Articles with public access mandates - Mathy VanhoefLearn more
Available somewhere: 23
Why MAC address randomization is not enough: An analysis of Wi-Fi network discovery mechanisms
M Vanhoef, C Matte, M Cunche, LS Cardoso, F Piessens
Proceedings of the 11th ACM on Asia conference on computer and …, 2016
Mandates: Research Foundation (Flanders)
Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd
M Vanhoef, E Ronen
2020 IEEE Symposium on Security and Privacy (SP), 517-533, 2020
Mandates: Research Foundation (Flanders)
Advanced Wi-Fi attacks using commodity hardware
M Vanhoef, F Piessens
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
Mandates: Research Foundation (Flanders)
All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLS
M Vanhoef, F Piessens
24th USENIX Security Symposium (USENIX Security 15), 97-112, 2015
Mandates: Research Foundation (Flanders)
Release the Kraken: new KRACKs in the 802.11 Standard
M Vanhoef, F Piessens
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
Mandates: Research Foundation (Flanders)
Practical verification of WPA-TKIP vulnerabilities
M Vanhoef, F Piessens
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
Mandates: Research Foundation (Flanders)
Predicting, Decrypting, and Abusing WPA2/802.11 Group Keys
M Vanhoef, F Piessens
25th USENIX security symposium (USENIX security 16), 673-688, 2016
Mandates: Research Foundation (Flanders)
Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation
M Vanhoef
30th USENIX Security Symposium (USENIX Security 21), 161-178, 2021
Mandates: Research Foundation (Flanders)
Stateful declassification policies for event-driven programs
M Vanhoef, W De Groef, D Devriese, F Piessens, T Rezk
2014 IEEE 27th Computer Security Foundations Symposium, 293-307, 2014
Mandates: Research Foundation (Flanders)
Timeless timing attacks: Exploiting concurrency to leak secrets over remote connections
T Van Goethem, C Pöpper, W Joosen, M Vanhoef
29th USENIX Security Symposium (USENIX Security 20), 1985-2002, 2020
Mandates: Research Foundation (Flanders)
Request and conquer: Exposing cross-origin resource size
T Van Goethem, M Vanhoef, F Piessens, W Joosen
25th USENIX Security Symposium (USENIX Security 16), 447-462, 2016
Mandates: Research Foundation (Flanders)
Operating channel validation: Preventing multi-channel man-in-the-middle attacks against protected Wi-Fi networks
M Vanhoef, N Bhandaru, T Derham, I Ouzieli, F Piessens
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and …, 2018
Mandates: Research Foundation (Flanders)
Protecting wi-fi beacons from outsider forgeries
M Vanhoef, P Adhikari, C Pöpper
Proceedings of the 13th ACM Conference on Security and Privacy in Wireless …, 2020
Mandates: Research Foundation (Flanders)
On the robustness of Wi-Fi deauthentication countermeasures
D Schepers, A Ranganathan, M Vanhoef
Proceedings of the 15th ACM conference on security and privacy in wireless …, 2022
Mandates: Research Foundation (Flanders)
Discovering logical vulnerabilities in the Wi-Fi handshake using model-based testing
M Vanhoef, D Schepers, F Piessens
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
Mandates: Research Foundation (Flanders)
Let numbers tell the tale: measuring security trends in wi-fi networks and best practices
D Schepers, A Ranganathan, M Vanhoef
Proceedings of the 14th ACM Conference on Security and Privacy in Wireless …, 2021
Mandates: US National Science Foundation
Symbolic execution of security protocol implementations: Handling cryptographic primitives
M Vanhoef, F Piessens
12th USENIX Workshop on Offensive Technologies (WOOT 18), 2018
Mandates: Research Foundation (Flanders)
Practical side-channel attacks against WPA-TKIP
D Schepers, A Ranganathan, M Vanhoef
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
Mandates: Research Foundation (Flanders)
The closer you look, the more you learn: A grey-box approach to protocol state machine learning
C McMahon Stone, SL Thomas, M Vanhoef, J Henderson, N Bailluet, ...
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
Mandates: UK Engineering and Physical Sciences Research Council
A time-memory trade-off attack on WPA3's SAE-PK
M Vanhoef
Proceedings of the 9th ACM on ASIA Public-Key Cryptography Workshop, 27-37, 2022
Mandates: Research Foundation (Flanders)
Publication and funding information is determined automatically by a computer program