Symbolic Execution of Security Protocol Implementations: Handling Cryptographic Primitives |
WOOT '18
|
Fishy Faces: Crafting Adversarial Images to Poison Face Authentication |
WOOT '18
|
Key Reinstallation Attacks: Breaking the WPA2 Protocol |
Black Hat Europe 2017
|