default search action
7th WOOT 2013: Washington, DC, USA
- Jon Oberheide, William K. Robertson:
7th USENIX Workshop on Offensive Technologies, WOOT '13, Washington, D.C., USA, August 13, 2013. USENIX Association 2013
Network Attacks I
- Ben Smyth, Alfredo Pironti:
Truncating TLS Connections to Violate Beliefs in Web Applications. - Yunxing Dai, Ryan Resig:
FireDrill: Interactive DNS Rebinding. - Roee Hay, Jonathan Kalechstain, Gabi Nakibly:
Subverting BIND's SRTT Algorithm Derandomizing NS Selection.
Mobile Attacks
- Mike Ryan:
Bluetooth: With Low Energy Comes Low Security. - Jethro Beekman, Christopher Thompson:
Breaking Cell Phone Authentication: Vulnerabilities in AKA, IMS, and Android. - Michael Roland, Josef Langer:
Cloning Credit Cards: A Combined Pre-play and Downgrade Attack on EMV Contactless.
Network Attacks II
- Diogo Mónica, Carlos Ribeiro:
Leveraging Honest Users: Stealth Command-and-Control of Botnets. - Craig A. Shue, Nathanael Paul, Curtis R. Taylor:
From an IP Address to a Street Address: Using Wireless Signals to Locate a Target. - Dhiru Kholia, Przemyslaw Wegrzyn:
Looking Inside the (Drop) Box. - Anthony Bonkoski, Russ Bielawski, J. Alex Halderman:
Illuminating the Security Issues Surrounding Lights-Out Server Management.
Low-Level Attacks
- Rebecca Shapiro, Sergey Bratus, Sean W. Smith:
"Weird Machines" in ELF: A Spotlight on the Underappreciated Metadata. - Dmitry Nedospasov, Thorsten Schröder:
Introducing Die Datenkrake: Programmable Logic for Hardware Security Analysis. - Julian Bangert, Sergey Bratus, Rebecca Shapiro, Sean W. Smith:
The Page-Fault Weird Machine: Lessons in Instruction-less Computation.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.