Seguir
Mathy Vanhoef
Mathy Vanhoef
imec-DistriNet, KU Leuven
Dirección de correo verificada de nyu.edu - Página principal
Título
Citado por
Citado por
Año
Key reinstallation attacks: Forcing nonce reuse in WPA2
M Vanhoef, F Piessens
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
3922017
Why MAC address randomization is not enough: An analysis of Wi-Fi network discovery mechanisms
M Vanhoef, C Matte, M Cunche, LS Cardoso, F Piessens
Proceedings of the 11th ACM on Asia conference on computer and …, 2016
2152016
Advanced Wi-Fi attacks using commodity hardware
M Vanhoef, F Piessens
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
1202014
All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLS
M Vanhoef, F Piessens
24th USENIX Security Symposium (USENIX Security 15), 97-112, 2015
992015
Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd
M Vanhoef, E Ronen
2020 IEEE Symposium on Security and Privacy (SP), 517-533, 2020
90*2020
Defeating MAC address randomization through timing attacks
C Matte, M Cunche, F Rousseau, M Vanhoef
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and …, 2016
602016
Practical verification of WPA-TKIP vulnerabilities
M Vanhoef, F Piessens
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
592013
Release the Kraken: new KRACKs in the 802.11 Standard
M Vanhoef, F Piessens
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
472018
Stateful declassification policies for event-driven programs
M Vanhoef, W De Groef, D Devriese, F Piessens, T Rezk
2014 IEEE 27th Computer Security Foundations Symposium, 293-307, 2014
462014
Predicting, Decrypting, and Abusing WPA2/802.11 Group Keys
M Vanhoef, F Piessens
25th USENIX security symposium (USENIX security 16), 673-688, 2016
442016
Request and conquer: Exposing cross-origin resource size
T Van Goethem, M Vanhoef, F Piessens, W Joosen
25th USENIX Security Symposium (USENIX Security 16), 447-462, 2016
252016
Operating channel validation: preventing Multi-Channel Man-in-the-Middle attacks against protected Wi-Fi networks
M Vanhoef, N Bhandaru, T Derham, I Ouzieli, F Piessens
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and …, 2018
202018
HEIST: HTTP Encrypted Information can be Stolen through TCP-windows
M Vanhoef, T Van Goethem
Black Hat US Briefings, Location: Las Vegas, USA, 2016
202016
Discovering logical vulnerabilities in the Wi-Fi handshake using model-based testing
M Vanhoef, D Schepers, F Piessens
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
182017
Symbolic execution of security protocol implementations: handling cryptographic primitives
M Vanhoef, F Piessens
12th USENIX Workshop on Offensive Technologies (WOOT 18), 2018
142018
Key Reinstallation Attacks Breaking WPA2 by forcing nonce reuse
M Vanhoef, F Piessens
2018-08-21]. https://www. krackattacks. com, 2017
142017
Timeless timing attacks: Exploiting concurrency to leak secrets over remote connections
T Van Goethem, C Pöpper, W Joosen, M Vanhoef
29th USENIX Security Symposium (USENIX Security 20), 1985-2002, 2020
122020
Denial-of-service attacks against the 4-way Wi-Fi handshake
M Vanhoef, F Piessens
Proceedings of the 9th International Conference on Network and …, 2017
102017
Practical Side-Channel Attacks against WPA-TKIP
D Schepers, A Ranganathan, M Vanhoef
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
92019
Protecting wi-fi beacons from outsider forgeries
M Vanhoef, P Adhikari, C Pöpper
Proceedings of the 13th ACM Conference on Security and Privacy in Wireless …, 2020
82020
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20