Author of the publication

Operating Channel Validation: Preventing Multi-Channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks.

, , , , and . WISEC, page 34-39. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Operating Channel Validation: Preventing Multi-Channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks., , , , and . WISEC, page 34-39. ACM, (2018)Let numbers tell the tale: measuring security trends in wi-fi networks and best practices., , and . WISEC, page 100-105. ACM, (2021)Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote Connections., , , and . USENIX Security Symposium, page 1985-2002. USENIX Association, (2020)Advanced Wi-Fi attacks using commodity hardware., and . ACSAC, page 256-265. ACM, (2014)Discovering Logical Vulnerabilities in the Wi-Fi Handshake Using Model-Based Testing., , and . AsiaCCS, page 360-371. ACM, (2017)The Closer You Look, The More You Learn: A Grey-box Approach to Protocol State Machine Learning., , , , , and . CCS, page 2265-2278. ACM, (2022)Symbolic Execution of Security Protocol Implementations: Handling Cryptographic Primitives., and . WOOT @ USENIX Security Symposium, USENIX Association, (2018)All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLS., and . USENIX ATC, USENIX Association, (2016)Practical verification of WPA-TKIP vulnerabilities., and . AsiaCCS, page 427-436. ACM, (2013)Time Will Tell: Exploiting Timing Leaks Using HTTP Response Headers., , and . ESORICS (2), volume 14345 of Lecture Notes in Computer Science, page 3-22. Springer, (2023)