


default search action
9th WOOT 2015: Washington, DC, USA
- Aurélien Francillon, Thomas Ptacek:
9th USENIX Workshop on Offensive Technologies, WOOT '15, Washington, DC, USA, August 10-11, 2015. USENIX Association 2015 - Ben Burgess, Eric Wustrow, J. Alex Halderman:
Replication Prohibited: Attacking Restricted Keyways with 3D-Printing. - Sean Palka, Damon McCoy:
Fuzzing E-mail Filters with Generative Grammars and N-Gram Analysis. - Tavish Vaidya, Yuankai Zhang, Micah Sherr, Clay Shields:
Cocaine Noodles: Exploiting the Gap between Human and Machine Speech Recognition. - Ian D. Foster
, Andrew Prudhomme, Karl Koscher, Stefan Savage:
Fast and Vulnerable: A Story of Telematic Failures. - Michael Rushanan, Stephen Checkoway:
Run-DMA. - Antonio Barresi, Kaveh Razavi, Mathias Payer, Thomas R. Gross:
CAIN: Silently Breaking ASLR in the Cloud. - Gary Wang, Zachary John Estrada, Cuong Manh Pham, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer:
Hypervisor Introspection: A Technique for Evading Passive Virtual Machine Monitoring. - Dennis Kupser, Christian Mainka
, Jörg Schwenk, Juraj Somorovsky:
How to Break XML Encryption - Automatically. - Eduardo Novella Lorente, Carlo Meijer, Roel Verdult:
Scrutinizing WPA2 Password Generating Algorithms in Wireless Routers. - Yin Minn Pa Pa, Shogo Suzuki, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, Christian Rossow:
IoTPOT: Analysing the Rise of IoT Compromises. - Oleksandr Bazhaniuk, John Loucaides, Lee Rosenbaum, Mark R. Tuttle, Vincent Zimmer
:
Symbolic Execution for BIOS Security. - Karl Koscher, Tadayoshi Kohno, David Molnar:
SURROGATES: Enabling Near-Real-Time Dynamic Analyses of Embedded Systems. - Takuya Watanabe, Mitsuaki Akiyama, Tatsuya Mori:
RouteDetector: Sensor-based Positioning System That Exploits Spatio-Temporal Regularity of Human Mobility. - Or Peles, Roee Hay:
One Class to Rule Them All: 0-Day Deserialization Vulnerabilities in Android. - Wen Xu, Yubin Fu:
Own Your Android! Yet Another Universal Root. - Giancarlo Pellegrino, Christian Rossow, Fabrice J. Ryba, Thomas C. Schmidt, Matthias Wählisch:
Cashing Out the Great Cannon? On Browser-Based DDoS Attacks and Economics. - Florian Adamsky, Syed Ali Khayam, Rudolf Jäger, Muttukrishnan Rajarajan:
P2P File-Sharing in Hell: Exploiting BitTorrent Vulnerabilities to Launch Distributed Reflective DoS Attacks. - Clemens Hlauschek, Markus Gruber, Florian Fankhauser, Christian Schanes:
Prying Open Pandora's Box: KCI Attacks against TLS. - Benjamin Beurdouche, Antoine Delignat-Lavaud, Nadim Kobeissi, Alfredo Pironti, Karthikeyan Bhargavan:
FLEXTLS: A Tool for Testing TLS Implementations.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.