Cashing Out the Great Cannon? On Browser-Based DDoS Attacks and Economics
|
Christian Rossow
,
Giancarlo Pellegrino
,
Fabrice J. Ryba
,
Thomas C. Schmidt
,
Matthias Wählisch
,
Saarland University
,
Freie Uiversität Berlin
,
HAW Hamburg
,
Freie Universität Berlin
|
Own Your Android! Yet Another Universal Root
|
Wen Xu
,
Yubin Fu
,
KeenTeam
|
IoTPOT: Analysing the Rise of IoT Compromises
|
Takahiro Kasama
,
Christian Rossow
,
Yin Minn Pa Pa
,
Shogo Suzuki
,
Katsunari Yoshioka
,
Tsutomu Matsumoto
,
Saarland University
,
Yokohama National University
,
National Institute of Information and Communications Technology
|
Fast and Vulnerable: A Story of Telematic Failures
|
Ian Foster
,
Karl Koscher
,
Andrew Prudhomme
,
Stefan Savage
,
University of California, San Diego
|
Run-DMA
|
Michael Rushanan
,
Stephen Checkoway
,
Johns Hopkins University
|
CAIN: Silently Breaking ASLR in the Cloud
|
Kaveh Razavi
,
Antonio Barresi
,
Mathias Payer
,
Thomas R. Gross
,
ETH Zürich
,
VU University Amsterdam
,
Purdue University
|
Fuzzing E-mail Filters with Generative Grammars and N-Gram Analysis
|
Sean Palka
,
Damon McCoy
,
George Mason University
,
International Computer Science Institute
|
Prying Open Pandora's Box: KCI Attacks against TLS
|
Clemens Hlauschek
,
Markus Gruber
,
Florian Fankhauser
,
Christian Schanes
,
RISE - Research Industrial Systems Engineering GmbH
|
FLEXTLS: A Tool for Testing TLS Implementations
|
Antoine Delignat-Lavaud
,
Karthikeyan Bhargavan
,
Benjamin Beurdouche
,
Alfredo Pironti
,
Paris-Rocquencourt
,
Nadim Kobeissi
|
Replication Prohibited: Attacking Restricted Keyways with 3D-Printing
|
J. Alex Halderman
,
Ben Burgess
,
Eric Wustrow
,
University of Michigan
|
Scrutinizing WPA2 Password Generating Algorithms in Wireless Routers
|
Eduardo Novella Lorente
,
Carlo Meijer
,
Roel Verdult
,
Radboud University
|
The NSA Playset: A Year of Toys and Tools
|
Michael Ossmann
,
Great Scott Gadgets
|
SURROGATES: Enabling Near-Real-Time Dynamic Analyses of Embedded Systems
|
David Molnar
,
Karl Koscher
,
Tadayoshi Kohno
,
Microsoft Corporation
,
University of California, San Diego
,
University of Washington
|
A World Where There Aren't Any Papers about TLS
|
Adam Langley
,
Google Inc.
|
One Class to Rule Them All: 0-Day Deserialization Vulnerabilities in Android
|
Roee Hay
,
Or Peles
,
IBM Security
|
Symbolic Execution for BIOS Security
|
Oleksandr Bazhaniuk
,
Vincent Zimmer
,
John Loucaides
,
Lee Rosenbaum
,
Mark R. Tuttle
,
Intel Corporation
|
How to Break XML Encryption – Automatically
|
Juraj Somorovsky
,
Dennis Kupser
,
Christian Mainka
,
Jorg Schwenk
,
Rühr University Bochum
|
P2P File-Sharing in Hell: Exploiting BitTorrent Vulnerabilities to Launch Distributed Reflective DoS Attacks
|
Florian Adamsky
,
Syed Ali Khayam
,
Rudolf Jäger
,
Muttukrishnan Rajarajan
,
City University London
,
PLUMgrid Inc.
,
THM Friedberg
|
Hypervisor Introspection: A Technique for Evading Passive Virtual Machine Monitoring
|
Gary Wang
,
Zachary J. Estrada
,
Cuong Pham
,
Zbigniew Kalbarczyk
,
Ravishankar K. Iyer
,
University of Illinois at Urbana-Champaign
|
RouteDetector: Sensor-based Positioning System That Exploits Spatio-Temporal Regularity of Human Mobility
|
Takuya Watanabe
,
Mitsuaki Akiyama
,
Tatsuya Mori
,
Waseda University
,
NTT Secure Platform Labs
|
Cocaine Noodles: Exploiting the Gap between Human and Machine Speech Recognition
|
Tavish Vaidya
,
Yuankai Zhang
,
Micah Sherr
,
Clay Shields
,
Georgetown University
|