
USENIX WOOT Conference on Offensive Technologies
@wootsecurity
Followers
2K
Following
231
Media
119
Statuses
260
WOOT aims to present a broad picture of offense and its contributions, bringing together researchers and practitioners in all areas of computer security
Colocated with Usenix Security
Joined October 2020
WOOT 2025 closing Keynote "Escaping Cantor's Find-Fix Cycle" by @FalconDarkstar from @dartmouth and @aiven_io
0
0
3
Last papers session "Exploit All the Things" (Chair: Cristine Hoepers) - Soufian El Yadmani: SecurePoC—detecting malicious GitHub exploits - Andrea Mambretti: SoK on kernel vuln discovery & auto exploit generation - Junho Lee: BOOTKITTY—stealth bootkit-rootkit for modern OSes
0
2
14
WOOT 2025 late morning session: Application Security (Chair: Yves Younan) - Gabriel Karl Gegenhuber: Prekey Pogo—WhatsApp handshake weaknesses - Manuel Karl: Formula injection in real-world spreadsheets - Jannik Hartung: PHP foot-gun case study (Best paper award !)
0
1
3
WOOT 2025 Day 2 starts with another Physical Attacks session (Chair: A. Zonenberg) - Valentin Huber: Deep dive into FRAM fault injection effects - Boyapally Harishma: Side-channel reality check on ARM Cortex-A72 - Wooyeon Jo: PLC memory exploitation in industrial systems
0
1
3
WOOT 2025 last session today Network Security : - Mehrdad Hajizadeh: DeepRed: AI-driven red teaming vs ML-NIDS - Shujie Zhao: Stealth BGP hijacks under uRPF - Anqi Chen: FUZZVPN: Hunting OpenVPN vulns
0
1
11
WOOT 2025 1st session of the afternoon, "Hacking at a Distance" with: - Tommaso Sacchetti on large scale Bluetooth Security Testing - Chengsong Diao: Vulnerabilities in Master Lock Smart Locks - Seyyed Ali Ayati @itayaila Acoustic Side-Channel on keyboards
0
2
4
WOOT 2025 schedule, all papers are now online open access: https://t.co/i5io1U8uNk Talks are recorded, and should be online in a few weeks.
usenix.org
All sessions will be held in Room 611-612 unless otherwise noted.
0
15
17
First session, on hardware security: Two talks on attacking the @Raspberry_Pi RP2350 by @nSinusR and @azonenberg One talk on exploiting software using hardware fault injections by Zhenyuan Liu
0
1
8
0
0
6
This year artefact evaluation was mandatory! Thanks, Marcel Busch @0ddc0de for chairing the artifact reviews!
0
1
5
WOOT 2025 Conference starting in Seattle. The program prepared by @noopwafel and @naehrdine includes sessions on hardware security, wireless attacks, network security. And tomorrow physical attacks, application security. And Keynote by @FalconDarkstar
1
3
6
The Bootkitty story continues on the @wootsecurity stage!
Our Bootkitty team will announcing "A Stealthy Bootkit-Rootkit Against Modern Operating Systems" soon at USENIX WOOT25. Stay tuned for upcoming presentation. Credit: @B1ack3at, @jihoonab151, HyunA Seo, @Iranu96, @wh1te4ever, Jinho Jung, Hyungjoon Koo. https://t.co/NCyfnqqqXv
0
5
11
Discounted early bird registration for WOOT '25 is open until Monday - https://t.co/bEvwBFx15q - join us in Seattle on Aug 11/12 (right before USENIX Security) for talks and discussions on all kinds of cutting-edge offensive security research (program at https://t.co/i5io1U7WXM).
usenix.org
All sessions will be held in Room 611-612 unless otherwise noted.
0
4
4
Reviewer 2 just rejected your latest offensive security paper? Or didn't submit it anywhere yet? There's still more than a day left to (re)submit to USENIX WOOT '25 and get reviews from a community who love clever hacks, weird bugs 👾 and fun exploits!
0
8
11
Only a week and a half left for USENIX WOOT '25 conference submissions - deadline March 11 AoE. We’re looking forward to seeing even more of your amazing offensive security papers this year! And still a few days for up-and-coming track (March 4). CfP at
usenix.org
*/ Sponsored by USENIX, the Advanced Computing Systems Association. The 19th USENIX WOOT Conference on Offensive Technologies (WOOT '25) will take place August 11–12, 2025, and will be co-located...
0
10
10
USENIX WOOT '25 submissions are due March 11. One month to go - still plenty of time to write a paper about your latest fun offensive security research! Or if you want more guidance to get a paper into shape, up-and-coming track deadline is March 4. CfP at
usenix.org
*/ Sponsored by USENIX, the Advanced Computing Systems Association. The 19th USENIX WOOT Conference on Offensive Technologies (WOOT '25) will take place August 11–12, 2025, and will be co-located...
0
8
17
USENIX WOOT Conference on Offensive Technologies 2025 (WOOT '25) CFP is online! Deadlines: - Up-and-coming track: March 4th, 2025 - Academic track: March 11, 2025 https://t.co/HdNwNnUiAs
usenix.org
*/ Sponsored by USENIX, the Advanced Computing Systems Association. The 19th USENIX WOOT Conference on Offensive Technologies (WOOT '25) will take place August 11–12, 2025, and will be co-located...
0
13
21
📢 The WOOT 2024 presentations are now all available on YouTube: https://t.co/i5nkEbJwDG Enjoy!
youtube.com
0
15
33
Bike component maker Shimano issued a software update to the pro cycling teams who use its wireless gear shifters after researchers found that hackers can spoof or jam the shifters' signals to sabotage riders. Consumers get the patch later this month.
wired.com
Researchers discovered a technique that would allow anyone with a few hundred dollars to hack into wireless gear-shifting systems used by top cycling teams at events like the Tour de France.
7
57
136
Our computer scientists @UCSanDiego not only found a vulnerability in bikes' #wireless gear shifters, they also figured out how to patch it. The work was presented @wootsecurity this week. Excellent coverage by @a_greenberg @WIRED
Bike component maker Shimano issued a software update to the pro cycling teams who use its wireless gear shifters after researchers found that hackers can spoof or jam the shifters' signals to sabotage riders. Consumers get the patch later this month.
0
3
3