Jacob T.'s books

Read Public 31 books (showing 1-15)

Cover Title Author
No cover

Turning Microsoft's Login Page into our Phishing Infrastructure (2025, DEF CON 33)

Turning Microsoft's Login Page into our Phishing Infrastructure
No cover

Defending off the land: Agentless defenses available today (2024, Black Hat Europe 2024)

Defending off the land: Agentless defenses available today,
No cover

Flipping Bits: Your Credentials Are Certainly Mine (2024, SEC-T 2024)

Flipping Bits: Your Credentials Are Certainly Mine,
No cover

[Keynote] Is "AI" useful for fuzzing? (2024, FUZZING 2024)

[Keynote] Is "AI" useful for fuzzing?
No cover

[Keynote] Reasons for the Unreasonable Success of Fuzzing (2024, FUZZING 2024)

[Keynote] Reasons for the Unreasonable Success of Fuzzing
No cover

TCP Spoofing: Reliable Payload Transmission Past the Spoofed TCP Handshake (2024, IEEE Symposium on Security and Privacy 2024)

TCP Spoofing: Reliable Payload Transmission Past the Spoofed TCP Handshake,
No cover

Poisoning Web-Scale Training Datasets is Practical (2024, Arxiv)

Poisoning Web-Scale Training Datasets is Practical, , , , , , , ,
No cover

Sponge Examples: Energy-Latency Attacks on Neural Networks (2021, Arxiv)

Sponge Examples: Energy-Latency Attacks on Neural Networks, , , , ,
No cover

Password-Stealing without Hacking: Wi-Fi Enabled Practical Keystroke Eavesdropping (2023, Arxiv)

Password-Stealing without Hacking: Wi-Fi Enabled Practical Keystroke Eavesdropping, , , , , ,
No cover

On the use of compression algorithms for network anomaly detection (Paper, IEEE ICC)

On the use of compression algorithms for network anomaly detection, ,
Sparks (2023, Oxford University Press, Incorporated)Sparks
Skunk Works (AudiobookFormat, 2015, Hachette Audio and Blackstone Audio)Skunk Works
HECO: Fully Homomorphic Encryption Compiler (2023, Arxiv)HECO: Fully Homomorphic Encryption Compiler, , ,
No cover

Adversarial Reprogramming of Neural Networks (2018, Arxiv)

Adversarial Reprogramming of Neural Networks, ,
No cover

Freaky Leaky SMS: Extracting User Locations by Analyzing SMS Timings (2023, Arxiv)

Freaky Leaky SMS: Extracting User Locations by Analyzing SMS Timings, , ,