|
/Video/
|
|
Building Securable Infrastructure Open-Source Private Clouds.mp4
|
101.0 MB
|
|
/Video/
|
|
Building Securable Infrastructure Open-Source Private Clouds.srt
|
128.5 KB
|
|
Confessions of a Recovering Data Broker.mp4
|
123.1 MB
|
|
Confessions of a Recovering Data Broker.srt
|
121.2 KB
|
|
Dismantling Megamos Crypto Wirelessly Lockpicking a Vehicle Immobilizer.mp4
|
35.0 MB
|
|
Dismantling Megamos Crypto Wirelessly Lockpicking a Vehicle Immobilizer.srt
|
40.3 KB
|
|
Dr. Felten Goes To Washington Lessons from 18 Months in Government.mp4
|
195.7 MB
|
|
Dr. Felten Goes To Washington Lessons from 18 Months in Government.srt
|
139.4 KB
|
|
Security Team 2.0.mp4
|
114.0 MB
|
|
Security Team 2.0.srt
|
129.0 KB
|
|
The White House s Priorities for Cybersecurity.mp4
|
210.8 MB
|
|
The White House s Priorities for Cybersecurity.srt
|
142.2 KB
|
|
Tracking the Casino Computer Wars Who 1s Winning-the Casino or the Cheat.srt
|
84.8 KB
|
|
Tracking the Casino Computer Wars Who is Winning-the Casino or the Cheat.mp4
|
91.4 MB
|
|
Windows 8 Security Supporting User Confidence.mp4
|
73.0 MB
|
|
Windows 8 Security Supporting User Confidence.srt
|
60.0 KB
|
|
/Video/
|
|
Automatically Detecting Vulnerable Websites Before They Turn Malicious.mp4
|
19.8 MB
|
|
Battling Human Trafficking with Big Data.mp4
|
101.0 MB
|
|
DSCRETE Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse.mp4
|
27.0 MB
|
|
Hulk Eliciting Malicious Behavior in Browser Extensions.mp4
|
24.7 MB
|
|
Lightning Talks for the One-Track Mind.mp4
|
38.0 MB
|
|
On the Feasibility of Large-Scale Infections of iOS Devices.mp4
|
20.8 MB
|
|
On the Feasibility of Large-Scale Infections of iOS Devices.srt
|
30.2 KB
|
|
Phone Phreaks What We Can Learn From the First Network Hackers.mp4
|
72.1 MB
|
|
Phone Phreaks What We Can Learn From the First Network Hackers.srt
|
92.0 KB
|
|
Security Analysis of a Full-Body Scanner.mp4
|
24.7 MB
|
|
Static Detection of Second-Order Vulnerabilities in Web Applications.mp4
|
23.1 MB
|
|
The Emperor’s New Password Manager Security Analysis of Web-based Password Managers.mp4
|
17.4 MB
|
|
XRay Enhancing the Web’s Transparency with Differential Correlation.mp4
|
22.8 MB
|
|
/Presentations/
|
|
sec15_contents-update.pdf
|
79.1 KB
|
|
sec15_erratum.pdf
|
30.1 KB
|
|
sec15_full_proceedings.pdf
|
35.7 MB
|
|
sec15_full_proceedings_interior.pdf
|
35.5 MB
|
|
sec15_message.pdf
|
43.9 KB
|
|
sec15_proceedings_cover.pdf
|
553.0 KB
|
|
sec15_supplement.pdf
|
481.6 KB
|
|
sec15_title_organizers.pdf
|
48.0 KB
|
|
/Video/
|
|
All Your Biases Belong to Us Breaking RC4 in WPA-TKIP and TLS.mp4
|
33.1 MB
|
|
All Your Biases Belong to Us Breaking RC4 in WPA-TKIP and TLS.srt
|
34.8 KB
|
|
Cloudy with a Chance of Breach Forecasting Cyber Security Incidents.mp4
|
25.8 MB
|
|
Cloudy with a Chance of Breach Forecasting Cyber Security Incidents.srt
|
33.8 KB
|
|
Conducting Usable Security Studies It s Complicated.mp4
|
113.0 MB
|
|
Conducting Usable Security Studies It s Complicated.srt
|
128.4 KB
|
|
Inherent Cyber Insecurity and Our National Security Surviving on a Diet of Poisoned Fruit.mp4
|
117.9 MB
|
|
Inherent Cyber Insecurity and Our National Security Surviving on a Diet of Poisoned Fruit.srt
|
119.3 KB
|
|
Investigating the Computer Security Practices and Needs of Journalists.mp4
|
27.6 MB
|
|
Investigating the Computer Security Practices and Needs of Journalists.srt
|
42.7 KB
|
|
Post-Mortem of a Zombie Conficker Cleanup After Six Years.mp4
|
27.7 MB
|
|
Post-Mortem of a Zombie Conficker Cleanup After Six Years.srt
|
28.0 KB
|
|
Preventing Security Bugs through Software Design.mp4
|
75.2 MB
|
|
Preventing Security Bugs through Software Design.srt
|
110.0 KB
|
|
RAPTOR Routing Attacks on Privacy in Tor.mp4
|
22.2 MB
|
|
RAPTOR Routing Attacks on Privacy in Tor.srt
|
24.8 KB
|
|
Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors.mp4
|
28.1 MB
|
|
Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors.srt
|
19.6 KB
|
|
Sound-Proof Usable Two-Factor Authentication Based on Ambient Sound.mp4
|
27.2 MB
|
|
Sound-Proof Usable Two-Factor Authentication Based on Ambient Sound.srt
|
34.2 KB
|
|
The Unexpected Dangers of Dynamic JavaScript.mp4
|
25.8 MB
|
|
The Unexpected Dangers of Dynamic JavaScript.srt
|
40.3 KB
|
|
Towards Discovering and Understanding Task Hijacking in Android.mp4
|
27.2 MB
|
|
Towards Discovering and Understanding Task Hijacking in Android.srt
|
26.8 KB
|
|
Trustworthy Whole-System Provenance for the Linux Kernel.mp4
|
34.0 MB
|
|
Trustworthy Whole-System Provenance for the Linux Kernel.srt
|
40.5 KB
|
|
Type Casting Verification Stopping an Emerging Attack Vector.mp4
|
28.4 MB
|
|
Type Casting Verification Stopping an Emerging Attack Vector.srt
|
33.3 KB
|
|
Why Johnny and Janie Can’t Code Safely Bringing Software Assurance to the Masses.mp4
|
112.7 MB
|
|
Why Johnny and Janie Can’t Code Safely Bringing Software Assurance to the Masses.srt
|
110.0 KB
|
|
USENIX Security 2017/
|
|
USENIX Security '17 - I Have No Idea What I'm Doing - On the Usability of Deploying HTTPS.mp4
|
38.0 MB
|
|
USENIX Security '17 - 6thSense A Context-aware Sensor-based Attack Detector for Smart Devices.mp4
|
47.4 MB
|
|
USENIX Security '17 - A Longitudinal, End-to-End View of the DNSSEC Ecosystem.mp4
|
32.5 MB
|
|
USENIX Security '17 - A Privacy Analysis of Cross-device Tracking.mp4
|
42.3 MB
|
|
USENIX Security '17 - AWare Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings.mp4
|
48.3 MB
|
|
USENIX Security '17 - Adaptive Android Kernel Live Patching.mp4
|
35.5 MB
|
|
USENIX Security '17 - An Ant in a World of Grasshoppers.mp4
|
45.6 MB
|
|
USENIX Security '17 - Attacking the Brain Races in the SDN Control Plane - YouTube.mp4
|
44.2 MB
|
|
USENIX Security '17 - AuthentiCall Efficient Identity and Content Authentication for Phone Calls.mp4
|
44.7 MB
|
|
USENIX Security '17 - AutoLock Why Cache Attacks on ARM Are Harder Than You Think.mp4
|
33.1 MB
|
|
USENIX Security '17 - BLENDER Enabling Local Search with a Hybrid Differential Privacy Model.mp4
|
36.0 MB
|
|
USENIX Security '17 - Beauty and the Burst Remote Identification of Encrypted Video Streams.mp4
|
42.4 MB
|
|
USENIX Security '17 - BinSim Trace-based Semantic Binary Diffing....mp4
|
45.6 MB
|
|
USENIX Security '17 - BootStomp On the Security of Bootloaders in Mobile Devices.mp4
|
32.6 MB
|
|
USENIX Security '17 - CAn’t Touch This....mp4
|
38.7 MB
|
|
USENIX Security '17 - CCSP Controlled Relaxation of Content Security Policies....mp4
|
54.0 MB
|
|
USENIX Security '17 - CHAINIAC Proactive Software-Update Transparency....mp4
|
41.3 MB
|
|
USENIX Security '17 - CLKSCREW Exposing the Perils of Security-Oblivious Energy Management.mp4
|
34.5 MB
|
|
USENIX Security '17 - CacheD Identifying Cache-Based Timing Channels in Production Software.mp4
|
28.8 MB
|
|
USENIX Security '17 - Characterizing the Nature and Dynamics of Tor Exit Blocking.mp4
|
28.0 MB
|
|
USENIX Security '17 - Computer Security, Privacy, and DNA Sequencing....mp4
|
35.4 MB
|
|
USENIX Security '17 - Constant-Time Callees with Variable-Time Callers.mp4
|
34.6 MB
|
|
USENIX Security '17 - DR. CHECKER A Soundy Analysis for Linux Kernel Drivers.mp4
|
40.5 MB
|
|
USENIX Security '17 - Data Hemorrhage, Inequality, and You....mp4
|
89.9 MB
|
|
USENIX Security '17 - DeTor Provably Avoiding Geographic Regions in Tor.mp4
|
33.9 MB
|
|
USENIX Security '17 - Dead Store Elimination (Still) Considered Harmful.mp4
|
30.1 MB
|
|
USENIX Security '17 - Detecting Android Root Exploits by Learning from Root Providers.mp4
|
36.2 MB
|
|
USENIX Security '17 - Detecting Credential Spearphishing in Enterprise Settings.mp4
|
40.7 MB
|
|
USENIX Security '17 - Differential Privacy From Theory to Deployment.mp4
|
58.9 MB
|
|
USENIX Security '17 - Digtool A Virtualization-Based Framework for Detecting Kernel Vulnerabilities.mp4
|
36.6 MB
|
|
USENIX Security '17 - Efficient Protection of Path-Sensitive Control Security.mp4
|
29.7 MB
|
|
USENIX Security '17 - Ensuring Authorized Updates in Multi-user Database-Backed Applications.mp4
|
31.2 MB
|
|
USENIX Security '17 - Exploring User Perceptions of Discrimination in Online Targeted Advertising.mp4
|
32.2 MB
|
|
USENIX Security '17 - Extension Breakdown....mp4
|
35.7 MB
|
|
USENIX Security '17 - From Problems to Patterns to Practice....mp4
|
13.1 MB
|
|
USENIX Security '17 - Game of Registrars....mp4
|
76.1 MB
|
|
USENIX Security '17 - Global Measurement of DNS Manipulation.mp4
|
34.2 MB
|
|
USENIX Security '17 - HELP Helper-Enabled In-Band Device Pairing….mp4
|
38.8 MB
|
|
USENIX Security '17 - Hacking in Darkness Return-oriented Programming against Secure Enclaves.mp4
|
55.0 MB
|
|
USENIX Security '17 - How Double-Fetch Situations turn into Double-Fetch Vulnerabilities....mp4
|
46.3 MB
|
|
USENIX Security '17 - How the Web Tangled Itself.mp4
|
93.2 MB
|
|
USENIX Security '17 - Identifier Binding Attacks and Defenses in Software-Defined Networks.mp4
|
39.9 MB
|
|
USENIX Security '17 - Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing.mp4
|
43.9 MB
|
|
USENIX Security '17 - Locally Differentially Private Protocols for Frequency Estimation.mp4
|
29.4 MB
|
|
USENIX Security '17 - Loophole Timing Attacks on Shared Event Loops in Chrome.mp4
|
49.5 MB
|
|
USENIX Security '17 - MCMix Anonymous Messaging via Secure Multiparty Computation.mp4
|
38.7 MB
|
|
USENIX Security '17 - MPI Multiple Perspective Attack Investigation....mp4
|
44.6 MB
|
|
USENIX Security '17 - Malton Towards On-Device Non-Invasive Mobile Malware Analysis for ART.mp4
|
76.0 MB
|
|
USENIX Security '17 - Measuring HTTPS Adoption on the Web.mp4
|
36.2 MB
|
|
USENIX Security '17 - Measuring the Insecurity of Mobile Deep Links of Android.mp4
|
65.3 MB
|
|
USENIX Security '17 - Neural Nets Can Learn Function Type Signatures From Binaries.mp4
|
41.4 MB
|
|
USENIX Security '17 - Ninja Towards Transparent Tracing and Debugging on ARM.mp4
|
29.4 MB
|
|
USENIX Security '17 - ORide A Privacy-Preserving yet Accountable Ride-Hailing Service.mp4
|
27.9 MB
|
|
USENIX Security '17 - OSS-Fuzz - Google's continuous fuzzing service for open source software.mp4
|
81.6 MB
|
|
USENIX Security '17 - On the effectiveness of mitigations against floating-point timing channels.mp4
|
36.3 MB
|
|
USENIX Security '17 - Opening Remarks and Awards.mp4
|
30.4 MB
|
|
USENIX Security '17 - Oscar A Practical Page-Permissions-Based Scheme....mp4
|
31.9 MB
|
|
USENIX Security '17 - PDF Mirage Content Masking Attack Against Information-Based Online Services.mp4
|
62.1 MB
|
|
USENIX Security '17 - Phoenix Rebirth of a Cryptographic Password-Hardening Service.mp4
|
38.4 MB
|
|
USENIX Security '17 - Picking Up My Tab....mp4
|
48.1 MB
|
|
USENIX Security '17 - PlatPal Detecting Malicious Documents with Platform Diversity.mp4
|
33.9 MB
|
|
USENIX Security '17 - Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts.mp4
|
36.8 MB
|
|
USENIX Security '17 - Predicting the Resilience of Obfuscated Code....mp4
|
32.5 MB
|
|
USENIX Security '17 - Prime+Abort A Timer-Free High-Precision L3 Cache Attack using Intel TSX.mp4
|
40.2 MB
|
|
USENIX Security '17 - Qapla Policy compliance for database-backed systems.mp4
|
35.5 MB
|
|
USENIX Security '17 - REM Resource-Efficient Mining for Blockchains.mp4
|
84.4 MB
|
|
USENIX Security '17 - ROTE Rollback Protection for Trusted Execution.mp4
|
61.0 MB
|
|
USENIX Security '17 - Reverse Engineering x86 Processor Microcode.mp4
|
31.6 MB
|
|
USENIX Security '17 - SLEUTH Real-time Attack Scenario Reconstruction from COTS Audit Data.mp4
|
35.3 MB
|
|
USENIX Security '17 - Same-Origin Policy Evaluation in Modern Browsers.mp4
|
53.4 MB
|
|
USENIX Security '17 - See No Evil, Hear No Evil, Feel No Evil.mp4
|
45.5 MB
|
|
USENIX Security '17 - Seeing Through The Same Lens....mp4
|
39.9 MB
|
|
USENIX Security '17 - SmartAuth User-Centered Authorization for the Internet of Things.mp4
|
45.0 MB
|
|
USENIX Security '17 - SmartPool Practical Decentralized Pooled Mining.mp4
|
45.6 MB
|
|
USENIX Security '17 - Speeding up detection of SHA-1 collision attacks....mp4
|
39.6 MB
|
|
USENIX Security '17 - Strong and Efficient Cache Side-Channel Protection....mp4
|
38.0 MB
|
|
USENIX Security '17 - Syntia Synthesizing the Semantics of Obfuscated Code.mp4
|
36.9 MB
|
|
USENIX Security '17 - Telling Your Secrets without Page Faults....mp4
|
32.6 MB
|
|
USENIX Security '17 - The Loopix Anonymity System.mp4
|
42.3 MB
|
|
USENIX Security '17 - Towards Efficient Heap Overflow Discovery.mp4
|
31.4 MB
|
|
USENIX Security '17 - Towards Practical Tools for Side Channel Aware Software Engineering....mp4
|
31.3 MB
|
|
USENIX Security '17 - Transcend Detecting Concept Drift in Malware Classification Models.mp4
|
43.1 MB
|
|
USENIX Security '17 - TrustBase An Architecture to Repair and Strengthen....mp4
|
39.7 MB
|
|
USENIX Security '17 - USB Snooping Made Easy Crosstalk Leakage Attacks on USB Hubs.mp4
|
39.1 MB
|
|
USENIX Security '17 - Vale Verifying High-Performance Cryptographic Assembly Code.mp4
|
35.2 MB
|
|
USENIX Security '17 - Venerable Variadic Vulnerabilities Vanquished.mp4
|
37.0 MB
|
|
USENIX Security '17 - Walkie-Talkie....mp4
|
44.7 MB
|
|
USENIX Security '17 - When Your Threat Model Is Everything Defensive Security in Modern Newsrooms.mp4
|
126.7 MB
|
|
USENIX Security '17 - When the Weakest Link is Strong....mp4
|
38.0 MB
|
|
USENIX Security '17 - kAFL Hardware-Assisted Feedback Fuzzing for OS Kernels.mp4
|
40.2 MB
|
|
USENIX Security '17 - vTZ Virtualizing ARM TrustZone.mp4
|
34.3 MB
|
|
USENIX Security ’17 - Understanding the Mirai Botnet.mp4
|
44.6 MB
|
|
USENIX Security 2018/
|
|
A Bad Dream Subverting Trusted Platform Module While You Are Sleeping.en.transcribed.srt
|
54.3 KB
|
|
A Bad Dream Subverting Trusted Platform Module While You Are Sleeping.mp4
|
25.0 MB
|
|
A Sense of Time for JavaScript and Node.js.en.transcribed.srt
|
61.6 KB
|
|
A Sense of Time for JavaScript and Node.js.mp4
|
17.7 MB
|
|
A4NT Author Attribute Anonymity by Adversarial Training of Neural Machine Translation.en.transcribed.srt
|
70.5 KB
|
|
A4NT Author Attribute Anonymity by Adversarial Training of Neural Machine Translation.mp4
|
23.3 MB
|
|
ACES Automatic Compartments for Embedded Systems.en.transcribed.srt
|
53.6 KB
|
|
ACES Automatic Compartments for Embedded Systems.mp4
|
14.1 MB
|
|
ATtention Spanned Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem.en.transcribed.srt
|
55.5 KB
|
|
ATtention Spanned Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem.mp4
|
18.8 MB
|
|
Acquisitional Rule-based Engine for Discovering Internet-of-Things Devices.en.transcribed.srt
|
37.5 KB
|
|
Acquisitional Rule-based Engine for Discovering Internet-of-Things Devices.mp4
|
20.1 MB
|
|
All Your GPS Are Belong To Us Towards Stealthy Manipulation of Road Navigation Systems.en.transcribed.srt
|
55.3 KB
|
|
All Your GPS Are Belong To Us Towards Stealthy Manipulation of Road Navigation Systems.mp4
|
20.7 MB
|
|
An Empirical Analysis of Anonymity in Zcash.en.transcribed.srt
|
60.1 KB
|
|
An Empirical Analysis of Anonymity in Zcash.mp4
|
17.1 MB
|
|
An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications.en.transcribed.srt
|
45.9 KB
|
|
An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications.mp4
|
18.0 MB
|
|
Analogy Cyber Security-From 0101 to Mixed Signals.en.transcribed.srt
|
105.1 KB
|
|
Analogy Cyber Security-From 0101 to Mixed Signals.mp4
|
47.3 MB
|
|
Analysis of Privacy Protections in Fitness Tracking Social Networks -or- You can run.en.transcribed.srt
|
54.1 KB
|
|
Analysis of Privacy Protections in Fitness Tracking Social Networks -or- You can run.mp4
|
23.6 MB
|
|
Arbitrum Scalable, private smart contracts.en.transcribed.srt
|
58.8 KB
|
|
Arbitrum Scalable, private smart contracts.mp4
|
18.5 MB
|
|
AttriGuard A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning.mp4
|
18.0 MB
|
|
Automatic Heap Layout Manipulation for Exploitation.en.transcribed.srt
|
68.7 KB
|
|
Automatic Heap Layout Manipulation for Exploitation.mp4
|
18.8 MB
|
|
Bamboozling Certificate Authorities with BGP.en.transcribed.srt
|
65.6 KB
|
|
Bamboozling Certificate Authorities with BGP.mp4
|
23.7 MB
|
|
Better managed than memorized Studying the Impact of Managers on Password Strength and Reuse.en.transcribed.srt
|
76.8 KB
|
|
Better managed than memorized Studying the Impact of Managers on Password Strength and Reuse.mp4
|
26.3 MB
|
|
BlackIoT IoT Botnet of High Wattage Devices Can Disrupt the Power Grid.en.transcribed.srt
|
65.1 KB
|
|
BlackIoT IoT Botnet of High Wattage Devices Can Disrupt the Power Grid.mp4
|
28.6 MB
|
|
BurnBox Self-Revocable Encryption in a World Of Compelled Access.en.transcribed.srt
|
62.0 KB
|
|
BurnBox Self-Revocable Encryption in a World Of Compelled Access.mp4
|
19.2 MB
|
|
Charm Facilitating Dynamic Analysis of Device Drivers of Mobile Systems.en.transcribed.srt
|
50.2 KB
|
|
Charm Facilitating Dynamic Analysis of Device Drivers of Mobile Systems.mp4
|
21.7 MB
|
|
Chipmunk or Pepe Using Acoustical Analysis to Detect Voice-Channel Fraud at Scale.en.transcribed.srt
|
142.2 KB
|
|
Chipmunk or Pepe Using Acoustical Analysis to Detect Voice-Channel Fraud at Scale.mp4
|
44.0 MB
|
|
CommanderSong A Systematic Approach for Practical Adversarial Voice Recognition.en.transcribed.srt
|
53.0 KB
|
|
CommanderSong A Systematic Approach for Practical Adversarial Voice Recognition.mp4
|
19.5 MB
|
|
DATA - Differential Address Trace Analysis Finding Address-based Side-Channels in Binaries.en.transcribed.srt
|
58.5 KB
|
|
DATA - Differential Address Trace Analysis Finding Address-based Side-Channels in Binaries.mp4
|
18.0 MB
|
|
DIZK A Distributed Zero Knowledge Proof System.en.transcribed.srt
|
51.6 KB
|
|
DIZK A Distributed Zero Knowledge Proof System.mp4
|
15.1 MB
|
|
Debloating Software through Piece-Wise Compilation and Loading.en.transcribed.srt
|
57.8 KB
|
|
Debloating Software through Piece-Wise Compilation and Loading.mp4
|
19.0 MB
|
|
DelegaTEE Brokered Delegation Using Trusted Execution Environments.en.transcribed.srt
|
76.3 KB
|
|
DelegaTEE Brokered Delegation Using Trusted Execution Environments.mp4
|
23.0 MB
|
|
Dependence-Preserving Data Compaction for Scalable Forensic Analysis.en.transcribed.srt
|
58.4 KB
|
|
Dependence-Preserving Data Compaction for Scalable Forensic Analysis.mp4
|
21.4 MB
|
|
Discovering Flaws in Security-Focused Static Analysis Tools for Android using Systematic Mutation.en.transcribed.srt
|
50.0 KB
|
|
Discovering Flaws in Security-Focused Static Analysis Tools for Android using Systematic Mutation.mp4
|
20.2 MB
|
|
Efail Breaking S MIME and OpenPGP Email Encryption using Exfiltration Channels.mp4
|
17.1 MB
|
|
Effective Detection of Multimedia Protocol Tunneling using Machine Learning.en.transcribed.srt
|
63.7 KB
|
|
Effective Detection of Multimedia Protocol Tunneling using Machine Learning.mp4
|
17.4 MB
|
|
Enabling Refinable Cross-Host Attack Investigation with Efficient Data Flow Tagging and Tracking.en.transcribed.srt
|
42.3 KB
|
|
Enabling Refinable Cross-Host Attack Investigation with Efficient Data Flow Tagging and Tracking.mp4
|
19.0 MB
|
|
End-Users Get Maneuvered Empirical Analysis of Redirection Hijacking in Content Delivery Networks.en.transcribed.srt
|
40.6 KB
|
|
End-Users Get Maneuvered Empirical Analysis of Redirection Hijacking in Content Delivery Networks.mp4
|
16.5 MB
|
|
End-to-End Measurements of Email Spoofing Attacks.en.transcribed.srt
|
56.4 KB
|
|
End-to-End Measurements of Email Spoofing Attacks.mp4
|
23.0 MB
|
|
Enter the Hydra Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts.en.transcribed.srt
|
85.1 KB
|
|
Enter the Hydra Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts.mp4
|
33.8 MB
|
|
Erays Reverse Engineering Ethereum's Opaque Smart Contracts.en.transcribed.srt
|
55.2 KB
|
|
Erays Reverse Engineering Ethereum's Opaque Smart Contracts.mp4
|
18.8 MB
|
|
FANCI Feature-based Automated NXDomain Classification and Intelligence.en.transcribed.srt
|
43.7 KB
|
|
FANCI Feature-based Automated NXDomain Classification and Intelligence.mp4
|
14.8 MB
|
|
FUZE Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities.mp4
|
18.8 MB
|
|
Fast and Service-preserving Recovery from Malware Infections Using CRIU.en.transcribed.srt
|
74.7 KB
|
|
Fast and Service-preserving Recovery from Malware Infections Using CRIU.mp4
|
18.8 MB
|
|
Fear the Reaper Characterization and Fast Detection of Card Skimmers.en.transcribed.srt
|
54.9 KB
|
|
Fear the Reaper Characterization and Fast Detection of Card Skimmers.mp4
|
18.3 MB
|
|
FlowCog Context-aware Semantics Extraction and Analysis of Information Flow Leaks in Android Apps.en.transcribed.srt
|
49.5 KB
|
|
FlowCog Context-aware Semantics Extraction and Analysis of Information Flow Leaks in Android Apps.mp4
|
19.9 MB
|
|
Foreshadow Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution.mp4
|
24.4 MB
|
|
Forgetting of Passwords Ecological Theory and Data.en.transcribed.srt
|
38.7 KB
|
|
Forgetting of Passwords Ecological Theory and Data.mp4
|
17.8 MB
|
|
Formal Security Analysis of Neural Networks using Symbolic Intervals.en.transcribed.srt
|
53.2 KB
|
|
Formal Security Analysis of Neural Networks using Symbolic Intervals.mp4
|
19.8 MB
|
|
Fp-Scanner The Privacy Implications of Browser Fingerprint Inconsistencies.en.transcribed.srt
|
56.8 KB
|
|
Fp-Scanner The Privacy Implications of Browser Fingerprint Inconsistencies.mp4
|
21.2 MB
|
|
Freezing the Web A Study of ReDoS Vulnerabilities in JavaScript-based Web Servers.en.transcribed.srt
|
52.3 KB
|
|
Freezing the Web A Study of ReDoS Vulnerabilities in JavaScript-based Web Servers.mp4
|
17.3 MB
|
|
From Patching Delays to Infection Symptoms....en.transcribed.srt
|
54.3 KB
|
|
From Patching Delays to Infection Symptoms....mp4
|
19.1 MB
|
|
GAZELLE A Low Latency Framework for Secure Neural Network Inference.mp4
|
22.6 MB
|
|
Guarder A Tunable Secure Allocator.en.transcribed.srt
|
61.0 KB
|
|
Guarder A Tunable Secure Allocator.mp4
|
16.5 MB
|
|
HeapHopper Bringing Bounded Model Checking to Heap Implementation Security.en.transcribed.srt
|
59.0 KB
|
|
HeapHopper Bringing Bounded Model Checking to Heap Implementation Security.mp4
|
14.2 MB
|
|
How Do Tor Users Interact With Onion Services.en.transcribed.srt
|
55.0 KB
|
|
How Do Tor Users Interact With Onion Services.mp4
|
18.4 MB
|
|
IMIX In-Process Memory Isolation EXtension.en.transcribed.srt
|
46.8 KB
|
|
IMIX In-Process Memory Isolation EXtension.mp4
|
15.0 MB
|
|
Inception System-Wide Security Testing of Real-World Embedded Systems Software.en.transcribed.srt
|
49.6 KB
|
|
Inception System-Wide Security Testing of Real-World Embedded Systems Software.mp4
|
17.9 MB
|
|
Injected and Delivered Fabricating Implicit Control over Actuation Systems by Spoofing.en.transcribed.srt
|
38.1 KB
|
|
Injected and Delivered Fabricating Implicit Control over Actuation Systems by Spoofing.mp4
|
19.3 MB
|
|
Malicious Management Unit Why Stopping Cache Attacks in Software is Harder Than You Think.en.transcribed.srt
|
63.0 KB
|
|
Malicious Management Unit Why Stopping Cache Attacks in Software is Harder Than You Think.mp4
|
18.5 MB
|
|
Man-in-the-Machine Exploiting Ill-Secured Communication Inside the Computer.en.transcribed.srt
|
47.8 KB
|
|
Man-in-the-Machine Exploiting Ill-Secured Communication Inside the Computer.mp4
|
18.5 MB
|
|
Medical Device Cybersecurity through the FDA Lens.en.transcribed.srt
|
107.5 KB
|
|
Medical Device Cybersecurity through the FDA Lens.mp4
|
44.5 MB
|
|
Meltdown Reading Kernel Memory from User Space.en.transcribed.srt
|
57.5 KB
|
|
Meltdown Reading Kernel Memory from User Space.mp4
|
20.7 MB
|
|
Modelling and Analysis of a Hierarchy of Distance Bounding Attacks.en.transcribed.srt
|
59.4 KB
|
|
Modelling and Analysis of a Hierarchy of Distance Bounding Attacks.mp4
|
25.7 MB
|
|
MoonShine Optimizing OS Fuzzer Seed Selection with Trace Distillation.en.transcribed.srt
|
66.6 KB
|
|
MoonShine Optimizing OS Fuzzer Seed Selection with Trace Distillation.mp4
|
19.5 MB
|
|
NAVEX Precise and Scalable Exploit Generation for Dynamic Web Applications.en.transcribed.srt
|
49.9 KB
|
|
NAVEX Precise and Scalable Exploit Generation for Dynamic Web Applications.mp4
|
21.9 MB
|
|
NetHide Secure and Practical Network Topology Obfuscation.en.transcribed.srt
|
63.0 KB
|
|
NetHide Secure and Practical Network Topology Obfuscation.mp4
|
24.4 MB
|
|
O Single Sign-Off, Where Art Thou An Empirical Analysis of Single Sign-On.en.transcribed.srt
|
52.7 KB
|
|
O Single Sign-Off, Where Art Thou An Empirical Analysis of Single Sign-On.mp4
|
17.8 MB
|
|
Off-Path TCP Exploit How Wireless Routers Can Jeopardize Your Secrets.en.transcribed.srt
|
49.8 KB
|
|
Off-Path TCP Exploit How Wireless Routers Can Jeopardize Your Secrets.mp4
|
18.3 MB
|
|
One&Done A Single-Decryption EM-Based Attack on OpenSSL's Constant-Time Blinded RSA.mp4
|
22.3 MB
|
|
Plug and Prey Measuring the Commoditization of Cybercrime via Online Anonymous Markets.en.transcribed.srt
|
65.0 KB
|
|
Plug and Prey Measuring the Commoditization of Cybercrime via Online Anonymous Markets.mp4
|
19.7 MB
|
|
Polisis Automated Analysis and Presentation of Privacy Policies Using Deep Learning.en.transcribed.srt
|
60.6 KB
|
|
Polisis Automated Analysis and Presentation of Privacy Policies Using Deep Learning.mp4
|
21.0 MB
|
|
Practical Accountability of Secret Processes.en.transcribed.srt
|
89.1 KB
|
|
Practical Accountability of Secret Processes.mp4
|
18.3 MB
|
|
Precise and Accurate Patch Presence Test for Binaries.en.transcribed.srt
|
59.4 KB
|
|
Precise and Accurate Patch Presence Test for Binaries.mp4
|
19.0 MB
|
|
Privacy for Tigers.en.transcribed.srt
|
126.3 KB
|
|
Privacy for Tigers.mp4
|
39.2 MB
|
|
Q Why Do Keynote Speakers Keep Suggesting That Improving Security Is Possible.en.transcribed.srt
|
155.9 KB
|
|
Q Why Do Keynote Speakers Keep Suggesting That Improving Security Is Possible.mp4
|
58.0 MB
|
|
QSYM A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing.en.transcribed.srt
|
51.5 KB
|
|
QSYM A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing.mp4
|
20.1 MB
|
|
Quack Scalable Remote Measurement of Application-Layer Censorship.en.transcribed.srt
|
73.0 KB
|
|
Quack Scalable Remote Measurement of Application-Layer Censorship.mp4
|
22.3 MB
|
|
Rampart Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks.mp4
|
19.8 MB
|
|
Reading Thieves' Cant Automatically Identifying and Understanding Dark Jargons from Cybercrime.en.transcribed.srt
|
49.6 KB
|
|
Reading Thieves' Cant Automatically Identifying and Understanding Dark Jargons from Cybercrime.mp4
|
19.1 MB
|
|
Rethinking Access Control and Authentication for the Home Internet of Things (IoT).en.transcribed.srt
|
63.6 KB
|
|
Rethinking Access Control and Authentication for the Home Internet of Things (IoT).mp4
|
20.7 MB
|
|
Return Of Bleichenbacher's Oracle Threat (ROBOT).en.transcribed.srt
|
61.2 KB
|
|
Return Of Bleichenbacher's Oracle Threat (ROBOT).mp4
|
17.7 MB
|
|
SAD THUG Structural Anomaly Detection for Transmissions of High-value Information Using Graphics.en.transcribed.srt
|
55.9 KB
|
|
SAD THUG Structural Anomaly Detection for Transmissions of High-value Information Using Graphics.mp4
|
16.6 MB
|
|
SAQL A Stream-based Query System for Real-Time Abnormal System Behavior Detection.en.transcribed.srt
|
63.3 KB
|
|
SAQL A Stream-based Query System for Real-Time Abnormal System Behavior Detection.mp4
|
24.3 MB
|
|
Schrödinger's RAT Profiling the Stakeholders in the Remote Access Trojan Ecosystem.en.transcribed.srt
|
39.3 KB
|
|
Schrödinger's RAT Profiling the Stakeholders in the Remote Access Trojan Ecosystem.mp4
|
13.4 MB
|
|
Security Namespace Making Linux Security Frameworks Available to Containers.en.transcribed.srt
|
87.0 KB
|
|
Security Namespace Making Linux Security Frameworks Available to Containers.mp4
|
24.6 MB
|
|
Sensitive Information Tracking in Commodity IoT.en.transcribed.srt
|
39.3 KB
|
|
Sensitive Information Tracking in Commodity IoT.mp4
|
17.8 MB
|
|
Shielding Software From Privileged Side-Channel Attacks.en.transcribed.srt
|
53.0 KB
|
|
Shielding Software From Privileged Side-Channel Attacks.mp4
|
19.5 MB
|
|
Simple Password-Hardened Encryption Services.en.transcribed.srt
|
32.3 KB
|
|
Simple Password-Hardened Encryption Services.mp4
|
11.4 MB
|
|
Skill Squatting Attacks on Amazon Alexa.en.transcribed.srt
|
83.0 KB
|
|
Skill Squatting Attacks on Amazon Alexa.mp4
|
23.4 MB
|
|
Solving the Next Billion-People Privacy Problem.en.transcribed.srt
|
133.4 KB
|
|
Solving the Next Billion-People Privacy Problem.mp4
|
45.8 MB
|
|
Tackling runtime-based obfuscation in Android with TIRO.en.transcribed.srt
|
62.0 KB
|
|
Tackling runtime-based obfuscation in Android with TIRO.mp4
|
16.4 MB
|
|
The Battle for New York A Case Study of Applied Digital Threat Modeling at the Enterprise Level.en.transcribed.srt
|
57.1 KB
|
|
The Battle for New York A Case Study of Applied Digital Threat Modeling at the Enterprise Level.mp4
|
21.7 MB
|
|
The Broken Shield Measuring Revocation Effectiveness in the Windows Code-Signing PKI.en.transcribed.srt
|
56.9 KB
|
|
The Broken Shield Measuring Revocation Effectiveness in the Windows Code-Signing PKI.mp4
|
18.7 MB
|
|
The Dangers of Key Reuse Practical Attacks on IPsec IKE.en.transcribed.srt
|
64.4 KB
|
|
The Dangers of Key Reuse Practical Attacks on IPsec IKE.mp4
|
21.0 MB
|
|
The Guard's Dilemma Efficient Code-Reuse Attacks Against Intel SGX.en.transcribed.srt
|
63.3 KB
|
|
The Guard's Dilemma Efficient Code-Reuse Attacks Against Intel SGX.mp4
|
23.1 MB
|
|
The Law and Economics of Bug Bounties.en.transcribed.srt
|
133.0 KB
|
|
The Law and Economics of Bug Bounties.mp4
|
46.3 MB
|
|
The Rewards and Costs of Stronger Passwords in a University Linking Password Lifetime to Strength.en.transcribed.srt
|
65.9 KB
|
|
The Rewards and Costs of Stronger Passwords in a University Linking Password Lifetime to Strength.mp4
|
21.7 MB
|
|
The Second Crypto War-What's Different Now.en.transcribed.srt
|
131.8 KB
|
|
The Second Crypto War-What's Different Now.mp4
|
40.1 MB
|
|
The Secure Socket API TLS as an Operating System Service.en.transcribed.srt
|
82.4 KB
|
|
The Secure Socket API TLS as an Operating System Service.mp4
|
19.2 MB
|
|
The aftermath of a crypto-ransomware attack at a large academic institution.en.transcribed.srt
|
51.6 KB
|
|
The aftermath of a crypto-ransomware attack at a large academic institution.mp4
|
14.1 MB
|
|
Towards Predicting Efficient and Anonymous Tor Circuits.en.transcribed.srt
|
63.1 KB
|
|
Towards Predicting Efficient and Anonymous Tor Circuits.mp4
|
17.9 MB
|
|
Towards a Secure Zero-rating Framework with Three Parties.en.transcribed.srt
|
51.4 KB
|
|
Towards a Secure Zero-rating Framework with Three Parties.mp4
|
17.1 MB
|
|
Translation Leak-aside Buffer Defeating Cache Side-channel Protections with TLB Attacks.en.transcribed.srt
|
75.1 KB
|
|
Translation Leak-aside Buffer Defeating Cache Side-channel Protections with TLB Attacks.mp4
|
29.2 MB
|
|
Turning Your Weakness Into a Strength Watermarking Deep Neural Networks by Backdooring.en.transcribed.srt
|
71.5 KB
|
|
Turning Your Weakness Into a Strength Watermarking Deep Neural Networks by Backdooring.mp4
|
23.1 MB
|
|
Understanding the Reproducibility of Crowd-reported Security Vulnerabilities.en.transcribed.srt
|
53.2 KB
|
|
Understanding the Reproducibility of Crowd-reported Security Vulnerabilities.mp4
|
31.0 MB
|
|
Unveiling and Quantifying Facebook Exploitation of Sensitive Personal Data for Advertising Purposes.en.transcribed.srt
|
56.8 KB
|
|
Unveiling and Quantifying Facebook Exploitation of Sensitive Personal Data for Advertising Purposes.mp4
|
22.3 MB
|
|
Vetting Single Sign-On SDK Implementations via Symbolic Reasoning.en.transcribed.srt
|
35.7 KB
|
|
Vetting Single Sign-On SDK Implementations via Symbolic Reasoning.mp4
|
17.8 MB
|
|
WPSE Fortifying Web Protocols via Browser-Side Security Monitoring.en.transcribed.srt
|
47.5 KB
|
|
WPSE Fortifying Web Protocols via Browser-Side Security Monitoring.mp4
|
13.1 MB
|
|
We Still Don't Have Secure Cross-Domain Requests an Empirical Study of CORS.en.transcribed.srt
|
50.7 KB
|
|
We Still Don't Have Secure Cross-Domain Requests an Empirical Study of CORS.mp4
|
21.5 MB
|
|
When Does Machine Learning FAIL Generalized Transferability for Evasion and Poisoning Attacks.en.transcribed.srt
|
69.4 KB
|
|
When Does Machine Learning FAIL Generalized Transferability for Evasion and Poisoning Attacks.mp4
|
37.5 MB
|
|
Who Is Answering My Queries Understanding and Characterizing Interception....en.transcribed.srt
|
48.5 KB
|
|
Who Is Answering My Queries Understanding and Characterizing Interception....mp4
|
19.0 MB
|
|
Who Left Open the Cookie Jar A Comprehensive Evaluation of Third-Party Cookie Policies.en.transcribed.srt
|
53.5 KB
|
|
Who Left Open the Cookie Jar A Comprehensive Evaluation of Third-Party Cookie Policies.mp4
|
17.3 MB
|
|
With Great Training Comes Great Vulnerability Practical Attacks against Transfer Learning.en.transcribed.srt
|
58.4 KB
|
|
With Great Training Comes Great Vulnerability Practical Attacks against Transfer Learning.mp4
|
26.2 MB
|
|
teEther Gnawing at Ethereum to Automatically Exploit Smart Contracts.mp4
|
24.2 MB
|
|
|
|
USENIX Security thank you.txt
|
0.8 KB
|
|
USENIX logo.jpg
|
4.4 KB
|
|
Total files 369
|