Tweetovi

Blokirali ste korisnika/cu @pily112

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @pily112

  1. proslijedio/la je Tweet
    15. sij

    WiSec'20 deadline is approaching! Paper submission deadline: February 28, 2020 CfP:

    Poništi
  2. proslijedio/la je Tweet
    12. sij

    Mobile network security requires not only secure specifications but also secure confis & ops

    Poništi
  3. proslijedio/la je Tweet
    10. sij
    Poništi
  4. 28. lis 2019.

    For all telco sec ppl: What is the reason for disabling the encryption of data bearers after the SMC? 'cipheringDisabled If included, ciphering is disabled for this DRB regardless of which ciphering algorithm is configured for the SRB/DRBs'TS38.331

    Poništi
  5. proslijedio/la je Tweet

    Die Hackergruppe hat mehrere Dax-Konzerne im Visier. Wie sie bei ihren Angriffen vorgeht, haben Moritz Contag und vom zusammen mit und aufgedeckt. (📷 : Mareen Meyer) ^kg

    Poništi
  6. proslijedio/la je Tweet
    23. srp 2019.

    19.06 is freshly squeezed. Get source () or binaries (). Check out our new project website , docs and swag !!

    Poništi
  7. proslijedio/la je Tweet
    9. srp 2019.

    New open source tool for LTE, GSM and 3G mobile radio monitoring and protocol analysis in Python: QCsuper

    Poništi
  8. proslijedio/la je Tweet
    5. srp 2019.

    May I present to you Dr.-Ing. Katharina Kohls () who just successfully defended her thesis on „Internet Anonymity and Privacy in the Presence of Large-Scale Adversaries“

    Poništi
  9. proslijedio/la je Tweet
    2. srp 2019.

    Also take a look at the excellent report done by penetration testers , with !

    Poništi
  10. proslijedio/la je Tweet
    22. svi 2019.

    Now on stage: presenting LTE attacks such as identity mapping, website fingerprinting, and the aLTEr attack. Full paper is available at

    Poništi
  11. 16. svi 2019.

    Today, also Merlin presents our work on network mis-configuration at . We found severe configuration flaws in deployed networks. Providers can now test their network with our testing tool: based on

    Poništi
  12. 16. svi 2019.

    Today, presents our work (, Christina Pöpper) on LTE traffic fingerprinting and watermarking at . We found privacy implications based on LTE meta data.

    Poništi
  13. proslijedio/la je Tweet
    6. svi 2019.

    With 29 papers and 33 posters/demos, ACM WiSec has an amazing program this year. Check out the details here:

    Poništi
  14. 2. svi 2019.

    Ohh, our "Breaking on Layer Two" preview video for by is online: 😀

    Poništi
  15. proslijedio/la je Tweet
    23. tra 2019.

    2more papers on security. Awesome follow-up work from the team behind attack & more kerfunkle by tracking traffic with the like I proposed a few years ago. More excellent work based on open-source tools like I predicted ()

    Poništi
  16. 23. tra 2019.

    Thank you for your awesome LTE stack allowing practical LTE research :)

    Prikaži ovu nit
    Poništi
  17. 23. tra 2019.
    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    10. tra 2019.

    Me and discovered several flaws in WPA3. Read more about it at Or you can read our paper!

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    9. tra 2019.

    I am happy to share that our paper with and got accepted to AsiaCCS 2019. The paper demonstrates new attacks against WPA-TKIP and is yet another evidence that there is no way to secure TKIP and we should all move on.

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    29. ožu 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·