![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
9th WOOT 2015: Washington, DC, USA
- Aurélien Francillon, Thomas Ptacek:
9th USENIX Workshop on Offensive Technologies, WOOT '15, Washington, DC, USA, August 10-11, 2015. USENIX Association 2015 - Ben Burgess, Eric Wustrow, J. Alex Halderman:
Replication Prohibited: Attacking Restricted Keyways with 3D-Printing. - Sean Palka, Damon McCoy:
Fuzzing E-mail Filters with Generative Grammars and N-Gram Analysis. - Tavish Vaidya, Yuankai Zhang, Micah Sherr, Clay Shields:
Cocaine Noodles: Exploiting the Gap between Human and Machine Speech Recognition. - Ian D. Foster
, Andrew Prudhomme, Karl Koscher, Stefan Savage:
Fast and Vulnerable: A Story of Telematic Failures. - Michael Rushanan, Stephen Checkoway:
Run-DMA. - Antonio Barresi, Kaveh Razavi, Mathias Payer, Thomas R. Gross:
CAIN: Silently Breaking ASLR in the Cloud. - Gary Wang, Zachary John Estrada, Cuong Manh Pham, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer:
Hypervisor Introspection: A Technique for Evading Passive Virtual Machine Monitoring. - Dennis Kupser, Christian Mainka
, Jörg Schwenk, Juraj Somorovsky:
How to Break XML Encryption - Automatically. - Eduardo Novella Lorente, Carlo Meijer, Roel Verdult:
Scrutinizing WPA2 Password Generating Algorithms in Wireless Routers. - Yin Minn Pa Pa, Shogo Suzuki, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, Christian Rossow:
IoTPOT: Analysing the Rise of IoT Compromises. - Oleksandr Bazhaniuk, John Loucaides, Lee Rosenbaum, Mark R. Tuttle, Vincent Zimmer
:
Symbolic Execution for BIOS Security. - Karl Koscher, Tadayoshi Kohno, David Molnar:
SURROGATES: Enabling Near-Real-Time Dynamic Analyses of Embedded Systems. - Takuya Watanabe, Mitsuaki Akiyama, Tatsuya Mori:
RouteDetector: Sensor-based Positioning System That Exploits Spatio-Temporal Regularity of Human Mobility. - Or Peles, Roee Hay:
One Class to Rule Them All: 0-Day Deserialization Vulnerabilities in Android. - Wen Xu, Yubin Fu:
Own Your Android! Yet Another Universal Root. - Giancarlo Pellegrino, Christian Rossow, Fabrice J. Ryba, Thomas C. Schmidt, Matthias Wählisch:
Cashing Out the Great Cannon? On Browser-Based DDoS Attacks and Economics. - Florian Adamsky, Syed Ali Khayam, Rudolf Jäger, Muttukrishnan Rajarajan:
P2P File-Sharing in Hell: Exploiting BitTorrent Vulnerabilities to Launch Distributed Reflective DoS Attacks. - Clemens Hlauschek, Markus Gruber, Florian Fankhauser, Christian Schanes:
Prying Open Pandora's Box: KCI Attacks against TLS. - Benjamin Beurdouche, Antoine Delignat-Lavaud, Nadim Kobeissi, Alfredo Pironti, Karthikeyan Bhargavan:
FLEXTLS: A Tool for Testing TLS Implementations.
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.