Title |
Conference |
Tags |
Toward the Analysis of Embedded Firmware through Automated Re-hosting |
RAID2019-2019 - Beijing, China |
|
Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers |
blackhatUSA2018-2018 - Las Vegas, USA |
|
What You Corrupt Is Not What You Crash: Challenges in Fuzzing Embedded Devices. |
NDSS-2018 - san diego,usa |
|
Using chatbots against voice spam: Analyzing Lenny’s effectiveness |
SOUPS-2017 - santa clara,usa |
|
SoK: Fraud in Telephony Networks |
EuroSP-2017 - paris,france |
|
PIE: Parser Identification in Embedded Systems |
ACSAC-2015 - los angeles,usa |
|
FIRMWARE.RE: FIRMWARE UNPACKING, ANALYSIS AND VULNERABILITY-DISCOVERY AS A SERVICE |
BlackHatEU-2014 - amsterdam,netherlands |
|
A Large-Scale Analysis of the Security of Embedded Firmwares |
usenix-2014 - san diego,usa |
|
Through the Looking-Glass, and What Eve Found There |
Woot-2014 - san diego,usa |
|
On the Feasibility of Software Attacks on Commodity Virtual Machine Monitors via Direct Device Assignment |
asiaccs-2014 - kyoto,japan |
|
AVATAR: A Framework to Support Dynamic Security Analysis of Embedded Systems’ Firmwares |
NDSS-2014 - San Diego,USA |
|
Implementation and Implications of a Stealth Hard-Drive Backdoor |
ACSAC-2013 - New Orleans, USA |
|
Improving 802.11 Fingerprinting of Similar Devices by Cooperative Fingerprinting |
SECrypt-2013 - Reykjavik, Iceland |
|