Physical Adversarial Examples for Object Detectors
|
|
Sensorless, Permissionless Information Exfiltration with Wi-Fi Micro-Jamming
|
Kfir Zvi
,
Omer Shvartz
,
Rom Ogen
,
Yossi Oren
,
Ben-Gurion University of the Negev
|
SoK: Make JIT-Spray Great Again
|
Thorsten Holz
,
Robert Gawlik
,
Ruhr-Universität Bochum
|
NEMESYS: Network Message Syntax Reverse Engineering by Analysis of the Intrinsic Structure of Individual Messages
|
Henning Kopp
,
Frank Kargl
,
Stephan Kleber
,
Institute of Distributed Systems, Ulm University
|
Fishy Faces: Crafting Adversarial Images to Poison Face Authentication
|
Davy Preuveneers
,
Tim Van hamme
,
Vera Rimmer
,
Giuseppe Garofalo
,
Wouter Joosen
,
imec-DistriNet, KU Leuven
|
Rode0day
|
Andrew Fasano
,
MIT Lincoln Laboratory
|
Swipe Your Fingerprints! How Biometric Authentication Simplifies Payment, Access and Identity Fraud
|
Starbug
,
Julian Fietkau
,
Jean-Pierre Seifert
,
Technische Universität Berlin
|
A Feasibility Study of Radio-frequency Retroreflector Attack
|
Yu-ichi Hayashi
,
Masahiro Kinugawa
,
Shigeki Goto
,
Seita Maruyama
,
Satohiro Wakabayashi
,
Tatsuya Mori
,
Nara Institute of Science and Technology
,
National Institute of Technology
,
Sendai College
,
Waseda University
|
Spectre Returns! Speculation Attacks using the Return Stack Buffer
|
Nael Abu-Ghazaleh
,
Khaled N. Khasawneh
,
Esmaeil Mohammadian Koruyeh
,
Chengyu Song
,
University of California, Riverside
|
Optimizing Recurrent Pulsing Attacks using Application-Layer Amplification of Open DNS Resolvers
|
Jonas Bushart
,
Saarland University
,
CISPA
|
Browser history re:visited
|
Deian Stefan
,
Fraser Brown
,
Shravan Narayan
,
Craig Disselkoen
,
Michael Smith
,
UC San Diego
,
Stanford University
|
You Snooze, You Lose: Measuring PLC Cycle Times under Attacks
|
Alexander von Bodisco
,
Dominik Merli
,
Florian Fischer
,
Hochschule Augsburg
,
Matthias Niedermaier
,
Volker Roth
,
Jan-Ole Malchow
,
Daniel Marzin
,
Freie Universität Berlin
|
Symbolic Execution of Security Protocol Implementations: Handling Cryptographic Primitives
|
Mathy Vanhoef
,
Frank Piessens
,
imec-DistriNet, KU Leuven
|
Bitter Harvest: Systematically Fingerprinting Low- and Medium-interaction Honeypots at Internet Scale
|
Richard Clayton
,
Alexander Vetterl
,
University of Cambridge
|
Security Analysis of eIDAS – The Cross-Country Authentication Scheme in Europe
|
Nurullah Erinola
,
David Herring
,
Nils Engelbertz
,
Vladislav Mladenov
,
Jörg Schwenk
,
Juraj Somorovsky
,
Ruhr University Bochum
|
Tools for Active and Passive Network Side-Channel Detection for Web Applications
|
Qusay Mahmoud
,
Michael Lescisin
,
University of Ontario Institute of Technology
|
Mutually Assured Destruction and the Impending AI Apocalypse David Evans, University of Virginia
|
David Evans
,
University of Virginia
|
Hitag 2 Hell – Brutally Optimizing Guess-and-Determine Attacks
|
Wouter Bokslag
,
Aram Verstegen
,
Roel Verdult
,
FactorIT B.V.
|
A Modern History of Offensive Security Research Dino Dai Zovi
|
Dino Dai Zovi
|
Universal Radio Hacker: A Suite for Analyzing and Attacking Stateful Wireless Protocols
|
Andreas Noack
,
Johannes Pohl
,
University of Applied Sciences Stralsund
|