


default search action
20th USENIX Security Symposium 2011: San Francisco, California, USA - WOOT
- David Brumley, Michal Zalewski:

5th USENIX Workshop on Offensive Technologies, WOOT'11, August 8, 2011, San Francisco, CA, USA, Proceedings. USENIX Association 2011
Attacks on Networks and Networking Equipment
- Andrew Buhr, Dale Lindskog, Pavol Zavarsky, Ron Ruhl:

Media Access Control Address Spoofing Attacks against Port Security. 1-8 - Yossi Gilad, Amir Herzberg:

Fragmentation Considered Vulnerable: Blindly Intercepting and Discarding Fragments. 9-18 - Ang Cui, Jatin Kataria, Salvatore J. Stolfo:

Killing the Myth of Cisco IOS Diversity: Recent Advances in Reliable Shellcode Design. 19-27 - Theodore Reed, Joseph Geis, Sven Dietrich:

SkyNET: A 3G-Enabled Mobile Attack Drone and Stealth Botmaster. 28-36
Crossing into the Real World: Beyond IP-based Attacks
- Ludovico Cavedon, Luca Foschini, Giovanni Vigna:

Getting the Face Behind the Squares: Reconstructing Pixelized Video Streams. 37-45 - Keaton Mowery, Sarah Meiklejohn, Stefan Savage:

Heat of the Moment: Characterizing the Efficacy of Thermal Camera-Based Attacks. 46-53 - Travis Goodspeed, Sergey Bratus, Ricky Melgares, Rebecca Shapiro, Ryan Speers:

Packets in Packets: Orson Welles' In-Band Signaling Attacks for Modern Radios. 54-61
Targeting the Cloud and Commodity Computing Devices
- Zhenyu Wu, Mengjun Xie, Haining Wang:

Energy Attack on Server Systems. 62-70 - Chris Kanich, Stephen Checkoway, Keaton Mowery:

Putting Out a HIT: Crowdsourcing Malware Installs. 71-80 - Timothy Vidas, Daniel Votipka, Nicolas Christin:

All Your Droid Are Belong to Us: A Survey of Current Android Attacks. 81-90 - James Oakley, Sergey Bratus:

Exploiting the Hard-Working DWARF: Trojan and Exploit Techniques with No Native Executable Code. 91-102
Advances in Low-Level Exploitation
- Gene Novark, Emery D. Berger:

DieHarder: Securing the Heap. 103-117 - Fabian Yamaguchi, Felix "FX" Lindner, Konrad Rieck:

Vulnerability Extrapolation: Assisted Discovery of Vulnerabilities Using Machine Learning. 118-127 - Flavio D. Garcia, Gerhard de Koning Gans, Roel Verdult:

Exposing iClass Key Diversification. 128-136

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














