FileMood

Download USENIX Enigma

USENIX Enigma

Name

USENIX Enigma

 DOWNLOAD Copy Link

Total Size

9.3 GB

Total Files

1299

Last Seen

2024-10-26 02:50

Hash

07E6F2B3934564E879A6E68761DB1658EE52C332

/

Enigma logo.jpg

4.1 KB

USENIX Enigma thank you.txt

1.4 KB

/Enigma 2016/

Enigma 2016 Conference Program USENIX.htm

285.1 KB

Enigma 2016 Conference.htm

94.8 KB

Enigma 2018 Conference Program USENIX.htm

288.2 KB

/.../Enigma 2016 Conference Program USENIX_files/

analytics.js

45.2 KB

application-pdf.png

0.3 KB

armageddon_elle_100x115.jpg

14.6 KB

brown_benjamin_100x115.jpg

13.4 KB

budington_bill_100x115.jpg

13.4 KB

bursztein_elie_100x115.jpg

12.0 KB

css_bNQhEiSGvhP4uYPPsVZxRFY91MGD9EliUfdDiA1wvhE.css

11.3 KB

css_i6PnPuJ7c202RyOYbwWLKOktmSWuZfXTE69vUNEoVr4.css

185.8 KB

css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css

3.8 KB

css_xE-rWrJf-fncB6ztZfd2huxqgxu4WO-qwma6Xer30m4.css

7.6 KB

debeauvoir_dana_100x115.png

22.6 KB

eckersley_peter_100x115.jpg

11.1 KB

enigma-logo.png

32.4 KB

equal_respect_white_150x68.png

4.1 KB

equal_respect_white_180x60.png

4.8 KB

facebook.png

1.3 KB

freeman_david_100x115.jpg

9.6 KB

fu_kevin_100x115.jpg

9.9 KB

galperin_eva_100x115_update.jpg

16.2 KB

genovese_vito_100x115.jpg

10.3 KB

google-plus.png

0.4 KB

halderman_alex_100x115.jpg

9.7 KB

hawkes_ben_100x115.jpg

8.0 KB

heiderich_mario_100x115.png

27.3 KB

hotz_george_100x115.png

23.6 KB

joyce_rob_100x115.png

24.2 KB

js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js

20.5 KB

js_DxnG51urgJDX4OTVcQBu1okYvVzFssi84PpdeKo__nE.js

196.2 KB

js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js

120.3 KB

js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js

26.8 KB

js_x3e8S2TUtiV35IQmEHMfmTgE8FOPXcOKLcvEo83wyXk.js

18.2 KB

kohno_tadayoshi_100x115.jpg

11.3 KB

majkowski_marek_100x115.jpg

12.9 KB

marquis-boire_morgan_100x115.png

22.0 KB

mccoy_damon_100x115.jpg

11.1 KB

nighswander_tyler_100x115.png

13.6 KB

oberheide_jon_100x115.jpg

8.0 KB

payne_bryan_100x115.jpg

9.9 KB

peterson_zachary_100x115.jpg

10.6 KB

porter-felt_adrienne_100x115.jpg

12.1 KB

reed_teddy_100x115.jpg

8.5 KB

rivest_ron_100x115.png

22.4 KB

rozier_eric_v2_100x115.jpg

10.6 KB

rubin_avi_100x115.jpg

13.7 KB

savage_stephan_100x115.jpg

11.2 KB

serebryany_kostya_new_100x115.jpg

11.8 KB

slides_16.png

1.3 KB

smith_matthew_100x115.png

21.7 KB

stepanovich_amie_100x115.jpg

14.1 KB

sullivan_nick_100x115.jpg

10.6 KB

teague_vanessa_100x115.png

25.2 KB

twitter.png

1.6 KB

usenix-locked.png

1.4 KB

video_16.png

1.4 KB

vigna_giovanni_100x115.jpg

11.5 KB

weaver_nicholas_100x115.jpg

9.3 KB

wurster_glenn_100x115.jpg

8.9 KB

youtube.png

2.5 KB

zhu_yan_100x115.png

16.1 KB

/.../Enigma 2016 Conference_files/

alex_stamos.jpg

49.6 KB

analytics.js

45.2 KB

bob_lord.jpg

305.2 KB

boneh.png

56.8 KB

brumley.png

68.3 KB

bursztein.png

47.0 KB

css_i6PnPuJ7c202RyOYbwWLKOktmSWuZfXTE69vUNEoVr4.css

185.8 KB

css_mQd1YeVeFsJde7YU6LYIcXa_7QlmB58IygdmcoSTjPA.css

8.6 KB

css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css

3.8 KB

css_xE-rWrJf-fncB6ztZfd2huxqgxu4WO-qwma6Xer30m4.css

7.6 KB

dan_boneh.jpg

37.5 KB

darktrace_logo_white_225x63.png

2.7 KB

darktrace_logo_white_300x84.png

11.0 KB

david_brumley.jpg

25.0 KB

duo.png

3.9 KB

duo_security_150x125.png

3.8 KB

eff.png

5.8 KB

elie_bursztein.jpeg

42.5 KB

enigma-logo.png

32.4 KB

enigma_logo_700x253.png

10.7 KB

equal_respect_white_150x68.png

4.1 KB

equal_respect_white_180x60.png

4.8 KB

facebook.png

1.3 KB

facebook_2016_white_225x79.png

4.3 KB

felt_porter_adrienne_square.png

129.8 KB

goldman_sachs.png

4.9 KB

goldman_sachs_225x99.png

3.6 KB

google-plus.png

0.4 KB

google.png

14.6 KB

grPkXG0gn3w.htm

75.6 KB

js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js

20.5 KB

js_DxnG51urgJDX4OTVcQBu1okYvVzFssi84PpdeKo__nE.js

196.2 KB

js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js

120.3 KB

js_PACmgStbFksqYzX-HlEqBZWNu18Gac4c9Dc2EzyjEsM.js

8.3 KB

js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js

26.8 KB

js_zsU7pE_En9PuEzx00IjN_iCxIwgABAiEwJNkh1iTG9k.js

8.2 KB

linkedin.png

4.5 KB

lord.png

55.9 KB

mccoy_damon_square.png

88.4 KB

moss.png

52.5 KB

niels_provos.jpg

208.1 KB

parisa_tabriz.jpg

7.2 MB

paxton.png

58.9 KB

payne_bryan_square.png

74.7 KB

provos.png

72.0 KB

salesforce_enigma_sponsor_200x71.png

1.8 KB

salesforce_enigma_sponsor_300x213.png

5.6 KB

savage.png

51.8 KB

stamos.png

51.8 KB

stefan_savage.jpg

38.9 KB

tabriz.png

45.3 KB

twitter.png

1.6 KB

usenix.png

17.5 KB

vern_paxson.jpg

28.3 KB

youtube.png

2.5 KB

/.../Enigma 2016 Conference_files/grPkXG0gn3w_data/

base.js

1.3 MB

embed.js

24.6 KB

remote.js

89.8 KB

www-embed-player.js

120.0 KB

www-player-webp.css

282.6 KB

/.../Enigma 2016 Presentations/

A Million Hit Points and Infinite Charisma How Games Can Fix Computer Security Education - enigma_slides_peterson.pdf

62.5 MB

Building a Competitive Hacking Team - enigma_slides_nighswander.pdf

18.6 MB

Building a DDoS Mitigation Pipeline - enigma_slides_majkowski.pdf

2.4 MB

Bullet-Proof Credit Card Processing - enigma_slides_mccoy.pdf

8.8 MB

Capture the Flag An Owner’s Manual - enigma16_slides_genovese.pdf

6.1 MB

Computer Security and the Internet of Things - enigma16_slides_kohno.pdf

1.1 MB

Data Integrity Based Attacks in Investigative Domains - enigma_slides_rozier.pdf

54.6 MB

Dolla Dolla Bill Yall Cybercrime Cashouts - enigma_slides_brown.pdf

6.4 MB

Drops for Stuff An Analysis of Reshipping Mule Scams - enigma_slides_vigna.pdf

19.8 MB

enigma16_slides_armageddon.pdf

1.4 MB

enigma16_slides_debeauvoir.pdf

5.8 MB

enigma16_slides_freeman.pdf

15.5 MB

enigma16_slides_genovese.pdf

6.1 MB

enigma16_slides_halderman.pdf

7.9 MB

enigma16_slides_heiderich.pdf

134.1 KB

enigma16_slides_kohno.pdf

1.1 MB

enigma16_slides_savage.pdf

21.9 MB

enigma16_slides_stepanovich.pdf

6.8 MB

enigma16_slides_weaver.pdf

3.8 MB

enigma_2016_slides_rivest.pdf

65.4 KB

enigma_slides_brown.pdf

6.4 MB

enigma_slides_felt.pdf

1.6 MB

enigma_slides_fu.pdf

32.0 MB

enigma_slides_galperin.pdf

8.3 MB

enigma_slides_hawkes.pdf

86.1 KB

enigma_slides_joyce.pdf

1.1 MB

enigma_slides_majkowski.pdf

2.4 MB

enigma_slides_mccoy.pdf

8.8 MB

enigma_slides_nighswander.pdf

18.6 MB

enigma_slides_oberheide.pdf

3.5 MB

enigma_slides_payne.pdf

6.4 MB

enigma_slides_peterson.pdf

62.5 MB

enigma_slides_rozier.pdf

54.6 MB

enigma_slides_serebryany.pdf

365.6 KB

enigma_slides_smith.pdf

6.6 MB

enigma_slides_sullivan.pdf

3.0 MB

enigma_slides_teague.pdf

2.0 MB

enigma_slides_vigna.pdf

19.8 MB

enigma_slides_wurster.pdf

1.8 MB

enigma_slides_zhu-yan.pdf

3.6 MB

From Concept to Deployment-The Life (and Death) of Security Features - enigma_slides_wurster.pdf

1.8 MB

Hacking Health Security in Healthcare IT Systems - rubin.enigma.pdf

7.4 MB

Internet Voting What Could Go Wrong - enigma16_slides_halderman.pdf

7.9 MB

Keys Under Doormats Mandating Insecurity by Requiring Government Access to All Data and Communications - enigma_2016_slides_rivest.pdf

65.4 KB

Medical Device Security - enigma_slides_fu.pdf

32.0 MB

Modern Automotive Vulnerabilities Causes, Disclosures, and Outcomes - enigma16_slides_savage.pdf

21.9 MB

PKI at Scale Using Short­-lived Certificates - enigma_slides_payne.pdf

6.4 MB

Protecting High Risk Users - enigma_slides_galperin.pdf

8.3 MB

rubin.enigma.pdf

7.4 MB

Sanitize, Fuzz, and Harden Your Cpp Code - enigma_slides_serebryany.pdf

365.6 KB

Security and Usability from the Frontlines of Enterprise IT - enigma_slides_oberheide.pdf

3.5 MB

Server-side Second Factors A Statistical Approach to Measuring User Authenticity - enigma16_slides_freeman.pdf

15.5 MB

Several Horror Stories about the Encrypted Web - enigma_slides_zhu-yan.pdf

3.6 MB

Social Media Self-Defense A Guide to Stopping Stalkers - enigma16_slides_armageddon.pdf

1.4 MB

The Global Conversation on Encryption - enigma16_slides_stepanovich.pdf

6.8 MB

The Golden Age of Bulk Surveillance - enigma16_slides_weaver.pdf

3.8 MB

ToStaticHTML for Everyone! About DOMPurify, Security in the DOM, and Why We Really Need Both - enigma16_slides_heiderich.pdf

134.1 KB

Trust Beyond the First Hop-What Really Happens to Data Sent to HTTPS Websites - enigma_slides_sullivan.pdf

3.0 MB

Usable Security-The Source Awakens - enigma_slides_smith.pdf

6.6 MB

Verification, Auditing, and Evidence If We Didn’t Notice Anything Wrong, Is the Election Outcome Right - enigma_slides_teague.pdf

2.0 MB

We Need Something Better-Building STAR Vote - enigma16_slides_debeauvoir.pdf

5.8 MB

What Makes Software Exploitation Hard - enigma_slides_hawkes.pdf

86.1 KB

Why Is Usable Security Hard, and What Should We Do about It - enigma_slides_felt.pdf

1.6 MB

/.../Enigma 2016 Videos/

A Million Hit Points and Infinite Charisma - How Games Can Fix.mp4

40.0 MB

A Million Hit Points and Infinite Charisma - How Games Can Fix.srt

37.6 KB

Building a Competitive Hacking Team.mp4

41.7 MB

Building a Competitive Hacking Team.srt

44.4 KB

Building a DDoS Mitigation Pipeline.mp4

30.6 MB

Building a DDoS Mitigation Pipeline.srt

39.1 KB

Bullet-Proof Credit Card Processing.mp4

40.1 MB

Bullet-Proof Credit Card Processing.srt

45.0 KB

Capture the Flag - An Owner s Manual.srt

40.7 KB

Capture the Flag - An Owner's Manual.mp4

44.3 MB

Computer Security and the Internet of Things.mp4

36.4 MB

Computer Security and the Internet of Things.srt

40.5 KB

Data Integrity Based Attacks in Investigative Domains.mp4

39.0 MB

Data Integrity Based Attacks in Investigative Domains.srt

42.1 KB

David Freeman of LinkedIn on His Enigma Conference Talk.mp4

2.5 MB

David Freeman of LinkedIn on His Enigma Conference Talk.srt

1.4 KB

Defending, Detecting, and Responding to Hardware and Firmware Attacks.mp4

47.8 MB

Defending, Detecting, and Responding to Hardware and Firmware Attacks.srt

46.9 KB

Dolla Dolla Bill Y all - Cybercrime Cashouts.mp4

49.9 MB

Dolla Dolla Bill Y all - Cybercrime Cashouts.srt

43.7 KB

Drops for Stuff - An Analysis of Reshipping Mule Scams.mp4

49.8 MB

Drops for Stuff - An Analysis of Reshipping Mule Scams.srt

35.1 KB

Elie Bursztein of Google Previews His Enigma Talk.mp4

2.0 MB

Elie Bursztein of Google Previews His Enigma Talk.srt

1.3 KB

Enigma Conference Speaker Nicholas Weaver Discusses His Talk.mp4

2.7 MB

Enigma Conference Speaker Nicholas Weaver Discusses His Talk.srt

1.3 KB

Eva Galperin of the EFF on Her Enigma Conference Talk.mp4

2.2 MB

Eva Galperin of the EFF on Her Enigma Conference Talk.srt

1.6 KB

From Concept to Deployment - the Life (and Death) of Security Features.mp4

36.9 MB

From Concept to Deployment - the Life (and Death) of Security Features.srt

32.5 KB

Hacking Health - Security in Healthcare IT Systems.mp4

42.6 MB

Hacking Health - Security in Healthcare IT Systems.srt

43.0 KB

Internet Voting - What Could Go Wrong.mp4

41.2 MB

Internet Voting - What Could Go Wrong.srt

38.6 KB

Keys Under Doormats - Mandating Insecurity.mp4

47.4 MB

Keys Under Doormats - Mandating Insecurity.srt

42.4 KB

Lessons Learned While Protecting Gmail.mp4

55.5 MB

Lessons Learned While Protecting Gmail.srt

52.9 KB

Medical Device Security.mp4

40.0 MB

Medical Device Security.srt

40.2 KB

Modern Automotive Security - History, Disclosure, and Consequences.mp4

40.4 MB

Modern Automotive Security - History, Disclosure, and Consequences.srt

46.6 KB

NSA TAO Chief on Disrupting Nation State Hackers.mp4

84.5 MB

NSA TAO Chief on Disrupting Nation State Hackers.srt

58.5 KB

Opening Video.mp4

3.8 MB

Panopticlick - Fingerprinting Your Web Presence.mp4

70.6 MB

Panopticlick - Fingerprinting Your Web Presence.srt

37.6 KB

PKI at Scale Using Short-lived Certificates.mp4

35.8 MB

PKI at Scale Using Short-lived Certificates.srt

45.0 KB

Protecting High Risk Users.mp4

63.1 MB

Protecting High Risk Users.srt

54.8 KB

Sanitize, Fuzz, and Harden Your C Code.mp4

38.3 MB

Sanitize, Fuzz, and Harden Your C Code.srt

30.2 KB

Security and Usability from the Frontlines of Enterprise IT.mp4

53.8 MB

Security and Usability from the Frontlines of Enterprise IT.srt

49.5 KB

Server-side Second Factors.mp4

35.7 MB

Server-side Second Factors.srt

33.1 KB

Several Horror Stories about the Encrypted Web.mp4

36.0 MB

Several Horror Stories about the Encrypted Web.srt

45.7 KB

Social Media Self-Defense - A Guide to Stopping Stalkers.mp4

32.8 MB

Social Media Self-Defense - A Guide to Stopping Stalkers.srt

32.2 KB

The Global Conversation on Encryption.mp4

46.8 MB

The Global Conversation on Encryption.srt

38.9 KB

The Golden Age of Bulk Surveillance.mp4

36.5 MB

The Golden Age of Bulk Surveillance.srt

34.2 KB

Timeless Debugging.mp4

47.3 MB

Timeless Debugging.srt

37.5 KB

ToStaticHTML for Everyone About DOMPurify.mp4

43.2 MB

ToStaticHTML for Everyone About DOMPurify.srt

42.8 KB

Trailer.mp4

1.6 MB

Trust Beyond the First Hop - What Really Happens to Data Sent to HTTPS Websites.mp4

43.8 MB

Trust Beyond the First Hop-What Really Happens to Data Sent to HTTPS Websites.srt

32.8 KB

Usable Security - The Source Awakens.mp4

35.6 MB

Usable Security-The Source Awakens.srt

28.3 KB

USENIX Enigma 2016 - A Million Hit Points and Infinite Charisma - How Games Can Fix.mp4

39.4 MB

Verification, Auditing, and Evidence - If We Did Not Notice Anything Wrong.mp4

44.9 MB

Verification, Auditing, and Evidence - If We Did Not Notice Anything Wrong.srt

39.3 KB

We Need Something Better-Building STAR Vote.mp4

46.4 MB

We Need Something Better-Building STAR Vote.srt

30.4 KB

What Makes Software Exploitation Hard.mp4

52.7 MB

What Makes Software Exploitation Hard.srt

37.2 KB

Why Enigma.mp4

4.5 MB

Why Enigma.srt

2.9 KB

Why Is Usable Security Hard, and What Should We Do about it.mp4

43.7 MB

Why Is Usable Security Hard, and What Should We Do about it.srt

38.0 KB

/.../Enigma 2018 Conference Program USENIX_files/

albert_kendra_100x115.png

24.5 KB

analytics.js

45.2 KB

application-pdf.png

0.3 KB

brumley_david_100x115.png

22.2 KB

clark_rob_100x115.png

26.9 KB

conti_greg_100x115.png

23.3 KB

corman_joshua_100x115.png

20.2 KB

css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css

4.3 KB

css_jNv4bKwKVm14QrWp-RXFaphgrRAr9CiwgzqfcTWh-HA.css

132.0 KB

css_mMMIpDBXDqo0rCZrN7FoMlBPY0tKvHCE04XYURHXl9M.css

610.1 KB

css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css

3.8 KB

css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css

5.4 KB

das_sauvik_100x115.png

21.8 KB

derr_erik_100x115.png

18.1 KB

elazari_amit_100x115.png

24.4 KB

ellis_casey_100x115.png

27.1 KB

enigma-logo_red_tm_2000x733.png

3.4 KB

font-awesome.css

26.7 KB

gebhart_gennie_100x115.png

24.6 KB

gill_phillippa_100x115.png

22.3 KB

grant_andy_100x115.png

22.5 KB

hildebrandt_melody_100x115.png

24.6 KB

howard_jeremy_100x115.png

27.9 KB

janca_tanya_100x115.png

24.7 KB

jiang_carrie_100x115.png

22.7 KB

js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js

20.5 KB

js_AQDKCRqaqaAAAzbvxcaEQBooKEQA-dFTfff7tzCklI8.js

14.0 KB

js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js

120.3 KB

js_fjSBcoQiz2s5JFYU7Z0v2w3fhgZkax8CZA1Fi71bsVc.js

15.9 KB

js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js

26.8 KB

js_zsU7pE_En9PuEzx00IjN_iCxIwgABAiEwJNkh1iTG9k.js

8.2 KB

leblanc_travis_100x115.png

20.0 KB

lietz_shannon_100x115.png

21.5 KB

marczak_bill_100x115.png

24.4 KB

maurer_tim_100x115.png

15.8 KB

mccardle_rob_100x115.png

22.4 KB

mcpeak_travis_100x115.png

24.4 KB

mcreynolds_emily_100x115.png

20.4 KB

milka_grzegorz_100x115.png

28.1 KB

narayanan_arvind_100x115.png

23.2 KB

near_joe_100x115.png

20.7 KB

ryan_lilly_100x115.png

29.1 KB

sedova-masha_100x115.png

25.6 KB

slides.svg

0.7 KB

sullivan_nick_100x115.png

25.1 KB

truppi_jason_100x115.png

22.2 KB

usenix-locked.png

1.4 KB

valeriano_brandon_100x115.png

21.5 KB

varia_mayank_100x115.png

22.3 KB

vehent_julian_100x115.png

22.6 KB

video.svg

0.8 KB

vigna_giovanni_100x115.png

21.7 KB

waller_paul_100x115.png

20.3 KB

weis_steve_100x115.png

18.9 KB

woodruff_allison_100x115.png

26.2 KB

wright_charles_100x115.png

23.8 KB

zimmer_bryan_100x115.png

24.6 KB

/Enigma 2017/

Enigma 2017 Conference Program USENIX.htm

299.7 KB

Enigma 2017 Conference.htm

350.8 KB

/.../Enigma 2017 Conference Program USENIX_files/

adida_ben_100x115.jpg

11.4 KB

analytics.js

45.2 KB

application-pdf.png

0.3 KB

blum_manuel_sunglasses_100x115.jpg

17.6 KB

booher_timothy_100x115.jpg

14.3 KB

conley_chris_100x115.jpg

13.9 KB

consolvo_sunny_100x115.png

20.1 KB

cranor_lorrie-faith_100x115.jpg

13.3 KB

css_bNQhEiSGvhP4uYPPsVZxRFY91MGD9EliUfdDiA1wvhE.css

11.3 KB

css_qddWIqgagc9fbrOg019WVayQvwbVYpj-jNfZJGkj3l8.css

188.9 KB

css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css

3.8 KB

css_xE-rWrJf-fncB6ztZfd2huxqgxu4WO-qwma6Xer30m4.css

7.6 KB

dumitras_tudor_100x115.jpg

13.3 KB

enigma-logo.png

32.4 KB

equal_respect_white_150x68.png

4.1 KB

evans_david_100x115.jpg

12.1 KB

facebook.png

1.3 KB

gleicher_nathaniel_100x115.jpg

11.2 KB

google-plus.png

0.4 KB

haken_ian_100x115.jpg

12.3 KB

irazoqui_gorka_100x115.jpg

13.4 KB

js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js

20.5 KB

js_DxnG51urgJDX4OTVcQBu1okYvVzFssi84PpdeKo__nE.js

196.2 KB

js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js

120.3 KB

js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js

26.8 KB

js_x3e8S2TUtiV35IQmEHMfmTgE8FOPXcOKLcvEo83wyXk.js

18.2 KB

karmarkar_uma_100x115.jpg

13.4 KB

kenneally_erin_100x115.jpg

13.7 KB

kim_yongdae_100x115.jpg

11.6 KB

launchbury_john_100x115.jpg

10.5 KB

levy_ian_100x115_0.jpg

12.7 KB

limbago_andrea_100x115_0.jpg

12.5 KB

lowenthal_tom_100x115.png

28.5 KB

mahjoub_dhia_100x115.jpg

10.6 KB

marosi_attila_100x115.jpg

12.9 KB

menscher_damian_100x115.png

22.9 KB

molnar_david_100x115.png

23.6 KB

nagliari_jack_100x115.jpg

13.1 KB

oliveira_daniela_100x115_0.jpg

13.7 KB

papernot_nicolas_100x115.jpg

12.8 KB

roesner_franziska_100x115.jpg

12.4 KB

schechter_emily_100x115.jpg

11.8 KB

slides_16.png

1.3 KB

sugarman_eli_100x115.jpg

14.1 KB

thrift_hudson_100x115.png

21.1 KB

tsiskaridze_nestan_100x115.jpg

15.4 KB

tufekci_zeynep_100x115.jpg

15.4 KB

twitter.png

1.6 KB

usenix-locked.png

1.4 KB

vance_anthony_100x115.jpg

12.5 KB

vehent_julien_100x115_0.jpg

12.9 KB

video_16.png

1.4 KB

wiswell_lisa_100x115.jpg

13.2 KB

youtube.png

2.5 KB

/.../Enigma 2017 Conference_files/

1m-9n624Lhw.htm

75.4 KB

analytics.js

45.2 KB

blum_manuel_300.jpg

135.4 KB

brumley.png

68.3 KB

css_mQd1YeVeFsJde7YU6LYIcXa_7QlmB58IygdmcoSTjPA.css

8.6 KB

css_qddWIqgagc9fbrOg019WVayQvwbVYpj-jNfZJGkj3l8.css

188.9 KB

css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css

3.8 KB

css_xE-rWrJf-fncB6ztZfd2huxqgxu4WO-qwma6Xer30m4.css

7.6 KB

david_brumley.jpg

25.0 KB

enigma-logo.png

32.4 KB

enigma-logo_red_tm_800x384.png

17.6 KB

enigma_highlights.jpg

68.8 KB

enigma_sign_up_black_left.png

140.4 KB

equal_respect_white_150x68.png

4.1 KB

facebook.png

1.3 KB

google-plus.png

0.4 KB

js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js

20.5 KB

js_DxnG51urgJDX4OTVcQBu1okYvVzFssi84PpdeKo__nE.js

196.2 KB

js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js

120.3 KB

js_PACmgStbFksqYzX-HlEqBZWNu18Gac4c9Dc2EzyjEsM.js

8.3 KB

js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js

26.8 KB

js_zsU7pE_En9PuEzx00IjN_iCxIwgABAiEwJNkh1iTG9k.js

8.2 KB

parisa_tabriz.jpg

7.2 MB

payne.png

34.0 KB

roesner.png

42.7 KB

schechter_emily_close_300.png

199.7 KB

tabriz.png

45.3 KB

tufekci_zeynep_300x300.jpg

138.8 KB

twitter.png

1.6 KB

youtube.png

2.5 KB

yubico_enigma_200x80.png

4.0 KB

yubico_enigma_400x110.png

6.8 KB

/.../1m-9n624Lhw_data/

base.js

1.3 MB

embed.js

24.6 KB

remote.js

89.8 KB

www-embed-player.js

120.0 KB

www-player-webp.css

282.6 KB

/.../Enigma 2017 Presentations/

Adversarial Examples in Machine Learning - enigma17_slides_papernot.pdf

2.8 MB

Brains Can Be Hacked. Why Should You Care - enigma_slides_bonaci.pdf

6.7 MB

Classifiers under Attack - enigma17_slides_evans.pdf

24.1 MB

Deviation from the Norms The Necessity and Challenges of a Norms-based Approach to Digital Offense - enigma_slides_limbago.pdf

10.3 MB

Drawing the Foul Operation of a DDoS Honeypot - enigma17_slides_menscher.pdf

1.6 MB

FeatureSmith Learning to Detect Malware by Mining the Security Literature - enigma17_slides_dumitras.pdf

4.0 MB

Ghost in the Machine Challenges in Embedded Binary Security - enigma_slides_wetzels.pdf

4.7 MB

Hacking Sensors - enigma17_slides_kim.pdf

14.7 MB

How WhatsApp Reduced Spam while Launching End-to-End Encryption - enigma17_slides_jones.pdf

2.0 MB

Inside MOAR TLS How We Think about Encouraging External HTTPS Adoption on the Web - enigma_slides_schechter.pdf

1.3 MB

IoT a Cybercriminal Paradise - enigma17_slides_marosi.pdf

9.8 MB

LLC Cache Attacks Applicability and Countermeasures - enigma17_slides_irazoqui.pdf

1.9 MB

Publishable Humanly Usable Secure Password Creation Schemas, Manuel Blum and Santosh Vempala.pdf

320.1 KB

Putting Privacy Notices to the Test - enigma17_slides_cranor.pdf

4.9 MB

Secrets at Scale Automated Bootstrapping of Secrets & Identity in the Cloud Slides - enigma_haken_slides.pdf

1.5 MB

Security for Vulnerable Populations-On the Interplay of Weapons of Influence and Life Domains - enigma2017_slides_oliveira.pdf

4.4 MB

Startups plus Industry How Everyone Can Win - enigma17_slides_thrift.pdf

525.4 KB

StreamAlert A Serverless Real-time Intrusion Detection Engine - enigma17_slides_naglieri.pdf

4.7 MB

Test Driven Security in Continuous Integration - enigma17_slides_vehent.pdf

2.7 MB

The Paper Ballot Is Not Enough - enigma17_slides_adida.pdf

2.8 MB

Understanding and Designing for End User Security Expectations - enigma17_slides_roesner.pdf

15.6 MB

What Cybersecurity Can Learn from the Secret Service - enigma17_slides_gleicher.pdf

19.4 MB

What Does the Brain Tell Us about Usable Security - enigma_slides_vance.pdf

23.8 MB

Why Philanthropy Is Critical for Cybersecurity - enigma_slides_sugarman.pdf

3.0 MB

/.../Enigma 2017 Videos/

Adversarial Examples in Machine Learning.mp4

20.9 MB

As We May Code.mp4

24.7 MB

Behaviors and Patterns of Bulletproof and Anonymous Hosting Providers.mp4

22.9 MB

Beyond Warm & Fuzzy Ethics as a Value Prop.mp4

30.6 MB

Brains Can Be Hacked. Why Should You Care.mp4

23.1 MB

Classifiers under Attack.mp4

18.4 MB

Cyber Security A DARPA Perspective.mp4

28.5 MB

Deviation from the Norms The Necessity and Challenges.mp4

28.6 MB

Drawing the Foul Operation of a DDoS Honeypot.mp4

22.4 MB

FeatureSmith Learning to Detect Malware by Mining the Security Literature.mp4

22.8 MB

Ghost in the Machine Challenges in Embedded Binary Security.mp4

21.8 MB

Green Sprouts Encouraging Signs of Life from the Department of.mp4

37.1 MB

Hacking Sensors.mp4

24.0 MB

How WhatsApp Reduced Spam while Launching End-to-End Encryption.mp4

22.8 MB

Human Computation with an Application to Passwords.mp4

26.5 MB

Inside MOAR TLS - How We Think about Encouraging External.mp4

30.0 MB

IoT, a Cybercriminals Paradise.mp4

19.3 MB

Legislative Engineering Design Privacy Laws, don't Just Draft Them.mp4

26.5 MB

Leveraging the Power of Automated Reasoning in.mp4

32.6 MB

LLC Cache Attacks Applicability and Countermeasures.mp4

19.7 MB

Moving Account Recovery beyond Email and the Secret Question.mp4

28.8 MB

National Scale Cyber Security.mp4

30.9 MB

Neural and Behavioral Insights on Trust.mp4

25.6 MB

Putting Privacy Notices to the Test.mp4

25.1 MB

Secrets at Scale Automated Bootstrapping of Secrets & Identity in the Cloud.mp4

19.2 MB

Security for Vulnerable Populations - On the Interplay of.mp4

28.9 MB

Security in the Wild for Low-Profile Activists.mp4

37.7 MB

Startups - Industry How Everyone Can Win.mp4

34.3 MB

StreamAlert A Serverless, Real-time Intrusion Detection Engine.mp4

17.2 MB

Test Driven Security in Continuous Integration.mp4

25.6 MB

The Paper Ballot Is Not Enough.mp4

27.0 MB

Understanding and Designing for End Users Security Expectations.mp4

27.2 MB

Understanding and Securing DoD Weapon Systems.mp4

21.1 MB

What Cybersecurity Can Learn from the Secret Service.mp4

26.3 MB

What Does the Brain Tell Us about Usable Security.mp4

20.5 MB

Why Philanthropy Is Critical for Cybersecurity.mp4

33.0 MB

Wont Somebody Please Think of the Journalists.mp4

26.4 MB

/Enigma 2018/

Enigma 2018 Conference Program USENIX.htm

288.2 KB

Enigma 2018 USENIX.htm

98.9 KB

/.../Enigma 2018 Conference Program USENIX_files/

albert_kendra_100x115.png

24.5 KB

analytics.js

45.2 KB

application-pdf.png

0.3 KB

brumley_david_100x115.png

22.2 KB

clark_rob_100x115.png

26.9 KB

conti_greg_100x115.png

23.3 KB

corman_joshua_100x115.png

20.2 KB

css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css

4.3 KB

css_jNv4bKwKVm14QrWp-RXFaphgrRAr9CiwgzqfcTWh-HA.css

132.0 KB

css_mMMIpDBXDqo0rCZrN7FoMlBPY0tKvHCE04XYURHXl9M.css

610.1 KB

css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css

3.8 KB

css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css

5.4 KB

das_sauvik_100x115.png

21.8 KB

derr_erik_100x115.png

18.1 KB

elazari_amit_100x115.png

24.4 KB

ellis_casey_100x115.png

27.1 KB

enigma-logo_red_tm_2000x733.png

3.4 KB

font-awesome.css

26.7 KB

gebhart_gennie_100x115.png

24.6 KB

gill_phillippa_100x115.png

22.3 KB

grant_andy_100x115.png

22.5 KB

hildebrandt_melody_100x115.png

24.6 KB

howard_jeremy_100x115.png

27.9 KB

janca_tanya_100x115.png

24.7 KB

jiang_carrie_100x115.png

22.7 KB

js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js

20.5 KB

js_AQDKCRqaqaAAAzbvxcaEQBooKEQA-dFTfff7tzCklI8.js

14.0 KB

js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js

120.3 KB

js_fjSBcoQiz2s5JFYU7Z0v2w3fhgZkax8CZA1Fi71bsVc.js

15.9 KB

js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js

26.8 KB

js_zsU7pE_En9PuEzx00IjN_iCxIwgABAiEwJNkh1iTG9k.js

8.2 KB

leblanc_travis_100x115.png

20.0 KB

lietz_shannon_100x115.png

21.5 KB

marczak_bill_100x115.png

24.4 KB

maurer_tim_100x115.png

15.8 KB

mccardle_rob_100x115.png

22.4 KB

mcpeak_travis_100x115.png

24.4 KB

mcreynolds_emily_100x115.png

20.4 KB

milka_grzegorz_100x115.png

28.1 KB

narayanan_arvind_100x115.png

23.2 KB

near_joe_100x115.png

20.7 KB

ryan_lilly_100x115.png

29.1 KB

sedova-masha_100x115.png

25.6 KB

slides.svg

0.7 KB

sullivan_nick_100x115.png

25.1 KB

truppi_jason_100x115.png

22.2 KB

usenix-locked.png

1.4 KB

valeriano_brandon_100x115.png

21.5 KB

varia_mayank_100x115.png

22.3 KB

vehent_julian_100x115.png

22.6 KB

video.svg

0.8 KB

vigna_giovanni_100x115.png

21.7 KB

waller_paul_100x115.png

20.3 KB

weis_steve_100x115.png

18.9 KB

woodruff_allison_100x115.png

26.2 KB

wright_charles_100x115.png

23.8 KB

zimmer_bryan_100x115.png

24.6 KB

/.../Enigma 2018 Presentations/

Anatomy of Account Takeover - enigma18_milka.pdf

4.8 MB

Being Creative, Securely - enigma18_hildebrandt.pdf

2.6 MB

Bits & Bytes, Flesh & Blood and Saving Real Lives via Clinical Simulations - enigma18_slides_corman.pdf

14.2 MB

Compliance is not Security (Except When It Might Be) - enigma18_clark.pdf

5.7 MB

Crypto Crumple Zones Protecting Encryption in a Time of Political Uncertainty - enigma18_wright.pdf

23.9 MB

Cryptographically Secure Data Analysis for Social Good - enigma18_slides_varia.pdf

19.8 MB

Cyber Strategy The Evolving Nature of Cyber Power and Coercion - enigma18_valeriano.pdf

31.0 MB

Emerging Cryptography - enigma18_weis.pdf

5.0 MB

Gig Work and the Digital Security Divide - enigma18_albert.pdf

33.3 MB

Going Nuclear Programmatic Protections against Extreme Vetting, Social Pressures, and Coercion - enigma18_marie.pdf

5.0 MB

Insecurity in Information Technology - enigma18_slides_janca.pdf

9.4 MB

Least Privilege Security Gain without Developer Pain - enigma18_mcpeak.pdf

8.3 MB

LISA A Practical Zero Trust Architecture - enigma18_zimmer_0.pdf

8.5 MB

Privacy at Instagram - enigma18_slides_jiang.pdf

7.2 MB

Protecting Financial Stability against Cyber Threats Proposal for an International Agreement - enigma18_maurer_0.pdf

10.2 MB

Protecting Firefox Data with Content Signatures - enigma18_vehent.pdf

593.5 KB

Social Cybersecurity Reshaping Security through an Empirical Understanding of Human Social Behavior - enigma18_das.pdf

7.1 MB

Some Thoughts on Deep Learning and Infosec - enigma18_slides_howard.pdf

25.1 MB

Surfing the Motivation Wave to Create Security Behavior Change - enigma18_sedova.pdf

3.5 MB

The Great Cryptographic Divide - enigma18_truppi.pdf

7.1 MB

The Impact of Third-party Code on Android App Security - enigma18_derr.pdf

2.0 MB

The Web Tracking Arms Race Past, Present, and Future - enigma18_narayanan.pdf

874.1 KB

We Gave You This Internet, Now Play by Our Rules - enigma18_slides_gebhart.pdf

4.3 MB

What Would You Do With a Nation-State Cyber Army - enigma18_conti_0.pdf

26.1 MB

When Malware is Packing Heat - enigma18_vigna.pdf

6.4 MB

/.../Enigma 2018 USENIX_files/

analytics.js

45.2 KB

bluecat_300x120.png

6.7 KB

coinbase_300x120.png

4.0 KB

css_mMMIpDBXDqo0rCZrN7FoMlBPY0tKvHCE04XYURHXl9M.css

610.1 KB

css_Tvyih1Dm489siBROXzFSkKUCFbsEK9kCr0p3JDiev80.css

129.3 KB

css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css

3.8 KB

css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css

5.4 KB

css_Zsye0BYLWwrWJtw3lsEyOEQfxzw_w30Qw0yKf0mDea0.css

7.7 KB

dropbox_300x120_0.png

4.7 KB

duo_horizontal_300x120.png

2.4 KB

elazari_amit_carousel.png

138.4 KB

enigma-logo_red_tm_2000x733.png

3.4 KB

enigma_conference_banner.png

241.7 KB

equal_respect_300x120.png

2.9 KB

facebook_2016_300x120_3.png

3.9 KB

font-awesome.css

26.7 KB

google_600x240_0.png

6.7 KB

hildebrandt_melody_carousel.png

146.3 KB

js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js

20.5 KB

js_4Mo-xkyNBoebVcNI-pI_dJ8NV9WVtkRJYbf2cgSYcDA.js

40.2 KB

js_AQDKCRqaqaAAAzbvxcaEQBooKEQA-dFTfff7tzCklI8.js

14.0 KB

js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js

120.3 KB

js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js

26.8 KB

js_zsU7pE_En9PuEzx00IjN_iCxIwgABAiEwJNkh1iTG9k.js

8.2 KB

leblanc_travis_carousel.png

91.2 KB

mapbox_300x120.png

4.7 KB

milka_grzegorz_300x300.png

162.7 KB

netflix_300x120_1.png

2.8 KB

patternex_300x120.png

4.4 KB

payne_bryan_200.jpg

9.9 KB

roesner_franziska_200.jpg

11.4 KB

santa_clara_map_slice_01.jpg

32.1 KB

santa_clara_map_slice_02.jpg

78.8 KB

shopify_300x120_0.png

5.9 KB

sullivan_nick_300x300.png

150.1 KB

usenix_logo_300x150_neat_2.png

15.0 KB

vigna_giovanni_300x300.png

122.6 KB

weis_steve_carousel.png

95.3 KB

wisp_300x120.png

7.1 KB

/.../Enigma 2018 Videos/

Anatomy of Account Takeover.eng.srt

43.6 KB

Anatomy of Account Takeover.mp4

14.1 MB

Being Creative, Securely.eng.srt

60.5 KB

Being Creative, Securely.mp4

26.8 MB

Bits & Bytes, Flesh & Blood, and Saving Real Lives via Clinical Simulations.eng.srt

65.7 KB

Bits & Bytes, Flesh & Blood, and Saving Real Lives via Clinical Simulations.mp4

32.0 MB

Combining the Power of Builders and Breakers.eng.srt

61.4 KB

Combining the Power of Builders and Breakers.mp4

26.9 MB

Compliance = Security (Except When It Might Be).eng.srt

65.1 KB

Compliance = Security (Except When It Might Be).mp4

22.0 MB

Crypto Crumple Zones - Protecting Encryption in a Time of Political Uncertain'ty.eng.srt

66.2 KB

Crypto Crumple Zones - Protecting Encryption in a Time of Political Uncertain'ty.mp4

19.6 MB

Cryptographically Secure Data Analysis for Social Good.eng.srt

71.9 KB

Cryptographically Secure Data Analysis for Social Good.mp4

30.4 MB

Cyber Strategy - The Evolving Nature of Cyber Power and Coercion.eng.srt

52.6 KB

Cyber Strategy - The Evolving Nature of Cyber Power and Coercion.mp4

28.3 MB

Developing a Science of Internet Censorship Resistance - Opportunities and.eng.srt

54.5 KB

Developing a Science of Internet Censorship Resistance - Opportunities and.mp4

17.1 MB

Differential Privacy at Scale - Uber and Berkeley Collaboration.eng.srt

69.0 KB

Differential Privacy at Scale - Uber and Berkeley Collaboration.mp4

17.7 MB

Emerging Cryptography.eng.srt

57.6 KB

Emerging Cryptography.mp4

21.9 MB

Gig Work and the Digital Security Divide.eng.srt

58.2 KB

Gig Work and the Digital Security Divide.mp4

19.5 MB

Going Nuclear - Programmatic Protections against.eng.srt

63.4 KB

Going Nuclear - Programmatic Protections against.mp4

26.6 MB

Hacking the Law - Are Bug Bounties a True Safe Harbor.eng.srt

52.5 KB

Hacking the Law - Are Bug Bounties a True Safe Harbor.mp4

31.3 MB

Hats off to DevSecOps.eng.srt

66.9 KB

Hats off to DevSecOps.mp4

30.5 MB

Insecurity in Information Technology.eng.srt

55.2 KB

Insecurity in Information Technology.mp4

27.5 MB

IoE, Connecting Regulation to Risk.eng.srt

63.8 KB

IoE, Connecting Regulation to Risk.mp4

29.7 MB

Least Privilege - Security Gain without Developer Pain.eng.srt

52.3 KB

Least Privilege - Security Gain without Developer Pain.mp4

19.8 MB

LISA - A Practical Zero Trust Architecture.eng.srt

69.9 KB

LISA - A Practical Zero Trust Architecture.mp4

20.6 MB

Modern Mind Control - Public Opinion Manipulation in Our Online World.eng.srt

67.4 KB

Modern Mind Control - Public Opinion Manipulation in Our Online World.mp4

29.1 MB

Privacy @ Instagram.eng.srt

41.7 KB

Privacy @ Instagram.mp4

12.7 MB

Protecting Financial Stability against Cyber.eng.srt

68.4 KB

Protecting Financial Stability against Cyber.mp4

20.0 MB

Protecting Firefox Data with Content Signatures.eng.srt

55.5 KB

Protecting Firefox Data with Content Signatures.mp4

16.1 MB

Rage against the Ghost in the Machine.eng.srt

58.7 KB

Rage against the Ghost in the Machine.mp4

29.0 MB

Security Technology Adoption Building Hardware Is Just the Start.eng.srt

46.2 KB

Security Technology Adoption Building Hardware Is Just the Start.mp4

18.1 MB

Social Cybersecurity - Reshaping Security.eng.srt

60.8 KB

Social Cybersecurity - Reshaping Security.mp4

21.3 MB

Some Thoughts on Deep Learning and Infosec.eng.srt

56.1 KB

Some Thoughts on Deep Learning and Infosec.mp4

20.5 MB

Stranger Things - Who’s Listening When the Device Is Always On.eng.srt

51.0 KB

Stranger Things - Who’s Listening When the Device Is Always On.mp4

25.1 MB

Surfing the Motivation Wave to Create Security Behavior Change.eng.srt

63.6 KB

Surfing the Motivation Wave to Create Security Behavior Change.mp4

23.1 MB

The Evolving Architecture of the Web and Its Impact on Security.eng.srt

41.1 KB

The Evolving Architecture of the Web and Its Impact on Security.mp4

14.1 MB

The Future of Cyber-Autonomy.eng.srt

66.2 KB

The Future of Cyber-Autonomy.mp4

27.1 MB

The Great Cryptographic Divide.eng.srt

64.3 KB

The Great Cryptographic Divide.mp4

50.2 MB

The Impact of Third-party Code on Android App Security.eng.srt

48.7 KB

The Impact of Third-party Code on Android App Security.mp4

14.4 MB

The Web Tracking Arms Race - Past, Present, and Future.eng.srt

72.3 KB

The Web Tracking Arms Race - Past, Present, and Future.mp4

25.9 MB

We Gave You This Internet, Now Play by Our Rules.eng.srt

64.0 KB

We Gave You This Internet, Now Play by Our Rules.mp4

25.0 MB

What Would You Do With a Nation-State Cyber Army.eng.srt

53.6 KB

What Would You Do With a Nation-State Cyber Army.mp4

21.8 MB

When Malware is Packin’ Heat.mp4

24.4 MB

/Enigma 2019/

Enigma 2019 Conference Program USENIX.htm

270.3 KB

Enigma 2019 Grid.htm

124.4 KB

Enigma 2019 USENIX.htm

103.7 KB

/.../Enigma 2019 Conference Program USENIX_files/

adida_ben_2018_200x230.png

23.4 KB

afroz_sadia_200x230.jpg

14.0 KB

analytics.js

45.2 KB

anderson_jennifer_200x230.jpg

12.1 KB

application-pdf.png

0.3 KB

borgolte_kevin_200x230.jpg

7.7 KB

bursztein_elie_200x230_1.jpg

11.3 KB

cavallaro_lorenzo_200x230.jpg

11.4 KB

css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css

4.3 KB

css_jNv4bKwKVm14QrWp-RXFaphgrRAr9CiwgzqfcTWh-HA.css

132.0 KB

css_mMMIpDBXDqo0rCZrN7FoMlBPY0tKvHCE04XYURHXl9M.css

610.1 KB

css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css

3.8 KB

css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css

5.4 KB

dharamshi_tejas_200x230.jpg

15.7 KB

dixon-denelle_200x230.jpg

10.9 KB

doerfler_periwinkle_200x230.jpg

16.4 KB

dumitras_tudor_200x230.jpg

13.1 KB

egelman_serge_200x230.jpg

10.4 KB

enigma-logo_red_tm_2000x733.png

3.4 KB

font-awesome.css

26.7 KB

gaddam_ajit_100x115.jpg

12.2 KB

grattafiori_aaron_200x230.jpg

13.5 KB

js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js

20.5 KB

js_AQDKCRqaqaAAAzbvxcaEQBooKEQA-dFTfff7tzCklI8.js

14.0 KB

js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js

120.3 KB

js_fjSBcoQiz2s5JFYU7Z0v2w3fhgZkax8CZA1Fi71bsVc.js

15.9 KB

js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js

26.8 KB

js_zsU7pE_En9PuEzx00IjN_iCxIwgABAiEwJNkh1iTG9k.js

8.2 KB

lackey_ryan_200x230.jpg

10.4 KB

limbago_andrea_200x230.jpg

15.5 KB

livshits_ben_200x230.jpg

16.9 KB

lord_bob_200x230.jpg

10.1 KB

loveless_mark_200x230.jpg

10.9 KB

lusthaus_jonathan_200x230.jpg

12.3 KB

mayrhofer_rene_200x230.jpg

9.7 KB

nikolich_anita_200x230.jpg

10.0 KB

oliveira_daniela_200x230.jpg

13.8 KB

rajan_anjana_200x230.jpg

17.1 KB

runga_neha_200x230.jpg

13.4 KB

slides.svg

0.7 KB

smeets_max_200x230.jpg

12.0 KB

smolen_alex_200x230.jpg

9.4 KB

snyder_peter_200x230.jpg

12.5 KB

soltani_ashkan_200x230.jpg

12.5 KB

stark_emily_200x230.jpg

12.8 KB

sturton_cynthia_200x230.jpg

12.5 KB

usenix-locked.png

1.4 KB

video.svg

0.8 KB

walther_puri_munish_200x230.jpg

12.4 KB

weaver_nicholas_200x230.jpg

12.1 KB

white_andrew_200x230.jpg

12.9 KB

zappala_daniel_200x230.jpg

13.0 KB

/.../Enigma 2019 Grid_files/

app-apple.svg

7.9 KB

app-google.svg

4.5 KB

bootstrap-custom.css

94.0 KB

custom-screen.css

0.3 KB

jquery.js

97.2 KB

jquery_002.js

2.6 KB

jquery_003.js

96.4 KB

jquery_004.js

38.3 KB

loading-3x.gif

13.3 KB

main-current.css

135.9 KB

main.js

73.7 KB

responsive.css

6.4 KB

/.../Enigma 2019 Presentations/

Building Identity for an Open Perimeter - enigma2019_slides_dharamshi.pdf

80.2 MB

Grey Science - enigma2019_slides_nikolich.pdf

731.9 KB

Hardware Security Modules The Ultimate Black Boxes - enigma2019_slides_lackey.pdf

7.2 MB

/.../Enigma 2019 USENIX_files/

adida_ben_2018_200x230.png

23.4 KB

amazon_600x240_4.png

4.7 KB

analytics.js

45.2 KB

aspentechhub_600x240.png

4.3 KB

cavallaro_lorenzo_300.jpg

15.5 KB

css_mMMIpDBXDqo0rCZrN7FoMlBPY0tKvHCE04XYURHXl9M.css

610.1 KB

css_Tvyih1Dm489siBROXzFSkKUCFbsEK9kCr0p3JDiev80.css

129.3 KB

css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css

3.8 KB

css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css

5.4 KB

css_Zsye0BYLWwrWJtw3lsEyOEQfxzw_w30Qw0yKf0mDea0.css

7.7 KB

dixon_denelle_300.jpg

19.3 KB

dropbox_2018_600x240_2.png

3.3 KB

eff_2018_red_600x240_1.png

1.6 KB

enigma-logo_red_tm_2000x733.png

3.4 KB

enigma2019_conference_banner_700_1.png

65.1 KB

enigma2019_neat_map_left.png

266.3 KB

facebook_600x240_1.png

3.7 KB

font-awesome.css

26.7 KB

google_600x240_0.png

6.7 KB

js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js

20.5 KB

js_4Mo-xkyNBoebVcNI-pI_dJ8NV9WVtkRJYbf2cgSYcDA.js

40.2 KB

js_AQDKCRqaqaAAAzbvxcaEQBooKEQA-dFTfff7tzCklI8.js

14.0 KB

js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js

120.3 KB

js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js

26.8 KB

js_zsU7pE_En9PuEzx00IjN_iCxIwgABAiEwJNkh1iTG9k.js

8.2 KB

kaspersky_lab_600x240.png

4.2 KB

lord_bob_300.jpg

14.7 KB

microsoft-logo_600x240.png

3.2 KB

netflix_600x240_0.png

2.9 KB

nikolich_anita_300.jpg

16.1 KB

oliveira_daniela_300.jpg

22.9 KB

roesner_franziska_200.jpg

11.4 KB

shopify_600x240.png

5.3 KB

soltani_ashkan_300.jpg

18.5 KB

stark_emily_300.jpg

19.4 KB

stripe_600x240.png

3.5 KB

tanium_600x240.png

2.3 KB

uber_600x240.png

3.7 KB

usenix_logo_300x150_neat_2.png

15.0 KB

/.../Enigma 2019 Videos/

Abusability Testing - Considering the Ways Your Technology Might Be Used.eng.srt

64.9 KB

Abusability Testing - Considering the Ways Your Technology Might Be Used.mp4

22.9 MB

Building a Secure Data Market on Blockchain.eng.srt

72.9 KB

Building a Secure Data Market on Blockchain.mp4

28.3 MB

Building Identity for an Open Perimeter.eng.srt

55.0 KB

Building Identity for an Open Perimeter.mp4

21.8 MB

Callisto - A Cryptographic Approach to #MeToo.eng.srt

56.0 KB

Callisto - A Cryptographic Approach to #MeToo.mp4

16.9 MB

Convincing the Loser - Securing Elections against Modern Threats.eng.srt

61.9 KB

Convincing the Loser - Securing Elections against Modern Threats.mp4

22.0 MB

Countering Adversarial Cyber Campaigns.eng.srt

50.3 KB

Countering Adversarial Cyber Campaigns.mp4

20.3 MB

Cryptocurrency - Burn It with Fire.eng.srt

53.5 KB

Cryptocurrency - Burn It with Fire.mp4

26.0 MB

Digital Authoritarianism, Data Protection, and the Battle.eng.srt

81.7 KB

Digital Authoritarianism, Data Protection, and the Battle.mp4

24.0 MB

Grey Science.eng.srt

60.4 KB

Grey Science.mp4

17.5 MB

Hardware Is the New Software - Finding Exploitable Bugs in Hardware Designs.eng.srt

60.8 KB

Hardware Is the New Software - Finding Exploitable Bugs in Hardware Designs.mp4

15.4 MB

Hardware Security Modules - The Ultimate Black Boxes.eng.srt

72.7 KB

Hardware Security Modules - The Ultimate Black Boxes.mp4

18.5 MB

How to Predict Which Vulnerabilities Will Be Exploited.eng.srt

51.3 KB

How to Predict Which Vulnerabilities Will Be Exploited.mp4

23.2 MB

If Red Teaming Is Easy - You're Doing It Wrong.eng.srt

52.1 KB

If Red Teaming Is Easy - You're Doing It Wrong.mp4

22.0 MB

Insider Attack Resistance in the Android Ecosystem.eng.srt

60.5 KB

Insider Attack Resistance in the Android Ecosystem.mp4

17.4 MB

It's Not - Our - Data - Do We Want to Create a World of No Surprises.eng.srt

60.0 KB

It's Not - Our - Data - Do We Want to Create a World of No Surprises.mp4

22.3 MB

Learning from the Dark Web Dimension of Data.eng.srt

51.7 KB

Learning from the Dark Web Dimension of Data.mp4

21.8 MB

Mobile App Privacy Analysis at Scale.eng.srt

68.2 KB

Mobile App Privacy Analysis at Scale.mp4

22.6 MB

Moving Fast and Breaking Things - Security Misconfigurations.eng.srt

61.5 KB

Moving Fast and Breaking Things - Security Misconfigurations.mp4

18.4 MB

Mr. Lord Goes to Washington, or Applying Security outside the Tech World.eng.srt

67.1 KB

Mr. Lord Goes to Washington, or Applying Security outside the Tech World.mp4

21.9 MB

Next Steps For Browser Privacy - Pursuing Privacy Protections Beyond Extensions.eng.srt

58.5 KB

Next Steps For Browser Privacy - Pursuing Privacy Protections Beyond Extensions.mp4

17.2 MB

Physical OPSEC as a Metaphor for Infosec.eng.srt

53.6 KB

Physical OPSEC as a Metaphor for Infosec.mp4

17.6 MB

Privacy Engineering - Not Just for Privacy Engineers.eng.srt

38.6 KB

Privacy Engineering - Not Just for Privacy Engineers.mp4

14.4 MB

Provable Security at AWS.eng.srt

51.5 KB

Provable Security at AWS.mp4

18.6 MB

Rethinking the Detection of Child Sexual Abuse Imagery on the Internet.eng.srt

45.3 KB

Rethinking the Detection of Child Sexual Abuse Imagery on the Internet.mp4

18.3 MB

Something You Have and Someone You Know-Designing for Interpersonal Security.eng.srt

60.2 KB

Something You Have and Someone You Know-Designing for Interpersonal Security.mp4

22.1 MB

Stethoscope - Securely Configuring Devices without Systems Management.eng.srt

56.3 KB

Stethoscope - Securely Configuring Devices without Systems Management.mp4

17.0 MB

The Kids Aren't Alright-Security and Privacy in the K-12 Classroom.eng.srt

44.6 KB

The Kids Aren't Alright-Security and Privacy in the K-12 Classroom.mp4

25.1 MB

The Offline Dimension of Online Crime.eng.srt

64.4 KB

The Offline Dimension of Online Crime.mp4

18.5 MB

The URLephant in the Room.eng.srt

58.1 KB

The URLephant in the Room.mp4

19.6 MB

Usage of Behavioral Biometric Technologies to Defend Against Bots.eng.srt

62.3 KB

Usage of Behavioral Biometric Technologies to Defend Against Bots.mp4

25.8 MB

User Agent 2.0 - What Can the Browser Do for the User.eng.srt

67.7 KB

User Agent 2.0 - What Can the Browser Do for the User.mp4

24.4 MB

Using Architecture and Abstractions to Design a Security Layer for TLS.eng.srt

74.4 KB

Using Architecture and Abstractions to Design a Security Layer for TLS.mp4

24.7 MB

When the Magic Wears Off - Flaws in ML for Security Evaluations.mp4

24.4 MB

Where Is the Web Closed.eng.srt

52.7 KB

Where Is the Web Closed.mp4

15.8 MB

Why Even Experienced and Highly Intelligent Developers.eng.srt

42.9 KB

Why Even Experienced and Highly Intelligent Developers.mp4

23.7 MB

/Enigma 2020/

Enigma 2020 Conference Program USENIX.htm

245.8 KB

Enigma 2020 Grid.htm

119.7 KB

Enigma 2020 USENIX.htm

111.3 KB

/.../Enigma 2020 Conference Program USENIX_files/

afroz_sadia_200x230_1.jpg

13.9 KB

analytics.js

45.2 KB

application-pdf.png

0.3 KB

arrieta_andres_200x230.jpg

7.1 KB

baker_brandon_200x230.png

21.5 KB

bishop_matt_200x230.jpg

13.3 KB

bozdag_engin_200x230.jpg

13.3 KB

buccini_steven_200x230.jpg

13.9 KB

camp_ljean_200x230.jpg

12.7 KB

css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css

4.3 KB

css_jNv4bKwKVm14QrWp-RXFaphgrRAr9CiwgzqfcTWh-HA.css

132.0 KB

css_mMMIpDBXDqo0rCZrN7FoMlBPY0tKvHCE04XYURHXl9M.css

610.1 KB

css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css

3.8 KB

css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css

5.4 KB

das_sanchari_200x230.jpg

13.8 KB

dodds_joey_130x150.jpg

10.9 KB

enigma-logo_red_tm_2000x733.png

3.4 KB

eoyang_mieke_200x230.jpg

13.2 KB

eshete_birhanu_200x230.jpg

12.5 KB

fernandez_annalisa_200x230.jpg

11.4 KB

fischer_felix_200x230.jpg

11.0 KB

font-awesome.css

26.7 KB

freeman_david_200x230.jpg

14.3 KB

galperin_eva_200x230.jpg

11.9 KB

harvey_sarah_200x230.jpg

12.8 KB

helsby_jennifer_200x230.jpg

15.2 KB

joshi_swathi_200x230.jpg

12.0 KB

js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js

20.5 KB

js_AQDKCRqaqaAAAzbvxcaEQBooKEQA-dFTfff7tzCklI8.js

14.0 KB

js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js

120.3 KB

js_fjSBcoQiz2s5JFYU7Z0v2w3fhgZkax8CZA1Fi71bsVc.js

15.9 KB

js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js

26.8 KB

js_zsU7pE_En9PuEzx00IjN_iCxIwgABAiEwJNkh1iTG9k.js

8.2 KB

kissner_lea_200x230_0.jpg

11.3 KB

kosmides_kathryn_200x230.jpg

14.3 KB

nasser_yomna_200x230.jpg

13.0 KB

papernot_nicolas_200x230_1.jpg

14.1 KB

pearlman_kavya_200x230.jpg

13.6 KB

slides.svg

0.7 KB

usenix-locked.png

1.4 KB

valsorda_filippo_200x230.jpg

12.8 KB

video.svg

0.8 KB

weissinger_laurin_200x230.jpg

13.8 KB

white_kenn_200x230.jpg

12.0 KB

/.../Enigma 2020 Grid_files/

app-apple.svg

7.9 KB

app-google.svg

4.5 KB

bootstrap-custom.css

94.0 KB

custom-screen.css

0.3 KB

jquery.js

38.3 KB

jquery_002.js

97.2 KB

jquery_003.js

2.6 KB

jquery_004.js

96.4 KB

loading-3x.gif

13.3 KB

main-current.css

135.9 KB

main.js

73.7 KB

responsive.css

6.4 KB

/.../Enigma 2020 Presentations/

How Anonymous Is My Anonymized Data - enigma2020_slides_bishop.pdf

532.1 KB

How to Build Realistic Machine Learning Systems for Security - enigma2020_slides_afroz.pdf

2.8 MB

Next-Generation SecureDrop Protecting Journalists from Malware - enigma2020_slides_helsby.pdf

16.8 MB

Platform Data Privacy and Security Strategies for Public Interest Research - enigma2020_slides_buccini.pdf

64.0 MB

Pre-Authentication Messages as a Common Root Cause of Cell Network Attacks - enigma2020_slides_nasser.pdf

1.0 MB

Privacy at Speed Privacy by Design for Agile Development at Uber - enigma2020_slides_bozdag.pdf

4.5 MB

Public Records in the Digital Age Can They Save Lives - enigma2020_slides_kosmides.pdf

4.9 MB

Securing the Software Supply Chain - enigma2020_slides_valsorda.pdf

1.7 MB

Stack Overflo A Story of Two Security Tales - enigma2020_slides_fischer.pdf

2.2 MB

Stop Failing. Start Building for Humanity - enigma2020_slides_kissner.pdf

206.3 KB

The Browser Privacy Arms Race Which Browsers Actually Protect Your Privacy - enigma2020_slides_arrieta.pdf

1.8 MB

Trustworthy Elections - enigma2020_slides_dodds.pdf

3.7 MB

Virtual Reality Brings Real Risks Are We Ready - enigma2020_slides_pearlman.pdf

1.8 MB

What Does It Mean for Machine Learning to Be Trustworthy - enigma2020_slides_papernot.pdf

3.7 MB

/.../Enigma 2020 USENIX_files/

adida_ben_2018_200x230.png

23.4 KB

amazon_600x240_3.png

4.7 KB

analytics.js

45.2 KB

arrieta_andres_300x300.jpg

12.0 KB

avast_600x240_1.png

4.7 KB

css_mMMIpDBXDqo0rCZrN7FoMlBPY0tKvHCE04XYURHXl9M.css

610.1 KB

css_Tvyih1Dm489siBROXzFSkKUCFbsEK9kCr0p3JDiev80.css

129.3 KB

css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css

3.8 KB

css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css

5.4 KB

css_Zsye0BYLWwrWJtw3lsEyOEQfxzw_w30Qw0yKf0mDea0.css

7.7 KB

dropbox_2018_600x240_1.png

3.3 KB

eff_2018_red_600x240_1.png

1.6 KB

enigma-logo_red_tm_2000x733.png

3.4 KB

enigma20_venue.png

290.9 KB

enigma2020_conference_web_banner_final.png

45.4 KB

eshete_birhanu_300x300.jpg

70.8 KB

ethyca_stacked_600x240.png

4.2 KB

facebook_600x240_11.png

2.9 KB

font-awesome.css

26.7 KB

freeman_david_300x300.jpg

79.2 KB

google_600x240_2_1.png

6.7 KB

helsby_jennifer_300x300.jpg

93.9 KB

joshi_swathi_300x300.jpg

73.4 KB

js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js

20.5 KB

js_4Mo-xkyNBoebVcNI-pI_dJ8NV9WVtkRJYbf2cgSYcDA.js

40.2 KB

js_AQDKCRqaqaAAAzbvxcaEQBooKEQA-dFTfff7tzCklI8.js

14.0 KB

js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js

120.3 KB

js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js

26.8 KB

js_zsU7pE_En9PuEzx00IjN_iCxIwgABAiEwJNkh1iTG9k.js

8.2 KB

kaspersky_600x240_1.png

3.7 KB

kissner_lea_300x300.jpg

59.4 KB

netflix_600x240_0.png

2.9 KB

oliveira_daniela_200x230.jpg

13.8 KB

pearlman_kavya_300x300.jpg

70.0 KB

salesforce_600x240.png

5.6 KB

shopify_600x240.png

5.3 KB

uber_600x240.png

3.7 KB

usenix_logo_300x150_neat_2.png

15.0 KB

whitesource_600x240.png

4.2 KB

/.../Enigma 2020 Videos/

Adventures with Cybercrime Toolkits Insights for Pragmatic Defense.eng.srt

24.2 KB

Adventures with Cybercrime Toolkits Insights for Pragmatic Defense.mp4

12.4 MB

All Security Is Good(s) Design Guidance for Economics.eng.srt

35.4 KB

All Security Is Good(s) Design Guidance for Economics.mp4

21.8 MB

BeyondProd The Origin of Cloud-Native Security at Google.eng.srt

44.9 KB

BeyondProd The Origin of Cloud-Native Security at Google.mp4

23.8 MB

Bringing Usable Crypto to 7 Million Developers.eng.srt

55.9 KB

Bringing Usable Crypto to 7 Million Developers.mp4

25.9 MB

Browser Privacy Opportunities and Tradeoffs (Panel).eng.srt

151.1 KB

Browser Privacy Opportunities and Tradeoffs (Panel).mp4

91.0 MB

Catch Me If You Can-Detecting Sandbox Evasion Techniques.eng.srt

30.2 KB

Catch Me If You Can-Detecting Sandbox Evasion Techniques.mp4

14.6 MB

Cybercrime Getting beyond Analog Cops and Digital Robbers.eng.srt

35.3 KB

Cybercrime Getting beyond Analog Cops and Digital Robbers.mp4

26.0 MB

Data as a Social Science Cultural Elements in Privacy and Security.eng.srt

34.2 KB

Data as a Social Science Cultural Elements in Privacy and Security.mp4

19.2 MB

Disinformation (Panel).eng.srt

156.2 KB

Disinformation (Panel).mp4

89.5 MB

Encrypted Messaging (Panel).eng.srt

132.0 KB

Encrypted Messaging (Panel).mp4

113.3 MB

Eyes in Your Child's Bedroom Exploiting Child Data Risks with Smart Toys.eng.srt

36.0 KB

Eyes in Your Child's Bedroom Exploiting Child Data Risks with Smart Toys.mp4

20.0 MB

How Anonymous Is My Anonymized Data.eng.srt

39.5 KB

How Anonymous Is My Anonymized Data.mp4

21.8 MB

How to Build Realistic Machine Learning Systems for Security.eng.srt

32.6 KB

How to Build Realistic Machine Learning Systems for Security.mp4

13.8 MB

Internet Infrastructure Security.eng.srt

34.6 KB

Internet Infrastructure Security.mp4

26.2 MB

Next-Generation SecureDrop Protecting Journalists from Malware.eng.srt

40.6 KB

Next-Generation SecureDrop Protecting Journalists from Malware.mp4

17.6 MB

Platform Data Privacy & Security Strategies for Public Interest Research.eng.srt

41.5 KB

Platform Data Privacy & Security Strategies for Public Interest Research.mp4

18.8 MB

Pre-Authentication Messages as a Common Root Cause of Cell Network Attacks.eng.srt

41.7 KB

Pre-Authentication Messages as a Common Root Cause of Cell Network Attacks.mp4

22.3 MB

Privacy at Speed Privacy by Design for Agile Development at Uber.eng.srt

28.6 KB

Privacy at Speed Privacy by Design for Agile Development at Uber.mp4

13.8 MB

Public Records in the Digital Age Can They Save Lives.eng.srt

33.9 KB

Public Records in the Digital Age Can They Save Lives.mp4

17.9 MB

Reservist Model Distributed Approach to Scaling Incident Response.mp4

11.8 MB

Securing the Software Supply Chain.eng.srt

37.8 KB

Securing the Software Supply Chain.mp4

20.4 MB

Stack Overflow A Story of Two Security Tales.eng.srt

32.7 KB

Stack Overflow A Story of Two Security Tales.mp4

17.3 MB

Stop Failing. Start Building for Humanity.eng.srt

37.8 KB

Stop Failing. Start Building for Humanity.mp4

17.4 MB

The Abuse Uncertain'ty Principle.eng.srt

46.2 KB

The Abuse Uncertain'ty Principle.mp4

23.8 MB

The Browser Privacy Arms Race Which Browsers Actually Protect Your Privacy.eng.srt

35.7 KB

The Browser Privacy Arms Race Which Browsers Actually Protect Your Privacy.mp4

17.2 MB

The State of the Stalkerware.eng.srt

39.6 KB

The State of the Stalkerware.mp4

30.8 MB

Third-Party Integrations Friend or Foe.eng.srt

37.3 KB

Third-Party Integrations Friend or Foe.mp4

24.9 MB

Trustworthy Elections.eng.srt

43.7 KB

Trustworthy Elections.mp4

17.5 MB

Virtual Reality Brings Real Risks Are We Ready.eng.srt

27.1 KB

Virtual Reality Brings Real Risks Are We Ready.mp4

23.5 MB

What Does It Mean for Machine Learning to Be Trustworthy.eng.srt

31.3 KB

What Does It Mean for Machine Learning to Be Trustworthy.mp4

14.9 MB

/Enigma 2021/

Enigma 2021 Conference Program USENIX.html

232.1 KB

Enigma 2021 USENIX.html

95.5 KB

/.../Enigma 2021 Conference Program USENIX_files/

adida_ben_2018_200x230.png

23.4 KB

application-pdf.png

0.3 KB

css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css

4.3 KB

css_jNv4bKwKVm14QrWp-RXFaphgrRAr9CiwgzqfcTWh-HA.css

132.0 KB

css_Pen3ncMGQyB3Q2LWoTho2yu6X-D2T6zOqWITJ4iG9A8.css

611.0 KB

css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css

3.8 KB

css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css

5.4 KB

enigma-logo_red_tm_2000x733.png

3.4 KB

enigma2021_anderson_hyrum_200x230.jpg

11.7 KB

enigma2021_botacin_marcus_200x230.jpg

12.6 KB

enigma2021_cable_jack_200x230.jpg

11.2 KB

enigma2021_celi_sofi_200x230.jpg

12.0 KB

enigma2021_consolvo_sunny_200x230_rev.jpg

11.5 KB

enigma2021_emami-naeini_200x230.jpg

12.3 KB

enigma2021_ensign_melanie_200x230.jpg

13.0 KB

enigma2021_fern_nicole_200x230.jpg

12.1 KB

enigma2021_folini_christian_200x230.jpg

14.6 KB

enigma2021_funk_mark_200x230.jpg

12.0 KB

enigma2021_gage_kelley_patrick_200x230.jpg

10.3 KB

enigma2021_garfinkel_simson_200x230.jpg

14.0 KB

enigma2021_gaynor_alex_200x230.jpg

11.6 KB

enigma2021_herr_trey_200x230.jpg

12.8 KB

enigma2021_hong_sanghyun_200x230.jpg

12.0 KB

enigma2021_huang_kelly_200x230.jpg

13.5 KB

enigma2021_judd_mike_200x230.jpg

12.8 KB

enigma2021_lange_ali_200x230.jpg

11.7 KB

enigma2021_li_tiffany_200x230.jpg

8.3 KB

enigma2021_mou_merry_v2.jpg

9.2 KB

enigma2021_negus_mitch_200x230.jpg

12.6 KB

enigma2021_palmer_chris_200x230.jpg

13.1 KB

enigma2021_quintin_cooper_200x230.jpg

14.3 KB

enigma2021_rrushi_julian_200x230.jpg

9.1 KB

enigma2021_salathe_marcel_200x230.jpg

8.2 KB

enigma2021_starbird_kate_200x230.jpg

14.4 KB

enigma2021_stone_maddie_200x230.jpg

12.0 KB

enigma2021_stringhini_gianluca_200x230.jpg

13.6 KB

enigma2021_troncoso_carmela_200x230.jpg

11.6 KB

font-awesome.css

26.7 KB

js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js

20.5 KB

js_fyV0VVkC6Q3xduxGurKMTFIU2dMmArUrbAdZORL-9WQ.js

0.4 KB

js_l3lGSHpmjPG_uzcz3Shpsi9Iwu4IaSB7us0ldgM0q7g.js

16.3 KB

js_nKHPel07iQ7X6ouVrkRIeMs9JzgU_FAp9nBhDfrhyQc.js

14.8 KB

js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js

26.8 KB

js_wKyFX46tVKJtPKN12qNjRfS4aubW4G2u7LK22vlDiKo.js

133.2 KB

shapiro_scott_200x230.jpg

12.0 KB

slides.svg

0.7 KB

usenix-locked.png

1.4 KB

video.svg

0.8 KB

/.../Enigma 2021 Presentations/

engima2021_slides_stone.pdf

4.0 MB

enigma2021_slide_celi.pdf

897.8 KB

enigma2021_slides_anderson.pdf

2.1 MB

enigma2021_slides_botacin.pdf

3.7 MB

enigma2021_slides_cable.pdf

689.3 KB

enigma2021_slides_emami-naeini.pdf

2.6 MB

enigma2021_slides_ensign.pdf

4.0 MB

enigma2021_slides_fern.pdf

12.6 MB

enigma2021_slides_folini.pdf

1.4 MB

enigma2021_slides_funk.pdf

9.7 MB

enigma2021_slides_garfinkel.pdf

29.3 MB

enigma2021_slides_gaynor.pdf

422.5 KB

enigma2021_slides_herr.pdf

17.8 MB

enigma2021_slides_hong.pdf

19.6 MB

enigma2021_slides_huang.pdf

1.4 MB

enigma2021_slides_kelley.pdf

2.5 MB

enigma2021_slides_mou.pdf

3.4 MB

enigma2021_slides_negus.pdf

41.3 MB

enigma2021_slides_palmer.pdf

463.9 KB

enigma2021_slides_quintin.pdf

3.8 MB

enigma2021_slides_rrushi.pdf

2.7 MB

enigma2021_slides_shapiro.pdf

13.8 MB

enigma2021_slides_starbird.pdf

18.1 MB

enigma2021_slides_stringhini.pdf

2.6 MB

enigma2021_slides_troncoso.pdf

4.0 MB

/.../Enigma 2021 USENIX_files/

css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css

4.3 KB

css_Pen3ncMGQyB3Q2LWoTho2yu6X-D2T6zOqWITJ4iG9A8.css

611.0 KB

css_Tvyih1Dm489siBROXzFSkKUCFbsEK9kCr0p3JDiev80.css

129.3 KB

css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css

3.8 KB

css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css

5.4 KB

eff_2018_red_600x240_0.png

1.6 KB

enigma-logo_red_tm_2000x733.png

3.4 KB

enigma21_conference_web_banner_logo.png

25.7 KB

ethyca-600x240.png

8.0 KB

facebook_600x240_22.png

2.9 KB

font-awesome.css

26.7 KB

google_600x240_14.png

6.7 KB

js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js

20.5 KB

js_fyV0VVkC6Q3xduxGurKMTFIU2dMmArUrbAdZORL-9WQ.js

0.4 KB

js_l3lGSHpmjPG_uzcz3Shpsi9Iwu4IaSB7us0ldgM0q7g.js

16.3 KB

js_nKHPel07iQ7X6ouVrkRIeMs9JzgU_FAp9nBhDfrhyQc.js

14.8 KB

js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js

26.8 KB

js_wKyFX46tVKJtPKN12qNjRfS4aubW4G2u7LK22vlDiKo.js

133.2 KB

kaspersky_600x240_2.png

3.7 KB

kissner_lea_2019_200x230.jpg

10.6 KB

netflix_600x240_2.png

2.9 KB

oliveira_daniela_200x230.jpg

13.8 KB

salesforce_600x240_1.png

5.6 KB

tii_logo_600x240_1.png

6.2 KB

usenix_logo_300x150_neat_2.png

15.0 KB

/.../Enigma 2021 Videos/

A Quest for the Physics of Cyberspace.eng.srt

32.8 KB

A Quest for the Physics of Cyberspace.mp4

15.9 MB

A Sound Mind in a Vulnerable Body Practical Hardware Attacks on Deep Learning.eng.srt

43.4 KB

A Sound Mind in a Vulnerable Body Practical Hardware Attacks on Deep Learning.mp4

20.4 MB

Breaking Trust - Shades of Crisis Across an Insecure Software Supply Chain.eng.srt

47.6 KB

Breaking Trust - Shades of Crisis Across an Insecure Software Supply Chain.mp4

18.5 MB

Building E2EE and User Identity.eng.srt

41.3 KB

Building E2EE and User Identity.mp4

13.6 MB

Computational Methods to Understand and Mitigate Online Aggression.eng.srt

31.3 KB

Computational Methods to Understand and Mitigate Online Aggression.mp4

21.8 MB

Contact Tracing Apps Engineering Privacy in Quicksand.eng.srt

39.7 KB

Contact Tracing Apps Engineering Privacy in Quicksand.mp4

18.8 MB

Contact Tracing Panel.eng.srt

102.0 KB

Contact Tracing Panel.mp4

59.6 MB

Da Da What Shark Conservation Teaches Us about Emotionality and Effective.eng.srt

39.9 KB

Da Da What Shark Conservation Teaches Us about Emotionality and Effective.mp4

15.4 MB

Designing Verifiable Health Solutions For Global Pandemic.eng.srt

46.8 KB

Designing Verifiable Health Solutions For Global Pandemic.mp4

18.8 MB

Detecting Fake 4G LTE Base Stations in Real Time.eng.srt

42.7 KB

Detecting Fake 4G LTE Base Stations in Real Time.mp4

27.4 MB

Does Your Threat Model Consider Country and Culture A Case Study of Brazilian.eng.srt

41.2 KB

Does Your Threat Model Consider Country and Culture A Case Study of Brazilian.mp4

24.4 MB

Gone, But Not - Forgotten -Technical & Practical Challenges In Operationalizing.mp4

15.9 MB

Hardware A Double-Edged Sword for Security.eng.srt

38.4 KB

Hardware A Double-Edged Sword for Security.mp4

27.3 MB

I Thought I Was Being Strong with a Complicated Person - The Tales.eng.srt

42.7 KB

I Thought I Was Being Strong with a Complicated Person - The Tales.mp4

16.7 MB

Implementing Differential Privacy for the 2020 Census.eng.srt

34.4 KB

Implementing Differential Privacy for the 2020 Census.mp4

20.5 MB

Is Cyber War Legal A Four Hundred Year Retrospective.eng.srt

31.4 KB

Is Cyber War Legal A Four Hundred Year Retrospective.mp4

14.0 MB

No Data, No Problem-Giving Nuclear Inspectors Better Tools without Revealing.eng.srt

44.2 KB

No Data, No Problem-Giving Nuclear Inspectors Better Tools without Revealing.mp4

15.9 MB

Online Rumors, Misinformation and Disinformation The Perfect Storm of COVID-19.eng.srt

42.0 KB

Online Rumors, Misinformation and Disinformation The Perfect Storm of COVID-19.mp4

18.4 MB

Privacy and Security Nutrition Labels to Inform IoT Consumers.eng.srt

40.0 KB

Privacy and Security Nutrition Labels to Inform IoT Consumers.mp4

15.2 MB

Privacy, Measurably, Isn't Dead.eng.srt

42.1 KB

Privacy, Measurably, Isn't Dead.mp4

17.4 MB

Quantifying Memory Unsafety and Reactions to It.eng.srt

48.1 KB

Quantifying Memory Unsafety and Reactions to It.mp4

16.5 MB

Security & U.S. Political Campaigns A Study & Expert Roundtable.eng.srt

45.8 KB

Security & U.S. Political Campaigns A Study & Expert Roundtable.mp4

18.5 MB

The Adventurous Tale of Online Voting in Switzerland.eng.srt

42.4 KB

The Adventurous Tale of Online Voting in Switzerland.mp4

22.4 MB

The Full Stack Problem of Election Security.eng.srt

43.6 KB

The Full Stack Problem of Election Security.mp4

12.1 MB

The Limits of Sandboxing and Next Steps.eng.srt

41.1 KB

The Limits of Sandboxing and Next Steps.mp4

14.9 MB

The Practical Divide between Adversarial ML Research and Security Practice.eng.srt

37.1 KB

The Practical Divide between Adversarial ML Research and Security Practice.mp4

21.0 MB

The State of 0-Day in-the-Wild Exploitation.eng.srt

43.6 KB

The State of 0-Day in-the-Wild Exploitation.mp4

21.6 MB

/Enigma 2022/

#Protect2020 An After Action Report.eng.srt

39.0 KB

#Protect2020 An After Action Report.mp4

35.4 MB

An Open-Source Taxonomy for Ex-ante Privacy.eng.srt

56.4 KB

An Open-Source Taxonomy for Ex-ante Privacy.mp4

34.2 MB

Around the World in 500 Days of Pandemic Misinformation.eng.srt

41.0 KB

Around the World in 500 Days of Pandemic Misinformation.mp4

29.3 MB

Auditing Data Privacy for Machine Learning.eng.srt

29.3 KB

Auditing Data Privacy for Machine Learning.mp4

21.1 MB

Broken CAPTCHAs and Fractured Equity Privacy and Security in hCaptcha.eng.srt

48.2 KB

Broken CAPTCHAs and Fractured Equity Privacy and Security in hCaptcha.mp4

29.0 MB

Burnout and PCSD Placing Team At Risk.eng.srt

37.1 KB

Burnout and PCSD Placing Team At Risk.mp4

17.1 MB

Can the Fight against Disinformation Really Scale.eng.srt

42.8 KB

Can the Fight against Disinformation Really Scale.mp4

33.1 MB

Content-Oblivious Trust and Safety Techniques Results from a Survey of Online.eng.srt

40.4 KB

Content-Oblivious Trust and Safety Techniques Results from a Survey of Online.mp4

22.0 MB

Contextual Security A Critical Shift in Performing Threat Intelligence.eng.srt

42.7 KB

Contextual Security A Critical Shift in Performing Threat Intelligence.mp4

28.1 MB

Covenants without the Sword Market Incentives for Security Investment.eng.srt

32.7 KB

Covenants without the Sword Market Incentives for Security Investment.mp4

13.6 MB

Crypto for the People (part 2).eng.srt

49.3 KB

Crypto for the People (part 2).mp4

21.2 MB

Detection Is Not Enough Attack Recovery for Safe and Robust Autonomous Robotic.eng.srt

28.9 KB

Detection Is Not Enough Attack Recovery for Safe and Robust Autonomous Robotic.mp4

13.3 MB

Fireside Chat with Sheera Frenkel.eng.srt

77.5 KB

Fireside Chat with Sheera Frenkel.mp4

83.6 MB

Healthcare Ecosystem Security's Role in Helping HealthTech Find Its Way.eng.srt

37.5 KB

Healthcare Ecosystem Security's Role in Helping HealthTech Find Its Way.mp4

24.3 MB

I See You Blockchain User, or Not Privacy in the Age of Blockchains.eng.srt

29.5 KB

I See You Blockchain User, or Not Privacy in the Age of Blockchains.mp4

13.2 MB

Leveraging Human Factors to Stop Dangerous IoT.eng.srt

34.9 KB

Leveraging Human Factors to Stop Dangerous IoT.mp4

14.5 MB

Neither Band-Aids nor Silver Bullets How Bug Bounties Can Help the Discovery.eng.srt

35.4 KB

Neither Band-Aids nor Silver Bullets How Bug Bounties Can Help the Discovery.mp4

18.8 MB

Panel Sex Work, Tech, and Surveillance.eng.srt

116.5 KB

Panel Sex Work, Tech, and Surveillance.mp4

107.3 MB

Panel Understanding Section 230.eng.srt

195.8 KB

Panel Understanding Section 230.mp4

156.6 MB

Rethinking - Security - in an Era of Online Hate and Harassment.eng.srt

41.4 KB

Rethinking - Security - in an Era of Online Hate and Harassment.mp4

19.1 MB

Teaching an Old Dog New Tricks Reusing Security Solutions in Novel Domains.eng.srt

40.5 KB

Teaching an Old Dog New Tricks Reusing Security Solutions in Novel Domains.mp4

24.7 MB

The Global Privacy Control Exercising Legal Rights at Scale.eng.srt

50.5 KB

The Global Privacy Control Exercising Legal Rights at Scale.mp4

30.0 MB

The Security Team at the Top The Board of Directors.eng.srt

40.6 KB

The Security Team at the Top The Board of Directors.mp4

25.6 MB

Thinking Slow Exposing Influence as a Hallmark of Cyber Social Engineering.eng.srt

37.0 KB

Thinking Slow Exposing Influence as a Hallmark of Cyber Social Engineering.mp4

19.8 MB

When Machine Learning Isn’t Private.eng.srt

44.9 KB

When Machine Learning Isn’t Private.mp4

30.5 MB

Why Has Your Toaster Been through More Security Testing than the AI System.eng.srt

37.2 KB

Why Has Your Toaster Been through More Security Testing than the AI System.mp4

15.2 MB

You Can’t Always Get What You Want - But You Get What You Need Moderating E2EE.eng.srt

43.2 KB

You Can’t Always Get What You Want - But You Get What You Need Moderating E2EE.mp4

47.7 MB

/Enigma 2023/

A New Process to Tackle Misinformation on Social Media.eng.srt

35.6 KB

A New Process to Tackle Misinformation on Social Media.mp4

19.2 MB

Adventures in Authentication and Authorization.eng.srt

45.5 KB

Adventures in Authentication and Authorization.mp4

20.4 MB

Building an Automated Machine for Discovering Privacy Violations at Scale.eng.srt

33.8 KB

Building an Automated Machine for Discovering Privacy Violations at Scale.mp4

18.3 MB

Characterizing and Measuring Misleading and Harmful Online Ad Content at Scale.eng.srt

40.2 KB

Characterizing and Measuring Misleading and Harmful Online Ad Content at Scale.mp4

18.0 MB

Fireside Chat The State of Memory Safety.eng.srt

89.5 KB

Fireside Chat The State of Memory Safety.mp4

76.1 MB

Fireside Chat with Simson Garfinkel on Quantum Technologies.eng.srt

68.2 KB

Fireside Chat with Simson Garfinkel on Quantum Technologies.mp4

53.5 MB

How Geopolitical Change Causes People to Become (More) Vulnerable.eng.srt

42.4 KB

How Geopolitical Change Causes People to Become (More) Vulnerable.mp4

21.0 MB

How the Internet Improves Humanity.eng.srt

42.7 KB

How the Internet Improves Humanity.mp4

20.7 MB

Invited Talk Metric Perversity and Bad Decision - Making.eng.srt

38.8 KB

Invited Talk Metric Perversity and Bad Decision - Making.mp4

19.7 MB

Meaningful Hardware Privacy for a Smart and Augmented Future.eng.srt

38.1 KB

Meaningful Hardware Privacy for a Smart and Augmented Future.mp4

25.4 MB

Myths and Lies in InfoSec.eng.srt

39.7 KB

Myths and Lies in InfoSec.mp4

23.6 MB

Navigating the Sandbox Buffet.eng.srt

44.0 KB

Navigating the Sandbox Buffet.mp4

20.8 MB

Open Source Software and Journalism Field Notes from a Global Perspective.eng.srt

47.8 KB

Open Source Software and Journalism Field Notes from a Global Perspective.mp4

23.1 MB

Panel Privacy Policies, by Lawyers, for Lawyers. What about Everyone Else.eng.srt

80.2 KB

Panel Privacy Policies, by Lawyers, for Lawyers. What about Everyone Else.mp4

70.1 MB

Panel The Emperor's New Clothes Location Data & the Promise of Anonymization.eng.srt

105.7 KB

Panel The Emperor's New Clothes Location Data & the Promise of Anonymization.mp4

86.9 MB

Panel True Crime Journalism Cyber.eng.srt

67.8 KB

Panel True Crime Journalism Cyber.mp4

59.1 MB

Protecting Whistleblower Information.eng.srt

39.0 KB

Protecting Whistleblower Information.mp4

19.9 MB

So You're Going to Blow the Whistle Communications Dos and Don'ts.eng.srt

39.9 KB

So You're Going to Blow the Whistle Communications Dos and Don'ts.mp4

28.5 MB

Spotting the Differences Quirks of Machine Learning (in) Security.eng.srt

32.4 KB

Spotting the Differences Quirks of Machine Learning (in) Security.mp4

18.9 MB

Technical Metamorphosis The 3 Stages of DSAR Automation.eng.srt

34.5 KB

Technical Metamorphosis The 3 Stages of DSAR Automation.mp4

15.1 MB

Technology Abuse Clinics for Survivors of Intimate Partner Violence.eng.srt

39.2 KB

Technology Abuse Clinics for Survivors of Intimate Partner Violence.mp4

16.2 MB

The Dirty Laundry of the Web PKI.eng.srt

43.3 KB

The Dirty Laundry of the Web PKI.mp4

21.2 MB

The Edge of Developed Practice in Searching Encrypted Data.eng.srt

55.2 KB

The Edge of Developed Practice in Searching Encrypted Data.mp4

29.1 MB

The Not Fake News Hour.eng.srt

23.0 KB

The Not Fake News Hour.mp4

13.7 MB

The Slippery Slope of Cybersecurity Analogies.eng.srt

29.1 KB

The Slippery Slope of Cybersecurity Analogies.mp4

19.6 MB

The Very Hungry Defender Metamorphosing Security Decision - Making.eng.srt

42.9 KB

The Very Hungry Defender Metamorphosing Security Decision - Making.mp4

19.5 MB

Understanding Trust & Security Processes in the Open Source Software Ecosystem.eng.srt

33.3 KB

Understanding Trust & Security Processes in the Open Source Software Ecosystem.mp4

11.4 MB

What Public Interest AI Auditors Can Learn from Security Testing.eng.srt

44.6 KB

What Public Interest AI Auditors Can Learn from Security Testing.mp4

18.9 MB

When Malware Changed Its Mind How - Split Personalities - Affect Malware.eng.srt

36.1 KB

When Malware Changed Its Mind How - Split Personalities - Affect Malware.mp4

17.2 MB

Why Is Our Security Research Failing Five Practices to Change.eng.srt

36.9 KB

Why Is Our Security Research Failing Five Practices to Change.mp4

22.8 MB

Working on the Frontlines Privacy and Security with Vulnerable Populations.eng.srt

47.1 KB

Working on the Frontlines Privacy and Security with Vulnerable Populations.mp4

21.5 MB

/Enigma Interviews/

USENIX presents Enigma Interviews (8 23 17) - featuring Eva Galperin and Alex Stamos.mp4

197.3 MB

USENIX presents Enigma Interviews 2 (11 29 17) - featuring Stefan Savage and Deirdre Mulligan.mp4

151.3 MB

 

Total files 1299


Copyright © 2024 FileMood.com