USENIX Security '18 - BlackIoT: IoT Botnet of High Wattage Devices Can Disrupt the Power Grid

CS6263: With High Power Comes High ResponsibilityПодробнее

CS6263: With High Power Comes High Responsibility

USENIX Security '19 - Not Everything is Dark and Gloomy: Power Grid Protections Against IoTПодробнее

USENIX Security '19 - Not Everything is Dark and Gloomy: Power Grid Protections Against IoT

Not-so-Smart Home: How a botnet of high wattage IoT devices can be used to attack the power gridПодробнее

Not-so-Smart Home: How a botnet of high wattage IoT devices can be used to attack the power grid

Paper presentaion blackiot cwang720Подробнее

Paper presentaion blackiot cwang720

USENIX Security '22 - MaDIoT 2.0: Modern High-Wattage IoT Botnet Attacks and DefensesПодробнее

USENIX Security '22 - MaDIoT 2.0: Modern High-Wattage IoT Botnet Attacks and Defenses

USENIX Security '18 - Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service...Подробнее

USENIX Security '18 - Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service...

USENIX Security '18 - BlackIoT: IoT Botnet of High Wattage Devices Can Disrupt the Power GridПодробнее

USENIX Security '18 - BlackIoT: IoT Botnet of High Wattage Devices Can Disrupt the Power Grid

USENIX Security '18 - Acquisitional Rule-based Engine for Discovering Internet-of-Things DevicesПодробнее

USENIX Security '18 - Acquisitional Rule-based Engine for Discovering Internet-of-Things Devices

USENIX Security '18 - Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the ComputerПодробнее

USENIX Security '18 - Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the Computer

USENIX Security '24 - SmartCookie: Blocking Large-Scale SYN Floods with a Split-Proxy Defense...Подробнее

USENIX Security '24 - SmartCookie: Blocking Large-Scale SYN Floods with a Split-Proxy Defense...

USENIX Security '18 - The Battle for New York: A Case Study of Applied Digital Threat Modeling...Подробнее

USENIX Security '18 - The Battle for New York: A Case Study of Applied Digital Threat Modeling...

IoT Skimmer: Energy Market Manipulation through High-Wattage IoT BotnetsПодробнее

IoT Skimmer: Energy Market Manipulation through High-Wattage IoT Botnets

USENIX Security '18 - BurnBox: Self-Revocable Encryption in a World Of Compelled AccessПодробнее

USENIX Security '18 - BurnBox: Self-Revocable Encryption in a World Of Compelled Access

USENIX Security '23 - HorusEye: A Realtime IoT Malicious Traffic Detection Framework using...Подробнее

USENIX Security '23 - HorusEye: A Realtime IoT Malicious Traffic Detection Framework using...

USENIX Security '18 - Who Is Answering My Queries: Understanding and Characterizing Interception...Подробнее

USENIX Security '18 - Who Is Answering My Queries: Understanding and Characterizing Interception...

USENIX Security '24 - MultiFuzz: A Multi-Stream Fuzzer For Testing Monolithic FirmwareПодробнее

USENIX Security '24 - MultiFuzz: A Multi-Stream Fuzzer For Testing Monolithic Firmware