Mathy Vanhoef

Orcid: 0000-0002-8971-9470

According to our database1, Mathy Vanhoef authored at least 31 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Security Analysis of WPA3-PK: Implementation and Precomputation Attacks.
Proceedings of the Applied Cryptography and Network Security, 2024

2023
Testing and Improving the Correctness of Wi-Fi Frame Injection.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023

Bypassing Tunnels: Leaking VPN Client Traffic by Abusing Routing Tables.
Proceedings of the 32nd USENIX Security Symposium, 2023

Framing Frames: Bypassing Wi-Fi Encryption by Manipulating Transmit Queues.
Proceedings of the 32nd USENIX Security Symposium, 2023

Time Will Tell: Exploiting Timing Leaks Using HTTP Response Headers.
Proceedings of the Computer Security - ESORICS 2023, 2023

2022
On the Robustness of Wi-Fi Deauthentication Countermeasures.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022

The Closer You Look, The More You Learn: A Grey-box Approach to Protocol State Machine Learning.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

A Time-Memory Trade-Off Attack on WPA3's SAE-PK.
Proceedings of the APKC '22: Proceedings of the 9th ACM on ASIA Public-Key Cryptography Workshop, 2022

2021
Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation.
IACR Cryptol. ePrint Arch., 2021

A framework to test and fuzz wi-fi devices.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

Let numbers tell the tale: measuring security trends in wi-fi networks and best practices.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

2020
Protecting wi-fi beacons from outsider forgeries.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote Connections.
Proceedings of the 29th USENIX Security Symposium, 2020

Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

2019
Dragonblood: A Security Analysis of WPA3's SAE Handshake.
IACR Cryptol. ePrint Arch., 2019

Improving Privacy Through Fast Passive Wi-Fi Scanning.
Proceedings of the Secure IT Systems, 2019

Practical Side-Channel Attacks against WPA-TKIP.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Symbolic Execution of Security Protocol Implementations: Handling Cryptographic Primitives.
Proceedings of the 12th USENIX Workshop on Offensive Technologies, 2018

Operating Channel Validation: Preventing Multi-Channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

Release the Kraken: New KRACKs in the 802.11 Standard.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Discovering Logical Vulnerabilities in the Wi-Fi Handshake Using Model-Based Testing.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Defeating MAC Address Randomization Through Timing Attacks.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

Predicting, Decrypting, and Abusing WPA2/802.11 Group Keys.
Proceedings of the 25th USENIX Security Symposium, 2016

Request and Conquer: Exposing Cross-Origin Resource Size.
Proceedings of the 25th USENIX Security Symposium, 2016

Why MAC Address Randomization is not Enough: An Analysis of Wi-Fi Network Discovery Mechanisms.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLS.
Proceedings of the 24th USENIX Security Symposium, 2015

2014
Stateful Declassification Policies for Event-Driven Programs.
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014

Advanced Wi-Fi attacks using commodity hardware.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
Information Flow Control for Web Scripts.
Proceedings of the Foundations of Security Analysis and Design VII, 2013

Practical verification of WPA-TKIP vulnerabilities.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013


  Loading...