Abstract is missing.
- Shattered Trust: When Replacement Smartphone Components AttackOmer Shwartz, Amir Cohen, Asaf Shabtai, Yossi Oren. [doi]
- unCaptcha: A Low-Resource Defeat of reCaptcha's Audio ChallengeKevin Bock, Daven Patel, George Hughey, Dave Levin. [doi]
- Adversarial Example Defense: Ensembles of Weak Defenses are not StrongWarren He, James Wei, Xinyun Chen, Nicholas Carlini, Dawn Song. [doi]
- One Car, Two Frames: Attacks on Hitag-2 Remote Keyless Entry Systems RevisitedRyad Benadjila, Mathieu Renard, José Lopes-Esteves, Chaouki Kasmi. [doi]
- fastboot oem vuln: Android Bootloader Vulnerabilities in Vendor CustomizationsRoee Hay. [doi]
- AutoCTF: Creating Diverse Pwnables via Automated Bug InjectionPatrick Hulin, Andy Davis, Rahul Sridhar, Andrew Fasano, Cody Gallagher, Aaron Sedlacek, Tim Leek, Brendan Dolan-Gavitt. [doi]
- SPEAKE(a)R: Turn Speakers to Microphones for Fun and ProfitMordechai Guri, Yosef A. Solewicz, Andrey Daidakulov, Yuval Elovici. [doi]
- BADFET: Defeating Modern Secure Boot Using Second-Order Pulsed Electromagnetic Fault InjectionAng Cui, Rick Housley. [doi]
- POTUS: Probing Off-The-Shelf USB Drivers with Symbolic Fault InjectionJames Patrick-Evans, Lorenzo Cavallaro, Johannes Kinder. [doi]
- From random block corruption to privilege escalation: A filesystem attack vector for rowhammer-like attacksAnil Kurmus, Nikolas Ioannou, Nikolaos Papandreou, Thomas P. Parnell. [doi]
- Stalling Live Migrations on the CloudAhmed Atya, Azeem Aqil, Karim Khalil, Zhiyun Qian, Srikanth V. Krishnamurthy, Thomas F. La Porta. [doi]
- Leveraging Flawed Tutorials for Seeding Large-Scale Web Vulnerability DiscoveryTommi Unruh, Bhargava Shastry, Malte Skoruppa, Federico Maggi, Konrad Rieck, Jean-Pierre Seifert, Fabian Yamaguchi. [doi]
- Software Grand Exposure: SGX Cache Attacks Are PracticalFerdinand Brasser, Urs Müller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, Ahmad-Reza Sadeghi. [doi]
- Breaking and Fixing GridcoinMartin Grothe, Tobias Niemann, Juraj Somorovsky, Jörg Schwenk. [doi]
- One Side-Channel to Bring Them All and in the Darkness Bind Them: Associating Isolated Browsing SessionsTom van Goethem, Wouter Joosen. [doi]
- dr0wned - Cyber-Physical Attack with Additive ManufacturingSofia Belikovetsky, Mark Yampolskiy, Jinghui Toh, Jacob Gatlin, Yuval Elovici. [doi]
- Exploitations of Uninitialized Uses on macOS SierraZhenquan Xu, Gongshen Liu, Tielei Wang, Hao Xu. [doi]
- Automated PCB Reverse EngineeringStephan Kleber, Henrik Ferdinand Nölscher, Frank Kargl. [doi]
- Static Exploration of Taint-Style Vulnerabilities Found by FuzzingBhargava Shastry, Federico Maggi, Fabian Yamaguchi, Konrad Rieck, Jean-Pierre Seifert. [doi]
- Breaking (and Fixing) a Widely Used Continuous Glucose Monitoring SystemLuca Reverberi, David Oswald. [doi]
- Shedding too much Light on a Microcontroller's Firmware ProtectionJohannes Obermaier, Stefan Tatschner. [doi]
- White-Stingray: Evaluating IMSI Catchers Detection ApplicationsShinjo Park, Altaf Shaik, Ravishankar Borgaonkar, Andrew Martin, Jean-Pierre Seifert. [doi]