default search action
13th WOOT @ USENIX Security Symposium 2019: Santa Clara, CA, USA
- Alex Gantman, Clémentine Maurice:
13th USENIX Workshop on Offensive Technologies, WOOT 2019, Santa Clara, CA, USA, August 12-13, 2019. USENIX Association 2019
Going Sideways
- Marc Schink, Johannes Obermaier:
Taking a Look into Execute-Only Memory. - Adar Ovadya, Rom Ogen, Yakov Mallah, Niv Gilboa, Yossi Oren:
Cross-Router Covert Channels. - Andrea Mambretti, Alexandra Sandulescu, Matthias Neugschwandtner, Alessandro Sorniotti, Anil Kurmus:
Two methods for exploiting speculative control flow hijacks. - Dixit Kumar, Chavhan Sujeet Yashavant, Biswabandan Panda, Vishal Gupta:
How Sharp is SHARP ?
Breaking and Entering
- Jatin Kataria, Rick Housley, Joseph Pantoga, Ang Cui:
Defeating Cisco Trust Anchor: A Case-Study of Recent Advancements in Direct FPGA Bitstream Manipulation. - Hadrien Barral, Rémi Géraud-Stewart, Georges-Axel Jaloyan, David Naccache:
RISC-V: #AlphanumericShellcoding. - Fabian Ullrich, Jiska Classen, Johannes Eger, Matthias Hollick:
Vacuums in the Cloud: Analyzing Security in a Hardened IoT Ecosystem. - Dominik Christian Maier, Benedikt Radtke, Bastian Harren:
Unicorefuzz: On the Viability of Emulation for Kernelspace Fuzzing.
Town Called Malice
- David Fifield:
A better zip bomb. - Jithin Pavithran, Milan Patnaik, Chester Rebeiro:
D-TIME: Distributed Threadless Independent Malware Execution for Runtime Obfuscation. - Hanqing Zhao, Yanyu Zhang, Kun Yang, Taesoo Kim:
Breaking Turtles All the Way Down: An Exploitation Chain to Break out of VMware ESXi. - Trishita Tiwari, Ari Trachtenberg:
Alternative (ab)uses for HTTP Alternative Services.
Crypto Means...
- Sangsup Lee, Daejun Kim, Dongkwan Kim, Sooel Son, Yongdae Kim:
Who Spent My EOS? On the (In)Security of Resource Management of EOS.IO. - Branimir Pervan, Josip Knezovic, Katja Pericin:
Distributed Password Hash Computation on Commodity Heterogeneous Programmable Platforms.
Let's Get Physical
- Colin O'Flynn:
MIN()imum Failure: EMFI Attacks against USB Stacks. - Johannes Pohl, Andreas Noack:
Automatic Wireless Protocol Reverse Engineering.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.