Title |
Speakers |
Summary |
Topic Types |
A World Where There Aren't Any Papers about TLS |
Adam Langley
|
N/A |
|
FLEXTLS: A Tool for Testing TLS Implementations |
Karthikeyan Bhargavan
,
Nadim Kobeissi
,
Alfredo Pironti
,
Antoine Delignat-lavaud
,
Benjamin Beurdouche
|
N/A |
|
Prying Open Pandora's Box: KCI Attacks against TLS |
Christian Schanes
,
Clemens Hlauschek
,
Markus Gruber
,
Florian Fankhauser
|
N/A |
|
P2P File-Sharing in Hell: Exploiting BitTorrent Vulnerabilities to Launch Distributed Reflective DoS Attacks |
Florian Adamsky
,
Muttukrishnan Rajarajan
,
Syed Ali Khayam
,
Rudolf Jäger
|
N/A |
|
Cashing Out the Great Cannon? On Browser-Based DDoS Attacks and Economics |
Christian Rossow
,
Giancarlo Pellegrino
,
Fabrice J. Ryba
,
Thomas C. Schmidt
,
Matthias Wählisch
|
N/A |
|
Own Your Android! Yet Another Universal Root |
Wen Xu
,
Yubin Fu
|
N/A |
|
One Class to Rule Them All: 0-Day Deserialization Vulnerabilities in Android |
Roee Hay
,
Or Peles
|
N/A |
|
RouteDetector: Sensor-based Positioning System That Exploits Spatio-Temporal Regularity of Human Mobility |
Takuya Watanabe
,
Tatsuya Mori
,
Mitsuaki Akiyama
|
N/A |
|
SURROGATES: Enabling Near-Real-Time Dynamic Analyses of Embedded Systems |
Tadayoshi Kohno
,
Karl Koscher
,
David Molnar
|
N/A |
|
Symbolic Execution for BIOS Security |
Vincent Zimmer
,
Oleksandr Bazhaniuk
,
John Loucaides
,
Lee Rosenbaum
,
Mark R. Tuttle
|
N/A |
|
IoTPOT: Analysing the Rise of IoT Compromises |
Christian Rossow
,
Takahiro Kasama
,
Katsunari Yoshioka
,
Yin Pa
,
Shogo Suzuki
,
Tsutomu Matsumoto
|
N/A |
|
The NSA Playset: A Year of Toys and Tools |
Michael Ossmann
|
N/A |
|
Scrutinizing WPA2 Password Generating Algorithms in Wireless Routers |
Roel Verdult
,
Eduardo Novella Lorente
,
Carlo Meijer
|
N/A |
|
How to Break XML Encryption – Automatically |
Juraj Somorovsky
,
Jörg Schwenk
,
Christian Mainka
,
Dennis Kupser
|
N/A |
|
Hypervisor Introspection: A Technique for Evading Passive Virtual Machine Monitoring |
Gary Wang
,
Zachary J. Estrada
,
Cuong Pham
,
Zbigniew Kalbarczyk
,
Ravishankar K. Iyer
|
N/A |
|
CAIN: Silently Breaking ASLR in the Cloud |
Mathias Payer
,
Thomas R. Gross
,
Antonio Barresi
,
Kaveh Razavi
|
N/A |
|
Run-DMA |
Stephen Checkoway
,
Michael Rushanan
|
N/A |
|
Fast and Vulnerable: A Story of Telematic Failures |
Karl Koscher
,
Stefan Savage
,
Ian Foster
,
Andrew Prudhomme
|
N/A |
|
Cocaine Noodles: Exploiting the Gap between Human and Machine Speech Recognition |
Micah Sherr
,
Tavish Vaidya
,
Yuankai Zhang
,
Clay Shields
|
N/A |
|
Fuzzing E-mail Filters with Generative Grammars and N-Gram Analysis |
Damon Mccoy
,
Sean Palka
|
N/A |
|