Star 0

Talks

Title Humans
Cashing Out the Great Cannon? On Browser-Based DDoS Attacks and Economics Christian Rossow , Giancarlo Pellegrino , Fabrice J. Ryba , Thomas C. Schmidt , Matthias Wählisch , Saarland University , Freie Uiversität Berlin , HAW Hamburg , Freie Universität Berlin
Own Your Android! Yet Another Universal Root Wen Xu , Yubin Fu , KeenTeam
IoTPOT: Analysing the Rise of IoT Compromises Takahiro Kasama , Christian Rossow , Yin Minn Pa Pa , Shogo Suzuki , Katsunari Yoshioka , Tsutomu Matsumoto , Saarland University , Yokohama National University , National Institute of Information and Communications Technology
Fast and Vulnerable: A Story of Telematic Failures Ian Foster , Karl Koscher , Andrew Prudhomme , Stefan Savage , University of California, San Diego
Run-DMA Michael Rushanan , Stephen Checkoway , Johns Hopkins University
CAIN: Silently Breaking ASLR in the Cloud Kaveh Razavi , Antonio Barresi , Mathias Payer , Thomas R. Gross , ETH Zürich , VU University Amsterdam , Purdue University
Fuzzing E-mail Filters with Generative Grammars and N-Gram Analysis Sean Palka , Damon McCoy , George Mason University , International Computer Science Institute
Prying Open Pandora's Box: KCI Attacks against TLS Clemens Hlauschek , Markus Gruber , Florian Fankhauser , Christian Schanes , RISE - Research Industrial Systems Engineering GmbH
FLEXTLS: A Tool for Testing TLS Implementations Antoine Delignat-Lavaud , Karthikeyan Bhargavan , Benjamin Beurdouche , Alfredo Pironti , Paris-Rocquencourt , Nadim Kobeissi
Replication Prohibited: Attacking Restricted Keyways with 3D-Printing J. Alex Halderman , Ben Burgess , Eric Wustrow , University of Michigan
Scrutinizing WPA2 Password Generating Algorithms in Wireless Routers Eduardo Novella Lorente , Carlo Meijer , Roel Verdult , Radboud University
The NSA Playset: A Year of Toys and Tools Michael Ossmann , Great Scott Gadgets
SURROGATES: Enabling Near-Real-Time Dynamic Analyses of Embedded Systems David Molnar , Karl Koscher , Tadayoshi Kohno , Microsoft Corporation , University of California, San Diego , University of Washington
A World Where There Aren't Any Papers about TLS Adam Langley , Google Inc.
One Class to Rule Them All: 0-Day Deserialization Vulnerabilities in Android Roee Hay , Or Peles , IBM Security
Symbolic Execution for BIOS Security Oleksandr Bazhaniuk , Vincent Zimmer , John Loucaides , Lee Rosenbaum , Mark R. Tuttle , Intel Corporation
How to Break XML Encryption – Automatically Juraj Somorovsky , Dennis Kupser , Christian Mainka , Jorg Schwenk , Rühr University Bochum
P2P File-Sharing in Hell: Exploiting BitTorrent Vulnerabilities to Launch Distributed Reflective DoS Attacks Florian Adamsky , Syed Ali Khayam , Rudolf Jäger , Muttukrishnan Rajarajan , City University London , PLUMgrid Inc. , THM Friedberg
Hypervisor Introspection: A Technique for Evading Passive Virtual Machine Monitoring Gary Wang , Zachary J. Estrada , Cuong Pham , Zbigniew Kalbarczyk , Ravishankar K. Iyer , University of Illinois at Urbana-Champaign
RouteDetector: Sensor-based Positioning System That Exploits Spatio-Temporal Regularity of Human Mobility Takuya Watanabe , Mitsuaki Akiyama , Tatsuya Mori , Waseda University , NTT Secure Platform Labs
Cocaine Noodles: Exploiting the Gap between Human and Machine Speech Recognition Tavish Vaidya , Yuankai Zhang , Micah Sherr , Clay Shields , Georgetown University