Mathy Vanhoef
Orcid: 0000-0002-8971-9470
According to our database1,
Mathy Vanhoef
authored at least 33 papers
between 2013 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2024
Proceedings of the Computer Security - ESORICS 2024, 2024
Proceedings of the Applied Cryptography and Network Security, 2024
2023
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the Computer Security - ESORICS 2023, 2023
2022
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022
The Closer You Look, The More You Learn: A Grey-box Approach to Protocol State Machine Learning.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the APKC '22: Proceedings of the 9th ACM on ASIA Public-Key Cryptography Workshop, 2022
2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021
Let numbers tell the tale: measuring security trends in wi-fi networks and best practices.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021
2020
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020
Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote Connections.
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Secure IT Systems, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
2018
Symbolic Execution of Security Protocol Implementations: Handling Cryptographic Primitives.
Proceedings of the 12th USENIX Workshop on Offensive Technologies, 2018
Operating Channel Validation: Preventing Multi-Channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Discovering Logical Vulnerabilities in the Wi-Fi Handshake Using Model-Based Testing.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the 25th USENIX Security Symposium, 2016
Why MAC Address Randomization is not Enough: An Analysis of Wi-Fi Network Discovery Mechanisms.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
Proceedings of the 24th USENIX Security Symposium, 2015
2014
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
2013
Proceedings of the Foundations of Security Analysis and Design VII, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013