The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "WOOT"( http://dblp.L3S.de/Venues/WOOT )

URL (DBLP): http://dblp.uni-trier.de/db/conf/uss

Publication years (Num. hits)
2007-2008 (19) 2009-2010 (20) 2011 (15) 2012-2013 (27) 2014 (18) 2015 (20) 2016 (22) 2017 (22)
Publication types (Num. hits)
inproceedings(153) proceedings(10)
Venues (Conferences, Journals, ...)
WOOT(163)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 163 publication records. Showing 163 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Ryad Benadjila, Mathieu Renard, José Lopes-Esteves, Chaouki Kasmi One Car, Two Frames: Attacks on Hitag-2 Remote Keyless Entry Systems Revisited. Search on Bibsonomy WOOT The full citation details ... 2017 DBLP  BibTeX  RDF
1Warren He, James Wei, Xinyun Chen, Nicholas Carlini, Dawn Song Adversarial Example Defense: Ensembles of Weak Defenses are not Strong. Search on Bibsonomy WOOT The full citation details ... 2017 DBLP  BibTeX  RDF
1Zhenquan Xu, Gongshen Liu, Tielei Wang, Hao Xu Exploitations of Uninitialized Uses on macOS Sierra. Search on Bibsonomy WOOT The full citation details ... 2017 DBLP  BibTeX  RDF
1Bhargava Shastry, Federico Maggi, Fabian Yamaguchi, Konrad Rieck, Jean-Pierre Seifert Static Exploration of Taint-Style Vulnerabilities Found by Fuzzing. Search on Bibsonomy WOOT The full citation details ... 2017 DBLP  BibTeX  RDF
1Ferdinand Brasser, Urs Müller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, Ahmad-Reza Sadeghi Software Grand Exposure: SGX Cache Attacks Are Practical. Search on Bibsonomy WOOT The full citation details ... 2017 DBLP  BibTeX  RDF
1Tommi Unruh, Bhargava Shastry, Malte Skoruppa, Federico Maggi, Konrad Rieck, Jean-Pierre Seifert, Fabian Yamaguchi Leveraging Flawed Tutorials for Seeding Large-Scale Web Vulnerability Discovery. Search on Bibsonomy WOOT The full citation details ... 2017 DBLP  BibTeX  RDF
1Johannes Obermaier, Stefan Tatschner Shedding too much Light on a Microcontroller's Firmware Protection. Search on Bibsonomy WOOT The full citation details ... 2017 DBLP  BibTeX  RDF
1Stephan Kleber, Henrik Ferdinand Nölscher, Frank Kargl Automated PCB Reverse Engineering. Search on Bibsonomy WOOT The full citation details ... 2017 DBLP  BibTeX  RDF
1Luca Reverberi, David F. Oswald Breaking (and Fixing) a Widely Used Continuous Glucose Monitoring System. Search on Bibsonomy WOOT The full citation details ... 2017 DBLP  BibTeX  RDF
1Patrick Hulin, Andy Davis, Rahul Sridhar, Andrew Fasano, Cody Gallagher, Aaron Sedlacek, Tim Leek, Brendan Dolan-Gavitt AutoCTF: Creating Diverse Pwnables via Automated Bug Injection. Search on Bibsonomy WOOT The full citation details ... 2017 DBLP  BibTeX  RDF
1Martin Grothe, Tobias Niemann, Juraj Somorovsky, Jörg Schwenk Breaking and Fixing Gridcoin. Search on Bibsonomy WOOT The full citation details ... 2017 DBLP  BibTeX  RDF
1Kevin Bock 0001, Daven Patel, George Hughey, Dave Levin unCaptcha: A Low-Resource Defeat of reCaptcha's Audio Challenge. Search on Bibsonomy WOOT The full citation details ... 2017 DBLP  BibTeX  RDF
1Anil Kurmus, Nikolas Ioannou, Nikolaos Papandreou, Thomas P. Parnell From random block corruption to privilege escalation: A filesystem attack vector for rowhammer-like attacks. Search on Bibsonomy WOOT The full citation details ... 2017 DBLP  BibTeX  RDF
1James Patrick-Evans, Lorenzo Cavallaro, Johannes Kinder POTUS: Probing Off-The-Shelf USB Drivers with Symbolic Fault Injection. Search on Bibsonomy WOOT The full citation details ... 2017 DBLP  BibTeX  RDF
1Tom van Goethem, Wouter Joosen One Side-Channel to Bring Them All and in the Darkness Bind Them: Associating Isolated Browsing Sessions. Search on Bibsonomy WOOT The full citation details ... 2017 DBLP  BibTeX  RDF
1Sofia Belikovetsky, Mark Yampolskiy, Jinghui Toh, Jacob Gatlin, Yuval Elovici dr0wned - Cyber-Physical Attack with Additive Manufacturing. Search on Bibsonomy WOOT The full citation details ... 2017 DBLP  BibTeX  RDF
1Roee Hay fastboot oem vuln: Android Bootloader Vulnerabilities in Vendor Customizations. Search on Bibsonomy WOOT The full citation details ... 2017 DBLP  BibTeX  RDF
1Ahmed Atya, Azeem Aqil, Karim Khalil, Zhiyun Qian, Srikanth V. Krishnamurthy, Thomas F. La Porta Stalling Live Migrations on the Cloud. Search on Bibsonomy WOOT The full citation details ... 2017 DBLP  BibTeX  RDF
1Ang Cui, Rick Housley BADFET: Defeating Modern Secure Boot Using Second-Order Pulsed Electromagnetic Fault Injection. Search on Bibsonomy WOOT The full citation details ... 2017 DBLP  BibTeX  RDF
1Shinjo Park, Altaf Shaik, Ravishankar Borgaonkar, Andrew Martin 0002, Jean-Pierre Seifert White-Stingray: Evaluating IMSI Catchers Detection Applications. Search on Bibsonomy WOOT The full citation details ... 2017 DBLP  BibTeX  RDF
1Omer Shwartz, Amir Cohen, Asaf Shabtai, Yossi Oren Shattered Trust: When Replacement Smartphone Components Attack. Search on Bibsonomy WOOT The full citation details ... 2017 DBLP  BibTeX  RDF
1Mordechai Guri, Yosef A. Solewicz, Andrey Daidakulov, Yuval Elovici SPEAKE(a)R: Turn Speakers to Microphones for Fun and Profit. Search on Bibsonomy WOOT The full citation details ... 2017 DBLP  BibTeX  RDF
1Hocheol Shin, Yunmok Son, Young-Seok Park, Yujin Kwon, Yongdae Kim Sampling Race: Bypassing Timing-Based Analog Active Sensor Spoofing Detection on Analog-Digital Systems. Search on Bibsonomy WOOT The full citation details ... 2016 DBLP  BibTeX  RDF
1Martin Grothe, Christian Mainka, Paul Rösler, Jörg Schwenk How to Break Microsoft Rights Management Services. Search on Bibsonomy WOOT The full citation details ... 2016 DBLP  BibTeX  RDF
1Matt Spisak Hardware-Assisted Rootkits: Abusing Performance Counters on the ARM and x86 Architectures. Search on Bibsonomy WOOT The full citation details ... 2016 DBLP  BibTeX  RDF
1Frank Imeson, Saeed Nejati, Siddharth Garg, Mahesh V. Tripunitara Non-Deterministic Timers for Hardware Trojan Activation (or How a Little Randomness Can Go the Wrong Way). Search on Bibsonomy WOOT The full citation details ... 2016 DBLP  BibTeX  RDF
1David Rupprecht, Kai Jansen, Christina Pöpper Putting LTE Security Functions to the Test: A Framework to Evaluate Implementation Correctness. Search on Bibsonomy WOOT The full citation details ... 2016 DBLP  BibTeX  RDF
1Eric Wustrow, Benjamin VanderSloot DDoSCoin: Cryptocurrency with a Malicious Proof-of-Work. Search on Bibsonomy WOOT The full citation details ... 2016 DBLP  BibTeX  RDF
1Kyriakos K. Ispoglou, Mathias Payer malWASH: Washing Malware to Evade Dynamic Analysis. Search on Bibsonomy WOOT The full citation details ... 2016 DBLP  BibTeX  RDF
1Christopher Späth, Christian Mainka, Vladislav Mladenov, Jörg Schwenk SoK: XML Parser Vulnerabilities. Search on Bibsonomy WOOT The full citation details ... 2016 DBLP  BibTeX  RDF
1Alexander Bolshev, Jason Larsen, Marina Krotofil, Reid Wightman A Rising Tide: Design Exploits in Industrial Control Systems. Search on Bibsonomy WOOT The full citation details ... 2016 DBLP  BibTeX  RDF
1Drew Davidson, Hao Wu, Robert Jellinek, Vikas Singh, Thomas Ristenpart Controlling UAVs with Sensor Input Spoofing Attacks. Search on Bibsonomy WOOT The full citation details ... 2016 DBLP  BibTeX  RDF
1Sergey Bratus, Travis Goodspeed, Ange Albertini, Debanjum S. Solanky Fillory of PHY: Toward a Periodic Table of Signal Corruption Exploits and Polyglots in Digital Radio. Search on Bibsonomy WOOT The full citation details ... 2016 DBLP  BibTeX  RDF
1Hanno Böck, Aaron Zauner, Sean Devlin, Juraj Somorovsky, Philipp Jovanovic Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS. Search on Bibsonomy WOOT The full citation details ... 2016 DBLP  BibTeX  RDF
1Daeseon Choi, Younho Lee Eavesdropping One-Time Tokens Over Magnetic Secure Transmission in Samsung Pay. Search on Bibsonomy WOOT The full citation details ... 2016 DBLP  BibTeX  RDF
1Huangxin Wang, Zhonghua Xi, Fei Li 0001, Songqing Chen Abusing Public Third-Party Services for EDoS Attacks. Search on Bibsonomy WOOT The full citation details ... 2016 DBLP  BibTeX  RDF
1Jeremy Blackthorne, Alexei Bulazel, Andrew Fasano, Patrick Biernat, Bülent Yener AVLeak: Fingerprinting Antivirus Emulators through Black-Box Testing. Search on Bibsonomy WOOT The full citation details ... 2016 DBLP  BibTeX  RDF
1Benyamin Farshteindiker, Nir Hasidim, Asaf Grosz, Yossi Oren How to Phone Home with Someone Else's Phone: Information Exfiltration Using Intentional Sound Noise on Gyroscopic Sensors. Search on Bibsonomy WOOT The full citation details ... 2016 DBLP  BibTeX  RDF
1Andrew Ruddick, Jeff Yan Acceleration Attacks on PBKDF2: Or, What Is inside the Black-Box of oclHashcat? Search on Bibsonomy WOOT The full citation details ... 2016 DBLP  BibTeX  RDF
1Sahar Mazloom, Mohammad Rezaeirad, Aaron Hunter 0003, Damon McCoy A Security Analysis of an In-Vehicle Infotainment and App Platform. Search on Bibsonomy WOOT The full citation details ... 2016 DBLP  BibTeX  RDF
1Young-Seok Park, Yunmok Son, Hocheol Shin, Dohyun Kim 0004, Yongdae Kim This Ain't Your Dose: Sensor Spoofing Attack on Medical Infusion Pump. Search on Bibsonomy WOOT The full citation details ... 2016 DBLP  BibTeX  RDF
1Yelizaveta Burakova, Bill Hass, Leif Millar, André Weimerskirch Truck Hacking: An Experimental Analysis of the SAE J1939 Standard. Search on Bibsonomy WOOT The full citation details ... 2016 DBLP  BibTeX  RDF
1Natalie Silvanovich, Patrick Traynor (eds.) 10th USENIX Workshop on Offensive Technologies, WOOT 16, Austin, TX, USA, August 8-9, 2016. Search on Bibsonomy WOOT The full citation details ... 2016 DBLP  BibTeX  RDF
1Brendan Saltaformaggio, Hongjun Choi, Kristen Johnson, Yonghwi Kwon 0001, Qi Zhang, Xiangyu Zhang 0001, Dongyan Xu, John Qian Eavesdropping on Fine-Grained User Activities Within Smartphone Apps Over Encrypted Network Traffic. Search on Bibsonomy WOOT The full citation details ... 2016 DBLP  BibTeX  RDF
1Gary Wang, Zachary John Estrada, Cuong Manh Pham, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer Hypervisor Introspection: A Technique for Evading Passive Virtual Machine Monitoring. Search on Bibsonomy WOOT The full citation details ... 2015 DBLP  BibTeX  RDF
1Sean Palka, Damon McCoy Fuzzing E-mail Filters with Generative Grammars and N-Gram Analysis. Search on Bibsonomy WOOT The full citation details ... 2015 DBLP  BibTeX  RDF
1Wen Xu, Yubin Fu Own Your Android! Yet Another Universal Root. Search on Bibsonomy WOOT The full citation details ... 2015 DBLP  BibTeX  RDF
1Takuya Watanabe 0001, Mitsuaki Akiyama, Tatsuya Mori RouteDetector: Sensor-based Positioning System That Exploits Spatio-Temporal Regularity of Human Mobility. Search on Bibsonomy WOOT The full citation details ... 2015 DBLP  BibTeX  RDF
1Yin Minn Pa Pa, Shogo Suzuki, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, Christian Rossow IoTPOT: Analysing the Rise of IoT Compromises. Search on Bibsonomy WOOT The full citation details ... 2015 DBLP  BibTeX  RDF
1Giancarlo Pellegrino, Christian Rossow, Fabrice J. Ryba, Thomas C. Schmidt, Matthias Wählisch Cashing Out the Great Cannon? On Browser-Based DDoS Attacks and Economics. Search on Bibsonomy WOOT The full citation details ... 2015 DBLP  BibTeX  RDF
1Ian D. Foster, Andrew Prudhomme, Karl Koscher, Stefan Savage Fast and Vulnerable: A Story of Telematic Failures. Search on Bibsonomy WOOT The full citation details ... 2015 DBLP  BibTeX  RDF
1Or Peles, Roee Hay One Class to Rule Them All: 0-Day Deserialization Vulnerabilities in Android. Search on Bibsonomy WOOT The full citation details ... 2015 DBLP  BibTeX  RDF
1Antonio Barresi, Kaveh Razavi, Mathias Payer, Thomas R. Gross CAIN: Silently Breaking ASLR in the Cloud. Search on Bibsonomy WOOT The full citation details ... 2015 DBLP  BibTeX  RDF
1Tavish Vaidya, Yuankai Zhang 0001, Micah Sherr, Clay Shields Cocaine Noodles: Exploiting the Gap between Human and Machine Speech Recognition. Search on Bibsonomy WOOT The full citation details ... 2015 DBLP  BibTeX  RDF
1Aurélien Francillon, Thomas Ptacek (eds.) 9th USENIX Workshop on Offensive Technologies, WOOT '15, Washington, DC, USA, August 10-11, 2015. Search on Bibsonomy WOOT The full citation details ... 2015 DBLP  BibTeX  RDF
1Oleksandr Bazhaniuk, John Loucaides, Lee Rosenbaum, Mark R. Tuttle, Vincent Zimmer Symbolic Execution for BIOS Security. Search on Bibsonomy WOOT The full citation details ... 2015 DBLP  BibTeX  RDF
1Ben Burgess, Eric Wustrow, J. Alex Halderman Replication Prohibited: Attacking Restricted Keyways with 3D-Printing. Search on Bibsonomy WOOT The full citation details ... 2015 DBLP  BibTeX  RDF
1Michael Rushanan, Stephen Checkoway Run-DMA. Search on Bibsonomy WOOT The full citation details ... 2015 DBLP  BibTeX  RDF
1Clemens Hlauschek, Markus Gruber, Florian Fankhauser, Christian Schanes Prying Open Pandora's Box: KCI Attacks against TLS. Search on Bibsonomy WOOT The full citation details ... 2015 DBLP  BibTeX  RDF
1Dennis Kupser, Christian Mainka, Jörg Schwenk, Juraj Somorovsky How to Break XML Encryption - Automatically. Search on Bibsonomy WOOT The full citation details ... 2015 DBLP  BibTeX  RDF
1Eduardo Novella Lorente, Carlo Meijer, Roel Verdult Scrutinizing WPA2 Password Generating Algorithms in Wireless Routers. Search on Bibsonomy WOOT The full citation details ... 2015 DBLP  BibTeX  RDF
1Florian Adamsky, Syed Ali Khayam, Rudolf Jäger, Muttukrishnan Rajarajan P2P File-Sharing in Hell: Exploiting BitTorrent Vulnerabilities to Launch Distributed Reflective DoS Attacks. Search on Bibsonomy WOOT The full citation details ... 2015 DBLP  BibTeX  RDF
1Benjamin Beurdouche, Antoine Delignat-Lavaud, Nadim Kobeissi, Alfredo Pironti 0001, Karthikeyan Bhargavan FLEXTLS: A Tool for Testing TLS Implementations. Search on Bibsonomy WOOT The full citation details ... 2015 DBLP  BibTeX  RDF
1Karl Koscher, Tadayoshi Kohno, David Molnar SURROGATES: Enabling Near-Real-Time Dynamic Analyses of Embedded Systems. Search on Bibsonomy WOOT The full citation details ... 2015 DBLP  BibTeX  RDF
1Elie Bursztein, Jonathan Aigrain, Angelika Moscicki, John C. Mitchell The End is Nigh: Generic Solving of Text-based CAPTCHAs. Search on Bibsonomy WOOT The full citation details ... 2014 DBLP  BibTeX  RDF
1Marc Kührer, Thomas Hupperich, Christian Rossow, Thorsten Holz Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS Attacks. Search on Bibsonomy WOOT The full citation details ... 2014 DBLP  BibTeX  RDF
1Jacob Maskiewicz, Benjamin Ellis, James Mouradian, Hovav Shacham Mouse Trap: Exploiting Firmware Updates in USB Peripherals. Search on Bibsonomy WOOT The full citation details ... 2014 DBLP  BibTeX  RDF
1David Kaplan, Sagi Kedmi, Roee Hay, Avi Dayan Attacking the Linux PRNG On Android: Weaknesses in Seeding of Entropic Pools and Low Boot-Time Entropy. Search on Bibsonomy WOOT The full citation details ... 2014 DBLP  BibTeX  RDF
1Luke Deshotels Inaudible Sound as a Covert Channel in Mobile Devices. Search on Bibsonomy WOOT The full citation details ... 2014 DBLP  BibTeX  RDF
1Johanna Ullrich, Katharina Krombholz, Heidelinde Hobel, Adrian Dabrowski, Edgar R. Weippl IPv6 Security: Attacks and Countermeasures in a Nutshell. Search on Bibsonomy WOOT The full citation details ... 2014 DBLP  BibTeX  RDF
1Georg Chalupar, Stefan Peherstorfer, Erik Poll, Joeri de Ruiter Automated Reverse Engineering using Lego®. Search on Bibsonomy WOOT The full citation details ... 2014 DBLP  BibTeX  RDF
1Joe Grand Printed Circuit Board Deconstruction Techniques. Search on Bibsonomy WOOT The full citation details ... 2014 DBLP  BibTeX  RDF
1Rijnard van Tonder, Herman A. Engelbrecht Lowering the USB Fuzzing Barrier by Transparent Two-Way Emulation. Search on Bibsonomy WOOT The full citation details ... 2014 DBLP  BibTeX  RDF
1Luca Bruno, Mariano Graziano, Davide Balzarotti, Aurélien Francillon Through the Looking-Glass, and What Eve Found There. Search on Bibsonomy WOOT The full citation details ... 2014 DBLP  BibTeX  RDF
1Branden Ghena, William Beyer, Allen Hillaker, Jonathan Pevarnek, J. Alex Halderman Green Lights Forever: Analyzing the Security of Traffic Infrastructure. Search on Bibsonomy WOOT The full citation details ... 2014 DBLP  BibTeX  RDF
1Katja Malvoni, Solar Designer, Josip Knezovic Are Your Passwords Safe: Energy-Efficient Bcrypt Cracking with Low-Cost Parallel Hardware. Search on Bibsonomy WOOT The full citation details ... 2014 DBLP  BibTeX  RDF
1Tobias Fiebig, Jan Krissler, Ronny Hänsch Security Impact of High Resolution Smartphone Cameras. Search on Bibsonomy WOOT The full citation details ... 2014 DBLP  BibTeX  RDF
1Sergey Bratus, Felix "FX" Lindner (eds.) 8th USENIX Workshop on Offensive Technologies, WOOT '14, San Diego, CA, USA, August 19, 2014. Search on Bibsonomy WOOT The full citation details ... 2014 DBLP  BibTeX  RDF
1David Adrian, Zakir Durumeric, Gulshan Singh, J. Alex Halderman Zippier ZMap: Internet-Wide Scanning at 10 Gbps. Search on Bibsonomy WOOT The full citation details ... 2014 DBLP  BibTeX  RDF
1Grant Ho, Dan Boneh, Lucas Ballard, Niels Provos Tick Tock: Building Browser Red Pills from Timing Side Channels. Search on Bibsonomy WOOT The full citation details ... 2014 DBLP  BibTeX  RDF
1Sarah Laing, Michael E. Locasto, John Aycock An Experience Report on Extracting and Viewing Memory Events via Wireshark. Search on Bibsonomy WOOT The full citation details ... 2014 DBLP  BibTeX  RDF
1Devdatta Akhawe, Warren He, Zhiwei Li, Reza Moazzezi, Dawn Song Clickjacking Revisited: A Perceptual View of UI Security. Search on Bibsonomy WOOT The full citation details ... 2014 DBLP  BibTeX  RDF
1Dmitry Nedospasov, Thorsten Schröder Introducing Die Datenkrake: Programmable Logic for Hardware Security Analysis. Search on Bibsonomy WOOT The full citation details ... 2013 DBLP  BibTeX  RDF
1Dhiru Kholia, Przemyslaw Wegrzyn Looking Inside the (Drop) Box. Search on Bibsonomy WOOT The full citation details ... 2013 DBLP  BibTeX  RDF
1Rebecca Shapiro, Sergey Bratus, Sean W. Smith "Weird Machines" in ELF: A Spotlight on the Underappreciated Metadata. Search on Bibsonomy WOOT The full citation details ... 2013 DBLP  BibTeX  RDF
1Diogo Mónica, Carlos Ribeiro Leveraging Honest Users: Stealth Command-and-Control of Botnets. Search on Bibsonomy WOOT The full citation details ... 2013 DBLP  BibTeX  RDF
1Roee Hay, Jonathan Kalechstain, Gabi Nakibly Subverting BIND's SRTT Algorithm Derandomizing NS Selection. Search on Bibsonomy WOOT The full citation details ... 2013 DBLP  BibTeX  RDF
1Julian Bangert, Sergey Bratus, Rebecca Shapiro, Sean W. Smith The Page-Fault Weird Machine: Lessons in Instruction-less Computation. Search on Bibsonomy WOOT The full citation details ... 2013 DBLP  BibTeX  RDF
1Mike Ryan Bluetooth: With Low Energy Comes Low Security. Search on Bibsonomy WOOT The full citation details ... 2013 DBLP  BibTeX  RDF
1Jon Oberheide, William K. Robertson (eds.) 7th USENIX Workshop on Offensive Technologies, WOOT '13, Washington, D.C., USA, August 13, 2013 Search on Bibsonomy WOOT The full citation details ... 2013 DBLP  BibTeX  RDF
1Yunxing Dai, Ryan Resig FireDrill: Interactive DNS Rebinding. Search on Bibsonomy WOOT The full citation details ... 2013 DBLP  BibTeX  RDF
1Craig A. Shue, Nathanael Paul, Curtis R. Taylor From an IP Address to a Street Address: Using Wireless Signals to Locate a Target. Search on Bibsonomy WOOT The full citation details ... 2013 DBLP  BibTeX  RDF
1Ben Smyth, Alfredo Pironti 0001 Truncating TLS Connections to Violate Beliefs in Web Applications. Search on Bibsonomy WOOT The full citation details ... 2013 DBLP  BibTeX  RDF
1Michael Roland 0001, Josef Langer Cloning Credit Cards: A Combined Pre-play and Downgrade Attack on EMV Contactless. Search on Bibsonomy WOOT The full citation details ... 2013 DBLP  BibTeX  RDF
1Jethro Beekman, Christopher Thompson Breaking Cell Phone Authentication: Vulnerabilities in AKA, IMS, and Android. Search on Bibsonomy WOOT The full citation details ... 2013 DBLP  BibTeX  RDF
1Anthony Bonkoski, Russ Bielawski, J. Alex Halderman Illuminating the Security Issues Surrounding Lights-Out Server Management. Search on Bibsonomy WOOT The full citation details ... 2013 DBLP  BibTeX  RDF
1Ralf-Philipp Weinmann Baseband Attacks: Remote Exploitation of Memory Corruptions in Cellular Protocol Stacks. Search on Bibsonomy WOOT The full citation details ... 2012 DBLP  BibTeX  RDF
1Sebastian Lekies, Mario Heiderich On the Fragility and Limitations of Current Browser-Provided Clickjacking Protection Schemes. Search on Bibsonomy WOOT The full citation details ... 2012 DBLP  BibTeX  RDF
1Andrei Homescu, Michael Stewart 0003, Per Larsen, Stefan Brunthaler 0001, Michael Franz Microgadgets: Size Does Matter in Turing-Complete Return-Oriented Programming. Search on Bibsonomy WOOT The full citation details ... 2012 DBLP  BibTeX  RDF
1Isabell Schmitt, Sebastian Schinzel WAFFle: Fingerprinting Filter Rules of Web Application Firewalls. Search on Bibsonomy WOOT The full citation details ... 2012 DBLP  BibTeX  RDF
Displaying result #1 - #100 of 163 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license