Star 0

Talks

Title Humans
IPv6 Security: Attacks and Countermeasures in a Nutshell Johanna Ullrich , Katharina Krombholz , Heidelinde Hobel , Adrian Dabrowski , Edgar Weippl , SBA Research
Green Lights Forever: Analyzing the Security of Traffic Infrastructure J. Alex Halderman , Branden Ghena , William Beyer , Allen Hillaker , Jonathan Pevarnek , University of Michigan
Tick Tock: Building Browser Red Pills from Timing Side Channels Dan Boneh , Grant Ho , Lucas Ballard , Niels Provos , Google Inc. , Stanford University
Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS Attacks Thorsten Holz , Marc Kührer , Thomas Hupperich , Christian Rossow , Ruhr-University Bochum
Clickjacking Revisited: A Perceptual View of UI Security Devdatta Akhawe , Warren He , Zhiwei Li , Reza Moazzezi , Dawn Song , University of California, Berkeley
The End is Nigh: Generic Solving of Text-based CAPTCHAs Elie Bursztein , Jonathan Aigrain , Angelika Moscicki , John C. Mitchell , Google Inc. , Stanford University
Zippier ZMap: Internet-Wide Scanning at 10 Gbps David Adrian , J. Alex Halderman , Zakir Durumeric , Gulshan Singh , University of Michigan
Are Your Passwords Safe: Energy-Efficient Bcrypt Cracking with Low-Cost Parallel Hardware Katja Malvoni , Solar Designer , Josip Knezovic , Openwall , University of Zagreb
Inaudible Sound as a Covert Channel in Mobile Devices Luke Deshotels , North Carolina State University
Lowering the USB Fuzzing Barrier by Transparent Two-Way Emulation Rijnard van Tonder , Herman Engelbrecht , Stellenbosch University
Through the Looking-Glass, and What Eve Found There Aurélien Francillon , Davide Balzarotti , Mariano Graziano , Luca Bruno , EURECOM
Automated Reverse Engineering using Lego® Georg Chalupar , Stefan Peherstorfer , Erik Poll , Joeri de Ruiter , University of Applied Sciences Upper Austria , Radboud University Nijmegen
Mouse Trap: Exploiting Firmware Updates in USB Peripherals Jacob Maskiewicz , Benjamin Ellis , James Mouradian , Hovav Shacham , University of California, San Diego
Printed Circuit Board Deconstruction Techniques Joe Grand , Grand Idea Studio, Inc.
Practical Kleptography Matthew Green , Johns Hopkins University
Attacking the Linux PRNG On Android: Weaknesses in Seeding of Entropic Pools and Low Boot-Time Entropy Sagi Kedmi , Roee Hay , David Kaplan , Avi Dayan , IBM Security Systems
Security Impact of High Resolution Smartphone Cameras Tobias Fiebig , Jan Krissler , Ronny Hänsch , Berlin University of Technology
An Experience Report on Extracting and Viewing Memory Events via Wireshark Sarah Laing , Michael E. Locasto , John Aycock , University of Calgary