Breaking LTE on Layer Two |
40th IEEE Symposium on Security and Privacy
|
Reasoning Analytically About Password-Cracking Software |
40th IEEE Symposium on Security and Privacy
|
On the Security of the PKCS#1 v1.5 Signature Scheme |
ACM CCS 2018
|
On the Accuracy of Password Strength Meters |
ACM CCS 2018
|
“What was that site doing with my Facebook password?”, Designing Password-Reuse Notifications |
ACM CCS 2018
|
From Assembly to JavaScript and Back: Turning Memory Errors into Code Execution with Client-Side Compilers |
HITB GSEC 2018 – Singapore
|
Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks |
39th IEEE Symposium on Security and Privacy
|
Breaking and Fixing Gridcoin |
WOOT '17
|
Cross-Architecture Bug Search in Binary Executables |
36th IEEE Symposium on Security and Privacy
|
Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS Attacks |
WOOT '14
|