Login / Signup
WOOT
2007
2011
2013
2017
2007
2017
Keyphrases
Publications
2017
Omer Shwartz
,
Amir Cohen
,
Asaf Shabtai
,
Yossi Oren
Shattered Trust: When Replacement Smartphone Components Attack.
WOOT
(2017)
Bhargava Shastry
,
Federico Maggi
,
Fabian Yamaguchi
,
Konrad Rieck
,
Jean-Pierre Seifert
Static Exploration of Taint-Style Vulnerabilities Found by Fuzzing.
WOOT
(2017)
Roee Hay
fastboot oem vuln: Android Bootloader Vulnerabilities in Vendor Customizations.
WOOT
(2017)
Ferdinand Brasser
,
Urs Müller
,
Alexandra Dmitrienko
,
Kari Kostiainen
,
Srdjan Capkun
,
Ahmad-Reza Sadeghi
Software Grand Exposure: SGX Cache Attacks Are Practical.
WOOT
(2017)
Patrick Hulin
,
Andy Davis
,
Rahul Sridhar
,
Andrew Fasano
,
Cody Gallagher
,
Aaron Sedlacek
,
Tim Leek
,
Brendan Dolan-Gavitt
AutoCTF: Creating Diverse Pwnables via Automated Bug Injection.
WOOT
(2017)
Mordechai Guri
,
Yosef A. Solewicz
,
Andrey Daidakulov
,
Yuval Elovici
SPEAKE(a)R: Turn Speakers to Microphones for Fun and Profit.
WOOT
(2017)
Warren He
,
James Wei
,
Xinyun Chen
,
Nicholas Carlini
,
Dawn Song
Adversarial Example Defense: Ensembles of Weak Defenses are not Strong.
WOOT
(2017)
Tommi Unruh
,
Bhargava Shastry
,
Malte Skoruppa
,
Federico Maggi
,
Konrad Rieck
,
Jean-Pierre Seifert
,
Fabian Yamaguchi
Leveraging Flawed Tutorials for Seeding Large-Scale Web Vulnerability Discovery.
WOOT
(2017)
Sofia Belikovetsky
,
Mark Yampolskiy
,
Jinghui Toh
,
Jacob Gatlin
,
Yuval Elovici
dr0wned - Cyber-Physical Attack with Additive Manufacturing.
WOOT
(2017)
Johannes Obermaier
,
Stefan Tatschner
Shedding too much Light on a Microcontroller's Firmware Protection.
WOOT
(2017)
Anil Kurmus
,
Nikolas Ioannou
,
Nikolaos Papandreou
,
Thomas P. Parnell
From random block corruption to privilege escalation: A filesystem attack vector for rowhammer-like attacks.
WOOT
(2017)
Kevin Bock
,
Daven Patel
,
George Hughey
,
Dave Levin
unCaptcha: A Low-Resource Defeat of reCaptcha's Audio Challenge.
WOOT
(2017)
Shinjo Park
,
Altaf Shaik
,
Ravishankar Borgaonkar
,
Andrew Martin
,
Jean-Pierre Seifert
White-Stingray: Evaluating IMSI Catchers Detection Applications.
WOOT
(2017)
James Patrick-Evans
,
Lorenzo Cavallaro
,
Johannes Kinder
POTUS: Probing Off-The-Shelf USB Drivers with Symbolic Fault Injection.
WOOT
(2017)
Stephan Kleber
,
Henrik Ferdinand Nölscher
,
Frank Kargl
Automated PCB Reverse Engineering.
WOOT
(2017)
Luca Reverberi
,
David Oswald
Breaking (and Fixing) a Widely Used Continuous Glucose Monitoring System.
WOOT
(2017)
Zhenquan Xu
,
Gongshen Liu
,
Tielei Wang
,
Hao Xu
Exploitations of Uninitialized Uses on macOS Sierra.
WOOT
(2017)
Martin Grothe
,
Tobias Niemann
,
Juraj Somorovsky
,
Jörg Schwenk
Breaking and Fixing Gridcoin.
WOOT
(2017)
Tom van Goethem
,
Wouter Joosen
One Side-Channel to Bring Them All and in the Darkness Bind Them: Associating Isolated Browsing Sessions.
WOOT
(2017)
Ahmed Atya
,
Azeem Aqil
,
Karim Khalil
,
Zhiyun Qian
,
Srikanth V. Krishnamurthy
,
Thomas F. La Porta
Stalling Live Migrations on the Cloud.
WOOT
(2017)
Ang Cui
,
Rick Housley
BADFET: Defeating Modern Secure Boot Using Second-Order Pulsed Electromagnetic Fault Injection.
WOOT
(2017)
Ryad Benadjila
,
Mathieu Renard
,
José Lopes-Esteves
,
Chaouki Kasmi
One Car, Two Frames: Attacks on Hitag-2 Remote Keyless Entry Systems Revisited.
WOOT
(2017)
2016
Eric Wustrow
,
Benjamin VanderSloot
DDoSCoin: Cryptocurrency with a Malicious Proof-of-Work.
WOOT
(2016)
Drew Davidson
,
Hao Wu
,
Robert Jellinek
,
Vikas Singh
,
Thomas Ristenpart
Controlling UAVs with Sensor Input Spoofing Attacks.
WOOT
(2016)
Kyriakos K. Ispoglou
,
Mathias Payer
malWASH: Washing Malware to Evade Dynamic Analysis.
WOOT
(2016)
Sergey Bratus
,
Travis Goodspeed
,
Ange Albertini
,
Debanjum S. Solanky
Fillory of PHY: Toward a Periodic Table of Signal Corruption Exploits and Polyglots in Digital Radio.
WOOT
(2016)
Martin Grothe
,
Christian Mainka
,
Paul Rösler
,
Jörg Schwenk
How to Break Microsoft Rights Management Services.
WOOT
(2016)
Christopher Späth
,
Christian Mainka
,
Vladislav Mladenov
,
Jörg Schwenk
SoK: XML Parser Vulnerabilities.
WOOT
(2016)
Hocheol Shin
,
Yunmok Son
,
Young-Seok Park
,
Yujin Kwon
,
Yongdae Kim
Sampling Race: Bypassing Timing-Based Analog Active Sensor Spoofing Detection on Analog-Digital Systems.
WOOT
(2016)
Frank Imeson
,
Saeed Nejati
,
Siddharth Garg
,
Mahesh V. Tripunitara
Non-Deterministic Timers for Hardware Trojan Activation (or How a Little Randomness Can Go the Wrong Way).
WOOT
(2016)
Jeremy Blackthorne
,
Alexei Bulazel
,
Andrew Fasano
,
Patrick Biernat
,
Bülent Yener
AVLeak: Fingerprinting Antivirus Emulators through Black-Box Testing.
WOOT
(2016)
Benyamin Farshteindiker
,
Nir Hasidim
,
Asaf Grosz
,
Yossi Oren
How to Phone Home with Someone Else's Phone: Information Exfiltration Using Intentional Sound Noise on Gyroscopic Sensors.
WOOT
(2016)
Daeseon Choi
,
Younho Lee
Eavesdropping One-Time Tokens Over Magnetic Secure Transmission in Samsung Pay.
WOOT
(2016)
Brendan Saltaformaggio
,
Hongjun Choi
,
Kristen Johnson
,
Yonghwi Kwon
,
Qi Zhang
,
Xiangyu Zhang
,
Dongyan Xu
,
John Qian
Eavesdropping on Fine-Grained User Activities Within Smartphone Apps Over Encrypted Network Traffic.
WOOT
(2016)
10th USENIX Workshop on Offensive Technologies, WOOT 16, Austin, TX, USA, August 8-9, 2016.
WOOT
(2016)
Alexander Bolshev
,
Jason Larsen
,
Marina Krotofil
,
Reid Wightman
A Rising Tide: Design Exploits in Industrial Control Systems.
WOOT
(2016)
Huangxin Wang
,
Zhonghua Xi
,
Fei Li
,
Songqing Chen
Abusing Public Third-Party Services for EDoS Attacks.
WOOT
(2016)
David Rupprecht
,
Kai Jansen
,
Christina Pöpper
Putting LTE Security Functions to the Test: A Framework to Evaluate Implementation Correctness.
WOOT
(2016)
Yelizaveta Burakova
,
Bill Hass
,
Leif Millar
,
André Weimerskirch
Truck Hacking: An Experimental Analysis of the SAE J1939 Standard.
WOOT
(2016)
Young-Seok Park
,
Yunmok Son
,
Hocheol Shin
,
Dohyun Kim
,
Yongdae Kim
This Ain't Your Dose: Sensor Spoofing Attack on Medical Infusion Pump.
WOOT
(2016)
Hanno Böck
,
Aaron Zauner
,
Sean Devlin
,
Juraj Somorovsky
,
Philipp Jovanovic
Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS.
WOOT
(2016)
Matt Spisak
Hardware-Assisted Rootkits: Abusing Performance Counters on the ARM and x86 Architectures.
WOOT
(2016)
Sahar Mazloom
,
Mohammad Rezaeirad
,
Aaron Hunter
,
Damon McCoy
A Security Analysis of an In-Vehicle Infotainment and App Platform.
WOOT
(2016)
Andrew Ruddick
,
Jeff Yan
Acceleration Attacks on PBKDF2: Or, What Is inside the Black-Box of oclHashcat?
WOOT
(2016)
2015
Yin Minn Pa Pa
,
Shogo Suzuki
,
Katsunari Yoshioka
,
Tsutomu Matsumoto
,
Takahiro Kasama
,
Christian Rossow
IoTPOT: Analysing the Rise of IoT Compromises.
WOOT
(2015)
Michael Rushanan
,
Stephen Checkoway
Run-DMA.
WOOT
(2015)
Gary Wang
,
Zachary John Estrada
,
Cuong Manh Pham
,
Zbigniew T. Kalbarczyk
,
Ravishankar K. Iyer
Hypervisor Introspection: A Technique for Evading Passive Virtual Machine Monitoring.
WOOT
(2015)
Ben Burgess
,
Eric Wustrow
,
J. Alex Halderman
Replication Prohibited: Attacking Restricted Keyways with 3D-Printing.
WOOT
(2015)
Sean Palka
,
Damon McCoy
Fuzzing E-mail Filters with Generative Grammars and N-Gram Analysis.
WOOT
(2015)
Wen Xu
,
Yubin Fu
Own Your Android! Yet Another Universal Root.
WOOT
(2015)