Mathy Vanhoef

Mathy Vanhoef

Currently I'm doing a PostDoc abroad at NYU Abu Dhabi. I'll be returning to Belgium at the end of 2021 at which point I'll start as an assistant professor at KU Leuven. Before this I obtained my PhD at KU Leuven and got my bachelor's and master's degree at Hasselt University.

If you want to reach me: I' available at standard Belgium hours.

See my website for my research interests, recent PC memberships, academic service, and recent notable publications.

My PGP key fingerprint is 40FE C75D 8E27 439B 2FCF  BFF9 D2F5 B295 95A9 87F5.


Key publications:

  1. Tom Van Goethem, Christina P÷pper, Wouter Joosen, Mathy Vanhoef, Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote Connections, (eds. Srdjan Capkun, Franziska Roesner), USENIX Security Symposium, Proceedings of the 29th USENIX Security Symposium, 17 pages, Virtual Event, August 12-14, 2020 download0 3095733bibtex   3095733lirias
  2. Mathy Vanhoef, Eyal Ronen, Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd, 41st IEEE Symposium on Security and Privacy, Proceedings of the 2020 IEEE Symposium on Security and Privacy - S&P 2020), 17 pages, San Francisco, USA, May 18-21, 2020 download0   2845125lirias 2845125doi
  3. Mathy Vanhoef, Frank Piessens, Key reinstallation attacks: Forcing nonce reuse in WPA2, (eds. Bhavani M Thuraisingham, David Evans, Tal Malkin, Dongyan Xu), ACM SIGSAC Conference on Computer and Communications Security (CCS 2017), Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS 2017), pages 1313-1328, Dallas, TX, October 30 - November 3, 2017 download0 1628526bibtex   1628526lirias 1628526doi
  4. Mathy Vanhoef, Frank Piessens, All your biases belong to us: Breaking RC4 in WPA-TKIP and TLS, (eds. Jaeyeon Jung, Thorsten Holz), USENIX Security Symposium , Proceedings of the 24th USENIX Security Symposium , pages 97-112, Washington, D.C., August 12-14, 2015 download0 1656514bibtex   1656514lirias
  5. Mathy Vanhoef, Frank Piessens, Advanced Wi-Fi attacks using commodity hardware, (eds. Charles N Payne Jr, Adam Hahn, Kevin RB Butler, Micah Sherr), Annual Computer Security Applications Conference (ACSAC) , Proceedings of the 30th Annual Computer Security Applications Conference (ACSAC 2014) , volume 2014-December, issue December, pages 256-265, New Orleans, Louisiana, USA, December 8-12, 2014 download0 1581695bibtex   1581695lirias 1581695doi


Contact info

  • Office: 04.143
  • Address:
    Dept. Computer Science
    Celestijnenlaan 200A - bus 2402
    B-3001 Heverlee
  • Tel: +32 16 373892
  • Fax: +32 16 327996
  • Email: Mathy Vanhoef