Rooting Routers Using Symbolic Execution |
HITBSecConf2018 – Dubai
|
Release the Kraken: New KRACKs in the 802.11 Standard |
ACM CCS 2018
|
Symbolic Execution of Security Protocol Implementations: Handling Cryptographic Primitives |
WOOT '18
|
Key Reinstallation Attacks: Breaking the WPA2 Protocol |
Black Hat Europe 2017
|
Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2★ |
ACM CCS 2017
|
WiFuzz: Detecting and Exploiting Logical Flaws in the Wi-Fi Cryptographic Handshake |
Black Hat USA 2017
|
HEIST: HTTP Encrypted Information can be Stolen Through TCP-Windows |
Black Hat USA 2016
|