Leveraging Honest Users: Stealth Command-and-Control of Botnets
|
Carlos Ribeiro
,
Diogo Mónica
,
INESC-ID/IST
|
Illuminating the Security Issues Surrounding Lights-Out Server Management
|
Russ Bielawski
,
Anthony J. Bonkoski
,
J. Alex Halderman
,
University of Michigan
|
The Page-Fault Weird Machine: Lessons in Instruction-less Computation
|
Sean W. Smith
,
Rebecca Shapiro
,
Julian Bangert
,
Sergey Bratus
,
Dartmouth College
|
From an IP Address to a Street Address: Using Wireless Signals to Locate a Target
|
Curtis R. Taylor
,
Nathanael Paul
,
Craig A. Shue
,
University of Tennessee
,
Oak Ridge National Laboratory
,
Worcester Polytechnic Institute
|
Subverting BIND's SRTT Algorithm Derandomizing NS Selection
|
Jonathan Kalechstein
,
Roee Hay
,
Gabi Nakibly
,
National EW Research & Simulation Center, Israel
,
Technion—Israel Institute of Technology
,
IBM
|
“Weird Machines” in ELF: A Spotlight on the Underappreciated Metadata
|
Sean W. Smith
,
Rebecca Shapiro
,
Sergey Bratus
,
Dartmouth College
|
FireDrill: Interactive DNS Rebinding
|
Ryan Resig
,
Yunxing Dai
,
University of Michigan
|
Introducing Die Datenkrake: Programmable Logic for Hardware Security Analysis
|
Thorsten Schröder
,
Dmitry Nedospasov
,
modzero AG
,
FG SecT, TU Berlin
|
Looking Inside the (Drop) Box
|
Przemysław Węgrzyn
,
Dhiru Kholia
,
CodePainters
,
University of British Columbia
,
Openwall
|
Breaking Cell Phone Authentication: Vulnerabilities in AKA, IMS, and Android
|
Christopher Thompson
,
Jethro G. Beekman
,
University of California, Berkeley
|
Cloning Credit Cards: A Combined Pre-play and Downgrade Attack on EMV Contactless
|
Josef Langer
,
Michael Roland
,
University of Applied Sciences Upper Austria
,
NFC Research Lab Hagenberg
|
Truncating TLS Connections to Violate Beliefs in Web Applications
|
Ben Smyth
,
Paris-Rocquencourt
,
Alfredo Pironti
|
Bluetooth: With Low Energy Comes Low Security
|
Mike Ryan
,
iSEC Partners
|