Woot 2014 Aug. 19, 2014 to Aug. 19, 2014, san diego,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Practical Kleptography Matthew Green N/A
Clickjacking Revisited: A Perceptual View of UI Security Dawn Song , Devdatta Akhawe , Zhiwei Li , Warren He , Reza Moazzezi Clickjacking is a powerful attack against modern web applications. While browser primitives like X-Frame-Options provide ...
Tick Tock: Building Browser Red Pills from Timing Side Channels Dan Boneh , Niels Provos , Lucas Ballard , Grant Ho Red pills allow programs to detect if their execution environment is a CPU emulator or ... IncludeThinkstScapes
The End is Nigh: Generic Solving of Text-based CAPTCHAs Elie Bursztein , John C. Mitchell , Jonathan Aigrain , Angelika Moscicki Over the last decade, it has become well-established that a captcha’s ability to withstand automated ... IncludeThinkstScapes
Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS Attacks Thorsten Holz , Christian Rossow , Marc Kührer , Thomas Hupperich Nowadays, a common way for attackers to perform Distributed Denial-of-Service (DDoS) attacks is via so ...
IPv6 Security: Attacks and Countermeasures in a Nutshell Adrian ( atrox ) Dabrowski , Edgar Weippl , Johanna Ullrich , Katharina Krombholz , Heidelinde Hobel The history of computers is full of underestimation: 640 kilobyte, 2-digit years, and 32-bit Internet ...
Through the Looking-Glass, and What Eve Found There Davide Balzarotti , Mariano Graziano , Aurélien Francillon , Luca Bruno Looking-glasses are web applications commonly deployed by Autonomous Systems to offer restricted web access to ...
Green Lights Forever: Analyzing the Security of Traffic Infrastructure J. Alex Halderman , Branden Ghena , William Beyer , Allen Hillaker , Jonathan Pevarnek The safety critical nature of traffic infrastructure requires that it be secure against computer-based attacks, ...
Zippier ZMap: Internet-Wide Scanning at 10 Gbps J. Alex Halderman , Zakir Durumeric , David Adrian , Gulshan Singh We introduce optimizations to the ZMap network scanner that achieve a 10-fold increase in maximum ...
Automated Reverse Engineering using Lego® Georg Chalupar , Stefan Peherstorfer , Erik Poll , Joeri De Ruiter State machine learning is a useful technique for automating reverse engineering. In essence, it involves ...
Are Your Passwords Safe: Energy-Efficient Bcrypt Cracking with Low-Cost Parallel Hardware Katja Malvoni , S Josip Knezovic , Solar Designer Bcrypt is a password hashing scheme based on the Blowfish block cipher. It was designed ...
Printed Circuit Board Deconstruction Techniques Joe ( Kingpin ) Grand The primary purpose of printed circuit board (PCB) reverse engineering is to determine electronic system ...
Mouse Trap: Exploiting Firmware Updates in USB Peripherals Hovav Shacham , Jacob Maskiewicz , Benjamin Ellis , James Mouradian This paper and abstract will be available on August 19, 2014. IncludeThinkstScapes
Lowering the USB Fuzzing Barrier by Transparent Two-Way Emulation Rijnard Van Tonder , Herman Engelbrecht Increased focus on the Universal Serial Bus (USB) attack surface of devices has recently resulted ...
Attacking the Linux PRNG On Android: Weaknesses in Seeding of Entropic Pools and Low Boot-Time Entropy Roee Hay , David Kaplan , Sagi Kedmi , Avi Dayan Android is the most prevalent Linux-based mobile Operating System in the market today. Many features ...
Security Impact of High Resolution Smartphone Cameras Jan Krissler , Tobias Fiebig , Ronny Hänsch Nearly every modern mobile device includes two cameras. With advances in technology the resolution of ... IncludeThinkstScapes
Inaudible Sound as a Covert Channel in Mobile Devices Luke Deshotels Mobile devices can be protected by a variety of information flow control systems. These systems ...