default search action
18th WOOT @ USENIX Security Symposium 2024: Philadelphia, PA, USA
- Adam Doupé, Alyssa Milburn:
18th USENIX WOOT Conference on Offensive Technologies, WOOT 2024, Philadelphia, PA, USA, August 12-13, 2024. USENIX Association 2024
Practitioners at Work
- Prasanna Ravi, Arpan Jati, Shivam Bhasin:
Achilles Heel in Secure Boot: Breaking RSA Authentication and Bitstream Recovery from Zynq-7000 SoC. 1-10 - Tal A. Beery:
WhatsApp with privacy? Privacy issues with IM E2EE in the Multi-device setting. 11-16 - Jonathan Brossard:
Introduction to Procedural Debugging through Binary Libification. 17-25
Security Can Be Tricky
- Pietro Liguori, Christian Marescalco, Roberto Natella, Vittorio Orbinato, Luciano Pianese:
The Power of Words: Generating PowerShell Attacks from Natural Language. 27-43 - Olivia Gruza, Elias Heftrig, Oliver Jacobsen, Haya Schulmann, Niklas Vogel, Michael Waidner:
Attacking with Something That Does Not Exist: 'Proof of Non-Existence' Can Exhaust DNS Resolver CPU. 45-57 - Evangelos Bitsikas, Theodor Schnitzler, Christina Pöpper, Aanjhan Ranganathan:
Amplifying Threats: The Role of Multi-Sender Coordination in SMS-Timing-Based Location Inference Attacks. 59-73
Embedded Security
- Maryam Motallebighomi, Earlence Fernandes, Aanjhan Ranganathan:
MakeShift: Security Analysis of Wireless Gear Shifting in Bicycles. 75-88 - Adam Scott, Sean Andersen:
Engineering a backdoored bitcoin wallet. 89-100 - Leon Janzen, Lucas Becker, Colin Wiesenäcker, Matthias Hollick:
Oh No, My RAN! Breaking Into an O-RAN 5G Indoor Base Station. 101-115
Hardware Security
- Prakhar Sah, Matthew Hicks:
RIPencapsulation: Defeating IP Encapsulation on TI MSP Devices. 117-132 - Victor Goeman, Dairo de Ruck, Tom Cordemans, Jorn Lapon, Vincent Naessens:
Reverse Engineering the Eufy Ecosystem: A Deep Dive into Security Vulnerabilities and Proprietary Protocols. 133-147 - Xi Tan, Zheyuan Ma, Sandro Pinto, Le Guan, Ning Zhang, Jun Xu, Zhiqiang Lin, Hongxin Hu, Ziming Zhao:
SoK: Where's the "up"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems. 149-169
Memory Corruption Is a Solved Problem
- Adriaan Jacobs, Stijn Volckaert:
Not Quite Write: On the Effectiveness of Store-Only Bounds Checking. 171-187 - Lucas Becker, Matthias Hollick, Jiska Classen:
SoK: On the Effectiveness of Control-Flow Integrity in Practice. 189-209 - Philipp Mao, Elias Valentin Boschung, Marcel Busch, Mathias Payer:
Exploiting Android's Hardened Memory Allocator. 211-227
Physical Attacks
- Jeroen Delvaux, Cristofaro Mune, Mario Romero, Niek Timmers:
Breaking Espressif's ESP32 V3: Program Counter Control with Computed Values using Fault Injection. 229-243 - Joe Loughry, Kasper Rasmussen:
Basilisk: Remote Code Execution by Laser Excitation of P-N Junctions Without Insider Assistance. 245-261 - Muhammad Haris Rais, Muhammad Ahsan, Irfan Ahmed:
SOK: 3D Printer Firmware Attacks on Fused Filament Fabrication. 263-282
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.