FileMood

Download USENIX Security

USENIX Security

Name

USENIX Security

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

8.5 GB

Total Files

369

Last Seen

Hash

108827D1DBDD3C70F12E0FED05C8AD435F1D5349

/Video/

Building Securable Infrastructure Open-Source Private Clouds.mp4

101.0 MB

/Video/

Building Securable Infrastructure Open-Source Private Clouds.srt

128.5 KB

Confessions of a Recovering Data Broker.mp4

123.1 MB

Confessions of a Recovering Data Broker.srt

121.2 KB

Dismantling Megamos Crypto Wirelessly Lockpicking a Vehicle Immobilizer.mp4

35.0 MB

Dismantling Megamos Crypto Wirelessly Lockpicking a Vehicle Immobilizer.srt

40.3 KB

Dr. Felten Goes To Washington Lessons from 18 Months in Government.mp4

195.7 MB

Dr. Felten Goes To Washington Lessons from 18 Months in Government.srt

139.4 KB

Security Team 2.0.mp4

114.0 MB

Security Team 2.0.srt

129.0 KB

The White House s Priorities for Cybersecurity.mp4

210.8 MB

The White House s Priorities for Cybersecurity.srt

142.2 KB

Tracking the Casino Computer Wars Who 1s Winning-the Casino or the Cheat.srt

84.8 KB

Tracking the Casino Computer Wars Who is Winning-the Casino or the Cheat.mp4

91.4 MB

Windows 8 Security Supporting User Confidence.mp4

73.0 MB

Windows 8 Security Supporting User Confidence.srt

60.0 KB

/Video/

Automatically Detecting Vulnerable Websites Before They Turn Malicious.mp4

19.8 MB

Battling Human Trafficking with Big Data.mp4

101.0 MB

DSCRETE Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse.mp4

27.0 MB

Hulk Eliciting Malicious Behavior in Browser Extensions.mp4

24.7 MB

Lightning Talks for the One-Track Mind.mp4

38.0 MB

On the Feasibility of Large-Scale Infections of iOS Devices.mp4

20.8 MB

On the Feasibility of Large-Scale Infections of iOS Devices.srt

30.2 KB

Phone Phreaks What We Can Learn From the First Network Hackers.mp4

72.1 MB

Phone Phreaks What We Can Learn From the First Network Hackers.srt

92.0 KB

Security Analysis of a Full-Body Scanner.mp4

24.7 MB

Static Detection of Second-Order Vulnerabilities in Web Applications.mp4

23.1 MB

The Emperor’s New Password Manager Security Analysis of Web-based Password Managers.mp4

17.4 MB

XRay Enhancing the Web’s Transparency with Differential Correlation.mp4

22.8 MB

/Presentations/

sec15_contents-update.pdf

79.1 KB

sec15_erratum.pdf

30.1 KB

sec15_full_proceedings.pdf

35.7 MB

sec15_full_proceedings_interior.pdf

35.5 MB

sec15_message.pdf

43.9 KB

sec15_proceedings_cover.pdf

553.0 KB

sec15_supplement.pdf

481.6 KB

sec15_title_organizers.pdf

48.0 KB

/Video/

All Your Biases Belong to Us Breaking RC4 in WPA-TKIP and TLS.mp4

33.1 MB

All Your Biases Belong to Us Breaking RC4 in WPA-TKIP and TLS.srt

34.8 KB

Cloudy with a Chance of Breach Forecasting Cyber Security Incidents.mp4

25.8 MB

Cloudy with a Chance of Breach Forecasting Cyber Security Incidents.srt

33.8 KB

Conducting Usable Security Studies It s Complicated.mp4

113.0 MB

Conducting Usable Security Studies It s Complicated.srt

128.4 KB

Inherent Cyber Insecurity and Our National Security Surviving on a Diet of Poisoned Fruit.mp4

117.9 MB

Inherent Cyber Insecurity and Our National Security Surviving on a Diet of Poisoned Fruit.srt

119.3 KB

Investigating the Computer Security Practices and Needs of Journalists.mp4

27.6 MB

Investigating the Computer Security Practices and Needs of Journalists.srt

42.7 KB

Post-Mortem of a Zombie Conficker Cleanup After Six Years.mp4

27.7 MB

Post-Mortem of a Zombie Conficker Cleanup After Six Years.srt

28.0 KB

Preventing Security Bugs through Software Design.mp4

75.2 MB

Preventing Security Bugs through Software Design.srt

110.0 KB

RAPTOR Routing Attacks on Privacy in Tor.mp4

22.2 MB

RAPTOR Routing Attacks on Privacy in Tor.srt

24.8 KB

Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors.mp4

28.1 MB

Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors.srt

19.6 KB

Sound-Proof Usable Two-Factor Authentication Based on Ambient Sound.mp4

27.2 MB

Sound-Proof Usable Two-Factor Authentication Based on Ambient Sound.srt

34.2 KB

The Unexpected Dangers of Dynamic JavaScript.mp4

25.8 MB

The Unexpected Dangers of Dynamic JavaScript.srt

40.3 KB

Towards Discovering and Understanding Task Hijacking in Android.mp4

27.2 MB

Towards Discovering and Understanding Task Hijacking in Android.srt

26.8 KB

Trustworthy Whole-System Provenance for the Linux Kernel.mp4

34.0 MB

Trustworthy Whole-System Provenance for the Linux Kernel.srt

40.5 KB

Type Casting Verification Stopping an Emerging Attack Vector.mp4

28.4 MB

Type Casting Verification Stopping an Emerging Attack Vector.srt

33.3 KB

Why Johnny and Janie Can’t Code Safely Bringing Software Assurance to the Masses.mp4

112.7 MB

Why Johnny and Janie Can’t Code Safely Bringing Software Assurance to the Masses.srt

110.0 KB

USENIX Security 2017/

USENIX Security '17 - I Have No Idea What I'm Doing - On the Usability of Deploying HTTPS.mp4

38.0 MB

USENIX Security '17 - 6thSense A Context-aware Sensor-based Attack Detector for Smart Devices.mp4

47.4 MB

USENIX Security '17 - A Longitudinal, End-to-End View of the DNSSEC Ecosystem.mp4

32.5 MB

USENIX Security '17 - A Privacy Analysis of Cross-device Tracking.mp4

42.3 MB

USENIX Security '17 - AWare Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings.mp4

48.3 MB

USENIX Security '17 - Adaptive Android Kernel Live Patching.mp4

35.5 MB

USENIX Security '17 - An Ant in a World of Grasshoppers.mp4

45.6 MB

USENIX Security '17 - Attacking the Brain Races in the SDN Control Plane - YouTube.mp4

44.2 MB

USENIX Security '17 - AuthentiCall Efficient Identity and Content Authentication for Phone Calls.mp4

44.7 MB

USENIX Security '17 - AutoLock Why Cache Attacks on ARM Are Harder Than You Think.mp4

33.1 MB

USENIX Security '17 - BLENDER Enabling Local Search with a Hybrid Differential Privacy Model.mp4

36.0 MB

USENIX Security '17 - Beauty and the Burst Remote Identification of Encrypted Video Streams.mp4

42.4 MB

USENIX Security '17 - BinSim Trace-based Semantic Binary Diffing....mp4

45.6 MB

USENIX Security '17 - BootStomp On the Security of Bootloaders in Mobile Devices.mp4

32.6 MB

USENIX Security '17 - CAn’t Touch This....mp4

38.7 MB

USENIX Security '17 - CCSP Controlled Relaxation of Content Security Policies....mp4

54.0 MB

USENIX Security '17 - CHAINIAC Proactive Software-Update Transparency....mp4

41.3 MB

USENIX Security '17 - CLKSCREW Exposing the Perils of Security-Oblivious Energy Management.mp4

34.5 MB

USENIX Security '17 - CacheD Identifying Cache-Based Timing Channels in Production Software.mp4

28.8 MB

USENIX Security '17 - Characterizing the Nature and Dynamics of Tor Exit Blocking.mp4

28.0 MB

USENIX Security '17 - Computer Security, Privacy, and DNA Sequencing....mp4

35.4 MB

USENIX Security '17 - Constant-Time Callees with Variable-Time Callers.mp4

34.6 MB

USENIX Security '17 - DR. CHECKER A Soundy Analysis for Linux Kernel Drivers.mp4

40.5 MB

USENIX Security '17 - Data Hemorrhage, Inequality, and You....mp4

89.9 MB

USENIX Security '17 - DeTor Provably Avoiding Geographic Regions in Tor.mp4

33.9 MB

USENIX Security '17 - Dead Store Elimination (Still) Considered Harmful.mp4

30.1 MB

USENIX Security '17 - Detecting Android Root Exploits by Learning from Root Providers.mp4

36.2 MB

USENIX Security '17 - Detecting Credential Spearphishing in Enterprise Settings.mp4

40.7 MB

USENIX Security '17 - Differential Privacy From Theory to Deployment.mp4

58.9 MB

USENIX Security '17 - Digtool A Virtualization-Based Framework for Detecting Kernel Vulnerabilities.mp4

36.6 MB

USENIX Security '17 - Efficient Protection of Path-Sensitive Control Security.mp4

29.7 MB

USENIX Security '17 - Ensuring Authorized Updates in Multi-user Database-Backed Applications.mp4

31.2 MB

USENIX Security '17 - Exploring User Perceptions of Discrimination in Online Targeted Advertising.mp4

32.2 MB

USENIX Security '17 - Extension Breakdown....mp4

35.7 MB

USENIX Security '17 - From Problems to Patterns to Practice....mp4

13.1 MB

USENIX Security '17 - Game of Registrars....mp4

76.1 MB

USENIX Security '17 - Global Measurement of DNS Manipulation.mp4

34.2 MB

USENIX Security '17 - HELP Helper-Enabled In-Band Device Pairing….mp4

38.8 MB

USENIX Security '17 - Hacking in Darkness Return-oriented Programming against Secure Enclaves.mp4

55.0 MB

USENIX Security '17 - How Double-Fetch Situations turn into Double-Fetch Vulnerabilities....mp4

46.3 MB

USENIX Security '17 - How the Web Tangled Itself.mp4

93.2 MB

USENIX Security '17 - Identifier Binding Attacks and Defenses in Software-Defined Networks.mp4

39.9 MB

USENIX Security '17 - Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing.mp4

43.9 MB

USENIX Security '17 - Locally Differentially Private Protocols for Frequency Estimation.mp4

29.4 MB

USENIX Security '17 - Loophole Timing Attacks on Shared Event Loops in Chrome.mp4

49.5 MB

USENIX Security '17 - MCMix Anonymous Messaging via Secure Multiparty Computation.mp4

38.7 MB

USENIX Security '17 - MPI Multiple Perspective Attack Investigation....mp4

44.6 MB

USENIX Security '17 - Malton Towards On-Device Non-Invasive Mobile Malware Analysis for ART.mp4

76.0 MB

USENIX Security '17 - Measuring HTTPS Adoption on the Web.mp4

36.2 MB

USENIX Security '17 - Measuring the Insecurity of Mobile Deep Links of Android.mp4

65.3 MB

USENIX Security '17 - Neural Nets Can Learn Function Type Signatures From Binaries.mp4

41.4 MB

USENIX Security '17 - Ninja Towards Transparent Tracing and Debugging on ARM.mp4

29.4 MB

USENIX Security '17 - ORide A Privacy-Preserving yet Accountable Ride-Hailing Service.mp4

27.9 MB

USENIX Security '17 - OSS-Fuzz - Google's continuous fuzzing service for open source software.mp4

81.6 MB

USENIX Security '17 - On the effectiveness of mitigations against floating-point timing channels.mp4

36.3 MB

USENIX Security '17 - Opening Remarks and Awards.mp4

30.4 MB

USENIX Security '17 - Oscar A Practical Page-Permissions-Based Scheme....mp4

31.9 MB

USENIX Security '17 - PDF Mirage Content Masking Attack Against Information-Based Online Services.mp4

62.1 MB

USENIX Security '17 - Phoenix Rebirth of a Cryptographic Password-Hardening Service.mp4

38.4 MB

USENIX Security '17 - Picking Up My Tab....mp4

48.1 MB

USENIX Security '17 - PlatPal Detecting Malicious Documents with Platform Diversity.mp4

33.9 MB

USENIX Security '17 - Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts.mp4

36.8 MB

USENIX Security '17 - Predicting the Resilience of Obfuscated Code....mp4

32.5 MB

USENIX Security '17 - Prime+Abort A Timer-Free High-Precision L3 Cache Attack using Intel TSX.mp4

40.2 MB

USENIX Security '17 - Qapla Policy compliance for database-backed systems.mp4

35.5 MB

USENIX Security '17 - REM Resource-Efficient Mining for Blockchains.mp4

84.4 MB

USENIX Security '17 - ROTE Rollback Protection for Trusted Execution.mp4

61.0 MB

USENIX Security '17 - Reverse Engineering x86 Processor Microcode.mp4

31.6 MB

USENIX Security '17 - SLEUTH Real-time Attack Scenario Reconstruction from COTS Audit Data.mp4

35.3 MB

USENIX Security '17 - Same-Origin Policy Evaluation in Modern Browsers.mp4

53.4 MB

USENIX Security '17 - See No Evil, Hear No Evil, Feel No Evil.mp4

45.5 MB

USENIX Security '17 - Seeing Through The Same Lens....mp4

39.9 MB

USENIX Security '17 - SmartAuth User-Centered Authorization for the Internet of Things.mp4

45.0 MB

USENIX Security '17 - SmartPool Practical Decentralized Pooled Mining.mp4

45.6 MB

USENIX Security '17 - Speeding up detection of SHA-1 collision attacks....mp4

39.6 MB

USENIX Security '17 - Strong and Efficient Cache Side-Channel Protection....mp4

38.0 MB

USENIX Security '17 - Syntia Synthesizing the Semantics of Obfuscated Code.mp4

36.9 MB

USENIX Security '17 - Telling Your Secrets without Page Faults....mp4

32.6 MB

USENIX Security '17 - The Loopix Anonymity System.mp4

42.3 MB

USENIX Security '17 - Towards Efficient Heap Overflow Discovery.mp4

31.4 MB

USENIX Security '17 - Towards Practical Tools for Side Channel Aware Software Engineering....mp4

31.3 MB

USENIX Security '17 - Transcend Detecting Concept Drift in Malware Classification Models.mp4

43.1 MB

USENIX Security '17 - TrustBase An Architecture to Repair and Strengthen....mp4

39.7 MB

USENIX Security '17 - USB Snooping Made Easy Crosstalk Leakage Attacks on USB Hubs.mp4

39.1 MB

USENIX Security '17 - Vale Verifying High-Performance Cryptographic Assembly Code.mp4

35.2 MB

USENIX Security '17 - Venerable Variadic Vulnerabilities Vanquished.mp4

37.0 MB

USENIX Security '17 - Walkie-Talkie....mp4

44.7 MB

USENIX Security '17 - When Your Threat Model Is Everything Defensive Security in Modern Newsrooms.mp4

126.7 MB

USENIX Security '17 - When the Weakest Link is Strong....mp4

38.0 MB

USENIX Security '17 - kAFL Hardware-Assisted Feedback Fuzzing for OS Kernels.mp4

40.2 MB

USENIX Security '17 - vTZ Virtualizing ARM TrustZone.mp4

34.3 MB

USENIX Security ’17 - Understanding the Mirai Botnet.mp4

44.6 MB

USENIX Security 2018/

A Bad Dream Subverting Trusted Platform Module While You Are Sleeping.en.transcribed.srt

54.3 KB

A Bad Dream Subverting Trusted Platform Module While You Are Sleeping.mp4

25.0 MB

A Sense of Time for JavaScript and Node.js.en.transcribed.srt

61.6 KB

A Sense of Time for JavaScript and Node.js.mp4

17.7 MB

A4NT Author Attribute Anonymity by Adversarial Training of Neural Machine Translation.en.transcribed.srt

70.5 KB

A4NT Author Attribute Anonymity by Adversarial Training of Neural Machine Translation.mp4

23.3 MB

ACES Automatic Compartments for Embedded Systems.en.transcribed.srt

53.6 KB

ACES Automatic Compartments for Embedded Systems.mp4

14.1 MB

ATtention Spanned Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem.en.transcribed.srt

55.5 KB

ATtention Spanned Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem.mp4

18.8 MB

Acquisitional Rule-based Engine for Discovering Internet-of-Things Devices.en.transcribed.srt

37.5 KB

Acquisitional Rule-based Engine for Discovering Internet-of-Things Devices.mp4

20.1 MB

All Your GPS Are Belong To Us Towards Stealthy Manipulation of Road Navigation Systems.en.transcribed.srt

55.3 KB

All Your GPS Are Belong To Us Towards Stealthy Manipulation of Road Navigation Systems.mp4

20.7 MB

An Empirical Analysis of Anonymity in Zcash.en.transcribed.srt

60.1 KB

An Empirical Analysis of Anonymity in Zcash.mp4

17.1 MB

An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications.en.transcribed.srt

45.9 KB

An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications.mp4

18.0 MB

Analogy Cyber Security-From 0101 to Mixed Signals.en.transcribed.srt

105.1 KB

Analogy Cyber Security-From 0101 to Mixed Signals.mp4

47.3 MB

Analysis of Privacy Protections in Fitness Tracking Social Networks -or- You can run.en.transcribed.srt

54.1 KB

Analysis of Privacy Protections in Fitness Tracking Social Networks -or- You can run.mp4

23.6 MB

Arbitrum Scalable, private smart contracts.en.transcribed.srt

58.8 KB

Arbitrum Scalable, private smart contracts.mp4

18.5 MB

AttriGuard A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning.mp4

18.0 MB

Automatic Heap Layout Manipulation for Exploitation.en.transcribed.srt

68.7 KB

Automatic Heap Layout Manipulation for Exploitation.mp4

18.8 MB

Bamboozling Certificate Authorities with BGP.en.transcribed.srt

65.6 KB

Bamboozling Certificate Authorities with BGP.mp4

23.7 MB

Better managed than memorized Studying the Impact of Managers on Password Strength and Reuse.en.transcribed.srt

76.8 KB

Better managed than memorized Studying the Impact of Managers on Password Strength and Reuse.mp4

26.3 MB

BlackIoT IoT Botnet of High Wattage Devices Can Disrupt the Power Grid.en.transcribed.srt

65.1 KB

BlackIoT IoT Botnet of High Wattage Devices Can Disrupt the Power Grid.mp4

28.6 MB

BurnBox Self-Revocable Encryption in a World Of Compelled Access.en.transcribed.srt

62.0 KB

BurnBox Self-Revocable Encryption in a World Of Compelled Access.mp4

19.2 MB

Charm Facilitating Dynamic Analysis of Device Drivers of Mobile Systems.en.transcribed.srt

50.2 KB

Charm Facilitating Dynamic Analysis of Device Drivers of Mobile Systems.mp4

21.7 MB

Chipmunk or Pepe Using Acoustical Analysis to Detect Voice-Channel Fraud at Scale.en.transcribed.srt

142.2 KB

Chipmunk or Pepe Using Acoustical Analysis to Detect Voice-Channel Fraud at Scale.mp4

44.0 MB

CommanderSong A Systematic Approach for Practical Adversarial Voice Recognition.en.transcribed.srt

53.0 KB

CommanderSong A Systematic Approach for Practical Adversarial Voice Recognition.mp4

19.5 MB

DATA - Differential Address Trace Analysis Finding Address-based Side-Channels in Binaries.en.transcribed.srt

58.5 KB

DATA - Differential Address Trace Analysis Finding Address-based Side-Channels in Binaries.mp4

18.0 MB

DIZK A Distributed Zero Knowledge Proof System.en.transcribed.srt

51.6 KB

DIZK A Distributed Zero Knowledge Proof System.mp4

15.1 MB

Debloating Software through Piece-Wise Compilation and Loading.en.transcribed.srt

57.8 KB

Debloating Software through Piece-Wise Compilation and Loading.mp4

19.0 MB

DelegaTEE Brokered Delegation Using Trusted Execution Environments.en.transcribed.srt

76.3 KB

DelegaTEE Brokered Delegation Using Trusted Execution Environments.mp4

23.0 MB

Dependence-Preserving Data Compaction for Scalable Forensic Analysis.en.transcribed.srt

58.4 KB

Dependence-Preserving Data Compaction for Scalable Forensic Analysis.mp4

21.4 MB

Discovering Flaws in Security-Focused Static Analysis Tools for Android using Systematic Mutation.en.transcribed.srt

50.0 KB

Discovering Flaws in Security-Focused Static Analysis Tools for Android using Systematic Mutation.mp4

20.2 MB

Efail Breaking S MIME and OpenPGP Email Encryption using Exfiltration Channels.mp4

17.1 MB

Effective Detection of Multimedia Protocol Tunneling using Machine Learning.en.transcribed.srt

63.7 KB

Effective Detection of Multimedia Protocol Tunneling using Machine Learning.mp4

17.4 MB

Enabling Refinable Cross-Host Attack Investigation with Efficient Data Flow Tagging and Tracking.en.transcribed.srt

42.3 KB

Enabling Refinable Cross-Host Attack Investigation with Efficient Data Flow Tagging and Tracking.mp4

19.0 MB

End-Users Get Maneuvered Empirical Analysis of Redirection Hijacking in Content Delivery Networks.en.transcribed.srt

40.6 KB

End-Users Get Maneuvered Empirical Analysis of Redirection Hijacking in Content Delivery Networks.mp4

16.5 MB

End-to-End Measurements of Email Spoofing Attacks.en.transcribed.srt

56.4 KB

End-to-End Measurements of Email Spoofing Attacks.mp4

23.0 MB

Enter the Hydra Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts.en.transcribed.srt

85.1 KB

Enter the Hydra Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts.mp4

33.8 MB

Erays Reverse Engineering Ethereum's Opaque Smart Contracts.en.transcribed.srt

55.2 KB

Erays Reverse Engineering Ethereum's Opaque Smart Contracts.mp4

18.8 MB

FANCI Feature-based Automated NXDomain Classification and Intelligence.en.transcribed.srt

43.7 KB

FANCI Feature-based Automated NXDomain Classification and Intelligence.mp4

14.8 MB

FUZE Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities.mp4

18.8 MB

Fast and Service-preserving Recovery from Malware Infections Using CRIU.en.transcribed.srt

74.7 KB

Fast and Service-preserving Recovery from Malware Infections Using CRIU.mp4

18.8 MB

Fear the Reaper Characterization and Fast Detection of Card Skimmers.en.transcribed.srt

54.9 KB

Fear the Reaper Characterization and Fast Detection of Card Skimmers.mp4

18.3 MB

FlowCog Context-aware Semantics Extraction and Analysis of Information Flow Leaks in Android Apps.en.transcribed.srt

49.5 KB

FlowCog Context-aware Semantics Extraction and Analysis of Information Flow Leaks in Android Apps.mp4

19.9 MB

Foreshadow Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution.mp4

24.4 MB

Forgetting of Passwords Ecological Theory and Data.en.transcribed.srt

38.7 KB

Forgetting of Passwords Ecological Theory and Data.mp4

17.8 MB

Formal Security Analysis of Neural Networks using Symbolic Intervals.en.transcribed.srt

53.2 KB

Formal Security Analysis of Neural Networks using Symbolic Intervals.mp4

19.8 MB

Fp-Scanner The Privacy Implications of Browser Fingerprint Inconsistencies.en.transcribed.srt

56.8 KB

Fp-Scanner The Privacy Implications of Browser Fingerprint Inconsistencies.mp4

21.2 MB

Freezing the Web A Study of ReDoS Vulnerabilities in JavaScript-based Web Servers.en.transcribed.srt

52.3 KB

Freezing the Web A Study of ReDoS Vulnerabilities in JavaScript-based Web Servers.mp4

17.3 MB

From Patching Delays to Infection Symptoms....en.transcribed.srt

54.3 KB

From Patching Delays to Infection Symptoms....mp4

19.1 MB

GAZELLE A Low Latency Framework for Secure Neural Network Inference.mp4

22.6 MB

Guarder A Tunable Secure Allocator.en.transcribed.srt

61.0 KB

Guarder A Tunable Secure Allocator.mp4

16.5 MB

HeapHopper Bringing Bounded Model Checking to Heap Implementation Security.en.transcribed.srt

59.0 KB

HeapHopper Bringing Bounded Model Checking to Heap Implementation Security.mp4

14.2 MB

How Do Tor Users Interact With Onion Services.en.transcribed.srt

55.0 KB

How Do Tor Users Interact With Onion Services.mp4

18.4 MB

IMIX In-Process Memory Isolation EXtension.en.transcribed.srt

46.8 KB

IMIX In-Process Memory Isolation EXtension.mp4

15.0 MB

Inception System-Wide Security Testing of Real-World Embedded Systems Software.en.transcribed.srt

49.6 KB

Inception System-Wide Security Testing of Real-World Embedded Systems Software.mp4

17.9 MB

Injected and Delivered Fabricating Implicit Control over Actuation Systems by Spoofing.en.transcribed.srt

38.1 KB

Injected and Delivered Fabricating Implicit Control over Actuation Systems by Spoofing.mp4

19.3 MB

Malicious Management Unit Why Stopping Cache Attacks in Software is Harder Than You Think.en.transcribed.srt

63.0 KB

Malicious Management Unit Why Stopping Cache Attacks in Software is Harder Than You Think.mp4

18.5 MB

Man-in-the-Machine Exploiting Ill-Secured Communication Inside the Computer.en.transcribed.srt

47.8 KB

Man-in-the-Machine Exploiting Ill-Secured Communication Inside the Computer.mp4

18.5 MB

Medical Device Cybersecurity through the FDA Lens.en.transcribed.srt

107.5 KB

Medical Device Cybersecurity through the FDA Lens.mp4

44.5 MB

Meltdown Reading Kernel Memory from User Space.en.transcribed.srt

57.5 KB

Meltdown Reading Kernel Memory from User Space.mp4

20.7 MB

Modelling and Analysis of a Hierarchy of Distance Bounding Attacks.en.transcribed.srt

59.4 KB

Modelling and Analysis of a Hierarchy of Distance Bounding Attacks.mp4

25.7 MB

MoonShine Optimizing OS Fuzzer Seed Selection with Trace Distillation.en.transcribed.srt

66.6 KB

MoonShine Optimizing OS Fuzzer Seed Selection with Trace Distillation.mp4

19.5 MB

NAVEX Precise and Scalable Exploit Generation for Dynamic Web Applications.en.transcribed.srt

49.9 KB

NAVEX Precise and Scalable Exploit Generation for Dynamic Web Applications.mp4

21.9 MB

NetHide Secure and Practical Network Topology Obfuscation.en.transcribed.srt

63.0 KB

NetHide Secure and Practical Network Topology Obfuscation.mp4

24.4 MB

O Single Sign-Off, Where Art Thou An Empirical Analysis of Single Sign-On.en.transcribed.srt

52.7 KB

O Single Sign-Off, Where Art Thou An Empirical Analysis of Single Sign-On.mp4

17.8 MB

Off-Path TCP Exploit How Wireless Routers Can Jeopardize Your Secrets.en.transcribed.srt

49.8 KB

Off-Path TCP Exploit How Wireless Routers Can Jeopardize Your Secrets.mp4

18.3 MB

One&Done A Single-Decryption EM-Based Attack on OpenSSL's Constant-Time Blinded RSA.mp4

22.3 MB

Plug and Prey Measuring the Commoditization of Cybercrime via Online Anonymous Markets.en.transcribed.srt

65.0 KB

Plug and Prey Measuring the Commoditization of Cybercrime via Online Anonymous Markets.mp4

19.7 MB

Polisis Automated Analysis and Presentation of Privacy Policies Using Deep Learning.en.transcribed.srt

60.6 KB

Polisis Automated Analysis and Presentation of Privacy Policies Using Deep Learning.mp4

21.0 MB

Practical Accountability of Secret Processes.en.transcribed.srt

89.1 KB

Practical Accountability of Secret Processes.mp4

18.3 MB

Precise and Accurate Patch Presence Test for Binaries.en.transcribed.srt

59.4 KB

Precise and Accurate Patch Presence Test for Binaries.mp4

19.0 MB

Privacy for Tigers.en.transcribed.srt

126.3 KB

Privacy for Tigers.mp4

39.2 MB

Q Why Do Keynote Speakers Keep Suggesting That Improving Security Is Possible.en.transcribed.srt

155.9 KB

Q Why Do Keynote Speakers Keep Suggesting That Improving Security Is Possible.mp4

58.0 MB

QSYM A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing.en.transcribed.srt

51.5 KB

QSYM A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing.mp4

20.1 MB

Quack Scalable Remote Measurement of Application-Layer Censorship.en.transcribed.srt

73.0 KB

Quack Scalable Remote Measurement of Application-Layer Censorship.mp4

22.3 MB

Rampart Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks.mp4

19.8 MB

Reading Thieves' Cant Automatically Identifying and Understanding Dark Jargons from Cybercrime.en.transcribed.srt

49.6 KB

Reading Thieves' Cant Automatically Identifying and Understanding Dark Jargons from Cybercrime.mp4

19.1 MB

Rethinking Access Control and Authentication for the Home Internet of Things (IoT).en.transcribed.srt

63.6 KB

Rethinking Access Control and Authentication for the Home Internet of Things (IoT).mp4

20.7 MB

Return Of Bleichenbacher's Oracle Threat (ROBOT).en.transcribed.srt

61.2 KB

Return Of Bleichenbacher's Oracle Threat (ROBOT).mp4

17.7 MB

SAD THUG Structural Anomaly Detection for Transmissions of High-value Information Using Graphics.en.transcribed.srt

55.9 KB

SAD THUG Structural Anomaly Detection for Transmissions of High-value Information Using Graphics.mp4

16.6 MB

SAQL A Stream-based Query System for Real-Time Abnormal System Behavior Detection.en.transcribed.srt

63.3 KB

SAQL A Stream-based Query System for Real-Time Abnormal System Behavior Detection.mp4

24.3 MB

Schrödinger's RAT Profiling the Stakeholders in the Remote Access Trojan Ecosystem.en.transcribed.srt

39.3 KB

Schrödinger's RAT Profiling the Stakeholders in the Remote Access Trojan Ecosystem.mp4

13.4 MB

Security Namespace Making Linux Security Frameworks Available to Containers.en.transcribed.srt

87.0 KB

Security Namespace Making Linux Security Frameworks Available to Containers.mp4

24.6 MB

Sensitive Information Tracking in Commodity IoT.en.transcribed.srt

39.3 KB

Sensitive Information Tracking in Commodity IoT.mp4

17.8 MB

Shielding Software From Privileged Side-Channel Attacks.en.transcribed.srt

53.0 KB

Shielding Software From Privileged Side-Channel Attacks.mp4

19.5 MB

Simple Password-Hardened Encryption Services.en.transcribed.srt

32.3 KB

Simple Password-Hardened Encryption Services.mp4

11.4 MB

Skill Squatting Attacks on Amazon Alexa.en.transcribed.srt

83.0 KB

Skill Squatting Attacks on Amazon Alexa.mp4

23.4 MB

Solving the Next Billion-People Privacy Problem.en.transcribed.srt

133.4 KB

Solving the Next Billion-People Privacy Problem.mp4

45.8 MB

Tackling runtime-based obfuscation in Android with TIRO.en.transcribed.srt

62.0 KB

Tackling runtime-based obfuscation in Android with TIRO.mp4

16.4 MB

The Battle for New York A Case Study of Applied Digital Threat Modeling at the Enterprise Level.en.transcribed.srt

57.1 KB

The Battle for New York A Case Study of Applied Digital Threat Modeling at the Enterprise Level.mp4

21.7 MB

The Broken Shield Measuring Revocation Effectiveness in the Windows Code-Signing PKI.en.transcribed.srt

56.9 KB

The Broken Shield Measuring Revocation Effectiveness in the Windows Code-Signing PKI.mp4

18.7 MB

The Dangers of Key Reuse Practical Attacks on IPsec IKE.en.transcribed.srt

64.4 KB

The Dangers of Key Reuse Practical Attacks on IPsec IKE.mp4

21.0 MB

The Guard's Dilemma Efficient Code-Reuse Attacks Against Intel SGX.en.transcribed.srt

63.3 KB

The Guard's Dilemma Efficient Code-Reuse Attacks Against Intel SGX.mp4

23.1 MB

The Law and Economics of Bug Bounties.en.transcribed.srt

133.0 KB

The Law and Economics of Bug Bounties.mp4

46.3 MB

The Rewards and Costs of Stronger Passwords in a University Linking Password Lifetime to Strength.en.transcribed.srt

65.9 KB

The Rewards and Costs of Stronger Passwords in a University Linking Password Lifetime to Strength.mp4

21.7 MB

The Second Crypto War-What's Different Now.en.transcribed.srt

131.8 KB

The Second Crypto War-What's Different Now.mp4

40.1 MB

The Secure Socket API TLS as an Operating System Service.en.transcribed.srt

82.4 KB

The Secure Socket API TLS as an Operating System Service.mp4

19.2 MB

The aftermath of a crypto-ransomware attack at a large academic institution.en.transcribed.srt

51.6 KB

The aftermath of a crypto-ransomware attack at a large academic institution.mp4

14.1 MB

Towards Predicting Efficient and Anonymous Tor Circuits.en.transcribed.srt

63.1 KB

Towards Predicting Efficient and Anonymous Tor Circuits.mp4

17.9 MB

Towards a Secure Zero-rating Framework with Three Parties.en.transcribed.srt

51.4 KB

Towards a Secure Zero-rating Framework with Three Parties.mp4

17.1 MB

Translation Leak-aside Buffer Defeating Cache Side-channel Protections with TLB Attacks.en.transcribed.srt

75.1 KB

Translation Leak-aside Buffer Defeating Cache Side-channel Protections with TLB Attacks.mp4

29.2 MB

Turning Your Weakness Into a Strength Watermarking Deep Neural Networks by Backdooring.en.transcribed.srt

71.5 KB

Turning Your Weakness Into a Strength Watermarking Deep Neural Networks by Backdooring.mp4

23.1 MB

Understanding the Reproducibility of Crowd-reported Security Vulnerabilities.en.transcribed.srt

53.2 KB

Understanding the Reproducibility of Crowd-reported Security Vulnerabilities.mp4

31.0 MB

Unveiling and Quantifying Facebook Exploitation of Sensitive Personal Data for Advertising Purposes.en.transcribed.srt

56.8 KB

Unveiling and Quantifying Facebook Exploitation of Sensitive Personal Data for Advertising Purposes.mp4

22.3 MB

Vetting Single Sign-On SDK Implementations via Symbolic Reasoning.en.transcribed.srt

35.7 KB

Vetting Single Sign-On SDK Implementations via Symbolic Reasoning.mp4

17.8 MB

WPSE Fortifying Web Protocols via Browser-Side Security Monitoring.en.transcribed.srt

47.5 KB

WPSE Fortifying Web Protocols via Browser-Side Security Monitoring.mp4

13.1 MB

We Still Don't Have Secure Cross-Domain Requests an Empirical Study of CORS.en.transcribed.srt

50.7 KB

We Still Don't Have Secure Cross-Domain Requests an Empirical Study of CORS.mp4

21.5 MB

When Does Machine Learning FAIL Generalized Transferability for Evasion and Poisoning Attacks.en.transcribed.srt

69.4 KB

When Does Machine Learning FAIL Generalized Transferability for Evasion and Poisoning Attacks.mp4

37.5 MB

Who Is Answering My Queries Understanding and Characterizing Interception....en.transcribed.srt

48.5 KB

Who Is Answering My Queries Understanding and Characterizing Interception....mp4

19.0 MB

Who Left Open the Cookie Jar A Comprehensive Evaluation of Third-Party Cookie Policies.en.transcribed.srt

53.5 KB

Who Left Open the Cookie Jar A Comprehensive Evaluation of Third-Party Cookie Policies.mp4

17.3 MB

With Great Training Comes Great Vulnerability Practical Attacks against Transfer Learning.en.transcribed.srt

58.4 KB

With Great Training Comes Great Vulnerability Practical Attacks against Transfer Learning.mp4

26.2 MB

teEther Gnawing at Ethereum to Automatically Exploit Smart Contracts.mp4

24.2 MB

USENIX Security thank you.txt

0.8 KB

USENIX logo.jpg

4.4 KB

 

Total files 369


Copyright © 2026 FileMood.com