Follow
Jos Wetzels
Jos Wetzels
Graduate student, Kerckhoffs Institute for Computer Security
Verified email at student.tue.nl
Title
Cited by
Cited by
Year
Challenges in designing exploit mitigations for deeply embedded systems
A Abbasi, J Wetzels, T Holz, S Etalle
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 31-46, 2019
592019
On emulation-based network intrusion detection systems
A Abbasi, J Wetzels, W Bokslag, E Zambon, S Etalle
Research in Attacks, Intrusions and Defenses: 17th International Symposium …, 2014
292014
Broken keys to the kingdom: Security and privacy aspects of RFID-based car keys
J Wetzels
arXiv preprint arXiv:1405.7424, 2014
262014
Simple SIMON: FPGA implementations of the SIMON 64/128 Block Cipher
J Wetzels, W Bokslag
arXiv preprint arXiv:1507.06368, 2015
222015
Open sesame: The password hashing competition and Argon2
J Wetzels
arXiv preprint arXiv:1602.03097, 2016
202016
Where's Crypto?: Automated Identification and Classification of Proprietary Cryptographic Primitives in Binary Code
C Meijer, V Moonsamy, J Wetzels
30th USENIX Security Symposium (USENIX Security 21), 555-572, 2021
102021
Hidden in snow, revealed in thaw: Cold boot attacks revisited
J Wetzels
arXiv preprint arXiv:1408.0725, 2014
62014
NAME: WRECK-Breaking and fixing DNS implementations
D dos Santos, S Dashevskyi, A Amri, J Wetzels, S Oberman, M Kol
Forescout, 2021
52021
Amnesia: 33 How TCP/IP Stacks Breed Critical Vulnerabilities in IoT, OT and IT Devices
D dos Santos, S Dashevskyi, J Wetzels, A Amri
Forescout Research Labs, 2021
52021
Shield: Configurable Code-Reuse Attacks Mitigation For Embedded Systems
A Abbasi, J Wetzels, W Bokslag, E Zambon, S Etalle
International Conference on Network and System Security, 694-709, 2017
52017
Internet of Pwnable things: challenges in embedded binary security
J Wetzels
USENIX; login 42 (02), 73-77, 2017
52017
Sponges and engines: an introduction to Keccak and Keyak
J Wetzels, W Bokslag
arXiv preprint arXiv:1510.02856, 2015
32015
Dissecting QNX
J Wetzels, A Abbasi
Proc. Blackhat Briefings, 1-22, 2018
22018
Ghost in the Machine: Challenges in Embedded Binary Security
J Wetzels
22017
APTs way: evading Your EBNIDS
A Abbasi, J Wetzel
Black Hat Europe, 1-87, 2014
22014
Insecure by design in the backbone of critical infrastructure
J Wetzels, D Dos Santos, M Ghafari
Proceedings of Cyber-Physical Systems and Internet of Things Week 2023, 7-12, 2023
12023
identifying & addressing challenges in embedded binary security
A Wetzels
Eindhoven, Netherlands: Eindhoven University of Technology, 2017
12017
All cops are broadcasting:{TETRA} under scrutiny
C Meijer, W Bokslag, J Wetzels
32nd USENIX Security Symposium (USENIX Security 23), 7463-7479, 2023
2023
RFC 9267 Common Implementation Anti-Patterns Related to Domain Name System (DNS) Resource Record (RR) Processing
S Dashevskyi, D dos Santos, J Wetzels, A Amri
2022
Sponges and Engines
J Wetzels, W Bokslag
2015
The system can't perform the operation now. Try again later.
Articles 1–20