Abstract is missing.
- Acceleration Attacks on PBKDF2: Or, What Is inside the Black-Box of oclHashcat?Andrew Ruddick, Jeff Yan. [doi]
- Non-Deterministic Timers for Hardware Trojan Activation (or How a Little Randomness Can Go the Wrong Way)Frank Imeson, Saeed Nejati, Siddharth Garg, Mahesh V. Tripunitara. [doi]
- AVLeak: Fingerprinting Antivirus Emulators through Black-Box TestingJeremy Blackthorne, Alexei Bulazel, Andrew Fasano, Patrick Biernat, Bülent Yener. [doi]
- Eavesdropping One-Time Tokens Over Magnetic Secure Transmission in Samsung PayDaeseon Choi, YounHo Lee. [doi]
- DDoSCoin: Cryptocurrency with a Malicious Proof-of-WorkEric Wustrow, Benjamin VanderSloot. [doi]
- Hardware-Assisted Rootkits: Abusing Performance Counters on the ARM and x86 ArchitecturesMatt Spisak. [doi]
- A Rising Tide: Design Exploits in Industrial Control SystemsAlexander Bolshev, Jason Larsen, Marina Krotofil, Reid Wightman. [doi]
- This Ain't Your Dose: Sensor Spoofing Attack on Medical Infusion PumpYoung-Seok Park, Yunmok Son, Hocheol Shin, Dohyun Kim, Yongdae Kim. [doi]
- Abusing Public Third-Party Services for EDoS AttacksHuangxin Wang, Zhonghua Xi, Fei Li, Songqing Chen. [doi]
- Sampling Race: Bypassing Timing-Based Analog Active Sensor Spoofing Detection on Analog-Digital SystemsHocheol Shin, Yunmok Son, Young-Seok Park, Yujin Kwon, Yongdae Kim. [doi]
- SoK: XML Parser VulnerabilitiesChristopher Späth, Christian Mainka, Vladislav Mladenov, Jörg Schwenk. [doi]
- Controlling UAVs with Sensor Input Spoofing AttacksDrew Davidson, Hao Wu, Robert Jellinek, Vikas Singh, Thomas Ristenpart. [doi]
- Eavesdropping on Fine-Grained User Activities Within Smartphone Apps Over Encrypted Network TrafficBrendan Saltaformaggio, Hongjun Choi, Kristen Johnson, Yonghwi Kwon, Qi Zhang, Xiangyu Zhang, Dongyan Xu, John Qian. [doi]
- Fillory of PHY: Toward a Periodic Table of Signal Corruption Exploits and Polyglots in Digital RadioSergey Bratus, Travis Goodspeed, Ange Albertini, Debanjum S. Solanky. [doi]
- malWASH: Washing Malware to Evade Dynamic AnalysisKyriakos K. Ispoglou, Mathias Payer. [doi]
- How to Phone Home with Someone Else's Phone: Information Exfiltration Using Intentional Sound Noise on Gyroscopic SensorsBenyamin Farshteindiker, Nir Hasidim, Asaf Grosz, Yossi Oren. [doi]
- Putting LTE Security Functions to the Test: A Framework to Evaluate Implementation CorrectnessDavid Rupprecht, Kai Jansen, Christina Pöpper. [doi]
- How to Break Microsoft Rights Management ServicesMartin Grothe, Christian Mainka, Paul Rösler, Jörg Schwenk. [doi]
- Truck Hacking: An Experimental Analysis of the SAE J1939 StandardYelizaveta Burakova, Bill Hass, Leif Millar, André Weimerskirch. [doi]
- A Security Analysis of an In-Vehicle Infotainment and App PlatformSahar Mazloom, Mohammad Rezaeirad, Aaron Hunter, Damon McCoy. [doi]
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLSHanno Böck, Aaron Zauner, Sean Devlin, Juraj Somorovsky, Philipp Jovanovic. [doi]