default search action
20th USENIX Security Symposium 2011: San Francisco, California, USA - WOOT
- David Brumley, Michal Zalewski:
5th USENIX Workshop on Offensive Technologies, WOOT'11, August 8, 2011, San Francisco, CA, USA, Proceedings. USENIX Association 2011
Attacks on Networks and Networking Equipment
- Andrew Buhr, Dale Lindskog, Pavol Zavarsky, Ron Ruhl:
Media Access Control Address Spoofing Attacks against Port Security. 1-8 - Yossi Gilad, Amir Herzberg:
Fragmentation Considered Vulnerable: Blindly Intercepting and Discarding Fragments. 9-18 - Ang Cui, Jatin Kataria, Salvatore J. Stolfo:
Killing the Myth of Cisco IOS Diversity: Recent Advances in Reliable Shellcode Design. 19-27 - Theodore Reed, Joseph Geis, Sven Dietrich:
SkyNET: A 3G-Enabled Mobile Attack Drone and Stealth Botmaster. 28-36
Crossing into the Real World: Beyond IP-based Attacks
- Ludovico Cavedon, Luca Foschini, Giovanni Vigna:
Getting the Face Behind the Squares: Reconstructing Pixelized Video Streams. 37-45 - Keaton Mowery, Sarah Meiklejohn, Stefan Savage:
Heat of the Moment: Characterizing the Efficacy of Thermal Camera-Based Attacks. 46-53 - Travis Goodspeed, Sergey Bratus, Ricky Melgares, Rebecca Shapiro, Ryan Speers:
Packets in Packets: Orson Welles' In-Band Signaling Attacks for Modern Radios. 54-61
Targeting the Cloud and Commodity Computing Devices
- Zhenyu Wu, Mengjun Xie, Haining Wang:
Energy Attack on Server Systems. 62-70 - Chris Kanich, Stephen Checkoway, Keaton Mowery:
Putting Out a HIT: Crowdsourcing Malware Installs. 71-80 - Timothy Vidas, Daniel Votipka, Nicolas Christin:
All Your Droid Are Belong to Us: A Survey of Current Android Attacks. 81-90 - James Oakley, Sergey Bratus:
Exploiting the Hard-Working DWARF: Trojan and Exploit Techniques with No Native Executable Code. 91-102
Advances in Low-Level Exploitation
- Gene Novark, Emery D. Berger:
DieHarder: Securing the Heap. 103-117 - Fabian Yamaguchi, Felix "FX" Lindner, Konrad Rieck:
Vulnerability Extrapolation: Assisted Discovery of Vulnerabilities Using Machine Learning. 118-127 - Flavio D. Garcia, Gerhard de Koning Gans, Roel Verdult:
Exposing iClass Key Diversification. 128-136
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.