FileMood

Download IEEE Security and Privacy

IEEE Security and Privacy

Name

IEEE Security and Privacy

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

15.5 GB

Total Files

730

Hash

F86108EB7923EA402609773A8614F083E57819E3

/IEEE Security and Privacy 2015/

A Generic Approach to Automatic Deobfuscation of Executable Code.en.transcribed.srt

44.3 KB

A Generic Approach to Automatic Deobfuscation of Executable Code.mp4

33.4 MB

A Messy State of the Union Taming the Composite State Machines of TLS.en.transcribed.srt

56.3 KB

A Messy State of the Union Taming the Composite State Machines of TLS.mp4

40.7 MB

ADSNARK Nearly Practical and Privacy-Preserving Proofs on Authenticated Data.en.transcribed.srt

51.1 KB

ADSNARK Nearly Practical and Privacy-Preserving Proofs on Authenticated Data.mp4

53.2 MB

Ad Injection at Scale Assessing Deceptive Advertisement Modifications.en.transcribed.srt

63.4 KB

Ad Injection at Scale Assessing Deceptive Advertisement Modifications.mp4

32.9 MB

Automatic Inference of Search Patterns for Taint-Style Vulnerabilities.2bb1d160-ca4a-4901-b0cf-f530c029ea97.part

16.7 MB

Automatic Inference of Search Patterns for Taint-Style Vulnerabilities.en.transcribed.srt

35.2 KB

Automatic Inference of Search Patterns for Taint-Style Vulnerabilities.mp4

28.0 MB

Bitcoin over Tor isn't a Good Idea.en.transcribed.srt

48.3 KB

Bitcoin over Tor isn't a Good Idea.mp4

43.8 MB

CHERI A Hybrid Capability-System Architecture for Scalable Software Compartmentalization.en.transcribed.srt

79.1 KB

CHERI A Hybrid Capability-System Architecture for Scalable Software Compartmentalization.mp4

37.2 MB

Caelus Verifying the Consistency of Cloud Services with Battery-Powered Devices.en.transcribed.srt

37.1 KB

Caelus Verifying the Consistency of Cloud Services with Battery-Powered Devices.mp4

47.4 MB

Connection-Oriented DNS to Improve Privacy and Security.en.transcribed.srt

30.3 KB

Connection-Oriented DNS to Improve Privacy and Security.mp4

40.3 MB

Controlled-Channel Attacks Deterministic Side Channels for Untrusted Operating Systems.en.transcribed.srt

40.7 KB

Controlled-Channel Attacks Deterministic Side Channels for Untrusted Operating Systems.mp4

25.7 MB

Counterfeit Object-oriented Programming.en.transcribed.srt

53.5 KB

Counterfeit Object-oriented Programming.mp4

50.5 MB

Cracking-Resistant Password Vaults Using Natural Language Encoders.en.transcribed.srt

34.6 KB

Cracking-Resistant Password Vaults Using Natural Language Encoders.mp4

33.5 MB

Cross-Architecture Bug Search in Binary Executables.en.transcribed.srt

51.6 KB

Cross-Architecture Bug Search in Binary Executables.mp4

71.7 MB

Effective Real-Time Android Application Auditing.en.transcribed.srt

45.5 KB

Effective Real-Time Android Application Auditing.mp4

39.5 MB

Every Second Counts Quantifying the Negative Externalities of Cybercrime via Typosquatting.en.transcribed.srt

45.9 KB

Every Second Counts Quantifying the Negative Externalities of Cybercrime via Typosquatting.mp4

41.2 MB

Forward Secure Asynchronous Messaging from Puncturable Encryption.en.transcribed.srt

52.4 KB

Forward Secure Asynchronous Messaging from Puncturable Encryption.mp4

73.4 MB

GenoGuard Protecting Genomic Data against Brute-Force Attacks.en.transcribed.srt

54.0 KB

GenoGuard Protecting Genomic Data against Brute-Force Attacks.mp4

62.1 MB

Geppetto Versatile Verifiable Computation.en.transcribed.srt

58.9 KB

Geppetto Versatile Verifiable Computation.mp4

45.0 MB

GraphSC Parallel Secure Computation Made Easy.mp4

51.6 MB

High System-Code Security with Low Overhead.en.transcribed.srt

42.7 KB

High System-Code Security with Low Overhead.mp4

90.8 MB

How Secure and Quick is QUIC Provable Security and Performance Analyses.en.transcribed.srt

56.8 KB

How Secure and Quick is QUIC Provable Security and Performance Analyses.mp4

38.3 MB

Last-Level Cache Side-Channel Attacks are Practical.en.transcribed.srt

52.8 KB

Last-Level Cache Side-Channel Attacks are Practical.mp4

35.1 MB

Leave Me Alone App-Level Protection against Runtime Information Gathering on Android.en.transcribed.srt

40.7 KB

Leave Me Alone App-Level Protection against Runtime Information Gathering on Android.mp4

28.7 MB

Malicious-Client Security in Blind Seer A Scalable Private DBMS.en.transcribed.srt

48.6 KB

Malicious-Client Security in Blind Seer A Scalable Private DBMS.mp4

47.6 MB

Micro-Policies Formally Verified, Tag-Based Security Monitors.en.transcribed.srt

51.1 KB

Micro-Policies Formally Verified, Tag-Based Security Monitors.mp4

52.8 MB

Missing the Point(er) On the Effectiveness of Code Pointer Integrity.en.transcribed.srt

62.9 KB

Missing the Point(er) On the Effectiveness of Code Pointer Integrity.mp4

110.8 MB

ObliVM A Programming Framework for Secure Computation.en.transcribed.srt

46.0 KB

ObliVM A Programming Framework for Secure Computation.mp4

35.8 MB

On Subnormal Floating Point and Abnormal Timing.en.transcribed.srt

71.3 KB

On Subnormal Floating Point and Abnormal Timing.mp4

51.0 MB

Opening Remarks of the 2015 IEEE Symposium on Security & Privacy.en.transcribed.srt

14.4 KB

Opening Remarks of the 2015 IEEE Symposium on Security & Privacy.mp4

18.9 MB

Post-Quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors Problem.en.transcribed.srt

47.9 KB

Post-Quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors Problem.mp4

61.1 MB

Privacy and Access Control for Outsourced Personal Records.en.transcribed.srt

53.5 KB

Privacy and Access Control for Outsourced Personal Records.mp4

34.7 MB

Program-Adaptive Mutational Fuzzing.en.transcribed.srt

54.0 KB

Program-Adaptive Mutational Fuzzing.mp4

42.8 MB

Protecting Private Keys against Memory Disclosure Attacks Using Hardware Transactional Memory.715390f9-723e-48d6-a2d9-8fce9adb8a6d.part

215.0 MB

Protecting Private Keys against Memory Disclosure Attacks Using Hardware Transactional Memory.en.transcribed.srt

40.1 KB

Protecting Private Keys against Memory Disclosure Attacks Using Hardware Transactional Memory.mp4

37.7 MB

Readactor Practical Code Randomization Resilient to Memory Disclosure.en.transcribed.srt

42.0 KB

Readactor Practical Code Randomization Resilient to Memory Disclosure.mp4

41.7 MB

Riposte An Anonymous Messaging System Handling Millions of Users.en.transcribed.srt

63.9 KB

Riposte An Anonymous Messaging System Handling Millions of Users.mp4

81.6 MB

S$A A Shared Cache Attack That Works across Cores and Defies VM Sandboxing ....en.transcribed.srt

50.2 KB

S$A A Shared Cache Attack That Works across Cores and Defies VM Sandboxing ....mp4

76.7 MB

Secure Track Verification.en.transcribed.srt

36.8 KB

Secure Track Verification.mp4

83.3 MB

Securing Multiparty Online Services Via Certification of Symbolic Transactions.en.transcribed.srt

28.5 KB

Securing Multiparty Online Services Via Certification of Symbolic Transactions.mp4

40.3 MB

Security of the J-PAKE Password-Authenticated Key Exchange Protocol.mp4

62.2 MB

SoK Deep Packer Inspection A Longitudinal Study of the Complexity of Run-Time Packers.mp4

50.7 MB

SoK Research Perspectives and Challenges for Bitcoin and Cryptocurrencies.en.transcribed.srt

65.8 KB

SoK Research Perspectives and Challenges for Bitcoin and Cryptocurrencies.mp4

57.4 MB

SoK Secure Messaging.en.transcribed.srt

35.1 KB

SoK Secure Messaging.mp4

29.0 MB

SurroundWeb Mitigating Privacy Concerns in a 3D Web Browser.en.transcribed.srt

43.4 KB

SurroundWeb Mitigating Privacy Concerns in a 3D Web Browser.mp4

90.9 MB

Temporal Lensing and Its Application in Pulsing Denial-of-Service Attacks.en.transcribed.srt

46.7 KB

Temporal Lensing and Its Application in Pulsing Denial-of-Service Attacks.mp4

108.4 MB

The Attack of the Clones A Study of the Impact of Shared Code on Vulnerability Patching.en.transcribed.srt

41.2 KB

The Attack of the Clones A Study of the Impact of Shared Code on Vulnerability Patching.mp4

72.3 MB

The Miner's Dilemma.en.transcribed.srt

54.7 KB

The Miner's Dilemma.mp4

36.2 MB

TinyGarble Highly Compressed and Scalable Sequential Garbled Circuits.en.transcribed.srt

38.1 KB

TinyGarble Highly Compressed and Scalable Sequential Garbled Circuits.mp4

36.2 MB

Towards Making Systems Forget with Machine Unlearning.en.transcribed.srt

39.1 KB

Towards Making Systems Forget with Machine Unlearning.mp4

73.9 MB

Understanding and Monitoring Embedded Web Scripts.en.transcribed.srt

40.1 KB

Understanding and Monitoring Embedded Web Scripts.mp4

63.4 MB

Using Hardware Features for Increased Debugging Transparency.en.transcribed.srt

43.9 KB

Using Hardware Features for Increased Debugging Transparency.mp4

43.7 MB

VC3 Trustworthy Data Analytics in the Cloud Using SGX.en.transcribed.srt

53.9 KB

VC3 Trustworthy Data Analytics in the Cloud Using SGX.mp4

35.3 MB

Vetting SSL Usage in Applications with SSLINT.en.transcribed.srt

40.2 KB

Vetting SSL Usage in Applications with SSLINT.mp4

40.4 MB

Virtual Proofs of Reality and their Physical Implementation.en.transcribed.srt

58.6 KB

Virtual Proofs of Reality and their Physical Implementation.mp4

42.2 MB

What the App is That Deception and Countermeasures in the Android User Interface.en.transcribed.srt

47.9 KB

What the App is That Deception and Countermeasures in the Android User Interface.mp4

53.8 MB

/IEEE Security and Privacy 2016/

A Method for Verifying Privacy-Type Properties The Unbounded Case.en.transcribed.srt

42.6 KB

A Method for Verifying Privacy-Type Properties The Unbounded Case.mp4

67.3 MB

A Practical Oblivious Map Data Structure with Secure Deletion and History Independence.en.transcribed.srt

67.6 KB

A Practical Oblivious Map Data Structure with Secure Deletion and History Independence.mp4

79.4 MB

A Tough call Mitigating Advanced Code-Reuse Attacks At The Binary Level.en.transcribed.srt

36.1 KB

A Tough call Mitigating Advanced Code-Reuse Attacks At The Binary Level.mp4

81.3 MB

A2 Analog Malicious Hardware.en.transcribed.srt

69.2 KB

A2 Analog Malicious Hardware.mp4

95.5 MB

Algorithmic Transparency via Quantitative Input Influence ....en.transcribed.srt

53.8 KB

Algorithmic Transparency via Quantitative Input Influence ....mp4

105.1 MB

Automated Analysis and Verification of TLS 1.3 0-RTT, Resumption and Delayed Authentication.en.transcribed.srt

44.5 KB

Automated Analysis and Verification of TLS 1.3 0-RTT, Resumption and Delayed Authentication.mp4

78.6 MB

Back in Black Towards Formal, Black Box Analysis of Sanitizers and Filters.en.transcribed.srt

53.5 KB

Back in Black Towards Formal, Black Box Analysis of Sanitizers and Filters.mp4

72.4 MB

Beauty and the Beast Diverting modern web browsers to build unique browser fingerprints.en.transcribed.srt

57.4 KB

Beauty and the Beast Diverting modern web browsers to build unique browser fingerprints.mp4

80.9 MB

CaSE Cache-Assisted Secure Execution on ARM Processors.en.transcribed.srt

53.8 KB

CaSE Cache-Assisted Secure Execution on ARM Processors.mp4

90.7 MB

Cache Storage Channels Alias-Driven Attacks and Verified Countermeasures.en.transcribed.srt

44.5 KB

Cache Storage Channels Alias-Driven Attacks and Verified Countermeasures.mp4

53.8 MB

Cinderella Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with ....en.transcribed.srt

46.0 KB

Cinderella Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with ....mp4

80.8 MB

Cloak of Visibility Detecting When Machines Browse a Different Web.en.transcribed.srt

35.9 KB

Cloak of Visibility Detecting When Machines Browse a Different Web.mp4

35.5 MB

Data-Oriented Programming On the Expressiveness of Non-Control Data Attacks.en.transcribed.srt

64.2 KB

Data-Oriented Programming On the Expressiveness of Non-Control Data Attacks.mp4

78.2 MB

Dedup Est Machina Memory Deduplication as an Advanced Exploitation Vector.en.transcribed.srt

29.9 KB

Dedup Est Machina Memory Deduplication as an Advanced Exploitation Vector.mp4

65.5 MB

Distillation as a Defense to Adversarial Perturbations against Deep Neural Networks.en.transcribed.srt

49.2 KB

Distillation as a Defense to Adversarial Perturbations against Deep Neural Networks.mp4

75.7 MB

Domain-Z 28 Registrations Later.en.transcribed.srt

46.9 KB

Domain-Z 28 Registrations Later.mp4

66.0 MB

Downgrade Resilience in Key-Exchange Protocols.en.transcribed.srt

36.8 KB

Downgrade Resilience in Key-Exchange Protocols.mp4

76.1 MB

Following Devil's Footprints Cross-Platform Analysis of Potentially Harmful Libraries ....en.transcribed.srt

52.2 KB

Following Devil's Footprints Cross-Platform Analysis of Potentially Harmful Libraries ....mp4

84.9 MB

HDFI Hardware-Assisted Data-Flow Isolation.en.transcribed.srt

48.6 KB

HDFI Hardware-Assisted Data-Flow Isolation.mp4

61.1 MB

Hawk The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts.en.transcribed.srt

55.8 KB

Hawk The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts.mp4

51.7 MB

Helping Johnny to Analyze Malware A Usability-Optimized Decompiler and Malware Analysis User Study.en.transcribed.srt

57.7 KB

Helping Johnny to Analyze Malware A Usability-Optimized Decompiler and Malware Analysis User Study.mp4

100.5 MB

High-Speed Inter-domain Fault Localization.en.transcribed.srt

34.2 KB

High-Speed Inter-domain Fault Localization.mp4

78.1 MB

I Think They're Trying to Tell Me Something Advice Sources and Selection for Digital Security.en.transcribed.srt

36.2 KB

I Think They're Trying to Tell Me Something Advice Sources and Selection for Digital Security.mp4

66.7 MB

Inferring User Routes and Locations using Zero-Permission Mobile Sensors.en.transcribed.srt

40.6 KB

Inferring User Routes and Locations using Zero-Permission Mobile Sensors.mp4

53.9 MB

Keeping Authorities Honest or Bust with Decentralized Witness Cosigning.en.transcribed.srt

60.4 KB

Keeping Authorities Honest or Bust with Decentralized Witness Cosigning.mp4

92.6 MB

Key Confirmation in Key Exchange A Formal Treatment and Implications for TLS 1.3.en.transcribed.srt

45.9 KB

Key Confirmation in Key Exchange A Formal Treatment and Implications for TLS 1.3.mp4

83.7 MB

LAVA Large-scale Automated Vulnerability Addition.en.transcribed.srt

63.1 KB

LAVA Large-scale Automated Vulnerability Addition.mp4

78.9 MB

MitM Attack by Name Collision Cause Analysis and Vulnerability Assessment in the New gTLD Era.en.transcribed.srt

49.8 KB

MitM Attack by Name Collision Cause Analysis and Vulnerability Assessment in the New gTLD Era.mp4

78.4 MB

Multiple Handshakes Security of TLS 1.3 Candidates.en.transcribed.srt

43.3 KB

Multiple Handshakes Security of TLS 1.3 Candidates.mp4

82.2 MB

NITRD Panel Federal Cybersecurity and Privacy R&D Strategic Plans.en.transcribed.srt

183.3 KB

NITRD Panel Federal Cybersecurity and Privacy R&D Strategic Plans.mp4

223.6 MB

No Pardon for the Interruption New Inference Attacks on Android Through Interrupt Timing Analysis.en.transcribed.srt

34.7 KB

No Pardon for the Interruption New Inference Attacks on Android Through Interrupt Timing Analysis.mp4

64.8 MB

On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud.en.transcribed.srt

50.8 KB

On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud.mp4

78.8 MB

Opening Remarks of the 2016 IEEE Symposium on Security & Privacy.en.transcribed.srt

26.2 KB

Opening Remarks of the 2016 IEEE Symposium on Security & Privacy.mp4

38.0 MB

PhotoProof Cryptographic Image Authentication for Any Set of Permissible Transformations.en.transcribed.srt

44.5 KB

PhotoProof Cryptographic Image Authentication for Any Set of Permissible Transformations.mp4

89.5 MB

Prepose Privacy, Security, and Reliability for Gesture-Based Programming.en.transcribed.srt

50.9 KB

Prepose Privacy, Security, and Reliability for Gesture-Based Programming.mp4

56.6 MB

Return to the Zombie Gadgets Undermining Destructive Code Reads via Code-Inference Attacks.en.transcribed.srt

50.2 KB

Return to the Zombie Gadgets Undermining Destructive Code Reads via Code-Inference Attacks.mp4

74.0 MB

Revisiting Square Root ORAM Efficient Random Access in Multi-Party Computation.en.transcribed.srt

33.7 KB

Revisiting Square Root ORAM Efficient Random Access in Multi-Party Computation.mp4

55.7 MB

S&P TC Business Meeting.en.transcribed.srt

100.7 KB

S&P TC Business Meeting.mp4

179.3 MB

Security Analysis of Emerging Smart Home Applications.en.transcribed.srt

55.4 KB

Security Analysis of Emerging Smart Home Applications.mp4

79.8 MB

Seeking Nonsense, Looking for Trouble Efficient Promotional-Infection Detection through ....en.transcribed.srt

32.4 KB

Seeking Nonsense, Looking for Trouble Efficient Promotional-Infection Detection through ....mp4

55.2 MB

Sending out an SMS Characterizing the Security of the SMS Ecosystem with Public Gateways.en.transcribed.srt

33.2 KB

Sending out an SMS Characterizing the Security of the SMS Ecosystem with Public Gateways.mp4

57.4 MB

Shreds Fine-grained Execution Units with Private Memory.en.transcribed.srt

52.4 KB

Shreds Fine-grained Execution Units with Private Memory.mp4

88.9 MB

SoK (State of) The Art of War Offensive Techniques in Binary Analysis.en.transcribed.srt

45.6 KB

SoK (State of) The Art of War Offensive Techniques in Binary Analysis.mp4

47.1 MB

SoK Everyone Hates Robocalls A Survey of Techniques against Telephone Spam.en.transcribed.srt

54.6 KB

SoK Everyone Hates Robocalls A Survey of Techniques against Telephone Spam.mp4

72.5 MB

SoK Towards Grounding Censorship Circumvention in Empiricism.en.transcribed.srt

44.5 KB

SoK Towards Grounding Censorship Circumvention in Empiricism.mp4

59.5 MB

Staying Secure and Unprepared Understanding and Mitigating the Security Risks of Apple ZeroConf.en.transcribed.srt

35.5 KB

Staying Secure and Unprepared Understanding and Mitigating the Security Risks of Apple ZeroConf.mp4

83.0 MB

Synthesizing Plausible Privacy-Preserving Location Traces.en.transcribed.srt

55.3 KB

Synthesizing Plausible Privacy-Preserving Location Traces.mp4

78.8 MB

Talos Neutralizing Vulnerabilities with Security Workarounds for Rapid Response.en.transcribed.srt

42.7 KB

Talos Neutralizing Vulnerabilities with Security Workarounds for Rapid Response.mp4

77.6 MB

TaoStore Overcoming Asynchronicity in Oblivious Data Storage.en.transcribed.srt

41.8 KB

TaoStore Overcoming Asynchronicity in Oblivious Data Storage.mp4

80.4 MB

The Cracked Cookie Jar HTTP Cookie Hijacking and the Exposure of Private Information.en.transcribed.srt

64.1 KB

The Cracked Cookie Jar HTTP Cookie Hijacking and the Exposure of Private Information.mp4

77.0 MB

TriggerScope Towards Detecting Logic Bombs in Android Applications.en.transcribed.srt

64.1 KB

TriggerScope Towards Detecting Logic Bombs in Android Applications.mp4

76.5 MB

Users Really Do Plug in USB Drives They Find.en.transcribed.srt

48.5 KB

Users Really Do Plug in USB Drives They Find.mp4

75.8 MB

Verena End-to-End Integrity Protection for Web Applications.mp4

80.6 MB

Verifiable ASICs.en.transcribed.srt

64.3 KB

Verifiable ASICs.mp4

80.0 MB

You Get Where You're Looking For The Impact Of Information Sources On Code Security.en.transcribed.srt

51.8 KB

You Get Where You're Looking For The Impact Of Information Sources On Code Security.mp4

82.1 MB

pASSWORD tYPOS and How to Correct Them Securely.en.transcribed.srt

52.1 KB

pASSWORD tYPOS and How to Correct Them Securely.mp4

79.4 MB

/IEEE Security and Privacy 2017/

A Framework for Universally Composable Diffie-Hellman Key Exchange.en.transcribed.srt

51.5 KB

A Framework for Universally Composable Diffie-Hellman Key Exchange.mp4

43.0 MB

A Lustrum of Malware Network Communication Evolution and Insights.en.transcribed.srt

60.3 KB

A Lustrum of Malware Network Communication Evolution and Insights.mp4

65.2 MB

An Experimental Security Analysis of an Industrial Robot Controller.en.transcribed.srt

43.1 KB

An Experimental Security Analysis of an Industrial Robot Controller.mp4

43.5 MB

Augur Internet-Wide Detection of Connectivity Disruptions.en.transcribed.srt

45.5 KB

Augur Internet-Wide Detection of Connectivity Disruptions.mp4

34.9 MB

Backward-bounded DSE Targeting Infeasibility Questions on Obfuscated Codes.en.transcribed.srt

57.1 KB

Backward-bounded DSE Targeting Infeasibility Questions on Obfuscated Codes.mp4

56.6 MB

CRLite A Scalable System for Pushing All TLS Revocations to All Browsers.en.transcribed.srt

45.7 KB

CRLite A Scalable System for Pushing All TLS Revocations to All Browsers.mp4

44.7 MB

Catena Efficient Non-equivocation via Bitcoin.en.transcribed.srt

58.3 KB

Catena Efficient Non-equivocation via Bitcoin.mp4

30.4 MB

Cloak and Dagger From Two Permissions to Complete Control of the UI Feedback Loop.en.transcribed.srt

73.8 KB

Cloak and Dagger From Two Permissions to Complete Control of the UI Feedback Loop.mp4

54.6 MB

CoSMeDis A Distributed Social Media Platform with Formally Verified Confidentiality Guarantees.en.transcribed.srt

46.2 KB

CoSMeDis A Distributed Social Media Platform with Formally Verified Confidentiality Guarantees.mp4

31.9 MB

Comparing the Usability of Cryptographic APIs.en.transcribed.srt

52.7 KB

Comparing the Usability of Cryptographic APIs.mp4

29.3 MB

Counter-RAPTOR Safeguarding Tor Against Active Routing Attacks.en.transcribed.srt

43.8 KB

Counter-RAPTOR Safeguarding Tor Against Active Routing Attacks.mp4

44.8 MB

Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping.en.transcribed.srt

50.6 KB

Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping.mp4

87.4 MB

Finding and Preventing Bugs in JavaScript Bindings.en.transcribed.srt

51.3 KB

Finding and Preventing Bugs in JavaScript Bindings.mp4

39.8 MB

From Trash to Treasure Timing-Sensitive Garbage Collection.en.transcribed.srt

56.6 KB

From Trash to Treasure Timing-Sensitive Garbage Collection.mp4

39.2 MB

HVLearn Automated Black-box Analysis of Hostname Verification in SSL TLS Implementations.en.transcribed.srt

58.7 KB

HVLearn Automated Black-box Analysis of Hostname Verification in SSL TLS Implementations.mp4

53.0 MB

Hardening Java's Access Control by Abolishing Implicit Privilege Elevation.en.transcribed.srt

57.5 KB

Hardening Java's Access Control by Abolishing Implicit Privilege Elevation.mp4

38.0 MB

Hijacking Bitcoin Routing Attacks on Cryptocurrencies.en.transcribed.srt

53.3 KB

Hijacking Bitcoin Routing Attacks on Cryptocurrencies.mp4

52.8 MB

How They Did It An Analysis of Emission Defeat Devices in Modern Automobiles.en.transcribed.srt

55.0 KB

How They Did It An Analysis of Emission Defeat Devices in Modern Automobiles.mp4

38.6 MB

IKP Turning a PKI Around with Decentralized Automated Incentives.en.transcribed.srt

58.8 KB

IKP Turning a PKI Around with Decentralized Automated Incentives.mp4

59.9 MB

IVD Automatic Learning and Enforcement of Authorization Rules in Online Social Networks - YouTube.en.transcribed.srt

38.2 KB

IVD Automatic Learning and Enforcement of Authorization Rules in Online Social Networks - YouTube.mp4

33.7 MB

Identifying Personal DNA Methylation Profiles by Genotype Inference.en.transcribed.srt

49.7 KB

Identifying Personal DNA Methylation Profiles by Genotype Inference.mp4

42.4 MB

Implementing and Proving the TLS 1.3 Record Layer.mp4

40.5 MB

IoT Goes Nuclear Creating a Zigbee Chain Reaction.en.transcribed.srt

50.5 KB

IoT Goes Nuclear Creating a Zigbee Chain Reaction.mp4

56.8 MB

Is Interaction Necessary for Distributed Private Learning.en.transcribed.srt

58.5 KB

Is Interaction Necessary for Distributed Private Learning.mp4

43.0 MB

Leakage-Abuse Attacks on Order-Revealing Encryption.en.transcribed.srt

55.4 KB

Leakage-Abuse Attacks on Order-Revealing Encryption.mp4

40.1 MB

Machine-Checked Proofs of Privacy for Electronic Voting Protocols.en.transcribed.srt

42.5 KB

Machine-Checked Proofs of Privacy for Electronic Voting Protocols.mp4

33.5 MB

Membership Inference Attacks against Machine Learning Models.en.transcribed.srt

42.5 KB

Membership Inference Attacks against Machine Learning Models.mp4

25.9 MB

Multi-touch Authentication Using Hand Geometry and Behavioral Information.en.transcribed.srt

37.9 KB

Multi-touch Authentication Using Hand Geometry and Behavioral Information.mp4

38.2 MB

NEZHA Efficient Domain-independent Differential Testing.en.transcribed.srt

51.6 KB

NEZHA Efficient Domain-independent Differential Testing.mp4

34.8 MB

Norax Enabling Execute-Only Memory for COTS Binaries on AArch64.en.transcribed.srt

58.2 KB

Norax Enabling Execute-Only Memory for COTS Binaries on AArch64.mp4

39.4 MB

Obstacles to the Adoption of Secure Communication Tools.en.transcribed.srt

46.7 KB

Obstacles to the Adoption of Secure Communication Tools.mp4

30.1 MB

One TPM to Bind Them All Fixing TPM2.0 for Provably Secure Anonymous Attestation.en.transcribed.srt

50.5 KB

One TPM to Bind Them All Fixing TPM2.0 for Provably Secure Anonymous Attestation.mp4

41.4 MB

Optimized Honest-Majority MPC for Malicious Adversaries - Breaking 1 Billion-Gate Second Barrier.en.transcribed.srt

50.3 KB

Optimized Honest-Majority MPC for Malicious Adversaries - Breaking 1 Billion-Gate Second Barrier.mp4

38.6 MB

Protecting Bare-metal Embedded Systems with Privilege Overlays.en.transcribed.srt

52.8 KB

Protecting Bare-metal Embedded Systems with Privilege Overlays.mp4

50.4 MB

Pyramid Enhancing Selectivity in Big Data Protection with Count Featurization.en.transcribed.srt

56.4 KB

Pyramid Enhancing Selectivity in Big Data Protection with Count Featurization.mp4

43.4 MB

Scalable Bias-Resistant Distributed Randomness.en.transcribed.srt

60.6 KB

Scalable Bias-Resistant Distributed Randomness.mp4

44.6 MB

SecureML A System for Scalable Privacy-Preserving Machine Learning.en.transcribed.srt

45.8 KB

SecureML A System for Scalable Privacy-Preserving Machine Learning.mp4

32.6 MB

Securing Augmented Reality Output.84d6e03b-b9a3-43cb-99ad-5277a4f98362.part

187.7 MB

Securing Augmented Reality Output.en.transcribed.srt

56.9 KB

Securing Augmented Reality Output.mp4

45.1 MB

Side-Channel Attacks on Shared Search Indexes.en.transcribed.srt

45.9 KB

Side-Channel Attacks on Shared Search Indexes.mp4

41.0 MB

Skyfire Data-Driven Seed Generation for Fuzzing.mp4

26.3 MB

SmarPer Context-Aware and Automatic Runtime-Permissions for Mobile Devices - YouTube.en.transcribed.srt

53.3 KB

SmarPer Context-Aware and Automatic Runtime-Permissions for Mobile Devices - YouTube.mp4

70.0 MB

SoK Cryptographically Protected Database Search.en.transcribed.srt

59.7 KB

SoK Cryptographically Protected Database Search.mp4

39.3 MB

SoK Exploiting Network Printers.en.transcribed.srt

52.6 KB

SoK Exploiting Network Printers.mp4

33.4 MB

SoK Science, Security, and the Elusive Goal of Security as a Scientific Pursuit.en.transcribed.srt

77.2 KB

SoK Science, Security, and the Elusive Goal of Security as a Scientific Pursuit.mp4

82.5 MB

Spotless Sandboxes Evading Malware Analysis Systems using Wear-and-Tear Artifacts.en.transcribed.srt

57.3 KB

Spotless Sandboxes Evading Malware Analysis Systems using Wear-and-Tear Artifacts.mp4

25.0 MB

Stack Overflow Considered Harmful --- The Impact of Copy&Paste on Android Application Security.en.transcribed.srt

47.0 KB

Stack Overflow Considered Harmful --- The Impact of Copy&Paste on Android Application Security.mp4

35.5 MB

SymCerts Practical Symbolic Execution For Exposing Noncompliance in X.509 Certificate Validation.en.transcribed.srt

53.6 KB

SymCerts Practical Symbolic Execution For Exposing Noncompliance in X.509 Certificate Validation.mp4

69.1 MB

SysPal System-guided Pattern Locks for Android.en.transcribed.srt

41.9 KB

SysPal System-guided Pattern Locks for Android.mp4

45.4 MB

To Catch a Ratter Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild.en.transcribed.srt

43.0 KB

To Catch a Ratter Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild.mp4

42.6 MB

Towards Evaluating the Robustness of Neural Networks.en.transcribed.srt

69.5 KB

Towards Evaluating the Robustness of Neural Networks.mp4

31.9 MB

Under the Shadow of Sunshine Understanding & Detecting Bulletproof Hosting.en.transcribed.srt

32.4 KB

Under the Shadow of Sunshine Understanding & Detecting Bulletproof Hosting.mp4

27.4 MB

VUDDY A Scalable Approach for Vulnerable Code Clone Discovery.en.transcribed.srt

46.2 KB

VUDDY A Scalable Approach for Vulnerable Code Clone Discovery.mp4

55.1 MB

Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate.en.transcribed.srt

67.8 KB

Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate.mp4

41.5 MB

Verifying and Synthesizing Constant-Resource Implementations with Types.en.transcribed.srt

40.6 KB

Verifying and Synthesizing Constant-Resource Implementations with Types.mp4

32.3 MB

XHOUND Quantifying the Fingerprintability of Browser Extensions.en.transcribed.srt

48.1 KB

XHOUND Quantifying the Fingerprintability of Browser Extensions.mp4

44.1 MB

Your Exploit is Mine Automatic Shellcode Transplant for Remote Exploits.en.transcribed.srt

43.6 KB

Your Exploit is Mine Automatic Shellcode Transplant for Remote Exploits.mp4

31.8 MB

vSQL Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases.en.transcribed.srt

49.4 KB

vSQL Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases.mp4

48.0 MB

/IEEE Security and Privacy 2018/

A Formal Treatment of Accountable Proxying over TLS.en.transcribed.srt

58.5 KB

A Formal Treatment of Accountable Proxying over TLS.mp4

27.7 MB

A Machine Learning Approach to Prevent Malicious Calls Over Telephony Networks.en.transcribed.srt

47.0 KB

A Machine Learning Approach to Prevent Malicious Calls Over Telephony Networks.mp4

30.0 MB

A Tale of Two Studies The Best and Worst of YubiKey Usability.en.transcribed.srt

50.1 KB

A Tale of Two Studies The Best and Worst of YubiKey Usability.mp4

19.2 MB

AI2 Safety and Robustness Certification of Neural Networks.en.transcribed.srt

33.8 KB

AI2 Safety and Robustness Certification of Neural Networks.mp4

15.0 MB

Angora Efficient Fuzzing by Principled Search.en.transcribed.srt

37.9 KB

Angora Efficient Fuzzing by Principled Search.mp4

24.1 MB

Anonymity Trilemma Strong Anonymity, Low Bandwidth Overhead, Low Latency --- Choose Two.en.transcribed.srt

45.4 KB

Anonymity Trilemma Strong Anonymity, Low Bandwidth Overhead, Low Latency --- Choose Two.mp4

18.9 MB

Another Flip in the Wall of Rowhammer Defenses.en.transcribed.srt

62.2 KB

Another Flip in the Wall of Rowhammer Defenses.mp4

26.2 MB

Blue Note How Intentional Acoustic Interference Damages Availablity and Integrity -.en.transcribed.srt

60.4 KB

Blue Note How Intentional Acoustic Interference Damages Availablity and Integrity -.mp4

31.1 MB

Bulletproofs Short Proofs for Confidential Transactions and More.en.transcribed.srt

58.7 KB

Bulletproofs Short Proofs for Confidential Transactions and More.mp4

21.4 MB

Compiler-assisted Code Randomization.en.transcribed.srt

38.9 KB

Compiler-assisted Code Randomization.mp4

25.3 MB

Computer Security and Privacy for Refugees in the United States.en.transcribed.srt

66.5 KB

Computer Security and Privacy for Refugees in the United States.mp4

20.4 MB

Crowd-GPS-Sec Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks.mp4

23.9 MB

DEEPSEC Deciding Equivalence Properties in Security Protocols -- Theory and Practice.en.transcribed.srt

41.3 KB

DEEPSEC Deciding Equivalence Properties in Security Protocols -- Theory and Practice.mp4

16.4 MB

Distance-Bounding Protocols Verification without Time and Location.en.transcribed.srt

52.7 KB

Distance-Bounding Protocols Verification without Time and Location.mp4

25.8 MB

Double-efficient zkSNARKs Without Trusted Setup.en.transcribed.srt

66.0 KB

Double-efficient zkSNARKs Without Trusted Setup.mp4

24.3 MB

Enabling Autonomous IoT Device Pairing using Different Sensor Types.en.transcribed.srt

56.7 KB

Enabling Autonomous IoT Device Pairing using Different Sensor Types.mp4

27.6 MB

EnclaveDB A Secure Database using SGX.en.transcribed.srt

65.4 KB

EnclaveDB A Secure Database using SGX.mp4

20.6 MB

Enumerating Active IPv6 Hosts for Large-scale Security Scans via DNSSEC-signed Reverse Zones.en.transcribed.srt

61.5 KB

Enumerating Active IPv6 Hosts for Large-scale Security Scans via DNSSEC-signed Reverse Zones.mp4

22.6 MB

EyeTell Video-Assisted Touchscreen Keystroke Inference from Eye Movements.en.transcribed.srt

43.4 KB

EyeTell Video-Assisted Touchscreen Keystroke Inference from Eye Movements.mp4

26.4 MB

FP-Stalker Tracking Browser Fingerprint Evolutions - Antoine Vastel.en.transcribed.srt

50.8 KB

FP-Stalker Tracking Browser Fingerprint Evolutions - Antoine Vastel.mp4

17.8 MB

FPGA-Based Remote Power Side-Channel Attacks.en.transcribed.srt

41.7 KB

FPGA-Based Remote Power Side-Channel Attacks.mp4

19.1 MB

FuturesMEX Secure, Distributed Futures Market Exchange.en.transcribed.srt

47.1 KB

FuturesMEX Secure, Distributed Futures Market Exchange.mp4

27.0 MB

Grand Pwning Unit Accelerating Microarchitectural Attacks with the GPU.en.transcribed.srt

53.7 KB

Grand Pwning Unit Accelerating Microarchitectural Attacks with the GPU.mp4

23.7 MB

Hackers vs. Testers A Comparison of Software Vulnerability Discovery Processes.en.transcribed.srt

64.4 KB

Hackers vs. Testers A Comparison of Software Vulnerability Discovery Processes.mp4

25.8 MB

Implementing Conjunction Obfuscation under Entropic Ring LWE.en.transcribed.srt

48.8 KB

Implementing Conjunction Obfuscation under Entropic Ring LWE.mp4

21.8 MB

Impossibility of Precise and Sound Termination-Sensitive Security Enforcements.en.transcribed.srt

42.7 KB

Impossibility of Precise and Sound Termination-Sensitive Security Enforcements.mp4

18.4 MB

Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage.en.transcribed.srt

51.6 KB

Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage.mp4

19.1 MB

Learning from Mutants Using Code Mutation to Learn and Monitor Invariants of a CPS.en.transcribed.srt

55.8 KB

Learning from Mutants Using Code Mutation to Learn and Monitor Invariants of a CPS.mp4

21.9 MB

Locally Differentially Private Frequent Itemset Mining.en.transcribed.srt

35.2 KB

Locally Differentially Private Frequent Itemset Mining.mp4

21.1 MB

Manipulating Machine Learning Poisoning Attacks & Countermeasures.en.transcribed.srt

50.1 KB

Manipulating Machine Learning Poisoning Attacks & Countermeasures.mp4

23.2 MB

Mobile Application Web API Reconnaissance.en.transcribed.srt

48.1 KB

Mobile Application Web API Reconnaissance.mp4

22.5 MB

Oblix An Efficient Oblivious Search Index.en.transcribed.srt

49.9 KB

Oblix An Efficient Oblivious Search Index.mp4

16.9 MB

OmniLedger A Secure, Scale-Out, Decentralized Ledger via Sharding.mp4

22.6 MB

On Enforcing the Digital Immunity of a Large Humanitarian Organization.en.transcribed.srt

51.3 KB

On Enforcing the Digital Immunity of a Large Humanitarian Organization.mp4

23.7 MB

On the Economics of Offline Password Cracking.en.transcribed.srt

50.9 KB

On the Economics of Offline Password Cracking.mp4

26.2 MB

Opening Remarks of the 39th IEEE Symposium on Security & Privacy.en.transcribed.srt

53.1 KB

Opening Remarks of the 39th IEEE Symposium on Security & Privacy.mp4

19.6 MB

PIR with Compressed Queries and Amortized Query Processing.en.transcribed.srt

58.8 KB

PIR with Compressed Queries and Amortized Query Processing.mp4

24.3 MB

Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels.en.transcribed.srt

61.6 KB

Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels.mp4

25.0 MB

Privacy Risks with Facebook's PII-based Targeting.en.transcribed.srt

53.0 KB

Privacy Risks with Facebook's PII-based Targeting.mp4

24.0 MB

Protecting the Stack with Metadata Policies and Tagged Hardware.en.transcribed.srt

65.9 KB

Protecting the Stack with Metadata Policies and Tagged Hardware.mp4

24.5 MB

Racing in Hyperspace Closing Hyper Threading Side Channels on SGX.en.transcribed.srt

42.8 KB

Racing in Hyperspace Closing Hyper Threading Side Channels on SGX.mp4

24.8 MB

Routing Around Congestion Defeating DDoS Attacks and Adverse Network Conditions via Reactive....en.transcribed.srt

75.2 KB

Routing Around Congestion Defeating DDoS Attacks and Adverse Network Conditions via Reactive....mp4

31.4 MB

Secure Device Bootstrapping without Secrets Resistant to Signal Manipulation Attacks.en.transcribed.srt

36.0 KB

Secure Device Bootstrapping without Secrets Resistant to Signal Manipulation Attacks.mp4

19.3 MB

SoK Plug & Pray Today - Understanding USB Insecurity in Versions 1 through C.en.transcribed.srt

46.3 KB

SoK Plug & Pray Today - Understanding USB Insecurity in Versions 1 through C.mp4

19.5 MB

SoK Keylogging Side Channels.en.transcribed.srt

52.5 KB

SoK Keylogging Side Channels.mp4

19.0 MB

Sonar Detecting SS7 Redirection Attacks With Audio-Based Distance Bounding.en.transcribed.srt

46.9 KB

Sonar Detecting SS7 Redirection Attacks With Audio-Based Distance Bounding.mp4

21.1 MB

Speechless Analyzing the Threat to Speech Privacy from Smartphone Motion Sensors.en.transcribed.srt

51.4 KB

Speechless Analyzing the Threat to Speech Privacy from Smartphone Motion Sensors.mp4

21.2 MB

Static Evaluation of Noninterference using Approximate Model Counting.en.transcribed.srt

42.4 KB

Static Evaluation of Noninterference using Approximate Model Counting.mp4

26.1 MB

Stealing Hyperparameters in Machine Learning.en.transcribed.srt

45.7 KB

Stealing Hyperparameters in Machine Learning.mp4

18.9 MB

Study and Mitigation of Origin Stripping Vulnerabilities in Hybrid-postMessage Enabled Mobile Apps.en.transcribed.srt

45.1 KB

Study and Mitigation of Origin Stripping Vulnerabilities in Hybrid-postMessage Enabled Mobile Apps.mp4

22.5 MB

Surveylance Automatically Detecting Online Survey Scams.en.transcribed.srt

41.3 KB

Surveylance Automatically Detecting Online Survey Scams.mp4

18.8 MB

T-Fuzz Fuzzing by Program Transformation Hui Peng.en.transcribed.srt

44.5 KB

T-Fuzz Fuzzing by Program Transformation Hui Peng.mp4

26.8 MB

The Cards Aren't Alright Detecting Counterfeit Gift Cards Using Encoding Jitter.en.transcribed.srt

65.4 KB

The Cards Aren't Alright Detecting Counterfeit Gift Cards Using Encoding Jitter.mp4

28.8 MB

The Rise of the Citizen Developer Assessing the Security Impact of Online App Generators.en.transcribed.srt

51.8 KB

The Rise of the Citizen Developer Assessing the Security Impact of Online App Generators.mp4

23.9 MB

Towards Security and Privacy for Multi User Augmented Reality.en.transcribed.srt

61.1 KB

Towards Security and Privacy for Multi User Augmented Reality.mp4

24.6 MB

Tracking Certificate Misissuance in the Wild.en.transcribed.srt

55.0 KB

Tracking Certificate Misissuance in the Wild.mp4

17.8 MB

Tracking Ransomware End-to-end.en.transcribed.srt

57.8 KB

Tracking Ransomware End-to-end.mp4

25.4 MB

Understanding Linux Malware.en.transcribed.srt

53.8 KB

Understanding Linux Malware.mp4

17.9 MB

When Your Fitness Tracker Betrays You Quantifying the Predictability....en.transcribed.srt

61.5 KB

When Your Fitness Tracker Betrays You Quantifying the Predictability....mp4

24.7 MB

vRAM Faster Verifiable RAM With Program-Independent Preprocessing.en.transcribed.srt

54.9 KB

vRAM Faster Verifiable RAM With Program-Independent Preprocessing.mp4

26.2 MB

xJsnark A Framework for Efficient Verifiable Computation.en.transcribed.srt

56.5 KB

xJsnark A Framework for Efficient Verifiable Computation.mp4

29.0 MB

/IEEE Security and Privacy 2019/

An Extensive Formal Security Analysis of the OpenID Financial grade API Pedram Hosseyni.en.transcribed.srt

27.0 KB

An Extensive Formal Security Analysis of the OpenID Financial grade API Pedram Hosseyni.mp4

18.6 MB

Asm2Vec Boosting Static Representation Robustness for Binary Clone Search....en.transcribed.srt

32.8 KB

Asm2Vec Boosting Static Representation Robustness for Binary Clone Search....mp4

22.1 MB

Attack Directories, Not Caches Side Channel Attacks in a Non Inclusive World.en.transcribed.srt

35.1 KB

Attack Directories, Not Caches Side Channel Attacks in a Non Inclusive World.mp4

20.1 MB

Beyond Credential Stuffing Password Similarity Models using Neural Networks.mp4

17.2 MB

Bitcoin vs. Bitcoin Cash Coexistence or Downfall of Bitcoin Cash.en.transcribed.srt

27.7 KB

Bitcoin vs. Bitcoin Cash Coexistence or Downfall of Bitcoin Cash.mp4

16.8 MB

Blind Certificate Authorities.en.transcribed.srt

24.7 KB

Blind Certificate Authorities.mp4

9.6 MB

Breaking LTE on Layer Two.en.transcribed.srt

30.6 KB

Breaking LTE on Layer Two.mp4

26.1 MB

CaSym Cache Aware Symbolic Execution for Side Channel Detection and Mitigation.en.transcribed.srt

32.3 KB

CaSym Cache Aware Symbolic Execution for Side Channel Detection and Mitigation.mp4

19.4 MB

Certified Robustness to Adversarial Examples with Differential Privacy.en.transcribed.srt

31.5 KB

Certified Robustness to Adversarial Examples with Differential Privacy.mp4

13.6 MB

Characterizing Pixel Tracking through the Lens of Disposable Email Services.en.transcribed.srt

31.8 KB

Characterizing Pixel Tracking through the Lens of Disposable Email Services.mp4

19.7 MB

Comprehensive Privacy Analysis of Deep Learning.en.transcribed.srt

28.7 KB

Comprehensive Privacy Analysis of Deep Learning.mp4

19.7 MB

Dangerous Skills Understanding and Mitigating Security Risks of Voice-Controlled Third-Party....en.transcribed.srt

27.6 KB

Dangerous Skills Understanding and Mitigating Security Risks of Voice-Controlled Third-Party....mp4

25.5 MB

Data Recovery on Encrypted Databases with k-Nearest Neighbor Query Leakage.mp4

25.8 MB

Demystifying Hidden Privacy Settings in Mobile Apps.en.transcribed.srt

30.0 KB

Demystifying Hidden Privacy Settings in Mobile Apps.mp4

13.1 MB

Differentially Private Model Publishing For Deep Learning.en.transcribed.srt

33.0 KB

Differentially Private Model Publishing For Deep Learning.mp4

31.3 MB

Does Certificate Transparency Break the Web Measuring Adoption and Error Rate.en.transcribed.srt

36.9 KB

Does Certificate Transparency Break the Web Measuring Adoption and Error Rate.mp4

19.7 MB

Dominance as a New Trusted Computing Primitive for the IoT.en.transcribed.srt

39.0 KB

Dominance as a New Trusted Computing Primitive for the IoT.mp4

23.7 MB

Drones' Cryptanalysis - Detecting Privacy Invasion Attacks Conducted by Drone.en.transcribed.srt

31.2 KB

Drones' Cryptanalysis - Detecting Privacy Invasion Attacks Conducted by Drone.mp4

26.3 MB

EmPoWeb Empowering Web Applications with Browser Extensions.en.transcribed.srt

34.6 KB

EmPoWeb Empowering Web Applications with Browser Extensions.mp4

12.1 MB

Exploiting Correcting Codes On the Effectiveness of ECC Memory Against Rowhammer Attacks.en.transcribed.srt

32.0 KB

Exploiting Correcting Codes On the Effectiveness of ECC Memory Against Rowhammer Attacks.mp4

22.2 MB

Exploiting Unintended Feature leakage in Collaborative Learning Congzheng Song.en.transcribed.srt

24.9 KB

Exploiting Unintended Feature leakage in Collaborative Learning Congzheng Song.mp4

16.8 MB

F-BLEAU Fast Black-box Leakage Estimation.en.transcribed.srt

27.5 KB

F-BLEAU Fast Black-box Leakage Estimation.mp4

16.9 MB

Fidelius Protecting User Secrets from Compromised Browsers.en.transcribed.srt

44.4 KB

Fidelius Protecting User Secrets from Compromised Browsers.mp4

18.2 MB

Formally Verified Cryptographic Web Applications in WebAssembly.en.transcribed.srt

37.8 KB

Formally Verified Cryptographic Web Applications in WebAssembly.mp4

28.4 MB

Full speed Fuzzing Reducing Fuzzing Overhead through Coverage-guided Tracing.en.transcribed.srt

44.1 KB

Full speed Fuzzing Reducing Fuzzing Overhead through Coverage-guided Tracing.mp4

12.1 MB

Fuzzing File Systems via Two-Dimensional Input Space Exploration.en.transcribed.srt

27.3 KB

Fuzzing File Systems via Two-Dimensional Input Space Exploration.mp4

18.0 MB

Hard Drive of Hearing Disks that Eavesdrop with a Synthesized Microphone.en.transcribed.srt

36.1 KB

Hard Drive of Hearing Disks that Eavesdrop with a Synthesized Microphone.mp4

29.1 MB

Helen Maliciously Secure Coopetitive Learning for Linear Models.en.transcribed.srt

32.1 KB

Helen Maliciously Secure Coopetitive Learning for Linear Models.mp4

15.6 MB

How Well Do My Results Generalize Comparing Security and Privacy Survey Results from....en.transcribed.srt

35.6 KB

How Well Do My Results Generalize Comparing Security and Privacy Survey Results from....mp4

24.0 MB

IEEE S&P 2019 - 40th Celebration Plenary Session Panel Reflections on four decades of the symposium.en.transcribed.srt

108.4 KB

IEEE S&P 2019 - 40th Celebration Plenary Session Panel Reflections on four decades of the symposium.mp4

54.1 MB

IEEE S&P 2019 - Awards Ceremony.en.transcribed.srt

10.3 KB

IEEE S&P 2019 - Awards Ceremony.mp4

4.9 MB

IEEE S&P 2019 - Opening Remarks - General Chair.en.transcribed.srt

20.7 KB

IEEE S&P 2019 - Opening Remarks - General Chair.mp4

14.3 MB

IEEE S&P 2019 - Opening Remarks - Program Chair.en.transcribed.srt

29.2 KB

IEEE S&P 2019 - Opening Remarks - Program Chair.mp4

14.6 MB

IEEE S&P 2019 - TC Business Meeting.en.transcribed.srt

65.6 KB

IEEE S&P 2019 - TC Business Meeting.mp4

42.1 MB

If HTTPS Were Secure I wouldn't Need 2FA End User and Administrator Mental Models of HTTPS.en.transcribed.srt

36.5 KB

If HTTPS Were Secure I wouldn't Need 2FA End User and Administrator Mental Models of HTTPS.mp4

25.4 MB

Iodine Fast Dynamic Taint Tracking Using Rollback free Optimistic Hybrid Analysis.en.transcribed.srt

38.7 KB

Iodine Fast Dynamic Taint Tracking Using Rollback free Optimistic Hybrid Analysis.mp4

20.6 MB

KHyperLogLog Estimating Reidentifiability and Joinability of Large Data at Scale Pern Hui Chia.en.transcribed.srt

26.0 KB

KHyperLogLog Estimating Reidentifiability and Joinability of Large Data at Scale Pern Hui Chia.mp4

19.6 MB

Kiss from a Rogue Evaluating Detectability of Pay-at-the-Pump Card Skimmers.en.transcribed.srt

35.9 KB

Kiss from a Rogue Evaluating Detectability of Pay-at-the-Pump Card Skimmers.mp4

11.1 MB

LBM A Security Framework for Peripherals within the Linux Kernel.en.transcribed.srt

34.5 KB

LBM A Security Framework for Peripherals within the Linux Kernel.mp4

28.8 MB

Lay Down the Common Metrics Evaluating Proof of Work Consensus Protocols' Security.en.transcribed.srt

29.6 KB

Lay Down the Common Metrics Evaluating Proof of Work Consensus Protocols' Security.mp4

21.3 MB

Learning to Reconstruct Statistical Learning Theory and Encrypted Database Attacks.mp4

24.1 MB

Measuring and Analyzing Search Engine Poisoning of Linguistic Collisions.en.transcribed.srt

31.5 KB

Measuring and Analyzing Search Engine Poisoning of Linguistic Collisions.mp4

17.2 MB

NEUZZ Efficient Fuzzing with Neural Program Smoothing.en.transcribed.srt

33.8 KB

NEUZZ Efficient Fuzzing with Neural Program Smoothing.mp4

17.6 MB

Neural Cleanse Identifying and Mitigating Backdoor Attacks in Neural Networks.en.transcribed.srt

34.7 KB

Neural Cleanse Identifying and Mitigating Backdoor Attacks in Neural Networks.mp4

2.3 MB

New Primitives for Actively-Secure MPC over Rings with Applications to Private Machine Learning.en.transcribed.srt

44.7 KB

New Primitives for Actively-Secure MPC over Rings with Applications to Private Machine Learning.mp4

25.0 MB

On the Feasibility of Rerouting-Based DDoS Defenses.en.transcribed.srt

29.7 KB

On the Feasibility of Rerouting-Based DDoS Defenses.mp4

9.6 MB

On the Security of Two-Round Multi-Signatures.en.transcribed.srt

28.4 KB

On the Security of Two-Round Multi-Signatures.mp4

17.4 MB

Ouroboros Crypsinous Privacy Preserving Proof of Stake.en.transcribed.srt

32.7 KB

Ouroboros Crypsinous Privacy Preserving Proof of Stake.mp4

19.5 MB

PERUN Virtual Payment Hubs over Cryptographic Currencies.en.transcribed.srt

35.6 KB

PERUN Virtual Payment Hubs over Cryptographic Currencies.mp4

10.4 MB

PhishFarm A Scalable Framework for Measuring the Effectivness of Evasion Techniques Against....en.transcribed.srt

41.4 KB

PhishFarm A Scalable Framework for Measuring the Effectivness of Evasion Techniques Against....mp4

21.8 MB

Port Contention for Fun and Profit.en.transcribed.srt

30.6 KB

Port Contention for Fun and Profit.mp4

9.9 MB

Postcards from the Post HTTP World Amplification of HTTPS Vulnerabilities in the Web Ecosystem.en.transcribed.srt

38.0 KB

Postcards from the Post HTTP World Amplification of HTTPS Vulnerabilities in the Web Ecosystem.mp4

25.8 MB

PrivKV Key Value Data Collection with Local Differential Privacy.en.transcribed.srt

21.3 KB

PrivKV Key Value Data Collection with Local Differential Privacy.mp4

17.5 MB

ProFuzzer On-the-fly Input Type Probing for Better Zero-day Vulnerability Discovery.en.transcribed.srt

29.5 KB

ProFuzzer On-the-fly Input Type Probing for Better Zero-day Vulnerability Discovery.mp4

19.4 MB

Proof Of Stake Sidechains.en.transcribed.srt

37.9 KB

Proof Of Stake Sidechains.mp4

18.3 MB

RIDL Rogue In-Flight Data Load.en.transcribed.srt

38.2 KB

RIDL Rogue In-Flight Data Load.mp4

14.6 MB

Razzer Finding Kernel Race Bugs through Fuzzing.en.transcribed.srt

29.2 KB

Razzer Finding Kernel Race Bugs through Fuzzing.mp4

17.9 MB

Reasoning Analytically About Password Cracking Software Alex Liu.en.transcribed.srt

34.9 KB

Reasoning Analytically About Password Cracking Software Alex Liu.mp4

20.8 MB

Redactable Blockchain in the Permissionless Setting.en.transcribed.srt

33.6 KB

Redactable Blockchain in the Permissionless Setting.mp4

17.3 MB

Resident Evil Understanding Residential IP Proxy as a Dark Service.en.transcribed.srt

29.0 KB

Resident Evil Understanding Residential IP Proxy as a Dark Service.mp4

12.3 MB

Security of GPS INS based On-road Location Tracking Systems.en.transcribed.srt

30.9 KB

Security of GPS INS based On-road Location Tracking Systems.mp4

25.3 MB

Self-Encrypting Deception Weaknesses in the Encryption of Solid State Drives.en.transcribed.srt

35.3 KB

Self-Encrypting Deception Weaknesses in the Encryption of Solid State Drives.mp4

11.3 MB

SensorID Sensor Calibration Fingerprinting for Smartphones.en.transcribed.srt

32.2 KB

SensorID Sensor Calibration Fingerprinting for Smartphones.mp4

20.2 MB

Short Text, Large Effect Measuring the Impact of User Reviews on Android App Security & Privacy.en.transcribed.srt

31.0 KB

Short Text, Large Effect Measuring the Impact of User Reviews on Android App Security & Privacy.mp4

12.7 MB

Should I Worry A Cross Cultural Examination of Account Security Incident Response.en.transcribed.srt

40.4 KB

Should I Worry A Cross Cultural Examination of Account Security Incident Response.mp4

20.9 MB

Simple High-Level Code for Cryptographic Arithmetic -- With Proofs, Without Compromises.en.transcribed.srt

35.4 KB

Simple High-Level Code for Cryptographic Arithmetic -- With Proofs, Without Compromises.mp4

22.6 MB

SoK General Purpose Frameworks for Secure Multi-Party Computation.en.transcribed.srt

35.8 KB

SoK General Purpose Frameworks for Secure Multi-Party Computation.mp4

23.1 MB

SoK Sanitizing for Security Dokyung Song.en.transcribed.srt

31.8 KB

SoK Sanitizing for Security Dokyung Song.mp4

18.4 MB

SoK Security Evaluation of Home Based IoT Deployment.en.transcribed.srt

30.2 KB

SoK Security Evaluation of Home Based IoT Deployment.mp4

21.5 MB

SoK Shining Light on Shadow Stacks.en.transcribed.srt

35.9 KB

SoK Shining Light on Shadow Stacks.mp4

31.0 MB

SoK The Challenges Pitfalls and Perils of Using Hardware Performance Counters for Security.en.transcribed.srt

27.3 KB

SoK The Challenges Pitfalls and Perils of Using Hardware Performance Counters for Security.mp4

17.8 MB

Spectre Attacks Exploiting Speculative Execution.en.transcribed.srt

45.9 KB

Spectre Attacks Exploiting Speculative Execution.mp4

21.9 MB

Stealthy Porn Understanding Real World Adversarial Images for Illicit Online Promotion.en.transcribed.srt

22.5 KB

Stealthy Porn Understanding Real World Adversarial Images for Illicit Online Promotion.mp4

20.2 MB

Synesthesia Detecting Screen Content via Remote Acoustic Side Channels.en.transcribed.srt

34.7 KB

Synesthesia Detecting Screen Content via Remote Acoustic Side Channels.mp4

22.2 MB

Tap 'n Ghost A Compilation of Novel Attack Techniques against Smartphone Touchscreens.en.transcribed.srt

25.1 KB

Tap 'n Ghost A Compilation of Novel Attack Techniques against Smartphone Touchscreens.mp4

9.4 MB

The 9 Lives of Bleichenbachers CAT New Cache ATtacks on TLS Implementations.en.transcribed.srt

25.2 KB

The 9 Lives of Bleichenbachers CAT New Cache ATtacks on TLS Implementations.mp4

20.4 MB

The Code That Never Ran Modeling Attacks on Speculative Evaluation.en.transcribed.srt

30.7 KB

The Code That Never Ran Modeling Attacks on Speculative Evaluation.mp4

21.1 MB

Theory and Practice of Finding Eviction Sets.en.transcribed.srt

34.3 KB

Theory and Practice of Finding Eviction Sets.mp4

20.7 MB

Threshold ECDSA from ECDSA Assumptions The Multiparty Case.en.transcribed.srt

32.9 KB

Threshold ECDSA from ECDSA Assumptions The Multiparty Case.mp4

20.2 MB

Touching the Untouchables Dynamic Security Analysis of the LTE Control Plane.en.transcribed.srt

29.3 KB

Touching the Untouchables Dynamic Security Analysis of the LTE Control Plane.mp4

24.0 MB

Towards Automated Safety Vetting of PLC Code in Real World Plants Mu Zhang.en.transcribed.srt

33.2 KB

Towards Automated Safety Vetting of PLC Code in Real World Plants Mu Zhang.mp4

20.4 MB

Towards Practical Differentialy Private Convex Optimization.en.transcribed.srt

33.8 KB

Towards Practical Differentialy Private Convex Optimization.mp4

20.2 MB

True2F Backdoor resistant authentication tokens Emma Dauterman.en.transcribed.srt

41.5 KB

True2F Backdoor resistant authentication tokens Emma Dauterman.mp4

20.4 MB

Understanding the Security of ARM Debugging Features.en.transcribed.srt

30.6 KB

Understanding the Security of ARM Debugging Features.mp4

19.2 MB

Using Safety Properties to Generate Vulnerability Patches.en.transcribed.srt

23.0 KB

Using Safety Properties to Generate Vulnerability Patches.mp4

21.2 MB

Why Does Your Data Leak Uncovering the Data Leakage in Cloud from Mobile Apps.en.transcribed.srt

26.3 KB

Why Does Your Data Leak Uncovering the Data Leakage in Cloud from Mobile Apps.mp4

31.0 MB

XCLAIM Trustless Interoperable Cryptocurrency Backed Assets.en.transcribed.srt

37.2 KB

XCLAIM Trustless Interoperable Cryptocurrency Backed Assets.mp4

18.4 MB

/IEEE Security and Privacy 2020/

A Comparative Usability Study of FIDO2 Passwordless Authentication.mp4

15.0 MB

A Programming Framework for Differential Privacy with Accuracy Concentration Bounds.mp4

15.5 MB

A Security Analysis of the Facebook Ad Library.mp4

18.1 MB

A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network.mp4

18.6 MB

A Tale of Sea and Sky On the Security of Maritime VSAT Communications.mp4

17.9 MB

AdGraph A Graph-Based Approach to Ad and Tracker Blocking.mp4

17.6 MB

An Analysis of Pre-installed Android Software.mp4

21.9 MB

Are Anonymity-Seekers Just like Everybody Else An Analysis of Contributions to Wikipedia from Tor.mp4

15.3 MB

Are We Susceptible to Rowhammer An End-to-End Methodology for Cloud Providers.mp4

22.0 MB

Ask the Experts What Should Be on an IoT Privacy and Security Label.mp4

17.9 MB

Automated Reverse Engineering and Privacy Analysis of Modern Cars.mp4

18.8 MB

Automatic Uncovering of Hidden Behaviors from Input Validation in Mobile Apps.mp4

16.5 MB

Automatically Detecting Bystanders in Photos to Reduce Privacy Risks.mp4

14.6 MB

BIAS Bluetooth Impersonation AttackS.mp4

11.4 MB

Binsec Rel Efficient Relational Symbolic Execution for Constant-Time at Binary-Level.mp4

15.0 MB

Birds of a Feather A Hardware & Security Panel (Deprecated).mp4

71.4 MB

Birds of a Feather A Hardware & Security Panel (Updated).mp4

62.1 MB

Birds of a Feather Sharing Cybersecurity Research Artifacts To Accelerate Progress.mp4

69.2 MB

Breaking and (Partially) Fixing Provably Secure Onion Routing.mp4

20.0 MB

Browsing Unicity On the Limits of Anonymizing Web Tracking Data.mp4

16.1 MB

Can Voters Detect Malicious Manipulation of Ballot Marking Devices.mp4

11.3 MB

Combating Dependence Explosion in Forensic Analysis Using Alternative Tag Propagation Semantics.mp4

26.9 MB

Cornucopia Temporal Safety for CHERI Heaps.mp4

14.8 MB

CrypTFlow Secure TensorFlow Inference.mp4

15.0 MB

Detection of Electromagnetic Interference Attacks on Sensor Systems.mp4

26.4 MB

Dragonblood Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd.mp4

16.3 MB

Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers.mp4

19.2 MB

Enabling Rack-scale Confidential Computing Using Heterogeneous Trusted Execution Environment.mp4

28.6 MB

Establishing Economic Incentives for Security Patching of IoT Consumer Products.mp4

18.2 MB

EverCrypt A Fast, Verified, Cross-Platform Cryptographic Provider.mp4

16.1 MB

Ex-vivo Dynamic Analysis Framework for Android Device Drivers.mp4

16.6 MB

Flaw Label Exploiting IPv6 Flow Label.mp4

17.8 MB

FlyClient Super-Light Clients for Cryptocurrencies.mp4

16.0 MB

Formal Modelling and Proof in the CHERI Design and Implementation Process.mp4

14.2 MB

Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability.mp4

27.0 MB

Full-band De-anonymization of Bluetooth Classic Devices.mp4

26.1 MB

Fuzzing JavaScript Engines with Aspect-Preserving Mutation.mp4

15.9 MB

Gesture Authentication for Smartphones Evaluation of Gesture Password Selection Policies.mp4

17.1 MB

High Precision Open-World Website Fingerprinting.mp4

16.3 MB

Hijacking Transient Execution through Microarchitectural Load Value Injection..mp4

22.4 MB

HopSkipJumpAttack A Query-Efficient Decision-Based Attack.mp4

16.8 MB

How Not to Prove Your Election Outcome.mp4

15.8 MB

Humpty Dumpty Controlling Word Meanings via Corpus Poisoning.mp4

17.1 MB

HydRand Efficient Continuous Distributed Randomness.mp4

23.6 MB

ICAS An Extensible Framework for Estimating the Susceptibility of IC Layouts to Additive Trojans.mp4

29.8 MB

ICLab A Global, Longitudinal Internet Censorship Measurement Platform.mp4

20.3 MB

IJON Exploring Deep State Spaces via Fuzzing.mp4

15.4 MB

Influencing Photo Sharing Decisions on Social Media A Case of Paradoxical Findings.mp4

16.1 MB

Intriguing Properties of Adversarial ML Attacks in the Problem Space.mp4

24.0 MB

JIT Leaks Inducing Timing Side Channels through Just-In-Time Compilation.mp4

25.2 MB

KARONTE Detecting Insecure Multi-binary Interactions in Embedded Firmware.mp4

21.1 MB

Kobold Evaluating Decentralized Access Control for Remote NSXPC Methods on iOS.mp4

21.7 MB

Krace Data Race Fuzzing for Kernel File Systems.mp4

27.4 MB

Leveraging EM Side-Channel Information to Detect Rowhammer Attacks.mp4

20.1 MB

MarkUs Drop-in Use-After-Free Prevention for Low-Level Languages.mp4

26.9 MB

Measuring Legal Compliance of Banners from IAB Europe's Transparancy and Consent Framework.mp4

19.9 MB

Meddling Middlemen Empirical Analysis of the Risks of Data-Saving Mobile Browsers.mp4

14.8 MB

Message Time of Arrival Codes A Fundamental Primitive for Secure Distance Measurement.mp4

16.8 MB

NetCAT Practical Cache Attacks from the Network.mp4

19.0 MB

Neutaint Efficient Dynamic Taint Analysis with Neural Networks.mp4

15.9 MB

OAT Attesting Operation Integrity of Embedded Devices.mp4

14.6 MB

OHIE Blockchain Scaling Made Simple.mp4

18.2 MB

PMP Cost-Effective Forced Execution with Probabilistic Memory Pre-planning.mp4

15.3 MB

Pangolin Incremental Hybrid Fuzzing with Polyhedral Path Abstraction.mp4

15.3 MB

Path Oblivious Heap Optimal and Practical Oblivious Priority Queue.mp4

27.7 MB

Plundervolt Software-Based Fault Injection Attacks against Intel SGX.mp4

15.5 MB

Private Resource Allocators and Their Applications.mp4

17.1 MB

Pseudorandom Black Swans Cache Attacks on CTR_DRBG.mp4

22.2 MB

RAMBleed Reading Bits in Memory without Accessing Them.mp4

17.8 MB

Replicated State Machines without Replicated Execution.mp4

14.6 MB

RetroWrite Statically Instrumenting COTS Binaries for Fuzzing and Sanitization.mp4

13.2 MB

SAVIOR Towards Bug-Driven Hybrid Testing.mp4

18.9 MB

SEIMI Efficient and Secure SMAP-Enabled Intra-process Memory Isolation.mp4

20.0 MB

SEVurity No Security Without Integrity - Breaking Integrity.mp4

18.7 MB

SPECCFI Mitigating Spectre Attacks Using CFI Informed Speculation.mp4

17.4 MB

SPECTECTOR Principled Detection of Speculative Information Flows.mp4

17.3 MB

SPIDER Enabling Fast Patch Propagation in Related Software Repositories.mp4

21.5 MB

SSP 2020 Opening Remarks.mp4

167.8 MB

Semantic Understanding of Smart Contracts Executable Operational Semantics of Solidity.mp4

20.6 MB

SoK A Minimalist Approach to Formalizing Analog Sensor Security.mp4

24.0 MB

SoK Cyber Insurance - Technical Challenges and a System Security Roadmap.mp4

15.5 MB

SoK Differential Privacy as a Causal Property.mp4

14.5 MB

SoK Understanding the Prevailing Security Vulnerabilities in TrustZone-Assisted TEE Systems.mp4

15.2 MB

Sync HotStuff Simple and Practical Synchronous State Machine Replication.mp4

14.0 MB

TARDIS Rolling Back the Clock on CMS-Targeting Cyber Attacks.mp4

26.1 MB

TRRespass Exploiting the Many Sides of Target Row Refresh.mp4

15.6 MB

Tactical Provenance Analysis our Endpoint Detection and Response Systems.mp4

15.3 MB

TextExerciser Feedback-Driven Text Input Exercising for Android Applications.mp4

24.2 MB

The Last Mile High-Assurance and High-Speed Cryptographic Implementations.mp4

25.3 MB

The Many Kinds of Creepware Used for Interpersonal Attacks.mp4

20.0 MB

The State of the Uniform Attacks on Encrypted Databases beyond the Uniform Query Distribution.mp4

18.9 MB

The Value of Collaboration in Convex Machine Learning with Differential Privacy.mp4

21.7 MB

This PIN Can Be Easily Guessed Analyzing the Security of Smartphone Unlock PINs.mp4

14.1 MB

Throwing Darts in the Dark Detecting Bots with Limited Data using Neural Data Augmentation.mp4

17.6 MB

Towards Effective Differential Privacy Comms for Users' Data Sharing Decision and Comprehension.mp4

23.7 MB

Towards Scalable Threshold Cryptosystems.mp4

11.8 MB

Towards a Natural Perspective of Smart Homes for Practical Security and Safety Analyses.mp4

25.6 MB

Transparent Polynomial Delegation and Its Applications to Zero Knowledge Proof.mp4

20.5 MB

Transys Leveraging Common Security Properties across Hardware Designs.mp4

17.0 MB

Understanding and Mitigating Security Risks of General Messaging Protocols on IoT Clouds.mp4

14.6 MB

Unexpected Data Dependency Creation and Chaining A New Attack to SDN.mp4

17.8 MB

VerX Safety Verification of Smart Contracts.mp4

15.7 MB

VeriSmart A Highly Precise Safety Verifier for Ethereum Smart Contracts.mp4

15.0 MB

WaveSpy Remote and Through-wall Screen Attack via mmWave Sensing.mp4

21.0 MB

ZEXE Enabling Decentralized Private Computation.mp4

16.0 MB

xMP Selective Memory Protection for Kernel and User Space.mp4

18.8 MB

/

IEEE Security and Privacy thank you.txt

1.0 KB

IEEE logo.jpg

8.5 KB

 

Total files 730


Copyright © 2025 FileMood.com