Follow
Travis Goodspeed
Travis Goodspeed
Unknown affiliation
Verified email at radiantmachines.com - Homepage
Title
Cited by
Cited by
Year
Implementation and implications of a stealth hard-drive backdoor
J Zaddach, A Kurmus, D Balzarotti, EO Blass, A Francillon, T Goodspeed, ...
Proceedings of the 29th annual computer security applications conference …, 2013
1002013
Why (Special Agent) Johnny (Still) Can't Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System.
S Clark, T Goodspeed, P Metzger, Z Wasserman, K Xu, M Blaze
USENIX Security Symposium 2011, 8-12, 2011
792011
Extracting keys from second generation zigbee chips
T Goodspeed
Black Hat USA 9, 2009
442009
Packets in Packets: Orson Welles'{In-Band} Signaling Attacks for Modern Radios
T Goodspeed, S Bratus, R Melgares, R Shapiro, R Speers
5th USENIX Workshop on Offensive Technologies (WOOT 11), 2011
432011
Api-do: Tools for exploring the wireless attack surface in smart meters
T Goodspeed, S Bratus, R Melgares, R Speers, SW Smith
2012 45th Hawaii International Conference on System Sciences, 2133-2140, 2012
352012
Advanced metering infrastructure attack methodology
M Carpenter, T Goodspeed, B Singletary, E Skoudis, J Wright
InGuardians white paper, 2009
352009
Low-level design vulnerabilities in wireless control systems hardware
T Goodspeed, DR Highfill, BA Singletary
Proceedings of the SCADA Security Scientific Symposium, 3-1, 2009
232009
Half-blind attacks: mask ROM bootloaders are dangerous
T Goodspeed, A Francillon
Proceedings of the 3rd USENIX conference on Offensive technologies. USENIX …, 2009
212009
Stack Overflow Exploits for Wireless Sensor Networks Over 802.15. 4
TM Goodspeed
Texas Instruments Developer Conference, 2008
212008
A side-channel timing attack of the MSP430 BSL
T Goodspeed
Black Hat USA, 2008
172008
Practical Attacks against the MSP430 BSL
T Goodspeed
Twenty-Fifth Chaos Communications Congress. Berlin, Germany, 2008
172008
Perimeter-crossing buses: a new attack surface for embedded systems
S Bratus, T Goodspeed, PC Johnson, SW Smith, R Speers
Proceedings of the 7th Workshop on Embedded Systems Security (WESS 2012), 2012
152012
Promiscuity is the nRF24L01+'s Duty
T Goodspeed
Feb, 2011
122011
Short paper: speaking the local dialect: exploiting differences between ieee 802.15. 4 receivers with commodity radios for fingerprinting, targeted attacks, and wids evasion
IR Jenkins, R Shapiro, S Bratus, T Goodspeed, R Speers, D Dowd
Proceedings of the 2014 ACM conference on Security and privacy in wireless …, 2014
112014
Interrupt-oriented bugdoor programming: A minimalist approach to bugdooring embedded systems firmware
SJ Tan, S Bratus, T Goodspeed
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
102014
Goodfet
T Goodspeed
Online at http://goodfet. sourceforge. net, 2011
102011
MSP430 buffer overflow exploit for wireless sensor nodes
T Goodspeed
August, 2007
72007
Fingerprinting IEEE 802.15. 4 devices with commodity radios
IR Jenkins, R Shapiro, S Bratus, R Speers, T Goodspeed
62014
Fillory of {PHY}: Toward a Periodic Table of Signal Corruption Exploits and Polyglots in Digital Radio
S Bratus, T Goodspeed, A Albertini, DS Solanky
10th USENIX Workshop on Offensive Technologies (WOOT 16), 2016
52016
Phantom boundaries and cross-layer illusions in 802.15. 4 digital radio
T Goodspeed
2014 IEEE Security and Privacy Workshops, 181-184, 2014
52014
The system can't perform the operation now. Try again later.
Articles 1–20