Star 0

Talks

Title Humans
Physical Adversarial Examples for Object Detectors
Sensorless, Permissionless Information Exfiltration with Wi-Fi Micro-Jamming Kfir Zvi , Omer Shvartz , Rom Ogen , Yossi Oren , Ben-Gurion University of the Negev
SoK: Make JIT-Spray Great Again Thorsten Holz , Robert Gawlik , Ruhr-Universität Bochum
NEMESYS: Network Message Syntax Reverse Engineering by Analysis of the Intrinsic Structure of Individual Messages Henning Kopp , Frank Kargl , Stephan Kleber , Institute of Distributed Systems, Ulm University
Fishy Faces: Crafting Adversarial Images to Poison Face Authentication Davy Preuveneers , Tim Van hamme , Vera Rimmer , Giuseppe Garofalo , Wouter Joosen , imec-DistriNet, KU Leuven
Rode0day Andrew Fasano , MIT Lincoln Laboratory
Swipe Your Fingerprints! How Biometric Authentication Simplifies Payment, Access and Identity Fraud Starbug , Julian Fietkau , Jean-Pierre Seifert , Technische Universität Berlin
A Feasibility Study of Radio-frequency Retroreflector Attack Yu-ichi Hayashi , Masahiro Kinugawa , Shigeki Goto , Seita Maruyama , Satohiro Wakabayashi , Tatsuya Mori , Nara Institute of Science and Technology , National Institute of Technology , Sendai College , Waseda University
Spectre Returns! Speculation Attacks using the Return Stack Buffer Nael Abu-Ghazaleh , Khaled N. Khasawneh , Esmaeil Mohammadian Koruyeh , Chengyu Song , University of California, Riverside
Optimizing Recurrent Pulsing Attacks using Application-Layer Amplification of Open DNS Resolvers Jonas Bushart , Saarland University , CISPA
Browser history re:visited Deian Stefan , Fraser Brown , Shravan Narayan , Craig Disselkoen , Michael Smith , UC San Diego , Stanford University
You Snooze, You Lose: Measuring PLC Cycle Times under Attacks Alexander von Bodisco , Dominik Merli , Florian Fischer , Hochschule Augsburg , Matthias Niedermaier , Volker Roth , Jan-Ole Malchow , Daniel Marzin , Freie Universität Berlin
Symbolic Execution of Security Protocol Implementations: Handling Cryptographic Primitives Mathy Vanhoef , Frank Piessens , imec-DistriNet, KU Leuven
Bitter Harvest: Systematically Fingerprinting Low- and Medium-interaction Honeypots at Internet Scale Richard Clayton , Alexander Vetterl , University of Cambridge
Security Analysis of eIDAS – The Cross-Country Authentication Scheme in Europe Nurullah Erinola , David Herring , Nils Engelbertz , Vladislav Mladenov , Jörg Schwenk , Juraj Somorovsky , Ruhr University Bochum
Tools for Active and Passive Network Side-Channel Detection for Web Applications Qusay Mahmoud , Michael Lescisin , University of Ontario Institute of Technology
Mutually Assured Destruction and the Impending AI Apocalypse David Evans, University of Virginia David Evans , University of Virginia
Hitag 2 Hell – Brutally Optimizing Guess-and-Determine Attacks Wouter Bokslag , Aram Verstegen , Roel Verdult , FactorIT B.V.
A Modern History of Offensive Security Research Dino Dai Zovi Dino Dai Zovi
Universal Radio Hacker: A Suite for Analyzing and Attacking Stateful Wireless Protocols Andreas Noack , Johannes Pohl , University of Applied Sciences Stralsund