/
|
HEADER.md
|
0.5 KB
|
USENIX logo.jpg
|
4.4 KB
|
USENIX Security thank you.txt
|
1.3 KB
|
/CSET 2020/
|
APTGen An Approach towards Generating Practical Dataset Labelled with Targeted.mp4
|
12.7 MB
|
Bridging Missing Gaps in Evaluating DDoS Research.mp4
|
9.7 MB
|
Expansion of ICS Testbed for Security Validation based on MITRE ATT&CK Techniques.mp4
|
15.5 MB
|
HAI 1.0 HIL-based Augmented ICS Security Dataset.mp4
|
11.3 MB
|
Historical Analysis of Exploit Availability Timelines.mp4
|
13.1 MB
|
ICS Testbed Tetris Practical Building Blocks Towards a Cyber Security Resource.mp4
|
9.9 MB
|
On Design and Enhancement of Smart Grid Honeypot System for Practical Collection.mp4
|
15.1 MB
|
Representativeness in the Benchmark for Vulnerability Analysis Tools (B-VAT).mp4
|
11.8 MB
|
Toward Orchestration of Complex Networking Experiments.mp4
|
13.9 MB
|
Towards Adversarial Phishing Detection.mp4
|
15.2 MB
|
UBCIS Ultimate Benchmark for Container Image Scanning.mp4
|
11.7 MB
|
/.../CSET 2020 captions/
|
APTGen An Approach towards Generating Practical Dataset Labelled with Targeted.eng.srt
|
14.0 KB
|
Bridging Missing Gaps in Evaluating DDoS Research.eng.srt
|
18.8 KB
|
Expansion of ICS Testbed for Security Validation based on MITRE ATT&CK Techniques.eng.srt
|
27.0 KB
|
HAI 1.0 HIL-based Augmented ICS Security Dataset.eng.srt
|
15.1 KB
|
Historical Analysis of Exploit Availability Timelines.eng.srt
|
28.3 KB
|
ICS Testbed Tetris Practical Building Blocks Towards a Cyber Security Resource.eng.srt
|
27.0 KB
|
On Design and Enhancement of Smart Grid Honeypot System for Practical Collection.eng.srt
|
24.0 KB
|
Representativeness in the Benchmark for Vulnerability Analysis Tools (B-VAT).eng.json
|
498.3 KB
|
Representativeness in the Benchmark for Vulnerability Analysis Tools (B-VAT).eng.lrc
|
13.2 KB
|
Representativeness in the Benchmark for Vulnerability Analysis Tools (B-VAT).eng.srt
|
14.2 KB
|
Representativeness in the Benchmark for Vulnerability Analysis Tools (B-VAT).eng.text
|
10.3 KB
|
Representativeness in the Benchmark for Vulnerability Analysis Tools (B-VAT).eng.tsv
|
11.8 KB
|
Representativeness in the Benchmark for Vulnerability Analysis Tools (B-VAT).eng.txt
|
13.3 KB
|
Representativeness in the Benchmark for Vulnerability Analysis Tools (B-VAT).eng.vtt
|
13.2 KB
|
Toward Orchestration of Complex Networking Experiments.eng.srt
|
28.0 KB
|
Towards Adversarial Phishing Detection.eng.json
|
672.7 KB
|
Towards Adversarial Phishing Detection.eng.lrc
|
19.8 KB
|
Towards Adversarial Phishing Detection.eng.srt
|
16.5 KB
|
Towards Adversarial Phishing Detection.eng.text
|
13.6 KB
|
Towards Adversarial Phishing Detection.eng.tsv
|
16.9 KB
|
Towards Adversarial Phishing Detection.eng.txt
|
20.0 KB
|
Towards Adversarial Phishing Detection.eng.vtt
|
15.7 KB
|
UBCIS Ultimate Benchmark for Container Image Scanning.eng.srt
|
25.6 KB
|
/FOCI 2014/
|
Catching Bandits and Only Bandits Privacy-Preserving Intersection Warrants for Lawful.mp4
|
10.3 MB
|
Security Audit of Safeplug - Tor in a Box.mp4
|
7.2 MB
|
TRIST Circumventing Censorship with Transcoding-Resistant Image Steganography.mp4
|
12.0 MB
|
/.../FOCI 2014 captions/
|
Catching Bandits and Only Bandits Privacy-Preserving Intersection Warrants for Lawful.eng.json
|
1.2 MB
|
Catching Bandits and Only Bandits Privacy-Preserving Intersection Warrants for Lawful.eng.lrc
|
30.3 KB
|
Catching Bandits and Only Bandits Privacy-Preserving Intersection Warrants for Lawful.eng.srt
|
32.9 KB
|
Catching Bandits and Only Bandits Privacy-Preserving Intersection Warrants for Lawful.eng.text
|
25.0 KB
|
Catching Bandits and Only Bandits Privacy-Preserving Intersection Warrants for Lawful.eng.tsv
|
28.0 KB
|
Catching Bandits and Only Bandits Privacy-Preserving Intersection Warrants for Lawful.eng.txt
|
30.5 KB
|
Catching Bandits and Only Bandits Privacy-Preserving Intersection Warrants for Lawful.eng.vtt
|
30.7 KB
|
Security Audit of Safeplug - Tor in a Box.eng.json
|
647.8 KB
|
Security Audit of Safeplug - Tor in a Box.eng.lrc
|
17.3 KB
|
Security Audit of Safeplug - Tor in a Box.eng.srt
|
19.3 KB
|
Security Audit of Safeplug - Tor in a Box.eng.text
|
12.4 KB
|
Security Audit of Safeplug - Tor in a Box.eng.tsv
|
15.1 KB
|
Security Audit of Safeplug - Tor in a Box.eng.txt
|
17.5 KB
|
Security Audit of Safeplug - Tor in a Box.eng.vtt
|
17.4 KB
|
TRIST Circumventing Censorship with Transcoding-Resistant Image Steganography.eng.json
|
1.1 MB
|
TRIST Circumventing Censorship with Transcoding-Resistant Image Steganography.eng.lrc
|
27.4 KB
|
TRIST Circumventing Censorship with Transcoding-Resistant Image Steganography.eng.srt
|
29.3 KB
|
TRIST Circumventing Censorship with Transcoding-Resistant Image Steganography.eng.text
|
20.1 KB
|
TRIST Circumventing Censorship with Transcoding-Resistant Image Steganography.eng.tsv
|
24.3 KB
|
TRIST Circumventing Censorship with Transcoding-Resistant Image Steganography.eng.txt
|
27.7 KB
|
TRIST Circumventing Censorship with Transcoding-Resistant Image Steganography.eng.vtt
|
26.7 KB
|
/FOCI 2020/
|
A Comprehensive Study of DNS-over-HTTPS Downgrade Attack.mp4
|
9.2 MB
|
Bystanders’ Privacy The Perspectives of Nannies on Smart Home Surveillance.mp4
|
8.9 MB
|
Detecting and Evading Censorship-in-Depth A Case Study of Iran’s Protocol Whitelister.mp4
|
9.0 MB
|
HTTPT A Probe-Resistant Proxy.mp4
|
5.7 MB
|
Identifying Disinformation Websites Using Infrastructure Features.mp4
|
7.1 MB
|
MIMIQ Masking IPs with Migration in QUIC.mp4
|
8.1 MB
|
Opening Digital Borders Cautiously yet Decisively Digital Filtering in Saudi Arabia.mp4
|
12.1 MB
|
Padding Ain't Enough Assessing the Privacy Guarantees of Encrypted DNS.mp4
|
10.2 MB
|
Slitheen Stealth TLS-based Decoy Routing.mp4
|
9.6 MB
|
Triplet Censors Demystifying Great Firewall’s DNS Censorship Behavior.mp4
|
9.4 MB
|
Turbo Tunnel, a good way to design censorship circumvention protocols.mp4
|
11.0 MB
|
/.../FOCI 2020 captions/
|
A Comprehensive Study of DNS-over-HTTPS Downgrade Attack.eng.json
|
385.1 KB
|
A Comprehensive Study of DNS-over-HTTPS Downgrade Attack.eng.lrc
|
10.3 KB
|
A Comprehensive Study of DNS-over-HTTPS Downgrade Attack.eng.srt
|
11.0 KB
|
A Comprehensive Study of DNS-over-HTTPS Downgrade Attack.eng.text
|
8.1 KB
|
A Comprehensive Study of DNS-over-HTTPS Downgrade Attack.eng.tsv
|
9.3 KB
|
A Comprehensive Study of DNS-over-HTTPS Downgrade Attack.eng.txt
|
10.4 KB
|
A Comprehensive Study of DNS-over-HTTPS Downgrade Attack.eng.vtt
|
10.2 KB
|
Bystanders’ Privacy The Perspectives of Nannies on Smart Home Surveillance.eng.srt
|
27.2 KB
|
Detecting and Evading Censorship-in-Depth A Case Study of Iran’s Protocol Whitelister.eng.srt
|
24.4 KB
|
HTTPT A Probe-Resistant Proxy.eng.srt
|
15.0 KB
|
Identifying Disinformation Websites Using Infrastructure Features.eng.srt
|
22.8 KB
|
MIMIQ Masking IPs with Migration in QUIC.eng.srt
|
22.1 KB
|
Opening Digital Borders Cautiously yet Decisively Digital Filtering in Saudi Arabia.eng.srt
|
23.5 KB
|
Padding Ain't Enough Assessing the Privacy Guarantees of Encrypted DNS.eng.srt
|
16.1 KB
|
Slitheen Stealth TLS-based Decoy Routing.eng.srt
|
20.0 KB
|
Triplet Censors Demystifying Great Firewall’s DNS Censorship Behavior.eng.srt
|
23.4 KB
|
Turbo Tunnel, a good way to design censorship circumvention protocols.eng.srt
|
22.0 KB
|
/FOCI 2023/
|
A Worldwide View of Nation state Internet Censorship.mp4
|
20.6 MB
|
Crowdsourcing the Discovery of Server-side Censorship Evasion Strategies.mp4
|
15.3 MB
|
Detecting Network Interference Without Endpoint Participation.mp4
|
11.8 MB
|
FOCI 2023 Awards and Closing.mp4
|
6.7 MB
|
Rethinking Realistic Adversaries for Anonymous Communication Systems.mp4
|
17.9 MB
|
Running a high-performance pluggable transports Tor bridge.mp4
|
22.1 MB
|
Towards a Comprehensive Understanding of Russian Transit Censorship.mp4
|
12.3 MB
|
/.../FOCI 2023 captions/
|
A Worldwide View of Nation state Internet Censorship.eng.srt
|
53.1 KB
|
Crowdsourcing the Discovery of Server-side Censorship Evasion Strategies.eng.srt
|
47.7 KB
|
Detecting Network Interference Without Endpoint Participation.eng.srt
|
38.6 KB
|
FOCI 2023 Awards and Closing.eng.srt
|
9.7 KB
|
Rethinking Realistic Adversaries for Anonymous Communication Systems.eng.srt
|
44.8 KB
|
Running a high-performance pluggable transports Tor bridge.eng.srt
|
47.6 KB
|
Towards a Comprehensive Understanding of Russian Transit Censorship.eng.srt
|
36.2 KB
|
/ScAINet 2020/
|
Combating Social Media Information Operations with Neural Language Models.mp4
|
13.3 MB
|
Getting Passive Aggressive about False Positives.mp4
|
12.1 MB
|
On Adaptive Attacks to Adversarial Example Defenses.mp4
|
13.5 MB
|
Optimization for Attack Surface Exploration The Case of TLS.mp4
|
10.4 MB
|
/.../ScAINet 2020 captions/
|
Combating Social Media Information Operations with Neural Language Models.eng.srt
|
36.8 KB
|
Getting Passive Aggressive about False Positives.eng.srt
|
34.0 KB
|
On Adaptive Attacks to Adversarial Example Defenses.eng.srt
|
41.7 KB
|
Optimization for Attack Surface Exploration The Case of TLS.eng.srt
|
32.5 KB
|
/USENIX Security 2007/
|
16th USENIX Security Symposium (Security 2007).htm
|
23.6 KB
|
/.../16th USENIX Security Symposium (Security 2007)_files/
|
AW_PH_stacked.jpg
|
4.0 KB
|
back_border.gif
|
0.1 KB
|
bae_systems.gif
|
2.2 KB
|
dot_clear.gif
|
0.0 KB
|
dot_clear_002.gif
|
0.0 KB
|
dr_dobbs.gif
|
2.9 KB
|
evt-deter_button.jpg
|
13.6 KB
|
footer.gif
|
0.3 KB
|
fsm.jpg
|
6.6 KB
|
google.jpg
|
6.0 KB
|
grid_today.gif
|
1.9 KB
|
hpc.gif
|
2.6 KB
|
ieee_security.gif
|
2.2 KB
|
ittoolbox.gif
|
3.3 KB
|
left_bar.gif
|
0.1 KB
|
left_bottom.gif
|
0.7 KB
|
linux_journal.gif
|
1.6 KB
|
linuxProMagazine_webLogo.jpg
|
13.3 KB
|
long_bar.gif
|
0.1 KB
|
microsoft.gif
|
2.3 KB
|
new_usenix.jpg
|
20.6 KB
|
nostarch.gif
|
1.6 KB
|
questmark.gif
|
0.1 KB
|
queue.gif
|
1.5 KB
|
sec07.css
|
4.8 KB
|
security07_banner.jpg
|
71.7 KB
|
snia_logo.gif
|
1.3 KB
|
storagenetworking.gif
|
1.9 KB
|
symantec.jpg
|
4.8 KB
|
techxworld_logo.jpg
|
4.7 KB
|
userfriendly.gif
|
2.6 KB
|
/Presentations/
|
Active Hardware Metering for Intellectual Property Protection and Security - Yousra M. Alkabani, Farinaz Koushanfar.pdf
|
571.7 KB
|
Binary Obfuscation Using Signals - Igor V. Popov, Saumya K. Debray, Gregory R. Andrews.pdf
|
307.3 KB
|
BotHunter Detecting Malware Infection Through IDS-Driven Dialog Correlation - Guofei Gu, Phillip Porras, Vinod Yegneswaran, Martin Fong, Wenke Lee.pdf
|
339.4 KB
|
Combating Click Fraud via Premium Clicks - Ari Juels, Sid Stamm, Markus Jakobsson.pdf
|
467.0 KB
|
Devices That Tell on You Privacy Trends in Consumer Ubiquitous Computing - T. Scott Saponas, Jonathan Lester, Carl Hartung, Sameer Agarwal, Tadayoshi Kohno.pdf
|
1.1 MB
|
Discoverer Automatic Protocol Reverse Engineering from Network Traces - Weidong Cui, Jayanthkumar Kannan, Helen J. Wang.pdf
|
350.0 KB
|
Exploiting Concurrency Vulnerabilities in System Call Wrappers - watson.pdf
|
185.7 KB
|
Exploiting Network Structure for Proactive Spam Mitigation - Shobha Venkataraman, Subhabrata Sen, Oliver Spatscheck, Patrick Haffner, Dawn Song.pdf
|
371.8 KB
|
Flayer Exposing Application Internals - Will Drewry, Tavis Ormandy .pdf
|
82.9 KB
|
Halting Password Puzzles Hard-to-break Encryption from Human-memorable Keys - Xavier Boyen.pdf
|
633.0 KB
|
How To Obtain and Assert Composable Security - Ran Canetti.pdf
|
1.9 MB
|
Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords - Julie Thorpe, P.C. van Oorschot.pdf
|
914.0 KB
|
Integrity Checking in Cryptographic File Systems with Constant Trusted Storage - Alina Oprea, Michael K. Reiter.pdf
|
570.4 KB
|
Keep Your Enemies Close Distance Bounding Against Smartcard Relay Attacks - Saar Drimer, Steven J. Murdoch.pdf
|
740.2 KB
|
Language Identification of Encrypted VoIP Traffic Alejandra y Roberto or Alice and Bob - Charles V. Wright, Lucas Ballard, Fabian Monrose, Gerald M. Masson.pdf
|
356.0 KB
|
Memory Performance Attacks Denial of Memory Service in Multi-Core Systems - Thomas Moscibroda, Onur Mutlu.pdf
|
369.4 KB
|
Mobile Malware - Mikko Hypponen.pdf
|
1.2 MB
|
On Attack Causality in Internet-Connected Cellular Networks - Patrick Traynor, Patrick McDaniel, Thomas La Porta.pdf
|
1.2 MB
|
On Web Browsing Privacy in Anonymized NetFlows - S.E. Coull, M.P. Collins, C.V. Wright, F. Monrose, M.K. Reiter.pdf
|
419.3 KB
|
OSLO Improving the Security of Trusted Computing - Bernhard Kauer.pdf
|
247.1 KB
|
OSLO Improving the Security of Trusted Computing Paper - Bernhard Kauer.pdf
|
247.1 KB
|
Proximity Breeds Danger Emerging Threats in Metro-area Wireless Networks - P. Akritidis, W.Y. Chin, V.T. Lam, S. Sidiroglou, K.G. Anagnostakis.pdf
|
337.2 KB
|
Report of the California Voting Systems Review - David Wagner,.pdf
|
742.5 KB
|
Secretly Monopolizing the CPU Without Superuser Privileges - Dan Tsafrir, Yoav Etsion, Dror G. Feitelson.pdf
|
517.9 KB
|
Security 2007 Poster Session.htm
|
10.9 KB
|
SIF Enforcing Confidentiality and Integrity in Web Applications - Stephen Chong, K. Vikram, Andrew C. Myers.pdf
|
484.2 KB
|
Spamscatter Characterizing Internet Scam Hosting Infrastructure - David S. Anderson, Chris Fleizach, Stefan Savage, Geoffrey M. Voelker.pdf
|
383.2 KB
|
SpyProxy Execution-based Detection of Malicious Web Content - Alexander Moshchuk, Tanya Bragin, Damien Deville, Steven D. Gribble, Henry M. Levy.pdf
|
889.7 KB
|
The Human Factor in Online Fraud - Markus Jakobsson.pdf
|
36.9 MB
|
Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation - David Brumley, Juan Caballero, Zhenkai Liang.pdf
|
393.7 KB
|
Web-Based Inference Detection - Jessica Staddon, Philippe Golle, Bryce Zimny.pdf
|
377.2 KB
|
/.../Security 2007 Poster Session_files/
|
back_border.gif
|
0.1 KB
|
dot_clear.gif
|
0.0 KB
|
footer.gif
|
0.3 KB
|
left_bar.gif
|
0.1 KB
|
left_bottom.gif
|
0.7 KB
|
long_bar.gif
|
0.1 KB
|
new_usenix.jpg
|
20.6 KB
|
questmark.gif
|
0.1 KB
|
sec07.css
|
4.8 KB
|
security07_banner.jpg
|
71.7 KB
|
/USENIX Security 2008/
|
17th USENIX Security Symposium (USENIX Security 2008).htm
|
27.3 KB
|
Dr. Strangevote or How I Learned to Stop Worrying and Love the Paper Ballot - Debra Bowen.mp4
|
143.8 MB
|
Lest We Remember Cold Boot Attacks on Encryption Keys - J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ariel J. Feldman.mp3
|
25.9 MB
|
USENIX Security 2008 Technical Sessions.htm
|
72.4 KB
|
USENIX Security 2008 WiPs.htm
|
14.9 KB
|
/.../17th USENIX Security Symposium (USENIX Security 2008)_files/
|
AW_PH_stacked.gif
|
1.2 KB
|
bae_systems.gif
|
2.2 KB
|
barracuda.gif
|
1.9 KB
|
betanews.gif
|
2.8 KB
|
ciscopress.gif
|
0.9 KB
|
DDJ.gif
|
1.6 KB
|
dot_clear.gif
|
0.0 KB
|
dot_clear_002.gif
|
0.0 KB
|
evt_cset_button.jpg
|
5.5 KB
|
footer.gif
|
0.3 KB
|
fsm.gif
|
1.5 KB
|
google.jpg
|
6.0 KB
|
hdj.gif
|
1.5 KB
|
ibm_research.gif
|
1.4 KB
|
ieee_security.gif
|
2.1 KB
|
infosecnews.gif
|
3.0 KB
|
ists_logo.gif
|
1.8 KB
|
ittoolbox.gif
|
1.3 KB
|
left_bar.gif
|
0.1 KB
|
left_bottom.gif
|
0.4 KB
|
linux.gif
|
0.6 KB
|
linux_gazette.gif
|
3.8 KB
|
linux_journal.gif
|
1.7 KB
|
linuxpro.gif
|
1.0 KB
|
longbar.gif
|
0.1 KB
|
lxer.gif
|
1.2 KB
|
microsoft_research.gif
|
2.3 KB
|
netwitness.gif
|
1.5 KB
|
new_usenix.jpg
|
20.6 KB
|
nostarch.gif
|
1.6 KB
|
questmark.gif
|
0.1 KB
|
queue.gif
|
1.5 KB
|
sec08_banner_750.jpg
|
102.2 KB
|
storage_networking.gif
|
2.8 KB
|
the_register.gif
|
1.8 KB
|
usenix_face.gif
|
0.4 KB
|
user_friendly.gif
|
2.6 KB
|
/.../USENIX Security 2008 captions/
|
Dr. Strangevote or How I Learned to Stop Worrying and Love the Paper Ballot - Debra Bowen.eng.json
|
3.7 MB
|
Dr. Strangevote or How I Learned to Stop Worrying and Love the Paper Ballot - Debra Bowen.eng.lrc
|
99.2 KB
|
Dr. Strangevote or How I Learned to Stop Worrying and Love the Paper Ballot - Debra Bowen.eng.srt
|
94.4 KB
|
Dr. Strangevote or How I Learned to Stop Worrying and Love the Paper Ballot - Debra Bowen.eng.text
|
71.4 KB
|
Dr. Strangevote or How I Learned to Stop Worrying and Love the Paper Ballot - Debra Bowen.eng.tsv
|
87.0 KB
|
Dr. Strangevote or How I Learned to Stop Worrying and Love the Paper Ballot - Debra Bowen.eng.txt
|
100.2 KB
|
Dr. Strangevote or How I Learned to Stop Worrying and Love the Paper Ballot - Debra Bowen.eng.vtt
|
88.9 KB
|
/.../USENIX Security 2008 Presentations/
|
A Couple Billion Lines of Code Later Static Checking in the Real World Slides - Dawson Engler, Ben Chelf, Andy Chou, Seth Hallem.pdf
|
933.7 KB
|
All Your iFRAMEs Point to Us - Niels Provos, Panayiotis Mavrommatis, Moheeb Abu Rajab, Fabian Monrose.pdf
|
474.1 KB
|
An Empirical Security Study of the Native Code in the JDK - Gang Tan, Jason Croft.pdf
|
210.3 KB
|
An Improved Clock-skew Measurement Technique for Revealing Hidden Services - Sebastian Zander, Steven J. Murdoch.pdf
|
685.0 KB
|
An Improved Clock-skew Measurement Technique for Revealing Hidden Services.htm
|
111.2 KB
|
AutoISES Automatically Inferring Security Specification and Detecting Violations - Lin Tan, Xiaolan Zhang, Xiao Ma, Weiwei Xiong, Yuanyuan Zhou.pdf
|
550.0 KB
|
Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking - Michael Martin, Monica S. Lam.pdf
|
252.9 KB
|
BotMiner Clustering Analysis of Network Traffic for Protocol and Structure-Independent Botnet Detection - Guofei Gu, Roberto Perdisci, Junjie Zhang, Wenke Lee.pdf
|
425.1 KB
|
CloudAV N-Version Antivirus in the Network Cloud - Jon Oberheide, Evan Cooke, Farnam Jahanian.pdf
|
885.7 KB
|
Enterprise Security in the Brave New (Virtual) World - Tal Garfinkel.pdf
|
2.0 MB
|
Hackernomics Slides - Hugh Thompson.pdf
|
417.2 KB
|
Helios Web-based Open-Audit Voting - Ben Adida.pdf
|
1.2 MB
|
Highly Predictive Blacklisting - Jian Zhang, Phillip Porras, Johannes Ullrich.pdf
|
431.3 KB
|
Hypervisor Support for Identifying Covertly Executing Binaries - Lionel Litty, H. Andrs Lagar-Cavilla, David Lie.pdf
|
616.9 KB
|
Lest We Remember - Cold Boot Attacks on Encryption Keys - J. Alex Haldermam, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ar.pdf
|
1.9 MB
|
Lest We Remember - Cold Boot Attacks on Encryption Keys.htm
|
122.7 KB
|
Measurement and Classification of Humans and Bots in Internet Chat - Steven Gianvecchio, Mengjun Xie, Zhengyu Wu, Haining Wang.pdf
|
421.6 KB
|
Multi-flow Attacks Against Network Flow Watermarking Schemes - Negar Kiyavash, Amir Houmansadr, Nikita Borisov.pdf
|
719.4 KB
|
NetAuth Supporting User-Based Network Services - Manigandan Radhakrishnan, Jon A. Solworth.pdf
|
228.0 KB
|
Panalyst Privacy-Aware Remote Error Analysis on Commodity Software - Rui Wang, XiaoFeng Wang, Zhuowei Li.pdf
|
1.1 MB
|
Political DDoS Estonia and Beyond Slides - Jose Nazario.pdf
|
5.1 MB
|
Practical Symmetric Key Cryptography on Modern Graphics Hardware - Owen Harrison, John Waldron.pdf
|
325.9 KB
|
Practical Symmetric Key Cryptography on Modern Graphics Hardware.htm
|
77.8 KB
|
Privacy-Preserving Location Tracking of Lost or Stolen Devices Cryptographic Techniques and Replacing Trusted Third Parties with DHTs - Thomas Ristenpart, Gabriel Ma.pdf
|
297.3 KB
|
Proactive Surge Protection A Defense Mechanism for Bandwidth-Based Attacks - Jerry Chou, Bill Lin, Subhabrata Sen, Oliver Spatscheck.pdf
|
802.2 KB
|
Real-World Buffer Overflow Protection for Userspace and Kernelspace - Michael Dalton, Hari Kannan, Christos Kozyrakis.pdf
|
283.3 KB
|
Reverse-Engineering a Cryptographic RFID Tag - Karsten Nohl, David Evans, Starbug, Henryk Platz.pdf
|
282.1 KB
|
Reverse-Engineering a Cryptographic RFID Tag.htm
|
45.1 KB
|
Securing Frame Communication in Browsers - Adam Barth, Collin Jackson, John C. Mitchell.pdf
|
1.0 MB
|
Security Analysis of Network Protocols Slides - John Mitchell.pdf
|
743.2 KB
|
Selective Versioning in a Secure Disk System - Swaminathan Sundararaman, Gopalan Sivathanu, Erez Zadok.pdf
|
283.3 KB
|
Setting DNS's Hair on Fire - Niels Provos, David Dagon, Paul Vixie.pdf
|
811.2 KB
|
The Practical Subtleties of Biometric Key Generation - Lucas Ballard, Seny Kamara, Michael K. Reiter.pdf
|
313.5 KB
|
The Practical Subtleties of Biometric Key Generation.htm
|
180.6 KB
|
To Catch a Predator A Natural Language Approach for Eliciting Malicious Payloads - Sam Small, Joshua Mason, Fabian Monrose, Niels Provos, Adam Stubblefield.pdf
|
409.4 KB
|
Unidirectional Key Distribution Across Time and Space with Applications to RFID Security - Ari Juels, Ravikanth Pappu, Bryan Parno.pdf
|
564.6 KB
|
USENIX Security 2008 Poster Session.htm
|
11.2 KB
|
Verifying Compliance of Trusted Programs - Sandra Rueda, Dave King, Trent Jaeger.pdf
|
307.7 KB
|
VoteBox A Tamper-evident, Verifiable Electronic Voting System - Daniel Sandler, Kyle Derr, Dan S. Wallach.pdf
|
508.9 KB
|
/.../An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/
|
improved-skew-est-camera.css
|
5.8 KB
|
improved-skew-est-camera0x.png
|
0.6 KB
|
improved-skew-est-camera1x.png
|
7.0 KB
|
improved-skew-est-camera2x.png
|
0.5 KB
|
improved-skew-est-camera3x.png
|
0.6 KB
|
improved-skew-est-camera4x.png
|
102.0 KB
|
improved-skew-est-camera5x.png
|
35.4 KB
|
improved-skew-est-camera6x.png
|
35.4 KB
|
improved-skew-est-camera7x.png
|
0.5 KB
|
improved-skew-est-camera8x.png
|
6.1 KB
|
improved-skew-est-camera9x.png
|
24.3 KB
|
improved-skew-est-camera10x.png
|
26.2 KB
|
improved-skew-est-camera11x.png
|
76.8 KB
|
improved-skew-est-camera12x.png
|
86.4 KB
|
improved-skew-est-camera13x.png
|
22.0 KB
|
improved-skew-est-camera14x.png
|
28.8 KB
|
improved-skew-est-camera15x.png
|
63.9 KB
|
improved-skew-est-camera16x.png
|
20.9 KB
|
improved-skew-est-camera17x.png
|
24.2 KB
|
improved-skew-est-camera18x.png
|
20.4 KB
|
improved-skew-est-camera19x.png
|
70.1 KB
|
improved-skew-est-camera20x.png
|
21.6 KB
|
improved-skew-est-camera21x.png
|
33.2 KB
|
improved-skew-est-camera22x.png
|
135.5 KB
|
improved-skew-est-camera23x.png
|
118.4 KB
|
improved-skew-est-camera24x.png
|
20.5 KB
|
improved-skew-est-camera25x.png
|
65.8 KB
|
improved-skew-est-camera26x.png
|
57.8 KB
|
improved-skew-est-camera27x.png
|
60.9 KB
|
improved-skew-est-camera28x.png
|
68.4 KB
|
improved-skew-est-camera29x.png
|
80.8 KB
|
new_usenix.jpg
|
20.6 KB
|
/.../Lest We Remember - Cold Boot Attacks on Encryption Keys_files/
|
memory_2.jpg
|
405.5 KB
|
memory_5.jpg
|
440.7 KB
|
memory_6.jpg
|
395.6 KB
|
mona_5s.png
|
297.5 KB
|
mona_30s.png
|
338.1 KB
|
mona_60s.png
|
332.0 KB
|
mona_300s.png
|
127.9 KB
|
new_usenix.jpg
|
20.6 KB
|
ramjet_5100.png
|
13.2 KB
|
toshiba_lenovo.png
|
14.0 KB
|
x60_t43p.png
|
15.6 KB
|
/.../Practical Symmetric Key Cryptography on Modern Graphics Hardware_files/
|
img1.png
|
0.2 KB
|
img2.png
|
0.1 KB
|
img3.png
|
1.1 KB
|
img4.png
|
1.2 KB
|
img5.png
|
1.0 KB
|
img6.png
|
0.7 KB
|
img7.png
|
3.0 KB
|
img8.png
|
8.1 KB
|
img9.png
|
7.1 KB
|
img10.png
|
5.9 KB
|
img11.png
|
5.4 KB
|
img12.png
|
9.6 KB
|
img13.png
|
9.0 KB
|
img14.png
|
7.0 KB
|
img15.png
|
4.9 KB
|
new_usenix.jpg
|
20.6 KB
|
usenix_layout_html.css
|
0.9 KB
|
/.../Reverse-Engineering a Cryptographic RFID Tag_files/
|
c1.png
|
24.5 KB
|
Mifare-anotated.jpg
|
70.5 KB
|
Mifare-orig-scale.jpg
|
50.8 KB
|
new_usenix.jpg
|
20.6 KB
|
/.../The Practical Subtleties of Biometric Key Generation_files/
|
bkgs.css
|
1.0 KB
|
fw-search.png
|
10.1 KB
|
img1.png
|
0.3 KB
|
img2.png
|
0.3 KB
|
img3.png
|
0.3 KB
|
img4.png
|
0.3 KB
|
img5.png
|
0.4 KB
|
img6.png
|
0.6 KB
|
img7.png
|
0.4 KB
|
img8.png
|
0.2 KB
|
img9.png
|
0.2 KB
|
img10.png
|
0.1 KB
|
img11.png
|
0.6 KB
|
img12.png
|
0.2 KB
|
img13.png
|
0.2 KB
|
img14.png
|
0.4 KB
|
img15.png
|
0.2 KB
|
img16.png
|
0.2 KB
|
img17.png
|
0.2 KB
|
img18.png
|
0.3 KB
|
img19.png
|
0.2 KB
|
img20.png
|
0.3 KB
|
img21.png
|
0.4 KB
|
img22.png
|
0.5 KB
|
img23.png
|
0.5 KB
|
img24.png
|
0.5 KB
|
img25.png
|
0.3 KB
|
img26.png
|
0.2 KB
|
img27.png
|
1.0 KB
|
img28.png
|
0.3 KB
|
img29.png
|
0.3 KB
|
img30.png
|
0.2 KB
|
img31.png
|
0.2 KB
|
img32.png
|
0.3 KB
|
img33.png
|
0.3 KB
|
img34.png
|
0.3 KB
|
img35.png
|
0.4 KB
|
img36.png
|
0.5 KB
|
img37.png
|
0.5 KB
|
img38.png
|
0.5 KB
|
img39.png
|
0.2 KB
|
img40.png
|
0.8 KB
|
img41.png
|
0.6 KB
|
img42.png
|
0.7 KB
|
img43.png
|
0.4 KB
|
img44.png
|
0.2 KB
|
img45.png
|
0.2 KB
|
img46.png
|
0.2 KB
|
img47.png
|
0.8 KB
|
img48.png
|
0.2 KB
|
img49.png
|
1.0 KB
|
img50.png
|
0.4 KB
|
img51.png
|
0.2 KB
|
img52.png
|
0.3 KB
|
img53.png
|
0.3 KB
|
img54.png
|
0.3 KB
|
img55.png
|
0.4 KB
|
img56.png
|
0.7 KB
|
img57.png
|
0.8 KB
|
img58.png
|
1.0 KB
|
img60.png
|
0.4 KB
|
img61.png
|
0.2 KB
|
img62.png
|
0.3 KB
|
img63.png
|
0.7 KB
|
img64.png
|
0.3 KB
|
img65.png
|
0.3 KB
|
img66.png
|
0.6 KB
|
img67.png
|
0.2 KB
|
img68.png
|
0.7 KB
|
img69.png
|
0.5 KB
|
img70.png
|
0.8 KB
|
img71.png
|
0.3 KB
|
img72.png
|
0.6 KB
|
img73.png
|
0.5 KB
|
img74.png
|
0.2 KB
|
img75.png
|
0.3 KB
|
img76.png
|
0.2 KB
|
img77.png
|
0.2 KB
|
img78.png
|
0.2 KB
|
img79.png
|
0.4 KB
|
img80.png
|
0.3 KB
|
img81.png
|
0.6 KB
|
img82.png
|
0.5 KB
|
img83.png
|
0.6 KB
|
img84.png
|
0.4 KB
|
img85.png
|
0.3 KB
|
img86.png
|
0.3 KB
|
img87.png
|
0.3 KB
|
img88.png
|
0.4 KB
|
img89.png
|
0.3 KB
|
img90.png
|
0.4 KB
|
img91.png
|
0.3 KB
|
img92.png
|
0.7 KB
|
img93.png
|
0.4 KB
|
img95.png
|
0.3 KB
|
img96.png
|
0.3 KB
|
img97.png
|
0.3 KB
|
img98.png
|
0.7 KB
|
img99.png
|
0.8 KB
|
img100.png
|
0.8 KB
|
img101.png
|
0.5 KB
|
img102.png
|
0.5 KB
|
img103.png
|
0.9 KB
|
img104.png
|
0.5 KB
|
img105.png
|
0.7 KB
|
img106.png
|
0.5 KB
|
img107.png
|
0.3 KB
|
img108.png
|
0.4 KB
|
img109.png
|
0.4 KB
|
img110.png
|
0.4 KB
|
img111.png
|
0.6 KB
|
img112.png
|
0.3 KB
|
img113.png
|
0.3 KB
|
img114.png
|
0.2 KB
|
img115.png
|
0.3 KB
|
img116.png
|
0.3 KB
|
img117.png
|
0.3 KB
|
img118.png
|
0.2 KB
|
img119.png
|
0.8 KB
|
img120.png
|
0.6 KB
|
img121.png
|
0.5 KB
|
img122.png
|
0.6 KB
|
img123.png
|
0.4 KB
|
img124.png
|
0.4 KB
|
img125.png
|
0.1 KB
|
img126.png
|
0.7 KB
|
img127.png
|
1.0 KB
|
img128.png
|
0.9 KB
|
img129.png
|
1.2 KB
|
img130.png
|
0.2 KB
|
img131.png
|
0.3 KB
|
img132.png
|
0.2 KB
|
img133.png
|
0.3 KB
|
img134.png
|
0.5 KB
|
img135.png
|
0.3 KB
|
img136.png
|
0.2 KB
|
img137.png
|
0.3 KB
|
img138.png
|
0.3 KB
|
img139.png
|
0.8 KB
|
img140.png
|
0.3 KB
|
img141.png
|
0.3 KB
|
img142.png
|
0.8 KB
|
img143.png
|
0.3 KB
|
img144.png
|
1.0 KB
|
img145.png
|
1.2 KB
|
img146.png
|
0.8 KB
|
img147.png
|
0.3 KB
|
img148.png
|
0.3 KB
|
img149.png
|
0.6 KB
|
img150.png
|
0.2 KB
|
img151.png
|
1.4 KB
|
img152.png
|
0.2 KB
|
img153.png
|
0.3 KB
|
img154.png
|
0.3 KB
|
img155.png
|
2.5 KB
|
img156.png
|
0.5 KB
|
img157.png
|
0.2 KB
|
img158.png
|
0.9 KB
|
img159.png
|
0.6 KB
|
img160.png
|
0.7 KB
|
img161.png
|
0.3 KB
|
img162.png
|
1.6 KB
|
img163.png
|
0.9 KB
|
img164.png
|
0.2 KB
|
img165.png
|
1.6 KB
|
img166.png
|
1.2 KB
|
img167.png
|
0.3 KB
|
img168.png
|
0.4 KB
|
img169.png
|
2.3 KB
|
img170.png
|
0.4 KB
|
img171.png
|
2.0 KB
|
img172.png
|
0.4 KB
|
img173.png
|
2.1 KB
|
img174.png
|
0.8 KB
|
img175.png
|
0.5 KB
|
img176.png
|
0.4 KB
|
img177.png
|
5.8 KB
|
img178.png
|
0.7 KB
|
img179.png
|
0.7 KB
|
img180.png
|
0.6 KB
|
img181.png
|
0.7 KB
|
img182.png
|
0.3 KB
|
new_usenix.jpg
|
20.6 KB
|
viel-search.png
|
13.1 KB
|
/.../USENIX Security 2008 Poster Session_files/
|
dot_clear.gif
|
0.0 KB
|
footer.gif
|
0.3 KB
|
left_bar.gif
|
0.1 KB
|
left_bottom.gif
|
0.4 KB
|
longbar.gif
|
0.1 KB
|
new_usenix.jpg
|
20.6 KB
|
questmark.gif
|
0.1 KB
|
sec08_banner_750.jpg
|
102.2 KB
|
/.../USENIX Security 2008 Technical Sessions_files/
|
bowen_debra.jpg
|
5.0 KB
|
dot_clear.gif
|
0.0 KB
|
footer.gif
|
0.3 KB
|
left_bar.gif
|
0.1 KB
|
left_bottom.gif
|
0.4 KB
|
longbar.gif
|
0.1 KB
|
mp3_icon.gif
|
0.8 KB
|
questmark.gif
|
0.1 KB
|
sec08_banner_750.jpg
|
102.2 KB
|
video_icon.gif
|
1.3 KB
|
/.../USENIX Security 2008 WiPs_files/
|
dot_clear.gif
|
0.0 KB
|
footer.gif
|
0.3 KB
|
left_bar.gif
|
0.1 KB
|
left_bottom.gif
|
0.4 KB
|
longbar.gif
|
0.1 KB
|
new_usenix.jpg
|
20.6 KB
|
questmark.gif
|
0.1 KB
|
sec08_banner_750.jpg
|
102.2 KB
|
/USENIX Security 2009/
|
18th USENIX Security Symposium (USENIX Security 2009).htm
|
26.6 KB
|
A Practical Congestion Attack on Tor Using Long Paths - Nathan S. Evans, Roger Dingledine, Christian Grothoff.mp4
|
8.0 MB
|
Android Securing a Mobile Platform from the Ground Up - Rich Cannings.mp4
|
21.4 MB
|
Baggy Bounds Checking An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors - Periklis Akritidis, Manuel Costa, Miguel Castro, Steven Hand.mp4
|
22.2 MB
|
CCCP Secure Remote Storage for Computational RFIDs - Mastooreh Salajegheh, Shane Clark, Benjamin Ransford, Kevin Fu, Ari Juels.mp4
|
11.0 MB
|
Compromising Electromagnetic Emanations of Wired and Wireless Keyboards - Martin Vuagnoux, Sylvain Pasini.mp4
|
9.9 MB
|
Crying Wolf An Empirical Study of SSL Warning Effectiveness - Joshua Sunshine, Serge Egelman, Hazim Almuhimedi, Neha Atri, and Lorrie Faith Cranor.mp4
|
8.8 MB
|
Designing Trustworthy User Agents for a Hostile Web - Eric Lawrence.mp4
|
11.1 MB
|
Detecting Spammers with SNARE Spatio-temporal Network-level Automatic Reputation Engine - Shuang Hao, Nadeem Ahmed Syed, Nick Feamster, Alexander G. Gray, Sven Krasser.mp4
|
8.6 MB
|
Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs - David Molnar, Xue Cong Li, and David A. Wagner.mp4
|
6.7 MB
|
Effective and Efficient Malware Detection at the End Host - Clemens Kolbitsch, Paolo Milani Comparetti, Christopher Kruegel, Engin Kirda, Sophia Antipolis, Xiaoyong Zhou, Xia.mp4
|
8.7 MB
|
Efficient Data Structures for Tamper-Evident Logging - Scott A. Crosby, Dan S. Wallach.mp4
|
6.6 MB
|
GATEKEEPER Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code - Salvatore Guarnieri, Benjamin Livshits.mp4
|
7.2 MB
|
Hash Functions and Their Many Uses in Cryptography - Shai Halevi.mp4
|
17.9 MB
|
Improving Tor using a TCP-over-DTLS Tunnel - Joel Reardon, Ian Goldberg.mp4
|
15.7 MB
|
Keynote Address - Rich Cannings.mp4
|
7.1 MB
|
Locating Prefix Hijackers using LOCK - Tongqing Qiu, Lusheng Ji, Dan Pei, Jia Wang, Jun (Jim) Xu, Hitesh Ballani.mp4
|
8.5 MB
|
Memory Safety for Low-Level Software Hardware Interactions - John Criswell, Nicolas Geoffray, Pierre et Marie Curie, Vikram Adve.mp4
|
7.6 MB
|
Modern Exploitation and Memory Protection Bypasses - Alexander Sotirov.mp4
|
26.5 MB
|
NOZZLE A Defense Against Heap-spraying Code Injection Attacks - Paruj Ratanaworabhan, Benjamin Livshits, Benjamin Zorn.mp4
|
11.6 MB
|
Opening Remarks - Fabian Monrose.mp3
|
30.2 KB
|
Peeping Tom in the Neighborhood Keystroke Eavesdropping on Multi-User Systems - Kehuan Zhang, XiaoFeng Wang.mov
|
49.2 MB
|
Physical-layer Identification of RFID Devices - Boris Danev, Thomas S. Heydt-Benjamin, Srdjan Capkun.mp4
|
7.2 MB
|
Protecting Confidential Data on Personal Computers with Storage Capsules - Kevin Borders, Eric Vander Weele, Billy Lau, Atul Prakash.mp4
|
8.0 MB
|
Return-Oriented Rootkits Bypassing Kernel Code Integrity Protection Mechanisms - Ralf Hund, Thorsten Holz, Felix C. Freiling.mp4
|
8.7 MB
|
Static Enforcement of Web Application Integrity Through Strong Typing - William Robertson, Giovanni Vigna.mp4
|
6.7 MB
|
The Multi-Principal OS Construction of the Gazelle Web Browser.mp4
|
7.4 MB
|
Top Ten Web Hacking Techniques of 2008 What's possible, not probable - Jeremiah Grossman.mp4
|
16.6 MB
|
Toward a New Legal Framework for Cybersecurity - Deirdre K. Mulligan.mp4
|
28.9 MB
|
USENIX Security 2009 Technical Sessions.htm
|
81.7 KB
|
USENIX Security 2009 WiPs.htm
|
26.2 KB
|
Vanish Increasing Data Privacy with Self-Destructing Data - Roxana Geambasu, Tadayoshi Kohno, Amit A. Levy, Henry M. Levy.mp4
|
16.8 MB
|
VPriv Protecting Privacy in Location-Based Vehicular Services - Raluca Ada Popa, Hari Balakrishnan, Andrew J. Blumberg.mp4
|
8.2 MB
|
Work-in-Progress Reports (WiPs) - Session Chair Sven Dietrich.mp4
|
23.0 MB
|
xBook Redesigning Privacy Control in Social Networking Platforms - Kapil Singh, Sumeer Bhola, Wenke Lee.mp4
|
8.2 MB
|
/.../18th USENIX Security Symposium (USENIX Security 2009)_files/
|
acmqueue_new_100x32.jpg
|
1.9 KB
|
aw_ph.gif
|
1.4 KB
|
betanews_125x23.jpg
|
2.0 KB
|
challenge_button_170x107.jpg
|
18.0 KB
|
ciscopress.gif
|
0.6 KB
|
confguru_125x34.jpg
|
2.3 KB
|
cset09_button_170x73.jpg
|
6.3 KB
|
dfrws_button.jpg
|
5.1 KB
|
dmtf_logo_100.gif
|
1.4 KB
|
dot_clear.gif
|
0.0 KB
|
dot_clear_002.gif
|
0.0 KB
|
evtwote09_button_170x73.jpg
|
6.5 KB
|
footer.gif
|
0.3 KB
|
fsm_125x36.gif
|
2.0 KB
|
google_140x58.gif
|
3.5 KB
|
hackett_bankwell_125x81.jpg
|
6.5 KB
|
hns_125_50.jpg
|
3.8 KB
|
hotsec09_button_170x74.jpg
|
6.8 KB
|
ibm_research_145x15.jpg
|
1.7 KB
|
ieee_sp_125x30.gif
|
1.7 KB
|
infosecnews_100x80.gif
|
1.7 KB
|
left_bar.gif
|
0.1 KB
|
left_bottom.gif
|
0.5 KB
|
linux_gazette_125x125.gif
|
3.8 KB
|
linux_journal_100x48.jpg
|
3.5 KB
|
linuxpro_100x38.gif
|
1.2 KB
|
longbar.gif
|
0.1 KB
|
lxer_80x28.gif
|
0.9 KB
|
meraki_logo_145x58.jpg
|
2.1 KB
|
metricon09_button_170x74.jpg
|
5.7 KB
|
microsoft_research_150.gif
|
1.4 KB
|
network_world_itr_125x27.gif
|
1.4 KB
|
new_usenix.jpg
|
20.6 KB
|
nostarch_90x104.jpg
|
3.7 KB
|
questmark.gif
|
0.1 KB
|
sec09_banner.jpg
|
35.3 KB
|
toolbox_100x76.gif
|
3.0 KB
|
usenix_face.gif
|
0.4 KB
|
userfriendly_125x26.gif
|
1.2 KB
|
woot09_button_170x72.jpg
|
6.4 KB
|
/.../USENIX Security 2009 captions/
|
A Practical Congestion Attack on Tor Using Long Paths - Nathan S. Evans, Roger Dingledine, Christian Grothoff.eng.json
|
1.2 MB
|
A Practical Congestion Attack on Tor Using Long Paths - Nathan S. Evans, Roger Dingledine, Christian Grothoff.eng.lrc
|
30.2 KB
|
A Practical Congestion Attack on Tor Using Long Paths - Nathan S. Evans, Roger Dingledine, Christian Grothoff.eng.srt
|
31.1 KB
|
A Practical Congestion Attack on Tor Using Long Paths - Nathan S. Evans, Roger Dingledine, Christian Grothoff.eng.text
|
23.5 KB
|
A Practical Congestion Attack on Tor Using Long Paths - Nathan S. Evans, Roger Dingledine, Christian Grothoff.eng.tsv
|
27.2 KB
|
A Practical Congestion Attack on Tor Using Long Paths - Nathan S. Evans, Roger Dingledine, Christian Grothoff.eng.txt
|
30.5 KB
|
A Practical Congestion Attack on Tor Using Long Paths - Nathan S. Evans, Roger Dingledine, Christian Grothoff.eng.vtt
|
29.0 KB
|
Android Securing a Mobile Platform from the Ground Up - Rich Cannings.eng.json
|
3.0 MB
|
Android Securing a Mobile Platform from the Ground Up - Rich Cannings.eng.lrc
|
85.4 KB
|
Android Securing a Mobile Platform from the Ground Up - Rich Cannings.eng.srt
|
82.7 KB
|
Android Securing a Mobile Platform from the Ground Up - Rich Cannings.eng.text
|
56.9 KB
|
Android Securing a Mobile Platform from the Ground Up - Rich Cannings.eng.tsv
|
73.3 KB
|
Android Securing a Mobile Platform from the Ground Up - Rich Cannings.eng.txt
|
86.5 KB
|
Android Securing a Mobile Platform from the Ground Up - Rich Cannings.eng.vtt
|
75.9 KB
|
Baggy Bounds Checking An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors - Periklis Akritidis, Manuel Costa, Miguel Castro, Steven Hand.eng.json
|
4.1 MB
|
Baggy Bounds Checking An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors - Periklis Akritidis, Manuel Costa, Miguel Castro, Steven Hand.eng.lrc
|
113.9 KB
|
Baggy Bounds Checking An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors - Periklis Akritidis, Manuel Costa, Miguel Castro, Steven Hand.eng.srt
|
98.2 KB
|
Baggy Bounds Checking An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors - Periklis Akritidis, Manuel Costa, Miguel Castro, Steven Hand.eng.text
|
72.0 KB
|
Baggy Bounds Checking An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors - Periklis Akritidis, Manuel Costa, Miguel Castro, Steven Hand.eng.tsv
|
95.6 KB
|
Baggy Bounds Checking An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors - Periklis Akritidis, Manuel Costa, Miguel Castro, Steven Hand.eng.txt
|
115.4 KB
|
Baggy Bounds Checking An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors - Periklis Akritidis, Manuel Costa, Miguel Castro, Steven Hand.eng.vtt
|
91.6 KB
|
CCCP Secure Remote Storage for Computational RFIDs - Mastooreh Salajegheh, Shane Clark, Benjamin Ransford, Kevin Fu, Ari Juels.eng.json
|
1.3 MB
|
CCCP Secure Remote Storage for Computational RFIDs - Mastooreh Salajegheh, Shane Clark, Benjamin Ransford, Kevin Fu, Ari Juels.eng.lrc
|
32.8 KB
|
CCCP Secure Remote Storage for Computational RFIDs - Mastooreh Salajegheh, Shane Clark, Benjamin Ransford, Kevin Fu, Ari Juels.eng.srt
|
33.6 KB
|
CCCP Secure Remote Storage for Computational RFIDs - Mastooreh Salajegheh, Shane Clark, Benjamin Ransford, Kevin Fu, Ari Juels.eng.text
|
23.5 KB
|
CCCP Secure Remote Storage for Computational RFIDs - Mastooreh Salajegheh, Shane Clark, Benjamin Ransford, Kevin Fu, Ari Juels.eng.tsv
|
28.8 KB
|
CCCP Secure Remote Storage for Computational RFIDs - Mastooreh Salajegheh, Shane Clark, Benjamin Ransford, Kevin Fu, Ari Juels.eng.txt
|
33.1 KB
|
CCCP Secure Remote Storage for Computational RFIDs - Mastooreh Salajegheh, Shane Clark, Benjamin Ransford, Kevin Fu, Ari Juels.eng.vtt
|
30.8 KB
|
Compromising Electromagnetic Emanations of Wired and Wireless Keyboards - Martin Vuagnoux, Sylvain Pasini.eng.json
|
1.4 MB
|
Compromising Electromagnetic Emanations of Wired and Wireless Keyboards - Martin Vuagnoux, Sylvain Pasini.eng.lrc
|
35.9 KB
|
Compromising Electromagnetic Emanations of Wired and Wireless Keyboards - Martin Vuagnoux, Sylvain Pasini.eng.srt
|
38.7 KB
|
Compromising Electromagnetic Emanations of Wired and Wireless Keyboards - Martin Vuagnoux, Sylvain Pasini.eng.text
|
25.5 KB
|
Compromising Electromagnetic Emanations of Wired and Wireless Keyboards - Martin Vuagnoux, Sylvain Pasini.eng.tsv
|
31.5 KB
|
Compromising Electromagnetic Emanations of Wired and Wireless Keyboards - Martin Vuagnoux, Sylvain Pasini.eng.txt
|
36.3 KB
|
Compromising Electromagnetic Emanations of Wired and Wireless Keyboards - Martin Vuagnoux, Sylvain Pasini.eng.vtt
|
34.9 KB
|
Crying Wolf An Empirical Study of SSL Warning Effectiveness - Joshua Sunshine, Serge Egelman, Hazim Almuhimedi, Neha Atri, and Lorrie Faith Cranor.eng.json
|
1.5 MB
|
Crying Wolf An Empirical Study of SSL Warning Effectiveness - Joshua Sunshine, Serge Egelman, Hazim Almuhimedi, Neha Atri, and Lorrie Faith Cranor.eng.lrc
|
41.0 KB
|
Crying Wolf An Empirical Study of SSL Warning Effectiveness - Joshua Sunshine, Serge Egelman, Hazim Almuhimedi, Neha Atri, and Lorrie Faith Cranor.eng.srt
|
40.9 KB
|
Crying Wolf An Empirical Study of SSL Warning Effectiveness - Joshua Sunshine, Serge Egelman, Hazim Almuhimedi, Neha Atri, and Lorrie Faith Cranor.eng.text
|
28.9 KB
|
Crying Wolf An Empirical Study of SSL Warning Effectiveness - Joshua Sunshine, Serge Egelman, Hazim Almuhimedi, Neha Atri, and Lorrie Faith Cranor.eng.tsv
|
35.8 KB
|
Crying Wolf An Empirical Study of SSL Warning Effectiveness - Joshua Sunshine, Serge Egelman, Hazim Almuhimedi, Neha Atri, and Lorrie Faith Cranor.eng.txt
|
41.5 KB
|
Crying Wolf An Empirical Study of SSL Warning Effectiveness - Joshua Sunshine, Serge Egelman, Hazim Almuhimedi, Neha Atri, and Lorrie Faith Cranor.eng.vtt
|
37.5 KB
|
Designing Trustworthy User Agents for a Hostile Web - Eric Lawrence.eng.json
|
1.4 MB
|
Designing Trustworthy User Agents for a Hostile Web - Eric Lawrence.eng.lrc
|
35.4 KB
|
Designing Trustworthy User Agents for a Hostile Web - Eric Lawrence.eng.srt
|
35.6 KB
|
Designing Trustworthy User Agents for a Hostile Web - Eric Lawrence.eng.text
|
25.1 KB
|
Designing Trustworthy User Agents for a Hostile Web - Eric Lawrence.eng.tsv
|
30.9 KB
|
Designing Trustworthy User Agents for a Hostile Web - Eric Lawrence.eng.txt
|
35.8 KB
|
Designing Trustworthy User Agents for a Hostile Web - Eric Lawrence.eng.vtt
|
32.6 KB
|
Detecting Spammers with SNARE Spatio-temporal Network-level Automatic Reputation Engine - Shuang Hao, Nadeem Ahmed Syed, Nick Feamster, Alexander G. Gray, Sven Krasser.eng.json
|
1.1 MB
|
Detecting Spammers with SNARE Spatio-temporal Network-level Automatic Reputation Engine - Shuang Hao, Nadeem Ahmed Syed, Nick Feamster, Alexander G. Gray, Sven Krasser.eng.lrc
|
28.8 KB
|
Detecting Spammers with SNARE Spatio-temporal Network-level Automatic Reputation Engine - Shuang Hao, Nadeem Ahmed Syed, Nick Feamster, Alexander G. Gray, Sven Krasser.eng.srt
|
31.5 KB
|
Detecting Spammers with SNARE Spatio-temporal Network-level Automatic Reputation Engine - Shuang Hao, Nadeem Ahmed Syed, Nick Feamster, Alexander G. Gray, Sven Krasser.eng.text
|
21.3 KB
|
Detecting Spammers with SNARE Spatio-temporal Network-level Automatic Reputation Engine - Shuang Hao, Nadeem Ahmed Syed, Nick Feamster, Alexander G. Gray, Sven Krasser.eng.tsv
|
25.6 KB
|
Detecting Spammers with SNARE Spatio-temporal Network-level Automatic Reputation Engine - Shuang Hao, Nadeem Ahmed Syed, Nick Feamster, Alexander G. Gray, Sven Krasser.eng.txt
|
29.1 KB
|
Detecting Spammers with SNARE Spatio-temporal Network-level Automatic Reputation Engine - Shuang Hao, Nadeem Ahmed Syed, Nick Feamster, Alexander G. Gray, Sven Krasser.eng.vtt
|
28.6 KB
|
Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs - David Molnar, Xue Cong Li, and David A. Wagner.eng.json
|
1.4 MB
|
Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs - David Molnar, Xue Cong Li, and David A. Wagner.eng.lrc
|
38.6 KB
|
Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs - David Molnar, Xue Cong Li, and David A. Wagner.eng.srt
|
31.2 KB
|
Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs - David Molnar, Xue Cong Li, and David A. Wagner.eng.text
|
23.3 KB
|
Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs - David Molnar, Xue Cong Li, and David A. Wagner.eng.tsv
|
31.8 KB
|
Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs - David Molnar, Xue Cong Li, and David A. Wagner.eng.txt
|
39.2 KB
|
Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs - David Molnar, Xue Cong Li, and David A. Wagner.eng.vtt
|
28.9 KB
|
Effective and Efficient Malware Detection at the End Host - Clemens Kolbitsch, Paolo Milani Comparetti, Christopher Kruegel, Engin Kirda, Sophia Antipolis, Xiaoyong Zhou, Xia.eng.json
|
1.6 MB
|
Effective and Efficient Malware Detection at the End Host - Clemens Kolbitsch, Paolo Milani Comparetti, Christopher Kruegel, Engin Kirda, Sophia Antipolis, Xiaoyong Zhou, Xia.eng.lrc
|
44.3 KB
|
Effective and Efficient Malware Detection at the End Host - Clemens Kolbitsch, Paolo Milani Comparetti, Christopher Kruegel, Engin Kirda, Sophia Antipolis, Xiaoyong Zhou, Xia.eng.srt
|
39.8 KB
|
Effective and Efficient Malware Detection at the End Host - Clemens Kolbitsch, Paolo Milani Comparetti, Christopher Kruegel, Engin Kirda, Sophia Antipolis, Xiaoyong Zhou, Xia.eng.text
|
28.6 KB
|
Effective and Efficient Malware Detection at the End Host - Clemens Kolbitsch, Paolo Milani Comparetti, Christopher Kruegel, Engin Kirda, Sophia Antipolis, Xiaoyong Zhou, Xia.eng.tsv
|
37.8 KB
|
Effective and Efficient Malware Detection at the End Host - Clemens Kolbitsch, Paolo Milani Comparetti, Christopher Kruegel, Engin Kirda, Sophia Antipolis, Xiaoyong Zhou, Xia.eng.txt
|
44.9 KB
|
Effective and Efficient Malware Detection at the End Host - Clemens Kolbitsch, Paolo Milani Comparetti, Christopher Kruegel, Engin Kirda, Sophia Antipolis, Xiaoyong Zhou, Xia.eng.vtt
|
36.5 KB
|
Efficient Data Structures for Tamper-Evident Logging - Scott A. Crosby, Dan S. Wallach.eng.json
|
1.3 MB
|
Efficient Data Structures for Tamper-Evident Logging - Scott A. Crosby, Dan S. Wallach.eng.lrc
|
37.8 KB
|
Efficient Data Structures for Tamper-Evident Logging - Scott A. Crosby, Dan S. Wallach.eng.srt
|
33.5 KB
|
Efficient Data Structures for Tamper-Evident Logging - Scott A. Crosby, Dan S. Wallach.eng.text
|
23.7 KB
|
Efficient Data Structures for Tamper-Evident Logging - Scott A. Crosby, Dan S. Wallach.eng.tsv
|
31.5 KB
|
Efficient Data Structures for Tamper-Evident Logging - Scott A. Crosby, Dan S. Wallach.eng.txt
|
38.3 KB
|
Efficient Data Structures for Tamper-Evident Logging - Scott A. Crosby, Dan S. Wallach.eng.vtt
|
30.7 KB
|
GATEKEEPER Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code - Salvatore Guarnieri, Benjamin Livshits.eng.json
|
1.2 MB
|
GATEKEEPER Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code - Salvatore Guarnieri, Benjamin Livshits.eng.lrc
|
33.1 KB
|
GATEKEEPER Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code - Salvatore Guarnieri, Benjamin Livshits.eng.srt
|
28.4 KB
|
GATEKEEPER Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code - Salvatore Guarnieri, Benjamin Livshits.eng.text
|
20.5 KB
|
GATEKEEPER Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code - Salvatore Guarnieri, Benjamin Livshits.eng.tsv
|
27.4 KB
|
GATEKEEPER Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code - Salvatore Guarnieri, Benjamin Livshits.eng.txt
|
33.6 KB
|
GATEKEEPER Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code - Salvatore Guarnieri, Benjamin Livshits.eng.vtt
|
26.1 KB
|
Hash Functions and Their Many Uses in Cryptography - Shai Halevi.eng.json
|
3.3 MB
|
Hash Functions and Their Many Uses in Cryptography - Shai Halevi.eng.lrc
|
94.4 KB
|
Hash Functions and Their Many Uses in Cryptography - Shai Halevi.eng.srt
|
78.6 KB
|
Hash Functions and Their Many Uses in Cryptography - Shai Halevi.eng.text
|
57.9 KB
|
Hash Functions and Their Many Uses in Cryptography - Shai Halevi.eng.tsv
|
79.1 KB
|
Hash Functions and Their Many Uses in Cryptography - Shai Halevi.eng.txt
|
95.8 KB
|
Hash Functions and Their Many Uses in Cryptography - Shai Halevi.eng.vtt
|
72.8 KB
|
Improving Tor using a TCP-over-DTLS Tunnel - Joel Reardon, Ian Goldberg.eng.json
|
1.7 MB
|
Improving Tor using a TCP-over-DTLS Tunnel - Joel Reardon, Ian Goldberg.eng.lrc
|
42.5 KB
|
Improving Tor using a TCP-over-DTLS Tunnel - Joel Reardon, Ian Goldberg.eng.srt
|
44.7 KB
|
Improving Tor using a TCP-over-DTLS Tunnel - Joel Reardon, Ian Goldberg.eng.text
|
32.4 KB
|
Improving Tor using a TCP-over-DTLS Tunnel - Joel Reardon, Ian Goldberg.eng.tsv
|
38.1 KB
|
Improving Tor using a TCP-over-DTLS Tunnel - Joel Reardon, Ian Goldberg.eng.txt
|
42.8 KB
|
Improving Tor using a TCP-over-DTLS Tunnel - Joel Reardon, Ian Goldberg.eng.vtt
|
41.2 KB
|
Keynote Address - Rich Cannings.eng.json
|
1.3 MB
|
Keynote Address - Rich Cannings.eng.lrc
|
32.2 KB
|
Keynote Address - Rich Cannings.eng.srt
|
37.0 KB
|
Keynote Address - Rich Cannings.eng.text
|
21.6 KB
|
Keynote Address - Rich Cannings.eng.tsv
|
27.5 KB
|
Keynote Address - Rich Cannings.eng.txt
|
32.6 KB
|
Keynote Address - Rich Cannings.eng.vtt
|
32.6 KB
|
Locating Prefix Hijackers using LOCK - Tongqing Qiu, Lusheng Ji, Dan Pei, Jia Wang, Jun (Jim) Xu, Hitesh Ballani.eng.json
|
1.2 MB
|
Locating Prefix Hijackers using LOCK - Tongqing Qiu, Lusheng Ji, Dan Pei, Jia Wang, Jun (Jim) Xu, Hitesh Ballani.eng.lrc
|
30.3 KB
|
Locating Prefix Hijackers using LOCK - Tongqing Qiu, Lusheng Ji, Dan Pei, Jia Wang, Jun (Jim) Xu, Hitesh Ballani.eng.srt
|
32.1 KB
|
Locating Prefix Hijackers using LOCK - Tongqing Qiu, Lusheng Ji, Dan Pei, Jia Wang, Jun (Jim) Xu, Hitesh Ballani.eng.text
|
22.1 KB
|
Locating Prefix Hijackers using LOCK - Tongqing Qiu, Lusheng Ji, Dan Pei, Jia Wang, Jun (Jim) Xu, Hitesh Ballani.eng.tsv
|
26.7 KB
|
Locating Prefix Hijackers using LOCK - Tongqing Qiu, Lusheng Ji, Dan Pei, Jia Wang, Jun (Jim) Xu, Hitesh Ballani.eng.txt
|
30.6 KB
|
Locating Prefix Hijackers using LOCK - Tongqing Qiu, Lusheng Ji, Dan Pei, Jia Wang, Jun (Jim) Xu, Hitesh Ballani.eng.vtt
|
29.2 KB
|
Memory Safety for Low-Level Software Hardware Interactions - John Criswell, Nicolas Geoffray, Pierre et Marie Curie, Vikram Adve.eng.json
|
1.2 MB
|
Memory Safety for Low-Level Software Hardware Interactions - John Criswell, Nicolas Geoffray, Pierre et Marie Curie, Vikram Adve.eng.lrc
|
38.0 KB
|
Memory Safety for Low-Level Software Hardware Interactions - John Criswell, Nicolas Geoffray, Pierre et Marie Curie, Vikram Adve.eng.srt
|
26.7 KB
|
Memory Safety for Low-Level Software Hardware Interactions - John Criswell, Nicolas Geoffray, Pierre et Marie Curie, Vikram Adve.eng.text
|
19.0 KB
|
Memory Safety for Low-Level Software Hardware Interactions - John Criswell, Nicolas Geoffray, Pierre et Marie Curie, Vikram Adve.eng.tsv
|
29.7 KB
|
Memory Safety for Low-Level Software Hardware Interactions - John Criswell, Nicolas Geoffray, Pierre et Marie Curie, Vikram Adve.eng.txt
|
38.7 KB
|
Memory Safety for Low-Level Software Hardware Interactions - John Criswell, Nicolas Geoffray, Pierre et Marie Curie, Vikram Adve.eng.vtt
|
24.4 KB
|
Modern Exploitation and Memory Protection Bypasses - Alexander Sotirov.eng.json
|
3.9 MB
|
Modern Exploitation and Memory Protection Bypasses - Alexander Sotirov.eng.lrc
|
114.6 KB
|
Modern Exploitation and Memory Protection Bypasses - Alexander Sotirov.eng.srt
|
94.2 KB
|
Modern Exploitation and Memory Protection Bypasses - Alexander Sotirov.eng.text
|
69.0 KB
|
Modern Exploitation and Memory Protection Bypasses - Alexander Sotirov.eng.tsv
|
94.4 KB
|
Modern Exploitation and Memory Protection Bypasses - Alexander Sotirov.eng.txt
|
116.2 KB
|
Modern Exploitation and Memory Protection Bypasses - Alexander Sotirov.eng.vtt
|
88.3 KB
|
NOZZLE A Defense Against Heap-spraying Code Injection Attacks - Paruj Ratanaworabhan, Benjamin Livshits, Benjamin Zorn.eng.json
|
1.9 MB
|
NOZZLE A Defense Against Heap-spraying Code Injection Attacks - Paruj Ratanaworabhan, Benjamin Livshits, Benjamin Zorn.eng.lrc
|
55.1 KB
|
NOZZLE A Defense Against Heap-spraying Code Injection Attacks - Paruj Ratanaworabhan, Benjamin Livshits, Benjamin Zorn.eng.srt
|
44.9 KB
|
NOZZLE A Defense Against Heap-spraying Code Injection Attacks - Paruj Ratanaworabhan, Benjamin Livshits, Benjamin Zorn.eng.text
|
32.9 KB
|
NOZZLE A Defense Against Heap-spraying Code Injection Attacks - Paruj Ratanaworabhan, Benjamin Livshits, Benjamin Zorn.eng.tsv
|
45.6 KB
|
NOZZLE A Defense Against Heap-spraying Code Injection Attacks - Paruj Ratanaworabhan, Benjamin Livshits, Benjamin Zorn.eng.txt
|
56.0 KB
|
NOZZLE A Defense Against Heap-spraying Code Injection Attacks - Paruj Ratanaworabhan, Benjamin Livshits, Benjamin Zorn.eng.vtt
|
41.3 KB
|
Physical-layer Identification of RFID Devices - Boris Danev, Thomas S. Heydt-Benjamin, Srdjan Capkun.eng.json
|
1.2 MB
|
Physical-layer Identification of RFID Devices - Boris Danev, Thomas S. Heydt-Benjamin, Srdjan Capkun.eng.lrc
|
33.6 KB
|
Physical-layer Identification of RFID Devices - Boris Danev, Thomas S. Heydt-Benjamin, Srdjan Capkun.eng.srt
|
29.3 KB
|
Physical-layer Identification of RFID Devices - Boris Danev, Thomas S. Heydt-Benjamin, Srdjan Capkun.eng.text
|
21.2 KB
|
Physical-layer Identification of RFID Devices - Boris Danev, Thomas S. Heydt-Benjamin, Srdjan Capkun.eng.tsv
|
28.3 KB
|
Physical-layer Identification of RFID Devices - Boris Danev, Thomas S. Heydt-Benjamin, Srdjan Capkun.eng.txt
|
34.1 KB
|
Physical-layer Identification of RFID Devices - Boris Danev, Thomas S. Heydt-Benjamin, Srdjan Capkun.eng.vtt
|
27.0 KB
|
Protecting Confidential Data on Personal Computers with Storage Capsules - Kevin Borders, Eric Vander Weele, Billy Lau, Atul Prakash.eng.json
|
1.1 MB
|
Protecting Confidential Data on Personal Computers with Storage Capsules - Kevin Borders, Eric Vander Weele, Billy Lau, Atul Prakash.eng.lrc
|
27.8 KB
|
Protecting Confidential Data on Personal Computers with Storage Capsules - Kevin Borders, Eric Vander Weele, Billy Lau, Atul Prakash.eng.srt
|
30.8 KB
|
Protecting Confidential Data on Personal Computers with Storage Capsules - Kevin Borders, Eric Vander Weele, Billy Lau, Atul Prakash.eng.text
|
21.5 KB
|
Protecting Confidential Data on Personal Computers with Storage Capsules - Kevin Borders, Eric Vander Weele, Billy Lau, Atul Prakash.eng.tsv
|
25.1 KB
|
Protecting Confidential Data on Personal Computers with Storage Capsules - Kevin Borders, Eric Vander Weele, Billy Lau, Atul Prakash.eng.txt
|
28.1 KB
|
Protecting Confidential Data on Personal Computers with Storage Capsules - Kevin Borders, Eric Vander Weele, Billy Lau, Atul Prakash.eng.vtt
|
28.2 KB
|
Return-Oriented Rootkits Bypassing Kernel Code Integrity Protection Mechanisms - Ralf Hund, Thorsten Holz, Felix C. Freiling.eng.json
|
1.3 MB
|
Return-Oriented Rootkits Bypassing Kernel Code Integrity Protection Mechanisms - Ralf Hund, Thorsten Holz, Felix C. Freiling.eng.lrc
|
37.8 KB
|
Return-Oriented Rootkits Bypassing Kernel Code Integrity Protection Mechanisms - Ralf Hund, Thorsten Holz, Felix C. Freiling.eng.srt
|
32.1 KB
|
Return-Oriented Rootkits Bypassing Kernel Code Integrity Protection Mechanisms - Ralf Hund, Thorsten Holz, Felix C. Freiling.eng.text
|
24.7 KB
|
Return-Oriented Rootkits Bypassing Kernel Code Integrity Protection Mechanisms - Ralf Hund, Thorsten Holz, Felix C. Freiling.eng.tsv
|
32.3 KB
|
Return-Oriented Rootkits Bypassing Kernel Code Integrity Protection Mechanisms - Ralf Hund, Thorsten Holz, Felix C. Freiling.eng.txt
|
38.3 KB
|
Return-Oriented Rootkits Bypassing Kernel Code Integrity Protection Mechanisms - Ralf Hund, Thorsten Holz, Felix C. Freiling.eng.vtt
|
30.0 KB
|
Static Enforcement of Web Application Integrity Through Strong Typing - William Robertson, Giovanni Vigna.eng.json
|
1.0 MB
|
Static Enforcement of Web Application Integrity Through Strong Typing - William Robertson, Giovanni Vigna.eng.lrc
|
28.5 KB
|
Static Enforcement of Web Application Integrity Through Strong Typing - William Robertson, Giovanni Vigna.eng.srt
|
25.4 KB
|
Static Enforcement of Web Application Integrity Through Strong Typing - William Robertson, Giovanni Vigna.eng.text
|
19.2 KB
|
Static Enforcement of Web Application Integrity Through Strong Typing - William Robertson, Giovanni Vigna.eng.tsv
|
24.4 KB
|
Static Enforcement of Web Application Integrity Through Strong Typing - William Robertson, Giovanni Vigna.eng.txt
|
28.8 KB
|
Static Enforcement of Web Application Integrity Through Strong Typing - William Robertson, Giovanni Vigna.eng.vtt
|
23.6 KB
|
The Multi-Principal OS Construction of the Gazelle Web Browser.eng.json
|
1.6 MB
|
The Multi-Principal OS Construction of the Gazelle Web Browser.eng.lrc
|
47.8 KB
|
The Multi-Principal OS Construction of the Gazelle Web Browser.eng.srt
|
37.2 KB
|
The Multi-Principal OS Construction of the Gazelle Web Browser.eng.text
|
28.6 KB
|
The Multi-Principal OS Construction of the Gazelle Web Browser.eng.tsv
|
39.5 KB
|
The Multi-Principal OS Construction of the Gazelle Web Browser.eng.txt
|
48.5 KB
|
The Multi-Principal OS Construction of the Gazelle Web Browser.eng.vtt
|
34.6 KB
|
Top Ten Web Hacking Techniques of 2008 What's possible, not probable - Jeremiah Grossman.eng.json
|
2.9 MB
|
Top Ten Web Hacking Techniques of 2008 What's possible, not probable - Jeremiah Grossman.eng.lrc
|
80.8 KB
|
Top Ten Web Hacking Techniques of 2008 What's possible, not probable - Jeremiah Grossman.eng.srt
|
70.0 KB
|
Top Ten Web Hacking Techniques of 2008 What's possible, not probable - Jeremiah Grossman.eng.text
|
53.2 KB
|
Top Ten Web Hacking Techniques of 2008 What's possible, not probable - Jeremiah Grossman.eng.tsv
|
69.5 KB
|
Top Ten Web Hacking Techniques of 2008 What's possible, not probable - Jeremiah Grossman.eng.txt
|
81.9 KB
|
Top Ten Web Hacking Techniques of 2008 What's possible, not probable - Jeremiah Grossman.eng.vtt
|
65.0 KB
|
Toward a New Legal Framework for Cybersecurity - Deirdre K. Mulligan.eng.json
|
4.9 MB
|
Toward a New Legal Framework for Cybersecurity - Deirdre K. Mulligan.eng.lrc
|
142.2 KB
|
Toward a New Legal Framework for Cybersecurity - Deirdre K. Mulligan.eng.srt
|
121.2 KB
|
Toward a New Legal Framework for Cybersecurity - Deirdre K. Mulligan.eng.text
|
90.3 KB
|
Toward a New Legal Framework for Cybersecurity - Deirdre K. Mulligan.eng.tsv
|
118.8 KB
|
Toward a New Legal Framework for Cybersecurity - Deirdre K. Mulligan.eng.txt
|
144.0 KB
|
Toward a New Legal Framework for Cybersecurity - Deirdre K. Mulligan.eng.vtt
|
114.0 KB
|
Vanish Increasing Data Privacy with Self-Destructing Data - Roxana Geambasu, Tadayoshi Kohno, Amit A. Levy, Henry M. Levy.eng.json
|
1.7 MB
|
Vanish Increasing Data Privacy with Self-Destructing Data - Roxana Geambasu, Tadayoshi Kohno, Amit A. Levy, Henry M. Levy.eng.lrc
|
47.8 KB
|
Vanish Increasing Data Privacy with Self-Destructing Data - Roxana Geambasu, Tadayoshi Kohno, Amit A. Levy, Henry M. Levy.eng.srt
|
40.4 KB
|
Vanish Increasing Data Privacy with Self-Destructing Data - Roxana Geambasu, Tadayoshi Kohno, Amit A. Levy, Henry M. Levy.eng.text
|
29.5 KB
|
Vanish Increasing Data Privacy with Self-Destructing Data - Roxana Geambasu, Tadayoshi Kohno, Amit A. Levy, Henry M. Levy.eng.tsv
|
40.0 KB
|
Vanish Increasing Data Privacy with Self-Destructing Data - Roxana Geambasu, Tadayoshi Kohno, Amit A. Levy, Henry M. Levy.eng.txt
|
48.5 KB
|
Vanish Increasing Data Privacy with Self-Destructing Data - Roxana Geambasu, Tadayoshi Kohno, Amit A. Levy, Henry M. Levy.eng.vtt
|
37.2 KB
|
VPriv Protecting Privacy in Location-Based Vehicular Services - Raluca Ada Popa, Hari Balakrishnan, Andrew J. Blumberg.eng.json
|
1.5 MB
|
VPriv Protecting Privacy in Location-Based Vehicular Services - Raluca Ada Popa, Hari Balakrishnan, Andrew J. Blumberg.eng.lrc
|
44.4 KB
|
VPriv Protecting Privacy in Location-Based Vehicular Services - Raluca Ada Popa, Hari Balakrishnan, Andrew J. Blumberg.eng.srt
|
35.7 KB
|
VPriv Protecting Privacy in Location-Based Vehicular Services - Raluca Ada Popa, Hari Balakrishnan, Andrew J. Blumberg.eng.text
|
26.5 KB
|
VPriv Protecting Privacy in Location-Based Vehicular Services - Raluca Ada Popa, Hari Balakrishnan, Andrew J. Blumberg.eng.tsv
|
36.8 KB
|
VPriv Protecting Privacy in Location-Based Vehicular Services - Raluca Ada Popa, Hari Balakrishnan, Andrew J. Blumberg.eng.txt
|
45.1 KB
|
VPriv Protecting Privacy in Location-Based Vehicular Services - Raluca Ada Popa, Hari Balakrishnan, Andrew J. Blumberg.eng.vtt
|
33.0 KB
|
Work-in-Progress Reports (WiPs) - Session Chair Sven Dietrich.eng.json
|
3.6 MB
|
Work-in-Progress Reports (WiPs) - Session Chair Sven Dietrich.eng.lrc
|
103.8 KB
|
Work-in-Progress Reports (WiPs) - Session Chair Sven Dietrich.eng.srt
|
87.6 KB
|
Work-in-Progress Reports (WiPs) - Session Chair Sven Dietrich.eng.text
|
63.3 KB
|
Work-in-Progress Reports (WiPs) - Session Chair Sven Dietrich.eng.tsv
|
86.7 KB
|
Work-in-Progress Reports (WiPs) - Session Chair Sven Dietrich.eng.txt
|
105.3 KB
|
Work-in-Progress Reports (WiPs) - Session Chair Sven Dietrich.eng.vtt
|
81.4 KB
|
xBook Redesigning Privacy Control in Social Networking Platforms - Kapil Singh, Sumeer Bhola, Wenke Lee.eng.json
|
1.2 MB
|
xBook Redesigning Privacy Control in Social Networking Platforms - Kapil Singh, Sumeer Bhola, Wenke Lee.eng.lrc
|
32.6 KB
|
xBook Redesigning Privacy Control in Social Networking Platforms - Kapil Singh, Sumeer Bhola, Wenke Lee.eng.srt
|
33.0 KB
|
xBook Redesigning Privacy Control in Social Networking Platforms - Kapil Singh, Sumeer Bhola, Wenke Lee.eng.text
|
24.7 KB
|
xBook Redesigning Privacy Control in Social Networking Platforms - Kapil Singh, Sumeer Bhola, Wenke Lee.eng.tsv
|
29.3 KB
|
xBook Redesigning Privacy Control in Social Networking Platforms - Kapil Singh, Sumeer Bhola, Wenke Lee.eng.txt
|
33.0 KB
|
xBook Redesigning Privacy Control in Social Networking Platforms - Kapil Singh, Sumeer Bhola, Wenke Lee.eng.vtt
|
30.7 KB
|
/.../USENIX Security 2009 Presentations/
|
A Practical Congestion Attack on Tor Using Long Paths - Nathan S. Evans, Roger Dingledine, Christian Grothoff.pdf
|
1.5 MB
|
A Practical Congestion Attack on Tor Using Long Paths Slides - Nathan S. Evans, Roger Dingledine, Christian Grothoff.pdf
|
1.4 MB
|
Baggy Bounds Checking An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors - Periklis Akritidis, Manuel Costa, Miguel Castro, Steven Hand.pdf
|
1.1 MB
|
Baggy Bounds Checking An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors Slides - Periklis Akritidis, Manuel Costa, Miguel Castro, Steven Ha.pdf
|
362.1 KB
|
Browser Security Proceedings.pdf
|
833.1 KB
|
Browser Security.pdf
|
833.1 KB
|
CCCP Secure Remote Storage for Computational RFIDs - Mastooreh Salajegheh, Shane Clark, Benjamin Ransford, Kevin Fu, Ari Juels.pdf
|
212.1 KB
|
CCCP Secure Remote Storage for Computational RFIDs Slides - Mastooreh Salajegheh, Shane Clark, Benjamin Ransford, Kevin Fu, Ari Juels.pdf
|
1.7 MB
|
Compression, Correction, Confidentiality, and Comprehension A Modern Look at Commercial Telegraph Codes - Steven M. Bellovin.pdf
|
11.9 MB
|
Compromising Electromagnetic Emanations of Wired and Wireless Keyboards - Martin Vuagnoux, Sylvain Pasini.pdf
|
1.5 MB
|
Compromising Electromagnetic Emanations of Wired and Wireless Keyboards Slides - Martin Vuagnoux, Sylvain Pasini.pdf
|
13.5 MB
|
Cross-Origin JavaScript Capability Leaks Detection, Exploitation, and Defense - Adam Barth, Joel Weinberger, Dawn Song.pdf
|
238.0 KB
|
Crying Wolf An Empirical Study of SSL Warning Effectiveness - Joshua Sunshine, Serge Egelman, Hazim Almuhimedi, Neha Atri, Lorrie Faith Cranor.pdf
|
501.6 KB
|
Crying Wolf An Empirical Study of SSL Warning Effectiveness Slides - Joshua Sunshine, Serge Egelman, Hazim Almuhimedi, Neha Atri, Lorrie Faith Cranor.pdf
|
1.2 MB
|
Designing Trustworthy User Agents for a Hostile Web - Eric Lawrence.pdf
|
186.3 KB
|
Designing Trustworthy User Agents for a Hostile Web Slides - Eric Lawrence.pdf
|
5.0 MB
|
Detecting Spammers with SNARE Spatio-temporal Network-level Automatic Reputation Engine - Shuang Hao, Nadeem Ahmed Syed, Nick Feamster, Alexander G. Gray, Sven Kras.pdf
|
551.4 KB
|
Detecting Spammers with SNARE Spatio-temporal Network-level Automatic Reputation Engine Slides - Shuang Hao, Nadeem Ahmed Syed, Nick Feamster, Alexander G. Gray, Sv.pdf
|
738.6 KB
|
Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs - David Molnar, Xue Cong Li, David A. Wagner.pdf
|
226.3 KB
|
Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs Slides - David Molnar, Xue Cong Li, David A. Wagner.pdf
|
211.4 KB
|
Effective and Efficient Malware Detection at the End Host - Clemens Kolbitsch, Paolo Milani Comparetti, Christopher Kruegel, Engin Kirda, Sophia Antipolis, Xiaoyong.pdf
|
503.6 KB
|
Effective and Efficient Malware Detection at the End Host Slides - Clemens Kolbitsch, Paolo Milani Comparetti, Christopher Kruegel, Engin Kirda, Sophia Antipolis, X.pdf
|
641.3 KB
|
Efficient Data Structures for Tamper-Evident Logging - Scott A. Crosby, Dan S. Wallach.pdf
|
220.9 KB
|
Efficient Data Structures for Tamper-Evident Logging Slides - Scott A. Crosby, Dan S. Wallach.pdf
|
539.8 KB
|
GATEKEEPER Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code - Salvatore Guarnieri, Benjamin Livshits.pdf
|
854.9 KB
|
Hash Functions and Their Many Uses in Cryptography - Shai Halevi.pdf
|
1.7 MB
|
How the Pursuit of Truth Led Me to Selling Viagra - Vern Paxson.pdf
|
5.9 MB
|
Improving Tor using a TCP-over-DTLS Tunnel - Joel Reardon, Ian Goldberg.pdf
|
1.8 MB
|
Improving Tor using a TCP-over-DTLS Tunnel Slides - Joel Reardon, Ian Goldberg.pdf
|
413.4 KB
|
Jamming-resistant Broadcast Communication without Shared Keys - Christina Popper, Mario Strasser, Srdjan Capkun.pdf
|
639.9 KB
|
Jamming-resistant Broadcast Communication without Shared Keys Slides - Christina Popper, Mario Strasser, and Srdjan Capkun.pdf
|
624.6 KB
|
JavaScript Security - sec09_corrigendum.pdf
|
101.6 KB
|
JavaScript Security - sec09_javascript.pdf
|
1.4 MB
|
Locating Prefix Hijackers using LOCK - Tongqing Qiu, Lusheng Ji, Dan Pei, Jia Wang, Jun (Jim) Xu, Hitesh Ballani.pdf
|
223.9 KB
|
Locating Prefix Hijackers using LOCK Slides - Tongqing Qiu, Lusheng Ji, Dan Pei, Jia Wang, Jun (Jim) Xu, Hitesh Ballani.pdf
|
2.1 MB
|
Malware Detection and Protection.pdf
|
1.2 MB
|
Memory Safety for Low-Level Software Hardware Interactions - John Criswell, Nicolas Geoffray, Pierre et Marie Curie, Vikram Adve.pdf
|
313.7 KB
|
Memory Safety for Low-Level Software Hardware Interactions Slides - John Criswell, Nicolas Geoffray, Pierre et Marie Curie, Vikram Adve.pdf
|
1.8 MB
|
Nemesis Preventing Authentication and Access Control Vulnerabilities in Web Applications - Michael Dalton, Christos Kozyrakis, Nickolai Zeldovich.pdf
|
453.3 KB
|
Nemesis Preventing Authentication and Access Control Vulnerabilities in Web Applications Slides - Michael Dalton, Christos Kozyrakis, Nickolai Zeldovich.pdf
|
290.9 KB
|
Network Security - sec09_network.pdf
|
1.8 MB
|
NOZZLE A Defense Against Heap-spraying Code Injection Attacks - Paruj Ratanaworabhan, Benjamin Livshits, Benjamin Zorn.pdf
|
1.7 MB
|
Peeping Tom in the Neighborhood Keystroke Eavesdropping on Multi-User Systems - Kehuan Zhang, XiaoFeng Wang.pdf
|
467.9 KB
|
Peeping Tom in the Neighborhood Keystroke Eavesdropping on Multi-User Systems Slides - Kehuan Zhang, XiaoFeng Wang.pdf
|
1.3 MB
|
Physical-layer Identification of RFID Devices - Boris Danev, Thomas S. Heydt-Benjamin, Srdjan Capkun.pdf
|
935.2 KB
|
Physical-layer Identification of RFID Devices Slides - Boris Danev, Thomas S. Heydt-Benjamin, Srdjan Capkun.pdf
|
307.9 KB
|
Protecting Confidential Data on Personal Computers with Storage Capsules - Kevin Borders, Eric Vander Weele, Billy Lau, Atul Prakash.pdf
|
145.6 KB
|
Protecting Confidential Data on Personal Computers with Storage Capsules Slides - Kevin Borders, Eric Vander Weele, Billy Lau, Atul Prakash.pdf
|
744.9 KB
|
Return-Oriented Rootkits Bypassing Kernel Code Integrity Protection Mechanisms - Ralf Hund, Thorsten Holz, Felix C. Freiling.pdf
|
370.4 KB
|
Return-Oriented Rootkits Bypassing Kernel Code Integrity Protection Mechanisms Slides - Ralf Hund, Thorsten Holz, Felix C. Freiling.pdf
|
437.6 KB
|
Static Enforcement of Web Application Integrity Through Strong Typing - William Robertson, Giovanni Vigna.pdf
|
495.1 KB
|
Static Enforcement of Web Application Integrity Through Strong Typing Slides - William Robertson, Giovanni Vigna.pdf
|
6.7 MB
|
The Building Security in Maturity Model (BSIMM) - Gary McGraw, Brian Chess.pdf
|
3.9 MB
|
The Building Security in Maturity Model (BSIMM) Slides - Gary McGraw, Brian Chess.pdf
|
3.9 MB
|
The Multi-Principal OS Construction of the Gazelle Web Browser - Helen J. Wang, Chris Grier, Alex Moshchuk, Samuel T. King, Piali Choudhury, Herman Venter.pdf
|
261.2 KB
|
The Multi-Principal OS Construction of the Gazelle Web Browser Slides - Helen J. Wang, Chris Grier, Alex Moshchuk, Samuel T. King, Piali Choudhury, Herman Vente.pdf
|
1.7 MB
|
Top Ten Web Hacking Techniques of 2008 What's possible, not probable - Jeremiah Grossman.pdf
|
3.0 MB
|
Toward a New Legal Framework for Cybersecurity - Deirdre K. Mulligan.pdf
|
147.8 KB
|
USENIX Security 2009 - Corrigendum.pdf
|
101.6 KB
|
USENIX Security 2009 - Cover.pdf
|
568.3 KB
|
USENIX Security 2009 - Interior.pdf
|
13.4 MB
|
USENIX Security 2009 Track - Attacks.pdf
|
3.3 MB
|
USENIX Security 2009 Track - Proceedings.tgz
|
11.8 MB
|
USENIX Security 2009 Track - Radio.pdf
|
2.1 MB
|
USENIX Security 2009 Track - Securing Web Apps.pdf
|
2.6 MB
|
Vanish Increasing Data Privacy with Self-Destructing Data - Roxana Geambasu, Tadayoshi Kohno, Amit A. Levy, Henry M. Levy.pdf
|
812.8 KB
|
Vanish Increasing Data Privacy with Self-Destructing Data Slides - Roxana Geambasu, Tadayoshi Kohno, Amit A. Levy, Henry M. Levy.pdf
|
3.7 MB
|
VPriv Protecting Privacy in Location-Based Vehicular Services - Raluca Ada Popa, Hari Balakrishnan, Andrew J. Blumberg.pdf
|
397.3 KB
|
VPriv Protecting Privacy in Location-Based Vehicular Services Slides - Raluca Ada Popa, Hari Balakrishnan, Andrew J. Blumberg.pdf
|
1.1 MB
|
xBook Redesigning Privacy Control in Social Networking Platforms - Kapil Singh, Sumeer Bhola, Wenke Lee.pdf
|
2.0 MB
|
xBook Redesigning Privacy Control in Social Networking Platforms Slides - Kapil Singh, Sumeer Bhola, Wenke Lee.pdf
|
1.9 MB
|
/.../USENIX Security 2009 Technical Sessions_files/
|
dot_clear.gif
|
0.0 KB
|
footer.gif
|
0.3 KB
|
left_bar.gif
|
0.1 KB
|
left_bottom.gif
|
0.5 KB
|
longbar.gif
|
0.1 KB
|
mp3_icon.gif
|
0.8 KB
|
questmark.gif
|
0.1 KB
|
sec09_banner.jpg
|
35.3 KB
|
sec09opening.jpg
|
143.8 KB
|
video_icon.gif
|
1.3 KB
|
/.../USENIX Security 2009 WiPs_files/
|
dot_clear.gif
|
0.0 KB
|
footer.gif
|
0.3 KB
|
left_bar.gif
|
0.1 KB
|
left_bottom.gif
|
0.5 KB
|
longbar.gif
|
0.1 KB
|
new_usenix.jpg
|
20.6 KB
|
questmark.gif
|
0.1 KB
|
sec09_banner.jpg
|
35.3 KB
|
/USENIX Security 2010/
|
Acoustic Side-Channel Attacks on Printers - backes.mp4
|
12.6 MB
|
Adapting Software Fault Isolation to Contemporary CPU Architectures - David Sehr, Robert Muth, Cliff Biffle, Victor Khimenko, Egor Pasko, Karl Schimpf, Bennet Yee, Brad Chen.mp4
|
13.8 MB
|
AdJail Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements - Mike Ter Louw, Karthik Thotta Ganesh, V.N. Venkatakrishnan.mp4
|
14.8 MB
|
An Analysis of Private Browsing Modes in Modern Browsers - Gaurav Aggarwal, Elie Bursztein, Collin Jackson, Dan Boneh.mp4
|
12.8 MB
|
Automatic Generation of Remediation Procedures for Malware Infections - Michael Backes, Markus Durmuth, Sebastian Gerling, Manfred Pinkal, Caroline Sporleder.mp4
|
10.6 MB
|
Baaz A System for Detecting Access Control Misconfigurations - Tathagata Das, Ranjita Bhagwan, Prasad Naldurg.mp4
|
17.0 MB
|
BotGrep Finding P2P Bots with Structured Graph Analysis - Shishir Nagaraja, Prateek Mittal, Chi-Yao Hong, Matthew Caesar, Nikita Borisov.mp4
|
14.9 MB
|
Building a Dynamic Reputation System for DNS - Manos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee, Nick Feamster.mp4
|
17.5 MB
|
Chipping Away at Censorship Firewalls with User-Generated Content - Sam Burnett, Nick Feamster, Santosh Vempala.mp4
|
13.6 MB
|
Cling A Memory Allocator to Mitigate Dangling Pointers - Periklis Akritidis.mp4
|
12.0 MB
|
Docile No More The Tussle to Redefine the Internet - James Lewis.mp4
|
44.2 MB
|
Fast Regular Expression Matching Using Small TCAMs for Network Intrusion Detection and Prevention Systems - Chad R. Meiners, Jignesh Patel, Eric Norige, Eric Torng, and Alex X. Liu.mp4
|
15.2 MB
|
Fighting Coercion Attacks in Key Generation using Skin Conductance - Payas Gupta, Debin Gao.mp4
|
15.3 MB
|
Grid, PhD Smart Grid, Cyber Security, and the Future of Keeping the Lights On - Kelly Ziegler.mp4
|
36.1 MB
|
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking - Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidiah R. Crandall.mp4
|
12.5 MB
|
Making Linux Protection Mechanisms Egalitarian with UserFS - Taesoo Kim, Nickolai Zeldovich.mp4
|
17.0 MB
|
Network Security in the Medium Term 2061-2561 AD - stross.mp4
|
33.5 MB
|
P4P Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users - Yitao Duan, NetEase Youdao, John Canny, Justin Zhan.mp4
|
13.8 MB
|
PrETP Privacy-Preserving Electronic Toll Pricing - Josep Balasch, Alfredo Rial, Carmela Troncoso, Bart Preneel, Ingrid Verbauwhede, Christophe Geuens.mp4
|
16.3 MB
|
Proving Voltaire Right Security Blunders Dumber Than Dog Snot - Roger G. Johnston.mp4
|
44.2 MB
|
Realization of RF Distance Bounding - Kasper Bonne Rasmussen, Srdjan Capkun.mp4
|
12.2 MB
|
Scantegrity II Municipal Election at Takoma Park The First E2E Binding Governmental Election with Ballot Privacy - Richard Carback, David Chaum, Jeremy Clark, John Conway, Aleksand.mp4
|
13.5 MB
|
Securing Script-Based Extensibility in Web Browsers - Vladan Djeric, Ashvin Goel.mp4
|
15.0 MB
|
Security and Privacy Vulnerabilities of In-Car Wireless Networks A Tire Pressure Monitoring System Case Study - Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis Taylor, Sangho Oh.mp4
|
16.6 MB
|
SEPIA Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics - Martin Burkhart, Mario Strasser, Dilip Many, Xenofontas Dimitropoulos.mp4
|
12.4 MB
|
Structuring Protocol Implementations to Protect Sensitive Data - Petr Marchenko, Brad Karp.mp4
|
12.7 MB
|
The Case for Ubiquitous Transport-Level Encryption - Andrea Bittau, Michael Hamburg, Mark Handley, David Mazieres, Dan Boneh.mp4
|
16.0 MB
|
The Evolution of the Flash Security Model - Peleus Uhley.mp4
|
44.2 MB
|
Toward an Open and Secure Platform for Using the Web - Will Drewry.mp4
|
36.1 MB
|
Toward Automated Detection of Logic Vulnerabilities in Web Applications - Viktoria Felmetsger, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna.mp4
|
13.6 MB
|
USENIX Security 2010 Poster Session.htm
|
14.1 KB
|
USENIX Security 2010 Proceedings Errata.epub
|
6.2 KB
|
USENIX Security 2010 Proceedings Errata.mobi
|
4.4 KB
|
USENIX Security 2010 Proceedings.epub
|
14.7 MB
|
USENIX Security 2010 Proceedings.mobi
|
14.9 MB
|
USENIX Security 2010 Technical Sessions.htm
|
83.7 KB
|
VEX Vetting Browser Extensions for Security Vulnerabilities - Sruthi Bandhakavi, Samuel T. King, P. Madhusudan, Marianne Winslett.mp4
|
14.2 MB
|
Vulnerable Compliance - Dan Geer.mp4
|
50.3 MB
|
Windows 7 Security from a UNIX Perspective - Crispin Cowan.mp4
|
36.6 MB
|
ZKPDL A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash - Sarah Meiklejohn, C. Chris Erway, Alptekin Kupcu, Theodora Hinkle, Anna Lysyanskaya.mp4
|
13.2 MB
|
/.../USENIX Security 2010 captions/
|
Acoustic Side-Channel Attacks on Printers - backes.eng.json
|
1.2 MB
|
Acoustic Side-Channel Attacks on Printers - backes.eng.lrc
|
33.5 KB
|
Acoustic Side-Channel Attacks on Printers - backes.eng.srt
|
31.1 KB
|
Acoustic Side-Channel Attacks on Printers - backes.eng.text
|
22.4 KB
|
Acoustic Side-Channel Attacks on Printers - backes.eng.tsv
|
28.6 KB
|
Acoustic Side-Channel Attacks on Printers - backes.eng.txt
|
34.0 KB
|
Acoustic Side-Channel Attacks on Printers - backes.eng.vtt
|
28.6 KB
|
Adapting Software Fault Isolation to Contemporary CPU Architectures - David Sehr, Robert Muth, Cliff Biffle, Victor Khimenko, Egor Pasko, Karl Schimpf, Bennet Yee, Brad Chen.eng.json
|
1.3 MB
|
Adapting Software Fault Isolation to Contemporary CPU Architectures - David Sehr, Robert Muth, Cliff Biffle, Victor Khimenko, Egor Pasko, Karl Schimpf, Bennet Yee, Brad Chen.eng.lrc
|
32.2 KB
|
Adapting Software Fault Isolation to Contemporary CPU Architectures - David Sehr, Robert Muth, Cliff Biffle, Victor Khimenko, Egor Pasko, Karl Schimpf, Bennet Yee, Brad Chen.eng.srt
|
33.0 KB
|
Adapting Software Fault Isolation to Contemporary CPU Architectures - David Sehr, Robert Muth, Cliff Biffle, Victor Khimenko, Egor Pasko, Karl Schimpf, Bennet Yee, Brad Chen.eng.text
|
25.3 KB
|
Adapting Software Fault Isolation to Contemporary CPU Architectures - David Sehr, Robert Muth, Cliff Biffle, Victor Khimenko, Egor Pasko, Karl Schimpf, Bennet Yee, Brad Chen.eng.tsv
|
29.2 KB
|
Adapting Software Fault Isolation to Contemporary CPU Architectures - David Sehr, Robert Muth, Cliff Biffle, Victor Khimenko, Egor Pasko, Karl Schimpf, Bennet Yee, Brad Chen.eng.txt
|
32.5 KB
|
Adapting Software Fault Isolation to Contemporary CPU Architectures - David Sehr, Robert Muth, Cliff Biffle, Victor Khimenko, Egor Pasko, Karl Schimpf, Bennet Yee, Brad Chen.eng.vtt
|
30.8 KB
|
AdJail Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements - Mike Ter Louw, Karthik Thotta Ganesh, V.N. Venkatakrishnan.eng.json
|
1.6 MB
|
AdJail Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements - Mike Ter Louw, Karthik Thotta Ganesh, V.N. Venkatakrishnan.eng.lrc
|
41.1 KB
|
AdJail Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements - Mike Ter Louw, Karthik Thotta Ganesh, V.N. Venkatakrishnan.eng.srt
|
42.2 KB
|
AdJail Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements - Mike Ter Louw, Karthik Thotta Ganesh, V.N. Venkatakrishnan.eng.text
|
31.6 KB
|
AdJail Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements - Mike Ter Louw, Karthik Thotta Ganesh, V.N. Venkatakrishnan.eng.tsv
|
37.0 KB
|
AdJail Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements - Mike Ter Louw, Karthik Thotta Ganesh, V.N. Venkatakrishnan.eng.txt
|
41.5 KB
|
AdJail Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements - Mike Ter Louw, Karthik Thotta Ganesh, V.N. Venkatakrishnan.eng.vtt
|
39.2 KB
|
An Analysis of Private Browsing Modes in Modern Browsers - Gaurav Aggarwal, Elie Bursztein, Collin Jackson, Dan Boneh.eng.json
|
1.4 MB
|
An Analysis of Private Browsing Modes in Modern Browsers - Gaurav Aggarwal, Elie Bursztein, Collin Jackson, Dan Boneh.eng.lrc
|
32.2 KB
|
An Analysis of Private Browsing Modes in Modern Browsers - Gaurav Aggarwal, Elie Bursztein, Collin Jackson, Dan Boneh.eng.srt
|
34.6 KB
|
An Analysis of Private Browsing Modes in Modern Browsers - Gaurav Aggarwal, Elie Bursztein, Collin Jackson, Dan Boneh.eng.text
|
25.1 KB
|
An Analysis of Private Browsing Modes in Modern Browsers - Gaurav Aggarwal, Elie Bursztein, Collin Jackson, Dan Boneh.eng.tsv
|
29.1 KB
|
An Analysis of Private Browsing Modes in Modern Browsers - Gaurav Aggarwal, Elie Bursztein, Collin Jackson, Dan Boneh.eng.txt
|
32.5 KB
|
An Analysis of Private Browsing Modes in Modern Browsers - Gaurav Aggarwal, Elie Bursztein, Collin Jackson, Dan Boneh.eng.vtt
|
32.0 KB
|
Automatic Generation of Remediation Procedures for Malware Infections - Michael Backes, Markus Durmuth, Sebastian Gerling, Manfred Pinkal, Caroline Sporleder.eng.json
|
908.9 KB
|
Automatic Generation of Remediation Procedures for Malware Infections - Michael Backes, Markus Durmuth, Sebastian Gerling, Manfred Pinkal, Caroline Sporleder.eng.lrc
|
25.4 KB
|
Automatic Generation of Remediation Procedures for Malware Infections - Michael Backes, Markus Durmuth, Sebastian Gerling, Manfred Pinkal, Caroline Sporleder.eng.srt
|
23.7 KB
|
Automatic Generation of Remediation Procedures for Malware Infections - Michael Backes, Markus Durmuth, Sebastian Gerling, Manfred Pinkal, Caroline Sporleder.eng.text
|
18.7 KB
|
Automatic Generation of Remediation Procedures for Malware Infections - Michael Backes, Markus Durmuth, Sebastian Gerling, Manfred Pinkal, Caroline Sporleder.eng.tsv
|
22.4 KB
|
Automatic Generation of Remediation Procedures for Malware Infections - Michael Backes, Markus Durmuth, Sebastian Gerling, Manfred Pinkal, Caroline Sporleder.eng.txt
|
25.7 KB
|
Automatic Generation of Remediation Procedures for Malware Infections - Michael Backes, Markus Durmuth, Sebastian Gerling, Manfred Pinkal, Caroline Sporleder.eng.vtt
|
22.3 KB
|
Baaz A System for Detecting Access Control Misconfigurations - Tathagata Das, Ranjita Bhagwan, Prasad Naldurg.eng.json
|
1.3 MB
|
Baaz A System for Detecting Access Control Misconfigurations - Tathagata Das, Ranjita Bhagwan, Prasad Naldurg.eng.lrc
|
33.8 KB
|
Baaz A System for Detecting Access Control Misconfigurations - Tathagata Das, Ranjita Bhagwan, Prasad Naldurg.eng.srt
|
35.5 KB
|
Baaz A System for Detecting Access Control Misconfigurations - Tathagata Das, Ranjita Bhagwan, Prasad Naldurg.eng.text
|
26.3 KB
|
Baaz A System for Detecting Access Control Misconfigurations - Tathagata Das, Ranjita Bhagwan, Prasad Naldurg.eng.tsv
|
30.5 KB
|
Baaz A System for Detecting Access Control Misconfigurations - Tathagata Das, Ranjita Bhagwan, Prasad Naldurg.eng.txt
|
34.1 KB
|
Baaz A System for Detecting Access Control Misconfigurations - Tathagata Das, Ranjita Bhagwan, Prasad Naldurg.eng.vtt
|
32.9 KB
|
BotGrep Finding P2P Bots with Structured Graph Analysis - Shishir Nagaraja, Prateek Mittal, Chi-Yao Hong, Matthew Caesar, Nikita Borisov.eng.json
|
1.4 MB
|
BotGrep Finding P2P Bots with Structured Graph Analysis - Shishir Nagaraja, Prateek Mittal, Chi-Yao Hong, Matthew Caesar, Nikita Borisov.eng.lrc
|
36.5 KB
|
BotGrep Finding P2P Bots with Structured Graph Analysis - Shishir Nagaraja, Prateek Mittal, Chi-Yao Hong, Matthew Caesar, Nikita Borisov.eng.srt
|
35.7 KB
|
BotGrep Finding P2P Bots with Structured Graph Analysis - Shishir Nagaraja, Prateek Mittal, Chi-Yao Hong, Matthew Caesar, Nikita Borisov.eng.text
|
26.6 KB
|
BotGrep Finding P2P Bots with Structured Graph Analysis - Shishir Nagaraja, Prateek Mittal, Chi-Yao Hong, Matthew Caesar, Nikita Borisov.eng.tsv
|
32.2 KB
|
BotGrep Finding P2P Bots with Structured Graph Analysis - Shishir Nagaraja, Prateek Mittal, Chi-Yao Hong, Matthew Caesar, Nikita Borisov.eng.txt
|
36.8 KB
|
BotGrep Finding P2P Bots with Structured Graph Analysis - Shishir Nagaraja, Prateek Mittal, Chi-Yao Hong, Matthew Caesar, Nikita Borisov.eng.vtt
|
33.1 KB
|
Building a Dynamic Reputation System for DNS - Manos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee, Nick Feamster.eng.json
|
1.3 MB
|
Building a Dynamic Reputation System for DNS - Manos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee, Nick Feamster.eng.lrc
|
34.6 KB
|
Building a Dynamic Reputation System for DNS - Manos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee, Nick Feamster.eng.srt
|
37.0 KB
|
Building a Dynamic Reputation System for DNS - Manos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee, Nick Feamster.eng.text
|
26.7 KB
|
Building a Dynamic Reputation System for DNS - Manos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee, Nick Feamster.eng.tsv
|
31.3 KB
|
Building a Dynamic Reputation System for DNS - Manos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee, Nick Feamster.eng.txt
|
34.9 KB
|
Building a Dynamic Reputation System for DNS - Manos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee, Nick Feamster.eng.vtt
|
34.1 KB
|
Chipping Away at Censorship Firewalls with User-Generated Content - Sam Burnett, Nick Feamster, Santosh Vempala.eng.json
|
1.5 MB
|
Chipping Away at Censorship Firewalls with User-Generated Content - Sam Burnett, Nick Feamster, Santosh Vempala.eng.lrc
|
37.2 KB
|
Chipping Away at Censorship Firewalls with User-Generated Content - Sam Burnett, Nick Feamster, Santosh Vempala.eng.srt
|
38.3 KB
|
Chipping Away at Censorship Firewalls with User-Generated Content - Sam Burnett, Nick Feamster, Santosh Vempala.eng.text
|
28.7 KB
|
Chipping Away at Censorship Firewalls with User-Generated Content - Sam Burnett, Nick Feamster, Santosh Vempala.eng.tsv
|
33.6 KB
|
Chipping Away at Censorship Firewalls with User-Generated Content - Sam Burnett, Nick Feamster, Santosh Vempala.eng.txt
|
37.6 KB
|
Chipping Away at Censorship Firewalls with User-Generated Content - Sam Burnett, Nick Feamster, Santosh Vempala.eng.vtt
|
35.6 KB
|
Cling A Memory Allocator to Mitigate Dangling Pointers - Periklis Akritidis.eng.json
|
1.3 MB
|
Cling A Memory Allocator to Mitigate Dangling Pointers - Periklis Akritidis.eng.lrc
|
33.2 KB
|
Cling A Memory Allocator to Mitigate Dangling Pointers - Periklis Akritidis.eng.srt
|
34.6 KB
|
Cling A Memory Allocator to Mitigate Dangling Pointers - Periklis Akritidis.eng.text
|
25.8 KB
|
Cling A Memory Allocator to Mitigate Dangling Pointers - Periklis Akritidis.eng.tsv
|
30.0 KB
|
Cling A Memory Allocator to Mitigate Dangling Pointers - Periklis Akritidis.eng.txt
|
33.5 KB
|
Cling A Memory Allocator to Mitigate Dangling Pointers - Periklis Akritidis.eng.vtt
|
32.1 KB
|
Docile No More The Tussle to Redefine the Internet - James Lewis.eng.json
|
3.4 MB
|
Docile No More The Tussle to Redefine the Internet - James Lewis.eng.lrc
|
87.0 KB
|
Docile No More The Tussle to Redefine the Internet - James Lewis.eng.srt
|
93.4 KB
|
Docile No More The Tussle to Redefine the Internet - James Lewis.eng.text
|
61.9 KB
|
Docile No More The Tussle to Redefine the Internet - James Lewis.eng.tsv
|
76.6 KB
|
Docile No More The Tussle to Redefine the Internet - James Lewis.eng.txt
|
87.9 KB
|
Docile No More The Tussle to Redefine the Internet - James Lewis.eng.vtt
|
84.6 KB
|
Fast Regular Expression Matching Using Small TCAMs for Network Intrusion Detection and Prevention Systems - Chad R. Meiners, Jignesh Patel, Eric Norige, Eric Torng, and Alex X. Liu.eng.json
|
1.6 MB
|
Fast Regular Expression Matching Using Small TCAMs for Network Intrusion Detection and Prevention Systems - Chad R. Meiners, Jignesh Patel, Eric Norige, Eric Torng, and Alex X. Liu.eng.lrc
|
45.1 KB
|
Fast Regular Expression Matching Using Small TCAMs for Network Intrusion Detection and Prevention Systems - Chad R. Meiners, Jignesh Patel, Eric Norige, Eric Torng, and Alex X. Liu.eng.srt
|
37.6 KB
|
Fast Regular Expression Matching Using Small TCAMs for Network Intrusion Detection and Prevention Systems - Chad R. Meiners, Jignesh Patel, Eric Norige, Eric Torng, and Alex X. Liu.eng.text
|
27.7 KB
|
Fast Regular Expression Matching Using Small TCAMs for Network Intrusion Detection and Prevention Systems - Chad R. Meiners, Jignesh Patel, Eric Norige, Eric Torng, and Alex X. Liu.eng.tsv
|
37.6 KB
|
Fast Regular Expression Matching Using Small TCAMs for Network Intrusion Detection and Prevention Systems - Chad R. Meiners, Jignesh Patel, Eric Norige, Eric Torng, and Alex X. Liu.eng.txt
|
45.7 KB
|
Fast Regular Expression Matching Using Small TCAMs for Network Intrusion Detection and Prevention Systems - Chad R. Meiners, Jignesh Patel, Eric Norige, Eric Torng, and Alex X. Liu.eng.vtt
|
34.7 KB
|
Fighting Coercion Attacks in Key Generation using Skin Conductance - Payas Gupta, Debin Gao.eng.json
|
1.5 MB
|
Fighting Coercion Attacks in Key Generation using Skin Conductance - Payas Gupta, Debin Gao.eng.lrc
|
38.1 KB
|
Fighting Coercion Attacks in Key Generation using Skin Conductance - Payas Gupta, Debin Gao.eng.srt
|
38.7 KB
|
Fighting Coercion Attacks in Key Generation using Skin Conductance - Payas Gupta, Debin Gao.eng.text
|
29.3 KB
|
Fighting Coercion Attacks in Key Generation using Skin Conductance - Payas Gupta, Debin Gao.eng.tsv
|
34.3 KB
|
Fighting Coercion Attacks in Key Generation using Skin Conductance - Payas Gupta, Debin Gao.eng.txt
|
38.4 KB
|
Fighting Coercion Attacks in Key Generation using Skin Conductance - Payas Gupta, Debin Gao.eng.vtt
|
36.0 KB
|
Grid, PhD Smart Grid, Cyber Security, and the Future of Keeping the Lights On - Kelly Ziegler.eng.json
|
3.4 MB
|
Grid, PhD Smart Grid, Cyber Security, and the Future of Keeping the Lights On - Kelly Ziegler.eng.lrc
|
86.4 KB
|
Grid, PhD Smart Grid, Cyber Security, and the Future of Keeping the Lights On - Kelly Ziegler.eng.srt
|
91.1 KB
|
Grid, PhD Smart Grid, Cyber Security, and the Future of Keeping the Lights On - Kelly Ziegler.eng.text
|
66.2 KB
|
Grid, PhD Smart Grid, Cyber Security, and the Future of Keeping the Lights On - Kelly Ziegler.eng.tsv
|
77.9 KB
|
Grid, PhD Smart Grid, Cyber Security, and the Future of Keeping the Lights On - Kelly Ziegler.eng.txt
|
87.2 KB
|
Grid, PhD Smart Grid, Cyber Security, and the Future of Keeping the Lights On - Kelly Ziegler.eng.vtt
|
84.6 KB
|
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking - Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidiah R. Crandall.eng.json
|
1.2 MB
|
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking - Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidiah R. Crandall.eng.lrc
|
28.8 KB
|
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking - Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidiah R. Crandall.eng.srt
|
31.0 KB
|
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking - Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidiah R. Crandall.eng.text
|
22.0 KB
|
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking - Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidiah R. Crandall.eng.tsv
|
25.9 KB
|
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking - Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidiah R. Crandall.eng.txt
|
29.0 KB
|
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking - Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidiah R. Crandall.eng.vtt
|
28.5 KB
|
Making Linux Protection Mechanisms Egalitarian with UserFS - Taesoo Kim, Nickolai Zeldovich.eng.json
|
1.5 MB
|
Making Linux Protection Mechanisms Egalitarian with UserFS - Taesoo Kim, Nickolai Zeldovich.eng.lrc
|
44.1 KB
|
Making Linux Protection Mechanisms Egalitarian with UserFS - Taesoo Kim, Nickolai Zeldovich.eng.srt
|
36.1 KB
|
Making Linux Protection Mechanisms Egalitarian with UserFS - Taesoo Kim, Nickolai Zeldovich.eng.text
|
26.3 KB
|
Making Linux Protection Mechanisms Egalitarian with UserFS - Taesoo Kim, Nickolai Zeldovich.eng.tsv
|
36.7 KB
|
Making Linux Protection Mechanisms Egalitarian with UserFS - Taesoo Kim, Nickolai Zeldovich.eng.txt
|
44.8 KB
|
Making Linux Protection Mechanisms Egalitarian with UserFS - Taesoo Kim, Nickolai Zeldovich.eng.vtt
|
33.2 KB
|
Network Security in the Medium Term 2061-2561 AD - stross.eng.json
|
2.6 MB
|
Network Security in the Medium Term 2061-2561 AD - stross.eng.lrc
|
68.0 KB
|
Network Security in the Medium Term 2061-2561 AD - stross.eng.srt
|
71.4 KB
|
Network Security in the Medium Term 2061-2561 AD - stross.eng.text
|
53.8 KB
|
Network Security in the Medium Term 2061-2561 AD - stross.eng.tsv
|
62.1 KB
|
Network Security in the Medium Term 2061-2561 AD - stross.eng.txt
|
68.5 KB
|
Network Security in the Medium Term 2061-2561 AD - stross.eng.vtt
|
66.3 KB
|
P4P Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users - Yitao Duan, NetEase Youdao, John Canny, Justin Zhan.eng.json
|
893.6 KB
|
P4P Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users - Yitao Duan, NetEase Youdao, John Canny, Justin Zhan.eng.lrc
|
24.2 KB
|
P4P Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users - Yitao Duan, NetEase Youdao, John Canny, Justin Zhan.eng.srt
|
26.3 KB
|
P4P Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users - Yitao Duan, NetEase Youdao, John Canny, Justin Zhan.eng.text
|
17.7 KB
|
P4P Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users - Yitao Duan, NetEase Youdao, John Canny, Justin Zhan.eng.tsv
|
21.4 KB
|
P4P Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users - Yitao Duan, NetEase Youdao, John Canny, Justin Zhan.eng.txt
|
24.4 KB
|
P4P Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users - Yitao Duan, NetEase Youdao, John Canny, Justin Zhan.eng.vtt
|
23.9 KB
|
PrETP Privacy-Preserving Electronic Toll Pricing - Josep Balasch, Alfredo Rial, Carmela Troncoso, Bart Preneel, Ingrid Verbauwhede, Christophe Geuens.eng.json
|
1.4 MB
|
PrETP Privacy-Preserving Electronic Toll Pricing - Josep Balasch, Alfredo Rial, Carmela Troncoso, Bart Preneel, Ingrid Verbauwhede, Christophe Geuens.eng.lrc
|
35.5 KB
|
PrETP Privacy-Preserving Electronic Toll Pricing - Josep Balasch, Alfredo Rial, Carmela Troncoso, Bart Preneel, Ingrid Verbauwhede, Christophe Geuens.eng.srt
|
35.3 KB
|
PrETP Privacy-Preserving Electronic Toll Pricing - Josep Balasch, Alfredo Rial, Carmela Troncoso, Bart Preneel, Ingrid Verbauwhede, Christophe Geuens.eng.text
|
27.8 KB
|
PrETP Privacy-Preserving Electronic Toll Pricing - Josep Balasch, Alfredo Rial, Carmela Troncoso, Bart Preneel, Ingrid Verbauwhede, Christophe Geuens.eng.tsv
|
32.2 KB
|
PrETP Privacy-Preserving Electronic Toll Pricing - Josep Balasch, Alfredo Rial, Carmela Troncoso, Bart Preneel, Ingrid Verbauwhede, Christophe Geuens.eng.txt
|
35.8 KB
|
PrETP Privacy-Preserving Electronic Toll Pricing - Josep Balasch, Alfredo Rial, Carmela Troncoso, Bart Preneel, Ingrid Verbauwhede, Christophe Geuens.eng.vtt
|
33.2 KB
|
Proving Voltaire Right Security Blunders Dumber Than Dog Snot - Roger G. Johnston.eng.json
|
4.4 MB
|
Proving Voltaire Right Security Blunders Dumber Than Dog Snot - Roger G. Johnston.eng.lrc
|
119.6 KB
|
Proving Voltaire Right Security Blunders Dumber Than Dog Snot - Roger G. Johnston.eng.srt
|
122.9 KB
|
Proving Voltaire Right Security Blunders Dumber Than Dog Snot - Roger G. Johnston.eng.text
|
85.0 KB
|
Proving Voltaire Right Security Blunders Dumber Than Dog Snot - Roger G. Johnston.eng.tsv
|
104.4 KB
|
Proving Voltaire Right Security Blunders Dumber Than Dog Snot - Roger G. Johnston.eng.txt
|
120.8 KB
|
Proving Voltaire Right Security Blunders Dumber Than Dog Snot - Roger G. Johnston.eng.vtt
|
113.7 KB
|
Realization of RF Distance Bounding - Kasper Bonne Rasmussen, Srdjan Capkun.eng.json
|
1.2 MB
|
Realization of RF Distance Bounding - Kasper Bonne Rasmussen, Srdjan Capkun.eng.lrc
|
29.6 KB
|
Realization of RF Distance Bounding - Kasper Bonne Rasmussen, Srdjan Capkun.eng.srt
|
31.3 KB
|
Realization of RF Distance Bounding - Kasper Bonne Rasmussen, Srdjan Capkun.eng.text
|
22.8 KB
|
Realization of RF Distance Bounding - Kasper Bonne Rasmussen, Srdjan Capkun.eng.tsv
|
26.6 KB
|
Realization of RF Distance Bounding - Kasper Bonne Rasmussen, Srdjan Capkun.eng.txt
|
29.8 KB
|
Realization of RF Distance Bounding - Kasper Bonne Rasmussen, Srdjan Capkun.eng.vtt
|
28.9 KB
|
Scantegrity II Municipal Election at Takoma Park The First E2E Binding Governmental Election with Ballot Privacy - Richard Carback, David Chaum, Jeremy Clark, John Conway, Aleksand.eng.json
|
1.4 MB
|
Scantegrity II Municipal Election at Takoma Park The First E2E Binding Governmental Election with Ballot Privacy - Richard Carback, David Chaum, Jeremy Clark, John Conway, Aleksand.eng.lrc
|
36.9 KB
|
Scantegrity II Municipal Election at Takoma Park The First E2E Binding Governmental Election with Ballot Privacy - Richard Carback, David Chaum, Jeremy Clark, John Conway, Aleksand.eng.srt
|
38.6 KB
|
Scantegrity II Municipal Election at Takoma Park The First E2E Binding Governmental Election with Ballot Privacy - Richard Carback, David Chaum, Jeremy Clark, John Conway, Aleksand.eng.text
|
26.3 KB
|
Scantegrity II Municipal Election at Takoma Park The First E2E Binding Governmental Election with Ballot Privacy - Richard Carback, David Chaum, Jeremy Clark, John Conway, Aleksand.eng.tsv
|
32.3 KB
|
Scantegrity II Municipal Election at Takoma Park The First E2E Binding Governmental Election with Ballot Privacy - Richard Carback, David Chaum, Jeremy Clark, John Conway, Aleksand.eng.txt
|
37.3 KB
|
Scantegrity II Municipal Election at Takoma Park The First E2E Binding Governmental Election with Ballot Privacy - Richard Carback, David Chaum, Jeremy Clark, John Conway, Aleksand.eng.vtt
|
35.1 KB
|
Securing Script-Based Extensibility in Web Browsers - Vladan Djeric, Ashvin Goel.eng.json
|
1.6 MB
|
Securing Script-Based Extensibility in Web Browsers - Vladan Djeric, Ashvin Goel.eng.lrc
|
48.2 KB
|
Securing Script-Based Extensibility in Web Browsers - Vladan Djeric, Ashvin Goel.eng.srt
|
37.9 KB
|
Securing Script-Based Extensibility in Web Browsers - Vladan Djeric, Ashvin Goel.eng.text
|
28.7 KB
|
Securing Script-Based Extensibility in Web Browsers - Vladan Djeric, Ashvin Goel.eng.tsv
|
39.9 KB
|
Securing Script-Based Extensibility in Web Browsers - Vladan Djeric, Ashvin Goel.eng.txt
|
49.0 KB
|
Securing Script-Based Extensibility in Web Browsers - Vladan Djeric, Ashvin Goel.eng.vtt
|
35.2 KB
|
Security and Privacy Vulnerabilities of In-Car Wireless Networks A Tire Pressure Monitoring System Case Study - Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis Taylor, Sangho Oh.eng.json
|
1.5 MB
|
Security and Privacy Vulnerabilities of In-Car Wireless Networks A Tire Pressure Monitoring System Case Study - Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis Taylor, Sangho Oh.eng.lrc
|
39.8 KB
|
Security and Privacy Vulnerabilities of In-Car Wireless Networks A Tire Pressure Monitoring System Case Study - Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis Taylor, Sangho Oh.eng.srt
|
38.9 KB
|
Security and Privacy Vulnerabilities of In-Car Wireless Networks A Tire Pressure Monitoring System Case Study - Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis Taylor, Sangho Oh.eng.text
|
26.8 KB
|
Security and Privacy Vulnerabilities of In-Car Wireless Networks A Tire Pressure Monitoring System Case Study - Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis Taylor, Sangho Oh.eng.tsv
|
34.3 KB
|
Security and Privacy Vulnerabilities of In-Car Wireless Networks A Tire Pressure Monitoring System Case Study - Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis Taylor, Sangho Oh.eng.txt
|
40.3 KB
|
Security and Privacy Vulnerabilities of In-Car Wireless Networks A Tire Pressure Monitoring System Case Study - Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis Taylor, Sangho Oh.eng.vtt
|
35.5 KB
|
SEPIA Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics - Martin Burkhart, Mario Strasser, Dilip Many, Xenofontas Dimitropoulos.eng.json
|
923.0 KB
|
SEPIA Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics - Martin Burkhart, Mario Strasser, Dilip Many, Xenofontas Dimitropoulos.eng.lrc
|
24.2 KB
|
SEPIA Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics - Martin Burkhart, Mario Strasser, Dilip Many, Xenofontas Dimitropoulos.eng.srt
|
25.4 KB
|
SEPIA Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics - Martin Burkhart, Mario Strasser, Dilip Many, Xenofontas Dimitropoulos.eng.text
|
18.8 KB
|
SEPIA Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics - Martin Burkhart, Mario Strasser, Dilip Many, Xenofontas Dimitropoulos.eng.tsv
|
21.8 KB
|
SEPIA Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics - Martin Burkhart, Mario Strasser, Dilip Many, Xenofontas Dimitropoulos.eng.txt
|
24.4 KB
|
SEPIA Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics - Martin Burkhart, Mario Strasser, Dilip Many, Xenofontas Dimitropoulos.eng.vtt
|
23.5 KB
|
Structuring Protocol Implementations to Protect Sensitive Data - Petr Marchenko, Brad Karp.eng.json
|
1.5 MB
|
Structuring Protocol Implementations to Protect Sensitive Data - Petr Marchenko, Brad Karp.eng.lrc
|
38.6 KB
|
Structuring Protocol Implementations to Protect Sensitive Data - Petr Marchenko, Brad Karp.eng.srt
|
42.0 KB
|
Structuring Protocol Implementations to Protect Sensitive Data - Petr Marchenko, Brad Karp.eng.text
|
28.9 KB
|
Structuring Protocol Implementations to Protect Sensitive Data - Petr Marchenko, Brad Karp.eng.tsv
|
34.4 KB
|
Structuring Protocol Implementations to Protect Sensitive Data - Petr Marchenko, Brad Karp.eng.txt
|
38.9 KB
|
Structuring Protocol Implementations to Protect Sensitive Data - Petr Marchenko, Brad Karp.eng.vtt
|
38.3 KB
|
The Case for Ubiquitous Transport-Level Encryption - Andrea Bittau, Michael Hamburg, Mark Handley, David Mazieres, Dan Boneh.eng.json
|
1.9 MB
|
The Case for Ubiquitous Transport-Level Encryption - Andrea Bittau, Michael Hamburg, Mark Handley, David Mazieres, Dan Boneh.eng.lrc
|
45.6 KB
|
The Case for Ubiquitous Transport-Level Encryption - Andrea Bittau, Michael Hamburg, Mark Handley, David Mazieres, Dan Boneh.eng.srt
|
50.5 KB
|
The Case for Ubiquitous Transport-Level Encryption - Andrea Bittau, Michael Hamburg, Mark Handley, David Mazieres, Dan Boneh.eng.text
|
34.8 KB
|
The Case for Ubiquitous Transport-Level Encryption - Andrea Bittau, Michael Hamburg, Mark Handley, David Mazieres, Dan Boneh.eng.tsv
|
41.0 KB
|
The Case for Ubiquitous Transport-Level Encryption - Andrea Bittau, Michael Hamburg, Mark Handley, David Mazieres, Dan Boneh.eng.txt
|
46.0 KB
|
The Case for Ubiquitous Transport-Level Encryption - Andrea Bittau, Michael Hamburg, Mark Handley, David Mazieres, Dan Boneh.eng.vtt
|
46.0 KB
|
The Evolution of the Flash Security Model - Peleus Uhley.eng.json
|
4.2 MB
|
The Evolution of the Flash Security Model - Peleus Uhley.eng.lrc
|
122.9 KB
|
The Evolution of the Flash Security Model - Peleus Uhley.eng.srt
|
108.1 KB
|
The Evolution of the Flash Security Model - Peleus Uhley.eng.text
|
76.7 KB
|
The Evolution of the Flash Security Model - Peleus Uhley.eng.tsv
|
102.7 KB
|
The Evolution of the Flash Security Model - Peleus Uhley.eng.txt
|
124.5 KB
|
The Evolution of the Flash Security Model - Peleus Uhley.eng.vtt
|
100.3 KB
|
Toward an Open and Secure Platform for Using the Web - Will Drewry.eng.json
|
4.1 MB
|
Toward an Open and Secure Platform for Using the Web - Will Drewry.eng.lrc
|
110.6 KB
|
Toward an Open and Secure Platform for Using the Web - Will Drewry.eng.srt
|
102.5 KB
|
Toward an Open and Secure Platform for Using the Web - Will Drewry.eng.text
|
72.6 KB
|
Toward an Open and Secure Platform for Using the Web - Will Drewry.eng.tsv
|
94.6 KB
|
Toward an Open and Secure Platform for Using the Web - Will Drewry.eng.txt
|
112.1 KB
|
Toward an Open and Secure Platform for Using the Web - Will Drewry.eng.vtt
|
94.2 KB
|
Toward Automated Detection of Logic Vulnerabilities in Web Applications - Viktoria Felmetsger, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna.eng.json
|
1.2 MB
|
Toward Automated Detection of Logic Vulnerabilities in Web Applications - Viktoria Felmetsger, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna.eng.lrc
|
31.9 KB
|
Toward Automated Detection of Logic Vulnerabilities in Web Applications - Viktoria Felmetsger, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna.eng.srt
|
32.4 KB
|
Toward Automated Detection of Logic Vulnerabilities in Web Applications - Viktoria Felmetsger, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna.eng.text
|
24.7 KB
|
Toward Automated Detection of Logic Vulnerabilities in Web Applications - Viktoria Felmetsger, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna.eng.tsv
|
28.8 KB
|
Toward Automated Detection of Logic Vulnerabilities in Web Applications - Viktoria Felmetsger, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna.eng.txt
|
32.1 KB
|
Toward Automated Detection of Logic Vulnerabilities in Web Applications - Viktoria Felmetsger, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna.eng.vtt
|
30.3 KB
|
VEX Vetting Browser Extensions for Security Vulnerabilities - Sruthi Bandhakavi, Samuel T. King, P. Madhusudan, Marianne Winslett.eng.json
|
1.2 MB
|
VEX Vetting Browser Extensions for Security Vulnerabilities - Sruthi Bandhakavi, Samuel T. King, P. Madhusudan, Marianne Winslett.eng.lrc
|
35.3 KB
|
VEX Vetting Browser Extensions for Security Vulnerabilities - Sruthi Bandhakavi, Samuel T. King, P. Madhusudan, Marianne Winslett.eng.srt
|
32.3 KB
|
VEX Vetting Browser Extensions for Security Vulnerabilities - Sruthi Bandhakavi, Samuel T. King, P. Madhusudan, Marianne Winslett.eng.text
|
23.5 KB
|
VEX Vetting Browser Extensions for Security Vulnerabilities - Sruthi Bandhakavi, Samuel T. King, P. Madhusudan, Marianne Winslett.eng.tsv
|
30.4 KB
|
VEX Vetting Browser Extensions for Security Vulnerabilities - Sruthi Bandhakavi, Samuel T. King, P. Madhusudan, Marianne Winslett.eng.txt
|
35.8 KB
|
VEX Vetting Browser Extensions for Security Vulnerabilities - Sruthi Bandhakavi, Samuel T. King, P. Madhusudan, Marianne Winslett.eng.vtt
|
29.8 KB
|
Vulnerable Compliance - Dan Geer.eng.json
|
4.1 MB
|
Vulnerable Compliance - Dan Geer.eng.lrc
|
106.0 KB
|
Vulnerable Compliance - Dan Geer.eng.srt
|
108.6 KB
|
Vulnerable Compliance - Dan Geer.eng.text
|
80.4 KB
|
Vulnerable Compliance - Dan Geer.eng.tsv
|
94.6 KB
|
Vulnerable Compliance - Dan Geer.eng.txt
|
107.0 KB
|
Vulnerable Compliance - Dan Geer.eng.vtt
|
102.0 KB
|
Windows 7 Security from a UNIX Perspective - Crispin Cowan.eng.json
|
3.0 MB
|
Windows 7 Security from a UNIX Perspective - Crispin Cowan.eng.lrc
|
91.9 KB
|
Windows 7 Security from a UNIX Perspective - Crispin Cowan.eng.srt
|
75.3 KB
|
Windows 7 Security from a UNIX Perspective - Crispin Cowan.eng.text
|
47.9 KB
|
Windows 7 Security from a UNIX Perspective - Crispin Cowan.eng.tsv
|
73.2 KB
|
Windows 7 Security from a UNIX Perspective - Crispin Cowan.eng.txt
|
93.5 KB
|
Windows 7 Security from a UNIX Perspective - Crispin Cowan.eng.vtt
|
68.0 KB
|
ZKPDL A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash - Sarah Meiklejohn, C. Chris Erway, Alptekin Kupcu, Theodora Hinkle, Anna Lysyanskaya.eng.json
|
1.5 MB
|
ZKPDL A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash - Sarah Meiklejohn, C. Chris Erway, Alptekin Kupcu, Theodora Hinkle, Anna Lysyanskaya.eng.lrc
|
36.2 KB
|
ZKPDL A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash - Sarah Meiklejohn, C. Chris Erway, Alptekin Kupcu, Theodora Hinkle, Anna Lysyanskaya.eng.srt
|
39.4 KB
|
ZKPDL A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash - Sarah Meiklejohn, C. Chris Erway, Alptekin Kupcu, Theodora Hinkle, Anna Lysyanskaya.eng.text
|
28.4 KB
|
ZKPDL A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash - Sarah Meiklejohn, C. Chris Erway, Alptekin Kupcu, Theodora Hinkle, Anna Lysyanskaya.eng.tsv
|
32.8 KB
|
ZKPDL A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash - Sarah Meiklejohn, C. Chris Erway, Alptekin Kupcu, Theodora Hinkle, Anna Lysyanskaya.eng.txt
|
36.5 KB
|
ZKPDL A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash - Sarah Meiklejohn, C. Chris Erway, Alptekin Kupcu, Theodora Hinkle, Anna Lysyanskaya.eng.vtt
|
36.3 KB
|
/.../USENIX Security 2010 Poster Session_files/
|
dot_clear.gif
|
0.0 KB
|
dot_clear_002.gif
|
0.0 KB
|
footer.gif
|
0.3 KB
|
left_bar.gif
|
0.1 KB
|
left_bottom.gif
|
0.5 KB
|
longbar.gif
|
0.1 KB
|
new_usenix.jpg
|
20.6 KB
|
questmark.gif
|
0.1 KB
|
sec10_banner.jpg
|
30.8 KB
|
/.../USENIX Security 2010 Presentations/
|
Acoustic Side-Channel Attacks on Printers - Michael Backes, Markus Durmuth, Sebastian Gerling, Manfred Pinkal, Caroline Sporleder.pdf
|
847.2 KB
|
Adapting Software Fault Isolation to Contemporary CPU Architectures - David Sehr, Robert Muth, Cliff Biffle, Victor Khimenko, Egor Pasko, Karl Schimpf, Bennet Yee.pdf
|
145.9 KB
|
AdJail Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements - Mike Ter Louw, Karthik Thotta Ganesh, V.N. Venkatakrishnan.pdf
|
809.9 KB
|
An Analysis of Private Browsing Modes in Modern Browsers - Gaurav Aggarwal, Elie Bursztein, Collin Jackson, Dan Boneh.pdf
|
611.6 KB
|
Automatic Generation of Remediation Procedures for Malware Infections - Paleari.pdf
|
248.2 KB
|
Baaz A System for Detecting Access Control Misconfigurations - Tathagata Das, Ranjita Bhagwan, Prasad Naldurg.pdf
|
303.6 KB
|
BotGrep Finding P2P Bots with Structured Graph Analysis - Shishir Nagaraja, Prateek Mittal, Chi-Yao Hong, Matthew Caesar, Nikita Borisov.pdf
|
296.0 KB
|
Building a Dynamic Reputation System for DNS - Manos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee, Nick Feamster.pdf
|
1.4 MB
|
Capsicum Practical Capabilities for UNIX - Robert N.M. Watson, Jonathan Anderson, Ben Laurie, Kris Kennaway.pdf
|
334.0 KB
|
Chipping Away at Censorship Firewalls with User-Generated Content - Sam Burnett, Nick Feamster, Santosh Vempala.pdf
|
474.8 KB
|
Chipping Away at Censorship Firewalls with User-Generated Content Slides - Sam Burnett, Nick Feamster, Santosh Vempala.pdf
|
868.3 KB
|
Cling A Memory Allocator to Mitigate Dangling Pointers - Periklis Akritidis.pdf
|
454.9 KB
|
End-to-End Arguments The Internet and Beyond - David P. Reed.pdf
|
140.2 KB
|
Fast Regular Expression Matching Using Small TCAMs for Network Intrusion Detection and Prevention Systems - Chad R. Meiners, Jignesh Patel, Eric Norige, Eric Torng.pdf
|
381.8 KB
|
Fighting Coercion Attacks in Key Generation using Skin Conductance - Payas Gupta, Debin Gao.pdf
|
1.2 MB
|
Grid, PhD Smart Grid, Cyber Security, and the Future of Keeping the Lights On - Kelly Ziegler.pdf
|
3.8 MB
|
How Cyber Attacks Will Be Used in International Conflicts - Scott Borg.pdf
|
7.1 MB
|
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking - Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidiah R. Cranda.pdf
|
901.0 KB
|
Making Linux Protection Mechanisms Egalitarian with UserFS - Taesoo Kim, Nickolai Zeldovich.pdf
|
285.1 KB
|
PrETP Privacy-Preserving Electronic Toll Pricing - Josep Balasch, Alfredo Rial, Carmela Troncoso, Bart Preneel, Ingrid Verbauwhede, Christophe Geuens.pdf
|
430.1 KB
|
Realization of RF Distance Bounding - Kasper Bonne Rasmussen, Srdjan Capkun.pdf
|
958.0 KB
|
Scantegrity II Municipal Election at Takoma Park The First E2E Binding Governmental Election with Ballot Privacy - Richard Carback, David Chaum, Jeremy Clark, John.pdf
|
492.2 KB
|
Searching the Searchers with SearchAudit - John P. John, Fang Yu, Yinglian Xie, Martin Abadi, Arvind Krishnamurthy.pdf
|
711.2 KB
|
Securing Script-Based Extensibility in Web Browsers - Vladan Djeric, Ashvin Goel.pdf
|
145.3 KB
|
Security and Privacy Vulnerabilities of In-Car Wireless Networks A Tire Pressure Monitoring System Case Study - Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis Tay.pdf
|
1.3 MB
|
SEPIA Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics - Martin Burkhart, Mario Strasser, Dilip Many, Xenofontas Dimitropoulos.pdf
|
513.0 KB
|
Staying Safe on the Web Yesterday, Today, and Tomorrow - Sid Stamm.pdf
|
3.1 MB
|
Structuring Protocol Implementations to Protect Sensitive Data - Petr Marchenko, Brad Karp.pdf
|
234.5 KB
|
The Case for Ubiquitous Transport-Level Encryption - Andrea Bittau, Michael Hamburg, Mark Handley, David Mazieres, Dan Boneh.pdf
|
208.2 KB
|
Toward an Open and Secure Platform for Using the Web - Will Drewry.html
|
51.2 KB
|
Toward Automated Detection of Logic Vulnerabilities in Web Applications - Viktoria Felmetsger, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna.pdf
|
252.8 KB
|
Understanding CAPTCHA-Solving Services in an Economic Context - Marti Motoyama, Kirill Levchenko, Chris Kanich, Damon McCoy, Geoffrey M. Voelker, Stefan Savage.pdf
|
1.7 MB
|
USENIX Security 2010 Errata.pdf
|
97.9 KB
|
USENIX Security 2010 Proceedings.pdf
|
20.8 MB
|
VEX Vetting Browser Extensions for Security Vulnerabilities - Sruthi Bandhakavi, Samuel T. King, P. Madhusudan, Marianne Winslett.pdf
|
456.1 KB
|
Vulnerable Compliance - Dan Geer.pdf
|
710.6 KB
|
ZKPDL A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash - Sarah Meiklejohn, C. Chris Erway, Alptekin Kupcu, Theodora Hinkle, Anna Lysy.pdf
|
694.5 KB
|
/.../USENIX Security 2010 Technical Sessions_files/
|
dot_clear.gif
|
0.0 KB
|
dot_clear_002.gif
|
0.0 KB
|
footer.gif
|
0.3 KB
|
johnston_roger200x170.jpg
|
14.7 KB
|
left_bar.gif
|
0.1 KB
|
left_bottom.gif
|
0.5 KB
|
longbar.gif
|
0.1 KB
|
mp3_icon.gif
|
0.8 KB
|
questmark.gif
|
0.1 KB
|
sec09opening.jpg
|
143.8 KB
|
sec10_banner.jpg
|
30.8 KB
|
video_icon.gif
|
1.3 KB
|
/USENIX Security 2011/
|
A Study of Android Application Security - William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri.mp4
|
12.7 MB
|
ADsafety Type-Based Verification of JavaScript Sandboxing - Joe Gibbs Politz, Spiridon Aristides Eliopoulos, Arjun Guha, Shriram Krishnamurthi.mp4
|
14.9 MB
|
BOTMAGNIFIER Locating Spambots on the Internet - Gianluca Stringhini, Thorsten Holz, Brett Stone-Gross, Christopher Kruegel, Giovanni Vigna.mp4
|
12.9 MB
|
Bubble Trouble Off-Line De-Anonymization of Bubble Forms - Joseph A. Calandrino, William Clarkson, Edward W. Felten.mp4
|
14.4 MB
|
Cloaking Malware with the Trusted Platform Module - Alan M. Dunn, Owen S. Hofmann, Brent Waters, Emmett Witchel.mp4
|
12.6 MB
|
Comprehensive Experimental Analyses of Automotive Attack Surfaces - Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl.mp4
|
15.9 MB
|
Crossing the Chasm Pitching Security Research to Mainstream Browser Vendors - Collin Jackson.mp4
|
41.3 MB
|
Dark Clouds on the Horizon Using Cloud Storage as Attack Vector and Online Slack Space - Martin Mulazzani, Sebastian Schrittwieser, Manuel Leithner, Markus Huber, Edgar Weippl.mp4
|
12.9 MB
|
Deport on Arrival Adventures in Technology, Politics, and Power - J. Alex Halderman.mp4
|
48.4 MB
|
deSEO Combating Search-Result Poisoning - John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy, Martin Abadi.mp4
|
12.4 MB
|
Detecting Malware Domains at the Upper DNS Hierarchy - Manos Antonakakis, Roberto Perdisci, Wenke Lee, Nikolaos Vasiloglou II, David Dagon.mp4
|
12.5 MB
|
Differential Privacy Under Fire - Andreas Haeberlen, Benjamin C. Pierce, Arjun Narayan.mp4
|
13.8 MB
|
Dirty Jobs The Role of Freelance Labor in Web Service Abuse - Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker.mp4
|
11.9 MB
|
Fast and Precise Sanitizer Analysis with BEK - Pieter Hooimeijer, Benjamin Livshits, David Molnar, Prateek Saxena, Margus Veanes.mp4
|
12.7 MB
|
Faster Secure Two-Party Computation Using Garbled Circuits - Yan Huang, David Evans, Jonathan Katz.mp4
|
11.2 MB
|
Forensic Triage for Mobile Phones with DEC0DE - Robert J. Walls, Erik Learned-Miller, Brian Neil Levine.mp4
|
13.8 MB
|
I'm from the Government and I'm Here to Help - Perspectives from a Privacy Tech Wonk - Tara Whalen.mp4
|
39.2 MB
|
JACKSTRAWS Picking Command and Control Connections from Bot Traffic - Gregoire Jacob, Ralf Hund, Christopher Kruegel.mp4
|
14.6 MB
|
MACE Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery - Chia Yuan Cho, Domagoj Babic, Pongsin Poosankam, Kevin Zhijie Chen, Edward XueJun Wu.mp4
|
11.7 MB
|
mCarve Carving Attributed Dump Sets - Ton van Deursen, Sjouke Mauw, and Sasa Radomirovic.mp4
|
12.3 MB
|
Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade - Nektarios Leontiadis, Tyler Moore, Nicolas Christin.mp4
|
15.2 MB
|
Measuring Pay-per-Install The Commoditization of Malware Distribution - Juan Caballero, Chris Grier, Christian Kreibich, Vern Paxson.mp4
|
15.2 MB
|
Network Security in the Medium Term 2061-2561 AD - Charles Stross.mp4
|
33.5 MB
|
Opening Remarks, Awards, and Keynote Address - David Wagner.mp4
|
4.3 MB
|
Outsourcing the Decryption of ABE Ciphertexts - Matthew Green, Susan Hohenberger, Brent Waters.mp4
|
10.1 MB
|
Permission Re-Delegation Attacks and Defenses - Adrienne Porter Felt, Helen J. Wang, Alexander Moshchuk, Steve Hanna, Erika Chin.mp4
|
12.2 MB
|
Pico No More Passwords - Frank Stajano.mp4
|
46.9 MB
|
PIR-Tor Scalable Anonymous Communication Using Private Information Retrieval - Prateek Mittal, Femi Olumofin, Carmela Troncoso, Nikita Borisov, Ian Goldberg.mp4
|
11.9 MB
|
Privacy in the Age of Augmented Reality - Alessandro Acquisti.mp4
|
45.6 MB
|
Q Exploit Hardening Made Easy - Edward J. Schwartz, Thanassis Avgerinos, David Brumley.mp4
|
13.7 MB
|
QUIRE Lightweight Provenance for Smart Phone Operating Systems - Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anhei Shu, Dan S. Wallach.mp4
|
11.4 MB
|
Secure In-Band Wireless Pairing - Shyamnath Gollakota, Nabeel Ahmed, Nickolai Zeldovich, Dina Katabi.mp4
|
12.9 MB
|
SHELLOS Enabling Fast Detection and Forensic Analysis of Code Injection Attacks - Kevin Z. Snow, Srinivas Krishnan, Fabian Monrose, Niels Provos.mp4
|
11.8 MB
|
Show Me the Money Characterizing Spam-advertised Revenue - Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorso, Christian Kreibich, Kirill Levchenko, Vern Paxson, Geoffrey.mp4
|
15.7 MB
|
SMS of Death From Analyzing to Attacking Mobile Phones on a Large Scale - Collin Mulliner, Nico Golde, Jean-Pierre Seifert.mp4
|
15.2 MB
|
SSLTLS Certificates Threat or Menace - Eric Rescorla, Adam Langley, Brian Smith, Stephen Schultze, Steve Kent.mp4
|
33.8 MB
|
Telex Anticensorship in the Network Infrastructure - Eric Wustrow, Scott Wolchok, Ian Goldberg, J. Alex Halderman.mp4
|
11.8 MB
|
The Cloud-y Future of Security Technologies - Adam O'Donnell.mp4
|
20.3 MB
|
The Phantom Tollbooth Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion - Sarah Meiklejohn, Keaton Mowery, Stephen Checkoway, Hovav Shacham.mp4
|
14.2 MB
|
The Three Cyber-War Fallacies - Dave Aitel.mp4
|
43.3 MB
|
Toward Secure Embedded Web Interfaces - Baptiste Gourdin, Chinmay Soman, Hristo Bojinov, Elie Bursztein.mp4
|
12.1 MB
|
TRESOR Runs Encryption Securely Outside RAM - Tilo Müller, Felix C. Freiling, Andreas Dewald.mp4
|
15.3 MB
|
USENIX Security 2011 Poster Session.htm
|
14.7 KB
|
USENIX Security 2011 Proceedings Eratta.epub
|
3.8 KB
|
USENIX Security 2011 Proceedings Errata.mobi
|
4.2 KB
|
USENIX Security 2011 Proceedings Errata.pdf
|
79.3 KB
|
USENIX Security 2011 Proceedings.epub
|
19.0 MB
|
USENIX Security 2011 Proceedings.mobi
|
15.2 MB
|
USENIX Security 2011 Proceedings.pdf
|
22.6 MB
|
Why (Special Agent) Johnny (Still) Can't Encrypt A Security Analysis of the APCO Project 25 Two-Way Radio System - Sandy Clark, Travis Goodspeed, Perry Metzger, Zachary Wasserman.mp4
|
15.4 MB
|
ZOZZLE Fast and Precise In-Browser JavaScript Malware Detection - Charlie Curtsinger, Benjamin Livshits, Benjamin Zorn, Christian Seifert.mp4
|
19.9 MB
|
/.../USENIX Security 2011 captions/
|
A Study of Android Application Security - William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri.eng.json
|
1.3 MB
|
A Study of Android Application Security - William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri.eng.lrc
|
38.7 KB
|
A Study of Android Application Security - William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri.eng.srt
|
34.3 KB
|
A Study of Android Application Security - William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri.eng.text
|
23.9 KB
|
A Study of Android Application Security - William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri.eng.tsv
|
32.0 KB
|
A Study of Android Application Security - William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri.eng.txt
|
39.3 KB
|
A Study of Android Application Security - William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri.eng.vtt
|
31.3 KB
|
ADsafety Type-Based Verification of JavaScript Sandboxing - Joe Gibbs Politz, Spiridon Aristides Eliopoulos, Arjun Guha, Shriram Krishnamurthi.eng.json
|
1.7 MB
|
ADsafety Type-Based Verification of JavaScript Sandboxing - Joe Gibbs Politz, Spiridon Aristides Eliopoulos, Arjun Guha, Shriram Krishnamurthi.eng.lrc
|
48.8 KB
|
ADsafety Type-Based Verification of JavaScript Sandboxing - Joe Gibbs Politz, Spiridon Aristides Eliopoulos, Arjun Guha, Shriram Krishnamurthi.eng.srt
|
40.0 KB
|
ADsafety Type-Based Verification of JavaScript Sandboxing - Joe Gibbs Politz, Spiridon Aristides Eliopoulos, Arjun Guha, Shriram Krishnamurthi.eng.text
|
27.9 KB
|
ADsafety Type-Based Verification of JavaScript Sandboxing - Joe Gibbs Politz, Spiridon Aristides Eliopoulos, Arjun Guha, Shriram Krishnamurthi.eng.tsv
|
39.8 KB
|
ADsafety Type-Based Verification of JavaScript Sandboxing - Joe Gibbs Politz, Spiridon Aristides Eliopoulos, Arjun Guha, Shriram Krishnamurthi.eng.txt
|
49.6 KB
|
ADsafety Type-Based Verification of JavaScript Sandboxing - Joe Gibbs Politz, Spiridon Aristides Eliopoulos, Arjun Guha, Shriram Krishnamurthi.eng.vtt
|
36.5 KB
|
BOTMAGNIFIER Locating Spambots on the Internet - Gianluca Stringhini, Thorsten Holz, Brett Stone-Gross, Christopher Kruegel, Giovanni Vigna.eng.json
|
1.3 MB
|
BOTMAGNIFIER Locating Spambots on the Internet - Gianluca Stringhini, Thorsten Holz, Brett Stone-Gross, Christopher Kruegel, Giovanni Vigna.eng.lrc
|
29.7 KB
|
BOTMAGNIFIER Locating Spambots on the Internet - Gianluca Stringhini, Thorsten Holz, Brett Stone-Gross, Christopher Kruegel, Giovanni Vigna.eng.srt
|
32.4 KB
|
BOTMAGNIFIER Locating Spambots on the Internet - Gianluca Stringhini, Thorsten Holz, Brett Stone-Gross, Christopher Kruegel, Giovanni Vigna.eng.text
|
23.2 KB
|
BOTMAGNIFIER Locating Spambots on the Internet - Gianluca Stringhini, Thorsten Holz, Brett Stone-Gross, Christopher Kruegel, Giovanni Vigna.eng.tsv
|
26.9 KB
|
BOTMAGNIFIER Locating Spambots on the Internet - Gianluca Stringhini, Thorsten Holz, Brett Stone-Gross, Christopher Kruegel, Giovanni Vigna.eng.txt
|
30.0 KB
|
BOTMAGNIFIER Locating Spambots on the Internet - Gianluca Stringhini, Thorsten Holz, Brett Stone-Gross, Christopher Kruegel, Giovanni Vigna.eng.vtt
|
29.8 KB
|
Bubble Trouble Off-Line De-Anonymization of Bubble Forms - Joseph A. Calandrino, William Clarkson, Edward W. Felten.eng.json
|
1.6 MB
|
Bubble Trouble Off-Line De-Anonymization of Bubble Forms - Joseph A. Calandrino, William Clarkson, Edward W. Felten.eng.lrc
|
44.9 KB
|
Bubble Trouble Off-Line De-Anonymization of Bubble Forms - Joseph A. Calandrino, William Clarkson, Edward W. Felten.eng.srt
|
40.5 KB
|
Bubble Trouble Off-Line De-Anonymization of Bubble Forms - Joseph A. Calandrino, William Clarkson, Edward W. Felten.eng.text
|
29.5 KB
|
Bubble Trouble Off-Line De-Anonymization of Bubble Forms - Joseph A. Calandrino, William Clarkson, Edward W. Felten.eng.tsv
|
38.3 KB
|
Bubble Trouble Off-Line De-Anonymization of Bubble Forms - Joseph A. Calandrino, William Clarkson, Edward W. Felten.eng.txt
|
45.5 KB
|
Bubble Trouble Off-Line De-Anonymization of Bubble Forms - Joseph A. Calandrino, William Clarkson, Edward W. Felten.eng.vtt
|
37.3 KB
|
Cloaking Malware with the Trusted Platform Module - Alan M. Dunn, Owen S. Hofmann, Brent Waters, Emmett Witchel.eng.json
|
1.5 MB
|
Cloaking Malware with the Trusted Platform Module - Alan M. Dunn, Owen S. Hofmann, Brent Waters, Emmett Witchel.eng.lrc
|
41.3 KB
|
Cloaking Malware with the Trusted Platform Module - Alan M. Dunn, Owen S. Hofmann, Brent Waters, Emmett Witchel.eng.srt
|
38.5 KB
|
Cloaking Malware with the Trusted Platform Module - Alan M. Dunn, Owen S. Hofmann, Brent Waters, Emmett Witchel.eng.text
|
28.6 KB
|
Cloaking Malware with the Trusted Platform Module - Alan M. Dunn, Owen S. Hofmann, Brent Waters, Emmett Witchel.eng.tsv
|
35.9 KB
|
Cloaking Malware with the Trusted Platform Module - Alan M. Dunn, Owen S. Hofmann, Brent Waters, Emmett Witchel.eng.txt
|
41.8 KB
|
Cloaking Malware with the Trusted Platform Module - Alan M. Dunn, Owen S. Hofmann, Brent Waters, Emmett Witchel.eng.vtt
|
35.7 KB
|
Comprehensive Experimental Analyses of Automotive Attack Surfaces - Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl.eng.json
|
1.3 MB
|
Comprehensive Experimental Analyses of Automotive Attack Surfaces - Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl.eng.lrc
|
33.0 KB
|
Comprehensive Experimental Analyses of Automotive Attack Surfaces - Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl.eng.srt
|
35.5 KB
|
Comprehensive Experimental Analyses of Automotive Attack Surfaces - Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl.eng.text
|
25.4 KB
|
Comprehensive Experimental Analyses of Automotive Attack Surfaces - Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl.eng.tsv
|
29.7 KB
|
Comprehensive Experimental Analyses of Automotive Attack Surfaces - Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl.eng.txt
|
33.3 KB
|
Comprehensive Experimental Analyses of Automotive Attack Surfaces - Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl.eng.vtt
|
32.6 KB
|
Crossing the Chasm Pitching Security Research to Mainstream Browser Vendors - Collin Jackson.eng.json
|
4.5 MB
|
Crossing the Chasm Pitching Security Research to Mainstream Browser Vendors - Collin Jackson.eng.lrc
|
116.4 KB
|
Crossing the Chasm Pitching Security Research to Mainstream Browser Vendors - Collin Jackson.eng.srt
|
117.7 KB
|
Crossing the Chasm Pitching Security Research to Mainstream Browser Vendors - Collin Jackson.eng.text
|
88.2 KB
|
Crossing the Chasm Pitching Security Research to Mainstream Browser Vendors - Collin Jackson.eng.tsv
|
104.0 KB
|
Crossing the Chasm Pitching Security Research to Mainstream Browser Vendors - Collin Jackson.eng.txt
|
117.5 KB
|
Crossing the Chasm Pitching Security Research to Mainstream Browser Vendors - Collin Jackson.eng.vtt
|
110.9 KB
|
Dark Clouds on the Horizon Using Cloud Storage as Attack Vector and Online Slack Space - Martin Mulazzani, Sebastian Schrittwieser, Manuel Leithner, Markus Huber, Edgar Weippl.eng.json
|
1.1 MB
|
Dark Clouds on the Horizon Using Cloud Storage as Attack Vector and Online Slack Space - Martin Mulazzani, Sebastian Schrittwieser, Manuel Leithner, Markus Huber, Edgar Weippl.eng.lrc
|
30.7 KB
|
Dark Clouds on the Horizon Using Cloud Storage as Attack Vector and Online Slack Space - Martin Mulazzani, Sebastian Schrittwieser, Manuel Leithner, Markus Huber, Edgar Weippl.eng.srt
|
26.6 KB
|
Dark Clouds on the Horizon Using Cloud Storage as Attack Vector and Online Slack Space - Martin Mulazzani, Sebastian Schrittwieser, Manuel Leithner, Markus Huber, Edgar Weippl.eng.text
|
18.8 KB
|
Dark Clouds on the Horizon Using Cloud Storage as Attack Vector and Online Slack Space - Martin Mulazzani, Sebastian Schrittwieser, Manuel Leithner, Markus Huber, Edgar Weippl.eng.tsv
|
25.4 KB
|
Dark Clouds on the Horizon Using Cloud Storage as Attack Vector and Online Slack Space - Martin Mulazzani, Sebastian Schrittwieser, Manuel Leithner, Markus Huber, Edgar Weippl.eng.txt
|
31.1 KB
|
Dark Clouds on the Horizon Using Cloud Storage as Attack Vector and Online Slack Space - Martin Mulazzani, Sebastian Schrittwieser, Manuel Leithner, Markus Huber, Edgar Weippl.eng.vtt
|
24.3 KB
|
Deport on Arrival Adventures in Technology, Politics, and Power - J. Alex Halderman.eng.json
|
4.2 MB
|
Deport on Arrival Adventures in Technology, Politics, and Power - J. Alex Halderman.eng.lrc
|
119.2 KB
|
Deport on Arrival Adventures in Technology, Politics, and Power - J. Alex Halderman.eng.srt
|
102.9 KB
|
Deport on Arrival Adventures in Technology, Politics, and Power - J. Alex Halderman.eng.text
|
75.8 KB
|
Deport on Arrival Adventures in Technology, Politics, and Power - J. Alex Halderman.eng.tsv
|
99.7 KB
|
Deport on Arrival Adventures in Technology, Politics, and Power - J. Alex Halderman.eng.txt
|
120.7 KB
|
Deport on Arrival Adventures in Technology, Politics, and Power - J. Alex Halderman.eng.vtt
|
97.2 KB
|
deSEO Combating Search-Result Poisoning - John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy, Martin Abadi.eng.json
|
1.4 MB
|
deSEO Combating Search-Result Poisoning - John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy, Martin Abadi.eng.lrc
|
37.6 KB
|
deSEO Combating Search-Result Poisoning - John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy, Martin Abadi.eng.srt
|
35.2 KB
|
deSEO Combating Search-Result Poisoning - John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy, Martin Abadi.eng.text
|
24.2 KB
|
deSEO Combating Search-Result Poisoning - John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy, Martin Abadi.eng.tsv
|
31.8 KB
|
deSEO Combating Search-Result Poisoning - John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy, Martin Abadi.eng.txt
|
38.2 KB
|
deSEO Combating Search-Result Poisoning - John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy, Martin Abadi.eng.vtt
|
32.0 KB
|
Detecting Malware Domains at the Upper DNS Hierarchy - Manos Antonakakis, Roberto Perdisci, Wenke Lee, Nikolaos Vasiloglou II, David Dagon.eng.json
|
1.2 MB
|
Detecting Malware Domains at the Upper DNS Hierarchy - Manos Antonakakis, Roberto Perdisci, Wenke Lee, Nikolaos Vasiloglou II, David Dagon.eng.lrc
|
31.7 KB
|
Detecting Malware Domains at the Upper DNS Hierarchy - Manos Antonakakis, Roberto Perdisci, Wenke Lee, Nikolaos Vasiloglou II, David Dagon.eng.srt
|
30.3 KB
|
Detecting Malware Domains at the Upper DNS Hierarchy - Manos Antonakakis, Roberto Perdisci, Wenke Lee, Nikolaos Vasiloglou II, David Dagon.eng.text
|
23.5 KB
|
Detecting Malware Domains at the Upper DNS Hierarchy - Manos Antonakakis, Roberto Perdisci, Wenke Lee, Nikolaos Vasiloglou II, David Dagon.eng.tsv
|
28.1 KB
|
Detecting Malware Domains at the Upper DNS Hierarchy - Manos Antonakakis, Roberto Perdisci, Wenke Lee, Nikolaos Vasiloglou II, David Dagon.eng.txt
|
32.0 KB
|
Detecting Malware Domains at the Upper DNS Hierarchy - Manos Antonakakis, Roberto Perdisci, Wenke Lee, Nikolaos Vasiloglou II, David Dagon.eng.vtt
|
28.4 KB
|
Differential Privacy Under Fire - Andreas Haeberlen, Benjamin C. Pierce, Arjun Narayan.eng.json
|
1.6 MB
|
Differential Privacy Under Fire - Andreas Haeberlen, Benjamin C. Pierce, Arjun Narayan.eng.lrc
|
40.7 KB
|
Differential Privacy Under Fire - Andreas Haeberlen, Benjamin C. Pierce, Arjun Narayan.eng.srt
|
43.5 KB
|
Differential Privacy Under Fire - Andreas Haeberlen, Benjamin C. Pierce, Arjun Narayan.eng.text
|
31.8 KB
|
Differential Privacy Under Fire - Andreas Haeberlen, Benjamin C. Pierce, Arjun Narayan.eng.tsv
|
36.9 KB
|
Differential Privacy Under Fire - Andreas Haeberlen, Benjamin C. Pierce, Arjun Narayan.eng.txt
|
41.0 KB
|
Differential Privacy Under Fire - Andreas Haeberlen, Benjamin C. Pierce, Arjun Narayan.eng.vtt
|
40.2 KB
|
Dirty Jobs The Role of Freelance Labor in Web Service Abuse - Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker.eng.json
|
1.5 MB
|
Dirty Jobs The Role of Freelance Labor in Web Service Abuse - Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker.eng.lrc
|
45.6 KB
|
Dirty Jobs The Role of Freelance Labor in Web Service Abuse - Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker.eng.srt
|
37.6 KB
|
Dirty Jobs The Role of Freelance Labor in Web Service Abuse - Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker.eng.text
|
27.0 KB
|
Dirty Jobs The Role of Freelance Labor in Web Service Abuse - Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker.eng.tsv
|
37.6 KB
|
Dirty Jobs The Role of Freelance Labor in Web Service Abuse - Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker.eng.txt
|
46.3 KB
|
Dirty Jobs The Role of Freelance Labor in Web Service Abuse - Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker.eng.vtt
|
34.5 KB
|
Fast and Precise Sanitizer Analysis with BEK - Pieter Hooimeijer, Benjamin Livshits, David Molnar, Prateek Saxena, Margus Veanes.eng.json
|
1.3 MB
|
Fast and Precise Sanitizer Analysis with BEK - Pieter Hooimeijer, Benjamin Livshits, David Molnar, Prateek Saxena, Margus Veanes.eng.lrc
|
35.8 KB
|
Fast and Precise Sanitizer Analysis with BEK - Pieter Hooimeijer, Benjamin Livshits, David Molnar, Prateek Saxena, Margus Veanes.eng.srt
|
34.4 KB
|
Fast and Precise Sanitizer Analysis with BEK - Pieter Hooimeijer, Benjamin Livshits, David Molnar, Prateek Saxena, Margus Veanes.eng.text
|
24.5 KB
|
Fast and Precise Sanitizer Analysis with BEK - Pieter Hooimeijer, Benjamin Livshits, David Molnar, Prateek Saxena, Margus Veanes.eng.tsv
|
31.0 KB
|
Fast and Precise Sanitizer Analysis with BEK - Pieter Hooimeijer, Benjamin Livshits, David Molnar, Prateek Saxena, Margus Veanes.eng.txt
|
36.3 KB
|
Fast and Precise Sanitizer Analysis with BEK - Pieter Hooimeijer, Benjamin Livshits, David Molnar, Prateek Saxena, Margus Veanes.eng.vtt
|
31.6 KB
|
Faster Secure Two-Party Computation Using Garbled Circuits - Yan Huang, David Evans, Jonathan Katz.eng.json
|
752.3 KB
|
Faster Secure Two-Party Computation Using Garbled Circuits - Yan Huang, David Evans, Jonathan Katz.eng.lrc
|
20.0 KB
|
Faster Secure Two-Party Computation Using Garbled Circuits - Yan Huang, David Evans, Jonathan Katz.eng.srt
|
21.6 KB
|
Faster Secure Two-Party Computation Using Garbled Circuits - Yan Huang, David Evans, Jonathan Katz.eng.text
|
14.9 KB
|
Faster Secure Two-Party Computation Using Garbled Circuits - Yan Huang, David Evans, Jonathan Katz.eng.tsv
|
17.7 KB
|
Faster Secure Two-Party Computation Using Garbled Circuits - Yan Huang, David Evans, Jonathan Katz.eng.txt
|
20.2 KB
|
Faster Secure Two-Party Computation Using Garbled Circuits - Yan Huang, David Evans, Jonathan Katz.eng.vtt
|
19.7 KB
|
Forensic Triage for Mobile Phones with DEC0DE - Robert J. Walls, Erik Learned-Miller, Brian Neil Levine.eng.json
|
1.5 MB
|
Forensic Triage for Mobile Phones with DEC0DE - Robert J. Walls, Erik Learned-Miller, Brian Neil Levine.eng.lrc
|
40.5 KB
|
Forensic Triage for Mobile Phones with DEC0DE - Robert J. Walls, Erik Learned-Miller, Brian Neil Levine.eng.srt
|
38.7 KB
|
Forensic Triage for Mobile Phones with DEC0DE - Robert J. Walls, Erik Learned-Miller, Brian Neil Levine.eng.text
|
27.7 KB
|
Forensic Triage for Mobile Phones with DEC0DE - Robert J. Walls, Erik Learned-Miller, Brian Neil Levine.eng.tsv
|
35.2 KB
|
Forensic Triage for Mobile Phones with DEC0DE - Robert J. Walls, Erik Learned-Miller, Brian Neil Levine.eng.txt
|
41.0 KB
|
Forensic Triage for Mobile Phones with DEC0DE - Robert J. Walls, Erik Learned-Miller, Brian Neil Levine.eng.vtt
|
35.6 KB
|
I'm from the Government and I'm Here to Help - Perspectives from a Privacy Tech Wonk - Tara Whalen.eng.json
|
5.7 MB
|
I'm from the Government and I'm Here to Help - Perspectives from a Privacy Tech Wonk - Tara Whalen.eng.lrc
|
173.6 KB
|
I'm from the Government and I'm Here to Help - Perspectives from a Privacy Tech Wonk - Tara Whalen.eng.srt
|
133.5 KB
|
I'm from the Government and I'm Here to Help - Perspectives from a Privacy Tech Wonk - Tara Whalen.eng.text
|
98.6 KB
|
I'm from the Government and I'm Here to Help - Perspectives from a Privacy Tech Wonk - Tara Whalen.eng.tsv
|
140.4 KB
|
I'm from the Government and I'm Here to Help - Perspectives from a Privacy Tech Wonk - Tara Whalen.eng.txt
|
176.3 KB
|
I'm from the Government and I'm Here to Help - Perspectives from a Privacy Tech Wonk - Tara Whalen.eng.vtt
|
125.0 KB
|
JACKSTRAWS Picking Command and Control Connections from Bot Traffic - Gregoire Jacob, Ralf Hund, Christopher Kruegel.eng.json
|
1.3 MB
|
JACKSTRAWS Picking Command and Control Connections from Bot Traffic - Gregoire Jacob, Ralf Hund, Christopher Kruegel.eng.lrc
|
34.6 KB
|
JACKSTRAWS Picking Command and Control Connections from Bot Traffic - Gregoire Jacob, Ralf Hund, Christopher Kruegel.eng.srt
|
32.5 KB
|
JACKSTRAWS Picking Command and Control Connections from Bot Traffic - Gregoire Jacob, Ralf Hund, Christopher Kruegel.eng.text
|
24.3 KB
|
JACKSTRAWS Picking Command and Control Connections from Bot Traffic - Gregoire Jacob, Ralf Hund, Christopher Kruegel.eng.tsv
|
30.2 KB
|
JACKSTRAWS Picking Command and Control Connections from Bot Traffic - Gregoire Jacob, Ralf Hund, Christopher Kruegel.eng.txt
|
35.0 KB
|
JACKSTRAWS Picking Command and Control Connections from Bot Traffic - Gregoire Jacob, Ralf Hund, Christopher Kruegel.eng.vtt
|
30.1 KB
|
MACE Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery - Chia Yuan Cho, Domagoj Babic, Pongsin Poosankam, Kevin Zhijie Chen, Edward XueJun Wu.eng.json
|
1.3 MB
|
MACE Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery - Chia Yuan Cho, Domagoj Babic, Pongsin Poosankam, Kevin Zhijie Chen, Edward XueJun Wu.eng.lrc
|
37.2 KB
|
MACE Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery - Chia Yuan Cho, Domagoj Babic, Pongsin Poosankam, Kevin Zhijie Chen, Edward XueJun Wu.eng.srt
|
30.2 KB
|
MACE Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery - Chia Yuan Cho, Domagoj Babic, Pongsin Poosankam, Kevin Zhijie Chen, Edward XueJun Wu.eng.text
|
22.6 KB
|
MACE Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery - Chia Yuan Cho, Domagoj Babic, Pongsin Poosankam, Kevin Zhijie Chen, Edward XueJun Wu.eng.tsv
|
30.7 KB
|
MACE Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery - Chia Yuan Cho, Domagoj Babic, Pongsin Poosankam, Kevin Zhijie Chen, Edward XueJun Wu.eng.txt
|
37.7 KB
|
MACE Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery - Chia Yuan Cho, Domagoj Babic, Pongsin Poosankam, Kevin Zhijie Chen, Edward XueJun Wu.eng.vtt
|
28.0 KB
|
mCarve Carving Attributed Dump Sets - Ton van Deursen, Sjouke Mauw, and Sasa Radomirovic.eng.json
|
1.2 MB
|
mCarve Carving Attributed Dump Sets - Ton van Deursen, Sjouke Mauw, and Sasa Radomirovic.eng.lrc
|
29.4 KB
|
mCarve Carving Attributed Dump Sets - Ton van Deursen, Sjouke Mauw, and Sasa Radomirovic.eng.srt
|
31.8 KB
|
mCarve Carving Attributed Dump Sets - Ton van Deursen, Sjouke Mauw, and Sasa Radomirovic.eng.text
|
21.5 KB
|
mCarve Carving Attributed Dump Sets - Ton van Deursen, Sjouke Mauw, and Sasa Radomirovic.eng.tsv
|
25.9 KB
|
mCarve Carving Attributed Dump Sets - Ton van Deursen, Sjouke Mauw, and Sasa Radomirovic.eng.txt
|
29.7 KB
|
mCarve Carving Attributed Dump Sets - Ton van Deursen, Sjouke Mauw, and Sasa Radomirovic.eng.vtt
|
28.9 KB
|
Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade - Nektarios Leontiadis, Tyler Moore, Nicolas Christin.eng.json
|
1.2 MB
|
Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade - Nektarios Leontiadis, Tyler Moore, Nicolas Christin.eng.lrc
|
32.2 KB
|
Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade - Nektarios Leontiadis, Tyler Moore, Nicolas Christin.eng.srt
|
34.3 KB
|
Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade - Nektarios Leontiadis, Tyler Moore, Nicolas Christin.eng.text
|
23.9 KB
|
Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade - Nektarios Leontiadis, Tyler Moore, Nicolas Christin.eng.tsv
|
28.6 KB
|
Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade - Nektarios Leontiadis, Tyler Moore, Nicolas Christin.eng.txt
|
32.5 KB
|
Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade - Nektarios Leontiadis, Tyler Moore, Nicolas Christin.eng.vtt
|
31.4 KB
|
Measuring Pay-per-Install The Commoditization of Malware Distribution - Juan Caballero, Chris Grier, Christian Kreibich, Vern Paxson.eng.json
|
1.8 MB
|
Measuring Pay-per-Install The Commoditization of Malware Distribution - Juan Caballero, Chris Grier, Christian Kreibich, Vern Paxson.eng.lrc
|
48.2 KB
|
Measuring Pay-per-Install The Commoditization of Malware Distribution - Juan Caballero, Chris Grier, Christian Kreibich, Vern Paxson.eng.srt
|
46.9 KB
|
Measuring Pay-per-Install The Commoditization of Malware Distribution - Juan Caballero, Chris Grier, Christian Kreibich, Vern Paxson.eng.text
|
33.3 KB
|
Measuring Pay-per-Install The Commoditization of Malware Distribution - Juan Caballero, Chris Grier, Christian Kreibich, Vern Paxson.eng.tsv
|
42.0 KB
|
Measuring Pay-per-Install The Commoditization of Malware Distribution - Juan Caballero, Chris Grier, Christian Kreibich, Vern Paxson.eng.txt
|
48.8 KB
|
Measuring Pay-per-Install The Commoditization of Malware Distribution - Juan Caballero, Chris Grier, Christian Kreibich, Vern Paxson.eng.vtt
|
43.0 KB
|
Network Security in the Medium Term 2061-2561 AD - Charles Stross.eng.json
|
2.6 MB
|
Network Security in the Medium Term 2061-2561 AD - Charles Stross.eng.lrc
|
68.0 KB
|
Network Security in the Medium Term 2061-2561 AD - Charles Stross.eng.srt
|
71.4 KB
|
Network Security in the Medium Term 2061-2561 AD - Charles Stross.eng.text
|
53.8 KB
|
Network Security in the Medium Term 2061-2561 AD - Charles Stross.eng.tsv
|
62.1 KB
|
Network Security in the Medium Term 2061-2561 AD - Charles Stross.eng.txt
|
68.5 KB
|
Network Security in the Medium Term 2061-2561 AD - Charles Stross.eng.vtt
|
66.3 KB
|
Opening Remarks, Awards, and Keynote Address - David Wagner.eng.json
|
388.9 KB
|
Opening Remarks, Awards, and Keynote Address - David Wagner.eng.lrc
|
10.8 KB
|
Opening Remarks, Awards, and Keynote Address - David Wagner.eng.srt
|
10.3 KB
|
Opening Remarks, Awards, and Keynote Address - David Wagner.eng.text
|
7.2 KB
|
Opening Remarks, Awards, and Keynote Address - David Wagner.eng.tsv
|
9.1 KB
|
Opening Remarks, Awards, and Keynote Address - David Wagner.eng.txt
|
10.9 KB
|
Opening Remarks, Awards, and Keynote Address - David Wagner.eng.vtt
|
9.4 KB
|
Outsourcing the Decryption of ABE Ciphertexts - Matthew Green, Susan Hohenberger, Brent Waters.eng.json
|
1.4 MB
|
Outsourcing the Decryption of ABE Ciphertexts - Matthew Green, Susan Hohenberger, Brent Waters.eng.lrc
|
36.7 KB
|
Outsourcing the Decryption of ABE Ciphertexts - Matthew Green, Susan Hohenberger, Brent Waters.eng.srt
|
32.9 KB
|
Outsourcing the Decryption of ABE Ciphertexts - Matthew Green, Susan Hohenberger, Brent Waters.eng.text
|
23.8 KB
|
Outsourcing the Decryption of ABE Ciphertexts - Matthew Green, Susan Hohenberger, Brent Waters.eng.tsv
|
31.0 KB
|
Outsourcing the Decryption of ABE Ciphertexts - Matthew Green, Susan Hohenberger, Brent Waters.eng.txt
|
37.2 KB
|
Outsourcing the Decryption of ABE Ciphertexts - Matthew Green, Susan Hohenberger, Brent Waters.eng.vtt
|
30.3 KB
|
Permission Re-Delegation Attacks and Defenses - Adrienne Porter Felt, Helen J. Wang, Alexander Moshchuk, Steve Hanna, Erika Chin.eng.json
|
1.4 MB
|
Permission Re-Delegation Attacks and Defenses - Adrienne Porter Felt, Helen J. Wang, Alexander Moshchuk, Steve Hanna, Erika Chin.eng.lrc
|
40.8 KB
|
Permission Re-Delegation Attacks and Defenses - Adrienne Porter Felt, Helen J. Wang, Alexander Moshchuk, Steve Hanna, Erika Chin.eng.srt
|
37.5 KB
|
Permission Re-Delegation Attacks and Defenses - Adrienne Porter Felt, Helen J. Wang, Alexander Moshchuk, Steve Hanna, Erika Chin.eng.text
|
27.5 KB
|
Permission Re-Delegation Attacks and Defenses - Adrienne Porter Felt, Helen J. Wang, Alexander Moshchuk, Steve Hanna, Erika Chin.eng.tsv
|
35.2 KB
|
Permission Re-Delegation Attacks and Defenses - Adrienne Porter Felt, Helen J. Wang, Alexander Moshchuk, Steve Hanna, Erika Chin.eng.txt
|
41.3 KB
|
Permission Re-Delegation Attacks and Defenses - Adrienne Porter Felt, Helen J. Wang, Alexander Moshchuk, Steve Hanna, Erika Chin.eng.vtt
|
34.6 KB
|
Pico No More Passwords - Frank Stajano.eng.json
|
3.9 MB
|
Pico No More Passwords - Frank Stajano.eng.lrc
|
95.2 KB
|
Pico No More Passwords - Frank Stajano.eng.srt
|
103.0 KB
|
Pico No More Passwords - Frank Stajano.eng.text
|
75.9 KB
|
Pico No More Passwords - Frank Stajano.eng.tsv
|
86.6 KB
|
Pico No More Passwords - Frank Stajano.eng.txt
|
95.9 KB
|
Pico No More Passwords - Frank Stajano.eng.vtt
|
96.6 KB
|
PIR-Tor Scalable Anonymous Communication Using Private Information Retrieval - Prateek Mittal, Femi Olumofin, Carmela Troncoso, Nikita Borisov, Ian Goldberg.eng.json
|
1.2 MB
|
PIR-Tor Scalable Anonymous Communication Using Private Information Retrieval - Prateek Mittal, Femi Olumofin, Carmela Troncoso, Nikita Borisov, Ian Goldberg.eng.lrc
|
34.3 KB
|
PIR-Tor Scalable Anonymous Communication Using Private Information Retrieval - Prateek Mittal, Femi Olumofin, Carmela Troncoso, Nikita Borisov, Ian Goldberg.eng.srt
|
30.9 KB
|
PIR-Tor Scalable Anonymous Communication Using Private Information Retrieval - Prateek Mittal, Femi Olumofin, Carmela Troncoso, Nikita Borisov, Ian Goldberg.eng.text
|
23.2 KB
|
PIR-Tor Scalable Anonymous Communication Using Private Information Retrieval - Prateek Mittal, Femi Olumofin, Carmela Troncoso, Nikita Borisov, Ian Goldberg.eng.tsv
|
29.4 KB
|
PIR-Tor Scalable Anonymous Communication Using Private Information Retrieval - Prateek Mittal, Femi Olumofin, Carmela Troncoso, Nikita Borisov, Ian Goldberg.eng.txt
|
34.7 KB
|
PIR-Tor Scalable Anonymous Communication Using Private Information Retrieval - Prateek Mittal, Femi Olumofin, Carmela Troncoso, Nikita Borisov, Ian Goldberg.eng.vtt
|
28.7 KB
|
Privacy in the Age of Augmented Reality - Alessandro Acquisti.eng.json
|
4.4 MB
|
Privacy in the Age of Augmented Reality - Alessandro Acquisti.eng.lrc
|
111.1 KB
|
Privacy in the Age of Augmented Reality - Alessandro Acquisti.eng.srt
|
116.2 KB
|
Privacy in the Age of Augmented Reality - Alessandro Acquisti.eng.text
|
85.5 KB
|
Privacy in the Age of Augmented Reality - Alessandro Acquisti.eng.tsv
|
99.8 KB
|
Privacy in the Age of Augmented Reality - Alessandro Acquisti.eng.txt
|
112.0 KB
|
Privacy in the Age of Augmented Reality - Alessandro Acquisti.eng.vtt
|
109.0 KB
|
Q Exploit Hardening Made Easy - Edward J. Schwartz, Thanassis Avgerinos, David Brumley.eng.json
|
1.7 MB
|
Q Exploit Hardening Made Easy - Edward J. Schwartz, Thanassis Avgerinos, David Brumley.eng.lrc
|
50.0 KB
|
Q Exploit Hardening Made Easy - Edward J. Schwartz, Thanassis Avgerinos, David Brumley.eng.srt
|
41.8 KB
|
Q Exploit Hardening Made Easy - Edward J. Schwartz, Thanassis Avgerinos, David Brumley.eng.text
|
30.3 KB
|
Q Exploit Hardening Made Easy - Edward J. Schwartz, Thanassis Avgerinos, David Brumley.eng.tsv
|
41.7 KB
|
Q Exploit Hardening Made Easy - Edward J. Schwartz, Thanassis Avgerinos, David Brumley.eng.txt
|
50.8 KB
|
Q Exploit Hardening Made Easy - Edward J. Schwartz, Thanassis Avgerinos, David Brumley.eng.vtt
|
38.4 KB
|
QUIRE Lightweight Provenance for Smart Phone Operating Systems - Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anhei Shu, Dan S. Wallach.eng.json
|
1.4 MB
|
QUIRE Lightweight Provenance for Smart Phone Operating Systems - Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anhei Shu, Dan S. Wallach.eng.lrc
|
36.7 KB
|
QUIRE Lightweight Provenance for Smart Phone Operating Systems - Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anhei Shu, Dan S. Wallach.eng.srt
|
37.9 KB
|
QUIRE Lightweight Provenance for Smart Phone Operating Systems - Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anhei Shu, Dan S. Wallach.eng.text
|
28.2 KB
|
QUIRE Lightweight Provenance for Smart Phone Operating Systems - Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anhei Shu, Dan S. Wallach.eng.tsv
|
33.0 KB
|
QUIRE Lightweight Provenance for Smart Phone Operating Systems - Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anhei Shu, Dan S. Wallach.eng.txt
|
37.0 KB
|
QUIRE Lightweight Provenance for Smart Phone Operating Systems - Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anhei Shu, Dan S. Wallach.eng.vtt
|
35.2 KB
|
Secure In-Band Wireless Pairing - Shyamnath Gollakota, Nabeel Ahmed, Nickolai Zeldovich, Dina Katabi.eng.json
|
1.3 MB
|
Secure In-Band Wireless Pairing - Shyamnath Gollakota, Nabeel Ahmed, Nickolai Zeldovich, Dina Katabi.eng.lrc
|
32.8 KB
|
Secure In-Band Wireless Pairing - Shyamnath Gollakota, Nabeel Ahmed, Nickolai Zeldovich, Dina Katabi.eng.srt
|
34.8 KB
|
Secure In-Band Wireless Pairing - Shyamnath Gollakota, Nabeel Ahmed, Nickolai Zeldovich, Dina Katabi.eng.text
|
25.0 KB
|
Secure In-Band Wireless Pairing - Shyamnath Gollakota, Nabeel Ahmed, Nickolai Zeldovich, Dina Katabi.eng.tsv
|
29.4 KB
|
Secure In-Band Wireless Pairing - Shyamnath Gollakota, Nabeel Ahmed, Nickolai Zeldovich, Dina Katabi.eng.txt
|
33.1 KB
|
Secure In-Band Wireless Pairing - Shyamnath Gollakota, Nabeel Ahmed, Nickolai Zeldovich, Dina Katabi.eng.vtt
|
32.0 KB
|
SHELLOS Enabling Fast Detection and Forensic Analysis of Code Injection Attacks - Kevin Z. Snow, Srinivas Krishnan, Fabian Monrose, Niels Provos.eng.json
|
1.4 MB
|
SHELLOS Enabling Fast Detection and Forensic Analysis of Code Injection Attacks - Kevin Z. Snow, Srinivas Krishnan, Fabian Monrose, Niels Provos.eng.lrc
|
41.0 KB
|
SHELLOS Enabling Fast Detection and Forensic Analysis of Code Injection Attacks - Kevin Z. Snow, Srinivas Krishnan, Fabian Monrose, Niels Provos.eng.srt
|
33.6 KB
|
SHELLOS Enabling Fast Detection and Forensic Analysis of Code Injection Attacks - Kevin Z. Snow, Srinivas Krishnan, Fabian Monrose, Niels Provos.eng.text
|
26.1 KB
|
SHELLOS Enabling Fast Detection and Forensic Analysis of Code Injection Attacks - Kevin Z. Snow, Srinivas Krishnan, Fabian Monrose, Niels Provos.eng.tsv
|
34.6 KB
|
SHELLOS Enabling Fast Detection and Forensic Analysis of Code Injection Attacks - Kevin Z. Snow, Srinivas Krishnan, Fabian Monrose, Niels Provos.eng.txt
|
41.6 KB
|
SHELLOS Enabling Fast Detection and Forensic Analysis of Code Injection Attacks - Kevin Z. Snow, Srinivas Krishnan, Fabian Monrose, Niels Provos.eng.vtt
|
31.4 KB
|
Show Me the Money Characterizing Spam-advertised Revenue - Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorso, Christian Kreibich, Kirill Levchenko, Vern Paxson, Geoffrey.eng.json
|
1.4 MB
|
Show Me the Money Characterizing Spam-advertised Revenue - Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorso, Christian Kreibich, Kirill Levchenko, Vern Paxson, Geoffrey.eng.lrc
|
37.2 KB
|
Show Me the Money Characterizing Spam-advertised Revenue - Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorso, Christian Kreibich, Kirill Levchenko, Vern Paxson, Geoffrey.eng.srt
|
34.6 KB
|
Show Me the Money Characterizing Spam-advertised Revenue - Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorso, Christian Kreibich, Kirill Levchenko, Vern Paxson, Geoffrey.eng.text
|
27.1 KB
|
Show Me the Money Characterizing Spam-advertised Revenue - Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorso, Christian Kreibich, Kirill Levchenko, Vern Paxson, Geoffrey.eng.tsv
|
32.9 KB
|
Show Me the Money Characterizing Spam-advertised Revenue - Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorso, Christian Kreibich, Kirill Levchenko, Vern Paxson, Geoffrey.eng.txt
|
37.6 KB
|
Show Me the Money Characterizing Spam-advertised Revenue - Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorso, Christian Kreibich, Kirill Levchenko, Vern Paxson, Geoffrey.eng.vtt
|
32.5 KB
|
SMS of Death From Analyzing to Attacking Mobile Phones on a Large Scale - Collin Mulliner, Nico Golde, Jean-Pierre Seifert.eng.json
|
1.5 MB
|
SMS of Death From Analyzing to Attacking Mobile Phones on a Large Scale - Collin Mulliner, Nico Golde, Jean-Pierre Seifert.eng.lrc
|
40.4 KB
|
SMS of Death From Analyzing to Attacking Mobile Phones on a Large Scale - Collin Mulliner, Nico Golde, Jean-Pierre Seifert.eng.srt
|
33.3 KB
|
SMS of Death From Analyzing to Attacking Mobile Phones on a Large Scale - Collin Mulliner, Nico Golde, Jean-Pierre Seifert.eng.text
|
25.2 KB
|
SMS of Death From Analyzing to Attacking Mobile Phones on a Large Scale - Collin Mulliner, Nico Golde, Jean-Pierre Seifert.eng.tsv
|
33.9 KB
|
SMS of Death From Analyzing to Attacking Mobile Phones on a Large Scale - Collin Mulliner, Nico Golde, Jean-Pierre Seifert.eng.txt
|
41.0 KB
|
SMS of Death From Analyzing to Attacking Mobile Phones on a Large Scale - Collin Mulliner, Nico Golde, Jean-Pierre Seifert.eng.vtt
|
30.9 KB
|
SSLTLS Certificates Threat or Menace - Eric Rescorla, Adam Langley, Brian Smith, Stephen Schultze, Steve Kent.eng.json
|
4.3 MB
|
SSLTLS Certificates Threat or Menace - Eric Rescorla, Adam Langley, Brian Smith, Stephen Schultze, Steve Kent.eng.lrc
|
108.6 KB
|
SSLTLS Certificates Threat or Menace - Eric Rescorla, Adam Langley, Brian Smith, Stephen Schultze, Steve Kent.eng.srt
|
108.2 KB
|
SSLTLS Certificates Threat or Menace - Eric Rescorla, Adam Langley, Brian Smith, Stephen Schultze, Steve Kent.eng.text
|
81.4 KB
|
SSLTLS Certificates Threat or Menace - Eric Rescorla, Adam Langley, Brian Smith, Stephen Schultze, Steve Kent.eng.tsv
|
96.5 KB
|
SSLTLS Certificates Threat or Menace - Eric Rescorla, Adam Langley, Brian Smith, Stephen Schultze, Steve Kent.eng.txt
|
109.5 KB
|
SSLTLS Certificates Threat or Menace - Eric Rescorla, Adam Langley, Brian Smith, Stephen Schultze, Steve Kent.eng.vtt
|
101.9 KB
|
Telex Anticensorship in the Network Infrastructure - Eric Wustrow, Scott Wolchok, Ian Goldberg, J. Alex Halderman.eng.json
|
1.1 MB
|
Telex Anticensorship in the Network Infrastructure - Eric Wustrow, Scott Wolchok, Ian Goldberg, J. Alex Halderman.eng.lrc
|
29.5 KB
|
Telex Anticensorship in the Network Infrastructure - Eric Wustrow, Scott Wolchok, Ian Goldberg, J. Alex Halderman.eng.srt
|
28.6 KB
|
Telex Anticensorship in the Network Infrastructure - Eric Wustrow, Scott Wolchok, Ian Goldberg, J. Alex Halderman.eng.text
|
20.4 KB
|
Telex Anticensorship in the Network Infrastructure - Eric Wustrow, Scott Wolchok, Ian Goldberg, J. Alex Halderman.eng.tsv
|
25.5 KB
|
Telex Anticensorship in the Network Infrastructure - Eric Wustrow, Scott Wolchok, Ian Goldberg, J. Alex Halderman.eng.txt
|
29.8 KB
|
Telex Anticensorship in the Network Infrastructure - Eric Wustrow, Scott Wolchok, Ian Goldberg, J. Alex Halderman.eng.vtt
|
26.3 KB
|
The Cloud-y Future of Security Technologies - Adam O'Donnell.eng.json
|
2.4 MB
|
The Cloud-y Future of Security Technologies - Adam O'Donnell.eng.lrc
|
56.2 KB
|
The Cloud-y Future of Security Technologies - Adam O'Donnell.eng.srt
|
62.3 KB
|
The Cloud-y Future of Security Technologies - Adam O'Donnell.eng.text
|
43.6 KB
|
The Cloud-y Future of Security Technologies - Adam O'Donnell.eng.tsv
|
51.0 KB
|
The Cloud-y Future of Security Technologies - Adam O'Donnell.eng.txt
|
56.7 KB
|
The Cloud-y Future of Security Technologies - Adam O'Donnell.eng.vtt
|
56.9 KB
|
The Phantom Tollbooth Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion - Sarah Meiklejohn, Keaton Mowery, Stephen Checkoway, Hovav Shacham.eng.json
|
1.7 MB
|
The Phantom Tollbooth Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion - Sarah Meiklejohn, Keaton Mowery, Stephen Checkoway, Hovav Shacham.eng.lrc
|
41.4 KB
|
The Phantom Tollbooth Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion - Sarah Meiklejohn, Keaton Mowery, Stephen Checkoway, Hovav Shacham.eng.srt
|
42.5 KB
|
The Phantom Tollbooth Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion - Sarah Meiklejohn, Keaton Mowery, Stephen Checkoway, Hovav Shacham.eng.text
|
32.2 KB
|
The Phantom Tollbooth Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion - Sarah Meiklejohn, Keaton Mowery, Stephen Checkoway, Hovav Shacham.eng.tsv
|
37.4 KB
|
The Phantom Tollbooth Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion - Sarah Meiklejohn, Keaton Mowery, Stephen Checkoway, Hovav Shacham.eng.txt
|
41.8 KB
|
The Phantom Tollbooth Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion - Sarah Meiklejohn, Keaton Mowery, Stephen Checkoway, Hovav Shacham.eng.vtt
|
39.6 KB
|
The Three Cyber-War Fallacies - Dave Aitel.eng.json
|
4.1 MB
|
The Three Cyber-War Fallacies - Dave Aitel.eng.lrc
|
96.8 KB
|
The Three Cyber-War Fallacies - Dave Aitel.eng.srt
|
123.6 KB
|
The Three Cyber-War Fallacies - Dave Aitel.eng.text
|
75.6 KB
|
The Three Cyber-War Fallacies - Dave Aitel.eng.tsv
|
87.2 KB
|
The Three Cyber-War Fallacies - Dave Aitel.eng.txt
|
97.5 KB
|
The Three Cyber-War Fallacies - Dave Aitel.eng.vtt
|
111.4 KB
|
Toward Secure Embedded Web Interfaces - Baptiste Gourdin, Chinmay Soman, Hristo Bojinov, Elie Bursztein.eng.json
|
1.5 MB
|
Toward Secure Embedded Web Interfaces - Baptiste Gourdin, Chinmay Soman, Hristo Bojinov, Elie Bursztein.eng.lrc
|
38.9 KB
|
Toward Secure Embedded Web Interfaces - Baptiste Gourdin, Chinmay Soman, Hristo Bojinov, Elie Bursztein.eng.srt
|
35.1 KB
|
Toward Secure Embedded Web Interfaces - Baptiste Gourdin, Chinmay Soman, Hristo Bojinov, Elie Bursztein.eng.text
|
24.7 KB
|
Toward Secure Embedded Web Interfaces - Baptiste Gourdin, Chinmay Soman, Hristo Bojinov, Elie Bursztein.eng.tsv
|
32.9 KB
|
Toward Secure Embedded Web Interfaces - Baptiste Gourdin, Chinmay Soman, Hristo Bojinov, Elie Bursztein.eng.txt
|
39.4 KB
|
Toward Secure Embedded Web Interfaces - Baptiste Gourdin, Chinmay Soman, Hristo Bojinov, Elie Bursztein.eng.vtt
|
32.1 KB
|
TRESOR Runs Encryption Securely Outside RAM - Tilo Müller, Felix C. Freiling, Andreas Dewald.eng.json
|
1.4 MB
|
TRESOR Runs Encryption Securely Outside RAM - Tilo Müller, Felix C. Freiling, Andreas Dewald.eng.lrc
|
37.5 KB
|
TRESOR Runs Encryption Securely Outside RAM - Tilo Müller, Felix C. Freiling, Andreas Dewald.eng.srt
|
34.9 KB
|
TRESOR Runs Encryption Securely Outside RAM - Tilo Müller, Felix C. Freiling, Andreas Dewald.eng.text
|
23.2 KB
|
TRESOR Runs Encryption Securely Outside RAM - Tilo Müller, Felix C. Freiling, Andreas Dewald.eng.tsv
|
31.5 KB
|
TRESOR Runs Encryption Securely Outside RAM - Tilo Müller, Felix C. Freiling, Andreas Dewald.eng.txt
|
38.1 KB
|
TRESOR Runs Encryption Securely Outside RAM - Tilo Müller, Felix C. Freiling, Andreas Dewald.eng.vtt
|
31.5 KB
|
Why (Special Agent) Johnny (Still) Can't Encrypt A Security Analysis of the APCO Project 25 Two-Way Radio System - Sandy Clark, Travis Goodspeed, Perry Metzger, Zachary Wasserman.eng.json
|
1.5 MB
|
Why (Special Agent) Johnny (Still) Can't Encrypt A Security Analysis of the APCO Project 25 Two-Way Radio System - Sandy Clark, Travis Goodspeed, Perry Metzger, Zachary Wasserman.eng.lrc
|
43.4 KB
|
Why (Special Agent) Johnny (Still) Can't Encrypt A Security Analysis of the APCO Project 25 Two-Way Radio System - Sandy Clark, Travis Goodspeed, Perry Metzger, Zachary Wasserman.eng.srt
|
37.7 KB
|
Why (Special Agent) Johnny (Still) Can't Encrypt A Security Analysis of the APCO Project 25 Two-Way Radio System - Sandy Clark, Travis Goodspeed, Perry Metzger, Zachary Wasserman.eng.text
|
26.8 KB
|
Why (Special Agent) Johnny (Still) Can't Encrypt A Security Analysis of the APCO Project 25 Two-Way Radio System - Sandy Clark, Travis Goodspeed, Perry Metzger, Zachary Wasserman.eng.tsv
|
36.2 KB
|
Why (Special Agent) Johnny (Still) Can't Encrypt A Security Analysis of the APCO Project 25 Two-Way Radio System - Sandy Clark, Travis Goodspeed, Perry Metzger, Zachary Wasserman.eng.txt
|
44.0 KB
|
Why (Special Agent) Johnny (Still) Can't Encrypt A Security Analysis of the APCO Project 25 Two-Way Radio System - Sandy Clark, Travis Goodspeed, Perry Metzger, Zachary Wasserman.eng.vtt
|
34.5 KB
|
ZOZZLE Fast and Precise In-Browser JavaScript Malware Detection - Charlie Curtsinger, Benjamin Livshits, Benjamin Zorn, Christian Seifert.eng.json
|
1.9 MB
|
ZOZZLE Fast and Precise In-Browser JavaScript Malware Detection - Charlie Curtsinger, Benjamin Livshits, Benjamin Zorn, Christian Seifert.eng.lrc
|
56.5 KB
|
ZOZZLE Fast and Precise In-Browser JavaScript Malware Detection - Charlie Curtsinger, Benjamin Livshits, Benjamin Zorn, Christian Seifert.eng.srt
|
47.6 KB
|
ZOZZLE Fast and Precise In-Browser JavaScript Malware Detection - Charlie Curtsinger, Benjamin Livshits, Benjamin Zorn, Christian Seifert.eng.text
|
33.2 KB
|
ZOZZLE Fast and Precise In-Browser JavaScript Malware Detection - Charlie Curtsinger, Benjamin Livshits, Benjamin Zorn, Christian Seifert.eng.tsv
|
46.7 KB
|
ZOZZLE Fast and Precise In-Browser JavaScript Malware Detection - Charlie Curtsinger, Benjamin Livshits, Benjamin Zorn, Christian Seifert.eng.txt
|
57.4 KB
|
ZOZZLE Fast and Precise In-Browser JavaScript Malware Detection - Charlie Curtsinger, Benjamin Livshits, Benjamin Zorn, Christian Seifert.eng.vtt
|
43.4 KB
|
/.../USENIX Security 2011 Poster Session_files/
|
dot_clear.gif
|
0.0 KB
|
dot_clear_002.gif
|
0.0 KB
|
footer.gif
|
0.3 KB
|
left_bar.gif
|
1.2 KB
|
left_bottom.gif
|
1.7 KB
|
longbar.gif
|
1.2 KB
|
new_usenix.jpg
|
20.6 KB
|
questmark.gif
|
0.1 KB
|
sec11_banner.jpg
|
103.8 KB
|
/.../USENIX Security 2011 Presentations/
|
A Study of Android Application Security - William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri.pdf
|
1.4 MB
|
ADsafety Type-Based Verification of JavaScript Sandboxing - Joe Gibbs Politz, Spiridon Aristides Eliopoulos, Arjun Guha, Shriram Krishnamurthi.pdf
|
230.3 KB
|
ADsafety Type-Based Verification of JavaScript Sandboxing Slides - Joe Gibbs Politz, Spiridon Aristides Eliopoulos, Arjun Guha, Shriram Krishnamurthi.pdf
|
4.5 MB
|
BOTMAGNIFIER Locating Spambots on the Internet Slides - Gianluca Stringhini, Thorsten Holz, Brett Stone-Gross, Christopher Kruegel, Giovanni Vigna.pdf
|
1.9 MB
|
Bubble Trouble Off-Line De-Anonymization of Bubble Forms - Joseph A. Calandrino, William Clarkson, Edward W. Felten.pdf
|
433.4 KB
|
Cloaking Malware with the Trusted Platform Module - Alan M. Dunn, Owen S. Hofmann, Brent Waters, Emmett Witchel.pdf
|
261.8 KB
|
Cloaking Malware with the Trusted Platform Module Slides - Alan M. Dunn, Owen S. Hofmann, Brent Waters, Emmett Witchel.pdf
|
765.1 KB
|
Comprehensive Experimental Analyses of Automotive Attack Surfaces - Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl.pdf
|
1.2 MB
|
Crossing the Chasm Pitching Security Research to Mainstream Browser Vendors - Collin Jackson.pdf
|
4.5 MB
|
Dark Clouds on the Horizon Using Cloud Storage as Attack Vector and Online Slack Space - Martin Mulazzani, Sebastian Schrittwieser, Manuel Leithner, Markus Huber.pdf
|
329.8 KB
|
Dark Clouds on the Horizon Using Cloud Storage as Attack Vector and Online Slack Space Slides - Martin Mulazzani, Sebastian Schrittwieser, Manuel Leithner, Markus H.pdf
|
1.4 MB
|
deSEO Combating Search-Result Poisoning - John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy, Martin Abadi.pdf
|
1.1 MB
|
deSEO Combating Search-Result Poisoning Slides - John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy, Martin Abadi.pdf
|
4.8 MB
|
Detecting Malware Domains at the Upper DNS Hierarchy - Manos Antonakakis, Roberto Perdisci, Wenke Lee, Nikolaos Vasiloglou II, David Dagon.pdf
|
1.2 MB
|
Detecting Malware Domains at the Upper DNS Hierarchy Slides - Manos Antonakakis, Roberto Perdisci, Wenke Lee, Nikolaos Vasiloglou II, David Dagon.pdf
|
2.1 MB
|
Differential Privacy Under Fire - Andreas Haeberlen, Benjamin C. Pierce, Arjun Narayan.pdf
|
285.0 KB
|
Differential Privacy Under Fire Slides - Andreas Haeberlen, Benjamin C. Pierce, Arjun Narayan.pptx
|
322.9 KB
|
Dirty Jobs The Role of Freelance Labor in Web Service Abuse - Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker.pdf
|
358.0 KB
|
Dirty Jobs The Role of Freelance Labor in Web Service Abuse - Motoyama.pdf
|
358.0 KB
|
Dirty Jobs The Role of Freelance Labor in Web Service Abuse Slides - motoyama.pdf
|
2.4 MB
|
Fast and Precise Sanitizer Analysis with BEK - Pieter Hooimeijer, Benjamin Livshits, David Molnar, Prateek Saxena, Margus Veanes.pdf
|
470.7 KB
|
Faster Secure Two-Party Computation Using Garbled Circuits - Yan Huang, David Evans, Jonathan Katz.pdf
|
424.7 KB
|
Faster Secure Two-Party Computation Using Garbled Circuits Slides - Yan Huang, David Evans, Jonathan Katz.pdf
|
2.9 MB
|
Forensic Triage for Mobile Phones with DEC0DE - Robert J. Walls, Erik Learned-Miller, and Brian Neil Levine.pdf
|
1.0 MB
|
Forensic Triage for Mobile Phones with DEC0DE Slides - Robert J. Walls, Erik Learned-Miller, and Brian Neil Levine.pdf
|
9.8 MB
|
JACKSTRAWS Picking Command and Control Connections from Bot Traffic Slides - Gregoire Jacob, Ralf Hund, Christopher Kruegel.pdf
|
633.5 KB
|
MACE Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery - Chia Yuan Cho, Domagoj Babic, Pongsin Poosankam, Kevin Zhijie Chen, Ed.pdf
|
216.3 KB
|
MACE Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery Slides - Chia Yuan Cho, Domagoj Babic, Pongsin Poosankam, Kevin Zhijie C.pdf
|
645.1 KB
|
mCarve Carving Attributed Dump Sets - Ton van Deursen, Sjouke Mauw, and Sasa Radomirovic.pdf
|
264.1 KB
|
mCarve Carving Attributed Dump Sets Slides - Ton van Deursen, Sjouke Mauw, and Sasa Radomirovic.pdf
|
347.0 KB
|
Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade - Nektarios Leontiadis, Tyler Moore, Nicolas Christin.pdf
|
1.9 MB
|
Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade Slides - Nektarios Leontiadis, Tyler Moore, Nicolas Christin.pdf
|
5.1 MB
|
Measuring Pay-per-Install The Commoditization of Malware Distribution - Juan Caballero, Chris Grier, Christian Kreibich, Vern Paxson.pdf
|
1.4 MB
|
Measuring Pay-per-Install The Commoditization of Malware Distribution Slides - Juan Caballero, Chris Grier, Christian Kreibich, Vern Paxson.pdf
|
2.4 MB
|
Outsourcing the Decryption of ABE Ciphertexts - Matthew Green, Susan Hohenberger, Brent Waters.pdf
|
921.6 KB
|
Outsourcing the Decryption of ABE Ciphertexts Slides - Matthew Green, Susan Hohenberger, Brent Waters.pdf
|
4.3 MB
|
Permission Re-Delegation Attacks and Defenses - Adrienne Porter Felt, Helen J. Wang, Alexander Moshchuk, Steve Hanna, Erika Chin.pdf
|
1.0 MB
|
PIR-Tor Scalable Anonymous Communication Using Private Information Retrieval - Prateek Mittal, Femi Olumofin, Carmela Troncoso, Nikita Borisov, Ian Goldberg.pdf
|
529.6 KB
|
PIR-Tor Scalable Anonymous Communication Using Private Information Retrieval Slides - Prateek Mittal, Femi Olumofin, Carmela Troncoso, Nikita Borisov, Ian Goldberg.pptx
|
409.6 KB
|
Privacy in the Age of Augmented Reality - Alessandro Acquisti.pdf
|
2.1 MB
|
Q Exploit Hardening Made Easy - Edward J. Schwartz, Thanassis Avgerinos, David Brumley.pdf
|
700.9 KB
|
Q Exploit Hardening Made Easy Slides - Edward J. Schwartz, Thanassis Avgerinos, David Brumley.pdf
|
2.7 MB
|
QUIRE Lightweight Provenance for Smart Phone Operating Systems - Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anhei Shu, Dan S. Wallach.pdf
|
1.3 MB
|
Secure In-Band Wireless Pairing - Shyamnath Gollakota, Nabeel Ahmed, Nickolai Zeldovich, Dina Katabi.pdf
|
438.6 KB
|
Secure In-Band Wireless Pairing Slides - Shyamnath Gollakota, Nabeel Ahmed, Nickolai Zeldovich, Dina Katabi.pptx
|
653.0 KB
|
SHELLOS Enabling Fast Detection and Forensic Analysis of Code Injection Attacks - Kevin Z. Snow, Srinivas Krishnan, Fabian Monrose, Niels Provos.pdf
|
536.0 KB
|
Show Me the Money Characterizing Spam-advertised Revenue - Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorso, Christian Kreibich, Kirill Levchenko, Vern.pdf
|
1.9 MB
|
Show Me the Money Characterizing Spam-advertised Revenue Slides - Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorso, Christian Kreibich, Kirill Levchenko.pdf
|
4.0 MB
|
SMS of Death From Analyzing to Attacking Mobile Phones on a Large Scale - Collin Mulliner, Nico Golde, Jean-Pierre Seifert.pdf
|
376.8 KB
|
SMS of Death From Analyzing to Attacking Mobile Phones on a Large Scale Slides - Collin Mulliner, Nico Golde, Jean-Pierre Seifert.pdf
|
3.6 MB
|
Static Detection of Access Control Vulnerabilities in Web Applications - Fangqi Sun, Liang Xu, and Zhendong Su.pdf
|
666.3 KB
|
Static Detection of Access Control Vulnerabilities in Web Applications Slides - Fangqi Sun, Liang Xu, and Zhendong Su.pdf
|
963.8 KB
|
Telex Anticensorship in the Network Infrastructure - Eric Wustrow, Scott Wolchok, Ian Goldberg, J. Alex Halderman.pdf
|
2.5 MB
|
Telex Anticensorship in the Network Infrastructure Slides - Eric Wustrow, Scott Wolchok, Ian Goldberg, J. Alex Halderman.pdf
|
5.2 MB
|
The (Decentralized) SSL Observatory - Peter Eckersley, Jesse Burns.pdf
|
2.7 MB
|
The Cloud-y Future of Security Technologies - Adam O'Donnell.pdf
|
2.9 MB
|
The Phantom Tollbooth Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion - Sarah Meiklejohn, Keaton Mowery, Stephen Checkoway, Hovav.pdf
|
651.3 KB
|
The Phantom Tollbooth Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion Slides - Sarah Meiklejohn, Keaton Mowery, Stephen Checkoway.pdf
|
9.8 MB
|
Toward Secure Embedded Web Interfaces - Baptiste Gourdin, Chinmay Soman, Hristo Bojinov, Elie Bursztein.pdf
|
1.1 MB
|
Toward Secure Embedded Web Interfaces Slides - Baptiste Gourdin, Chinmay Soman, Hristo Bojinov, Elie Bursztein.pdf
|
15.6 MB
|
TRESOR Runs Encryption Securely Outside RAM - Tilo Müller, Felix C. Freiling, Andreas Dewald.pdf
|
274.0 KB
|
TRESOR Runs Encryption Securely Outside RAM Slides - Tilo Müller, Felix C. Freiling, Andreas Dewald.pdf
|
970.6 KB
|
Why (Special Agent) Johnny (Still) Can't Encrypt A Security Analysis of the APCO Project 25 Two-Way Radio System - Sandy Clark, Travis Goodspeed, Perry Metzger, Zac.pdf
|
9.6 MB
|
ZOZZLE Fast and Precise In-Browser JavaScript Malware Detection - Charlie Curtsinger, Benjamin Livshits, Benjamin Zorn, Christian Seifert.pdf
|
2.4 MB
|
/USENIX Security 2012/
|
AdSplit Separating Smartphone Advertising from Applications - Shashi Shekhar, Michael Dietz, Dan S. Wallach.mp4
|
13.4 MB
|
An Evaluation of the Google Chrome Extension Security Architecture - Nicholas Carlini, Adrienne Porter Felt, David Wagner.mp4
|
11.8 MB
|
Aurasium Practical Policy Enforcement for Android Applications - Rubin Xu, Hassen Saidi, Ross Anderson.mp4
|
12.7 MB
|
Babel Leveraging Email Delivery for Spam Mitigation - Gianluca Stringhini, Manuel Egele, Apostolis Zarras, Thorsten Holz, Christopher Kruegel, Giovanni Vigna.mp4
|
12.6 MB
|
Billion-Gate Secure Computation with Malicious Adversaries - Benjamin Kreuter, abhi shelat, and Chih-hao Shen.mp4
|
11.4 MB
|
Chimera A Declarative Language for Streaming Network Traffic Analysis - Kevin Borders, Jonathan Springer, Matthew Burnside.mp4
|
12.5 MB
|
Clickjacking Attacks and Defenses - Lin-Shung Huang, Alex Moshchuk, Helen J. Wang, Stuart Schechter, Collin Jackson.mp4
|
11.3 MB
|
Cyber Security Education in a Time of Change - Cynthia E. Irvine.mp4
|
37.3 MB
|
Data Node Encrypted File System Efficient Secure Deletion for Flash Memory - Joel Reardon, Srdjan Capkun, David Basin.mp4
|
15.8 MB
|
DroidScope Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis - Lok Kwong Yan, Heng Yin.mp4
|
13.5 MB
|
Efficient and Scalable Socware Detection in Online Social Networks - Md Sazzadur Rahman, Ting-Kai Huang, Harsha V. Madhyastha, Michalis Faloutsos.mp4
|
9.3 MB
|
Emerging Trends and Their Security Implications - Doug Burger.mp4
|
27.9 MB
|
Enemy of the State A State-Aware Black-Box Web Vulnerability Scanner - Adam Doupe, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna.mp4
|
10.8 MB
|
Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization - Cristiano Giuffrida, Anton Kuijsten, Andrew S. Tanenbaum.mp4
|
13.5 MB
|
Establishing Browser Security Guarantees through Formal Shim Verification - Dongseok Jang, Zachary Tatlock, Sorin Lerner.mp4
|
13.9 MB
|
Fuzzing with Code Fragments - Christian Holler, Kim Herzig, Andreas Zeller.mp4
|
10.0 MB
|
Gone in 360 Seconds Hijacking with Hitag2 - Roel Verdult, Flavio D. Garcia, Josep Balasch, KU Leuven.mp4
|
18.7 MB
|
How Does Your Password Measure Up - The Effect of Strength Meters on Password Creation - Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Mazu.mp4
|
14.1 MB
|
I Forgot Your Password Randomness Attacks Against PHP Applications - George Argyros, Aggelos Kiayias.mp4
|
14.3 MB
|
Impact of Spam Exposure on User Engagement - Anirban Dasgupta, - Kunal Punera, Justin M. Rao, Xuanhui Wang.mp4
|
15.2 MB
|
Keynote - The Evolution of Information Assurance - Dickie George.mp4
|
47.5 MB
|
kGuard Lightweight Kernel Protection against Return-to-User Attacks - Vasileios P. Kemerlis, Georgios Portokalidis, Angelos D. Keromytis.mp4
|
12.5 MB
|
Let Me Answer That for You Exploiting Broadcast Information in Cellular Networks - golde.mp4
|
10.7 MB
|
Life as a Target-Welcome to the Club - Dickie George.mp4
|
36.8 MB
|
Mining Your Ps and Qs Detection of Widespread Weak Keys in Network Devices - Nadia Heninger, Zakir Durumeric, Eric Wustrow, J. Alex Halderm.mp4
|
13.5 MB
|
Nature is a Language Can't You Read - Meredith L. Patterson.mp4
|
26.9 MB
|
Neuroscience Meets Cryptography Designing Crypto Primitives Secure Against Rubber Hose Attacks - Hristo Bojinov, Daniel Sanchez, Paul Reber, Northw.mp4
|
15.6 MB
|
New Attacks on Timing-based Network Flow Watermarks - Zi Lin, Nicholas Hopper.mp4
|
11.4 MB
|
On Breaking SAML Be Whoever You Want to Be - Juraj Somorovsky, Andreas Mayer, Jorg Schwenk, Marco Kampmann, Meiko Jensen.mp4
|
13.3 MB
|
On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces - Ivan Martinovic, Doug Davies, Mario Frank, Daniele Perito, Tomas Ros, Dawn Song.mp4
|
25.1 MB
|
Optimally Robust Private Information Retrieval - Casey Devet, Ian Goldberg, Nadia Heninger.mp4
|
11.4 MB
|
Origin-Bound Certificates A Fresh Approach to Strong Client Authentication for the Web - Michael Dietz, Alexei Czeskis, Dirk Balfanz, Dan S. Wallach.mp4
|
10.6 MB
|
PharmaLeaks Understanding the Business of Online Pharmaceutical Affiliate Programs - Damon McCoy, Andreas Pitsillidis, Grant Jordan, Nicholas Weaver, Christian Kreibich, Brian Kreb.mp4
|
14.7 MB
|
Policy-Sealed Data A New Abstraction for Building Trusted Cloud Services - Nuno Santos, Rodrigo Rodrigues, Krishna P. Gummadi.mp4
|
13.3 MB
|
Privacy-Preserving Social Plugins - Georgios Kontaxis, Michalis Polychronakis, Angelos D. Keromytis, Evangelos P. Markatos.mp4
|
11.7 MB
|
Privilege Separation in HTML5 Applications - Devdatta Akhawe, Prateek Saxena, Dawn Song.mp4
|
9.3 MB
|
Progressive Authentication Deciding When to Authenticate on Mobile Phones - Oriana Riva, Chuan Qin, Karin Strauss, Dimitrios Lymberopoulos.mp4
|
13.2 MB
|
PUBCRAWL Protecting Users and Businesses from CRAWLers - Gregoire Jacob, Engin Kirda, Christopher Kruegel, Giovanni Vigna.mp4
|
14.8 MB
|
Securing Early Software Development - Riley Eller.mp4
|
15.6 MB
|
Security and Usability Challenges of Moving-Object CAPTCHAs Decoding Codewords in Motion - Y. Xu, G. Reynaga, S. Chiasson, J.-M. Frahm, F. Monrose, P. van Oorschot.mp4
|
14.8 MB
|
Social Networking with Frientegrity Privacy and Integrity with an Untrusted Provider - Ariel J. Feldman, Aaron Blankstein, Michael J. Freedman, Edward W. Felten.mp4
|
13.3 MB
|
STEALTHMEM System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud - Taesoo Kim, Marcus Peinado, Gloria Mainar-Ruiz.mp4
|
12.6 MB
|
STING Finding Name Resolution Vulnerabilities in Programs - Hayawardh Vijayakumar, Joshua Schiffman, Trent Jaeger.mp4
|
13.3 MB
|
Tachyon Tandem Execution for Efficient Live Patch Testing - Matthew Maurer, David Brumley.mp4
|
11.6 MB
|
Taking Proof-Based Verified Computation a Few Steps Closer to Practicality - Srinath Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Andrew J. Blumberg, Michael Walfish.mp4
|
9.0 MB
|
TARDIS Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without Clocks - Amir Rahmati, Mastooreh Salajegheh, Dan Holcomb, Jacob Sorber, Wayne P. B.mp4
|
13.3 MB
|
Technical Sessions 2012 USENIX.htm
|
345.0 KB
|
Throttling Tor Bandwidth Parasites - Rob Jansen, Paul Syverson, Nicholas Hopper.mp4
|
9.2 MB
|
Tracking Rootkit Footprints with a Practical Memory Analysis System - Weidong Cui, Marcus Peinado, Zhilei Xu, Ellick Chan.mp4
|
9.6 MB
|
USENIX Security 2012 Proceedings.epub
|
32.3 MB
|
USENIX Security 2012 Proceedings.mobi
|
23.6 MB
|
USENIX Security 2012 Proceedings.pdf
|
19.8 MB
|
USENIX Security 2012 Reports.pdf
|
1.1 MB
|
USENIX Security 2012 USENIX.htm
|
82.1 KB
|
Welcome - Tadayoshi Kohno.mp4
|
3.8 MB
|
Whispers in the Hyper-space High-speed Covert Channel Attacks in the Cloud - Zhenyu Wu, Zhang Xu, Haining Wang.mp4
|
13.0 MB
|
/.../Technical Sessions 2012 USENIX_files/
|
acmqueue_150x48_0.png
|
3.1 KB
|
acmqueue_150x48_0_002.png
|
4.5 KB
|
admin_125x47_0.png
|
3.7 KB
|
admin_125x47_0_002.png
|
11.4 KB
|
all.js
|
3.2 KB
|
analytics.js
|
45.2 KB
|
application-octet-stream.png
|
0.2 KB
|
audio_16.png
|
0.5 KB
|
beyond_security.png
|
7.5 KB
|
beyond_security_002.png
|
14.1 KB
|
cbgapi.loaded_0
|
144.0 KB
|
cbgapi.loaded_1
|
97.1 KB
|
conference-schedule-pdf.png
|
0.3 KB
|
css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css
|
5.6 KB
|
css_ciODmkFfqCSx2xBu95VX29BZ0r4mdoEz3gy-MriTJBM.css
|
257.9 KB
|
css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css
|
1.5 KB
|
css_SKdvFJ9YoZ2Zlnl17QxUbae5QC-NQDrH8ynBbHJFAaM.css
|
9.2 KB
|
css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css
|
0.1 KB
|
dcj_150x27_0.png
|
3.2 KB
|
dcj_150x27_0_002.png
|
6.2 KB
|
dmtf_150x53_0.png
|
8.0 KB
|
dmtf_150x53_0_002.png
|
4.4 KB
|
fastbutton.htm
|
1.8 KB
|
fastbutton_002.htm
|
1.7 KB
|
fsm_150x44_0.png
|
4.1 KB
|
fsm_150x44_0_002.png
|
9.7 KB
|
google_8.png
|
7.8 KB
|
google_8_002.png
|
3.2 KB
|
hakin9_en150x40.png
|
3.5 KB
|
hakin9_en150x40_002.png
|
6.8 KB
|
ibm-research.png
|
3.5 KB
|
ibm-research_002.png
|
1.9 KB
|
ibm-research_gs.png
|
0.6 KB
|
ieee_sp_150x36_0.png
|
8.7 KB
|
ieee_sp_150x36_0_002.png
|
4.5 KB
|
infosecnews_150x120_0.png
|
5.2 KB
|
infosecnews_150x120_0_002.png
|
5.6 KB
|
js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js
|
20.5 KB
|
js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js
|
1.4 KB
|
js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js
|
120.3 KB
|
js_ILONILlX06kZtY3IVUMaeuMs_GJ1hSJY46daikoF9fA.js
|
99.4 KB
|
js_sWOO4PbSe161nCKWEJProMMhdbu_pfXMDzdRrMGBIE0.js
|
47.6 KB
|
js_yui9lDPs2dTDFfQPtmwCCL63T1k2MGsGrsTM-7Eo2Ts.js
|
32.8 KB
|
linux_journal_150x72_0.png
|
6.6 KB
|
linux_journal_150x72_0_002.png
|
10.3 KB
|
linux_pro_150x57_0.png
|
3.5 KB
|
linux_pro_150x57_0_002.png
|
5.3 KB
|
lxer_150x53_0.png
|
4.6 KB
|
lxer_150x53_0_002.png
|
8.2 KB
|
microsoft_research_0.png
|
4.9 KB
|
microsoft_research_0_002.png
|
2.4 KB
|
mozilla_firefox_logo.png
|
17.2 KB
|
mozilla_firefox_logo_002.png
|
19.4 KB
|
national_science_foundation.gif
|
4.2 KB
|
national_science_foundation_002.gif
|
7.3 KB
|
nsp_logo_black.png
|
4.7 KB
|
nsp_logo_black_002.png
|
4.7 KB
|
oreilly_150x28_0.png
|
2.4 KB
|
oreilly_150x28_0_002.png
|
3.8 KB
|
pdf_16.png
|
0.3 KB
|
plusone.js
|
49.0 KB
|
postmessageRelay.htm
|
0.7 KB
|
slides_16.png
|
1.3 KB
|
stack_exchange_150x37_0.png
|
6.0 KB
|
stack_exchange_150x37_0_002.png
|
3.3 KB
|
symantec_150x60.png
|
10.6 KB
|
symantec_150x60_002.png
|
5.4 KB
|
userfriendly_150x38_0.png
|
3.5 KB
|
userfriendly_150x38_0_002.png
|
6.7 KB
|
video_16.png
|
1.4 KB
|
widgets.js
|
98.5 KB
|
/.../Technical Sessions 2012 USENIX_files/postmessageRelay_data/
|
829555168-postmessagerelay.js
|
10.0 KB
|
cbgapi.loaded_0
|
54.9 KB
|
rpcshindig_random.js
|
13.0 KB
|
/.../USENIX Security 2012 captions/
|
AdSplit Separating Smartphone Advertising from Applications - Shashi Shekhar, Michael Dietz, Dan S. Wallach.eng.json
|
1.5 MB
|
AdSplit Separating Smartphone Advertising from Applications - Shashi Shekhar, Michael Dietz, Dan S. Wallach.eng.lrc
|
41.3 KB
|
AdSplit Separating Smartphone Advertising from Applications - Shashi Shekhar, Michael Dietz, Dan S. Wallach.eng.srt
|
39.8 KB
|
AdSplit Separating Smartphone Advertising from Applications - Shashi Shekhar, Michael Dietz, Dan S. Wallach.eng.text
|
27.6 KB
|
AdSplit Separating Smartphone Advertising from Applications - Shashi Shekhar, Michael Dietz, Dan S. Wallach.eng.tsv
|
35.4 KB
|
AdSplit Separating Smartphone Advertising from Applications - Shashi Shekhar, Michael Dietz, Dan S. Wallach.eng.txt
|
41.8 KB
|
AdSplit Separating Smartphone Advertising from Applications - Shashi Shekhar, Michael Dietz, Dan S. Wallach.eng.vtt
|
36.3 KB
|
An Evaluation of the Google Chrome Extension Security Architecture - Nicholas Carlini, Adrienne Porter Felt, David Wagner.eng.json
|
1.3 MB
|
An Evaluation of the Google Chrome Extension Security Architecture - Nicholas Carlini, Adrienne Porter Felt, David Wagner.eng.lrc
|
34.9 KB
|
An Evaluation of the Google Chrome Extension Security Architecture - Nicholas Carlini, Adrienne Porter Felt, David Wagner.eng.srt
|
37.0 KB
|
An Evaluation of the Google Chrome Extension Security Architecture - Nicholas Carlini, Adrienne Porter Felt, David Wagner.eng.text
|
26.9 KB
|
An Evaluation of the Google Chrome Extension Security Architecture - Nicholas Carlini, Adrienne Porter Felt, David Wagner.eng.tsv
|
31.5 KB
|
An Evaluation of the Google Chrome Extension Security Architecture - Nicholas Carlini, Adrienne Porter Felt, David Wagner.eng.txt
|
35.2 KB
|
An Evaluation of the Google Chrome Extension Security Architecture - Nicholas Carlini, Adrienne Porter Felt, David Wagner.eng.vtt
|
34.2 KB
|
Aurasium Practical Policy Enforcement for Android Applications - Rubin Xu, Hassen Saidi, Ross Anderson.eng.json
|
1.3 MB
|
Aurasium Practical Policy Enforcement for Android Applications - Rubin Xu, Hassen Saidi, Ross Anderson.eng.lrc
|
37.2 KB
|
Aurasium Practical Policy Enforcement for Android Applications - Rubin Xu, Hassen Saidi, Ross Anderson.eng.srt
|
30.4 KB
|
Aurasium Practical Policy Enforcement for Android Applications - Rubin Xu, Hassen Saidi, Ross Anderson.eng.text
|
23.2 KB
|
Aurasium Practical Policy Enforcement for Android Applications - Rubin Xu, Hassen Saidi, Ross Anderson.eng.tsv
|
31.2 KB
|
Aurasium Practical Policy Enforcement for Android Applications - Rubin Xu, Hassen Saidi, Ross Anderson.eng.txt
|
37.8 KB
|
Aurasium Practical Policy Enforcement for Android Applications - Rubin Xu, Hassen Saidi, Ross Anderson.eng.vtt
|
28.3 KB
|
Babel Leveraging Email Delivery for Spam Mitigation - Gianluca Stringhini, Manuel Egele, Apostolis Zarras, Thorsten Holz, Christopher Kruegel, Giovanni Vigna.eng.json
|
1.2 MB
|
Babel Leveraging Email Delivery for Spam Mitigation - Gianluca Stringhini, Manuel Egele, Apostolis Zarras, Thorsten Holz, Christopher Kruegel, Giovanni Vigna.eng.lrc
|
31.4 KB
|
Babel Leveraging Email Delivery for Spam Mitigation - Gianluca Stringhini, Manuel Egele, Apostolis Zarras, Thorsten Holz, Christopher Kruegel, Giovanni Vigna.eng.srt
|
32.9 KB
|
Babel Leveraging Email Delivery for Spam Mitigation - Gianluca Stringhini, Manuel Egele, Apostolis Zarras, Thorsten Holz, Christopher Kruegel, Giovanni Vigna.eng.text
|
24.4 KB
|
Babel Leveraging Email Delivery for Spam Mitigation - Gianluca Stringhini, Manuel Egele, Apostolis Zarras, Thorsten Holz, Christopher Kruegel, Giovanni Vigna.eng.tsv
|
28.3 KB
|
Babel Leveraging Email Delivery for Spam Mitigation - Gianluca Stringhini, Manuel Egele, Apostolis Zarras, Thorsten Holz, Christopher Kruegel, Giovanni Vigna.eng.txt
|
31.7 KB
|
Babel Leveraging Email Delivery for Spam Mitigation - Gianluca Stringhini, Manuel Egele, Apostolis Zarras, Thorsten Holz, Christopher Kruegel, Giovanni Vigna.eng.vtt
|
30.5 KB
|
Billion-Gate Secure Computation with Malicious Adversaries - Benjamin Kreuter, abhi shelat, and Chih-hao Shen.eng.json
|
818.0 KB
|
Billion-Gate Secure Computation with Malicious Adversaries - Benjamin Kreuter, abhi shelat, and Chih-hao Shen.eng.lrc
|
21.0 KB
|
Billion-Gate Secure Computation with Malicious Adversaries - Benjamin Kreuter, abhi shelat, and Chih-hao Shen.eng.srt
|
22.6 KB
|
Billion-Gate Secure Computation with Malicious Adversaries - Benjamin Kreuter, abhi shelat, and Chih-hao Shen.eng.text
|
16.2 KB
|
Billion-Gate Secure Computation with Malicious Adversaries - Benjamin Kreuter, abhi shelat, and Chih-hao Shen.eng.tsv
|
18.9 KB
|
Billion-Gate Secure Computation with Malicious Adversaries - Benjamin Kreuter, abhi shelat, and Chih-hao Shen.eng.txt
|
21.2 KB
|
Billion-Gate Secure Computation with Malicious Adversaries - Benjamin Kreuter, abhi shelat, and Chih-hao Shen.eng.vtt
|
20.8 KB
|
Chimera A Declarative Language for Streaming Network Traffic Analysis - Kevin Borders, Jonathan Springer, Matthew Burnside.eng.json
|
1.2 MB
|
Chimera A Declarative Language for Streaming Network Traffic Analysis - Kevin Borders, Jonathan Springer, Matthew Burnside.eng.lrc
|
31.0 KB
|
Chimera A Declarative Language for Streaming Network Traffic Analysis - Kevin Borders, Jonathan Springer, Matthew Burnside.eng.srt
|
32.9 KB
|
Chimera A Declarative Language for Streaming Network Traffic Analysis - Kevin Borders, Jonathan Springer, Matthew Burnside.eng.text
|
24.2 KB
|
Chimera A Declarative Language for Streaming Network Traffic Analysis - Kevin Borders, Jonathan Springer, Matthew Burnside.eng.tsv
|
28.1 KB
|
Chimera A Declarative Language for Streaming Network Traffic Analysis - Kevin Borders, Jonathan Springer, Matthew Burnside.eng.txt
|
31.3 KB
|
Chimera A Declarative Language for Streaming Network Traffic Analysis - Kevin Borders, Jonathan Springer, Matthew Burnside.eng.vtt
|
30.5 KB
|
Clickjacking Attacks and Defenses - Lin-Shung Huang, Alex Moshchuk, Helen J. Wang, Stuart Schechter, Collin Jackson.eng.json
|
1.1 MB
|
Clickjacking Attacks and Defenses - Lin-Shung Huang, Alex Moshchuk, Helen J. Wang, Stuart Schechter, Collin Jackson.eng.lrc
|
27.6 KB
|
Clickjacking Attacks and Defenses - Lin-Shung Huang, Alex Moshchuk, Helen J. Wang, Stuart Schechter, Collin Jackson.eng.srt
|
30.8 KB
|
Clickjacking Attacks and Defenses - Lin-Shung Huang, Alex Moshchuk, Helen J. Wang, Stuart Schechter, Collin Jackson.eng.text
|
21.5 KB
|
Clickjacking Attacks and Defenses - Lin-Shung Huang, Alex Moshchuk, Helen J. Wang, Stuart Schechter, Collin Jackson.eng.tsv
|
24.9 KB
|
Clickjacking Attacks and Defenses - Lin-Shung Huang, Alex Moshchuk, Helen J. Wang, Stuart Schechter, Collin Jackson.eng.txt
|
27.8 KB
|
Clickjacking Attacks and Defenses - Lin-Shung Huang, Alex Moshchuk, Helen J. Wang, Stuart Schechter, Collin Jackson.eng.vtt
|
28.2 KB
|
Cyber Security Education in a Time of Change - Cynthia E. Irvine.eng.json
|
3.3 MB
|
Cyber Security Education in a Time of Change - Cynthia E. Irvine.eng.lrc
|
89.6 KB
|
Cyber Security Education in a Time of Change - Cynthia E. Irvine.eng.srt
|
91.2 KB
|
Cyber Security Education in a Time of Change - Cynthia E. Irvine.eng.text
|
63.8 KB
|
Cyber Security Education in a Time of Change - Cynthia E. Irvine.eng.tsv
|
78.4 KB
|
Cyber Security Education in a Time of Change - Cynthia E. Irvine.eng.txt
|
90.5 KB
|
Cyber Security Education in a Time of Change - Cynthia E. Irvine.eng.vtt
|
84.4 KB
|
Data Node Encrypted File System Efficient Secure Deletion for Flash Memory - Joel Reardon, Srdjan Capkun, David Basin.eng.json
|
1.8 MB
|
Data Node Encrypted File System Efficient Secure Deletion for Flash Memory - Joel Reardon, Srdjan Capkun, David Basin.eng.lrc
|
44.0 KB
|
Data Node Encrypted File System Efficient Secure Deletion for Flash Memory - Joel Reardon, Srdjan Capkun, David Basin.eng.srt
|
44.6 KB
|
Data Node Encrypted File System Efficient Secure Deletion for Flash Memory - Joel Reardon, Srdjan Capkun, David Basin.eng.text
|
32.6 KB
|
Data Node Encrypted File System Efficient Secure Deletion for Flash Memory - Joel Reardon, Srdjan Capkun, David Basin.eng.tsv
|
39.1 KB
|
Data Node Encrypted File System Efficient Secure Deletion for Flash Memory - Joel Reardon, Srdjan Capkun, David Basin.eng.txt
|
44.4 KB
|
Data Node Encrypted File System Efficient Secure Deletion for Flash Memory - Joel Reardon, Srdjan Capkun, David Basin.eng.vtt
|
41.2 KB
|
DroidScope Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis - Lok Kwong Yan, Heng Yin.eng.json
|
1.8 MB
|
DroidScope Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis - Lok Kwong Yan, Heng Yin.eng.lrc
|
51.0 KB
|
DroidScope Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis - Lok Kwong Yan, Heng Yin.eng.srt
|
42.5 KB
|
DroidScope Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis - Lok Kwong Yan, Heng Yin.eng.text
|
31.1 KB
|
DroidScope Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis - Lok Kwong Yan, Heng Yin.eng.tsv
|
42.6 KB
|
DroidScope Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis - Lok Kwong Yan, Heng Yin.eng.txt
|
51.7 KB
|
DroidScope Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis - Lok Kwong Yan, Heng Yin.eng.vtt
|
39.1 KB
|
Efficient and Scalable Socware Detection in Online Social Networks - Md Sazzadur Rahman, Ting-Kai Huang, Harsha V. Madhyastha, Michalis Faloutsos.eng.json
|
799.0 KB
|
Efficient and Scalable Socware Detection in Online Social Networks - Md Sazzadur Rahman, Ting-Kai Huang, Harsha V. Madhyastha, Michalis Faloutsos.eng.lrc
|
20.1 KB
|
Efficient and Scalable Socware Detection in Online Social Networks - Md Sazzadur Rahman, Ting-Kai Huang, Harsha V. Madhyastha, Michalis Faloutsos.eng.srt
|
21.5 KB
|
Efficient and Scalable Socware Detection in Online Social Networks - Md Sazzadur Rahman, Ting-Kai Huang, Harsha V. Madhyastha, Michalis Faloutsos.eng.text
|
15.8 KB
|
Efficient and Scalable Socware Detection in Online Social Networks - Md Sazzadur Rahman, Ting-Kai Huang, Harsha V. Madhyastha, Michalis Faloutsos.eng.tsv
|
18.2 KB
|
Efficient and Scalable Socware Detection in Online Social Networks - Md Sazzadur Rahman, Ting-Kai Huang, Harsha V. Madhyastha, Michalis Faloutsos.eng.txt
|
20.3 KB
|
Efficient and Scalable Socware Detection in Online Social Networks - Md Sazzadur Rahman, Ting-Kai Huang, Harsha V. Madhyastha, Michalis Faloutsos.eng.vtt
|
19.9 KB
|
Emerging Trends and Their Security Implications - Doug Burger.eng.json
|
3.0 MB
|
Emerging Trends and Their Security Implications - Doug Burger.eng.lrc
|
80.5 KB
|
Emerging Trends and Their Security Implications - Doug Burger.eng.srt
|
75.9 KB
|
Emerging Trends and Their Security Implications - Doug Burger.eng.text
|
56.9 KB
|
Emerging Trends and Their Security Implications - Doug Burger.eng.tsv
|
70.7 KB
|
Emerging Trends and Their Security Implications - Doug Burger.eng.txt
|
81.4 KB
|
Emerging Trends and Their Security Implications - Doug Burger.eng.vtt
|
70.4 KB
|
Enemy of the State A State-Aware Black-Box Web Vulnerability Scanner - Adam Doupe, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna.eng.json
|
1.3 MB
|
Enemy of the State A State-Aware Black-Box Web Vulnerability Scanner - Adam Doupe, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna.eng.lrc
|
31.8 KB
|
Enemy of the State A State-Aware Black-Box Web Vulnerability Scanner - Adam Doupe, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna.eng.srt
|
35.6 KB
|
Enemy of the State A State-Aware Black-Box Web Vulnerability Scanner - Adam Doupe, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna.eng.text
|
23.7 KB
|
Enemy of the State A State-Aware Black-Box Web Vulnerability Scanner - Adam Doupe, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna.eng.tsv
|
28.2 KB
|
Enemy of the State A State-Aware Black-Box Web Vulnerability Scanner - Adam Doupe, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna.eng.txt
|
32.1 KB
|
Enemy of the State A State-Aware Black-Box Web Vulnerability Scanner - Adam Doupe, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna.eng.vtt
|
32.3 KB
|
Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization - Cristiano Giuffrida, Anton Kuijsten, Andrew S. Tanenbaum.eng.json
|
1.7 MB
|
Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization - Cristiano Giuffrida, Anton Kuijsten, Andrew S. Tanenbaum.eng.lrc
|
52.8 KB
|
Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization - Cristiano Giuffrida, Anton Kuijsten, Andrew S. Tanenbaum.eng.srt
|
39.0 KB
|
Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization - Cristiano Giuffrida, Anton Kuijsten, Andrew S. Tanenbaum.eng.text
|
30.4 KB
|
Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization - Cristiano Giuffrida, Anton Kuijsten, Andrew S. Tanenbaum.eng.tsv
|
43.6 KB
|
Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization - Cristiano Giuffrida, Anton Kuijsten, Andrew S. Tanenbaum.eng.txt
|
53.6 KB
|
Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization - Cristiano Giuffrida, Anton Kuijsten, Andrew S. Tanenbaum.eng.vtt
|
36.4 KB
|
Establishing Browser Security Guarantees through Formal Shim Verification - Dongseok Jang, Zachary Tatlock, Sorin Lerner.eng.json
|
1.6 MB
|
Establishing Browser Security Guarantees through Formal Shim Verification - Dongseok Jang, Zachary Tatlock, Sorin Lerner.eng.lrc
|
41.9 KB
|
Establishing Browser Security Guarantees through Formal Shim Verification - Dongseok Jang, Zachary Tatlock, Sorin Lerner.eng.srt
|
44.9 KB
|
Establishing Browser Security Guarantees through Formal Shim Verification - Dongseok Jang, Zachary Tatlock, Sorin Lerner.eng.text
|
30.9 KB
|
Establishing Browser Security Guarantees through Formal Shim Verification - Dongseok Jang, Zachary Tatlock, Sorin Lerner.eng.tsv
|
37.2 KB
|
Establishing Browser Security Guarantees through Formal Shim Verification - Dongseok Jang, Zachary Tatlock, Sorin Lerner.eng.txt
|
42.3 KB
|
Establishing Browser Security Guarantees through Formal Shim Verification - Dongseok Jang, Zachary Tatlock, Sorin Lerner.eng.vtt
|
40.9 KB
|
Fuzzing with Code Fragments - Christian Holler, Kim Herzig, Andreas Zeller.eng.json
|
1.3 MB
|
Fuzzing with Code Fragments - Christian Holler, Kim Herzig, Andreas Zeller.eng.lrc
|
36.2 KB
|
Fuzzing with Code Fragments - Christian Holler, Kim Herzig, Andreas Zeller.eng.srt
|
32.7 KB
|
Fuzzing with Code Fragments - Christian Holler, Kim Herzig, Andreas Zeller.eng.text
|
23.9 KB
|
Fuzzing with Code Fragments - Christian Holler, Kim Herzig, Andreas Zeller.eng.tsv
|
30.7 KB
|
Fuzzing with Code Fragments - Christian Holler, Kim Herzig, Andreas Zeller.eng.txt
|
36.7 KB
|
Fuzzing with Code Fragments - Christian Holler, Kim Herzig, Andreas Zeller.eng.vtt
|
30.1 KB
|
Gone in 360 Seconds Hijacking with Hitag2 - Roel Verdult, Flavio D. Garcia, Josep Balasch, KU Leuven.eng.json
|
1.4 MB
|
Gone in 360 Seconds Hijacking with Hitag2 - Roel Verdult, Flavio D. Garcia, Josep Balasch, KU Leuven.eng.lrc
|
37.4 KB
|
Gone in 360 Seconds Hijacking with Hitag2 - Roel Verdult, Flavio D. Garcia, Josep Balasch, KU Leuven.eng.srt
|
43.3 KB
|
Gone in 360 Seconds Hijacking with Hitag2 - Roel Verdult, Flavio D. Garcia, Josep Balasch, KU Leuven.eng.text
|
24.6 KB
|
Gone in 360 Seconds Hijacking with Hitag2 - Roel Verdult, Flavio D. Garcia, Josep Balasch, KU Leuven.eng.tsv
|
32.0 KB
|
Gone in 360 Seconds Hijacking with Hitag2 - Roel Verdult, Flavio D. Garcia, Josep Balasch, KU Leuven.eng.txt
|
37.9 KB
|
Gone in 360 Seconds Hijacking with Hitag2 - Roel Verdult, Flavio D. Garcia, Josep Balasch, KU Leuven.eng.vtt
|
38.0 KB
|
How Does Your Password Measure Up - The Effect of Strength Meters on Password Creation - Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Mazu.eng.json
|
1.7 MB
|
How Does Your Password Measure Up - The Effect of Strength Meters on Password Creation - Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Mazu.eng.lrc
|
47.3 KB
|
How Does Your Password Measure Up - The Effect of Strength Meters on Password Creation - Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Mazu.eng.srt
|
43.3 KB
|
How Does Your Password Measure Up - The Effect of Strength Meters on Password Creation - Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Mazu.eng.text
|
30.8 KB
|
How Does Your Password Measure Up - The Effect of Strength Meters on Password Creation - Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Mazu.eng.tsv
|
40.2 KB
|
How Does Your Password Measure Up - The Effect of Strength Meters on Password Creation - Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Mazu.eng.txt
|
47.9 KB
|
How Does Your Password Measure Up - The Effect of Strength Meters on Password Creation - Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Mazu.eng.vtt
|
39.7 KB
|
I Forgot Your Password Randomness Attacks Against PHP Applications - George Argyros, Aggelos Kiayias.eng.json
|
1.2 MB
|
I Forgot Your Password Randomness Attacks Against PHP Applications - George Argyros, Aggelos Kiayias.eng.lrc
|
31.7 KB
|
I Forgot Your Password Randomness Attacks Against PHP Applications - George Argyros, Aggelos Kiayias.eng.srt
|
33.7 KB
|
I Forgot Your Password Randomness Attacks Against PHP Applications - George Argyros, Aggelos Kiayias.eng.text
|
23.5 KB
|
I Forgot Your Password Randomness Attacks Against PHP Applications - George Argyros, Aggelos Kiayias.eng.tsv
|
28.2 KB
|
I Forgot Your Password Randomness Attacks Against PHP Applications - George Argyros, Aggelos Kiayias.eng.txt
|
32.0 KB
|
I Forgot Your Password Randomness Attacks Against PHP Applications - George Argyros, Aggelos Kiayias.eng.vtt
|
30.8 KB
|
Impact of Spam Exposure on User Engagement - Anirban Dasgupta, - Kunal Punera, Justin M. Rao, Xuanhui Wang.eng.json
|
1.9 MB
|
Impact of Spam Exposure on User Engagement - Anirban Dasgupta, - Kunal Punera, Justin M. Rao, Xuanhui Wang.eng.lrc
|
47.5 KB
|
Impact of Spam Exposure on User Engagement - Anirban Dasgupta, - Kunal Punera, Justin M. Rao, Xuanhui Wang.eng.srt
|
55.3 KB
|
Impact of Spam Exposure on User Engagement - Anirban Dasgupta, - Kunal Punera, Justin M. Rao, Xuanhui Wang.eng.text
|
37.2 KB
|
Impact of Spam Exposure on User Engagement - Anirban Dasgupta, - Kunal Punera, Justin M. Rao, Xuanhui Wang.eng.tsv
|
43.1 KB
|
Impact of Spam Exposure on User Engagement - Anirban Dasgupta, - Kunal Punera, Justin M. Rao, Xuanhui Wang.eng.txt
|
47.9 KB
|
Impact of Spam Exposure on User Engagement - Anirban Dasgupta, - Kunal Punera, Justin M. Rao, Xuanhui Wang.eng.vtt
|
50.2 KB
|
Keynote - The Evolution of Information Assurance - Dickie George.eng.json
|
4.7 MB
|
Keynote - The Evolution of Information Assurance - Dickie George.eng.lrc
|
131.5 KB
|
Keynote - The Evolution of Information Assurance - Dickie George.eng.srt
|
127.1 KB
|
Keynote - The Evolution of Information Assurance - Dickie George.eng.text
|
80.0 KB
|
Keynote - The Evolution of Information Assurance - Dickie George.eng.tsv
|
108.0 KB
|
Keynote - The Evolution of Information Assurance - Dickie George.eng.txt
|
133.3 KB
|
Keynote - The Evolution of Information Assurance - Dickie George.eng.vtt
|
115.5 KB
|
kGuard Lightweight Kernel Protection against Return-to-User Attacks - Vasileios P. Kemerlis, Georgios Portokalidis, Angelos D. Keromytis.eng.json
|
1.3 MB
|
kGuard Lightweight Kernel Protection against Return-to-User Attacks - Vasileios P. Kemerlis, Georgios Portokalidis, Angelos D. Keromytis.eng.lrc
|
38.6 KB
|
kGuard Lightweight Kernel Protection against Return-to-User Attacks - Vasileios P. Kemerlis, Georgios Portokalidis, Angelos D. Keromytis.eng.srt
|
27.6 KB
|
kGuard Lightweight Kernel Protection against Return-to-User Attacks - Vasileios P. Kemerlis, Georgios Portokalidis, Angelos D. Keromytis.eng.text
|
21.3 KB
|
kGuard Lightweight Kernel Protection against Return-to-User Attacks - Vasileios P. Kemerlis, Georgios Portokalidis, Angelos D. Keromytis.eng.tsv
|
30.9 KB
|
kGuard Lightweight Kernel Protection against Return-to-User Attacks - Vasileios P. Kemerlis, Georgios Portokalidis, Angelos D. Keromytis.eng.txt
|
39.3 KB
|
kGuard Lightweight Kernel Protection against Return-to-User Attacks - Vasileios P. Kemerlis, Georgios Portokalidis, Angelos D. Keromytis.eng.vtt
|
25.7 KB
|
Let Me Answer That for You Exploiting Broadcast Information in Cellular Networks - golde.eng.json
|
1.5 MB
|
Let Me Answer That for You Exploiting Broadcast Information in Cellular Networks - golde.eng.lrc
|
42.3 KB
|
Let Me Answer That for You Exploiting Broadcast Information in Cellular Networks - golde.eng.srt
|
38.3 KB
|
Let Me Answer That for You Exploiting Broadcast Information in Cellular Networks - golde.eng.text
|
26.3 KB
|
Let Me Answer That for You Exploiting Broadcast Information in Cellular Networks - golde.eng.tsv
|
35.5 KB
|
Let Me Answer That for You Exploiting Broadcast Information in Cellular Networks - golde.eng.txt
|
42.9 KB
|
Let Me Answer That for You Exploiting Broadcast Information in Cellular Networks - golde.eng.vtt
|
34.8 KB
|
Life as a Target-Welcome to the Club - Dickie George.eng.json
|
3.3 MB
|
Life as a Target-Welcome to the Club - Dickie George.eng.lrc
|
85.3 KB
|
Life as a Target-Welcome to the Club - Dickie George.eng.srt
|
93.8 KB
|
Life as a Target-Welcome to the Club - Dickie George.eng.text
|
57.0 KB
|
Life as a Target-Welcome to the Club - Dickie George.eng.tsv
|
73.4 KB
|
Life as a Target-Welcome to the Club - Dickie George.eng.txt
|
86.3 KB
|
Life as a Target-Welcome to the Club - Dickie George.eng.vtt
|
83.6 KB
|
Mining Your Ps and Qs Detection of Widespread Weak Keys in Network Devices - Nadia Heninger, Zakir Durumeric, Eric Wustrow, J. Alex Halderm.eng.json
|
1.5 MB
|
Mining Your Ps and Qs Detection of Widespread Weak Keys in Network Devices - Nadia Heninger, Zakir Durumeric, Eric Wustrow, J. Alex Halderm.eng.lrc
|
38.6 KB
|
Mining Your Ps and Qs Detection of Widespread Weak Keys in Network Devices - Nadia Heninger, Zakir Durumeric, Eric Wustrow, J. Alex Halderm.eng.srt
|
40.4 KB
|
Mining Your Ps and Qs Detection of Widespread Weak Keys in Network Devices - Nadia Heninger, Zakir Durumeric, Eric Wustrow, J. Alex Halderm.eng.text
|
28.2 KB
|
Mining Your Ps and Qs Detection of Widespread Weak Keys in Network Devices - Nadia Heninger, Zakir Durumeric, Eric Wustrow, J. Alex Halderm.eng.tsv
|
34.2 KB
|
Mining Your Ps and Qs Detection of Widespread Weak Keys in Network Devices - Nadia Heninger, Zakir Durumeric, Eric Wustrow, J. Alex Halderm.eng.txt
|
39.0 KB
|
Mining Your Ps and Qs Detection of Widespread Weak Keys in Network Devices - Nadia Heninger, Zakir Durumeric, Eric Wustrow, J. Alex Halderm.eng.vtt
|
36.9 KB
|
Nature is a Language Can't You Read - Meredith L. Patterson.eng.json
|
2.3 MB
|
Nature is a Language Can't You Read - Meredith L. Patterson.eng.lrc
|
62.0 KB
|
Nature is a Language Can't You Read - Meredith L. Patterson.eng.srt
|
61.8 KB
|
Nature is a Language Can't You Read - Meredith L. Patterson.eng.text
|
43.1 KB
|
Nature is a Language Can't You Read - Meredith L. Patterson.eng.tsv
|
54.2 KB
|
Nature is a Language Can't You Read - Meredith L. Patterson.eng.txt
|
62.7 KB
|
Nature is a Language Can't You Read - Meredith L. Patterson.eng.vtt
|
56.4 KB
|
Neuroscience Meets Cryptography Designing Crypto Primitives Secure Against Rubber Hose Attacks - Hristo Bojinov, Daniel Sanchez, Paul Reber, Northw.eng.json
|
1.4 MB
|
Neuroscience Meets Cryptography Designing Crypto Primitives Secure Against Rubber Hose Attacks - Hristo Bojinov, Daniel Sanchez, Paul Reber, Northw.eng.lrc
|
39.6 KB
|
Neuroscience Meets Cryptography Designing Crypto Primitives Secure Against Rubber Hose Attacks - Hristo Bojinov, Daniel Sanchez, Paul Reber, Northw.eng.srt
|
34.5 KB
|
Neuroscience Meets Cryptography Designing Crypto Primitives Secure Against Rubber Hose Attacks - Hristo Bojinov, Daniel Sanchez, Paul Reber, Northw.eng.text
|
24.5 KB
|
Neuroscience Meets Cryptography Designing Crypto Primitives Secure Against Rubber Hose Attacks - Hristo Bojinov, Daniel Sanchez, Paul Reber, Northw.eng.tsv
|
33.2 KB
|
Neuroscience Meets Cryptography Designing Crypto Primitives Secure Against Rubber Hose Attacks - Hristo Bojinov, Daniel Sanchez, Paul Reber, Northw.eng.txt
|
40.2 KB
|
Neuroscience Meets Cryptography Designing Crypto Primitives Secure Against Rubber Hose Attacks - Hristo Bojinov, Daniel Sanchez, Paul Reber, Northw.eng.vtt
|
31.6 KB
|
New Attacks on Timing-based Network Flow Watermarks - Zi Lin, Nicholas Hopper.eng.json
|
1.0 MB
|
New Attacks on Timing-based Network Flow Watermarks - Zi Lin, Nicholas Hopper.eng.lrc
|
25.4 KB
|
New Attacks on Timing-based Network Flow Watermarks - Zi Lin, Nicholas Hopper.eng.srt
|
25.6 KB
|
New Attacks on Timing-based Network Flow Watermarks - Zi Lin, Nicholas Hopper.eng.text
|
19.4 KB
|
New Attacks on Timing-based Network Flow Watermarks - Zi Lin, Nicholas Hopper.eng.tsv
|
22.8 KB
|
New Attacks on Timing-based Network Flow Watermarks - Zi Lin, Nicholas Hopper.eng.txt
|
25.6 KB
|
New Attacks on Timing-based Network Flow Watermarks - Zi Lin, Nicholas Hopper.eng.vtt
|
23.9 KB
|
On Breaking SAML Be Whoever You Want to Be - Juraj Somorovsky, Andreas Mayer, Jorg Schwenk, Marco Kampmann, Meiko Jensen.eng.json
|
1.1 MB
|
On Breaking SAML Be Whoever You Want to Be - Juraj Somorovsky, Andreas Mayer, Jorg Schwenk, Marco Kampmann, Meiko Jensen.eng.lrc
|
28.0 KB
|
On Breaking SAML Be Whoever You Want to Be - Juraj Somorovsky, Andreas Mayer, Jorg Schwenk, Marco Kampmann, Meiko Jensen.eng.srt
|
31.2 KB
|
On Breaking SAML Be Whoever You Want to Be - Juraj Somorovsky, Andreas Mayer, Jorg Schwenk, Marco Kampmann, Meiko Jensen.eng.text
|
21.8 KB
|
On Breaking SAML Be Whoever You Want to Be - Juraj Somorovsky, Andreas Mayer, Jorg Schwenk, Marco Kampmann, Meiko Jensen.eng.tsv
|
25.3 KB
|
On Breaking SAML Be Whoever You Want to Be - Juraj Somorovsky, Andreas Mayer, Jorg Schwenk, Marco Kampmann, Meiko Jensen.eng.txt
|
28.2 KB
|
On Breaking SAML Be Whoever You Want to Be - Juraj Somorovsky, Andreas Mayer, Jorg Schwenk, Marco Kampmann, Meiko Jensen.eng.vtt
|
28.6 KB
|
On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces - Ivan Martinovic, Doug Davies, Mario Frank, Daniele Perito, Tomas Ros, Dawn Song.eng.json
|
1.2 MB
|
On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces - Ivan Martinovic, Doug Davies, Mario Frank, Daniele Perito, Tomas Ros, Dawn Song.eng.lrc
|
30.6 KB
|
On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces - Ivan Martinovic, Doug Davies, Mario Frank, Daniele Perito, Tomas Ros, Dawn Song.eng.srt
|
32.2 KB
|
On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces - Ivan Martinovic, Doug Davies, Mario Frank, Daniele Perito, Tomas Ros, Dawn Song.eng.text
|
23.7 KB
|
On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces - Ivan Martinovic, Doug Davies, Mario Frank, Daniele Perito, Tomas Ros, Dawn Song.eng.tsv
|
27.6 KB
|
On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces - Ivan Martinovic, Doug Davies, Mario Frank, Daniele Perito, Tomas Ros, Dawn Song.eng.txt
|
30.8 KB
|
On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces - Ivan Martinovic, Doug Davies, Mario Frank, Daniele Perito, Tomas Ros, Dawn Song.eng.vtt
|
29.8 KB
|
Optimally Robust Private Information Retrieval - Casey Devet, Ian Goldberg, Nadia Heninger.eng.json
|
1.1 MB
|
Optimally Robust Private Information Retrieval - Casey Devet, Ian Goldberg, Nadia Heninger.eng.lrc
|
28.3 KB
|
Optimally Robust Private Information Retrieval - Casey Devet, Ian Goldberg, Nadia Heninger.eng.srt
|
30.9 KB
|
Optimally Robust Private Information Retrieval - Casey Devet, Ian Goldberg, Nadia Heninger.eng.text
|
21.9 KB
|
Optimally Robust Private Information Retrieval - Casey Devet, Ian Goldberg, Nadia Heninger.eng.tsv
|
25.5 KB
|
Optimally Robust Private Information Retrieval - Casey Devet, Ian Goldberg, Nadia Heninger.eng.txt
|
28.6 KB
|
Optimally Robust Private Information Retrieval - Casey Devet, Ian Goldberg, Nadia Heninger.eng.vtt
|
28.4 KB
|
Origin-Bound Certificates A Fresh Approach to Strong Client Authentication for the Web - Michael Dietz, Alexei Czeskis, Dirk Balfanz, Dan S. Wallach.eng.json
|
1.4 MB
|
Origin-Bound Certificates A Fresh Approach to Strong Client Authentication for the Web - Michael Dietz, Alexei Czeskis, Dirk Balfanz, Dan S. Wallach.eng.lrc
|
38.3 KB
|
Origin-Bound Certificates A Fresh Approach to Strong Client Authentication for the Web - Michael Dietz, Alexei Czeskis, Dirk Balfanz, Dan S. Wallach.eng.srt
|
37.0 KB
|
Origin-Bound Certificates A Fresh Approach to Strong Client Authentication for the Web - Michael Dietz, Alexei Czeskis, Dirk Balfanz, Dan S. Wallach.eng.text
|
27.4 KB
|
Origin-Bound Certificates A Fresh Approach to Strong Client Authentication for the Web - Michael Dietz, Alexei Czeskis, Dirk Balfanz, Dan S. Wallach.eng.tsv
|
33.5 KB
|
Origin-Bound Certificates A Fresh Approach to Strong Client Authentication for the Web - Michael Dietz, Alexei Czeskis, Dirk Balfanz, Dan S. Wallach.eng.txt
|
38.7 KB
|
Origin-Bound Certificates A Fresh Approach to Strong Client Authentication for the Web - Michael Dietz, Alexei Czeskis, Dirk Balfanz, Dan S. Wallach.eng.vtt
|
34.3 KB
|
PharmaLeaks Understanding the Business of Online Pharmaceutical Affiliate Programs - Damon McCoy, Andreas Pitsillidis, Grant Jordan, Nicholas Weaver, Christian Kreibich, Brian Kreb.eng.json
|
1.6 MB
|
PharmaLeaks Understanding the Business of Online Pharmaceutical Affiliate Programs - Damon McCoy, Andreas Pitsillidis, Grant Jordan, Nicholas Weaver, Christian Kreibich, Brian Kreb.eng.lrc
|
43.4 KB
|
PharmaLeaks Understanding the Business of Online Pharmaceutical Affiliate Programs - Damon McCoy, Andreas Pitsillidis, Grant Jordan, Nicholas Weaver, Christian Kreibich, Brian Kreb.eng.srt
|
43.0 KB
|
PharmaLeaks Understanding the Business of Online Pharmaceutical Affiliate Programs - Damon McCoy, Andreas Pitsillidis, Grant Jordan, Nicholas Weaver, Christian Kreibich, Brian Kreb.eng.text
|
31.0 KB
|
PharmaLeaks Understanding the Business of Online Pharmaceutical Affiliate Programs - Damon McCoy, Andreas Pitsillidis, Grant Jordan, Nicholas Weaver, Christian Kreibich, Brian Kreb.eng.tsv
|
38.0 KB
|
PharmaLeaks Understanding the Business of Online Pharmaceutical Affiliate Programs - Damon McCoy, Andreas Pitsillidis, Grant Jordan, Nicholas Weaver, Christian Kreibich, Brian Kreb.eng.txt
|
43.8 KB
|
PharmaLeaks Understanding the Business of Online Pharmaceutical Affiliate Programs - Damon McCoy, Andreas Pitsillidis, Grant Jordan, Nicholas Weaver, Christian Kreibich, Brian Kreb.eng.vtt
|
39.6 KB
|
Policy-Sealed Data A New Abstraction for Building Trusted Cloud Services - Nuno Santos, Rodrigo Rodrigues, Krishna P. Gummadi.eng.json
|
1.1 MB
|
Policy-Sealed Data A New Abstraction for Building Trusted Cloud Services - Nuno Santos, Rodrigo Rodrigues, Krishna P. Gummadi.eng.lrc
|
31.2 KB
|
Policy-Sealed Data A New Abstraction for Building Trusted Cloud Services - Nuno Santos, Rodrigo Rodrigues, Krishna P. Gummadi.eng.srt
|
28.7 KB
|
Policy-Sealed Data A New Abstraction for Building Trusted Cloud Services - Nuno Santos, Rodrigo Rodrigues, Krishna P. Gummadi.eng.text
|
22.1 KB
|
Policy-Sealed Data A New Abstraction for Building Trusted Cloud Services - Nuno Santos, Rodrigo Rodrigues, Krishna P. Gummadi.eng.tsv
|
27.3 KB
|
Policy-Sealed Data A New Abstraction for Building Trusted Cloud Services - Nuno Santos, Rodrigo Rodrigues, Krishna P. Gummadi.eng.txt
|
31.6 KB
|
Policy-Sealed Data A New Abstraction for Building Trusted Cloud Services - Nuno Santos, Rodrigo Rodrigues, Krishna P. Gummadi.eng.vtt
|
26.8 KB
|
Privacy-Preserving Social Plugins - Georgios Kontaxis, Michalis Polychronakis, Angelos D. Keromytis, Evangelos P. Markatos.eng.json
|
1.3 MB
|
Privacy-Preserving Social Plugins - Georgios Kontaxis, Michalis Polychronakis, Angelos D. Keromytis, Evangelos P. Markatos.eng.lrc
|
37.1 KB
|
Privacy-Preserving Social Plugins - Georgios Kontaxis, Michalis Polychronakis, Angelos D. Keromytis, Evangelos P. Markatos.eng.srt
|
30.7 KB
|
Privacy-Preserving Social Plugins - Georgios Kontaxis, Michalis Polychronakis, Angelos D. Keromytis, Evangelos P. Markatos.eng.text
|
23.6 KB
|
Privacy-Preserving Social Plugins - Georgios Kontaxis, Michalis Polychronakis, Angelos D. Keromytis, Evangelos P. Markatos.eng.tsv
|
31.3 KB
|
Privacy-Preserving Social Plugins - Georgios Kontaxis, Michalis Polychronakis, Angelos D. Keromytis, Evangelos P. Markatos.eng.txt
|
37.6 KB
|
Privacy-Preserving Social Plugins - Georgios Kontaxis, Michalis Polychronakis, Angelos D. Keromytis, Evangelos P. Markatos.eng.vtt
|
28.7 KB
|
Privilege Separation in HTML5 Applications - Devdatta Akhawe, Prateek Saxena, Dawn Song.eng.json
|
1.1 MB
|
Privilege Separation in HTML5 Applications - Devdatta Akhawe, Prateek Saxena, Dawn Song.eng.lrc
|
28.6 KB
|
Privilege Separation in HTML5 Applications - Devdatta Akhawe, Prateek Saxena, Dawn Song.eng.srt
|
32.1 KB
|
Privilege Separation in HTML5 Applications - Devdatta Akhawe, Prateek Saxena, Dawn Song.eng.text
|
21.3 KB
|
Privilege Separation in HTML5 Applications - Devdatta Akhawe, Prateek Saxena, Dawn Song.eng.tsv
|
25.3 KB
|
Privilege Separation in HTML5 Applications - Devdatta Akhawe, Prateek Saxena, Dawn Song.eng.txt
|
28.9 KB
|
Privilege Separation in HTML5 Applications - Devdatta Akhawe, Prateek Saxena, Dawn Song.eng.vtt
|
29.1 KB
|
Progressive Authentication Deciding When to Authenticate on Mobile Phones - Oriana Riva, Chuan Qin, Karin Strauss, Dimitrios Lymberopoulos.eng.json
|
1.2 MB
|
Progressive Authentication Deciding When to Authenticate on Mobile Phones - Oriana Riva, Chuan Qin, Karin Strauss, Dimitrios Lymberopoulos.eng.lrc
|
32.0 KB
|
Progressive Authentication Deciding When to Authenticate on Mobile Phones - Oriana Riva, Chuan Qin, Karin Strauss, Dimitrios Lymberopoulos.eng.srt
|
33.1 KB
|
Progressive Authentication Deciding When to Authenticate on Mobile Phones - Oriana Riva, Chuan Qin, Karin Strauss, Dimitrios Lymberopoulos.eng.text
|
24.7 KB
|
Progressive Authentication Deciding When to Authenticate on Mobile Phones - Oriana Riva, Chuan Qin, Karin Strauss, Dimitrios Lymberopoulos.eng.tsv
|
28.8 KB
|
Progressive Authentication Deciding When to Authenticate on Mobile Phones - Oriana Riva, Chuan Qin, Karin Strauss, Dimitrios Lymberopoulos.eng.txt
|
32.2 KB
|
Progressive Authentication Deciding When to Authenticate on Mobile Phones - Oriana Riva, Chuan Qin, Karin Strauss, Dimitrios Lymberopoulos.eng.vtt
|
30.7 KB
|
PUBCRAWL Protecting Users and Businesses from CRAWLers - Gregoire Jacob, Engin Kirda, Christopher Kruegel, Giovanni Vigna.eng.json
|
1.3 MB
|
PUBCRAWL Protecting Users and Businesses from CRAWLers - Gregoire Jacob, Engin Kirda, Christopher Kruegel, Giovanni Vigna.eng.lrc
|
34.2 KB
|
PUBCRAWL Protecting Users and Businesses from CRAWLers - Gregoire Jacob, Engin Kirda, Christopher Kruegel, Giovanni Vigna.eng.srt
|
36.2 KB
|
PUBCRAWL Protecting Users and Businesses from CRAWLers - Gregoire Jacob, Engin Kirda, Christopher Kruegel, Giovanni Vigna.eng.text
|
26.5 KB
|
PUBCRAWL Protecting Users and Businesses from CRAWLers - Gregoire Jacob, Engin Kirda, Christopher Kruegel, Giovanni Vigna.eng.tsv
|
30.9 KB
|
PUBCRAWL Protecting Users and Businesses from CRAWLers - Gregoire Jacob, Engin Kirda, Christopher Kruegel, Giovanni Vigna.eng.txt
|
34.5 KB
|
PUBCRAWL Protecting Users and Businesses from CRAWLers - Gregoire Jacob, Engin Kirda, Christopher Kruegel, Giovanni Vigna.eng.vtt
|
33.4 KB
|
Securing Early Software Development - Riley Eller.eng.json
|
1.9 MB
|
Securing Early Software Development - Riley Eller.eng.lrc
|
57.3 KB
|
Securing Early Software Development - Riley Eller.eng.srt
|
44.4 KB
|
Securing Early Software Development - Riley Eller.eng.text
|
32.4 KB
|
Securing Early Software Development - Riley Eller.eng.tsv
|
46.8 KB
|
Securing Early Software Development - Riley Eller.eng.txt
|
58.2 KB
|
Securing Early Software Development - Riley Eller.eng.vtt
|
40.8 KB
|
Security and Usability Challenges of Moving-Object CAPTCHAs Decoding Codewords in Motion - Y. Xu, G. Reynaga, S. Chiasson, J.-M. Frahm, F. Monrose, P. van Oorschot.eng.json
|
1.2 MB
|
Security and Usability Challenges of Moving-Object CAPTCHAs Decoding Codewords in Motion - Y. Xu, G. Reynaga, S. Chiasson, J.-M. Frahm, F. Monrose, P. van Oorschot.eng.lrc
|
30.3 KB
|
Security and Usability Challenges of Moving-Object CAPTCHAs Decoding Codewords in Motion - Y. Xu, G. Reynaga, S. Chiasson, J.-M. Frahm, F. Monrose, P. van Oorschot.eng.srt
|
32.5 KB
|
Security and Usability Challenges of Moving-Object CAPTCHAs Decoding Codewords in Motion - Y. Xu, G. Reynaga, S. Chiasson, J.-M. Frahm, F. Monrose, P. van Oorschot.eng.text
|
23.4 KB
|
Security and Usability Challenges of Moving-Object CAPTCHAs Decoding Codewords in Motion - Y. Xu, G. Reynaga, S. Chiasson, J.-M. Frahm, F. Monrose, P. van Oorschot.eng.tsv
|
27.3 KB
|
Security and Usability Challenges of Moving-Object CAPTCHAs Decoding Codewords in Motion - Y. Xu, G. Reynaga, S. Chiasson, J.-M. Frahm, F. Monrose, P. van Oorschot.eng.txt
|
30.6 KB
|
Security and Usability Challenges of Moving-Object CAPTCHAs Decoding Codewords in Motion - Y. Xu, G. Reynaga, S. Chiasson, J.-M. Frahm, F. Monrose, P. van Oorschot.eng.vtt
|
30.0 KB
|
Social Networking with Frientegrity Privacy and Integrity with an Untrusted Provider - Ariel J. Feldman, Aaron Blankstein, Michael J. Freedman, Edward W. Felten.eng.json
|
1.3 MB
|
Social Networking with Frientegrity Privacy and Integrity with an Untrusted Provider - Ariel J. Feldman, Aaron Blankstein, Michael J. Freedman, Edward W. Felten.eng.lrc
|
33.1 KB
|
Social Networking with Frientegrity Privacy and Integrity with an Untrusted Provider - Ariel J. Feldman, Aaron Blankstein, Michael J. Freedman, Edward W. Felten.eng.srt
|
34.8 KB
|
Social Networking with Frientegrity Privacy and Integrity with an Untrusted Provider - Ariel J. Feldman, Aaron Blankstein, Michael J. Freedman, Edward W. Felten.eng.text
|
25.6 KB
|
Social Networking with Frientegrity Privacy and Integrity with an Untrusted Provider - Ariel J. Feldman, Aaron Blankstein, Michael J. Freedman, Edward W. Felten.eng.tsv
|
30.0 KB
|
Social Networking with Frientegrity Privacy and Integrity with an Untrusted Provider - Ariel J. Feldman, Aaron Blankstein, Michael J. Freedman, Edward W. Felten.eng.txt
|
33.4 KB
|
Social Networking with Frientegrity Privacy and Integrity with an Untrusted Provider - Ariel J. Feldman, Aaron Blankstein, Michael J. Freedman, Edward W. Felten.eng.vtt
|
32.2 KB
|
STEALTHMEM System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud - Taesoo Kim, Marcus Peinado, Gloria Mainar-Ruiz.eng.json
|
1.1 MB
|
STEALTHMEM System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud - Taesoo Kim, Marcus Peinado, Gloria Mainar-Ruiz.eng.lrc
|
27.6 KB
|
STEALTHMEM System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud - Taesoo Kim, Marcus Peinado, Gloria Mainar-Ruiz.eng.srt
|
30.5 KB
|
STEALTHMEM System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud - Taesoo Kim, Marcus Peinado, Gloria Mainar-Ruiz.eng.text
|
21.6 KB
|
STEALTHMEM System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud - Taesoo Kim, Marcus Peinado, Gloria Mainar-Ruiz.eng.tsv
|
25.0 KB
|
STEALTHMEM System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud - Taesoo Kim, Marcus Peinado, Gloria Mainar-Ruiz.eng.txt
|
27.9 KB
|
STEALTHMEM System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud - Taesoo Kim, Marcus Peinado, Gloria Mainar-Ruiz.eng.vtt
|
28.0 KB
|
STING Finding Name Resolution Vulnerabilities in Programs - Hayawardh Vijayakumar, Joshua Schiffman, Trent Jaeger.eng.json
|
1.2 MB
|
STING Finding Name Resolution Vulnerabilities in Programs - Hayawardh Vijayakumar, Joshua Schiffman, Trent Jaeger.eng.lrc
|
30.2 KB
|
STING Finding Name Resolution Vulnerabilities in Programs - Hayawardh Vijayakumar, Joshua Schiffman, Trent Jaeger.eng.srt
|
32.4 KB
|
STING Finding Name Resolution Vulnerabilities in Programs - Hayawardh Vijayakumar, Joshua Schiffman, Trent Jaeger.eng.text
|
23.0 KB
|
STING Finding Name Resolution Vulnerabilities in Programs - Hayawardh Vijayakumar, Joshua Schiffman, Trent Jaeger.eng.tsv
|
27.1 KB
|
STING Finding Name Resolution Vulnerabilities in Programs - Hayawardh Vijayakumar, Joshua Schiffman, Trent Jaeger.eng.txt
|
30.5 KB
|
STING Finding Name Resolution Vulnerabilities in Programs - Hayawardh Vijayakumar, Joshua Schiffman, Trent Jaeger.eng.vtt
|
29.8 KB
|
Tachyon Tandem Execution for Efficient Live Patch Testing - Matthew Maurer, David Brumley.eng.json
|
1.4 MB
|
Tachyon Tandem Execution for Efficient Live Patch Testing - Matthew Maurer, David Brumley.eng.lrc
|
37.8 KB
|
Tachyon Tandem Execution for Efficient Live Patch Testing - Matthew Maurer, David Brumley.eng.srt
|
36.3 KB
|
Tachyon Tandem Execution for Efficient Live Patch Testing - Matthew Maurer, David Brumley.eng.text
|
27.4 KB
|
Tachyon Tandem Execution for Efficient Live Patch Testing - Matthew Maurer, David Brumley.eng.tsv
|
33.2 KB
|
Tachyon Tandem Execution for Efficient Live Patch Testing - Matthew Maurer, David Brumley.eng.txt
|
38.2 KB
|
Tachyon Tandem Execution for Efficient Live Patch Testing - Matthew Maurer, David Brumley.eng.vtt
|
33.7 KB
|
Taking Proof-Based Verified Computation a Few Steps Closer to Practicality - Srinath Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Andrew J. Blumberg, Michael Walfish.eng.json
|
871.0 KB
|
Taking Proof-Based Verified Computation a Few Steps Closer to Practicality - Srinath Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Andrew J. Blumberg, Michael Walfish.eng.lrc
|
23.8 KB
|
Taking Proof-Based Verified Computation a Few Steps Closer to Practicality - Srinath Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Andrew J. Blumberg, Michael Walfish.eng.srt
|
25.1 KB
|
Taking Proof-Based Verified Computation a Few Steps Closer to Practicality - Srinath Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Andrew J. Blumberg, Michael Walfish.eng.text
|
18.5 KB
|
Taking Proof-Based Verified Computation a Few Steps Closer to Practicality - Srinath Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Andrew J. Blumberg, Michael Walfish.eng.tsv
|
21.4 KB
|
Taking Proof-Based Verified Computation a Few Steps Closer to Practicality - Srinath Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Andrew J. Blumberg, Michael Walfish.eng.txt
|
24.0 KB
|
Taking Proof-Based Verified Computation a Few Steps Closer to Practicality - Srinath Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Andrew J. Blumberg, Michael Walfish.eng.vtt
|
23.3 KB
|
TARDIS Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without Clocks - Amir Rahmati, Mastooreh Salajegheh, Dan Holcomb, Jacob Sorber, Wayne P. B.eng.json
|
1.1 MB
|
TARDIS Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without Clocks - Amir Rahmati, Mastooreh Salajegheh, Dan Holcomb, Jacob Sorber, Wayne P. B.eng.lrc
|
27.6 KB
|
TARDIS Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without Clocks - Amir Rahmati, Mastooreh Salajegheh, Dan Holcomb, Jacob Sorber, Wayne P. B.eng.srt
|
28.9 KB
|
TARDIS Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without Clocks - Amir Rahmati, Mastooreh Salajegheh, Dan Holcomb, Jacob Sorber, Wayne P. B.eng.text
|
21.5 KB
|
TARDIS Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without Clocks - Amir Rahmati, Mastooreh Salajegheh, Dan Holcomb, Jacob Sorber, Wayne P. B.eng.tsv
|
25.0 KB
|
TARDIS Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without Clocks - Amir Rahmati, Mastooreh Salajegheh, Dan Holcomb, Jacob Sorber, Wayne P. B.eng.txt
|
27.9 KB
|
TARDIS Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without Clocks - Amir Rahmati, Mastooreh Salajegheh, Dan Holcomb, Jacob Sorber, Wayne P. B.eng.vtt
|
26.8 KB
|
Throttling Tor Bandwidth Parasites - Rob Jansen, Paul Syverson, Nicholas Hopper.eng.json
|
955.9 KB
|
Throttling Tor Bandwidth Parasites - Rob Jansen, Paul Syverson, Nicholas Hopper.eng.lrc
|
25.7 KB
|
Throttling Tor Bandwidth Parasites - Rob Jansen, Paul Syverson, Nicholas Hopper.eng.srt
|
26.0 KB
|
Throttling Tor Bandwidth Parasites - Rob Jansen, Paul Syverson, Nicholas Hopper.eng.text
|
18.5 KB
|
Throttling Tor Bandwidth Parasites - Rob Jansen, Paul Syverson, Nicholas Hopper.eng.tsv
|
22.5 KB
|
Throttling Tor Bandwidth Parasites - Rob Jansen, Paul Syverson, Nicholas Hopper.eng.txt
|
26.0 KB
|
Throttling Tor Bandwidth Parasites - Rob Jansen, Paul Syverson, Nicholas Hopper.eng.vtt
|
23.9 KB
|
Tracking Rootkit Footprints with a Practical Memory Analysis System - Weidong Cui, Marcus Peinado, Zhilei Xu, Ellick Chan.eng.json
|
828.1 KB
|
Tracking Rootkit Footprints with a Practical Memory Analysis System - Weidong Cui, Marcus Peinado, Zhilei Xu, Ellick Chan.eng.lrc
|
21.0 KB
|
Tracking Rootkit Footprints with a Practical Memory Analysis System - Weidong Cui, Marcus Peinado, Zhilei Xu, Ellick Chan.eng.srt
|
24.2 KB
|
Tracking Rootkit Footprints with a Practical Memory Analysis System - Weidong Cui, Marcus Peinado, Zhilei Xu, Ellick Chan.eng.text
|
16.3 KB
|
Tracking Rootkit Footprints with a Practical Memory Analysis System - Weidong Cui, Marcus Peinado, Zhilei Xu, Ellick Chan.eng.tsv
|
18.9 KB
|
Tracking Rootkit Footprints with a Practical Memory Analysis System - Weidong Cui, Marcus Peinado, Zhilei Xu, Ellick Chan.eng.txt
|
21.2 KB
|
Tracking Rootkit Footprints with a Practical Memory Analysis System - Weidong Cui, Marcus Peinado, Zhilei Xu, Ellick Chan.eng.vtt
|
22.0 KB
|
Welcome - Tadayoshi Kohno.eng.json
|
383.9 KB
|
Welcome - Tadayoshi Kohno.eng.lrc
|
10.2 KB
|
Welcome - Tadayoshi Kohno.eng.srt
|
11.0 KB
|
Welcome - Tadayoshi Kohno.eng.text
|
7.4 KB
|
Welcome - Tadayoshi Kohno.eng.tsv
|
8.9 KB
|
Welcome - Tadayoshi Kohno.eng.txt
|
10.3 KB
|
Welcome - Tadayoshi Kohno.eng.vtt
|
10.0 KB
|
Whispers in the Hyper-space High-speed Covert Channel Attacks in the Cloud - Zhenyu Wu, Zhang Xu, Haining Wang.eng.json
|
1.3 MB
|
Whispers in the Hyper-space High-speed Covert Channel Attacks in the Cloud - Zhenyu Wu, Zhang Xu, Haining Wang.eng.lrc
|
37.7 KB
|
Whispers in the Hyper-space High-speed Covert Channel Attacks in the Cloud - Zhenyu Wu, Zhang Xu, Haining Wang.eng.srt
|
34.1 KB
|
Whispers in the Hyper-space High-speed Covert Channel Attacks in the Cloud - Zhenyu Wu, Zhang Xu, Haining Wang.eng.text
|
24.6 KB
|
Whispers in the Hyper-space High-speed Covert Channel Attacks in the Cloud - Zhenyu Wu, Zhang Xu, Haining Wang.eng.tsv
|
32.1 KB
|
Whispers in the Hyper-space High-speed Covert Channel Attacks in the Cloud - Zhenyu Wu, Zhang Xu, Haining Wang.eng.txt
|
38.2 KB
|
Whispers in the Hyper-space High-speed Covert Channel Attacks in the Cloud - Zhenyu Wu, Zhang Xu, Haining Wang.eng.vtt
|
31.3 KB
|
/.../USENIX Security 2012 Presentations/
|
AdSplit Separating Smartphone Advertising from Applications - Shashi Shekhar, Michael Dietz, Dan S. Wallach.pdf
|
499.0 KB
|
An Evaluation of the Google Chrome Extension Security Architecture - Nicholas Carlini, Adrienne Porter Felt, David Wagner.pdf
|
191.4 KB
|
An Evaluation of the Google Chrome Extension Security Architecture Slides -Slides - Nicholas Carlini, Adrienne Porter Felt, David Wagner.pdf
|
1.3 MB
|
Aurasium Practical Policy Enforcement for Android Applications - Rubin Xu, Hassen Saidi, Ross Anderson.pdf
|
407.5 KB
|
Aurasium Practical Policy Enforcement for Android Applications Slides - Rubin Xu, Hassen Saidi, Ross Anderson.pdf
|
6.0 MB
|
Babel Leveraging Email Delivery for Spam Mitigation - Gianluca Stringhini, Manuel Egele, Apostolis Zarras, Thorsten Holz, Christopher Kruegel, Giovanni Vigna.pdf
|
958.1 KB
|
Babel Leveraging Email Delivery for Spam Mitigation Slides - Gianluca Stringhini, Manuel Egele, Apostolis Zarras, Thorsten Holz, Christopher Kruegel, Giovanni Vigna.pdf
|
10.3 MB
|
Billion-Gate Secure Computation with Malicious Adversaries - Benjamin Kreuter, abhi shelat, Chih-hao Shen.pdf
|
272.4 KB
|
Billion-Gate Secure Computation with Malicious Adversaries Slides Slides - Benjamin Kreuter, abhi shelat, and Chih-hao Shen.pdf
|
1.1 MB
|
Chimera A Declarative Language for Streaming Network Traffic Analysis - Kevin Borders, Jonathan Springer, Matthew Burnside.pdf
|
302.3 KB
|
Chimera A Declarative Language for Streaming Network Traffic Analysis Slides - Kevin Borders, Jonathan Springer, Matthew Burnside.pdf
|
706.3 KB
|
Clickjacking Attacks and Defenses - Lin-Shung Huang, Alex Moshchuk, Helen J. Wang, Stuart Schechter, Collin Jackson.pdf
|
1.1 MB
|
Clickjacking Attacks and Defenses Slides Slides - Lin-Shung Huang, Alex Moshchuk, Helen J. Wang, Stuart Schechter, Collin Jackson.pdf
|
3.7 MB
|
Data Node Encrypted File System Efficient Secure Deletion for Flash Memory - Joel Reardon, Srdjan Capkun, David Basin.pdf
|
413.4 KB
|
Data Node Encrypted File System Efficient Secure Deletion for Flash Memory Slides - Joel Reardon, Srdjan Capkun, David Basin.pdf
|
7.8 MB
|
DroidScope Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis - Lok Kwong Yan, Heng Yin.pdf
|
608.3 KB
|
DroidScope Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis Slides - Lok Kwong Yan, Heng Yin.pdf
|
535.3 KB
|
Efficient and Scalable Socware Detection in Online Social Networks - Md Sazzadur Rahman, Ting-Kai Huang, Harsha V. Madhyastha, Michalis Faloutsos.pdf
|
683.3 KB
|
Efficient and Scalable Socware Detection in Online Social Networks Slides - Md Sazzadur Rahman, Ting-Kai Huang, Harsha V. Madhyastha, Michalis Faloutsos.pdf
|
2.9 MB
|
Enemy of the State A State-Aware Black-Box Web Vulnerability Scanner - Adam Doupe, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna.pdf
|
236.4 KB
|
Enemy of the State A State-Aware Black-Box Web Vulnerability Scanner Slides - Adam Doupe, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna.pdf
|
2.8 MB
|
Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization - Cristiano Giuffrida, Anton Kuijsten, Andrew S. Tanenbaum.pdf
|
477.3 KB
|
Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization Slides - Cristiano Giuffrida, Anton Kuijsten, Andrew S. Tanenbaum.pdf
|
2.4 MB
|
Establishing Browser Security Guarantees through Formal Shim Verification - Dongseok Jang, Zachary Tatlock, Sorin Lerner.pdf
|
769.1 KB
|
Establishing Browser Security Guarantees through Formal Shim Verification Slides - Dongseok Jang, Zachary Tatlock, Sorin Lerner.pdf
|
1.1 MB
|
From Throw-Away Traffic to Bots Detecting the Rise of DGA-Based Malware - Manos Antonakakis, Roberto Perdisci, Yacin Nadji, Nikolaos Vasiloglou, Saeed Abu-Nimeh, Wenke Lee, David.pdf
|
713.4 KB
|
From Throw-Away Traffic to Bots Detecting the Rise of DGA-Based Malware Slides - Manos Antonakakis, Roberto Perdisci, Yacin Nadji, Nikolaos Vasiloglou, Saeed Abu-Nimeh, Wenke Lee.pdf
|
764.5 KB
|
Fuzzing with Code Fragments - Christian Holler, Kim Herzig, Andreas Zeller.pdf
|
570.3 KB
|
Fuzzing with Code Fragments Slides - Christian Holler, Kim Herzig, Andreas Zeller.pdf
|
14.0 MB
|
Gone in 360 Seconds Hijacking with Hitag2 - Roel Verdult, Flavio D. Garcia, Josep Balasch, KU Leuven.pdf
|
665.3 KB
|
Gone in 360 Seconds Hijacking with Hitag2 Slides - Roel Verdult, Flavio D. Garcia, Josep Balasch, KU Leuven.pdf
|
12.3 MB
|
How Does Your Password Measure Up - The Effect of Strength Meters on Password Creation - Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Ma.pdf
|
1.3 MB
|
How Does Your Password Measure Up - The Effect of Strength Meters on Password Creation Slides - Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michell.pdf
|
2.7 MB
|
I Forgot Your Password Randomness Attacks Against PHP Applications - George Argyros, Aggelos Kiayias.pdf
|
470.3 KB
|
Impact of Spam Exposure on User Engagement - Anirban Dasgupta, Kunal Punera, Justin M. Rao, Xuanhui Wang.pdf
|
194.9 KB
|
kGuard Lightweight Kernel Protection against Return-to-User Attacks - Vasileios P. Kemerlis, Georgios Portokalidis, and Angelos D. Keromytis.pdf
|
311.2 KB
|
kGuard Lightweight Kernel Protection against Return-to-User Attacks Slides - Vasileios P. Kemerlis, Georgios Portokalidis, and Angelos D. Keromytis.pdf
|
2.3 MB
|
Mining Your Ps and Qs Detection of Widespread Weak Keys in Network Devices - Nadia Heninger, Zakir Durumeric, Eric Wustrow, J. Alex Halderm.pdf
|
386.2 KB
|
Mining Your Ps and Qs Detection of Widespread Weak Keys in Network Devices Slides - Nadia Heninger, Zakir Durumeric, Eric Wustrow, J. Alex Halderm.pdf
|
1.6 MB
|
Neuroscience Meets Cryptography Designing Crypto Primitives Secure Against Rubber Hose Attacks - Hristo Bojinov, Daniel Sanchez, Paul Reber, Northw.pdf
|
530.3 KB
|
Neuroscience Meets Cryptography Designing Crypto Primitives Secure Against Rubber Hose Attacks Slides - Hristo Bojinov, Daniel Sanchez, Paul Reber, Northw.pdf
|
1.3 MB
|
New Attacks on Timing-based Network Flow Watermarks - Zi Lin, Nicholas Hopper.pdf
|
1.4 MB
|
New Attacks on Timing-based Network Flow Watermarks Slides - Zi Lin, Nicholas Hopper.pdf
|
4.0 MB
|
On Breaking SAML Be Whoever You Want to Be - Juraj Somorovsky, Andreas Mayer, Jorg Schwenk, Marco Kampmann, Meiko Jensen.pdf
|
725.7 KB
|
On Breaking SAML Be Whoever You Want to Be Slides - Juraj Somorovsky, Andreas Mayer, Jorg Schwenk, Marco Kampmann, Meiko Jensen.pdf
|
1.9 MB
|
On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces - Ivan Martinovic, Doug Davies, Mario Frank, Daniele Perito, Tomas Ros, Dawn Song.pdf
|
1.9 MB
|
Optimally Robust Private Information Retrieval - Casey Devet, Ian Goldberg, Nadia Heninger.pdf
|
217.6 KB
|
Optimally Robust Private Information Retrieval Slides - Casey Devet, Ian Goldberg, Nadia Heninger.pdf
|
595.2 KB
|
Origin-Bound Certificates A Fresh Approach to Strong Client Authentication for the Web - Michael Dietz, Alexei Czeskis, Dirk Balfanz, Dan S. Wallach.pdf
|
625.6 KB
|
PharmaLeaks Understanding the Business of Online Pharmaceutical Affiliate Programs - Damon McCoy, Andreas Pitsillidis, Grant Jordan, Nicholas Weaver, Christian Kreibich, Brian Kr.pdf
|
1.2 MB
|
PharmaLeaks Understanding the Business of Online Pharmaceutical Affiliate Programs Slides - Damon McCoy, Andreas Pitsillidis, Grant Jordan, Nicholas Weaver, Christian Kreibich, B.pdf
|
2.1 MB
|
Policy-Sealed Data A New Abstraction for Building Trusted Cloud Services - Nuno Santos, Rodrigo Rodrigues, Krishna P. Gummadi.pdf
|
294.3 KB
|
Privacy-Preserving Social Plugins - Georgios Kontaxis, Michalis Polychronakis, Angelos D. Keromytis, Evangelos P. Markatos.pdf
|
740.9 KB
|
Privacy-Preserving Social Plugins Slides - Georgios Kontaxis, Michalis Polychronakis, Angelos D. Keromytis, Evangelos P. Markatos.pdf
|
3.3 MB
|
Privilege Separation in HTML5 Applications - Devdatta Akhawe, Prateek Saxena, Dawn Song.pdf
|
522.5 KB
|
Progressive Authentication Deciding When to Authenticate on Mobile Phones - Oriana Riva, Chuan Qin, Karin Strauss, Dimitrios Lymberopoulos.pdf
|
1.8 MB
|
Progressive Authentication Deciding When to Authenticate on Mobile Phones Slides - Oriana Riva, Chuan Qin, Karin Strauss, Dimitrios Lymberopoulos.pdf
|
1.8 MB
|
PUBCRAWL Protecting Users and Businesses from CRAWLers - Gregoire Jacob, Engin Kirda, Christopher Kruegel, Giovanni Vigna.pdf
|
589.7 KB
|
PUBCRAWL Protecting Users and Businesses from CRAWLers Slides - Gregoire Jacob, Engin Kirda, Christopher Kruegel, Giovanni Vigna.pdf
|
735.7 KB
|
Security and Usability Challenges of Moving-Object CAPTCHAs Decoding Codewords in Motion - Y. Xu, G. Reynaga, S. Chiasson, J.-M. Frahm, F. Monrose, P. van Oorschot.pdf
|
1.9 MB
|
Security and Usability Challenges of Moving-Object CAPTCHAs Decoding Codewords in Motion Slides - Y. Xu, G. Reynaga, S. Chiasson, J.-M. Frahm, F. Monrose, P. van Oorschot.pdf
|
4.1 MB
|
Social Networking with Frientegrity Privacy and Integrity with an Untrusted Provider - Ariel J. Feldman, Aaron Blankstein, Michael J. Freedman, Edward W. Felten.pdf
|
555.5 KB
|
Social Networking with Frientegrity Privacy and Integrity with an Untrusted Provider Slides - Ariel J. Feldman, Aaron Blankstein, Michael J. Freedman, Edward W. Felten.pdf
|
3.6 MB
|
STEALTHMEM System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud - Taesoo Kim, Marcus Peinado, Gloria Mainar-Ruiz.pdf
|
517.9 KB
|
STEALTHMEM System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud Slides - Taesoo Kim, Marcus Peinado, Gloria Mainar-Ruiz.pdf
|
1.2 MB
|
STING Finding Name Resolution Vulnerabilities in Programs - Hayawardh Vijayakumar, Joshua Schiffman, Trent Jaeger.pdf
|
500.9 KB
|
STING Finding Name Resolution Vulnerabilities in Programs Slides - Hayawardh Vijayakumar, Joshua Schiffman, Trent Jaeger.pdf
|
5.1 MB
|
Tachyon Tandem Execution for Efficient Live Patch Testing - Matthew Maurer, David Brumley.pdf
|
280.9 KB
|
Taking Proof-Based Verified Computation a Few Steps Closer to Practicality - Srinath Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Andrew J. Blumberg, Michael Walfish.pdf
|
445.4 KB
|
Taking Proof-Based Verified Computation a Few Steps Closer to Practicality Slides - Srinath Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Andrew J. Blumberg, Michael Walfish.pdf
|
141.6 KB
|
TARDIS Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without Clocks - Amir Rahmati, Mastooreh Salajegheh, Dan Holcomb, Jacob Sorber, Wayne P..pdf
|
2.3 MB
|
TARDIS Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without Clocks Slides - Amir Rahmati, Mastooreh Salajegheh, Dan Holcomb, Jacob Sorber, W.pdf
|
35.1 MB
|
Throttling Tor Bandwidth Parasites - Rob Jansen, Paul Syverson, Nicholas Hopper.pdf
|
1.2 MB
|
Throttling Tor Bandwidth Parasites Slides - Rob Jansen, Paul Syverson, Nicholas Hopper.pdf
|
12.0 MB
|
Tracking Rootkit Footprints with a Practical Memory Analysis System - Weidong Cui, Marcus Peinado, Zhilei Xu, Ellick Chan.pdf
|
808.3 KB
|
Tracking Rootkit Footprints with a Practical Memory Analysis System Slides - Weidong Cui, Marcus Peinado, Zhilei Xu, Ellick Chan.pdf
|
1.5 MB
|
Whispers in the Hyper-space High-speed Covert Channel Attacks in the Cloud - Zhenyu Wu, Zhang Xu, Haining Wang.pdf
|
799.4 KB
|
Whispers in the Hyper-space High-speed Covert Channel Attacks in the Cloud Slides Slides Zhenyu Wu, Zhang Xu, Haining Wang.pdf
|
1.7 MB
|
/.../USENIX Security 2012 USENIX_files/
|
acmqueue_150x48_0.png
|
3.1 KB
|
acmqueue_150x48_0_002.png
|
4.5 KB
|
admin_125x47_0.png
|
3.7 KB
|
admin_125x47_0_002.png
|
11.4 KB
|
all.js
|
3.2 KB
|
analytics.js
|
45.2 KB
|
beyond_security.png
|
7.5 KB
|
beyond_security_002.png
|
14.1 KB
|
cbgapi.loaded_0
|
144.0 KB
|
cbgapi.loaded_1
|
97.1 KB
|
cset12_banner_colo.jpg
|
6.4 KB
|
css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css
|
5.6 KB
|
css_ciODmkFfqCSx2xBu95VX29BZ0r4mdoEz3gy-MriTJBM.css
|
257.9 KB
|
css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css
|
1.5 KB
|
css_SKdvFJ9YoZ2Zlnl17QxUbae5QC-NQDrH8ynBbHJFAaM.css
|
9.2 KB
|
css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css
|
0.1 KB
|
dcj_150x27_0.png
|
3.2 KB
|
dcj_150x27_0_002.png
|
6.2 KB
|
dmtf_150x53_0.png
|
8.0 KB
|
dmtf_150x53_0_002.png
|
4.4 KB
|
evtwote12_banner_colo.jpg
|
5.4 KB
|
fastbutton.htm
|
1.8 KB
|
fastbutton_002.htm
|
1.7 KB
|
foci12_banner_colo.jpg
|
5.6 KB
|
fsm_150x44_0.png
|
4.1 KB
|
fsm_150x44_0_002.png
|
9.7 KB
|
google_8.png
|
7.8 KB
|
google_8_002.png
|
3.2 KB
|
hakin9_en150x40.png
|
3.5 KB
|
hakin9_en150x40_002.png
|
6.8 KB
|
healthsec12_banner_colo.jpg
|
7.0 KB
|
hotsec12_banner_colo.jpg
|
6.4 KB
|
ibm-research.png
|
3.5 KB
|
ibm-research_002.png
|
1.9 KB
|
ibm-research_gs.png
|
0.6 KB
|
ie.htm
|
30.2 KB
|
ieee_sp_150x36_0.png
|
8.7 KB
|
ieee_sp_150x36_0_002.png
|
4.5 KB
|
infosecnews_150x120_0.png
|
5.2 KB
|
infosecnews_150x120_0_002.png
|
5.6 KB
|
js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js
|
20.5 KB
|
js_5eZSC3tfzCwTta-_4qxrBau4YdctcIhVqovRK7sPRFo.js
|
107.7 KB
|
js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js
|
1.4 KB
|
js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js
|
120.3 KB
|
js_nPhKWi17GlWfUPto14Dqfk5lpAFMD2XUrRDYY3jnD2c.js
|
23.0 KB
|
js_sWOO4PbSe161nCKWEJProMMhdbu_pfXMDzdRrMGBIE0.js
|
47.6 KB
|
linux_journal_150x72_0.png
|
6.6 KB
|
linux_journal_150x72_0_002.png
|
10.3 KB
|
linux_pro_150x57_0.png
|
3.5 KB
|
linux_pro_150x57_0_002.png
|
5.3 KB
|
lxer_150x53_0.png
|
4.6 KB
|
lxer_150x53_0_002.png
|
8.2 KB
|
metricon70_banner_colo.jpg
|
7.8 KB
|
microsoft_research_0.png
|
4.9 KB
|
microsoft_research_0_002.png
|
2.4 KB
|
mozilla_firefox_logo.png
|
17.2 KB
|
mozilla_firefox_logo_002.png
|
19.4 KB
|
national_science_foundation.gif
|
4.2 KB
|
national_science_foundation_002.gif
|
7.3 KB
|
nsp_logo_black.png
|
4.7 KB
|
nsp_logo_black_002.png
|
4.7 KB
|
oreilly_150x28_0.png
|
2.4 KB
|
oreilly_150x28_0_002.png
|
3.8 KB
|
plusone.js
|
49.0 KB
|
postmessageRelay.htm
|
0.7 KB
|
stack_exchange_150x37_0.png
|
6.0 KB
|
stack_exchange_150x37_0_002.png
|
3.3 KB
|
symantec_150x60.png
|
5.4 KB
|
symantec_150x60_002.png
|
10.6 KB
|
userfriendly_150x38_0.png
|
3.5 KB
|
userfriendly_150x38_0_002.png
|
6.7 KB
|
widgets.js
|
98.5 KB
|
woot12_banner_colo.jpg
|
5.5 KB
|
/.../USENIX Security 2012 USENIX_files/postmessageRelay_data/
|
829555168-postmessagerelay.js
|
10.0 KB
|
cbgapi.loaded_0
|
54.9 KB
|
rpcshindig_random.js
|
13.0 KB
|
/USENIX Security 2013/
|
Alice in Warningland A Large-Scale Field Study of Browser Security Warning Effectiveness - Devdatta Akhawe, Adrienne Porter Felt.mp4
|
11.3 MB
|
An Empirical Study of Vulnerability Rewards Programs - Matthew Finifter, Devdatta Akhawe, David Wagner.mp4
|
10.5 MB
|
Building Securable Infrastructure Open-Source Private Clouds - Pravir Chandra.mp4
|
32.4 MB
|
Confessions of a Recovering Data Broker Responsible Innovation in the Age of Big Data, Big Brother, and the Coming Skynet Terminators - Jim Adler.mp4
|
37.7 MB
|
Control Flow Integrity for COTS Binaries - Mingwei Zhang, R. Sekar.mp4
|
11.5 MB
|
Dismantling Megamos Crypto Wirelessly Lockpicking a Vehicle Immobilizer - Roel Verdult, Flavio D. Garcia, Baris Ege.mp4
|
16.0 MB
|
Dowsing for Ovrflows A Guided Fuzzer to Find Buffer Boundary Violations - Istvan Haller, Asia Slowinska, Matthias Neugschwandtner, Herbert Bos.mp4
|
12.5 MB
|
Dr. Felten Goes To Washington - Lessons from 18 Months in Government - Edward W. Felten.mp4
|
42.7 MB
|
Effective Inter-Component Communication Mapping in Android An Essential Step Towards Holistic Security Analysis - Damien Octeau, Patrick McDaniel, Somesh Jha, Alexandre Bartel, Eri.mp4
|
11.0 MB
|
Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers - Suman Jana, David Molnar, Alexander Moshchuk, Alan Dunn, Benjamin Livshits, Helen J. Wang, E.mp4
|
9.2 MB
|
Eradicating DNS Rebinding with the Extended Same-origin Policy - Martin Johns, Sebastian Lekies, Ben Stock.mp4
|
11.0 MB
|
ExecScent Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates - Terry Nelms, Roberto Perdisci, Mustaque Ahamad.mp4
|
12.0 MB
|
Explicating SDKs Uncovering Assumptions Underlying Secure Authentication and Authorization - Rui Wang, Yuchen Zhou, Shuo Chen, Shaz Qadeer, David Evans, Yuri Gurevich.mp4
|
10.8 MB
|
FIE on Firmware Finding Vulnerabilities in Embedded Systems Using Symbolic Execution - Drew Davidson, Benjamin Moench, Somesh Jha, Thomas Ristenpart.mp4
|
11.5 MB
|
Greystar Fast and Accurate Detection of SMS Spam Numbers in Large Cellular Networks Using Gray Phone Space - Nan Jiang, Yu Jin, Ann Skudlark, Zhi-Li Zhang.mp4
|
9.6 MB
|
Impression Fraud in On-line Advertising via Pay-Per-View Networks - Kevin Springborn, Paul Barford.mp4
|
10.0 MB
|
Jekyll on iOS When Benign Apps Become Evil - Tielei Wang, Kangjie Lu, Long Lu, Simon Chung, Wenke Lee.mp4
|
11.4 MB
|
Measuring the Practical Impact of DNSSEC Deployment - Wilson Lian, Eric Rescorla, Hovav Shacham, Stefan Savage.mp4
|
12.7 MB
|
MetaSymploit Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis - Ruowen Wang, Peng Ning, Tao Xie, Quan Chen.mp4
|
14.9 MB
|
Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring - Edward J. Schwartz, JongHyup Lee, Maverick Woo, David Brumley.mp4
|
11.0 MB
|
On the Security of Picture Gesture Authentication - Ziming Zhao, Gail-Joon Ahn, Jeong-Jin Seo, Hongxin Hu.mp4
|
9.9 MB
|
On the Security of RC4 in TLS - Nadhem AlFardan, Royal Holloway, Daniel J. Bernstein, Kenneth G. Paterson, Bertram Poettering, Jacob C.N. Schuldt.mp4
|
11.6 MB
|
PCF A Portable Circuit Format for Scalable Two-Party Secure Computation - Ben Kreuter, Benjamin Mood, Abhi Shelat, Kevin Butler.mp4
|
7.9 MB
|
Proactively Accountable Anonymous Messaging in Verdict - Henry Corrigan-Gibbs, David Isaac Wolinsky, Bryan Ford.mp4
|
11.7 MB
|
Revolver An Automated Approach to the Detection of Evasive Web-based Malware - Alexandros Kapravelos, Yan Shoshitaishvili, Marco Cova, Christopher Kruegel, Giovanni Vigna.mp4
|
8.4 MB
|
Sancus Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base - Job Noorman, Pieter Agten, Wilfried Daniels, Raoul Strackx, Anthony Van Herre.mp4
|
11.4 MB
|
Secure Outsourced Garbled Circuit Evaluation for Mobile Devices - Henry Carter, Benjamin Mood, Patrick Traynor, Kevin Butler.mp4
|
13.2 MB
|
Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation - Frank Imeson, Ariq Emtenan, Siddharth Garg, Mahesh V. Tripunita.mp4
|
11.0 MB
|
Securing Embedded User Interfaces Android and Beyond - Franziska Roesner, Tadayoshi Kohno.mp4
|
9.9 MB
|
Security Team 2.0 - Chris Evans.mp4
|
34.2 MB
|
Steal This Movie Automatically Bypassing DRM Protection in Streaming Media Services - Ruoyu Wang, Santa Barbara, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna.mp4
|
11.5 MB
|
Take This Personally Pollution Attacks on Personalized Services - Xinyu Xing, Wei Meng, Dan Doozan, Alex C. Snoeren, Nick Feamster, Wenke Lee.mp4
|
11.8 MB
|
Technical Sessions 2013 USENIX.htm
|
367.9 KB
|
The Velocity of Censorship High-Fidelity Detection of Microblog Post Deletions - Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall.mp4
|
12.0 MB
|
The White House's Priorities for Cybersecurity - Andy Ozment.mp4
|
64.5 MB
|
Towards Automatic Software Lineage Inference - Jiyong Jang, Maverick Woo, David Brumley.mp4
|
13.6 MB
|
Tracking the Casino Computer Wars Who’s Winning - the Casino or the Cheat - Richard Marcus.mp4
|
31.2 MB
|
Trafficking Fradulent Accounts The Role of the Underground Market in Twitter Spam and Abuse - Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, Vern Paxson.mp4
|
13.6 MB
|
Transparent ROP Exploit Mitigation Using Indirect Branch Tracing - Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis.mp4
|
12.5 MB
|
USENIX Security 2013 login article.pdf
|
406.6 KB
|
USENIX Security 2013 Proceedings erratum.pdf
|
77.1 KB
|
USENIX Security 2013 Proceedings Interior.pdf
|
27.6 MB
|
USENIX Security 2013 Proceedings.epub
|
56.1 MB
|
USENIX Security 2013 Proceedings.mobi
|
28.2 MB
|
USENIX Security 2013 Proceedings.pdf
|
27.9 MB
|
USENIX Security 2013 USENIX.htm
|
88.6 KB
|
WHYPER Towards Automating Risk Assessment of Mobile Applications - Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, Tao Xie.mp4
|
12.3 MB
|
Windows 8 Security - Supporting User Confidence - Crispin Cowan.mp4
|
22.8 MB
|
You Are How You Click Clickstream Analysis for Sybil Detection - Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng, Ben Y. Zhao.mp4
|
10.7 MB
|
ZMap Fast Internet-wide Scanning and Its Security Applications - durumeric.mp4
|
14.9 MB
|
ZQL A Compiler for Privacy-Preserving Data Processing - Cedric Fournet, Markulf Kohlweiss, George Danezis.mp4
|
13.0 MB
|
/.../Technical Sessions 2013 USENIX_files/
|
acmqueue_150x48_3.png
|
4.5 KB
|
acmqueue_150x48_3_002.png
|
3.1 KB
|
adler_jim.jpg
|
24.8 KB
|
admin_150x60.png
|
4.2 KB
|
admin_150x60_002.png
|
7.0 KB
|
akamai_150x62.png
|
4.7 KB
|
akamai_150x62_002.png
|
2.8 KB
|
all.js
|
3.2 KB
|
analytics.js
|
45.2 KB
|
application-octet-stream.png
|
0.2 KB
|
arbor_networks_150x42.png
|
4.0 KB
|
arbor_networks_150x42_002.png
|
6.1 KB
|
audio_16.png
|
0.5 KB
|
cbgapi.loaded_0
|
144.0 KB
|
cbgapi.loaded_1
|
97.1 KB
|
chandra_pravir.jpg
|
3.8 KB
|
cmu_cert_150x73.png
|
3.9 KB
|
cmu_cert_150x73_002.png
|
2.9 KB
|
computer_150x33_0.png
|
4.2 KB
|
computer_150x33_0_002.png
|
3.2 KB
|
conference-schedule-pdf.png
|
0.3 KB
|
cowan_crispin.jpg
|
3.9 KB
|
css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css
|
5.6 KB
|
css_dY0FNz4qF00fqwtbSA930BrnJH15HL9efi8t-qF8ZFs.css
|
9.2 KB
|
css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css
|
1.5 KB
|
css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css
|
0.1 KB
|
css_XQfCg5kiuU6ACblHn3rDXdgaKZR8AxbhrQR4Gznu5qA.css
|
257.3 KB
|
dcj_150x27_3.png
|
3.2 KB
|
dcj_150x27_3_002.png
|
6.1 KB
|
dmtf_600x240.png
|
4.1 KB
|
dmtf_600x240_002.png
|
2.5 KB
|
evans_chris.png
|
22.1 KB
|
facebook_5.png
|
4.8 KB
|
facebook_5_002.png
|
8.6 KB
|
fastbutton.htm
|
1.8 KB
|
fastbutton_002.htm
|
1.7 KB
|
felten_ed_sec13.jpg
|
10.9 KB
|
fsm_150x86_2.png
|
12.4 KB
|
fsm_150x86_2_002.png
|
7.5 KB
|
google_150x50_3.png
|
4.0 KB
|
google_150x50_3_002.png
|
8.7 KB
|
hpcwire_150x55_0.png
|
3.8 KB
|
hpcwire_150x55_0_002.png
|
10.1 KB
|
ibm_research_150x60.png
|
4.1 KB
|
ibm_research_150x60_002.png
|
6.0 KB
|
ie.htm
|
30.2 KB
|
ieee_sp_150x36_4.png
|
8.6 KB
|
ieee_sp_150x36_4_002.png
|
4.5 KB
|
infosecnews_150x38.png
|
3.1 KB
|
infosecnews_150x38_002.png
|
4.9 KB
|
it_dev_150x39.png
|
9.5 KB
|
it_dev_150x39_002.png
|
3.1 KB
|
js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js
|
20.5 KB
|
js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js
|
1.4 KB
|
js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js
|
120.3 KB
|
js_RGgtt0xyoog3aEbqA3PACaZnzIbopLWdKtKDjg0Ge54.js
|
0.9 KB
|
js_U0vng6nr8yfSzrWPiyS9QtbOsmQ8XMOn1mS4JIpHltg.js
|
131.3 KB
|
js_zKsxChQ0ZiM23lE1j-H3wIlMQpnOrGQN3oQ-70N6r40.js
|
47.6 KB
|
linux_journal_150x72_2.png
|
6.6 KB
|
linux_journal_150x72_2_002.png
|
10.3 KB
|
linux_pro_150x60.png
|
2.9 KB
|
linux_pro_150x60_002.png
|
5.0 KB
|
lxer_150x60.png
|
6.6 KB
|
lxer_150x60_002.png
|
3.7 KB
|
marcus_richard.jpg
|
5.9 KB
|
microsoft_research_150x42_2.png
|
3.2 KB
|
microsoft_research_150x42_2_002.png
|
2.8 KB
|
nostarch_600x240_1.png
|
3.9 KB
|
nostarch_600x240_1_002.png
|
1.6 KB
|
nsf_90x80_0.png
|
9.8 KB
|
nsf_90x80_0_002.png
|
9.8 KB
|
oreilly_150x28_3.png
|
2.4 KB
|
oreilly_150x28_3_002.png
|
3.8 KB
|
ozment_andy_sec13.jpg
|
35.8 KB
|
package-x-generic.png
|
0.3 KB
|
pdf_16.png
|
0.3 KB
|
plusone.js
|
49.0 KB
|
postmessageRelay.htm
|
0.7 KB
|
security_orb_tagline_150x47.png
|
4.3 KB
|
security_orb_tagline_150x47_002.png
|
9.0 KB
|
serverfault_150x35_0.png
|
2.4 KB
|
serverfault_150x35_0_002.png
|
3.4 KB
|
slides_16.png
|
1.3 KB
|
usenix-locked.png
|
1.4 KB
|
userfriendly_150x60.png
|
3.0 KB
|
userfriendly_150x60_002.png
|
8.4 KB
|
video_16.png
|
1.4 KB
|
virus_bulletin_150x60.png
|
5.2 KB
|
virus_bulletin_150x60_002.png
|
3.0 KB
|
widgets.js
|
98.5 KB
|
/.../Technical Sessions 2013 USENIX_files/postmessageRelay_data/
|
829555168-postmessagerelay.js
|
10.0 KB
|
cbgapi.loaded_0
|
54.9 KB
|
rpcshindig_random.js
|
13.0 KB
|
/.../USENIX Security 2013 captions/
|
Alice in Warningland A Large-Scale Field Study of Browser Security Warning Effectiveness - Devdatta Akhawe, Adrienne Porter Felt.eng.json
|
1.5 MB
|
Alice in Warningland A Large-Scale Field Study of Browser Security Warning Effectiveness - Devdatta Akhawe, Adrienne Porter Felt.eng.lrc
|
41.0 KB
|
Alice in Warningland A Large-Scale Field Study of Browser Security Warning Effectiveness - Devdatta Akhawe, Adrienne Porter Felt.eng.srt
|
38.8 KB
|
Alice in Warningland A Large-Scale Field Study of Browser Security Warning Effectiveness - Devdatta Akhawe, Adrienne Porter Felt.eng.text
|
27.6 KB
|
Alice in Warningland A Large-Scale Field Study of Browser Security Warning Effectiveness - Devdatta Akhawe, Adrienne Porter Felt.eng.tsv
|
35.2 KB
|
Alice in Warningland A Large-Scale Field Study of Browser Security Warning Effectiveness - Devdatta Akhawe, Adrienne Porter Felt.eng.txt
|
41.6 KB
|
Alice in Warningland A Large-Scale Field Study of Browser Security Warning Effectiveness - Devdatta Akhawe, Adrienne Porter Felt.eng.vtt
|
35.6 KB
|
An Empirical Study of Vulnerability Rewards Programs - Matthew Finifter, Devdatta Akhawe, David Wagner.eng.json
|
1.7 MB
|
An Empirical Study of Vulnerability Rewards Programs - Matthew Finifter, Devdatta Akhawe, David Wagner.eng.lrc
|
48.3 KB
|
An Empirical Study of Vulnerability Rewards Programs - Matthew Finifter, Devdatta Akhawe, David Wagner.eng.srt
|
41.3 KB
|
An Empirical Study of Vulnerability Rewards Programs - Matthew Finifter, Devdatta Akhawe, David Wagner.eng.text
|
29.6 KB
|
An Empirical Study of Vulnerability Rewards Programs - Matthew Finifter, Devdatta Akhawe, David Wagner.eng.tsv
|
40.3 KB
|
An Empirical Study of Vulnerability Rewards Programs - Matthew Finifter, Devdatta Akhawe, David Wagner.eng.txt
|
49.0 KB
|
An Empirical Study of Vulnerability Rewards Programs - Matthew Finifter, Devdatta Akhawe, David Wagner.eng.vtt
|
37.9 KB
|
Building Securable Infrastructure Open-Source Private Clouds - Pravir Chandra.eng.srt
|
128.5 KB
|
Confessions of a Recovering Data Broker Responsible Innovation in the Age of Big Data, Big Brother, and the Coming Skynet Terminators - Jim Adler.eng.srt
|
121.2 KB
|
Control Flow Integrity for COTS Binaries - Mingwei Zhang, R. Sekar.eng.json
|
1.1 MB
|
Control Flow Integrity for COTS Binaries - Mingwei Zhang, R. Sekar.eng.lrc
|
28.8 KB
|
Control Flow Integrity for COTS Binaries - Mingwei Zhang, R. Sekar.eng.srt
|
32.5 KB
|
Control Flow Integrity for COTS Binaries - Mingwei Zhang, R. Sekar.eng.text
|
22.4 KB
|
Control Flow Integrity for COTS Binaries - Mingwei Zhang, R. Sekar.eng.tsv
|
26.0 KB
|
Control Flow Integrity for COTS Binaries - Mingwei Zhang, R. Sekar.eng.txt
|
29.1 KB
|
Control Flow Integrity for COTS Binaries - Mingwei Zhang, R. Sekar.eng.vtt
|
29.7 KB
|
Dismantling Megamos Crypto Wirelessly Lockpicking a Vehicle Immobilizer - Roel Verdult, Flavio D. Garcia, Baris Ege.eng.srt
|
40.3 KB
|
Dowsing for Ovrflows A Guided Fuzzer to Find Buffer Boundary Violations - Istvan Haller, Asia Slowinska, Matthias Neugschwandtner, Herbert Bos.eng.json
|
1.6 MB
|
Dowsing for Ovrflows A Guided Fuzzer to Find Buffer Boundary Violations - Istvan Haller, Asia Slowinska, Matthias Neugschwandtner, Herbert Bos.eng.lrc
|
40.2 KB
|
Dowsing for Ovrflows A Guided Fuzzer to Find Buffer Boundary Violations - Istvan Haller, Asia Slowinska, Matthias Neugschwandtner, Herbert Bos.eng.srt
|
41.3 KB
|
Dowsing for Ovrflows A Guided Fuzzer to Find Buffer Boundary Violations - Istvan Haller, Asia Slowinska, Matthias Neugschwandtner, Herbert Bos.eng.text
|
31.4 KB
|
Dowsing for Ovrflows A Guided Fuzzer to Find Buffer Boundary Violations - Istvan Haller, Asia Slowinska, Matthias Neugschwandtner, Herbert Bos.eng.tsv
|
36.3 KB
|
Dowsing for Ovrflows A Guided Fuzzer to Find Buffer Boundary Violations - Istvan Haller, Asia Slowinska, Matthias Neugschwandtner, Herbert Bos.eng.txt
|
40.5 KB
|
Dowsing for Ovrflows A Guided Fuzzer to Find Buffer Boundary Violations - Istvan Haller, Asia Slowinska, Matthias Neugschwandtner, Herbert Bos.eng.vtt
|
38.5 KB
|
Dr. Felten Goes To Washington - Lessons from 18 Months in Government - Edward W. Felten.eng.srt
|
139.4 KB
|
Effective Inter-Component Communication Mapping in Android An Essential Step Towards Holistic Security Analysis - Damien Octeau, Patrick McDaniel, Somesh Jha, Alexandre Bartel, Eri.eng.json
|
1.1 MB
|
Effective Inter-Component Communication Mapping in Android An Essential Step Towards Holistic Security Analysis - Damien Octeau, Patrick McDaniel, Somesh Jha, Alexandre Bartel, Eri.eng.lrc
|
29.5 KB
|
Effective Inter-Component Communication Mapping in Android An Essential Step Towards Holistic Security Analysis - Damien Octeau, Patrick McDaniel, Somesh Jha, Alexandre Bartel, Eri.eng.srt
|
31.5 KB
|
Effective Inter-Component Communication Mapping in Android An Essential Step Towards Holistic Security Analysis - Damien Octeau, Patrick McDaniel, Somesh Jha, Alexandre Bartel, Eri.eng.text
|
22.0 KB
|
Effective Inter-Component Communication Mapping in Android An Essential Step Towards Holistic Security Analysis - Damien Octeau, Patrick McDaniel, Somesh Jha, Alexandre Bartel, Eri.eng.tsv
|
26.3 KB
|
Effective Inter-Component Communication Mapping in Android An Essential Step Towards Holistic Security Analysis - Damien Octeau, Patrick McDaniel, Somesh Jha, Alexandre Bartel, Eri.eng.txt
|
29.8 KB
|
Effective Inter-Component Communication Mapping in Android An Essential Step Towards Holistic Security Analysis - Damien Octeau, Patrick McDaniel, Somesh Jha, Alexandre Bartel, Eri.eng.vtt
|
28.8 KB
|
Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers - Suman Jana, David Molnar, Alexander Moshchuk, Alan Dunn, Benjamin Livshits, Helen J. Wang, E.eng.json
|
1.2 MB
|
Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers - Suman Jana, David Molnar, Alexander Moshchuk, Alan Dunn, Benjamin Livshits, Helen J. Wang, E.eng.lrc
|
32.6 KB
|
Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers - Suman Jana, David Molnar, Alexander Moshchuk, Alan Dunn, Benjamin Livshits, Helen J. Wang, E.eng.srt
|
30.5 KB
|
Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers - Suman Jana, David Molnar, Alexander Moshchuk, Alan Dunn, Benjamin Livshits, Helen J. Wang, E.eng.text
|
21.5 KB
|
Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers - Suman Jana, David Molnar, Alexander Moshchuk, Alan Dunn, Benjamin Livshits, Helen J. Wang, E.eng.tsv
|
27.8 KB
|
Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers - Suman Jana, David Molnar, Alexander Moshchuk, Alan Dunn, Benjamin Livshits, Helen J. Wang, E.eng.txt
|
33.0 KB
|
Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers - Suman Jana, David Molnar, Alexander Moshchuk, Alan Dunn, Benjamin Livshits, Helen J. Wang, E.eng.vtt
|
28.0 KB
|
Eradicating DNS Rebinding with the Extended Same-origin Policy - Martin Johns, Sebastian Lekies, Ben Stock.eng.json
|
1.4 MB
|
Eradicating DNS Rebinding with the Extended Same-origin Policy - Martin Johns, Sebastian Lekies, Ben Stock.eng.lrc
|
41.0 KB
|
Eradicating DNS Rebinding with the Extended Same-origin Policy - Martin Johns, Sebastian Lekies, Ben Stock.eng.srt
|
31.8 KB
|
Eradicating DNS Rebinding with the Extended Same-origin Policy - Martin Johns, Sebastian Lekies, Ben Stock.eng.text
|
26.7 KB
|
Eradicating DNS Rebinding with the Extended Same-origin Policy - Martin Johns, Sebastian Lekies, Ben Stock.eng.tsv
|
34.9 KB
|
Eradicating DNS Rebinding with the Extended Same-origin Policy - Martin Johns, Sebastian Lekies, Ben Stock.eng.txt
|
41.6 KB
|
Eradicating DNS Rebinding with the Extended Same-origin Policy - Martin Johns, Sebastian Lekies, Ben Stock.eng.vtt
|
30.3 KB
|
ExecScent Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates - Terry Nelms, Roberto Perdisci, Mustaque Ahamad.eng.json
|
1.2 MB
|
ExecScent Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates - Terry Nelms, Roberto Perdisci, Mustaque Ahamad.eng.lrc
|
35.8 KB
|
ExecScent Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates - Terry Nelms, Roberto Perdisci, Mustaque Ahamad.eng.srt
|
30.4 KB
|
ExecScent Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates - Terry Nelms, Roberto Perdisci, Mustaque Ahamad.eng.text
|
21.8 KB
|
ExecScent Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates - Terry Nelms, Roberto Perdisci, Mustaque Ahamad.eng.tsv
|
29.7 KB
|
ExecScent Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates - Terry Nelms, Roberto Perdisci, Mustaque Ahamad.eng.txt
|
36.3 KB
|
ExecScent Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates - Terry Nelms, Roberto Perdisci, Mustaque Ahamad.eng.vtt
|
27.9 KB
|
Explicating SDKs Uncovering Assumptions Underlying Secure Authentication and Authorization - Rui Wang, Yuchen Zhou, Shuo Chen, Shaz Qadeer, David Evans, Yuri Gurevich.eng.json
|
1.1 MB
|
Explicating SDKs Uncovering Assumptions Underlying Secure Authentication and Authorization - Rui Wang, Yuchen Zhou, Shuo Chen, Shaz Qadeer, David Evans, Yuri Gurevich.eng.lrc
|
29.7 KB
|
Explicating SDKs Uncovering Assumptions Underlying Secure Authentication and Authorization - Rui Wang, Yuchen Zhou, Shuo Chen, Shaz Qadeer, David Evans, Yuri Gurevich.eng.srt
|
30.2 KB
|
Explicating SDKs Uncovering Assumptions Underlying Secure Authentication and Authorization - Rui Wang, Yuchen Zhou, Shuo Chen, Shaz Qadeer, David Evans, Yuri Gurevich.eng.text
|
22.8 KB
|
Explicating SDKs Uncovering Assumptions Underlying Secure Authentication and Authorization - Rui Wang, Yuchen Zhou, Shuo Chen, Shaz Qadeer, David Evans, Yuri Gurevich.eng.tsv
|
26.7 KB
|
Explicating SDKs Uncovering Assumptions Underlying Secure Authentication and Authorization - Rui Wang, Yuchen Zhou, Shuo Chen, Shaz Qadeer, David Evans, Yuri Gurevich.eng.txt
|
29.9 KB
|
Explicating SDKs Uncovering Assumptions Underlying Secure Authentication and Authorization - Rui Wang, Yuchen Zhou, Shuo Chen, Shaz Qadeer, David Evans, Yuri Gurevich.eng.vtt
|
28.1 KB
|
FIE on Firmware Finding Vulnerabilities in Embedded Systems Using Symbolic Execution - Drew Davidson, Benjamin Moench, Somesh Jha, Thomas Ristenpart.eng.json
|
1.5 MB
|
FIE on Firmware Finding Vulnerabilities in Embedded Systems Using Symbolic Execution - Drew Davidson, Benjamin Moench, Somesh Jha, Thomas Ristenpart.eng.lrc
|
47.1 KB
|
FIE on Firmware Finding Vulnerabilities in Embedded Systems Using Symbolic Execution - Drew Davidson, Benjamin Moench, Somesh Jha, Thomas Ristenpart.eng.srt
|
35.1 KB
|
FIE on Firmware Finding Vulnerabilities in Embedded Systems Using Symbolic Execution - Drew Davidson, Benjamin Moench, Somesh Jha, Thomas Ristenpart.eng.text
|
25.6 KB
|
FIE on Firmware Finding Vulnerabilities in Embedded Systems Using Symbolic Execution - Drew Davidson, Benjamin Moench, Somesh Jha, Thomas Ristenpart.eng.tsv
|
37.8 KB
|
FIE on Firmware Finding Vulnerabilities in Embedded Systems Using Symbolic Execution - Drew Davidson, Benjamin Moench, Somesh Jha, Thomas Ristenpart.eng.txt
|
47.9 KB
|
FIE on Firmware Finding Vulnerabilities in Embedded Systems Using Symbolic Execution - Drew Davidson, Benjamin Moench, Somesh Jha, Thomas Ristenpart.eng.vtt
|
32.2 KB
|
Greystar Fast and Accurate Detection of SMS Spam Numbers in Large Cellular Networks Using Gray Phone Space - Nan Jiang, Yu Jin, Ann Skudlark, Zhi-Li Zhang.eng.json
|
1.0 MB
|
Greystar Fast and Accurate Detection of SMS Spam Numbers in Large Cellular Networks Using Gray Phone Space - Nan Jiang, Yu Jin, Ann Skudlark, Zhi-Li Zhang.eng.lrc
|
27.3 KB
|
Greystar Fast and Accurate Detection of SMS Spam Numbers in Large Cellular Networks Using Gray Phone Space - Nan Jiang, Yu Jin, Ann Skudlark, Zhi-Li Zhang.eng.srt
|
28.0 KB
|
Greystar Fast and Accurate Detection of SMS Spam Numbers in Large Cellular Networks Using Gray Phone Space - Nan Jiang, Yu Jin, Ann Skudlark, Zhi-Li Zhang.eng.text
|
20.6 KB
|
Greystar Fast and Accurate Detection of SMS Spam Numbers in Large Cellular Networks Using Gray Phone Space - Nan Jiang, Yu Jin, Ann Skudlark, Zhi-Li Zhang.eng.tsv
|
24.4 KB
|
Greystar Fast and Accurate Detection of SMS Spam Numbers in Large Cellular Networks Using Gray Phone Space - Nan Jiang, Yu Jin, Ann Skudlark, Zhi-Li Zhang.eng.txt
|
27.5 KB
|
Greystar Fast and Accurate Detection of SMS Spam Numbers in Large Cellular Networks Using Gray Phone Space - Nan Jiang, Yu Jin, Ann Skudlark, Zhi-Li Zhang.eng.vtt
|
25.9 KB
|
Impression Fraud in On-line Advertising via Pay-Per-View Networks - Kevin Springborn, Paul Barford.eng.json
|
1.2 MB
|
Impression Fraud in On-line Advertising via Pay-Per-View Networks - Kevin Springborn, Paul Barford.eng.lrc
|
29.4 KB
|
Impression Fraud in On-line Advertising via Pay-Per-View Networks - Kevin Springborn, Paul Barford.eng.srt
|
32.9 KB
|
Impression Fraud in On-line Advertising via Pay-Per-View Networks - Kevin Springborn, Paul Barford.eng.text
|
22.6 KB
|
Impression Fraud in On-line Advertising via Pay-Per-View Networks - Kevin Springborn, Paul Barford.eng.tsv
|
26.4 KB
|
Impression Fraud in On-line Advertising via Pay-Per-View Networks - Kevin Springborn, Paul Barford.eng.txt
|
29.7 KB
|
Impression Fraud in On-line Advertising via Pay-Per-View Networks - Kevin Springborn, Paul Barford.eng.vtt
|
30.0 KB
|
Jekyll on iOS When Benign Apps Become Evil - Tielei Wang, Kangjie Lu, Long Lu, Simon Chung, Wenke Lee.eng.json
|
1.2 MB
|
Jekyll on iOS When Benign Apps Become Evil - Tielei Wang, Kangjie Lu, Long Lu, Simon Chung, Wenke Lee.eng.lrc
|
33.2 KB
|
Jekyll on iOS When Benign Apps Become Evil - Tielei Wang, Kangjie Lu, Long Lu, Simon Chung, Wenke Lee.eng.srt
|
30.9 KB
|
Jekyll on iOS When Benign Apps Become Evil - Tielei Wang, Kangjie Lu, Long Lu, Simon Chung, Wenke Lee.eng.text
|
21.8 KB
|
Jekyll on iOS When Benign Apps Become Evil - Tielei Wang, Kangjie Lu, Long Lu, Simon Chung, Wenke Lee.eng.tsv
|
28.4 KB
|
Jekyll on iOS When Benign Apps Become Evil - Tielei Wang, Kangjie Lu, Long Lu, Simon Chung, Wenke Lee.eng.txt
|
33.6 KB
|
Jekyll on iOS When Benign Apps Become Evil - Tielei Wang, Kangjie Lu, Long Lu, Simon Chung, Wenke Lee.eng.vtt
|
28.3 KB
|
Measuring the Practical Impact of DNSSEC Deployment - Wilson Lian, Eric Rescorla, Hovav Shacham, Stefan Savage.eng.json
|
1.5 MB
|
Measuring the Practical Impact of DNSSEC Deployment - Wilson Lian, Eric Rescorla, Hovav Shacham, Stefan Savage.eng.lrc
|
42.2 KB
|
Measuring the Practical Impact of DNSSEC Deployment - Wilson Lian, Eric Rescorla, Hovav Shacham, Stefan Savage.eng.srt
|
37.7 KB
|
Measuring the Practical Impact of DNSSEC Deployment - Wilson Lian, Eric Rescorla, Hovav Shacham, Stefan Savage.eng.text
|
26.0 KB
|
Measuring the Practical Impact of DNSSEC Deployment - Wilson Lian, Eric Rescorla, Hovav Shacham, Stefan Savage.eng.tsv
|
35.2 KB
|
Measuring the Practical Impact of DNSSEC Deployment - Wilson Lian, Eric Rescorla, Hovav Shacham, Stefan Savage.eng.txt
|
42.8 KB
|
Measuring the Practical Impact of DNSSEC Deployment - Wilson Lian, Eric Rescorla, Hovav Shacham, Stefan Savage.eng.vtt
|
34.3 KB
|
MetaSymploit Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis - Ruowen Wang, Peng Ning, Tao Xie, Quan Chen.eng.json
|
1.4 MB
|
MetaSymploit Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis - Ruowen Wang, Peng Ning, Tao Xie, Quan Chen.eng.lrc
|
36.4 KB
|
MetaSymploit Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis - Ruowen Wang, Peng Ning, Tao Xie, Quan Chen.eng.srt
|
39.5 KB
|
MetaSymploit Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis - Ruowen Wang, Peng Ning, Tao Xie, Quan Chen.eng.text
|
28.5 KB
|
MetaSymploit Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis - Ruowen Wang, Peng Ning, Tao Xie, Quan Chen.eng.tsv
|
33.0 KB
|
MetaSymploit Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis - Ruowen Wang, Peng Ning, Tao Xie, Quan Chen.eng.txt
|
36.7 KB
|
MetaSymploit Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis - Ruowen Wang, Peng Ning, Tao Xie, Quan Chen.eng.vtt
|
36.4 KB
|
Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring - Edward J. Schwartz, JongHyup Lee, Maverick Woo, David Brumley.eng.json
|
1.6 MB
|
Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring - Edward J. Schwartz, JongHyup Lee, Maverick Woo, David Brumley.eng.lrc
|
43.3 KB
|
Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring - Edward J. Schwartz, JongHyup Lee, Maverick Woo, David Brumley.eng.srt
|
41.4 KB
|
Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring - Edward J. Schwartz, JongHyup Lee, Maverick Woo, David Brumley.eng.text
|
30.6 KB
|
Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring - Edward J. Schwartz, JongHyup Lee, Maverick Woo, David Brumley.eng.tsv
|
37.9 KB
|
Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring - Edward J. Schwartz, JongHyup Lee, Maverick Woo, David Brumley.eng.txt
|
43.8 KB
|
Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring - Edward J. Schwartz, JongHyup Lee, Maverick Woo, David Brumley.eng.vtt
|
38.3 KB
|
On the Security of Picture Gesture Authentication - Ziming Zhao, Gail-Joon Ahn, Jeong-Jin Seo, Hongxin Hu.eng.json
|
1.1 MB
|
On the Security of Picture Gesture Authentication - Ziming Zhao, Gail-Joon Ahn, Jeong-Jin Seo, Hongxin Hu.eng.lrc
|
31.3 KB
|
On the Security of Picture Gesture Authentication - Ziming Zhao, Gail-Joon Ahn, Jeong-Jin Seo, Hongxin Hu.eng.srt
|
26.4 KB
|
On the Security of Picture Gesture Authentication - Ziming Zhao, Gail-Joon Ahn, Jeong-Jin Seo, Hongxin Hu.eng.text
|
19.3 KB
|
On the Security of Picture Gesture Authentication - Ziming Zhao, Gail-Joon Ahn, Jeong-Jin Seo, Hongxin Hu.eng.tsv
|
26.0 KB
|
On the Security of Picture Gesture Authentication - Ziming Zhao, Gail-Joon Ahn, Jeong-Jin Seo, Hongxin Hu.eng.txt
|
31.7 KB
|
On the Security of Picture Gesture Authentication - Ziming Zhao, Gail-Joon Ahn, Jeong-Jin Seo, Hongxin Hu.eng.vtt
|
24.4 KB
|
On the Security of RC4 in TLS - Nadhem AlFardan, Royal Holloway, Daniel J. Bernstein, Kenneth G. Paterson, Bertram Poettering, Jacob C.N. Schuldt.eng.json
|
1.2 MB
|
On the Security of RC4 in TLS - Nadhem AlFardan, Royal Holloway, Daniel J. Bernstein, Kenneth G. Paterson, Bertram Poettering, Jacob C.N. Schuldt.eng.lrc
|
35.6 KB
|
On the Security of RC4 in TLS - Nadhem AlFardan, Royal Holloway, Daniel J. Bernstein, Kenneth G. Paterson, Bertram Poettering, Jacob C.N. Schuldt.eng.srt
|
30.4 KB
|
On the Security of RC4 in TLS - Nadhem AlFardan, Royal Holloway, Daniel J. Bernstein, Kenneth G. Paterson, Bertram Poettering, Jacob C.N. Schuldt.eng.text
|
21.2 KB
|
On the Security of RC4 in TLS - Nadhem AlFardan, Royal Holloway, Daniel J. Bernstein, Kenneth G. Paterson, Bertram Poettering, Jacob C.N. Schuldt.eng.tsv
|
29.3 KB
|
On the Security of RC4 in TLS - Nadhem AlFardan, Royal Holloway, Daniel J. Bernstein, Kenneth G. Paterson, Bertram Poettering, Jacob C.N. Schuldt.eng.txt
|
36.2 KB
|
On the Security of RC4 in TLS - Nadhem AlFardan, Royal Holloway, Daniel J. Bernstein, Kenneth G. Paterson, Bertram Poettering, Jacob C.N. Schuldt.eng.vtt
|
27.7 KB
|
PCF A Portable Circuit Format for Scalable Two-Party Secure Computation - Ben Kreuter, Benjamin Mood, Abhi Shelat, Kevin Butler.eng.json
|
870.5 KB
|
PCF A Portable Circuit Format for Scalable Two-Party Secure Computation - Ben Kreuter, Benjamin Mood, Abhi Shelat, Kevin Butler.eng.lrc
|
23.6 KB
|
PCF A Portable Circuit Format for Scalable Two-Party Secure Computation - Ben Kreuter, Benjamin Mood, Abhi Shelat, Kevin Butler.eng.srt
|
23.2 KB
|
PCF A Portable Circuit Format for Scalable Two-Party Secure Computation - Ben Kreuter, Benjamin Mood, Abhi Shelat, Kevin Butler.eng.text
|
16.8 KB
|
PCF A Portable Circuit Format for Scalable Two-Party Secure Computation - Ben Kreuter, Benjamin Mood, Abhi Shelat, Kevin Butler.eng.tsv
|
20.5 KB
|
PCF A Portable Circuit Format for Scalable Two-Party Secure Computation - Ben Kreuter, Benjamin Mood, Abhi Shelat, Kevin Butler.eng.txt
|
23.9 KB
|
PCF A Portable Circuit Format for Scalable Two-Party Secure Computation - Ben Kreuter, Benjamin Mood, Abhi Shelat, Kevin Butler.eng.vtt
|
21.4 KB
|
Proactively Accountable Anonymous Messaging in Verdict - Henry Corrigan-Gibbs, David Isaac Wolinsky, Bryan Ford.eng.json
|
1.4 MB
|
Proactively Accountable Anonymous Messaging in Verdict - Henry Corrigan-Gibbs, David Isaac Wolinsky, Bryan Ford.eng.lrc
|
36.7 KB
|
Proactively Accountable Anonymous Messaging in Verdict - Henry Corrigan-Gibbs, David Isaac Wolinsky, Bryan Ford.eng.srt
|
37.7 KB
|
Proactively Accountable Anonymous Messaging in Verdict - Henry Corrigan-Gibbs, David Isaac Wolinsky, Bryan Ford.eng.text
|
28.6 KB
|
Proactively Accountable Anonymous Messaging in Verdict - Henry Corrigan-Gibbs, David Isaac Wolinsky, Bryan Ford.eng.tsv
|
33.2 KB
|
Proactively Accountable Anonymous Messaging in Verdict - Henry Corrigan-Gibbs, David Isaac Wolinsky, Bryan Ford.eng.txt
|
37.0 KB
|
Proactively Accountable Anonymous Messaging in Verdict - Henry Corrigan-Gibbs, David Isaac Wolinsky, Bryan Ford.eng.vtt
|
35.1 KB
|
Revolver An Automated Approach to the Detection of Evasive Web-based Malware - Alexandros Kapravelos, Yan Shoshitaishvili, Marco Cova, Christopher Kruegel, Giovanni Vigna.eng.json
|
1.1 MB
|
Revolver An Automated Approach to the Detection of Evasive Web-based Malware - Alexandros Kapravelos, Yan Shoshitaishvili, Marco Cova, Christopher Kruegel, Giovanni Vigna.eng.lrc
|
26.8 KB
|
Revolver An Automated Approach to the Detection of Evasive Web-based Malware - Alexandros Kapravelos, Yan Shoshitaishvili, Marco Cova, Christopher Kruegel, Giovanni Vigna.eng.srt
|
28.4 KB
|
Revolver An Automated Approach to the Detection of Evasive Web-based Malware - Alexandros Kapravelos, Yan Shoshitaishvili, Marco Cova, Christopher Kruegel, Giovanni Vigna.eng.text
|
20.9 KB
|
Revolver An Automated Approach to the Detection of Evasive Web-based Malware - Alexandros Kapravelos, Yan Shoshitaishvili, Marco Cova, Christopher Kruegel, Giovanni Vigna.eng.tsv
|
24.2 KB
|
Revolver An Automated Approach to the Detection of Evasive Web-based Malware - Alexandros Kapravelos, Yan Shoshitaishvili, Marco Cova, Christopher Kruegel, Giovanni Vigna.eng.txt
|
27.0 KB
|
Revolver An Automated Approach to the Detection of Evasive Web-based Malware - Alexandros Kapravelos, Yan Shoshitaishvili, Marco Cova, Christopher Kruegel, Giovanni Vigna.eng.vtt
|
26.3 KB
|
Sancus Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base - Job Noorman, Pieter Agten, Wilfried Daniels, Raoul Strackx, Anthony Van Herre.eng.json
|
1.5 MB
|
Sancus Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base - Job Noorman, Pieter Agten, Wilfried Daniels, Raoul Strackx, Anthony Van Herre.eng.lrc
|
43.5 KB
|
Sancus Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base - Job Noorman, Pieter Agten, Wilfried Daniels, Raoul Strackx, Anthony Van Herre.eng.srt
|
38.0 KB
|
Sancus Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base - Job Noorman, Pieter Agten, Wilfried Daniels, Raoul Strackx, Anthony Van Herre.eng.text
|
28.3 KB
|
Sancus Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base - Job Noorman, Pieter Agten, Wilfried Daniels, Raoul Strackx, Anthony Van Herre.eng.tsv
|
37.1 KB
|
Sancus Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base - Job Noorman, Pieter Agten, Wilfried Daniels, Raoul Strackx, Anthony Van Herre.eng.txt
|
44.1 KB
|
Sancus Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base - Job Noorman, Pieter Agten, Wilfried Daniels, Raoul Strackx, Anthony Van Herre.eng.vtt
|
35.2 KB
|
Secure Outsourced Garbled Circuit Evaluation for Mobile Devices - Henry Carter, Benjamin Mood, Patrick Traynor, Kevin Butler.eng.json
|
1.3 MB
|
Secure Outsourced Garbled Circuit Evaluation for Mobile Devices - Henry Carter, Benjamin Mood, Patrick Traynor, Kevin Butler.eng.lrc
|
34.1 KB
|
Secure Outsourced Garbled Circuit Evaluation for Mobile Devices - Henry Carter, Benjamin Mood, Patrick Traynor, Kevin Butler.eng.srt
|
33.8 KB
|
Secure Outsourced Garbled Circuit Evaluation for Mobile Devices - Henry Carter, Benjamin Mood, Patrick Traynor, Kevin Butler.eng.text
|
26.3 KB
|
Secure Outsourced Garbled Circuit Evaluation for Mobile Devices - Henry Carter, Benjamin Mood, Patrick Traynor, Kevin Butler.eng.tsv
|
30.8 KB
|
Secure Outsourced Garbled Circuit Evaluation for Mobile Devices - Henry Carter, Benjamin Mood, Patrick Traynor, Kevin Butler.eng.txt
|
34.4 KB
|
Secure Outsourced Garbled Circuit Evaluation for Mobile Devices - Henry Carter, Benjamin Mood, Patrick Traynor, Kevin Butler.eng.vtt
|
31.7 KB
|
Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation - Frank Imeson, Ariq Emtenan, Siddharth Garg, Mahesh V. Tripunita.eng.json
|
1.1 MB
|
Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation - Frank Imeson, Ariq Emtenan, Siddharth Garg, Mahesh V. Tripunita.eng.lrc
|
26.8 KB
|
Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation - Frank Imeson, Ariq Emtenan, Siddharth Garg, Mahesh V. Tripunita.eng.srt
|
29.0 KB
|
Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation - Frank Imeson, Ariq Emtenan, Siddharth Garg, Mahesh V. Tripunita.eng.text
|
20.5 KB
|
Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation - Frank Imeson, Ariq Emtenan, Siddharth Garg, Mahesh V. Tripunita.eng.tsv
|
24.1 KB
|
Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation - Frank Imeson, Ariq Emtenan, Siddharth Garg, Mahesh V. Tripunita.eng.txt
|
27.0 KB
|
Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation - Frank Imeson, Ariq Emtenan, Siddharth Garg, Mahesh V. Tripunita.eng.vtt
|
26.6 KB
|
Securing Embedded User Interfaces Android and Beyond - Franziska Roesner, Tadayoshi Kohno.eng.json
|
1.3 MB
|
Securing Embedded User Interfaces Android and Beyond - Franziska Roesner, Tadayoshi Kohno.eng.lrc
|
36.7 KB
|
Securing Embedded User Interfaces Android and Beyond - Franziska Roesner, Tadayoshi Kohno.eng.srt
|
35.3 KB
|
Securing Embedded User Interfaces Android and Beyond - Franziska Roesner, Tadayoshi Kohno.eng.text
|
26.4 KB
|
Securing Embedded User Interfaces Android and Beyond - Franziska Roesner, Tadayoshi Kohno.eng.tsv
|
32.2 KB
|
Securing Embedded User Interfaces Android and Beyond - Franziska Roesner, Tadayoshi Kohno.eng.txt
|
37.1 KB
|
Securing Embedded User Interfaces Android and Beyond - Franziska Roesner, Tadayoshi Kohno.eng.vtt
|
32.8 KB
|
Security Team 2.0 - Chris Evans.eng.srt
|
129.0 KB
|
Steal This Movie Automatically Bypassing DRM Protection in Streaming Media Services - Ruoyu Wang, Santa Barbara, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna.eng.json
|
1.4 MB
|
Steal This Movie Automatically Bypassing DRM Protection in Streaming Media Services - Ruoyu Wang, Santa Barbara, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna.eng.lrc
|
41.1 KB
|
Steal This Movie Automatically Bypassing DRM Protection in Streaming Media Services - Ruoyu Wang, Santa Barbara, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna.eng.srt
|
36.3 KB
|
Steal This Movie Automatically Bypassing DRM Protection in Streaming Media Services - Ruoyu Wang, Santa Barbara, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna.eng.text
|
24.8 KB
|
Steal This Movie Automatically Bypassing DRM Protection in Streaming Media Services - Ruoyu Wang, Santa Barbara, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna.eng.tsv
|
34.1 KB
|
Steal This Movie Automatically Bypassing DRM Protection in Streaming Media Services - Ruoyu Wang, Santa Barbara, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna.eng.txt
|
41.8 KB
|
Steal This Movie Automatically Bypassing DRM Protection in Streaming Media Services - Ruoyu Wang, Santa Barbara, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna.eng.vtt
|
32.9 KB
|
Take This Personally Pollution Attacks on Personalized Services - Xinyu Xing, Wei Meng, Dan Doozan, Alex C. Snoeren, Nick Feamster, Wenke Lee.eng.json
|
1.1 MB
|
Take This Personally Pollution Attacks on Personalized Services - Xinyu Xing, Wei Meng, Dan Doozan, Alex C. Snoeren, Nick Feamster, Wenke Lee.eng.lrc
|
30.2 KB
|
Take This Personally Pollution Attacks on Personalized Services - Xinyu Xing, Wei Meng, Dan Doozan, Alex C. Snoeren, Nick Feamster, Wenke Lee.eng.srt
|
31.2 KB
|
Take This Personally Pollution Attacks on Personalized Services - Xinyu Xing, Wei Meng, Dan Doozan, Alex C. Snoeren, Nick Feamster, Wenke Lee.eng.text
|
22.3 KB
|
Take This Personally Pollution Attacks on Personalized Services - Xinyu Xing, Wei Meng, Dan Doozan, Alex C. Snoeren, Nick Feamster, Wenke Lee.eng.tsv
|
26.8 KB
|
Take This Personally Pollution Attacks on Personalized Services - Xinyu Xing, Wei Meng, Dan Doozan, Alex C. Snoeren, Nick Feamster, Wenke Lee.eng.txt
|
30.5 KB
|
Take This Personally Pollution Attacks on Personalized Services - Xinyu Xing, Wei Meng, Dan Doozan, Alex C. Snoeren, Nick Feamster, Wenke Lee.eng.vtt
|
28.7 KB
|
The Velocity of Censorship High-Fidelity Detection of Microblog Post Deletions - Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall.eng.json
|
1.0 MB
|
The Velocity of Censorship High-Fidelity Detection of Microblog Post Deletions - Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall.eng.lrc
|
26.1 KB
|
The Velocity of Censorship High-Fidelity Detection of Microblog Post Deletions - Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall.eng.srt
|
28.6 KB
|
The Velocity of Censorship High-Fidelity Detection of Microblog Post Deletions - Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall.eng.text
|
20.1 KB
|
The Velocity of Censorship High-Fidelity Detection of Microblog Post Deletions - Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall.eng.tsv
|
23.6 KB
|
The Velocity of Censorship High-Fidelity Detection of Microblog Post Deletions - Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall.eng.txt
|
26.4 KB
|
The Velocity of Censorship High-Fidelity Detection of Microblog Post Deletions - Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall.eng.vtt
|
26.2 KB
|
The White House's Priorities for Cybersecurity - Andy Ozment.eng.srt
|
142.2 KB
|
Towards Automatic Software Lineage Inference - Jiyong Jang, Maverick Woo, David Brumley.eng.json
|
1.4 MB
|
Towards Automatic Software Lineage Inference - Jiyong Jang, Maverick Woo, David Brumley.eng.lrc
|
34.7 KB
|
Towards Automatic Software Lineage Inference - Jiyong Jang, Maverick Woo, David Brumley.eng.srt
|
36.1 KB
|
Towards Automatic Software Lineage Inference - Jiyong Jang, Maverick Woo, David Brumley.eng.text
|
26.9 KB
|
Towards Automatic Software Lineage Inference - Jiyong Jang, Maverick Woo, David Brumley.eng.tsv
|
31.3 KB
|
Towards Automatic Software Lineage Inference - Jiyong Jang, Maverick Woo, David Brumley.eng.txt
|
35.0 KB
|
Towards Automatic Software Lineage Inference - Jiyong Jang, Maverick Woo, David Brumley.eng.vtt
|
33.5 KB
|
Tracking the Casino Computer Wars Who’s Winning - the Casino or the Cheat - Richard Marcus.eng.srt
|
84.8 KB
|
Trafficking Fradulent Accounts The Role of the Underground Market in Twitter Spam and Abuse - Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, Vern Paxson.eng.json
|
1.7 MB
|
Trafficking Fradulent Accounts The Role of the Underground Market in Twitter Spam and Abuse - Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, Vern Paxson.eng.lrc
|
45.6 KB
|
Trafficking Fradulent Accounts The Role of the Underground Market in Twitter Spam and Abuse - Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, Vern Paxson.eng.srt
|
45.6 KB
|
Trafficking Fradulent Accounts The Role of the Underground Market in Twitter Spam and Abuse - Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, Vern Paxson.eng.text
|
34.0 KB
|
Trafficking Fradulent Accounts The Role of the Underground Market in Twitter Spam and Abuse - Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, Vern Paxson.eng.tsv
|
40.5 KB
|
Trafficking Fradulent Accounts The Role of the Underground Market in Twitter Spam and Abuse - Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, Vern Paxson.eng.txt
|
46.0 KB
|
Trafficking Fradulent Accounts The Role of the Underground Market in Twitter Spam and Abuse - Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, Vern Paxson.eng.vtt
|
42.3 KB
|
Transparent ROP Exploit Mitigation Using Indirect Branch Tracing - Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis.eng.json
|
1.2 MB
|
Transparent ROP Exploit Mitigation Using Indirect Branch Tracing - Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis.eng.lrc
|
30.6 KB
|
Transparent ROP Exploit Mitigation Using Indirect Branch Tracing - Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis.eng.srt
|
31.6 KB
|
Transparent ROP Exploit Mitigation Using Indirect Branch Tracing - Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis.eng.text
|
22.6 KB
|
Transparent ROP Exploit Mitigation Using Indirect Branch Tracing - Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis.eng.tsv
|
27.2 KB
|
Transparent ROP Exploit Mitigation Using Indirect Branch Tracing - Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis.eng.txt
|
30.9 KB
|
Transparent ROP Exploit Mitigation Using Indirect Branch Tracing - Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis.eng.vtt
|
29.1 KB
|
WHYPER Towards Automating Risk Assessment of Mobile Applications - Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, Tao Xie.eng.json
|
1.5 MB
|
WHYPER Towards Automating Risk Assessment of Mobile Applications - Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, Tao Xie.eng.lrc
|
42.4 KB
|
WHYPER Towards Automating Risk Assessment of Mobile Applications - Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, Tao Xie.eng.srt
|
36.7 KB
|
WHYPER Towards Automating Risk Assessment of Mobile Applications - Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, Tao Xie.eng.text
|
26.9 KB
|
WHYPER Towards Automating Risk Assessment of Mobile Applications - Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, Tao Xie.eng.tsv
|
35.9 KB
|
WHYPER Towards Automating Risk Assessment of Mobile Applications - Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, Tao Xie.eng.txt
|
43.0 KB
|
WHYPER Towards Automating Risk Assessment of Mobile Applications - Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, Tao Xie.eng.vtt
|
33.8 KB
|
Windows 8 Security - Supporting User Confidence - Crispin Cowan.eng.srt
|
60.0 KB
|
You Are How You Click Clickstream Analysis for Sybil Detection - Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng, Ben Y. Zhao.eng.json
|
1.2 MB
|
You Are How You Click Clickstream Analysis for Sybil Detection - Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng, Ben Y. Zhao.eng.lrc
|
29.8 KB
|
You Are How You Click Clickstream Analysis for Sybil Detection - Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng, Ben Y. Zhao.eng.srt
|
33.1 KB
|
You Are How You Click Clickstream Analysis for Sybil Detection - Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng, Ben Y. Zhao.eng.text
|
23.0 KB
|
You Are How You Click Clickstream Analysis for Sybil Detection - Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng, Ben Y. Zhao.eng.tsv
|
26.9 KB
|
You Are How You Click Clickstream Analysis for Sybil Detection - Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng, Ben Y. Zhao.eng.txt
|
30.1 KB
|
You Are How You Click Clickstream Analysis for Sybil Detection - Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng, Ben Y. Zhao.eng.vtt
|
30.3 KB
|
ZMap Fast Internet-wide Scanning and Its Security Applications - durumeric.eng.json
|
1.5 MB
|
ZMap Fast Internet-wide Scanning and Its Security Applications - durumeric.eng.lrc
|
38.6 KB
|
ZMap Fast Internet-wide Scanning and Its Security Applications - durumeric.eng.srt
|
42.5 KB
|
ZMap Fast Internet-wide Scanning and Its Security Applications - durumeric.eng.text
|
29.5 KB
|
ZMap Fast Internet-wide Scanning and Its Security Applications - durumeric.eng.tsv
|
34.7 KB
|
ZMap Fast Internet-wide Scanning and Its Security Applications - durumeric.eng.txt
|
39.0 KB
|
ZMap Fast Internet-wide Scanning and Its Security Applications - durumeric.eng.vtt
|
38.8 KB
|
ZQL A Compiler for Privacy-Preserving Data Processing - Cedric Fournet, Markulf Kohlweiss, George Danezis.eng.json
|
1.2 MB
|
ZQL A Compiler for Privacy-Preserving Data Processing - Cedric Fournet, Markulf Kohlweiss, George Danezis.eng.lrc
|
30.9 KB
|
ZQL A Compiler for Privacy-Preserving Data Processing - Cedric Fournet, Markulf Kohlweiss, George Danezis.eng.srt
|
30.7 KB
|
ZQL A Compiler for Privacy-Preserving Data Processing - Cedric Fournet, Markulf Kohlweiss, George Danezis.eng.text
|
23.8 KB
|
ZQL A Compiler for Privacy-Preserving Data Processing - Cedric Fournet, Markulf Kohlweiss, George Danezis.eng.tsv
|
27.8 KB
|
ZQL A Compiler for Privacy-Preserving Data Processing - Cedric Fournet, Markulf Kohlweiss, George Danezis.eng.txt
|
31.2 KB
|
ZQL A Compiler for Privacy-Preserving Data Processing - Cedric Fournet, Markulf Kohlweiss, George Danezis.eng.vtt
|
28.7 KB
|
/.../USENIX Security 2013 Presentations/
|
Alice in Warningland A Large-Scale Field Study of Browser Security Warning Effectiveness - Devdatta Akhawe, Adrienne Porter Felt.pdf
|
2.3 MB
|
Alice in Warningland A Large-Scale Field Study of Browser Security Warning Effectiveness Slides - Devdatta Akhawe, Adrienne Porter Felt.pdf
|
1.5 MB
|
An Empirical Study of Vulnerability Rewards Programs - Matthew Finifter, Devdatta Akhawe, David Wagner.pdf
|
2.2 MB
|
An Empirical Study of Vulnerability Rewards Programs Slides Slides - Matthew Finifter, Devdatta Akhawe, David Wagner.pdf
|
1.7 MB
|
Automatic Mediation of Privacy-Sensitive Resource Access in Smartphone Applications - Benjamin Livshits, Jaeyeon Jung.pdf
|
2.5 MB
|
CacheAudit A Tool for the Static Analysis of Cache Side Channels - Goran Doychev, Dominik Feld, Boris Kopf, Laurent Mauborgne, Jan Reineke.pdf
|
2.1 MB
|
Confessions of a Recovering Data Broker Responsible Innovation in the Age of Big Data, Big Brother, and the Coming Skynet Terminators Slides - Jim Adler.pdf
|
28.7 MB
|
Control Flow Integrity for COTS Binaries - Mingwei Zhang, R. Sekar.pdf
|
2.1 MB
|
Control Flow Integrity for COTS Binaries Slides - Mingwei Zhang, R. Sekar.pdf
|
548.5 KB
|
Dismantling Megamos Crypto Wirelessly Lockpicking a Vehicle Immobilizer Slides - Roel Verdult, Flavio D. Garcia, Baris Ege.pdf
|
11.6 MB
|
Dowsing for Overflows A Guided Fuzzer to Find Buffer Boundary Violations - Istvan Haller, Asia Slowinska, Matthias Neugschwandtner, Herbert Bos.pdf
|
2.5 MB
|
Dowsing for Overflows A Guided Fuzzer to Find Buffer Boundary Violations Slides - Istvan Haller, Asia Slowinska, Matthias Neugschwandtner, Herbert Bos.pdf
|
967.7 KB
|
DupLESS Server-Aided Encryption for Deduplicated Storage - Mihir Bellare, Sriram Keelveedhi, Thomas Ristenpart.pdf
|
2.1 MB
|
DupLESS Server-Aided Encryption for Deduplicated Storage Slides - Mihir Bellare, Sriram Keelveedhi, Thomas Ristenpart.pdf
|
1.5 MB
|
Effective Inter-Component Communication Mapping in Android An Essential Step Towards Holistic Security Analysis - Damien Octeau, Patrick McDaniel, Somesh Jha, Alexa.pdf
|
2.3 MB
|
Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers - Suman Jana, David Molnar, Alexander Moshchuk, Alan Dunn, Benjamin Livshits, .pdf
|
3.8 MB
|
Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers Slides - Suman Jana, David Molnar, Alexander Moshchuk, Alan Dunn, Benjamin Liv.pdf
|
3.3 MB
|
Eradicating DNS Rebinding with the Extended Same-origin Policy - Martin Johns, Sebastian Lekies, Ben Stock.pdf
|
2.1 MB
|
Eradicating DNS Rebinding with the Extended Same-origin Policy Slides - Martin Johns, Sebastian Lekies, Ben Stock.pdf
|
836.2 KB
|
ExecScent Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates - Terry Nelms, Roberto Perdisci, Mustaque Ahamad.pdf
|
2.3 MB
|
ExecScent Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates Slides - Terry Nelms, Roberto Perdisci, Mustaque Ahamad.pdf
|
2.2 MB
|
Explicating SDKs Uncovering Assumptions Underlying Secure Authentication and Authorization - Rui Wang, Yuchen Zhou, Shuo Chen, Shaz Qadeer, David Evans, Yuri Gurevi.pdf
|
2.4 MB
|
Explicating SDKs Uncovering Assumptions Underlying Secure Authentication and Authorization Slides - Rui Wang, Yuchen Zhou, Shuo Chen, Shaz Qadeer, David Evans, Yuri.pdf
|
2.3 MB
|
FIE on Firmware Finding Vulnerabilities in Embedded Systems Using Symbolic Execution - Drew Davidson, Benjamin Moench, Somesh Jha, Thomas Ristenpart.pdf
|
2.1 MB
|
FIE on Firmware Finding Vulnerabilities in Embedded Systems Using Symbolic Execution Slides - Drew Davidson, Benjamin Moench, Somesh Jha, Thomas Ristenpart.pdf
|
1.3 MB
|
Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies - Sven Bugiel, Stephan Heuser, Ahmad-Reza Sadeghi.pdf
|
2.3 MB
|
Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies Slides - Sven Bugiel, Stephan Heuser, Ahmad-Reza Sadeghi.pdf
|
5.9 MB
|
Greystar Fast and Accurate Detection of SMS Spam Numbers in Large Cellular Networks Using Gray Phone Space - Nan Jiang, Yu Jin, Ann Skudlark, Zhi-Li Zhang.pdf
|
5.9 MB
|
Impression Fraud in On-line Advertising via Pay-Per-View Networks - Kevin Springborn, Paul Barford.pdf
|
2.5 MB
|
Impression Fraud in On-line Advertising via Pay-Per-View Networks Slides - Kevin Springborn, Paul Barford.pdf
|
827.1 KB
|
Jekyll on iOS When Benign Apps Become Evil - Tielei Wang, Kangjie Lu, Long Lu, Simon Chung, Wenke Lee.pdf
|
2.7 MB
|
KI-Mon A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel Object - Hojoon Lee, HyunGon Moon, DaeHee Jang, Kihwan Kim, Jihoon Lee, Yunheung P.pdf
|
2.3 MB
|
Language-based Defenses Against Untrusted Browser Origins - Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Sergio Maffeisn.pdf
|
2.5 MB
|
Language-based Defenses Against Untrusted Browser Origins Slides - Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Sergio Maffeis.pdf
|
1.6 MB
|
Let Me Answer That for You Exploiting Broadcast Information in Cellular Networks - Nico Golde, Kévin Redon, and Jean-Pierre Seifert.pdf
|
3.1 MB
|
Let Me Answer That for You Exploiting Broadcast Information in Cellular Networks Slides - Nico Golde, Kévin Redon, and Jean-Pierre Seifert.pdf
|
6.7 MB
|
Measuring the Practical Impact of DNSSEC Deployment - Wilson Lian, Eric Rescorla, Hovav Shacham, Stefan Savage.pdf
|
2.3 MB
|
MetaSymploit Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis - Ruowen Wang, Peng Ning, Tao Xie, Quan Chen.pdf
|
2.1 MB
|
MetaSymploit Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis Slides - Ruowen Wang, Peng Ning, Tao Xie, Quan Chen.pdf
|
2.0 MB
|
Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring - Edward J. Schwartz, JongHyup Lee, Maverick Woo, Dav.pdf
|
2.2 MB
|
On the Security of Picture Gesture Authentication - Ziming Zhao, Gail-Joon Ahn, Jeong-Jin Seo, Hongxin Hu.pdf
|
4.6 MB
|
On the Security of Picture Gesture Authentication Slides - Ziming Zhao, Gail-Joon Ahn, Jeong-Jin Seo, Hongxin Hu.pdf
|
2.0 MB
|
On the Security of RC4 in TLS - Nadhem AlFardan, Royal Holloway, Daniel J. Bernstein, Kenneth G. Paterson, Bertram Poettering, Jacob C.N. Schuldt.pdf
|
2.2 MB
|
On the Security of RC4 in TLS Slides - Nadhem AlFardan, Royal Holloway, Daniel J. Bernstein, Kenneth G. Paterson, Bertram Poettering, Jacob C.N. Schuldt.pdf
|
3.3 MB
|
PCF A Portable Circuit Format for Scalable Two-Party Secure Computation - Ben Kreuter, Benjamin Mood, Abhi Shelat, Kevin Butler.pdf
|
2.1 MB
|
PCF A Portable Circuit Format for Scalable Two-Party Secure Computation Slides - Ben Kreuter, Benjamin Mood, Abhi Shelat, Kevin Butler.pdf
|
168.4 KB
|
Practical Comprehensive Bounds on Surreptitious Communication over DNS - Rao, Reiner Sailer, Douglas Lee Schales, Marc Ph. Stoecklin, Kurt Thomas, Wietse Venema.pdf
|
5.0 MB
|
Practical Comprehensive Bounds on Surreptitious Communication over DNS Slides - Rao, Reiner Sailer, Douglas Lee Schales, Marc Ph. Stoecklin, Kurt Thomas, Wietse Ven.pdf
|
1.9 MB
|
Proactively Accountable Anonymous Messaging in Verdict - Henry Corrigan-Gibbs, David Isaac Wolinsky, Bryan Ford.pdf
|
2.3 MB
|
Revolver An Automated Approach to the Detection of Evasive Web-based Malware - Alexandros Kapravelos, Yan Shoshitaishvili, Marco Cova, Christopher Kruegel, Giovanni.pdf
|
2.3 MB
|
Sancus Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base - Job Noorman, Pieter Agten, Wilfried Daniels, Raoul Strackx, A.pdf
|
2.1 MB
|
Sancus Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base Slides - Job Noorman, Pieter Agten, Wilfried Daniels, Raoul Str.pdf
|
607.0 KB
|
Secure Outsourced Garbled Circuit Evaluation for Mobile Devices - Henry Carter, Benjamin Mood, Patrick Traynor, Kevin Butler.pdf
|
2.5 MB
|
Secure Outsourced Garbled Circuit Evaluation for Mobile Devices Slides - Henry Carter, Benjamin Mood, Patrick Traynor, Kevin Butler.pdf
|
1.3 MB
|
Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation - Frank Imeson, Ariq Emtenan, Siddharth Garg, and Mah.pdf
|
4.1 MB
|
Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation Slides - Frank Imeson, Ariq Emtenan, Siddharth Garg.pdf
|
3.4 MB
|
Securing Embedded User Interfaces Android and Beyond - Franziska Roesner, Tadayoshi Kohno.pdf
|
2.7 MB
|
Securing Embedded User Interfaces Android and Beyond Slides - Franziska Roesner, Tadayoshi Kohnos.pdf
|
5.3 MB
|
Steal This Movie Automatically Bypassing DRM Protection in Streaming Media Services - Ruoyu Wang, Santa Barbara, Yan Shoshitaishvili, Christopher Kruegel, Giovanni .pdf
|
2.0 MB
|
Steal This Movie Automatically Bypassing DRM Protection in Streaming Media Services Slides - Ruoyu Wang, Santa Barbara, Yan Shoshitaishvili, Christopher Kruegel, Gi.pdf
|
2.2 MB
|
Strato A Retargetable Framework for Low-Level Inlined-Reference Monitors - Bin Zeng, Gang Tan, Ulfar Erlingsson.pdf
|
2.1 MB
|
Strato A Retargetable Framework for Low-Level Inlined-Reference Monitors Slides - Bin Zeng, Gang Tan, Ulfar Erlingsson.pdf
|
2.2 MB
|
Take This Personally Pollution Attacks on Personalized Services - Xinyu Xing, Wei Meng, Dan Doozan, Alex C. Snoeren, Nick Feamster, Wenke Lee.pdf
|
2.9 MB
|
The Velocity of Censorship High-Fidelity Detection of Microblog Post Deletions - Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall.pdf
|
2.3 MB
|
The Velocity of Censorship High-Fidelity Detection of Microblog Post Deletions Slides - Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall.pdf
|
3.6 MB
|
Towards Automatic Software Lineage Inference - Jiyong Jang, Maverick Woo, David Brumley.pdf
|
2.2 MB
|
Trafficking Fraudulent Accounts The Role of the Underground Market in Twitter Spam and Abuse - Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, Vern Paxson.pdf
|
2.2 MB
|
Trafficking Fraudulent Accounts The Role of the Underground Market in Twitter Spam and Abuse Slides - Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, Vern Paxson.pdf
|
2.9 MB
|
Transparent ROP Exploit Mitigation Using Indirect Branch Tracing - Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis.pdf
|
2.6 MB
|
WHYPER Towards Automating Risk Assessment of Mobile Applications - Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, Tao Xie.pdf
|
2.2 MB
|
You Are How You Click Clickstream Analysis for Sybil Detection - Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng, Ben Y. Zhao.pdf
|
2.3 MB
|
You Are How You Click Clickstream Analysis for Sybil Detection Slides - Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng, Ben Y. Zhao.pdf
|
6.2 MB
|
ZMap Fast Internet-wide Scanning and Its Security Applications - Zakir Durumeric, Eric Wustrow, J. Alex Halderman.pdf
|
571.6 KB
|
ZMap Fast Internet-wide Scanning and Its Security Applications Slides - Zakir Durumeric, Eric Wustrow, J. Alex Halderman.pdf
|
621.8 KB
|
ZQL A Compiler for Privacy-Preserving Data Processing - Cedric Fournet, Markulf Kohlweiss, George Danezis.pdf
|
2.1 MB
|
/.../USENIX Security 2013 USENIX_files/
|
acmqueue_150x48_3.png
|
4.5 KB
|
acmqueue_150x48_3_002.png
|
3.1 KB
|
admin_150x60.png
|
4.2 KB
|
admin_150x60_002.png
|
7.0 KB
|
akamai_150x62.png
|
4.7 KB
|
akamai_150x62_002.png
|
2.8 KB
|
all.js
|
3.2 KB
|
analytics.js
|
45.2 KB
|
arbor_networks_150x42.png
|
4.0 KB
|
arbor_networks_150x42_002.png
|
6.1 KB
|
cbgapi.loaded_0
|
144.0 KB
|
cbgapi.loaded_1
|
97.1 KB
|
cmu_cert_150x73.png
|
2.9 KB
|
cmu_cert_150x73_002.png
|
3.9 KB
|
computer_150x33_0.png
|
4.2 KB
|
computer_150x33_0_002.png
|
3.2 KB
|
cset13_banner_mini.png
|
11.7 KB
|
css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css
|
5.6 KB
|
css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css
|
1.5 KB
|
css_SKdvFJ9YoZ2Zlnl17QxUbae5QC-NQDrH8ynBbHJFAaM.css
|
9.2 KB
|
css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css
|
0.1 KB
|
css_XQfCg5kiuU6ACblHn3rDXdgaKZR8AxbhrQR4Gznu5qA.css
|
257.3 KB
|
dcj_150x27_3.png
|
3.2 KB
|
dcj_150x27_3_002.png
|
6.1 KB
|
dmtf_600x240.png
|
4.1 KB
|
dmtf_600x240_002.png
|
2.5 KB
|
evtwote13_banner_mini_0.png
|
11.7 KB
|
facebook_5.png
|
4.8 KB
|
facebook_5_002.png
|
8.6 KB
|
fastbutton.htm
|
1.8 KB
|
fastbutton_002.htm
|
1.7 KB
|
foci13_banner_mini.png
|
12.7 KB
|
fsm_150x86_2.png
|
12.4 KB
|
fsm_150x86_2_002.png
|
7.5 KB
|
google_150x50_3.png
|
8.7 KB
|
google_150x50_3_002.png
|
4.0 KB
|
healthtech13_banner_mini.png
|
13.9 KB
|
hotsec13_banner_mini.png
|
12.3 KB
|
hpcwire_150x55_0.png
|
3.8 KB
|
hpcwire_150x55_0_002.png
|
10.1 KB
|
ibm_research_150x60.png
|
4.1 KB
|
ibm_research_150x60_002.png
|
6.0 KB
|
ie.htm
|
30.2 KB
|
ieee_sp_150x36_4.png
|
8.6 KB
|
ieee_sp_150x36_4_002.png
|
4.5 KB
|
infosecnews_150x38.png
|
3.1 KB
|
infosecnews_150x38_002.png
|
4.9 KB
|
it_dev_150x39.png
|
9.5 KB
|
it_dev_150x39_002.png
|
3.1 KB
|
js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js
|
20.5 KB
|
js_5eZSC3tfzCwTta-_4qxrBau4YdctcIhVqovRK7sPRFo.js
|
107.7 KB
|
js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js
|
1.4 KB
|
js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js
|
120.3 KB
|
js_nPhKWi17GlWfUPto14Dqfk5lpAFMD2XUrRDYY3jnD2c.js
|
23.0 KB
|
js_sWOO4PbSe161nCKWEJProMMhdbu_pfXMDzdRrMGBIE0.js
|
47.6 KB
|
leet13_banner_mini.png
|
13.7 KB
|
linux_journal_150x72_2.png
|
6.6 KB
|
linux_journal_150x72_2_002.png
|
10.3 KB
|
linux_pro_150x60.png
|
2.9 KB
|
linux_pro_150x60_002.png
|
5.0 KB
|
lxer_150x60.png
|
3.7 KB
|
lxer_150x60_002.png
|
6.6 KB
|
microsoft_research_150x42_2.png
|
3.2 KB
|
microsoft_research_150x42_2_002.png
|
2.8 KB
|
nostarch_600x240_1.png
|
3.9 KB
|
nostarch_600x240_1_002.png
|
1.6 KB
|
nsf_90x80_0.png
|
9.8 KB
|
nsf_90x80_0_002.png
|
9.8 KB
|
oreilly_150x28_3.png
|
2.4 KB
|
oreilly_150x28_3_002.png
|
3.8 KB
|
plusone.js
|
49.0 KB
|
postmessageRelay.htm
|
0.7 KB
|
sec13_media.png
|
30.6 KB
|
security_orb_tagline_150x47.png
|
9.0 KB
|
security_orb_tagline_150x47_002.png
|
4.3 KB
|
serverfault_150x35_0.png
|
2.4 KB
|
serverfault_150x35_0_002.png
|
3.4 KB
|
userfriendly_150x60.png
|
3.0 KB
|
userfriendly_150x60_002.png
|
8.4 KB
|
virus_bulletin_150x60.png
|
5.2 KB
|
virus_bulletin_150x60_002.png
|
3.0 KB
|
widgets.js
|
98.5 KB
|
woot13_banner_mini.png
|
14.2 KB
|
/.../USENIX Security 2013 USENIX_files/postmessageRelay_data/
|
829555168-postmessagerelay.js
|
10.0 KB
|
cbgapi.loaded_0
|
54.9 KB
|
rpcshindig_random.js
|
13.0 KB
|
/USENIX Security 2014/
|
A Bayesian Approach to Privacy Enforcement in Smartphones - Omer Tripp, Julia Rubin.mp4
|
8.7 MB
|
A Large-Scale Analysis of the Security of Embedded Firmwares - Andrei Costin, Jonas Zaddach, Aurelien Francillon, and Davide Balzarotti.mp4
|
8.9 MB
|
A Large-Scale Empirical Analysis of Chinese Web Passwords - Zhigong Li, Weili Han, Wenyuan Xu.mp4
|
8.2 MB
|
A Look at Targeted Attacks Through the Lense of an NGO - Stevens Le Blond, Adina Uritesc, Cedric Gilbert, Zheng Leong Chua, Prateek Saxena, Engin Kirda.mp4
|
7.7 MB
|
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens - Daniel Demmler, Thomas Schneider, Michael Zohner.mp4
|
9.9 MB
|
An Internet-Wide View of Internet-Wide Scanning - Zakir Durumeric, Michael Bailey, J. Alex Halderman.mp4
|
8.9 MB
|
ASM A Programmable Interface for Extending Android Security - Stephan Heuser, Adwait Nadkarni, William Enck, Ahmad-Reza Sadeghi.mp4
|
7.8 MB
|
Automatically Detecting Vulnerable Websites Before They Turn Malicious - Kyle Soska Nicolas Christin.mp4
|
8.8 MB
|
BareCloud Bare-metal Analysis-based Evasive Malware Detection - Dhilung Kirat, Giovanni Vigna, Christopher Kruegel.mp4
|
9.0 MB
|
Battling Human Trafficking with Big Data - Rolando R. Lopez.mp4
|
39.6 MB
|
Blanket Execution Dynamic Similarity Testing for Program Binaries and Components - Manuel Egele, Maverick Woo, Peter Chapman, David Brumley.mp4
|
11.8 MB
|
Brahmastra Driving Apps to Test the Security of Third-Party Components - Ravi Bhoraskar, Seungyeop Han, Jinseong Jeon, Tanzirul Azim, Shuo Chen, Jaeyeon Jung, Suman Nath, Rui Wang.mp4
|
8.7 MB
|
Burst ORAM Minimizing ORAM Response Times for Bursty Access Patterns - Jonathan Dautrich, University of California, Riverside - Emil Stefanov, Elaine Shi.mp4
|
10.0 MB
|
BYTEWEIGHT Learning to Recognize Functions in Binary Code - Tiffany Bao, Jonathan Burket, Maverick Woo, Rafael Turner, David Brumley.mp4
|
9.4 MB
|
Cardinal Pill Testing of System Virtual Machines - Hao Shi, Abdulla Alwabel, Jelena Mirkovic.mp4
|
8.7 MB
|
DSCRETE Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse - Brendan Saltaformaggio, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu.mp4
|
9.4 MB
|
Dynamic Hooks Hiding Control Flow Changes within Non-Control Data - Sebastian Vogl, Robert Gawlik, Behrad Garmany, Thomas Kittel, Jonas Pfoh, Claudia Eckert, Thorsten Holz.mp4
|
7.4 MB
|
Effective Attacks and Provable Defenses for Website Fingerprinting - Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, Ian Goldberg.mp4
|
8.9 MB
|
Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM - Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, Ulfar Erlingsson, Luis Lozano, Geoff Pike.mp4
|
8.6 MB
|
Exit from Hell Reducing the Impact of Amplification DDoS Attacks - Marc Kuhrer, Thomas Hupperich, Christian Rossow, Thorsten Holz.mp4
|
7.7 MB
|
Faster Private Set Intersection Based on OT Extension - Benny Pinkas, Thomas Schneider, Michael Zohner.mp4
|
9.7 MB
|
FLUSH-RELOAD A High Resolution, Low Noise, L3 Cache Side-Channel Attack - Yuval Yarom, Katrina Falkner.mp4
|
9.9 MB
|
From the Aether to the Ethernet-Attacking the Internet using Broadcast Digital Television - Yossef Oren, Angelos D. Keromytis.mp4
|
9.9 MB
|
Gyrophone Recognizing Speech from Gyroscope Signals - Yan Michalevsky, Dan Boneh, Gabi Nakibly.mp4
|
9.1 MB
|
How To Live In Paradise Pearls of Wisdom for New and Prospective Faculty - David Evans.mp4
|
15.5 MB
|
Hulk Eliciting Malicious Behavior in Browser Extensions - Alexandros Kapravelos, Chris Grier, Neha Chachra, Christopher Kruegel, Giovanni Vigna, Vern Paxson.mp4
|
9.1 MB
|
Information Security War Room - Sergey Bratus, Dartmouth College, Felix FX Lindner.mp4
|
32.1 MB
|
iSeeYou Disabling the MacBook Webcam Indicator LED - Matthew Brocker, Stephen Checkoway.mp4
|
10.2 MB
|
JIGSAW Protecting Resource Access by Inferring Programmer Expectations - Hayawardh Vijayakumar, Xinyang Ge, Mathias Payer, Trent Jaeger.mp4
|
12.0 MB
|
LibFTE A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes - Daniel Luchaup, Kevin P. Dyer, Somesh Jha, Thomas Ristenpart, Thomas Shrimpton.mp4
|
8.0 MB
|
Man vs. Machine Practical Adversarial Detection of Malicious Crowdsourcing Workers - Gang Wang, Tianyi Wang, Santa Barbara, Haitao Zheng, Ben Y. Zhao.mp4
|
10.0 MB
|
Mimesis Aegis A Mimicry Privacy Shield-A System’s Approach to Data Privacy on Public Cloud - Billy Lau, Simon Chung, Chengyu Song, Yeongjin Jang, Wenke Lee, Alexandra Boldyreva.mp4
|
8.5 MB
|
Never Been KIST Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport - Rob Jansen, John Geddes, Chris Wacek, Micah Sherr, Paul Syverson.mp4
|
9.1 MB
|
On the Effective Prevention of TLS Man-in-the-Middle Attacks in Web Applications - Nikolaos Karapanos, Srdjan Capkun.mp4
|
10.6 MB
|
On the Feasibility of Large-Scale Infections of iOS Devices - Tielei Wang, Yeongjin Jang, Yizheng Chen, Simon Chung, Billy Lau, Wenke Lee.mp4
|
9.0 MB
|
On the Practical Exploitability of Dual EC in TLS Implementations - Stephen Checkoway, Matthew Fredrikson, Ruben Niederhagen, Adam Everspaugh, Matthew Green, Tanja Lange, Thomas Ri.mp4
|
8.1 MB
|
Optimizing Seed Selection for Fuzzing - Alexandre Rebert, Sang Kil Cha, Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, David Brumley.mp4
|
9.1 MB
|
Oxymoron Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing - Michael Backes, Stefan Nurnberger.mp4
|
10.9 MB
|
Panel Discussion - Stuart Schechter.mp4
|
15.0 MB
|
Password Managers Attacks and Defenses - David Silver, Suman Jana, and Dan Boneh, Stanford University - Eric Chen, Collin Jackson.mp4
|
7.9 MB
|
Password Portfolios and the Finite-Effort User Sustainably Managing Large Numbers of Accounts - Dinei Florencio, Cormac Herley, Paul C. van Oorschot.mp4
|
9.6 MB
|
Peeking into Your App without Actually Seeing It UI State Inference and Novel Android Attacks - Qi Alfred Chen, Zhiyun Qian, Z. Morley Mao.mp4
|
11.1 MB
|
Precise Client-side Protection against DOM-based Cross-Site Scripting - Ben Stock, Sebastian Lekies, Tobias Mueller, Patrick Spiegel, and Martin Johns.mp4
|
9.0 MB
|
Preventing Cryptographic Key Leakage in Cloud Virtual Machines - Erman Pattuk, Murat Kantarcioglu, Zhiqiang Lin, Huseyin Ulusoy.mp4
|
9.4 MB
|
Privacy in Pharmacogenetics An End-to-End Case Study of Personalized Warfarin Dosing - Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon Lin, David Page, Thomas Ristenpart.mp4
|
8.5 MB
|
Privee An Architecture for Automatically Analyzing Web Privacy Policies -Sebastian Zimmeck, Steven M. Bellovin.mp4
|
9.2 MB
|
ret2dir Rethinking Kernel Isolation - Vasileios P. Kemerlis, Michalis Polychronakis, Angelos D. Keromytis.mp4
|
9.1 MB
|
Revisiting SSLTLS Implementations New Bleichenbacher Side Channels and Attacks - Christopher Meyer, Juraj Somorovsky, Eugen Weiss, Jorg Schwenk, Sebastian Schinzel, Erik Tews.mp4
|
8.3 MB
|
ROP is Still Dangerous Breaking Modern Defenses - Nicholas Carlini, David Wagner.mp4
|
6.8 MB
|
Scheduler-based Defenses against Cross-VM Side-channels - Venkatanathan Varadarajan, Thomas Ristenpart, Michael Swift.mp4
|
8.7 MB
|
SDDR Light-Weight, Secure Mobile Encounters - Matthew Lentz, Viktor Erdélyi, Paarijaat Aditya, Elaine Shi, Peter Druschel, Bobby Bhattacharjee.mp4
|
7.5 MB
|
Security Analysis of a Full-Body Scanner - Keaton Mowery, Eric Wustrow, Tom Wypych, Corey Singleton, Chris Comfort, Eric Rescorla, Stephen Checkoway, J. Alex Halderman, Hovav Shach.mp4
|
10.9 MB
|
Size Does Matter Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard - Enes Goktas, Elias Athanasopoulos, Michalis Polychronakis, Herbert Bos, Georgios Portokalidis.mp4
|
6.6 MB
|
SpanDex Secure Password Tracking for Android - Landon P. Cox , Peter Gilbert, Geoffrey Lawler, Valentin Pistol, Ali Razeen, Bi Wu, Sai Cheemalapati.mp4
|
9.5 MB
|
SSOScan Automated Testing of Web Applications for Single Sign-On Vulnerabilities - Yuchen Zhou, David Evans.mp4
|
9.5 MB
|
Static Detection of Second-Order Vulnerabilities in Web Applications - Johannes Dahse, Thorsten Holz.mp4
|
10.1 MB
|
Stitching the Gadgets On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection - Lucas Davi, Ahmad-Reza Sadeghi, Daniel Lehmann, Fabian Monrose.mp4
|
7.6 MB
|
Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture - Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza.mp4
|
8.6 MB
|
TapDance End-to-Middle Anticensorship without Flow Blocking - Eric Wustrow, Colleen M. Swanson, J. Alex Halderman.mp4
|
10.5 MB
|
Targeted Threat Index Characterizing and Quantifying Politically-Motivated Targeted Malware - Seth Hardy, Masashi Crete-Nishihata, Katharine Kleemola, Adam Senft, Byron Sonne, Greg.mp4
|
9.1 MB
|
Telepathwords Preventing Weak Passwords by Reading Users’ Minds - Saranga Komanduri, Richard Shay, Lorrie Faith Cranor, Cormac Herley Stuart Schechter.mp4
|
9.3 MB
|
The Emperor’s New Password Manager Security Analysis of Web-based Password Managers - Zhiwei Li, Warren He, Devdatta Akhawe, Dawn Song.mp4
|
9.2 MB
|
The Future of Crypto Getting from Here to Guarantees - Daniel J. Bernstein, Matt Blaze, Tanja Lange.mp4
|
60.8 MB
|
The Long Taile of Typosquatting Domain Names - Janos Szurdi, Balazs Kocso, Gabor Cseh, Jonathan Spring, Mark Felegyhazi, Chris Kanich.mp4
|
7.6 MB
|
Towards Detecting Anomalous User Behavior in Online Social Networks - Bimal Viswanath, M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna P. Gummadi, Max Planck, Balachander Kris.mp4
|
8.6 MB
|
Towards Reliable Storage of 56-bit Secrets in Human Memory - Joseph Bonneau, Stuart Schechter.mp4
|
10.0 MB
|
TRUESET Faster Verifiable et Computations - Ahmed E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Mahmoud F. Sayed, Elaine Shi, Nikos Triandopoulos.mp4
|
8.2 MB
|
Understanding the Dark Side of Domain Parking - Sumayah Alrwais, Kan Yuan, Eihal Alowaisheq, Zhou Li, XiaoFeng Wang.mp4
|
8.1 MB
|
USENIX 2014 Security report.pdf
|
611.6 KB
|
USENIX Security 2014 Full Proceedings errata_slip.pdf
|
63.0 KB
|
USENIX Security 2014 Full Proceedings Interrior.pdf
|
41.1 MB
|
USENIX Security 2014 Full Proceedings.epub
|
21.0 MB
|
USENIX Security 2014 Full Proceedings.mobi
|
23.3 MB
|
USENIX Security 2014 Full Proceedings.pdf
|
41.9 MB
|
USENIX SECURITY 2014 Keynote - Phone Phreaks What We Can Learn From the First Network Hackers - Phil Lapsely.mp4
|
27.1 MB
|
USENIX Security 2014 Lightning Talks.mp4
|
21.6 MB
|
USENIX Security 2014 Opening Remarks - sec14_slides_fu.pdf
|
10.8 MB
|
USENIX Security 2014 Opening Remarks and Awards - Kevin Fu.mp4
|
9.9 MB
|
USENIX Security 2014 Technical Sessions.htm
|
494.7 KB
|
USENIX Security 2014 USENIX.htm
|
84.6 KB
|
When Governments Hack Opponents A Look at Actors and Technology - William R. Marczak, John Scott-Railton, Morgan Marquis-Boire, Vern Paxson.mp4
|
9.2 MB
|
X-Force Force-Executing Binary Programs for Security Applications - Fei Peng, Zhui Deng, Xiangyu Zhang, Dongyan Xu, Zhiqiang Lin, Zhendong Su.mp4
|
9.5 MB
|
XRay Enhancing the Web’s Transparency with Differential Correlation - Mathias Lecuyer, Guillaume Ducoffe, Francis Lan, Andrei Papancea, Theofilos Petsios, Riley Spahn, Augustin Cha.mp4
|
10.5 MB
|
Z0 An Optimizing Distributing Zero-Knowledge Compiler - Matthew Fredrikson, Benjamin Livshits.mp4
|
9.1 MB
|
/.../USENIX Security 2014 captions/
|
A Bayesian Approach to Privacy Enforcement in Smartphones - Omer Tripp, Julia Rubin.eng.json
|
1.0 MB
|
A Bayesian Approach to Privacy Enforcement in Smartphones - Omer Tripp, Julia Rubin.eng.lrc
|
26.8 KB
|
A Bayesian Approach to Privacy Enforcement in Smartphones - Omer Tripp, Julia Rubin.eng.srt
|
26.1 KB
|
A Bayesian Approach to Privacy Enforcement in Smartphones - Omer Tripp, Julia Rubin.eng.text
|
20.7 KB
|
A Bayesian Approach to Privacy Enforcement in Smartphones - Omer Tripp, Julia Rubin.eng.tsv
|
24.1 KB
|
A Bayesian Approach to Privacy Enforcement in Smartphones - Omer Tripp, Julia Rubin.eng.txt
|
27.1 KB
|
A Bayesian Approach to Privacy Enforcement in Smartphones - Omer Tripp, Julia Rubin.eng.vtt
|
24.6 KB
|
A Large-Scale Analysis of the Security of Embedded Firmwares - Andrei Costin, Jonas Zaddach, Aurelien Francillon, and Davide Balzarotti.eng.json
|
837.4 KB
|
A Large-Scale Analysis of the Security of Embedded Firmwares - Andrei Costin, Jonas Zaddach, Aurelien Francillon, and Davide Balzarotti.eng.lrc
|
22.6 KB
|
A Large-Scale Analysis of the Security of Embedded Firmwares - Andrei Costin, Jonas Zaddach, Aurelien Francillon, and Davide Balzarotti.eng.srt
|
21.9 KB
|
A Large-Scale Analysis of the Security of Embedded Firmwares - Andrei Costin, Jonas Zaddach, Aurelien Francillon, and Davide Balzarotti.eng.text
|
17.6 KB
|
A Large-Scale Analysis of the Security of Embedded Firmwares - Andrei Costin, Jonas Zaddach, Aurelien Francillon, and Davide Balzarotti.eng.tsv
|
20.4 KB
|
A Large-Scale Analysis of the Security of Embedded Firmwares - Andrei Costin, Jonas Zaddach, Aurelien Francillon, and Davide Balzarotti.eng.txt
|
22.8 KB
|
A Large-Scale Analysis of the Security of Embedded Firmwares - Andrei Costin, Jonas Zaddach, Aurelien Francillon, and Davide Balzarotti.eng.vtt
|
20.7 KB
|
A Large-Scale Empirical Analysis of Chinese Web Passwords - Zhigong Li, Weili Han, Wenyuan Xu.eng.json
|
672.9 KB
|
A Large-Scale Empirical Analysis of Chinese Web Passwords - Zhigong Li, Weili Han, Wenyuan Xu.eng.lrc
|
17.7 KB
|
A Large-Scale Empirical Analysis of Chinese Web Passwords - Zhigong Li, Weili Han, Wenyuan Xu.eng.srt
|
19.6 KB
|
A Large-Scale Empirical Analysis of Chinese Web Passwords - Zhigong Li, Weili Han, Wenyuan Xu.eng.text
|
12.9 KB
|
A Large-Scale Empirical Analysis of Chinese Web Passwords - Zhigong Li, Weili Han, Wenyuan Xu.eng.tsv
|
15.6 KB
|
A Large-Scale Empirical Analysis of Chinese Web Passwords - Zhigong Li, Weili Han, Wenyuan Xu.eng.txt
|
17.9 KB
|
A Large-Scale Empirical Analysis of Chinese Web Passwords - Zhigong Li, Weili Han, Wenyuan Xu.eng.vtt
|
17.7 KB
|
A Look at Targeted Attacks Through the Lense of an NGO - Stevens Le Blond, Adina Uritesc, Cedric Gilbert, Zheng Leong Chua, Prateek Saxena, Engin Kirda.eng.json
|
663.3 KB
|
A Look at Targeted Attacks Through the Lense of an NGO - Stevens Le Blond, Adina Uritesc, Cedric Gilbert, Zheng Leong Chua, Prateek Saxena, Engin Kirda.eng.lrc
|
16.9 KB
|
A Look at Targeted Attacks Through the Lense of an NGO - Stevens Le Blond, Adina Uritesc, Cedric Gilbert, Zheng Leong Chua, Prateek Saxena, Engin Kirda.eng.srt
|
17.5 KB
|
A Look at Targeted Attacks Through the Lense of an NGO - Stevens Le Blond, Adina Uritesc, Cedric Gilbert, Zheng Leong Chua, Prateek Saxena, Engin Kirda.eng.text
|
13.0 KB
|
A Look at Targeted Attacks Through the Lense of an NGO - Stevens Le Blond, Adina Uritesc, Cedric Gilbert, Zheng Leong Chua, Prateek Saxena, Engin Kirda.eng.tsv
|
15.1 KB
|
A Look at Targeted Attacks Through the Lense of an NGO - Stevens Le Blond, Adina Uritesc, Cedric Gilbert, Zheng Leong Chua, Prateek Saxena, Engin Kirda.eng.txt
|
17.1 KB
|
A Look at Targeted Attacks Through the Lense of an NGO - Stevens Le Blond, Adina Uritesc, Cedric Gilbert, Zheng Leong Chua, Prateek Saxena, Engin Kirda.eng.vtt
|
16.3 KB
|
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens - Daniel Demmler, Thomas Schneider, Michael Zohner.eng.json
|
1.2 MB
|
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens - Daniel Demmler, Thomas Schneider, Michael Zohner.eng.lrc
|
32.2 KB
|
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens - Daniel Demmler, Thomas Schneider, Michael Zohner.eng.srt
|
31.2 KB
|
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens - Daniel Demmler, Thomas Schneider, Michael Zohner.eng.text
|
20.5 KB
|
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens - Daniel Demmler, Thomas Schneider, Michael Zohner.eng.tsv
|
27.1 KB
|
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens - Daniel Demmler, Thomas Schneider, Michael Zohner.eng.txt
|
32.7 KB
|
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens - Daniel Demmler, Thomas Schneider, Michael Zohner.eng.vtt
|
28.2 KB
|
An Internet-Wide View of Internet-Wide Scanning - Zakir Durumeric, Michael Bailey, J. Alex Halderman.eng.json
|
1.4 MB
|
An Internet-Wide View of Internet-Wide Scanning - Zakir Durumeric, Michael Bailey, J. Alex Halderman.eng.lrc
|
41.6 KB
|
An Internet-Wide View of Internet-Wide Scanning - Zakir Durumeric, Michael Bailey, J. Alex Halderman.eng.srt
|
33.5 KB
|
An Internet-Wide View of Internet-Wide Scanning - Zakir Durumeric, Michael Bailey, J. Alex Halderman.eng.text
|
23.7 KB
|
An Internet-Wide View of Internet-Wide Scanning - Zakir Durumeric, Michael Bailey, J. Alex Halderman.eng.tsv
|
33.8 KB
|
An Internet-Wide View of Internet-Wide Scanning - Zakir Durumeric, Michael Bailey, J. Alex Halderman.eng.txt
|
42.3 KB
|
An Internet-Wide View of Internet-Wide Scanning - Zakir Durumeric, Michael Bailey, J. Alex Halderman.eng.vtt
|
30.6 KB
|
ASM A Programmable Interface for Extending Android Security - Stephan Heuser, Adwait Nadkarni, William Enck, Ahmad-Reza Sadeghi.eng.json
|
837.7 KB
|
ASM A Programmable Interface for Extending Android Security - Stephan Heuser, Adwait Nadkarni, William Enck, Ahmad-Reza Sadeghi.eng.lrc
|
25.5 KB
|
ASM A Programmable Interface for Extending Android Security - Stephan Heuser, Adwait Nadkarni, William Enck, Ahmad-Reza Sadeghi.eng.srt
|
20.5 KB
|
ASM A Programmable Interface for Extending Android Security - Stephan Heuser, Adwait Nadkarni, William Enck, Ahmad-Reza Sadeghi.eng.text
|
16.2 KB
|
ASM A Programmable Interface for Extending Android Security - Stephan Heuser, Adwait Nadkarni, William Enck, Ahmad-Reza Sadeghi.eng.tsv
|
21.2 KB
|
ASM A Programmable Interface for Extending Android Security - Stephan Heuser, Adwait Nadkarni, William Enck, Ahmad-Reza Sadeghi.eng.txt
|
25.9 KB
|
ASM A Programmable Interface for Extending Android Security - Stephan Heuser, Adwait Nadkarni, William Enck, Ahmad-Reza Sadeghi.eng.vtt
|
19.3 KB
|
Automatically Detecting Vulnerable Websites Before They Turn Malicious - Kyle Soska Nicolas Christin.eng.json
|
992.2 KB
|
Automatically Detecting Vulnerable Websites Before They Turn Malicious - Kyle Soska Nicolas Christin.eng.lrc
|
28.8 KB
|
Automatically Detecting Vulnerable Websites Before They Turn Malicious - Kyle Soska Nicolas Christin.eng.srt
|
25.6 KB
|
Automatically Detecting Vulnerable Websites Before They Turn Malicious - Kyle Soska Nicolas Christin.eng.text
|
18.0 KB
|
Automatically Detecting Vulnerable Websites Before They Turn Malicious - Kyle Soska Nicolas Christin.eng.tsv
|
23.8 KB
|
Automatically Detecting Vulnerable Websites Before They Turn Malicious - Kyle Soska Nicolas Christin.eng.txt
|
29.2 KB
|
Automatically Detecting Vulnerable Websites Before They Turn Malicious - Kyle Soska Nicolas Christin.eng.vtt
|
23.4 KB
|
BareCloud Bare-metal Analysis-based Evasive Malware Detection - Dhilung Kirat, Giovanni Vigna, Christopher Kruegel.eng.json
|
1.0 MB
|
BareCloud Bare-metal Analysis-based Evasive Malware Detection - Dhilung Kirat, Giovanni Vigna, Christopher Kruegel.eng.lrc
|
29.9 KB
|
BareCloud Bare-metal Analysis-based Evasive Malware Detection - Dhilung Kirat, Giovanni Vigna, Christopher Kruegel.eng.srt
|
24.9 KB
|
BareCloud Bare-metal Analysis-based Evasive Malware Detection - Dhilung Kirat, Giovanni Vigna, Christopher Kruegel.eng.text
|
18.5 KB
|
BareCloud Bare-metal Analysis-based Evasive Malware Detection - Dhilung Kirat, Giovanni Vigna, Christopher Kruegel.eng.tsv
|
24.9 KB
|
BareCloud Bare-metal Analysis-based Evasive Malware Detection - Dhilung Kirat, Giovanni Vigna, Christopher Kruegel.eng.txt
|
30.4 KB
|
BareCloud Bare-metal Analysis-based Evasive Malware Detection - Dhilung Kirat, Giovanni Vigna, Christopher Kruegel.eng.vtt
|
23.0 KB
|
Battling Human Trafficking with Big Data - Rolando R. Lopez.eng.json
|
5.1 MB
|
Battling Human Trafficking with Big Data - Rolando R. Lopez.eng.lrc
|
142.3 KB
|
Battling Human Trafficking with Big Data - Rolando R. Lopez.eng.srt
|
127.7 KB
|
Battling Human Trafficking with Big Data - Rolando R. Lopez.eng.text
|
88.1 KB
|
Battling Human Trafficking with Big Data - Rolando R. Lopez.eng.tsv
|
117.9 KB
|
Battling Human Trafficking with Big Data - Rolando R. Lopez.eng.txt
|
144.2 KB
|
Battling Human Trafficking with Big Data - Rolando R. Lopez.eng.vtt
|
117.9 KB
|
Blanket Execution Dynamic Similarity Testing for Program Binaries and Components - Manuel Egele, Maverick Woo, Peter Chapman, David Brumley.eng.json
|
1.3 MB
|
Blanket Execution Dynamic Similarity Testing for Program Binaries and Components - Manuel Egele, Maverick Woo, Peter Chapman, David Brumley.eng.lrc
|
34.1 KB
|
Blanket Execution Dynamic Similarity Testing for Program Binaries and Components - Manuel Egele, Maverick Woo, Peter Chapman, David Brumley.eng.srt
|
33.1 KB
|
Blanket Execution Dynamic Similarity Testing for Program Binaries and Components - Manuel Egele, Maverick Woo, Peter Chapman, David Brumley.eng.text
|
26.3 KB
|
Blanket Execution Dynamic Similarity Testing for Program Binaries and Components - Manuel Egele, Maverick Woo, Peter Chapman, David Brumley.eng.tsv
|
30.7 KB
|
Blanket Execution Dynamic Similarity Testing for Program Binaries and Components - Manuel Egele, Maverick Woo, Peter Chapman, David Brumley.eng.txt
|
34.4 KB
|
Blanket Execution Dynamic Similarity Testing for Program Binaries and Components - Manuel Egele, Maverick Woo, Peter Chapman, David Brumley.eng.vtt
|
31.2 KB
|
Brahmastra Driving Apps to Test the Security of Third-Party Components - Ravi Bhoraskar, Seungyeop Han, Jinseong Jeon, Tanzirul Azim, Shuo Chen, Jaeyeon Jung, Suman Nath, Rui Wang.eng.json
|
913.7 KB
|
Brahmastra Driving Apps to Test the Security of Third-Party Components - Ravi Bhoraskar, Seungyeop Han, Jinseong Jeon, Tanzirul Azim, Shuo Chen, Jaeyeon Jung, Suman Nath, Rui Wang.eng.lrc
|
25.4 KB
|
Brahmastra Driving Apps to Test the Security of Third-Party Components - Ravi Bhoraskar, Seungyeop Han, Jinseong Jeon, Tanzirul Azim, Shuo Chen, Jaeyeon Jung, Suman Nath, Rui Wang.eng.srt
|
21.1 KB
|
Brahmastra Driving Apps to Test the Security of Third-Party Components - Ravi Bhoraskar, Seungyeop Han, Jinseong Jeon, Tanzirul Azim, Shuo Chen, Jaeyeon Jung, Suman Nath, Rui Wang.eng.text
|
15.3 KB
|
Brahmastra Driving Apps to Test the Security of Third-Party Components - Ravi Bhoraskar, Seungyeop Han, Jinseong Jeon, Tanzirul Azim, Shuo Chen, Jaeyeon Jung, Suman Nath, Rui Wang.eng.tsv
|
20.9 KB
|
Brahmastra Driving Apps to Test the Security of Third-Party Components - Ravi Bhoraskar, Seungyeop Han, Jinseong Jeon, Tanzirul Azim, Shuo Chen, Jaeyeon Jung, Suman Nath, Rui Wang.eng.txt
|
25.7 KB
|
Brahmastra Driving Apps to Test the Security of Third-Party Components - Ravi Bhoraskar, Seungyeop Han, Jinseong Jeon, Tanzirul Azim, Shuo Chen, Jaeyeon Jung, Suman Nath, Rui Wang.eng.vtt
|
19.4 KB
|
Burst ORAM Minimizing ORAM Response Times for Bursty Access Patterns - Jonathan Dautrich, University of California, Riverside - Emil Stefanov, Elaine Shi.eng.json
|
1.1 MB
|
Burst ORAM Minimizing ORAM Response Times for Bursty Access Patterns - Jonathan Dautrich, University of California, Riverside - Emil Stefanov, Elaine Shi.eng.lrc
|
30.4 KB
|
Burst ORAM Minimizing ORAM Response Times for Bursty Access Patterns - Jonathan Dautrich, University of California, Riverside - Emil Stefanov, Elaine Shi.eng.srt
|
26.9 KB
|
Burst ORAM Minimizing ORAM Response Times for Bursty Access Patterns - Jonathan Dautrich, University of California, Riverside - Emil Stefanov, Elaine Shi.eng.text
|
20.4 KB
|
Burst ORAM Minimizing ORAM Response Times for Bursty Access Patterns - Jonathan Dautrich, University of California, Riverside - Emil Stefanov, Elaine Shi.eng.tsv
|
26.0 KB
|
Burst ORAM Minimizing ORAM Response Times for Bursty Access Patterns - Jonathan Dautrich, University of California, Riverside - Emil Stefanov, Elaine Shi.eng.txt
|
30.8 KB
|
Burst ORAM Minimizing ORAM Response Times for Bursty Access Patterns - Jonathan Dautrich, University of California, Riverside - Emil Stefanov, Elaine Shi.eng.vtt
|
25.1 KB
|
BYTEWEIGHT Learning to Recognize Functions in Binary Code - Tiffany Bao, Jonathan Burket, Maverick Woo, Rafael Turner, David Brumley.eng.json
|
856.3 KB
|
BYTEWEIGHT Learning to Recognize Functions in Binary Code - Tiffany Bao, Jonathan Burket, Maverick Woo, Rafael Turner, David Brumley.eng.lrc
|
25.1 KB
|
BYTEWEIGHT Learning to Recognize Functions in Binary Code - Tiffany Bao, Jonathan Burket, Maverick Woo, Rafael Turner, David Brumley.eng.srt
|
22.3 KB
|
BYTEWEIGHT Learning to Recognize Functions in Binary Code - Tiffany Bao, Jonathan Burket, Maverick Woo, Rafael Turner, David Brumley.eng.text
|
15.3 KB
|
BYTEWEIGHT Learning to Recognize Functions in Binary Code - Tiffany Bao, Jonathan Burket, Maverick Woo, Rafael Turner, David Brumley.eng.tsv
|
20.7 KB
|
BYTEWEIGHT Learning to Recognize Functions in Binary Code - Tiffany Bao, Jonathan Burket, Maverick Woo, Rafael Turner, David Brumley.eng.txt
|
25.5 KB
|
BYTEWEIGHT Learning to Recognize Functions in Binary Code - Tiffany Bao, Jonathan Burket, Maverick Woo, Rafael Turner, David Brumley.eng.vtt
|
20.3 KB
|
Cardinal Pill Testing of System Virtual Machines - Hao Shi, Abdulla Alwabel, Jelena Mirkovic.eng.json
|
707.7 KB
|
Cardinal Pill Testing of System Virtual Machines - Hao Shi, Abdulla Alwabel, Jelena Mirkovic.eng.lrc
|
19.5 KB
|
Cardinal Pill Testing of System Virtual Machines - Hao Shi, Abdulla Alwabel, Jelena Mirkovic.eng.srt
|
19.5 KB
|
Cardinal Pill Testing of System Virtual Machines - Hao Shi, Abdulla Alwabel, Jelena Mirkovic.eng.text
|
13.3 KB
|
Cardinal Pill Testing of System Virtual Machines - Hao Shi, Abdulla Alwabel, Jelena Mirkovic.eng.tsv
|
16.7 KB
|
Cardinal Pill Testing of System Virtual Machines - Hao Shi, Abdulla Alwabel, Jelena Mirkovic.eng.txt
|
19.8 KB
|
Cardinal Pill Testing of System Virtual Machines - Hao Shi, Abdulla Alwabel, Jelena Mirkovic.eng.vtt
|
17.8 KB
|
DSCRETE Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse - Brendan Saltaformaggio, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu.eng.json
|
843.1 KB
|
DSCRETE Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse - Brendan Saltaformaggio, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu.eng.lrc
|
22.4 KB
|
DSCRETE Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse - Brendan Saltaformaggio, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu.eng.srt
|
23.2 KB
|
DSCRETE Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse - Brendan Saltaformaggio, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu.eng.text
|
17.2 KB
|
DSCRETE Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse - Brendan Saltaformaggio, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu.eng.tsv
|
20.1 KB
|
DSCRETE Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse - Brendan Saltaformaggio, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu.eng.txt
|
22.6 KB
|
DSCRETE Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse - Brendan Saltaformaggio, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu.eng.vtt
|
21.5 KB
|
Dynamic Hooks Hiding Control Flow Changes within Non-Control Data - Sebastian Vogl, Robert Gawlik, Behrad Garmany, Thomas Kittel, Jonas Pfoh, Claudia Eckert, Thorsten Holz.eng.json
|
938.6 KB
|
Dynamic Hooks Hiding Control Flow Changes within Non-Control Data - Sebastian Vogl, Robert Gawlik, Behrad Garmany, Thomas Kittel, Jonas Pfoh, Claudia Eckert, Thorsten Holz.eng.lrc
|
25.7 KB
|
Dynamic Hooks Hiding Control Flow Changes within Non-Control Data - Sebastian Vogl, Robert Gawlik, Behrad Garmany, Thomas Kittel, Jonas Pfoh, Claudia Eckert, Thorsten Holz.eng.srt
|
23.7 KB
|
Dynamic Hooks Hiding Control Flow Changes within Non-Control Data - Sebastian Vogl, Robert Gawlik, Behrad Garmany, Thomas Kittel, Jonas Pfoh, Claudia Eckert, Thorsten Holz.eng.text
|
18.4 KB
|
Dynamic Hooks Hiding Control Flow Changes within Non-Control Data - Sebastian Vogl, Robert Gawlik, Behrad Garmany, Thomas Kittel, Jonas Pfoh, Claudia Eckert, Thorsten Holz.eng.tsv
|
22.4 KB
|
Dynamic Hooks Hiding Control Flow Changes within Non-Control Data - Sebastian Vogl, Robert Gawlik, Behrad Garmany, Thomas Kittel, Jonas Pfoh, Claudia Eckert, Thorsten Holz.eng.txt
|
26.0 KB
|
Dynamic Hooks Hiding Control Flow Changes within Non-Control Data - Sebastian Vogl, Robert Gawlik, Behrad Garmany, Thomas Kittel, Jonas Pfoh, Claudia Eckert, Thorsten Holz.eng.vtt
|
22.2 KB
|
Effective Attacks and Provable Defenses for Website Fingerprinting - Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, Ian Goldberg.eng.json
|
1.1 MB
|
Effective Attacks and Provable Defenses for Website Fingerprinting - Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, Ian Goldberg.eng.lrc
|
30.3 KB
|
Effective Attacks and Provable Defenses for Website Fingerprinting - Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, Ian Goldberg.eng.srt
|
29.3 KB
|
Effective Attacks and Provable Defenses for Website Fingerprinting - Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, Ian Goldberg.eng.text
|
21.3 KB
|
Effective Attacks and Provable Defenses for Website Fingerprinting - Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, Ian Goldberg.eng.tsv
|
26.2 KB
|
Effective Attacks and Provable Defenses for Website Fingerprinting - Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, Ian Goldberg.eng.txt
|
30.7 KB
|
Effective Attacks and Provable Defenses for Website Fingerprinting - Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, Ian Goldberg.eng.vtt
|
27.1 KB
|
Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM - Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, Ulfar Erlingsson, Luis Lozano, Geoff Pike.eng.json
|
1.1 MB
|
Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM - Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, Ulfar Erlingsson, Luis Lozano, Geoff Pike.eng.lrc
|
28.6 KB
|
Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM - Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, Ulfar Erlingsson, Luis Lozano, Geoff Pike.eng.srt
|
28.4 KB
|
Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM - Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, Ulfar Erlingsson, Luis Lozano, Geoff Pike.eng.text
|
22.0 KB
|
Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM - Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, Ulfar Erlingsson, Luis Lozano, Geoff Pike.eng.tsv
|
25.6 KB
|
Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM - Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, Ulfar Erlingsson, Luis Lozano, Geoff Pike.eng.txt
|
28.8 KB
|
Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM - Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, Ulfar Erlingsson, Luis Lozano, Geoff Pike.eng.vtt
|
26.6 KB
|
Exit from Hell Reducing the Impact of Amplification DDoS Attacks - Marc Kuhrer, Thomas Hupperich, Christian Rossow, Thorsten Holz.eng.json
|
953.9 KB
|
Exit from Hell Reducing the Impact of Amplification DDoS Attacks - Marc Kuhrer, Thomas Hupperich, Christian Rossow, Thorsten Holz.eng.lrc
|
25.3 KB
|
Exit from Hell Reducing the Impact of Amplification DDoS Attacks - Marc Kuhrer, Thomas Hupperich, Christian Rossow, Thorsten Holz.eng.srt
|
23.6 KB
|
Exit from Hell Reducing the Impact of Amplification DDoS Attacks - Marc Kuhrer, Thomas Hupperich, Christian Rossow, Thorsten Holz.eng.text
|
18.3 KB
|
Exit from Hell Reducing the Impact of Amplification DDoS Attacks - Marc Kuhrer, Thomas Hupperich, Christian Rossow, Thorsten Holz.eng.tsv
|
22.1 KB
|
Exit from Hell Reducing the Impact of Amplification DDoS Attacks - Marc Kuhrer, Thomas Hupperich, Christian Rossow, Thorsten Holz.eng.txt
|
25.5 KB
|
Exit from Hell Reducing the Impact of Amplification DDoS Attacks - Marc Kuhrer, Thomas Hupperich, Christian Rossow, Thorsten Holz.eng.vtt
|
22.2 KB
|
Faster Private Set Intersection Based on OT Extension - Benny Pinkas, Thomas Schneider, Michael Zohner.eng.json
|
941.9 KB
|
Faster Private Set Intersection Based on OT Extension - Benny Pinkas, Thomas Schneider, Michael Zohner.eng.lrc
|
24.6 KB
|
Faster Private Set Intersection Based on OT Extension - Benny Pinkas, Thomas Schneider, Michael Zohner.eng.srt
|
23.5 KB
|
Faster Private Set Intersection Based on OT Extension - Benny Pinkas, Thomas Schneider, Michael Zohner.eng.text
|
18.0 KB
|
Faster Private Set Intersection Based on OT Extension - Benny Pinkas, Thomas Schneider, Michael Zohner.eng.tsv
|
21.6 KB
|
Faster Private Set Intersection Based on OT Extension - Benny Pinkas, Thomas Schneider, Michael Zohner.eng.txt
|
24.8 KB
|
Faster Private Set Intersection Based on OT Extension - Benny Pinkas, Thomas Schneider, Michael Zohner.eng.vtt
|
22.0 KB
|
FLUSH-RELOAD A High Resolution, Low Noise, L3 Cache Side-Channel Attack - Yuval Yarom, Katrina Falkner.eng.json
|
945.1 KB
|
FLUSH-RELOAD A High Resolution, Low Noise, L3 Cache Side-Channel Attack - Yuval Yarom, Katrina Falkner.eng.lrc
|
24.3 KB
|
FLUSH-RELOAD A High Resolution, Low Noise, L3 Cache Side-Channel Attack - Yuval Yarom, Katrina Falkner.eng.srt
|
26.3 KB
|
FLUSH-RELOAD A High Resolution, Low Noise, L3 Cache Side-Channel Attack - Yuval Yarom, Katrina Falkner.eng.text
|
16.6 KB
|
FLUSH-RELOAD A High Resolution, Low Noise, L3 Cache Side-Channel Attack - Yuval Yarom, Katrina Falkner.eng.tsv
|
20.8 KB
|
FLUSH-RELOAD A High Resolution, Low Noise, L3 Cache Side-Channel Attack - Yuval Yarom, Katrina Falkner.eng.txt
|
24.6 KB
|
FLUSH-RELOAD A High Resolution, Low Noise, L3 Cache Side-Channel Attack - Yuval Yarom, Katrina Falkner.eng.vtt
|
23.6 KB
|
From the Aether to the Ethernet-Attacking the Internet using Broadcast Digital Television - Yossef Oren, Angelos D. Keromytis.eng.json
|
1.2 MB
|
From the Aether to the Ethernet-Attacking the Internet using Broadcast Digital Television - Yossef Oren, Angelos D. Keromytis.eng.lrc
|
30.7 KB
|
From the Aether to the Ethernet-Attacking the Internet using Broadcast Digital Television - Yossef Oren, Angelos D. Keromytis.eng.srt
|
33.0 KB
|
From the Aether to the Ethernet-Attacking the Internet using Broadcast Digital Television - Yossef Oren, Angelos D. Keromytis.eng.text
|
20.6 KB
|
From the Aether to the Ethernet-Attacking the Internet using Broadcast Digital Television - Yossef Oren, Angelos D. Keromytis.eng.tsv
|
26.2 KB
|
From the Aether to the Ethernet-Attacking the Internet using Broadcast Digital Television - Yossef Oren, Angelos D. Keromytis.eng.txt
|
31.1 KB
|
From the Aether to the Ethernet-Attacking the Internet using Broadcast Digital Television - Yossef Oren, Angelos D. Keromytis.eng.vtt
|
29.5 KB
|
Gyrophone Recognizing Speech from Gyroscope Signals - Yan Michalevsky, Dan Boneh, Gabi Nakibly.eng.json
|
996.5 KB
|
Gyrophone Recognizing Speech from Gyroscope Signals - Yan Michalevsky, Dan Boneh, Gabi Nakibly.eng.lrc
|
30.2 KB
|
Gyrophone Recognizing Speech from Gyroscope Signals - Yan Michalevsky, Dan Boneh, Gabi Nakibly.eng.srt
|
25.4 KB
|
Gyrophone Recognizing Speech from Gyroscope Signals - Yan Michalevsky, Dan Boneh, Gabi Nakibly.eng.text
|
18.2 KB
|
Gyrophone Recognizing Speech from Gyroscope Signals - Yan Michalevsky, Dan Boneh, Gabi Nakibly.eng.tsv
|
24.9 KB
|
Gyrophone Recognizing Speech from Gyroscope Signals - Yan Michalevsky, Dan Boneh, Gabi Nakibly.eng.txt
|
30.6 KB
|
Gyrophone Recognizing Speech from Gyroscope Signals - Yan Michalevsky, Dan Boneh, Gabi Nakibly.eng.vtt
|
23.4 KB
|
How To Live In Paradise Pearls of Wisdom for New and Prospective Faculty - David Evans.eng.json
|
1.6 MB
|
How To Live In Paradise Pearls of Wisdom for New and Prospective Faculty - David Evans.eng.lrc
|
43.0 KB
|
How To Live In Paradise Pearls of Wisdom for New and Prospective Faculty - David Evans.eng.srt
|
41.1 KB
|
How To Live In Paradise Pearls of Wisdom for New and Prospective Faculty - David Evans.eng.text
|
30.3 KB
|
How To Live In Paradise Pearls of Wisdom for New and Prospective Faculty - David Evans.eng.tsv
|
37.6 KB
|
How To Live In Paradise Pearls of Wisdom for New and Prospective Faculty - David Evans.eng.txt
|
43.5 KB
|
How To Live In Paradise Pearls of Wisdom for New and Prospective Faculty - David Evans.eng.vtt
|
38.0 KB
|
Hulk Eliciting Malicious Behavior in Browser Extensions - Alexandros Kapravelos, Chris Grier, Neha Chachra, Christopher Kruegel, Giovanni Vigna, Vern Paxson.eng.json
|
951.0 KB
|
Hulk Eliciting Malicious Behavior in Browser Extensions - Alexandros Kapravelos, Chris Grier, Neha Chachra, Christopher Kruegel, Giovanni Vigna, Vern Paxson.eng.lrc
|
25.3 KB
|
Hulk Eliciting Malicious Behavior in Browser Extensions - Alexandros Kapravelos, Chris Grier, Neha Chachra, Christopher Kruegel, Giovanni Vigna, Vern Paxson.eng.srt
|
27.0 KB
|
Hulk Eliciting Malicious Behavior in Browser Extensions - Alexandros Kapravelos, Chris Grier, Neha Chachra, Christopher Kruegel, Giovanni Vigna, Vern Paxson.eng.text
|
18.5 KB
|
Hulk Eliciting Malicious Behavior in Browser Extensions - Alexandros Kapravelos, Chris Grier, Neha Chachra, Christopher Kruegel, Giovanni Vigna, Vern Paxson.eng.tsv
|
22.2 KB
|
Hulk Eliciting Malicious Behavior in Browser Extensions - Alexandros Kapravelos, Chris Grier, Neha Chachra, Christopher Kruegel, Giovanni Vigna, Vern Paxson.eng.txt
|
25.5 KB
|
Hulk Eliciting Malicious Behavior in Browser Extensions - Alexandros Kapravelos, Chris Grier, Neha Chachra, Christopher Kruegel, Giovanni Vigna, Vern Paxson.eng.vtt
|
24.6 KB
|
Information Security War Room - Sergey Bratus, Dartmouth College, Felix FX Lindner.eng.json
|
3.3 MB
|
Information Security War Room - Sergey Bratus, Dartmouth College, Felix FX Lindner.eng.lrc
|
96.5 KB
|
Information Security War Room - Sergey Bratus, Dartmouth College, Felix FX Lindner.eng.srt
|
81.8 KB
|
Information Security War Room - Sergey Bratus, Dartmouth College, Felix FX Lindner.eng.text
|
57.4 KB
|
Information Security War Room - Sergey Bratus, Dartmouth College, Felix FX Lindner.eng.tsv
|
79.7 KB
|
Information Security War Room - Sergey Bratus, Dartmouth College, Felix FX Lindner.eng.txt
|
97.9 KB
|
Information Security War Room - Sergey Bratus, Dartmouth College, Felix FX Lindner.eng.vtt
|
75.6 KB
|
iSeeYou Disabling the MacBook Webcam Indicator LED - Matthew Brocker, Stephen Checkoway.eng.json
|
1.1 MB
|
iSeeYou Disabling the MacBook Webcam Indicator LED - Matthew Brocker, Stephen Checkoway.eng.lrc
|
28.2 KB
|
iSeeYou Disabling the MacBook Webcam Indicator LED - Matthew Brocker, Stephen Checkoway.eng.srt
|
30.0 KB
|
iSeeYou Disabling the MacBook Webcam Indicator LED - Matthew Brocker, Stephen Checkoway.eng.text
|
21.0 KB
|
iSeeYou Disabling the MacBook Webcam Indicator LED - Matthew Brocker, Stephen Checkoway.eng.tsv
|
25.0 KB
|
iSeeYou Disabling the MacBook Webcam Indicator LED - Matthew Brocker, Stephen Checkoway.eng.txt
|
28.5 KB
|
iSeeYou Disabling the MacBook Webcam Indicator LED - Matthew Brocker, Stephen Checkoway.eng.vtt
|
27.5 KB
|
JIGSAW Protecting Resource Access by Inferring Programmer Expectations - Hayawardh Vijayakumar, Xinyang Ge, Mathias Payer, Trent Jaeger.eng.json
|
843.5 KB
|
JIGSAW Protecting Resource Access by Inferring Programmer Expectations - Hayawardh Vijayakumar, Xinyang Ge, Mathias Payer, Trent Jaeger.eng.lrc
|
22.0 KB
|
JIGSAW Protecting Resource Access by Inferring Programmer Expectations - Hayawardh Vijayakumar, Xinyang Ge, Mathias Payer, Trent Jaeger.eng.srt
|
23.3 KB
|
JIGSAW Protecting Resource Access by Inferring Programmer Expectations - Hayawardh Vijayakumar, Xinyang Ge, Mathias Payer, Trent Jaeger.eng.text
|
16.8 KB
|
JIGSAW Protecting Resource Access by Inferring Programmer Expectations - Hayawardh Vijayakumar, Xinyang Ge, Mathias Payer, Trent Jaeger.eng.tsv
|
19.7 KB
|
JIGSAW Protecting Resource Access by Inferring Programmer Expectations - Hayawardh Vijayakumar, Xinyang Ge, Mathias Payer, Trent Jaeger.eng.txt
|
22.2 KB
|
JIGSAW Protecting Resource Access by Inferring Programmer Expectations - Hayawardh Vijayakumar, Xinyang Ge, Mathias Payer, Trent Jaeger.eng.vtt
|
21.5 KB
|
LibFTE A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes - Daniel Luchaup, Kevin P. Dyer, Somesh Jha, Thomas Ristenpart, Thomas Shrimpton.eng.json
|
778.0 KB
|
LibFTE A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes - Daniel Luchaup, Kevin P. Dyer, Somesh Jha, Thomas Ristenpart, Thomas Shrimpton.eng.lrc
|
21.7 KB
|
LibFTE A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes - Daniel Luchaup, Kevin P. Dyer, Somesh Jha, Thomas Ristenpart, Thomas Shrimpton.eng.srt
|
21.4 KB
|
LibFTE A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes - Daniel Luchaup, Kevin P. Dyer, Somesh Jha, Thomas Ristenpart, Thomas Shrimpton.eng.text
|
15.9 KB
|
LibFTE A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes - Daniel Luchaup, Kevin P. Dyer, Somesh Jha, Thomas Ristenpart, Thomas Shrimpton.eng.tsv
|
19.1 KB
|
LibFTE A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes - Daniel Luchaup, Kevin P. Dyer, Somesh Jha, Thomas Ristenpart, Thomas Shrimpton.eng.txt
|
21.9 KB
|
LibFTE A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes - Daniel Luchaup, Kevin P. Dyer, Somesh Jha, Thomas Ristenpart, Thomas Shrimpton.eng.vtt
|
19.9 KB
|
Man vs. Machine Practical Adversarial Detection of Malicious Crowdsourcing Workers - Gang Wang, Tianyi Wang, Santa Barbara, Haitao Zheng, Ben Y. Zhao.eng.json
|
826.6 KB
|
Man vs. Machine Practical Adversarial Detection of Malicious Crowdsourcing Workers - Gang Wang, Tianyi Wang, Santa Barbara, Haitao Zheng, Ben Y. Zhao.eng.lrc
|
22.2 KB
|
Man vs. Machine Practical Adversarial Detection of Malicious Crowdsourcing Workers - Gang Wang, Tianyi Wang, Santa Barbara, Haitao Zheng, Ben Y. Zhao.eng.srt
|
23.5 KB
|
Man vs. Machine Practical Adversarial Detection of Malicious Crowdsourcing Workers - Gang Wang, Tianyi Wang, Santa Barbara, Haitao Zheng, Ben Y. Zhao.eng.text
|
17.3 KB
|
Man vs. Machine Practical Adversarial Detection of Malicious Crowdsourcing Workers - Gang Wang, Tianyi Wang, Santa Barbara, Haitao Zheng, Ben Y. Zhao.eng.tsv
|
20.0 KB
|
Man vs. Machine Practical Adversarial Detection of Malicious Crowdsourcing Workers - Gang Wang, Tianyi Wang, Santa Barbara, Haitao Zheng, Ben Y. Zhao.eng.txt
|
22.4 KB
|
Man vs. Machine Practical Adversarial Detection of Malicious Crowdsourcing Workers - Gang Wang, Tianyi Wang, Santa Barbara, Haitao Zheng, Ben Y. Zhao.eng.vtt
|
21.8 KB
|
Mimesis Aegis A Mimicry Privacy Shield-A System’s Approach to Data Privacy on Public Cloud - Billy Lau, Simon Chung, Chengyu Song, Yeongjin Jang, Wenke Lee, Alexandra Boldyreva.eng.json
|
896.6 KB
|
Mimesis Aegis A Mimicry Privacy Shield-A System’s Approach to Data Privacy on Public Cloud - Billy Lau, Simon Chung, Chengyu Song, Yeongjin Jang, Wenke Lee, Alexandra Boldyreva.eng.lrc
|
23.3 KB
|
Mimesis Aegis A Mimicry Privacy Shield-A System’s Approach to Data Privacy on Public Cloud - Billy Lau, Simon Chung, Chengyu Song, Yeongjin Jang, Wenke Lee, Alexandra Boldyreva.eng.srt
|
25.5 KB
|
Mimesis Aegis A Mimicry Privacy Shield-A System’s Approach to Data Privacy on Public Cloud - Billy Lau, Simon Chung, Chengyu Song, Yeongjin Jang, Wenke Lee, Alexandra Boldyreva.eng.text
|
17.4 KB
|
Mimesis Aegis A Mimicry Privacy Shield-A System’s Approach to Data Privacy on Public Cloud - Billy Lau, Simon Chung, Chengyu Song, Yeongjin Jang, Wenke Lee, Alexandra Boldyreva.eng.tsv
|
20.7 KB
|
Mimesis Aegis A Mimicry Privacy Shield-A System’s Approach to Data Privacy on Public Cloud - Billy Lau, Simon Chung, Chengyu Song, Yeongjin Jang, Wenke Lee, Alexandra Boldyreva.eng.txt
|
23.5 KB
|
Mimesis Aegis A Mimicry Privacy Shield-A System’s Approach to Data Privacy on Public Cloud - Billy Lau, Simon Chung, Chengyu Song, Yeongjin Jang, Wenke Lee, Alexandra Boldyreva.eng.vtt
|
23.3 KB
|
Never Been KIST Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport - Rob Jansen, John Geddes, Chris Wacek, Micah Sherr, Paul Syverson.eng.json
|
1.1 MB
|
Never Been KIST Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport - Rob Jansen, John Geddes, Chris Wacek, Micah Sherr, Paul Syverson.eng.lrc
|
31.0 KB
|
Never Been KIST Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport - Rob Jansen, John Geddes, Chris Wacek, Micah Sherr, Paul Syverson.eng.srt
|
27.8 KB
|
Never Been KIST Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport - Rob Jansen, John Geddes, Chris Wacek, Micah Sherr, Paul Syverson.eng.text
|
20.0 KB
|
Never Been KIST Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport - Rob Jansen, John Geddes, Chris Wacek, Micah Sherr, Paul Syverson.eng.tsv
|
26.1 KB
|
Never Been KIST Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport - Rob Jansen, John Geddes, Chris Wacek, Micah Sherr, Paul Syverson.eng.txt
|
31.4 KB
|
Never Been KIST Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport - Rob Jansen, John Geddes, Chris Wacek, Micah Sherr, Paul Syverson.eng.vtt
|
25.6 KB
|
On the Effective Prevention of TLS Man-in-the-Middle Attacks in Web Applications - Nikolaos Karapanos, Srdjan Capkun.eng.json
|
944.5 KB
|
On the Effective Prevention of TLS Man-in-the-Middle Attacks in Web Applications - Nikolaos Karapanos, Srdjan Capkun.eng.lrc
|
25.8 KB
|
On the Effective Prevention of TLS Man-in-the-Middle Attacks in Web Applications - Nikolaos Karapanos, Srdjan Capkun.eng.srt
|
24.2 KB
|
On the Effective Prevention of TLS Man-in-the-Middle Attacks in Web Applications - Nikolaos Karapanos, Srdjan Capkun.eng.text
|
18.8 KB
|
On the Effective Prevention of TLS Man-in-the-Middle Attacks in Web Applications - Nikolaos Karapanos, Srdjan Capkun.eng.tsv
|
22.7 KB
|
On the Effective Prevention of TLS Man-in-the-Middle Attacks in Web Applications - Nikolaos Karapanos, Srdjan Capkun.eng.txt
|
26.1 KB
|
On the Effective Prevention of TLS Man-in-the-Middle Attacks in Web Applications - Nikolaos Karapanos, Srdjan Capkun.eng.vtt
|
22.7 KB
|
On the Feasibility of Large-Scale Infections of iOS Devices - Tielei Wang, Yeongjin Jang, Yizheng Chen, Simon Chung, Billy Lau, Wenke Lee.eng.json
|
844.8 KB
|
On the Feasibility of Large-Scale Infections of iOS Devices - Tielei Wang, Yeongjin Jang, Yizheng Chen, Simon Chung, Billy Lau, Wenke Lee.eng.lrc
|
22.0 KB
|
On the Feasibility of Large-Scale Infections of iOS Devices - Tielei Wang, Yeongjin Jang, Yizheng Chen, Simon Chung, Billy Lau, Wenke Lee.eng.srt
|
23.8 KB
|
On the Feasibility of Large-Scale Infections of iOS Devices - Tielei Wang, Yeongjin Jang, Yizheng Chen, Simon Chung, Billy Lau, Wenke Lee.eng.text
|
16.5 KB
|
On the Feasibility of Large-Scale Infections of iOS Devices - Tielei Wang, Yeongjin Jang, Yizheng Chen, Simon Chung, Billy Lau, Wenke Lee.eng.tsv
|
19.5 KB
|
On the Feasibility of Large-Scale Infections of iOS Devices - Tielei Wang, Yeongjin Jang, Yizheng Chen, Simon Chung, Billy Lau, Wenke Lee.eng.txt
|
22.2 KB
|
On the Feasibility of Large-Scale Infections of iOS Devices - Tielei Wang, Yeongjin Jang, Yizheng Chen, Simon Chung, Billy Lau, Wenke Lee.eng.vtt
|
21.8 KB
|
On the Practical Exploitability of Dual EC in TLS Implementations - Stephen Checkoway, Matthew Fredrikson, Ruben Niederhagen, Adam Everspaugh, Matthew Green, Tanja Lange, Thomas Ri.eng.json
|
892.4 KB
|
On the Practical Exploitability of Dual EC in TLS Implementations - Stephen Checkoway, Matthew Fredrikson, Ruben Niederhagen, Adam Everspaugh, Matthew Green, Tanja Lange, Thomas Ri.eng.lrc
|
24.0 KB
|
On the Practical Exploitability of Dual EC in TLS Implementations - Stephen Checkoway, Matthew Fredrikson, Ruben Niederhagen, Adam Everspaugh, Matthew Green, Tanja Lange, Thomas Ri.eng.srt
|
21.3 KB
|
On the Practical Exploitability of Dual EC in TLS Implementations - Stephen Checkoway, Matthew Fredrikson, Ruben Niederhagen, Adam Everspaugh, Matthew Green, Tanja Lange, Thomas Ri.eng.text
|
15.4 KB
|
On the Practical Exploitability of Dual EC in TLS Implementations - Stephen Checkoway, Matthew Fredrikson, Ruben Niederhagen, Adam Everspaugh, Matthew Green, Tanja Lange, Thomas Ri.eng.tsv
|
20.0 KB
|
On the Practical Exploitability of Dual EC in TLS Implementations - Stephen Checkoway, Matthew Fredrikson, Ruben Niederhagen, Adam Everspaugh, Matthew Green, Tanja Lange, Thomas Ri.eng.txt
|
24.3 KB
|
On the Practical Exploitability of Dual EC in TLS Implementations - Stephen Checkoway, Matthew Fredrikson, Ruben Niederhagen, Adam Everspaugh, Matthew Green, Tanja Lange, Thomas Ri.eng.vtt
|
19.6 KB
|
Optimizing Seed Selection for Fuzzing - Alexandre Rebert, Sang Kil Cha, Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, David Brumley.eng.json
|
830.6 KB
|
Optimizing Seed Selection for Fuzzing - Alexandre Rebert, Sang Kil Cha, Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, David Brumley.eng.lrc
|
20.3 KB
|
Optimizing Seed Selection for Fuzzing - Alexandre Rebert, Sang Kil Cha, Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, David Brumley.eng.srt
|
22.4 KB
|
Optimizing Seed Selection for Fuzzing - Alexandre Rebert, Sang Kil Cha, Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, David Brumley.eng.text
|
15.8 KB
|
Optimizing Seed Selection for Fuzzing - Alexandre Rebert, Sang Kil Cha, Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, David Brumley.eng.tsv
|
18.3 KB
|
Optimizing Seed Selection for Fuzzing - Alexandre Rebert, Sang Kil Cha, Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, David Brumley.eng.txt
|
20.5 KB
|
Optimizing Seed Selection for Fuzzing - Alexandre Rebert, Sang Kil Cha, Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, David Brumley.eng.vtt
|
20.6 KB
|
Oxymoron Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing - Michael Backes, Stefan Nurnberger.eng.json
|
1.3 MB
|
Oxymoron Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing - Michael Backes, Stefan Nurnberger.eng.lrc
|
37.1 KB
|
Oxymoron Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing - Michael Backes, Stefan Nurnberger.eng.srt
|
31.1 KB
|
Oxymoron Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing - Michael Backes, Stefan Nurnberger.eng.text
|
21.8 KB
|
Oxymoron Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing - Michael Backes, Stefan Nurnberger.eng.tsv
|
30.4 KB
|
Oxymoron Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing - Michael Backes, Stefan Nurnberger.eng.txt
|
37.6 KB
|
Oxymoron Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing - Michael Backes, Stefan Nurnberger.eng.vtt
|
28.4 KB
|
Panel Discussion - Stuart Schechter.eng.json
|
1.0 MB
|
Panel Discussion - Stuart Schechter.eng.lrc
|
27.2 KB
|
Panel Discussion - Stuart Schechter.eng.srt
|
26.8 KB
|
Panel Discussion - Stuart Schechter.eng.text
|
19.3 KB
|
Panel Discussion - Stuart Schechter.eng.tsv
|
23.7 KB
|
Panel Discussion - Stuart Schechter.eng.txt
|
27.5 KB
|
Panel Discussion - Stuart Schechter.eng.vtt
|
24.7 KB
|
Password Managers Attacks and Defenses - David Silver, Suman Jana, and Dan Boneh, Stanford University - Eric Chen, Collin Jackson.eng.json
|
1.1 MB
|
Password Managers Attacks and Defenses - David Silver, Suman Jana, and Dan Boneh, Stanford University - Eric Chen, Collin Jackson.eng.lrc
|
32.3 KB
|
Password Managers Attacks and Defenses - David Silver, Suman Jana, and Dan Boneh, Stanford University - Eric Chen, Collin Jackson.eng.srt
|
27.3 KB
|
Password Managers Attacks and Defenses - David Silver, Suman Jana, and Dan Boneh, Stanford University - Eric Chen, Collin Jackson.eng.text
|
20.4 KB
|
Password Managers Attacks and Defenses - David Silver, Suman Jana, and Dan Boneh, Stanford University - Eric Chen, Collin Jackson.eng.tsv
|
27.0 KB
|
Password Managers Attacks and Defenses - David Silver, Suman Jana, and Dan Boneh, Stanford University - Eric Chen, Collin Jackson.eng.txt
|
32.8 KB
|
Password Managers Attacks and Defenses - David Silver, Suman Jana, and Dan Boneh, Stanford University - Eric Chen, Collin Jackson.eng.vtt
|
25.3 KB
|
Password Portfolios and the Finite-Effort User Sustainably Managing Large Numbers of Accounts - Dinei Florencio, Cormac Herley, Paul C. van Oorschot.eng.json
|
1.1 MB
|
Password Portfolios and the Finite-Effort User Sustainably Managing Large Numbers of Accounts - Dinei Florencio, Cormac Herley, Paul C. van Oorschot.eng.lrc
|
27.0 KB
|
Password Portfolios and the Finite-Effort User Sustainably Managing Large Numbers of Accounts - Dinei Florencio, Cormac Herley, Paul C. van Oorschot.eng.srt
|
28.0 KB
|
Password Portfolios and the Finite-Effort User Sustainably Managing Large Numbers of Accounts - Dinei Florencio, Cormac Herley, Paul C. van Oorschot.eng.text
|
20.3 KB
|
Password Portfolios and the Finite-Effort User Sustainably Managing Large Numbers of Accounts - Dinei Florencio, Cormac Herley, Paul C. van Oorschot.eng.tsv
|
23.9 KB
|
Password Portfolios and the Finite-Effort User Sustainably Managing Large Numbers of Accounts - Dinei Florencio, Cormac Herley, Paul C. van Oorschot.eng.txt
|
27.3 KB
|
Password Portfolios and the Finite-Effort User Sustainably Managing Large Numbers of Accounts - Dinei Florencio, Cormac Herley, Paul C. van Oorschot.eng.vtt
|
25.9 KB
|
Peeking into Your App without Actually Seeing It UI State Inference and Novel Android Attacks - Qi Alfred Chen, Zhiyun Qian, Z. Morley Mao.eng.json
|
940.5 KB
|
Peeking into Your App without Actually Seeing It UI State Inference and Novel Android Attacks - Qi Alfred Chen, Zhiyun Qian, Z. Morley Mao.eng.lrc
|
23.4 KB
|
Peeking into Your App without Actually Seeing It UI State Inference and Novel Android Attacks - Qi Alfred Chen, Zhiyun Qian, Z. Morley Mao.eng.srt
|
27.0 KB
|
Peeking into Your App without Actually Seeing It UI State Inference and Novel Android Attacks - Qi Alfred Chen, Zhiyun Qian, Z. Morley Mao.eng.text
|
18.2 KB
|
Peeking into Your App without Actually Seeing It UI State Inference and Novel Android Attacks - Qi Alfred Chen, Zhiyun Qian, Z. Morley Mao.eng.tsv
|
21.1 KB
|
Peeking into Your App without Actually Seeing It UI State Inference and Novel Android Attacks - Qi Alfred Chen, Zhiyun Qian, Z. Morley Mao.eng.txt
|
23.6 KB
|
Peeking into Your App without Actually Seeing It UI State Inference and Novel Android Attacks - Qi Alfred Chen, Zhiyun Qian, Z. Morley Mao.eng.vtt
|
24.5 KB
|
Precise Client-side Protection against DOM-based Cross-Site Scripting - Ben Stock, Sebastian Lekies, Tobias Mueller, Patrick Spiegel, and Martin Johns.eng.json
|
1.1 MB
|
Precise Client-side Protection against DOM-based Cross-Site Scripting - Ben Stock, Sebastian Lekies, Tobias Mueller, Patrick Spiegel, and Martin Johns.eng.lrc
|
31.1 KB
|
Precise Client-side Protection against DOM-based Cross-Site Scripting - Ben Stock, Sebastian Lekies, Tobias Mueller, Patrick Spiegel, and Martin Johns.eng.srt
|
25.7 KB
|
Precise Client-side Protection against DOM-based Cross-Site Scripting - Ben Stock, Sebastian Lekies, Tobias Mueller, Patrick Spiegel, and Martin Johns.eng.text
|
20.5 KB
|
Precise Client-side Protection against DOM-based Cross-Site Scripting - Ben Stock, Sebastian Lekies, Tobias Mueller, Patrick Spiegel, and Martin Johns.eng.tsv
|
26.3 KB
|
Precise Client-side Protection against DOM-based Cross-Site Scripting - Ben Stock, Sebastian Lekies, Tobias Mueller, Patrick Spiegel, and Martin Johns.eng.txt
|
31.5 KB
|
Precise Client-side Protection against DOM-based Cross-Site Scripting - Ben Stock, Sebastian Lekies, Tobias Mueller, Patrick Spiegel, and Martin Johns.eng.vtt
|
24.2 KB
|
Preventing Cryptographic Key Leakage in Cloud Virtual Machines - Erman Pattuk, Murat Kantarcioglu, Zhiqiang Lin, Huseyin Ulusoy.eng.json
|
929.4 KB
|
Preventing Cryptographic Key Leakage in Cloud Virtual Machines - Erman Pattuk, Murat Kantarcioglu, Zhiqiang Lin, Huseyin Ulusoy.eng.lrc
|
22.3 KB
|
Preventing Cryptographic Key Leakage in Cloud Virtual Machines - Erman Pattuk, Murat Kantarcioglu, Zhiqiang Lin, Huseyin Ulusoy.eng.srt
|
24.6 KB
|
Preventing Cryptographic Key Leakage in Cloud Virtual Machines - Erman Pattuk, Murat Kantarcioglu, Zhiqiang Lin, Huseyin Ulusoy.eng.text
|
17.5 KB
|
Preventing Cryptographic Key Leakage in Cloud Virtual Machines - Erman Pattuk, Murat Kantarcioglu, Zhiqiang Lin, Huseyin Ulusoy.eng.tsv
|
20.1 KB
|
Preventing Cryptographic Key Leakage in Cloud Virtual Machines - Erman Pattuk, Murat Kantarcioglu, Zhiqiang Lin, Huseyin Ulusoy.eng.txt
|
22.5 KB
|
Preventing Cryptographic Key Leakage in Cloud Virtual Machines - Erman Pattuk, Murat Kantarcioglu, Zhiqiang Lin, Huseyin Ulusoy.eng.vtt
|
22.6 KB
|
Privacy in Pharmacogenetics An End-to-End Case Study of Personalized Warfarin Dosing - Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon Lin, David Page, Thomas Ristenpart.eng.json
|
1.0 MB
|
Privacy in Pharmacogenetics An End-to-End Case Study of Personalized Warfarin Dosing - Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon Lin, David Page, Thomas Ristenpart.eng.lrc
|
26.6 KB
|
Privacy in Pharmacogenetics An End-to-End Case Study of Personalized Warfarin Dosing - Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon Lin, David Page, Thomas Ristenpart.eng.srt
|
26.9 KB
|
Privacy in Pharmacogenetics An End-to-End Case Study of Personalized Warfarin Dosing - Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon Lin, David Page, Thomas Ristenpart.eng.text
|
20.4 KB
|
Privacy in Pharmacogenetics An End-to-End Case Study of Personalized Warfarin Dosing - Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon Lin, David Page, Thomas Ristenpart.eng.tsv
|
23.8 KB
|
Privacy in Pharmacogenetics An End-to-End Case Study of Personalized Warfarin Dosing - Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon Lin, David Page, Thomas Ristenpart.eng.txt
|
26.9 KB
|
Privacy in Pharmacogenetics An End-to-End Case Study of Personalized Warfarin Dosing - Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon Lin, David Page, Thomas Ristenpart.eng.vtt
|
25.1 KB
|
Privee An Architecture for Automatically Analyzing Web Privacy Policies -Sebastian Zimmeck, Steven M. Bellovin.eng.json
|
703.2 KB
|
Privee An Architecture for Automatically Analyzing Web Privacy Policies -Sebastian Zimmeck, Steven M. Bellovin.eng.lrc
|
19.6 KB
|
Privee An Architecture for Automatically Analyzing Web Privacy Policies -Sebastian Zimmeck, Steven M. Bellovin.eng.srt
|
19.6 KB
|
Privee An Architecture for Automatically Analyzing Web Privacy Policies -Sebastian Zimmeck, Steven M. Bellovin.eng.text
|
14.3 KB
|
Privee An Architecture for Automatically Analyzing Web Privacy Policies -Sebastian Zimmeck, Steven M. Bellovin.eng.tsv
|
17.2 KB
|
Privee An Architecture for Automatically Analyzing Web Privacy Policies -Sebastian Zimmeck, Steven M. Bellovin.eng.txt
|
19.8 KB
|
Privee An Architecture for Automatically Analyzing Web Privacy Policies -Sebastian Zimmeck, Steven M. Bellovin.eng.vtt
|
18.1 KB
|
ret2dir Rethinking Kernel Isolation - Vasileios P. Kemerlis, Michalis Polychronakis, Angelos D. Keromytis.eng.json
|
907.3 KB
|
ret2dir Rethinking Kernel Isolation - Vasileios P. Kemerlis, Michalis Polychronakis, Angelos D. Keromytis.eng.lrc
|
26.3 KB
|
ret2dir Rethinking Kernel Isolation - Vasileios P. Kemerlis, Michalis Polychronakis, Angelos D. Keromytis.eng.srt
|
21.9 KB
|
ret2dir Rethinking Kernel Isolation - Vasileios P. Kemerlis, Michalis Polychronakis, Angelos D. Keromytis.eng.text
|
16.2 KB
|
ret2dir Rethinking Kernel Isolation - Vasileios P. Kemerlis, Michalis Polychronakis, Angelos D. Keromytis.eng.tsv
|
21.6 KB
|
ret2dir Rethinking Kernel Isolation - Vasileios P. Kemerlis, Michalis Polychronakis, Angelos D. Keromytis.eng.txt
|
26.7 KB
|
ret2dir Rethinking Kernel Isolation - Vasileios P. Kemerlis, Michalis Polychronakis, Angelos D. Keromytis.eng.vtt
|
20.3 KB
|
Revisiting SSLTLS Implementations New Bleichenbacher Side Channels and Attacks - Christopher Meyer, Juraj Somorovsky, Eugen Weiss, Jorg Schwenk, Sebastian Schinzel, Erik Tews.eng.json
|
791.3 KB
|
Revisiting SSLTLS Implementations New Bleichenbacher Side Channels and Attacks - Christopher Meyer, Juraj Somorovsky, Eugen Weiss, Jorg Schwenk, Sebastian Schinzel, Erik Tews.eng.lrc
|
22.2 KB
|
Revisiting SSLTLS Implementations New Bleichenbacher Side Channels and Attacks - Christopher Meyer, Juraj Somorovsky, Eugen Weiss, Jorg Schwenk, Sebastian Schinzel, Erik Tews.eng.srt
|
19.8 KB
|
Revisiting SSLTLS Implementations New Bleichenbacher Side Channels and Attacks - Christopher Meyer, Juraj Somorovsky, Eugen Weiss, Jorg Schwenk, Sebastian Schinzel, Erik Tews.eng.text
|
13.5 KB
|
Revisiting SSLTLS Implementations New Bleichenbacher Side Channels and Attacks - Christopher Meyer, Juraj Somorovsky, Eugen Weiss, Jorg Schwenk, Sebastian Schinzel, Erik Tews.eng.tsv
|
18.2 KB
|
Revisiting SSLTLS Implementations New Bleichenbacher Side Channels and Attacks - Christopher Meyer, Juraj Somorovsky, Eugen Weiss, Jorg Schwenk, Sebastian Schinzel, Erik Tews.eng.txt
|
22.5 KB
|
Revisiting SSLTLS Implementations New Bleichenbacher Side Channels and Attacks - Christopher Meyer, Juraj Somorovsky, Eugen Weiss, Jorg Schwenk, Sebastian Schinzel, Erik Tews.eng.vtt
|
18.0 KB
|
ROP is Still Dangerous Breaking Modern Defenses - Nicholas Carlini, David Wagner.eng.json
|
1.2 MB
|
ROP is Still Dangerous Breaking Modern Defenses - Nicholas Carlini, David Wagner.eng.lrc
|
35.8 KB
|
ROP is Still Dangerous Breaking Modern Defenses - Nicholas Carlini, David Wagner.eng.srt
|
27.4 KB
|
ROP is Still Dangerous Breaking Modern Defenses - Nicholas Carlini, David Wagner.eng.text
|
19.3 KB
|
ROP is Still Dangerous Breaking Modern Defenses - Nicholas Carlini, David Wagner.eng.tsv
|
28.2 KB
|
ROP is Still Dangerous Breaking Modern Defenses - Nicholas Carlini, David Wagner.eng.txt
|
36.4 KB
|
ROP is Still Dangerous Breaking Modern Defenses - Nicholas Carlini, David Wagner.eng.vtt
|
25.0 KB
|
Scheduler-based Defenses against Cross-VM Side-channels - Venkatanathan Varadarajan, Thomas Ristenpart, Michael Swift.eng.json
|
866.6 KB
|
Scheduler-based Defenses against Cross-VM Side-channels - Venkatanathan Varadarajan, Thomas Ristenpart, Michael Swift.eng.lrc
|
25.3 KB
|
Scheduler-based Defenses against Cross-VM Side-channels - Venkatanathan Varadarajan, Thomas Ristenpart, Michael Swift.eng.srt
|
21.8 KB
|
Scheduler-based Defenses against Cross-VM Side-channels - Venkatanathan Varadarajan, Thomas Ristenpart, Michael Swift.eng.text
|
16.6 KB
|
Scheduler-based Defenses against Cross-VM Side-channels - Venkatanathan Varadarajan, Thomas Ristenpart, Michael Swift.eng.tsv
|
21.4 KB
|
Scheduler-based Defenses against Cross-VM Side-channels - Venkatanathan Varadarajan, Thomas Ristenpart, Michael Swift.eng.txt
|
25.6 KB
|
Scheduler-based Defenses against Cross-VM Side-channels - Venkatanathan Varadarajan, Thomas Ristenpart, Michael Swift.eng.vtt
|
20.3 KB
|
SDDR Light-Weight, Secure Mobile Encounters - Matthew Lentz, Viktor Erdélyi, Paarijaat Aditya, Elaine Shi, Peter Druschel, Bobby Bhattacharjee.eng.json
|
939.6 KB
|
SDDR Light-Weight, Secure Mobile Encounters - Matthew Lentz, Viktor Erdélyi, Paarijaat Aditya, Elaine Shi, Peter Druschel, Bobby Bhattacharjee.eng.lrc
|
24.5 KB
|
SDDR Light-Weight, Secure Mobile Encounters - Matthew Lentz, Viktor Erdélyi, Paarijaat Aditya, Elaine Shi, Peter Druschel, Bobby Bhattacharjee.eng.srt
|
24.8 KB
|
SDDR Light-Weight, Secure Mobile Encounters - Matthew Lentz, Viktor Erdélyi, Paarijaat Aditya, Elaine Shi, Peter Druschel, Bobby Bhattacharjee.eng.text
|
19.0 KB
|
SDDR Light-Weight, Secure Mobile Encounters - Matthew Lentz, Viktor Erdélyi, Paarijaat Aditya, Elaine Shi, Peter Druschel, Bobby Bhattacharjee.eng.tsv
|
22.0 KB
|
SDDR Light-Weight, Secure Mobile Encounters - Matthew Lentz, Viktor Erdélyi, Paarijaat Aditya, Elaine Shi, Peter Druschel, Bobby Bhattacharjee.eng.txt
|
24.7 KB
|
SDDR Light-Weight, Secure Mobile Encounters - Matthew Lentz, Viktor Erdélyi, Paarijaat Aditya, Elaine Shi, Peter Druschel, Bobby Bhattacharjee.eng.vtt
|
23.2 KB
|
Security Analysis of a Full-Body Scanner - Keaton Mowery, Eric Wustrow, Tom Wypych, Corey Singleton, Chris Comfort, Eric Rescorla, Stephen Checkoway, J. Alex Halderman, Hovav Shach.eng.json
|
1.1 MB
|
Security Analysis of a Full-Body Scanner - Keaton Mowery, Eric Wustrow, Tom Wypych, Corey Singleton, Chris Comfort, Eric Rescorla, Stephen Checkoway, J. Alex Halderman, Hovav Shach.eng.lrc
|
28.2 KB
|
Security Analysis of a Full-Body Scanner - Keaton Mowery, Eric Wustrow, Tom Wypych, Corey Singleton, Chris Comfort, Eric Rescorla, Stephen Checkoway, J. Alex Halderman, Hovav Shach.eng.srt
|
31.5 KB
|
Security Analysis of a Full-Body Scanner - Keaton Mowery, Eric Wustrow, Tom Wypych, Corey Singleton, Chris Comfort, Eric Rescorla, Stephen Checkoway, J. Alex Halderman, Hovav Shach.eng.text
|
21.8 KB
|
Security Analysis of a Full-Body Scanner - Keaton Mowery, Eric Wustrow, Tom Wypych, Corey Singleton, Chris Comfort, Eric Rescorla, Stephen Checkoway, J. Alex Halderman, Hovav Shach.eng.tsv
|
25.4 KB
|
Security Analysis of a Full-Body Scanner - Keaton Mowery, Eric Wustrow, Tom Wypych, Corey Singleton, Chris Comfort, Eric Rescorla, Stephen Checkoway, J. Alex Halderman, Hovav Shach.eng.txt
|
28.4 KB
|
Security Analysis of a Full-Body Scanner - Keaton Mowery, Eric Wustrow, Tom Wypych, Corey Singleton, Chris Comfort, Eric Rescorla, Stephen Checkoway, J. Alex Halderman, Hovav Shach.eng.vtt
|
28.8 KB
|
Size Does Matter Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard - Enes Goktas, Elias Athanasopoulos, Michalis Polychronakis, Herbert Bos, Georgios Portokalidis.eng.json
|
581.9 KB
|
Size Does Matter Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard - Enes Goktas, Elias Athanasopoulos, Michalis Polychronakis, Herbert Bos, Georgios Portokalidis.eng.lrc
|
15.7 KB
|
Size Does Matter Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard - Enes Goktas, Elias Athanasopoulos, Michalis Polychronakis, Herbert Bos, Georgios Portokalidis.eng.srt
|
16.5 KB
|
Size Does Matter Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard - Enes Goktas, Elias Athanasopoulos, Michalis Polychronakis, Herbert Bos, Georgios Portokalidis.eng.text
|
11.8 KB
|
Size Does Matter Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard - Enes Goktas, Elias Athanasopoulos, Michalis Polychronakis, Herbert Bos, Georgios Portokalidis.eng.tsv
|
13.9 KB
|
Size Does Matter Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard - Enes Goktas, Elias Athanasopoulos, Michalis Polychronakis, Herbert Bos, Georgios Portokalidis.eng.txt
|
15.8 KB
|
Size Does Matter Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard - Enes Goktas, Elias Athanasopoulos, Michalis Polychronakis, Herbert Bos, Georgios Portokalidis.eng.vtt
|
15.2 KB
|
SpanDex Secure Password Tracking for Android - Landon P. Cox , Peter Gilbert, Geoffrey Lawler, Valentin Pistol, Ali Razeen, Bi Wu, Sai Cheemalapati.eng.json
|
1.1 MB
|
SpanDex Secure Password Tracking for Android - Landon P. Cox , Peter Gilbert, Geoffrey Lawler, Valentin Pistol, Ali Razeen, Bi Wu, Sai Cheemalapati.eng.lrc
|
27.2 KB
|
SpanDex Secure Password Tracking for Android - Landon P. Cox , Peter Gilbert, Geoffrey Lawler, Valentin Pistol, Ali Razeen, Bi Wu, Sai Cheemalapati.eng.srt
|
31.8 KB
|
SpanDex Secure Password Tracking for Android - Landon P. Cox , Peter Gilbert, Geoffrey Lawler, Valentin Pistol, Ali Razeen, Bi Wu, Sai Cheemalapati.eng.text
|
20.8 KB
|
SpanDex Secure Password Tracking for Android - Landon P. Cox , Peter Gilbert, Geoffrey Lawler, Valentin Pistol, Ali Razeen, Bi Wu, Sai Cheemalapati.eng.tsv
|
24.4 KB
|
SpanDex Secure Password Tracking for Android - Landon P. Cox , Peter Gilbert, Geoffrey Lawler, Valentin Pistol, Ali Razeen, Bi Wu, Sai Cheemalapati.eng.txt
|
27.5 KB
|
SpanDex Secure Password Tracking for Android - Landon P. Cox , Peter Gilbert, Geoffrey Lawler, Valentin Pistol, Ali Razeen, Bi Wu, Sai Cheemalapati.eng.vtt
|
28.7 KB
|
SSOScan Automated Testing of Web Applications for Single Sign-On Vulnerabilities - Yuchen Zhou, David Evans.eng.json
|
883.3 KB
|
SSOScan Automated Testing of Web Applications for Single Sign-On Vulnerabilities - Yuchen Zhou, David Evans.eng.lrc
|
21.9 KB
|
SSOScan Automated Testing of Web Applications for Single Sign-On Vulnerabilities - Yuchen Zhou, David Evans.eng.srt
|
24.2 KB
|
SSOScan Automated Testing of Web Applications for Single Sign-On Vulnerabilities - Yuchen Zhou, David Evans.eng.text
|
17.4 KB
|
SSOScan Automated Testing of Web Applications for Single Sign-On Vulnerabilities - Yuchen Zhou, David Evans.eng.tsv
|
19.8 KB
|
SSOScan Automated Testing of Web Applications for Single Sign-On Vulnerabilities - Yuchen Zhou, David Evans.eng.txt
|
22.1 KB
|
SSOScan Automated Testing of Web Applications for Single Sign-On Vulnerabilities - Yuchen Zhou, David Evans.eng.vtt
|
22.3 KB
|
Static Detection of Second-Order Vulnerabilities in Web Applications - Johannes Dahse, Thorsten Holz.eng.json
|
930.4 KB
|
Static Detection of Second-Order Vulnerabilities in Web Applications - Johannes Dahse, Thorsten Holz.eng.lrc
|
23.9 KB
|
Static Detection of Second-Order Vulnerabilities in Web Applications - Johannes Dahse, Thorsten Holz.eng.srt
|
26.7 KB
|
Static Detection of Second-Order Vulnerabilities in Web Applications - Johannes Dahse, Thorsten Holz.eng.text
|
18.6 KB
|
Static Detection of Second-Order Vulnerabilities in Web Applications - Johannes Dahse, Thorsten Holz.eng.tsv
|
21.5 KB
|
Static Detection of Second-Order Vulnerabilities in Web Applications - Johannes Dahse, Thorsten Holz.eng.txt
|
24.1 KB
|
Static Detection of Second-Order Vulnerabilities in Web Applications - Johannes Dahse, Thorsten Holz.eng.vtt
|
24.5 KB
|
Stitching the Gadgets On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection - Lucas Davi, Ahmad-Reza Sadeghi, Daniel Lehmann, Fabian Monrose.eng.json
|
797.6 KB
|
Stitching the Gadgets On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection - Lucas Davi, Ahmad-Reza Sadeghi, Daniel Lehmann, Fabian Monrose.eng.lrc
|
24.0 KB
|
Stitching the Gadgets On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection - Lucas Davi, Ahmad-Reza Sadeghi, Daniel Lehmann, Fabian Monrose.eng.srt
|
19.7 KB
|
Stitching the Gadgets On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection - Lucas Davi, Ahmad-Reza Sadeghi, Daniel Lehmann, Fabian Monrose.eng.text
|
14.9 KB
|
Stitching the Gadgets On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection - Lucas Davi, Ahmad-Reza Sadeghi, Daniel Lehmann, Fabian Monrose.eng.tsv
|
19.8 KB
|
Stitching the Gadgets On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection - Lucas Davi, Ahmad-Reza Sadeghi, Daniel Lehmann, Fabian Monrose.eng.txt
|
24.4 KB
|
Stitching the Gadgets On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection - Lucas Davi, Ahmad-Reza Sadeghi, Daniel Lehmann, Fabian Monrose.eng.vtt
|
18.3 KB
|
Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture - Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza.eng.json
|
809.7 KB
|
Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture - Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza.eng.lrc
|
22.8 KB
|
Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture - Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza.eng.srt
|
21.2 KB
|
Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture - Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza.eng.text
|
15.2 KB
|
Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture - Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza.eng.tsv
|
19.3 KB
|
Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture - Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza.eng.txt
|
23.1 KB
|
Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture - Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza.eng.vtt
|
19.5 KB
|
TapDance End-to-Middle Anticensorship without Flow Blocking - Eric Wustrow, Colleen M. Swanson, J. Alex Halderman.eng.json
|
1.1 MB
|
TapDance End-to-Middle Anticensorship without Flow Blocking - Eric Wustrow, Colleen M. Swanson, J. Alex Halderman.eng.lrc
|
30.1 KB
|
TapDance End-to-Middle Anticensorship without Flow Blocking - Eric Wustrow, Colleen M. Swanson, J. Alex Halderman.eng.srt
|
26.4 KB
|
TapDance End-to-Middle Anticensorship without Flow Blocking - Eric Wustrow, Colleen M. Swanson, J. Alex Halderman.eng.text
|
20.3 KB
|
TapDance End-to-Middle Anticensorship without Flow Blocking - Eric Wustrow, Colleen M. Swanson, J. Alex Halderman.eng.tsv
|
25.8 KB
|
TapDance End-to-Middle Anticensorship without Flow Blocking - Eric Wustrow, Colleen M. Swanson, J. Alex Halderman.eng.txt
|
30.5 KB
|
TapDance End-to-Middle Anticensorship without Flow Blocking - Eric Wustrow, Colleen M. Swanson, J. Alex Halderman.eng.vtt
|
24.7 KB
|
Targeted Threat Index Characterizing and Quantifying Politically-Motivated Targeted Malware - Seth Hardy, Masashi Crete-Nishihata, Katharine Kleemola, Adam Senft, Byron Sonne, Greg.eng.json
|
834.9 KB
|
Targeted Threat Index Characterizing and Quantifying Politically-Motivated Targeted Malware - Seth Hardy, Masashi Crete-Nishihata, Katharine Kleemola, Adam Senft, Byron Sonne, Greg.eng.lrc
|
21.7 KB
|
Targeted Threat Index Characterizing and Quantifying Politically-Motivated Targeted Malware - Seth Hardy, Masashi Crete-Nishihata, Katharine Kleemola, Adam Senft, Byron Sonne, Greg.eng.srt
|
23.1 KB
|
Targeted Threat Index Characterizing and Quantifying Politically-Motivated Targeted Malware - Seth Hardy, Masashi Crete-Nishihata, Katharine Kleemola, Adam Senft, Byron Sonne, Greg.eng.text
|
16.6 KB
|
Targeted Threat Index Characterizing and Quantifying Politically-Motivated Targeted Malware - Seth Hardy, Masashi Crete-Nishihata, Katharine Kleemola, Adam Senft, Byron Sonne, Greg.eng.tsv
|
19.4 KB
|
Targeted Threat Index Characterizing and Quantifying Politically-Motivated Targeted Malware - Seth Hardy, Masashi Crete-Nishihata, Katharine Kleemola, Adam Senft, Byron Sonne, Greg.eng.txt
|
21.9 KB
|
Targeted Threat Index Characterizing and Quantifying Politically-Motivated Targeted Malware - Seth Hardy, Masashi Crete-Nishihata, Katharine Kleemola, Adam Senft, Byron Sonne, Greg.eng.vtt
|
21.3 KB
|
Telepathwords Preventing Weak Passwords by Reading Users’ Minds - Saranga Komanduri, Richard Shay, Lorrie Faith Cranor, Cormac Herley Stuart Schechter.eng.json
|
1.0 MB
|
Telepathwords Preventing Weak Passwords by Reading Users’ Minds - Saranga Komanduri, Richard Shay, Lorrie Faith Cranor, Cormac Herley Stuart Schechter.eng.lrc
|
29.5 KB
|
Telepathwords Preventing Weak Passwords by Reading Users’ Minds - Saranga Komanduri, Richard Shay, Lorrie Faith Cranor, Cormac Herley Stuart Schechter.eng.srt
|
26.2 KB
|
Telepathwords Preventing Weak Passwords by Reading Users’ Minds - Saranga Komanduri, Richard Shay, Lorrie Faith Cranor, Cormac Herley Stuart Schechter.eng.text
|
20.0 KB
|
Telepathwords Preventing Weak Passwords by Reading Users’ Minds - Saranga Komanduri, Richard Shay, Lorrie Faith Cranor, Cormac Herley Stuart Schechter.eng.tsv
|
25.2 KB
|
Telepathwords Preventing Weak Passwords by Reading Users’ Minds - Saranga Komanduri, Richard Shay, Lorrie Faith Cranor, Cormac Herley Stuart Schechter.eng.txt
|
29.8 KB
|
Telepathwords Preventing Weak Passwords by Reading Users’ Minds - Saranga Komanduri, Richard Shay, Lorrie Faith Cranor, Cormac Herley Stuart Schechter.eng.vtt
|
24.4 KB
|
The Emperor’s New Password Manager Security Analysis of Web-based Password Managers - Zhiwei Li, Warren He, Devdatta Akhawe, Dawn Song.eng.json
|
790.2 KB
|
The Emperor’s New Password Manager Security Analysis of Web-based Password Managers - Zhiwei Li, Warren He, Devdatta Akhawe, Dawn Song.eng.lrc
|
21.2 KB
|
The Emperor’s New Password Manager Security Analysis of Web-based Password Managers - Zhiwei Li, Warren He, Devdatta Akhawe, Dawn Song.eng.srt
|
22.2 KB
|
The Emperor’s New Password Manager Security Analysis of Web-based Password Managers - Zhiwei Li, Warren He, Devdatta Akhawe, Dawn Song.eng.text
|
15.6 KB
|
The Emperor’s New Password Manager Security Analysis of Web-based Password Managers - Zhiwei Li, Warren He, Devdatta Akhawe, Dawn Song.eng.tsv
|
18.7 KB
|
The Emperor’s New Password Manager Security Analysis of Web-based Password Managers - Zhiwei Li, Warren He, Devdatta Akhawe, Dawn Song.eng.txt
|
21.5 KB
|
The Emperor’s New Password Manager Security Analysis of Web-based Password Managers - Zhiwei Li, Warren He, Devdatta Akhawe, Dawn Song.eng.vtt
|
20.3 KB
|
The Future of Crypto Getting from Here to Guarantees - Daniel J. Bernstein, Matt Blaze, Tanja Lange.eng.json
|
4.9 MB
|
The Future of Crypto Getting from Here to Guarantees - Daniel J. Bernstein, Matt Blaze, Tanja Lange.eng.lrc
|
149.8 KB
|
The Future of Crypto Getting from Here to Guarantees - Daniel J. Bernstein, Matt Blaze, Tanja Lange.eng.srt
|
115.3 KB
|
The Future of Crypto Getting from Here to Guarantees - Daniel J. Bernstein, Matt Blaze, Tanja Lange.eng.text
|
85.0 KB
|
The Future of Crypto Getting from Here to Guarantees - Daniel J. Bernstein, Matt Blaze, Tanja Lange.eng.tsv
|
121.2 KB
|
The Future of Crypto Getting from Here to Guarantees - Daniel J. Bernstein, Matt Blaze, Tanja Lange.eng.txt
|
152.1 KB
|
The Future of Crypto Getting from Here to Guarantees - Daniel J. Bernstein, Matt Blaze, Tanja Lange.eng.vtt
|
107.8 KB
|
The Long Taile of Typosquatting Domain Names - Janos Szurdi, Balazs Kocso, Gabor Cseh, Jonathan Spring, Mark Felegyhazi, Chris Kanich.eng.json
|
715.2 KB
|
The Long Taile of Typosquatting Domain Names - Janos Szurdi, Balazs Kocso, Gabor Cseh, Jonathan Spring, Mark Felegyhazi, Chris Kanich.eng.lrc
|
18.8 KB
|
The Long Taile of Typosquatting Domain Names - Janos Szurdi, Balazs Kocso, Gabor Cseh, Jonathan Spring, Mark Felegyhazi, Chris Kanich.eng.srt
|
18.1 KB
|
The Long Taile of Typosquatting Domain Names - Janos Szurdi, Balazs Kocso, Gabor Cseh, Jonathan Spring, Mark Felegyhazi, Chris Kanich.eng.text
|
13.8 KB
|
The Long Taile of Typosquatting Domain Names - Janos Szurdi, Balazs Kocso, Gabor Cseh, Jonathan Spring, Mark Felegyhazi, Chris Kanich.eng.tsv
|
16.5 KB
|
The Long Taile of Typosquatting Domain Names - Janos Szurdi, Balazs Kocso, Gabor Cseh, Jonathan Spring, Mark Felegyhazi, Chris Kanich.eng.txt
|
19.0 KB
|
The Long Taile of Typosquatting Domain Names - Janos Szurdi, Balazs Kocso, Gabor Cseh, Jonathan Spring, Mark Felegyhazi, Chris Kanich.eng.vtt
|
16.9 KB
|
Towards Detecting Anomalous User Behavior in Online Social Networks - Bimal Viswanath, M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna P. Gummadi, Max Planck, Balachander Kris.eng.json
|
994.0 KB
|
Towards Detecting Anomalous User Behavior in Online Social Networks - Bimal Viswanath, M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna P. Gummadi, Max Planck, Balachander Kris.eng.lrc
|
26.3 KB
|
Towards Detecting Anomalous User Behavior in Online Social Networks - Bimal Viswanath, M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna P. Gummadi, Max Planck, Balachander Kris.eng.srt
|
27.5 KB
|
Towards Detecting Anomalous User Behavior in Online Social Networks - Bimal Viswanath, M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna P. Gummadi, Max Planck, Balachander Kris.eng.text
|
19.3 KB
|
Towards Detecting Anomalous User Behavior in Online Social Networks - Bimal Viswanath, M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna P. Gummadi, Max Planck, Balachander Kris.eng.tsv
|
23.2 KB
|
Towards Detecting Anomalous User Behavior in Online Social Networks - Bimal Viswanath, M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna P. Gummadi, Max Planck, Balachander Kris.eng.txt
|
26.6 KB
|
Towards Detecting Anomalous User Behavior in Online Social Networks - Bimal Viswanath, M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna P. Gummadi, Max Planck, Balachander Kris.eng.vtt
|
25.2 KB
|
Towards Reliable Storage of 56-bit Secrets in Human Memory - Joseph Bonneau, Stuart Schechter.eng.json
|
1.2 MB
|
Towards Reliable Storage of 56-bit Secrets in Human Memory - Joseph Bonneau, Stuart Schechter.eng.lrc
|
31.3 KB
|
Towards Reliable Storage of 56-bit Secrets in Human Memory - Joseph Bonneau, Stuart Schechter.eng.srt
|
30.0 KB
|
Towards Reliable Storage of 56-bit Secrets in Human Memory - Joseph Bonneau, Stuart Schechter.eng.text
|
21.1 KB
|
Towards Reliable Storage of 56-bit Secrets in Human Memory - Joseph Bonneau, Stuart Schechter.eng.tsv
|
26.8 KB
|
Towards Reliable Storage of 56-bit Secrets in Human Memory - Joseph Bonneau, Stuart Schechter.eng.txt
|
31.7 KB
|
Towards Reliable Storage of 56-bit Secrets in Human Memory - Joseph Bonneau, Stuart Schechter.eng.vtt
|
27.5 KB
|
TRUESET Faster Verifiable et Computations - Ahmed E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Mahmoud F. Sayed, Elaine Shi, Nikos Triandopoulos.eng.json
|
1.0 MB
|
TRUESET Faster Verifiable et Computations - Ahmed E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Mahmoud F. Sayed, Elaine Shi, Nikos Triandopoulos.eng.lrc
|
28.9 KB
|
TRUESET Faster Verifiable et Computations - Ahmed E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Mahmoud F. Sayed, Elaine Shi, Nikos Triandopoulos.eng.srt
|
23.6 KB
|
TRUESET Faster Verifiable et Computations - Ahmed E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Mahmoud F. Sayed, Elaine Shi, Nikos Triandopoulos.eng.text
|
18.9 KB
|
TRUESET Faster Verifiable et Computations - Ahmed E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Mahmoud F. Sayed, Elaine Shi, Nikos Triandopoulos.eng.tsv
|
24.4 KB
|
TRUESET Faster Verifiable et Computations - Ahmed E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Mahmoud F. Sayed, Elaine Shi, Nikos Triandopoulos.eng.txt
|
29.3 KB
|
TRUESET Faster Verifiable et Computations - Ahmed E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Mahmoud F. Sayed, Elaine Shi, Nikos Triandopoulos.eng.vtt
|
22.2 KB
|
Understanding the Dark Side of Domain Parking - Sumayah Alrwais, Kan Yuan, Eihal Alowaisheq, Zhou Li, XiaoFeng Wang.eng.json
|
1.0 MB
|
Understanding the Dark Side of Domain Parking - Sumayah Alrwais, Kan Yuan, Eihal Alowaisheq, Zhou Li, XiaoFeng Wang.eng.lrc
|
26.4 KB
|
Understanding the Dark Side of Domain Parking - Sumayah Alrwais, Kan Yuan, Eihal Alowaisheq, Zhou Li, XiaoFeng Wang.eng.srt
|
28.4 KB
|
Understanding the Dark Side of Domain Parking - Sumayah Alrwais, Kan Yuan, Eihal Alowaisheq, Zhou Li, XiaoFeng Wang.eng.text
|
20.0 KB
|
Understanding the Dark Side of Domain Parking - Sumayah Alrwais, Kan Yuan, Eihal Alowaisheq, Zhou Li, XiaoFeng Wang.eng.tsv
|
23.6 KB
|
Understanding the Dark Side of Domain Parking - Sumayah Alrwais, Kan Yuan, Eihal Alowaisheq, Zhou Li, XiaoFeng Wang.eng.txt
|
26.7 KB
|
Understanding the Dark Side of Domain Parking - Sumayah Alrwais, Kan Yuan, Eihal Alowaisheq, Zhou Li, XiaoFeng Wang.eng.vtt
|
26.1 KB
|
USENIX SECURITY 2014 Keynote - Phone Phreaks What We Can Learn From the First Network Hackers - Phil Lapsely.eng.json
|
3.4 MB
|
USENIX SECURITY 2014 Keynote - Phone Phreaks What We Can Learn From the First Network Hackers - Phil Lapsely.eng.lrc
|
97.9 KB
|
USENIX SECURITY 2014 Keynote - Phone Phreaks What We Can Learn From the First Network Hackers - Phil Lapsely.eng.srt
|
79.7 KB
|
USENIX SECURITY 2014 Keynote - Phone Phreaks What We Can Learn From the First Network Hackers - Phil Lapsely.eng.text
|
55.8 KB
|
USENIX SECURITY 2014 Keynote - Phone Phreaks What We Can Learn From the First Network Hackers - Phil Lapsely.eng.tsv
|
80.7 KB
|
USENIX SECURITY 2014 Keynote - Phone Phreaks What We Can Learn From the First Network Hackers - Phil Lapsely.eng.txt
|
99.5 KB
|
USENIX SECURITY 2014 Keynote - Phone Phreaks What We Can Learn From the First Network Hackers - Phil Lapsely.eng.vtt
|
72.6 KB
|
USENIX Security 2014 Lightning Talks.eng.json
|
1.1 MB
|
USENIX Security 2014 Lightning Talks.eng.lrc
|
29.0 KB
|
USENIX Security 2014 Lightning Talks.eng.srt
|
30.4 KB
|
USENIX Security 2014 Lightning Talks.eng.text
|
22.5 KB
|
USENIX Security 2014 Lightning Talks.eng.tsv
|
26.2 KB
|
USENIX Security 2014 Lightning Talks.eng.txt
|
29.3 KB
|
USENIX Security 2014 Lightning Talks.eng.vtt
|
28.2 KB
|
USENIX Security 2014 Opening Remarks and Awards - Kevin Fu.eng.json
|
931.8 KB
|
USENIX Security 2014 Opening Remarks and Awards - Kevin Fu.eng.lrc
|
22.7 KB
|
USENIX Security 2014 Opening Remarks and Awards - Kevin Fu.eng.srt
|
26.2 KB
|
USENIX Security 2014 Opening Remarks and Awards - Kevin Fu.eng.text
|
17.6 KB
|
USENIX Security 2014 Opening Remarks and Awards - Kevin Fu.eng.tsv
|
20.4 KB
|
USENIX Security 2014 Opening Remarks and Awards - Kevin Fu.eng.txt
|
22.9 KB
|
USENIX Security 2014 Opening Remarks and Awards - Kevin Fu.eng.vtt
|
23.8 KB
|
When Governments Hack Opponents A Look at Actors and Technology - William R. Marczak, John Scott-Railton, Morgan Marquis-Boire, Vern Paxson.eng.json
|
953.9 KB
|
When Governments Hack Opponents A Look at Actors and Technology - William R. Marczak, John Scott-Railton, Morgan Marquis-Boire, Vern Paxson.eng.lrc
|
26.6 KB
|
When Governments Hack Opponents A Look at Actors and Technology - William R. Marczak, John Scott-Railton, Morgan Marquis-Boire, Vern Paxson.eng.srt
|
23.4 KB
|
When Governments Hack Opponents A Look at Actors and Technology - William R. Marczak, John Scott-Railton, Morgan Marquis-Boire, Vern Paxson.eng.text
|
17.3 KB
|
When Governments Hack Opponents A Look at Actors and Technology - William R. Marczak, John Scott-Railton, Morgan Marquis-Boire, Vern Paxson.eng.tsv
|
22.3 KB
|
When Governments Hack Opponents A Look at Actors and Technology - William R. Marczak, John Scott-Railton, Morgan Marquis-Boire, Vern Paxson.eng.txt
|
27.0 KB
|
When Governments Hack Opponents A Look at Actors and Technology - William R. Marczak, John Scott-Railton, Morgan Marquis-Boire, Vern Paxson.eng.vtt
|
21.7 KB
|
X-Force Force-Executing Binary Programs for Security Applications - Fei Peng, Zhui Deng, Xiangyu Zhang, Dongyan Xu, Zhiqiang Lin, Zhendong Su.eng.json
|
892.9 KB
|
X-Force Force-Executing Binary Programs for Security Applications - Fei Peng, Zhui Deng, Xiangyu Zhang, Dongyan Xu, Zhiqiang Lin, Zhendong Su.eng.lrc
|
24.2 KB
|
X-Force Force-Executing Binary Programs for Security Applications - Fei Peng, Zhui Deng, Xiangyu Zhang, Dongyan Xu, Zhiqiang Lin, Zhendong Su.eng.srt
|
24.2 KB
|
X-Force Force-Executing Binary Programs for Security Applications - Fei Peng, Zhui Deng, Xiangyu Zhang, Dongyan Xu, Zhiqiang Lin, Zhendong Su.eng.text
|
16.5 KB
|
X-Force Force-Executing Binary Programs for Security Applications - Fei Peng, Zhui Deng, Xiangyu Zhang, Dongyan Xu, Zhiqiang Lin, Zhendong Su.eng.tsv
|
20.7 KB
|
X-Force Force-Executing Binary Programs for Security Applications - Fei Peng, Zhui Deng, Xiangyu Zhang, Dongyan Xu, Zhiqiang Lin, Zhendong Su.eng.txt
|
24.5 KB
|
X-Force Force-Executing Binary Programs for Security Applications - Fei Peng, Zhui Deng, Xiangyu Zhang, Dongyan Xu, Zhiqiang Lin, Zhendong Su.eng.vtt
|
22.0 KB
|
XRay Enhancing the Web’s Transparency with Differential Correlation - Mathias Lecuyer, Guillaume Ducoffe, Francis Lan, Andrei Papancea, Theofilos Petsios, Riley Spahn, Augustin Cha.eng.json
|
1.2 MB
|
XRay Enhancing the Web’s Transparency with Differential Correlation - Mathias Lecuyer, Guillaume Ducoffe, Francis Lan, Andrei Papancea, Theofilos Petsios, Riley Spahn, Augustin Cha.eng.lrc
|
36.3 KB
|
XRay Enhancing the Web’s Transparency with Differential Correlation - Mathias Lecuyer, Guillaume Ducoffe, Francis Lan, Andrei Papancea, Theofilos Petsios, Riley Spahn, Augustin Cha.eng.srt
|
26.3 KB
|
XRay Enhancing the Web’s Transparency with Differential Correlation - Mathias Lecuyer, Guillaume Ducoffe, Francis Lan, Andrei Papancea, Theofilos Petsios, Riley Spahn, Augustin Cha.eng.text
|
19.2 KB
|
XRay Enhancing the Web’s Transparency with Differential Correlation - Mathias Lecuyer, Guillaume Ducoffe, Francis Lan, Andrei Papancea, Theofilos Petsios, Riley Spahn, Augustin Cha.eng.tsv
|
28.8 KB
|
XRay Enhancing the Web’s Transparency with Differential Correlation - Mathias Lecuyer, Guillaume Ducoffe, Francis Lan, Andrei Papancea, Theofilos Petsios, Riley Spahn, Augustin Cha.eng.txt
|
37.0 KB
|
XRay Enhancing the Web’s Transparency with Differential Correlation - Mathias Lecuyer, Guillaume Ducoffe, Francis Lan, Andrei Papancea, Theofilos Petsios, Riley Spahn, Augustin Cha.eng.vtt
|
24.2 KB
|
Z0 An Optimizing Distributing Zero-Knowledge Compiler - Matthew Fredrikson, Benjamin Livshits.eng.json
|
968.6 KB
|
Z0 An Optimizing Distributing Zero-Knowledge Compiler - Matthew Fredrikson, Benjamin Livshits.eng.lrc
|
25.0 KB
|
Z0 An Optimizing Distributing Zero-Knowledge Compiler - Matthew Fredrikson, Benjamin Livshits.eng.srt
|
25.7 KB
|
Z0 An Optimizing Distributing Zero-Knowledge Compiler - Matthew Fredrikson, Benjamin Livshits.eng.text
|
19.3 KB
|
Z0 An Optimizing Distributing Zero-Knowledge Compiler - Matthew Fredrikson, Benjamin Livshits.eng.tsv
|
22.4 KB
|
Z0 An Optimizing Distributing Zero-Knowledge Compiler - Matthew Fredrikson, Benjamin Livshits.eng.txt
|
25.2 KB
|
Z0 An Optimizing Distributing Zero-Knowledge Compiler - Matthew Fredrikson, Benjamin Livshits.eng.vtt
|
23.9 KB
|
/.../USENIX Security 2014 Presentations/
|
A Bayesian Approach to Privacy Enforcement in Smartphones - Omer Tripp, Julia Rubin.pdf
|
2.1 MB
|
A Bayesian Approach to Privacy Enforcement in Smartphones Slides - Omer Tripp, Julia Rubin.pdf
|
5.6 MB
|
A Large-Scale Analysis of the Security of Embedded Firmwares - Andrei Costin, Jonas Zaddach, Aurelien Francillon, and Davide Balzarotti.pdf
|
691.2 KB
|
A Large-Scale Analysis of the Security of Embedded Firmwares Slides - Andrei Costin, Jonas Zaddach, Aurelien Francillon, and Davide Balzarotti.pdf
|
3.1 MB
|
A Large-Scale Empirical Analysis of Chinese Web Passwords - Zhigong Li, Weili Han, Wenyuan Xu.pdf
|
481.2 KB
|
A Large-Scale Empirical Analysis of Chinese Web Passwords Slides - Zhigong Li, Weili Han, Wenyuan Xu.pdf
|
986.6 KB
|
A Look at Targeted Attacks Through the Lense of an NGO - Stevens Le Blond, Adina Uritesc, Cedric Gilbert, Zheng Leong Chua, Prateek Saxena, Engin Kirda.pdf
|
519.6 KB
|
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens - Daniel Demmler, Thomas Schneider, Michael Zohner.pdf
|
771.3 KB
|
Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens Slides - Daniel Demmler, Thomas Schneider, Michael Zohner.pdf
|
1.0 MB
|
An Internet-Wide View of Internet-Wide Scanning - Zakir Durumeric, Michael Bailey, J. Alex Halderman.pdf
|
489.7 KB
|
An Internet-Wide View of Internet-Wide Scanning Slides - Zakir Durumeric, Michael Bailey, J. Alex Halderman.pdf
|
4.4 MB
|
ASM A Programmable Interface for Extending Android Security - Stephan Heuser, Adwait Nadkarni, William Enck, Ahmad-Reza Sadeghi.pdf
|
381.6 KB
|
ASM A Programmable Interface for Extending Android Security Slides - Stephan Heuser, Adwait Nadkarni, William Enck, Ahmad-Reza Sadeghi.pdf
|
1.1 MB
|
Automatically Detecting Vulnerable Websites Before They Turn Malicious - Kyle Soska, Nicolas Christin.pdf
|
961.0 KB
|
Automatically Detecting Vulnerable Websites Before They Turn Malicious Slides - Kyle Soska, Nicolas Christin.pdf
|
4.7 MB
|
BareCloud Bare-metal Analysis-based Evasive Malware Detection - Dhilung Kirat, Giovanni Vigna, Christopher Kruegel.pdf
|
395.3 KB
|
BareCloud Bare-metal Analysis-based Evasive Malware Detection Slides - Dhilung Kirat, Giovanni Vigna, Christopher Kruegel.pdf
|
6.4 MB
|
Blanket Execution Dynamic Similarity Testing for Program Binaries and Components - Manuel Egele, Maverick Woo, Peter Chapman, David Brumley.pdf
|
509.6 KB
|
Blanket Execution Dynamic Similarity Testing for Program Binaries and Components Slides - Manuel Egele, Maverick Woo, Peter Chapman, David Brumley.pdf
|
953.2 KB
|
Brahmastra Driving Apps to Test the Security of Third-Party Components - Ravi Bhoraskar, Seungyeop Han, Jinseong Jeon, Tanzirul Azim, Shuo Chen, Jaeyeon Jung, Suman.pdf
|
1.6 MB
|
Brahmastra Driving Apps to Test the Security of Third-Party Components Slides - Ravi Bhoraskar, Seungyeop Han, Jinseong Jeon, Tanzirul Azim, Shuo Chen, Jaeyeon Jung.pdf
|
2.9 MB
|
Burst ORAM Minimizing ORAM Response Times for Bursty Access Patterns - Jonathan Dautrich, University of California, Riverside; Emil Stefanov, Elaine Shi.pdf
|
3.8 MB
|
Burst ORAM Minimizing ORAM Response Times for Bursty Access Patterns Slides - Jonathan Dautrich, University of California, Riverside; Emil Stefanov, Elaine Shi.pdf
|
861.3 KB
|
BYTEWEIGHT Learning to Recognize Functions in Binary Code - Tiffany Bao, Jonathan Burket, Maverick Woo, Rafael Turner, David Brumley.pdf
|
473.5 KB
|
BYTEWEIGHT Learning to Recognize Functions in Binary Code Slides - Tiffany Bao, Jonathan Burket, Maverick Woo, Rafael Turner, David Brumley.pdf
|
704.9 KB
|
Cardinal Pill Testing of System Virtual Machines - Hao Shi, Abdulla Alwabel, Jelena Mirkovic.pdf
|
384.9 KB
|
Cardinal Pill Testing of System Virtual Machines Slides - Hao Shi, Abdulla Alwabel, Jelena Mirkovic.pdf
|
367.4 KB
|
DSCRETE Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse - Brendan Saltaformaggio, Zhongshu Gu, Xiangyu Zhang, Dongyan.pdf
|
789.4 KB
|
DSCRETE Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse Slides - Brendan Saltaformaggio, Zhongshu Gu, Xiangyu Zhang, Dong.pdf
|
2.6 MB
|
Dynamic Hooks Hiding Control Flow Changes within Non-Control Data - Sebastian Vogl, Robert Gawlik, Behrad Garmany, Thomas Kittel, Jonas Pfoh, Claudia Eckert, Thorst.pdf
|
415.9 KB
|
Dynamic Hooks Hiding Control Flow Changes within Non-Control Data Slides - Sebastian Vogl, Robert Gawlik, Behrad Garmany, Thomas Kittel, Jonas Pfoh, Claudia Eckert.pdf
|
265.3 KB
|
Effective Attacks and Provable Defenses for Website Fingerprinting - Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, Ian Goldberg.pdf
|
307.7 KB
|
Effective Attacks and Provable Defenses for Website Fingerprinting Slides - Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, Ian Goldberg.pdf
|
9.1 MB
|
Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM - Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, Ulfar Erlingsson, Luis Lozano, Geof.pdf
|
321.1 KB
|
Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM Slides - Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, Ulfar Erlingsson, Luis Lozan.pdf
|
227.3 KB
|
Exit from Hell Reducing the Impact of Amplification DDoS Attacks - Marc Kuhrer, Thomas Hupperich, Christian Rossow, Thorsten Holz.pdf
|
2.2 MB
|
Exit from Hell Reducing the Impact of Amplification DDoS Attacks Slides - Marc Kuhrer, Thomas Hupperich, Christian Rossow, Thorsten Holz.pdf
|
1.1 MB
|
Faster Private Set Intersection Based on OT Extension - Benny Pinkas, Thomas Schneider, Michael Zohner.pdf
|
363.5 KB
|
Faster Private Set Intersection Based on OT Extension Slides - Benny Pinkas, Thomas Schneider, Michael Zohner.pdf
|
1.3 MB
|
FLUSH-RELOAD A High Resolution, Low Noise, L3 Cache Side-Channel Attack - Yuval Yarom, Katrina Falkner.pdf
|
330.1 KB
|
FLUSH-RELOAD A High Resolution, Low Noise, L3 Cache Side-Channel Attack Slides - Yuval Yarom, Katrina Falkner.pdf
|
465.4 KB
|
From the Aether to the Ethernet-Attacking the Internet using Broadcast Digital Television - Yossef Oren, Angelos D. Keromytis.pdf
|
708.0 KB
|
From the Aether to the Ethernet-Attacking the Internet using Broadcast Digital Television Slides - Yossef Oren, Angelos D. Keromytis.pdf
|
8.6 MB
|
Gyrophone Recognizing Speech from Gyroscope Signals - Yan Michalevsky, Dan Boneh, Gabi Nakibly.pdf
|
3.5 MB
|
Gyrophone Recognizing Speech from Gyroscope Signals Slides - Yan Michalevsky, Dan Boneh, Gabi Nakibly.pdf
|
5.7 MB
|
Hulk Eliciting Malicious Behavior in Browser Extensions - Alexandros Kapravelos, Chris Grier, Neha Chachra, Christopher Kruegel, Giovanni Vigna, Vern Paxson.pdf
|
2.0 MB
|
Hulk Eliciting Malicious Behavior in Browser Extensions Slides - Alexandros Kapravelos, Chris Grier, Neha Chachra, Christopher Kruegel, Giovanni Vigna, Vern Paxson.pdf
|
2.3 MB
|
Information Security War Room - Sergey Bratus, Dartmouth College, Felix FX Lindner.pdf
|
15.0 MB
|
iSeeYou Disabling the MacBook Webcam Indicator LED - Matthew Brocker, Stephen Checkoway.pdf
|
1.6 MB
|
iSeeYou Disabling the MacBook Webcam Indicator LED Slides - Matthew Brocker, Stephen Checkoway.pdf
|
21.4 MB
|
JIGSAW Protecting Resource Access by Inferring Programmer Expectations - Hayawardh Vijayakumar, Xinyang Ge, Mathias Payer, Trent Jaeger.pdf
|
497.2 KB
|
JIGSAW Protecting Resource Access by Inferring Programmer Expectations Slides - Hayawardh Vijayakumar, Xinyang Ge, Mathias Payer, Trent Jaeger.pdf
|
2.8 MB
|
LibFTE A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes - Daniel Luchaup, Kevin P. Dyer, Somesh Jha, Thomas Ristenpart, Thomas Shrimpton.pdf
|
2.1 MB
|
LibFTE A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes Slides - Daniel Luchaup, Kevin P. Dyer, Somesh Jha, Thomas Ristenpart, Thomas Shrimpt.pdf
|
4.3 MB
|
Man vs. Machine Practical Adversarial Detection of Malicious Crowdsourcing Workers - Gang Wang, Tianyi Wang, Santa Barbara, Haitao Zheng, Ben Y. Zhao.pdf
|
798.6 KB
|
Man vs. Machine Practical Adversarial Detection of Malicious Crowdsourcing Workers Slides - Gang Wang, Tianyi Wang, Santa Barbara, Haitao Zheng, Ben Y. Zhao.pdf
|
4.9 MB
|
Mimesis Aegis A Mimicry Privacy Shield-A System’s Approach to Data Privacy on Public Cloud - Billy Lau, Simon Chung, Chengyu Song, Yeongjin Jang, Wenke Lee, Alexand.pdf
|
881.1 KB
|
Mimesis Aegis A Mimicry Privacy Shield-A System’s Approach to Data Privacy on Public Cloud Slides - Billy Lau, Simon Chung, Chengyu Song, Yeongjin Jang, Wenke Lee.pdf
|
2.2 MB
|
Never Been KIST Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport - Rob Jansen, John Geddes, Chris Wacek, Micah Sherr, Paul Syverson.pdf
|
809.1 KB
|
Never Been KIST Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport Slides - Rob Jansen, John Geddes, Chris Wacek, Micah Sherr, Paul Syverson.pdf
|
4.6 MB
|
On the Effective Prevention of TLS Man-in-the-Middle Attacks in Web Applications - Nikolaos Karapanos and Srdjan Capkun.pdf
|
927.8 KB
|
On the Effective Prevention of TLS Man-in-the-Middle Attacks in Web Applications Slides - Nikolaos Karapanos and Srdjan Capkun.pdf
|
10.5 MB
|
On the Feasibility of Large-Scale Infections of iOS Devices - Tielei Wang, Yeongjin Jang, Yizheng Chen, Simon Chung, Billy Lau, Wenke Lee.pdf
|
541.8 KB
|
On the Feasibility of Large-Scale Infections of iOS Devices Slides - Tielei Wang, Yeongjin Jang, Yizheng Chen, Simon Chung, Billy Lau, Wenke Lee costin.pdf
|
3.1 MB
|
On the Feasibility of Large-Scale Infections of iOS Devices Slides - Tielei Wang, Yeongjin Jang, Yizheng Chen, Simon Chung, Billy Lau, Wenke Lee tielei.pdf
|
10.0 MB
|
On the Feasibility of Large-Scale Infections of iOS Devices Slides - Tielei Wang, Yeongjin Jang, Yizheng Chen, Simon Chung, Billy Lau, Wenke Lee.pdf
|
691.2 KB
|
On the Practical Exploitability of Dual EC in TLS Implementations - Stephen Checkoway, Matthew Fredrikson, Ruben Niederhagen, Adam Everspaugh, Matthew Green, Tanja.pdf
|
365.2 KB
|
On the Practical Exploitability of Dual EC in TLS Implementations Slides - Stephen Checkoway, Matthew Fredrikson, Ruben Niederhagen, Adam Everspaugh, Matthew Green.pdf
|
256.1 KB
|
Optimizing Seed Selection for Fuzzing - Alexandre Rebert, Sang Kil Cha, Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, David Brumley.pdf
|
377.5 KB
|
Optimizing Seed Selection for Fuzzing Slides - Alexandre Rebert, Sang Kil Cha, Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, David Brumley.pdf
|
1.1 MB
|
Oxymoron Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing - Michael Backes, Stefan Nurnberger.pdf
|
1.1 MB
|
Oxymoron Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing Slides - Michael Backes, Stefan Nurnberger.pdf
|
6.1 MB
|
Password Managers Attacks and Defenses - David Silver, Suman Jana, and Dan Boneh, Stanford University; Eric Chen, Collin Jackson.pdf
|
356.3 KB
|
Password Managers Attacks and Defenses Slides - David Silver, Suman Jana, and Dan Boneh, Stanford University; Eric Chen, Collin Jackson.pdf
|
2.3 MB
|
Password Portfolios and the Finite-Effort User Sustainably Managing Large Numbers of Accounts - Dinei Florencio, Cormac Herley, Paul C. van Oorschot.pdf
|
460.4 KB
|
Password Portfolios and the Finite-Effort User Sustainably Managing Large Numbers of Accounts Slides - Dinei Florencio, Cormac Herley, Paul C. van Oorschot.pdf
|
952.9 KB
|
Peeking into Your App without Actually Seeing It UI State Inference and Novel Android Attacks - Qi Alfred Chen, Zhiyun Qian, Z. Morley Mao.pdf
|
651.4 KB
|
Peeking into Your App without Actually Seeing It UI State Inference and Novel Android Attacks Slides - Qi Alfred Chen, Zhiyun Qian, Z. Morley Mao.pdf
|
3.7 MB
|
Precise Client-side Protection against DOM-based Cross-Site Scripting - Ben Stock, Sebastian Lekies, Tobias Mueller, Patrick Spiegel, and Martin Johns.pdf
|
314.6 KB
|
Precise Client-side Protection against DOM-based Cross-Site Scripting Slides - Ben Stock, Sebastian Lekies, Tobias Mueller, Patrick Spiegel, and Martin Johns.pdf
|
1.2 MB
|
Preventing Cryptographic Key Leakage in Cloud Virtual Machines - Erman Pattuk, Murat Kantarcioglu, Zhiqiang Lin, Huseyin Ulusoy.pdf
|
508.8 KB
|
Preventing Cryptographic Key Leakage in Cloud Virtual Machines Slides - Erman Pattuk, Murat Kantarcioglu, Zhiqiang Lin, Huseyin Ulusoy.pdf
|
936.6 KB
|
Privacy in Pharmacogenetics An End-to-End Case Study of Personalized Warfarin Dosing - Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon Lin, David Page, Thomas Ris.pdf
|
415.3 KB
|
Privacy in Pharmacogenetics An End-to-End Case Study of Personalized Warfarin Dosing Eratta - Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon Lin, David Page, Tho.pdf
|
63.0 KB
|
Privacy in Pharmacogenetics An End-to-End Case Study of Personalized Warfarin Dosing Slides - Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon Lin, David Page, Tho.pdf
|
13.0 MB
|
Privee An Architecture for Automatically Analyzing Web Privacy Policies - Sebastian Zimmeck, Steven M. Bellovin.pdf
|
769.7 KB
|
Privee An Architecture for Automatically Analyzing Web Privacy Policies Slides - Sebastian Zimmeck, Steven M. Bellovin.pdf
|
501.0 KB
|
ret2dir Rethinking Kernel Isolation - Vasileios P. Kemerlis, Michalis Polychronakis, Angelos D. Keromytis.pdf
|
447.6 KB
|
ret2dir Rethinking Kernel Isolation Slides - Vasileios P. Kemerlis, Michalis Polychronakis, Angelos D. Keromytis.pdf
|
2.8 MB
|
Revisiting SSL-TLS Implementations New Bleichenbacher Side Channels and Attacks - Christopher Meyer, Juraj Somorovsky, Eugen Weiss, Jorg Schwenk, Sebastian Schinzel.pdf
|
640.5 KB
|
Revisiting SSL-TLS Implementations New Bleichenbacher Side Channels and Attacks Slides - Christopher Meyer, Juraj Somorovsky, Eugen Weiss, Jorg Schwenk, Sebastian S.pdf
|
1.4 MB
|
ROP is Still Dangerous Breaking Modern Defenses - Nicholas Carlini, David Wagner.pdf
|
440.0 KB
|
ROP is Still Dangerous Breaking Modern Defenses Slides - Nicholas Carlini, David Wagner.pdf
|
221.8 KB
|
Scheduler-based Defenses against Cross-VM Side-channels - Venkatanathan Varadarajan, Thomas Ristenpart, Michael Swift.pdf
|
689.3 KB
|
Scheduler-based Defenses against Cross-VM Side-channels Slides - Venkatanathan Varadarajan, Thomas Ristenpart, Michael Swift.pdf
|
3.9 MB
|
SDDR Light-Weight, Secure Mobile Encounters - Matthew Lentz, Viktor Erdélyi, Paarijaat Aditya, Elaine Shi, Peter Druschel, Bobby Bhattacharjee.pdf
|
2.3 MB
|
SDDR Light-Weight, Secure Mobile Encounters Slides - Matthew Lentz, Viktor Erdélyi, Paarijaat Aditya, Elaine Shi, Peter Druschel, Bobby Bhattacharjee.pdf
|
3.1 MB
|
Security Analysis of a Full-Body Scanner - Keaton Mowery, Eric Wustrow, Tom Wypych, Corey Singleton, Chris Comfort, Eric Rescorla, Stephen Checkoway, J. Alex Halder.pdf
|
4.1 MB
|
Security Analysis of a Full-Body Scanner Slides - Keaton Mowery, Eric Wustrow, Tom Wypych, Corey Singleton, Chris Comfort, Eric Rescorla, Stephen Checkoway, J. Alex.pdf
|
8.2 MB
|
Size Does Matter Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard - Enes Goktas, Elias Athanasopoulos, Michalis Polychronakis, Herbert Bos.pdf
|
538.4 KB
|
Size Does Matter Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard Slides - Enes Goktas, Elias Athanasopoulos, Michalis Polychronakis, Herbert Bos.pdf
|
2.1 MB
|
SpanDex Secure Password Tracking for Android - Landon P. Cox , Peter Gilbert, Geoffrey Lawler, Valentin Pistol, Ali Razeen, Bi Wu, Sai Cheemalapati.pdf
|
460.0 KB
|
SpanDex Secure Password Tracking for Android Slides - Landon P. Cox , Peter Gilbert, Geoffrey Lawler, Valentin Pistol, Ali Razeen, Bi Wu, Sai Cheemalapati.pdf
|
4.4 MB
|
SSOScan Automated Testing of Web Applications for Single Sign-On Vulnerabilities - Yuchen Zhou, David Evans.pdf
|
646.8 KB
|
SSOScan Automated Testing of Web Applications for Single Sign-On Vulnerabilities Slides - Yuchen Zhou, David Evans.pdf
|
2.3 MB
|
Static Detection of Second-Order Vulnerabilities in Web Applications - Johannes Dahse, Thorsten Holz.pdf
|
371.6 KB
|
Static Detection of Second-Order Vulnerabilities in Web Applications Slides - Johannes Dahse, Thorsten Holz.pdf
|
982.8 KB
|
Stitching the Gadgets On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection - Lucas Davi, Ahmad-Reza Sadeghi, Daniel Lehmann, Fabian Monrose.pdf
|
749.1 KB
|
Stitching the Gadgets On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection Slides - Lucas Davi, Ahmad-Reza Sadeghi, Daniel Lehmann, Fabian Mon.pdf
|
2.4 MB
|
Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture - Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza.pdf
|
519.1 KB
|
Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture Slides - Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza.pdf
|
1.5 MB
|
TapDance End-to-Middle Anticensorship without Flow Blocking - Eric Wustrow, Colleen M. Swanson, J. Alex Halderman.pdf
|
585.9 KB
|
TapDance End-to-Middle Anticensorship without Flow Blocking Slides - Eric Wustrow, Colleen M. Swanson, J. Alex Halderman.pdf
|
1.7 MB
|
Targeted Threat Index Characterizing and Quantifying Politically-Motivated Targeted Malware - Seth Hardy, Masashi Crete-Nishihata, Katharine Kleemola, Adam Senft, B.pdf
|
3.9 MB
|
Telepathwords Preventing Weak Passwords by Reading Users’ Minds - Saranga Komanduri, Richard Shay, Lorrie Faith Cranor, Cormac Herley Stuart Schechter.pdf
|
811.5 KB
|
Telepathwords Preventing Weak Passwords by Reading Users’ Minds Slides - Saranga Komanduri, Richard Shay, Lorrie Faith Cranor, Cormac Herley Stuart Schechter.pdf
|
2.9 MB
|
The Emperor’s New Password Manager Security Analysis of Web-based Password Managers - Zhiwei Li, Warren He, Devdatta Akhawe, Dawn Song.pdf
|
624.5 KB
|
The Emperor’s New Password Manager Security Analysis of Web-based Password Managers Slides - Zhiwei Li, Warren He, Devdatta Akhawe, Dawn Song.pdf
|
5.7 MB
|
The Long Taile of Typosquatting Domain Names - Janos Szurdi, Balazs Kocso, Gabor Cseh, Jonathan Spring, Mark Felegyhazi, Chris Kanich.pdf
|
2.0 MB
|
The Long Taile of Typosquatting Domain Names Slides - Janos Szurdi, Balazs Kocso, Gabor Cseh, Jonathan Spring, Mark Felegyhazi, Chris Kanich.pdf
|
2.1 MB
|
Towards Detecting Anomalous User Behavior in Online Social Networks - Bimal Viswanath, M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna P. Gummadi, Max Planck, .pdf
|
500.6 KB
|
Towards Detecting Anomalous User Behavior in Online Social Networks Slides - Bimal Viswanath, M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna P. Gummadi, Max P.pdf
|
3.0 MB
|
Towards Reliable Storage of 56-bit Secrets in Human Memory - Joseph Bonneau, Princeton University; Stuart Schechter.pdf
|
427.4 KB
|
Towards Reliable Storage of 56-bit Secrets in Human Memory Slides - Joseph Bonneau, Princeton University; Stuart Schechter.pdf
|
2.3 MB
|
TRUESET Faster Verifiable Set Computations - Ahmed E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Mahmoud F. Sayed, Elaine Shi, Nikos Triandopoulos.pdf
|
2.5 MB
|
TRUESET Faster Verifiable Set Computations Slides - Ahmed E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Mahmoud F. Sayed, Elaine Shi, Nikos Triandopoul.pdf
|
1.2 MB
|
Understanding the Dark Side of Domain Parking - Sumayah Alrwais, Kan Yuan, Eihal Alowaisheq, Zhou Li, XiaoFeng Wang.pdf
|
1.5 MB
|
When Governments Hack Opponents A Look at Actors and Technology - William R. Marczak, John Scott-Railton, Morgan Marquis-Boire, Vern Paxson.pdf
|
5.5 MB
|
X-Force Force-Executing Binary Programs for Security Applications - Fei Peng, Zhui Deng, Xiangyu Zhang, and Dongyan Xu, Purdue University; Zhiqiang Lin, The Univers.pdf
|
1.0 MB
|
X-Force Force-Executing Binary Programs for Security Applications Slides - Fei Peng, Zhui Deng, Xiangyu Zhang, and Dongyan Xu, Purdue University; Zhiqiang Lin, The.pdf
|
516.4 KB
|
XRay Enhancing the Web’s Transparency with Differential Correlation - Mathias Lecuyer, Guillaume Ducoffe, Francis Lan, Andrei Papancea, Theofilos Petsios, Riley Spa.pdf
|
467.8 KB
|
XRay Enhancing the Web’s Transparency with Differential Correlation Slides - Mathias Lecuyer, Guillaume Ducoffe, Francis Lan, Andrei Papancea, Theofilos Petsios, Ri.pdf
|
1.0 MB
|
Z0 An Optimizing Distributing Zero-Knowledge Compiler - Matthew Fredrikson, Benjamin Livshits.pdf
|
599.6 KB
|
/.../USENIX Security 2014 Technical Sessions_files/
|
acmqueue_150x48_3.png
|
4.5 KB
|
acmqueue_150x48_3_002.png
|
3.1 KB
|
admin_150x60.png
|
4.2 KB
|
admin_150x60_002.png
|
7.0 KB
|
all.js
|
3.2 KB
|
analytics.js
|
45.2 KB
|
application-octet-stream.png
|
0.2 KB
|
application-pdf.png
|
0.3 KB
|
audio_16.png
|
0.5 KB
|
cbgapi.loaded_0
|
144.0 KB
|
cbgapi.loaded_1
|
97.1 KB
|
crc_press_150x60.png
|
3.9 KB
|
crc_press_150x60_002.png
|
13.7 KB
|
cryptography_research_150x46.png
|
5.8 KB
|
cryptography_research_150x46_002.png
|
7.8 KB
|
css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css
|
5.6 KB
|
css_JfUmRW-Hr0U8TZVXkaC2BcGIYyK5guphAqwPzo1s5JM.css
|
11.9 KB
|
css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css
|
1.5 KB
|
css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css
|
0.1 KB
|
css_XQfCg5kiuU6ACblHn3rDXdgaKZR8AxbhrQR4Gznu5qA.css
|
257.3 KB
|
dmtf_600x240.png
|
2.5 KB
|
dmtf_600x240_002.png
|
4.1 KB
|
facebook_150x50_0.png
|
6.7 KB
|
facebook_150x50_0_002.png
|
8.9 KB
|
fastbutton.htm
|
1.8 KB
|
fastbutton_002.htm
|
1.7 KB
|
google_logo_300x110.png
|
12.5 KB
|
google_logo_300x110_002.png
|
5.6 KB
|
hpcwire_150x55_0.png
|
3.8 KB
|
hpcwire_150x55_0_002.png
|
10.1 KB
|
ibm_research_150x60.png
|
4.1 KB
|
ibm_research_150x60_002.png
|
6.0 KB
|
ie.htm
|
30.2 KB
|
infosecnews_150x38.png
|
3.1 KB
|
infosecnews_150x38_002.png
|
4.9 KB
|
js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js
|
20.5 KB
|
js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js
|
1.4 KB
|
js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js
|
120.3 KB
|
js_ILONILlX06kZtY3IVUMaeuMs_GJ1hSJY46daikoF9fA.js
|
99.4 KB
|
js_sWOO4PbSe161nCKWEJProMMhdbu_pfXMDzdRrMGBIE0.js
|
47.6 KB
|
js_yui9lDPs2dTDFfQPtmwCCL63T1k2MGsGrsTM-7Eo2Ts.js
|
32.8 KB
|
lapsley-phil_100x115.jpg
|
6.3 KB
|
linux_pro_150x60.png
|
2.9 KB
|
linux_pro_150x60_002.png
|
5.0 KB
|
lxer_150x60.png
|
6.6 KB
|
lxer_150x60_002.png
|
3.7 KB
|
microsoft_research_150x42_2.png
|
3.2 KB
|
microsoft_research_150x42_2_002.png
|
2.8 KB
|
nostarch_600x240_1.png
|
3.9 KB
|
nostarch_600x240_1_002.png
|
1.6 KB
|
nsf_150x60_v2.png
|
4.8 KB
|
nsf_150x60_v2_002.png
|
7.3 KB
|
oreilly_150x60.png
|
2.5 KB
|
oreilly_150x60_002.png
|
3.6 KB
|
package-x-generic.png
|
0.3 KB
|
pdf_16.png
|
0.3 KB
|
plusone.js
|
49.0 KB
|
postmessageRelay.htm
|
0.7 KB
|
qualcomm_150x22.png
|
1.9 KB
|
qualcomm_150x22_002.png
|
2.9 KB
|
slides_16.png
|
1.3 KB
|
usenix-locked.png
|
1.4 KB
|
userfriendly_150x60.png
|
3.0 KB
|
userfriendly_150x60_002.png
|
8.4 KB
|
video_16.png
|
1.4 KB
|
virus_bulletin_150x60.png
|
5.2 KB
|
virus_bulletin_150x60_002.png
|
3.0 KB
|
widgets.js
|
98.5 KB
|
/.../USENIX Security 2014 Technical Sessions_files/postmessageRelay_data/
|
829555168-postmessagerelay.js
|
10.0 KB
|
cbgapi.loaded_0
|
54.9 KB
|
rpcshindig_random.js
|
13.0 KB
|
/.../USENIX Security 2014 USENIX_files/
|
acmqueue_150x48_3.png
|
4.5 KB
|
acmqueue_150x48_3_002.png
|
3.1 KB
|
admin_150x60.png
|
4.2 KB
|
admin_150x60_002.png
|
7.0 KB
|
all.js
|
3.2 KB
|
analytics.js
|
45.2 KB
|
cbgapi.loaded_0
|
144.0 KB
|
cbgapi.loaded_1
|
97.1 KB
|
crc_press_150x60.png
|
3.9 KB
|
crc_press_150x60_002.png
|
13.7 KB
|
cryptography_research_150x46.png
|
7.8 KB
|
cryptography_research_150x46_002.png
|
5.8 KB
|
css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css
|
5.6 KB
|
css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css
|
1.5 KB
|
css_SKdvFJ9YoZ2Zlnl17QxUbae5QC-NQDrH8ynBbHJFAaM.css
|
9.2 KB
|
css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css
|
0.1 KB
|
css_XQfCg5kiuU6ACblHn3rDXdgaKZR8AxbhrQR4Gznu5qA.css
|
257.3 KB
|
dmtf_600x240.png
|
2.5 KB
|
dmtf_600x240_002.png
|
4.1 KB
|
facebook_150x50_0.png
|
6.7 KB
|
facebook_150x50_0_002.png
|
8.9 KB
|
fastbutton.htm
|
1.8 KB
|
fastbutton_002.htm
|
1.7 KB
|
google_logo_300x110.png
|
12.5 KB
|
google_logo_300x110_002.png
|
5.6 KB
|
hpcwire_150x55_0.png
|
3.8 KB
|
hpcwire_150x55_0_002.png
|
10.1 KB
|
ibm_research_150x60.png
|
4.1 KB
|
ibm_research_150x60_002.png
|
6.0 KB
|
ie.htm
|
30.2 KB
|
infosecnews_150x38.png
|
3.1 KB
|
infosecnews_150x38_002.png
|
4.9 KB
|
js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js
|
20.5 KB
|
js_5eZSC3tfzCwTta-_4qxrBau4YdctcIhVqovRK7sPRFo.js
|
107.7 KB
|
js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js
|
1.4 KB
|
js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js
|
120.3 KB
|
js_nPhKWi17GlWfUPto14Dqfk5lpAFMD2XUrRDYY3jnD2c.js
|
23.0 KB
|
js_sWOO4PbSe161nCKWEJProMMhdbu_pfXMDzdRrMGBIE0.js
|
47.6 KB
|
linux_pro_150x60.png
|
2.9 KB
|
linux_pro_150x60_002.png
|
5.0 KB
|
lxer_150x60.png
|
6.6 KB
|
lxer_150x60_002.png
|
3.7 KB
|
microsoft_research_150x42_2.png
|
3.2 KB
|
microsoft_research_150x42_2_002.png
|
2.8 KB
|
nostarch_600x240_1.png
|
3.9 KB
|
nostarch_600x240_1_002.png
|
1.6 KB
|
nsf_150x60_v2.png
|
7.3 KB
|
nsf_150x60_v2_002.png
|
4.8 KB
|
oreilly_150x60.png
|
2.5 KB
|
oreilly_150x60_002.png
|
3.6 KB
|
plusone.js
|
49.0 KB
|
postmessageRelay.htm
|
0.7 KB
|
qualcomm_150x22.png
|
2.9 KB
|
qualcomm_150x22_002.png
|
1.9 KB
|
sec14_media.png
|
30.6 KB
|
userfriendly_150x60.png
|
8.4 KB
|
userfriendly_150x60_002.png
|
3.0 KB
|
virus_bulletin_150x60.png
|
5.2 KB
|
virus_bulletin_150x60_002.png
|
3.0 KB
|
widgets.js
|
98.5 KB
|
/.../USENIX Security 2014 USENIX_files/postmessageRelay_data/
|
829555168-postmessagerelay.js
|
10.0 KB
|
cbgapi.loaded_0
|
54.9 KB
|
rpcshindig_random.js
|
13.0 KB
|
/USENIX Security 2015/
|
All Your Biases Belong to Us - Breaking RC4 in WPA-TKIP and TLS.mp4
|
77.3 MB
|
Cloudy with a Chance of Breach - Forecasting Cyber Security Incidents.mp4
|
38.3 MB
|
Conducting Usable Security Studies - It s Complicated.mp4
|
281.2 MB
|
Inherent Cyber Insecurity and Our National Security - Surviving on a Diet of Poisoned Fruit.mp4
|
315.7 MB
|
Investigating the Computer Security Practices and Needs of Journalists.mp4
|
57.3 MB
|
Post-Mortem of a Zombie - Conficker Cleanup After Six Years.mp4
|
56.1 MB
|
Preventing Security Bugs through Software Design.mp4
|
190.7 MB
|
RAPTOR - Routing Attacks on Privacy in Tor.mp4
|
32.2 MB
|
Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors.mp4
|
83.5 MB
|
Sound-Proof - Usable Two-Factor Authentication Based on Ambient Sound.mp4
|
38.0 MB
|
Technical Sessions 2015 USENIX.htm
|
544.5 KB
|
The Unexpected Dangers of Dynamic JavaScript.mp4
|
32.5 MB
|
Towards Discovering and Understanding Task Hijacking in Android.mp4
|
83.4 MB
|
Trustworthy Whole-System Provenance for the Linux Kernel.mp4
|
89.6 MB
|
Type Casting Verification - Stopping an Emerging Attack Vector.mp4
|
46.1 MB
|
USENIX Security 2015 Full Proceedings erratum.pdf
|
30.1 KB
|
USENIX Security 2015 Full Proceedings Interior.pdf
|
35.5 MB
|
USENIX Security 2015 Full Proceedings Supplement.pdf
|
481.6 KB
|
USENIX Security 2015 Full Proceedings.epub
|
55.5 MB
|
USENIX Security 2015 Full Proceedings.mobi
|
74.7 MB
|
USENIX Security 2015 Full Proceedings.pdf
|
35.8 MB
|
USENIX Security 2015 USENIX.htm
|
100.6 KB
|
Why Johnny and Janie Can’t Code Safely - Bringing Software Assurance to the Masses.mp4
|
301.5 MB
|
/.../Technical Sessions 2015 USENIX_files/
|
acmqueue_150x48_3.png
|
3.1 KB
|
acmqueue_150x48_3_002.png
|
4.5 KB
|
admin_150x60.png
|
4.2 KB
|
admin_150x60_002.png
|
7.0 KB
|
all.js
|
3.2 KB
|
analytics.js
|
45.2 KB
|
application-octet-stream.png
|
0.2 KB
|
application-pdf.png
|
0.3 KB
|
audio_16.png
|
0.5 KB
|
cbgapi.loaded_0
|
144.0 KB
|
cbgapi.loaded_1
|
97.1 KB
|
conference-schedule-pdf.png
|
0.3 KB
|
craigslist_150x35_1.png
|
3.3 KB
|
craigslist_150x35_1_002.png
|
2.1 KB
|
crc_press_150x60.png
|
3.9 KB
|
crc_press_150x60_002.png
|
13.7 KB
|
css_0tsfTZCLp9yBXG5eWU1vu1kZaV3OzOpnDDjEGiL42Cs.css
|
17.4 KB
|
css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css
|
5.6 KB
|
css_IBrrqJUtXAVsLrrlZ8VqVTS3di7E2-x10BVJwZwbroU.css
|
260.3 KB
|
css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css
|
1.5 KB
|
css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css
|
0.1 KB
|
danzig_richard_115x125.jpg
|
9.9 KB
|
dmtf_600x240.png
|
2.5 KB
|
dmtf_600x240_002.png
|
4.1 KB
|
eff_horizontal_150x66_1.png
|
7.0 KB
|
eff_horizontal_150x66_1_002.png
|
4.2 KB
|
facebook_150x50_3.png
|
8.9 KB
|
facebook_150x50_3_002.png
|
6.7 KB
|
facebook-icon.jpeg
|
1.7 KB
|
fastbutton.htm
|
1.8 KB
|
fastbutton_002.htm
|
1.7 KB
|
google_6.png
|
3.2 KB
|
google_6_002.png
|
7.8 KB
|
googleplus-icon.jpg
|
1.7 KB
|
hpcwire_150x55_0.png
|
3.8 KB
|
hpcwire_150x55_0_002.png
|
10.1 KB
|
ie.htm
|
30.2 KB
|
ieee_cybersecurity_150x73.png
|
12.5 KB
|
ieee_cybersecurity_150x73_002.png
|
10.2 KB
|
infosecnews_150x38.png
|
3.1 KB
|
infosecnews_150x38_002.png
|
4.9 KB
|
in-icon.jpeg
|
1.9 KB
|
js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js
|
20.5 KB
|
js_2sjNGyfj3O57w8bimxly5mzgG70GrcIxxxYOEInwu1Q.js
|
57.0 KB
|
js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js
|
1.4 KB
|
js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js
|
120.3 KB
|
js_ILONILlX06kZtY3IVUMaeuMs_GJ1hSJY46daikoF9fA.js
|
99.4 KB
|
js_yui9lDPs2dTDFfQPtmwCCL63T1k2MGsGrsTM-7Eo2Ts.js
|
32.8 KB
|
linux_journal_150x72_2.png
|
6.6 KB
|
linux_journal_150x72_2_002.png
|
10.3 KB
|
linux_pro_150x60.png
|
2.9 KB
|
linux_pro_150x60_002.png
|
5.0 KB
|
microsoft_150x60_0.png
|
4.5 KB
|
microsoft_150x60_0_002.png
|
3.8 KB
|
nostarch_600x240_1.png
|
3.9 KB
|
nostarch_600x240_1_002.png
|
1.6 KB
|
nsf_150x60_v2.png
|
4.8 KB
|
nsf_150x60_v2_002.png
|
7.3 KB
|
oxford_university_press_150x55.png
|
7.8 KB
|
oxford_university_press_150x55_002.png
|
6.9 KB
|
package-x-generic.png
|
0.3 KB
|
pdf_16.png
|
0.3 KB
|
peerj_600x240.png
|
1.0 KB
|
plusone.js
|
49.0 KB
|
postmessageRelay.htm
|
0.7 KB
|
qualcomm_150x22.png
|
1.9 KB
|
qualcomm_150x22_002.png
|
2.9 KB
|
sec16_button_180.png
|
39.2 KB
|
slides_16.png
|
1.3 KB
|
symantec_logo_1.png
|
11.5 KB
|
symantec_logo_1_002.png
|
5.1 KB
|
twitter-icon.jpeg
|
1.7 KB
|
usenix-locked.png
|
1.4 KB
|
userfriendly_150x60.png
|
3.0 KB
|
userfriendly_150x60_002.png
|
8.4 KB
|
video_16.png
|
1.4 KB
|
virus_bulletin_150x60.png
|
5.2 KB
|
virus_bulletin_150x60_002.png
|
3.0 KB
|
widgets.js
|
98.5 KB
|
youtube-icon.jpg
|
1.7 KB
|
/.../Technical Sessions 2015 USENIX_files/postmessageRelay_data/
|
829555168-postmessagerelay.js
|
10.0 KB
|
cbgapi.loaded_0
|
54.9 KB
|
rpcshindig_random.js
|
13.0 KB
|
/.../USENIX Security 2015 captions/
|
All Your Biases Belong to Us - Breaking RC4 in WPA-TKIP and TLS.eng.srt
|
34.8 KB
|
Cloudy with a Chance of Breach - Forecasting Cyber Security Incidents.eng.srt
|
33.8 KB
|
Conducting Usable Security Studies - It s Complicated.eng.srt
|
128.4 KB
|
Inherent Cyber Insecurity and Our National Security - Surviving on a Diet of Poisoned Fruit.eng.srt
|
119.3 KB
|
Investigating the Computer Security Practices and Needs of Journalists.eng.srt
|
42.7 KB
|
Post-Mortem of a Zombie - Conficker Cleanup After Six Years.eng.srt
|
28.0 KB
|
Preventing Security Bugs through Software Design.eng.srt
|
110.0 KB
|
RAPTOR - Routing Attacks on Privacy in Tor.eng.srt
|
24.8 KB
|
Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors.eng.srt
|
19.6 KB
|
Sound-Proof - Usable Two-Factor Authentication Based on Ambient Sound.eng.srt
|
34.2 KB
|
The Unexpected Dangers of Dynamic JavaScript.eng.srt
|
40.3 KB
|
Towards Discovering and Understanding Task Hijacking in Android.eng.srt
|
26.8 KB
|
Trustworthy Whole-System Provenance for the Linux Kernel.eng.srt
|
40.5 KB
|
Type Casting Verification - Stopping an Emerging Attack Vector.eng.srt
|
33.3 KB
|
Why Johnny and Janie Can’t Code Safely - Bringing Software Assurance to the Masses.eng.srt
|
110.0 KB
|
/.../USENIX Security 2015 Presentations/
|
sec15_contents-update.pdf
|
79.1 KB
|
sec15_erratum.pdf
|
30.1 KB
|
sec15_full_proceedings.pdf
|
35.7 MB
|
sec15_full_proceedings_interior.pdf
|
35.5 MB
|
sec15_message.pdf
|
43.9 KB
|
sec15_proceedings_cover.pdf
|
553.0 KB
|
sec15_supplement.pdf
|
481.6 KB
|
sec15_title_organizers.pdf
|
48.0 KB
|
/.../USENIX Security 2015 USENIX_files/
|
acmqueue_150x48_3.png
|
3.1 KB
|
acmqueue_150x48_3_002.png
|
4.5 KB
|
admin_150x60.png
|
4.2 KB
|
admin_150x60_002.png
|
7.0 KB
|
all.js
|
3.2 KB
|
analytics.js
|
45.2 KB
|
cbgapi.loaded_0
|
144.0 KB
|
cbgapi.loaded_1
|
97.1 KB
|
craigslist_150x35_1.png
|
3.3 KB
|
craigslist_150x35_1_002.png
|
2.1 KB
|
crc_press_150x60.png
|
3.9 KB
|
crc_press_150x60_002.png
|
13.7 KB
|
css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css
|
5.6 KB
|
css_IBrrqJUtXAVsLrrlZ8VqVTS3di7E2-x10BVJwZwbroU.css
|
260.3 KB
|
css_m9t3SZ2dKv6HQuOuf0zINIRA5GjP4lkCCtmRRbSjaXs.css
|
14.7 KB
|
css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css
|
1.5 KB
|
css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css
|
0.1 KB
|
dmtf_600x240.png
|
2.5 KB
|
dmtf_600x240_002.png
|
4.1 KB
|
eff_horizontal_150x66_1.png
|
7.0 KB
|
eff_horizontal_150x66_1_002.png
|
4.2 KB
|
facebook_150x50_3.png
|
8.9 KB
|
facebook_150x50_3_002.png
|
6.7 KB
|
facebook-icon.jpeg
|
1.7 KB
|
fastbutton.htm
|
1.8 KB
|
fastbutton_002.htm
|
1.7 KB
|
google_6.png
|
3.2 KB
|
google_6_002.png
|
7.8 KB
|
googleplus-icon.jpg
|
1.7 KB
|
hpcwire_150x55_0.png
|
3.8 KB
|
hpcwire_150x55_0_002.png
|
10.1 KB
|
ie.css
|
0.5 KB
|
ieee_cybersecurity_150x73.png
|
12.5 KB
|
ieee_cybersecurity_150x73_002.png
|
10.2 KB
|
infosecnews_150x38.png
|
3.1 KB
|
infosecnews_150x38_002.png
|
4.9 KB
|
in-icon.jpeg
|
1.9 KB
|
js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js
|
20.5 KB
|
js_2sjNGyfj3O57w8bimxly5mzgG70GrcIxxxYOEInwu1Q.js
|
57.0 KB
|
js_5eZSC3tfzCwTta-_4qxrBau4YdctcIhVqovRK7sPRFo.js
|
107.7 KB
|
js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js
|
1.4 KB
|
js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js
|
120.3 KB
|
js_nPhKWi17GlWfUPto14Dqfk5lpAFMD2XUrRDYY3jnD2c.js
|
23.0 KB
|
linux_journal_150x72_2.png
|
6.6 KB
|
linux_journal_150x72_2_002.png
|
10.3 KB
|
linux_pro_150x60.png
|
2.9 KB
|
linux_pro_150x60_002.png
|
5.0 KB
|
microsoft_150x60_0.png
|
4.5 KB
|
microsoft_150x60_0_002.png
|
3.8 KB
|
nostarch_600x240_1.png
|
3.9 KB
|
nostarch_600x240_1_002.png
|
1.6 KB
|
nsf_150x60_v2.png
|
4.8 KB
|
nsf_150x60_v2_002.png
|
7.3 KB
|
oxford_university_press_150x55.png
|
7.8 KB
|
oxford_university_press_150x55_002.png
|
6.9 KB
|
peerj_600x240.png
|
1.0 KB
|
plusone.js
|
49.0 KB
|
postmessageRelay.htm
|
0.7 KB
|
qualcomm_150x22.png
|
1.9 KB
|
qualcomm_150x22_002.png
|
2.9 KB
|
sec15_media.htm
|
0.1 KB
|
sec16_button_180.png
|
39.2 KB
|
symantec_logo_1.png
|
11.5 KB
|
symantec_logo_1_002.png
|
5.1 KB
|
twitter-icon.jpeg
|
1.7 KB
|
userfriendly_150x60.png
|
3.0 KB
|
userfriendly_150x60_002.png
|
8.4 KB
|
virus_bulletin_150x60.png
|
5.2 KB
|
virus_bulletin_150x60_002.png
|
3.0 KB
|
widgets.js
|
98.5 KB
|
youtube-icon.jpg
|
1.7 KB
|
/.../USENIX Security 2015 USENIX_files/postmessageRelay_data/
|
829555168-postmessagerelay.js
|
10.0 KB
|
cbgapi.loaded_0
|
54.9 KB
|
rpcshindig_random.js
|
13.0 KB
|
/USENIX Security 2016/
|
2016 Test of Time Award Panel.mp4
|
33.7 MB
|
A Comprehensive Measurement Study of Domain Generating Malware.mp4
|
13.9 MB
|
All Your Queries Are Belong to Us The Power of File-Injection Attacks.mp4
|
9.3 MB
|
AMD x86 Memory Encryption Technologies.mp4
|
24.4 MB
|
An Empirical Study of Textual Key-Fingerprint Representations.mp4
|
11.7 MB
|
An In-Depth Analysis of Disassembly on Full-Scale x86 x64 Binaries.mp4
|
10.8 MB
|
APISan Sanitizing API Usages through Semantic Cross-Checking.mp4
|
11.7 MB
|
Ariadne A Minimal Approach to State Continuity.mp4
|
11.4 MB
|
ARMageddon Cache Attacks on Mobile Devices.mp4
|
11.5 MB
|
Authenticated Network Time Synchronization.mp4
|
11.9 MB
|
AuthLoop End-to-End Cryptographic Authentication for Telephony.mp4
|
14.4 MB
|
Automatically Detecting Error Handling Bugs Using Error Specifications.mp4
|
11.3 MB
|
Crashing Drones and Hijacked Cameras CyberTrust Meets CyberPhysical.mp4
|
37.2 MB
|
Dancing on the Lip of the Volcano Chosen Ciphertext Attacks on Apple iMessage.mp4
|
12.1 MB
|
Defending against Malicious Peripherals with Cinch.mp4
|
10.0 MB
|
DRAMA Exploiting DRAM Addressing for Cross-CPU Attacks.mp4
|
10.7 MB
|
DROWN Breaking TLS Using SSLv2.mp4
|
9.9 MB
|
Egalitarian Computing.mp4
|
12.2 MB
|
Enhancing Bitcoin Security and Performance with Strong Consistency via.mp4
|
11.0 MB
|
Fast, Lean, and Accurate Modeling Password Guessability Using Neural Networks.mp4
|
10.8 MB
|
Faster Malicious 2-Party Secure Computation with Online Offline Dual Execution.mp4
|
10.9 MB
|
Finding and Fixing Security Bugs in Flash.mp4
|
24.5 MB
|
Fingerprinting Electronic Control Units for Vehicle Intrusion Detection.mp4
|
11.6 MB
|
Flip Feng Shui Hammering a Needle in the Software Stack.mp4
|
12.2 MB
|
FlowFence Practical Data Protection for Emerging IoT Application Frameworks.mp4
|
12.1 MB
|
fTPM A Software-Only Implementation of a TPM Chip.mp4
|
44.8 MB
|
Harvesting Inconsistent Security Configurations in Custom Android ROMs.mp4
|
10.5 MB
|
Hey, You Have a Problem On the Feasibility of Large-Scale Web Vulnerability.mp4
|
14.2 MB
|
Hidden Voice Commands.mp4
|
12.9 MB
|
Identifying and Characterizing Sybils in the Tor Network.mp4
|
13.8 MB
|
Internet Jones and the Raiders of the Lost Trackers.mp4
|
12.6 MB
|
Investigating Commercial Pay-Per-Install and the Distribution of Unwanted.mp4
|
12.4 MB
|
k-fingerprinting A Robust Scalable Website Fingerprinting Technique.mp4
|
11.9 MB
|
Lock It and Still Lose It -on the (In)Security of Automotive Remote Keyless.mp4
|
12.8 MB
|
Making HTTPS the Default in the World's Largest Bureaucracy.mp4
|
35.0 MB
|
Making USB Great Again with USBFILTER.mp4
|
15.1 MB
|
Measuring PUP Prevalence and PUP Distribution through Pay-Per-Install Services.mp4
|
12.6 MB
|
Micro-Virtualization Memory Tracing to Detect and Prevent Spraying Attacks.mp4
|
12.6 MB
|
Mirror Enabling Proofs of Data Replication and Retrievability in the Cloud.mp4
|
16.5 MB
|
Oblivious Multi-Party Machine Learning on Trusted Processors.mp4
|
13.1 MB
|
OblivP2P An Oblivious Peer-to-Peer Content Sharing System.mp4
|
10.3 MB
|
Off-Path TCP Exploits Global Rate Limit Considered Dangerous.mp4
|
13.3 MB
|
On Demystifying the Android Application Framework Re-Visiting Android.mp4
|
11.9 MB
|
On Omitting Commits and Committing Omissions Preventing Git Metadata.mp4
|
11.5 MB
|
One Bit Flips, One Cloud Flops Cross-VM Row Hammer Attacks.mp4
|
11.6 MB
|
Optimized Invariant Representation of Network Traffic for Detecting Unseen.mp4
|
11.7 MB
|
PIkit A New Kernel-Independent Processor-Interconnect Rootkit.mp4
|
11.2 MB
|
Poking Holes in Information Hiding.mp4
|
12.1 MB
|
Post-quantum Key Exchange-A New Hope.mp4
|
18.8 MB
|
Practical DIFC Enforcement on Android.mp4
|
15.0 MB
|
Predicting, Decrypting, and Abusing WPA2 802.11 Group Keys.mp4
|
11.3 MB
|
Privacy and Threat in Practice Mobile Messaging by Low-Income New Yorkers.mp4
|
30.1 MB
|
Privacy in Epigenetics Temporal Linkability of MicroRNA Expression Profiles.mp4
|
14.0 MB
|
Protecting Privacy of BLE Device Users.mp4
|
10.6 MB
|
Report from the Field A CDN's Role in Repelling Attacks against Banking.mp4
|
21.6 MB
|
Request and Conquer Exposing Cross-Origin Resource Size.mp4
|
11.9 MB
|
Sanctum Minimal Hardware Extensions for Strong Software Isolation.mp4
|
12.2 MB
|
Screen after Previous Screens Spatial-Temporal Recreation of Android App.mp4
|
16.5 MB
|
Secure, Precise, and Fast Floating-Point Operations on x86 Processors.mp4
|
13.4 MB
|
Security Competitions.mp4
|
55.6 MB
|
Specification Mining for Intrusion Detection in Networked Control Systems.mp4
|
52.8 MB
|
Stealing Machine Learning Models via Prediction APIs.mp4
|
14.7 MB
|
Teaching Computer Security Thoughts from the Field.mp4
|
42.7 MB
|
Technical Sessions 2016 USENIX.htm
|
578.7 KB
|
The Cut-and-Choose Game and Its Application to Cryptographic Protocols.mp4
|
10.2 MB
|
The Ever-Changing Labyrinth A Large-Scale Analysis of Wildcard DNS Powered.mp4
|
14.2 MB
|
The Million-Key Question-Investigating the Origins of RSA Public Keys.mp4
|
13.7 MB
|
The Moral Character of Cryptographic Work.mp4
|
40.7 MB
|
The Unfalsifiability of Security Claims.mp4
|
39.4 MB
|
Thoth Comprehensive Policy Compliance in Data Retrieval Systems.mp4
|
13.6 MB
|
Towards Measuring and Mitigating Social Engineering Software Download Attacks.mp4
|
12.8 MB
|
Tracing Information Flows Between Ad Exchanges Using Retargeted Ads.mp4
|
10.8 MB
|
Trusted Browsers for Uncertain Times.mp4
|
10.7 MB
|
überSpark Enforcing Verifiable Object Abstractions for Automated.mp4
|
13.8 MB
|
Undermining Information Hiding (and What to Do about It).mp4
|
9.4 MB
|
UNVEIL A Large-Scale, Automated Approach to Detecting Ransomware.mp4
|
15.9 MB
|
USENIX Security 2016 Full Proceedings errata.pdf
|
95.9 KB
|
USENIX Security 2016 Full Proceedings errata2.pdf
|
104.6 KB
|
USENIX Security 2016 Full Proceedings Interior.pdf
|
45.0 MB
|
USENIX Security 2016 Full Proceedings.epub
|
68.1 MB
|
USENIX Security 2016 Full Proceedings.mobi
|
45.7 MB
|
USENIX Security 2016 Full Proceedings.pdf
|
46.1 MB
|
USENIX Security 2016 USENIX.htm
|
99.5 KB
|
Verifying Constant-Time Implementations.mp4
|
14.6 MB
|
Virtual U Defeating Face Liveness Detection by Building Virtual Models.mp4
|
12.1 MB
|
Website-Targeted False Content Injection by Network Operators.mp4
|
10.1 MB
|
What Cannot Be Read, Cannot Be Leveraged Revisiting Assumptions of JIT-ROP.mp4
|
11.0 MB
|
When Governments Attack Malware Targeting Activists, Lawyers, and Journalists.mp4
|
44.0 MB
|
You Are Who You Know and How You Behave Attribute Inference Attacks.mp4
|
11.2 MB
|
You've Got Vulnerability Exploring Effective Vulnerability Notifications.mp4
|
11.4 MB
|
ZKBoo Faster Zero-Knowledge for Boolean Circuits.mp4
|
10.6 MB
|
zxcvbn Low-Budget Password Strength Estimation.mp4
|
14.5 MB
|
/.../Technical Sessions 2016 USENIX_files/
|
acmqueue_600x240_1.png
|
7.0 KB
|
acmqueue_600x240_1_002.png
|
2.5 KB
|
admin_150x60.png
|
4.2 KB
|
admin_150x60_002.png
|
7.0 KB
|
all.js
|
3.2 KB
|
analytics.js
|
45.2 KB
|
application-octet-stream.png
|
0.2 KB
|
application-pdf.png
|
0.3 KB
|
audio_16.png
|
0.5 KB
|
bit_150x60.png
|
7.4 KB
|
bit_150x60_002.png
|
2.8 KB
|
cbgapi.loaded_0
|
144.0 KB
|
cbgapi.loaded_1
|
97.1 KB
|
cisco_150x60.png
|
2.1 KB
|
cisco_150x60_002.png
|
2.7 KB
|
conference-schedule-pdf.png
|
0.3 KB
|
crc_press_150x60.png
|
3.9 KB
|
crc_press_150x60_002.png
|
13.7 KB
|
css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css
|
5.6 KB
|
css_IBrrqJUtXAVsLrrlZ8VqVTS3di7E2-x10BVJwZwbroU.css
|
260.3 KB
|
css_m9t3SZ2dKv6HQuOuf0zINIRA5GjP4lkCCtmRRbSjaXs.css
|
14.7 KB
|
css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css
|
1.5 KB
|
css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css
|
0.1 KB
|
dmtf_600x240.png
|
4.1 KB
|
dmtf_600x240_002.png
|
2.5 KB
|
facebook_2016_150x60_1.png
|
2.9 KB
|
facebook_2016_150x60_1_002.png
|
2.4 KB
|
facebook-icon.jpeg
|
1.7 KB
|
fastbutton.htm
|
1.8 KB
|
fastbutton_002.htm
|
1.7 KB
|
google_2016_150x60_0.png
|
3.3 KB
|
google_2016_150x60_0_002.png
|
3.9 KB
|
googleplus-icon.jpg
|
1.7 KB
|
ibm_research_150x60_0.png
|
2.8 KB
|
ibm_research_150x60_0_002.png
|
3.3 KB
|
ie.htm
|
30.2 KB
|
in-icon.jpeg
|
1.9 KB
|
js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js
|
20.5 KB
|
js_2sjNGyfj3O57w8bimxly5mzgG70GrcIxxxYOEInwu1Q.js
|
57.0 KB
|
js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js
|
1.4 KB
|
js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js
|
120.3 KB
|
js_ILONILlX06kZtY3IVUMaeuMs_GJ1hSJY46daikoF9fA.js
|
99.4 KB
|
js_yui9lDPs2dTDFfQPtmwCCL63T1k2MGsGrsTM-7Eo2Ts.js
|
32.8 KB
|
linux_pro_150x60.png
|
2.9 KB
|
linux_pro_150x60_002.png
|
5.0 KB
|
lxer_150x60.png
|
6.6 KB
|
lxer_150x60_002.png
|
3.7 KB
|
microsoft_600x240_0.png
|
2.5 KB
|
microsoft_600x240_0_002.png
|
3.0 KB
|
neustar_150x60.png
|
4.5 KB
|
neustar_150x60_002.png
|
3.7 KB
|
nostarch_600x240_1.png
|
3.9 KB
|
nostarch_600x240_1_002.png
|
1.6 KB
|
nsf_150x60_v2.png
|
4.8 KB
|
nsf_150x60_v2_002.png
|
7.3 KB
|
package-x-generic.png
|
0.3 KB
|
pdf_16.png
|
0.3 KB
|
plusone.js
|
49.0 KB
|
postmessageRelay.htm
|
0.7 KB
|
sec16_button_180.png
|
39.2 KB
|
slides_16.png
|
1.3 KB
|
symantec_150x60.png
|
10.6 KB
|
symantec_150x60_002.png
|
5.4 KB
|
twitter-icon.jpeg
|
1.7 KB
|
usenix-locked.png
|
1.4 KB
|
userfriendly_150x60.png
|
3.0 KB
|
userfriendly_150x60_002.png
|
8.4 KB
|
video_16.png
|
1.4 KB
|
virus_bulletin_150x60.png
|
5.2 KB
|
virus_bulletin_150x60_002.png
|
3.0 KB
|
widgets.js
|
98.5 KB
|
wing_jeannette_100x115.png
|
22.3 KB
|
youtube-icon.jpg
|
1.7 KB
|
/.../Technical Sessions 2016 USENIX_files/postmessageRelay_data/
|
829555168-postmessagerelay.js
|
10.0 KB
|
cbgapi.loaded_0
|
54.9 KB
|
rpcshindig_random.js
|
13.0 KB
|
/.../USENIX Security 2016 captions/
|
2016 Test of Time Award Panel.eng.json
|
2.9 MB
|
2016 Test of Time Award Panel.eng.lrc
|
92.7 KB
|
2016 Test of Time Award Panel.eng.srt
|
63.1 KB
|
2016 Test of Time Award Panel.eng.text
|
41.9 KB
|
2016 Test of Time Award Panel.eng.tsv
|
72.0 KB
|
2016 Test of Time Award Panel.eng.txt
|
94.7 KB
|
2016 Test of Time Award Panel.eng.vtt
|
56.6 KB
|
A Comprehensive Measurement Study of Domain Generating Malware.eng.srt
|
68.3 KB
|
All Your Queries Are Belong to Us The Power of File-Injection Attacks.eng.srt
|
48.3 KB
|
AMD x86 Memory Encryption Technologies.eng.json
|
3.3 KB
|
AMD x86 Memory Encryption Technologies.eng.lrc
|
0.1 KB
|
AMD x86 Memory Encryption Technologies.eng.srt
|
0.1 KB
|
AMD x86 Memory Encryption Technologies.eng.text
|
0.0 KB
|
AMD x86 Memory Encryption Technologies.eng.tsv
|
0.1 KB
|
AMD x86 Memory Encryption Technologies.eng.txt
|
0.1 KB
|
AMD x86 Memory Encryption Technologies.eng.vtt
|
0.1 KB
|
An Empirical Study of Textual Key-Fingerprint Representations.eng.srt
|
39.3 KB
|
An In-Depth Analysis of Disassembly on Full-Scale x86 x64 Binaries.eng.srt
|
49.2 KB
|
APISan Sanitizing API Usages through Semantic Cross-Checking.eng.srt
|
45.4 KB
|
Ariadne A Minimal Approach to State Continuity.eng.srt
|
11.8 KB
|
ARMageddon Cache Attacks on Mobile Devices.eng.srt
|
53.6 KB
|
Authenticated Network Time Synchronization.eng.srt
|
48.2 KB
|
AuthLoop End-to-End Cryptographic Authentication for Telephony.eng.srt
|
54.3 KB
|
Automatically Detecting Error Handling Bugs Using Error Specifications.eng.srt
|
37.5 KB
|
Crashing Drones and Hijacked Cameras CyberTrust Meets CyberPhysical.eng.srt
|
135.3 KB
|
Dancing on the Lip of the Volcano Chosen Ciphertext Attacks on Apple iMessage.eng.srt
|
68.5 KB
|
Defending against Malicious Peripherals with Cinch.eng.srt
|
51.7 KB
|
DRAMA Exploiting DRAM Addressing for Cross-CPU Attacks.eng.srt
|
45.7 KB
|
DROWN Breaking TLS Using SSLv2.eng.srt
|
43.5 KB
|
Egalitarian Computing.eng.srt
|
46.5 KB
|
Enhancing Bitcoin Security and Performance with Strong Consistency via.eng.json
|
1.2 MB
|
Enhancing Bitcoin Security and Performance with Strong Consistency via.eng.lrc
|
33.2 KB
|
Enhancing Bitcoin Security and Performance with Strong Consistency via.eng.srt
|
31.1 KB
|
Enhancing Bitcoin Security and Performance with Strong Consistency via.eng.text
|
23.1 KB
|
Enhancing Bitcoin Security and Performance with Strong Consistency via.eng.tsv
|
28.8 KB
|
Enhancing Bitcoin Security and Performance with Strong Consistency via.eng.txt
|
33.6 KB
|
Enhancing Bitcoin Security and Performance with Strong Consistency via.eng.vtt
|
28.8 KB
|
Fast, Lean, and Accurate Modeling Password Guessability Using Neural Networks.eng.srt
|
52.7 KB
|
Faster Malicious 2-Party Secure Computation with Online Offline Dual Execution.eng.srt
|
49.3 KB
|
Finding and Fixing Security Bugs in Flash.eng.srt
|
136.6 KB
|
Fingerprinting Electronic Control Units for Vehicle Intrusion Detection.eng.srt
|
54.4 KB
|
Flip Feng Shui Hammering a Needle in the Software Stack.eng.srt
|
61.7 KB
|
FlowFence Practical Data Protection for Emerging IoT Application Frameworks.eng.srt
|
52.9 KB
|
fTPM A Software-Only Implementation of a TPM Chip.eng.srt
|
67.4 KB
|
Harvesting Inconsistent Security Configurations in Custom Android ROMs.eng.srt
|
47.4 KB
|
Hey, You Have a Problem On the Feasibility of Large-Scale Web Vulnerability.eng.srt
|
70.8 KB
|
Hidden Voice Commands.eng.srt
|
61.6 KB
|
Identifying and Characterizing Sybils in the Tor Network.eng.srt
|
52.9 KB
|
Internet Jones and the Raiders of the Lost Trackers.eng.srt
|
60.5 KB
|
Investigating Commercial Pay-Per-Install and the Distribution of Unwanted.eng.srt
|
61.5 KB
|
k-fingerprinting A Robust Scalable Website Fingerprinting Technique.eng.srt
|
55.6 KB
|
Lock It and Still Lose It -on the (In)Security of Automotive Remote Keyless.eng.srt
|
43.9 KB
|
Making HTTPS the Default in the World's Largest Bureaucracy.eng.json
|
5.0 MB
|
Making HTTPS the Default in the World's Largest Bureaucracy.eng.lrc
|
152.8 KB
|
Making HTTPS the Default in the World's Largest Bureaucracy.eng.srt
|
108.2 KB
|
Making HTTPS the Default in the World's Largest Bureaucracy.eng.text
|
79.1 KB
|
Making HTTPS the Default in the World's Largest Bureaucracy.eng.tsv
|
120.5 KB
|
Making HTTPS the Default in the World's Largest Bureaucracy.eng.txt
|
155.5 KB
|
Making HTTPS the Default in the World's Largest Bureaucracy.eng.vtt
|
100.7 KB
|
Making USB Great Again with USBFILTER.eng.srt
|
55.1 KB
|
Measuring PUP Prevalence and PUP Distribution through Pay-Per-Install Services.eng.json
|
1.1 MB
|
Measuring PUP Prevalence and PUP Distribution through Pay-Per-Install Services.eng.lrc
|
27.2 KB
|
Measuring PUP Prevalence and PUP Distribution through Pay-Per-Install Services.eng.srt
|
29.5 KB
|
Measuring PUP Prevalence and PUP Distribution through Pay-Per-Install Services.eng.text
|
21.4 KB
|
Measuring PUP Prevalence and PUP Distribution through Pay-Per-Install Services.eng.tsv
|
24.7 KB
|
Measuring PUP Prevalence and PUP Distribution through Pay-Per-Install Services.eng.txt
|
27.4 KB
|
Measuring PUP Prevalence and PUP Distribution through Pay-Per-Install Services.eng.vtt
|
27.2 KB
|
Micro-Virtualization Memory Tracing to Detect and Prevent Spraying Attacks.eng.srt
|
54.3 KB
|
Mirror Enabling Proofs of Data Replication and Retrievability in the Cloud.eng.srt
|
52.2 KB
|
Oblivious Multi-Party Machine Learning on Trusted Processors.eng.srt
|
53.6 KB
|
OblivP2P An Oblivious Peer-to-Peer Content Sharing System.eng.srt
|
43.7 KB
|
Off-Path TCP Exploits Global Rate Limit Considered Dangerous.eng.srt
|
51.3 KB
|
On Demystifying the Android Application Framework Re-Visiting Android.eng.srt
|
49.3 KB
|
On Omitting Commits and Committing Omissions Preventing Git Metadata.eng.srt
|
53.2 KB
|
One Bit Flips, One Cloud Flops Cross-VM Row Hammer Attacks.eng.srt
|
47.8 KB
|
Optimized Invariant Representation of Network Traffic for Detecting Unseen.eng.srt
|
43.6 KB
|
PIkit A New Kernel-Independent Processor-Interconnect Rootkit.eng.srt
|
38.8 KB
|
Poking Holes in Information Hiding.eng.json
|
1.6 MB
|
Poking Holes in Information Hiding.eng.lrc
|
43.3 KB
|
Poking Holes in Information Hiding.eng.srt
|
41.0 KB
|
Poking Holes in Information Hiding.eng.text
|
29.2 KB
|
Poking Holes in Information Hiding.eng.tsv
|
37.4 KB
|
Poking Holes in Information Hiding.eng.txt
|
43.8 KB
|
Poking Holes in Information Hiding.eng.vtt
|
37.6 KB
|
Post-quantum Key Exchange-A New Hope.eng.srt
|
85.7 KB
|
Practical DIFC Enforcement on Android.eng.srt
|
65.8 KB
|
Predicting, Decrypting, and Abusing WPA2 802.11 Group Keys.eng.srt
|
49.7 KB
|
Privacy and Threat in Practice Mobile Messaging by Low-Income New Yorkers.eng.json
|
115.4 KB
|
Privacy and Threat in Practice Mobile Messaging by Low-Income New Yorkers.eng.lrc
|
3.1 KB
|
Privacy and Threat in Practice Mobile Messaging by Low-Income New Yorkers.eng.srt
|
4.1 KB
|
Privacy and Threat in Practice Mobile Messaging by Low-Income New Yorkers.eng.text
|
1.9 KB
|
Privacy and Threat in Practice Mobile Messaging by Low-Income New Yorkers.eng.tsv
|
2.6 KB
|
Privacy and Threat in Practice Mobile Messaging by Low-Income New Yorkers.eng.txt
|
3.2 KB
|
Privacy and Threat in Practice Mobile Messaging by Low-Income New Yorkers.eng.vtt
|
3.5 KB
|
Privacy in Epigenetics Temporal Linkability of MicroRNA Expression Profiles.eng.srt
|
53.7 KB
|
Protecting Privacy of BLE Device Users.eng.srt
|
48.6 KB
|
Report from the Field A CDN's Role in Repelling Attacks against Banking.eng.json
|
80.5 KB
|
Report from the Field A CDN's Role in Repelling Attacks against Banking.eng.lrc
|
2.1 KB
|
Report from the Field A CDN's Role in Repelling Attacks against Banking.eng.srt
|
2.4 KB
|
Report from the Field A CDN's Role in Repelling Attacks against Banking.eng.text
|
1.3 KB
|
Report from the Field A CDN's Role in Repelling Attacks against Banking.eng.tsv
|
1.7 KB
|
Report from the Field A CDN's Role in Repelling Attacks against Banking.eng.txt
|
2.1 KB
|
Report from the Field A CDN's Role in Repelling Attacks against Banking.eng.vtt
|
2.1 KB
|
Request and Conquer Exposing Cross-Origin Resource Size.eng.srt
|
43.3 KB
|
Sanctum Minimal Hardware Extensions for Strong Software Isolation.eng.srt
|
53.8 KB
|
Screen after Previous Screens Spatial-Temporal Recreation of Android App.eng.srt
|
48.9 KB
|
Secure, Precise, and Fast Floating-Point Operations on x86 Processors.eng.json
|
1.6 MB
|
Secure, Precise, and Fast Floating-Point Operations on x86 Processors.eng.lrc
|
47.3 KB
|
Secure, Precise, and Fast Floating-Point Operations on x86 Processors.eng.srt
|
37.2 KB
|
Secure, Precise, and Fast Floating-Point Operations on x86 Processors.eng.text
|
29.3 KB
|
Secure, Precise, and Fast Floating-Point Operations on x86 Processors.eng.tsv
|
39.4 KB
|
Secure, Precise, and Fast Floating-Point Operations on x86 Processors.eng.txt
|
48.0 KB
|
Secure, Precise, and Fast Floating-Point Operations on x86 Processors.eng.vtt
|
34.9 KB
|
Security Competitions.eng.json
|
66.7 KB
|
Security Competitions.eng.lrc
|
1.8 KB
|
Security Competitions.eng.srt
|
2.0 KB
|
Security Competitions.eng.text
|
1.0 KB
|
Security Competitions.eng.tsv
|
1.4 KB
|
Security Competitions.eng.txt
|
1.8 KB
|
Security Competitions.eng.vtt
|
1.8 KB
|
Specification Mining for Intrusion Detection in Networked Control Systems.eng.srt
|
47.2 KB
|
Stealing Machine Learning Models via Prediction APIs.eng.srt
|
55.5 KB
|
Teaching Computer Security Thoughts from the Field.eng.json
|
1.0 MB
|
Teaching Computer Security Thoughts from the Field.eng.lrc
|
28.5 KB
|
Teaching Computer Security Thoughts from the Field.eng.srt
|
29.9 KB
|
Teaching Computer Security Thoughts from the Field.eng.text
|
16.4 KB
|
Teaching Computer Security Thoughts from the Field.eng.tsv
|
23.2 KB
|
Teaching Computer Security Thoughts from the Field.eng.txt
|
29.0 KB
|
Teaching Computer Security Thoughts from the Field.eng.vtt
|
26.7 KB
|
The Cut-and-Choose Game and Its Application to Cryptographic Protocols.eng.json
|
993.6 KB
|
The Cut-and-Choose Game and Its Application to Cryptographic Protocols.eng.lrc
|
31.1 KB
|
The Cut-and-Choose Game and Its Application to Cryptographic Protocols.eng.srt
|
22.9 KB
|
The Cut-and-Choose Game and Its Application to Cryptographic Protocols.eng.text
|
16.0 KB
|
The Cut-and-Choose Game and Its Application to Cryptographic Protocols.eng.tsv
|
24.4 KB
|
The Cut-and-Choose Game and Its Application to Cryptographic Protocols.eng.txt
|
31.7 KB
|
The Cut-and-Choose Game and Its Application to Cryptographic Protocols.eng.vtt
|
20.9 KB
|
The Ever-Changing Labyrinth A Large-Scale Analysis of Wildcard DNS Powered.eng.srt
|
40.5 KB
|
The Million-Key Question-Investigating the Origins of RSA Public Keys.eng.srt
|
51.3 KB
|
The Moral Character of Cryptographic Work.eng.json
|
159.3 KB
|
The Moral Character of Cryptographic Work.eng.lrc
|
4.1 KB
|
The Moral Character of Cryptographic Work.eng.srt
|
4.2 KB
|
The Moral Character of Cryptographic Work.eng.text
|
3.2 KB
|
The Moral Character of Cryptographic Work.eng.tsv
|
3.7 KB
|
The Moral Character of Cryptographic Work.eng.txt
|
4.1 KB
|
The Moral Character of Cryptographic Work.eng.vtt
|
3.9 KB
|
The Unfalsifiability of Security Claims.eng.srt
|
184.9 KB
|
Thoth Comprehensive Policy Compliance in Data Retrieval Systems.eng.srt
|
53.2 KB
|
Towards Measuring and Mitigating Social Engineering Software Download Attacks.eng.srt
|
52.8 KB
|
Tracing Information Flows Between Ad Exchanges Using Retargeted Ads.eng.srt
|
49.0 KB
|
Trusted Browsers for Uncertain Times.eng.srt
|
63.8 KB
|
überSpark Enforcing Verifiable Object Abstractions for Automated.eng.json
|
1.4 MB
|
überSpark Enforcing Verifiable Object Abstractions for Automated.eng.lrc
|
46.0 KB
|
überSpark Enforcing Verifiable Object Abstractions for Automated.eng.srt
|
34.0 KB
|
überSpark Enforcing Verifiable Object Abstractions for Automated.eng.text
|
25.1 KB
|
überSpark Enforcing Verifiable Object Abstractions for Automated.eng.tsv
|
37.0 KB
|
überSpark Enforcing Verifiable Object Abstractions for Automated.eng.txt
|
46.8 KB
|
überSpark Enforcing Verifiable Object Abstractions for Automated.eng.vtt
|
31.3 KB
|
Undermining Information Hiding (and What to Do about It).eng.srt
|
39.1 KB
|
UNVEIL A Large-Scale, Automated Approach to Detecting Ransomware.eng.srt
|
49.8 KB
|
Verifying Constant-Time Implementations.eng.srt
|
66.3 KB
|
Virtual U Defeating Face Liveness Detection by Building Virtual Models.eng.srt
|
53.5 KB
|
Website-Targeted False Content Injection by Network Operators.eng.json
|
889.8 KB
|
Website-Targeted False Content Injection by Network Operators.eng.lrc
|
23.7 KB
|
Website-Targeted False Content Injection by Network Operators.eng.srt
|
23.9 KB
|
Website-Targeted False Content Injection by Network Operators.eng.text
|
17.2 KB
|
Website-Targeted False Content Injection by Network Operators.eng.tsv
|
20.8 KB
|
Website-Targeted False Content Injection by Network Operators.eng.txt
|
23.9 KB
|
Website-Targeted False Content Injection by Network Operators.eng.vtt
|
22.1 KB
|
What Cannot Be Read, Cannot Be Leveraged Revisiting Assumptions of JIT-ROP.eng.srt
|
47.6 KB
|
When Governments Attack Malware Targeting Activists, Lawyers, and Journalists.eng.json
|
3.7 MB
|
When Governments Attack Malware Targeting Activists, Lawyers, and Journalists.eng.lrc
|
123.1 KB
|
When Governments Attack Malware Targeting Activists, Lawyers, and Journalists.eng.srt
|
78.0 KB
|
When Governments Attack Malware Targeting Activists, Lawyers, and Journalists.eng.text
|
51.9 KB
|
When Governments Attack Malware Targeting Activists, Lawyers, and Journalists.eng.tsv
|
92.3 KB
|
When Governments Attack Malware Targeting Activists, Lawyers, and Journalists.eng.txt
|
125.7 KB
|
When Governments Attack Malware Targeting Activists, Lawyers, and Journalists.eng.vtt
|
71.3 KB
|
You Are Who You Know and How You Behave Attribute Inference Attacks.eng.json
|
836.4 KB
|
You Are Who You Know and How You Behave Attribute Inference Attacks.eng.lrc
|
21.9 KB
|
You Are Who You Know and How You Behave Attribute Inference Attacks.eng.srt
|
23.6 KB
|
You Are Who You Know and How You Behave Attribute Inference Attacks.eng.text
|
16.5 KB
|
You Are Who You Know and How You Behave Attribute Inference Attacks.eng.tsv
|
19.5 KB
|
You Are Who You Know and How You Behave Attribute Inference Attacks.eng.txt
|
22.1 KB
|
You Are Who You Know and How You Behave Attribute Inference Attacks.eng.vtt
|
21.6 KB
|
You've Got Vulnerability Exploring Effective Vulnerability Notifications.eng.srt
|
69.2 KB
|
ZKBoo Faster Zero-Knowledge for Boolean Circuits.eng.srt
|
38.0 KB
|
zxcvbn Low-Budget Password Strength Estimation.eng.json
|
1.6 MB
|
zxcvbn Low-Budget Password Strength Estimation.eng.lrc
|
44.2 KB
|
zxcvbn Low-Budget Password Strength Estimation.eng.srt
|
41.5 KB
|
zxcvbn Low-Budget Password Strength Estimation.eng.text
|
28.2 KB
|
zxcvbn Low-Budget Password Strength Estimation.eng.tsv
|
37.3 KB
|
zxcvbn Low-Budget Password Strength Estimation.eng.txt
|
44.9 KB
|
zxcvbn Low-Budget Password Strength Estimation.eng.vtt
|
37.7 KB
|
/.../USENIX Security 2016 USENIX_files/
|
acmqueue_600x240_1.png
|
7.0 KB
|
acmqueue_600x240_1_002.png
|
2.5 KB
|
admin_150x60.png
|
7.0 KB
|
admin_150x60_002.png
|
4.2 KB
|
all.js
|
3.2 KB
|
analytics.js
|
45.2 KB
|
bit_150x60.png
|
7.4 KB
|
bit_150x60_002.png
|
2.8 KB
|
cbgapi.loaded_0
|
144.0 KB
|
cbgapi.loaded_1
|
97.1 KB
|
cisco_150x60.png
|
2.1 KB
|
cisco_150x60_002.png
|
2.7 KB
|
crc_press_150x60.png
|
3.9 KB
|
crc_press_150x60_002.png
|
13.7 KB
|
css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css
|
5.6 KB
|
css_IBrrqJUtXAVsLrrlZ8VqVTS3di7E2-x10BVJwZwbroU.css
|
260.3 KB
|
css_m9t3SZ2dKv6HQuOuf0zINIRA5GjP4lkCCtmRRbSjaXs.css
|
14.7 KB
|
css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css
|
1.5 KB
|
css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css
|
0.1 KB
|
dmtf_600x240.png
|
4.1 KB
|
dmtf_600x240_002.png
|
2.5 KB
|
facebook_2016_150x60_1.png
|
2.9 KB
|
facebook_2016_150x60_1_002.png
|
2.4 KB
|
facebook-icon.jpeg
|
1.7 KB
|
fastbutton.htm
|
1.8 KB
|
fastbutton_002.htm
|
1.7 KB
|
google_2016_150x60_0.png
|
3.9 KB
|
google_2016_150x60_0_002.png
|
3.3 KB
|
googleplus-icon.jpg
|
1.7 KB
|
ibm_research_150x60_0.png
|
2.8 KB
|
ibm_research_150x60_0_002.png
|
3.3 KB
|
ie.css
|
0.5 KB
|
in-icon.jpeg
|
1.9 KB
|
js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js
|
20.5 KB
|
js_2sjNGyfj3O57w8bimxly5mzgG70GrcIxxxYOEInwu1Q.js
|
57.0 KB
|
js_5eZSC3tfzCwTta-_4qxrBau4YdctcIhVqovRK7sPRFo.js
|
107.7 KB
|
js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js
|
1.4 KB
|
js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js
|
120.3 KB
|
js_nPhKWi17GlWfUPto14Dqfk5lpAFMD2XUrRDYY3jnD2c.js
|
23.0 KB
|
linux_pro_150x60.png
|
2.9 KB
|
linux_pro_150x60_002.png
|
5.0 KB
|
lxer_150x60.png
|
6.6 KB
|
lxer_150x60_002.png
|
3.7 KB
|
microsoft_600x240_0.png
|
2.5 KB
|
microsoft_600x240_0_002.png
|
3.0 KB
|
neustar_150x60.png
|
3.7 KB
|
neustar_150x60_002.png
|
4.5 KB
|
nostarch_600x240_1.png
|
3.9 KB
|
nostarch_600x240_1_002.png
|
1.6 KB
|
nsf_150x60_v2.png
|
4.8 KB
|
nsf_150x60_v2_002.png
|
7.3 KB
|
plusone.js
|
49.0 KB
|
postmessageRelay.htm
|
0.7 KB
|
sec16_button_180.png
|
39.2 KB
|
sec16_media.png
|
6.6 KB
|
symantec_150x60.png
|
10.6 KB
|
symantec_150x60_002.png
|
5.4 KB
|
twitter-icon.jpeg
|
1.7 KB
|
userfriendly_150x60.png
|
3.0 KB
|
userfriendly_150x60_002.png
|
8.4 KB
|
virus_bulletin_150x60.png
|
5.2 KB
|
virus_bulletin_150x60_002.png
|
3.0 KB
|
widgets.js
|
98.5 KB
|
youtube-icon.jpg
|
1.7 KB
|
/.../USENIX Security 2016 USENIX_files/postmessageRelay_data/
|
829555168-postmessagerelay.js
|
10.0 KB
|
cbgapi.loaded_0
|
54.9 KB
|
rpcshindig_random.js
|
13.0 KB
|
/USENIX Security 2017/
|
6thSense - A Context-aware Sensor-based Attack Detector for Smart Devices.mp4
|
32.9 MB
|
A Longitudinal, End-to-End View of the DNSSEC Ecosystem.mp4
|
21.2 MB
|
A Privacy Analysis of Cross-device Tracking.mp4
|
30.0 MB
|
Adaptive Android Kernel Live Patching.mp4
|
22.9 MB
|
An Ant in a World of Grasshoppers.mp4
|
31.4 MB
|
Attacking the Brain - Races in the SDN Control Plane.mp4
|
31.6 MB
|
AuthentiCall - Efficient Identity and Content Authentication for Phone Calls.mp4
|
30.5 MB
|
AutoLock - Why Cache Attacks on ARM Are Harder Than You Think.mp4
|
22.8 MB
|
AWare - Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings.mp4
|
33.6 MB
|
Beauty and the Burst - Remote Identification of Encrypted Video Streams.mp4
|
26.9 MB
|
BinSim - Trace-based Semantic Binary Diffing.mp4
|
30.3 MB
|
BLENDER - Enabling Local Search with a Hybrid Differential Privacy Model.mp4
|
25.4 MB
|
BootStomp - On the Security of Bootloaders in Mobile Devices.mp4
|
21.3 MB
|
CacheD - Identifying Cache-Based Timing Channels in Production Software.mp4
|
21.2 MB
|
CAn’t Touch This.mp4
|
25.5 MB
|
CCSP - Controlled Relaxation of Content Security Policies.mp4
|
33.7 MB
|
CHAINIAC - Proactive Software-Update Transparency.mp4
|
26.8 MB
|
Characterizing the Nature and Dynamics of Tor Exit Blocking.mp4
|
21.3 MB
|
CLKSCREW - Exposing the Perils of Security-Oblivious Energy Management.mp4
|
24.0 MB
|
Computer Security, Privacy, and DNA Sequencing.mp4
|
25.5 MB
|
Constant-Time Callees with Variable-Time Callers.mp4
|
24.2 MB
|
Data Hemorrhage, Inequality, and You.mp4
|
62.7 MB
|
Dead Store Elimination (Still) Considered Harmful.mp4
|
22.9 MB
|
Detecting Android Root Exploits by Learning from Root Providers.mp4
|
25.2 MB
|
Detecting Credential Spearphishing in Enterprise Settings.mp4
|
27.6 MB
|
DeTor - Provably Avoiding Geographic Regions in Tor.mp4
|
23.1 MB
|
Differential Privacy - From Theory to Deployment.mp4
|
38.1 MB
|
Digtool - A Virtualization-Based Framework for Detecting Kernel Vulnerabilities.mp4
|
22.3 MB
|
DR. CHECKER - A Soundy Analysis for Linux Kernel Drivers.mp4
|
29.3 MB
|
Efficient Protection of Path-Sensitive Control Security.mp4
|
20.8 MB
|
Ensuring Authorized Updates in Multi-user Database-Backed Applications.mp4
|
23.5 MB
|
Exploring User Perceptions of Discrimination in Online Targeted Advertising.mp4
|
21.2 MB
|
Extension Breakdown.mp4
|
24.1 MB
|
From Problems to Patterns to Practice.mp4
|
12.0 MB
|
Game of Registrars.mp4
|
40.4 MB
|
Global Measurement of DNS Manipulation.mp4
|
24.9 MB
|
Hacking in Darkness - Return-oriented Programming against Secure Enclaves.mp4
|
39.3 MB
|
HELP - Helper-Enabled In-Band Device Pairing.mp4
|
27.2 MB
|
How Double-Fetch Situations turn into Double-Fetch Vulnerabilities.mp4
|
32.0 MB
|
How the Web Tangled Itself.mp4
|
49.5 MB
|
I Have No Idea What I'm Doing - On the Usability of Deploying HTTPS.mp4
|
27.2 MB
|
Identifier Binding Attacks and Defenses in Software-Defined Networks.mp4
|
28.4 MB
|
Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing.mp4
|
31.8 MB
|
kAFL - Hardware-Assisted Feedback Fuzzing for OS Kernels.mp4
|
24.8 MB
|
Locally Differentially Private Protocols for Frequency Estimation.mp4
|
21.0 MB
|
Loophole - Timing Attacks on Shared Event Loops in Chrome.mp4
|
25.8 MB
|
Malton - Towards On-Device Non-Invasive Mobile Malware Analysis for ART.mp4
|
42.8 MB
|
MCMix - Anonymous Messaging via Secure Multiparty Computation.mp4
|
26.7 MB
|
Measuring HTTPS Adoption on the Web.mp4
|
25.6 MB
|
Measuring the Insecurity of Mobile Deep Links of Android.mp4
|
36.6 MB
|
MPI - Multiple Perspective Attack Investigation.mp4
|
25.8 MB
|
Neural Nets Can Learn Function Type Signatures From Binaries.mp4
|
27.4 MB
|
Ninja - Towards Transparent Tracing and Debugging on ARM.mp4
|
20.4 MB
|
On the effectiveness of mitigations against floating-point timing channels.mp4
|
25.5 MB
|
Opening Remarks and Awards.mp4
|
20.4 MB
|
ORide - A Privacy-Preserving yet Accountable Ride-Hailing Service.mp4
|
20.4 MB
|
Oscar - A Practical Page-Permissions-Based Scheme.mp4
|
23.2 MB
|
OSS-Fuzz - Google's continuous fuzzing service for open source software.mp4
|
66.4 MB
|
PDF Mirage - Content Masking Attack Against Information-Based Online Services.mp4
|
32.9 MB
|
Phoenix - Rebirth of a Cryptographic Password-Hardening Service.mp4
|
26.5 MB
|
Picking Up My Tab.mp4
|
26.6 MB
|
PlatPal - Detecting Malicious Documents with Platform Diversity.mp4
|
23.2 MB
|
Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts.mp4
|
25.9 MB
|
Predicting the Resilience of Obfuscated Code.mp4
|
23.2 MB
|
PrimeAbort - A Timer-Free High-Precision L3 Cache Attack using Intel TSX.mp4
|
25.6 MB
|
Qapla - Policy compliance for database-backed systems.mp4
|
26.6 MB
|
REM - Resource-Efficient Mining for Blockchains.mp4
|
44.1 MB
|
Reverse Engineering x86 Processor Microcode.mp4
|
21.2 MB
|
ROTE - Rollback Protection for Trusted Execution.mp4
|
38.2 MB
|
Same-Origin Policy - Evaluation in Modern Browsers.mp4
|
32.4 MB
|
See No Evil, Hear No Evil, Feel No Evil.mp4
|
30.5 MB
|
Seeing Through The Same Lens.mp4
|
28.1 MB
|
SLEUTH - Real-time Attack Scenario Reconstruction from COTS Audit Data.mp4
|
27.2 MB
|
SmartAuth - User-Centered Authorization for the Internet of Things.mp4
|
30.7 MB
|
SmartPool - Practical Decentralized Pooled Mining.mp4
|
32.3 MB
|
Speeding up detection of SHA-1 collision attacks.mp4
|
26.4 MB
|
Strong and Efficient Cache Side-Channel Protection.mp4
|
27.1 MB
|
Syntia - Synthesizing the Semantics of Obfuscated Code.mp4
|
24.9 MB
|
Telling Your Secrets without Page Faults.mp4
|
23.2 MB
|
The Loopix Anonymity System.mp4
|
31.2 MB
|
Towards Efficient Heap Overflow Discovery.mp4
|
23.7 MB
|
Towards Practical Tools for Side Channel Aware Software Engineering.mp4
|
24.5 MB
|
Transcend - Detecting Concept Drift in Malware Classification Models.mp4
|
31.1 MB
|
TrustBase - An Architecture to Repair and Strengthen.mp4
|
26.8 MB
|
Understanding the Mirai Botnet.mp4
|
30.4 MB
|
USB Snooping Made Easy - Crosstalk Leakage Attacks on USB Hubs.mp4
|
26.6 MB
|
USENIX Security 2017 Full Proceedings errata 2.pdf
|
79.4 KB
|
USENIX Security 2017 Full Proceedings errata 3.pdf
|
62.2 KB
|
USENIX Security 2017 Full Proceedings errata.pdf
|
211.3 KB
|
USENIX Security 2017 Full Proceedings Interior.pdf
|
120.9 MB
|
USENIX Security 2017 Full Proceedings program grid.pdf
|
385.6 KB
|
USENIX Security 2017 Full Proceedings.epub
|
62.5 MB
|
USENIX Security 2017 Full Proceedings.mobi
|
118.5 MB
|
USENIX Security 2017 Full Proceedings.pdf
|
121.2 MB
|
USENIX Security 2017 Technical Sessions USENIX.htm
|
487.2 KB
|
USENIX Security 2017 USENIX.htm
|
92.5 KB
|
Vale - Verifying High-Performance Cryptographic Assembly Code.mp4
|
23.7 MB
|
Venerable Variadic Vulnerabilities Vanquished.mp4
|
24.7 MB
|
vTZ - Virtualizing ARM TrustZone.mp4
|
23.9 MB
|
Walkie-Talkie.mp4
|
30.0 MB
|
When the Weakest Link is Strong.mp4
|
27.2 MB
|
When Your Threat Model Is - Everything - Defensive Security in Modern Newsrooms.mp4
|
63.8 MB
|
/.../USENIX Security 2017 captions/
|
6thSense - A Context-aware Sensor-based Attack Detector for Smart Devices.eng.json
|
1.2 MB
|
6thSense - A Context-aware Sensor-based Attack Detector for Smart Devices.eng.lrc
|
31.2 KB
|
6thSense - A Context-aware Sensor-based Attack Detector for Smart Devices.eng.srt
|
31.0 KB
|
6thSense - A Context-aware Sensor-based Attack Detector for Smart Devices.eng.text
|
21.4 KB
|
6thSense - A Context-aware Sensor-based Attack Detector for Smart Devices.eng.tsv
|
26.9 KB
|
6thSense - A Context-aware Sensor-based Attack Detector for Smart Devices.eng.txt
|
31.6 KB
|
6thSense - A Context-aware Sensor-based Attack Detector for Smart Devices.eng.vtt
|
28.3 KB
|
A Longitudinal, End-to-End View of the DNSSEC Ecosystem.eng.json
|
1.3 MB
|
A Longitudinal, End-to-End View of the DNSSEC Ecosystem.eng.lrc
|
34.4 KB
|
A Longitudinal, End-to-End View of the DNSSEC Ecosystem.eng.srt
|
33.2 KB
|
A Longitudinal, End-to-End View of the DNSSEC Ecosystem.eng.text
|
22.0 KB
|
A Longitudinal, End-to-End View of the DNSSEC Ecosystem.eng.tsv
|
29.1 KB
|
A Longitudinal, End-to-End View of the DNSSEC Ecosystem.eng.txt
|
34.9 KB
|
A Longitudinal, End-to-End View of the DNSSEC Ecosystem.eng.vtt
|
30.0 KB
|
A Privacy Analysis of Cross-device Tracking.eng.json
|
1.2 MB
|
A Privacy Analysis of Cross-device Tracking.eng.lrc
|
33.1 KB
|
A Privacy Analysis of Cross-device Tracking.eng.srt
|
28.4 KB
|
A Privacy Analysis of Cross-device Tracking.eng.text
|
20.9 KB
|
A Privacy Analysis of Cross-device Tracking.eng.tsv
|
27.9 KB
|
A Privacy Analysis of Cross-device Tracking.eng.txt
|
33.6 KB
|
A Privacy Analysis of Cross-device Tracking.eng.vtt
|
26.3 KB
|
Adaptive Android Kernel Live Patching.eng.json
|
893.2 KB
|
Adaptive Android Kernel Live Patching.eng.lrc
|
22.9 KB
|
Adaptive Android Kernel Live Patching.eng.srt
|
26.4 KB
|
Adaptive Android Kernel Live Patching.eng.text
|
17.7 KB
|
Adaptive Android Kernel Live Patching.eng.tsv
|
20.7 KB
|
Adaptive Android Kernel Live Patching.eng.txt
|
23.1 KB
|
Adaptive Android Kernel Live Patching.eng.vtt
|
24.0 KB
|
An Ant in a World of Grasshoppers.eng.json
|
2.2 MB
|
An Ant in a World of Grasshoppers.eng.lrc
|
72.5 KB
|
An Ant in a World of Grasshoppers.eng.srt
|
45.1 KB
|
An Ant in a World of Grasshoppers.eng.text
|
32.4 KB
|
An Ant in a World of Grasshoppers.eng.tsv
|
55.9 KB
|
An Ant in a World of Grasshoppers.eng.txt
|
74.1 KB
|
An Ant in a World of Grasshoppers.eng.vtt
|
41.2 KB
|
Attacking the Brain - Races in the SDN Control Plane.eng.json
|
1.4 MB
|
Attacking the Brain - Races in the SDN Control Plane.eng.lrc
|
40.0 KB
|
Attacking the Brain - Races in the SDN Control Plane.eng.srt
|
34.4 KB
|
Attacking the Brain - Races in the SDN Control Plane.eng.text
|
23.4 KB
|
Attacking the Brain - Races in the SDN Control Plane.eng.tsv
|
33.0 KB
|
Attacking the Brain - Races in the SDN Control Plane.eng.txt
|
40.7 KB
|
Attacking the Brain - Races in the SDN Control Plane.eng.vtt
|
31.2 KB
|
AuthentiCall - Efficient Identity and Content Authentication for Phone Calls.eng.json
|
1.4 MB
|
AuthentiCall - Efficient Identity and Content Authentication for Phone Calls.eng.lrc
|
37.8 KB
|
AuthentiCall - Efficient Identity and Content Authentication for Phone Calls.eng.srt
|
35.0 KB
|
AuthentiCall - Efficient Identity and Content Authentication for Phone Calls.eng.text
|
26.2 KB
|
AuthentiCall - Efficient Identity and Content Authentication for Phone Calls.eng.tsv
|
32.8 KB
|
AuthentiCall - Efficient Identity and Content Authentication for Phone Calls.eng.txt
|
38.2 KB
|
AuthentiCall - Efficient Identity and Content Authentication for Phone Calls.eng.vtt
|
32.5 KB
|
AutoLock - Why Cache Attacks on ARM Are Harder Than You Think.eng.json
|
1.4 MB
|
AutoLock - Why Cache Attacks on ARM Are Harder Than You Think.eng.lrc
|
38.0 KB
|
AutoLock - Why Cache Attacks on ARM Are Harder Than You Think.eng.srt
|
32.2 KB
|
AutoLock - Why Cache Attacks on ARM Are Harder Than You Think.eng.text
|
23.4 KB
|
AutoLock - Why Cache Attacks on ARM Are Harder Than You Think.eng.tsv
|
31.7 KB
|
AutoLock - Why Cache Attacks on ARM Are Harder Than You Think.eng.txt
|
38.6 KB
|
AutoLock - Why Cache Attacks on ARM Are Harder Than You Think.eng.vtt
|
29.6 KB
|
AWare - Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings.eng.json
|
1.1 MB
|
AWare - Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings.eng.lrc
|
28.6 KB
|
AWare - Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings.eng.srt
|
31.3 KB
|
AWare - Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings.eng.text
|
22.3 KB
|
AWare - Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings.eng.tsv
|
25.9 KB
|
AWare - Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings.eng.txt
|
28.8 KB
|
AWare - Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings.eng.vtt
|
28.8 KB
|
Beauty and the Burst - Remote Identification of Encrypted Video Streams.eng.json
|
1.0 MB
|
Beauty and the Burst - Remote Identification of Encrypted Video Streams.eng.lrc
|
26.6 KB
|
Beauty and the Burst - Remote Identification of Encrypted Video Streams.eng.srt
|
27.5 KB
|
Beauty and the Burst - Remote Identification of Encrypted Video Streams.eng.text
|
19.8 KB
|
Beauty and the Burst - Remote Identification of Encrypted Video Streams.eng.tsv
|
23.6 KB
|
Beauty and the Burst - Remote Identification of Encrypted Video Streams.eng.txt
|
26.9 KB
|
Beauty and the Burst - Remote Identification of Encrypted Video Streams.eng.vtt
|
25.4 KB
|
BinSim - Trace-based Semantic Binary Diffing.eng.json
|
1.1 MB
|
BinSim - Trace-based Semantic Binary Diffing.eng.lrc
|
34.8 KB
|
BinSim - Trace-based Semantic Binary Diffing.eng.srt
|
29.1 KB
|
BinSim - Trace-based Semantic Binary Diffing.eng.text
|
21.4 KB
|
BinSim - Trace-based Semantic Binary Diffing.eng.tsv
|
29.0 KB
|
BinSim - Trace-based Semantic Binary Diffing.eng.txt
|
35.4 KB
|
BinSim - Trace-based Semantic Binary Diffing.eng.vtt
|
26.8 KB
|
BLENDER - Enabling Local Search with a Hybrid Differential Privacy Model.eng.json
|
1.5 MB
|
BLENDER - Enabling Local Search with a Hybrid Differential Privacy Model.eng.lrc
|
37.4 KB
|
BLENDER - Enabling Local Search with a Hybrid Differential Privacy Model.eng.srt
|
41.4 KB
|
BLENDER - Enabling Local Search with a Hybrid Differential Privacy Model.eng.text
|
30.2 KB
|
BLENDER - Enabling Local Search with a Hybrid Differential Privacy Model.eng.tsv
|
34.3 KB
|
BLENDER - Enabling Local Search with a Hybrid Differential Privacy Model.eng.txt
|
37.7 KB
|
BLENDER - Enabling Local Search with a Hybrid Differential Privacy Model.eng.vtt
|
38.2 KB
|
BootStomp - On the Security of Bootloaders in Mobile Devices.eng.json
|
1.1 MB
|
BootStomp - On the Security of Bootloaders in Mobile Devices.eng.lrc
|
26.8 KB
|
BootStomp - On the Security of Bootloaders in Mobile Devices.eng.srt
|
30.2 KB
|
BootStomp - On the Security of Bootloaders in Mobile Devices.eng.text
|
20.6 KB
|
BootStomp - On the Security of Bootloaders in Mobile Devices.eng.tsv
|
24.1 KB
|
BootStomp - On the Security of Bootloaders in Mobile Devices.eng.txt
|
27.1 KB
|
BootStomp - On the Security of Bootloaders in Mobile Devices.eng.vtt
|
27.5 KB
|
CacheD - Identifying Cache-Based Timing Channels in Production Software.eng.json
|
1.1 MB
|
CacheD - Identifying Cache-Based Timing Channels in Production Software.eng.lrc
|
31.5 KB
|
CacheD - Identifying Cache-Based Timing Channels in Production Software.eng.srt
|
29.5 KB
|
CacheD - Identifying Cache-Based Timing Channels in Production Software.eng.text
|
21.4 KB
|
CacheD - Identifying Cache-Based Timing Channels in Production Software.eng.tsv
|
27.1 KB
|
CacheD - Identifying Cache-Based Timing Channels in Production Software.eng.txt
|
31.9 KB
|
CacheD - Identifying Cache-Based Timing Channels in Production Software.eng.vtt
|
27.2 KB
|
CAn’t Touch This.eng.json
|
1.4 MB
|
CAn’t Touch This.eng.lrc
|
40.4 KB
|
CAn’t Touch This.eng.srt
|
34.2 KB
|
CAn’t Touch This.eng.text
|
24.8 KB
|
CAn’t Touch This.eng.tsv
|
33.7 KB
|
CAn’t Touch This.eng.txt
|
41.0 KB
|
CAn’t Touch This.eng.vtt
|
31.5 KB
|
CCSP - Controlled Relaxation of Content Security Policies.eng.json
|
1.5 MB
|
CCSP - Controlled Relaxation of Content Security Policies.eng.lrc
|
43.2 KB
|
CCSP - Controlled Relaxation of Content Security Policies.eng.srt
|
37.0 KB
|
CCSP - Controlled Relaxation of Content Security Policies.eng.text
|
29.0 KB
|
CCSP - Controlled Relaxation of Content Security Policies.eng.tsv
|
37.2 KB
|
CCSP - Controlled Relaxation of Content Security Policies.eng.txt
|
43.8 KB
|
CCSP - Controlled Relaxation of Content Security Policies.eng.vtt
|
34.7 KB
|
CHAINIAC - Proactive Software-Update Transparency.eng.json
|
1.2 MB
|
CHAINIAC - Proactive Software-Update Transparency.eng.lrc
|
33.6 KB
|
CHAINIAC - Proactive Software-Update Transparency.eng.srt
|
29.7 KB
|
CHAINIAC - Proactive Software-Update Transparency.eng.text
|
22.6 KB
|
CHAINIAC - Proactive Software-Update Transparency.eng.tsv
|
28.8 KB
|
CHAINIAC - Proactive Software-Update Transparency.eng.txt
|
34.0 KB
|
CHAINIAC - Proactive Software-Update Transparency.eng.vtt
|
27.7 KB
|
Characterizing the Nature and Dynamics of Tor Exit Blocking.eng.json
|
1.3 MB
|
Characterizing the Nature and Dynamics of Tor Exit Blocking.eng.lrc
|
37.5 KB
|
Characterizing the Nature and Dynamics of Tor Exit Blocking.eng.srt
|
30.5 KB
|
Characterizing the Nature and Dynamics of Tor Exit Blocking.eng.text
|
21.3 KB
|
Characterizing the Nature and Dynamics of Tor Exit Blocking.eng.tsv
|
30.6 KB
|
Characterizing the Nature and Dynamics of Tor Exit Blocking.eng.txt
|
38.1 KB
|
Characterizing the Nature and Dynamics of Tor Exit Blocking.eng.vtt
|
27.8 KB
|
CLKSCREW - Exposing the Perils of Security-Oblivious Energy Management.eng.json
|
1.2 MB
|
CLKSCREW - Exposing the Perils of Security-Oblivious Energy Management.eng.lrc
|
32.2 KB
|
CLKSCREW - Exposing the Perils of Security-Oblivious Energy Management.eng.srt
|
35.5 KB
|
CLKSCREW - Exposing the Perils of Security-Oblivious Energy Management.eng.text
|
24.8 KB
|
CLKSCREW - Exposing the Perils of Security-Oblivious Energy Management.eng.tsv
|
29.0 KB
|
CLKSCREW - Exposing the Perils of Security-Oblivious Energy Management.eng.txt
|
32.5 KB
|
CLKSCREW - Exposing the Perils of Security-Oblivious Energy Management.eng.vtt
|
32.5 KB
|
Computer Security, Privacy, and DNA Sequencing.eng.json
|
1.5 MB
|
Computer Security, Privacy, and DNA Sequencing.eng.lrc
|
39.4 KB
|
Computer Security, Privacy, and DNA Sequencing.eng.srt
|
40.2 KB
|
Computer Security, Privacy, and DNA Sequencing.eng.text
|
30.1 KB
|
Computer Security, Privacy, and DNA Sequencing.eng.tsv
|
35.4 KB
|
Computer Security, Privacy, and DNA Sequencing.eng.txt
|
39.7 KB
|
Computer Security, Privacy, and DNA Sequencing.eng.vtt
|
37.4 KB
|
Constant-Time Callees with Variable-Time Callers.eng.json
|
946.5 KB
|
Constant-Time Callees with Variable-Time Callers.eng.lrc
|
26.0 KB
|
Constant-Time Callees with Variable-Time Callers.eng.srt
|
24.6 KB
|
Constant-Time Callees with Variable-Time Callers.eng.text
|
16.6 KB
|
Constant-Time Callees with Variable-Time Callers.eng.tsv
|
21.9 KB
|
Constant-Time Callees with Variable-Time Callers.eng.txt
|
26.4 KB
|
Constant-Time Callees with Variable-Time Callers.eng.vtt
|
22.3 KB
|
Data Hemorrhage, Inequality, and You.eng.json
|
2.9 MB
|
Data Hemorrhage, Inequality, and You.eng.lrc
|
76.8 KB
|
Data Hemorrhage, Inequality, and You.eng.srt
|
74.7 KB
|
Data Hemorrhage, Inequality, and You.eng.text
|
55.3 KB
|
Data Hemorrhage, Inequality, and You.eng.tsv
|
67.8 KB
|
Data Hemorrhage, Inequality, and You.eng.txt
|
77.6 KB
|
Data Hemorrhage, Inequality, and You.eng.vtt
|
69.3 KB
|
Dead Store Elimination (Still) Considered Harmful.eng.json
|
1.0 MB
|
Dead Store Elimination (Still) Considered Harmful.eng.lrc
|
31.2 KB
|
Dead Store Elimination (Still) Considered Harmful.eng.srt
|
25.9 KB
|
Dead Store Elimination (Still) Considered Harmful.eng.text
|
18.8 KB
|
Dead Store Elimination (Still) Considered Harmful.eng.tsv
|
25.8 KB
|
Dead Store Elimination (Still) Considered Harmful.eng.txt
|
31.6 KB
|
Dead Store Elimination (Still) Considered Harmful.eng.vtt
|
23.8 KB
|
Detecting Android Root Exploits by Learning from Root Providers.eng.json
|
1.0 MB
|
Detecting Android Root Exploits by Learning from Root Providers.eng.lrc
|
27.0 KB
|
Detecting Android Root Exploits by Learning from Root Providers.eng.srt
|
28.0 KB
|
Detecting Android Root Exploits by Learning from Root Providers.eng.text
|
20.6 KB
|
Detecting Android Root Exploits by Learning from Root Providers.eng.tsv
|
24.3 KB
|
Detecting Android Root Exploits by Learning from Root Providers.eng.txt
|
27.2 KB
|
Detecting Android Root Exploits by Learning from Root Providers.eng.vtt
|
25.9 KB
|
Detecting Credential Spearphishing in Enterprise Settings.eng.json
|
1.9 MB
|
Detecting Credential Spearphishing in Enterprise Settings.eng.lrc
|
52.7 KB
|
Detecting Credential Spearphishing in Enterprise Settings.eng.srt
|
49.6 KB
|
Detecting Credential Spearphishing in Enterprise Settings.eng.text
|
35.9 KB
|
Detecting Credential Spearphishing in Enterprise Settings.eng.tsv
|
45.5 KB
|
Detecting Credential Spearphishing in Enterprise Settings.eng.txt
|
53.4 KB
|
Detecting Credential Spearphishing in Enterprise Settings.eng.vtt
|
45.6 KB
|
DeTor - Provably Avoiding Geographic Regions in Tor.eng.json
|
1.2 MB
|
DeTor - Provably Avoiding Geographic Regions in Tor.eng.lrc
|
30.5 KB
|
DeTor - Provably Avoiding Geographic Regions in Tor.eng.srt
|
32.7 KB
|
DeTor - Provably Avoiding Geographic Regions in Tor.eng.text
|
23.6 KB
|
DeTor - Provably Avoiding Geographic Regions in Tor.eng.tsv
|
27.6 KB
|
DeTor - Provably Avoiding Geographic Regions in Tor.eng.txt
|
30.8 KB
|
DeTor - Provably Avoiding Geographic Regions in Tor.eng.vtt
|
30.2 KB
|
Differential Privacy - From Theory to Deployment.eng.json
|
2.0 MB
|
Differential Privacy - From Theory to Deployment.eng.lrc
|
52.7 KB
|
Differential Privacy - From Theory to Deployment.eng.srt
|
53.3 KB
|
Differential Privacy - From Theory to Deployment.eng.text
|
37.2 KB
|
Differential Privacy - From Theory to Deployment.eng.tsv
|
46.3 KB
|
Differential Privacy - From Theory to Deployment.eng.txt
|
53.3 KB
|
Differential Privacy - From Theory to Deployment.eng.vtt
|
48.7 KB
|
Digtool - A Virtualization-Based Framework for Detecting Kernel Vulnerabilities.eng.json
|
901.5 KB
|
Digtool - A Virtualization-Based Framework for Detecting Kernel Vulnerabilities.eng.lrc
|
24.1 KB
|
Digtool - A Virtualization-Based Framework for Detecting Kernel Vulnerabilities.eng.srt
|
26.9 KB
|
Digtool - A Virtualization-Based Framework for Detecting Kernel Vulnerabilities.eng.text
|
18.5 KB
|
Digtool - A Virtualization-Based Framework for Detecting Kernel Vulnerabilities.eng.tsv
|
21.7 KB
|
Digtool - A Virtualization-Based Framework for Detecting Kernel Vulnerabilities.eng.txt
|
24.3 KB
|
Digtool - A Virtualization-Based Framework for Detecting Kernel Vulnerabilities.eng.vtt
|
24.6 KB
|
DR. CHECKER - A Soundy Analysis for Linux Kernel Drivers.eng.json
|
1.9 MB
|
DR. CHECKER - A Soundy Analysis for Linux Kernel Drivers.eng.lrc
|
54.0 KB
|
DR. CHECKER - A Soundy Analysis for Linux Kernel Drivers.eng.srt
|
44.4 KB
|
DR. CHECKER - A Soundy Analysis for Linux Kernel Drivers.eng.text
|
31.3 KB
|
DR. CHECKER - A Soundy Analysis for Linux Kernel Drivers.eng.tsv
|
44.3 KB
|
DR. CHECKER - A Soundy Analysis for Linux Kernel Drivers.eng.txt
|
54.9 KB
|
DR. CHECKER - A Soundy Analysis for Linux Kernel Drivers.eng.vtt
|
40.5 KB
|
Efficient Protection of Path-Sensitive Control Security.eng.json
|
1.0 MB
|
Efficient Protection of Path-Sensitive Control Security.eng.lrc
|
28.9 KB
|
Efficient Protection of Path-Sensitive Control Security.eng.srt
|
24.5 KB
|
Efficient Protection of Path-Sensitive Control Security.eng.text
|
19.1 KB
|
Efficient Protection of Path-Sensitive Control Security.eng.tsv
|
24.6 KB
|
Efficient Protection of Path-Sensitive Control Security.eng.txt
|
29.3 KB
|
Efficient Protection of Path-Sensitive Control Security.eng.vtt
|
23.0 KB
|
Ensuring Authorized Updates in Multi-user Database-Backed Applications.eng.json
|
1.4 MB
|
Ensuring Authorized Updates in Multi-user Database-Backed Applications.eng.lrc
|
37.5 KB
|
Ensuring Authorized Updates in Multi-user Database-Backed Applications.eng.srt
|
32.7 KB
|
Ensuring Authorized Updates in Multi-user Database-Backed Applications.eng.text
|
24.4 KB
|
Ensuring Authorized Updates in Multi-user Database-Backed Applications.eng.tsv
|
31.9 KB
|
Ensuring Authorized Updates in Multi-user Database-Backed Applications.eng.txt
|
38.0 KB
|
Ensuring Authorized Updates in Multi-user Database-Backed Applications.eng.vtt
|
30.3 KB
|
Exploring User Perceptions of Discrimination in Online Targeted Advertising.eng.json
|
1.2 MB
|
Exploring User Perceptions of Discrimination in Online Targeted Advertising.eng.lrc
|
29.9 KB
|
Exploring User Perceptions of Discrimination in Online Targeted Advertising.eng.srt
|
31.2 KB
|
Exploring User Perceptions of Discrimination in Online Targeted Advertising.eng.text
|
23.1 KB
|
Exploring User Perceptions of Discrimination in Online Targeted Advertising.eng.tsv
|
26.9 KB
|
Exploring User Perceptions of Discrimination in Online Targeted Advertising.eng.txt
|
30.2 KB
|
Exploring User Perceptions of Discrimination in Online Targeted Advertising.eng.vtt
|
28.9 KB
|
Extension Breakdown.eng.json
|
1.4 MB
|
Extension Breakdown.eng.lrc
|
36.6 KB
|
Extension Breakdown.eng.srt
|
32.3 KB
|
Extension Breakdown.eng.text
|
24.0 KB
|
Extension Breakdown.eng.tsv
|
31.1 KB
|
Extension Breakdown.eng.txt
|
37.0 KB
|
Extension Breakdown.eng.vtt
|
29.9 KB
|
From Problems to Patterns to Practice.eng.json
|
0.0 KB
|
From Problems to Patterns to Practice.eng.lrc
|
0.0 KB
|
From Problems to Patterns to Practice.eng.srt
|
0.0 KB
|
From Problems to Patterns to Practice.eng.text
|
0.0 KB
|
From Problems to Patterns to Practice.eng.tsv
|
0.0 KB
|
From Problems to Patterns to Practice.eng.txt
|
0.0 KB
|
From Problems to Patterns to Practice.eng.vtt
|
0.0 KB
|
Game of Registrars.eng.json
|
1.5 MB
|
Game of Registrars.eng.lrc
|
39.1 KB
|
Game of Registrars.eng.srt
|
38.7 KB
|
Game of Registrars.eng.text
|
28.7 KB
|
Game of Registrars.eng.tsv
|
34.7 KB
|
Game of Registrars.eng.txt
|
39.5 KB
|
Game of Registrars.eng.vtt
|
35.9 KB
|
Global Measurement of DNS Manipulation.eng.json
|
1.9 MB
|
Global Measurement of DNS Manipulation.eng.lrc
|
54.8 KB
|
Global Measurement of DNS Manipulation.eng.srt
|
47.7 KB
|
Global Measurement of DNS Manipulation.eng.text
|
34.7 KB
|
Global Measurement of DNS Manipulation.eng.tsv
|
46.2 KB
|
Global Measurement of DNS Manipulation.eng.txt
|
55.6 KB
|
Global Measurement of DNS Manipulation.eng.vtt
|
43.9 KB
|
Hacking in Darkness - Return-oriented Programming against Secure Enclaves.eng.json
|
1.2 MB
|
Hacking in Darkness - Return-oriented Programming against Secure Enclaves.eng.lrc
|
31.2 KB
|
Hacking in Darkness - Return-oriented Programming against Secure Enclaves.eng.srt
|
35.3 KB
|
Hacking in Darkness - Return-oriented Programming against Secure Enclaves.eng.text
|
23.8 KB
|
Hacking in Darkness - Return-oriented Programming against Secure Enclaves.eng.tsv
|
28.1 KB
|
Hacking in Darkness - Return-oriented Programming against Secure Enclaves.eng.txt
|
31.5 KB
|
Hacking in Darkness - Return-oriented Programming against Secure Enclaves.eng.vtt
|
32.0 KB
|
HELP - Helper-Enabled In-Band Device Pairing.eng.json
|
927.5 KB
|
HELP - Helper-Enabled In-Band Device Pairing.eng.lrc
|
23.6 KB
|
HELP - Helper-Enabled In-Band Device Pairing.eng.srt
|
24.6 KB
|
HELP - Helper-Enabled In-Band Device Pairing.eng.text
|
18.7 KB
|
HELP - Helper-Enabled In-Band Device Pairing.eng.tsv
|
21.5 KB
|
HELP - Helper-Enabled In-Band Device Pairing.eng.txt
|
23.8 KB
|
HELP - Helper-Enabled In-Band Device Pairing.eng.vtt
|
23.0 KB
|
How Double-Fetch Situations turn into Double-Fetch Vulnerabilities.eng.json
|
1.1 MB
|
How Double-Fetch Situations turn into Double-Fetch Vulnerabilities.eng.lrc
|
28.6 KB
|
How Double-Fetch Situations turn into Double-Fetch Vulnerabilities.eng.srt
|
28.7 KB
|
How Double-Fetch Situations turn into Double-Fetch Vulnerabilities.eng.text
|
20.3 KB
|
How Double-Fetch Situations turn into Double-Fetch Vulnerabilities.eng.tsv
|
25.1 KB
|
How Double-Fetch Situations turn into Double-Fetch Vulnerabilities.eng.txt
|
29.0 KB
|
How Double-Fetch Situations turn into Double-Fetch Vulnerabilities.eng.vtt
|
26.3 KB
|
How the Web Tangled Itself.eng.json
|
2.0 MB
|
How the Web Tangled Itself.eng.lrc
|
57.0 KB
|
How the Web Tangled Itself.eng.srt
|
44.7 KB
|
How the Web Tangled Itself.eng.text
|
34.9 KB
|
How the Web Tangled Itself.eng.tsv
|
47.9 KB
|
How the Web Tangled Itself.eng.txt
|
57.9 KB
|
How the Web Tangled Itself.eng.vtt
|
41.8 KB
|
I Have No Idea What I'm Doing - On the Usability of Deploying HTTPS.eng.json
|
1.4 MB
|
I Have No Idea What I'm Doing - On the Usability of Deploying HTTPS.eng.lrc
|
36.5 KB
|
I Have No Idea What I'm Doing - On the Usability of Deploying HTTPS.eng.srt
|
38.1 KB
|
I Have No Idea What I'm Doing - On the Usability of Deploying HTTPS.eng.text
|
27.8 KB
|
I Have No Idea What I'm Doing - On the Usability of Deploying HTTPS.eng.tsv
|
32.8 KB
|
I Have No Idea What I'm Doing - On the Usability of Deploying HTTPS.eng.txt
|
36.8 KB
|
I Have No Idea What I'm Doing - On the Usability of Deploying HTTPS.eng.vtt
|
35.2 KB
|
Identifier Binding Attacks and Defenses in Software-Defined Networks.eng.json
|
1.4 MB
|
Identifier Binding Attacks and Defenses in Software-Defined Networks.eng.lrc
|
40.5 KB
|
Identifier Binding Attacks and Defenses in Software-Defined Networks.eng.srt
|
34.1 KB
|
Identifier Binding Attacks and Defenses in Software-Defined Networks.eng.text
|
26.3 KB
|
Identifier Binding Attacks and Defenses in Software-Defined Networks.eng.tsv
|
34.4 KB
|
Identifier Binding Attacks and Defenses in Software-Defined Networks.eng.txt
|
41.0 KB
|
Identifier Binding Attacks and Defenses in Software-Defined Networks.eng.vtt
|
31.8 KB
|
Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing.eng.json
|
1.2 MB
|
Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing.eng.lrc
|
31.7 KB
|
Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing.eng.srt
|
33.8 KB
|
Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing.eng.text
|
24.2 KB
|
Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing.eng.tsv
|
28.5 KB
|
Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing.eng.txt
|
32.0 KB
|
Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing.eng.vtt
|
31.1 KB
|
kAFL - Hardware-Assisted Feedback Fuzzing for OS Kernels.eng.json
|
1.1 MB
|
kAFL - Hardware-Assisted Feedback Fuzzing for OS Kernels.eng.lrc
|
29.8 KB
|
kAFL - Hardware-Assisted Feedback Fuzzing for OS Kernels.eng.srt
|
27.8 KB
|
kAFL - Hardware-Assisted Feedback Fuzzing for OS Kernels.eng.text
|
19.3 KB
|
kAFL - Hardware-Assisted Feedback Fuzzing for OS Kernels.eng.tsv
|
25.3 KB
|
kAFL - Hardware-Assisted Feedback Fuzzing for OS Kernels.eng.txt
|
30.2 KB
|
kAFL - Hardware-Assisted Feedback Fuzzing for OS Kernels.eng.vtt
|
25.3 KB
|
Locally Differentially Private Protocols for Frequency Estimation.eng.json
|
835.5 KB
|
Locally Differentially Private Protocols for Frequency Estimation.eng.lrc
|
22.5 KB
|
Locally Differentially Private Protocols for Frequency Estimation.eng.srt
|
21.5 KB
|
Locally Differentially Private Protocols for Frequency Estimation.eng.text
|
14.7 KB
|
Locally Differentially Private Protocols for Frequency Estimation.eng.tsv
|
19.1 KB
|
Locally Differentially Private Protocols for Frequency Estimation.eng.txt
|
22.8 KB
|
Locally Differentially Private Protocols for Frequency Estimation.eng.vtt
|
19.6 KB
|
Loophole - Timing Attacks on Shared Event Loops in Chrome.eng.json
|
1.1 MB
|
Loophole - Timing Attacks on Shared Event Loops in Chrome.eng.lrc
|
27.0 KB
|
Loophole - Timing Attacks on Shared Event Loops in Chrome.eng.srt
|
28.1 KB
|
Loophole - Timing Attacks on Shared Event Loops in Chrome.eng.text
|
20.1 KB
|
Loophole - Timing Attacks on Shared Event Loops in Chrome.eng.tsv
|
24.0 KB
|
Loophole - Timing Attacks on Shared Event Loops in Chrome.eng.txt
|
27.3 KB
|
Loophole - Timing Attacks on Shared Event Loops in Chrome.eng.vtt
|
25.9 KB
|
Malton - Towards On-Device Non-Invasive Mobile Malware Analysis for ART.eng.json
|
1.1 MB
|
Malton - Towards On-Device Non-Invasive Mobile Malware Analysis for ART.eng.lrc
|
30.7 KB
|
Malton - Towards On-Device Non-Invasive Mobile Malware Analysis for ART.eng.srt
|
34.4 KB
|
Malton - Towards On-Device Non-Invasive Mobile Malware Analysis for ART.eng.text
|
21.7 KB
|
Malton - Towards On-Device Non-Invasive Mobile Malware Analysis for ART.eng.tsv
|
27.0 KB
|
Malton - Towards On-Device Non-Invasive Mobile Malware Analysis for ART.eng.txt
|
31.1 KB
|
Malton - Towards On-Device Non-Invasive Mobile Malware Analysis for ART.eng.vtt
|
30.8 KB
|
MCMix - Anonymous Messaging via Secure Multiparty Computation.eng.json
|
1.1 MB
|
MCMix - Anonymous Messaging via Secure Multiparty Computation.eng.lrc
|
32.8 KB
|
MCMix - Anonymous Messaging via Secure Multiparty Computation.eng.srt
|
26.2 KB
|
MCMix - Anonymous Messaging via Secure Multiparty Computation.eng.text
|
20.6 KB
|
MCMix - Anonymous Messaging via Secure Multiparty Computation.eng.tsv
|
27.4 KB
|
MCMix - Anonymous Messaging via Secure Multiparty Computation.eng.txt
|
33.3 KB
|
MCMix - Anonymous Messaging via Secure Multiparty Computation.eng.vtt
|
24.5 KB
|
Measuring HTTPS Adoption on the Web.eng.json
|
1.7 MB
|
Measuring HTTPS Adoption on the Web.eng.lrc
|
49.7 KB
|
Measuring HTTPS Adoption on the Web.eng.srt
|
40.5 KB
|
Measuring HTTPS Adoption on the Web.eng.text
|
28.8 KB
|
Measuring HTTPS Adoption on the Web.eng.tsv
|
40.8 KB
|
Measuring HTTPS Adoption on the Web.eng.txt
|
50.5 KB
|
Measuring HTTPS Adoption on the Web.eng.vtt
|
37.1 KB
|
Measuring the Insecurity of Mobile Deep Links of Android.eng.json
|
1.5 MB
|
Measuring the Insecurity of Mobile Deep Links of Android.eng.lrc
|
37.6 KB
|
Measuring the Insecurity of Mobile Deep Links of Android.eng.srt
|
39.1 KB
|
Measuring the Insecurity of Mobile Deep Links of Android.eng.text
|
26.8 KB
|
Measuring the Insecurity of Mobile Deep Links of Android.eng.tsv
|
33.1 KB
|
Measuring the Insecurity of Mobile Deep Links of Android.eng.txt
|
38.0 KB
|
Measuring the Insecurity of Mobile Deep Links of Android.eng.vtt
|
35.6 KB
|
MPI - Multiple Perspective Attack Investigation.eng.json
|
1.0 MB
|
MPI - Multiple Perspective Attack Investigation.eng.lrc
|
27.9 KB
|
MPI - Multiple Perspective Attack Investigation.eng.srt
|
30.0 KB
|
MPI - Multiple Perspective Attack Investigation.eng.text
|
20.2 KB
|
MPI - Multiple Perspective Attack Investigation.eng.tsv
|
24.6 KB
|
MPI - Multiple Perspective Attack Investigation.eng.txt
|
28.2 KB
|
MPI - Multiple Perspective Attack Investigation.eng.vtt
|
27.2 KB
|
Neural Nets Can Learn Function Type Signatures From Binaries.eng.json
|
1.2 MB
|
Neural Nets Can Learn Function Type Signatures From Binaries.eng.lrc
|
30.9 KB
|
Neural Nets Can Learn Function Type Signatures From Binaries.eng.srt
|
32.2 KB
|
Neural Nets Can Learn Function Type Signatures From Binaries.eng.text
|
24.1 KB
|
Neural Nets Can Learn Function Type Signatures From Binaries.eng.tsv
|
27.9 KB
|
Neural Nets Can Learn Function Type Signatures From Binaries.eng.txt
|
31.1 KB
|
Neural Nets Can Learn Function Type Signatures From Binaries.eng.vtt
|
30.0 KB
|
Ninja - Towards Transparent Tracing and Debugging on ARM.eng.json
|
966.2 KB
|
Ninja - Towards Transparent Tracing and Debugging on ARM.eng.lrc
|
26.0 KB
|
Ninja - Towards Transparent Tracing and Debugging on ARM.eng.srt
|
26.5 KB
|
Ninja - Towards Transparent Tracing and Debugging on ARM.eng.text
|
19.5 KB
|
Ninja - Towards Transparent Tracing and Debugging on ARM.eng.tsv
|
23.2 KB
|
Ninja - Towards Transparent Tracing and Debugging on ARM.eng.txt
|
26.3 KB
|
Ninja - Towards Transparent Tracing and Debugging on ARM.eng.vtt
|
24.6 KB
|
On the effectiveness of mitigations against floating-point timing channels.eng.json
|
1.6 MB
|
On the effectiveness of mitigations against floating-point timing channels.eng.lrc
|
47.4 KB
|
On the effectiveness of mitigations against floating-point timing channels.eng.srt
|
38.6 KB
|
On the effectiveness of mitigations against floating-point timing channels.eng.text
|
27.5 KB
|
On the effectiveness of mitigations against floating-point timing channels.eng.tsv
|
38.9 KB
|
On the effectiveness of mitigations against floating-point timing channels.eng.txt
|
48.2 KB
|
On the effectiveness of mitigations against floating-point timing channels.eng.vtt
|
35.3 KB
|
Opening Remarks and Awards.eng.json
|
651.5 KB
|
Opening Remarks and Awards.eng.lrc
|
18.0 KB
|
Opening Remarks and Awards.eng.srt
|
17.7 KB
|
Opening Remarks and Awards.eng.text
|
11.9 KB
|
Opening Remarks and Awards.eng.tsv
|
15.2 KB
|
Opening Remarks and Awards.eng.txt
|
18.2 KB
|
Opening Remarks and Awards.eng.vtt
|
16.1 KB
|
ORide - A Privacy-Preserving yet Accountable Ride-Hailing Service.eng.json
|
1.2 MB
|
ORide - A Privacy-Preserving yet Accountable Ride-Hailing Service.eng.lrc
|
33.1 KB
|
ORide - A Privacy-Preserving yet Accountable Ride-Hailing Service.eng.srt
|
29.3 KB
|
ORide - A Privacy-Preserving yet Accountable Ride-Hailing Service.eng.text
|
22.4 KB
|
ORide - A Privacy-Preserving yet Accountable Ride-Hailing Service.eng.tsv
|
28.4 KB
|
ORide - A Privacy-Preserving yet Accountable Ride-Hailing Service.eng.txt
|
33.6 KB
|
ORide - A Privacy-Preserving yet Accountable Ride-Hailing Service.eng.vtt
|
27.3 KB
|
Oscar - A Practical Page-Permissions-Based Scheme.eng.json
|
1.2 MB
|
Oscar - A Practical Page-Permissions-Based Scheme.eng.lrc
|
31.7 KB
|
Oscar - A Practical Page-Permissions-Based Scheme.eng.srt
|
32.5 KB
|
Oscar - A Practical Page-Permissions-Based Scheme.eng.text
|
23.8 KB
|
Oscar - A Practical Page-Permissions-Based Scheme.eng.tsv
|
28.2 KB
|
Oscar - A Practical Page-Permissions-Based Scheme.eng.txt
|
32.0 KB
|
Oscar - A Practical Page-Permissions-Based Scheme.eng.vtt
|
30.0 KB
|
OSS-Fuzz - Google's continuous fuzzing service for open source software.eng.json
|
1.8 MB
|
OSS-Fuzz - Google's continuous fuzzing service for open source software.eng.lrc
|
45.4 KB
|
OSS-Fuzz - Google's continuous fuzzing service for open source software.eng.srt
|
51.4 KB
|
OSS-Fuzz - Google's continuous fuzzing service for open source software.eng.text
|
31.8 KB
|
OSS-Fuzz - Google's continuous fuzzing service for open source software.eng.tsv
|
39.8 KB
|
OSS-Fuzz - Google's continuous fuzzing service for open source software.eng.txt
|
45.9 KB
|
OSS-Fuzz - Google's continuous fuzzing service for open source software.eng.vtt
|
45.8 KB
|
PDF Mirage - Content Masking Attack Against Information-Based Online Services.eng.json
|
1.2 MB
|
PDF Mirage - Content Masking Attack Against Information-Based Online Services.eng.lrc
|
38.8 KB
|
PDF Mirage - Content Masking Attack Against Information-Based Online Services.eng.srt
|
28.0 KB
|
PDF Mirage - Content Masking Attack Against Information-Based Online Services.eng.text
|
20.9 KB
|
PDF Mirage - Content Masking Attack Against Information-Based Online Services.eng.tsv
|
31.0 KB
|
PDF Mirage - Content Masking Attack Against Information-Based Online Services.eng.txt
|
39.5 KB
|
PDF Mirage - Content Masking Attack Against Information-Based Online Services.eng.vtt
|
25.9 KB
|
Phoenix - Rebirth of a Cryptographic Password-Hardening Service.eng.json
|
1.1 MB
|
Phoenix - Rebirth of a Cryptographic Password-Hardening Service.eng.lrc
|
28.2 KB
|
Phoenix - Rebirth of a Cryptographic Password-Hardening Service.eng.srt
|
29.1 KB
|
Phoenix - Rebirth of a Cryptographic Password-Hardening Service.eng.text
|
21.2 KB
|
Phoenix - Rebirth of a Cryptographic Password-Hardening Service.eng.tsv
|
25.2 KB
|
Phoenix - Rebirth of a Cryptographic Password-Hardening Service.eng.txt
|
28.5 KB
|
Phoenix - Rebirth of a Cryptographic Password-Hardening Service.eng.vtt
|
26.9 KB
|
Picking Up My Tab.eng.json
|
846.3 KB
|
Picking Up My Tab.eng.lrc
|
22.9 KB
|
Picking Up My Tab.eng.srt
|
22.7 KB
|
Picking Up My Tab.eng.text
|
16.1 KB
|
Picking Up My Tab.eng.tsv
|
19.9 KB
|
Picking Up My Tab.eng.txt
|
23.2 KB
|
Picking Up My Tab.eng.vtt
|
20.9 KB
|
PlatPal - Detecting Malicious Documents with Platform Diversity.eng.json
|
1.2 MB
|
PlatPal - Detecting Malicious Documents with Platform Diversity.eng.lrc
|
32.1 KB
|
PlatPal - Detecting Malicious Documents with Platform Diversity.eng.srt
|
30.5 KB
|
PlatPal - Detecting Malicious Documents with Platform Diversity.eng.text
|
21.8 KB
|
PlatPal - Detecting Malicious Documents with Platform Diversity.eng.tsv
|
27.6 KB
|
PlatPal - Detecting Malicious Documents with Platform Diversity.eng.txt
|
32.5 KB
|
PlatPal - Detecting Malicious Documents with Platform Diversity.eng.vtt
|
28.0 KB
|
Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts.eng.json
|
1.2 MB
|
Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts.eng.lrc
|
35.2 KB
|
Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts.eng.srt
|
29.8 KB
|
Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts.eng.text
|
21.3 KB
|
Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts.eng.tsv
|
29.2 KB
|
Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts.eng.txt
|
35.7 KB
|
Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts.eng.vtt
|
27.3 KB
|
Predicting the Resilience of Obfuscated Code.eng.json
|
1.1 MB
|
Predicting the Resilience of Obfuscated Code.eng.lrc
|
33.3 KB
|
Predicting the Resilience of Obfuscated Code.eng.srt
|
26.3 KB
|
Predicting the Resilience of Obfuscated Code.eng.text
|
20.3 KB
|
Predicting the Resilience of Obfuscated Code.eng.tsv
|
27.7 KB
|
Predicting the Resilience of Obfuscated Code.eng.txt
|
33.8 KB
|
Predicting the Resilience of Obfuscated Code.eng.vtt
|
24.6 KB
|
PrimeAbort - A Timer-Free High-Precision L3 Cache Attack using Intel TSX.eng.json
|
1.6 MB
|
PrimeAbort - A Timer-Free High-Precision L3 Cache Attack using Intel TSX.eng.lrc
|
48.0 KB
|
PrimeAbort - A Timer-Free High-Precision L3 Cache Attack using Intel TSX.eng.srt
|
37.7 KB
|
PrimeAbort - A Timer-Free High-Precision L3 Cache Attack using Intel TSX.eng.text
|
28.7 KB
|
PrimeAbort - A Timer-Free High-Precision L3 Cache Attack using Intel TSX.eng.tsv
|
39.7 KB
|
PrimeAbort - A Timer-Free High-Precision L3 Cache Attack using Intel TSX.eng.txt
|
48.8 KB
|
PrimeAbort - A Timer-Free High-Precision L3 Cache Attack using Intel TSX.eng.vtt
|
35.1 KB
|
Qapla - Policy compliance for database-backed systems.eng.json
|
1.7 MB
|
Qapla - Policy compliance for database-backed systems.eng.lrc
|
51.0 KB
|
Qapla - Policy compliance for database-backed systems.eng.srt
|
40.9 KB
|
Qapla - Policy compliance for database-backed systems.eng.text
|
31.5 KB
|
Qapla - Policy compliance for database-backed systems.eng.tsv
|
42.6 KB
|
Qapla - Policy compliance for database-backed systems.eng.txt
|
51.8 KB
|
Qapla - Policy compliance for database-backed systems.eng.vtt
|
38.1 KB
|
REM - Resource-Efficient Mining for Blockchains.eng.json
|
1.1 MB
|
REM - Resource-Efficient Mining for Blockchains.eng.lrc
|
28.2 KB
|
REM - Resource-Efficient Mining for Blockchains.eng.srt
|
29.6 KB
|
REM - Resource-Efficient Mining for Blockchains.eng.text
|
21.0 KB
|
REM - Resource-Efficient Mining for Blockchains.eng.tsv
|
25.2 KB
|
REM - Resource-Efficient Mining for Blockchains.eng.txt
|
28.5 KB
|
REM - Resource-Efficient Mining for Blockchains.eng.vtt
|
27.2 KB
|
Reverse Engineering x86 Processor Microcode.eng.json
|
888.2 KB
|
Reverse Engineering x86 Processor Microcode.eng.lrc
|
25.9 KB
|
Reverse Engineering x86 Processor Microcode.eng.srt
|
23.1 KB
|
Reverse Engineering x86 Processor Microcode.eng.text
|
16.2 KB
|
Reverse Engineering x86 Processor Microcode.eng.tsv
|
21.6 KB
|
Reverse Engineering x86 Processor Microcode.eng.txt
|
26.2 KB
|
Reverse Engineering x86 Processor Microcode.eng.vtt
|
21.1 KB
|
ROTE - Rollback Protection for Trusted Execution.eng.json
|
1.5 MB
|
ROTE - Rollback Protection for Trusted Execution.eng.lrc
|
37.3 KB
|
ROTE - Rollback Protection for Trusted Execution.eng.srt
|
40.8 KB
|
ROTE - Rollback Protection for Trusted Execution.eng.text
|
28.5 KB
|
ROTE - Rollback Protection for Trusted Execution.eng.tsv
|
33.5 KB
|
ROTE - Rollback Protection for Trusted Execution.eng.txt
|
37.6 KB
|
ROTE - Rollback Protection for Trusted Execution.eng.vtt
|
37.4 KB
|
Same-Origin Policy - Evaluation in Modern Browsers.eng.json
|
1.3 MB
|
Same-Origin Policy - Evaluation in Modern Browsers.eng.lrc
|
35.0 KB
|
Same-Origin Policy - Evaluation in Modern Browsers.eng.srt
|
31.7 KB
|
Same-Origin Policy - Evaluation in Modern Browsers.eng.text
|
21.8 KB
|
Same-Origin Policy - Evaluation in Modern Browsers.eng.tsv
|
29.4 KB
|
Same-Origin Policy - Evaluation in Modern Browsers.eng.txt
|
35.5 KB
|
Same-Origin Policy - Evaluation in Modern Browsers.eng.vtt
|
28.9 KB
|
See No Evil, Hear No Evil, Feel No Evil.eng.json
|
1.4 MB
|
See No Evil, Hear No Evil, Feel No Evil.eng.lrc
|
39.7 KB
|
See No Evil, Hear No Evil, Feel No Evil.eng.srt
|
34.5 KB
|
See No Evil, Hear No Evil, Feel No Evil.eng.text
|
25.4 KB
|
See No Evil, Hear No Evil, Feel No Evil.eng.tsv
|
33.5 KB
|
See No Evil, Hear No Evil, Feel No Evil.eng.txt
|
40.2 KB
|
See No Evil, Hear No Evil, Feel No Evil.eng.vtt
|
31.8 KB
|
Seeing Through The Same Lens.eng.json
|
1.3 MB
|
Seeing Through The Same Lens.eng.lrc
|
33.6 KB
|
Seeing Through The Same Lens.eng.srt
|
34.5 KB
|
Seeing Through The Same Lens.eng.text
|
25.6 KB
|
Seeing Through The Same Lens.eng.tsv
|
30.2 KB
|
Seeing Through The Same Lens.eng.txt
|
33.9 KB
|
Seeing Through The Same Lens.eng.vtt
|
32.0 KB
|
SLEUTH - Real-time Attack Scenario Reconstruction from COTS Audit Data.eng.json
|
1.2 MB
|
SLEUTH - Real-time Attack Scenario Reconstruction from COTS Audit Data.eng.lrc
|
30.6 KB
|
SLEUTH - Real-time Attack Scenario Reconstruction from COTS Audit Data.eng.srt
|
31.2 KB
|
SLEUTH - Real-time Attack Scenario Reconstruction from COTS Audit Data.eng.text
|
23.2 KB
|
SLEUTH - Real-time Attack Scenario Reconstruction from COTS Audit Data.eng.tsv
|
27.4 KB
|
SLEUTH - Real-time Attack Scenario Reconstruction from COTS Audit Data.eng.txt
|
30.9 KB
|
SLEUTH - Real-time Attack Scenario Reconstruction from COTS Audit Data.eng.vtt
|
29.0 KB
|
SmartAuth - User-Centered Authorization for the Internet of Things.eng.json
|
1.2 MB
|
SmartAuth - User-Centered Authorization for the Internet of Things.eng.lrc
|
31.6 KB
|
SmartAuth - User-Centered Authorization for the Internet of Things.eng.srt
|
32.5 KB
|
SmartAuth - User-Centered Authorization for the Internet of Things.eng.text
|
23.3 KB
|
SmartAuth - User-Centered Authorization for the Internet of Things.eng.tsv
|
28.0 KB
|
SmartAuth - User-Centered Authorization for the Internet of Things.eng.txt
|
31.9 KB
|
SmartAuth - User-Centered Authorization for the Internet of Things.eng.vtt
|
29.9 KB
|
SmartPool - Practical Decentralized Pooled Mining.eng.json
|
1.3 MB
|
SmartPool - Practical Decentralized Pooled Mining.eng.lrc
|
34.8 KB
|
SmartPool - Practical Decentralized Pooled Mining.eng.srt
|
35.1 KB
|
SmartPool - Practical Decentralized Pooled Mining.eng.text
|
23.5 KB
|
SmartPool - Practical Decentralized Pooled Mining.eng.tsv
|
29.9 KB
|
SmartPool - Practical Decentralized Pooled Mining.eng.txt
|
35.2 KB
|
SmartPool - Practical Decentralized Pooled Mining.eng.vtt
|
31.8 KB
|
Speeding up detection of SHA-1 collision attacks.eng.json
|
1.1 MB
|
Speeding up detection of SHA-1 collision attacks.eng.lrc
|
30.7 KB
|
Speeding up detection of SHA-1 collision attacks.eng.srt
|
27.0 KB
|
Speeding up detection of SHA-1 collision attacks.eng.text
|
19.2 KB
|
Speeding up detection of SHA-1 collision attacks.eng.tsv
|
25.6 KB
|
Speeding up detection of SHA-1 collision attacks.eng.txt
|
31.1 KB
|
Speeding up detection of SHA-1 collision attacks.eng.vtt
|
24.8 KB
|
Strong and Efficient Cache Side-Channel Protection.eng.json
|
1.2 MB
|
Strong and Efficient Cache Side-Channel Protection.eng.lrc
|
32.1 KB
|
Strong and Efficient Cache Side-Channel Protection.eng.srt
|
29.8 KB
|
Strong and Efficient Cache Side-Channel Protection.eng.text
|
21.2 KB
|
Strong and Efficient Cache Side-Channel Protection.eng.tsv
|
27.4 KB
|
Strong and Efficient Cache Side-Channel Protection.eng.txt
|
32.5 KB
|
Strong and Efficient Cache Side-Channel Protection.eng.vtt
|
27.3 KB
|
Syntia - Synthesizing the Semantics of Obfuscated Code.eng.json
|
1.3 MB
|
Syntia - Synthesizing the Semantics of Obfuscated Code.eng.lrc
|
36.7 KB
|
Syntia - Synthesizing the Semantics of Obfuscated Code.eng.srt
|
33.6 KB
|
Syntia - Synthesizing the Semantics of Obfuscated Code.eng.text
|
22.3 KB
|
Syntia - Synthesizing the Semantics of Obfuscated Code.eng.tsv
|
30.5 KB
|
Syntia - Synthesizing the Semantics of Obfuscated Code.eng.txt
|
37.3 KB
|
Syntia - Synthesizing the Semantics of Obfuscated Code.eng.vtt
|
30.4 KB
|
Telling Your Secrets without Page Faults.eng.json
|
1.1 MB
|
Telling Your Secrets without Page Faults.eng.lrc
|
33.1 KB
|
Telling Your Secrets without Page Faults.eng.srt
|
26.3 KB
|
Telling Your Secrets without Page Faults.eng.text
|
20.5 KB
|
Telling Your Secrets without Page Faults.eng.tsv
|
27.6 KB
|
Telling Your Secrets without Page Faults.eng.txt
|
33.6 KB
|
Telling Your Secrets without Page Faults.eng.vtt
|
24.6 KB
|
The Loopix Anonymity System.eng.json
|
1.4 MB
|
The Loopix Anonymity System.eng.lrc
|
43.6 KB
|
The Loopix Anonymity System.eng.srt
|
33.7 KB
|
The Loopix Anonymity System.eng.text
|
25.1 KB
|
The Loopix Anonymity System.eng.tsv
|
35.8 KB
|
The Loopix Anonymity System.eng.txt
|
44.3 KB
|
The Loopix Anonymity System.eng.vtt
|
31.2 KB
|
Towards Efficient Heap Overflow Discovery.eng.json
|
992.3 KB
|
Towards Efficient Heap Overflow Discovery.eng.lrc
|
26.2 KB
|
Towards Efficient Heap Overflow Discovery.eng.srt
|
27.6 KB
|
Towards Efficient Heap Overflow Discovery.eng.text
|
19.5 KB
|
Towards Efficient Heap Overflow Discovery.eng.tsv
|
23.3 KB
|
Towards Efficient Heap Overflow Discovery.eng.txt
|
26.4 KB
|
Towards Efficient Heap Overflow Discovery.eng.vtt
|
25.3 KB
|
Towards Practical Tools for Side Channel Aware Software Engineering.eng.json
|
1.3 MB
|
Towards Practical Tools for Side Channel Aware Software Engineering.eng.lrc
|
35.3 KB
|
Towards Practical Tools for Side Channel Aware Software Engineering.eng.srt
|
36.0 KB
|
Towards Practical Tools for Side Channel Aware Software Engineering.eng.text
|
27.5 KB
|
Towards Practical Tools for Side Channel Aware Software Engineering.eng.tsv
|
31.9 KB
|
Towards Practical Tools for Side Channel Aware Software Engineering.eng.txt
|
35.6 KB
|
Towards Practical Tools for Side Channel Aware Software Engineering.eng.vtt
|
33.6 KB
|
Transcend - Detecting Concept Drift in Malware Classification Models.eng.json
|
1.0 MB
|
Transcend - Detecting Concept Drift in Malware Classification Models.eng.lrc
|
25.2 KB
|
Transcend - Detecting Concept Drift in Malware Classification Models.eng.srt
|
28.1 KB
|
Transcend - Detecting Concept Drift in Malware Classification Models.eng.text
|
19.8 KB
|
Transcend - Detecting Concept Drift in Malware Classification Models.eng.tsv
|
22.9 KB
|
Transcend - Detecting Concept Drift in Malware Classification Models.eng.txt
|
25.4 KB
|
Transcend - Detecting Concept Drift in Malware Classification Models.eng.vtt
|
25.8 KB
|
TrustBase - An Architecture to Repair and Strengthen.eng.json
|
1.5 MB
|
TrustBase - An Architecture to Repair and Strengthen.eng.lrc
|
41.2 KB
|
TrustBase - An Architecture to Repair and Strengthen.eng.srt
|
39.1 KB
|
TrustBase - An Architecture to Repair and Strengthen.eng.text
|
29.6 KB
|
TrustBase - An Architecture to Repair and Strengthen.eng.tsv
|
36.2 KB
|
TrustBase - An Architecture to Repair and Strengthen.eng.txt
|
41.6 KB
|
TrustBase - An Architecture to Repair and Strengthen.eng.vtt
|
36.4 KB
|
Understanding the Mirai Botnet.eng.json
|
1.3 MB
|
Understanding the Mirai Botnet.eng.lrc
|
36.1 KB
|
Understanding the Mirai Botnet.eng.srt
|
32.6 KB
|
Understanding the Mirai Botnet.eng.text
|
24.5 KB
|
Understanding the Mirai Botnet.eng.tsv
|
31.2 KB
|
Understanding the Mirai Botnet.eng.txt
|
36.5 KB
|
Understanding the Mirai Botnet.eng.vtt
|
30.3 KB
|
USB Snooping Made Easy - Crosstalk Leakage Attacks on USB Hubs.eng.json
|
828.2 KB
|
USB Snooping Made Easy - Crosstalk Leakage Attacks on USB Hubs.eng.lrc
|
20.5 KB
|
USB Snooping Made Easy - Crosstalk Leakage Attacks on USB Hubs.eng.srt
|
23.7 KB
|
USB Snooping Made Easy - Crosstalk Leakage Attacks on USB Hubs.eng.text
|
15.6 KB
|
USB Snooping Made Easy - Crosstalk Leakage Attacks on USB Hubs.eng.tsv
|
18.4 KB
|
USB Snooping Made Easy - Crosstalk Leakage Attacks on USB Hubs.eng.txt
|
20.7 KB
|
USB Snooping Made Easy - Crosstalk Leakage Attacks on USB Hubs.eng.vtt
|
21.4 KB
|
Vale - Verifying High-Performance Cryptographic Assembly Code.eng.json
|
1.5 MB
|
Vale - Verifying High-Performance Cryptographic Assembly Code.eng.lrc
|
42.8 KB
|
Vale - Verifying High-Performance Cryptographic Assembly Code.eng.srt
|
37.5 KB
|
Vale - Verifying High-Performance Cryptographic Assembly Code.eng.text
|
29.1 KB
|
Vale - Verifying High-Performance Cryptographic Assembly Code.eng.tsv
|
36.9 KB
|
Vale - Verifying High-Performance Cryptographic Assembly Code.eng.txt
|
43.3 KB
|
Vale - Verifying High-Performance Cryptographic Assembly Code.eng.vtt
|
35.1 KB
|
Venerable Variadic Vulnerabilities Vanquished.eng.json
|
1.0 MB
|
Venerable Variadic Vulnerabilities Vanquished.eng.lrc
|
31.3 KB
|
Venerable Variadic Vulnerabilities Vanquished.eng.srt
|
24.9 KB
|
Venerable Variadic Vulnerabilities Vanquished.eng.text
|
17.7 KB
|
Venerable Variadic Vulnerabilities Vanquished.eng.tsv
|
25.4 KB
|
Venerable Variadic Vulnerabilities Vanquished.eng.txt
|
31.9 KB
|
Venerable Variadic Vulnerabilities Vanquished.eng.vtt
|
22.8 KB
|
vTZ - Virtualizing ARM TrustZone.eng.json
|
1.2 MB
|
vTZ - Virtualizing ARM TrustZone.eng.lrc
|
30.5 KB
|
vTZ - Virtualizing ARM TrustZone.eng.srt
|
32.1 KB
|
vTZ - Virtualizing ARM TrustZone.eng.text
|
23.5 KB
|
vTZ - Virtualizing ARM TrustZone.eng.tsv
|
27.4 KB
|
vTZ - Virtualizing ARM TrustZone.eng.txt
|
30.7 KB
|
vTZ - Virtualizing ARM TrustZone.eng.vtt
|
29.7 KB
|
Walkie-Talkie.eng.json
|
1.8 MB
|
Walkie-Talkie.eng.lrc
|
46.2 KB
|
Walkie-Talkie.eng.srt
|
44.0 KB
|
Walkie-Talkie.eng.text
|
31.5 KB
|
Walkie-Talkie.eng.tsv
|
39.9 KB
|
Walkie-Talkie.eng.txt
|
46.7 KB
|
Walkie-Talkie.eng.vtt
|
40.4 KB
|
When the Weakest Link is Strong.eng.json
|
1.7 MB
|
When the Weakest Link is Strong.eng.lrc
|
48.4 KB
|
When the Weakest Link is Strong.eng.srt
|
41.8 KB
|
When the Weakest Link is Strong.eng.text
|
30.5 KB
|
When the Weakest Link is Strong.eng.tsv
|
40.8 KB
|
When the Weakest Link is Strong.eng.txt
|
49.1 KB
|
When the Weakest Link is Strong.eng.vtt
|
38.5 KB
|
When Your Threat Model Is - Everything - Defensive Security in Modern Newsrooms.eng.json
|
2.9 MB
|
When Your Threat Model Is - Everything - Defensive Security in Modern Newsrooms.eng.lrc
|
79.3 KB
|
When Your Threat Model Is - Everything - Defensive Security in Modern Newsrooms.eng.srt
|
66.3 KB
|
When Your Threat Model Is - Everything - Defensive Security in Modern Newsrooms.eng.text
|
48.9 KB
|
When Your Threat Model Is - Everything - Defensive Security in Modern Newsrooms.eng.tsv
|
66.8 KB
|
When Your Threat Model Is - Everything - Defensive Security in Modern Newsrooms.eng.txt
|
80.4 KB
|
When Your Threat Model Is - Everything - Defensive Security in Modern Newsrooms.eng.vtt
|
61.1 KB
|
/.../USENIX Security 2017 Technical Sessions USENIX_files/
|
analytics.js
|
45.2 KB
|
application-octet-stream.png
|
0.2 KB
|
application-pdf.png
|
0.3 KB
|
css_mMMIpDBXDqo0rCZrN7FoMlBPY0tKvHCE04XYURHXl9M.css
|
610.1 KB
|
css_mTaWTa-gjA-dVa8tJl4KV4v7oKx8qHNzCSd2Zupzqn4.css
|
9.6 KB
|
css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css
|
3.8 KB
|
css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css
|
5.4 KB
|
js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js
|
20.5 KB
|
js_AQDKCRqaqaAAAzbvxcaEQBooKEQA-dFTfff7tzCklI8.js
|
14.0 KB
|
js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js
|
120.3 KB
|
js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js
|
26.8 KB
|
js_qq8Htu2Ei-eV_IteNYMM8zM4yBe6NOtuXBD56RXHvN4.js
|
9.9 KB
|
js_zsU7pE_En9PuEzx00IjN_iCxIwgABAiEwJNkh1iTG9k.js
|
8.2 KB
|
kissner_lea_100x115.png
|
17.2 KB
|
kowalczyk_ellen_110x115.png
|
23.0 KB
|
narayan_shankar_100x115.png
|
24.8 KB
|
package-x-generic.png
|
0.3 KB
|
pdf.svg
|
0.5 KB
|
sec17_wordmark_stacked.svg
|
11.5 KB
|
serebryany_konstantin_100x115.png
|
22.0 KB
|
slides.svg
|
0.7 KB
|
usenix-locked.png
|
1.4 KB
|
video.svg
|
0.8 KB
|
/.../USENIX Security 2017 USENIX_files/
|
acmqueue_600x240_1.png
|
4.7 KB
|
analytics.js
|
45.2 KB
|
baidu_150x60.png
|
3.0 KB
|
bit_150x60.png
|
7.4 KB
|
cisco_300x120.png
|
6.5 KB
|
css_mMMIpDBXDqo0rCZrN7FoMlBPY0tKvHCE04XYURHXl9M.css
|
610.1 KB
|
css_mTaWTa-gjA-dVa8tJl4KV4v7oKx8qHNzCSd2Zupzqn4.css
|
9.6 KB
|
css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css
|
3.8 KB
|
css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css
|
5.4 KB
|
dmtf_600x240.png
|
3.2 KB
|
facebook_2016_300x120_1.png
|
4.8 KB
|
freebsdfoundation_600x240_0.png
|
3.4 KB
|
ibm_research_stacked_300x120_0.png
|
5.6 KB
|
js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js
|
20.5 KB
|
js_AQDKCRqaqaAAAzbvxcaEQBooKEQA-dFTfff7tzCklI8.js
|
14.0 KB
|
js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js
|
120.3 KB
|
js_PACmgStbFksqYzX-HlEqBZWNu18Gac4c9Dc2EzyjEsM.js
|
8.3 KB
|
js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js
|
26.8 KB
|
js_zsU7pE_En9PuEzx00IjN_iCxIwgABAiEwJNkh1iTG9k.js
|
8.2 KB
|
mars_horizontal_300x120.png
|
2.8 KB
|
netflix_300x120_0.png
|
6.2 KB
|
nostarch_600x240_1.png
|
2.6 KB
|
nsf_300x120_v2_1.png
|
17.0 KB
|
sec17_button_180.png
|
7.7 KB
|
sec17_wordmark_stacked.svg
|
11.5 KB
|
sec17_wordmark_stacked_002.svg
|
11.5 KB
|
sheraton_vancouver_600.png
|
487.7 KB
|
usenix_logo_300x150_neat_2.png
|
15.0 KB
|
visa_research_300x120.png
|
5.4 KB
|
yubico_300x120_1.png
|
3.8 KB
|
/USENIX Security 2018/
|
27th USENIX Security Symposium Grid.htm
|
405.4 KB
|
A Bad Dream - Subverting Trusted Platform Module While You Are Sleeping.mp4
|
26.1 MB
|
A Sense of Time for JavaScript and Node.js.mp4
|
18.9 MB
|
A4NT - Author Attribute Anonymity by Adversarial Training of Neural Machine Translation.mp4
|
22.9 MB
|
ACES - Automatic Compartments for Embedded Systems.mp4
|
13.1 MB
|
Acquisitional Rule-based Engine for Discovering Internet-of-Things Devices.mp4
|
22.1 MB
|
All Your GPS Are Belong To Us - Towards Stealthy Manipulation of Road Navigation Systems.mp4
|
20.1 MB
|
An Empirical Analysis of Anonymity in Zcash.mp4
|
18.5 MB
|
An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications.mp4
|
19.0 MB
|
Analogy Cyber Security-From 0101 to Mixed Signals.mp4
|
48.9 MB
|
Analysis of Privacy Protections in Fitness Tracking Social Networks -or- You can run.mp4
|
25.3 MB
|
Arbitrum - Scalable, private smart contracts.mp4
|
19.8 MB
|
ATtention Spanned - Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem.mp4
|
19.3 MB
|
AttriGuard - A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning.mp4
|
16.9 MB
|
Automatic Heap Layout Manipulation for Exploitation.mp4
|
20.3 MB
|
Bamboozling Certificate Authorities with BGP.mp4
|
25.9 MB
|
Better managed than memorized Studying the Impact of Managers on Password Strength and Reuse.mp4
|
26.7 MB
|
BlackIoT - IoT Botnet of High Wattage Devices Can Disrupt the Power Grid.mp4
|
32.9 MB
|
BurnBox - Self-Revocable Encryption in a World Of Compelled Access.mp4
|
20.4 MB
|
Charm - Facilitating Dynamic Analysis of Device Drivers of Mobile Systems.mp4
|
22.1 MB
|
Chipmunk or Pepe Using Acoustical Analysis to Detect Voice-Channel Fraud at Scale.mp4
|
48.2 MB
|
CommanderSong - A Systematic Approach for Practical Adversarial Voice Recognition.mp4
|
19.6 MB
|
DATA - Differential Address Trace Analysis - Finding Address-based Side-Channels in Binaries.mp4
|
18.2 MB
|
Debloating Software through Piece-Wise Compilation and Loading.mp4
|
17.3 MB
|
DelegaTEE - Brokered Delegation Using Trusted Execution Environments.mp4
|
23.3 MB
|
Dependence-Preserving Data Compaction for Scalable Forensic Analysis.mp4
|
23.1 MB
|
Discovering Flaws in Security-Focused Static Analysis Tools for Android using Systematic Mutation.mp4
|
22.8 MB
|
DIZK - A Distributed Zero Knowledge Proof System.mp4
|
15.3 MB
|
Efail - Breaking S MIME and OpenPGP Email Encryption using Exfiltration Channels.mp4
|
17.1 MB
|
Effective Detection of Multimedia Protocol Tunneling using Machine Learning.mp4
|
18.5 MB
|
Enabling Refinable Cross-Host Attack Investigation with Efficient Data Flow Tagging and Tracking.mp4
|
18.7 MB
|
End-to-End Measurements of Email Spoofing Attacks.mp4
|
24.1 MB
|
End-Users Get Maneuvered - Empirical Analysis of Redirection Hijacking in Content Delivery Networks.mp4
|
17.2 MB
|
Enter the Hydra - Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts.mp4
|
34.5 MB
|
Erays - Reverse Engineering Ethereum's Opaque Smart Contracts.mp4
|
19.0 MB
|
FANCI - Feature-based Automated NXDomain Classification and Intelligence.mp4
|
15.2 MB
|
Fast and Service-preserving Recovery from Malware Infections Using CRIU.mp4
|
18.0 MB
|
Fear the Reaper - Characterization and Fast Detection of Card Skimmers.mp4
|
19.2 MB
|
FlowCog - Context-aware Semantics Extraction and Analysis of Information Flow Leaks in Android Apps.mp4
|
20.4 MB
|
Foreshadow - Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution.mp4
|
26.2 MB
|
Forgetting of Passwords - Ecological Theory and Data.mp4
|
19.3 MB
|
Formal Security Analysis of Neural Networks using Symbolic Intervals.mp4
|
20.5 MB
|
Fp-Scanner - The Privacy Implications of Browser Fingerprint Inconsistencies.mp4
|
21.5 MB
|
Freezing the Web - A Study of ReDoS Vulnerabilities in JavaScript-based Web Servers.mp4
|
18.0 MB
|
From Patching Delays to Infection Symptoms.mp4
|
19.8 MB
|
FUZE - Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities.mp4
|
20.2 MB
|
GAZELLE - A Low Latency Framework for Secure Neural Network Inference.mp4
|
23.8 MB
|
Guarder - A Tunable Secure Allocator.mp4
|
17.0 MB
|
HeapHopper - Bringing Bounded Model Checking to Heap Implementation Security.mp4
|
11.8 MB
|
How Do Tor Users Interact With Onion Services.mp4
|
17.8 MB
|
IMIX - In-Process Memory Isolation EXtension.mp4
|
12.0 MB
|
Inception - System-Wide Security Testing of Real-World Embedded Systems Software.mp4
|
17.5 MB
|
Injected and Delivered - Fabricating Implicit Control over Actuation Systems by Spoofing.mp4
|
21.5 MB
|
Malicious Management Unit - Why Stopping Cache Attacks in Software is Harder Than You Think.mp4
|
21.0 MB
|
Man-in-the-Machine - Exploiting Ill-Secured Communication Inside the Computer.mp4
|
18.9 MB
|
Medical Device Cybersecurity through the FDA Lens.mp4
|
46.4 MB
|
Meltdown - Reading Kernel Memory from User Space.mp4
|
23.3 MB
|
Modelling and Analysis of a Hierarchy of Distance Bounding Attacks.mp4
|
27.3 MB
|
MoonShine - Optimizing OS Fuzzer Seed Selection with Trace Distillation.mp4
|
20.7 MB
|
NAVEX - Precise and Scalable Exploit Generation for Dynamic Web Applications.mp4
|
22.5 MB
|
NetHide - Secure and Practical Network Topology Obfuscation.mp4
|
24.3 MB
|
O Single Sign-Off, Where Art Thou An Empirical Analysis of Single Sign-On.mp4
|
17.7 MB
|
Off-Path TCP Exploit - How Wireless Routers Can Jeopardize Your Secrets.mp4
|
20.0 MB
|
One&Done - A Single-Decryption EM-Based Attack on OpenSSL's Constant-Time Blinded RSA.mp4
|
23.5 MB
|
Plug and Prey Measuring the Commoditization of Cybercrime via Online Anonymous Markets.mp4
|
21.1 MB
|
Polisis - Automated Analysis and Presentation of Privacy Policies Using Deep Learning.mp4
|
22.6 MB
|
Practical Accountability of Secret Processes.mp4
|
18.8 MB
|
Precise and Accurate Patch Presence Test for Binaries.mp4
|
19.0 MB
|
Privacy for Tigers.mp4
|
39.0 MB
|
Q - Why Do Keynote Speakers Keep Suggesting That Improving Security Is Possible.mp4
|
62.8 MB
|
QSYM - A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing.mp4
|
21.7 MB
|
Quack - Scalable Remote Measurement of Application-Layer Censorship.mp4
|
23.5 MB
|
Rampart - Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks.mp4
|
20.5 MB
|
Reading Thieves' Cant - Automatically Identifying and Understanding Dark Jargons from Cybercrime.mp4
|
20.1 MB
|
Rethinking Access Control and Authentication for the Home Internet of Things (IoT).mp4
|
23.5 MB
|
Return Of Bleichenbacher's Oracle Threat (ROBOT).mp4
|
17.9 MB
|
SAD THUG - Structural Anomaly Detection for Transmissions of High-value Information Using Graphics.mp4
|
16.4 MB
|
SAQL - A Stream-based Query System for Real-Time Abnormal System Behavior Detection.mp4
|
25.8 MB
|
Schrödinger's RAT - Profiling the Stakeholders in the Remote Access Trojan Ecosystem.mp4
|
12.8 MB
|
Security Namespace - Making Linux Security Frameworks Available to Containers.mp4
|
26.1 MB
|
Sensitive Information Tracking in Commodity IoT.mp4
|
18.4 MB
|
Shielding Software From Privileged Side-Channel Attacks.mp4
|
20.7 MB
|
Simple Password-Hardened Encryption Services.mp4
|
11.7 MB
|
Skill Squatting Attacks on Amazon Alexa.mp4
|
25.0 MB
|
Solving the Next Billion-People Privacy Problem.mp4
|
46.2 MB
|
Tackling runtime-based obfuscation in Android with TIRO.mp4
|
16.8 MB
|
teEther - Gnawing at Ethereum to Automatically Exploit Smart Contracts.mp4
|
27.1 MB
|
The aftermath of a crypto-ransomware attack at a large academic institution.mp4
|
13.9 MB
|
The Battle for New York - A Case Study of Applied Digital Threat Modeling at the Enterprise Level.mp4
|
21.7 MB
|
The Broken Shield - Measuring Revocation Effectiveness in the Windows Code-Signing PKI.mp4
|
19.8 MB
|
The Dangers of Key Reuse - Practical Attacks on IPsec IKE.mp4
|
22.2 MB
|
The Guard's Dilemma - Efficient Code-Reuse Attacks Against Intel SGX.mp4
|
25.0 MB
|
The Law and Economics of Bug Bounties.mp4
|
50.4 MB
|
The Rewards and Costs of Stronger Passwords in a University - Linking Password Lifetime to Strength.mp4
|
23.5 MB
|
The Second Crypto War-What's Different Now.mp4
|
39.4 MB
|
The Secure Socket API - TLS as an Operating System Service.mp4
|
19.3 MB
|
Towards a Secure Zero-rating Framework with Three Parties.mp4
|
16.4 MB
|
Towards Predicting Efficient and Anonymous Tor Circuits.mp4
|
16.6 MB
|
Translation Leak-aside Buffer - Defeating Cache Side-channel Protections with TLB Attacks.mp4
|
30.3 MB
|
Turning Your Weakness Into a Strength - Watermarking Deep Neural Networks by Backdooring.mp4
|
23.3 MB
|
Understanding the Reproducibility of Crowd-reported Security Vulnerabilities.mp4
|
32.4 MB
|
Unveiling and Quantifying Facebook Exploitation of Sensitive Personal Data for Advertising Purposes.mp4
|
22.9 MB
|
USENIX Security 2018 Full Proceedings Interior.pdf
|
107.3 MB
|
USENIX Security 2018 Full Proceedings.epub
|
89.9 MB
|
USENIX Security 2018 Full Proceedings.mobi
|
155.2 MB
|
USENIX Security 2018 Full Proceedings.pdf
|
108.5 MB
|
USENIX Security 2018 Program at a Glance USENIX.htm
|
81.1 KB
|
USENIX Security 2018 Program errata_slip.pdf
|
297.1 KB
|
USENIX Security 2018 Technical Sessions USENIX.htm
|
547.6 KB
|
USENIX Security 2018 USENIX.htm
|
106.9 KB
|
Vetting Single Sign-On SDK Implementations via Symbolic Reasoning.mp4
|
18.5 MB
|
We Still Don't Have Secure Cross-Domain Requests - an Empirical Study of CORS.mp4
|
22.7 MB
|
When Does Machine Learning FAIL Generalized Transferability for Evasion and Poisoning Attacks.mp4
|
38.2 MB
|
Who Is Answering My Queries - Understanding and Characterizing Interception.mp4
|
20.5 MB
|
Who Left Open the Cookie Jar A Comprehensive Evaluation of Third-Party Cookie Policies.mp4
|
17.4 MB
|
With Great Training Comes Great Vulnerability - Practical Attacks against Transfer Learning.mp4
|
27.6 MB
|
WPSE - Fortifying Web Protocols via Browser-Side Security Monitoring.mp4
|
13.6 MB
|
/.../27th USENIX Security Symposium Grid_files/
|
app-apple.svg
|
7.9 KB
|
app-google.svg
|
4.5 KB
|
bootstrap-custom.css
|
94.0 KB
|
custom-screen.css
|
0.3 KB
|
jquery.js
|
97.2 KB
|
jquery_002.js
|
2.6 KB
|
jquery_003.js
|
96.4 KB
|
jquery_004.js
|
38.3 KB
|
loading-3x.gif
|
13.3 KB
|
main.js
|
73.7 KB
|
main-current.css
|
135.9 KB
|
responsive.css
|
6.4 KB
|
/.../USENIX Security 2018 captions/
|
A Bad Dream - Subverting Trusted Platform Module While You Are Sleeping.eng.srt
|
54.3 KB
|
A Sense of Time for JavaScript and Node.js.eng.srt
|
61.6 KB
|
A4NT - Author Attribute Anonymity by Adversarial Training of Neural Machine Translation.eng.srt
|
70.5 KB
|
ACES - Automatic Compartments for Embedded Systems.eng.srt
|
53.6 KB
|
Acquisitional Rule-based Engine for Discovering Internet-of-Things Devices.eng.srt
|
37.5 KB
|
All Your GPS Are Belong To Us - Towards Stealthy Manipulation of Road Navigation Systems.eng.srt
|
55.3 KB
|
An Empirical Analysis of Anonymity in Zcash.eng.srt
|
60.1 KB
|
An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications.eng.srt
|
45.9 KB
|
Analogy Cyber Security-From 0101 to Mixed Signals.eng.srt
|
105.1 KB
|
Analysis of Privacy Protections in Fitness Tracking Social Networks -or- You can run.eng.srt
|
54.1 KB
|
Arbitrum - Scalable, private smart contracts.eng.srt
|
58.8 KB
|
ATtention Spanned - Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem.eng.srt
|
55.5 KB
|
AttriGuard - A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning.eng.json
|
1.0 MB
|
AttriGuard - A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning.eng.lrc
|
27.8 KB
|
AttriGuard - A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning.eng.srt
|
29.1 KB
|
AttriGuard - A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning.eng.text
|
20.4 KB
|
AttriGuard - A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning.eng.tsv
|
24.5 KB
|
AttriGuard - A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning.eng.txt
|
28.1 KB
|
AttriGuard - A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning.eng.vtt
|
26.6 KB
|
Automatic Heap Layout Manipulation for Exploitation.eng.srt
|
68.7 KB
|
Bamboozling Certificate Authorities with BGP.eng.srt
|
65.6 KB
|
Better managed than memorized Studying the Impact of Managers on Password Strength and Reuse.eng.srt
|
76.8 KB
|
BlackIoT - IoT Botnet of High Wattage Devices Can Disrupt the Power Grid.eng.srt
|
65.1 KB
|
BurnBox - Self-Revocable Encryption in a World Of Compelled Access.eng.srt
|
62.0 KB
|
Charm - Facilitating Dynamic Analysis of Device Drivers of Mobile Systems.eng.srt
|
50.2 KB
|
Chipmunk or Pepe Using Acoustical Analysis to Detect Voice-Channel Fraud at Scale.eng.srt
|
142.2 KB
|
CommanderSong - A Systematic Approach for Practical Adversarial Voice Recognition.eng.srt
|
53.0 KB
|
DATA - Differential Address Trace Analysis - Finding Address-based Side-Channels in Binaries.eng.srt
|
58.5 KB
|
Debloating Software through Piece-Wise Compilation and Loading.eng.srt
|
57.8 KB
|
DelegaTEE - Brokered Delegation Using Trusted Execution Environments.eng.srt
|
76.3 KB
|
Dependence-Preserving Data Compaction for Scalable Forensic Analysis.eng.srt
|
58.4 KB
|
Discovering Flaws in Security-Focused Static Analysis Tools for Android using Systematic Mutation.eng.srt
|
50.0 KB
|
DIZK - A Distributed Zero Knowledge Proof System.eng.srt
|
51.6 KB
|
Efail - Breaking S MIME and OpenPGP Email Encryption using Exfiltration Channels.eng.json
|
967.3 KB
|
Efail - Breaking S MIME and OpenPGP Email Encryption using Exfiltration Channels.eng.lrc
|
23.9 KB
|
Efail - Breaking S MIME and OpenPGP Email Encryption using Exfiltration Channels.eng.srt
|
24.1 KB
|
Efail - Breaking S MIME and OpenPGP Email Encryption using Exfiltration Channels.eng.text
|
18.4 KB
|
Efail - Breaking S MIME and OpenPGP Email Encryption using Exfiltration Channels.eng.tsv
|
21.5 KB
|
Efail - Breaking S MIME and OpenPGP Email Encryption using Exfiltration Channels.eng.txt
|
24.1 KB
|
Efail - Breaking S MIME and OpenPGP Email Encryption using Exfiltration Channels.eng.vtt
|
22.5 KB
|
Effective Detection of Multimedia Protocol Tunneling using Machine Learning.eng.srt
|
63.7 KB
|
Enabling Refinable Cross-Host Attack Investigation with Efficient Data Flow Tagging and Tracking.eng.srt
|
42.3 KB
|
End-to-End Measurements of Email Spoofing Attacks.eng.srt
|
56.4 KB
|
End-Users Get Maneuvered - Empirical Analysis of Redirection Hijacking in Content Delivery Networks.eng.srt
|
40.6 KB
|
Enter the Hydra - Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts.eng.srt
|
85.1 KB
|
Erays - Reverse Engineering Ethereum's Opaque Smart Contracts.eng.srt
|
55.2 KB
|
FANCI - Feature-based Automated NXDomain Classification and Intelligence.eng.srt
|
43.7 KB
|
Fast and Service-preserving Recovery from Malware Infections Using CRIU.eng.srt
|
74.7 KB
|
Fear the Reaper - Characterization and Fast Detection of Card Skimmers.eng.srt
|
54.9 KB
|
FlowCog - Context-aware Semantics Extraction and Analysis of Information Flow Leaks in Android Apps.eng.srt
|
49.5 KB
|
Foreshadow - Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution.eng.json
|
1.2 MB
|
Foreshadow - Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution.eng.lrc
|
34.5 KB
|
Foreshadow - Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution.eng.srt
|
30.2 KB
|
Foreshadow - Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution.eng.text
|
22.3 KB
|
Foreshadow - Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution.eng.tsv
|
29.1 KB
|
Foreshadow - Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution.eng.txt
|
35.0 KB
|
Foreshadow - Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution.eng.vtt
|
27.9 KB
|
Forgetting of Passwords - Ecological Theory and Data.eng.srt
|
38.7 KB
|
Formal Security Analysis of Neural Networks using Symbolic Intervals.eng.srt
|
53.2 KB
|
Fp-Scanner - The Privacy Implications of Browser Fingerprint Inconsistencies.eng.srt
|
56.8 KB
|
Freezing the Web - A Study of ReDoS Vulnerabilities in JavaScript-based Web Servers.eng.srt
|
52.3 KB
|
From Patching Delays to Infection Symptoms.eng.srt
|
54.3 KB
|
FUZE - Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities.eng.json
|
822.9 KB
|
FUZE - Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities.eng.lrc
|
25.9 KB
|
FUZE - Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities.eng.srt
|
20.4 KB
|
FUZE - Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities.eng.text
|
15.3 KB
|
FUZE - Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities.eng.tsv
|
21.1 KB
|
FUZE - Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities.eng.txt
|
26.3 KB
|
FUZE - Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities.eng.vtt
|
18.9 KB
|
GAZELLE - A Low Latency Framework for Secure Neural Network Inference.eng.json
|
1.1 MB
|
GAZELLE - A Low Latency Framework for Secure Neural Network Inference.eng.lrc
|
29.6 KB
|
GAZELLE - A Low Latency Framework for Secure Neural Network Inference.eng.srt
|
29.2 KB
|
GAZELLE - A Low Latency Framework for Secure Neural Network Inference.eng.text
|
21.9 KB
|
GAZELLE - A Low Latency Framework for Secure Neural Network Inference.eng.tsv
|
26.3 KB
|
GAZELLE - A Low Latency Framework for Secure Neural Network Inference.eng.txt
|
29.9 KB
|
GAZELLE - A Low Latency Framework for Secure Neural Network Inference.eng.vtt
|
27.2 KB
|
Guarder - A Tunable Secure Allocator.eng.srt
|
61.0 KB
|
HeapHopper - Bringing Bounded Model Checking to Heap Implementation Security.eng.srt
|
59.0 KB
|
How Do Tor Users Interact With Onion Services.eng.srt
|
55.0 KB
|
IMIX - In-Process Memory Isolation EXtension.eng.srt
|
46.8 KB
|
Inception - System-Wide Security Testing of Real-World Embedded Systems Software.eng.srt
|
49.6 KB
|
Injected and Delivered - Fabricating Implicit Control over Actuation Systems by Spoofing.eng.srt
|
38.1 KB
|
Malicious Management Unit - Why Stopping Cache Attacks in Software is Harder Than You Think.eng.srt
|
63.0 KB
|
Man-in-the-Machine - Exploiting Ill-Secured Communication Inside the Computer.eng.srt
|
47.8 KB
|
Medical Device Cybersecurity through the FDA Lens.eng.srt
|
107.5 KB
|
Meltdown - Reading Kernel Memory from User Space.eng.srt
|
57.5 KB
|
Modelling and Analysis of a Hierarchy of Distance Bounding Attacks.eng.srt
|
59.4 KB
|
MoonShine - Optimizing OS Fuzzer Seed Selection with Trace Distillation.eng.srt
|
66.6 KB
|
NAVEX - Precise and Scalable Exploit Generation for Dynamic Web Applications.eng.srt
|
49.9 KB
|
NetHide - Secure and Practical Network Topology Obfuscation.eng.srt
|
63.0 KB
|
O Single Sign-Off, Where Art Thou An Empirical Analysis of Single Sign-On.eng.srt
|
52.7 KB
|
Off-Path TCP Exploit - How Wireless Routers Can Jeopardize Your Secrets.eng.srt
|
49.8 KB
|
One&Done - A Single-Decryption EM-Based Attack on OpenSSL's Constant-Time Blinded RSA.eng.json
|
1.6 MB
|
One&Done - A Single-Decryption EM-Based Attack on OpenSSL's Constant-Time Blinded RSA.eng.lrc
|
39.9 KB
|
One&Done - A Single-Decryption EM-Based Attack on OpenSSL's Constant-Time Blinded RSA.eng.srt
|
38.4 KB
|
One&Done - A Single-Decryption EM-Based Attack on OpenSSL's Constant-Time Blinded RSA.eng.text
|
29.3 KB
|
One&Done - A Single-Decryption EM-Based Attack on OpenSSL's Constant-Time Blinded RSA.eng.tsv
|
35.3 KB
|
One&Done - A Single-Decryption EM-Based Attack on OpenSSL's Constant-Time Blinded RSA.eng.txt
|
40.3 KB
|
One&Done - A Single-Decryption EM-Based Attack on OpenSSL's Constant-Time Blinded RSA.eng.vtt
|
35.8 KB
|
Plug and Prey Measuring the Commoditization of Cybercrime via Online Anonymous Markets.eng.srt
|
65.0 KB
|
Polisis - Automated Analysis and Presentation of Privacy Policies Using Deep Learning.eng.srt
|
60.6 KB
|
Practical Accountability of Secret Processes.eng.srt
|
89.1 KB
|
Precise and Accurate Patch Presence Test for Binaries.eng.srt
|
59.4 KB
|
Privacy for Tigers.eng.srt
|
126.3 KB
|
Q - Why Do Keynote Speakers Keep Suggesting That Improving Security Is Possible.eng.srt
|
155.9 KB
|
QSYM - A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing.eng.srt
|
51.5 KB
|
Quack - Scalable Remote Measurement of Application-Layer Censorship.eng.srt
|
73.0 KB
|
Rampart - Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks.eng.json
|
1.0 MB
|
Rampart - Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks.eng.lrc
|
26.6 KB
|
Rampart - Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks.eng.srt
|
28.1 KB
|
Rampart - Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks.eng.text
|
20.4 KB
|
Rampart - Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks.eng.tsv
|
23.9 KB
|
Rampart - Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks.eng.txt
|
26.8 KB
|
Rampart - Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks.eng.vtt
|
26.0 KB
|
Reading Thieves' Cant - Automatically Identifying and Understanding Dark Jargons from Cybercrime.eng.srt
|
49.6 KB
|
Rethinking Access Control and Authentication for the Home Internet of Things (IoT).eng.srt
|
63.6 KB
|
Return Of Bleichenbacher's Oracle Threat (ROBOT).eng.srt
|
61.2 KB
|
SAD THUG - Structural Anomaly Detection for Transmissions of High-value Information Using Graphics.eng.srt
|
55.9 KB
|
SAQL - A Stream-based Query System for Real-Time Abnormal System Behavior Detection.eng.srt
|
63.3 KB
|
Schrödinger's RAT - Profiling the Stakeholders in the Remote Access Trojan Ecosystem.eng.srt
|
39.3 KB
|
Security Namespace - Making Linux Security Frameworks Available to Containers.eng.srt
|
87.0 KB
|
Sensitive Information Tracking in Commodity IoT.eng.srt
|
39.3 KB
|
Shielding Software From Privileged Side-Channel Attacks.eng.srt
|
53.0 KB
|
Simple Password-Hardened Encryption Services.eng.srt
|
32.3 KB
|
Skill Squatting Attacks on Amazon Alexa.eng.srt
|
83.0 KB
|
Solving the Next Billion-People Privacy Problem.eng.srt
|
133.4 KB
|
Tackling runtime-based obfuscation in Android with TIRO.eng.srt
|
62.0 KB
|
teEther - Gnawing at Ethereum to Automatically Exploit Smart Contracts.eng.json
|
1.3 MB
|
teEther - Gnawing at Ethereum to Automatically Exploit Smart Contracts.eng.lrc
|
35.2 KB
|
teEther - Gnawing at Ethereum to Automatically Exploit Smart Contracts.eng.srt
|
32.3 KB
|
teEther - Gnawing at Ethereum to Automatically Exploit Smart Contracts.eng.text
|
23.0 KB
|
teEther - Gnawing at Ethereum to Automatically Exploit Smart Contracts.eng.tsv
|
29.8 KB
|
teEther - Gnawing at Ethereum to Automatically Exploit Smart Contracts.eng.txt
|
35.7 KB
|
teEther - Gnawing at Ethereum to Automatically Exploit Smart Contracts.eng.vtt
|
29.7 KB
|
The aftermath of a crypto-ransomware attack at a large academic institution.eng.srt
|
51.6 KB
|
The Battle for New York - A Case Study of Applied Digital Threat Modeling at the Enterprise Level.eng.srt
|
57.1 KB
|
The Broken Shield - Measuring Revocation Effectiveness in the Windows Code-Signing PKI.eng.srt
|
56.9 KB
|
The Dangers of Key Reuse - Practical Attacks on IPsec IKE.eng.srt
|
64.4 KB
|
The Guard's Dilemma - Efficient Code-Reuse Attacks Against Intel SGX.eng.srt
|
63.3 KB
|
The Law and Economics of Bug Bounties.eng.srt
|
133.0 KB
|
The Rewards and Costs of Stronger Passwords in a University - Linking Password Lifetime to Strength.eng.srt
|
65.9 KB
|
The Second Crypto War-What's Different Now.eng.srt
|
131.8 KB
|
The Secure Socket API - TLS as an Operating System Service.eng.srt
|
82.4 KB
|
Towards a Secure Zero-rating Framework with Three Parties.eng.srt
|
51.4 KB
|
Towards Predicting Efficient and Anonymous Tor Circuits.eng.srt
|
63.1 KB
|
Translation Leak-aside Buffer - Defeating Cache Side-channel Protections with TLB Attacks.eng.srt
|
75.1 KB
|
Turning Your Weakness Into a Strength - Watermarking Deep Neural Networks by Backdooring.eng.srt
|
71.5 KB
|
Understanding the Reproducibility of Crowd-reported Security Vulnerabilities.eng.srt
|
53.2 KB
|
Unveiling and Quantifying Facebook Exploitation of Sensitive Personal Data for Advertising Purposes.eng.srt
|
56.8 KB
|
Vetting Single Sign-On SDK Implementations via Symbolic Reasoning.eng.srt
|
35.7 KB
|
We Still Don't Have Secure Cross-Domain Requests - an Empirical Study of CORS.eng.srt
|
50.7 KB
|
When Does Machine Learning FAIL Generalized Transferability for Evasion and Poisoning Attacks.eng.srt
|
69.4 KB
|
Who Is Answering My Queries - Understanding and Characterizing Interception.eng.srt
|
48.5 KB
|
Who Left Open the Cookie Jar A Comprehensive Evaluation of Third-Party Cookie Policies.eng.srt
|
53.5 KB
|
With Great Training Comes Great Vulnerability - Practical Attacks against Transfer Learning.eng.srt
|
58.4 KB
|
WPSE - Fortifying Web Protocols via Browser-Side Security Monitoring.eng.srt
|
47.5 KB
|
/.../USENIX Security 2018 Program at a Glance USENIX_files/
|
analytics.js
|
45.2 KB
|
css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css
|
4.3 KB
|
css_mMMIpDBXDqo0rCZrN7FoMlBPY0tKvHCE04XYURHXl9M.css
|
610.1 KB
|
css_Tvyih1Dm489siBROXzFSkKUCFbsEK9kCr0p3JDiev80.css
|
129.3 KB
|
css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css
|
3.8 KB
|
css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css
|
5.4 KB
|
font-awesome.css
|
26.7 KB
|
js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js
|
20.5 KB
|
js_AQDKCRqaqaAAAzbvxcaEQBooKEQA-dFTfff7tzCklI8.js
|
14.0 KB
|
js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js
|
120.3 KB
|
js_fjSBcoQiz2s5JFYU7Z0v2w3fhgZkax8CZA1Fi71bsVc.js
|
15.9 KB
|
js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js
|
26.8 KB
|
sec18_wordmark_stacked_450x186.png
|
3.7 KB
|
/.../USENIX Security 2018 Technical Sessions USENIX_files/
|
analytics.js
|
45.2 KB
|
application-octet-stream.png
|
0.2 KB
|
application-pdf.png
|
0.3 KB
|
audio.svg
|
0.6 KB
|
balasubramaniyan_vijay_200x230.png
|
18.2 KB
|
css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css
|
4.3 KB
|
css_mMMIpDBXDqo0rCZrN7FoMlBPY0tKvHCE04XYURHXl9M.css
|
610.1 KB
|
css_Tvyih1Dm489siBROXzFSkKUCFbsEK9kCr0p3JDiev80.css
|
129.3 KB
|
css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css
|
3.8 KB
|
css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css
|
5.4 KB
|
donna_dodson_200x230.jpg
|
11.8 KB
|
elazari-bar-on-amit_200x230.jpg
|
14.2 KB
|
font-awesome.css
|
26.7 KB
|
js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js
|
20.5 KB
|
js_AQDKCRqaqaAAAzbvxcaEQBooKEQA-dFTfff7tzCklI8.js
|
14.0 KB
|
js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js
|
120.3 KB
|
js_fjSBcoQiz2s5JFYU7Z0v2w3fhgZkax8CZA1Fi71bsVc.js
|
15.9 KB
|
js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js
|
26.8 KB
|
js_zsU7pE_En9PuEzx00IjN_iCxIwgABAiEwJNkh1iTG9k.js
|
8.2 KB
|
mickens_james_200x230.png
|
24.7 KB
|
monica_lam_200x230.jpg
|
13.9 KB
|
package-x-generic.png
|
0.3 KB
|
paul_kocher_200x230.jpg
|
11.4 KB
|
pdf.svg
|
0.5 KB
|
ross-anderson_200x230.jpg
|
12.3 KB
|
schwartz_susan_200x230.png
|
26.0 KB
|
sec18_wordmark_stacked_450x186.png
|
3.7 KB
|
slides.svg
|
0.7 KB
|
susan_landau_200x230.jpg
|
13.2 KB
|
usenix-locked.png
|
1.4 KB
|
video.svg
|
0.8 KB
|
wenyuanxu_200x230.jpg
|
11.8 KB
|
/.../USENIX Security 2018 USENIX_files/
|
acmqueue_600x240_1.png
|
4.7 KB
|
analytics.js
|
45.2 KB
|
baidu_600x240.png
|
8.4 KB
|
css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css
|
4.3 KB
|
css_mMMIpDBXDqo0rCZrN7FoMlBPY0tKvHCE04XYURHXl9M.css
|
610.1 KB
|
css_Tvyih1Dm489siBROXzFSkKUCFbsEK9kCr0p3JDiev80.css
|
129.3 KB
|
css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css
|
3.8 KB
|
css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css
|
5.4 KB
|
dmtf_600x240.png
|
3.2 KB
|
dropbox_2018_600x240_0.png
|
3.3 KB
|
eff_2018_red_600x240_1.png
|
1.6 KB
|
enck_william_200x230.png
|
23.9 KB
|
facebook_2016_300x120_1.png
|
4.8 KB
|
font-awesome.css
|
26.7 KB
|
freebsdfoundation_600x240_0.png
|
3.4 KB
|
google_600x240_0.png
|
9.0 KB
|
js_1_m_mRX0UrchQnV5E0UZ6141Ts6jK5YnRLQe7J2kaX4.js
|
14.3 KB
|
js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js
|
20.5 KB
|
js_AQDKCRqaqaAAAzbvxcaEQBooKEQA-dFTfff7tzCklI8.js
|
14.0 KB
|
js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js
|
120.3 KB
|
js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js
|
26.8 KB
|
js_zsU7pE_En9PuEzx00IjN_iCxIwgABAiEwJNkh1iTG9k.js
|
8.2 KB
|
nostarch_600x240_1.png
|
2.6 KB
|
nsf_600x240_1.png
|
13.4 KB
|
porter-felt_adrienne_200x230.png
|
23.7 KB
|
sec18_hotel.png
|
500.5 KB
|
sec18_wordmark_stacked_450x186.png
|
8.9 KB
|
sec18_wordmark_stacked_450x186_002.png
|
3.7 KB
|
usenix_logo_300x150_neat_2.png
|
15.0 KB
|
/USENIX Security 2019/
|
28th USENIX Security Symposium Grid.htm
|
439.3 KB
|
50 Ways to Leak Your Data An Exploration of Apps'.mp4
|
14.4 MB
|
A Billion Open Interfaces for Eve and Mallory MitM, DoS, and Tracking.mp4
|
17.8 MB
|
A Study of the Feasibility of Co-located App Attacks against BLE.mp4
|
11.8 MB
|
A Systematic Evaluation of Transient Execution Attacks and Defenses.mp4
|
15.0 MB
|
All Things Considered An Analysis of IoT Devices on Home Networks.mp4
|
15.5 MB
|
All Your Clicks Belong to Me Investigating Click Interception on the Web.mp4
|
19.2 MB
|
ALOHA Auxiliary Loss Optimization for Hypothesis Augmentation.mp4
|
16.8 MB
|
AntiFuzz Impeding Fuzzing Audits of Binary Executables.mp4
|
15.6 MB
|
ATTACK2VEC Leveraging Temporal Word Embeddings to Understand the.mp4
|
14.8 MB
|
Baby Steps towards the Precipice How the Web Became a Scary.mp4
|
52.0 MB
|
Back to the Whiteboard a Principled Approach for the Assessment and.mp4
|
13.6 MB
|
Birthday, Name and Bifacial-security Understanding Passwords.mp4
|
19.9 MB
|
BITE Bitcoin Lightweight Client Privacy using Trusted Execution.mp4
|
17.0 MB
|
Blind Bernoulli Trials A Noninteractive Protocol For Hidden-Weight Coin Flips.mp4
|
16.1 MB
|
CANvas Fast and Inexpensive Automotive Network Mapping.mp4
|
19.3 MB
|
Clinical Computer Security for Victims of Intimate Partner Violence.mp4
|
16.1 MB
|
Cognitive Triaging of Phishing Attacks.mp4
|
14.9 MB
|
Computer Security and Privacy in the Interactions Between Victim.mp4
|
14.9 MB
|
CONFIRM Evaluating Compatibility and Relevance of Control-flow.mp4
|
22.5 MB
|
CSI NN Reverse Engineering of Neural Network Architectures.mp4
|
19.6 MB
|
CT-GAN Malicious Tampering of 3D Medical Imagery using Deep Learning.mp4
|
24.6 MB
|
DEEPVSA Facilitating Value-set Analysis with Deep Learning for.mp4
|
16.0 MB
|
Detecting and Characterizing Lateral Phishing at Scale.mp4
|
16.8 MB
|
Detecting Missing-Check Bugs via Semantic- and Context-Aware.mp4
|
14.4 MB
|
Devils in the Guidance Predicting Logic Vulnerabilities in Payment.mp4
|
11.8 MB
|
Discovering and Understanding the Security Hazards in the.mp4
|
20.0 MB
|
Embracing the - Hack. - A Better Strategy for Team-Defense.mp4
|
39.9 MB
|
EnFuzz Ensemble Fuzzing with Seed Synchronization among Diverse Fuzzers.mp4
|
15.1 MB
|
EnTrust Regulating Sensor Access by Cooperating Programs.mp4
|
21.5 MB
|
ERIM Secure, Efficient In-process Isolation with Protection Keys (MPK).mp4
|
21.6 MB
|
Evaluating Differentially Private Machine Learning in Practice.mp4
|
13.4 MB
|
Evaluating Mobile Messengers for Implementation Vulnerabilities.mp4
|
47.8 MB
|
Evaluating the Contextual Integrity of Privacy Regulation Parents' IoT.mp4
|
20.1 MB
|
EverParse Verified Secure Zero-Copy Parsers for Authenticated Message Formats.mp4
|
18.1 MB
|
Everyone is Different Client-side Diversification for Defending.mp4
|
16.5 MB
|
Exploiting Unprotected I O Operations in AMD's Secure Encrypted Virtualization.mp4
|
14.5 MB
|
FastKitten Practical Smart Contracts on Bitcoin.mp4
|
17.2 MB
|
FIRM-AFL High-Throughput Greybox Fuzzing of IoT Firmware via.mp4
|
16.9 MB
|
From IP ID to Device ID and KASLR Bypass.mp4
|
17.9 MB
|
From Privacy by Design to Data Protection by Design The Challenges of.mp4
|
50.3 MB
|
Fuzzification Anti-Fuzzing Techniques.mp4
|
13.3 MB
|
GRIMOIRE Synthesizing Structure while Fuzzing.mp4
|
15.1 MB
|
HardFails Insights into Software-Exploitable Hardware Bugs.mp4
|
19.2 MB
|
HideMyApp Hiding the Presence of Sensitive Apps on Android.mp4
|
14.0 MB
|
Hiding in Plain Signal Physical Signal Overshadowing Attack on LTE.mp4
|
23.6 MB
|
High Precision Detection of Business Email Compromise.mp4
|
16.9 MB
|
Identifying Cache-Based Side Channels through Secret-Augmented.mp4
|
18.1 MB
|
Iframes Popups Are Dangerous in Mobile WebView Studying and.mp4
|
16.1 MB
|
Improving Robustness of ML Classifiers against Realizable Evasio.mp4
|
17.6 MB
|
Inadvertently Making Cyber Criminals Rich A Comprehensive Study of.mp4
|
20.4 MB
|
in-toto Providing farm-to-table guarantees for bits and bytes.mp4
|
18.8 MB
|
IODINE Verifying Constant-Time Execution of Hardware.mp4
|
14.4 MB
|
JEDI Many-to-Many End-to-End Encryption and Key Delegation for IoT.mp4
|
18.2 MB
|
Johnny, you are fired - Spoofing OpenPGP and S MIME Signatures in Emails.mp4
|
16.6 MB
|
KEPLER Facilitating Control-flow Hijacking Primitive Evaluation for Linux.mp4
|
17.4 MB
|
Leaky Images Targeted Privacy Attacks in the Web.mp4
|
17.9 MB
|
Less is More Quantifying the Security Benefits of Debloating Web Applications.mp4
|
16.9 MB
|
Lessons Learned About Building Secure Software It's About the Developers.mp4
|
38.9 MB
|
Lessons Learned from Evaluating the Robustness of Defenses to.mp4
|
38.7 MB
|
Looking from the Mirror Evaluating IoT Device Security through.mp4
|
14.2 MB
|
Losing the Car Keys Wireless PHY-Layer Insecurity in EV Charging.mp4
|
19.9 MB
|
Misleading Authorship Attribution of Source Code using Adversarial Learning.mp4
|
19.0 MB
|
Mobile Private Contact Discovery at Scale.mp4
|
16.4 MB
|
MOPT Optimized Mutation Scheduling for Fuzzers.mp4
|
18.8 MB
|
No Right to Remain Silent Isolating Malicious Mixes.mp4
|
23.1 MB
|
Not Everything is Dark and Gloomy Power Grid Protections Against IoT.mp4
|
20.6 MB
|
On (The Lack Of) Location Privacy in Crowdsourcing Applications.mp4
|
23.2 MB
|
Origin-sensitive Control Flow Integrity.mp4
|
18.0 MB
|
PAC it up Towards Pointer Integrity using ARM Pointer Authentication.mp4
|
18.0 MB
|
PeX A Permission Check Analysis Framework for Linux Kernel.mp4
|
15.9 MB
|
Platforms in Everything Analyzing Ground-Truth Data on the Anatomy and.mp4
|
17.4 MB
|
Please Pay Inside Evaluating Bluetooth-based Detection of Gas Pump Skimmers.mp4
|
21.6 MB
|
Point Break A Study of Bandwidth Denial-of-Service Attacks against Tor.mp4
|
18.6 MB
|
PolicyLint Investigating Internal Privacy Policy Contradictions on Google.mp4
|
18.1 MB
|
Probability Model Transforming Encoders Against Encoding Attacks.mp4
|
17.6 MB
|
Protecting accounts from credential stuffing with password breach alerting.mp4
|
18.1 MB
|
Protecting Cloud Virtual Machines from Hypervisor and Host Operating.mp4
|
15.8 MB
|
Pythia Remote Oracles for the Masses.mp4
|
17.2 MB
|
RAZOR A Framework for Post-deployment Software Debloating.mp4
|
16.6 MB
|
Reading the Tea leaves A Comparative Analysis of Threat Intelligence.mp4
|
17.9 MB
|
Rendered Private Making GLSL Execution Uniform to Prevent WebGL-based.mp4
|
18.1 MB
|
Robust Website Fingerprinting Through the Cache Occupancy Channel.mp4
|
13.8 MB
|
RVFuzzer Finding Input Validation Bugs in Robotic Vehicles through.mp4
|
17.0 MB
|
SafeHidden An Efficient and Secure Information Hiding Technique Using.mp4
|
24.0 MB
|
Scalable Scanning and Automatic Classification of TLS Padding Oracle.mp4
|
14.7 MB
|
ScatterCache Thwarting Cache Attacks via Cache Set Randomization.mp4
|
16.5 MB
|
Secure Multi-User Content Sharing for Augmented Reality Applications.mp4
|
13.3 MB
|
Security Educational Panel.mp4
|
126.9 MB
|
Security Research and Public Policy.mp4
|
56.6 MB
|
Seeing is Not Believing Camouflage Attacks on Image Scaling Algorithms.mp4
|
16.7 MB
|
Shining Light on Internet-based Crimes Against Children.mp4
|
28.1 MB
|
simTPM User-centric TPM for Mobile Devices.mp4
|
19.1 MB
|
Site Isolation Process Separation for Web Sites within the Browser.mp4
|
13.0 MB
|
Small World with High Risks A Study of Security Threats in the npm Ecosystem.mp4
|
14.2 MB
|
SPOILER Speculative Load Hazards Boost Rowhammer and Cache Attacks.mp4
|
15.4 MB
|
Stack Overflow Considered Helpful Deep Learning Security Nudges Towards.mp4
|
16.4 MB
|
StrongChain Transparent and Collaborative Proof-of-Work Consensus.mp4
|
15.6 MB
|
Tackling the Trust and Safety Crisis.mp4
|
54.0 MB
|
Terminal Brain Damage Exposing the Graceless Degradation in Deep.mp4
|
16.6 MB
|
TESSERACT Eliminating Experimental Bias in Malware Classification.mp4
|
21.3 MB
|
The Anatomy of a Cryptocurrency Pump-and-Dump Scheme.mp4
|
22.1 MB
|
The Art of The Scam Demystifying Honeypots in Ethereum Smart Contracts.mp4
|
15.5 MB
|
The Betrayal At Cloud City An Empirical Analysis Of Cloud-Based Mobile.mp4
|
18.6 MB
|
The CrossPath Attack Disrupting the SDN Control Channel via Shared Links.mp4
|
20.4 MB
|
The KNOB is Broken Exploiting Low Entropy in the Encryption Key.mp4
|
18.6 MB
|
The Secret Sharer Evaluating and Testing Unintended Memorization in.mp4
|
14.7 MB
|
The Spies Hacking our Phones are Going Dark, and We're All in Trouble.mp4
|
53.0 MB
|
The Web's Identity Crisis Understanding the Effectiveness of Website Identity.mp4
|
20.1 MB
|
Towards the Detection of Inconsistencies in Public Security.mp4
|
15.5 MB
|
Tracing Transactions Across Cryptocurrency Ledgers.mp4
|
14.8 MB
|
Understanding and Improving Security and Privacy in Multi-User.mp4
|
18.6 MB
|
Understanding and Securing Device Vulnerabilities through.mp4
|
17.1 MB
|
Understanding iOS-based Crowdturfing Through Hidden UI Analysis.mp4
|
13.5 MB
|
USENIX Security '19.m3u
|
11.1 KB
|
USENIX Security 2019 Full Proceedings interior.pdf
|
209.7 MB
|
USENIX Security 2019 Full Proceedings.pdf
|
210.5 MB
|
USENIX Security 2019 Program at a Glance USENIX.htm
|
85.8 KB
|
USENIX Security 2019 Program errata.pdf
|
234.2 KB
|
USENIX Security 2019 Program errata-2.pdf
|
68.3 KB
|
USENIX Security 2019 Program errata-3.pdf
|
744.0 KB
|
USENIX Security 2019 Program errata-4.pdf
|
98.8 KB
|
USENIX Security 2019 Program errata-5.pdf
|
86.0 KB
|
USENIX Security 2019 Program errata-6.pdf
|
73.7 KB
|
USENIX Security 2019 USENIX.htm
|
132.9 KB
|
Users Really Do Answer Telephone Scams.mp4
|
20.5 MB
|
Utility-Optimized Local Differential Privacy Mechanisms for.mp4
|
19.8 MB
|
UWB-ED Distance Enlargement Attack Detection in Ultra-Wideband.mp4
|
17.4 MB
|
uXOM Efficient eXecute-Only Memory on ARM Cortex-M.mp4
|
18.3 MB
|
VRASED A Verified Hardware Software Co-Design for Remote Attestation.mp4
|
17.7 MB
|
WAVE A Decentralized Authorization Framework with Transitive Delegation.mp4
|
17.2 MB
|
What Are You Searching For A Remote Keylogging Attack.mp4
|
19.0 MB
|
When the Signal is in the Noise Exploiting Diffix's Sticky Noise.mp4
|
15.3 MB
|
Why Do Adversarial Attacks Transfer Explaining Transferability of.mp4
|
17.6 MB
|
Wireless Attacks on Aircraft Instrument Landing Systems.mp4
|
26.3 MB
|
XONN XNOR-based Oblivious Deep Neural Network Inference.mp4
|
15.2 MB
|
/.../28th USENIX Security Symposium Grid_files/
|
app-apple.svg
|
7.9 KB
|
app-google.svg
|
4.5 KB
|
bootstrap-custom.css
|
94.0 KB
|
jquery.js
|
38.3 KB
|
jquery_002.js
|
97.2 KB
|
jquery_003.js
|
2.6 KB
|
jquery_004.js
|
96.4 KB
|
loading-3x.gif
|
13.3 KB
|
main.js
|
73.7 KB
|
main-current.css
|
135.9 KB
|
responsive.css
|
6.4 KB
|
/.../USENIX Security 2019 captions/
|
50 Ways to Leak Your Data An Exploration of Apps'.eng.srt
|
37.1 KB
|
A Billion Open Interfaces for Eve and Mallory MitM, DoS, and Tracking.eng.srt
|
31.5 KB
|
A Study of the Feasibility of Co-located App Attacks against BLE.eng.srt
|
37.9 KB
|
A Systematic Evaluation of Transient Execution Attacks and Defenses.eng.srt
|
33.3 KB
|
All Things Considered An Analysis of IoT Devices on Home Networks.eng.srt
|
38.4 KB
|
All Your Clicks Belong to Me Investigating Click Interception on the Web.eng.srt
|
36.7 KB
|
ALOHA Auxiliary Loss Optimization for Hypothesis Augmentation.eng.srt
|
34.4 KB
|
AntiFuzz Impeding Fuzzing Audits of Binary Executables.eng.srt
|
36.4 KB
|
ATTACK2VEC Leveraging Temporal Word Embeddings to Understand the.eng.srt
|
31.6 KB
|
Baby Steps towards the Precipice How the Web Became a Scary.eng.srt
|
93.3 KB
|
Back to the Whiteboard a Principled Approach for the Assessment and.eng.srt
|
31.0 KB
|
Birthday, Name and Bifacial-security Understanding Passwords.eng.srt
|
28.9 KB
|
BITE Bitcoin Lightweight Client Privacy using Trusted Execution.eng.srt
|
35.5 KB
|
Blind Bernoulli Trials A Noninteractive Protocol For Hidden-Weight Coin Flips.eng.srt
|
33.4 KB
|
CANvas Fast and Inexpensive Automotive Network Mapping.eng.srt
|
32.2 KB
|
Clinical Computer Security for Victims of Intimate Partner Violence.eng.srt
|
37.5 KB
|
Cognitive Triaging of Phishing Attacks.eng.json
|
845.0 KB
|
Cognitive Triaging of Phishing Attacks.eng.lrc
|
24.9 KB
|
Cognitive Triaging of Phishing Attacks.eng.srt
|
21.4 KB
|
Cognitive Triaging of Phishing Attacks.eng.text
|
17.1 KB
|
Cognitive Triaging of Phishing Attacks.eng.tsv
|
21.3 KB
|
Cognitive Triaging of Phishing Attacks.eng.txt
|
25.2 KB
|
Cognitive Triaging of Phishing Attacks.eng.vtt
|
20.2 KB
|
Computer Security and Privacy in the Interactions Between Victim.eng.srt
|
36.7 KB
|
CONFIRM Evaluating Compatibility and Relevance of Control-flow.eng.srt
|
38.6 KB
|
CSI NN Reverse Engineering of Neural Network Architectures.eng.json
|
1.0 MB
|
CSI NN Reverse Engineering of Neural Network Architectures.eng.lrc
|
28.4 KB
|
CSI NN Reverse Engineering of Neural Network Architectures.eng.srt
|
25.5 KB
|
CSI NN Reverse Engineering of Neural Network Architectures.eng.text
|
19.3 KB
|
CSI NN Reverse Engineering of Neural Network Architectures.eng.tsv
|
24.4 KB
|
CSI NN Reverse Engineering of Neural Network Architectures.eng.txt
|
28.7 KB
|
CSI NN Reverse Engineering of Neural Network Architectures.eng.vtt
|
23.7 KB
|
CT-GAN Malicious Tampering of 3D Medical Imagery using Deep Learning.eng.srt
|
36.3 KB
|
DEEPVSA Facilitating Value-set Analysis with Deep Learning for.eng.srt
|
25.5 KB
|
Detecting and Characterizing Lateral Phishing at Scale.eng.srt
|
44.4 KB
|
Detecting Missing-Check Bugs via Semantic- and Context-Aware.eng.srt
|
33.4 KB
|
Devils in the Guidance Predicting Logic Vulnerabilities in Payment.eng.srt
|
27.7 KB
|
Discovering and Understanding the Security Hazards in the.eng.srt
|
34.9 KB
|
Embracing the - Hack. - A Better Strategy for Team-Defense.eng.srt
|
79.7 KB
|
EnFuzz Ensemble Fuzzing with Seed Synchronization among Diverse Fuzzers.eng.srt
|
28.9 KB
|
EnTrust Regulating Sensor Access by Cooperating Programs.eng.srt
|
34.2 KB
|
ERIM Secure, Efficient In-process Isolation with Protection Keys (MPK).eng.srt
|
36.9 KB
|
Evaluating Differentially Private Machine Learning in Practice.eng.srt
|
26.5 KB
|
Evaluating Mobile Messengers for Implementation Vulnerabilities.eng.srt
|
85.1 KB
|
Evaluating the Contextual Integrity of Privacy Regulation Parents' IoT.eng.srt
|
40.1 KB
|
EverParse Verified Secure Zero-Copy Parsers for Authenticated Message Formats.eng.json
|
1.0 MB
|
EverParse Verified Secure Zero-Copy Parsers for Authenticated Message Formats.eng.lrc
|
26.7 KB
|
EverParse Verified Secure Zero-Copy Parsers for Authenticated Message Formats.eng.srt
|
27.6 KB
|
EverParse Verified Secure Zero-Copy Parsers for Authenticated Message Formats.eng.text
|
19.1 KB
|
EverParse Verified Secure Zero-Copy Parsers for Authenticated Message Formats.eng.tsv
|
23.3 KB
|
EverParse Verified Secure Zero-Copy Parsers for Authenticated Message Formats.eng.txt
|
27.0 KB
|
EverParse Verified Secure Zero-Copy Parsers for Authenticated Message Formats.eng.vtt
|
25.2 KB
|
Everyone is Different Client-side Diversification for Defending.eng.srt
|
32.9 KB
|
Exploiting Unprotected I O Operations in AMD's Secure Encrypted Virtualization.eng.srt
|
32.8 KB
|
FastKitten Practical Smart Contracts on Bitcoin.eng.srt
|
36.1 KB
|
FIRM-AFL High-Throughput Greybox Fuzzing of IoT Firmware via.eng.srt
|
29.8 KB
|
From IP ID to Device ID and KASLR Bypass.eng.srt
|
30.6 KB
|
From Privacy by Design to Data Protection by Design The Challenges of.eng.srt
|
76.7 KB
|
Fuzzification Anti-Fuzzing Techniques.eng.srt
|
28.0 KB
|
GRIMOIRE Synthesizing Structure while Fuzzing.eng.srt
|
30.2 KB
|
HardFails Insights into Software-Exploitable Hardware Bugs.eng.srt
|
37.7 KB
|
HideMyApp Hiding the Presence of Sensitive Apps on Android.eng.srt
|
31.5 KB
|
Hiding in Plain Signal Physical Signal Overshadowing Attack on LTE.eng.srt
|
31.3 KB
|
High Precision Detection of Business Email Compromise.eng.srt
|
35.8 KB
|
Identifying Cache-Based Side Channels through Secret-Augmented.eng.srt
|
30.8 KB
|
Iframes Popups Are Dangerous in Mobile WebView Studying and.eng.srt
|
29.2 KB
|
Improving Robustness of ML Classifiers against Realizable Evasio.eng.srt
|
35.6 KB
|
Inadvertently Making Cyber Criminals Rich A Comprehensive Study of.eng.srt
|
41.6 KB
|
in-toto Providing farm-to-table guarantees for bits and bytes.eng.srt
|
38.8 KB
|
IODINE Verifying Constant-Time Execution of Hardware.eng.srt
|
33.4 KB
|
JEDI Many-to-Many End-to-End Encryption and Key Delegation for IoT.eng.srt
|
46.4 KB
|
Johnny, you are fired - Spoofing OpenPGP and S MIME Signatures in Emails.eng.srt
|
32.8 KB
|
KEPLER Facilitating Control-flow Hijacking Primitive Evaluation for Linux.eng.srt
|
34.1 KB
|
Leaky Images Targeted Privacy Attacks in the Web.eng.srt
|
40.4 KB
|
Less is More Quantifying the Security Benefits of Debloating Web Applications.eng.json
|
1.1 MB
|
Less is More Quantifying the Security Benefits of Debloating Web Applications.eng.lrc
|
30.4 KB
|
Less is More Quantifying the Security Benefits of Debloating Web Applications.eng.srt
|
25.8 KB
|
Less is More Quantifying the Security Benefits of Debloating Web Applications.eng.text
|
19.5 KB
|
Less is More Quantifying the Security Benefits of Debloating Web Applications.eng.tsv
|
25.5 KB
|
Less is More Quantifying the Security Benefits of Debloating Web Applications.eng.txt
|
30.8 KB
|
Less is More Quantifying the Security Benefits of Debloating Web Applications.eng.vtt
|
24.0 KB
|
Lessons Learned About Building Secure Software It's About the Developers.eng.srt
|
84.1 KB
|
Lessons Learned from Evaluating the Robustness of Defenses to.eng.srt
|
88.7 KB
|
Looking from the Mirror Evaluating IoT Device Security through.eng.srt
|
29.3 KB
|
Losing the Car Keys Wireless PHY-Layer Insecurity in EV Charging.eng.srt
|
34.8 KB
|
Misleading Authorship Attribution of Source Code using Adversarial Learning.eng.srt
|
39.9 KB
|
Mobile Private Contact Discovery at Scale.eng.srt
|
34.3 KB
|
MOPT Optimized Mutation Scheduling for Fuzzers.eng.srt
|
30.1 KB
|
No Right to Remain Silent Isolating Malicious Mixes.eng.json
|
890.2 KB
|
No Right to Remain Silent Isolating Malicious Mixes.eng.lrc
|
22.4 KB
|
No Right to Remain Silent Isolating Malicious Mixes.eng.srt
|
23.6 KB
|
No Right to Remain Silent Isolating Malicious Mixes.eng.text
|
17.7 KB
|
No Right to Remain Silent Isolating Malicious Mixes.eng.tsv
|
20.3 KB
|
No Right to Remain Silent Isolating Malicious Mixes.eng.txt
|
22.6 KB
|
No Right to Remain Silent Isolating Malicious Mixes.eng.vtt
|
22.0 KB
|
Not Everything is Dark and Gloomy Power Grid Protections Against IoT.eng.srt
|
35.5 KB
|
On (The Lack Of) Location Privacy in Crowdsourcing Applications.eng.srt
|
39.0 KB
|
Origin-sensitive Control Flow Integrity.eng.srt
|
30.0 KB
|
PAC it up Towards Pointer Integrity using ARM Pointer Authentication.eng.srt
|
34.3 KB
|
PeX A Permission Check Analysis Framework for Linux Kernel.eng.srt
|
28.9 KB
|
Platforms in Everything Analyzing Ground-Truth Data on the Anatomy and.eng.srt
|
39.0 KB
|
Please Pay Inside Evaluating Bluetooth-based Detection of Gas Pump Skimmers.eng.srt
|
46.9 KB
|
Point Break A Study of Bandwidth Denial-of-Service Attacks against Tor.eng.srt
|
38.4 KB
|
PolicyLint Investigating Internal Privacy Policy Contradictions on Google.eng.srt
|
33.0 KB
|
Probability Model Transforming Encoders Against Encoding Attacks.eng.srt
|
28.5 KB
|
Protecting accounts from credential stuffing with password breach alerting.eng.srt
|
44.9 KB
|
Protecting Cloud Virtual Machines from Hypervisor and Host Operating.eng.srt
|
31.1 KB
|
Pythia Remote Oracles for the Masses.eng.srt
|
36.7 KB
|
RAZOR A Framework for Post-deployment Software Debloating.eng.srt
|
31.9 KB
|
Reading the Tea leaves A Comparative Analysis of Threat Intelligence.eng.srt
|
31.8 KB
|
Rendered Private Making GLSL Execution Uniform to Prevent WebGL-based.eng.srt
|
30.8 KB
|
Robust Website Fingerprinting Through the Cache Occupancy Channel.eng.srt
|
21.6 KB
|
RVFuzzer Finding Input Validation Bugs in Robotic Vehicles through.eng.srt
|
31.0 KB
|
SafeHidden An Efficient and Secure Information Hiding Technique Using.eng.srt
|
33.8 KB
|
Scalable Scanning and Automatic Classification of TLS Padding Oracle.eng.srt
|
39.6 KB
|
ScatterCache Thwarting Cache Attacks via Cache Set Randomization.eng.srt
|
36.9 KB
|
Secure Multi-User Content Sharing for Augmented Reality Applications.eng.srt
|
32.9 KB
|
Security Educational Panel.eng.srt
|
189.7 KB
|
Security Research and Public Policy.eng.srt
|
86.2 KB
|
Seeing is Not Believing Camouflage Attacks on Image Scaling Algorithms.eng.json
|
990.2 KB
|
Seeing is Not Believing Camouflage Attacks on Image Scaling Algorithms.eng.lrc
|
24.0 KB
|
Seeing is Not Believing Camouflage Attacks on Image Scaling Algorithms.eng.srt
|
28.0 KB
|
Seeing is Not Believing Camouflage Attacks on Image Scaling Algorithms.eng.text
|
18.7 KB
|
Seeing is Not Believing Camouflage Attacks on Image Scaling Algorithms.eng.tsv
|
21.6 KB
|
Seeing is Not Believing Camouflage Attacks on Image Scaling Algorithms.eng.txt
|
24.2 KB
|
Seeing is Not Believing Camouflage Attacks on Image Scaling Algorithms.eng.vtt
|
25.4 KB
|
Shining Light on Internet-based Crimes Against Children.eng.srt
|
119.4 KB
|
simTPM User-centric TPM for Mobile Devices.eng.srt
|
39.0 KB
|
Site Isolation Process Separation for Web Sites within the Browser.eng.srt
|
38.5 KB
|
Small World with High Risks A Study of Security Threats in the npm Ecosystem.eng.json
|
720.3 KB
|
Small World with High Risks A Study of Security Threats in the npm Ecosystem.eng.lrc
|
20.1 KB
|
Small World with High Risks A Study of Security Threats in the npm Ecosystem.eng.srt
|
17.7 KB
|
Small World with High Risks A Study of Security Threats in the npm Ecosystem.eng.text
|
14.1 KB
|
Small World with High Risks A Study of Security Threats in the npm Ecosystem.eng.tsv
|
17.4 KB
|
Small World with High Risks A Study of Security Threats in the npm Ecosystem.eng.txt
|
20.3 KB
|
Small World with High Risks A Study of Security Threats in the npm Ecosystem.eng.vtt
|
16.7 KB
|
SPOILER Speculative Load Hazards Boost Rowhammer and Cache Attacks.eng.srt
|
33.4 KB
|
Stack Overflow Considered Helpful Deep Learning Security Nudges Towards.eng.srt
|
29.5 KB
|
StrongChain Transparent and Collaborative Proof-of-Work Consensus.eng.srt
|
32.6 KB
|
Tackling the Trust and Safety Crisis.eng.srt
|
135.4 KB
|
Terminal Brain Damage Exposing the Graceless Degradation in Deep.eng.srt
|
33.3 KB
|
TESSERACT Eliminating Experimental Bias in Malware Classification.eng.srt
|
35.8 KB
|
The Anatomy of a Cryptocurrency Pump-and-Dump Scheme.eng.srt
|
30.7 KB
|
The Art of The Scam Demystifying Honeypots in Ethereum Smart Contracts.eng.srt
|
43.1 KB
|
The Betrayal At Cloud City An Empirical Analysis Of Cloud-Based Mobile.eng.srt
|
31.2 KB
|
The CrossPath Attack Disrupting the SDN Control Channel via Shared Links.eng.srt
|
29.8 KB
|
The KNOB is Broken Exploiting Low Entropy in the Encryption Key.eng.srt
|
32.0 KB
|
The Secret Sharer Evaluating and Testing Unintended Memorization in.eng.srt
|
38.9 KB
|
The Spies Hacking our Phones are Going Dark, and We're All in Trouble.eng.srt
|
110.8 KB
|
The Web's Identity Crisis Understanding the Effectiveness of Website Identity.eng.srt
|
37.5 KB
|
Towards the Detection of Inconsistencies in Public Security.eng.srt
|
30.3 KB
|
Tracing Transactions Across Cryptocurrency Ledgers.eng.srt
|
37.8 KB
|
Understanding and Improving Security and Privacy in Multi-User.eng.srt
|
41.6 KB
|
Understanding and Securing Device Vulnerabilities through.eng.srt
|
23.9 KB
|
Understanding iOS-based Crowdturfing Through Hidden UI Analysis.eng.srt
|
29.5 KB
|
Users Really Do Answer Telephone Scams.eng.srt
|
34.4 KB
|
Utility-Optimized Local Differential Privacy Mechanisms for.eng.srt
|
27.6 KB
|
UWB-ED Distance Enlargement Attack Detection in Ultra-Wideband.eng.srt
|
32.1 KB
|
uXOM Efficient eXecute-Only Memory on ARM Cortex-M.eng.srt
|
28.8 KB
|
VRASED A Verified Hardware Software Co-Design for Remote Attestation.eng.srt
|
36.4 KB
|
WAVE A Decentralized Authorization Framework with Transitive Delegation.eng.srt
|
42.9 KB
|
What Are You Searching For A Remote Keylogging Attack.eng.srt
|
33.9 KB
|
When the Signal is in the Noise Exploiting Diffix's Sticky Noise.eng.srt
|
30.1 KB
|
Why Do Adversarial Attacks Transfer Explaining Transferability of.eng.srt
|
26.3 KB
|
Wireless Attacks on Aircraft Instrument Landing Systems.eng.json
|
1.2 MB
|
Wireless Attacks on Aircraft Instrument Landing Systems.eng.lrc
|
37.3 KB
|
Wireless Attacks on Aircraft Instrument Landing Systems.eng.srt
|
29.0 KB
|
Wireless Attacks on Aircraft Instrument Landing Systems.eng.text
|
21.4 KB
|
Wireless Attacks on Aircraft Instrument Landing Systems.eng.tsv
|
30.3 KB
|
Wireless Attacks on Aircraft Instrument Landing Systems.eng.txt
|
38.0 KB
|
Wireless Attacks on Aircraft Instrument Landing Systems.eng.vtt
|
26.8 KB
|
XONN XNOR-based Oblivious Deep Neural Network Inference.eng.json
|
825.6 KB
|
XONN XNOR-based Oblivious Deep Neural Network Inference.eng.lrc
|
23.1 KB
|
XONN XNOR-based Oblivious Deep Neural Network Inference.eng.srt
|
21.5 KB
|
XONN XNOR-based Oblivious Deep Neural Network Inference.eng.text
|
15.6 KB
|
XONN XNOR-based Oblivious Deep Neural Network Inference.eng.tsv
|
19.7 KB
|
XONN XNOR-based Oblivious Deep Neural Network Inference.eng.txt
|
23.4 KB
|
XONN XNOR-based Oblivious Deep Neural Network Inference.eng.vtt
|
19.9 KB
|
/.../USENIX Security 2019 Program at a Glance USENIX_files/
|
analytics.js
|
45.2 KB
|
css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css
|
4.3 KB
|
css_mMMIpDBXDqo0rCZrN7FoMlBPY0tKvHCE04XYURHXl9M.css
|
610.1 KB
|
css_Tvyih1Dm489siBROXzFSkKUCFbsEK9kCr0p3JDiev80.css
|
129.3 KB
|
css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css
|
3.8 KB
|
css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css
|
5.4 KB
|
font-awesome.css
|
26.7 KB
|
js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js
|
20.5 KB
|
js_AQDKCRqaqaAAAzbvxcaEQBooKEQA-dFTfff7tzCklI8.js
|
14.0 KB
|
js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js
|
120.3 KB
|
js_fjSBcoQiz2s5JFYU7Z0v2w3fhgZkax8CZA1Fi71bsVc.js
|
15.9 KB
|
js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js
|
26.8 KB
|
sec19_wordmark_stacked_456x186.png
|
4.7 KB
|
/.../USENIX Security 2019 USENIX_files/
|
acmqueue_600x240_1.png
|
4.7 KB
|
analytics.js
|
45.2 KB
|
avast_600x240.png
|
8.3 KB
|
baidu_600x240_1.png
|
8.4 KB
|
cisco_600x240.png
|
6.1 KB
|
css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css
|
4.3 KB
|
css_mMMIpDBXDqo0rCZrN7FoMlBPY0tKvHCE04XYURHXl9M.css
|
610.1 KB
|
css_Tvyih1Dm489siBROXzFSkKUCFbsEK9kCr0p3JDiev80.css
|
129.3 KB
|
css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css
|
3.8 KB
|
css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css
|
5.4 KB
|
dropbox_2018_600x240_2.png
|
3.3 KB
|
eff_2018_red_600x240_1.png
|
1.6 KB
|
facebook_600x240_6.png
|
4.8 KB
|
font-awesome.css
|
26.7 KB
|
freebsd_foundation_600x240.png
|
3.4 KB
|
google_600x240_6.png
|
9.0 KB
|
heninger_nadia_200x230.jpg
|
14.3 KB
|
hyatt_santa_clara_600_neat_6.png
|
560.8 KB
|
ibm_research_600x240.png
|
2.6 KB
|
intel_600x240.png
|
4.6 KB
|
js_1_m_mRX0UrchQnV5E0UZ6141Ts6jK5YnRLQe7J2kaX4.js
|
14.3 KB
|
js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js
|
20.5 KB
|
js_AQDKCRqaqaAAAzbvxcaEQBooKEQA-dFTfff7tzCklI8.js
|
14.0 KB
|
js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js
|
120.3 KB
|
js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js
|
26.8 KB
|
js_zsU7pE_En9PuEzx00IjN_iCxIwgABAiEwJNkh1iTG9k.js
|
8.2 KB
|
kaspersky_600x240.png
|
3.7 KB
|
kaust_600x240.png
|
13.0 KB
|
microsoft-logo_600x240.png
|
4.2 KB
|
nostarch_600x240_1.png
|
2.6 KB
|
palo-alto-networks_600x240.png
|
9.8 KB
|
sec19_wordmark_stacked_456x186.png
|
4.7 KB
|
sec19_wordmark_stacked_456x186_002.png
|
9.2 KB
|
traynor_patrick_200x230.jpg
|
13.8 KB
|
usc_isi_black_600x240.png
|
7.1 KB
|
usenix_logo_300x150_neat_2.png
|
15.0 KB
|
/USENIX Security 2020/
|
(Mostly) Exitless VM Protection from Untrusted Hypervisor through Disaggregate.mp4
|
8.7 MB
|
A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web.mp4
|
11.3 MB
|
A different cup of TI The added value of commercial threat intelligence.mp4
|
10.9 MB
|
A Formal Analysis of IEEE 802.11s WPA2 Countering the Kracks Caused by.mp4
|
9.1 MB
|
A Longitudinal and Comprehensive Study of the DANE Ecosystem in Email.mp4
|
12.4 MB
|
A Spectral Analysis of Noise A Comprehensive, Automated, Formal Analysis.mp4
|
8.2 MB
|
A Tale of Two Headers A Formal Analysis of Inconsistent Click-Jacking.mp4
|
8.2 MB
|
Achieving Keyless CDNs with Conclaves.mp4
|
8.4 MB
|
Actions Speak Louder than Words Entity-Sensitive Privacy Policy and Data Flow.mp4
|
10.2 MB
|
Adversarial Preprocessing Understanding and Preventing Image-Scaling Attacks.mp4
|
10.7 MB
|
Agamotto Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine.mp4
|
11.6 MB
|
An Ever-evolving Game Evaluation of Real-world Attacks and Defenses.mp4
|
9.4 MB
|
An Observational Investigation of Reverse Engineers’ Processes.mp4
|
10.1 MB
|
An Off-Chip Attack on Hardware Enclaves via the Memory Bus.mp4
|
8.9 MB
|
Analysis of DTLS Implementations Using Protocol State Fuzzing.mp4
|
8.5 MB
|
APEX A Verified Architecture for Proofs of Execution on Remote Devices.mp4
|
12.8 MB
|
AURORA Statistical Crash Analysis for Automated Root Cause Explanation.mp4
|
7.1 MB
|
Automatic Hot Patch Generation for Android Kernels.mp4
|
11.1 MB
|
Automatic Techniques to Systematically Discover New Heap Exploitation.mp4
|
9.5 MB
|
Automating the Development of Chosen Ciphertext Attacks.mp4
|
9.4 MB
|
BesFS A POSIX Filesystem for Enclaves with a Mechanized Safety Proof.mp4
|
11.5 MB
|
Big Numbers - Big Troubles Systematically Analyzing Nonce Leakage in (EC)DSA.mp4
|
10.4 MB
|
BigMAC Fine-Grained Policy Analysis of Android Firmware.mp4
|
11.6 MB
|
BlockSci Design and applications of a blockchain analysis platform.mp4
|
8.4 MB
|
Boxer Preventing fraud by scanning credit cards.mp4
|
7.8 MB
|
Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade Attacks.mp4
|
11.0 MB
|
BScout Direct Whole Patch Presence Test for Java Executables.mp4
|
7.4 MB
|
Cache Telepathy Leveraging Shared Resource Attacks to Learn DNN Architectures.mp4
|
9.6 MB
|
Cached and Confused Web Cache Deception in the Wild.mp4
|
9.5 MB
|
Call Me Maybe Eavesdropping Encrypted LTE Calls With ReVoLTE.mp4
|
10.8 MB
|
Cardpliance PCI DSS Compliance of Android Applications.mp4
|
11.4 MB
|
Certified Side Channels.mp4
|
8.2 MB
|
Chaperone Real-time Locking and Loss Prevention for Smartphones.mp4
|
10.0 MB
|
Civet An Efficient Java Partitioning Framework for Hardware Enclaves.mp4
|
9.1 MB
|
Composition Kills A Case Study of Email Sender Authentication.mp4
|
11.1 MB
|
CopyCat Controlled Instruction-Level Attacks on Enclaves.mp4
|
8.9 MB
|
COUNTERFOIL Verifying Provenance of Integrated Circuits using Intrinsic.mp4
|
12.5 MB
|
Data Recovery from Scrubbed NAND Flash Storage Need for Analog Sanitization.mp4
|
13.0 MB
|
Datalog Disassembly.mp4
|
9.2 MB
|
DatashareNetwork A Decentralized Privacy-Preserving Search Engine.mp4
|
9.4 MB
|
DECAF Automatic, Adaptive De-bloating and Hardening of COTS Firmware.mp4
|
9.1 MB
|
DeepHammer Depleting the Intelligence of Deep Neural Networks through Target.mp4
|
9.5 MB
|
DELF Safeguarding deletion correctness in Online Social Networks.mp4
|
9.1 MB
|
Delphi A Cryptographic Inference Service for Neural Networks.mp4
|
8.2 MB
|
Detecting Stuffing of a User’s Credentials at Her Own Accounts.mp4
|
8.0 MB
|
Devil’s Whisper A General Approach for Physical Adversarial Attacks.mp4
|
11.2 MB
|
Differentially-Private Control-Flow Node Coverage for Software Usage Analysis.mp4
|
9.0 MB
|
Donky Domain Keys - Efficient In-Process Isolation for RISC-V and x86.mp4
|
8.4 MB
|
Drift with Devil Security of Multi-Sensor Fusion based Localization.mp4
|
11.4 MB
|
Droplet Decentralized Authorization and Access Control for Encrypted Data.mp4
|
8.2 MB
|
EcoFuzz Adaptive Energy-Saving Greybox Fuzzing as a Variant.mp4
|
10.1 MB
|
Empirical Measurement of Systemic 2FA Usability.mp4
|
6.2 MB
|
EPIC Every Packet Is Checked in the Data Plane of a Path-Aware Internet.mp4
|
10.9 MB
|
Estonian Electronic Identity Card Security Flaws in Key Management.mp4
|
9.6 MB
|
ETHBMC A Bounded Model Checker for Smart Contracts.mp4
|
7.5 MB
|
Everything Old is New Again Binary Security of WebAssembly.mp4
|
9.3 MB
|
Exploring Connections Between Active Learning and Model Extraction.mp4
|
6.7 MB
|
FANS Fuzzing Android Native System Services via Automated Interface Analysis.mp4
|
10.6 MB
|
Fawkes Protecting Privacy against Unauthorized Deep Learning Models.mp4
|
9.0 MB
|
FIRMSCOPE Automatic Uncovering of Privilege-Escalation Vulnerabilities.mp4
|
8.0 MB
|
Frankenstein Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation.mp4
|
10.2 MB
|
From Control Model to Program Investigating Robotic Aerial Vehicle Accidents.mp4
|
11.0 MB
|
From Needs to Actions to Secure Apps The Effect of Requirements.mp4
|
8.3 MB
|
FuzzGen Automatic Fuzzer Generation.mp4
|
14.1 MB
|
FuzzGuard Filtering out Unreachable Inputs in Directed Grey-box Fuzzing.mp4
|
7.7 MB
|
Fuzzing Error Handling Code using Context-Sensitive Software Fault Injection.mp4
|
8.7 MB
|
GREYONE Data Flow Sensitive Fuzzing.mp4
|
11.2 MB
|
Hall Spoofing A Non-Invasive DoS Attack on Grid-Tied Solar Inverter.mp4
|
12.3 MB
|
HALucinator Firmware Re-hosting Through Abstraction Layer Emulation.mp4
|
10.1 MB
|
High Accuracy and High Fidelity Extraction of Neural Networks.mp4
|
6.3 MB
|
him Shimmeny Evaluating the Security & Privacy Contributions of Link Shimming.mp4
|
10.9 MB
|
Horizontal Privilege Escalation in Trusted Applications.mp4
|
8.8 MB
|
Human Distinguishable Visual Key Fingerprints.mp4
|
8.1 MB
|
HybCache Hybrid Side-Channel-Resilient Caches for Trusted Execution.mp4
|
11.7 MB
|
Hybrid Batch Attacks Finding Black-box Adversarial Examples with Limited.mp4
|
7.9 MB
|
I am uncomfortable sharing what I cant see - Privacy Concerns.mp4
|
10.1 MB
|
I have too much respect for my elders Understanding South African Mobile.mp4
|
7.9 MB
|
Interpretable Deep Learning under Fire.mp4
|
9.9 MB
|
iOS, Your OS, Everybodys OS Vetting and Analyzing Network Services of iOS.mp4
|
11.6 MB
|
Justinians GAAvernor Robust Distributed Learning with Gradient Aggregation.mp4
|
10.4 MB
|
KOOBE Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write.mp4
|
9.0 MB
|
Light Commands Laser-Based Audio Injection Attacks on Voice-Controllable.mp4
|
13.3 MB
|
Liveness is Not Enough Enhancing Fingerprint Authentication with Behavioral.mp4
|
10.4 MB
|
Local Model Poisoning Attacks to Byzantine-Robust Federated Learning.mp4
|
8.4 MB
|
McTiny Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers.mp4
|
10.7 MB
|
Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines.mp4
|
9.4 MB
|
Medusa Microarchitectural Data Leakage via Automated Attack Synthesis.mp4
|
9.4 MB
|
MIRAGE Succinct Arguments for Randomized Algorithms with Applications.mp4
|
11.1 MB
|
Montage A Neural Network Language Model-Guided JavaScript Engine Fuzzer.mp4
|
8.2 MB
|
MUZZ Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded.mp4
|
10.8 MB
|
MVP Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures.mp4
|
11.1 MB
|
NetWarden Mitigating Network Covert Channels while Preserving Performance.mp4
|
8.1 MB
|
NXNSAttack Recursive DNS Inefficiencies and Vulnerabilities.mp4
|
12.6 MB
|
On Training Robust PDF Malware Classifiers.mp4
|
9.1 MB
|
P2IM Scalable and Hardware-independent Firmware Testing via Automatic.mp4
|
8.7 MB
|
Pancake Frequency Smoothing for Encrypted Data Stores.mp4
|
8.1 MB
|
Panel Digital Contact Tracing.mp4
|
100.4 MB
|
Panel The 2020 Election Remote Voting, Disinformation, and Audit.mp4
|
94.2 MB
|
ParmeSan Sanitizer-guided Greybox Fuzzing.mp4
|
8.9 MB
|
PARTEMU Enabling Dynamic Analysis of Real-World TrustZone Software.mp4
|
9.2 MB
|
PCKV Locally Differentially Private Correlated Key-Value Data Collection.mp4
|
10.5 MB
|
PhishTime Continuous Longitudinal Measurement of the Effectiveness.mp4
|
8.4 MB
|
PHMon A Programmable Hardware Monitor and Its Security Use Cases.mp4
|
10.6 MB
|
Pixel Multi-signatures for Consensus.mp4
|
9.6 MB
|
PKU Pitfalls Attacks on PKU-based Memory Isolation Systems.mp4
|
7.9 MB
|
Plug-N-Pwned Comprehensive Vulnerability Analysis of OBD-II Dongles.mp4
|
9.9 MB
|
Poison Over Troubled Forwarders A Cache Poisoning Attack Targeting DNS.mp4
|
5.9 MB
|
Preech A System for Privacy-Preserving Speech Transcription.mp4
|
7.8 MB
|
Programmable In-Network Security for Context-aware BYOD Policies.mp4
|
9.4 MB
|
RELOADREFRESH Abusing Cache Replacement Policies to Perform Stealthy Cache.mp4
|
8.8 MB
|
Remote Side-Channel Attacks on Anonymous Transactions.mp4
|
8.8 MB
|
Retrofitting Fine Grain Isolation in the Firefox Renderer.mp4
|
9.4 MB
|
SANNS Scaling Up Secure Approximate k-Nearest Neighbors Search.mp4
|
11.2 MB
|
SAVIOR Securing Autonomous Vehicles with Robust Physical Invariants.mp4
|
11.9 MB
|
Scaling Verifiable Computation Using Efficient Set Accumulators.mp4
|
8.3 MB
|
SEAL Attack Mitigation for Encrypted Databases via Adjustable Leakage.mp4
|
9.1 MB
|
sec20__full_proceedings.pdf
|
280.8 MB
|
sec20_contents.pdf
|
255.9 KB
|
sec20_cover.pdf
|
769.2 KB
|
sec20_errata_1.pdf
|
106.1 KB
|
sec20_errata_2.pdf
|
98.0 KB
|
sec20_errata_3.pdf
|
285.1 KB
|
sec20_full_proceedings_interior.pdf
|
279.5 MB
|
sec20_message.pdf
|
133.1 KB
|
sec20_title_copyright_organizers.pdf
|
126.7 KB
|
Secure Multi-party Computation of Differentially Private Median.mp4
|
10.8 MB
|
Secure parallel computation on national scale volumes of data.mp4
|
8.6 MB
|
Security Analysis of Unified Payments Interface and Payment Apps in India.mp4
|
10.3 MB
|
See No Evil Phishing for Permissions with False Transparency.mp4
|
13.2 MB
|
SENG, the SGX-Enforcing Network Gateway Authorizing Communication.mp4
|
10.5 MB
|
SHA-1 is a Shambles First Chosen-Prefix Collision on SHA-1 and Application.mp4
|
11.7 MB
|
ShadowMove A Stealthy Lateral Movement Strategy.mp4
|
8.2 MB
|
Shattered Chain of Trust Understanding Security Risks in Cross-Cloud IoT.mp4
|
10.8 MB
|
Silhouette Efficient Protected Shadow Stacks for Embedded Systems.mp4
|
7.4 MB
|
SkillExplorer Understanding the Behavior of Skills in Large Scale.mp4
|
9.2 MB
|
SmartVerif Push the Limit of Automation Capability of Verifying Security.mp4
|
8.6 MB
|
SpecFuzz Bringing Spectre-type vulnerabilities to the surface.mp4
|
10.4 MB
|
Stealthy Tracking of Autonomous Vehicles with Cache Side Channels.mp4
|
8.9 MB
|
Stolen Memories Leveraging Model Memorization for Calibrated White-Box.mp4
|
6.8 MB
|
Sunrise to Sunset Analyzing the End-to-end Life Cycle and Effectiveness.mp4
|
8.9 MB
|
Symbolic execution with SymCC don't interpret, compile.mp4
|
8.1 MB
|
Sys A Static Symbolic Tool for Finding Good Bugs in Good (Browser) Code.mp4
|
9.1 MB
|
TeeRex Discovery and Exploitation of Memory Corruption Vulnerabilities.mp4
|
10.2 MB
|
Temporal System Call Specialization for Attack Surface Reduction.mp4
|
11.8 MB
|
TextShield Robust Text Classification Based on Multimodal Embedding.mp4
|
13.6 MB
|
That Was Then, This Is Now A Security Evaluation of Password Generation.mp4
|
8.8 MB
|
The Ballot is Busted Before the Blockchain A Security Analysis of Voatz.mp4
|
8.1 MB
|
The Impact of Ad-Blockers on Product Search and Purchase Behavior.mp4
|
11.5 MB
|
The Industrial Age of Hacking.mp4
|
10.2 MB
|
The Tools and Tactics Used in Intimate Partner Surveillance An Analysis.mp4
|
11.2 MB
|
The Unpatchable Silicon A Full Break of the Bitstream Encryption of Xilinx.mp4
|
16.5 MB
|
Timeless Timing Attacks Exploiting Concurrency to Leak Secrets over Remote.mp4
|
10.5 MB
|
Towards HTTPS Everywhere on Android We Are Not There Yet.mp4
|
10.9 MB
|
Towards Robust LiDAR-based Perception in Autonomous Driving General Black-box.mp4
|
13.2 MB
|
TPM-FAIL TPM meets Timing and Lattice Attacks.mp4
|
9.2 MB
|
TXSPECTOR Uncovering Attacks in Ethereum from Transactions.mp4
|
7.8 MB
|
Understanding security mistakes developers make Qualitative analysis.mp4
|
8.5 MB
|
Updates-Leak Data Set Inference and Reconstruction Attacks in Online Learning.mp4
|
9.7 MB
|
USBFuzz A Framework for Fuzzing USB Drivers by Device Emulation.mp4
|
8.4 MB
|
USENIX Security '20 Technical Sessions USENIX.html
|
801.2 KB
|
USENIX Security '20 USENIX.html
|
125.1 KB
|
V0LTpwn Attacking x86 Processor Integrity from Software.mp4
|
7.5 MB
|
Visor Privacy-Preserving Video Analytics as a Cloud Service.mp4
|
12.5 MB
|
Void A fast and light voice liveness detection system.mp4
|
10.7 MB
|
VoteAgain A scalable coercion-resistant voting system.mp4
|
2.2 MB
|
Walking Onions Scaling Anonymity Networks while Protecting Users.mp4
|
9.9 MB
|
What Twitter Knows Characterizing Ad Targeting Practices, User Perceptions.mp4
|
7.6 MB
|
who's Calling Characterizing Robocalls through Audio and Metadata Analysis.mp4
|
8.9 MB
|
You Are What You Broadcast Identification of Mobile and IoT Devices.mp4
|
12.1 MB
|
Zero-delay Lightweight Defenses against Website Fingerprinting.mp4
|
7.2 MB
|
/.../USENIX Security '20 Technical Sessions USENIX_files/
|
adida_ben_2018_200x230.png
|
23.4 KB
|
application-pdf.png
|
0.3 KB
|
css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css
|
4.3 KB
|
css_Pen3ncMGQyB3Q2LWoTho2yu6X-D2T6zOqWITJ4iG9A8.css
|
611.0 KB
|
css_Tvyih1Dm489siBROXzFSkKUCFbsEK9kCr0p3JDiev80.css
|
129.3 KB
|
css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css
|
3.8 KB
|
css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css
|
5.4 KB
|
font-awesome.css
|
26.7 KB
|
halderman_alex_200x230.jpg
|
11.8 KB
|
js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js
|
20.5 KB
|
js_fyV0VVkC6Q3xduxGurKMTFIU2dMmArUrbAdZORL-9WQ.js
|
0.4 KB
|
js_l3lGSHpmjPG_uzcz3Shpsi9Iwu4IaSB7us0ldgM0q7g.js
|
16.3 KB
|
js_nKHPel07iQ7X6ouVrkRIeMs9JzgU_FAp9nBhDfrhyQc.js
|
14.8 KB
|
js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js
|
26.8 KB
|
js_wKyFX46tVKJtPKN12qNjRfS4aubW4G2u7LK22vlDiKo.js
|
133.2 KB
|
package-x-generic.png
|
0.3 KB
|
pdf.svg
|
0.5 KB
|
rubin_avi_200x230.jpg
|
11.6 KB
|
sec20_wordmark_stacked_white.png
|
3.8 KB
|
slides.svg
|
0.7 KB
|
teague_vanessa_200x230.png
|
26.0 KB
|
usenix-locked.png
|
1.4 KB
|
video.svg
|
0.8 KB
|
/.../USENIX Security '20 USENIX_files/
|
acmqueue_600x240_1.png
|
4.7 KB
|
baidu_600x240_0.png
|
4.3 KB
|
bytedance_600x240_3.png
|
6.2 KB
|
capkun_srdjan_200x230.jpg
|
11.8 KB
|
cisco_600x240.png
|
6.1 KB
|
css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css
|
4.3 KB
|
css_Pen3ncMGQyB3Q2LWoTho2yu6X-D2T6zOqWITJ4iG9A8.css
|
611.0 KB
|
css_Tvyih1Dm489siBROXzFSkKUCFbsEK9kCr0p3JDiev80.css
|
129.3 KB
|
css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css
|
3.8 KB
|
css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css
|
5.4 KB
|
dmtf_600x240.png
|
3.2 KB
|
dropbox_2018_600x240_1_1.png
|
3.3 KB
|
facebook_600x240_17.png
|
3.9 KB
|
font-awesome.css
|
26.7 KB
|
freebsd_foundation_600x240.png
|
3.4 KB
|
google_600x240_13.png
|
4.8 KB
|
ibm_600x240_2.png
|
2.3 KB
|
intel_600x240.png
|
3.4 KB
|
js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js
|
20.5 KB
|
js_fyV0VVkC6Q3xduxGurKMTFIU2dMmArUrbAdZORL-9WQ.js
|
0.4 KB
|
js_l3lGSHpmjPG_uzcz3Shpsi9Iwu4IaSB7us0ldgM0q7g.js
|
16.3 KB
|
js_nKHPel07iQ7X6ouVrkRIeMs9JzgU_FAp9nBhDfrhyQc.js
|
14.8 KB
|
js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js
|
26.8 KB
|
js_wKyFX46tVKJtPKN12qNjRfS4aubW4G2u7LK22vlDiKo.js
|
133.2 KB
|
kaspersky_600x240_1.png
|
6.3 KB
|
microsoft-logo_600x240_0.png
|
4.2 KB
|
qc_600x240_1.png
|
3.8 KB
|
roesner_franziska_200.jpg
|
11.4 KB
|
salesforce_600x240.png
|
5.6 KB
|
sec20_wordmark_stacked_white.png
|
3.8 KB
|
sec20_wordmark_stacked_white_002.png
|
9.0 KB
|
usenix_logo_300x150_neat_2.png
|
15.0 KB
|
/.../USENIX Security 2020 captions/
|
(Mostly) Exitless VM Protection from Untrusted Hypervisor through Disaggregate.eng.json
|
458.1 KB
|
(Mostly) Exitless VM Protection from Untrusted Hypervisor through Disaggregate.eng.lrc
|
12.7 KB
|
(Mostly) Exitless VM Protection from Untrusted Hypervisor through Disaggregate.eng.srt
|
13.3 KB
|
(Mostly) Exitless VM Protection from Untrusted Hypervisor through Disaggregate.eng.text
|
9.8 KB
|
(Mostly) Exitless VM Protection from Untrusted Hypervisor through Disaggregate.eng.tsv
|
11.4 KB
|
(Mostly) Exitless VM Protection from Untrusted Hypervisor through Disaggregate.eng.txt
|
12.8 KB
|
(Mostly) Exitless VM Protection from Untrusted Hypervisor through Disaggregate.eng.vtt
|
12.3 KB
|
A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web.eng.json
|
529.6 KB
|
A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web.eng.lrc
|
14.3 KB
|
A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web.eng.srt
|
14.1 KB
|
A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web.eng.text
|
11.1 KB
|
A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web.eng.tsv
|
12.8 KB
|
A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web.eng.txt
|
14.4 KB
|
A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web.eng.vtt
|
13.3 KB
|
A different cup of TI The added value of commercial threat intelligence.eng.srt
|
22.9 KB
|
A Formal Analysis of IEEE 802.11s WPA2 Countering the Kracks Caused by.eng.json
|
568.1 KB
|
A Formal Analysis of IEEE 802.11s WPA2 Countering the Kracks Caused by.eng.lrc
|
14.8 KB
|
A Formal Analysis of IEEE 802.11s WPA2 Countering the Kracks Caused by.eng.srt
|
15.2 KB
|
A Formal Analysis of IEEE 802.11s WPA2 Countering the Kracks Caused by.eng.text
|
11.6 KB
|
A Formal Analysis of IEEE 802.11s WPA2 Countering the Kracks Caused by.eng.tsv
|
13.3 KB
|
A Formal Analysis of IEEE 802.11s WPA2 Countering the Kracks Caused by.eng.txt
|
14.9 KB
|
A Formal Analysis of IEEE 802.11s WPA2 Countering the Kracks Caused by.eng.vtt
|
14.2 KB
|
A Longitudinal and Comprehensive Study of the DANE Ecosystem in Email.eng.srt
|
23.1 KB
|
A Spectral Analysis of Noise A Comprehensive, Automated, Formal Analysis.eng.srt
|
19.6 KB
|
A Tale of Two Headers A Formal Analysis of Inconsistent Click-Jacking.eng.srt
|
20.8 KB
|
Achieving Keyless CDNs with Conclaves.eng.srt
|
24.1 KB
|
Actions Speak Louder than Words Entity-Sensitive Privacy Policy and Data Flow.eng.json
|
557.1 KB
|
Actions Speak Louder than Words Entity-Sensitive Privacy Policy and Data Flow.eng.lrc
|
14.7 KB
|
Actions Speak Louder than Words Entity-Sensitive Privacy Policy and Data Flow.eng.srt
|
14.9 KB
|
Actions Speak Louder than Words Entity-Sensitive Privacy Policy and Data Flow.eng.text
|
11.3 KB
|
Actions Speak Louder than Words Entity-Sensitive Privacy Policy and Data Flow.eng.tsv
|
13.1 KB
|
Actions Speak Louder than Words Entity-Sensitive Privacy Policy and Data Flow.eng.txt
|
14.8 KB
|
Actions Speak Louder than Words Entity-Sensitive Privacy Policy and Data Flow.eng.vtt
|
13.9 KB
|
Adversarial Preprocessing Understanding and Preventing Image-Scaling Attacks.eng.srt
|
22.5 KB
|
Agamotto Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine.eng.json
|
542.9 KB
|
Agamotto Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine.eng.lrc
|
15.0 KB
|
Agamotto Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine.eng.srt
|
15.3 KB
|
Agamotto Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine.eng.text
|
11.8 KB
|
Agamotto Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine.eng.tsv
|
13.5 KB
|
Agamotto Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine.eng.txt
|
15.1 KB
|
Agamotto Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine.eng.vtt
|
14.3 KB
|
An Ever-evolving Game Evaluation of Real-world Attacks and Defenses.eng.srt
|
17.9 KB
|
An Observational Investigation of Reverse Engineers’ Processes.eng.json
|
550.5 KB
|
An Observational Investigation of Reverse Engineers’ Processes.eng.lrc
|
14.5 KB
|
An Observational Investigation of Reverse Engineers’ Processes.eng.srt
|
15.2 KB
|
An Observational Investigation of Reverse Engineers’ Processes.eng.text
|
11.4 KB
|
An Observational Investigation of Reverse Engineers’ Processes.eng.tsv
|
13.1 KB
|
An Observational Investigation of Reverse Engineers’ Processes.eng.txt
|
14.7 KB
|
An Observational Investigation of Reverse Engineers’ Processes.eng.vtt
|
14.2 KB
|
An Off-Chip Attack on Hardware Enclaves via the Memory Bus.eng.srt
|
23.2 KB
|
Analysis of DTLS Implementations Using Protocol State Fuzzing.eng.srt
|
23.6 KB
|
APEX A Verified Architecture for Proofs of Execution on Remote Devices.eng.json
|
625.4 KB
|
APEX A Verified Architecture for Proofs of Execution on Remote Devices.eng.lrc
|
16.5 KB
|
APEX A Verified Architecture for Proofs of Execution on Remote Devices.eng.srt
|
16.5 KB
|
APEX A Verified Architecture for Proofs of Execution on Remote Devices.eng.text
|
12.8 KB
|
APEX A Verified Architecture for Proofs of Execution on Remote Devices.eng.tsv
|
14.8 KB
|
APEX A Verified Architecture for Proofs of Execution on Remote Devices.eng.txt
|
16.6 KB
|
APEX A Verified Architecture for Proofs of Execution on Remote Devices.eng.vtt
|
15.5 KB
|
AURORA Statistical Crash Analysis for Automated Root Cause Explanation.eng.json
|
458.4 KB
|
AURORA Statistical Crash Analysis for Automated Root Cause Explanation.eng.lrc
|
11.6 KB
|
AURORA Statistical Crash Analysis for Automated Root Cause Explanation.eng.srt
|
12.2 KB
|
AURORA Statistical Crash Analysis for Automated Root Cause Explanation.eng.text
|
8.8 KB
|
AURORA Statistical Crash Analysis for Automated Root Cause Explanation.eng.tsv
|
10.3 KB
|
AURORA Statistical Crash Analysis for Automated Root Cause Explanation.eng.txt
|
11.7 KB
|
AURORA Statistical Crash Analysis for Automated Root Cause Explanation.eng.vtt
|
11.3 KB
|
Automatic Hot Patch Generation for Android Kernels.eng.srt
|
23.5 KB
|
Automatic Techniques to Systematically Discover New Heap Exploitation.eng.srt
|
28.5 KB
|
Automating the Development of Chosen Ciphertext Attacks.eng.json
|
478.2 KB
|
Automating the Development of Chosen Ciphertext Attacks.eng.lrc
|
12.7 KB
|
Automating the Development of Chosen Ciphertext Attacks.eng.srt
|
12.6 KB
|
Automating the Development of Chosen Ciphertext Attacks.eng.text
|
9.8 KB
|
Automating the Development of Chosen Ciphertext Attacks.eng.tsv
|
11.3 KB
|
Automating the Development of Chosen Ciphertext Attacks.eng.txt
|
12.8 KB
|
Automating the Development of Chosen Ciphertext Attacks.eng.vtt
|
11.8 KB
|
BesFS A POSIX Filesystem for Enclaves with a Mechanized Safety Proof.eng.srt
|
20.9 KB
|
Big Numbers - Big Troubles Systematically Analyzing Nonce Leakage in (EC)DSA.eng.json
|
543.7 KB
|
Big Numbers - Big Troubles Systematically Analyzing Nonce Leakage in (EC)DSA.eng.lrc
|
14.4 KB
|
Big Numbers - Big Troubles Systematically Analyzing Nonce Leakage in (EC)DSA.eng.srt
|
14.6 KB
|
Big Numbers - Big Troubles Systematically Analyzing Nonce Leakage in (EC)DSA.eng.text
|
10.1 KB
|
Big Numbers - Big Troubles Systematically Analyzing Nonce Leakage in (EC)DSA.eng.tsv
|
12.4 KB
|
Big Numbers - Big Troubles Systematically Analyzing Nonce Leakage in (EC)DSA.eng.txt
|
14.6 KB
|
Big Numbers - Big Troubles Systematically Analyzing Nonce Leakage in (EC)DSA.eng.vtt
|
13.4 KB
|
BigMAC Fine-Grained Policy Analysis of Android Firmware.eng.srt
|
24.5 KB
|
BlockSci Design and applications of a blockchain analysis platform.eng.srt
|
20.6 KB
|
Boxer Preventing fraud by scanning credit cards.eng.srt
|
21.8 KB
|
Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade Attacks.eng.srt
|
18.5 KB
|
BScout Direct Whole Patch Presence Test for Java Executables.eng.json
|
369.4 KB
|
BScout Direct Whole Patch Presence Test for Java Executables.eng.lrc
|
9.9 KB
|
BScout Direct Whole Patch Presence Test for Java Executables.eng.srt
|
10.6 KB
|
BScout Direct Whole Patch Presence Test for Java Executables.eng.text
|
7.9 KB
|
BScout Direct Whole Patch Presence Test for Java Executables.eng.tsv
|
8.9 KB
|
BScout Direct Whole Patch Presence Test for Java Executables.eng.txt
|
9.9 KB
|
BScout Direct Whole Patch Presence Test for Java Executables.eng.vtt
|
9.9 KB
|
Cache Telepathy Leveraging Shared Resource Attacks to Learn DNN Architectures.eng.srt
|
22.8 KB
|
Cached and Confused Web Cache Deception in the Wild.eng.json
|
375.9 KB
|
Cached and Confused Web Cache Deception in the Wild.eng.lrc
|
9.9 KB
|
Cached and Confused Web Cache Deception in the Wild.eng.srt
|
11.0 KB
|
Cached and Confused Web Cache Deception in the Wild.eng.text
|
8.5 KB
|
Cached and Confused Web Cache Deception in the Wild.eng.tsv
|
9.3 KB
|
Cached and Confused Web Cache Deception in the Wild.eng.txt
|
10.0 KB
|
Cached and Confused Web Cache Deception in the Wild.eng.vtt
|
10.3 KB
|
Call Me Maybe Eavesdropping Encrypted LTE Calls With ReVoLTE.eng.srt
|
21.5 KB
|
Cardpliance PCI DSS Compliance of Android Applications.eng.srt
|
24.5 KB
|
Certified Side Channels.eng.json
|
388.1 KB
|
Certified Side Channels.eng.lrc
|
10.7 KB
|
Certified Side Channels.eng.srt
|
11.2 KB
|
Certified Side Channels.eng.text
|
8.3 KB
|
Certified Side Channels.eng.tsv
|
9.6 KB
|
Certified Side Channels.eng.txt
|
10.8 KB
|
Certified Side Channels.eng.vtt
|
10.4 KB
|
Chaperone Real-time Locking and Loss Prevention for Smartphones.eng.srt
|
22.9 KB
|
Civet An Efficient Java Partitioning Framework for Hardware Enclaves.eng.srt
|
20.8 KB
|
Composition Kills A Case Study of Email Sender Authentication.eng.srt
|
23.8 KB
|
CopyCat Controlled Instruction-Level Attacks on Enclaves.eng.srt
|
25.9 KB
|
COUNTERFOIL Verifying Provenance of Integrated Circuits using Intrinsic.eng.json
|
379.6 KB
|
COUNTERFOIL Verifying Provenance of Integrated Circuits using Intrinsic.eng.lrc
|
10.6 KB
|
COUNTERFOIL Verifying Provenance of Integrated Circuits using Intrinsic.eng.srt
|
11.1 KB
|
COUNTERFOIL Verifying Provenance of Integrated Circuits using Intrinsic.eng.text
|
8.0 KB
|
COUNTERFOIL Verifying Provenance of Integrated Circuits using Intrinsic.eng.tsv
|
9.4 KB
|
COUNTERFOIL Verifying Provenance of Integrated Circuits using Intrinsic.eng.txt
|
10.7 KB
|
COUNTERFOIL Verifying Provenance of Integrated Circuits using Intrinsic.eng.vtt
|
10.3 KB
|
Data Recovery from Scrubbed NAND Flash Storage Need for Analog Sanitization.eng.srt
|
27.1 KB
|
Datalog Disassembly.eng.srt
|
23.9 KB
|
DatashareNetwork A Decentralized Privacy-Preserving Search Engine.eng.srt
|
21.4 KB
|
DECAF Automatic, Adaptive De-bloating and Hardening of COTS Firmware.eng.srt
|
24.6 KB
|
DeepHammer Depleting the Intelligence of Deep Neural Networks through Target.eng.json
|
498.7 KB
|
DeepHammer Depleting the Intelligence of Deep Neural Networks through Target.eng.lrc
|
13.7 KB
|
DeepHammer Depleting the Intelligence of Deep Neural Networks through Target.eng.srt
|
14.4 KB
|
DeepHammer Depleting the Intelligence of Deep Neural Networks through Target.eng.text
|
10.7 KB
|
DeepHammer Depleting the Intelligence of Deep Neural Networks through Target.eng.tsv
|
12.3 KB
|
DeepHammer Depleting the Intelligence of Deep Neural Networks through Target.eng.txt
|
13.8 KB
|
DeepHammer Depleting the Intelligence of Deep Neural Networks through Target.eng.vtt
|
13.4 KB
|
DELF Safeguarding deletion correctness in Online Social Networks.eng.json
|
558.4 KB
|
DELF Safeguarding deletion correctness in Online Social Networks.eng.lrc
|
14.6 KB
|
DELF Safeguarding deletion correctness in Online Social Networks.eng.srt
|
16.2 KB
|
DELF Safeguarding deletion correctness in Online Social Networks.eng.text
|
11.4 KB
|
DELF Safeguarding deletion correctness in Online Social Networks.eng.tsv
|
13.1 KB
|
DELF Safeguarding deletion correctness in Online Social Networks.eng.txt
|
14.7 KB
|
DELF Safeguarding deletion correctness in Online Social Networks.eng.vtt
|
14.9 KB
|
Delphi A Cryptographic Inference Service for Neural Networks.eng.json
|
702.0 KB
|
Delphi A Cryptographic Inference Service for Neural Networks.eng.lrc
|
21.0 KB
|
Delphi A Cryptographic Inference Service for Neural Networks.eng.srt
|
17.4 KB
|
Delphi A Cryptographic Inference Service for Neural Networks.eng.text
|
12.9 KB
|
Delphi A Cryptographic Inference Service for Neural Networks.eng.tsv
|
17.2 KB
|
Delphi A Cryptographic Inference Service for Neural Networks.eng.txt
|
21.3 KB
|
Delphi A Cryptographic Inference Service for Neural Networks.eng.vtt
|
16.2 KB
|
Detecting Stuffing of a User’s Credentials at Her Own Accounts.eng.srt
|
26.3 KB
|
Devil’s Whisper A General Approach for Physical Adversarial Attacks.eng.srt
|
23.7 KB
|
Differentially-Private Control-Flow Node Coverage for Software Usage Analysis.eng.json
|
540.5 KB
|
Differentially-Private Control-Flow Node Coverage for Software Usage Analysis.eng.lrc
|
14.1 KB
|
Differentially-Private Control-Flow Node Coverage for Software Usage Analysis.eng.srt
|
14.8 KB
|
Differentially-Private Control-Flow Node Coverage for Software Usage Analysis.eng.text
|
11.1 KB
|
Differentially-Private Control-Flow Node Coverage for Software Usage Analysis.eng.tsv
|
12.7 KB
|
Differentially-Private Control-Flow Node Coverage for Software Usage Analysis.eng.txt
|
14.2 KB
|
Differentially-Private Control-Flow Node Coverage for Software Usage Analysis.eng.vtt
|
13.8 KB
|
Donky Domain Keys - Efficient In-Process Isolation for RISC-V and x86.eng.json
|
475.5 KB
|
Donky Domain Keys - Efficient In-Process Isolation for RISC-V and x86.eng.lrc
|
12.3 KB
|
Donky Domain Keys - Efficient In-Process Isolation for RISC-V and x86.eng.srt
|
13.6 KB
|
Donky Domain Keys - Efficient In-Process Isolation for RISC-V and x86.eng.text
|
9.3 KB
|
Donky Domain Keys - Efficient In-Process Isolation for RISC-V and x86.eng.tsv
|
10.9 KB
|
Donky Domain Keys - Efficient In-Process Isolation for RISC-V and x86.eng.txt
|
12.5 KB
|
Donky Domain Keys - Efficient In-Process Isolation for RISC-V and x86.eng.vtt
|
12.4 KB
|
Drift with Devil Security of Multi-Sensor Fusion based Localization.eng.srt
|
20.1 KB
|
Droplet Decentralized Authorization and Access Control for Encrypted Data.eng.json
|
469.6 KB
|
Droplet Decentralized Authorization and Access Control for Encrypted Data.eng.lrc
|
12.7 KB
|
Droplet Decentralized Authorization and Access Control for Encrypted Data.eng.srt
|
13.4 KB
|
Droplet Decentralized Authorization and Access Control for Encrypted Data.eng.text
|
10.8 KB
|
Droplet Decentralized Authorization and Access Control for Encrypted Data.eng.tsv
|
11.8 KB
|
Droplet Decentralized Authorization and Access Control for Encrypted Data.eng.txt
|
12.8 KB
|
Droplet Decentralized Authorization and Access Control for Encrypted Data.eng.vtt
|
12.7 KB
|
EcoFuzz Adaptive Energy-Saving Greybox Fuzzing as a Variant.eng.json
|
434.6 KB
|
EcoFuzz Adaptive Energy-Saving Greybox Fuzzing as a Variant.eng.lrc
|
11.5 KB
|
EcoFuzz Adaptive Energy-Saving Greybox Fuzzing as a Variant.eng.srt
|
12.6 KB
|
EcoFuzz Adaptive Energy-Saving Greybox Fuzzing as a Variant.eng.text
|
8.7 KB
|
EcoFuzz Adaptive Energy-Saving Greybox Fuzzing as a Variant.eng.tsv
|
10.2 KB
|
EcoFuzz Adaptive Energy-Saving Greybox Fuzzing as a Variant.eng.txt
|
11.7 KB
|
EcoFuzz Adaptive Energy-Saving Greybox Fuzzing as a Variant.eng.vtt
|
11.6 KB
|
Empirical Measurement of Systemic 2FA Usability.eng.json
|
410.4 KB
|
Empirical Measurement of Systemic 2FA Usability.eng.lrc
|
10.9 KB
|
Empirical Measurement of Systemic 2FA Usability.eng.srt
|
11.2 KB
|
Empirical Measurement of Systemic 2FA Usability.eng.text
|
8.5 KB
|
Empirical Measurement of Systemic 2FA Usability.eng.tsv
|
9.8 KB
|
Empirical Measurement of Systemic 2FA Usability.eng.txt
|
11.0 KB
|
Empirical Measurement of Systemic 2FA Usability.eng.vtt
|
10.5 KB
|
EPIC Every Packet Is Checked in the Data Plane of a Path-Aware Internet.eng.json
|
371.1 KB
|
EPIC Every Packet Is Checked in the Data Plane of a Path-Aware Internet.eng.lrc
|
10.6 KB
|
EPIC Every Packet Is Checked in the Data Plane of a Path-Aware Internet.eng.srt
|
10.5 KB
|
EPIC Every Packet Is Checked in the Data Plane of a Path-Aware Internet.eng.text
|
8.2 KB
|
EPIC Every Packet Is Checked in the Data Plane of a Path-Aware Internet.eng.tsv
|
9.5 KB
|
EPIC Every Packet Is Checked in the Data Plane of a Path-Aware Internet.eng.txt
|
10.7 KB
|
EPIC Every Packet Is Checked in the Data Plane of a Path-Aware Internet.eng.vtt
|
9.8 KB
|
Estonian Electronic Identity Card Security Flaws in Key Management.eng.srt
|
21.7 KB
|
ETHBMC A Bounded Model Checker for Smart Contracts.eng.srt
|
20.5 KB
|
Everything Old is New Again Binary Security of WebAssembly.eng.srt
|
27.0 KB
|
Exploring Connections Between Active Learning and Model Extraction.eng.json
|
379.0 KB
|
Exploring Connections Between Active Learning and Model Extraction.eng.lrc
|
10.6 KB
|
Exploring Connections Between Active Learning and Model Extraction.eng.srt
|
11.3 KB
|
Exploring Connections Between Active Learning and Model Extraction.eng.text
|
8.2 KB
|
Exploring Connections Between Active Learning and Model Extraction.eng.tsv
|
9.5 KB
|
Exploring Connections Between Active Learning and Model Extraction.eng.txt
|
10.7 KB
|
Exploring Connections Between Active Learning and Model Extraction.eng.vtt
|
10.5 KB
|
FANS Fuzzing Android Native System Services via Automated Interface Analysis.eng.srt
|
20.7 KB
|
Fawkes Protecting Privacy against Unauthorized Deep Learning Models.eng.srt
|
23.4 KB
|
FIRMSCOPE Automatic Uncovering of Privilege-Escalation Vulnerabilities.eng.srt
|
24.5 KB
|
Frankenstein Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation.eng.json
|
516.6 KB
|
Frankenstein Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation.eng.lrc
|
13.4 KB
|
Frankenstein Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation.eng.srt
|
14.4 KB
|
Frankenstein Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation.eng.text
|
10.0 KB
|
Frankenstein Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation.eng.tsv
|
11.8 KB
|
Frankenstein Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation.eng.txt
|
13.6 KB
|
Frankenstein Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation.eng.vtt
|
13.2 KB
|
From Control Model to Program Investigating Robotic Aerial Vehicle Accidents.eng.json
|
487.6 KB
|
From Control Model to Program Investigating Robotic Aerial Vehicle Accidents.eng.lrc
|
13.4 KB
|
From Control Model to Program Investigating Robotic Aerial Vehicle Accidents.eng.srt
|
14.2 KB
|
From Control Model to Program Investigating Robotic Aerial Vehicle Accidents.eng.text
|
10.2 KB
|
From Control Model to Program Investigating Robotic Aerial Vehicle Accidents.eng.tsv
|
11.9 KB
|
From Control Model to Program Investigating Robotic Aerial Vehicle Accidents.eng.txt
|
13.6 KB
|
From Control Model to Program Investigating Robotic Aerial Vehicle Accidents.eng.vtt
|
13.1 KB
|
From Needs to Actions to Secure Apps The Effect of Requirements.eng.srt
|
19.7 KB
|
FuzzGen Automatic Fuzzer Generation.eng.json
|
545.2 KB
|
FuzzGen Automatic Fuzzer Generation.eng.lrc
|
14.1 KB
|
FuzzGen Automatic Fuzzer Generation.eng.srt
|
15.4 KB
|
FuzzGen Automatic Fuzzer Generation.eng.text
|
11.1 KB
|
FuzzGen Automatic Fuzzer Generation.eng.tsv
|
12.7 KB
|
FuzzGen Automatic Fuzzer Generation.eng.txt
|
14.2 KB
|
FuzzGen Automatic Fuzzer Generation.eng.vtt
|
14.2 KB
|
FuzzGuard Filtering out Unreachable Inputs in Directed Grey-box Fuzzing.eng.json
|
337.4 KB
|
FuzzGuard Filtering out Unreachable Inputs in Directed Grey-box Fuzzing.eng.lrc
|
8.8 KB
|
FuzzGuard Filtering out Unreachable Inputs in Directed Grey-box Fuzzing.eng.srt
|
9.4 KB
|
FuzzGuard Filtering out Unreachable Inputs in Directed Grey-box Fuzzing.eng.text
|
7.2 KB
|
FuzzGuard Filtering out Unreachable Inputs in Directed Grey-box Fuzzing.eng.tsv
|
8.1 KB
|
FuzzGuard Filtering out Unreachable Inputs in Directed Grey-box Fuzzing.eng.txt
|
8.9 KB
|
FuzzGuard Filtering out Unreachable Inputs in Directed Grey-box Fuzzing.eng.vtt
|
8.8 KB
|
Fuzzing Error Handling Code using Context-Sensitive Software Fault Injection.eng.json
|
349.5 KB
|
Fuzzing Error Handling Code using Context-Sensitive Software Fault Injection.eng.lrc
|
9.3 KB
|
Fuzzing Error Handling Code using Context-Sensitive Software Fault Injection.eng.srt
|
9.8 KB
|
Fuzzing Error Handling Code using Context-Sensitive Software Fault Injection.eng.text
|
7.1 KB
|
Fuzzing Error Handling Code using Context-Sensitive Software Fault Injection.eng.tsv
|
8.3 KB
|
Fuzzing Error Handling Code using Context-Sensitive Software Fault Injection.eng.txt
|
9.4 KB
|
Fuzzing Error Handling Code using Context-Sensitive Software Fault Injection.eng.vtt
|
9.1 KB
|
GREYONE Data Flow Sensitive Fuzzing.eng.json
|
416.5 KB
|
GREYONE Data Flow Sensitive Fuzzing.eng.lrc
|
11.4 KB
|
GREYONE Data Flow Sensitive Fuzzing.eng.srt
|
12.4 KB
|
GREYONE Data Flow Sensitive Fuzzing.eng.text
|
8.7 KB
|
GREYONE Data Flow Sensitive Fuzzing.eng.tsv
|
10.1 KB
|
GREYONE Data Flow Sensitive Fuzzing.eng.txt
|
11.5 KB
|
GREYONE Data Flow Sensitive Fuzzing.eng.vtt
|
11.4 KB
|
Hall Spoofing A Non-Invasive DoS Attack on Grid-Tied Solar Inverter.eng.srt
|
22.6 KB
|
HALucinator Firmware Re-hosting Through Abstraction Layer Emulation.eng.srt
|
25.4 KB
|
High Accuracy and High Fidelity Extraction of Neural Networks.eng.srt
|
21.0 KB
|
him Shimmeny Evaluating the Security & Privacy Contributions of Link Shimming.eng.json
|
610.5 KB
|
him Shimmeny Evaluating the Security & Privacy Contributions of Link Shimming.eng.lrc
|
16.4 KB
|
him Shimmeny Evaluating the Security & Privacy Contributions of Link Shimming.eng.srt
|
16.2 KB
|
him Shimmeny Evaluating the Security & Privacy Contributions of Link Shimming.eng.text
|
12.8 KB
|
him Shimmeny Evaluating the Security & Privacy Contributions of Link Shimming.eng.tsv
|
14.7 KB
|
him Shimmeny Evaluating the Security & Privacy Contributions of Link Shimming.eng.txt
|
16.5 KB
|
him Shimmeny Evaluating the Security & Privacy Contributions of Link Shimming.eng.vtt
|
15.3 KB
|
Horizontal Privilege Escalation in Trusted Applications.eng.srt
|
20.8 KB
|
Human Distinguishable Visual Key Fingerprints.eng.srt
|
25.5 KB
|
HybCache Hybrid Side-Channel-Resilient Caches for Trusted Execution.eng.json
|
666.2 KB
|
HybCache Hybrid Side-Channel-Resilient Caches for Trusted Execution.eng.lrc
|
18.7 KB
|
HybCache Hybrid Side-Channel-Resilient Caches for Trusted Execution.eng.srt
|
18.3 KB
|
HybCache Hybrid Side-Channel-Resilient Caches for Trusted Execution.eng.text
|
14.7 KB
|
HybCache Hybrid Side-Channel-Resilient Caches for Trusted Execution.eng.tsv
|
16.8 KB
|
HybCache Hybrid Side-Channel-Resilient Caches for Trusted Execution.eng.txt
|
18.9 KB
|
HybCache Hybrid Side-Channel-Resilient Caches for Trusted Execution.eng.vtt
|
17.3 KB
|
Hybrid Batch Attacks Finding Black-box Adversarial Examples with Limited.eng.srt
|
23.0 KB
|
I am uncomfortable sharing what I cant see - Privacy Concerns.eng.json
|
496.5 KB
|
I am uncomfortable sharing what I cant see - Privacy Concerns.eng.lrc
|
14.6 KB
|
I am uncomfortable sharing what I cant see - Privacy Concerns.eng.srt
|
14.0 KB
|
I am uncomfortable sharing what I cant see - Privacy Concerns.eng.text
|
10.7 KB
|
I am uncomfortable sharing what I cant see - Privacy Concerns.eng.tsv
|
12.7 KB
|
I am uncomfortable sharing what I cant see - Privacy Concerns.eng.txt
|
14.7 KB
|
I am uncomfortable sharing what I cant see - Privacy Concerns.eng.vtt
|
13.1 KB
|
I have too much respect for my elders Understanding South African Mobile.eng.srt
|
22.5 KB
|
Interpretable Deep Learning under Fire.eng.srt
|
19.2 KB
|
iOS, Your OS, Everybodys OS Vetting and Analyzing Network Services of iOS.eng.json
|
413.2 KB
|
iOS, Your OS, Everybodys OS Vetting and Analyzing Network Services of iOS.eng.lrc
|
11.6 KB
|
iOS, Your OS, Everybodys OS Vetting and Analyzing Network Services of iOS.eng.srt
|
12.0 KB
|
iOS, Your OS, Everybodys OS Vetting and Analyzing Network Services of iOS.eng.text
|
8.9 KB
|
iOS, Your OS, Everybodys OS Vetting and Analyzing Network Services of iOS.eng.tsv
|
10.3 KB
|
iOS, Your OS, Everybodys OS Vetting and Analyzing Network Services of iOS.eng.txt
|
11.7 KB
|
iOS, Your OS, Everybodys OS Vetting and Analyzing Network Services of iOS.eng.vtt
|
11.2 KB
|
Justinians GAAvernor Robust Distributed Learning with Gradient Aggregation.eng.json
|
466.2 KB
|
Justinians GAAvernor Robust Distributed Learning with Gradient Aggregation.eng.lrc
|
12.9 KB
|
Justinians GAAvernor Robust Distributed Learning with Gradient Aggregation.eng.srt
|
12.6 KB
|
Justinians GAAvernor Robust Distributed Learning with Gradient Aggregation.eng.text
|
9.6 KB
|
Justinians GAAvernor Robust Distributed Learning with Gradient Aggregation.eng.tsv
|
11.4 KB
|
Justinians GAAvernor Robust Distributed Learning with Gradient Aggregation.eng.txt
|
13.1 KB
|
Justinians GAAvernor Robust Distributed Learning with Gradient Aggregation.eng.vtt
|
11.8 KB
|
KOOBE Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write.eng.srt
|
21.6 KB
|
Light Commands Laser-Based Audio Injection Attacks on Voice-Controllable.eng.srt
|
29.4 KB
|
Liveness is Not Enough Enhancing Fingerprint Authentication with Behavioral.eng.srt
|
17.5 KB
|
Local Model Poisoning Attacks to Byzantine-Robust Federated Learning.eng.json
|
477.0 KB
|
Local Model Poisoning Attacks to Byzantine-Robust Federated Learning.eng.lrc
|
12.9 KB
|
Local Model Poisoning Attacks to Byzantine-Robust Federated Learning.eng.srt
|
14.4 KB
|
Local Model Poisoning Attacks to Byzantine-Robust Federated Learning.eng.text
|
10.1 KB
|
Local Model Poisoning Attacks to Byzantine-Robust Federated Learning.eng.tsv
|
11.6 KB
|
Local Model Poisoning Attacks to Byzantine-Robust Federated Learning.eng.txt
|
13.0 KB
|
Local Model Poisoning Attacks to Byzantine-Robust Federated Learning.eng.vtt
|
13.2 KB
|
McTiny Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers.eng.json
|
573.3 KB
|
McTiny Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers.eng.lrc
|
14.0 KB
|
McTiny Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers.eng.srt
|
15.6 KB
|
McTiny Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers.eng.text
|
10.9 KB
|
McTiny Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers.eng.tsv
|
12.6 KB
|
McTiny Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers.eng.txt
|
14.2 KB
|
McTiny Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers.eng.vtt
|
14.3 KB
|
Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines.eng.srt
|
22.1 KB
|
Medusa Microarchitectural Data Leakage via Automated Attack Synthesis.eng.srt
|
26.3 KB
|
MIRAGE Succinct Arguments for Randomized Algorithms with Applications.eng.srt
|
24.9 KB
|
Montage A Neural Network Language Model-Guided JavaScript Engine Fuzzer.eng.srt
|
22.0 KB
|
MUZZ Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded.eng.json
|
310.4 KB
|
MUZZ Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded.eng.lrc
|
8.7 KB
|
MUZZ Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded.eng.srt
|
9.8 KB
|
MUZZ Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded.eng.text
|
6.3 KB
|
MUZZ Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded.eng.tsv
|
7.6 KB
|
MUZZ Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded.eng.txt
|
8.8 KB
|
MUZZ Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded.eng.vtt
|
8.9 KB
|
MVP Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures.eng.json
|
367.0 KB
|
MVP Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures.eng.lrc
|
10.3 KB
|
MVP Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures.eng.srt
|
10.7 KB
|
MVP Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures.eng.text
|
8.0 KB
|
MVP Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures.eng.tsv
|
9.2 KB
|
MVP Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures.eng.txt
|
10.4 KB
|
MVP Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures.eng.vtt
|
10.0 KB
|
NetWarden Mitigating Network Covert Channels while Preserving Performance.eng.json
|
535.0 KB
|
NetWarden Mitigating Network Covert Channels while Preserving Performance.eng.lrc
|
14.8 KB
|
NetWarden Mitigating Network Covert Channels while Preserving Performance.eng.srt
|
14.8 KB
|
NetWarden Mitigating Network Covert Channels while Preserving Performance.eng.text
|
11.6 KB
|
NetWarden Mitigating Network Covert Channels while Preserving Performance.eng.tsv
|
13.3 KB
|
NetWarden Mitigating Network Covert Channels while Preserving Performance.eng.txt
|
15.0 KB
|
NetWarden Mitigating Network Covert Channels while Preserving Performance.eng.vtt
|
14.0 KB
|
NXNSAttack Recursive DNS Inefficiencies and Vulnerabilities.eng.srt
|
21.1 KB
|
On Training Robust PDF Malware Classifiers.eng.json
|
540.5 KB
|
On Training Robust PDF Malware Classifiers.eng.lrc
|
16.0 KB
|
On Training Robust PDF Malware Classifiers.eng.srt
|
15.1 KB
|
On Training Robust PDF Malware Classifiers.eng.text
|
11.2 KB
|
On Training Robust PDF Malware Classifiers.eng.tsv
|
13.8 KB
|
On Training Robust PDF Malware Classifiers.eng.txt
|
16.2 KB
|
On Training Robust PDF Malware Classifiers.eng.vtt
|
14.0 KB
|
P2IM Scalable and Hardware-independent Firmware Testing via Automatic.eng.srt
|
18.2 KB
|
Pancake Frequency Smoothing for Encrypted Data Stores.eng.srt
|
24.8 KB
|
Panel Digital Contact Tracing.eng.srt
|
132.7 KB
|
Panel The 2020 Election Remote Voting, Disinformation, and Audit.eng.srt
|
127.6 KB
|
ParmeSan Sanitizer-guided Greybox Fuzzing.eng.srt
|
25.3 KB
|
PARTEMU Enabling Dynamic Analysis of Real-World TrustZone Software.eng.json
|
436.1 KB
|
PARTEMU Enabling Dynamic Analysis of Real-World TrustZone Software.eng.lrc
|
11.5 KB
|
PARTEMU Enabling Dynamic Analysis of Real-World TrustZone Software.eng.srt
|
12.1 KB
|
PARTEMU Enabling Dynamic Analysis of Real-World TrustZone Software.eng.text
|
8.9 KB
|
PARTEMU Enabling Dynamic Analysis of Real-World TrustZone Software.eng.tsv
|
10.3 KB
|
PARTEMU Enabling Dynamic Analysis of Real-World TrustZone Software.eng.txt
|
11.6 KB
|
PARTEMU Enabling Dynamic Analysis of Real-World TrustZone Software.eng.vtt
|
11.2 KB
|
PCKV Locally Differentially Private Correlated Key-Value Data Collection.eng.json
|
396.8 KB
|
PCKV Locally Differentially Private Correlated Key-Value Data Collection.eng.lrc
|
10.9 KB
|
PCKV Locally Differentially Private Correlated Key-Value Data Collection.eng.srt
|
11.6 KB
|
PCKV Locally Differentially Private Correlated Key-Value Data Collection.eng.text
|
8.2 KB
|
PCKV Locally Differentially Private Correlated Key-Value Data Collection.eng.tsv
|
9.6 KB
|
PCKV Locally Differentially Private Correlated Key-Value Data Collection.eng.txt
|
11.0 KB
|
PCKV Locally Differentially Private Correlated Key-Value Data Collection.eng.vtt
|
10.7 KB
|
PhishTime Continuous Longitudinal Measurement of the Effectiveness.eng.srt
|
27.2 KB
|
PHMon A Programmable Hardware Monitor and Its Security Use Cases.eng.srt
|
22.5 KB
|
Pixel Multi-signatures for Consensus.eng.srt
|
21.8 KB
|
PKU Pitfalls Attacks on PKU-based Memory Isolation Systems.eng.json
|
431.1 KB
|
PKU Pitfalls Attacks on PKU-based Memory Isolation Systems.eng.lrc
|
11.6 KB
|
PKU Pitfalls Attacks on PKU-based Memory Isolation Systems.eng.srt
|
11.6 KB
|
PKU Pitfalls Attacks on PKU-based Memory Isolation Systems.eng.text
|
9.1 KB
|
PKU Pitfalls Attacks on PKU-based Memory Isolation Systems.eng.tsv
|
10.4 KB
|
PKU Pitfalls Attacks on PKU-based Memory Isolation Systems.eng.txt
|
11.7 KB
|
PKU Pitfalls Attacks on PKU-based Memory Isolation Systems.eng.vtt
|
10.9 KB
|
Plug-N-Pwned Comprehensive Vulnerability Analysis of OBD-II Dongles.eng.json
|
513.8 KB
|
Plug-N-Pwned Comprehensive Vulnerability Analysis of OBD-II Dongles.eng.lrc
|
15.9 KB
|
Plug-N-Pwned Comprehensive Vulnerability Analysis of OBD-II Dongles.eng.srt
|
13.2 KB
|
Plug-N-Pwned Comprehensive Vulnerability Analysis of OBD-II Dongles.eng.text
|
9.8 KB
|
Plug-N-Pwned Comprehensive Vulnerability Analysis of OBD-II Dongles.eng.tsv
|
13.0 KB
|
Plug-N-Pwned Comprehensive Vulnerability Analysis of OBD-II Dongles.eng.txt
|
16.1 KB
|
Plug-N-Pwned Comprehensive Vulnerability Analysis of OBD-II Dongles.eng.vtt
|
12.3 KB
|
Poison Over Troubled Forwarders A Cache Poisoning Attack Targeting DNS.eng.srt
|
17.6 KB
|
Preech A System for Privacy-Preserving Speech Transcription.eng.json
|
489.2 KB
|
Preech A System for Privacy-Preserving Speech Transcription.eng.lrc
|
13.6 KB
|
Preech A System for Privacy-Preserving Speech Transcription.eng.srt
|
14.5 KB
|
Preech A System for Privacy-Preserving Speech Transcription.eng.text
|
10.5 KB
|
Preech A System for Privacy-Preserving Speech Transcription.eng.tsv
|
12.1 KB
|
Preech A System for Privacy-Preserving Speech Transcription.eng.txt
|
13.7 KB
|
Preech A System for Privacy-Preserving Speech Transcription.eng.vtt
|
13.4 KB
|
Programmable In-Network Security for Context-aware BYOD Policies.eng.json
|
451.5 KB
|
Programmable In-Network Security for Context-aware BYOD Policies.eng.lrc
|
12.2 KB
|
Programmable In-Network Security for Context-aware BYOD Policies.eng.srt
|
13.2 KB
|
Programmable In-Network Security for Context-aware BYOD Policies.eng.text
|
9.5 KB
|
Programmable In-Network Security for Context-aware BYOD Policies.eng.tsv
|
10.9 KB
|
Programmable In-Network Security for Context-aware BYOD Policies.eng.txt
|
12.3 KB
|
Programmable In-Network Security for Context-aware BYOD Policies.eng.vtt
|
12.2 KB
|
RELOADREFRESH Abusing Cache Replacement Policies to Perform Stealthy Cache.eng.json
|
470.2 KB
|
RELOADREFRESH Abusing Cache Replacement Policies to Perform Stealthy Cache.eng.lrc
|
13.7 KB
|
RELOADREFRESH Abusing Cache Replacement Policies to Perform Stealthy Cache.eng.srt
|
11.3 KB
|
RELOADREFRESH Abusing Cache Replacement Policies to Perform Stealthy Cache.eng.text
|
8.4 KB
|
RELOADREFRESH Abusing Cache Replacement Policies to Perform Stealthy Cache.eng.tsv
|
11.2 KB
|
RELOADREFRESH Abusing Cache Replacement Policies to Perform Stealthy Cache.eng.txt
|
13.9 KB
|
RELOADREFRESH Abusing Cache Replacement Policies to Perform Stealthy Cache.eng.vtt
|
10.5 KB
|
Remote Side-Channel Attacks on Anonymous Transactions.eng.json
|
497.0 KB
|
Remote Side-Channel Attacks on Anonymous Transactions.eng.lrc
|
13.2 KB
|
Remote Side-Channel Attacks on Anonymous Transactions.eng.srt
|
13.1 KB
|
Remote Side-Channel Attacks on Anonymous Transactions.eng.text
|
10.3 KB
|
Remote Side-Channel Attacks on Anonymous Transactions.eng.tsv
|
11.9 KB
|
Remote Side-Channel Attacks on Anonymous Transactions.eng.txt
|
13.3 KB
|
Remote Side-Channel Attacks on Anonymous Transactions.eng.vtt
|
12.3 KB
|
Retrofitting Fine Grain Isolation in the Firefox Renderer.eng.srt
|
21.4 KB
|
SANNS Scaling Up Secure Approximate k-Nearest Neighbors Search.eng.srt
|
23.7 KB
|
SAVIOR Securing Autonomous Vehicles with Robust Physical Invariants.eng.srt
|
24.5 KB
|
Scaling Verifiable Computation Using Efficient Set Accumulators.eng.srt
|
27.6 KB
|
SEAL Attack Mitigation for Encrypted Databases via Adjustable Leakage.eng.json
|
495.4 KB
|
SEAL Attack Mitigation for Encrypted Databases via Adjustable Leakage.eng.lrc
|
12.9 KB
|
SEAL Attack Mitigation for Encrypted Databases via Adjustable Leakage.eng.srt
|
13.1 KB
|
SEAL Attack Mitigation for Encrypted Databases via Adjustable Leakage.eng.text
|
10.0 KB
|
SEAL Attack Mitigation for Encrypted Databases via Adjustable Leakage.eng.tsv
|
11.5 KB
|
SEAL Attack Mitigation for Encrypted Databases via Adjustable Leakage.eng.txt
|
13.0 KB
|
SEAL Attack Mitigation for Encrypted Databases via Adjustable Leakage.eng.vtt
|
12.3 KB
|
Secure Multi-party Computation of Differentially Private Median.eng.json
|
554.1 KB
|
Secure Multi-party Computation of Differentially Private Median.eng.lrc
|
15.6 KB
|
Secure Multi-party Computation of Differentially Private Median.eng.srt
|
15.2 KB
|
Secure Multi-party Computation of Differentially Private Median.eng.text
|
10.9 KB
|
Secure Multi-party Computation of Differentially Private Median.eng.tsv
|
13.4 KB
|
Secure Multi-party Computation of Differentially Private Median.eng.txt
|
15.8 KB
|
Secure Multi-party Computation of Differentially Private Median.eng.vtt
|
14.0 KB
|
Secure parallel computation on national scale volumes of data.eng.json
|
497.0 KB
|
Secure parallel computation on national scale volumes of data.eng.lrc
|
14.3 KB
|
Secure parallel computation on national scale volumes of data.eng.srt
|
13.0 KB
|
Secure parallel computation on national scale volumes of data.eng.text
|
10.1 KB
|
Secure parallel computation on national scale volumes of data.eng.tsv
|
12.3 KB
|
Secure parallel computation on national scale volumes of data.eng.txt
|
14.5 KB
|
Secure parallel computation on national scale volumes of data.eng.vtt
|
12.2 KB
|
Security Analysis of Unified Payments Interface and Payment Apps in India.eng.json
|
571.4 KB
|
Security Analysis of Unified Payments Interface and Payment Apps in India.eng.lrc
|
15.1 KB
|
Security Analysis of Unified Payments Interface and Payment Apps in India.eng.srt
|
16.1 KB
|
Security Analysis of Unified Payments Interface and Payment Apps in India.eng.text
|
11.8 KB
|
Security Analysis of Unified Payments Interface and Payment Apps in India.eng.tsv
|
13.6 KB
|
Security Analysis of Unified Payments Interface and Payment Apps in India.eng.txt
|
15.3 KB
|
Security Analysis of Unified Payments Interface and Payment Apps in India.eng.vtt
|
15.0 KB
|
See No Evil Phishing for Permissions with False Transparency.eng.json
|
612.3 KB
|
See No Evil Phishing for Permissions with False Transparency.eng.lrc
|
17.0 KB
|
See No Evil Phishing for Permissions with False Transparency.eng.srt
|
16.5 KB
|
See No Evil Phishing for Permissions with False Transparency.eng.text
|
12.2 KB
|
See No Evil Phishing for Permissions with False Transparency.eng.tsv
|
14.7 KB
|
See No Evil Phishing for Permissions with False Transparency.eng.txt
|
17.2 KB
|
See No Evil Phishing for Permissions with False Transparency.eng.vtt
|
15.3 KB
|
SENG, the SGX-Enforcing Network Gateway Authorizing Communication.eng.srt
|
23.7 KB
|
SHA-1 is a Shambles First Chosen-Prefix Collision on SHA-1 and Application.eng.json
|
595.9 KB
|
SHA-1 is a Shambles First Chosen-Prefix Collision on SHA-1 and Application.eng.lrc
|
14.9 KB
|
SHA-1 is a Shambles First Chosen-Prefix Collision on SHA-1 and Application.eng.srt
|
16.2 KB
|
SHA-1 is a Shambles First Chosen-Prefix Collision on SHA-1 and Application.eng.text
|
11.6 KB
|
SHA-1 is a Shambles First Chosen-Prefix Collision on SHA-1 and Application.eng.tsv
|
13.4 KB
|
SHA-1 is a Shambles First Chosen-Prefix Collision on SHA-1 and Application.eng.txt
|
15.0 KB
|
SHA-1 is a Shambles First Chosen-Prefix Collision on SHA-1 and Application.eng.vtt
|
15.0 KB
|
ShadowMove A Stealthy Lateral Movement Strategy.eng.srt
|
21.2 KB
|
Shattered Chain of Trust Understanding Security Risks in Cross-Cloud IoT.eng.srt
|
22.1 KB
|
Silhouette Efficient Protected Shadow Stacks for Embedded Systems.eng.srt
|
23.2 KB
|
SkillExplorer Understanding the Behavior of Skills in Large Scale.eng.json
|
491.1 KB
|
SkillExplorer Understanding the Behavior of Skills in Large Scale.eng.lrc
|
13.5 KB
|
SkillExplorer Understanding the Behavior of Skills in Large Scale.eng.srt
|
13.9 KB
|
SkillExplorer Understanding the Behavior of Skills in Large Scale.eng.text
|
9.4 KB
|
SkillExplorer Understanding the Behavior of Skills in Large Scale.eng.tsv
|
11.6 KB
|
SkillExplorer Understanding the Behavior of Skills in Large Scale.eng.txt
|
13.7 KB
|
SkillExplorer Understanding the Behavior of Skills in Large Scale.eng.vtt
|
12.7 KB
|
SmartVerif Push the Limit of Automation Capability of Verifying Security.eng.srt
|
21.2 KB
|
SpecFuzz Bringing Spectre-type vulnerabilities to the surface.eng.srt
|
22.4 KB
|
Stealthy Tracking of Autonomous Vehicles with Cache Side Channels.eng.json
|
419.0 KB
|
Stealthy Tracking of Autonomous Vehicles with Cache Side Channels.eng.lrc
|
11.2 KB
|
Stealthy Tracking of Autonomous Vehicles with Cache Side Channels.eng.srt
|
11.7 KB
|
Stealthy Tracking of Autonomous Vehicles with Cache Side Channels.eng.text
|
8.4 KB
|
Stealthy Tracking of Autonomous Vehicles with Cache Side Channels.eng.tsv
|
9.9 KB
|
Stealthy Tracking of Autonomous Vehicles with Cache Side Channels.eng.txt
|
11.3 KB
|
Stealthy Tracking of Autonomous Vehicles with Cache Side Channels.eng.vtt
|
10.8 KB
|
Stolen Memories Leveraging Model Memorization for Calibrated White-Box.eng.srt
|
29.6 KB
|
Sunrise to Sunset Analyzing the End-to-end Life Cycle and Effectiveness.eng.srt
|
25.8 KB
|
Symbolic execution with SymCC don't interpret, compile.eng.srt
|
19.8 KB
|
Sys A Static Symbolic Tool for Finding Good Bugs in Good (Browser) Code.eng.srt
|
23.8 KB
|
TeeRex Discovery and Exploitation of Memory Corruption Vulnerabilities.eng.json
|
447.0 KB
|
TeeRex Discovery and Exploitation of Memory Corruption Vulnerabilities.eng.lrc
|
11.9 KB
|
TeeRex Discovery and Exploitation of Memory Corruption Vulnerabilities.eng.srt
|
12.8 KB
|
TeeRex Discovery and Exploitation of Memory Corruption Vulnerabilities.eng.text
|
9.3 KB
|
TeeRex Discovery and Exploitation of Memory Corruption Vulnerabilities.eng.tsv
|
10.7 KB
|
TeeRex Discovery and Exploitation of Memory Corruption Vulnerabilities.eng.txt
|
12.0 KB
|
TeeRex Discovery and Exploitation of Memory Corruption Vulnerabilities.eng.vtt
|
11.9 KB
|
Temporal System Call Specialization for Attack Surface Reduction.eng.srt
|
22.4 KB
|
TextShield Robust Text Classification Based on Multimodal Embedding.eng.json
|
397.2 KB
|
TextShield Robust Text Classification Based on Multimodal Embedding.eng.lrc
|
11.0 KB
|
TextShield Robust Text Classification Based on Multimodal Embedding.eng.srt
|
11.5 KB
|
TextShield Robust Text Classification Based on Multimodal Embedding.eng.text
|
9.1 KB
|
TextShield Robust Text Classification Based on Multimodal Embedding.eng.tsv
|
10.1 KB
|
TextShield Robust Text Classification Based on Multimodal Embedding.eng.txt
|
11.1 KB
|
TextShield Robust Text Classification Based on Multimodal Embedding.eng.vtt
|
10.9 KB
|
That Was Then, This Is Now A Security Evaluation of Password Generation.eng.srt
|
21.4 KB
|
The Ballot is Busted Before the Blockchain A Security Analysis of Voatz.eng.srt
|
26.2 KB
|
The Impact of Ad-Blockers on Product Search and Purchase Behavior.eng.srt
|
27.3 KB
|
The Industrial Age of Hacking.eng.srt
|
24.9 KB
|
The Tools and Tactics Used in Intimate Partner Surveillance An Analysis.eng.json
|
657.0 KB
|
The Tools and Tactics Used in Intimate Partner Surveillance An Analysis.eng.lrc
|
18.9 KB
|
The Tools and Tactics Used in Intimate Partner Surveillance An Analysis.eng.srt
|
17.5 KB
|
The Tools and Tactics Used in Intimate Partner Surveillance An Analysis.eng.text
|
13.5 KB
|
The Tools and Tactics Used in Intimate Partner Surveillance An Analysis.eng.tsv
|
16.4 KB
|
The Tools and Tactics Used in Intimate Partner Surveillance An Analysis.eng.txt
|
19.1 KB
|
The Tools and Tactics Used in Intimate Partner Surveillance An Analysis.eng.vtt
|
16.4 KB
|
The Unpatchable Silicon A Full Break of the Bitstream Encryption of Xilinx.eng.srt
|
21.1 KB
|
Timeless Timing Attacks Exploiting Concurrency to Leak Secrets over Remote.eng.json
|
367.4 KB
|
Timeless Timing Attacks Exploiting Concurrency to Leak Secrets over Remote.eng.lrc
|
9.6 KB
|
Timeless Timing Attacks Exploiting Concurrency to Leak Secrets over Remote.eng.srt
|
9.9 KB
|
Timeless Timing Attacks Exploiting Concurrency to Leak Secrets over Remote.eng.text
|
7.4 KB
|
Timeless Timing Attacks Exploiting Concurrency to Leak Secrets over Remote.eng.tsv
|
8.6 KB
|
Timeless Timing Attacks Exploiting Concurrency to Leak Secrets over Remote.eng.txt
|
9.7 KB
|
Timeless Timing Attacks Exploiting Concurrency to Leak Secrets over Remote.eng.vtt
|
9.2 KB
|
Towards HTTPS Everywhere on Android We Are Not There Yet.eng.srt
|
29.5 KB
|
Towards Robust LiDAR-based Perception in Autonomous Driving General Black-box.eng.json
|
653.2 KB
|
Towards Robust LiDAR-based Perception in Autonomous Driving General Black-box.eng.lrc
|
17.8 KB
|
Towards Robust LiDAR-based Perception in Autonomous Driving General Black-box.eng.srt
|
18.0 KB
|
Towards Robust LiDAR-based Perception in Autonomous Driving General Black-box.eng.text
|
14.0 KB
|
Towards Robust LiDAR-based Perception in Autonomous Driving General Black-box.eng.tsv
|
16.0 KB
|
Towards Robust LiDAR-based Perception in Autonomous Driving General Black-box.eng.txt
|
18.0 KB
|
Towards Robust LiDAR-based Perception in Autonomous Driving General Black-box.eng.vtt
|
16.9 KB
|
TPM-FAIL TPM meets Timing and Lattice Attacks.eng.json
|
561.9 KB
|
TPM-FAIL TPM meets Timing and Lattice Attacks.eng.lrc
|
14.7 KB
|
TPM-FAIL TPM meets Timing and Lattice Attacks.eng.srt
|
14.5 KB
|
TPM-FAIL TPM meets Timing and Lattice Attacks.eng.text
|
11.5 KB
|
TPM-FAIL TPM meets Timing and Lattice Attacks.eng.tsv
|
13.2 KB
|
TPM-FAIL TPM meets Timing and Lattice Attacks.eng.txt
|
14.8 KB
|
TPM-FAIL TPM meets Timing and Lattice Attacks.eng.vtt
|
13.7 KB
|
TXSPECTOR Uncovering Attacks in Ethereum from Transactions.eng.json
|
438.1 KB
|
TXSPECTOR Uncovering Attacks in Ethereum from Transactions.eng.lrc
|
13.1 KB
|
TXSPECTOR Uncovering Attacks in Ethereum from Transactions.eng.srt
|
11.5 KB
|
TXSPECTOR Uncovering Attacks in Ethereum from Transactions.eng.text
|
7.9 KB
|
TXSPECTOR Uncovering Attacks in Ethereum from Transactions.eng.tsv
|
10.7 KB
|
TXSPECTOR Uncovering Attacks in Ethereum from Transactions.eng.txt
|
13.3 KB
|
TXSPECTOR Uncovering Attacks in Ethereum from Transactions.eng.vtt
|
10.5 KB
|
Understanding security mistakes developers make Qualitative analysis.eng.srt
|
26.1 KB
|
Updates-Leak Data Set Inference and Reconstruction Attacks in Online Learning.eng.json
|
605.8 KB
|
Updates-Leak Data Set Inference and Reconstruction Attacks in Online Learning.eng.lrc
|
15.1 KB
|
Updates-Leak Data Set Inference and Reconstruction Attacks in Online Learning.eng.srt
|
16.0 KB
|
Updates-Leak Data Set Inference and Reconstruction Attacks in Online Learning.eng.text
|
11.8 KB
|
Updates-Leak Data Set Inference and Reconstruction Attacks in Online Learning.eng.tsv
|
13.6 KB
|
Updates-Leak Data Set Inference and Reconstruction Attacks in Online Learning.eng.txt
|
15.3 KB
|
Updates-Leak Data Set Inference and Reconstruction Attacks in Online Learning.eng.vtt
|
14.9 KB
|
USBFuzz A Framework for Fuzzing USB Drivers by Device Emulation.eng.srt
|
17.8 KB
|
V0LTpwn Attacking x86 Processor Integrity from Software.eng.json
|
454.2 KB
|
V0LTpwn Attacking x86 Processor Integrity from Software.eng.lrc
|
12.6 KB
|
V0LTpwn Attacking x86 Processor Integrity from Software.eng.srt
|
12.1 KB
|
V0LTpwn Attacking x86 Processor Integrity from Software.eng.text
|
9.4 KB
|
V0LTpwn Attacking x86 Processor Integrity from Software.eng.tsv
|
11.1 KB
|
V0LTpwn Attacking x86 Processor Integrity from Software.eng.txt
|
12.7 KB
|
V0LTpwn Attacking x86 Processor Integrity from Software.eng.vtt
|
11.3 KB
|
Visor Privacy-Preserving Video Analytics as a Cloud Service.eng.srt
|
25.9 KB
|
Void A fast and light voice liveness detection system.eng.srt
|
21.4 KB
|
VoteAgain A scalable coercion-resistant voting system.eng.srt
|
25.3 KB
|
Walking Onions Scaling Anonymity Networks while Protecting Users.eng.srt
|
23.6 KB
|
What Twitter Knows Characterizing Ad Targeting Practices, User Perceptions.eng.srt
|
25.3 KB
|
who's Calling Characterizing Robocalls through Audio and Metadata Analysis.eng.srt
|
21.7 KB
|
You Are What You Broadcast Identification of Mobile and IoT Devices.eng.srt
|
18.0 KB
|
Zero-delay Lightweight Defenses against Website Fingerprinting.eng.srt
|
18.0 KB
|
/USENIX Security 2021/
|
A Highly Accurate Query-Recovery Attack against Searchable Encryption.mp4
|
11.6 MB
|
A Large Scale Study of User Behavior, Expectations and Engagement with.mp4
|
9.1 MB
|
A Large-Scale Interview Study on Information Security in and Attacks.mp4
|
9.4 MB
|
A Side Journey To Titan.mp4
|
8.6 MB
|
A Stealthy Location Identification Attack Exploiting Carrier Aggregation.mp4
|
8.4 MB
|
A11y and Privacy don't have to be mutually exclusive Constraining.mp4
|
9.3 MB
|
Abusing Hidden Properties to Attack the Node.js Ecosystem.mp4
|
9.6 MB
|
ABY2.0 Improved Mixed-Protocol Secure Two-Party Computation.mp4
|
10.7 MB
|
Accurately Measuring Global Risk of Amplification Attacks using AmpMap.mp4
|
9.3 MB
|
Acoustics to the Rescue Physical Key Inference Attack Revisited.mp4
|
8.8 MB
|
Adapting Security Warnings to Counter Online Disinformation.mp4
|
13.9 MB
|
AdCube WebVR Ad Fraud and Practical Confinement of Third-Party Ads.mp4
|
9.7 MB
|
Adversarial Policy Training against Deep Reinforcement Learning.mp4
|
10.1 MB
|
ALPACA Application Layer Protocol Confusion - Analyzing and Mitigating Cracks.mp4
|
8.3 MB
|
An Analysis of Speculative Type Confusion Vulnerabilities in the Wild.mp4
|
8.5 MB
|
An Investigation of the Android Kernel Patch Ecosystem.mp4
|
9.4 MB
|
Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing.mp4
|
7.9 MB
|
APICraft Fuzz Driver Generation for Closed-source SDK Libraries.mp4
|
9.6 MB
|
ARCUS Symbolic Root Cause Analysis of Exploits in Production Systems.mp4
|
7.8 MB
|
Are Privacy Dashboards Good for End Users Evaluating User Perceptions.mp4
|
14.2 MB
|
Assessing Browser-level Defense against IDN-based Phishing.mp4
|
11.2 MB
|
ATLAS A Sequence-based Learning Approach for Attack Investigation.mp4
|
11.5 MB
|
Automated Discovery of Denial-of-Service Vulnerabilities in Connected Vehicle.mp4
|
11.4 MB
|
Automatic Extraction of Secrets from the Transistor Jungle using.mp4
|
14.4 MB
|
Automatic Firmware Emulation through Invalidity-guided Knowledge Inference.mp4
|
15.0 MB
|
Automatic Policy Generation for Inter-Service Access Control of Microservices.mp4
|
11.6 MB
|
Balboa Bobbing and Weaving around Network Censorship.mp4
|
8.8 MB
|
Blind Backdoors in Deep Learning Models.mp4
|
11.8 MB
|
Blind In On-Path Attacks and Applications to VPNs.mp4
|
7.0 MB
|
Blinder Partition-Oblivious Hierarchical Scheduling.mp4
|
10.3 MB
|
Blitz Secure Multi-Hop Payments Without Two-Phase Commits.mp4
|
9.0 MB
|
Breaking Through Binaries Compiler-quality Instrumentation for Better.mp4
|
9.4 MB
|
CACTI Captcha Avoidance via Client-side TEE Integration.mp4
|
9.0 MB
|
CADE Detecting and Explaining Concept Drift Samples for Security Applications.mp4
|
8.9 MB
|
Can I Take Your Subdomain Exploring Same-Site Attacks in the Modern Web.mp4
|
13.1 MB
|
Can Systems Explain Permissions Better Understanding Users' Misperceptions.mp4
|
9.1 MB
|
CANARY - a reactive defense mechanism for Controller Area Networks based.mp4
|
12.2 MB
|
Capture Centralized Library Management for Heterogeneous IoT Devices.mp4
|
7.8 MB
|
Card Brand Mixup Attack Bypassing the PIN in non-Visa Cards by Using Them.mp4
|
8.6 MB
|
Catching Phishers By Their Bait Investigating the Dutch Phishing Landscape.mp4
|
14.8 MB
|
Causal Analysis for Software-Defined Networking Attacks.mp4
|
11.5 MB
|
Cerebro A Platform for Multi-Party Cryptographic Collaborative Learning.mp4
|
8.4 MB
|
Charger-Surfing Exploiting a Power Line Side-Channel for Smartphone.mp4
|
10.1 MB
|
CIPHERLEAKS Breaking Constant-time Cryptography on AMD SEV via.mp4
|
9.9 MB
|
CLARION Sound and Clear Provenance Tracking for Microservice Deployments.mp4
|
15.2 MB
|
Coco Co-Design and Co-Verification of Masked Software Implementations on CPUs.mp4
|
9.5 MB
|
Collective Information Security in Large-Scale Urban Protests.mp4
|
11.1 MB
|
Communication-Computation Trade-offs in PIR.mp4
|
10.6 MB
|
Compromised or Attacker-Owned A Large Scale Classification and Study.mp4
|
7.3 MB
|
Constrain't-guided Directed Greybox Fuzzing.mp4
|
10.8 MB
|
Cost-Aware Robust Tree Ensembles for Security Applications.mp4
|
6.3 MB
|
Cross-VM and Cross-Processor Covert Channels Exploiting Processor Idle.mp4
|
9.6 MB
|
CSProp Ciphertext and Signature Propagation Low-Overhead Public-Key.mp4
|
13.7 MB
|
CURE A Security Architecture with CUstomizable and Resilient Enclaves.mp4
|
11.3 MB
|
Data Poisoning Attacks to Local Differential Privacy Protocols.mp4
|
9.2 MB
|
Database Reconstruction from Noisy Volumes A Cache Side-Channel Attack.mp4
|
9.8 MB
|
Deep Entity Classification Abusive Account Detection for Online Social.mp4
|
7.6 MB
|
Deep-Dup An Adversarial Weight Duplication Attack Framework to Crush Deep.mp4
|
12.9 MB
|
DeepReflect Discovering Malicious Functionality through Binary Reconstruction.mp4
|
7.9 MB
|
Defeating DNN-Based Traffic Analysis Systems in Real-Time With Blind.mp4
|
12.6 MB
|
DEFInit An Analysis of Exposed Android Init Routines.mp4
|
8.3 MB
|
Demon in the Variant Statistical Analysis of DNNs for Robust Backdoor.mp4
|
9.1 MB
|
Detecting Kernel Refcount Bugs with Two-Dimensional Consistency Checking.mp4
|
10.5 MB
|
DICE - A Formally Verified Implementation of DICE Measured Boot.mp4
|
7.9 MB
|
Dirty Road Can Attack Security of Deep Learning based Automated Lane.mp4
|
13.9 MB
|
Disrupting Continuity of Apple's Wireless Ecosystem Security New Tracking.mp4
|
9.3 MB
|
Does logic locking work with EDA tools.mp4
|
7.8 MB
|
DOLMA Securing Speculation with the Principle of Transient Non-Observability.mp4
|
8.7 MB
|
Domain Shadowing Leveraging Content Delivery Networks for Robust Blocking.mp4
|
9.1 MB
|
Dompteur Taming Audio Adversarial Examples.mp4
|
10.4 MB
|
Double-Cross Attacks Subverting Active Learning Systems.mp4
|
10.6 MB
|
Driving 2FA Adoption at Scale Optimizing Two-Factor Authentication.mp4
|
11.6 MB
|
DRMI A Dataset Reduction Technology based on Mutual Information for Black-box.mp4
|
9.3 MB
|
Dynamic proofs of retrievability with low server storage.mp4
|
10.9 MB
|
Effect of Mood, Location, Trust, and Presence of Others on Video-Based.mp4
|
9.0 MB
|
Effective Notification Campaigns on the Web A Matter of Trust, Framing, and.mp4
|
8.6 MB
|
ELISE A Storage Efficient Logging System Powered by Redundancy Reduction.mp4
|
9.7 MB
|
Entangled Watermarks as a Defense against Model Extraction.mp4
|
9.6 MB
|
EOSAFE Security Analysis of EOSIO Smart Contracts.mp4
|
13.4 MB
|
Evaluating In-Workflow Messages for Improving Mental Models of End-to-End.mp4
|
9.6 MB
|
Evil Under the Sun Understanding and Discovering Attacks on Ethereum.mp4
|
9.2 MB
|
EVMPatch Timely and Automated Patching of Ethereum Smart Contracts.mp4
|
14.6 MB
|
Examining the Efficacy of Decoy-based and Psychological Cyber Deception.mp4
|
11.7 MB
|
Experiences Deploying Multi-Vantage-Point Domain Validation at Let's Encrypt.mp4
|
11.3 MB
|
Explanation Beats Context The Effect of Timing & Rationales on Users'.mp4
|
7.3 MB
|
Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers.mp4
|
9.5 MB
|
Exposing New Vulnerabilities of Error Handling Mechanism in CAN.mp4
|
9.6 MB
|
ExpRace Exploiting Kernel Races through Raising Interrupts.mp4
|
7.9 MB
|
Express Lowering the Cost of Metadata-hiding Communication with Cryptographic.mp4
|
8.9 MB
|
Extracting Training Data from Large Language Models.mp4
|
10.8 MB
|
Fantastic Four Honest-Majority Four-Party Secure Computation With Malicious.mp4
|
10.6 MB
|
Finding Bugs Using Your Own Code Detecting Functionally-similar yet.mp4
|
10.1 MB
|
Fine Grained Dataflow Tracking with Proximal Gradients.mp4
|
7.4 MB
|
Fingerprinting in Style Detecting Browser Extensions via Injected Style.mp4
|
11.6 MB
|
FlowDist Multi-Staged Refinement-Based Dynamic Information Flow Analysis for.mp4
|
12.2 MB
|
Forecasting Malware Capabilities From Cyber Attack Memory Images.mp4
|
14.6 MB
|
Formally Verified Memory Protection for a Commodity Multiprocessor Hypervisor.mp4
|
8.6 MB
|
Fragment and Forge Breaking Wi-Fi Through Frame Aggregation and Fragmentation.mp4
|
10.2 MB
|
Frontal Attack Leaking Control-Flow in SGX via the CPU Frontend.mp4
|
11.7 MB
|
Frontrunner Jones and the Raiders of the Dark Forest An Empirical Study.mp4
|
8.1 MB
|
Fuzzy Labeled Private Set Intersection with Applications to Private.mp4
|
9.5 MB
|
GForce GPU-Friendly Oblivious and Rapid Neural Network Inference.mp4
|
9.5 MB
|
Graph Backdoor.mp4
|
10.7 MB
|
Having Your Cake and Eating It An Analysis of Concession-Abuse-as-a-Service.mp4
|
7.8 MB
|
HAWatcher Semantics-Aware Anomaly Detection for Appified Smart Homes.mp4
|
8.9 MB
|
Helping Users Automatically Find and Manage Sensitive, Expendable Files.mp4
|
9.6 MB
|
Hermes Attack Steal DNN Models with Lossless Inference Accuracy.mp4
|
8.9 MB
|
Hiding the Access Pattern is Not Enough Exploiting Search Pattern Leakage.mp4
|
11.4 MB
|
Hopper Modeling and Detecting Lateral Movement.mp4
|
9.9 MB
|
How Great is the Great Firewall Measuring China's DNS Censorship.mp4
|
10.1 MB
|
How to Make Private Distributed Cardinality Estimation Practical.mp4
|
8.2 MB
|
I Always Feel Like Somebody's Sensing Me A Framework to Detect, Identify, and.mp4
|
7.9 MB
|
ICSFuzz Manipulating I Os and Repurposing Binary Code to Enable Instrumented.mp4
|
10.6 MB
|
Identifying Harmful Media in End-to-End Encrypted Communication.mp4
|
11.0 MB
|
Incrementally Updateable Honey Password Vaults.mp4
|
7.7 MB
|
Inexpensive Brainwave Authentication New Techniques and Insights.mp4
|
10.5 MB
|
Injection Attacks Reloaded Tunnelling Malicious Payloads over DNS.mp4
|
8.8 MB
|
Is Real-time Phishing Eliminated with FIDO Social Engineering Downgrade.mp4
|
8.4 MB
|
It's Stored, Hopefully, on an Encrypted Server Mitigating Users.mp4
|
9.7 MB
|
It's stressful having all these phones - Investigating Sex Workers Safety.mp4
|
9.4 MB
|
It's the Company, the Government, You and I - User Perceptions of.mp4
|
7.5 MB
|
Jaqen A High-Performance Switch-Native Approach for Detecting and Mitigating.mp4
|
13.2 MB
|
JAW Studying Client-side CSRF with Hybrid Property Graphs and Declarative.mp4
|
8.9 MB
|
Jetset Targeted Firmware Rehosting for Embedded Systems.mp4
|
7.2 MB
|
Kalεido Real-Time Privacy Control for Eye-Tracking Systems.mp4
|
10.0 MB
|
KeyForge Non-Attributable Email from Forward-Forgeable Signatures.mp4
|
8.1 MB
|
Leakage of Dataset Properties in Multi-Party Machine Learning.mp4
|
7.1 MB
|
LIGHTBLUE Automatic Profile-Aware Debloating of Bluetooth Stacks.mp4
|
8.4 MB
|
Locally Differentially Private Analysis of Graph Statistics.mp4
|
11.3 MB
|
Lord of the Ring(s) Side Channel Attacks on the CPU On-Chip Ring.mp4
|
11.4 MB
|
LZR Identifying Unexpected Internet Services.mp4
|
9.6 MB
|
M2MON Building an MMIO-based Security Reference Monitor for Unmanned Vehicles.mp4
|
8.9 MB
|
MAZE Towards Automated Heap Feng Shui.mp4
|
11.0 MB
|
MBA-Blast Unveiling and Simplifying Mixed Boolean-Arithmetic Obfuscation.mp4
|
7.0 MB
|
Messy States of Wiring Vulnerabilities in Emerging Personal Payment Systems.mp4
|
10.9 MB
|
mID Tracing Screen Photos via Moiré Patterns.mp4
|
9.6 MB
|
Mind Your Weight(s) A Large-scale Study on Insufficient Machine Learning.mp4
|
13.9 MB
|
Minerva- An Efficient Risk-Limiting Ballot Polling Audit.mp4
|
10.5 MB
|
MIRAGE Mitigating Conflict-Based Cache Attacks with a Practical.mp4
|
10.2 MB
|
MPInspector A Systematic and Automatic Approach for Evaluating the Security.mp4
|
10.2 MB
|
Muse Secure Inference Resilient to Malicious Clients.mp4
|
8.9 MB
|
Mystique Efficient Conversions for Zero-Knowledge Proofs with Applications.mp4
|
6.5 MB
|
Now I'm a bit angry - Individuals' Awareness, Perception, and Responses.mp4
|
10.4 MB
|
Nyx Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types.mp4
|
8.5 MB
|
Obfuscation-Resilient Executable Payload Extraction From Packed Malware.mp4
|
5.5 MB
|
ObliCheck Efficient Verification of Oblivious Algorithms with Unobservable.mp4
|
10.5 MB
|
On the Design and Misuse of Microcoded (Embedded) Processors-A Cautionary Note.mp4
|
9.3 MB
|
On the Routing-Aware Peering against Network-Eclipse Attacks in Bitcoin.mp4
|
9.3 MB
|
On the Usability of Authenticity Checks for Hardware Security Tokens.mp4
|
8.3 MB
|
Once is Never Enough Foundations for Sound Statistical Inference in Tor.mp4
|
14.4 MB
|
Osiris Automated Discovery of Microarchitectural Side Channels.mp4
|
9.0 MB
|
PACStack an Authenticated Call Stack.mp4
|
11.4 MB
|
Partitioning Oracle Attacks.mp4
|
9.6 MB
|
PASAN Detecting Peripheral Access Concurrency Bugs within Bare-Metal.mp4
|
10.2 MB
|
'Passwords Keep Me Safe' - Understanding What Children Think about Passwords.mp4
|
8.7 MB
|
PatchGuard A Provably Robust Defense against Adversarial Patches via Small.mp4
|
8.6 MB
|
PEARL Plausibly Deniable Flash Translation Layer using WOM coding.mp4
|
7.6 MB
|
People Count Contact Tracing Apps and Public Health.mp4
|
32.5 MB
|
Phishpedia A Hybrid Deep Learning Based Approach to Visually Identify.mp4
|
9.2 MB
|
PhishPrint Evading Phishing Detection Crawlers by Prior Profiling.mp4
|
9.6 MB
|
Poisoning the Unlabeled Dataset of Semi-Supervised Learning.mp4
|
9.3 MB
|
PolyScope Multi-Policy Access Control Analysis to Compute Authorized Attack.mp4
|
9.9 MB
|
Poseidon A New Hash Function for Zero-Knowledge Proof Systems.mp4
|
7.6 MB
|
Precise and Scalable Detection of Use-after-Compacting-Garbage-Collection Bugs.mp4
|
9.7 MB
|
Pretty Good Phone Privacy.mp4
|
9.2 MB
|
Preventing Use-After-Free Attacks with Fast Forward Allocation.mp4
|
8.9 MB
|
PrimeProbe 1, JavaScript 0 Overcoming Browser-based Side-Channel Defenses.mp4
|
6.9 MB
|
PriSEC A Privacy Settings Enforcement Controller.mp4
|
10.2 MB
|
Privacy and Integrity Preserving Computations with CRISP.mp4
|
9.9 MB
|
Privacy-Preserving and Standard-Compatible AKA Protocol for 5G.mp4
|
10.5 MB
|
Private Blocklist Lookups with Checklist.mp4
|
8.4 MB
|
PrivateDrop Practical Privacy-Preserving Authentication for Apple AirDrop.mp4
|
9.4 MB
|
PrivSyn Differentially Private Data Synthesis.mp4
|
8.9 MB
|
Protecting Cryptography Against Compelled Self-Incrimination.mp4
|
10.6 MB
|
PTAuth Temporal Memory Safety via Robust Points-to Authentication.mp4
|
7.2 MB
|
Raccoon Attack Finding and Exploiting Most-Significant-Bit-Oracles.mp4
|
7.8 MB
|
Rage Against the Machine Clear A Systematic Analysis of Machine Clears.mp4
|
10.7 MB
|
ReDMArk Bypassing RDMA Security Mechanisms.mp4
|
10.1 MB
|
ReDoSHunter A Combined Static and Dynamic Approach for Regular Expression DoS.mp4
|
9.1 MB
|
Reducing Bias in Modeling Real-world Password Strength via Deep Learning.mp4
|
11.0 MB
|
Reducing HSM Reliance in Payments through Proxy Re-Encryption.mp4
|
8.7 MB
|
Reducing Test Cases with Attention Mechanism of Neural Networks.mp4
|
7.8 MB
|
Research on the Security of Visual Reasoning CAPTCHA.mp4
|
11.5 MB
|
Ripple A Programmable, Decentralized Link-Flooding Defense Against Adaptive.mp4
|
10.0 MB
|
Risky Business Investigating the Security Practices of Vendors on an Online.mp4
|
15.4 MB
|
Rollercoaster An Efficient Group-Multicast Scheme for Mix Networks.mp4
|
9.3 MB
|
SandTrap Securing JavaScript-driven Trigger-Action Platforms.mp4
|
10.5 MB
|
Saphire Sandboxing PHP Applications with Tailored System Call Allowlists.mp4
|
10.1 MB
|
Scalable Detection of Promotional Website Defacements in Black Hat SEO.mp4
|
10.9 MB
|
SEAL Storage-efficient Causality Analysis on Enterprise Logs.mp4
|
8.5 MB
|
SEApp Bringing Mandatory Access Control to Android Apps.mp4
|
10.2 MB
|
Searching Encrypted Data with Size-Locked Indexes.mp4
|
9.8 MB
|
Security Analysis of the Democracy Live Online Voting System.mp4
|
9.2 MB
|
Security Obstacles and Motivations for Small Businesses from a CISO's.mp4
|
13.8 MB
|
SelectiveTain't Efficient Data Flow Tracking With Static Binary Rewriting.mp4
|
9.4 MB
|
Senate A Maliciously-Secure MPC Platform for Collaborative Analytics.mp4
|
13.4 MB
|
SHARD Fine-Grained Kernel Specialization with Context-Aware Hardening.mp4
|
8.0 MB
|
Share First, Ask Later (or Never) Studying Violations of GDPR's Explicit.mp4
|
10.9 MB
|
Sharing More and Checking Less Leveraging Common Input Keywords to Detect.mp4
|
11.5 MB
|
Shhhbe quiet - Reducing the Unwanted Interruptions of Notification.mp4
|
7.8 MB
|
SiamHAN IPv6 Address Correlation Attacks on TLS Encrypted Traffic.mp4
|
11.8 MB
|
SIGL Securing Software Installations Through Deep Graph Learning.mp4
|
9.2 MB
|
SLAP Improving Physical Adversarial Examples with Short-Lived Adversarial.mp4
|
17.2 MB
|
Smart Contract Vulnerabilities Vulnerable Does Not Imply Exploited.mp4
|
13.1 MB
|
SmarTest Effectively Hunting Vulnerable Transaction Sequences in Smart.mp4
|
7.5 MB
|
SMASH Synchronized Many-sided Rowhammer Attacks from JavaScript.mp4
|
12.1 MB
|
SocialHEISTing Understanding Stolen Facebook Accounts.mp4
|
7.9 MB
|
Stars Can Tell A Robust Method to Defend against GPS Spoofing Attacks.mp4
|
9.8 MB
|
Static Detection of Unsafe DMA Accesses in Device Drivers.mp4
|
13.1 MB
|
Stealing Links from Graph Neural Networks.mp4
|
8.8 MB
|
Strategies and Perceived Risks of Sending Sensitive Documents.mp4
|
8.9 MB
|
SWIFT Super-fast and Robust Privacy-Preserving Machine Learning.mp4
|
8.9 MB
|
Swiped Analyzing Ground-truth Data of a Marketplace for Stolen Debit.mp4
|
7.4 MB
|
Swivel Hardening WebAssembly against Spectre.mp4
|
7.6 MB
|
Systematic Evaluation of Privacy Risks of Machine Learning Models.mp4
|
10.3 MB
|
SyzVegas Beating Kernel Fuzzing Odds with Reinforcement Learning.mp4
|
11.7 MB
|
The Circle Of Life A Large-Scale Study of The IoT Malware Lifecycle.mp4
|
17.0 MB
|
The Complexities of Healing in Secure Group Messaging Why Cross-Group Effects.mp4
|
8.4 MB
|
The Hijackers Guide To The Galaxy Off-Path Taking Over Internet Resources.mp4
|
9.3 MB
|
The Role of Computer Security Customer Support in Helping Survivors.mp4
|
9.6 MB
|
The Use of Likely Invariants as Feedback for Fuzzers.mp4
|
9.6 MB
|
T-Miner A Generative Approach to Defend Against Trojan Attacks on DNN-based.mp4
|
9.9 MB
|
Token-Level Fuzzing.mp4
|
6.3 MB
|
Too Good to Be Safe Tricking Lane Detection in Autonomous Driving with Craft.mp4
|
13.2 MB
|
Towards Formal Verification of State Continuity for Enclave Programs.mp4
|
9.5 MB
|
U Can't Debug This Detecting JavaScript Anti-Debugging Techniques in the Wild.mp4
|
9.5 MB
|
Understanding and Detecting Disordered Error Handling with Precise Function.mp4
|
9.3 MB
|
Understanding Malicious Cross-library Data Harvesting on Android.mp4
|
10.2 MB
|
Undo Workarounds for Kernel Bugs.mp4
|
10.0 MB
|
UNIFUZZ A Holistic and Pragmatic Metrics-Driven Platform for Evaluating.mp4
|
10.3 MB
|
Using Amnesia to Detect Credential Database Breaches.mp4
|
7.5 MB
|
V0Finder Discovering the Correct Origin of Publicly Reported Software.mp4
|
10.9 MB
|
Virtual Secure Platform A Five-Stage Pipeline Processor over TFHE.mp4
|
10.8 MB
|
VoltPillager Hardware-based fault injection attacks against Intel SGX Enclaves.mp4
|
9.2 MB
|
VScape Assessing and Escaping Virtual Call Protections.mp4
|
12.5 MB
|
WaveGuard Understanding and Mitigating Audio Adversarial Examples.mp4
|
10.5 MB
|
Weak Links in Authentication Chains A Large-scale Analysis of Email Sender.mp4
|
14.4 MB
|
Weaponizing Middleboxes for TCP Reflected Amplification.mp4
|
18.4 MB
|
What's in a Name Exploring CA Certificate Control.mp4
|
9.3 MB
|
When Malware Changed Its Mind An Empirical Study of Variable Program Behavior.mp4
|
9.4 MB
|
Where's Crypto Automated Identification and Classification of Proprietary.mp4
|
13.4 MB
|
Why Eve and Mallory Still Love Android Revisiting TLS (In)Security in Android.mp4
|
10.0 MB
|
Why Older Adults (Don't) Use Password Managers.mp4
|
8.0 MB
|
Why TLS is better without STARTTLS A Security Analysis of STARTTLS.mp4
|
7.2 MB
|
Why wouldn't someone think of democracy as a target.mp4
|
10.2 MB
|
YARIX Scalable YARA-based Malware Intelligence.mp4
|
11.7 MB
|
You Autocomplete Me Poisoning Vulnerabilities in Neural Code Completion.mp4
|
11.1 MB
|
/.../USENIX Security 2021 captions/
|
A Highly Accurate Query-Recovery Attack against Searchable Encryption.eng.json
|
456.8 KB
|
A Highly Accurate Query-Recovery Attack against Searchable Encryption.eng.lrc
|
12.8 KB
|
A Highly Accurate Query-Recovery Attack against Searchable Encryption.eng.srt
|
13.1 KB
|
A Highly Accurate Query-Recovery Attack against Searchable Encryption.eng.text
|
9.0 KB
|
A Highly Accurate Query-Recovery Attack against Searchable Encryption.eng.tsv
|
11.0 KB
|
A Highly Accurate Query-Recovery Attack against Searchable Encryption.eng.txt
|
13.0 KB
|
A Highly Accurate Query-Recovery Attack against Searchable Encryption.eng.vtt
|
12.0 KB
|
A Large Scale Study of User Behavior, Expectations and Engagement with.eng.srt
|
21.9 KB
|
A Large-Scale Interview Study on Information Security in and Attacks.eng.srt
|
21.7 KB
|
A Side Journey To Titan.eng.json
|
398.8 KB
|
A Side Journey To Titan.eng.lrc
|
10.4 KB
|
A Side Journey To Titan.eng.srt
|
10.5 KB
|
A Side Journey To Titan.eng.text
|
7.5 KB
|
A Side Journey To Titan.eng.tsv
|
9.0 KB
|
A Side Journey To Titan.eng.txt
|
10.5 KB
|
A Side Journey To Titan.eng.vtt
|
9.7 KB
|
A Stealthy Location Identification Attack Exploiting Carrier Aggregation.eng.srt
|
20.0 KB
|
A11y and Privacy don't have to be mutually exclusive Constraining.eng.json
|
452.7 KB
|
A11y and Privacy don't have to be mutually exclusive Constraining.eng.lrc
|
13.0 KB
|
A11y and Privacy don't have to be mutually exclusive Constraining.eng.srt
|
13.3 KB
|
A11y and Privacy don't have to be mutually exclusive Constraining.eng.text
|
10.1 KB
|
A11y and Privacy don't have to be mutually exclusive Constraining.eng.tsv
|
11.6 KB
|
A11y and Privacy don't have to be mutually exclusive Constraining.eng.txt
|
13.1 KB
|
A11y and Privacy don't have to be mutually exclusive Constraining.eng.vtt
|
12.5 KB
|
Abusing Hidden Properties to Attack the Node.js Ecosystem.eng.json
|
402.3 KB
|
Abusing Hidden Properties to Attack the Node.js Ecosystem.eng.lrc
|
11.1 KB
|
Abusing Hidden Properties to Attack the Node.js Ecosystem.eng.srt
|
11.8 KB
|
Abusing Hidden Properties to Attack the Node.js Ecosystem.eng.text
|
8.6 KB
|
Abusing Hidden Properties to Attack the Node.js Ecosystem.eng.tsv
|
9.9 KB
|
Abusing Hidden Properties to Attack the Node.js Ecosystem.eng.txt
|
11.2 KB
|
Abusing Hidden Properties to Attack the Node.js Ecosystem.eng.vtt
|
10.9 KB
|
ABY2.0 Improved Mixed-Protocol Secure Two-Party Computation.eng.srt
|
16.7 KB
|
Accurately Measuring Global Risk of Amplification Attacks using AmpMap.eng.json
|
417.3 KB
|
Accurately Measuring Global Risk of Amplification Attacks using AmpMap.eng.lrc
|
11.3 KB
|
Accurately Measuring Global Risk of Amplification Attacks using AmpMap.eng.srt
|
12.3 KB
|
Accurately Measuring Global Risk of Amplification Attacks using AmpMap.eng.text
|
8.8 KB
|
Accurately Measuring Global Risk of Amplification Attacks using AmpMap.eng.tsv
|
10.1 KB
|
Accurately Measuring Global Risk of Amplification Attacks using AmpMap.eng.txt
|
11.4 KB
|
Accurately Measuring Global Risk of Amplification Attacks using AmpMap.eng.vtt
|
11.4 KB
|
Acoustics to the Rescue Physical Key Inference Attack Revisited.eng.srt
|
25.5 KB
|
Adapting Security Warnings to Counter Online Disinformation.eng.json
|
661.7 KB
|
Adapting Security Warnings to Counter Online Disinformation.eng.lrc
|
20.3 KB
|
Adapting Security Warnings to Counter Online Disinformation.eng.srt
|
18.3 KB
|
Adapting Security Warnings to Counter Online Disinformation.eng.text
|
13.7 KB
|
Adapting Security Warnings to Counter Online Disinformation.eng.tsv
|
17.2 KB
|
Adapting Security Warnings to Counter Online Disinformation.eng.txt
|
20.5 KB
|
Adapting Security Warnings to Counter Online Disinformation.eng.vtt
|
17.0 KB
|
AdCube WebVR Ad Fraud and Practical Confinement of Third-Party Ads.eng.json
|
416.0 KB
|
AdCube WebVR Ad Fraud and Practical Confinement of Third-Party Ads.eng.lrc
|
11.5 KB
|
AdCube WebVR Ad Fraud and Practical Confinement of Third-Party Ads.eng.srt
|
11.5 KB
|
AdCube WebVR Ad Fraud and Practical Confinement of Third-Party Ads.eng.text
|
8.4 KB
|
AdCube WebVR Ad Fraud and Practical Confinement of Third-Party Ads.eng.tsv
|
10.1 KB
|
AdCube WebVR Ad Fraud and Practical Confinement of Third-Party Ads.eng.txt
|
11.7 KB
|
AdCube WebVR Ad Fraud and Practical Confinement of Third-Party Ads.eng.vtt
|
10.7 KB
|
Adversarial Policy Training against Deep Reinforcement Learning.eng.json
|
521.5 KB
|
Adversarial Policy Training against Deep Reinforcement Learning.eng.lrc
|
14.1 KB
|
Adversarial Policy Training against Deep Reinforcement Learning.eng.srt
|
15.0 KB
|
Adversarial Policy Training against Deep Reinforcement Learning.eng.text
|
11.0 KB
|
Adversarial Policy Training against Deep Reinforcement Learning.eng.tsv
|
12.6 KB
|
Adversarial Policy Training against Deep Reinforcement Learning.eng.txt
|
14.2 KB
|
Adversarial Policy Training against Deep Reinforcement Learning.eng.vtt
|
13.9 KB
|
ALPACA Application Layer Protocol Confusion - Analyzing and Mitigating Cracks.eng.json
|
503.9 KB
|
ALPACA Application Layer Protocol Confusion - Analyzing and Mitigating Cracks.eng.lrc
|
13.6 KB
|
ALPACA Application Layer Protocol Confusion - Analyzing and Mitigating Cracks.eng.srt
|
14.0 KB
|
ALPACA Application Layer Protocol Confusion - Analyzing and Mitigating Cracks.eng.text
|
10.6 KB
|
ALPACA Application Layer Protocol Confusion - Analyzing and Mitigating Cracks.eng.tsv
|
12.2 KB
|
ALPACA Application Layer Protocol Confusion - Analyzing and Mitigating Cracks.eng.txt
|
13.7 KB
|
ALPACA Application Layer Protocol Confusion - Analyzing and Mitigating Cracks.eng.vtt
|
13.1 KB
|
An Analysis of Speculative Type Confusion Vulnerabilities in the Wild.eng.json
|
553.5 KB
|
An Analysis of Speculative Type Confusion Vulnerabilities in the Wild.eng.lrc
|
15.3 KB
|
An Analysis of Speculative Type Confusion Vulnerabilities in the Wild.eng.srt
|
15.3 KB
|
An Analysis of Speculative Type Confusion Vulnerabilities in the Wild.eng.text
|
12.0 KB
|
An Analysis of Speculative Type Confusion Vulnerabilities in the Wild.eng.tsv
|
13.7 KB
|
An Analysis of Speculative Type Confusion Vulnerabilities in the Wild.eng.txt
|
15.4 KB
|
An Analysis of Speculative Type Confusion Vulnerabilities in the Wild.eng.vtt
|
14.4 KB
|
An Investigation of the Android Kernel Patch Ecosystem.eng.json
|
376.7 KB
|
An Investigation of the Android Kernel Patch Ecosystem.eng.lrc
|
10.2 KB
|
An Investigation of the Android Kernel Patch Ecosystem.eng.srt
|
10.8 KB
|
An Investigation of the Android Kernel Patch Ecosystem.eng.text
|
7.7 KB
|
An Investigation of the Android Kernel Patch Ecosystem.eng.tsv
|
9.0 KB
|
An Investigation of the Android Kernel Patch Ecosystem.eng.txt
|
10.3 KB
|
An Investigation of the Android Kernel Patch Ecosystem.eng.vtt
|
10.0 KB
|
Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing.eng.srt
|
22.0 KB
|
APICraft Fuzz Driver Generation for Closed-source SDK Libraries.eng.json
|
451.2 KB
|
APICraft Fuzz Driver Generation for Closed-source SDK Libraries.eng.lrc
|
13.7 KB
|
APICraft Fuzz Driver Generation for Closed-source SDK Libraries.eng.srt
|
11.4 KB
|
APICraft Fuzz Driver Generation for Closed-source SDK Libraries.eng.text
|
8.4 KB
|
APICraft Fuzz Driver Generation for Closed-source SDK Libraries.eng.tsv
|
11.2 KB
|
APICraft Fuzz Driver Generation for Closed-source SDK Libraries.eng.txt
|
13.9 KB
|
APICraft Fuzz Driver Generation for Closed-source SDK Libraries.eng.vtt
|
10.6 KB
|
ARCUS Symbolic Root Cause Analysis of Exploits in Production Systems.eng.json
|
479.4 KB
|
ARCUS Symbolic Root Cause Analysis of Exploits in Production Systems.eng.lrc
|
12.3 KB
|
ARCUS Symbolic Root Cause Analysis of Exploits in Production Systems.eng.srt
|
12.2 KB
|
ARCUS Symbolic Root Cause Analysis of Exploits in Production Systems.eng.text
|
9.6 KB
|
ARCUS Symbolic Root Cause Analysis of Exploits in Production Systems.eng.tsv
|
11.1 KB
|
ARCUS Symbolic Root Cause Analysis of Exploits in Production Systems.eng.txt
|
12.5 KB
|
ARCUS Symbolic Root Cause Analysis of Exploits in Production Systems.eng.vtt
|
11.5 KB
|
Are Privacy Dashboards Good for End Users Evaluating User Perceptions.eng.json
|
514.7 KB
|
Are Privacy Dashboards Good for End Users Evaluating User Perceptions.eng.lrc
|
14.2 KB
|
Are Privacy Dashboards Good for End Users Evaluating User Perceptions.eng.srt
|
14.8 KB
|
Are Privacy Dashboards Good for End Users Evaluating User Perceptions.eng.text
|
11.5 KB
|
Are Privacy Dashboards Good for End Users Evaluating User Perceptions.eng.tsv
|
13.0 KB
|
Are Privacy Dashboards Good for End Users Evaluating User Perceptions.eng.txt
|
14.3 KB
|
Are Privacy Dashboards Good for End Users Evaluating User Perceptions.eng.vtt
|
13.9 KB
|
Assessing Browser-level Defense against IDN-based Phishing.eng.srt
|
20.7 KB
|
ATLAS A Sequence-based Learning Approach for Attack Investigation.eng.json
|
515.7 KB
|
ATLAS A Sequence-based Learning Approach for Attack Investigation.eng.lrc
|
14.1 KB
|
ATLAS A Sequence-based Learning Approach for Attack Investigation.eng.srt
|
14.7 KB
|
ATLAS A Sequence-based Learning Approach for Attack Investigation.eng.text
|
11.5 KB
|
ATLAS A Sequence-based Learning Approach for Attack Investigation.eng.tsv
|
12.9 KB
|
ATLAS A Sequence-based Learning Approach for Attack Investigation.eng.txt
|
14.2 KB
|
ATLAS A Sequence-based Learning Approach for Attack Investigation.eng.vtt
|
13.8 KB
|
Automated Discovery of Denial-of-Service Vulnerabilities in Connected Vehicle.eng.srt
|
23.1 KB
|
Automatic Extraction of Secrets from the Transistor Jungle using.eng.json
|
493.4 KB
|
Automatic Extraction of Secrets from the Transistor Jungle using.eng.lrc
|
15.0 KB
|
Automatic Extraction of Secrets from the Transistor Jungle using.eng.srt
|
11.9 KB
|
Automatic Extraction of Secrets from the Transistor Jungle using.eng.text
|
9.3 KB
|
Automatic Extraction of Secrets from the Transistor Jungle using.eng.tsv
|
12.3 KB
|
Automatic Extraction of Secrets from the Transistor Jungle using.eng.txt
|
15.2 KB
|
Automatic Extraction of Secrets from the Transistor Jungle using.eng.vtt
|
11.2 KB
|
Automatic Firmware Emulation through Invalidity-guided Knowledge Inference.eng.json
|
471.0 KB
|
Automatic Firmware Emulation through Invalidity-guided Knowledge Inference.eng.lrc
|
13.0 KB
|
Automatic Firmware Emulation through Invalidity-guided Knowledge Inference.eng.srt
|
12.9 KB
|
Automatic Firmware Emulation through Invalidity-guided Knowledge Inference.eng.text
|
9.5 KB
|
Automatic Firmware Emulation through Invalidity-guided Knowledge Inference.eng.tsv
|
11.4 KB
|
Automatic Firmware Emulation through Invalidity-guided Knowledge Inference.eng.txt
|
13.1 KB
|
Automatic Firmware Emulation through Invalidity-guided Knowledge Inference.eng.vtt
|
12.0 KB
|
Automatic Policy Generation for Inter-Service Access Control of Microservices.eng.srt
|
18.1 KB
|
Balboa Bobbing and Weaving around Network Censorship.eng.srt
|
25.9 KB
|
Blind Backdoors in Deep Learning Models.eng.json
|
507.2 KB
|
Blind Backdoors in Deep Learning Models.eng.lrc
|
12.9 KB
|
Blind Backdoors in Deep Learning Models.eng.srt
|
13.5 KB
|
Blind Backdoors in Deep Learning Models.eng.text
|
10.0 KB
|
Blind Backdoors in Deep Learning Models.eng.tsv
|
11.5 KB
|
Blind Backdoors in Deep Learning Models.eng.txt
|
13.0 KB
|
Blind Backdoors in Deep Learning Models.eng.vtt
|
12.6 KB
|
Blind In On-Path Attacks and Applications to VPNs.eng.srt
|
21.3 KB
|
Blinder Partition-Oblivious Hierarchical Scheduling.eng.json
|
509.6 KB
|
Blinder Partition-Oblivious Hierarchical Scheduling.eng.lrc
|
13.6 KB
|
Blinder Partition-Oblivious Hierarchical Scheduling.eng.srt
|
14.5 KB
|
Blinder Partition-Oblivious Hierarchical Scheduling.eng.text
|
10.5 KB
|
Blinder Partition-Oblivious Hierarchical Scheduling.eng.tsv
|
12.2 KB
|
Blinder Partition-Oblivious Hierarchical Scheduling.eng.txt
|
13.8 KB
|
Blinder Partition-Oblivious Hierarchical Scheduling.eng.vtt
|
13.4 KB
|
Blitz Secure Multi-Hop Payments Without Two-Phase Commits.eng.json
|
566.2 KB
|
Blitz Secure Multi-Hop Payments Without Two-Phase Commits.eng.lrc
|
14.5 KB
|
Blitz Secure Multi-Hop Payments Without Two-Phase Commits.eng.srt
|
15.3 KB
|
Blitz Secure Multi-Hop Payments Without Two-Phase Commits.eng.text
|
11.5 KB
|
Blitz Secure Multi-Hop Payments Without Two-Phase Commits.eng.tsv
|
13.1 KB
|
Blitz Secure Multi-Hop Payments Without Two-Phase Commits.eng.txt
|
14.7 KB
|
Blitz Secure Multi-Hop Payments Without Two-Phase Commits.eng.vtt
|
14.3 KB
|
Breaking Through Binaries Compiler-quality Instrumentation for Better.eng.srt
|
29.7 KB
|
CACTI Captcha Avoidance via Client-side TEE Integration.eng.json
|
359.6 KB
|
CACTI Captcha Avoidance via Client-side TEE Integration.eng.lrc
|
9.7 KB
|
CACTI Captcha Avoidance via Client-side TEE Integration.eng.srt
|
10.3 KB
|
CACTI Captcha Avoidance via Client-side TEE Integration.eng.text
|
7.6 KB
|
CACTI Captcha Avoidance via Client-side TEE Integration.eng.tsv
|
8.7 KB
|
CACTI Captcha Avoidance via Client-side TEE Integration.eng.txt
|
9.7 KB
|
CACTI Captcha Avoidance via Client-side TEE Integration.eng.vtt
|
9.6 KB
|
CADE Detecting and Explaining Concept Drift Samples for Security Applications.eng.json
|
495.9 KB
|
CADE Detecting and Explaining Concept Drift Samples for Security Applications.eng.lrc
|
14.7 KB
|
CADE Detecting and Explaining Concept Drift Samples for Security Applications.eng.srt
|
13.0 KB
|
CADE Detecting and Explaining Concept Drift Samples for Security Applications.eng.text
|
9.0 KB
|
CADE Detecting and Explaining Concept Drift Samples for Security Applications.eng.tsv
|
12.0 KB
|
CADE Detecting and Explaining Concept Drift Samples for Security Applications.eng.txt
|
15.0 KB
|
CADE Detecting and Explaining Concept Drift Samples for Security Applications.eng.vtt
|
11.9 KB
|
Can I Take Your Subdomain Exploring Same-Site Attacks in the Modern Web.eng.json
|
479.1 KB
|
Can I Take Your Subdomain Exploring Same-Site Attacks in the Modern Web.eng.lrc
|
13.3 KB
|
Can I Take Your Subdomain Exploring Same-Site Attacks in the Modern Web.eng.srt
|
13.2 KB
|
Can I Take Your Subdomain Exploring Same-Site Attacks in the Modern Web.eng.text
|
10.3 KB
|
Can I Take Your Subdomain Exploring Same-Site Attacks in the Modern Web.eng.tsv
|
11.9 KB
|
Can I Take Your Subdomain Exploring Same-Site Attacks in the Modern Web.eng.txt
|
13.4 KB
|
Can I Take Your Subdomain Exploring Same-Site Attacks in the Modern Web.eng.vtt
|
12.4 KB
|
Can Systems Explain Permissions Better Understanding Users' Misperceptions.eng.json
|
496.6 KB
|
Can Systems Explain Permissions Better Understanding Users' Misperceptions.eng.lrc
|
13.4 KB
|
Can Systems Explain Permissions Better Understanding Users' Misperceptions.eng.srt
|
14.3 KB
|
Can Systems Explain Permissions Better Understanding Users' Misperceptions.eng.text
|
10.4 KB
|
Can Systems Explain Permissions Better Understanding Users' Misperceptions.eng.tsv
|
12.0 KB
|
Can Systems Explain Permissions Better Understanding Users' Misperceptions.eng.txt
|
13.5 KB
|
Can Systems Explain Permissions Better Understanding Users' Misperceptions.eng.vtt
|
13.2 KB
|
CANARY - a reactive defense mechanism for Controller Area Networks based.eng.srt
|
24.5 KB
|
Capture Centralized Library Management for Heterogeneous IoT Devices.eng.srt
|
21.6 KB
|
Card Brand Mixup Attack Bypassing the PIN in non-Visa Cards by Using Them.eng.json
|
421.9 KB
|
Card Brand Mixup Attack Bypassing the PIN in non-Visa Cards by Using Them.eng.lrc
|
11.2 KB
|
Card Brand Mixup Attack Bypassing the PIN in non-Visa Cards by Using Them.eng.srt
|
11.7 KB
|
Card Brand Mixup Attack Bypassing the PIN in non-Visa Cards by Using Them.eng.text
|
8.5 KB
|
Card Brand Mixup Attack Bypassing the PIN in non-Visa Cards by Using Them.eng.tsv
|
9.9 KB
|
Card Brand Mixup Attack Bypassing the PIN in non-Visa Cards by Using Them.eng.txt
|
11.3 KB
|
Card Brand Mixup Attack Bypassing the PIN in non-Visa Cards by Using Them.eng.vtt
|
10.8 KB
|
Catching Phishers By Their Bait Investigating the Dutch Phishing Landscape.eng.json
|
558.2 KB
|
Catching Phishers By Their Bait Investigating the Dutch Phishing Landscape.eng.lrc
|
15.1 KB
|
Catching Phishers By Their Bait Investigating the Dutch Phishing Landscape.eng.srt
|
15.3 KB
|
Catching Phishers By Their Bait Investigating the Dutch Phishing Landscape.eng.text
|
11.8 KB
|
Catching Phishers By Their Bait Investigating the Dutch Phishing Landscape.eng.tsv
|
13.6 KB
|
Catching Phishers By Their Bait Investigating the Dutch Phishing Landscape.eng.txt
|
15.2 KB
|
Catching Phishers By Their Bait Investigating the Dutch Phishing Landscape.eng.vtt
|
14.4 KB
|
Causal Analysis for Software-Defined Networking Attacks.eng.srt
|
26.1 KB
|
Cerebro A Platform for Multi-Party Cryptographic Collaborative Learning.eng.json
|
560.1 KB
|
Cerebro A Platform for Multi-Party Cryptographic Collaborative Learning.eng.lrc
|
15.4 KB
|
Cerebro A Platform for Multi-Party Cryptographic Collaborative Learning.eng.srt
|
15.5 KB
|
Cerebro A Platform for Multi-Party Cryptographic Collaborative Learning.eng.text
|
12.0 KB
|
Cerebro A Platform for Multi-Party Cryptographic Collaborative Learning.eng.tsv
|
13.8 KB
|
Cerebro A Platform for Multi-Party Cryptographic Collaborative Learning.eng.txt
|
15.5 KB
|
Cerebro A Platform for Multi-Party Cryptographic Collaborative Learning.eng.vtt
|
14.5 KB
|
Charger-Surfing Exploiting a Power Line Side-Channel for Smartphone.eng.srt
|
23.4 KB
|
CIPHERLEAKS Breaking Constant-time Cryptography on AMD SEV via.eng.json
|
498.1 KB
|
CIPHERLEAKS Breaking Constant-time Cryptography on AMD SEV via.eng.lrc
|
12.9 KB
|
CIPHERLEAKS Breaking Constant-time Cryptography on AMD SEV via.eng.srt
|
14.2 KB
|
CIPHERLEAKS Breaking Constant-time Cryptography on AMD SEV via.eng.text
|
10.1 KB
|
CIPHERLEAKS Breaking Constant-time Cryptography on AMD SEV via.eng.tsv
|
11.6 KB
|
CIPHERLEAKS Breaking Constant-time Cryptography on AMD SEV via.eng.txt
|
13.0 KB
|
CIPHERLEAKS Breaking Constant-time Cryptography on AMD SEV via.eng.vtt
|
13.1 KB
|
CLARION Sound and Clear Provenance Tracking for Microservice Deployments.eng.srt
|
19.8 KB
|
Coco Co-Design and Co-Verification of Masked Software Implementations on CPUs.eng.srt
|
18.7 KB
|
Collective Information Security in Large-Scale Urban Protests.eng.srt
|
22.8 KB
|
Communication-Computation Trade-offs in PIR.eng.srt
|
30.7 KB
|
Compromised or Attacker-Owned A Large Scale Classification and Study.eng.json
|
485.2 KB
|
Compromised or Attacker-Owned A Large Scale Classification and Study.eng.lrc
|
12.9 KB
|
Compromised or Attacker-Owned A Large Scale Classification and Study.eng.srt
|
13.6 KB
|
Compromised or Attacker-Owned A Large Scale Classification and Study.eng.text
|
10.1 KB
|
Compromised or Attacker-Owned A Large Scale Classification and Study.eng.tsv
|
11.6 KB
|
Compromised or Attacker-Owned A Large Scale Classification and Study.eng.txt
|
13.0 KB
|
Compromised or Attacker-Owned A Large Scale Classification and Study.eng.vtt
|
12.7 KB
|
Constrain't-guided Directed Greybox Fuzzing.eng.json
|
411.2 KB
|
Constrain't-guided Directed Greybox Fuzzing.eng.lrc
|
10.5 KB
|
Constrain't-guided Directed Greybox Fuzzing.eng.srt
|
11.4 KB
|
Constrain't-guided Directed Greybox Fuzzing.eng.text
|
8.6 KB
|
Constrain't-guided Directed Greybox Fuzzing.eng.tsv
|
9.6 KB
|
Constrain't-guided Directed Greybox Fuzzing.eng.txt
|
10.6 KB
|
Constrain't-guided Directed Greybox Fuzzing.eng.vtt
|
10.7 KB
|
Cost-Aware Robust Tree Ensembles for Security Applications.eng.json
|
449.4 KB
|
Cost-Aware Robust Tree Ensembles for Security Applications.eng.lrc
|
12.2 KB
|
Cost-Aware Robust Tree Ensembles for Security Applications.eng.srt
|
11.9 KB
|
Cost-Aware Robust Tree Ensembles for Security Applications.eng.text
|
9.1 KB
|
Cost-Aware Robust Tree Ensembles for Security Applications.eng.tsv
|
10.7 KB
|
Cost-Aware Robust Tree Ensembles for Security Applications.eng.txt
|
12.3 KB
|
Cost-Aware Robust Tree Ensembles for Security Applications.eng.vtt
|
11.2 KB
|
Cross-VM and Cross-Processor Covert Channels Exploiting Processor Idle.eng.json
|
412.9 KB
|
Cross-VM and Cross-Processor Covert Channels Exploiting Processor Idle.eng.lrc
|
10.7 KB
|
Cross-VM and Cross-Processor Covert Channels Exploiting Processor Idle.eng.srt
|
11.6 KB
|
Cross-VM and Cross-Processor Covert Channels Exploiting Processor Idle.eng.text
|
8.2 KB
|
Cross-VM and Cross-Processor Covert Channels Exploiting Processor Idle.eng.tsv
|
9.5 KB
|
Cross-VM and Cross-Processor Covert Channels Exploiting Processor Idle.eng.txt
|
10.8 KB
|
Cross-VM and Cross-Processor Covert Channels Exploiting Processor Idle.eng.vtt
|
10.7 KB
|
CSProp Ciphertext and Signature Propagation Low-Overhead Public-Key.eng.json
|
517.3 KB
|
CSProp Ciphertext and Signature Propagation Low-Overhead Public-Key.eng.lrc
|
14.2 KB
|
CSProp Ciphertext and Signature Propagation Low-Overhead Public-Key.eng.srt
|
13.9 KB
|
CSProp Ciphertext and Signature Propagation Low-Overhead Public-Key.eng.text
|
11.0 KB
|
CSProp Ciphertext and Signature Propagation Low-Overhead Public-Key.eng.tsv
|
12.7 KB
|
CSProp Ciphertext and Signature Propagation Low-Overhead Public-Key.eng.txt
|
14.3 KB
|
CSProp Ciphertext and Signature Propagation Low-Overhead Public-Key.eng.vtt
|
13.1 KB
|
CURE A Security Architecture with CUstomizable and Resilient Enclaves.eng.json
|
516.8 KB
|
CURE A Security Architecture with CUstomizable and Resilient Enclaves.eng.lrc
|
13.5 KB
|
CURE A Security Architecture with CUstomizable and Resilient Enclaves.eng.srt
|
13.6 KB
|
CURE A Security Architecture with CUstomizable and Resilient Enclaves.eng.text
|
10.5 KB
|
CURE A Security Architecture with CUstomizable and Resilient Enclaves.eng.tsv
|
12.1 KB
|
CURE A Security Architecture with CUstomizable and Resilient Enclaves.eng.txt
|
13.6 KB
|
CURE A Security Architecture with CUstomizable and Resilient Enclaves.eng.vtt
|
12.8 KB
|
Data Poisoning Attacks to Local Differential Privacy Protocols.eng.srt
|
22.8 KB
|
Database Reconstruction from Noisy Volumes A Cache Side-Channel Attack.eng.json
|
525.7 KB
|
Database Reconstruction from Noisy Volumes A Cache Side-Channel Attack.eng.lrc
|
13.2 KB
|
Database Reconstruction from Noisy Volumes A Cache Side-Channel Attack.eng.srt
|
13.8 KB
|
Database Reconstruction from Noisy Volumes A Cache Side-Channel Attack.eng.text
|
9.3 KB
|
Database Reconstruction from Noisy Volumes A Cache Side-Channel Attack.eng.tsv
|
11.4 KB
|
Database Reconstruction from Noisy Volumes A Cache Side-Channel Attack.eng.txt
|
13.3 KB
|
Database Reconstruction from Noisy Volumes A Cache Side-Channel Attack.eng.vtt
|
12.6 KB
|
Deep Entity Classification Abusive Account Detection for Online Social.eng.srt
|
20.7 KB
|
Deep-Dup An Adversarial Weight Duplication Attack Framework to Crush Deep.eng.json
|
550.3 KB
|
Deep-Dup An Adversarial Weight Duplication Attack Framework to Crush Deep.eng.lrc
|
15.2 KB
|
Deep-Dup An Adversarial Weight Duplication Attack Framework to Crush Deep.eng.srt
|
15.8 KB
|
Deep-Dup An Adversarial Weight Duplication Attack Framework to Crush Deep.eng.text
|
11.6 KB
|
Deep-Dup An Adversarial Weight Duplication Attack Framework to Crush Deep.eng.tsv
|
13.5 KB
|
Deep-Dup An Adversarial Weight Duplication Attack Framework to Crush Deep.eng.txt
|
15.3 KB
|
Deep-Dup An Adversarial Weight Duplication Attack Framework to Crush Deep.eng.vtt
|
14.6 KB
|
DeepReflect Discovering Malicious Functionality through Binary Reconstruction.eng.srt
|
25.6 KB
|
Defeating DNN-Based Traffic Analysis Systems in Real-Time With Blind.eng.json
|
443.2 KB
|
Defeating DNN-Based Traffic Analysis Systems in Real-Time With Blind.eng.lrc
|
11.6 KB
|
Defeating DNN-Based Traffic Analysis Systems in Real-Time With Blind.eng.srt
|
11.4 KB
|
Defeating DNN-Based Traffic Analysis Systems in Real-Time With Blind.eng.text
|
9.0 KB
|
Defeating DNN-Based Traffic Analysis Systems in Real-Time With Blind.eng.tsv
|
10.4 KB
|
Defeating DNN-Based Traffic Analysis Systems in Real-Time With Blind.eng.txt
|
11.7 KB
|
Defeating DNN-Based Traffic Analysis Systems in Real-Time With Blind.eng.vtt
|
10.8 KB
|
DEFInit An Analysis of Exposed Android Init Routines.eng.srt
|
19.7 KB
|
Demon in the Variant Statistical Analysis of DNNs for Robust Backdoor.eng.srt
|
24.8 KB
|
Detecting Kernel Refcount Bugs with Two-Dimensional Consistency Checking.eng.json
|
448.4 KB
|
Detecting Kernel Refcount Bugs with Two-Dimensional Consistency Checking.eng.lrc
|
11.6 KB
|
Detecting Kernel Refcount Bugs with Two-Dimensional Consistency Checking.eng.srt
|
12.9 KB
|
Detecting Kernel Refcount Bugs with Two-Dimensional Consistency Checking.eng.text
|
8.9 KB
|
Detecting Kernel Refcount Bugs with Two-Dimensional Consistency Checking.eng.tsv
|
10.3 KB
|
Detecting Kernel Refcount Bugs with Two-Dimensional Consistency Checking.eng.txt
|
11.7 KB
|
Detecting Kernel Refcount Bugs with Two-Dimensional Consistency Checking.eng.vtt
|
11.8 KB
|
DICE - A Formally Verified Implementation of DICE Measured Boot.eng.json
|
421.2 KB
|
DICE - A Formally Verified Implementation of DICE Measured Boot.eng.lrc
|
11.3 KB
|
DICE - A Formally Verified Implementation of DICE Measured Boot.eng.srt
|
11.9 KB
|
DICE - A Formally Verified Implementation of DICE Measured Boot.eng.text
|
8.5 KB
|
DICE - A Formally Verified Implementation of DICE Measured Boot.eng.tsv
|
10.0 KB
|
DICE - A Formally Verified Implementation of DICE Measured Boot.eng.txt
|
11.4 KB
|
DICE - A Formally Verified Implementation of DICE Measured Boot.eng.vtt
|
11.0 KB
|
Dirty Road Can Attack Security of Deep Learning based Automated Lane.eng.srt
|
20.2 KB
|
Disrupting Continuity of Apple's Wireless Ecosystem Security New Tracking.eng.srt
|
22.3 KB
|
Does logic locking work with EDA tools.eng.json
|
358.6 KB
|
Does logic locking work with EDA tools.eng.lrc
|
9.6 KB
|
Does logic locking work with EDA tools.eng.srt
|
10.1 KB
|
Does logic locking work with EDA tools.eng.text
|
7.3 KB
|
Does logic locking work with EDA tools.eng.tsv
|
8.5 KB
|
Does logic locking work with EDA tools.eng.txt
|
9.7 KB
|
Does logic locking work with EDA tools.eng.vtt
|
9.4 KB
|
DOLMA Securing Speculation with the Principle of Transient Non-Observability.eng.json
|
562.4 KB
|
DOLMA Securing Speculation with the Principle of Transient Non-Observability.eng.lrc
|
15.0 KB
|
DOLMA Securing Speculation with the Principle of Transient Non-Observability.eng.srt
|
15.2 KB
|
DOLMA Securing Speculation with the Principle of Transient Non-Observability.eng.text
|
11.7 KB
|
DOLMA Securing Speculation with the Principle of Transient Non-Observability.eng.tsv
|
13.5 KB
|
DOLMA Securing Speculation with the Principle of Transient Non-Observability.eng.txt
|
15.1 KB
|
DOLMA Securing Speculation with the Principle of Transient Non-Observability.eng.vtt
|
14.3 KB
|
Domain Shadowing Leveraging Content Delivery Networks for Robust Blocking.eng.srt
|
23.8 KB
|
Dompteur Taming Audio Adversarial Examples.eng.json
|
404.2 KB
|
Dompteur Taming Audio Adversarial Examples.eng.lrc
|
10.8 KB
|
Dompteur Taming Audio Adversarial Examples.eng.srt
|
11.7 KB
|
Dompteur Taming Audio Adversarial Examples.eng.text
|
8.7 KB
|
Dompteur Taming Audio Adversarial Examples.eng.tsv
|
9.8 KB
|
Dompteur Taming Audio Adversarial Examples.eng.txt
|
10.8 KB
|
Dompteur Taming Audio Adversarial Examples.eng.vtt
|
10.9 KB
|
Double-Cross Attacks Subverting Active Learning Systems.eng.json
|
544.3 KB
|
Double-Cross Attacks Subverting Active Learning Systems.eng.lrc
|
15.3 KB
|
Double-Cross Attacks Subverting Active Learning Systems.eng.srt
|
16.5 KB
|
Double-Cross Attacks Subverting Active Learning Systems.eng.text
|
12.0 KB
|
Double-Cross Attacks Subverting Active Learning Systems.eng.tsv
|
13.7 KB
|
Double-Cross Attacks Subverting Active Learning Systems.eng.txt
|
15.4 KB
|
Double-Cross Attacks Subverting Active Learning Systems.eng.vtt
|
15.3 KB
|
Driving 2FA Adoption at Scale Optimizing Two-Factor Authentication.eng.json
|
537.1 KB
|
Driving 2FA Adoption at Scale Optimizing Two-Factor Authentication.eng.lrc
|
14.8 KB
|
Driving 2FA Adoption at Scale Optimizing Two-Factor Authentication.eng.srt
|
14.6 KB
|
Driving 2FA Adoption at Scale Optimizing Two-Factor Authentication.eng.text
|
11.6 KB
|
Driving 2FA Adoption at Scale Optimizing Two-Factor Authentication.eng.tsv
|
13.3 KB
|
Driving 2FA Adoption at Scale Optimizing Two-Factor Authentication.eng.txt
|
15.0 KB
|
Driving 2FA Adoption at Scale Optimizing Two-Factor Authentication.eng.vtt
|
13.8 KB
|
DRMI A Dataset Reduction Technology based on Mutual Information for Black-box.eng.json
|
456.5 KB
|
DRMI A Dataset Reduction Technology based on Mutual Information for Black-box.eng.lrc
|
13.0 KB
|
DRMI A Dataset Reduction Technology based on Mutual Information for Black-box.eng.srt
|
12.1 KB
|
DRMI A Dataset Reduction Technology based on Mutual Information for Black-box.eng.text
|
8.1 KB
|
DRMI A Dataset Reduction Technology based on Mutual Information for Black-box.eng.tsv
|
10.7 KB
|
DRMI A Dataset Reduction Technology based on Mutual Information for Black-box.eng.txt
|
13.2 KB
|
DRMI A Dataset Reduction Technology based on Mutual Information for Black-box.eng.vtt
|
11.0 KB
|
Dynamic proofs of retrievability with low server storage.eng.srt
|
23.2 KB
|
Effect of Mood, Location, Trust, and Presence of Others on Video-Based.eng.json
|
425.0 KB
|
Effect of Mood, Location, Trust, and Presence of Others on Video-Based.eng.lrc
|
11.3 KB
|
Effect of Mood, Location, Trust, and Presence of Others on Video-Based.eng.srt
|
12.7 KB
|
Effect of Mood, Location, Trust, and Presence of Others on Video-Based.eng.text
|
8.8 KB
|
Effect of Mood, Location, Trust, and Presence of Others on Video-Based.eng.tsv
|
10.2 KB
|
Effect of Mood, Location, Trust, and Presence of Others on Video-Based.eng.txt
|
11.4 KB
|
Effect of Mood, Location, Trust, and Presence of Others on Video-Based.eng.vtt
|
11.7 KB
|
Effective Notification Campaigns on the Web A Matter of Trust, Framing, and.eng.json
|
490.1 KB
|
Effective Notification Campaigns on the Web A Matter of Trust, Framing, and.eng.lrc
|
12.7 KB
|
Effective Notification Campaigns on the Web A Matter of Trust, Framing, and.eng.srt
|
12.9 KB
|
Effective Notification Campaigns on the Web A Matter of Trust, Framing, and.eng.text
|
9.9 KB
|
Effective Notification Campaigns on the Web A Matter of Trust, Framing, and.eng.tsv
|
11.4 KB
|
Effective Notification Campaigns on the Web A Matter of Trust, Framing, and.eng.txt
|
12.8 KB
|
Effective Notification Campaigns on the Web A Matter of Trust, Framing, and.eng.vtt
|
12.1 KB
|
ELISE A Storage Efficient Logging System Powered by Redundancy Reduction.eng.srt
|
20.1 KB
|
Entangled Watermarks as a Defense against Model Extraction.eng.json
|
610.9 KB
|
Entangled Watermarks as a Defense against Model Extraction.eng.lrc
|
16.2 KB
|
Entangled Watermarks as a Defense against Model Extraction.eng.srt
|
17.1 KB
|
Entangled Watermarks as a Defense against Model Extraction.eng.text
|
12.7 KB
|
Entangled Watermarks as a Defense against Model Extraction.eng.tsv
|
14.6 KB
|
Entangled Watermarks as a Defense against Model Extraction.eng.txt
|
16.4 KB
|
Entangled Watermarks as a Defense against Model Extraction.eng.vtt
|
15.9 KB
|
EOSAFE Security Analysis of EOSIO Smart Contracts.eng.srt
|
21.1 KB
|
Evaluating In-Workflow Messages for Improving Mental Models of End-to-End.eng.srt
|
24.2 KB
|
Evil Under the Sun Understanding and Discovering Attacks on Ethereum.eng.srt
|
20.0 KB
|
EVMPatch Timely and Automated Patching of Ethereum Smart Contracts.eng.srt
|
23.9 KB
|
Examining the Efficacy of Decoy-based and Psychological Cyber Deception.eng.json
|
521.9 KB
|
Examining the Efficacy of Decoy-based and Psychological Cyber Deception.eng.lrc
|
15.1 KB
|
Examining the Efficacy of Decoy-based and Psychological Cyber Deception.eng.srt
|
15.5 KB
|
Examining the Efficacy of Decoy-based and Psychological Cyber Deception.eng.text
|
11.8 KB
|
Examining the Efficacy of Decoy-based and Psychological Cyber Deception.eng.tsv
|
13.6 KB
|
Examining the Efficacy of Decoy-based and Psychological Cyber Deception.eng.txt
|
15.3 KB
|
Examining the Efficacy of Decoy-based and Psychological Cyber Deception.eng.vtt
|
14.5 KB
|
Experiences Deploying Multi-Vantage-Point Domain Validation at Let's Encrypt.eng.json
|
488.0 KB
|
Experiences Deploying Multi-Vantage-Point Domain Validation at Let's Encrypt.eng.lrc
|
13.5 KB
|
Experiences Deploying Multi-Vantage-Point Domain Validation at Let's Encrypt.eng.srt
|
13.9 KB
|
Experiences Deploying Multi-Vantage-Point Domain Validation at Let's Encrypt.eng.text
|
10.4 KB
|
Experiences Deploying Multi-Vantage-Point Domain Validation at Let's Encrypt.eng.tsv
|
12.0 KB
|
Experiences Deploying Multi-Vantage-Point Domain Validation at Let's Encrypt.eng.txt
|
13.6 KB
|
Experiences Deploying Multi-Vantage-Point Domain Validation at Let's Encrypt.eng.vtt
|
13.0 KB
|
Explanation Beats Context The Effect of Timing & Rationales on Users'.eng.json
|
436.2 KB
|
Explanation Beats Context The Effect of Timing & Rationales on Users'.eng.lrc
|
12.4 KB
|
Explanation Beats Context The Effect of Timing & Rationales on Users'.eng.srt
|
12.0 KB
|
Explanation Beats Context The Effect of Timing & Rationales on Users'.eng.text
|
9.5 KB
|
Explanation Beats Context The Effect of Timing & Rationales on Users'.eng.tsv
|
11.0 KB
|
Explanation Beats Context The Effect of Timing & Rationales on Users'.eng.txt
|
12.5 KB
|
Explanation Beats Context The Effect of Timing & Rationales on Users'.eng.vtt
|
11.4 KB
|
Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers.eng.srt
|
23.8 KB
|
Exposing New Vulnerabilities of Error Handling Mechanism in CAN.eng.json
|
538.5 KB
|
Exposing New Vulnerabilities of Error Handling Mechanism in CAN.eng.lrc
|
14.7 KB
|
Exposing New Vulnerabilities of Error Handling Mechanism in CAN.eng.srt
|
14.7 KB
|
Exposing New Vulnerabilities of Error Handling Mechanism in CAN.eng.text
|
11.5 KB
|
Exposing New Vulnerabilities of Error Handling Mechanism in CAN.eng.tsv
|
13.2 KB
|
Exposing New Vulnerabilities of Error Handling Mechanism in CAN.eng.txt
|
14.8 KB
|
Exposing New Vulnerabilities of Error Handling Mechanism in CAN.eng.vtt
|
13.8 KB
|
ExpRace Exploiting Kernel Races through Raising Interrupts.eng.json
|
328.9 KB
|
ExpRace Exploiting Kernel Races through Raising Interrupts.eng.lrc
|
8.7 KB
|
ExpRace Exploiting Kernel Races through Raising Interrupts.eng.srt
|
9.7 KB
|
ExpRace Exploiting Kernel Races through Raising Interrupts.eng.text
|
6.7 KB
|
ExpRace Exploiting Kernel Races through Raising Interrupts.eng.tsv
|
7.8 KB
|
ExpRace Exploiting Kernel Races through Raising Interrupts.eng.txt
|
8.8 KB
|
ExpRace Exploiting Kernel Races through Raising Interrupts.eng.vtt
|
8.9 KB
|
Express Lowering the Cost of Metadata-hiding Communication with Cryptographic.eng.json
|
723.5 KB
|
Express Lowering the Cost of Metadata-hiding Communication with Cryptographic.eng.lrc
|
18.8 KB
|
Express Lowering the Cost of Metadata-hiding Communication with Cryptographic.eng.srt
|
18.4 KB
|
Express Lowering the Cost of Metadata-hiding Communication with Cryptographic.eng.text
|
14.8 KB
|
Express Lowering the Cost of Metadata-hiding Communication with Cryptographic.eng.tsv
|
16.9 KB
|
Express Lowering the Cost of Metadata-hiding Communication with Cryptographic.eng.txt
|
19.0 KB
|
Express Lowering the Cost of Metadata-hiding Communication with Cryptographic.eng.vtt
|
17.4 KB
|
Extracting Training Data from Large Language Models.eng.json
|
568.1 KB
|
Extracting Training Data from Large Language Models.eng.lrc
|
14.4 KB
|
Extracting Training Data from Large Language Models.eng.srt
|
15.2 KB
|
Extracting Training Data from Large Language Models.eng.text
|
11.3 KB
|
Extracting Training Data from Large Language Models.eng.tsv
|
13.0 KB
|
Extracting Training Data from Large Language Models.eng.txt
|
14.6 KB
|
Extracting Training Data from Large Language Models.eng.vtt
|
14.2 KB
|
Fantastic Four Honest-Majority Four-Party Secure Computation With Malicious.eng.json
|
592.9 KB
|
Fantastic Four Honest-Majority Four-Party Secure Computation With Malicious.eng.lrc
|
15.0 KB
|
Fantastic Four Honest-Majority Four-Party Secure Computation With Malicious.eng.srt
|
15.4 KB
|
Fantastic Four Honest-Majority Four-Party Secure Computation With Malicious.eng.text
|
11.5 KB
|
Fantastic Four Honest-Majority Four-Party Secure Computation With Malicious.eng.tsv
|
13.3 KB
|
Fantastic Four Honest-Majority Four-Party Secure Computation With Malicious.eng.txt
|
15.1 KB
|
Fantastic Four Honest-Majority Four-Party Secure Computation With Malicious.eng.vtt
|
14.3 KB
|
Finding Bugs Using Your Own Code Detecting Functionally-similar yet.eng.srt
|
18.8 KB
|
Fine Grained Dataflow Tracking with Proximal Gradients.eng.json
|
383.0 KB
|
Fine Grained Dataflow Tracking with Proximal Gradients.eng.lrc
|
10.5 KB
|
Fine Grained Dataflow Tracking with Proximal Gradients.eng.srt
|
10.4 KB
|
Fine Grained Dataflow Tracking with Proximal Gradients.eng.text
|
8.1 KB
|
Fine Grained Dataflow Tracking with Proximal Gradients.eng.tsv
|
9.4 KB
|
Fine Grained Dataflow Tracking with Proximal Gradients.eng.txt
|
10.6 KB
|
Fine Grained Dataflow Tracking with Proximal Gradients.eng.vtt
|
9.8 KB
|
Fingerprinting in Style Detecting Browser Extensions via Injected Style.eng.json
|
504.6 KB
|
Fingerprinting in Style Detecting Browser Extensions via Injected Style.eng.lrc
|
12.9 KB
|
Fingerprinting in Style Detecting Browser Extensions via Injected Style.eng.srt
|
13.6 KB
|
Fingerprinting in Style Detecting Browser Extensions via Injected Style.eng.text
|
10.0 KB
|
Fingerprinting in Style Detecting Browser Extensions via Injected Style.eng.tsv
|
11.5 KB
|
Fingerprinting in Style Detecting Browser Extensions via Injected Style.eng.txt
|
13.0 KB
|
Fingerprinting in Style Detecting Browser Extensions via Injected Style.eng.vtt
|
12.6 KB
|
FlowDist Multi-Staged Refinement-Based Dynamic Information Flow Analysis for.eng.json
|
330.3 KB
|
FlowDist Multi-Staged Refinement-Based Dynamic Information Flow Analysis for.eng.lrc
|
9.3 KB
|
FlowDist Multi-Staged Refinement-Based Dynamic Information Flow Analysis for.eng.srt
|
10.2 KB
|
FlowDist Multi-Staged Refinement-Based Dynamic Information Flow Analysis for.eng.text
|
7.4 KB
|
FlowDist Multi-Staged Refinement-Based Dynamic Information Flow Analysis for.eng.tsv
|
8.4 KB
|
FlowDist Multi-Staged Refinement-Based Dynamic Information Flow Analysis for.eng.txt
|
9.4 KB
|
FlowDist Multi-Staged Refinement-Based Dynamic Information Flow Analysis for.eng.vtt
|
9.5 KB
|
Forecasting Malware Capabilities From Cyber Attack Memory Images.eng.json
|
369.9 KB
|
Forecasting Malware Capabilities From Cyber Attack Memory Images.eng.lrc
|
10.3 KB
|
Forecasting Malware Capabilities From Cyber Attack Memory Images.eng.srt
|
10.5 KB
|
Forecasting Malware Capabilities From Cyber Attack Memory Images.eng.text
|
8.0 KB
|
Forecasting Malware Capabilities From Cyber Attack Memory Images.eng.tsv
|
9.2 KB
|
Forecasting Malware Capabilities From Cyber Attack Memory Images.eng.txt
|
10.4 KB
|
Forecasting Malware Capabilities From Cyber Attack Memory Images.eng.vtt
|
9.9 KB
|
Formally Verified Memory Protection for a Commodity Multiprocessor Hypervisor.eng.srt
|
20.8 KB
|
Fragment and Forge Breaking Wi-Fi Through Frame Aggregation and Fragmentation.eng.json
|
550.6 KB
|
Fragment and Forge Breaking Wi-Fi Through Frame Aggregation and Fragmentation.eng.lrc
|
14.9 KB
|
Fragment and Forge Breaking Wi-Fi Through Frame Aggregation and Fragmentation.eng.srt
|
14.7 KB
|
Fragment and Forge Breaking Wi-Fi Through Frame Aggregation and Fragmentation.eng.text
|
11.4 KB
|
Fragment and Forge Breaking Wi-Fi Through Frame Aggregation and Fragmentation.eng.tsv
|
13.2 KB
|
Fragment and Forge Breaking Wi-Fi Through Frame Aggregation and Fragmentation.eng.txt
|
15.0 KB
|
Fragment and Forge Breaking Wi-Fi Through Frame Aggregation and Fragmentation.eng.vtt
|
13.8 KB
|
Frontal Attack Leaking Control-Flow in SGX via the CPU Frontend.eng.srt
|
24.8 KB
|
Frontrunner Jones and the Raiders of the Dark Forest An Empirical Study.eng.srt
|
22.3 KB
|
Fuzzy Labeled Private Set Intersection with Applications to Private.eng.json
|
460.9 KB
|
Fuzzy Labeled Private Set Intersection with Applications to Private.eng.lrc
|
14.2 KB
|
Fuzzy Labeled Private Set Intersection with Applications to Private.eng.srt
|
11.6 KB
|
Fuzzy Labeled Private Set Intersection with Applications to Private.eng.text
|
8.7 KB
|
Fuzzy Labeled Private Set Intersection with Applications to Private.eng.tsv
|
11.6 KB
|
Fuzzy Labeled Private Set Intersection with Applications to Private.eng.txt
|
14.4 KB
|
Fuzzy Labeled Private Set Intersection with Applications to Private.eng.vtt
|
10.8 KB
|
GForce GPU-Friendly Oblivious and Rapid Neural Network Inference.eng.json
|
561.2 KB
|
GForce GPU-Friendly Oblivious and Rapid Neural Network Inference.eng.lrc
|
14.3 KB
|
GForce GPU-Friendly Oblivious and Rapid Neural Network Inference.eng.srt
|
15.7 KB
|
GForce GPU-Friendly Oblivious and Rapid Neural Network Inference.eng.text
|
11.5 KB
|
GForce GPU-Friendly Oblivious and Rapid Neural Network Inference.eng.tsv
|
13.0 KB
|
GForce GPU-Friendly Oblivious and Rapid Neural Network Inference.eng.txt
|
14.5 KB
|
GForce GPU-Friendly Oblivious and Rapid Neural Network Inference.eng.vtt
|
14.5 KB
|
Graph Backdoor.eng.srt
|
21.6 KB
|
Having Your Cake and Eating It An Analysis of Concession-Abuse-as-a-Service.eng.json
|
402.7 KB
|
Having Your Cake and Eating It An Analysis of Concession-Abuse-as-a-Service.eng.lrc
|
11.1 KB
|
Having Your Cake and Eating It An Analysis of Concession-Abuse-as-a-Service.eng.srt
|
10.9 KB
|
Having Your Cake and Eating It An Analysis of Concession-Abuse-as-a-Service.eng.text
|
8.1 KB
|
Having Your Cake and Eating It An Analysis of Concession-Abuse-as-a-Service.eng.tsv
|
9.7 KB
|
Having Your Cake and Eating It An Analysis of Concession-Abuse-as-a-Service.eng.txt
|
11.2 KB
|
Having Your Cake and Eating It An Analysis of Concession-Abuse-as-a-Service.eng.vtt
|
10.2 KB
|
HAWatcher Semantics-Aware Anomaly Detection for Appified Smart Homes.eng.json
|
335.9 KB
|
HAWatcher Semantics-Aware Anomaly Detection for Appified Smart Homes.eng.lrc
|
9.1 KB
|
HAWatcher Semantics-Aware Anomaly Detection for Appified Smart Homes.eng.srt
|
9.7 KB
|
HAWatcher Semantics-Aware Anomaly Detection for Appified Smart Homes.eng.text
|
7.0 KB
|
HAWatcher Semantics-Aware Anomaly Detection for Appified Smart Homes.eng.tsv
|
8.1 KB
|
HAWatcher Semantics-Aware Anomaly Detection for Appified Smart Homes.eng.txt
|
9.2 KB
|
HAWatcher Semantics-Aware Anomaly Detection for Appified Smart Homes.eng.vtt
|
8.9 KB
|
Helping Users Automatically Find and Manage Sensitive, Expendable Files.eng.json
|
527.0 KB
|
Helping Users Automatically Find and Manage Sensitive, Expendable Files.eng.lrc
|
14.7 KB
|
Helping Users Automatically Find and Manage Sensitive, Expendable Files.eng.srt
|
15.5 KB
|
Helping Users Automatically Find and Manage Sensitive, Expendable Files.eng.text
|
11.5 KB
|
Helping Users Automatically Find and Manage Sensitive, Expendable Files.eng.tsv
|
13.2 KB
|
Helping Users Automatically Find and Manage Sensitive, Expendable Files.eng.txt
|
14.8 KB
|
Helping Users Automatically Find and Manage Sensitive, Expendable Files.eng.vtt
|
14.4 KB
|
Hermes Attack Steal DNN Models with Lossless Inference Accuracy.eng.json
|
479.1 KB
|
Hermes Attack Steal DNN Models with Lossless Inference Accuracy.eng.lrc
|
12.3 KB
|
Hermes Attack Steal DNN Models with Lossless Inference Accuracy.eng.srt
|
13.7 KB
|
Hermes Attack Steal DNN Models with Lossless Inference Accuracy.eng.text
|
9.6 KB
|
Hermes Attack Steal DNN Models with Lossless Inference Accuracy.eng.tsv
|
11.0 KB
|
Hermes Attack Steal DNN Models with Lossless Inference Accuracy.eng.txt
|
12.4 KB
|
Hermes Attack Steal DNN Models with Lossless Inference Accuracy.eng.vtt
|
12.6 KB
|
Hiding the Access Pattern is Not Enough Exploiting Search Pattern Leakage.eng.json
|
539.4 KB
|
Hiding the Access Pattern is Not Enough Exploiting Search Pattern Leakage.eng.lrc
|
14.8 KB
|
Hiding the Access Pattern is Not Enough Exploiting Search Pattern Leakage.eng.srt
|
15.2 KB
|
Hiding the Access Pattern is Not Enough Exploiting Search Pattern Leakage.eng.text
|
11.6 KB
|
Hiding the Access Pattern is Not Enough Exploiting Search Pattern Leakage.eng.tsv
|
13.3 KB
|
Hiding the Access Pattern is Not Enough Exploiting Search Pattern Leakage.eng.txt
|
14.9 KB
|
Hiding the Access Pattern is Not Enough Exploiting Search Pattern Leakage.eng.vtt
|
14.2 KB
|
Hopper Modeling and Detecting Lateral Movement.eng.srt
|
26.1 KB
|
How Great is the Great Firewall Measuring China's DNS Censorship.eng.srt
|
24.0 KB
|
How to Make Private Distributed Cardinality Estimation Practical.eng.srt
|
18.6 KB
|
I Always Feel Like Somebody's Sensing Me A Framework to Detect, Identify, and.eng.json
|
622.3 KB
|
I Always Feel Like Somebody's Sensing Me A Framework to Detect, Identify, and.eng.lrc
|
18.9 KB
|
I Always Feel Like Somebody's Sensing Me A Framework to Detect, Identify, and.eng.srt
|
14.6 KB
|
I Always Feel Like Somebody's Sensing Me A Framework to Detect, Identify, and.eng.text
|
10.6 KB
|
I Always Feel Like Somebody's Sensing Me A Framework to Detect, Identify, and.eng.tsv
|
15.0 KB
|
I Always Feel Like Somebody's Sensing Me A Framework to Detect, Identify, and.eng.txt
|
19.3 KB
|
I Always Feel Like Somebody's Sensing Me A Framework to Detect, Identify, and.eng.vtt
|
13.5 KB
|
ICSFuzz Manipulating I Os and Repurposing Binary Code to Enable Instrumented.eng.json
|
574.6 KB
|
ICSFuzz Manipulating I Os and Repurposing Binary Code to Enable Instrumented.eng.lrc
|
15.2 KB
|
ICSFuzz Manipulating I Os and Repurposing Binary Code to Enable Instrumented.eng.srt
|
16.7 KB
|
ICSFuzz Manipulating I Os and Repurposing Binary Code to Enable Instrumented.eng.text
|
11.9 KB
|
ICSFuzz Manipulating I Os and Repurposing Binary Code to Enable Instrumented.eng.tsv
|
13.7 KB
|
ICSFuzz Manipulating I Os and Repurposing Binary Code to Enable Instrumented.eng.txt
|
15.3 KB
|
ICSFuzz Manipulating I Os and Repurposing Binary Code to Enable Instrumented.eng.vtt
|
15.4 KB
|
Identifying Harmful Media in End-to-End Encrypted Communication.eng.srt
|
26.3 KB
|
Incrementally Updateable Honey Password Vaults.eng.srt
|
13.8 KB
|
Inexpensive Brainwave Authentication New Techniques and Insights.eng.json
|
427.0 KB
|
Inexpensive Brainwave Authentication New Techniques and Insights.eng.lrc
|
11.7 KB
|
Inexpensive Brainwave Authentication New Techniques and Insights.eng.srt
|
11.9 KB
|
Inexpensive Brainwave Authentication New Techniques and Insights.eng.text
|
9.1 KB
|
Inexpensive Brainwave Authentication New Techniques and Insights.eng.tsv
|
10.5 KB
|
Inexpensive Brainwave Authentication New Techniques and Insights.eng.txt
|
11.8 KB
|
Inexpensive Brainwave Authentication New Techniques and Insights.eng.vtt
|
11.2 KB
|
Injection Attacks Reloaded Tunnelling Malicious Payloads over DNS.eng.json
|
504.7 KB
|
Injection Attacks Reloaded Tunnelling Malicious Payloads over DNS.eng.lrc
|
15.0 KB
|
Injection Attacks Reloaded Tunnelling Malicious Payloads over DNS.eng.srt
|
12.1 KB
|
Injection Attacks Reloaded Tunnelling Malicious Payloads over DNS.eng.text
|
9.4 KB
|
Injection Attacks Reloaded Tunnelling Malicious Payloads over DNS.eng.tsv
|
12.4 KB
|
Injection Attacks Reloaded Tunnelling Malicious Payloads over DNS.eng.txt
|
15.2 KB
|
Injection Attacks Reloaded Tunnelling Malicious Payloads over DNS.eng.vtt
|
11.4 KB
|
Is Real-time Phishing Eliminated with FIDO Social Engineering Downgrade.eng.srt
|
22.0 KB
|
It's Stored, Hopefully, on an Encrypted Server Mitigating Users.eng.json
|
466.7 KB
|
It's Stored, Hopefully, on an Encrypted Server Mitigating Users.eng.lrc
|
12.7 KB
|
It's Stored, Hopefully, on an Encrypted Server Mitigating Users.eng.srt
|
13.1 KB
|
It's Stored, Hopefully, on an Encrypted Server Mitigating Users.eng.text
|
9.7 KB
|
It's Stored, Hopefully, on an Encrypted Server Mitigating Users.eng.tsv
|
11.3 KB
|
It's Stored, Hopefully, on an Encrypted Server Mitigating Users.eng.txt
|
12.8 KB
|
It's Stored, Hopefully, on an Encrypted Server Mitigating Users.eng.vtt
|
12.2 KB
|
It's stressful having all these phones - Investigating Sex Workers Safety.eng.srt
|
24.1 KB
|
It's the Company, the Government, You and I - User Perceptions of.eng.srt
|
19.1 KB
|
Jaqen A High-Performance Switch-Native Approach for Detecting and Mitigating.eng.srt
|
24.4 KB
|
JAW Studying Client-side CSRF with Hybrid Property Graphs and Declarative.eng.json
|
595.4 KB
|
JAW Studying Client-side CSRF with Hybrid Property Graphs and Declarative.eng.lrc
|
15.6 KB
|
JAW Studying Client-side CSRF with Hybrid Property Graphs and Declarative.eng.srt
|
15.6 KB
|
JAW Studying Client-side CSRF with Hybrid Property Graphs and Declarative.eng.text
|
12.3 KB
|
JAW Studying Client-side CSRF with Hybrid Property Graphs and Declarative.eng.tsv
|
14.1 KB
|
JAW Studying Client-side CSRF with Hybrid Property Graphs and Declarative.eng.txt
|
15.8 KB
|
JAW Studying Client-side CSRF with Hybrid Property Graphs and Declarative.eng.vtt
|
14.7 KB
|
Jetset Targeted Firmware Rehosting for Embedded Systems.eng.srt
|
24.8 KB
|
Kalεido Real-Time Privacy Control for Eye-Tracking Systems.eng.srt
|
22.5 KB
|
KeyForge Non-Attributable Email from Forward-Forgeable Signatures.eng.json
|
552.5 KB
|
KeyForge Non-Attributable Email from Forward-Forgeable Signatures.eng.lrc
|
16.3 KB
|
KeyForge Non-Attributable Email from Forward-Forgeable Signatures.eng.srt
|
13.6 KB
|
KeyForge Non-Attributable Email from Forward-Forgeable Signatures.eng.text
|
10.1 KB
|
KeyForge Non-Attributable Email from Forward-Forgeable Signatures.eng.tsv
|
13.4 KB
|
KeyForge Non-Attributable Email from Forward-Forgeable Signatures.eng.txt
|
16.5 KB
|
KeyForge Non-Attributable Email from Forward-Forgeable Signatures.eng.vtt
|
12.6 KB
|
Leakage of Dataset Properties in Multi-Party Machine Learning.eng.json
|
403.4 KB
|
Leakage of Dataset Properties in Multi-Party Machine Learning.eng.lrc
|
11.3 KB
|
Leakage of Dataset Properties in Multi-Party Machine Learning.eng.srt
|
11.4 KB
|
Leakage of Dataset Properties in Multi-Party Machine Learning.eng.text
|
8.5 KB
|
Leakage of Dataset Properties in Multi-Party Machine Learning.eng.tsv
|
10.0 KB
|
Leakage of Dataset Properties in Multi-Party Machine Learning.eng.txt
|
11.4 KB
|
Leakage of Dataset Properties in Multi-Party Machine Learning.eng.vtt
|
10.6 KB
|
LIGHTBLUE Automatic Profile-Aware Debloating of Bluetooth Stacks.eng.srt
|
16.9 KB
|
Locally Differentially Private Analysis of Graph Statistics.eng.json
|
424.5 KB
|
Locally Differentially Private Analysis of Graph Statistics.eng.lrc
|
10.6 KB
|
Locally Differentially Private Analysis of Graph Statistics.eng.srt
|
12.5 KB
|
Locally Differentially Private Analysis of Graph Statistics.eng.text
|
8.1 KB
|
Locally Differentially Private Analysis of Graph Statistics.eng.tsv
|
9.4 KB
|
Locally Differentially Private Analysis of Graph Statistics.eng.txt
|
10.7 KB
|
Locally Differentially Private Analysis of Graph Statistics.eng.vtt
|
11.3 KB
|
Lord of the Ring(s) Side Channel Attacks on the CPU On-Chip Ring.eng.json
|
676.2 KB
|
Lord of the Ring(s) Side Channel Attacks on the CPU On-Chip Ring.eng.lrc
|
17.2 KB
|
Lord of the Ring(s) Side Channel Attacks on the CPU On-Chip Ring.eng.srt
|
17.8 KB
|
Lord of the Ring(s) Side Channel Attacks on the CPU On-Chip Ring.eng.text
|
13.4 KB
|
Lord of the Ring(s) Side Channel Attacks on the CPU On-Chip Ring.eng.tsv
|
15.4 KB
|
Lord of the Ring(s) Side Channel Attacks on the CPU On-Chip Ring.eng.txt
|
17.3 KB
|
Lord of the Ring(s) Side Channel Attacks on the CPU On-Chip Ring.eng.vtt
|
16.6 KB
|
LZR Identifying Unexpected Internet Services.eng.srt
|
18.4 KB
|
M2MON Building an MMIO-based Security Reference Monitor for Unmanned Vehicles.eng.srt
|
21.4 KB
|
MAZE Towards Automated Heap Feng Shui.eng.json
|
375.7 KB
|
MAZE Towards Automated Heap Feng Shui.eng.lrc
|
9.6 KB
|
MAZE Towards Automated Heap Feng Shui.eng.srt
|
10.3 KB
|
MAZE Towards Automated Heap Feng Shui.eng.text
|
7.5 KB
|
MAZE Towards Automated Heap Feng Shui.eng.tsv
|
8.6 KB
|
MAZE Towards Automated Heap Feng Shui.eng.txt
|
9.7 KB
|
MAZE Towards Automated Heap Feng Shui.eng.vtt
|
9.5 KB
|
MBA-Blast Unveiling and Simplifying Mixed Boolean-Arithmetic Obfuscation.eng.json
|
367.2 KB
|
MBA-Blast Unveiling and Simplifying Mixed Boolean-Arithmetic Obfuscation.eng.lrc
|
9.8 KB
|
MBA-Blast Unveiling and Simplifying Mixed Boolean-Arithmetic Obfuscation.eng.srt
|
10.2 KB
|
MBA-Blast Unveiling and Simplifying Mixed Boolean-Arithmetic Obfuscation.eng.text
|
7.5 KB
|
MBA-Blast Unveiling and Simplifying Mixed Boolean-Arithmetic Obfuscation.eng.tsv
|
8.7 KB
|
MBA-Blast Unveiling and Simplifying Mixed Boolean-Arithmetic Obfuscation.eng.txt
|
9.9 KB
|
MBA-Blast Unveiling and Simplifying Mixed Boolean-Arithmetic Obfuscation.eng.vtt
|
9.5 KB
|
Messy States of Wiring Vulnerabilities in Emerging Personal Payment Systems.eng.srt
|
21.3 KB
|
mID Tracing Screen Photos via Moiré Patterns.eng.json
|
454.7 KB
|
mID Tracing Screen Photos via Moiré Patterns.eng.lrc
|
12.4 KB
|
mID Tracing Screen Photos via Moiré Patterns.eng.srt
|
12.4 KB
|
mID Tracing Screen Photos via Moiré Patterns.eng.text
|
9.2 KB
|
mID Tracing Screen Photos via Moiré Patterns.eng.tsv
|
10.9 KB
|
mID Tracing Screen Photos via Moiré Patterns.eng.txt
|
12.5 KB
|
mID Tracing Screen Photos via Moiré Patterns.eng.vtt
|
11.5 KB
|
Mind Your Weight(s) A Large-scale Study on Insufficient Machine Learning.eng.json
|
537.2 KB
|
Mind Your Weight(s) A Large-scale Study on Insufficient Machine Learning.eng.lrc
|
16.4 KB
|
Mind Your Weight(s) A Large-scale Study on Insufficient Machine Learning.eng.srt
|
13.6 KB
|
Mind Your Weight(s) A Large-scale Study on Insufficient Machine Learning.eng.text
|
9.9 KB
|
Mind Your Weight(s) A Large-scale Study on Insufficient Machine Learning.eng.tsv
|
13.4 KB
|
Mind Your Weight(s) A Large-scale Study on Insufficient Machine Learning.eng.txt
|
16.6 KB
|
Mind Your Weight(s) A Large-scale Study on Insufficient Machine Learning.eng.vtt
|
12.6 KB
|
Minerva- An Efficient Risk-Limiting Ballot Polling Audit.eng.srt
|
20.3 KB
|
MIRAGE Mitigating Conflict-Based Cache Attacks with a Practical.eng.json
|
596.2 KB
|
MIRAGE Mitigating Conflict-Based Cache Attacks with a Practical.eng.lrc
|
18.3 KB
|
MIRAGE Mitigating Conflict-Based Cache Attacks with a Practical.eng.srt
|
14.3 KB
|
MIRAGE Mitigating Conflict-Based Cache Attacks with a Practical.eng.text
|
11.2 KB
|
MIRAGE Mitigating Conflict-Based Cache Attacks with a Practical.eng.tsv
|
15.0 KB
|
MIRAGE Mitigating Conflict-Based Cache Attacks with a Practical.eng.txt
|
18.5 KB
|
MIRAGE Mitigating Conflict-Based Cache Attacks with a Practical.eng.vtt
|
13.5 KB
|
MPInspector A Systematic and Automatic Approach for Evaluating the Security.eng.json
|
401.1 KB
|
MPInspector A Systematic and Automatic Approach for Evaluating the Security.eng.lrc
|
11.8 KB
|
MPInspector A Systematic and Automatic Approach for Evaluating the Security.eng.srt
|
11.6 KB
|
MPInspector A Systematic and Automatic Approach for Evaluating the Security.eng.text
|
8.1 KB
|
MPInspector A Systematic and Automatic Approach for Evaluating the Security.eng.tsv
|
10.0 KB
|
MPInspector A Systematic and Automatic Approach for Evaluating the Security.eng.txt
|
11.9 KB
|
MPInspector A Systematic and Automatic Approach for Evaluating the Security.eng.vtt
|
10.6 KB
|
Muse Secure Inference Resilient to Malicious Clients.eng.json
|
588.5 KB
|
Muse Secure Inference Resilient to Malicious Clients.eng.lrc
|
16.0 KB
|
Muse Secure Inference Resilient to Malicious Clients.eng.srt
|
15.9 KB
|
Muse Secure Inference Resilient to Malicious Clients.eng.text
|
12.4 KB
|
Muse Secure Inference Resilient to Malicious Clients.eng.tsv
|
14.3 KB
|
Muse Secure Inference Resilient to Malicious Clients.eng.txt
|
16.1 KB
|
Muse Secure Inference Resilient to Malicious Clients.eng.vtt
|
15.0 KB
|
Mystique Efficient Conversions for Zero-Knowledge Proofs with Applications.eng.json
|
358.6 KB
|
Mystique Efficient Conversions for Zero-Knowledge Proofs with Applications.eng.lrc
|
9.6 KB
|
Mystique Efficient Conversions for Zero-Knowledge Proofs with Applications.eng.srt
|
10.3 KB
|
Mystique Efficient Conversions for Zero-Knowledge Proofs with Applications.eng.text
|
7.4 KB
|
Mystique Efficient Conversions for Zero-Knowledge Proofs with Applications.eng.tsv
|
8.6 KB
|
Mystique Efficient Conversions for Zero-Knowledge Proofs with Applications.eng.txt
|
9.7 KB
|
Mystique Efficient Conversions for Zero-Knowledge Proofs with Applications.eng.vtt
|
9.5 KB
|
Now I'm a bit angry - Individuals' Awareness, Perception, and Responses.eng.srt
|
22.7 KB
|
Nyx Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types.eng.json
|
489.8 KB
|
Nyx Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types.eng.lrc
|
12.5 KB
|
Nyx Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types.eng.srt
|
12.6 KB
|
Nyx Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types.eng.text
|
9.8 KB
|
Nyx Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types.eng.tsv
|
11.2 KB
|
Nyx Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types.eng.txt
|
12.6 KB
|
Nyx Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types.eng.vtt
|
11.8 KB
|
Obfuscation-Resilient Executable Payload Extraction From Packed Malware.eng.json
|
299.7 KB
|
Obfuscation-Resilient Executable Payload Extraction From Packed Malware.eng.lrc
|
8.1 KB
|
Obfuscation-Resilient Executable Payload Extraction From Packed Malware.eng.srt
|
8.3 KB
|
Obfuscation-Resilient Executable Payload Extraction From Packed Malware.eng.text
|
5.7 KB
|
Obfuscation-Resilient Executable Payload Extraction From Packed Malware.eng.tsv
|
7.0 KB
|
Obfuscation-Resilient Executable Payload Extraction From Packed Malware.eng.txt
|
8.2 KB
|
Obfuscation-Resilient Executable Payload Extraction From Packed Malware.eng.vtt
|
7.6 KB
|
ObliCheck Efficient Verification of Oblivious Algorithms with Unobservable.eng.json
|
519.9 KB
|
ObliCheck Efficient Verification of Oblivious Algorithms with Unobservable.eng.lrc
|
14.1 KB
|
ObliCheck Efficient Verification of Oblivious Algorithms with Unobservable.eng.srt
|
15.5 KB
|
ObliCheck Efficient Verification of Oblivious Algorithms with Unobservable.eng.text
|
11.0 KB
|
ObliCheck Efficient Verification of Oblivious Algorithms with Unobservable.eng.tsv
|
12.6 KB
|
ObliCheck Efficient Verification of Oblivious Algorithms with Unobservable.eng.txt
|
14.2 KB
|
ObliCheck Efficient Verification of Oblivious Algorithms with Unobservable.eng.vtt
|
14.3 KB
|
On the Design and Misuse of Microcoded (Embedded) Processors-A Cautionary Note.eng.srt
|
24.4 KB
|
On the Routing-Aware Peering against Network-Eclipse Attacks in Bitcoin.eng.srt
|
19.6 KB
|
On the Usability of Authenticity Checks for Hardware Security Tokens.eng.json
|
399.2 KB
|
On the Usability of Authenticity Checks for Hardware Security Tokens.eng.lrc
|
11.0 KB
|
On the Usability of Authenticity Checks for Hardware Security Tokens.eng.srt
|
10.7 KB
|
On the Usability of Authenticity Checks for Hardware Security Tokens.eng.text
|
8.5 KB
|
On the Usability of Authenticity Checks for Hardware Security Tokens.eng.tsv
|
9.8 KB
|
On the Usability of Authenticity Checks for Hardware Security Tokens.eng.txt
|
11.1 KB
|
On the Usability of Authenticity Checks for Hardware Security Tokens.eng.vtt
|
10.1 KB
|
Once is Never Enough Foundations for Sound Statistical Inference in Tor.eng.srt
|
24.8 KB
|
Osiris Automated Discovery of Microarchitectural Side Channels.eng.srt
|
23.0 KB
|
PACStack an Authenticated Call Stack.eng.srt
|
20.1 KB
|
Partitioning Oracle Attacks.eng.json
|
516.7 KB
|
Partitioning Oracle Attacks.eng.lrc
|
13.7 KB
|
Partitioning Oracle Attacks.eng.srt
|
14.5 KB
|
Partitioning Oracle Attacks.eng.text
|
10.7 KB
|
Partitioning Oracle Attacks.eng.tsv
|
12.3 KB
|
Partitioning Oracle Attacks.eng.txt
|
13.8 KB
|
Partitioning Oracle Attacks.eng.vtt
|
13.5 KB
|
PASAN Detecting Peripheral Access Concurrency Bugs within Bare-Metal.eng.srt
|
18.8 KB
|
'Passwords Keep Me Safe' - Understanding What Children Think about Passwords.eng.json
|
429.0 KB
|
'Passwords Keep Me Safe' - Understanding What Children Think about Passwords.eng.lrc
|
12.1 KB
|
'Passwords Keep Me Safe' - Understanding What Children Think about Passwords.eng.srt
|
12.5 KB
|
'Passwords Keep Me Safe' - Understanding What Children Think about Passwords.eng.text
|
9.2 KB
|
'Passwords Keep Me Safe' - Understanding What Children Think about Passwords.eng.tsv
|
10.8 KB
|
'Passwords Keep Me Safe' - Understanding What Children Think about Passwords.eng.txt
|
12.3 KB
|
'Passwords Keep Me Safe' - Understanding What Children Think about Passwords.eng.vtt
|
11.6 KB
|
PatchGuard A Provably Robust Defense against Adversarial Patches via Small.eng.json
|
512.6 KB
|
PatchGuard A Provably Robust Defense against Adversarial Patches via Small.eng.lrc
|
14.1 KB
|
PatchGuard A Provably Robust Defense against Adversarial Patches via Small.eng.srt
|
14.4 KB
|
PatchGuard A Provably Robust Defense against Adversarial Patches via Small.eng.text
|
9.9 KB
|
PatchGuard A Provably Robust Defense against Adversarial Patches via Small.eng.tsv
|
12.1 KB
|
PatchGuard A Provably Robust Defense against Adversarial Patches via Small.eng.txt
|
14.3 KB
|
PatchGuard A Provably Robust Defense against Adversarial Patches via Small.eng.vtt
|
13.2 KB
|
PEARL Plausibly Deniable Flash Translation Layer using WOM coding.eng.json
|
610.2 KB
|
PEARL Plausibly Deniable Flash Translation Layer using WOM coding.eng.lrc
|
17.6 KB
|
PEARL Plausibly Deniable Flash Translation Layer using WOM coding.eng.srt
|
14.1 KB
|
PEARL Plausibly Deniable Flash Translation Layer using WOM coding.eng.text
|
11.0 KB
|
PEARL Plausibly Deniable Flash Translation Layer using WOM coding.eng.tsv
|
14.5 KB
|
PEARL Plausibly Deniable Flash Translation Layer using WOM coding.eng.txt
|
17.8 KB
|
PEARL Plausibly Deniable Flash Translation Layer using WOM coding.eng.vtt
|
13.2 KB
|
People Count Contact Tracing Apps and Public Health.eng.json
|
2.6 MB
|
People Count Contact Tracing Apps and Public Health.eng.lrc
|
65.7 KB
|
People Count Contact Tracing Apps and Public Health.eng.srt
|
72.7 KB
|
People Count Contact Tracing Apps and Public Health.eng.text
|
51.0 KB
|
People Count Contact Tracing Apps and Public Health.eng.tsv
|
59.7 KB
|
People Count Contact Tracing Apps and Public Health.eng.txt
|
66.2 KB
|
People Count Contact Tracing Apps and Public Health.eng.vtt
|
66.6 KB
|
Phishpedia A Hybrid Deep Learning Based Approach to Visually Identify.eng.srt
|
19.1 KB
|
PhishPrint Evading Phishing Detection Crawlers by Prior Profiling.eng.json
|
466.9 KB
|
PhishPrint Evading Phishing Detection Crawlers by Prior Profiling.eng.lrc
|
12.2 KB
|
PhishPrint Evading Phishing Detection Crawlers by Prior Profiling.eng.srt
|
13.3 KB
|
PhishPrint Evading Phishing Detection Crawlers by Prior Profiling.eng.text
|
9.9 KB
|
PhishPrint Evading Phishing Detection Crawlers by Prior Profiling.eng.tsv
|
11.1 KB
|
PhishPrint Evading Phishing Detection Crawlers by Prior Profiling.eng.txt
|
12.3 KB
|
PhishPrint Evading Phishing Detection Crawlers by Prior Profiling.eng.vtt
|
12.4 KB
|
Poisoning the Unlabeled Dataset of Semi-Supervised Learning.eng.srt
|
27.1 KB
|
PolyScope Multi-Policy Access Control Analysis to Compute Authorized Attack.eng.json
|
439.5 KB
|
PolyScope Multi-Policy Access Control Analysis to Compute Authorized Attack.eng.lrc
|
11.9 KB
|
PolyScope Multi-Policy Access Control Analysis to Compute Authorized Attack.eng.srt
|
12.7 KB
|
PolyScope Multi-Policy Access Control Analysis to Compute Authorized Attack.eng.text
|
9.2 KB
|
PolyScope Multi-Policy Access Control Analysis to Compute Authorized Attack.eng.tsv
|
10.6 KB
|
PolyScope Multi-Policy Access Control Analysis to Compute Authorized Attack.eng.txt
|
12.0 KB
|
PolyScope Multi-Policy Access Control Analysis to Compute Authorized Attack.eng.vtt
|
11.7 KB
|
Poseidon A New Hash Function for Zero-Knowledge Proof Systems.eng.srt
|
19.7 KB
|
Precise and Scalable Detection of Use-after-Compacting-Garbage-Collection Bugs.eng.json
|
470.4 KB
|
Precise and Scalable Detection of Use-after-Compacting-Garbage-Collection Bugs.eng.lrc
|
12.7 KB
|
Precise and Scalable Detection of Use-after-Compacting-Garbage-Collection Bugs.eng.srt
|
13.2 KB
|
Precise and Scalable Detection of Use-after-Compacting-Garbage-Collection Bugs.eng.text
|
9.8 KB
|
Precise and Scalable Detection of Use-after-Compacting-Garbage-Collection Bugs.eng.tsv
|
11.3 KB
|
Precise and Scalable Detection of Use-after-Compacting-Garbage-Collection Bugs.eng.txt
|
12.8 KB
|
Precise and Scalable Detection of Use-after-Compacting-Garbage-Collection Bugs.eng.vtt
|
12.3 KB
|
Pretty Good Phone Privacy.eng.json
|
576.7 KB
|
Pretty Good Phone Privacy.eng.lrc
|
14.7 KB
|
Pretty Good Phone Privacy.eng.srt
|
15.7 KB
|
Pretty Good Phone Privacy.eng.text
|
11.6 KB
|
Pretty Good Phone Privacy.eng.tsv
|
13.3 KB
|
Pretty Good Phone Privacy.eng.txt
|
14.8 KB
|
Pretty Good Phone Privacy.eng.vtt
|
14.6 KB
|
Preventing Use-After-Free Attacks with Fast Forward Allocation.eng.json
|
476.0 KB
|
Preventing Use-After-Free Attacks with Fast Forward Allocation.eng.lrc
|
13.2 KB
|
Preventing Use-After-Free Attacks with Fast Forward Allocation.eng.srt
|
13.4 KB
|
Preventing Use-After-Free Attacks with Fast Forward Allocation.eng.text
|
10.2 KB
|
Preventing Use-After-Free Attacks with Fast Forward Allocation.eng.tsv
|
11.8 KB
|
Preventing Use-After-Free Attacks with Fast Forward Allocation.eng.txt
|
13.3 KB
|
Preventing Use-After-Free Attacks with Fast Forward Allocation.eng.vtt
|
12.5 KB
|
PrimeProbe 1, JavaScript 0 Overcoming Browser-based Side-Channel Defenses.eng.json
|
353.0 KB
|
PrimeProbe 1, JavaScript 0 Overcoming Browser-based Side-Channel Defenses.eng.lrc
|
9.3 KB
|
PrimeProbe 1, JavaScript 0 Overcoming Browser-based Side-Channel Defenses.eng.srt
|
10.6 KB
|
PrimeProbe 1, JavaScript 0 Overcoming Browser-based Side-Channel Defenses.eng.text
|
7.1 KB
|
PrimeProbe 1, JavaScript 0 Overcoming Browser-based Side-Channel Defenses.eng.tsv
|
8.3 KB
|
PrimeProbe 1, JavaScript 0 Overcoming Browser-based Side-Channel Defenses.eng.txt
|
9.4 KB
|
PrimeProbe 1, JavaScript 0 Overcoming Browser-based Side-Channel Defenses.eng.vtt
|
9.7 KB
|
PriSEC A Privacy Settings Enforcement Controller.eng.json
|
552.5 KB
|
PriSEC A Privacy Settings Enforcement Controller.eng.lrc
|
14.5 KB
|
PriSEC A Privacy Settings Enforcement Controller.eng.srt
|
15.3 KB
|
PriSEC A Privacy Settings Enforcement Controller.eng.text
|
11.3 KB
|
PriSEC A Privacy Settings Enforcement Controller.eng.tsv
|
13.0 KB
|
PriSEC A Privacy Settings Enforcement Controller.eng.txt
|
14.6 KB
|
PriSEC A Privacy Settings Enforcement Controller.eng.vtt
|
14.2 KB
|
Privacy and Integrity Preserving Computations with CRISP.eng.json
|
494.0 KB
|
Privacy and Integrity Preserving Computations with CRISP.eng.lrc
|
13.5 KB
|
Privacy and Integrity Preserving Computations with CRISP.eng.srt
|
13.6 KB
|
Privacy and Integrity Preserving Computations with CRISP.eng.text
|
10.6 KB
|
Privacy and Integrity Preserving Computations with CRISP.eng.tsv
|
12.2 KB
|
Privacy and Integrity Preserving Computations with CRISP.eng.txt
|
13.6 KB
|
Privacy and Integrity Preserving Computations with CRISP.eng.vtt
|
12.8 KB
|
Privacy-Preserving and Standard-Compatible AKA Protocol for 5G.eng.srt
|
17.7 KB
|
Private Blocklist Lookups with Checklist.eng.json
|
566.9 KB
|
Private Blocklist Lookups with Checklist.eng.lrc
|
15.2 KB
|
Private Blocklist Lookups with Checklist.eng.srt
|
15.7 KB
|
Private Blocklist Lookups with Checklist.eng.text
|
12.0 KB
|
Private Blocklist Lookups with Checklist.eng.tsv
|
13.7 KB
|
Private Blocklist Lookups with Checklist.eng.txt
|
15.4 KB
|
Private Blocklist Lookups with Checklist.eng.vtt
|
14.7 KB
|
PrivateDrop Practical Privacy-Preserving Authentication for Apple AirDrop.eng.srt
|
23.9 KB
|
PrivSyn Differentially Private Data Synthesis.eng.srt
|
18.6 KB
|
Protecting Cryptography Against Compelled Self-Incrimination.eng.json
|
582.2 KB
|
Protecting Cryptography Against Compelled Self-Incrimination.eng.lrc
|
15.3 KB
|
Protecting Cryptography Against Compelled Self-Incrimination.eng.srt
|
16.2 KB
|
Protecting Cryptography Against Compelled Self-Incrimination.eng.text
|
12.0 KB
|
Protecting Cryptography Against Compelled Self-Incrimination.eng.tsv
|
13.8 KB
|
Protecting Cryptography Against Compelled Self-Incrimination.eng.txt
|
15.5 KB
|
Protecting Cryptography Against Compelled Self-Incrimination.eng.vtt
|
15.1 KB
|
PTAuth Temporal Memory Safety via Robust Points-to Authentication.eng.srt
|
15.4 KB
|
Raccoon Attack Finding and Exploiting Most-Significant-Bit-Oracles.eng.json
|
646.5 KB
|
Raccoon Attack Finding and Exploiting Most-Significant-Bit-Oracles.eng.lrc
|
18.1 KB
|
Raccoon Attack Finding and Exploiting Most-Significant-Bit-Oracles.eng.srt
|
16.0 KB
|
Raccoon Attack Finding and Exploiting Most-Significant-Bit-Oracles.eng.text
|
12.7 KB
|
Raccoon Attack Finding and Exploiting Most-Significant-Bit-Oracles.eng.tsv
|
15.6 KB
|
Raccoon Attack Finding and Exploiting Most-Significant-Bit-Oracles.eng.txt
|
18.3 KB
|
Raccoon Attack Finding and Exploiting Most-Significant-Bit-Oracles.eng.vtt
|
15.1 KB
|
Rage Against the Machine Clear A Systematic Analysis of Machine Clears.eng.json
|
584.5 KB
|
Rage Against the Machine Clear A Systematic Analysis of Machine Clears.eng.lrc
|
15.6 KB
|
Rage Against the Machine Clear A Systematic Analysis of Machine Clears.eng.srt
|
16.2 KB
|
Rage Against the Machine Clear A Systematic Analysis of Machine Clears.eng.text
|
12.5 KB
|
Rage Against the Machine Clear A Systematic Analysis of Machine Clears.eng.tsv
|
14.2 KB
|
Rage Against the Machine Clear A Systematic Analysis of Machine Clears.eng.txt
|
15.7 KB
|
Rage Against the Machine Clear A Systematic Analysis of Machine Clears.eng.vtt
|
15.2 KB
|
ReDMArk Bypassing RDMA Security Mechanisms.eng.json
|
431.6 KB
|
ReDMArk Bypassing RDMA Security Mechanisms.eng.lrc
|
11.5 KB
|
ReDMArk Bypassing RDMA Security Mechanisms.eng.srt
|
12.1 KB
|
ReDMArk Bypassing RDMA Security Mechanisms.eng.text
|
8.8 KB
|
ReDMArk Bypassing RDMA Security Mechanisms.eng.tsv
|
10.2 KB
|
ReDMArk Bypassing RDMA Security Mechanisms.eng.txt
|
11.6 KB
|
ReDMArk Bypassing RDMA Security Mechanisms.eng.vtt
|
11.2 KB
|
ReDoSHunter A Combined Static and Dynamic Approach for Regular Expression DoS.eng.srt
|
18.4 KB
|
Reducing Bias in Modeling Real-world Password Strength via Deep Learning.eng.json
|
508.5 KB
|
Reducing Bias in Modeling Real-world Password Strength via Deep Learning.eng.lrc
|
13.9 KB
|
Reducing Bias in Modeling Real-world Password Strength via Deep Learning.eng.srt
|
14.1 KB
|
Reducing Bias in Modeling Real-world Password Strength via Deep Learning.eng.text
|
10.8 KB
|
Reducing Bias in Modeling Real-world Password Strength via Deep Learning.eng.tsv
|
12.5 KB
|
Reducing Bias in Modeling Real-world Password Strength via Deep Learning.eng.txt
|
14.1 KB
|
Reducing Bias in Modeling Real-world Password Strength via Deep Learning.eng.vtt
|
13.2 KB
|
Reducing HSM Reliance in Payments through Proxy Re-Encryption.eng.srt
|
23.5 KB
|
Reducing Test Cases with Attention Mechanism of Neural Networks.eng.json
|
345.5 KB
|
Reducing Test Cases with Attention Mechanism of Neural Networks.eng.lrc
|
9.4 KB
|
Reducing Test Cases with Attention Mechanism of Neural Networks.eng.srt
|
10.1 KB
|
Reducing Test Cases with Attention Mechanism of Neural Networks.eng.text
|
7.3 KB
|
Reducing Test Cases with Attention Mechanism of Neural Networks.eng.tsv
|
8.4 KB
|
Reducing Test Cases with Attention Mechanism of Neural Networks.eng.txt
|
9.4 KB
|
Reducing Test Cases with Attention Mechanism of Neural Networks.eng.vtt
|
9.4 KB
|
Research on the Security of Visual Reasoning CAPTCHA.eng.srt
|
18.3 KB
|
Ripple A Programmable, Decentralized Link-Flooding Defense Against Adaptive.eng.srt
|
21.7 KB
|
Risky Business Investigating the Security Practices of Vendors on an Online.eng.srt
|
26.9 KB
|
Rollercoaster An Efficient Group-Multicast Scheme for Mix Networks.eng.json
|
507.6 KB
|
Rollercoaster An Efficient Group-Multicast Scheme for Mix Networks.eng.lrc
|
13.5 KB
|
Rollercoaster An Efficient Group-Multicast Scheme for Mix Networks.eng.srt
|
14.5 KB
|
Rollercoaster An Efficient Group-Multicast Scheme for Mix Networks.eng.text
|
10.6 KB
|
Rollercoaster An Efficient Group-Multicast Scheme for Mix Networks.eng.tsv
|
12.2 KB
|
Rollercoaster An Efficient Group-Multicast Scheme for Mix Networks.eng.txt
|
13.7 KB
|
Rollercoaster An Efficient Group-Multicast Scheme for Mix Networks.eng.vtt
|
13.5 KB
|
SandTrap Securing JavaScript-driven Trigger-Action Platforms.eng.json
|
491.6 KB
|
SandTrap Securing JavaScript-driven Trigger-Action Platforms.eng.lrc
|
13.3 KB
|
SandTrap Securing JavaScript-driven Trigger-Action Platforms.eng.srt
|
14.0 KB
|
SandTrap Securing JavaScript-driven Trigger-Action Platforms.eng.text
|
10.3 KB
|
SandTrap Securing JavaScript-driven Trigger-Action Platforms.eng.tsv
|
11.9 KB
|
SandTrap Securing JavaScript-driven Trigger-Action Platforms.eng.txt
|
13.4 KB
|
SandTrap Securing JavaScript-driven Trigger-Action Platforms.eng.vtt
|
13.0 KB
|
Saphire Sandboxing PHP Applications with Tailored System Call Allowlists.eng.json
|
606.1 KB
|
Saphire Sandboxing PHP Applications with Tailored System Call Allowlists.eng.lrc
|
16.2 KB
|
Saphire Sandboxing PHP Applications with Tailored System Call Allowlists.eng.srt
|
16.9 KB
|
Saphire Sandboxing PHP Applications with Tailored System Call Allowlists.eng.text
|
12.7 KB
|
Saphire Sandboxing PHP Applications with Tailored System Call Allowlists.eng.tsv
|
14.6 KB
|
Saphire Sandboxing PHP Applications with Tailored System Call Allowlists.eng.txt
|
16.3 KB
|
Saphire Sandboxing PHP Applications with Tailored System Call Allowlists.eng.vtt
|
15.7 KB
|
Scalable Detection of Promotional Website Defacements in Black Hat SEO.eng.srt
|
19.4 KB
|
SEAL Storage-efficient Causality Analysis on Enterprise Logs.eng.srt
|
13.9 KB
|
SEApp Bringing Mandatory Access Control to Android Apps.eng.srt
|
17.3 KB
|
Searching Encrypted Data with Size-Locked Indexes.eng.srt
|
22.1 KB
|
Security Analysis of the Democracy Live Online Voting System.eng.srt
|
28.7 KB
|
Security Obstacles and Motivations for Small Businesses from a CISO's.eng.srt
|
23.3 KB
|
SelectiveTain't Efficient Data Flow Tracking With Static Binary Rewriting.eng.json
|
466.9 KB
|
SelectiveTain't Efficient Data Flow Tracking With Static Binary Rewriting.eng.lrc
|
12.0 KB
|
SelectiveTain't Efficient Data Flow Tracking With Static Binary Rewriting.eng.srt
|
13.6 KB
|
SelectiveTain't Efficient Data Flow Tracking With Static Binary Rewriting.eng.text
|
9.3 KB
|
SelectiveTain't Efficient Data Flow Tracking With Static Binary Rewriting.eng.tsv
|
10.8 KB
|
SelectiveTain't Efficient Data Flow Tracking With Static Binary Rewriting.eng.txt
|
12.1 KB
|
SelectiveTain't Efficient Data Flow Tracking With Static Binary Rewriting.eng.vtt
|
12.4 KB
|
Senate A Maliciously-Secure MPC Platform for Collaborative Analytics.eng.json
|
510.0 KB
|
Senate A Maliciously-Secure MPC Platform for Collaborative Analytics.eng.lrc
|
14.1 KB
|
Senate A Maliciously-Secure MPC Platform for Collaborative Analytics.eng.srt
|
14.1 KB
|
Senate A Maliciously-Secure MPC Platform for Collaborative Analytics.eng.text
|
10.9 KB
|
Senate A Maliciously-Secure MPC Platform for Collaborative Analytics.eng.tsv
|
12.6 KB
|
Senate A Maliciously-Secure MPC Platform for Collaborative Analytics.eng.txt
|
14.3 KB
|
Senate A Maliciously-Secure MPC Platform for Collaborative Analytics.eng.vtt
|
13.3 KB
|
SHARD Fine-Grained Kernel Specialization with Context-Aware Hardening.eng.json
|
516.7 KB
|
SHARD Fine-Grained Kernel Specialization with Context-Aware Hardening.eng.lrc
|
14.4 KB
|
SHARD Fine-Grained Kernel Specialization with Context-Aware Hardening.eng.srt
|
14.9 KB
|
SHARD Fine-Grained Kernel Specialization with Context-Aware Hardening.eng.text
|
10.8 KB
|
SHARD Fine-Grained Kernel Specialization with Context-Aware Hardening.eng.tsv
|
12.7 KB
|
SHARD Fine-Grained Kernel Specialization with Context-Aware Hardening.eng.txt
|
14.5 KB
|
SHARD Fine-Grained Kernel Specialization with Context-Aware Hardening.eng.vtt
|
13.8 KB
|
Share First, Ask Later (or Never) Studying Violations of GDPR's Explicit.eng.srt
|
17.9 KB
|
Sharing More and Checking Less Leveraging Common Input Keywords to Detect.eng.srt
|
22.7 KB
|
Shhhbe quiet - Reducing the Unwanted Interruptions of Notification.eng.srt
|
18.0 KB
|
SiamHAN IPv6 Address Correlation Attacks on TLS Encrypted Traffic.eng.json
|
403.5 KB
|
SiamHAN IPv6 Address Correlation Attacks on TLS Encrypted Traffic.eng.lrc
|
11.5 KB
|
SiamHAN IPv6 Address Correlation Attacks on TLS Encrypted Traffic.eng.srt
|
11.9 KB
|
SiamHAN IPv6 Address Correlation Attacks on TLS Encrypted Traffic.eng.text
|
9.0 KB
|
SiamHAN IPv6 Address Correlation Attacks on TLS Encrypted Traffic.eng.tsv
|
10.4 KB
|
SiamHAN IPv6 Address Correlation Attacks on TLS Encrypted Traffic.eng.txt
|
11.6 KB
|
SiamHAN IPv6 Address Correlation Attacks on TLS Encrypted Traffic.eng.vtt
|
11.1 KB
|
SIGL Securing Software Installations Through Deep Graph Learning.eng.json
|
495.7 KB
|
SIGL Securing Software Installations Through Deep Graph Learning.eng.lrc
|
13.9 KB
|
SIGL Securing Software Installations Through Deep Graph Learning.eng.srt
|
14.6 KB
|
SIGL Securing Software Installations Through Deep Graph Learning.eng.text
|
10.9 KB
|
SIGL Securing Software Installations Through Deep Graph Learning.eng.tsv
|
12.5 KB
|
SIGL Securing Software Installations Through Deep Graph Learning.eng.txt
|
14.0 KB
|
SIGL Securing Software Installations Through Deep Graph Learning.eng.vtt
|
13.6 KB
|
SLAP Improving Physical Adversarial Examples with Short-Lived Adversarial.eng.json
|
514.9 KB
|
SLAP Improving Physical Adversarial Examples with Short-Lived Adversarial.eng.lrc
|
13.8 KB
|
SLAP Improving Physical Adversarial Examples with Short-Lived Adversarial.eng.srt
|
14.0 KB
|
SLAP Improving Physical Adversarial Examples with Short-Lived Adversarial.eng.text
|
10.8 KB
|
SLAP Improving Physical Adversarial Examples with Short-Lived Adversarial.eng.tsv
|
12.4 KB
|
SLAP Improving Physical Adversarial Examples with Short-Lived Adversarial.eng.txt
|
13.9 KB
|
SLAP Improving Physical Adversarial Examples with Short-Lived Adversarial.eng.vtt
|
13.2 KB
|
Smart Contract Vulnerabilities Vulnerable Does Not Imply Exploited.eng.srt
|
24.4 KB
|
SmarTest Effectively Hunting Vulnerable Transaction Sequences in Smart.eng.srt
|
17.2 KB
|
SMASH Synchronized Many-sided Rowhammer Attacks from JavaScript.eng.json
|
565.9 KB
|
SMASH Synchronized Many-sided Rowhammer Attacks from JavaScript.eng.lrc
|
13.9 KB
|
SMASH Synchronized Many-sided Rowhammer Attacks from JavaScript.eng.srt
|
16.0 KB
|
SMASH Synchronized Many-sided Rowhammer Attacks from JavaScript.eng.text
|
10.8 KB
|
SMASH Synchronized Many-sided Rowhammer Attacks from JavaScript.eng.tsv
|
12.5 KB
|
SMASH Synchronized Many-sided Rowhammer Attacks from JavaScript.eng.txt
|
14.0 KB
|
SMASH Synchronized Many-sided Rowhammer Attacks from JavaScript.eng.vtt
|
14.6 KB
|
SocialHEISTing Understanding Stolen Facebook Accounts.eng.srt
|
19.1 KB
|
Stars Can Tell A Robust Method to Defend against GPS Spoofing Attacks.eng.srt
|
21.1 KB
|
Static Detection of Unsafe DMA Accesses in Device Drivers.eng.srt
|
17.9 KB
|
Stealing Links from Graph Neural Networks.eng.json
|
549.4 KB
|
Stealing Links from Graph Neural Networks.eng.lrc
|
15.9 KB
|
Stealing Links from Graph Neural Networks.eng.srt
|
13.8 KB
|
Stealing Links from Graph Neural Networks.eng.text
|
9.7 KB
|
Stealing Links from Graph Neural Networks.eng.tsv
|
13.0 KB
|
Stealing Links from Graph Neural Networks.eng.txt
|
16.2 KB
|
Stealing Links from Graph Neural Networks.eng.vtt
|
12.7 KB
|
Strategies and Perceived Risks of Sending Sensitive Documents.eng.json
|
523.7 KB
|
Strategies and Perceived Risks of Sending Sensitive Documents.eng.lrc
|
14.5 KB
|
Strategies and Perceived Risks of Sending Sensitive Documents.eng.srt
|
14.8 KB
|
Strategies and Perceived Risks of Sending Sensitive Documents.eng.text
|
11.2 KB
|
Strategies and Perceived Risks of Sending Sensitive Documents.eng.tsv
|
13.0 KB
|
Strategies and Perceived Risks of Sending Sensitive Documents.eng.txt
|
14.6 KB
|
Strategies and Perceived Risks of Sending Sensitive Documents.eng.vtt
|
13.9 KB
|
SWIFT Super-fast and Robust Privacy-Preserving Machine Learning.eng.json
|
534.0 KB
|
SWIFT Super-fast and Robust Privacy-Preserving Machine Learning.eng.lrc
|
13.7 KB
|
SWIFT Super-fast and Robust Privacy-Preserving Machine Learning.eng.srt
|
14.9 KB
|
SWIFT Super-fast and Robust Privacy-Preserving Machine Learning.eng.text
|
10.8 KB
|
SWIFT Super-fast and Robust Privacy-Preserving Machine Learning.eng.tsv
|
12.3 KB
|
SWIFT Super-fast and Robust Privacy-Preserving Machine Learning.eng.txt
|
13.8 KB
|
SWIFT Super-fast and Robust Privacy-Preserving Machine Learning.eng.vtt
|
13.8 KB
|
Swiped Analyzing Ground-truth Data of a Marketplace for Stolen Debit.eng.json
|
652.3 KB
|
Swiped Analyzing Ground-truth Data of a Marketplace for Stolen Debit.eng.lrc
|
17.5 KB
|
Swiped Analyzing Ground-truth Data of a Marketplace for Stolen Debit.eng.srt
|
18.1 KB
|
Swiped Analyzing Ground-truth Data of a Marketplace for Stolen Debit.eng.text
|
13.7 KB
|
Swiped Analyzing Ground-truth Data of a Marketplace for Stolen Debit.eng.tsv
|
15.7 KB
|
Swiped Analyzing Ground-truth Data of a Marketplace for Stolen Debit.eng.txt
|
17.6 KB
|
Swiped Analyzing Ground-truth Data of a Marketplace for Stolen Debit.eng.vtt
|
16.9 KB
|
Swivel Hardening WebAssembly against Spectre.eng.srt
|
18.2 KB
|
Systematic Evaluation of Privacy Risks of Machine Learning Models.eng.json
|
338.0 KB
|
Systematic Evaluation of Privacy Risks of Machine Learning Models.eng.lrc
|
10.0 KB
|
Systematic Evaluation of Privacy Risks of Machine Learning Models.eng.srt
|
9.6 KB
|
Systematic Evaluation of Privacy Risks of Machine Learning Models.eng.text
|
7.2 KB
|
Systematic Evaluation of Privacy Risks of Machine Learning Models.eng.tsv
|
8.7 KB
|
Systematic Evaluation of Privacy Risks of Machine Learning Models.eng.txt
|
10.1 KB
|
Systematic Evaluation of Privacy Risks of Machine Learning Models.eng.vtt
|
9.0 KB
|
SyzVegas Beating Kernel Fuzzing Odds with Reinforcement Learning.eng.srt
|
19.4 KB
|
The Circle Of Life A Large-Scale Study of The IoT Malware Lifecycle.eng.json
|
573.8 KB
|
The Circle Of Life A Large-Scale Study of The IoT Malware Lifecycle.eng.lrc
|
16.3 KB
|
The Circle Of Life A Large-Scale Study of The IoT Malware Lifecycle.eng.srt
|
15.7 KB
|
The Circle Of Life A Large-Scale Study of The IoT Malware Lifecycle.eng.text
|
11.6 KB
|
The Circle Of Life A Large-Scale Study of The IoT Malware Lifecycle.eng.tsv
|
14.1 KB
|
The Circle Of Life A Large-Scale Study of The IoT Malware Lifecycle.eng.txt
|
16.5 KB
|
The Circle Of Life A Large-Scale Study of The IoT Malware Lifecycle.eng.vtt
|
14.6 KB
|
The Complexities of Healing in Secure Group Messaging Why Cross-Group Effects.eng.json
|
436.5 KB
|
The Complexities of Healing in Secure Group Messaging Why Cross-Group Effects.eng.lrc
|
11.3 KB
|
The Complexities of Healing in Secure Group Messaging Why Cross-Group Effects.eng.srt
|
11.6 KB
|
The Complexities of Healing in Secure Group Messaging Why Cross-Group Effects.eng.text
|
8.8 KB
|
The Complexities of Healing in Secure Group Messaging Why Cross-Group Effects.eng.tsv
|
10.1 KB
|
The Complexities of Healing in Secure Group Messaging Why Cross-Group Effects.eng.txt
|
11.4 KB
|
The Complexities of Healing in Secure Group Messaging Why Cross-Group Effects.eng.vtt
|
10.8 KB
|
The Hijackers Guide To The Galaxy Off-Path Taking Over Internet Resources.eng.srt
|
20.7 KB
|
The Role of Computer Security Customer Support in Helping Survivors.eng.srt
|
21.1 KB
|
The Use of Likely Invariants as Feedback for Fuzzers.eng.json
|
524.6 KB
|
The Use of Likely Invariants as Feedback for Fuzzers.eng.lrc
|
13.5 KB
|
The Use of Likely Invariants as Feedback for Fuzzers.eng.srt
|
13.7 KB
|
The Use of Likely Invariants as Feedback for Fuzzers.eng.text
|
10.5 KB
|
The Use of Likely Invariants as Feedback for Fuzzers.eng.tsv
|
12.1 KB
|
The Use of Likely Invariants as Feedback for Fuzzers.eng.txt
|
13.6 KB
|
The Use of Likely Invariants as Feedback for Fuzzers.eng.vtt
|
12.8 KB
|
T-Miner A Generative Approach to Defend Against Trojan Attacks on DNN-based.eng.json
|
545.4 KB
|
T-Miner A Generative Approach to Defend Against Trojan Attacks on DNN-based.eng.lrc
|
15.2 KB
|
T-Miner A Generative Approach to Defend Against Trojan Attacks on DNN-based.eng.srt
|
15.3 KB
|
T-Miner A Generative Approach to Defend Against Trojan Attacks on DNN-based.eng.text
|
11.0 KB
|
T-Miner A Generative Approach to Defend Against Trojan Attacks on DNN-based.eng.tsv
|
13.2 KB
|
T-Miner A Generative Approach to Defend Against Trojan Attacks on DNN-based.eng.txt
|
15.3 KB
|
T-Miner A Generative Approach to Defend Against Trojan Attacks on DNN-based.eng.vtt
|
14.1 KB
|
Token-Level Fuzzing.eng.json
|
480.3 KB
|
Token-Level Fuzzing.eng.lrc
|
11.9 KB
|
Token-Level Fuzzing.eng.srt
|
13.1 KB
|
Token-Level Fuzzing.eng.text
|
9.3 KB
|
Token-Level Fuzzing.eng.tsv
|
10.7 KB
|
Token-Level Fuzzing.eng.txt
|
12.0 KB
|
Token-Level Fuzzing.eng.vtt
|
12.1 KB
|
Too Good to Be Safe Tricking Lane Detection in Autonomous Driving with Craft.eng.srt
|
18.5 KB
|
Towards Formal Verification of State Continuity for Enclave Programs.eng.srt
|
20.6 KB
|
U Can't Debug This Detecting JavaScript Anti-Debugging Techniques in the Wild.eng.json
|
616.8 KB
|
U Can't Debug This Detecting JavaScript Anti-Debugging Techniques in the Wild.eng.lrc
|
17.6 KB
|
U Can't Debug This Detecting JavaScript Anti-Debugging Techniques in the Wild.eng.srt
|
15.4 KB
|
U Can't Debug This Detecting JavaScript Anti-Debugging Techniques in the Wild.eng.text
|
11.3 KB
|
U Can't Debug This Detecting JavaScript Anti-Debugging Techniques in the Wild.eng.tsv
|
14.6 KB
|
U Can't Debug This Detecting JavaScript Anti-Debugging Techniques in the Wild.eng.txt
|
17.8 KB
|
U Can't Debug This Detecting JavaScript Anti-Debugging Techniques in the Wild.eng.vtt
|
14.2 KB
|
Understanding and Detecting Disordered Error Handling with Precise Function.eng.json
|
497.7 KB
|
Understanding and Detecting Disordered Error Handling with Precise Function.eng.lrc
|
13.8 KB
|
Understanding and Detecting Disordered Error Handling with Precise Function.eng.srt
|
13.2 KB
|
Understanding and Detecting Disordered Error Handling with Precise Function.eng.text
|
9.9 KB
|
Understanding and Detecting Disordered Error Handling with Precise Function.eng.tsv
|
12.0 KB
|
Understanding and Detecting Disordered Error Handling with Precise Function.eng.txt
|
13.9 KB
|
Understanding and Detecting Disordered Error Handling with Precise Function.eng.vtt
|
12.3 KB
|
Understanding Malicious Cross-library Data Harvesting on Android.eng.srt
|
19.3 KB
|
Undo Workarounds for Kernel Bugs.eng.json
|
474.0 KB
|
Undo Workarounds for Kernel Bugs.eng.lrc
|
12.7 KB
|
Undo Workarounds for Kernel Bugs.eng.srt
|
14.2 KB
|
Undo Workarounds for Kernel Bugs.eng.text
|
9.7 KB
|
Undo Workarounds for Kernel Bugs.eng.tsv
|
11.3 KB
|
Undo Workarounds for Kernel Bugs.eng.txt
|
12.8 KB
|
Undo Workarounds for Kernel Bugs.eng.vtt
|
13.0 KB
|
UNIFUZZ A Holistic and Pragmatic Metrics-Driven Platform for Evaluating.eng.srt
|
18.8 KB
|
Using Amnesia to Detect Credential Database Breaches.eng.srt
|
24.9 KB
|
V0Finder Discovering the Correct Origin of Publicly Reported Software.eng.srt
|
18.7 KB
|
Virtual Secure Platform A Five-Stage Pipeline Processor over TFHE.eng.srt
|
18.3 KB
|
VoltPillager Hardware-based fault injection attacks against Intel SGX Enclaves.eng.json
|
441.6 KB
|
VoltPillager Hardware-based fault injection attacks against Intel SGX Enclaves.eng.lrc
|
11.2 KB
|
VoltPillager Hardware-based fault injection attacks against Intel SGX Enclaves.eng.srt
|
12.9 KB
|
VoltPillager Hardware-based fault injection attacks against Intel SGX Enclaves.eng.text
|
8.7 KB
|
VoltPillager Hardware-based fault injection attacks against Intel SGX Enclaves.eng.tsv
|
10.0 KB
|
VoltPillager Hardware-based fault injection attacks against Intel SGX Enclaves.eng.txt
|
11.3 KB
|
VoltPillager Hardware-based fault injection attacks against Intel SGX Enclaves.eng.vtt
|
11.7 KB
|
VScape Assessing and Escaping Virtual Call Protections.eng.json
|
412.0 KB
|
VScape Assessing and Escaping Virtual Call Protections.eng.lrc
|
11.7 KB
|
VScape Assessing and Escaping Virtual Call Protections.eng.srt
|
12.0 KB
|
VScape Assessing and Escaping Virtual Call Protections.eng.text
|
8.8 KB
|
VScape Assessing and Escaping Virtual Call Protections.eng.tsv
|
10.3 KB
|
VScape Assessing and Escaping Virtual Call Protections.eng.txt
|
11.8 KB
|
VScape Assessing and Escaping Virtual Call Protections.eng.vtt
|
11.2 KB
|
WaveGuard Understanding and Mitigating Audio Adversarial Examples.eng.json
|
524.3 KB
|
WaveGuard Understanding and Mitigating Audio Adversarial Examples.eng.lrc
|
15.2 KB
|
WaveGuard Understanding and Mitigating Audio Adversarial Examples.eng.srt
|
13.7 KB
|
WaveGuard Understanding and Mitigating Audio Adversarial Examples.eng.text
|
10.7 KB
|
WaveGuard Understanding and Mitigating Audio Adversarial Examples.eng.tsv
|
13.1 KB
|
WaveGuard Understanding and Mitigating Audio Adversarial Examples.eng.txt
|
15.4 KB
|
WaveGuard Understanding and Mitigating Audio Adversarial Examples.eng.vtt
|
12.9 KB
|
Weak Links in Authentication Chains A Large-scale Analysis of Email Sender.eng.json
|
405.3 KB
|
Weak Links in Authentication Chains A Large-scale Analysis of Email Sender.eng.lrc
|
11.0 KB
|
Weak Links in Authentication Chains A Large-scale Analysis of Email Sender.eng.srt
|
12.3 KB
|
Weak Links in Authentication Chains A Large-scale Analysis of Email Sender.eng.text
|
8.6 KB
|
Weak Links in Authentication Chains A Large-scale Analysis of Email Sender.eng.tsv
|
9.9 KB
|
Weak Links in Authentication Chains A Large-scale Analysis of Email Sender.eng.txt
|
11.1 KB
|
Weak Links in Authentication Chains A Large-scale Analysis of Email Sender.eng.vtt
|
11.3 KB
|
Weaponizing Middleboxes for TCP Reflected Amplification.eng.json
|
666.7 KB
|
Weaponizing Middleboxes for TCP Reflected Amplification.eng.lrc
|
17.4 KB
|
Weaponizing Middleboxes for TCP Reflected Amplification.eng.srt
|
18.6 KB
|
Weaponizing Middleboxes for TCP Reflected Amplification.eng.text
|
13.6 KB
|
Weaponizing Middleboxes for TCP Reflected Amplification.eng.tsv
|
15.7 KB
|
Weaponizing Middleboxes for TCP Reflected Amplification.eng.txt
|
17.6 KB
|
Weaponizing Middleboxes for TCP Reflected Amplification.eng.vtt
|
17.3 KB
|
What's in a Name Exploring CA Certificate Control.eng.srt
|
23.9 KB
|
When Malware Changed Its Mind An Empirical Study of Variable Program Behavior.eng.json
|
500.3 KB
|
When Malware Changed Its Mind An Empirical Study of Variable Program Behavior.eng.lrc
|
13.0 KB
|
When Malware Changed Its Mind An Empirical Study of Variable Program Behavior.eng.srt
|
13.3 KB
|
When Malware Changed Its Mind An Empirical Study of Variable Program Behavior.eng.text
|
10.2 KB
|
When Malware Changed Its Mind An Empirical Study of Variable Program Behavior.eng.tsv
|
11.7 KB
|
When Malware Changed Its Mind An Empirical Study of Variable Program Behavior.eng.txt
|
13.1 KB
|
When Malware Changed Its Mind An Empirical Study of Variable Program Behavior.eng.vtt
|
12.4 KB
|
Where's Crypto Automated Identification and Classification of Proprietary.eng.srt
|
25.6 KB
|
Why Eve and Mallory Still Love Android Revisiting TLS (In)Security in Android.eng.srt
|
15.5 KB
|
Why Older Adults (Don't) Use Password Managers.eng.json
|
447.8 KB
|
Why Older Adults (Don't) Use Password Managers.eng.lrc
|
12.7 KB
|
Why Older Adults (Don't) Use Password Managers.eng.srt
|
12.3 KB
|
Why Older Adults (Don't) Use Password Managers.eng.text
|
9.4 KB
|
Why Older Adults (Don't) Use Password Managers.eng.tsv
|
11.2 KB
|
Why Older Adults (Don't) Use Password Managers.eng.txt
|
12.8 KB
|
Why Older Adults (Don't) Use Password Managers.eng.vtt
|
11.6 KB
|
Why TLS is better without STARTTLS A Security Analysis of STARTTLS.eng.srt
|
23.6 KB
|
Why wouldn't someone think of democracy as a target.eng.json
|
564.8 KB
|
Why wouldn't someone think of democracy as a target.eng.lrc
|
15.2 KB
|
Why wouldn't someone think of democracy as a target.eng.srt
|
15.2 KB
|
Why wouldn't someone think of democracy as a target.eng.text
|
12.0 KB
|
Why wouldn't someone think of democracy as a target.eng.tsv
|
13.7 KB
|
Why wouldn't someone think of democracy as a target.eng.txt
|
15.4 KB
|
Why wouldn't someone think of democracy as a target.eng.vtt
|
14.3 KB
|
YARIX Scalable YARA-based Malware Intelligence.eng.srt
|
18.1 KB
|
You Autocomplete Me Poisoning Vulnerabilities in Neural Code Completion.eng.srt
|
23.6 KB
|
/USENIX Security 2022/
|
99% False Positives A Qualitative Study of SOC Analysts' Perspectives.mp4
|
13.1 MB
|
A Hardware-Software Co-design for Efficient Intra-Enclave Isolation.mp4
|
8.8 MB
|
A Large-scale and Longitudinal Measurement Study of DKIM Deployment.mp4
|
12.4 MB
|
A Large-scale Investigation into Geodifferences in Mobile Apps.mp4
|
9.8 MB
|
A Large-scale Temporal Measurement of Android Malicious Apps.mp4
|
7.5 MB
|
Aardvark An Asynchronous Authenticated Dictionary with Applications to.mp4
|
9.3 MB
|
Adversarial Detection Avoidance Attacks Evaluating the robustness.mp4
|
13.2 MB
|
ÆPIC Leak Architecturally Leaking Uninitialized Data from the.mp4
|
9.6 MB
|
ALASTOR Reconstructing the Provenance of Serverless Intrusions.mp4
|
11.0 MB
|
AMD Prefetch Attacks through Power and Time.mp4
|
9.0 MB
|
AmpFuzz Fuzzing for Amplification DDoS Vulnerabilities.mp4
|
10.1 MB
|
An Audit of Facebook's Political Ad Policy Enforcement.mp4
|
8.9 MB
|
An Experimental Study of GPS Spoofing and Takeover Attacks on UAVs.mp4
|
13.7 MB
|
Anycast Agility Network Playbooks to Fight DDoS.mp4
|
12.0 MB
|
Arbiter Bridging the Static and Dynamic Divide in Vulnerability Discovery.mp4
|
9.1 MB
|
Are Your Sensitive Attributes Private Novel Model Inversion Attribute.mp4
|
12.8 MB
|
Attacks on Deidentification's Defenses.mp4
|
11.2 MB
|
Augmenting Decompiler Output with Learned Variable Names and Types.mp4
|
8.6 MB
|
AutoDA Automated Decision-based Iterative Adversarial Attacks.mp4
|
10.1 MB
|
Automated Detection of Automated Traffic.mp4
|
12.9 MB
|
Automated Side Channel Analysis of Media Software with Manifold Learning.mp4
|
10.9 MB
|
Automating Cookie Consent and GDPR Violation Detection.mp4
|
13.2 MB
|
Backporting Security Patches of Web Applications A Prototype Design.mp4
|
11.5 MB
|
Back-Propagating System Dependency Impact for Attack Investigation.mp4
|
13.0 MB
|
Batched Differentially Private Information Retrieval.mp4
|
10.9 MB
|
Bedrock Programmable Network Support for Secure RDMA Systems.mp4
|
12.1 MB
|
Behind the Tube Exploitative Monetization of Content on YouTube.mp4
|
8.8 MB
|
Binoculars Contention-Based Side-Channel Attacks Exploiting the Page Walker.mp4
|
11.5 MB
|
Birds of a Feather Flock Together How Set Bias Helps to Deanonymize You.mp4
|
7.5 MB
|
Blacklight Scalable Defense for Neural Networks against Query-Based Black-Box.mp4
|
9.1 MB
|
BrakTooth Causing Havoc on Bluetooth Link Manager via Directed Fuzzing.mp4
|
16.2 MB
|
Branch History Injection On the Effectiveness of Hardware Mitigations.mp4
|
12.1 MB
|
Breaking Bridgefy, again Adopting libsignal is not enough.mp4
|
11.1 MB
|
Building an Open, Robust, and Stable Voting-Based Domain Top List.mp4
|
9.3 MB
|
CamShield Securing Smart Cameras through Physical Replication and Isolation.mp4
|
11.6 MB
|
Can one hear the shape of a neural network Snooping the GPU via Magnetic.mp4
|
15.8 MB
|
Caring about Sharing User Perceptions of Multiparty Data Sharing.mp4
|
9.6 MB
|
CellIFT Leveraging Cells for Scalable and Precise Dynamic Information Flow.mp4
|
9.4 MB
|
Characterizing the Security of Github CI Workflows.mp4
|
9.9 MB
|
Cheetah Lean and Fast Secure Two-Party Deep Neural Network Inference.mp4
|
10.0 MB
|
Communication-Efficient Triangle Counting under Local Differential Privacy.mp4
|
10.1 MB
|
Composable Cachelets Protecting Enclaves from Cache Side-Channel Attacks.mp4
|
8.8 MB
|
COMRace Detecting Data Race Vulnerabilities in COM Objects.mp4
|
13.5 MB
|
Constant-weight PIR Single-round Keyword PIR via Constant-weight Equality.mp4
|
12.3 MB
|
Counting in Regexes Considered Harmful Exposing ReDoS Vulnerability of.mp4
|
11.1 MB
|
Creating a Secure Underlay for the Internet.mp4
|
11.0 MB
|
Debloating Address Sanitizer.mp4
|
9.5 MB
|
Decomperson How Humans Decompile and What We Can Learn From It.mp4
|
9.0 MB
|
DeepDi Learning a Relational Graph Convolutional Network Model on Instruction.mp4
|
12.5 MB
|
DeepPhish Understanding User Trust Towards Artificially Generated Profiles.mp4
|
11.9 MB
|
Detecting Logical Bugs of DBMS with Coverage-based Guidance.mp4
|
8.6 MB
|
DnD A Cross-Architecture Deep Neural Network Decompiler.mp4
|
9.9 MB
|
DoLTEst In-depth Downlink Negative Testing Framework for LTE Devices.mp4
|
11.6 MB
|
Don't Mesh Around Side-Channel Attacks and Mitigations on Mesh Interconnects.mp4
|
12.1 MB
|
Dos and Don'ts of Machine Learning in Computer Security.mp4
|
10.2 MB
|
Double Trouble Combined Heterogeneous Attacks on Non-Inclusive Cache.mp4
|
11.0 MB
|
DoubleStar Long-Range Attack Towards Depth Estimation based Obstacle.mp4
|
11.2 MB
|
Drifuzz Harvesting Bugs in Device Drivers from Golden Seeds.mp4
|
14.0 MB
|
Dynamic Searchable Encryption with Optimal Search in the Presence of Deletions.mp4
|
13.3 MB
|
Efficient Differentially Private Secure Aggregation for Federated Learning.mp4
|
12.3 MB
|
Efficient Representation of Numerical Optimization Problems for SNARKs.mp4
|
9.5 MB
|
Elasticlave An Efficient Memory Model for Enclaves.mp4
|
8.3 MB
|
Electronic Monitoring Smartphone Apps An Analysis of Risks from Technical,.mp4
|
8.0 MB
|
Empirical Understanding of Deletion Privacy Experiences, Expectations, and.mp4
|
10.7 MB
|
End-to-Same-End Encryption Modularly Augmenting an App with an Efficient.mp4
|
18.1 MB
|
Estimating Incidental Collection in Foreign Intelligence Surveillance.mp4
|
11.1 MB
|
Expected Exploitability Predicting the Development of Functional.mp4
|
11.1 MB
|
Experimental Security Analysis of the App Model in Business Collaboration.mp4
|
8.3 MB
|
Experimenting with Collaborative zk-SNARKs Zero-Knowledge Proofs for.mp4
|
9.0 MB
|
Exploring the Security Boundary of Data Reconstruction via Neuron Exclusivity.mp4
|
11.1 MB
|
Exploring the Unchartered Space of Container Registry Typosquatting.mp4
|
13.0 MB
|
Faster Yet Safer Logging System Via Fixed-Key Blockcipher.mp4
|
8.9 MB
|
Ferry State-Aware Symbolic Execution for Exploring State-Dependent Program.mp4
|
12.3 MB
|
FIXREVERTER A Realistic Bug Injection Methodology for Benchmarking Fuzz.mp4
|
12.8 MB
|
FLAME Taming Backdoors in Federated Learning.mp4
|
9.0 MB
|
FlowMatrix GPU-Assisted Information-Flow Analysis through Matrix-Based.mp4
|
9.4 MB
|
FOAP Fine-Grained Open-World Android App Fingerprinting.mp4
|
9.8 MB
|
FRAMESHIFTER Security Implications of HTTP 2-to-HTTP 1 Conversion Anomalies.mp4
|
7.9 MB
|
FReD Identifying File Re-Delegation in Android System Services.mp4
|
11.8 MB
|
FreeWill Automatically Diagnosing Use-after-free Bugs via Reference.mp4
|
8.7 MB
|
FUGIO Automatic Exploit Generation for PHP Object Injection Vulnerabilities.mp4
|
9.3 MB
|
Fuzzing Hardware Like Software.mp4
|
13.5 MB
|
FuzzOrigin Detecting UXSS vulnerabilities in Browsers through Origin Fuzzing.mp4
|
8.1 MB
|
Fuzzware Using Precise MMIO Modeling for Effective Firmware Fuzzing.mp4
|
8.7 MB
|
GAROTA Generalized Active Root-Of-Trust Architecture.mp4
|
12.0 MB
|
GET - out Automated Discovery of Application-Layer Censorship Evasion.mp4
|
10.4 MB
|
Ghost Peak Practical Distance Reduction Attacks Against HRP UWB Ranging.mp4
|
9.5 MB
|
GhostTouch Targeted Attacks on Touchscreens without Physical Touch.mp4
|
7.7 MB
|
Gossamer Securely Measuring Password-based Logins.mp4
|
8.1 MB
|
GPU-accelerated PIR with Client-Independent Preprocessing for Large-Scale.mp4
|
11.6 MB
|
Ground Truth for Binary Disassembly is Not Easy.mp4
|
10.9 MB
|
Half-Double Hammering From the Next Row Over.mp4
|
9.4 MB
|
Hand Me Your PIN Inferring ATM PINs of Users Typing with a Covered Hand.mp4
|
10.1 MB
|
Hecate Abuse Reporting in Secure Messengers with Sealed Sender.mp4
|
9.2 MB
|
Helping hands Measuring the impact of a large threat intelligence sharing.mp4
|
9.6 MB
|
Hidden Trigger Backdoor Attack on NLP Models via Linguistic Style Manipulation.mp4
|
8.4 MB
|
Hiding in Plain Sight On the Efficacy of Power Side Channel-Based Control.mp4
|
10.4 MB
|
Holistic Control-Flow Protection on Real-Time Embedded Systems with Kage.mp4
|
12.2 MB
|
How and Why People Use Virtual Private Networks.mp4
|
10.0 MB
|
How Are Your Zombie Accounts Understanding Users' Practices & Expectations.mp4
|
10.4 MB
|
How Do You Not Lose Friends - Synthesizing a Design Space of Social Controls.mp4
|
12.8 MB
|
How Long Do Vulnerabilities Live in the Code A Large-Scale Empirical.mp4
|
11.5 MB
|
How Machine Learning Is Solving the Binary Function Similarity Problem.mp4
|
9.4 MB
|
How to Abuse and Fix Authenticated Encryption Without Key Commitment.mp4
|
10.3 MB
|
How to Peel a Million Validating and Expanding Bitcoin Clusters.mp4
|
9.0 MB
|
HyperDegrade From GHz to MHz Effective CPU Frequencies.mp4
|
8.4 MB
|
Hyperproofs Aggregating and Main'taining Proofs in Vector Commitments.mp4
|
11.4 MB
|
I feel invaded, annoyed, anxious and I may protect myself.mp4
|
9.8 MB
|
Identity Confusion in WebView-based Mobile App-in-app Ecosystems.mp4
|
9.3 MB
|
IHOP Improved Statistical Query Recovery against Searchable Symmetric.mp4
|
11.9 MB
|
Increasing Adversarial Uncertain'ty to Scale Private Similarity Testing.mp4
|
9.0 MB
|
Incremental Offline Online PIR.mp4
|
9.3 MB
|
Inference Attacks Against Graph Neural Networks.mp4
|
11.8 MB
|
Inferring Phishing Intention via Webpage Appearance and Dynamics.mp4
|
10.5 MB
|
In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer.mp4
|
9.3 MB
|
Investigating State-of-the-Art Practices for Fostering Subjective Trust in.mp4
|
5.9 MB
|
Jenny Securing Syscalls for PKU-based Memory Isolation Systems.mp4
|
5.6 MB
|
Khaleesi Breaker of Advertising and Tracking Request Chains.mp4
|
12.1 MB
|
Label Inference Attacks Against Vertical Federated Learning.mp4
|
14.2 MB
|
Lamphone Passive Sound Recovery from a Desk Lamp's Light Bulb Vibrations.mp4
|
13.4 MB
|
Leaky Forms A Study of Email and Password Exfiltration Before Form Submission.mp4
|
10.2 MB
|
Lend Me Your Ear Passive Remote Physical Side Channels on PCs.mp4
|
11.1 MB
|
Like Lesbians Walking the Perimeter - Experiences of U.S. LGBTQ Folks.mp4
|
8.0 MB
|
LinKRID Vetting Imbalance Reference Counting in Linux kernel with Symbolic.mp4
|
11.9 MB
|
Loki Hardening Code Obfuscation Against Automated Attacks.mp4
|
7.2 MB
|
LTrack Stealthy Tracking of Mobile Phones in LTE.mp4
|
10.4 MB
|
Lumos Identifying and Localizing Diverse Hidden IoT Devices.mp4
|
11.6 MB
|
MaDIoT 2.0 Modern High-Wattage IoT Botnet Attacks and Defenses.mp4
|
13.8 MB
|
MAGE Mutual Attestation for a Group of Enclaves without Trusted Third Parties.mp4
|
7.8 MB
|
Many Roads Lead To Rome How Packet Headers Influence DNS Censorship.mp4
|
11.6 MB
|
Measurement by Proxy On the Accuracy of Online Marketplace Measurements.mp4
|
8.8 MB
|
Membership Inference Attacks and Defenses in Neural Network Pruning.mp4
|
11.8 MB
|
Midas Systematic Kernel TOCTTOU Protection.mp4
|
9.5 MB
|
Might I Get Pwned A Second Generation Compromised Credential Checking Service.mp4
|
7.8 MB
|
Minefield A Software-only Protection for SGX Enclaves against DVFS Attacks.mp4
|
7.3 MB
|
Mining Node.js Vulnerabilities via Object Dependence Graph and Query.mp4
|
11.0 MB
|
Mistrust Plugins You Must A Large-Scale Study Of Malicious Plugins.mp4
|
15.3 MB
|
Mitigating Membership Inference Attacks by Self-Distillation Through a Novel.mp4
|
8.4 MB
|
ML-Doctor Holistic Risk Assessment of Inference Attacks Against Machine.mp4
|
10.6 MB
|
Morphuzz Bending (Input) Space to Fuzz Virtual Devices.mp4
|
13.3 MB
|
MOVERY A Precise Approach for Modified Vulnerable Code Clone Discovery from.mp4
|
10.2 MB
|
MundoFuzz Hypervisor Fuzzing with Statistical Coverage Testing and Grammar.mp4
|
8.3 MB
|
Neither Access nor Control A Longitudinal Investigation of the Efficacy.mp4
|
9.7 MB
|
Networks of Care Tech Abuse Advocates' Digital Security Practices.mp4
|
9.1 MB
|
Off-Path Network Traffic Manipulation via Revitalized ICMP Redirect Attacks.mp4
|
13.6 MB
|
OK, Siri - or - Hey, Google - Evaluating Voiceprint Distinctiveness via.mp4
|
10.5 MB
|
Omnes pro uno Practical Multi-Writer Encrypted Database.mp4
|
17.5 MB
|
On the Necessity of Auditable Algorithmic Definitions for Machine Unlearning.mp4
|
7.8 MB
|
On the Security Risks of AutoML.mp4
|
9.0 MB
|
One-off Disclosure Control by Heterogeneous Generalization.mp4
|
12.3 MB
|
Online Website Fingerprinting Evaluating Website Fingerprinting Attacks.mp4
|
13.6 MB
|
Oops Code Execution and Content Spoofing The First Comprehensive Analysis.mp4
|
10.4 MB
|
Open to a fault On the passive compromise of TLS keys via transient errors.mp4
|
12.9 MB
|
OpenSSLNTRU Faster post-quantum TLS key exchange.mp4
|
14.5 MB
|
OpenVPN is Open to VPN Fingerprinting.mp4
|
11.9 MB
|
Orca Blocklisting in Sender-Anonymous Messaging.mp4
|
12.7 MB
|
OS-Aware Vulnerability Prioritization via Differential Severity Analysis.mp4
|
11.1 MB
|
OVRseen Auditing Network Traffic and Privacy Policies in Oculus VR.mp4
|
11.7 MB
|
Pacer Comprehensive Network Side-Channel Mitigation in the Cloud.mp4
|
13.3 MB
|
PatchCleanser Certifiably Robust Defense against Adversarial Patches.mp4
|
11.7 MB
|
Phish in Sheep's Clothing Exploring the Authentication Pitfalls.mp4
|
13.3 MB
|
Physical-Layer Attacks Against Pulse Width Modulation-Controlled Actuators.mp4
|
12.2 MB
|
Piranha A GPU Platform for Secure Computation.mp4
|
10.8 MB
|
PISTIS Trusted Computing Architecture for Low-end Embedded Systems.mp4
|
11.1 MB
|
Playing for K(H)eaps Understanding and Improving Linux Kernel Exploit.mp4
|
8.1 MB
|
Playing Without Paying Detecting Vulnerable Payment Verification in Native.mp4
|
9.7 MB
|
Poison Forensics Traceback of Data Poisoning Attacks in Neural Networks.mp4
|
11.7 MB
|
PoisonedEncoder Poisoning the Unlabeled Pre-training Data in Contrastive.mp4
|
7.4 MB
|
Poisoning Attacks to Local Differential Privacy Protocols for Key-Value Data.mp4
|
12.1 MB
|
PolyCruise A Cross-Language Dynamic Information Flow Analysis.mp4
|
9.9 MB
|
Polynomial Commitment with a One-to-Many Prover and Applications.mp4
|
10.4 MB
|
Pool Inference Attacks on Local Differential Privacy.mp4
|
13.5 MB
|
Post-Quantum Cryptography with Contemporary Co-Processors Beyond Kronecker,.mp4
|
11.8 MB
|
ppSAT Towards Two-Party Private SAT Solving.mp4
|
10.5 MB
|
Practical Data Access Minimization in Trigger-Action Platforms.mp4
|
8.2 MB
|
Practical Privacy-Preserving Authentication for SSH.mp4
|
10.4 MB
|
Pre-hijacked accounts An Empirical Study of Security Failures in User Account.mp4
|
8.2 MB
|
Private Signaling.mp4
|
11.0 MB
|
PrivGuard Privacy Regulation Compliance Made Easier.mp4
|
7.8 MB
|
ProFactory Improving IoT Security via Formalized Protocol Customization.mp4
|
11.1 MB
|
Provably-Safe Multilingual Software Sandboxing using WebAssembly.mp4
|
9.9 MB
|
QCSD A QUIC Client-Side Website-Fingerprinting Defence Framework.mp4
|
11.3 MB
|
QuORAM A Quorum-Replicated Fault Tolerant ORAM Datastore.mp4
|
11.0 MB
|
Rapid Prototyping for Microarchitectural Attacks.mp4
|
11.8 MB
|
RapidPatch Firmware Hotpatching for Real-Time Embedded Devices.mp4
|
12.0 MB
|
RegexScalpel Regular Expression Denial of Service (ReDoS) Defense by.mp4
|
8.8 MB
|
Regulator Dynamic Analysis to Detect ReDoS.mp4
|
12.8 MB
|
RE-Mind a First Look Inside the Mind of a Reverse Engineer.mp4
|
10.2 MB
|
Rendering Contention Channel Made Practical in Web Browsers.mp4
|
8.6 MB
|
Repurposing Segmentation as a Practical LVI-NULL Mitigation in SGX.mp4
|
7.8 MB
|
RETBLEED Arbitrary Speculative Code Execution with Return Instructions.mp4
|
9.4 MB
|
ReZone Disarming TrustZone with TEE Privilege Reduction.mp4
|
9.1 MB
|
Rolling Colors Adversarial Laser Exploits against Traffic Light Recognition.mp4
|
12.8 MB
|
SAID State-aware Defense Against Injection Attacks on In-vehicle Network.mp4
|
10.8 MB
|
SAPIC protocol verifiers of the world, unite.mp4
|
9.9 MB
|
SARA Secure Android Remote Authorization.mp4
|
10.6 MB
|
SCRAPS Scalable Collective Remote Attestation for Pub-Sub IoT Networks with.mp4
|
10.0 MB
|
SecSMT Securing SMT Processors against Contention-Based Covert Channels.mp4
|
7.8 MB
|
Secure Poisson Regression.mp4
|
10.7 MB
|
Security Analysis of Camera-LiDAR Fusion Against Black-Box Attacks.mp4
|
14.3 MB
|
Security and Privacy Perceptions of Third-Party Application Access for Google.mp4
|
8.8 MB
|
Security at the End of the Tunnel The Anatomy of VPN Mental Models Among.mp4
|
10.9 MB
|
Seeing is Living Rethinking the Security of Facial Liveness Verification.mp4
|
10.5 MB
|
Seeing the Forest for the Trees Understanding Security Hazards in the 3GPP.mp4
|
7.5 MB
|
SGXFuzz Efficiently Synthesizing Nested Structures for SGX Enclave Fuzzing.mp4
|
7.5 MB
|
SGXLock Towards Efficiently Establishing Mutual Distrust Between Host.mp4
|
7.6 MB
|
Shuffle-based Private Set Union Faster and More Secure.mp4
|
9.8 MB
|
SIMC ML Inference Secure Against Malicious Clients at Semi-Honest Cost.mp4
|
20.1 MB
|
SkillDetective Automated Policy-Violation Detection of Voice Assistant.mp4
|
16.3 MB
|
Smart Home Privacy Policies Demystified A Study of Availability, Content, and.mp4
|
12.9 MB
|
Spoki Unveiling a New Wave of Scanners through a Reactive Network Telescope.mp4
|
9.5 MB
|
Stalloris RPKI Downgrade Attack.mp4
|
9.8 MB
|
Stateful Greybox Fuzzing.mp4
|
10.0 MB
|
StateFuzz System Call-Based State-Aware Linux Driver Fuzzing.mp4
|
11.2 MB
|
Stick It to The Man Correcting for Non-Cooperative Behavior of Subjects in.mp4
|
10.4 MB
|
SWAPP A New Programmable Playground for Web Application Security.mp4
|
7.7 MB
|
SYMSAN Time and Space Efficient Concolic Execution via Dynamic Data-flow.mp4
|
7.1 MB
|
Synthetic Data - Anonymisation Groundhog Day.mp4
|
6.4 MB
|
SyzScope Revealing High-Risk Security Impacts of Fuzzer-Exposed Bugs in Linux.mp4
|
15.2 MB
|
Targeted Deanonymization via the Cache Side Channel Attacks and Defenses.mp4
|
8.0 MB
|
Teacher Model Fingerprinting Attacks Against Transfer Learning.mp4
|
9.4 MB
|
The Dangers of Human Touch Fingerprinting Browser Extensions through.mp4
|
11.5 MB
|
The Same PIN, Just Longer - On the (In)Security of Upgrading PINs from 4 to.mp4
|
10.4 MB
|
The Security Lottery Measuring Client-Side Web Security Inconsistencies.mp4
|
11.0 MB
|
TheHuzz Instruction Fuzzing of Processors Using Golden-Reference Models for.mp4
|
14.3 MB
|
Themis Accelerating the Detection of Route Origin Hijacking by Distinguishing.mp4
|
9.5 MB
|
They Look at Vulnerability and Use That to Abuse You.mp4
|
10.6 MB
|
Tightly Seal Your Sensitive Pointers with PACTight.mp4
|
10.3 MB
|
TLS-Anvil Adapting Combinatorial Testing for TLS Libraries.mp4
|
6.7 MB
|
Total Eclipse of the Heart - Disrupting the InterPlanetary File System.mp4
|
9.5 MB
|
Towards Automatically Reverse Engineering Vehicle Diagnostic Protocols.mp4
|
12.0 MB
|
Towards More Robust Keyword Spotting for Voice Assistants.mp4
|
9.7 MB
|
Transferring Adversarial Robustness Through Robust Representation Matching.mp4
|
11.4 MB
|
Trust Dies in Darkness Shedding Light on Samsung's TrustZone Keymaster Design.mp4
|
10.6 MB
|
Twilight A Differentially Private Payment Channel Network.mp4
|
10.3 MB
|
Under the Hood of DANE Mismanagement in SMTP.mp4
|
11.9 MB
|
Understanding and Improving Usability of Data Dashboards for Simplified.mp4
|
9.3 MB
|
Uninvited Guests Analyzing the Identity and Behavior of Certificate.mp4
|
6.2 MB
|
Unleash the Simulacrum Shifting Browser Realities for Robust.mp4
|
8.2 MB
|
USENIX Security '22- The Antrim County 2020 Election Incident An Independent Forensic Investigation.mp4
|
13.6 MB
|
USENIX Security '22- TLB - DR Enhancing TLB-based Attacks with TLB Desynchronized Reverse Engineering.mp4
|
8.3 MB
|
USENIX Security '22-Hertzbleed Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86.mp4
|
11.6 MB
|
Using Trātṛ to tame Adversarial Synchronization.mp4
|
14.7 MB
|
V'CER Efficient Certificate Validation in Constrained Networks.mp4
|
11.5 MB
|
VerLoc Verifiable Localization in Decentralized Systems.mp4
|
10.2 MB
|
Watching the watchers bias and vulnerability in remote proctoring software.mp4
|
9.9 MB
|
Watching the Watchers Practical Video Identification Attack in LTE Networks.mp4
|
12.2 MB
|
Web Cache Deception Escalates.mp4
|
10.1 MB
|
WebGraph Capturing Advertising and Tracking Information Flows.mp4
|
9.2 MB
|
When Sally Met Trackers Web Tracking From the Users' Perspective.mp4
|
8.0 MB
|
Where to Recruit for Security Development Studies Comparing Six Software.mp4
|
8.7 MB
|
Who Are You (I Really Wanna Know) Detecting Audio DeepFakes Through Vocal.mp4
|
18.4 MB
|
Why Users (Don't) Use Password Managers at a Large Educational Institution.mp4
|
10.2 MB
|
XDRI Attacks - and - How to Enhance Resilience of Residential Routers.mp4
|
12.6 MB
|
Your Microphone Array Retains Your Identity A Robust Voice Liveness.mp4
|
11.1 MB
|
Zero-Knowledge Middleboxes.mp4
|
8.9 MB
|
/.../USENIX Security 2022 captions/
|
99% False Positives A Qualitative Study of SOC Analysts' Perspectives.eng.srt
|
25.1 KB
|
A Hardware-Software Co-design for Efficient Intra-Enclave Isolation.eng.json
|
320.6 KB
|
A Hardware-Software Co-design for Efficient Intra-Enclave Isolation.eng.lrc
|
9.1 KB
|
A Hardware-Software Co-design for Efficient Intra-Enclave Isolation.eng.srt
|
9.5 KB
|
A Hardware-Software Co-design for Efficient Intra-Enclave Isolation.eng.text
|
7.1 KB
|
A Hardware-Software Co-design for Efficient Intra-Enclave Isolation.eng.tsv
|
8.2 KB
|
A Hardware-Software Co-design for Efficient Intra-Enclave Isolation.eng.txt
|
9.2 KB
|
A Hardware-Software Co-design for Efficient Intra-Enclave Isolation.eng.vtt
|
8.9 KB
|
A Large-scale and Longitudinal Measurement Study of DKIM Deployment.eng.srt
|
18.0 KB
|
A Large-scale Investigation into Geodifferences in Mobile Apps.eng.srt
|
20.3 KB
|
A Large-scale Temporal Measurement of Android Malicious Apps.eng.srt
|
18.3 KB
|
Aardvark An Asynchronous Authenticated Dictionary with Applications to.eng.srt
|
22.9 KB
|
Adversarial Detection Avoidance Attacks Evaluating the robustness.eng.srt
|
26.8 KB
|
ÆPIC Leak Architecturally Leaking Uninitialized Data from the.eng.srt
|
23.2 KB
|
ALASTOR Reconstructing the Provenance of Serverless Intrusions.eng.srt
|
19.1 KB
|
AMD Prefetch Attacks through Power and Time.eng.json
|
547.9 KB
|
AMD Prefetch Attacks through Power and Time.eng.lrc
|
16.1 KB
|
AMD Prefetch Attacks through Power and Time.eng.srt
|
13.0 KB
|
AMD Prefetch Attacks through Power and Time.eng.text
|
9.9 KB
|
AMD Prefetch Attacks through Power and Time.eng.tsv
|
13.2 KB
|
AMD Prefetch Attacks through Power and Time.eng.txt
|
16.3 KB
|
AMD Prefetch Attacks through Power and Time.eng.vtt
|
12.1 KB
|
AmpFuzz Fuzzing for Amplification DDoS Vulnerabilities.eng.srt
|
23.3 KB
|
An Audit of Facebook's Political Ad Policy Enforcement.eng.json
|
518.0 KB
|
An Audit of Facebook's Political Ad Policy Enforcement.eng.lrc
|
15.4 KB
|
An Audit of Facebook's Political Ad Policy Enforcement.eng.srt
|
13.0 KB
|
An Audit of Facebook's Political Ad Policy Enforcement.eng.text
|
9.7 KB
|
An Audit of Facebook's Political Ad Policy Enforcement.eng.tsv
|
12.7 KB
|
An Audit of Facebook's Political Ad Policy Enforcement.eng.txt
|
15.6 KB
|
An Audit of Facebook's Political Ad Policy Enforcement.eng.vtt
|
12.1 KB
|
An Experimental Study of GPS Spoofing and Takeover Attacks on UAVs.eng.srt
|
22.7 KB
|
Anycast Agility Network Playbooks to Fight DDoS.eng.srt
|
20.5 KB
|
Arbiter Bridging the Static and Dynamic Divide in Vulnerability Discovery.eng.json
|
541.8 KB
|
Arbiter Bridging the Static and Dynamic Divide in Vulnerability Discovery.eng.lrc
|
16.5 KB
|
Arbiter Bridging the Static and Dynamic Divide in Vulnerability Discovery.eng.srt
|
12.9 KB
|
Arbiter Bridging the Static and Dynamic Divide in Vulnerability Discovery.eng.text
|
10.3 KB
|
Arbiter Bridging the Static and Dynamic Divide in Vulnerability Discovery.eng.tsv
|
13.6 KB
|
Arbiter Bridging the Static and Dynamic Divide in Vulnerability Discovery.eng.txt
|
16.7 KB
|
Arbiter Bridging the Static and Dynamic Divide in Vulnerability Discovery.eng.vtt
|
12.2 KB
|
Are Your Sensitive Attributes Private Novel Model Inversion Attribute.eng.srt
|
25.8 KB
|
Attacks on Deidentification's Defenses.eng.srt
|
25.8 KB
|
Augmenting Decompiler Output with Learned Variable Names and Types.eng.srt
|
21.1 KB
|
AutoDA Automated Decision-based Iterative Adversarial Attacks.eng.srt
|
20.7 KB
|
Automated Detection of Automated Traffic.eng.srt
|
30.6 KB
|
Automated Side Channel Analysis of Media Software with Manifold Learning.eng.srt
|
19.1 KB
|
Automating Cookie Consent and GDPR Violation Detection.eng.srt
|
24.2 KB
|
Backporting Security Patches of Web Applications A Prototype Design.eng.srt
|
21.8 KB
|
Back-Propagating System Dependency Impact for Attack Investigation.eng.srt
|
20.5 KB
|
Batched Differentially Private Information Retrieval.eng.srt
|
27.0 KB
|
Bedrock Programmable Network Support for Secure RDMA Systems.eng.srt
|
19.2 KB
|
Behind the Tube Exploitative Monetization of Content on YouTube.eng.json
|
540.3 KB
|
Behind the Tube Exploitative Monetization of Content on YouTube.eng.lrc
|
15.1 KB
|
Behind the Tube Exploitative Monetization of Content on YouTube.eng.srt
|
15.5 KB
|
Behind the Tube Exploitative Monetization of Content on YouTube.eng.text
|
11.8 KB
|
Behind the Tube Exploitative Monetization of Content on YouTube.eng.tsv
|
13.6 KB
|
Behind the Tube Exploitative Monetization of Content on YouTube.eng.txt
|
15.3 KB
|
Behind the Tube Exploitative Monetization of Content on YouTube.eng.vtt
|
14.5 KB
|
Binoculars Contention-Based Side-Channel Attacks Exploiting the Page Walker.eng.json
|
613.1 KB
|
Binoculars Contention-Based Side-Channel Attacks Exploiting the Page Walker.eng.lrc
|
18.1 KB
|
Binoculars Contention-Based Side-Channel Attacks Exploiting the Page Walker.eng.srt
|
14.6 KB
|
Binoculars Contention-Based Side-Channel Attacks Exploiting the Page Walker.eng.text
|
11.1 KB
|
Binoculars Contention-Based Side-Channel Attacks Exploiting the Page Walker.eng.tsv
|
14.8 KB
|
Binoculars Contention-Based Side-Channel Attacks Exploiting the Page Walker.eng.txt
|
18.3 KB
|
Binoculars Contention-Based Side-Channel Attacks Exploiting the Page Walker.eng.vtt
|
13.6 KB
|
Birds of a Feather Flock Together How Set Bias Helps to Deanonymize You.eng.srt
|
17.3 KB
|
Blacklight Scalable Defense for Neural Networks against Query-Based Black-Box.eng.srt
|
15.9 KB
|
BrakTooth Causing Havoc on Bluetooth Link Manager via Directed Fuzzing.eng.json
|
843.3 KB
|
BrakTooth Causing Havoc on Bluetooth Link Manager via Directed Fuzzing.eng.lrc
|
23.3 KB
|
BrakTooth Causing Havoc on Bluetooth Link Manager via Directed Fuzzing.eng.srt
|
19.9 KB
|
BrakTooth Causing Havoc on Bluetooth Link Manager via Directed Fuzzing.eng.text
|
15.4 KB
|
BrakTooth Causing Havoc on Bluetooth Link Manager via Directed Fuzzing.eng.tsv
|
19.6 KB
|
BrakTooth Causing Havoc on Bluetooth Link Manager via Directed Fuzzing.eng.txt
|
23.6 KB
|
BrakTooth Causing Havoc on Bluetooth Link Manager via Directed Fuzzing.eng.vtt
|
18.6 KB
|
Branch History Injection On the Effectiveness of Hardware Mitigations.eng.json
|
618.2 KB
|
Branch History Injection On the Effectiveness of Hardware Mitigations.eng.lrc
|
16.9 KB
|
Branch History Injection On the Effectiveness of Hardware Mitigations.eng.srt
|
14.5 KB
|
Branch History Injection On the Effectiveness of Hardware Mitigations.eng.text
|
11.0 KB
|
Branch History Injection On the Effectiveness of Hardware Mitigations.eng.tsv
|
14.2 KB
|
Branch History Injection On the Effectiveness of Hardware Mitigations.eng.txt
|
17.2 KB
|
Branch History Injection On the Effectiveness of Hardware Mitigations.eng.vtt
|
13.5 KB
|
Breaking Bridgefy, again Adopting libsignal is not enough.eng.srt
|
17.3 KB
|
Building an Open, Robust, and Stable Voting-Based Domain Top List.eng.srt
|
19.3 KB
|
CamShield Securing Smart Cameras through Physical Replication and Isolation.eng.srt
|
18.4 KB
|
Can one hear the shape of a neural network Snooping the GPU via Magnetic.eng.srt
|
24.3 KB
|
Caring about Sharing User Perceptions of Multiparty Data Sharing.eng.srt
|
22.1 KB
|
CellIFT Leveraging Cells for Scalable and Precise Dynamic Information Flow.eng.srt
|
22.6 KB
|
Characterizing the Security of Github CI Workflows.eng.srt
|
20.9 KB
|
Cheetah Lean and Fast Secure Two-Party Deep Neural Network Inference.eng.json
|
429.8 KB
|
Cheetah Lean and Fast Secure Two-Party Deep Neural Network Inference.eng.lrc
|
11.5 KB
|
Cheetah Lean and Fast Secure Two-Party Deep Neural Network Inference.eng.srt
|
12.2 KB
|
Cheetah Lean and Fast Secure Two-Party Deep Neural Network Inference.eng.text
|
8.8 KB
|
Cheetah Lean and Fast Secure Two-Party Deep Neural Network Inference.eng.tsv
|
10.2 KB
|
Cheetah Lean and Fast Secure Two-Party Deep Neural Network Inference.eng.txt
|
11.6 KB
|
Cheetah Lean and Fast Secure Two-Party Deep Neural Network Inference.eng.vtt
|
11.3 KB
|
Communication-Efficient Triangle Counting under Local Differential Privacy.eng.srt
|
18.2 KB
|
Composable Cachelets Protecting Enclaves from Cache Side-Channel Attacks.eng.srt
|
18.7 KB
|
COMRace Detecting Data Race Vulnerabilities in COM Objects.eng.srt
|
23.5 KB
|
Constant-weight PIR Single-round Keyword PIR via Constant-weight Equality.eng.srt
|
26.0 KB
|
Counting in Regexes Considered Harmful Exposing ReDoS Vulnerability of.eng.srt
|
23.7 KB
|
Creating a Secure Underlay for the Internet.eng.srt
|
24.6 KB
|
Debloating Address Sanitizer.eng.srt
|
17.0 KB
|
Decomperson How Humans Decompile and What We Can Learn From It.eng.srt
|
26.2 KB
|
DeepDi Learning a Relational Graph Convolutional Network Model on Instruction.eng.srt
|
18.4 KB
|
DeepPhish Understanding User Trust Towards Artificially Generated Profiles.eng.json
|
656.4 KB
|
DeepPhish Understanding User Trust Towards Artificially Generated Profiles.eng.lrc
|
21.1 KB
|
DeepPhish Understanding User Trust Towards Artificially Generated Profiles.eng.srt
|
16.4 KB
|
DeepPhish Understanding User Trust Towards Artificially Generated Profiles.eng.text
|
13.1 KB
|
DeepPhish Understanding User Trust Towards Artificially Generated Profiles.eng.tsv
|
17.3 KB
|
DeepPhish Understanding User Trust Towards Artificially Generated Profiles.eng.txt
|
21.4 KB
|
DeepPhish Understanding User Trust Towards Artificially Generated Profiles.eng.vtt
|
15.5 KB
|
Detecting Logical Bugs of DBMS with Coverage-based Guidance.eng.srt
|
20.9 KB
|
DnD A Cross-Architecture Deep Neural Network Decompiler.eng.srt
|
18.3 KB
|
DoLTEst In-depth Downlink Negative Testing Framework for LTE Devices.eng.srt
|
15.7 KB
|
Don't Mesh Around Side-Channel Attacks and Mitigations on Mesh Interconnects.eng.srt
|
30.2 KB
|
Dos and Don'ts of Machine Learning in Computer Security.eng.srt
|
24.1 KB
|
Double Trouble Combined Heterogeneous Attacks on Non-Inclusive Cache.eng.srt
|
23.5 KB
|
DoubleStar Long-Range Attack Towards Depth Estimation based Obstacle.eng.srt
|
21.5 KB
|
Drifuzz Harvesting Bugs in Device Drivers from Golden Seeds.eng.json
|
410.3 KB
|
Drifuzz Harvesting Bugs in Device Drivers from Golden Seeds.eng.lrc
|
11.1 KB
|
Drifuzz Harvesting Bugs in Device Drivers from Golden Seeds.eng.srt
|
11.6 KB
|
Drifuzz Harvesting Bugs in Device Drivers from Golden Seeds.eng.text
|
8.5 KB
|
Drifuzz Harvesting Bugs in Device Drivers from Golden Seeds.eng.tsv
|
9.9 KB
|
Drifuzz Harvesting Bugs in Device Drivers from Golden Seeds.eng.txt
|
11.2 KB
|
Drifuzz Harvesting Bugs in Device Drivers from Golden Seeds.eng.vtt
|
10.8 KB
|
Dynamic Searchable Encryption with Optimal Search in the Presence of Deletions.eng.srt
|
24.7 KB
|
Efficient Differentially Private Secure Aggregation for Federated Learning.eng.srt
|
20.7 KB
|
Efficient Representation of Numerical Optimization Problems for SNARKs.eng.srt
|
23.7 KB
|
Elasticlave An Efficient Memory Model for Enclaves.eng.srt
|
26.3 KB
|
Electronic Monitoring Smartphone Apps An Analysis of Risks from Technical,.eng.srt
|
25.5 KB
|
Empirical Understanding of Deletion Privacy Experiences, Expectations, and.eng.srt
|
25.0 KB
|
End-to-Same-End Encryption Modularly Augmenting an App with an Efficient.eng.srt
|
27.9 KB
|
Estimating Incidental Collection in Foreign Intelligence Surveillance.eng.srt
|
22.8 KB
|
Expected Exploitability Predicting the Development of Functional.eng.json
|
601.3 KB
|
Expected Exploitability Predicting the Development of Functional.eng.lrc
|
19.1 KB
|
Expected Exploitability Predicting the Development of Functional.eng.srt
|
14.9 KB
|
Expected Exploitability Predicting the Development of Functional.eng.text
|
11.8 KB
|
Expected Exploitability Predicting the Development of Functional.eng.tsv
|
15.7 KB
|
Expected Exploitability Predicting the Development of Functional.eng.txt
|
19.4 KB
|
Expected Exploitability Predicting the Development of Functional.eng.vtt
|
14.0 KB
|
Experimental Security Analysis of the App Model in Business Collaboration.eng.srt
|
20.9 KB
|
Experimenting with Collaborative zk-SNARKs Zero-Knowledge Proofs for.eng.srt
|
28.3 KB
|
Exploring the Security Boundary of Data Reconstruction via Neuron Exclusivity.eng.srt
|
23.6 KB
|
Exploring the Unchartered Space of Container Registry Typosquatting.eng.json
|
464.3 KB
|
Exploring the Unchartered Space of Container Registry Typosquatting.eng.lrc
|
13.7 KB
|
Exploring the Unchartered Space of Container Registry Typosquatting.eng.srt
|
11.2 KB
|
Exploring the Unchartered Space of Container Registry Typosquatting.eng.text
|
8.5 KB
|
Exploring the Unchartered Space of Container Registry Typosquatting.eng.tsv
|
11.3 KB
|
Exploring the Unchartered Space of Container Registry Typosquatting.eng.txt
|
13.9 KB
|
Exploring the Unchartered Space of Container Registry Typosquatting.eng.vtt
|
10.5 KB
|
Faster Yet Safer Logging System Via Fixed-Key Blockcipher.eng.srt
|
15.6 KB
|
Ferry State-Aware Symbolic Execution for Exploring State-Dependent Program.eng.srt
|
21.8 KB
|
FIXREVERTER A Realistic Bug Injection Methodology for Benchmarking Fuzz.eng.srt
|
19.0 KB
|
FLAME Taming Backdoors in Federated Learning.eng.srt
|
14.2 KB
|
FlowMatrix GPU-Assisted Information-Flow Analysis through Matrix-Based.eng.srt
|
21.5 KB
|
FOAP Fine-Grained Open-World Android App Fingerprinting.eng.srt
|
16.6 KB
|
FRAMESHIFTER Security Implications of HTTP 2-to-HTTP 1 Conversion Anomalies.eng.json
|
424.3 KB
|
FRAMESHIFTER Security Implications of HTTP 2-to-HTTP 1 Conversion Anomalies.eng.lrc
|
11.2 KB
|
FRAMESHIFTER Security Implications of HTTP 2-to-HTTP 1 Conversion Anomalies.eng.srt
|
12.1 KB
|
FRAMESHIFTER Security Implications of HTTP 2-to-HTTP 1 Conversion Anomalies.eng.text
|
8.7 KB
|
FRAMESHIFTER Security Implications of HTTP 2-to-HTTP 1 Conversion Anomalies.eng.tsv
|
10.0 KB
|
FRAMESHIFTER Security Implications of HTTP 2-to-HTTP 1 Conversion Anomalies.eng.txt
|
11.3 KB
|
FRAMESHIFTER Security Implications of HTTP 2-to-HTTP 1 Conversion Anomalies.eng.vtt
|
11.2 KB
|
FReD Identifying File Re-Delegation in Android System Services.eng.srt
|
27.8 KB
|
FreeWill Automatically Diagnosing Use-after-free Bugs via Reference.eng.srt
|
23.7 KB
|
FUGIO Automatic Exploit Generation for PHP Object Injection Vulnerabilities.eng.srt
|
19.0 KB
|
Fuzzing Hardware Like Software.eng.srt
|
22.8 KB
|
FuzzOrigin Detecting UXSS vulnerabilities in Browsers through Origin Fuzzing.eng.srt
|
16.0 KB
|
Fuzzware Using Precise MMIO Modeling for Effective Firmware Fuzzing.eng.srt
|
18.4 KB
|
GAROTA Generalized Active Root-Of-Trust Architecture.eng.srt
|
24.1 KB
|
GET - out Automated Discovery of Application-Layer Censorship Evasion.eng.srt
|
23.4 KB
|
Ghost Peak Practical Distance Reduction Attacks Against HRP UWB Ranging.eng.srt
|
16.6 KB
|
GhostTouch Targeted Attacks on Touchscreens without Physical Touch.eng.srt
|
16.0 KB
|
Gossamer Securely Measuring Password-based Logins.eng.srt
|
22.5 KB
|
GPU-accelerated PIR with Client-Independent Preprocessing for Large-Scale.eng.srt
|
20.5 KB
|
Ground Truth for Binary Disassembly is Not Easy.eng.srt
|
19.1 KB
|
Half-Double Hammering From the Next Row Over.eng.srt
|
22.0 KB
|
Hand Me Your PIN Inferring ATM PINs of Users Typing with a Covered Hand.eng.srt
|
19.9 KB
|
Hecate Abuse Reporting in Secure Messengers with Sealed Sender.eng.srt
|
23.3 KB
|
Helping hands Measuring the impact of a large threat intelligence sharing.eng.srt
|
20.7 KB
|
Hidden Trigger Backdoor Attack on NLP Models via Linguistic Style Manipulation.eng.srt
|
21.4 KB
|
Hiding in Plain Sight On the Efficacy of Power Side Channel-Based Control.eng.srt
|
21.1 KB
|
Holistic Control-Flow Protection on Real-Time Embedded Systems with Kage.eng.srt
|
19.7 KB
|
How and Why People Use Virtual Private Networks.eng.srt
|
20.9 KB
|
How Are Your Zombie Accounts Understanding Users' Practices & Expectations.eng.srt
|
19.2 KB
|
How Do You Not Lose Friends - Synthesizing a Design Space of Social Controls.eng.srt
|
19.9 KB
|
How Long Do Vulnerabilities Live in the Code A Large-Scale Empirical.eng.srt
|
21.5 KB
|
How Machine Learning Is Solving the Binary Function Similarity Problem.eng.srt
|
19.2 KB
|
How to Abuse and Fix Authenticated Encryption Without Key Commitment.eng.srt
|
22.9 KB
|
How to Peel a Million Validating and Expanding Bitcoin Clusters.eng.srt
|
29.5 KB
|
HyperDegrade From GHz to MHz Effective CPU Frequencies.eng.srt
|
16.2 KB
|
Hyperproofs Aggregating and Main'taining Proofs in Vector Commitments.eng.srt
|
23.2 KB
|
I feel invaded, annoyed, anxious and I may protect myself.eng.srt
|
23.5 KB
|
Identity Confusion in WebView-based Mobile App-in-app Ecosystems.eng.srt
|
18.4 KB
|
IHOP Improved Statistical Query Recovery against Searchable Symmetric.eng.srt
|
23.9 KB
|
Increasing Adversarial Uncertain'ty to Scale Private Similarity Testing.eng.srt
|
24.4 KB
|
Incremental Offline Online PIR.eng.json
|
494.7 KB
|
Incremental Offline Online PIR.eng.lrc
|
12.6 KB
|
Incremental Offline Online PIR.eng.srt
|
13.1 KB
|
Incremental Offline Online PIR.eng.text
|
9.9 KB
|
Incremental Offline Online PIR.eng.tsv
|
11.3 KB
|
Incremental Offline Online PIR.eng.txt
|
12.7 KB
|
Incremental Offline Online PIR.eng.vtt
|
12.3 KB
|
Inference Attacks Against Graph Neural Networks.eng.srt
|
20.6 KB
|
Inferring Phishing Intention via Webpage Appearance and Dynamics.eng.srt
|
19.5 KB
|
In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer.eng.json
|
356.9 KB
|
In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer.eng.lrc
|
9.7 KB
|
In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer.eng.srt
|
10.3 KB
|
In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer.eng.text
|
7.2 KB
|
In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer.eng.tsv
|
8.5 KB
|
In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer.eng.txt
|
9.8 KB
|
In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer.eng.vtt
|
9.5 KB
|
Investigating State-of-the-Art Practices for Fostering Subjective Trust in.eng.srt
|
17.0 KB
|
Jenny Securing Syscalls for PKU-based Memory Isolation Systems.eng.srt
|
16.1 KB
|
Khaleesi Breaker of Advertising and Tracking Request Chains.eng.srt
|
22.7 KB
|
Label Inference Attacks Against Vertical Federated Learning.eng.srt
|
17.4 KB
|
Lamphone Passive Sound Recovery from a Desk Lamp's Light Bulb Vibrations.eng.srt
|
24.9 KB
|
Leaky Forms A Study of Email and Password Exfiltration Before Form Submission.eng.json
|
480.4 KB
|
Leaky Forms A Study of Email and Password Exfiltration Before Form Submission.eng.lrc
|
13.1 KB
|
Leaky Forms A Study of Email and Password Exfiltration Before Form Submission.eng.srt
|
13.0 KB
|
Leaky Forms A Study of Email and Password Exfiltration Before Form Submission.eng.text
|
9.7 KB
|
Leaky Forms A Study of Email and Password Exfiltration Before Form Submission.eng.tsv
|
11.5 KB
|
Leaky Forms A Study of Email and Password Exfiltration Before Form Submission.eng.txt
|
13.3 KB
|
Leaky Forms A Study of Email and Password Exfiltration Before Form Submission.eng.vtt
|
12.2 KB
|
Lend Me Your Ear Passive Remote Physical Side Channels on PCs.eng.srt
|
21.2 KB
|
Like Lesbians Walking the Perimeter - Experiences of U.S. LGBTQ Folks.eng.srt
|
18.5 KB
|
LinKRID Vetting Imbalance Reference Counting in Linux kernel with Symbolic.eng.json
|
559.1 KB
|
LinKRID Vetting Imbalance Reference Counting in Linux kernel with Symbolic.eng.lrc
|
15.6 KB
|
LinKRID Vetting Imbalance Reference Counting in Linux kernel with Symbolic.eng.srt
|
12.6 KB
|
LinKRID Vetting Imbalance Reference Counting in Linux kernel with Symbolic.eng.text
|
9.8 KB
|
LinKRID Vetting Imbalance Reference Counting in Linux kernel with Symbolic.eng.tsv
|
12.9 KB
|
LinKRID Vetting Imbalance Reference Counting in Linux kernel with Symbolic.eng.txt
|
15.9 KB
|
LinKRID Vetting Imbalance Reference Counting in Linux kernel with Symbolic.eng.vtt
|
11.8 KB
|
Loki Hardening Code Obfuscation Against Automated Attacks.eng.srt
|
19.4 KB
|
LTrack Stealthy Tracking of Mobile Phones in LTE.eng.srt
|
19.9 KB
|
Lumos Identifying and Localizing Diverse Hidden IoT Devices.eng.srt
|
19.8 KB
|
MaDIoT 2.0 Modern High-Wattage IoT Botnet Attacks and Defenses.eng.srt
|
19.0 KB
|
MAGE Mutual Attestation for a Group of Enclaves without Trusted Third Parties.eng.srt
|
15.8 KB
|
Many Roads Lead To Rome How Packet Headers Influence DNS Censorship.eng.srt
|
21.8 KB
|
Measurement by Proxy On the Accuracy of Online Marketplace Measurements.eng.srt
|
24.3 KB
|
Membership Inference Attacks and Defenses in Neural Network Pruning.eng.srt
|
24.0 KB
|
Midas Systematic Kernel TOCTTOU Protection.eng.json
|
500.5 KB
|
Midas Systematic Kernel TOCTTOU Protection.eng.lrc
|
14.3 KB
|
Midas Systematic Kernel TOCTTOU Protection.eng.srt
|
11.5 KB
|
Midas Systematic Kernel TOCTTOU Protection.eng.text
|
8.8 KB
|
Midas Systematic Kernel TOCTTOU Protection.eng.tsv
|
11.7 KB
|
Midas Systematic Kernel TOCTTOU Protection.eng.txt
|
14.5 KB
|
Midas Systematic Kernel TOCTTOU Protection.eng.vtt
|
10.8 KB
|
Might I Get Pwned A Second Generation Compromised Credential Checking Service.eng.srt
|
18.8 KB
|
Minefield A Software-only Protection for SGX Enclaves against DVFS Attacks.eng.srt
|
18.4 KB
|
Mining Node.js Vulnerabilities via Object Dependence Graph and Query.eng.json
|
467.5 KB
|
Mining Node.js Vulnerabilities via Object Dependence Graph and Query.eng.lrc
|
12.1 KB
|
Mining Node.js Vulnerabilities via Object Dependence Graph and Query.eng.srt
|
12.6 KB
|
Mining Node.js Vulnerabilities via Object Dependence Graph and Query.eng.text
|
9.5 KB
|
Mining Node.js Vulnerabilities via Object Dependence Graph and Query.eng.tsv
|
10.9 KB
|
Mining Node.js Vulnerabilities via Object Dependence Graph and Query.eng.txt
|
12.2 KB
|
Mining Node.js Vulnerabilities via Object Dependence Graph and Query.eng.vtt
|
11.8 KB
|
Mistrust Plugins You Must A Large-Scale Study Of Malicious Plugins.eng.srt
|
23.8 KB
|
Mitigating Membership Inference Attacks by Self-Distillation Through a Novel.eng.srt
|
20.5 KB
|
ML-Doctor Holistic Risk Assessment of Inference Attacks Against Machine.eng.srt
|
18.0 KB
|
Morphuzz Bending (Input) Space to Fuzz Virtual Devices.eng.srt
|
24.6 KB
|
MOVERY A Precise Approach for Modified Vulnerable Code Clone Discovery from.eng.srt
|
19.1 KB
|
MundoFuzz Hypervisor Fuzzing with Statistical Coverage Testing and Grammar.eng.srt
|
17.5 KB
|
Neither Access nor Control A Longitudinal Investigation of the Efficacy.eng.srt
|
23.4 KB
|
Networks of Care Tech Abuse Advocates' Digital Security Practices.eng.json
|
525.6 KB
|
Networks of Care Tech Abuse Advocates' Digital Security Practices.eng.lrc
|
14.9 KB
|
Networks of Care Tech Abuse Advocates' Digital Security Practices.eng.srt
|
13.1 KB
|
Networks of Care Tech Abuse Advocates' Digital Security Practices.eng.text
|
10.8 KB
|
Networks of Care Tech Abuse Advocates' Digital Security Practices.eng.tsv
|
13.0 KB
|
Networks of Care Tech Abuse Advocates' Digital Security Practices.eng.txt
|
15.1 KB
|
Networks of Care Tech Abuse Advocates' Digital Security Practices.eng.vtt
|
12.5 KB
|
Off-Path Network Traffic Manipulation via Revitalized ICMP Redirect Attacks.eng.srt
|
20.3 KB
|
OK, Siri - or - Hey, Google - Evaluating Voiceprint Distinctiveness via.eng.srt
|
19.1 KB
|
Omnes pro uno Practical Multi-Writer Encrypted Database.eng.json
|
419.5 KB
|
Omnes pro uno Practical Multi-Writer Encrypted Database.eng.lrc
|
11.4 KB
|
Omnes pro uno Practical Multi-Writer Encrypted Database.eng.srt
|
12.4 KB
|
Omnes pro uno Practical Multi-Writer Encrypted Database.eng.text
|
9.1 KB
|
Omnes pro uno Practical Multi-Writer Encrypted Database.eng.tsv
|
10.3 KB
|
Omnes pro uno Practical Multi-Writer Encrypted Database.eng.txt
|
11.5 KB
|
Omnes pro uno Practical Multi-Writer Encrypted Database.eng.vtt
|
11.6 KB
|
On the Necessity of Auditable Algorithmic Definitions for Machine Unlearning.eng.srt
|
20.8 KB
|
On the Security Risks of AutoML.eng.srt
|
14.1 KB
|
One-off Disclosure Control by Heterogeneous Generalization.eng.srt
|
20.8 KB
|
Online Website Fingerprinting Evaluating Website Fingerprinting Attacks.eng.srt
|
25.5 KB
|
Oops Code Execution and Content Spoofing The First Comprehensive Analysis.eng.srt
|
15.5 KB
|
Open to a fault On the passive compromise of TLS keys via transient errors.eng.srt
|
24.1 KB
|
OpenSSLNTRU Faster post-quantum TLS key exchange.eng.srt
|
26.0 KB
|
OpenVPN is Open to VPN Fingerprinting.eng.json
|
544.1 KB
|
OpenVPN is Open to VPN Fingerprinting.eng.lrc
|
15.9 KB
|
OpenVPN is Open to VPN Fingerprinting.eng.srt
|
13.7 KB
|
OpenVPN is Open to VPN Fingerprinting.eng.text
|
10.7 KB
|
OpenVPN is Open to VPN Fingerprinting.eng.tsv
|
13.5 KB
|
OpenVPN is Open to VPN Fingerprinting.eng.txt
|
16.1 KB
|
OpenVPN is Open to VPN Fingerprinting.eng.vtt
|
12.9 KB
|
Orca Blocklisting in Sender-Anonymous Messaging.eng.srt
|
26.5 KB
|
OS-Aware Vulnerability Prioritization via Differential Severity Analysis.eng.srt
|
17.7 KB
|
OVRseen Auditing Network Traffic and Privacy Policies in Oculus VR.eng.srt
|
24.6 KB
|
Pacer Comprehensive Network Side-Channel Mitigation in the Cloud.eng.srt
|
27.2 KB
|
PatchCleanser Certifiably Robust Defense against Adversarial Patches.eng.srt
|
24.1 KB
|
Phish in Sheep's Clothing Exploring the Authentication Pitfalls.eng.srt
|
16.8 KB
|
Physical-Layer Attacks Against Pulse Width Modulation-Controlled Actuators.eng.srt
|
20.3 KB
|
Piranha A GPU Platform for Secure Computation.eng.srt
|
26.2 KB
|
PISTIS Trusted Computing Architecture for Low-end Embedded Systems.eng.srt
|
23.3 KB
|
Playing for K(H)eaps Understanding and Improving Linux Kernel Exploit.eng.srt
|
18.3 KB
|
Playing Without Paying Detecting Vulnerable Payment Verification in Native.eng.srt
|
20.1 KB
|
Poison Forensics Traceback of Data Poisoning Attacks in Neural Networks.eng.srt
|
26.6 KB
|
PoisonedEncoder Poisoning the Unlabeled Pre-training Data in Contrastive.eng.srt
|
19.3 KB
|
Poisoning Attacks to Local Differential Privacy Protocols for Key-Value Data.eng.json
|
466.0 KB
|
Poisoning Attacks to Local Differential Privacy Protocols for Key-Value Data.eng.lrc
|
12.0 KB
|
Poisoning Attacks to Local Differential Privacy Protocols for Key-Value Data.eng.srt
|
13.3 KB
|
Poisoning Attacks to Local Differential Privacy Protocols for Key-Value Data.eng.text
|
9.4 KB
|
Poisoning Attacks to Local Differential Privacy Protocols for Key-Value Data.eng.tsv
|
10.8 KB
|
Poisoning Attacks to Local Differential Privacy Protocols for Key-Value Data.eng.txt
|
12.1 KB
|
Poisoning Attacks to Local Differential Privacy Protocols for Key-Value Data.eng.vtt
|
12.2 KB
|
PolyCruise A Cross-Language Dynamic Information Flow Analysis.eng.srt
|
18.4 KB
|
Polynomial Commitment with a One-to-Many Prover and Applications.eng.srt
|
18.1 KB
|
Pool Inference Attacks on Local Differential Privacy.eng.json
|
609.1 KB
|
Pool Inference Attacks on Local Differential Privacy.eng.lrc
|
17.8 KB
|
Pool Inference Attacks on Local Differential Privacy.eng.srt
|
14.7 KB
|
Pool Inference Attacks on Local Differential Privacy.eng.text
|
11.4 KB
|
Pool Inference Attacks on Local Differential Privacy.eng.tsv
|
14.8 KB
|
Pool Inference Attacks on Local Differential Privacy.eng.txt
|
18.1 KB
|
Pool Inference Attacks on Local Differential Privacy.eng.vtt
|
13.8 KB
|
Post-Quantum Cryptography with Contemporary Co-Processors Beyond Kronecker,.eng.srt
|
22.0 KB
|
ppSAT Towards Two-Party Private SAT Solving.eng.srt
|
21.8 KB
|
Practical Data Access Minimization in Trigger-Action Platforms.eng.srt
|
20.9 KB
|
Practical Privacy-Preserving Authentication for SSH.eng.srt
|
27.5 KB
|
Pre-hijacked accounts An Empirical Study of Security Failures in User Account.eng.srt
|
24.5 KB
|
Private Signaling.eng.json
|
769.8 KB
|
Private Signaling.eng.lrc
|
18.5 KB
|
Private Signaling.eng.srt
|
19.5 KB
|
Private Signaling.eng.text
|
14.4 KB
|
Private Signaling.eng.tsv
|
16.6 KB
|
Private Signaling.eng.txt
|
18.7 KB
|
Private Signaling.eng.vtt
|
18.1 KB
|
PrivGuard Privacy Regulation Compliance Made Easier.eng.srt
|
19.2 KB
|
ProFactory Improving IoT Security via Formalized Protocol Customization.eng.srt
|
23.3 KB
|
Provably-Safe Multilingual Software Sandboxing using WebAssembly.eng.srt
|
19.7 KB
|
QCSD A QUIC Client-Side Website-Fingerprinting Defence Framework.eng.srt
|
23.4 KB
|
QuORAM A Quorum-Replicated Fault Tolerant ORAM Datastore.eng.srt
|
23.5 KB
|
Rapid Prototyping for Microarchitectural Attacks.eng.srt
|
31.2 KB
|
RapidPatch Firmware Hotpatching for Real-Time Embedded Devices.eng.json
|
552.2 KB
|
RapidPatch Firmware Hotpatching for Real-Time Embedded Devices.eng.lrc
|
16.1 KB
|
RapidPatch Firmware Hotpatching for Real-Time Embedded Devices.eng.srt
|
13.7 KB
|
RapidPatch Firmware Hotpatching for Real-Time Embedded Devices.eng.text
|
10.2 KB
|
RapidPatch Firmware Hotpatching for Real-Time Embedded Devices.eng.tsv
|
13.4 KB
|
RapidPatch Firmware Hotpatching for Real-Time Embedded Devices.eng.txt
|
16.4 KB
|
RapidPatch Firmware Hotpatching for Real-Time Embedded Devices.eng.vtt
|
12.7 KB
|
RegexScalpel Regular Expression Denial of Service (ReDoS) Defense by.eng.srt
|
21.4 KB
|
Regulator Dynamic Analysis to Detect ReDoS.eng.srt
|
26.7 KB
|
RE-Mind a First Look Inside the Mind of a Reverse Engineer.eng.srt
|
20.4 KB
|
Rendering Contention Channel Made Practical in Web Browsers.eng.srt
|
15.6 KB
|
Repurposing Segmentation as a Practical LVI-NULL Mitigation in SGX.eng.json
|
641.7 KB
|
Repurposing Segmentation as a Practical LVI-NULL Mitigation in SGX.eng.lrc
|
19.5 KB
|
Repurposing Segmentation as a Practical LVI-NULL Mitigation in SGX.eng.srt
|
13.7 KB
|
Repurposing Segmentation as a Practical LVI-NULL Mitigation in SGX.eng.text
|
10.3 KB
|
Repurposing Segmentation as a Practical LVI-NULL Mitigation in SGX.eng.tsv
|
15.2 KB
|
Repurposing Segmentation as a Practical LVI-NULL Mitigation in SGX.eng.txt
|
19.8 KB
|
Repurposing Segmentation as a Practical LVI-NULL Mitigation in SGX.eng.vtt
|
12.7 KB
|
RETBLEED Arbitrary Speculative Code Execution with Return Instructions.eng.srt
|
21.6 KB
|
ReZone Disarming TrustZone with TEE Privilege Reduction.eng.srt
|
22.6 KB
|
Rolling Colors Adversarial Laser Exploits against Traffic Light Recognition.eng.srt
|
20.7 KB
|
SAID State-aware Defense Against Injection Attacks on In-vehicle Network.eng.json
|
452.8 KB
|
SAID State-aware Defense Against Injection Attacks on In-vehicle Network.eng.lrc
|
12.0 KB
|
SAID State-aware Defense Against Injection Attacks on In-vehicle Network.eng.srt
|
12.6 KB
|
SAID State-aware Defense Against Injection Attacks on In-vehicle Network.eng.text
|
9.3 KB
|
SAID State-aware Defense Against Injection Attacks on In-vehicle Network.eng.tsv
|
10.7 KB
|
SAID State-aware Defense Against Injection Attacks on In-vehicle Network.eng.txt
|
12.1 KB
|
SAID State-aware Defense Against Injection Attacks on In-vehicle Network.eng.vtt
|
11.7 KB
|
SAPIC protocol verifiers of the world, unite.eng.srt
|
25.8 KB
|
SARA Secure Android Remote Authorization.eng.json
|
670.1 KB
|
SARA Secure Android Remote Authorization.eng.lrc
|
20.4 KB
|
SARA Secure Android Remote Authorization.eng.srt
|
15.4 KB
|
SARA Secure Android Remote Authorization.eng.text
|
11.7 KB
|
SARA Secure Android Remote Authorization.eng.tsv
|
16.3 KB
|
SARA Secure Android Remote Authorization.eng.txt
|
20.7 KB
|
SARA Secure Android Remote Authorization.eng.vtt
|
14.3 KB
|
SCRAPS Scalable Collective Remote Attestation for Pub-Sub IoT Networks with.eng.srt
|
23.8 KB
|
SecSMT Securing SMT Processors against Contention-Based Covert Channels.eng.srt
|
18.9 KB
|
Secure Poisson Regression.eng.srt
|
28.6 KB
|
Security Analysis of Camera-LiDAR Fusion Against Black-Box Attacks.eng.srt
|
30.8 KB
|
Security and Privacy Perceptions of Third-Party Application Access for Google.eng.srt
|
19.5 KB
|
Security at the End of the Tunnel The Anatomy of VPN Mental Models Among.eng.srt
|
20.1 KB
|
Seeing is Living Rethinking the Security of Facial Liveness Verification.eng.srt
|
13.7 KB
|
Seeing the Forest for the Trees Understanding Security Hazards in the 3GPP.eng.json
|
450.6 KB
|
Seeing the Forest for the Trees Understanding Security Hazards in the 3GPP.eng.lrc
|
12.9 KB
|
Seeing the Forest for the Trees Understanding Security Hazards in the 3GPP.eng.srt
|
12.8 KB
|
Seeing the Forest for the Trees Understanding Security Hazards in the 3GPP.eng.text
|
9.0 KB
|
Seeing the Forest for the Trees Understanding Security Hazards in the 3GPP.eng.tsv
|
11.1 KB
|
Seeing the Forest for the Trees Understanding Security Hazards in the 3GPP.eng.txt
|
13.1 KB
|
Seeing the Forest for the Trees Understanding Security Hazards in the 3GPP.eng.vtt
|
11.7 KB
|
SGXFuzz Efficiently Synthesizing Nested Structures for SGX Enclave Fuzzing.eng.srt
|
15.9 KB
|
SGXLock Towards Efficiently Establishing Mutual Distrust Between Host.eng.srt
|
15.9 KB
|
Shuffle-based Private Set Union Faster and More Secure.eng.srt
|
16.6 KB
|
SIMC ML Inference Secure Against Malicious Clients at Semi-Honest Cost.eng.srt
|
32.6 KB
|
SkillDetective Automated Policy-Violation Detection of Voice Assistant.eng.json
|
661.7 KB
|
SkillDetective Automated Policy-Violation Detection of Voice Assistant.eng.lrc
|
16.3 KB
|
SkillDetective Automated Policy-Violation Detection of Voice Assistant.eng.srt
|
18.3 KB
|
SkillDetective Automated Policy-Violation Detection of Voice Assistant.eng.text
|
12.8 KB
|
SkillDetective Automated Policy-Violation Detection of Voice Assistant.eng.tsv
|
14.7 KB
|
SkillDetective Automated Policy-Violation Detection of Voice Assistant.eng.txt
|
16.4 KB
|
SkillDetective Automated Policy-Violation Detection of Voice Assistant.eng.vtt
|
16.8 KB
|
Smart Home Privacy Policies Demystified A Study of Availability, Content, and.eng.srt
|
27.2 KB
|
Spoki Unveiling a New Wave of Scanners through a Reactive Network Telescope.eng.srt
|
22.4 KB
|
Stalloris RPKI Downgrade Attack.eng.srt
|
20.3 KB
|
Stateful Greybox Fuzzing.eng.srt
|
20.6 KB
|
StateFuzz System Call-Based State-Aware Linux Driver Fuzzing.eng.srt
|
18.9 KB
|
Stick It to The Man Correcting for Non-Cooperative Behavior of Subjects in.eng.srt
|
21.1 KB
|
SWAPP A New Programmable Playground for Web Application Security.eng.srt
|
15.4 KB
|
SYMSAN Time and Space Efficient Concolic Execution via Dynamic Data-flow.eng.srt
|
15.8 KB
|
Synthetic Data - Anonymisation Groundhog Day.eng.srt
|
21.0 KB
|
SyzScope Revealing High-Risk Security Impacts of Fuzzer-Exposed Bugs in Linux.eng.srt
|
21.2 KB
|
Targeted Deanonymization via the Cache Side Channel Attacks and Defenses.eng.srt
|
19.0 KB
|
Teacher Model Fingerprinting Attacks Against Transfer Learning.eng.srt
|
19.8 KB
|
The Dangers of Human Touch Fingerprinting Browser Extensions through.eng.json
|
593.2 KB
|
The Dangers of Human Touch Fingerprinting Browser Extensions through.eng.lrc
|
17.2 KB
|
The Dangers of Human Touch Fingerprinting Browser Extensions through.eng.srt
|
15.3 KB
|
The Dangers of Human Touch Fingerprinting Browser Extensions through.eng.text
|
11.7 KB
|
The Dangers of Human Touch Fingerprinting Browser Extensions through.eng.tsv
|
14.7 KB
|
The Dangers of Human Touch Fingerprinting Browser Extensions through.eng.txt
|
17.5 KB
|
The Dangers of Human Touch Fingerprinting Browser Extensions through.eng.vtt
|
14.3 KB
|
The Same PIN, Just Longer - On the (In)Security of Upgrading PINs from 4 to.eng.json
|
517.2 KB
|
The Same PIN, Just Longer - On the (In)Security of Upgrading PINs from 4 to.eng.lrc
|
15.1 KB
|
The Same PIN, Just Longer - On the (In)Security of Upgrading PINs from 4 to.eng.srt
|
12.5 KB
|
The Same PIN, Just Longer - On the (In)Security of Upgrading PINs from 4 to.eng.text
|
9.7 KB
|
The Same PIN, Just Longer - On the (In)Security of Upgrading PINs from 4 to.eng.tsv
|
12.6 KB
|
The Same PIN, Just Longer - On the (In)Security of Upgrading PINs from 4 to.eng.txt
|
15.3 KB
|
The Same PIN, Just Longer - On the (In)Security of Upgrading PINs from 4 to.eng.vtt
|
11.7 KB
|
The Security Lottery Measuring Client-Side Web Security Inconsistencies.eng.srt
|
20.6 KB
|
TheHuzz Instruction Fuzzing of Processors Using Golden-Reference Models for.eng.srt
|
23.2 KB
|
Themis Accelerating the Detection of Route Origin Hijacking by Distinguishing.eng.srt
|
13.6 KB
|
They Look at Vulnerability and Use That to Abuse You.eng.srt
|
23.0 KB
|
Tightly Seal Your Sensitive Pointers with PACTight.eng.srt
|
24.4 KB
|
TLS-Anvil Adapting Combinatorial Testing for TLS Libraries.eng.json
|
580.8 KB
|
TLS-Anvil Adapting Combinatorial Testing for TLS Libraries.eng.lrc
|
17.5 KB
|
TLS-Anvil Adapting Combinatorial Testing for TLS Libraries.eng.srt
|
14.0 KB
|
TLS-Anvil Adapting Combinatorial Testing for TLS Libraries.eng.text
|
11.0 KB
|
TLS-Anvil Adapting Combinatorial Testing for TLS Libraries.eng.tsv
|
14.4 KB
|
TLS-Anvil Adapting Combinatorial Testing for TLS Libraries.eng.txt
|
17.7 KB
|
TLS-Anvil Adapting Combinatorial Testing for TLS Libraries.eng.vtt
|
13.1 KB
|
Total Eclipse of the Heart - Disrupting the InterPlanetary File System.eng.srt
|
22.3 KB
|
Towards Automatically Reverse Engineering Vehicle Diagnostic Protocols.eng.srt
|
20.5 KB
|
Towards More Robust Keyword Spotting for Voice Assistants.eng.srt
|
19.3 KB
|
Transferring Adversarial Robustness Through Robust Representation Matching.eng.srt
|
25.5 KB
|
Trust Dies in Darkness Shedding Light on Samsung's TrustZone Keymaster Design.eng.srt
|
28.7 KB
|
Twilight A Differentially Private Payment Channel Network.eng.srt
|
18.6 KB
|
Under the Hood of DANE Mismanagement in SMTP.eng.srt
|
26.2 KB
|
Understanding and Improving Usability of Data Dashboards for Simplified.eng.json
|
575.0 KB
|
Understanding and Improving Usability of Data Dashboards for Simplified.eng.lrc
|
15.9 KB
|
Understanding and Improving Usability of Data Dashboards for Simplified.eng.srt
|
15.9 KB
|
Understanding and Improving Usability of Data Dashboards for Simplified.eng.text
|
12.2 KB
|
Understanding and Improving Usability of Data Dashboards for Simplified.eng.tsv
|
14.2 KB
|
Understanding and Improving Usability of Data Dashboards for Simplified.eng.txt
|
16.1 KB
|
Understanding and Improving Usability of Data Dashboards for Simplified.eng.vtt
|
14.9 KB
|
Uninvited Guests Analyzing the Identity and Behavior of Certificate.eng.srt
|
15.9 KB
|
Unleash the Simulacrum Shifting Browser Realities for Robust.eng.srt
|
16.1 KB
|
USENIX Security '22- The Antrim County 2020 Election Incident An Independent Forensic Investigation.eng.srt
|
24.5 KB
|
USENIX Security '22- TLB - DR Enhancing TLB-based Attacks with TLB Desynchronized Reverse Engineering.eng.srt
|
20.2 KB
|
USENIX Security '22-Hertzbleed Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86.eng.json
|
707.3 KB
|
USENIX Security '22-Hertzbleed Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86.eng.lrc
|
19.7 KB
|
USENIX Security '22-Hertzbleed Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86.eng.srt
|
18.2 KB
|
USENIX Security '22-Hertzbleed Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86.eng.text
|
13.3 KB
|
USENIX Security '22-Hertzbleed Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86.eng.tsv
|
16.7 KB
|
USENIX Security '22-Hertzbleed Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86.eng.txt
|
20.0 KB
|
USENIX Security '22-Hertzbleed Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86.eng.vtt
|
16.8 KB
|
Using Trātṛ to tame Adversarial Synchronization.eng.srt
|
27.7 KB
|
V'CER Efficient Certificate Validation in Constrained Networks.eng.srt
|
20.8 KB
|
VerLoc Verifiable Localization in Decentralized Systems.eng.srt
|
22.4 KB
|
Watching the watchers bias and vulnerability in remote proctoring software.eng.srt
|
26.2 KB
|
Watching the Watchers Practical Video Identification Attack in LTE Networks.eng.srt
|
16.6 KB
|
Web Cache Deception Escalates.eng.srt
|
19.8 KB
|
WebGraph Capturing Advertising and Tracking Information Flows.eng.srt
|
23.6 KB
|
When Sally Met Trackers Web Tracking From the Users' Perspective.eng.srt
|
21.8 KB
|
Where to Recruit for Security Development Studies Comparing Six Software.eng.srt
|
22.8 KB
|
Who Are You (I Really Wanna Know) Detecting Audio DeepFakes Through Vocal.eng.srt
|
31.1 KB
|
Why Users (Don't) Use Password Managers at a Large Educational Institution.eng.srt
|
19.5 KB
|
XDRI Attacks - and - How to Enhance Resilience of Residential Routers.eng.srt
|
23.2 KB
|
Your Microphone Array Retains Your Identity A Robust Voice Liveness.eng.srt
|
20.7 KB
|
Zero-Knowledge Middleboxes.eng.json
|
539.3 KB
|
Zero-Knowledge Middleboxes.eng.lrc
|
14.1 KB
|
Zero-Knowledge Middleboxes.eng.srt
|
15.4 KB
|
Zero-Knowledge Middleboxes.eng.text
|
10.8 KB
|
Zero-Knowledge Middleboxes.eng.tsv
|
12.6 KB
|
Zero-Knowledge Middleboxes.eng.txt
|
14.3 KB
|
Zero-Knowledge Middleboxes.eng.vtt
|
14.2 KB
|
/USENIX Security 2023/
|
(M)WAIT for It Bridging the Gap between Microarchitectural and.mp4
|
7.4 MB
|
µFUZZ Redesign of Parallel Fuzzing using Microservice Architecture.mp4
|
9.0 MB
|
A Bug's Life Analyzing the Lifecycle and Mitigation Process of Content.mp4
|
9.7 MB
|
A comprehensive, formal and automated analysis of the EDHOC protocol.mp4
|
8.2 MB
|
A Data-free Backdoor Injection Approach in Neural Networks.mp4
|
10.4 MB
|
A Hybrid Alias Analysis and Its Application to Global Variable Protection.mp4
|
8.9 MB
|
A Large Scale Study of the Ethereum Arbitrage Ecosystem.mp4
|
11.7 MB
|
A Large-Scale Measurement of Website Login Policies.mp4
|
8.8 MB
|
A Mixed-Methods Study of Security Practices of Smart Contract Developers.mp4
|
10.9 MB
|
A Peek into the Metaverse Detecting 3D Model Clones in Mobile Games.mp4
|
11.7 MB
|
A Plot is Worth a Thousand Words Model Information Stealing Attacks via.mp4
|
11.3 MB
|
A Research Framework and Initial Study of Browser Security for the Visually.mp4
|
14.8 MB
|
A Study of China's Censorship and Its Evasion Through the Lens of Online.mp4
|
11.4 MB
|
A Study of Multi-Factor and Risk-Based Authentication Availability.mp4
|
8.0 MB
|
A Two-Decade Retrospective Analysis of a University's Vulnerability to.mp4
|
9.0 MB
|
A Verified Confidential Computing as a Service Framework for Privacy.mp4
|
7.0 MB
|
Abuse Vectors A Framework for Conceptualizing IoT-Enabled Interpersonal Abuse.mp4
|
9.1 MB
|
Access Denied Assessing Physical Risks to Internet Access Networks.mp4
|
11.5 MB
|
Account Security Interfaces Important, Unintuitive, and Untrustworth.mp4
|
9.3 MB
|
Account Verification on Social Media User Perceptions and Paid Enrollment.mp4
|
11.5 MB
|
ACFA Secure Runtime Auditing & Guaranteed Device Healing via Active.mp4
|
8.9 MB
|
ACon2 Adaptive Conformal Consensus for Provable Blockchain Oracles.mp4
|
8.2 MB
|
ACORN Input Validation for Secure Aggregation.mp4
|
12.0 MB
|
ACTOR Action-Guided Kernel Fuzzing.mp4
|
7.5 MB
|
Adversarial Training for Raw-Binary Malware Classifiers.mp4
|
10.0 MB
|
Aegis Mitigating Targeted Bit-flip Attacks against Deep Neural Networks.mp4
|
11.8 MB
|
AEX-Notify Thwarting Precise Single-Stepping Attacks through Interrupt.mp4
|
11.4 MB
|
AIFORE Smart Fuzzing Based on Automatic Input Format Reverse Engineering.mp4
|
10.9 MB
|
AIRS Explanation for Deep Reinforcement Learning based Security Applications.mp4
|
11.3 MB
|
AIRTAG Towards Automated Attack Investigation by Unsupervised Learning.mp4
|
7.8 MB
|
Aliasing Backdoor Attacks on Pre-trained Models.mp4
|
12.9 MB
|
All cops are broadcasting TETRA under scrutiny.mp4
|
21.5 MB
|
All of them claim to be the best - Multi-perspective study of VPN user.mp4
|
10.2 MB
|
AlphaEXP An Expert System for Identifying Security-Sensitive Kernel Objects.mp4
|
8.6 MB
|
An Efficient Design of Intelligent Network Data Plane.mp4
|
10.5 MB
|
An Empirical Study & Evaluation of Modern CAPTCHAs.mp4
|
8.8 MB
|
An Input-Agnostic Hierarchical Deep Learning Framework for Traffic.mp4
|
10.1 MB
|
Anatomy of a High-Profile Data Breach Dissecting the Aftermath of a Crypto.mp4
|
10.3 MB
|
AnimateDead Debloating Web Applications Using Concolic Execution.mp4
|
10.0 MB
|
Araña Discovering and Characterizing Password Guessing Attacks in Practice.mp4
|
9.2 MB
|
Are Consumers Willing to Pay for Security and Privacy of IoT Devices.mp4
|
10.9 MB
|
Are You Spying on Me Large-Scale Analysis on IoT Data Exposure through.mp4
|
11.2 MB
|
ARGUS A Framework for Staged Static Taint Analysis of GitHub Workflows and.mp4
|
11.0 MB
|
ARGUS Context-Based Detection of Stealthy IoT Infiltration Attacks.mp4
|
9.3 MB
|
ARI Attestation of Real-time Mission Execution Integrity.mp4
|
10.7 MB
|
ARMore Pushing Love Back Into Binaries.mp4
|
8.2 MB
|
Assessing Anonymity Techniques Employed in German Court Decisions A.mp4
|
9.5 MB
|
ASSET Robust Backdoor Data Detection Across a Multiplicity of Deep Learning.mp4
|
11.0 MB
|
Attacks are Forwarded Breaking the Isolation of MicroVM-based Containers.mp4
|
13.4 MB
|
Auditing Framework APIs via Inferred App-side Security Specifications.mp4
|
12.7 MB
|
Auditing Frameworks Need Resource Isolation A Systematic Study on the.mp4
|
10.0 MB
|
Auditory Eyesight Demystifying μs-Precision Keystroke Tracking Attacks on.mp4
|
12.9 MB
|
AURC Detecting Errors in Program Code and Documentation.mp4
|
9.1 MB
|
Authenticated private information retrieval.mp4
|
12.0 MB
|
AutoFR Automated Filter Rule Generation for Adblocking.mp4
|
11.1 MB
|
autofz Automated Fuzzer Composition at Runtime.mp4
|
10.7 MB
|
Automata-Guided Control-Flow-Sensitive Fuzz Driver Generation.mp4
|
12.2 MB
|
Automated Analysis of Protocols that use Authenticated Encryption How.mp4
|
9.3 MB
|
Automated Cookie Notice Analysis and Enforcement.mp4
|
10.9 MB
|
Automated Exploitable Heap Layout Generation for Heap Overflows Through.mp4
|
9.5 MB
|
Automated Inference on Financial Security of Ethereum Smart Contracts.mp4
|
8.7 MB
|
Automated Security Analysis of Exposure Notification Systems.mp4
|
8.7 MB
|
Back to School On the (In)Security of Academic VPNs.mp4
|
8.9 MB
|
BalanceProofs Maintainable Vector Commitments with Fast Aggregation.mp4
|
8.4 MB
|
BASECOMP A Comparative Analysis for Integrity Protection in Cellular.mp4
|
9.4 MB
|
Beyond The Gates An Empirical Analysis of HTTP-Managed Password Stealers.mp4
|
10.5 MB
|
Beyond Typosquatting An In-depth Look at Package Confusion.mp4
|
12.0 MB
|
Bilingual Problems Studying the Security Risks Incurred by Native.mp4
|
10.2 MB
|
Black-box Adversarial Example Attack towards FCG Based Android Malware.mp4
|
7.7 MB
|
Bleem Packet Sequence Oriented Fuzzing for Protocol Implementations.mp4
|
8.1 MB
|
BoKASAN Binary-only Kernel Address Sanitizer for Effective Kernel Fuzzing.mp4
|
9.4 MB
|
BotScreen Trust Everybody, but Cut the Aimbots Yourself.mp4
|
7.0 MB
|
Bug Hunters’ Perspectives on the Challenges and Benefits of the Bug Bounty.mp4
|
11.3 MB
|
BunnyHop Exploiting the Instruction Prefetcher.mp4
|
8.8 MB
|
Bypassing Tunnels Leaking VPN Client Traffic by Abusing Routing Tables.mp4
|
11.1 MB
|
CacheQL Quantifying and Localizing Cache Side-Channel Vulnerabilities in.mp4
|
11.9 MB
|
Calpric Inclusive and Fine-grain Labeling of Privacy Policies with.mp4
|
11.6 MB
|
Can a Deep Learning Model for One Architecture Be Used for Others.mp4
|
9.3 MB
|
CAPatch Physical Adversarial Patch against Image Captioning Systems.mp4
|
10.8 MB
|
Capstone A Capability-based Foundation for Trustless Secure Memory Access.mp4
|
10.6 MB
|
CarpetFuzz Automatic Program Option Constraint Extraction from.mp4
|
6.6 MB
|
Catch You and I Can Revealing Source Voiceprint Against Voice Conversion.mp4
|
9.1 MB
|
Checking Passwords on Leaky Computers A Side Channel Analysis of Chrome's.mp4
|
11.8 MB
|
Cheesecloth Zero-Knowledge Proofs of Real World Vulnerabilities.mp4
|
11.0 MB
|
Cipherfix Mitigating Ciphertext Side-Channel Attacks in Software.mp4
|
8.4 MB
|
CipherH Automated Detection of Ciphertext Side-channel Vulnerabilities in.mp4
|
8.8 MB
|
ClepsydraCache - Preventing Cache Attacks with Time-Based Evictions.mp4
|
9.6 MB
|
CodexLeaks Privacy Leaks from Code Generation Language Models in GitHub.mp4
|
11.5 MB
|
CollidePower Leaking Inaccessible Data with Software-based Power Side.mp4
|
10.2 MB
|
Combating Robocalls with Phone Virtual Assistant Mediated Interaction.mp4
|
12.8 MB
|
Confusum Contractum Confused Deputy Vulnerabilities in Ethereum Smart.mp4
|
11.0 MB
|
Content-Type multipart oracle - Tapping into Format Oracles in Email.mp4
|
10.0 MB
|
Continuous Learning for Android Malware Detection.mp4
|
9.9 MB
|
Controlled Data Races in Enclaves Attacks and Detection.mp4
|
8.3 MB
|
Cookie Crumbles Breaking and Fixing Web Session Integrity.mp4
|
11.2 MB
|
Credit Karma Understanding Security Implications of Exposed Cloud Services.mp4
|
11.9 MB
|
Cross Container Attacks The Bewildered eBPF on Clouds.mp4
|
10.6 MB
|
Cryptographic Administration for Secure Group Messaging.mp4
|
9.9 MB
|
Cryptographic Deniability A Multi-perspective Study of User Perceptions.mp4
|
7.5 MB
|
CSHER A System for Compact Storage with HE-Retrieval.mp4
|
12.2 MB
|
Curve Trees Practical and Transparent Zero-Knowledge Accumulators.mp4
|
6.7 MB
|
DAFL Directed Grey-box Fuzzing guided by Data Dependency.mp4
|
8.3 MB
|
DDRace Finding Concurrency UAF Vulnerabilities in Linux Drivers with.mp4
|
10.2 MB
|
Decompiling x86 Deep Neural Network Executables.mp4
|
11.0 MB
|
Defining - Broken - User Experiences and Remediation Tactics When Ad-Blocking.mp4
|
8.3 MB
|
Demystifying Pointer Authentication on Apple M1.mp4
|
10.4 MB
|
DeResistor Toward Detection-Resistant Probing for Evasion of Internet.mp4
|
10.9 MB
|
Design of Access Control Mechanisms in Systems-on-Chip with Formal.mp4
|
9.4 MB
|
Detecting and Handling IoT Interaction Threats in Multi-Platform Multi.mp4
|
16.6 MB
|
Detecting API Post-Handling Bugs Using Code and Description in Patches.mp4
|
11.9 MB
|
Detecting Multi-Step IAM Attacks in AWS Environments via Model Checking.mp4
|
10.0 MB
|
Detecting Union Type Confusion in Component Object Model.mp4
|
9.2 MB
|
Device Tracking via Linux’s New TCP Source Port Selection Algorithm.mp4
|
10.1 MB
|
Did the Shark Eat the Watchdog in the NTP Pool Deceiving the NTP Pool’s.mp4
|
9.9 MB
|
Differential Testing of Cross Deep Learning Framework APIs Revealing.mp4
|
9.0 MB
|
DiffSmooth Certifiably Robust Learning via Diffusion Models and Local.mp4
|
11.9 MB
|
Discovering Adversarial Driving Maneuvers against Autonomous Vehicles.mp4
|
10.5 MB
|
Distance-Aware Private Set Intersection.mp4
|
10.2 MB
|
DISTDET A Cost-Effective Distributed Cyber Threat Detection System.mp4
|
15.1 MB
|
Diving into Robocall Content with SnorCall.mp4
|
12.7 MB
|
Don’t be Dense Efficient Keyword PIR for Sparse Databases.mp4
|
8.6 MB
|
Downfall Exploiting Speculative Data Gathering.mp4
|
18.1 MB
|
Downgrading DNSSEC How to Exploit Crypto Agility for Hijacking Signed Zones.mp4
|
9.9 MB
|
DScope A Cloud-Native Internet Telescope.mp4
|
13.1 MB
|
Dubhe Succinct Zero-Knowledge Proofs for Standard AES and relate.mp4
|
8.9 MB
|
Duoram A Bandwidth-Efficient Distributed ORAM for 2- and 3-Party Computation.mp4
|
14.0 MB
|
DynSQL Stateful Fuzzing for Database Management Systems with Complex and.mp4
|
8.4 MB
|
Eavesdropping Mobile App Activity via Radio-Frequency Energy Harvesting.mp4
|
10.0 MB
|
Educators’ Perspectives of Using (or Not Using) Online Exam Proctoring.mp4
|
9.0 MB
|
Efficient 3PC for Binary Circuits with Application to Maliciously-Secure.mp4
|
7.7 MB
|
Efficient Unbalanced Private Set Intersection Cardinality and User-friendly.mp4
|
8.0 MB
|
Egg Hunt in Tesla Infotainment A First Look at Reverse Engineering of Qt.mp4
|
11.1 MB
|
ELASM Error-Latency-Aware Scale Management for Fully Homomorphic Encryption.mp4
|
10.0 MB
|
Employees Who Don’t Accept the Time Security Takes Are Not Aware Enough.mp4
|
11.1 MB
|
EnigMap External-Memory Oblivious Map for Secure Enclaves.mp4
|
9.4 MB
|
Eos Efficient Private Delegation of zkSNARK Provers.mp4
|
9.8 MB
|
Erebus Access Control for Augmented Reality Systems.mp4
|
10.3 MB
|
Ethical Frameworks and Computer Security Trolley Problems Foundations for.mp4
|
10.9 MB
|
Evading Provenance-Based ML Detectors with Adversarial System Action.mp4
|
10.8 MB
|
Every Signature is Broken On the Insecurity of Microsoft Office’s OOXML.mp4
|
9.8 MB
|
Every Vote Counts Ranking-Based Training of Federated Learning to Resist.mp4
|
10.7 MB
|
Examining Consumer Reviews to Understand Security and Privacy Issues in the.mp4
|
8.9 MB
|
Examining Power Dynamics and User Privacy in Smart Technology Use Among.mp4
|
7.0 MB
|
Exorcising - Wraith - Protecting LiDAR-based Object Detector in Automated.mp4
|
10.8 MB
|
Exploring Privacy and Incentives Considerations in Adoption of COVID-19.mp4
|
9.5 MB
|
Exploring Tenants' Preferences of Privacy Negotiation in Airbnb.mp4
|
8.9 MB
|
Exploring the Unknown DTLS Universe Analysis of the DTLS Server Ecosystem.mp4
|
10.3 MB
|
Exploring User Reactions and Mental Models Towards Perceptual Manipulation.mp4
|
9.0 MB
|
Extended Hell(o) A Comprehensive Large-Scale Study on Email.mp4
|
7.8 MB
|
Extending a Hand to Attackers Browser Privilege Escalation Attacks via.mp4
|
9.5 MB
|
Extracting Protocol Format as State Machine via Controlled Static Loop.mp4
|
9.8 MB
|
Extracting Training Data from Diffusion Models.mp4
|
10.3 MB
|
Eye-Shield Real-Time Protection of Mobile Device Screen Information from.mp4
|
11.2 MB
|
FABRID Flexible Attestation-Based Routing for Inter-Domain Networks.mp4
|
9.2 MB
|
FACE-AUDITOR Data Auditing in Facial Recognition Systems.mp4
|
8.3 MB
|
Fact-Saboteurs A Taxonomy of Evidence Manipulation Attacks against.mp4
|
8.9 MB
|
Fairness Properties of Face Recognition and Obfuscation Systems.mp4
|
8.0 MB
|
Fast IDentity Online with Anonymous Credentials (FIDO-AC).mp4
|
9.1 MB
|
FedVal Different good or different bad in federated learning.mp4
|
8.4 MB
|
Fine-grained Poisoning Attack to Local Differential Privacy Protocols for.mp4
|
14.8 MB
|
FirmSolo Enabling dynamic analysis of binary Linux-based IoT kernel modules.mp4
|
10.6 MB
|
FISHFUZZ Catch Deeper Bugs by Throwing Larger Nets.mp4
|
11.0 MB
|
FloatZone Accelerating Memory Error Detection using the Floating Point Unit.mp4
|
8.2 MB
|
Formal Analysis and Patching of BLE-SC Pairing.mp4
|
7.4 MB
|
Formal Analysis of Session-Handling in Secure Messaging Lifting Security.mp4
|
8.5 MB
|
Formal Analysis of SPDM Security Protocol and Data Model version 1.2.mp4
|
9.0 MB
|
Forming Faster Firmware Fuzzers.mp4
|
9.6 MB
|
Fourteen Years in the Life A Root Server’s Perspective on DNS Resolve.mp4
|
9.2 MB
|
Framing Frames Bypassing Wi-Fi Encryption by Manipulating Transmit Queues.mp4
|
10.8 MB
|
Freaky Leaky SMS Extracting User Locations by Analyzing SMS Timings.mp4
|
12.1 MB
|
FreeEagle Detecting Complex Neural Trojans in Data-Free Cases.mp4
|
9.5 MB
|
FuncTeller How Well Does eFPGA Hide Functionality.mp4
|
10.7 MB
|
Fuzz The Power Dual-role State Guided Black-box Fuzzing for USB Power.mp4
|
13.3 MB
|
FuzzJIT Oracle-Enhanced Fuzzing for JavaScript Engine JIT Compiler.mp4
|
8.7 MB
|
Fuzztruction Using Fault Injection-based Fuzzing to Leverage Implicit.mp4
|
9.3 MB
|
GAP Differentially Private Graph Neural Networks with Aggregation.mp4
|
7.4 MB
|
Generative Intrusion Detection and Prevention on Data Stream.mp4
|
10.2 MB
|
GigaDORAM Breaking the Billion Address Barrier.mp4
|
10.7 MB
|
Glaze Protecting Artists from Style Mimicry by Text-to-Image Models.mp4
|
12.6 MB
|
GLeeFuzz Fuzzing WebGL Through Error Message Guided Mutation.mp4
|
10.4 MB
|
Glimpse On-Demand PoW Light Client with Constant-Size Storage for DeFi.mp4
|
8.5 MB
|
GlitchHiker Uncovering Vulnerabilities of Image Signal Transmission with IEMI.mp4
|
10.3 MB
|
Glowing in the Dark Uncovering IPv6 Address Discovery and Scanning.mp4
|
9.1 MB
|
Going through the motions AR VR keylogging from user head motions.mp4
|
10.3 MB
|
Gradient Obfuscation Gives a False Sense of Security in Federated Learning.mp4
|
10.7 MB
|
Greenhouse Single-Service Rehosting of Linux-Based Firmware Binaries in.mp4
|
9.1 MB
|
Guarding Serverless Applications with Kalium.mp4
|
9.6 MB
|
Hard-label Black-box Universal Adversarial Patch Attack.mp4
|
9.5 MB
|
Hash Gone Bad Automated discovery of protocol attacks that exploit hash.mp4
|
8.5 MB
|
HashTag Hash-based Integrity Protection for Tagged Architectures.mp4
|
12.0 MB
|
HECO Fully Homomorphic Encryption Compiler.mp4
|
11.7 MB
|
Hey Kimya, Is My Smart Speaker Spying on Me Taking Control of Sensor.mp4
|
7.7 MB
|
Hidden Reality Caution, Your Hand Gesture Inputs in the Immersive Virtual.mp4
|
11.6 MB
|
Hiding in Plain Sight An Empirical Study of Web Application Abuse in Malware.mp4
|
10.3 MB
|
High Recovery with Fewer Injections Practical Binary Volumetric Injection.mp4
|
9.3 MB
|
Hoedur Embedded Firmware Fuzzing using Multi-Stream Inputs.mp4
|
10.3 MB
|
HOLMES Efficient Distribution Testing for Secure Collaborative Learning.mp4
|
8.6 MB
|
HOMESPY The Invisible Sniffer of Infrared Remote Control of Smart TVs.mp4
|
12.3 MB
|
HorusEye A Realtime IoT Malicious Traffic Detection Framework using.mp4
|
9.2 MB
|
Hot Pixels Frequency, Power, and Temperature Attacks on GPUs and Arm SoCs.mp4
|
15.0 MB
|
How Effective is Multiple-Vantage-Point Domain Control Validation.mp4
|
10.7 MB
|
How fast do you heal A taxonomy for post-compromise security in.mp4
|
10.0 MB
|
How Library IT Staff Navigate Privacy and Security Challenges and.mp4
|
9.0 MB
|
How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic.mp4
|
9.5 MB
|
How to Bind Anonymous Credentials to Humans.mp4
|
8.8 MB
|
How to Cover up Anomalous Accesses to Electronic Health Records.mp4
|
10.9 MB
|
Humans vs. Machines in Malware Classification.mp4
|
13.6 MB
|
HyPFuzz Formal-Assisted Processor Fuzzing.mp4
|
9.4 MB
|
I wouldn't want my unsafe code to run my pacemaker An Interview Study on.mp4
|
8.9 MB
|
ICSPatch Automated Vulnerability Localization and Non-Intrusive.mp4
|
8.7 MB
|
If I could do this, I feel anyone could - The Design and Evaluation.mp4
|
9.4 MB
|
If sighted people know, I should be able to know Privacy Perceptions of.mp4
|
8.4 MB
|
I'm going to trust this until it burns me - Parents' Privacy Concerns and.mp4
|
11.5 MB
|
Improving Logging to Reduce Permission Over-Granting Mistakes.mp4
|
12.5 MB
|
Improving Real-world Password Guessing Attacks via Bi-directional Transformers.mp4
|
8.0 MB
|
In the Quest to Protect Users from Side-Channel Attacks - A User-Centred.mp4
|
10.2 MB
|
Inception Exposing New Attack Surfaces with Training in Transient Execution.mp4
|
11.3 MB
|
Inducing Authentication Failures to Bypass Credit Card PINs.mp4
|
14.3 MB
|
Inductive Graph Unlearning.mp4
|
10.9 MB
|
InfinityGauntlet Expose Smartphone Fingerprint Authentication to.mp4
|
13.1 MB
|
Instructions Unclear Undefined Behaviour in Cellular Network Specifications.mp4
|
9.0 MB
|
Intender Fuzzing Intent-Based Networking with Intent-State Transition.mp4
|
11.1 MB
|
Internet Service Providers' and Individuals' Attitudes, Barriers, and.mp4
|
9.2 MB
|
Investigating Verification Behavior and Perceptions of Visual Digital.mp4
|
9.2 MB
|
Is Your Wallet Snitching On You An Analysis on the Privacy Implications.mp4
|
8.1 MB
|
Isolated and Exhausted Attacking Operating Systems via Site Isolation in.mp4
|
9.0 MB
|
It's all in your head(set) Side-channel attacks on AR VR systems.mp4
|
10.1 MB
|
It's the Equivalent of Feeling Like You're in Jail Lessons from Firsthand.mp4
|
9.4 MB
|
IvySyn Automated Vulnerability Discovery in Deep Learning Frameworks.mp4
|
8.2 MB
|
Jinn Hijacking Safe Programs with Trojans.mp4
|
10.4 MB
|
Keep Your Friends Close, but Your Routeservers Closer Insights into RPK.mp4
|
9.4 MB
|
KENKU Towards Efficient and Stealthy Black-box Adversarial Attacks against.mp4
|
12.6 MB
|
KextFuzz Fuzzing macOS Kernel EXTensions on Apple Silicon via Exploiting.mp4
|
8.4 MB
|
Know Your Cybercriminal Evaluating Attacker Preferences by Measuring.mp4
|
13.0 MB
|
Knowledge Expansion and Counterfactual Interaction for Reference-Based.mp4
|
9.6 MB
|
Lalaine Measuring and Characterizing Non-Compliance of Apple Privacy Labels.mp4
|
9.2 MB
|
Learning Normality is Enough A Software-based Mitigation against Inaudible.mp4
|
11.7 MB
|
Lessons Lost Incident Response in the Age of Cyber Insurance and Breach.mp4
|
12.0 MB
|
LibScan Towards More Precise Third-Party Library Identification for.mp4
|
13.3 MB
|
LightThief Your Optical Communication Information is Stolen behind the Wall.mp4
|
9.5 MB
|
Linear Private Set Union from Multi-Query Reverse Private Membership Test.mp4
|
10.3 MB
|
LocIn Inferring Semantic Location from Spatial Maps in Mixed Reality.mp4
|
11.2 MB
|
Log It’s Big, It’s Heavy, It’s Filled with Personal Data Measuring the.mp4
|
14.0 MB
|
Long Live The Honey Badger Robust Asynchronous DPSS and its Applications.mp4
|
12.0 MB
|
Lost at C A User Study on the Security Implications of Large Language Model.mp4
|
9.0 MB
|
Lost in Conversion Exploit Data Structure Conversion with Attribute Loss.mp4
|
11.2 MB
|
Machine-checking Multi-Round Proofs of Shuffle Terelius-Wikstrom and.mp4
|
8.7 MB
|
McFIL Model Counting Functionality-Inherent Leakage.mp4
|
13.8 MB
|
Measuring Up to (Reasonable) Consumer Expectations Providing an Empirical.mp4
|
8.8 MB
|
Medusa Attack Exploring Security Hazards of In-App QR Code Scanning.mp4
|
10.8 MB
|
Meta-Sift How to Sift Out a Clean Subset in the Presence of Data Poisoning.mp4
|
11.6 MB
|
Millions of people are watching you Understanding the Digital-Safety.mp4
|
9.5 MB
|
MINER A Hybrid Data-Driven Approach for REST API Fuzzing.mp4
|
11.1 MB
|
Minimalist Semi-automated Debloating of PHP Web Applications through.mp4
|
7.7 MB
|
Mitigating Security Risks in Linux with KLAUS A Method for Evaluating.mp4
|
8.9 MB
|
Mixed Signals Analyzing Ground-Truth Data on the Users and Economics.mp4
|
9.3 MB
|
MobileAtlas Geographically Decoupled Measurements in Cellular Networks for.mp4
|
9.7 MB
|
MorFuzz Fuzzing Processor via Runtime Instruction Morphing enhanced.mp4
|
9.7 MB
|
MTSan A Feasible and Practical Memory Sanitizer for Fuzzing COTS Binaries.mp4
|
12.2 MB
|
Multi-Factor Key Derivation Function (MFKDF) for Fast, Flexible, Secure, &.mp4
|
8.2 MB
|
Multiview Finding Blind Spots in Access-Deny Issues Diagnosis.mp4
|
10.0 MB
|
My Privacy for their Security - Employees' Privacy Perspectives and.mp4
|
10.3 MB
|
NAUTILUS Automated RESTful API Vulnerability Detection.mp4
|
11.9 MB
|
Near-Optimal Oblivious Key-Value Stores for Efficient PSI, PSU and Volume.mp4
|
8.2 MB
|
Near-Ultrasound Inaudible Trojan (Nuit) Exploiting Your Speaker to Attack.mp4
|
10.9 MB
|
Network Detection of Interactive SSH Impostors Using Deep Learning.mp4
|
8.0 MB
|
Network Responses to Russia's Invasion of Ukraine in 2022 A Cautionary Tale.mp4
|
13.3 MB
|
NeuroPots Realtime Proactive Defense against Bit-Flip Attacks in Neural.mp4
|
12.6 MB
|
No Linux, No Problem Fast and Correct Windows Binary Fuzzing via.mp4
|
8.3 MB
|
No more Reviewer #2 Subverting Automatic Paper-Reviewer Assignment using.mp4
|
9.6 MB
|
No Single Silver Bullet Measuring the Accuracy of Password Strength Meters.mp4
|
11.7 MB
|
Not All Data are Created Equal Data and Pointer Prioritization for Scalable.mp4
|
10.0 MB
|
Notice the Imposter A Study on User Tag Spoofing Attack in Mobile Apps.mp4
|
10.3 MB
|
NRDelegationAttack Complexity DDoS attack on DNS Recursive Resolvers.mp4
|
11.7 MB
|
NVLeak Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems.mp4
|
9.6 MB
|
On the Feasibility of Malware Unpacking via Hardware-assisted Loop Profiling.mp4
|
11.5 MB
|
On the Security Risks of Knowledge Graph Reasoning.mp4
|
8.6 MB
|
One Server for the Price of Two Simple and Fast Single-Server Private.mp4
|
10.2 MB
|
One Size Does not Fit All Quantifying the Risk of Malicious App Encounters.mp4
|
9.9 MB
|
One Size Does Not Fit All Uncovering and Exploiting Cross Platform.mp4
|
9.8 MB
|
Oops.. I Glitched It Again How to Multi-Glitch the Glitching-Protections.mp4
|
9.2 MB
|
Othered, Silenced and Scapegoated Understanding the Situated Security of.mp4
|
9.1 MB
|
Panda Security Analysis of Algorand Smart Contracts.mp4
|
9.0 MB
|
Pass2Edit A Multi-Step Generative Model for Guessing Edited Passwords.mp4
|
8.8 MB
|
Password Guessing Using Random Forest.mp4
|
8.5 MB
|
PatchVerif Discovering Faulty Patches in Robotic Vehicles.mp4
|
12.0 MB
|
PATROL Provable Defense against Adversarial Policy in Two-player Games.mp4
|
13.5 MB
|
PCAT Functionality and Data Stealing from Split Learning by Pseudo-Client.mp4
|
9.7 MB
|
PELICAN Exploiting Backdoors of Naturally Trained Deep Learning Models In.mp4
|
11.3 MB
|
Person Re-identification in 3D Space A WiFi Vision-based Approach.mp4
|
9.5 MB
|
PET Prevent Discovered Errors from Being Triggered in the Linux Kerne.mp4
|
12.3 MB
|
PhyAuth Physical-Layer Message Authentication for ZigBee Networks.mp4
|
10.7 MB
|
Place Your Locks Well Understanding and Detecting Lock Misuse Bugs.mp4
|
11.3 MB
|
POLICYCOMP Counterpart Comparison of Privacy Policies Uncovers.mp4
|
10.2 MB
|
PoliGraph Automated Privacy Policy Analysis using Knowledge Graphs.mp4
|
12.4 MB
|
PolyFuzz Holistic Greybox Fuzzing of Multi-Language Systems.mp4
|
9.0 MB
|
Pool-Party Exploiting Browser Resource Pools for Web Tracking.mp4
|
7.6 MB
|
PORE Provably Robust Recommender Systems against Data Poisoning Attacks.mp4
|
8.6 MB
|
Powering for Privacy Improving User Trust in Smart Speaker Microphones with.mp4
|
10.4 MB
|
Powering Privacy On the Energy Demand and Feasibility of Anonymity.mp4
|
10.8 MB
|
Practical Asynchronous High-threshold Distributed Key Generation and.mp4
|
12.5 MB
|
Precise and Generalized Robustness Certification for Neural Networks.mp4
|
10.6 MB
|
Prime Match A Privacy-Preserving Inventory Matching System.mp4
|
11.7 MB
|
Private Proof-of-Stake Blockchains using Differentially-Private Stake.mp4
|
10.2 MB
|
PrivateFL Accurate, Differentially Private Federated Learning via.mp4
|
10.9 MB
|
PrivGraph Differentially Private Graph Data Publication by Exploiting.mp4
|
8.2 MB
|
PrivTrace Differentially Private Trajectory Synthesis by Adaptive Markov.mp4
|
7.9 MB
|
Problematic Advertising and its Disparate Exposure on Facebook.mp4
|
10.8 MB
|
PROGRAPHER An Anomaly Detection System based on Provenance Graph Embedding.mp4
|
12.4 MB
|
ProSpeCT Provably Secure Speculation for the Constant-Time Policy.mp4
|
10.3 MB
|
PROVIDENCE a Flexible Round-by-Round Risk-Limiting Audit.mp4
|
8.1 MB
|
Proxy Hunting Understanding and Characterizing Proxy-based Upgradeable.mp4
|
15.0 MB
|
Pspray Timing Side-Channel based Linux Kernel Heap Exploitation Technique.mp4
|
9.0 MB
|
PTW Pivotal Tuning Watermarking for Pre-Trained Image Generators.mp4
|
9.7 MB
|
PUMM Preventing Use-After-Free Using Execution Unit Partitioning.mp4
|
9.4 MB
|
Pushed by Accident A Mixed-Methods Study on Strategies of Handling Secret.mp4
|
10.2 MB
|
QFA2SR Query-Free Adversarial Transfer Attacks to Speaker Recognition Systems.mp4
|
9.7 MB
|
Reassembly is Hard A Reflection on Challenges and Strategies.mp4
|
12.3 MB
|
Remote Attacks on Speech Recognition Systems Using Sound from Power Supply.mp4
|
12.0 MB
|
Remote Code Execution from SSTI in the Sandbox Automatically Detecting and.mp4
|
10.4 MB
|
Remote Direct Memory Introspection.mp4
|
7.7 MB
|
Rethinking System Audit Architectures for High Event Coverage and.mp4
|
7.9 MB
|
Rethinking White-Box Watermarks on Deep Learning Models under Neural.mp4
|
8.4 MB
|
Reusable Enclaves for Confidential Serverless Computing.mp4
|
12.5 MB
|
ReUSB Replay-Guided USB Driver Fuzzing.mp4
|
12.3 MB
|
Reversing, Breaking, and Fixing the French Legislative Election E-Voting.mp4
|
11.2 MB
|
RIDAS Real-time identification of attack sources on controller area networks.mp4
|
9.8 MB
|
RøB Ransomware over Modern Web Browsers.mp4
|
11.9 MB
|
Rods with Laser Beams Understanding Browser Fingerprinting on Phishing Pages.mp4
|
6.8 MB
|
Rosetta Enabling Robust TLS Encrypted Traffic Classification in Diverse.mp4
|
12.4 MB
|
SAFER Efficient and Error-Tolerant Binary Instrumentation.mp4
|
9.1 MB
|
SandDriller A Fully-Automated Approach for Testing Language-Based.mp4
|
11.4 MB
|
SCARF - A Low-Latency Block Cipher for Secure Cache-Randomization.mp4
|
8.9 MB
|
Secure Floating-Point Training.mp4
|
8.4 MB
|
Security Analysis of MongoDB Queryable Encryption.mp4
|
8.9 MB
|
Security and Privacy Failures in Popular 2FA Apps.mp4
|
10.2 MB
|
Security is not my field, I’m a stats guy A Qualitative Root Cause.mp4
|
10.8 MB
|
SHELTER Extending Arm CCA with Isolation in User Space.mp4
|
11.2 MB
|
Sherlock on Specs Building LTE Conformance Tests through Automated Reasoning.mp4
|
8.5 MB
|
Side-Channel Attacks on Optane Persistent Memory.mp4
|
9.0 MB
|
Silent Bugs Matter A Study of Compiler-Introduced Security Bugs.mp4
|
9.8 MB
|
Silent Spring Prototype Pollution Leads to Remote Code Execution in Node.js.mp4
|
11.0 MB
|
SMACK Semantically Meaningful Adversarial Audio Attack.mp4
|
11.2 MB
|
Smart Learning to Find Dumb Contracts.mp4
|
12.4 MB
|
Snapping Snap Sync Practical Attacks on Go Ethereum Synchronising Nodes.mp4
|
10.0 MB
|
Sneaky Spy Devices and Defective Detectors The Ecosystem of Intimate.mp4
|
10.2 MB
|
Sparsity Brings Vulnerabilities Exploring New Metrics in Backdoor Attacks.mp4
|
12.0 MB
|
SpectrEM Exploiting Electromagnetic Emanations During Transient Execution.mp4
|
7.8 MB
|
Speculation at Fault Modeling and Testing Microarchitectural Leakage of.mp4
|
7.9 MB
|
Spying through Your Voice Assistants Realistic Voice Command Fingerprinting.mp4
|
10.1 MB
|
SQIRL Grey-Box Detection of SQL Injection Vulnerabilities Using.mp4
|
12.1 MB
|
Squint Hard Enough Attacking Perceptual Hashing with Adversarial Machine.mp4
|
13.8 MB
|
Squirrel A Scalable Secure Two-Party Computation Framework for Training.mp4
|
13.6 MB
|
Strategies and Vulnerabilities of Participants in Venezuelan Influence.mp4
|
10.8 MB
|
Subverting Website Fingerprinting Defenses with Robust Traffic Representation.mp4
|
9.9 MB
|
Synchronization Storage Channels (S2C) Timer-less Cache Side-Channel.mp4
|
8.3 MB
|
Systematic Assessment of Fuzzers using Mutation Analysis.mp4
|
7.4 MB
|
TAP Transparent and Privacy-Preserving Data Services.mp4
|
11.6 MB
|
Temporal CDN-Convex Lens A CDN-Assisted Practical Pulsing DDoS Attack.mp4
|
12.1 MB
|
That Person Moves Like A Car Misclassification Attack Detection fo.mp4
|
11.6 MB
|
The Blockchain Imitation Game.mp4
|
8.5 MB
|
The Case for Learned Provenance Graph Storage Systems.mp4
|
7.1 MB
|
The Digital-Safety Risks of Financial Technologies for Survivors of.mp4
|
9.1 MB
|
The Gates of Time Improving Cache Attacks with Transient Execution.mp4
|
11.3 MB
|
The Impostor Among US(B) Off-Path Injection Attacks on USB Communications.mp4
|
9.6 MB
|
The Maginot Line Attacking the Boundary of DNS Caching Protection.mp4
|
12.1 MB
|
The Most Dangerous Codec in the World Finding and Exploiting.mp4
|
11.0 MB
|
The OK Is Not Enough A Large Scale Study of Consent Dialogs in Smartphone.mp4
|
9.9 MB
|
The Role of Professional Product Reviewers in Evaluating Security and Privacy.mp4
|
9.1 MB
|
The Space of Adversarial Strategies.mp4
|
11.1 MB
|
The Writing on the Wall and 3D Digital Twins Personal Information in.mp4
|
8.4 MB
|
Three Lessons From Threema Analysis of a Secure Messenger.mp4
|
9.6 MB
|
Tight Auditing of Differentially Private Machine Learning.mp4
|
11.9 MB
|
Time for Change How Clocks Break UWB Secure Ranging.mp4
|
9.0 MB
|
Timeless Timing Attacks and Preload Defenses in Tor's DNS Cache.mp4
|
10.9 MB
|
To Cloud or not to Cloud A Qualitative Study on Self-Hosters' Motivation.mp4
|
8.6 MB
|
To Do This Properly, You Need More Resources The Hidden Costs of.mp4
|
10.1 MB
|
Token Spammers, Rug Pulls, and Sniper Bots An Analysis of the Ecosystem.mp4
|
8.0 MB
|
Towards a General Video-based Keystroke Inference Attack.mp4
|
9.5 MB
|
Towards A Proactive ML Approach for Detecting Backdoor Poison Samples.mp4
|
13.5 MB
|
Towards Targeted Obfuscation of Adversarial Unsafe Images using.mp4
|
8.4 MB
|
TPatch A Triggered Physical Adversarial Patch.mp4
|
11.6 MB
|
TreeSync Authenticated Group Management for Messaging Layer Security.mp4
|
9.3 MB
|
TRIDENT Towards Detecting and Mitigating Web-based Social Engineering Attacks.mp4
|
10.8 MB
|
Trojan Source Invisible Vulnerabilities.mp4
|
10.5 MB
|
TRust A Compilation Framework for In-process Isolation to Protect Safe.mp4
|
10.6 MB
|
Tubes Among Us Analog Attack on Automatic Speaker Identification.mp4
|
6.4 MB
|
TVA A multi-party computation system for secure and expressive time series.mp4
|
7.9 MB
|
Two Sides of the Shield Understanding Protective DNS adoption factors.mp4
|
13.0 MB
|
Two-in-One A Model Hijacking Attack Against Text Generation Models.mp4
|
10.1 MB
|
UCBlocker Unwanted Call Blocking Using Anonymous Authentication.mp4
|
10.7 MB
|
Ultimate SLH Taking Speculative Load Hardening to the Next Level.mp4
|
8.8 MB
|
Uncontained Uncovering Container Confusion in the Linux Kernel.mp4
|
6.9 MB
|
Understand Users' Privacy Perception and Decision of V2X Communication in.mp4
|
8.6 MB
|
Un-Equal Online Safety - A Gender Analysis of Security and Privacy.mp4
|
10.6 MB
|
UnGANable Defending Against GAN-based Face Manipulation.mp4
|
9.2 MB
|
Union under Duress Understanding Hazards of Duplicate Resource Mismediation.mp4
|
10.1 MB
|
Unique Identification of 50,000 Virtual Reality Users from Head & Hand.mp4
|
8.3 MB
|
URET Universal Robustness Evaluation Toolkit (for Evasion).mp4
|
11.0 MB
|
User Awareness and Behaviors Concerning Encrypted DNS Settings in Web Browsers.mp4
|
9.5 MB
|
UVSCAN Detecting Third-Party Component Usage Violations in IoT Firmware.mp4
|
11.6 MB
|
V1SCAN Discovering 1-day Vulnerabilities in Reused C C Open-source.mp4
|
9.7 MB
|
V-Cloak Intelligibility-, Naturalness- & Timbre-Preserving Real-Time Voice.mp4
|
9.5 MB
|
VeriZexe Decentralized Private Computation with Universal Setup.mp4
|
13.0 MB
|
VILLAIN Backdoor Attacks Against Vertical Split Learning.mp4
|
8.4 MB
|
VIPER Spotting Syscall-Guard Variables for Data-Only Attacks.mp4
|
8.3 MB
|
VulChecker Graph-based Vulnerability Localization in Source Code.mp4
|
14.4 MB
|
Watch your Watch Inferring Personality Traits from Wearable Activity Trackers.mp4
|
9.9 MB
|
WaterBear Practical Asynchronous BFT Matching Security Guarantees of.mp4
|
11.5 MB
|
We Really Need to Talk About Session Tickets A Large-Scale Analysis of.mp4
|
9.1 MB
|
What Are the Chances Explaining the Epsilon Parameter in Differential Privacy.mp4
|
9.9 MB
|
WHIP Improving Static Vulnerability Detection in Web Application by.mp4
|
9.7 MB
|
Wink Deniable Secure Messaging.mp4
|
10.3 MB
|
Work-From-Home and COVID-19 Trajectories of Endpoint Security Management.mp4
|
11.6 MB
|
X-Adv Physical Adversarial Object Attacks against X-ray Prohibited Item.mp4
|
11.0 MB
|
XCheck Verifying Integrity of 3D Printed Patient-Specific Devices via.mp4
|
8.5 MB
|
xNIDS Explaining Deep Learning-based Network Intrusion Detection Systems.mp4
|
9.2 MB
|
You Can't See Me Physical Removal Attacks on LiDAR-based Autonomous.mp4
|
13.4 MB
|
Your Exploit is Mine Instantly Synthesizing Counterattack Smart Contract.mp4
|
11.9 MB
|
You've Got Report Measurement and Security Implications of DMARC Reporting.mp4
|
9.0 MB
|
ZBCAN A Zero-Byte CAN Defense System.mp4
|
10.5 MB
|
zkSaaS Zero-Knowledge SNARKs as a Service.mp4
|
11.6 MB
|
/.../USENIX Security 2023 captions/
|
(M)WAIT for It Bridging the Gap between Microarchitectural and.eng.srt
|
17.7 KB
|
µFUZZ Redesign of Parallel Fuzzing using Microservice Architecture.eng.srt
|
17.8 KB
|
A Bug's Life Analyzing the Lifecycle and Mitigation Process of Content.eng.srt
|
19.2 KB
|
A comprehensive, formal and automated analysis of the EDHOC protocol.eng.srt
|
19.3 KB
|
A Data-free Backdoor Injection Approach in Neural Networks.eng.srt
|
15.0 KB
|
A Hybrid Alias Analysis and Its Application to Global Variable Protection.eng.srt
|
18.1 KB
|
A Large Scale Study of the Ethereum Arbitrage Ecosystem.eng.srt
|
25.7 KB
|
A Large-Scale Measurement of Website Login Policies.eng.srt
|
22.5 KB
|
A Mixed-Methods Study of Security Practices of Smart Contract Developers.eng.srt
|
21.1 KB
|
A Peek into the Metaverse Detecting 3D Model Clones in Mobile Games.eng.srt
|
19.0 KB
|
A Plot is Worth a Thousand Words Model Information Stealing Attacks via.eng.srt
|
20.4 KB
|
A Research Framework and Initial Study of Browser Security for the Visually.eng.srt
|
24.1 KB
|
A Study of China's Censorship and Its Evasion Through the Lens of Online.eng.srt
|
20.2 KB
|
A Study of Multi-Factor and Risk-Based Authentication Availability.eng.srt
|
26.1 KB
|
A Two-Decade Retrospective Analysis of a University's Vulnerability to.eng.srt
|
22.8 KB
|
A Verified Confidential Computing as a Service Framework for Privacy.eng.srt
|
14.8 KB
|
Abuse Vectors A Framework for Conceptualizing IoT-Enabled Interpersonal Abuse.eng.srt
|
20.8 KB
|
Access Denied Assessing Physical Risks to Internet Access Networks.eng.srt
|
22.2 KB
|
Account Security Interfaces Important, Unintuitive, and Untrustworth.eng.srt
|
22.1 KB
|
Account Verification on Social Media User Perceptions and Paid Enrollment.eng.srt
|
23.8 KB
|
ACFA Secure Runtime Auditing & Guaranteed Device Healing via Active.eng.srt
|
23.8 KB
|
ACon2 Adaptive Conformal Consensus for Provable Blockchain Oracles.eng.srt
|
18.5 KB
|
ACORN Input Validation for Secure Aggregation.eng.srt
|
25.3 KB
|
ACTOR Action-Guided Kernel Fuzzing.eng.srt
|
20.7 KB
|
Adversarial Training for Raw-Binary Malware Classifiers.eng.srt
|
26.2 KB
|
Aegis Mitigating Targeted Bit-flip Attacks against Deep Neural Networks.eng.srt
|
17.8 KB
|
AEX-Notify Thwarting Precise Single-Stepping Attacks through Interrupt.eng.srt
|
25.3 KB
|
AIFORE Smart Fuzzing Based on Automatic Input Format Reverse Engineering.eng.srt
|
19.0 KB
|
AIRS Explanation for Deep Reinforcement Learning based Security Applications.eng.srt
|
23.3 KB
|
AIRTAG Towards Automated Attack Investigation by Unsupervised Learning.eng.srt
|
15.5 KB
|
Aliasing Backdoor Attacks on Pre-trained Models.eng.srt
|
20.0 KB
|
All cops are broadcasting TETRA under scrutiny.eng.srt
|
24.3 KB
|
All of them claim to be the best - Multi-perspective study of VPN user.eng.srt
|
24.0 KB
|
AlphaEXP An Expert System for Identifying Security-Sensitive Kernel Objects.eng.srt
|
14.4 KB
|
An Efficient Design of Intelligent Network Data Plane.eng.srt
|
17.8 KB
|
An Empirical Study & Evaluation of Modern CAPTCHAs.eng.srt
|
16.6 KB
|
An Input-Agnostic Hierarchical Deep Learning Framework for Traffic.eng.srt
|
19.3 KB
|
Anatomy of a High-Profile Data Breach Dissecting the Aftermath of a Crypto.eng.srt
|
22.3 KB
|
AnimateDead Debloating Web Applications Using Concolic Execution.eng.srt
|
24.4 KB
|
Araña Discovering and Characterizing Password Guessing Attacks in Practice.eng.srt
|
20.9 KB
|
Are Consumers Willing to Pay for Security and Privacy of IoT Devices.eng.srt
|
21.3 KB
|
Are You Spying on Me Large-Scale Analysis on IoT Data Exposure through.eng.srt
|
20.7 KB
|
ARGUS A Framework for Staged Static Taint Analysis of GitHub Workflows and.eng.srt
|
24.0 KB
|
ARGUS Context-Based Detection of Stealthy IoT Infiltration Attacks.eng.srt
|
24.7 KB
|
ARI Attestation of Real-time Mission Execution Integrity.eng.srt
|
19.0 KB
|
ARMore Pushing Love Back Into Binaries.eng.srt
|
19.1 KB
|
Assessing Anonymity Techniques Employed in German Court Decisions A.eng.srt
|
20.4 KB
|
ASSET Robust Backdoor Data Detection Across a Multiplicity of Deep Learning.eng.json
|
575.5 KB
|
ASSET Robust Backdoor Data Detection Across a Multiplicity of Deep Learning.eng.lrc
|
16.2 KB
|
ASSET Robust Backdoor Data Detection Across a Multiplicity of Deep Learning.eng.srt
|
15.2 KB
|
ASSET Robust Backdoor Data Detection Across a Multiplicity of Deep Learning.eng.text
|
11.7 KB
|
ASSET Robust Backdoor Data Detection Across a Multiplicity of Deep Learning.eng.tsv
|
14.1 KB
|
ASSET Robust Backdoor Data Detection Across a Multiplicity of Deep Learning.eng.txt
|
16.4 KB
|
ASSET Robust Backdoor Data Detection Across a Multiplicity of Deep Learning.eng.vtt
|
14.2 KB
|
ASSET Robust Backdoor Data Detection Across a Multiplicity of Deep Learningeng.srt
|
23.5 KB
|
Attacks are Forwarded Breaking the Isolation of MicroVM-based Containers.eng.srt
|
23.0 KB
|
Auditing Framework APIs via Inferred App-side Security Specifications.eng.srt
|
21.8 KB
|
Auditing Frameworks Need Resource Isolation A Systematic Study on the.eng.srt
|
15.4 KB
|
Auditory Eyesight Demystifying μs-Precision Keystroke Tracking Attacks on.eng.srt
|
16.9 KB
|
AURC Detecting Errors in Program Code and Documentation.eng.srt
|
15.5 KB
|
Authenticated private information retrieval.eng.srt
|
21.2 KB
|
AutoFR Automated Filter Rule Generation for Adblocking.eng.srt
|
27.5 KB
|
autofz Automated Fuzzer Composition at Runtime.eng.json
|
447.5 KB
|
autofz Automated Fuzzer Composition at Runtime.eng.lrc
|
12.2 KB
|
autofz Automated Fuzzer Composition at Runtime.eng.srt
|
12.6 KB
|
autofz Automated Fuzzer Composition at Runtime.eng.text
|
8.7 KB
|
autofz Automated Fuzzer Composition at Runtime.eng.tsv
|
10.6 KB
|
autofz Automated Fuzzer Composition at Runtime.eng.txt
|
12.4 KB
|
autofz Automated Fuzzer Composition at Runtime.eng.vtt
|
11.6 KB
|
Automata-Guided Control-Flow-Sensitive Fuzz Driver Generation.eng.srt
|
21.7 KB
|
Automated Analysis of Protocols that use Authenticated Encryption How.eng.srt
|
17.6 KB
|
Automated Cookie Notice Analysis and Enforcement.eng.srt
|
22.1 KB
|
Automated Exploitable Heap Layout Generation for Heap Overflows Through.eng.srt
|
14.8 KB
|
Automated Inference on Financial Security of Ethereum Smart Contracts.eng.srt
|
18.0 KB
|
Automated Security Analysis of Exposure Notification Systems.eng.srt
|
22.7 KB
|
Back to School On the (In)Security of Academic VPNs.eng.srt
|
19.2 KB
|
BalanceProofs Maintainable Vector Commitments with Fast Aggregation.eng.srt
|
16.9 KB
|
BASECOMP A Comparative Analysis for Integrity Protection in Cellular.eng.srt
|
21.5 KB
|
Beyond The Gates An Empirical Analysis of HTTP-Managed Password Stealers.eng.srt
|
18.9 KB
|
Beyond Typosquatting An In-depth Look at Package Confusion.eng.srt
|
18.9 KB
|
Bilingual Problems Studying the Security Risks Incurred by Native.eng.srt
|
21.7 KB
|
Black-box Adversarial Example Attack towards FCG Based Android Malware.eng.srt
|
15.5 KB
|
Bleem Packet Sequence Oriented Fuzzing for Protocol Implementations.eng.srt
|
14.8 KB
|
BoKASAN Binary-only Kernel Address Sanitizer for Effective Kernel Fuzzing.eng.srt
|
16.0 KB
|
BotScreen Trust Everybody, but Cut the Aimbots Yourself.eng.srt
|
13.4 KB
|
Bug Hunters’ Perspectives on the Challenges and Benefits of the Bug Bounty.eng.srt
|
24.8 KB
|
BunnyHop Exploiting the Instruction Prefetcher.eng.srt
|
21.7 KB
|
Bypassing Tunnels Leaking VPN Client Traffic by Abusing Routing Tables.eng.srt
|
23.0 KB
|
CacheQL Quantifying and Localizing Cache Side-Channel Vulnerabilities in.eng.srt
|
20.7 KB
|
Calpric Inclusive and Fine-grain Labeling of Privacy Policies with.eng.srt
|
24.3 KB
|
Can a Deep Learning Model for One Architecture Be Used for Others.eng.srt
|
19.4 KB
|
CAPatch Physical Adversarial Patch against Image Captioning Systems.eng.srt
|
17.8 KB
|
Capstone A Capability-based Foundation for Trustless Secure Memory Access.eng.srt
|
24.7 KB
|
CarpetFuzz Automatic Program Option Constraint Extraction from.eng.srt
|
14.8 KB
|
Catch You and I Can Revealing Source Voiceprint Against Voice Conversion.eng.srt
|
15.2 KB
|
Checking Passwords on Leaky Computers A Side Channel Analysis of Chrome's.eng.srt
|
25.3 KB
|
Cheesecloth Zero-Knowledge Proofs of Real World Vulnerabilities.eng.srt
|
23.9 KB
|
Cipherfix Mitigating Ciphertext Side-Channel Attacks in Software.eng.srt
|
19.4 KB
|
CipherH Automated Detection of Ciphertext Side-channel Vulnerabilities in.eng.srt
|
14.0 KB
|
ClepsydraCache - Preventing Cache Attacks with Time-Based Evictions.eng.srt
|
21.4 KB
|
CodexLeaks Privacy Leaks from Code Generation Language Models in GitHub.eng.srt
|
20.1 KB
|
CollidePower Leaking Inaccessible Data with Software-based Power Side.eng.srt
|
24.2 KB
|
Combating Robocalls with Phone Virtual Assistant Mediated Interaction.eng.srt
|
23.9 KB
|
Confusum Contractum Confused Deputy Vulnerabilities in Ethereum Smart.eng.srt
|
21.8 KB
|
Content-Type multipart oracle - Tapping into Format Oracles in Email.eng.srt
|
27.4 KB
|
Continuous Learning for Android Malware Detection.eng.srt
|
24.8 KB
|
Controlled Data Races in Enclaves Attacks and Detection.eng.srt
|
18.1 KB
|
Cookie Crumbles Breaking and Fixing Web Session Integrity.eng.srt
|
21.7 KB
|
Credit Karma Understanding Security Implications of Exposed Cloud Services.eng.srt
|
23.9 KB
|
Cross Container Attacks The Bewildered eBPF on Clouds.eng.srt
|
15.5 KB
|
Cryptographic Administration for Secure Group Messaging.eng.srt
|
20.6 KB
|
Cryptographic Deniability A Multi-perspective Study of User Perceptions.eng.srt
|
19.1 KB
|
CSHER A System for Compact Storage with HE-Retrieval.eng.srt
|
24.7 KB
|
Curve Trees Practical and Transparent Zero-Knowledge Accumulators.eng.srt
|
16.8 KB
|
DAFL Directed Grey-box Fuzzing guided by Data Dependency.eng.srt
|
19.4 KB
|
DDRace Finding Concurrency UAF Vulnerabilities in Linux Drivers with.eng.json
|
508.3 KB
|
DDRace Finding Concurrency UAF Vulnerabilities in Linux Drivers with.eng.lrc
|
15.3 KB
|
DDRace Finding Concurrency UAF Vulnerabilities in Linux Drivers with.eng.srt
|
13.1 KB
|
DDRace Finding Concurrency UAF Vulnerabilities in Linux Drivers with.eng.text
|
9.5 KB
|
DDRace Finding Concurrency UAF Vulnerabilities in Linux Drivers with.eng.tsv
|
12.6 KB
|
DDRace Finding Concurrency UAF Vulnerabilities in Linux Drivers with.eng.txt
|
15.6 KB
|
DDRace Finding Concurrency UAF Vulnerabilities in Linux Drivers with.eng.vtt
|
12.1 KB
|
Decompiling x86 Deep Neural Network Executables.eng.srt
|
19.5 KB
|
Defining - Broken - User Experiences and Remediation Tactics When Ad-Blocking.eng.json
|
479.5 KB
|
Defining - Broken - User Experiences and Remediation Tactics When Ad-Blocking.eng.lrc
|
13.0 KB
|
Defining - Broken - User Experiences and Remediation Tactics When Ad-Blocking.eng.srt
|
13.0 KB
|
Defining - Broken - User Experiences and Remediation Tactics When Ad-Blocking.eng.text
|
10.2 KB
|
Defining - Broken - User Experiences and Remediation Tactics When Ad-Blocking.eng.tsv
|
11.7 KB
|
Defining - Broken - User Experiences and Remediation Tactics When Ad-Blocking.eng.txt
|
13.1 KB
|
Defining - Broken - User Experiences and Remediation Tactics When Ad-Blocking.eng.vtt
|
12.3 KB
|
Defining - Broken - User Experiences and Remediation Tactics When Ad-Blockingeng.srt
|
21.0 KB
|
Demystifying Pointer Authentication on Apple M1.eng.srt
|
20.4 KB
|
DeResistor Toward Detection-Resistant Probing for Evasion of Internet.eng.srt
|
21.8 KB
|
Design of Access Control Mechanisms in Systems-on-Chip with Formal.eng.srt
|
18.3 KB
|
Detecting and Handling IoT Interaction Threats in Multi-Platform Multi.eng.srt
|
27.7 KB
|
Detecting API Post-Handling Bugs Using Code and Description in Patches.eng.srt
|
20.6 KB
|
Detecting Multi-Step IAM Attacks in AWS Environments via Model Checking.eng.srt
|
18.5 KB
|
Detecting Union Type Confusion in Component Object Model.eng.srt
|
18.8 KB
|
Device Tracking via Linux’s New TCP Source Port Selection Algorithm.eng.srt
|
21.4 KB
|
Did the Shark Eat the Watchdog in the NTP Pool Deceiving the NTP Pool’s.eng.srt
|
16.0 KB
|
Differential Testing of Cross Deep Learning Framework APIs Revealing.eng.srt
|
17.7 KB
|
DiffSmooth Certifiably Robust Learning via Diffusion Models and Local.eng.srt
|
18.9 KB
|
Discovering Adversarial Driving Maneuvers against Autonomous Vehicles.eng.srt
|
18.6 KB
|
Distance-Aware Private Set Intersection.eng.srt
|
29.5 KB
|
DISTDET A Cost-Effective Distributed Cyber Threat Detection System.eng.srt
|
21.6 KB
|
Diving into Robocall Content with SnorCall.eng.srt
|
26.8 KB
|
Don’t be Dense Efficient Keyword PIR for Sparse Databases.eng.srt
|
22.4 KB
|
Downfall Exploiting Speculative Data Gathering.eng.srt
|
30.8 KB
|
Downgrading DNSSEC How to Exploit Crypto Agility for Hijacking Signed Zones.eng.srt
|
21.8 KB
|
DScope A Cloud-Native Internet Telescope.eng.srt
|
30.8 KB
|
Dubhe Succinct Zero-Knowledge Proofs for Standard AES and relate.eng.srt
|
21.2 KB
|
Duoram A Bandwidth-Efficient Distributed ORAM for 2- and 3-Party Computation.eng.srt
|
31.0 KB
|
DynSQL Stateful Fuzzing for Database Management Systems with Complex and.eng.srt
|
15.7 KB
|
Eavesdropping Mobile App Activity via Radio-Frequency Energy Harvesting.eng.srt
|
20.7 KB
|
Educators’ Perspectives of Using (or Not Using) Online Exam Proctoring.eng.srt
|
22.6 KB
|
Efficient 3PC for Binary Circuits with Application to Maliciously-Secure.eng.srt
|
16.8 KB
|
Efficient Unbalanced Private Set Intersection Cardinality and User-friendly.eng.srt
|
15.8 KB
|
Egg Hunt in Tesla Infotainment A First Look at Reverse Engineering of Qt.eng.srt
|
25.3 KB
|
ELASM Error-Latency-Aware Scale Management for Fully Homomorphic Encryption.eng.srt
|
19.0 KB
|
Employees Who Don’t Accept the Time Security Takes Are Not Aware Enough.eng.srt
|
18.2 KB
|
EnigMap External-Memory Oblivious Map for Secure Enclaves.eng.srt
|
21.4 KB
|
Eos Efficient Private Delegation of zkSNARK Provers.eng.srt
|
24.9 KB
|
Erebus Access Control for Augmented Reality Systems.eng.srt
|
22.2 KB
|
Ethical Frameworks and Computer Security Trolley Problems Foundations for.eng.srt
|
26.8 KB
|
Evading Provenance-Based ML Detectors with Adversarial System Action.eng.srt
|
24.0 KB
|
Every Signature is Broken On the Insecurity of Microsoft Office’s OOXML.eng.srt
|
21.7 KB
|
Every Vote Counts Ranking-Based Training of Federated Learning to Resist.eng.srt
|
19.9 KB
|
Examining Consumer Reviews to Understand Security and Privacy Issues in the.eng.srt
|
23.6 KB
|
Examining Power Dynamics and User Privacy in Smart Technology Use Among.eng.srt
|
18.2 KB
|
Exorcising - Wraith - Protecting LiDAR-based Object Detector in Automated.eng.srt
|
18.3 KB
|
Exploring Privacy and Incentives Considerations in Adoption of COVID-19.eng.srt
|
20.8 KB
|
Exploring Tenants' Preferences of Privacy Negotiation in Airbnb.eng.srt
|
16.8 KB
|
Exploring the Unknown DTLS Universe Analysis of the DTLS Server Ecosystem.eng.srt
|
21.1 KB
|
Exploring User Reactions and Mental Models Towards Perceptual Manipulation.eng.srt
|
17.9 KB
|
Extended Hell(o) A Comprehensive Large-Scale Study on Email.eng.srt
|
19.6 KB
|
Extending a Hand to Attackers Browser Privilege Escalation Attacks via.eng.srt
|
17.8 KB
|
Extracting Protocol Format as State Machine via Controlled Static Loop.eng.srt
|
21.9 KB
|
Extracting Training Data from Diffusion Models.eng.srt
|
25.5 KB
|
Eye-Shield Real-Time Protection of Mobile Device Screen Information from.eng.srt
|
19.2 KB
|
FABRID Flexible Attestation-Based Routing for Inter-Domain Networks.eng.srt
|
21.5 KB
|
FACE-AUDITOR Data Auditing in Facial Recognition Systems.eng.srt
|
15.1 KB
|
Fact-Saboteurs A Taxonomy of Evidence Manipulation Attacks against.eng.srt
|
16.6 KB
|
Fairness Properties of Face Recognition and Obfuscation Systems.eng.srt
|
16.9 KB
|
Fast IDentity Online with Anonymous Credentials (FIDO-AC).eng.srt
|
22.3 KB
|
FedVal Different good or different bad in federated learning.eng.srt
|
14.1 KB
|
Fine-grained Poisoning Attack to Local Differential Privacy Protocols for.eng.srt
|
28.5 KB
|
FirmSolo Enabling dynamic analysis of binary Linux-based IoT kernel modules.eng.srt
|
21.7 KB
|
FISHFUZZ Catch Deeper Bugs by Throwing Larger Nets.eng.srt
|
18.6 KB
|
FloatZone Accelerating Memory Error Detection using the Floating Point Unit.eng.srt
|
22.6 KB
|
Formal Analysis and Patching of BLE-SC Pairing.eng.json
|
452.2 KB
|
Formal Analysis and Patching of BLE-SC Pairing.eng.lrc
|
13.4 KB
|
Formal Analysis and Patching of BLE-SC Pairing.eng.srt
|
13.0 KB
|
Formal Analysis and Patching of BLE-SC Pairing.eng.text
|
9.4 KB
|
Formal Analysis and Patching of BLE-SC Pairing.eng.tsv
|
11.5 KB
|
Formal Analysis and Patching of BLE-SC Pairing.eng.txt
|
13.5 KB
|
Formal Analysis and Patching of BLE-SC Pairing.eng.vtt
|
12.0 KB
|
Formal Analysis of Session-Handling in Secure Messaging Lifting Security.eng.srt
|
21.5 KB
|
Formal Analysis of SPDM Security Protocol and Data Model version 1.2.eng.srt
|
22.8 KB
|
Forming Faster Firmware Fuzzers.eng.srt
|
21.3 KB
|
Fourteen Years in the Life A Root Server’s Perspective on DNS Resolve.eng.srt
|
20.0 KB
|
Framing Frames Bypassing Wi-Fi Encryption by Manipulating Transmit Queues.eng.srt
|
24.5 KB
|
Freaky Leaky SMS Extracting User Locations by Analyzing SMS Timings.eng.srt
|
19.6 KB
|
FreeEagle Detecting Complex Neural Trojans in Data-Free Cases.eng.srt
|
16.4 KB
|
FuncTeller How Well Does eFPGA Hide Functionality.eng.srt
|
18.6 KB
|
Fuzz The Power Dual-role State Guided Black-box Fuzzing for USB Power.eng.srt
|
20.5 KB
|
FuzzJIT Oracle-Enhanced Fuzzing for JavaScript Engine JIT Compiler.eng.srt
|
19.1 KB
|
Fuzztruction Using Fault Injection-based Fuzzing to Leverage Implicit.eng.srt
|
19.8 KB
|
GAP Differentially Private Graph Neural Networks with Aggregation.eng.srt
|
23.0 KB
|
Generative Intrusion Detection and Prevention on Data Stream.eng.srt
|
16.6 KB
|
GigaDORAM Breaking the Billion Address Barrier.eng.srt
|
22.3 KB
|
Glaze Protecting Artists from Style Mimicry by Text-to-Image Models.eng.srt
|
24.3 KB
|
GLeeFuzz Fuzzing WebGL Through Error Message Guided Mutation.eng.srt
|
18.3 KB
|
Glimpse On-Demand PoW Light Client with Constant-Size Storage for DeFi.eng.srt
|
18.0 KB
|
GlitchHiker Uncovering Vulnerabilities of Image Signal Transmission with IEMI.eng.srt
|
16.4 KB
|
Glowing in the Dark Uncovering IPv6 Address Discovery and Scanning.eng.srt
|
21.0 KB
|
Going through the motions AR VR keylogging from user head motions.eng.srt
|
23.4 KB
|
Gradient Obfuscation Gives a False Sense of Security in Federated Learning.eng.srt
|
21.4 KB
|
Greenhouse Single-Service Rehosting of Linux-Based Firmware Binaries in.eng.srt
|
24.7 KB
|
Guarding Serverless Applications with Kalium.eng.srt
|
22.3 KB
|
Hard-label Black-box Universal Adversarial Patch Attack.eng.srt
|
20.2 KB
|
Hash Gone Bad Automated discovery of protocol attacks that exploit hash.eng.srt
|
17.0 KB
|
HashTag Hash-based Integrity Protection for Tagged Architectures.eng.srt
|
26.8 KB
|
HECO Fully Homomorphic Encryption Compiler.eng.srt
|
23.1 KB
|
Hey Kimya, Is My Smart Speaker Spying on Me Taking Control of Sensor.eng.srt
|
19.9 KB
|
Hidden Reality Caution, Your Hand Gesture Inputs in the Immersive Virtual.eng.srt
|
21.7 KB
|
Hiding in Plain Sight An Empirical Study of Web Application Abuse in Malware.eng.srt
|
20.7 KB
|
High Recovery with Fewer Injections Practical Binary Volumetric Injection.eng.srt
|
17.6 KB
|
Hoedur Embedded Firmware Fuzzing using Multi-Stream Inputs.eng.srt
|
22.7 KB
|
HOLMES Efficient Distribution Testing for Secure Collaborative Learning.eng.srt
|
22.0 KB
|
HOMESPY The Invisible Sniffer of Infrared Remote Control of Smart TVs.eng.srt
|
19.7 KB
|
HorusEye A Realtime IoT Malicious Traffic Detection Framework using.eng.srt
|
22.0 KB
|
Hot Pixels Frequency, Power, and Temperature Attacks on GPUs and Arm SoCs.eng.srt
|
24.6 KB
|
How Effective is Multiple-Vantage-Point Domain Control Validation.eng.srt
|
21.3 KB
|
How fast do you heal A taxonomy for post-compromise security in.eng.srt
|
18.0 KB
|
How Library IT Staff Navigate Privacy and Security Challenges and.eng.srt
|
21.3 KB
|
How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic.eng.srt
|
21.5 KB
|
How to Bind Anonymous Credentials to Humans.eng.srt
|
19.7 KB
|
How to Cover up Anomalous Accesses to Electronic Health Records.eng.srt
|
22.1 KB
|
Humans vs. Machines in Malware Classification.eng.srt
|
26.2 KB
|
HyPFuzz Formal-Assisted Processor Fuzzing.eng.srt
|
20.1 KB
|
I wouldn't want my unsafe code to run my pacemaker An Interview Study on.eng.srt
|
23.0 KB
|
ICSPatch Automated Vulnerability Localization and Non-Intrusive.eng.srt
|
21.0 KB
|
If I could do this, I feel anyone could - The Design and Evaluation.eng.srt
|
22.6 KB
|
If sighted people know, I should be able to know Privacy Perceptions of.eng.srt
|
21.5 KB
|
I'm going to trust this until it burns me - Parents' Privacy Concerns and.eng.srt
|
25.0 KB
|
Improving Logging to Reduce Permission Over-Granting Mistakes.eng.srt
|
23.3 KB
|
Improving Real-world Password Guessing Attacks via Bi-directional Transformers.eng.srt
|
16.0 KB
|
In the Quest to Protect Users from Side-Channel Attacks - A User-Centred.eng.srt
|
25.5 KB
|
Inception Exposing New Attack Surfaces with Training in Transient Execution.eng.srt
|
21.9 KB
|
Inducing Authentication Failures to Bypass Credit Card PINs.eng.srt
|
26.7 KB
|
Inductive Graph Unlearning.eng.srt
|
22.6 KB
|
InfinityGauntlet Expose Smartphone Fingerprint Authentication to.eng.json
|
382.3 KB
|
InfinityGauntlet Expose Smartphone Fingerprint Authentication to.eng.lrc
|
10.5 KB
|
InfinityGauntlet Expose Smartphone Fingerprint Authentication to.eng.srt
|
11.5 KB
|
InfinityGauntlet Expose Smartphone Fingerprint Authentication to.eng.text
|
8.3 KB
|
InfinityGauntlet Expose Smartphone Fingerprint Authentication to.eng.tsv
|
9.5 KB
|
InfinityGauntlet Expose Smartphone Fingerprint Authentication to.eng.txt
|
10.6 KB
|
InfinityGauntlet Expose Smartphone Fingerprint Authentication to.eng.vtt
|
10.6 KB
|
Instructions Unclear Undefined Behaviour in Cellular Network Specifications.eng.srt
|
20.3 KB
|
Intender Fuzzing Intent-Based Networking with Intent-State Transition.eng.srt
|
21.1 KB
|
Internet Service Providers' and Individuals' Attitudes, Barriers, and.eng.srt
|
19.3 KB
|
Investigating Verification Behavior and Perceptions of Visual Digital.eng.srt
|
24.3 KB
|
Is Your Wallet Snitching On You An Analysis on the Privacy Implications.eng.srt
|
24.2 KB
|
Isolated and Exhausted Attacking Operating Systems via Site Isolation in.eng.srt
|
22.1 KB
|
It's all in your head(set) Side-channel attacks on AR VR systems.eng.srt
|
21.9 KB
|
It's the Equivalent of Feeling Like You're in Jail Lessons from Firsthand.eng.json
|
550.9 KB
|
It's the Equivalent of Feeling Like You're in Jail Lessons from Firsthand.eng.lrc
|
14.4 KB
|
It's the Equivalent of Feeling Like You're in Jail Lessons from Firsthand.eng.srt
|
14.9 KB
|
It's the Equivalent of Feeling Like You're in Jail Lessons from Firsthand.eng.text
|
11.2 KB
|
It's the Equivalent of Feeling Like You're in Jail Lessons from Firsthand.eng.tsv
|
12.9 KB
|
It's the Equivalent of Feeling Like You're in Jail Lessons from Firsthand.eng.txt
|
14.6 KB
|
It's the Equivalent of Feeling Like You're in Jail Lessons from Firsthand.eng.vtt
|
14.0 KB
|
It's the Equivalent of Feeling Like You're in Jail Lessons from Firsthandeng.srt
|
22.8 KB
|
IvySyn Automated Vulnerability Discovery in Deep Learning Frameworks.eng.srt
|
17.1 KB
|
Jinn Hijacking Safe Programs with Trojans.eng.srt
|
23.0 KB
|
Keep Your Friends Close, but Your Routeservers Closer Insights into RPK.eng.srt
|
25.2 KB
|
KENKU Towards Efficient and Stealthy Black-box Adversarial Attacks against.eng.srt
|
22.7 KB
|
KextFuzz Fuzzing macOS Kernel EXTensions on Apple Silicon via Exploiting.eng.srt
|
16.0 KB
|
Know Your Cybercriminal Evaluating Attacker Preferences by Measuring.eng.srt
|
21.8 KB
|
Knowledge Expansion and Counterfactual Interaction for Reference-Based.eng.srt
|
22.6 KB
|
Lalaine Measuring and Characterizing Non-Compliance of Apple Privacy Labels.eng.srt
|
18.7 KB
|
Learning Normality is Enough A Software-based Mitigation against Inaudible.eng.srt
|
18.8 KB
|
Lessons Lost Incident Response in the Age of Cyber Insurance and Breach.eng.srt
|
23.3 KB
|
LibScan Towards More Precise Third-Party Library Identification for.eng.srt
|
18.6 KB
|
LightThief Your Optical Communication Information is Stolen behind the Wall.eng.srt
|
18.5 KB
|
Linear Private Set Union from Multi-Query Reverse Private Membership Test.eng.srt
|
18.1 KB
|
LocIn Inferring Semantic Location from Spatial Maps in Mixed Reality.eng.srt
|
25.5 KB
|
Log It’s Big, It’s Heavy, It’s Filled with Personal Data Measuring the.eng.srt
|
25.3 KB
|
Long Live The Honey Badger Robust Asynchronous DPSS and its Applications.eng.srt
|
25.2 KB
|
Lost at C A User Study on the Security Implications of Large Language Model.eng.json
|
450.8 KB
|
Lost at C A User Study on the Security Implications of Large Language Model.eng.lrc
|
11.8 KB
|
Lost at C A User Study on the Security Implications of Large Language Model.eng.srt
|
12.3 KB
|
Lost at C A User Study on the Security Implications of Large Language Model.eng.text
|
9.1 KB
|
Lost at C A User Study on the Security Implications of Large Language Model.eng.tsv
|
10.6 KB
|
Lost at C A User Study on the Security Implications of Large Language Model.eng.txt
|
11.9 KB
|
Lost at C A User Study on the Security Implications of Large Language Model.eng.vtt
|
11.5 KB
|
Lost at C A User Study on the Security Implications of Large Language Modeleng.srt
|
19.6 KB
|
Lost in Conversion Exploit Data Structure Conversion with Attribute Loss.eng.srt
|
15.7 KB
|
Machine-checking Multi-Round Proofs of Shuffle Terelius-Wikstrom and.eng.srt
|
14.6 KB
|
McFIL Model Counting Functionality-Inherent Leakage.eng.srt
|
26.0 KB
|
Measuring Up to (Reasonable) Consumer Expectations Providing an Empirical.eng.srt
|
21.0 KB
|
Medusa Attack Exploring Security Hazards of In-App QR Code Scanning.eng.srt
|
18.7 KB
|
Meta-Sift How to Sift Out a Clean Subset in the Presence of Data Poisoning.eng.srt
|
19.6 KB
|
Millions of people are watching you Understanding the Digital-Safety.eng.srt
|
27.8 KB
|
MINER A Hybrid Data-Driven Approach for REST API Fuzzing.eng.srt
|
14.6 KB
|
Minimalist Semi-automated Debloating of PHP Web Applications through.eng.srt
|
19.2 KB
|
Mitigating Security Risks in Linux with KLAUS A Method for Evaluating.eng.json
|
414.0 KB
|
Mitigating Security Risks in Linux with KLAUS A Method for Evaluating.eng.lrc
|
11.0 KB
|
Mitigating Security Risks in Linux with KLAUS A Method for Evaluating.eng.srt
|
12.0 KB
|
Mitigating Security Risks in Linux with KLAUS A Method for Evaluating.eng.text
|
8.6 KB
|
Mitigating Security Risks in Linux with KLAUS A Method for Evaluating.eng.tsv
|
9.8 KB
|
Mitigating Security Risks in Linux with KLAUS A Method for Evaluating.eng.txt
|
11.1 KB
|
Mitigating Security Risks in Linux with KLAUS A Method for Evaluating.eng.vtt
|
11.1 KB
|
Mixed Signals Analyzing Ground-Truth Data on the Users and Economics.eng.srt
|
22.8 KB
|
MobileAtlas Geographically Decoupled Measurements in Cellular Networks for.eng.srt
|
21.6 KB
|
MorFuzz Fuzzing Processor via Runtime Instruction Morphing enhanced.eng.srt
|
16.2 KB
|
MTSan A Feasible and Practical Memory Sanitizer for Fuzzing COTS Binaries.eng.srt
|
28.3 KB
|
Multi-Factor Key Derivation Function (MFKDF) for Fast, Flexible, Secure, &.eng.srt
|
20.9 KB
|
Multiview Finding Blind Spots in Access-Deny Issues Diagnosis.eng.srt
|
23.7 KB
|
My Privacy for their Security - Employees' Privacy Perspectives and.eng.srt
|
20.8 KB
|
NAUTILUS Automated RESTful API Vulnerability Detection.eng.srt
|
20.9 KB
|
Near-Optimal Oblivious Key-Value Stores for Efficient PSI, PSU and Volume.eng.srt
|
18.2 KB
|
Near-Ultrasound Inaudible Trojan (Nuit) Exploiting Your Speaker to Attack.eng.srt
|
18.9 KB
|
Network Detection of Interactive SSH Impostors Using Deep Learning.eng.srt
|
23.7 KB
|
Network Responses to Russia's Invasion of Ukraine in 2022 A Cautionary Tale.eng.json
|
612.5 KB
|
Network Responses to Russia's Invasion of Ukraine in 2022 A Cautionary Tale.eng.lrc
|
18.8 KB
|
Network Responses to Russia's Invasion of Ukraine in 2022 A Cautionary Tale.eng.srt
|
15.6 KB
|
Network Responses to Russia's Invasion of Ukraine in 2022 A Cautionary Tale.eng.text
|
12.0 KB
|
Network Responses to Russia's Invasion of Ukraine in 2022 A Cautionary Tale.eng.tsv
|
15.6 KB
|
Network Responses to Russia's Invasion of Ukraine in 2022 A Cautionary Tale.eng.txt
|
19.0 KB
|
Network Responses to Russia's Invasion of Ukraine in 2022 A Cautionary Tale.eng.vtt
|
14.6 KB
|
Network Responses to Russia's Invasion of Ukraine in 2022 A Cautionary Taleeng.srt
|
24.9 KB
|
NeuroPots Realtime Proactive Defense against Bit-Flip Attacks in Neural.eng.srt
|
19.7 KB
|
No Linux, No Problem Fast and Correct Windows Binary Fuzzing via.eng.srt
|
23.0 KB
|
No more Reviewer #2 Subverting Automatic Paper-Reviewer Assignment using.eng.srt
|
22.4 KB
|
No Single Silver Bullet Measuring the Accuracy of Password Strength Meters.eng.srt
|
15.6 KB
|
Not All Data are Created Equal Data and Pointer Prioritization for Scalable.eng.json
|
455.8 KB
|
Not All Data are Created Equal Data and Pointer Prioritization for Scalable.eng.lrc
|
11.9 KB
|
Not All Data are Created Equal Data and Pointer Prioritization for Scalable.eng.srt
|
12.3 KB
|
Not All Data are Created Equal Data and Pointer Prioritization for Scalable.eng.text
|
9.3 KB
|
Not All Data are Created Equal Data and Pointer Prioritization for Scalable.eng.tsv
|
10.7 KB
|
Not All Data are Created Equal Data and Pointer Prioritization for Scalable.eng.txt
|
12.0 KB
|
Not All Data are Created Equal Data and Pointer Prioritization for Scalable.eng.vtt
|
11.5 KB
|
Not All Data are Created Equal Data and Pointer Prioritization for Scalableeng.srt
|
19.4 KB
|
Notice the Imposter A Study on User Tag Spoofing Attack in Mobile Apps.eng.srt
|
23.6 KB
|
NRDelegationAttack Complexity DDoS attack on DNS Recursive Resolvers.eng.srt
|
20.7 KB
|
NVLeak Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems.eng.srt
|
19.1 KB
|
On the Feasibility of Malware Unpacking via Hardware-assisted Loop Profiling.eng.srt
|
21.0 KB
|
On the Security Risks of Knowledge Graph Reasoning.eng.srt
|
17.1 KB
|
One Server for the Price of Two Simple and Fast Single-Server Private.eng.srt
|
22.5 KB
|
One Size Does not Fit All Quantifying the Risk of Malicious App Encounters.eng.srt
|
25.6 KB
|
One Size Does Not Fit All Uncovering and Exploiting Cross Platform.eng.srt
|
17.5 KB
|
Oops.. I Glitched It Again How to Multi-Glitch the Glitching-Protections.eng.srt
|
16.2 KB
|
Othered, Silenced and Scapegoated Understanding the Situated Security of.eng.srt
|
23.5 KB
|
Panda Security Analysis of Algorand Smart Contracts.eng.srt
|
16.3 KB
|
Pass2Edit A Multi-Step Generative Model for Guessing Edited Passwords.eng.srt
|
17.3 KB
|
Password Guessing Using Random Forest.eng.srt
|
16.9 KB
|
PatchVerif Discovering Faulty Patches in Robotic Vehicles.eng.srt
|
19.5 KB
|
PATROL Provable Defense against Adversarial Policy in Two-player Games.eng.srt
|
25.1 KB
|
PCAT Functionality and Data Stealing from Split Learning by Pseudo-Client.eng.srt
|
17.1 KB
|
PELICAN Exploiting Backdoors of Naturally Trained Deep Learning Models In.eng.srt
|
18.3 KB
|
Person Re-identification in 3D Space A WiFi Vision-based Approach.eng.srt
|
20.5 KB
|
PET Prevent Discovered Errors from Being Triggered in the Linux Kerne.eng.srt
|
20.2 KB
|
PhyAuth Physical-Layer Message Authentication for ZigBee Networks.eng.srt
|
22.1 KB
|
Place Your Locks Well Understanding and Detecting Lock Misuse Bugs.eng.srt
|
20.8 KB
|
POLICYCOMP Counterpart Comparison of Privacy Policies Uncovers.eng.srt
|
18.1 KB
|
PoliGraph Automated Privacy Policy Analysis using Knowledge Graphs.eng.srt
|
21.2 KB
|
PolyFuzz Holistic Greybox Fuzzing of Multi-Language Systems.eng.srt
|
17.1 KB
|
Pool-Party Exploiting Browser Resource Pools for Web Tracking.eng.srt
|
21.0 KB
|
PORE Provably Robust Recommender Systems against Data Poisoning Attacks.eng.srt
|
19.0 KB
|
Powering for Privacy Improving User Trust in Smart Speaker Microphones with.eng.json
|
427.8 KB
|
Powering for Privacy Improving User Trust in Smart Speaker Microphones with.eng.lrc
|
11.6 KB
|
Powering for Privacy Improving User Trust in Smart Speaker Microphones with.eng.srt
|
11.9 KB
|
Powering for Privacy Improving User Trust in Smart Speaker Microphones with.eng.text
|
8.8 KB
|
Powering for Privacy Improving User Trust in Smart Speaker Microphones with.eng.tsv
|
10.3 KB
|
Powering for Privacy Improving User Trust in Smart Speaker Microphones with.eng.txt
|
11.7 KB
|
Powering for Privacy Improving User Trust in Smart Speaker Microphones with.eng.vtt
|
11.1 KB
|
Powering for Privacy Improving User Trust in Smart Speaker Microphones witheng.srt
|
18.7 KB
|
Powering Privacy On the Energy Demand and Feasibility of Anonymity.eng.srt
|
23.9 KB
|
Practical Asynchronous High-threshold Distributed Key Generation and.eng.srt
|
28.3 KB
|
Precise and Generalized Robustness Certification for Neural Networks.eng.srt
|
20.5 KB
|
Prime Match A Privacy-Preserving Inventory Matching System.eng.srt
|
28.7 KB
|
Private Proof-of-Stake Blockchains using Differentially-Private Stake.eng.srt
|
24.4 KB
|
PrivateFL Accurate, Differentially Private Federated Learning via.eng.srt
|
20.5 KB
|
PrivGraph Differentially Private Graph Data Publication by Exploiting.eng.srt
|
15.6 KB
|
PrivTrace Differentially Private Trajectory Synthesis by Adaptive Markov.eng.srt
|
15.1 KB
|
Problematic Advertising and its Disparate Exposure on Facebook.eng.srt
|
26.6 KB
|
PROGRAPHER An Anomaly Detection System based on Provenance Graph Embedding.eng.srt
|
21.7 KB
|
ProSpeCT Provably Secure Speculation for the Constant-Time Policy.eng.srt
|
18.7 KB
|
PROVIDENCE a Flexible Round-by-Round Risk-Limiting Audit.eng.srt
|
24.6 KB
|
Proxy Hunting Understanding and Characterizing Proxy-based Upgradeable.eng.srt
|
25.8 KB
|
Pspray Timing Side-Channel based Linux Kernel Heap Exploitation Technique.eng.srt
|
18.6 KB
|
PTW Pivotal Tuning Watermarking for Pre-Trained Image Generators.eng.srt
|
19.8 KB
|
PUMM Preventing Use-After-Free Using Execution Unit Partitioning.eng.srt
|
16.8 KB
|
Pushed by Accident A Mixed-Methods Study on Strategies of Handling Secret.eng.srt
|
23.8 KB
|
QFA2SR Query-Free Adversarial Transfer Attacks to Speaker Recognition Systems.eng.srt
|
13.8 KB
|
Reassembly is Hard A Reflection on Challenges and Strategies.eng.srt
|
18.2 KB
|
Remote Attacks on Speech Recognition Systems Using Sound from Power Supply.eng.srt
|
17.5 KB
|
Remote Code Execution from SSTI in the Sandbox Automatically Detecting and.eng.srt
|
16.8 KB
|
Remote Direct Memory Introspection.eng.srt
|
20.2 KB
|
Rethinking System Audit Architectures for High Event Coverage and.eng.srt
|
21.2 KB
|
Rethinking White-Box Watermarks on Deep Learning Models under Neural.eng.srt
|
18.1 KB
|
Reusable Enclaves for Confidential Serverless Computing.eng.srt
|
24.1 KB
|
ReUSB Replay-Guided USB Driver Fuzzing.eng.srt
|
19.9 KB
|
Reversing, Breaking, and Fixing the French Legislative Election E-Voting.eng.srt
|
23.4 KB
|
RIDAS Real-time identification of attack sources on controller area networks.eng.srt
|
20.0 KB
|
RøB Ransomware over Modern Web Browsers.eng.srt
|
19.7 KB
|
Rods with Laser Beams Understanding Browser Fingerprinting on Phishing Pages.eng.srt
|
16.4 KB
|
Rosetta Enabling Robust TLS Encrypted Traffic Classification in Diverse.eng.srt
|
17.5 KB
|
SAFER Efficient and Error-Tolerant Binary Instrumentation.eng.srt
|
19.5 KB
|
SandDriller A Fully-Automated Approach for Testing Language-Based.eng.srt
|
19.5 KB
|
SCARF - A Low-Latency Block Cipher for Secure Cache-Randomization.eng.srt
|
19.0 KB
|
Secure Floating-Point Training.eng.srt
|
25.4 KB
|
Security Analysis of MongoDB Queryable Encryption.eng.srt
|
20.0 KB
|
Security and Privacy Failures in Popular 2FA Apps.eng.srt
|
27.6 KB
|
Security is not my field, I’m a stats guy A Qualitative Root Cause.eng.srt
|
29.0 KB
|
SHELTER Extending Arm CCA with Isolation in User Space.eng.srt
|
19.8 KB
|
Sherlock on Specs Building LTE Conformance Tests through Automated Reasoning.eng.srt
|
19.4 KB
|
Side-Channel Attacks on Optane Persistent Memory.eng.srt
|
22.4 KB
|
Silent Bugs Matter A Study of Compiler-Introduced Security Bugs.eng.srt
|
16.7 KB
|
Silent Spring Prototype Pollution Leads to Remote Code Execution in Node.js.eng.srt
|
17.4 KB
|
SMACK Semantically Meaningful Adversarial Audio Attack.eng.srt
|
19.0 KB
|
Smart Learning to Find Dumb Contracts.eng.srt
|
24.3 KB
|
Snapping Snap Sync Practical Attacks on Go Ethereum Synchronising Nodes.eng.srt
|
23.7 KB
|
Sneaky Spy Devices and Defective Detectors The Ecosystem of Intimate.eng.srt
|
23.9 KB
|
Sparsity Brings Vulnerabilities Exploring New Metrics in Backdoor Attacks.eng.srt
|
24.1 KB
|
SpectrEM Exploiting Electromagnetic Emanations During Transient Execution.eng.srt
|
20.8 KB
|
Speculation at Fault Modeling and Testing Microarchitectural Leakage of.eng.srt
|
16.2 KB
|
Spying through Your Voice Assistants Realistic Voice Command Fingerprinting.eng.srt
|
24.3 KB
|
SQIRL Grey-Box Detection of SQL Injection Vulnerabilities Using.eng.srt
|
22.3 KB
|
Squint Hard Enough Attacking Perceptual Hashing with Adversarial Machine.eng.srt
|
32.9 KB
|
Squirrel A Scalable Secure Two-Party Computation Framework for Training.eng.srt
|
22.7 KB
|
Strategies and Vulnerabilities of Participants in Venezuelan Influence.eng.srt
|
23.7 KB
|
Subverting Website Fingerprinting Defenses with Robust Traffic Representation.eng.srt
|
18.8 KB
|
Synchronization Storage Channels (S2C) Timer-less Cache Side-Channel.eng.srt
|
21.4 KB
|
Systematic Assessment of Fuzzers using Mutation Analysis.eng.srt
|
15.3 KB
|
TAP Transparent and Privacy-Preserving Data Services.eng.srt
|
17.9 KB
|
Temporal CDN-Convex Lens A CDN-Assisted Practical Pulsing DDoS Attack.eng.srt
|
19.5 KB
|
That Person Moves Like A Car Misclassification Attack Detection fo.eng.srt
|
20.7 KB
|
The Blockchain Imitation Game.eng.srt
|
18.4 KB
|
The Case for Learned Provenance Graph Storage Systems.eng.srt
|
17.2 KB
|
The Digital-Safety Risks of Financial Technologies for Survivors of.eng.srt
|
24.1 KB
|
The Gates of Time Improving Cache Attacks with Transient Execution.eng.srt
|
23.6 KB
|
The Impostor Among US(B) Off-Path Injection Attacks on USB Communications.eng.srt
|
19.5 KB
|
The Maginot Line Attacking the Boundary of DNS Caching Protection.eng.srt
|
15.1 KB
|
The Most Dangerous Codec in the World Finding and Exploiting.eng.srt
|
20.7 KB
|
The OK Is Not Enough A Large Scale Study of Consent Dialogs in Smartphone.eng.srt
|
23.5 KB
|
The Role of Professional Product Reviewers in Evaluating Security and Privacy.eng.srt
|
23.8 KB
|
The Space of Adversarial Strategies.eng.srt
|
23.0 KB
|
The Writing on the Wall and 3D Digital Twins Personal Information in.eng.json
|
441.7 KB
|
The Writing on the Wall and 3D Digital Twins Personal Information in.eng.lrc
|
11.5 KB
|
The Writing on the Wall and 3D Digital Twins Personal Information in.eng.srt
|
12.4 KB
|
The Writing on the Wall and 3D Digital Twins Personal Information in.eng.text
|
8.9 KB
|
The Writing on the Wall and 3D Digital Twins Personal Information in.eng.tsv
|
10.3 KB
|
The Writing on the Wall and 3D Digital Twins Personal Information in.eng.txt
|
11.6 KB
|
The Writing on the Wall and 3D Digital Twins Personal Information in.eng.vtt
|
11.5 KB
|
The Writing on the Wall and 3D Digital Twins Personal Information ineng.srt
|
18.7 KB
|
Three Lessons From Threema Analysis of a Secure Messenger.eng.srt
|
26.4 KB
|
Tight Auditing of Differentially Private Machine Learning.eng.srt
|
22.8 KB
|
Time for Change How Clocks Break UWB Secure Ranging.eng.srt
|
23.8 KB
|
Timeless Timing Attacks and Preload Defenses in Tor's DNS Cache.eng.srt
|
22.2 KB
|
To Cloud or not to Cloud A Qualitative Study on Self-Hosters' Motivation.eng.srt
|
20.9 KB
|
To Do This Properly, You Need More Resources The Hidden Costs of.eng.srt
|
16.6 KB
|
Token Spammers, Rug Pulls, and Sniper Bots An Analysis of the Ecosystem.eng.srt
|
17.6 KB
|
Towards a General Video-based Keystroke Inference Attack.eng.srt
|
15.4 KB
|
Towards A Proactive ML Approach for Detecting Backdoor Poison Samples.eng.srt
|
26.9 KB
|
Towards Targeted Obfuscation of Adversarial Unsafe Images using.eng.srt
|
18.8 KB
|
TPatch A Triggered Physical Adversarial Patch.eng.srt
|
19.4 KB
|
TreeSync Authenticated Group Management for Messaging Layer Security.eng.srt
|
19.4 KB
|
TRIDENT Towards Detecting and Mitigating Web-based Social Engineering Attacks.eng.srt
|
25.0 KB
|
Trojan Source Invisible Vulnerabilities.eng.srt
|
28.0 KB
|
TRust A Compilation Framework for In-process Isolation to Protect Safe.eng.srt
|
19.1 KB
|
Tubes Among Us Analog Attack on Automatic Speaker Identification.eng.srt
|
16.9 KB
|
TVA A multi-party computation system for secure and expressive time series.eng.srt
|
19.1 KB
|
Two Sides of the Shield Understanding Protective DNS adoption factors.eng.srt
|
21.3 KB
|
Two-in-One A Model Hijacking Attack Against Text Generation Models.eng.srt
|
22.0 KB
|
UCBlocker Unwanted Call Blocking Using Anonymous Authentication.eng.srt
|
17.3 KB
|
Ultimate SLH Taking Speculative Load Hardening to the Next Level.eng.srt
|
21.1 KB
|
Uncontained Uncovering Container Confusion in the Linux Kernel.eng.srt
|
17.8 KB
|
Understand Users' Privacy Perception and Decision of V2X Communication in.eng.srt
|
21.9 KB
|
Un-Equal Online Safety - A Gender Analysis of Security and Privacy.eng.srt
|
20.8 KB
|
UnGANable Defending Against GAN-based Face Manipulation.eng.srt
|
17.9 KB
|
Union under Duress Understanding Hazards of Duplicate Resource Mismediation.eng.json
|
458.2 KB
|
Union under Duress Understanding Hazards of Duplicate Resource Mismediation.eng.lrc
|
12.8 KB
|
Union under Duress Understanding Hazards of Duplicate Resource Mismediation.eng.srt
|
12.9 KB
|
Union under Duress Understanding Hazards of Duplicate Resource Mismediation.eng.text
|
9.5 KB
|
Union under Duress Understanding Hazards of Duplicate Resource Mismediation.eng.tsv
|
11.2 KB
|
Union under Duress Understanding Hazards of Duplicate Resource Mismediation.eng.txt
|
12.9 KB
|
Union under Duress Understanding Hazards of Duplicate Resource Mismediation.eng.vtt
|
11.9 KB
|
Union under Duress Understanding Hazards of Duplicate Resource Mismediationeng.srt
|
19.5 KB
|
Unique Identification of 50,000 Virtual Reality Users from Head & Hand.eng.srt
|
18.8 KB
|
URET Universal Robustness Evaluation Toolkit (for Evasion).eng.srt
|
28.2 KB
|
User Awareness and Behaviors Concerning Encrypted DNS Settings in Web Browsers.eng.srt
|
25.5 KB
|
UVSCAN Detecting Third-Party Component Usage Violations in IoT Firmware.eng.srt
|
22.3 KB
|
V1SCAN Discovering 1-day Vulnerabilities in Reused C C Open-source.eng.srt
|
19.6 KB
|
V-Cloak Intelligibility-, Naturalness- & Timbre-Preserving Real-Time Voice.eng.srt
|
15.5 KB
|
VeriZexe Decentralized Private Computation with Universal Setup.eng.srt
|
32.1 KB
|
VILLAIN Backdoor Attacks Against Vertical Split Learning.eng.srt
|
16.2 KB
|
VIPER Spotting Syscall-Guard Variables for Data-Only Attacks.eng.srt
|
17.9 KB
|
VulChecker Graph-based Vulnerability Localization in Source Code.eng.srt
|
32.8 KB
|
Watch your Watch Inferring Personality Traits from Wearable Activity Trackers.eng.srt
|
17.5 KB
|
WaterBear Practical Asynchronous BFT Matching Security Guarantees of.eng.srt
|
22.0 KB
|
We Really Need to Talk About Session Tickets A Large-Scale Analysis of.eng.srt
|
21.3 KB
|
What Are the Chances Explaining the Epsilon Parameter in Differential Privacy.eng.srt
|
26.3 KB
|
WHIP Improving Static Vulnerability Detection in Web Application by.eng.srt
|
27.5 KB
|
Wink Deniable Secure Messaging.eng.srt
|
30.5 KB
|
Work-From-Home and COVID-19 Trajectories of Endpoint Security Management.eng.srt
|
25.4 KB
|
X-Adv Physical Adversarial Object Attacks against X-ray Prohibited Item.eng.srt
|
17.3 KB
|
XCheck Verifying Integrity of 3D Printed Patient-Specific Devices via.eng.srt
|
13.9 KB
|
xNIDS Explaining Deep Learning-based Network Intrusion Detection Systems.eng.srt
|
20.8 KB
|
You Can't See Me Physical Removal Attacks on LiDAR-based Autonomous.eng.srt
|
26.9 KB
|
Your Exploit is Mine Instantly Synthesizing Counterattack Smart Contract.eng.srt
|
19.6 KB
|
You've Got Report Measurement and Security Implications of DMARC Reporting.eng.srt
|
25.6 KB
|
ZBCAN A Zero-Byte CAN Defense System.eng.srt
|
24.3 KB
|
zkSaaS Zero-Knowledge SNARKs as a Service.eng.srt
|
27.0 KB
|
/USENIX Security 2024/
|
00SEVen - Re-enabling Virtual Machine Forensics Introspecting Confidential.mp4
|
13.5 MB
|
6Sense Internet-Wide IPv6 Scanning and its Security Applications.mp4
|
10.4 MB
|
A Binary-level Thread Sanitizer or Why Sanitizing on the Binary Level is Hard.mp4
|
11.5 MB
|
A Broad Comparative Evaluation of Software Debloating Tools.mp4
|
11.8 MB
|
A Decade of Privacy-Relevant Android App Reviews Large Scale Trends.mp4
|
14.0 MB
|
A First Physical-World Trajectory Prediction Attack via LiDAR-induced.mp4
|
12.6 MB
|
A Flushing Attack on the DNS Cache.mp4
|
8.5 MB
|
A Friend's Eye is A Good Mirror Synthesizing MCU Peripheral Models from.mp4
|
13.2 MB
|
A High Coverage Cybersecurity Scale Predictive of User Behavior.mp4
|
8.6 MB
|
A Linear Reconstruction Approach for Attribute Inference Attacks against.mp4
|
9.4 MB
|
A Mixed-Methods Study on User Experiences and Challenges of Recovery.mp4
|
8.3 MB
|
A NEW HOPE Contextual Privacy Policies for Mobile Applications and An.mp4
|
15.1 MB
|
A Taxonomy of C Decompiler Fidelity Issues.mp4
|
10.5 MB
|
A Wolf in Sheep's Clothing Practical Black-box Adversarial Attacks for.mp4
|
10.6 MB
|
A World Where We Trust Hard-Won Lessons in Security Research, Technology,.mp4
|
32.8 MB
|
ABACuS All-Bank Activation Counters for Scalable and Low Overhead.mp4
|
11.8 MB
|
Abandon All Hope Ye Who Enter Here A Dynamic, Longitudinal Investigation.mp4
|
12.7 MB
|
Abuse Reporting for Metadata-Hiding Communication Based on Secret Sharing.mp4
|
6.8 MB
|
Abuse-Resistant Location Tracking Balancing Privacy and Safety in the.mp4
|
10.4 MB
|
ACAI Protecting Accelerator Execution with Arm Confidential Computing.mp4
|
9.0 MB
|
Accelerating Secure Collaborative Machine Learning with Protocol-Aware RDMA.mp4
|
12.7 MB
|
ACE A Model Poisoning Attack on Contribution Evaluation Methods.mp4
|
11.2 MB
|
Adversarial Illusions in Multi-Modal Embeddings.mp4
|
9.8 MB
|
Adversary is on the Road Attacks on Visual SLAM using Unnoticeable.mp4
|
11.7 MB
|
AE-Morpher Improve Physical Robustness of Adversarial Objects against.mp4
|
6.5 MB
|
Ahoy SAILR There is No Need to DREAM of C A Compiler-Aware Structuring.mp4
|
11.0 MB
|
AI Psychiatry Forensic Investigation of Deep Learning Networks in Memory.mp4
|
10.5 MB
|
All Your Tokens are Belong to Us Demystifying Address Verification.mp4
|
8.9 MB
|
An Interview Study on Third-Party Cyber Threat Hunting Processes in the U.S.mp4
|
9.2 MB
|
An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models.mp4
|
11.5 MB
|
Arcanum Detecting and Evaluating the Privacy Risks of Browser Extensions.mp4
|
9.7 MB
|
Argus All your (PHP) Injection-sinks are belong to us.mp4
|
11.4 MB
|
Assessing Suspicious Emails with Banner Warnings Among Blind and Low-Vision.mp4
|
12.0 MB
|
Athena Analyzing and Quantifying Side Channels of Transport Layer Protocols.mp4
|
11.6 MB
|
Atropos Effective Fuzzing of Web Applications for Server-Side Vulnerabilities.mp4
|
10.2 MB
|
AttackGNN Red-Teaming GNNs in Hardware Security Using Reinforcement Learning.mp4
|
12.4 MB
|
ATTention Please An Investigation of the App Tracking Transparency Permission.mp4
|
10.7 MB
|
AutoFHE Automated Adaption of CNNs for Efficient Evaluation over FHE.mp4
|
11.3 MB
|
Automated Large-Scale Analysis of Cookie Notice Compliance.mp4
|
8.6 MB
|
BackdoorIndicator Leveraging OOD Data for Proactive Backdoor Detection in.mp4
|
14.0 MB
|
Batch PIR and Labeled PSI with Oblivious Ciphertext Compression.mp4
|
8.2 MB
|
BeeBox Hardening BPF against Transient Execution Attacks.mp4
|
9.4 MB
|
Being Transparent is Merely the Beginning Enforcing Purpose Limitation.mp4
|
12.7 MB
|
Belt and suspenders - or - just red tape - Investigating Early Artifacts.mp4
|
11.4 MB
|
Bending microarchitectural weird machines towards practicality.mp4
|
8.3 MB
|
Biosignal Authentication Considered Harmful Today.mp4
|
10.9 MB
|
Bridging Barriers A Survey of Challenges and Priorities in the Censorship.mp4
|
9.8 MB
|
BUDAlloc Defeating Use-After-Free Bugs by Decoupling Virtual Address.mp4
|
10.6 MB
|
But they have overlooked a few things in Afghanistan - An Analysis of the.mp4
|
10.0 MB
|
CacheWarp Software-based Fault Injection using Selective State Reset.mp4
|
9.9 MB
|
CalcuLatency Leveraging Cross-Layer Network Latency Measurements to Detect.mp4
|
9.8 MB
|
CAMP Compiler and Allocator-based Heap Memory Protection.mp4
|
8.4 MB
|
CAMP Compositional Amplification Attacks against DNS.mp4
|
9.2 MB
|
Can I Hear Your Face Pervasive Attack on Voice Authentication Systems with.mp4
|
9.0 MB
|
Can Virtual Reality Protect Users from Keystroke Inference Attacks.mp4
|
8.8 MB
|
CARDSHARK Understanding and Stablizing Linux Kernel Concurrency Bugs.mp4
|
7.0 MB
|
Cascade CPU Fuzzing via Intricate Program Generation.mp4
|
12.8 MB
|
CDN Cannon Exploiting CDN Back-to-Origin Strategies for Amplification Attacks.mp4
|
10.3 MB
|
CellularLint A Systematic Approach to Identify Inconsistent Behavior in.mp4
|
9.3 MB
|
ChainPatrol Balancing Attack Detection and Classification with Performance.mp4
|
10.8 MB
|
ChainReactor Automated Privilege Escalation Chain Discovery via AI Planning.mp4
|
7.4 MB
|
ClearStamp A Human-Visible and Robust Model-Ownership Proof based on.mp4
|
11.0 MB
|
Closed-Form Bounds for DP-SGD against Record-level Inference Attacks.mp4
|
11.9 MB
|
CO3 Concolic Co-execution for Firmware.mp4
|
11.1 MB
|
Code is not Natural Language Unlock the Power of Semantics-Oriented Graph.mp4
|
9.0 MB
|
Co-Designing a Mobile App for Bystander Privacy Protection in Jordanian.mp4
|
8.3 MB
|
Correction-based Defense Against Adversarial Video Attacks via.mp4
|
10.2 MB
|
Cost-effective Attack Forensics by Recording and Correlating File System.mp4
|
13.5 MB
|
Critical Code Guided Directed Greybox Fuzzing for Commits.mp4
|
10.4 MB
|
Cross the Zone Toward a Covert Domain Hijacking via Shared DNS Infrastructure.mp4
|
9.1 MB
|
Cryptographic Analysis of Delta Chat.mp4
|
10.5 MB
|
DaCapo Automatic Bootstrapping Management for Efficient Fully Homomorphic.mp4
|
10.0 MB
|
Dancer in the Dark Synthesizing and Evaluating Polyglots for Blind.mp4
|
8.2 MB
|
DARKFLEECE Probing the Dark Side of Android Subscription Apps.mp4
|
8.9 MB
|
Data Coverage for Guided Fuzzing.mp4
|
12.1 MB
|
Data Subjects' Reactions to Exercising Their Right of Access.mp4
|
11.9 MB
|
d-DSE Distinct Dynamic Searchable Encryption Resisting Volume Leakage in.mp4
|
10.0 MB
|
Deciphering Textual Authenticity A Generalized Strategy through the Lens.mp4
|
9.9 MB
|
DeepEclipse How to Break White-Box DNN-Watermarking Schemes.mp4
|
9.5 MB
|
DEEPTYPE Refining Indirect Call Targets with Strong Multi-layer Type Analysis.mp4
|
11.8 MB
|
Defects-in-Depth Analyzing the Integration of Effective Defenses against.mp4
|
12.5 MB
|
Defending Against Data Reconstruction Attacks in Federated Learning An.mp4
|
10.6 MB
|
Demystifying the Security Implications in IoT Device Rental Services.mp4
|
11.6 MB
|
Detecting and Mitigating Sampling Bias in Cybersecurity with Unlabeled Data.mp4
|
9.2 MB
|
Detecting Kernel Memory Bugs through Inconsistent Memory Management.mp4
|
13.8 MB
|
Devil in the Room Triggering Audio Backdoors in the Physical World.mp4
|
9.4 MB
|
D-Helix A Generic Decompiler Testing Framework Using Symbolic Differentiation.mp4
|
9.0 MB
|
Did the Neurons Read your Book Document-level Membership Inference for.mp4
|
12.9 MB
|
Did They F ing Consent to That - Safer Digital Intimacy via Proactive.mp4
|
12.3 MB
|
Diffie-Hellman Picture Show Key Exchange Stories from Commercial VoWiFi.mp4
|
10.8 MB
|
Digital Discrimination of Users in Sanctioned States The Case of the Cuba.mp4
|
10.2 MB
|
Dissecting Privacy Perspectives of Websites Around the World - Aceptar Todo.mp4
|
9.6 MB
|
Divide and Surrender Exploiting Variable Division Instruction Timing in.mp4
|
8.8 MB
|
DMAAUTH A Lightweight Pointer Integrity-based Secure Architecture to Defeat..mp4
|
9.1 MB
|
DNN-GP Diagnosing and Mitigating Model's Faults Using Latent Concepts.mp4
|
9.7 MB
|
Do You See How I Pose Using Poses as an Implicit Authentication Factor for.mp4
|
7.0 MB
|
Does Online Anonymous Market Vendor Reputation Matter.mp4
|
8.7 MB
|
DONAPI Malicious NPM Packages Detector using Behavior Sequence Knowledge.mp4
|
11.2 MB
|
Don't Listen To Me Understanding and Exploring Jailbreak Prompts of Large.mp4
|
9.5 MB
|
Don't Waste My Efforts Pruning Redundant Sanitizer Checks by.mp4
|
12.0 MB
|
Double Face Leveraging User Intelligence to Characterize and Recognize.mp4
|
9.0 MB
|
DPAdapter Improving Differentially Private Deep Learning through Noise.mp4
|
8.4 MB
|
dp-promise Differentially Private Diffusion Probabilistic Models for Image.mp4
|
8.4 MB
|
DVa Extracting Victims and Abuse Vectors from Android Accessibility Malware.mp4
|
10.0 MB
|
DVSorder Ballot Randomization Flaws Threaten Voter Privacy.mp4
|
10.1 MB
|
EaTVul ChatGPT-based Evasion Attack Against Software Vulnerability Detection.mp4
|
12.9 MB
|
Efficient Privacy Auditing in Federated Learning.mp4
|
9.2 MB
|
EL3XIR Fuzzing COTS Secure Monitors.mp4
|
9.5 MB
|
Election Eligibility with OpenID Turning Authentication into Transferable.mp4
|
8.3 MB
|
ElectionGuard a Cryptographic Toolkit to Enable Verifiable Elections.mp4
|
13.8 MB
|
Enabling Contextual Soft Moderation on Social Media through Contrastive.mp4
|
9.8 MB
|
Enabling Developers, Protecting Users Investigating Harassment and Safety.mp4
|
10.5 MB
|
Endokernel A Thread Safe Monitor for Lightweight Subprocess Isolation.mp4
|
9.6 MB
|
ENG25519 Faster TLS 1.3 handshake using optimized X25519 and Ed25519.mp4
|
12.9 MB
|
Engaging Company Developers in Security Research Studies A Comprehensive.mp4
|
8.2 MB
|
Enhancing Network Attack Detection with Distributed and In-Network Data.mp4
|
10.0 MB
|
EVOKE Efficient Revocation of Verifiable Credentials in IoT Networks.mp4
|
9.3 MB
|
Exploiting Leakage in Password Managers via Injection Attacks.mp4
|
12.3 MB
|
Exploring ChatGPT's Capabilities on Vulnerability Management.mp4
|
11.7 MB
|
Exploring Covert Third-party Identifiers through External Storage in the.mp4
|
10.4 MB
|
Exploring digital security and privacy in relative poverty in Germany.mp4
|
9.9 MB
|
Eye of Sauron Long-Range Hidden Spy Camera Detection and Positioning with.mp4
|
14.6 MB
|
FaceObfuscator Defending Deep Learning-based Privacy Attacks with Gradient.mp4
|
9.7 MB
|
FakeBehalf Imperceptible Email Spoofing Attacks against the Delegation.mp4
|
9.7 MB
|
False Claims against Model Ownership Resolution.mp4
|
10.6 MB
|
FAMOS Robust Privacy-Preserving Authentication on Payment Apps via.mp4
|
11.1 MB
|
Fast and Private Inference of Deep Neural Networks by Co-designing.mp4
|
10.4 MB
|
Fast RS-IOP Multivariate Polynomial Commitments and Verifiable Secret Sharing.mp4
|
8.1 MB
|
FEASE Fast and Expressive Asymmetric Searchable Encryption.mp4
|
11.9 MB
|
FFXE Dynamic Control Flow Graph Recovery for Embedded Firmware Binaries.mp4
|
11.3 MB
|
Finding Traceability Attacks in the Bluetooth Low Energy Specification.mp4
|
10.5 MB
|
Fingerprinting Obfuscated Proxy Traffic with Encapsulated TLS Handshakes.mp4
|
9.8 MB
|
FIRE Combining Multi-Stage Filtering with Taint Analysis for Scalable.mp4
|
10.7 MB
|
Fledging Will Continue Until Privacy Improves Empirical Analysis of.mp4
|
10.0 MB
|
Forget and Rewire Enhancing the Resilience of Transformer-based Models.mp4
|
9.9 MB
|
Formal Security Analysis of Widevine through the W3C EME Standard.mp4
|
12.3 MB
|
Formal verification of the PQXDH Post-Quantum key agreement protocol for.mp4
|
13.9 MB
|
Formalizing and Benchmarking Prompt Injection Attacks and Defenses.mp4
|
7.3 MB
|
Formalizing Soundness Proofs of Linear PCP SNARKs.mp4
|
11.1 MB
|
FraudWhistler A Resilient, Robust and Plug-and-play Adversarial Example.mp4
|
9.0 MB
|
From One Thousand Pages of Specification to Unveiling Hidden Bugs Large.mp4
|
6.6 MB
|
From the Childhood Past Views of Young Adults on Parental Sharing of.mp4
|
12.6 MB
|
Fuzzing BusyBox Leveraging LLM and Crash Reuse for Embedded Bug Unearthing.mp4
|
12.5 MB
|
FV8 A Forced Execution JavaScript Engine for Detecting Evasive Techniques.mp4
|
10.5 MB
|
FVD-DPM Fine-grained Vulnerability Detection via Conditional Diffusion.mp4
|
10.7 MB
|
GFWeb Measuring the Great Firewall's Web Censorship at Scale.mp4
|
10.0 MB
|
GhostRace Exploiting and Mitigating Speculative Race Conditions.mp4
|
11.0 MB
|
GHunter Universal Prototype Pollution Gadgets in JavaScript Runtimes.mp4
|
9.4 MB
|
GlobalConfusion TrustZone Trusted Application 0-Days by Design.mp4
|
9.8 MB
|
Go Go Gadget Hammer Flipping Nested Pointers for Arbitrary Data Leakage.mp4
|
9.2 MB
|
GoFetch Breaking Constant-Time Cryptographic Implementations Using Data.mp4
|
10.3 MB
|
GPU Memory Exploitation for Fun and Profit.mp4
|
10.0 MB
|
Gradients Look Alike Sensitivity is Often Overestimated in DP-SGD.mp4
|
9.7 MB
|
GraphGuard Private Time-Constrained Pattern Detection Over Streaming.mp4
|
9.4 MB
|
GridSE Towards Practical Secure Geographic Search via Prefix Symmetric.mp4
|
8.5 MB
|
Guardians of the Galaxy Content Moderation in the InterPlanetary File System.mp4
|
9.5 MB
|
GuideEnricher Protecting the Anonymity of Ethereum Mixing Service Users.mp4
|
8.0 MB
|
HECKLER Breaking Confidential VMs with Malicious Interrupts.mp4
|
9.3 MB
|
Hermes Unlocking Security Analysis of Cellular Network Protocols by.mp4
|
10.3 MB
|
Hijacking Attacks against Neural Network by Analyzing Training Data.mp4
|
9.7 MB
|
HIVE A Hardware-assisted Isolated Execution Environment for eBPF on AArch64.mp4
|
10.6 MB
|
Holding Secrets Accountable Auditing Privacy-Preserving Machine Learning.mp4
|
11.4 MB
|
How Does a Deep Learning Model Architecture Impact Its Privacy.mp4
|
11.0 MB
|
How does Endpoint Detection use the MITRE ATT&CK Framework.mp4
|
10.5 MB
|
How WEIRD is Usable Privacy and Security Research.mp4
|
10.6 MB
|
HYPERPILL Fuzzing for Hypervisor-bugs by Leveraging the Hardware.mp4
|
14.0 MB
|
I chose to fight, be brave, and to deal with it - Threat Experiences and.mp4
|
8.7 MB
|
I Don't Know If We're Doing Good. I Don't Know If We're Doing Bad.mp4
|
12.7 MB
|
I Experienced More than 10 DeFi Scams On DeFi Users' Perception of.mp4
|
9.3 MB
|
I feel physically safe but not politically safe - Understanding the Digital..mp4
|
8.7 MB
|
I just hated it and I want my money back - Data-driven Understanding of.mp4
|
10.3 MB
|
I O-Efficient Dynamic Searchable Encryption meets Forward & Backward Privacy.mp4
|
12.2 MB
|
I really just leaned on my community for support - Barriers, Challenges.mp4
|
9.7 MB
|
iHunter Hunting Privacy Violations at Scale in the Software Supply Chain.mp4
|
10.8 MB
|
I'm not convinced that they don't collect more than is necessary.mp4
|
11.2 MB
|
Improving Indirect-Call Analysis in LLVM with Type and Data-Flow Co-Analysis.mp4
|
9.7 MB
|
Improving ML-based Binary Function Similarity Detection by Assessing and.mp4
|
10.5 MB
|
Improving the Ability of Thermal Radiation Based Hardware Trojan Detection.mp4
|
9.6 MB
|
In Wallet We Trust Bypassing the Digital Wallets Payment Security for Free.mp4
|
9.1 MB
|
Indirector High-Precision Branch Target Injection Attacks Exploiting the.mp4
|
12.2 MB
|
Inf2Guard An Information-Theoretic Framework for Learning.mp4
|
10.6 MB
|
Inference of Error Specifications and Bug Detection Using Structural.mp4
|
7.8 MB
|
Information Flow Control in Machine Learning through Modular Model.mp4
|
11.8 MB
|
INSIGHT Attacking Industry-Adopted Learning Resilient Logic Locking.mp4
|
8.1 MB
|
InSpectre Gadget Inspecting the Residual Attack Surface of Cross-privilege.mp4
|
9.0 MB
|
Instruction Backdoor Attacks Against Customized LLMs.mp4
|
10.5 MB
|
Intellectual Property Exposure Subverting and Securing Intellectual.mp4
|
9.8 MB
|
Into the Dark Unveiling Internal Site Search Abused for Black Hat SEO.mp4
|
11.2 MB
|
InvalidateCompare A Timer-Free GPU Cache Attack Primitive.mp4
|
10.9 MB
|
Investigating Moderation Challenges to Combating Hate and Harassment The.mp4
|
9.8 MB
|
Invisibility Cloak Proactive Defense Against Visual Game Cheating.mp4
|
14.6 MB
|
IoT Market Dynamics An Analysis of Device Sales, Security and Privacy.mp4
|
7.3 MB
|
Is It a Trap A Large-scale Empirical Study And Comprehensive Assessment.mp4
|
14.7 MB
|
It Doesn't Look Like Anything to Me Using Diffusion Model to Subvert.mp4
|
9.9 MB
|
Key Recovery Attacks on Approximate Homomorphic Encryption with.mp4
|
8.9 MB
|
KnowPhish Large Language Models Meet Multimodal Knowledge Graphs for.mp4
|
12.6 MB
|
K-Waay Fast and Deniable Post-Quantum X3DH without Ring Signatures.mp4
|
13.1 MB
|
LaKey Efficient Lattice-Based Distributed PRFs Enable Scalable Distributed.mp4
|
13.3 MB
|
LanDscAPe Exploring LDAP Weaknesses and Data Leaks at Internet Scale.mp4
|
9.7 MB
|
Landscape More Secure Than Portrait Zooming Into the Directionality of.mp4
|
11.6 MB
|
Large Language Models for Code Analysis Do LLMs Really Do Their Job.mp4
|
12.3 MB
|
LaserAdv Laser Adversarial Attacks on Speech Recognition Systems.mp4
|
9.3 MB
|
Leakage-Abuse Attacks Against Structured Encryption for SQL.mp4
|
13.5 MB
|
Learning with Semantics Towards a Semantics-Aware Routing Anomaly Detection.mp4
|
10.6 MB
|
Length Leakage in Oblivious Data Access Mechanisms.mp4
|
9.6 MB
|
Less Defined Knowledge and More True Alarms Reference-based Phishing.mp4
|
4.8 MB
|
Less is More Revisiting the Gaussian Mechanism for Differential Privacy.mp4
|
11.9 MB
|
Leveraging Semantic Relations in Code and Data to Enhance Taint Analysis of.mp4
|
11.2 MB
|
LLM-Fuzzer Scaling Assessment of Large Language Model Jailbreaks.mp4
|
9.3 MB
|
Logic Gone Astray A Security Analysis Framework for the Control Plane.mp4
|
13.4 MB
|
Loopy Hell(ow) Infinite Traffic Loops at the Application Layer.mp4
|
7.1 MB
|
Lotto Secure Participant Selection against Adversarial Servers in Federated..mp4
|
10.6 MB
|
LR-Miner Static Race Detection in OS Kernels by Mining Locking Rules.mp4
|
10.1 MB
|
Lurking in the shadows Unveiling Stealthy Backdoor Attacks agains.mp4
|
14.3 MB
|
Machine Learning needs Better Randomness Standards Randomised Smoothing.mp4
|
12.8 MB
|
MAGIC Detecting Advanced Persistent Threats via Masked Graph Representation..mp4
|
11.2 MB
|
Making Them Ask and Answer Jailbreaking Large Language Models in Few.mp4
|
13.3 MB
|
Malla Demystifying Real-world Large Language Model Integrated Malicious.mp4
|
13.9 MB
|
Max Attestation Matters Making Honest Parties Lose Their Incentives in.mp4
|
9.9 MB
|
MD-ML Super Fast Privacy-Preserving Machine Learning for Malicious.mp4
|
11.5 MB
|
Mempool Privacy via Batched Threshold Encryption Attacks and Defense.mp4
|
8.2 MB
|
MetaSafe Compiling for Protecting Smart Pointer Metadata to Ensure Safe.mp4
|
11.8 MB
|
MFKDF Multiple Factors Knocked Down Flat.mp4
|
9.6 MB
|
MicGuard A Comprehensive Detection System against Out-of-band Injection.mp4
|
14.7 MB
|
MIST Defending Against Membership Inference Attacks Through.mp4
|
10.4 MB
|
MOAT Towards Safe BPF Kernel Extension.mp4
|
12.3 MB
|
ModelGuard Information-Theoretic Defense Against Model Extraction Attacks.mp4
|
10.7 MB
|
Moderating Illicit Online Image Promotion for Unsafe User Generated Content.mp4
|
12.7 MB
|
More Simplicity for Trainers, More Opportunity for Attackers Black-Box.mp4
|
10.6 MB
|
Mudjacking Patching Backdoor Vulnerabilities in Foundation Models.mp4
|
8.3 MB
|
MultiFuzz A Multi-Stream Fuzzer For Testing Monolithic Firmware.mp4
|
10.2 MB
|
MUSES Efficient Multi-User Searchable Encrypted Database.mp4
|
11.1 MB
|
Navigating the Privacy Compliance Maze Understanding Risks with.mp4
|
10.4 MB
|
Navigating Traumatic Stress Reactions During Computer Security Interventions.mp4
|
10.2 MB
|
Near-Optimal Constrained Padding for Object Retrievals with Dependencies.mp4
|
10.6 MB
|
NetShaper A Differentially Private Network Side-Channel Mitigation System.mp4
|
10.1 MB
|
Neural Network Semantic Backdoor Detection and Mitigation A Causality-Based..mp4
|
8.4 MB
|
Notus Dynamic Proofs of Liabilities from Zero-knowledge RSA Accumulators.mp4
|
14.4 MB
|
OblivGNN Oblivious Inference on Transductive and Inductive Graph Neural.mp4
|
13.4 MB
|
On a Collision Course Unveiling Wireless Attacks to the Aircraft Traffic.mp4
|
9.2 MB
|
On Bridging the Gap between Control Flow Integrity and Attestation Schemes.mp4
|
13.5 MB
|
On Data Fabrication in Collaborative Vehicular Perception Attacks and.mp4
|
10.4 MB
|
On the Criticality of Integrity Protection in 5G Fronthaul Networks.mp4
|
11.6 MB
|
On the Difficulty of Defending Contrastive Learning against Backdoor Attacks.mp4
|
9.4 MB
|
Operation Mango Scalable Discovery of Taint-Style Vulnerabilities in.mp4
|
9.0 MB
|
Opportunistic Data Flow Integrity for Real-time Cyber-physical Systems.mp4
|
11.1 MB
|
OptFuzz Optimization Path Guided Fuzzing for JavaScript JIT Compilers.mp4
|
9.3 MB
|
OPTIKS An Optimized Key Transparency System.mp4
|
10.7 MB
|
OPTISAN Using Multiple Spatial Error Defenses to Optimize Stack Memory.mp4
|
8.2 MB
|
ORANalyst Systematic Testing Framework for Open RAN Implementations.mp4
|
10.7 MB
|
Orbital Trust and Privacy SoK on PKI and Location Privacy Challenges in.mp4
|
10.7 MB
|
O-Ring and K-Star Efficient Multi-party Private Set Intersection.mp4
|
11.7 MB
|
Page-Oriented Programming Subverting Control-Flow Integrity of Commodity..mp4
|
14.3 MB
|
Pandawan Quantifying Progress in Linux-based Firmware Rehosting.mp4
|
13.0 MB
|
PatchCURE Improving Certifiable Robustness, Model Utility, and Computation.mp4
|
8.5 MB
|
Peep With A Mirror Breaking The Integrity of Android App Sandboxing via.mp4
|
13.5 MB
|
Penetration Vision through Virtual Reality Headsets Identifying 360-degree.mp4
|
10.6 MB
|
PentestGPT Evaluating and Harnessing Large Language Models for Automated.mp4
|
9.6 MB
|
PEPSI Practically Efficient Private Set Intersection in the Unbalanced.mp4
|
11.8 MB
|
PerfOMR Oblivious Message Retrieval with Reduced Communication and.mp4
|
7.7 MB
|
PhishDecloaker Detecting CAPTCHA-cloaked Phishing Websites via Hybrid.mp4
|
11.6 MB
|
PINE Efficient Verification of a Euclidean Norm Bound of a Secret-Shared.mp4
|
10.3 MB
|
Pixel and Pixel Compact and Efficient Forward-Secure Multi-Signatures.mp4
|
8.7 MB
|
Pixel Thief Exploiting SVG Filter Leakage in Firefox and Chrome.mp4
|
7.4 MB
|
PIXELMOD Improving Soft Moderation of Visual Misleading Information on.mp4
|
12.4 MB
|
PointerGuess Targeted Password Guessing Model Using Pointer Mechanism.mp4
|
10.2 MB
|
POPSTAR Lightweight Threshold Reporting with Reduced Leakage.mp4
|
9.8 MB
|
Practical Data-Only Attack Generation.mp4
|
9.5 MB
|
Practical Security Analysis of Zero-Knowledge Proof Circuits.mp4
|
10.2 MB
|
Privacy Side Channels in Machine Learning Systems.mp4
|
8.9 MB
|
Privacy-Preserving Data Aggregation with Public Verifiability Against.mp4
|
11.4 MB
|
PrivImage Differentially Private Synthetic Image Generation using.mp4
|
14.5 MB
|
Prompt Stealing Attacks Against Text-to-Image Generation Models.mp4
|
11.8 MB
|
Property Existence Inference against Generative Models.mp4
|
12.8 MB
|
PURE Payments with UWB RElay-protectio.mp4
|
10.2 MB
|
PURL Safe and Effective Sanitization of Link Decoration.mp4
|
8.6 MB
|
Quantifying Privacy Risks of Prompts in Visual Prompt Learning.mp4
|
8.0 MB
|
Query Recovery from Easy to Hard Jigsaw Attack against SSE.mp4
|
10.9 MB
|
Rabbit-Mix Robust Algebraic Anonymous Broadcast from Additive Bases.mp4
|
8.7 MB
|
Racing for TLS Certificate Validation A Hijacker's Guide to the Android.mp4
|
12.7 MB
|
Racing on the Negative Force Efficient Vulnerability Root-Cause Analysis.mp4
|
9.7 MB
|
RADIUS UDP Considered Harmful.mp4
|
11.3 MB
|
Reconstructing training data from document understanding models.mp4
|
8.4 MB
|
RECORD A RECeption-Only Region Determination Attack on LEO Satellite Users.mp4
|
10.2 MB
|
Reef Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs.mp4
|
9.7 MB
|
Showing first 10000 files of 10642 total files
|