Star 0

Talks

Title Humans
Adversarial Example Defense: Ensembles of Weak Defenses are not Strong Nicholas Carlini , Xinyun Chen , James Wei , Dawn Song , Warren He , UC Berkeley
fastboot oem vuln: Android Bootloader Vulnerabilities in Vendor Customizations Roee Hay , HCL Technologies , Aleph Research
Software Grand Exposure: SGX Cache Attacks Are Practical Srdjan Capkun , Kari Kostiainen , Alexandra Dmitrienko , Urs Müller , Ferdinand Brasser , Ahmad-Reza Sadeghi , ETH Zurich , Technische Universität Darmstadt
AutoCTF: Creating Diverse Pwnables via Automated Bug Injection Tim Leek , Aaron Sedlacek , Cody Gallagher , Rahul Sridhar , Patrick Hulin , Andrew Fasano , Brendan Dolan-Gavitt , Andy Davis , MIT Lincoln Laboratory , MIT , New York University
Leveraging Flawed Tutorials for Seeding Large-Scale Web Vulnerability Discovery Fabian Yamaguchi , Konrad Rieck , Malte Skoruppa , Tommi Unruh , Jean-Pierre Seifert , Federico Maggi , Bhargava Shastry , TU Braunschweig , FTR, Trend Micro Inc. , Saarland University , TU Berlin
dr0wned – Cyber-Physical Attack with Additive Manufacturing Yuval Elovici , Jacob Gatlin , Jinghui Toh , Mark Yampolskiy , Sofia Belikovetsky , Singapore University of Technology and Design , University of South Alabama , Ben-Gurion University of the Negev
From random block corruption to privilege escalation: A filesystem attack vector for rowhammer-like attacks Thomas Parnell , Nikolaos Papandreou , Nikolas Ioannou , Anil Kurmus , Matthias Neugschwandtner , IBM Research Zurich
Automated PCB Reverse Engineering Frank Kargl , Henrik Ferdinand Nölscher , Stephan Kleber , Institute of Distributed Systems, Ulm University
POTUS: Probing Off-The-Shelf USB Drivers with Symbolic Fault Injection James Patrick-Evans , Royal Holloway , Johannes Kinder , Lorenzo Cavallaro , University of London
SPEAKE(a)R: Turn Speakers to Microphones for Fun and Profit Andrey Daidakulov , Yosef Solewicz , Yuval Elovici , Mordechai Guri , Ben-Gurion University of the Negev, Israel
unCaptcha: A Low-Resource Defeat of reCaptcha's Audio Challenge George Hughey , Daven Patel , Kevin Bock , Dave Levin , University of Maryland
Breaking (and Fixing) a Widely Used Continuous Glucose Monitoring System David Oswald , Luca Reverberi , School of Computer Science, University of Birmingham, UK
BADFET: Defeating Modern Secure Boot Using Second-Order Pulsed Electromagnetic Fault Injection Rick Housley , Ang Cui , Red Balloon Security
Static Exploration of Taint-Style Vulnerabilities Found by Fuzzing Fabian Yamaguchi , Konrad Rieck , Jean-Pierre Seifert , Federico Maggi , Bhargava Shastry , Technische Universität Braunschweig , Technische Universität Berlin , Trend Micro, Inc.
White-Stingray: Evaluating IMSI Catchers Detection Applications Jean-Pierre Seifert , Andrew Martin , Shinjo Park , Ravishankar Borgaonkar , Altaf Shaik , University of Oxford
Stalling Live Migrations on the Cloud Thomas F. La Porta , Srikanth V. Krishnamurthy , Karim Khalil , Ahmed Atya , Zhiyun Qian , Azeem Aqil , The Pennsylvania State University , University of California, Riverside
Exploitations of Uninitialized Uses on macOS Sierra Gongshen Liu , Zhenquan Xu , Hao Xu , Tielei Wang , PWNZEN InfoTech Co., LTD , Shanghai Jiao Tong University
Breaking and Fixing Gridcoin Tobias Niemann , Martin Grothe , Jörg Schwenk , Juraj Somorovsky , Ruhr-University Bochum
Shedding too much Light on a Microcontroller's Firmware Protection Stefan Tatschner , Johannes Obermaier , Fraunhofer Institute AISEC
One Side-Channel to Bring Them All and in the Darkness Bind Them: Associating Isolated Browsing Sessions Wouter Joosen , Tom Van Goethem , imec-DistriNet - KULeuven
Shattered Trust: When Replacement Smartphone Components Attack Yossi Oren , Omer Shwartz , Asaf Shabtai , Amir Cohen , Ben Gurion University
Good tools gone bad: Are we on a slippery slope to communications chaos? Chester Wisniewski, Sophos Chester Wisniewski , Sophos
One Car, Two Frames: Attacks on Hitag-2 Remote Keyless Entry Systems Revisited Chaouki Kasmi , José Lopes-Esteves , Mathieu Renard , Ryad Benadjila , French Network and Information Security Agency - ANSSI , Thales C&S