![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
12th WOOT @ USENIX Security Symposium 2018: Baltimore, MD, USA
- Christian Rossow, Yves Younan:
12th USENIX Workshop on Offensive Technologies, WOOT 2018, Baltimore, MD, USA, August 13-14, 2018. USENIX Association 2018
Pwning Machine Learning
- Dawn Song, Kevin Eykholt, Ivan Evtimov, Earlence Fernandes, Bo Li, Amir Rahmati, Florian Tramèr
, Atul Prakash
, Tadayoshi Kohno:
Physical Adversarial Examples for Object Detectors. - Giuseppe Garofalo, Vera Rimmer, Tim Van hamme, Davy Preuveneers, Wouter Joosen:
Fishy Faces: Crafting Adversarial Images to Poison Face Authentication.
(Not so) Secure Hardware
- Esmaeil Mohammadian Koruyeh, Khaled N. Khasawneh, Chengyu Song, Nael B. Abu-Ghazaleh:
Spectre Returns! Speculation Attacks using the Return Stack Buffer. - Satohiro Wakabayashi, Seita Maruyama, Tatsuya Mori, Shigeki Goto, Masahiro Kinugawa, Yu-ichi Hayashi:
A Feasibility Study of Radio-frequency Retroreflector Attack. - Julian Fietkau, Starbug, Jean-Pierre Seifert:
Swipe Your Fingerprints! How Biometric Authentication Simplifies Payment, Access and Identity Fraud.
Reversing and Abusing Protocols
- Johannes Pohl, Andreas Noack:
Universal Radio Hacker: A Suite for Analyzing and Attacking Stateful Wireless Protocols. - Rom Ogen, Kfir Zvi, Omer Shwartz, Yossi Oren:
Sensorless, Permissionless Information Exfiltration with Wi-Fi Micro-Jamming. - Stephan Kleber, Henning Kopp, Frank Kargl:
NEMESYS: Network Message Syntax Reverse Engineering by Analysis of the Intrinsic Structure of Individual Messages.
Hacker Toolbox
- Alexander Vetterl, Richard Clayton:
Bitter Harvest: Systematically Fingerprinting Low- and Medium-interaction Honeypots at Internet Scale. - Robert Gawlik, Thorsten Holz:
SoK: Make JIT-Spray Great Again.
Deny Your Service!
- Jonas Bushart:
Optimizing Recurrent Pulsing Attacks using Application-Layer Amplification of Open DNS Resolvers. - Matthias Niedermaier, Jan-Ole Malchow, Florian Fischer, Daniel Marzin, Dominik Merli, Volker Roth, Alexander von Bodisco:
You Snooze, You Lose: Measuring PLC Cycle Times under Attacks.
Beautiful Crypto Magic
- Mathy Vanhoef, Frank Piessens:
Symbolic Execution of Security Protocol Implementations: Handling Cryptographic Primitives. - Aram Verstegen, Roel Verdult, Wouter Bokslag:
Hitag 2 Hell - Brutally Optimizing Guess-and-Determine Attacks.
Breaking da Web
- Nils Engelbertz, Nurullah Erinola, David Herring, Juraj Somorovsky, Vladislav Mladenov, Jörg Schwenk:
Security Analysis of eIDAS - The Cross-Country Authentication Scheme in Europe. - Michael Smith, Craig Disselkoen, Shravan Narayan
, Fraser Brown, Deian Stefan:
Browser history re: visited. - Michael Lescisin, Qusay H. Mahmoud:
Tools for Active and Passive Network Side-Channel Detection for Web Applications.
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.