Star 0

Talks

Title Humans
Leveraging Honest Users: Stealth Command-and-Control of Botnets Carlos Ribeiro , Diogo Mónica , INESC-ID/IST
Illuminating the Security Issues Surrounding Lights-Out Server Management Russ Bielawski , Anthony J. Bonkoski , J. Alex Halderman , University of Michigan
The Page-Fault Weird Machine: Lessons in Instruction-less Computation Sean W. Smith , Rebecca Shapiro , Julian Bangert , Sergey Bratus , Dartmouth College
From an IP Address to a Street Address: Using Wireless Signals to Locate a Target Curtis R. Taylor , Nathanael Paul , Craig A. Shue , University of Tennessee , Oak Ridge National Laboratory , Worcester Polytechnic Institute
Subverting BIND's SRTT Algorithm Derandomizing NS Selection Jonathan Kalechstein , Roee Hay , Gabi Nakibly , National EW Research & Simulation Center, Israel , Technion—Israel Institute of Technology , IBM
“Weird Machines” in ELF: A Spotlight on the Underappreciated Metadata Sean W. Smith , Rebecca Shapiro , Sergey Bratus , Dartmouth College
FireDrill: Interactive DNS Rebinding Ryan Resig , Yunxing Dai , University of Michigan
Introducing Die Datenkrake: Programmable Logic for Hardware Security Analysis Thorsten Schröder , Dmitry Nedospasov , modzero AG , FG SecT, TU Berlin
Looking Inside the (Drop) Box Przemysław Węgrzyn , Dhiru Kholia , CodePainters , University of British Columbia , Openwall
Breaking Cell Phone Authentication: Vulnerabilities in AKA, IMS, and Android Christopher Thompson , Jethro G. Beekman , University of California, Berkeley
Cloning Credit Cards: A Combined Pre-play and Downgrade Attack on EMV Contactless Josef Langer , Michael Roland , University of Applied Sciences Upper Austria , NFC Research Lab Hagenberg
Truncating TLS Connections to Violate Beliefs in Web Applications Ben Smyth , Paris-Rocquencourt , Alfredo Pironti
Bluetooth: With Low Energy Comes Low Security Mike Ryan , iSEC Partners