


default search action
19th WOOT @ USENIX Security Symposium 2025: Seattle, WA, USA
- Jiska Classen, Alyssa Milburn:

19th USENIX WOOT Conference on Offensive Technologies, WOOT 2025, Seattle, WA, USA, August 11-12, 2025. USENIX Association 2025
Hardware Security
- Marius Muench, Aedan Cullen, Kévin Courdesses, Thomas Roth, Andrew D. Zonenberg:

Security through Transparency: Tales from the RP2350 Hacking Challenge. 1-17 - Andrew D. Zonenberg, Antony Moor, Daniel Slone, Lain Agan, Mario Cop:

Extraction of Secrets from 40nm CMOS Gate Dielectric Breakdown Antifuses by FIB Passive Voltage Contrast. 19-33 - Zhenyuan Liu, Dillibabu Shanmugam, Patrick Schaumont:

GlitchGlück: Enabling Software Vulnerabilities through Guided Hardware Fault Injection. 35-50
Hacking at a Distance
- Vladyslav Zubkov, Tommaso Sacchetti, Daniele Antonioli, Martin Strohmeier:

Bluetooth Security Testing with BlueToolkit: a Large-Scale Automotive Case Study. 51-68 - Chengsong Diao, Danielle Dang, Sierra Lira, Angela Tsai, Miro Haller, Nadia Heninger:

No Key, No Problem: Vulnerabilities in Master Lock Smart Locks. 69-85 - Seyyed Ali Ayati, Jin Hyun Park, Yichen Cai, Marcus Botacin:

Making Acoustic Side-Channel Attacks on Noisy Keyboards Viable with LLM-Assisted Spectrograms' "Typo" Correction. 87-101
Network Security
- Mehrdad Hajizadeh, Pegah Golchin, Ehsan Nowroozi, Maria Rigaki, Veronica Valeros, Sebastián García, Mauro Conti, Thomas Bauschert:

DeepRed: A Deep Learning-Powered Command and Control Framework for Multi-Stage Red Teaming Against ML-based Network Intrusion Detection Systems. 103-127 - Haya Schulmann, Shujie Zhao:

Stealth BGP Hijacks with uRPF Filtering. 129-138 - Anqi Chen, Cristina Nita-Rotaru:

FUZZVPN: Finding Vulnerabilities in OpenVPN. 139-158
Physical Attacks
- Valentin Huber, Marc Schink:

Be Write Back: An in-depth Study of Fault Injection Effects on FRAM Technology. 159-177 - Harishma Boyapally, Dirmanto Jap, Qianmei Wu, Fan Zhang, Shivam Bhasin:

Reality Check on Side-Channels: Lessons learnt from breaking AES on ARM Cortex-A72 processor with Out-of-Order Execution. 179-189 - Wooyeon Jo, Irfan Ahmed:

Oops, It Halted Again: Exploiting PLC Memory for Fun and Profit in Industrial Control Systems. 191-207
Application Security
- Gabriel Karl Gegenhuber, Philipp É. Frenzel, Maximilian Günther, Aljosha Judmayer:

Prekey Pogo: Investigating Security and Privacy Issues in WhatsApp's Handshake Mechanism. 209-227 - Manuel Karl, Louis Bettels, Martin Johns, David Klein:

Comma Separated Vulnerabilities: Detecting Formula Injection in the Wild. 229-247 - Jannik Hartung, Simon Koch, Martin Johns:

Extract: A PHP Foot-Gun Case Study. 249-262
Exploit All the Things
- Soufian El Yadmani, Robin The, Olga Gadyatskaya:

SecurePoC: A Helping Hand to Identify Malicious CVE Proof of Concept Exploits in GitHub. 263-282 - Anil Kurmus, Andrea Mambretti, Alessandro Sorniotti, Vincent Lenders, Damian Pfammatter, Bernhard Tellenbach:

SoK: Automating Kernel Vulnerability Discovery and Exploit Generation. 283-302 - Junho Lee, Jihoon Kwon, Hyuna Seo, Myeongyeol Lee, Hyungyu Seo, Jinho Jung, Hyungjoon Koo:

BOOTKITTY: A Stealthy Bootkit-Rootkit Against Modern Operating Systems. 303-320

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














