Mathy Vanhoef [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
Rooting Routers Using Symbolic Execution IT-DefenseStuttgart-2019 - Stuttgart, Germany
Advanced WiFi Attacks using Commodity Hardware BRUCON-2018 - Ghent, Belgium
KRACKing WPA2 in Practice Using Key Reinstallation Attacks bluehat-2018 - sheva,tel aviv
KEY REINSTALLATION ATTACKS: BREAKING THE WPA2 PROTOCOL blackhateu-2017 - london,uk
WIFUZZ: DETECTING AND EXPLOITING LOGICAL FLAWS IN THE WI-FI CRYPTOGRAPHIC HANDSHAKE blackhat-2017 - las vegas,usa
Predicting and Abusing WPA2/802.11 Group Keys CCC-2016 - hamburg,germany
Request and Conquer: Exposing Cross-Origin Resource Size USENIX-2016 - austin,usa
Predicting, Decrypting, and Abusing WPA2/802.11 Group Keys USENIX-2016 - austin,usa
HEIST: HTTP ENCRYPTED INFORMATION CAN BE STOLEN THROUGH TCP-WINDOWS blackhatUS-2016 - las vegas,usa
Defeating MAC Address Randomization Through Timing Attacks WiSec-2016 - darmstadt,germany
All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLS SecuritySymposium-2015 - washington,USA
Advanced WiFi Attacks Using Commodity Hardware ACSAC-2014 - new orleans,usa
Practical Verification of WPA-TKIP Vulnerabilities ASIACCS-2013 - Hangzhou,China
New flaws in WPA-TKIP BruCON-2012 - Ghent, Belgium Security