Stop the war!
Остановите войну!
for scientists:
default search action
12th WOOT @ USENIX Security Symposium 2018: Baltimore, MD, USA
- Christian Rossow, Yves Younan:
12th USENIX Workshop on Offensive Technologies, WOOT 2018, Baltimore, MD, USA, August 13-14, 2018. USENIX Association 2018
Pwning Machine Learning
- Dawn Song, Kevin Eykholt, Ivan Evtimov, Earlence Fernandes, Bo Li, Amir Rahmati, Florian Tramèr, Atul Prakash, Tadayoshi Kohno:
Physical Adversarial Examples for Object Detectors. - Giuseppe Garofalo, Vera Rimmer, Tim Van hamme, Davy Preuveneers, Wouter Joosen:
Fishy Faces: Crafting Adversarial Images to Poison Face Authentication.
(Not so) Secure Hardware
- Esmaeil Mohammadian Koruyeh, Khaled N. Khasawneh, Chengyu Song, Nael B. Abu-Ghazaleh:
Spectre Returns! Speculation Attacks using the Return Stack Buffer. - Satohiro Wakabayashi, Seita Maruyama, Tatsuya Mori, Shigeki Goto, Masahiro Kinugawa, Yu-ichi Hayashi:
A Feasibility Study of Radio-frequency Retroreflector Attack. - Julian Fietkau, Starbug, Jean-Pierre Seifert:
Swipe Your Fingerprints! How Biometric Authentication Simplifies Payment, Access and Identity Fraud.
Reversing and Abusing Protocols
- Johannes Pohl, Andreas Noack:
Universal Radio Hacker: A Suite for Analyzing and Attacking Stateful Wireless Protocols. - Rom Ogen, Kfir Zvi, Omer Shwartz, Yossi Oren:
Sensorless, Permissionless Information Exfiltration with Wi-Fi Micro-Jamming. - Stephan Kleber, Henning Kopp, Frank Kargl:
NEMESYS: Network Message Syntax Reverse Engineering by Analysis of the Intrinsic Structure of Individual Messages.
Hacker Toolbox
- Alexander Vetterl, Richard Clayton:
Bitter Harvest: Systematically Fingerprinting Low- and Medium-interaction Honeypots at Internet Scale. - Robert Gawlik, Thorsten Holz:
SoK: Make JIT-Spray Great Again.
Deny Your Service!
- Jonas Bushart:
Optimizing Recurrent Pulsing Attacks using Application-Layer Amplification of Open DNS Resolvers. - Matthias Niedermaier, Jan-Ole Malchow, Florian Fischer, Daniel Marzin, Dominik Merli, Volker Roth, Alexander von Bodisco:
You Snooze, You Lose: Measuring PLC Cycle Times under Attacks.
Beautiful Crypto Magic
- Mathy Vanhoef, Frank Piessens:
Symbolic Execution of Security Protocol Implementations: Handling Cryptographic Primitives. - Aram Verstegen, Roel Verdult, Wouter Bokslag:
Hitag 2 Hell - Brutally Optimizing Guess-and-Determine Attacks.
Breaking da Web
- Nils Engelbertz, Nurullah Erinola, David Herring, Juraj Somorovsky, Vladislav Mladenov, Jörg Schwenk:
Security Analysis of eIDAS - The Cross-Country Authentication Scheme in Europe. - Michael Smith, Craig Disselkoen, Shravan Narayan, Fraser Brown, Deian Stefan:
Browser history re: visited. - Michael Lescisin, Qusay H. Mahmoud:
Tools for Active and Passive Network Side-Channel Detection for Web Applications.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.