Mathy Vanhoef
Title
Cited by
Cited by
Year
Key reinstallation attacks: Forcing nonce reuse in WPA2
M Vanhoef, F Piessens
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communicationsá…, 2017
3162017
Why MAC address randomization is not enough: An analysis of Wi-Fi network discovery mechanisms
M Vanhoef, C Matte, M Cunche, LS Cardoso, F Piessens
Proceedings of the 11th ACM on Asia conference on computer andá…, 2016
1742016
Advanced Wi-Fi attacks using commodity hardware
M Vanhoef, F Piessens
Proceedings of the 30th Annual Computer Security Applications Conferenceá…, 2014
972014
All your biases belong to us: Breaking rc4 in wpa-tkip and {TLS}
M Vanhoef, F Piessens
24th {USENIX} Security Symposium ({USENIX} Security 15), 97-112, 2015
892015
Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd
M Vanhoef, E Ronen
2020 IEEE Symposium on Security and Privacy (SP), 517-533, 2020
54*2020
Practical verification of WPA-TKIP vulnerabilities
M Vanhoef, F Piessens
Proceedings of the 8th ACM SIGSAC symposium on Information, computer andá…, 2013
522013
Defeating MAC address randomization through timing attacks
C Matte, M Cunche, F Rousseau, M Vanhoef
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless andá…, 2016
492016
Stateful declassification policies for event-driven programs
M Vanhoef, W De Groef, D Devriese, F Piessens, T Rezk
2014 IEEE 27th Computer Security Foundations Symposium, 293-307, 2014
462014
Predicting, decrypting, and abusing WPA2/802.11 group keys
M Vanhoef, F Piessens
25th {USENIX} Security Symposium ({USENIX} Security 16), 673-688, 2016
352016
Release the Kraken: new KRACKs in the 802.11 Standard
M Vanhoef, F Piessens
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communicationsá…, 2018
332018
Request and conquer: Exposing cross-origin resource size
T Van Goethem, M Vanhoef, F Piessens, W Joosen
25th {USENIX} Security Symposium ({USENIX} Security 16), 447-462, 2016
202016
Discovering logical vulnerabilities in the Wi-Fi handshake using model-based testing
M Vanhoef, D Schepers, F Piessens
Proceedings of the 2017 ACM on Asia Conference on Computer andá…, 2017
162017
HEIST: HTTP Encrypted Information can be Stolen through TCP-windows
M Vanhoef, T Van Goethem
Black Hat US Briefings, Location: Las Vegas, USA, 2016
162016
Operating channel validation: preventing Multi-Channel Man-in-the-Middle attacks against protected Wi-Fi networks
M Vanhoef, N Bhandaru, T Derham, I Ouzieli, F Piessens
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless andá…, 2018
132018
Symbolic execution of security protocol implementations: handling cryptographic primitives
M Vanhoef, F Piessens
12th {USENIX} Workshop on Offensive Technologies ({WOOT} 18), 2018
112018
Key Reinstallation Attacks Breaking WPA2 by forcing nonce reuse
M Vanhoef
2018-08-21]. https://www. krackattacks. com, 2017
112017
Denial-of-service attacks against the 4-way wi-fi handshake
M Vanhoef, F Piessens
Proceedings of the 9th International Conference on Network andá…, 2017
72017
Practical Side-Channel Attacks against WPA-TKIP
D Schepers, A Ranganathan, M Vanhoef
Proceedings of the 2019 ACM Asia Conference on Computer and Communicationsá…, 2019
52019
A Security Analysis of the WPA-TKIP and TLS Security Protocols
M Vanhoef
KU Leuven, 2016
42016
Timeless timing attacks: Exploiting concurrency to leak secrets over remote connections
T Van Goethem, C P÷pper, W Joosen, M Vanhoef
29th {USENIX} Security Symposium ({USENIX} Security 20), 1985-2002, 2020
32020
The system can't perform the operation now. Try again later.
Articles 1–20