Star 0
Month Quarter Year
#N/A #N/A #N/A
Title Event
You may have paid more than you imagine—Replay Attacks on Ethereum Smart Contracts DEF CON 26
Your Peripheral Has Planted Malware—An Exploit of NXP SOCs Vulnerability DEF CON 26
Impersonate a 4G user through LTE IRAT handover vulnerabilities 2018 SyScan360 Singapore
'Ghost Telephonist' Impersonates You Through LTE CSFB DEF CON 25
DC to DEF CON: Q&A; with Congressmen James Langevin and Will Hurd DEF CON 25
'Ghost Telephonist' Link Hijack Exploitations in 4G LTE CS Fallback Black Hat USA 2017
Time is On My Side: Forging a Wireless Time Signal to Attack NTP Servers HITBSecConf2016 – Amsterdam
Build a free cellular traffic capture tool with a vxworks based femoto DEF CON 23