Star 0
Month Quarter Year
#N/A #N/A #N/A
Title Event
Symbolic Execution of Security Protocol Implementations: Handling Cryptographic Primitives WOOT '18
Fishy Faces: Crafting Adversarial Images to Poison Face Authentication WOOT '18
Key Reinstallation Attacks: Breaking the WPA2 Protocol Black Hat Europe 2017