default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 234 matches
- 2024
- Lucas Becker, Matthias Hollick, Jiska Classen:
SoK: On the Effectiveness of Control-Flow Integrity in Practice. WOOT @ USENIX Security Symposium 2024: 189-209 - Tal A. Beery:
WhatsApp with privacy? Privacy issues with IM E2EE in the Multi-device setting. WOOT @ USENIX Security Symposium 2024: 11-16 - Evangelos Bitsikas, Theodor Schnitzler, Christina Pöpper, Aanjhan Ranganathan:
Amplifying Threats: The Role of Multi-Sender Coordination in SMS-Timing-Based Location Inference Attacks. WOOT @ USENIX Security Symposium 2024: 59-73 - Jonathan Brossard:
Introduction to Procedural Debugging through Binary Libification. WOOT @ USENIX Security Symposium 2024: 17-25 - Jeroen Delvaux, Cristofaro Mune, Mario Romero, Niek Timmers:
Breaking Espressif's ESP32 V3: Program Counter Control with Computed Values using Fault Injection. WOOT @ USENIX Security Symposium 2024: 229-243 - Victor Goeman, Dairo de Ruck, Tom Cordemans, Jorn Lapon, Vincent Naessens:
Reverse Engineering the Eufy Ecosystem: A Deep Dive into Security Vulnerabilities and Proprietary Protocols. WOOT @ USENIX Security Symposium 2024: 133-147 - Olivia Gruza, Elias Heftrig, Oliver Jacobsen, Haya Schulmann, Niklas Vogel, Michael Waidner:
Attacking with Something That Does Not Exist: 'Proof of Non-Existence' Can Exhaust DNS Resolver CPU. WOOT @ USENIX Security Symposium 2024: 45-57 - Adriaan Jacobs, Stijn Volckaert:
Not Quite Write: On the Effectiveness of Store-Only Bounds Checking. WOOT @ USENIX Security Symposium 2024: 171-187 - Leon Janzen, Lucas Becker, Colin Wiesenäcker, Matthias Hollick:
Oh No, My RAN! Breaking Into an O-RAN 5G Indoor Base Station. WOOT @ USENIX Security Symposium 2024: 101-115 - Pietro Liguori, Christian Marescalco, Roberto Natella, Vittorio Orbinato, Luciano Pianese:
The Power of Words: Generating PowerShell Attacks from Natural Language. WOOT @ USENIX Security Symposium 2024: 27-43 - Joe Loughry, Kasper Rasmussen:
Basilisk: Remote Code Execution by Laser Excitation of P-N Junctions Without Insider Assistance. WOOT @ USENIX Security Symposium 2024: 245-261 - Philipp Mao, Elias Valentin Boschung, Marcel Busch, Mathias Payer:
Exploiting Android's Hardened Memory Allocator. WOOT @ USENIX Security Symposium 2024: 211-227 - Maryam Motallebighomi, Earlence Fernandes, Aanjhan Ranganathan:
MakeShift: Security Analysis of Wireless Gear Shifting in Bicycles. WOOT @ USENIX Security Symposium 2024: 75-88 - Muhammad Haris Rais, Muhammad Ahsan, Irfan Ahmed:
SOK: 3D Printer Firmware Attacks on Fused Filament Fabrication. WOOT @ USENIX Security Symposium 2024: 263-282 - Prasanna Ravi, Arpan Jati, Shivam Bhasin:
Achilles Heel in Secure Boot: Breaking RSA Authentication and Bitstream Recovery from Zynq-7000 SoC. WOOT @ USENIX Security Symposium 2024: 1-10 - Prakhar Sah, Matthew Hicks:
RIPencapsulation: Defeating IP Encapsulation on TI MSP Devices. WOOT @ USENIX Security Symposium 2024: 117-132 - Adam Scott, Sean Andersen:
Engineering a backdoored bitcoin wallet. WOOT @ USENIX Security Symposium 2024: 89-100 - Xi Tan, Zheyuan Ma, Sandro Pinto, Le Guan, Ning Zhang, Jun Xu, Zhiqiang Lin, Hongxin Hu, Ziming Zhao:
SoK: Where's the "up"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems. WOOT @ USENIX Security Symposium 2024: 149-169 - Adam Doupé, Alyssa Milburn:
18th USENIX WOOT Conference on Offensive Technologies, WOOT 2024, Philadelphia, PA, USA, August 12-13, 2024. USENIX Association 2024 [contents] - 2020
- Jens Müller, Fabian Ising, Christian Mainka, Vladislav Mladenov, Sebastian Schinzel, Jörg Schwenk:
Office Document Security and Privacy. WOOT @ USENIX Security Symposium 2020 - Marcel Busch, Johannes Westphal, Tilo Müller:
Unearthing the TrustedCore: A Critical Review on Huawei's Trusted Execution Environment. WOOT @ USENIX Security Symposium 2020 - Haehyun Cho, Jinbum Park, Joonwon Kang, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn:
Exploiting Uses of Uninitialized Stack Variables in Linux Kernels to Leak Kernel Pointers. WOOT @ USENIX Security Symposium 2020 - Dennis Heinze, Jiska Classen, Matthias Hollick:
ToothPicker: Apple Picking in the iOS Bluetooth Stack. WOOT @ USENIX Security Symposium 2020 - Alex Ionescu:
OS Security Is Hard: Why All the Fuzzers in the World Won't Change the Way Platform Security Is Failing Us. WOOT @ USENIX Security Symposium 2020 - Steffen Klee, Alexandros Roussos, Max Maass, Matthias Hollick:
NFCGate: Opening the Door for NFC Security Research with a Smartphone-Based Toolkit. WOOT @ USENIX Security Symposium 2020 - Andrea Fioraldi, Dominik Christian Maier, Heiko Eißfeldt, Marc Heuse:
AFL++ : Combining Incremental Steps of Fuzzing Research. WOOT @ USENIX Security Symposium 2020 - Alex Matrosov:
Hardware Security Is Hard: How Hardware Boundaries Define Platform Security. WOOT @ USENIX Security Symposium 2020 - Johannes Obermaier, Marc Schink, Kosma Moczek:
One Exploit to Rule them All? On the Security of Drop-in Replacement and Counterfeit Microcontrollers. WOOT @ USENIX Security Symposium 2020 - Dhrumil Patel, Aditya Basu, Anish Mathuria:
Automatic Generation of Compact Printable Shellcodes for x86. WOOT @ USENIX Security Symposium 2020 - Nirjhar Roy, Nikhil Bansal, Gourav Takhar, Nikhil Mittal, Pramod Subramanyan:
When Oblivious is Not: Attacks against OPAM. WOOT @ USENIX Security Symposium 2020
skipping 204 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-01-06 22:12 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint