FileMood

Download USENIX WOOT

USENIX WOOT

Name

USENIX WOOT

 DOWNLOAD Copy Link

Total Size

2.6 GB

Total Files

928

Hash

E01CB2AFE47A0FAAA31C174B86B00A9E22C31DFE

/

USENIX WOOT thank you.txt

0.8 KB

/WOOT 2007/

First USENIX Workshop on Offensive Technologies (WOOT 2007).htm

17.0 KB

WOOT 2007 Call for Papers.htm

14.2 KB

/.../First USENIX Workshop on Offensive Technologies (WOOT 2007)_files/

back_border.gif

0.1 KB

dot_clear.gif

0.0 KB

dot_clear_002.gif

0.0 KB

footer.gif

0.3 KB

long_bar.gif

0.1 KB

new_usenix.jpg

20.6 KB

questmark.gif

0.1 KB

style_woot07.css

4.1 KB

woot07_banner.jpg

48.7 KB

/.../WOOT 2007 Call for Papers_files/

TOCreturn2.gif

0.8 KB

conf.gif

1.5 KB

contact.gif

1.4 KB

dot_clear.gif

0.0 KB

home.gif

4.3 KB

join.gif

1.5 KB

login.gif

1.4 KB

lower.gif

4.4 KB

new_usenix.jpg

20.6 KB

page.js

1.1 KB

pdficon.gif

0.2 KB

questmark.gif

0.1 KB

site_map.gif

1.4 KB

usenix_sub_buttons_08.gif

0.4 KB

who.gif

1.5 KB

/WOOT 2007/presentations/

An Encrypted Exploit Payload Protocol and Target-Side Scripting Engine - Dino A. Dai Zov.pdf

115.8 KB

Billing Attacks on SIP-Based VoIP Systems - Ruishan Zhang, Xinyuan Wang, Xiaohui Yang, Xuxian Jiang.pdf

1.1 MB

BlueSniff Eve Meets Alice and Bluetooth - Dominic Spill, Andrea Bittau.pdf

159.9 KB

Catch Me, If You Can Evading Network Signatures with Web-based Polymorphic Worms - Matt Van Gundy, Davide Balzarotti, Giovanni Vigna.pdf

108.7 KB

Exploiting Concurrency Vulnerabilities in System Call Wrappers - Robert N. M. Watson.pdf

185.7 KB

Exploiting Redundancy in Natural Language to Penetrate Bayesian Spam Filters - Christoph Karlberger, Gunther Bayler, Christopher Kruegel, Engin Kirda.pdf

139.6 KB

Flayer Exposing Application Internals - Will Drewry, Tavis Ormandy.pdf

82.9 KB

The ND2DB Attack Database Content Extraction Using Timing Attacks on the Indexing Algorithms - Ariel Futoransky, Damian Saura, Ariel Waissbein.pdf

222.3 KB

Toward Undetected Operating System Fingerprinting - Lloyd G. Greenwald, Tavaris J. Thomas.pdf

131.1 KB

/WOOT 2008/

2nd USENIX Workshop on Offensive Technologies (WOOT 2008).htm

8.2 KB

Engineering Heap Overflow Exploits with JavaScript - Mark Daniel, Jake Honoroff, Charlie Miller.pdf

67.8 KB

Experiences with Model Inference Assisted Fuzzing - Joachim Viide, Aki Helin, Marko Laakso, Pekka Pietikainen, Mika Seppanen, Kimmo Halunen, Rauli Puupera, Juha Roning.pdf

144.4 KB

Exploitable Redirects on the Web Identification, Prevalence, and Defense - Craig A. Shue, Andrew J. Kalafut, Minaxi Gupta.pdf

71.9 KB

Insecure Context Switching Inoculating Regular Expressions for Survivability - Will Drewry, Tavis Ormandy.pdf

101.1 KB

Modeling the Trust Boundaries Created by Securable Objects - Matt Miller.pdf

218.8 KB

Reverse Engineering Python Applications - Aaron Portnoy, Ali-Rizvi Santiago.pdf

209.9 KB

There Is No Free Phish An Analysis of Free and Live Phishing Kits - Marco Cova, Christopher Kruegel, Giovanni Vigna.pdf

137.3 KB

Towards Systematic Evaluation of the Evadability of Bot Botnet Detection Methods - Elizabeth Stinson, John C. Mitchell.pdf

321.9 KB

WOOT 2008 Report.pdf

104.4 KB

WOOT 2009 Workshop Sessions.htm

12.3 KB

/.../2nd USENIX Workshop on Offensive Technologies (WOOT 2008)_files/

dot_clear.gif

0.0 KB

dot_clear_002.gif

0.0 KB

footer.gif

0.3 KB

longbar.gif

0.1 KB

new_usenix.jpg

20.6 KB

questmark.gif

0.1 KB

sec08_button.jpg

4.3 KB

woot08banner.jpg

20.4 KB

/.../WOOT 2009 Workshop Sessions_files/

dot_clear.gif

0.0 KB

dot_clear_002.gif

0.0 KB

footer.gif

0.3 KB

left_bar.gif

0.1 KB

left_bottom.gif

0.4 KB

longbar.gif

0.1 KB

new_usenix.jpg

20.6 KB

questmark.gif

0.1 KB

sec09_button.jpg

7.8 KB

woot09_banner.jpg

23.8 KB

/WOOT 2009/

3rd USENIX Workshop on Offensive Technologies (WOOT 2009).htm

9.5 KB

A Fistful of Red-Pills How to Automatically Generate Procedures to Detect CPU Emulators - Roberto Paleari, Lorenzo Martignoni.pdf

152.0 KB

Covert Channels through External Interference - Gaurav Shah, Matt Blaze.pdf

673.4 KB

Decaptcha Breaking 75 percent of eBay Audio CAPTCHAs - Elie Bursztein, Steven Bethard.pdf

1.4 MB

Half-Blind Attacks Mask ROM Bootloaders Are Dangerous - Travis Goodspeed, Auerlien Francillon.pdf

181.9 KB

Injecting SMS Messages into Smart Phones for Security Analysis - Collin Mulliner, Charlie Miller.pdf

109.0 KB

PolyPack An Automated Online Packing Service for Optimal Antivirus Evasion - Jon Oberheide, Michael Bailey, Farnam Jahanian.pdf

175.6 KB

Rootkits for JavaScript Environments - Ben Adida, Adam Barth, Collin Jackson.pdf

1.1 MB

Routing Loop Attacks Using IPv6 Tunnels - Gabi Nakibly, Michael Arov.pdf

172.0 KB

Unpacking Virtualization Obfuscators - Rolf Rolles.pdf

133.0 KB

/.../3rd USENIX Workshop on Offensive Technologies (WOOT 2009)_files/

dot_clear.gif

0.0 KB

dot_clear_002.gif

0.0 KB

footer.gif

0.3 KB

left_bar.gif

0.1 KB

left_bottom.gif

0.4 KB

longbar.gif

0.1 KB

new_usenix.jpg

20.6 KB

questmark.gif

0.1 KB

sec09_button.jpg

7.8 KB

woot09_banner.jpg

23.8 KB

/WOOT 2010/

A Framework for Automated Architecture-Independent Gadget Search - Thomas Dullien and Tim Kornau, Ralf-Philipp Weinmann.pdf

247.8 KB

Crawling BitTorrent DHTs for Fun and Profit - Scott Wolchok J. Alex Halderman.pdf

345.4 KB

Framing Attacks on Smart Phones and Dumb Routers Tap-jacking and Geo-localization Attacks - Gustav Rydstedt, Baptiste Gourdin, Elie Bursztein, Dan Boneh.pdf

963.6 KB

Interpreter Exploitation - Dionysus Blazakis.pdf

184.9 KB

Practical Padding Oracle Attacks - Juliano Rizzo.pdf

310.2 KB

Recovering Windows Secrets and EFS Certificates Offline - Elie Burzstein, Jean Michel Picod.pdf

347.6 KB

Smudge Attacks on Smartphone Touch Screens - Adam J. Aviv, Katherine Gibson, Evan Mossop, Matt Blaze, Jonathan M. Smith.pdf

1.1 MB

WOOT 2010 Report.pdf

146.6 KB

WOOT 2010 Workshop Sessions.htm

13.4 KB

WOOT 2010.htm

10.1 KB

Zero-sized Heap Allocations Vulnerability Analysis - Julien Vanegue.pdf

205.7 KB

/.../WOOT 2010 Workshop Sessions_files/

dot_clear.gif

0.0 KB

dot_clear_002.gif

0.0 KB

footer.gif

0.3 KB

left_bar.gif

1.2 KB

left_bottom.gif

1.7 KB

longbar.gif

1.2 KB

new_usenix.jpg

20.6 KB

questmark.gif

0.1 KB

woot10_banner.jpg

20.1 KB

/.../WOOT 2010_files/

dot_clear.gif

0.0 KB

dot_clear_002.gif

0.0 KB

dp_150x33.jpg

3.7 KB

footer.gif

0.3 KB

left_bar.gif

1.2 KB

left_bottom.gif

1.7 KB

longbar.gif

1.2 KB

new_usenix.jpg

20.6 KB

questmark.gif

0.1 KB

sec10_button.jpg

7.2 KB

woot10_banner.jpg

20.1 KB

/WOOT 2011/

WOOT 2011 Report.pdf

224.1 KB

WOOT 2011 Workshop Sessions.htm

27.0 KB

WOOT 2011.htm

10.9 KB

/.../WOOT 2011 Workshop Sessions_files/

dot_clear.gif

0.0 KB

dot_clear_002.gif

0.0 KB

footer.gif

0.3 KB

left_bar.gif

1.2 KB

left_bottom.gif

1.7 KB

longbar.gif

1.2 KB

mp3_icon.gif

0.8 KB

new_usenix.jpg

20.6 KB

questmark.gif

0.1 KB

sec11_button.jpg

23.9 KB

video_icon.gif

1.3 KB

woot11_banner.jpg

64.6 KB

/.../WOOT 2011_files/

dot_clear.gif

0.0 KB

dot_clear_002.gif

0.0 KB

footer.gif

0.3 KB

left_bar.gif

1.2 KB

left_bottom.gif

1.7 KB

lockheed_martin_205x35.jpg

4.6 KB

longbar.gif

1.2 KB

new_usenix.jpg

20.6 KB

questmark.gif

0.1 KB

sec11_button.jpg

23.9 KB

video_icon.gif

1.3 KB

woot11_banner.jpg

64.6 KB

/WOOT 2011/presentations/

All Your Droid Are Belong to Us A Survey of Current Android Attacks - Timothy Vidas, Daniel Votipka, Nicolas Christin.pdf

134.2 KB

All_Your_Droid_Are_Belong_to_Us_A_Survey_of_Current_Android_Attacks_-_Vidas.pdf

134.2 KB

DieHarder Securing the Heap - Gene Novark Emery D. Berger.pdf

427.6 KB

DieHarder_Securing_the_Heap_-_Novark.pdf

427.6 KB

Energy Attack on Server Systems - Zhenyu Wu, Mengjun Xie, Haining Wang.pdf

891.0 KB

Energy_Attack_on_Server_Systems_-_Wu.pdf

891.0 KB

Exploiting the Hard-Working DWARF Trojan and Exploit Techniques with No Native Executable Code - James Oakley Sergey Bratus.pdf

229.6 KB

Exploiting_the_Hard-Working_DWARF_Trojan_and_Exploit_Techniques_with_No_Native_Executable_Code_-_Oakley.pdf

229.6 KB

Exposing iClass Key Diversification - Flavio D. Garcia, Gerhard de Koning Gans, Roel Verdult.pdf

163.3 KB

Exposing_iClass_Key_Diversification_-_Garcia.pdf

163.3 KB

Fragmentation Considered Vulnerable Blindly Intercepting and Discarding Fragments - Yossi Gilad, Amir Herzberg.pdf

602.6 KB

Fragmentation_Considered_Vulnerable_Blindly_Intercepting_and_Discarding_Fragments-Gilad.pdf

602.6 KB

Getting the Face Behind the Squares Reconstructing Pixelized Video Streams - Ludovico Cavedon, Luca Foschini, Giovanni Vigna.pdf

377.9 KB

Getting_the_Face_Behind_the_Squares_Reconstructing_Pixelized_Video_Streams-Cavedon.pdf

377.9 KB

Heat of the Moment Characterizing the Efficacy of Thermal Camera-Based Attacks - Keaton Mowery, Sarah Meiklejohn, Stefan Savage.pdf

10.0 MB

Heat_of_the_Moment_Characterizing_the_Efficacy_of_Thermal_Camera-Based_Attacks-Mowery.pdf

10.0 MB

Killing the Myth of Cisco IOS Diversity Recent Advances in Reliable Shellcode Design - Ang Cui, Jatin Kataria, Salvatore J. Stolfo.pdf

821.9 KB

Killing_the_Myth_of_Cisco_IOS_Diversity_Recent_Advances_in_Reliable_Shellcode_Design-Cui.pdf

821.9 KB

Media Access Control Address Spoofing Attacks against Port Security - Andrew Buhr, Dale Lindskog, Pavol Zavarsky, Ron Ruhl.pdf

416.3 KB

Media_Access_Control_Address_Spoofing_Attacks_Against_Port_security-Buhr.pdf

416.3 KB

Packets in Packets Orson Welles In-Band Signaling Attacks for Modern Radios - Travis Goodspeed, Sergey Bratus, Ricky Melgares, Rebecca Shapiro, Ryan Speers.pdf

318.5 KB

Packets_in_Packets_Orson_Welles'_In-Band_Signaling_Attacks_for_Modern_Radios_-_Goodspeed.pdf

318.5 KB

Putting Out a HIT Crowdsourcing Malware Installs - Chris Kanich, Stephen Checkoway, Keaton Mowery.pdf

171.1 KB

Putting_Out_a_HIT_Crowdsourcing_Malware_Installs_-_Kanich.pdf

171.1 KB

README

0.0 KB

SkyNET A 3G-Enabled Mobile Attack Drone and Stealth Botmaster - Theodore Reed, Joseph Geis, Sven Dietrich.pdf

654.3 KB

SkyNET_A_3G-Enabled_Mobile_Attack_Drone_and_Stealth_Botmaster-Reed.pdf

654.3 KB

Targeting the Cloud and Commodity Computing Devices - Wu.pdf

891.0 KB

Vulnerability Extrapolation Assisted Discovery of Vulnerabilities Using Machine Learning - Fabian Yamaguchi, Felix FX Lindner, Konrad Rieck.pdf

304.1 KB

Vulnerability_Extrapolation_Assisted_Discovery_of_Vulnerabilities_Using_Machine_Learning_-_Yamahuchi.pdf

304.1 KB

/WOOT 2011/video/

All Your Droid Are Belong to Us A Survey of Current Android Attacks - Timothy Vidas, Daniel Votipka, Nicolas Christin.mp4

21.1 MB

DieHarder Securing the Heap - Gene Novark Emery D. Berger.mp4

31.8 MB

Energy Attack on Server Systems - Zhenyu Wu, Mengjun Xie, Haining Wang.m4a

11.8 MB

Exploiting the Hard-Working DWARF Trojan and Exploit Techniques with No Native Executable Code - James Oakley Sergey Bratus.mp4

31.7 MB

Exposing iClass Key Diversification - Flavio D. Garcia, Gerhard de Koning Gans, Roel Verdult.mp4

24.6 MB

Fragmentation Considered Vulnerable Blindly Intercepting and Discarding Fragments - Yossi Gilad, Amir Herzberg.mp4

31.2 MB

Getting the Face Behind the Squares Reconstructing Pixelized Video Streams - Ludovico Cavedon, Luca Foschini, Giovanni Vigna.mp4

26.0 MB

Heat of the Moment Characterizing the Efficacy of Thermal Camera-Based Attacks - Keaton Mowery, Sarah Meiklejohn, Stefan Savage.mp4

26.9 MB

Killing the Myth of Cisco IOS Diversity Recent Advances in Reliable Shellcode Design - Ang Cui, Jatin Kataria, Salvatore J. Stolfo.mp4

35.7 MB

Media Access Control Address Spoofing Attacks against Port Security - Andrew Buhr, Dale Lindskog, Pavol Zavarsky, Ron Ruhl.mp4

21.6 MB

Packets in Packets Orson Welles In-Band Signaling Attacks for Modern Radios - Travis Goodspeed, Sergey Bratus, Ricky Melgares, Rebecca Shapiro, Ryan Speers.mp4

34.2 MB

Putting Out a HIT Crowdsourcing Malware Installs - Chris Kanich, Stephen Checkoway, Keaton Mowery.mp4

25.9 MB

SkyNET A 3G-Enabled Mobile Attack Drone and Stealth Botmaster - Theodore Reed, Joseph Geis, Sven Dietrich.mp4

41.4 MB

Vulnerability Extrapolation Assisted Discovery of Vulnerabilities Using Machine Learning - Fabian Yamaguchi, Felix FX Lindner, Konrad Rieck.mp4

16.0 MB

/WOOT 2012/

WOOT 2012 Report.pdf

295.4 KB

WOOT 2012 Workshop Program USENIX.htm

95.2 KB

Workshop Program WOOT 2012 USENIX.htm

99.0 KB

/.../WOOT 2012 Workshop Program USENIX_files/

all.js

3.2 KB

analytics.js

45.2 KB

audio_16.png

0.5 KB

cbgapi.loaded_0

143.8 KB

cbgapi.loaded_1

97.2 KB

css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css

5.6 KB

css_SKdvFJ9YoZ2Zlnl17QxUbae5QC-NQDrH8ynBbHJFAaM.css

9.2 KB

css_ciODmkFfqCSx2xBu95VX29BZ0r4mdoEz3gy-MriTJBM.css

257.9 KB

css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css

1.5 KB

css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css

0.1 KB

fastbutton.htm

1.7 KB

google_10.png

3.2 KB

google_10_002.png

7.8 KB

ie.htm

30.2 KB

js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js

20.5 KB

js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js

1.4 KB

js_ILONILlX06kZtY3IVUMaeuMs_GJ1hSJY46daikoF9fA.js

99.4 KB

js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js

120.3 KB

js_sWOO4PbSe161nCKWEJProMMhdbu_pfXMDzdRrMGBIE0.js

47.6 KB

js_yui9lDPs2dTDFfQPtmwCCL63T1k2MGsGrsTM-7Eo2Ts.js

32.8 KB

ms-logo_bl_psd.jpg

8.1 KB

ms-logo_bl_psd_002.jpg

4.4 KB

pdf_16.png

0.3 KB

plusone.js

48.9 KB

postmessageRelay.htm

0.7 KB

slides_16.png

1.3 KB

video_16.png

1.4 KB

widgets.js

98.4 KB

/.../WOOT 2012 Workshop Program USENIX_files/postmessageRelay_data/

829555168-postmessagerelay.js

10.0 KB

cbgapi.loaded_0

54.7 KB

rpcshindig_random.js

13.0 KB

/.../Workshop Program WOOT 2012 USENIX_files/

all.js

3.2 KB

analytics.js

45.2 KB

audio_16.png

0.5 KB

cbgapi.loaded_0

143.8 KB

cbgapi.loaded_1

97.2 KB

css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css

5.6 KB

css_SKdvFJ9YoZ2Zlnl17QxUbae5QC-NQDrH8ynBbHJFAaM.css

9.2 KB

css_ciODmkFfqCSx2xBu95VX29BZ0r4mdoEz3gy-MriTJBM.css

257.9 KB

css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css

1.5 KB

css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css

0.1 KB

fastbutton.htm

1.7 KB

google_10.png

3.2 KB

google_10_002.png

7.8 KB

ie.htm

30.2 KB

js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js

20.5 KB

js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js

1.4 KB

js_ILONILlX06kZtY3IVUMaeuMs_GJ1hSJY46daikoF9fA.js

99.4 KB

js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js

120.3 KB

js_sWOO4PbSe161nCKWEJProMMhdbu_pfXMDzdRrMGBIE0.js

47.6 KB

js_yui9lDPs2dTDFfQPtmwCCL63T1k2MGsGrsTM-7Eo2Ts.js

32.8 KB

ms-logo_bl_psd.jpg

8.1 KB

ms-logo_bl_psd_002.jpg

4.4 KB

pdf_16.png

0.3 KB

plusone.js

48.9 KB

postmessageRelay.htm

0.7 KB

slides_16.png

1.3 KB

video_16.png

1.4 KB

widgets.js

98.4 KB

/.../Workshop Program WOOT 2012 USENIX_files/postmessageRelay_data/

829555168-postmessagerelay.js

10.0 KB

cbgapi.loaded_0

54.7 KB

rpcshindig_random.js

13.0 KB

/WOOT 2012/presentations/

Abusing Notification Services on Smartphones for Phishing and Spamming - Zhi Xu, Sencun Zhu.pdf

1.3 MB

Baseband Attacks Remote Exploitation of Memory Corruptions in Cellular Protocol Stacks - Ralf-Philipp Weinmann.pdf

420.8 KB

Everything You Know About Password-Stealing Is Wrong - Cormac Herley.pdf

1.4 MB

Frankenstein Stitching Malware from Benign Binaries - Vishwath Mohan, Kevin W. Hamlen.pdf

311.1 KB

Microgadgets Size Does Matter in Turing-Complete Return-Oriented Programming - Andrei Homescu, Michael Stewart, Per Larsen, Stefan Brunthaler, Michael Franz.pdf

291.7 KB

Off-Path Attacking the Web - Yossi Gilad, Amir Herzberg.pdf

704.2 KB

On the Fragility and Limitations of Current Browser-Provided Clickjacking Protection Schemes - Sebastian Lekies, Mario Heiderich, Dennis Appelt, Thorsten Holz.pdf

514.3 KB

Read It Twice! A Mass-Storage-Based TOCTTOU Attack - Collin Mulliner, Benjamin Michele.pdf

151.4 KB

SMT Solvers in Software Security - Julien Vanegue, Sean Heelan, Rolf Rolles.pdf

154.0 KB

Under New Management Practical Attacks on SNMPv3 - Nigel Lawrence, Patrick Traynor.pdf

186.3 KB

WAFFle Fingerprinting Filter Rules of Web Application Firewalls - Isabell Schmitt and Sebastian Schinzel.pdf

1.0 MB

Web-based Attacks on Host-Proof Encrypted Storage - Karthikeyan Bhargavan, Antoine Delignat-Lavaud.pdf

327.2 KB

ecurity Analysis of Smartphone Point-of-Sale Systems - WesLee Frisby, Benjamin Moench, Benjamin Recht, Thomas Ristenpart.pdf

246.3 KB

/WOOT 2012/video/

Abusing Notification Services on Smartphones for Phishing and Spamming - Zhi Xu, Sencun Zhu.mp4

29.9 MB

Baseband Attacks Remote Exploitation of Memory Corruptions in Cellular Protocol Stacks - Ralf-Philipp Weinmann.mp4

29.7 MB

Everything You Know About Password-Stealing Is Wrong - Cormac Herley.mp4

99.4 MB

Frankenstein Stitching Malware from Benign Binaries - Vishwath Mohan, Kevin W. Hamlen.mp4

17.1 MB

Microgadgets Size Does Matter in Turing-Complete Return-Oriented Programming - Andrei Homescu, Michael Stewart, Per Larsen, Stefan Brunthaler, Michael Franz.mp4

34.1 MB

Nicolas Lidzborski 15 years of Attack on SSL.mp4

70.4 MB

Off-Path Attacking the Web - Yossi Gilad, Amir Herzberg.mp4

31.3 MB

On the Fragility and Limitations of Current Browser-Provided Clickjacking Protection Schemes - Sebastian Lekies, Mario Heiderich, Dennis Appelt, Thorsten Holz.mp4

32.3 MB

Read It Twice! A Mass-Storage-Based TOCTTOU Attack - Collin Mulliner, Benjamin Michele.mp4

23.6 MB

SMT Solvers in Software Security - Julien Vanegue, Sean Heelan, Rolf Rolles.mp4

29.0 MB

Under New Management Practical Attacks on SNMPv3 - Nigel Lawrence, Patrick Traynor.mp4

29.1 MB

WAFFle Fingerprinting Filter Rules of Web Application Firewalls - Isabell Schmitt and Sebastian Schinzel.mp4

29.4 MB

Web-based Attacks on Host-Proof Encrypted Storage - Karthikeyan Bhargavan, Antoine Delignat-Lavaud.mp4

25.0 MB

ecurity Analysis of Smartphone Point-of-Sale Systems - WesLee Frisby, Benjamin Moench, Benjamin Recht, Thomas Ristenpart.mp4

20.6 MB

iOS and the Rising Cost of Reliable Exploitation - Dionysus Blazakis.mp4

52.6 MB

/WOOT 2013/

WOOT 2013 7th USENIX Workshop on Offensive Technologies.pdf

153.4 KB

WOOT 2013 USENIX.htm

53.1 KB

WOOT 2013 Workshop Program USENIX.htm

102.1 KB

/.../WOOT 2013 USENIX_files/

all.js

3.2 KB

analytics.js

45.2 KB

cbgapi.loaded_0

143.8 KB

cbgapi.loaded_1

97.2 KB

css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css

5.6 KB

css_XQfCg5kiuU6ACblHn3rDXdgaKZR8AxbhrQR4Gznu5qA.css

257.3 KB

css_dY0FNz4qF00fqwtbSA930BrnJH15HL9efi8t-qF8ZFs.css

9.2 KB

css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css

1.5 KB

css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css

0.1 KB

duo_security_150x23.png

2.3 KB

duo_security_150x23_002.png

5.1 KB

fastbutton.htm

1.7 KB

google_150x50_0.png

8.7 KB

google_150x50_0_002.png

4.0 KB

ie.htm

30.2 KB

js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js

20.5 KB

js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js

1.4 KB

js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js

120.3 KB

js_ji49bioiy7UXVptlgNz69cp3OlPhM0flq07b9RYG1RE.js

9.2 KB

js_pHUoWIcJ4c6xaMTiyIYMup3CIGo69JvK4lsXr4rs9ng.js

121.5 KB

js_zKsxChQ0ZiM23lE1j-H3wIlMQpnOrGQN3oQ-70N6r40.js

47.6 KB

plusone.js

48.9 KB

postmessageRelay.htm

0.7 KB

widgets.js

98.4 KB

woot13_media.png

25.7 KB

/.../WOOT 2013 USENIX_files/postmessageRelay_data/

829555168-postmessagerelay.js

10.0 KB

cbgapi.loaded_0

54.7 KB

rpcshindig_random.js

13.0 KB

/.../WOOT 2013 Workshop Program USENIX_files/

all.js

3.2 KB

analytics.js

45.2 KB

audio_16.png

0.5 KB

cbgapi.loaded_0

143.8 KB

cbgapi.loaded_1

97.2 KB

css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css

5.6 KB

css_SKdvFJ9YoZ2Zlnl17QxUbae5QC-NQDrH8ynBbHJFAaM.css

9.2 KB

css_XQfCg5kiuU6ACblHn3rDXdgaKZR8AxbhrQR4Gznu5qA.css

257.3 KB

css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css

1.5 KB

css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css

0.1 KB

duo_security_150x23.png

2.3 KB

duo_security_150x23_002.png

5.1 KB

fastbutton.htm

1.7 KB

google_150x50_0.png

8.7 KB

google_150x50_0_002.png

4.0 KB

ie.htm

30.2 KB

js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js

20.5 KB

js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js

1.4 KB

js_ILONILlX06kZtY3IVUMaeuMs_GJ1hSJY46daikoF9fA.js

99.4 KB

js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js

120.3 KB

js_sWOO4PbSe161nCKWEJProMMhdbu_pfXMDzdRrMGBIE0.js

47.6 KB

js_yui9lDPs2dTDFfQPtmwCCL63T1k2MGsGrsTM-7Eo2Ts.js

32.8 KB

package-x-generic.png

0.3 KB

pdf_16.png

0.3 KB

plusone.js

48.9 KB

postmessageRelay.htm

0.7 KB

slides_16.png

1.3 KB

video_16.png

1.4 KB

widgets.js

98.4 KB

/.../WOOT 2013 Workshop Program USENIX_files/postmessageRelay_data/

829555168-postmessagerelay.js

10.0 KB

cbgapi.loaded_0

54.7 KB

rpcshindig_random.js

13.0 KB

/WOOT 2013/presentations/

Bluetooth With Low Energy Comes Low Security - Mike Ryan.pdf

162.9 KB

Breaking Cell Phone Authentication Vulnerabilities in AKA, IMS, and Android - Jethro G. Beekman, Christopher Thompson.pdf

341.3 KB

Cloning Credit Cards A Combined Pre-play and Downgrade Attack on EMV Contactless - Michael Roland, Josef Langer.pdf

860.9 KB

FireDrill Interactive DNS Rebinding - Yunxing Dai, Ryan Resig.pdf

386.9 KB

From an IP Address to a Street Address Using Wireless Signals to Locate a Target - Craig A. Shue, Nathanael Paul, Curtis R. Taylor.pdf

853.6 KB

Illuminating the Security Issues Surrounding Lights-Out Server Management - Anthony J. Bonkoski, Russ Bielawski, J. Alex Halderman.pdf

174.3 KB

Introducing Die Datenkrake Programmable Logic for Hardware Security Analysis - Dmitry Nedospasov, Thorsten Schroder.pdf

862.1 KB

Leveraging Honest Users Stealth Command-and-Control of Botnets - Diogo Monica, Carlos Ribeiro.pdf

1.1 MB

Looking Inside the (Drop) Box - Dhiru Kholia, Przemysław Wegrzyn.pdf

169.7 KB

Subverting BIND SRTT Algorithm Derandomizing NS Selection - Roee Hay, Jonathan Kalechstein, Gabi Nakibly.pdf

344.0 KB

The Page-Fault Weird Machine Lessons in Instruction-less Computation - Julian Bangert, Sergey Bratus, Rebecca Shapiro, Sean W. Smith.pdf

710.1 KB

Truncating TLS Connections to Violate Beliefs in Web Applications - Ben Smyth, Alfredo Pironti.pdf

127.5 KB

Weird Machines in ELF A Spotlight on the Underappreciated Metadata - Rebecca Shapiro, Sergey Bratus, Sean W. Smith.pdf

150.3 KB

/WOOT 2013/video/

Bluetooth With Low Energy Comes Low Security - Mike Ryan.mp4

27.2 MB

Breaking Cell Phone Authentication Vulnerabilities in AKA, IMS, and Android - Jethro G. Beekman, Christopher Thompson.mp4

13.0 MB

Cloning Credit Cards A Combined Pre-play and Downgrade Attack on EMV Contactless - Michael Roland, Josef Langer.mp4

24.6 MB

FireDrill Interactive DNS Rebinding - Yunxing Dai, Ryan Resig.mp4

26.4 MB

From an IP Address to a Street Address Using Wireless Signals to Locate a Target - Craig A. Shue, Nathanael Paul, Curtis R. Taylor.mp4

21.3 MB

Illuminating the Security Issues Surrounding Lights-Out Server Management - Anthony J. Bonkoski, Russ Bielawski, J. Alex Halderman.mp4

24.3 MB

Introducing Die Datenkrake Programmable Logic for Hardware Security Analysis - Dmitry Nedospasov, Thorsten Schroder.mp4

24.3 MB

Leveraging Honest Users Stealth Command-and-Control of Botnets - Diogo Monica, Carlos Ribeiro.mp4

34.1 MB

Looking Inside the (Drop) Box - Dhiru Kholia, Przemyslaw Wegrzyn.mp4

25.5 MB

Subverting BIND SRTT Algorithm Derandomizing NS Selection - Roee Hay, Jonathan Kalechstein, Gabi Nakibly.mp4

18.9 MB

The Page-Fault Weird Machine Lessons in Instruction-less Computation - Julian Bangert, Sergey Bratus, Rebecca Shapiro, Sean W. Smith.mp4

39.3 MB

Truncating TLS Connections to Violate Beliefs in Web Applications - Ben Smyth, Alfredo Pironti.mp4

19.0 MB

Weird Machines in ELF A Spotlight on the Underappreciated Metadata - Rebecca Shapiro, Sergey Bratus, Sean W. Smith.mp4

23.1 MB

/WOOT 2014/

WOOT 2014 Report Supplement.pdf

290.8 KB

WOOT 2014 USENIX.htm

49.2 KB

WOOT 2014 Workshop Program USENIX.htm

130.7 KB

/.../WOOT 2014 USENIX_files/

all.js

3.2 KB

analytics.js

45.2 KB

cbgapi.loaded_0

143.8 KB

cbgapi.loaded_1

97.2 KB

css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css

5.6 KB

css_XQfCg5kiuU6ACblHn3rDXdgaKZR8AxbhrQR4Gznu5qA.css

257.3 KB

css_dY0FNz4qF00fqwtbSA930BrnJH15HL9efi8t-qF8ZFs.css

9.2 KB

css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css

1.5 KB

css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css

0.1 KB

fastbutton.htm

1.7 KB

google_150x50_0.png

8.7 KB

google_150x50_0_002.png

4.0 KB

ie.htm

30.2 KB

js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js

20.5 KB

js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js

1.4 KB

js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js

120.3 KB

js_ji49bioiy7UXVptlgNz69cp3OlPhM0flq07b9RYG1RE.js

9.2 KB

js_pHUoWIcJ4c6xaMTiyIYMup3CIGo69JvK4lsXr4rs9ng.js

121.5 KB

js_zKsxChQ0ZiM23lE1j-H3wIlMQpnOrGQN3oQ-70N6r40.js

47.6 KB

plusone.js

48.9 KB

postmessageRelay.htm

0.7 KB

widgets.js

98.4 KB

/.../WOOT 2014 USENIX_files/postmessageRelay_data/

829555168-postmessagerelay.js

10.0 KB

cbgapi.loaded_0

54.7 KB

rpcshindig_random.js

13.0 KB

/.../WOOT 2014 Workshop Program USENIX_files/

all.js

3.2 KB

analytics.js

45.2 KB

audio_16.png

0.5 KB

cbgapi.loaded_0

143.8 KB

cbgapi.loaded_1

97.2 KB

css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css

5.6 KB

css_JfUmRW-Hr0U8TZVXkaC2BcGIYyK5guphAqwPzo1s5JM.css

11.9 KB

css_XQfCg5kiuU6ACblHn3rDXdgaKZR8AxbhrQR4Gznu5qA.css

257.3 KB

css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css

1.5 KB

css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css

0.1 KB

fastbutton.htm

1.7 KB

google_150x50_0.png

8.7 KB

google_150x50_0_002.png

4.0 KB

ie.htm

30.2 KB

js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js

20.5 KB

js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js

1.4 KB

js_ILONILlX06kZtY3IVUMaeuMs_GJ1hSJY46daikoF9fA.js

99.4 KB

js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js

120.3 KB

js_sWOO4PbSe161nCKWEJProMMhdbu_pfXMDzdRrMGBIE0.js

47.6 KB

js_yui9lDPs2dTDFfQPtmwCCL63T1k2MGsGrsTM-7Eo2Ts.js

32.8 KB

package-x-generic.png

0.3 KB

pdf_16.png

0.3 KB

plusone.js

48.9 KB

postmessageRelay.htm

0.7 KB

slides_16.png

1.3 KB

video_16.png

1.4 KB

widgets.js

98.4 KB

/.../WOOT 2014 Workshop Program USENIX_files/postmessageRelay_data/

829555168-postmessagerelay.js

10.0 KB

cbgapi.loaded_0

54.7 KB

rpcshindig_random.js

13.0 KB

/WOOT 2014/presentations/

woot14-adrian.pdf

386.4 KB

woot14-akhawe.pdf

2.2 MB

woot14-bruno.pdf

207.9 KB

woot14-bursztein.pdf

1.1 MB

woot14-chalupar.pdf

1.6 MB

woot14-deshotels.pdf

429.1 KB

woot14-fiebig.pdf

3.5 MB

woot14-ghena.pdf

2.8 MB

woot14-grand.pdf

2.1 MB

woot14-ho.pdf

191.3 KB

woot14-kaplan.pdf

430.8 KB

woot14-kuhrer.pdf

123.7 KB

woot14-laing.pdf

350.3 KB

woot14-malvoni.pdf

273.9 KB

woot14-maskiewicz.pdf

141.5 KB

woot14-ullrich.pdf

735.1 KB

woot14-vantonder.pdf

315.0 KB

/WOOT 2014/video/

An Experience Report on Extracting and Viewing Memory Events via Wireshark - Sarah Laing, Michael E. Locasto, John Aycock.mp4

22.1 MB

Attacking the Linux PRNG On Android Weaknesses in Seeding of Entropic Pools and Low Boot-Time Entropy - David Kaplan, Sagi Kedmi, Roee Hay, Avi Dayan.mp4

16.0 MB

Automated Reverse Engineering using Lego - Georg Chalupar, Stefan Peherstorfer, Erik Poll, Joeri de Ruiter.mp4

16.2 MB

Clickjacking Revisited A Perceptual View of UI Security - Devdatta Akhawe, Warren He, Zhiwei Li, Reza Moazzezi, Dawn Song.mp4

20.4 MB

Green Lights Forever Analyzing the Security of Traffic Infrastructure - Branden Ghena, William Beyer, Allen Hillaker, Jonathan Pevarnek, J. Alex Halderman.mp4

21.0 MB

Hell of a Handshake Abusing TCP for Reflective Amplification DDoS Attacks - Marc Kuhrer, Thomas Hupperich, Christian Rossow, Thorsten Holz.m4a

4.8 MB

IPv6 Security Attacks and Countermeasures in a Nutshell - Johanna Ullrich, Katharina Krombholz, Heidelinde Hobel, Adrian Dabrowski, Edgar Weippl.mp4

19.4 MB

Inaudible Sound as a Covert Channel in Mobile Devices - Luke Deshotels.mp4

18.1 MB

Lowering the USB Fuzzing Barrier by Transparent Two-Way Emulation - Rijnard van Tonder, Herman Engelbrecht.mp4

22.0 MB

Mouse Trap Exploiting Firmware Updates in USB Peripherals - Jacob Maskiewicz, Benjamin Ellis, James Mouradian, Hovav Shacham.mp4

21.1 MB

Practical Kleptography - Matthew Green.mp4

36.1 MB

Printed Circuit Board Deconstruction Techniques - Joe Grand.mp4

20.8 MB

Security Impact of High Resolution Smartphone Cameras -Tobias Fiebig, Jan Krissler, Ronny Hänsch.mp4

18.2 MB

The End is Nigh Generic Solving of Text-based CAPTCHAs - Elie Bursztein, Jonathan Aigrain, Angelika Moscicki, John C. Mitchell.mp4

25.4 MB

Through the Looking-Glass and What Eve Found There - Luca Bruno, Mariano Graziano, Davide Balzarotti, Aurelien Francillon.mp4

19.6 MB

Tick Tock Building Browser Red Pills from Timing Side Channels - Grant Ho and Dan Boneh, Stanford University_ Lucas Ballard, Niels Provos.mp4

22.4 MB

Zippier ZMap Internet-Wide Scanning at 10 Gbps - David Adrian, Zakir Durumeric, Gulshan Singh, J. Alex Halderman.mp4

24.7 MB

/WOOT 2015/

WOOT 2015 USENIX.htm

54.5 KB

WOOT 2015 Workshop Program USENIX.htm

147.6 KB

/.../WOOT 2015 USENIX_files/

all.js

3.2 KB

analytics.js

45.2 KB

cbgapi.loaded_0

143.8 KB

cbgapi.loaded_1

97.2 KB

css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css

5.6 KB

css_IBrrqJUtXAVsLrrlZ8VqVTS3di7E2-x10BVJwZwbroU.css

260.3 KB

css_LExIzGPsGdn5C4nqJx48pJC7JQMBSXLz4A-JrNLH8dQ.css

14.7 KB

css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css

1.5 KB

css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css

0.1 KB

facebook-icon.jpeg

1.7 KB

fastbutton.htm

1.7 KB

google_150x50_0.png

8.7 KB

google_150x50_0_002.png

4.0 KB

googleplus-icon.jpg

1.7 KB

ie.css

0.5 KB

in-icon.jpeg

1.9 KB

js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js

20.5 KB

js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js

1.4 KB

js_Eqyabh_1dXqoKxUtef0Zx58GEXQZT6Q5JG-a5FJINjs.js

57.0 KB

js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js

120.3 KB

js_ji49bioiy7UXVptlgNz69cp3OlPhM0flq07b9RYG1RE.js

9.2 KB

js_pHUoWIcJ4c6xaMTiyIYMup3CIGo69JvK4lsXr4rs9ng.js

121.5 KB

plusone.js

48.9 KB

postmessageRelay.htm

0.7 KB

twitter-icon.jpeg

1.7 KB

widgets.js

98.4 KB

woot16_button.png

27.0 KB

youtube-icon.jpg

1.7 KB

/.../WOOT 2015 USENIX_files/postmessageRelay_data/

829555168-postmessagerelay.js

10.0 KB

cbgapi.loaded_0

54.7 KB

rpcshindig_random.js

13.0 KB

/.../WOOT 2015 Workshop Program USENIX_files/

all.js

3.2 KB

analytics.js

45.2 KB

cbgapi.loaded_0

143.8 KB

cbgapi.loaded_1

97.2 KB

conference-schedule-pdf.png

0.3 KB

css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css

5.6 KB

css_IBrrqJUtXAVsLrrlZ8VqVTS3di7E2-x10BVJwZwbroU.css

260.3 KB

css_m9t3SZ2dKv6HQuOuf0zINIRA5GjP4lkCCtmRRbSjaXs.css

14.7 KB

css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css

1.5 KB

css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css

0.1 KB

facebook-icon.jpeg

1.7 KB

fastbutton.htm

1.7 KB

google_150x50_0.png

8.7 KB

google_150x50_0_002.png

4.0 KB

googleplus-icon.jpg

1.7 KB

ie.htm

30.2 KB

in-icon.jpeg

1.9 KB

js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js

20.5 KB

js_2sjNGyfj3O57w8bimxly5mzgG70GrcIxxxYOEInwu1Q.js

57.0 KB

js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js

1.4 KB

js_ILONILlX06kZtY3IVUMaeuMs_GJ1hSJY46daikoF9fA.js

99.4 KB

js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js

120.3 KB

js_yui9lDPs2dTDFfQPtmwCCL63T1k2MGsGrsTM-7Eo2Ts.js

32.8 KB

package-x-generic.png

0.3 KB

pdf_16.png

0.3 KB

plusone.js

48.9 KB

postmessageRelay.htm

0.7 KB

slides_16.png

1.3 KB

twitter-icon.jpeg

1.7 KB

usenix-locked.png

1.4 KB

widgets.js

98.4 KB

woot16_button.png

27.0 KB

youtube-icon.jpg

1.7 KB

/.../WOOT 2015 Workshop Program USENIX_files/postmessageRelay_data/

829555168-postmessagerelay.js

10.0 KB

cbgapi.loaded_0

54.7 KB

rpcshindig_random.js

13.0 KB

/WOOT 2015/presentations/

CAIN Silently Breaking ASLR in the Cloud - Antonio Barresi, Kaveh Razavi, Mathias Payer, Thomas R. Gross.pdf

614.0 KB

CAIN Silently Breaking ASLR in the Cloud Slides - Antonio Barresi, Kaveh Razavi, Mathias Payer, Thomas R. Gross.pdf

1.8 MB

Cashing Out the Great Cannon On Browser-Based DDoS Attacks and Economics - Giancarlo Pellegrino, Christian Rossow, Fabrice J. Ryba, Thomas C. Schmidt, Matthias Wahlisch.pdf

576.0 KB

Cashing Out the Great Cannon On Browser-Based DDoS Attacks and Economics Slides - Giancarlo Pellegrino, Christian Rossow, Fabrice J. Ryba, Thomas C. Schmidt, Matthias Wahlisch.pdf

766.4 KB

Cocaine Noodles Exploiting the Gap between Human and Machine Speech Recognition - Tavish Vaidya, Yuankai Zhang, Micah Sherr, Clay Shields.pdf

352.1 KB

Cocaine Noodles Exploiting the Gap between Human and Machine Speech Recognition Slides - Tavish Vaidya, Yuankai Zhang, Micah Sherr, Clay Shields.pdf

892.2 KB

FLEXTLS A Tool for Testing TLS Implementations - Benjamin Beurdouche, Antoine Delignat-Lavaud, Nadim Kobeissi, Alfredo Pironti, Karthikeyan Bhargava.pdf

512.3 KB

FLEXTLS A Tool for Testing TLS Implementations Slides - Benjamin Beurdouche, Antoine Delignat-Lavaud, Nadim Kobeissi, Alfredo Pironti, Karthikeyan Bhargava.pdf

3.4 MB

Fast and Vulnerable A Story of Telematic Failures - Ian Foster, Andrew Prudhomme, Karl Koscher, Stefan Savage.pdf

280.6 KB

Fast and Vulnerable A Story of Telematic Failures Slides - Ian Foster, Andrew Prudhomme, Karl Koscher, Stefan Savage.pdf

2.2 MB

Fuzzing E-mail Filters with Generative Grammars and N-Gram Analysis - Sean Palka, Damon McCoy.pdf

191.8 KB

Fuzzing E-mail Filters with Generative Grammars and N-Gram Analysis Slides - Sean Palka, Damon McCoy.pdf

685.7 KB

How to Break XML Encryption - Automatically - Dennis Kupser, Christian Mainka, Jorg Schwenk, Juraj Somorovsky.pdf

293.2 KB

How to Break XML Encryption - Automatically Slides - Dennis Kupser, Christian Mainka, Jorg Schwenk, Juraj Somorovsky.pdf

2.6 MB

Hypervisor Introspection A Technique for Evading Passive Virtual Machine Monitoring - Gary Wang, Zachary J. Estrada, Cuong Pham, Zbigniew Kalbarczyk, Ravishankar K. Iyer.pdf

608.2 KB

Hypervisor Introspection A Technique for Evading Passive Virtual Machine Monitoring Slides - Gary Wang, Zachary J. Estrada, Cuong Pham, Zbigniew Kalbarczyk, Ravishankar K. Iyer.pdf

822.2 KB

IoTPOT Analysing the Rise of IoT Compromises - Yin Minn Pa Pa, Shogo Suzuki, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, Christian Rossow.pdf

1.5 MB

IoTPOT Analysing the Rise of IoT Compromises Slides - Yin Minn Pa Pa, Shogo Suzuki, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, Christian Rossow.pdf

10.1 MB

One Class to Rule Them All 0-Day Deserialization Vulnerabilities in Android - Or Peles, Roee Hay.pdf

282.0 KB

One Class to Rule Them All 0-Day Deserialization Vulnerabilities in Android Slides - Or Peles, Roee Hay.pdf

17.4 MB

Own Your Android! Yet Another Universal Root - Wen Xu, Yubin Fu.pdf

580.5 KB

P2P File-Sharing in Hell Exploiting BitTorrent Vulnerabilities to Launch Distributed Reflective DoS Attacks - Florian Adamsky, Syed Ali Khayam, Rudolf Jager, Muttukrishnan Rajaraj.pdf

121.6 KB

P2P File-Sharing in Hell Exploiting BitTorrent Vulnerabilities to Launch Distributed Reflective DoS Attacks Slides - Florian Adamsky, Syed Ali Khayam, Rudolf Jager, Muttukrishnan.pdf

2.5 MB

Prying Open Pandora's Box KCI Attacks against TLS - Clemens Hlauschek, Markus Gruber, Florian Fankhauser, Christian Schanes.pdf

533.7 KB

Prying Open Pandora's Box KCI Attacks against TLS Slides - Clemens Hlauschek, Markus Gruber, Florian Fankhauser, Christian Schanes.pdf

11.4 MB

Replication Prohibited Attacking Restricted Keyways with 3D-Printing - Ben Burgess, Eric Wustrow, J. Alex Halderman.pdf

635.4 KB

Replication Prohibited Attacking Restricted Keyways with 3D-Printing Slides - Ben Burgess, Eric Wustrow, J. Alex Halderman.pdf

28.1 MB

RouteDetector Sensor-based Positioning System That Exploits Spatio-Temporal Regularity of Human Mobility - Takuya Watanabe, Mitsuaki Akiyama, Tatsuya Mori.pdf

1.5 MB

RouteDetector Sensor-based Positioning System That Exploits Spatio-Temporal Regularity of Human Mobility Slides- Takuya Watanabe, Mitsuaki Akiyama, Tatsuya Mori.pdf

9.1 MB

Run-DMA - Michael Rushanan, Stephen Checkoway.pdf

184.3 KB

Run-DMA Slides - Michael Rushanan, Stephen Checkoway.pdf

1.2 MB

SURROGATES Enabling Near-Real-Time Dynamic Analyses of Embedded Systems - Karl Koscher, Tadayoshi Kohno, David Molna.pdf

256.2 KB

SURROGATES Enabling Near-Real-Time Dynamic Analyses of Embedded Systems Slides- Karl Koscher, Tadayoshi Kohno, David Molna.pdf

1.8 MB

Scrutinizing WPA2 Password Generating Algorithms in Wireless Routers - Eduardo Novella Lorente, Carlo Meijer, Roel Verdult.pdf

474.5 KB

Scrutinizing WPA2 Password Generating Algorithms in Wireless Routers Sides - Eduardo Novella Lorente, Carlo Meijer, Roel Verdult.pdf

7.8 MB

Symbolic Execution for BIOS Security - Oleksandr Bazhaniuk, John Loucaides, Lee Rosenbaum, Mark R. Tuttle, Vincent Zimmer.pdf

410.1 KB

Symbolic Execution for BIOS Security Slides - Oleksandr Bazhaniuk, John Loucaides, Lee Rosenbaum, Mark R. Tuttle, Vincent Zimmer.pdf

1.3 MB

/WOOT 2016/

WOOT 2016 USENIX.htm

49.2 KB

WOOT 2016 Workshop Program USENIX.htm

158.8 KB

/.../WOOT 2016 USENIX_files/

all.js

3.2 KB

analytics.js

45.2 KB

cbgapi.loaded_0

143.8 KB

cbgapi.loaded_1

97.2 KB

css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css

5.6 KB

css_IBrrqJUtXAVsLrrlZ8VqVTS3di7E2-x10BVJwZwbroU.css

260.3 KB

css_SJrXtYbcuPB8WAymRdFYvvG15ip7H0pnhxrAIhiVy_g.css

14.0 KB

css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css

1.5 KB

facebook-icon.jpeg

1.7 KB

fastbutton.htm

1.7 KB

googleplus-icon.jpg

1.7 KB

ie.css

0.5 KB

in-icon.jpeg

1.9 KB

js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js

20.5 KB

js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js

1.4 KB

js_P9sv6Av5kC_6rXYbbl74piN1qW4Pxzd2fp7twgK6NL0.js

36.3 KB

js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js

120.3 KB

js_ji49bioiy7UXVptlgNz69cp3OlPhM0flq07b9RYG1RE.js

9.2 KB

js_nPhKWi17GlWfUPto14Dqfk5lpAFMD2XUrRDYY3jnD2c.js

23.0 KB

plusone.js

48.9 KB

postmessageRelay.htm

0.7 KB

twitter-icon.jpeg

1.7 KB

widgets.js

98.4 KB

woot16_button.png

27.0 KB

youtube-icon.jpg

1.7 KB

/.../WOOT 2016 USENIX_files/postmessageRelay_data/

829555168-postmessagerelay.js

10.0 KB

cbgapi.loaded_0

54.7 KB

rpcshindig_random.js

13.0 KB

/.../WOOT 2016 Workshop Program USENIX_files/

all.js

3.2 KB

analytics.js

45.2 KB

cbgapi.loaded_0

143.8 KB

cbgapi.loaded_1

97.2 KB

conference-schedule-pdf.png

0.3 KB

css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css

5.6 KB

css_IBrrqJUtXAVsLrrlZ8VqVTS3di7E2-x10BVJwZwbroU.css

260.3 KB

css_SJrXtYbcuPB8WAymRdFYvvG15ip7H0pnhxrAIhiVy_g.css

14.0 KB

css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css

1.5 KB

drake_joshua_110x115.jpg

9.6 KB

facebook-icon.jpeg

1.7 KB

fastbutton.htm

1.7 KB

googleplus-icon.jpg

1.7 KB

ie.htm

30.2 KB

in-icon.jpeg

1.9 KB

js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js

20.5 KB

js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js

1.4 KB

js_P9sv6Av5kC_6rXYbbl74piN1qW4Pxzd2fp7twgK6NL0.js

36.3 KB

js_RGgtt0xyoog3aEbqA3PACaZnzIbopLWdKtKDjg0Ge54.js

0.9 KB

js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js

120.3 KB

js_yui9lDPs2dTDFfQPtmwCCL63T1k2MGsGrsTM-7Eo2Ts.js

32.8 KB

package-x-generic.png

0.3 KB

pdf_16.png

0.3 KB

plusone.js

48.9 KB

postmessageRelay.htm

0.7 KB

slides_16.png

1.3 KB

twitter-icon.jpeg

1.7 KB

usenix-locked.png

1.4 KB

wendy_nather_headshot.jpg

12.0 KB

widgets.js

98.4 KB

woot16_button.png

27.0 KB

youtube-icon.jpg

1.7 KB

/.../WOOT 2016 Workshop Program USENIX_files/postmessageRelay_data/

829555168-postmessagerelay.js

10.0 KB

cbgapi.loaded_0

54.7 KB

rpcshindig_random.js

13.0 KB

/WOOT 2016/presentations/

A Rising Tide Design Exploits in Industrial Control Systems - Alexander Bolshev, Jason Larsen, Marina Krotofil, Reid Wightman.pdf

9.4 MB

A Rising Tide Design Exploits in Industrial Control Systems Slides - Alexander Bolshev, Jason Larsen, Marina Krotofil, Reid Wightman.pdf

3.3 MB

A Security Analysis of an In-Vehicle Infotainment and App Platform - Sahar Mazloom, Mohammad Rezaeirad, Aaron Hunter, Damon McCoy.pdf

8.9 MB

A Security Analysis of an In-Vehicle Infotainment and App Platform Slides - Sahar Mazloom, Mohammad Rezaeirad, Aaron Hunter, Damon McCoy.pdf

24.0 MB

AVLeak Fingerprinting Antivirus Emulators through Black-Box Testing - Jeremy Blackthorne, Alexei Bulazel, Andrew Fasano, Patrick Biernat, Bulent Yener.pdf

134.8 KB

AVLeak Fingerprinting Antivirus Emulators through Black-Box Testing Slides - Jeremy Blackthorne, Alexei Bulazel, Andrew Fasano, Patrick Biernat Bulent Yener.pdf

4.5 MB

Abusing Public Third-Party Services for EDoS Attacks - Huangxin Wang, Zhonghua Xi, Fei Li, Songqing Chen.pdf

2.5 MB

Abusing Public Third-Party Services for EDoS Attacks Slides - Huangxin Wang, Zhonghua Xi, Fei Li, and Songqing Chen.pdf

2.0 MB

Acceleration Attacks on PBKDF2 Or, What Is inside the Black-Box of oclHashcat - Andrew Ruddick, Jeff Yan.pdf

854.5 KB

Acceleration Attacks on PBKDF2 Or, What Is inside the Black-Box of oclHashcat Slides - Andrew Ruddick, Jeff Yan.pdf

1.1 MB

Controlling UAVs with Sensor Input Spoofing Attacks - Drew Davidson, Hao Wu, Robert Jellinek, Thomas Ristenpart, Vikas Singh.pdf

390.8 KB

Controlling UAVs with Sensor Input Spoofing Attacks Slides - Drew Davidson, Hao Wu, Robert Jellinek, Thomas Ristenpart, Vikas Singh.pdf

13.1 MB

DDoSCoin Cryptocurrency with a Malicious Proof-of-Work - Eric Wustrow, Benjamin VanderSloot.pdf

817.8 KB

DDoSCoin Cryptocurrency with a Malicious Proof-of-Work Slides - Eric Wustrow, Benjamin VanderSloot.pdf

420.2 KB

Eavesdropping One-Time Tokens Over Magnetic Secure Transmission in Samsung Pay - Daeseon Choi, Younho Lee.pdf

1.3 MB

Eavesdropping One-Time Tokens Over Magnetic Secure Transmission in Samsung Pay Slides - Daeseon Choi, Younho Lee.pdf

1.9 MB

Eavesdropping on Fine-Grained User Activities Within Smartphone Apps Over Encrypted Network Traffic - Brendan Saltaformaggio, Hongjun Choi, Kristen Johnson, Yonghwi Kwon, Qi Zhang, Xiangyu Zhan.pdf

253.7 KB

Eavesdropping on Fine-Grained User Activities Within Smartphone Apps Over Encrypted Network Traffic Slides - Brendan Saltaformaggio, Hongjun Choi, Kristen Johnson, Yonghwi Kwon, Qi Zhang, Xiang.pdf

1.6 MB

Fillory of PHY Toward a Periodic Table of Signal Corruption Exploits and Polyglots in Digital Radio - Sergey Bratus, Travis Goodspeed, Ange Albertini, Debanjum S. Solansky.pdf

1.6 MB

Hardware-Assisted Rootkits Abusing Performance Counters on the ARM and x86 Architectures - Matt Spisak.pdf

281.5 KB

Hardware-Assisted Rootkits Abusing Performance Counters on the ARM and x86 Architectures Slides - Matt Spisak.pdf

1.3 MB

How to Break Microsoft Rights Management Services - Martin Grothe, Christian Mainka, Paul Rosler, Jorg Schwenk.pdf

3.9 MB

How to Break Microsoft Rights Management Services Slides - Martin Grothe, Christian Mainka, Paul Rosler, Jorg Schwenk.pdf

5.7 MB

How to Phone Home with Someone Elses Phone Information Exfiltration Using Intentional Sound Noise on Gyroscopic Sensors - Benyamin Farshteindiker, Nir Hasidim, Asaf Grosz, Yossi Oren.pdf

2.3 MB

How to Phone Home with Someone Elses Phone Information Exfiltration Using Intentional Sound Noise on Gyroscopic Sensors Slides - Benyamin Farshteindiker, Nir Hasidim, Asaf Grosz, Yossi Oren.pdf

6.5 MB

Non-Deterministic Timers for Hardware Trojan Activation (or How a Little Randomness Can Go the Wrong Way) - Frank Imeson, Saeed Nejati, Siddharth Garg, Mahesh Tripunitara.pdf

518.8 KB

Non-Deterministic Timers for Hardware Trojan Activation (or How a Little Randomness Can Go the Wrong Way) Slides - Frank Imeson, Saeed Nejati, Siddharth Garg, Mahesh Tripunitara.pdf

6.1 MB

Nonce-Disrespecting Adversaries Practical Forgery Attacks on GCM in TLS - Hanno Bock; Aaron Zauner, Juraj Somorovsky, Philipp Jovanovic.pdf

214.2 KB

Nonce-Disrespecting Adversaries Practical Forgery Attacks on GCM in TLS Slides - Hanno Bock; Aaron Zauner, Juraj Somorovsky, Philipp Jovanovic.pdf

819.1 KB

Putting LTE Security Functions to the Test A Framework to Evaluate Implementation Correctness - David Rupprecht, Kai Jansen, Christina Popper.pdf

3.2 MB

Putting LTE Security Functions to the Test A Framework to Evaluate Implementation Correctness Slides - David Rupprecht, Kai Jansen, Christina Popper.pdf

2.5 MB

Retelling the Retail Security Story Slides - Wendy Nather.pdf

11.0 MB

Sampling Race Bypassing Timing-Based Analog Active Sensor Spoofing Detection on Analog-Digital Systems - Hocheol Shin, Yunmok Son, Youngseok Park, Yujin Kwon, Yongdae Kim.pdf

543.8 KB

Sampling Race Bypassing Timing-Based Analog Active Sensor Spoofing Detection on Analog-Digital Systems Slides - Hocheol Shin, Yunmok Son, Youngseok Park, Yujin Kwon, Yongdae Kim.pdf

1.9 MB

SoK XML Parser Vulnerabilities - Christopher Spath, Christian Mainka, Vladislav Mladenov, Jorg Schwenk.pdf

433.3 KB

SoK XML Parser Vulnerabilities Slides - Christopher Spath, Christian Mainka, Vladislav Mladenov, Jorg Schwenk.pdf

4.2 MB

Stagefright An Android Exploitation Case Study - Joshua J. Drake.pdf

471.0 KB

This Aint Your Dose Sensor Spoofing Attack on Medical Infusion Pump - Youngseok Park, Yunmok Son, Hocheol Shin, Dohyun Kim, Yongdae Kim.pdf

2.4 MB

This Aint Your Dose Sensor Spoofing Attack on Medical Infusion Pump Slides - Youngseok Park, Yunmok Son, Hocheol Shin, Dohyun Kim, Yongdae Kim.pdf

9.5 MB

Truck Hacking An Experimental Analysis of the SAE J1939 Standard - Yelizaveta Burakova, Bill Hass, Leif Millar, Andre Weimerskirch.pdf

1.2 MB

Truck Hacking An Experimental Analysis of the SAE J1939 Standard Slides - Yelizaveta Burakova, Bill Hass, Leif Millar, Andre Weimerskirch.pdf

6.4 MB

malWASH Washing Malware to Evade Dynamic Analysis - Kyriakos K. Ispoglou, Mathias Payer.pdf

668.0 KB

malWASH Washing Malware to Evade Dynamic Analysis Slides - Kyriakos K. Ispoglou, Mathias Payer.pdf

1.2 MB

/WOOT 2017/

WOOT 2017 USENIX.htm

74.0 KB

WOOT 2017 Workshop Program USENIX.htm

152.0 KB

/.../WOOT 2017 USENIX_files/

analytics.js

45.2 KB

css_Tvyih1Dm489siBROXzFSkKUCFbsEK9kCr0p3JDiev80.css

129.3 KB

css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css

4.3 KB

css_mMMIpDBXDqo0rCZrN7FoMlBPY0tKvHCE04XYURHXl9M.css

610.1 KB

css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css

3.8 KB

css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css

5.4 KB

font-awesome.css

26.7 KB

js_1_m_mRX0UrchQnV5E0UZ6141Ts6jK5YnRLQe7J2kaX4.js

14.3 KB

js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js

20.5 KB

js_AQDKCRqaqaAAAzbvxcaEQBooKEQA-dFTfff7tzCklI8.js

14.0 KB

js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js

26.8 KB

js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js

120.3 KB

js_zsU7pE_En9PuEzx00IjN_iCxIwgABAiEwJNkh1iTG9k.js

8.2 KB

sheraton_vancouver_600_0.png

487.7 KB

usenix_logo_300x150_neat_2.png

15.0 KB

woot17_button_180x180_0.png

6.7 KB

woot17_logo_wordmark.png

7.2 KB

woot17_logo_wordmark_002.png

4.2 KB

/.../WOOT 2017 Workshop Program USENIX_files/

analytics.js

45.2 KB

application-pdf.png

0.3 KB

css_Tvyih1Dm489siBROXzFSkKUCFbsEK9kCr0p3JDiev80.css

129.3 KB

css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css

4.3 KB

css_mMMIpDBXDqo0rCZrN7FoMlBPY0tKvHCE04XYURHXl9M.css

610.1 KB

css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css

3.8 KB

css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css

5.4 KB

font-awesome.css

26.7 KB

js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js

20.5 KB

js_AQDKCRqaqaAAAzbvxcaEQBooKEQA-dFTfff7tzCklI8.js

14.0 KB

js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js

26.8 KB

js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js

120.3 KB

js_fjSBcoQiz2s5JFYU7Z0v2w3fhgZkax8CZA1Fi71bsVc.js

15.9 KB

js_zsU7pE_En9PuEzx00IjN_iCxIwgABAiEwJNkh1iTG9k.js

8.2 KB

package-x-generic.png

0.3 KB

pdf.svg

0.5 KB

slides.svg

0.7 KB

usenix-locked.png

1.4 KB

wisniewski_chester_100x115.png

23.8 KB

woot17_logo_wordmark.png

4.2 KB

/WOOT 2017/presentations/

Adversarial Example Defense Ensembles of Weak Defenses are not Strong - Warren He, James Wei, Xinyun Chen, Nicholas Carlini, Dawn Song.pdf

348.4 KB

Adversarial Example Defense Ensembles of Weak Defenses are not Strong Slides - Warren He, James Wei, Xinyun Chen, Nicholas Carlini, Dawn Song.pdf

2.5 MB

AutoCTF Creating Diverse Pwnables via Automated Bug Injection - Patrick Hulin, Andy Davis, Rahul Sridhar, Andrew Fasano, Cody Gallagher, Aaron Sedlacek, Tim Leek, Brendan Dolan-Gavitt.pdf

141.8 KB

Automated PCB Reverse Engineering - Stephan Kleber, Henrik Ferdinand Nolscher, Frank Kargl.pdf

10.5 MB

BADFET Defeating Modern Secure Boot Using Second-Order Pulsed Electromagnetic Fault Injection - Ang Cui, Rick Housley.pdf

14.8 MB

Breaking (and Fixing) a Widely Used Continuous Glucose Monitoring System - Luca Reverberi, David Oswald.pdf

1.0 MB

Breaking and Fixing Gridcoin - Martin Grothe, Tobias Niemann, Juraj Somorovsky, Jorg Schwenk.pdf

977.9 KB

Breaking and Fixing Gridcoin Slides - Martin Grothe, Tobias Niemann, Juraj Somorovsky, Jorg Schwenk.pdf

4.7 MB

Exploitations of Uninitialized Uses on macOS Sierra - Zhenquan Xu, Gongshen Liu, Tielei Wang, Hao Xu.pdf

3.0 MB

Exploitations of Uninitialized Uses on macOS Sierra Slides - Zhenquan Xu, Gongshen Liu, Tielei Wang, Hao Xu.pdf

6.1 MB

From random block corruption to privilege escalation A filesystem attack vector for rowhammer-like attacks - Anil Kurmus, Nikolas Ioannou, Matthias Neugschwandtner, Nikolaos Papandreou, Thomas.pdf

428.6 KB

Leveraging Flawed Tutorials for Seeding Large-Scale Web Vulnerability Discovery - Tommi Unruh, Bhargava Shastry, Malte Skoruppa, Federico Maggi, Konrad Rieck, Jean-Pierre Seifert, Fabian Yamagu.pdf

484.5 KB

Leveraging Flawed Tutorials for Seeding Large-Scale Web Vulnerability Discovery Slide - Tommi Unruh, Bhargava Shastry, Malte Skoruppa, Federico Maggi, Konrad Rieck, Jean-Pierre Seifert, Fabian.pdf

318.4 KB

One Car, Two Frames Attacks on Hitag-2 Remote Keyless Entry Systems Revisited - Ryad Benadjila, Mathieu Renard, Jose Lopes-Esteves, Chaouki Kasmi.pdf

1.5 MB

One Car, Two Frames Attacks on Hitag-2 Remote Keyless Entry Systems Revisited Slides - Ryad Benadjila, Mathieu Renard, Jose Lopes-Esteves, Chaouki Kasmi.pdf

7.2 MB

One Side-Channel to Bring Them All and in the Darkness Bind Them Associating Isolated Browsing Sessions - Tom Van Goethem, Wouter Joosen.pdf

527.7 KB

POTUS Probing Off-The-Shelf USB Drivers with Symbolic Fault Injection - James Patrick-Evans, Lorenzo Cavallaro, Johannes Kinder.pdf

402.2 KB

POTUS Probing Off-The-Shelf USB Drivers with Symbolic Fault Injection Slides - James Patrick-Evans, Lorenzo Cavallaro, Johannes Kinder.pdf

7.8 MB

SPEAKE(a)R Turn Speakers to Microphones for Fun and Profit - Mordechai Guri, Yosef Solewicz, Andrey Daidakulov, Yuval Elovici.pdf

1.5 MB

Shattered Trust When Replacement Smartphone Components Attack - Omer Shwartz, Amir Cohen, Asaf Shabtai, Yossi Oren.pdf

1.3 MB

Shattered Trust When Replacement Smartphone Components Attack Slides - Omer Shwartz, Amir Cohen, Asaf Shabtai, Yossi Oren.pdf

4.3 MB

Shedding too much Light on a Microcontrollers Firmware Protection - Johannes Obermaier, Stefan Tatschner.pdf

2.6 MB

Shedding too much Light on a Microcontrollers Firmware Protection Slides - Johannes Obermaier, Stefan Tatschner.pdf

5.0 MB

Software Grand Exposure SGX Cache Attacks Are Practical - Ferdinand Brasser, Urs Muller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, Ahmad-Reza Sadeghi.pdf

1.1 MB

Stalling Live Migrations on the Cloud - Ahmed Atya, Azeem Aqil, Karim Khalil, Zhiyun Qian, Srikanth V. Krishnamurthy, Thomas F. La Porta.pdf

181.3 KB

Static Exploration of Taint-Style Vulnerabilities Found by Fuzzing - Bhargava Shastry, Federico Maggi, Fabian Yamaguchi, Konrad Rieck, Jean-Pierre Seifert.pdf

227.1 KB

Static Exploration of Taint-Style Vulnerabilities Found by Fuzzing Slides - Bhargava Shastry, Federico Maggi, Fabian Yamaguchi, Konrad Rieck, Jean-Pierre Seifert.pdf

736.5 KB

White-Stingray Evaluating IMSI Catchers Detection Applications - Shinjo Park, Altaf Shaik, Ravishankar Borgaonkar, Andrew Martin, Jean-Pierre Seifert.pdf

1.3 MB

White-Stingray Evaluating IMSI Catchers Detection Applications Slides - Shinjo Park, Altaf Shaik, Ravishankar Borgaonkar, Andrew Martin, Jean-Pierre Seifert.pdf

6.9 MB

dr0wned - Cyber-Physical Attack with Additive Manufacturing - Sofia Belikovetsky, Mark Yampolskiy, Jinghui Toh, Jacob Gatlin, Yuval Elovici.pdf

3.9 MB

dr0wned - Cyber-Physical Attack with Additive Manufacturing Slides - Sofia Belikovetsky, Mark Yampolskiy, Jinghui Toh, Jacob Gatlin, Yuval Elovici.pdf

8.5 MB

fastboot oem vuln Android Bootloader Vulnerabilities in Vendor Customizations - Roee Hay.pdf

745.2 KB

unCaptcha A Low-Resource Defeat of reCaptcha's Audio Challenge - Kevin Bock, Daven Patel, George Hughey, Dave Levin.pdf

729.3 KB

/WOOT 2018/

WOOT 2018 USENIX.htm

86.6 KB

WOOT 2018 Workshop Program USENIX.htm

153.3 KB

/.../WOOT 2018 USENIX_files/

analytics.js

45.2 KB

css_Tvyih1Dm489siBROXzFSkKUCFbsEK9kCr0p3JDiev80.css

129.3 KB

css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css

4.3 KB

css_mMMIpDBXDqo0rCZrN7FoMlBPY0tKvHCE04XYURHXl9M.css

610.1 KB

css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css

3.8 KB

css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css

5.4 KB

font-awesome.css

26.7 KB

js_1_m_mRX0UrchQnV5E0UZ6141Ts6jK5YnRLQe7J2kaX4.js

14.3 KB

js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js

20.5 KB

js_AQDKCRqaqaAAAzbvxcaEQBooKEQA-dFTfff7tzCklI8.js

14.0 KB

js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js

26.8 KB

js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js

120.3 KB

js_zsU7pE_En9PuEzx00IjN_iCxIwgABAiEwJNkh1iTG9k.js

8.2 KB

rossow-christian_200x230_0.png

20.0 KB

sec18_hotel.png

500.5 KB

usenix_logo_300x150_neat_2.png

15.0 KB

woot18_logo_wordmark_0.png

6.5 KB

woot18_logo_wordmark_0_002.png

3.3 KB

younan_yves_200x230_0.png

21.4 KB

/.../WOOT 2018 Workshop Program USENIX_files/

analytics.js

45.2 KB

application-pdf.png

0.3 KB

css_Tvyih1Dm489siBROXzFSkKUCFbsEK9kCr0p3JDiev80.css

129.3 KB

css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css

4.3 KB

css_mMMIpDBXDqo0rCZrN7FoMlBPY0tKvHCE04XYURHXl9M.css

610.1 KB

css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css

3.8 KB

css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css

5.4 KB

dai-zovi_dino_200x230.png

22.5 KB

evans_david_200x230.jpg

12.8 KB

font-awesome.css

26.7 KB

js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js

20.5 KB

js_AQDKCRqaqaAAAzbvxcaEQBooKEQA-dFTfff7tzCklI8.js

14.0 KB

js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js

26.8 KB

js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js

120.3 KB

js_fjSBcoQiz2s5JFYU7Z0v2w3fhgZkax8CZA1Fi71bsVc.js

15.9 KB

js_zsU7pE_En9PuEzx00IjN_iCxIwgABAiEwJNkh1iTG9k.js

8.2 KB

package-x-generic.png

0.3 KB

pdf.svg

0.5 KB

slides.svg

0.7 KB

usenix-locked.png

1.4 KB

woot18_logo_wordmark_0.png

3.3 KB

/WOOT 2018/presentations/

A Feasibility Study of Radio-frequency Retroreflector Attack - Satohiro Wakabayashi, Seita Maruyama, Tatsuya Mori, Shigeki Goto, Masahiro Kinugawa, Yu-ichi Hayashi.pdf

1.9 MB

A Feasibility Study of Radio-frequency Retroreflector Attack Slides - Satohiro Wakabayashi, Seita Maruyama, Tatsuya Mori, Shigeki Goto, Masahiro Kinugawa, Yu-ichi Hayashi.pdf

3.3 MB

Bitter Harvest Systematically Fingerprinting Low and Medium interaction Honeypots at Internet Scale - Alexander Vetterl, Richard Clayton.pdf

655.5 KB

Bitter Harvest Systematically Fingerprinting Low and Medium interaction Honeypots at Internet Scale Slides - Alexander Vetterl, Richard Clayton.pdf

1.8 MB

Browser history revisited - Michael Smith, Craig Disselkoen, Shravan Narayan, Fraser Brown, Deian Stefan.pdf

294.2 KB

Browser history revisited Slides - Michael Smith, Craig Disselkoen, Shravan Narayan, Fraser Brown, Deian Stefan.pdf

10.7 MB

Fishy Faces Crafting Adversarial Images to Poison Face Authentication - Giuseppe Garofalo, Vera Rimmer, Tim Van hamme, Davy Preuveneers, Wouter Joosen.pdf

9.4 MB

Fishy Faces Crafting Adversarial Images to Poison Face Authentication Slides - Giuseppe Garofalo, Vera Rimmer, Tim Van hamme, Davy Preuveneers, Wouter Joosen.pdf

1.1 MB

Hitag 2 Hell - Brutally Optimizing Guess-and-Determine Attacks - Aram Verstegen, Roel Verdult, Wouter Bokslag.pdf

460.6 KB

Hitag 2 Hell - Brutally Optimizing Guess-and-Determine Attacks Slides - Aram Verstegen, Roel Verdult, Wouter Bokslag.pdf

1.5 MB

Mutually Assured Destruction and the Impending AI Apocalypse Slides - David Evans.pdf

2.4 MB

NEMESYS Network Message Syntax Reverse Engineering by Analysis of the Intrinsic Structure of Individual Messages - Stephan Kleber, Henning Kopp, Frank Kargl.pdf

366.5 KB

NEMESYS Network Message Syntax Reverse Engineering by Analysis of the Intrinsic Structure of Individual Messages Slides - Stephan Kleber, Henning Kopp, Frank Kargl.pdf

978.1 KB

Optimizing Recurrent Pulsing Attacks using Application-Layer Amplification of Open DNS Resolvers - Jonas Bushart.pdf

451.5 KB

Optimizing Recurrent Pulsing Attacks using Application-Layer Amplification of Open DNS Resolvers Slides - Jonas Bushart.pdf

4.8 MB

Physical Adversarial Examples for Object Detectors - Kevin Eykholt, Ivan Evtimov, Earlence Fernandes, Bo Li, Amir Rahmati, Florian Tramer, Atul Prakash, Tadayoshi Kohno, Dawn Song.pdf

4.8 MB

Physical Adversarial Examples for Object Detectors Slides - Kevin Eykholt, Ivan Evtimov, Earlence Fernandes, Bo Li, Amir Rahmati, Florian Tramer, Atul Prakash, Tadayoshi Kohno, Dawn Song.pdf

1.7 MB

Rode0day Slides - Andrew Fasano.pdf

2.4 MB

Security Analysis of eIDAS - The Cross-Country Authentication Scheme in Europe - Nils Engelbertz, Nurullah Erinola, David Herring, Juraj Somorovsky, Vladislav Mladenov, Jorg Schwenk.pdf

1.2 MB

Security Analysis of eIDAS - The Cross-Country Authentication Scheme in Europe Slides - Nils Engelbertz, Nurullah Erinola, David Herring, Juraj Somorovsky, Vladislav Mladenov, Jorg Schwenk.pdf

2.0 MB

Sensorless, Permissionless Information Exfiltration with Wi-Fi Micro-Jamming - Rom Ogen, Omer Shvartz, Kfir Zvi, Yossi Oren.pdf

1.4 MB

Sensorless, Permissionless Information Exfiltration with Wi-Fi Micro-Jamming Slides - Rom Ogen, Omer Shvartz, Kfir Zvi, Yossi Oren.pdf

2.8 MB

SoK Make JIT-Spray Great Again - Robert Gawlik, Thorsten Holz.pdf

218.5 KB

SoK Make JIT-Spray Great Again Slides - Robert Gawlik, Thorsten Holz.pdf

940.7 KB

Spectre Returns Speculation Attacks using the Return Stack Buffer - Esmaeil Mohammadian Koruyeh, Khaled N. Khasawneh, Chengyu Song, Nael Abu-Ghazaleh.pdf

724.9 KB

Spectre Returns Speculation Attacks using the Return Stack Buffer Slides - Esmaeil Mohammadian Koruyeh, Khaled N. Khasawneh, Chengyu Song, Nael Abu-Ghazaleh.pdf

2.4 MB

Swipe Your Fingerprints How Biometric Authentication Simplifies Payment, Access and Identity Fraud - Julian Fietkau, Starbug, Jean-Pierre Seifert.pdf

1.6 MB

Swipe Your Fingerprints How Biometric Authentication Simplifies Payment, Access and Identity Fraud Slides - Julian Fietkau, Starbug, Jean-Pierre Seifert.pdf

12.3 MB

Symbolic Execution of Security Protocol Implementations Handling Cryptographic Primitives - Mathy Vanhoef, Frank Piessens.pdf

174.3 KB

Symbolic Execution of Security Protocol Implementations Handling Cryptographic Primitives Slides - Mathy Vanhoef, Frank Piessens.pdf

1.2 MB

Tools for Active and Passive Network Side-Channel Detection for Web Applications - Michael Lescisin, Qusay Mahmoud.pdf

324.1 KB

Tools for Active and Passive Network Side-Channel Detection for Web Applications Slides - Michael Lescisin, Qusay Mahmoud.pdf

986.2 KB

Universal Radio Hacker A Suite for Analyzing and Attacking Stateful Wireless Protocols - Johannes Pohl, Andreas Noack.pdf

2.3 MB

Universal Radio Hacker A Suite for Analyzing and Attacking Stateful Wireless Protocols Slides - Johannes Pohl, Andreas Noack.pdf

5.0 MB

You Snooze, You Lose Measuring PLC Cycle Times under Attacks - Matthias Niedermaier, Jan-Ole Malchow, Florian Fischer, Daniel Marzin, Dominik Merli, Volker Roth, Alexander von Bodisco.pdf

613.5 KB

You Snooze, You Lose Measuring PLC Cycle Times under Attacks Slides - Matthias Niedermaier, Jan-Ole Malchow, Florian Fischer, Daniel Marzin, Dominik Merli, Volker Roth, Alexander von Bodisco.pdf

2.2 MB

/WOOT 2019/

WOOT 2019 USENIX.htm

86.6 KB

WOOT 2019 Workshop Program USENIX.htm

148.6 KB

/.../WOOT 2019 USENIX_files/

analytics.js

45.2 KB

css_Tvyih1Dm489siBROXzFSkKUCFbsEK9kCr0p3JDiev80.css

129.3 KB

css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css

4.3 KB

css_mMMIpDBXDqo0rCZrN7FoMlBPY0tKvHCE04XYURHXl9M.css

610.1 KB

css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css

3.8 KB

css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css

5.4 KB

font-awesome.css

26.7 KB

gantman_alex_200x230.jpg

10.8 KB

hyatt_santa_clara_600_neat_4.png

560.8 KB

js_1_m_mRX0UrchQnV5E0UZ6141Ts6jK5YnRLQe7J2kaX4.js

14.3 KB

js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js

20.5 KB

js_AQDKCRqaqaAAAzbvxcaEQBooKEQA-dFTfff7tzCklI8.js

14.0 KB

js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js

26.8 KB

js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js

120.3 KB

js_zsU7pE_En9PuEzx00IjN_iCxIwgABAiEwJNkh1iTG9k.js

8.2 KB

maurice_clementine_200x230.jpg

12.0 KB

usenix_logo_300x150_neat_2.png

15.0 KB

woot19_logo_wordmark_yellow.png

4.4 KB

woot19_logo_wordmark_yellow_002.png

6.4 KB

/.../WOOT 2019 Workshop Program USENIX_files/

analytics.js

45.2 KB

application-pdf.png

0.3 KB

css_Tvyih1Dm489siBROXzFSkKUCFbsEK9kCr0p3JDiev80.css

129.3 KB

css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css

4.3 KB

css_mMMIpDBXDqo0rCZrN7FoMlBPY0tKvHCE04XYURHXl9M.css

610.1 KB

css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css

3.8 KB

css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css

5.4 KB

font-awesome.css

26.7 KB

js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js

20.5 KB

js_AQDKCRqaqaAAAzbvxcaEQBooKEQA-dFTfff7tzCklI8.js

14.0 KB

js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js

26.8 KB

js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js

120.3 KB

js_fjSBcoQiz2s5JFYU7Z0v2w3fhgZkax8CZA1Fi71bsVc.js

15.9 KB

js_zsU7pE_En9PuEzx00IjN_iCxIwgABAiEwJNkh1iTG9k.js

8.2 KB

package-x-generic.png

0.3 KB

pdf.svg

0.5 KB

slides.svg

0.7 KB

usenix-locked.png

1.4 KB

woot19_logo_wordmark_yellow.png

4.4 KB

/WOOT 2019/presentations/

A better zip bomb - David Fifield.pdf

1.5 MB

Alternative (ab)uses for HTTP Alternative Services - Trishita Tiwari, Ari Trachtenberg.pdf

610.9 KB

Alternative (ab)uses for HTTP Alternative Services Sides - Trishita Tiwari, Ari Trachtenberg.pdf

1.7 MB

Automatic Wireless Protocol Reverse Engineering - Johannes Pohl, Andreas Noack.pdf

1.7 MB

Automatic Wireless Protocol Reverse Engineering Slides - Johannes Pohl, Andreas Noack.pdf

1.3 MB

Breaking Turtles All the Way Down An Exploitation Chain to Break out of VMware ESXi - Hanqing Zhao, Yanyu Zhang, Kun Yang, Taesoo Kim.pdf

336.7 KB

Cross-Router Covert Channels - Adar Ovadia, Rom Ogen, Yakov Mallah, Niv Gilboa, Yossi Oren.pdf

2.3 MB

D-TIME Distributed Threadless Independent Malware Execution for Runtime Obfuscation - Jithin Pavithran, Milan Patnaik, Chester Rebeiro.pdf

1.5 MB

D-TIME Distributed Threadless Independent Malware Execution for Runtime Obfuscation Slides - Jithin Pavithran, Milan Patnaik, Chester Rebeiro.pdf

1.4 MB

Defeating Cisco Trust Anchor A Case-Study of Recent Advancements in Direct FPGA Bitstream Manipulation - Jatin Kataria, Rick Housley, Joseph Pantoga, Ang Cui.pdf

2.1 MB

Distributed Password Hash Computation on Commodity Heterogeneous Programmable Platforms - Branimir Pervan, Josip Knezovic, Katja Pericin.pdf

1.4 MB

How Sharp is SHARP - Dixit Kumar, Chavhan Sujeet Yashavant, Biswabandan Panda, Vishal Gupta.pdf

726.5 KB

How Sharp is SHARP Slides - Dixit Kumar, Chavhan Sujeet Yashavant, Biswabandan Panda, Vishal Gupta.pdf

1.8 MB

MIN()imum Failure EMFI Attacks against USB Stacks - Colin OFlynn.pdf

7.0 MB

RISC-V AlphanumericShellcoding - Hadrien Barral, Remi Geraud-Stewart, Georges-Axel Jaloyan, David Naccache.pdf

540.4 KB

Taking a Look into Execute-Only Memory - Marc Schink, Johannes Obermaier.pdf

216.6 KB

Taking a Look into Execute-Only Memory Slides - Marc Schink, Johannes Obermaier.pdf

615.5 KB

Two methods for exploiting speculative control flow hijacks - Andrea Mambretti, Alexandra Sandulescu, Matthias Neugschwandtner, Alessandro Sorniotti, Anil Kurmus.pdf

213.4 KB

Two methods for exploiting speculative control flow hijacks Slides - Andrea Mambretti, Alexandra Sandulescu, Matthias Neugschwandtner, Alessandro Sorniotti, Anil Kurmus.pdf

1.0 MB

Unicorefuzz On the Viability of Emulation for Kernelspace Fuzzing - Dominik Maier, Benedikt Radtke, Bastian Harren.pdf

1.6 MB

Unicorefuzz On the Viability of Emulation for Kernelspace Fuzzing Slides - Dominik Maier, Benedikt Radtke, Bastian Harren.pdf

1.9 MB

Vacuums in the Cloud Analyzing Security in a Hardened IoT Ecosystem - Fabian Ullrich, Jiska Classen, Johannes Eger, Matthias Hollick.pdf

2.0 MB

Vacuums in the Cloud Analyzing Security in a Hardened IoT Ecosystem Slides - Fabian Ullrich, Jiska Classen, Johannes Eger, Matthias Hollick.pdf

1.5 MB

Who Spent My EOS On the (In)Security of Resource Management of EOS.IO - Sangsup Lee, Daejun Kim, Dongkwan Kim, Sooel Son, Yongdae Kim.pdf

563.0 KB

Who Spent My EOS On the (In)Security of Resource Management of EOS.IO Slides - Sangsup Lee, Daejun Kim, Dongkwan Kim, Sooel Son, Yongdae Kim.pdf

2.6 MB

/WOOT 2020/

WOOT 20 - AFL++ Combining Incremental Steps of Fuzzing Research.mp4

31.1 MB

WOOT 20 - Automatic Generation of Compact Printable Shellcodes for x86.mp4

19.5 MB

WOOT 20 - BLESA Spoofing Attacks against Reconnections in Bluetooth Low Energy.mp4

20.4 MB

WOOT 20 - Bankrupt Covert Channel Turning Network Predictability into Vulnerability.mp4

23.0 MB

WOOT 20 - Exploiting Uses of Uninitialized Stack Variables in Linux Kernels to Leak Kernel Pointers.eng.srt

28.2 KB

WOOT 20 - Exploiting Uses of Uninitialized Stack Variables in Linux Kernels to Leak Kernel Pointers.mp4

17.2 MB

WOOT 20 - Firmware Insider Bluetooth Randomness is Mostly Random.mp4

38.3 MB

WOOT 20 - Hardware Security Is Hard How Hardware Boundaries Define Platform Security.mp4

46.7 MB

WOOT 20 - NFCGate Opening the Door for NFC Security Research with a Smartphone-Based Toolkit.mp4

22.7 MB

WOOT 20 - OS Security Is Hard Why All the Fuzzers in the World Wont Change the Way....mp4

47.0 MB

WOOT 20 - Office Document Security and Privacy.mp4

16.2 MB

WOOT 20 - One Exploit to Rule them All On the Security of Drop-in Replacement and Counterfeit....mp4

28.9 MB

WOOT 20 - ToothPicker Apple Picking in the iOS Bluetooth Stack.mp4

21.9 MB

WOOT 20 - Unearthing the TrustedCore A Critical Review on Huawei’s Trusted Execution Environment.mp4

19.1 MB

WOOT 20 - When Is a Proof Actually Not.mp4

37.2 MB

WOOT 20 - When Oblivious is Not Attacks against OPAM.eng.srt

38.6 KB

WOOT 20 - When Oblivious is Not Attacks against OPAM.mp4

25.7 MB

WOOT 2020 USENIX.htm

71.4 KB

/.../WOOT 2020 USENIX_files/

analytics.js

45.2 KB

boston_marriott_copley_place_600.jpg

132.7 KB

css_Tvyih1Dm489siBROXzFSkKUCFbsEK9kCr0p3JDiev80.css

129.3 KB

css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css

4.3 KB

css_mMMIpDBXDqo0rCZrN7FoMlBPY0tKvHCE04XYURHXl9M.css

610.1 KB

css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css

3.8 KB

css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css

5.4 KB

font-awesome.css

26.7 KB

js_1_m_mRX0UrchQnV5E0UZ6141Ts6jK5YnRLQe7J2kaX4.js

14.3 KB

js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js

20.5 KB

js_AQDKCRqaqaAAAzbvxcaEQBooKEQA-dFTfff7tzCklI8.js

14.0 KB

js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js

26.8 KB

js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js

120.3 KB

js_zsU7pE_En9PuEzx00IjN_iCxIwgABAiEwJNkh1iTG9k.js

8.2 KB

usenix_logo_300x150_neat_2.png

15.0 KB

woot20_logo_wordmark.png

11.5 KB

woot20_logo_wordmark_002.png

4.2 KB

yarom_yuval_200x230.png

23.8 KB

zennou_sarah_200x230_1.png

22.5 KB

 

Total files 928


Copyright © 2024 FileMood.com