default search action
8th WOOT 2014: San Diego, CA, USA
- Sergey Bratus, Felix "FX" Lindner:
8th USENIX Workshop on Offensive Technologies, WOOT '14, San Diego, CA, USA, August 19, 2014. USENIX Association 2014
Browsers and InterWebs
- Devdatta Akhawe, Warren He, Zhiwei Li, Reza Moazzezi, Dawn Song:
Clickjacking Revisited: A Perceptual View of UI Security. - Grant Ho, Dan Boneh, Lucas Ballard, Niels Provos:
Tick Tock: Building Browser Red Pills from Timing Side Channels. - Elie Bursztein, Jonathan Aigrain, Angelika Moscicki, John C. Mitchell:
The End is Nigh: Generic Solving of Text-based CAPTCHAs. - Marc Kührer, Thomas Hupperich, Christian Rossow, Thorsten Holz:
Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS Attacks.
Infrastructure Insights
- Johanna Ullrich, Katharina Krombholz, Heidelinde Hobel, Adrian Dabrowski, Edgar R. Weippl:
IPv6 Security: Attacks and Countermeasures in a Nutshell. - Luca Bruno, Mariano Graziano, Davide Balzarotti, Aurélien Francillon:
Through the Looking-Glass, and What Eve Found There. - Branden Ghena, William Beyer, Allen Hillaker, Jonathan Pevarnek, J. Alex Halderman:
Green Lights Forever: Analyzing the Security of Traffic Infrastructure. - David Adrian, Zakir Durumeric, Gulshan Singh, J. Alex Halderman:
Zippier ZMap: Internet-Wide Scanning at 10 Gbps.
Embedded and Hardware Security
- Georg Chalupar, Stefan Peherstorfer, Erik Poll, Joeri de Ruiter:
Automated Reverse Engineering using Lego®. - Katja Malvoni, Solar Designer, Josip Knezovic:
Are Your Passwords Safe: Energy-Efficient Bcrypt Cracking with Low-Cost Parallel Hardware. - Joe Grand:
Printed Circuit Board Deconstruction Techniques. - Jacob Maskiewicz, Benjamin Ellis, James Mouradian, Hovav Shacham:
Mouse Trap: Exploiting Firmware Updates in USB Peripherals. - Rijnard van Tonder, Herman A. Engelbrecht:
Lowering the USB Fuzzing Barrier by Transparent Two-Way Emulation.
Security Analysis
- David Kaplan, Sagi Kedmi, Roee Hay, Avi Dayan:
Attacking the Linux PRNG On Android: Weaknesses in Seeding of Entropic Pools and Low Boot-Time Entropy. - Tobias Fiebig, Jan Krissler, Ronny Hänsch:
Security Impact of High Resolution Smartphone Cameras. - Luke Deshotels:
Inaudible Sound as a Covert Channel in Mobile Devices. - Sarah Laing, Michael E. Locasto, John Aycock:
An Experience Report on Extracting and Viewing Memory Events via Wireshark.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.