/IEEE Security and Privacy 2015/
|
A Generic Approach to Automatic Deobfuscation of Executable Code.en.transcribed.srt
|
44.3 KB
|
A Generic Approach to Automatic Deobfuscation of Executable Code.mp4
|
33.4 MB
|
A Messy State of the Union Taming the Composite State Machines of TLS.en.transcribed.srt
|
56.3 KB
|
A Messy State of the Union Taming the Composite State Machines of TLS.mp4
|
40.7 MB
|
ADSNARK Nearly Practical and Privacy-Preserving Proofs on Authenticated Data.en.transcribed.srt
|
51.1 KB
|
ADSNARK Nearly Practical and Privacy-Preserving Proofs on Authenticated Data.mp4
|
53.2 MB
|
Ad Injection at Scale Assessing Deceptive Advertisement Modifications.en.transcribed.srt
|
63.4 KB
|
Ad Injection at Scale Assessing Deceptive Advertisement Modifications.mp4
|
32.9 MB
|
Automatic Inference of Search Patterns for Taint-Style Vulnerabilities.2bb1d160-ca4a-4901-b0cf-f530c029ea97.part
|
16.7 MB
|
Automatic Inference of Search Patterns for Taint-Style Vulnerabilities.en.transcribed.srt
|
35.2 KB
|
Automatic Inference of Search Patterns for Taint-Style Vulnerabilities.mp4
|
28.0 MB
|
Bitcoin over Tor isn't a Good Idea.en.transcribed.srt
|
48.3 KB
|
Bitcoin over Tor isn't a Good Idea.mp4
|
43.8 MB
|
CHERI A Hybrid Capability-System Architecture for Scalable Software Compartmentalization.en.transcribed.srt
|
79.1 KB
|
CHERI A Hybrid Capability-System Architecture for Scalable Software Compartmentalization.mp4
|
37.2 MB
|
Caelus Verifying the Consistency of Cloud Services with Battery-Powered Devices.en.transcribed.srt
|
37.1 KB
|
Caelus Verifying the Consistency of Cloud Services with Battery-Powered Devices.mp4
|
47.4 MB
|
Connection-Oriented DNS to Improve Privacy and Security.en.transcribed.srt
|
30.3 KB
|
Connection-Oriented DNS to Improve Privacy and Security.mp4
|
40.3 MB
|
Controlled-Channel Attacks Deterministic Side Channels for Untrusted Operating Systems.en.transcribed.srt
|
40.7 KB
|
Controlled-Channel Attacks Deterministic Side Channels for Untrusted Operating Systems.mp4
|
25.7 MB
|
Counterfeit Object-oriented Programming.en.transcribed.srt
|
53.5 KB
|
Counterfeit Object-oriented Programming.mp4
|
50.5 MB
|
Cracking-Resistant Password Vaults Using Natural Language Encoders.en.transcribed.srt
|
34.6 KB
|
Cracking-Resistant Password Vaults Using Natural Language Encoders.mp4
|
33.5 MB
|
Cross-Architecture Bug Search in Binary Executables.en.transcribed.srt
|
51.6 KB
|
Cross-Architecture Bug Search in Binary Executables.mp4
|
71.7 MB
|
Effective Real-Time Android Application Auditing.en.transcribed.srt
|
45.5 KB
|
Effective Real-Time Android Application Auditing.mp4
|
39.5 MB
|
Every Second Counts Quantifying the Negative Externalities of Cybercrime via Typosquatting.en.transcribed.srt
|
45.9 KB
|
Every Second Counts Quantifying the Negative Externalities of Cybercrime via Typosquatting.mp4
|
41.2 MB
|
Forward Secure Asynchronous Messaging from Puncturable Encryption.en.transcribed.srt
|
52.4 KB
|
Forward Secure Asynchronous Messaging from Puncturable Encryption.mp4
|
73.4 MB
|
GenoGuard Protecting Genomic Data against Brute-Force Attacks.en.transcribed.srt
|
54.0 KB
|
GenoGuard Protecting Genomic Data against Brute-Force Attacks.mp4
|
62.1 MB
|
Geppetto Versatile Verifiable Computation.en.transcribed.srt
|
58.9 KB
|
Geppetto Versatile Verifiable Computation.mp4
|
45.0 MB
|
GraphSC Parallel Secure Computation Made Easy.mp4
|
51.6 MB
|
High System-Code Security with Low Overhead.en.transcribed.srt
|
42.7 KB
|
High System-Code Security with Low Overhead.mp4
|
90.8 MB
|
How Secure and Quick is QUIC Provable Security and Performance Analyses.en.transcribed.srt
|
56.8 KB
|
How Secure and Quick is QUIC Provable Security and Performance Analyses.mp4
|
38.3 MB
|
Last-Level Cache Side-Channel Attacks are Practical.en.transcribed.srt
|
52.8 KB
|
Last-Level Cache Side-Channel Attacks are Practical.mp4
|
35.1 MB
|
Leave Me Alone App-Level Protection against Runtime Information Gathering on Android.en.transcribed.srt
|
40.7 KB
|
Leave Me Alone App-Level Protection against Runtime Information Gathering on Android.mp4
|
28.7 MB
|
Malicious-Client Security in Blind Seer A Scalable Private DBMS.en.transcribed.srt
|
48.6 KB
|
Malicious-Client Security in Blind Seer A Scalable Private DBMS.mp4
|
47.6 MB
|
Micro-Policies Formally Verified, Tag-Based Security Monitors.en.transcribed.srt
|
51.1 KB
|
Micro-Policies Formally Verified, Tag-Based Security Monitors.mp4
|
52.8 MB
|
Missing the Point(er) On the Effectiveness of Code Pointer Integrity.en.transcribed.srt
|
62.9 KB
|
Missing the Point(er) On the Effectiveness of Code Pointer Integrity.mp4
|
110.8 MB
|
ObliVM A Programming Framework for Secure Computation.en.transcribed.srt
|
46.0 KB
|
ObliVM A Programming Framework for Secure Computation.mp4
|
35.8 MB
|
On Subnormal Floating Point and Abnormal Timing.en.transcribed.srt
|
71.3 KB
|
On Subnormal Floating Point and Abnormal Timing.mp4
|
51.0 MB
|
Opening Remarks of the 2015 IEEE Symposium on Security & Privacy.en.transcribed.srt
|
14.4 KB
|
Opening Remarks of the 2015 IEEE Symposium on Security & Privacy.mp4
|
18.9 MB
|
Post-Quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors Problem.en.transcribed.srt
|
47.9 KB
|
Post-Quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors Problem.mp4
|
61.1 MB
|
Privacy and Access Control for Outsourced Personal Records.en.transcribed.srt
|
53.5 KB
|
Privacy and Access Control for Outsourced Personal Records.mp4
|
34.7 MB
|
Program-Adaptive Mutational Fuzzing.en.transcribed.srt
|
54.0 KB
|
Program-Adaptive Mutational Fuzzing.mp4
|
42.8 MB
|
Protecting Private Keys against Memory Disclosure Attacks Using Hardware Transactional Memory.715390f9-723e-48d6-a2d9-8fce9adb8a6d.part
|
215.0 MB
|
Protecting Private Keys against Memory Disclosure Attacks Using Hardware Transactional Memory.en.transcribed.srt
|
40.1 KB
|
Protecting Private Keys against Memory Disclosure Attacks Using Hardware Transactional Memory.mp4
|
37.7 MB
|
Readactor Practical Code Randomization Resilient to Memory Disclosure.en.transcribed.srt
|
42.0 KB
|
Readactor Practical Code Randomization Resilient to Memory Disclosure.mp4
|
41.7 MB
|
Riposte An Anonymous Messaging System Handling Millions of Users.en.transcribed.srt
|
63.9 KB
|
Riposte An Anonymous Messaging System Handling Millions of Users.mp4
|
81.6 MB
|
S$A A Shared Cache Attack That Works across Cores and Defies VM Sandboxing ....en.transcribed.srt
|
50.2 KB
|
S$A A Shared Cache Attack That Works across Cores and Defies VM Sandboxing ....mp4
|
76.7 MB
|
Secure Track Verification.en.transcribed.srt
|
36.8 KB
|
Secure Track Verification.mp4
|
83.3 MB
|
Securing Multiparty Online Services Via Certification of Symbolic Transactions.en.transcribed.srt
|
28.5 KB
|
Securing Multiparty Online Services Via Certification of Symbolic Transactions.mp4
|
40.3 MB
|
Security of the J-PAKE Password-Authenticated Key Exchange Protocol.mp4
|
62.2 MB
|
SoK Deep Packer Inspection A Longitudinal Study of the Complexity of Run-Time Packers.mp4
|
50.7 MB
|
SoK Research Perspectives and Challenges for Bitcoin and Cryptocurrencies.en.transcribed.srt
|
65.8 KB
|
SoK Research Perspectives and Challenges for Bitcoin and Cryptocurrencies.mp4
|
57.4 MB
|
SoK Secure Messaging.en.transcribed.srt
|
35.1 KB
|
SoK Secure Messaging.mp4
|
29.0 MB
|
SurroundWeb Mitigating Privacy Concerns in a 3D Web Browser.en.transcribed.srt
|
43.4 KB
|
SurroundWeb Mitigating Privacy Concerns in a 3D Web Browser.mp4
|
90.9 MB
|
Temporal Lensing and Its Application in Pulsing Denial-of-Service Attacks.en.transcribed.srt
|
46.7 KB
|
Temporal Lensing and Its Application in Pulsing Denial-of-Service Attacks.mp4
|
108.4 MB
|
The Attack of the Clones A Study of the Impact of Shared Code on Vulnerability Patching.en.transcribed.srt
|
41.2 KB
|
The Attack of the Clones A Study of the Impact of Shared Code on Vulnerability Patching.mp4
|
72.3 MB
|
The Miner's Dilemma.en.transcribed.srt
|
54.7 KB
|
The Miner's Dilemma.mp4
|
36.2 MB
|
TinyGarble Highly Compressed and Scalable Sequential Garbled Circuits.en.transcribed.srt
|
38.1 KB
|
TinyGarble Highly Compressed and Scalable Sequential Garbled Circuits.mp4
|
36.2 MB
|
Towards Making Systems Forget with Machine Unlearning.en.transcribed.srt
|
39.1 KB
|
Towards Making Systems Forget with Machine Unlearning.mp4
|
73.9 MB
|
Understanding and Monitoring Embedded Web Scripts.en.transcribed.srt
|
40.1 KB
|
Understanding and Monitoring Embedded Web Scripts.mp4
|
63.4 MB
|
Using Hardware Features for Increased Debugging Transparency.en.transcribed.srt
|
43.9 KB
|
Using Hardware Features for Increased Debugging Transparency.mp4
|
43.7 MB
|
VC3 Trustworthy Data Analytics in the Cloud Using SGX.en.transcribed.srt
|
53.9 KB
|
VC3 Trustworthy Data Analytics in the Cloud Using SGX.mp4
|
35.3 MB
|
Vetting SSL Usage in Applications with SSLINT.en.transcribed.srt
|
40.2 KB
|
Vetting SSL Usage in Applications with SSLINT.mp4
|
40.4 MB
|
Virtual Proofs of Reality and their Physical Implementation.en.transcribed.srt
|
58.6 KB
|
Virtual Proofs of Reality and their Physical Implementation.mp4
|
42.2 MB
|
What the App is That Deception and Countermeasures in the Android User Interface.en.transcribed.srt
|
47.9 KB
|
What the App is That Deception and Countermeasures in the Android User Interface.mp4
|
53.8 MB
|
/IEEE Security and Privacy 2016/
|
A Method for Verifying Privacy-Type Properties The Unbounded Case.en.transcribed.srt
|
42.6 KB
|
A Method for Verifying Privacy-Type Properties The Unbounded Case.mp4
|
67.3 MB
|
A Practical Oblivious Map Data Structure with Secure Deletion and History Independence.en.transcribed.srt
|
67.6 KB
|
A Practical Oblivious Map Data Structure with Secure Deletion and History Independence.mp4
|
79.4 MB
|
A Tough call Mitigating Advanced Code-Reuse Attacks At The Binary Level.en.transcribed.srt
|
36.1 KB
|
A Tough call Mitigating Advanced Code-Reuse Attacks At The Binary Level.mp4
|
81.3 MB
|
A2 Analog Malicious Hardware.en.transcribed.srt
|
69.2 KB
|
A2 Analog Malicious Hardware.mp4
|
95.5 MB
|
Algorithmic Transparency via Quantitative Input Influence ....en.transcribed.srt
|
53.8 KB
|
Algorithmic Transparency via Quantitative Input Influence ....mp4
|
105.1 MB
|
Automated Analysis and Verification of TLS 1.3 0-RTT, Resumption and Delayed Authentication.en.transcribed.srt
|
44.5 KB
|
Automated Analysis and Verification of TLS 1.3 0-RTT, Resumption and Delayed Authentication.mp4
|
78.6 MB
|
Back in Black Towards Formal, Black Box Analysis of Sanitizers and Filters.en.transcribed.srt
|
53.5 KB
|
Back in Black Towards Formal, Black Box Analysis of Sanitizers and Filters.mp4
|
72.4 MB
|
Beauty and the Beast Diverting modern web browsers to build unique browser fingerprints.en.transcribed.srt
|
57.4 KB
|
Beauty and the Beast Diverting modern web browsers to build unique browser fingerprints.mp4
|
80.9 MB
|
CaSE Cache-Assisted Secure Execution on ARM Processors.en.transcribed.srt
|
53.8 KB
|
CaSE Cache-Assisted Secure Execution on ARM Processors.mp4
|
90.7 MB
|
Cache Storage Channels Alias-Driven Attacks and Verified Countermeasures.en.transcribed.srt
|
44.5 KB
|
Cache Storage Channels Alias-Driven Attacks and Verified Countermeasures.mp4
|
53.8 MB
|
Cinderella Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with ....en.transcribed.srt
|
46.0 KB
|
Cinderella Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with ....mp4
|
80.8 MB
|
Cloak of Visibility Detecting When Machines Browse a Different Web.en.transcribed.srt
|
35.9 KB
|
Cloak of Visibility Detecting When Machines Browse a Different Web.mp4
|
35.5 MB
|
Data-Oriented Programming On the Expressiveness of Non-Control Data Attacks.en.transcribed.srt
|
64.2 KB
|
Data-Oriented Programming On the Expressiveness of Non-Control Data Attacks.mp4
|
78.2 MB
|
Dedup Est Machina Memory Deduplication as an Advanced Exploitation Vector.en.transcribed.srt
|
29.9 KB
|
Dedup Est Machina Memory Deduplication as an Advanced Exploitation Vector.mp4
|
65.5 MB
|
Distillation as a Defense to Adversarial Perturbations against Deep Neural Networks.en.transcribed.srt
|
49.2 KB
|
Distillation as a Defense to Adversarial Perturbations against Deep Neural Networks.mp4
|
75.7 MB
|
Domain-Z 28 Registrations Later.en.transcribed.srt
|
46.9 KB
|
Domain-Z 28 Registrations Later.mp4
|
66.0 MB
|
Downgrade Resilience in Key-Exchange Protocols.en.transcribed.srt
|
36.8 KB
|
Downgrade Resilience in Key-Exchange Protocols.mp4
|
76.1 MB
|
Following Devil's Footprints Cross-Platform Analysis of Potentially Harmful Libraries ....en.transcribed.srt
|
52.2 KB
|
Following Devil's Footprints Cross-Platform Analysis of Potentially Harmful Libraries ....mp4
|
84.9 MB
|
HDFI Hardware-Assisted Data-Flow Isolation.en.transcribed.srt
|
48.6 KB
|
HDFI Hardware-Assisted Data-Flow Isolation.mp4
|
61.1 MB
|
Hawk The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts.en.transcribed.srt
|
55.8 KB
|
Hawk The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts.mp4
|
51.7 MB
|
Helping Johnny to Analyze Malware A Usability-Optimized Decompiler and Malware Analysis User Study.en.transcribed.srt
|
57.7 KB
|
Helping Johnny to Analyze Malware A Usability-Optimized Decompiler and Malware Analysis User Study.mp4
|
100.5 MB
|
High-Speed Inter-domain Fault Localization.en.transcribed.srt
|
34.2 KB
|
High-Speed Inter-domain Fault Localization.mp4
|
78.1 MB
|
I Think They're Trying to Tell Me Something Advice Sources and Selection for Digital Security.en.transcribed.srt
|
36.2 KB
|
I Think They're Trying to Tell Me Something Advice Sources and Selection for Digital Security.mp4
|
66.7 MB
|
Inferring User Routes and Locations using Zero-Permission Mobile Sensors.en.transcribed.srt
|
40.6 KB
|
Inferring User Routes and Locations using Zero-Permission Mobile Sensors.mp4
|
53.9 MB
|
Keeping Authorities Honest or Bust with Decentralized Witness Cosigning.en.transcribed.srt
|
60.4 KB
|
Keeping Authorities Honest or Bust with Decentralized Witness Cosigning.mp4
|
92.6 MB
|
Key Confirmation in Key Exchange A Formal Treatment and Implications for TLS 1.3.en.transcribed.srt
|
45.9 KB
|
Key Confirmation in Key Exchange A Formal Treatment and Implications for TLS 1.3.mp4
|
83.7 MB
|
LAVA Large-scale Automated Vulnerability Addition.en.transcribed.srt
|
63.1 KB
|
LAVA Large-scale Automated Vulnerability Addition.mp4
|
78.9 MB
|
MitM Attack by Name Collision Cause Analysis and Vulnerability Assessment in the New gTLD Era.en.transcribed.srt
|
49.8 KB
|
MitM Attack by Name Collision Cause Analysis and Vulnerability Assessment in the New gTLD Era.mp4
|
78.4 MB
|
Multiple Handshakes Security of TLS 1.3 Candidates.en.transcribed.srt
|
43.3 KB
|
Multiple Handshakes Security of TLS 1.3 Candidates.mp4
|
82.2 MB
|
NITRD Panel Federal Cybersecurity and Privacy R&D Strategic Plans.en.transcribed.srt
|
183.3 KB
|
NITRD Panel Federal Cybersecurity and Privacy R&D Strategic Plans.mp4
|
223.6 MB
|
No Pardon for the Interruption New Inference Attacks on Android Through Interrupt Timing Analysis.en.transcribed.srt
|
34.7 KB
|
No Pardon for the Interruption New Inference Attacks on Android Through Interrupt Timing Analysis.mp4
|
64.8 MB
|
On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud.en.transcribed.srt
|
50.8 KB
|
On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud.mp4
|
78.8 MB
|
Opening Remarks of the 2016 IEEE Symposium on Security & Privacy.en.transcribed.srt
|
26.2 KB
|
Opening Remarks of the 2016 IEEE Symposium on Security & Privacy.mp4
|
38.0 MB
|
PhotoProof Cryptographic Image Authentication for Any Set of Permissible Transformations.en.transcribed.srt
|
44.5 KB
|
PhotoProof Cryptographic Image Authentication for Any Set of Permissible Transformations.mp4
|
89.5 MB
|
Prepose Privacy, Security, and Reliability for Gesture-Based Programming.en.transcribed.srt
|
50.9 KB
|
Prepose Privacy, Security, and Reliability for Gesture-Based Programming.mp4
|
56.6 MB
|
Return to the Zombie Gadgets Undermining Destructive Code Reads via Code-Inference Attacks.en.transcribed.srt
|
50.2 KB
|
Return to the Zombie Gadgets Undermining Destructive Code Reads via Code-Inference Attacks.mp4
|
74.0 MB
|
Revisiting Square Root ORAM Efficient Random Access in Multi-Party Computation.en.transcribed.srt
|
33.7 KB
|
Revisiting Square Root ORAM Efficient Random Access in Multi-Party Computation.mp4
|
55.7 MB
|
S&P TC Business Meeting.en.transcribed.srt
|
100.7 KB
|
S&P TC Business Meeting.mp4
|
179.3 MB
|
Security Analysis of Emerging Smart Home Applications.en.transcribed.srt
|
55.4 KB
|
Security Analysis of Emerging Smart Home Applications.mp4
|
79.8 MB
|
Seeking Nonsense, Looking for Trouble Efficient Promotional-Infection Detection through ....en.transcribed.srt
|
32.4 KB
|
Seeking Nonsense, Looking for Trouble Efficient Promotional-Infection Detection through ....mp4
|
55.2 MB
|
Sending out an SMS Characterizing the Security of the SMS Ecosystem with Public Gateways.en.transcribed.srt
|
33.2 KB
|
Sending out an SMS Characterizing the Security of the SMS Ecosystem with Public Gateways.mp4
|
57.4 MB
|
Shreds Fine-grained Execution Units with Private Memory.en.transcribed.srt
|
52.4 KB
|
Shreds Fine-grained Execution Units with Private Memory.mp4
|
88.9 MB
|
SoK (State of) The Art of War Offensive Techniques in Binary Analysis.en.transcribed.srt
|
45.6 KB
|
SoK (State of) The Art of War Offensive Techniques in Binary Analysis.mp4
|
47.1 MB
|
SoK Everyone Hates Robocalls A Survey of Techniques against Telephone Spam.en.transcribed.srt
|
54.6 KB
|
SoK Everyone Hates Robocalls A Survey of Techniques against Telephone Spam.mp4
|
72.5 MB
|
SoK Towards Grounding Censorship Circumvention in Empiricism.en.transcribed.srt
|
44.5 KB
|
SoK Towards Grounding Censorship Circumvention in Empiricism.mp4
|
59.5 MB
|
Staying Secure and Unprepared Understanding and Mitigating the Security Risks of Apple ZeroConf.en.transcribed.srt
|
35.5 KB
|
Staying Secure and Unprepared Understanding and Mitigating the Security Risks of Apple ZeroConf.mp4
|
83.0 MB
|
Synthesizing Plausible Privacy-Preserving Location Traces.en.transcribed.srt
|
55.3 KB
|
Synthesizing Plausible Privacy-Preserving Location Traces.mp4
|
78.8 MB
|
Talos Neutralizing Vulnerabilities with Security Workarounds for Rapid Response.en.transcribed.srt
|
42.7 KB
|
Talos Neutralizing Vulnerabilities with Security Workarounds for Rapid Response.mp4
|
77.6 MB
|
TaoStore Overcoming Asynchronicity in Oblivious Data Storage.en.transcribed.srt
|
41.8 KB
|
TaoStore Overcoming Asynchronicity in Oblivious Data Storage.mp4
|
80.4 MB
|
The Cracked Cookie Jar HTTP Cookie Hijacking and the Exposure of Private Information.en.transcribed.srt
|
64.1 KB
|
The Cracked Cookie Jar HTTP Cookie Hijacking and the Exposure of Private Information.mp4
|
77.0 MB
|
TriggerScope Towards Detecting Logic Bombs in Android Applications.en.transcribed.srt
|
64.1 KB
|
TriggerScope Towards Detecting Logic Bombs in Android Applications.mp4
|
76.5 MB
|
Users Really Do Plug in USB Drives They Find.en.transcribed.srt
|
48.5 KB
|
Users Really Do Plug in USB Drives They Find.mp4
|
75.8 MB
|
Verena End-to-End Integrity Protection for Web Applications.mp4
|
80.6 MB
|
Verifiable ASICs.en.transcribed.srt
|
64.3 KB
|
Verifiable ASICs.mp4
|
80.0 MB
|
You Get Where You're Looking For The Impact Of Information Sources On Code Security.en.transcribed.srt
|
51.8 KB
|
You Get Where You're Looking For The Impact Of Information Sources On Code Security.mp4
|
82.1 MB
|
pASSWORD tYPOS and How to Correct Them Securely.en.transcribed.srt
|
52.1 KB
|
pASSWORD tYPOS and How to Correct Them Securely.mp4
|
79.4 MB
|
/IEEE Security and Privacy 2017/
|
A Framework for Universally Composable Diffie-Hellman Key Exchange.en.transcribed.srt
|
51.5 KB
|
A Framework for Universally Composable Diffie-Hellman Key Exchange.mp4
|
43.0 MB
|
A Lustrum of Malware Network Communication Evolution and Insights.en.transcribed.srt
|
60.3 KB
|
A Lustrum of Malware Network Communication Evolution and Insights.mp4
|
65.2 MB
|
An Experimental Security Analysis of an Industrial Robot Controller.en.transcribed.srt
|
43.1 KB
|
An Experimental Security Analysis of an Industrial Robot Controller.mp4
|
43.5 MB
|
Augur Internet-Wide Detection of Connectivity Disruptions.en.transcribed.srt
|
45.5 KB
|
Augur Internet-Wide Detection of Connectivity Disruptions.mp4
|
34.9 MB
|
Backward-bounded DSE Targeting Infeasibility Questions on Obfuscated Codes.en.transcribed.srt
|
57.1 KB
|
Backward-bounded DSE Targeting Infeasibility Questions on Obfuscated Codes.mp4
|
56.6 MB
|
CRLite A Scalable System for Pushing All TLS Revocations to All Browsers.en.transcribed.srt
|
45.7 KB
|
CRLite A Scalable System for Pushing All TLS Revocations to All Browsers.mp4
|
44.7 MB
|
Catena Efficient Non-equivocation via Bitcoin.en.transcribed.srt
|
58.3 KB
|
Catena Efficient Non-equivocation via Bitcoin.mp4
|
30.4 MB
|
Cloak and Dagger From Two Permissions to Complete Control of the UI Feedback Loop.en.transcribed.srt
|
73.8 KB
|
Cloak and Dagger From Two Permissions to Complete Control of the UI Feedback Loop.mp4
|
54.6 MB
|
CoSMeDis A Distributed Social Media Platform with Formally Verified Confidentiality Guarantees.en.transcribed.srt
|
46.2 KB
|
CoSMeDis A Distributed Social Media Platform with Formally Verified Confidentiality Guarantees.mp4
|
31.9 MB
|
Comparing the Usability of Cryptographic APIs.en.transcribed.srt
|
52.7 KB
|
Comparing the Usability of Cryptographic APIs.mp4
|
29.3 MB
|
Counter-RAPTOR Safeguarding Tor Against Active Routing Attacks.en.transcribed.srt
|
43.8 KB
|
Counter-RAPTOR Safeguarding Tor Against Active Routing Attacks.mp4
|
44.8 MB
|
Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping.en.transcribed.srt
|
50.6 KB
|
Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping.mp4
|
87.4 MB
|
Finding and Preventing Bugs in JavaScript Bindings.en.transcribed.srt
|
51.3 KB
|
Finding and Preventing Bugs in JavaScript Bindings.mp4
|
39.8 MB
|
From Trash to Treasure Timing-Sensitive Garbage Collection.en.transcribed.srt
|
56.6 KB
|
From Trash to Treasure Timing-Sensitive Garbage Collection.mp4
|
39.2 MB
|
HVLearn Automated Black-box Analysis of Hostname Verification in SSL TLS Implementations.en.transcribed.srt
|
58.7 KB
|
HVLearn Automated Black-box Analysis of Hostname Verification in SSL TLS Implementations.mp4
|
53.0 MB
|
Hardening Java's Access Control by Abolishing Implicit Privilege Elevation.en.transcribed.srt
|
57.5 KB
|
Hardening Java's Access Control by Abolishing Implicit Privilege Elevation.mp4
|
38.0 MB
|
Hijacking Bitcoin Routing Attacks on Cryptocurrencies.en.transcribed.srt
|
53.3 KB
|
Hijacking Bitcoin Routing Attacks on Cryptocurrencies.mp4
|
52.8 MB
|
How They Did It An Analysis of Emission Defeat Devices in Modern Automobiles.en.transcribed.srt
|
55.0 KB
|
How They Did It An Analysis of Emission Defeat Devices in Modern Automobiles.mp4
|
38.6 MB
|
IKP Turning a PKI Around with Decentralized Automated Incentives.en.transcribed.srt
|
58.8 KB
|
IKP Turning a PKI Around with Decentralized Automated Incentives.mp4
|
59.9 MB
|
IVD Automatic Learning and Enforcement of Authorization Rules in Online Social Networks - YouTube.en.transcribed.srt
|
38.2 KB
|
IVD Automatic Learning and Enforcement of Authorization Rules in Online Social Networks - YouTube.mp4
|
33.7 MB
|
Identifying Personal DNA Methylation Profiles by Genotype Inference.en.transcribed.srt
|
49.7 KB
|
Identifying Personal DNA Methylation Profiles by Genotype Inference.mp4
|
42.4 MB
|
Implementing and Proving the TLS 1.3 Record Layer.mp4
|
40.5 MB
|
IoT Goes Nuclear Creating a Zigbee Chain Reaction.en.transcribed.srt
|
50.5 KB
|
IoT Goes Nuclear Creating a Zigbee Chain Reaction.mp4
|
56.8 MB
|
Is Interaction Necessary for Distributed Private Learning.en.transcribed.srt
|
58.5 KB
|
Is Interaction Necessary for Distributed Private Learning.mp4
|
43.0 MB
|
Leakage-Abuse Attacks on Order-Revealing Encryption.en.transcribed.srt
|
55.4 KB
|
Leakage-Abuse Attacks on Order-Revealing Encryption.mp4
|
40.1 MB
|
Machine-Checked Proofs of Privacy for Electronic Voting Protocols.en.transcribed.srt
|
42.5 KB
|
Machine-Checked Proofs of Privacy for Electronic Voting Protocols.mp4
|
33.5 MB
|
Membership Inference Attacks against Machine Learning Models.en.transcribed.srt
|
42.5 KB
|
Membership Inference Attacks against Machine Learning Models.mp4
|
25.9 MB
|
Multi-touch Authentication Using Hand Geometry and Behavioral Information.en.transcribed.srt
|
37.9 KB
|
Multi-touch Authentication Using Hand Geometry and Behavioral Information.mp4
|
38.2 MB
|
NEZHA Efficient Domain-independent Differential Testing.en.transcribed.srt
|
51.6 KB
|
NEZHA Efficient Domain-independent Differential Testing.mp4
|
34.8 MB
|
Norax Enabling Execute-Only Memory for COTS Binaries on AArch64.en.transcribed.srt
|
58.2 KB
|
Norax Enabling Execute-Only Memory for COTS Binaries on AArch64.mp4
|
39.4 MB
|
Obstacles to the Adoption of Secure Communication Tools.en.transcribed.srt
|
46.7 KB
|
Obstacles to the Adoption of Secure Communication Tools.mp4
|
30.1 MB
|
One TPM to Bind Them All Fixing TPM2.0 for Provably Secure Anonymous Attestation.en.transcribed.srt
|
50.5 KB
|
One TPM to Bind Them All Fixing TPM2.0 for Provably Secure Anonymous Attestation.mp4
|
41.4 MB
|
Optimized Honest-Majority MPC for Malicious Adversaries - Breaking 1 Billion-Gate Second Barrier.en.transcribed.srt
|
50.3 KB
|
Optimized Honest-Majority MPC for Malicious Adversaries - Breaking 1 Billion-Gate Second Barrier.mp4
|
38.6 MB
|
Protecting Bare-metal Embedded Systems with Privilege Overlays.en.transcribed.srt
|
52.8 KB
|
Protecting Bare-metal Embedded Systems with Privilege Overlays.mp4
|
50.4 MB
|
Pyramid Enhancing Selectivity in Big Data Protection with Count Featurization.en.transcribed.srt
|
56.4 KB
|
Pyramid Enhancing Selectivity in Big Data Protection with Count Featurization.mp4
|
43.4 MB
|
Scalable Bias-Resistant Distributed Randomness.en.transcribed.srt
|
60.6 KB
|
Scalable Bias-Resistant Distributed Randomness.mp4
|
44.6 MB
|
SecureML A System for Scalable Privacy-Preserving Machine Learning.en.transcribed.srt
|
45.8 KB
|
SecureML A System for Scalable Privacy-Preserving Machine Learning.mp4
|
32.6 MB
|
Securing Augmented Reality Output.84d6e03b-b9a3-43cb-99ad-5277a4f98362.part
|
187.7 MB
|
Securing Augmented Reality Output.en.transcribed.srt
|
56.9 KB
|
Securing Augmented Reality Output.mp4
|
45.1 MB
|
Side-Channel Attacks on Shared Search Indexes.en.transcribed.srt
|
45.9 KB
|
Side-Channel Attacks on Shared Search Indexes.mp4
|
41.0 MB
|
Skyfire Data-Driven Seed Generation for Fuzzing.mp4
|
26.3 MB
|
SmarPer Context-Aware and Automatic Runtime-Permissions for Mobile Devices - YouTube.en.transcribed.srt
|
53.3 KB
|
SmarPer Context-Aware and Automatic Runtime-Permissions for Mobile Devices - YouTube.mp4
|
70.0 MB
|
SoK Cryptographically Protected Database Search.en.transcribed.srt
|
59.7 KB
|
SoK Cryptographically Protected Database Search.mp4
|
39.3 MB
|
SoK Exploiting Network Printers.en.transcribed.srt
|
52.6 KB
|
SoK Exploiting Network Printers.mp4
|
33.4 MB
|
SoK Science, Security, and the Elusive Goal of Security as a Scientific Pursuit.en.transcribed.srt
|
77.2 KB
|
SoK Science, Security, and the Elusive Goal of Security as a Scientific Pursuit.mp4
|
82.5 MB
|
Spotless Sandboxes Evading Malware Analysis Systems using Wear-and-Tear Artifacts.en.transcribed.srt
|
57.3 KB
|
Spotless Sandboxes Evading Malware Analysis Systems using Wear-and-Tear Artifacts.mp4
|
25.0 MB
|
Stack Overflow Considered Harmful --- The Impact of Copy&Paste on Android Application Security.en.transcribed.srt
|
47.0 KB
|
Stack Overflow Considered Harmful --- The Impact of Copy&Paste on Android Application Security.mp4
|
35.5 MB
|
SymCerts Practical Symbolic Execution For Exposing Noncompliance in X.509 Certificate Validation.en.transcribed.srt
|
53.6 KB
|
SymCerts Practical Symbolic Execution For Exposing Noncompliance in X.509 Certificate Validation.mp4
|
69.1 MB
|
SysPal System-guided Pattern Locks for Android.en.transcribed.srt
|
41.9 KB
|
SysPal System-guided Pattern Locks for Android.mp4
|
45.4 MB
|
To Catch a Ratter Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild.en.transcribed.srt
|
43.0 KB
|
To Catch a Ratter Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild.mp4
|
42.6 MB
|
Towards Evaluating the Robustness of Neural Networks.en.transcribed.srt
|
69.5 KB
|
Towards Evaluating the Robustness of Neural Networks.mp4
|
31.9 MB
|
Under the Shadow of Sunshine Understanding & Detecting Bulletproof Hosting.en.transcribed.srt
|
32.4 KB
|
Under the Shadow of Sunshine Understanding & Detecting Bulletproof Hosting.mp4
|
27.4 MB
|
VUDDY A Scalable Approach for Vulnerable Code Clone Discovery.en.transcribed.srt
|
46.2 KB
|
VUDDY A Scalable Approach for Vulnerable Code Clone Discovery.mp4
|
55.1 MB
|
Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate.en.transcribed.srt
|
67.8 KB
|
Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate.mp4
|
41.5 MB
|
Verifying and Synthesizing Constant-Resource Implementations with Types.en.transcribed.srt
|
40.6 KB
|
Verifying and Synthesizing Constant-Resource Implementations with Types.mp4
|
32.3 MB
|
XHOUND Quantifying the Fingerprintability of Browser Extensions.en.transcribed.srt
|
48.1 KB
|
XHOUND Quantifying the Fingerprintability of Browser Extensions.mp4
|
44.1 MB
|
Your Exploit is Mine Automatic Shellcode Transplant for Remote Exploits.en.transcribed.srt
|
43.6 KB
|
Your Exploit is Mine Automatic Shellcode Transplant for Remote Exploits.mp4
|
31.8 MB
|
vSQL Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases.en.transcribed.srt
|
49.4 KB
|
vSQL Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases.mp4
|
48.0 MB
|
/IEEE Security and Privacy 2018/
|
A Formal Treatment of Accountable Proxying over TLS.en.transcribed.srt
|
58.5 KB
|
A Formal Treatment of Accountable Proxying over TLS.mp4
|
27.7 MB
|
A Machine Learning Approach to Prevent Malicious Calls Over Telephony Networks.en.transcribed.srt
|
47.0 KB
|
A Machine Learning Approach to Prevent Malicious Calls Over Telephony Networks.mp4
|
30.0 MB
|
A Tale of Two Studies The Best and Worst of YubiKey Usability.en.transcribed.srt
|
50.1 KB
|
A Tale of Two Studies The Best and Worst of YubiKey Usability.mp4
|
19.2 MB
|
AI2 Safety and Robustness Certification of Neural Networks.en.transcribed.srt
|
33.8 KB
|
AI2 Safety and Robustness Certification of Neural Networks.mp4
|
15.0 MB
|
Angora Efficient Fuzzing by Principled Search.en.transcribed.srt
|
37.9 KB
|
Angora Efficient Fuzzing by Principled Search.mp4
|
24.1 MB
|
Anonymity Trilemma Strong Anonymity, Low Bandwidth Overhead, Low Latency --- Choose Two.en.transcribed.srt
|
45.4 KB
|
Anonymity Trilemma Strong Anonymity, Low Bandwidth Overhead, Low Latency --- Choose Two.mp4
|
18.9 MB
|
Another Flip in the Wall of Rowhammer Defenses.en.transcribed.srt
|
62.2 KB
|
Another Flip in the Wall of Rowhammer Defenses.mp4
|
26.2 MB
|
Blue Note How Intentional Acoustic Interference Damages Availablity and Integrity -.en.transcribed.srt
|
60.4 KB
|
Blue Note How Intentional Acoustic Interference Damages Availablity and Integrity -.mp4
|
31.1 MB
|
Bulletproofs Short Proofs for Confidential Transactions and More.en.transcribed.srt
|
58.7 KB
|
Bulletproofs Short Proofs for Confidential Transactions and More.mp4
|
21.4 MB
|
Compiler-assisted Code Randomization.en.transcribed.srt
|
38.9 KB
|
Compiler-assisted Code Randomization.mp4
|
25.3 MB
|
Computer Security and Privacy for Refugees in the United States.en.transcribed.srt
|
66.5 KB
|
Computer Security and Privacy for Refugees in the United States.mp4
|
20.4 MB
|
Crowd-GPS-Sec Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks.mp4
|
23.9 MB
|
DEEPSEC Deciding Equivalence Properties in Security Protocols -- Theory and Practice.en.transcribed.srt
|
41.3 KB
|
DEEPSEC Deciding Equivalence Properties in Security Protocols -- Theory and Practice.mp4
|
16.4 MB
|
Distance-Bounding Protocols Verification without Time and Location.en.transcribed.srt
|
52.7 KB
|
Distance-Bounding Protocols Verification without Time and Location.mp4
|
25.8 MB
|
Double-efficient zkSNARKs Without Trusted Setup.en.transcribed.srt
|
66.0 KB
|
Double-efficient zkSNARKs Without Trusted Setup.mp4
|
24.3 MB
|
Enabling Autonomous IoT Device Pairing using Different Sensor Types.en.transcribed.srt
|
56.7 KB
|
Enabling Autonomous IoT Device Pairing using Different Sensor Types.mp4
|
27.6 MB
|
EnclaveDB A Secure Database using SGX.en.transcribed.srt
|
65.4 KB
|
EnclaveDB A Secure Database using SGX.mp4
|
20.6 MB
|
Enumerating Active IPv6 Hosts for Large-scale Security Scans via DNSSEC-signed Reverse Zones.en.transcribed.srt
|
61.5 KB
|
Enumerating Active IPv6 Hosts for Large-scale Security Scans via DNSSEC-signed Reverse Zones.mp4
|
22.6 MB
|
EyeTell Video-Assisted Touchscreen Keystroke Inference from Eye Movements.en.transcribed.srt
|
43.4 KB
|
EyeTell Video-Assisted Touchscreen Keystroke Inference from Eye Movements.mp4
|
26.4 MB
|
FP-Stalker Tracking Browser Fingerprint Evolutions - Antoine Vastel.en.transcribed.srt
|
50.8 KB
|
FP-Stalker Tracking Browser Fingerprint Evolutions - Antoine Vastel.mp4
|
17.8 MB
|
FPGA-Based Remote Power Side-Channel Attacks.en.transcribed.srt
|
41.7 KB
|
FPGA-Based Remote Power Side-Channel Attacks.mp4
|
19.1 MB
|
FuturesMEX Secure, Distributed Futures Market Exchange.en.transcribed.srt
|
47.1 KB
|
FuturesMEX Secure, Distributed Futures Market Exchange.mp4
|
27.0 MB
|
Grand Pwning Unit Accelerating Microarchitectural Attacks with the GPU.en.transcribed.srt
|
53.7 KB
|
Grand Pwning Unit Accelerating Microarchitectural Attacks with the GPU.mp4
|
23.7 MB
|
Hackers vs. Testers A Comparison of Software Vulnerability Discovery Processes.en.transcribed.srt
|
64.4 KB
|
Hackers vs. Testers A Comparison of Software Vulnerability Discovery Processes.mp4
|
25.8 MB
|
Implementing Conjunction Obfuscation under Entropic Ring LWE.en.transcribed.srt
|
48.8 KB
|
Implementing Conjunction Obfuscation under Entropic Ring LWE.mp4
|
21.8 MB
|
Impossibility of Precise and Sound Termination-Sensitive Security Enforcements.en.transcribed.srt
|
42.7 KB
|
Impossibility of Precise and Sound Termination-Sensitive Security Enforcements.mp4
|
18.4 MB
|
Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage.en.transcribed.srt
|
51.6 KB
|
Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage.mp4
|
19.1 MB
|
Learning from Mutants Using Code Mutation to Learn and Monitor Invariants of a CPS.en.transcribed.srt
|
55.8 KB
|
Learning from Mutants Using Code Mutation to Learn and Monitor Invariants of a CPS.mp4
|
21.9 MB
|
Locally Differentially Private Frequent Itemset Mining.en.transcribed.srt
|
35.2 KB
|
Locally Differentially Private Frequent Itemset Mining.mp4
|
21.1 MB
|
Manipulating Machine Learning Poisoning Attacks & Countermeasures.en.transcribed.srt
|
50.1 KB
|
Manipulating Machine Learning Poisoning Attacks & Countermeasures.mp4
|
23.2 MB
|
Mobile Application Web API Reconnaissance.en.transcribed.srt
|
48.1 KB
|
Mobile Application Web API Reconnaissance.mp4
|
22.5 MB
|
Oblix An Efficient Oblivious Search Index.en.transcribed.srt
|
49.9 KB
|
Oblix An Efficient Oblivious Search Index.mp4
|
16.9 MB
|
OmniLedger A Secure, Scale-Out, Decentralized Ledger via Sharding.mp4
|
22.6 MB
|
On Enforcing the Digital Immunity of a Large Humanitarian Organization.en.transcribed.srt
|
51.3 KB
|
On Enforcing the Digital Immunity of a Large Humanitarian Organization.mp4
|
23.7 MB
|
On the Economics of Offline Password Cracking.en.transcribed.srt
|
50.9 KB
|
On the Economics of Offline Password Cracking.mp4
|
26.2 MB
|
Opening Remarks of the 39th IEEE Symposium on Security & Privacy.en.transcribed.srt
|
53.1 KB
|
Opening Remarks of the 39th IEEE Symposium on Security & Privacy.mp4
|
19.6 MB
|
PIR with Compressed Queries and Amortized Query Processing.en.transcribed.srt
|
58.8 KB
|
PIR with Compressed Queries and Amortized Query Processing.mp4
|
24.3 MB
|
Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels.en.transcribed.srt
|
61.6 KB
|
Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels.mp4
|
25.0 MB
|
Privacy Risks with Facebook's PII-based Targeting.en.transcribed.srt
|
53.0 KB
|
Privacy Risks with Facebook's PII-based Targeting.mp4
|
24.0 MB
|
Protecting the Stack with Metadata Policies and Tagged Hardware.en.transcribed.srt
|
65.9 KB
|
Protecting the Stack with Metadata Policies and Tagged Hardware.mp4
|
24.5 MB
|
Racing in Hyperspace Closing Hyper Threading Side Channels on SGX.en.transcribed.srt
|
42.8 KB
|
Racing in Hyperspace Closing Hyper Threading Side Channels on SGX.mp4
|
24.8 MB
|
Routing Around Congestion Defeating DDoS Attacks and Adverse Network Conditions via Reactive....en.transcribed.srt
|
75.2 KB
|
Routing Around Congestion Defeating DDoS Attacks and Adverse Network Conditions via Reactive....mp4
|
31.4 MB
|
Secure Device Bootstrapping without Secrets Resistant to Signal Manipulation Attacks.en.transcribed.srt
|
36.0 KB
|
Secure Device Bootstrapping without Secrets Resistant to Signal Manipulation Attacks.mp4
|
19.3 MB
|
SoK Plug & Pray Today - Understanding USB Insecurity in Versions 1 through C.en.transcribed.srt
|
46.3 KB
|
SoK Plug & Pray Today - Understanding USB Insecurity in Versions 1 through C.mp4
|
19.5 MB
|
SoK Keylogging Side Channels.en.transcribed.srt
|
52.5 KB
|
SoK Keylogging Side Channels.mp4
|
19.0 MB
|
Sonar Detecting SS7 Redirection Attacks With Audio-Based Distance Bounding.en.transcribed.srt
|
46.9 KB
|
Sonar Detecting SS7 Redirection Attacks With Audio-Based Distance Bounding.mp4
|
21.1 MB
|
Speechless Analyzing the Threat to Speech Privacy from Smartphone Motion Sensors.en.transcribed.srt
|
51.4 KB
|
Speechless Analyzing the Threat to Speech Privacy from Smartphone Motion Sensors.mp4
|
21.2 MB
|
Static Evaluation of Noninterference using Approximate Model Counting.en.transcribed.srt
|
42.4 KB
|
Static Evaluation of Noninterference using Approximate Model Counting.mp4
|
26.1 MB
|
Stealing Hyperparameters in Machine Learning.en.transcribed.srt
|
45.7 KB
|
Stealing Hyperparameters in Machine Learning.mp4
|
18.9 MB
|
Study and Mitigation of Origin Stripping Vulnerabilities in Hybrid-postMessage Enabled Mobile Apps.en.transcribed.srt
|
45.1 KB
|
Study and Mitigation of Origin Stripping Vulnerabilities in Hybrid-postMessage Enabled Mobile Apps.mp4
|
22.5 MB
|
Surveylance Automatically Detecting Online Survey Scams.en.transcribed.srt
|
41.3 KB
|
Surveylance Automatically Detecting Online Survey Scams.mp4
|
18.8 MB
|
T-Fuzz Fuzzing by Program Transformation Hui Peng.en.transcribed.srt
|
44.5 KB
|
T-Fuzz Fuzzing by Program Transformation Hui Peng.mp4
|
26.8 MB
|
The Cards Aren't Alright Detecting Counterfeit Gift Cards Using Encoding Jitter.en.transcribed.srt
|
65.4 KB
|
The Cards Aren't Alright Detecting Counterfeit Gift Cards Using Encoding Jitter.mp4
|
28.8 MB
|
The Rise of the Citizen Developer Assessing the Security Impact of Online App Generators.en.transcribed.srt
|
51.8 KB
|
The Rise of the Citizen Developer Assessing the Security Impact of Online App Generators.mp4
|
23.9 MB
|
Towards Security and Privacy for Multi User Augmented Reality.en.transcribed.srt
|
61.1 KB
|
Towards Security and Privacy for Multi User Augmented Reality.mp4
|
24.6 MB
|
Tracking Certificate Misissuance in the Wild.en.transcribed.srt
|
55.0 KB
|
Tracking Certificate Misissuance in the Wild.mp4
|
17.8 MB
|
Tracking Ransomware End-to-end.en.transcribed.srt
|
57.8 KB
|
Tracking Ransomware End-to-end.mp4
|
25.4 MB
|
Understanding Linux Malware.en.transcribed.srt
|
53.8 KB
|
Understanding Linux Malware.mp4
|
17.9 MB
|
When Your Fitness Tracker Betrays You Quantifying the Predictability....en.transcribed.srt
|
61.5 KB
|
When Your Fitness Tracker Betrays You Quantifying the Predictability....mp4
|
24.7 MB
|
vRAM Faster Verifiable RAM With Program-Independent Preprocessing.en.transcribed.srt
|
54.9 KB
|
vRAM Faster Verifiable RAM With Program-Independent Preprocessing.mp4
|
26.2 MB
|
xJsnark A Framework for Efficient Verifiable Computation.en.transcribed.srt
|
56.5 KB
|
xJsnark A Framework for Efficient Verifiable Computation.mp4
|
29.0 MB
|
/IEEE Security and Privacy 2019/
|
An Extensive Formal Security Analysis of the OpenID Financial grade API Pedram Hosseyni.en.transcribed.srt
|
27.0 KB
|
An Extensive Formal Security Analysis of the OpenID Financial grade API Pedram Hosseyni.mp4
|
18.6 MB
|
Asm2Vec Boosting Static Representation Robustness for Binary Clone Search....en.transcribed.srt
|
32.8 KB
|
Asm2Vec Boosting Static Representation Robustness for Binary Clone Search....mp4
|
22.1 MB
|
Attack Directories, Not Caches Side Channel Attacks in a Non Inclusive World.en.transcribed.srt
|
35.1 KB
|
Attack Directories, Not Caches Side Channel Attacks in a Non Inclusive World.mp4
|
20.1 MB
|
Beyond Credential Stuffing Password Similarity Models using Neural Networks.mp4
|
17.2 MB
|
Bitcoin vs. Bitcoin Cash Coexistence or Downfall of Bitcoin Cash.en.transcribed.srt
|
27.7 KB
|
Bitcoin vs. Bitcoin Cash Coexistence or Downfall of Bitcoin Cash.mp4
|
16.8 MB
|
Blind Certificate Authorities.en.transcribed.srt
|
24.7 KB
|
Blind Certificate Authorities.mp4
|
9.6 MB
|
Breaking LTE on Layer Two.en.transcribed.srt
|
30.6 KB
|
Breaking LTE on Layer Two.mp4
|
26.1 MB
|
CaSym Cache Aware Symbolic Execution for Side Channel Detection and Mitigation.en.transcribed.srt
|
32.3 KB
|
CaSym Cache Aware Symbolic Execution for Side Channel Detection and Mitigation.mp4
|
19.4 MB
|
Certified Robustness to Adversarial Examples with Differential Privacy.en.transcribed.srt
|
31.5 KB
|
Certified Robustness to Adversarial Examples with Differential Privacy.mp4
|
13.6 MB
|
Characterizing Pixel Tracking through the Lens of Disposable Email Services.en.transcribed.srt
|
31.8 KB
|
Characterizing Pixel Tracking through the Lens of Disposable Email Services.mp4
|
19.7 MB
|
Comprehensive Privacy Analysis of Deep Learning.en.transcribed.srt
|
28.7 KB
|
Comprehensive Privacy Analysis of Deep Learning.mp4
|
19.7 MB
|
Dangerous Skills Understanding and Mitigating Security Risks of Voice-Controlled Third-Party....en.transcribed.srt
|
27.6 KB
|
Dangerous Skills Understanding and Mitigating Security Risks of Voice-Controlled Third-Party....mp4
|
25.5 MB
|
Data Recovery on Encrypted Databases with k-Nearest Neighbor Query Leakage.mp4
|
25.8 MB
|
Demystifying Hidden Privacy Settings in Mobile Apps.en.transcribed.srt
|
30.0 KB
|
Demystifying Hidden Privacy Settings in Mobile Apps.mp4
|
13.1 MB
|
Differentially Private Model Publishing For Deep Learning.en.transcribed.srt
|
33.0 KB
|
Differentially Private Model Publishing For Deep Learning.mp4
|
31.3 MB
|
Does Certificate Transparency Break the Web Measuring Adoption and Error Rate.en.transcribed.srt
|
36.9 KB
|
Does Certificate Transparency Break the Web Measuring Adoption and Error Rate.mp4
|
19.7 MB
|
Dominance as a New Trusted Computing Primitive for the IoT.en.transcribed.srt
|
39.0 KB
|
Dominance as a New Trusted Computing Primitive for the IoT.mp4
|
23.7 MB
|
Drones' Cryptanalysis - Detecting Privacy Invasion Attacks Conducted by Drone.en.transcribed.srt
|
31.2 KB
|
Drones' Cryptanalysis - Detecting Privacy Invasion Attacks Conducted by Drone.mp4
|
26.3 MB
|
EmPoWeb Empowering Web Applications with Browser Extensions.en.transcribed.srt
|
34.6 KB
|
EmPoWeb Empowering Web Applications with Browser Extensions.mp4
|
12.1 MB
|
Exploiting Correcting Codes On the Effectiveness of ECC Memory Against Rowhammer Attacks.en.transcribed.srt
|
32.0 KB
|
Exploiting Correcting Codes On the Effectiveness of ECC Memory Against Rowhammer Attacks.mp4
|
22.2 MB
|
Exploiting Unintended Feature leakage in Collaborative Learning Congzheng Song.en.transcribed.srt
|
24.9 KB
|
Exploiting Unintended Feature leakage in Collaborative Learning Congzheng Song.mp4
|
16.8 MB
|
F-BLEAU Fast Black-box Leakage Estimation.en.transcribed.srt
|
27.5 KB
|
F-BLEAU Fast Black-box Leakage Estimation.mp4
|
16.9 MB
|
Fidelius Protecting User Secrets from Compromised Browsers.en.transcribed.srt
|
44.4 KB
|
Fidelius Protecting User Secrets from Compromised Browsers.mp4
|
18.2 MB
|
Formally Verified Cryptographic Web Applications in WebAssembly.en.transcribed.srt
|
37.8 KB
|
Formally Verified Cryptographic Web Applications in WebAssembly.mp4
|
28.4 MB
|
Full speed Fuzzing Reducing Fuzzing Overhead through Coverage-guided Tracing.en.transcribed.srt
|
44.1 KB
|
Full speed Fuzzing Reducing Fuzzing Overhead through Coverage-guided Tracing.mp4
|
12.1 MB
|
Fuzzing File Systems via Two-Dimensional Input Space Exploration.en.transcribed.srt
|
27.3 KB
|
Fuzzing File Systems via Two-Dimensional Input Space Exploration.mp4
|
18.0 MB
|
Hard Drive of Hearing Disks that Eavesdrop with a Synthesized Microphone.en.transcribed.srt
|
36.1 KB
|
Hard Drive of Hearing Disks that Eavesdrop with a Synthesized Microphone.mp4
|
29.1 MB
|
Helen Maliciously Secure Coopetitive Learning for Linear Models.en.transcribed.srt
|
32.1 KB
|
Helen Maliciously Secure Coopetitive Learning for Linear Models.mp4
|
15.6 MB
|
How Well Do My Results Generalize Comparing Security and Privacy Survey Results from....en.transcribed.srt
|
35.6 KB
|
How Well Do My Results Generalize Comparing Security and Privacy Survey Results from....mp4
|
24.0 MB
|
IEEE S&P 2019 - 40th Celebration Plenary Session Panel Reflections on four decades of the symposium.en.transcribed.srt
|
108.4 KB
|
IEEE S&P 2019 - 40th Celebration Plenary Session Panel Reflections on four decades of the symposium.mp4
|
54.1 MB
|
IEEE S&P 2019 - Awards Ceremony.en.transcribed.srt
|
10.3 KB
|
IEEE S&P 2019 - Awards Ceremony.mp4
|
4.9 MB
|
IEEE S&P 2019 - Opening Remarks - General Chair.en.transcribed.srt
|
20.7 KB
|
IEEE S&P 2019 - Opening Remarks - General Chair.mp4
|
14.3 MB
|
IEEE S&P 2019 - Opening Remarks - Program Chair.en.transcribed.srt
|
29.2 KB
|
IEEE S&P 2019 - Opening Remarks - Program Chair.mp4
|
14.6 MB
|
IEEE S&P 2019 - TC Business Meeting.en.transcribed.srt
|
65.6 KB
|
IEEE S&P 2019 - TC Business Meeting.mp4
|
42.1 MB
|
If HTTPS Were Secure I wouldn't Need 2FA End User and Administrator Mental Models of HTTPS.en.transcribed.srt
|
36.5 KB
|
If HTTPS Were Secure I wouldn't Need 2FA End User and Administrator Mental Models of HTTPS.mp4
|
25.4 MB
|
Iodine Fast Dynamic Taint Tracking Using Rollback free Optimistic Hybrid Analysis.en.transcribed.srt
|
38.7 KB
|
Iodine Fast Dynamic Taint Tracking Using Rollback free Optimistic Hybrid Analysis.mp4
|
20.6 MB
|
KHyperLogLog Estimating Reidentifiability and Joinability of Large Data at Scale Pern Hui Chia.en.transcribed.srt
|
26.0 KB
|
KHyperLogLog Estimating Reidentifiability and Joinability of Large Data at Scale Pern Hui Chia.mp4
|
19.6 MB
|
Kiss from a Rogue Evaluating Detectability of Pay-at-the-Pump Card Skimmers.en.transcribed.srt
|
35.9 KB
|
Kiss from a Rogue Evaluating Detectability of Pay-at-the-Pump Card Skimmers.mp4
|
11.1 MB
|
LBM A Security Framework for Peripherals within the Linux Kernel.en.transcribed.srt
|
34.5 KB
|
LBM A Security Framework for Peripherals within the Linux Kernel.mp4
|
28.8 MB
|
Lay Down the Common Metrics Evaluating Proof of Work Consensus Protocols' Security.en.transcribed.srt
|
29.6 KB
|
Lay Down the Common Metrics Evaluating Proof of Work Consensus Protocols' Security.mp4
|
21.3 MB
|
Learning to Reconstruct Statistical Learning Theory and Encrypted Database Attacks.mp4
|
24.1 MB
|
Measuring and Analyzing Search Engine Poisoning of Linguistic Collisions.en.transcribed.srt
|
31.5 KB
|
Measuring and Analyzing Search Engine Poisoning of Linguistic Collisions.mp4
|
17.2 MB
|
NEUZZ Efficient Fuzzing with Neural Program Smoothing.en.transcribed.srt
|
33.8 KB
|
NEUZZ Efficient Fuzzing with Neural Program Smoothing.mp4
|
17.6 MB
|
Neural Cleanse Identifying and Mitigating Backdoor Attacks in Neural Networks.en.transcribed.srt
|
34.7 KB
|
Neural Cleanse Identifying and Mitigating Backdoor Attacks in Neural Networks.mp4
|
2.3 MB
|
New Primitives for Actively-Secure MPC over Rings with Applications to Private Machine Learning.en.transcribed.srt
|
44.7 KB
|
New Primitives for Actively-Secure MPC over Rings with Applications to Private Machine Learning.mp4
|
25.0 MB
|
On the Feasibility of Rerouting-Based DDoS Defenses.en.transcribed.srt
|
29.7 KB
|
On the Feasibility of Rerouting-Based DDoS Defenses.mp4
|
9.6 MB
|
On the Security of Two-Round Multi-Signatures.en.transcribed.srt
|
28.4 KB
|
On the Security of Two-Round Multi-Signatures.mp4
|
17.4 MB
|
Ouroboros Crypsinous Privacy Preserving Proof of Stake.en.transcribed.srt
|
32.7 KB
|
Ouroboros Crypsinous Privacy Preserving Proof of Stake.mp4
|
19.5 MB
|
PERUN Virtual Payment Hubs over Cryptographic Currencies.en.transcribed.srt
|
35.6 KB
|
PERUN Virtual Payment Hubs over Cryptographic Currencies.mp4
|
10.4 MB
|
PhishFarm A Scalable Framework for Measuring the Effectivness of Evasion Techniques Against....en.transcribed.srt
|
41.4 KB
|
PhishFarm A Scalable Framework for Measuring the Effectivness of Evasion Techniques Against....mp4
|
21.8 MB
|
Port Contention for Fun and Profit.en.transcribed.srt
|
30.6 KB
|
Port Contention for Fun and Profit.mp4
|
9.9 MB
|
Postcards from the Post HTTP World Amplification of HTTPS Vulnerabilities in the Web Ecosystem.en.transcribed.srt
|
38.0 KB
|
Postcards from the Post HTTP World Amplification of HTTPS Vulnerabilities in the Web Ecosystem.mp4
|
25.8 MB
|
PrivKV Key Value Data Collection with Local Differential Privacy.en.transcribed.srt
|
21.3 KB
|
PrivKV Key Value Data Collection with Local Differential Privacy.mp4
|
17.5 MB
|
ProFuzzer On-the-fly Input Type Probing for Better Zero-day Vulnerability Discovery.en.transcribed.srt
|
29.5 KB
|
ProFuzzer On-the-fly Input Type Probing for Better Zero-day Vulnerability Discovery.mp4
|
19.4 MB
|
Proof Of Stake Sidechains.en.transcribed.srt
|
37.9 KB
|
Proof Of Stake Sidechains.mp4
|
18.3 MB
|
RIDL Rogue In-Flight Data Load.en.transcribed.srt
|
38.2 KB
|
RIDL Rogue In-Flight Data Load.mp4
|
14.6 MB
|
Razzer Finding Kernel Race Bugs through Fuzzing.en.transcribed.srt
|
29.2 KB
|
Razzer Finding Kernel Race Bugs through Fuzzing.mp4
|
17.9 MB
|
Reasoning Analytically About Password Cracking Software Alex Liu.en.transcribed.srt
|
34.9 KB
|
Reasoning Analytically About Password Cracking Software Alex Liu.mp4
|
20.8 MB
|
Redactable Blockchain in the Permissionless Setting.en.transcribed.srt
|
33.6 KB
|
Redactable Blockchain in the Permissionless Setting.mp4
|
17.3 MB
|
Resident Evil Understanding Residential IP Proxy as a Dark Service.en.transcribed.srt
|
29.0 KB
|
Resident Evil Understanding Residential IP Proxy as a Dark Service.mp4
|
12.3 MB
|
Security of GPS INS based On-road Location Tracking Systems.en.transcribed.srt
|
30.9 KB
|
Security of GPS INS based On-road Location Tracking Systems.mp4
|
25.3 MB
|
Self-Encrypting Deception Weaknesses in the Encryption of Solid State Drives.en.transcribed.srt
|
35.3 KB
|
Self-Encrypting Deception Weaknesses in the Encryption of Solid State Drives.mp4
|
11.3 MB
|
SensorID Sensor Calibration Fingerprinting for Smartphones.en.transcribed.srt
|
32.2 KB
|
SensorID Sensor Calibration Fingerprinting for Smartphones.mp4
|
20.2 MB
|
Short Text, Large Effect Measuring the Impact of User Reviews on Android App Security & Privacy.en.transcribed.srt
|
31.0 KB
|
Short Text, Large Effect Measuring the Impact of User Reviews on Android App Security & Privacy.mp4
|
12.7 MB
|
Should I Worry A Cross Cultural Examination of Account Security Incident Response.en.transcribed.srt
|
40.4 KB
|
Should I Worry A Cross Cultural Examination of Account Security Incident Response.mp4
|
20.9 MB
|
Simple High-Level Code for Cryptographic Arithmetic -- With Proofs, Without Compromises.en.transcribed.srt
|
35.4 KB
|
Simple High-Level Code for Cryptographic Arithmetic -- With Proofs, Without Compromises.mp4
|
22.6 MB
|
SoK General Purpose Frameworks for Secure Multi-Party Computation.en.transcribed.srt
|
35.8 KB
|
SoK General Purpose Frameworks for Secure Multi-Party Computation.mp4
|
23.1 MB
|
SoK Sanitizing for Security Dokyung Song.en.transcribed.srt
|
31.8 KB
|
SoK Sanitizing for Security Dokyung Song.mp4
|
18.4 MB
|
SoK Security Evaluation of Home Based IoT Deployment.en.transcribed.srt
|
30.2 KB
|
SoK Security Evaluation of Home Based IoT Deployment.mp4
|
21.5 MB
|
SoK Shining Light on Shadow Stacks.en.transcribed.srt
|
35.9 KB
|
SoK Shining Light on Shadow Stacks.mp4
|
31.0 MB
|
SoK The Challenges Pitfalls and Perils of Using Hardware Performance Counters for Security.en.transcribed.srt
|
27.3 KB
|
SoK The Challenges Pitfalls and Perils of Using Hardware Performance Counters for Security.mp4
|
17.8 MB
|
Spectre Attacks Exploiting Speculative Execution.en.transcribed.srt
|
45.9 KB
|
Spectre Attacks Exploiting Speculative Execution.mp4
|
21.9 MB
|
Stealthy Porn Understanding Real World Adversarial Images for Illicit Online Promotion.en.transcribed.srt
|
22.5 KB
|
Stealthy Porn Understanding Real World Adversarial Images for Illicit Online Promotion.mp4
|
20.2 MB
|
Synesthesia Detecting Screen Content via Remote Acoustic Side Channels.en.transcribed.srt
|
34.7 KB
|
Synesthesia Detecting Screen Content via Remote Acoustic Side Channels.mp4
|
22.2 MB
|
Tap 'n Ghost A Compilation of Novel Attack Techniques against Smartphone Touchscreens.en.transcribed.srt
|
25.1 KB
|
Tap 'n Ghost A Compilation of Novel Attack Techniques against Smartphone Touchscreens.mp4
|
9.4 MB
|
The 9 Lives of Bleichenbachers CAT New Cache ATtacks on TLS Implementations.en.transcribed.srt
|
25.2 KB
|
The 9 Lives of Bleichenbachers CAT New Cache ATtacks on TLS Implementations.mp4
|
20.4 MB
|
The Code That Never Ran Modeling Attacks on Speculative Evaluation.en.transcribed.srt
|
30.7 KB
|
The Code That Never Ran Modeling Attacks on Speculative Evaluation.mp4
|
21.1 MB
|
Theory and Practice of Finding Eviction Sets.en.transcribed.srt
|
34.3 KB
|
Theory and Practice of Finding Eviction Sets.mp4
|
20.7 MB
|
Threshold ECDSA from ECDSA Assumptions The Multiparty Case.en.transcribed.srt
|
32.9 KB
|
Threshold ECDSA from ECDSA Assumptions The Multiparty Case.mp4
|
20.2 MB
|
Touching the Untouchables Dynamic Security Analysis of the LTE Control Plane.en.transcribed.srt
|
29.3 KB
|
Touching the Untouchables Dynamic Security Analysis of the LTE Control Plane.mp4
|
24.0 MB
|
Towards Automated Safety Vetting of PLC Code in Real World Plants Mu Zhang.en.transcribed.srt
|
33.2 KB
|
Towards Automated Safety Vetting of PLC Code in Real World Plants Mu Zhang.mp4
|
20.4 MB
|
Towards Practical Differentialy Private Convex Optimization.en.transcribed.srt
|
33.8 KB
|
Towards Practical Differentialy Private Convex Optimization.mp4
|
20.2 MB
|
True2F Backdoor resistant authentication tokens Emma Dauterman.en.transcribed.srt
|
41.5 KB
|
True2F Backdoor resistant authentication tokens Emma Dauterman.mp4
|
20.4 MB
|
Understanding the Security of ARM Debugging Features.en.transcribed.srt
|
30.6 KB
|
Understanding the Security of ARM Debugging Features.mp4
|
19.2 MB
|
Using Safety Properties to Generate Vulnerability Patches.en.transcribed.srt
|
23.0 KB
|
Using Safety Properties to Generate Vulnerability Patches.mp4
|
21.2 MB
|
Why Does Your Data Leak Uncovering the Data Leakage in Cloud from Mobile Apps.en.transcribed.srt
|
26.3 KB
|
Why Does Your Data Leak Uncovering the Data Leakage in Cloud from Mobile Apps.mp4
|
31.0 MB
|
XCLAIM Trustless Interoperable Cryptocurrency Backed Assets.en.transcribed.srt
|
37.2 KB
|
XCLAIM Trustless Interoperable Cryptocurrency Backed Assets.mp4
|
18.4 MB
|
/IEEE Security and Privacy 2020/
|
A Comparative Usability Study of FIDO2 Passwordless Authentication.mp4
|
15.0 MB
|
A Programming Framework for Differential Privacy with Accuracy Concentration Bounds.mp4
|
15.5 MB
|
A Security Analysis of the Facebook Ad Library.mp4
|
18.1 MB
|
A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network.mp4
|
18.6 MB
|
A Tale of Sea and Sky On the Security of Maritime VSAT Communications.mp4
|
17.9 MB
|
AdGraph A Graph-Based Approach to Ad and Tracker Blocking.mp4
|
17.6 MB
|
An Analysis of Pre-installed Android Software.mp4
|
21.9 MB
|
Are Anonymity-Seekers Just like Everybody Else An Analysis of Contributions to Wikipedia from Tor.mp4
|
15.3 MB
|
Are We Susceptible to Rowhammer An End-to-End Methodology for Cloud Providers.mp4
|
22.0 MB
|
Ask the Experts What Should Be on an IoT Privacy and Security Label.mp4
|
17.9 MB
|
Automated Reverse Engineering and Privacy Analysis of Modern Cars.mp4
|
18.8 MB
|
Automatic Uncovering of Hidden Behaviors from Input Validation in Mobile Apps.mp4
|
16.5 MB
|
Automatically Detecting Bystanders in Photos to Reduce Privacy Risks.mp4
|
14.6 MB
|
BIAS Bluetooth Impersonation AttackS.mp4
|
11.4 MB
|
Binsec Rel Efficient Relational Symbolic Execution for Constant-Time at Binary-Level.mp4
|
15.0 MB
|
Birds of a Feather A Hardware & Security Panel (Deprecated).mp4
|
71.4 MB
|
Birds of a Feather A Hardware & Security Panel (Updated).mp4
|
62.1 MB
|
Birds of a Feather Sharing Cybersecurity Research Artifacts To Accelerate Progress.mp4
|
69.2 MB
|
Breaking and (Partially) Fixing Provably Secure Onion Routing.mp4
|
20.0 MB
|
Browsing Unicity On the Limits of Anonymizing Web Tracking Data.mp4
|
16.1 MB
|
Can Voters Detect Malicious Manipulation of Ballot Marking Devices.mp4
|
11.3 MB
|
Combating Dependence Explosion in Forensic Analysis Using Alternative Tag Propagation Semantics.mp4
|
26.9 MB
|
Cornucopia Temporal Safety for CHERI Heaps.mp4
|
14.8 MB
|
CrypTFlow Secure TensorFlow Inference.mp4
|
15.0 MB
|
Detection of Electromagnetic Interference Attacks on Sensor Systems.mp4
|
26.4 MB
|
Dragonblood Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd.mp4
|
16.3 MB
|
Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers.mp4
|
19.2 MB
|
Enabling Rack-scale Confidential Computing Using Heterogeneous Trusted Execution Environment.mp4
|
28.6 MB
|
Establishing Economic Incentives for Security Patching of IoT Consumer Products.mp4
|
18.2 MB
|
EverCrypt A Fast, Verified, Cross-Platform Cryptographic Provider.mp4
|
16.1 MB
|
Ex-vivo Dynamic Analysis Framework for Android Device Drivers.mp4
|
16.6 MB
|
Flaw Label Exploiting IPv6 Flow Label.mp4
|
17.8 MB
|
FlyClient Super-Light Clients for Cryptocurrencies.mp4
|
16.0 MB
|
Formal Modelling and Proof in the CHERI Design and Implementation Process.mp4
|
14.2 MB
|
Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability.mp4
|
27.0 MB
|
Full-band De-anonymization of Bluetooth Classic Devices.mp4
|
26.1 MB
|
Fuzzing JavaScript Engines with Aspect-Preserving Mutation.mp4
|
15.9 MB
|
Gesture Authentication for Smartphones Evaluation of Gesture Password Selection Policies.mp4
|
17.1 MB
|
High Precision Open-World Website Fingerprinting.mp4
|
16.3 MB
|
Hijacking Transient Execution through Microarchitectural Load Value Injection..mp4
|
22.4 MB
|
HopSkipJumpAttack A Query-Efficient Decision-Based Attack.mp4
|
16.8 MB
|
How Not to Prove Your Election Outcome.mp4
|
15.8 MB
|
Humpty Dumpty Controlling Word Meanings via Corpus Poisoning.mp4
|
17.1 MB
|
HydRand Efficient Continuous Distributed Randomness.mp4
|
23.6 MB
|
ICAS An Extensible Framework for Estimating the Susceptibility of IC Layouts to Additive Trojans.mp4
|
29.8 MB
|
ICLab A Global, Longitudinal Internet Censorship Measurement Platform.mp4
|
20.3 MB
|
IJON Exploring Deep State Spaces via Fuzzing.mp4
|
15.4 MB
|
Influencing Photo Sharing Decisions on Social Media A Case of Paradoxical Findings.mp4
|
16.1 MB
|
Intriguing Properties of Adversarial ML Attacks in the Problem Space.mp4
|
24.0 MB
|
JIT Leaks Inducing Timing Side Channels through Just-In-Time Compilation.mp4
|
25.2 MB
|
KARONTE Detecting Insecure Multi-binary Interactions in Embedded Firmware.mp4
|
21.1 MB
|
Kobold Evaluating Decentralized Access Control for Remote NSXPC Methods on iOS.mp4
|
21.7 MB
|
Krace Data Race Fuzzing for Kernel File Systems.mp4
|
27.4 MB
|
Leveraging EM Side-Channel Information to Detect Rowhammer Attacks.mp4
|
20.1 MB
|
MarkUs Drop-in Use-After-Free Prevention for Low-Level Languages.mp4
|
26.9 MB
|
Measuring Legal Compliance of Banners from IAB Europe's Transparancy and Consent Framework.mp4
|
19.9 MB
|
Meddling Middlemen Empirical Analysis of the Risks of Data-Saving Mobile Browsers.mp4
|
14.8 MB
|
Message Time of Arrival Codes A Fundamental Primitive for Secure Distance Measurement.mp4
|
16.8 MB
|
NetCAT Practical Cache Attacks from the Network.mp4
|
19.0 MB
|
Neutaint Efficient Dynamic Taint Analysis with Neural Networks.mp4
|
15.9 MB
|
OAT Attesting Operation Integrity of Embedded Devices.mp4
|
14.6 MB
|
OHIE Blockchain Scaling Made Simple.mp4
|
18.2 MB
|
PMP Cost-Effective Forced Execution with Probabilistic Memory Pre-planning.mp4
|
15.3 MB
|
Pangolin Incremental Hybrid Fuzzing with Polyhedral Path Abstraction.mp4
|
15.3 MB
|
Path Oblivious Heap Optimal and Practical Oblivious Priority Queue.mp4
|
27.7 MB
|
Plundervolt Software-Based Fault Injection Attacks against Intel SGX.mp4
|
15.5 MB
|
Private Resource Allocators and Their Applications.mp4
|
17.1 MB
|
Pseudorandom Black Swans Cache Attacks on CTR_DRBG.mp4
|
22.2 MB
|
RAMBleed Reading Bits in Memory without Accessing Them.mp4
|
17.8 MB
|
Replicated State Machines without Replicated Execution.mp4
|
14.6 MB
|
RetroWrite Statically Instrumenting COTS Binaries for Fuzzing and Sanitization.mp4
|
13.2 MB
|
SAVIOR Towards Bug-Driven Hybrid Testing.mp4
|
18.9 MB
|
SEIMI Efficient and Secure SMAP-Enabled Intra-process Memory Isolation.mp4
|
20.0 MB
|
SEVurity No Security Without Integrity - Breaking Integrity.mp4
|
18.7 MB
|
SPECCFI Mitigating Spectre Attacks Using CFI Informed Speculation.mp4
|
17.4 MB
|
SPECTECTOR Principled Detection of Speculative Information Flows.mp4
|
17.3 MB
|
SPIDER Enabling Fast Patch Propagation in Related Software Repositories.mp4
|
21.5 MB
|
SSP 2020 Opening Remarks.mp4
|
167.8 MB
|
Semantic Understanding of Smart Contracts Executable Operational Semantics of Solidity.mp4
|
20.6 MB
|
SoK A Minimalist Approach to Formalizing Analog Sensor Security.mp4
|
24.0 MB
|
SoK Cyber Insurance - Technical Challenges and a System Security Roadmap.mp4
|
15.5 MB
|
SoK Differential Privacy as a Causal Property.mp4
|
14.5 MB
|
SoK Understanding the Prevailing Security Vulnerabilities in TrustZone-Assisted TEE Systems.mp4
|
15.2 MB
|
Sync HotStuff Simple and Practical Synchronous State Machine Replication.mp4
|
14.0 MB
|
TARDIS Rolling Back the Clock on CMS-Targeting Cyber Attacks.mp4
|
26.1 MB
|
TRRespass Exploiting the Many Sides of Target Row Refresh.mp4
|
15.6 MB
|
Tactical Provenance Analysis our Endpoint Detection and Response Systems.mp4
|
15.3 MB
|
TextExerciser Feedback-Driven Text Input Exercising for Android Applications.mp4
|
24.2 MB
|
The Last Mile High-Assurance and High-Speed Cryptographic Implementations.mp4
|
25.3 MB
|
The Many Kinds of Creepware Used for Interpersonal Attacks.mp4
|
20.0 MB
|
The State of the Uniform Attacks on Encrypted Databases beyond the Uniform Query Distribution.mp4
|
18.9 MB
|
The Value of Collaboration in Convex Machine Learning with Differential Privacy.mp4
|
21.7 MB
|
This PIN Can Be Easily Guessed Analyzing the Security of Smartphone Unlock PINs.mp4
|
14.1 MB
|
Throwing Darts in the Dark Detecting Bots with Limited Data using Neural Data Augmentation.mp4
|
17.6 MB
|
Towards Effective Differential Privacy Comms for Users' Data Sharing Decision and Comprehension.mp4
|
23.7 MB
|
Towards Scalable Threshold Cryptosystems.mp4
|
11.8 MB
|
Towards a Natural Perspective of Smart Homes for Practical Security and Safety Analyses.mp4
|
25.6 MB
|
Transparent Polynomial Delegation and Its Applications to Zero Knowledge Proof.mp4
|
20.5 MB
|
Transys Leveraging Common Security Properties across Hardware Designs.mp4
|
17.0 MB
|
Understanding and Mitigating Security Risks of General Messaging Protocols on IoT Clouds.mp4
|
14.6 MB
|
Unexpected Data Dependency Creation and Chaining A New Attack to SDN.mp4
|
17.8 MB
|
VerX Safety Verification of Smart Contracts.mp4
|
15.7 MB
|
VeriSmart A Highly Precise Safety Verifier for Ethereum Smart Contracts.mp4
|
15.0 MB
|
WaveSpy Remote and Through-wall Screen Attack via mmWave Sensing.mp4
|
21.0 MB
|
ZEXE Enabling Decentralized Private Computation.mp4
|
16.0 MB
|
xMP Selective Memory Protection for Kernel and User Space.mp4
|
18.8 MB
|
/
|
IEEE Security and Privacy thank you.txt
|
1.0 KB
|
IEEE logo.jpg
|
8.5 KB
|
Total files 730
|