Abstract is missing.
- Two methods for exploiting speculative control flow hijacksAndrea Mambretti, Alexandra Sandulescu, Matthias Neugschwandtner, Alessandro Sorniotti, Anil Kurmus. [doi]
- How Sharp is SHARP ?Dixit Kumar, Chavhan Sujeet Yashavant, Biswabandan Panda, Vishal Gupta. [doi]
- Distributed Password Hash Computation on Commodity Heterogeneous Programmable PlatformsBranimir Pervan, Josip Knezovic, Katja Pericin. [doi]
- MIN()imum Failure: EMFI Attacks against USB StacksColin O'Flynn. [doi]
- Automatic Wireless Protocol Reverse EngineeringJohannes Pohl, Andreas Noack. [doi]
- Who Spent My EOS? On the (In)Security of Resource Management of EOS.IOSangsup Lee, Daejun Kim, Dongkwan Kim, Sooel Son, Yongdae Kim. [doi]
- Vacuums in the Cloud: Analyzing Security in a Hardened IoT EcosystemFabian Ullrich, Jiska Classen, Johannes Eger, Matthias Hollick. [doi]
- A better zip bombDavid Fifield. [doi]
- Taking a Look into Execute-Only MemoryMarc Schink, Johannes Obermaier. [doi]
- D-TIME: Distributed Threadless Independent Malware Execution for Runtime ObfuscationJithin Pavithran, Milan Patnaik, Chester Rebeiro. [doi]
- Breaking Turtles All the Way Down: An Exploitation Chain to Break out of VMware ESXiHanqing Zhao, Yanyu Zhang, Kun Yang, Taesoo Kim. [doi]
- Alternative (ab)uses for HTTP Alternative ServicesTrishita Tiwari, Ari Trachtenberg. [doi]
- RISC-V: #AlphanumericShellcodingHadrien Barral, Rémi Géraud-Stewart, Georges-Axel Jaloyan, David Naccache. [doi]
- Defeating Cisco Trust Anchor: A Case-Study of Recent Advancements in Direct FPGA Bitstream ManipulationJatin Kataria, Rick Housley, Joseph Pantoga, Ang Cui. [doi]
- Unicorefuzz: On the Viability of Emulation for Kernelspace FuzzingDominik Maier, Benedikt Radtke, Bastian Harren. [doi]
- Cross-Router Covert ChannelsAdar Ovadia, Rom Ogen, Yakov Mallah, Niv Gilboa, Yossi Oren. [doi]