Mathy Vanhoef
TitleCited byYear
Key reinstallation attacks: Forcing nonce reuse in WPA2
M Vanhoef, F Piessens
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1822017
Why MAC address randomization is not enough: An analysis of Wi-Fi network discovery mechanisms
M Vanhoef, C Matte, M Cunche, LS Cardoso, F Piessens
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
922016
All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and {TLS}
M Vanhoef, F Piessens
24th {USENIX} Security Symposium ({USENIX} Security 15), 97-112, 2015
762015
Advanced Wi-Fi attacks using commodity hardware
M Vanhoef, F Piessens
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
582014
Practical verification of WPA-TKIP vulnerabilities
M Vanhoef, F Piessens
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
462013
Stateful declassification policies for event-driven programs
M Vanhoef, W De Groef, D Devriese, F Piessens, T Rezk
2014 IEEE 27th Computer Security Foundations Symposium, 293-307, 2014
392014
Tranco: A research-oriented top sites ranking hardened against manipulation
VL Pochat, T Van Goethem, S Tajalizadehkhoob, M Korczyński, W Joosen
arXiv preprint arXiv:1806.01156, 2018
292018
Defeating MAC address randomization through timing attacks
C Matte, M Cunche, F Rousseau, M Vanhoef
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and …, 2016
272016
Predicting, decrypting, and abusing WPA2/802.11 group keys
M Vanhoef, F Piessens
25th {USENIX} Security Symposium ({USENIX} Security 16), 673-688, 2016
262016
Request and conquer: Exposing cross-origin resource size
T Van Goethem, M Vanhoef, F Piessens, W Joosen
25th {USENIX} Security Symposium ({USENIX} Security 16), 447-462, 2016
132016
Release the Kraken: new KRACKs in the 802.11 Standard
M Vanhoef, F Piessens
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
112018
Discovering logical vulnerabilities in the Wi-Fi handshake using model-based testing
M Vanhoef, D Schepers, F Piessens
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
92017
HEIST: HTTP Encrypted Information can be Stolen through TCP-windows
M Vanhoef, T Van Goethem
Black Hat USA 2016, 1, 2016
92016
Operating Channel Validation: Preventing Multi-Channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks
M Vanhoef, N Bhandaru, T Derham, I Ouzieli, F Piessens
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and …, 2018
52018
Symbolic execution of security protocol implementations: handling cryptographic primitives
M Vanhoef, F Piessens
12th {USENIX} Workshop on Offensive Technologies ({WOOT} 18), 2018
32018
Denial-of-Service Attacks Against the 4-way Wi-Fi Handshake
M Vanhoef, F Piessens
9th International Conference on Network and Communications Security (NCS), 2017
32017
A Security Analysis of the WPA-TKIP and TLS Security Protocols
M Vanhoef
KU Leuven, 2016
32016
Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd
M Vanhoef, E Ronen
Proceedings of the 2020 IEEE Symposium on Security and Privacy-S&P 2020), 2020
22020
Dragonblood: A Security Analysis of WPA3's SAE Handshake.
M Vanhoef, E Ronen
IACR Cryptology ePrint Archive 2019, 383, 2019
22019
Information flow control for web scripts
W De Groef, D Devriese, M Vanhoef, F Piessens
Foundations of Security Analysis and Design VII, 124-145, 2013
22013
The system can't perform the operation now. Try again later.
Articles 1–20