-
abootool - simple tool to dynamically discover hidden fastboot OEM commands based on static knowledge
#woot17 https://github.com/alephsecurity/abootool …pic.twitter.com/iLKdCd1MnG -
Socializing done right at
@USENIXSecurity#usesec17#woot17 pic.twitter.com/xHiW2BNZ3E
-
Congrats to our student James Patrick-Evans for the best paper award at
#woot17!@lcavallaro@RHULCyberCDTpic.twitter.com/mQqqIeh5hc
-
Our research on static vulnerability discovery and IMSI catcher detectors will be presented at
#woot17! https://www.usenix.org/conference/woot17/workshop-program … -
The final talk of
#WOOT17 'fastboot oem vuln: Android Bootloader Vulnerabilities in Vendor Customizations' includes a live demo pic.twitter.com/BUDa7GGwGt
-
Kudos to James for
#woot17 Best Paper@USENIXSecurity on finding & exploiting bugs in USB drivers w/ sym fault inj /cc@johannes_kinder -
#woot17 @0x6D6172696F made it on the opening slides ;-) pic.twitter.com/zcbJW0oMpC
-
One Car, Two Frames: Attacks on Hitag-2 Remote Keyless Entry Systems Revisited https://www.usenix.org/system/files/conference/woot17/woot17-paper-benadjila.pdf … [PDF]
#woot17 pic.twitter.com/lSRANcMnOT
-
We can now safely say
#woot17#woot17 :-) https://twitter.com/johannes_kinder/status/897137905411424261 …
-
Omer is presenting our work on malicious smartphone components at
#woot17. Good luck! pic.twitter.com/oACUk6nFBz – mjesto: Sheraton Vancouver Wall Centre
-
very interesting and entertaining presentation
#woot17 by Ang Cui about BADFET: Defeating Modern Secure Boot Using Second-Order Pulsed EMFI -
White-Stingray: Evaluating IMSI Catchers Detection Applications https://www.usenix.org/system/files/conference/woot17/woot17-paper-park.pdf … [PDF]
#woot17 pic.twitter.com/4tZP38bTMy
-
Short version of "Breaking and Fixing Gridcoin" from
#woot17 now as blog post https://web-in-security.blogspot.ca/2017/08/gridcoin-good.html … with@jurajsomorovsky,@gotofailure -
Exploiting display drivers, more
#WOOT17 coverage https://twitter.com/dangoodin001/status/898533950749933568 … -
“One Side-Channel to Bring Them All and in the Darkness Bind Them”: premiering tomorrow at
#woot17#usesec17 https://tom.vg/papers/cross-browser-tracking_woot17.pdf …pic.twitter.com/mg958i2gKZ
-
Our BADFET EMFI WOOT paper is finally available! https://www.usenix.org/system/files/conference/woot17/woot17-paper-cui.pdf …
@USENIXSecurity#woot17@rickyhousley@angcui -
A filesystem block was randomly corrupted and you'll never guess what happened next! Come check out our talk tomorrow at
#woot17 :) -
Exploiting 2nd-stage unteth. secure boot & device locking bypass => root + PoC code
#WOOT17@roeehay@alephsecurity https://alephsecurity.com/2017/08/30/untethered-initroot/ … -
"If developers borrow code, they borrow vulns".
#woot17 -
Truth man!
#WOOT17
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.