Mathy Vanhoef
Prof. @KU_Leuven | Research in Network & Software Security | Known for WPA2 KRACK attack, Dragonblood, and FragAttacks | Open to consultancy | Ex-Postdoc NYU
- Reposted by Mathy Vanhoef[This post could not be retrieved]
- Reposted by Mathy Vanhoef[Not loaded yet]
- I've found AI tools to be quite useful too look for related work. And apparently so do others, searching Google Scholar for "utm_source=chatgpt.com" gives 13,900+ hits ;) scholar.google.com/scholar?star...
- Russia is blocking mobile phones being brought back into the country from abroad for 24 hours, in an attempt to mitigate drone attacks. Seems like this can probably be bypassed using relay "worm hole" attacks, though it adds some complexity. novayagazeta.eu/articles/202...
- Reposted by Mathy Vanhoef[Not loaded yet]
- Reposted by Mathy VanhoefLast chance to (self-) nominate for USENIX Security'26 Artifact Evaluation Committee! You should expect a low load of ~1 artifact for functionality/reproducibility assessments per cycle (max 3 for the whole year). Please support Open Science and fill the form by Oct 17: forms.gle/WoYRX4govNY1... 🚀
- Reposted by Mathy Vanhoef[Not loaded yet]
- Reposted by Mathy Vanhoef[Not loaded yet]
- At USENIX Security? Then check out: Studying the Use of CVEs in Academia, won distinguished paper award www.usenix.org/conference/u... Discovering and Exploiting Vulnerable Tunnelling Hosts, won most innovative research Pwnie @ DEFCON www.usenix.org/conference/u... Big thanks to all co-authors!!
- Reposted by Mathy Vanhoef[Not loaded yet]
- Reposted by Mathy VanhoefBreaking: NSF is suspending roughly 300 grants with UCLA, following a DOJ finding on Tuesday that the university violated Title VI by "creating a hostile educational environment for Jewish and Israeli students."
- Our research on open tunneling servers got nominated for the Most Innovative Research award :) The work will be presented by Angelos Beitis at Black Hat and also at USENIX Security Brief summary and code: github.com/vanhoefm/tun... Paper: papers.mathyvanhoef.com/usenix2025-t...
- Reposted by Mathy Vanhoef[Not loaded yet]
- Yikes. Turns out you can send a plaintext radio signal to cause any train in the USA to do an emergency break. The original 'security' was just a checksum, no encryption or authentication. Reporting this took them 12 years (!) because the vendor dismissed it initially www.cisa.gov/news-events/...
- Reposted by Mathy Vanhoef[Not loaded yet]
- Reposted by Mathy Vanhoef[Not loaded yet]
- Senate GOP budget bill has little-noticed provision that could hurt your Wi-Fi arstechnica.com/tech-policy/... ==> Possibly no 6GHz for Wi-Fi 7
- Reminder to apply to be part of the artifact evaluation committee of NDSS'26! And share with your colleagues :) We'll likely close this form around the end of next week.
- All papers should publish their code. Help realize this by becoming an artifact reviewer at NDSS'26, apply here: docs.google.com/forms/d/e/1F... You'll review artifacts of accepted papers. We especially encourage junior/senior PhD students & PostDocs to help. Distinguished reviews will get awards!
- Reposted by Mathy VanhoefLee Jae-myung, the South Korean politician who climbed the fence of the parliament to get inside and vote against martial law, has been elected president. Pretty cooool
- All papers should publish their code. Help realize this by becoming an artifact reviewer at NDSS'26, apply here: docs.google.com/forms/d/e/1F... You'll review artifacts of accepted papers. We especially encourage junior/senior PhD students & PostDocs to help. Distinguished reviews will get awards!
- Reposted by Mathy Vanhoef[Not loaded yet]
- Reposted by Mathy VanhoefHaven't seen this on Bluesky yet: S&P 2027 will take place in Montreal, Canada!
- New version of the IEEE 802.11 standard that underpins Wi-Fi was has been released. A total of 5969 pages! The number of pages clearly keeps increasing. That includes more features to defend networks, but also more features to potentially abuse 👀
- Reposted by Mathy Vanhoef[Not loaded yet]
- Reposted by Mathy Vanhoef[Not loaded yet]
- Reposted by Mathy VanhoefDoes the culture you grow up in shape the way you see the world? In a new Psych Review paper, @chazfirestone.bsky.social & I tackle this centuries-old question using the Müller-Lyer illusion as a case study. Come think through one of history's mysteries with us🧵(1/13):
- Reposted by Mathy Vanhoef[Not loaded yet]
- After an embargo of 8 months, we are glad to finally share our USENIX Security '25 paper! We found more than 4 MILLION vulnerable tunneling servers by scanning the Internet. These vulnerable servers can be abused as proxies to launch DDoS attacks and possibly to access internal networks.
- We investigated the owners of some of these vulnerable tunneling servers. This revealed that notable domains, such as Facebook’s content delivery network (CDN) and Tencent’s cloud services were affected. The home routers of some national ISPs were also affected.
- Reposted by Mathy Vanhoef[Not loaded yet]
- Reposted by Mathy Vanhoef[Not loaded yet]
- Reposted by Mathy Vanhoef[This post could not be retrieved]
- Reposted by Mathy Vanhoef[Not loaded yet]
- Reposted by Mathy Vanhoef[Not loaded yet]
- Reposted by Mathy Vanhoef[Not loaded yet]
- Reposted by Mathy Vanhoef[Not loaded yet]
- Wow, an adversary first compromised a neighbor of the target, and then attacked the target over Wi-Fi (with stolen password). This is the first observed case of the #AntennaForHire attack that AirEye hypothesized. Any Wi-Fi attack is now a remote attack! www.volexity.com/blog/2024/11...
- Reposted by Mathy Vanhoef[Not loaded yet]
- Reposted by Mathy Vanhoef[Not loaded yet]
- Reposted by Mathy Vanhoef[Not loaded yet]
- Reposted by Mathy Vanhoef[Not loaded yet]
- Reposted by Mathy Vanhoef[Not loaded yet]
- Reposted by Mathy Vanhoef[Not loaded yet]
- Reposted by Mathy Vanhoef[Not loaded yet]
- Reposted by Mathy Vanhoef[Not loaded yet]
- New #TunnelCrack flaw can break a large majority of VPNs: we can trick a VPN into leaking traffic outside the protected VPN tunnel. Our tests indicate that this is a widespread design issue. For a demo, more details, and the USENIX Security paper, see tunnelcrack.mathyvanhoef.com
- 300+ scientists from 32 countries have signed an open letter criticizing the EU proposal for regulation to detect Child Sexual Abuse Material docs.google.com/document/d/13Aeex72… TL;DR ineffective; risk for function creep/abuse; violates human rights
- Reposted by Mathy Vanhoef[Not loaded yet]
- Reposted by Mathy Vanhoef[Not loaded yet]
- I always knew some VPN companies were shady. But seeing how they treat vulnerability disclosures makes some of them look even worse. At least there are some that treat the reports properly though and that do live up to their reputation. To be continued...
- Reposted by Mathy Vanhoef[Not loaded yet]