LAMOTTE, Wim

Full Name
LAMOTTE, Wim
Email
wim.lamotte@uhasselt.be
 
Loading... 5 0 5 0 false
Loading... 6 0 5 0 false

Publications

Refined By:
Author:  ROBYNS, Pieter

Results 1-13 of 13 (Search time: 0.004 seconds).

Issue DateTitleContributor(s)TypeCat.
12020Practical Operation Extraction from Electromagnetic Leakage for Side-Channel Analysis and Reverse EngineeringROBYNS, Pieter; DI MARTINO, Mariano; Giese, Dennis; LAMOTTE, Wim; QUAX, Peter; Noubir, GuevaraProceedings PaperC1
22019IUPTIS: Fingerprinting Profile Webpages in a Dynamic and Practical DPI ContextDI MARTINO, Mariano; ROBYNS, Pieter; QUAX, Peter; LAMOTTE, WimProceedings PaperC1
32019Personal Information Leakage by Abusing the GDPR 'Right of Access'DI MARTINO, Mariano; ROBYNS, Pieter; Weyts, Winnie; QUAX, Peter; LAMOTTE, Wim; ANDRIES, KenProceedings PaperC1
42018IUPTIS: A Practical, Cache-resistant Fingerprinting Technique for Dynamic WebpagesDI MARTINO, Mariano; ROBYNS, Pieter; QUAX, Peter; LAMOTTE, WimProceedings PaperC1
52018A Multi-Channel Software Decoder for the LoRa Modulation SchemeROBYNS, Pieter; QUAX, Peter; LAMOTTE, Wim; Thenaers, WilliamProceedings PaperC1
62018Improving CEMA using Correlation OptimizationROBYNS, Pieter; QUAX, Peter; LAMOTTE, WimJournal ContributionA1
72017Physical-Layer Fingerprinting of LoRa devices using Supervised and Zero-Shot LearningROBYNS, Pieter; Marin, Eduard; LAMOTTE, Wim; QUAX, Peter; Singelée, Dave; Preneel, BartProceedings PaperC1
82017Non-cooperative 802.11 MAC layer fingerprinting and tracking of mobile devicesROBYNS, Pieter; BONNE, Bram; QUAX, Peter; LAMOTTE, WimJournal ContributionA1
92017Opinion: PHY-Layer Security is no Alternative to CryptographyROBYNS, Pieter; QUAX, Peter; LAMOTTE, WimProceedings PaperC1
102016POSTER: Assessing the Impact of 802.11 Vulnerabilities using WicabilityROBYNS, Pieter; BONNE, Bram; QUAX, Peter; LAMOTTE, WimProceedings PaperC1
112016Assessing the Impact of 802.11 Vulnerabilities using WicabilityROBYNS, Pieter; BONNE, Bram; QUAX, Peter; LAMOTTE, WimConference MaterialC2
122015Injection attacks on 802.11n MAC frame aggregationROBYNS, Pieter; QUAX, Peter; LAMOTTE, WimProceedings PaperC1
132014Short paper: exploiting WPA2-enterprise vendor implementation weaknesses through challenge response oraclesROBYNS, Pieter; BONNE, Bram; QUAX, Peter; LAMOTTE, WimProceedings PaperC1