Implementation and implications of a stealth hard-drive backdoor J Zaddach, A Kurmus, D Balzarotti, EO Blass, A Francillon, T Goodspeed, ... Proceedings of the 29th annual computer security applications conference …, 2013 | 113 | 2013 |
Why (Special Agent) Johnny (Still) Can't Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System. S Clark, T Goodspeed, P Metzger, Z Wasserman, K Xu, M Blaze USENIX Security Symposium 2011, 8-12, 2011 | 86 | 2011 |
Packets in Packets: Orson Welles'{In-Band} Signaling Attacks for Modern Radios T Goodspeed, S Bratus, R Melgares, R Shapiro, R Speers 5th USENIX Workshop on Offensive Technologies (WOOT 11), 2011 | 50 | 2011 |
Extracting keys from second generation zigbee chips T Goodspeed Black Hat USA 9, 2009 | 46 | 2009 |
Advanced metering infrastructure attack methodology M Carpenter, T Goodspeed, B Singletary, E Skoudis, J Wright InGuardians white paper, 2009 | 38 | 2009 |
Api-do: Tools for exploring the wireless attack surface in smart meters T Goodspeed, S Bratus, R Melgares, R Speers, SW Smith 2012 45th Hawaii International Conference on System Sciences, 2133-2140, 2012 | 36 | 2012 |
Half-Blind Attacks: Mask ROM Bootloaders are Dangerous. T Goodspeed, A Francillon WOOT, 1-6, 2009 | 24 | 2009 |
Low-level design vulnerabilities in wireless control systems hardware T Goodspeed, DR Highfill, BA Singletary Proceedings of the SCADA Security Scientific Symposium, 3-1, 2009 | 23 | 2009 |
Stack Overflow Exploits for Wireless Sensor Networks Over 802.15. 4 TM Goodspeed Texas Instruments Developer Conference, 2008 | 21 | 2008 |
Practical Attacks against the MSP430 BSL T Goodspeed Twenty-Fifth Chaos Communications Congress. Berlin, Germany, 2008 | 21 | 2008 |
A side-channel timing attack of the MSP430 BSL T Goodspeed Black Hat USA, 2008 | 19 | 2008 |
Perimeter-crossing buses: a new attack surface for embedded systems S Bratus, T Goodspeed, PC Johnson, SW Smith, R Speers Proceedings of the 7th Workshop on Embedded Systems Security (WESS 2012), 2012 | 17 | 2012 |
Interrupt-oriented bugdoor programming: A minimalist approach to bugdooring embedded systems firmware SJ Tan, S Bratus, T Goodspeed Proceedings of the 30th Annual Computer Security Applications Conference …, 2014 | 14 | 2014 |
Promiscuity is the nRF24L01+'s Duty T Goodspeed Feb, 2011 | 14 | 2011 |
Short paper: speaking the local dialect: exploiting differences between ieee 802.15. 4 receivers with commodity radios for fingerprinting, targeted attacks, and wids evasion IR Jenkins, R Shapiro, S Bratus, T Goodspeed, R Speers, D Dowd Proceedings of the 2014 ACM conference on Security and privacy in wireless …, 2014 | 12 | 2014 |
Goodfet T Goodspeed Online at http://goodfet. sourceforge. net, 2010 | 10 | 2010 |
Fillory of {PHY}: Toward a Periodic Table of Signal Corruption Exploits and Polyglots in Digital Radio S Bratus, T Goodspeed, A Albertini, DS Solanky 10th USENIX Workshop on Offensive Technologies (WOOT 16), 2016 | 8 | 2016 |
MSP430 buffer overflow exploit for wireless sensor nodes T Goodspeed August, 2007 | 7 | 2007 |
Fingerprinting IEEE 802.15. 4 devices with commodity radios IR Jenkins, R Shapiro, S Bratus, R Speers, T Goodspeed | 6 | 2014 |
Facedancer usb: Exploiting the magic school bus T Goodspeed, S Bratus Proceedings of the REcon 2012 Conference, 2012 | 6 | 2012 |