- Cycle 1: December 12, 2025 *only one month away* !
- Cycle 2: March 3, 2026
WOOT still has a SoK track and an "Up-and-coming track" (~Industry), CFP for details:
www.usenix.org/conference/w...
- Cycle 1: December 12, 2025 *only one month away* !
- Cycle 2: March 3, 2026
WOOT still has a SoK track and an "Up-and-coming track" (~Industry), CFP for details:
www.usenix.org/conference/w...
- Soufian El Yadmani: SecurePoC—detecting malicious GitHub exploits
- Andrea Mambretti: SoK on kernel vuln discovery & auto exploit generation
- Junho Lee: BOOTKITTY—stealth bootkit-rootkit for modern OSes
- Soufian El Yadmani: SecurePoC—detecting malicious GitHub exploits
- Andrea Mambretti: SoK on kernel vuln discovery & auto exploit generation
- Junho Lee: BOOTKITTY—stealth bootkit-rootkit for modern OSes
- Gabriel Karl Gegenhuber: Prekey Pogo—WhatsApp handshake weaknesses
- Manuel Karl: Formula injection in real-world spreadsheets
- Jannik Hartung: PHP foot-gun case study (Best paper award !)
- Gabriel Karl Gegenhuber: Prekey Pogo—WhatsApp handshake weaknesses
- Manuel Karl: Formula injection in real-world spreadsheets
- Jannik Hartung: PHP foot-gun case study (Best paper award !)
- Valentin Huber: Deep dive into FRAM fault injection effects
- Boyapally Harishma: Side-channel reality check on ARM Cortex-A72
- Wooyeon Jo: PLC memory exploitation in industrial systems
- Valentin Huber: Deep dive into FRAM fault injection effects
- Boyapally Harishma: Side-channel reality check on ARM Cortex-A72
- Wooyeon Jo: PLC memory exploitation in industrial systems
- Mehrdad Hajizadeh: DeepRed: AI-driven red teaming vs ML-NIDS
- Shujie Zhao: Stealth BGP hijacks under uRPF
- Anqi Chen: FUZZVPN: Hunting OpenVPN vulns
- Mehrdad Hajizadeh: DeepRed: AI-driven red teaming vs ML-NIDS
- Shujie Zhao: Stealth BGP hijacks under uRPF
- Anqi Chen: FUZZVPN: Hunting OpenVPN vulns
- Tommaso Sacchetti on large scale Bluetooth Security Testing
- Chengsong Diao: Vulnerabilities in Master Lock Smart Locks
- Seyyed Ali Ayati Acoustic Side-Channel on keyboards
- Tommaso Sacchetti on large scale Bluetooth Security Testing
- Chengsong Diao: Vulnerabilities in Master Lock Smart Locks
- Seyyed Ali Ayati Acoustic Side-Channel on keyboards
Two talks on attacking the @raspberrypi.com RP2350 by @nsinusr.bsky.social and Andrew D. Zonenberg.
One talk on exploiting software using hardware fault injections by Zhenyuan Liu
Two talks on attacking the @raspberrypi.com RP2350 by @nsinusr.bsky.social and Andrew D. Zonenberg.
One talk on exploiting software using hardware fault injections by Zhenyuan Liu
The program prepared by @noopwafel.bsky.social and @naehrdine.bsky.social includes sessions on hardware security, wireless attacks, network security.
And tomorrow physical attacks, application security.
And Keynote by Falcon Darkstar Momot
The program prepared by @noopwafel.bsky.social and @naehrdine.bsky.social includes sessions on hardware security, wireless attacks, network security.
And tomorrow physical attacks, application security.
And Keynote by Falcon Darkstar Momot