Full Name
QUAX, Peter
Email
peter.quax@uhasselt.be
 
Loading... 5 0 5 0 false
Loading... 6 0 5 0 false

Publications

Refined By:
Author:  ROBYNS, Pieter
Type:  Proceedings Paper

Results 1-10 of 10 (Search time: 0.003 seconds).

Issue DateTitleContributor(s)TypeCat.
12020Practical Operation Extraction from Electromagnetic Leakage for Side-Channel Analysis and Reverse EngineeringROBYNS, Pieter; DI MARTINO, Mariano; Giese, Dennis; LAMOTTE, Wim; QUAX, Peter; Noubir, GuevaraProceedings PaperC1
22019IUPTIS: Fingerprinting Profile Webpages in a Dynamic and Practical DPI ContextDI MARTINO, Mariano; ROBYNS, Pieter; QUAX, Peter; LAMOTTE, WimProceedings PaperC1
32019Personal Information Leakage by Abusing the GDPR 'Right of Access'DI MARTINO, Mariano; ROBYNS, Pieter; Weyts, Winnie; QUAX, Peter; LAMOTTE, Wim; ANDRIES, KenProceedings PaperC1
42018IUPTIS: A Practical, Cache-resistant Fingerprinting Technique for Dynamic WebpagesDI MARTINO, Mariano; ROBYNS, Pieter; QUAX, Peter; LAMOTTE, WimProceedings PaperC1
52018A Multi-Channel Software Decoder for the LoRa Modulation SchemeROBYNS, Pieter; QUAX, Peter; LAMOTTE, Wim; Thenaers, WilliamProceedings PaperC1
62017Physical-Layer Fingerprinting of LoRa devices using Supervised and Zero-Shot LearningROBYNS, Pieter; Marin, Eduard; LAMOTTE, Wim; QUAX, Peter; Singelée, Dave; Preneel, BartProceedings PaperC1
72017Opinion: PHY-Layer Security is no Alternative to CryptographyROBYNS, Pieter; QUAX, Peter; LAMOTTE, WimProceedings PaperC1
82016POSTER: Assessing the Impact of 802.11 Vulnerabilities using WicabilityROBYNS, Pieter; BONNE, Bram; QUAX, Peter; LAMOTTE, WimProceedings PaperC1
92015Injection attacks on 802.11n MAC frame aggregationROBYNS, Pieter; QUAX, Peter; LAMOTTE, WimProceedings PaperC1
102014Short paper: exploiting WPA2-enterprise vendor implementation weaknesses through challenge response oraclesROBYNS, Pieter; BONNE, Bram; QUAX, Peter; LAMOTTE, WimProceedings PaperC1