Abstract is missing.
- Physical Adversarial Examples for Object DetectorsDawn Song, Kevin Eykholt, Ivan Evtimov, Earlence Fernandes, Bo Li 0044, Amir Rahmati, Florian Tramèr, Atul Prakash, Tadayoshi Kohno. [doi]
- Spectre Returns! Speculation Attacks using the Return Stack BufferEsmaeil Mohammadian Koruyeh, Khaled N. Khasawneh, Chengyu Song, Nael B. Abu-Ghazaleh. [doi]
- Fishy Faces: Crafting Adversarial Images to Poison Face AuthenticationGiuseppe Garofalo, Vera Rimmer, Tim Van hamme, Davy Preuveneers, Wouter Joosen. [doi]
- Hitag 2 Hell - Brutally Optimizing Guess-and-Determine AttacksAram Verstegen, Roel Verdult, Wouter Bokslag. [doi]
- Sensorless, Permissionless Information Exfiltration with Wi-Fi Micro-JammingRom Ogen, Kfir Zvi, Omer Shwartz, Yossi Oren. [doi]
- SoK: Make JIT-Spray Great AgainRobert Gawlik, Thorsten Holz. [doi]
- Swipe Your Fingerprints! How Biometric Authentication Simplifies Payment, Access and Identity FraudJulian Fietkau, Starbug, Jean-Pierre Seifert. [doi]
- NEMESYS: Network Message Syntax Reverse Engineering by Analysis of the Intrinsic Structure of Individual MessagesStephan Kleber, Henning Kopp, Frank Kargl. [doi]
- Symbolic Execution of Security Protocol Implementations: Handling Cryptographic PrimitivesMathy Vanhoef, Frank Piessens. [doi]
- Bitter Harvest: Systematically Fingerprinting Low- and Medium-interaction Honeypots at Internet ScaleAlexander Vetterl, Richard Clayton. [doi]
- A Feasibility Study of Radio-frequency Retroreflector AttackSatohiro Wakabayashi, Seita Maruyama, Tatsuya Mori, Shigeki Goto, Masahiro Kinugawa, Yu-ichi Hayashi. [doi]
- Universal Radio Hacker: A Suite for Analyzing and Attacking Stateful Wireless ProtocolsJohannes Pohl, Andreas Noack. [doi]
- Optimizing Recurrent Pulsing Attacks using Application-Layer Amplification of Open DNS ResolversJonas Bushart. [doi]
- You Snooze, You Lose: Measuring PLC Cycle Times under AttacksMatthias Niedermaier, Jan-Ole Malchow, Florian Fischer, Daniel Marzin, Dominik Merli, Volker Roth 0002, Alexander von Bodisco. [doi]
- Browser history re: visitedMichael Smith, Craig Disselkoen, Shravan Narayan, Fraser Brown, Deian Stefan. [doi]
- Security Analysis of eIDAS - The Cross-Country Authentication Scheme in EuropeNils Engelbertz, Nurullah Erinola, David Herring, Juraj Somorovsky, Vladislav Mladenov, Jörg Schwenk. [doi]
- Tools for Active and Passive Network Side-Channel Detection for Web ApplicationsMichael Lescisin, Qusay H. Mahmoud. [doi]