What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Mathy Vanhoef
Google Scholar
33
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/popets
LANShield: Analysing and Protecting Local Network Access on Mobile Devices.
Angelos Beitis
Jeroen Robben
Alexander Matern
Zhen Lei
Yijia Li
Nian Xue
Yongle Chen
Vik Vanderlinden
Mathy Vanhoef
2025
conf/sp
Saecred: A State-Aware, Over-the-Air Protocol Testing Approach for Discovering Parsing Bugs in SAE Handshake Implementations of COTS Wi-Fi Access Points.
Muhammad Daniyal Pirwani Dar
Robert Lorch
Aliakbar Sadeghi
Vincenzo Sorcigli
Héloïse Gollier
Cesare Tinelli
Mathy Vanhoef
Omar Chowdhury
2025
conf/wisec
Fragile Frames: Wi-Fi's Fraught Fight Against FragAttacks.
Siebe Devroe
Héloïse Gollier
Mathy Vanhoef
2025
conf/uss
Haunted by Legacy: Discovering and Exploiting Vulnerable Tunnelling Hosts.
Angelos Beitis
Mathy Vanhoef
2025
conf/uss
Confusing Value with Enumeration: Studying the Use of CVEs in Academia.
Moritz Schloegel
Daniel Klischies
Simon Koch
David Klein
Lukas Gerlach
Malte Wessels
Leon Trampert
Martin Johns
Mathy Vanhoef
Michael Schwarz
Thorsten Holz
Jo Van Bulck
2024
conf/acns
A Security Analysis of WPA3-PK: Implementation and Precomputation Attacks.
Mathy Vanhoef
Jeroen Robben
2024
conf/esorics
Netfuzzlib: Adding First-Class Fuzzing Support to Network Protocol Implementations.
Jeroen Robben
Mathy Vanhoef
2024
conf/wisec
SSID Confusion: Making Wi-Fi Clients Connect to the Wrong Network.
Héloïse Gollier
Mathy Vanhoef
2023
conf/uss
Bypassing Tunnels: Leaking VPN Client Traffic by Abusing Routing Tables.
Nian Xue
Yashaswi Malla
Zihang Xia
Christina Pöpper
Mathy Vanhoef
2023
conf/uss
Framing Frames: Bypassing Wi-Fi Encryption by Manipulating Transmit Queues.
Domien Schepers
Aanjhan Ranganathan
Mathy Vanhoef
2023
conf/esorics
Time Will Tell: Exploiting Timing Leaks Using HTTP Response Headers.
Vik Vanderlinden
Tom van Goethem
Mathy Vanhoef
2023
conf/wisec
Testing and Improving the Correctness of Wi-Fi Frame Injection.
Mathy Vanhoef
Xianjun Jiao
Wei Liu
Ingrid Moerman
2022
conf/ccs
The Closer You Look, The More You Learn: A Grey-box Approach to Protocol State Machine Learning.
Chris McMahon Stone
Sam L. Thomas
Mathy Vanhoef
James Henderson
Nicolas Bailluet
Tom Chothia
2022
conf/asiapkc
A Time-Memory Trade-Off Attack on WPA3's SAE-PK.
Mathy Vanhoef
2022
conf/wisec
On the Robustness of Wi-Fi Deauthentication Countermeasures.
Domien Schepers
Aanjhan Ranganathan
Mathy Vanhoef
2021
conf/uss
Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation.
Mathy Vanhoef
2021
conf/wisec
Let numbers tell the tale: measuring security trends in wi-fi networks and best practices.
Domien Schepers
Aanjhan Ranganathan
Mathy Vanhoef
2021
conf/wisec
A framework to test and fuzz wi-fi devices.
Domien Schepers
Mathy Vanhoef
Aanjhan Ranganathan
2020
conf/uss
Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote Connections.
Tom van Goethem
Christina Pöpper
Wouter Joosen
Mathy Vanhoef
2020
conf/sp
Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd.
Mathy Vanhoef
Eyal Ronen
2020
conf/wisec
Protecting wi-fi beacons from outsider forgeries.
Mathy Vanhoef
Prasant Adhikari
Christina Pöpper
2019
conf/ccs
Practical Side-Channel Attacks against WPA-TKIP.
Domien Schepers
Aanjhan Ranganathan
Mathy Vanhoef
2018
conf/ccs
Release the Kraken: New KRACKs in the 802.11 Standard.
Mathy Vanhoef
Frank Piessens
2018
conf/wisec
Operating Channel Validation: Preventing Multi-Channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks.
Mathy Vanhoef
Nehru Bhandaru
Thomas Derham
Ido Ouzieli
Frank Piessens
2017
conf/ccs
Discovering Logical Vulnerabilities in the Wi-Fi Handshake Using Model-Based Testing.
Mathy Vanhoef
Domien Schepers
Frank Piessens
2017
conf/ccs
Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2.
Mathy Vanhoef
Frank Piessens
2016
conf/ccs
Why MAC Address Randomization is not Enough: An Analysis of Wi-Fi Network Discovery Mechanisms.
Mathy Vanhoef
Célestin Matte
Mathieu Cunche
Leonardo S. Cardoso
Frank Piessens
2016
conf/uss
Predicting, Decrypting, and Abusing WPA2/802.11 Group Keys.
Mathy Vanhoef
Frank Piessens
2016
conf/uss
Request and Conquer: Exposing Cross-Origin Resource Size.
Tom van Goethem
Mathy Vanhoef
Frank Piessens
Wouter Joosen
2016
conf/wisec
Defeating MAC Address Randomization Through Timing Attacks.
Célestin Matte
Mathieu Cunche
Franck Rousseau
Mathy Vanhoef
2015
conf/uss
All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLS.
Mathy Vanhoef
Frank Piessens
2014
conf/acsac
Advanced Wi-Fi attacks using commodity hardware.
Mathy Vanhoef
Frank Piessens
2013
conf/ccs
Practical verification of WPA-TKIP vulnerabilities.
Mathy Vanhoef
Frank Piessens
Coauthors
Aanjhan Ranganathan
(5)
Alexander Matern
(1)
Aliakbar Sadeghi
(1)
Angelos Beitis
(2)
Célestin Matte
(2)
Cesare Tinelli
(1)
Chris McMahon Stone
(1)
Christina Pöpper
(3)
Daniel Klischies
(1)
David Klein
(1)
Domien Schepers
(6)
Eyal Ronen
(1)
Franck Rousseau
(1)
Frank Piessens
(10)
Héloïse Gollier
(3)
Ido Ouzieli
(1)
Ingrid Moerman
(1)
James Henderson
(1)
Jeroen Robben
(3)
Jo Van Bulck
(1)
Leon Trampert
(1)
Leonardo S. Cardoso
(1)
Lukas Gerlach
(1)
Malte Wessels
(1)
Martin Johns
(1)
Mathieu Cunche
(2)
Mathy Vanhoef
(33)
Michael Schwarz
(1)
Moritz Schloegel
(1)
Muhammad Daniyal Pirwani Dar
(1)
Nehru Bhandaru
(1)
Nian Xue
(2)
Nicolas Bailluet
(1)
Omar Chowdhury
(1)
Prasant Adhikari
(1)
Robert Lorch
(1)
Sam L. Thomas
(1)
Siebe Devroe
(1)
Simon Koch
(1)
Thomas Derham
(1)
Thorsten Holz
(1)
Tom Chothia
(1)
Tom van Goethem
(3)
Vik Vanderlinden
(2)
Vincenzo Sorcigli
(1)
Wei Liu
(1)
Wouter Joosen
(2)
Xianjun Jiao
(1)
Yashaswi Malla
(1)
Yijia Li
(1)
Yongle Chen
(1)
Zhen Lei
(1)
Zihang Xia
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to