Thorsten Eisenhofer

18 posts

Thorsten Eisenhofer banner
Thorsten Eisenhofer

Thorsten Eisenhofer

@_thrsten

ML & Computer Security

Katılım Eylül 2019
341 Takip Edilen182 Takipçiler
Thorsten Eisenhofer retweetledi
Thorsten Holz
Thorsten Holz@thorstenholz·
Congratulations Dr. @_thrsten
Thorsten Holz tweet mediaThorsten Holz tweet media
Français
10
9
45
6.5K
Thorsten Eisenhofer retweetledi
WIRED
WIRED@WIRED·
Hackers are revealing that quadcopter operators aren’t nearly as hidden as they might think, but researchers have released a tool that can intercept and decode that signal. wired.trib.al/CIKDIDe
English
2
15
21
34.7K
Thorsten Eisenhofer retweetledi
NDSS Symposium
NDSS Symposium@NDSSSymposium·
Nico Schiller from Ruhr-Universität Bochum is presenting his work on Drone Security and the Mysterious Case of DJI's DroneID at #NDSS23, talking about how attackers could eavesdrop on the drone's over-the-air data traffic!
NDSS Symposium tweet media
English
0
6
36
38.6K
Thorsten Eisenhofer retweetledi
Battista Biggio
Battista Biggio@biggiobattista·
@dagstuhl⁩ seminar on Security of Machine Learning - having a great time!
Battista Biggio tweet media
English
2
7
56
0
Thorsten Eisenhofer retweetledi
Doreen Riepel
Doreen Riepel@doreenriepel·
I am happy to announce that our paper "Password-Authenticated Key Exchange from Group Actions" has been accepted to CRYPTO 2022 - joint work with Michel Abdalla, Thorsten Eisenhofer @_thrsten, Eike Kiltz @crypto_theory and Sabrina Kunzweiler
English
3
11
74
0
Thorsten Eisenhofer retweetledi
Nico Schiller
Nico Schiller@74ck_0·
This is what DJI’s Drone-ID packets look like. every drone broadcasts this data all the time. we managed to receive + decode the packets over the air. no encryption. (we saw some confusion around that before) @merlinchlosta 1/n
Nico Schiller tweet media
English
27
348
1.1K
0
Thorsten Eisenhofer retweetledi
mkw.nrw
mkw.nrw@MKW_NRW·
Ein ganz praktisches Beispiel ist der "Alexa-Hacking-Demonstrator" – PhD-Student @_thrsten vom @CASA_EXC zeigt, wie #Sprachassistenten so manipuliert werden können, dass sie versteckte Botschaften wahrnehmen. @ruhrunibochum
mkw.nrw tweet media
Deutsch
1
4
6
0
Thorsten Eisenhofer retweetledi
Adam Bates Yuile
Adam Bates Yuile@AdamBatesOrg·
#ACSAC2020 Voice Security pt 2 -- Pivoting from defense to attack, @leaschnherr presents a robust approach for over-the-air adversarial examples to attack automatic speech recognition. Fittingly, the system is dubbed "Imperio," an unforgiveable curse! ; )
Adam Bates Yuile tweet media
English
1
6
10
0
Thorsten Eisenhofer retweetledi
Thorsten Holz
Thorsten Holz@thorstenholz·
Achievement unlocked: @zdf_logo, a news program for kids, featured our work on smart speakers and my daughters watched it 😍
Thorsten Holz tweet mediaThorsten Holz tweet media
English
2
4
74
0