Challenges in designing exploit mitigations for deeply embedded systems A Abbasi, J Wetzels, T Holz, S Etalle 2019 IEEE European Symposium on Security and Privacy (EuroS&P), 31-46, 2019 | 71 | 2019 |
On emulation-based network intrusion detection systems A Abbasi, J Wetzels, W Bokslag, E Zambon, S Etalle Research in Attacks, Intrusions and Defenses: 17th International Symposium …, 2014 | 32 | 2014 |
Broken keys to the kingdom: Security and privacy aspects of RFID-based car keys J Wetzels arXiv preprint arXiv:1405.7424, 2014 | 26 | 2014 |
Open sesame: The password hashing competition and Argon2 J Wetzels arXiv preprint arXiv:1602.03097, 2016 | 23 | 2016 |
Simple SIMON: FPGA implementations of the SIMON 64/128 Block Cipher J Wetzels, W Bokslag arXiv preprint arXiv:1507.06368, 2015 | 23 | 2015 |
Where's Crypto?: Automated Identification and Classification of Proprietary Cryptographic Primitives in Binary Code C Meijer, V Moonsamy, J Wetzels 30th USENIX Security Symposium (USENIX Security 21), 555-572, 2021 | 11 | 2021 |
All cops are broadcasting:{TETRA} under scrutiny C Meijer, W Bokslag, J Wetzels 32nd USENIX Security Symposium (USENIX Security 23), 7463-7479, 2023 | 6 | 2023 |
Amnesia: 33 How TCP/IP Stacks Breed Critical Vulnerabilities in IoT, OT and IT Devices D dos Santos, S Dashevskyi, J Wetzels, A Amri Forescout Research Labs, 2021 | 6 | 2021 |
Internet of Pwnable Things: Challenges in embedded binary security J Wetzels USENIX; login 42 (02), 73-77, 2017 | 6 | 2017 |
Hidden in snow, revealed in thaw: Cold boot attacks revisited J Wetzels arXiv preprint arXiv:1408.0725, 2014 | 6 | 2014 |
NAME: WRECK-Breaking and fixing DNS implementations D dos Santos, S Dashevskyi, A Amri, J Wetzels, S Oberman, M Kol Forescout, 2021 | 5 | 2021 |
Shield: Configurable Code-Reuse Attacks Mitigation For Embedded Systems A Abbasi, J Wetzels, W Bokslag, E Zambon, S Etalle International Conference on Network and System Security, 694-709, 2017 | 5 | 2017 |
Insecure by design in the backbone of critical infrastructure J Wetzels, D Dos Santos, M Ghafari Proceedings of Cyber-Physical Systems and Internet of Things Week 2023, 7-12, 2023 | 4 | 2023 |
Sponges and engines: an introduction to Keccak and Keyak J Wetzels, W Bokslag arXiv preprint arXiv:1510.02856, 2015 | 3 | 2015 |
Dissecting QNX J Wetzels, A Abbasi Proc. Blackhat Briefings, 1-22, 2018 | 2 | 2018 |
APTs way: evading Your EBNIDS A Abbasi, J Wetzel Black Hat Europe, 1-87, 2014 | 2 | 2014 |
Identifying & addressing challenges in embedded binary security A Wetzels Eindhoven, Netherlands: Eindhoven University of Technology, 2017 | 1 | 2017 |
Ghost in the Machine: Challenges in Embedded Binary Security J Wetzels | 1 | 2017 |
RFC 9267 Common Implementation Anti-Patterns Related to Domain Name System (DNS) Resource Record (RR) Processing S Dashevskyi, D dos Santos, J Wetzels, A Amri | | 2022 |
Sponges and Engines J Wetzels, W Bokslag | | 2015 |