Travis Goodspeed
Travis Goodspeed
Unknown affiliation
Verified email at - Homepage
Cited by
Cited by
Implementation and implications of a stealth hard-drive backdoor
J Zaddach, A Kurmus, D Balzarotti, EO Blass, A Francillon, T Goodspeed, ...
Proceedings of the 29th annual computer security applications conference …, 2013
Why (Special Agent) Johnny (Still) Can't Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System.
S Clark, T Goodspeed, P Metzger, Z Wasserman, K Xu, M Blaze
USENIX Security Symposium 2011, 8-12, 2011
Packets in Packets: Orson Welles'{In-Band} Signaling Attacks for Modern Radios
T Goodspeed, S Bratus, R Melgares, R Shapiro, R Speers
5th USENIX Workshop on Offensive Technologies (WOOT 11), 2011
Extracting keys from second generation zigbee chips
T Goodspeed
Black Hat USA 9, 2009
Advanced metering infrastructure attack methodology
M Carpenter, T Goodspeed, B Singletary, E Skoudis, J Wright
InGuardians white paper, 2009
Api-do: Tools for exploring the wireless attack surface in smart meters
T Goodspeed, S Bratus, R Melgares, R Speers, SW Smith
2012 45th Hawaii International Conference on System Sciences, 2133-2140, 2012
Half-blind attacks: mask ROM bootloaders are dangerous
T Goodspeed, A Francillon
Proceedings of the 3rd USENIX conference on Offensive technologies. USENIX …, 2009
Low-level design vulnerabilities in wireless control systems hardware
T Goodspeed, DR Highfill, BA Singletary
Proceedings of the SCADA Security Scientific Symposium, 3-1, 2009
Stack Overflow Exploits for Wireless Sensor Networks Over 802.15. 4
TM Goodspeed
Texas Instruments Developer Conference, 2008
A side-channel timing attack of the MSP430 BSL
T Goodspeed
Black Hat USA, 2008
Practical Attacks against the MSP430 BSL
T Goodspeed
Twenty-Fifth Chaos Communications Congress. Berlin, Germany, 2008
Perimeter-crossing buses: a new attack surface for embedded systems
S Bratus, T Goodspeed, PC Johnson, SW Smith, R Speers
Proceedings of the 7th Workshop on Embedded Systems Security (WESS 2012), 2012
Promiscuity is the nRF24L01+'s Duty
T Goodspeed
Feb, 2011
Short paper: speaking the local dialect: exploiting differences between ieee 802.15. 4 receivers with commodity radios for fingerprinting, targeted attacks, and wids evasion
IR Jenkins, R Shapiro, S Bratus, T Goodspeed, R Speers, D Dowd
Proceedings of the 2014 ACM conference on Security and privacy in wireless …, 2014
Interrupt-oriented bugdoor programming: A minimalist approach to bugdooring embedded systems firmware
SJ Tan, S Bratus, T Goodspeed
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
T Goodspeed
Online at http://goodfet. sourceforge. net, 2010
Fillory of {PHY}: Toward a Periodic Table of Signal Corruption Exploits and Polyglots in Digital Radio
S Bratus, T Goodspeed, A Albertini, DS Solanky
10th USENIX Workshop on Offensive Technologies (WOOT 16), 2016
MSP430 buffer overflow exploit for wireless sensor nodes
T Goodspeed
August, 2007
Fingerprinting IEEE 802.15. 4 devices with commodity radios
IR Jenkins, R Shapiro, S Bratus, R Speers, T Goodspeed
Facedancer usb: Exploiting the magic school bus
T Goodspeed, S Bratus
Proceedings of the REcon 2012 Conference, 2012
The system can't perform the operation now. Try again later.
Articles 1–20