, Mathew L. Wymore, Doug Jacobson, Daji Qiao
    WOOT '19A better zip bombDavid Fifield
    CSET '19Lessons from Using the I-Corps Methodology to Understand Cyber Threat Intelligence SharingJosiah Dykstra, Matt Fante, Paul Donahue, Dawn Varva, Linda Wilk, Amanda Johnson
    CSET '19The Impact of Secure Transport Protocols on Phishing EfficacyZane Ma, Joshua Reynolds, Joseph Dickinson, Kaishen Wang, Taylor Judd, Joseph D. Barnes, Joshua Mason, Michael Bailey
    CSET '19An Assessment of the Usability of Cybercrime DatasetsIldiko Pete, Yi Ting Chua
    CSET '19Applications and Challenges in Securing TimeFatima M. Anwar, Mani Srivastava
    CSET '19IDAPro for IoT Malware analysis?Sri Shaila G, Ahmad Darki, Michalis Faloutsos, Nael Abu-Ghazaleh, Manu Sridharan
    CSET '19Triton: A Software-Reconfigurable Federated Avionics TestbedSam Crow, Brown Farinholt, Brian Johannesmeyer, Karl Koscher, Stephen Checkoway, Stefan Savage, Aaron Schulman, Alex C. Snoeren, Kirill Levchenko
    CSET '19Is Less Really More? Towards Better Metrics for Measuring Security Improvements Realized Through Software DebloatingMichael D. Brown, Santosh Pande
    CSET '19A Data-Driven Reflection on 36 Years of Security and Privacy ResearchAniqua Baset, Tamara Denning
    WOOT '19How Sharp is SHARP ?Dixit Kumar, Chavhan Sujeet Yashavant, Biswabandan Panda, Vishal Gupta
    CSET '19CAERUS: Chronoscopic Assessment Engine for Recovering Undocumented SpecificationsAdam Seitz, Adam Satar, Brian Burke, Lok Yan, Zachary Estrada
    CSET '19Percentages, Probabilities and Professions of PerformanceJim Alves-Foss
    WOOT '19Two methods for exploiting speculative control flow hijacksAndrea Mambretti, Alexandra Sandulescu, Matthias Neugschwandtner, Alessandro Sorniotti, Anil Kurmus
    CSET '19Comparative Measurement of Cache Configurations’ Impacts on Cache Timing Side-Channel AttacksXiaodong Yu, Ya Xiao, Kirk Cameron, Danfeng (Daphne) Yao
    CSET '19Automated Attack Discovery in Data Plane SystemsQiao Kang, Jiarong Xing, Ang Chen
    CSET '19Proteus: A DLT-Agnostic Emulation and Analysis FrameworkRussell Van Dam, Thien-Nam Dinh, Christopher Cordi, Gregory Jacobus, Nicholas Pattengale, Steven Elliott
    CSET '19The DComp TestbedRyan Goodfellow, Stephen Schwab, Erik Kline, Lincoln Thurlow, Geoff Lawler
    WOOT '19Vacuums in the Cloud: Analyzing Security in a Hardened IoT EcosystemFabian Ullrich, Jiska Classen, Johannes Eger, Matthias Hollick

Pages