Everything You Know About Password-Stealing Is Wrong
|
Cormac Herley
,
Microsoft Corporation
|
On the Fragility and Limitations of Current Browser-Provided Clickjacking Protection Schemes
|
Mario Heiderich
,
Sebastian Lekies
,
Martin Johns
,
Dennis Appelt
,
Thorsten Holz
,
SAP Research
,
Ruhr University
|
Abusing Notification Services on Smartphones for Phishing and Spamming
|
Zhi Xu
,
Sencun Zhu
,
Pennsylvania State University
|
iOS and the Rising Cost of Reliable Exploitation
|
Dionysus Blazakis
|
Microgadgets: Size Does Matter in Turing-Complete Return-Oriented Programming
|
Andrei Homescu
,
Michael Stewart
,
Per Larsen
,
Stefan Brunthaler
,
Michael Franz
,
University of California Irvine
|
WAFFle: Fingerprinting Filter Rules of Web Application Firewalls
|
Sebastian Schinzel
,
Isabell Schmitt
,
University of Erlangen-Nuremberg
|
Baseband Attacks: Remote Exploitation of Memory Corruptions in Cellular Protocol Stacks
|
Ralf-Philipp Weinmann
,
University of Luxembourg
|
SMT Solvers in Software Security
|
Sean Heelan
,
Julien Vanegue
,
Rolf Rolles
,
Microsoft Security Science
,
Immunity Inc.
|
The Future of HTTPS
|
Nicolas Lidzborski
,
Sid Stamm
,
Mozilla
,
Google Inc.
|
Read It Twice! A Mass-Storage-Based TOCTTOU Attack
|
Collin Mulliner
,
Benjamin Michéle
,
Technische Universität Berlin
,
Telekom Innovation Laboratories
|
Under New Management: Practical Attacks on SNMPv3
|
Nigel Lawrence
,
Patrick Traynor, Georgia Institute of Technology
|
Defcon Behind the Scene
|
Jeff Moss
,
Black Hat
|
Off-Path Attacking the Web
|
Yossi Gilad
,
Amir Herzberg
,
Bar Ilan University
|
Security Analysis of Smartphone Point-of-Sale Systems
|
WesLee Frisby
,
Benjamin Moench
,
Benjamin Recht
,
Thomas Ristenpart
,
University of Wisconsin-Madison
|
Web-based Attacks on Host-Proof Encrypted Storage
|
Antoine Delignat-Lavaud
,
Karthikeyan Bhargavan
,
INRIA
,
ENS Cachan
|
Frankenstein: Stitching Malware from Benign Binaries
|
Vishwath Mohan
,
Kevin W. Hamlen
,
University of Texas at Dallas
|