About .bx

Rebecca ".bx" Shapiro is a computer science PhD Student and computer security researcher at Dartmouth College. She has spoken about ELF in various venues including DEF CON, CCC, ToorCon, USENIX WOOT, and H2HC.

Talks

.bx Shapiro, R. (2014). The Evoluation of Linux Kernel Module Signing. Shmoocon.

Bratus, S., Bangert, J., & .bx Shapiro, R. (2013). Revisiting "Trusting Trust" for Binary Toolchains. 30C3. Retrieved from https://www.youtube.com/watch?v=QogdeTy7cDc

Bangert, J., Bratus, S., & .bx Shapiro, R. (2013). ELF Eccentricities. BerlinSides 0x4.

(missing reference)

.bx Shapiro, R. (2012). The Care and Feeding of Weird Machines Found in Executable Metadata. 29C3. Retrieved from https://www.youtube.com/watch?v=dnLYoMIBhpo

.bx Shapiro, R. (2012). Programming Weird Machines with ELF Metadata. ToorCon 14 San Diego.

.bx Shapiro, R., & Bratus, S. (2012). Programming Weird Machines with ELF Metadata (DEF CON). DEF CON XX. Retrieved from https://www.youtube.com/watch?v=V5KsUm1KfZE

.bx Shapiro, R., & Bratus, S. (2012). Constructing ELF Metadata. BerlinSides 0x3.

Publications

Jenkins, I. R., Shapiro, R., Bratus, S., Goodspeed, T., Speers, R., & Dowd, D. (2014). Short Paper: Speaking the Local Dialect: Exploiting Differences Between Ieee 802.15.4 Receivers with Commodity Radios for Fingerprinting, Targeted Attacks, and Wids Evasion. In Proceedings of the 2014 ACM Conference on Security and Privacy in Wireless and Mobile Networks (pp. 63–68). New York, NY, USA: ACM. http://doi.org/10.1145/2627393.2627408

(missing reference)

Bangert, J., Bratus, S., Shapiro, R., & Smith, S. W. (2013). The Page-Fault Weird Machine: Lessons in Instruction-less Computation. In Presented as part of the 7th USENIX Workshop on Offensive Technologies. Berkeley, CA: USENIX. Retrieved from https://www.usenix.org/conference/woot13/workshop-program/presentation/Bangert

Tan, S., Shapiro, R., & Smith, S. W. (2013). Electronic Prescription for Controlled Substances: A Cybersecurity Perspective. In Presented as part of the 2013 USENIX Workshop on Health Information Technologies. Berkeley, CA: USENIX. Retrieved from https://www.usenix.org/conference/healthtech13/workshop-program/presentation/Tan

(missing reference)

.bx Shapiro, R. (2013). Returning from ELF to libc. In POC or GTFO (Vol. 0x0). POC or GTFO. Retrieved from https://archive.org/details/Pocorgtfo00

Goodspeed, T., Bratus, S., Melgares, R., Shapiro, R., & Speers, R. (2011). Packets in Packets: Orson Welles’ In-band Signaling Attacks for Modern Radios. In Proceedings of the 5th USENIX Conference on Offensive Technologies (pp. 7–7). Berkeley, CA, USA: USENIX Association. Retrieved from http://dl.acm.org/citation.cfm?id=2028052.2028059

(missing reference)