Key reinstallation attacks: Forcing nonce reuse in WPA2 M Vanhoef, F Piessens Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017 | 568 | 2017 |
Why MAC address randomization is not enough: An analysis of Wi-Fi network discovery mechanisms M Vanhoef, C Matte, M Cunche, LS Cardoso, F Piessens Proceedings of the 11th ACM on Asia conference on computer and …, 2016 | 300 | 2016 |
Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd M Vanhoef, E Ronen 2020 IEEE Symposium on Security and Privacy (SP), 517-533, 2020 | 192* | 2020 |
Advanced Wi-Fi attacks using commodity hardware M Vanhoef, F Piessens Proceedings of the 30th Annual Computer Security Applications Conference …, 2014 | 167 | 2014 |
All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLS M Vanhoef, F Piessens 24th USENIX Security Symposium (USENIX Security 15), 97-112, 2015 | 114 | 2015 |
Defeating MAC address randomization through timing attacks C Matte, M Cunche, F Rousseau, M Vanhoef Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and …, 2016 | 105 | 2016 |
Release the Kraken: new KRACKs in the 802.11 Standard M Vanhoef, F Piessens Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 80 | 2018 |
Practical verification of WPA-TKIP vulnerabilities M Vanhoef, F Piessens Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013 | 72 | 2013 |
Predicting, Decrypting, and Abusing WPA2/802.11 Group Keys M Vanhoef, F Piessens 25th USENIX security symposium (USENIX security 16), 673-688, 2016 | 55 | 2016 |
Stateful declassification policies for event-driven programs M Vanhoef, W De Groef, D Devriese, F Piessens, T Rezk 2014 IEEE 27th Computer Security Foundations Symposium, 293-307, 2014 | 49 | 2014 |
Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation M Vanhoef 30th USENIX Security Symposium (USENIX Security 21), 161-178, 2021 | 43 | 2021 |
Request and conquer: Exposing cross-origin resource size T Van Goethem, M Vanhoef, F Piessens, W Joosen 25th USENIX Security Symposium (USENIX Security 16), 447-462, 2016 | 42 | 2016 |
Timeless timing attacks: Exploiting concurrency to leak secrets over remote connections T Van Goethem, C Pöpper, W Joosen, M Vanhoef 29th USENIX Security Symposium (USENIX Security 20), 1985-2002, 2020 | 36 | 2020 |
Operating channel validation: Preventing multi-channel man-in-the-middle attacks against protected Wi-Fi networks M Vanhoef, N Bhandaru, T Derham, I Ouzieli, F Piessens Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and …, 2018 | 35 | 2018 |
HEIST: HTTP Encrypted Information can be Stolen through TCP-windows M Vanhoef, T Van Goethem Black Hat US Briefings, Location: Las Vegas, USA, 2016 | 33 | 2016 |
Protecting wi-fi beacons from outsider forgeries M Vanhoef, P Adhikari, C Pöpper Proceedings of the 13th ACM Conference on Security and Privacy in Wireless …, 2020 | 30 | 2020 |
Discovering logical vulnerabilities in the Wi-Fi handshake using model-based testing M Vanhoef, D Schepers, F Piessens Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017 | 30 | 2017 |
On the robustness of Wi-Fi deauthentication countermeasures D Schepers, A Ranganathan, M Vanhoef Proceedings of the 15th ACM conference on security and privacy in wireless …, 2022 | 24 | 2022 |
Key reinstallation attacks breaking wpa2 by forcing nonce reuse M Vanhoef KU Leuven August, 2017 | 21 | 2017 |
Symbolic execution of security protocol implementations: Handling cryptographic primitives M Vanhoef, F Piessens 12th USENIX Workshop on Offensive Technologies (WOOT 18), 2018 | 19 | 2018 |