Follow
Travis Goodspeed
Travis Goodspeed
Unknown affiliation
Verified email at radiantmachines.com - Homepage
Title
Cited by
Cited by
Year
Implementation and implications of a stealth hard-drive backdoor
J Zaddach, A Kurmus, D Balzarotti, EO Blass, A Francillon, T Goodspeed, ...
Proceedings of the 29th annual computer security applications conference …, 2013
1052013
Why (Special Agent) Johnny (Still) Can't Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System.
S Clark, T Goodspeed, P Metzger, Z Wasserman, K Xu, M Blaze
USENIX Security Symposium 2011, 8-12, 2011
812011
Packets in Packets: Orson Welles'{In-Band} Signaling Attacks for Modern Radios
T Goodspeed, S Bratus, R Melgares, R Shapiro, R Speers
5th USENIX Workshop on Offensive Technologies (WOOT 11), 2011
522011
Extracting keys from second generation zigbee chips
T Goodspeed
Black Hat USA 9, 2009
452009
Advanced metering infrastructure attack methodology
M Carpenter, T Goodspeed, B Singletary, E Skoudis, J Wright
InGuardians white paper, 2009
382009
Api-do: Tools for exploring the wireless attack surface in smart meters
T Goodspeed, S Bratus, R Melgares, R Speers, SW Smith
2012 45th Hawaii International Conference on System Sciences, 2133-2140, 2012
362012
Half-Blind Attacks: Mask ROM Bootloaders are Dangerous.
T Goodspeed, A Francillon
WOOT, 1-6, 2009
242009
Low-level design vulnerabilities in wireless control systems hardware
T Goodspeed, DR Highfill, BA Singletary
Proceedings of the SCADA Security Scientific Symposium, 3-1, 2009
232009
Stack Overflow Exploits for Wireless Sensor Networks Over 802.15. 4
TM Goodspeed
Texas Instruments Developer Conference, 2008
19*2008
Practical Attacks against the MSP430 BSL
T Goodspeed
Twenty-Fifth Chaos Communications Congress. Berlin, Germany, 2008
192008
A side-channel timing attack of the MSP430 BSL
T Goodspeed
Black Hat USA, 2008
182008
Perimeter-crossing buses: a new attack surface for embedded systems
S Bratus, T Goodspeed, PC Johnson, SW Smith, R Speers
Proceedings of the 7th Workshop on Embedded Systems Security (WESS 2012), 2012
162012
Promiscuity is the nRF24L01+'s Duty
T Goodspeed
Feb, 2011
142011
Interrupt-oriented bugdoor programming: A minimalist approach to bugdooring embedded systems firmware
SJ Tan, S Bratus, T Goodspeed
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
112014
Speaking the local dialect: exploiting differences between IEEE 802.15. 4 receivers with commodity radios for fingerprinting, targeted attacks, and WIDS evasion
IR Jenkins, R Shapiro, S Bratus, T Goodspeed, R Speers, D Dowd
102014
Goodfet
T Goodspeed
Online at http://goodfet. sourceforge. net, 2010
102010
Fillory of {PHY}: Toward a Periodic Table of Signal Corruption Exploits and Polyglots in Digital Radio
S Bratus, T Goodspeed, A Albertini, DS Solanky
10th USENIX Workshop on Offensive Technologies (WOOT 16), 2016
82016
MSP430 buffer overflow exploit for wireless sensor nodes
T Goodspeed
August, 2007
72007
Fingerprinting IEEE 802.15. 4 devices with commodity radios
IR Jenkins, R Shapiro, S Bratus, R Speers, T Goodspeed
62014
Facedancer usb: Exploiting the magic school bus
T Goodspeed, S Bratus
Proceedings of the REcon 2012 Conference, 2012
62012
The system can't perform the operation now. Try again later.
Articles 1–20