/Enigma 2016/Presentations/
|
enigma16_slides_armageddon.pdf
|
1.4 MB
|
enigma16_slides_debeauvoir.pdf
|
5.8 MB
|
enigma16_slides_freeman.pdf
|
15.5 MB
|
enigma16_slides_genovese.pdf
|
6.1 MB
|
enigma16_slides_halderman.pdf
|
7.9 MB
|
enigma16_slides_heiderich.pdf
|
134.1 KB
|
enigma16_slides_kohno.pdf
|
1.1 MB
|
enigma16_slides_savage.pdf
|
21.9 MB
|
enigma16_slides_stepanovich.pdf
|
6.8 MB
|
enigma16_slides_weaver.pdf
|
3.8 MB
|
enigma_2016_slides_rivest.pdf
|
65.4 KB
|
enigma_slides_brown.pdf
|
6.4 MB
|
enigma_slides_felt.pdf
|
1.6 MB
|
enigma_slides_fu.pdf
|
32.0 MB
|
enigma_slides_galperin.pdf
|
8.3 MB
|
enigma_slides_hawkes.pdf
|
86.1 KB
|
enigma_slides_joyce.pdf
|
1.1 MB
|
enigma_slides_majkowski.pdf
|
2.4 MB
|
enigma_slides_mccoy.pdf
|
8.8 MB
|
enigma_slides_nighswander.pdf
|
18.6 MB
|
enigma_slides_oberheide.pdf
|
3.5 MB
|
enigma_slides_payne.pdf
|
6.4 MB
|
enigma_slides_peterson.pdf
|
62.5 MB
|
enigma_slides_rozier.pdf
|
54.6 MB
|
enigma_slides_serebryany.pdf
|
365.6 KB
|
enigma_slides_smith.pdf
|
6.6 MB
|
enigma_slides_sullivan.pdf
|
3.0 MB
|
enigma_slides_teague.pdf
|
2.0 MB
|
enigma_slides_vigna.pdf
|
19.8 MB
|
enigma_slides_wurster.pdf
|
1.8 MB
|
enigma_slides_zhu-yan.pdf
|
3.6 MB
|
rubin.enigma.pdf
|
7.4 MB
|
/Enigma 2016/Video/
|
David Freeman of LinkedIn on His Enigma Conference Talk.mp4
|
7.2 MB
|
David Freeman of LinkedIn on His Enigma Conference Talk.srt
|
1.4 KB
|
Elie Bursztein of Google Previews His Enigma Talk.mp4
|
3.7 MB
|
Elie Bursztein of Google Previews His Enigma Talk.srt
|
1.3 KB
|
Enigma Conference Speaker Nicholas Weaver Discusses His Talk.mp4
|
7.7 MB
|
Enigma Conference Speaker Nicholas Weaver Discusses His Talk.srt
|
1.3 KB
|
Eva Galperin of the EFF on Her Enigma Conference Talk.mp4
|
4.3 MB
|
Eva Galperin of the EFF on Her Enigma Conference Talk.srt
|
1.6 KB
|
USENIX Enigma 2016 - A Million Hit Points and Infinite Charisma How Games Can Fix....mp4
|
166.1 MB
|
USENIX Enigma 2016 - A Million Hit Points and Infinite Charisma How Games Can Fix....srt
|
37.6 KB
|
USENIX Enigma 2016 - Building a Competitive Hacking Team.mp4
|
183.5 MB
|
USENIX Enigma 2016 - Building a Competitive Hacking Team.srt
|
44.4 KB
|
USENIX Enigma 2016 - Building a DDoS Mitigation Pipeline.mp4
|
46.4 MB
|
USENIX Enigma 2016 - Building a DDoS Mitigation Pipeline.srt
|
39.1 KB
|
USENIX Enigma 2016 - Bullet-Proof Credit Card Processing.mp4
|
103.9 MB
|
USENIX Enigma 2016 - Bullet-Proof Credit Card Processing.srt
|
45.0 KB
|
USENIX Enigma 2016 - Capture the Flag An Owner s Manual.mp4
|
194.4 MB
|
USENIX Enigma 2016 - Capture the Flag An Owner s Manual.srt
|
40.7 KB
|
USENIX Enigma 2016 - Computer Security and the Internet of Things.mp4
|
132.0 MB
|
USENIX Enigma 2016 - Computer Security and the Internet of Things.srt
|
40.5 KB
|
USENIX Enigma 2016 - Data Integrity Based Attacks in Investigative Domains.mp4
|
175.6 MB
|
USENIX Enigma 2016 - Data Integrity Based Attacks in Investigative Domains.srt
|
42.1 KB
|
USENIX Enigma 2016 - Defending, Detecting, and Responding to Hardware and Firmware Attacks.mp4
|
100.7 MB
|
USENIX Enigma 2016 - Defending, Detecting, and Responding to Hardware and Firmware Attacks.srt
|
46.9 KB
|
USENIX Enigma 2016 - Dolla Dolla Bill Y all Cybercrime Cashouts.mp4
|
179.4 MB
|
USENIX Enigma 2016 - Dolla Dolla Bill Y all Cybercrime Cashouts.srt
|
43.7 KB
|
USENIX Enigma 2016 - Drops for Stuff An Analysis of Reshipping Mule Scams.mp4
|
183.1 MB
|
USENIX Enigma 2016 - Drops for Stuff An Analysis of Reshipping Mule Scams.srt
|
35.1 KB
|
USENIX Enigma 2016 - From Concept to Deployment - the Life (and Death) of Security Features.mp4
|
156.7 MB
|
USENIX Enigma 2016 - From Concept to Deployment - the Life (and Death) of Security Features.srt
|
32.5 KB
|
USENIX Enigma 2016 - Hacking Health Security in Healthcare IT Systems.mp4
|
144.9 MB
|
USENIX Enigma 2016 - Hacking Health Security in Healthcare IT Systems.srt
|
43.0 KB
|
USENIX Enigma 2016 - Internet Voting What Could Go Wrong.mp4
|
191.1 MB
|
USENIX Enigma 2016 - Internet Voting What Could Go Wrong.srt
|
38.6 KB
|
USENIX Enigma 2016 - Keys Under Doormats Mandating Insecurity....mp4
|
231.2 MB
|
USENIX Enigma 2016 - Keys Under Doormats Mandating Insecurity....srt
|
42.4 KB
|
USENIX Enigma 2016 - Lessons Learned While Protecting Gmail.mp4
|
228.7 MB
|
USENIX Enigma 2016 - Lessons Learned While Protecting Gmail.srt
|
52.9 KB
|
USENIX Enigma 2016 - Medical Device Security.mp4
|
175.0 MB
|
USENIX Enigma 2016 - Medical Device Security.srt
|
40.2 KB
|
USENIX Enigma 2016 - Modern Automotive Security History, Disclosure, and Consequences.mp4
|
97.8 MB
|
USENIX Enigma 2016 - Modern Automotive Security History, Disclosure, and Consequences.srt
|
46.6 KB
|
USENIX Enigma 2016 - NSA TAO Chief on Disrupting Nation State Hackers.mp4
|
377.3 MB
|
USENIX Enigma 2016 - NSA TAO Chief on Disrupting Nation State Hackers.srt
|
58.5 KB
|
USENIX Enigma 2016 - PKI at Scale Using Short-lived Certificates.mp4
|
78.4 MB
|
USENIX Enigma 2016 - PKI at Scale Using Short-lived Certificates.srt
|
45.0 KB
|
USENIX Enigma 2016 - Panopticlick Fingerprinting Your Web Presence.mp4
|
214.0 MB
|
USENIX Enigma 2016 - Panopticlick Fingerprinting Your Web Presence.srt
|
37.6 KB
|
USENIX Enigma 2016 - Protecting High Risk Users.mp4
|
215.7 MB
|
USENIX Enigma 2016 - Protecting High Risk Users.srt
|
54.8 KB
|
USENIX Enigma 2016 - Sanitize, Fuzz, and Harden Your C++ Code.mp4
|
138.8 MB
|
USENIX Enigma 2016 - Sanitize, Fuzz, and Harden Your C++ Code.srt
|
30.2 KB
|
USENIX Enigma 2016 - Security and Usability from the Frontlines of Enterprise IT.mp4
|
194.0 MB
|
USENIX Enigma 2016 - Security and Usability from the Frontlines of Enterprise IT.srt
|
49.5 KB
|
USENIX Enigma 2016 - Server-side Second Factors....mp4
|
140.0 MB
|
USENIX Enigma 2016 - Server-side Second Factors....srt
|
33.1 KB
|
USENIX Enigma 2016 - Several Horror Stories about the Encrypted Web.mp4
|
110.7 MB
|
USENIX Enigma 2016 - Several Horror Stories about the Encrypted Web.srt
|
45.7 KB
|
USENIX Enigma 2016 - Social Media Self-Defense A Guide to Stopping Stalkers.mp4
|
151.9 MB
|
USENIX Enigma 2016 - Social Media Self-Defense A Guide to Stopping Stalkers.srt
|
32.2 KB
|
USENIX Enigma 2016 - The Global Conversation on Encryption.mp4
|
182.0 MB
|
USENIX Enigma 2016 - The Global Conversation on Encryption.srt
|
38.9 KB
|
USENIX Enigma 2016 - The Golden Age of Bulk Surveillance.mp4
|
136.5 MB
|
USENIX Enigma 2016 - The Golden Age of Bulk Surveillance.srt
|
34.2 KB
|
USENIX Enigma 2016 - Timeless Debugging.mp4
|
138.7 MB
|
USENIX Enigma 2016 - Timeless Debugging.srt
|
37.5 KB
|
USENIX Enigma 2016 - ToStaticHTML for Everyone! About DOMPurify.mp4
|
177.2 MB
|
USENIX Enigma 2016 - ToStaticHTML for Everyone! About DOMPurify.srt
|
42.8 KB
|
USENIX Enigma 2016 - Trust Beyond the First Hop-What Really Happens to Data Sent to HTTPS Websites.mp4
|
182.8 MB
|
USENIX Enigma 2016 - Trust Beyond the First Hop-What Really Happens to Data Sent to HTTPS Websites.srt
|
32.8 KB
|
USENIX Enigma 2016 - Usable Security-The Source Awakens.mp4
|
142.3 MB
|
USENIX Enigma 2016 - Usable Security-The Source Awakens.srt
|
28.3 KB
|
USENIX Enigma 2016 - Verification, Auditing, and Evidence If We Didn Not Notice Anything Wrong..mp4
|
233.0 MB
|
USENIX Enigma 2016 - Verification, Auditing, and Evidence If We Didn Not Notice Anything Wrong.srt
|
39.3 KB
|
USENIX Enigma 2016 - We Need Something Better-Building STAR Vote.mp4
|
228.5 MB
|
USENIX Enigma 2016 - We Need Something Better-Building STAR Vote.srt
|
30.4 KB
|
USENIX Enigma 2016 - What Makes Software Exploitation Hard.mp4
|
232.9 MB
|
USENIX Enigma 2016 - What Makes Software Exploitation Hard.srt
|
37.2 KB
|
USENIX Enigma 2016 - Why Is Usable Security Hard, and What Should We Do about it.mp4
|
185.5 MB
|
USENIX Enigma 2016 - Why Is Usable Security Hard, and What Should We Do about it.srt
|
38.0 KB
|
USENIX Enigma 2016 Opening Video.mp4
|
12.9 MB
|
USENIX Enigma 2016 Trailer.mp4
|
5.1 MB
|
Why Enigma.mp4
|
9.5 MB
|
Why Enigma.srt
|
2.9 KB
|
/Enigma 2017/
|
USENIX Enigma 2017 - Adversarial Examples in Machine Learning.mp4
|
24.4 MB
|
USENIX Enigma 2017 - As We May Code.mp4
|
43.5 MB
|
USENIX Enigma 2017 - Behaviors and Patterns of Bulletproof and Anonymous Hosting Providers.mp4
|
26.1 MB
|
USENIX Enigma 2017 - Beyond Warm & Fuzzy Ethics as a Value Prop.mp4
|
34.6 MB
|
USENIX Enigma 2017 - Brains Can Be Hacked. Why Should You Care.mp4
|
24.4 MB
|
USENIX Enigma 2017 - Classifiers under Attack.mp4
|
22.8 MB
|
USENIX Enigma 2017 - Cyber Security A DARPA Perspective.mp4
|
29.0 MB
|
USENIX Enigma 2017 - Deviation from the Norms The Necessity and Challenges ....mp4
|
48.3 MB
|
USENIX Enigma 2017 - Drawing the Foul Operation of a DDoS Honeypot.mp4
|
25.3 MB
|
USENIX Enigma 2017 - FeatureSmith Learning to Detect Malware by Mining the Security Literature.mp4
|
28.8 MB
|
USENIX Enigma 2017 - Ghost in the Machine Challenges in Embedded Binary Security.mp4
|
23.9 MB
|
USENIX Enigma 2017 - Green Sprouts Encouraging Signs of Life from the Department of ....mp4
|
64.7 MB
|
USENIX Enigma 2017 - Hacking Sensors.mp4
|
25.7 MB
|
USENIX Enigma 2017 - How WhatsApp Reduced Spam while Launching End-to-End Encryption.mp4
|
39.4 MB
|
USENIX Enigma 2017 - Human Computation with an Application to Passwords.mp4
|
27.5 MB
|
USENIX Enigma 2017 - Inside MOAR TLS How We Think about Encouraging External ....mp4
|
50.4 MB
|
USENIX Enigma 2017 - IoT, a Cybercriminals Paradise.mp4
|
21.5 MB
|
USENIX Enigma 2017 - LLC Cache Attacks Applicability and Countermeasures.mp4
|
22.9 MB
|
USENIX Enigma 2017 - Legislative Engineering Design Privacy Laws, Dont Just Draft Them.mp4
|
45.0 MB
|
USENIX Enigma 2017 - Leveraging the Power of Automated Reasoning in ....mp4
|
35.2 MB
|
USENIX Enigma 2017 - Moving Account Recovery beyond Email and the Secret Question.mp4
|
49.1 MB
|
USENIX Enigma 2017 - National Scale Cyber Security.mp4
|
60.5 MB
|
USENIX Enigma 2017 - Neural and Behavioral Insights on Trust.mp4
|
54.5 MB
|
USENIX Enigma 2017 - Putting Privacy Notices to the Test.mp4
|
26.8 MB
|
USENIX Enigma 2017 - Secrets at Scale Automated Bootstrapping of Secrets & Identity in the Cloud.mp4
|
24.1 MB
|
USENIX Enigma 2017 - Security for Vulnerable Populations - On the Interplay of ....mp4
|
76.7 MB
|
USENIX Enigma 2017 - Security in the Wild for Low-Profile Activists.mp4
|
81.5 MB
|
USENIX Enigma 2017 - Startups + Industry How Everyone Can Win.mp4
|
79.9 MB
|
USENIX Enigma 2017 - StreamAlert A Serverless, Real-time Intrusion Detection Engine.mp4
|
22.8 MB
|
USENIX Enigma 2017 - Test Driven Security in Continuous Integration.mp4
|
40.5 MB
|
USENIX Enigma 2017 - The Paper Ballot Is Not Enough.mp4
|
43.5 MB
|
USENIX Enigma 2017 - Understanding and Designing for End Users Security Expectations.mp4
|
29.9 MB
|
USENIX Enigma 2017 - Understanding and Securing DoD Weapon Systems.mp4
|
25.1 MB
|
USENIX Enigma 2017 - What Cybersecurity Can Learn from the Secret Service.mp4
|
42.4 MB
|
USENIX Enigma 2017 - What Does the Brain Tell Us about Usable Security.mp4
|
24.1 MB
|
USENIX Enigma 2017 - Why Philanthropy Is Critical for Cybersecurity.mp4
|
79.3 MB
|
USENIX Enigma 2017 - Wont Somebody Please Think of the Journalists.mp4
|
39.8 MB
|
/Enigma 2018/
|
USENIX Enigma 2018 - Anatomy of Account Takeover.en.transcribed.srt
|
43.6 KB
|
USENIX Enigma 2018 - Anatomy of Account Takeover.mp4
|
21.9 MB
|
USENIX Enigma 2018 - Being Creative, Securely.en.transcribed.srt
|
60.5 KB
|
USENIX Enigma 2018 - Being Creative, Securely.mp4
|
39.4 MB
|
USENIX Enigma 2018 - Bits & Bytes, Flesh & Blood, and Saving Real Lives via Clinical Simulations.en.transcribed.srt
|
65.7 KB
|
USENIX Enigma 2018 - Bits & Bytes, Flesh & Blood, and Saving Real Lives via Clinical Simulations.mp4
|
45.8 MB
|
USENIX Enigma 2018 - Combining the Power of Builders and Breakers.en.transcribed.srt
|
61.4 KB
|
USENIX Enigma 2018 - Combining the Power of Builders and Breakers.mp4
|
46.7 MB
|
USENIX Enigma 2018 - Compliance != Security (Except When It Might Be).en.transcribed.srt
|
65.1 KB
|
USENIX Enigma 2018 - Compliance != Security (Except When It Might Be).mp4
|
24.0 MB
|
USENIX Enigma 2018 - Crypto Crumple Zones Protecting Encryption in a Time of Political Uncertainty.en.transcribed.srt
|
66.2 KB
|
USENIX Enigma 2018 - Crypto Crumple Zones Protecting Encryption in a Time of Political Uncertainty.mp4
|
22.7 MB
|
USENIX Enigma 2018 - Cryptographically Secure Data Analysis for Social Good.en.transcribed.srt
|
71.9 KB
|
USENIX Enigma 2018 - Cryptographically Secure Data Analysis for Social Good.mp4
|
40.4 MB
|
USENIX Enigma 2018 - Cyber Strategy The Evolving Nature of Cyber Power and Coercion.en.transcribed.srt
|
52.6 KB
|
USENIX Enigma 2018 - Cyber Strategy The Evolving Nature of Cyber Power and Coercion.mp4
|
33.3 MB
|
USENIX Enigma 2018 - Developing a Science of Internet Censorship Resistance Opportunities and ....en.transcribed.srt
|
54.5 KB
|
USENIX Enigma 2018 - Developing a Science of Internet Censorship Resistance Opportunities and ....mp4
|
20.3 MB
|
USENIX Enigma 2018 - Differential Privacy at Scale Uber and Berkeley Collaboration.en.transcribed.srt
|
69.0 KB
|
USENIX Enigma 2018 - Differential Privacy at Scale Uber and Berkeley Collaboration.mp4
|
23.7 MB
|
USENIX Enigma 2018 - Emerging Cryptography.en.transcribed.srt
|
57.6 KB
|
USENIX Enigma 2018 - Emerging Cryptography.mp4
|
33.9 MB
|
USENIX Enigma 2018 - Gig Work and the Digital Security Divide.en.transcribed.srt
|
58.2 KB
|
USENIX Enigma 2018 - Gig Work and the Digital Security Divide.mp4
|
27.6 MB
|
USENIX Enigma 2018 - Going Nuclear Programmatic Protections against....en.transcribed.srt
|
63.4 KB
|
USENIX Enigma 2018 - Going Nuclear Programmatic Protections against....mp4
|
36.2 MB
|
USENIX Enigma 2018 - Hacking the Law Are Bug Bounties a True Safe Harbor.en.transcribed.srt
|
52.5 KB
|
USENIX Enigma 2018 - Hacking the Law Are Bug Bounties a True Safe Harbor.mp4
|
40.2 MB
|
USENIX Enigma 2018 - Hats off to DevSecOps.en.transcribed.srt
|
66.9 KB
|
USENIX Enigma 2018 - Hats off to DevSecOps.mp4
|
41.6 MB
|
USENIX Enigma 2018 - Insecurity in Information Technology.en.transcribed.srt
|
55.2 KB
|
USENIX Enigma 2018 - Insecurity in Information Technology.mp4
|
39.7 MB
|
USENIX Enigma 2018 - IoE, Connecting Regulation to Risk.en.transcribed.srt
|
63.8 KB
|
USENIX Enigma 2018 - IoE, Connecting Regulation to Risk.mp4
|
38.7 MB
|
USENIX Enigma 2018 - LISA A Practical Zero Trust Architecture.en.transcribed.srt
|
69.9 KB
|
USENIX Enigma 2018 - LISA A Practical Zero Trust Architecture.mp4
|
23.9 MB
|
USENIX Enigma 2018 - Least Privilege Security Gain without Developer Pain.en.transcribed.srt
|
52.3 KB
|
USENIX Enigma 2018 - Least Privilege Security Gain without Developer Pain.mp4
|
28.3 MB
|
USENIX Enigma 2018 - Modern Mind Control Public Opinion Manipulation in Our Online World.en.transcribed.srt
|
67.4 KB
|
USENIX Enigma 2018 - Modern Mind Control Public Opinion Manipulation in Our Online World.mp4
|
38.5 MB
|
USENIX Enigma 2018 - Privacy @ Instagram.en.transcribed.srt
|
41.7 KB
|
USENIX Enigma 2018 - Privacy @ Instagram.mp4
|
17.7 MB
|
USENIX Enigma 2018 - Protecting Financial Stability against Cyber ....en.transcribed.srt
|
68.4 KB
|
USENIX Enigma 2018 - Protecting Financial Stability against Cyber ....mp4
|
26.7 MB
|
USENIX Enigma 2018 - Protecting Firefox Data with Content Signatures.en.transcribed.srt
|
55.5 KB
|
USENIX Enigma 2018 - Protecting Firefox Data with Content Signatures.mp4
|
21.2 MB
|
USENIX Enigma 2018 - Rage against the Ghost in the Machine.en.transcribed.srt
|
58.7 KB
|
USENIX Enigma 2018 - Rage against the Ghost in the Machine.mp4
|
47.6 MB
|
USENIX Enigma 2018 - Security Technology Adoption; Building Hardware Is Just the Start - YouTube.en.transcribed.srt
|
46.2 KB
|
USENIX Enigma 2018 - Security Technology Adoption_ Building Hardware Is Just the Start - YouTube.mp4
|
22.2 MB
|
USENIX Enigma 2018 - Social Cybersecurity Reshaping Security ....en.transcribed.srt
|
60.8 KB
|
USENIX Enigma 2018 - Social Cybersecurity Reshaping Security ....mp4
|
29.3 MB
|
USENIX Enigma 2018 - Some Thoughts on Deep Learning and Infosec.en.transcribed.srt
|
56.1 KB
|
USENIX Enigma 2018 - Some Thoughts on Deep Learning and Infosec.mp4
|
22.9 MB
|
USENIX Enigma 2018 - Stranger Things Who’s Listening When the Device Is Always On.en.transcribed.srt
|
51.0 KB
|
USENIX Enigma 2018 - Stranger Things Who’s Listening When the Device Is Always On.mp4
|
36.7 MB
|
USENIX Enigma 2018 - Surfing the Motivation Wave to Create Security Behavior Change.en.transcribed.srt
|
63.6 KB
|
USENIX Enigma 2018 - Surfing the Motivation Wave to Create Security Behavior Change.mp4
|
30.0 MB
|
USENIX Enigma 2018 - The Evolving Architecture of the Web and Its Impact on Security, ....en.transcribed.srt
|
41.1 KB
|
USENIX Enigma 2018 - The Evolving Architecture of the Web and Its Impact on Security, ....mp4
|
18.7 MB
|
USENIX Enigma 2018 - The Future of Cyber-Autonomy.en.transcribed.srt
|
66.2 KB
|
USENIX Enigma 2018 - The Future of Cyber-Autonomy.mp4
|
35.9 MB
|
USENIX Enigma 2018 - The Great Cryptographic Divide.en.transcribed.srt
|
64.3 KB
|
USENIX Enigma 2018 - The Great Cryptographic Divide.mp4
|
60.3 MB
|
USENIX Enigma 2018 - The Impact of Third-party Code on Android App Security.en.transcribed.srt
|
48.7 KB
|
USENIX Enigma 2018 - The Impact of Third-party Code on Android App Security.mp4
|
18.1 MB
|
USENIX Enigma 2018 - The Web Tracking Arms Race Past, Present, and Future.en.transcribed.srt
|
72.3 KB
|
USENIX Enigma 2018 - The Web Tracking Arms Race Past, Present, and Future.mp4
|
35.9 MB
|
USENIX Enigma 2018 - We Gave You This Internet, Now Play by Our Rules.en.transcribed.srt
|
64.0 KB
|
USENIX Enigma 2018 - We Gave You This Internet, Now Play by Our Rules.mp4
|
34.3 MB
|
USENIX Enigma 2018 - What Would You Do With a Nation-State Cyber Army.en.transcribed.srt
|
53.6 KB
|
USENIX Enigma 2018 - What Would You Do With a Nation-State Cyber Army.mp4
|
25.5 MB
|
USENIX Enigma 2018 - When Malware is Packin’ Heat.mp4
|
33.9 MB
|
/Enigma 2019/
|
USENIX Enigma 2019 - Abusability Testing Considering the Ways Your Technology Might Be Used.en.transcribed.srt
|
64.9 KB
|
USENIX Enigma 2019 - Abusability Testing Considering the Ways Your Technology Might Be Used.mp4
|
23.4 MB
|
USENIX Enigma 2019 - Building Identity for an Open Perimeter.en.transcribed.srt
|
55.0 KB
|
USENIX Enigma 2019 - Building Identity for an Open Perimeter.mp4
|
25.0 MB
|
USENIX Enigma 2019 - Building a Secure Data Market on Blockchain.en.transcribed.srt
|
72.9 KB
|
USENIX Enigma 2019 - Building a Secure Data Market on Blockchain.mp4
|
32.7 MB
|
USENIX Enigma 2019 - Callisto A Cryptographic Approach to #MeToo.en.transcribed.srt
|
56.0 KB
|
USENIX Enigma 2019 - Callisto A Cryptographic Approach to #MeToo.mp4
|
18.2 MB
|
USENIX Enigma 2019 - Convincing the Loser Securing Elections against Modern Threats.en.transcribed.srt
|
61.9 KB
|
USENIX Enigma 2019 - Convincing the Loser Securing Elections against Modern Threats.mp4
|
24.3 MB
|
USENIX Enigma 2019 - Countering Adversarial Cyber Campaigns.en.transcribed.srt
|
50.3 KB
|
USENIX Enigma 2019 - Countering Adversarial Cyber Campaigns.mp4
|
23.7 MB
|
USENIX Enigma 2019 - Cryptocurrency Burn It with Fire.en.transcribed.srt
|
53.5 KB
|
USENIX Enigma 2019 - Cryptocurrency Burn It with Fire.mp4
|
26.9 MB
|
USENIX Enigma 2019 - Digital Authoritarianism, Data Protection, and the Battle.en.transcribed.srt
|
81.7 KB
|
USENIX Enigma 2019 - Digital Authoritarianism, Data Protection, and the Battle.mp4
|
25.1 MB
|
USENIX Enigma 2019 - Grey Science.en.transcribed.srt
|
60.4 KB
|
USENIX Enigma 2019 - Grey Science.mp4
|
18.7 MB
|
USENIX Enigma 2019 - Hardware Is the New Software Finding Exploitable Bugs in Hardware Designs.en.transcribed.srt
|
60.8 KB
|
USENIX Enigma 2019 - Hardware Is the New Software Finding Exploitable Bugs in Hardware Designs.mp4
|
17.3 MB
|
USENIX Enigma 2019 - Hardware Security Modules The Ultimate Black Boxes.en.transcribed.srt
|
72.7 KB
|
USENIX Enigma 2019 - Hardware Security Modules The Ultimate Black Boxes.mp4
|
18.1 MB
|
USENIX Enigma 2019 - How to Predict Which Vulnerabilities Will Be Exploited.en.transcribed.srt
|
51.3 KB
|
USENIX Enigma 2019 - How to Predict Which Vulnerabilities Will Be Exploited.mp4
|
26.9 MB
|
USENIX Enigma 2019 - If Red Teaming Is Easy You're Doing It Wrong.en.transcribed.srt
|
52.1 KB
|
USENIX Enigma 2019 - If Red Teaming Is Easy You're Doing It Wrong.mp4
|
29.7 MB
|
USENIX Enigma 2019 - Insider Attack Resistance in the Android Ecosystem.en.transcribed.srt
|
60.5 KB
|
USENIX Enigma 2019 - Insider Attack Resistance in the Android Ecosystem.mp4
|
19.1 MB
|
USENIX Enigma 2019 - It's Not Our Data Do We Want to Create a World of No Surprises.en.transcribed.srt
|
60.0 KB
|
USENIX Enigma 2019 - It's Not Our Data Do We Want to Create a World of No Surprises.mp4
|
27.4 MB
|
USENIX Enigma 2019 - Learning from the Dark Web Dimension of Data.en.transcribed.srt
|
51.7 KB
|
USENIX Enigma 2019 - Learning from the Dark Web Dimension of Data.mp4
|
22.2 MB
|
USENIX Enigma 2019 - Mobile App Privacy Analysis at Scale.en.transcribed.srt
|
68.2 KB
|
USENIX Enigma 2019 - Mobile App Privacy Analysis at Scale.mp4
|
27.0 MB
|
USENIX Enigma 2019 - Moving Fast and Breaking Things Security Misconfigurations.en.transcribed.srt
|
61.5 KB
|
USENIX Enigma 2019 - Moving Fast and Breaking Things Security Misconfigurations.mp4
|
20.2 MB
|
USENIX Enigma 2019 - Mr. Lord Goes to Washington, or Applying Security outside the Tech World.en.transcribed.srt
|
67.1 KB
|
USENIX Enigma 2019 - Mr. Lord Goes to Washington, or Applying Security outside the Tech World.mp4
|
23.2 MB
|
USENIX Enigma 2019 - Next Steps For Browser Privacy Pursuing Privacy Protections Beyond Extensions.en.transcribed.srt
|
58.5 KB
|
USENIX Enigma 2019 - Next Steps For Browser Privacy Pursuing Privacy Protections Beyond Extensions.mp4
|
18.4 MB
|
USENIX Enigma 2019 - Physical OPSEC as a Metaphor for Infosec.en.transcribed.srt
|
53.6 KB
|
USENIX Enigma 2019 - Physical OPSEC as a Metaphor for Infosec.mp4
|
18.7 MB
|
USENIX Enigma 2019 - Privacy Engineering Not Just for Privacy Engineers.en.transcribed.srt
|
38.6 KB
|
USENIX Enigma 2019 - Privacy Engineering Not Just for Privacy Engineers.mp4
|
15.7 MB
|
USENIX Enigma 2019 - Provable Security at AWS.en.transcribed.srt
|
51.5 KB
|
USENIX Enigma 2019 - Provable Security at AWS.mp4
|
21.1 MB
|
USENIX Enigma 2019 - Rethinking the Detection of Child Sexual Abuse Imagery on the Internet.en.transcribed.srt
|
45.3 KB
|
USENIX Enigma 2019 - Rethinking the Detection of Child Sexual Abuse Imagery on the Internet.mp4
|
21.3 MB
|
USENIX Enigma 2019 - Something You Have and Someone You Know-Designing for Interpersonal Security.en.transcribed.srt
|
60.2 KB
|
USENIX Enigma 2019 - Something You Have and Someone You Know-Designing for Interpersonal Security.mp4
|
24.7 MB
|
USENIX Enigma 2019 - Stethoscope Securely Configuring Devices without Systems Management.en.transcribed.srt
|
56.3 KB
|
USENIX Enigma 2019 - Stethoscope Securely Configuring Devices without Systems Management.mp4
|
18.4 MB
|
USENIX Enigma 2019 - The Kids Aren't Alright-Security and Privacy in the K–12 Classroom.en.transcribed.srt
|
44.6 KB
|
USENIX Enigma 2019 - The Kids Aren't Alright-Security and Privacy in the K–12 Classroom.mp4
|
23.3 MB
|
USENIX Enigma 2019 - The Offline Dimension of Online Crime.en.transcribed.srt
|
64.4 KB
|
USENIX Enigma 2019 - The Offline Dimension of Online Crime.mp4
|
20.1 MB
|
USENIX Enigma 2019 - The URLephant in the Room.en.transcribed.srt
|
58.1 KB
|
USENIX Enigma 2019 - The URLephant in the Room.mp4
|
23.6 MB
|
USENIX Enigma 2019 - Usage of Behavioral Biometric Technologies to Defend Against Bots.en.transcribed.srt
|
62.3 KB
|
USENIX Enigma 2019 - Usage of Behavioral Biometric Technologies to Defend Against Bots.mp4
|
27.8 MB
|
USENIX Enigma 2019 - User Agent 2.0 What Can the Browser Do for the User.en.transcribed.srt
|
67.7 KB
|
USENIX Enigma 2019 - User Agent 2.0 What Can the Browser Do for the User.mp4
|
26.8 MB
|
USENIX Enigma 2019 - Using Architecture and Abstractions to Design a Security Layer for TLS.en.transcribed.srt
|
74.4 KB
|
USENIX Enigma 2019 - Using Architecture and Abstractions to Design a Security Layer for TLS.mp4
|
30.2 MB
|
USENIX Enigma 2019 - When the Magic Wears Off Flaws in ML for Security Evaluations.mp4
|
28.0 MB
|
USENIX Enigma 2019 - Where Is the Web Closed.en.transcribed.srt
|
52.7 KB
|
USENIX Enigma 2019 - Where Is the Web Closed.mp4
|
16.5 MB
|
USENIX Enigma 2019 - Why Even Experienced and Highly Intelligent Developers.en.transcribed.srt
|
42.9 KB
|
USENIX Enigma 2019 - Why Even Experienced and Highly Intelligent Developers.mp4
|
30.1 MB
|
/Enigma Interviews/
|
USENIX presents Enigma Interviews (8 23 17) - featuring Eva Galperin and Alex Stamos.mp4
|
446.8 MB
|
USENIX presents Enigma Interviews 2 (11 29 17) - featuring Stefan Savage and Deirdre Mulligan.mp4
|
364.2 MB
|
/
|
Enigma logo.jpg
|
4.1 KB
|
USENIX Enigma thank you.txt
|
0.7 KB
|
Total files 299
|