Jacob T.'s books

Read Public 29 books (showing 16-29)

Cover Title Author
No cover

3 YEARS IN CHINA: A TALE OF BUILDING A REAL FULL SPEED ANTI-CENSORSHIP ROUTER (2023, HITB Amsterdam 2023)

3 YEARS IN CHINA: A TALE OF BUILDING A REAL FULL SPEED ANTI-CENSORSHIP ROUTER
No cover

IPvSeeYou: Exploiting Leaked Identifiers in IPv6 for Street-Level Geolocation (2022, Arxiv)

IPvSeeYou: Exploiting Leaked Identifiers in IPv6 for Street-Level Geolocation,
No cover

zk-creds: Flexible Anonymous Credentials from zkSNARKs and Existing Identity Infrastructure (2023, IEEE Symposium on Security and Privacy 44)

zk-creds: Flexible Anonymous Credentials from zkSNARKs and Existing Identity Infrastructure, , ,
No cover

BrutePrint: Expose Smartphone Fingerprint Authentication to Brute-force Attack (2023, Arxiv)

BrutePrint: Expose Smartphone Fingerprint Authentication to Brute-force Attack,
No cover

LIMA: Less Is More for Alignment (2023, Arxiv)

LIMA: Less Is More for Alignment, , , , , , , , , , , , , ,
No cover

Death By A Thousand COTS: Disrupting Satellite Communications using Low Earth Orbit Constellations (2023, NDSS Symposium 2023)

Death By A Thousand COTS: Disrupting Satellite Communications using Low Earth Orbit Constellations, ,
No cover

Cybersecurity of COSPAS-SARSAT and EPIRB: threat and attacker models, exploits, future research (Paper, 2023, NDSS Symposium 2023)

Cybersecurity of COSPAS-SARSAT and EPIRB: threat and attacker models, exploits, future research, , ,
No cover

Framing Frames: Bypassing Wi-Fi Encryption by Manipulating Transmit Queues (Talk, 2023, Real World Crypto 2023)

Framing Frames: Bypassing Wi-Fi Encryption by Manipulating Transmit Queues, ,
No cover

Using ZK Proofs to Fight Disinformation (Talk, 2023, Real World Crypto 2023)

Using ZK Proofs to Fight Disinformation,
No cover

Let Me Unwind That For You: Exceptions to Backward-Edge Protection (2023, NDSS Symposium 2023)

Let Me Unwind That For You: Exceptions to Backward-Edge Protection, , , ,
Type-driven Development with Idris (2017, Manning Publications)Type-driven Development with Idris
No cover

Security, Moore's Law, and the Anomaly of Cheap Complexity (Talk, CyCon 2018)

Security, Moore's Law, and the Anomaly of Cheap Complexity
No cover

You and Your Research (Talk, Bell Communications Research Colloquia Series)

You and Your Research
Watching the Watchers: Practical Video Identification Attack in LTE Networks (Paper, 2022, USENIX Security 2022)Watching the Watchers: Practical Video Identification Attack in LTE Networks, , , , ,