Title |
Conference |
Tags |
AUTOMATED DETECTION OF VULNERABILITIES IN BLACK-BOX ROUTERS (AND OTHER NETWORK DEVICES) |
blackhat-2017 - las vegas,usa |
|
Website-Targeted False Content Injection by Network Operators |
USENIX-2016 - austin,usa |
|
TCP INJECTION ATTACKS IN THE WILD - A LARGE SCALE STUDY |
blackhatUS-2016 - las vegas,usa |
|
PowerSpy: Location Tracking Using Mobile Device Power Analysis |
SecuritySymposium-2015 - washington,USA |
|
Side-Channels in the 21st Century: Information Leakage from Smartphones |
RSAus-2015 - San Francisco,USA |
|
OSPF Vulnerability to Persistent Poisoning Attacks: A Systematic Analysis |
ACSAC-2014 - new orleans,usa |
|
GYROPHONE: EAVESDROPPING USING A GYROSCOPE |
BlackHatEU-2014 - amsterdam,netherlands |
|
Owning the Routing Table - Part II |
BlackHatUSA-2013 - Las Vegas,USA |
|
Subverting BIND's SRTT Algorithm Derandomizing NS Selection |
WOOT-2013 - Washington, DC |
|
Owning the Routing Table: New OSPF Attacks |
BlackhatUSA-2011 - Las Vegas,USA |
|
Routing Loop Attacks Using Ipv6 Tunnels |
3rd USENIX Workshop on Offensive Technologies -2009 - Montreal, Canada |
Security
Routing
IPv6
|