Automated Detection of Vulnerabilities in Black-Box Routers (and Other Network Devices) |
Black Hat USA 2017
|
TCP Injection Attacks in the Wild - A Large Scale Study |
Black Hat USA 2016
|
Gyrophone: Eavesdropping Using a Gyroscope |
Black Hat Europe 2014
|
Subverting BIND's SRTT Algorithm Derandomizing NS Selection |
WOOT '13
|