Usenix WOOT Conference on Offensive Technologies 

196 Followers
6 Following
50 Posts
WOOT aims to present a broad picture of offense and its contributions, bringing together researchers and practitioners in all areas of computer security.
Co-located with USENIX Security '25 in Seattle on
August 11–12, 2025
The first session on day two of WOOT was on Physical Attacks, chaired by @azonenberg - three papers covering a broad range of topics!
First WOOT session today was on Hardware Security - two talks on a variety of cutting-edge attacks against the RP2350 and a talk about automating the identification of hardware fault injection attacks against software using pre-silicon analysis.

WOOT! Big news!

Starting 2024 WOOT will be the USENIX WOOT Conference on Offensive Technologies!

@usenixassociation WOOT '24 will take place on August 12-13 2024, co-located with USENIX Security

WOOT '24 will be co-chaired by @noopwafel (Intel) and @adamd (ASU)

https://www.usenix.org/conference/woot24

WOOT '24

The USENIX WOOT Conference aims to present a broad picture of offense and its contributions, bringing together researchers and practitioners across all areas of computer security.

USENIX

🥰 Thanks to all attendees, keynote speakers, and authors for attending WOOT, and to the sponsors for their support!

A special thanks to @reyammer and @sara_rampazzi for chairing, and @blueminimal for handling the artifacts.

👉 Stay tuned for WOOT 2024 and consider submitting your work!

🏆*WOOT 2023 BEST STUDENT PAPER AWARD* 🏆

"The ghost is the machine: weird machines in transient execution"

Congratulations to the authors!!!

🏆🏆*WOOT 2023 BEST PAPER AWARD* 🏆🏆

"CustomProcessingUnit: Reverse Engineering and Customization of Intel Microcode"

Congratulation to the authors!!! @borrello_pietro
@cat_easdon
@marv0x90
@misc0110

Session 4: Web & Network Security! Last but not least

"Scripted Henchmen: Leveraging XS-Leaks for Cross-Site Vulnerability Detection"

"Hakuin: Optimizing Blind SQL Injection with Probabilistic Language Models"

"Towards Simultaneous Attacks on Multiple Cellular Networks"

Session 3 2st part:

"Go or No Go: Differential Fuzzing of Native and C Libraries" @sigusr0, @mweissbacher, @kurmus

"ASanity: On Bug Shadowing by Early ASan Exits" @domenuk, @vinulium

Check out the papers at http://wootconference.org/!

17th Workshop On Offensive Technologies (WOOT '23)

Session 3 1st part:

"Fuzzing the Latest NTFS in Linux with Papora: An Empirical Study"

"Divergent Representations: When Compiler Optimizations Enable Exploitation"

Ready for our second Keynote? @richinseattle
(Richard Johnson) is here NOW at #woot23