Urmăriți
Mathy Vanhoef
Mathy Vanhoef
DistriNet, KU Leuven
Adresă de e-mail confirmată pe kuleuven.be - Pagina de pornire
Titlu
Citat de
Citat de
Anul
Key reinstallation attacks: Forcing nonce reuse in WPA2
M Vanhoef, F Piessens
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
6182017
Why MAC address randomization is not enough: An analysis of Wi-Fi network discovery mechanisms
M Vanhoef, C Matte, M Cunche, LS Cardoso, F Piessens
Proceedings of the 11th ACM on Asia conference on computer and …, 2016
3322016
Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd
M Vanhoef, E Ronen
2020 IEEE Symposium on Security and Privacy (SP), 517-533, 2020
223*2020
Advanced Wi-Fi attacks using commodity hardware
M Vanhoef, F Piessens
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
1852014
All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLS
M Vanhoef, F Piessens
24th USENIX Security Symposium (USENIX Security 15), 97-112, 2015
1222015
Defeating MAC address randomization through timing attacks
C Matte, M Cunche, F Rousseau, M Vanhoef
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and …, 2016
1182016
Release the Kraken: new KRACKs in the 802.11 Standard
M Vanhoef, F Piessens
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
922018
Practical verification of WPA-TKIP vulnerabilities
M Vanhoef, F Piessens
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
772013
Predicting, Decrypting, and Abusing WPA2/802.11 Group Keys
M Vanhoef, F Piessens
25th USENIX security symposium (USENIX security 16), 673-688, 2016
622016
Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation
M Vanhoef
30th USENIX Security Symposium (USENIX Security 21), 161-178, 2021
512021
Stateful declassification policies for event-driven programs
M Vanhoef, W De Groef, D Devriese, F Piessens, T Rezk
2014 IEEE 27th Computer Security Foundations Symposium, 293-307, 2014
502014
Timeless timing attacks: Exploiting concurrency to leak secrets over remote connections
T Van Goethem, C Pöpper, W Joosen, M Vanhoef
29th USENIX Security Symposium (USENIX Security 20), 1985-2002, 2020
442020
Request and conquer: Exposing cross-origin resource size
T Van Goethem, M Vanhoef, F Piessens, W Joosen
25th USENIX Security Symposium (USENIX Security 16), 447-462, 2016
432016
Operating channel validation: Preventing multi-channel man-in-the-middle attacks against protected Wi-Fi networks
M Vanhoef, N Bhandaru, T Derham, I Ouzieli, F Piessens
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and …, 2018
412018
Protecting wi-fi beacons from outsider forgeries
M Vanhoef, P Adhikari, C Pöpper
Proceedings of the 13th ACM Conference on Security and Privacy in Wireless …, 2020
362020
On the robustness of Wi-Fi deauthentication countermeasures
D Schepers, A Ranganathan, M Vanhoef
Proceedings of the 15th ACM conference on security and privacy in wireless …, 2022
352022
HEIST: HTTP Encrypted Information can be Stolen through TCP-windows
M Vanhoef, T Van Goethem
Black Hat US Briefings, Location: Las Vegas, USA, 2016
352016
Discovering logical vulnerabilities in the Wi-Fi handshake using model-based testing
M Vanhoef, D Schepers, F Piessens
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
312017
Key Reinstallation Attacks Breaking WPA2 by forcing nonce reuse
M Vanhoef, F Piessens
Proceedings of the ACM SIGSAC Conference on Computer and Communications …, 2017
242017
Let numbers tell the tale: measuring security trends in wi-fi networks and best practices
D Schepers, A Ranganathan, M Vanhoef
Proceedings of the 14th ACM Conference on Security and Privacy in Wireless …, 2021
212021
Sistemul nu poate realiza operația în acest moment. Încercați din nou mai târziu.
Articole 1–20