Mathy Vanhoef
@vanhoefm.bsky.social
760 followers 350 following 39 posts
Prof. @KU_Leuven | Research in Network & Software Security | Known for WPA2 KRACK attack, Dragonblood, and FragAttacks | Open to consultancy | Ex-Postdoc NYU
Posts Media Videos Starter Packs
Reposted by Mathy Vanhoef
mjg59.eicar-test-file.zip
I have been learning more about PDFs than I really wanted to for maybe the absolutely most funny reason possible - letting agency forgery: mjg59.dreamwidth.org/73317.html
Reposted by Mathy Vanhoef
lauriewired.bsky.social
The West has a blindspot when it comes to alternative CPU designs.



We’re so entrenched in the usual x86, ARM, RISC-V world, that most people have no idea what’s happening over in China.



LoongArch is a fully independent ISA that’s sorta MIPS…sorta RISC-V…and sorta x87!
vanhoefm.bsky.social
At USENIX Security? Then check out:

Studying the Use of CVEs in Academia, won distinguished paper award www.usenix.org/conference/u...

Discovering and Exploiting Vulnerable Tunnelling Hosts, won most innovative research Pwnie @ DEFCON www.usenix.org/conference/u...

Big thanks to all co-authors!!
Reposted by Mathy Vanhoef
nadim.computer
I'm thrilled to announce that after months of intensive work, the complete materials for my Applied Cryptography course at the American University of Beirut are now finished: both Part 1 (Provable Security) and Part 2 (Real-World Cryptography)!
Reposted by Mathy Vanhoef
dangaristo.bsky.social
Breaking: NSF is suspending roughly 300 grants with UCLA, following a DOJ finding on Tuesday that the university violated Title VI by "creating a hostile educational environment for Jewish and Israeli students."
vanhoefm.bsky.social
Our research on open tunneling servers got nominated for the Most Innovative Research award :)

The work will be presented by Angelos Beitis at Black Hat and also at USENIX Security

Brief summary and code: github.com/vanhoefm/tun...
Paper: papers.mathyvanhoef.com/usenix2025-t...
vanhoefm.bsky.social
Disclosure timeline is on X/twitter: reported in 2012, but no real response because it was considered theoretical. They weren't given access to a train's test track facility, so impossible to confirm ethically in practice. Devices now considered end of life. Replacement is maybe here in 2027..
vanhoefm.bsky.social
Yikes. Turns out you can send a plaintext radio signal to cause any train in the USA to do an emergency break. The original 'security' was just a checksum, no encryption or authentication. Reporting this took them 12 years (!) because the vendor dismissed it initially www.cisa.gov/news-events/...
End-of-Train and Head-of-Train Remote Linking Protocol | CISA
www.cisa.gov
Reposted by Mathy Vanhoef
davidpicard.bsky.social
Reminder that the MSCA postdoctoral program exists. If you have a PhD and want to work in a European lab, you have until September to apply. Just contact them now.

ec.europa.eu/info/funding...
ec.europa.eu
vanhoefm.bsky.social
I somehow missed this paper. Creative work of the authors, thanks for sharing!
vanhoefm.bsky.social
Reminder to apply to be part of the artifact evaluation committee of NDSS'26! And share with your colleagues :) We'll likely close this form around the end of next week.
vanhoefm.bsky.social
All papers should publish their code. Help realize this by becoming an artifact reviewer at NDSS'26, apply here: docs.google.com/forms/d/e/1F...

You'll review artifacts of accepted papers. We especially encourage junior/senior PhD students & PostDocs to help. Distinguished reviews will get awards!
Self-nomination for the Artifact Evaluation Committee of NDSS 2026
We are looking for members of the Artifact Evaluation Committee (AEC) of NDSS 2026. The Network and Distributed System Security symposium adopts an Artifact Evaluation (AE) process allowing authors t...
docs.google.com
Reposted by Mathy Vanhoef
vanhoefm.bsky.social
All papers should publish their code. Help realize this by becoming an artifact reviewer at NDSS'26, apply here: docs.google.com/forms/d/e/1F...

You'll review artifacts of accepted papers. We especially encourage junior/senior PhD students & PostDocs to help. Distinguished reviews will get awards!
Self-nomination for the Artifact Evaluation Committee of NDSS 2026
We are looking for members of the Artifact Evaluation Committee (AEC) of NDSS 2026. The Network and Distributed System Security symposium adopts an Artifact Evaluation (AE) process allowing authors t...
docs.google.com
vanhoefm.bsky.social
I saw that too.. good luck with the submission!
Reposted by Mathy Vanhoef
thorbenson.bsky.social
Lee Jae-myung, the South Korean politician who climbed the fence of the parliament to get inside and vote against martial law, has been elected president. Pretty cooool
Lee Jae-myung going beast mode
vanhoefm.bsky.social
The Wi-Fi Alliance test plan is something I haven't seen myself... it's indeed annoying to get familiar with the big picture. Though I would say that the Dragonfly RFC can be ignored, the full description is in the IEEE 802.11 standard, and 802.11 contains updates to the side-channel leaks etc.
vanhoefm.bsky.social
So the WPA3 document is basically "support these features of the 802.11 standard, and some minor extensions in that document, and then you can call yourself WPA3" + some best practices
vanhoefm.bsky.social
A lot of 'WPA3' is a marketing and test suite on top of the 802.11 standard. I don't think the 2024 release of 802.11 made any substantial changes to SAE. Instead, the 2024 release incorporated other amendments like 802.11ax and 802.11ay into a single document.
vanhoefm.bsky.social
The GET program makes standards available after 6 months. But you're unlucky with timing: last month the 2024 edition of 802.11 was released. This means the 2020 version is no longer accessible under GET, and you need to wait 6 months for the 2024 edition under GET access. Yeah, I know...
vanhoefm.bsky.social
Core of WPA3 is Simultaneous Authentication of Equals (SAE), defined in IEEE 802.11, the 2024 version of that document will be available for free in around 6 months... The WPA3 'spec' on top of IEEE is public
vanhoefm.bsky.social
All papers should publish their code. Help realize this by becoming an artifact reviewer at NDSS'26, apply here: docs.google.com/forms/d/e/1F...

You'll review artifacts of accepted papers. We especially encourage junior/senior PhD students & PostDocs to help. Distinguished reviews will get awards!
Self-nomination for the Artifact Evaluation Committee of NDSS 2026
We are looking for members of the Artifact Evaluation Committee (AEC) of NDSS 2026. The Network and Distributed System Security symposium adopts an Artifact Evaluation (AE) process allowing authors t...
docs.google.com
Reposted by Mathy Vanhoef
kaspernollet.bsky.social
Calling researchers: EU #grantconsultancy 🚨

Have you worked with private grant consultants for EU research funding (Horizon, EIC, etc.)—Have you had positive or negative experiences?
📩 Share your story: [email protected] / [email protected] (@thordeyaert.bsky.social)
🔁 RT appreciated!