/
|
Enigma logo.jpg
|
4.1 KB
|
USENIX Enigma thank you.txt
|
1.4 KB
|
/Enigma 2016/
|
Enigma 2016 Conference Program USENIX.htm
|
285.1 KB
|
Enigma 2016 Conference.htm
|
94.8 KB
|
Enigma 2018 Conference Program USENIX.htm
|
288.2 KB
|
/.../Enigma 2016 Conference Program USENIX_files/
|
analytics.js
|
45.2 KB
|
application-pdf.png
|
0.3 KB
|
armageddon_elle_100x115.jpg
|
14.6 KB
|
brown_benjamin_100x115.jpg
|
13.4 KB
|
budington_bill_100x115.jpg
|
13.4 KB
|
bursztein_elie_100x115.jpg
|
12.0 KB
|
css_bNQhEiSGvhP4uYPPsVZxRFY91MGD9EliUfdDiA1wvhE.css
|
11.3 KB
|
css_i6PnPuJ7c202RyOYbwWLKOktmSWuZfXTE69vUNEoVr4.css
|
185.8 KB
|
css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css
|
3.8 KB
|
css_xE-rWrJf-fncB6ztZfd2huxqgxu4WO-qwma6Xer30m4.css
|
7.6 KB
|
debeauvoir_dana_100x115.png
|
22.6 KB
|
eckersley_peter_100x115.jpg
|
11.1 KB
|
enigma-logo.png
|
32.4 KB
|
equal_respect_white_150x68.png
|
4.1 KB
|
equal_respect_white_180x60.png
|
4.8 KB
|
facebook.png
|
1.3 KB
|
freeman_david_100x115.jpg
|
9.6 KB
|
fu_kevin_100x115.jpg
|
9.9 KB
|
galperin_eva_100x115_update.jpg
|
16.2 KB
|
genovese_vito_100x115.jpg
|
10.3 KB
|
google-plus.png
|
0.4 KB
|
halderman_alex_100x115.jpg
|
9.7 KB
|
hawkes_ben_100x115.jpg
|
8.0 KB
|
heiderich_mario_100x115.png
|
27.3 KB
|
hotz_george_100x115.png
|
23.6 KB
|
joyce_rob_100x115.png
|
24.2 KB
|
js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js
|
20.5 KB
|
js_DxnG51urgJDX4OTVcQBu1okYvVzFssi84PpdeKo__nE.js
|
196.2 KB
|
js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js
|
120.3 KB
|
js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js
|
26.8 KB
|
js_x3e8S2TUtiV35IQmEHMfmTgE8FOPXcOKLcvEo83wyXk.js
|
18.2 KB
|
kohno_tadayoshi_100x115.jpg
|
11.3 KB
|
majkowski_marek_100x115.jpg
|
12.9 KB
|
marquis-boire_morgan_100x115.png
|
22.0 KB
|
mccoy_damon_100x115.jpg
|
11.1 KB
|
nighswander_tyler_100x115.png
|
13.6 KB
|
oberheide_jon_100x115.jpg
|
8.0 KB
|
payne_bryan_100x115.jpg
|
9.9 KB
|
peterson_zachary_100x115.jpg
|
10.6 KB
|
porter-felt_adrienne_100x115.jpg
|
12.1 KB
|
reed_teddy_100x115.jpg
|
8.5 KB
|
rivest_ron_100x115.png
|
22.4 KB
|
rozier_eric_v2_100x115.jpg
|
10.6 KB
|
rubin_avi_100x115.jpg
|
13.7 KB
|
savage_stephan_100x115.jpg
|
11.2 KB
|
serebryany_kostya_new_100x115.jpg
|
11.8 KB
|
slides_16.png
|
1.3 KB
|
smith_matthew_100x115.png
|
21.7 KB
|
stepanovich_amie_100x115.jpg
|
14.1 KB
|
sullivan_nick_100x115.jpg
|
10.6 KB
|
teague_vanessa_100x115.png
|
25.2 KB
|
twitter.png
|
1.6 KB
|
usenix-locked.png
|
1.4 KB
|
video_16.png
|
1.4 KB
|
vigna_giovanni_100x115.jpg
|
11.5 KB
|
weaver_nicholas_100x115.jpg
|
9.3 KB
|
wurster_glenn_100x115.jpg
|
8.9 KB
|
youtube.png
|
2.5 KB
|
zhu_yan_100x115.png
|
16.1 KB
|
/.../Enigma 2016 Conference_files/
|
alex_stamos.jpg
|
49.6 KB
|
analytics.js
|
45.2 KB
|
bob_lord.jpg
|
305.2 KB
|
boneh.png
|
56.8 KB
|
brumley.png
|
68.3 KB
|
bursztein.png
|
47.0 KB
|
css_i6PnPuJ7c202RyOYbwWLKOktmSWuZfXTE69vUNEoVr4.css
|
185.8 KB
|
css_mQd1YeVeFsJde7YU6LYIcXa_7QlmB58IygdmcoSTjPA.css
|
8.6 KB
|
css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css
|
3.8 KB
|
css_xE-rWrJf-fncB6ztZfd2huxqgxu4WO-qwma6Xer30m4.css
|
7.6 KB
|
dan_boneh.jpg
|
37.5 KB
|
darktrace_logo_white_225x63.png
|
2.7 KB
|
darktrace_logo_white_300x84.png
|
11.0 KB
|
david_brumley.jpg
|
25.0 KB
|
duo.png
|
3.9 KB
|
duo_security_150x125.png
|
3.8 KB
|
eff.png
|
5.8 KB
|
elie_bursztein.jpeg
|
42.5 KB
|
enigma-logo.png
|
32.4 KB
|
enigma_logo_700x253.png
|
10.7 KB
|
equal_respect_white_150x68.png
|
4.1 KB
|
equal_respect_white_180x60.png
|
4.8 KB
|
facebook.png
|
1.3 KB
|
facebook_2016_white_225x79.png
|
4.3 KB
|
felt_porter_adrienne_square.png
|
129.8 KB
|
goldman_sachs.png
|
4.9 KB
|
goldman_sachs_225x99.png
|
3.6 KB
|
google-plus.png
|
0.4 KB
|
google.png
|
14.6 KB
|
grPkXG0gn3w.htm
|
75.6 KB
|
js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js
|
20.5 KB
|
js_DxnG51urgJDX4OTVcQBu1okYvVzFssi84PpdeKo__nE.js
|
196.2 KB
|
js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js
|
120.3 KB
|
js_PACmgStbFksqYzX-HlEqBZWNu18Gac4c9Dc2EzyjEsM.js
|
8.3 KB
|
js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js
|
26.8 KB
|
js_zsU7pE_En9PuEzx00IjN_iCxIwgABAiEwJNkh1iTG9k.js
|
8.2 KB
|
linkedin.png
|
4.5 KB
|
lord.png
|
55.9 KB
|
mccoy_damon_square.png
|
88.4 KB
|
moss.png
|
52.5 KB
|
niels_provos.jpg
|
208.1 KB
|
parisa_tabriz.jpg
|
7.2 MB
|
paxton.png
|
58.9 KB
|
payne_bryan_square.png
|
74.7 KB
|
provos.png
|
72.0 KB
|
salesforce_enigma_sponsor_200x71.png
|
1.8 KB
|
salesforce_enigma_sponsor_300x213.png
|
5.6 KB
|
savage.png
|
51.8 KB
|
stamos.png
|
51.8 KB
|
stefan_savage.jpg
|
38.9 KB
|
tabriz.png
|
45.3 KB
|
twitter.png
|
1.6 KB
|
usenix.png
|
17.5 KB
|
vern_paxson.jpg
|
28.3 KB
|
youtube.png
|
2.5 KB
|
/.../Enigma 2016 Conference_files/grPkXG0gn3w_data/
|
base.js
|
1.3 MB
|
embed.js
|
24.6 KB
|
remote.js
|
89.8 KB
|
www-embed-player.js
|
120.0 KB
|
www-player-webp.css
|
282.6 KB
|
/.../Enigma 2016 Presentations/
|
A Million Hit Points and Infinite Charisma How Games Can Fix Computer Security Education - enigma_slides_peterson.pdf
|
62.5 MB
|
Building a Competitive Hacking Team - enigma_slides_nighswander.pdf
|
18.6 MB
|
Building a DDoS Mitigation Pipeline - enigma_slides_majkowski.pdf
|
2.4 MB
|
Bullet-Proof Credit Card Processing - enigma_slides_mccoy.pdf
|
8.8 MB
|
Capture the Flag An Owner’s Manual - enigma16_slides_genovese.pdf
|
6.1 MB
|
Computer Security and the Internet of Things - enigma16_slides_kohno.pdf
|
1.1 MB
|
Data Integrity Based Attacks in Investigative Domains - enigma_slides_rozier.pdf
|
54.6 MB
|
Dolla Dolla Bill Yall Cybercrime Cashouts - enigma_slides_brown.pdf
|
6.4 MB
|
Drops for Stuff An Analysis of Reshipping Mule Scams - enigma_slides_vigna.pdf
|
19.8 MB
|
enigma16_slides_armageddon.pdf
|
1.4 MB
|
enigma16_slides_debeauvoir.pdf
|
5.8 MB
|
enigma16_slides_freeman.pdf
|
15.5 MB
|
enigma16_slides_genovese.pdf
|
6.1 MB
|
enigma16_slides_halderman.pdf
|
7.9 MB
|
enigma16_slides_heiderich.pdf
|
134.1 KB
|
enigma16_slides_kohno.pdf
|
1.1 MB
|
enigma16_slides_savage.pdf
|
21.9 MB
|
enigma16_slides_stepanovich.pdf
|
6.8 MB
|
enigma16_slides_weaver.pdf
|
3.8 MB
|
enigma_2016_slides_rivest.pdf
|
65.4 KB
|
enigma_slides_brown.pdf
|
6.4 MB
|
enigma_slides_felt.pdf
|
1.6 MB
|
enigma_slides_fu.pdf
|
32.0 MB
|
enigma_slides_galperin.pdf
|
8.3 MB
|
enigma_slides_hawkes.pdf
|
86.1 KB
|
enigma_slides_joyce.pdf
|
1.1 MB
|
enigma_slides_majkowski.pdf
|
2.4 MB
|
enigma_slides_mccoy.pdf
|
8.8 MB
|
enigma_slides_nighswander.pdf
|
18.6 MB
|
enigma_slides_oberheide.pdf
|
3.5 MB
|
enigma_slides_payne.pdf
|
6.4 MB
|
enigma_slides_peterson.pdf
|
62.5 MB
|
enigma_slides_rozier.pdf
|
54.6 MB
|
enigma_slides_serebryany.pdf
|
365.6 KB
|
enigma_slides_smith.pdf
|
6.6 MB
|
enigma_slides_sullivan.pdf
|
3.0 MB
|
enigma_slides_teague.pdf
|
2.0 MB
|
enigma_slides_vigna.pdf
|
19.8 MB
|
enigma_slides_wurster.pdf
|
1.8 MB
|
enigma_slides_zhu-yan.pdf
|
3.6 MB
|
From Concept to Deployment-The Life (and Death) of Security Features - enigma_slides_wurster.pdf
|
1.8 MB
|
Hacking Health Security in Healthcare IT Systems - rubin.enigma.pdf
|
7.4 MB
|
Internet Voting What Could Go Wrong - enigma16_slides_halderman.pdf
|
7.9 MB
|
Keys Under Doormats Mandating Insecurity by Requiring Government Access to All Data and Communications - enigma_2016_slides_rivest.pdf
|
65.4 KB
|
Medical Device Security - enigma_slides_fu.pdf
|
32.0 MB
|
Modern Automotive Vulnerabilities Causes, Disclosures, and Outcomes - enigma16_slides_savage.pdf
|
21.9 MB
|
PKI at Scale Using Short-lived Certificates - enigma_slides_payne.pdf
|
6.4 MB
|
Protecting High Risk Users - enigma_slides_galperin.pdf
|
8.3 MB
|
rubin.enigma.pdf
|
7.4 MB
|
Sanitize, Fuzz, and Harden Your Cpp Code - enigma_slides_serebryany.pdf
|
365.6 KB
|
Security and Usability from the Frontlines of Enterprise IT - enigma_slides_oberheide.pdf
|
3.5 MB
|
Server-side Second Factors A Statistical Approach to Measuring User Authenticity - enigma16_slides_freeman.pdf
|
15.5 MB
|
Several Horror Stories about the Encrypted Web - enigma_slides_zhu-yan.pdf
|
3.6 MB
|
Social Media Self-Defense A Guide to Stopping Stalkers - enigma16_slides_armageddon.pdf
|
1.4 MB
|
The Global Conversation on Encryption - enigma16_slides_stepanovich.pdf
|
6.8 MB
|
The Golden Age of Bulk Surveillance - enigma16_slides_weaver.pdf
|
3.8 MB
|
ToStaticHTML for Everyone! About DOMPurify, Security in the DOM, and Why We Really Need Both - enigma16_slides_heiderich.pdf
|
134.1 KB
|
Trust Beyond the First Hop-What Really Happens to Data Sent to HTTPS Websites - enigma_slides_sullivan.pdf
|
3.0 MB
|
Usable Security-The Source Awakens - enigma_slides_smith.pdf
|
6.6 MB
|
Verification, Auditing, and Evidence If We Didn’t Notice Anything Wrong, Is the Election Outcome Right - enigma_slides_teague.pdf
|
2.0 MB
|
We Need Something Better-Building STAR Vote - enigma16_slides_debeauvoir.pdf
|
5.8 MB
|
What Makes Software Exploitation Hard - enigma_slides_hawkes.pdf
|
86.1 KB
|
Why Is Usable Security Hard, and What Should We Do about It - enigma_slides_felt.pdf
|
1.6 MB
|
/.../Enigma 2016 Videos/
|
A Million Hit Points and Infinite Charisma - How Games Can Fix.mp4
|
40.0 MB
|
A Million Hit Points and Infinite Charisma - How Games Can Fix.srt
|
37.6 KB
|
Building a Competitive Hacking Team.mp4
|
41.7 MB
|
Building a Competitive Hacking Team.srt
|
44.4 KB
|
Building a DDoS Mitigation Pipeline.mp4
|
30.6 MB
|
Building a DDoS Mitigation Pipeline.srt
|
39.1 KB
|
Bullet-Proof Credit Card Processing.mp4
|
40.1 MB
|
Bullet-Proof Credit Card Processing.srt
|
45.0 KB
|
Capture the Flag - An Owner s Manual.srt
|
40.7 KB
|
Capture the Flag - An Owner's Manual.mp4
|
44.3 MB
|
Computer Security and the Internet of Things.mp4
|
36.4 MB
|
Computer Security and the Internet of Things.srt
|
40.5 KB
|
Data Integrity Based Attacks in Investigative Domains.mp4
|
39.0 MB
|
Data Integrity Based Attacks in Investigative Domains.srt
|
42.1 KB
|
David Freeman of LinkedIn on His Enigma Conference Talk.mp4
|
2.5 MB
|
David Freeman of LinkedIn on His Enigma Conference Talk.srt
|
1.4 KB
|
Defending, Detecting, and Responding to Hardware and Firmware Attacks.mp4
|
47.8 MB
|
Defending, Detecting, and Responding to Hardware and Firmware Attacks.srt
|
46.9 KB
|
Dolla Dolla Bill Y all - Cybercrime Cashouts.mp4
|
49.9 MB
|
Dolla Dolla Bill Y all - Cybercrime Cashouts.srt
|
43.7 KB
|
Drops for Stuff - An Analysis of Reshipping Mule Scams.mp4
|
49.8 MB
|
Drops for Stuff - An Analysis of Reshipping Mule Scams.srt
|
35.1 KB
|
Elie Bursztein of Google Previews His Enigma Talk.mp4
|
2.0 MB
|
Elie Bursztein of Google Previews His Enigma Talk.srt
|
1.3 KB
|
Enigma Conference Speaker Nicholas Weaver Discusses His Talk.mp4
|
2.7 MB
|
Enigma Conference Speaker Nicholas Weaver Discusses His Talk.srt
|
1.3 KB
|
Eva Galperin of the EFF on Her Enigma Conference Talk.mp4
|
2.2 MB
|
Eva Galperin of the EFF on Her Enigma Conference Talk.srt
|
1.6 KB
|
From Concept to Deployment - the Life (and Death) of Security Features.mp4
|
36.9 MB
|
From Concept to Deployment - the Life (and Death) of Security Features.srt
|
32.5 KB
|
Hacking Health - Security in Healthcare IT Systems.mp4
|
42.6 MB
|
Hacking Health - Security in Healthcare IT Systems.srt
|
43.0 KB
|
Internet Voting - What Could Go Wrong.mp4
|
41.2 MB
|
Internet Voting - What Could Go Wrong.srt
|
38.6 KB
|
Keys Under Doormats - Mandating Insecurity.mp4
|
47.4 MB
|
Keys Under Doormats - Mandating Insecurity.srt
|
42.4 KB
|
Lessons Learned While Protecting Gmail.mp4
|
55.5 MB
|
Lessons Learned While Protecting Gmail.srt
|
52.9 KB
|
Medical Device Security.mp4
|
40.0 MB
|
Medical Device Security.srt
|
40.2 KB
|
Modern Automotive Security - History, Disclosure, and Consequences.mp4
|
40.4 MB
|
Modern Automotive Security - History, Disclosure, and Consequences.srt
|
46.6 KB
|
NSA TAO Chief on Disrupting Nation State Hackers.mp4
|
84.5 MB
|
NSA TAO Chief on Disrupting Nation State Hackers.srt
|
58.5 KB
|
Opening Video.mp4
|
3.8 MB
|
Panopticlick - Fingerprinting Your Web Presence.mp4
|
70.6 MB
|
Panopticlick - Fingerprinting Your Web Presence.srt
|
37.6 KB
|
PKI at Scale Using Short-lived Certificates.mp4
|
35.8 MB
|
PKI at Scale Using Short-lived Certificates.srt
|
45.0 KB
|
Protecting High Risk Users.mp4
|
63.1 MB
|
Protecting High Risk Users.srt
|
54.8 KB
|
Sanitize, Fuzz, and Harden Your C Code.mp4
|
38.3 MB
|
Sanitize, Fuzz, and Harden Your C Code.srt
|
30.2 KB
|
Security and Usability from the Frontlines of Enterprise IT.mp4
|
53.8 MB
|
Security and Usability from the Frontlines of Enterprise IT.srt
|
49.5 KB
|
Server-side Second Factors.mp4
|
35.7 MB
|
Server-side Second Factors.srt
|
33.1 KB
|
Several Horror Stories about the Encrypted Web.mp4
|
36.0 MB
|
Several Horror Stories about the Encrypted Web.srt
|
45.7 KB
|
Social Media Self-Defense - A Guide to Stopping Stalkers.mp4
|
32.8 MB
|
Social Media Self-Defense - A Guide to Stopping Stalkers.srt
|
32.2 KB
|
The Global Conversation on Encryption.mp4
|
46.8 MB
|
The Global Conversation on Encryption.srt
|
38.9 KB
|
The Golden Age of Bulk Surveillance.mp4
|
36.5 MB
|
The Golden Age of Bulk Surveillance.srt
|
34.2 KB
|
Timeless Debugging.mp4
|
47.3 MB
|
Timeless Debugging.srt
|
37.5 KB
|
ToStaticHTML for Everyone About DOMPurify.mp4
|
43.2 MB
|
ToStaticHTML for Everyone About DOMPurify.srt
|
42.8 KB
|
Trailer.mp4
|
1.6 MB
|
Trust Beyond the First Hop - What Really Happens to Data Sent to HTTPS Websites.mp4
|
43.8 MB
|
Trust Beyond the First Hop-What Really Happens to Data Sent to HTTPS Websites.srt
|
32.8 KB
|
Usable Security - The Source Awakens.mp4
|
35.6 MB
|
Usable Security-The Source Awakens.srt
|
28.3 KB
|
USENIX Enigma 2016 - A Million Hit Points and Infinite Charisma - How Games Can Fix.mp4
|
39.4 MB
|
Verification, Auditing, and Evidence - If We Did Not Notice Anything Wrong.mp4
|
44.9 MB
|
Verification, Auditing, and Evidence - If We Did Not Notice Anything Wrong.srt
|
39.3 KB
|
We Need Something Better-Building STAR Vote.mp4
|
46.4 MB
|
We Need Something Better-Building STAR Vote.srt
|
30.4 KB
|
What Makes Software Exploitation Hard.mp4
|
52.7 MB
|
What Makes Software Exploitation Hard.srt
|
37.2 KB
|
Why Enigma.mp4
|
4.5 MB
|
Why Enigma.srt
|
2.9 KB
|
Why Is Usable Security Hard, and What Should We Do about it.mp4
|
43.7 MB
|
Why Is Usable Security Hard, and What Should We Do about it.srt
|
38.0 KB
|
/.../Enigma 2018 Conference Program USENIX_files/
|
albert_kendra_100x115.png
|
24.5 KB
|
analytics.js
|
45.2 KB
|
application-pdf.png
|
0.3 KB
|
brumley_david_100x115.png
|
22.2 KB
|
clark_rob_100x115.png
|
26.9 KB
|
conti_greg_100x115.png
|
23.3 KB
|
corman_joshua_100x115.png
|
20.2 KB
|
css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css
|
4.3 KB
|
css_jNv4bKwKVm14QrWp-RXFaphgrRAr9CiwgzqfcTWh-HA.css
|
132.0 KB
|
css_mMMIpDBXDqo0rCZrN7FoMlBPY0tKvHCE04XYURHXl9M.css
|
610.1 KB
|
css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css
|
3.8 KB
|
css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css
|
5.4 KB
|
das_sauvik_100x115.png
|
21.8 KB
|
derr_erik_100x115.png
|
18.1 KB
|
elazari_amit_100x115.png
|
24.4 KB
|
ellis_casey_100x115.png
|
27.1 KB
|
enigma-logo_red_tm_2000x733.png
|
3.4 KB
|
font-awesome.css
|
26.7 KB
|
gebhart_gennie_100x115.png
|
24.6 KB
|
gill_phillippa_100x115.png
|
22.3 KB
|
grant_andy_100x115.png
|
22.5 KB
|
hildebrandt_melody_100x115.png
|
24.6 KB
|
howard_jeremy_100x115.png
|
27.9 KB
|
janca_tanya_100x115.png
|
24.7 KB
|
jiang_carrie_100x115.png
|
22.7 KB
|
js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js
|
20.5 KB
|
js_AQDKCRqaqaAAAzbvxcaEQBooKEQA-dFTfff7tzCklI8.js
|
14.0 KB
|
js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js
|
120.3 KB
|
js_fjSBcoQiz2s5JFYU7Z0v2w3fhgZkax8CZA1Fi71bsVc.js
|
15.9 KB
|
js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js
|
26.8 KB
|
js_zsU7pE_En9PuEzx00IjN_iCxIwgABAiEwJNkh1iTG9k.js
|
8.2 KB
|
leblanc_travis_100x115.png
|
20.0 KB
|
lietz_shannon_100x115.png
|
21.5 KB
|
marczak_bill_100x115.png
|
24.4 KB
|
maurer_tim_100x115.png
|
15.8 KB
|
mccardle_rob_100x115.png
|
22.4 KB
|
mcpeak_travis_100x115.png
|
24.4 KB
|
mcreynolds_emily_100x115.png
|
20.4 KB
|
milka_grzegorz_100x115.png
|
28.1 KB
|
narayanan_arvind_100x115.png
|
23.2 KB
|
near_joe_100x115.png
|
20.7 KB
|
ryan_lilly_100x115.png
|
29.1 KB
|
sedova-masha_100x115.png
|
25.6 KB
|
slides.svg
|
0.7 KB
|
sullivan_nick_100x115.png
|
25.1 KB
|
truppi_jason_100x115.png
|
22.2 KB
|
usenix-locked.png
|
1.4 KB
|
valeriano_brandon_100x115.png
|
21.5 KB
|
varia_mayank_100x115.png
|
22.3 KB
|
vehent_julian_100x115.png
|
22.6 KB
|
video.svg
|
0.8 KB
|
vigna_giovanni_100x115.png
|
21.7 KB
|
waller_paul_100x115.png
|
20.3 KB
|
weis_steve_100x115.png
|
18.9 KB
|
woodruff_allison_100x115.png
|
26.2 KB
|
wright_charles_100x115.png
|
23.8 KB
|
zimmer_bryan_100x115.png
|
24.6 KB
|
/Enigma 2017/
|
Enigma 2017 Conference Program USENIX.htm
|
299.7 KB
|
Enigma 2017 Conference.htm
|
350.8 KB
|
/.../Enigma 2017 Conference Program USENIX_files/
|
adida_ben_100x115.jpg
|
11.4 KB
|
analytics.js
|
45.2 KB
|
application-pdf.png
|
0.3 KB
|
blum_manuel_sunglasses_100x115.jpg
|
17.6 KB
|
booher_timothy_100x115.jpg
|
14.3 KB
|
conley_chris_100x115.jpg
|
13.9 KB
|
consolvo_sunny_100x115.png
|
20.1 KB
|
cranor_lorrie-faith_100x115.jpg
|
13.3 KB
|
css_bNQhEiSGvhP4uYPPsVZxRFY91MGD9EliUfdDiA1wvhE.css
|
11.3 KB
|
css_qddWIqgagc9fbrOg019WVayQvwbVYpj-jNfZJGkj3l8.css
|
188.9 KB
|
css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css
|
3.8 KB
|
css_xE-rWrJf-fncB6ztZfd2huxqgxu4WO-qwma6Xer30m4.css
|
7.6 KB
|
dumitras_tudor_100x115.jpg
|
13.3 KB
|
enigma-logo.png
|
32.4 KB
|
equal_respect_white_150x68.png
|
4.1 KB
|
evans_david_100x115.jpg
|
12.1 KB
|
facebook.png
|
1.3 KB
|
gleicher_nathaniel_100x115.jpg
|
11.2 KB
|
google-plus.png
|
0.4 KB
|
haken_ian_100x115.jpg
|
12.3 KB
|
irazoqui_gorka_100x115.jpg
|
13.4 KB
|
js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js
|
20.5 KB
|
js_DxnG51urgJDX4OTVcQBu1okYvVzFssi84PpdeKo__nE.js
|
196.2 KB
|
js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js
|
120.3 KB
|
js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js
|
26.8 KB
|
js_x3e8S2TUtiV35IQmEHMfmTgE8FOPXcOKLcvEo83wyXk.js
|
18.2 KB
|
karmarkar_uma_100x115.jpg
|
13.4 KB
|
kenneally_erin_100x115.jpg
|
13.7 KB
|
kim_yongdae_100x115.jpg
|
11.6 KB
|
launchbury_john_100x115.jpg
|
10.5 KB
|
levy_ian_100x115_0.jpg
|
12.7 KB
|
limbago_andrea_100x115_0.jpg
|
12.5 KB
|
lowenthal_tom_100x115.png
|
28.5 KB
|
mahjoub_dhia_100x115.jpg
|
10.6 KB
|
marosi_attila_100x115.jpg
|
12.9 KB
|
menscher_damian_100x115.png
|
22.9 KB
|
molnar_david_100x115.png
|
23.6 KB
|
nagliari_jack_100x115.jpg
|
13.1 KB
|
oliveira_daniela_100x115_0.jpg
|
13.7 KB
|
papernot_nicolas_100x115.jpg
|
12.8 KB
|
roesner_franziska_100x115.jpg
|
12.4 KB
|
schechter_emily_100x115.jpg
|
11.8 KB
|
slides_16.png
|
1.3 KB
|
sugarman_eli_100x115.jpg
|
14.1 KB
|
thrift_hudson_100x115.png
|
21.1 KB
|
tsiskaridze_nestan_100x115.jpg
|
15.4 KB
|
tufekci_zeynep_100x115.jpg
|
15.4 KB
|
twitter.png
|
1.6 KB
|
usenix-locked.png
|
1.4 KB
|
vance_anthony_100x115.jpg
|
12.5 KB
|
vehent_julien_100x115_0.jpg
|
12.9 KB
|
video_16.png
|
1.4 KB
|
wiswell_lisa_100x115.jpg
|
13.2 KB
|
youtube.png
|
2.5 KB
|
/.../Enigma 2017 Conference_files/
|
1m-9n624Lhw.htm
|
75.4 KB
|
analytics.js
|
45.2 KB
|
blum_manuel_300.jpg
|
135.4 KB
|
brumley.png
|
68.3 KB
|
css_mQd1YeVeFsJde7YU6LYIcXa_7QlmB58IygdmcoSTjPA.css
|
8.6 KB
|
css_qddWIqgagc9fbrOg019WVayQvwbVYpj-jNfZJGkj3l8.css
|
188.9 KB
|
css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css
|
3.8 KB
|
css_xE-rWrJf-fncB6ztZfd2huxqgxu4WO-qwma6Xer30m4.css
|
7.6 KB
|
david_brumley.jpg
|
25.0 KB
|
enigma-logo.png
|
32.4 KB
|
enigma-logo_red_tm_800x384.png
|
17.6 KB
|
enigma_highlights.jpg
|
68.8 KB
|
enigma_sign_up_black_left.png
|
140.4 KB
|
equal_respect_white_150x68.png
|
4.1 KB
|
facebook.png
|
1.3 KB
|
google-plus.png
|
0.4 KB
|
js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js
|
20.5 KB
|
js_DxnG51urgJDX4OTVcQBu1okYvVzFssi84PpdeKo__nE.js
|
196.2 KB
|
js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js
|
120.3 KB
|
js_PACmgStbFksqYzX-HlEqBZWNu18Gac4c9Dc2EzyjEsM.js
|
8.3 KB
|
js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js
|
26.8 KB
|
js_zsU7pE_En9PuEzx00IjN_iCxIwgABAiEwJNkh1iTG9k.js
|
8.2 KB
|
parisa_tabriz.jpg
|
7.2 MB
|
payne.png
|
34.0 KB
|
roesner.png
|
42.7 KB
|
schechter_emily_close_300.png
|
199.7 KB
|
tabriz.png
|
45.3 KB
|
tufekci_zeynep_300x300.jpg
|
138.8 KB
|
twitter.png
|
1.6 KB
|
youtube.png
|
2.5 KB
|
yubico_enigma_200x80.png
|
4.0 KB
|
yubico_enigma_400x110.png
|
6.8 KB
|
/.../1m-9n624Lhw_data/
|
base.js
|
1.3 MB
|
embed.js
|
24.6 KB
|
remote.js
|
89.8 KB
|
www-embed-player.js
|
120.0 KB
|
www-player-webp.css
|
282.6 KB
|
/.../Enigma 2017 Presentations/
|
Adversarial Examples in Machine Learning - enigma17_slides_papernot.pdf
|
2.8 MB
|
Brains Can Be Hacked. Why Should You Care - enigma_slides_bonaci.pdf
|
6.7 MB
|
Classifiers under Attack - enigma17_slides_evans.pdf
|
24.1 MB
|
Deviation from the Norms The Necessity and Challenges of a Norms-based Approach to Digital Offense - enigma_slides_limbago.pdf
|
10.3 MB
|
Drawing the Foul Operation of a DDoS Honeypot - enigma17_slides_menscher.pdf
|
1.6 MB
|
FeatureSmith Learning to Detect Malware by Mining the Security Literature - enigma17_slides_dumitras.pdf
|
4.0 MB
|
Ghost in the Machine Challenges in Embedded Binary Security - enigma_slides_wetzels.pdf
|
4.7 MB
|
Hacking Sensors - enigma17_slides_kim.pdf
|
14.7 MB
|
How WhatsApp Reduced Spam while Launching End-to-End Encryption - enigma17_slides_jones.pdf
|
2.0 MB
|
Inside MOAR TLS How We Think about Encouraging External HTTPS Adoption on the Web - enigma_slides_schechter.pdf
|
1.3 MB
|
IoT a Cybercriminal Paradise - enigma17_slides_marosi.pdf
|
9.8 MB
|
LLC Cache Attacks Applicability and Countermeasures - enigma17_slides_irazoqui.pdf
|
1.9 MB
|
Publishable Humanly Usable Secure Password Creation Schemas, Manuel Blum and Santosh Vempala.pdf
|
320.1 KB
|
Putting Privacy Notices to the Test - enigma17_slides_cranor.pdf
|
4.9 MB
|
Secrets at Scale Automated Bootstrapping of Secrets & Identity in the Cloud Slides - enigma_haken_slides.pdf
|
1.5 MB
|
Security for Vulnerable Populations-On the Interplay of Weapons of Influence and Life Domains - enigma2017_slides_oliveira.pdf
|
4.4 MB
|
Startups plus Industry How Everyone Can Win - enigma17_slides_thrift.pdf
|
525.4 KB
|
StreamAlert A Serverless Real-time Intrusion Detection Engine - enigma17_slides_naglieri.pdf
|
4.7 MB
|
Test Driven Security in Continuous Integration - enigma17_slides_vehent.pdf
|
2.7 MB
|
The Paper Ballot Is Not Enough - enigma17_slides_adida.pdf
|
2.8 MB
|
Understanding and Designing for End User Security Expectations - enigma17_slides_roesner.pdf
|
15.6 MB
|
What Cybersecurity Can Learn from the Secret Service - enigma17_slides_gleicher.pdf
|
19.4 MB
|
What Does the Brain Tell Us about Usable Security - enigma_slides_vance.pdf
|
23.8 MB
|
Why Philanthropy Is Critical for Cybersecurity - enigma_slides_sugarman.pdf
|
3.0 MB
|
/.../Enigma 2017 Videos/
|
Adversarial Examples in Machine Learning.mp4
|
20.9 MB
|
As We May Code.mp4
|
24.7 MB
|
Behaviors and Patterns of Bulletproof and Anonymous Hosting Providers.mp4
|
22.9 MB
|
Beyond Warm & Fuzzy Ethics as a Value Prop.mp4
|
30.6 MB
|
Brains Can Be Hacked. Why Should You Care.mp4
|
23.1 MB
|
Classifiers under Attack.mp4
|
18.4 MB
|
Cyber Security A DARPA Perspective.mp4
|
28.5 MB
|
Deviation from the Norms The Necessity and Challenges.mp4
|
28.6 MB
|
Drawing the Foul Operation of a DDoS Honeypot.mp4
|
22.4 MB
|
FeatureSmith Learning to Detect Malware by Mining the Security Literature.mp4
|
22.8 MB
|
Ghost in the Machine Challenges in Embedded Binary Security.mp4
|
21.8 MB
|
Green Sprouts Encouraging Signs of Life from the Department of.mp4
|
37.1 MB
|
Hacking Sensors.mp4
|
24.0 MB
|
How WhatsApp Reduced Spam while Launching End-to-End Encryption.mp4
|
22.8 MB
|
Human Computation with an Application to Passwords.mp4
|
26.5 MB
|
Inside MOAR TLS - How We Think about Encouraging External.mp4
|
30.0 MB
|
IoT, a Cybercriminals Paradise.mp4
|
19.3 MB
|
Legislative Engineering Design Privacy Laws, don't Just Draft Them.mp4
|
26.5 MB
|
Leveraging the Power of Automated Reasoning in.mp4
|
32.6 MB
|
LLC Cache Attacks Applicability and Countermeasures.mp4
|
19.7 MB
|
Moving Account Recovery beyond Email and the Secret Question.mp4
|
28.8 MB
|
National Scale Cyber Security.mp4
|
30.9 MB
|
Neural and Behavioral Insights on Trust.mp4
|
25.6 MB
|
Putting Privacy Notices to the Test.mp4
|
25.1 MB
|
Secrets at Scale Automated Bootstrapping of Secrets & Identity in the Cloud.mp4
|
19.2 MB
|
Security for Vulnerable Populations - On the Interplay of.mp4
|
28.9 MB
|
Security in the Wild for Low-Profile Activists.mp4
|
37.7 MB
|
Startups - Industry How Everyone Can Win.mp4
|
34.3 MB
|
StreamAlert A Serverless, Real-time Intrusion Detection Engine.mp4
|
17.2 MB
|
Test Driven Security in Continuous Integration.mp4
|
25.6 MB
|
The Paper Ballot Is Not Enough.mp4
|
27.0 MB
|
Understanding and Designing for End Users Security Expectations.mp4
|
27.2 MB
|
Understanding and Securing DoD Weapon Systems.mp4
|
21.1 MB
|
What Cybersecurity Can Learn from the Secret Service.mp4
|
26.3 MB
|
What Does the Brain Tell Us about Usable Security.mp4
|
20.5 MB
|
Why Philanthropy Is Critical for Cybersecurity.mp4
|
33.0 MB
|
Wont Somebody Please Think of the Journalists.mp4
|
26.4 MB
|
/Enigma 2018/
|
Enigma 2018 Conference Program USENIX.htm
|
288.2 KB
|
Enigma 2018 USENIX.htm
|
98.9 KB
|
/.../Enigma 2018 Conference Program USENIX_files/
|
albert_kendra_100x115.png
|
24.5 KB
|
analytics.js
|
45.2 KB
|
application-pdf.png
|
0.3 KB
|
brumley_david_100x115.png
|
22.2 KB
|
clark_rob_100x115.png
|
26.9 KB
|
conti_greg_100x115.png
|
23.3 KB
|
corman_joshua_100x115.png
|
20.2 KB
|
css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css
|
4.3 KB
|
css_jNv4bKwKVm14QrWp-RXFaphgrRAr9CiwgzqfcTWh-HA.css
|
132.0 KB
|
css_mMMIpDBXDqo0rCZrN7FoMlBPY0tKvHCE04XYURHXl9M.css
|
610.1 KB
|
css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css
|
3.8 KB
|
css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css
|
5.4 KB
|
das_sauvik_100x115.png
|
21.8 KB
|
derr_erik_100x115.png
|
18.1 KB
|
elazari_amit_100x115.png
|
24.4 KB
|
ellis_casey_100x115.png
|
27.1 KB
|
enigma-logo_red_tm_2000x733.png
|
3.4 KB
|
font-awesome.css
|
26.7 KB
|
gebhart_gennie_100x115.png
|
24.6 KB
|
gill_phillippa_100x115.png
|
22.3 KB
|
grant_andy_100x115.png
|
22.5 KB
|
hildebrandt_melody_100x115.png
|
24.6 KB
|
howard_jeremy_100x115.png
|
27.9 KB
|
janca_tanya_100x115.png
|
24.7 KB
|
jiang_carrie_100x115.png
|
22.7 KB
|
js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js
|
20.5 KB
|
js_AQDKCRqaqaAAAzbvxcaEQBooKEQA-dFTfff7tzCklI8.js
|
14.0 KB
|
js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js
|
120.3 KB
|
js_fjSBcoQiz2s5JFYU7Z0v2w3fhgZkax8CZA1Fi71bsVc.js
|
15.9 KB
|
js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js
|
26.8 KB
|
js_zsU7pE_En9PuEzx00IjN_iCxIwgABAiEwJNkh1iTG9k.js
|
8.2 KB
|
leblanc_travis_100x115.png
|
20.0 KB
|
lietz_shannon_100x115.png
|
21.5 KB
|
marczak_bill_100x115.png
|
24.4 KB
|
maurer_tim_100x115.png
|
15.8 KB
|
mccardle_rob_100x115.png
|
22.4 KB
|
mcpeak_travis_100x115.png
|
24.4 KB
|
mcreynolds_emily_100x115.png
|
20.4 KB
|
milka_grzegorz_100x115.png
|
28.1 KB
|
narayanan_arvind_100x115.png
|
23.2 KB
|
near_joe_100x115.png
|
20.7 KB
|
ryan_lilly_100x115.png
|
29.1 KB
|
sedova-masha_100x115.png
|
25.6 KB
|
slides.svg
|
0.7 KB
|
sullivan_nick_100x115.png
|
25.1 KB
|
truppi_jason_100x115.png
|
22.2 KB
|
usenix-locked.png
|
1.4 KB
|
valeriano_brandon_100x115.png
|
21.5 KB
|
varia_mayank_100x115.png
|
22.3 KB
|
vehent_julian_100x115.png
|
22.6 KB
|
video.svg
|
0.8 KB
|
vigna_giovanni_100x115.png
|
21.7 KB
|
waller_paul_100x115.png
|
20.3 KB
|
weis_steve_100x115.png
|
18.9 KB
|
woodruff_allison_100x115.png
|
26.2 KB
|
wright_charles_100x115.png
|
23.8 KB
|
zimmer_bryan_100x115.png
|
24.6 KB
|
/.../Enigma 2018 Presentations/
|
Anatomy of Account Takeover - enigma18_milka.pdf
|
4.8 MB
|
Being Creative, Securely - enigma18_hildebrandt.pdf
|
2.6 MB
|
Bits & Bytes, Flesh & Blood and Saving Real Lives via Clinical Simulations - enigma18_slides_corman.pdf
|
14.2 MB
|
Compliance is not Security (Except When It Might Be) - enigma18_clark.pdf
|
5.7 MB
|
Crypto Crumple Zones Protecting Encryption in a Time of Political Uncertainty - enigma18_wright.pdf
|
23.9 MB
|
Cryptographically Secure Data Analysis for Social Good - enigma18_slides_varia.pdf
|
19.8 MB
|
Cyber Strategy The Evolving Nature of Cyber Power and Coercion - enigma18_valeriano.pdf
|
31.0 MB
|
Emerging Cryptography - enigma18_weis.pdf
|
5.0 MB
|
Gig Work and the Digital Security Divide - enigma18_albert.pdf
|
33.3 MB
|
Going Nuclear Programmatic Protections against Extreme Vetting, Social Pressures, and Coercion - enigma18_marie.pdf
|
5.0 MB
|
Insecurity in Information Technology - enigma18_slides_janca.pdf
|
9.4 MB
|
Least Privilege Security Gain without Developer Pain - enigma18_mcpeak.pdf
|
8.3 MB
|
LISA A Practical Zero Trust Architecture - enigma18_zimmer_0.pdf
|
8.5 MB
|
Privacy at Instagram - enigma18_slides_jiang.pdf
|
7.2 MB
|
Protecting Financial Stability against Cyber Threats Proposal for an International Agreement - enigma18_maurer_0.pdf
|
10.2 MB
|
Protecting Firefox Data with Content Signatures - enigma18_vehent.pdf
|
593.5 KB
|
Social Cybersecurity Reshaping Security through an Empirical Understanding of Human Social Behavior - enigma18_das.pdf
|
7.1 MB
|
Some Thoughts on Deep Learning and Infosec - enigma18_slides_howard.pdf
|
25.1 MB
|
Surfing the Motivation Wave to Create Security Behavior Change - enigma18_sedova.pdf
|
3.5 MB
|
The Great Cryptographic Divide - enigma18_truppi.pdf
|
7.1 MB
|
The Impact of Third-party Code on Android App Security - enigma18_derr.pdf
|
2.0 MB
|
The Web Tracking Arms Race Past, Present, and Future - enigma18_narayanan.pdf
|
874.1 KB
|
We Gave You This Internet, Now Play by Our Rules - enigma18_slides_gebhart.pdf
|
4.3 MB
|
What Would You Do With a Nation-State Cyber Army - enigma18_conti_0.pdf
|
26.1 MB
|
When Malware is Packing Heat - enigma18_vigna.pdf
|
6.4 MB
|
/.../Enigma 2018 USENIX_files/
|
analytics.js
|
45.2 KB
|
bluecat_300x120.png
|
6.7 KB
|
coinbase_300x120.png
|
4.0 KB
|
css_mMMIpDBXDqo0rCZrN7FoMlBPY0tKvHCE04XYURHXl9M.css
|
610.1 KB
|
css_Tvyih1Dm489siBROXzFSkKUCFbsEK9kCr0p3JDiev80.css
|
129.3 KB
|
css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css
|
3.8 KB
|
css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css
|
5.4 KB
|
css_Zsye0BYLWwrWJtw3lsEyOEQfxzw_w30Qw0yKf0mDea0.css
|
7.7 KB
|
dropbox_300x120_0.png
|
4.7 KB
|
duo_horizontal_300x120.png
|
2.4 KB
|
elazari_amit_carousel.png
|
138.4 KB
|
enigma-logo_red_tm_2000x733.png
|
3.4 KB
|
enigma_conference_banner.png
|
241.7 KB
|
equal_respect_300x120.png
|
2.9 KB
|
facebook_2016_300x120_3.png
|
3.9 KB
|
font-awesome.css
|
26.7 KB
|
google_600x240_0.png
|
6.7 KB
|
hildebrandt_melody_carousel.png
|
146.3 KB
|
js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js
|
20.5 KB
|
js_4Mo-xkyNBoebVcNI-pI_dJ8NV9WVtkRJYbf2cgSYcDA.js
|
40.2 KB
|
js_AQDKCRqaqaAAAzbvxcaEQBooKEQA-dFTfff7tzCklI8.js
|
14.0 KB
|
js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js
|
120.3 KB
|
js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js
|
26.8 KB
|
js_zsU7pE_En9PuEzx00IjN_iCxIwgABAiEwJNkh1iTG9k.js
|
8.2 KB
|
leblanc_travis_carousel.png
|
91.2 KB
|
mapbox_300x120.png
|
4.7 KB
|
milka_grzegorz_300x300.png
|
162.7 KB
|
netflix_300x120_1.png
|
2.8 KB
|
patternex_300x120.png
|
4.4 KB
|
payne_bryan_200.jpg
|
9.9 KB
|
roesner_franziska_200.jpg
|
11.4 KB
|
santa_clara_map_slice_01.jpg
|
32.1 KB
|
santa_clara_map_slice_02.jpg
|
78.8 KB
|
shopify_300x120_0.png
|
5.9 KB
|
sullivan_nick_300x300.png
|
150.1 KB
|
usenix_logo_300x150_neat_2.png
|
15.0 KB
|
vigna_giovanni_300x300.png
|
122.6 KB
|
weis_steve_carousel.png
|
95.3 KB
|
wisp_300x120.png
|
7.1 KB
|
/.../Enigma 2018 Videos/
|
Anatomy of Account Takeover.eng.srt
|
43.6 KB
|
Anatomy of Account Takeover.mp4
|
14.1 MB
|
Being Creative, Securely.eng.srt
|
60.5 KB
|
Being Creative, Securely.mp4
|
26.8 MB
|
Bits & Bytes, Flesh & Blood, and Saving Real Lives via Clinical Simulations.eng.srt
|
65.7 KB
|
Bits & Bytes, Flesh & Blood, and Saving Real Lives via Clinical Simulations.mp4
|
32.0 MB
|
Combining the Power of Builders and Breakers.eng.srt
|
61.4 KB
|
Combining the Power of Builders and Breakers.mp4
|
26.9 MB
|
Compliance = Security (Except When It Might Be).eng.srt
|
65.1 KB
|
Compliance = Security (Except When It Might Be).mp4
|
22.0 MB
|
Crypto Crumple Zones - Protecting Encryption in a Time of Political Uncertain'ty.eng.srt
|
66.2 KB
|
Crypto Crumple Zones - Protecting Encryption in a Time of Political Uncertain'ty.mp4
|
19.6 MB
|
Cryptographically Secure Data Analysis for Social Good.eng.srt
|
71.9 KB
|
Cryptographically Secure Data Analysis for Social Good.mp4
|
30.4 MB
|
Cyber Strategy - The Evolving Nature of Cyber Power and Coercion.eng.srt
|
52.6 KB
|
Cyber Strategy - The Evolving Nature of Cyber Power and Coercion.mp4
|
28.3 MB
|
Developing a Science of Internet Censorship Resistance - Opportunities and.eng.srt
|
54.5 KB
|
Developing a Science of Internet Censorship Resistance - Opportunities and.mp4
|
17.1 MB
|
Differential Privacy at Scale - Uber and Berkeley Collaboration.eng.srt
|
69.0 KB
|
Differential Privacy at Scale - Uber and Berkeley Collaboration.mp4
|
17.7 MB
|
Emerging Cryptography.eng.srt
|
57.6 KB
|
Emerging Cryptography.mp4
|
21.9 MB
|
Gig Work and the Digital Security Divide.eng.srt
|
58.2 KB
|
Gig Work and the Digital Security Divide.mp4
|
19.5 MB
|
Going Nuclear - Programmatic Protections against.eng.srt
|
63.4 KB
|
Going Nuclear - Programmatic Protections against.mp4
|
26.6 MB
|
Hacking the Law - Are Bug Bounties a True Safe Harbor.eng.srt
|
52.5 KB
|
Hacking the Law - Are Bug Bounties a True Safe Harbor.mp4
|
31.3 MB
|
Hats off to DevSecOps.eng.srt
|
66.9 KB
|
Hats off to DevSecOps.mp4
|
30.5 MB
|
Insecurity in Information Technology.eng.srt
|
55.2 KB
|
Insecurity in Information Technology.mp4
|
27.5 MB
|
IoE, Connecting Regulation to Risk.eng.srt
|
63.8 KB
|
IoE, Connecting Regulation to Risk.mp4
|
29.7 MB
|
Least Privilege - Security Gain without Developer Pain.eng.srt
|
52.3 KB
|
Least Privilege - Security Gain without Developer Pain.mp4
|
19.8 MB
|
LISA - A Practical Zero Trust Architecture.eng.srt
|
69.9 KB
|
LISA - A Practical Zero Trust Architecture.mp4
|
20.6 MB
|
Modern Mind Control - Public Opinion Manipulation in Our Online World.eng.srt
|
67.4 KB
|
Modern Mind Control - Public Opinion Manipulation in Our Online World.mp4
|
29.1 MB
|
Privacy @ Instagram.eng.srt
|
41.7 KB
|
Privacy @ Instagram.mp4
|
12.7 MB
|
Protecting Financial Stability against Cyber.eng.srt
|
68.4 KB
|
Protecting Financial Stability against Cyber.mp4
|
20.0 MB
|
Protecting Firefox Data with Content Signatures.eng.srt
|
55.5 KB
|
Protecting Firefox Data with Content Signatures.mp4
|
16.1 MB
|
Rage against the Ghost in the Machine.eng.srt
|
58.7 KB
|
Rage against the Ghost in the Machine.mp4
|
29.0 MB
|
Security Technology Adoption Building Hardware Is Just the Start.eng.srt
|
46.2 KB
|
Security Technology Adoption Building Hardware Is Just the Start.mp4
|
18.1 MB
|
Social Cybersecurity - Reshaping Security.eng.srt
|
60.8 KB
|
Social Cybersecurity - Reshaping Security.mp4
|
21.3 MB
|
Some Thoughts on Deep Learning and Infosec.eng.srt
|
56.1 KB
|
Some Thoughts on Deep Learning and Infosec.mp4
|
20.5 MB
|
Stranger Things - Who’s Listening When the Device Is Always On.eng.srt
|
51.0 KB
|
Stranger Things - Who’s Listening When the Device Is Always On.mp4
|
25.1 MB
|
Surfing the Motivation Wave to Create Security Behavior Change.eng.srt
|
63.6 KB
|
Surfing the Motivation Wave to Create Security Behavior Change.mp4
|
23.1 MB
|
The Evolving Architecture of the Web and Its Impact on Security.eng.srt
|
41.1 KB
|
The Evolving Architecture of the Web and Its Impact on Security.mp4
|
14.1 MB
|
The Future of Cyber-Autonomy.eng.srt
|
66.2 KB
|
The Future of Cyber-Autonomy.mp4
|
27.1 MB
|
The Great Cryptographic Divide.eng.srt
|
64.3 KB
|
The Great Cryptographic Divide.mp4
|
50.2 MB
|
The Impact of Third-party Code on Android App Security.eng.srt
|
48.7 KB
|
The Impact of Third-party Code on Android App Security.mp4
|
14.4 MB
|
The Web Tracking Arms Race - Past, Present, and Future.eng.srt
|
72.3 KB
|
The Web Tracking Arms Race - Past, Present, and Future.mp4
|
25.9 MB
|
We Gave You This Internet, Now Play by Our Rules.eng.srt
|
64.0 KB
|
We Gave You This Internet, Now Play by Our Rules.mp4
|
25.0 MB
|
What Would You Do With a Nation-State Cyber Army.eng.srt
|
53.6 KB
|
What Would You Do With a Nation-State Cyber Army.mp4
|
21.8 MB
|
When Malware is Packin’ Heat.mp4
|
24.4 MB
|
/Enigma 2019/
|
Enigma 2019 Conference Program USENIX.htm
|
270.3 KB
|
Enigma 2019 Grid.htm
|
124.4 KB
|
Enigma 2019 USENIX.htm
|
103.7 KB
|
/.../Enigma 2019 Conference Program USENIX_files/
|
adida_ben_2018_200x230.png
|
23.4 KB
|
afroz_sadia_200x230.jpg
|
14.0 KB
|
analytics.js
|
45.2 KB
|
anderson_jennifer_200x230.jpg
|
12.1 KB
|
application-pdf.png
|
0.3 KB
|
borgolte_kevin_200x230.jpg
|
7.7 KB
|
bursztein_elie_200x230_1.jpg
|
11.3 KB
|
cavallaro_lorenzo_200x230.jpg
|
11.4 KB
|
css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css
|
4.3 KB
|
css_jNv4bKwKVm14QrWp-RXFaphgrRAr9CiwgzqfcTWh-HA.css
|
132.0 KB
|
css_mMMIpDBXDqo0rCZrN7FoMlBPY0tKvHCE04XYURHXl9M.css
|
610.1 KB
|
css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css
|
3.8 KB
|
css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css
|
5.4 KB
|
dharamshi_tejas_200x230.jpg
|
15.7 KB
|
dixon-denelle_200x230.jpg
|
10.9 KB
|
doerfler_periwinkle_200x230.jpg
|
16.4 KB
|
dumitras_tudor_200x230.jpg
|
13.1 KB
|
egelman_serge_200x230.jpg
|
10.4 KB
|
enigma-logo_red_tm_2000x733.png
|
3.4 KB
|
font-awesome.css
|
26.7 KB
|
gaddam_ajit_100x115.jpg
|
12.2 KB
|
grattafiori_aaron_200x230.jpg
|
13.5 KB
|
js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js
|
20.5 KB
|
js_AQDKCRqaqaAAAzbvxcaEQBooKEQA-dFTfff7tzCklI8.js
|
14.0 KB
|
js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js
|
120.3 KB
|
js_fjSBcoQiz2s5JFYU7Z0v2w3fhgZkax8CZA1Fi71bsVc.js
|
15.9 KB
|
js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js
|
26.8 KB
|
js_zsU7pE_En9PuEzx00IjN_iCxIwgABAiEwJNkh1iTG9k.js
|
8.2 KB
|
lackey_ryan_200x230.jpg
|
10.4 KB
|
limbago_andrea_200x230.jpg
|
15.5 KB
|
livshits_ben_200x230.jpg
|
16.9 KB
|
lord_bob_200x230.jpg
|
10.1 KB
|
loveless_mark_200x230.jpg
|
10.9 KB
|
lusthaus_jonathan_200x230.jpg
|
12.3 KB
|
mayrhofer_rene_200x230.jpg
|
9.7 KB
|
nikolich_anita_200x230.jpg
|
10.0 KB
|
oliveira_daniela_200x230.jpg
|
13.8 KB
|
rajan_anjana_200x230.jpg
|
17.1 KB
|
runga_neha_200x230.jpg
|
13.4 KB
|
slides.svg
|
0.7 KB
|
smeets_max_200x230.jpg
|
12.0 KB
|
smolen_alex_200x230.jpg
|
9.4 KB
|
snyder_peter_200x230.jpg
|
12.5 KB
|
soltani_ashkan_200x230.jpg
|
12.5 KB
|
stark_emily_200x230.jpg
|
12.8 KB
|
sturton_cynthia_200x230.jpg
|
12.5 KB
|
usenix-locked.png
|
1.4 KB
|
video.svg
|
0.8 KB
|
walther_puri_munish_200x230.jpg
|
12.4 KB
|
weaver_nicholas_200x230.jpg
|
12.1 KB
|
white_andrew_200x230.jpg
|
12.9 KB
|
zappala_daniel_200x230.jpg
|
13.0 KB
|
/.../Enigma 2019 Grid_files/
|
app-apple.svg
|
7.9 KB
|
app-google.svg
|
4.5 KB
|
bootstrap-custom.css
|
94.0 KB
|
custom-screen.css
|
0.3 KB
|
jquery.js
|
97.2 KB
|
jquery_002.js
|
2.6 KB
|
jquery_003.js
|
96.4 KB
|
jquery_004.js
|
38.3 KB
|
loading-3x.gif
|
13.3 KB
|
main-current.css
|
135.9 KB
|
main.js
|
73.7 KB
|
responsive.css
|
6.4 KB
|
/.../Enigma 2019 Presentations/
|
Building Identity for an Open Perimeter - enigma2019_slides_dharamshi.pdf
|
80.2 MB
|
Grey Science - enigma2019_slides_nikolich.pdf
|
731.9 KB
|
Hardware Security Modules The Ultimate Black Boxes - enigma2019_slides_lackey.pdf
|
7.2 MB
|
/.../Enigma 2019 USENIX_files/
|
adida_ben_2018_200x230.png
|
23.4 KB
|
amazon_600x240_4.png
|
4.7 KB
|
analytics.js
|
45.2 KB
|
aspentechhub_600x240.png
|
4.3 KB
|
cavallaro_lorenzo_300.jpg
|
15.5 KB
|
css_mMMIpDBXDqo0rCZrN7FoMlBPY0tKvHCE04XYURHXl9M.css
|
610.1 KB
|
css_Tvyih1Dm489siBROXzFSkKUCFbsEK9kCr0p3JDiev80.css
|
129.3 KB
|
css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css
|
3.8 KB
|
css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css
|
5.4 KB
|
css_Zsye0BYLWwrWJtw3lsEyOEQfxzw_w30Qw0yKf0mDea0.css
|
7.7 KB
|
dixon_denelle_300.jpg
|
19.3 KB
|
dropbox_2018_600x240_2.png
|
3.3 KB
|
eff_2018_red_600x240_1.png
|
1.6 KB
|
enigma-logo_red_tm_2000x733.png
|
3.4 KB
|
enigma2019_conference_banner_700_1.png
|
65.1 KB
|
enigma2019_neat_map_left.png
|
266.3 KB
|
facebook_600x240_1.png
|
3.7 KB
|
font-awesome.css
|
26.7 KB
|
google_600x240_0.png
|
6.7 KB
|
js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js
|
20.5 KB
|
js_4Mo-xkyNBoebVcNI-pI_dJ8NV9WVtkRJYbf2cgSYcDA.js
|
40.2 KB
|
js_AQDKCRqaqaAAAzbvxcaEQBooKEQA-dFTfff7tzCklI8.js
|
14.0 KB
|
js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js
|
120.3 KB
|
js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js
|
26.8 KB
|
js_zsU7pE_En9PuEzx00IjN_iCxIwgABAiEwJNkh1iTG9k.js
|
8.2 KB
|
kaspersky_lab_600x240.png
|
4.2 KB
|
lord_bob_300.jpg
|
14.7 KB
|
microsoft-logo_600x240.png
|
3.2 KB
|
netflix_600x240_0.png
|
2.9 KB
|
nikolich_anita_300.jpg
|
16.1 KB
|
oliveira_daniela_300.jpg
|
22.9 KB
|
roesner_franziska_200.jpg
|
11.4 KB
|
shopify_600x240.png
|
5.3 KB
|
soltani_ashkan_300.jpg
|
18.5 KB
|
stark_emily_300.jpg
|
19.4 KB
|
stripe_600x240.png
|
3.5 KB
|
tanium_600x240.png
|
2.3 KB
|
uber_600x240.png
|
3.7 KB
|
usenix_logo_300x150_neat_2.png
|
15.0 KB
|
/.../Enigma 2019 Videos/
|
Abusability Testing - Considering the Ways Your Technology Might Be Used.eng.srt
|
64.9 KB
|
Abusability Testing - Considering the Ways Your Technology Might Be Used.mp4
|
22.9 MB
|
Building a Secure Data Market on Blockchain.eng.srt
|
72.9 KB
|
Building a Secure Data Market on Blockchain.mp4
|
28.3 MB
|
Building Identity for an Open Perimeter.eng.srt
|
55.0 KB
|
Building Identity for an Open Perimeter.mp4
|
21.8 MB
|
Callisto - A Cryptographic Approach to #MeToo.eng.srt
|
56.0 KB
|
Callisto - A Cryptographic Approach to #MeToo.mp4
|
16.9 MB
|
Convincing the Loser - Securing Elections against Modern Threats.eng.srt
|
61.9 KB
|
Convincing the Loser - Securing Elections against Modern Threats.mp4
|
22.0 MB
|
Countering Adversarial Cyber Campaigns.eng.srt
|
50.3 KB
|
Countering Adversarial Cyber Campaigns.mp4
|
20.3 MB
|
Cryptocurrency - Burn It with Fire.eng.srt
|
53.5 KB
|
Cryptocurrency - Burn It with Fire.mp4
|
26.0 MB
|
Digital Authoritarianism, Data Protection, and the Battle.eng.srt
|
81.7 KB
|
Digital Authoritarianism, Data Protection, and the Battle.mp4
|
24.0 MB
|
Grey Science.eng.srt
|
60.4 KB
|
Grey Science.mp4
|
17.5 MB
|
Hardware Is the New Software - Finding Exploitable Bugs in Hardware Designs.eng.srt
|
60.8 KB
|
Hardware Is the New Software - Finding Exploitable Bugs in Hardware Designs.mp4
|
15.4 MB
|
Hardware Security Modules - The Ultimate Black Boxes.eng.srt
|
72.7 KB
|
Hardware Security Modules - The Ultimate Black Boxes.mp4
|
18.5 MB
|
How to Predict Which Vulnerabilities Will Be Exploited.eng.srt
|
51.3 KB
|
How to Predict Which Vulnerabilities Will Be Exploited.mp4
|
23.2 MB
|
If Red Teaming Is Easy - You're Doing It Wrong.eng.srt
|
52.1 KB
|
If Red Teaming Is Easy - You're Doing It Wrong.mp4
|
22.0 MB
|
Insider Attack Resistance in the Android Ecosystem.eng.srt
|
60.5 KB
|
Insider Attack Resistance in the Android Ecosystem.mp4
|
17.4 MB
|
It's Not - Our - Data - Do We Want to Create a World of No Surprises.eng.srt
|
60.0 KB
|
It's Not - Our - Data - Do We Want to Create a World of No Surprises.mp4
|
22.3 MB
|
Learning from the Dark Web Dimension of Data.eng.srt
|
51.7 KB
|
Learning from the Dark Web Dimension of Data.mp4
|
21.8 MB
|
Mobile App Privacy Analysis at Scale.eng.srt
|
68.2 KB
|
Mobile App Privacy Analysis at Scale.mp4
|
22.6 MB
|
Moving Fast and Breaking Things - Security Misconfigurations.eng.srt
|
61.5 KB
|
Moving Fast and Breaking Things - Security Misconfigurations.mp4
|
18.4 MB
|
Mr. Lord Goes to Washington, or Applying Security outside the Tech World.eng.srt
|
67.1 KB
|
Mr. Lord Goes to Washington, or Applying Security outside the Tech World.mp4
|
21.9 MB
|
Next Steps For Browser Privacy - Pursuing Privacy Protections Beyond Extensions.eng.srt
|
58.5 KB
|
Next Steps For Browser Privacy - Pursuing Privacy Protections Beyond Extensions.mp4
|
17.2 MB
|
Physical OPSEC as a Metaphor for Infosec.eng.srt
|
53.6 KB
|
Physical OPSEC as a Metaphor for Infosec.mp4
|
17.6 MB
|
Privacy Engineering - Not Just for Privacy Engineers.eng.srt
|
38.6 KB
|
Privacy Engineering - Not Just for Privacy Engineers.mp4
|
14.4 MB
|
Provable Security at AWS.eng.srt
|
51.5 KB
|
Provable Security at AWS.mp4
|
18.6 MB
|
Rethinking the Detection of Child Sexual Abuse Imagery on the Internet.eng.srt
|
45.3 KB
|
Rethinking the Detection of Child Sexual Abuse Imagery on the Internet.mp4
|
18.3 MB
|
Something You Have and Someone You Know-Designing for Interpersonal Security.eng.srt
|
60.2 KB
|
Something You Have and Someone You Know-Designing for Interpersonal Security.mp4
|
22.1 MB
|
Stethoscope - Securely Configuring Devices without Systems Management.eng.srt
|
56.3 KB
|
Stethoscope - Securely Configuring Devices without Systems Management.mp4
|
17.0 MB
|
The Kids Aren't Alright-Security and Privacy in the K-12 Classroom.eng.srt
|
44.6 KB
|
The Kids Aren't Alright-Security and Privacy in the K-12 Classroom.mp4
|
25.1 MB
|
The Offline Dimension of Online Crime.eng.srt
|
64.4 KB
|
The Offline Dimension of Online Crime.mp4
|
18.5 MB
|
The URLephant in the Room.eng.srt
|
58.1 KB
|
The URLephant in the Room.mp4
|
19.6 MB
|
Usage of Behavioral Biometric Technologies to Defend Against Bots.eng.srt
|
62.3 KB
|
Usage of Behavioral Biometric Technologies to Defend Against Bots.mp4
|
25.8 MB
|
User Agent 2.0 - What Can the Browser Do for the User.eng.srt
|
67.7 KB
|
User Agent 2.0 - What Can the Browser Do for the User.mp4
|
24.4 MB
|
Using Architecture and Abstractions to Design a Security Layer for TLS.eng.srt
|
74.4 KB
|
Using Architecture and Abstractions to Design a Security Layer for TLS.mp4
|
24.7 MB
|
When the Magic Wears Off - Flaws in ML for Security Evaluations.mp4
|
24.4 MB
|
Where Is the Web Closed.eng.srt
|
52.7 KB
|
Where Is the Web Closed.mp4
|
15.8 MB
|
Why Even Experienced and Highly Intelligent Developers.eng.srt
|
42.9 KB
|
Why Even Experienced and Highly Intelligent Developers.mp4
|
23.7 MB
|
/Enigma 2020/
|
Enigma 2020 Conference Program USENIX.htm
|
245.8 KB
|
Enigma 2020 Grid.htm
|
119.7 KB
|
Enigma 2020 USENIX.htm
|
111.3 KB
|
/.../Enigma 2020 Conference Program USENIX_files/
|
afroz_sadia_200x230_1.jpg
|
13.9 KB
|
analytics.js
|
45.2 KB
|
application-pdf.png
|
0.3 KB
|
arrieta_andres_200x230.jpg
|
7.1 KB
|
baker_brandon_200x230.png
|
21.5 KB
|
bishop_matt_200x230.jpg
|
13.3 KB
|
bozdag_engin_200x230.jpg
|
13.3 KB
|
buccini_steven_200x230.jpg
|
13.9 KB
|
camp_ljean_200x230.jpg
|
12.7 KB
|
css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css
|
4.3 KB
|
css_jNv4bKwKVm14QrWp-RXFaphgrRAr9CiwgzqfcTWh-HA.css
|
132.0 KB
|
css_mMMIpDBXDqo0rCZrN7FoMlBPY0tKvHCE04XYURHXl9M.css
|
610.1 KB
|
css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css
|
3.8 KB
|
css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css
|
5.4 KB
|
das_sanchari_200x230.jpg
|
13.8 KB
|
dodds_joey_130x150.jpg
|
10.9 KB
|
enigma-logo_red_tm_2000x733.png
|
3.4 KB
|
eoyang_mieke_200x230.jpg
|
13.2 KB
|
eshete_birhanu_200x230.jpg
|
12.5 KB
|
fernandez_annalisa_200x230.jpg
|
11.4 KB
|
fischer_felix_200x230.jpg
|
11.0 KB
|
font-awesome.css
|
26.7 KB
|
freeman_david_200x230.jpg
|
14.3 KB
|
galperin_eva_200x230.jpg
|
11.9 KB
|
harvey_sarah_200x230.jpg
|
12.8 KB
|
helsby_jennifer_200x230.jpg
|
15.2 KB
|
joshi_swathi_200x230.jpg
|
12.0 KB
|
js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js
|
20.5 KB
|
js_AQDKCRqaqaAAAzbvxcaEQBooKEQA-dFTfff7tzCklI8.js
|
14.0 KB
|
js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js
|
120.3 KB
|
js_fjSBcoQiz2s5JFYU7Z0v2w3fhgZkax8CZA1Fi71bsVc.js
|
15.9 KB
|
js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js
|
26.8 KB
|
js_zsU7pE_En9PuEzx00IjN_iCxIwgABAiEwJNkh1iTG9k.js
|
8.2 KB
|
kissner_lea_200x230_0.jpg
|
11.3 KB
|
kosmides_kathryn_200x230.jpg
|
14.3 KB
|
nasser_yomna_200x230.jpg
|
13.0 KB
|
papernot_nicolas_200x230_1.jpg
|
14.1 KB
|
pearlman_kavya_200x230.jpg
|
13.6 KB
|
slides.svg
|
0.7 KB
|
usenix-locked.png
|
1.4 KB
|
valsorda_filippo_200x230.jpg
|
12.8 KB
|
video.svg
|
0.8 KB
|
weissinger_laurin_200x230.jpg
|
13.8 KB
|
white_kenn_200x230.jpg
|
12.0 KB
|
/.../Enigma 2020 Grid_files/
|
app-apple.svg
|
7.9 KB
|
app-google.svg
|
4.5 KB
|
bootstrap-custom.css
|
94.0 KB
|
custom-screen.css
|
0.3 KB
|
jquery.js
|
38.3 KB
|
jquery_002.js
|
97.2 KB
|
jquery_003.js
|
2.6 KB
|
jquery_004.js
|
96.4 KB
|
loading-3x.gif
|
13.3 KB
|
main-current.css
|
135.9 KB
|
main.js
|
73.7 KB
|
responsive.css
|
6.4 KB
|
/.../Enigma 2020 Presentations/
|
How Anonymous Is My Anonymized Data - enigma2020_slides_bishop.pdf
|
532.1 KB
|
How to Build Realistic Machine Learning Systems for Security - enigma2020_slides_afroz.pdf
|
2.8 MB
|
Next-Generation SecureDrop Protecting Journalists from Malware - enigma2020_slides_helsby.pdf
|
16.8 MB
|
Platform Data Privacy and Security Strategies for Public Interest Research - enigma2020_slides_buccini.pdf
|
64.0 MB
|
Pre-Authentication Messages as a Common Root Cause of Cell Network Attacks - enigma2020_slides_nasser.pdf
|
1.0 MB
|
Privacy at Speed Privacy by Design for Agile Development at Uber - enigma2020_slides_bozdag.pdf
|
4.5 MB
|
Public Records in the Digital Age Can They Save Lives - enigma2020_slides_kosmides.pdf
|
4.9 MB
|
Securing the Software Supply Chain - enigma2020_slides_valsorda.pdf
|
1.7 MB
|
Stack Overflo A Story of Two Security Tales - enigma2020_slides_fischer.pdf
|
2.2 MB
|
Stop Failing. Start Building for Humanity - enigma2020_slides_kissner.pdf
|
206.3 KB
|
The Browser Privacy Arms Race Which Browsers Actually Protect Your Privacy - enigma2020_slides_arrieta.pdf
|
1.8 MB
|
Trustworthy Elections - enigma2020_slides_dodds.pdf
|
3.7 MB
|
Virtual Reality Brings Real Risks Are We Ready - enigma2020_slides_pearlman.pdf
|
1.8 MB
|
What Does It Mean for Machine Learning to Be Trustworthy - enigma2020_slides_papernot.pdf
|
3.7 MB
|
/.../Enigma 2020 USENIX_files/
|
adida_ben_2018_200x230.png
|
23.4 KB
|
amazon_600x240_3.png
|
4.7 KB
|
analytics.js
|
45.2 KB
|
arrieta_andres_300x300.jpg
|
12.0 KB
|
avast_600x240_1.png
|
4.7 KB
|
css_mMMIpDBXDqo0rCZrN7FoMlBPY0tKvHCE04XYURHXl9M.css
|
610.1 KB
|
css_Tvyih1Dm489siBROXzFSkKUCFbsEK9kCr0p3JDiev80.css
|
129.3 KB
|
css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css
|
3.8 KB
|
css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css
|
5.4 KB
|
css_Zsye0BYLWwrWJtw3lsEyOEQfxzw_w30Qw0yKf0mDea0.css
|
7.7 KB
|
dropbox_2018_600x240_1.png
|
3.3 KB
|
eff_2018_red_600x240_1.png
|
1.6 KB
|
enigma-logo_red_tm_2000x733.png
|
3.4 KB
|
enigma20_venue.png
|
290.9 KB
|
enigma2020_conference_web_banner_final.png
|
45.4 KB
|
eshete_birhanu_300x300.jpg
|
70.8 KB
|
ethyca_stacked_600x240.png
|
4.2 KB
|
facebook_600x240_11.png
|
2.9 KB
|
font-awesome.css
|
26.7 KB
|
freeman_david_300x300.jpg
|
79.2 KB
|
google_600x240_2_1.png
|
6.7 KB
|
helsby_jennifer_300x300.jpg
|
93.9 KB
|
joshi_swathi_300x300.jpg
|
73.4 KB
|
js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js
|
20.5 KB
|
js_4Mo-xkyNBoebVcNI-pI_dJ8NV9WVtkRJYbf2cgSYcDA.js
|
40.2 KB
|
js_AQDKCRqaqaAAAzbvxcaEQBooKEQA-dFTfff7tzCklI8.js
|
14.0 KB
|
js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js
|
120.3 KB
|
js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js
|
26.8 KB
|
js_zsU7pE_En9PuEzx00IjN_iCxIwgABAiEwJNkh1iTG9k.js
|
8.2 KB
|
kaspersky_600x240_1.png
|
3.7 KB
|
kissner_lea_300x300.jpg
|
59.4 KB
|
netflix_600x240_0.png
|
2.9 KB
|
oliveira_daniela_200x230.jpg
|
13.8 KB
|
pearlman_kavya_300x300.jpg
|
70.0 KB
|
salesforce_600x240.png
|
5.6 KB
|
shopify_600x240.png
|
5.3 KB
|
uber_600x240.png
|
3.7 KB
|
usenix_logo_300x150_neat_2.png
|
15.0 KB
|
whitesource_600x240.png
|
4.2 KB
|
/.../Enigma 2020 Videos/
|
Adventures with Cybercrime Toolkits Insights for Pragmatic Defense.eng.srt
|
24.2 KB
|
Adventures with Cybercrime Toolkits Insights for Pragmatic Defense.mp4
|
12.4 MB
|
All Security Is Good(s) Design Guidance for Economics.eng.srt
|
35.4 KB
|
All Security Is Good(s) Design Guidance for Economics.mp4
|
21.8 MB
|
BeyondProd The Origin of Cloud-Native Security at Google.eng.srt
|
44.9 KB
|
BeyondProd The Origin of Cloud-Native Security at Google.mp4
|
23.8 MB
|
Bringing Usable Crypto to 7 Million Developers.eng.srt
|
55.9 KB
|
Bringing Usable Crypto to 7 Million Developers.mp4
|
25.9 MB
|
Browser Privacy Opportunities and Tradeoffs (Panel).eng.srt
|
151.1 KB
|
Browser Privacy Opportunities and Tradeoffs (Panel).mp4
|
91.0 MB
|
Catch Me If You Can-Detecting Sandbox Evasion Techniques.eng.srt
|
30.2 KB
|
Catch Me If You Can-Detecting Sandbox Evasion Techniques.mp4
|
14.6 MB
|
Cybercrime Getting beyond Analog Cops and Digital Robbers.eng.srt
|
35.3 KB
|
Cybercrime Getting beyond Analog Cops and Digital Robbers.mp4
|
26.0 MB
|
Data as a Social Science Cultural Elements in Privacy and Security.eng.srt
|
34.2 KB
|
Data as a Social Science Cultural Elements in Privacy and Security.mp4
|
19.2 MB
|
Disinformation (Panel).eng.srt
|
156.2 KB
|
Disinformation (Panel).mp4
|
89.5 MB
|
Encrypted Messaging (Panel).eng.srt
|
132.0 KB
|
Encrypted Messaging (Panel).mp4
|
113.3 MB
|
Eyes in Your Child's Bedroom Exploiting Child Data Risks with Smart Toys.eng.srt
|
36.0 KB
|
Eyes in Your Child's Bedroom Exploiting Child Data Risks with Smart Toys.mp4
|
20.0 MB
|
How Anonymous Is My Anonymized Data.eng.srt
|
39.5 KB
|
How Anonymous Is My Anonymized Data.mp4
|
21.8 MB
|
How to Build Realistic Machine Learning Systems for Security.eng.srt
|
32.6 KB
|
How to Build Realistic Machine Learning Systems for Security.mp4
|
13.8 MB
|
Internet Infrastructure Security.eng.srt
|
34.6 KB
|
Internet Infrastructure Security.mp4
|
26.2 MB
|
Next-Generation SecureDrop Protecting Journalists from Malware.eng.srt
|
40.6 KB
|
Next-Generation SecureDrop Protecting Journalists from Malware.mp4
|
17.6 MB
|
Platform Data Privacy & Security Strategies for Public Interest Research.eng.srt
|
41.5 KB
|
Platform Data Privacy & Security Strategies for Public Interest Research.mp4
|
18.8 MB
|
Pre-Authentication Messages as a Common Root Cause of Cell Network Attacks.eng.srt
|
41.7 KB
|
Pre-Authentication Messages as a Common Root Cause of Cell Network Attacks.mp4
|
22.3 MB
|
Privacy at Speed Privacy by Design for Agile Development at Uber.eng.srt
|
28.6 KB
|
Privacy at Speed Privacy by Design for Agile Development at Uber.mp4
|
13.8 MB
|
Public Records in the Digital Age Can They Save Lives.eng.srt
|
33.9 KB
|
Public Records in the Digital Age Can They Save Lives.mp4
|
17.9 MB
|
Reservist Model Distributed Approach to Scaling Incident Response.mp4
|
11.8 MB
|
Securing the Software Supply Chain.eng.srt
|
37.8 KB
|
Securing the Software Supply Chain.mp4
|
20.4 MB
|
Stack Overflow A Story of Two Security Tales.eng.srt
|
32.7 KB
|
Stack Overflow A Story of Two Security Tales.mp4
|
17.3 MB
|
Stop Failing. Start Building for Humanity.eng.srt
|
37.8 KB
|
Stop Failing. Start Building for Humanity.mp4
|
17.4 MB
|
The Abuse Uncertain'ty Principle.eng.srt
|
46.2 KB
|
The Abuse Uncertain'ty Principle.mp4
|
23.8 MB
|
The Browser Privacy Arms Race Which Browsers Actually Protect Your Privacy.eng.srt
|
35.7 KB
|
The Browser Privacy Arms Race Which Browsers Actually Protect Your Privacy.mp4
|
17.2 MB
|
The State of the Stalkerware.eng.srt
|
39.6 KB
|
The State of the Stalkerware.mp4
|
30.8 MB
|
Third-Party Integrations Friend or Foe.eng.srt
|
37.3 KB
|
Third-Party Integrations Friend or Foe.mp4
|
24.9 MB
|
Trustworthy Elections.eng.srt
|
43.7 KB
|
Trustworthy Elections.mp4
|
17.5 MB
|
Virtual Reality Brings Real Risks Are We Ready.eng.srt
|
27.1 KB
|
Virtual Reality Brings Real Risks Are We Ready.mp4
|
23.5 MB
|
What Does It Mean for Machine Learning to Be Trustworthy.eng.srt
|
31.3 KB
|
What Does It Mean for Machine Learning to Be Trustworthy.mp4
|
14.9 MB
|
/Enigma 2021/
|
Enigma 2021 Conference Program USENIX.html
|
232.1 KB
|
Enigma 2021 USENIX.html
|
95.5 KB
|
/.../Enigma 2021 Conference Program USENIX_files/
|
adida_ben_2018_200x230.png
|
23.4 KB
|
application-pdf.png
|
0.3 KB
|
css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css
|
4.3 KB
|
css_jNv4bKwKVm14QrWp-RXFaphgrRAr9CiwgzqfcTWh-HA.css
|
132.0 KB
|
css_Pen3ncMGQyB3Q2LWoTho2yu6X-D2T6zOqWITJ4iG9A8.css
|
611.0 KB
|
css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css
|
3.8 KB
|
css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css
|
5.4 KB
|
enigma-logo_red_tm_2000x733.png
|
3.4 KB
|
enigma2021_anderson_hyrum_200x230.jpg
|
11.7 KB
|
enigma2021_botacin_marcus_200x230.jpg
|
12.6 KB
|
enigma2021_cable_jack_200x230.jpg
|
11.2 KB
|
enigma2021_celi_sofi_200x230.jpg
|
12.0 KB
|
enigma2021_consolvo_sunny_200x230_rev.jpg
|
11.5 KB
|
enigma2021_emami-naeini_200x230.jpg
|
12.3 KB
|
enigma2021_ensign_melanie_200x230.jpg
|
13.0 KB
|
enigma2021_fern_nicole_200x230.jpg
|
12.1 KB
|
enigma2021_folini_christian_200x230.jpg
|
14.6 KB
|
enigma2021_funk_mark_200x230.jpg
|
12.0 KB
|
enigma2021_gage_kelley_patrick_200x230.jpg
|
10.3 KB
|
enigma2021_garfinkel_simson_200x230.jpg
|
14.0 KB
|
enigma2021_gaynor_alex_200x230.jpg
|
11.6 KB
|
enigma2021_herr_trey_200x230.jpg
|
12.8 KB
|
enigma2021_hong_sanghyun_200x230.jpg
|
12.0 KB
|
enigma2021_huang_kelly_200x230.jpg
|
13.5 KB
|
enigma2021_judd_mike_200x230.jpg
|
12.8 KB
|
enigma2021_lange_ali_200x230.jpg
|
11.7 KB
|
enigma2021_li_tiffany_200x230.jpg
|
8.3 KB
|
enigma2021_mou_merry_v2.jpg
|
9.2 KB
|
enigma2021_negus_mitch_200x230.jpg
|
12.6 KB
|
enigma2021_palmer_chris_200x230.jpg
|
13.1 KB
|
enigma2021_quintin_cooper_200x230.jpg
|
14.3 KB
|
enigma2021_rrushi_julian_200x230.jpg
|
9.1 KB
|
enigma2021_salathe_marcel_200x230.jpg
|
8.2 KB
|
enigma2021_starbird_kate_200x230.jpg
|
14.4 KB
|
enigma2021_stone_maddie_200x230.jpg
|
12.0 KB
|
enigma2021_stringhini_gianluca_200x230.jpg
|
13.6 KB
|
enigma2021_troncoso_carmela_200x230.jpg
|
11.6 KB
|
font-awesome.css
|
26.7 KB
|
js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js
|
20.5 KB
|
js_fyV0VVkC6Q3xduxGurKMTFIU2dMmArUrbAdZORL-9WQ.js
|
0.4 KB
|
js_l3lGSHpmjPG_uzcz3Shpsi9Iwu4IaSB7us0ldgM0q7g.js
|
16.3 KB
|
js_nKHPel07iQ7X6ouVrkRIeMs9JzgU_FAp9nBhDfrhyQc.js
|
14.8 KB
|
js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js
|
26.8 KB
|
js_wKyFX46tVKJtPKN12qNjRfS4aubW4G2u7LK22vlDiKo.js
|
133.2 KB
|
shapiro_scott_200x230.jpg
|
12.0 KB
|
slides.svg
|
0.7 KB
|
usenix-locked.png
|
1.4 KB
|
video.svg
|
0.8 KB
|
/.../Enigma 2021 Presentations/
|
engima2021_slides_stone.pdf
|
4.0 MB
|
enigma2021_slide_celi.pdf
|
897.8 KB
|
enigma2021_slides_anderson.pdf
|
2.1 MB
|
enigma2021_slides_botacin.pdf
|
3.7 MB
|
enigma2021_slides_cable.pdf
|
689.3 KB
|
enigma2021_slides_emami-naeini.pdf
|
2.6 MB
|
enigma2021_slides_ensign.pdf
|
4.0 MB
|
enigma2021_slides_fern.pdf
|
12.6 MB
|
enigma2021_slides_folini.pdf
|
1.4 MB
|
enigma2021_slides_funk.pdf
|
9.7 MB
|
enigma2021_slides_garfinkel.pdf
|
29.3 MB
|
enigma2021_slides_gaynor.pdf
|
422.5 KB
|
enigma2021_slides_herr.pdf
|
17.8 MB
|
enigma2021_slides_hong.pdf
|
19.6 MB
|
enigma2021_slides_huang.pdf
|
1.4 MB
|
enigma2021_slides_kelley.pdf
|
2.5 MB
|
enigma2021_slides_mou.pdf
|
3.4 MB
|
enigma2021_slides_negus.pdf
|
41.3 MB
|
enigma2021_slides_palmer.pdf
|
463.9 KB
|
enigma2021_slides_quintin.pdf
|
3.8 MB
|
enigma2021_slides_rrushi.pdf
|
2.7 MB
|
enigma2021_slides_shapiro.pdf
|
13.8 MB
|
enigma2021_slides_starbird.pdf
|
18.1 MB
|
enigma2021_slides_stringhini.pdf
|
2.6 MB
|
enigma2021_slides_troncoso.pdf
|
4.0 MB
|
/.../Enigma 2021 USENIX_files/
|
css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css
|
4.3 KB
|
css_Pen3ncMGQyB3Q2LWoTho2yu6X-D2T6zOqWITJ4iG9A8.css
|
611.0 KB
|
css_Tvyih1Dm489siBROXzFSkKUCFbsEK9kCr0p3JDiev80.css
|
129.3 KB
|
css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css
|
3.8 KB
|
css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css
|
5.4 KB
|
eff_2018_red_600x240_0.png
|
1.6 KB
|
enigma-logo_red_tm_2000x733.png
|
3.4 KB
|
enigma21_conference_web_banner_logo.png
|
25.7 KB
|
ethyca-600x240.png
|
8.0 KB
|
facebook_600x240_22.png
|
2.9 KB
|
font-awesome.css
|
26.7 KB
|
google_600x240_14.png
|
6.7 KB
|
js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js
|
20.5 KB
|
js_fyV0VVkC6Q3xduxGurKMTFIU2dMmArUrbAdZORL-9WQ.js
|
0.4 KB
|
js_l3lGSHpmjPG_uzcz3Shpsi9Iwu4IaSB7us0ldgM0q7g.js
|
16.3 KB
|
js_nKHPel07iQ7X6ouVrkRIeMs9JzgU_FAp9nBhDfrhyQc.js
|
14.8 KB
|
js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js
|
26.8 KB
|
js_wKyFX46tVKJtPKN12qNjRfS4aubW4G2u7LK22vlDiKo.js
|
133.2 KB
|
kaspersky_600x240_2.png
|
3.7 KB
|
kissner_lea_2019_200x230.jpg
|
10.6 KB
|
netflix_600x240_2.png
|
2.9 KB
|
oliveira_daniela_200x230.jpg
|
13.8 KB
|
salesforce_600x240_1.png
|
5.6 KB
|
tii_logo_600x240_1.png
|
6.2 KB
|
usenix_logo_300x150_neat_2.png
|
15.0 KB
|
/.../Enigma 2021 Videos/
|
A Quest for the Physics of Cyberspace.eng.srt
|
32.8 KB
|
A Quest for the Physics of Cyberspace.mp4
|
15.9 MB
|
A Sound Mind in a Vulnerable Body Practical Hardware Attacks on Deep Learning.eng.srt
|
43.4 KB
|
A Sound Mind in a Vulnerable Body Practical Hardware Attacks on Deep Learning.mp4
|
20.4 MB
|
Breaking Trust - Shades of Crisis Across an Insecure Software Supply Chain.eng.srt
|
47.6 KB
|
Breaking Trust - Shades of Crisis Across an Insecure Software Supply Chain.mp4
|
18.5 MB
|
Building E2EE and User Identity.eng.srt
|
41.3 KB
|
Building E2EE and User Identity.mp4
|
13.6 MB
|
Computational Methods to Understand and Mitigate Online Aggression.eng.srt
|
31.3 KB
|
Computational Methods to Understand and Mitigate Online Aggression.mp4
|
21.8 MB
|
Contact Tracing Apps Engineering Privacy in Quicksand.eng.srt
|
39.7 KB
|
Contact Tracing Apps Engineering Privacy in Quicksand.mp4
|
18.8 MB
|
Contact Tracing Panel.eng.srt
|
102.0 KB
|
Contact Tracing Panel.mp4
|
59.6 MB
|
Da Da What Shark Conservation Teaches Us about Emotionality and Effective.eng.srt
|
39.9 KB
|
Da Da What Shark Conservation Teaches Us about Emotionality and Effective.mp4
|
15.4 MB
|
Designing Verifiable Health Solutions For Global Pandemic.eng.srt
|
46.8 KB
|
Designing Verifiable Health Solutions For Global Pandemic.mp4
|
18.8 MB
|
Detecting Fake 4G LTE Base Stations in Real Time.eng.srt
|
42.7 KB
|
Detecting Fake 4G LTE Base Stations in Real Time.mp4
|
27.4 MB
|
Does Your Threat Model Consider Country and Culture A Case Study of Brazilian.eng.srt
|
41.2 KB
|
Does Your Threat Model Consider Country and Culture A Case Study of Brazilian.mp4
|
24.4 MB
|
Gone, But Not - Forgotten -Technical & Practical Challenges In Operationalizing.mp4
|
15.9 MB
|
Hardware A Double-Edged Sword for Security.eng.srt
|
38.4 KB
|
Hardware A Double-Edged Sword for Security.mp4
|
27.3 MB
|
I Thought I Was Being Strong with a Complicated Person - The Tales.eng.srt
|
42.7 KB
|
I Thought I Was Being Strong with a Complicated Person - The Tales.mp4
|
16.7 MB
|
Implementing Differential Privacy for the 2020 Census.eng.srt
|
34.4 KB
|
Implementing Differential Privacy for the 2020 Census.mp4
|
20.5 MB
|
Is Cyber War Legal A Four Hundred Year Retrospective.eng.srt
|
31.4 KB
|
Is Cyber War Legal A Four Hundred Year Retrospective.mp4
|
14.0 MB
|
No Data, No Problem-Giving Nuclear Inspectors Better Tools without Revealing.eng.srt
|
44.2 KB
|
No Data, No Problem-Giving Nuclear Inspectors Better Tools without Revealing.mp4
|
15.9 MB
|
Online Rumors, Misinformation and Disinformation The Perfect Storm of COVID-19.eng.srt
|
42.0 KB
|
Online Rumors, Misinformation and Disinformation The Perfect Storm of COVID-19.mp4
|
18.4 MB
|
Privacy and Security Nutrition Labels to Inform IoT Consumers.eng.srt
|
40.0 KB
|
Privacy and Security Nutrition Labels to Inform IoT Consumers.mp4
|
15.2 MB
|
Privacy, Measurably, Isn't Dead.eng.srt
|
42.1 KB
|
Privacy, Measurably, Isn't Dead.mp4
|
17.4 MB
|
Quantifying Memory Unsafety and Reactions to It.eng.srt
|
48.1 KB
|
Quantifying Memory Unsafety and Reactions to It.mp4
|
16.5 MB
|
Security & U.S. Political Campaigns A Study & Expert Roundtable.eng.srt
|
45.8 KB
|
Security & U.S. Political Campaigns A Study & Expert Roundtable.mp4
|
18.5 MB
|
The Adventurous Tale of Online Voting in Switzerland.eng.srt
|
42.4 KB
|
The Adventurous Tale of Online Voting in Switzerland.mp4
|
22.4 MB
|
The Full Stack Problem of Election Security.eng.srt
|
43.6 KB
|
The Full Stack Problem of Election Security.mp4
|
12.1 MB
|
The Limits of Sandboxing and Next Steps.eng.srt
|
41.1 KB
|
The Limits of Sandboxing and Next Steps.mp4
|
14.9 MB
|
The Practical Divide between Adversarial ML Research and Security Practice.eng.srt
|
37.1 KB
|
The Practical Divide between Adversarial ML Research and Security Practice.mp4
|
21.0 MB
|
The State of 0-Day in-the-Wild Exploitation.eng.srt
|
43.6 KB
|
The State of 0-Day in-the-Wild Exploitation.mp4
|
21.6 MB
|
/Enigma 2022/
|
#Protect2020 An After Action Report.eng.srt
|
39.0 KB
|
#Protect2020 An After Action Report.mp4
|
35.4 MB
|
An Open-Source Taxonomy for Ex-ante Privacy.eng.srt
|
56.4 KB
|
An Open-Source Taxonomy for Ex-ante Privacy.mp4
|
34.2 MB
|
Around the World in 500 Days of Pandemic Misinformation.eng.srt
|
41.0 KB
|
Around the World in 500 Days of Pandemic Misinformation.mp4
|
29.3 MB
|
Auditing Data Privacy for Machine Learning.eng.srt
|
29.3 KB
|
Auditing Data Privacy for Machine Learning.mp4
|
21.1 MB
|
Broken CAPTCHAs and Fractured Equity Privacy and Security in hCaptcha.eng.srt
|
48.2 KB
|
Broken CAPTCHAs and Fractured Equity Privacy and Security in hCaptcha.mp4
|
29.0 MB
|
Burnout and PCSD Placing Team At Risk.eng.srt
|
37.1 KB
|
Burnout and PCSD Placing Team At Risk.mp4
|
17.1 MB
|
Can the Fight against Disinformation Really Scale.eng.srt
|
42.8 KB
|
Can the Fight against Disinformation Really Scale.mp4
|
33.1 MB
|
Content-Oblivious Trust and Safety Techniques Results from a Survey of Online.eng.srt
|
40.4 KB
|
Content-Oblivious Trust and Safety Techniques Results from a Survey of Online.mp4
|
22.0 MB
|
Contextual Security A Critical Shift in Performing Threat Intelligence.eng.srt
|
42.7 KB
|
Contextual Security A Critical Shift in Performing Threat Intelligence.mp4
|
28.1 MB
|
Covenants without the Sword Market Incentives for Security Investment.eng.srt
|
32.7 KB
|
Covenants without the Sword Market Incentives for Security Investment.mp4
|
13.6 MB
|
Crypto for the People (part 2).eng.srt
|
49.3 KB
|
Crypto for the People (part 2).mp4
|
21.2 MB
|
Detection Is Not Enough Attack Recovery for Safe and Robust Autonomous Robotic.eng.srt
|
28.9 KB
|
Detection Is Not Enough Attack Recovery for Safe and Robust Autonomous Robotic.mp4
|
13.3 MB
|
Fireside Chat with Sheera Frenkel.eng.srt
|
77.5 KB
|
Fireside Chat with Sheera Frenkel.mp4
|
83.6 MB
|
Healthcare Ecosystem Security's Role in Helping HealthTech Find Its Way.eng.srt
|
37.5 KB
|
Healthcare Ecosystem Security's Role in Helping HealthTech Find Its Way.mp4
|
24.3 MB
|
I See You Blockchain User, or Not Privacy in the Age of Blockchains.eng.srt
|
29.5 KB
|
I See You Blockchain User, or Not Privacy in the Age of Blockchains.mp4
|
13.2 MB
|
Leveraging Human Factors to Stop Dangerous IoT.eng.srt
|
34.9 KB
|
Leveraging Human Factors to Stop Dangerous IoT.mp4
|
14.5 MB
|
Neither Band-Aids nor Silver Bullets How Bug Bounties Can Help the Discovery.eng.srt
|
35.4 KB
|
Neither Band-Aids nor Silver Bullets How Bug Bounties Can Help the Discovery.mp4
|
18.8 MB
|
Panel Sex Work, Tech, and Surveillance.eng.srt
|
116.5 KB
|
Panel Sex Work, Tech, and Surveillance.mp4
|
107.3 MB
|
Panel Understanding Section 230.eng.srt
|
195.8 KB
|
Panel Understanding Section 230.mp4
|
156.6 MB
|
Rethinking - Security - in an Era of Online Hate and Harassment.eng.srt
|
41.4 KB
|
Rethinking - Security - in an Era of Online Hate and Harassment.mp4
|
19.1 MB
|
Teaching an Old Dog New Tricks Reusing Security Solutions in Novel Domains.eng.srt
|
40.5 KB
|
Teaching an Old Dog New Tricks Reusing Security Solutions in Novel Domains.mp4
|
24.7 MB
|
The Global Privacy Control Exercising Legal Rights at Scale.eng.srt
|
50.5 KB
|
The Global Privacy Control Exercising Legal Rights at Scale.mp4
|
30.0 MB
|
The Security Team at the Top The Board of Directors.eng.srt
|
40.6 KB
|
The Security Team at the Top The Board of Directors.mp4
|
25.6 MB
|
Thinking Slow Exposing Influence as a Hallmark of Cyber Social Engineering.eng.srt
|
37.0 KB
|
Thinking Slow Exposing Influence as a Hallmark of Cyber Social Engineering.mp4
|
19.8 MB
|
When Machine Learning Isn’t Private.eng.srt
|
44.9 KB
|
When Machine Learning Isn’t Private.mp4
|
30.5 MB
|
Why Has Your Toaster Been through More Security Testing than the AI System.eng.srt
|
37.2 KB
|
Why Has Your Toaster Been through More Security Testing than the AI System.mp4
|
15.2 MB
|
You Can’t Always Get What You Want - But You Get What You Need Moderating E2EE.eng.srt
|
43.2 KB
|
You Can’t Always Get What You Want - But You Get What You Need Moderating E2EE.mp4
|
47.7 MB
|
/Enigma 2023/
|
A New Process to Tackle Misinformation on Social Media.eng.srt
|
35.6 KB
|
A New Process to Tackle Misinformation on Social Media.mp4
|
19.2 MB
|
Adventures in Authentication and Authorization.eng.srt
|
45.5 KB
|
Adventures in Authentication and Authorization.mp4
|
20.4 MB
|
Building an Automated Machine for Discovering Privacy Violations at Scale.eng.srt
|
33.8 KB
|
Building an Automated Machine for Discovering Privacy Violations at Scale.mp4
|
18.3 MB
|
Characterizing and Measuring Misleading and Harmful Online Ad Content at Scale.eng.srt
|
40.2 KB
|
Characterizing and Measuring Misleading and Harmful Online Ad Content at Scale.mp4
|
18.0 MB
|
Fireside Chat The State of Memory Safety.eng.srt
|
89.5 KB
|
Fireside Chat The State of Memory Safety.mp4
|
76.1 MB
|
Fireside Chat with Simson Garfinkel on Quantum Technologies.eng.srt
|
68.2 KB
|
Fireside Chat with Simson Garfinkel on Quantum Technologies.mp4
|
53.5 MB
|
How Geopolitical Change Causes People to Become (More) Vulnerable.eng.srt
|
42.4 KB
|
How Geopolitical Change Causes People to Become (More) Vulnerable.mp4
|
21.0 MB
|
How the Internet Improves Humanity.eng.srt
|
42.7 KB
|
How the Internet Improves Humanity.mp4
|
20.7 MB
|
Invited Talk Metric Perversity and Bad Decision - Making.eng.srt
|
38.8 KB
|
Invited Talk Metric Perversity and Bad Decision - Making.mp4
|
19.7 MB
|
Meaningful Hardware Privacy for a Smart and Augmented Future.eng.srt
|
38.1 KB
|
Meaningful Hardware Privacy for a Smart and Augmented Future.mp4
|
25.4 MB
|
Myths and Lies in InfoSec.eng.srt
|
39.7 KB
|
Myths and Lies in InfoSec.mp4
|
23.6 MB
|
Navigating the Sandbox Buffet.eng.srt
|
44.0 KB
|
Navigating the Sandbox Buffet.mp4
|
20.8 MB
|
Open Source Software and Journalism Field Notes from a Global Perspective.eng.srt
|
47.8 KB
|
Open Source Software and Journalism Field Notes from a Global Perspective.mp4
|
23.1 MB
|
Panel Privacy Policies, by Lawyers, for Lawyers. What about Everyone Else.eng.srt
|
80.2 KB
|
Panel Privacy Policies, by Lawyers, for Lawyers. What about Everyone Else.mp4
|
70.1 MB
|
Panel The Emperor's New Clothes Location Data & the Promise of Anonymization.eng.srt
|
105.7 KB
|
Panel The Emperor's New Clothes Location Data & the Promise of Anonymization.mp4
|
86.9 MB
|
Panel True Crime Journalism Cyber.eng.srt
|
67.8 KB
|
Panel True Crime Journalism Cyber.mp4
|
59.1 MB
|
Protecting Whistleblower Information.eng.srt
|
39.0 KB
|
Protecting Whistleblower Information.mp4
|
19.9 MB
|
So You're Going to Blow the Whistle Communications Dos and Don'ts.eng.srt
|
39.9 KB
|
So You're Going to Blow the Whistle Communications Dos and Don'ts.mp4
|
28.5 MB
|
Spotting the Differences Quirks of Machine Learning (in) Security.eng.srt
|
32.4 KB
|
Spotting the Differences Quirks of Machine Learning (in) Security.mp4
|
18.9 MB
|
Technical Metamorphosis The 3 Stages of DSAR Automation.eng.srt
|
34.5 KB
|
Technical Metamorphosis The 3 Stages of DSAR Automation.mp4
|
15.1 MB
|
Technology Abuse Clinics for Survivors of Intimate Partner Violence.eng.srt
|
39.2 KB
|
Technology Abuse Clinics for Survivors of Intimate Partner Violence.mp4
|
16.2 MB
|
The Dirty Laundry of the Web PKI.eng.srt
|
43.3 KB
|
The Dirty Laundry of the Web PKI.mp4
|
21.2 MB
|
The Edge of Developed Practice in Searching Encrypted Data.eng.srt
|
55.2 KB
|
The Edge of Developed Practice in Searching Encrypted Data.mp4
|
29.1 MB
|
The Not Fake News Hour.eng.srt
|
23.0 KB
|
The Not Fake News Hour.mp4
|
13.7 MB
|
The Slippery Slope of Cybersecurity Analogies.eng.srt
|
29.1 KB
|
The Slippery Slope of Cybersecurity Analogies.mp4
|
19.6 MB
|
The Very Hungry Defender Metamorphosing Security Decision - Making.eng.srt
|
42.9 KB
|
The Very Hungry Defender Metamorphosing Security Decision - Making.mp4
|
19.5 MB
|
Understanding Trust & Security Processes in the Open Source Software Ecosystem.eng.srt
|
33.3 KB
|
Understanding Trust & Security Processes in the Open Source Software Ecosystem.mp4
|
11.4 MB
|
What Public Interest AI Auditors Can Learn from Security Testing.eng.srt
|
44.6 KB
|
What Public Interest AI Auditors Can Learn from Security Testing.mp4
|
18.9 MB
|
When Malware Changed Its Mind How - Split Personalities - Affect Malware.eng.srt
|
36.1 KB
|
When Malware Changed Its Mind How - Split Personalities - Affect Malware.mp4
|
17.2 MB
|
Why Is Our Security Research Failing Five Practices to Change.eng.srt
|
36.9 KB
|
Why Is Our Security Research Failing Five Practices to Change.mp4
|
22.8 MB
|
Working on the Frontlines Privacy and Security with Vulnerable Populations.eng.srt
|
47.1 KB
|
Working on the Frontlines Privacy and Security with Vulnerable Populations.mp4
|
21.5 MB
|
/Enigma Interviews/
|
USENIX presents Enigma Interviews (8 23 17) - featuring Eva Galperin and Alex Stamos.mp4
|
197.3 MB
|
USENIX presents Enigma Interviews 2 (11 29 17) - featuring Stefan Savage and Deirdre Mulligan.mp4
|
151.3 MB
|
Total files 1299
|