default search action
Mathy Vanhoef
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c33]Mathy Vanhoef, Jeroen Robben:
A Security Analysis of WPA3-PK: Implementation and Precomputation Attacks. ACNS (2) 2024: 217-240 - [c32]Jeroen Robben, Mathy Vanhoef:
Netfuzzlib: Adding First-Class Fuzzing Support to Network Protocol Implementations. ESORICS (2) 2024: 65-84 - [c31]Héloïse Gollier, Mathy Vanhoef:
SSID Confusion: Making Wi-Fi Clients Connect to the Wrong Network. WISEC 2024: 156-161 - 2023
- [c30]Vik Vanderlinden, Tom van Goethem, Mathy Vanhoef:
Time Will Tell: Exploiting Timing Leaks Using HTTP Response Headers. ESORICS (2) 2023: 3-22 - [c29]Domien Schepers, Aanjhan Ranganathan, Mathy Vanhoef:
Framing Frames: Bypassing Wi-Fi Encryption by Manipulating Transmit Queues. USENIX Security Symposium 2023: 53-68 - [c28]Nian Xue, Yashaswi Malla, Zihang Xia, Christina Pöpper, Mathy Vanhoef:
Bypassing Tunnels: Leaking VPN Client Traffic by Abusing Routing Tables. USENIX Security Symposium 2023: 5719-5736 - [c27]Mathy Vanhoef, Xianjun Jiao, Wei Liu, Ingrid Moerman:
Testing and Improving the Correctness of Wi-Fi Frame Injection. WISEC 2023: 287-292 - 2022
- [c26]Mathy Vanhoef:
A Time-Memory Trade-Off Attack on WPA3's SAE-PK. APKC@AsiaCCS 2022: 27-37 - [c25]Chris McMahon Stone, Sam L. Thomas, Mathy Vanhoef, James Henderson, Nicolas Bailluet, Tom Chothia:
The Closer You Look, The More You Learn: A Grey-box Approach to Protocol State Machine Learning. CCS 2022: 2265-2278 - [c24]Domien Schepers, Aanjhan Ranganathan, Mathy Vanhoef:
On the Robustness of Wi-Fi Deauthentication Countermeasures. WISEC 2022: 245-256 - 2021
- [c23]Mathy Vanhoef:
Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation. USENIX Security Symposium 2021: 161-178 - [c22]Domien Schepers, Aanjhan Ranganathan, Mathy Vanhoef:
Let numbers tell the tale: measuring security trends in wi-fi networks and best practices. WISEC 2021: 100-105 - [c21]Domien Schepers, Mathy Vanhoef, Aanjhan Ranganathan:
A framework to test and fuzz wi-fi devices. WISEC 2021: 368-370 - [e2]Christina Pöpper, Mathy Vanhoef, Lejla Batina, René Mayrhofer:
WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June - 2 July, 2021. ACM 2021, ISBN 978-1-4503-8349-3 [contents] - [e1]Christina Pöpper, Mathy Vanhoef:
WiseML@WiSec 2021: Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning, Abu Dhabi, United Arab Emirates, July 2, 2021. ACM 2021, ISBN 978-1-4503-8561-9 [contents] - [i3]Chris McMahon Stone, Sam L. Thomas, Mathy Vanhoef, James Henderson, Nicolas Bailluet, Tom Chothia:
The Closer You Look, The More You Learn: A Grey-box Approach to Protocol State Machine Learning. CoRR abs/2106.02623 (2021) - [i2]Mathy Vanhoef:
Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation. IACR Cryptol. ePrint Arch. 2021: 763 (2021) - 2020
- [c20]Mathy Vanhoef, Eyal Ronen:
Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd. SP 2020: 517-533 - [c19]Tom van Goethem, Christina Pöpper, Wouter Joosen, Mathy Vanhoef:
Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote Connections. USENIX Security Symposium 2020: 1985-2002 - [c18]Mathy Vanhoef, Prasant Adhikari, Christina Pöpper:
Protecting wi-fi beacons from outsider forgeries. WISEC 2020: 155-160
2010 – 2019
- 2019
- [c17]Domien Schepers, Aanjhan Ranganathan, Mathy Vanhoef:
Practical Side-Channel Attacks against WPA-TKIP. AsiaCCS 2019: 415-426 - [c16]Frederik Goovaerts, Gunes Acar, Rafael Galvez, Frank Piessens, Mathy Vanhoef:
Improving Privacy Through Fast Passive Wi-Fi Scanning. NordSec 2019: 37-52 - [i1]Mathy Vanhoef, Eyal Ronen:
Dragonblood: A Security Analysis of WPA3's SAE Handshake. IACR Cryptol. ePrint Arch. 2019: 383 (2019) - 2018
- [c15]Mathy Vanhoef, Frank Piessens:
Release the Kraken: New KRACKs in the 802.11 Standard. CCS 2018: 299-314 - [c14]Mathy Vanhoef, Nehru Bhandaru, Thomas Derham, Ido Ouzieli, Frank Piessens:
Operating Channel Validation: Preventing Multi-Channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks. WISEC 2018: 34-39 - [c13]Mathy Vanhoef, Frank Piessens:
Symbolic Execution of Security Protocol Implementations: Handling Cryptographic Primitives. WOOT @ USENIX Security Symposium 2018 - 2017
- [c12]Mathy Vanhoef, Domien Schepers, Frank Piessens:
Discovering Logical Vulnerabilities in the Wi-Fi Handshake Using Model-Based Testing. AsiaCCS 2017: 360-371 - [c11]Mathy Vanhoef, Frank Piessens:
Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2. CCS 2017: 1313-1328 - 2016
- [c10]Mathy Vanhoef, Célestin Matte, Mathieu Cunche, Leonardo S. Cardoso, Frank Piessens:
Why MAC Address Randomization is not Enough: An Analysis of Wi-Fi Network Discovery Mechanisms. AsiaCCS 2016: 413-424 - [c9]Mathy Vanhoef, Frank Piessens:
All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLS. USENIX ATC 2016 - [c8]Tom van Goethem, Mathy Vanhoef, Frank Piessens, Wouter Joosen:
Request and Conquer: Exposing Cross-Origin Resource Size. USENIX Security Symposium 2016: 447-462 - [c7]Mathy Vanhoef, Frank Piessens:
Predicting, Decrypting, and Abusing WPA2/802.11 Group Keys. USENIX Security Symposium 2016: 673-688 - [c6]Célestin Matte, Mathieu Cunche, Franck Rousseau, Mathy Vanhoef:
Defeating MAC Address Randomization Through Timing Attacks. WISEC 2016: 15-20 - 2015
- [c5]Mathy Vanhoef, Frank Piessens:
All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLS. USENIX Security Symposium 2015: 97-112 - 2014
- [c4]Mathy Vanhoef, Frank Piessens:
Advanced Wi-Fi attacks using commodity hardware. ACSAC 2014: 256-265 - [c3]Mathy Vanhoef, Willem De Groef, Dominique Devriese, Frank Piessens, Tamara Rezk:
Stateful Declassification Policies for Event-Driven Programs. CSF 2014: 293-307 - 2013
- [c2]Mathy Vanhoef, Frank Piessens:
Practical verification of WPA-TKIP vulnerabilities. AsiaCCS 2013: 427-436 - [c1]Willem De Groef, Dominique Devriese, Mathy Vanhoef, Frank Piessens:
Information Flow Control for Web Scripts. FOSAD 2013: 124-145
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-21 23:40 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint