USENIX WOOT |
||
Name |
DOWNLOAD
Copy Link
Trouble downloading? see How To |
|
Total Size |
2.6 GB |
|
Total Files |
928 |
|
Hash |
E01CB2AFE47A0FAAA31C174B86B00A9E22C31DFE |
/ |
|
|
0.8 KB |
/WOOT 2007/ |
|
First USENIX Workshop on Offensive Technologies (WOOT 2007).htm |
17.0 KB |
|
14.2 KB |
/.../First USENIX Workshop on Offensive Technologies (WOOT 2007)_files/ |
|
|
0.1 KB |
|
0.0 KB |
|
0.0 KB |
|
0.3 KB |
|
0.1 KB |
|
20.6 KB |
|
0.1 KB |
|
4.1 KB |
|
48.7 KB |
/.../WOOT 2007 Call for Papers_files/ |
|
|
0.8 KB |
|
1.5 KB |
|
1.4 KB |
|
0.0 KB |
|
4.3 KB |
|
1.5 KB |
|
1.4 KB |
|
4.4 KB |
|
20.6 KB |
|
1.1 KB |
|
0.2 KB |
|
0.1 KB |
|
1.4 KB |
|
0.4 KB |
|
1.5 KB |
/WOOT 2007/presentations/ |
|
An Encrypted Exploit Payload Protocol and Target-Side Scripting Engine - Dino A. Dai Zov.pdf |
115.8 KB |
|
1.1 MB |
BlueSniff Eve Meets Alice and Bluetooth - Dominic Spill, Andrea Bittau.pdf |
159.9 KB |
|
108.7 KB |
Exploiting Concurrency Vulnerabilities in System Call Wrappers - Robert N. M. Watson.pdf |
185.7 KB |
|
139.6 KB |
Flayer Exposing Application Internals - Will Drewry, Tavis Ormandy.pdf |
82.9 KB |
|
222.3 KB |
Toward Undetected Operating System Fingerprinting - Lloyd G. Greenwald, Tavaris J. Thomas.pdf |
131.1 KB |
/WOOT 2008/ |
|
2nd USENIX Workshop on Offensive Technologies (WOOT 2008).htm |
8.2 KB |
Engineering Heap Overflow Exploits with JavaScript - Mark Daniel, Jake Honoroff, Charlie Miller.pdf |
67.8 KB |
|
144.4 KB |
|
71.9 KB |
|
101.1 KB |
Modeling the Trust Boundaries Created by Securable Objects - Matt Miller.pdf |
218.8 KB |
Reverse Engineering Python Applications - Aaron Portnoy, Ali-Rizvi Santiago.pdf |
209.9 KB |
|
137.3 KB |
|
321.9 KB |
|
104.4 KB |
|
12.3 KB |
/.../2nd USENIX Workshop on Offensive Technologies (WOOT 2008)_files/ |
|
|
0.0 KB |
|
0.0 KB |
|
0.3 KB |
|
0.1 KB |
|
20.6 KB |
|
0.1 KB |
|
4.3 KB |
|
20.4 KB |
/.../WOOT 2009 Workshop Sessions_files/ |
|
|
0.0 KB |
|
0.0 KB |
|
0.3 KB |
|
0.1 KB |
|
0.4 KB |
|
0.1 KB |
|
20.6 KB |
|
0.1 KB |
|
7.8 KB |
|
23.8 KB |
/WOOT 2009/ |
|
3rd USENIX Workshop on Offensive Technologies (WOOT 2009).htm |
9.5 KB |
|
152.0 KB |
Covert Channels through External Interference - Gaurav Shah, Matt Blaze.pdf |
673.4 KB |
Decaptcha Breaking 75 percent of eBay Audio CAPTCHAs - Elie Bursztein, Steven Bethard.pdf |
1.4 MB |
Half-Blind Attacks Mask ROM Bootloaders Are Dangerous - Travis Goodspeed, Auerlien Francillon.pdf |
181.9 KB |
Injecting SMS Messages into Smart Phones for Security Analysis - Collin Mulliner, Charlie Miller.pdf |
109.0 KB |
|
175.6 KB |
Rootkits for JavaScript Environments - Ben Adida, Adam Barth, Collin Jackson.pdf |
1.1 MB |
Routing Loop Attacks Using IPv6 Tunnels - Gabi Nakibly, Michael Arov.pdf |
172.0 KB |
|
133.0 KB |
/.../3rd USENIX Workshop on Offensive Technologies (WOOT 2009)_files/ |
|
|
0.0 KB |
|
0.0 KB |
|
0.3 KB |
|
0.1 KB |
|
0.4 KB |
|
0.1 KB |
|
20.6 KB |
|
0.1 KB |
|
7.8 KB |
|
23.8 KB |
/WOOT 2010/ |
|
|
247.8 KB |
Crawling BitTorrent DHTs for Fun and Profit - Scott Wolchok J. Alex Halderman.pdf |
345.4 KB |
|
963.6 KB |
|
184.9 KB |
|
310.2 KB |
Recovering Windows Secrets and EFS Certificates Offline - Elie Burzstein, Jean Michel Picod.pdf |
347.6 KB |
|
1.1 MB |
|
146.6 KB |
|
13.4 KB |
|
10.1 KB |
Zero-sized Heap Allocations Vulnerability Analysis - Julien Vanegue.pdf |
205.7 KB |
/.../WOOT 2010 Workshop Sessions_files/ |
|
|
0.0 KB |
|
0.0 KB |
|
0.3 KB |
|
1.2 KB |
|
1.7 KB |
|
1.2 KB |
|
20.6 KB |
|
0.1 KB |
|
20.1 KB |
/.../WOOT 2010_files/ |
|
|
0.0 KB |
|
0.0 KB |
|
3.7 KB |
|
0.3 KB |
|
1.2 KB |
|
1.7 KB |
|
1.2 KB |
|
20.6 KB |
|
0.1 KB |
|
7.2 KB |
|
20.1 KB |
/WOOT 2011/ |
|
|
224.1 KB |
|
27.0 KB |
|
10.9 KB |
/.../WOOT 2011 Workshop Sessions_files/ |
|
|
0.0 KB |
|
0.0 KB |
|
0.3 KB |
|
1.2 KB |
|
1.7 KB |
|
1.2 KB |
|
0.8 KB |
|
20.6 KB |
|
0.1 KB |
|
23.9 KB |
|
1.3 KB |
|
64.6 KB |
/.../WOOT 2011_files/ |
|
|
0.0 KB |
|
0.0 KB |
|
0.3 KB |
|
1.2 KB |
|
1.7 KB |
|
4.6 KB |
|
1.2 KB |
|
20.6 KB |
|
0.1 KB |
|
23.9 KB |
|
1.3 KB |
|
64.6 KB |
/WOOT 2011/presentations/ |
|
|
134.2 KB |
All_Your_Droid_Are_Belong_to_Us_A_Survey_of_Current_Android_Attacks_-_Vidas.pdf |
134.2 KB |
DieHarder Securing the Heap - Gene Novark Emery D. Berger.pdf |
427.6 KB |
|
427.6 KB |
Energy Attack on Server Systems - Zhenyu Wu, Mengjun Xie, Haining Wang.pdf |
891.0 KB |
|
891.0 KB |
|
229.6 KB |
|
229.6 KB |
Exposing iClass Key Diversification - Flavio D. Garcia, Gerhard de Koning Gans, Roel Verdult.pdf |
163.3 KB |
|
163.3 KB |
|
602.6 KB |
Fragmentation_Considered_Vulnerable_Blindly_Intercepting_and_Discarding_Fragments-Gilad.pdf |
602.6 KB |
|
377.9 KB |
Getting_the_Face_Behind_the_Squares_Reconstructing_Pixelized_Video_Streams-Cavedon.pdf |
377.9 KB |
|
10.0 MB |
Heat_of_the_Moment_Characterizing_the_Efficacy_of_Thermal_Camera-Based_Attacks-Mowery.pdf |
10.0 MB |
|
821.9 KB |
Killing_the_Myth_of_Cisco_IOS_Diversity_Recent_Advances_in_Reliable_Shellcode_Design-Cui.pdf |
821.9 KB |
|
416.3 KB |
Media_Access_Control_Address_Spoofing_Attacks_Against_Port_security-Buhr.pdf |
416.3 KB |
|
318.5 KB |
Packets_in_Packets_Orson_Welles'_In-Band_Signaling_Attacks_for_Modern_Radios_-_Goodspeed.pdf |
318.5 KB |
|
171.1 KB |
Putting_Out_a_HIT_Crowdsourcing_Malware_Installs_-_Kanich.pdf |
171.1 KB |
|
0.0 KB |
|
654.3 KB |
SkyNET_A_3G-Enabled_Mobile_Attack_Drone_and_Stealth_Botmaster-Reed.pdf |
654.3 KB |
Targeting the Cloud and Commodity Computing Devices - Wu.pdf |
891.0 KB |
|
304.1 KB |
|
304.1 KB |
/WOOT 2011/video/ |
|
|
21.1 MB |
DieHarder Securing the Heap - Gene Novark Emery D. Berger.mp4 |
31.8 MB |
Energy Attack on Server Systems - Zhenyu Wu, Mengjun Xie, Haining Wang.m4a |
11.8 MB |
|
31.7 MB |
Exposing iClass Key Diversification - Flavio D. Garcia, Gerhard de Koning Gans, Roel Verdult.mp4 |
24.6 MB |
|
31.2 MB |
|
26.0 MB |
|
26.9 MB |
|
35.7 MB |
|
21.6 MB |
|
34.2 MB |
|
25.9 MB |
|
41.4 MB |
|
16.0 MB |
/WOOT 2012/ |
|
|
295.4 KB |
|
95.2 KB |
|
99.0 KB |
/.../WOOT 2012 Workshop Program USENIX_files/ |
|
|
3.2 KB |
|
45.2 KB |
|
0.5 KB |
|
143.8 KB |
|
97.2 KB |
|
5.6 KB |
|
9.2 KB |
|
257.9 KB |
|
1.5 KB |
|
0.1 KB |
|
1.7 KB |
|
3.2 KB |
|
7.8 KB |
|
30.2 KB |
|
20.5 KB |
|
1.4 KB |
|
99.4 KB |
|
120.3 KB |
|
47.6 KB |
|
32.8 KB |
|
8.1 KB |
|
4.4 KB |
|
0.3 KB |
|
48.9 KB |
|
0.7 KB |
|
1.3 KB |
|
1.4 KB |
|
98.4 KB |
/.../WOOT 2012 Workshop Program USENIX_files/postmessageRelay_data/ |
|
|
10.0 KB |
|
54.7 KB |
|
13.0 KB |
/.../Workshop Program WOOT 2012 USENIX_files/ |
|
|
3.2 KB |
|
45.2 KB |
|
0.5 KB |
|
143.8 KB |
|
97.2 KB |
|
5.6 KB |
|
9.2 KB |
|
257.9 KB |
|
1.5 KB |
|
0.1 KB |
|
1.7 KB |
|
3.2 KB |
|
7.8 KB |
|
30.2 KB |
|
20.5 KB |
|
1.4 KB |
|
99.4 KB |
|
120.3 KB |
|
47.6 KB |
|
32.8 KB |
|
8.1 KB |
|
4.4 KB |
|
0.3 KB |
|
48.9 KB |
|
0.7 KB |
|
1.3 KB |
|
1.4 KB |
|
98.4 KB |
/.../Workshop Program WOOT 2012 USENIX_files/postmessageRelay_data/ |
|
|
10.0 KB |
|
54.7 KB |
|
13.0 KB |
/WOOT 2012/presentations/ |
|
Abusing Notification Services on Smartphones for Phishing and Spamming - Zhi Xu, Sencun Zhu.pdf |
1.3 MB |
|
420.8 KB |
Everything You Know About Password-Stealing Is Wrong - Cormac Herley.pdf |
1.4 MB |
Frankenstein Stitching Malware from Benign Binaries - Vishwath Mohan, Kevin W. Hamlen.pdf |
311.1 KB |
|
291.7 KB |
|
704.2 KB |
|
514.3 KB |
Read It Twice! A Mass-Storage-Based TOCTTOU Attack - Collin Mulliner, Benjamin Michele.pdf |
151.4 KB |
SMT Solvers in Software Security - Julien Vanegue, Sean Heelan, Rolf Rolles.pdf |
154.0 KB |
Under New Management Practical Attacks on SNMPv3 - Nigel Lawrence, Patrick Traynor.pdf |
186.3 KB |
|
1.0 MB |
|
327.2 KB |
|
246.3 KB |
/WOOT 2012/video/ |
|
Abusing Notification Services on Smartphones for Phishing and Spamming - Zhi Xu, Sencun Zhu.mp4 |
29.9 MB |
|
29.7 MB |
Everything You Know About Password-Stealing Is Wrong - Cormac Herley.mp4 |
99.4 MB |
Frankenstein Stitching Malware from Benign Binaries - Vishwath Mohan, Kevin W. Hamlen.mp4 |
17.1 MB |
|
34.1 MB |
|
70.4 MB |
|
31.3 MB |
|
32.3 MB |
Read It Twice! A Mass-Storage-Based TOCTTOU Attack - Collin Mulliner, Benjamin Michele.mp4 |
23.6 MB |
SMT Solvers in Software Security - Julien Vanegue, Sean Heelan, Rolf Rolles.mp4 |
29.0 MB |
Under New Management Practical Attacks on SNMPv3 - Nigel Lawrence, Patrick Traynor.mp4 |
29.1 MB |
|
29.4 MB |
|
25.0 MB |
|
20.6 MB |
iOS and the Rising Cost of Reliable Exploitation - Dionysus Blazakis.mp4 |
52.6 MB |
/WOOT 2013/ |
|
|
153.4 KB |
|
53.1 KB |
|
102.1 KB |
/.../WOOT 2013 USENIX_files/ |
|
|
3.2 KB |
|
45.2 KB |
|
143.8 KB |
|
97.2 KB |
|
5.6 KB |
|
257.3 KB |
|
9.2 KB |
|
1.5 KB |
|
0.1 KB |
|
2.3 KB |
|
5.1 KB |
|
1.7 KB |
|
8.7 KB |
|
4.0 KB |
|
30.2 KB |
|
20.5 KB |
|
1.4 KB |
|
120.3 KB |
|
9.2 KB |
|
121.5 KB |
|
47.6 KB |
|
48.9 KB |
|
0.7 KB |
|
98.4 KB |
|
25.7 KB |
/.../WOOT 2013 USENIX_files/postmessageRelay_data/ |
|
|
10.0 KB |
|
54.7 KB |
|
13.0 KB |
/.../WOOT 2013 Workshop Program USENIX_files/ |
|
|
3.2 KB |
|
45.2 KB |
|
0.5 KB |
|
143.8 KB |
|
97.2 KB |
|
5.6 KB |
|
9.2 KB |
|
257.3 KB |
|
1.5 KB |
|
0.1 KB |
|
2.3 KB |
|
5.1 KB |
|
1.7 KB |
|
8.7 KB |
|
4.0 KB |
|
30.2 KB |
|
20.5 KB |
|
1.4 KB |
|
99.4 KB |
|
120.3 KB |
|
47.6 KB |
|
32.8 KB |
|
0.3 KB |
|
0.3 KB |
|
48.9 KB |
|
0.7 KB |
|
1.3 KB |
|
1.4 KB |
|
98.4 KB |
/.../WOOT 2013 Workshop Program USENIX_files/postmessageRelay_data/ |
|
|
10.0 KB |
|
54.7 KB |
|
13.0 KB |
/WOOT 2013/presentations/ |
|
Bluetooth With Low Energy Comes Low Security - Mike Ryan.pdf |
162.9 KB |
|
341.3 KB |
|
860.9 KB |
FireDrill Interactive DNS Rebinding - Yunxing Dai, Ryan Resig.pdf |
386.9 KB |
|
853.6 KB |
|
174.3 KB |
|
862.1 KB |
Leveraging Honest Users Stealth Command-and-Control of Botnets - Diogo Monica, Carlos Ribeiro.pdf |
1.1 MB |
Looking Inside the (Drop) Box - Dhiru Kholia, Przemysław Wegrzyn.pdf |
169.7 KB |
|
344.0 KB |
|
710.1 KB |
Truncating TLS Connections to Violate Beliefs in Web Applications - Ben Smyth, Alfredo Pironti.pdf |
127.5 KB |
|
150.3 KB |
/WOOT 2013/video/ |
|
Bluetooth With Low Energy Comes Low Security - Mike Ryan.mp4 |
27.2 MB |
|
13.0 MB |
|
24.6 MB |
FireDrill Interactive DNS Rebinding - Yunxing Dai, Ryan Resig.mp4 |
26.4 MB |
|
21.3 MB |
|
24.3 MB |
|
24.3 MB |
Leveraging Honest Users Stealth Command-and-Control of Botnets - Diogo Monica, Carlos Ribeiro.mp4 |
34.1 MB |
Looking Inside the (Drop) Box - Dhiru Kholia, Przemyslaw Wegrzyn.mp4 |
25.5 MB |
|
18.9 MB |
|
39.3 MB |
Truncating TLS Connections to Violate Beliefs in Web Applications - Ben Smyth, Alfredo Pironti.mp4 |
19.0 MB |
|
23.1 MB |
/WOOT 2014/ |
|
|
290.8 KB |
|
49.2 KB |
|
130.7 KB |
/.../WOOT 2014 USENIX_files/ |
|
|
3.2 KB |
|
45.2 KB |
|
143.8 KB |
|
97.2 KB |
|
5.6 KB |
|
257.3 KB |
|
9.2 KB |
|
1.5 KB |
|
0.1 KB |
|
1.7 KB |
|
8.7 KB |
|
4.0 KB |
|
30.2 KB |
|
20.5 KB |
|
1.4 KB |
|
120.3 KB |
|
9.2 KB |
|
121.5 KB |
|
47.6 KB |
|
48.9 KB |
|
0.7 KB |
|
98.4 KB |
/.../WOOT 2014 USENIX_files/postmessageRelay_data/ |
|
|
10.0 KB |
|
54.7 KB |
|
13.0 KB |
/.../WOOT 2014 Workshop Program USENIX_files/ |
|
|
3.2 KB |
|
45.2 KB |
|
0.5 KB |
|
143.8 KB |
|
97.2 KB |
|
5.6 KB |
|
11.9 KB |
|
257.3 KB |
|
1.5 KB |
|
0.1 KB |
|
1.7 KB |
|
8.7 KB |
|
4.0 KB |
|
30.2 KB |
|
20.5 KB |
|
1.4 KB |
|
99.4 KB |
|
120.3 KB |
|
47.6 KB |
|
32.8 KB |
|
0.3 KB |
|
0.3 KB |
|
48.9 KB |
|
0.7 KB |
|
1.3 KB |
|
1.4 KB |
|
98.4 KB |
/.../WOOT 2014 Workshop Program USENIX_files/postmessageRelay_data/ |
|
|
10.0 KB |
|
54.7 KB |
|
13.0 KB |
/WOOT 2014/presentations/ |
|
|
386.4 KB |
|
2.2 MB |
|
207.9 KB |
|
1.1 MB |
|
1.6 MB |
|
429.1 KB |
|
3.5 MB |
|
2.8 MB |
|
2.1 MB |
|
191.3 KB |
|
430.8 KB |
|
123.7 KB |
|
350.3 KB |
|
273.9 KB |
|
141.5 KB |
|
735.1 KB |
|
315.0 KB |
/WOOT 2014/video/ |
|
|
22.1 MB |
|
16.0 MB |
|
16.2 MB |
|
20.4 MB |
|
21.0 MB |
|
4.8 MB |
|
19.4 MB |
Inaudible Sound as a Covert Channel in Mobile Devices - Luke Deshotels.mp4 |
18.1 MB |
|
22.0 MB |
|
21.1 MB |
|
36.1 MB |
Printed Circuit Board Deconstruction Techniques - Joe Grand.mp4 |
20.8 MB |
Security Impact of High Resolution Smartphone Cameras -Tobias Fiebig, Jan Krissler, Ronny Hänsch.mp4 |
18.2 MB |
|
25.4 MB |
|
19.6 MB |
|
22.4 MB |
|
24.7 MB |
/WOOT 2015/ |
|
|
54.5 KB |
|
147.6 KB |
/.../WOOT 2015 USENIX_files/ |
|
|
3.2 KB |
|
45.2 KB |
|
143.8 KB |
|
97.2 KB |
|
5.6 KB |
|
260.3 KB |
|
14.7 KB |
|
1.5 KB |
|
0.1 KB |
|
1.7 KB |
|
1.7 KB |
|
8.7 KB |
|
4.0 KB |
|
1.7 KB |
|
0.5 KB |
|
1.9 KB |
|
20.5 KB |
|
1.4 KB |
|
57.0 KB |
|
120.3 KB |
|
9.2 KB |
|
121.5 KB |
|
48.9 KB |
|
0.7 KB |
|
1.7 KB |
|
98.4 KB |
|
27.0 KB |
|
1.7 KB |
/.../WOOT 2015 USENIX_files/postmessageRelay_data/ |
|
|
10.0 KB |
|
54.7 KB |
|
13.0 KB |
/.../WOOT 2015 Workshop Program USENIX_files/ |
|
|
3.2 KB |
|
45.2 KB |
|
143.8 KB |
|
97.2 KB |
|
0.3 KB |
|
5.6 KB |
|
260.3 KB |
|
14.7 KB |
|
1.5 KB |
|
0.1 KB |
|
1.7 KB |
|
1.7 KB |
|
8.7 KB |
|
4.0 KB |
|
1.7 KB |
|
30.2 KB |
|
1.9 KB |
|
20.5 KB |
|
57.0 KB |
|
1.4 KB |
|
99.4 KB |
|
120.3 KB |
|
32.8 KB |
|
0.3 KB |
|
0.3 KB |
|
48.9 KB |
|
0.7 KB |
|
1.3 KB |
|
1.7 KB |
|
1.4 KB |
|
98.4 KB |
|
27.0 KB |
|
1.7 KB |
/.../WOOT 2015 Workshop Program USENIX_files/postmessageRelay_data/ |
|
|
10.0 KB |
|
54.7 KB |
|
13.0 KB |
/WOOT 2015/presentations/ |
|
|
614.0 KB |
|
1.8 MB |
|
576.0 KB |
|
766.4 KB |
|
352.1 KB |
|
892.2 KB |
|
512.3 KB |
|
3.4 MB |
|
280.6 KB |
|
2.2 MB |
Fuzzing E-mail Filters with Generative Grammars and N-Gram Analysis - Sean Palka, Damon McCoy.pdf |
191.8 KB |
|
685.7 KB |
|
293.2 KB |
|
2.6 MB |
|
608.2 KB |
|
822.2 KB |
|
1.5 MB |
|
10.1 MB |
One Class to Rule Them All 0-Day Deserialization Vulnerabilities in Android - Or Peles, Roee Hay.pdf |
282.0 KB |
|
17.4 MB |
Own Your Android! Yet Another Universal Root - Wen Xu, Yubin Fu.pdf |
580.5 KB |
|
121.6 KB |
|
2.5 MB |
|
533.7 KB |
|
11.4 MB |
|
635.4 KB |
|
28.1 MB |
|
1.5 MB |
|
9.1 MB |
|
184.3 KB |
|
1.2 MB |
|
256.2 KB |
|
1.8 MB |
|
474.5 KB |
|
7.8 MB |
|
410.1 KB |
|
1.3 MB |
/WOOT 2016/ |
|
|
49.2 KB |
|
158.8 KB |
/.../WOOT 2016 USENIX_files/ |
|
|
3.2 KB |
|
45.2 KB |
|
143.8 KB |
|
97.2 KB |
|
5.6 KB |
|
260.3 KB |
|
14.0 KB |
|
1.5 KB |
|
1.7 KB |
|
1.7 KB |
|
1.7 KB |
|
0.5 KB |
|
1.9 KB |
|
20.5 KB |
|
1.4 KB |
|
36.3 KB |
|
120.3 KB |
|
9.2 KB |
|
23.0 KB |
|
48.9 KB |
|
0.7 KB |
|
1.7 KB |
|
98.4 KB |
|
27.0 KB |
|
1.7 KB |
/.../WOOT 2016 USENIX_files/postmessageRelay_data/ |
|
|
10.0 KB |
|
54.7 KB |
|
13.0 KB |
/.../WOOT 2016 Workshop Program USENIX_files/ |
|
|
3.2 KB |
|
45.2 KB |
|
143.8 KB |
|
97.2 KB |
|
0.3 KB |
|
5.6 KB |
|
260.3 KB |
|
14.0 KB |
|
1.5 KB |
|
9.6 KB |
|
1.7 KB |
|
1.7 KB |
|
1.7 KB |
|
30.2 KB |
|
1.9 KB |
|
20.5 KB |
|
1.4 KB |
|
36.3 KB |
|
0.9 KB |
|
120.3 KB |
|
32.8 KB |
|
0.3 KB |
|
0.3 KB |
|
48.9 KB |
|
0.7 KB |
|
1.3 KB |
|
1.7 KB |
|
1.4 KB |
|
12.0 KB |
|
98.4 KB |
|
27.0 KB |
|
1.7 KB |
/.../WOOT 2016 Workshop Program USENIX_files/postmessageRelay_data/ |
|
|
10.0 KB |
|
54.7 KB |
|
13.0 KB |
/WOOT 2016/presentations/ |
|
|
9.4 MB |
|
3.3 MB |
|
8.9 MB |
|
24.0 MB |
|
134.8 KB |
|
4.5 MB |
|
2.5 MB |
|
2.0 MB |
|
854.5 KB |
|
1.1 MB |
|
390.8 KB |
|
13.1 MB |
DDoSCoin Cryptocurrency with a Malicious Proof-of-Work - Eric Wustrow, Benjamin VanderSloot.pdf |
817.8 KB |
|
420.2 KB |
|
1.3 MB |
|
1.9 MB |
|
253.7 KB |
|
1.6 MB |
|
1.6 MB |
|
281.5 KB |
|
1.3 MB |
|
3.9 MB |
|
5.7 MB |
|
2.3 MB |
|
6.5 MB |
|
518.8 KB |
|
6.1 MB |
|
214.2 KB |
|
819.1 KB |
|
3.2 MB |
|
2.5 MB |
Retelling the Retail Security Story Slides - Wendy Nather.pdf |
11.0 MB |
|
543.8 KB |
|
1.9 MB |
|
433.3 KB |
|
4.2 MB |
Stagefright An Android Exploitation Case Study - Joshua J. Drake.pdf |
471.0 KB |
|
2.4 MB |
|
9.5 MB |
|
1.2 MB |
|
6.4 MB |
malWASH Washing Malware to Evade Dynamic Analysis - Kyriakos K. Ispoglou, Mathias Payer.pdf |
668.0 KB |
malWASH Washing Malware to Evade Dynamic Analysis Slides - Kyriakos K. Ispoglou, Mathias Payer.pdf |
1.2 MB |
/WOOT 2017/ |
|
|
74.0 KB |
|
152.0 KB |
/.../WOOT 2017 USENIX_files/ |
|
|
45.2 KB |
|
129.3 KB |
|
4.3 KB |
|
610.1 KB |
|
3.8 KB |
|
5.4 KB |
|
26.7 KB |
|
14.3 KB |
|
20.5 KB |
|
14.0 KB |
|
26.8 KB |
|
120.3 KB |
|
8.2 KB |
|
487.7 KB |
|
15.0 KB |
|
6.7 KB |
|
7.2 KB |
|
4.2 KB |
/.../WOOT 2017 Workshop Program USENIX_files/ |
|
|
45.2 KB |
|
0.3 KB |
|
129.3 KB |
|
4.3 KB |
|
610.1 KB |
|
3.8 KB |
|
5.4 KB |
|
26.7 KB |
|
20.5 KB |
|
14.0 KB |
|
26.8 KB |
|
120.3 KB |
|
15.9 KB |
|
8.2 KB |
|
0.3 KB |
|
0.5 KB |
|
0.7 KB |
|
1.4 KB |
|
23.8 KB |
|
4.2 KB |
/WOOT 2017/presentations/ |
|
|
348.4 KB |
|
2.5 MB |
|
141.8 KB |
Automated PCB Reverse Engineering - Stephan Kleber, Henrik Ferdinand Nolscher, Frank Kargl.pdf |
10.5 MB |
|
14.8 MB |
|
1.0 MB |
Breaking and Fixing Gridcoin - Martin Grothe, Tobias Niemann, Juraj Somorovsky, Jorg Schwenk.pdf |
977.9 KB |
|
4.7 MB |
|
3.0 MB |
|
6.1 MB |
|
428.6 KB |
|
484.5 KB |
|
318.4 KB |
|
1.5 MB |
|
7.2 MB |
|
527.7 KB |
|
402.2 KB |
|
7.8 MB |
|
1.5 MB |
|
1.3 MB |
|
4.3 MB |
|
2.6 MB |
|
5.0 MB |
|
1.1 MB |
|
181.3 KB |
|
227.1 KB |
|
736.5 KB |
|
1.3 MB |
|
6.9 MB |
|
3.9 MB |
|
8.5 MB |
fastboot oem vuln Android Bootloader Vulnerabilities in Vendor Customizations - Roee Hay.pdf |
745.2 KB |
|
729.3 KB |
/WOOT 2018/ |
|
|
86.6 KB |
|
153.3 KB |
/.../WOOT 2018 USENIX_files/ |
|
|
45.2 KB |
|
129.3 KB |
|
4.3 KB |
|
610.1 KB |
|
3.8 KB |
|
5.4 KB |
|
26.7 KB |
|
14.3 KB |
|
20.5 KB |
|
14.0 KB |
|
26.8 KB |
|
120.3 KB |
|
8.2 KB |
|
20.0 KB |
|
500.5 KB |
|
15.0 KB |
|
6.5 KB |
|
3.3 KB |
|
21.4 KB |
/.../WOOT 2018 Workshop Program USENIX_files/ |
|
|
45.2 KB |
|
0.3 KB |
|
129.3 KB |
|
4.3 KB |
|
610.1 KB |
|
3.8 KB |
|
5.4 KB |
|
22.5 KB |
|
12.8 KB |
|
26.7 KB |
|
20.5 KB |
|
14.0 KB |
|
26.8 KB |
|
120.3 KB |
|
15.9 KB |
|
8.2 KB |
|
0.3 KB |
|
0.5 KB |
|
0.7 KB |
|
1.4 KB |
|
3.3 KB |
/WOOT 2018/presentations/ |
|
|
1.9 MB |
|
3.3 MB |
|
655.5 KB |
|
1.8 MB |
|
294.2 KB |
|
10.7 MB |
|
9.4 MB |
|
1.1 MB |
|
460.6 KB |
|
1.5 MB |
Mutually Assured Destruction and the Impending AI Apocalypse Slides - David Evans.pdf |
2.4 MB |
|
366.5 KB |
|
978.1 KB |
|
451.5 KB |
|
4.8 MB |
|
4.8 MB |
|
1.7 MB |
|
2.4 MB |
|
1.2 MB |
|
2.0 MB |
|
1.4 MB |
|
2.8 MB |
SoK Make JIT-Spray Great Again - Robert Gawlik, Thorsten Holz.pdf |
218.5 KB |
SoK Make JIT-Spray Great Again Slides - Robert Gawlik, Thorsten Holz.pdf |
940.7 KB |
|
724.9 KB |
|
2.4 MB |
|
1.6 MB |
|
12.3 MB |
|
174.3 KB |
|
1.2 MB |
|
324.1 KB |
|
986.2 KB |
|
2.3 MB |
|
5.0 MB |
|
613.5 KB |
|
2.2 MB |
/WOOT 2019/ |
|
|
86.6 KB |
|
148.6 KB |
/.../WOOT 2019 USENIX_files/ |
|
|
45.2 KB |
|
129.3 KB |
|
4.3 KB |
|
610.1 KB |
|
3.8 KB |
|
5.4 KB |
|
26.7 KB |
|
10.8 KB |
|
560.8 KB |
|
14.3 KB |
|
20.5 KB |
|
14.0 KB |
|
26.8 KB |
|
120.3 KB |
|
8.2 KB |
|
12.0 KB |
|
15.0 KB |
|
4.4 KB |
|
6.4 KB |
/.../WOOT 2019 Workshop Program USENIX_files/ |
|
|
45.2 KB |
|
0.3 KB |
|
129.3 KB |
|
4.3 KB |
|
610.1 KB |
|
3.8 KB |
|
5.4 KB |
|
26.7 KB |
|
20.5 KB |
|
14.0 KB |
|
26.8 KB |
|
120.3 KB |
|
15.9 KB |
|
8.2 KB |
|
0.3 KB |
|
0.5 KB |
|
0.7 KB |
|
1.4 KB |
|
4.4 KB |
/WOOT 2019/presentations/ |
|
|
1.5 MB |
Alternative (ab)uses for HTTP Alternative Services - Trishita Tiwari, Ari Trachtenberg.pdf |
610.9 KB |
Alternative (ab)uses for HTTP Alternative Services Sides - Trishita Tiwari, Ari Trachtenberg.pdf |
1.7 MB |
Automatic Wireless Protocol Reverse Engineering - Johannes Pohl, Andreas Noack.pdf |
1.7 MB |
Automatic Wireless Protocol Reverse Engineering Slides - Johannes Pohl, Andreas Noack.pdf |
1.3 MB |
|
336.7 KB |
Cross-Router Covert Channels - Adar Ovadia, Rom Ogen, Yakov Mallah, Niv Gilboa, Yossi Oren.pdf |
2.3 MB |
|
1.5 MB |
|
1.4 MB |
|
2.1 MB |
|
1.4 MB |
How Sharp is SHARP - Dixit Kumar, Chavhan Sujeet Yashavant, Biswabandan Panda, Vishal Gupta.pdf |
726.5 KB |
|
1.8 MB |
MIN()imum Failure EMFI Attacks against USB Stacks - Colin OFlynn.pdf |
7.0 MB |
|
540.4 KB |
Taking a Look into Execute-Only Memory - Marc Schink, Johannes Obermaier.pdf |
216.6 KB |
Taking a Look into Execute-Only Memory Slides - Marc Schink, Johannes Obermaier.pdf |
615.5 KB |
|
213.4 KB |
|
1.0 MB |
|
1.6 MB |
|
1.9 MB |
|
2.0 MB |
|
1.5 MB |
|
563.0 KB |
|
2.6 MB |
/WOOT 2020/ |
|
WOOT 20 - AFL++ Combining Incremental Steps of Fuzzing Research.mp4 |
31.1 MB |
WOOT 20 - Automatic Generation of Compact Printable Shellcodes for x86.mp4 |
19.5 MB |
WOOT 20 - BLESA Spoofing Attacks against Reconnections in Bluetooth Low Energy.mp4 |
20.4 MB |
WOOT 20 - Bankrupt Covert Channel Turning Network Predictability into Vulnerability.mp4 |
23.0 MB |
|
28.2 KB |
|
17.2 MB |
WOOT 20 - Firmware Insider Bluetooth Randomness is Mostly Random.mp4 |
38.3 MB |
WOOT 20 - Hardware Security Is Hard How Hardware Boundaries Define Platform Security.mp4 |
46.7 MB |
WOOT 20 - NFCGate Opening the Door for NFC Security Research with a Smartphone-Based Toolkit.mp4 |
22.7 MB |
WOOT 20 - OS Security Is Hard Why All the Fuzzers in the World Wont Change the Way....mp4 |
47.0 MB |
|
16.2 MB |
WOOT 20 - One Exploit to Rule them All On the Security of Drop-in Replacement and Counterfeit....mp4 |
28.9 MB |
WOOT 20 - ToothPicker Apple Picking in the iOS Bluetooth Stack.mp4 |
21.9 MB |
WOOT 20 - Unearthing the TrustedCore A Critical Review on Huawei’s Trusted Execution Environment.mp4 |
19.1 MB |
|
37.2 MB |
WOOT 20 - When Oblivious is Not Attacks against OPAM.eng.srt |
38.6 KB |
|
25.7 MB |
|
71.4 KB |
/.../WOOT 2020 USENIX_files/ |
|
|
45.2 KB |
|
132.7 KB |
|
129.3 KB |
|
4.3 KB |
|
610.1 KB |
|
3.8 KB |
|
5.4 KB |
|
26.7 KB |
|
14.3 KB |
|
20.5 KB |
|
14.0 KB |
|
26.8 KB |
|
120.3 KB |
|
8.2 KB |
|
15.0 KB |
|
11.5 KB |
|
4.2 KB |
|
23.8 KB |
|
22.5 KB |
Total files 928 |
Copyright © 2025 FileMood.com