Travis Goodspeed

According to our database1, Travis Goodspeed authored at least 10 papers between 2009 and 2016.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Fillory of PHY: Toward a Periodic Table of Signal Corruption Exploits and Polyglots in Digital Radio.
Proceedings of the 10th USENIX Workshop on Offensive Technologies, 2016

2014
Short paper: speaking the local dialect: exploiting differences between ieee 802.15.4 receivers with commodity radios for fingerprinting, targeted attacks, and wids evasion.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

Phantom Boundaries and Cross-Layer Illusions in 802.15.4 Digital Radio.
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014

Interrupt-oriented bugdoor programming: a minimalist approach to bugdooring embedded systems firmware.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
Implementation and implications of a stealth hard-drive backdoor.
Proceedings of the Annual Computer Security Applications Conference, 2013

2012
Api-do: Tools for Exploring the Wireless Attack Surface in Smart Meters.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

2011
Packets in Packets: Orson Welles' In-Band Signaling Attacks for Modern Radios.
Proceedings of the 5th USENIX Workshop on Offensive Technologies, 2011

Why (Special Agent) Johnny (Still) Can't Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System.
Proceedings of the 20th USENIX Security Symposium, 2011

One-Way Cryptography.
Proceedings of the Security Protocols XIX, 2011

2009
Half-Blind Attacks: Mask ROM Bootloaders are Dangerous.
Proceedings of the 3rd USENIX Workshop on Offensive Technologies, 2009


  Loading...