WOOT 2015 Aug. 10, 2015 to Aug. 11, 2015, washington,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
A World Where There Aren't Any Papers about TLS Adam Langley N/A
FLEXTLS: A Tool for Testing TLS Implementations Karthikeyan Bhargavan , Nadim Kobeissi , Alfredo Pironti , Antoine Delignat-lavaud , Benjamin Beurdouche N/A
Prying Open Pandora's Box: KCI Attacks against TLS Christian Schanes , Clemens Hlauschek , Markus Gruber , Florian Fankhauser N/A
P2P File-Sharing in Hell: Exploiting BitTorrent Vulnerabilities to Launch Distributed Reflective DoS Attacks Florian Adamsky , Muttukrishnan Rajarajan , Syed Ali Khayam , Rudolf Jäger N/A
Cashing Out the Great Cannon? On Browser-Based DDoS Attacks and Economics Christian Rossow , Giancarlo Pellegrino , Fabrice J. Ryba , Thomas C. Schmidt , Matthias Wählisch N/A
Own Your Android! Yet Another Universal Root Wen Xu , Yubin Fu N/A
One Class to Rule Them All: 0-Day Deserialization Vulnerabilities in Android Roee Hay , Or Peles N/A
RouteDetector: Sensor-based Positioning System That Exploits Spatio-Temporal Regularity of Human Mobility Takuya Watanabe , Tatsuya Mori , Mitsuaki Akiyama N/A
SURROGATES: Enabling Near-Real-Time Dynamic Analyses of Embedded Systems Tadayoshi Kohno , Karl Koscher , David Molnar N/A
Symbolic Execution for BIOS Security Vincent Zimmer , Oleksandr Bazhaniuk , John Loucaides , Lee Rosenbaum , Mark R. Tuttle N/A
IoTPOT: Analysing the Rise of IoT Compromises Christian Rossow , Takahiro Kasama , Katsunari Yoshioka , Yin Pa , Shogo Suzuki , Tsutomu Matsumoto N/A
The NSA Playset: A Year of Toys and Tools Michael Ossmann N/A
Scrutinizing WPA2 Password Generating Algorithms in Wireless Routers Roel Verdult , Eduardo Novella Lorente , Carlo Meijer N/A
How to Break XML Encryption – Automatically Juraj Somorovsky , Jörg Schwenk , Christian Mainka , Dennis Kupser N/A
Hypervisor Introspection: A Technique for Evading Passive Virtual Machine Monitoring Gary Wang , Zachary J. Estrada , Cuong Pham , Zbigniew Kalbarczyk , Ravishankar K. Iyer N/A
CAIN: Silently Breaking ASLR in the Cloud Mathias Payer , Thomas R. Gross , Antonio Barresi , Kaveh Razavi N/A
Run-DMA Stephen Checkoway , Michael Rushanan N/A
Fast and Vulnerable: A Story of Telematic Failures Karl Koscher , Stefan Savage , Ian Foster , Andrew Prudhomme N/A
Cocaine Noodles: Exploiting the Gap between Human and Machine Speech Recognition Micah Sherr , Tavish Vaidya , Yuankai Zhang , Clay Shields N/A
Fuzzing E-mail Filters with Generative Grammars and N-Gram Analysis Damon Mccoy , Sean Palka N/A