Jos Wetzels

Orcid: 0009-0003-8567-197X

According to our database1, Jos Wetzels authored at least 13 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
All cops are broadcasting: TETRA under scrutiny.
Proceedings of the 32nd USENIX Security Symposium, 2023

Insecure by Design in the Backbone of Critical Infrastructure.
Proceedings of Cyber-Physical Systems and Internet of Things Week 2023, 2023

2022
Common Implementation Anti-Patterns Related to Domain Name System (DNS) Resource Record (RR) Processing.
RFC, July, 2022

2021
Where's Crypto?: Automated Identification and Classification of Proprietary Cryptographic Primitives in Binary Code.
Proceedings of the 30th USENIX Security Symposium, 2021

2019
Challenges in Designing Exploit Mitigations for Deeply Embedded Systems.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

2017
Internet of Pwnable Things: Challenges in Embedded Binary Security.
login Usenix Mag., 2017

\mu Shield - Configurable Code-Reuse Attacks Mitigation For Embedded Systems.
Proceedings of the Network and System Security - 11th International Conference, 2017

2016
Simple SIMON: FPGA implementations of the SIMON 64/128 Block Cipher.
IACR Cryptol. ePrint Arch., 2016

Sponges and Engines: An introduction to Keccak and Keyak.
IACR Cryptol. ePrint Arch., 2016

Open Sesame: The Password Hashing Competition and Argon2.
IACR Cryptol. ePrint Arch., 2016

2014
Hidden in snow, revealed in thaw: Cold boot attacks revisited.
CoRR, 2014

Broken keys to the kingdom: Security and privacy aspects of RFID-based car keys.
CoRR, 2014

On Emulation-Based Network Intrusion Detection Systems.
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014


  Loading...