Title |
Conference |
Tags |
ATTACKING WPA3: NEW VULNERABILITIES AND EXPLOIT FRAMEWORK |
HITB Singapore-2022 - Singapore, Singapore |
|
Bypassing internet and Rate Limits by Committing Syns |
TyphoonCon-2022 - Seoul, South Korea |
|
Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote Connections |
29thUSENIXSecuritySymposium-2020 - Berkeley, USA |
|
Protecting Wi-Fi Beacons from Outsider Forgeries |
ACMConference-2020 - Virtual, Virtual |
|
Dragonblood: Attacking the Dragonfly Handshake of WPA3 |
BlackHatUSA2019-2019 - Las Vegas, USA |
|
Rooting Routers Using Symbolic Execution |
IT-DefenseStuttgart-2019 - Stuttgart, Germany |
|
Advanced WiFi Attacks using Commodity Hardware |
BRUCON-2018 - Ghent, Belgium |
|
KRACKing WPA2 in Practice Using Key Reinstallation Attacks |
bluehat-2018 - sheva,tel aviv |
|
KEY REINSTALLATION ATTACKS: BREAKING THE WPA2 PROTOCOL |
blackhateu-2017 - london,uk |
|
WIFUZZ: DETECTING AND EXPLOITING LOGICAL FLAWS IN THE WI-FI CRYPTOGRAPHIC HANDSHAKE |
blackhat-2017 - las vegas,usa |
|
Predicting and Abusing WPA2/802.11 Group Keys |
CCC-2016 - hamburg,germany |
|
Request and Conquer: Exposing Cross-Origin Resource Size |
USENIX-2016 - austin,usa |
|
Predicting, Decrypting, and Abusing WPA2/802.11 Group Keys |
USENIX-2016 - austin,usa |
|
HEIST: HTTP ENCRYPTED INFORMATION CAN BE STOLEN THROUGH TCP-WINDOWS |
blackhatUS-2016 - las vegas,usa |
|
Defeating MAC Address Randomization Through Timing Attacks |
WiSec-2016 - darmstadt,germany |
|
All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLS |
SecuritySymposium-2015 - washington,USA |
|
Advanced WiFi Attacks Using Commodity Hardware |
ACSAC-2014 - new orleans,usa |
|
Practical Verification of WPA-TKIP Vulnerabilities |
ASIACCS-2013 - Hangzhou,China |
|
New flaws in WPA-TKIP |
BruCON-2012 - Ghent, Belgium |
Security
|