-
1
-
-
85021442441
-
Meet the men who spy on women through their webcams
-
March
-
Nate Anderson. Meet the men who spy on women through their webcams. ars technica, March 2013. Online: http://arstechnica.com/tech-policy/2013/03/rat-breeders-meet-the-men-who-spy-on-women-through-their-webcams/.
-
(2013)
Ars Technica
-
-
Anderson, N.1
-
2
-
-
85076315940
-
-
May
-
I/O Kit Fundamentals: Driver and Device Matching. Apple Inc., May 2007. Online: https://developer.apple.com/library/mac/#documentation/devicedrivers/conceptual/IOKitFundamentals/Matching/Matching.html.
-
(2007)
I/O Kit Fundamentals: Driver and Device Matching
-
-
-
3
-
-
85076265028
-
-
February
-
QTKit Framework Reference. Apple Inc., February 2009. Online: http://developer.apple.com/library/mac/#documentation/QuickTime/Reference/QTCocoaObjCKit/_index.html.
-
(2009)
QTKit Framework Reference
-
-
-
4
-
-
85076282600
-
-
March
-
App Sandbox Design Guide. Apple Inc., March 2013. Online: http://developer.apple.com/library/mac/#documentation/Security/Conceptual/AppSandboxDesignGuide/AboutAppSandbox/AboutAppSandbox.html.
-
(2013)
App Sandbox Design Guide
-
-
-
7
-
-
85076267862
-
-
October
-
Étienne Bersac. iSight Firmware Tools. October 2009. Online: https://launchpad.net/isight-firmware-tools.
-
(2009)
ISight Firmware Tools
-
-
Bersac1
-
10
-
-
85076301734
-
-
Last accessed: 2013-08-07
-
camJAMR.com. camJAMR.com webcam covers. 2012. Online: http://store.camjamr.com/shop-now/camjamr-webcam-covers.html. Last accessed: 2013-08-07.
-
(2012)
CamJAMR.com Webcam Covers
-
-
-
11
-
-
85061034567
-
Comprehensive experimental analyses of automotive attack surfaces
-
David Wagner, editor USENIX, August
-
Stephen Checkoway, Damon McCoy, Danny Anderson, Brian Kantor, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, and Tadayoshi Kohno. Comprehensive experimental analyses of automotive attack surfaces. In David Wagner, editor, Proceedings of USENIX Security 2011. USENIX, August 2011. Online: http://www.autosec.org/pubs/cars-usenixsec2011.pdf.
-
(2011)
Proceedings of USENIX Security 2011
-
-
Checkoway, S.1
McCoy, D.2
Anderson, D.3
Kantor, B.4
Shacham, H.5
Savage, S.6
Koscher, K.7
Czeskis, A.8
Roesner, F.9
Kohno, T.10
-
12
-
-
85076312476
-
-
November
-
CoreLabs, Core Security Technologies. Apple OS X Sandbox predefined profiles bypass. November 2011. Online: http://www.coresecurity.com/content/apple-osx-sandbox-bypass.
-
(2011)
Apple OS X Sandbox Predefined Profiles Bypass
-
-
-
13
-
-
84900460436
-
-
Cypress Semiconductor Corporation
-
EZ-USB® Technical Reference Manual. Cypress Semiconductor Corporation, 2011. Online: http://www.cypress.com/?docID=27095&dlm=1.
-
(2011)
EZ-USB® Technical Reference Manual
-
-
-
14
-
-
85076281167
-
-
Cypress Semiconductor Corporation. CY3684 EZ-USB FX2LP Development Kit. 2013. Online: http://www.cypress.com/?rID=14321.
-
(2013)
CY3684 EZ-USB FX2LP Development Kit
-
-
-
16
-
-
84868235434
-
Your face is NOT your password: Face authentication bypassing lenovo - Asus - Toshiba
-
Presented at July
-
Nguyen Minh Duc and Bui Quang Minh. Your face is NOT your password: Face authentication bypassing Lenovo - Asus - Toshiba. Presented at BlackHat Briefings, July 2009. Online: https://www.blackhat.com/html/bh-usa-09/bh-us-09-main.html.
-
(2009)
BlackHat Briefings
-
-
Duc, N.M.1
Minh, B.Q.2
-
17
-
-
78651389795
-
Can you still trust your network card?
-
Presented at March
-
Loïc Duflot and Yves-Alexis Perez. Can you still trust your network card? Presented at CanSecWest 2010, March 2010. Online: http://www.ssi.gouv.fr/IMG/pdf/csw-trustnetworkcard.pdf.
-
(2010)
CanSecWest 2010
-
-
Duflot, L.1
Perez, Y.-A.2
-
18
-
-
84857292785
-
What if you can't trust your network card?
-
Robin Sommer, Davide Balzarotti, and Gregor Maier, editors Springer, September
-
Loïc Duflot, Yves-Alexis Perez, and Benjamin Morin. What if you can't trust your network card? In Robin Sommer, Davide Balzarotti, and Gregor Maier, editors, Proceedings of RAID 2011, pages 378-397. Springer, September 2011. Online: http://www.ssi.gouv.fr/IMG/pdf/paper.pdf.
-
(2011)
Proceedings of RAID 2011
, pp. 378-397
-
-
Duflot, L.1
Perez, Y.-A.2
Morin, B.3
-
19
-
-
85028811232
-
Hacking with hardware: Introducing the universal RF USB keyboard emulation device: URFUKED
-
Presented at August
-
Monta Elkins. Hacking with hardware: Introducing the universal RF USB keyboard emulation device: URFUKED. Presented at DefCon 18, August 2010. Online: http://www.youtube.com/watch?v=EayD3V77dI4.
-
(2010)
DefCon 18
-
-
Elkins, M.1
-
20
-
-
85076889619
-
TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
Remzi Arpaci-Dusseau and Brad Chen, editors USENIX, October
-
William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick Mc-Daniel, and Anmol N. Sheth. TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In Remzi Arpaci-Dusseau and Brad Chen, editors, Proceedings of OSDI 2010. USENIX, October 2010. Online: http://static.usenix.org/events/osdi10/tech/full_papers/Enck.pdf.
-
(2010)
Proceedings of OSDI 2010
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
Mc-Daniel, P.6
Sheth, A.N.7
-
22
-
-
84863084209
-
AndroidLeaks: Automatically detecting potential privacy leaks in android applications on a large scale
-
Stefan Katzenbeisser, Edgar Weippl, L. Jean Camp, Melanie Volkamer, Mike Reiter, and Xinwen Zhang, editors Springer Berlin Heidelberg
-
Clint Gibler, Jonathan Crussell, Jeremy Erickson, and Hao Chen. AndroidLeaks: Automatically detecting potential privacy leaks in Android applications on a large scale. In Stefan Katzenbeisser, Edgar Weippl, L. Jean Camp, Melanie Volkamer, Mike Reiter, and Xinwen Zhang, editors, Trust and Trustworthy Computing, Volume 7344 of Lecture Notes in Computer Science, pages 291-307. Springer Berlin Heidelberg, 2012. doi:10.1007/978-3-642-30921-2_17.
-
(2012)
Trust and Trustworthy Computing, Volume 7344 of Lecture Notes in Computer Science
, pp. 291-307
-
-
Gibler, C.1
Crussell, J.2
Erickson, J.3
Chen, H.4
-
24
-
-
84900897994
-
-
April 14 April
-
Hugh Hart. April 14, 1996: JenniCam starts lifecasting. Wired Magazine, April 2010. Online: http://www.wired.com/thisdayintech/2010/04/0414jennicam-launches/.
-
(1996)
JenniCam Starts Lifecasting
-
-
Hart, H.1
-
25
-
-
84923200871
-
-
January
-
Hex-Rays. IDA: About. January 2014. Online: https://www.hex-rays.com/products/ida/.
-
(2014)
IDA: About
-
-
-
26
-
-
80755187778
-
'These aren't the droids you're looking for': Retrofitting android to protect data from imperious applications
-
George Danezis and Vitaly Shmatikov, editors ACM Press, October
-
Peter Hornyack, Seungyeop Han, Jaeyeon Jung, Stuart Schechter, and David Wetherall. 'These aren't the droids you're looking for': Retrofitting Android to protect data from imperious applications. In George Danezis and Vitaly Shmatikov, editors, Proceedings of CCS 2011. ACM Press, October 2011. Online: https://research.microsoft.com/pubs/149596/AppFence.pdf.
-
(2011)
Proceedings of CCS 2011
-
-
Hornyack, P.1
Han, S.2
Jung, J.3
Schechter, S.4
Wetherall, D.5
-
27
-
-
84874829926
-
What you see is what they get: Protecting users from unwanted use of microphones, cameras, and other sensors
-
Collin Jackson, editor IEEE Computer Society, May
-
Jon Howell and Stuart Schechter. What you see is what they get: Protecting users from unwanted use of microphones, cameras, and other sensors. In Collin Jackson, editor, Proceedings of W2SP 2010. IEEE Computer Society, May 2010. Online: https://research.microsoft.com/pubs/131132/devices-camera-ready.pdf.
-
(2010)
Proceedings of W2SP 2010
-
-
Howell, J.1
Schechter, S.2
-
28
-
-
85076314064
-
-
iFixit. MacBook Pro Retina Display tear-down. 2013. Online: http://www.ifixit.com/Teardown/MacBook+Pro+Retina+Display+Teardown/9493.
-
(2013)
MacBook pro Retina Display Tear-down
-
-
-
29
-
-
85076284488
-
-
Samson Technologies Inc. Meteor Mic - USB Studio Microphone. 2013. Online: http://www.samsontech.com/samson/products/microphones/usb-microphones/meteormic/.
-
(2013)
Meteor Mic - USB Studio Microphone
-
-
-
31
-
-
85076308026
-
ScanDal: Stack analyzer for detecting privacy leaks in android applications
-
Hao Chen and Larry Koved, editors IEEE Computer Society, May
-
Jinyung Kim, Yongho Yoon, Kwangkeun Yi, and Junbum Shin. ScanDal: Stack analyzer for detecting privacy leaks in android applications. In Hao Chen and Larry Koved, editors, Proceedings of MOST 2013. IEEE Computer Society, May 2013. Online: http://www.mostconf.org/2012/papers/26.pdf.
-
(2013)
Proceedings of MOST 2013
-
-
Kim, J.1
Yoon, Y.2
Yi, K.3
Shin, J.4
-
33
-
-
84914129819
-
You can type, but you can't hide: A stealthy GPU-based keylogger
-
Thorsten Holz and Sotiris Ioannidis, editors ACM, April
-
Evangelos Ladakis, Lazaros Koromilas, Giorgos Vasiliadis, Michalis Polychronakis, and Sotiris Ioannidis. You can type, but you can't hide: A stealthy GPU-based keylogger. In Thorsten Holz and Sotiris Ioannidis, editors, Proceedings of EuroSec 2013. ACM, April 2013. Online: http://www.cs.columbia.edu/~mikepo/papers/gpukeylogger.eurosec13.pdf.
-
(2013)
Proceedings of EuroSec 2013
-
-
Ladakis, E.1
Koromilas, L.2
Vasiliadis, G.3
Polychronakis, M.4
Ioannidis, S.5
-
34
-
-
84917693828
-
-
Last accessed: 2013-08-06
-
Luxland, Inc. Detect and recognize faces with Luxand FaceSDK. 2013. Online: http://luxand.com/facesdk/index_c.php. Last accessed: 2013-08-06.
-
(2013)
Detect and Recognize Faces with Luxand FaceSDK
-
-
-
36
-
-
80755143996
-
(sp)iPhone: Decoding vibrations from nearby keyboards using mobile phone accelerometers
-
George Danezis and Vitaly Shmatikov, editors ACM Press, October
-
Philip Marquardt, Arunabh Verma, Henry Carter, and Patrick Traynor. (sp)iPhone: Decoding vibrations from nearby keyboards using mobile phone accelerometers. In George Danezis and Vitaly Shmatikov, editors, Proceedings of CCS 2011. ACM Press, October 2011. Online: http://www.cc.gatech.edu/~traynor/papers/traynor-ccs11.pdf.
-
(2011)
Proceedings of CCS 2011
-
-
Marquardt, P.1
Verma, A.2
Carter, H.3
Traynor, P.4
-
38
-
-
80051891491
-
Owning the fanboys: Hacking mac OSX
-
Presented at October
-
Charlie Miller. Owning the fanboys: Hacking Mac OSX. Presented at Black Hat Japan Briefings, October 2008. Online: https://www.blackhat.com/presentations/bh-jp-08/bh-jp-08-Miller/BlackHat-Japan-08-Miller-Hacking-OSX.pdf.
-
(2008)
Black Hat Japan Briefings
-
-
Miller, C.1
-
39
-
-
84910621255
-
Battery firmware hacking: Inside the innards of a smart battery
-
Presented at August
-
Charlie Miller. Battery firmware hacking: Inside the innards of a smart battery. Presented at Black Hat Briefings, August 2011. Online: http://media.blackhat.com/bh-us-11/Miller/BH_US_11_Miller_Battery_Firmware_Public_WP.pdf.
-
(2011)
Black Hat Briefings
-
-
Miller, C.1
-
40
-
-
84864372370
-
Tap-prints: Your finger taps have fingerprints
-
Srinivasan Seshan and Lin Zhong, editors ACM Press, June
-
Emiliano Miluzzo, Alexander Varshavsky, Suhrid Balakrishnan, and Romit Roy Choudhury. Tap-Prints: Your finger taps have fingerprints. In Srinivasan Seshan and Lin Zhong, editors, Proceedings of MobiSys 2012. ACM Press, June 2012. Online: http://synrg.ee.duke.edu/papers/tapprints-final.pdf.
-
(2012)
Proceedings of MobiSys 2012
-
-
Miluzzo, E.1
Varshavsky, A.2
Balakrishnan, S.3
Choudhury, R.R.4
-
44
-
-
85076268439
-
Reflecting on tony hawk's 900
-
May
-
Devon O'Neil. Reflecting on Tony Hawk's 900. ESPN, May 2014. Online: http://xgames.espn.go.com/events/2014/austin/article/10622648/twenty-years-20-firsts-tony-hawk-900.
-
(2014)
ESPN
-
-
O'Neil, D.1
-
45
-
-
84959058984
-
-
Oracle Corporation
-
Oracle VM VirtualBox®. Oracle Corporation, 2013. Online: http://www.virtualbox.org/manual/.
-
(2013)
Oracle VM VirtualBox®
-
-
-
46
-
-
84860294696
-
ACCessory: Password inference using accelerometers on smartphones
-
Rajesh Krishna Balan, editor ACM Press, February
-
Emmanuel Owusu, Jun Han, Sauvik Das, Adrian Perrig, and Joy Zhang. ACCessory: Password inference using accelerometers on smartphones. In Rajesh Krishna Balan, editor, Proceedings of Hot-Mobile 2012. ACM Press, February 2012. Online: http://www.hotmobile.org/2012/papers/HotMobile12-final42.pdf.
-
(2012)
Proceedings of Hot-Mobile 2012
-
-
Owusu, E.1
Han, J.2
Das, S.3
Perrig, A.4
Zhang, J.5
-
47
-
-
85076295375
-
-
Phisher Cat. July Registration required. Last accessed 2013-08-06
-
Phisher Cat. Webcam light scaring slaves⋯. July 2013. Online: http://www.hackforums.net/showthread.php?tid=3660650. Registration required. Last accessed 2013-08-06.
-
(2013)
Webcam Light Scaring Slaves⋯
-
-
-
48
-
-
85076299376
-
USB-HID hacker interface design
-
Presented at July
-
Jason Pisani, Paul Carugati, and Richard Rushing. USB-HID hacker interface design. Presented at Black Hat Briefings, July 2010. Online: https://media.blackhat.com/bh-us-10/presentations/Rushing/BlackHat-USA-2010-Rushing-USB-HID-slides.pdf.
-
(2010)
Black Hat Briefings
-
-
Pisani, J.1
Carugati, P.2
Rushing, R.3
-
50
-
-
77956092967
-
Constraints on autonomous use of standard GPU components for asynchronous observations and intrustion detection
-
Anna Brunstrom and Svein J. Knapskog, editors IEEE Computer Society, May
-
Reinhard Riedmüller, Mark M. Seeger, Harald Baier, Christoph Busch, and Stephen D. Wolthusen. Constraints on autonomous use of standard GPU components for asynchronous observations and intrustion detection. In Anna Brunstrom and Svein J. Knapskog, editors, Proceedings of IWSCN 2010. IEEE Computer Society, May 2010. Online: http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=5497999.
-
(2010)
Proceedings of IWSCN 2010
-
-
Riedmüller, R.1
Seeger, M.M.2
Baier, H.3
Busch, C.4
Wolthusen, S.D.5
-
51
-
-
79551689384
-
Privacy-preserving location tracking of lost or stolen devices: Cryptographic techniques and replacing trusted third parties with DHTs
-
Paul Van Oorschot, editor USENIX, July
-
Thomas Ristenpart, Gabriel Maganis, Arvind Krishnamurthy, and Tadayoshi Kohno. Privacy-preserving location tracking of lost or stolen devices: Cryptographic techniques and replacing trusted third parties with DHTs. In Paul Van Oorschot, editor, Proceedings of USENIX Security 2008. USENIX, July 2008. Online: http://adeona.cs.washington.edu/papers/adeona-usenixsecurity08.pdf.
-
(2008)
Proceedings of USENIX Security 2008
-
-
Ristenpart, T.1
Maganis, G.2
Krishnamurthy, A.3
Kohno, T.4
-
53
-
-
85076306775
-
Fast hash-based signatures on constrained devices
-
Gilles Grimaud and Frano is Xavier Standaert, editors Springer, September
-
Sebastian Rohde, Thomas Eisenbarth, Erik Dahmen, Johannes Buchmann, and Christof Paar. Fast hash-based signatures on constrained devices. In Gilles Grimaud and Frano is Xavier Standaert, editors, Proceedings of CARDIS 2008. Springer, September 2008. Online: https://www.hgi.rub.de/hgi/publikationen/fast-hash-based-signatures-constrained-devices/.
-
(2008)
Proceedings of CARDIS 2008
-
-
Rohde, S.1
Eisenbarth, T.2
Dahmen, E.3
Buchmann, J.4
Paar, C.5
-
54
-
-
84857164924
-
Soundcomber: A stealthy and context-aware sound trojan for smartphones
-
Adrian Perrig, editor Internet Society, February
-
Roman Schlegel, Kehuan Zhang, Xiaoyong Zhou, Mehool Intwala, Apu Kapadia, and XiaoFeng Wang. Soundcomber: A stealthy and context-aware sound trojan for smartphones. In Adrian Perrig, editor, Proceedings of NDSS 2011. Internet Society, February 2011. Online: http://www.cs.indiana.edu/~kapadia/papers/soundcomber-ndss11.pdf.
-
(2011)
Proceedings of NDSS 2011
-
-
Schlegel, R.1
Zhang, K.2
Zhou, X.3
Intwala, M.4
Kapadia, A.5
Wang, X.F.6
-
55
-
-
85076294284
-
-
December
-
Stop Police Brutality. Cop breaks 84 year old's neck for touching him. December 2013. Online: http://www.policebrutality.info/2013/12/cop-breaks-84-year-olds-neck-for-touching-him.html.
-
(2013)
Cop Breaks 84 Year Old's Neck for Touching Him
-
-
-
56
-
-
85180406770
-
PlaceRaider: Virtual theft in physical spaces with smartphones
-
Peng Ning, editor Internet Society, February
-
Robert Templeman, Zahid Rahman, David Crandall, and Apu Kapadia. PlaceRaider: Virtual theft in physical spaces with smartphones. In Peng Ning, editor, Proceedings of NDSS 2013. Internet Society, February 2013. Online: http://www.internetsociety.org/sites/default/files/02_2_0.pdf.
-
(2013)
Proceedings of NDSS 2013
-
-
Templeman, R.1
Rahman, Z.2
Crandall, D.3
Kapadia, A.4
-
57
-
-
84855347648
-
Introducing ring -3 rootkits
-
Presented at July
-
Alexander Tereshkin and Rafal Wojtczuk. Introducing ring -3 rootkits. Presented at Black Hat Briefings, July 2009. Online: http://www.blackhat.com/presentations/bh-usa-09/TERESHKIN/BHUSA09-Tereshkin-Ring3Rootkit-SLIDES.pdf.
-
(2009)
Black Hat Briefings
-
-
Tereshkin, A.1
Wojtczuk, R.2
-
58
-
-
85076314004
-
-
Last accessed: 2013-08-07
-
The iPatch. The iPatch. 2011. Online: http://www.theipatch.com. Last accessed: 2013-08-07.
-
(2011)
The IPatch
-
-
-
60
-
-
78651410940
-
GPU-assisted malware
-
Jean-Yves Marion, Noam Rathaus, and Cliff Zhou, editors IEEE Computer Society, October
-
Giorgos Vasiliadis, Michalis Polychronakis, and Sotiris Ioannidis. GPU-assisted malware. In Jean-Yves Marion, Noam Rathaus, and Cliff Zhou, editors, Proceedings of MALWARE 2010, pages 1-6. IEEE Computer Society, October 2010. Online: http://dcs.ics.forth.gr/Activities/papers/gpumalware.malware10.pdf.
-
(2010)
Proceedings of MALWARE 2010
, pp. 1-6
-
-
Vasiliadis, G.1
Polychronakis, M.2
Ioannidis, S.3
-
61
-
-
85076297116
-
-
September
-
Vimicro. VC0358 USB 2.0 Camera Processor, September 2012. Online: http://www.vimicro.com/english/product/pdf/Vimicro_VC0358_PB_V1.1.pdf.
-
(2012)
VC0358 USB 2.0 Camera Processor
-
-
-
62
-
-
78751488518
-
Exploiting smart-phone USB connectivity for fun and profit
-
Patrick Traynor and Kevin Butler, editors ACM Press, December
-
Zhaohui Wang and Angelos Stavrou. Exploiting smart-phone USB connectivity for fun and profit. In Patrick Traynor and Kevin Butler, editors, Proceedings of ACSAC 2010, pages 357-366. ACM Press, December 2010. Online: http://dl.acm.org/citation.cfm?id=1920314.
-
(2010)
Proceedings of ACSAC 2010
, pp. 357-366
-
-
Wang, Z.1
Stavrou, A.2
-
64
-
-
85076316799
-
-
Post on the Logitech Forums, February Last accessed: 2013-08-06
-
ZTech. QuickCam Pro 9000 LED Control. Post on the Logitech Forums, February 2008. Online: http://forums.logitech.com/t5/Webcams/QuickCam-Pro-9000-LED-Control/td-p/186301. Last accessed: 2013-08-06.
-
(2008)
ZTech. QuickCam pro 9000 LED Control
-
-
|