Search Results
USENIX Security '19 - From IP ID to Device ID and KASLR Bypass
From IP ID to Device ID and KASLR Bypass- Amit Klein
USENIX Security '19 - Users Really Do Answer Telephone Scams
OSIRIS is moving under L1 GNSS Jammer (real)
USENIX Security '19 - SafeHidden: An Efficient and Secure Information Hiding Technique Using
PLATYPUS - Breaking KASLR with Intel RAPL
Write-not-what-only-where without any reads for KASLR bypass and root privesc
BlindSide - Exploit 1: Breaking KASLR with speculative probing to mount a kernel ROP exploit
PLATYPUS - Breaking KASLR with Intel RAPL
USENIX Security '19 - Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of
Device Localization Using Network Data Analysis
Topology, Service Discovery, and OS Fingerprinting