Adversarial Example Defense: Ensembles of Weak Defenses are not Strong
|
Nicholas Carlini
,
Xinyun Chen
,
James Wei
,
Dawn Song
,
Warren He
,
UC Berkeley
|
fastboot oem vuln: Android Bootloader Vulnerabilities in Vendor Customizations
|
Roee Hay
,
HCL Technologies
,
Aleph Research
|
Software Grand Exposure: SGX Cache Attacks Are Practical
|
Srdjan Capkun
,
Kari Kostiainen
,
Alexandra Dmitrienko
,
Urs Müller
,
Ferdinand Brasser
,
Ahmad-Reza Sadeghi
,
ETH Zurich
,
Technische Universität Darmstadt
|
AutoCTF: Creating Diverse Pwnables via Automated Bug Injection
|
Tim Leek
,
Aaron Sedlacek
,
Cody Gallagher
,
Rahul Sridhar
,
Patrick Hulin
,
Andrew Fasano
,
Brendan Dolan-Gavitt
,
Andy Davis
,
MIT Lincoln Laboratory
,
MIT
,
New York University
|
Leveraging Flawed Tutorials for Seeding Large-Scale Web Vulnerability Discovery
|
Fabian Yamaguchi
,
Konrad Rieck
,
Malte Skoruppa
,
Tommi Unruh
,
Jean-Pierre Seifert
,
Federico Maggi
,
Bhargava Shastry
,
TU Braunschweig
,
FTR, Trend Micro Inc.
,
Saarland University
,
TU Berlin
|
dr0wned – Cyber-Physical Attack with Additive Manufacturing
|
Yuval Elovici
,
Jacob Gatlin
,
Jinghui Toh
,
Mark Yampolskiy
,
Sofia Belikovetsky
,
Singapore University of Technology and Design
,
University of South Alabama
,
Ben-Gurion University of the Negev
|
From random block corruption to privilege escalation: A filesystem attack vector for rowhammer-like attacks
|
Thomas Parnell
,
Nikolaos Papandreou
,
Nikolas Ioannou
,
Anil Kurmus
,
Matthias Neugschwandtner
,
IBM Research Zurich
|
Automated PCB Reverse Engineering
|
Frank Kargl
,
Henrik Ferdinand Nölscher
,
Stephan Kleber
,
Institute of Distributed Systems, Ulm University
|
POTUS: Probing Off-The-Shelf USB Drivers with Symbolic Fault Injection
|
James Patrick-Evans
,
Royal Holloway
,
Johannes Kinder
,
Lorenzo Cavallaro
,
University of London
|
SPEAKE(a)R: Turn Speakers to Microphones for Fun and Profit
|
Andrey Daidakulov
,
Yosef Solewicz
,
Yuval Elovici
,
Mordechai Guri
,
Ben-Gurion University of the Negev, Israel
|
unCaptcha: A Low-Resource Defeat of reCaptcha's Audio Challenge
|
George Hughey
,
Daven Patel
,
Kevin Bock
,
Dave Levin
,
University of Maryland
|
Breaking (and Fixing) a Widely Used Continuous Glucose Monitoring System
|
David Oswald
,
Luca Reverberi
,
School of Computer Science, University of Birmingham, UK
|
BADFET: Defeating Modern Secure Boot Using Second-Order Pulsed Electromagnetic Fault Injection
|
Rick Housley
,
Ang Cui
,
Red Balloon Security
|
Static Exploration of Taint-Style Vulnerabilities Found by Fuzzing
|
Fabian Yamaguchi
,
Konrad Rieck
,
Jean-Pierre Seifert
,
Federico Maggi
,
Bhargava Shastry
,
Technische Universität Braunschweig
,
Technische Universität Berlin
,
Trend Micro, Inc.
|
White-Stingray: Evaluating IMSI Catchers Detection Applications
|
Jean-Pierre Seifert
,
Andrew Martin
,
Shinjo Park
,
Ravishankar Borgaonkar
,
Altaf Shaik
,
University of Oxford
|
Stalling Live Migrations on the Cloud
|
Thomas F. La Porta
,
Srikanth V. Krishnamurthy
,
Karim Khalil
,
Ahmed Atya
,
Zhiyun Qian
,
Azeem Aqil
,
The Pennsylvania State University
,
University of California, Riverside
|
Exploitations of Uninitialized Uses on macOS Sierra
|
Gongshen Liu
,
Zhenquan Xu
,
Hao Xu
,
Tielei Wang
,
PWNZEN InfoTech Co., LTD
,
Shanghai Jiao Tong University
|
Breaking and Fixing Gridcoin
|
Tobias Niemann
,
Martin Grothe
,
Jörg Schwenk
,
Juraj Somorovsky
,
Ruhr-University Bochum
|
Shedding too much Light on a Microcontroller's Firmware Protection
|
Stefan Tatschner
,
Johannes Obermaier
,
Fraunhofer Institute AISEC
|
One Side-Channel to Bring Them All and in the Darkness Bind Them: Associating Isolated Browsing Sessions
|
Wouter Joosen
,
Tom Van Goethem
,
imec-DistriNet - KULeuven
|
Shattered Trust: When Replacement Smartphone Components Attack
|
Yossi Oren
,
Omer Shwartz
,
Asaf Shabtai
,
Amir Cohen
,
Ben Gurion University
|
Good tools gone bad: Are we on a slippery slope to communications chaos? Chester Wisniewski, Sophos
|
Chester Wisniewski
,
Sophos
|
One Car, Two Frames: Attacks on Hitag-2 Remote Keyless Entry Systems Revisited
|
Chaouki Kasmi
,
José Lopes-Esteves
,
Mathieu Renard
,
Ryad Benadjila
,
French Network and Information Security Agency - ANSSI
,
Thales C&S
|