IPv6 Security: Attacks and Countermeasures in a Nutshell
|
Johanna Ullrich
,
Katharina Krombholz
,
Heidelinde Hobel
,
Adrian Dabrowski
,
Edgar Weippl
,
SBA Research
|
Green Lights Forever: Analyzing the Security of Traffic Infrastructure
|
J. Alex Halderman
,
Branden Ghena
,
William Beyer
,
Allen Hillaker
,
Jonathan Pevarnek
,
University of Michigan
|
Tick Tock: Building Browser Red Pills from Timing Side Channels
|
Dan Boneh
,
Grant Ho
,
Lucas Ballard
,
Niels Provos
,
Google Inc.
,
Stanford University
|
Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS Attacks
|
Thorsten Holz
,
Marc Kührer
,
Thomas Hupperich
,
Christian Rossow
,
Ruhr-University Bochum
|
Clickjacking Revisited: A Perceptual View of UI Security
|
Devdatta Akhawe
,
Warren He
,
Zhiwei Li
,
Reza Moazzezi
,
Dawn Song
,
University of California, Berkeley
|
The End is Nigh: Generic Solving of Text-based CAPTCHAs
|
Elie Bursztein
,
Jonathan Aigrain
,
Angelika Moscicki
,
John C. Mitchell
,
Google Inc.
,
Stanford University
|
Zippier ZMap: Internet-Wide Scanning at 10 Gbps
|
David Adrian
,
J. Alex Halderman
,
Zakir Durumeric
,
Gulshan Singh
,
University of Michigan
|
Are Your Passwords Safe: Energy-Efficient Bcrypt Cracking with Low-Cost Parallel Hardware
|
Katja Malvoni
,
Solar Designer
,
Josip Knezovic
,
Openwall
,
University of Zagreb
|
Inaudible Sound as a Covert Channel in Mobile Devices
|
Luke Deshotels
,
North Carolina State University
|
Lowering the USB Fuzzing Barrier by Transparent Two-Way Emulation
|
Rijnard van Tonder
,
Herman Engelbrecht
,
Stellenbosch University
|
Through the Looking-Glass, and What Eve Found There
|
Aurélien Francillon
,
Davide Balzarotti
,
Mariano Graziano
,
Luca Bruno
,
EURECOM
|
Automated Reverse Engineering using Lego®
|
Georg Chalupar
,
Stefan Peherstorfer
,
Erik Poll
,
Joeri de Ruiter
,
University of Applied Sciences Upper Austria
,
Radboud University Nijmegen
|
Mouse Trap: Exploiting Firmware Updates in USB Peripherals
|
Jacob Maskiewicz
,
Benjamin Ellis
,
James Mouradian
,
Hovav Shacham
,
University of California, San Diego
|
Printed Circuit Board Deconstruction Techniques
|
Joe Grand
,
Grand Idea Studio, Inc.
|
Practical Kleptography
|
Matthew Green
,
Johns Hopkins University
|
Attacking the Linux PRNG On Android: Weaknesses in Seeding of Entropic Pools and Low Boot-Time Entropy
|
Sagi Kedmi
,
Roee Hay
,
David Kaplan
,
Avi Dayan
,
IBM Security Systems
|
Security Impact of High Resolution Smartphone Cameras
|
Tobias Fiebig
,
Jan Krissler
,
Ronny Hänsch
,
Berlin University of Technology
|
An Experience Report on Extracting and Viewing Memory Events via Wireshark
|
Sarah Laing
,
Michael E. Locasto
,
John Aycock
,
University of Calgary
|