Title |
Speakers |
Summary |
Topic Types |
Practical Kleptography |
Matthew Green
|
N/A |
|
Clickjacking Revisited: A Perceptual View of UI Security |
Dawn Song
,
Devdatta Akhawe
,
Zhiwei Li
,
Warren He
,
Reza Moazzezi
|
Clickjacking is a powerful attack against modern web applications. While browser primitives like X-Frame-Options provide ... |
|
Tick Tock: Building Browser Red Pills from Timing Side Channels |
Dan Boneh
,
Niels Provos
,
Lucas Ballard
,
Grant Ho
|
Red pills allow programs to detect if their execution environment is a CPU emulator or ... |
IncludeThinkstScapes
|
The End is Nigh: Generic Solving of Text-based CAPTCHAs |
Elie Bursztein
,
John C. Mitchell
,
Jonathan Aigrain
,
Angelika Moscicki
|
Over the last decade, it has become well-established that a captcha’s ability to withstand automated ... |
IncludeThinkstScapes
|
Hell of a Handshake: Abusing TCP for Reflective Amplification DDoS Attacks |
Thorsten Holz
,
Christian Rossow
,
Marc Kührer
,
Thomas Hupperich
|
Nowadays, a common way for attackers to perform Distributed Denial-of-Service (DDoS) attacks is via so ... |
|
IPv6 Security: Attacks and Countermeasures in a Nutshell |
Adrian ( atrox ) Dabrowski
,
Edgar Weippl
,
Johanna Ullrich
,
Katharina Krombholz
,
Heidelinde Hobel
|
The history of computers is full of underestimation: 640 kilobyte, 2-digit years, and 32-bit Internet ... |
|
Through the Looking-Glass, and What Eve Found There |
Davide Balzarotti
,
Mariano Graziano
,
Aurélien Francillon
,
Luca Bruno
|
Looking-glasses are web applications commonly deployed by Autonomous Systems to offer restricted web access to ... |
|
Green Lights Forever: Analyzing the Security of Traffic Infrastructure |
J. Alex Halderman
,
Branden Ghena
,
William Beyer
,
Allen Hillaker
,
Jonathan Pevarnek
|
The safety critical nature of traffic infrastructure requires that it be secure against computer-based attacks, ... |
|
Zippier ZMap: Internet-Wide Scanning at 10 Gbps |
J. Alex Halderman
,
Zakir Durumeric
,
David Adrian
,
Gulshan Singh
|
We introduce optimizations to the ZMap network scanner that achieve a 10-fold increase in maximum ... |
|
Automated Reverse Engineering using Lego® |
Georg Chalupar
,
Stefan Peherstorfer
,
Erik Poll
,
Joeri De Ruiter
|
State machine learning is a useful technique for automating reverse engineering. In essence, it involves ... |
|
Are Your Passwords Safe: Energy-Efficient Bcrypt Cracking with Low-Cost Parallel Hardware |
Katja Malvoni
,
S Josip Knezovic
,
Solar Designer
|
Bcrypt is a password hashing scheme based on the Blowfish block cipher. It was designed ... |
|
Printed Circuit Board Deconstruction Techniques |
Joe ( Kingpin ) Grand
|
The primary purpose of printed circuit board (PCB) reverse engineering is to determine electronic system ... |
|
Mouse Trap: Exploiting Firmware Updates in USB Peripherals |
Hovav Shacham
,
Jacob Maskiewicz
,
Benjamin Ellis
,
James Mouradian
|
This paper and abstract will be available on August 19, 2014. |
IncludeThinkstScapes
|
Lowering the USB Fuzzing Barrier by Transparent Two-Way Emulation |
Rijnard Van Tonder
,
Herman Engelbrecht
|
Increased focus on the Universal Serial Bus (USB) attack surface of devices has recently resulted ... |
|
Attacking the Linux PRNG On Android: Weaknesses in Seeding of Entropic Pools and Low Boot-Time Entropy |
Roee Hay
,
David Kaplan
,
Sagi Kedmi
,
Avi Dayan
|
Android is the most prevalent Linux-based mobile Operating System in the market today. Many features ... |
|
Security Impact of High Resolution Smartphone Cameras |
Jan Krissler
,
Tobias Fiebig
,
Ronny Hänsch
|
Nearly every modern mobile device includes two cameras. With advances in technology the resolution of ... |
IncludeThinkstScapes
|
Inaudible Sound as a Covert Channel in Mobile Devices |
Luke Deshotels
|
Mobile devices can be protected by a variety of information flow control systems. These systems ... |
|