Folgen
Jos Wetzels
Jos Wetzels
Graduate student, Kerckhoffs Institute for Computer Security
Bestätigte E-Mail-Adresse bei student.tue.nl
Titel
Zitiert von
Zitiert von
Jahr
Challenges in designing exploit mitigations for deeply embedded systems
A Abbasi, J Wetzels, T Holz, S Etalle
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 31-46, 2019
602019
On emulation-based network intrusion detection systems
A Abbasi, J Wetzels, W Bokslag, E Zambon, S Etalle
Research in Attacks, Intrusions and Defenses: 17th International Symposium …, 2014
292014
Broken keys to the kingdom: Security and privacy aspects of RFID-based car keys
J Wetzels
arXiv preprint arXiv:1405.7424, 2014
262014
Simple SIMON: FPGA implementations of the SIMON 64/128 Block Cipher
J Wetzels, W Bokslag
arXiv preprint arXiv:1507.06368, 2015
222015
Open sesame: The password hashing competition and Argon2
J Wetzels
arXiv preprint arXiv:1602.03097, 2016
202016
Where's Crypto?: Automated Identification and Classification of Proprietary Cryptographic Primitives in Binary Code
C Meijer, V Moonsamy, J Wetzels
30th USENIX Security Symposium (USENIX Security 21), 555-572, 2021
102021
Hidden in snow, revealed in thaw: Cold boot attacks revisited
J Wetzels
arXiv preprint arXiv:1408.0725, 2014
62014
NAME: WRECK-Breaking and fixing DNS implementations
D dos Santos, S Dashevskyi, A Amri, J Wetzels, S Oberman, M Kol
Forescout, 2021
52021
Amnesia: 33 How TCP/IP Stacks Breed Critical Vulnerabilities in IoT, OT and IT Devices
D dos Santos, S Dashevskyi, J Wetzels, A Amri
Forescout Research Labs, 2021
52021
Shield: Configurable Code-Reuse Attacks Mitigation For Embedded Systems
A Abbasi, J Wetzels, W Bokslag, E Zambon, S Etalle
International Conference on Network and System Security, 694-709, 2017
52017
Internet of Pwnable things: challenges in embedded binary security
J Wetzels
USENIX; login 42 (02), 73-77, 2017
52017
Sponges and engines: an introduction to Keccak and Keyak
J Wetzels, W Bokslag
arXiv preprint arXiv:1510.02856, 2015
32015
Dissecting QNX
J Wetzels, A Abbasi
Proc. Blackhat Briefings, 1-22, 2018
22018
Ghost in the Machine: Challenges in Embedded Binary Security
J Wetzels
22017
APTs way: evading Your EBNIDS
A Abbasi, J Wetzel
Black Hat Europe, 1-87, 2014
22014
Insecure by design in the backbone of critical infrastructure
J Wetzels, D Dos Santos, M Ghafari
Proceedings of Cyber-Physical Systems and Internet of Things Week 2023, 7-12, 2023
12023
identifying & addressing challenges in embedded binary security
A Wetzels
Eindhoven, Netherlands: Eindhoven University of Technology, 2017
12017
All cops are broadcasting:{TETRA} under scrutiny
C Meijer, W Bokslag, J Wetzels
32nd USENIX Security Symposium (USENIX Security 23), 7463-7479, 2023
2023
RFC 9267 Common Implementation Anti-Patterns Related to Domain Name System (DNS) Resource Record (RR) Processing
S Dashevskyi, D dos Santos, J Wetzels, A Amri
2022
Sponges and Engines
J Wetzels, W Bokslag
2015
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20