Publications, Advisories, Exploits, Projects
Publications
- Dissecting QNX (whitepaper) - J. Wetzels, A. Abbasi (Black Hat Asia, March 2018, Singapore)
- μShield: Configurable Code-Reuse Attacks Mitigation For Embedded Systems - A. Abbasi, J. Wetzels, W. Bokslag, E. Zambon, S. Etalle (2nd International Workshop on Security of the Internet of Everything, 2017, Helsinki, Finland)
- Internet of Pwnable Things: Challenges in Embedded Binary Security - J. Wetzels (USENIX ;login: Vol. 42, No. 2)
- Open Sesame: The Password Hashing Competition and Argon2 - J. Wetzels (CoRR abs/1602.03097)
- Sponges and Engines: An introduction to Keccak and Keyak - J. Wetzels, W. Bokslag (CoRR abs/1510.02856)
- Simple SIMON: FPGA implementations of the SIMON 64/128 Block Cipher - J. Wetzels, W. Bokslag (CoRR abs/1507.06368)
- APTs Way: Evading Your EBNIDS (whitepaper) - A. Abbasi, J. Wetzels (Black Hat Europe, October 2014, Amsterdam, The Netherlands)
- On Emulation-Based Network Intrusion Detection Systems - A. Abbasi, J. Wetzels, W. Bokslag, E. Zambon, S. Etalle (RAID, September 2014, Gothenburg, Sweden)
- Hidden in snow, revealed in thaw: Cold boot attacks revisited - J. Wetzels (CoRR abs/1408.0725)
- Broken keys to the kingdom: Security and privacy aspects of RFID-based car keys - J. Wetzels (CoRR abs/1405.7424)
Presentations
- Dissecting QNX - Analyzing & Breaking QNX Exploit Mitigations and Secure Random Number Generators - Infiltrate, April 2018, Miami, USA
- Analyzing & Breaking Exploit Mitigations and PRNGs on QNX For Automotive, Industrial, Medical and Other Embedded Systems - BlackHat Asia, March 2018, Singapore
- Dissecting QNX - Analyzing & Breaking QNX Exploit Mitigations and Secure Random Number Generators - OffensiveCon, February 2018, Berlin, Germany
- Dissecting QNX - REcon, February 2018, Brussels, Belgium
- Taking a scalpel to QNX: Analyzing & Breaking Exploit Mitigations and Secure Random Number Generators on QNX 6.6 and 7.0 - 34C3, December 2017, Leipzig, Germany
- The Industrial Internet of Sitting Ducks - Swiss Cyber Storm, October 2017, Lucerne, Switzerland (slides)
- The RTOS Exploit Mitigation Blues - Hardwear.io, September 2017, Den Haag, The Netherlands (slides)
- Ghost in the Machine: Challenges in Embedded Binary Security - USENIX Enigma, January 2017, Oakland, USA (slides)
- Wheel of Fortune: Analyzing Embedded OS Random Number Generators - 33C3, December 2016, Hamburg, Germany (slides)
- Hardware implementation of Keyak v2 - Radboud University (RU) Digital Security group Research Internship, January 2016, Nijmegen, The Netherlands
- APTs Way: Evading your EBNIDS - Black Hat Europe, October 2014, Amsterdam, The Netherlands (slides)
- Security aspects of RFID-enabled Car Keys - Eindhoven University of Technology (TU/e) Seminar Information Security Technology, April 2014, Eindhoven, The Netherlands
Vulnerabilities
Bug Bounties
Exploits
Open-Source Projects