Stateful Declassification Policies for Event-Driven Programs
HacknamStyle Plaid CTF write-up
Informal Presentation on WPA-TKIP
New flaws in WPA-TKIP
Practical Verification of TKIP Vulnerabilities
Advanced WiFi Attacks Using Commodity Hardware
Predicting and Abusing WPA2/802.11 Group Keys
USENIX Security '15: All Your Biases Belong To Us: Breaking RC4 in WPA-TKIP and TLS