Home
Papertalks
About
Help
Improve
Upload
Login
Register
Login Required
×
You have to login to use this feature.
Title
Abstract
Keywords
Authors
exact
AAAI 2021
AACL 2020
ACCV 2020
ACL 2020
ACL Workshops
ACM-CHIL 2020
ACML 2020
AISTATS 2020
AISTATS 2021
AKBC 2020
BMVC 2020
BMVC 2021
CHI 2020
CIKM 2020
COLING 2020
COLING Workshops 2020
COLT 2020
COLT 2021
CoRL 2020
CVPR 2020
DCASE 2020
EACL 2021
ECML PKDD 2020
EMNLP 2020
ESWC 2020
FOCI 2020
HotCloud 2020
HotEdge 2020
HotStorage 2020
ICALP 2020
ICAPS 2020
ICFP 2020
ICLR 2020
ICLR 2021
ICML 2020
ICML 2021
ICN 2020
ICWSM 2020
ICWSM 2021
IJCAI 2021
ISMIR 2020
KDD 2020
KR 2020
L@S 2020
MIDL 2020
MLHC 2020
MLSYS 2021
MSML 2020
MSR 2020
NeurIPS 2020
NeurIPS 2021
OOPSLA 2020
OpML 2020
OSDI 2020
PLDI 2020
PLDI 2021
PODC 2020
POPL 2020
RECSYS 2020
SIGCOMM 2020
SIGDIAL 2020
SIGGRAPH 2020
SIGIR 2020
SOUPS 2020
SPAA 2020
STOC 2020
UAI 2020
USENIX ATC 2020
USENIX Security 2020
WACV 2021
WOOT 2020
WOOT 2020
Arts and Music
Biology
Chemistry
Computer Science
Economics
Engineering
Geoscience
History
Law
Humanities
Mathematics
Medical Sciences
Neuroscience
Physics
Politics
Psychology
Social Sciences
All dates
Today
Last week
Last month
Last year
Reset
Hide
Hide
Hide
Sort by:
Default
Date (upload)
Date (paper)
Likes
Stars
Views
Duration
Random
Search match
12
papertalks found
11/08/2020
BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy
Jianliang Wu
,
Yuhong Nan
,
Vireshwar Kumar
and
Dave (Jing) Tian
,
Antonio Bianchi
,
Mathias Payer
,
Dongyan Xu
Keywords
Abstract
Paper
17:33
11/08/2020
ToothPicker: Apple Picking in the iOS Bluetooth Stack
Dennis Heinze
,
Jiska Classen
,
Matthias Hollick
Keywords
Abstract
Paper
20:41
11/08/2020
When Oblivious is Not: Attacks against OPAM
Nirjhar Roy
,
Nikhil Bansal
,
Gourav Takhar
and
Nikhil Mittal
,
Pramod Subramanyan
Keywords
Abstract
Paper
21:04
11/08/2020
Firmware Insider: Bluetooth Randomness is Mostly Random
Jörn Tillmanns
,
Jiska Classen
,
Felix Rohrbach
,
Matthias Hollick
Keywords
Abstract
Paper
16:53
11/08/2020
Office Document Security and Privacy
Jens Müller
,
Fabian Ising
,
Christian Mainka
and
Vladislav Mladenov
,
Sebastian Schinzel
,
Jörg Schwenk
Keywords
Abstract
Paper
20:26
11/08/2020
One Exploit to Rule them All? On the Security of Drop-in Replacement and Counterfeit Microcontrollers
Johannes Obermaier
,
Marc Schink
,
Kosma Moczek
Keywords
Abstract
Paper
18:24
11/08/2020
Automatic Generation of Compact Printable Shellcodes for x86
Dhrumil Patel
,
Aditya Basu
,
Anish Mathuria
Keywords
Abstract
Paper
18:05
11/08/2020
AFL++ : Combining Incremental Steps of Fuzzing Research
Andrea Fioraldi
,
Dominik Maier
,
Heiko Eißfeldt; Marc Heuse
Keywords
Abstract
Paper
20:14
11/08/2020
Bankrupt Covert Channel: Turning Network Predictability into Vulnerability
Dmitrii Ustiugov
,
Plamen Petrov
,
M. R. Siavash Katebzadeh
,
Boris Grot
Keywords
Abstract
Paper
19:21
11/08/2020
Unearthing the TrustedCore: A Critical Review on Huawei’s Trusted Execution Environment
Marcel Busch
,
Johannes Westphal
,
Tilo Mueller
Keywords
Abstract
Paper
22:05
11/08/2020
NFCGate: Opening the Door for NFC Security Research with a Smartphone-Based Toolkit
Steffen Klee
,
Alexandros Roussos
,
Max Maass
,
Matthias Hollick
Keywords
Abstract
Paper
18:04
11/08/2020
Exploiting Uses of Uninitialized Stack Variables in Linux Kernels to Leak Kernel Pointers
Haehyun Cho
,
Jinbum Park
,
Joonwon Kang
and
Tiffany Bao
,
Ruoyu Wang
,
Yan Shoshitaishvili
,
Adam Doupé
,
Gail-Joon Ahn
Keywords
Abstract
Paper
18:00