FileMood

Download USENIX Security

USENIX Security

Name

USENIX Security

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

36.0 GB

Total Files

10642

Last Seen

2025-08-05 00:16

Hash

DB865447C706672748169D28920F855C3FA34C82

/

HEADER.md

0.5 KB

USENIX logo.jpg

4.4 KB

USENIX Security thank you.txt

1.3 KB

/CSET 2020/

APTGen An Approach towards Generating Practical Dataset Labelled with Targeted.mp4

12.7 MB

Bridging Missing Gaps in Evaluating DDoS Research.mp4

9.7 MB

Expansion of ICS Testbed for Security Validation based on MITRE ATT&CK Techniques.mp4

15.5 MB

HAI 1.0 HIL-based Augmented ICS Security Dataset.mp4

11.3 MB

Historical Analysis of Exploit Availability Timelines.mp4

13.1 MB

ICS Testbed Tetris Practical Building Blocks Towards a Cyber Security Resource.mp4

9.9 MB

On Design and Enhancement of Smart Grid Honeypot System for Practical Collection.mp4

15.1 MB

Representativeness in the Benchmark for Vulnerability Analysis Tools (B-VAT).mp4

11.8 MB

Toward Orchestration of Complex Networking Experiments.mp4

13.9 MB

Towards Adversarial Phishing Detection.mp4

15.2 MB

UBCIS Ultimate Benchmark for Container Image Scanning.mp4

11.7 MB

/.../CSET 2020 captions/

APTGen An Approach towards Generating Practical Dataset Labelled with Targeted.eng.srt

14.0 KB

Bridging Missing Gaps in Evaluating DDoS Research.eng.srt

18.8 KB

Expansion of ICS Testbed for Security Validation based on MITRE ATT&CK Techniques.eng.srt

27.0 KB

HAI 1.0 HIL-based Augmented ICS Security Dataset.eng.srt

15.1 KB

Historical Analysis of Exploit Availability Timelines.eng.srt

28.3 KB

ICS Testbed Tetris Practical Building Blocks Towards a Cyber Security Resource.eng.srt

27.0 KB

On Design and Enhancement of Smart Grid Honeypot System for Practical Collection.eng.srt

24.0 KB

Representativeness in the Benchmark for Vulnerability Analysis Tools (B-VAT).eng.json

498.3 KB

Representativeness in the Benchmark for Vulnerability Analysis Tools (B-VAT).eng.lrc

13.2 KB

Representativeness in the Benchmark for Vulnerability Analysis Tools (B-VAT).eng.srt

14.2 KB

Representativeness in the Benchmark for Vulnerability Analysis Tools (B-VAT).eng.text

10.3 KB

Representativeness in the Benchmark for Vulnerability Analysis Tools (B-VAT).eng.tsv

11.8 KB

Representativeness in the Benchmark for Vulnerability Analysis Tools (B-VAT).eng.txt

13.3 KB

Representativeness in the Benchmark for Vulnerability Analysis Tools (B-VAT).eng.vtt

13.2 KB

Toward Orchestration of Complex Networking Experiments.eng.srt

28.0 KB

Towards Adversarial Phishing Detection.eng.json

672.7 KB

Towards Adversarial Phishing Detection.eng.lrc

19.8 KB

Towards Adversarial Phishing Detection.eng.srt

16.5 KB

Towards Adversarial Phishing Detection.eng.text

13.6 KB

Towards Adversarial Phishing Detection.eng.tsv

16.9 KB

Towards Adversarial Phishing Detection.eng.txt

20.0 KB

Towards Adversarial Phishing Detection.eng.vtt

15.7 KB

UBCIS Ultimate Benchmark for Container Image Scanning.eng.srt

25.6 KB

/FOCI 2014/

Catching Bandits and Only Bandits Privacy-Preserving Intersection Warrants for Lawful.mp4

10.3 MB

Security Audit of Safeplug - Tor in a Box.mp4

7.2 MB

TRIST Circumventing Censorship with Transcoding-Resistant Image Steganography.mp4

12.0 MB

/.../FOCI 2014 captions/

Catching Bandits and Only Bandits Privacy-Preserving Intersection Warrants for Lawful.eng.json

1.2 MB

Catching Bandits and Only Bandits Privacy-Preserving Intersection Warrants for Lawful.eng.lrc

30.3 KB

Catching Bandits and Only Bandits Privacy-Preserving Intersection Warrants for Lawful.eng.srt

32.9 KB

Catching Bandits and Only Bandits Privacy-Preserving Intersection Warrants for Lawful.eng.text

25.0 KB

Catching Bandits and Only Bandits Privacy-Preserving Intersection Warrants for Lawful.eng.tsv

28.0 KB

Catching Bandits and Only Bandits Privacy-Preserving Intersection Warrants for Lawful.eng.txt

30.5 KB

Catching Bandits and Only Bandits Privacy-Preserving Intersection Warrants for Lawful.eng.vtt

30.7 KB

Security Audit of Safeplug - Tor in a Box.eng.json

647.8 KB

Security Audit of Safeplug - Tor in a Box.eng.lrc

17.3 KB

Security Audit of Safeplug - Tor in a Box.eng.srt

19.3 KB

Security Audit of Safeplug - Tor in a Box.eng.text

12.4 KB

Security Audit of Safeplug - Tor in a Box.eng.tsv

15.1 KB

Security Audit of Safeplug - Tor in a Box.eng.txt

17.5 KB

Security Audit of Safeplug - Tor in a Box.eng.vtt

17.4 KB

TRIST Circumventing Censorship with Transcoding-Resistant Image Steganography.eng.json

1.1 MB

TRIST Circumventing Censorship with Transcoding-Resistant Image Steganography.eng.lrc

27.4 KB

TRIST Circumventing Censorship with Transcoding-Resistant Image Steganography.eng.srt

29.3 KB

TRIST Circumventing Censorship with Transcoding-Resistant Image Steganography.eng.text

20.1 KB

TRIST Circumventing Censorship with Transcoding-Resistant Image Steganography.eng.tsv

24.3 KB

TRIST Circumventing Censorship with Transcoding-Resistant Image Steganography.eng.txt

27.7 KB

TRIST Circumventing Censorship with Transcoding-Resistant Image Steganography.eng.vtt

26.7 KB

/FOCI 2020/

A Comprehensive Study of DNS-over-HTTPS Downgrade Attack.mp4

9.2 MB

Bystanders’ Privacy The Perspectives of Nannies on Smart Home Surveillance.mp4

8.9 MB

Detecting and Evading Censorship-in-Depth A Case Study of Iran’s Protocol Whitelister.mp4

9.0 MB

HTTPT A Probe-Resistant Proxy.mp4

5.7 MB

Identifying Disinformation Websites Using Infrastructure Features.mp4

7.1 MB

MIMIQ Masking IPs with Migration in QUIC.mp4

8.1 MB

Opening Digital Borders Cautiously yet Decisively Digital Filtering in Saudi Arabia.mp4

12.1 MB

Padding Ain't Enough Assessing the Privacy Guarantees of Encrypted DNS.mp4

10.2 MB

Slitheen Stealth TLS-based Decoy Routing.mp4

9.6 MB

Triplet Censors Demystifying Great Firewall’s DNS Censorship Behavior.mp4

9.4 MB

Turbo Tunnel, a good way to design censorship circumvention protocols.mp4

11.0 MB

/.../FOCI 2020 captions/

A Comprehensive Study of DNS-over-HTTPS Downgrade Attack.eng.json

385.1 KB

A Comprehensive Study of DNS-over-HTTPS Downgrade Attack.eng.lrc

10.3 KB

A Comprehensive Study of DNS-over-HTTPS Downgrade Attack.eng.srt

11.0 KB

A Comprehensive Study of DNS-over-HTTPS Downgrade Attack.eng.text

8.1 KB

A Comprehensive Study of DNS-over-HTTPS Downgrade Attack.eng.tsv

9.3 KB

A Comprehensive Study of DNS-over-HTTPS Downgrade Attack.eng.txt

10.4 KB

A Comprehensive Study of DNS-over-HTTPS Downgrade Attack.eng.vtt

10.2 KB

Bystanders’ Privacy The Perspectives of Nannies on Smart Home Surveillance.eng.srt

27.2 KB

Detecting and Evading Censorship-in-Depth A Case Study of Iran’s Protocol Whitelister.eng.srt

24.4 KB

HTTPT A Probe-Resistant Proxy.eng.srt

15.0 KB

Identifying Disinformation Websites Using Infrastructure Features.eng.srt

22.8 KB

MIMIQ Masking IPs with Migration in QUIC.eng.srt

22.1 KB

Opening Digital Borders Cautiously yet Decisively Digital Filtering in Saudi Arabia.eng.srt

23.5 KB

Padding Ain't Enough Assessing the Privacy Guarantees of Encrypted DNS.eng.srt

16.1 KB

Slitheen Stealth TLS-based Decoy Routing.eng.srt

20.0 KB

Triplet Censors Demystifying Great Firewall’s DNS Censorship Behavior.eng.srt

23.4 KB

Turbo Tunnel, a good way to design censorship circumvention protocols.eng.srt

22.0 KB

/FOCI 2023/

A Worldwide View of Nation state Internet Censorship.mp4

20.6 MB

Crowdsourcing the Discovery of Server-side Censorship Evasion Strategies.mp4

15.3 MB

Detecting Network Interference Without Endpoint Participation.mp4

11.8 MB

FOCI 2023 Awards and Closing.mp4

6.7 MB

Rethinking Realistic Adversaries for Anonymous Communication Systems.mp4

17.9 MB

Running a high-performance pluggable transports Tor bridge.mp4

22.1 MB

Towards a Comprehensive Understanding of Russian Transit Censorship.mp4

12.3 MB

/.../FOCI 2023 captions/

A Worldwide View of Nation state Internet Censorship.eng.srt

53.1 KB

Crowdsourcing the Discovery of Server-side Censorship Evasion Strategies.eng.srt

47.7 KB

Detecting Network Interference Without Endpoint Participation.eng.srt

38.6 KB

FOCI 2023 Awards and Closing.eng.srt

9.7 KB

Rethinking Realistic Adversaries for Anonymous Communication Systems.eng.srt

44.8 KB

Running a high-performance pluggable transports Tor bridge.eng.srt

47.6 KB

Towards a Comprehensive Understanding of Russian Transit Censorship.eng.srt

36.2 KB

/ScAINet 2020/

Combating Social Media Information Operations with Neural Language Models.mp4

13.3 MB

Getting Passive Aggressive about False Positives.mp4

12.1 MB

On Adaptive Attacks to Adversarial Example Defenses.mp4

13.5 MB

Optimization for Attack Surface Exploration The Case of TLS.mp4

10.4 MB

/.../ScAINet 2020 captions/

Combating Social Media Information Operations with Neural Language Models.eng.srt

36.8 KB

Getting Passive Aggressive about False Positives.eng.srt

34.0 KB

On Adaptive Attacks to Adversarial Example Defenses.eng.srt

41.7 KB

Optimization for Attack Surface Exploration The Case of TLS.eng.srt

32.5 KB

/USENIX Security 2007/

16th USENIX Security Symposium (Security 2007).htm

23.6 KB

/.../16th USENIX Security Symposium (Security 2007)_files/

AW_PH_stacked.jpg

4.0 KB

back_border.gif

0.1 KB

bae_systems.gif

2.2 KB

dot_clear.gif

0.0 KB

dot_clear_002.gif

0.0 KB

dr_dobbs.gif

2.9 KB

evt-deter_button.jpg

13.6 KB

footer.gif

0.3 KB

fsm.jpg

6.6 KB

google.jpg

6.0 KB

grid_today.gif

1.9 KB

hpc.gif

2.6 KB

ieee_security.gif

2.2 KB

ittoolbox.gif

3.3 KB

left_bar.gif

0.1 KB

left_bottom.gif

0.7 KB

linux_journal.gif

1.6 KB

linuxProMagazine_webLogo.jpg

13.3 KB

long_bar.gif

0.1 KB

microsoft.gif

2.3 KB

new_usenix.jpg

20.6 KB

nostarch.gif

1.6 KB

questmark.gif

0.1 KB

queue.gif

1.5 KB

sec07.css

4.8 KB

security07_banner.jpg

71.7 KB

snia_logo.gif

1.3 KB

storagenetworking.gif

1.9 KB

symantec.jpg

4.8 KB

techxworld_logo.jpg

4.7 KB

userfriendly.gif

2.6 KB

/Presentations/

Active Hardware Metering for Intellectual Property Protection and Security - Yousra M. Alkabani, Farinaz Koushanfar.pdf

571.7 KB

Binary Obfuscation Using Signals - Igor V. Popov, Saumya K. Debray, Gregory R. Andrews.pdf

307.3 KB

BotHunter Detecting Malware Infection Through IDS-Driven Dialog Correlation - Guofei Gu, Phillip Porras, Vinod Yegneswaran, Martin Fong, Wenke Lee.pdf

339.4 KB

Combating Click Fraud via Premium Clicks - Ari Juels, Sid Stamm, Markus Jakobsson.pdf

467.0 KB

Devices That Tell on You Privacy Trends in Consumer Ubiquitous Computing - T. Scott Saponas, Jonathan Lester, Carl Hartung, Sameer Agarwal, Tadayoshi Kohno.pdf

1.1 MB

Discoverer Automatic Protocol Reverse Engineering from Network Traces - Weidong Cui, Jayanthkumar Kannan, Helen J. Wang.pdf

350.0 KB

Exploiting Concurrency Vulnerabilities in System Call Wrappers - watson.pdf

185.7 KB

Exploiting Network Structure for Proactive Spam Mitigation - Shobha Venkataraman, Subhabrata Sen, Oliver Spatscheck, Patrick Haffner, Dawn Song.pdf

371.8 KB

Flayer Exposing Application Internals - Will Drewry, Tavis Ormandy .pdf

82.9 KB

Halting Password Puzzles Hard-to-break Encryption from Human-memorable Keys - Xavier Boyen.pdf

633.0 KB

How To Obtain and Assert Composable Security - Ran Canetti.pdf

1.9 MB

Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords - Julie Thorpe, P.C. van Oorschot.pdf

914.0 KB

Integrity Checking in Cryptographic File Systems with Constant Trusted Storage - Alina Oprea, Michael K. Reiter.pdf

570.4 KB

Keep Your Enemies Close Distance Bounding Against Smartcard Relay Attacks - Saar Drimer, Steven J. Murdoch.pdf

740.2 KB

Language Identification of Encrypted VoIP Traffic Alejandra y Roberto or Alice and Bob - Charles V. Wright, Lucas Ballard, Fabian Monrose, Gerald M. Masson.pdf

356.0 KB

Memory Performance Attacks Denial of Memory Service in Multi-Core Systems - Thomas Moscibroda, Onur Mutlu.pdf

369.4 KB

Mobile Malware - Mikko Hypponen.pdf

1.2 MB

On Attack Causality in Internet-Connected Cellular Networks - Patrick Traynor, Patrick McDaniel, Thomas La Porta.pdf

1.2 MB

On Web Browsing Privacy in Anonymized NetFlows - S.E. Coull, M.P. Collins, C.V. Wright, F. Monrose, M.K. Reiter.pdf

419.3 KB

OSLO Improving the Security of Trusted Computing - Bernhard Kauer.pdf

247.1 KB

OSLO Improving the Security of Trusted Computing Paper - Bernhard Kauer.pdf

247.1 KB

Proximity Breeds Danger Emerging Threats in Metro-area Wireless Networks - P. Akritidis, W.Y. Chin, V.T. Lam, S. Sidiroglou, K.G. Anagnostakis.pdf

337.2 KB

Report of the California Voting Systems Review - David Wagner,.pdf

742.5 KB

Secretly Monopolizing the CPU Without Superuser Privileges - Dan Tsafrir, Yoav Etsion, Dror G. Feitelson.pdf

517.9 KB

Security 2007 Poster Session.htm

10.9 KB

SIF Enforcing Confidentiality and Integrity in Web Applications - Stephen Chong, K. Vikram, Andrew C. Myers.pdf

484.2 KB

Spamscatter Characterizing Internet Scam Hosting Infrastructure - David S. Anderson, Chris Fleizach, Stefan Savage, Geoffrey M. Voelker.pdf

383.2 KB

SpyProxy Execution-based Detection of Malicious Web Content - Alexander Moshchuk, Tanya Bragin, Damien Deville, Steven D. Gribble, Henry M. Levy.pdf

889.7 KB

The Human Factor in Online Fraud - Markus Jakobsson.pdf

36.9 MB

Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation - David Brumley, Juan Caballero, Zhenkai Liang.pdf

393.7 KB

Web-Based Inference Detection - Jessica Staddon, Philippe Golle, Bryce Zimny.pdf

377.2 KB

/.../Security 2007 Poster Session_files/

back_border.gif

0.1 KB

dot_clear.gif

0.0 KB

footer.gif

0.3 KB

left_bar.gif

0.1 KB

left_bottom.gif

0.7 KB

long_bar.gif

0.1 KB

new_usenix.jpg

20.6 KB

questmark.gif

0.1 KB

sec07.css

4.8 KB

security07_banner.jpg

71.7 KB

/USENIX Security 2008/

17th USENIX Security Symposium (USENIX Security 2008).htm

27.3 KB

Dr. Strangevote or How I Learned to Stop Worrying and Love the Paper Ballot - Debra Bowen.mp4

143.8 MB

Lest We Remember Cold Boot Attacks on Encryption Keys - J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ariel J. Feldman.mp3

25.9 MB

USENIX Security 2008 Technical Sessions.htm

72.4 KB

USENIX Security 2008 WiPs.htm

14.9 KB

/.../17th USENIX Security Symposium (USENIX Security 2008)_files/

AW_PH_stacked.gif

1.2 KB

bae_systems.gif

2.2 KB

barracuda.gif

1.9 KB

betanews.gif

2.8 KB

ciscopress.gif

0.9 KB

DDJ.gif

1.6 KB

dot_clear.gif

0.0 KB

dot_clear_002.gif

0.0 KB

evt_cset_button.jpg

5.5 KB

footer.gif

0.3 KB

fsm.gif

1.5 KB

google.jpg

6.0 KB

hdj.gif

1.5 KB

ibm_research.gif

1.4 KB

ieee_security.gif

2.1 KB

infosecnews.gif

3.0 KB

ists_logo.gif

1.8 KB

ittoolbox.gif

1.3 KB

left_bar.gif

0.1 KB

left_bottom.gif

0.4 KB

linux.gif

0.6 KB

linux_gazette.gif

3.8 KB

linux_journal.gif

1.7 KB

linuxpro.gif

1.0 KB

longbar.gif

0.1 KB

lxer.gif

1.2 KB

microsoft_research.gif

2.3 KB

netwitness.gif

1.5 KB

new_usenix.jpg

20.6 KB

nostarch.gif

1.6 KB

questmark.gif

0.1 KB

queue.gif

1.5 KB

sec08_banner_750.jpg

102.2 KB

storage_networking.gif

2.8 KB

the_register.gif

1.8 KB

usenix_face.gif

0.4 KB

user_friendly.gif

2.6 KB

/.../USENIX Security 2008 captions/

Dr. Strangevote or How I Learned to Stop Worrying and Love the Paper Ballot - Debra Bowen.eng.json

3.7 MB

Dr. Strangevote or How I Learned to Stop Worrying and Love the Paper Ballot - Debra Bowen.eng.lrc

99.2 KB

Dr. Strangevote or How I Learned to Stop Worrying and Love the Paper Ballot - Debra Bowen.eng.srt

94.4 KB

Dr. Strangevote or How I Learned to Stop Worrying and Love the Paper Ballot - Debra Bowen.eng.text

71.4 KB

Dr. Strangevote or How I Learned to Stop Worrying and Love the Paper Ballot - Debra Bowen.eng.tsv

87.0 KB

Dr. Strangevote or How I Learned to Stop Worrying and Love the Paper Ballot - Debra Bowen.eng.txt

100.2 KB

Dr. Strangevote or How I Learned to Stop Worrying and Love the Paper Ballot - Debra Bowen.eng.vtt

88.9 KB

/.../USENIX Security 2008 Presentations/

A Couple Billion Lines of Code Later Static Checking in the Real World Slides - Dawson Engler, Ben Chelf, Andy Chou, Seth Hallem.pdf

933.7 KB

All Your iFRAMEs Point to Us - Niels Provos, Panayiotis Mavrommatis, Moheeb Abu Rajab, Fabian Monrose.pdf

474.1 KB

An Empirical Security Study of the Native Code in the JDK - Gang Tan, Jason Croft.pdf

210.3 KB

An Improved Clock-skew Measurement Technique for Revealing Hidden Services - Sebastian Zander, Steven J. Murdoch.pdf

685.0 KB

An Improved Clock-skew Measurement Technique for Revealing Hidden Services.htm

111.2 KB

AutoISES Automatically Inferring Security Specification and Detecting Violations - Lin Tan, Xiaolan Zhang, Xiao Ma, Weiwei Xiong, Yuanyuan Zhou.pdf

550.0 KB

Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking - Michael Martin, Monica S. Lam.pdf

252.9 KB

BotMiner Clustering Analysis of Network Traffic for Protocol and Structure-Independent Botnet Detection - Guofei Gu, Roberto Perdisci, Junjie Zhang, Wenke Lee.pdf

425.1 KB

CloudAV N-Version Antivirus in the Network Cloud - Jon Oberheide, Evan Cooke, Farnam Jahanian.pdf

885.7 KB

Enterprise Security in the Brave New (Virtual) World - Tal Garfinkel.pdf

2.0 MB

Hackernomics Slides - Hugh Thompson.pdf

417.2 KB

Helios Web-based Open-Audit Voting - Ben Adida.pdf

1.2 MB

Highly Predictive Blacklisting - Jian Zhang, Phillip Porras, Johannes Ullrich.pdf

431.3 KB

Hypervisor Support for Identifying Covertly Executing Binaries - Lionel Litty, H. Andrs Lagar-Cavilla, David Lie.pdf

616.9 KB

Lest We Remember - Cold Boot Attacks on Encryption Keys - J. Alex Haldermam, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ar.pdf

1.9 MB

Lest We Remember - Cold Boot Attacks on Encryption Keys.htm

122.7 KB

Measurement and Classification of Humans and Bots in Internet Chat - Steven Gianvecchio, Mengjun Xie, Zhengyu Wu, Haining Wang.pdf

421.6 KB

Multi-flow Attacks Against Network Flow Watermarking Schemes - Negar Kiyavash, Amir Houmansadr, Nikita Borisov.pdf

719.4 KB

NetAuth Supporting User-Based Network Services - Manigandan Radhakrishnan, Jon A. Solworth.pdf

228.0 KB

Panalyst Privacy-Aware Remote Error Analysis on Commodity Software - Rui Wang, XiaoFeng Wang, Zhuowei Li.pdf

1.1 MB

Political DDoS Estonia and Beyond Slides - Jose Nazario.pdf

5.1 MB

Practical Symmetric Key Cryptography on Modern Graphics Hardware - Owen Harrison, John Waldron.pdf

325.9 KB

Practical Symmetric Key Cryptography on Modern Graphics Hardware.htm

77.8 KB

Privacy-Preserving Location Tracking of Lost or Stolen Devices Cryptographic Techniques and Replacing Trusted Third Parties with DHTs - Thomas Ristenpart, Gabriel Ma.pdf

297.3 KB

Proactive Surge Protection A Defense Mechanism for Bandwidth-Based Attacks - Jerry Chou, Bill Lin, Subhabrata Sen, Oliver Spatscheck.pdf

802.2 KB

Real-World Buffer Overflow Protection for Userspace and Kernelspace - Michael Dalton, Hari Kannan, Christos Kozyrakis.pdf

283.3 KB

Reverse-Engineering a Cryptographic RFID Tag - Karsten Nohl, David Evans, Starbug, Henryk Platz.pdf

282.1 KB

Reverse-Engineering a Cryptographic RFID Tag.htm

45.1 KB

Securing Frame Communication in Browsers - Adam Barth, Collin Jackson, John C. Mitchell.pdf

1.0 MB

Security Analysis of Network Protocols Slides - John Mitchell.pdf

743.2 KB

Selective Versioning in a Secure Disk System - Swaminathan Sundararaman, Gopalan Sivathanu, Erez Zadok.pdf

283.3 KB

Setting DNS's Hair on Fire - Niels Provos, David Dagon, Paul Vixie.pdf

811.2 KB

The Practical Subtleties of Biometric Key Generation - Lucas Ballard, Seny Kamara, Michael K. Reiter.pdf

313.5 KB

The Practical Subtleties of Biometric Key Generation.htm

180.6 KB

To Catch a Predator A Natural Language Approach for Eliciting Malicious Payloads - Sam Small, Joshua Mason, Fabian Monrose, Niels Provos, Adam Stubblefield.pdf

409.4 KB

Unidirectional Key Distribution Across Time and Space with Applications to RFID Security - Ari Juels, Ravikanth Pappu, Bryan Parno.pdf

564.6 KB

USENIX Security 2008 Poster Session.htm

11.2 KB

Verifying Compliance of Trusted Programs - Sandra Rueda, Dave King, Trent Jaeger.pdf

307.7 KB

VoteBox A Tamper-evident, Verifiable Electronic Voting System - Daniel Sandler, Kyle Derr, Dan S. Wallach.pdf

508.9 KB

/.../An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/

improved-skew-est-camera.css

5.8 KB

improved-skew-est-camera0x.png

0.6 KB

improved-skew-est-camera1x.png

7.0 KB

improved-skew-est-camera2x.png

0.5 KB

improved-skew-est-camera3x.png

0.6 KB

improved-skew-est-camera4x.png

102.0 KB

improved-skew-est-camera5x.png

35.4 KB

improved-skew-est-camera6x.png

35.4 KB

improved-skew-est-camera7x.png

0.5 KB

improved-skew-est-camera8x.png

6.1 KB

improved-skew-est-camera9x.png

24.3 KB

improved-skew-est-camera10x.png

26.2 KB

improved-skew-est-camera11x.png

76.8 KB

improved-skew-est-camera12x.png

86.4 KB

improved-skew-est-camera13x.png

22.0 KB

improved-skew-est-camera14x.png

28.8 KB

improved-skew-est-camera15x.png

63.9 KB

improved-skew-est-camera16x.png

20.9 KB

improved-skew-est-camera17x.png

24.2 KB

improved-skew-est-camera18x.png

20.4 KB

improved-skew-est-camera19x.png

70.1 KB

improved-skew-est-camera20x.png

21.6 KB

improved-skew-est-camera21x.png

33.2 KB

improved-skew-est-camera22x.png

135.5 KB

improved-skew-est-camera23x.png

118.4 KB

improved-skew-est-camera24x.png

20.5 KB

improved-skew-est-camera25x.png

65.8 KB

improved-skew-est-camera26x.png

57.8 KB

improved-skew-est-camera27x.png

60.9 KB

improved-skew-est-camera28x.png

68.4 KB

improved-skew-est-camera29x.png

80.8 KB

new_usenix.jpg

20.6 KB

/.../Lest We Remember - Cold Boot Attacks on Encryption Keys_files/

memory_2.jpg

405.5 KB

memory_5.jpg

440.7 KB

memory_6.jpg

395.6 KB

mona_5s.png

297.5 KB

mona_30s.png

338.1 KB

mona_60s.png

332.0 KB

mona_300s.png

127.9 KB

new_usenix.jpg

20.6 KB

ramjet_5100.png

13.2 KB

toshiba_lenovo.png

14.0 KB

x60_t43p.png

15.6 KB

/.../Practical Symmetric Key Cryptography on Modern Graphics Hardware_files/

img1.png

0.2 KB

img2.png

0.1 KB

img3.png

1.1 KB

img4.png

1.2 KB

img5.png

1.0 KB

img6.png

0.7 KB

img7.png

3.0 KB

img8.png

8.1 KB

img9.png

7.1 KB

img10.png

5.9 KB

img11.png

5.4 KB

img12.png

9.6 KB

img13.png

9.0 KB

img14.png

7.0 KB

img15.png

4.9 KB

new_usenix.jpg

20.6 KB

usenix_layout_html.css

0.9 KB

/.../Reverse-Engineering a Cryptographic RFID Tag_files/

c1.png

24.5 KB

Mifare-anotated.jpg

70.5 KB

Mifare-orig-scale.jpg

50.8 KB

new_usenix.jpg

20.6 KB

/.../The Practical Subtleties of Biometric Key Generation_files/

bkgs.css

1.0 KB

fw-search.png

10.1 KB

img1.png

0.3 KB

img2.png

0.3 KB

img3.png

0.3 KB

img4.png

0.3 KB

img5.png

0.4 KB

img6.png

0.6 KB

img7.png

0.4 KB

img8.png

0.2 KB

img9.png

0.2 KB

img10.png

0.1 KB

img11.png

0.6 KB

img12.png

0.2 KB

img13.png

0.2 KB

img14.png

0.4 KB

img15.png

0.2 KB

img16.png

0.2 KB

img17.png

0.2 KB

img18.png

0.3 KB

img19.png

0.2 KB

img20.png

0.3 KB

img21.png

0.4 KB

img22.png

0.5 KB

img23.png

0.5 KB

img24.png

0.5 KB

img25.png

0.3 KB

img26.png

0.2 KB

img27.png

1.0 KB

img28.png

0.3 KB

img29.png

0.3 KB

img30.png

0.2 KB

img31.png

0.2 KB

img32.png

0.3 KB

img33.png

0.3 KB

img34.png

0.3 KB

img35.png

0.4 KB

img36.png

0.5 KB

img37.png

0.5 KB

img38.png

0.5 KB

img39.png

0.2 KB

img40.png

0.8 KB

img41.png

0.6 KB

img42.png

0.7 KB

img43.png

0.4 KB

img44.png

0.2 KB

img45.png

0.2 KB

img46.png

0.2 KB

img47.png

0.8 KB

img48.png

0.2 KB

img49.png

1.0 KB

img50.png

0.4 KB

img51.png

0.2 KB

img52.png

0.3 KB

img53.png

0.3 KB

img54.png

0.3 KB

img55.png

0.4 KB

img56.png

0.7 KB

img57.png

0.8 KB

img58.png

1.0 KB

img60.png

0.4 KB

img61.png

0.2 KB

img62.png

0.3 KB

img63.png

0.7 KB

img64.png

0.3 KB

img65.png

0.3 KB

img66.png

0.6 KB

img67.png

0.2 KB

img68.png

0.7 KB

img69.png

0.5 KB

img70.png

0.8 KB

img71.png

0.3 KB

img72.png

0.6 KB

img73.png

0.5 KB

img74.png

0.2 KB

img75.png

0.3 KB

img76.png

0.2 KB

img77.png

0.2 KB

img78.png

0.2 KB

img79.png

0.4 KB

img80.png

0.3 KB

img81.png

0.6 KB

img82.png

0.5 KB

img83.png

0.6 KB

img84.png

0.4 KB

img85.png

0.3 KB

img86.png

0.3 KB

img87.png

0.3 KB

img88.png

0.4 KB

img89.png

0.3 KB

img90.png

0.4 KB

img91.png

0.3 KB

img92.png

0.7 KB

img93.png

0.4 KB

img95.png

0.3 KB

img96.png

0.3 KB

img97.png

0.3 KB

img98.png

0.7 KB

img99.png

0.8 KB

img100.png

0.8 KB

img101.png

0.5 KB

img102.png

0.5 KB

img103.png

0.9 KB

img104.png

0.5 KB

img105.png

0.7 KB

img106.png

0.5 KB

img107.png

0.3 KB

img108.png

0.4 KB

img109.png

0.4 KB

img110.png

0.4 KB

img111.png

0.6 KB

img112.png

0.3 KB

img113.png

0.3 KB

img114.png

0.2 KB

img115.png

0.3 KB

img116.png

0.3 KB

img117.png

0.3 KB

img118.png

0.2 KB

img119.png

0.8 KB

img120.png

0.6 KB

img121.png

0.5 KB

img122.png

0.6 KB

img123.png

0.4 KB

img124.png

0.4 KB

img125.png

0.1 KB

img126.png

0.7 KB

img127.png

1.0 KB

img128.png

0.9 KB

img129.png

1.2 KB

img130.png

0.2 KB

img131.png

0.3 KB

img132.png

0.2 KB

img133.png

0.3 KB

img134.png

0.5 KB

img135.png

0.3 KB

img136.png

0.2 KB

img137.png

0.3 KB

img138.png

0.3 KB

img139.png

0.8 KB

img140.png

0.3 KB

img141.png

0.3 KB

img142.png

0.8 KB

img143.png

0.3 KB

img144.png

1.0 KB

img145.png

1.2 KB

img146.png

0.8 KB

img147.png

0.3 KB

img148.png

0.3 KB

img149.png

0.6 KB

img150.png

0.2 KB

img151.png

1.4 KB

img152.png

0.2 KB

img153.png

0.3 KB

img154.png

0.3 KB

img155.png

2.5 KB

img156.png

0.5 KB

img157.png

0.2 KB

img158.png

0.9 KB

img159.png

0.6 KB

img160.png

0.7 KB

img161.png

0.3 KB

img162.png

1.6 KB

img163.png

0.9 KB

img164.png

0.2 KB

img165.png

1.6 KB

img166.png

1.2 KB

img167.png

0.3 KB

img168.png

0.4 KB

img169.png

2.3 KB

img170.png

0.4 KB

img171.png

2.0 KB

img172.png

0.4 KB

img173.png

2.1 KB

img174.png

0.8 KB

img175.png

0.5 KB

img176.png

0.4 KB

img177.png

5.8 KB

img178.png

0.7 KB

img179.png

0.7 KB

img180.png

0.6 KB

img181.png

0.7 KB

img182.png

0.3 KB

new_usenix.jpg

20.6 KB

viel-search.png

13.1 KB

/.../USENIX Security 2008 Poster Session_files/

dot_clear.gif

0.0 KB

footer.gif

0.3 KB

left_bar.gif

0.1 KB

left_bottom.gif

0.4 KB

longbar.gif

0.1 KB

new_usenix.jpg

20.6 KB

questmark.gif

0.1 KB

sec08_banner_750.jpg

102.2 KB

/.../USENIX Security 2008 Technical Sessions_files/

bowen_debra.jpg

5.0 KB

dot_clear.gif

0.0 KB

footer.gif

0.3 KB

left_bar.gif

0.1 KB

left_bottom.gif

0.4 KB

longbar.gif

0.1 KB

mp3_icon.gif

0.8 KB

questmark.gif

0.1 KB

sec08_banner_750.jpg

102.2 KB

video_icon.gif

1.3 KB

/.../USENIX Security 2008 WiPs_files/

dot_clear.gif

0.0 KB

footer.gif

0.3 KB

left_bar.gif

0.1 KB

left_bottom.gif

0.4 KB

longbar.gif

0.1 KB

new_usenix.jpg

20.6 KB

questmark.gif

0.1 KB

sec08_banner_750.jpg

102.2 KB

/USENIX Security 2009/

18th USENIX Security Symposium (USENIX Security 2009).htm

26.6 KB

A Practical Congestion Attack on Tor Using Long Paths - Nathan S. Evans, Roger Dingledine, Christian Grothoff.mp4

8.0 MB

Android Securing a Mobile Platform from the Ground Up - Rich Cannings.mp4

21.4 MB

Baggy Bounds Checking An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors - Periklis Akritidis, Manuel Costa, Miguel Castro, Steven Hand.mp4

22.2 MB

CCCP Secure Remote Storage for Computational RFIDs - Mastooreh Salajegheh, Shane Clark, Benjamin Ransford, Kevin Fu, Ari Juels.mp4

11.0 MB

Compromising Electromagnetic Emanations of Wired and Wireless Keyboards - Martin Vuagnoux, Sylvain Pasini.mp4

9.9 MB

Crying Wolf An Empirical Study of SSL Warning Effectiveness - Joshua Sunshine, Serge Egelman, Hazim Almuhimedi, Neha Atri, and Lorrie Faith Cranor.mp4

8.8 MB

Designing Trustworthy User Agents for a Hostile Web - Eric Lawrence.mp4

11.1 MB

Detecting Spammers with SNARE Spatio-temporal Network-level Automatic Reputation Engine - Shuang Hao, Nadeem Ahmed Syed, Nick Feamster, Alexander G. Gray, Sven Krasser.mp4

8.6 MB

Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs - David Molnar, Xue Cong Li, and David A. Wagner.mp4

6.7 MB

Effective and Efficient Malware Detection at the End Host - Clemens Kolbitsch, Paolo Milani Comparetti, Christopher Kruegel, Engin Kirda, Sophia Antipolis, Xiaoyong Zhou, Xia.mp4

8.7 MB

Efficient Data Structures for Tamper-Evident Logging - Scott A. Crosby, Dan S. Wallach.mp4

6.6 MB

GATEKEEPER Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code - Salvatore Guarnieri, Benjamin Livshits.mp4

7.2 MB

Hash Functions and Their Many Uses in Cryptography - Shai Halevi.mp4

17.9 MB

Improving Tor using a TCP-over-DTLS Tunnel - Joel Reardon, Ian Goldberg.mp4

15.7 MB

Keynote Address - Rich Cannings.mp4

7.1 MB

Locating Prefix Hijackers using LOCK - Tongqing Qiu, Lusheng Ji, Dan Pei, Jia Wang, Jun (Jim) Xu, Hitesh Ballani.mp4

8.5 MB

Memory Safety for Low-Level Software Hardware Interactions - John Criswell, Nicolas Geoffray, Pierre et Marie Curie, Vikram Adve.mp4

7.6 MB

Modern Exploitation and Memory Protection Bypasses - Alexander Sotirov.mp4

26.5 MB

NOZZLE A Defense Against Heap-spraying Code Injection Attacks - Paruj Ratanaworabhan, Benjamin Livshits, Benjamin Zorn.mp4

11.6 MB

Opening Remarks - Fabian Monrose.mp3

30.2 KB

Peeping Tom in the Neighborhood Keystroke Eavesdropping on Multi-User Systems - Kehuan Zhang, XiaoFeng Wang.mov

49.2 MB

Physical-layer Identification of RFID Devices - Boris Danev, Thomas S. Heydt-Benjamin, Srdjan Capkun.mp4

7.2 MB

Protecting Confidential Data on Personal Computers with Storage Capsules - Kevin Borders, Eric Vander Weele, Billy Lau, Atul Prakash.mp4

8.0 MB

Return-Oriented Rootkits Bypassing Kernel Code Integrity Protection Mechanisms - Ralf Hund, Thorsten Holz, Felix C. Freiling.mp4

8.7 MB

Static Enforcement of Web Application Integrity Through Strong Typing - William Robertson, Giovanni Vigna.mp4

6.7 MB

The Multi-Principal OS Construction of the Gazelle Web Browser.mp4

7.4 MB

Top Ten Web Hacking Techniques of 2008 What's possible, not probable - Jeremiah Grossman.mp4

16.6 MB

Toward a New Legal Framework for Cybersecurity - Deirdre K. Mulligan.mp4

28.9 MB

USENIX Security 2009 Technical Sessions.htm

81.7 KB

USENIX Security 2009 WiPs.htm

26.2 KB

Vanish Increasing Data Privacy with Self-Destructing Data - Roxana Geambasu, Tadayoshi Kohno, Amit A. Levy, Henry M. Levy.mp4

16.8 MB

VPriv Protecting Privacy in Location-Based Vehicular Services - Raluca Ada Popa, Hari Balakrishnan, Andrew J. Blumberg.mp4

8.2 MB

Work-in-Progress Reports (WiPs) - Session Chair Sven Dietrich.mp4

23.0 MB

xBook Redesigning Privacy Control in Social Networking Platforms - Kapil Singh, Sumeer Bhola, Wenke Lee.mp4

8.2 MB

/.../18th USENIX Security Symposium (USENIX Security 2009)_files/

acmqueue_new_100x32.jpg

1.9 KB

aw_ph.gif

1.4 KB

betanews_125x23.jpg

2.0 KB

challenge_button_170x107.jpg

18.0 KB

ciscopress.gif

0.6 KB

confguru_125x34.jpg

2.3 KB

cset09_button_170x73.jpg

6.3 KB

dfrws_button.jpg

5.1 KB

dmtf_logo_100.gif

1.4 KB

dot_clear.gif

0.0 KB

dot_clear_002.gif

0.0 KB

evtwote09_button_170x73.jpg

6.5 KB

footer.gif

0.3 KB

fsm_125x36.gif

2.0 KB

google_140x58.gif

3.5 KB

hackett_bankwell_125x81.jpg

6.5 KB

hns_125_50.jpg

3.8 KB

hotsec09_button_170x74.jpg

6.8 KB

ibm_research_145x15.jpg

1.7 KB

ieee_sp_125x30.gif

1.7 KB

infosecnews_100x80.gif

1.7 KB

left_bar.gif

0.1 KB

left_bottom.gif

0.5 KB

linux_gazette_125x125.gif

3.8 KB

linux_journal_100x48.jpg

3.5 KB

linuxpro_100x38.gif

1.2 KB

longbar.gif

0.1 KB

lxer_80x28.gif

0.9 KB

meraki_logo_145x58.jpg

2.1 KB

metricon09_button_170x74.jpg

5.7 KB

microsoft_research_150.gif

1.4 KB

network_world_itr_125x27.gif

1.4 KB

new_usenix.jpg

20.6 KB

nostarch_90x104.jpg

3.7 KB

questmark.gif

0.1 KB

sec09_banner.jpg

35.3 KB

toolbox_100x76.gif

3.0 KB

usenix_face.gif

0.4 KB

userfriendly_125x26.gif

1.2 KB

woot09_button_170x72.jpg

6.4 KB

/.../USENIX Security 2009 captions/

A Practical Congestion Attack on Tor Using Long Paths - Nathan S. Evans, Roger Dingledine, Christian Grothoff.eng.json

1.2 MB

A Practical Congestion Attack on Tor Using Long Paths - Nathan S. Evans, Roger Dingledine, Christian Grothoff.eng.lrc

30.2 KB

A Practical Congestion Attack on Tor Using Long Paths - Nathan S. Evans, Roger Dingledine, Christian Grothoff.eng.srt

31.1 KB

A Practical Congestion Attack on Tor Using Long Paths - Nathan S. Evans, Roger Dingledine, Christian Grothoff.eng.text

23.5 KB

A Practical Congestion Attack on Tor Using Long Paths - Nathan S. Evans, Roger Dingledine, Christian Grothoff.eng.tsv

27.2 KB

A Practical Congestion Attack on Tor Using Long Paths - Nathan S. Evans, Roger Dingledine, Christian Grothoff.eng.txt

30.5 KB

A Practical Congestion Attack on Tor Using Long Paths - Nathan S. Evans, Roger Dingledine, Christian Grothoff.eng.vtt

29.0 KB

Android Securing a Mobile Platform from the Ground Up - Rich Cannings.eng.json

3.0 MB

Android Securing a Mobile Platform from the Ground Up - Rich Cannings.eng.lrc

85.4 KB

Android Securing a Mobile Platform from the Ground Up - Rich Cannings.eng.srt

82.7 KB

Android Securing a Mobile Platform from the Ground Up - Rich Cannings.eng.text

56.9 KB

Android Securing a Mobile Platform from the Ground Up - Rich Cannings.eng.tsv

73.3 KB

Android Securing a Mobile Platform from the Ground Up - Rich Cannings.eng.txt

86.5 KB

Android Securing a Mobile Platform from the Ground Up - Rich Cannings.eng.vtt

75.9 KB

Baggy Bounds Checking An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors - Periklis Akritidis, Manuel Costa, Miguel Castro, Steven Hand.eng.json

4.1 MB

Baggy Bounds Checking An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors - Periklis Akritidis, Manuel Costa, Miguel Castro, Steven Hand.eng.lrc

113.9 KB

Baggy Bounds Checking An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors - Periklis Akritidis, Manuel Costa, Miguel Castro, Steven Hand.eng.srt

98.2 KB

Baggy Bounds Checking An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors - Periklis Akritidis, Manuel Costa, Miguel Castro, Steven Hand.eng.text

72.0 KB

Baggy Bounds Checking An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors - Periklis Akritidis, Manuel Costa, Miguel Castro, Steven Hand.eng.tsv

95.6 KB

Baggy Bounds Checking An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors - Periklis Akritidis, Manuel Costa, Miguel Castro, Steven Hand.eng.txt

115.4 KB

Baggy Bounds Checking An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors - Periklis Akritidis, Manuel Costa, Miguel Castro, Steven Hand.eng.vtt

91.6 KB

CCCP Secure Remote Storage for Computational RFIDs - Mastooreh Salajegheh, Shane Clark, Benjamin Ransford, Kevin Fu, Ari Juels.eng.json

1.3 MB

CCCP Secure Remote Storage for Computational RFIDs - Mastooreh Salajegheh, Shane Clark, Benjamin Ransford, Kevin Fu, Ari Juels.eng.lrc

32.8 KB

CCCP Secure Remote Storage for Computational RFIDs - Mastooreh Salajegheh, Shane Clark, Benjamin Ransford, Kevin Fu, Ari Juels.eng.srt

33.6 KB

CCCP Secure Remote Storage for Computational RFIDs - Mastooreh Salajegheh, Shane Clark, Benjamin Ransford, Kevin Fu, Ari Juels.eng.text

23.5 KB

CCCP Secure Remote Storage for Computational RFIDs - Mastooreh Salajegheh, Shane Clark, Benjamin Ransford, Kevin Fu, Ari Juels.eng.tsv

28.8 KB

CCCP Secure Remote Storage for Computational RFIDs - Mastooreh Salajegheh, Shane Clark, Benjamin Ransford, Kevin Fu, Ari Juels.eng.txt

33.1 KB

CCCP Secure Remote Storage for Computational RFIDs - Mastooreh Salajegheh, Shane Clark, Benjamin Ransford, Kevin Fu, Ari Juels.eng.vtt

30.8 KB

Compromising Electromagnetic Emanations of Wired and Wireless Keyboards - Martin Vuagnoux, Sylvain Pasini.eng.json

1.4 MB

Compromising Electromagnetic Emanations of Wired and Wireless Keyboards - Martin Vuagnoux, Sylvain Pasini.eng.lrc

35.9 KB

Compromising Electromagnetic Emanations of Wired and Wireless Keyboards - Martin Vuagnoux, Sylvain Pasini.eng.srt

38.7 KB

Compromising Electromagnetic Emanations of Wired and Wireless Keyboards - Martin Vuagnoux, Sylvain Pasini.eng.text

25.5 KB

Compromising Electromagnetic Emanations of Wired and Wireless Keyboards - Martin Vuagnoux, Sylvain Pasini.eng.tsv

31.5 KB

Compromising Electromagnetic Emanations of Wired and Wireless Keyboards - Martin Vuagnoux, Sylvain Pasini.eng.txt

36.3 KB

Compromising Electromagnetic Emanations of Wired and Wireless Keyboards - Martin Vuagnoux, Sylvain Pasini.eng.vtt

34.9 KB

Crying Wolf An Empirical Study of SSL Warning Effectiveness - Joshua Sunshine, Serge Egelman, Hazim Almuhimedi, Neha Atri, and Lorrie Faith Cranor.eng.json

1.5 MB

Crying Wolf An Empirical Study of SSL Warning Effectiveness - Joshua Sunshine, Serge Egelman, Hazim Almuhimedi, Neha Atri, and Lorrie Faith Cranor.eng.lrc

41.0 KB

Crying Wolf An Empirical Study of SSL Warning Effectiveness - Joshua Sunshine, Serge Egelman, Hazim Almuhimedi, Neha Atri, and Lorrie Faith Cranor.eng.srt

40.9 KB

Crying Wolf An Empirical Study of SSL Warning Effectiveness - Joshua Sunshine, Serge Egelman, Hazim Almuhimedi, Neha Atri, and Lorrie Faith Cranor.eng.text

28.9 KB

Crying Wolf An Empirical Study of SSL Warning Effectiveness - Joshua Sunshine, Serge Egelman, Hazim Almuhimedi, Neha Atri, and Lorrie Faith Cranor.eng.tsv

35.8 KB

Crying Wolf An Empirical Study of SSL Warning Effectiveness - Joshua Sunshine, Serge Egelman, Hazim Almuhimedi, Neha Atri, and Lorrie Faith Cranor.eng.txt

41.5 KB

Crying Wolf An Empirical Study of SSL Warning Effectiveness - Joshua Sunshine, Serge Egelman, Hazim Almuhimedi, Neha Atri, and Lorrie Faith Cranor.eng.vtt

37.5 KB

Designing Trustworthy User Agents for a Hostile Web - Eric Lawrence.eng.json

1.4 MB

Designing Trustworthy User Agents for a Hostile Web - Eric Lawrence.eng.lrc

35.4 KB

Designing Trustworthy User Agents for a Hostile Web - Eric Lawrence.eng.srt

35.6 KB

Designing Trustworthy User Agents for a Hostile Web - Eric Lawrence.eng.text

25.1 KB

Designing Trustworthy User Agents for a Hostile Web - Eric Lawrence.eng.tsv

30.9 KB

Designing Trustworthy User Agents for a Hostile Web - Eric Lawrence.eng.txt

35.8 KB

Designing Trustworthy User Agents for a Hostile Web - Eric Lawrence.eng.vtt

32.6 KB

Detecting Spammers with SNARE Spatio-temporal Network-level Automatic Reputation Engine - Shuang Hao, Nadeem Ahmed Syed, Nick Feamster, Alexander G. Gray, Sven Krasser.eng.json

1.1 MB

Detecting Spammers with SNARE Spatio-temporal Network-level Automatic Reputation Engine - Shuang Hao, Nadeem Ahmed Syed, Nick Feamster, Alexander G. Gray, Sven Krasser.eng.lrc

28.8 KB

Detecting Spammers with SNARE Spatio-temporal Network-level Automatic Reputation Engine - Shuang Hao, Nadeem Ahmed Syed, Nick Feamster, Alexander G. Gray, Sven Krasser.eng.srt

31.5 KB

Detecting Spammers with SNARE Spatio-temporal Network-level Automatic Reputation Engine - Shuang Hao, Nadeem Ahmed Syed, Nick Feamster, Alexander G. Gray, Sven Krasser.eng.text

21.3 KB

Detecting Spammers with SNARE Spatio-temporal Network-level Automatic Reputation Engine - Shuang Hao, Nadeem Ahmed Syed, Nick Feamster, Alexander G. Gray, Sven Krasser.eng.tsv

25.6 KB

Detecting Spammers with SNARE Spatio-temporal Network-level Automatic Reputation Engine - Shuang Hao, Nadeem Ahmed Syed, Nick Feamster, Alexander G. Gray, Sven Krasser.eng.txt

29.1 KB

Detecting Spammers with SNARE Spatio-temporal Network-level Automatic Reputation Engine - Shuang Hao, Nadeem Ahmed Syed, Nick Feamster, Alexander G. Gray, Sven Krasser.eng.vtt

28.6 KB

Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs - David Molnar, Xue Cong Li, and David A. Wagner.eng.json

1.4 MB

Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs - David Molnar, Xue Cong Li, and David A. Wagner.eng.lrc

38.6 KB

Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs - David Molnar, Xue Cong Li, and David A. Wagner.eng.srt

31.2 KB

Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs - David Molnar, Xue Cong Li, and David A. Wagner.eng.text

23.3 KB

Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs - David Molnar, Xue Cong Li, and David A. Wagner.eng.tsv

31.8 KB

Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs - David Molnar, Xue Cong Li, and David A. Wagner.eng.txt

39.2 KB

Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs - David Molnar, Xue Cong Li, and David A. Wagner.eng.vtt

28.9 KB

Effective and Efficient Malware Detection at the End Host - Clemens Kolbitsch, Paolo Milani Comparetti, Christopher Kruegel, Engin Kirda, Sophia Antipolis, Xiaoyong Zhou, Xia.eng.json

1.6 MB

Effective and Efficient Malware Detection at the End Host - Clemens Kolbitsch, Paolo Milani Comparetti, Christopher Kruegel, Engin Kirda, Sophia Antipolis, Xiaoyong Zhou, Xia.eng.lrc

44.3 KB

Effective and Efficient Malware Detection at the End Host - Clemens Kolbitsch, Paolo Milani Comparetti, Christopher Kruegel, Engin Kirda, Sophia Antipolis, Xiaoyong Zhou, Xia.eng.srt

39.8 KB

Effective and Efficient Malware Detection at the End Host - Clemens Kolbitsch, Paolo Milani Comparetti, Christopher Kruegel, Engin Kirda, Sophia Antipolis, Xiaoyong Zhou, Xia.eng.text

28.6 KB

Effective and Efficient Malware Detection at the End Host - Clemens Kolbitsch, Paolo Milani Comparetti, Christopher Kruegel, Engin Kirda, Sophia Antipolis, Xiaoyong Zhou, Xia.eng.tsv

37.8 KB

Effective and Efficient Malware Detection at the End Host - Clemens Kolbitsch, Paolo Milani Comparetti, Christopher Kruegel, Engin Kirda, Sophia Antipolis, Xiaoyong Zhou, Xia.eng.txt

44.9 KB

Effective and Efficient Malware Detection at the End Host - Clemens Kolbitsch, Paolo Milani Comparetti, Christopher Kruegel, Engin Kirda, Sophia Antipolis, Xiaoyong Zhou, Xia.eng.vtt

36.5 KB

Efficient Data Structures for Tamper-Evident Logging - Scott A. Crosby, Dan S. Wallach.eng.json

1.3 MB

Efficient Data Structures for Tamper-Evident Logging - Scott A. Crosby, Dan S. Wallach.eng.lrc

37.8 KB

Efficient Data Structures for Tamper-Evident Logging - Scott A. Crosby, Dan S. Wallach.eng.srt

33.5 KB

Efficient Data Structures for Tamper-Evident Logging - Scott A. Crosby, Dan S. Wallach.eng.text

23.7 KB

Efficient Data Structures for Tamper-Evident Logging - Scott A. Crosby, Dan S. Wallach.eng.tsv

31.5 KB

Efficient Data Structures for Tamper-Evident Logging - Scott A. Crosby, Dan S. Wallach.eng.txt

38.3 KB

Efficient Data Structures for Tamper-Evident Logging - Scott A. Crosby, Dan S. Wallach.eng.vtt

30.7 KB

GATEKEEPER Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code - Salvatore Guarnieri, Benjamin Livshits.eng.json

1.2 MB

GATEKEEPER Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code - Salvatore Guarnieri, Benjamin Livshits.eng.lrc

33.1 KB

GATEKEEPER Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code - Salvatore Guarnieri, Benjamin Livshits.eng.srt

28.4 KB

GATEKEEPER Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code - Salvatore Guarnieri, Benjamin Livshits.eng.text

20.5 KB

GATEKEEPER Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code - Salvatore Guarnieri, Benjamin Livshits.eng.tsv

27.4 KB

GATEKEEPER Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code - Salvatore Guarnieri, Benjamin Livshits.eng.txt

33.6 KB

GATEKEEPER Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code - Salvatore Guarnieri, Benjamin Livshits.eng.vtt

26.1 KB

Hash Functions and Their Many Uses in Cryptography - Shai Halevi.eng.json

3.3 MB

Hash Functions and Their Many Uses in Cryptography - Shai Halevi.eng.lrc

94.4 KB

Hash Functions and Their Many Uses in Cryptography - Shai Halevi.eng.srt

78.6 KB

Hash Functions and Their Many Uses in Cryptography - Shai Halevi.eng.text

57.9 KB

Hash Functions and Their Many Uses in Cryptography - Shai Halevi.eng.tsv

79.1 KB

Hash Functions and Their Many Uses in Cryptography - Shai Halevi.eng.txt

95.8 KB

Hash Functions and Their Many Uses in Cryptography - Shai Halevi.eng.vtt

72.8 KB

Improving Tor using a TCP-over-DTLS Tunnel - Joel Reardon, Ian Goldberg.eng.json

1.7 MB

Improving Tor using a TCP-over-DTLS Tunnel - Joel Reardon, Ian Goldberg.eng.lrc

42.5 KB

Improving Tor using a TCP-over-DTLS Tunnel - Joel Reardon, Ian Goldberg.eng.srt

44.7 KB

Improving Tor using a TCP-over-DTLS Tunnel - Joel Reardon, Ian Goldberg.eng.text

32.4 KB

Improving Tor using a TCP-over-DTLS Tunnel - Joel Reardon, Ian Goldberg.eng.tsv

38.1 KB

Improving Tor using a TCP-over-DTLS Tunnel - Joel Reardon, Ian Goldberg.eng.txt

42.8 KB

Improving Tor using a TCP-over-DTLS Tunnel - Joel Reardon, Ian Goldberg.eng.vtt

41.2 KB

Keynote Address - Rich Cannings.eng.json

1.3 MB

Keynote Address - Rich Cannings.eng.lrc

32.2 KB

Keynote Address - Rich Cannings.eng.srt

37.0 KB

Keynote Address - Rich Cannings.eng.text

21.6 KB

Keynote Address - Rich Cannings.eng.tsv

27.5 KB

Keynote Address - Rich Cannings.eng.txt

32.6 KB

Keynote Address - Rich Cannings.eng.vtt

32.6 KB

Locating Prefix Hijackers using LOCK - Tongqing Qiu, Lusheng Ji, Dan Pei, Jia Wang, Jun (Jim) Xu, Hitesh Ballani.eng.json

1.2 MB

Locating Prefix Hijackers using LOCK - Tongqing Qiu, Lusheng Ji, Dan Pei, Jia Wang, Jun (Jim) Xu, Hitesh Ballani.eng.lrc

30.3 KB

Locating Prefix Hijackers using LOCK - Tongqing Qiu, Lusheng Ji, Dan Pei, Jia Wang, Jun (Jim) Xu, Hitesh Ballani.eng.srt

32.1 KB

Locating Prefix Hijackers using LOCK - Tongqing Qiu, Lusheng Ji, Dan Pei, Jia Wang, Jun (Jim) Xu, Hitesh Ballani.eng.text

22.1 KB

Locating Prefix Hijackers using LOCK - Tongqing Qiu, Lusheng Ji, Dan Pei, Jia Wang, Jun (Jim) Xu, Hitesh Ballani.eng.tsv

26.7 KB

Locating Prefix Hijackers using LOCK - Tongqing Qiu, Lusheng Ji, Dan Pei, Jia Wang, Jun (Jim) Xu, Hitesh Ballani.eng.txt

30.6 KB

Locating Prefix Hijackers using LOCK - Tongqing Qiu, Lusheng Ji, Dan Pei, Jia Wang, Jun (Jim) Xu, Hitesh Ballani.eng.vtt

29.2 KB

Memory Safety for Low-Level Software Hardware Interactions - John Criswell, Nicolas Geoffray, Pierre et Marie Curie, Vikram Adve.eng.json

1.2 MB

Memory Safety for Low-Level Software Hardware Interactions - John Criswell, Nicolas Geoffray, Pierre et Marie Curie, Vikram Adve.eng.lrc

38.0 KB

Memory Safety for Low-Level Software Hardware Interactions - John Criswell, Nicolas Geoffray, Pierre et Marie Curie, Vikram Adve.eng.srt

26.7 KB

Memory Safety for Low-Level Software Hardware Interactions - John Criswell, Nicolas Geoffray, Pierre et Marie Curie, Vikram Adve.eng.text

19.0 KB

Memory Safety for Low-Level Software Hardware Interactions - John Criswell, Nicolas Geoffray, Pierre et Marie Curie, Vikram Adve.eng.tsv

29.7 KB

Memory Safety for Low-Level Software Hardware Interactions - John Criswell, Nicolas Geoffray, Pierre et Marie Curie, Vikram Adve.eng.txt

38.7 KB

Memory Safety for Low-Level Software Hardware Interactions - John Criswell, Nicolas Geoffray, Pierre et Marie Curie, Vikram Adve.eng.vtt

24.4 KB

Modern Exploitation and Memory Protection Bypasses - Alexander Sotirov.eng.json

3.9 MB

Modern Exploitation and Memory Protection Bypasses - Alexander Sotirov.eng.lrc

114.6 KB

Modern Exploitation and Memory Protection Bypasses - Alexander Sotirov.eng.srt

94.2 KB

Modern Exploitation and Memory Protection Bypasses - Alexander Sotirov.eng.text

69.0 KB

Modern Exploitation and Memory Protection Bypasses - Alexander Sotirov.eng.tsv

94.4 KB

Modern Exploitation and Memory Protection Bypasses - Alexander Sotirov.eng.txt

116.2 KB

Modern Exploitation and Memory Protection Bypasses - Alexander Sotirov.eng.vtt

88.3 KB

NOZZLE A Defense Against Heap-spraying Code Injection Attacks - Paruj Ratanaworabhan, Benjamin Livshits, Benjamin Zorn.eng.json

1.9 MB

NOZZLE A Defense Against Heap-spraying Code Injection Attacks - Paruj Ratanaworabhan, Benjamin Livshits, Benjamin Zorn.eng.lrc

55.1 KB

NOZZLE A Defense Against Heap-spraying Code Injection Attacks - Paruj Ratanaworabhan, Benjamin Livshits, Benjamin Zorn.eng.srt

44.9 KB

NOZZLE A Defense Against Heap-spraying Code Injection Attacks - Paruj Ratanaworabhan, Benjamin Livshits, Benjamin Zorn.eng.text

32.9 KB

NOZZLE A Defense Against Heap-spraying Code Injection Attacks - Paruj Ratanaworabhan, Benjamin Livshits, Benjamin Zorn.eng.tsv

45.6 KB

NOZZLE A Defense Against Heap-spraying Code Injection Attacks - Paruj Ratanaworabhan, Benjamin Livshits, Benjamin Zorn.eng.txt

56.0 KB

NOZZLE A Defense Against Heap-spraying Code Injection Attacks - Paruj Ratanaworabhan, Benjamin Livshits, Benjamin Zorn.eng.vtt

41.3 KB

Physical-layer Identification of RFID Devices - Boris Danev, Thomas S. Heydt-Benjamin, Srdjan Capkun.eng.json

1.2 MB

Physical-layer Identification of RFID Devices - Boris Danev, Thomas S. Heydt-Benjamin, Srdjan Capkun.eng.lrc

33.6 KB

Physical-layer Identification of RFID Devices - Boris Danev, Thomas S. Heydt-Benjamin, Srdjan Capkun.eng.srt

29.3 KB

Physical-layer Identification of RFID Devices - Boris Danev, Thomas S. Heydt-Benjamin, Srdjan Capkun.eng.text

21.2 KB

Physical-layer Identification of RFID Devices - Boris Danev, Thomas S. Heydt-Benjamin, Srdjan Capkun.eng.tsv

28.3 KB

Physical-layer Identification of RFID Devices - Boris Danev, Thomas S. Heydt-Benjamin, Srdjan Capkun.eng.txt

34.1 KB

Physical-layer Identification of RFID Devices - Boris Danev, Thomas S. Heydt-Benjamin, Srdjan Capkun.eng.vtt

27.0 KB

Protecting Confidential Data on Personal Computers with Storage Capsules - Kevin Borders, Eric Vander Weele, Billy Lau, Atul Prakash.eng.json

1.1 MB

Protecting Confidential Data on Personal Computers with Storage Capsules - Kevin Borders, Eric Vander Weele, Billy Lau, Atul Prakash.eng.lrc

27.8 KB

Protecting Confidential Data on Personal Computers with Storage Capsules - Kevin Borders, Eric Vander Weele, Billy Lau, Atul Prakash.eng.srt

30.8 KB

Protecting Confidential Data on Personal Computers with Storage Capsules - Kevin Borders, Eric Vander Weele, Billy Lau, Atul Prakash.eng.text

21.5 KB

Protecting Confidential Data on Personal Computers with Storage Capsules - Kevin Borders, Eric Vander Weele, Billy Lau, Atul Prakash.eng.tsv

25.1 KB

Protecting Confidential Data on Personal Computers with Storage Capsules - Kevin Borders, Eric Vander Weele, Billy Lau, Atul Prakash.eng.txt

28.1 KB

Protecting Confidential Data on Personal Computers with Storage Capsules - Kevin Borders, Eric Vander Weele, Billy Lau, Atul Prakash.eng.vtt

28.2 KB

Return-Oriented Rootkits Bypassing Kernel Code Integrity Protection Mechanisms - Ralf Hund, Thorsten Holz, Felix C. Freiling.eng.json

1.3 MB

Return-Oriented Rootkits Bypassing Kernel Code Integrity Protection Mechanisms - Ralf Hund, Thorsten Holz, Felix C. Freiling.eng.lrc

37.8 KB

Return-Oriented Rootkits Bypassing Kernel Code Integrity Protection Mechanisms - Ralf Hund, Thorsten Holz, Felix C. Freiling.eng.srt

32.1 KB

Return-Oriented Rootkits Bypassing Kernel Code Integrity Protection Mechanisms - Ralf Hund, Thorsten Holz, Felix C. Freiling.eng.text

24.7 KB

Return-Oriented Rootkits Bypassing Kernel Code Integrity Protection Mechanisms - Ralf Hund, Thorsten Holz, Felix C. Freiling.eng.tsv

32.3 KB

Return-Oriented Rootkits Bypassing Kernel Code Integrity Protection Mechanisms - Ralf Hund, Thorsten Holz, Felix C. Freiling.eng.txt

38.3 KB

Return-Oriented Rootkits Bypassing Kernel Code Integrity Protection Mechanisms - Ralf Hund, Thorsten Holz, Felix C. Freiling.eng.vtt

30.0 KB

Static Enforcement of Web Application Integrity Through Strong Typing - William Robertson, Giovanni Vigna.eng.json

1.0 MB

Static Enforcement of Web Application Integrity Through Strong Typing - William Robertson, Giovanni Vigna.eng.lrc

28.5 KB

Static Enforcement of Web Application Integrity Through Strong Typing - William Robertson, Giovanni Vigna.eng.srt

25.4 KB

Static Enforcement of Web Application Integrity Through Strong Typing - William Robertson, Giovanni Vigna.eng.text

19.2 KB

Static Enforcement of Web Application Integrity Through Strong Typing - William Robertson, Giovanni Vigna.eng.tsv

24.4 KB

Static Enforcement of Web Application Integrity Through Strong Typing - William Robertson, Giovanni Vigna.eng.txt

28.8 KB

Static Enforcement of Web Application Integrity Through Strong Typing - William Robertson, Giovanni Vigna.eng.vtt

23.6 KB

The Multi-Principal OS Construction of the Gazelle Web Browser.eng.json

1.6 MB

The Multi-Principal OS Construction of the Gazelle Web Browser.eng.lrc

47.8 KB

The Multi-Principal OS Construction of the Gazelle Web Browser.eng.srt

37.2 KB

The Multi-Principal OS Construction of the Gazelle Web Browser.eng.text

28.6 KB

The Multi-Principal OS Construction of the Gazelle Web Browser.eng.tsv

39.5 KB

The Multi-Principal OS Construction of the Gazelle Web Browser.eng.txt

48.5 KB

The Multi-Principal OS Construction of the Gazelle Web Browser.eng.vtt

34.6 KB

Top Ten Web Hacking Techniques of 2008 What's possible, not probable - Jeremiah Grossman.eng.json

2.9 MB

Top Ten Web Hacking Techniques of 2008 What's possible, not probable - Jeremiah Grossman.eng.lrc

80.8 KB

Top Ten Web Hacking Techniques of 2008 What's possible, not probable - Jeremiah Grossman.eng.srt

70.0 KB

Top Ten Web Hacking Techniques of 2008 What's possible, not probable - Jeremiah Grossman.eng.text

53.2 KB

Top Ten Web Hacking Techniques of 2008 What's possible, not probable - Jeremiah Grossman.eng.tsv

69.5 KB

Top Ten Web Hacking Techniques of 2008 What's possible, not probable - Jeremiah Grossman.eng.txt

81.9 KB

Top Ten Web Hacking Techniques of 2008 What's possible, not probable - Jeremiah Grossman.eng.vtt

65.0 KB

Toward a New Legal Framework for Cybersecurity - Deirdre K. Mulligan.eng.json

4.9 MB

Toward a New Legal Framework for Cybersecurity - Deirdre K. Mulligan.eng.lrc

142.2 KB

Toward a New Legal Framework for Cybersecurity - Deirdre K. Mulligan.eng.srt

121.2 KB

Toward a New Legal Framework for Cybersecurity - Deirdre K. Mulligan.eng.text

90.3 KB

Toward a New Legal Framework for Cybersecurity - Deirdre K. Mulligan.eng.tsv

118.8 KB

Toward a New Legal Framework for Cybersecurity - Deirdre K. Mulligan.eng.txt

144.0 KB

Toward a New Legal Framework for Cybersecurity - Deirdre K. Mulligan.eng.vtt

114.0 KB

Vanish Increasing Data Privacy with Self-Destructing Data - Roxana Geambasu, Tadayoshi Kohno, Amit A. Levy, Henry M. Levy.eng.json

1.7 MB

Vanish Increasing Data Privacy with Self-Destructing Data - Roxana Geambasu, Tadayoshi Kohno, Amit A. Levy, Henry M. Levy.eng.lrc

47.8 KB

Vanish Increasing Data Privacy with Self-Destructing Data - Roxana Geambasu, Tadayoshi Kohno, Amit A. Levy, Henry M. Levy.eng.srt

40.4 KB

Vanish Increasing Data Privacy with Self-Destructing Data - Roxana Geambasu, Tadayoshi Kohno, Amit A. Levy, Henry M. Levy.eng.text

29.5 KB

Vanish Increasing Data Privacy with Self-Destructing Data - Roxana Geambasu, Tadayoshi Kohno, Amit A. Levy, Henry M. Levy.eng.tsv

40.0 KB

Vanish Increasing Data Privacy with Self-Destructing Data - Roxana Geambasu, Tadayoshi Kohno, Amit A. Levy, Henry M. Levy.eng.txt

48.5 KB

Vanish Increasing Data Privacy with Self-Destructing Data - Roxana Geambasu, Tadayoshi Kohno, Amit A. Levy, Henry M. Levy.eng.vtt

37.2 KB

VPriv Protecting Privacy in Location-Based Vehicular Services - Raluca Ada Popa, Hari Balakrishnan, Andrew J. Blumberg.eng.json

1.5 MB

VPriv Protecting Privacy in Location-Based Vehicular Services - Raluca Ada Popa, Hari Balakrishnan, Andrew J. Blumberg.eng.lrc

44.4 KB

VPriv Protecting Privacy in Location-Based Vehicular Services - Raluca Ada Popa, Hari Balakrishnan, Andrew J. Blumberg.eng.srt

35.7 KB

VPriv Protecting Privacy in Location-Based Vehicular Services - Raluca Ada Popa, Hari Balakrishnan, Andrew J. Blumberg.eng.text

26.5 KB

VPriv Protecting Privacy in Location-Based Vehicular Services - Raluca Ada Popa, Hari Balakrishnan, Andrew J. Blumberg.eng.tsv

36.8 KB

VPriv Protecting Privacy in Location-Based Vehicular Services - Raluca Ada Popa, Hari Balakrishnan, Andrew J. Blumberg.eng.txt

45.1 KB

VPriv Protecting Privacy in Location-Based Vehicular Services - Raluca Ada Popa, Hari Balakrishnan, Andrew J. Blumberg.eng.vtt

33.0 KB

Work-in-Progress Reports (WiPs) - Session Chair Sven Dietrich.eng.json

3.6 MB

Work-in-Progress Reports (WiPs) - Session Chair Sven Dietrich.eng.lrc

103.8 KB

Work-in-Progress Reports (WiPs) - Session Chair Sven Dietrich.eng.srt

87.6 KB

Work-in-Progress Reports (WiPs) - Session Chair Sven Dietrich.eng.text

63.3 KB

Work-in-Progress Reports (WiPs) - Session Chair Sven Dietrich.eng.tsv

86.7 KB

Work-in-Progress Reports (WiPs) - Session Chair Sven Dietrich.eng.txt

105.3 KB

Work-in-Progress Reports (WiPs) - Session Chair Sven Dietrich.eng.vtt

81.4 KB

xBook Redesigning Privacy Control in Social Networking Platforms - Kapil Singh, Sumeer Bhola, Wenke Lee.eng.json

1.2 MB

xBook Redesigning Privacy Control in Social Networking Platforms - Kapil Singh, Sumeer Bhola, Wenke Lee.eng.lrc

32.6 KB

xBook Redesigning Privacy Control in Social Networking Platforms - Kapil Singh, Sumeer Bhola, Wenke Lee.eng.srt

33.0 KB

xBook Redesigning Privacy Control in Social Networking Platforms - Kapil Singh, Sumeer Bhola, Wenke Lee.eng.text

24.7 KB

xBook Redesigning Privacy Control in Social Networking Platforms - Kapil Singh, Sumeer Bhola, Wenke Lee.eng.tsv

29.3 KB

xBook Redesigning Privacy Control in Social Networking Platforms - Kapil Singh, Sumeer Bhola, Wenke Lee.eng.txt

33.0 KB

xBook Redesigning Privacy Control in Social Networking Platforms - Kapil Singh, Sumeer Bhola, Wenke Lee.eng.vtt

30.7 KB

/.../USENIX Security 2009 Presentations/

A Practical Congestion Attack on Tor Using Long Paths - Nathan S. Evans, Roger Dingledine, Christian Grothoff.pdf

1.5 MB

A Practical Congestion Attack on Tor Using Long Paths Slides - Nathan S. Evans, Roger Dingledine, Christian Grothoff.pdf

1.4 MB

Baggy Bounds Checking An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors - Periklis Akritidis, Manuel Costa, Miguel Castro, Steven Hand.pdf

1.1 MB

Baggy Bounds Checking An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors Slides - Periklis Akritidis, Manuel Costa, Miguel Castro, Steven Ha.pdf

362.1 KB

Browser Security Proceedings.pdf

833.1 KB

Browser Security.pdf

833.1 KB

CCCP Secure Remote Storage for Computational RFIDs - Mastooreh Salajegheh, Shane Clark, Benjamin Ransford, Kevin Fu, Ari Juels.pdf

212.1 KB

CCCP Secure Remote Storage for Computational RFIDs Slides - Mastooreh Salajegheh, Shane Clark, Benjamin Ransford, Kevin Fu, Ari Juels.pdf

1.7 MB

Compression, Correction, Confidentiality, and Comprehension A Modern Look at Commercial Telegraph Codes - Steven M. Bellovin.pdf

11.9 MB

Compromising Electromagnetic Emanations of Wired and Wireless Keyboards - Martin Vuagnoux, Sylvain Pasini.pdf

1.5 MB

Compromising Electromagnetic Emanations of Wired and Wireless Keyboards Slides - Martin Vuagnoux, Sylvain Pasini.pdf

13.5 MB

Cross-Origin JavaScript Capability Leaks Detection, Exploitation, and Defense - Adam Barth, Joel Weinberger, Dawn Song.pdf

238.0 KB

Crying Wolf An Empirical Study of SSL Warning Effectiveness - Joshua Sunshine, Serge Egelman, Hazim Almuhimedi, Neha Atri, Lorrie Faith Cranor.pdf

501.6 KB

Crying Wolf An Empirical Study of SSL Warning Effectiveness Slides - Joshua Sunshine, Serge Egelman, Hazim Almuhimedi, Neha Atri, Lorrie Faith Cranor.pdf

1.2 MB

Designing Trustworthy User Agents for a Hostile Web - Eric Lawrence.pdf

186.3 KB

Designing Trustworthy User Agents for a Hostile Web Slides - Eric Lawrence.pdf

5.0 MB

Detecting Spammers with SNARE Spatio-temporal Network-level Automatic Reputation Engine - Shuang Hao, Nadeem Ahmed Syed, Nick Feamster, Alexander G. Gray, Sven Kras.pdf

551.4 KB

Detecting Spammers with SNARE Spatio-temporal Network-level Automatic Reputation Engine Slides - Shuang Hao, Nadeem Ahmed Syed, Nick Feamster, Alexander G. Gray, Sv.pdf

738.6 KB

Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs - David Molnar, Xue Cong Li, David A. Wagner.pdf

226.3 KB

Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs Slides - David Molnar, Xue Cong Li, David A. Wagner.pdf

211.4 KB

Effective and Efficient Malware Detection at the End Host - Clemens Kolbitsch, Paolo Milani Comparetti, Christopher Kruegel, Engin Kirda, Sophia Antipolis, Xiaoyong.pdf

503.6 KB

Effective and Efficient Malware Detection at the End Host Slides - Clemens Kolbitsch, Paolo Milani Comparetti, Christopher Kruegel, Engin Kirda, Sophia Antipolis, X.pdf

641.3 KB

Efficient Data Structures for Tamper-Evident Logging - Scott A. Crosby, Dan S. Wallach.pdf

220.9 KB

Efficient Data Structures for Tamper-Evident Logging Slides - Scott A. Crosby, Dan S. Wallach.pdf

539.8 KB

GATEKEEPER Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code - Salvatore Guarnieri, Benjamin Livshits.pdf

854.9 KB

Hash Functions and Their Many Uses in Cryptography - Shai Halevi.pdf

1.7 MB

How the Pursuit of Truth Led Me to Selling Viagra - Vern Paxson.pdf

5.9 MB

Improving Tor using a TCP-over-DTLS Tunnel - Joel Reardon, Ian Goldberg.pdf

1.8 MB

Improving Tor using a TCP-over-DTLS Tunnel Slides - Joel Reardon, Ian Goldberg.pdf

413.4 KB

Jamming-resistant Broadcast Communication without Shared Keys - Christina Popper, Mario Strasser, Srdjan Capkun.pdf

639.9 KB

Jamming-resistant Broadcast Communication without Shared Keys Slides - Christina Popper, Mario Strasser, and Srdjan Capkun.pdf

624.6 KB

JavaScript Security - sec09_corrigendum.pdf

101.6 KB

JavaScript Security - sec09_javascript.pdf

1.4 MB

Locating Prefix Hijackers using LOCK - Tongqing Qiu, Lusheng Ji, Dan Pei, Jia Wang, Jun (Jim) Xu, Hitesh Ballani.pdf

223.9 KB

Locating Prefix Hijackers using LOCK Slides - Tongqing Qiu, Lusheng Ji, Dan Pei, Jia Wang, Jun (Jim) Xu, Hitesh Ballani.pdf

2.1 MB

Malware Detection and Protection.pdf

1.2 MB

Memory Safety for Low-Level Software Hardware Interactions - John Criswell, Nicolas Geoffray, Pierre et Marie Curie, Vikram Adve.pdf

313.7 KB

Memory Safety for Low-Level Software Hardware Interactions Slides - John Criswell, Nicolas Geoffray, Pierre et Marie Curie, Vikram Adve.pdf

1.8 MB

Nemesis Preventing Authentication and Access Control Vulnerabilities in Web Applications - Michael Dalton, Christos Kozyrakis, Nickolai Zeldovich.pdf

453.3 KB

Nemesis Preventing Authentication and Access Control Vulnerabilities in Web Applications Slides - Michael Dalton, Christos Kozyrakis, Nickolai Zeldovich.pdf

290.9 KB

Network Security - sec09_network.pdf

1.8 MB

NOZZLE A Defense Against Heap-spraying Code Injection Attacks - Paruj Ratanaworabhan, Benjamin Livshits, Benjamin Zorn.pdf

1.7 MB

Peeping Tom in the Neighborhood Keystroke Eavesdropping on Multi-User Systems - Kehuan Zhang, XiaoFeng Wang.pdf

467.9 KB

Peeping Tom in the Neighborhood Keystroke Eavesdropping on Multi-User Systems Slides - Kehuan Zhang, XiaoFeng Wang.pdf

1.3 MB

Physical-layer Identification of RFID Devices - Boris Danev, Thomas S. Heydt-Benjamin, Srdjan Capkun.pdf

935.2 KB

Physical-layer Identification of RFID Devices Slides - Boris Danev, Thomas S. Heydt-Benjamin, Srdjan Capkun.pdf

307.9 KB

Protecting Confidential Data on Personal Computers with Storage Capsules - Kevin Borders, Eric Vander Weele, Billy Lau, Atul Prakash.pdf

145.6 KB

Protecting Confidential Data on Personal Computers with Storage Capsules Slides - Kevin Borders, Eric Vander Weele, Billy Lau, Atul Prakash.pdf

744.9 KB

Return-Oriented Rootkits Bypassing Kernel Code Integrity Protection Mechanisms - Ralf Hund, Thorsten Holz, Felix C. Freiling.pdf

370.4 KB

Return-Oriented Rootkits Bypassing Kernel Code Integrity Protection Mechanisms Slides - Ralf Hund, Thorsten Holz, Felix C. Freiling.pdf

437.6 KB

Static Enforcement of Web Application Integrity Through Strong Typing - William Robertson, Giovanni Vigna.pdf

495.1 KB

Static Enforcement of Web Application Integrity Through Strong Typing Slides - William Robertson, Giovanni Vigna.pdf

6.7 MB

The Building Security in Maturity Model (BSIMM) - Gary McGraw, Brian Chess.pdf

3.9 MB

The Building Security in Maturity Model (BSIMM) Slides - Gary McGraw, Brian Chess.pdf

3.9 MB

The Multi-Principal OS Construction of the Gazelle Web Browser - Helen J. Wang, Chris Grier, Alex Moshchuk, Samuel T. King, Piali Choudhury, Herman Venter.pdf

261.2 KB

The Multi-Principal OS Construction of the Gazelle Web Browser Slides - Helen J. Wang, Chris Grier, Alex Moshchuk, Samuel T. King, Piali Choudhury, Herman Vente.pdf

1.7 MB

Top Ten Web Hacking Techniques of 2008 What's possible, not probable - Jeremiah Grossman.pdf

3.0 MB

Toward a New Legal Framework for Cybersecurity - Deirdre K. Mulligan.pdf

147.8 KB

USENIX Security 2009 - Corrigendum.pdf

101.6 KB

USENIX Security 2009 - Cover.pdf

568.3 KB

USENIX Security 2009 - Interior.pdf

13.4 MB

USENIX Security 2009 Track - Attacks.pdf

3.3 MB

USENIX Security 2009 Track - Proceedings.tgz

11.8 MB

USENIX Security 2009 Track - Radio.pdf

2.1 MB

USENIX Security 2009 Track - Securing Web Apps.pdf

2.6 MB

Vanish Increasing Data Privacy with Self-Destructing Data - Roxana Geambasu, Tadayoshi Kohno, Amit A. Levy, Henry M. Levy.pdf

812.8 KB

Vanish Increasing Data Privacy with Self-Destructing Data Slides - Roxana Geambasu, Tadayoshi Kohno, Amit A. Levy, Henry M. Levy.pdf

3.7 MB

VPriv Protecting Privacy in Location-Based Vehicular Services - Raluca Ada Popa, Hari Balakrishnan, Andrew J. Blumberg.pdf

397.3 KB

VPriv Protecting Privacy in Location-Based Vehicular Services Slides - Raluca Ada Popa, Hari Balakrishnan, Andrew J. Blumberg.pdf

1.1 MB

xBook Redesigning Privacy Control in Social Networking Platforms - Kapil Singh, Sumeer Bhola, Wenke Lee.pdf

2.0 MB

xBook Redesigning Privacy Control in Social Networking Platforms Slides - Kapil Singh, Sumeer Bhola, Wenke Lee.pdf

1.9 MB

/.../USENIX Security 2009 Technical Sessions_files/

dot_clear.gif

0.0 KB

footer.gif

0.3 KB

left_bar.gif

0.1 KB

left_bottom.gif

0.5 KB

longbar.gif

0.1 KB

mp3_icon.gif

0.8 KB

questmark.gif

0.1 KB

sec09_banner.jpg

35.3 KB

sec09opening.jpg

143.8 KB

video_icon.gif

1.3 KB

/.../USENIX Security 2009 WiPs_files/

dot_clear.gif

0.0 KB

footer.gif

0.3 KB

left_bar.gif

0.1 KB

left_bottom.gif

0.5 KB

longbar.gif

0.1 KB

new_usenix.jpg

20.6 KB

questmark.gif

0.1 KB

sec09_banner.jpg

35.3 KB

/USENIX Security 2010/

Acoustic Side-Channel Attacks on Printers - backes.mp4

12.6 MB

Adapting Software Fault Isolation to Contemporary CPU Architectures - David Sehr, Robert Muth, Cliff Biffle, Victor Khimenko, Egor Pasko, Karl Schimpf, Bennet Yee, Brad Chen.mp4

13.8 MB

AdJail Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements - Mike Ter Louw, Karthik Thotta Ganesh, V.N. Venkatakrishnan.mp4

14.8 MB

An Analysis of Private Browsing Modes in Modern Browsers - Gaurav Aggarwal, Elie Bursztein, Collin Jackson, Dan Boneh.mp4

12.8 MB

Automatic Generation of Remediation Procedures for Malware Infections - Michael Backes, Markus Durmuth, Sebastian Gerling, Manfred Pinkal, Caroline Sporleder.mp4

10.6 MB

Baaz A System for Detecting Access Control Misconfigurations - Tathagata Das, Ranjita Bhagwan, Prasad Naldurg.mp4

17.0 MB

BotGrep Finding P2P Bots with Structured Graph Analysis - Shishir Nagaraja, Prateek Mittal, Chi-Yao Hong, Matthew Caesar, Nikita Borisov.mp4

14.9 MB

Building a Dynamic Reputation System for DNS - Manos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee, Nick Feamster.mp4

17.5 MB

Chipping Away at Censorship Firewalls with User-Generated Content - Sam Burnett, Nick Feamster, Santosh Vempala.mp4

13.6 MB

Cling A Memory Allocator to Mitigate Dangling Pointers - Periklis Akritidis.mp4

12.0 MB

Docile No More The Tussle to Redefine the Internet - James Lewis.mp4

44.2 MB

Fast Regular Expression Matching Using Small TCAMs for Network Intrusion Detection and Prevention Systems - Chad R. Meiners, Jignesh Patel, Eric Norige, Eric Torng, and Alex X. Liu.mp4

15.2 MB

Fighting Coercion Attacks in Key Generation using Skin Conductance - Payas Gupta, Debin Gao.mp4

15.3 MB

Grid, PhD Smart Grid, Cyber Security, and the Future of Keeping the Lights On - Kelly Ziegler.mp4

36.1 MB

Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking - Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidiah R. Crandall.mp4

12.5 MB

Making Linux Protection Mechanisms Egalitarian with UserFS - Taesoo Kim, Nickolai Zeldovich.mp4

17.0 MB

Network Security in the Medium Term 2061-2561 AD - stross.mp4

33.5 MB

P4P Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users - Yitao Duan, NetEase Youdao, John Canny, Justin Zhan.mp4

13.8 MB

PrETP Privacy-Preserving Electronic Toll Pricing - Josep Balasch, Alfredo Rial, Carmela Troncoso, Bart Preneel, Ingrid Verbauwhede, Christophe Geuens.mp4

16.3 MB

Proving Voltaire Right Security Blunders Dumber Than Dog Snot - Roger G. Johnston.mp4

44.2 MB

Realization of RF Distance Bounding - Kasper Bonne Rasmussen, Srdjan Capkun.mp4

12.2 MB

Scantegrity II Municipal Election at Takoma Park The First E2E Binding Governmental Election with Ballot Privacy - Richard Carback, David Chaum, Jeremy Clark, John Conway, Aleksand.mp4

13.5 MB

Securing Script-Based Extensibility in Web Browsers - Vladan Djeric, Ashvin Goel.mp4

15.0 MB

Security and Privacy Vulnerabilities of In-Car Wireless Networks A Tire Pressure Monitoring System Case Study - Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis Taylor, Sangho Oh.mp4

16.6 MB

SEPIA Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics - Martin Burkhart, Mario Strasser, Dilip Many, Xenofontas Dimitropoulos.mp4

12.4 MB

Structuring Protocol Implementations to Protect Sensitive Data - Petr Marchenko, Brad Karp.mp4

12.7 MB

The Case for Ubiquitous Transport-Level Encryption - Andrea Bittau, Michael Hamburg, Mark Handley, David Mazieres, Dan Boneh.mp4

16.0 MB

The Evolution of the Flash Security Model - Peleus Uhley.mp4

44.2 MB

Toward an Open and Secure Platform for Using the Web - Will Drewry.mp4

36.1 MB

Toward Automated Detection of Logic Vulnerabilities in Web Applications - Viktoria Felmetsger, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna.mp4

13.6 MB

USENIX Security 2010 Poster Session.htm

14.1 KB

USENIX Security 2010 Proceedings Errata.epub

6.2 KB

USENIX Security 2010 Proceedings Errata.mobi

4.4 KB

USENIX Security 2010 Proceedings.epub

14.7 MB

USENIX Security 2010 Proceedings.mobi

14.9 MB

USENIX Security 2010 Technical Sessions.htm

83.7 KB

VEX Vetting Browser Extensions for Security Vulnerabilities - Sruthi Bandhakavi, Samuel T. King, P. Madhusudan, Marianne Winslett.mp4

14.2 MB

Vulnerable Compliance - Dan Geer.mp4

50.3 MB

Windows 7 Security from a UNIX Perspective - Crispin Cowan.mp4

36.6 MB

ZKPDL A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash - Sarah Meiklejohn, C. Chris Erway, Alptekin Kupcu, Theodora Hinkle, Anna Lysyanskaya.mp4

13.2 MB

/.../USENIX Security 2010 captions/

Acoustic Side-Channel Attacks on Printers - backes.eng.json

1.2 MB

Acoustic Side-Channel Attacks on Printers - backes.eng.lrc

33.5 KB

Acoustic Side-Channel Attacks on Printers - backes.eng.srt

31.1 KB

Acoustic Side-Channel Attacks on Printers - backes.eng.text

22.4 KB

Acoustic Side-Channel Attacks on Printers - backes.eng.tsv

28.6 KB

Acoustic Side-Channel Attacks on Printers - backes.eng.txt

34.0 KB

Acoustic Side-Channel Attacks on Printers - backes.eng.vtt

28.6 KB

Adapting Software Fault Isolation to Contemporary CPU Architectures - David Sehr, Robert Muth, Cliff Biffle, Victor Khimenko, Egor Pasko, Karl Schimpf, Bennet Yee, Brad Chen.eng.json

1.3 MB

Adapting Software Fault Isolation to Contemporary CPU Architectures - David Sehr, Robert Muth, Cliff Biffle, Victor Khimenko, Egor Pasko, Karl Schimpf, Bennet Yee, Brad Chen.eng.lrc

32.2 KB

Adapting Software Fault Isolation to Contemporary CPU Architectures - David Sehr, Robert Muth, Cliff Biffle, Victor Khimenko, Egor Pasko, Karl Schimpf, Bennet Yee, Brad Chen.eng.srt

33.0 KB

Adapting Software Fault Isolation to Contemporary CPU Architectures - David Sehr, Robert Muth, Cliff Biffle, Victor Khimenko, Egor Pasko, Karl Schimpf, Bennet Yee, Brad Chen.eng.text

25.3 KB

Adapting Software Fault Isolation to Contemporary CPU Architectures - David Sehr, Robert Muth, Cliff Biffle, Victor Khimenko, Egor Pasko, Karl Schimpf, Bennet Yee, Brad Chen.eng.tsv

29.2 KB

Adapting Software Fault Isolation to Contemporary CPU Architectures - David Sehr, Robert Muth, Cliff Biffle, Victor Khimenko, Egor Pasko, Karl Schimpf, Bennet Yee, Brad Chen.eng.txt

32.5 KB

Adapting Software Fault Isolation to Contemporary CPU Architectures - David Sehr, Robert Muth, Cliff Biffle, Victor Khimenko, Egor Pasko, Karl Schimpf, Bennet Yee, Brad Chen.eng.vtt

30.8 KB

AdJail Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements - Mike Ter Louw, Karthik Thotta Ganesh, V.N. Venkatakrishnan.eng.json

1.6 MB

AdJail Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements - Mike Ter Louw, Karthik Thotta Ganesh, V.N. Venkatakrishnan.eng.lrc

41.1 KB

AdJail Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements - Mike Ter Louw, Karthik Thotta Ganesh, V.N. Venkatakrishnan.eng.srt

42.2 KB

AdJail Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements - Mike Ter Louw, Karthik Thotta Ganesh, V.N. Venkatakrishnan.eng.text

31.6 KB

AdJail Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements - Mike Ter Louw, Karthik Thotta Ganesh, V.N. Venkatakrishnan.eng.tsv

37.0 KB

AdJail Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements - Mike Ter Louw, Karthik Thotta Ganesh, V.N. Venkatakrishnan.eng.txt

41.5 KB

AdJail Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements - Mike Ter Louw, Karthik Thotta Ganesh, V.N. Venkatakrishnan.eng.vtt

39.2 KB

An Analysis of Private Browsing Modes in Modern Browsers - Gaurav Aggarwal, Elie Bursztein, Collin Jackson, Dan Boneh.eng.json

1.4 MB

An Analysis of Private Browsing Modes in Modern Browsers - Gaurav Aggarwal, Elie Bursztein, Collin Jackson, Dan Boneh.eng.lrc

32.2 KB

An Analysis of Private Browsing Modes in Modern Browsers - Gaurav Aggarwal, Elie Bursztein, Collin Jackson, Dan Boneh.eng.srt

34.6 KB

An Analysis of Private Browsing Modes in Modern Browsers - Gaurav Aggarwal, Elie Bursztein, Collin Jackson, Dan Boneh.eng.text

25.1 KB

An Analysis of Private Browsing Modes in Modern Browsers - Gaurav Aggarwal, Elie Bursztein, Collin Jackson, Dan Boneh.eng.tsv

29.1 KB

An Analysis of Private Browsing Modes in Modern Browsers - Gaurav Aggarwal, Elie Bursztein, Collin Jackson, Dan Boneh.eng.txt

32.5 KB

An Analysis of Private Browsing Modes in Modern Browsers - Gaurav Aggarwal, Elie Bursztein, Collin Jackson, Dan Boneh.eng.vtt

32.0 KB

Automatic Generation of Remediation Procedures for Malware Infections - Michael Backes, Markus Durmuth, Sebastian Gerling, Manfred Pinkal, Caroline Sporleder.eng.json

908.9 KB

Automatic Generation of Remediation Procedures for Malware Infections - Michael Backes, Markus Durmuth, Sebastian Gerling, Manfred Pinkal, Caroline Sporleder.eng.lrc

25.4 KB

Automatic Generation of Remediation Procedures for Malware Infections - Michael Backes, Markus Durmuth, Sebastian Gerling, Manfred Pinkal, Caroline Sporleder.eng.srt

23.7 KB

Automatic Generation of Remediation Procedures for Malware Infections - Michael Backes, Markus Durmuth, Sebastian Gerling, Manfred Pinkal, Caroline Sporleder.eng.text

18.7 KB

Automatic Generation of Remediation Procedures for Malware Infections - Michael Backes, Markus Durmuth, Sebastian Gerling, Manfred Pinkal, Caroline Sporleder.eng.tsv

22.4 KB

Automatic Generation of Remediation Procedures for Malware Infections - Michael Backes, Markus Durmuth, Sebastian Gerling, Manfred Pinkal, Caroline Sporleder.eng.txt

25.7 KB

Automatic Generation of Remediation Procedures for Malware Infections - Michael Backes, Markus Durmuth, Sebastian Gerling, Manfred Pinkal, Caroline Sporleder.eng.vtt

22.3 KB

Baaz A System for Detecting Access Control Misconfigurations - Tathagata Das, Ranjita Bhagwan, Prasad Naldurg.eng.json

1.3 MB

Baaz A System for Detecting Access Control Misconfigurations - Tathagata Das, Ranjita Bhagwan, Prasad Naldurg.eng.lrc

33.8 KB

Baaz A System for Detecting Access Control Misconfigurations - Tathagata Das, Ranjita Bhagwan, Prasad Naldurg.eng.srt

35.5 KB

Baaz A System for Detecting Access Control Misconfigurations - Tathagata Das, Ranjita Bhagwan, Prasad Naldurg.eng.text

26.3 KB

Baaz A System for Detecting Access Control Misconfigurations - Tathagata Das, Ranjita Bhagwan, Prasad Naldurg.eng.tsv

30.5 KB

Baaz A System for Detecting Access Control Misconfigurations - Tathagata Das, Ranjita Bhagwan, Prasad Naldurg.eng.txt

34.1 KB

Baaz A System for Detecting Access Control Misconfigurations - Tathagata Das, Ranjita Bhagwan, Prasad Naldurg.eng.vtt

32.9 KB

BotGrep Finding P2P Bots with Structured Graph Analysis - Shishir Nagaraja, Prateek Mittal, Chi-Yao Hong, Matthew Caesar, Nikita Borisov.eng.json

1.4 MB

BotGrep Finding P2P Bots with Structured Graph Analysis - Shishir Nagaraja, Prateek Mittal, Chi-Yao Hong, Matthew Caesar, Nikita Borisov.eng.lrc

36.5 KB

BotGrep Finding P2P Bots with Structured Graph Analysis - Shishir Nagaraja, Prateek Mittal, Chi-Yao Hong, Matthew Caesar, Nikita Borisov.eng.srt

35.7 KB

BotGrep Finding P2P Bots with Structured Graph Analysis - Shishir Nagaraja, Prateek Mittal, Chi-Yao Hong, Matthew Caesar, Nikita Borisov.eng.text

26.6 KB

BotGrep Finding P2P Bots with Structured Graph Analysis - Shishir Nagaraja, Prateek Mittal, Chi-Yao Hong, Matthew Caesar, Nikita Borisov.eng.tsv

32.2 KB

BotGrep Finding P2P Bots with Structured Graph Analysis - Shishir Nagaraja, Prateek Mittal, Chi-Yao Hong, Matthew Caesar, Nikita Borisov.eng.txt

36.8 KB

BotGrep Finding P2P Bots with Structured Graph Analysis - Shishir Nagaraja, Prateek Mittal, Chi-Yao Hong, Matthew Caesar, Nikita Borisov.eng.vtt

33.1 KB

Building a Dynamic Reputation System for DNS - Manos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee, Nick Feamster.eng.json

1.3 MB

Building a Dynamic Reputation System for DNS - Manos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee, Nick Feamster.eng.lrc

34.6 KB

Building a Dynamic Reputation System for DNS - Manos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee, Nick Feamster.eng.srt

37.0 KB

Building a Dynamic Reputation System for DNS - Manos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee, Nick Feamster.eng.text

26.7 KB

Building a Dynamic Reputation System for DNS - Manos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee, Nick Feamster.eng.tsv

31.3 KB

Building a Dynamic Reputation System for DNS - Manos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee, Nick Feamster.eng.txt

34.9 KB

Building a Dynamic Reputation System for DNS - Manos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee, Nick Feamster.eng.vtt

34.1 KB

Chipping Away at Censorship Firewalls with User-Generated Content - Sam Burnett, Nick Feamster, Santosh Vempala.eng.json

1.5 MB

Chipping Away at Censorship Firewalls with User-Generated Content - Sam Burnett, Nick Feamster, Santosh Vempala.eng.lrc

37.2 KB

Chipping Away at Censorship Firewalls with User-Generated Content - Sam Burnett, Nick Feamster, Santosh Vempala.eng.srt

38.3 KB

Chipping Away at Censorship Firewalls with User-Generated Content - Sam Burnett, Nick Feamster, Santosh Vempala.eng.text

28.7 KB

Chipping Away at Censorship Firewalls with User-Generated Content - Sam Burnett, Nick Feamster, Santosh Vempala.eng.tsv

33.6 KB

Chipping Away at Censorship Firewalls with User-Generated Content - Sam Burnett, Nick Feamster, Santosh Vempala.eng.txt

37.6 KB

Chipping Away at Censorship Firewalls with User-Generated Content - Sam Burnett, Nick Feamster, Santosh Vempala.eng.vtt

35.6 KB

Cling A Memory Allocator to Mitigate Dangling Pointers - Periklis Akritidis.eng.json

1.3 MB

Cling A Memory Allocator to Mitigate Dangling Pointers - Periklis Akritidis.eng.lrc

33.2 KB

Cling A Memory Allocator to Mitigate Dangling Pointers - Periklis Akritidis.eng.srt

34.6 KB

Cling A Memory Allocator to Mitigate Dangling Pointers - Periklis Akritidis.eng.text

25.8 KB

Cling A Memory Allocator to Mitigate Dangling Pointers - Periklis Akritidis.eng.tsv

30.0 KB

Cling A Memory Allocator to Mitigate Dangling Pointers - Periklis Akritidis.eng.txt

33.5 KB

Cling A Memory Allocator to Mitigate Dangling Pointers - Periklis Akritidis.eng.vtt

32.1 KB

Docile No More The Tussle to Redefine the Internet - James Lewis.eng.json

3.4 MB

Docile No More The Tussle to Redefine the Internet - James Lewis.eng.lrc

87.0 KB

Docile No More The Tussle to Redefine the Internet - James Lewis.eng.srt

93.4 KB

Docile No More The Tussle to Redefine the Internet - James Lewis.eng.text

61.9 KB

Docile No More The Tussle to Redefine the Internet - James Lewis.eng.tsv

76.6 KB

Docile No More The Tussle to Redefine the Internet - James Lewis.eng.txt

87.9 KB

Docile No More The Tussle to Redefine the Internet - James Lewis.eng.vtt

84.6 KB

Fast Regular Expression Matching Using Small TCAMs for Network Intrusion Detection and Prevention Systems - Chad R. Meiners, Jignesh Patel, Eric Norige, Eric Torng, and Alex X. Liu.eng.json

1.6 MB

Fast Regular Expression Matching Using Small TCAMs for Network Intrusion Detection and Prevention Systems - Chad R. Meiners, Jignesh Patel, Eric Norige, Eric Torng, and Alex X. Liu.eng.lrc

45.1 KB

Fast Regular Expression Matching Using Small TCAMs for Network Intrusion Detection and Prevention Systems - Chad R. Meiners, Jignesh Patel, Eric Norige, Eric Torng, and Alex X. Liu.eng.srt

37.6 KB

Fast Regular Expression Matching Using Small TCAMs for Network Intrusion Detection and Prevention Systems - Chad R. Meiners, Jignesh Patel, Eric Norige, Eric Torng, and Alex X. Liu.eng.text

27.7 KB

Fast Regular Expression Matching Using Small TCAMs for Network Intrusion Detection and Prevention Systems - Chad R. Meiners, Jignesh Patel, Eric Norige, Eric Torng, and Alex X. Liu.eng.tsv

37.6 KB

Fast Regular Expression Matching Using Small TCAMs for Network Intrusion Detection and Prevention Systems - Chad R. Meiners, Jignesh Patel, Eric Norige, Eric Torng, and Alex X. Liu.eng.txt

45.7 KB

Fast Regular Expression Matching Using Small TCAMs for Network Intrusion Detection and Prevention Systems - Chad R. Meiners, Jignesh Patel, Eric Norige, Eric Torng, and Alex X. Liu.eng.vtt

34.7 KB

Fighting Coercion Attacks in Key Generation using Skin Conductance - Payas Gupta, Debin Gao.eng.json

1.5 MB

Fighting Coercion Attacks in Key Generation using Skin Conductance - Payas Gupta, Debin Gao.eng.lrc

38.1 KB

Fighting Coercion Attacks in Key Generation using Skin Conductance - Payas Gupta, Debin Gao.eng.srt

38.7 KB

Fighting Coercion Attacks in Key Generation using Skin Conductance - Payas Gupta, Debin Gao.eng.text

29.3 KB

Fighting Coercion Attacks in Key Generation using Skin Conductance - Payas Gupta, Debin Gao.eng.tsv

34.3 KB

Fighting Coercion Attacks in Key Generation using Skin Conductance - Payas Gupta, Debin Gao.eng.txt

38.4 KB

Fighting Coercion Attacks in Key Generation using Skin Conductance - Payas Gupta, Debin Gao.eng.vtt

36.0 KB

Grid, PhD Smart Grid, Cyber Security, and the Future of Keeping the Lights On - Kelly Ziegler.eng.json

3.4 MB

Grid, PhD Smart Grid, Cyber Security, and the Future of Keeping the Lights On - Kelly Ziegler.eng.lrc

86.4 KB

Grid, PhD Smart Grid, Cyber Security, and the Future of Keeping the Lights On - Kelly Ziegler.eng.srt

91.1 KB

Grid, PhD Smart Grid, Cyber Security, and the Future of Keeping the Lights On - Kelly Ziegler.eng.text

66.2 KB

Grid, PhD Smart Grid, Cyber Security, and the Future of Keeping the Lights On - Kelly Ziegler.eng.tsv

77.9 KB

Grid, PhD Smart Grid, Cyber Security, and the Future of Keeping the Lights On - Kelly Ziegler.eng.txt

87.2 KB

Grid, PhD Smart Grid, Cyber Security, and the Future of Keeping the Lights On - Kelly Ziegler.eng.vtt

84.6 KB

Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking - Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidiah R. Crandall.eng.json

1.2 MB

Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking - Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidiah R. Crandall.eng.lrc

28.8 KB

Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking - Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidiah R. Crandall.eng.srt

31.0 KB

Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking - Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidiah R. Crandall.eng.text

22.0 KB

Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking - Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidiah R. Crandall.eng.tsv

25.9 KB

Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking - Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidiah R. Crandall.eng.txt

29.0 KB

Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking - Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidiah R. Crandall.eng.vtt

28.5 KB

Making Linux Protection Mechanisms Egalitarian with UserFS - Taesoo Kim, Nickolai Zeldovich.eng.json

1.5 MB

Making Linux Protection Mechanisms Egalitarian with UserFS - Taesoo Kim, Nickolai Zeldovich.eng.lrc

44.1 KB

Making Linux Protection Mechanisms Egalitarian with UserFS - Taesoo Kim, Nickolai Zeldovich.eng.srt

36.1 KB

Making Linux Protection Mechanisms Egalitarian with UserFS - Taesoo Kim, Nickolai Zeldovich.eng.text

26.3 KB

Making Linux Protection Mechanisms Egalitarian with UserFS - Taesoo Kim, Nickolai Zeldovich.eng.tsv

36.7 KB

Making Linux Protection Mechanisms Egalitarian with UserFS - Taesoo Kim, Nickolai Zeldovich.eng.txt

44.8 KB

Making Linux Protection Mechanisms Egalitarian with UserFS - Taesoo Kim, Nickolai Zeldovich.eng.vtt

33.2 KB

Network Security in the Medium Term 2061-2561 AD - stross.eng.json

2.6 MB

Network Security in the Medium Term 2061-2561 AD - stross.eng.lrc

68.0 KB

Network Security in the Medium Term 2061-2561 AD - stross.eng.srt

71.4 KB

Network Security in the Medium Term 2061-2561 AD - stross.eng.text

53.8 KB

Network Security in the Medium Term 2061-2561 AD - stross.eng.tsv

62.1 KB

Network Security in the Medium Term 2061-2561 AD - stross.eng.txt

68.5 KB

Network Security in the Medium Term 2061-2561 AD - stross.eng.vtt

66.3 KB

P4P Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users - Yitao Duan, NetEase Youdao, John Canny, Justin Zhan.eng.json

893.6 KB

P4P Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users - Yitao Duan, NetEase Youdao, John Canny, Justin Zhan.eng.lrc

24.2 KB

P4P Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users - Yitao Duan, NetEase Youdao, John Canny, Justin Zhan.eng.srt

26.3 KB

P4P Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users - Yitao Duan, NetEase Youdao, John Canny, Justin Zhan.eng.text

17.7 KB

P4P Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users - Yitao Duan, NetEase Youdao, John Canny, Justin Zhan.eng.tsv

21.4 KB

P4P Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users - Yitao Duan, NetEase Youdao, John Canny, Justin Zhan.eng.txt

24.4 KB

P4P Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users - Yitao Duan, NetEase Youdao, John Canny, Justin Zhan.eng.vtt

23.9 KB

PrETP Privacy-Preserving Electronic Toll Pricing - Josep Balasch, Alfredo Rial, Carmela Troncoso, Bart Preneel, Ingrid Verbauwhede, Christophe Geuens.eng.json

1.4 MB

PrETP Privacy-Preserving Electronic Toll Pricing - Josep Balasch, Alfredo Rial, Carmela Troncoso, Bart Preneel, Ingrid Verbauwhede, Christophe Geuens.eng.lrc

35.5 KB

PrETP Privacy-Preserving Electronic Toll Pricing - Josep Balasch, Alfredo Rial, Carmela Troncoso, Bart Preneel, Ingrid Verbauwhede, Christophe Geuens.eng.srt

35.3 KB

PrETP Privacy-Preserving Electronic Toll Pricing - Josep Balasch, Alfredo Rial, Carmela Troncoso, Bart Preneel, Ingrid Verbauwhede, Christophe Geuens.eng.text

27.8 KB

PrETP Privacy-Preserving Electronic Toll Pricing - Josep Balasch, Alfredo Rial, Carmela Troncoso, Bart Preneel, Ingrid Verbauwhede, Christophe Geuens.eng.tsv

32.2 KB

PrETP Privacy-Preserving Electronic Toll Pricing - Josep Balasch, Alfredo Rial, Carmela Troncoso, Bart Preneel, Ingrid Verbauwhede, Christophe Geuens.eng.txt

35.8 KB

PrETP Privacy-Preserving Electronic Toll Pricing - Josep Balasch, Alfredo Rial, Carmela Troncoso, Bart Preneel, Ingrid Verbauwhede, Christophe Geuens.eng.vtt

33.2 KB

Proving Voltaire Right Security Blunders Dumber Than Dog Snot - Roger G. Johnston.eng.json

4.4 MB

Proving Voltaire Right Security Blunders Dumber Than Dog Snot - Roger G. Johnston.eng.lrc

119.6 KB

Proving Voltaire Right Security Blunders Dumber Than Dog Snot - Roger G. Johnston.eng.srt

122.9 KB

Proving Voltaire Right Security Blunders Dumber Than Dog Snot - Roger G. Johnston.eng.text

85.0 KB

Proving Voltaire Right Security Blunders Dumber Than Dog Snot - Roger G. Johnston.eng.tsv

104.4 KB

Proving Voltaire Right Security Blunders Dumber Than Dog Snot - Roger G. Johnston.eng.txt

120.8 KB

Proving Voltaire Right Security Blunders Dumber Than Dog Snot - Roger G. Johnston.eng.vtt

113.7 KB

Realization of RF Distance Bounding - Kasper Bonne Rasmussen, Srdjan Capkun.eng.json

1.2 MB

Realization of RF Distance Bounding - Kasper Bonne Rasmussen, Srdjan Capkun.eng.lrc

29.6 KB

Realization of RF Distance Bounding - Kasper Bonne Rasmussen, Srdjan Capkun.eng.srt

31.3 KB

Realization of RF Distance Bounding - Kasper Bonne Rasmussen, Srdjan Capkun.eng.text

22.8 KB

Realization of RF Distance Bounding - Kasper Bonne Rasmussen, Srdjan Capkun.eng.tsv

26.6 KB

Realization of RF Distance Bounding - Kasper Bonne Rasmussen, Srdjan Capkun.eng.txt

29.8 KB

Realization of RF Distance Bounding - Kasper Bonne Rasmussen, Srdjan Capkun.eng.vtt

28.9 KB

Scantegrity II Municipal Election at Takoma Park The First E2E Binding Governmental Election with Ballot Privacy - Richard Carback, David Chaum, Jeremy Clark, John Conway, Aleksand.eng.json

1.4 MB

Scantegrity II Municipal Election at Takoma Park The First E2E Binding Governmental Election with Ballot Privacy - Richard Carback, David Chaum, Jeremy Clark, John Conway, Aleksand.eng.lrc

36.9 KB

Scantegrity II Municipal Election at Takoma Park The First E2E Binding Governmental Election with Ballot Privacy - Richard Carback, David Chaum, Jeremy Clark, John Conway, Aleksand.eng.srt

38.6 KB

Scantegrity II Municipal Election at Takoma Park The First E2E Binding Governmental Election with Ballot Privacy - Richard Carback, David Chaum, Jeremy Clark, John Conway, Aleksand.eng.text

26.3 KB

Scantegrity II Municipal Election at Takoma Park The First E2E Binding Governmental Election with Ballot Privacy - Richard Carback, David Chaum, Jeremy Clark, John Conway, Aleksand.eng.tsv

32.3 KB

Scantegrity II Municipal Election at Takoma Park The First E2E Binding Governmental Election with Ballot Privacy - Richard Carback, David Chaum, Jeremy Clark, John Conway, Aleksand.eng.txt

37.3 KB

Scantegrity II Municipal Election at Takoma Park The First E2E Binding Governmental Election with Ballot Privacy - Richard Carback, David Chaum, Jeremy Clark, John Conway, Aleksand.eng.vtt

35.1 KB

Securing Script-Based Extensibility in Web Browsers - Vladan Djeric, Ashvin Goel.eng.json

1.6 MB

Securing Script-Based Extensibility in Web Browsers - Vladan Djeric, Ashvin Goel.eng.lrc

48.2 KB

Securing Script-Based Extensibility in Web Browsers - Vladan Djeric, Ashvin Goel.eng.srt

37.9 KB

Securing Script-Based Extensibility in Web Browsers - Vladan Djeric, Ashvin Goel.eng.text

28.7 KB

Securing Script-Based Extensibility in Web Browsers - Vladan Djeric, Ashvin Goel.eng.tsv

39.9 KB

Securing Script-Based Extensibility in Web Browsers - Vladan Djeric, Ashvin Goel.eng.txt

49.0 KB

Securing Script-Based Extensibility in Web Browsers - Vladan Djeric, Ashvin Goel.eng.vtt

35.2 KB

Security and Privacy Vulnerabilities of In-Car Wireless Networks A Tire Pressure Monitoring System Case Study - Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis Taylor, Sangho Oh.eng.json

1.5 MB

Security and Privacy Vulnerabilities of In-Car Wireless Networks A Tire Pressure Monitoring System Case Study - Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis Taylor, Sangho Oh.eng.lrc

39.8 KB

Security and Privacy Vulnerabilities of In-Car Wireless Networks A Tire Pressure Monitoring System Case Study - Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis Taylor, Sangho Oh.eng.srt

38.9 KB

Security and Privacy Vulnerabilities of In-Car Wireless Networks A Tire Pressure Monitoring System Case Study - Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis Taylor, Sangho Oh.eng.text

26.8 KB

Security and Privacy Vulnerabilities of In-Car Wireless Networks A Tire Pressure Monitoring System Case Study - Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis Taylor, Sangho Oh.eng.tsv

34.3 KB

Security and Privacy Vulnerabilities of In-Car Wireless Networks A Tire Pressure Monitoring System Case Study - Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis Taylor, Sangho Oh.eng.txt

40.3 KB

Security and Privacy Vulnerabilities of In-Car Wireless Networks A Tire Pressure Monitoring System Case Study - Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis Taylor, Sangho Oh.eng.vtt

35.5 KB

SEPIA Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics - Martin Burkhart, Mario Strasser, Dilip Many, Xenofontas Dimitropoulos.eng.json

923.0 KB

SEPIA Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics - Martin Burkhart, Mario Strasser, Dilip Many, Xenofontas Dimitropoulos.eng.lrc

24.2 KB

SEPIA Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics - Martin Burkhart, Mario Strasser, Dilip Many, Xenofontas Dimitropoulos.eng.srt

25.4 KB

SEPIA Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics - Martin Burkhart, Mario Strasser, Dilip Many, Xenofontas Dimitropoulos.eng.text

18.8 KB

SEPIA Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics - Martin Burkhart, Mario Strasser, Dilip Many, Xenofontas Dimitropoulos.eng.tsv

21.8 KB

SEPIA Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics - Martin Burkhart, Mario Strasser, Dilip Many, Xenofontas Dimitropoulos.eng.txt

24.4 KB

SEPIA Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics - Martin Burkhart, Mario Strasser, Dilip Many, Xenofontas Dimitropoulos.eng.vtt

23.5 KB

Structuring Protocol Implementations to Protect Sensitive Data - Petr Marchenko, Brad Karp.eng.json

1.5 MB

Structuring Protocol Implementations to Protect Sensitive Data - Petr Marchenko, Brad Karp.eng.lrc

38.6 KB

Structuring Protocol Implementations to Protect Sensitive Data - Petr Marchenko, Brad Karp.eng.srt

42.0 KB

Structuring Protocol Implementations to Protect Sensitive Data - Petr Marchenko, Brad Karp.eng.text

28.9 KB

Structuring Protocol Implementations to Protect Sensitive Data - Petr Marchenko, Brad Karp.eng.tsv

34.4 KB

Structuring Protocol Implementations to Protect Sensitive Data - Petr Marchenko, Brad Karp.eng.txt

38.9 KB

Structuring Protocol Implementations to Protect Sensitive Data - Petr Marchenko, Brad Karp.eng.vtt

38.3 KB

The Case for Ubiquitous Transport-Level Encryption - Andrea Bittau, Michael Hamburg, Mark Handley, David Mazieres, Dan Boneh.eng.json

1.9 MB

The Case for Ubiquitous Transport-Level Encryption - Andrea Bittau, Michael Hamburg, Mark Handley, David Mazieres, Dan Boneh.eng.lrc

45.6 KB

The Case for Ubiquitous Transport-Level Encryption - Andrea Bittau, Michael Hamburg, Mark Handley, David Mazieres, Dan Boneh.eng.srt

50.5 KB

The Case for Ubiquitous Transport-Level Encryption - Andrea Bittau, Michael Hamburg, Mark Handley, David Mazieres, Dan Boneh.eng.text

34.8 KB

The Case for Ubiquitous Transport-Level Encryption - Andrea Bittau, Michael Hamburg, Mark Handley, David Mazieres, Dan Boneh.eng.tsv

41.0 KB

The Case for Ubiquitous Transport-Level Encryption - Andrea Bittau, Michael Hamburg, Mark Handley, David Mazieres, Dan Boneh.eng.txt

46.0 KB

The Case for Ubiquitous Transport-Level Encryption - Andrea Bittau, Michael Hamburg, Mark Handley, David Mazieres, Dan Boneh.eng.vtt

46.0 KB

The Evolution of the Flash Security Model - Peleus Uhley.eng.json

4.2 MB

The Evolution of the Flash Security Model - Peleus Uhley.eng.lrc

122.9 KB

The Evolution of the Flash Security Model - Peleus Uhley.eng.srt

108.1 KB

The Evolution of the Flash Security Model - Peleus Uhley.eng.text

76.7 KB

The Evolution of the Flash Security Model - Peleus Uhley.eng.tsv

102.7 KB

The Evolution of the Flash Security Model - Peleus Uhley.eng.txt

124.5 KB

The Evolution of the Flash Security Model - Peleus Uhley.eng.vtt

100.3 KB

Toward an Open and Secure Platform for Using the Web - Will Drewry.eng.json

4.1 MB

Toward an Open and Secure Platform for Using the Web - Will Drewry.eng.lrc

110.6 KB

Toward an Open and Secure Platform for Using the Web - Will Drewry.eng.srt

102.5 KB

Toward an Open and Secure Platform for Using the Web - Will Drewry.eng.text

72.6 KB

Toward an Open and Secure Platform for Using the Web - Will Drewry.eng.tsv

94.6 KB

Toward an Open and Secure Platform for Using the Web - Will Drewry.eng.txt

112.1 KB

Toward an Open and Secure Platform for Using the Web - Will Drewry.eng.vtt

94.2 KB

Toward Automated Detection of Logic Vulnerabilities in Web Applications - Viktoria Felmetsger, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna.eng.json

1.2 MB

Toward Automated Detection of Logic Vulnerabilities in Web Applications - Viktoria Felmetsger, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna.eng.lrc

31.9 KB

Toward Automated Detection of Logic Vulnerabilities in Web Applications - Viktoria Felmetsger, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna.eng.srt

32.4 KB

Toward Automated Detection of Logic Vulnerabilities in Web Applications - Viktoria Felmetsger, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna.eng.text

24.7 KB

Toward Automated Detection of Logic Vulnerabilities in Web Applications - Viktoria Felmetsger, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna.eng.tsv

28.8 KB

Toward Automated Detection of Logic Vulnerabilities in Web Applications - Viktoria Felmetsger, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna.eng.txt

32.1 KB

Toward Automated Detection of Logic Vulnerabilities in Web Applications - Viktoria Felmetsger, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna.eng.vtt

30.3 KB

VEX Vetting Browser Extensions for Security Vulnerabilities - Sruthi Bandhakavi, Samuel T. King, P. Madhusudan, Marianne Winslett.eng.json

1.2 MB

VEX Vetting Browser Extensions for Security Vulnerabilities - Sruthi Bandhakavi, Samuel T. King, P. Madhusudan, Marianne Winslett.eng.lrc

35.3 KB

VEX Vetting Browser Extensions for Security Vulnerabilities - Sruthi Bandhakavi, Samuel T. King, P. Madhusudan, Marianne Winslett.eng.srt

32.3 KB

VEX Vetting Browser Extensions for Security Vulnerabilities - Sruthi Bandhakavi, Samuel T. King, P. Madhusudan, Marianne Winslett.eng.text

23.5 KB

VEX Vetting Browser Extensions for Security Vulnerabilities - Sruthi Bandhakavi, Samuel T. King, P. Madhusudan, Marianne Winslett.eng.tsv

30.4 KB

VEX Vetting Browser Extensions for Security Vulnerabilities - Sruthi Bandhakavi, Samuel T. King, P. Madhusudan, Marianne Winslett.eng.txt

35.8 KB

VEX Vetting Browser Extensions for Security Vulnerabilities - Sruthi Bandhakavi, Samuel T. King, P. Madhusudan, Marianne Winslett.eng.vtt

29.8 KB

Vulnerable Compliance - Dan Geer.eng.json

4.1 MB

Vulnerable Compliance - Dan Geer.eng.lrc

106.0 KB

Vulnerable Compliance - Dan Geer.eng.srt

108.6 KB

Vulnerable Compliance - Dan Geer.eng.text

80.4 KB

Vulnerable Compliance - Dan Geer.eng.tsv

94.6 KB

Vulnerable Compliance - Dan Geer.eng.txt

107.0 KB

Vulnerable Compliance - Dan Geer.eng.vtt

102.0 KB

Windows 7 Security from a UNIX Perspective - Crispin Cowan.eng.json

3.0 MB

Windows 7 Security from a UNIX Perspective - Crispin Cowan.eng.lrc

91.9 KB

Windows 7 Security from a UNIX Perspective - Crispin Cowan.eng.srt

75.3 KB

Windows 7 Security from a UNIX Perspective - Crispin Cowan.eng.text

47.9 KB

Windows 7 Security from a UNIX Perspective - Crispin Cowan.eng.tsv

73.2 KB

Windows 7 Security from a UNIX Perspective - Crispin Cowan.eng.txt

93.5 KB

Windows 7 Security from a UNIX Perspective - Crispin Cowan.eng.vtt

68.0 KB

ZKPDL A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash - Sarah Meiklejohn, C. Chris Erway, Alptekin Kupcu, Theodora Hinkle, Anna Lysyanskaya.eng.json

1.5 MB

ZKPDL A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash - Sarah Meiklejohn, C. Chris Erway, Alptekin Kupcu, Theodora Hinkle, Anna Lysyanskaya.eng.lrc

36.2 KB

ZKPDL A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash - Sarah Meiklejohn, C. Chris Erway, Alptekin Kupcu, Theodora Hinkle, Anna Lysyanskaya.eng.srt

39.4 KB

ZKPDL A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash - Sarah Meiklejohn, C. Chris Erway, Alptekin Kupcu, Theodora Hinkle, Anna Lysyanskaya.eng.text

28.4 KB

ZKPDL A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash - Sarah Meiklejohn, C. Chris Erway, Alptekin Kupcu, Theodora Hinkle, Anna Lysyanskaya.eng.tsv

32.8 KB

ZKPDL A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash - Sarah Meiklejohn, C. Chris Erway, Alptekin Kupcu, Theodora Hinkle, Anna Lysyanskaya.eng.txt

36.5 KB

ZKPDL A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash - Sarah Meiklejohn, C. Chris Erway, Alptekin Kupcu, Theodora Hinkle, Anna Lysyanskaya.eng.vtt

36.3 KB

/.../USENIX Security 2010 Poster Session_files/

dot_clear.gif

0.0 KB

dot_clear_002.gif

0.0 KB

footer.gif

0.3 KB

left_bar.gif

0.1 KB

left_bottom.gif

0.5 KB

longbar.gif

0.1 KB

new_usenix.jpg

20.6 KB

questmark.gif

0.1 KB

sec10_banner.jpg

30.8 KB

/.../USENIX Security 2010 Presentations/

Acoustic Side-Channel Attacks on Printers - Michael Backes, Markus Durmuth, Sebastian Gerling, Manfred Pinkal, Caroline Sporleder.pdf

847.2 KB

Adapting Software Fault Isolation to Contemporary CPU Architectures - David Sehr, Robert Muth, Cliff Biffle, Victor Khimenko, Egor Pasko, Karl Schimpf, Bennet Yee.pdf

145.9 KB

AdJail Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements - Mike Ter Louw, Karthik Thotta Ganesh, V.N. Venkatakrishnan.pdf

809.9 KB

An Analysis of Private Browsing Modes in Modern Browsers - Gaurav Aggarwal, Elie Bursztein, Collin Jackson, Dan Boneh.pdf

611.6 KB

Automatic Generation of Remediation Procedures for Malware Infections - Paleari.pdf

248.2 KB

Baaz A System for Detecting Access Control Misconfigurations - Tathagata Das, Ranjita Bhagwan, Prasad Naldurg.pdf

303.6 KB

BotGrep Finding P2P Bots with Structured Graph Analysis - Shishir Nagaraja, Prateek Mittal, Chi-Yao Hong, Matthew Caesar, Nikita Borisov.pdf

296.0 KB

Building a Dynamic Reputation System for DNS - Manos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee, Nick Feamster.pdf

1.4 MB

Capsicum Practical Capabilities for UNIX - Robert N.M. Watson, Jonathan Anderson, Ben Laurie, Kris Kennaway.pdf

334.0 KB

Chipping Away at Censorship Firewalls with User-Generated Content - Sam Burnett, Nick Feamster, Santosh Vempala.pdf

474.8 KB

Chipping Away at Censorship Firewalls with User-Generated Content Slides - Sam Burnett, Nick Feamster, Santosh Vempala.pdf

868.3 KB

Cling A Memory Allocator to Mitigate Dangling Pointers - Periklis Akritidis.pdf

454.9 KB

End-to-End Arguments The Internet and Beyond - David P. Reed.pdf

140.2 KB

Fast Regular Expression Matching Using Small TCAMs for Network Intrusion Detection and Prevention Systems - Chad R. Meiners, Jignesh Patel, Eric Norige, Eric Torng.pdf

381.8 KB

Fighting Coercion Attacks in Key Generation using Skin Conductance - Payas Gupta, Debin Gao.pdf

1.2 MB

Grid, PhD Smart Grid, Cyber Security, and the Future of Keeping the Lights On - Kelly Ziegler.pdf

3.8 MB

How Cyber Attacks Will Be Used in International Conflicts - Scott Borg.pdf

7.1 MB

Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking - Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidiah R. Cranda.pdf

901.0 KB

Making Linux Protection Mechanisms Egalitarian with UserFS - Taesoo Kim, Nickolai Zeldovich.pdf

285.1 KB

PrETP Privacy-Preserving Electronic Toll Pricing - Josep Balasch, Alfredo Rial, Carmela Troncoso, Bart Preneel, Ingrid Verbauwhede, Christophe Geuens.pdf

430.1 KB

Realization of RF Distance Bounding - Kasper Bonne Rasmussen, Srdjan Capkun.pdf

958.0 KB

Scantegrity II Municipal Election at Takoma Park The First E2E Binding Governmental Election with Ballot Privacy - Richard Carback, David Chaum, Jeremy Clark, John.pdf

492.2 KB

Searching the Searchers with SearchAudit - John P. John, Fang Yu, Yinglian Xie, Martin Abadi, Arvind Krishnamurthy.pdf

711.2 KB

Securing Script-Based Extensibility in Web Browsers - Vladan Djeric, Ashvin Goel.pdf

145.3 KB

Security and Privacy Vulnerabilities of In-Car Wireless Networks A Tire Pressure Monitoring System Case Study - Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis Tay.pdf

1.3 MB

SEPIA Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics - Martin Burkhart, Mario Strasser, Dilip Many, Xenofontas Dimitropoulos.pdf

513.0 KB

Staying Safe on the Web Yesterday, Today, and Tomorrow - Sid Stamm.pdf

3.1 MB

Structuring Protocol Implementations to Protect Sensitive Data - Petr Marchenko, Brad Karp.pdf

234.5 KB

The Case for Ubiquitous Transport-Level Encryption - Andrea Bittau, Michael Hamburg, Mark Handley, David Mazieres, Dan Boneh.pdf

208.2 KB

Toward an Open and Secure Platform for Using the Web - Will Drewry.html

51.2 KB

Toward Automated Detection of Logic Vulnerabilities in Web Applications - Viktoria Felmetsger, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna.pdf

252.8 KB

Understanding CAPTCHA-Solving Services in an Economic Context - Marti Motoyama, Kirill Levchenko, Chris Kanich, Damon McCoy, Geoffrey M. Voelker, Stefan Savage.pdf

1.7 MB

USENIX Security 2010 Errata.pdf

97.9 KB

USENIX Security 2010 Proceedings.pdf

20.8 MB

VEX Vetting Browser Extensions for Security Vulnerabilities - Sruthi Bandhakavi, Samuel T. King, P. Madhusudan, Marianne Winslett.pdf

456.1 KB

Vulnerable Compliance - Dan Geer.pdf

710.6 KB

ZKPDL A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash - Sarah Meiklejohn, C. Chris Erway, Alptekin Kupcu, Theodora Hinkle, Anna Lysy.pdf

694.5 KB

/.../USENIX Security 2010 Technical Sessions_files/

dot_clear.gif

0.0 KB

dot_clear_002.gif

0.0 KB

footer.gif

0.3 KB

johnston_roger200x170.jpg

14.7 KB

left_bar.gif

0.1 KB

left_bottom.gif

0.5 KB

longbar.gif

0.1 KB

mp3_icon.gif

0.8 KB

questmark.gif

0.1 KB

sec09opening.jpg

143.8 KB

sec10_banner.jpg

30.8 KB

video_icon.gif

1.3 KB

/USENIX Security 2011/

A Study of Android Application Security - William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri.mp4

12.7 MB

ADsafety Type-Based Verification of JavaScript Sandboxing - Joe Gibbs Politz, Spiridon Aristides Eliopoulos, Arjun Guha, Shriram Krishnamurthi.mp4

14.9 MB

BOTMAGNIFIER Locating Spambots on the Internet - Gianluca Stringhini, Thorsten Holz, Brett Stone-Gross, Christopher Kruegel, Giovanni Vigna.mp4

12.9 MB

Bubble Trouble Off-Line De-Anonymization of Bubble Forms - Joseph A. Calandrino, William Clarkson, Edward W. Felten.mp4

14.4 MB

Cloaking Malware with the Trusted Platform Module - Alan M. Dunn, Owen S. Hofmann, Brent Waters, Emmett Witchel.mp4

12.6 MB

Comprehensive Experimental Analyses of Automotive Attack Surfaces - Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl.mp4

15.9 MB

Crossing the Chasm Pitching Security Research to Mainstream Browser Vendors - Collin Jackson.mp4

41.3 MB

Dark Clouds on the Horizon Using Cloud Storage as Attack Vector and Online Slack Space - Martin Mulazzani, Sebastian Schrittwieser, Manuel Leithner, Markus Huber, Edgar Weippl.mp4

12.9 MB

Deport on Arrival Adventures in Technology, Politics, and Power - J. Alex Halderman.mp4

48.4 MB

deSEO Combating Search-Result Poisoning - John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy, Martin Abadi.mp4

12.4 MB

Detecting Malware Domains at the Upper DNS Hierarchy - Manos Antonakakis, Roberto Perdisci, Wenke Lee, Nikolaos Vasiloglou II, David Dagon.mp4

12.5 MB

Differential Privacy Under Fire - Andreas Haeberlen, Benjamin C. Pierce, Arjun Narayan.mp4

13.8 MB

Dirty Jobs The Role of Freelance Labor in Web Service Abuse - Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker.mp4

11.9 MB

Fast and Precise Sanitizer Analysis with BEK - Pieter Hooimeijer, Benjamin Livshits, David Molnar, Prateek Saxena, Margus Veanes.mp4

12.7 MB

Faster Secure Two-Party Computation Using Garbled Circuits - Yan Huang, David Evans, Jonathan Katz.mp4

11.2 MB

Forensic Triage for Mobile Phones with DEC0DE - Robert J. Walls, Erik Learned-Miller, Brian Neil Levine.mp4

13.8 MB

I'm from the Government and I'm Here to Help - Perspectives from a Privacy Tech Wonk - Tara Whalen.mp4

39.2 MB

JACKSTRAWS Picking Command and Control Connections from Bot Traffic - Gregoire Jacob, Ralf Hund, Christopher Kruegel.mp4

14.6 MB

MACE Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery - Chia Yuan Cho, Domagoj Babic, Pongsin Poosankam, Kevin Zhijie Chen, Edward XueJun Wu.mp4

11.7 MB

mCarve Carving Attributed Dump Sets - Ton van Deursen, Sjouke Mauw, and Sasa Radomirovic.mp4

12.3 MB

Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade - Nektarios Leontiadis, Tyler Moore, Nicolas Christin.mp4

15.2 MB

Measuring Pay-per-Install The Commoditization of Malware Distribution - Juan Caballero, Chris Grier, Christian Kreibich, Vern Paxson.mp4

15.2 MB

Network Security in the Medium Term 2061-2561 AD - Charles Stross.mp4

33.5 MB

Opening Remarks, Awards, and Keynote Address - David Wagner.mp4

4.3 MB

Outsourcing the Decryption of ABE Ciphertexts - Matthew Green, Susan Hohenberger, Brent Waters.mp4

10.1 MB

Permission Re-Delegation Attacks and Defenses - Adrienne Porter Felt, Helen J. Wang, Alexander Moshchuk, Steve Hanna, Erika Chin.mp4

12.2 MB

Pico No More Passwords - Frank Stajano.mp4

46.9 MB

PIR-Tor Scalable Anonymous Communication Using Private Information Retrieval - Prateek Mittal, Femi Olumofin, Carmela Troncoso, Nikita Borisov, Ian Goldberg.mp4

11.9 MB

Privacy in the Age of Augmented Reality - Alessandro Acquisti.mp4

45.6 MB

Q Exploit Hardening Made Easy - Edward J. Schwartz, Thanassis Avgerinos, David Brumley.mp4

13.7 MB

QUIRE Lightweight Provenance for Smart Phone Operating Systems - Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anhei Shu, Dan S. Wallach.mp4

11.4 MB

Secure In-Band Wireless Pairing - Shyamnath Gollakota, Nabeel Ahmed, Nickolai Zeldovich, Dina Katabi.mp4

12.9 MB

SHELLOS Enabling Fast Detection and Forensic Analysis of Code Injection Attacks - Kevin Z. Snow, Srinivas Krishnan, Fabian Monrose, Niels Provos.mp4

11.8 MB

Show Me the Money Characterizing Spam-advertised Revenue - Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorso, Christian Kreibich, Kirill Levchenko, Vern Paxson, Geoffrey.mp4

15.7 MB

SMS of Death From Analyzing to Attacking Mobile Phones on a Large Scale - Collin Mulliner, Nico Golde, Jean-Pierre Seifert.mp4

15.2 MB

SSLTLS Certificates Threat or Menace - Eric Rescorla, Adam Langley, Brian Smith, Stephen Schultze, Steve Kent.mp4

33.8 MB

Telex Anticensorship in the Network Infrastructure - Eric Wustrow, Scott Wolchok, Ian Goldberg, J. Alex Halderman.mp4

11.8 MB

The Cloud-y Future of Security Technologies - Adam O'Donnell.mp4

20.3 MB

The Phantom Tollbooth Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion - Sarah Meiklejohn, Keaton Mowery, Stephen Checkoway, Hovav Shacham.mp4

14.2 MB

The Three Cyber-War Fallacies - Dave Aitel.mp4

43.3 MB

Toward Secure Embedded Web Interfaces - Baptiste Gourdin, Chinmay Soman, Hristo Bojinov, Elie Bursztein.mp4

12.1 MB

TRESOR Runs Encryption Securely Outside RAM - Tilo Müller, Felix C. Freiling, Andreas Dewald.mp4

15.3 MB

USENIX Security 2011 Poster Session.htm

14.7 KB

USENIX Security 2011 Proceedings Eratta.epub

3.8 KB

USENIX Security 2011 Proceedings Errata.mobi

4.2 KB

USENIX Security 2011 Proceedings Errata.pdf

79.3 KB

USENIX Security 2011 Proceedings.epub

19.0 MB

USENIX Security 2011 Proceedings.mobi

15.2 MB

USENIX Security 2011 Proceedings.pdf

22.6 MB

Why (Special Agent) Johnny (Still) Can't Encrypt A Security Analysis of the APCO Project 25 Two-Way Radio System - Sandy Clark, Travis Goodspeed, Perry Metzger, Zachary Wasserman.mp4

15.4 MB

ZOZZLE Fast and Precise In-Browser JavaScript Malware Detection - Charlie Curtsinger, Benjamin Livshits, Benjamin Zorn, Christian Seifert.mp4

19.9 MB

/.../USENIX Security 2011 captions/

A Study of Android Application Security - William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri.eng.json

1.3 MB

A Study of Android Application Security - William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri.eng.lrc

38.7 KB

A Study of Android Application Security - William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri.eng.srt

34.3 KB

A Study of Android Application Security - William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri.eng.text

23.9 KB

A Study of Android Application Security - William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri.eng.tsv

32.0 KB

A Study of Android Application Security - William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri.eng.txt

39.3 KB

A Study of Android Application Security - William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri.eng.vtt

31.3 KB

ADsafety Type-Based Verification of JavaScript Sandboxing - Joe Gibbs Politz, Spiridon Aristides Eliopoulos, Arjun Guha, Shriram Krishnamurthi.eng.json

1.7 MB

ADsafety Type-Based Verification of JavaScript Sandboxing - Joe Gibbs Politz, Spiridon Aristides Eliopoulos, Arjun Guha, Shriram Krishnamurthi.eng.lrc

48.8 KB

ADsafety Type-Based Verification of JavaScript Sandboxing - Joe Gibbs Politz, Spiridon Aristides Eliopoulos, Arjun Guha, Shriram Krishnamurthi.eng.srt

40.0 KB

ADsafety Type-Based Verification of JavaScript Sandboxing - Joe Gibbs Politz, Spiridon Aristides Eliopoulos, Arjun Guha, Shriram Krishnamurthi.eng.text

27.9 KB

ADsafety Type-Based Verification of JavaScript Sandboxing - Joe Gibbs Politz, Spiridon Aristides Eliopoulos, Arjun Guha, Shriram Krishnamurthi.eng.tsv

39.8 KB

ADsafety Type-Based Verification of JavaScript Sandboxing - Joe Gibbs Politz, Spiridon Aristides Eliopoulos, Arjun Guha, Shriram Krishnamurthi.eng.txt

49.6 KB

ADsafety Type-Based Verification of JavaScript Sandboxing - Joe Gibbs Politz, Spiridon Aristides Eliopoulos, Arjun Guha, Shriram Krishnamurthi.eng.vtt

36.5 KB

BOTMAGNIFIER Locating Spambots on the Internet - Gianluca Stringhini, Thorsten Holz, Brett Stone-Gross, Christopher Kruegel, Giovanni Vigna.eng.json

1.3 MB

BOTMAGNIFIER Locating Spambots on the Internet - Gianluca Stringhini, Thorsten Holz, Brett Stone-Gross, Christopher Kruegel, Giovanni Vigna.eng.lrc

29.7 KB

BOTMAGNIFIER Locating Spambots on the Internet - Gianluca Stringhini, Thorsten Holz, Brett Stone-Gross, Christopher Kruegel, Giovanni Vigna.eng.srt

32.4 KB

BOTMAGNIFIER Locating Spambots on the Internet - Gianluca Stringhini, Thorsten Holz, Brett Stone-Gross, Christopher Kruegel, Giovanni Vigna.eng.text

23.2 KB

BOTMAGNIFIER Locating Spambots on the Internet - Gianluca Stringhini, Thorsten Holz, Brett Stone-Gross, Christopher Kruegel, Giovanni Vigna.eng.tsv

26.9 KB

BOTMAGNIFIER Locating Spambots on the Internet - Gianluca Stringhini, Thorsten Holz, Brett Stone-Gross, Christopher Kruegel, Giovanni Vigna.eng.txt

30.0 KB

BOTMAGNIFIER Locating Spambots on the Internet - Gianluca Stringhini, Thorsten Holz, Brett Stone-Gross, Christopher Kruegel, Giovanni Vigna.eng.vtt

29.8 KB

Bubble Trouble Off-Line De-Anonymization of Bubble Forms - Joseph A. Calandrino, William Clarkson, Edward W. Felten.eng.json

1.6 MB

Bubble Trouble Off-Line De-Anonymization of Bubble Forms - Joseph A. Calandrino, William Clarkson, Edward W. Felten.eng.lrc

44.9 KB

Bubble Trouble Off-Line De-Anonymization of Bubble Forms - Joseph A. Calandrino, William Clarkson, Edward W. Felten.eng.srt

40.5 KB

Bubble Trouble Off-Line De-Anonymization of Bubble Forms - Joseph A. Calandrino, William Clarkson, Edward W. Felten.eng.text

29.5 KB

Bubble Trouble Off-Line De-Anonymization of Bubble Forms - Joseph A. Calandrino, William Clarkson, Edward W. Felten.eng.tsv

38.3 KB

Bubble Trouble Off-Line De-Anonymization of Bubble Forms - Joseph A. Calandrino, William Clarkson, Edward W. Felten.eng.txt

45.5 KB

Bubble Trouble Off-Line De-Anonymization of Bubble Forms - Joseph A. Calandrino, William Clarkson, Edward W. Felten.eng.vtt

37.3 KB

Cloaking Malware with the Trusted Platform Module - Alan M. Dunn, Owen S. Hofmann, Brent Waters, Emmett Witchel.eng.json

1.5 MB

Cloaking Malware with the Trusted Platform Module - Alan M. Dunn, Owen S. Hofmann, Brent Waters, Emmett Witchel.eng.lrc

41.3 KB

Cloaking Malware with the Trusted Platform Module - Alan M. Dunn, Owen S. Hofmann, Brent Waters, Emmett Witchel.eng.srt

38.5 KB

Cloaking Malware with the Trusted Platform Module - Alan M. Dunn, Owen S. Hofmann, Brent Waters, Emmett Witchel.eng.text

28.6 KB

Cloaking Malware with the Trusted Platform Module - Alan M. Dunn, Owen S. Hofmann, Brent Waters, Emmett Witchel.eng.tsv

35.9 KB

Cloaking Malware with the Trusted Platform Module - Alan M. Dunn, Owen S. Hofmann, Brent Waters, Emmett Witchel.eng.txt

41.8 KB

Cloaking Malware with the Trusted Platform Module - Alan M. Dunn, Owen S. Hofmann, Brent Waters, Emmett Witchel.eng.vtt

35.7 KB

Comprehensive Experimental Analyses of Automotive Attack Surfaces - Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl.eng.json

1.3 MB

Comprehensive Experimental Analyses of Automotive Attack Surfaces - Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl.eng.lrc

33.0 KB

Comprehensive Experimental Analyses of Automotive Attack Surfaces - Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl.eng.srt

35.5 KB

Comprehensive Experimental Analyses of Automotive Attack Surfaces - Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl.eng.text

25.4 KB

Comprehensive Experimental Analyses of Automotive Attack Surfaces - Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl.eng.tsv

29.7 KB

Comprehensive Experimental Analyses of Automotive Attack Surfaces - Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl.eng.txt

33.3 KB

Comprehensive Experimental Analyses of Automotive Attack Surfaces - Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl.eng.vtt

32.6 KB

Crossing the Chasm Pitching Security Research to Mainstream Browser Vendors - Collin Jackson.eng.json

4.5 MB

Crossing the Chasm Pitching Security Research to Mainstream Browser Vendors - Collin Jackson.eng.lrc

116.4 KB

Crossing the Chasm Pitching Security Research to Mainstream Browser Vendors - Collin Jackson.eng.srt

117.7 KB

Crossing the Chasm Pitching Security Research to Mainstream Browser Vendors - Collin Jackson.eng.text

88.2 KB

Crossing the Chasm Pitching Security Research to Mainstream Browser Vendors - Collin Jackson.eng.tsv

104.0 KB

Crossing the Chasm Pitching Security Research to Mainstream Browser Vendors - Collin Jackson.eng.txt

117.5 KB

Crossing the Chasm Pitching Security Research to Mainstream Browser Vendors - Collin Jackson.eng.vtt

110.9 KB

Dark Clouds on the Horizon Using Cloud Storage as Attack Vector and Online Slack Space - Martin Mulazzani, Sebastian Schrittwieser, Manuel Leithner, Markus Huber, Edgar Weippl.eng.json

1.1 MB

Dark Clouds on the Horizon Using Cloud Storage as Attack Vector and Online Slack Space - Martin Mulazzani, Sebastian Schrittwieser, Manuel Leithner, Markus Huber, Edgar Weippl.eng.lrc

30.7 KB

Dark Clouds on the Horizon Using Cloud Storage as Attack Vector and Online Slack Space - Martin Mulazzani, Sebastian Schrittwieser, Manuel Leithner, Markus Huber, Edgar Weippl.eng.srt

26.6 KB

Dark Clouds on the Horizon Using Cloud Storage as Attack Vector and Online Slack Space - Martin Mulazzani, Sebastian Schrittwieser, Manuel Leithner, Markus Huber, Edgar Weippl.eng.text

18.8 KB

Dark Clouds on the Horizon Using Cloud Storage as Attack Vector and Online Slack Space - Martin Mulazzani, Sebastian Schrittwieser, Manuel Leithner, Markus Huber, Edgar Weippl.eng.tsv

25.4 KB

Dark Clouds on the Horizon Using Cloud Storage as Attack Vector and Online Slack Space - Martin Mulazzani, Sebastian Schrittwieser, Manuel Leithner, Markus Huber, Edgar Weippl.eng.txt

31.1 KB

Dark Clouds on the Horizon Using Cloud Storage as Attack Vector and Online Slack Space - Martin Mulazzani, Sebastian Schrittwieser, Manuel Leithner, Markus Huber, Edgar Weippl.eng.vtt

24.3 KB

Deport on Arrival Adventures in Technology, Politics, and Power - J. Alex Halderman.eng.json

4.2 MB

Deport on Arrival Adventures in Technology, Politics, and Power - J. Alex Halderman.eng.lrc

119.2 KB

Deport on Arrival Adventures in Technology, Politics, and Power - J. Alex Halderman.eng.srt

102.9 KB

Deport on Arrival Adventures in Technology, Politics, and Power - J. Alex Halderman.eng.text

75.8 KB

Deport on Arrival Adventures in Technology, Politics, and Power - J. Alex Halderman.eng.tsv

99.7 KB

Deport on Arrival Adventures in Technology, Politics, and Power - J. Alex Halderman.eng.txt

120.7 KB

Deport on Arrival Adventures in Technology, Politics, and Power - J. Alex Halderman.eng.vtt

97.2 KB

deSEO Combating Search-Result Poisoning - John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy, Martin Abadi.eng.json

1.4 MB

deSEO Combating Search-Result Poisoning - John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy, Martin Abadi.eng.lrc

37.6 KB

deSEO Combating Search-Result Poisoning - John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy, Martin Abadi.eng.srt

35.2 KB

deSEO Combating Search-Result Poisoning - John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy, Martin Abadi.eng.text

24.2 KB

deSEO Combating Search-Result Poisoning - John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy, Martin Abadi.eng.tsv

31.8 KB

deSEO Combating Search-Result Poisoning - John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy, Martin Abadi.eng.txt

38.2 KB

deSEO Combating Search-Result Poisoning - John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy, Martin Abadi.eng.vtt

32.0 KB

Detecting Malware Domains at the Upper DNS Hierarchy - Manos Antonakakis, Roberto Perdisci, Wenke Lee, Nikolaos Vasiloglou II, David Dagon.eng.json

1.2 MB

Detecting Malware Domains at the Upper DNS Hierarchy - Manos Antonakakis, Roberto Perdisci, Wenke Lee, Nikolaos Vasiloglou II, David Dagon.eng.lrc

31.7 KB

Detecting Malware Domains at the Upper DNS Hierarchy - Manos Antonakakis, Roberto Perdisci, Wenke Lee, Nikolaos Vasiloglou II, David Dagon.eng.srt

30.3 KB

Detecting Malware Domains at the Upper DNS Hierarchy - Manos Antonakakis, Roberto Perdisci, Wenke Lee, Nikolaos Vasiloglou II, David Dagon.eng.text

23.5 KB

Detecting Malware Domains at the Upper DNS Hierarchy - Manos Antonakakis, Roberto Perdisci, Wenke Lee, Nikolaos Vasiloglou II, David Dagon.eng.tsv

28.1 KB

Detecting Malware Domains at the Upper DNS Hierarchy - Manos Antonakakis, Roberto Perdisci, Wenke Lee, Nikolaos Vasiloglou II, David Dagon.eng.txt

32.0 KB

Detecting Malware Domains at the Upper DNS Hierarchy - Manos Antonakakis, Roberto Perdisci, Wenke Lee, Nikolaos Vasiloglou II, David Dagon.eng.vtt

28.4 KB

Differential Privacy Under Fire - Andreas Haeberlen, Benjamin C. Pierce, Arjun Narayan.eng.json

1.6 MB

Differential Privacy Under Fire - Andreas Haeberlen, Benjamin C. Pierce, Arjun Narayan.eng.lrc

40.7 KB

Differential Privacy Under Fire - Andreas Haeberlen, Benjamin C. Pierce, Arjun Narayan.eng.srt

43.5 KB

Differential Privacy Under Fire - Andreas Haeberlen, Benjamin C. Pierce, Arjun Narayan.eng.text

31.8 KB

Differential Privacy Under Fire - Andreas Haeberlen, Benjamin C. Pierce, Arjun Narayan.eng.tsv

36.9 KB

Differential Privacy Under Fire - Andreas Haeberlen, Benjamin C. Pierce, Arjun Narayan.eng.txt

41.0 KB

Differential Privacy Under Fire - Andreas Haeberlen, Benjamin C. Pierce, Arjun Narayan.eng.vtt

40.2 KB

Dirty Jobs The Role of Freelance Labor in Web Service Abuse - Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker.eng.json

1.5 MB

Dirty Jobs The Role of Freelance Labor in Web Service Abuse - Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker.eng.lrc

45.6 KB

Dirty Jobs The Role of Freelance Labor in Web Service Abuse - Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker.eng.srt

37.6 KB

Dirty Jobs The Role of Freelance Labor in Web Service Abuse - Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker.eng.text

27.0 KB

Dirty Jobs The Role of Freelance Labor in Web Service Abuse - Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker.eng.tsv

37.6 KB

Dirty Jobs The Role of Freelance Labor in Web Service Abuse - Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker.eng.txt

46.3 KB

Dirty Jobs The Role of Freelance Labor in Web Service Abuse - Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker.eng.vtt

34.5 KB

Fast and Precise Sanitizer Analysis with BEK - Pieter Hooimeijer, Benjamin Livshits, David Molnar, Prateek Saxena, Margus Veanes.eng.json

1.3 MB

Fast and Precise Sanitizer Analysis with BEK - Pieter Hooimeijer, Benjamin Livshits, David Molnar, Prateek Saxena, Margus Veanes.eng.lrc

35.8 KB

Fast and Precise Sanitizer Analysis with BEK - Pieter Hooimeijer, Benjamin Livshits, David Molnar, Prateek Saxena, Margus Veanes.eng.srt

34.4 KB

Fast and Precise Sanitizer Analysis with BEK - Pieter Hooimeijer, Benjamin Livshits, David Molnar, Prateek Saxena, Margus Veanes.eng.text

24.5 KB

Fast and Precise Sanitizer Analysis with BEK - Pieter Hooimeijer, Benjamin Livshits, David Molnar, Prateek Saxena, Margus Veanes.eng.tsv

31.0 KB

Fast and Precise Sanitizer Analysis with BEK - Pieter Hooimeijer, Benjamin Livshits, David Molnar, Prateek Saxena, Margus Veanes.eng.txt

36.3 KB

Fast and Precise Sanitizer Analysis with BEK - Pieter Hooimeijer, Benjamin Livshits, David Molnar, Prateek Saxena, Margus Veanes.eng.vtt

31.6 KB

Faster Secure Two-Party Computation Using Garbled Circuits - Yan Huang, David Evans, Jonathan Katz.eng.json

752.3 KB

Faster Secure Two-Party Computation Using Garbled Circuits - Yan Huang, David Evans, Jonathan Katz.eng.lrc

20.0 KB

Faster Secure Two-Party Computation Using Garbled Circuits - Yan Huang, David Evans, Jonathan Katz.eng.srt

21.6 KB

Faster Secure Two-Party Computation Using Garbled Circuits - Yan Huang, David Evans, Jonathan Katz.eng.text

14.9 KB

Faster Secure Two-Party Computation Using Garbled Circuits - Yan Huang, David Evans, Jonathan Katz.eng.tsv

17.7 KB

Faster Secure Two-Party Computation Using Garbled Circuits - Yan Huang, David Evans, Jonathan Katz.eng.txt

20.2 KB

Faster Secure Two-Party Computation Using Garbled Circuits - Yan Huang, David Evans, Jonathan Katz.eng.vtt

19.7 KB

Forensic Triage for Mobile Phones with DEC0DE - Robert J. Walls, Erik Learned-Miller, Brian Neil Levine.eng.json

1.5 MB

Forensic Triage for Mobile Phones with DEC0DE - Robert J. Walls, Erik Learned-Miller, Brian Neil Levine.eng.lrc

40.5 KB

Forensic Triage for Mobile Phones with DEC0DE - Robert J. Walls, Erik Learned-Miller, Brian Neil Levine.eng.srt

38.7 KB

Forensic Triage for Mobile Phones with DEC0DE - Robert J. Walls, Erik Learned-Miller, Brian Neil Levine.eng.text

27.7 KB

Forensic Triage for Mobile Phones with DEC0DE - Robert J. Walls, Erik Learned-Miller, Brian Neil Levine.eng.tsv

35.2 KB

Forensic Triage for Mobile Phones with DEC0DE - Robert J. Walls, Erik Learned-Miller, Brian Neil Levine.eng.txt

41.0 KB

Forensic Triage for Mobile Phones with DEC0DE - Robert J. Walls, Erik Learned-Miller, Brian Neil Levine.eng.vtt

35.6 KB

I'm from the Government and I'm Here to Help - Perspectives from a Privacy Tech Wonk - Tara Whalen.eng.json

5.7 MB

I'm from the Government and I'm Here to Help - Perspectives from a Privacy Tech Wonk - Tara Whalen.eng.lrc

173.6 KB

I'm from the Government and I'm Here to Help - Perspectives from a Privacy Tech Wonk - Tara Whalen.eng.srt

133.5 KB

I'm from the Government and I'm Here to Help - Perspectives from a Privacy Tech Wonk - Tara Whalen.eng.text

98.6 KB

I'm from the Government and I'm Here to Help - Perspectives from a Privacy Tech Wonk - Tara Whalen.eng.tsv

140.4 KB

I'm from the Government and I'm Here to Help - Perspectives from a Privacy Tech Wonk - Tara Whalen.eng.txt

176.3 KB

I'm from the Government and I'm Here to Help - Perspectives from a Privacy Tech Wonk - Tara Whalen.eng.vtt

125.0 KB

JACKSTRAWS Picking Command and Control Connections from Bot Traffic - Gregoire Jacob, Ralf Hund, Christopher Kruegel.eng.json

1.3 MB

JACKSTRAWS Picking Command and Control Connections from Bot Traffic - Gregoire Jacob, Ralf Hund, Christopher Kruegel.eng.lrc

34.6 KB

JACKSTRAWS Picking Command and Control Connections from Bot Traffic - Gregoire Jacob, Ralf Hund, Christopher Kruegel.eng.srt

32.5 KB

JACKSTRAWS Picking Command and Control Connections from Bot Traffic - Gregoire Jacob, Ralf Hund, Christopher Kruegel.eng.text

24.3 KB

JACKSTRAWS Picking Command and Control Connections from Bot Traffic - Gregoire Jacob, Ralf Hund, Christopher Kruegel.eng.tsv

30.2 KB

JACKSTRAWS Picking Command and Control Connections from Bot Traffic - Gregoire Jacob, Ralf Hund, Christopher Kruegel.eng.txt

35.0 KB

JACKSTRAWS Picking Command and Control Connections from Bot Traffic - Gregoire Jacob, Ralf Hund, Christopher Kruegel.eng.vtt

30.1 KB

MACE Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery - Chia Yuan Cho, Domagoj Babic, Pongsin Poosankam, Kevin Zhijie Chen, Edward XueJun Wu.eng.json

1.3 MB

MACE Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery - Chia Yuan Cho, Domagoj Babic, Pongsin Poosankam, Kevin Zhijie Chen, Edward XueJun Wu.eng.lrc

37.2 KB

MACE Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery - Chia Yuan Cho, Domagoj Babic, Pongsin Poosankam, Kevin Zhijie Chen, Edward XueJun Wu.eng.srt

30.2 KB

MACE Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery - Chia Yuan Cho, Domagoj Babic, Pongsin Poosankam, Kevin Zhijie Chen, Edward XueJun Wu.eng.text

22.6 KB

MACE Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery - Chia Yuan Cho, Domagoj Babic, Pongsin Poosankam, Kevin Zhijie Chen, Edward XueJun Wu.eng.tsv

30.7 KB

MACE Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery - Chia Yuan Cho, Domagoj Babic, Pongsin Poosankam, Kevin Zhijie Chen, Edward XueJun Wu.eng.txt

37.7 KB

MACE Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery - Chia Yuan Cho, Domagoj Babic, Pongsin Poosankam, Kevin Zhijie Chen, Edward XueJun Wu.eng.vtt

28.0 KB

mCarve Carving Attributed Dump Sets - Ton van Deursen, Sjouke Mauw, and Sasa Radomirovic.eng.json

1.2 MB

mCarve Carving Attributed Dump Sets - Ton van Deursen, Sjouke Mauw, and Sasa Radomirovic.eng.lrc

29.4 KB

mCarve Carving Attributed Dump Sets - Ton van Deursen, Sjouke Mauw, and Sasa Radomirovic.eng.srt

31.8 KB

mCarve Carving Attributed Dump Sets - Ton van Deursen, Sjouke Mauw, and Sasa Radomirovic.eng.text

21.5 KB

mCarve Carving Attributed Dump Sets - Ton van Deursen, Sjouke Mauw, and Sasa Radomirovic.eng.tsv

25.9 KB

mCarve Carving Attributed Dump Sets - Ton van Deursen, Sjouke Mauw, and Sasa Radomirovic.eng.txt

29.7 KB

mCarve Carving Attributed Dump Sets - Ton van Deursen, Sjouke Mauw, and Sasa Radomirovic.eng.vtt

28.9 KB

Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade - Nektarios Leontiadis, Tyler Moore, Nicolas Christin.eng.json

1.2 MB

Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade - Nektarios Leontiadis, Tyler Moore, Nicolas Christin.eng.lrc

32.2 KB

Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade - Nektarios Leontiadis, Tyler Moore, Nicolas Christin.eng.srt

34.3 KB

Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade - Nektarios Leontiadis, Tyler Moore, Nicolas Christin.eng.text

23.9 KB

Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade - Nektarios Leontiadis, Tyler Moore, Nicolas Christin.eng.tsv

28.6 KB

Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade - Nektarios Leontiadis, Tyler Moore, Nicolas Christin.eng.txt

32.5 KB

Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade - Nektarios Leontiadis, Tyler Moore, Nicolas Christin.eng.vtt

31.4 KB

Measuring Pay-per-Install The Commoditization of Malware Distribution - Juan Caballero, Chris Grier, Christian Kreibich, Vern Paxson.eng.json

1.8 MB

Measuring Pay-per-Install The Commoditization of Malware Distribution - Juan Caballero, Chris Grier, Christian Kreibich, Vern Paxson.eng.lrc

48.2 KB

Measuring Pay-per-Install The Commoditization of Malware Distribution - Juan Caballero, Chris Grier, Christian Kreibich, Vern Paxson.eng.srt

46.9 KB

Measuring Pay-per-Install The Commoditization of Malware Distribution - Juan Caballero, Chris Grier, Christian Kreibich, Vern Paxson.eng.text

33.3 KB

Measuring Pay-per-Install The Commoditization of Malware Distribution - Juan Caballero, Chris Grier, Christian Kreibich, Vern Paxson.eng.tsv

42.0 KB

Measuring Pay-per-Install The Commoditization of Malware Distribution - Juan Caballero, Chris Grier, Christian Kreibich, Vern Paxson.eng.txt

48.8 KB

Measuring Pay-per-Install The Commoditization of Malware Distribution - Juan Caballero, Chris Grier, Christian Kreibich, Vern Paxson.eng.vtt

43.0 KB

Network Security in the Medium Term 2061-2561 AD - Charles Stross.eng.json

2.6 MB

Network Security in the Medium Term 2061-2561 AD - Charles Stross.eng.lrc

68.0 KB

Network Security in the Medium Term 2061-2561 AD - Charles Stross.eng.srt

71.4 KB

Network Security in the Medium Term 2061-2561 AD - Charles Stross.eng.text

53.8 KB

Network Security in the Medium Term 2061-2561 AD - Charles Stross.eng.tsv

62.1 KB

Network Security in the Medium Term 2061-2561 AD - Charles Stross.eng.txt

68.5 KB

Network Security in the Medium Term 2061-2561 AD - Charles Stross.eng.vtt

66.3 KB

Opening Remarks, Awards, and Keynote Address - David Wagner.eng.json

388.9 KB

Opening Remarks, Awards, and Keynote Address - David Wagner.eng.lrc

10.8 KB

Opening Remarks, Awards, and Keynote Address - David Wagner.eng.srt

10.3 KB

Opening Remarks, Awards, and Keynote Address - David Wagner.eng.text

7.2 KB

Opening Remarks, Awards, and Keynote Address - David Wagner.eng.tsv

9.1 KB

Opening Remarks, Awards, and Keynote Address - David Wagner.eng.txt

10.9 KB

Opening Remarks, Awards, and Keynote Address - David Wagner.eng.vtt

9.4 KB

Outsourcing the Decryption of ABE Ciphertexts - Matthew Green, Susan Hohenberger, Brent Waters.eng.json

1.4 MB

Outsourcing the Decryption of ABE Ciphertexts - Matthew Green, Susan Hohenberger, Brent Waters.eng.lrc

36.7 KB

Outsourcing the Decryption of ABE Ciphertexts - Matthew Green, Susan Hohenberger, Brent Waters.eng.srt

32.9 KB

Outsourcing the Decryption of ABE Ciphertexts - Matthew Green, Susan Hohenberger, Brent Waters.eng.text

23.8 KB

Outsourcing the Decryption of ABE Ciphertexts - Matthew Green, Susan Hohenberger, Brent Waters.eng.tsv

31.0 KB

Outsourcing the Decryption of ABE Ciphertexts - Matthew Green, Susan Hohenberger, Brent Waters.eng.txt

37.2 KB

Outsourcing the Decryption of ABE Ciphertexts - Matthew Green, Susan Hohenberger, Brent Waters.eng.vtt

30.3 KB

Permission Re-Delegation Attacks and Defenses - Adrienne Porter Felt, Helen J. Wang, Alexander Moshchuk, Steve Hanna, Erika Chin.eng.json

1.4 MB

Permission Re-Delegation Attacks and Defenses - Adrienne Porter Felt, Helen J. Wang, Alexander Moshchuk, Steve Hanna, Erika Chin.eng.lrc

40.8 KB

Permission Re-Delegation Attacks and Defenses - Adrienne Porter Felt, Helen J. Wang, Alexander Moshchuk, Steve Hanna, Erika Chin.eng.srt

37.5 KB

Permission Re-Delegation Attacks and Defenses - Adrienne Porter Felt, Helen J. Wang, Alexander Moshchuk, Steve Hanna, Erika Chin.eng.text

27.5 KB

Permission Re-Delegation Attacks and Defenses - Adrienne Porter Felt, Helen J. Wang, Alexander Moshchuk, Steve Hanna, Erika Chin.eng.tsv

35.2 KB

Permission Re-Delegation Attacks and Defenses - Adrienne Porter Felt, Helen J. Wang, Alexander Moshchuk, Steve Hanna, Erika Chin.eng.txt

41.3 KB

Permission Re-Delegation Attacks and Defenses - Adrienne Porter Felt, Helen J. Wang, Alexander Moshchuk, Steve Hanna, Erika Chin.eng.vtt

34.6 KB

Pico No More Passwords - Frank Stajano.eng.json

3.9 MB

Pico No More Passwords - Frank Stajano.eng.lrc

95.2 KB

Pico No More Passwords - Frank Stajano.eng.srt

103.0 KB

Pico No More Passwords - Frank Stajano.eng.text

75.9 KB

Pico No More Passwords - Frank Stajano.eng.tsv

86.6 KB

Pico No More Passwords - Frank Stajano.eng.txt

95.9 KB

Pico No More Passwords - Frank Stajano.eng.vtt

96.6 KB

PIR-Tor Scalable Anonymous Communication Using Private Information Retrieval - Prateek Mittal, Femi Olumofin, Carmela Troncoso, Nikita Borisov, Ian Goldberg.eng.json

1.2 MB

PIR-Tor Scalable Anonymous Communication Using Private Information Retrieval - Prateek Mittal, Femi Olumofin, Carmela Troncoso, Nikita Borisov, Ian Goldberg.eng.lrc

34.3 KB

PIR-Tor Scalable Anonymous Communication Using Private Information Retrieval - Prateek Mittal, Femi Olumofin, Carmela Troncoso, Nikita Borisov, Ian Goldberg.eng.srt

30.9 KB

PIR-Tor Scalable Anonymous Communication Using Private Information Retrieval - Prateek Mittal, Femi Olumofin, Carmela Troncoso, Nikita Borisov, Ian Goldberg.eng.text

23.2 KB

PIR-Tor Scalable Anonymous Communication Using Private Information Retrieval - Prateek Mittal, Femi Olumofin, Carmela Troncoso, Nikita Borisov, Ian Goldberg.eng.tsv

29.4 KB

PIR-Tor Scalable Anonymous Communication Using Private Information Retrieval - Prateek Mittal, Femi Olumofin, Carmela Troncoso, Nikita Borisov, Ian Goldberg.eng.txt

34.7 KB

PIR-Tor Scalable Anonymous Communication Using Private Information Retrieval - Prateek Mittal, Femi Olumofin, Carmela Troncoso, Nikita Borisov, Ian Goldberg.eng.vtt

28.7 KB

Privacy in the Age of Augmented Reality - Alessandro Acquisti.eng.json

4.4 MB

Privacy in the Age of Augmented Reality - Alessandro Acquisti.eng.lrc

111.1 KB

Privacy in the Age of Augmented Reality - Alessandro Acquisti.eng.srt

116.2 KB

Privacy in the Age of Augmented Reality - Alessandro Acquisti.eng.text

85.5 KB

Privacy in the Age of Augmented Reality - Alessandro Acquisti.eng.tsv

99.8 KB

Privacy in the Age of Augmented Reality - Alessandro Acquisti.eng.txt

112.0 KB

Privacy in the Age of Augmented Reality - Alessandro Acquisti.eng.vtt

109.0 KB

Q Exploit Hardening Made Easy - Edward J. Schwartz, Thanassis Avgerinos, David Brumley.eng.json

1.7 MB

Q Exploit Hardening Made Easy - Edward J. Schwartz, Thanassis Avgerinos, David Brumley.eng.lrc

50.0 KB

Q Exploit Hardening Made Easy - Edward J. Schwartz, Thanassis Avgerinos, David Brumley.eng.srt

41.8 KB

Q Exploit Hardening Made Easy - Edward J. Schwartz, Thanassis Avgerinos, David Brumley.eng.text

30.3 KB

Q Exploit Hardening Made Easy - Edward J. Schwartz, Thanassis Avgerinos, David Brumley.eng.tsv

41.7 KB

Q Exploit Hardening Made Easy - Edward J. Schwartz, Thanassis Avgerinos, David Brumley.eng.txt

50.8 KB

Q Exploit Hardening Made Easy - Edward J. Schwartz, Thanassis Avgerinos, David Brumley.eng.vtt

38.4 KB

QUIRE Lightweight Provenance for Smart Phone Operating Systems - Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anhei Shu, Dan S. Wallach.eng.json

1.4 MB

QUIRE Lightweight Provenance for Smart Phone Operating Systems - Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anhei Shu, Dan S. Wallach.eng.lrc

36.7 KB

QUIRE Lightweight Provenance for Smart Phone Operating Systems - Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anhei Shu, Dan S. Wallach.eng.srt

37.9 KB

QUIRE Lightweight Provenance for Smart Phone Operating Systems - Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anhei Shu, Dan S. Wallach.eng.text

28.2 KB

QUIRE Lightweight Provenance for Smart Phone Operating Systems - Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anhei Shu, Dan S. Wallach.eng.tsv

33.0 KB

QUIRE Lightweight Provenance for Smart Phone Operating Systems - Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anhei Shu, Dan S. Wallach.eng.txt

37.0 KB

QUIRE Lightweight Provenance for Smart Phone Operating Systems - Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anhei Shu, Dan S. Wallach.eng.vtt

35.2 KB

Secure In-Band Wireless Pairing - Shyamnath Gollakota, Nabeel Ahmed, Nickolai Zeldovich, Dina Katabi.eng.json

1.3 MB

Secure In-Band Wireless Pairing - Shyamnath Gollakota, Nabeel Ahmed, Nickolai Zeldovich, Dina Katabi.eng.lrc

32.8 KB

Secure In-Band Wireless Pairing - Shyamnath Gollakota, Nabeel Ahmed, Nickolai Zeldovich, Dina Katabi.eng.srt

34.8 KB

Secure In-Band Wireless Pairing - Shyamnath Gollakota, Nabeel Ahmed, Nickolai Zeldovich, Dina Katabi.eng.text

25.0 KB

Secure In-Band Wireless Pairing - Shyamnath Gollakota, Nabeel Ahmed, Nickolai Zeldovich, Dina Katabi.eng.tsv

29.4 KB

Secure In-Band Wireless Pairing - Shyamnath Gollakota, Nabeel Ahmed, Nickolai Zeldovich, Dina Katabi.eng.txt

33.1 KB

Secure In-Band Wireless Pairing - Shyamnath Gollakota, Nabeel Ahmed, Nickolai Zeldovich, Dina Katabi.eng.vtt

32.0 KB

SHELLOS Enabling Fast Detection and Forensic Analysis of Code Injection Attacks - Kevin Z. Snow, Srinivas Krishnan, Fabian Monrose, Niels Provos.eng.json

1.4 MB

SHELLOS Enabling Fast Detection and Forensic Analysis of Code Injection Attacks - Kevin Z. Snow, Srinivas Krishnan, Fabian Monrose, Niels Provos.eng.lrc

41.0 KB

SHELLOS Enabling Fast Detection and Forensic Analysis of Code Injection Attacks - Kevin Z. Snow, Srinivas Krishnan, Fabian Monrose, Niels Provos.eng.srt

33.6 KB

SHELLOS Enabling Fast Detection and Forensic Analysis of Code Injection Attacks - Kevin Z. Snow, Srinivas Krishnan, Fabian Monrose, Niels Provos.eng.text

26.1 KB

SHELLOS Enabling Fast Detection and Forensic Analysis of Code Injection Attacks - Kevin Z. Snow, Srinivas Krishnan, Fabian Monrose, Niels Provos.eng.tsv

34.6 KB

SHELLOS Enabling Fast Detection and Forensic Analysis of Code Injection Attacks - Kevin Z. Snow, Srinivas Krishnan, Fabian Monrose, Niels Provos.eng.txt

41.6 KB

SHELLOS Enabling Fast Detection and Forensic Analysis of Code Injection Attacks - Kevin Z. Snow, Srinivas Krishnan, Fabian Monrose, Niels Provos.eng.vtt

31.4 KB

Show Me the Money Characterizing Spam-advertised Revenue - Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorso, Christian Kreibich, Kirill Levchenko, Vern Paxson, Geoffrey.eng.json

1.4 MB

Show Me the Money Characterizing Spam-advertised Revenue - Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorso, Christian Kreibich, Kirill Levchenko, Vern Paxson, Geoffrey.eng.lrc

37.2 KB

Show Me the Money Characterizing Spam-advertised Revenue - Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorso, Christian Kreibich, Kirill Levchenko, Vern Paxson, Geoffrey.eng.srt

34.6 KB

Show Me the Money Characterizing Spam-advertised Revenue - Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorso, Christian Kreibich, Kirill Levchenko, Vern Paxson, Geoffrey.eng.text

27.1 KB

Show Me the Money Characterizing Spam-advertised Revenue - Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorso, Christian Kreibich, Kirill Levchenko, Vern Paxson, Geoffrey.eng.tsv

32.9 KB

Show Me the Money Characterizing Spam-advertised Revenue - Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorso, Christian Kreibich, Kirill Levchenko, Vern Paxson, Geoffrey.eng.txt

37.6 KB

Show Me the Money Characterizing Spam-advertised Revenue - Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorso, Christian Kreibich, Kirill Levchenko, Vern Paxson, Geoffrey.eng.vtt

32.5 KB

SMS of Death From Analyzing to Attacking Mobile Phones on a Large Scale - Collin Mulliner, Nico Golde, Jean-Pierre Seifert.eng.json

1.5 MB

SMS of Death From Analyzing to Attacking Mobile Phones on a Large Scale - Collin Mulliner, Nico Golde, Jean-Pierre Seifert.eng.lrc

40.4 KB

SMS of Death From Analyzing to Attacking Mobile Phones on a Large Scale - Collin Mulliner, Nico Golde, Jean-Pierre Seifert.eng.srt

33.3 KB

SMS of Death From Analyzing to Attacking Mobile Phones on a Large Scale - Collin Mulliner, Nico Golde, Jean-Pierre Seifert.eng.text

25.2 KB

SMS of Death From Analyzing to Attacking Mobile Phones on a Large Scale - Collin Mulliner, Nico Golde, Jean-Pierre Seifert.eng.tsv

33.9 KB

SMS of Death From Analyzing to Attacking Mobile Phones on a Large Scale - Collin Mulliner, Nico Golde, Jean-Pierre Seifert.eng.txt

41.0 KB

SMS of Death From Analyzing to Attacking Mobile Phones on a Large Scale - Collin Mulliner, Nico Golde, Jean-Pierre Seifert.eng.vtt

30.9 KB

SSLTLS Certificates Threat or Menace - Eric Rescorla, Adam Langley, Brian Smith, Stephen Schultze, Steve Kent.eng.json

4.3 MB

SSLTLS Certificates Threat or Menace - Eric Rescorla, Adam Langley, Brian Smith, Stephen Schultze, Steve Kent.eng.lrc

108.6 KB

SSLTLS Certificates Threat or Menace - Eric Rescorla, Adam Langley, Brian Smith, Stephen Schultze, Steve Kent.eng.srt

108.2 KB

SSLTLS Certificates Threat or Menace - Eric Rescorla, Adam Langley, Brian Smith, Stephen Schultze, Steve Kent.eng.text

81.4 KB

SSLTLS Certificates Threat or Menace - Eric Rescorla, Adam Langley, Brian Smith, Stephen Schultze, Steve Kent.eng.tsv

96.5 KB

SSLTLS Certificates Threat or Menace - Eric Rescorla, Adam Langley, Brian Smith, Stephen Schultze, Steve Kent.eng.txt

109.5 KB

SSLTLS Certificates Threat or Menace - Eric Rescorla, Adam Langley, Brian Smith, Stephen Schultze, Steve Kent.eng.vtt

101.9 KB

Telex Anticensorship in the Network Infrastructure - Eric Wustrow, Scott Wolchok, Ian Goldberg, J. Alex Halderman.eng.json

1.1 MB

Telex Anticensorship in the Network Infrastructure - Eric Wustrow, Scott Wolchok, Ian Goldberg, J. Alex Halderman.eng.lrc

29.5 KB

Telex Anticensorship in the Network Infrastructure - Eric Wustrow, Scott Wolchok, Ian Goldberg, J. Alex Halderman.eng.srt

28.6 KB

Telex Anticensorship in the Network Infrastructure - Eric Wustrow, Scott Wolchok, Ian Goldberg, J. Alex Halderman.eng.text

20.4 KB

Telex Anticensorship in the Network Infrastructure - Eric Wustrow, Scott Wolchok, Ian Goldberg, J. Alex Halderman.eng.tsv

25.5 KB

Telex Anticensorship in the Network Infrastructure - Eric Wustrow, Scott Wolchok, Ian Goldberg, J. Alex Halderman.eng.txt

29.8 KB

Telex Anticensorship in the Network Infrastructure - Eric Wustrow, Scott Wolchok, Ian Goldberg, J. Alex Halderman.eng.vtt

26.3 KB

The Cloud-y Future of Security Technologies - Adam O'Donnell.eng.json

2.4 MB

The Cloud-y Future of Security Technologies - Adam O'Donnell.eng.lrc

56.2 KB

The Cloud-y Future of Security Technologies - Adam O'Donnell.eng.srt

62.3 KB

The Cloud-y Future of Security Technologies - Adam O'Donnell.eng.text

43.6 KB

The Cloud-y Future of Security Technologies - Adam O'Donnell.eng.tsv

51.0 KB

The Cloud-y Future of Security Technologies - Adam O'Donnell.eng.txt

56.7 KB

The Cloud-y Future of Security Technologies - Adam O'Donnell.eng.vtt

56.9 KB

The Phantom Tollbooth Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion - Sarah Meiklejohn, Keaton Mowery, Stephen Checkoway, Hovav Shacham.eng.json

1.7 MB

The Phantom Tollbooth Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion - Sarah Meiklejohn, Keaton Mowery, Stephen Checkoway, Hovav Shacham.eng.lrc

41.4 KB

The Phantom Tollbooth Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion - Sarah Meiklejohn, Keaton Mowery, Stephen Checkoway, Hovav Shacham.eng.srt

42.5 KB

The Phantom Tollbooth Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion - Sarah Meiklejohn, Keaton Mowery, Stephen Checkoway, Hovav Shacham.eng.text

32.2 KB

The Phantom Tollbooth Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion - Sarah Meiklejohn, Keaton Mowery, Stephen Checkoway, Hovav Shacham.eng.tsv

37.4 KB

The Phantom Tollbooth Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion - Sarah Meiklejohn, Keaton Mowery, Stephen Checkoway, Hovav Shacham.eng.txt

41.8 KB

The Phantom Tollbooth Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion - Sarah Meiklejohn, Keaton Mowery, Stephen Checkoway, Hovav Shacham.eng.vtt

39.6 KB

The Three Cyber-War Fallacies - Dave Aitel.eng.json

4.1 MB

The Three Cyber-War Fallacies - Dave Aitel.eng.lrc

96.8 KB

The Three Cyber-War Fallacies - Dave Aitel.eng.srt

123.6 KB

The Three Cyber-War Fallacies - Dave Aitel.eng.text

75.6 KB

The Three Cyber-War Fallacies - Dave Aitel.eng.tsv

87.2 KB

The Three Cyber-War Fallacies - Dave Aitel.eng.txt

97.5 KB

The Three Cyber-War Fallacies - Dave Aitel.eng.vtt

111.4 KB

Toward Secure Embedded Web Interfaces - Baptiste Gourdin, Chinmay Soman, Hristo Bojinov, Elie Bursztein.eng.json

1.5 MB

Toward Secure Embedded Web Interfaces - Baptiste Gourdin, Chinmay Soman, Hristo Bojinov, Elie Bursztein.eng.lrc

38.9 KB

Toward Secure Embedded Web Interfaces - Baptiste Gourdin, Chinmay Soman, Hristo Bojinov, Elie Bursztein.eng.srt

35.1 KB

Toward Secure Embedded Web Interfaces - Baptiste Gourdin, Chinmay Soman, Hristo Bojinov, Elie Bursztein.eng.text

24.7 KB

Toward Secure Embedded Web Interfaces - Baptiste Gourdin, Chinmay Soman, Hristo Bojinov, Elie Bursztein.eng.tsv

32.9 KB

Toward Secure Embedded Web Interfaces - Baptiste Gourdin, Chinmay Soman, Hristo Bojinov, Elie Bursztein.eng.txt

39.4 KB

Toward Secure Embedded Web Interfaces - Baptiste Gourdin, Chinmay Soman, Hristo Bojinov, Elie Bursztein.eng.vtt

32.1 KB

TRESOR Runs Encryption Securely Outside RAM - Tilo Müller, Felix C. Freiling, Andreas Dewald.eng.json

1.4 MB

TRESOR Runs Encryption Securely Outside RAM - Tilo Müller, Felix C. Freiling, Andreas Dewald.eng.lrc

37.5 KB

TRESOR Runs Encryption Securely Outside RAM - Tilo Müller, Felix C. Freiling, Andreas Dewald.eng.srt

34.9 KB

TRESOR Runs Encryption Securely Outside RAM - Tilo Müller, Felix C. Freiling, Andreas Dewald.eng.text

23.2 KB

TRESOR Runs Encryption Securely Outside RAM - Tilo Müller, Felix C. Freiling, Andreas Dewald.eng.tsv

31.5 KB

TRESOR Runs Encryption Securely Outside RAM - Tilo Müller, Felix C. Freiling, Andreas Dewald.eng.txt

38.1 KB

TRESOR Runs Encryption Securely Outside RAM - Tilo Müller, Felix C. Freiling, Andreas Dewald.eng.vtt

31.5 KB

Why (Special Agent) Johnny (Still) Can't Encrypt A Security Analysis of the APCO Project 25 Two-Way Radio System - Sandy Clark, Travis Goodspeed, Perry Metzger, Zachary Wasserman.eng.json

1.5 MB

Why (Special Agent) Johnny (Still) Can't Encrypt A Security Analysis of the APCO Project 25 Two-Way Radio System - Sandy Clark, Travis Goodspeed, Perry Metzger, Zachary Wasserman.eng.lrc

43.4 KB

Why (Special Agent) Johnny (Still) Can't Encrypt A Security Analysis of the APCO Project 25 Two-Way Radio System - Sandy Clark, Travis Goodspeed, Perry Metzger, Zachary Wasserman.eng.srt

37.7 KB

Why (Special Agent) Johnny (Still) Can't Encrypt A Security Analysis of the APCO Project 25 Two-Way Radio System - Sandy Clark, Travis Goodspeed, Perry Metzger, Zachary Wasserman.eng.text

26.8 KB

Why (Special Agent) Johnny (Still) Can't Encrypt A Security Analysis of the APCO Project 25 Two-Way Radio System - Sandy Clark, Travis Goodspeed, Perry Metzger, Zachary Wasserman.eng.tsv

36.2 KB

Why (Special Agent) Johnny (Still) Can't Encrypt A Security Analysis of the APCO Project 25 Two-Way Radio System - Sandy Clark, Travis Goodspeed, Perry Metzger, Zachary Wasserman.eng.txt

44.0 KB

Why (Special Agent) Johnny (Still) Can't Encrypt A Security Analysis of the APCO Project 25 Two-Way Radio System - Sandy Clark, Travis Goodspeed, Perry Metzger, Zachary Wasserman.eng.vtt

34.5 KB

ZOZZLE Fast and Precise In-Browser JavaScript Malware Detection - Charlie Curtsinger, Benjamin Livshits, Benjamin Zorn, Christian Seifert.eng.json

1.9 MB

ZOZZLE Fast and Precise In-Browser JavaScript Malware Detection - Charlie Curtsinger, Benjamin Livshits, Benjamin Zorn, Christian Seifert.eng.lrc

56.5 KB

ZOZZLE Fast and Precise In-Browser JavaScript Malware Detection - Charlie Curtsinger, Benjamin Livshits, Benjamin Zorn, Christian Seifert.eng.srt

47.6 KB

ZOZZLE Fast and Precise In-Browser JavaScript Malware Detection - Charlie Curtsinger, Benjamin Livshits, Benjamin Zorn, Christian Seifert.eng.text

33.2 KB

ZOZZLE Fast and Precise In-Browser JavaScript Malware Detection - Charlie Curtsinger, Benjamin Livshits, Benjamin Zorn, Christian Seifert.eng.tsv

46.7 KB

ZOZZLE Fast and Precise In-Browser JavaScript Malware Detection - Charlie Curtsinger, Benjamin Livshits, Benjamin Zorn, Christian Seifert.eng.txt

57.4 KB

ZOZZLE Fast and Precise In-Browser JavaScript Malware Detection - Charlie Curtsinger, Benjamin Livshits, Benjamin Zorn, Christian Seifert.eng.vtt

43.4 KB

/.../USENIX Security 2011 Poster Session_files/

dot_clear.gif

0.0 KB

dot_clear_002.gif

0.0 KB

footer.gif

0.3 KB

left_bar.gif

1.2 KB

left_bottom.gif

1.7 KB

longbar.gif

1.2 KB

new_usenix.jpg

20.6 KB

questmark.gif

0.1 KB

sec11_banner.jpg

103.8 KB

/.../USENIX Security 2011 Presentations/

A Study of Android Application Security - William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri.pdf

1.4 MB

ADsafety Type-Based Verification of JavaScript Sandboxing - Joe Gibbs Politz, Spiridon Aristides Eliopoulos, Arjun Guha, Shriram Krishnamurthi.pdf

230.3 KB

ADsafety Type-Based Verification of JavaScript Sandboxing Slides - Joe Gibbs Politz, Spiridon Aristides Eliopoulos, Arjun Guha, Shriram Krishnamurthi.pdf

4.5 MB

BOTMAGNIFIER Locating Spambots on the Internet Slides - Gianluca Stringhini, Thorsten Holz, Brett Stone-Gross, Christopher Kruegel, Giovanni Vigna.pdf

1.9 MB

Bubble Trouble Off-Line De-Anonymization of Bubble Forms - Joseph A. Calandrino, William Clarkson, Edward W. Felten.pdf

433.4 KB

Cloaking Malware with the Trusted Platform Module - Alan M. Dunn, Owen S. Hofmann, Brent Waters, Emmett Witchel.pdf

261.8 KB

Cloaking Malware with the Trusted Platform Module Slides - Alan M. Dunn, Owen S. Hofmann, Brent Waters, Emmett Witchel.pdf

765.1 KB

Comprehensive Experimental Analyses of Automotive Attack Surfaces - Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl.pdf

1.2 MB

Crossing the Chasm Pitching Security Research to Mainstream Browser Vendors - Collin Jackson.pdf

4.5 MB

Dark Clouds on the Horizon Using Cloud Storage as Attack Vector and Online Slack Space - Martin Mulazzani, Sebastian Schrittwieser, Manuel Leithner, Markus Huber.pdf

329.8 KB

Dark Clouds on the Horizon Using Cloud Storage as Attack Vector and Online Slack Space Slides - Martin Mulazzani, Sebastian Schrittwieser, Manuel Leithner, Markus H.pdf

1.4 MB

deSEO Combating Search-Result Poisoning - John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy, Martin Abadi.pdf

1.1 MB

deSEO Combating Search-Result Poisoning Slides - John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy, Martin Abadi.pdf

4.8 MB

Detecting Malware Domains at the Upper DNS Hierarchy - Manos Antonakakis, Roberto Perdisci, Wenke Lee, Nikolaos Vasiloglou II, David Dagon.pdf

1.2 MB

Detecting Malware Domains at the Upper DNS Hierarchy Slides - Manos Antonakakis, Roberto Perdisci, Wenke Lee, Nikolaos Vasiloglou II, David Dagon.pdf

2.1 MB

Differential Privacy Under Fire - Andreas Haeberlen, Benjamin C. Pierce, Arjun Narayan.pdf

285.0 KB

Differential Privacy Under Fire Slides - Andreas Haeberlen, Benjamin C. Pierce, Arjun Narayan.pptx

322.9 KB

Dirty Jobs The Role of Freelance Labor in Web Service Abuse - Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker.pdf

358.0 KB

Dirty Jobs The Role of Freelance Labor in Web Service Abuse - Motoyama.pdf

358.0 KB

Dirty Jobs The Role of Freelance Labor in Web Service Abuse Slides - motoyama.pdf

2.4 MB

Fast and Precise Sanitizer Analysis with BEK - Pieter Hooimeijer, Benjamin Livshits, David Molnar, Prateek Saxena, Margus Veanes.pdf

470.7 KB

Faster Secure Two-Party Computation Using Garbled Circuits - Yan Huang, David Evans, Jonathan Katz.pdf

424.7 KB

Faster Secure Two-Party Computation Using Garbled Circuits Slides - Yan Huang, David Evans, Jonathan Katz.pdf

2.9 MB

Forensic Triage for Mobile Phones with DEC0DE - Robert J. Walls, Erik Learned-Miller, and Brian Neil Levine.pdf

1.0 MB

Forensic Triage for Mobile Phones with DEC0DE Slides - Robert J. Walls, Erik Learned-Miller, and Brian Neil Levine.pdf

9.8 MB

JACKSTRAWS Picking Command and Control Connections from Bot Traffic Slides - Gregoire Jacob, Ralf Hund, Christopher Kruegel.pdf

633.5 KB

MACE Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery - Chia Yuan Cho, Domagoj Babic, Pongsin Poosankam, Kevin Zhijie Chen, Ed.pdf

216.3 KB

MACE Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery Slides - Chia Yuan Cho, Domagoj Babic, Pongsin Poosankam, Kevin Zhijie C.pdf

645.1 KB

mCarve Carving Attributed Dump Sets - Ton van Deursen, Sjouke Mauw, and Sasa Radomirovic.pdf

264.1 KB

mCarve Carving Attributed Dump Sets Slides - Ton van Deursen, Sjouke Mauw, and Sasa Radomirovic.pdf

347.0 KB

Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade - Nektarios Leontiadis, Tyler Moore, Nicolas Christin.pdf

1.9 MB

Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade Slides - Nektarios Leontiadis, Tyler Moore, Nicolas Christin.pdf

5.1 MB

Measuring Pay-per-Install The Commoditization of Malware Distribution - Juan Caballero, Chris Grier, Christian Kreibich, Vern Paxson.pdf

1.4 MB

Measuring Pay-per-Install The Commoditization of Malware Distribution Slides - Juan Caballero, Chris Grier, Christian Kreibich, Vern Paxson.pdf

2.4 MB

Outsourcing the Decryption of ABE Ciphertexts - Matthew Green, Susan Hohenberger, Brent Waters.pdf

921.6 KB

Outsourcing the Decryption of ABE Ciphertexts Slides - Matthew Green, Susan Hohenberger, Brent Waters.pdf

4.3 MB

Permission Re-Delegation Attacks and Defenses - Adrienne Porter Felt, Helen J. Wang, Alexander Moshchuk, Steve Hanna, Erika Chin.pdf

1.0 MB

PIR-Tor Scalable Anonymous Communication Using Private Information Retrieval - Prateek Mittal, Femi Olumofin, Carmela Troncoso, Nikita Borisov, Ian Goldberg.pdf

529.6 KB

PIR-Tor Scalable Anonymous Communication Using Private Information Retrieval Slides - Prateek Mittal, Femi Olumofin, Carmela Troncoso, Nikita Borisov, Ian Goldberg.pptx

409.6 KB

Privacy in the Age of Augmented Reality - Alessandro Acquisti.pdf

2.1 MB

Q Exploit Hardening Made Easy - Edward J. Schwartz, Thanassis Avgerinos, David Brumley.pdf

700.9 KB

Q Exploit Hardening Made Easy Slides - Edward J. Schwartz, Thanassis Avgerinos, David Brumley.pdf

2.7 MB

QUIRE Lightweight Provenance for Smart Phone Operating Systems - Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anhei Shu, Dan S. Wallach.pdf

1.3 MB

Secure In-Band Wireless Pairing - Shyamnath Gollakota, Nabeel Ahmed, Nickolai Zeldovich, Dina Katabi.pdf

438.6 KB

Secure In-Band Wireless Pairing Slides - Shyamnath Gollakota, Nabeel Ahmed, Nickolai Zeldovich, Dina Katabi.pptx

653.0 KB

SHELLOS Enabling Fast Detection and Forensic Analysis of Code Injection Attacks - Kevin Z. Snow, Srinivas Krishnan, Fabian Monrose, Niels Provos.pdf

536.0 KB

Show Me the Money Characterizing Spam-advertised Revenue - Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorso, Christian Kreibich, Kirill Levchenko, Vern.pdf

1.9 MB

Show Me the Money Characterizing Spam-advertised Revenue Slides - Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorso, Christian Kreibich, Kirill Levchenko.pdf

4.0 MB

SMS of Death From Analyzing to Attacking Mobile Phones on a Large Scale - Collin Mulliner, Nico Golde, Jean-Pierre Seifert.pdf

376.8 KB

SMS of Death From Analyzing to Attacking Mobile Phones on a Large Scale Slides - Collin Mulliner, Nico Golde, Jean-Pierre Seifert.pdf

3.6 MB

Static Detection of Access Control Vulnerabilities in Web Applications - Fangqi Sun, Liang Xu, and Zhendong Su.pdf

666.3 KB

Static Detection of Access Control Vulnerabilities in Web Applications Slides - Fangqi Sun, Liang Xu, and Zhendong Su.pdf

963.8 KB

Telex Anticensorship in the Network Infrastructure - Eric Wustrow, Scott Wolchok, Ian Goldberg, J. Alex Halderman.pdf

2.5 MB

Telex Anticensorship in the Network Infrastructure Slides - Eric Wustrow, Scott Wolchok, Ian Goldberg, J. Alex Halderman.pdf

5.2 MB

The (Decentralized) SSL Observatory - Peter Eckersley, Jesse Burns.pdf

2.7 MB

The Cloud-y Future of Security Technologies - Adam O'Donnell.pdf

2.9 MB

The Phantom Tollbooth Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion - Sarah Meiklejohn, Keaton Mowery, Stephen Checkoway, Hovav.pdf

651.3 KB

The Phantom Tollbooth Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion Slides - Sarah Meiklejohn, Keaton Mowery, Stephen Checkoway.pdf

9.8 MB

Toward Secure Embedded Web Interfaces - Baptiste Gourdin, Chinmay Soman, Hristo Bojinov, Elie Bursztein.pdf

1.1 MB

Toward Secure Embedded Web Interfaces Slides - Baptiste Gourdin, Chinmay Soman, Hristo Bojinov, Elie Bursztein.pdf

15.6 MB

TRESOR Runs Encryption Securely Outside RAM - Tilo Müller, Felix C. Freiling, Andreas Dewald.pdf

274.0 KB

TRESOR Runs Encryption Securely Outside RAM Slides - Tilo Müller, Felix C. Freiling, Andreas Dewald.pdf

970.6 KB

Why (Special Agent) Johnny (Still) Can't Encrypt A Security Analysis of the APCO Project 25 Two-Way Radio System - Sandy Clark, Travis Goodspeed, Perry Metzger, Zac.pdf

9.6 MB

ZOZZLE Fast and Precise In-Browser JavaScript Malware Detection - Charlie Curtsinger, Benjamin Livshits, Benjamin Zorn, Christian Seifert.pdf

2.4 MB

/USENIX Security 2012/

AdSplit Separating Smartphone Advertising from Applications - Shashi Shekhar, Michael Dietz, Dan S. Wallach.mp4

13.4 MB

An Evaluation of the Google Chrome Extension Security Architecture - Nicholas Carlini, Adrienne Porter Felt, David Wagner.mp4

11.8 MB

Aurasium Practical Policy Enforcement for Android Applications - Rubin Xu, Hassen Saidi, Ross Anderson.mp4

12.7 MB

Babel Leveraging Email Delivery for Spam Mitigation - Gianluca Stringhini, Manuel Egele, Apostolis Zarras, Thorsten Holz, Christopher Kruegel, Giovanni Vigna.mp4

12.6 MB

Billion-Gate Secure Computation with Malicious Adversaries - Benjamin Kreuter, abhi shelat, and Chih-hao Shen.mp4

11.4 MB

Chimera A Declarative Language for Streaming Network Traffic Analysis - Kevin Borders, Jonathan Springer, Matthew Burnside.mp4

12.5 MB

Clickjacking Attacks and Defenses - Lin-Shung Huang, Alex Moshchuk, Helen J. Wang, Stuart Schechter, Collin Jackson.mp4

11.3 MB

Cyber Security Education in a Time of Change - Cynthia E. Irvine.mp4

37.3 MB

Data Node Encrypted File System Efficient Secure Deletion for Flash Memory - Joel Reardon, Srdjan Capkun, David Basin.mp4

15.8 MB

DroidScope Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis - Lok Kwong Yan, Heng Yin.mp4

13.5 MB

Efficient and Scalable Socware Detection in Online Social Networks - Md Sazzadur Rahman, Ting-Kai Huang, Harsha V. Madhyastha, Michalis Faloutsos.mp4

9.3 MB

Emerging Trends and Their Security Implications - Doug Burger.mp4

27.9 MB

Enemy of the State A State-Aware Black-Box Web Vulnerability Scanner - Adam Doupe, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna.mp4

10.8 MB

Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization - Cristiano Giuffrida, Anton Kuijsten, Andrew S. Tanenbaum.mp4

13.5 MB

Establishing Browser Security Guarantees through Formal Shim Verification - Dongseok Jang, Zachary Tatlock, Sorin Lerner.mp4

13.9 MB

Fuzzing with Code Fragments - Christian Holler, Kim Herzig, Andreas Zeller.mp4

10.0 MB

Gone in 360 Seconds Hijacking with Hitag2 - Roel Verdult, Flavio D. Garcia, Josep Balasch, KU Leuven.mp4

18.7 MB

How Does Your Password Measure Up - The Effect of Strength Meters on Password Creation - Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Mazu.mp4

14.1 MB

I Forgot Your Password Randomness Attacks Against PHP Applications - George Argyros, Aggelos Kiayias.mp4

14.3 MB

Impact of Spam Exposure on User Engagement - Anirban Dasgupta, - Kunal Punera, Justin M. Rao, Xuanhui Wang.mp4

15.2 MB

Keynote - The Evolution of Information Assurance - Dickie George.mp4

47.5 MB

kGuard Lightweight Kernel Protection against Return-to-User Attacks - Vasileios P. Kemerlis, Georgios Portokalidis, Angelos D. Keromytis.mp4

12.5 MB

Let Me Answer That for You Exploiting Broadcast Information in Cellular Networks - golde.mp4

10.7 MB

Life as a Target-Welcome to the Club - Dickie George.mp4

36.8 MB

Mining Your Ps and Qs Detection of Widespread Weak Keys in Network Devices - Nadia Heninger, Zakir Durumeric, Eric Wustrow, J. Alex Halderm.mp4

13.5 MB

Nature is a Language Can't You Read - Meredith L. Patterson.mp4

26.9 MB

Neuroscience Meets Cryptography Designing Crypto Primitives Secure Against Rubber Hose Attacks - Hristo Bojinov, Daniel Sanchez, Paul Reber, Northw.mp4

15.6 MB

New Attacks on Timing-based Network Flow Watermarks - Zi Lin, Nicholas Hopper.mp4

11.4 MB

On Breaking SAML Be Whoever You Want to Be - Juraj Somorovsky, Andreas Mayer, Jorg Schwenk, Marco Kampmann, Meiko Jensen.mp4

13.3 MB

On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces - Ivan Martinovic, Doug Davies, Mario Frank, Daniele Perito, Tomas Ros, Dawn Song.mp4

25.1 MB

Optimally Robust Private Information Retrieval - Casey Devet, Ian Goldberg, Nadia Heninger.mp4

11.4 MB

Origin-Bound Certificates A Fresh Approach to Strong Client Authentication for the Web - Michael Dietz, Alexei Czeskis, Dirk Balfanz, Dan S. Wallach.mp4

10.6 MB

PharmaLeaks Understanding the Business of Online Pharmaceutical Affiliate Programs - Damon McCoy, Andreas Pitsillidis, Grant Jordan, Nicholas Weaver, Christian Kreibich, Brian Kreb.mp4

14.7 MB

Policy-Sealed Data A New Abstraction for Building Trusted Cloud Services - Nuno Santos, Rodrigo Rodrigues, Krishna P. Gummadi.mp4

13.3 MB

Privacy-Preserving Social Plugins - Georgios Kontaxis, Michalis Polychronakis, Angelos D. Keromytis, Evangelos P. Markatos.mp4

11.7 MB

Privilege Separation in HTML5 Applications - Devdatta Akhawe, Prateek Saxena, Dawn Song.mp4

9.3 MB

Progressive Authentication Deciding When to Authenticate on Mobile Phones - Oriana Riva, Chuan Qin, Karin Strauss, Dimitrios Lymberopoulos.mp4

13.2 MB

PUBCRAWL Protecting Users and Businesses from CRAWLers - Gregoire Jacob, Engin Kirda, Christopher Kruegel, Giovanni Vigna.mp4

14.8 MB

Securing Early Software Development - Riley Eller.mp4

15.6 MB

Security and Usability Challenges of Moving-Object CAPTCHAs Decoding Codewords in Motion - Y. Xu, G. Reynaga, S. Chiasson, J.-M. Frahm, F. Monrose, P. van Oorschot.mp4

14.8 MB

Social Networking with Frientegrity Privacy and Integrity with an Untrusted Provider - Ariel J. Feldman, Aaron Blankstein, Michael J. Freedman, Edward W. Felten.mp4

13.3 MB

STEALTHMEM System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud - Taesoo Kim, Marcus Peinado, Gloria Mainar-Ruiz.mp4

12.6 MB

STING Finding Name Resolution Vulnerabilities in Programs - Hayawardh Vijayakumar, Joshua Schiffman, Trent Jaeger.mp4

13.3 MB

Tachyon Tandem Execution for Efficient Live Patch Testing - Matthew Maurer, David Brumley.mp4

11.6 MB

Taking Proof-Based Verified Computation a Few Steps Closer to Practicality - Srinath Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Andrew J. Blumberg, Michael Walfish.mp4

9.0 MB

TARDIS Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without Clocks - Amir Rahmati, Mastooreh Salajegheh, Dan Holcomb, Jacob Sorber, Wayne P. B.mp4

13.3 MB

Technical Sessions 2012 USENIX.htm

345.0 KB

Throttling Tor Bandwidth Parasites - Rob Jansen, Paul Syverson, Nicholas Hopper.mp4

9.2 MB

Tracking Rootkit Footprints with a Practical Memory Analysis System - Weidong Cui, Marcus Peinado, Zhilei Xu, Ellick Chan.mp4

9.6 MB

USENIX Security 2012 Proceedings.epub

32.3 MB

USENIX Security 2012 Proceedings.mobi

23.6 MB

USENIX Security 2012 Proceedings.pdf

19.8 MB

USENIX Security 2012 Reports.pdf

1.1 MB

USENIX Security 2012 USENIX.htm

82.1 KB

Welcome - Tadayoshi Kohno.mp4

3.8 MB

Whispers in the Hyper-space High-speed Covert Channel Attacks in the Cloud - Zhenyu Wu, Zhang Xu, Haining Wang.mp4

13.0 MB

/.../Technical Sessions 2012 USENIX_files/

acmqueue_150x48_0.png

3.1 KB

acmqueue_150x48_0_002.png

4.5 KB

admin_125x47_0.png

3.7 KB

admin_125x47_0_002.png

11.4 KB

all.js

3.2 KB

analytics.js

45.2 KB

application-octet-stream.png

0.2 KB

audio_16.png

0.5 KB

beyond_security.png

7.5 KB

beyond_security_002.png

14.1 KB

cbgapi.loaded_0

144.0 KB

cbgapi.loaded_1

97.1 KB

conference-schedule-pdf.png

0.3 KB

css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css

5.6 KB

css_ciODmkFfqCSx2xBu95VX29BZ0r4mdoEz3gy-MriTJBM.css

257.9 KB

css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css

1.5 KB

css_SKdvFJ9YoZ2Zlnl17QxUbae5QC-NQDrH8ynBbHJFAaM.css

9.2 KB

css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css

0.1 KB

dcj_150x27_0.png

3.2 KB

dcj_150x27_0_002.png

6.2 KB

dmtf_150x53_0.png

8.0 KB

dmtf_150x53_0_002.png

4.4 KB

fastbutton.htm

1.8 KB

fastbutton_002.htm

1.7 KB

fsm_150x44_0.png

4.1 KB

fsm_150x44_0_002.png

9.7 KB

google_8.png

7.8 KB

google_8_002.png

3.2 KB

hakin9_en150x40.png

3.5 KB

hakin9_en150x40_002.png

6.8 KB

ibm-research.png

3.5 KB

ibm-research_002.png

1.9 KB

ibm-research_gs.png

0.6 KB

ieee_sp_150x36_0.png

8.7 KB

ieee_sp_150x36_0_002.png

4.5 KB

infosecnews_150x120_0.png

5.2 KB

infosecnews_150x120_0_002.png

5.6 KB

js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js

20.5 KB

js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js

1.4 KB

js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js

120.3 KB

js_ILONILlX06kZtY3IVUMaeuMs_GJ1hSJY46daikoF9fA.js

99.4 KB

js_sWOO4PbSe161nCKWEJProMMhdbu_pfXMDzdRrMGBIE0.js

47.6 KB

js_yui9lDPs2dTDFfQPtmwCCL63T1k2MGsGrsTM-7Eo2Ts.js

32.8 KB

linux_journal_150x72_0.png

6.6 KB

linux_journal_150x72_0_002.png

10.3 KB

linux_pro_150x57_0.png

3.5 KB

linux_pro_150x57_0_002.png

5.3 KB

lxer_150x53_0.png

4.6 KB

lxer_150x53_0_002.png

8.2 KB

microsoft_research_0.png

4.9 KB

microsoft_research_0_002.png

2.4 KB

mozilla_firefox_logo.png

17.2 KB

mozilla_firefox_logo_002.png

19.4 KB

national_science_foundation.gif

4.2 KB

national_science_foundation_002.gif

7.3 KB

nsp_logo_black.png

4.7 KB

nsp_logo_black_002.png

4.7 KB

oreilly_150x28_0.png

2.4 KB

oreilly_150x28_0_002.png

3.8 KB

pdf_16.png

0.3 KB

plusone.js

49.0 KB

postmessageRelay.htm

0.7 KB

slides_16.png

1.3 KB

stack_exchange_150x37_0.png

6.0 KB

stack_exchange_150x37_0_002.png

3.3 KB

symantec_150x60.png

10.6 KB

symantec_150x60_002.png

5.4 KB

userfriendly_150x38_0.png

3.5 KB

userfriendly_150x38_0_002.png

6.7 KB

video_16.png

1.4 KB

widgets.js

98.5 KB

/.../Technical Sessions 2012 USENIX_files/postmessageRelay_data/

829555168-postmessagerelay.js

10.0 KB

cbgapi.loaded_0

54.9 KB

rpcshindig_random.js

13.0 KB

/.../USENIX Security 2012 captions/

AdSplit Separating Smartphone Advertising from Applications - Shashi Shekhar, Michael Dietz, Dan S. Wallach.eng.json

1.5 MB

AdSplit Separating Smartphone Advertising from Applications - Shashi Shekhar, Michael Dietz, Dan S. Wallach.eng.lrc

41.3 KB

AdSplit Separating Smartphone Advertising from Applications - Shashi Shekhar, Michael Dietz, Dan S. Wallach.eng.srt

39.8 KB

AdSplit Separating Smartphone Advertising from Applications - Shashi Shekhar, Michael Dietz, Dan S. Wallach.eng.text

27.6 KB

AdSplit Separating Smartphone Advertising from Applications - Shashi Shekhar, Michael Dietz, Dan S. Wallach.eng.tsv

35.4 KB

AdSplit Separating Smartphone Advertising from Applications - Shashi Shekhar, Michael Dietz, Dan S. Wallach.eng.txt

41.8 KB

AdSplit Separating Smartphone Advertising from Applications - Shashi Shekhar, Michael Dietz, Dan S. Wallach.eng.vtt

36.3 KB

An Evaluation of the Google Chrome Extension Security Architecture - Nicholas Carlini, Adrienne Porter Felt, David Wagner.eng.json

1.3 MB

An Evaluation of the Google Chrome Extension Security Architecture - Nicholas Carlini, Adrienne Porter Felt, David Wagner.eng.lrc

34.9 KB

An Evaluation of the Google Chrome Extension Security Architecture - Nicholas Carlini, Adrienne Porter Felt, David Wagner.eng.srt

37.0 KB

An Evaluation of the Google Chrome Extension Security Architecture - Nicholas Carlini, Adrienne Porter Felt, David Wagner.eng.text

26.9 KB

An Evaluation of the Google Chrome Extension Security Architecture - Nicholas Carlini, Adrienne Porter Felt, David Wagner.eng.tsv

31.5 KB

An Evaluation of the Google Chrome Extension Security Architecture - Nicholas Carlini, Adrienne Porter Felt, David Wagner.eng.txt

35.2 KB

An Evaluation of the Google Chrome Extension Security Architecture - Nicholas Carlini, Adrienne Porter Felt, David Wagner.eng.vtt

34.2 KB

Aurasium Practical Policy Enforcement for Android Applications - Rubin Xu, Hassen Saidi, Ross Anderson.eng.json

1.3 MB

Aurasium Practical Policy Enforcement for Android Applications - Rubin Xu, Hassen Saidi, Ross Anderson.eng.lrc

37.2 KB

Aurasium Practical Policy Enforcement for Android Applications - Rubin Xu, Hassen Saidi, Ross Anderson.eng.srt

30.4 KB

Aurasium Practical Policy Enforcement for Android Applications - Rubin Xu, Hassen Saidi, Ross Anderson.eng.text

23.2 KB

Aurasium Practical Policy Enforcement for Android Applications - Rubin Xu, Hassen Saidi, Ross Anderson.eng.tsv

31.2 KB

Aurasium Practical Policy Enforcement for Android Applications - Rubin Xu, Hassen Saidi, Ross Anderson.eng.txt

37.8 KB

Aurasium Practical Policy Enforcement for Android Applications - Rubin Xu, Hassen Saidi, Ross Anderson.eng.vtt

28.3 KB

Babel Leveraging Email Delivery for Spam Mitigation - Gianluca Stringhini, Manuel Egele, Apostolis Zarras, Thorsten Holz, Christopher Kruegel, Giovanni Vigna.eng.json

1.2 MB

Babel Leveraging Email Delivery for Spam Mitigation - Gianluca Stringhini, Manuel Egele, Apostolis Zarras, Thorsten Holz, Christopher Kruegel, Giovanni Vigna.eng.lrc

31.4 KB

Babel Leveraging Email Delivery for Spam Mitigation - Gianluca Stringhini, Manuel Egele, Apostolis Zarras, Thorsten Holz, Christopher Kruegel, Giovanni Vigna.eng.srt

32.9 KB

Babel Leveraging Email Delivery for Spam Mitigation - Gianluca Stringhini, Manuel Egele, Apostolis Zarras, Thorsten Holz, Christopher Kruegel, Giovanni Vigna.eng.text

24.4 KB

Babel Leveraging Email Delivery for Spam Mitigation - Gianluca Stringhini, Manuel Egele, Apostolis Zarras, Thorsten Holz, Christopher Kruegel, Giovanni Vigna.eng.tsv

28.3 KB

Babel Leveraging Email Delivery for Spam Mitigation - Gianluca Stringhini, Manuel Egele, Apostolis Zarras, Thorsten Holz, Christopher Kruegel, Giovanni Vigna.eng.txt

31.7 KB

Babel Leveraging Email Delivery for Spam Mitigation - Gianluca Stringhini, Manuel Egele, Apostolis Zarras, Thorsten Holz, Christopher Kruegel, Giovanni Vigna.eng.vtt

30.5 KB

Billion-Gate Secure Computation with Malicious Adversaries - Benjamin Kreuter, abhi shelat, and Chih-hao Shen.eng.json

818.0 KB

Billion-Gate Secure Computation with Malicious Adversaries - Benjamin Kreuter, abhi shelat, and Chih-hao Shen.eng.lrc

21.0 KB

Billion-Gate Secure Computation with Malicious Adversaries - Benjamin Kreuter, abhi shelat, and Chih-hao Shen.eng.srt

22.6 KB

Billion-Gate Secure Computation with Malicious Adversaries - Benjamin Kreuter, abhi shelat, and Chih-hao Shen.eng.text

16.2 KB

Billion-Gate Secure Computation with Malicious Adversaries - Benjamin Kreuter, abhi shelat, and Chih-hao Shen.eng.tsv

18.9 KB

Billion-Gate Secure Computation with Malicious Adversaries - Benjamin Kreuter, abhi shelat, and Chih-hao Shen.eng.txt

21.2 KB

Billion-Gate Secure Computation with Malicious Adversaries - Benjamin Kreuter, abhi shelat, and Chih-hao Shen.eng.vtt

20.8 KB

Chimera A Declarative Language for Streaming Network Traffic Analysis - Kevin Borders, Jonathan Springer, Matthew Burnside.eng.json

1.2 MB

Chimera A Declarative Language for Streaming Network Traffic Analysis - Kevin Borders, Jonathan Springer, Matthew Burnside.eng.lrc

31.0 KB

Chimera A Declarative Language for Streaming Network Traffic Analysis - Kevin Borders, Jonathan Springer, Matthew Burnside.eng.srt

32.9 KB

Chimera A Declarative Language for Streaming Network Traffic Analysis - Kevin Borders, Jonathan Springer, Matthew Burnside.eng.text

24.2 KB

Chimera A Declarative Language for Streaming Network Traffic Analysis - Kevin Borders, Jonathan Springer, Matthew Burnside.eng.tsv

28.1 KB

Chimera A Declarative Language for Streaming Network Traffic Analysis - Kevin Borders, Jonathan Springer, Matthew Burnside.eng.txt

31.3 KB

Chimera A Declarative Language for Streaming Network Traffic Analysis - Kevin Borders, Jonathan Springer, Matthew Burnside.eng.vtt

30.5 KB

Clickjacking Attacks and Defenses - Lin-Shung Huang, Alex Moshchuk, Helen J. Wang, Stuart Schechter, Collin Jackson.eng.json

1.1 MB

Clickjacking Attacks and Defenses - Lin-Shung Huang, Alex Moshchuk, Helen J. Wang, Stuart Schechter, Collin Jackson.eng.lrc

27.6 KB

Clickjacking Attacks and Defenses - Lin-Shung Huang, Alex Moshchuk, Helen J. Wang, Stuart Schechter, Collin Jackson.eng.srt

30.8 KB

Clickjacking Attacks and Defenses - Lin-Shung Huang, Alex Moshchuk, Helen J. Wang, Stuart Schechter, Collin Jackson.eng.text

21.5 KB

Clickjacking Attacks and Defenses - Lin-Shung Huang, Alex Moshchuk, Helen J. Wang, Stuart Schechter, Collin Jackson.eng.tsv

24.9 KB

Clickjacking Attacks and Defenses - Lin-Shung Huang, Alex Moshchuk, Helen J. Wang, Stuart Schechter, Collin Jackson.eng.txt

27.8 KB

Clickjacking Attacks and Defenses - Lin-Shung Huang, Alex Moshchuk, Helen J. Wang, Stuart Schechter, Collin Jackson.eng.vtt

28.2 KB

Cyber Security Education in a Time of Change - Cynthia E. Irvine.eng.json

3.3 MB

Cyber Security Education in a Time of Change - Cynthia E. Irvine.eng.lrc

89.6 KB

Cyber Security Education in a Time of Change - Cynthia E. Irvine.eng.srt

91.2 KB

Cyber Security Education in a Time of Change - Cynthia E. Irvine.eng.text

63.8 KB

Cyber Security Education in a Time of Change - Cynthia E. Irvine.eng.tsv

78.4 KB

Cyber Security Education in a Time of Change - Cynthia E. Irvine.eng.txt

90.5 KB

Cyber Security Education in a Time of Change - Cynthia E. Irvine.eng.vtt

84.4 KB

Data Node Encrypted File System Efficient Secure Deletion for Flash Memory - Joel Reardon, Srdjan Capkun, David Basin.eng.json

1.8 MB

Data Node Encrypted File System Efficient Secure Deletion for Flash Memory - Joel Reardon, Srdjan Capkun, David Basin.eng.lrc

44.0 KB

Data Node Encrypted File System Efficient Secure Deletion for Flash Memory - Joel Reardon, Srdjan Capkun, David Basin.eng.srt

44.6 KB

Data Node Encrypted File System Efficient Secure Deletion for Flash Memory - Joel Reardon, Srdjan Capkun, David Basin.eng.text

32.6 KB

Data Node Encrypted File System Efficient Secure Deletion for Flash Memory - Joel Reardon, Srdjan Capkun, David Basin.eng.tsv

39.1 KB

Data Node Encrypted File System Efficient Secure Deletion for Flash Memory - Joel Reardon, Srdjan Capkun, David Basin.eng.txt

44.4 KB

Data Node Encrypted File System Efficient Secure Deletion for Flash Memory - Joel Reardon, Srdjan Capkun, David Basin.eng.vtt

41.2 KB

DroidScope Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis - Lok Kwong Yan, Heng Yin.eng.json

1.8 MB

DroidScope Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis - Lok Kwong Yan, Heng Yin.eng.lrc

51.0 KB

DroidScope Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis - Lok Kwong Yan, Heng Yin.eng.srt

42.5 KB

DroidScope Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis - Lok Kwong Yan, Heng Yin.eng.text

31.1 KB

DroidScope Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis - Lok Kwong Yan, Heng Yin.eng.tsv

42.6 KB

DroidScope Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis - Lok Kwong Yan, Heng Yin.eng.txt

51.7 KB

DroidScope Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis - Lok Kwong Yan, Heng Yin.eng.vtt

39.1 KB

Efficient and Scalable Socware Detection in Online Social Networks - Md Sazzadur Rahman, Ting-Kai Huang, Harsha V. Madhyastha, Michalis Faloutsos.eng.json

799.0 KB

Efficient and Scalable Socware Detection in Online Social Networks - Md Sazzadur Rahman, Ting-Kai Huang, Harsha V. Madhyastha, Michalis Faloutsos.eng.lrc

20.1 KB

Efficient and Scalable Socware Detection in Online Social Networks - Md Sazzadur Rahman, Ting-Kai Huang, Harsha V. Madhyastha, Michalis Faloutsos.eng.srt

21.5 KB

Efficient and Scalable Socware Detection in Online Social Networks - Md Sazzadur Rahman, Ting-Kai Huang, Harsha V. Madhyastha, Michalis Faloutsos.eng.text

15.8 KB

Efficient and Scalable Socware Detection in Online Social Networks - Md Sazzadur Rahman, Ting-Kai Huang, Harsha V. Madhyastha, Michalis Faloutsos.eng.tsv

18.2 KB

Efficient and Scalable Socware Detection in Online Social Networks - Md Sazzadur Rahman, Ting-Kai Huang, Harsha V. Madhyastha, Michalis Faloutsos.eng.txt

20.3 KB

Efficient and Scalable Socware Detection in Online Social Networks - Md Sazzadur Rahman, Ting-Kai Huang, Harsha V. Madhyastha, Michalis Faloutsos.eng.vtt

19.9 KB

Emerging Trends and Their Security Implications - Doug Burger.eng.json

3.0 MB

Emerging Trends and Their Security Implications - Doug Burger.eng.lrc

80.5 KB

Emerging Trends and Their Security Implications - Doug Burger.eng.srt

75.9 KB

Emerging Trends and Their Security Implications - Doug Burger.eng.text

56.9 KB

Emerging Trends and Their Security Implications - Doug Burger.eng.tsv

70.7 KB

Emerging Trends and Their Security Implications - Doug Burger.eng.txt

81.4 KB

Emerging Trends and Their Security Implications - Doug Burger.eng.vtt

70.4 KB

Enemy of the State A State-Aware Black-Box Web Vulnerability Scanner - Adam Doupe, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna.eng.json

1.3 MB

Enemy of the State A State-Aware Black-Box Web Vulnerability Scanner - Adam Doupe, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna.eng.lrc

31.8 KB

Enemy of the State A State-Aware Black-Box Web Vulnerability Scanner - Adam Doupe, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna.eng.srt

35.6 KB

Enemy of the State A State-Aware Black-Box Web Vulnerability Scanner - Adam Doupe, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna.eng.text

23.7 KB

Enemy of the State A State-Aware Black-Box Web Vulnerability Scanner - Adam Doupe, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna.eng.tsv

28.2 KB

Enemy of the State A State-Aware Black-Box Web Vulnerability Scanner - Adam Doupe, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna.eng.txt

32.1 KB

Enemy of the State A State-Aware Black-Box Web Vulnerability Scanner - Adam Doupe, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna.eng.vtt

32.3 KB

Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization - Cristiano Giuffrida, Anton Kuijsten, Andrew S. Tanenbaum.eng.json

1.7 MB

Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization - Cristiano Giuffrida, Anton Kuijsten, Andrew S. Tanenbaum.eng.lrc

52.8 KB

Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization - Cristiano Giuffrida, Anton Kuijsten, Andrew S. Tanenbaum.eng.srt

39.0 KB

Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization - Cristiano Giuffrida, Anton Kuijsten, Andrew S. Tanenbaum.eng.text

30.4 KB

Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization - Cristiano Giuffrida, Anton Kuijsten, Andrew S. Tanenbaum.eng.tsv

43.6 KB

Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization - Cristiano Giuffrida, Anton Kuijsten, Andrew S. Tanenbaum.eng.txt

53.6 KB

Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization - Cristiano Giuffrida, Anton Kuijsten, Andrew S. Tanenbaum.eng.vtt

36.4 KB

Establishing Browser Security Guarantees through Formal Shim Verification - Dongseok Jang, Zachary Tatlock, Sorin Lerner.eng.json

1.6 MB

Establishing Browser Security Guarantees through Formal Shim Verification - Dongseok Jang, Zachary Tatlock, Sorin Lerner.eng.lrc

41.9 KB

Establishing Browser Security Guarantees through Formal Shim Verification - Dongseok Jang, Zachary Tatlock, Sorin Lerner.eng.srt

44.9 KB

Establishing Browser Security Guarantees through Formal Shim Verification - Dongseok Jang, Zachary Tatlock, Sorin Lerner.eng.text

30.9 KB

Establishing Browser Security Guarantees through Formal Shim Verification - Dongseok Jang, Zachary Tatlock, Sorin Lerner.eng.tsv

37.2 KB

Establishing Browser Security Guarantees through Formal Shim Verification - Dongseok Jang, Zachary Tatlock, Sorin Lerner.eng.txt

42.3 KB

Establishing Browser Security Guarantees through Formal Shim Verification - Dongseok Jang, Zachary Tatlock, Sorin Lerner.eng.vtt

40.9 KB

Fuzzing with Code Fragments - Christian Holler, Kim Herzig, Andreas Zeller.eng.json

1.3 MB

Fuzzing with Code Fragments - Christian Holler, Kim Herzig, Andreas Zeller.eng.lrc

36.2 KB

Fuzzing with Code Fragments - Christian Holler, Kim Herzig, Andreas Zeller.eng.srt

32.7 KB

Fuzzing with Code Fragments - Christian Holler, Kim Herzig, Andreas Zeller.eng.text

23.9 KB

Fuzzing with Code Fragments - Christian Holler, Kim Herzig, Andreas Zeller.eng.tsv

30.7 KB

Fuzzing with Code Fragments - Christian Holler, Kim Herzig, Andreas Zeller.eng.txt

36.7 KB

Fuzzing with Code Fragments - Christian Holler, Kim Herzig, Andreas Zeller.eng.vtt

30.1 KB

Gone in 360 Seconds Hijacking with Hitag2 - Roel Verdult, Flavio D. Garcia, Josep Balasch, KU Leuven.eng.json

1.4 MB

Gone in 360 Seconds Hijacking with Hitag2 - Roel Verdult, Flavio D. Garcia, Josep Balasch, KU Leuven.eng.lrc

37.4 KB

Gone in 360 Seconds Hijacking with Hitag2 - Roel Verdult, Flavio D. Garcia, Josep Balasch, KU Leuven.eng.srt

43.3 KB

Gone in 360 Seconds Hijacking with Hitag2 - Roel Verdult, Flavio D. Garcia, Josep Balasch, KU Leuven.eng.text

24.6 KB

Gone in 360 Seconds Hijacking with Hitag2 - Roel Verdult, Flavio D. Garcia, Josep Balasch, KU Leuven.eng.tsv

32.0 KB

Gone in 360 Seconds Hijacking with Hitag2 - Roel Verdult, Flavio D. Garcia, Josep Balasch, KU Leuven.eng.txt

37.9 KB

Gone in 360 Seconds Hijacking with Hitag2 - Roel Verdult, Flavio D. Garcia, Josep Balasch, KU Leuven.eng.vtt

38.0 KB

How Does Your Password Measure Up - The Effect of Strength Meters on Password Creation - Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Mazu.eng.json

1.7 MB

How Does Your Password Measure Up - The Effect of Strength Meters on Password Creation - Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Mazu.eng.lrc

47.3 KB

How Does Your Password Measure Up - The Effect of Strength Meters on Password Creation - Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Mazu.eng.srt

43.3 KB

How Does Your Password Measure Up - The Effect of Strength Meters on Password Creation - Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Mazu.eng.text

30.8 KB

How Does Your Password Measure Up - The Effect of Strength Meters on Password Creation - Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Mazu.eng.tsv

40.2 KB

How Does Your Password Measure Up - The Effect of Strength Meters on Password Creation - Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Mazu.eng.txt

47.9 KB

How Does Your Password Measure Up - The Effect of Strength Meters on Password Creation - Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Mazu.eng.vtt

39.7 KB

I Forgot Your Password Randomness Attacks Against PHP Applications - George Argyros, Aggelos Kiayias.eng.json

1.2 MB

I Forgot Your Password Randomness Attacks Against PHP Applications - George Argyros, Aggelos Kiayias.eng.lrc

31.7 KB

I Forgot Your Password Randomness Attacks Against PHP Applications - George Argyros, Aggelos Kiayias.eng.srt

33.7 KB

I Forgot Your Password Randomness Attacks Against PHP Applications - George Argyros, Aggelos Kiayias.eng.text

23.5 KB

I Forgot Your Password Randomness Attacks Against PHP Applications - George Argyros, Aggelos Kiayias.eng.tsv

28.2 KB

I Forgot Your Password Randomness Attacks Against PHP Applications - George Argyros, Aggelos Kiayias.eng.txt

32.0 KB

I Forgot Your Password Randomness Attacks Against PHP Applications - George Argyros, Aggelos Kiayias.eng.vtt

30.8 KB

Impact of Spam Exposure on User Engagement - Anirban Dasgupta, - Kunal Punera, Justin M. Rao, Xuanhui Wang.eng.json

1.9 MB

Impact of Spam Exposure on User Engagement - Anirban Dasgupta, - Kunal Punera, Justin M. Rao, Xuanhui Wang.eng.lrc

47.5 KB

Impact of Spam Exposure on User Engagement - Anirban Dasgupta, - Kunal Punera, Justin M. Rao, Xuanhui Wang.eng.srt

55.3 KB

Impact of Spam Exposure on User Engagement - Anirban Dasgupta, - Kunal Punera, Justin M. Rao, Xuanhui Wang.eng.text

37.2 KB

Impact of Spam Exposure on User Engagement - Anirban Dasgupta, - Kunal Punera, Justin M. Rao, Xuanhui Wang.eng.tsv

43.1 KB

Impact of Spam Exposure on User Engagement - Anirban Dasgupta, - Kunal Punera, Justin M. Rao, Xuanhui Wang.eng.txt

47.9 KB

Impact of Spam Exposure on User Engagement - Anirban Dasgupta, - Kunal Punera, Justin M. Rao, Xuanhui Wang.eng.vtt

50.2 KB

Keynote - The Evolution of Information Assurance - Dickie George.eng.json

4.7 MB

Keynote - The Evolution of Information Assurance - Dickie George.eng.lrc

131.5 KB

Keynote - The Evolution of Information Assurance - Dickie George.eng.srt

127.1 KB

Keynote - The Evolution of Information Assurance - Dickie George.eng.text

80.0 KB

Keynote - The Evolution of Information Assurance - Dickie George.eng.tsv

108.0 KB

Keynote - The Evolution of Information Assurance - Dickie George.eng.txt

133.3 KB

Keynote - The Evolution of Information Assurance - Dickie George.eng.vtt

115.5 KB

kGuard Lightweight Kernel Protection against Return-to-User Attacks - Vasileios P. Kemerlis, Georgios Portokalidis, Angelos D. Keromytis.eng.json

1.3 MB

kGuard Lightweight Kernel Protection against Return-to-User Attacks - Vasileios P. Kemerlis, Georgios Portokalidis, Angelos D. Keromytis.eng.lrc

38.6 KB

kGuard Lightweight Kernel Protection against Return-to-User Attacks - Vasileios P. Kemerlis, Georgios Portokalidis, Angelos D. Keromytis.eng.srt

27.6 KB

kGuard Lightweight Kernel Protection against Return-to-User Attacks - Vasileios P. Kemerlis, Georgios Portokalidis, Angelos D. Keromytis.eng.text

21.3 KB

kGuard Lightweight Kernel Protection against Return-to-User Attacks - Vasileios P. Kemerlis, Georgios Portokalidis, Angelos D. Keromytis.eng.tsv

30.9 KB

kGuard Lightweight Kernel Protection against Return-to-User Attacks - Vasileios P. Kemerlis, Georgios Portokalidis, Angelos D. Keromytis.eng.txt

39.3 KB

kGuard Lightweight Kernel Protection against Return-to-User Attacks - Vasileios P. Kemerlis, Georgios Portokalidis, Angelos D. Keromytis.eng.vtt

25.7 KB

Let Me Answer That for You Exploiting Broadcast Information in Cellular Networks - golde.eng.json

1.5 MB

Let Me Answer That for You Exploiting Broadcast Information in Cellular Networks - golde.eng.lrc

42.3 KB

Let Me Answer That for You Exploiting Broadcast Information in Cellular Networks - golde.eng.srt

38.3 KB

Let Me Answer That for You Exploiting Broadcast Information in Cellular Networks - golde.eng.text

26.3 KB

Let Me Answer That for You Exploiting Broadcast Information in Cellular Networks - golde.eng.tsv

35.5 KB

Let Me Answer That for You Exploiting Broadcast Information in Cellular Networks - golde.eng.txt

42.9 KB

Let Me Answer That for You Exploiting Broadcast Information in Cellular Networks - golde.eng.vtt

34.8 KB

Life as a Target-Welcome to the Club - Dickie George.eng.json

3.3 MB

Life as a Target-Welcome to the Club - Dickie George.eng.lrc

85.3 KB

Life as a Target-Welcome to the Club - Dickie George.eng.srt

93.8 KB

Life as a Target-Welcome to the Club - Dickie George.eng.text

57.0 KB

Life as a Target-Welcome to the Club - Dickie George.eng.tsv

73.4 KB

Life as a Target-Welcome to the Club - Dickie George.eng.txt

86.3 KB

Life as a Target-Welcome to the Club - Dickie George.eng.vtt

83.6 KB

Mining Your Ps and Qs Detection of Widespread Weak Keys in Network Devices - Nadia Heninger, Zakir Durumeric, Eric Wustrow, J. Alex Halderm.eng.json

1.5 MB

Mining Your Ps and Qs Detection of Widespread Weak Keys in Network Devices - Nadia Heninger, Zakir Durumeric, Eric Wustrow, J. Alex Halderm.eng.lrc

38.6 KB

Mining Your Ps and Qs Detection of Widespread Weak Keys in Network Devices - Nadia Heninger, Zakir Durumeric, Eric Wustrow, J. Alex Halderm.eng.srt

40.4 KB

Mining Your Ps and Qs Detection of Widespread Weak Keys in Network Devices - Nadia Heninger, Zakir Durumeric, Eric Wustrow, J. Alex Halderm.eng.text

28.2 KB

Mining Your Ps and Qs Detection of Widespread Weak Keys in Network Devices - Nadia Heninger, Zakir Durumeric, Eric Wustrow, J. Alex Halderm.eng.tsv

34.2 KB

Mining Your Ps and Qs Detection of Widespread Weak Keys in Network Devices - Nadia Heninger, Zakir Durumeric, Eric Wustrow, J. Alex Halderm.eng.txt

39.0 KB

Mining Your Ps and Qs Detection of Widespread Weak Keys in Network Devices - Nadia Heninger, Zakir Durumeric, Eric Wustrow, J. Alex Halderm.eng.vtt

36.9 KB

Nature is a Language Can't You Read - Meredith L. Patterson.eng.json

2.3 MB

Nature is a Language Can't You Read - Meredith L. Patterson.eng.lrc

62.0 KB

Nature is a Language Can't You Read - Meredith L. Patterson.eng.srt

61.8 KB

Nature is a Language Can't You Read - Meredith L. Patterson.eng.text

43.1 KB

Nature is a Language Can't You Read - Meredith L. Patterson.eng.tsv

54.2 KB

Nature is a Language Can't You Read - Meredith L. Patterson.eng.txt

62.7 KB

Nature is a Language Can't You Read - Meredith L. Patterson.eng.vtt

56.4 KB

Neuroscience Meets Cryptography Designing Crypto Primitives Secure Against Rubber Hose Attacks - Hristo Bojinov, Daniel Sanchez, Paul Reber, Northw.eng.json

1.4 MB

Neuroscience Meets Cryptography Designing Crypto Primitives Secure Against Rubber Hose Attacks - Hristo Bojinov, Daniel Sanchez, Paul Reber, Northw.eng.lrc

39.6 KB

Neuroscience Meets Cryptography Designing Crypto Primitives Secure Against Rubber Hose Attacks - Hristo Bojinov, Daniel Sanchez, Paul Reber, Northw.eng.srt

34.5 KB

Neuroscience Meets Cryptography Designing Crypto Primitives Secure Against Rubber Hose Attacks - Hristo Bojinov, Daniel Sanchez, Paul Reber, Northw.eng.text

24.5 KB

Neuroscience Meets Cryptography Designing Crypto Primitives Secure Against Rubber Hose Attacks - Hristo Bojinov, Daniel Sanchez, Paul Reber, Northw.eng.tsv

33.2 KB

Neuroscience Meets Cryptography Designing Crypto Primitives Secure Against Rubber Hose Attacks - Hristo Bojinov, Daniel Sanchez, Paul Reber, Northw.eng.txt

40.2 KB

Neuroscience Meets Cryptography Designing Crypto Primitives Secure Against Rubber Hose Attacks - Hristo Bojinov, Daniel Sanchez, Paul Reber, Northw.eng.vtt

31.6 KB

New Attacks on Timing-based Network Flow Watermarks - Zi Lin, Nicholas Hopper.eng.json

1.0 MB

New Attacks on Timing-based Network Flow Watermarks - Zi Lin, Nicholas Hopper.eng.lrc

25.4 KB

New Attacks on Timing-based Network Flow Watermarks - Zi Lin, Nicholas Hopper.eng.srt

25.6 KB

New Attacks on Timing-based Network Flow Watermarks - Zi Lin, Nicholas Hopper.eng.text

19.4 KB

New Attacks on Timing-based Network Flow Watermarks - Zi Lin, Nicholas Hopper.eng.tsv

22.8 KB

New Attacks on Timing-based Network Flow Watermarks - Zi Lin, Nicholas Hopper.eng.txt

25.6 KB

New Attacks on Timing-based Network Flow Watermarks - Zi Lin, Nicholas Hopper.eng.vtt

23.9 KB

On Breaking SAML Be Whoever You Want to Be - Juraj Somorovsky, Andreas Mayer, Jorg Schwenk, Marco Kampmann, Meiko Jensen.eng.json

1.1 MB

On Breaking SAML Be Whoever You Want to Be - Juraj Somorovsky, Andreas Mayer, Jorg Schwenk, Marco Kampmann, Meiko Jensen.eng.lrc

28.0 KB

On Breaking SAML Be Whoever You Want to Be - Juraj Somorovsky, Andreas Mayer, Jorg Schwenk, Marco Kampmann, Meiko Jensen.eng.srt

31.2 KB

On Breaking SAML Be Whoever You Want to Be - Juraj Somorovsky, Andreas Mayer, Jorg Schwenk, Marco Kampmann, Meiko Jensen.eng.text

21.8 KB

On Breaking SAML Be Whoever You Want to Be - Juraj Somorovsky, Andreas Mayer, Jorg Schwenk, Marco Kampmann, Meiko Jensen.eng.tsv

25.3 KB

On Breaking SAML Be Whoever You Want to Be - Juraj Somorovsky, Andreas Mayer, Jorg Schwenk, Marco Kampmann, Meiko Jensen.eng.txt

28.2 KB

On Breaking SAML Be Whoever You Want to Be - Juraj Somorovsky, Andreas Mayer, Jorg Schwenk, Marco Kampmann, Meiko Jensen.eng.vtt

28.6 KB

On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces - Ivan Martinovic, Doug Davies, Mario Frank, Daniele Perito, Tomas Ros, Dawn Song.eng.json

1.2 MB

On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces - Ivan Martinovic, Doug Davies, Mario Frank, Daniele Perito, Tomas Ros, Dawn Song.eng.lrc

30.6 KB

On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces - Ivan Martinovic, Doug Davies, Mario Frank, Daniele Perito, Tomas Ros, Dawn Song.eng.srt

32.2 KB

On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces - Ivan Martinovic, Doug Davies, Mario Frank, Daniele Perito, Tomas Ros, Dawn Song.eng.text

23.7 KB

On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces - Ivan Martinovic, Doug Davies, Mario Frank, Daniele Perito, Tomas Ros, Dawn Song.eng.tsv

27.6 KB

On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces - Ivan Martinovic, Doug Davies, Mario Frank, Daniele Perito, Tomas Ros, Dawn Song.eng.txt

30.8 KB

On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces - Ivan Martinovic, Doug Davies, Mario Frank, Daniele Perito, Tomas Ros, Dawn Song.eng.vtt

29.8 KB

Optimally Robust Private Information Retrieval - Casey Devet, Ian Goldberg, Nadia Heninger.eng.json

1.1 MB

Optimally Robust Private Information Retrieval - Casey Devet, Ian Goldberg, Nadia Heninger.eng.lrc

28.3 KB

Optimally Robust Private Information Retrieval - Casey Devet, Ian Goldberg, Nadia Heninger.eng.srt

30.9 KB

Optimally Robust Private Information Retrieval - Casey Devet, Ian Goldberg, Nadia Heninger.eng.text

21.9 KB

Optimally Robust Private Information Retrieval - Casey Devet, Ian Goldberg, Nadia Heninger.eng.tsv

25.5 KB

Optimally Robust Private Information Retrieval - Casey Devet, Ian Goldberg, Nadia Heninger.eng.txt

28.6 KB

Optimally Robust Private Information Retrieval - Casey Devet, Ian Goldberg, Nadia Heninger.eng.vtt

28.4 KB

Origin-Bound Certificates A Fresh Approach to Strong Client Authentication for the Web - Michael Dietz, Alexei Czeskis, Dirk Balfanz, Dan S. Wallach.eng.json

1.4 MB

Origin-Bound Certificates A Fresh Approach to Strong Client Authentication for the Web - Michael Dietz, Alexei Czeskis, Dirk Balfanz, Dan S. Wallach.eng.lrc

38.3 KB

Origin-Bound Certificates A Fresh Approach to Strong Client Authentication for the Web - Michael Dietz, Alexei Czeskis, Dirk Balfanz, Dan S. Wallach.eng.srt

37.0 KB

Origin-Bound Certificates A Fresh Approach to Strong Client Authentication for the Web - Michael Dietz, Alexei Czeskis, Dirk Balfanz, Dan S. Wallach.eng.text

27.4 KB

Origin-Bound Certificates A Fresh Approach to Strong Client Authentication for the Web - Michael Dietz, Alexei Czeskis, Dirk Balfanz, Dan S. Wallach.eng.tsv

33.5 KB

Origin-Bound Certificates A Fresh Approach to Strong Client Authentication for the Web - Michael Dietz, Alexei Czeskis, Dirk Balfanz, Dan S. Wallach.eng.txt

38.7 KB

Origin-Bound Certificates A Fresh Approach to Strong Client Authentication for the Web - Michael Dietz, Alexei Czeskis, Dirk Balfanz, Dan S. Wallach.eng.vtt

34.3 KB

PharmaLeaks Understanding the Business of Online Pharmaceutical Affiliate Programs - Damon McCoy, Andreas Pitsillidis, Grant Jordan, Nicholas Weaver, Christian Kreibich, Brian Kreb.eng.json

1.6 MB

PharmaLeaks Understanding the Business of Online Pharmaceutical Affiliate Programs - Damon McCoy, Andreas Pitsillidis, Grant Jordan, Nicholas Weaver, Christian Kreibich, Brian Kreb.eng.lrc

43.4 KB

PharmaLeaks Understanding the Business of Online Pharmaceutical Affiliate Programs - Damon McCoy, Andreas Pitsillidis, Grant Jordan, Nicholas Weaver, Christian Kreibich, Brian Kreb.eng.srt

43.0 KB

PharmaLeaks Understanding the Business of Online Pharmaceutical Affiliate Programs - Damon McCoy, Andreas Pitsillidis, Grant Jordan, Nicholas Weaver, Christian Kreibich, Brian Kreb.eng.text

31.0 KB

PharmaLeaks Understanding the Business of Online Pharmaceutical Affiliate Programs - Damon McCoy, Andreas Pitsillidis, Grant Jordan, Nicholas Weaver, Christian Kreibich, Brian Kreb.eng.tsv

38.0 KB

PharmaLeaks Understanding the Business of Online Pharmaceutical Affiliate Programs - Damon McCoy, Andreas Pitsillidis, Grant Jordan, Nicholas Weaver, Christian Kreibich, Brian Kreb.eng.txt

43.8 KB

PharmaLeaks Understanding the Business of Online Pharmaceutical Affiliate Programs - Damon McCoy, Andreas Pitsillidis, Grant Jordan, Nicholas Weaver, Christian Kreibich, Brian Kreb.eng.vtt

39.6 KB

Policy-Sealed Data A New Abstraction for Building Trusted Cloud Services - Nuno Santos, Rodrigo Rodrigues, Krishna P. Gummadi.eng.json

1.1 MB

Policy-Sealed Data A New Abstraction for Building Trusted Cloud Services - Nuno Santos, Rodrigo Rodrigues, Krishna P. Gummadi.eng.lrc

31.2 KB

Policy-Sealed Data A New Abstraction for Building Trusted Cloud Services - Nuno Santos, Rodrigo Rodrigues, Krishna P. Gummadi.eng.srt

28.7 KB

Policy-Sealed Data A New Abstraction for Building Trusted Cloud Services - Nuno Santos, Rodrigo Rodrigues, Krishna P. Gummadi.eng.text

22.1 KB

Policy-Sealed Data A New Abstraction for Building Trusted Cloud Services - Nuno Santos, Rodrigo Rodrigues, Krishna P. Gummadi.eng.tsv

27.3 KB

Policy-Sealed Data A New Abstraction for Building Trusted Cloud Services - Nuno Santos, Rodrigo Rodrigues, Krishna P. Gummadi.eng.txt

31.6 KB

Policy-Sealed Data A New Abstraction for Building Trusted Cloud Services - Nuno Santos, Rodrigo Rodrigues, Krishna P. Gummadi.eng.vtt

26.8 KB

Privacy-Preserving Social Plugins - Georgios Kontaxis, Michalis Polychronakis, Angelos D. Keromytis, Evangelos P. Markatos.eng.json

1.3 MB

Privacy-Preserving Social Plugins - Georgios Kontaxis, Michalis Polychronakis, Angelos D. Keromytis, Evangelos P. Markatos.eng.lrc

37.1 KB

Privacy-Preserving Social Plugins - Georgios Kontaxis, Michalis Polychronakis, Angelos D. Keromytis, Evangelos P. Markatos.eng.srt

30.7 KB

Privacy-Preserving Social Plugins - Georgios Kontaxis, Michalis Polychronakis, Angelos D. Keromytis, Evangelos P. Markatos.eng.text

23.6 KB

Privacy-Preserving Social Plugins - Georgios Kontaxis, Michalis Polychronakis, Angelos D. Keromytis, Evangelos P. Markatos.eng.tsv

31.3 KB

Privacy-Preserving Social Plugins - Georgios Kontaxis, Michalis Polychronakis, Angelos D. Keromytis, Evangelos P. Markatos.eng.txt

37.6 KB

Privacy-Preserving Social Plugins - Georgios Kontaxis, Michalis Polychronakis, Angelos D. Keromytis, Evangelos P. Markatos.eng.vtt

28.7 KB

Privilege Separation in HTML5 Applications - Devdatta Akhawe, Prateek Saxena, Dawn Song.eng.json

1.1 MB

Privilege Separation in HTML5 Applications - Devdatta Akhawe, Prateek Saxena, Dawn Song.eng.lrc

28.6 KB

Privilege Separation in HTML5 Applications - Devdatta Akhawe, Prateek Saxena, Dawn Song.eng.srt

32.1 KB

Privilege Separation in HTML5 Applications - Devdatta Akhawe, Prateek Saxena, Dawn Song.eng.text

21.3 KB

Privilege Separation in HTML5 Applications - Devdatta Akhawe, Prateek Saxena, Dawn Song.eng.tsv

25.3 KB

Privilege Separation in HTML5 Applications - Devdatta Akhawe, Prateek Saxena, Dawn Song.eng.txt

28.9 KB

Privilege Separation in HTML5 Applications - Devdatta Akhawe, Prateek Saxena, Dawn Song.eng.vtt

29.1 KB

Progressive Authentication Deciding When to Authenticate on Mobile Phones - Oriana Riva, Chuan Qin, Karin Strauss, Dimitrios Lymberopoulos.eng.json

1.2 MB

Progressive Authentication Deciding When to Authenticate on Mobile Phones - Oriana Riva, Chuan Qin, Karin Strauss, Dimitrios Lymberopoulos.eng.lrc

32.0 KB

Progressive Authentication Deciding When to Authenticate on Mobile Phones - Oriana Riva, Chuan Qin, Karin Strauss, Dimitrios Lymberopoulos.eng.srt

33.1 KB

Progressive Authentication Deciding When to Authenticate on Mobile Phones - Oriana Riva, Chuan Qin, Karin Strauss, Dimitrios Lymberopoulos.eng.text

24.7 KB

Progressive Authentication Deciding When to Authenticate on Mobile Phones - Oriana Riva, Chuan Qin, Karin Strauss, Dimitrios Lymberopoulos.eng.tsv

28.8 KB

Progressive Authentication Deciding When to Authenticate on Mobile Phones - Oriana Riva, Chuan Qin, Karin Strauss, Dimitrios Lymberopoulos.eng.txt

32.2 KB

Progressive Authentication Deciding When to Authenticate on Mobile Phones - Oriana Riva, Chuan Qin, Karin Strauss, Dimitrios Lymberopoulos.eng.vtt

30.7 KB

PUBCRAWL Protecting Users and Businesses from CRAWLers - Gregoire Jacob, Engin Kirda, Christopher Kruegel, Giovanni Vigna.eng.json

1.3 MB

PUBCRAWL Protecting Users and Businesses from CRAWLers - Gregoire Jacob, Engin Kirda, Christopher Kruegel, Giovanni Vigna.eng.lrc

34.2 KB

PUBCRAWL Protecting Users and Businesses from CRAWLers - Gregoire Jacob, Engin Kirda, Christopher Kruegel, Giovanni Vigna.eng.srt

36.2 KB

PUBCRAWL Protecting Users and Businesses from CRAWLers - Gregoire Jacob, Engin Kirda, Christopher Kruegel, Giovanni Vigna.eng.text

26.5 KB

PUBCRAWL Protecting Users and Businesses from CRAWLers - Gregoire Jacob, Engin Kirda, Christopher Kruegel, Giovanni Vigna.eng.tsv

30.9 KB

PUBCRAWL Protecting Users and Businesses from CRAWLers - Gregoire Jacob, Engin Kirda, Christopher Kruegel, Giovanni Vigna.eng.txt

34.5 KB

PUBCRAWL Protecting Users and Businesses from CRAWLers - Gregoire Jacob, Engin Kirda, Christopher Kruegel, Giovanni Vigna.eng.vtt

33.4 KB

Securing Early Software Development - Riley Eller.eng.json

1.9 MB

Securing Early Software Development - Riley Eller.eng.lrc

57.3 KB

Securing Early Software Development - Riley Eller.eng.srt

44.4 KB

Securing Early Software Development - Riley Eller.eng.text

32.4 KB

Securing Early Software Development - Riley Eller.eng.tsv

46.8 KB

Securing Early Software Development - Riley Eller.eng.txt

58.2 KB

Securing Early Software Development - Riley Eller.eng.vtt

40.8 KB

Security and Usability Challenges of Moving-Object CAPTCHAs Decoding Codewords in Motion - Y. Xu, G. Reynaga, S. Chiasson, J.-M. Frahm, F. Monrose, P. van Oorschot.eng.json

1.2 MB

Security and Usability Challenges of Moving-Object CAPTCHAs Decoding Codewords in Motion - Y. Xu, G. Reynaga, S. Chiasson, J.-M. Frahm, F. Monrose, P. van Oorschot.eng.lrc

30.3 KB

Security and Usability Challenges of Moving-Object CAPTCHAs Decoding Codewords in Motion - Y. Xu, G. Reynaga, S. Chiasson, J.-M. Frahm, F. Monrose, P. van Oorschot.eng.srt

32.5 KB

Security and Usability Challenges of Moving-Object CAPTCHAs Decoding Codewords in Motion - Y. Xu, G. Reynaga, S. Chiasson, J.-M. Frahm, F. Monrose, P. van Oorschot.eng.text

23.4 KB

Security and Usability Challenges of Moving-Object CAPTCHAs Decoding Codewords in Motion - Y. Xu, G. Reynaga, S. Chiasson, J.-M. Frahm, F. Monrose, P. van Oorschot.eng.tsv

27.3 KB

Security and Usability Challenges of Moving-Object CAPTCHAs Decoding Codewords in Motion - Y. Xu, G. Reynaga, S. Chiasson, J.-M. Frahm, F. Monrose, P. van Oorschot.eng.txt

30.6 KB

Security and Usability Challenges of Moving-Object CAPTCHAs Decoding Codewords in Motion - Y. Xu, G. Reynaga, S. Chiasson, J.-M. Frahm, F. Monrose, P. van Oorschot.eng.vtt

30.0 KB

Social Networking with Frientegrity Privacy and Integrity with an Untrusted Provider - Ariel J. Feldman, Aaron Blankstein, Michael J. Freedman, Edward W. Felten.eng.json

1.3 MB

Social Networking with Frientegrity Privacy and Integrity with an Untrusted Provider - Ariel J. Feldman, Aaron Blankstein, Michael J. Freedman, Edward W. Felten.eng.lrc

33.1 KB

Social Networking with Frientegrity Privacy and Integrity with an Untrusted Provider - Ariel J. Feldman, Aaron Blankstein, Michael J. Freedman, Edward W. Felten.eng.srt

34.8 KB

Social Networking with Frientegrity Privacy and Integrity with an Untrusted Provider - Ariel J. Feldman, Aaron Blankstein, Michael J. Freedman, Edward W. Felten.eng.text

25.6 KB

Social Networking with Frientegrity Privacy and Integrity with an Untrusted Provider - Ariel J. Feldman, Aaron Blankstein, Michael J. Freedman, Edward W. Felten.eng.tsv

30.0 KB

Social Networking with Frientegrity Privacy and Integrity with an Untrusted Provider - Ariel J. Feldman, Aaron Blankstein, Michael J. Freedman, Edward W. Felten.eng.txt

33.4 KB

Social Networking with Frientegrity Privacy and Integrity with an Untrusted Provider - Ariel J. Feldman, Aaron Blankstein, Michael J. Freedman, Edward W. Felten.eng.vtt

32.2 KB

STEALTHMEM System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud - Taesoo Kim, Marcus Peinado, Gloria Mainar-Ruiz.eng.json

1.1 MB

STEALTHMEM System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud - Taesoo Kim, Marcus Peinado, Gloria Mainar-Ruiz.eng.lrc

27.6 KB

STEALTHMEM System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud - Taesoo Kim, Marcus Peinado, Gloria Mainar-Ruiz.eng.srt

30.5 KB

STEALTHMEM System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud - Taesoo Kim, Marcus Peinado, Gloria Mainar-Ruiz.eng.text

21.6 KB

STEALTHMEM System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud - Taesoo Kim, Marcus Peinado, Gloria Mainar-Ruiz.eng.tsv

25.0 KB

STEALTHMEM System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud - Taesoo Kim, Marcus Peinado, Gloria Mainar-Ruiz.eng.txt

27.9 KB

STEALTHMEM System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud - Taesoo Kim, Marcus Peinado, Gloria Mainar-Ruiz.eng.vtt

28.0 KB

STING Finding Name Resolution Vulnerabilities in Programs - Hayawardh Vijayakumar, Joshua Schiffman, Trent Jaeger.eng.json

1.2 MB

STING Finding Name Resolution Vulnerabilities in Programs - Hayawardh Vijayakumar, Joshua Schiffman, Trent Jaeger.eng.lrc

30.2 KB

STING Finding Name Resolution Vulnerabilities in Programs - Hayawardh Vijayakumar, Joshua Schiffman, Trent Jaeger.eng.srt

32.4 KB

STING Finding Name Resolution Vulnerabilities in Programs - Hayawardh Vijayakumar, Joshua Schiffman, Trent Jaeger.eng.text

23.0 KB

STING Finding Name Resolution Vulnerabilities in Programs - Hayawardh Vijayakumar, Joshua Schiffman, Trent Jaeger.eng.tsv

27.1 KB

STING Finding Name Resolution Vulnerabilities in Programs - Hayawardh Vijayakumar, Joshua Schiffman, Trent Jaeger.eng.txt

30.5 KB

STING Finding Name Resolution Vulnerabilities in Programs - Hayawardh Vijayakumar, Joshua Schiffman, Trent Jaeger.eng.vtt

29.8 KB

Tachyon Tandem Execution for Efficient Live Patch Testing - Matthew Maurer, David Brumley.eng.json

1.4 MB

Tachyon Tandem Execution for Efficient Live Patch Testing - Matthew Maurer, David Brumley.eng.lrc

37.8 KB

Tachyon Tandem Execution for Efficient Live Patch Testing - Matthew Maurer, David Brumley.eng.srt

36.3 KB

Tachyon Tandem Execution for Efficient Live Patch Testing - Matthew Maurer, David Brumley.eng.text

27.4 KB

Tachyon Tandem Execution for Efficient Live Patch Testing - Matthew Maurer, David Brumley.eng.tsv

33.2 KB

Tachyon Tandem Execution for Efficient Live Patch Testing - Matthew Maurer, David Brumley.eng.txt

38.2 KB

Tachyon Tandem Execution for Efficient Live Patch Testing - Matthew Maurer, David Brumley.eng.vtt

33.7 KB

Taking Proof-Based Verified Computation a Few Steps Closer to Practicality - Srinath Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Andrew J. Blumberg, Michael Walfish.eng.json

871.0 KB

Taking Proof-Based Verified Computation a Few Steps Closer to Practicality - Srinath Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Andrew J. Blumberg, Michael Walfish.eng.lrc

23.8 KB

Taking Proof-Based Verified Computation a Few Steps Closer to Practicality - Srinath Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Andrew J. Blumberg, Michael Walfish.eng.srt

25.1 KB

Taking Proof-Based Verified Computation a Few Steps Closer to Practicality - Srinath Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Andrew J. Blumberg, Michael Walfish.eng.text

18.5 KB

Taking Proof-Based Verified Computation a Few Steps Closer to Practicality - Srinath Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Andrew J. Blumberg, Michael Walfish.eng.tsv

21.4 KB

Taking Proof-Based Verified Computation a Few Steps Closer to Practicality - Srinath Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Andrew J. Blumberg, Michael Walfish.eng.txt

24.0 KB

Taking Proof-Based Verified Computation a Few Steps Closer to Practicality - Srinath Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Andrew J. Blumberg, Michael Walfish.eng.vtt

23.3 KB

TARDIS Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without Clocks - Amir Rahmati, Mastooreh Salajegheh, Dan Holcomb, Jacob Sorber, Wayne P. B.eng.json

1.1 MB

TARDIS Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without Clocks - Amir Rahmati, Mastooreh Salajegheh, Dan Holcomb, Jacob Sorber, Wayne P. B.eng.lrc

27.6 KB

TARDIS Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without Clocks - Amir Rahmati, Mastooreh Salajegheh, Dan Holcomb, Jacob Sorber, Wayne P. B.eng.srt

28.9 KB

TARDIS Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without Clocks - Amir Rahmati, Mastooreh Salajegheh, Dan Holcomb, Jacob Sorber, Wayne P. B.eng.text

21.5 KB

TARDIS Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without Clocks - Amir Rahmati, Mastooreh Salajegheh, Dan Holcomb, Jacob Sorber, Wayne P. B.eng.tsv

25.0 KB

TARDIS Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without Clocks - Amir Rahmati, Mastooreh Salajegheh, Dan Holcomb, Jacob Sorber, Wayne P. B.eng.txt

27.9 KB

TARDIS Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without Clocks - Amir Rahmati, Mastooreh Salajegheh, Dan Holcomb, Jacob Sorber, Wayne P. B.eng.vtt

26.8 KB

Throttling Tor Bandwidth Parasites - Rob Jansen, Paul Syverson, Nicholas Hopper.eng.json

955.9 KB

Throttling Tor Bandwidth Parasites - Rob Jansen, Paul Syverson, Nicholas Hopper.eng.lrc

25.7 KB

Throttling Tor Bandwidth Parasites - Rob Jansen, Paul Syverson, Nicholas Hopper.eng.srt

26.0 KB

Throttling Tor Bandwidth Parasites - Rob Jansen, Paul Syverson, Nicholas Hopper.eng.text

18.5 KB

Throttling Tor Bandwidth Parasites - Rob Jansen, Paul Syverson, Nicholas Hopper.eng.tsv

22.5 KB

Throttling Tor Bandwidth Parasites - Rob Jansen, Paul Syverson, Nicholas Hopper.eng.txt

26.0 KB

Throttling Tor Bandwidth Parasites - Rob Jansen, Paul Syverson, Nicholas Hopper.eng.vtt

23.9 KB

Tracking Rootkit Footprints with a Practical Memory Analysis System - Weidong Cui, Marcus Peinado, Zhilei Xu, Ellick Chan.eng.json

828.1 KB

Tracking Rootkit Footprints with a Practical Memory Analysis System - Weidong Cui, Marcus Peinado, Zhilei Xu, Ellick Chan.eng.lrc

21.0 KB

Tracking Rootkit Footprints with a Practical Memory Analysis System - Weidong Cui, Marcus Peinado, Zhilei Xu, Ellick Chan.eng.srt

24.2 KB

Tracking Rootkit Footprints with a Practical Memory Analysis System - Weidong Cui, Marcus Peinado, Zhilei Xu, Ellick Chan.eng.text

16.3 KB

Tracking Rootkit Footprints with a Practical Memory Analysis System - Weidong Cui, Marcus Peinado, Zhilei Xu, Ellick Chan.eng.tsv

18.9 KB

Tracking Rootkit Footprints with a Practical Memory Analysis System - Weidong Cui, Marcus Peinado, Zhilei Xu, Ellick Chan.eng.txt

21.2 KB

Tracking Rootkit Footprints with a Practical Memory Analysis System - Weidong Cui, Marcus Peinado, Zhilei Xu, Ellick Chan.eng.vtt

22.0 KB

Welcome - Tadayoshi Kohno.eng.json

383.9 KB

Welcome - Tadayoshi Kohno.eng.lrc

10.2 KB

Welcome - Tadayoshi Kohno.eng.srt

11.0 KB

Welcome - Tadayoshi Kohno.eng.text

7.4 KB

Welcome - Tadayoshi Kohno.eng.tsv

8.9 KB

Welcome - Tadayoshi Kohno.eng.txt

10.3 KB

Welcome - Tadayoshi Kohno.eng.vtt

10.0 KB

Whispers in the Hyper-space High-speed Covert Channel Attacks in the Cloud - Zhenyu Wu, Zhang Xu, Haining Wang.eng.json

1.3 MB

Whispers in the Hyper-space High-speed Covert Channel Attacks in the Cloud - Zhenyu Wu, Zhang Xu, Haining Wang.eng.lrc

37.7 KB

Whispers in the Hyper-space High-speed Covert Channel Attacks in the Cloud - Zhenyu Wu, Zhang Xu, Haining Wang.eng.srt

34.1 KB

Whispers in the Hyper-space High-speed Covert Channel Attacks in the Cloud - Zhenyu Wu, Zhang Xu, Haining Wang.eng.text

24.6 KB

Whispers in the Hyper-space High-speed Covert Channel Attacks in the Cloud - Zhenyu Wu, Zhang Xu, Haining Wang.eng.tsv

32.1 KB

Whispers in the Hyper-space High-speed Covert Channel Attacks in the Cloud - Zhenyu Wu, Zhang Xu, Haining Wang.eng.txt

38.2 KB

Whispers in the Hyper-space High-speed Covert Channel Attacks in the Cloud - Zhenyu Wu, Zhang Xu, Haining Wang.eng.vtt

31.3 KB

/.../USENIX Security 2012 Presentations/

AdSplit Separating Smartphone Advertising from Applications - Shashi Shekhar, Michael Dietz, Dan S. Wallach.pdf

499.0 KB

An Evaluation of the Google Chrome Extension Security Architecture - Nicholas Carlini, Adrienne Porter Felt, David Wagner.pdf

191.4 KB

An Evaluation of the Google Chrome Extension Security Architecture Slides -Slides - Nicholas Carlini, Adrienne Porter Felt, David Wagner.pdf

1.3 MB

Aurasium Practical Policy Enforcement for Android Applications - Rubin Xu, Hassen Saidi, Ross Anderson.pdf

407.5 KB

Aurasium Practical Policy Enforcement for Android Applications Slides - Rubin Xu, Hassen Saidi, Ross Anderson.pdf

6.0 MB

Babel Leveraging Email Delivery for Spam Mitigation - Gianluca Stringhini, Manuel Egele, Apostolis Zarras, Thorsten Holz, Christopher Kruegel, Giovanni Vigna.pdf

958.1 KB

Babel Leveraging Email Delivery for Spam Mitigation Slides - Gianluca Stringhini, Manuel Egele, Apostolis Zarras, Thorsten Holz, Christopher Kruegel, Giovanni Vigna.pdf

10.3 MB

Billion-Gate Secure Computation with Malicious Adversaries - Benjamin Kreuter, abhi shelat, Chih-hao Shen.pdf

272.4 KB

Billion-Gate Secure Computation with Malicious Adversaries Slides Slides - Benjamin Kreuter, abhi shelat, and Chih-hao Shen.pdf

1.1 MB

Chimera A Declarative Language for Streaming Network Traffic Analysis - Kevin Borders, Jonathan Springer, Matthew Burnside.pdf

302.3 KB

Chimera A Declarative Language for Streaming Network Traffic Analysis Slides - Kevin Borders, Jonathan Springer, Matthew Burnside.pdf

706.3 KB

Clickjacking Attacks and Defenses - Lin-Shung Huang, Alex Moshchuk, Helen J. Wang, Stuart Schechter, Collin Jackson.pdf

1.1 MB

Clickjacking Attacks and Defenses Slides Slides - Lin-Shung Huang, Alex Moshchuk, Helen J. Wang, Stuart Schechter, Collin Jackson.pdf

3.7 MB

Data Node Encrypted File System Efficient Secure Deletion for Flash Memory - Joel Reardon, Srdjan Capkun, David Basin.pdf

413.4 KB

Data Node Encrypted File System Efficient Secure Deletion for Flash Memory Slides - Joel Reardon, Srdjan Capkun, David Basin.pdf

7.8 MB

DroidScope Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis - Lok Kwong Yan, Heng Yin.pdf

608.3 KB

DroidScope Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis Slides - Lok Kwong Yan, Heng Yin.pdf

535.3 KB

Efficient and Scalable Socware Detection in Online Social Networks - Md Sazzadur Rahman, Ting-Kai Huang, Harsha V. Madhyastha, Michalis Faloutsos.pdf

683.3 KB

Efficient and Scalable Socware Detection in Online Social Networks Slides - Md Sazzadur Rahman, Ting-Kai Huang, Harsha V. Madhyastha, Michalis Faloutsos.pdf

2.9 MB

Enemy of the State A State-Aware Black-Box Web Vulnerability Scanner - Adam Doupe, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna.pdf

236.4 KB

Enemy of the State A State-Aware Black-Box Web Vulnerability Scanner Slides - Adam Doupe, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna.pdf

2.8 MB

Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization - Cristiano Giuffrida, Anton Kuijsten, Andrew S. Tanenbaum.pdf

477.3 KB

Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization Slides - Cristiano Giuffrida, Anton Kuijsten, Andrew S. Tanenbaum.pdf

2.4 MB

Establishing Browser Security Guarantees through Formal Shim Verification - Dongseok Jang, Zachary Tatlock, Sorin Lerner.pdf

769.1 KB

Establishing Browser Security Guarantees through Formal Shim Verification Slides - Dongseok Jang, Zachary Tatlock, Sorin Lerner.pdf

1.1 MB

From Throw-Away Traffic to Bots Detecting the Rise of DGA-Based Malware - Manos Antonakakis, Roberto Perdisci, Yacin Nadji, Nikolaos Vasiloglou, Saeed Abu-Nimeh, Wenke Lee, David.pdf

713.4 KB

From Throw-Away Traffic to Bots Detecting the Rise of DGA-Based Malware Slides - Manos Antonakakis, Roberto Perdisci, Yacin Nadji, Nikolaos Vasiloglou, Saeed Abu-Nimeh, Wenke Lee.pdf

764.5 KB

Fuzzing with Code Fragments - Christian Holler, Kim Herzig, Andreas Zeller.pdf

570.3 KB

Fuzzing with Code Fragments Slides - Christian Holler, Kim Herzig, Andreas Zeller.pdf

14.0 MB

Gone in 360 Seconds Hijacking with Hitag2 - Roel Verdult, Flavio D. Garcia, Josep Balasch, KU Leuven.pdf

665.3 KB

Gone in 360 Seconds Hijacking with Hitag2 Slides - Roel Verdult, Flavio D. Garcia, Josep Balasch, KU Leuven.pdf

12.3 MB

How Does Your Password Measure Up - The Effect of Strength Meters on Password Creation - Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Ma.pdf

1.3 MB

How Does Your Password Measure Up - The Effect of Strength Meters on Password Creation Slides - Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michell.pdf

2.7 MB

I Forgot Your Password Randomness Attacks Against PHP Applications - George Argyros, Aggelos Kiayias.pdf

470.3 KB

Impact of Spam Exposure on User Engagement - Anirban Dasgupta, Kunal Punera, Justin M. Rao, Xuanhui Wang.pdf

194.9 KB

kGuard Lightweight Kernel Protection against Return-to-User Attacks - Vasileios P. Kemerlis, Georgios Portokalidis, and Angelos D. Keromytis.pdf

311.2 KB

kGuard Lightweight Kernel Protection against Return-to-User Attacks Slides - Vasileios P. Kemerlis, Georgios Portokalidis, and Angelos D. Keromytis.pdf

2.3 MB

Mining Your Ps and Qs Detection of Widespread Weak Keys in Network Devices - Nadia Heninger, Zakir Durumeric, Eric Wustrow, J. Alex Halderm.pdf

386.2 KB

Mining Your Ps and Qs Detection of Widespread Weak Keys in Network Devices Slides - Nadia Heninger, Zakir Durumeric, Eric Wustrow, J. Alex Halderm.pdf

1.6 MB

Neuroscience Meets Cryptography Designing Crypto Primitives Secure Against Rubber Hose Attacks - Hristo Bojinov, Daniel Sanchez, Paul Reber, Northw.pdf

530.3 KB

Neuroscience Meets Cryptography Designing Crypto Primitives Secure Against Rubber Hose Attacks Slides - Hristo Bojinov, Daniel Sanchez, Paul Reber, Northw.pdf

1.3 MB

New Attacks on Timing-based Network Flow Watermarks - Zi Lin, Nicholas Hopper.pdf

1.4 MB

New Attacks on Timing-based Network Flow Watermarks Slides - Zi Lin, Nicholas Hopper.pdf

4.0 MB

On Breaking SAML Be Whoever You Want to Be - Juraj Somorovsky, Andreas Mayer, Jorg Schwenk, Marco Kampmann, Meiko Jensen.pdf

725.7 KB

On Breaking SAML Be Whoever You Want to Be Slides - Juraj Somorovsky, Andreas Mayer, Jorg Schwenk, Marco Kampmann, Meiko Jensen.pdf

1.9 MB

On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces - Ivan Martinovic, Doug Davies, Mario Frank, Daniele Perito, Tomas Ros, Dawn Song.pdf

1.9 MB

Optimally Robust Private Information Retrieval - Casey Devet, Ian Goldberg, Nadia Heninger.pdf

217.6 KB

Optimally Robust Private Information Retrieval Slides - Casey Devet, Ian Goldberg, Nadia Heninger.pdf

595.2 KB

Origin-Bound Certificates A Fresh Approach to Strong Client Authentication for the Web - Michael Dietz, Alexei Czeskis, Dirk Balfanz, Dan S. Wallach.pdf

625.6 KB

PharmaLeaks Understanding the Business of Online Pharmaceutical Affiliate Programs - Damon McCoy, Andreas Pitsillidis, Grant Jordan, Nicholas Weaver, Christian Kreibich, Brian Kr.pdf

1.2 MB

PharmaLeaks Understanding the Business of Online Pharmaceutical Affiliate Programs Slides - Damon McCoy, Andreas Pitsillidis, Grant Jordan, Nicholas Weaver, Christian Kreibich, B.pdf

2.1 MB

Policy-Sealed Data A New Abstraction for Building Trusted Cloud Services - Nuno Santos, Rodrigo Rodrigues, Krishna P. Gummadi.pdf

294.3 KB

Privacy-Preserving Social Plugins - Georgios Kontaxis, Michalis Polychronakis, Angelos D. Keromytis, Evangelos P. Markatos.pdf

740.9 KB

Privacy-Preserving Social Plugins Slides - Georgios Kontaxis, Michalis Polychronakis, Angelos D. Keromytis, Evangelos P. Markatos.pdf

3.3 MB

Privilege Separation in HTML5 Applications - Devdatta Akhawe, Prateek Saxena, Dawn Song.pdf

522.5 KB

Progressive Authentication Deciding When to Authenticate on Mobile Phones - Oriana Riva, Chuan Qin, Karin Strauss, Dimitrios Lymberopoulos.pdf

1.8 MB

Progressive Authentication Deciding When to Authenticate on Mobile Phones Slides - Oriana Riva, Chuan Qin, Karin Strauss, Dimitrios Lymberopoulos.pdf

1.8 MB

PUBCRAWL Protecting Users and Businesses from CRAWLers - Gregoire Jacob, Engin Kirda, Christopher Kruegel, Giovanni Vigna.pdf

589.7 KB

PUBCRAWL Protecting Users and Businesses from CRAWLers Slides - Gregoire Jacob, Engin Kirda, Christopher Kruegel, Giovanni Vigna.pdf

735.7 KB

Security and Usability Challenges of Moving-Object CAPTCHAs Decoding Codewords in Motion - Y. Xu, G. Reynaga, S. Chiasson, J.-M. Frahm, F. Monrose, P. van Oorschot.pdf

1.9 MB

Security and Usability Challenges of Moving-Object CAPTCHAs Decoding Codewords in Motion Slides - Y. Xu, G. Reynaga, S. Chiasson, J.-M. Frahm, F. Monrose, P. van Oorschot.pdf

4.1 MB

Social Networking with Frientegrity Privacy and Integrity with an Untrusted Provider - Ariel J. Feldman, Aaron Blankstein, Michael J. Freedman, Edward W. Felten.pdf

555.5 KB

Social Networking with Frientegrity Privacy and Integrity with an Untrusted Provider Slides - Ariel J. Feldman, Aaron Blankstein, Michael J. Freedman, Edward W. Felten.pdf

3.6 MB

STEALTHMEM System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud - Taesoo Kim, Marcus Peinado, Gloria Mainar-Ruiz.pdf

517.9 KB

STEALTHMEM System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud Slides - Taesoo Kim, Marcus Peinado, Gloria Mainar-Ruiz.pdf

1.2 MB

STING Finding Name Resolution Vulnerabilities in Programs - Hayawardh Vijayakumar, Joshua Schiffman, Trent Jaeger.pdf

500.9 KB

STING Finding Name Resolution Vulnerabilities in Programs Slides - Hayawardh Vijayakumar, Joshua Schiffman, Trent Jaeger.pdf

5.1 MB

Tachyon Tandem Execution for Efficient Live Patch Testing - Matthew Maurer, David Brumley.pdf

280.9 KB

Taking Proof-Based Verified Computation a Few Steps Closer to Practicality - Srinath Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Andrew J. Blumberg, Michael Walfish.pdf

445.4 KB

Taking Proof-Based Verified Computation a Few Steps Closer to Practicality Slides - Srinath Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Andrew J. Blumberg, Michael Walfish.pdf

141.6 KB

TARDIS Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without Clocks - Amir Rahmati, Mastooreh Salajegheh, Dan Holcomb, Jacob Sorber, Wayne P..pdf

2.3 MB

TARDIS Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without Clocks Slides - Amir Rahmati, Mastooreh Salajegheh, Dan Holcomb, Jacob Sorber, W.pdf

35.1 MB

Throttling Tor Bandwidth Parasites - Rob Jansen, Paul Syverson, Nicholas Hopper.pdf

1.2 MB

Throttling Tor Bandwidth Parasites Slides - Rob Jansen, Paul Syverson, Nicholas Hopper.pdf

12.0 MB

Tracking Rootkit Footprints with a Practical Memory Analysis System - Weidong Cui, Marcus Peinado, Zhilei Xu, Ellick Chan.pdf

808.3 KB

Tracking Rootkit Footprints with a Practical Memory Analysis System Slides - Weidong Cui, Marcus Peinado, Zhilei Xu, Ellick Chan.pdf

1.5 MB

Whispers in the Hyper-space High-speed Covert Channel Attacks in the Cloud - Zhenyu Wu, Zhang Xu, Haining Wang.pdf

799.4 KB

Whispers in the Hyper-space High-speed Covert Channel Attacks in the Cloud Slides Slides Zhenyu Wu, Zhang Xu, Haining Wang.pdf

1.7 MB

/.../USENIX Security 2012 USENIX_files/

acmqueue_150x48_0.png

3.1 KB

acmqueue_150x48_0_002.png

4.5 KB

admin_125x47_0.png

3.7 KB

admin_125x47_0_002.png

11.4 KB

all.js

3.2 KB

analytics.js

45.2 KB

beyond_security.png

7.5 KB

beyond_security_002.png

14.1 KB

cbgapi.loaded_0

144.0 KB

cbgapi.loaded_1

97.1 KB

cset12_banner_colo.jpg

6.4 KB

css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css

5.6 KB

css_ciODmkFfqCSx2xBu95VX29BZ0r4mdoEz3gy-MriTJBM.css

257.9 KB

css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css

1.5 KB

css_SKdvFJ9YoZ2Zlnl17QxUbae5QC-NQDrH8ynBbHJFAaM.css

9.2 KB

css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css

0.1 KB

dcj_150x27_0.png

3.2 KB

dcj_150x27_0_002.png

6.2 KB

dmtf_150x53_0.png

8.0 KB

dmtf_150x53_0_002.png

4.4 KB

evtwote12_banner_colo.jpg

5.4 KB

fastbutton.htm

1.8 KB

fastbutton_002.htm

1.7 KB

foci12_banner_colo.jpg

5.6 KB

fsm_150x44_0.png

4.1 KB

fsm_150x44_0_002.png

9.7 KB

google_8.png

7.8 KB

google_8_002.png

3.2 KB

hakin9_en150x40.png

3.5 KB

hakin9_en150x40_002.png

6.8 KB

healthsec12_banner_colo.jpg

7.0 KB

hotsec12_banner_colo.jpg

6.4 KB

ibm-research.png

3.5 KB

ibm-research_002.png

1.9 KB

ibm-research_gs.png

0.6 KB

ie.htm

30.2 KB

ieee_sp_150x36_0.png

8.7 KB

ieee_sp_150x36_0_002.png

4.5 KB

infosecnews_150x120_0.png

5.2 KB

infosecnews_150x120_0_002.png

5.6 KB

js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js

20.5 KB

js_5eZSC3tfzCwTta-_4qxrBau4YdctcIhVqovRK7sPRFo.js

107.7 KB

js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js

1.4 KB

js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js

120.3 KB

js_nPhKWi17GlWfUPto14Dqfk5lpAFMD2XUrRDYY3jnD2c.js

23.0 KB

js_sWOO4PbSe161nCKWEJProMMhdbu_pfXMDzdRrMGBIE0.js

47.6 KB

linux_journal_150x72_0.png

6.6 KB

linux_journal_150x72_0_002.png

10.3 KB

linux_pro_150x57_0.png

3.5 KB

linux_pro_150x57_0_002.png

5.3 KB

lxer_150x53_0.png

4.6 KB

lxer_150x53_0_002.png

8.2 KB

metricon70_banner_colo.jpg

7.8 KB

microsoft_research_0.png

4.9 KB

microsoft_research_0_002.png

2.4 KB

mozilla_firefox_logo.png

17.2 KB

mozilla_firefox_logo_002.png

19.4 KB

national_science_foundation.gif

4.2 KB

national_science_foundation_002.gif

7.3 KB

nsp_logo_black.png

4.7 KB

nsp_logo_black_002.png

4.7 KB

oreilly_150x28_0.png

2.4 KB

oreilly_150x28_0_002.png

3.8 KB

plusone.js

49.0 KB

postmessageRelay.htm

0.7 KB

stack_exchange_150x37_0.png

6.0 KB

stack_exchange_150x37_0_002.png

3.3 KB

symantec_150x60.png

5.4 KB

symantec_150x60_002.png

10.6 KB

userfriendly_150x38_0.png

3.5 KB

userfriendly_150x38_0_002.png

6.7 KB

widgets.js

98.5 KB

woot12_banner_colo.jpg

5.5 KB

/.../USENIX Security 2012 USENIX_files/postmessageRelay_data/

829555168-postmessagerelay.js

10.0 KB

cbgapi.loaded_0

54.9 KB

rpcshindig_random.js

13.0 KB

/USENIX Security 2013/

Alice in Warningland A Large-Scale Field Study of Browser Security Warning Effectiveness - Devdatta Akhawe, Adrienne Porter Felt.mp4

11.3 MB

An Empirical Study of Vulnerability Rewards Programs - Matthew Finifter, Devdatta Akhawe, David Wagner.mp4

10.5 MB

Building Securable Infrastructure Open-Source Private Clouds - Pravir Chandra.mp4

32.4 MB

Confessions of a Recovering Data Broker Responsible Innovation in the Age of Big Data, Big Brother, and the Coming Skynet Terminators - Jim Adler.mp4

37.7 MB

Control Flow Integrity for COTS Binaries - Mingwei Zhang, R. Sekar.mp4

11.5 MB

Dismantling Megamos Crypto Wirelessly Lockpicking a Vehicle Immobilizer - Roel Verdult, Flavio D. Garcia, Baris Ege.mp4

16.0 MB

Dowsing for Ovrflows A Guided Fuzzer to Find Buffer Boundary Violations - Istvan Haller, Asia Slowinska, Matthias Neugschwandtner, Herbert Bos.mp4

12.5 MB

Dr. Felten Goes To Washington - Lessons from 18 Months in Government - Edward W. Felten.mp4

42.7 MB

Effective Inter-Component Communication Mapping in Android An Essential Step Towards Holistic Security Analysis - Damien Octeau, Patrick McDaniel, Somesh Jha, Alexandre Bartel, Eri.mp4

11.0 MB

Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers - Suman Jana, David Molnar, Alexander Moshchuk, Alan Dunn, Benjamin Livshits, Helen J. Wang, E.mp4

9.2 MB

Eradicating DNS Rebinding with the Extended Same-origin Policy - Martin Johns, Sebastian Lekies, Ben Stock.mp4

11.0 MB

ExecScent Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates - Terry Nelms, Roberto Perdisci, Mustaque Ahamad.mp4

12.0 MB

Explicating SDKs Uncovering Assumptions Underlying Secure Authentication and Authorization - Rui Wang, Yuchen Zhou, Shuo Chen, Shaz Qadeer, David Evans, Yuri Gurevich.mp4

10.8 MB

FIE on Firmware Finding Vulnerabilities in Embedded Systems Using Symbolic Execution - Drew Davidson, Benjamin Moench, Somesh Jha, Thomas Ristenpart.mp4

11.5 MB

Greystar Fast and Accurate Detection of SMS Spam Numbers in Large Cellular Networks Using Gray Phone Space - Nan Jiang, Yu Jin, Ann Skudlark, Zhi-Li Zhang.mp4

9.6 MB

Impression Fraud in On-line Advertising via Pay-Per-View Networks - Kevin Springborn, Paul Barford.mp4

10.0 MB

Jekyll on iOS When Benign Apps Become Evil - Tielei Wang, Kangjie Lu, Long Lu, Simon Chung, Wenke Lee.mp4

11.4 MB

Measuring the Practical Impact of DNSSEC Deployment - Wilson Lian, Eric Rescorla, Hovav Shacham, Stefan Savage.mp4

12.7 MB

MetaSymploit Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis - Ruowen Wang, Peng Ning, Tao Xie, Quan Chen.mp4

14.9 MB

Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring - Edward J. Schwartz, JongHyup Lee, Maverick Woo, David Brumley.mp4

11.0 MB

On the Security of Picture Gesture Authentication - Ziming Zhao, Gail-Joon Ahn, Jeong-Jin Seo, Hongxin Hu.mp4

9.9 MB

On the Security of RC4 in TLS - Nadhem AlFardan, Royal Holloway, Daniel J. Bernstein, Kenneth G. Paterson, Bertram Poettering, Jacob C.N. Schuldt.mp4

11.6 MB

PCF A Portable Circuit Format for Scalable Two-Party Secure Computation - Ben Kreuter, Benjamin Mood, Abhi Shelat, Kevin Butler.mp4

7.9 MB

Proactively Accountable Anonymous Messaging in Verdict - Henry Corrigan-Gibbs, David Isaac Wolinsky, Bryan Ford.mp4

11.7 MB

Revolver An Automated Approach to the Detection of Evasive Web-based Malware - Alexandros Kapravelos, Yan Shoshitaishvili, Marco Cova, Christopher Kruegel, Giovanni Vigna.mp4

8.4 MB

Sancus Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base - Job Noorman, Pieter Agten, Wilfried Daniels, Raoul Strackx, Anthony Van Herre.mp4

11.4 MB

Secure Outsourced Garbled Circuit Evaluation for Mobile Devices - Henry Carter, Benjamin Mood, Patrick Traynor, Kevin Butler.mp4

13.2 MB

Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation - Frank Imeson, Ariq Emtenan, Siddharth Garg, Mahesh V. Tripunita.mp4

11.0 MB

Securing Embedded User Interfaces Android and Beyond - Franziska Roesner, Tadayoshi Kohno.mp4

9.9 MB

Security Team 2.0 - Chris Evans.mp4

34.2 MB

Steal This Movie Automatically Bypassing DRM Protection in Streaming Media Services - Ruoyu Wang, Santa Barbara, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna.mp4

11.5 MB

Take This Personally Pollution Attacks on Personalized Services - Xinyu Xing, Wei Meng, Dan Doozan, Alex C. Snoeren, Nick Feamster, Wenke Lee.mp4

11.8 MB

Technical Sessions 2013 USENIX.htm

367.9 KB

The Velocity of Censorship High-Fidelity Detection of Microblog Post Deletions - Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall.mp4

12.0 MB

The White House's Priorities for Cybersecurity - Andy Ozment.mp4

64.5 MB

Towards Automatic Software Lineage Inference - Jiyong Jang, Maverick Woo, David Brumley.mp4

13.6 MB

Tracking the Casino Computer Wars Who’s Winning - the Casino or the Cheat - Richard Marcus.mp4

31.2 MB

Trafficking Fradulent Accounts The Role of the Underground Market in Twitter Spam and Abuse - Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, Vern Paxson.mp4

13.6 MB

Transparent ROP Exploit Mitigation Using Indirect Branch Tracing - Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis.mp4

12.5 MB

USENIX Security 2013 login article.pdf

406.6 KB

USENIX Security 2013 Proceedings erratum.pdf

77.1 KB

USENIX Security 2013 Proceedings Interior.pdf

27.6 MB

USENIX Security 2013 Proceedings.epub

56.1 MB

USENIX Security 2013 Proceedings.mobi

28.2 MB

USENIX Security 2013 Proceedings.pdf

27.9 MB

USENIX Security 2013 USENIX.htm

88.6 KB

WHYPER Towards Automating Risk Assessment of Mobile Applications - Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, Tao Xie.mp4

12.3 MB

Windows 8 Security - Supporting User Confidence - Crispin Cowan.mp4

22.8 MB

You Are How You Click Clickstream Analysis for Sybil Detection - Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng, Ben Y. Zhao.mp4

10.7 MB

ZMap Fast Internet-wide Scanning and Its Security Applications - durumeric.mp4

14.9 MB

ZQL A Compiler for Privacy-Preserving Data Processing - Cedric Fournet, Markulf Kohlweiss, George Danezis.mp4

13.0 MB

/.../Technical Sessions 2013 USENIX_files/

acmqueue_150x48_3.png

4.5 KB

acmqueue_150x48_3_002.png

3.1 KB

adler_jim.jpg

24.8 KB

admin_150x60.png

4.2 KB

admin_150x60_002.png

7.0 KB

akamai_150x62.png

4.7 KB

akamai_150x62_002.png

2.8 KB

all.js

3.2 KB

analytics.js

45.2 KB

application-octet-stream.png

0.2 KB

arbor_networks_150x42.png

4.0 KB

arbor_networks_150x42_002.png

6.1 KB

audio_16.png

0.5 KB

cbgapi.loaded_0

144.0 KB

cbgapi.loaded_1

97.1 KB

chandra_pravir.jpg

3.8 KB

cmu_cert_150x73.png

3.9 KB

cmu_cert_150x73_002.png

2.9 KB

computer_150x33_0.png

4.2 KB

computer_150x33_0_002.png

3.2 KB

conference-schedule-pdf.png

0.3 KB

cowan_crispin.jpg

3.9 KB

css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css

5.6 KB

css_dY0FNz4qF00fqwtbSA930BrnJH15HL9efi8t-qF8ZFs.css

9.2 KB

css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css

1.5 KB

css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css

0.1 KB

css_XQfCg5kiuU6ACblHn3rDXdgaKZR8AxbhrQR4Gznu5qA.css

257.3 KB

dcj_150x27_3.png

3.2 KB

dcj_150x27_3_002.png

6.1 KB

dmtf_600x240.png

4.1 KB

dmtf_600x240_002.png

2.5 KB

evans_chris.png

22.1 KB

facebook_5.png

4.8 KB

facebook_5_002.png

8.6 KB

fastbutton.htm

1.8 KB

fastbutton_002.htm

1.7 KB

felten_ed_sec13.jpg

10.9 KB

fsm_150x86_2.png

12.4 KB

fsm_150x86_2_002.png

7.5 KB

google_150x50_3.png

4.0 KB

google_150x50_3_002.png

8.7 KB

hpcwire_150x55_0.png

3.8 KB

hpcwire_150x55_0_002.png

10.1 KB

ibm_research_150x60.png

4.1 KB

ibm_research_150x60_002.png

6.0 KB

ie.htm

30.2 KB

ieee_sp_150x36_4.png

8.6 KB

ieee_sp_150x36_4_002.png

4.5 KB

infosecnews_150x38.png

3.1 KB

infosecnews_150x38_002.png

4.9 KB

it_dev_150x39.png

9.5 KB

it_dev_150x39_002.png

3.1 KB

js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js

20.5 KB

js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js

1.4 KB

js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js

120.3 KB

js_RGgtt0xyoog3aEbqA3PACaZnzIbopLWdKtKDjg0Ge54.js

0.9 KB

js_U0vng6nr8yfSzrWPiyS9QtbOsmQ8XMOn1mS4JIpHltg.js

131.3 KB

js_zKsxChQ0ZiM23lE1j-H3wIlMQpnOrGQN3oQ-70N6r40.js

47.6 KB

linux_journal_150x72_2.png

6.6 KB

linux_journal_150x72_2_002.png

10.3 KB

linux_pro_150x60.png

2.9 KB

linux_pro_150x60_002.png

5.0 KB

lxer_150x60.png

6.6 KB

lxer_150x60_002.png

3.7 KB

marcus_richard.jpg

5.9 KB

microsoft_research_150x42_2.png

3.2 KB

microsoft_research_150x42_2_002.png

2.8 KB

nostarch_600x240_1.png

3.9 KB

nostarch_600x240_1_002.png

1.6 KB

nsf_90x80_0.png

9.8 KB

nsf_90x80_0_002.png

9.8 KB

oreilly_150x28_3.png

2.4 KB

oreilly_150x28_3_002.png

3.8 KB

ozment_andy_sec13.jpg

35.8 KB

package-x-generic.png

0.3 KB

pdf_16.png

0.3 KB

plusone.js

49.0 KB

postmessageRelay.htm

0.7 KB

security_orb_tagline_150x47.png

4.3 KB

security_orb_tagline_150x47_002.png

9.0 KB

serverfault_150x35_0.png

2.4 KB

serverfault_150x35_0_002.png

3.4 KB

slides_16.png

1.3 KB

usenix-locked.png

1.4 KB

userfriendly_150x60.png

3.0 KB

userfriendly_150x60_002.png

8.4 KB

video_16.png

1.4 KB

virus_bulletin_150x60.png

5.2 KB

virus_bulletin_150x60_002.png

3.0 KB

widgets.js

98.5 KB

/.../Technical Sessions 2013 USENIX_files/postmessageRelay_data/

829555168-postmessagerelay.js

10.0 KB

cbgapi.loaded_0

54.9 KB

rpcshindig_random.js

13.0 KB

/.../USENIX Security 2013 captions/

Alice in Warningland A Large-Scale Field Study of Browser Security Warning Effectiveness - Devdatta Akhawe, Adrienne Porter Felt.eng.json

1.5 MB

Alice in Warningland A Large-Scale Field Study of Browser Security Warning Effectiveness - Devdatta Akhawe, Adrienne Porter Felt.eng.lrc

41.0 KB

Alice in Warningland A Large-Scale Field Study of Browser Security Warning Effectiveness - Devdatta Akhawe, Adrienne Porter Felt.eng.srt

38.8 KB

Alice in Warningland A Large-Scale Field Study of Browser Security Warning Effectiveness - Devdatta Akhawe, Adrienne Porter Felt.eng.text

27.6 KB

Alice in Warningland A Large-Scale Field Study of Browser Security Warning Effectiveness - Devdatta Akhawe, Adrienne Porter Felt.eng.tsv

35.2 KB

Alice in Warningland A Large-Scale Field Study of Browser Security Warning Effectiveness - Devdatta Akhawe, Adrienne Porter Felt.eng.txt

41.6 KB

Alice in Warningland A Large-Scale Field Study of Browser Security Warning Effectiveness - Devdatta Akhawe, Adrienne Porter Felt.eng.vtt

35.6 KB

An Empirical Study of Vulnerability Rewards Programs - Matthew Finifter, Devdatta Akhawe, David Wagner.eng.json

1.7 MB

An Empirical Study of Vulnerability Rewards Programs - Matthew Finifter, Devdatta Akhawe, David Wagner.eng.lrc

48.3 KB

An Empirical Study of Vulnerability Rewards Programs - Matthew Finifter, Devdatta Akhawe, David Wagner.eng.srt

41.3 KB

An Empirical Study of Vulnerability Rewards Programs - Matthew Finifter, Devdatta Akhawe, David Wagner.eng.text

29.6 KB

An Empirical Study of Vulnerability Rewards Programs - Matthew Finifter, Devdatta Akhawe, David Wagner.eng.tsv

40.3 KB

An Empirical Study of Vulnerability Rewards Programs - Matthew Finifter, Devdatta Akhawe, David Wagner.eng.txt

49.0 KB

An Empirical Study of Vulnerability Rewards Programs - Matthew Finifter, Devdatta Akhawe, David Wagner.eng.vtt

37.9 KB

Building Securable Infrastructure Open-Source Private Clouds - Pravir Chandra.eng.srt

128.5 KB

Confessions of a Recovering Data Broker Responsible Innovation in the Age of Big Data, Big Brother, and the Coming Skynet Terminators - Jim Adler.eng.srt

121.2 KB

Control Flow Integrity for COTS Binaries - Mingwei Zhang, R. Sekar.eng.json

1.1 MB

Control Flow Integrity for COTS Binaries - Mingwei Zhang, R. Sekar.eng.lrc

28.8 KB

Control Flow Integrity for COTS Binaries - Mingwei Zhang, R. Sekar.eng.srt

32.5 KB

Control Flow Integrity for COTS Binaries - Mingwei Zhang, R. Sekar.eng.text

22.4 KB

Control Flow Integrity for COTS Binaries - Mingwei Zhang, R. Sekar.eng.tsv

26.0 KB

Control Flow Integrity for COTS Binaries - Mingwei Zhang, R. Sekar.eng.txt

29.1 KB

Control Flow Integrity for COTS Binaries - Mingwei Zhang, R. Sekar.eng.vtt

29.7 KB

Dismantling Megamos Crypto Wirelessly Lockpicking a Vehicle Immobilizer - Roel Verdult, Flavio D. Garcia, Baris Ege.eng.srt

40.3 KB

Dowsing for Ovrflows A Guided Fuzzer to Find Buffer Boundary Violations - Istvan Haller, Asia Slowinska, Matthias Neugschwandtner, Herbert Bos.eng.json

1.6 MB

Dowsing for Ovrflows A Guided Fuzzer to Find Buffer Boundary Violations - Istvan Haller, Asia Slowinska, Matthias Neugschwandtner, Herbert Bos.eng.lrc

40.2 KB

Dowsing for Ovrflows A Guided Fuzzer to Find Buffer Boundary Violations - Istvan Haller, Asia Slowinska, Matthias Neugschwandtner, Herbert Bos.eng.srt

41.3 KB

Dowsing for Ovrflows A Guided Fuzzer to Find Buffer Boundary Violations - Istvan Haller, Asia Slowinska, Matthias Neugschwandtner, Herbert Bos.eng.text

31.4 KB

Dowsing for Ovrflows A Guided Fuzzer to Find Buffer Boundary Violations - Istvan Haller, Asia Slowinska, Matthias Neugschwandtner, Herbert Bos.eng.tsv

36.3 KB

Dowsing for Ovrflows A Guided Fuzzer to Find Buffer Boundary Violations - Istvan Haller, Asia Slowinska, Matthias Neugschwandtner, Herbert Bos.eng.txt

40.5 KB

Dowsing for Ovrflows A Guided Fuzzer to Find Buffer Boundary Violations - Istvan Haller, Asia Slowinska, Matthias Neugschwandtner, Herbert Bos.eng.vtt

38.5 KB

Dr. Felten Goes To Washington - Lessons from 18 Months in Government - Edward W. Felten.eng.srt

139.4 KB

Effective Inter-Component Communication Mapping in Android An Essential Step Towards Holistic Security Analysis - Damien Octeau, Patrick McDaniel, Somesh Jha, Alexandre Bartel, Eri.eng.json

1.1 MB

Effective Inter-Component Communication Mapping in Android An Essential Step Towards Holistic Security Analysis - Damien Octeau, Patrick McDaniel, Somesh Jha, Alexandre Bartel, Eri.eng.lrc

29.5 KB

Effective Inter-Component Communication Mapping in Android An Essential Step Towards Holistic Security Analysis - Damien Octeau, Patrick McDaniel, Somesh Jha, Alexandre Bartel, Eri.eng.srt

31.5 KB

Effective Inter-Component Communication Mapping in Android An Essential Step Towards Holistic Security Analysis - Damien Octeau, Patrick McDaniel, Somesh Jha, Alexandre Bartel, Eri.eng.text

22.0 KB

Effective Inter-Component Communication Mapping in Android An Essential Step Towards Holistic Security Analysis - Damien Octeau, Patrick McDaniel, Somesh Jha, Alexandre Bartel, Eri.eng.tsv

26.3 KB

Effective Inter-Component Communication Mapping in Android An Essential Step Towards Holistic Security Analysis - Damien Octeau, Patrick McDaniel, Somesh Jha, Alexandre Bartel, Eri.eng.txt

29.8 KB

Effective Inter-Component Communication Mapping in Android An Essential Step Towards Holistic Security Analysis - Damien Octeau, Patrick McDaniel, Somesh Jha, Alexandre Bartel, Eri.eng.vtt

28.8 KB

Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers - Suman Jana, David Molnar, Alexander Moshchuk, Alan Dunn, Benjamin Livshits, Helen J. Wang, E.eng.json

1.2 MB

Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers - Suman Jana, David Molnar, Alexander Moshchuk, Alan Dunn, Benjamin Livshits, Helen J. Wang, E.eng.lrc

32.6 KB

Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers - Suman Jana, David Molnar, Alexander Moshchuk, Alan Dunn, Benjamin Livshits, Helen J. Wang, E.eng.srt

30.5 KB

Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers - Suman Jana, David Molnar, Alexander Moshchuk, Alan Dunn, Benjamin Livshits, Helen J. Wang, E.eng.text

21.5 KB

Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers - Suman Jana, David Molnar, Alexander Moshchuk, Alan Dunn, Benjamin Livshits, Helen J. Wang, E.eng.tsv

27.8 KB

Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers - Suman Jana, David Molnar, Alexander Moshchuk, Alan Dunn, Benjamin Livshits, Helen J. Wang, E.eng.txt

33.0 KB

Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers - Suman Jana, David Molnar, Alexander Moshchuk, Alan Dunn, Benjamin Livshits, Helen J. Wang, E.eng.vtt

28.0 KB

Eradicating DNS Rebinding with the Extended Same-origin Policy - Martin Johns, Sebastian Lekies, Ben Stock.eng.json

1.4 MB

Eradicating DNS Rebinding with the Extended Same-origin Policy - Martin Johns, Sebastian Lekies, Ben Stock.eng.lrc

41.0 KB

Eradicating DNS Rebinding with the Extended Same-origin Policy - Martin Johns, Sebastian Lekies, Ben Stock.eng.srt

31.8 KB

Eradicating DNS Rebinding with the Extended Same-origin Policy - Martin Johns, Sebastian Lekies, Ben Stock.eng.text

26.7 KB

Eradicating DNS Rebinding with the Extended Same-origin Policy - Martin Johns, Sebastian Lekies, Ben Stock.eng.tsv

34.9 KB

Eradicating DNS Rebinding with the Extended Same-origin Policy - Martin Johns, Sebastian Lekies, Ben Stock.eng.txt

41.6 KB

Eradicating DNS Rebinding with the Extended Same-origin Policy - Martin Johns, Sebastian Lekies, Ben Stock.eng.vtt

30.3 KB

ExecScent Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates - Terry Nelms, Roberto Perdisci, Mustaque Ahamad.eng.json

1.2 MB

ExecScent Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates - Terry Nelms, Roberto Perdisci, Mustaque Ahamad.eng.lrc

35.8 KB

ExecScent Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates - Terry Nelms, Roberto Perdisci, Mustaque Ahamad.eng.srt

30.4 KB

ExecScent Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates - Terry Nelms, Roberto Perdisci, Mustaque Ahamad.eng.text

21.8 KB

ExecScent Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates - Terry Nelms, Roberto Perdisci, Mustaque Ahamad.eng.tsv

29.7 KB

ExecScent Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates - Terry Nelms, Roberto Perdisci, Mustaque Ahamad.eng.txt

36.3 KB

ExecScent Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates - Terry Nelms, Roberto Perdisci, Mustaque Ahamad.eng.vtt

27.9 KB

Explicating SDKs Uncovering Assumptions Underlying Secure Authentication and Authorization - Rui Wang, Yuchen Zhou, Shuo Chen, Shaz Qadeer, David Evans, Yuri Gurevich.eng.json

1.1 MB

Explicating SDKs Uncovering Assumptions Underlying Secure Authentication and Authorization - Rui Wang, Yuchen Zhou, Shuo Chen, Shaz Qadeer, David Evans, Yuri Gurevich.eng.lrc

29.7 KB

Explicating SDKs Uncovering Assumptions Underlying Secure Authentication and Authorization - Rui Wang, Yuchen Zhou, Shuo Chen, Shaz Qadeer, David Evans, Yuri Gurevich.eng.srt

30.2 KB

Explicating SDKs Uncovering Assumptions Underlying Secure Authentication and Authorization - Rui Wang, Yuchen Zhou, Shuo Chen, Shaz Qadeer, David Evans, Yuri Gurevich.eng.text

22.8 KB

Explicating SDKs Uncovering Assumptions Underlying Secure Authentication and Authorization - Rui Wang, Yuchen Zhou, Shuo Chen, Shaz Qadeer, David Evans, Yuri Gurevich.eng.tsv

26.7 KB

Explicating SDKs Uncovering Assumptions Underlying Secure Authentication and Authorization - Rui Wang, Yuchen Zhou, Shuo Chen, Shaz Qadeer, David Evans, Yuri Gurevich.eng.txt

29.9 KB

Explicating SDKs Uncovering Assumptions Underlying Secure Authentication and Authorization - Rui Wang, Yuchen Zhou, Shuo Chen, Shaz Qadeer, David Evans, Yuri Gurevich.eng.vtt

28.1 KB

FIE on Firmware Finding Vulnerabilities in Embedded Systems Using Symbolic Execution - Drew Davidson, Benjamin Moench, Somesh Jha, Thomas Ristenpart.eng.json

1.5 MB

FIE on Firmware Finding Vulnerabilities in Embedded Systems Using Symbolic Execution - Drew Davidson, Benjamin Moench, Somesh Jha, Thomas Ristenpart.eng.lrc

47.1 KB

FIE on Firmware Finding Vulnerabilities in Embedded Systems Using Symbolic Execution - Drew Davidson, Benjamin Moench, Somesh Jha, Thomas Ristenpart.eng.srt

35.1 KB

FIE on Firmware Finding Vulnerabilities in Embedded Systems Using Symbolic Execution - Drew Davidson, Benjamin Moench, Somesh Jha, Thomas Ristenpart.eng.text

25.6 KB

FIE on Firmware Finding Vulnerabilities in Embedded Systems Using Symbolic Execution - Drew Davidson, Benjamin Moench, Somesh Jha, Thomas Ristenpart.eng.tsv

37.8 KB

FIE on Firmware Finding Vulnerabilities in Embedded Systems Using Symbolic Execution - Drew Davidson, Benjamin Moench, Somesh Jha, Thomas Ristenpart.eng.txt

47.9 KB

FIE on Firmware Finding Vulnerabilities in Embedded Systems Using Symbolic Execution - Drew Davidson, Benjamin Moench, Somesh Jha, Thomas Ristenpart.eng.vtt

32.2 KB

Greystar Fast and Accurate Detection of SMS Spam Numbers in Large Cellular Networks Using Gray Phone Space - Nan Jiang, Yu Jin, Ann Skudlark, Zhi-Li Zhang.eng.json

1.0 MB

Greystar Fast and Accurate Detection of SMS Spam Numbers in Large Cellular Networks Using Gray Phone Space - Nan Jiang, Yu Jin, Ann Skudlark, Zhi-Li Zhang.eng.lrc

27.3 KB

Greystar Fast and Accurate Detection of SMS Spam Numbers in Large Cellular Networks Using Gray Phone Space - Nan Jiang, Yu Jin, Ann Skudlark, Zhi-Li Zhang.eng.srt

28.0 KB

Greystar Fast and Accurate Detection of SMS Spam Numbers in Large Cellular Networks Using Gray Phone Space - Nan Jiang, Yu Jin, Ann Skudlark, Zhi-Li Zhang.eng.text

20.6 KB

Greystar Fast and Accurate Detection of SMS Spam Numbers in Large Cellular Networks Using Gray Phone Space - Nan Jiang, Yu Jin, Ann Skudlark, Zhi-Li Zhang.eng.tsv

24.4 KB

Greystar Fast and Accurate Detection of SMS Spam Numbers in Large Cellular Networks Using Gray Phone Space - Nan Jiang, Yu Jin, Ann Skudlark, Zhi-Li Zhang.eng.txt

27.5 KB

Greystar Fast and Accurate Detection of SMS Spam Numbers in Large Cellular Networks Using Gray Phone Space - Nan Jiang, Yu Jin, Ann Skudlark, Zhi-Li Zhang.eng.vtt

25.9 KB

Impression Fraud in On-line Advertising via Pay-Per-View Networks - Kevin Springborn, Paul Barford.eng.json

1.2 MB

Impression Fraud in On-line Advertising via Pay-Per-View Networks - Kevin Springborn, Paul Barford.eng.lrc

29.4 KB

Impression Fraud in On-line Advertising via Pay-Per-View Networks - Kevin Springborn, Paul Barford.eng.srt

32.9 KB

Impression Fraud in On-line Advertising via Pay-Per-View Networks - Kevin Springborn, Paul Barford.eng.text

22.6 KB

Impression Fraud in On-line Advertising via Pay-Per-View Networks - Kevin Springborn, Paul Barford.eng.tsv

26.4 KB

Impression Fraud in On-line Advertising via Pay-Per-View Networks - Kevin Springborn, Paul Barford.eng.txt

29.7 KB

Impression Fraud in On-line Advertising via Pay-Per-View Networks - Kevin Springborn, Paul Barford.eng.vtt

30.0 KB

Jekyll on iOS When Benign Apps Become Evil - Tielei Wang, Kangjie Lu, Long Lu, Simon Chung, Wenke Lee.eng.json

1.2 MB

Jekyll on iOS When Benign Apps Become Evil - Tielei Wang, Kangjie Lu, Long Lu, Simon Chung, Wenke Lee.eng.lrc

33.2 KB

Jekyll on iOS When Benign Apps Become Evil - Tielei Wang, Kangjie Lu, Long Lu, Simon Chung, Wenke Lee.eng.srt

30.9 KB

Jekyll on iOS When Benign Apps Become Evil - Tielei Wang, Kangjie Lu, Long Lu, Simon Chung, Wenke Lee.eng.text

21.8 KB

Jekyll on iOS When Benign Apps Become Evil - Tielei Wang, Kangjie Lu, Long Lu, Simon Chung, Wenke Lee.eng.tsv

28.4 KB

Jekyll on iOS When Benign Apps Become Evil - Tielei Wang, Kangjie Lu, Long Lu, Simon Chung, Wenke Lee.eng.txt

33.6 KB

Jekyll on iOS When Benign Apps Become Evil - Tielei Wang, Kangjie Lu, Long Lu, Simon Chung, Wenke Lee.eng.vtt

28.3 KB

Measuring the Practical Impact of DNSSEC Deployment - Wilson Lian, Eric Rescorla, Hovav Shacham, Stefan Savage.eng.json

1.5 MB

Measuring the Practical Impact of DNSSEC Deployment - Wilson Lian, Eric Rescorla, Hovav Shacham, Stefan Savage.eng.lrc

42.2 KB

Measuring the Practical Impact of DNSSEC Deployment - Wilson Lian, Eric Rescorla, Hovav Shacham, Stefan Savage.eng.srt

37.7 KB

Measuring the Practical Impact of DNSSEC Deployment - Wilson Lian, Eric Rescorla, Hovav Shacham, Stefan Savage.eng.text

26.0 KB

Measuring the Practical Impact of DNSSEC Deployment - Wilson Lian, Eric Rescorla, Hovav Shacham, Stefan Savage.eng.tsv

35.2 KB

Measuring the Practical Impact of DNSSEC Deployment - Wilson Lian, Eric Rescorla, Hovav Shacham, Stefan Savage.eng.txt

42.8 KB

Measuring the Practical Impact of DNSSEC Deployment - Wilson Lian, Eric Rescorla, Hovav Shacham, Stefan Savage.eng.vtt

34.3 KB

MetaSymploit Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis - Ruowen Wang, Peng Ning, Tao Xie, Quan Chen.eng.json

1.4 MB

MetaSymploit Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis - Ruowen Wang, Peng Ning, Tao Xie, Quan Chen.eng.lrc

36.4 KB

MetaSymploit Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis - Ruowen Wang, Peng Ning, Tao Xie, Quan Chen.eng.srt

39.5 KB

MetaSymploit Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis - Ruowen Wang, Peng Ning, Tao Xie, Quan Chen.eng.text

28.5 KB

MetaSymploit Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis - Ruowen Wang, Peng Ning, Tao Xie, Quan Chen.eng.tsv

33.0 KB

MetaSymploit Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis - Ruowen Wang, Peng Ning, Tao Xie, Quan Chen.eng.txt

36.7 KB

MetaSymploit Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis - Ruowen Wang, Peng Ning, Tao Xie, Quan Chen.eng.vtt

36.4 KB

Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring - Edward J. Schwartz, JongHyup Lee, Maverick Woo, David Brumley.eng.json

1.6 MB

Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring - Edward J. Schwartz, JongHyup Lee, Maverick Woo, David Brumley.eng.lrc

43.3 KB

Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring - Edward J. Schwartz, JongHyup Lee, Maverick Woo, David Brumley.eng.srt

41.4 KB

Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring - Edward J. Schwartz, JongHyup Lee, Maverick Woo, David Brumley.eng.text

30.6 KB

Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring - Edward J. Schwartz, JongHyup Lee, Maverick Woo, David Brumley.eng.tsv

37.9 KB

Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring - Edward J. Schwartz, JongHyup Lee, Maverick Woo, David Brumley.eng.txt

43.8 KB

Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring - Edward J. Schwartz, JongHyup Lee, Maverick Woo, David Brumley.eng.vtt

38.3 KB

On the Security of Picture Gesture Authentication - Ziming Zhao, Gail-Joon Ahn, Jeong-Jin Seo, Hongxin Hu.eng.json

1.1 MB

On the Security of Picture Gesture Authentication - Ziming Zhao, Gail-Joon Ahn, Jeong-Jin Seo, Hongxin Hu.eng.lrc

31.3 KB

On the Security of Picture Gesture Authentication - Ziming Zhao, Gail-Joon Ahn, Jeong-Jin Seo, Hongxin Hu.eng.srt

26.4 KB

On the Security of Picture Gesture Authentication - Ziming Zhao, Gail-Joon Ahn, Jeong-Jin Seo, Hongxin Hu.eng.text

19.3 KB

On the Security of Picture Gesture Authentication - Ziming Zhao, Gail-Joon Ahn, Jeong-Jin Seo, Hongxin Hu.eng.tsv

26.0 KB

On the Security of Picture Gesture Authentication - Ziming Zhao, Gail-Joon Ahn, Jeong-Jin Seo, Hongxin Hu.eng.txt

31.7 KB

On the Security of Picture Gesture Authentication - Ziming Zhao, Gail-Joon Ahn, Jeong-Jin Seo, Hongxin Hu.eng.vtt

24.4 KB

On the Security of RC4 in TLS - Nadhem AlFardan, Royal Holloway, Daniel J. Bernstein, Kenneth G. Paterson, Bertram Poettering, Jacob C.N. Schuldt.eng.json

1.2 MB

On the Security of RC4 in TLS - Nadhem AlFardan, Royal Holloway, Daniel J. Bernstein, Kenneth G. Paterson, Bertram Poettering, Jacob C.N. Schuldt.eng.lrc

35.6 KB

On the Security of RC4 in TLS - Nadhem AlFardan, Royal Holloway, Daniel J. Bernstein, Kenneth G. Paterson, Bertram Poettering, Jacob C.N. Schuldt.eng.srt

30.4 KB

On the Security of RC4 in TLS - Nadhem AlFardan, Royal Holloway, Daniel J. Bernstein, Kenneth G. Paterson, Bertram Poettering, Jacob C.N. Schuldt.eng.text

21.2 KB

On the Security of RC4 in TLS - Nadhem AlFardan, Royal Holloway, Daniel J. Bernstein, Kenneth G. Paterson, Bertram Poettering, Jacob C.N. Schuldt.eng.tsv

29.3 KB

On the Security of RC4 in TLS - Nadhem AlFardan, Royal Holloway, Daniel J. Bernstein, Kenneth G. Paterson, Bertram Poettering, Jacob C.N. Schuldt.eng.txt

36.2 KB

On the Security of RC4 in TLS - Nadhem AlFardan, Royal Holloway, Daniel J. Bernstein, Kenneth G. Paterson, Bertram Poettering, Jacob C.N. Schuldt.eng.vtt

27.7 KB

PCF A Portable Circuit Format for Scalable Two-Party Secure Computation - Ben Kreuter, Benjamin Mood, Abhi Shelat, Kevin Butler.eng.json

870.5 KB

PCF A Portable Circuit Format for Scalable Two-Party Secure Computation - Ben Kreuter, Benjamin Mood, Abhi Shelat, Kevin Butler.eng.lrc

23.6 KB

PCF A Portable Circuit Format for Scalable Two-Party Secure Computation - Ben Kreuter, Benjamin Mood, Abhi Shelat, Kevin Butler.eng.srt

23.2 KB

PCF A Portable Circuit Format for Scalable Two-Party Secure Computation - Ben Kreuter, Benjamin Mood, Abhi Shelat, Kevin Butler.eng.text

16.8 KB

PCF A Portable Circuit Format for Scalable Two-Party Secure Computation - Ben Kreuter, Benjamin Mood, Abhi Shelat, Kevin Butler.eng.tsv

20.5 KB

PCF A Portable Circuit Format for Scalable Two-Party Secure Computation - Ben Kreuter, Benjamin Mood, Abhi Shelat, Kevin Butler.eng.txt

23.9 KB

PCF A Portable Circuit Format for Scalable Two-Party Secure Computation - Ben Kreuter, Benjamin Mood, Abhi Shelat, Kevin Butler.eng.vtt

21.4 KB

Proactively Accountable Anonymous Messaging in Verdict - Henry Corrigan-Gibbs, David Isaac Wolinsky, Bryan Ford.eng.json

1.4 MB

Proactively Accountable Anonymous Messaging in Verdict - Henry Corrigan-Gibbs, David Isaac Wolinsky, Bryan Ford.eng.lrc

36.7 KB

Proactively Accountable Anonymous Messaging in Verdict - Henry Corrigan-Gibbs, David Isaac Wolinsky, Bryan Ford.eng.srt

37.7 KB

Proactively Accountable Anonymous Messaging in Verdict - Henry Corrigan-Gibbs, David Isaac Wolinsky, Bryan Ford.eng.text

28.6 KB

Proactively Accountable Anonymous Messaging in Verdict - Henry Corrigan-Gibbs, David Isaac Wolinsky, Bryan Ford.eng.tsv

33.2 KB

Proactively Accountable Anonymous Messaging in Verdict - Henry Corrigan-Gibbs, David Isaac Wolinsky, Bryan Ford.eng.txt

37.0 KB

Proactively Accountable Anonymous Messaging in Verdict - Henry Corrigan-Gibbs, David Isaac Wolinsky, Bryan Ford.eng.vtt

35.1 KB

Revolver An Automated Approach to the Detection of Evasive Web-based Malware - Alexandros Kapravelos, Yan Shoshitaishvili, Marco Cova, Christopher Kruegel, Giovanni Vigna.eng.json

1.1 MB

Revolver An Automated Approach to the Detection of Evasive Web-based Malware - Alexandros Kapravelos, Yan Shoshitaishvili, Marco Cova, Christopher Kruegel, Giovanni Vigna.eng.lrc

26.8 KB

Revolver An Automated Approach to the Detection of Evasive Web-based Malware - Alexandros Kapravelos, Yan Shoshitaishvili, Marco Cova, Christopher Kruegel, Giovanni Vigna.eng.srt

28.4 KB

Revolver An Automated Approach to the Detection of Evasive Web-based Malware - Alexandros Kapravelos, Yan Shoshitaishvili, Marco Cova, Christopher Kruegel, Giovanni Vigna.eng.text

20.9 KB

Revolver An Automated Approach to the Detection of Evasive Web-based Malware - Alexandros Kapravelos, Yan Shoshitaishvili, Marco Cova, Christopher Kruegel, Giovanni Vigna.eng.tsv

24.2 KB

Revolver An Automated Approach to the Detection of Evasive Web-based Malware - Alexandros Kapravelos, Yan Shoshitaishvili, Marco Cova, Christopher Kruegel, Giovanni Vigna.eng.txt

27.0 KB

Revolver An Automated Approach to the Detection of Evasive Web-based Malware - Alexandros Kapravelos, Yan Shoshitaishvili, Marco Cova, Christopher Kruegel, Giovanni Vigna.eng.vtt

26.3 KB

Sancus Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base - Job Noorman, Pieter Agten, Wilfried Daniels, Raoul Strackx, Anthony Van Herre.eng.json

1.5 MB

Sancus Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base - Job Noorman, Pieter Agten, Wilfried Daniels, Raoul Strackx, Anthony Van Herre.eng.lrc

43.5 KB

Sancus Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base - Job Noorman, Pieter Agten, Wilfried Daniels, Raoul Strackx, Anthony Van Herre.eng.srt

38.0 KB

Sancus Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base - Job Noorman, Pieter Agten, Wilfried Daniels, Raoul Strackx, Anthony Van Herre.eng.text

28.3 KB

Sancus Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base - Job Noorman, Pieter Agten, Wilfried Daniels, Raoul Strackx, Anthony Van Herre.eng.tsv

37.1 KB

Sancus Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base - Job Noorman, Pieter Agten, Wilfried Daniels, Raoul Strackx, Anthony Van Herre.eng.txt

44.1 KB

Sancus Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base - Job Noorman, Pieter Agten, Wilfried Daniels, Raoul Strackx, Anthony Van Herre.eng.vtt

35.2 KB

Secure Outsourced Garbled Circuit Evaluation for Mobile Devices - Henry Carter, Benjamin Mood, Patrick Traynor, Kevin Butler.eng.json

1.3 MB

Secure Outsourced Garbled Circuit Evaluation for Mobile Devices - Henry Carter, Benjamin Mood, Patrick Traynor, Kevin Butler.eng.lrc

34.1 KB

Secure Outsourced Garbled Circuit Evaluation for Mobile Devices - Henry Carter, Benjamin Mood, Patrick Traynor, Kevin Butler.eng.srt

33.8 KB

Secure Outsourced Garbled Circuit Evaluation for Mobile Devices - Henry Carter, Benjamin Mood, Patrick Traynor, Kevin Butler.eng.text

26.3 KB

Secure Outsourced Garbled Circuit Evaluation for Mobile Devices - Henry Carter, Benjamin Mood, Patrick Traynor, Kevin Butler.eng.tsv

30.8 KB

Secure Outsourced Garbled Circuit Evaluation for Mobile Devices - Henry Carter, Benjamin Mood, Patrick Traynor, Kevin Butler.eng.txt

34.4 KB

Secure Outsourced Garbled Circuit Evaluation for Mobile Devices - Henry Carter, Benjamin Mood, Patrick Traynor, Kevin Butler.eng.vtt

31.7 KB

Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation - Frank Imeson, Ariq Emtenan, Siddharth Garg, Mahesh V. Tripunita.eng.json

1.1 MB

Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation - Frank Imeson, Ariq Emtenan, Siddharth Garg, Mahesh V. Tripunita.eng.lrc

26.8 KB

Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation - Frank Imeson, Ariq Emtenan, Siddharth Garg, Mahesh V. Tripunita.eng.srt

29.0 KB

Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation - Frank Imeson, Ariq Emtenan, Siddharth Garg, Mahesh V. Tripunita.eng.text

20.5 KB

Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation - Frank Imeson, Ariq Emtenan, Siddharth Garg, Mahesh V. Tripunita.eng.tsv

24.1 KB

Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation - Frank Imeson, Ariq Emtenan, Siddharth Garg, Mahesh V. Tripunita.eng.txt

27.0 KB

Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation - Frank Imeson, Ariq Emtenan, Siddharth Garg, Mahesh V. Tripunita.eng.vtt

26.6 KB

Securing Embedded User Interfaces Android and Beyond - Franziska Roesner, Tadayoshi Kohno.eng.json

1.3 MB

Securing Embedded User Interfaces Android and Beyond - Franziska Roesner, Tadayoshi Kohno.eng.lrc

36.7 KB

Securing Embedded User Interfaces Android and Beyond - Franziska Roesner, Tadayoshi Kohno.eng.srt

35.3 KB

Securing Embedded User Interfaces Android and Beyond - Franziska Roesner, Tadayoshi Kohno.eng.text

26.4 KB

Securing Embedded User Interfaces Android and Beyond - Franziska Roesner, Tadayoshi Kohno.eng.tsv

32.2 KB

Securing Embedded User Interfaces Android and Beyond - Franziska Roesner, Tadayoshi Kohno.eng.txt

37.1 KB

Securing Embedded User Interfaces Android and Beyond - Franziska Roesner, Tadayoshi Kohno.eng.vtt

32.8 KB

Security Team 2.0 - Chris Evans.eng.srt

129.0 KB

Steal This Movie Automatically Bypassing DRM Protection in Streaming Media Services - Ruoyu Wang, Santa Barbara, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna.eng.json

1.4 MB

Steal This Movie Automatically Bypassing DRM Protection in Streaming Media Services - Ruoyu Wang, Santa Barbara, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna.eng.lrc

41.1 KB

Steal This Movie Automatically Bypassing DRM Protection in Streaming Media Services - Ruoyu Wang, Santa Barbara, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna.eng.srt

36.3 KB

Steal This Movie Automatically Bypassing DRM Protection in Streaming Media Services - Ruoyu Wang, Santa Barbara, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna.eng.text

24.8 KB

Steal This Movie Automatically Bypassing DRM Protection in Streaming Media Services - Ruoyu Wang, Santa Barbara, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna.eng.tsv

34.1 KB

Steal This Movie Automatically Bypassing DRM Protection in Streaming Media Services - Ruoyu Wang, Santa Barbara, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna.eng.txt

41.8 KB

Steal This Movie Automatically Bypassing DRM Protection in Streaming Media Services - Ruoyu Wang, Santa Barbara, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna.eng.vtt

32.9 KB

Take This Personally Pollution Attacks on Personalized Services - Xinyu Xing, Wei Meng, Dan Doozan, Alex C. Snoeren, Nick Feamster, Wenke Lee.eng.json

1.1 MB

Take This Personally Pollution Attacks on Personalized Services - Xinyu Xing, Wei Meng, Dan Doozan, Alex C. Snoeren, Nick Feamster, Wenke Lee.eng.lrc

30.2 KB

Take This Personally Pollution Attacks on Personalized Services - Xinyu Xing, Wei Meng, Dan Doozan, Alex C. Snoeren, Nick Feamster, Wenke Lee.eng.srt

31.2 KB

Take This Personally Pollution Attacks on Personalized Services - Xinyu Xing, Wei Meng, Dan Doozan, Alex C. Snoeren, Nick Feamster, Wenke Lee.eng.text

22.3 KB

Take This Personally Pollution Attacks on Personalized Services - Xinyu Xing, Wei Meng, Dan Doozan, Alex C. Snoeren, Nick Feamster, Wenke Lee.eng.tsv

26.8 KB

Take This Personally Pollution Attacks on Personalized Services - Xinyu Xing, Wei Meng, Dan Doozan, Alex C. Snoeren, Nick Feamster, Wenke Lee.eng.txt

30.5 KB

Take This Personally Pollution Attacks on Personalized Services - Xinyu Xing, Wei Meng, Dan Doozan, Alex C. Snoeren, Nick Feamster, Wenke Lee.eng.vtt

28.7 KB

The Velocity of Censorship High-Fidelity Detection of Microblog Post Deletions - Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall.eng.json

1.0 MB

The Velocity of Censorship High-Fidelity Detection of Microblog Post Deletions - Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall.eng.lrc

26.1 KB

The Velocity of Censorship High-Fidelity Detection of Microblog Post Deletions - Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall.eng.srt

28.6 KB

The Velocity of Censorship High-Fidelity Detection of Microblog Post Deletions - Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall.eng.text

20.1 KB

The Velocity of Censorship High-Fidelity Detection of Microblog Post Deletions - Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall.eng.tsv

23.6 KB

The Velocity of Censorship High-Fidelity Detection of Microblog Post Deletions - Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall.eng.txt

26.4 KB

The Velocity of Censorship High-Fidelity Detection of Microblog Post Deletions - Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall.eng.vtt

26.2 KB

The White House's Priorities for Cybersecurity - Andy Ozment.eng.srt

142.2 KB

Towards Automatic Software Lineage Inference - Jiyong Jang, Maverick Woo, David Brumley.eng.json

1.4 MB

Towards Automatic Software Lineage Inference - Jiyong Jang, Maverick Woo, David Brumley.eng.lrc

34.7 KB

Towards Automatic Software Lineage Inference - Jiyong Jang, Maverick Woo, David Brumley.eng.srt

36.1 KB

Towards Automatic Software Lineage Inference - Jiyong Jang, Maverick Woo, David Brumley.eng.text

26.9 KB

Towards Automatic Software Lineage Inference - Jiyong Jang, Maverick Woo, David Brumley.eng.tsv

31.3 KB

Towards Automatic Software Lineage Inference - Jiyong Jang, Maverick Woo, David Brumley.eng.txt

35.0 KB

Towards Automatic Software Lineage Inference - Jiyong Jang, Maverick Woo, David Brumley.eng.vtt

33.5 KB

Tracking the Casino Computer Wars Who’s Winning - the Casino or the Cheat - Richard Marcus.eng.srt

84.8 KB

Trafficking Fradulent Accounts The Role of the Underground Market in Twitter Spam and Abuse - Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, Vern Paxson.eng.json

1.7 MB

Trafficking Fradulent Accounts The Role of the Underground Market in Twitter Spam and Abuse - Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, Vern Paxson.eng.lrc

45.6 KB

Trafficking Fradulent Accounts The Role of the Underground Market in Twitter Spam and Abuse - Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, Vern Paxson.eng.srt

45.6 KB

Trafficking Fradulent Accounts The Role of the Underground Market in Twitter Spam and Abuse - Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, Vern Paxson.eng.text

34.0 KB

Trafficking Fradulent Accounts The Role of the Underground Market in Twitter Spam and Abuse - Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, Vern Paxson.eng.tsv

40.5 KB

Trafficking Fradulent Accounts The Role of the Underground Market in Twitter Spam and Abuse - Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, Vern Paxson.eng.txt

46.0 KB

Trafficking Fradulent Accounts The Role of the Underground Market in Twitter Spam and Abuse - Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, Vern Paxson.eng.vtt

42.3 KB

Transparent ROP Exploit Mitigation Using Indirect Branch Tracing - Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis.eng.json

1.2 MB

Transparent ROP Exploit Mitigation Using Indirect Branch Tracing - Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis.eng.lrc

30.6 KB

Transparent ROP Exploit Mitigation Using Indirect Branch Tracing - Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis.eng.srt

31.6 KB

Transparent ROP Exploit Mitigation Using Indirect Branch Tracing - Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis.eng.text

22.6 KB

Transparent ROP Exploit Mitigation Using Indirect Branch Tracing - Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis.eng.tsv

27.2 KB

Transparent ROP Exploit Mitigation Using Indirect Branch Tracing - Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis.eng.txt

30.9 KB

Transparent ROP Exploit Mitigation Using Indirect Branch Tracing - Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis.eng.vtt

29.1 KB

WHYPER Towards Automating Risk Assessment of Mobile Applications - Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, Tao Xie.eng.json

1.5 MB

WHYPER Towards Automating Risk Assessment of Mobile Applications - Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, Tao Xie.eng.lrc

42.4 KB

WHYPER Towards Automating Risk Assessment of Mobile Applications - Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, Tao Xie.eng.srt

36.7 KB

WHYPER Towards Automating Risk Assessment of Mobile Applications - Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, Tao Xie.eng.text

26.9 KB

WHYPER Towards Automating Risk Assessment of Mobile Applications - Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, Tao Xie.eng.tsv

35.9 KB

WHYPER Towards Automating Risk Assessment of Mobile Applications - Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, Tao Xie.eng.txt

43.0 KB

WHYPER Towards Automating Risk Assessment of Mobile Applications - Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, Tao Xie.eng.vtt

33.8 KB

Windows 8 Security - Supporting User Confidence - Crispin Cowan.eng.srt

60.0 KB

You Are How You Click Clickstream Analysis for Sybil Detection - Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng, Ben Y. Zhao.eng.json

1.2 MB

You Are How You Click Clickstream Analysis for Sybil Detection - Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng, Ben Y. Zhao.eng.lrc

29.8 KB

You Are How You Click Clickstream Analysis for Sybil Detection - Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng, Ben Y. Zhao.eng.srt

33.1 KB

You Are How You Click Clickstream Analysis for Sybil Detection - Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng, Ben Y. Zhao.eng.text

23.0 KB

You Are How You Click Clickstream Analysis for Sybil Detection - Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng, Ben Y. Zhao.eng.tsv

26.9 KB

You Are How You Click Clickstream Analysis for Sybil Detection - Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng, Ben Y. Zhao.eng.txt

30.1 KB

You Are How You Click Clickstream Analysis for Sybil Detection - Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng, Ben Y. Zhao.eng.vtt

30.3 KB

ZMap Fast Internet-wide Scanning and Its Security Applications - durumeric.eng.json

1.5 MB

ZMap Fast Internet-wide Scanning and Its Security Applications - durumeric.eng.lrc

38.6 KB

ZMap Fast Internet-wide Scanning and Its Security Applications - durumeric.eng.srt

42.5 KB

ZMap Fast Internet-wide Scanning and Its Security Applications - durumeric.eng.text

29.5 KB

ZMap Fast Internet-wide Scanning and Its Security Applications - durumeric.eng.tsv

34.7 KB

ZMap Fast Internet-wide Scanning and Its Security Applications - durumeric.eng.txt

39.0 KB

ZMap Fast Internet-wide Scanning and Its Security Applications - durumeric.eng.vtt

38.8 KB

ZQL A Compiler for Privacy-Preserving Data Processing - Cedric Fournet, Markulf Kohlweiss, George Danezis.eng.json

1.2 MB

ZQL A Compiler for Privacy-Preserving Data Processing - Cedric Fournet, Markulf Kohlweiss, George Danezis.eng.lrc

30.9 KB

ZQL A Compiler for Privacy-Preserving Data Processing - Cedric Fournet, Markulf Kohlweiss, George Danezis.eng.srt

30.7 KB

ZQL A Compiler for Privacy-Preserving Data Processing - Cedric Fournet, Markulf Kohlweiss, George Danezis.eng.text

23.8 KB

ZQL A Compiler for Privacy-Preserving Data Processing - Cedric Fournet, Markulf Kohlweiss, George Danezis.eng.tsv

27.8 KB

ZQL A Compiler for Privacy-Preserving Data Processing - Cedric Fournet, Markulf Kohlweiss, George Danezis.eng.txt

31.2 KB

ZQL A Compiler for Privacy-Preserving Data Processing - Cedric Fournet, Markulf Kohlweiss, George Danezis.eng.vtt

28.7 KB

/.../USENIX Security 2013 Presentations/

Alice in Warningland A Large-Scale Field Study of Browser Security Warning Effectiveness - Devdatta Akhawe, Adrienne Porter Felt.pdf

2.3 MB

Alice in Warningland A Large-Scale Field Study of Browser Security Warning Effectiveness Slides - Devdatta Akhawe, Adrienne Porter Felt.pdf

1.5 MB

An Empirical Study of Vulnerability Rewards Programs - Matthew Finifter, Devdatta Akhawe, David Wagner.pdf

2.2 MB

An Empirical Study of Vulnerability Rewards Programs Slides Slides - Matthew Finifter, Devdatta Akhawe, David Wagner.pdf

1.7 MB

Automatic Mediation of Privacy-Sensitive Resource Access in Smartphone Applications - Benjamin Livshits, Jaeyeon Jung.pdf

2.5 MB

CacheAudit A Tool for the Static Analysis of Cache Side Channels - Goran Doychev, Dominik Feld, Boris Kopf, Laurent Mauborgne, Jan Reineke.pdf

2.1 MB

Confessions of a Recovering Data Broker Responsible Innovation in the Age of Big Data, Big Brother, and the Coming Skynet Terminators Slides - Jim Adler.pdf

28.7 MB

Control Flow Integrity for COTS Binaries - Mingwei Zhang, R. Sekar.pdf

2.1 MB

Control Flow Integrity for COTS Binaries Slides - Mingwei Zhang, R. Sekar.pdf

548.5 KB

Dismantling Megamos Crypto Wirelessly Lockpicking a Vehicle Immobilizer Slides - Roel Verdult, Flavio D. Garcia, Baris Ege.pdf

11.6 MB

Dowsing for Overflows A Guided Fuzzer to Find Buffer Boundary Violations - Istvan Haller, Asia Slowinska, Matthias Neugschwandtner, Herbert Bos.pdf

2.5 MB

Dowsing for Overflows A Guided Fuzzer to Find Buffer Boundary Violations Slides - Istvan Haller, Asia Slowinska, Matthias Neugschwandtner, Herbert Bos.pdf

967.7 KB

DupLESS Server-Aided Encryption for Deduplicated Storage - Mihir Bellare, Sriram Keelveedhi, Thomas Ristenpart.pdf

2.1 MB

DupLESS Server-Aided Encryption for Deduplicated Storage Slides - Mihir Bellare, Sriram Keelveedhi, Thomas Ristenpart.pdf

1.5 MB

Effective Inter-Component Communication Mapping in Android An Essential Step Towards Holistic Security Analysis - Damien Octeau, Patrick McDaniel, Somesh Jha, Alexa.pdf

2.3 MB

Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers - Suman Jana, David Molnar, Alexander Moshchuk, Alan Dunn, Benjamin Livshits, .pdf

3.8 MB

Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers Slides - Suman Jana, David Molnar, Alexander Moshchuk, Alan Dunn, Benjamin Liv.pdf

3.3 MB

Eradicating DNS Rebinding with the Extended Same-origin Policy - Martin Johns, Sebastian Lekies, Ben Stock.pdf

2.1 MB

Eradicating DNS Rebinding with the Extended Same-origin Policy Slides - Martin Johns, Sebastian Lekies, Ben Stock.pdf

836.2 KB

ExecScent Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates - Terry Nelms, Roberto Perdisci, Mustaque Ahamad.pdf

2.3 MB

ExecScent Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates Slides - Terry Nelms, Roberto Perdisci, Mustaque Ahamad.pdf

2.2 MB

Explicating SDKs Uncovering Assumptions Underlying Secure Authentication and Authorization - Rui Wang, Yuchen Zhou, Shuo Chen, Shaz Qadeer, David Evans, Yuri Gurevi.pdf

2.4 MB

Explicating SDKs Uncovering Assumptions Underlying Secure Authentication and Authorization Slides - Rui Wang, Yuchen Zhou, Shuo Chen, Shaz Qadeer, David Evans, Yuri.pdf

2.3 MB

FIE on Firmware Finding Vulnerabilities in Embedded Systems Using Symbolic Execution - Drew Davidson, Benjamin Moench, Somesh Jha, Thomas Ristenpart.pdf

2.1 MB

FIE on Firmware Finding Vulnerabilities in Embedded Systems Using Symbolic Execution Slides - Drew Davidson, Benjamin Moench, Somesh Jha, Thomas Ristenpart.pdf

1.3 MB

Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies - Sven Bugiel, Stephan Heuser, Ahmad-Reza Sadeghi.pdf

2.3 MB

Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies Slides - Sven Bugiel, Stephan Heuser, Ahmad-Reza Sadeghi.pdf

5.9 MB

Greystar Fast and Accurate Detection of SMS Spam Numbers in Large Cellular Networks Using Gray Phone Space - Nan Jiang, Yu Jin, Ann Skudlark, Zhi-Li Zhang.pdf

5.9 MB

Impression Fraud in On-line Advertising via Pay-Per-View Networks - Kevin Springborn, Paul Barford.pdf

2.5 MB

Impression Fraud in On-line Advertising via Pay-Per-View Networks Slides - Kevin Springborn, Paul Barford.pdf

827.1 KB

Jekyll on iOS When Benign Apps Become Evil - Tielei Wang, Kangjie Lu, Long Lu, Simon Chung, Wenke Lee.pdf

2.7 MB

KI-Mon A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel Object - Hojoon Lee, HyunGon Moon, DaeHee Jang, Kihwan Kim, Jihoon Lee, Yunheung P.pdf

2.3 MB

Language-based Defenses Against Untrusted Browser Origins - Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Sergio Maffeisn.pdf

2.5 MB

Language-based Defenses Against Untrusted Browser Origins Slides - Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Sergio Maffeis.pdf

1.6 MB

Let Me Answer That for You Exploiting Broadcast Information in Cellular Networks - Nico Golde, Kévin Redon, and Jean-Pierre Seifert.pdf

3.1 MB

Let Me Answer That for You Exploiting Broadcast Information in Cellular Networks Slides - Nico Golde, Kévin Redon, and Jean-Pierre Seifert.pdf

6.7 MB

Measuring the Practical Impact of DNSSEC Deployment - Wilson Lian, Eric Rescorla, Hovav Shacham, Stefan Savage.pdf

2.3 MB

MetaSymploit Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis - Ruowen Wang, Peng Ning, Tao Xie, Quan Chen.pdf

2.1 MB

MetaSymploit Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis Slides - Ruowen Wang, Peng Ning, Tao Xie, Quan Chen.pdf

2.0 MB

Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring - Edward J. Schwartz, JongHyup Lee, Maverick Woo, Dav.pdf

2.2 MB

On the Security of Picture Gesture Authentication - Ziming Zhao, Gail-Joon Ahn, Jeong-Jin Seo, Hongxin Hu.pdf

4.6 MB

On the Security of Picture Gesture Authentication Slides - Ziming Zhao, Gail-Joon Ahn, Jeong-Jin Seo, Hongxin Hu.pdf

2.0 MB

On the Security of RC4 in TLS - Nadhem AlFardan, Royal Holloway, Daniel J. Bernstein, Kenneth G. Paterson, Bertram Poettering, Jacob C.N. Schuldt.pdf

2.2 MB

On the Security of RC4 in TLS Slides - Nadhem AlFardan, Royal Holloway, Daniel J. Bernstein, Kenneth G. Paterson, Bertram Poettering, Jacob C.N. Schuldt.pdf

3.3 MB

PCF A Portable Circuit Format for Scalable Two-Party Secure Computation - Ben Kreuter, Benjamin Mood, Abhi Shelat, Kevin Butler.pdf

2.1 MB

PCF A Portable Circuit Format for Scalable Two-Party Secure Computation Slides - Ben Kreuter, Benjamin Mood, Abhi Shelat, Kevin Butler.pdf

168.4 KB

Practical Comprehensive Bounds on Surreptitious Communication over DNS - Rao, Reiner Sailer, Douglas Lee Schales, Marc Ph. Stoecklin, Kurt Thomas, Wietse Venema.pdf

5.0 MB

Practical Comprehensive Bounds on Surreptitious Communication over DNS Slides - Rao, Reiner Sailer, Douglas Lee Schales, Marc Ph. Stoecklin, Kurt Thomas, Wietse Ven.pdf

1.9 MB

Proactively Accountable Anonymous Messaging in Verdict - Henry Corrigan-Gibbs, David Isaac Wolinsky, Bryan Ford.pdf

2.3 MB

Revolver An Automated Approach to the Detection of Evasive Web-based Malware - Alexandros Kapravelos, Yan Shoshitaishvili, Marco Cova, Christopher Kruegel, Giovanni.pdf

2.3 MB

Sancus Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base - Job Noorman, Pieter Agten, Wilfried Daniels, Raoul Strackx, A.pdf

2.1 MB

Sancus Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base Slides - Job Noorman, Pieter Agten, Wilfried Daniels, Raoul Str.pdf

607.0 KB

Secure Outsourced Garbled Circuit Evaluation for Mobile Devices - Henry Carter, Benjamin Mood, Patrick Traynor, Kevin Butler.pdf

2.5 MB

Secure Outsourced Garbled Circuit Evaluation for Mobile Devices Slides - Henry Carter, Benjamin Mood, Patrick Traynor, Kevin Butler.pdf

1.3 MB

Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation - Frank Imeson, Ariq Emtenan, Siddharth Garg, and Mah.pdf

4.1 MB

Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation Slides - Frank Imeson, Ariq Emtenan, Siddharth Garg.pdf

3.4 MB

Securing Embedded User Interfaces Android and Beyond - Franziska Roesner, Tadayoshi Kohno.pdf

2.7 MB

Securing Embedded User Interfaces Android and Beyond Slides - Franziska Roesner, Tadayoshi Kohnos.pdf

5.3 MB

Steal This Movie Automatically Bypassing DRM Protection in Streaming Media Services - Ruoyu Wang, Santa Barbara, Yan Shoshitaishvili, Christopher Kruegel, Giovanni .pdf

2.0 MB

Steal This Movie Automatically Bypassing DRM Protection in Streaming Media Services Slides - Ruoyu Wang, Santa Barbara, Yan Shoshitaishvili, Christopher Kruegel, Gi.pdf

2.2 MB

Strato A Retargetable Framework for Low-Level Inlined-Reference Monitors - Bin Zeng, Gang Tan, Ulfar Erlingsson.pdf

2.1 MB

Strato A Retargetable Framework for Low-Level Inlined-Reference Monitors Slides - Bin Zeng, Gang Tan, Ulfar Erlingsson.pdf

2.2 MB

Take This Personally Pollution Attacks on Personalized Services - Xinyu Xing, Wei Meng, Dan Doozan, Alex C. Snoeren, Nick Feamster, Wenke Lee.pdf

2.9 MB

The Velocity of Censorship High-Fidelity Detection of Microblog Post Deletions - Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall.pdf

2.3 MB

The Velocity of Censorship High-Fidelity Detection of Microblog Post Deletions Slides - Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall.pdf

3.6 MB

Towards Automatic Software Lineage Inference - Jiyong Jang, Maverick Woo, David Brumley.pdf

2.2 MB

Trafficking Fraudulent Accounts The Role of the Underground Market in Twitter Spam and Abuse - Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, Vern Paxson.pdf

2.2 MB

Trafficking Fraudulent Accounts The Role of the Underground Market in Twitter Spam and Abuse Slides - Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, Vern Paxson.pdf

2.9 MB

Transparent ROP Exploit Mitigation Using Indirect Branch Tracing - Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis.pdf

2.6 MB

WHYPER Towards Automating Risk Assessment of Mobile Applications - Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, Tao Xie.pdf

2.2 MB

You Are How You Click Clickstream Analysis for Sybil Detection - Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng, Ben Y. Zhao.pdf

2.3 MB

You Are How You Click Clickstream Analysis for Sybil Detection Slides - Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng, Ben Y. Zhao.pdf

6.2 MB

ZMap Fast Internet-wide Scanning and Its Security Applications - Zakir Durumeric, Eric Wustrow, J. Alex Halderman.pdf

571.6 KB

ZMap Fast Internet-wide Scanning and Its Security Applications Slides - Zakir Durumeric, Eric Wustrow, J. Alex Halderman.pdf

621.8 KB

ZQL A Compiler for Privacy-Preserving Data Processing - Cedric Fournet, Markulf Kohlweiss, George Danezis.pdf

2.1 MB

/.../USENIX Security 2013 USENIX_files/

acmqueue_150x48_3.png

4.5 KB

acmqueue_150x48_3_002.png

3.1 KB

admin_150x60.png

4.2 KB

admin_150x60_002.png

7.0 KB

akamai_150x62.png

4.7 KB

akamai_150x62_002.png

2.8 KB

all.js

3.2 KB

analytics.js

45.2 KB

arbor_networks_150x42.png

4.0 KB

arbor_networks_150x42_002.png

6.1 KB

cbgapi.loaded_0

144.0 KB

cbgapi.loaded_1

97.1 KB

cmu_cert_150x73.png

2.9 KB

cmu_cert_150x73_002.png

3.9 KB

computer_150x33_0.png

4.2 KB

computer_150x33_0_002.png

3.2 KB

cset13_banner_mini.png

11.7 KB

css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css

5.6 KB

css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css

1.5 KB

css_SKdvFJ9YoZ2Zlnl17QxUbae5QC-NQDrH8ynBbHJFAaM.css

9.2 KB

css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css

0.1 KB

css_XQfCg5kiuU6ACblHn3rDXdgaKZR8AxbhrQR4Gznu5qA.css

257.3 KB

dcj_150x27_3.png

3.2 KB

dcj_150x27_3_002.png

6.1 KB

dmtf_600x240.png

4.1 KB

dmtf_600x240_002.png

2.5 KB

evtwote13_banner_mini_0.png

11.7 KB

facebook_5.png

4.8 KB

facebook_5_002.png

8.6 KB

fastbutton.htm

1.8 KB

fastbutton_002.htm

1.7 KB

foci13_banner_mini.png

12.7 KB

fsm_150x86_2.png

12.4 KB

fsm_150x86_2_002.png

7.5 KB

google_150x50_3.png

8.7 KB

google_150x50_3_002.png

4.0 KB

healthtech13_banner_mini.png

13.9 KB

hotsec13_banner_mini.png

12.3 KB

hpcwire_150x55_0.png

3.8 KB

hpcwire_150x55_0_002.png

10.1 KB

ibm_research_150x60.png

4.1 KB

ibm_research_150x60_002.png

6.0 KB

ie.htm

30.2 KB

ieee_sp_150x36_4.png

8.6 KB

ieee_sp_150x36_4_002.png

4.5 KB

infosecnews_150x38.png

3.1 KB

infosecnews_150x38_002.png

4.9 KB

it_dev_150x39.png

9.5 KB

it_dev_150x39_002.png

3.1 KB

js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js

20.5 KB

js_5eZSC3tfzCwTta-_4qxrBau4YdctcIhVqovRK7sPRFo.js

107.7 KB

js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js

1.4 KB

js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js

120.3 KB

js_nPhKWi17GlWfUPto14Dqfk5lpAFMD2XUrRDYY3jnD2c.js

23.0 KB

js_sWOO4PbSe161nCKWEJProMMhdbu_pfXMDzdRrMGBIE0.js

47.6 KB

leet13_banner_mini.png

13.7 KB

linux_journal_150x72_2.png

6.6 KB

linux_journal_150x72_2_002.png

10.3 KB

linux_pro_150x60.png

2.9 KB

linux_pro_150x60_002.png

5.0 KB

lxer_150x60.png

3.7 KB

lxer_150x60_002.png

6.6 KB

microsoft_research_150x42_2.png

3.2 KB

microsoft_research_150x42_2_002.png

2.8 KB

nostarch_600x240_1.png

3.9 KB

nostarch_600x240_1_002.png

1.6 KB

nsf_90x80_0.png

9.8 KB

nsf_90x80_0_002.png

9.8 KB

oreilly_150x28_3.png

2.4 KB

oreilly_150x28_3_002.png

3.8 KB

plusone.js

49.0 KB

postmessageRelay.htm

0.7 KB

sec13_media.png

30.6 KB

security_orb_tagline_150x47.png

9.0 KB

security_orb_tagline_150x47_002.png

4.3 KB

serverfault_150x35_0.png

2.4 KB

serverfault_150x35_0_002.png

3.4 KB

userfriendly_150x60.png

3.0 KB

userfriendly_150x60_002.png

8.4 KB

virus_bulletin_150x60.png

5.2 KB

virus_bulletin_150x60_002.png

3.0 KB

widgets.js

98.5 KB

woot13_banner_mini.png

14.2 KB

/.../USENIX Security 2013 USENIX_files/postmessageRelay_data/

829555168-postmessagerelay.js

10.0 KB

cbgapi.loaded_0

54.9 KB

rpcshindig_random.js

13.0 KB

/USENIX Security 2014/

A Bayesian Approach to Privacy Enforcement in Smartphones - Omer Tripp, Julia Rubin.mp4

8.7 MB

A Large-Scale Analysis of the Security of Embedded Firmwares - Andrei Costin, Jonas Zaddach, Aurelien Francillon, and Davide Balzarotti.mp4

8.9 MB

A Large-Scale Empirical Analysis of Chinese Web Passwords - Zhigong Li, Weili Han, Wenyuan Xu.mp4

8.2 MB

A Look at Targeted Attacks Through the Lense of an NGO - Stevens Le Blond, Adina Uritesc, Cedric Gilbert, Zheng Leong Chua, Prateek Saxena, Engin Kirda.mp4

7.7 MB

Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens - Daniel Demmler, Thomas Schneider, Michael Zohner.mp4

9.9 MB

An Internet-Wide View of Internet-Wide Scanning - Zakir Durumeric, Michael Bailey, J. Alex Halderman.mp4

8.9 MB

ASM A Programmable Interface for Extending Android Security - Stephan Heuser, Adwait Nadkarni, William Enck, Ahmad-Reza Sadeghi.mp4

7.8 MB

Automatically Detecting Vulnerable Websites Before They Turn Malicious - Kyle Soska Nicolas Christin.mp4

8.8 MB

BareCloud Bare-metal Analysis-based Evasive Malware Detection - Dhilung Kirat, Giovanni Vigna, Christopher Kruegel.mp4

9.0 MB

Battling Human Trafficking with Big Data - Rolando R. Lopez.mp4

39.6 MB

Blanket Execution Dynamic Similarity Testing for Program Binaries and Components - Manuel Egele, Maverick Woo, Peter Chapman, David Brumley.mp4

11.8 MB

Brahmastra Driving Apps to Test the Security of Third-Party Components - Ravi Bhoraskar, Seungyeop Han, Jinseong Jeon, Tanzirul Azim, Shuo Chen, Jaeyeon Jung, Suman Nath, Rui Wang.mp4

8.7 MB

Burst ORAM Minimizing ORAM Response Times for Bursty Access Patterns - Jonathan Dautrich, University of California, Riverside - Emil Stefanov, Elaine Shi.mp4

10.0 MB

BYTEWEIGHT Learning to Recognize Functions in Binary Code - Tiffany Bao, Jonathan Burket, Maverick Woo, Rafael Turner, David Brumley.mp4

9.4 MB

Cardinal Pill Testing of System Virtual Machines - Hao Shi, Abdulla Alwabel, Jelena Mirkovic.mp4

8.7 MB

DSCRETE Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse - Brendan Saltaformaggio, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu.mp4

9.4 MB

Dynamic Hooks Hiding Control Flow Changes within Non-Control Data - Sebastian Vogl, Robert Gawlik, Behrad Garmany, Thomas Kittel, Jonas Pfoh, Claudia Eckert, Thorsten Holz.mp4

7.4 MB

Effective Attacks and Provable Defenses for Website Fingerprinting - Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, Ian Goldberg.mp4

8.9 MB

Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM - Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, Ulfar Erlingsson, Luis Lozano, Geoff Pike.mp4

8.6 MB

Exit from Hell Reducing the Impact of Amplification DDoS Attacks - Marc Kuhrer, Thomas Hupperich, Christian Rossow, Thorsten Holz.mp4

7.7 MB

Faster Private Set Intersection Based on OT Extension - Benny Pinkas, Thomas Schneider, Michael Zohner.mp4

9.7 MB

FLUSH-RELOAD A High Resolution, Low Noise, L3 Cache Side-Channel Attack - Yuval Yarom, Katrina Falkner.mp4

9.9 MB

From the Aether to the Ethernet-Attacking the Internet using Broadcast Digital Television - Yossef Oren, Angelos D. Keromytis.mp4

9.9 MB

Gyrophone Recognizing Speech from Gyroscope Signals - Yan Michalevsky, Dan Boneh, Gabi Nakibly.mp4

9.1 MB

How To Live In Paradise Pearls of Wisdom for New and Prospective Faculty - David Evans.mp4

15.5 MB

Hulk Eliciting Malicious Behavior in Browser Extensions - Alexandros Kapravelos, Chris Grier, Neha Chachra, Christopher Kruegel, Giovanni Vigna, Vern Paxson.mp4

9.1 MB

Information Security War Room - Sergey Bratus, Dartmouth College, Felix FX Lindner.mp4

32.1 MB

iSeeYou Disabling the MacBook Webcam Indicator LED - Matthew Brocker, Stephen Checkoway.mp4

10.2 MB

JIGSAW Protecting Resource Access by Inferring Programmer Expectations - Hayawardh Vijayakumar, Xinyang Ge, Mathias Payer, Trent Jaeger.mp4

12.0 MB

LibFTE A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes - Daniel Luchaup, Kevin P. Dyer, Somesh Jha, Thomas Ristenpart, Thomas Shrimpton.mp4

8.0 MB

Man vs. Machine Practical Adversarial Detection of Malicious Crowdsourcing Workers - Gang Wang, Tianyi Wang, Santa Barbara, Haitao Zheng, Ben Y. Zhao.mp4

10.0 MB

Mimesis Aegis A Mimicry Privacy Shield-A System’s Approach to Data Privacy on Public Cloud - Billy Lau, Simon Chung, Chengyu Song, Yeongjin Jang, Wenke Lee, Alexandra Boldyreva.mp4

8.5 MB

Never Been KIST Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport - Rob Jansen, John Geddes, Chris Wacek, Micah Sherr, Paul Syverson.mp4

9.1 MB

On the Effective Prevention of TLS Man-in-the-Middle Attacks in Web Applications - Nikolaos Karapanos, Srdjan Capkun.mp4

10.6 MB

On the Feasibility of Large-Scale Infections of iOS Devices - Tielei Wang, Yeongjin Jang, Yizheng Chen, Simon Chung, Billy Lau, Wenke Lee.mp4

9.0 MB

On the Practical Exploitability of Dual EC in TLS Implementations - Stephen Checkoway, Matthew Fredrikson, Ruben Niederhagen, Adam Everspaugh, Matthew Green, Tanja Lange, Thomas Ri.mp4

8.1 MB

Optimizing Seed Selection for Fuzzing - Alexandre Rebert, Sang Kil Cha, Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, David Brumley.mp4

9.1 MB

Oxymoron Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing - Michael Backes, Stefan Nurnberger.mp4

10.9 MB

Panel Discussion - Stuart Schechter.mp4

15.0 MB

Password Managers Attacks and Defenses - David Silver, Suman Jana, and Dan Boneh, Stanford University - Eric Chen, Collin Jackson.mp4

7.9 MB

Password Portfolios and the Finite-Effort User Sustainably Managing Large Numbers of Accounts - Dinei Florencio, Cormac Herley, Paul C. van Oorschot.mp4

9.6 MB

Peeking into Your App without Actually Seeing It UI State Inference and Novel Android Attacks - Qi Alfred Chen, Zhiyun Qian, Z. Morley Mao.mp4

11.1 MB

Precise Client-side Protection against DOM-based Cross-Site Scripting - Ben Stock, Sebastian Lekies, Tobias Mueller, Patrick Spiegel, and Martin Johns.mp4

9.0 MB

Preventing Cryptographic Key Leakage in Cloud Virtual Machines - Erman Pattuk, Murat Kantarcioglu, Zhiqiang Lin, Huseyin Ulusoy.mp4

9.4 MB

Privacy in Pharmacogenetics An End-to-End Case Study of Personalized Warfarin Dosing - Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon Lin, David Page, Thomas Ristenpart.mp4

8.5 MB

Privee An Architecture for Automatically Analyzing Web Privacy Policies -Sebastian Zimmeck, Steven M. Bellovin.mp4

9.2 MB

ret2dir Rethinking Kernel Isolation - Vasileios P. Kemerlis, Michalis Polychronakis, Angelos D. Keromytis.mp4

9.1 MB

Revisiting SSLTLS Implementations New Bleichenbacher Side Channels and Attacks - Christopher Meyer, Juraj Somorovsky, Eugen Weiss, Jorg Schwenk, Sebastian Schinzel, Erik Tews.mp4

8.3 MB

ROP is Still Dangerous Breaking Modern Defenses - Nicholas Carlini, David Wagner.mp4

6.8 MB

Scheduler-based Defenses against Cross-VM Side-channels - Venkatanathan Varadarajan, Thomas Ristenpart, Michael Swift.mp4

8.7 MB

SDDR Light-Weight, Secure Mobile Encounters - Matthew Lentz, Viktor Erdélyi, Paarijaat Aditya, Elaine Shi, Peter Druschel, Bobby Bhattacharjee.mp4

7.5 MB

Security Analysis of a Full-Body Scanner - Keaton Mowery, Eric Wustrow, Tom Wypych, Corey Singleton, Chris Comfort, Eric Rescorla, Stephen Checkoway, J. Alex Halderman, Hovav Shach.mp4

10.9 MB

Size Does Matter Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard - Enes Goktas, Elias Athanasopoulos, Michalis Polychronakis, Herbert Bos, Georgios Portokalidis.mp4

6.6 MB

SpanDex Secure Password Tracking for Android - Landon P. Cox , Peter Gilbert, Geoffrey Lawler, Valentin Pistol, Ali Razeen, Bi Wu, Sai Cheemalapati.mp4

9.5 MB

SSOScan Automated Testing of Web Applications for Single Sign-On Vulnerabilities - Yuchen Zhou, David Evans.mp4

9.5 MB

Static Detection of Second-Order Vulnerabilities in Web Applications - Johannes Dahse, Thorsten Holz.mp4

10.1 MB

Stitching the Gadgets On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection - Lucas Davi, Ahmad-Reza Sadeghi, Daniel Lehmann, Fabian Monrose.mp4

7.6 MB

Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture - Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza.mp4

8.6 MB

TapDance End-to-Middle Anticensorship without Flow Blocking - Eric Wustrow, Colleen M. Swanson, J. Alex Halderman.mp4

10.5 MB

Targeted Threat Index Characterizing and Quantifying Politically-Motivated Targeted Malware - Seth Hardy, Masashi Crete-Nishihata, Katharine Kleemola, Adam Senft, Byron Sonne, Greg.mp4

9.1 MB

Telepathwords Preventing Weak Passwords by Reading Users’ Minds - Saranga Komanduri, Richard Shay, Lorrie Faith Cranor, Cormac Herley Stuart Schechter.mp4

9.3 MB

The Emperor’s New Password Manager Security Analysis of Web-based Password Managers - Zhiwei Li, Warren He, Devdatta Akhawe, Dawn Song.mp4

9.2 MB

The Future of Crypto Getting from Here to Guarantees - Daniel J. Bernstein, Matt Blaze, Tanja Lange.mp4

60.8 MB

The Long Taile of Typosquatting Domain Names - Janos Szurdi, Balazs Kocso, Gabor Cseh, Jonathan Spring, Mark Felegyhazi, Chris Kanich.mp4

7.6 MB

Towards Detecting Anomalous User Behavior in Online Social Networks - Bimal Viswanath, M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna P. Gummadi, Max Planck, Balachander Kris.mp4

8.6 MB

Towards Reliable Storage of 56-bit Secrets in Human Memory - Joseph Bonneau, Stuart Schechter.mp4

10.0 MB

TRUESET Faster Verifiable et Computations - Ahmed E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Mahmoud F. Sayed, Elaine Shi, Nikos Triandopoulos.mp4

8.2 MB

Understanding the Dark Side of Domain Parking - Sumayah Alrwais, Kan Yuan, Eihal Alowaisheq, Zhou Li, XiaoFeng Wang.mp4

8.1 MB

USENIX 2014 Security report.pdf

611.6 KB

USENIX Security 2014 Full Proceedings errata_slip.pdf

63.0 KB

USENIX Security 2014 Full Proceedings Interrior.pdf

41.1 MB

USENIX Security 2014 Full Proceedings.epub

21.0 MB

USENIX Security 2014 Full Proceedings.mobi

23.3 MB

USENIX Security 2014 Full Proceedings.pdf

41.9 MB

USENIX SECURITY 2014 Keynote - Phone Phreaks What We Can Learn From the First Network Hackers - Phil Lapsely.mp4

27.1 MB

USENIX Security 2014 Lightning Talks.mp4

21.6 MB

USENIX Security 2014 Opening Remarks - sec14_slides_fu.pdf

10.8 MB

USENIX Security 2014 Opening Remarks and Awards - Kevin Fu.mp4

9.9 MB

USENIX Security 2014 Technical Sessions.htm

494.7 KB

USENIX Security 2014 USENIX.htm

84.6 KB

When Governments Hack Opponents A Look at Actors and Technology - William R. Marczak, John Scott-Railton, Morgan Marquis-Boire, Vern Paxson.mp4

9.2 MB

X-Force Force-Executing Binary Programs for Security Applications - Fei Peng, Zhui Deng, Xiangyu Zhang, Dongyan Xu, Zhiqiang Lin, Zhendong Su.mp4

9.5 MB

XRay Enhancing the Web’s Transparency with Differential Correlation - Mathias Lecuyer, Guillaume Ducoffe, Francis Lan, Andrei Papancea, Theofilos Petsios, Riley Spahn, Augustin Cha.mp4

10.5 MB

Z0 An Optimizing Distributing Zero-Knowledge Compiler - Matthew Fredrikson, Benjamin Livshits.mp4

9.1 MB

/.../USENIX Security 2014 captions/

A Bayesian Approach to Privacy Enforcement in Smartphones - Omer Tripp, Julia Rubin.eng.json

1.0 MB

A Bayesian Approach to Privacy Enforcement in Smartphones - Omer Tripp, Julia Rubin.eng.lrc

26.8 KB

A Bayesian Approach to Privacy Enforcement in Smartphones - Omer Tripp, Julia Rubin.eng.srt

26.1 KB

A Bayesian Approach to Privacy Enforcement in Smartphones - Omer Tripp, Julia Rubin.eng.text

20.7 KB

A Bayesian Approach to Privacy Enforcement in Smartphones - Omer Tripp, Julia Rubin.eng.tsv

24.1 KB

A Bayesian Approach to Privacy Enforcement in Smartphones - Omer Tripp, Julia Rubin.eng.txt

27.1 KB

A Bayesian Approach to Privacy Enforcement in Smartphones - Omer Tripp, Julia Rubin.eng.vtt

24.6 KB

A Large-Scale Analysis of the Security of Embedded Firmwares - Andrei Costin, Jonas Zaddach, Aurelien Francillon, and Davide Balzarotti.eng.json

837.4 KB

A Large-Scale Analysis of the Security of Embedded Firmwares - Andrei Costin, Jonas Zaddach, Aurelien Francillon, and Davide Balzarotti.eng.lrc

22.6 KB

A Large-Scale Analysis of the Security of Embedded Firmwares - Andrei Costin, Jonas Zaddach, Aurelien Francillon, and Davide Balzarotti.eng.srt

21.9 KB

A Large-Scale Analysis of the Security of Embedded Firmwares - Andrei Costin, Jonas Zaddach, Aurelien Francillon, and Davide Balzarotti.eng.text

17.6 KB

A Large-Scale Analysis of the Security of Embedded Firmwares - Andrei Costin, Jonas Zaddach, Aurelien Francillon, and Davide Balzarotti.eng.tsv

20.4 KB

A Large-Scale Analysis of the Security of Embedded Firmwares - Andrei Costin, Jonas Zaddach, Aurelien Francillon, and Davide Balzarotti.eng.txt

22.8 KB

A Large-Scale Analysis of the Security of Embedded Firmwares - Andrei Costin, Jonas Zaddach, Aurelien Francillon, and Davide Balzarotti.eng.vtt

20.7 KB

A Large-Scale Empirical Analysis of Chinese Web Passwords - Zhigong Li, Weili Han, Wenyuan Xu.eng.json

672.9 KB

A Large-Scale Empirical Analysis of Chinese Web Passwords - Zhigong Li, Weili Han, Wenyuan Xu.eng.lrc

17.7 KB

A Large-Scale Empirical Analysis of Chinese Web Passwords - Zhigong Li, Weili Han, Wenyuan Xu.eng.srt

19.6 KB

A Large-Scale Empirical Analysis of Chinese Web Passwords - Zhigong Li, Weili Han, Wenyuan Xu.eng.text

12.9 KB

A Large-Scale Empirical Analysis of Chinese Web Passwords - Zhigong Li, Weili Han, Wenyuan Xu.eng.tsv

15.6 KB

A Large-Scale Empirical Analysis of Chinese Web Passwords - Zhigong Li, Weili Han, Wenyuan Xu.eng.txt

17.9 KB

A Large-Scale Empirical Analysis of Chinese Web Passwords - Zhigong Li, Weili Han, Wenyuan Xu.eng.vtt

17.7 KB

A Look at Targeted Attacks Through the Lense of an NGO - Stevens Le Blond, Adina Uritesc, Cedric Gilbert, Zheng Leong Chua, Prateek Saxena, Engin Kirda.eng.json

663.3 KB

A Look at Targeted Attacks Through the Lense of an NGO - Stevens Le Blond, Adina Uritesc, Cedric Gilbert, Zheng Leong Chua, Prateek Saxena, Engin Kirda.eng.lrc

16.9 KB

A Look at Targeted Attacks Through the Lense of an NGO - Stevens Le Blond, Adina Uritesc, Cedric Gilbert, Zheng Leong Chua, Prateek Saxena, Engin Kirda.eng.srt

17.5 KB

A Look at Targeted Attacks Through the Lense of an NGO - Stevens Le Blond, Adina Uritesc, Cedric Gilbert, Zheng Leong Chua, Prateek Saxena, Engin Kirda.eng.text

13.0 KB

A Look at Targeted Attacks Through the Lense of an NGO - Stevens Le Blond, Adina Uritesc, Cedric Gilbert, Zheng Leong Chua, Prateek Saxena, Engin Kirda.eng.tsv

15.1 KB

A Look at Targeted Attacks Through the Lense of an NGO - Stevens Le Blond, Adina Uritesc, Cedric Gilbert, Zheng Leong Chua, Prateek Saxena, Engin Kirda.eng.txt

17.1 KB

A Look at Targeted Attacks Through the Lense of an NGO - Stevens Le Blond, Adina Uritesc, Cedric Gilbert, Zheng Leong Chua, Prateek Saxena, Engin Kirda.eng.vtt

16.3 KB

Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens - Daniel Demmler, Thomas Schneider, Michael Zohner.eng.json

1.2 MB

Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens - Daniel Demmler, Thomas Schneider, Michael Zohner.eng.lrc

32.2 KB

Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens - Daniel Demmler, Thomas Schneider, Michael Zohner.eng.srt

31.2 KB

Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens - Daniel Demmler, Thomas Schneider, Michael Zohner.eng.text

20.5 KB

Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens - Daniel Demmler, Thomas Schneider, Michael Zohner.eng.tsv

27.1 KB

Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens - Daniel Demmler, Thomas Schneider, Michael Zohner.eng.txt

32.7 KB

Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens - Daniel Demmler, Thomas Schneider, Michael Zohner.eng.vtt

28.2 KB

An Internet-Wide View of Internet-Wide Scanning - Zakir Durumeric, Michael Bailey, J. Alex Halderman.eng.json

1.4 MB

An Internet-Wide View of Internet-Wide Scanning - Zakir Durumeric, Michael Bailey, J. Alex Halderman.eng.lrc

41.6 KB

An Internet-Wide View of Internet-Wide Scanning - Zakir Durumeric, Michael Bailey, J. Alex Halderman.eng.srt

33.5 KB

An Internet-Wide View of Internet-Wide Scanning - Zakir Durumeric, Michael Bailey, J. Alex Halderman.eng.text

23.7 KB

An Internet-Wide View of Internet-Wide Scanning - Zakir Durumeric, Michael Bailey, J. Alex Halderman.eng.tsv

33.8 KB

An Internet-Wide View of Internet-Wide Scanning - Zakir Durumeric, Michael Bailey, J. Alex Halderman.eng.txt

42.3 KB

An Internet-Wide View of Internet-Wide Scanning - Zakir Durumeric, Michael Bailey, J. Alex Halderman.eng.vtt

30.6 KB

ASM A Programmable Interface for Extending Android Security - Stephan Heuser, Adwait Nadkarni, William Enck, Ahmad-Reza Sadeghi.eng.json

837.7 KB

ASM A Programmable Interface for Extending Android Security - Stephan Heuser, Adwait Nadkarni, William Enck, Ahmad-Reza Sadeghi.eng.lrc

25.5 KB

ASM A Programmable Interface for Extending Android Security - Stephan Heuser, Adwait Nadkarni, William Enck, Ahmad-Reza Sadeghi.eng.srt

20.5 KB

ASM A Programmable Interface for Extending Android Security - Stephan Heuser, Adwait Nadkarni, William Enck, Ahmad-Reza Sadeghi.eng.text

16.2 KB

ASM A Programmable Interface for Extending Android Security - Stephan Heuser, Adwait Nadkarni, William Enck, Ahmad-Reza Sadeghi.eng.tsv

21.2 KB

ASM A Programmable Interface for Extending Android Security - Stephan Heuser, Adwait Nadkarni, William Enck, Ahmad-Reza Sadeghi.eng.txt

25.9 KB

ASM A Programmable Interface for Extending Android Security - Stephan Heuser, Adwait Nadkarni, William Enck, Ahmad-Reza Sadeghi.eng.vtt

19.3 KB

Automatically Detecting Vulnerable Websites Before They Turn Malicious - Kyle Soska Nicolas Christin.eng.json

992.2 KB

Automatically Detecting Vulnerable Websites Before They Turn Malicious - Kyle Soska Nicolas Christin.eng.lrc

28.8 KB

Automatically Detecting Vulnerable Websites Before They Turn Malicious - Kyle Soska Nicolas Christin.eng.srt

25.6 KB

Automatically Detecting Vulnerable Websites Before They Turn Malicious - Kyle Soska Nicolas Christin.eng.text

18.0 KB

Automatically Detecting Vulnerable Websites Before They Turn Malicious - Kyle Soska Nicolas Christin.eng.tsv

23.8 KB

Automatically Detecting Vulnerable Websites Before They Turn Malicious - Kyle Soska Nicolas Christin.eng.txt

29.2 KB

Automatically Detecting Vulnerable Websites Before They Turn Malicious - Kyle Soska Nicolas Christin.eng.vtt

23.4 KB

BareCloud Bare-metal Analysis-based Evasive Malware Detection - Dhilung Kirat, Giovanni Vigna, Christopher Kruegel.eng.json

1.0 MB

BareCloud Bare-metal Analysis-based Evasive Malware Detection - Dhilung Kirat, Giovanni Vigna, Christopher Kruegel.eng.lrc

29.9 KB

BareCloud Bare-metal Analysis-based Evasive Malware Detection - Dhilung Kirat, Giovanni Vigna, Christopher Kruegel.eng.srt

24.9 KB

BareCloud Bare-metal Analysis-based Evasive Malware Detection - Dhilung Kirat, Giovanni Vigna, Christopher Kruegel.eng.text

18.5 KB

BareCloud Bare-metal Analysis-based Evasive Malware Detection - Dhilung Kirat, Giovanni Vigna, Christopher Kruegel.eng.tsv

24.9 KB

BareCloud Bare-metal Analysis-based Evasive Malware Detection - Dhilung Kirat, Giovanni Vigna, Christopher Kruegel.eng.txt

30.4 KB

BareCloud Bare-metal Analysis-based Evasive Malware Detection - Dhilung Kirat, Giovanni Vigna, Christopher Kruegel.eng.vtt

23.0 KB

Battling Human Trafficking with Big Data - Rolando R. Lopez.eng.json

5.1 MB

Battling Human Trafficking with Big Data - Rolando R. Lopez.eng.lrc

142.3 KB

Battling Human Trafficking with Big Data - Rolando R. Lopez.eng.srt

127.7 KB

Battling Human Trafficking with Big Data - Rolando R. Lopez.eng.text

88.1 KB

Battling Human Trafficking with Big Data - Rolando R. Lopez.eng.tsv

117.9 KB

Battling Human Trafficking with Big Data - Rolando R. Lopez.eng.txt

144.2 KB

Battling Human Trafficking with Big Data - Rolando R. Lopez.eng.vtt

117.9 KB

Blanket Execution Dynamic Similarity Testing for Program Binaries and Components - Manuel Egele, Maverick Woo, Peter Chapman, David Brumley.eng.json

1.3 MB

Blanket Execution Dynamic Similarity Testing for Program Binaries and Components - Manuel Egele, Maverick Woo, Peter Chapman, David Brumley.eng.lrc

34.1 KB

Blanket Execution Dynamic Similarity Testing for Program Binaries and Components - Manuel Egele, Maverick Woo, Peter Chapman, David Brumley.eng.srt

33.1 KB

Blanket Execution Dynamic Similarity Testing for Program Binaries and Components - Manuel Egele, Maverick Woo, Peter Chapman, David Brumley.eng.text

26.3 KB

Blanket Execution Dynamic Similarity Testing for Program Binaries and Components - Manuel Egele, Maverick Woo, Peter Chapman, David Brumley.eng.tsv

30.7 KB

Blanket Execution Dynamic Similarity Testing for Program Binaries and Components - Manuel Egele, Maverick Woo, Peter Chapman, David Brumley.eng.txt

34.4 KB

Blanket Execution Dynamic Similarity Testing for Program Binaries and Components - Manuel Egele, Maverick Woo, Peter Chapman, David Brumley.eng.vtt

31.2 KB

Brahmastra Driving Apps to Test the Security of Third-Party Components - Ravi Bhoraskar, Seungyeop Han, Jinseong Jeon, Tanzirul Azim, Shuo Chen, Jaeyeon Jung, Suman Nath, Rui Wang.eng.json

913.7 KB

Brahmastra Driving Apps to Test the Security of Third-Party Components - Ravi Bhoraskar, Seungyeop Han, Jinseong Jeon, Tanzirul Azim, Shuo Chen, Jaeyeon Jung, Suman Nath, Rui Wang.eng.lrc

25.4 KB

Brahmastra Driving Apps to Test the Security of Third-Party Components - Ravi Bhoraskar, Seungyeop Han, Jinseong Jeon, Tanzirul Azim, Shuo Chen, Jaeyeon Jung, Suman Nath, Rui Wang.eng.srt

21.1 KB

Brahmastra Driving Apps to Test the Security of Third-Party Components - Ravi Bhoraskar, Seungyeop Han, Jinseong Jeon, Tanzirul Azim, Shuo Chen, Jaeyeon Jung, Suman Nath, Rui Wang.eng.text

15.3 KB

Brahmastra Driving Apps to Test the Security of Third-Party Components - Ravi Bhoraskar, Seungyeop Han, Jinseong Jeon, Tanzirul Azim, Shuo Chen, Jaeyeon Jung, Suman Nath, Rui Wang.eng.tsv

20.9 KB

Brahmastra Driving Apps to Test the Security of Third-Party Components - Ravi Bhoraskar, Seungyeop Han, Jinseong Jeon, Tanzirul Azim, Shuo Chen, Jaeyeon Jung, Suman Nath, Rui Wang.eng.txt

25.7 KB

Brahmastra Driving Apps to Test the Security of Third-Party Components - Ravi Bhoraskar, Seungyeop Han, Jinseong Jeon, Tanzirul Azim, Shuo Chen, Jaeyeon Jung, Suman Nath, Rui Wang.eng.vtt

19.4 KB

Burst ORAM Minimizing ORAM Response Times for Bursty Access Patterns - Jonathan Dautrich, University of California, Riverside - Emil Stefanov, Elaine Shi.eng.json

1.1 MB

Burst ORAM Minimizing ORAM Response Times for Bursty Access Patterns - Jonathan Dautrich, University of California, Riverside - Emil Stefanov, Elaine Shi.eng.lrc

30.4 KB

Burst ORAM Minimizing ORAM Response Times for Bursty Access Patterns - Jonathan Dautrich, University of California, Riverside - Emil Stefanov, Elaine Shi.eng.srt

26.9 KB

Burst ORAM Minimizing ORAM Response Times for Bursty Access Patterns - Jonathan Dautrich, University of California, Riverside - Emil Stefanov, Elaine Shi.eng.text

20.4 KB

Burst ORAM Minimizing ORAM Response Times for Bursty Access Patterns - Jonathan Dautrich, University of California, Riverside - Emil Stefanov, Elaine Shi.eng.tsv

26.0 KB

Burst ORAM Minimizing ORAM Response Times for Bursty Access Patterns - Jonathan Dautrich, University of California, Riverside - Emil Stefanov, Elaine Shi.eng.txt

30.8 KB

Burst ORAM Minimizing ORAM Response Times for Bursty Access Patterns - Jonathan Dautrich, University of California, Riverside - Emil Stefanov, Elaine Shi.eng.vtt

25.1 KB

BYTEWEIGHT Learning to Recognize Functions in Binary Code - Tiffany Bao, Jonathan Burket, Maverick Woo, Rafael Turner, David Brumley.eng.json

856.3 KB

BYTEWEIGHT Learning to Recognize Functions in Binary Code - Tiffany Bao, Jonathan Burket, Maverick Woo, Rafael Turner, David Brumley.eng.lrc

25.1 KB

BYTEWEIGHT Learning to Recognize Functions in Binary Code - Tiffany Bao, Jonathan Burket, Maverick Woo, Rafael Turner, David Brumley.eng.srt

22.3 KB

BYTEWEIGHT Learning to Recognize Functions in Binary Code - Tiffany Bao, Jonathan Burket, Maverick Woo, Rafael Turner, David Brumley.eng.text

15.3 KB

BYTEWEIGHT Learning to Recognize Functions in Binary Code - Tiffany Bao, Jonathan Burket, Maverick Woo, Rafael Turner, David Brumley.eng.tsv

20.7 KB

BYTEWEIGHT Learning to Recognize Functions in Binary Code - Tiffany Bao, Jonathan Burket, Maverick Woo, Rafael Turner, David Brumley.eng.txt

25.5 KB

BYTEWEIGHT Learning to Recognize Functions in Binary Code - Tiffany Bao, Jonathan Burket, Maverick Woo, Rafael Turner, David Brumley.eng.vtt

20.3 KB

Cardinal Pill Testing of System Virtual Machines - Hao Shi, Abdulla Alwabel, Jelena Mirkovic.eng.json

707.7 KB

Cardinal Pill Testing of System Virtual Machines - Hao Shi, Abdulla Alwabel, Jelena Mirkovic.eng.lrc

19.5 KB

Cardinal Pill Testing of System Virtual Machines - Hao Shi, Abdulla Alwabel, Jelena Mirkovic.eng.srt

19.5 KB

Cardinal Pill Testing of System Virtual Machines - Hao Shi, Abdulla Alwabel, Jelena Mirkovic.eng.text

13.3 KB

Cardinal Pill Testing of System Virtual Machines - Hao Shi, Abdulla Alwabel, Jelena Mirkovic.eng.tsv

16.7 KB

Cardinal Pill Testing of System Virtual Machines - Hao Shi, Abdulla Alwabel, Jelena Mirkovic.eng.txt

19.8 KB

Cardinal Pill Testing of System Virtual Machines - Hao Shi, Abdulla Alwabel, Jelena Mirkovic.eng.vtt

17.8 KB

DSCRETE Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse - Brendan Saltaformaggio, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu.eng.json

843.1 KB

DSCRETE Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse - Brendan Saltaformaggio, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu.eng.lrc

22.4 KB

DSCRETE Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse - Brendan Saltaformaggio, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu.eng.srt

23.2 KB

DSCRETE Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse - Brendan Saltaformaggio, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu.eng.text

17.2 KB

DSCRETE Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse - Brendan Saltaformaggio, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu.eng.tsv

20.1 KB

DSCRETE Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse - Brendan Saltaformaggio, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu.eng.txt

22.6 KB

DSCRETE Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse - Brendan Saltaformaggio, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu.eng.vtt

21.5 KB

Dynamic Hooks Hiding Control Flow Changes within Non-Control Data - Sebastian Vogl, Robert Gawlik, Behrad Garmany, Thomas Kittel, Jonas Pfoh, Claudia Eckert, Thorsten Holz.eng.json

938.6 KB

Dynamic Hooks Hiding Control Flow Changes within Non-Control Data - Sebastian Vogl, Robert Gawlik, Behrad Garmany, Thomas Kittel, Jonas Pfoh, Claudia Eckert, Thorsten Holz.eng.lrc

25.7 KB

Dynamic Hooks Hiding Control Flow Changes within Non-Control Data - Sebastian Vogl, Robert Gawlik, Behrad Garmany, Thomas Kittel, Jonas Pfoh, Claudia Eckert, Thorsten Holz.eng.srt

23.7 KB

Dynamic Hooks Hiding Control Flow Changes within Non-Control Data - Sebastian Vogl, Robert Gawlik, Behrad Garmany, Thomas Kittel, Jonas Pfoh, Claudia Eckert, Thorsten Holz.eng.text

18.4 KB

Dynamic Hooks Hiding Control Flow Changes within Non-Control Data - Sebastian Vogl, Robert Gawlik, Behrad Garmany, Thomas Kittel, Jonas Pfoh, Claudia Eckert, Thorsten Holz.eng.tsv

22.4 KB

Dynamic Hooks Hiding Control Flow Changes within Non-Control Data - Sebastian Vogl, Robert Gawlik, Behrad Garmany, Thomas Kittel, Jonas Pfoh, Claudia Eckert, Thorsten Holz.eng.txt

26.0 KB

Dynamic Hooks Hiding Control Flow Changes within Non-Control Data - Sebastian Vogl, Robert Gawlik, Behrad Garmany, Thomas Kittel, Jonas Pfoh, Claudia Eckert, Thorsten Holz.eng.vtt

22.2 KB

Effective Attacks and Provable Defenses for Website Fingerprinting - Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, Ian Goldberg.eng.json

1.1 MB

Effective Attacks and Provable Defenses for Website Fingerprinting - Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, Ian Goldberg.eng.lrc

30.3 KB

Effective Attacks and Provable Defenses for Website Fingerprinting - Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, Ian Goldberg.eng.srt

29.3 KB

Effective Attacks and Provable Defenses for Website Fingerprinting - Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, Ian Goldberg.eng.text

21.3 KB

Effective Attacks and Provable Defenses for Website Fingerprinting - Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, Ian Goldberg.eng.tsv

26.2 KB

Effective Attacks and Provable Defenses for Website Fingerprinting - Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, Ian Goldberg.eng.txt

30.7 KB

Effective Attacks and Provable Defenses for Website Fingerprinting - Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, Ian Goldberg.eng.vtt

27.1 KB

Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM - Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, Ulfar Erlingsson, Luis Lozano, Geoff Pike.eng.json

1.1 MB

Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM - Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, Ulfar Erlingsson, Luis Lozano, Geoff Pike.eng.lrc

28.6 KB

Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM - Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, Ulfar Erlingsson, Luis Lozano, Geoff Pike.eng.srt

28.4 KB

Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM - Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, Ulfar Erlingsson, Luis Lozano, Geoff Pike.eng.text

22.0 KB

Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM - Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, Ulfar Erlingsson, Luis Lozano, Geoff Pike.eng.tsv

25.6 KB

Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM - Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, Ulfar Erlingsson, Luis Lozano, Geoff Pike.eng.txt

28.8 KB

Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM - Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, Ulfar Erlingsson, Luis Lozano, Geoff Pike.eng.vtt

26.6 KB

Exit from Hell Reducing the Impact of Amplification DDoS Attacks - Marc Kuhrer, Thomas Hupperich, Christian Rossow, Thorsten Holz.eng.json

953.9 KB

Exit from Hell Reducing the Impact of Amplification DDoS Attacks - Marc Kuhrer, Thomas Hupperich, Christian Rossow, Thorsten Holz.eng.lrc

25.3 KB

Exit from Hell Reducing the Impact of Amplification DDoS Attacks - Marc Kuhrer, Thomas Hupperich, Christian Rossow, Thorsten Holz.eng.srt

23.6 KB

Exit from Hell Reducing the Impact of Amplification DDoS Attacks - Marc Kuhrer, Thomas Hupperich, Christian Rossow, Thorsten Holz.eng.text

18.3 KB

Exit from Hell Reducing the Impact of Amplification DDoS Attacks - Marc Kuhrer, Thomas Hupperich, Christian Rossow, Thorsten Holz.eng.tsv

22.1 KB

Exit from Hell Reducing the Impact of Amplification DDoS Attacks - Marc Kuhrer, Thomas Hupperich, Christian Rossow, Thorsten Holz.eng.txt

25.5 KB

Exit from Hell Reducing the Impact of Amplification DDoS Attacks - Marc Kuhrer, Thomas Hupperich, Christian Rossow, Thorsten Holz.eng.vtt

22.2 KB

Faster Private Set Intersection Based on OT Extension - Benny Pinkas, Thomas Schneider, Michael Zohner.eng.json

941.9 KB

Faster Private Set Intersection Based on OT Extension - Benny Pinkas, Thomas Schneider, Michael Zohner.eng.lrc

24.6 KB

Faster Private Set Intersection Based on OT Extension - Benny Pinkas, Thomas Schneider, Michael Zohner.eng.srt

23.5 KB

Faster Private Set Intersection Based on OT Extension - Benny Pinkas, Thomas Schneider, Michael Zohner.eng.text

18.0 KB

Faster Private Set Intersection Based on OT Extension - Benny Pinkas, Thomas Schneider, Michael Zohner.eng.tsv

21.6 KB

Faster Private Set Intersection Based on OT Extension - Benny Pinkas, Thomas Schneider, Michael Zohner.eng.txt

24.8 KB

Faster Private Set Intersection Based on OT Extension - Benny Pinkas, Thomas Schneider, Michael Zohner.eng.vtt

22.0 KB

FLUSH-RELOAD A High Resolution, Low Noise, L3 Cache Side-Channel Attack - Yuval Yarom, Katrina Falkner.eng.json

945.1 KB

FLUSH-RELOAD A High Resolution, Low Noise, L3 Cache Side-Channel Attack - Yuval Yarom, Katrina Falkner.eng.lrc

24.3 KB

FLUSH-RELOAD A High Resolution, Low Noise, L3 Cache Side-Channel Attack - Yuval Yarom, Katrina Falkner.eng.srt

26.3 KB

FLUSH-RELOAD A High Resolution, Low Noise, L3 Cache Side-Channel Attack - Yuval Yarom, Katrina Falkner.eng.text

16.6 KB

FLUSH-RELOAD A High Resolution, Low Noise, L3 Cache Side-Channel Attack - Yuval Yarom, Katrina Falkner.eng.tsv

20.8 KB

FLUSH-RELOAD A High Resolution, Low Noise, L3 Cache Side-Channel Attack - Yuval Yarom, Katrina Falkner.eng.txt

24.6 KB

FLUSH-RELOAD A High Resolution, Low Noise, L3 Cache Side-Channel Attack - Yuval Yarom, Katrina Falkner.eng.vtt

23.6 KB

From the Aether to the Ethernet-Attacking the Internet using Broadcast Digital Television - Yossef Oren, Angelos D. Keromytis.eng.json

1.2 MB

From the Aether to the Ethernet-Attacking the Internet using Broadcast Digital Television - Yossef Oren, Angelos D. Keromytis.eng.lrc

30.7 KB

From the Aether to the Ethernet-Attacking the Internet using Broadcast Digital Television - Yossef Oren, Angelos D. Keromytis.eng.srt

33.0 KB

From the Aether to the Ethernet-Attacking the Internet using Broadcast Digital Television - Yossef Oren, Angelos D. Keromytis.eng.text

20.6 KB

From the Aether to the Ethernet-Attacking the Internet using Broadcast Digital Television - Yossef Oren, Angelos D. Keromytis.eng.tsv

26.2 KB

From the Aether to the Ethernet-Attacking the Internet using Broadcast Digital Television - Yossef Oren, Angelos D. Keromytis.eng.txt

31.1 KB

From the Aether to the Ethernet-Attacking the Internet using Broadcast Digital Television - Yossef Oren, Angelos D. Keromytis.eng.vtt

29.5 KB

Gyrophone Recognizing Speech from Gyroscope Signals - Yan Michalevsky, Dan Boneh, Gabi Nakibly.eng.json

996.5 KB

Gyrophone Recognizing Speech from Gyroscope Signals - Yan Michalevsky, Dan Boneh, Gabi Nakibly.eng.lrc

30.2 KB

Gyrophone Recognizing Speech from Gyroscope Signals - Yan Michalevsky, Dan Boneh, Gabi Nakibly.eng.srt

25.4 KB

Gyrophone Recognizing Speech from Gyroscope Signals - Yan Michalevsky, Dan Boneh, Gabi Nakibly.eng.text

18.2 KB

Gyrophone Recognizing Speech from Gyroscope Signals - Yan Michalevsky, Dan Boneh, Gabi Nakibly.eng.tsv

24.9 KB

Gyrophone Recognizing Speech from Gyroscope Signals - Yan Michalevsky, Dan Boneh, Gabi Nakibly.eng.txt

30.6 KB

Gyrophone Recognizing Speech from Gyroscope Signals - Yan Michalevsky, Dan Boneh, Gabi Nakibly.eng.vtt

23.4 KB

How To Live In Paradise Pearls of Wisdom for New and Prospective Faculty - David Evans.eng.json

1.6 MB

How To Live In Paradise Pearls of Wisdom for New and Prospective Faculty - David Evans.eng.lrc

43.0 KB

How To Live In Paradise Pearls of Wisdom for New and Prospective Faculty - David Evans.eng.srt

41.1 KB

How To Live In Paradise Pearls of Wisdom for New and Prospective Faculty - David Evans.eng.text

30.3 KB

How To Live In Paradise Pearls of Wisdom for New and Prospective Faculty - David Evans.eng.tsv

37.6 KB

How To Live In Paradise Pearls of Wisdom for New and Prospective Faculty - David Evans.eng.txt

43.5 KB

How To Live In Paradise Pearls of Wisdom for New and Prospective Faculty - David Evans.eng.vtt

38.0 KB

Hulk Eliciting Malicious Behavior in Browser Extensions - Alexandros Kapravelos, Chris Grier, Neha Chachra, Christopher Kruegel, Giovanni Vigna, Vern Paxson.eng.json

951.0 KB

Hulk Eliciting Malicious Behavior in Browser Extensions - Alexandros Kapravelos, Chris Grier, Neha Chachra, Christopher Kruegel, Giovanni Vigna, Vern Paxson.eng.lrc

25.3 KB

Hulk Eliciting Malicious Behavior in Browser Extensions - Alexandros Kapravelos, Chris Grier, Neha Chachra, Christopher Kruegel, Giovanni Vigna, Vern Paxson.eng.srt

27.0 KB

Hulk Eliciting Malicious Behavior in Browser Extensions - Alexandros Kapravelos, Chris Grier, Neha Chachra, Christopher Kruegel, Giovanni Vigna, Vern Paxson.eng.text

18.5 KB

Hulk Eliciting Malicious Behavior in Browser Extensions - Alexandros Kapravelos, Chris Grier, Neha Chachra, Christopher Kruegel, Giovanni Vigna, Vern Paxson.eng.tsv

22.2 KB

Hulk Eliciting Malicious Behavior in Browser Extensions - Alexandros Kapravelos, Chris Grier, Neha Chachra, Christopher Kruegel, Giovanni Vigna, Vern Paxson.eng.txt

25.5 KB

Hulk Eliciting Malicious Behavior in Browser Extensions - Alexandros Kapravelos, Chris Grier, Neha Chachra, Christopher Kruegel, Giovanni Vigna, Vern Paxson.eng.vtt

24.6 KB

Information Security War Room - Sergey Bratus, Dartmouth College, Felix FX Lindner.eng.json

3.3 MB

Information Security War Room - Sergey Bratus, Dartmouth College, Felix FX Lindner.eng.lrc

96.5 KB

Information Security War Room - Sergey Bratus, Dartmouth College, Felix FX Lindner.eng.srt

81.8 KB

Information Security War Room - Sergey Bratus, Dartmouth College, Felix FX Lindner.eng.text

57.4 KB

Information Security War Room - Sergey Bratus, Dartmouth College, Felix FX Lindner.eng.tsv

79.7 KB

Information Security War Room - Sergey Bratus, Dartmouth College, Felix FX Lindner.eng.txt

97.9 KB

Information Security War Room - Sergey Bratus, Dartmouth College, Felix FX Lindner.eng.vtt

75.6 KB

iSeeYou Disabling the MacBook Webcam Indicator LED - Matthew Brocker, Stephen Checkoway.eng.json

1.1 MB

iSeeYou Disabling the MacBook Webcam Indicator LED - Matthew Brocker, Stephen Checkoway.eng.lrc

28.2 KB

iSeeYou Disabling the MacBook Webcam Indicator LED - Matthew Brocker, Stephen Checkoway.eng.srt

30.0 KB

iSeeYou Disabling the MacBook Webcam Indicator LED - Matthew Brocker, Stephen Checkoway.eng.text

21.0 KB

iSeeYou Disabling the MacBook Webcam Indicator LED - Matthew Brocker, Stephen Checkoway.eng.tsv

25.0 KB

iSeeYou Disabling the MacBook Webcam Indicator LED - Matthew Brocker, Stephen Checkoway.eng.txt

28.5 KB

iSeeYou Disabling the MacBook Webcam Indicator LED - Matthew Brocker, Stephen Checkoway.eng.vtt

27.5 KB

JIGSAW Protecting Resource Access by Inferring Programmer Expectations - Hayawardh Vijayakumar, Xinyang Ge, Mathias Payer, Trent Jaeger.eng.json

843.5 KB

JIGSAW Protecting Resource Access by Inferring Programmer Expectations - Hayawardh Vijayakumar, Xinyang Ge, Mathias Payer, Trent Jaeger.eng.lrc

22.0 KB

JIGSAW Protecting Resource Access by Inferring Programmer Expectations - Hayawardh Vijayakumar, Xinyang Ge, Mathias Payer, Trent Jaeger.eng.srt

23.3 KB

JIGSAW Protecting Resource Access by Inferring Programmer Expectations - Hayawardh Vijayakumar, Xinyang Ge, Mathias Payer, Trent Jaeger.eng.text

16.8 KB

JIGSAW Protecting Resource Access by Inferring Programmer Expectations - Hayawardh Vijayakumar, Xinyang Ge, Mathias Payer, Trent Jaeger.eng.tsv

19.7 KB

JIGSAW Protecting Resource Access by Inferring Programmer Expectations - Hayawardh Vijayakumar, Xinyang Ge, Mathias Payer, Trent Jaeger.eng.txt

22.2 KB

JIGSAW Protecting Resource Access by Inferring Programmer Expectations - Hayawardh Vijayakumar, Xinyang Ge, Mathias Payer, Trent Jaeger.eng.vtt

21.5 KB

LibFTE A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes - Daniel Luchaup, Kevin P. Dyer, Somesh Jha, Thomas Ristenpart, Thomas Shrimpton.eng.json

778.0 KB

LibFTE A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes - Daniel Luchaup, Kevin P. Dyer, Somesh Jha, Thomas Ristenpart, Thomas Shrimpton.eng.lrc

21.7 KB

LibFTE A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes - Daniel Luchaup, Kevin P. Dyer, Somesh Jha, Thomas Ristenpart, Thomas Shrimpton.eng.srt

21.4 KB

LibFTE A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes - Daniel Luchaup, Kevin P. Dyer, Somesh Jha, Thomas Ristenpart, Thomas Shrimpton.eng.text

15.9 KB

LibFTE A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes - Daniel Luchaup, Kevin P. Dyer, Somesh Jha, Thomas Ristenpart, Thomas Shrimpton.eng.tsv

19.1 KB

LibFTE A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes - Daniel Luchaup, Kevin P. Dyer, Somesh Jha, Thomas Ristenpart, Thomas Shrimpton.eng.txt

21.9 KB

LibFTE A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes - Daniel Luchaup, Kevin P. Dyer, Somesh Jha, Thomas Ristenpart, Thomas Shrimpton.eng.vtt

19.9 KB

Man vs. Machine Practical Adversarial Detection of Malicious Crowdsourcing Workers - Gang Wang, Tianyi Wang, Santa Barbara, Haitao Zheng, Ben Y. Zhao.eng.json

826.6 KB

Man vs. Machine Practical Adversarial Detection of Malicious Crowdsourcing Workers - Gang Wang, Tianyi Wang, Santa Barbara, Haitao Zheng, Ben Y. Zhao.eng.lrc

22.2 KB

Man vs. Machine Practical Adversarial Detection of Malicious Crowdsourcing Workers - Gang Wang, Tianyi Wang, Santa Barbara, Haitao Zheng, Ben Y. Zhao.eng.srt

23.5 KB

Man vs. Machine Practical Adversarial Detection of Malicious Crowdsourcing Workers - Gang Wang, Tianyi Wang, Santa Barbara, Haitao Zheng, Ben Y. Zhao.eng.text

17.3 KB

Man vs. Machine Practical Adversarial Detection of Malicious Crowdsourcing Workers - Gang Wang, Tianyi Wang, Santa Barbara, Haitao Zheng, Ben Y. Zhao.eng.tsv

20.0 KB

Man vs. Machine Practical Adversarial Detection of Malicious Crowdsourcing Workers - Gang Wang, Tianyi Wang, Santa Barbara, Haitao Zheng, Ben Y. Zhao.eng.txt

22.4 KB

Man vs. Machine Practical Adversarial Detection of Malicious Crowdsourcing Workers - Gang Wang, Tianyi Wang, Santa Barbara, Haitao Zheng, Ben Y. Zhao.eng.vtt

21.8 KB

Mimesis Aegis A Mimicry Privacy Shield-A System’s Approach to Data Privacy on Public Cloud - Billy Lau, Simon Chung, Chengyu Song, Yeongjin Jang, Wenke Lee, Alexandra Boldyreva.eng.json

896.6 KB

Mimesis Aegis A Mimicry Privacy Shield-A System’s Approach to Data Privacy on Public Cloud - Billy Lau, Simon Chung, Chengyu Song, Yeongjin Jang, Wenke Lee, Alexandra Boldyreva.eng.lrc

23.3 KB

Mimesis Aegis A Mimicry Privacy Shield-A System’s Approach to Data Privacy on Public Cloud - Billy Lau, Simon Chung, Chengyu Song, Yeongjin Jang, Wenke Lee, Alexandra Boldyreva.eng.srt

25.5 KB

Mimesis Aegis A Mimicry Privacy Shield-A System’s Approach to Data Privacy on Public Cloud - Billy Lau, Simon Chung, Chengyu Song, Yeongjin Jang, Wenke Lee, Alexandra Boldyreva.eng.text

17.4 KB

Mimesis Aegis A Mimicry Privacy Shield-A System’s Approach to Data Privacy on Public Cloud - Billy Lau, Simon Chung, Chengyu Song, Yeongjin Jang, Wenke Lee, Alexandra Boldyreva.eng.tsv

20.7 KB

Mimesis Aegis A Mimicry Privacy Shield-A System’s Approach to Data Privacy on Public Cloud - Billy Lau, Simon Chung, Chengyu Song, Yeongjin Jang, Wenke Lee, Alexandra Boldyreva.eng.txt

23.5 KB

Mimesis Aegis A Mimicry Privacy Shield-A System’s Approach to Data Privacy on Public Cloud - Billy Lau, Simon Chung, Chengyu Song, Yeongjin Jang, Wenke Lee, Alexandra Boldyreva.eng.vtt

23.3 KB

Never Been KIST Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport - Rob Jansen, John Geddes, Chris Wacek, Micah Sherr, Paul Syverson.eng.json

1.1 MB

Never Been KIST Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport - Rob Jansen, John Geddes, Chris Wacek, Micah Sherr, Paul Syverson.eng.lrc

31.0 KB

Never Been KIST Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport - Rob Jansen, John Geddes, Chris Wacek, Micah Sherr, Paul Syverson.eng.srt

27.8 KB

Never Been KIST Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport - Rob Jansen, John Geddes, Chris Wacek, Micah Sherr, Paul Syverson.eng.text

20.0 KB

Never Been KIST Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport - Rob Jansen, John Geddes, Chris Wacek, Micah Sherr, Paul Syverson.eng.tsv

26.1 KB

Never Been KIST Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport - Rob Jansen, John Geddes, Chris Wacek, Micah Sherr, Paul Syverson.eng.txt

31.4 KB

Never Been KIST Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport - Rob Jansen, John Geddes, Chris Wacek, Micah Sherr, Paul Syverson.eng.vtt

25.6 KB

On the Effective Prevention of TLS Man-in-the-Middle Attacks in Web Applications - Nikolaos Karapanos, Srdjan Capkun.eng.json

944.5 KB

On the Effective Prevention of TLS Man-in-the-Middle Attacks in Web Applications - Nikolaos Karapanos, Srdjan Capkun.eng.lrc

25.8 KB

On the Effective Prevention of TLS Man-in-the-Middle Attacks in Web Applications - Nikolaos Karapanos, Srdjan Capkun.eng.srt

24.2 KB

On the Effective Prevention of TLS Man-in-the-Middle Attacks in Web Applications - Nikolaos Karapanos, Srdjan Capkun.eng.text

18.8 KB

On the Effective Prevention of TLS Man-in-the-Middle Attacks in Web Applications - Nikolaos Karapanos, Srdjan Capkun.eng.tsv

22.7 KB

On the Effective Prevention of TLS Man-in-the-Middle Attacks in Web Applications - Nikolaos Karapanos, Srdjan Capkun.eng.txt

26.1 KB

On the Effective Prevention of TLS Man-in-the-Middle Attacks in Web Applications - Nikolaos Karapanos, Srdjan Capkun.eng.vtt

22.7 KB

On the Feasibility of Large-Scale Infections of iOS Devices - Tielei Wang, Yeongjin Jang, Yizheng Chen, Simon Chung, Billy Lau, Wenke Lee.eng.json

844.8 KB

On the Feasibility of Large-Scale Infections of iOS Devices - Tielei Wang, Yeongjin Jang, Yizheng Chen, Simon Chung, Billy Lau, Wenke Lee.eng.lrc

22.0 KB

On the Feasibility of Large-Scale Infections of iOS Devices - Tielei Wang, Yeongjin Jang, Yizheng Chen, Simon Chung, Billy Lau, Wenke Lee.eng.srt

23.8 KB

On the Feasibility of Large-Scale Infections of iOS Devices - Tielei Wang, Yeongjin Jang, Yizheng Chen, Simon Chung, Billy Lau, Wenke Lee.eng.text

16.5 KB

On the Feasibility of Large-Scale Infections of iOS Devices - Tielei Wang, Yeongjin Jang, Yizheng Chen, Simon Chung, Billy Lau, Wenke Lee.eng.tsv

19.5 KB

On the Feasibility of Large-Scale Infections of iOS Devices - Tielei Wang, Yeongjin Jang, Yizheng Chen, Simon Chung, Billy Lau, Wenke Lee.eng.txt

22.2 KB

On the Feasibility of Large-Scale Infections of iOS Devices - Tielei Wang, Yeongjin Jang, Yizheng Chen, Simon Chung, Billy Lau, Wenke Lee.eng.vtt

21.8 KB

On the Practical Exploitability of Dual EC in TLS Implementations - Stephen Checkoway, Matthew Fredrikson, Ruben Niederhagen, Adam Everspaugh, Matthew Green, Tanja Lange, Thomas Ri.eng.json

892.4 KB

On the Practical Exploitability of Dual EC in TLS Implementations - Stephen Checkoway, Matthew Fredrikson, Ruben Niederhagen, Adam Everspaugh, Matthew Green, Tanja Lange, Thomas Ri.eng.lrc

24.0 KB

On the Practical Exploitability of Dual EC in TLS Implementations - Stephen Checkoway, Matthew Fredrikson, Ruben Niederhagen, Adam Everspaugh, Matthew Green, Tanja Lange, Thomas Ri.eng.srt

21.3 KB

On the Practical Exploitability of Dual EC in TLS Implementations - Stephen Checkoway, Matthew Fredrikson, Ruben Niederhagen, Adam Everspaugh, Matthew Green, Tanja Lange, Thomas Ri.eng.text

15.4 KB

On the Practical Exploitability of Dual EC in TLS Implementations - Stephen Checkoway, Matthew Fredrikson, Ruben Niederhagen, Adam Everspaugh, Matthew Green, Tanja Lange, Thomas Ri.eng.tsv

20.0 KB

On the Practical Exploitability of Dual EC in TLS Implementations - Stephen Checkoway, Matthew Fredrikson, Ruben Niederhagen, Adam Everspaugh, Matthew Green, Tanja Lange, Thomas Ri.eng.txt

24.3 KB

On the Practical Exploitability of Dual EC in TLS Implementations - Stephen Checkoway, Matthew Fredrikson, Ruben Niederhagen, Adam Everspaugh, Matthew Green, Tanja Lange, Thomas Ri.eng.vtt

19.6 KB

Optimizing Seed Selection for Fuzzing - Alexandre Rebert, Sang Kil Cha, Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, David Brumley.eng.json

830.6 KB

Optimizing Seed Selection for Fuzzing - Alexandre Rebert, Sang Kil Cha, Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, David Brumley.eng.lrc

20.3 KB

Optimizing Seed Selection for Fuzzing - Alexandre Rebert, Sang Kil Cha, Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, David Brumley.eng.srt

22.4 KB

Optimizing Seed Selection for Fuzzing - Alexandre Rebert, Sang Kil Cha, Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, David Brumley.eng.text

15.8 KB

Optimizing Seed Selection for Fuzzing - Alexandre Rebert, Sang Kil Cha, Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, David Brumley.eng.tsv

18.3 KB

Optimizing Seed Selection for Fuzzing - Alexandre Rebert, Sang Kil Cha, Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, David Brumley.eng.txt

20.5 KB

Optimizing Seed Selection for Fuzzing - Alexandre Rebert, Sang Kil Cha, Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, David Brumley.eng.vtt

20.6 KB

Oxymoron Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing - Michael Backes, Stefan Nurnberger.eng.json

1.3 MB

Oxymoron Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing - Michael Backes, Stefan Nurnberger.eng.lrc

37.1 KB

Oxymoron Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing - Michael Backes, Stefan Nurnberger.eng.srt

31.1 KB

Oxymoron Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing - Michael Backes, Stefan Nurnberger.eng.text

21.8 KB

Oxymoron Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing - Michael Backes, Stefan Nurnberger.eng.tsv

30.4 KB

Oxymoron Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing - Michael Backes, Stefan Nurnberger.eng.txt

37.6 KB

Oxymoron Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing - Michael Backes, Stefan Nurnberger.eng.vtt

28.4 KB

Panel Discussion - Stuart Schechter.eng.json

1.0 MB

Panel Discussion - Stuart Schechter.eng.lrc

27.2 KB

Panel Discussion - Stuart Schechter.eng.srt

26.8 KB

Panel Discussion - Stuart Schechter.eng.text

19.3 KB

Panel Discussion - Stuart Schechter.eng.tsv

23.7 KB

Panel Discussion - Stuart Schechter.eng.txt

27.5 KB

Panel Discussion - Stuart Schechter.eng.vtt

24.7 KB

Password Managers Attacks and Defenses - David Silver, Suman Jana, and Dan Boneh, Stanford University - Eric Chen, Collin Jackson.eng.json

1.1 MB

Password Managers Attacks and Defenses - David Silver, Suman Jana, and Dan Boneh, Stanford University - Eric Chen, Collin Jackson.eng.lrc

32.3 KB

Password Managers Attacks and Defenses - David Silver, Suman Jana, and Dan Boneh, Stanford University - Eric Chen, Collin Jackson.eng.srt

27.3 KB

Password Managers Attacks and Defenses - David Silver, Suman Jana, and Dan Boneh, Stanford University - Eric Chen, Collin Jackson.eng.text

20.4 KB

Password Managers Attacks and Defenses - David Silver, Suman Jana, and Dan Boneh, Stanford University - Eric Chen, Collin Jackson.eng.tsv

27.0 KB

Password Managers Attacks and Defenses - David Silver, Suman Jana, and Dan Boneh, Stanford University - Eric Chen, Collin Jackson.eng.txt

32.8 KB

Password Managers Attacks and Defenses - David Silver, Suman Jana, and Dan Boneh, Stanford University - Eric Chen, Collin Jackson.eng.vtt

25.3 KB

Password Portfolios and the Finite-Effort User Sustainably Managing Large Numbers of Accounts - Dinei Florencio, Cormac Herley, Paul C. van Oorschot.eng.json

1.1 MB

Password Portfolios and the Finite-Effort User Sustainably Managing Large Numbers of Accounts - Dinei Florencio, Cormac Herley, Paul C. van Oorschot.eng.lrc

27.0 KB

Password Portfolios and the Finite-Effort User Sustainably Managing Large Numbers of Accounts - Dinei Florencio, Cormac Herley, Paul C. van Oorschot.eng.srt

28.0 KB

Password Portfolios and the Finite-Effort User Sustainably Managing Large Numbers of Accounts - Dinei Florencio, Cormac Herley, Paul C. van Oorschot.eng.text

20.3 KB

Password Portfolios and the Finite-Effort User Sustainably Managing Large Numbers of Accounts - Dinei Florencio, Cormac Herley, Paul C. van Oorschot.eng.tsv

23.9 KB

Password Portfolios and the Finite-Effort User Sustainably Managing Large Numbers of Accounts - Dinei Florencio, Cormac Herley, Paul C. van Oorschot.eng.txt

27.3 KB

Password Portfolios and the Finite-Effort User Sustainably Managing Large Numbers of Accounts - Dinei Florencio, Cormac Herley, Paul C. van Oorschot.eng.vtt

25.9 KB

Peeking into Your App without Actually Seeing It UI State Inference and Novel Android Attacks - Qi Alfred Chen, Zhiyun Qian, Z. Morley Mao.eng.json

940.5 KB

Peeking into Your App without Actually Seeing It UI State Inference and Novel Android Attacks - Qi Alfred Chen, Zhiyun Qian, Z. Morley Mao.eng.lrc

23.4 KB

Peeking into Your App without Actually Seeing It UI State Inference and Novel Android Attacks - Qi Alfred Chen, Zhiyun Qian, Z. Morley Mao.eng.srt

27.0 KB

Peeking into Your App without Actually Seeing It UI State Inference and Novel Android Attacks - Qi Alfred Chen, Zhiyun Qian, Z. Morley Mao.eng.text

18.2 KB

Peeking into Your App without Actually Seeing It UI State Inference and Novel Android Attacks - Qi Alfred Chen, Zhiyun Qian, Z. Morley Mao.eng.tsv

21.1 KB

Peeking into Your App without Actually Seeing It UI State Inference and Novel Android Attacks - Qi Alfred Chen, Zhiyun Qian, Z. Morley Mao.eng.txt

23.6 KB

Peeking into Your App without Actually Seeing It UI State Inference and Novel Android Attacks - Qi Alfred Chen, Zhiyun Qian, Z. Morley Mao.eng.vtt

24.5 KB

Precise Client-side Protection against DOM-based Cross-Site Scripting - Ben Stock, Sebastian Lekies, Tobias Mueller, Patrick Spiegel, and Martin Johns.eng.json

1.1 MB

Precise Client-side Protection against DOM-based Cross-Site Scripting - Ben Stock, Sebastian Lekies, Tobias Mueller, Patrick Spiegel, and Martin Johns.eng.lrc

31.1 KB

Precise Client-side Protection against DOM-based Cross-Site Scripting - Ben Stock, Sebastian Lekies, Tobias Mueller, Patrick Spiegel, and Martin Johns.eng.srt

25.7 KB

Precise Client-side Protection against DOM-based Cross-Site Scripting - Ben Stock, Sebastian Lekies, Tobias Mueller, Patrick Spiegel, and Martin Johns.eng.text

20.5 KB

Precise Client-side Protection against DOM-based Cross-Site Scripting - Ben Stock, Sebastian Lekies, Tobias Mueller, Patrick Spiegel, and Martin Johns.eng.tsv

26.3 KB

Precise Client-side Protection against DOM-based Cross-Site Scripting - Ben Stock, Sebastian Lekies, Tobias Mueller, Patrick Spiegel, and Martin Johns.eng.txt

31.5 KB

Precise Client-side Protection against DOM-based Cross-Site Scripting - Ben Stock, Sebastian Lekies, Tobias Mueller, Patrick Spiegel, and Martin Johns.eng.vtt

24.2 KB

Preventing Cryptographic Key Leakage in Cloud Virtual Machines - Erman Pattuk, Murat Kantarcioglu, Zhiqiang Lin, Huseyin Ulusoy.eng.json

929.4 KB

Preventing Cryptographic Key Leakage in Cloud Virtual Machines - Erman Pattuk, Murat Kantarcioglu, Zhiqiang Lin, Huseyin Ulusoy.eng.lrc

22.3 KB

Preventing Cryptographic Key Leakage in Cloud Virtual Machines - Erman Pattuk, Murat Kantarcioglu, Zhiqiang Lin, Huseyin Ulusoy.eng.srt

24.6 KB

Preventing Cryptographic Key Leakage in Cloud Virtual Machines - Erman Pattuk, Murat Kantarcioglu, Zhiqiang Lin, Huseyin Ulusoy.eng.text

17.5 KB

Preventing Cryptographic Key Leakage in Cloud Virtual Machines - Erman Pattuk, Murat Kantarcioglu, Zhiqiang Lin, Huseyin Ulusoy.eng.tsv

20.1 KB

Preventing Cryptographic Key Leakage in Cloud Virtual Machines - Erman Pattuk, Murat Kantarcioglu, Zhiqiang Lin, Huseyin Ulusoy.eng.txt

22.5 KB

Preventing Cryptographic Key Leakage in Cloud Virtual Machines - Erman Pattuk, Murat Kantarcioglu, Zhiqiang Lin, Huseyin Ulusoy.eng.vtt

22.6 KB

Privacy in Pharmacogenetics An End-to-End Case Study of Personalized Warfarin Dosing - Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon Lin, David Page, Thomas Ristenpart.eng.json

1.0 MB

Privacy in Pharmacogenetics An End-to-End Case Study of Personalized Warfarin Dosing - Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon Lin, David Page, Thomas Ristenpart.eng.lrc

26.6 KB

Privacy in Pharmacogenetics An End-to-End Case Study of Personalized Warfarin Dosing - Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon Lin, David Page, Thomas Ristenpart.eng.srt

26.9 KB

Privacy in Pharmacogenetics An End-to-End Case Study of Personalized Warfarin Dosing - Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon Lin, David Page, Thomas Ristenpart.eng.text

20.4 KB

Privacy in Pharmacogenetics An End-to-End Case Study of Personalized Warfarin Dosing - Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon Lin, David Page, Thomas Ristenpart.eng.tsv

23.8 KB

Privacy in Pharmacogenetics An End-to-End Case Study of Personalized Warfarin Dosing - Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon Lin, David Page, Thomas Ristenpart.eng.txt

26.9 KB

Privacy in Pharmacogenetics An End-to-End Case Study of Personalized Warfarin Dosing - Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon Lin, David Page, Thomas Ristenpart.eng.vtt

25.1 KB

Privee An Architecture for Automatically Analyzing Web Privacy Policies -Sebastian Zimmeck, Steven M. Bellovin.eng.json

703.2 KB

Privee An Architecture for Automatically Analyzing Web Privacy Policies -Sebastian Zimmeck, Steven M. Bellovin.eng.lrc

19.6 KB

Privee An Architecture for Automatically Analyzing Web Privacy Policies -Sebastian Zimmeck, Steven M. Bellovin.eng.srt

19.6 KB

Privee An Architecture for Automatically Analyzing Web Privacy Policies -Sebastian Zimmeck, Steven M. Bellovin.eng.text

14.3 KB

Privee An Architecture for Automatically Analyzing Web Privacy Policies -Sebastian Zimmeck, Steven M. Bellovin.eng.tsv

17.2 KB

Privee An Architecture for Automatically Analyzing Web Privacy Policies -Sebastian Zimmeck, Steven M. Bellovin.eng.txt

19.8 KB

Privee An Architecture for Automatically Analyzing Web Privacy Policies -Sebastian Zimmeck, Steven M. Bellovin.eng.vtt

18.1 KB

ret2dir Rethinking Kernel Isolation - Vasileios P. Kemerlis, Michalis Polychronakis, Angelos D. Keromytis.eng.json

907.3 KB

ret2dir Rethinking Kernel Isolation - Vasileios P. Kemerlis, Michalis Polychronakis, Angelos D. Keromytis.eng.lrc

26.3 KB

ret2dir Rethinking Kernel Isolation - Vasileios P. Kemerlis, Michalis Polychronakis, Angelos D. Keromytis.eng.srt

21.9 KB

ret2dir Rethinking Kernel Isolation - Vasileios P. Kemerlis, Michalis Polychronakis, Angelos D. Keromytis.eng.text

16.2 KB

ret2dir Rethinking Kernel Isolation - Vasileios P. Kemerlis, Michalis Polychronakis, Angelos D. Keromytis.eng.tsv

21.6 KB

ret2dir Rethinking Kernel Isolation - Vasileios P. Kemerlis, Michalis Polychronakis, Angelos D. Keromytis.eng.txt

26.7 KB

ret2dir Rethinking Kernel Isolation - Vasileios P. Kemerlis, Michalis Polychronakis, Angelos D. Keromytis.eng.vtt

20.3 KB

Revisiting SSLTLS Implementations New Bleichenbacher Side Channels and Attacks - Christopher Meyer, Juraj Somorovsky, Eugen Weiss, Jorg Schwenk, Sebastian Schinzel, Erik Tews.eng.json

791.3 KB

Revisiting SSLTLS Implementations New Bleichenbacher Side Channels and Attacks - Christopher Meyer, Juraj Somorovsky, Eugen Weiss, Jorg Schwenk, Sebastian Schinzel, Erik Tews.eng.lrc

22.2 KB

Revisiting SSLTLS Implementations New Bleichenbacher Side Channels and Attacks - Christopher Meyer, Juraj Somorovsky, Eugen Weiss, Jorg Schwenk, Sebastian Schinzel, Erik Tews.eng.srt

19.8 KB

Revisiting SSLTLS Implementations New Bleichenbacher Side Channels and Attacks - Christopher Meyer, Juraj Somorovsky, Eugen Weiss, Jorg Schwenk, Sebastian Schinzel, Erik Tews.eng.text

13.5 KB

Revisiting SSLTLS Implementations New Bleichenbacher Side Channels and Attacks - Christopher Meyer, Juraj Somorovsky, Eugen Weiss, Jorg Schwenk, Sebastian Schinzel, Erik Tews.eng.tsv

18.2 KB

Revisiting SSLTLS Implementations New Bleichenbacher Side Channels and Attacks - Christopher Meyer, Juraj Somorovsky, Eugen Weiss, Jorg Schwenk, Sebastian Schinzel, Erik Tews.eng.txt

22.5 KB

Revisiting SSLTLS Implementations New Bleichenbacher Side Channels and Attacks - Christopher Meyer, Juraj Somorovsky, Eugen Weiss, Jorg Schwenk, Sebastian Schinzel, Erik Tews.eng.vtt

18.0 KB

ROP is Still Dangerous Breaking Modern Defenses - Nicholas Carlini, David Wagner.eng.json

1.2 MB

ROP is Still Dangerous Breaking Modern Defenses - Nicholas Carlini, David Wagner.eng.lrc

35.8 KB

ROP is Still Dangerous Breaking Modern Defenses - Nicholas Carlini, David Wagner.eng.srt

27.4 KB

ROP is Still Dangerous Breaking Modern Defenses - Nicholas Carlini, David Wagner.eng.text

19.3 KB

ROP is Still Dangerous Breaking Modern Defenses - Nicholas Carlini, David Wagner.eng.tsv

28.2 KB

ROP is Still Dangerous Breaking Modern Defenses - Nicholas Carlini, David Wagner.eng.txt

36.4 KB

ROP is Still Dangerous Breaking Modern Defenses - Nicholas Carlini, David Wagner.eng.vtt

25.0 KB

Scheduler-based Defenses against Cross-VM Side-channels - Venkatanathan Varadarajan, Thomas Ristenpart, Michael Swift.eng.json

866.6 KB

Scheduler-based Defenses against Cross-VM Side-channels - Venkatanathan Varadarajan, Thomas Ristenpart, Michael Swift.eng.lrc

25.3 KB

Scheduler-based Defenses against Cross-VM Side-channels - Venkatanathan Varadarajan, Thomas Ristenpart, Michael Swift.eng.srt

21.8 KB

Scheduler-based Defenses against Cross-VM Side-channels - Venkatanathan Varadarajan, Thomas Ristenpart, Michael Swift.eng.text

16.6 KB

Scheduler-based Defenses against Cross-VM Side-channels - Venkatanathan Varadarajan, Thomas Ristenpart, Michael Swift.eng.tsv

21.4 KB

Scheduler-based Defenses against Cross-VM Side-channels - Venkatanathan Varadarajan, Thomas Ristenpart, Michael Swift.eng.txt

25.6 KB

Scheduler-based Defenses against Cross-VM Side-channels - Venkatanathan Varadarajan, Thomas Ristenpart, Michael Swift.eng.vtt

20.3 KB

SDDR Light-Weight, Secure Mobile Encounters - Matthew Lentz, Viktor Erdélyi, Paarijaat Aditya, Elaine Shi, Peter Druschel, Bobby Bhattacharjee.eng.json

939.6 KB

SDDR Light-Weight, Secure Mobile Encounters - Matthew Lentz, Viktor Erdélyi, Paarijaat Aditya, Elaine Shi, Peter Druschel, Bobby Bhattacharjee.eng.lrc

24.5 KB

SDDR Light-Weight, Secure Mobile Encounters - Matthew Lentz, Viktor Erdélyi, Paarijaat Aditya, Elaine Shi, Peter Druschel, Bobby Bhattacharjee.eng.srt

24.8 KB

SDDR Light-Weight, Secure Mobile Encounters - Matthew Lentz, Viktor Erdélyi, Paarijaat Aditya, Elaine Shi, Peter Druschel, Bobby Bhattacharjee.eng.text

19.0 KB

SDDR Light-Weight, Secure Mobile Encounters - Matthew Lentz, Viktor Erdélyi, Paarijaat Aditya, Elaine Shi, Peter Druschel, Bobby Bhattacharjee.eng.tsv

22.0 KB

SDDR Light-Weight, Secure Mobile Encounters - Matthew Lentz, Viktor Erdélyi, Paarijaat Aditya, Elaine Shi, Peter Druschel, Bobby Bhattacharjee.eng.txt

24.7 KB

SDDR Light-Weight, Secure Mobile Encounters - Matthew Lentz, Viktor Erdélyi, Paarijaat Aditya, Elaine Shi, Peter Druschel, Bobby Bhattacharjee.eng.vtt

23.2 KB

Security Analysis of a Full-Body Scanner - Keaton Mowery, Eric Wustrow, Tom Wypych, Corey Singleton, Chris Comfort, Eric Rescorla, Stephen Checkoway, J. Alex Halderman, Hovav Shach.eng.json

1.1 MB

Security Analysis of a Full-Body Scanner - Keaton Mowery, Eric Wustrow, Tom Wypych, Corey Singleton, Chris Comfort, Eric Rescorla, Stephen Checkoway, J. Alex Halderman, Hovav Shach.eng.lrc

28.2 KB

Security Analysis of a Full-Body Scanner - Keaton Mowery, Eric Wustrow, Tom Wypych, Corey Singleton, Chris Comfort, Eric Rescorla, Stephen Checkoway, J. Alex Halderman, Hovav Shach.eng.srt

31.5 KB

Security Analysis of a Full-Body Scanner - Keaton Mowery, Eric Wustrow, Tom Wypych, Corey Singleton, Chris Comfort, Eric Rescorla, Stephen Checkoway, J. Alex Halderman, Hovav Shach.eng.text

21.8 KB

Security Analysis of a Full-Body Scanner - Keaton Mowery, Eric Wustrow, Tom Wypych, Corey Singleton, Chris Comfort, Eric Rescorla, Stephen Checkoway, J. Alex Halderman, Hovav Shach.eng.tsv

25.4 KB

Security Analysis of a Full-Body Scanner - Keaton Mowery, Eric Wustrow, Tom Wypych, Corey Singleton, Chris Comfort, Eric Rescorla, Stephen Checkoway, J. Alex Halderman, Hovav Shach.eng.txt

28.4 KB

Security Analysis of a Full-Body Scanner - Keaton Mowery, Eric Wustrow, Tom Wypych, Corey Singleton, Chris Comfort, Eric Rescorla, Stephen Checkoway, J. Alex Halderman, Hovav Shach.eng.vtt

28.8 KB

Size Does Matter Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard - Enes Goktas, Elias Athanasopoulos, Michalis Polychronakis, Herbert Bos, Georgios Portokalidis.eng.json

581.9 KB

Size Does Matter Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard - Enes Goktas, Elias Athanasopoulos, Michalis Polychronakis, Herbert Bos, Georgios Portokalidis.eng.lrc

15.7 KB

Size Does Matter Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard - Enes Goktas, Elias Athanasopoulos, Michalis Polychronakis, Herbert Bos, Georgios Portokalidis.eng.srt

16.5 KB

Size Does Matter Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard - Enes Goktas, Elias Athanasopoulos, Michalis Polychronakis, Herbert Bos, Georgios Portokalidis.eng.text

11.8 KB

Size Does Matter Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard - Enes Goktas, Elias Athanasopoulos, Michalis Polychronakis, Herbert Bos, Georgios Portokalidis.eng.tsv

13.9 KB

Size Does Matter Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard - Enes Goktas, Elias Athanasopoulos, Michalis Polychronakis, Herbert Bos, Georgios Portokalidis.eng.txt

15.8 KB

Size Does Matter Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard - Enes Goktas, Elias Athanasopoulos, Michalis Polychronakis, Herbert Bos, Georgios Portokalidis.eng.vtt

15.2 KB

SpanDex Secure Password Tracking for Android - Landon P. Cox , Peter Gilbert, Geoffrey Lawler, Valentin Pistol, Ali Razeen, Bi Wu, Sai Cheemalapati.eng.json

1.1 MB

SpanDex Secure Password Tracking for Android - Landon P. Cox , Peter Gilbert, Geoffrey Lawler, Valentin Pistol, Ali Razeen, Bi Wu, Sai Cheemalapati.eng.lrc

27.2 KB

SpanDex Secure Password Tracking for Android - Landon P. Cox , Peter Gilbert, Geoffrey Lawler, Valentin Pistol, Ali Razeen, Bi Wu, Sai Cheemalapati.eng.srt

31.8 KB

SpanDex Secure Password Tracking for Android - Landon P. Cox , Peter Gilbert, Geoffrey Lawler, Valentin Pistol, Ali Razeen, Bi Wu, Sai Cheemalapati.eng.text

20.8 KB

SpanDex Secure Password Tracking for Android - Landon P. Cox , Peter Gilbert, Geoffrey Lawler, Valentin Pistol, Ali Razeen, Bi Wu, Sai Cheemalapati.eng.tsv

24.4 KB

SpanDex Secure Password Tracking for Android - Landon P. Cox , Peter Gilbert, Geoffrey Lawler, Valentin Pistol, Ali Razeen, Bi Wu, Sai Cheemalapati.eng.txt

27.5 KB

SpanDex Secure Password Tracking for Android - Landon P. Cox , Peter Gilbert, Geoffrey Lawler, Valentin Pistol, Ali Razeen, Bi Wu, Sai Cheemalapati.eng.vtt

28.7 KB

SSOScan Automated Testing of Web Applications for Single Sign-On Vulnerabilities - Yuchen Zhou, David Evans.eng.json

883.3 KB

SSOScan Automated Testing of Web Applications for Single Sign-On Vulnerabilities - Yuchen Zhou, David Evans.eng.lrc

21.9 KB

SSOScan Automated Testing of Web Applications for Single Sign-On Vulnerabilities - Yuchen Zhou, David Evans.eng.srt

24.2 KB

SSOScan Automated Testing of Web Applications for Single Sign-On Vulnerabilities - Yuchen Zhou, David Evans.eng.text

17.4 KB

SSOScan Automated Testing of Web Applications for Single Sign-On Vulnerabilities - Yuchen Zhou, David Evans.eng.tsv

19.8 KB

SSOScan Automated Testing of Web Applications for Single Sign-On Vulnerabilities - Yuchen Zhou, David Evans.eng.txt

22.1 KB

SSOScan Automated Testing of Web Applications for Single Sign-On Vulnerabilities - Yuchen Zhou, David Evans.eng.vtt

22.3 KB

Static Detection of Second-Order Vulnerabilities in Web Applications - Johannes Dahse, Thorsten Holz.eng.json

930.4 KB

Static Detection of Second-Order Vulnerabilities in Web Applications - Johannes Dahse, Thorsten Holz.eng.lrc

23.9 KB

Static Detection of Second-Order Vulnerabilities in Web Applications - Johannes Dahse, Thorsten Holz.eng.srt

26.7 KB

Static Detection of Second-Order Vulnerabilities in Web Applications - Johannes Dahse, Thorsten Holz.eng.text

18.6 KB

Static Detection of Second-Order Vulnerabilities in Web Applications - Johannes Dahse, Thorsten Holz.eng.tsv

21.5 KB

Static Detection of Second-Order Vulnerabilities in Web Applications - Johannes Dahse, Thorsten Holz.eng.txt

24.1 KB

Static Detection of Second-Order Vulnerabilities in Web Applications - Johannes Dahse, Thorsten Holz.eng.vtt

24.5 KB

Stitching the Gadgets On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection - Lucas Davi, Ahmad-Reza Sadeghi, Daniel Lehmann, Fabian Monrose.eng.json

797.6 KB

Stitching the Gadgets On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection - Lucas Davi, Ahmad-Reza Sadeghi, Daniel Lehmann, Fabian Monrose.eng.lrc

24.0 KB

Stitching the Gadgets On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection - Lucas Davi, Ahmad-Reza Sadeghi, Daniel Lehmann, Fabian Monrose.eng.srt

19.7 KB

Stitching the Gadgets On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection - Lucas Davi, Ahmad-Reza Sadeghi, Daniel Lehmann, Fabian Monrose.eng.text

14.9 KB

Stitching the Gadgets On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection - Lucas Davi, Ahmad-Reza Sadeghi, Daniel Lehmann, Fabian Monrose.eng.tsv

19.8 KB

Stitching the Gadgets On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection - Lucas Davi, Ahmad-Reza Sadeghi, Daniel Lehmann, Fabian Monrose.eng.txt

24.4 KB

Stitching the Gadgets On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection - Lucas Davi, Ahmad-Reza Sadeghi, Daniel Lehmann, Fabian Monrose.eng.vtt

18.3 KB

Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture - Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza.eng.json

809.7 KB

Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture - Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza.eng.lrc

22.8 KB

Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture - Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza.eng.srt

21.2 KB

Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture - Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza.eng.text

15.2 KB

Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture - Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza.eng.tsv

19.3 KB

Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture - Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza.eng.txt

23.1 KB

Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture - Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza.eng.vtt

19.5 KB

TapDance End-to-Middle Anticensorship without Flow Blocking - Eric Wustrow, Colleen M. Swanson, J. Alex Halderman.eng.json

1.1 MB

TapDance End-to-Middle Anticensorship without Flow Blocking - Eric Wustrow, Colleen M. Swanson, J. Alex Halderman.eng.lrc

30.1 KB

TapDance End-to-Middle Anticensorship without Flow Blocking - Eric Wustrow, Colleen M. Swanson, J. Alex Halderman.eng.srt

26.4 KB

TapDance End-to-Middle Anticensorship without Flow Blocking - Eric Wustrow, Colleen M. Swanson, J. Alex Halderman.eng.text

20.3 KB

TapDance End-to-Middle Anticensorship without Flow Blocking - Eric Wustrow, Colleen M. Swanson, J. Alex Halderman.eng.tsv

25.8 KB

TapDance End-to-Middle Anticensorship without Flow Blocking - Eric Wustrow, Colleen M. Swanson, J. Alex Halderman.eng.txt

30.5 KB

TapDance End-to-Middle Anticensorship without Flow Blocking - Eric Wustrow, Colleen M. Swanson, J. Alex Halderman.eng.vtt

24.7 KB

Targeted Threat Index Characterizing and Quantifying Politically-Motivated Targeted Malware - Seth Hardy, Masashi Crete-Nishihata, Katharine Kleemola, Adam Senft, Byron Sonne, Greg.eng.json

834.9 KB

Targeted Threat Index Characterizing and Quantifying Politically-Motivated Targeted Malware - Seth Hardy, Masashi Crete-Nishihata, Katharine Kleemola, Adam Senft, Byron Sonne, Greg.eng.lrc

21.7 KB

Targeted Threat Index Characterizing and Quantifying Politically-Motivated Targeted Malware - Seth Hardy, Masashi Crete-Nishihata, Katharine Kleemola, Adam Senft, Byron Sonne, Greg.eng.srt

23.1 KB

Targeted Threat Index Characterizing and Quantifying Politically-Motivated Targeted Malware - Seth Hardy, Masashi Crete-Nishihata, Katharine Kleemola, Adam Senft, Byron Sonne, Greg.eng.text

16.6 KB

Targeted Threat Index Characterizing and Quantifying Politically-Motivated Targeted Malware - Seth Hardy, Masashi Crete-Nishihata, Katharine Kleemola, Adam Senft, Byron Sonne, Greg.eng.tsv

19.4 KB

Targeted Threat Index Characterizing and Quantifying Politically-Motivated Targeted Malware - Seth Hardy, Masashi Crete-Nishihata, Katharine Kleemola, Adam Senft, Byron Sonne, Greg.eng.txt

21.9 KB

Targeted Threat Index Characterizing and Quantifying Politically-Motivated Targeted Malware - Seth Hardy, Masashi Crete-Nishihata, Katharine Kleemola, Adam Senft, Byron Sonne, Greg.eng.vtt

21.3 KB

Telepathwords Preventing Weak Passwords by Reading Users’ Minds - Saranga Komanduri, Richard Shay, Lorrie Faith Cranor, Cormac Herley Stuart Schechter.eng.json

1.0 MB

Telepathwords Preventing Weak Passwords by Reading Users’ Minds - Saranga Komanduri, Richard Shay, Lorrie Faith Cranor, Cormac Herley Stuart Schechter.eng.lrc

29.5 KB

Telepathwords Preventing Weak Passwords by Reading Users’ Minds - Saranga Komanduri, Richard Shay, Lorrie Faith Cranor, Cormac Herley Stuart Schechter.eng.srt

26.2 KB

Telepathwords Preventing Weak Passwords by Reading Users’ Minds - Saranga Komanduri, Richard Shay, Lorrie Faith Cranor, Cormac Herley Stuart Schechter.eng.text

20.0 KB

Telepathwords Preventing Weak Passwords by Reading Users’ Minds - Saranga Komanduri, Richard Shay, Lorrie Faith Cranor, Cormac Herley Stuart Schechter.eng.tsv

25.2 KB

Telepathwords Preventing Weak Passwords by Reading Users’ Minds - Saranga Komanduri, Richard Shay, Lorrie Faith Cranor, Cormac Herley Stuart Schechter.eng.txt

29.8 KB

Telepathwords Preventing Weak Passwords by Reading Users’ Minds - Saranga Komanduri, Richard Shay, Lorrie Faith Cranor, Cormac Herley Stuart Schechter.eng.vtt

24.4 KB

The Emperor’s New Password Manager Security Analysis of Web-based Password Managers - Zhiwei Li, Warren He, Devdatta Akhawe, Dawn Song.eng.json

790.2 KB

The Emperor’s New Password Manager Security Analysis of Web-based Password Managers - Zhiwei Li, Warren He, Devdatta Akhawe, Dawn Song.eng.lrc

21.2 KB

The Emperor’s New Password Manager Security Analysis of Web-based Password Managers - Zhiwei Li, Warren He, Devdatta Akhawe, Dawn Song.eng.srt

22.2 KB

The Emperor’s New Password Manager Security Analysis of Web-based Password Managers - Zhiwei Li, Warren He, Devdatta Akhawe, Dawn Song.eng.text

15.6 KB

The Emperor’s New Password Manager Security Analysis of Web-based Password Managers - Zhiwei Li, Warren He, Devdatta Akhawe, Dawn Song.eng.tsv

18.7 KB

The Emperor’s New Password Manager Security Analysis of Web-based Password Managers - Zhiwei Li, Warren He, Devdatta Akhawe, Dawn Song.eng.txt

21.5 KB

The Emperor’s New Password Manager Security Analysis of Web-based Password Managers - Zhiwei Li, Warren He, Devdatta Akhawe, Dawn Song.eng.vtt

20.3 KB

The Future of Crypto Getting from Here to Guarantees - Daniel J. Bernstein, Matt Blaze, Tanja Lange.eng.json

4.9 MB

The Future of Crypto Getting from Here to Guarantees - Daniel J. Bernstein, Matt Blaze, Tanja Lange.eng.lrc

149.8 KB

The Future of Crypto Getting from Here to Guarantees - Daniel J. Bernstein, Matt Blaze, Tanja Lange.eng.srt

115.3 KB

The Future of Crypto Getting from Here to Guarantees - Daniel J. Bernstein, Matt Blaze, Tanja Lange.eng.text

85.0 KB

The Future of Crypto Getting from Here to Guarantees - Daniel J. Bernstein, Matt Blaze, Tanja Lange.eng.tsv

121.2 KB

The Future of Crypto Getting from Here to Guarantees - Daniel J. Bernstein, Matt Blaze, Tanja Lange.eng.txt

152.1 KB

The Future of Crypto Getting from Here to Guarantees - Daniel J. Bernstein, Matt Blaze, Tanja Lange.eng.vtt

107.8 KB

The Long Taile of Typosquatting Domain Names - Janos Szurdi, Balazs Kocso, Gabor Cseh, Jonathan Spring, Mark Felegyhazi, Chris Kanich.eng.json

715.2 KB

The Long Taile of Typosquatting Domain Names - Janos Szurdi, Balazs Kocso, Gabor Cseh, Jonathan Spring, Mark Felegyhazi, Chris Kanich.eng.lrc

18.8 KB

The Long Taile of Typosquatting Domain Names - Janos Szurdi, Balazs Kocso, Gabor Cseh, Jonathan Spring, Mark Felegyhazi, Chris Kanich.eng.srt

18.1 KB

The Long Taile of Typosquatting Domain Names - Janos Szurdi, Balazs Kocso, Gabor Cseh, Jonathan Spring, Mark Felegyhazi, Chris Kanich.eng.text

13.8 KB

The Long Taile of Typosquatting Domain Names - Janos Szurdi, Balazs Kocso, Gabor Cseh, Jonathan Spring, Mark Felegyhazi, Chris Kanich.eng.tsv

16.5 KB

The Long Taile of Typosquatting Domain Names - Janos Szurdi, Balazs Kocso, Gabor Cseh, Jonathan Spring, Mark Felegyhazi, Chris Kanich.eng.txt

19.0 KB

The Long Taile of Typosquatting Domain Names - Janos Szurdi, Balazs Kocso, Gabor Cseh, Jonathan Spring, Mark Felegyhazi, Chris Kanich.eng.vtt

16.9 KB

Towards Detecting Anomalous User Behavior in Online Social Networks - Bimal Viswanath, M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna P. Gummadi, Max Planck, Balachander Kris.eng.json

994.0 KB

Towards Detecting Anomalous User Behavior in Online Social Networks - Bimal Viswanath, M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna P. Gummadi, Max Planck, Balachander Kris.eng.lrc

26.3 KB

Towards Detecting Anomalous User Behavior in Online Social Networks - Bimal Viswanath, M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna P. Gummadi, Max Planck, Balachander Kris.eng.srt

27.5 KB

Towards Detecting Anomalous User Behavior in Online Social Networks - Bimal Viswanath, M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna P. Gummadi, Max Planck, Balachander Kris.eng.text

19.3 KB

Towards Detecting Anomalous User Behavior in Online Social Networks - Bimal Viswanath, M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna P. Gummadi, Max Planck, Balachander Kris.eng.tsv

23.2 KB

Towards Detecting Anomalous User Behavior in Online Social Networks - Bimal Viswanath, M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna P. Gummadi, Max Planck, Balachander Kris.eng.txt

26.6 KB

Towards Detecting Anomalous User Behavior in Online Social Networks - Bimal Viswanath, M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna P. Gummadi, Max Planck, Balachander Kris.eng.vtt

25.2 KB

Towards Reliable Storage of 56-bit Secrets in Human Memory - Joseph Bonneau, Stuart Schechter.eng.json

1.2 MB

Towards Reliable Storage of 56-bit Secrets in Human Memory - Joseph Bonneau, Stuart Schechter.eng.lrc

31.3 KB

Towards Reliable Storage of 56-bit Secrets in Human Memory - Joseph Bonneau, Stuart Schechter.eng.srt

30.0 KB

Towards Reliable Storage of 56-bit Secrets in Human Memory - Joseph Bonneau, Stuart Schechter.eng.text

21.1 KB

Towards Reliable Storage of 56-bit Secrets in Human Memory - Joseph Bonneau, Stuart Schechter.eng.tsv

26.8 KB

Towards Reliable Storage of 56-bit Secrets in Human Memory - Joseph Bonneau, Stuart Schechter.eng.txt

31.7 KB

Towards Reliable Storage of 56-bit Secrets in Human Memory - Joseph Bonneau, Stuart Schechter.eng.vtt

27.5 KB

TRUESET Faster Verifiable et Computations - Ahmed E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Mahmoud F. Sayed, Elaine Shi, Nikos Triandopoulos.eng.json

1.0 MB

TRUESET Faster Verifiable et Computations - Ahmed E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Mahmoud F. Sayed, Elaine Shi, Nikos Triandopoulos.eng.lrc

28.9 KB

TRUESET Faster Verifiable et Computations - Ahmed E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Mahmoud F. Sayed, Elaine Shi, Nikos Triandopoulos.eng.srt

23.6 KB

TRUESET Faster Verifiable et Computations - Ahmed E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Mahmoud F. Sayed, Elaine Shi, Nikos Triandopoulos.eng.text

18.9 KB

TRUESET Faster Verifiable et Computations - Ahmed E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Mahmoud F. Sayed, Elaine Shi, Nikos Triandopoulos.eng.tsv

24.4 KB

TRUESET Faster Verifiable et Computations - Ahmed E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Mahmoud F. Sayed, Elaine Shi, Nikos Triandopoulos.eng.txt

29.3 KB

TRUESET Faster Verifiable et Computations - Ahmed E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Mahmoud F. Sayed, Elaine Shi, Nikos Triandopoulos.eng.vtt

22.2 KB

Understanding the Dark Side of Domain Parking - Sumayah Alrwais, Kan Yuan, Eihal Alowaisheq, Zhou Li, XiaoFeng Wang.eng.json

1.0 MB

Understanding the Dark Side of Domain Parking - Sumayah Alrwais, Kan Yuan, Eihal Alowaisheq, Zhou Li, XiaoFeng Wang.eng.lrc

26.4 KB

Understanding the Dark Side of Domain Parking - Sumayah Alrwais, Kan Yuan, Eihal Alowaisheq, Zhou Li, XiaoFeng Wang.eng.srt

28.4 KB

Understanding the Dark Side of Domain Parking - Sumayah Alrwais, Kan Yuan, Eihal Alowaisheq, Zhou Li, XiaoFeng Wang.eng.text

20.0 KB

Understanding the Dark Side of Domain Parking - Sumayah Alrwais, Kan Yuan, Eihal Alowaisheq, Zhou Li, XiaoFeng Wang.eng.tsv

23.6 KB

Understanding the Dark Side of Domain Parking - Sumayah Alrwais, Kan Yuan, Eihal Alowaisheq, Zhou Li, XiaoFeng Wang.eng.txt

26.7 KB

Understanding the Dark Side of Domain Parking - Sumayah Alrwais, Kan Yuan, Eihal Alowaisheq, Zhou Li, XiaoFeng Wang.eng.vtt

26.1 KB

USENIX SECURITY 2014 Keynote - Phone Phreaks What We Can Learn From the First Network Hackers - Phil Lapsely.eng.json

3.4 MB

USENIX SECURITY 2014 Keynote - Phone Phreaks What We Can Learn From the First Network Hackers - Phil Lapsely.eng.lrc

97.9 KB

USENIX SECURITY 2014 Keynote - Phone Phreaks What We Can Learn From the First Network Hackers - Phil Lapsely.eng.srt

79.7 KB

USENIX SECURITY 2014 Keynote - Phone Phreaks What We Can Learn From the First Network Hackers - Phil Lapsely.eng.text

55.8 KB

USENIX SECURITY 2014 Keynote - Phone Phreaks What We Can Learn From the First Network Hackers - Phil Lapsely.eng.tsv

80.7 KB

USENIX SECURITY 2014 Keynote - Phone Phreaks What We Can Learn From the First Network Hackers - Phil Lapsely.eng.txt

99.5 KB

USENIX SECURITY 2014 Keynote - Phone Phreaks What We Can Learn From the First Network Hackers - Phil Lapsely.eng.vtt

72.6 KB

USENIX Security 2014 Lightning Talks.eng.json

1.1 MB

USENIX Security 2014 Lightning Talks.eng.lrc

29.0 KB

USENIX Security 2014 Lightning Talks.eng.srt

30.4 KB

USENIX Security 2014 Lightning Talks.eng.text

22.5 KB

USENIX Security 2014 Lightning Talks.eng.tsv

26.2 KB

USENIX Security 2014 Lightning Talks.eng.txt

29.3 KB

USENIX Security 2014 Lightning Talks.eng.vtt

28.2 KB

USENIX Security 2014 Opening Remarks and Awards - Kevin Fu.eng.json

931.8 KB

USENIX Security 2014 Opening Remarks and Awards - Kevin Fu.eng.lrc

22.7 KB

USENIX Security 2014 Opening Remarks and Awards - Kevin Fu.eng.srt

26.2 KB

USENIX Security 2014 Opening Remarks and Awards - Kevin Fu.eng.text

17.6 KB

USENIX Security 2014 Opening Remarks and Awards - Kevin Fu.eng.tsv

20.4 KB

USENIX Security 2014 Opening Remarks and Awards - Kevin Fu.eng.txt

22.9 KB

USENIX Security 2014 Opening Remarks and Awards - Kevin Fu.eng.vtt

23.8 KB

When Governments Hack Opponents A Look at Actors and Technology - William R. Marczak, John Scott-Railton, Morgan Marquis-Boire, Vern Paxson.eng.json

953.9 KB

When Governments Hack Opponents A Look at Actors and Technology - William R. Marczak, John Scott-Railton, Morgan Marquis-Boire, Vern Paxson.eng.lrc

26.6 KB

When Governments Hack Opponents A Look at Actors and Technology - William R. Marczak, John Scott-Railton, Morgan Marquis-Boire, Vern Paxson.eng.srt

23.4 KB

When Governments Hack Opponents A Look at Actors and Technology - William R. Marczak, John Scott-Railton, Morgan Marquis-Boire, Vern Paxson.eng.text

17.3 KB

When Governments Hack Opponents A Look at Actors and Technology - William R. Marczak, John Scott-Railton, Morgan Marquis-Boire, Vern Paxson.eng.tsv

22.3 KB

When Governments Hack Opponents A Look at Actors and Technology - William R. Marczak, John Scott-Railton, Morgan Marquis-Boire, Vern Paxson.eng.txt

27.0 KB

When Governments Hack Opponents A Look at Actors and Technology - William R. Marczak, John Scott-Railton, Morgan Marquis-Boire, Vern Paxson.eng.vtt

21.7 KB

X-Force Force-Executing Binary Programs for Security Applications - Fei Peng, Zhui Deng, Xiangyu Zhang, Dongyan Xu, Zhiqiang Lin, Zhendong Su.eng.json

892.9 KB

X-Force Force-Executing Binary Programs for Security Applications - Fei Peng, Zhui Deng, Xiangyu Zhang, Dongyan Xu, Zhiqiang Lin, Zhendong Su.eng.lrc

24.2 KB

X-Force Force-Executing Binary Programs for Security Applications - Fei Peng, Zhui Deng, Xiangyu Zhang, Dongyan Xu, Zhiqiang Lin, Zhendong Su.eng.srt

24.2 KB

X-Force Force-Executing Binary Programs for Security Applications - Fei Peng, Zhui Deng, Xiangyu Zhang, Dongyan Xu, Zhiqiang Lin, Zhendong Su.eng.text

16.5 KB

X-Force Force-Executing Binary Programs for Security Applications - Fei Peng, Zhui Deng, Xiangyu Zhang, Dongyan Xu, Zhiqiang Lin, Zhendong Su.eng.tsv

20.7 KB

X-Force Force-Executing Binary Programs for Security Applications - Fei Peng, Zhui Deng, Xiangyu Zhang, Dongyan Xu, Zhiqiang Lin, Zhendong Su.eng.txt

24.5 KB

X-Force Force-Executing Binary Programs for Security Applications - Fei Peng, Zhui Deng, Xiangyu Zhang, Dongyan Xu, Zhiqiang Lin, Zhendong Su.eng.vtt

22.0 KB

XRay Enhancing the Web’s Transparency with Differential Correlation - Mathias Lecuyer, Guillaume Ducoffe, Francis Lan, Andrei Papancea, Theofilos Petsios, Riley Spahn, Augustin Cha.eng.json

1.2 MB

XRay Enhancing the Web’s Transparency with Differential Correlation - Mathias Lecuyer, Guillaume Ducoffe, Francis Lan, Andrei Papancea, Theofilos Petsios, Riley Spahn, Augustin Cha.eng.lrc

36.3 KB

XRay Enhancing the Web’s Transparency with Differential Correlation - Mathias Lecuyer, Guillaume Ducoffe, Francis Lan, Andrei Papancea, Theofilos Petsios, Riley Spahn, Augustin Cha.eng.srt

26.3 KB

XRay Enhancing the Web’s Transparency with Differential Correlation - Mathias Lecuyer, Guillaume Ducoffe, Francis Lan, Andrei Papancea, Theofilos Petsios, Riley Spahn, Augustin Cha.eng.text

19.2 KB

XRay Enhancing the Web’s Transparency with Differential Correlation - Mathias Lecuyer, Guillaume Ducoffe, Francis Lan, Andrei Papancea, Theofilos Petsios, Riley Spahn, Augustin Cha.eng.tsv

28.8 KB

XRay Enhancing the Web’s Transparency with Differential Correlation - Mathias Lecuyer, Guillaume Ducoffe, Francis Lan, Andrei Papancea, Theofilos Petsios, Riley Spahn, Augustin Cha.eng.txt

37.0 KB

XRay Enhancing the Web’s Transparency with Differential Correlation - Mathias Lecuyer, Guillaume Ducoffe, Francis Lan, Andrei Papancea, Theofilos Petsios, Riley Spahn, Augustin Cha.eng.vtt

24.2 KB

Z0 An Optimizing Distributing Zero-Knowledge Compiler - Matthew Fredrikson, Benjamin Livshits.eng.json

968.6 KB

Z0 An Optimizing Distributing Zero-Knowledge Compiler - Matthew Fredrikson, Benjamin Livshits.eng.lrc

25.0 KB

Z0 An Optimizing Distributing Zero-Knowledge Compiler - Matthew Fredrikson, Benjamin Livshits.eng.srt

25.7 KB

Z0 An Optimizing Distributing Zero-Knowledge Compiler - Matthew Fredrikson, Benjamin Livshits.eng.text

19.3 KB

Z0 An Optimizing Distributing Zero-Knowledge Compiler - Matthew Fredrikson, Benjamin Livshits.eng.tsv

22.4 KB

Z0 An Optimizing Distributing Zero-Knowledge Compiler - Matthew Fredrikson, Benjamin Livshits.eng.txt

25.2 KB

Z0 An Optimizing Distributing Zero-Knowledge Compiler - Matthew Fredrikson, Benjamin Livshits.eng.vtt

23.9 KB

/.../USENIX Security 2014 Presentations/

A Bayesian Approach to Privacy Enforcement in Smartphones - Omer Tripp, Julia Rubin.pdf

2.1 MB

A Bayesian Approach to Privacy Enforcement in Smartphones Slides - Omer Tripp, Julia Rubin.pdf

5.6 MB

A Large-Scale Analysis of the Security of Embedded Firmwares - Andrei Costin, Jonas Zaddach, Aurelien Francillon, and Davide Balzarotti.pdf

691.2 KB

A Large-Scale Analysis of the Security of Embedded Firmwares Slides - Andrei Costin, Jonas Zaddach, Aurelien Francillon, and Davide Balzarotti.pdf

3.1 MB

A Large-Scale Empirical Analysis of Chinese Web Passwords - Zhigong Li, Weili Han, Wenyuan Xu.pdf

481.2 KB

A Large-Scale Empirical Analysis of Chinese Web Passwords Slides - Zhigong Li, Weili Han, Wenyuan Xu.pdf

986.6 KB

A Look at Targeted Attacks Through the Lense of an NGO - Stevens Le Blond, Adina Uritesc, Cedric Gilbert, Zheng Leong Chua, Prateek Saxena, Engin Kirda.pdf

519.6 KB

Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens - Daniel Demmler, Thomas Schneider, Michael Zohner.pdf

771.3 KB

Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens Slides - Daniel Demmler, Thomas Schneider, Michael Zohner.pdf

1.0 MB

An Internet-Wide View of Internet-Wide Scanning - Zakir Durumeric, Michael Bailey, J. Alex Halderman.pdf

489.7 KB

An Internet-Wide View of Internet-Wide Scanning Slides - Zakir Durumeric, Michael Bailey, J. Alex Halderman.pdf

4.4 MB

ASM A Programmable Interface for Extending Android Security - Stephan Heuser, Adwait Nadkarni, William Enck, Ahmad-Reza Sadeghi.pdf

381.6 KB

ASM A Programmable Interface for Extending Android Security Slides - Stephan Heuser, Adwait Nadkarni, William Enck, Ahmad-Reza Sadeghi.pdf

1.1 MB

Automatically Detecting Vulnerable Websites Before They Turn Malicious - Kyle Soska, Nicolas Christin.pdf

961.0 KB

Automatically Detecting Vulnerable Websites Before They Turn Malicious Slides - Kyle Soska, Nicolas Christin.pdf

4.7 MB

BareCloud Bare-metal Analysis-based Evasive Malware Detection - Dhilung Kirat, Giovanni Vigna, Christopher Kruegel.pdf

395.3 KB

BareCloud Bare-metal Analysis-based Evasive Malware Detection Slides - Dhilung Kirat, Giovanni Vigna, Christopher Kruegel.pdf

6.4 MB

Blanket Execution Dynamic Similarity Testing for Program Binaries and Components - Manuel Egele, Maverick Woo, Peter Chapman, David Brumley.pdf

509.6 KB

Blanket Execution Dynamic Similarity Testing for Program Binaries and Components Slides - Manuel Egele, Maverick Woo, Peter Chapman, David Brumley.pdf

953.2 KB

Brahmastra Driving Apps to Test the Security of Third-Party Components - Ravi Bhoraskar, Seungyeop Han, Jinseong Jeon, Tanzirul Azim, Shuo Chen, Jaeyeon Jung, Suman.pdf

1.6 MB

Brahmastra Driving Apps to Test the Security of Third-Party Components Slides - Ravi Bhoraskar, Seungyeop Han, Jinseong Jeon, Tanzirul Azim, Shuo Chen, Jaeyeon Jung.pdf

2.9 MB

Burst ORAM Minimizing ORAM Response Times for Bursty Access Patterns - Jonathan Dautrich, University of California, Riverside; Emil Stefanov, Elaine Shi.pdf

3.8 MB

Burst ORAM Minimizing ORAM Response Times for Bursty Access Patterns Slides - Jonathan Dautrich, University of California, Riverside; Emil Stefanov, Elaine Shi.pdf

861.3 KB

BYTEWEIGHT Learning to Recognize Functions in Binary Code - Tiffany Bao, Jonathan Burket, Maverick Woo, Rafael Turner, David Brumley.pdf

473.5 KB

BYTEWEIGHT Learning to Recognize Functions in Binary Code Slides - Tiffany Bao, Jonathan Burket, Maverick Woo, Rafael Turner, David Brumley.pdf

704.9 KB

Cardinal Pill Testing of System Virtual Machines - Hao Shi, Abdulla Alwabel, Jelena Mirkovic.pdf

384.9 KB

Cardinal Pill Testing of System Virtual Machines Slides - Hao Shi, Abdulla Alwabel, Jelena Mirkovic.pdf

367.4 KB

DSCRETE Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse - Brendan Saltaformaggio, Zhongshu Gu, Xiangyu Zhang, Dongyan.pdf

789.4 KB

DSCRETE Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse Slides - Brendan Saltaformaggio, Zhongshu Gu, Xiangyu Zhang, Dong.pdf

2.6 MB

Dynamic Hooks Hiding Control Flow Changes within Non-Control Data - Sebastian Vogl, Robert Gawlik, Behrad Garmany, Thomas Kittel, Jonas Pfoh, Claudia Eckert, Thorst.pdf

415.9 KB

Dynamic Hooks Hiding Control Flow Changes within Non-Control Data Slides - Sebastian Vogl, Robert Gawlik, Behrad Garmany, Thomas Kittel, Jonas Pfoh, Claudia Eckert.pdf

265.3 KB

Effective Attacks and Provable Defenses for Website Fingerprinting - Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, Ian Goldberg.pdf

307.7 KB

Effective Attacks and Provable Defenses for Website Fingerprinting Slides - Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, Ian Goldberg.pdf

9.1 MB

Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM - Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, Ulfar Erlingsson, Luis Lozano, Geof.pdf

321.1 KB

Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM Slides - Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, Ulfar Erlingsson, Luis Lozan.pdf

227.3 KB

Exit from Hell Reducing the Impact of Amplification DDoS Attacks - Marc Kuhrer, Thomas Hupperich, Christian Rossow, Thorsten Holz.pdf

2.2 MB

Exit from Hell Reducing the Impact of Amplification DDoS Attacks Slides - Marc Kuhrer, Thomas Hupperich, Christian Rossow, Thorsten Holz.pdf

1.1 MB

Faster Private Set Intersection Based on OT Extension - Benny Pinkas, Thomas Schneider, Michael Zohner.pdf

363.5 KB

Faster Private Set Intersection Based on OT Extension Slides - Benny Pinkas, Thomas Schneider, Michael Zohner.pdf

1.3 MB

FLUSH-RELOAD A High Resolution, Low Noise, L3 Cache Side-Channel Attack - Yuval Yarom, Katrina Falkner.pdf

330.1 KB

FLUSH-RELOAD A High Resolution, Low Noise, L3 Cache Side-Channel Attack Slides - Yuval Yarom, Katrina Falkner.pdf

465.4 KB

From the Aether to the Ethernet-Attacking the Internet using Broadcast Digital Television - Yossef Oren, Angelos D. Keromytis.pdf

708.0 KB

From the Aether to the Ethernet-Attacking the Internet using Broadcast Digital Television Slides - Yossef Oren, Angelos D. Keromytis.pdf

8.6 MB

Gyrophone Recognizing Speech from Gyroscope Signals - Yan Michalevsky, Dan Boneh, Gabi Nakibly.pdf

3.5 MB

Gyrophone Recognizing Speech from Gyroscope Signals Slides - Yan Michalevsky, Dan Boneh, Gabi Nakibly.pdf

5.7 MB

Hulk Eliciting Malicious Behavior in Browser Extensions - Alexandros Kapravelos, Chris Grier, Neha Chachra, Christopher Kruegel, Giovanni Vigna, Vern Paxson.pdf

2.0 MB

Hulk Eliciting Malicious Behavior in Browser Extensions Slides - Alexandros Kapravelos, Chris Grier, Neha Chachra, Christopher Kruegel, Giovanni Vigna, Vern Paxson.pdf

2.3 MB

Information Security War Room - Sergey Bratus, Dartmouth College, Felix FX Lindner.pdf

15.0 MB

iSeeYou Disabling the MacBook Webcam Indicator LED - Matthew Brocker, Stephen Checkoway.pdf

1.6 MB

iSeeYou Disabling the MacBook Webcam Indicator LED Slides - Matthew Brocker, Stephen Checkoway.pdf

21.4 MB

JIGSAW Protecting Resource Access by Inferring Programmer Expectations - Hayawardh Vijayakumar, Xinyang Ge, Mathias Payer, Trent Jaeger.pdf

497.2 KB

JIGSAW Protecting Resource Access by Inferring Programmer Expectations Slides - Hayawardh Vijayakumar, Xinyang Ge, Mathias Payer, Trent Jaeger.pdf

2.8 MB

LibFTE A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes - Daniel Luchaup, Kevin P. Dyer, Somesh Jha, Thomas Ristenpart, Thomas Shrimpton.pdf

2.1 MB

LibFTE A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes Slides - Daniel Luchaup, Kevin P. Dyer, Somesh Jha, Thomas Ristenpart, Thomas Shrimpt.pdf

4.3 MB

Man vs. Machine Practical Adversarial Detection of Malicious Crowdsourcing Workers - Gang Wang, Tianyi Wang, Santa Barbara, Haitao Zheng, Ben Y. Zhao.pdf

798.6 KB

Man vs. Machine Practical Adversarial Detection of Malicious Crowdsourcing Workers Slides - Gang Wang, Tianyi Wang, Santa Barbara, Haitao Zheng, Ben Y. Zhao.pdf

4.9 MB

Mimesis Aegis A Mimicry Privacy Shield-A System’s Approach to Data Privacy on Public Cloud - Billy Lau, Simon Chung, Chengyu Song, Yeongjin Jang, Wenke Lee, Alexand.pdf

881.1 KB

Mimesis Aegis A Mimicry Privacy Shield-A System’s Approach to Data Privacy on Public Cloud Slides - Billy Lau, Simon Chung, Chengyu Song, Yeongjin Jang, Wenke Lee.pdf

2.2 MB

Never Been KIST Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport - Rob Jansen, John Geddes, Chris Wacek, Micah Sherr, Paul Syverson.pdf

809.1 KB

Never Been KIST Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport Slides - Rob Jansen, John Geddes, Chris Wacek, Micah Sherr, Paul Syverson.pdf

4.6 MB

On the Effective Prevention of TLS Man-in-the-Middle Attacks in Web Applications - Nikolaos Karapanos and Srdjan Capkun.pdf

927.8 KB

On the Effective Prevention of TLS Man-in-the-Middle Attacks in Web Applications Slides - Nikolaos Karapanos and Srdjan Capkun.pdf

10.5 MB

On the Feasibility of Large-Scale Infections of iOS Devices - Tielei Wang, Yeongjin Jang, Yizheng Chen, Simon Chung, Billy Lau, Wenke Lee.pdf

541.8 KB

On the Feasibility of Large-Scale Infections of iOS Devices Slides - Tielei Wang, Yeongjin Jang, Yizheng Chen, Simon Chung, Billy Lau, Wenke Lee costin.pdf

3.1 MB

On the Feasibility of Large-Scale Infections of iOS Devices Slides - Tielei Wang, Yeongjin Jang, Yizheng Chen, Simon Chung, Billy Lau, Wenke Lee tielei.pdf

10.0 MB

On the Feasibility of Large-Scale Infections of iOS Devices Slides - Tielei Wang, Yeongjin Jang, Yizheng Chen, Simon Chung, Billy Lau, Wenke Lee.pdf

691.2 KB

On the Practical Exploitability of Dual EC in TLS Implementations - Stephen Checkoway, Matthew Fredrikson, Ruben Niederhagen, Adam Everspaugh, Matthew Green, Tanja.pdf

365.2 KB

On the Practical Exploitability of Dual EC in TLS Implementations Slides - Stephen Checkoway, Matthew Fredrikson, Ruben Niederhagen, Adam Everspaugh, Matthew Green.pdf

256.1 KB

Optimizing Seed Selection for Fuzzing - Alexandre Rebert, Sang Kil Cha, Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, David Brumley.pdf

377.5 KB

Optimizing Seed Selection for Fuzzing Slides - Alexandre Rebert, Sang Kil Cha, Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, David Brumley.pdf

1.1 MB

Oxymoron Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing - Michael Backes, Stefan Nurnberger.pdf

1.1 MB

Oxymoron Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing Slides - Michael Backes, Stefan Nurnberger.pdf

6.1 MB

Password Managers Attacks and Defenses - David Silver, Suman Jana, and Dan Boneh, Stanford University; Eric Chen, Collin Jackson.pdf

356.3 KB

Password Managers Attacks and Defenses Slides - David Silver, Suman Jana, and Dan Boneh, Stanford University; Eric Chen, Collin Jackson.pdf

2.3 MB

Password Portfolios and the Finite-Effort User Sustainably Managing Large Numbers of Accounts - Dinei Florencio, Cormac Herley, Paul C. van Oorschot.pdf

460.4 KB

Password Portfolios and the Finite-Effort User Sustainably Managing Large Numbers of Accounts Slides - Dinei Florencio, Cormac Herley, Paul C. van Oorschot.pdf

952.9 KB

Peeking into Your App without Actually Seeing It UI State Inference and Novel Android Attacks - Qi Alfred Chen, Zhiyun Qian, Z. Morley Mao.pdf

651.4 KB

Peeking into Your App without Actually Seeing It UI State Inference and Novel Android Attacks Slides - Qi Alfred Chen, Zhiyun Qian, Z. Morley Mao.pdf

3.7 MB

Precise Client-side Protection against DOM-based Cross-Site Scripting - Ben Stock, Sebastian Lekies, Tobias Mueller, Patrick Spiegel, and Martin Johns.pdf

314.6 KB

Precise Client-side Protection against DOM-based Cross-Site Scripting Slides - Ben Stock, Sebastian Lekies, Tobias Mueller, Patrick Spiegel, and Martin Johns.pdf

1.2 MB

Preventing Cryptographic Key Leakage in Cloud Virtual Machines - Erman Pattuk, Murat Kantarcioglu, Zhiqiang Lin, Huseyin Ulusoy.pdf

508.8 KB

Preventing Cryptographic Key Leakage in Cloud Virtual Machines Slides - Erman Pattuk, Murat Kantarcioglu, Zhiqiang Lin, Huseyin Ulusoy.pdf

936.6 KB

Privacy in Pharmacogenetics An End-to-End Case Study of Personalized Warfarin Dosing - Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon Lin, David Page, Thomas Ris.pdf

415.3 KB

Privacy in Pharmacogenetics An End-to-End Case Study of Personalized Warfarin Dosing Eratta - Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon Lin, David Page, Tho.pdf

63.0 KB

Privacy in Pharmacogenetics An End-to-End Case Study of Personalized Warfarin Dosing Slides - Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon Lin, David Page, Tho.pdf

13.0 MB

Privee An Architecture for Automatically Analyzing Web Privacy Policies - Sebastian Zimmeck, Steven M. Bellovin.pdf

769.7 KB

Privee An Architecture for Automatically Analyzing Web Privacy Policies Slides - Sebastian Zimmeck, Steven M. Bellovin.pdf

501.0 KB

ret2dir Rethinking Kernel Isolation - Vasileios P. Kemerlis, Michalis Polychronakis, Angelos D. Keromytis.pdf

447.6 KB

ret2dir Rethinking Kernel Isolation Slides - Vasileios P. Kemerlis, Michalis Polychronakis, Angelos D. Keromytis.pdf

2.8 MB

Revisiting SSL-TLS Implementations New Bleichenbacher Side Channels and Attacks - Christopher Meyer, Juraj Somorovsky, Eugen Weiss, Jorg Schwenk, Sebastian Schinzel.pdf

640.5 KB

Revisiting SSL-TLS Implementations New Bleichenbacher Side Channels and Attacks Slides - Christopher Meyer, Juraj Somorovsky, Eugen Weiss, Jorg Schwenk, Sebastian S.pdf

1.4 MB

ROP is Still Dangerous Breaking Modern Defenses - Nicholas Carlini, David Wagner.pdf

440.0 KB

ROP is Still Dangerous Breaking Modern Defenses Slides - Nicholas Carlini, David Wagner.pdf

221.8 KB

Scheduler-based Defenses against Cross-VM Side-channels - Venkatanathan Varadarajan, Thomas Ristenpart, Michael Swift.pdf

689.3 KB

Scheduler-based Defenses against Cross-VM Side-channels Slides - Venkatanathan Varadarajan, Thomas Ristenpart, Michael Swift.pdf

3.9 MB

SDDR Light-Weight, Secure Mobile Encounters - Matthew Lentz, Viktor Erdélyi, Paarijaat Aditya, Elaine Shi, Peter Druschel, Bobby Bhattacharjee.pdf

2.3 MB

SDDR Light-Weight, Secure Mobile Encounters Slides - Matthew Lentz, Viktor Erdélyi, Paarijaat Aditya, Elaine Shi, Peter Druschel, Bobby Bhattacharjee.pdf

3.1 MB

Security Analysis of a Full-Body Scanner - Keaton Mowery, Eric Wustrow, Tom Wypych, Corey Singleton, Chris Comfort, Eric Rescorla, Stephen Checkoway, J. Alex Halder.pdf

4.1 MB

Security Analysis of a Full-Body Scanner Slides - Keaton Mowery, Eric Wustrow, Tom Wypych, Corey Singleton, Chris Comfort, Eric Rescorla, Stephen Checkoway, J. Alex.pdf

8.2 MB

Size Does Matter Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard - Enes Goktas, Elias Athanasopoulos, Michalis Polychronakis, Herbert Bos.pdf

538.4 KB

Size Does Matter Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard Slides - Enes Goktas, Elias Athanasopoulos, Michalis Polychronakis, Herbert Bos.pdf

2.1 MB

SpanDex Secure Password Tracking for Android - Landon P. Cox , Peter Gilbert, Geoffrey Lawler, Valentin Pistol, Ali Razeen, Bi Wu, Sai Cheemalapati.pdf

460.0 KB

SpanDex Secure Password Tracking for Android Slides - Landon P. Cox , Peter Gilbert, Geoffrey Lawler, Valentin Pistol, Ali Razeen, Bi Wu, Sai Cheemalapati.pdf

4.4 MB

SSOScan Automated Testing of Web Applications for Single Sign-On Vulnerabilities - Yuchen Zhou, David Evans.pdf

646.8 KB

SSOScan Automated Testing of Web Applications for Single Sign-On Vulnerabilities Slides - Yuchen Zhou, David Evans.pdf

2.3 MB

Static Detection of Second-Order Vulnerabilities in Web Applications - Johannes Dahse, Thorsten Holz.pdf

371.6 KB

Static Detection of Second-Order Vulnerabilities in Web Applications Slides - Johannes Dahse, Thorsten Holz.pdf

982.8 KB

Stitching the Gadgets On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection - Lucas Davi, Ahmad-Reza Sadeghi, Daniel Lehmann, Fabian Monrose.pdf

749.1 KB

Stitching the Gadgets On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection Slides - Lucas Davi, Ahmad-Reza Sadeghi, Daniel Lehmann, Fabian Mon.pdf

2.4 MB

Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture - Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza.pdf

519.1 KB

Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture Slides - Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza.pdf

1.5 MB

TapDance End-to-Middle Anticensorship without Flow Blocking - Eric Wustrow, Colleen M. Swanson, J. Alex Halderman.pdf

585.9 KB

TapDance End-to-Middle Anticensorship without Flow Blocking Slides - Eric Wustrow, Colleen M. Swanson, J. Alex Halderman.pdf

1.7 MB

Targeted Threat Index Characterizing and Quantifying Politically-Motivated Targeted Malware - Seth Hardy, Masashi Crete-Nishihata, Katharine Kleemola, Adam Senft, B.pdf

3.9 MB

Telepathwords Preventing Weak Passwords by Reading Users’ Minds - Saranga Komanduri, Richard Shay, Lorrie Faith Cranor, Cormac Herley Stuart Schechter.pdf

811.5 KB

Telepathwords Preventing Weak Passwords by Reading Users’ Minds Slides - Saranga Komanduri, Richard Shay, Lorrie Faith Cranor, Cormac Herley Stuart Schechter.pdf

2.9 MB

The Emperor’s New Password Manager Security Analysis of Web-based Password Managers - Zhiwei Li, Warren He, Devdatta Akhawe, Dawn Song.pdf

624.5 KB

The Emperor’s New Password Manager Security Analysis of Web-based Password Managers Slides - Zhiwei Li, Warren He, Devdatta Akhawe, Dawn Song.pdf

5.7 MB

The Long Taile of Typosquatting Domain Names - Janos Szurdi, Balazs Kocso, Gabor Cseh, Jonathan Spring, Mark Felegyhazi, Chris Kanich.pdf

2.0 MB

The Long Taile of Typosquatting Domain Names Slides - Janos Szurdi, Balazs Kocso, Gabor Cseh, Jonathan Spring, Mark Felegyhazi, Chris Kanich.pdf

2.1 MB

Towards Detecting Anomalous User Behavior in Online Social Networks - Bimal Viswanath, M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna P. Gummadi, Max Planck, .pdf

500.6 KB

Towards Detecting Anomalous User Behavior in Online Social Networks Slides - Bimal Viswanath, M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna P. Gummadi, Max P.pdf

3.0 MB

Towards Reliable Storage of 56-bit Secrets in Human Memory - Joseph Bonneau, Princeton University; Stuart Schechter.pdf

427.4 KB

Towards Reliable Storage of 56-bit Secrets in Human Memory Slides - Joseph Bonneau, Princeton University; Stuart Schechter.pdf

2.3 MB

TRUESET Faster Verifiable Set Computations - Ahmed E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Mahmoud F. Sayed, Elaine Shi, Nikos Triandopoulos.pdf

2.5 MB

TRUESET Faster Verifiable Set Computations Slides - Ahmed E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Mahmoud F. Sayed, Elaine Shi, Nikos Triandopoul.pdf

1.2 MB

Understanding the Dark Side of Domain Parking - Sumayah Alrwais, Kan Yuan, Eihal Alowaisheq, Zhou Li, XiaoFeng Wang.pdf

1.5 MB

When Governments Hack Opponents A Look at Actors and Technology - William R. Marczak, John Scott-Railton, Morgan Marquis-Boire, Vern Paxson.pdf

5.5 MB

X-Force Force-Executing Binary Programs for Security Applications - Fei Peng, Zhui Deng, Xiangyu Zhang, and Dongyan Xu, Purdue University; Zhiqiang Lin, The Univers.pdf

1.0 MB

X-Force Force-Executing Binary Programs for Security Applications Slides - Fei Peng, Zhui Deng, Xiangyu Zhang, and Dongyan Xu, Purdue University; Zhiqiang Lin, The.pdf

516.4 KB

XRay Enhancing the Web’s Transparency with Differential Correlation - Mathias Lecuyer, Guillaume Ducoffe, Francis Lan, Andrei Papancea, Theofilos Petsios, Riley Spa.pdf

467.8 KB

XRay Enhancing the Web’s Transparency with Differential Correlation Slides - Mathias Lecuyer, Guillaume Ducoffe, Francis Lan, Andrei Papancea, Theofilos Petsios, Ri.pdf

1.0 MB

Z0 An Optimizing Distributing Zero-Knowledge Compiler - Matthew Fredrikson, Benjamin Livshits.pdf

599.6 KB

/.../USENIX Security 2014 Technical Sessions_files/

acmqueue_150x48_3.png

4.5 KB

acmqueue_150x48_3_002.png

3.1 KB

admin_150x60.png

4.2 KB

admin_150x60_002.png

7.0 KB

all.js

3.2 KB

analytics.js

45.2 KB

application-octet-stream.png

0.2 KB

application-pdf.png

0.3 KB

audio_16.png

0.5 KB

cbgapi.loaded_0

144.0 KB

cbgapi.loaded_1

97.1 KB

crc_press_150x60.png

3.9 KB

crc_press_150x60_002.png

13.7 KB

cryptography_research_150x46.png

5.8 KB

cryptography_research_150x46_002.png

7.8 KB

css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css

5.6 KB

css_JfUmRW-Hr0U8TZVXkaC2BcGIYyK5guphAqwPzo1s5JM.css

11.9 KB

css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css

1.5 KB

css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css

0.1 KB

css_XQfCg5kiuU6ACblHn3rDXdgaKZR8AxbhrQR4Gznu5qA.css

257.3 KB

dmtf_600x240.png

2.5 KB

dmtf_600x240_002.png

4.1 KB

facebook_150x50_0.png

6.7 KB

facebook_150x50_0_002.png

8.9 KB

fastbutton.htm

1.8 KB

fastbutton_002.htm

1.7 KB

google_logo_300x110.png

12.5 KB

google_logo_300x110_002.png

5.6 KB

hpcwire_150x55_0.png

3.8 KB

hpcwire_150x55_0_002.png

10.1 KB

ibm_research_150x60.png

4.1 KB

ibm_research_150x60_002.png

6.0 KB

ie.htm

30.2 KB

infosecnews_150x38.png

3.1 KB

infosecnews_150x38_002.png

4.9 KB

js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js

20.5 KB

js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js

1.4 KB

js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js

120.3 KB

js_ILONILlX06kZtY3IVUMaeuMs_GJ1hSJY46daikoF9fA.js

99.4 KB

js_sWOO4PbSe161nCKWEJProMMhdbu_pfXMDzdRrMGBIE0.js

47.6 KB

js_yui9lDPs2dTDFfQPtmwCCL63T1k2MGsGrsTM-7Eo2Ts.js

32.8 KB

lapsley-phil_100x115.jpg

6.3 KB

linux_pro_150x60.png

2.9 KB

linux_pro_150x60_002.png

5.0 KB

lxer_150x60.png

6.6 KB

lxer_150x60_002.png

3.7 KB

microsoft_research_150x42_2.png

3.2 KB

microsoft_research_150x42_2_002.png

2.8 KB

nostarch_600x240_1.png

3.9 KB

nostarch_600x240_1_002.png

1.6 KB

nsf_150x60_v2.png

4.8 KB

nsf_150x60_v2_002.png

7.3 KB

oreilly_150x60.png

2.5 KB

oreilly_150x60_002.png

3.6 KB

package-x-generic.png

0.3 KB

pdf_16.png

0.3 KB

plusone.js

49.0 KB

postmessageRelay.htm

0.7 KB

qualcomm_150x22.png

1.9 KB

qualcomm_150x22_002.png

2.9 KB

slides_16.png

1.3 KB

usenix-locked.png

1.4 KB

userfriendly_150x60.png

3.0 KB

userfriendly_150x60_002.png

8.4 KB

video_16.png

1.4 KB

virus_bulletin_150x60.png

5.2 KB

virus_bulletin_150x60_002.png

3.0 KB

widgets.js

98.5 KB

/.../USENIX Security 2014 Technical Sessions_files/postmessageRelay_data/

829555168-postmessagerelay.js

10.0 KB

cbgapi.loaded_0

54.9 KB

rpcshindig_random.js

13.0 KB

/.../USENIX Security 2014 USENIX_files/

acmqueue_150x48_3.png

4.5 KB

acmqueue_150x48_3_002.png

3.1 KB

admin_150x60.png

4.2 KB

admin_150x60_002.png

7.0 KB

all.js

3.2 KB

analytics.js

45.2 KB

cbgapi.loaded_0

144.0 KB

cbgapi.loaded_1

97.1 KB

crc_press_150x60.png

3.9 KB

crc_press_150x60_002.png

13.7 KB

cryptography_research_150x46.png

7.8 KB

cryptography_research_150x46_002.png

5.8 KB

css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css

5.6 KB

css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css

1.5 KB

css_SKdvFJ9YoZ2Zlnl17QxUbae5QC-NQDrH8ynBbHJFAaM.css

9.2 KB

css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css

0.1 KB

css_XQfCg5kiuU6ACblHn3rDXdgaKZR8AxbhrQR4Gznu5qA.css

257.3 KB

dmtf_600x240.png

2.5 KB

dmtf_600x240_002.png

4.1 KB

facebook_150x50_0.png

6.7 KB

facebook_150x50_0_002.png

8.9 KB

fastbutton.htm

1.8 KB

fastbutton_002.htm

1.7 KB

google_logo_300x110.png

12.5 KB

google_logo_300x110_002.png

5.6 KB

hpcwire_150x55_0.png

3.8 KB

hpcwire_150x55_0_002.png

10.1 KB

ibm_research_150x60.png

4.1 KB

ibm_research_150x60_002.png

6.0 KB

ie.htm

30.2 KB

infosecnews_150x38.png

3.1 KB

infosecnews_150x38_002.png

4.9 KB

js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js

20.5 KB

js_5eZSC3tfzCwTta-_4qxrBau4YdctcIhVqovRK7sPRFo.js

107.7 KB

js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js

1.4 KB

js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js

120.3 KB

js_nPhKWi17GlWfUPto14Dqfk5lpAFMD2XUrRDYY3jnD2c.js

23.0 KB

js_sWOO4PbSe161nCKWEJProMMhdbu_pfXMDzdRrMGBIE0.js

47.6 KB

linux_pro_150x60.png

2.9 KB

linux_pro_150x60_002.png

5.0 KB

lxer_150x60.png

6.6 KB

lxer_150x60_002.png

3.7 KB

microsoft_research_150x42_2.png

3.2 KB

microsoft_research_150x42_2_002.png

2.8 KB

nostarch_600x240_1.png

3.9 KB

nostarch_600x240_1_002.png

1.6 KB

nsf_150x60_v2.png

7.3 KB

nsf_150x60_v2_002.png

4.8 KB

oreilly_150x60.png

2.5 KB

oreilly_150x60_002.png

3.6 KB

plusone.js

49.0 KB

postmessageRelay.htm

0.7 KB

qualcomm_150x22.png

2.9 KB

qualcomm_150x22_002.png

1.9 KB

sec14_media.png

30.6 KB

userfriendly_150x60.png

8.4 KB

userfriendly_150x60_002.png

3.0 KB

virus_bulletin_150x60.png

5.2 KB

virus_bulletin_150x60_002.png

3.0 KB

widgets.js

98.5 KB

/.../USENIX Security 2014 USENIX_files/postmessageRelay_data/

829555168-postmessagerelay.js

10.0 KB

cbgapi.loaded_0

54.9 KB

rpcshindig_random.js

13.0 KB

/USENIX Security 2015/

All Your Biases Belong to Us - Breaking RC4 in WPA-TKIP and TLS.mp4

77.3 MB

Cloudy with a Chance of Breach - Forecasting Cyber Security Incidents.mp4

38.3 MB

Conducting Usable Security Studies - It s Complicated.mp4

281.2 MB

Inherent Cyber Insecurity and Our National Security - Surviving on a Diet of Poisoned Fruit.mp4

315.7 MB

Investigating the Computer Security Practices and Needs of Journalists.mp4

57.3 MB

Post-Mortem of a Zombie - Conficker Cleanup After Six Years.mp4

56.1 MB

Preventing Security Bugs through Software Design.mp4

190.7 MB

RAPTOR - Routing Attacks on Privacy in Tor.mp4

32.2 MB

Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors.mp4

83.5 MB

Sound-Proof - Usable Two-Factor Authentication Based on Ambient Sound.mp4

38.0 MB

Technical Sessions 2015 USENIX.htm

544.5 KB

The Unexpected Dangers of Dynamic JavaScript.mp4

32.5 MB

Towards Discovering and Understanding Task Hijacking in Android.mp4

83.4 MB

Trustworthy Whole-System Provenance for the Linux Kernel.mp4

89.6 MB

Type Casting Verification - Stopping an Emerging Attack Vector.mp4

46.1 MB

USENIX Security 2015 Full Proceedings erratum.pdf

30.1 KB

USENIX Security 2015 Full Proceedings Interior.pdf

35.5 MB

USENIX Security 2015 Full Proceedings Supplement.pdf

481.6 KB

USENIX Security 2015 Full Proceedings.epub

55.5 MB

USENIX Security 2015 Full Proceedings.mobi

74.7 MB

USENIX Security 2015 Full Proceedings.pdf

35.8 MB

USENIX Security 2015 USENIX.htm

100.6 KB

Why Johnny and Janie Can’t Code Safely - Bringing Software Assurance to the Masses.mp4

301.5 MB

/.../Technical Sessions 2015 USENIX_files/

acmqueue_150x48_3.png

3.1 KB

acmqueue_150x48_3_002.png

4.5 KB

admin_150x60.png

4.2 KB

admin_150x60_002.png

7.0 KB

all.js

3.2 KB

analytics.js

45.2 KB

application-octet-stream.png

0.2 KB

application-pdf.png

0.3 KB

audio_16.png

0.5 KB

cbgapi.loaded_0

144.0 KB

cbgapi.loaded_1

97.1 KB

conference-schedule-pdf.png

0.3 KB

craigslist_150x35_1.png

3.3 KB

craigslist_150x35_1_002.png

2.1 KB

crc_press_150x60.png

3.9 KB

crc_press_150x60_002.png

13.7 KB

css_0tsfTZCLp9yBXG5eWU1vu1kZaV3OzOpnDDjEGiL42Cs.css

17.4 KB

css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css

5.6 KB

css_IBrrqJUtXAVsLrrlZ8VqVTS3di7E2-x10BVJwZwbroU.css

260.3 KB

css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css

1.5 KB

css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css

0.1 KB

danzig_richard_115x125.jpg

9.9 KB

dmtf_600x240.png

2.5 KB

dmtf_600x240_002.png

4.1 KB

eff_horizontal_150x66_1.png

7.0 KB

eff_horizontal_150x66_1_002.png

4.2 KB

facebook_150x50_3.png

8.9 KB

facebook_150x50_3_002.png

6.7 KB

facebook-icon.jpeg

1.7 KB

fastbutton.htm

1.8 KB

fastbutton_002.htm

1.7 KB

google_6.png

3.2 KB

google_6_002.png

7.8 KB

googleplus-icon.jpg

1.7 KB

hpcwire_150x55_0.png

3.8 KB

hpcwire_150x55_0_002.png

10.1 KB

ie.htm

30.2 KB

ieee_cybersecurity_150x73.png

12.5 KB

ieee_cybersecurity_150x73_002.png

10.2 KB

infosecnews_150x38.png

3.1 KB

infosecnews_150x38_002.png

4.9 KB

in-icon.jpeg

1.9 KB

js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js

20.5 KB

js_2sjNGyfj3O57w8bimxly5mzgG70GrcIxxxYOEInwu1Q.js

57.0 KB

js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js

1.4 KB

js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js

120.3 KB

js_ILONILlX06kZtY3IVUMaeuMs_GJ1hSJY46daikoF9fA.js

99.4 KB

js_yui9lDPs2dTDFfQPtmwCCL63T1k2MGsGrsTM-7Eo2Ts.js

32.8 KB

linux_journal_150x72_2.png

6.6 KB

linux_journal_150x72_2_002.png

10.3 KB

linux_pro_150x60.png

2.9 KB

linux_pro_150x60_002.png

5.0 KB

microsoft_150x60_0.png

4.5 KB

microsoft_150x60_0_002.png

3.8 KB

nostarch_600x240_1.png

3.9 KB

nostarch_600x240_1_002.png

1.6 KB

nsf_150x60_v2.png

4.8 KB

nsf_150x60_v2_002.png

7.3 KB

oxford_university_press_150x55.png

7.8 KB

oxford_university_press_150x55_002.png

6.9 KB

package-x-generic.png

0.3 KB

pdf_16.png

0.3 KB

peerj_600x240.png

1.0 KB

plusone.js

49.0 KB

postmessageRelay.htm

0.7 KB

qualcomm_150x22.png

1.9 KB

qualcomm_150x22_002.png

2.9 KB

sec16_button_180.png

39.2 KB

slides_16.png

1.3 KB

symantec_logo_1.png

11.5 KB

symantec_logo_1_002.png

5.1 KB

twitter-icon.jpeg

1.7 KB

usenix-locked.png

1.4 KB

userfriendly_150x60.png

3.0 KB

userfriendly_150x60_002.png

8.4 KB

video_16.png

1.4 KB

virus_bulletin_150x60.png

5.2 KB

virus_bulletin_150x60_002.png

3.0 KB

widgets.js

98.5 KB

youtube-icon.jpg

1.7 KB

/.../Technical Sessions 2015 USENIX_files/postmessageRelay_data/

829555168-postmessagerelay.js

10.0 KB

cbgapi.loaded_0

54.9 KB

rpcshindig_random.js

13.0 KB

/.../USENIX Security 2015 captions/

All Your Biases Belong to Us - Breaking RC4 in WPA-TKIP and TLS.eng.srt

34.8 KB

Cloudy with a Chance of Breach - Forecasting Cyber Security Incidents.eng.srt

33.8 KB

Conducting Usable Security Studies - It s Complicated.eng.srt

128.4 KB

Inherent Cyber Insecurity and Our National Security - Surviving on a Diet of Poisoned Fruit.eng.srt

119.3 KB

Investigating the Computer Security Practices and Needs of Journalists.eng.srt

42.7 KB

Post-Mortem of a Zombie - Conficker Cleanup After Six Years.eng.srt

28.0 KB

Preventing Security Bugs through Software Design.eng.srt

110.0 KB

RAPTOR - Routing Attacks on Privacy in Tor.eng.srt

24.8 KB

Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors.eng.srt

19.6 KB

Sound-Proof - Usable Two-Factor Authentication Based on Ambient Sound.eng.srt

34.2 KB

The Unexpected Dangers of Dynamic JavaScript.eng.srt

40.3 KB

Towards Discovering and Understanding Task Hijacking in Android.eng.srt

26.8 KB

Trustworthy Whole-System Provenance for the Linux Kernel.eng.srt

40.5 KB

Type Casting Verification - Stopping an Emerging Attack Vector.eng.srt

33.3 KB

Why Johnny and Janie Can’t Code Safely - Bringing Software Assurance to the Masses.eng.srt

110.0 KB

/.../USENIX Security 2015 Presentations/

sec15_contents-update.pdf

79.1 KB

sec15_erratum.pdf

30.1 KB

sec15_full_proceedings.pdf

35.7 MB

sec15_full_proceedings_interior.pdf

35.5 MB

sec15_message.pdf

43.9 KB

sec15_proceedings_cover.pdf

553.0 KB

sec15_supplement.pdf

481.6 KB

sec15_title_organizers.pdf

48.0 KB

/.../USENIX Security 2015 USENIX_files/

acmqueue_150x48_3.png

3.1 KB

acmqueue_150x48_3_002.png

4.5 KB

admin_150x60.png

4.2 KB

admin_150x60_002.png

7.0 KB

all.js

3.2 KB

analytics.js

45.2 KB

cbgapi.loaded_0

144.0 KB

cbgapi.loaded_1

97.1 KB

craigslist_150x35_1.png

3.3 KB

craigslist_150x35_1_002.png

2.1 KB

crc_press_150x60.png

3.9 KB

crc_press_150x60_002.png

13.7 KB

css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css

5.6 KB

css_IBrrqJUtXAVsLrrlZ8VqVTS3di7E2-x10BVJwZwbroU.css

260.3 KB

css_m9t3SZ2dKv6HQuOuf0zINIRA5GjP4lkCCtmRRbSjaXs.css

14.7 KB

css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css

1.5 KB

css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css

0.1 KB

dmtf_600x240.png

2.5 KB

dmtf_600x240_002.png

4.1 KB

eff_horizontal_150x66_1.png

7.0 KB

eff_horizontal_150x66_1_002.png

4.2 KB

facebook_150x50_3.png

8.9 KB

facebook_150x50_3_002.png

6.7 KB

facebook-icon.jpeg

1.7 KB

fastbutton.htm

1.8 KB

fastbutton_002.htm

1.7 KB

google_6.png

3.2 KB

google_6_002.png

7.8 KB

googleplus-icon.jpg

1.7 KB

hpcwire_150x55_0.png

3.8 KB

hpcwire_150x55_0_002.png

10.1 KB

ie.css

0.5 KB

ieee_cybersecurity_150x73.png

12.5 KB

ieee_cybersecurity_150x73_002.png

10.2 KB

infosecnews_150x38.png

3.1 KB

infosecnews_150x38_002.png

4.9 KB

in-icon.jpeg

1.9 KB

js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js

20.5 KB

js_2sjNGyfj3O57w8bimxly5mzgG70GrcIxxxYOEInwu1Q.js

57.0 KB

js_5eZSC3tfzCwTta-_4qxrBau4YdctcIhVqovRK7sPRFo.js

107.7 KB

js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js

1.4 KB

js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js

120.3 KB

js_nPhKWi17GlWfUPto14Dqfk5lpAFMD2XUrRDYY3jnD2c.js

23.0 KB

linux_journal_150x72_2.png

6.6 KB

linux_journal_150x72_2_002.png

10.3 KB

linux_pro_150x60.png

2.9 KB

linux_pro_150x60_002.png

5.0 KB

microsoft_150x60_0.png

4.5 KB

microsoft_150x60_0_002.png

3.8 KB

nostarch_600x240_1.png

3.9 KB

nostarch_600x240_1_002.png

1.6 KB

nsf_150x60_v2.png

4.8 KB

nsf_150x60_v2_002.png

7.3 KB

oxford_university_press_150x55.png

7.8 KB

oxford_university_press_150x55_002.png

6.9 KB

peerj_600x240.png

1.0 KB

plusone.js

49.0 KB

postmessageRelay.htm

0.7 KB

qualcomm_150x22.png

1.9 KB

qualcomm_150x22_002.png

2.9 KB

sec15_media.htm

0.1 KB

sec16_button_180.png

39.2 KB

symantec_logo_1.png

11.5 KB

symantec_logo_1_002.png

5.1 KB

twitter-icon.jpeg

1.7 KB

userfriendly_150x60.png

3.0 KB

userfriendly_150x60_002.png

8.4 KB

virus_bulletin_150x60.png

5.2 KB

virus_bulletin_150x60_002.png

3.0 KB

widgets.js

98.5 KB

youtube-icon.jpg

1.7 KB

/.../USENIX Security 2015 USENIX_files/postmessageRelay_data/

829555168-postmessagerelay.js

10.0 KB

cbgapi.loaded_0

54.9 KB

rpcshindig_random.js

13.0 KB

/USENIX Security 2016/

2016 Test of Time Award Panel.mp4

33.7 MB

A Comprehensive Measurement Study of Domain Generating Malware.mp4

13.9 MB

All Your Queries Are Belong to Us The Power of File-Injection Attacks.mp4

9.3 MB

AMD x86 Memory Encryption Technologies.mp4

24.4 MB

An Empirical Study of Textual Key-Fingerprint Representations.mp4

11.7 MB

An In-Depth Analysis of Disassembly on Full-Scale x86 x64 Binaries.mp4

10.8 MB

APISan Sanitizing API Usages through Semantic Cross-Checking.mp4

11.7 MB

Ariadne A Minimal Approach to State Continuity.mp4

11.4 MB

ARMageddon Cache Attacks on Mobile Devices.mp4

11.5 MB

Authenticated Network Time Synchronization.mp4

11.9 MB

AuthLoop End-to-End Cryptographic Authentication for Telephony.mp4

14.4 MB

Automatically Detecting Error Handling Bugs Using Error Specifications.mp4

11.3 MB

Crashing Drones and Hijacked Cameras CyberTrust Meets CyberPhysical.mp4

37.2 MB

Dancing on the Lip of the Volcano Chosen Ciphertext Attacks on Apple iMessage.mp4

12.1 MB

Defending against Malicious Peripherals with Cinch.mp4

10.0 MB

DRAMA Exploiting DRAM Addressing for Cross-CPU Attacks.mp4

10.7 MB

DROWN Breaking TLS Using SSLv2.mp4

9.9 MB

Egalitarian Computing.mp4

12.2 MB

Enhancing Bitcoin Security and Performance with Strong Consistency via.mp4

11.0 MB

Fast, Lean, and Accurate Modeling Password Guessability Using Neural Networks.mp4

10.8 MB

Faster Malicious 2-Party Secure Computation with Online Offline Dual Execution.mp4

10.9 MB

Finding and Fixing Security Bugs in Flash.mp4

24.5 MB

Fingerprinting Electronic Control Units for Vehicle Intrusion Detection.mp4

11.6 MB

Flip Feng Shui Hammering a Needle in the Software Stack.mp4

12.2 MB

FlowFence Practical Data Protection for Emerging IoT Application Frameworks.mp4

12.1 MB

fTPM A Software-Only Implementation of a TPM Chip.mp4

44.8 MB

Harvesting Inconsistent Security Configurations in Custom Android ROMs.mp4

10.5 MB

Hey, You Have a Problem On the Feasibility of Large-Scale Web Vulnerability.mp4

14.2 MB

Hidden Voice Commands.mp4

12.9 MB

Identifying and Characterizing Sybils in the Tor Network.mp4

13.8 MB

Internet Jones and the Raiders of the Lost Trackers.mp4

12.6 MB

Investigating Commercial Pay-Per-Install and the Distribution of Unwanted.mp4

12.4 MB

k-fingerprinting A Robust Scalable Website Fingerprinting Technique.mp4

11.9 MB

Lock It and Still Lose It -on the (In)Security of Automotive Remote Keyless.mp4

12.8 MB

Making HTTPS the Default in the World's Largest Bureaucracy.mp4

35.0 MB

Making USB Great Again with USBFILTER.mp4

15.1 MB

Measuring PUP Prevalence and PUP Distribution through Pay-Per-Install Services.mp4

12.6 MB

Micro-Virtualization Memory Tracing to Detect and Prevent Spraying Attacks.mp4

12.6 MB

Mirror Enabling Proofs of Data Replication and Retrievability in the Cloud.mp4

16.5 MB

Oblivious Multi-Party Machine Learning on Trusted Processors.mp4

13.1 MB

OblivP2P An Oblivious Peer-to-Peer Content Sharing System.mp4

10.3 MB

Off-Path TCP Exploits Global Rate Limit Considered Dangerous.mp4

13.3 MB

On Demystifying the Android Application Framework Re-Visiting Android.mp4

11.9 MB

On Omitting Commits and Committing Omissions Preventing Git Metadata.mp4

11.5 MB

One Bit Flips, One Cloud Flops Cross-VM Row Hammer Attacks.mp4

11.6 MB

Optimized Invariant Representation of Network Traffic for Detecting Unseen.mp4

11.7 MB

PIkit A New Kernel-Independent Processor-Interconnect Rootkit.mp4

11.2 MB

Poking Holes in Information Hiding.mp4

12.1 MB

Post-quantum Key Exchange-A New Hope.mp4

18.8 MB

Practical DIFC Enforcement on Android.mp4

15.0 MB

Predicting, Decrypting, and Abusing WPA2 802.11 Group Keys.mp4

11.3 MB

Privacy and Threat in Practice Mobile Messaging by Low-Income New Yorkers.mp4

30.1 MB

Privacy in Epigenetics Temporal Linkability of MicroRNA Expression Profiles.mp4

14.0 MB

Protecting Privacy of BLE Device Users.mp4

10.6 MB

Report from the Field A CDN's Role in Repelling Attacks against Banking.mp4

21.6 MB

Request and Conquer Exposing Cross-Origin Resource Size.mp4

11.9 MB

Sanctum Minimal Hardware Extensions for Strong Software Isolation.mp4

12.2 MB

Screen after Previous Screens Spatial-Temporal Recreation of Android App.mp4

16.5 MB

Secure, Precise, and Fast Floating-Point Operations on x86 Processors.mp4

13.4 MB

Security Competitions.mp4

55.6 MB

Specification Mining for Intrusion Detection in Networked Control Systems.mp4

52.8 MB

Stealing Machine Learning Models via Prediction APIs.mp4

14.7 MB

Teaching Computer Security Thoughts from the Field.mp4

42.7 MB

Technical Sessions 2016 USENIX.htm

578.7 KB

The Cut-and-Choose Game and Its Application to Cryptographic Protocols.mp4

10.2 MB

The Ever-Changing Labyrinth A Large-Scale Analysis of Wildcard DNS Powered.mp4

14.2 MB

The Million-Key Question-Investigating the Origins of RSA Public Keys.mp4

13.7 MB

The Moral Character of Cryptographic Work.mp4

40.7 MB

The Unfalsifiability of Security Claims.mp4

39.4 MB

Thoth Comprehensive Policy Compliance in Data Retrieval Systems.mp4

13.6 MB

Towards Measuring and Mitigating Social Engineering Software Download Attacks.mp4

12.8 MB

Tracing Information Flows Between Ad Exchanges Using Retargeted Ads.mp4

10.8 MB

Trusted Browsers for Uncertain Times.mp4

10.7 MB

überSpark Enforcing Verifiable Object Abstractions for Automated.mp4

13.8 MB

Undermining Information Hiding (and What to Do about It).mp4

9.4 MB

UNVEIL A Large-Scale, Automated Approach to Detecting Ransomware.mp4

15.9 MB

USENIX Security 2016 Full Proceedings errata.pdf

95.9 KB

USENIX Security 2016 Full Proceedings errata2.pdf

104.6 KB

USENIX Security 2016 Full Proceedings Interior.pdf

45.0 MB

USENIX Security 2016 Full Proceedings.epub

68.1 MB

USENIX Security 2016 Full Proceedings.mobi

45.7 MB

USENIX Security 2016 Full Proceedings.pdf

46.1 MB

USENIX Security 2016 USENIX.htm

99.5 KB

Verifying Constant-Time Implementations.mp4

14.6 MB

Virtual U Defeating Face Liveness Detection by Building Virtual Models.mp4

12.1 MB

Website-Targeted False Content Injection by Network Operators.mp4

10.1 MB

What Cannot Be Read, Cannot Be Leveraged Revisiting Assumptions of JIT-ROP.mp4

11.0 MB

When Governments Attack Malware Targeting Activists, Lawyers, and Journalists.mp4

44.0 MB

You Are Who You Know and How You Behave Attribute Inference Attacks.mp4

11.2 MB

You've Got Vulnerability Exploring Effective Vulnerability Notifications.mp4

11.4 MB

ZKBoo Faster Zero-Knowledge for Boolean Circuits.mp4

10.6 MB

zxcvbn Low-Budget Password Strength Estimation.mp4

14.5 MB

/.../Technical Sessions 2016 USENIX_files/

acmqueue_600x240_1.png

7.0 KB

acmqueue_600x240_1_002.png

2.5 KB

admin_150x60.png

4.2 KB

admin_150x60_002.png

7.0 KB

all.js

3.2 KB

analytics.js

45.2 KB

application-octet-stream.png

0.2 KB

application-pdf.png

0.3 KB

audio_16.png

0.5 KB

bit_150x60.png

7.4 KB

bit_150x60_002.png

2.8 KB

cbgapi.loaded_0

144.0 KB

cbgapi.loaded_1

97.1 KB

cisco_150x60.png

2.1 KB

cisco_150x60_002.png

2.7 KB

conference-schedule-pdf.png

0.3 KB

crc_press_150x60.png

3.9 KB

crc_press_150x60_002.png

13.7 KB

css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css

5.6 KB

css_IBrrqJUtXAVsLrrlZ8VqVTS3di7E2-x10BVJwZwbroU.css

260.3 KB

css_m9t3SZ2dKv6HQuOuf0zINIRA5GjP4lkCCtmRRbSjaXs.css

14.7 KB

css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css

1.5 KB

css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css

0.1 KB

dmtf_600x240.png

4.1 KB

dmtf_600x240_002.png

2.5 KB

facebook_2016_150x60_1.png

2.9 KB

facebook_2016_150x60_1_002.png

2.4 KB

facebook-icon.jpeg

1.7 KB

fastbutton.htm

1.8 KB

fastbutton_002.htm

1.7 KB

google_2016_150x60_0.png

3.3 KB

google_2016_150x60_0_002.png

3.9 KB

googleplus-icon.jpg

1.7 KB

ibm_research_150x60_0.png

2.8 KB

ibm_research_150x60_0_002.png

3.3 KB

ie.htm

30.2 KB

in-icon.jpeg

1.9 KB

js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js

20.5 KB

js_2sjNGyfj3O57w8bimxly5mzgG70GrcIxxxYOEInwu1Q.js

57.0 KB

js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js

1.4 KB

js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js

120.3 KB

js_ILONILlX06kZtY3IVUMaeuMs_GJ1hSJY46daikoF9fA.js

99.4 KB

js_yui9lDPs2dTDFfQPtmwCCL63T1k2MGsGrsTM-7Eo2Ts.js

32.8 KB

linux_pro_150x60.png

2.9 KB

linux_pro_150x60_002.png

5.0 KB

lxer_150x60.png

6.6 KB

lxer_150x60_002.png

3.7 KB

microsoft_600x240_0.png

2.5 KB

microsoft_600x240_0_002.png

3.0 KB

neustar_150x60.png

4.5 KB

neustar_150x60_002.png

3.7 KB

nostarch_600x240_1.png

3.9 KB

nostarch_600x240_1_002.png

1.6 KB

nsf_150x60_v2.png

4.8 KB

nsf_150x60_v2_002.png

7.3 KB

package-x-generic.png

0.3 KB

pdf_16.png

0.3 KB

plusone.js

49.0 KB

postmessageRelay.htm

0.7 KB

sec16_button_180.png

39.2 KB

slides_16.png

1.3 KB

symantec_150x60.png

10.6 KB

symantec_150x60_002.png

5.4 KB

twitter-icon.jpeg

1.7 KB

usenix-locked.png

1.4 KB

userfriendly_150x60.png

3.0 KB

userfriendly_150x60_002.png

8.4 KB

video_16.png

1.4 KB

virus_bulletin_150x60.png

5.2 KB

virus_bulletin_150x60_002.png

3.0 KB

widgets.js

98.5 KB

wing_jeannette_100x115.png

22.3 KB

youtube-icon.jpg

1.7 KB

/.../Technical Sessions 2016 USENIX_files/postmessageRelay_data/

829555168-postmessagerelay.js

10.0 KB

cbgapi.loaded_0

54.9 KB

rpcshindig_random.js

13.0 KB

/.../USENIX Security 2016 captions/

2016 Test of Time Award Panel.eng.json

2.9 MB

2016 Test of Time Award Panel.eng.lrc

92.7 KB

2016 Test of Time Award Panel.eng.srt

63.1 KB

2016 Test of Time Award Panel.eng.text

41.9 KB

2016 Test of Time Award Panel.eng.tsv

72.0 KB

2016 Test of Time Award Panel.eng.txt

94.7 KB

2016 Test of Time Award Panel.eng.vtt

56.6 KB

A Comprehensive Measurement Study of Domain Generating Malware.eng.srt

68.3 KB

All Your Queries Are Belong to Us The Power of File-Injection Attacks.eng.srt

48.3 KB

AMD x86 Memory Encryption Technologies.eng.json

3.3 KB

AMD x86 Memory Encryption Technologies.eng.lrc

0.1 KB

AMD x86 Memory Encryption Technologies.eng.srt

0.1 KB

AMD x86 Memory Encryption Technologies.eng.text

0.0 KB

AMD x86 Memory Encryption Technologies.eng.tsv

0.1 KB

AMD x86 Memory Encryption Technologies.eng.txt

0.1 KB

AMD x86 Memory Encryption Technologies.eng.vtt

0.1 KB

An Empirical Study of Textual Key-Fingerprint Representations.eng.srt

39.3 KB

An In-Depth Analysis of Disassembly on Full-Scale x86 x64 Binaries.eng.srt

49.2 KB

APISan Sanitizing API Usages through Semantic Cross-Checking.eng.srt

45.4 KB

Ariadne A Minimal Approach to State Continuity.eng.srt

11.8 KB

ARMageddon Cache Attacks on Mobile Devices.eng.srt

53.6 KB

Authenticated Network Time Synchronization.eng.srt

48.2 KB

AuthLoop End-to-End Cryptographic Authentication for Telephony.eng.srt

54.3 KB

Automatically Detecting Error Handling Bugs Using Error Specifications.eng.srt

37.5 KB

Crashing Drones and Hijacked Cameras CyberTrust Meets CyberPhysical.eng.srt

135.3 KB

Dancing on the Lip of the Volcano Chosen Ciphertext Attacks on Apple iMessage.eng.srt

68.5 KB

Defending against Malicious Peripherals with Cinch.eng.srt

51.7 KB

DRAMA Exploiting DRAM Addressing for Cross-CPU Attacks.eng.srt

45.7 KB

DROWN Breaking TLS Using SSLv2.eng.srt

43.5 KB

Egalitarian Computing.eng.srt

46.5 KB

Enhancing Bitcoin Security and Performance with Strong Consistency via.eng.json

1.2 MB

Enhancing Bitcoin Security and Performance with Strong Consistency via.eng.lrc

33.2 KB

Enhancing Bitcoin Security and Performance with Strong Consistency via.eng.srt

31.1 KB

Enhancing Bitcoin Security and Performance with Strong Consistency via.eng.text

23.1 KB

Enhancing Bitcoin Security and Performance with Strong Consistency via.eng.tsv

28.8 KB

Enhancing Bitcoin Security and Performance with Strong Consistency via.eng.txt

33.6 KB

Enhancing Bitcoin Security and Performance with Strong Consistency via.eng.vtt

28.8 KB

Fast, Lean, and Accurate Modeling Password Guessability Using Neural Networks.eng.srt

52.7 KB

Faster Malicious 2-Party Secure Computation with Online Offline Dual Execution.eng.srt

49.3 KB

Finding and Fixing Security Bugs in Flash.eng.srt

136.6 KB

Fingerprinting Electronic Control Units for Vehicle Intrusion Detection.eng.srt

54.4 KB

Flip Feng Shui Hammering a Needle in the Software Stack.eng.srt

61.7 KB

FlowFence Practical Data Protection for Emerging IoT Application Frameworks.eng.srt

52.9 KB

fTPM A Software-Only Implementation of a TPM Chip.eng.srt

67.4 KB

Harvesting Inconsistent Security Configurations in Custom Android ROMs.eng.srt

47.4 KB

Hey, You Have a Problem On the Feasibility of Large-Scale Web Vulnerability.eng.srt

70.8 KB

Hidden Voice Commands.eng.srt

61.6 KB

Identifying and Characterizing Sybils in the Tor Network.eng.srt

52.9 KB

Internet Jones and the Raiders of the Lost Trackers.eng.srt

60.5 KB

Investigating Commercial Pay-Per-Install and the Distribution of Unwanted.eng.srt

61.5 KB

k-fingerprinting A Robust Scalable Website Fingerprinting Technique.eng.srt

55.6 KB

Lock It and Still Lose It -on the (In)Security of Automotive Remote Keyless.eng.srt

43.9 KB

Making HTTPS the Default in the World's Largest Bureaucracy.eng.json

5.0 MB

Making HTTPS the Default in the World's Largest Bureaucracy.eng.lrc

152.8 KB

Making HTTPS the Default in the World's Largest Bureaucracy.eng.srt

108.2 KB

Making HTTPS the Default in the World's Largest Bureaucracy.eng.text

79.1 KB

Making HTTPS the Default in the World's Largest Bureaucracy.eng.tsv

120.5 KB

Making HTTPS the Default in the World's Largest Bureaucracy.eng.txt

155.5 KB

Making HTTPS the Default in the World's Largest Bureaucracy.eng.vtt

100.7 KB

Making USB Great Again with USBFILTER.eng.srt

55.1 KB

Measuring PUP Prevalence and PUP Distribution through Pay-Per-Install Services.eng.json

1.1 MB

Measuring PUP Prevalence and PUP Distribution through Pay-Per-Install Services.eng.lrc

27.2 KB

Measuring PUP Prevalence and PUP Distribution through Pay-Per-Install Services.eng.srt

29.5 KB

Measuring PUP Prevalence and PUP Distribution through Pay-Per-Install Services.eng.text

21.4 KB

Measuring PUP Prevalence and PUP Distribution through Pay-Per-Install Services.eng.tsv

24.7 KB

Measuring PUP Prevalence and PUP Distribution through Pay-Per-Install Services.eng.txt

27.4 KB

Measuring PUP Prevalence and PUP Distribution through Pay-Per-Install Services.eng.vtt

27.2 KB

Micro-Virtualization Memory Tracing to Detect and Prevent Spraying Attacks.eng.srt

54.3 KB

Mirror Enabling Proofs of Data Replication and Retrievability in the Cloud.eng.srt

52.2 KB

Oblivious Multi-Party Machine Learning on Trusted Processors.eng.srt

53.6 KB

OblivP2P An Oblivious Peer-to-Peer Content Sharing System.eng.srt

43.7 KB

Off-Path TCP Exploits Global Rate Limit Considered Dangerous.eng.srt

51.3 KB

On Demystifying the Android Application Framework Re-Visiting Android.eng.srt

49.3 KB

On Omitting Commits and Committing Omissions Preventing Git Metadata.eng.srt

53.2 KB

One Bit Flips, One Cloud Flops Cross-VM Row Hammer Attacks.eng.srt

47.8 KB

Optimized Invariant Representation of Network Traffic for Detecting Unseen.eng.srt

43.6 KB

PIkit A New Kernel-Independent Processor-Interconnect Rootkit.eng.srt

38.8 KB

Poking Holes in Information Hiding.eng.json

1.6 MB

Poking Holes in Information Hiding.eng.lrc

43.3 KB

Poking Holes in Information Hiding.eng.srt

41.0 KB

Poking Holes in Information Hiding.eng.text

29.2 KB

Poking Holes in Information Hiding.eng.tsv

37.4 KB

Poking Holes in Information Hiding.eng.txt

43.8 KB

Poking Holes in Information Hiding.eng.vtt

37.6 KB

Post-quantum Key Exchange-A New Hope.eng.srt

85.7 KB

Practical DIFC Enforcement on Android.eng.srt

65.8 KB

Predicting, Decrypting, and Abusing WPA2 802.11 Group Keys.eng.srt

49.7 KB

Privacy and Threat in Practice Mobile Messaging by Low-Income New Yorkers.eng.json

115.4 KB

Privacy and Threat in Practice Mobile Messaging by Low-Income New Yorkers.eng.lrc

3.1 KB

Privacy and Threat in Practice Mobile Messaging by Low-Income New Yorkers.eng.srt

4.1 KB

Privacy and Threat in Practice Mobile Messaging by Low-Income New Yorkers.eng.text

1.9 KB

Privacy and Threat in Practice Mobile Messaging by Low-Income New Yorkers.eng.tsv

2.6 KB

Privacy and Threat in Practice Mobile Messaging by Low-Income New Yorkers.eng.txt

3.2 KB

Privacy and Threat in Practice Mobile Messaging by Low-Income New Yorkers.eng.vtt

3.5 KB

Privacy in Epigenetics Temporal Linkability of MicroRNA Expression Profiles.eng.srt

53.7 KB

Protecting Privacy of BLE Device Users.eng.srt

48.6 KB

Report from the Field A CDN's Role in Repelling Attacks against Banking.eng.json

80.5 KB

Report from the Field A CDN's Role in Repelling Attacks against Banking.eng.lrc

2.1 KB

Report from the Field A CDN's Role in Repelling Attacks against Banking.eng.srt

2.4 KB

Report from the Field A CDN's Role in Repelling Attacks against Banking.eng.text

1.3 KB

Report from the Field A CDN's Role in Repelling Attacks against Banking.eng.tsv

1.7 KB

Report from the Field A CDN's Role in Repelling Attacks against Banking.eng.txt

2.1 KB

Report from the Field A CDN's Role in Repelling Attacks against Banking.eng.vtt

2.1 KB

Request and Conquer Exposing Cross-Origin Resource Size.eng.srt

43.3 KB

Sanctum Minimal Hardware Extensions for Strong Software Isolation.eng.srt

53.8 KB

Screen after Previous Screens Spatial-Temporal Recreation of Android App.eng.srt

48.9 KB

Secure, Precise, and Fast Floating-Point Operations on x86 Processors.eng.json

1.6 MB

Secure, Precise, and Fast Floating-Point Operations on x86 Processors.eng.lrc

47.3 KB

Secure, Precise, and Fast Floating-Point Operations on x86 Processors.eng.srt

37.2 KB

Secure, Precise, and Fast Floating-Point Operations on x86 Processors.eng.text

29.3 KB

Secure, Precise, and Fast Floating-Point Operations on x86 Processors.eng.tsv

39.4 KB

Secure, Precise, and Fast Floating-Point Operations on x86 Processors.eng.txt

48.0 KB

Secure, Precise, and Fast Floating-Point Operations on x86 Processors.eng.vtt

34.9 KB

Security Competitions.eng.json

66.7 KB

Security Competitions.eng.lrc

1.8 KB

Security Competitions.eng.srt

2.0 KB

Security Competitions.eng.text

1.0 KB

Security Competitions.eng.tsv

1.4 KB

Security Competitions.eng.txt

1.8 KB

Security Competitions.eng.vtt

1.8 KB

Specification Mining for Intrusion Detection in Networked Control Systems.eng.srt

47.2 KB

Stealing Machine Learning Models via Prediction APIs.eng.srt

55.5 KB

Teaching Computer Security Thoughts from the Field.eng.json

1.0 MB

Teaching Computer Security Thoughts from the Field.eng.lrc

28.5 KB

Teaching Computer Security Thoughts from the Field.eng.srt

29.9 KB

Teaching Computer Security Thoughts from the Field.eng.text

16.4 KB

Teaching Computer Security Thoughts from the Field.eng.tsv

23.2 KB

Teaching Computer Security Thoughts from the Field.eng.txt

29.0 KB

Teaching Computer Security Thoughts from the Field.eng.vtt

26.7 KB

The Cut-and-Choose Game and Its Application to Cryptographic Protocols.eng.json

993.6 KB

The Cut-and-Choose Game and Its Application to Cryptographic Protocols.eng.lrc

31.1 KB

The Cut-and-Choose Game and Its Application to Cryptographic Protocols.eng.srt

22.9 KB

The Cut-and-Choose Game and Its Application to Cryptographic Protocols.eng.text

16.0 KB

The Cut-and-Choose Game and Its Application to Cryptographic Protocols.eng.tsv

24.4 KB

The Cut-and-Choose Game and Its Application to Cryptographic Protocols.eng.txt

31.7 KB

The Cut-and-Choose Game and Its Application to Cryptographic Protocols.eng.vtt

20.9 KB

The Ever-Changing Labyrinth A Large-Scale Analysis of Wildcard DNS Powered.eng.srt

40.5 KB

The Million-Key Question-Investigating the Origins of RSA Public Keys.eng.srt

51.3 KB

The Moral Character of Cryptographic Work.eng.json

159.3 KB

The Moral Character of Cryptographic Work.eng.lrc

4.1 KB

The Moral Character of Cryptographic Work.eng.srt

4.2 KB

The Moral Character of Cryptographic Work.eng.text

3.2 KB

The Moral Character of Cryptographic Work.eng.tsv

3.7 KB

The Moral Character of Cryptographic Work.eng.txt

4.1 KB

The Moral Character of Cryptographic Work.eng.vtt

3.9 KB

The Unfalsifiability of Security Claims.eng.srt

184.9 KB

Thoth Comprehensive Policy Compliance in Data Retrieval Systems.eng.srt

53.2 KB

Towards Measuring and Mitigating Social Engineering Software Download Attacks.eng.srt

52.8 KB

Tracing Information Flows Between Ad Exchanges Using Retargeted Ads.eng.srt

49.0 KB

Trusted Browsers for Uncertain Times.eng.srt

63.8 KB

überSpark Enforcing Verifiable Object Abstractions for Automated.eng.json

1.4 MB

überSpark Enforcing Verifiable Object Abstractions for Automated.eng.lrc

46.0 KB

überSpark Enforcing Verifiable Object Abstractions for Automated.eng.srt

34.0 KB

überSpark Enforcing Verifiable Object Abstractions for Automated.eng.text

25.1 KB

überSpark Enforcing Verifiable Object Abstractions for Automated.eng.tsv

37.0 KB

überSpark Enforcing Verifiable Object Abstractions for Automated.eng.txt

46.8 KB

überSpark Enforcing Verifiable Object Abstractions for Automated.eng.vtt

31.3 KB

Undermining Information Hiding (and What to Do about It).eng.srt

39.1 KB

UNVEIL A Large-Scale, Automated Approach to Detecting Ransomware.eng.srt

49.8 KB

Verifying Constant-Time Implementations.eng.srt

66.3 KB

Virtual U Defeating Face Liveness Detection by Building Virtual Models.eng.srt

53.5 KB

Website-Targeted False Content Injection by Network Operators.eng.json

889.8 KB

Website-Targeted False Content Injection by Network Operators.eng.lrc

23.7 KB

Website-Targeted False Content Injection by Network Operators.eng.srt

23.9 KB

Website-Targeted False Content Injection by Network Operators.eng.text

17.2 KB

Website-Targeted False Content Injection by Network Operators.eng.tsv

20.8 KB

Website-Targeted False Content Injection by Network Operators.eng.txt

23.9 KB

Website-Targeted False Content Injection by Network Operators.eng.vtt

22.1 KB

What Cannot Be Read, Cannot Be Leveraged Revisiting Assumptions of JIT-ROP.eng.srt

47.6 KB

When Governments Attack Malware Targeting Activists, Lawyers, and Journalists.eng.json

3.7 MB

When Governments Attack Malware Targeting Activists, Lawyers, and Journalists.eng.lrc

123.1 KB

When Governments Attack Malware Targeting Activists, Lawyers, and Journalists.eng.srt

78.0 KB

When Governments Attack Malware Targeting Activists, Lawyers, and Journalists.eng.text

51.9 KB

When Governments Attack Malware Targeting Activists, Lawyers, and Journalists.eng.tsv

92.3 KB

When Governments Attack Malware Targeting Activists, Lawyers, and Journalists.eng.txt

125.7 KB

When Governments Attack Malware Targeting Activists, Lawyers, and Journalists.eng.vtt

71.3 KB

You Are Who You Know and How You Behave Attribute Inference Attacks.eng.json

836.4 KB

You Are Who You Know and How You Behave Attribute Inference Attacks.eng.lrc

21.9 KB

You Are Who You Know and How You Behave Attribute Inference Attacks.eng.srt

23.6 KB

You Are Who You Know and How You Behave Attribute Inference Attacks.eng.text

16.5 KB

You Are Who You Know and How You Behave Attribute Inference Attacks.eng.tsv

19.5 KB

You Are Who You Know and How You Behave Attribute Inference Attacks.eng.txt

22.1 KB

You Are Who You Know and How You Behave Attribute Inference Attacks.eng.vtt

21.6 KB

You've Got Vulnerability Exploring Effective Vulnerability Notifications.eng.srt

69.2 KB

ZKBoo Faster Zero-Knowledge for Boolean Circuits.eng.srt

38.0 KB

zxcvbn Low-Budget Password Strength Estimation.eng.json

1.6 MB

zxcvbn Low-Budget Password Strength Estimation.eng.lrc

44.2 KB

zxcvbn Low-Budget Password Strength Estimation.eng.srt

41.5 KB

zxcvbn Low-Budget Password Strength Estimation.eng.text

28.2 KB

zxcvbn Low-Budget Password Strength Estimation.eng.tsv

37.3 KB

zxcvbn Low-Budget Password Strength Estimation.eng.txt

44.9 KB

zxcvbn Low-Budget Password Strength Estimation.eng.vtt

37.7 KB

/.../USENIX Security 2016 USENIX_files/

acmqueue_600x240_1.png

7.0 KB

acmqueue_600x240_1_002.png

2.5 KB

admin_150x60.png

7.0 KB

admin_150x60_002.png

4.2 KB

all.js

3.2 KB

analytics.js

45.2 KB

bit_150x60.png

7.4 KB

bit_150x60_002.png

2.8 KB

cbgapi.loaded_0

144.0 KB

cbgapi.loaded_1

97.1 KB

cisco_150x60.png

2.1 KB

cisco_150x60_002.png

2.7 KB

crc_press_150x60.png

3.9 KB

crc_press_150x60_002.png

13.7 KB

css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css

5.6 KB

css_IBrrqJUtXAVsLrrlZ8VqVTS3di7E2-x10BVJwZwbroU.css

260.3 KB

css_m9t3SZ2dKv6HQuOuf0zINIRA5GjP4lkCCtmRRbSjaXs.css

14.7 KB

css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css

1.5 KB

css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css

0.1 KB

dmtf_600x240.png

4.1 KB

dmtf_600x240_002.png

2.5 KB

facebook_2016_150x60_1.png

2.9 KB

facebook_2016_150x60_1_002.png

2.4 KB

facebook-icon.jpeg

1.7 KB

fastbutton.htm

1.8 KB

fastbutton_002.htm

1.7 KB

google_2016_150x60_0.png

3.9 KB

google_2016_150x60_0_002.png

3.3 KB

googleplus-icon.jpg

1.7 KB

ibm_research_150x60_0.png

2.8 KB

ibm_research_150x60_0_002.png

3.3 KB

ie.css

0.5 KB

in-icon.jpeg

1.9 KB

js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js

20.5 KB

js_2sjNGyfj3O57w8bimxly5mzgG70GrcIxxxYOEInwu1Q.js

57.0 KB

js_5eZSC3tfzCwTta-_4qxrBau4YdctcIhVqovRK7sPRFo.js

107.7 KB

js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js

1.4 KB

js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js

120.3 KB

js_nPhKWi17GlWfUPto14Dqfk5lpAFMD2XUrRDYY3jnD2c.js

23.0 KB

linux_pro_150x60.png

2.9 KB

linux_pro_150x60_002.png

5.0 KB

lxer_150x60.png

6.6 KB

lxer_150x60_002.png

3.7 KB

microsoft_600x240_0.png

2.5 KB

microsoft_600x240_0_002.png

3.0 KB

neustar_150x60.png

3.7 KB

neustar_150x60_002.png

4.5 KB

nostarch_600x240_1.png

3.9 KB

nostarch_600x240_1_002.png

1.6 KB

nsf_150x60_v2.png

4.8 KB

nsf_150x60_v2_002.png

7.3 KB

plusone.js

49.0 KB

postmessageRelay.htm

0.7 KB

sec16_button_180.png

39.2 KB

sec16_media.png

6.6 KB

symantec_150x60.png

10.6 KB

symantec_150x60_002.png

5.4 KB

twitter-icon.jpeg

1.7 KB

userfriendly_150x60.png

3.0 KB

userfriendly_150x60_002.png

8.4 KB

virus_bulletin_150x60.png

5.2 KB

virus_bulletin_150x60_002.png

3.0 KB

widgets.js

98.5 KB

youtube-icon.jpg

1.7 KB

/.../USENIX Security 2016 USENIX_files/postmessageRelay_data/

829555168-postmessagerelay.js

10.0 KB

cbgapi.loaded_0

54.9 KB

rpcshindig_random.js

13.0 KB

/USENIX Security 2017/

6thSense - A Context-aware Sensor-based Attack Detector for Smart Devices.mp4

32.9 MB

A Longitudinal, End-to-End View of the DNSSEC Ecosystem.mp4

21.2 MB

A Privacy Analysis of Cross-device Tracking.mp4

30.0 MB

Adaptive Android Kernel Live Patching.mp4

22.9 MB

An Ant in a World of Grasshoppers.mp4

31.4 MB

Attacking the Brain - Races in the SDN Control Plane.mp4

31.6 MB

AuthentiCall - Efficient Identity and Content Authentication for Phone Calls.mp4

30.5 MB

AutoLock - Why Cache Attacks on ARM Are Harder Than You Think.mp4

22.8 MB

AWare - Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings.mp4

33.6 MB

Beauty and the Burst - Remote Identification of Encrypted Video Streams.mp4

26.9 MB

BinSim - Trace-based Semantic Binary Diffing.mp4

30.3 MB

BLENDER - Enabling Local Search with a Hybrid Differential Privacy Model.mp4

25.4 MB

BootStomp - On the Security of Bootloaders in Mobile Devices.mp4

21.3 MB

CacheD - Identifying Cache-Based Timing Channels in Production Software.mp4

21.2 MB

CAn’t Touch This.mp4

25.5 MB

CCSP - Controlled Relaxation of Content Security Policies.mp4

33.7 MB

CHAINIAC - Proactive Software-Update Transparency.mp4

26.8 MB

Characterizing the Nature and Dynamics of Tor Exit Blocking.mp4

21.3 MB

CLKSCREW - Exposing the Perils of Security-Oblivious Energy Management.mp4

24.0 MB

Computer Security, Privacy, and DNA Sequencing.mp4

25.5 MB

Constant-Time Callees with Variable-Time Callers.mp4

24.2 MB

Data Hemorrhage, Inequality, and You.mp4

62.7 MB

Dead Store Elimination (Still) Considered Harmful.mp4

22.9 MB

Detecting Android Root Exploits by Learning from Root Providers.mp4

25.2 MB

Detecting Credential Spearphishing in Enterprise Settings.mp4

27.6 MB

DeTor - Provably Avoiding Geographic Regions in Tor.mp4

23.1 MB

Differential Privacy - From Theory to Deployment.mp4

38.1 MB

Digtool - A Virtualization-Based Framework for Detecting Kernel Vulnerabilities.mp4

22.3 MB

DR. CHECKER - A Soundy Analysis for Linux Kernel Drivers.mp4

29.3 MB

Efficient Protection of Path-Sensitive Control Security.mp4

20.8 MB

Ensuring Authorized Updates in Multi-user Database-Backed Applications.mp4

23.5 MB

Exploring User Perceptions of Discrimination in Online Targeted Advertising.mp4

21.2 MB

Extension Breakdown.mp4

24.1 MB

From Problems to Patterns to Practice.mp4

12.0 MB

Game of Registrars.mp4

40.4 MB

Global Measurement of DNS Manipulation.mp4

24.9 MB

Hacking in Darkness - Return-oriented Programming against Secure Enclaves.mp4

39.3 MB

HELP - Helper-Enabled In-Band Device Pairing.mp4

27.2 MB

How Double-Fetch Situations turn into Double-Fetch Vulnerabilities.mp4

32.0 MB

How the Web Tangled Itself.mp4

49.5 MB

I Have No Idea What I'm Doing - On the Usability of Deploying HTTPS.mp4

27.2 MB

Identifier Binding Attacks and Defenses in Software-Defined Networks.mp4

28.4 MB

Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing.mp4

31.8 MB

kAFL - Hardware-Assisted Feedback Fuzzing for OS Kernels.mp4

24.8 MB

Locally Differentially Private Protocols for Frequency Estimation.mp4

21.0 MB

Loophole - Timing Attacks on Shared Event Loops in Chrome.mp4

25.8 MB

Malton - Towards On-Device Non-Invasive Mobile Malware Analysis for ART.mp4

42.8 MB

MCMix - Anonymous Messaging via Secure Multiparty Computation.mp4

26.7 MB

Measuring HTTPS Adoption on the Web.mp4

25.6 MB

Measuring the Insecurity of Mobile Deep Links of Android.mp4

36.6 MB

MPI - Multiple Perspective Attack Investigation.mp4

25.8 MB

Neural Nets Can Learn Function Type Signatures From Binaries.mp4

27.4 MB

Ninja - Towards Transparent Tracing and Debugging on ARM.mp4

20.4 MB

On the effectiveness of mitigations against floating-point timing channels.mp4

25.5 MB

Opening Remarks and Awards.mp4

20.4 MB

ORide - A Privacy-Preserving yet Accountable Ride-Hailing Service.mp4

20.4 MB

Oscar - A Practical Page-Permissions-Based Scheme.mp4

23.2 MB

OSS-Fuzz - Google's continuous fuzzing service for open source software.mp4

66.4 MB

PDF Mirage - Content Masking Attack Against Information-Based Online Services.mp4

32.9 MB

Phoenix - Rebirth of a Cryptographic Password-Hardening Service.mp4

26.5 MB

Picking Up My Tab.mp4

26.6 MB

PlatPal - Detecting Malicious Documents with Platform Diversity.mp4

23.2 MB

Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts.mp4

25.9 MB

Predicting the Resilience of Obfuscated Code.mp4

23.2 MB

PrimeAbort - A Timer-Free High-Precision L3 Cache Attack using Intel TSX.mp4

25.6 MB

Qapla - Policy compliance for database-backed systems.mp4

26.6 MB

REM - Resource-Efficient Mining for Blockchains.mp4

44.1 MB

Reverse Engineering x86 Processor Microcode.mp4

21.2 MB

ROTE - Rollback Protection for Trusted Execution.mp4

38.2 MB

Same-Origin Policy - Evaluation in Modern Browsers.mp4

32.4 MB

See No Evil, Hear No Evil, Feel No Evil.mp4

30.5 MB

Seeing Through The Same Lens.mp4

28.1 MB

SLEUTH - Real-time Attack Scenario Reconstruction from COTS Audit Data.mp4

27.2 MB

SmartAuth - User-Centered Authorization for the Internet of Things.mp4

30.7 MB

SmartPool - Practical Decentralized Pooled Mining.mp4

32.3 MB

Speeding up detection of SHA-1 collision attacks.mp4

26.4 MB

Strong and Efficient Cache Side-Channel Protection.mp4

27.1 MB

Syntia - Synthesizing the Semantics of Obfuscated Code.mp4

24.9 MB

Telling Your Secrets without Page Faults.mp4

23.2 MB

The Loopix Anonymity System.mp4

31.2 MB

Towards Efficient Heap Overflow Discovery.mp4

23.7 MB

Towards Practical Tools for Side Channel Aware Software Engineering.mp4

24.5 MB

Transcend - Detecting Concept Drift in Malware Classification Models.mp4

31.1 MB

TrustBase - An Architecture to Repair and Strengthen.mp4

26.8 MB

Understanding the Mirai Botnet.mp4

30.4 MB

USB Snooping Made Easy - Crosstalk Leakage Attacks on USB Hubs.mp4

26.6 MB

USENIX Security 2017 Full Proceedings errata 2.pdf

79.4 KB

USENIX Security 2017 Full Proceedings errata 3.pdf

62.2 KB

USENIX Security 2017 Full Proceedings errata.pdf

211.3 KB

USENIX Security 2017 Full Proceedings Interior.pdf

120.9 MB

USENIX Security 2017 Full Proceedings program grid.pdf

385.6 KB

USENIX Security 2017 Full Proceedings.epub

62.5 MB

USENIX Security 2017 Full Proceedings.mobi

118.5 MB

USENIX Security 2017 Full Proceedings.pdf

121.2 MB

USENIX Security 2017 Technical Sessions USENIX.htm

487.2 KB

USENIX Security 2017 USENIX.htm

92.5 KB

Vale - Verifying High-Performance Cryptographic Assembly Code.mp4

23.7 MB

Venerable Variadic Vulnerabilities Vanquished.mp4

24.7 MB

vTZ - Virtualizing ARM TrustZone.mp4

23.9 MB

Walkie-Talkie.mp4

30.0 MB

When the Weakest Link is Strong.mp4

27.2 MB

When Your Threat Model Is - Everything - Defensive Security in Modern Newsrooms.mp4

63.8 MB

/.../USENIX Security 2017 captions/

6thSense - A Context-aware Sensor-based Attack Detector for Smart Devices.eng.json

1.2 MB

6thSense - A Context-aware Sensor-based Attack Detector for Smart Devices.eng.lrc

31.2 KB

6thSense - A Context-aware Sensor-based Attack Detector for Smart Devices.eng.srt

31.0 KB

6thSense - A Context-aware Sensor-based Attack Detector for Smart Devices.eng.text

21.4 KB

6thSense - A Context-aware Sensor-based Attack Detector for Smart Devices.eng.tsv

26.9 KB

6thSense - A Context-aware Sensor-based Attack Detector for Smart Devices.eng.txt

31.6 KB

6thSense - A Context-aware Sensor-based Attack Detector for Smart Devices.eng.vtt

28.3 KB

A Longitudinal, End-to-End View of the DNSSEC Ecosystem.eng.json

1.3 MB

A Longitudinal, End-to-End View of the DNSSEC Ecosystem.eng.lrc

34.4 KB

A Longitudinal, End-to-End View of the DNSSEC Ecosystem.eng.srt

33.2 KB

A Longitudinal, End-to-End View of the DNSSEC Ecosystem.eng.text

22.0 KB

A Longitudinal, End-to-End View of the DNSSEC Ecosystem.eng.tsv

29.1 KB

A Longitudinal, End-to-End View of the DNSSEC Ecosystem.eng.txt

34.9 KB

A Longitudinal, End-to-End View of the DNSSEC Ecosystem.eng.vtt

30.0 KB

A Privacy Analysis of Cross-device Tracking.eng.json

1.2 MB

A Privacy Analysis of Cross-device Tracking.eng.lrc

33.1 KB

A Privacy Analysis of Cross-device Tracking.eng.srt

28.4 KB

A Privacy Analysis of Cross-device Tracking.eng.text

20.9 KB

A Privacy Analysis of Cross-device Tracking.eng.tsv

27.9 KB

A Privacy Analysis of Cross-device Tracking.eng.txt

33.6 KB

A Privacy Analysis of Cross-device Tracking.eng.vtt

26.3 KB

Adaptive Android Kernel Live Patching.eng.json

893.2 KB

Adaptive Android Kernel Live Patching.eng.lrc

22.9 KB

Adaptive Android Kernel Live Patching.eng.srt

26.4 KB

Adaptive Android Kernel Live Patching.eng.text

17.7 KB

Adaptive Android Kernel Live Patching.eng.tsv

20.7 KB

Adaptive Android Kernel Live Patching.eng.txt

23.1 KB

Adaptive Android Kernel Live Patching.eng.vtt

24.0 KB

An Ant in a World of Grasshoppers.eng.json

2.2 MB

An Ant in a World of Grasshoppers.eng.lrc

72.5 KB

An Ant in a World of Grasshoppers.eng.srt

45.1 KB

An Ant in a World of Grasshoppers.eng.text

32.4 KB

An Ant in a World of Grasshoppers.eng.tsv

55.9 KB

An Ant in a World of Grasshoppers.eng.txt

74.1 KB

An Ant in a World of Grasshoppers.eng.vtt

41.2 KB

Attacking the Brain - Races in the SDN Control Plane.eng.json

1.4 MB

Attacking the Brain - Races in the SDN Control Plane.eng.lrc

40.0 KB

Attacking the Brain - Races in the SDN Control Plane.eng.srt

34.4 KB

Attacking the Brain - Races in the SDN Control Plane.eng.text

23.4 KB

Attacking the Brain - Races in the SDN Control Plane.eng.tsv

33.0 KB

Attacking the Brain - Races in the SDN Control Plane.eng.txt

40.7 KB

Attacking the Brain - Races in the SDN Control Plane.eng.vtt

31.2 KB

AuthentiCall - Efficient Identity and Content Authentication for Phone Calls.eng.json

1.4 MB

AuthentiCall - Efficient Identity and Content Authentication for Phone Calls.eng.lrc

37.8 KB

AuthentiCall - Efficient Identity and Content Authentication for Phone Calls.eng.srt

35.0 KB

AuthentiCall - Efficient Identity and Content Authentication for Phone Calls.eng.text

26.2 KB

AuthentiCall - Efficient Identity and Content Authentication for Phone Calls.eng.tsv

32.8 KB

AuthentiCall - Efficient Identity and Content Authentication for Phone Calls.eng.txt

38.2 KB

AuthentiCall - Efficient Identity and Content Authentication for Phone Calls.eng.vtt

32.5 KB

AutoLock - Why Cache Attacks on ARM Are Harder Than You Think.eng.json

1.4 MB

AutoLock - Why Cache Attacks on ARM Are Harder Than You Think.eng.lrc

38.0 KB

AutoLock - Why Cache Attacks on ARM Are Harder Than You Think.eng.srt

32.2 KB

AutoLock - Why Cache Attacks on ARM Are Harder Than You Think.eng.text

23.4 KB

AutoLock - Why Cache Attacks on ARM Are Harder Than You Think.eng.tsv

31.7 KB

AutoLock - Why Cache Attacks on ARM Are Harder Than You Think.eng.txt

38.6 KB

AutoLock - Why Cache Attacks on ARM Are Harder Than You Think.eng.vtt

29.6 KB

AWare - Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings.eng.json

1.1 MB

AWare - Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings.eng.lrc

28.6 KB

AWare - Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings.eng.srt

31.3 KB

AWare - Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings.eng.text

22.3 KB

AWare - Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings.eng.tsv

25.9 KB

AWare - Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings.eng.txt

28.8 KB

AWare - Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings.eng.vtt

28.8 KB

Beauty and the Burst - Remote Identification of Encrypted Video Streams.eng.json

1.0 MB

Beauty and the Burst - Remote Identification of Encrypted Video Streams.eng.lrc

26.6 KB

Beauty and the Burst - Remote Identification of Encrypted Video Streams.eng.srt

27.5 KB

Beauty and the Burst - Remote Identification of Encrypted Video Streams.eng.text

19.8 KB

Beauty and the Burst - Remote Identification of Encrypted Video Streams.eng.tsv

23.6 KB

Beauty and the Burst - Remote Identification of Encrypted Video Streams.eng.txt

26.9 KB

Beauty and the Burst - Remote Identification of Encrypted Video Streams.eng.vtt

25.4 KB

BinSim - Trace-based Semantic Binary Diffing.eng.json

1.1 MB

BinSim - Trace-based Semantic Binary Diffing.eng.lrc

34.8 KB

BinSim - Trace-based Semantic Binary Diffing.eng.srt

29.1 KB

BinSim - Trace-based Semantic Binary Diffing.eng.text

21.4 KB

BinSim - Trace-based Semantic Binary Diffing.eng.tsv

29.0 KB

BinSim - Trace-based Semantic Binary Diffing.eng.txt

35.4 KB

BinSim - Trace-based Semantic Binary Diffing.eng.vtt

26.8 KB

BLENDER - Enabling Local Search with a Hybrid Differential Privacy Model.eng.json

1.5 MB

BLENDER - Enabling Local Search with a Hybrid Differential Privacy Model.eng.lrc

37.4 KB

BLENDER - Enabling Local Search with a Hybrid Differential Privacy Model.eng.srt

41.4 KB

BLENDER - Enabling Local Search with a Hybrid Differential Privacy Model.eng.text

30.2 KB

BLENDER - Enabling Local Search with a Hybrid Differential Privacy Model.eng.tsv

34.3 KB

BLENDER - Enabling Local Search with a Hybrid Differential Privacy Model.eng.txt

37.7 KB

BLENDER - Enabling Local Search with a Hybrid Differential Privacy Model.eng.vtt

38.2 KB

BootStomp - On the Security of Bootloaders in Mobile Devices.eng.json

1.1 MB

BootStomp - On the Security of Bootloaders in Mobile Devices.eng.lrc

26.8 KB

BootStomp - On the Security of Bootloaders in Mobile Devices.eng.srt

30.2 KB

BootStomp - On the Security of Bootloaders in Mobile Devices.eng.text

20.6 KB

BootStomp - On the Security of Bootloaders in Mobile Devices.eng.tsv

24.1 KB

BootStomp - On the Security of Bootloaders in Mobile Devices.eng.txt

27.1 KB

BootStomp - On the Security of Bootloaders in Mobile Devices.eng.vtt

27.5 KB

CacheD - Identifying Cache-Based Timing Channels in Production Software.eng.json

1.1 MB

CacheD - Identifying Cache-Based Timing Channels in Production Software.eng.lrc

31.5 KB

CacheD - Identifying Cache-Based Timing Channels in Production Software.eng.srt

29.5 KB

CacheD - Identifying Cache-Based Timing Channels in Production Software.eng.text

21.4 KB

CacheD - Identifying Cache-Based Timing Channels in Production Software.eng.tsv

27.1 KB

CacheD - Identifying Cache-Based Timing Channels in Production Software.eng.txt

31.9 KB

CacheD - Identifying Cache-Based Timing Channels in Production Software.eng.vtt

27.2 KB

CAn’t Touch This.eng.json

1.4 MB

CAn’t Touch This.eng.lrc

40.4 KB

CAn’t Touch This.eng.srt

34.2 KB

CAn’t Touch This.eng.text

24.8 KB

CAn’t Touch This.eng.tsv

33.7 KB

CAn’t Touch This.eng.txt

41.0 KB

CAn’t Touch This.eng.vtt

31.5 KB

CCSP - Controlled Relaxation of Content Security Policies.eng.json

1.5 MB

CCSP - Controlled Relaxation of Content Security Policies.eng.lrc

43.2 KB

CCSP - Controlled Relaxation of Content Security Policies.eng.srt

37.0 KB

CCSP - Controlled Relaxation of Content Security Policies.eng.text

29.0 KB

CCSP - Controlled Relaxation of Content Security Policies.eng.tsv

37.2 KB

CCSP - Controlled Relaxation of Content Security Policies.eng.txt

43.8 KB

CCSP - Controlled Relaxation of Content Security Policies.eng.vtt

34.7 KB

CHAINIAC - Proactive Software-Update Transparency.eng.json

1.2 MB

CHAINIAC - Proactive Software-Update Transparency.eng.lrc

33.6 KB

CHAINIAC - Proactive Software-Update Transparency.eng.srt

29.7 KB

CHAINIAC - Proactive Software-Update Transparency.eng.text

22.6 KB

CHAINIAC - Proactive Software-Update Transparency.eng.tsv

28.8 KB

CHAINIAC - Proactive Software-Update Transparency.eng.txt

34.0 KB

CHAINIAC - Proactive Software-Update Transparency.eng.vtt

27.7 KB

Characterizing the Nature and Dynamics of Tor Exit Blocking.eng.json

1.3 MB

Characterizing the Nature and Dynamics of Tor Exit Blocking.eng.lrc

37.5 KB

Characterizing the Nature and Dynamics of Tor Exit Blocking.eng.srt

30.5 KB

Characterizing the Nature and Dynamics of Tor Exit Blocking.eng.text

21.3 KB

Characterizing the Nature and Dynamics of Tor Exit Blocking.eng.tsv

30.6 KB

Characterizing the Nature and Dynamics of Tor Exit Blocking.eng.txt

38.1 KB

Characterizing the Nature and Dynamics of Tor Exit Blocking.eng.vtt

27.8 KB

CLKSCREW - Exposing the Perils of Security-Oblivious Energy Management.eng.json

1.2 MB

CLKSCREW - Exposing the Perils of Security-Oblivious Energy Management.eng.lrc

32.2 KB

CLKSCREW - Exposing the Perils of Security-Oblivious Energy Management.eng.srt

35.5 KB

CLKSCREW - Exposing the Perils of Security-Oblivious Energy Management.eng.text

24.8 KB

CLKSCREW - Exposing the Perils of Security-Oblivious Energy Management.eng.tsv

29.0 KB

CLKSCREW - Exposing the Perils of Security-Oblivious Energy Management.eng.txt

32.5 KB

CLKSCREW - Exposing the Perils of Security-Oblivious Energy Management.eng.vtt

32.5 KB

Computer Security, Privacy, and DNA Sequencing.eng.json

1.5 MB

Computer Security, Privacy, and DNA Sequencing.eng.lrc

39.4 KB

Computer Security, Privacy, and DNA Sequencing.eng.srt

40.2 KB

Computer Security, Privacy, and DNA Sequencing.eng.text

30.1 KB

Computer Security, Privacy, and DNA Sequencing.eng.tsv

35.4 KB

Computer Security, Privacy, and DNA Sequencing.eng.txt

39.7 KB

Computer Security, Privacy, and DNA Sequencing.eng.vtt

37.4 KB

Constant-Time Callees with Variable-Time Callers.eng.json

946.5 KB

Constant-Time Callees with Variable-Time Callers.eng.lrc

26.0 KB

Constant-Time Callees with Variable-Time Callers.eng.srt

24.6 KB

Constant-Time Callees with Variable-Time Callers.eng.text

16.6 KB

Constant-Time Callees with Variable-Time Callers.eng.tsv

21.9 KB

Constant-Time Callees with Variable-Time Callers.eng.txt

26.4 KB

Constant-Time Callees with Variable-Time Callers.eng.vtt

22.3 KB

Data Hemorrhage, Inequality, and You.eng.json

2.9 MB

Data Hemorrhage, Inequality, and You.eng.lrc

76.8 KB

Data Hemorrhage, Inequality, and You.eng.srt

74.7 KB

Data Hemorrhage, Inequality, and You.eng.text

55.3 KB

Data Hemorrhage, Inequality, and You.eng.tsv

67.8 KB

Data Hemorrhage, Inequality, and You.eng.txt

77.6 KB

Data Hemorrhage, Inequality, and You.eng.vtt

69.3 KB

Dead Store Elimination (Still) Considered Harmful.eng.json

1.0 MB

Dead Store Elimination (Still) Considered Harmful.eng.lrc

31.2 KB

Dead Store Elimination (Still) Considered Harmful.eng.srt

25.9 KB

Dead Store Elimination (Still) Considered Harmful.eng.text

18.8 KB

Dead Store Elimination (Still) Considered Harmful.eng.tsv

25.8 KB

Dead Store Elimination (Still) Considered Harmful.eng.txt

31.6 KB

Dead Store Elimination (Still) Considered Harmful.eng.vtt

23.8 KB

Detecting Android Root Exploits by Learning from Root Providers.eng.json

1.0 MB

Detecting Android Root Exploits by Learning from Root Providers.eng.lrc

27.0 KB

Detecting Android Root Exploits by Learning from Root Providers.eng.srt

28.0 KB

Detecting Android Root Exploits by Learning from Root Providers.eng.text

20.6 KB

Detecting Android Root Exploits by Learning from Root Providers.eng.tsv

24.3 KB

Detecting Android Root Exploits by Learning from Root Providers.eng.txt

27.2 KB

Detecting Android Root Exploits by Learning from Root Providers.eng.vtt

25.9 KB

Detecting Credential Spearphishing in Enterprise Settings.eng.json

1.9 MB

Detecting Credential Spearphishing in Enterprise Settings.eng.lrc

52.7 KB

Detecting Credential Spearphishing in Enterprise Settings.eng.srt

49.6 KB

Detecting Credential Spearphishing in Enterprise Settings.eng.text

35.9 KB

Detecting Credential Spearphishing in Enterprise Settings.eng.tsv

45.5 KB

Detecting Credential Spearphishing in Enterprise Settings.eng.txt

53.4 KB

Detecting Credential Spearphishing in Enterprise Settings.eng.vtt

45.6 KB

DeTor - Provably Avoiding Geographic Regions in Tor.eng.json

1.2 MB

DeTor - Provably Avoiding Geographic Regions in Tor.eng.lrc

30.5 KB

DeTor - Provably Avoiding Geographic Regions in Tor.eng.srt

32.7 KB

DeTor - Provably Avoiding Geographic Regions in Tor.eng.text

23.6 KB

DeTor - Provably Avoiding Geographic Regions in Tor.eng.tsv

27.6 KB

DeTor - Provably Avoiding Geographic Regions in Tor.eng.txt

30.8 KB

DeTor - Provably Avoiding Geographic Regions in Tor.eng.vtt

30.2 KB

Differential Privacy - From Theory to Deployment.eng.json

2.0 MB

Differential Privacy - From Theory to Deployment.eng.lrc

52.7 KB

Differential Privacy - From Theory to Deployment.eng.srt

53.3 KB

Differential Privacy - From Theory to Deployment.eng.text

37.2 KB

Differential Privacy - From Theory to Deployment.eng.tsv

46.3 KB

Differential Privacy - From Theory to Deployment.eng.txt

53.3 KB

Differential Privacy - From Theory to Deployment.eng.vtt

48.7 KB

Digtool - A Virtualization-Based Framework for Detecting Kernel Vulnerabilities.eng.json

901.5 KB

Digtool - A Virtualization-Based Framework for Detecting Kernel Vulnerabilities.eng.lrc

24.1 KB

Digtool - A Virtualization-Based Framework for Detecting Kernel Vulnerabilities.eng.srt

26.9 KB

Digtool - A Virtualization-Based Framework for Detecting Kernel Vulnerabilities.eng.text

18.5 KB

Digtool - A Virtualization-Based Framework for Detecting Kernel Vulnerabilities.eng.tsv

21.7 KB

Digtool - A Virtualization-Based Framework for Detecting Kernel Vulnerabilities.eng.txt

24.3 KB

Digtool - A Virtualization-Based Framework for Detecting Kernel Vulnerabilities.eng.vtt

24.6 KB

DR. CHECKER - A Soundy Analysis for Linux Kernel Drivers.eng.json

1.9 MB

DR. CHECKER - A Soundy Analysis for Linux Kernel Drivers.eng.lrc

54.0 KB

DR. CHECKER - A Soundy Analysis for Linux Kernel Drivers.eng.srt

44.4 KB

DR. CHECKER - A Soundy Analysis for Linux Kernel Drivers.eng.text

31.3 KB

DR. CHECKER - A Soundy Analysis for Linux Kernel Drivers.eng.tsv

44.3 KB

DR. CHECKER - A Soundy Analysis for Linux Kernel Drivers.eng.txt

54.9 KB

DR. CHECKER - A Soundy Analysis for Linux Kernel Drivers.eng.vtt

40.5 KB

Efficient Protection of Path-Sensitive Control Security.eng.json

1.0 MB

Efficient Protection of Path-Sensitive Control Security.eng.lrc

28.9 KB

Efficient Protection of Path-Sensitive Control Security.eng.srt

24.5 KB

Efficient Protection of Path-Sensitive Control Security.eng.text

19.1 KB

Efficient Protection of Path-Sensitive Control Security.eng.tsv

24.6 KB

Efficient Protection of Path-Sensitive Control Security.eng.txt

29.3 KB

Efficient Protection of Path-Sensitive Control Security.eng.vtt

23.0 KB

Ensuring Authorized Updates in Multi-user Database-Backed Applications.eng.json

1.4 MB

Ensuring Authorized Updates in Multi-user Database-Backed Applications.eng.lrc

37.5 KB

Ensuring Authorized Updates in Multi-user Database-Backed Applications.eng.srt

32.7 KB

Ensuring Authorized Updates in Multi-user Database-Backed Applications.eng.text

24.4 KB

Ensuring Authorized Updates in Multi-user Database-Backed Applications.eng.tsv

31.9 KB

Ensuring Authorized Updates in Multi-user Database-Backed Applications.eng.txt

38.0 KB

Ensuring Authorized Updates in Multi-user Database-Backed Applications.eng.vtt

30.3 KB

Exploring User Perceptions of Discrimination in Online Targeted Advertising.eng.json

1.2 MB

Exploring User Perceptions of Discrimination in Online Targeted Advertising.eng.lrc

29.9 KB

Exploring User Perceptions of Discrimination in Online Targeted Advertising.eng.srt

31.2 KB

Exploring User Perceptions of Discrimination in Online Targeted Advertising.eng.text

23.1 KB

Exploring User Perceptions of Discrimination in Online Targeted Advertising.eng.tsv

26.9 KB

Exploring User Perceptions of Discrimination in Online Targeted Advertising.eng.txt

30.2 KB

Exploring User Perceptions of Discrimination in Online Targeted Advertising.eng.vtt

28.9 KB

Extension Breakdown.eng.json

1.4 MB

Extension Breakdown.eng.lrc

36.6 KB

Extension Breakdown.eng.srt

32.3 KB

Extension Breakdown.eng.text

24.0 KB

Extension Breakdown.eng.tsv

31.1 KB

Extension Breakdown.eng.txt

37.0 KB

Extension Breakdown.eng.vtt

29.9 KB

From Problems to Patterns to Practice.eng.json

0.0 KB

From Problems to Patterns to Practice.eng.lrc

0.0 KB

From Problems to Patterns to Practice.eng.srt

0.0 KB

From Problems to Patterns to Practice.eng.text

0.0 KB

From Problems to Patterns to Practice.eng.tsv

0.0 KB

From Problems to Patterns to Practice.eng.txt

0.0 KB

From Problems to Patterns to Practice.eng.vtt

0.0 KB

Game of Registrars.eng.json

1.5 MB

Game of Registrars.eng.lrc

39.1 KB

Game of Registrars.eng.srt

38.7 KB

Game of Registrars.eng.text

28.7 KB

Game of Registrars.eng.tsv

34.7 KB

Game of Registrars.eng.txt

39.5 KB

Game of Registrars.eng.vtt

35.9 KB

Global Measurement of DNS Manipulation.eng.json

1.9 MB

Global Measurement of DNS Manipulation.eng.lrc

54.8 KB

Global Measurement of DNS Manipulation.eng.srt

47.7 KB

Global Measurement of DNS Manipulation.eng.text

34.7 KB

Global Measurement of DNS Manipulation.eng.tsv

46.2 KB

Global Measurement of DNS Manipulation.eng.txt

55.6 KB

Global Measurement of DNS Manipulation.eng.vtt

43.9 KB

Hacking in Darkness - Return-oriented Programming against Secure Enclaves.eng.json

1.2 MB

Hacking in Darkness - Return-oriented Programming against Secure Enclaves.eng.lrc

31.2 KB

Hacking in Darkness - Return-oriented Programming against Secure Enclaves.eng.srt

35.3 KB

Hacking in Darkness - Return-oriented Programming against Secure Enclaves.eng.text

23.8 KB

Hacking in Darkness - Return-oriented Programming against Secure Enclaves.eng.tsv

28.1 KB

Hacking in Darkness - Return-oriented Programming against Secure Enclaves.eng.txt

31.5 KB

Hacking in Darkness - Return-oriented Programming against Secure Enclaves.eng.vtt

32.0 KB

HELP - Helper-Enabled In-Band Device Pairing.eng.json

927.5 KB

HELP - Helper-Enabled In-Band Device Pairing.eng.lrc

23.6 KB

HELP - Helper-Enabled In-Band Device Pairing.eng.srt

24.6 KB

HELP - Helper-Enabled In-Band Device Pairing.eng.text

18.7 KB

HELP - Helper-Enabled In-Band Device Pairing.eng.tsv

21.5 KB

HELP - Helper-Enabled In-Band Device Pairing.eng.txt

23.8 KB

HELP - Helper-Enabled In-Band Device Pairing.eng.vtt

23.0 KB

How Double-Fetch Situations turn into Double-Fetch Vulnerabilities.eng.json

1.1 MB

How Double-Fetch Situations turn into Double-Fetch Vulnerabilities.eng.lrc

28.6 KB

How Double-Fetch Situations turn into Double-Fetch Vulnerabilities.eng.srt

28.7 KB

How Double-Fetch Situations turn into Double-Fetch Vulnerabilities.eng.text

20.3 KB

How Double-Fetch Situations turn into Double-Fetch Vulnerabilities.eng.tsv

25.1 KB

How Double-Fetch Situations turn into Double-Fetch Vulnerabilities.eng.txt

29.0 KB

How Double-Fetch Situations turn into Double-Fetch Vulnerabilities.eng.vtt

26.3 KB

How the Web Tangled Itself.eng.json

2.0 MB

How the Web Tangled Itself.eng.lrc

57.0 KB

How the Web Tangled Itself.eng.srt

44.7 KB

How the Web Tangled Itself.eng.text

34.9 KB

How the Web Tangled Itself.eng.tsv

47.9 KB

How the Web Tangled Itself.eng.txt

57.9 KB

How the Web Tangled Itself.eng.vtt

41.8 KB

I Have No Idea What I'm Doing - On the Usability of Deploying HTTPS.eng.json

1.4 MB

I Have No Idea What I'm Doing - On the Usability of Deploying HTTPS.eng.lrc

36.5 KB

I Have No Idea What I'm Doing - On the Usability of Deploying HTTPS.eng.srt

38.1 KB

I Have No Idea What I'm Doing - On the Usability of Deploying HTTPS.eng.text

27.8 KB

I Have No Idea What I'm Doing - On the Usability of Deploying HTTPS.eng.tsv

32.8 KB

I Have No Idea What I'm Doing - On the Usability of Deploying HTTPS.eng.txt

36.8 KB

I Have No Idea What I'm Doing - On the Usability of Deploying HTTPS.eng.vtt

35.2 KB

Identifier Binding Attacks and Defenses in Software-Defined Networks.eng.json

1.4 MB

Identifier Binding Attacks and Defenses in Software-Defined Networks.eng.lrc

40.5 KB

Identifier Binding Attacks and Defenses in Software-Defined Networks.eng.srt

34.1 KB

Identifier Binding Attacks and Defenses in Software-Defined Networks.eng.text

26.3 KB

Identifier Binding Attacks and Defenses in Software-Defined Networks.eng.tsv

34.4 KB

Identifier Binding Attacks and Defenses in Software-Defined Networks.eng.txt

41.0 KB

Identifier Binding Attacks and Defenses in Software-Defined Networks.eng.vtt

31.8 KB

Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing.eng.json

1.2 MB

Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing.eng.lrc

31.7 KB

Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing.eng.srt

33.8 KB

Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing.eng.text

24.2 KB

Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing.eng.tsv

28.5 KB

Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing.eng.txt

32.0 KB

Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing.eng.vtt

31.1 KB

kAFL - Hardware-Assisted Feedback Fuzzing for OS Kernels.eng.json

1.1 MB

kAFL - Hardware-Assisted Feedback Fuzzing for OS Kernels.eng.lrc

29.8 KB

kAFL - Hardware-Assisted Feedback Fuzzing for OS Kernels.eng.srt

27.8 KB

kAFL - Hardware-Assisted Feedback Fuzzing for OS Kernels.eng.text

19.3 KB

kAFL - Hardware-Assisted Feedback Fuzzing for OS Kernels.eng.tsv

25.3 KB

kAFL - Hardware-Assisted Feedback Fuzzing for OS Kernels.eng.txt

30.2 KB

kAFL - Hardware-Assisted Feedback Fuzzing for OS Kernels.eng.vtt

25.3 KB

Locally Differentially Private Protocols for Frequency Estimation.eng.json

835.5 KB

Locally Differentially Private Protocols for Frequency Estimation.eng.lrc

22.5 KB

Locally Differentially Private Protocols for Frequency Estimation.eng.srt

21.5 KB

Locally Differentially Private Protocols for Frequency Estimation.eng.text

14.7 KB

Locally Differentially Private Protocols for Frequency Estimation.eng.tsv

19.1 KB

Locally Differentially Private Protocols for Frequency Estimation.eng.txt

22.8 KB

Locally Differentially Private Protocols for Frequency Estimation.eng.vtt

19.6 KB

Loophole - Timing Attacks on Shared Event Loops in Chrome.eng.json

1.1 MB

Loophole - Timing Attacks on Shared Event Loops in Chrome.eng.lrc

27.0 KB

Loophole - Timing Attacks on Shared Event Loops in Chrome.eng.srt

28.1 KB

Loophole - Timing Attacks on Shared Event Loops in Chrome.eng.text

20.1 KB

Loophole - Timing Attacks on Shared Event Loops in Chrome.eng.tsv

24.0 KB

Loophole - Timing Attacks on Shared Event Loops in Chrome.eng.txt

27.3 KB

Loophole - Timing Attacks on Shared Event Loops in Chrome.eng.vtt

25.9 KB

Malton - Towards On-Device Non-Invasive Mobile Malware Analysis for ART.eng.json

1.1 MB

Malton - Towards On-Device Non-Invasive Mobile Malware Analysis for ART.eng.lrc

30.7 KB

Malton - Towards On-Device Non-Invasive Mobile Malware Analysis for ART.eng.srt

34.4 KB

Malton - Towards On-Device Non-Invasive Mobile Malware Analysis for ART.eng.text

21.7 KB

Malton - Towards On-Device Non-Invasive Mobile Malware Analysis for ART.eng.tsv

27.0 KB

Malton - Towards On-Device Non-Invasive Mobile Malware Analysis for ART.eng.txt

31.1 KB

Malton - Towards On-Device Non-Invasive Mobile Malware Analysis for ART.eng.vtt

30.8 KB

MCMix - Anonymous Messaging via Secure Multiparty Computation.eng.json

1.1 MB

MCMix - Anonymous Messaging via Secure Multiparty Computation.eng.lrc

32.8 KB

MCMix - Anonymous Messaging via Secure Multiparty Computation.eng.srt

26.2 KB

MCMix - Anonymous Messaging via Secure Multiparty Computation.eng.text

20.6 KB

MCMix - Anonymous Messaging via Secure Multiparty Computation.eng.tsv

27.4 KB

MCMix - Anonymous Messaging via Secure Multiparty Computation.eng.txt

33.3 KB

MCMix - Anonymous Messaging via Secure Multiparty Computation.eng.vtt

24.5 KB

Measuring HTTPS Adoption on the Web.eng.json

1.7 MB

Measuring HTTPS Adoption on the Web.eng.lrc

49.7 KB

Measuring HTTPS Adoption on the Web.eng.srt

40.5 KB

Measuring HTTPS Adoption on the Web.eng.text

28.8 KB

Measuring HTTPS Adoption on the Web.eng.tsv

40.8 KB

Measuring HTTPS Adoption on the Web.eng.txt

50.5 KB

Measuring HTTPS Adoption on the Web.eng.vtt

37.1 KB

Measuring the Insecurity of Mobile Deep Links of Android.eng.json

1.5 MB

Measuring the Insecurity of Mobile Deep Links of Android.eng.lrc

37.6 KB

Measuring the Insecurity of Mobile Deep Links of Android.eng.srt

39.1 KB

Measuring the Insecurity of Mobile Deep Links of Android.eng.text

26.8 KB

Measuring the Insecurity of Mobile Deep Links of Android.eng.tsv

33.1 KB

Measuring the Insecurity of Mobile Deep Links of Android.eng.txt

38.0 KB

Measuring the Insecurity of Mobile Deep Links of Android.eng.vtt

35.6 KB

MPI - Multiple Perspective Attack Investigation.eng.json

1.0 MB

MPI - Multiple Perspective Attack Investigation.eng.lrc

27.9 KB

MPI - Multiple Perspective Attack Investigation.eng.srt

30.0 KB

MPI - Multiple Perspective Attack Investigation.eng.text

20.2 KB

MPI - Multiple Perspective Attack Investigation.eng.tsv

24.6 KB

MPI - Multiple Perspective Attack Investigation.eng.txt

28.2 KB

MPI - Multiple Perspective Attack Investigation.eng.vtt

27.2 KB

Neural Nets Can Learn Function Type Signatures From Binaries.eng.json

1.2 MB

Neural Nets Can Learn Function Type Signatures From Binaries.eng.lrc

30.9 KB

Neural Nets Can Learn Function Type Signatures From Binaries.eng.srt

32.2 KB

Neural Nets Can Learn Function Type Signatures From Binaries.eng.text

24.1 KB

Neural Nets Can Learn Function Type Signatures From Binaries.eng.tsv

27.9 KB

Neural Nets Can Learn Function Type Signatures From Binaries.eng.txt

31.1 KB

Neural Nets Can Learn Function Type Signatures From Binaries.eng.vtt

30.0 KB

Ninja - Towards Transparent Tracing and Debugging on ARM.eng.json

966.2 KB

Ninja - Towards Transparent Tracing and Debugging on ARM.eng.lrc

26.0 KB

Ninja - Towards Transparent Tracing and Debugging on ARM.eng.srt

26.5 KB

Ninja - Towards Transparent Tracing and Debugging on ARM.eng.text

19.5 KB

Ninja - Towards Transparent Tracing and Debugging on ARM.eng.tsv

23.2 KB

Ninja - Towards Transparent Tracing and Debugging on ARM.eng.txt

26.3 KB

Ninja - Towards Transparent Tracing and Debugging on ARM.eng.vtt

24.6 KB

On the effectiveness of mitigations against floating-point timing channels.eng.json

1.6 MB

On the effectiveness of mitigations against floating-point timing channels.eng.lrc

47.4 KB

On the effectiveness of mitigations against floating-point timing channels.eng.srt

38.6 KB

On the effectiveness of mitigations against floating-point timing channels.eng.text

27.5 KB

On the effectiveness of mitigations against floating-point timing channels.eng.tsv

38.9 KB

On the effectiveness of mitigations against floating-point timing channels.eng.txt

48.2 KB

On the effectiveness of mitigations against floating-point timing channels.eng.vtt

35.3 KB

Opening Remarks and Awards.eng.json

651.5 KB

Opening Remarks and Awards.eng.lrc

18.0 KB

Opening Remarks and Awards.eng.srt

17.7 KB

Opening Remarks and Awards.eng.text

11.9 KB

Opening Remarks and Awards.eng.tsv

15.2 KB

Opening Remarks and Awards.eng.txt

18.2 KB

Opening Remarks and Awards.eng.vtt

16.1 KB

ORide - A Privacy-Preserving yet Accountable Ride-Hailing Service.eng.json

1.2 MB

ORide - A Privacy-Preserving yet Accountable Ride-Hailing Service.eng.lrc

33.1 KB

ORide - A Privacy-Preserving yet Accountable Ride-Hailing Service.eng.srt

29.3 KB

ORide - A Privacy-Preserving yet Accountable Ride-Hailing Service.eng.text

22.4 KB

ORide - A Privacy-Preserving yet Accountable Ride-Hailing Service.eng.tsv

28.4 KB

ORide - A Privacy-Preserving yet Accountable Ride-Hailing Service.eng.txt

33.6 KB

ORide - A Privacy-Preserving yet Accountable Ride-Hailing Service.eng.vtt

27.3 KB

Oscar - A Practical Page-Permissions-Based Scheme.eng.json

1.2 MB

Oscar - A Practical Page-Permissions-Based Scheme.eng.lrc

31.7 KB

Oscar - A Practical Page-Permissions-Based Scheme.eng.srt

32.5 KB

Oscar - A Practical Page-Permissions-Based Scheme.eng.text

23.8 KB

Oscar - A Practical Page-Permissions-Based Scheme.eng.tsv

28.2 KB

Oscar - A Practical Page-Permissions-Based Scheme.eng.txt

32.0 KB

Oscar - A Practical Page-Permissions-Based Scheme.eng.vtt

30.0 KB

OSS-Fuzz - Google's continuous fuzzing service for open source software.eng.json

1.8 MB

OSS-Fuzz - Google's continuous fuzzing service for open source software.eng.lrc

45.4 KB

OSS-Fuzz - Google's continuous fuzzing service for open source software.eng.srt

51.4 KB

OSS-Fuzz - Google's continuous fuzzing service for open source software.eng.text

31.8 KB

OSS-Fuzz - Google's continuous fuzzing service for open source software.eng.tsv

39.8 KB

OSS-Fuzz - Google's continuous fuzzing service for open source software.eng.txt

45.9 KB

OSS-Fuzz - Google's continuous fuzzing service for open source software.eng.vtt

45.8 KB

PDF Mirage - Content Masking Attack Against Information-Based Online Services.eng.json

1.2 MB

PDF Mirage - Content Masking Attack Against Information-Based Online Services.eng.lrc

38.8 KB

PDF Mirage - Content Masking Attack Against Information-Based Online Services.eng.srt

28.0 KB

PDF Mirage - Content Masking Attack Against Information-Based Online Services.eng.text

20.9 KB

PDF Mirage - Content Masking Attack Against Information-Based Online Services.eng.tsv

31.0 KB

PDF Mirage - Content Masking Attack Against Information-Based Online Services.eng.txt

39.5 KB

PDF Mirage - Content Masking Attack Against Information-Based Online Services.eng.vtt

25.9 KB

Phoenix - Rebirth of a Cryptographic Password-Hardening Service.eng.json

1.1 MB

Phoenix - Rebirth of a Cryptographic Password-Hardening Service.eng.lrc

28.2 KB

Phoenix - Rebirth of a Cryptographic Password-Hardening Service.eng.srt

29.1 KB

Phoenix - Rebirth of a Cryptographic Password-Hardening Service.eng.text

21.2 KB

Phoenix - Rebirth of a Cryptographic Password-Hardening Service.eng.tsv

25.2 KB

Phoenix - Rebirth of a Cryptographic Password-Hardening Service.eng.txt

28.5 KB

Phoenix - Rebirth of a Cryptographic Password-Hardening Service.eng.vtt

26.9 KB

Picking Up My Tab.eng.json

846.3 KB

Picking Up My Tab.eng.lrc

22.9 KB

Picking Up My Tab.eng.srt

22.7 KB

Picking Up My Tab.eng.text

16.1 KB

Picking Up My Tab.eng.tsv

19.9 KB

Picking Up My Tab.eng.txt

23.2 KB

Picking Up My Tab.eng.vtt

20.9 KB

PlatPal - Detecting Malicious Documents with Platform Diversity.eng.json

1.2 MB

PlatPal - Detecting Malicious Documents with Platform Diversity.eng.lrc

32.1 KB

PlatPal - Detecting Malicious Documents with Platform Diversity.eng.srt

30.5 KB

PlatPal - Detecting Malicious Documents with Platform Diversity.eng.text

21.8 KB

PlatPal - Detecting Malicious Documents with Platform Diversity.eng.tsv

27.6 KB

PlatPal - Detecting Malicious Documents with Platform Diversity.eng.txt

32.5 KB

PlatPal - Detecting Malicious Documents with Platform Diversity.eng.vtt

28.0 KB

Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts.eng.json

1.2 MB

Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts.eng.lrc

35.2 KB

Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts.eng.srt

29.8 KB

Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts.eng.text

21.3 KB

Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts.eng.tsv

29.2 KB

Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts.eng.txt

35.7 KB

Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts.eng.vtt

27.3 KB

Predicting the Resilience of Obfuscated Code.eng.json

1.1 MB

Predicting the Resilience of Obfuscated Code.eng.lrc

33.3 KB

Predicting the Resilience of Obfuscated Code.eng.srt

26.3 KB

Predicting the Resilience of Obfuscated Code.eng.text

20.3 KB

Predicting the Resilience of Obfuscated Code.eng.tsv

27.7 KB

Predicting the Resilience of Obfuscated Code.eng.txt

33.8 KB

Predicting the Resilience of Obfuscated Code.eng.vtt

24.6 KB

PrimeAbort - A Timer-Free High-Precision L3 Cache Attack using Intel TSX.eng.json

1.6 MB

PrimeAbort - A Timer-Free High-Precision L3 Cache Attack using Intel TSX.eng.lrc

48.0 KB

PrimeAbort - A Timer-Free High-Precision L3 Cache Attack using Intel TSX.eng.srt

37.7 KB

PrimeAbort - A Timer-Free High-Precision L3 Cache Attack using Intel TSX.eng.text

28.7 KB

PrimeAbort - A Timer-Free High-Precision L3 Cache Attack using Intel TSX.eng.tsv

39.7 KB

PrimeAbort - A Timer-Free High-Precision L3 Cache Attack using Intel TSX.eng.txt

48.8 KB

PrimeAbort - A Timer-Free High-Precision L3 Cache Attack using Intel TSX.eng.vtt

35.1 KB

Qapla - Policy compliance for database-backed systems.eng.json

1.7 MB

Qapla - Policy compliance for database-backed systems.eng.lrc

51.0 KB

Qapla - Policy compliance for database-backed systems.eng.srt

40.9 KB

Qapla - Policy compliance for database-backed systems.eng.text

31.5 KB

Qapla - Policy compliance for database-backed systems.eng.tsv

42.6 KB

Qapla - Policy compliance for database-backed systems.eng.txt

51.8 KB

Qapla - Policy compliance for database-backed systems.eng.vtt

38.1 KB

REM - Resource-Efficient Mining for Blockchains.eng.json

1.1 MB

REM - Resource-Efficient Mining for Blockchains.eng.lrc

28.2 KB

REM - Resource-Efficient Mining for Blockchains.eng.srt

29.6 KB

REM - Resource-Efficient Mining for Blockchains.eng.text

21.0 KB

REM - Resource-Efficient Mining for Blockchains.eng.tsv

25.2 KB

REM - Resource-Efficient Mining for Blockchains.eng.txt

28.5 KB

REM - Resource-Efficient Mining for Blockchains.eng.vtt

27.2 KB

Reverse Engineering x86 Processor Microcode.eng.json

888.2 KB

Reverse Engineering x86 Processor Microcode.eng.lrc

25.9 KB

Reverse Engineering x86 Processor Microcode.eng.srt

23.1 KB

Reverse Engineering x86 Processor Microcode.eng.text

16.2 KB

Reverse Engineering x86 Processor Microcode.eng.tsv

21.6 KB

Reverse Engineering x86 Processor Microcode.eng.txt

26.2 KB

Reverse Engineering x86 Processor Microcode.eng.vtt

21.1 KB

ROTE - Rollback Protection for Trusted Execution.eng.json

1.5 MB

ROTE - Rollback Protection for Trusted Execution.eng.lrc

37.3 KB

ROTE - Rollback Protection for Trusted Execution.eng.srt

40.8 KB

ROTE - Rollback Protection for Trusted Execution.eng.text

28.5 KB

ROTE - Rollback Protection for Trusted Execution.eng.tsv

33.5 KB

ROTE - Rollback Protection for Trusted Execution.eng.txt

37.6 KB

ROTE - Rollback Protection for Trusted Execution.eng.vtt

37.4 KB

Same-Origin Policy - Evaluation in Modern Browsers.eng.json

1.3 MB

Same-Origin Policy - Evaluation in Modern Browsers.eng.lrc

35.0 KB

Same-Origin Policy - Evaluation in Modern Browsers.eng.srt

31.7 KB

Same-Origin Policy - Evaluation in Modern Browsers.eng.text

21.8 KB

Same-Origin Policy - Evaluation in Modern Browsers.eng.tsv

29.4 KB

Same-Origin Policy - Evaluation in Modern Browsers.eng.txt

35.5 KB

Same-Origin Policy - Evaluation in Modern Browsers.eng.vtt

28.9 KB

See No Evil, Hear No Evil, Feel No Evil.eng.json

1.4 MB

See No Evil, Hear No Evil, Feel No Evil.eng.lrc

39.7 KB

See No Evil, Hear No Evil, Feel No Evil.eng.srt

34.5 KB

See No Evil, Hear No Evil, Feel No Evil.eng.text

25.4 KB

See No Evil, Hear No Evil, Feel No Evil.eng.tsv

33.5 KB

See No Evil, Hear No Evil, Feel No Evil.eng.txt

40.2 KB

See No Evil, Hear No Evil, Feel No Evil.eng.vtt

31.8 KB

Seeing Through The Same Lens.eng.json

1.3 MB

Seeing Through The Same Lens.eng.lrc

33.6 KB

Seeing Through The Same Lens.eng.srt

34.5 KB

Seeing Through The Same Lens.eng.text

25.6 KB

Seeing Through The Same Lens.eng.tsv

30.2 KB

Seeing Through The Same Lens.eng.txt

33.9 KB

Seeing Through The Same Lens.eng.vtt

32.0 KB

SLEUTH - Real-time Attack Scenario Reconstruction from COTS Audit Data.eng.json

1.2 MB

SLEUTH - Real-time Attack Scenario Reconstruction from COTS Audit Data.eng.lrc

30.6 KB

SLEUTH - Real-time Attack Scenario Reconstruction from COTS Audit Data.eng.srt

31.2 KB

SLEUTH - Real-time Attack Scenario Reconstruction from COTS Audit Data.eng.text

23.2 KB

SLEUTH - Real-time Attack Scenario Reconstruction from COTS Audit Data.eng.tsv

27.4 KB

SLEUTH - Real-time Attack Scenario Reconstruction from COTS Audit Data.eng.txt

30.9 KB

SLEUTH - Real-time Attack Scenario Reconstruction from COTS Audit Data.eng.vtt

29.0 KB

SmartAuth - User-Centered Authorization for the Internet of Things.eng.json

1.2 MB

SmartAuth - User-Centered Authorization for the Internet of Things.eng.lrc

31.6 KB

SmartAuth - User-Centered Authorization for the Internet of Things.eng.srt

32.5 KB

SmartAuth - User-Centered Authorization for the Internet of Things.eng.text

23.3 KB

SmartAuth - User-Centered Authorization for the Internet of Things.eng.tsv

28.0 KB

SmartAuth - User-Centered Authorization for the Internet of Things.eng.txt

31.9 KB

SmartAuth - User-Centered Authorization for the Internet of Things.eng.vtt

29.9 KB

SmartPool - Practical Decentralized Pooled Mining.eng.json

1.3 MB

SmartPool - Practical Decentralized Pooled Mining.eng.lrc

34.8 KB

SmartPool - Practical Decentralized Pooled Mining.eng.srt

35.1 KB

SmartPool - Practical Decentralized Pooled Mining.eng.text

23.5 KB

SmartPool - Practical Decentralized Pooled Mining.eng.tsv

29.9 KB

SmartPool - Practical Decentralized Pooled Mining.eng.txt

35.2 KB

SmartPool - Practical Decentralized Pooled Mining.eng.vtt

31.8 KB

Speeding up detection of SHA-1 collision attacks.eng.json

1.1 MB

Speeding up detection of SHA-1 collision attacks.eng.lrc

30.7 KB

Speeding up detection of SHA-1 collision attacks.eng.srt

27.0 KB

Speeding up detection of SHA-1 collision attacks.eng.text

19.2 KB

Speeding up detection of SHA-1 collision attacks.eng.tsv

25.6 KB

Speeding up detection of SHA-1 collision attacks.eng.txt

31.1 KB

Speeding up detection of SHA-1 collision attacks.eng.vtt

24.8 KB

Strong and Efficient Cache Side-Channel Protection.eng.json

1.2 MB

Strong and Efficient Cache Side-Channel Protection.eng.lrc

32.1 KB

Strong and Efficient Cache Side-Channel Protection.eng.srt

29.8 KB

Strong and Efficient Cache Side-Channel Protection.eng.text

21.2 KB

Strong and Efficient Cache Side-Channel Protection.eng.tsv

27.4 KB

Strong and Efficient Cache Side-Channel Protection.eng.txt

32.5 KB

Strong and Efficient Cache Side-Channel Protection.eng.vtt

27.3 KB

Syntia - Synthesizing the Semantics of Obfuscated Code.eng.json

1.3 MB

Syntia - Synthesizing the Semantics of Obfuscated Code.eng.lrc

36.7 KB

Syntia - Synthesizing the Semantics of Obfuscated Code.eng.srt

33.6 KB

Syntia - Synthesizing the Semantics of Obfuscated Code.eng.text

22.3 KB

Syntia - Synthesizing the Semantics of Obfuscated Code.eng.tsv

30.5 KB

Syntia - Synthesizing the Semantics of Obfuscated Code.eng.txt

37.3 KB

Syntia - Synthesizing the Semantics of Obfuscated Code.eng.vtt

30.4 KB

Telling Your Secrets without Page Faults.eng.json

1.1 MB

Telling Your Secrets without Page Faults.eng.lrc

33.1 KB

Telling Your Secrets without Page Faults.eng.srt

26.3 KB

Telling Your Secrets without Page Faults.eng.text

20.5 KB

Telling Your Secrets without Page Faults.eng.tsv

27.6 KB

Telling Your Secrets without Page Faults.eng.txt

33.6 KB

Telling Your Secrets without Page Faults.eng.vtt

24.6 KB

The Loopix Anonymity System.eng.json

1.4 MB

The Loopix Anonymity System.eng.lrc

43.6 KB

The Loopix Anonymity System.eng.srt

33.7 KB

The Loopix Anonymity System.eng.text

25.1 KB

The Loopix Anonymity System.eng.tsv

35.8 KB

The Loopix Anonymity System.eng.txt

44.3 KB

The Loopix Anonymity System.eng.vtt

31.2 KB

Towards Efficient Heap Overflow Discovery.eng.json

992.3 KB

Towards Efficient Heap Overflow Discovery.eng.lrc

26.2 KB

Towards Efficient Heap Overflow Discovery.eng.srt

27.6 KB

Towards Efficient Heap Overflow Discovery.eng.text

19.5 KB

Towards Efficient Heap Overflow Discovery.eng.tsv

23.3 KB

Towards Efficient Heap Overflow Discovery.eng.txt

26.4 KB

Towards Efficient Heap Overflow Discovery.eng.vtt

25.3 KB

Towards Practical Tools for Side Channel Aware Software Engineering.eng.json

1.3 MB

Towards Practical Tools for Side Channel Aware Software Engineering.eng.lrc

35.3 KB

Towards Practical Tools for Side Channel Aware Software Engineering.eng.srt

36.0 KB

Towards Practical Tools for Side Channel Aware Software Engineering.eng.text

27.5 KB

Towards Practical Tools for Side Channel Aware Software Engineering.eng.tsv

31.9 KB

Towards Practical Tools for Side Channel Aware Software Engineering.eng.txt

35.6 KB

Towards Practical Tools for Side Channel Aware Software Engineering.eng.vtt

33.6 KB

Transcend - Detecting Concept Drift in Malware Classification Models.eng.json

1.0 MB

Transcend - Detecting Concept Drift in Malware Classification Models.eng.lrc

25.2 KB

Transcend - Detecting Concept Drift in Malware Classification Models.eng.srt

28.1 KB

Transcend - Detecting Concept Drift in Malware Classification Models.eng.text

19.8 KB

Transcend - Detecting Concept Drift in Malware Classification Models.eng.tsv

22.9 KB

Transcend - Detecting Concept Drift in Malware Classification Models.eng.txt

25.4 KB

Transcend - Detecting Concept Drift in Malware Classification Models.eng.vtt

25.8 KB

TrustBase - An Architecture to Repair and Strengthen.eng.json

1.5 MB

TrustBase - An Architecture to Repair and Strengthen.eng.lrc

41.2 KB

TrustBase - An Architecture to Repair and Strengthen.eng.srt

39.1 KB

TrustBase - An Architecture to Repair and Strengthen.eng.text

29.6 KB

TrustBase - An Architecture to Repair and Strengthen.eng.tsv

36.2 KB

TrustBase - An Architecture to Repair and Strengthen.eng.txt

41.6 KB

TrustBase - An Architecture to Repair and Strengthen.eng.vtt

36.4 KB

Understanding the Mirai Botnet.eng.json

1.3 MB

Understanding the Mirai Botnet.eng.lrc

36.1 KB

Understanding the Mirai Botnet.eng.srt

32.6 KB

Understanding the Mirai Botnet.eng.text

24.5 KB

Understanding the Mirai Botnet.eng.tsv

31.2 KB

Understanding the Mirai Botnet.eng.txt

36.5 KB

Understanding the Mirai Botnet.eng.vtt

30.3 KB

USB Snooping Made Easy - Crosstalk Leakage Attacks on USB Hubs.eng.json

828.2 KB

USB Snooping Made Easy - Crosstalk Leakage Attacks on USB Hubs.eng.lrc

20.5 KB

USB Snooping Made Easy - Crosstalk Leakage Attacks on USB Hubs.eng.srt

23.7 KB

USB Snooping Made Easy - Crosstalk Leakage Attacks on USB Hubs.eng.text

15.6 KB

USB Snooping Made Easy - Crosstalk Leakage Attacks on USB Hubs.eng.tsv

18.4 KB

USB Snooping Made Easy - Crosstalk Leakage Attacks on USB Hubs.eng.txt

20.7 KB

USB Snooping Made Easy - Crosstalk Leakage Attacks on USB Hubs.eng.vtt

21.4 KB

Vale - Verifying High-Performance Cryptographic Assembly Code.eng.json

1.5 MB

Vale - Verifying High-Performance Cryptographic Assembly Code.eng.lrc

42.8 KB

Vale - Verifying High-Performance Cryptographic Assembly Code.eng.srt

37.5 KB

Vale - Verifying High-Performance Cryptographic Assembly Code.eng.text

29.1 KB

Vale - Verifying High-Performance Cryptographic Assembly Code.eng.tsv

36.9 KB

Vale - Verifying High-Performance Cryptographic Assembly Code.eng.txt

43.3 KB

Vale - Verifying High-Performance Cryptographic Assembly Code.eng.vtt

35.1 KB

Venerable Variadic Vulnerabilities Vanquished.eng.json

1.0 MB

Venerable Variadic Vulnerabilities Vanquished.eng.lrc

31.3 KB

Venerable Variadic Vulnerabilities Vanquished.eng.srt

24.9 KB

Venerable Variadic Vulnerabilities Vanquished.eng.text

17.7 KB

Venerable Variadic Vulnerabilities Vanquished.eng.tsv

25.4 KB

Venerable Variadic Vulnerabilities Vanquished.eng.txt

31.9 KB

Venerable Variadic Vulnerabilities Vanquished.eng.vtt

22.8 KB

vTZ - Virtualizing ARM TrustZone.eng.json

1.2 MB

vTZ - Virtualizing ARM TrustZone.eng.lrc

30.5 KB

vTZ - Virtualizing ARM TrustZone.eng.srt

32.1 KB

vTZ - Virtualizing ARM TrustZone.eng.text

23.5 KB

vTZ - Virtualizing ARM TrustZone.eng.tsv

27.4 KB

vTZ - Virtualizing ARM TrustZone.eng.txt

30.7 KB

vTZ - Virtualizing ARM TrustZone.eng.vtt

29.7 KB

Walkie-Talkie.eng.json

1.8 MB

Walkie-Talkie.eng.lrc

46.2 KB

Walkie-Talkie.eng.srt

44.0 KB

Walkie-Talkie.eng.text

31.5 KB

Walkie-Talkie.eng.tsv

39.9 KB

Walkie-Talkie.eng.txt

46.7 KB

Walkie-Talkie.eng.vtt

40.4 KB

When the Weakest Link is Strong.eng.json

1.7 MB

When the Weakest Link is Strong.eng.lrc

48.4 KB

When the Weakest Link is Strong.eng.srt

41.8 KB

When the Weakest Link is Strong.eng.text

30.5 KB

When the Weakest Link is Strong.eng.tsv

40.8 KB

When the Weakest Link is Strong.eng.txt

49.1 KB

When the Weakest Link is Strong.eng.vtt

38.5 KB

When Your Threat Model Is - Everything - Defensive Security in Modern Newsrooms.eng.json

2.9 MB

When Your Threat Model Is - Everything - Defensive Security in Modern Newsrooms.eng.lrc

79.3 KB

When Your Threat Model Is - Everything - Defensive Security in Modern Newsrooms.eng.srt

66.3 KB

When Your Threat Model Is - Everything - Defensive Security in Modern Newsrooms.eng.text

48.9 KB

When Your Threat Model Is - Everything - Defensive Security in Modern Newsrooms.eng.tsv

66.8 KB

When Your Threat Model Is - Everything - Defensive Security in Modern Newsrooms.eng.txt

80.4 KB

When Your Threat Model Is - Everything - Defensive Security in Modern Newsrooms.eng.vtt

61.1 KB

/.../USENIX Security 2017 Technical Sessions USENIX_files/

analytics.js

45.2 KB

application-octet-stream.png

0.2 KB

application-pdf.png

0.3 KB

css_mMMIpDBXDqo0rCZrN7FoMlBPY0tKvHCE04XYURHXl9M.css

610.1 KB

css_mTaWTa-gjA-dVa8tJl4KV4v7oKx8qHNzCSd2Zupzqn4.css

9.6 KB

css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css

3.8 KB

css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css

5.4 KB

js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js

20.5 KB

js_AQDKCRqaqaAAAzbvxcaEQBooKEQA-dFTfff7tzCklI8.js

14.0 KB

js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js

120.3 KB

js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js

26.8 KB

js_qq8Htu2Ei-eV_IteNYMM8zM4yBe6NOtuXBD56RXHvN4.js

9.9 KB

js_zsU7pE_En9PuEzx00IjN_iCxIwgABAiEwJNkh1iTG9k.js

8.2 KB

kissner_lea_100x115.png

17.2 KB

kowalczyk_ellen_110x115.png

23.0 KB

narayan_shankar_100x115.png

24.8 KB

package-x-generic.png

0.3 KB

pdf.svg

0.5 KB

sec17_wordmark_stacked.svg

11.5 KB

serebryany_konstantin_100x115.png

22.0 KB

slides.svg

0.7 KB

usenix-locked.png

1.4 KB

video.svg

0.8 KB

/.../USENIX Security 2017 USENIX_files/

acmqueue_600x240_1.png

4.7 KB

analytics.js

45.2 KB

baidu_150x60.png

3.0 KB

bit_150x60.png

7.4 KB

cisco_300x120.png

6.5 KB

css_mMMIpDBXDqo0rCZrN7FoMlBPY0tKvHCE04XYURHXl9M.css

610.1 KB

css_mTaWTa-gjA-dVa8tJl4KV4v7oKx8qHNzCSd2Zupzqn4.css

9.6 KB

css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css

3.8 KB

css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css

5.4 KB

dmtf_600x240.png

3.2 KB

facebook_2016_300x120_1.png

4.8 KB

freebsdfoundation_600x240_0.png

3.4 KB

ibm_research_stacked_300x120_0.png

5.6 KB

js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js

20.5 KB

js_AQDKCRqaqaAAAzbvxcaEQBooKEQA-dFTfff7tzCklI8.js

14.0 KB

js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js

120.3 KB

js_PACmgStbFksqYzX-HlEqBZWNu18Gac4c9Dc2EzyjEsM.js

8.3 KB

js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js

26.8 KB

js_zsU7pE_En9PuEzx00IjN_iCxIwgABAiEwJNkh1iTG9k.js

8.2 KB

mars_horizontal_300x120.png

2.8 KB

netflix_300x120_0.png

6.2 KB

nostarch_600x240_1.png

2.6 KB

nsf_300x120_v2_1.png

17.0 KB

sec17_button_180.png

7.7 KB

sec17_wordmark_stacked.svg

11.5 KB

sec17_wordmark_stacked_002.svg

11.5 KB

sheraton_vancouver_600.png

487.7 KB

usenix_logo_300x150_neat_2.png

15.0 KB

visa_research_300x120.png

5.4 KB

yubico_300x120_1.png

3.8 KB

/USENIX Security 2018/

27th USENIX Security Symposium Grid.htm

405.4 KB

A Bad Dream - Subverting Trusted Platform Module While You Are Sleeping.mp4

26.1 MB

A Sense of Time for JavaScript and Node.js.mp4

18.9 MB

A4NT - Author Attribute Anonymity by Adversarial Training of Neural Machine Translation.mp4

22.9 MB

ACES - Automatic Compartments for Embedded Systems.mp4

13.1 MB

Acquisitional Rule-based Engine for Discovering Internet-of-Things Devices.mp4

22.1 MB

All Your GPS Are Belong To Us - Towards Stealthy Manipulation of Road Navigation Systems.mp4

20.1 MB

An Empirical Analysis of Anonymity in Zcash.mp4

18.5 MB

An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications.mp4

19.0 MB

Analogy Cyber Security-From 0101 to Mixed Signals.mp4

48.9 MB

Analysis of Privacy Protections in Fitness Tracking Social Networks -or- You can run.mp4

25.3 MB

Arbitrum - Scalable, private smart contracts.mp4

19.8 MB

ATtention Spanned - Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem.mp4

19.3 MB

AttriGuard - A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning.mp4

16.9 MB

Automatic Heap Layout Manipulation for Exploitation.mp4

20.3 MB

Bamboozling Certificate Authorities with BGP.mp4

25.9 MB

Better managed than memorized Studying the Impact of Managers on Password Strength and Reuse.mp4

26.7 MB

BlackIoT - IoT Botnet of High Wattage Devices Can Disrupt the Power Grid.mp4

32.9 MB

BurnBox - Self-Revocable Encryption in a World Of Compelled Access.mp4

20.4 MB

Charm - Facilitating Dynamic Analysis of Device Drivers of Mobile Systems.mp4

22.1 MB

Chipmunk or Pepe Using Acoustical Analysis to Detect Voice-Channel Fraud at Scale.mp4

48.2 MB

CommanderSong - A Systematic Approach for Practical Adversarial Voice Recognition.mp4

19.6 MB

DATA - Differential Address Trace Analysis - Finding Address-based Side-Channels in Binaries.mp4

18.2 MB

Debloating Software through Piece-Wise Compilation and Loading.mp4

17.3 MB

DelegaTEE - Brokered Delegation Using Trusted Execution Environments.mp4

23.3 MB

Dependence-Preserving Data Compaction for Scalable Forensic Analysis.mp4

23.1 MB

Discovering Flaws in Security-Focused Static Analysis Tools for Android using Systematic Mutation.mp4

22.8 MB

DIZK - A Distributed Zero Knowledge Proof System.mp4

15.3 MB

Efail - Breaking S MIME and OpenPGP Email Encryption using Exfiltration Channels.mp4

17.1 MB

Effective Detection of Multimedia Protocol Tunneling using Machine Learning.mp4

18.5 MB

Enabling Refinable Cross-Host Attack Investigation with Efficient Data Flow Tagging and Tracking.mp4

18.7 MB

End-to-End Measurements of Email Spoofing Attacks.mp4

24.1 MB

End-Users Get Maneuvered - Empirical Analysis of Redirection Hijacking in Content Delivery Networks.mp4

17.2 MB

Enter the Hydra - Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts.mp4

34.5 MB

Erays - Reverse Engineering Ethereum's Opaque Smart Contracts.mp4

19.0 MB

FANCI - Feature-based Automated NXDomain Classification and Intelligence.mp4

15.2 MB

Fast and Service-preserving Recovery from Malware Infections Using CRIU.mp4

18.0 MB

Fear the Reaper - Characterization and Fast Detection of Card Skimmers.mp4

19.2 MB

FlowCog - Context-aware Semantics Extraction and Analysis of Information Flow Leaks in Android Apps.mp4

20.4 MB

Foreshadow - Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution.mp4

26.2 MB

Forgetting of Passwords - Ecological Theory and Data.mp4

19.3 MB

Formal Security Analysis of Neural Networks using Symbolic Intervals.mp4

20.5 MB

Fp-Scanner - The Privacy Implications of Browser Fingerprint Inconsistencies.mp4

21.5 MB

Freezing the Web - A Study of ReDoS Vulnerabilities in JavaScript-based Web Servers.mp4

18.0 MB

From Patching Delays to Infection Symptoms.mp4

19.8 MB

FUZE - Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities.mp4

20.2 MB

GAZELLE - A Low Latency Framework for Secure Neural Network Inference.mp4

23.8 MB

Guarder - A Tunable Secure Allocator.mp4

17.0 MB

HeapHopper - Bringing Bounded Model Checking to Heap Implementation Security.mp4

11.8 MB

How Do Tor Users Interact With Onion Services.mp4

17.8 MB

IMIX - In-Process Memory Isolation EXtension.mp4

12.0 MB

Inception - System-Wide Security Testing of Real-World Embedded Systems Software.mp4

17.5 MB

Injected and Delivered - Fabricating Implicit Control over Actuation Systems by Spoofing.mp4

21.5 MB

Malicious Management Unit - Why Stopping Cache Attacks in Software is Harder Than You Think.mp4

21.0 MB

Man-in-the-Machine - Exploiting Ill-Secured Communication Inside the Computer.mp4

18.9 MB

Medical Device Cybersecurity through the FDA Lens.mp4

46.4 MB

Meltdown - Reading Kernel Memory from User Space.mp4

23.3 MB

Modelling and Analysis of a Hierarchy of Distance Bounding Attacks.mp4

27.3 MB

MoonShine - Optimizing OS Fuzzer Seed Selection with Trace Distillation.mp4

20.7 MB

NAVEX - Precise and Scalable Exploit Generation for Dynamic Web Applications.mp4

22.5 MB

NetHide - Secure and Practical Network Topology Obfuscation.mp4

24.3 MB

O Single Sign-Off, Where Art Thou An Empirical Analysis of Single Sign-On.mp4

17.7 MB

Off-Path TCP Exploit - How Wireless Routers Can Jeopardize Your Secrets.mp4

20.0 MB

One&Done - A Single-Decryption EM-Based Attack on OpenSSL's Constant-Time Blinded RSA.mp4

23.5 MB

Plug and Prey Measuring the Commoditization of Cybercrime via Online Anonymous Markets.mp4

21.1 MB

Polisis - Automated Analysis and Presentation of Privacy Policies Using Deep Learning.mp4

22.6 MB

Practical Accountability of Secret Processes.mp4

18.8 MB

Precise and Accurate Patch Presence Test for Binaries.mp4

19.0 MB

Privacy for Tigers.mp4

39.0 MB

Q - Why Do Keynote Speakers Keep Suggesting That Improving Security Is Possible.mp4

62.8 MB

QSYM - A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing.mp4

21.7 MB

Quack - Scalable Remote Measurement of Application-Layer Censorship.mp4

23.5 MB

Rampart - Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks.mp4

20.5 MB

Reading Thieves' Cant - Automatically Identifying and Understanding Dark Jargons from Cybercrime.mp4

20.1 MB

Rethinking Access Control and Authentication for the Home Internet of Things (IoT).mp4

23.5 MB

Return Of Bleichenbacher's Oracle Threat (ROBOT).mp4

17.9 MB

SAD THUG - Structural Anomaly Detection for Transmissions of High-value Information Using Graphics.mp4

16.4 MB

SAQL - A Stream-based Query System for Real-Time Abnormal System Behavior Detection.mp4

25.8 MB

Schrödinger's RAT - Profiling the Stakeholders in the Remote Access Trojan Ecosystem.mp4

12.8 MB

Security Namespace - Making Linux Security Frameworks Available to Containers.mp4

26.1 MB

Sensitive Information Tracking in Commodity IoT.mp4

18.4 MB

Shielding Software From Privileged Side-Channel Attacks.mp4

20.7 MB

Simple Password-Hardened Encryption Services.mp4

11.7 MB

Skill Squatting Attacks on Amazon Alexa.mp4

25.0 MB

Solving the Next Billion-People Privacy Problem.mp4

46.2 MB

Tackling runtime-based obfuscation in Android with TIRO.mp4

16.8 MB

teEther - Gnawing at Ethereum to Automatically Exploit Smart Contracts.mp4

27.1 MB

The aftermath of a crypto-ransomware attack at a large academic institution.mp4

13.9 MB

The Battle for New York - A Case Study of Applied Digital Threat Modeling at the Enterprise Level.mp4

21.7 MB

The Broken Shield - Measuring Revocation Effectiveness in the Windows Code-Signing PKI.mp4

19.8 MB

The Dangers of Key Reuse - Practical Attacks on IPsec IKE.mp4

22.2 MB

The Guard's Dilemma - Efficient Code-Reuse Attacks Against Intel SGX.mp4

25.0 MB

The Law and Economics of Bug Bounties.mp4

50.4 MB

The Rewards and Costs of Stronger Passwords in a University - Linking Password Lifetime to Strength.mp4

23.5 MB

The Second Crypto War-What's Different Now.mp4

39.4 MB

The Secure Socket API - TLS as an Operating System Service.mp4

19.3 MB

Towards a Secure Zero-rating Framework with Three Parties.mp4

16.4 MB

Towards Predicting Efficient and Anonymous Tor Circuits.mp4

16.6 MB

Translation Leak-aside Buffer - Defeating Cache Side-channel Protections with TLB Attacks.mp4

30.3 MB

Turning Your Weakness Into a Strength - Watermarking Deep Neural Networks by Backdooring.mp4

23.3 MB

Understanding the Reproducibility of Crowd-reported Security Vulnerabilities.mp4

32.4 MB

Unveiling and Quantifying Facebook Exploitation of Sensitive Personal Data for Advertising Purposes.mp4

22.9 MB

USENIX Security 2018 Full Proceedings Interior.pdf

107.3 MB

USENIX Security 2018 Full Proceedings.epub

89.9 MB

USENIX Security 2018 Full Proceedings.mobi

155.2 MB

USENIX Security 2018 Full Proceedings.pdf

108.5 MB

USENIX Security 2018 Program at a Glance USENIX.htm

81.1 KB

USENIX Security 2018 Program errata_slip.pdf

297.1 KB

USENIX Security 2018 Technical Sessions USENIX.htm

547.6 KB

USENIX Security 2018 USENIX.htm

106.9 KB

Vetting Single Sign-On SDK Implementations via Symbolic Reasoning.mp4

18.5 MB

We Still Don't Have Secure Cross-Domain Requests - an Empirical Study of CORS.mp4

22.7 MB

When Does Machine Learning FAIL Generalized Transferability for Evasion and Poisoning Attacks.mp4

38.2 MB

Who Is Answering My Queries - Understanding and Characterizing Interception.mp4

20.5 MB

Who Left Open the Cookie Jar A Comprehensive Evaluation of Third-Party Cookie Policies.mp4

17.4 MB

With Great Training Comes Great Vulnerability - Practical Attacks against Transfer Learning.mp4

27.6 MB

WPSE - Fortifying Web Protocols via Browser-Side Security Monitoring.mp4

13.6 MB

/.../27th USENIX Security Symposium Grid_files/

app-apple.svg

7.9 KB

app-google.svg

4.5 KB

bootstrap-custom.css

94.0 KB

custom-screen.css

0.3 KB

jquery.js

97.2 KB

jquery_002.js

2.6 KB

jquery_003.js

96.4 KB

jquery_004.js

38.3 KB

loading-3x.gif

13.3 KB

main.js

73.7 KB

main-current.css

135.9 KB

responsive.css

6.4 KB

/.../USENIX Security 2018 captions/

A Bad Dream - Subverting Trusted Platform Module While You Are Sleeping.eng.srt

54.3 KB

A Sense of Time for JavaScript and Node.js.eng.srt

61.6 KB

A4NT - Author Attribute Anonymity by Adversarial Training of Neural Machine Translation.eng.srt

70.5 KB

ACES - Automatic Compartments for Embedded Systems.eng.srt

53.6 KB

Acquisitional Rule-based Engine for Discovering Internet-of-Things Devices.eng.srt

37.5 KB

All Your GPS Are Belong To Us - Towards Stealthy Manipulation of Road Navigation Systems.eng.srt

55.3 KB

An Empirical Analysis of Anonymity in Zcash.eng.srt

60.1 KB

An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications.eng.srt

45.9 KB

Analogy Cyber Security-From 0101 to Mixed Signals.eng.srt

105.1 KB

Analysis of Privacy Protections in Fitness Tracking Social Networks -or- You can run.eng.srt

54.1 KB

Arbitrum - Scalable, private smart contracts.eng.srt

58.8 KB

ATtention Spanned - Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem.eng.srt

55.5 KB

AttriGuard - A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning.eng.json

1.0 MB

AttriGuard - A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning.eng.lrc

27.8 KB

AttriGuard - A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning.eng.srt

29.1 KB

AttriGuard - A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning.eng.text

20.4 KB

AttriGuard - A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning.eng.tsv

24.5 KB

AttriGuard - A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning.eng.txt

28.1 KB

AttriGuard - A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning.eng.vtt

26.6 KB

Automatic Heap Layout Manipulation for Exploitation.eng.srt

68.7 KB

Bamboozling Certificate Authorities with BGP.eng.srt

65.6 KB

Better managed than memorized Studying the Impact of Managers on Password Strength and Reuse.eng.srt

76.8 KB

BlackIoT - IoT Botnet of High Wattage Devices Can Disrupt the Power Grid.eng.srt

65.1 KB

BurnBox - Self-Revocable Encryption in a World Of Compelled Access.eng.srt

62.0 KB

Charm - Facilitating Dynamic Analysis of Device Drivers of Mobile Systems.eng.srt

50.2 KB

Chipmunk or Pepe Using Acoustical Analysis to Detect Voice-Channel Fraud at Scale.eng.srt

142.2 KB

CommanderSong - A Systematic Approach for Practical Adversarial Voice Recognition.eng.srt

53.0 KB

DATA - Differential Address Trace Analysis - Finding Address-based Side-Channels in Binaries.eng.srt

58.5 KB

Debloating Software through Piece-Wise Compilation and Loading.eng.srt

57.8 KB

DelegaTEE - Brokered Delegation Using Trusted Execution Environments.eng.srt

76.3 KB

Dependence-Preserving Data Compaction for Scalable Forensic Analysis.eng.srt

58.4 KB

Discovering Flaws in Security-Focused Static Analysis Tools for Android using Systematic Mutation.eng.srt

50.0 KB

DIZK - A Distributed Zero Knowledge Proof System.eng.srt

51.6 KB

Efail - Breaking S MIME and OpenPGP Email Encryption using Exfiltration Channels.eng.json

967.3 KB

Efail - Breaking S MIME and OpenPGP Email Encryption using Exfiltration Channels.eng.lrc

23.9 KB

Efail - Breaking S MIME and OpenPGP Email Encryption using Exfiltration Channels.eng.srt

24.1 KB

Efail - Breaking S MIME and OpenPGP Email Encryption using Exfiltration Channels.eng.text

18.4 KB

Efail - Breaking S MIME and OpenPGP Email Encryption using Exfiltration Channels.eng.tsv

21.5 KB

Efail - Breaking S MIME and OpenPGP Email Encryption using Exfiltration Channels.eng.txt

24.1 KB

Efail - Breaking S MIME and OpenPGP Email Encryption using Exfiltration Channels.eng.vtt

22.5 KB

Effective Detection of Multimedia Protocol Tunneling using Machine Learning.eng.srt

63.7 KB

Enabling Refinable Cross-Host Attack Investigation with Efficient Data Flow Tagging and Tracking.eng.srt

42.3 KB

End-to-End Measurements of Email Spoofing Attacks.eng.srt

56.4 KB

End-Users Get Maneuvered - Empirical Analysis of Redirection Hijacking in Content Delivery Networks.eng.srt

40.6 KB

Enter the Hydra - Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts.eng.srt

85.1 KB

Erays - Reverse Engineering Ethereum's Opaque Smart Contracts.eng.srt

55.2 KB

FANCI - Feature-based Automated NXDomain Classification and Intelligence.eng.srt

43.7 KB

Fast and Service-preserving Recovery from Malware Infections Using CRIU.eng.srt

74.7 KB

Fear the Reaper - Characterization and Fast Detection of Card Skimmers.eng.srt

54.9 KB

FlowCog - Context-aware Semantics Extraction and Analysis of Information Flow Leaks in Android Apps.eng.srt

49.5 KB

Foreshadow - Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution.eng.json

1.2 MB

Foreshadow - Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution.eng.lrc

34.5 KB

Foreshadow - Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution.eng.srt

30.2 KB

Foreshadow - Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution.eng.text

22.3 KB

Foreshadow - Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution.eng.tsv

29.1 KB

Foreshadow - Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution.eng.txt

35.0 KB

Foreshadow - Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution.eng.vtt

27.9 KB

Forgetting of Passwords - Ecological Theory and Data.eng.srt

38.7 KB

Formal Security Analysis of Neural Networks using Symbolic Intervals.eng.srt

53.2 KB

Fp-Scanner - The Privacy Implications of Browser Fingerprint Inconsistencies.eng.srt

56.8 KB

Freezing the Web - A Study of ReDoS Vulnerabilities in JavaScript-based Web Servers.eng.srt

52.3 KB

From Patching Delays to Infection Symptoms.eng.srt

54.3 KB

FUZE - Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities.eng.json

822.9 KB

FUZE - Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities.eng.lrc

25.9 KB

FUZE - Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities.eng.srt

20.4 KB

FUZE - Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities.eng.text

15.3 KB

FUZE - Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities.eng.tsv

21.1 KB

FUZE - Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities.eng.txt

26.3 KB

FUZE - Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities.eng.vtt

18.9 KB

GAZELLE - A Low Latency Framework for Secure Neural Network Inference.eng.json

1.1 MB

GAZELLE - A Low Latency Framework for Secure Neural Network Inference.eng.lrc

29.6 KB

GAZELLE - A Low Latency Framework for Secure Neural Network Inference.eng.srt

29.2 KB

GAZELLE - A Low Latency Framework for Secure Neural Network Inference.eng.text

21.9 KB

GAZELLE - A Low Latency Framework for Secure Neural Network Inference.eng.tsv

26.3 KB

GAZELLE - A Low Latency Framework for Secure Neural Network Inference.eng.txt

29.9 KB

GAZELLE - A Low Latency Framework for Secure Neural Network Inference.eng.vtt

27.2 KB

Guarder - A Tunable Secure Allocator.eng.srt

61.0 KB

HeapHopper - Bringing Bounded Model Checking to Heap Implementation Security.eng.srt

59.0 KB

How Do Tor Users Interact With Onion Services.eng.srt

55.0 KB

IMIX - In-Process Memory Isolation EXtension.eng.srt

46.8 KB

Inception - System-Wide Security Testing of Real-World Embedded Systems Software.eng.srt

49.6 KB

Injected and Delivered - Fabricating Implicit Control over Actuation Systems by Spoofing.eng.srt

38.1 KB

Malicious Management Unit - Why Stopping Cache Attacks in Software is Harder Than You Think.eng.srt

63.0 KB

Man-in-the-Machine - Exploiting Ill-Secured Communication Inside the Computer.eng.srt

47.8 KB

Medical Device Cybersecurity through the FDA Lens.eng.srt

107.5 KB

Meltdown - Reading Kernel Memory from User Space.eng.srt

57.5 KB

Modelling and Analysis of a Hierarchy of Distance Bounding Attacks.eng.srt

59.4 KB

MoonShine - Optimizing OS Fuzzer Seed Selection with Trace Distillation.eng.srt

66.6 KB

NAVEX - Precise and Scalable Exploit Generation for Dynamic Web Applications.eng.srt

49.9 KB

NetHide - Secure and Practical Network Topology Obfuscation.eng.srt

63.0 KB

O Single Sign-Off, Where Art Thou An Empirical Analysis of Single Sign-On.eng.srt

52.7 KB

Off-Path TCP Exploit - How Wireless Routers Can Jeopardize Your Secrets.eng.srt

49.8 KB

One&Done - A Single-Decryption EM-Based Attack on OpenSSL's Constant-Time Blinded RSA.eng.json

1.6 MB

One&Done - A Single-Decryption EM-Based Attack on OpenSSL's Constant-Time Blinded RSA.eng.lrc

39.9 KB

One&Done - A Single-Decryption EM-Based Attack on OpenSSL's Constant-Time Blinded RSA.eng.srt

38.4 KB

One&Done - A Single-Decryption EM-Based Attack on OpenSSL's Constant-Time Blinded RSA.eng.text

29.3 KB

One&Done - A Single-Decryption EM-Based Attack on OpenSSL's Constant-Time Blinded RSA.eng.tsv

35.3 KB

One&Done - A Single-Decryption EM-Based Attack on OpenSSL's Constant-Time Blinded RSA.eng.txt

40.3 KB

One&Done - A Single-Decryption EM-Based Attack on OpenSSL's Constant-Time Blinded RSA.eng.vtt

35.8 KB

Plug and Prey Measuring the Commoditization of Cybercrime via Online Anonymous Markets.eng.srt

65.0 KB

Polisis - Automated Analysis and Presentation of Privacy Policies Using Deep Learning.eng.srt

60.6 KB

Practical Accountability of Secret Processes.eng.srt

89.1 KB

Precise and Accurate Patch Presence Test for Binaries.eng.srt

59.4 KB

Privacy for Tigers.eng.srt

126.3 KB

Q - Why Do Keynote Speakers Keep Suggesting That Improving Security Is Possible.eng.srt

155.9 KB

QSYM - A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing.eng.srt

51.5 KB

Quack - Scalable Remote Measurement of Application-Layer Censorship.eng.srt

73.0 KB

Rampart - Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks.eng.json

1.0 MB

Rampart - Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks.eng.lrc

26.6 KB

Rampart - Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks.eng.srt

28.1 KB

Rampart - Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks.eng.text

20.4 KB

Rampart - Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks.eng.tsv

23.9 KB

Rampart - Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks.eng.txt

26.8 KB

Rampart - Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks.eng.vtt

26.0 KB

Reading Thieves' Cant - Automatically Identifying and Understanding Dark Jargons from Cybercrime.eng.srt

49.6 KB

Rethinking Access Control and Authentication for the Home Internet of Things (IoT).eng.srt

63.6 KB

Return Of Bleichenbacher's Oracle Threat (ROBOT).eng.srt

61.2 KB

SAD THUG - Structural Anomaly Detection for Transmissions of High-value Information Using Graphics.eng.srt

55.9 KB

SAQL - A Stream-based Query System for Real-Time Abnormal System Behavior Detection.eng.srt

63.3 KB

Schrödinger's RAT - Profiling the Stakeholders in the Remote Access Trojan Ecosystem.eng.srt

39.3 KB

Security Namespace - Making Linux Security Frameworks Available to Containers.eng.srt

87.0 KB

Sensitive Information Tracking in Commodity IoT.eng.srt

39.3 KB

Shielding Software From Privileged Side-Channel Attacks.eng.srt

53.0 KB

Simple Password-Hardened Encryption Services.eng.srt

32.3 KB

Skill Squatting Attacks on Amazon Alexa.eng.srt

83.0 KB

Solving the Next Billion-People Privacy Problem.eng.srt

133.4 KB

Tackling runtime-based obfuscation in Android with TIRO.eng.srt

62.0 KB

teEther - Gnawing at Ethereum to Automatically Exploit Smart Contracts.eng.json

1.3 MB

teEther - Gnawing at Ethereum to Automatically Exploit Smart Contracts.eng.lrc

35.2 KB

teEther - Gnawing at Ethereum to Automatically Exploit Smart Contracts.eng.srt

32.3 KB

teEther - Gnawing at Ethereum to Automatically Exploit Smart Contracts.eng.text

23.0 KB

teEther - Gnawing at Ethereum to Automatically Exploit Smart Contracts.eng.tsv

29.8 KB

teEther - Gnawing at Ethereum to Automatically Exploit Smart Contracts.eng.txt

35.7 KB

teEther - Gnawing at Ethereum to Automatically Exploit Smart Contracts.eng.vtt

29.7 KB

The aftermath of a crypto-ransomware attack at a large academic institution.eng.srt

51.6 KB

The Battle for New York - A Case Study of Applied Digital Threat Modeling at the Enterprise Level.eng.srt

57.1 KB

The Broken Shield - Measuring Revocation Effectiveness in the Windows Code-Signing PKI.eng.srt

56.9 KB

The Dangers of Key Reuse - Practical Attacks on IPsec IKE.eng.srt

64.4 KB

The Guard's Dilemma - Efficient Code-Reuse Attacks Against Intel SGX.eng.srt

63.3 KB

The Law and Economics of Bug Bounties.eng.srt

133.0 KB

The Rewards and Costs of Stronger Passwords in a University - Linking Password Lifetime to Strength.eng.srt

65.9 KB

The Second Crypto War-What's Different Now.eng.srt

131.8 KB

The Secure Socket API - TLS as an Operating System Service.eng.srt

82.4 KB

Towards a Secure Zero-rating Framework with Three Parties.eng.srt

51.4 KB

Towards Predicting Efficient and Anonymous Tor Circuits.eng.srt

63.1 KB

Translation Leak-aside Buffer - Defeating Cache Side-channel Protections with TLB Attacks.eng.srt

75.1 KB

Turning Your Weakness Into a Strength - Watermarking Deep Neural Networks by Backdooring.eng.srt

71.5 KB

Understanding the Reproducibility of Crowd-reported Security Vulnerabilities.eng.srt

53.2 KB

Unveiling and Quantifying Facebook Exploitation of Sensitive Personal Data for Advertising Purposes.eng.srt

56.8 KB

Vetting Single Sign-On SDK Implementations via Symbolic Reasoning.eng.srt

35.7 KB

We Still Don't Have Secure Cross-Domain Requests - an Empirical Study of CORS.eng.srt

50.7 KB

When Does Machine Learning FAIL Generalized Transferability for Evasion and Poisoning Attacks.eng.srt

69.4 KB

Who Is Answering My Queries - Understanding and Characterizing Interception.eng.srt

48.5 KB

Who Left Open the Cookie Jar A Comprehensive Evaluation of Third-Party Cookie Policies.eng.srt

53.5 KB

With Great Training Comes Great Vulnerability - Practical Attacks against Transfer Learning.eng.srt

58.4 KB

WPSE - Fortifying Web Protocols via Browser-Side Security Monitoring.eng.srt

47.5 KB

/.../USENIX Security 2018 Program at a Glance USENIX_files/

analytics.js

45.2 KB

css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css

4.3 KB

css_mMMIpDBXDqo0rCZrN7FoMlBPY0tKvHCE04XYURHXl9M.css

610.1 KB

css_Tvyih1Dm489siBROXzFSkKUCFbsEK9kCr0p3JDiev80.css

129.3 KB

css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css

3.8 KB

css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css

5.4 KB

font-awesome.css

26.7 KB

js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js

20.5 KB

js_AQDKCRqaqaAAAzbvxcaEQBooKEQA-dFTfff7tzCklI8.js

14.0 KB

js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js

120.3 KB

js_fjSBcoQiz2s5JFYU7Z0v2w3fhgZkax8CZA1Fi71bsVc.js

15.9 KB

js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js

26.8 KB

sec18_wordmark_stacked_450x186.png

3.7 KB

/.../USENIX Security 2018 Technical Sessions USENIX_files/

analytics.js

45.2 KB

application-octet-stream.png

0.2 KB

application-pdf.png

0.3 KB

audio.svg

0.6 KB

balasubramaniyan_vijay_200x230.png

18.2 KB

css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css

4.3 KB

css_mMMIpDBXDqo0rCZrN7FoMlBPY0tKvHCE04XYURHXl9M.css

610.1 KB

css_Tvyih1Dm489siBROXzFSkKUCFbsEK9kCr0p3JDiev80.css

129.3 KB

css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css

3.8 KB

css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css

5.4 KB

donna_dodson_200x230.jpg

11.8 KB

elazari-bar-on-amit_200x230.jpg

14.2 KB

font-awesome.css

26.7 KB

js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js

20.5 KB

js_AQDKCRqaqaAAAzbvxcaEQBooKEQA-dFTfff7tzCklI8.js

14.0 KB

js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js

120.3 KB

js_fjSBcoQiz2s5JFYU7Z0v2w3fhgZkax8CZA1Fi71bsVc.js

15.9 KB

js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js

26.8 KB

js_zsU7pE_En9PuEzx00IjN_iCxIwgABAiEwJNkh1iTG9k.js

8.2 KB

mickens_james_200x230.png

24.7 KB

monica_lam_200x230.jpg

13.9 KB

package-x-generic.png

0.3 KB

paul_kocher_200x230.jpg

11.4 KB

pdf.svg

0.5 KB

ross-anderson_200x230.jpg

12.3 KB

schwartz_susan_200x230.png

26.0 KB

sec18_wordmark_stacked_450x186.png

3.7 KB

slides.svg

0.7 KB

susan_landau_200x230.jpg

13.2 KB

usenix-locked.png

1.4 KB

video.svg

0.8 KB

wenyuanxu_200x230.jpg

11.8 KB

/.../USENIX Security 2018 USENIX_files/

acmqueue_600x240_1.png

4.7 KB

analytics.js

45.2 KB

baidu_600x240.png

8.4 KB

css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css

4.3 KB

css_mMMIpDBXDqo0rCZrN7FoMlBPY0tKvHCE04XYURHXl9M.css

610.1 KB

css_Tvyih1Dm489siBROXzFSkKUCFbsEK9kCr0p3JDiev80.css

129.3 KB

css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css

3.8 KB

css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css

5.4 KB

dmtf_600x240.png

3.2 KB

dropbox_2018_600x240_0.png

3.3 KB

eff_2018_red_600x240_1.png

1.6 KB

enck_william_200x230.png

23.9 KB

facebook_2016_300x120_1.png

4.8 KB

font-awesome.css

26.7 KB

freebsdfoundation_600x240_0.png

3.4 KB

google_600x240_0.png

9.0 KB

js_1_m_mRX0UrchQnV5E0UZ6141Ts6jK5YnRLQe7J2kaX4.js

14.3 KB

js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js

20.5 KB

js_AQDKCRqaqaAAAzbvxcaEQBooKEQA-dFTfff7tzCklI8.js

14.0 KB

js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js

120.3 KB

js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js

26.8 KB

js_zsU7pE_En9PuEzx00IjN_iCxIwgABAiEwJNkh1iTG9k.js

8.2 KB

nostarch_600x240_1.png

2.6 KB

nsf_600x240_1.png

13.4 KB

porter-felt_adrienne_200x230.png

23.7 KB

sec18_hotel.png

500.5 KB

sec18_wordmark_stacked_450x186.png

8.9 KB

sec18_wordmark_stacked_450x186_002.png

3.7 KB

usenix_logo_300x150_neat_2.png

15.0 KB

/USENIX Security 2019/

28th USENIX Security Symposium Grid.htm

439.3 KB

50 Ways to Leak Your Data An Exploration of Apps'.mp4

14.4 MB

A Billion Open Interfaces for Eve and Mallory MitM, DoS, and Tracking.mp4

17.8 MB

A Study of the Feasibility of Co-located App Attacks against BLE.mp4

11.8 MB

A Systematic Evaluation of Transient Execution Attacks and Defenses.mp4

15.0 MB

All Things Considered An Analysis of IoT Devices on Home Networks.mp4

15.5 MB

All Your Clicks Belong to Me Investigating Click Interception on the Web.mp4

19.2 MB

ALOHA Auxiliary Loss Optimization for Hypothesis Augmentation.mp4

16.8 MB

AntiFuzz Impeding Fuzzing Audits of Binary Executables.mp4

15.6 MB

ATTACK2VEC Leveraging Temporal Word Embeddings to Understand the.mp4

14.8 MB

Baby Steps towards the Precipice How the Web Became a Scary.mp4

52.0 MB

Back to the Whiteboard a Principled Approach for the Assessment and.mp4

13.6 MB

Birthday, Name and Bifacial-security Understanding Passwords.mp4

19.9 MB

BITE Bitcoin Lightweight Client Privacy using Trusted Execution.mp4

17.0 MB

Blind Bernoulli Trials A Noninteractive Protocol For Hidden-Weight Coin Flips.mp4

16.1 MB

CANvas Fast and Inexpensive Automotive Network Mapping.mp4

19.3 MB

Clinical Computer Security for Victims of Intimate Partner Violence.mp4

16.1 MB

Cognitive Triaging of Phishing Attacks.mp4

14.9 MB

Computer Security and Privacy in the Interactions Between Victim.mp4

14.9 MB

CONFIRM Evaluating Compatibility and Relevance of Control-flow.mp4

22.5 MB

CSI NN Reverse Engineering of Neural Network Architectures.mp4

19.6 MB

CT-GAN Malicious Tampering of 3D Medical Imagery using Deep Learning.mp4

24.6 MB

DEEPVSA Facilitating Value-set Analysis with Deep Learning for.mp4

16.0 MB

Detecting and Characterizing Lateral Phishing at Scale.mp4

16.8 MB

Detecting Missing-Check Bugs via Semantic- and Context-Aware.mp4

14.4 MB

Devils in the Guidance Predicting Logic Vulnerabilities in Payment.mp4

11.8 MB

Discovering and Understanding the Security Hazards in the.mp4

20.0 MB

Embracing the - Hack. - A Better Strategy for Team-Defense.mp4

39.9 MB

EnFuzz Ensemble Fuzzing with Seed Synchronization among Diverse Fuzzers.mp4

15.1 MB

EnTrust Regulating Sensor Access by Cooperating Programs.mp4

21.5 MB

ERIM Secure, Efficient In-process Isolation with Protection Keys (MPK).mp4

21.6 MB

Evaluating Differentially Private Machine Learning in Practice.mp4

13.4 MB

Evaluating Mobile Messengers for Implementation Vulnerabilities.mp4

47.8 MB

Evaluating the Contextual Integrity of Privacy Regulation Parents' IoT.mp4

20.1 MB

EverParse Verified Secure Zero-Copy Parsers for Authenticated Message Formats.mp4

18.1 MB

Everyone is Different Client-side Diversification for Defending.mp4

16.5 MB

Exploiting Unprotected I O Operations in AMD's Secure Encrypted Virtualization.mp4

14.5 MB

FastKitten Practical Smart Contracts on Bitcoin.mp4

17.2 MB

FIRM-AFL High-Throughput Greybox Fuzzing of IoT Firmware via.mp4

16.9 MB

From IP ID to Device ID and KASLR Bypass.mp4

17.9 MB

From Privacy by Design to Data Protection by Design The Challenges of.mp4

50.3 MB

Fuzzification Anti-Fuzzing Techniques.mp4

13.3 MB

GRIMOIRE Synthesizing Structure while Fuzzing.mp4

15.1 MB

HardFails Insights into Software-Exploitable Hardware Bugs.mp4

19.2 MB

HideMyApp Hiding the Presence of Sensitive Apps on Android.mp4

14.0 MB

Hiding in Plain Signal Physical Signal Overshadowing Attack on LTE.mp4

23.6 MB

High Precision Detection of Business Email Compromise.mp4

16.9 MB

Identifying Cache-Based Side Channels through Secret-Augmented.mp4

18.1 MB

Iframes Popups Are Dangerous in Mobile WebView Studying and.mp4

16.1 MB

Improving Robustness of ML Classifiers against Realizable Evasio.mp4

17.6 MB

Inadvertently Making Cyber Criminals Rich A Comprehensive Study of.mp4

20.4 MB

in-toto Providing farm-to-table guarantees for bits and bytes.mp4

18.8 MB

IODINE Verifying Constant-Time Execution of Hardware.mp4

14.4 MB

JEDI Many-to-Many End-to-End Encryption and Key Delegation for IoT.mp4

18.2 MB

Johnny, you are fired - Spoofing OpenPGP and S MIME Signatures in Emails.mp4

16.6 MB

KEPLER Facilitating Control-flow Hijacking Primitive Evaluation for Linux.mp4

17.4 MB

Leaky Images Targeted Privacy Attacks in the Web.mp4

17.9 MB

Less is More Quantifying the Security Benefits of Debloating Web Applications.mp4

16.9 MB

Lessons Learned About Building Secure Software It's About the Developers.mp4

38.9 MB

Lessons Learned from Evaluating the Robustness of Defenses to.mp4

38.7 MB

Looking from the Mirror Evaluating IoT Device Security through.mp4

14.2 MB

Losing the Car Keys Wireless PHY-Layer Insecurity in EV Charging.mp4

19.9 MB

Misleading Authorship Attribution of Source Code using Adversarial Learning.mp4

19.0 MB

Mobile Private Contact Discovery at Scale.mp4

16.4 MB

MOPT Optimized Mutation Scheduling for Fuzzers.mp4

18.8 MB

No Right to Remain Silent Isolating Malicious Mixes.mp4

23.1 MB

Not Everything is Dark and Gloomy Power Grid Protections Against IoT.mp4

20.6 MB

On (The Lack Of) Location Privacy in Crowdsourcing Applications.mp4

23.2 MB

Origin-sensitive Control Flow Integrity.mp4

18.0 MB

PAC it up Towards Pointer Integrity using ARM Pointer Authentication.mp4

18.0 MB

PeX A Permission Check Analysis Framework for Linux Kernel.mp4

15.9 MB

Platforms in Everything Analyzing Ground-Truth Data on the Anatomy and.mp4

17.4 MB

Please Pay Inside Evaluating Bluetooth-based Detection of Gas Pump Skimmers.mp4

21.6 MB

Point Break A Study of Bandwidth Denial-of-Service Attacks against Tor.mp4

18.6 MB

PolicyLint Investigating Internal Privacy Policy Contradictions on Google.mp4

18.1 MB

Probability Model Transforming Encoders Against Encoding Attacks.mp4

17.6 MB

Protecting accounts from credential stuffing with password breach alerting.mp4

18.1 MB

Protecting Cloud Virtual Machines from Hypervisor and Host Operating.mp4

15.8 MB

Pythia Remote Oracles for the Masses.mp4

17.2 MB

RAZOR A Framework for Post-deployment Software Debloating.mp4

16.6 MB

Reading the Tea leaves A Comparative Analysis of Threat Intelligence.mp4

17.9 MB

Rendered Private Making GLSL Execution Uniform to Prevent WebGL-based.mp4

18.1 MB

Robust Website Fingerprinting Through the Cache Occupancy Channel.mp4

13.8 MB

RVFuzzer Finding Input Validation Bugs in Robotic Vehicles through.mp4

17.0 MB

SafeHidden An Efficient and Secure Information Hiding Technique Using.mp4

24.0 MB

Scalable Scanning and Automatic Classification of TLS Padding Oracle.mp4

14.7 MB

ScatterCache Thwarting Cache Attacks via Cache Set Randomization.mp4

16.5 MB

Secure Multi-User Content Sharing for Augmented Reality Applications.mp4

13.3 MB

Security Educational Panel.mp4

126.9 MB

Security Research and Public Policy.mp4

56.6 MB

Seeing is Not Believing Camouflage Attacks on Image Scaling Algorithms.mp4

16.7 MB

Shining Light on Internet-based Crimes Against Children.mp4

28.1 MB

simTPM User-centric TPM for Mobile Devices.mp4

19.1 MB

Site Isolation Process Separation for Web Sites within the Browser.mp4

13.0 MB

Small World with High Risks A Study of Security Threats in the npm Ecosystem.mp4

14.2 MB

SPOILER Speculative Load Hazards Boost Rowhammer and Cache Attacks.mp4

15.4 MB

Stack Overflow Considered Helpful Deep Learning Security Nudges Towards.mp4

16.4 MB

StrongChain Transparent and Collaborative Proof-of-Work Consensus.mp4

15.6 MB

Tackling the Trust and Safety Crisis.mp4

54.0 MB

Terminal Brain Damage Exposing the Graceless Degradation in Deep.mp4

16.6 MB

TESSERACT Eliminating Experimental Bias in Malware Classification.mp4

21.3 MB

The Anatomy of a Cryptocurrency Pump-and-Dump Scheme.mp4

22.1 MB

The Art of The Scam Demystifying Honeypots in Ethereum Smart Contracts.mp4

15.5 MB

The Betrayal At Cloud City An Empirical Analysis Of Cloud-Based Mobile.mp4

18.6 MB

The CrossPath Attack Disrupting the SDN Control Channel via Shared Links.mp4

20.4 MB

The KNOB is Broken Exploiting Low Entropy in the Encryption Key.mp4

18.6 MB

The Secret Sharer Evaluating and Testing Unintended Memorization in.mp4

14.7 MB

The Spies Hacking our Phones are Going Dark, and We're All in Trouble.mp4

53.0 MB

The Web's Identity Crisis Understanding the Effectiveness of Website Identity.mp4

20.1 MB

Towards the Detection of Inconsistencies in Public Security.mp4

15.5 MB

Tracing Transactions Across Cryptocurrency Ledgers.mp4

14.8 MB

Understanding and Improving Security and Privacy in Multi-User.mp4

18.6 MB

Understanding and Securing Device Vulnerabilities through.mp4

17.1 MB

Understanding iOS-based Crowdturfing Through Hidden UI Analysis.mp4

13.5 MB

USENIX Security '19.m3u

11.1 KB

USENIX Security 2019 Full Proceedings interior.pdf

209.7 MB

USENIX Security 2019 Full Proceedings.pdf

210.5 MB

USENIX Security 2019 Program at a Glance USENIX.htm

85.8 KB

USENIX Security 2019 Program errata.pdf

234.2 KB

USENIX Security 2019 Program errata-2.pdf

68.3 KB

USENIX Security 2019 Program errata-3.pdf

744.0 KB

USENIX Security 2019 Program errata-4.pdf

98.8 KB

USENIX Security 2019 Program errata-5.pdf

86.0 KB

USENIX Security 2019 Program errata-6.pdf

73.7 KB

USENIX Security 2019 USENIX.htm

132.9 KB

Users Really Do Answer Telephone Scams.mp4

20.5 MB

Utility-Optimized Local Differential Privacy Mechanisms for.mp4

19.8 MB

UWB-ED Distance Enlargement Attack Detection in Ultra-Wideband.mp4

17.4 MB

uXOM Efficient eXecute-Only Memory on ARM Cortex-M.mp4

18.3 MB

VRASED A Verified Hardware Software Co-Design for Remote Attestation.mp4

17.7 MB

WAVE A Decentralized Authorization Framework with Transitive Delegation.mp4

17.2 MB

What Are You Searching For A Remote Keylogging Attack.mp4

19.0 MB

When the Signal is in the Noise Exploiting Diffix's Sticky Noise.mp4

15.3 MB

Why Do Adversarial Attacks Transfer Explaining Transferability of.mp4

17.6 MB

Wireless Attacks on Aircraft Instrument Landing Systems.mp4

26.3 MB

XONN XNOR-based Oblivious Deep Neural Network Inference.mp4

15.2 MB

/.../28th USENIX Security Symposium Grid_files/

app-apple.svg

7.9 KB

app-google.svg

4.5 KB

bootstrap-custom.css

94.0 KB

jquery.js

38.3 KB

jquery_002.js

97.2 KB

jquery_003.js

2.6 KB

jquery_004.js

96.4 KB

loading-3x.gif

13.3 KB

main.js

73.7 KB

main-current.css

135.9 KB

responsive.css

6.4 KB

/.../USENIX Security 2019 captions/

50 Ways to Leak Your Data An Exploration of Apps'.eng.srt

37.1 KB

A Billion Open Interfaces for Eve and Mallory MitM, DoS, and Tracking.eng.srt

31.5 KB

A Study of the Feasibility of Co-located App Attacks against BLE.eng.srt

37.9 KB

A Systematic Evaluation of Transient Execution Attacks and Defenses.eng.srt

33.3 KB

All Things Considered An Analysis of IoT Devices on Home Networks.eng.srt

38.4 KB

All Your Clicks Belong to Me Investigating Click Interception on the Web.eng.srt

36.7 KB

ALOHA Auxiliary Loss Optimization for Hypothesis Augmentation.eng.srt

34.4 KB

AntiFuzz Impeding Fuzzing Audits of Binary Executables.eng.srt

36.4 KB

ATTACK2VEC Leveraging Temporal Word Embeddings to Understand the.eng.srt

31.6 KB

Baby Steps towards the Precipice How the Web Became a Scary.eng.srt

93.3 KB

Back to the Whiteboard a Principled Approach for the Assessment and.eng.srt

31.0 KB

Birthday, Name and Bifacial-security Understanding Passwords.eng.srt

28.9 KB

BITE Bitcoin Lightweight Client Privacy using Trusted Execution.eng.srt

35.5 KB

Blind Bernoulli Trials A Noninteractive Protocol For Hidden-Weight Coin Flips.eng.srt

33.4 KB

CANvas Fast and Inexpensive Automotive Network Mapping.eng.srt

32.2 KB

Clinical Computer Security for Victims of Intimate Partner Violence.eng.srt

37.5 KB

Cognitive Triaging of Phishing Attacks.eng.json

845.0 KB

Cognitive Triaging of Phishing Attacks.eng.lrc

24.9 KB

Cognitive Triaging of Phishing Attacks.eng.srt

21.4 KB

Cognitive Triaging of Phishing Attacks.eng.text

17.1 KB

Cognitive Triaging of Phishing Attacks.eng.tsv

21.3 KB

Cognitive Triaging of Phishing Attacks.eng.txt

25.2 KB

Cognitive Triaging of Phishing Attacks.eng.vtt

20.2 KB

Computer Security and Privacy in the Interactions Between Victim.eng.srt

36.7 KB

CONFIRM Evaluating Compatibility and Relevance of Control-flow.eng.srt

38.6 KB

CSI NN Reverse Engineering of Neural Network Architectures.eng.json

1.0 MB

CSI NN Reverse Engineering of Neural Network Architectures.eng.lrc

28.4 KB

CSI NN Reverse Engineering of Neural Network Architectures.eng.srt

25.5 KB

CSI NN Reverse Engineering of Neural Network Architectures.eng.text

19.3 KB

CSI NN Reverse Engineering of Neural Network Architectures.eng.tsv

24.4 KB

CSI NN Reverse Engineering of Neural Network Architectures.eng.txt

28.7 KB

CSI NN Reverse Engineering of Neural Network Architectures.eng.vtt

23.7 KB

CT-GAN Malicious Tampering of 3D Medical Imagery using Deep Learning.eng.srt

36.3 KB

DEEPVSA Facilitating Value-set Analysis with Deep Learning for.eng.srt

25.5 KB

Detecting and Characterizing Lateral Phishing at Scale.eng.srt

44.4 KB

Detecting Missing-Check Bugs via Semantic- and Context-Aware.eng.srt

33.4 KB

Devils in the Guidance Predicting Logic Vulnerabilities in Payment.eng.srt

27.7 KB

Discovering and Understanding the Security Hazards in the.eng.srt

34.9 KB

Embracing the - Hack. - A Better Strategy for Team-Defense.eng.srt

79.7 KB

EnFuzz Ensemble Fuzzing with Seed Synchronization among Diverse Fuzzers.eng.srt

28.9 KB

EnTrust Regulating Sensor Access by Cooperating Programs.eng.srt

34.2 KB

ERIM Secure, Efficient In-process Isolation with Protection Keys (MPK).eng.srt

36.9 KB

Evaluating Differentially Private Machine Learning in Practice.eng.srt

26.5 KB

Evaluating Mobile Messengers for Implementation Vulnerabilities.eng.srt

85.1 KB

Evaluating the Contextual Integrity of Privacy Regulation Parents' IoT.eng.srt

40.1 KB

EverParse Verified Secure Zero-Copy Parsers for Authenticated Message Formats.eng.json

1.0 MB

EverParse Verified Secure Zero-Copy Parsers for Authenticated Message Formats.eng.lrc

26.7 KB

EverParse Verified Secure Zero-Copy Parsers for Authenticated Message Formats.eng.srt

27.6 KB

EverParse Verified Secure Zero-Copy Parsers for Authenticated Message Formats.eng.text

19.1 KB

EverParse Verified Secure Zero-Copy Parsers for Authenticated Message Formats.eng.tsv

23.3 KB

EverParse Verified Secure Zero-Copy Parsers for Authenticated Message Formats.eng.txt

27.0 KB

EverParse Verified Secure Zero-Copy Parsers for Authenticated Message Formats.eng.vtt

25.2 KB

Everyone is Different Client-side Diversification for Defending.eng.srt

32.9 KB

Exploiting Unprotected I O Operations in AMD's Secure Encrypted Virtualization.eng.srt

32.8 KB

FastKitten Practical Smart Contracts on Bitcoin.eng.srt

36.1 KB

FIRM-AFL High-Throughput Greybox Fuzzing of IoT Firmware via.eng.srt

29.8 KB

From IP ID to Device ID and KASLR Bypass.eng.srt

30.6 KB

From Privacy by Design to Data Protection by Design The Challenges of.eng.srt

76.7 KB

Fuzzification Anti-Fuzzing Techniques.eng.srt

28.0 KB

GRIMOIRE Synthesizing Structure while Fuzzing.eng.srt

30.2 KB

HardFails Insights into Software-Exploitable Hardware Bugs.eng.srt

37.7 KB

HideMyApp Hiding the Presence of Sensitive Apps on Android.eng.srt

31.5 KB

Hiding in Plain Signal Physical Signal Overshadowing Attack on LTE.eng.srt

31.3 KB

High Precision Detection of Business Email Compromise.eng.srt

35.8 KB

Identifying Cache-Based Side Channels through Secret-Augmented.eng.srt

30.8 KB

Iframes Popups Are Dangerous in Mobile WebView Studying and.eng.srt

29.2 KB

Improving Robustness of ML Classifiers against Realizable Evasio.eng.srt

35.6 KB

Inadvertently Making Cyber Criminals Rich A Comprehensive Study of.eng.srt

41.6 KB

in-toto Providing farm-to-table guarantees for bits and bytes.eng.srt

38.8 KB

IODINE Verifying Constant-Time Execution of Hardware.eng.srt

33.4 KB

JEDI Many-to-Many End-to-End Encryption and Key Delegation for IoT.eng.srt

46.4 KB

Johnny, you are fired - Spoofing OpenPGP and S MIME Signatures in Emails.eng.srt

32.8 KB

KEPLER Facilitating Control-flow Hijacking Primitive Evaluation for Linux.eng.srt

34.1 KB

Leaky Images Targeted Privacy Attacks in the Web.eng.srt

40.4 KB

Less is More Quantifying the Security Benefits of Debloating Web Applications.eng.json

1.1 MB

Less is More Quantifying the Security Benefits of Debloating Web Applications.eng.lrc

30.4 KB

Less is More Quantifying the Security Benefits of Debloating Web Applications.eng.srt

25.8 KB

Less is More Quantifying the Security Benefits of Debloating Web Applications.eng.text

19.5 KB

Less is More Quantifying the Security Benefits of Debloating Web Applications.eng.tsv

25.5 KB

Less is More Quantifying the Security Benefits of Debloating Web Applications.eng.txt

30.8 KB

Less is More Quantifying the Security Benefits of Debloating Web Applications.eng.vtt

24.0 KB

Lessons Learned About Building Secure Software It's About the Developers.eng.srt

84.1 KB

Lessons Learned from Evaluating the Robustness of Defenses to.eng.srt

88.7 KB

Looking from the Mirror Evaluating IoT Device Security through.eng.srt

29.3 KB

Losing the Car Keys Wireless PHY-Layer Insecurity in EV Charging.eng.srt

34.8 KB

Misleading Authorship Attribution of Source Code using Adversarial Learning.eng.srt

39.9 KB

Mobile Private Contact Discovery at Scale.eng.srt

34.3 KB

MOPT Optimized Mutation Scheduling for Fuzzers.eng.srt

30.1 KB

No Right to Remain Silent Isolating Malicious Mixes.eng.json

890.2 KB

No Right to Remain Silent Isolating Malicious Mixes.eng.lrc

22.4 KB

No Right to Remain Silent Isolating Malicious Mixes.eng.srt

23.6 KB

No Right to Remain Silent Isolating Malicious Mixes.eng.text

17.7 KB

No Right to Remain Silent Isolating Malicious Mixes.eng.tsv

20.3 KB

No Right to Remain Silent Isolating Malicious Mixes.eng.txt

22.6 KB

No Right to Remain Silent Isolating Malicious Mixes.eng.vtt

22.0 KB

Not Everything is Dark and Gloomy Power Grid Protections Against IoT.eng.srt

35.5 KB

On (The Lack Of) Location Privacy in Crowdsourcing Applications.eng.srt

39.0 KB

Origin-sensitive Control Flow Integrity.eng.srt

30.0 KB

PAC it up Towards Pointer Integrity using ARM Pointer Authentication.eng.srt

34.3 KB

PeX A Permission Check Analysis Framework for Linux Kernel.eng.srt

28.9 KB

Platforms in Everything Analyzing Ground-Truth Data on the Anatomy and.eng.srt

39.0 KB

Please Pay Inside Evaluating Bluetooth-based Detection of Gas Pump Skimmers.eng.srt

46.9 KB

Point Break A Study of Bandwidth Denial-of-Service Attacks against Tor.eng.srt

38.4 KB

PolicyLint Investigating Internal Privacy Policy Contradictions on Google.eng.srt

33.0 KB

Probability Model Transforming Encoders Against Encoding Attacks.eng.srt

28.5 KB

Protecting accounts from credential stuffing with password breach alerting.eng.srt

44.9 KB

Protecting Cloud Virtual Machines from Hypervisor and Host Operating.eng.srt

31.1 KB

Pythia Remote Oracles for the Masses.eng.srt

36.7 KB

RAZOR A Framework for Post-deployment Software Debloating.eng.srt

31.9 KB

Reading the Tea leaves A Comparative Analysis of Threat Intelligence.eng.srt

31.8 KB

Rendered Private Making GLSL Execution Uniform to Prevent WebGL-based.eng.srt

30.8 KB

Robust Website Fingerprinting Through the Cache Occupancy Channel.eng.srt

21.6 KB

RVFuzzer Finding Input Validation Bugs in Robotic Vehicles through.eng.srt

31.0 KB

SafeHidden An Efficient and Secure Information Hiding Technique Using.eng.srt

33.8 KB

Scalable Scanning and Automatic Classification of TLS Padding Oracle.eng.srt

39.6 KB

ScatterCache Thwarting Cache Attacks via Cache Set Randomization.eng.srt

36.9 KB

Secure Multi-User Content Sharing for Augmented Reality Applications.eng.srt

32.9 KB

Security Educational Panel.eng.srt

189.7 KB

Security Research and Public Policy.eng.srt

86.2 KB

Seeing is Not Believing Camouflage Attacks on Image Scaling Algorithms.eng.json

990.2 KB

Seeing is Not Believing Camouflage Attacks on Image Scaling Algorithms.eng.lrc

24.0 KB

Seeing is Not Believing Camouflage Attacks on Image Scaling Algorithms.eng.srt

28.0 KB

Seeing is Not Believing Camouflage Attacks on Image Scaling Algorithms.eng.text

18.7 KB

Seeing is Not Believing Camouflage Attacks on Image Scaling Algorithms.eng.tsv

21.6 KB

Seeing is Not Believing Camouflage Attacks on Image Scaling Algorithms.eng.txt

24.2 KB

Seeing is Not Believing Camouflage Attacks on Image Scaling Algorithms.eng.vtt

25.4 KB

Shining Light on Internet-based Crimes Against Children.eng.srt

119.4 KB

simTPM User-centric TPM for Mobile Devices.eng.srt

39.0 KB

Site Isolation Process Separation for Web Sites within the Browser.eng.srt

38.5 KB

Small World with High Risks A Study of Security Threats in the npm Ecosystem.eng.json

720.3 KB

Small World with High Risks A Study of Security Threats in the npm Ecosystem.eng.lrc

20.1 KB

Small World with High Risks A Study of Security Threats in the npm Ecosystem.eng.srt

17.7 KB

Small World with High Risks A Study of Security Threats in the npm Ecosystem.eng.text

14.1 KB

Small World with High Risks A Study of Security Threats in the npm Ecosystem.eng.tsv

17.4 KB

Small World with High Risks A Study of Security Threats in the npm Ecosystem.eng.txt

20.3 KB

Small World with High Risks A Study of Security Threats in the npm Ecosystem.eng.vtt

16.7 KB

SPOILER Speculative Load Hazards Boost Rowhammer and Cache Attacks.eng.srt

33.4 KB

Stack Overflow Considered Helpful Deep Learning Security Nudges Towards.eng.srt

29.5 KB

StrongChain Transparent and Collaborative Proof-of-Work Consensus.eng.srt

32.6 KB

Tackling the Trust and Safety Crisis.eng.srt

135.4 KB

Terminal Brain Damage Exposing the Graceless Degradation in Deep.eng.srt

33.3 KB

TESSERACT Eliminating Experimental Bias in Malware Classification.eng.srt

35.8 KB

The Anatomy of a Cryptocurrency Pump-and-Dump Scheme.eng.srt

30.7 KB

The Art of The Scam Demystifying Honeypots in Ethereum Smart Contracts.eng.srt

43.1 KB

The Betrayal At Cloud City An Empirical Analysis Of Cloud-Based Mobile.eng.srt

31.2 KB

The CrossPath Attack Disrupting the SDN Control Channel via Shared Links.eng.srt

29.8 KB

The KNOB is Broken Exploiting Low Entropy in the Encryption Key.eng.srt

32.0 KB

The Secret Sharer Evaluating and Testing Unintended Memorization in.eng.srt

38.9 KB

The Spies Hacking our Phones are Going Dark, and We're All in Trouble.eng.srt

110.8 KB

The Web's Identity Crisis Understanding the Effectiveness of Website Identity.eng.srt

37.5 KB

Towards the Detection of Inconsistencies in Public Security.eng.srt

30.3 KB

Tracing Transactions Across Cryptocurrency Ledgers.eng.srt

37.8 KB

Understanding and Improving Security and Privacy in Multi-User.eng.srt

41.6 KB

Understanding and Securing Device Vulnerabilities through.eng.srt

23.9 KB

Understanding iOS-based Crowdturfing Through Hidden UI Analysis.eng.srt

29.5 KB

Users Really Do Answer Telephone Scams.eng.srt

34.4 KB

Utility-Optimized Local Differential Privacy Mechanisms for.eng.srt

27.6 KB

UWB-ED Distance Enlargement Attack Detection in Ultra-Wideband.eng.srt

32.1 KB

uXOM Efficient eXecute-Only Memory on ARM Cortex-M.eng.srt

28.8 KB

VRASED A Verified Hardware Software Co-Design for Remote Attestation.eng.srt

36.4 KB

WAVE A Decentralized Authorization Framework with Transitive Delegation.eng.srt

42.9 KB

What Are You Searching For A Remote Keylogging Attack.eng.srt

33.9 KB

When the Signal is in the Noise Exploiting Diffix's Sticky Noise.eng.srt

30.1 KB

Why Do Adversarial Attacks Transfer Explaining Transferability of.eng.srt

26.3 KB

Wireless Attacks on Aircraft Instrument Landing Systems.eng.json

1.2 MB

Wireless Attacks on Aircraft Instrument Landing Systems.eng.lrc

37.3 KB

Wireless Attacks on Aircraft Instrument Landing Systems.eng.srt

29.0 KB

Wireless Attacks on Aircraft Instrument Landing Systems.eng.text

21.4 KB

Wireless Attacks on Aircraft Instrument Landing Systems.eng.tsv

30.3 KB

Wireless Attacks on Aircraft Instrument Landing Systems.eng.txt

38.0 KB

Wireless Attacks on Aircraft Instrument Landing Systems.eng.vtt

26.8 KB

XONN XNOR-based Oblivious Deep Neural Network Inference.eng.json

825.6 KB

XONN XNOR-based Oblivious Deep Neural Network Inference.eng.lrc

23.1 KB

XONN XNOR-based Oblivious Deep Neural Network Inference.eng.srt

21.5 KB

XONN XNOR-based Oblivious Deep Neural Network Inference.eng.text

15.6 KB

XONN XNOR-based Oblivious Deep Neural Network Inference.eng.tsv

19.7 KB

XONN XNOR-based Oblivious Deep Neural Network Inference.eng.txt

23.4 KB

XONN XNOR-based Oblivious Deep Neural Network Inference.eng.vtt

19.9 KB

/.../USENIX Security 2019 Program at a Glance USENIX_files/

analytics.js

45.2 KB

css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css

4.3 KB

css_mMMIpDBXDqo0rCZrN7FoMlBPY0tKvHCE04XYURHXl9M.css

610.1 KB

css_Tvyih1Dm489siBROXzFSkKUCFbsEK9kCr0p3JDiev80.css

129.3 KB

css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css

3.8 KB

css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css

5.4 KB

font-awesome.css

26.7 KB

js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js

20.5 KB

js_AQDKCRqaqaAAAzbvxcaEQBooKEQA-dFTfff7tzCklI8.js

14.0 KB

js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js

120.3 KB

js_fjSBcoQiz2s5JFYU7Z0v2w3fhgZkax8CZA1Fi71bsVc.js

15.9 KB

js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js

26.8 KB

sec19_wordmark_stacked_456x186.png

4.7 KB

/.../USENIX Security 2019 USENIX_files/

acmqueue_600x240_1.png

4.7 KB

analytics.js

45.2 KB

avast_600x240.png

8.3 KB

baidu_600x240_1.png

8.4 KB

cisco_600x240.png

6.1 KB

css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css

4.3 KB

css_mMMIpDBXDqo0rCZrN7FoMlBPY0tKvHCE04XYURHXl9M.css

610.1 KB

css_Tvyih1Dm489siBROXzFSkKUCFbsEK9kCr0p3JDiev80.css

129.3 KB

css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css

3.8 KB

css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css

5.4 KB

dropbox_2018_600x240_2.png

3.3 KB

eff_2018_red_600x240_1.png

1.6 KB

facebook_600x240_6.png

4.8 KB

font-awesome.css

26.7 KB

freebsd_foundation_600x240.png

3.4 KB

google_600x240_6.png

9.0 KB

heninger_nadia_200x230.jpg

14.3 KB

hyatt_santa_clara_600_neat_6.png

560.8 KB

ibm_research_600x240.png

2.6 KB

intel_600x240.png

4.6 KB

js_1_m_mRX0UrchQnV5E0UZ6141Ts6jK5YnRLQe7J2kaX4.js

14.3 KB

js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js

20.5 KB

js_AQDKCRqaqaAAAzbvxcaEQBooKEQA-dFTfff7tzCklI8.js

14.0 KB

js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js

120.3 KB

js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js

26.8 KB

js_zsU7pE_En9PuEzx00IjN_iCxIwgABAiEwJNkh1iTG9k.js

8.2 KB

kaspersky_600x240.png

3.7 KB

kaust_600x240.png

13.0 KB

microsoft-logo_600x240.png

4.2 KB

nostarch_600x240_1.png

2.6 KB

palo-alto-networks_600x240.png

9.8 KB

sec19_wordmark_stacked_456x186.png

4.7 KB

sec19_wordmark_stacked_456x186_002.png

9.2 KB

traynor_patrick_200x230.jpg

13.8 KB

usc_isi_black_600x240.png

7.1 KB

usenix_logo_300x150_neat_2.png

15.0 KB

/USENIX Security 2020/

(Mostly) Exitless VM Protection from Untrusted Hypervisor through Disaggregate.mp4

8.7 MB

A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web.mp4

11.3 MB

A different cup of TI The added value of commercial threat intelligence.mp4

10.9 MB

A Formal Analysis of IEEE 802.11s WPA2 Countering the Kracks Caused by.mp4

9.1 MB

A Longitudinal and Comprehensive Study of the DANE Ecosystem in Email.mp4

12.4 MB

A Spectral Analysis of Noise A Comprehensive, Automated, Formal Analysis.mp4

8.2 MB

A Tale of Two Headers A Formal Analysis of Inconsistent Click-Jacking.mp4

8.2 MB

Achieving Keyless CDNs with Conclaves.mp4

8.4 MB

Actions Speak Louder than Words Entity-Sensitive Privacy Policy and Data Flow.mp4

10.2 MB

Adversarial Preprocessing Understanding and Preventing Image-Scaling Attacks.mp4

10.7 MB

Agamotto Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine.mp4

11.6 MB

An Ever-evolving Game Evaluation of Real-world Attacks and Defenses.mp4

9.4 MB

An Observational Investigation of Reverse Engineers’ Processes.mp4

10.1 MB

An Off-Chip Attack on Hardware Enclaves via the Memory Bus.mp4

8.9 MB

Analysis of DTLS Implementations Using Protocol State Fuzzing.mp4

8.5 MB

APEX A Verified Architecture for Proofs of Execution on Remote Devices.mp4

12.8 MB

AURORA Statistical Crash Analysis for Automated Root Cause Explanation.mp4

7.1 MB

Automatic Hot Patch Generation for Android Kernels.mp4

11.1 MB

Automatic Techniques to Systematically Discover New Heap Exploitation.mp4

9.5 MB

Automating the Development of Chosen Ciphertext Attacks.mp4

9.4 MB

BesFS A POSIX Filesystem for Enclaves with a Mechanized Safety Proof.mp4

11.5 MB

Big Numbers - Big Troubles Systematically Analyzing Nonce Leakage in (EC)DSA.mp4

10.4 MB

BigMAC Fine-Grained Policy Analysis of Android Firmware.mp4

11.6 MB

BlockSci Design and applications of a blockchain analysis platform.mp4

8.4 MB

Boxer Preventing fraud by scanning credit cards.mp4

7.8 MB

Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade Attacks.mp4

11.0 MB

BScout Direct Whole Patch Presence Test for Java Executables.mp4

7.4 MB

Cache Telepathy Leveraging Shared Resource Attacks to Learn DNN Architectures.mp4

9.6 MB

Cached and Confused Web Cache Deception in the Wild.mp4

9.5 MB

Call Me Maybe Eavesdropping Encrypted LTE Calls With ReVoLTE.mp4

10.8 MB

Cardpliance PCI DSS Compliance of Android Applications.mp4

11.4 MB

Certified Side Channels.mp4

8.2 MB

Chaperone Real-time Locking and Loss Prevention for Smartphones.mp4

10.0 MB

Civet An Efficient Java Partitioning Framework for Hardware Enclaves.mp4

9.1 MB

Composition Kills A Case Study of Email Sender Authentication.mp4

11.1 MB

CopyCat Controlled Instruction-Level Attacks on Enclaves.mp4

8.9 MB

COUNTERFOIL Verifying Provenance of Integrated Circuits using Intrinsic.mp4

12.5 MB

Data Recovery from Scrubbed NAND Flash Storage Need for Analog Sanitization.mp4

13.0 MB

Datalog Disassembly.mp4

9.2 MB

DatashareNetwork A Decentralized Privacy-Preserving Search Engine.mp4

9.4 MB

DECAF Automatic, Adaptive De-bloating and Hardening of COTS Firmware.mp4

9.1 MB

DeepHammer Depleting the Intelligence of Deep Neural Networks through Target.mp4

9.5 MB

DELF Safeguarding deletion correctness in Online Social Networks.mp4

9.1 MB

Delphi A Cryptographic Inference Service for Neural Networks.mp4

8.2 MB

Detecting Stuffing of a User’s Credentials at Her Own Accounts.mp4

8.0 MB

Devil’s Whisper A General Approach for Physical Adversarial Attacks.mp4

11.2 MB

Differentially-Private Control-Flow Node Coverage for Software Usage Analysis.mp4

9.0 MB

Donky Domain Keys - Efficient In-Process Isolation for RISC-V and x86.mp4

8.4 MB

Drift with Devil Security of Multi-Sensor Fusion based Localization.mp4

11.4 MB

Droplet Decentralized Authorization and Access Control for Encrypted Data.mp4

8.2 MB

EcoFuzz Adaptive Energy-Saving Greybox Fuzzing as a Variant.mp4

10.1 MB

Empirical Measurement of Systemic 2FA Usability.mp4

6.2 MB

EPIC Every Packet Is Checked in the Data Plane of a Path-Aware Internet.mp4

10.9 MB

Estonian Electronic Identity Card Security Flaws in Key Management.mp4

9.6 MB

ETHBMC A Bounded Model Checker for Smart Contracts.mp4

7.5 MB

Everything Old is New Again Binary Security of WebAssembly.mp4

9.3 MB

Exploring Connections Between Active Learning and Model Extraction.mp4

6.7 MB

FANS Fuzzing Android Native System Services via Automated Interface Analysis.mp4

10.6 MB

Fawkes Protecting Privacy against Unauthorized Deep Learning Models.mp4

9.0 MB

FIRMSCOPE Automatic Uncovering of Privilege-Escalation Vulnerabilities.mp4

8.0 MB

Frankenstein Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation.mp4

10.2 MB

From Control Model to Program Investigating Robotic Aerial Vehicle Accidents.mp4

11.0 MB

From Needs to Actions to Secure Apps The Effect of Requirements.mp4

8.3 MB

FuzzGen Automatic Fuzzer Generation.mp4

14.1 MB

FuzzGuard Filtering out Unreachable Inputs in Directed Grey-box Fuzzing.mp4

7.7 MB

Fuzzing Error Handling Code using Context-Sensitive Software Fault Injection.mp4

8.7 MB

GREYONE Data Flow Sensitive Fuzzing.mp4

11.2 MB

Hall Spoofing A Non-Invasive DoS Attack on Grid-Tied Solar Inverter.mp4

12.3 MB

HALucinator Firmware Re-hosting Through Abstraction Layer Emulation.mp4

10.1 MB

High Accuracy and High Fidelity Extraction of Neural Networks.mp4

6.3 MB

him Shimmeny Evaluating the Security & Privacy Contributions of Link Shimming.mp4

10.9 MB

Horizontal Privilege Escalation in Trusted Applications.mp4

8.8 MB

Human Distinguishable Visual Key Fingerprints.mp4

8.1 MB

HybCache Hybrid Side-Channel-Resilient Caches for Trusted Execution.mp4

11.7 MB

Hybrid Batch Attacks Finding Black-box Adversarial Examples with Limited.mp4

7.9 MB

I am uncomfortable sharing what I cant see - Privacy Concerns.mp4

10.1 MB

I have too much respect for my elders Understanding South African Mobile.mp4

7.9 MB

Interpretable Deep Learning under Fire.mp4

9.9 MB

iOS, Your OS, Everybodys OS Vetting and Analyzing Network Services of iOS.mp4

11.6 MB

Justinians GAAvernor Robust Distributed Learning with Gradient Aggregation.mp4

10.4 MB

KOOBE Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write.mp4

9.0 MB

Light Commands Laser-Based Audio Injection Attacks on Voice-Controllable.mp4

13.3 MB

Liveness is Not Enough Enhancing Fingerprint Authentication with Behavioral.mp4

10.4 MB

Local Model Poisoning Attacks to Byzantine-Robust Federated Learning.mp4

8.4 MB

McTiny Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers.mp4

10.7 MB

Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines.mp4

9.4 MB

Medusa Microarchitectural Data Leakage via Automated Attack Synthesis.mp4

9.4 MB

MIRAGE Succinct Arguments for Randomized Algorithms with Applications.mp4

11.1 MB

Montage A Neural Network Language Model-Guided JavaScript Engine Fuzzer.mp4

8.2 MB

MUZZ Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded.mp4

10.8 MB

MVP Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures.mp4

11.1 MB

NetWarden Mitigating Network Covert Channels while Preserving Performance.mp4

8.1 MB

NXNSAttack Recursive DNS Inefficiencies and Vulnerabilities.mp4

12.6 MB

On Training Robust PDF Malware Classifiers.mp4

9.1 MB

P2IM Scalable and Hardware-independent Firmware Testing via Automatic.mp4

8.7 MB

Pancake Frequency Smoothing for Encrypted Data Stores.mp4

8.1 MB

Panel Digital Contact Tracing.mp4

100.4 MB

Panel The 2020 Election Remote Voting, Disinformation, and Audit.mp4

94.2 MB

ParmeSan Sanitizer-guided Greybox Fuzzing.mp4

8.9 MB

PARTEMU Enabling Dynamic Analysis of Real-World TrustZone Software.mp4

9.2 MB

PCKV Locally Differentially Private Correlated Key-Value Data Collection.mp4

10.5 MB

PhishTime Continuous Longitudinal Measurement of the Effectiveness.mp4

8.4 MB

PHMon A Programmable Hardware Monitor and Its Security Use Cases.mp4

10.6 MB

Pixel Multi-signatures for Consensus.mp4

9.6 MB

PKU Pitfalls Attacks on PKU-based Memory Isolation Systems.mp4

7.9 MB

Plug-N-Pwned Comprehensive Vulnerability Analysis of OBD-II Dongles.mp4

9.9 MB

Poison Over Troubled Forwarders A Cache Poisoning Attack Targeting DNS.mp4

5.9 MB

Preech A System for Privacy-Preserving Speech Transcription.mp4

7.8 MB

Programmable In-Network Security for Context-aware BYOD Policies.mp4

9.4 MB

RELOADREFRESH Abusing Cache Replacement Policies to Perform Stealthy Cache.mp4

8.8 MB

Remote Side-Channel Attacks on Anonymous Transactions.mp4

8.8 MB

Retrofitting Fine Grain Isolation in the Firefox Renderer.mp4

9.4 MB

SANNS Scaling Up Secure Approximate k-Nearest Neighbors Search.mp4

11.2 MB

SAVIOR Securing Autonomous Vehicles with Robust Physical Invariants.mp4

11.9 MB

Scaling Verifiable Computation Using Efficient Set Accumulators.mp4

8.3 MB

SEAL Attack Mitigation for Encrypted Databases via Adjustable Leakage.mp4

9.1 MB

sec20__full_proceedings.pdf

280.8 MB

sec20_contents.pdf

255.9 KB

sec20_cover.pdf

769.2 KB

sec20_errata_1.pdf

106.1 KB

sec20_errata_2.pdf

98.0 KB

sec20_errata_3.pdf

285.1 KB

sec20_full_proceedings_interior.pdf

279.5 MB

sec20_message.pdf

133.1 KB

sec20_title_copyright_organizers.pdf

126.7 KB

Secure Multi-party Computation of Differentially Private Median.mp4

10.8 MB

Secure parallel computation on national scale volumes of data.mp4

8.6 MB

Security Analysis of Unified Payments Interface and Payment Apps in India.mp4

10.3 MB

See No Evil Phishing for Permissions with False Transparency.mp4

13.2 MB

SENG, the SGX-Enforcing Network Gateway Authorizing Communication.mp4

10.5 MB

SHA-1 is a Shambles First Chosen-Prefix Collision on SHA-1 and Application.mp4

11.7 MB

ShadowMove A Stealthy Lateral Movement Strategy.mp4

8.2 MB

Shattered Chain of Trust Understanding Security Risks in Cross-Cloud IoT.mp4

10.8 MB

Silhouette Efficient Protected Shadow Stacks for Embedded Systems.mp4

7.4 MB

SkillExplorer Understanding the Behavior of Skills in Large Scale.mp4

9.2 MB

SmartVerif Push the Limit of Automation Capability of Verifying Security.mp4

8.6 MB

SpecFuzz Bringing Spectre-type vulnerabilities to the surface.mp4

10.4 MB

Stealthy Tracking of Autonomous Vehicles with Cache Side Channels.mp4

8.9 MB

Stolen Memories Leveraging Model Memorization for Calibrated White-Box.mp4

6.8 MB

Sunrise to Sunset Analyzing the End-to-end Life Cycle and Effectiveness.mp4

8.9 MB

Symbolic execution with SymCC don't interpret, compile.mp4

8.1 MB

Sys A Static Symbolic Tool for Finding Good Bugs in Good (Browser) Code.mp4

9.1 MB

TeeRex Discovery and Exploitation of Memory Corruption Vulnerabilities.mp4

10.2 MB

Temporal System Call Specialization for Attack Surface Reduction.mp4

11.8 MB

TextShield Robust Text Classification Based on Multimodal Embedding.mp4

13.6 MB

That Was Then, This Is Now A Security Evaluation of Password Generation.mp4

8.8 MB

The Ballot is Busted Before the Blockchain A Security Analysis of Voatz.mp4

8.1 MB

The Impact of Ad-Blockers on Product Search and Purchase Behavior.mp4

11.5 MB

The Industrial Age of Hacking.mp4

10.2 MB

The Tools and Tactics Used in Intimate Partner Surveillance An Analysis.mp4

11.2 MB

The Unpatchable Silicon A Full Break of the Bitstream Encryption of Xilinx.mp4

16.5 MB

Timeless Timing Attacks Exploiting Concurrency to Leak Secrets over Remote.mp4

10.5 MB

Towards HTTPS Everywhere on Android We Are Not There Yet.mp4

10.9 MB

Towards Robust LiDAR-based Perception in Autonomous Driving General Black-box.mp4

13.2 MB

TPM-FAIL TPM meets Timing and Lattice Attacks.mp4

9.2 MB

TXSPECTOR Uncovering Attacks in Ethereum from Transactions.mp4

7.8 MB

Understanding security mistakes developers make Qualitative analysis.mp4

8.5 MB

Updates-Leak Data Set Inference and Reconstruction Attacks in Online Learning.mp4

9.7 MB

USBFuzz A Framework for Fuzzing USB Drivers by Device Emulation.mp4

8.4 MB

USENIX Security '20 Technical Sessions USENIX.html

801.2 KB

USENIX Security '20 USENIX.html

125.1 KB

V0LTpwn Attacking x86 Processor Integrity from Software.mp4

7.5 MB

Visor Privacy-Preserving Video Analytics as a Cloud Service.mp4

12.5 MB

Void A fast and light voice liveness detection system.mp4

10.7 MB

VoteAgain A scalable coercion-resistant voting system.mp4

2.2 MB

Walking Onions Scaling Anonymity Networks while Protecting Users.mp4

9.9 MB

What Twitter Knows Characterizing Ad Targeting Practices, User Perceptions.mp4

7.6 MB

who's Calling Characterizing Robocalls through Audio and Metadata Analysis.mp4

8.9 MB

You Are What You Broadcast Identification of Mobile and IoT Devices.mp4

12.1 MB

Zero-delay Lightweight Defenses against Website Fingerprinting.mp4

7.2 MB

/.../USENIX Security '20 Technical Sessions USENIX_files/

adida_ben_2018_200x230.png

23.4 KB

application-pdf.png

0.3 KB

css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css

4.3 KB

css_Pen3ncMGQyB3Q2LWoTho2yu6X-D2T6zOqWITJ4iG9A8.css

611.0 KB

css_Tvyih1Dm489siBROXzFSkKUCFbsEK9kCr0p3JDiev80.css

129.3 KB

css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css

3.8 KB

css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css

5.4 KB

font-awesome.css

26.7 KB

halderman_alex_200x230.jpg

11.8 KB

js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js

20.5 KB

js_fyV0VVkC6Q3xduxGurKMTFIU2dMmArUrbAdZORL-9WQ.js

0.4 KB

js_l3lGSHpmjPG_uzcz3Shpsi9Iwu4IaSB7us0ldgM0q7g.js

16.3 KB

js_nKHPel07iQ7X6ouVrkRIeMs9JzgU_FAp9nBhDfrhyQc.js

14.8 KB

js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js

26.8 KB

js_wKyFX46tVKJtPKN12qNjRfS4aubW4G2u7LK22vlDiKo.js

133.2 KB

package-x-generic.png

0.3 KB

pdf.svg

0.5 KB

rubin_avi_200x230.jpg

11.6 KB

sec20_wordmark_stacked_white.png

3.8 KB

slides.svg

0.7 KB

teague_vanessa_200x230.png

26.0 KB

usenix-locked.png

1.4 KB

video.svg

0.8 KB

/.../USENIX Security '20 USENIX_files/

acmqueue_600x240_1.png

4.7 KB

baidu_600x240_0.png

4.3 KB

bytedance_600x240_3.png

6.2 KB

capkun_srdjan_200x230.jpg

11.8 KB

cisco_600x240.png

6.1 KB

css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css

4.3 KB

css_Pen3ncMGQyB3Q2LWoTho2yu6X-D2T6zOqWITJ4iG9A8.css

611.0 KB

css_Tvyih1Dm489siBROXzFSkKUCFbsEK9kCr0p3JDiev80.css

129.3 KB

css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css

3.8 KB

css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css

5.4 KB

dmtf_600x240.png

3.2 KB

dropbox_2018_600x240_1_1.png

3.3 KB

facebook_600x240_17.png

3.9 KB

font-awesome.css

26.7 KB

freebsd_foundation_600x240.png

3.4 KB

google_600x240_13.png

4.8 KB

ibm_600x240_2.png

2.3 KB

intel_600x240.png

3.4 KB

js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js

20.5 KB

js_fyV0VVkC6Q3xduxGurKMTFIU2dMmArUrbAdZORL-9WQ.js

0.4 KB

js_l3lGSHpmjPG_uzcz3Shpsi9Iwu4IaSB7us0ldgM0q7g.js

16.3 KB

js_nKHPel07iQ7X6ouVrkRIeMs9JzgU_FAp9nBhDfrhyQc.js

14.8 KB

js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js

26.8 KB

js_wKyFX46tVKJtPKN12qNjRfS4aubW4G2u7LK22vlDiKo.js

133.2 KB

kaspersky_600x240_1.png

6.3 KB

microsoft-logo_600x240_0.png

4.2 KB

qc_600x240_1.png

3.8 KB

roesner_franziska_200.jpg

11.4 KB

salesforce_600x240.png

5.6 KB

sec20_wordmark_stacked_white.png

3.8 KB

sec20_wordmark_stacked_white_002.png

9.0 KB

usenix_logo_300x150_neat_2.png

15.0 KB

/.../USENIX Security 2020 captions/

(Mostly) Exitless VM Protection from Untrusted Hypervisor through Disaggregate.eng.json

458.1 KB

(Mostly) Exitless VM Protection from Untrusted Hypervisor through Disaggregate.eng.lrc

12.7 KB

(Mostly) Exitless VM Protection from Untrusted Hypervisor through Disaggregate.eng.srt

13.3 KB

(Mostly) Exitless VM Protection from Untrusted Hypervisor through Disaggregate.eng.text

9.8 KB

(Mostly) Exitless VM Protection from Untrusted Hypervisor through Disaggregate.eng.tsv

11.4 KB

(Mostly) Exitless VM Protection from Untrusted Hypervisor through Disaggregate.eng.txt

12.8 KB

(Mostly) Exitless VM Protection from Untrusted Hypervisor through Disaggregate.eng.vtt

12.3 KB

A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web.eng.json

529.6 KB

A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web.eng.lrc

14.3 KB

A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web.eng.srt

14.1 KB

A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web.eng.text

11.1 KB

A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web.eng.tsv

12.8 KB

A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web.eng.txt

14.4 KB

A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web.eng.vtt

13.3 KB

A different cup of TI The added value of commercial threat intelligence.eng.srt

22.9 KB

A Formal Analysis of IEEE 802.11s WPA2 Countering the Kracks Caused by.eng.json

568.1 KB

A Formal Analysis of IEEE 802.11s WPA2 Countering the Kracks Caused by.eng.lrc

14.8 KB

A Formal Analysis of IEEE 802.11s WPA2 Countering the Kracks Caused by.eng.srt

15.2 KB

A Formal Analysis of IEEE 802.11s WPA2 Countering the Kracks Caused by.eng.text

11.6 KB

A Formal Analysis of IEEE 802.11s WPA2 Countering the Kracks Caused by.eng.tsv

13.3 KB

A Formal Analysis of IEEE 802.11s WPA2 Countering the Kracks Caused by.eng.txt

14.9 KB

A Formal Analysis of IEEE 802.11s WPA2 Countering the Kracks Caused by.eng.vtt

14.2 KB

A Longitudinal and Comprehensive Study of the DANE Ecosystem in Email.eng.srt

23.1 KB

A Spectral Analysis of Noise A Comprehensive, Automated, Formal Analysis.eng.srt

19.6 KB

A Tale of Two Headers A Formal Analysis of Inconsistent Click-Jacking.eng.srt

20.8 KB

Achieving Keyless CDNs with Conclaves.eng.srt

24.1 KB

Actions Speak Louder than Words Entity-Sensitive Privacy Policy and Data Flow.eng.json

557.1 KB

Actions Speak Louder than Words Entity-Sensitive Privacy Policy and Data Flow.eng.lrc

14.7 KB

Actions Speak Louder than Words Entity-Sensitive Privacy Policy and Data Flow.eng.srt

14.9 KB

Actions Speak Louder than Words Entity-Sensitive Privacy Policy and Data Flow.eng.text

11.3 KB

Actions Speak Louder than Words Entity-Sensitive Privacy Policy and Data Flow.eng.tsv

13.1 KB

Actions Speak Louder than Words Entity-Sensitive Privacy Policy and Data Flow.eng.txt

14.8 KB

Actions Speak Louder than Words Entity-Sensitive Privacy Policy and Data Flow.eng.vtt

13.9 KB

Adversarial Preprocessing Understanding and Preventing Image-Scaling Attacks.eng.srt

22.5 KB

Agamotto Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine.eng.json

542.9 KB

Agamotto Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine.eng.lrc

15.0 KB

Agamotto Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine.eng.srt

15.3 KB

Agamotto Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine.eng.text

11.8 KB

Agamotto Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine.eng.tsv

13.5 KB

Agamotto Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine.eng.txt

15.1 KB

Agamotto Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine.eng.vtt

14.3 KB

An Ever-evolving Game Evaluation of Real-world Attacks and Defenses.eng.srt

17.9 KB

An Observational Investigation of Reverse Engineers’ Processes.eng.json

550.5 KB

An Observational Investigation of Reverse Engineers’ Processes.eng.lrc

14.5 KB

An Observational Investigation of Reverse Engineers’ Processes.eng.srt

15.2 KB

An Observational Investigation of Reverse Engineers’ Processes.eng.text

11.4 KB

An Observational Investigation of Reverse Engineers’ Processes.eng.tsv

13.1 KB

An Observational Investigation of Reverse Engineers’ Processes.eng.txt

14.7 KB

An Observational Investigation of Reverse Engineers’ Processes.eng.vtt

14.2 KB

An Off-Chip Attack on Hardware Enclaves via the Memory Bus.eng.srt

23.2 KB

Analysis of DTLS Implementations Using Protocol State Fuzzing.eng.srt

23.6 KB

APEX A Verified Architecture for Proofs of Execution on Remote Devices.eng.json

625.4 KB

APEX A Verified Architecture for Proofs of Execution on Remote Devices.eng.lrc

16.5 KB

APEX A Verified Architecture for Proofs of Execution on Remote Devices.eng.srt

16.5 KB

APEX A Verified Architecture for Proofs of Execution on Remote Devices.eng.text

12.8 KB

APEX A Verified Architecture for Proofs of Execution on Remote Devices.eng.tsv

14.8 KB

APEX A Verified Architecture for Proofs of Execution on Remote Devices.eng.txt

16.6 KB

APEX A Verified Architecture for Proofs of Execution on Remote Devices.eng.vtt

15.5 KB

AURORA Statistical Crash Analysis for Automated Root Cause Explanation.eng.json

458.4 KB

AURORA Statistical Crash Analysis for Automated Root Cause Explanation.eng.lrc

11.6 KB

AURORA Statistical Crash Analysis for Automated Root Cause Explanation.eng.srt

12.2 KB

AURORA Statistical Crash Analysis for Automated Root Cause Explanation.eng.text

8.8 KB

AURORA Statistical Crash Analysis for Automated Root Cause Explanation.eng.tsv

10.3 KB

AURORA Statistical Crash Analysis for Automated Root Cause Explanation.eng.txt

11.7 KB

AURORA Statistical Crash Analysis for Automated Root Cause Explanation.eng.vtt

11.3 KB

Automatic Hot Patch Generation for Android Kernels.eng.srt

23.5 KB

Automatic Techniques to Systematically Discover New Heap Exploitation.eng.srt

28.5 KB

Automating the Development of Chosen Ciphertext Attacks.eng.json

478.2 KB

Automating the Development of Chosen Ciphertext Attacks.eng.lrc

12.7 KB

Automating the Development of Chosen Ciphertext Attacks.eng.srt

12.6 KB

Automating the Development of Chosen Ciphertext Attacks.eng.text

9.8 KB

Automating the Development of Chosen Ciphertext Attacks.eng.tsv

11.3 KB

Automating the Development of Chosen Ciphertext Attacks.eng.txt

12.8 KB

Automating the Development of Chosen Ciphertext Attacks.eng.vtt

11.8 KB

BesFS A POSIX Filesystem for Enclaves with a Mechanized Safety Proof.eng.srt

20.9 KB

Big Numbers - Big Troubles Systematically Analyzing Nonce Leakage in (EC)DSA.eng.json

543.7 KB

Big Numbers - Big Troubles Systematically Analyzing Nonce Leakage in (EC)DSA.eng.lrc

14.4 KB

Big Numbers - Big Troubles Systematically Analyzing Nonce Leakage in (EC)DSA.eng.srt

14.6 KB

Big Numbers - Big Troubles Systematically Analyzing Nonce Leakage in (EC)DSA.eng.text

10.1 KB

Big Numbers - Big Troubles Systematically Analyzing Nonce Leakage in (EC)DSA.eng.tsv

12.4 KB

Big Numbers - Big Troubles Systematically Analyzing Nonce Leakage in (EC)DSA.eng.txt

14.6 KB

Big Numbers - Big Troubles Systematically Analyzing Nonce Leakage in (EC)DSA.eng.vtt

13.4 KB

BigMAC Fine-Grained Policy Analysis of Android Firmware.eng.srt

24.5 KB

BlockSci Design and applications of a blockchain analysis platform.eng.srt

20.6 KB

Boxer Preventing fraud by scanning credit cards.eng.srt

21.8 KB

Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade Attacks.eng.srt

18.5 KB

BScout Direct Whole Patch Presence Test for Java Executables.eng.json

369.4 KB

BScout Direct Whole Patch Presence Test for Java Executables.eng.lrc

9.9 KB

BScout Direct Whole Patch Presence Test for Java Executables.eng.srt

10.6 KB

BScout Direct Whole Patch Presence Test for Java Executables.eng.text

7.9 KB

BScout Direct Whole Patch Presence Test for Java Executables.eng.tsv

8.9 KB

BScout Direct Whole Patch Presence Test for Java Executables.eng.txt

9.9 KB

BScout Direct Whole Patch Presence Test for Java Executables.eng.vtt

9.9 KB

Cache Telepathy Leveraging Shared Resource Attacks to Learn DNN Architectures.eng.srt

22.8 KB

Cached and Confused Web Cache Deception in the Wild.eng.json

375.9 KB

Cached and Confused Web Cache Deception in the Wild.eng.lrc

9.9 KB

Cached and Confused Web Cache Deception in the Wild.eng.srt

11.0 KB

Cached and Confused Web Cache Deception in the Wild.eng.text

8.5 KB

Cached and Confused Web Cache Deception in the Wild.eng.tsv

9.3 KB

Cached and Confused Web Cache Deception in the Wild.eng.txt

10.0 KB

Cached and Confused Web Cache Deception in the Wild.eng.vtt

10.3 KB

Call Me Maybe Eavesdropping Encrypted LTE Calls With ReVoLTE.eng.srt

21.5 KB

Cardpliance PCI DSS Compliance of Android Applications.eng.srt

24.5 KB

Certified Side Channels.eng.json

388.1 KB

Certified Side Channels.eng.lrc

10.7 KB

Certified Side Channels.eng.srt

11.2 KB

Certified Side Channels.eng.text

8.3 KB

Certified Side Channels.eng.tsv

9.6 KB

Certified Side Channels.eng.txt

10.8 KB

Certified Side Channels.eng.vtt

10.4 KB

Chaperone Real-time Locking and Loss Prevention for Smartphones.eng.srt

22.9 KB

Civet An Efficient Java Partitioning Framework for Hardware Enclaves.eng.srt

20.8 KB

Composition Kills A Case Study of Email Sender Authentication.eng.srt

23.8 KB

CopyCat Controlled Instruction-Level Attacks on Enclaves.eng.srt

25.9 KB

COUNTERFOIL Verifying Provenance of Integrated Circuits using Intrinsic.eng.json

379.6 KB

COUNTERFOIL Verifying Provenance of Integrated Circuits using Intrinsic.eng.lrc

10.6 KB

COUNTERFOIL Verifying Provenance of Integrated Circuits using Intrinsic.eng.srt

11.1 KB

COUNTERFOIL Verifying Provenance of Integrated Circuits using Intrinsic.eng.text

8.0 KB

COUNTERFOIL Verifying Provenance of Integrated Circuits using Intrinsic.eng.tsv

9.4 KB

COUNTERFOIL Verifying Provenance of Integrated Circuits using Intrinsic.eng.txt

10.7 KB

COUNTERFOIL Verifying Provenance of Integrated Circuits using Intrinsic.eng.vtt

10.3 KB

Data Recovery from Scrubbed NAND Flash Storage Need for Analog Sanitization.eng.srt

27.1 KB

Datalog Disassembly.eng.srt

23.9 KB

DatashareNetwork A Decentralized Privacy-Preserving Search Engine.eng.srt

21.4 KB

DECAF Automatic, Adaptive De-bloating and Hardening of COTS Firmware.eng.srt

24.6 KB

DeepHammer Depleting the Intelligence of Deep Neural Networks through Target.eng.json

498.7 KB

DeepHammer Depleting the Intelligence of Deep Neural Networks through Target.eng.lrc

13.7 KB

DeepHammer Depleting the Intelligence of Deep Neural Networks through Target.eng.srt

14.4 KB

DeepHammer Depleting the Intelligence of Deep Neural Networks through Target.eng.text

10.7 KB

DeepHammer Depleting the Intelligence of Deep Neural Networks through Target.eng.tsv

12.3 KB

DeepHammer Depleting the Intelligence of Deep Neural Networks through Target.eng.txt

13.8 KB

DeepHammer Depleting the Intelligence of Deep Neural Networks through Target.eng.vtt

13.4 KB

DELF Safeguarding deletion correctness in Online Social Networks.eng.json

558.4 KB

DELF Safeguarding deletion correctness in Online Social Networks.eng.lrc

14.6 KB

DELF Safeguarding deletion correctness in Online Social Networks.eng.srt

16.2 KB

DELF Safeguarding deletion correctness in Online Social Networks.eng.text

11.4 KB

DELF Safeguarding deletion correctness in Online Social Networks.eng.tsv

13.1 KB

DELF Safeguarding deletion correctness in Online Social Networks.eng.txt

14.7 KB

DELF Safeguarding deletion correctness in Online Social Networks.eng.vtt

14.9 KB

Delphi A Cryptographic Inference Service for Neural Networks.eng.json

702.0 KB

Delphi A Cryptographic Inference Service for Neural Networks.eng.lrc

21.0 KB

Delphi A Cryptographic Inference Service for Neural Networks.eng.srt

17.4 KB

Delphi A Cryptographic Inference Service for Neural Networks.eng.text

12.9 KB

Delphi A Cryptographic Inference Service for Neural Networks.eng.tsv

17.2 KB

Delphi A Cryptographic Inference Service for Neural Networks.eng.txt

21.3 KB

Delphi A Cryptographic Inference Service for Neural Networks.eng.vtt

16.2 KB

Detecting Stuffing of a User’s Credentials at Her Own Accounts.eng.srt

26.3 KB

Devil’s Whisper A General Approach for Physical Adversarial Attacks.eng.srt

23.7 KB

Differentially-Private Control-Flow Node Coverage for Software Usage Analysis.eng.json

540.5 KB

Differentially-Private Control-Flow Node Coverage for Software Usage Analysis.eng.lrc

14.1 KB

Differentially-Private Control-Flow Node Coverage for Software Usage Analysis.eng.srt

14.8 KB

Differentially-Private Control-Flow Node Coverage for Software Usage Analysis.eng.text

11.1 KB

Differentially-Private Control-Flow Node Coverage for Software Usage Analysis.eng.tsv

12.7 KB

Differentially-Private Control-Flow Node Coverage for Software Usage Analysis.eng.txt

14.2 KB

Differentially-Private Control-Flow Node Coverage for Software Usage Analysis.eng.vtt

13.8 KB

Donky Domain Keys - Efficient In-Process Isolation for RISC-V and x86.eng.json

475.5 KB

Donky Domain Keys - Efficient In-Process Isolation for RISC-V and x86.eng.lrc

12.3 KB

Donky Domain Keys - Efficient In-Process Isolation for RISC-V and x86.eng.srt

13.6 KB

Donky Domain Keys - Efficient In-Process Isolation for RISC-V and x86.eng.text

9.3 KB

Donky Domain Keys - Efficient In-Process Isolation for RISC-V and x86.eng.tsv

10.9 KB

Donky Domain Keys - Efficient In-Process Isolation for RISC-V and x86.eng.txt

12.5 KB

Donky Domain Keys - Efficient In-Process Isolation for RISC-V and x86.eng.vtt

12.4 KB

Drift with Devil Security of Multi-Sensor Fusion based Localization.eng.srt

20.1 KB

Droplet Decentralized Authorization and Access Control for Encrypted Data.eng.json

469.6 KB

Droplet Decentralized Authorization and Access Control for Encrypted Data.eng.lrc

12.7 KB

Droplet Decentralized Authorization and Access Control for Encrypted Data.eng.srt

13.4 KB

Droplet Decentralized Authorization and Access Control for Encrypted Data.eng.text

10.8 KB

Droplet Decentralized Authorization and Access Control for Encrypted Data.eng.tsv

11.8 KB

Droplet Decentralized Authorization and Access Control for Encrypted Data.eng.txt

12.8 KB

Droplet Decentralized Authorization and Access Control for Encrypted Data.eng.vtt

12.7 KB

EcoFuzz Adaptive Energy-Saving Greybox Fuzzing as a Variant.eng.json

434.6 KB

EcoFuzz Adaptive Energy-Saving Greybox Fuzzing as a Variant.eng.lrc

11.5 KB

EcoFuzz Adaptive Energy-Saving Greybox Fuzzing as a Variant.eng.srt

12.6 KB

EcoFuzz Adaptive Energy-Saving Greybox Fuzzing as a Variant.eng.text

8.7 KB

EcoFuzz Adaptive Energy-Saving Greybox Fuzzing as a Variant.eng.tsv

10.2 KB

EcoFuzz Adaptive Energy-Saving Greybox Fuzzing as a Variant.eng.txt

11.7 KB

EcoFuzz Adaptive Energy-Saving Greybox Fuzzing as a Variant.eng.vtt

11.6 KB

Empirical Measurement of Systemic 2FA Usability.eng.json

410.4 KB

Empirical Measurement of Systemic 2FA Usability.eng.lrc

10.9 KB

Empirical Measurement of Systemic 2FA Usability.eng.srt

11.2 KB

Empirical Measurement of Systemic 2FA Usability.eng.text

8.5 KB

Empirical Measurement of Systemic 2FA Usability.eng.tsv

9.8 KB

Empirical Measurement of Systemic 2FA Usability.eng.txt

11.0 KB

Empirical Measurement of Systemic 2FA Usability.eng.vtt

10.5 KB

EPIC Every Packet Is Checked in the Data Plane of a Path-Aware Internet.eng.json

371.1 KB

EPIC Every Packet Is Checked in the Data Plane of a Path-Aware Internet.eng.lrc

10.6 KB

EPIC Every Packet Is Checked in the Data Plane of a Path-Aware Internet.eng.srt

10.5 KB

EPIC Every Packet Is Checked in the Data Plane of a Path-Aware Internet.eng.text

8.2 KB

EPIC Every Packet Is Checked in the Data Plane of a Path-Aware Internet.eng.tsv

9.5 KB

EPIC Every Packet Is Checked in the Data Plane of a Path-Aware Internet.eng.txt

10.7 KB

EPIC Every Packet Is Checked in the Data Plane of a Path-Aware Internet.eng.vtt

9.8 KB

Estonian Electronic Identity Card Security Flaws in Key Management.eng.srt

21.7 KB

ETHBMC A Bounded Model Checker for Smart Contracts.eng.srt

20.5 KB

Everything Old is New Again Binary Security of WebAssembly.eng.srt

27.0 KB

Exploring Connections Between Active Learning and Model Extraction.eng.json

379.0 KB

Exploring Connections Between Active Learning and Model Extraction.eng.lrc

10.6 KB

Exploring Connections Between Active Learning and Model Extraction.eng.srt

11.3 KB

Exploring Connections Between Active Learning and Model Extraction.eng.text

8.2 KB

Exploring Connections Between Active Learning and Model Extraction.eng.tsv

9.5 KB

Exploring Connections Between Active Learning and Model Extraction.eng.txt

10.7 KB

Exploring Connections Between Active Learning and Model Extraction.eng.vtt

10.5 KB

FANS Fuzzing Android Native System Services via Automated Interface Analysis.eng.srt

20.7 KB

Fawkes Protecting Privacy against Unauthorized Deep Learning Models.eng.srt

23.4 KB

FIRMSCOPE Automatic Uncovering of Privilege-Escalation Vulnerabilities.eng.srt

24.5 KB

Frankenstein Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation.eng.json

516.6 KB

Frankenstein Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation.eng.lrc

13.4 KB

Frankenstein Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation.eng.srt

14.4 KB

Frankenstein Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation.eng.text

10.0 KB

Frankenstein Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation.eng.tsv

11.8 KB

Frankenstein Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation.eng.txt

13.6 KB

Frankenstein Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation.eng.vtt

13.2 KB

From Control Model to Program Investigating Robotic Aerial Vehicle Accidents.eng.json

487.6 KB

From Control Model to Program Investigating Robotic Aerial Vehicle Accidents.eng.lrc

13.4 KB

From Control Model to Program Investigating Robotic Aerial Vehicle Accidents.eng.srt

14.2 KB

From Control Model to Program Investigating Robotic Aerial Vehicle Accidents.eng.text

10.2 KB

From Control Model to Program Investigating Robotic Aerial Vehicle Accidents.eng.tsv

11.9 KB

From Control Model to Program Investigating Robotic Aerial Vehicle Accidents.eng.txt

13.6 KB

From Control Model to Program Investigating Robotic Aerial Vehicle Accidents.eng.vtt

13.1 KB

From Needs to Actions to Secure Apps The Effect of Requirements.eng.srt

19.7 KB

FuzzGen Automatic Fuzzer Generation.eng.json

545.2 KB

FuzzGen Automatic Fuzzer Generation.eng.lrc

14.1 KB

FuzzGen Automatic Fuzzer Generation.eng.srt

15.4 KB

FuzzGen Automatic Fuzzer Generation.eng.text

11.1 KB

FuzzGen Automatic Fuzzer Generation.eng.tsv

12.7 KB

FuzzGen Automatic Fuzzer Generation.eng.txt

14.2 KB

FuzzGen Automatic Fuzzer Generation.eng.vtt

14.2 KB

FuzzGuard Filtering out Unreachable Inputs in Directed Grey-box Fuzzing.eng.json

337.4 KB

FuzzGuard Filtering out Unreachable Inputs in Directed Grey-box Fuzzing.eng.lrc

8.8 KB

FuzzGuard Filtering out Unreachable Inputs in Directed Grey-box Fuzzing.eng.srt

9.4 KB

FuzzGuard Filtering out Unreachable Inputs in Directed Grey-box Fuzzing.eng.text

7.2 KB

FuzzGuard Filtering out Unreachable Inputs in Directed Grey-box Fuzzing.eng.tsv

8.1 KB

FuzzGuard Filtering out Unreachable Inputs in Directed Grey-box Fuzzing.eng.txt

8.9 KB

FuzzGuard Filtering out Unreachable Inputs in Directed Grey-box Fuzzing.eng.vtt

8.8 KB

Fuzzing Error Handling Code using Context-Sensitive Software Fault Injection.eng.json

349.5 KB

Fuzzing Error Handling Code using Context-Sensitive Software Fault Injection.eng.lrc

9.3 KB

Fuzzing Error Handling Code using Context-Sensitive Software Fault Injection.eng.srt

9.8 KB

Fuzzing Error Handling Code using Context-Sensitive Software Fault Injection.eng.text

7.1 KB

Fuzzing Error Handling Code using Context-Sensitive Software Fault Injection.eng.tsv

8.3 KB

Fuzzing Error Handling Code using Context-Sensitive Software Fault Injection.eng.txt

9.4 KB

Fuzzing Error Handling Code using Context-Sensitive Software Fault Injection.eng.vtt

9.1 KB

GREYONE Data Flow Sensitive Fuzzing.eng.json

416.5 KB

GREYONE Data Flow Sensitive Fuzzing.eng.lrc

11.4 KB

GREYONE Data Flow Sensitive Fuzzing.eng.srt

12.4 KB

GREYONE Data Flow Sensitive Fuzzing.eng.text

8.7 KB

GREYONE Data Flow Sensitive Fuzzing.eng.tsv

10.1 KB

GREYONE Data Flow Sensitive Fuzzing.eng.txt

11.5 KB

GREYONE Data Flow Sensitive Fuzzing.eng.vtt

11.4 KB

Hall Spoofing A Non-Invasive DoS Attack on Grid-Tied Solar Inverter.eng.srt

22.6 KB

HALucinator Firmware Re-hosting Through Abstraction Layer Emulation.eng.srt

25.4 KB

High Accuracy and High Fidelity Extraction of Neural Networks.eng.srt

21.0 KB

him Shimmeny Evaluating the Security & Privacy Contributions of Link Shimming.eng.json

610.5 KB

him Shimmeny Evaluating the Security & Privacy Contributions of Link Shimming.eng.lrc

16.4 KB

him Shimmeny Evaluating the Security & Privacy Contributions of Link Shimming.eng.srt

16.2 KB

him Shimmeny Evaluating the Security & Privacy Contributions of Link Shimming.eng.text

12.8 KB

him Shimmeny Evaluating the Security & Privacy Contributions of Link Shimming.eng.tsv

14.7 KB

him Shimmeny Evaluating the Security & Privacy Contributions of Link Shimming.eng.txt

16.5 KB

him Shimmeny Evaluating the Security & Privacy Contributions of Link Shimming.eng.vtt

15.3 KB

Horizontal Privilege Escalation in Trusted Applications.eng.srt

20.8 KB

Human Distinguishable Visual Key Fingerprints.eng.srt

25.5 KB

HybCache Hybrid Side-Channel-Resilient Caches for Trusted Execution.eng.json

666.2 KB

HybCache Hybrid Side-Channel-Resilient Caches for Trusted Execution.eng.lrc

18.7 KB

HybCache Hybrid Side-Channel-Resilient Caches for Trusted Execution.eng.srt

18.3 KB

HybCache Hybrid Side-Channel-Resilient Caches for Trusted Execution.eng.text

14.7 KB

HybCache Hybrid Side-Channel-Resilient Caches for Trusted Execution.eng.tsv

16.8 KB

HybCache Hybrid Side-Channel-Resilient Caches for Trusted Execution.eng.txt

18.9 KB

HybCache Hybrid Side-Channel-Resilient Caches for Trusted Execution.eng.vtt

17.3 KB

Hybrid Batch Attacks Finding Black-box Adversarial Examples with Limited.eng.srt

23.0 KB

I am uncomfortable sharing what I cant see - Privacy Concerns.eng.json

496.5 KB

I am uncomfortable sharing what I cant see - Privacy Concerns.eng.lrc

14.6 KB

I am uncomfortable sharing what I cant see - Privacy Concerns.eng.srt

14.0 KB

I am uncomfortable sharing what I cant see - Privacy Concerns.eng.text

10.7 KB

I am uncomfortable sharing what I cant see - Privacy Concerns.eng.tsv

12.7 KB

I am uncomfortable sharing what I cant see - Privacy Concerns.eng.txt

14.7 KB

I am uncomfortable sharing what I cant see - Privacy Concerns.eng.vtt

13.1 KB

I have too much respect for my elders Understanding South African Mobile.eng.srt

22.5 KB

Interpretable Deep Learning under Fire.eng.srt

19.2 KB

iOS, Your OS, Everybodys OS Vetting and Analyzing Network Services of iOS.eng.json

413.2 KB

iOS, Your OS, Everybodys OS Vetting and Analyzing Network Services of iOS.eng.lrc

11.6 KB

iOS, Your OS, Everybodys OS Vetting and Analyzing Network Services of iOS.eng.srt

12.0 KB

iOS, Your OS, Everybodys OS Vetting and Analyzing Network Services of iOS.eng.text

8.9 KB

iOS, Your OS, Everybodys OS Vetting and Analyzing Network Services of iOS.eng.tsv

10.3 KB

iOS, Your OS, Everybodys OS Vetting and Analyzing Network Services of iOS.eng.txt

11.7 KB

iOS, Your OS, Everybodys OS Vetting and Analyzing Network Services of iOS.eng.vtt

11.2 KB

Justinians GAAvernor Robust Distributed Learning with Gradient Aggregation.eng.json

466.2 KB

Justinians GAAvernor Robust Distributed Learning with Gradient Aggregation.eng.lrc

12.9 KB

Justinians GAAvernor Robust Distributed Learning with Gradient Aggregation.eng.srt

12.6 KB

Justinians GAAvernor Robust Distributed Learning with Gradient Aggregation.eng.text

9.6 KB

Justinians GAAvernor Robust Distributed Learning with Gradient Aggregation.eng.tsv

11.4 KB

Justinians GAAvernor Robust Distributed Learning with Gradient Aggregation.eng.txt

13.1 KB

Justinians GAAvernor Robust Distributed Learning with Gradient Aggregation.eng.vtt

11.8 KB

KOOBE Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write.eng.srt

21.6 KB

Light Commands Laser-Based Audio Injection Attacks on Voice-Controllable.eng.srt

29.4 KB

Liveness is Not Enough Enhancing Fingerprint Authentication with Behavioral.eng.srt

17.5 KB

Local Model Poisoning Attacks to Byzantine-Robust Federated Learning.eng.json

477.0 KB

Local Model Poisoning Attacks to Byzantine-Robust Federated Learning.eng.lrc

12.9 KB

Local Model Poisoning Attacks to Byzantine-Robust Federated Learning.eng.srt

14.4 KB

Local Model Poisoning Attacks to Byzantine-Robust Federated Learning.eng.text

10.1 KB

Local Model Poisoning Attacks to Byzantine-Robust Federated Learning.eng.tsv

11.6 KB

Local Model Poisoning Attacks to Byzantine-Robust Federated Learning.eng.txt

13.0 KB

Local Model Poisoning Attacks to Byzantine-Robust Federated Learning.eng.vtt

13.2 KB

McTiny Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers.eng.json

573.3 KB

McTiny Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers.eng.lrc

14.0 KB

McTiny Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers.eng.srt

15.6 KB

McTiny Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers.eng.text

10.9 KB

McTiny Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers.eng.tsv

12.6 KB

McTiny Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers.eng.txt

14.2 KB

McTiny Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers.eng.vtt

14.3 KB

Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines.eng.srt

22.1 KB

Medusa Microarchitectural Data Leakage via Automated Attack Synthesis.eng.srt

26.3 KB

MIRAGE Succinct Arguments for Randomized Algorithms with Applications.eng.srt

24.9 KB

Montage A Neural Network Language Model-Guided JavaScript Engine Fuzzer.eng.srt

22.0 KB

MUZZ Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded.eng.json

310.4 KB

MUZZ Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded.eng.lrc

8.7 KB

MUZZ Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded.eng.srt

9.8 KB

MUZZ Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded.eng.text

6.3 KB

MUZZ Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded.eng.tsv

7.6 KB

MUZZ Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded.eng.txt

8.8 KB

MUZZ Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded.eng.vtt

8.9 KB

MVP Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures.eng.json

367.0 KB

MVP Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures.eng.lrc

10.3 KB

MVP Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures.eng.srt

10.7 KB

MVP Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures.eng.text

8.0 KB

MVP Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures.eng.tsv

9.2 KB

MVP Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures.eng.txt

10.4 KB

MVP Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures.eng.vtt

10.0 KB

NetWarden Mitigating Network Covert Channels while Preserving Performance.eng.json

535.0 KB

NetWarden Mitigating Network Covert Channels while Preserving Performance.eng.lrc

14.8 KB

NetWarden Mitigating Network Covert Channels while Preserving Performance.eng.srt

14.8 KB

NetWarden Mitigating Network Covert Channels while Preserving Performance.eng.text

11.6 KB

NetWarden Mitigating Network Covert Channels while Preserving Performance.eng.tsv

13.3 KB

NetWarden Mitigating Network Covert Channels while Preserving Performance.eng.txt

15.0 KB

NetWarden Mitigating Network Covert Channels while Preserving Performance.eng.vtt

14.0 KB

NXNSAttack Recursive DNS Inefficiencies and Vulnerabilities.eng.srt

21.1 KB

On Training Robust PDF Malware Classifiers.eng.json

540.5 KB

On Training Robust PDF Malware Classifiers.eng.lrc

16.0 KB

On Training Robust PDF Malware Classifiers.eng.srt

15.1 KB

On Training Robust PDF Malware Classifiers.eng.text

11.2 KB

On Training Robust PDF Malware Classifiers.eng.tsv

13.8 KB

On Training Robust PDF Malware Classifiers.eng.txt

16.2 KB

On Training Robust PDF Malware Classifiers.eng.vtt

14.0 KB

P2IM Scalable and Hardware-independent Firmware Testing via Automatic.eng.srt

18.2 KB

Pancake Frequency Smoothing for Encrypted Data Stores.eng.srt

24.8 KB

Panel Digital Contact Tracing.eng.srt

132.7 KB

Panel The 2020 Election Remote Voting, Disinformation, and Audit.eng.srt

127.6 KB

ParmeSan Sanitizer-guided Greybox Fuzzing.eng.srt

25.3 KB

PARTEMU Enabling Dynamic Analysis of Real-World TrustZone Software.eng.json

436.1 KB

PARTEMU Enabling Dynamic Analysis of Real-World TrustZone Software.eng.lrc

11.5 KB

PARTEMU Enabling Dynamic Analysis of Real-World TrustZone Software.eng.srt

12.1 KB

PARTEMU Enabling Dynamic Analysis of Real-World TrustZone Software.eng.text

8.9 KB

PARTEMU Enabling Dynamic Analysis of Real-World TrustZone Software.eng.tsv

10.3 KB

PARTEMU Enabling Dynamic Analysis of Real-World TrustZone Software.eng.txt

11.6 KB

PARTEMU Enabling Dynamic Analysis of Real-World TrustZone Software.eng.vtt

11.2 KB

PCKV Locally Differentially Private Correlated Key-Value Data Collection.eng.json

396.8 KB

PCKV Locally Differentially Private Correlated Key-Value Data Collection.eng.lrc

10.9 KB

PCKV Locally Differentially Private Correlated Key-Value Data Collection.eng.srt

11.6 KB

PCKV Locally Differentially Private Correlated Key-Value Data Collection.eng.text

8.2 KB

PCKV Locally Differentially Private Correlated Key-Value Data Collection.eng.tsv

9.6 KB

PCKV Locally Differentially Private Correlated Key-Value Data Collection.eng.txt

11.0 KB

PCKV Locally Differentially Private Correlated Key-Value Data Collection.eng.vtt

10.7 KB

PhishTime Continuous Longitudinal Measurement of the Effectiveness.eng.srt

27.2 KB

PHMon A Programmable Hardware Monitor and Its Security Use Cases.eng.srt

22.5 KB

Pixel Multi-signatures for Consensus.eng.srt

21.8 KB

PKU Pitfalls Attacks on PKU-based Memory Isolation Systems.eng.json

431.1 KB

PKU Pitfalls Attacks on PKU-based Memory Isolation Systems.eng.lrc

11.6 KB

PKU Pitfalls Attacks on PKU-based Memory Isolation Systems.eng.srt

11.6 KB

PKU Pitfalls Attacks on PKU-based Memory Isolation Systems.eng.text

9.1 KB

PKU Pitfalls Attacks on PKU-based Memory Isolation Systems.eng.tsv

10.4 KB

PKU Pitfalls Attacks on PKU-based Memory Isolation Systems.eng.txt

11.7 KB

PKU Pitfalls Attacks on PKU-based Memory Isolation Systems.eng.vtt

10.9 KB

Plug-N-Pwned Comprehensive Vulnerability Analysis of OBD-II Dongles.eng.json

513.8 KB

Plug-N-Pwned Comprehensive Vulnerability Analysis of OBD-II Dongles.eng.lrc

15.9 KB

Plug-N-Pwned Comprehensive Vulnerability Analysis of OBD-II Dongles.eng.srt

13.2 KB

Plug-N-Pwned Comprehensive Vulnerability Analysis of OBD-II Dongles.eng.text

9.8 KB

Plug-N-Pwned Comprehensive Vulnerability Analysis of OBD-II Dongles.eng.tsv

13.0 KB

Plug-N-Pwned Comprehensive Vulnerability Analysis of OBD-II Dongles.eng.txt

16.1 KB

Plug-N-Pwned Comprehensive Vulnerability Analysis of OBD-II Dongles.eng.vtt

12.3 KB

Poison Over Troubled Forwarders A Cache Poisoning Attack Targeting DNS.eng.srt

17.6 KB

Preech A System for Privacy-Preserving Speech Transcription.eng.json

489.2 KB

Preech A System for Privacy-Preserving Speech Transcription.eng.lrc

13.6 KB

Preech A System for Privacy-Preserving Speech Transcription.eng.srt

14.5 KB

Preech A System for Privacy-Preserving Speech Transcription.eng.text

10.5 KB

Preech A System for Privacy-Preserving Speech Transcription.eng.tsv

12.1 KB

Preech A System for Privacy-Preserving Speech Transcription.eng.txt

13.7 KB

Preech A System for Privacy-Preserving Speech Transcription.eng.vtt

13.4 KB

Programmable In-Network Security for Context-aware BYOD Policies.eng.json

451.5 KB

Programmable In-Network Security for Context-aware BYOD Policies.eng.lrc

12.2 KB

Programmable In-Network Security for Context-aware BYOD Policies.eng.srt

13.2 KB

Programmable In-Network Security for Context-aware BYOD Policies.eng.text

9.5 KB

Programmable In-Network Security for Context-aware BYOD Policies.eng.tsv

10.9 KB

Programmable In-Network Security for Context-aware BYOD Policies.eng.txt

12.3 KB

Programmable In-Network Security for Context-aware BYOD Policies.eng.vtt

12.2 KB

RELOADREFRESH Abusing Cache Replacement Policies to Perform Stealthy Cache.eng.json

470.2 KB

RELOADREFRESH Abusing Cache Replacement Policies to Perform Stealthy Cache.eng.lrc

13.7 KB

RELOADREFRESH Abusing Cache Replacement Policies to Perform Stealthy Cache.eng.srt

11.3 KB

RELOADREFRESH Abusing Cache Replacement Policies to Perform Stealthy Cache.eng.text

8.4 KB

RELOADREFRESH Abusing Cache Replacement Policies to Perform Stealthy Cache.eng.tsv

11.2 KB

RELOADREFRESH Abusing Cache Replacement Policies to Perform Stealthy Cache.eng.txt

13.9 KB

RELOADREFRESH Abusing Cache Replacement Policies to Perform Stealthy Cache.eng.vtt

10.5 KB

Remote Side-Channel Attacks on Anonymous Transactions.eng.json

497.0 KB

Remote Side-Channel Attacks on Anonymous Transactions.eng.lrc

13.2 KB

Remote Side-Channel Attacks on Anonymous Transactions.eng.srt

13.1 KB

Remote Side-Channel Attacks on Anonymous Transactions.eng.text

10.3 KB

Remote Side-Channel Attacks on Anonymous Transactions.eng.tsv

11.9 KB

Remote Side-Channel Attacks on Anonymous Transactions.eng.txt

13.3 KB

Remote Side-Channel Attacks on Anonymous Transactions.eng.vtt

12.3 KB

Retrofitting Fine Grain Isolation in the Firefox Renderer.eng.srt

21.4 KB

SANNS Scaling Up Secure Approximate k-Nearest Neighbors Search.eng.srt

23.7 KB

SAVIOR Securing Autonomous Vehicles with Robust Physical Invariants.eng.srt

24.5 KB

Scaling Verifiable Computation Using Efficient Set Accumulators.eng.srt

27.6 KB

SEAL Attack Mitigation for Encrypted Databases via Adjustable Leakage.eng.json

495.4 KB

SEAL Attack Mitigation for Encrypted Databases via Adjustable Leakage.eng.lrc

12.9 KB

SEAL Attack Mitigation for Encrypted Databases via Adjustable Leakage.eng.srt

13.1 KB

SEAL Attack Mitigation for Encrypted Databases via Adjustable Leakage.eng.text

10.0 KB

SEAL Attack Mitigation for Encrypted Databases via Adjustable Leakage.eng.tsv

11.5 KB

SEAL Attack Mitigation for Encrypted Databases via Adjustable Leakage.eng.txt

13.0 KB

SEAL Attack Mitigation for Encrypted Databases via Adjustable Leakage.eng.vtt

12.3 KB

Secure Multi-party Computation of Differentially Private Median.eng.json

554.1 KB

Secure Multi-party Computation of Differentially Private Median.eng.lrc

15.6 KB

Secure Multi-party Computation of Differentially Private Median.eng.srt

15.2 KB

Secure Multi-party Computation of Differentially Private Median.eng.text

10.9 KB

Secure Multi-party Computation of Differentially Private Median.eng.tsv

13.4 KB

Secure Multi-party Computation of Differentially Private Median.eng.txt

15.8 KB

Secure Multi-party Computation of Differentially Private Median.eng.vtt

14.0 KB

Secure parallel computation on national scale volumes of data.eng.json

497.0 KB

Secure parallel computation on national scale volumes of data.eng.lrc

14.3 KB

Secure parallel computation on national scale volumes of data.eng.srt

13.0 KB

Secure parallel computation on national scale volumes of data.eng.text

10.1 KB

Secure parallel computation on national scale volumes of data.eng.tsv

12.3 KB

Secure parallel computation on national scale volumes of data.eng.txt

14.5 KB

Secure parallel computation on national scale volumes of data.eng.vtt

12.2 KB

Security Analysis of Unified Payments Interface and Payment Apps in India.eng.json

571.4 KB

Security Analysis of Unified Payments Interface and Payment Apps in India.eng.lrc

15.1 KB

Security Analysis of Unified Payments Interface and Payment Apps in India.eng.srt

16.1 KB

Security Analysis of Unified Payments Interface and Payment Apps in India.eng.text

11.8 KB

Security Analysis of Unified Payments Interface and Payment Apps in India.eng.tsv

13.6 KB

Security Analysis of Unified Payments Interface and Payment Apps in India.eng.txt

15.3 KB

Security Analysis of Unified Payments Interface and Payment Apps in India.eng.vtt

15.0 KB

See No Evil Phishing for Permissions with False Transparency.eng.json

612.3 KB

See No Evil Phishing for Permissions with False Transparency.eng.lrc

17.0 KB

See No Evil Phishing for Permissions with False Transparency.eng.srt

16.5 KB

See No Evil Phishing for Permissions with False Transparency.eng.text

12.2 KB

See No Evil Phishing for Permissions with False Transparency.eng.tsv

14.7 KB

See No Evil Phishing for Permissions with False Transparency.eng.txt

17.2 KB

See No Evil Phishing for Permissions with False Transparency.eng.vtt

15.3 KB

SENG, the SGX-Enforcing Network Gateway Authorizing Communication.eng.srt

23.7 KB

SHA-1 is a Shambles First Chosen-Prefix Collision on SHA-1 and Application.eng.json

595.9 KB

SHA-1 is a Shambles First Chosen-Prefix Collision on SHA-1 and Application.eng.lrc

14.9 KB

SHA-1 is a Shambles First Chosen-Prefix Collision on SHA-1 and Application.eng.srt

16.2 KB

SHA-1 is a Shambles First Chosen-Prefix Collision on SHA-1 and Application.eng.text

11.6 KB

SHA-1 is a Shambles First Chosen-Prefix Collision on SHA-1 and Application.eng.tsv

13.4 KB

SHA-1 is a Shambles First Chosen-Prefix Collision on SHA-1 and Application.eng.txt

15.0 KB

SHA-1 is a Shambles First Chosen-Prefix Collision on SHA-1 and Application.eng.vtt

15.0 KB

ShadowMove A Stealthy Lateral Movement Strategy.eng.srt

21.2 KB

Shattered Chain of Trust Understanding Security Risks in Cross-Cloud IoT.eng.srt

22.1 KB

Silhouette Efficient Protected Shadow Stacks for Embedded Systems.eng.srt

23.2 KB

SkillExplorer Understanding the Behavior of Skills in Large Scale.eng.json

491.1 KB

SkillExplorer Understanding the Behavior of Skills in Large Scale.eng.lrc

13.5 KB

SkillExplorer Understanding the Behavior of Skills in Large Scale.eng.srt

13.9 KB

SkillExplorer Understanding the Behavior of Skills in Large Scale.eng.text

9.4 KB

SkillExplorer Understanding the Behavior of Skills in Large Scale.eng.tsv

11.6 KB

SkillExplorer Understanding the Behavior of Skills in Large Scale.eng.txt

13.7 KB

SkillExplorer Understanding the Behavior of Skills in Large Scale.eng.vtt

12.7 KB

SmartVerif Push the Limit of Automation Capability of Verifying Security.eng.srt

21.2 KB

SpecFuzz Bringing Spectre-type vulnerabilities to the surface.eng.srt

22.4 KB

Stealthy Tracking of Autonomous Vehicles with Cache Side Channels.eng.json

419.0 KB

Stealthy Tracking of Autonomous Vehicles with Cache Side Channels.eng.lrc

11.2 KB

Stealthy Tracking of Autonomous Vehicles with Cache Side Channels.eng.srt

11.7 KB

Stealthy Tracking of Autonomous Vehicles with Cache Side Channels.eng.text

8.4 KB

Stealthy Tracking of Autonomous Vehicles with Cache Side Channels.eng.tsv

9.9 KB

Stealthy Tracking of Autonomous Vehicles with Cache Side Channels.eng.txt

11.3 KB

Stealthy Tracking of Autonomous Vehicles with Cache Side Channels.eng.vtt

10.8 KB

Stolen Memories Leveraging Model Memorization for Calibrated White-Box.eng.srt

29.6 KB

Sunrise to Sunset Analyzing the End-to-end Life Cycle and Effectiveness.eng.srt

25.8 KB

Symbolic execution with SymCC don't interpret, compile.eng.srt

19.8 KB

Sys A Static Symbolic Tool for Finding Good Bugs in Good (Browser) Code.eng.srt

23.8 KB

TeeRex Discovery and Exploitation of Memory Corruption Vulnerabilities.eng.json

447.0 KB

TeeRex Discovery and Exploitation of Memory Corruption Vulnerabilities.eng.lrc

11.9 KB

TeeRex Discovery and Exploitation of Memory Corruption Vulnerabilities.eng.srt

12.8 KB

TeeRex Discovery and Exploitation of Memory Corruption Vulnerabilities.eng.text

9.3 KB

TeeRex Discovery and Exploitation of Memory Corruption Vulnerabilities.eng.tsv

10.7 KB

TeeRex Discovery and Exploitation of Memory Corruption Vulnerabilities.eng.txt

12.0 KB

TeeRex Discovery and Exploitation of Memory Corruption Vulnerabilities.eng.vtt

11.9 KB

Temporal System Call Specialization for Attack Surface Reduction.eng.srt

22.4 KB

TextShield Robust Text Classification Based on Multimodal Embedding.eng.json

397.2 KB

TextShield Robust Text Classification Based on Multimodal Embedding.eng.lrc

11.0 KB

TextShield Robust Text Classification Based on Multimodal Embedding.eng.srt

11.5 KB

TextShield Robust Text Classification Based on Multimodal Embedding.eng.text

9.1 KB

TextShield Robust Text Classification Based on Multimodal Embedding.eng.tsv

10.1 KB

TextShield Robust Text Classification Based on Multimodal Embedding.eng.txt

11.1 KB

TextShield Robust Text Classification Based on Multimodal Embedding.eng.vtt

10.9 KB

That Was Then, This Is Now A Security Evaluation of Password Generation.eng.srt

21.4 KB

The Ballot is Busted Before the Blockchain A Security Analysis of Voatz.eng.srt

26.2 KB

The Impact of Ad-Blockers on Product Search and Purchase Behavior.eng.srt

27.3 KB

The Industrial Age of Hacking.eng.srt

24.9 KB

The Tools and Tactics Used in Intimate Partner Surveillance An Analysis.eng.json

657.0 KB

The Tools and Tactics Used in Intimate Partner Surveillance An Analysis.eng.lrc

18.9 KB

The Tools and Tactics Used in Intimate Partner Surveillance An Analysis.eng.srt

17.5 KB

The Tools and Tactics Used in Intimate Partner Surveillance An Analysis.eng.text

13.5 KB

The Tools and Tactics Used in Intimate Partner Surveillance An Analysis.eng.tsv

16.4 KB

The Tools and Tactics Used in Intimate Partner Surveillance An Analysis.eng.txt

19.1 KB

The Tools and Tactics Used in Intimate Partner Surveillance An Analysis.eng.vtt

16.4 KB

The Unpatchable Silicon A Full Break of the Bitstream Encryption of Xilinx.eng.srt

21.1 KB

Timeless Timing Attacks Exploiting Concurrency to Leak Secrets over Remote.eng.json

367.4 KB

Timeless Timing Attacks Exploiting Concurrency to Leak Secrets over Remote.eng.lrc

9.6 KB

Timeless Timing Attacks Exploiting Concurrency to Leak Secrets over Remote.eng.srt

9.9 KB

Timeless Timing Attacks Exploiting Concurrency to Leak Secrets over Remote.eng.text

7.4 KB

Timeless Timing Attacks Exploiting Concurrency to Leak Secrets over Remote.eng.tsv

8.6 KB

Timeless Timing Attacks Exploiting Concurrency to Leak Secrets over Remote.eng.txt

9.7 KB

Timeless Timing Attacks Exploiting Concurrency to Leak Secrets over Remote.eng.vtt

9.2 KB

Towards HTTPS Everywhere on Android We Are Not There Yet.eng.srt

29.5 KB

Towards Robust LiDAR-based Perception in Autonomous Driving General Black-box.eng.json

653.2 KB

Towards Robust LiDAR-based Perception in Autonomous Driving General Black-box.eng.lrc

17.8 KB

Towards Robust LiDAR-based Perception in Autonomous Driving General Black-box.eng.srt

18.0 KB

Towards Robust LiDAR-based Perception in Autonomous Driving General Black-box.eng.text

14.0 KB

Towards Robust LiDAR-based Perception in Autonomous Driving General Black-box.eng.tsv

16.0 KB

Towards Robust LiDAR-based Perception in Autonomous Driving General Black-box.eng.txt

18.0 KB

Towards Robust LiDAR-based Perception in Autonomous Driving General Black-box.eng.vtt

16.9 KB

TPM-FAIL TPM meets Timing and Lattice Attacks.eng.json

561.9 KB

TPM-FAIL TPM meets Timing and Lattice Attacks.eng.lrc

14.7 KB

TPM-FAIL TPM meets Timing and Lattice Attacks.eng.srt

14.5 KB

TPM-FAIL TPM meets Timing and Lattice Attacks.eng.text

11.5 KB

TPM-FAIL TPM meets Timing and Lattice Attacks.eng.tsv

13.2 KB

TPM-FAIL TPM meets Timing and Lattice Attacks.eng.txt

14.8 KB

TPM-FAIL TPM meets Timing and Lattice Attacks.eng.vtt

13.7 KB

TXSPECTOR Uncovering Attacks in Ethereum from Transactions.eng.json

438.1 KB

TXSPECTOR Uncovering Attacks in Ethereum from Transactions.eng.lrc

13.1 KB

TXSPECTOR Uncovering Attacks in Ethereum from Transactions.eng.srt

11.5 KB

TXSPECTOR Uncovering Attacks in Ethereum from Transactions.eng.text

7.9 KB

TXSPECTOR Uncovering Attacks in Ethereum from Transactions.eng.tsv

10.7 KB

TXSPECTOR Uncovering Attacks in Ethereum from Transactions.eng.txt

13.3 KB

TXSPECTOR Uncovering Attacks in Ethereum from Transactions.eng.vtt

10.5 KB

Understanding security mistakes developers make Qualitative analysis.eng.srt

26.1 KB

Updates-Leak Data Set Inference and Reconstruction Attacks in Online Learning.eng.json

605.8 KB

Updates-Leak Data Set Inference and Reconstruction Attacks in Online Learning.eng.lrc

15.1 KB

Updates-Leak Data Set Inference and Reconstruction Attacks in Online Learning.eng.srt

16.0 KB

Updates-Leak Data Set Inference and Reconstruction Attacks in Online Learning.eng.text

11.8 KB

Updates-Leak Data Set Inference and Reconstruction Attacks in Online Learning.eng.tsv

13.6 KB

Updates-Leak Data Set Inference and Reconstruction Attacks in Online Learning.eng.txt

15.3 KB

Updates-Leak Data Set Inference and Reconstruction Attacks in Online Learning.eng.vtt

14.9 KB

USBFuzz A Framework for Fuzzing USB Drivers by Device Emulation.eng.srt

17.8 KB

V0LTpwn Attacking x86 Processor Integrity from Software.eng.json

454.2 KB

V0LTpwn Attacking x86 Processor Integrity from Software.eng.lrc

12.6 KB

V0LTpwn Attacking x86 Processor Integrity from Software.eng.srt

12.1 KB

V0LTpwn Attacking x86 Processor Integrity from Software.eng.text

9.4 KB

V0LTpwn Attacking x86 Processor Integrity from Software.eng.tsv

11.1 KB

V0LTpwn Attacking x86 Processor Integrity from Software.eng.txt

12.7 KB

V0LTpwn Attacking x86 Processor Integrity from Software.eng.vtt

11.3 KB

Visor Privacy-Preserving Video Analytics as a Cloud Service.eng.srt

25.9 KB

Void A fast and light voice liveness detection system.eng.srt

21.4 KB

VoteAgain A scalable coercion-resistant voting system.eng.srt

25.3 KB

Walking Onions Scaling Anonymity Networks while Protecting Users.eng.srt

23.6 KB

What Twitter Knows Characterizing Ad Targeting Practices, User Perceptions.eng.srt

25.3 KB

who's Calling Characterizing Robocalls through Audio and Metadata Analysis.eng.srt

21.7 KB

You Are What You Broadcast Identification of Mobile and IoT Devices.eng.srt

18.0 KB

Zero-delay Lightweight Defenses against Website Fingerprinting.eng.srt

18.0 KB

/USENIX Security 2021/

A Highly Accurate Query-Recovery Attack against Searchable Encryption.mp4

11.6 MB

A Large Scale Study of User Behavior, Expectations and Engagement with.mp4

9.1 MB

A Large-Scale Interview Study on Information Security in and Attacks.mp4

9.4 MB

A Side Journey To Titan.mp4

8.6 MB

A Stealthy Location Identification Attack Exploiting Carrier Aggregation.mp4

8.4 MB

A11y and Privacy don't have to be mutually exclusive Constraining.mp4

9.3 MB

Abusing Hidden Properties to Attack the Node.js Ecosystem.mp4

9.6 MB

ABY2.0 Improved Mixed-Protocol Secure Two-Party Computation.mp4

10.7 MB

Accurately Measuring Global Risk of Amplification Attacks using AmpMap.mp4

9.3 MB

Acoustics to the Rescue Physical Key Inference Attack Revisited.mp4

8.8 MB

Adapting Security Warnings to Counter Online Disinformation.mp4

13.9 MB

AdCube WebVR Ad Fraud and Practical Confinement of Third-Party Ads.mp4

9.7 MB

Adversarial Policy Training against Deep Reinforcement Learning.mp4

10.1 MB

ALPACA Application Layer Protocol Confusion - Analyzing and Mitigating Cracks.mp4

8.3 MB

An Analysis of Speculative Type Confusion Vulnerabilities in the Wild.mp4

8.5 MB

An Investigation of the Android Kernel Patch Ecosystem.mp4

9.4 MB

Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing.mp4

7.9 MB

APICraft Fuzz Driver Generation for Closed-source SDK Libraries.mp4

9.6 MB

ARCUS Symbolic Root Cause Analysis of Exploits in Production Systems.mp4

7.8 MB

Are Privacy Dashboards Good for End Users Evaluating User Perceptions.mp4

14.2 MB

Assessing Browser-level Defense against IDN-based Phishing.mp4

11.2 MB

ATLAS A Sequence-based Learning Approach for Attack Investigation.mp4

11.5 MB

Automated Discovery of Denial-of-Service Vulnerabilities in Connected Vehicle.mp4

11.4 MB

Automatic Extraction of Secrets from the Transistor Jungle using.mp4

14.4 MB

Automatic Firmware Emulation through Invalidity-guided Knowledge Inference.mp4

15.0 MB

Automatic Policy Generation for Inter-Service Access Control of Microservices.mp4

11.6 MB

Balboa Bobbing and Weaving around Network Censorship.mp4

8.8 MB

Blind Backdoors in Deep Learning Models.mp4

11.8 MB

Blind In On-Path Attacks and Applications to VPNs.mp4

7.0 MB

Blinder Partition-Oblivious Hierarchical Scheduling.mp4

10.3 MB

Blitz Secure Multi-Hop Payments Without Two-Phase Commits.mp4

9.0 MB

Breaking Through Binaries Compiler-quality Instrumentation for Better.mp4

9.4 MB

CACTI Captcha Avoidance via Client-side TEE Integration.mp4

9.0 MB

CADE Detecting and Explaining Concept Drift Samples for Security Applications.mp4

8.9 MB

Can I Take Your Subdomain Exploring Same-Site Attacks in the Modern Web.mp4

13.1 MB

Can Systems Explain Permissions Better Understanding Users' Misperceptions.mp4

9.1 MB

CANARY - a reactive defense mechanism for Controller Area Networks based.mp4

12.2 MB

Capture Centralized Library Management for Heterogeneous IoT Devices.mp4

7.8 MB

Card Brand Mixup Attack Bypassing the PIN in non-Visa Cards by Using Them.mp4

8.6 MB

Catching Phishers By Their Bait Investigating the Dutch Phishing Landscape.mp4

14.8 MB

Causal Analysis for Software-Defined Networking Attacks.mp4

11.5 MB

Cerebro A Platform for Multi-Party Cryptographic Collaborative Learning.mp4

8.4 MB

Charger-Surfing Exploiting a Power Line Side-Channel for Smartphone.mp4

10.1 MB

CIPHERLEAKS Breaking Constant-time Cryptography on AMD SEV via.mp4

9.9 MB

CLARION Sound and Clear Provenance Tracking for Microservice Deployments.mp4

15.2 MB

Coco Co-Design and Co-Verification of Masked Software Implementations on CPUs.mp4

9.5 MB

Collective Information Security in Large-Scale Urban Protests.mp4

11.1 MB

Communication-Computation Trade-offs in PIR.mp4

10.6 MB

Compromised or Attacker-Owned A Large Scale Classification and Study.mp4

7.3 MB

Constrain't-guided Directed Greybox Fuzzing.mp4

10.8 MB

Cost-Aware Robust Tree Ensembles for Security Applications.mp4

6.3 MB

Cross-VM and Cross-Processor Covert Channels Exploiting Processor Idle.mp4

9.6 MB

CSProp Ciphertext and Signature Propagation Low-Overhead Public-Key.mp4

13.7 MB

CURE A Security Architecture with CUstomizable and Resilient Enclaves.mp4

11.3 MB

Data Poisoning Attacks to Local Differential Privacy Protocols.mp4

9.2 MB

Database Reconstruction from Noisy Volumes A Cache Side-Channel Attack.mp4

9.8 MB

Deep Entity Classification Abusive Account Detection for Online Social.mp4

7.6 MB

Deep-Dup An Adversarial Weight Duplication Attack Framework to Crush Deep.mp4

12.9 MB

DeepReflect Discovering Malicious Functionality through Binary Reconstruction.mp4

7.9 MB

Defeating DNN-Based Traffic Analysis Systems in Real-Time With Blind.mp4

12.6 MB

DEFInit An Analysis of Exposed Android Init Routines.mp4

8.3 MB

Demon in the Variant Statistical Analysis of DNNs for Robust Backdoor.mp4

9.1 MB

Detecting Kernel Refcount Bugs with Two-Dimensional Consistency Checking.mp4

10.5 MB

DICE - A Formally Verified Implementation of DICE Measured Boot.mp4

7.9 MB

Dirty Road Can Attack Security of Deep Learning based Automated Lane.mp4

13.9 MB

Disrupting Continuity of Apple's Wireless Ecosystem Security New Tracking.mp4

9.3 MB

Does logic locking work with EDA tools.mp4

7.8 MB

DOLMA Securing Speculation with the Principle of Transient Non-Observability.mp4

8.7 MB

Domain Shadowing Leveraging Content Delivery Networks for Robust Blocking.mp4

9.1 MB

Dompteur Taming Audio Adversarial Examples.mp4

10.4 MB

Double-Cross Attacks Subverting Active Learning Systems.mp4

10.6 MB

Driving 2FA Adoption at Scale Optimizing Two-Factor Authentication.mp4

11.6 MB

DRMI A Dataset Reduction Technology based on Mutual Information for Black-box.mp4

9.3 MB

Dynamic proofs of retrievability with low server storage.mp4

10.9 MB

Effect of Mood, Location, Trust, and Presence of Others on Video-Based.mp4

9.0 MB

Effective Notification Campaigns on the Web A Matter of Trust, Framing, and.mp4

8.6 MB

ELISE A Storage Efficient Logging System Powered by Redundancy Reduction.mp4

9.7 MB

Entangled Watermarks as a Defense against Model Extraction.mp4

9.6 MB

EOSAFE Security Analysis of EOSIO Smart Contracts.mp4

13.4 MB

Evaluating In-Workflow Messages for Improving Mental Models of End-to-End.mp4

9.6 MB

Evil Under the Sun Understanding and Discovering Attacks on Ethereum.mp4

9.2 MB

EVMPatch Timely and Automated Patching of Ethereum Smart Contracts.mp4

14.6 MB

Examining the Efficacy of Decoy-based and Psychological Cyber Deception.mp4

11.7 MB

Experiences Deploying Multi-Vantage-Point Domain Validation at Let's Encrypt.mp4

11.3 MB

Explanation Beats Context The Effect of Timing & Rationales on Users'.mp4

7.3 MB

Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers.mp4

9.5 MB

Exposing New Vulnerabilities of Error Handling Mechanism in CAN.mp4

9.6 MB

ExpRace Exploiting Kernel Races through Raising Interrupts.mp4

7.9 MB

Express Lowering the Cost of Metadata-hiding Communication with Cryptographic.mp4

8.9 MB

Extracting Training Data from Large Language Models.mp4

10.8 MB

Fantastic Four Honest-Majority Four-Party Secure Computation With Malicious.mp4

10.6 MB

Finding Bugs Using Your Own Code Detecting Functionally-similar yet.mp4

10.1 MB

Fine Grained Dataflow Tracking with Proximal Gradients.mp4

7.4 MB

Fingerprinting in Style Detecting Browser Extensions via Injected Style.mp4

11.6 MB

FlowDist Multi-Staged Refinement-Based Dynamic Information Flow Analysis for.mp4

12.2 MB

Forecasting Malware Capabilities From Cyber Attack Memory Images.mp4

14.6 MB

Formally Verified Memory Protection for a Commodity Multiprocessor Hypervisor.mp4

8.6 MB

Fragment and Forge Breaking Wi-Fi Through Frame Aggregation and Fragmentation.mp4

10.2 MB

Frontal Attack Leaking Control-Flow in SGX via the CPU Frontend.mp4

11.7 MB

Frontrunner Jones and the Raiders of the Dark Forest An Empirical Study.mp4

8.1 MB

Fuzzy Labeled Private Set Intersection with Applications to Private.mp4

9.5 MB

GForce GPU-Friendly Oblivious and Rapid Neural Network Inference.mp4

9.5 MB

Graph Backdoor.mp4

10.7 MB

Having Your Cake and Eating It An Analysis of Concession-Abuse-as-a-Service.mp4

7.8 MB

HAWatcher Semantics-Aware Anomaly Detection for Appified Smart Homes.mp4

8.9 MB

Helping Users Automatically Find and Manage Sensitive, Expendable Files.mp4

9.6 MB

Hermes Attack Steal DNN Models with Lossless Inference Accuracy.mp4

8.9 MB

Hiding the Access Pattern is Not Enough Exploiting Search Pattern Leakage.mp4

11.4 MB

Hopper Modeling and Detecting Lateral Movement.mp4

9.9 MB

How Great is the Great Firewall Measuring China's DNS Censorship.mp4

10.1 MB

How to Make Private Distributed Cardinality Estimation Practical.mp4

8.2 MB

I Always Feel Like Somebody's Sensing Me A Framework to Detect, Identify, and.mp4

7.9 MB

ICSFuzz Manipulating I Os and Repurposing Binary Code to Enable Instrumented.mp4

10.6 MB

Identifying Harmful Media in End-to-End Encrypted Communication.mp4

11.0 MB

Incrementally Updateable Honey Password Vaults.mp4

7.7 MB

Inexpensive Brainwave Authentication New Techniques and Insights.mp4

10.5 MB

Injection Attacks Reloaded Tunnelling Malicious Payloads over DNS.mp4

8.8 MB

Is Real-time Phishing Eliminated with FIDO Social Engineering Downgrade.mp4

8.4 MB

It's Stored, Hopefully, on an Encrypted Server Mitigating Users.mp4

9.7 MB

It's stressful having all these phones - Investigating Sex Workers Safety.mp4

9.4 MB

It's the Company, the Government, You and I - User Perceptions of.mp4

7.5 MB

Jaqen A High-Performance Switch-Native Approach for Detecting and Mitigating.mp4

13.2 MB

JAW Studying Client-side CSRF with Hybrid Property Graphs and Declarative.mp4

8.9 MB

Jetset Targeted Firmware Rehosting for Embedded Systems.mp4

7.2 MB

Kalεido Real-Time Privacy Control for Eye-Tracking Systems.mp4

10.0 MB

KeyForge Non-Attributable Email from Forward-Forgeable Signatures.mp4

8.1 MB

Leakage of Dataset Properties in Multi-Party Machine Learning.mp4

7.1 MB

LIGHTBLUE Automatic Profile-Aware Debloating of Bluetooth Stacks.mp4

8.4 MB

Locally Differentially Private Analysis of Graph Statistics.mp4

11.3 MB

Lord of the Ring(s) Side Channel Attacks on the CPU On-Chip Ring.mp4

11.4 MB

LZR Identifying Unexpected Internet Services.mp4

9.6 MB

M2MON Building an MMIO-based Security Reference Monitor for Unmanned Vehicles.mp4

8.9 MB

MAZE Towards Automated Heap Feng Shui.mp4

11.0 MB

MBA-Blast Unveiling and Simplifying Mixed Boolean-Arithmetic Obfuscation.mp4

7.0 MB

Messy States of Wiring Vulnerabilities in Emerging Personal Payment Systems.mp4

10.9 MB

mID Tracing Screen Photos via Moiré Patterns.mp4

9.6 MB

Mind Your Weight(s) A Large-scale Study on Insufficient Machine Learning.mp4

13.9 MB

Minerva- An Efficient Risk-Limiting Ballot Polling Audit.mp4

10.5 MB

MIRAGE Mitigating Conflict-Based Cache Attacks with a Practical.mp4

10.2 MB

MPInspector A Systematic and Automatic Approach for Evaluating the Security.mp4

10.2 MB

Muse Secure Inference Resilient to Malicious Clients.mp4

8.9 MB

Mystique Efficient Conversions for Zero-Knowledge Proofs with Applications.mp4

6.5 MB

Now I'm a bit angry - Individuals' Awareness, Perception, and Responses.mp4

10.4 MB

Nyx Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types.mp4

8.5 MB

Obfuscation-Resilient Executable Payload Extraction From Packed Malware.mp4

5.5 MB

ObliCheck Efficient Verification of Oblivious Algorithms with Unobservable.mp4

10.5 MB

On the Design and Misuse of Microcoded (Embedded) Processors-A Cautionary Note.mp4

9.3 MB

On the Routing-Aware Peering against Network-Eclipse Attacks in Bitcoin.mp4

9.3 MB

On the Usability of Authenticity Checks for Hardware Security Tokens.mp4

8.3 MB

Once is Never Enough Foundations for Sound Statistical Inference in Tor.mp4

14.4 MB

Osiris Automated Discovery of Microarchitectural Side Channels.mp4

9.0 MB

PACStack an Authenticated Call Stack.mp4

11.4 MB

Partitioning Oracle Attacks.mp4

9.6 MB

PASAN Detecting Peripheral Access Concurrency Bugs within Bare-Metal.mp4

10.2 MB

'Passwords Keep Me Safe' - Understanding What Children Think about Passwords.mp4

8.7 MB

PatchGuard A Provably Robust Defense against Adversarial Patches via Small.mp4

8.6 MB

PEARL Plausibly Deniable Flash Translation Layer using WOM coding.mp4

7.6 MB

People Count Contact Tracing Apps and Public Health.mp4

32.5 MB

Phishpedia A Hybrid Deep Learning Based Approach to Visually Identify.mp4

9.2 MB

PhishPrint Evading Phishing Detection Crawlers by Prior Profiling.mp4

9.6 MB

Poisoning the Unlabeled Dataset of Semi-Supervised Learning.mp4

9.3 MB

PolyScope Multi-Policy Access Control Analysis to Compute Authorized Attack.mp4

9.9 MB

Poseidon A New Hash Function for Zero-Knowledge Proof Systems.mp4

7.6 MB

Precise and Scalable Detection of Use-after-Compacting-Garbage-Collection Bugs.mp4

9.7 MB

Pretty Good Phone Privacy.mp4

9.2 MB

Preventing Use-After-Free Attacks with Fast Forward Allocation.mp4

8.9 MB

PrimeProbe 1, JavaScript 0 Overcoming Browser-based Side-Channel Defenses.mp4

6.9 MB

PriSEC A Privacy Settings Enforcement Controller.mp4

10.2 MB

Privacy and Integrity Preserving Computations with CRISP.mp4

9.9 MB

Privacy-Preserving and Standard-Compatible AKA Protocol for 5G.mp4

10.5 MB

Private Blocklist Lookups with Checklist.mp4

8.4 MB

PrivateDrop Practical Privacy-Preserving Authentication for Apple AirDrop.mp4

9.4 MB

PrivSyn Differentially Private Data Synthesis.mp4

8.9 MB

Protecting Cryptography Against Compelled Self-Incrimination.mp4

10.6 MB

PTAuth Temporal Memory Safety via Robust Points-to Authentication.mp4

7.2 MB

Raccoon Attack Finding and Exploiting Most-Significant-Bit-Oracles.mp4

7.8 MB

Rage Against the Machine Clear A Systematic Analysis of Machine Clears.mp4

10.7 MB

ReDMArk Bypassing RDMA Security Mechanisms.mp4

10.1 MB

ReDoSHunter A Combined Static and Dynamic Approach for Regular Expression DoS.mp4

9.1 MB

Reducing Bias in Modeling Real-world Password Strength via Deep Learning.mp4

11.0 MB

Reducing HSM Reliance in Payments through Proxy Re-Encryption.mp4

8.7 MB

Reducing Test Cases with Attention Mechanism of Neural Networks.mp4

7.8 MB

Research on the Security of Visual Reasoning CAPTCHA.mp4

11.5 MB

Ripple A Programmable, Decentralized Link-Flooding Defense Against Adaptive.mp4

10.0 MB

Risky Business Investigating the Security Practices of Vendors on an Online.mp4

15.4 MB

Rollercoaster An Efficient Group-Multicast Scheme for Mix Networks.mp4

9.3 MB

SandTrap Securing JavaScript-driven Trigger-Action Platforms.mp4

10.5 MB

Saphire Sandboxing PHP Applications with Tailored System Call Allowlists.mp4

10.1 MB

Scalable Detection of Promotional Website Defacements in Black Hat SEO.mp4

10.9 MB

SEAL Storage-efficient Causality Analysis on Enterprise Logs.mp4

8.5 MB

SEApp Bringing Mandatory Access Control to Android Apps.mp4

10.2 MB

Searching Encrypted Data with Size-Locked Indexes.mp4

9.8 MB

Security Analysis of the Democracy Live Online Voting System.mp4

9.2 MB

Security Obstacles and Motivations for Small Businesses from a CISO's.mp4

13.8 MB

SelectiveTain't Efficient Data Flow Tracking With Static Binary Rewriting.mp4

9.4 MB

Senate A Maliciously-Secure MPC Platform for Collaborative Analytics.mp4

13.4 MB

SHARD Fine-Grained Kernel Specialization with Context-Aware Hardening.mp4

8.0 MB

Share First, Ask Later (or Never) Studying Violations of GDPR's Explicit.mp4

10.9 MB

Sharing More and Checking Less Leveraging Common Input Keywords to Detect.mp4

11.5 MB

Shhhbe quiet - Reducing the Unwanted Interruptions of Notification.mp4

7.8 MB

SiamHAN IPv6 Address Correlation Attacks on TLS Encrypted Traffic.mp4

11.8 MB

SIGL Securing Software Installations Through Deep Graph Learning.mp4

9.2 MB

SLAP Improving Physical Adversarial Examples with Short-Lived Adversarial.mp4

17.2 MB

Smart Contract Vulnerabilities Vulnerable Does Not Imply Exploited.mp4

13.1 MB

SmarTest Effectively Hunting Vulnerable Transaction Sequences in Smart.mp4

7.5 MB

SMASH Synchronized Many-sided Rowhammer Attacks from JavaScript.mp4

12.1 MB

SocialHEISTing Understanding Stolen Facebook Accounts.mp4

7.9 MB

Stars Can Tell A Robust Method to Defend against GPS Spoofing Attacks.mp4

9.8 MB

Static Detection of Unsafe DMA Accesses in Device Drivers.mp4

13.1 MB

Stealing Links from Graph Neural Networks.mp4

8.8 MB

Strategies and Perceived Risks of Sending Sensitive Documents.mp4

8.9 MB

SWIFT Super-fast and Robust Privacy-Preserving Machine Learning.mp4

8.9 MB

Swiped Analyzing Ground-truth Data of a Marketplace for Stolen Debit.mp4

7.4 MB

Swivel Hardening WebAssembly against Spectre.mp4

7.6 MB

Systematic Evaluation of Privacy Risks of Machine Learning Models.mp4

10.3 MB

SyzVegas Beating Kernel Fuzzing Odds with Reinforcement Learning.mp4

11.7 MB

The Circle Of Life A Large-Scale Study of The IoT Malware Lifecycle.mp4

17.0 MB

The Complexities of Healing in Secure Group Messaging Why Cross-Group Effects.mp4

8.4 MB

The Hijackers Guide To The Galaxy Off-Path Taking Over Internet Resources.mp4

9.3 MB

The Role of Computer Security Customer Support in Helping Survivors.mp4

9.6 MB

The Use of Likely Invariants as Feedback for Fuzzers.mp4

9.6 MB

T-Miner A Generative Approach to Defend Against Trojan Attacks on DNN-based.mp4

9.9 MB

Token-Level Fuzzing.mp4

6.3 MB

Too Good to Be Safe Tricking Lane Detection in Autonomous Driving with Craft.mp4

13.2 MB

Towards Formal Verification of State Continuity for Enclave Programs.mp4

9.5 MB

U Can't Debug This Detecting JavaScript Anti-Debugging Techniques in the Wild.mp4

9.5 MB

Understanding and Detecting Disordered Error Handling with Precise Function.mp4

9.3 MB

Understanding Malicious Cross-library Data Harvesting on Android.mp4

10.2 MB

Undo Workarounds for Kernel Bugs.mp4

10.0 MB

UNIFUZZ A Holistic and Pragmatic Metrics-Driven Platform for Evaluating.mp4

10.3 MB

Using Amnesia to Detect Credential Database Breaches.mp4

7.5 MB

V0Finder Discovering the Correct Origin of Publicly Reported Software.mp4

10.9 MB

Virtual Secure Platform A Five-Stage Pipeline Processor over TFHE.mp4

10.8 MB

VoltPillager Hardware-based fault injection attacks against Intel SGX Enclaves.mp4

9.2 MB

VScape Assessing and Escaping Virtual Call Protections.mp4

12.5 MB

WaveGuard Understanding and Mitigating Audio Adversarial Examples.mp4

10.5 MB

Weak Links in Authentication Chains A Large-scale Analysis of Email Sender.mp4

14.4 MB

Weaponizing Middleboxes for TCP Reflected Amplification.mp4

18.4 MB

What's in a Name Exploring CA Certificate Control.mp4

9.3 MB

When Malware Changed Its Mind An Empirical Study of Variable Program Behavior.mp4

9.4 MB

Where's Crypto Automated Identification and Classification of Proprietary.mp4

13.4 MB

Why Eve and Mallory Still Love Android Revisiting TLS (In)Security in Android.mp4

10.0 MB

Why Older Adults (Don't) Use Password Managers.mp4

8.0 MB

Why TLS is better without STARTTLS A Security Analysis of STARTTLS.mp4

7.2 MB

Why wouldn't someone think of democracy as a target.mp4

10.2 MB

YARIX Scalable YARA-based Malware Intelligence.mp4

11.7 MB

You Autocomplete Me Poisoning Vulnerabilities in Neural Code Completion.mp4

11.1 MB

/.../USENIX Security 2021 captions/

A Highly Accurate Query-Recovery Attack against Searchable Encryption.eng.json

456.8 KB

A Highly Accurate Query-Recovery Attack against Searchable Encryption.eng.lrc

12.8 KB

A Highly Accurate Query-Recovery Attack against Searchable Encryption.eng.srt

13.1 KB

A Highly Accurate Query-Recovery Attack against Searchable Encryption.eng.text

9.0 KB

A Highly Accurate Query-Recovery Attack against Searchable Encryption.eng.tsv

11.0 KB

A Highly Accurate Query-Recovery Attack against Searchable Encryption.eng.txt

13.0 KB

A Highly Accurate Query-Recovery Attack against Searchable Encryption.eng.vtt

12.0 KB

A Large Scale Study of User Behavior, Expectations and Engagement with.eng.srt

21.9 KB

A Large-Scale Interview Study on Information Security in and Attacks.eng.srt

21.7 KB

A Side Journey To Titan.eng.json

398.8 KB

A Side Journey To Titan.eng.lrc

10.4 KB

A Side Journey To Titan.eng.srt

10.5 KB

A Side Journey To Titan.eng.text

7.5 KB

A Side Journey To Titan.eng.tsv

9.0 KB

A Side Journey To Titan.eng.txt

10.5 KB

A Side Journey To Titan.eng.vtt

9.7 KB

A Stealthy Location Identification Attack Exploiting Carrier Aggregation.eng.srt

20.0 KB

A11y and Privacy don't have to be mutually exclusive Constraining.eng.json

452.7 KB

A11y and Privacy don't have to be mutually exclusive Constraining.eng.lrc

13.0 KB

A11y and Privacy don't have to be mutually exclusive Constraining.eng.srt

13.3 KB

A11y and Privacy don't have to be mutually exclusive Constraining.eng.text

10.1 KB

A11y and Privacy don't have to be mutually exclusive Constraining.eng.tsv

11.6 KB

A11y and Privacy don't have to be mutually exclusive Constraining.eng.txt

13.1 KB

A11y and Privacy don't have to be mutually exclusive Constraining.eng.vtt

12.5 KB

Abusing Hidden Properties to Attack the Node.js Ecosystem.eng.json

402.3 KB

Abusing Hidden Properties to Attack the Node.js Ecosystem.eng.lrc

11.1 KB

Abusing Hidden Properties to Attack the Node.js Ecosystem.eng.srt

11.8 KB

Abusing Hidden Properties to Attack the Node.js Ecosystem.eng.text

8.6 KB

Abusing Hidden Properties to Attack the Node.js Ecosystem.eng.tsv

9.9 KB

Abusing Hidden Properties to Attack the Node.js Ecosystem.eng.txt

11.2 KB

Abusing Hidden Properties to Attack the Node.js Ecosystem.eng.vtt

10.9 KB

ABY2.0 Improved Mixed-Protocol Secure Two-Party Computation.eng.srt

16.7 KB

Accurately Measuring Global Risk of Amplification Attacks using AmpMap.eng.json

417.3 KB

Accurately Measuring Global Risk of Amplification Attacks using AmpMap.eng.lrc

11.3 KB

Accurately Measuring Global Risk of Amplification Attacks using AmpMap.eng.srt

12.3 KB

Accurately Measuring Global Risk of Amplification Attacks using AmpMap.eng.text

8.8 KB

Accurately Measuring Global Risk of Amplification Attacks using AmpMap.eng.tsv

10.1 KB

Accurately Measuring Global Risk of Amplification Attacks using AmpMap.eng.txt

11.4 KB

Accurately Measuring Global Risk of Amplification Attacks using AmpMap.eng.vtt

11.4 KB

Acoustics to the Rescue Physical Key Inference Attack Revisited.eng.srt

25.5 KB

Adapting Security Warnings to Counter Online Disinformation.eng.json

661.7 KB

Adapting Security Warnings to Counter Online Disinformation.eng.lrc

20.3 KB

Adapting Security Warnings to Counter Online Disinformation.eng.srt

18.3 KB

Adapting Security Warnings to Counter Online Disinformation.eng.text

13.7 KB

Adapting Security Warnings to Counter Online Disinformation.eng.tsv

17.2 KB

Adapting Security Warnings to Counter Online Disinformation.eng.txt

20.5 KB

Adapting Security Warnings to Counter Online Disinformation.eng.vtt

17.0 KB

AdCube WebVR Ad Fraud and Practical Confinement of Third-Party Ads.eng.json

416.0 KB

AdCube WebVR Ad Fraud and Practical Confinement of Third-Party Ads.eng.lrc

11.5 KB

AdCube WebVR Ad Fraud and Practical Confinement of Third-Party Ads.eng.srt

11.5 KB

AdCube WebVR Ad Fraud and Practical Confinement of Third-Party Ads.eng.text

8.4 KB

AdCube WebVR Ad Fraud and Practical Confinement of Third-Party Ads.eng.tsv

10.1 KB

AdCube WebVR Ad Fraud and Practical Confinement of Third-Party Ads.eng.txt

11.7 KB

AdCube WebVR Ad Fraud and Practical Confinement of Third-Party Ads.eng.vtt

10.7 KB

Adversarial Policy Training against Deep Reinforcement Learning.eng.json

521.5 KB

Adversarial Policy Training against Deep Reinforcement Learning.eng.lrc

14.1 KB

Adversarial Policy Training against Deep Reinforcement Learning.eng.srt

15.0 KB

Adversarial Policy Training against Deep Reinforcement Learning.eng.text

11.0 KB

Adversarial Policy Training against Deep Reinforcement Learning.eng.tsv

12.6 KB

Adversarial Policy Training against Deep Reinforcement Learning.eng.txt

14.2 KB

Adversarial Policy Training against Deep Reinforcement Learning.eng.vtt

13.9 KB

ALPACA Application Layer Protocol Confusion - Analyzing and Mitigating Cracks.eng.json

503.9 KB

ALPACA Application Layer Protocol Confusion - Analyzing and Mitigating Cracks.eng.lrc

13.6 KB

ALPACA Application Layer Protocol Confusion - Analyzing and Mitigating Cracks.eng.srt

14.0 KB

ALPACA Application Layer Protocol Confusion - Analyzing and Mitigating Cracks.eng.text

10.6 KB

ALPACA Application Layer Protocol Confusion - Analyzing and Mitigating Cracks.eng.tsv

12.2 KB

ALPACA Application Layer Protocol Confusion - Analyzing and Mitigating Cracks.eng.txt

13.7 KB

ALPACA Application Layer Protocol Confusion - Analyzing and Mitigating Cracks.eng.vtt

13.1 KB

An Analysis of Speculative Type Confusion Vulnerabilities in the Wild.eng.json

553.5 KB

An Analysis of Speculative Type Confusion Vulnerabilities in the Wild.eng.lrc

15.3 KB

An Analysis of Speculative Type Confusion Vulnerabilities in the Wild.eng.srt

15.3 KB

An Analysis of Speculative Type Confusion Vulnerabilities in the Wild.eng.text

12.0 KB

An Analysis of Speculative Type Confusion Vulnerabilities in the Wild.eng.tsv

13.7 KB

An Analysis of Speculative Type Confusion Vulnerabilities in the Wild.eng.txt

15.4 KB

An Analysis of Speculative Type Confusion Vulnerabilities in the Wild.eng.vtt

14.4 KB

An Investigation of the Android Kernel Patch Ecosystem.eng.json

376.7 KB

An Investigation of the Android Kernel Patch Ecosystem.eng.lrc

10.2 KB

An Investigation of the Android Kernel Patch Ecosystem.eng.srt

10.8 KB

An Investigation of the Android Kernel Patch Ecosystem.eng.text

7.7 KB

An Investigation of the Android Kernel Patch Ecosystem.eng.tsv

9.0 KB

An Investigation of the Android Kernel Patch Ecosystem.eng.txt

10.3 KB

An Investigation of the Android Kernel Patch Ecosystem.eng.vtt

10.0 KB

Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing.eng.srt

22.0 KB

APICraft Fuzz Driver Generation for Closed-source SDK Libraries.eng.json

451.2 KB

APICraft Fuzz Driver Generation for Closed-source SDK Libraries.eng.lrc

13.7 KB

APICraft Fuzz Driver Generation for Closed-source SDK Libraries.eng.srt

11.4 KB

APICraft Fuzz Driver Generation for Closed-source SDK Libraries.eng.text

8.4 KB

APICraft Fuzz Driver Generation for Closed-source SDK Libraries.eng.tsv

11.2 KB

APICraft Fuzz Driver Generation for Closed-source SDK Libraries.eng.txt

13.9 KB

APICraft Fuzz Driver Generation for Closed-source SDK Libraries.eng.vtt

10.6 KB

ARCUS Symbolic Root Cause Analysis of Exploits in Production Systems.eng.json

479.4 KB

ARCUS Symbolic Root Cause Analysis of Exploits in Production Systems.eng.lrc

12.3 KB

ARCUS Symbolic Root Cause Analysis of Exploits in Production Systems.eng.srt

12.2 KB

ARCUS Symbolic Root Cause Analysis of Exploits in Production Systems.eng.text

9.6 KB

ARCUS Symbolic Root Cause Analysis of Exploits in Production Systems.eng.tsv

11.1 KB

ARCUS Symbolic Root Cause Analysis of Exploits in Production Systems.eng.txt

12.5 KB

ARCUS Symbolic Root Cause Analysis of Exploits in Production Systems.eng.vtt

11.5 KB

Are Privacy Dashboards Good for End Users Evaluating User Perceptions.eng.json

514.7 KB

Are Privacy Dashboards Good for End Users Evaluating User Perceptions.eng.lrc

14.2 KB

Are Privacy Dashboards Good for End Users Evaluating User Perceptions.eng.srt

14.8 KB

Are Privacy Dashboards Good for End Users Evaluating User Perceptions.eng.text

11.5 KB

Are Privacy Dashboards Good for End Users Evaluating User Perceptions.eng.tsv

13.0 KB

Are Privacy Dashboards Good for End Users Evaluating User Perceptions.eng.txt

14.3 KB

Are Privacy Dashboards Good for End Users Evaluating User Perceptions.eng.vtt

13.9 KB

Assessing Browser-level Defense against IDN-based Phishing.eng.srt

20.7 KB

ATLAS A Sequence-based Learning Approach for Attack Investigation.eng.json

515.7 KB

ATLAS A Sequence-based Learning Approach for Attack Investigation.eng.lrc

14.1 KB

ATLAS A Sequence-based Learning Approach for Attack Investigation.eng.srt

14.7 KB

ATLAS A Sequence-based Learning Approach for Attack Investigation.eng.text

11.5 KB

ATLAS A Sequence-based Learning Approach for Attack Investigation.eng.tsv

12.9 KB

ATLAS A Sequence-based Learning Approach for Attack Investigation.eng.txt

14.2 KB

ATLAS A Sequence-based Learning Approach for Attack Investigation.eng.vtt

13.8 KB

Automated Discovery of Denial-of-Service Vulnerabilities in Connected Vehicle.eng.srt

23.1 KB

Automatic Extraction of Secrets from the Transistor Jungle using.eng.json

493.4 KB

Automatic Extraction of Secrets from the Transistor Jungle using.eng.lrc

15.0 KB

Automatic Extraction of Secrets from the Transistor Jungle using.eng.srt

11.9 KB

Automatic Extraction of Secrets from the Transistor Jungle using.eng.text

9.3 KB

Automatic Extraction of Secrets from the Transistor Jungle using.eng.tsv

12.3 KB

Automatic Extraction of Secrets from the Transistor Jungle using.eng.txt

15.2 KB

Automatic Extraction of Secrets from the Transistor Jungle using.eng.vtt

11.2 KB

Automatic Firmware Emulation through Invalidity-guided Knowledge Inference.eng.json

471.0 KB

Automatic Firmware Emulation through Invalidity-guided Knowledge Inference.eng.lrc

13.0 KB

Automatic Firmware Emulation through Invalidity-guided Knowledge Inference.eng.srt

12.9 KB

Automatic Firmware Emulation through Invalidity-guided Knowledge Inference.eng.text

9.5 KB

Automatic Firmware Emulation through Invalidity-guided Knowledge Inference.eng.tsv

11.4 KB

Automatic Firmware Emulation through Invalidity-guided Knowledge Inference.eng.txt

13.1 KB

Automatic Firmware Emulation through Invalidity-guided Knowledge Inference.eng.vtt

12.0 KB

Automatic Policy Generation for Inter-Service Access Control of Microservices.eng.srt

18.1 KB

Balboa Bobbing and Weaving around Network Censorship.eng.srt

25.9 KB

Blind Backdoors in Deep Learning Models.eng.json

507.2 KB

Blind Backdoors in Deep Learning Models.eng.lrc

12.9 KB

Blind Backdoors in Deep Learning Models.eng.srt

13.5 KB

Blind Backdoors in Deep Learning Models.eng.text

10.0 KB

Blind Backdoors in Deep Learning Models.eng.tsv

11.5 KB

Blind Backdoors in Deep Learning Models.eng.txt

13.0 KB

Blind Backdoors in Deep Learning Models.eng.vtt

12.6 KB

Blind In On-Path Attacks and Applications to VPNs.eng.srt

21.3 KB

Blinder Partition-Oblivious Hierarchical Scheduling.eng.json

509.6 KB

Blinder Partition-Oblivious Hierarchical Scheduling.eng.lrc

13.6 KB

Blinder Partition-Oblivious Hierarchical Scheduling.eng.srt

14.5 KB

Blinder Partition-Oblivious Hierarchical Scheduling.eng.text

10.5 KB

Blinder Partition-Oblivious Hierarchical Scheduling.eng.tsv

12.2 KB

Blinder Partition-Oblivious Hierarchical Scheduling.eng.txt

13.8 KB

Blinder Partition-Oblivious Hierarchical Scheduling.eng.vtt

13.4 KB

Blitz Secure Multi-Hop Payments Without Two-Phase Commits.eng.json

566.2 KB

Blitz Secure Multi-Hop Payments Without Two-Phase Commits.eng.lrc

14.5 KB

Blitz Secure Multi-Hop Payments Without Two-Phase Commits.eng.srt

15.3 KB

Blitz Secure Multi-Hop Payments Without Two-Phase Commits.eng.text

11.5 KB

Blitz Secure Multi-Hop Payments Without Two-Phase Commits.eng.tsv

13.1 KB

Blitz Secure Multi-Hop Payments Without Two-Phase Commits.eng.txt

14.7 KB

Blitz Secure Multi-Hop Payments Without Two-Phase Commits.eng.vtt

14.3 KB

Breaking Through Binaries Compiler-quality Instrumentation for Better.eng.srt

29.7 KB

CACTI Captcha Avoidance via Client-side TEE Integration.eng.json

359.6 KB

CACTI Captcha Avoidance via Client-side TEE Integration.eng.lrc

9.7 KB

CACTI Captcha Avoidance via Client-side TEE Integration.eng.srt

10.3 KB

CACTI Captcha Avoidance via Client-side TEE Integration.eng.text

7.6 KB

CACTI Captcha Avoidance via Client-side TEE Integration.eng.tsv

8.7 KB

CACTI Captcha Avoidance via Client-side TEE Integration.eng.txt

9.7 KB

CACTI Captcha Avoidance via Client-side TEE Integration.eng.vtt

9.6 KB

CADE Detecting and Explaining Concept Drift Samples for Security Applications.eng.json

495.9 KB

CADE Detecting and Explaining Concept Drift Samples for Security Applications.eng.lrc

14.7 KB

CADE Detecting and Explaining Concept Drift Samples for Security Applications.eng.srt

13.0 KB

CADE Detecting and Explaining Concept Drift Samples for Security Applications.eng.text

9.0 KB

CADE Detecting and Explaining Concept Drift Samples for Security Applications.eng.tsv

12.0 KB

CADE Detecting and Explaining Concept Drift Samples for Security Applications.eng.txt

15.0 KB

CADE Detecting and Explaining Concept Drift Samples for Security Applications.eng.vtt

11.9 KB

Can I Take Your Subdomain Exploring Same-Site Attacks in the Modern Web.eng.json

479.1 KB

Can I Take Your Subdomain Exploring Same-Site Attacks in the Modern Web.eng.lrc

13.3 KB

Can I Take Your Subdomain Exploring Same-Site Attacks in the Modern Web.eng.srt

13.2 KB

Can I Take Your Subdomain Exploring Same-Site Attacks in the Modern Web.eng.text

10.3 KB

Can I Take Your Subdomain Exploring Same-Site Attacks in the Modern Web.eng.tsv

11.9 KB

Can I Take Your Subdomain Exploring Same-Site Attacks in the Modern Web.eng.txt

13.4 KB

Can I Take Your Subdomain Exploring Same-Site Attacks in the Modern Web.eng.vtt

12.4 KB

Can Systems Explain Permissions Better Understanding Users' Misperceptions.eng.json

496.6 KB

Can Systems Explain Permissions Better Understanding Users' Misperceptions.eng.lrc

13.4 KB

Can Systems Explain Permissions Better Understanding Users' Misperceptions.eng.srt

14.3 KB

Can Systems Explain Permissions Better Understanding Users' Misperceptions.eng.text

10.4 KB

Can Systems Explain Permissions Better Understanding Users' Misperceptions.eng.tsv

12.0 KB

Can Systems Explain Permissions Better Understanding Users' Misperceptions.eng.txt

13.5 KB

Can Systems Explain Permissions Better Understanding Users' Misperceptions.eng.vtt

13.2 KB

CANARY - a reactive defense mechanism for Controller Area Networks based.eng.srt

24.5 KB

Capture Centralized Library Management for Heterogeneous IoT Devices.eng.srt

21.6 KB

Card Brand Mixup Attack Bypassing the PIN in non-Visa Cards by Using Them.eng.json

421.9 KB

Card Brand Mixup Attack Bypassing the PIN in non-Visa Cards by Using Them.eng.lrc

11.2 KB

Card Brand Mixup Attack Bypassing the PIN in non-Visa Cards by Using Them.eng.srt

11.7 KB

Card Brand Mixup Attack Bypassing the PIN in non-Visa Cards by Using Them.eng.text

8.5 KB

Card Brand Mixup Attack Bypassing the PIN in non-Visa Cards by Using Them.eng.tsv

9.9 KB

Card Brand Mixup Attack Bypassing the PIN in non-Visa Cards by Using Them.eng.txt

11.3 KB

Card Brand Mixup Attack Bypassing the PIN in non-Visa Cards by Using Them.eng.vtt

10.8 KB

Catching Phishers By Their Bait Investigating the Dutch Phishing Landscape.eng.json

558.2 KB

Catching Phishers By Their Bait Investigating the Dutch Phishing Landscape.eng.lrc

15.1 KB

Catching Phishers By Their Bait Investigating the Dutch Phishing Landscape.eng.srt

15.3 KB

Catching Phishers By Their Bait Investigating the Dutch Phishing Landscape.eng.text

11.8 KB

Catching Phishers By Their Bait Investigating the Dutch Phishing Landscape.eng.tsv

13.6 KB

Catching Phishers By Their Bait Investigating the Dutch Phishing Landscape.eng.txt

15.2 KB

Catching Phishers By Their Bait Investigating the Dutch Phishing Landscape.eng.vtt

14.4 KB

Causal Analysis for Software-Defined Networking Attacks.eng.srt

26.1 KB

Cerebro A Platform for Multi-Party Cryptographic Collaborative Learning.eng.json

560.1 KB

Cerebro A Platform for Multi-Party Cryptographic Collaborative Learning.eng.lrc

15.4 KB

Cerebro A Platform for Multi-Party Cryptographic Collaborative Learning.eng.srt

15.5 KB

Cerebro A Platform for Multi-Party Cryptographic Collaborative Learning.eng.text

12.0 KB

Cerebro A Platform for Multi-Party Cryptographic Collaborative Learning.eng.tsv

13.8 KB

Cerebro A Platform for Multi-Party Cryptographic Collaborative Learning.eng.txt

15.5 KB

Cerebro A Platform for Multi-Party Cryptographic Collaborative Learning.eng.vtt

14.5 KB

Charger-Surfing Exploiting a Power Line Side-Channel for Smartphone.eng.srt

23.4 KB

CIPHERLEAKS Breaking Constant-time Cryptography on AMD SEV via.eng.json

498.1 KB

CIPHERLEAKS Breaking Constant-time Cryptography on AMD SEV via.eng.lrc

12.9 KB

CIPHERLEAKS Breaking Constant-time Cryptography on AMD SEV via.eng.srt

14.2 KB

CIPHERLEAKS Breaking Constant-time Cryptography on AMD SEV via.eng.text

10.1 KB

CIPHERLEAKS Breaking Constant-time Cryptography on AMD SEV via.eng.tsv

11.6 KB

CIPHERLEAKS Breaking Constant-time Cryptography on AMD SEV via.eng.txt

13.0 KB

CIPHERLEAKS Breaking Constant-time Cryptography on AMD SEV via.eng.vtt

13.1 KB

CLARION Sound and Clear Provenance Tracking for Microservice Deployments.eng.srt

19.8 KB

Coco Co-Design and Co-Verification of Masked Software Implementations on CPUs.eng.srt

18.7 KB

Collective Information Security in Large-Scale Urban Protests.eng.srt

22.8 KB

Communication-Computation Trade-offs in PIR.eng.srt

30.7 KB

Compromised or Attacker-Owned A Large Scale Classification and Study.eng.json

485.2 KB

Compromised or Attacker-Owned A Large Scale Classification and Study.eng.lrc

12.9 KB

Compromised or Attacker-Owned A Large Scale Classification and Study.eng.srt

13.6 KB

Compromised or Attacker-Owned A Large Scale Classification and Study.eng.text

10.1 KB

Compromised or Attacker-Owned A Large Scale Classification and Study.eng.tsv

11.6 KB

Compromised or Attacker-Owned A Large Scale Classification and Study.eng.txt

13.0 KB

Compromised or Attacker-Owned A Large Scale Classification and Study.eng.vtt

12.7 KB

Constrain't-guided Directed Greybox Fuzzing.eng.json

411.2 KB

Constrain't-guided Directed Greybox Fuzzing.eng.lrc

10.5 KB

Constrain't-guided Directed Greybox Fuzzing.eng.srt

11.4 KB

Constrain't-guided Directed Greybox Fuzzing.eng.text

8.6 KB

Constrain't-guided Directed Greybox Fuzzing.eng.tsv

9.6 KB

Constrain't-guided Directed Greybox Fuzzing.eng.txt

10.6 KB

Constrain't-guided Directed Greybox Fuzzing.eng.vtt

10.7 KB

Cost-Aware Robust Tree Ensembles for Security Applications.eng.json

449.4 KB

Cost-Aware Robust Tree Ensembles for Security Applications.eng.lrc

12.2 KB

Cost-Aware Robust Tree Ensembles for Security Applications.eng.srt

11.9 KB

Cost-Aware Robust Tree Ensembles for Security Applications.eng.text

9.1 KB

Cost-Aware Robust Tree Ensembles for Security Applications.eng.tsv

10.7 KB

Cost-Aware Robust Tree Ensembles for Security Applications.eng.txt

12.3 KB

Cost-Aware Robust Tree Ensembles for Security Applications.eng.vtt

11.2 KB

Cross-VM and Cross-Processor Covert Channels Exploiting Processor Idle.eng.json

412.9 KB

Cross-VM and Cross-Processor Covert Channels Exploiting Processor Idle.eng.lrc

10.7 KB

Cross-VM and Cross-Processor Covert Channels Exploiting Processor Idle.eng.srt

11.6 KB

Cross-VM and Cross-Processor Covert Channels Exploiting Processor Idle.eng.text

8.2 KB

Cross-VM and Cross-Processor Covert Channels Exploiting Processor Idle.eng.tsv

9.5 KB

Cross-VM and Cross-Processor Covert Channels Exploiting Processor Idle.eng.txt

10.8 KB

Cross-VM and Cross-Processor Covert Channels Exploiting Processor Idle.eng.vtt

10.7 KB

CSProp Ciphertext and Signature Propagation Low-Overhead Public-Key.eng.json

517.3 KB

CSProp Ciphertext and Signature Propagation Low-Overhead Public-Key.eng.lrc

14.2 KB

CSProp Ciphertext and Signature Propagation Low-Overhead Public-Key.eng.srt

13.9 KB

CSProp Ciphertext and Signature Propagation Low-Overhead Public-Key.eng.text

11.0 KB

CSProp Ciphertext and Signature Propagation Low-Overhead Public-Key.eng.tsv

12.7 KB

CSProp Ciphertext and Signature Propagation Low-Overhead Public-Key.eng.txt

14.3 KB

CSProp Ciphertext and Signature Propagation Low-Overhead Public-Key.eng.vtt

13.1 KB

CURE A Security Architecture with CUstomizable and Resilient Enclaves.eng.json

516.8 KB

CURE A Security Architecture with CUstomizable and Resilient Enclaves.eng.lrc

13.5 KB

CURE A Security Architecture with CUstomizable and Resilient Enclaves.eng.srt

13.6 KB

CURE A Security Architecture with CUstomizable and Resilient Enclaves.eng.text

10.5 KB

CURE A Security Architecture with CUstomizable and Resilient Enclaves.eng.tsv

12.1 KB

CURE A Security Architecture with CUstomizable and Resilient Enclaves.eng.txt

13.6 KB

CURE A Security Architecture with CUstomizable and Resilient Enclaves.eng.vtt

12.8 KB

Data Poisoning Attacks to Local Differential Privacy Protocols.eng.srt

22.8 KB

Database Reconstruction from Noisy Volumes A Cache Side-Channel Attack.eng.json

525.7 KB

Database Reconstruction from Noisy Volumes A Cache Side-Channel Attack.eng.lrc

13.2 KB

Database Reconstruction from Noisy Volumes A Cache Side-Channel Attack.eng.srt

13.8 KB

Database Reconstruction from Noisy Volumes A Cache Side-Channel Attack.eng.text

9.3 KB

Database Reconstruction from Noisy Volumes A Cache Side-Channel Attack.eng.tsv

11.4 KB

Database Reconstruction from Noisy Volumes A Cache Side-Channel Attack.eng.txt

13.3 KB

Database Reconstruction from Noisy Volumes A Cache Side-Channel Attack.eng.vtt

12.6 KB

Deep Entity Classification Abusive Account Detection for Online Social.eng.srt

20.7 KB

Deep-Dup An Adversarial Weight Duplication Attack Framework to Crush Deep.eng.json

550.3 KB

Deep-Dup An Adversarial Weight Duplication Attack Framework to Crush Deep.eng.lrc

15.2 KB

Deep-Dup An Adversarial Weight Duplication Attack Framework to Crush Deep.eng.srt

15.8 KB

Deep-Dup An Adversarial Weight Duplication Attack Framework to Crush Deep.eng.text

11.6 KB

Deep-Dup An Adversarial Weight Duplication Attack Framework to Crush Deep.eng.tsv

13.5 KB

Deep-Dup An Adversarial Weight Duplication Attack Framework to Crush Deep.eng.txt

15.3 KB

Deep-Dup An Adversarial Weight Duplication Attack Framework to Crush Deep.eng.vtt

14.6 KB

DeepReflect Discovering Malicious Functionality through Binary Reconstruction.eng.srt

25.6 KB

Defeating DNN-Based Traffic Analysis Systems in Real-Time With Blind.eng.json

443.2 KB

Defeating DNN-Based Traffic Analysis Systems in Real-Time With Blind.eng.lrc

11.6 KB

Defeating DNN-Based Traffic Analysis Systems in Real-Time With Blind.eng.srt

11.4 KB

Defeating DNN-Based Traffic Analysis Systems in Real-Time With Blind.eng.text

9.0 KB

Defeating DNN-Based Traffic Analysis Systems in Real-Time With Blind.eng.tsv

10.4 KB

Defeating DNN-Based Traffic Analysis Systems in Real-Time With Blind.eng.txt

11.7 KB

Defeating DNN-Based Traffic Analysis Systems in Real-Time With Blind.eng.vtt

10.8 KB

DEFInit An Analysis of Exposed Android Init Routines.eng.srt

19.7 KB

Demon in the Variant Statistical Analysis of DNNs for Robust Backdoor.eng.srt

24.8 KB

Detecting Kernel Refcount Bugs with Two-Dimensional Consistency Checking.eng.json

448.4 KB

Detecting Kernel Refcount Bugs with Two-Dimensional Consistency Checking.eng.lrc

11.6 KB

Detecting Kernel Refcount Bugs with Two-Dimensional Consistency Checking.eng.srt

12.9 KB

Detecting Kernel Refcount Bugs with Two-Dimensional Consistency Checking.eng.text

8.9 KB

Detecting Kernel Refcount Bugs with Two-Dimensional Consistency Checking.eng.tsv

10.3 KB

Detecting Kernel Refcount Bugs with Two-Dimensional Consistency Checking.eng.txt

11.7 KB

Detecting Kernel Refcount Bugs with Two-Dimensional Consistency Checking.eng.vtt

11.8 KB

DICE - A Formally Verified Implementation of DICE Measured Boot.eng.json

421.2 KB

DICE - A Formally Verified Implementation of DICE Measured Boot.eng.lrc

11.3 KB

DICE - A Formally Verified Implementation of DICE Measured Boot.eng.srt

11.9 KB

DICE - A Formally Verified Implementation of DICE Measured Boot.eng.text

8.5 KB

DICE - A Formally Verified Implementation of DICE Measured Boot.eng.tsv

10.0 KB

DICE - A Formally Verified Implementation of DICE Measured Boot.eng.txt

11.4 KB

DICE - A Formally Verified Implementation of DICE Measured Boot.eng.vtt

11.0 KB

Dirty Road Can Attack Security of Deep Learning based Automated Lane.eng.srt

20.2 KB

Disrupting Continuity of Apple's Wireless Ecosystem Security New Tracking.eng.srt

22.3 KB

Does logic locking work with EDA tools.eng.json

358.6 KB

Does logic locking work with EDA tools.eng.lrc

9.6 KB

Does logic locking work with EDA tools.eng.srt

10.1 KB

Does logic locking work with EDA tools.eng.text

7.3 KB

Does logic locking work with EDA tools.eng.tsv

8.5 KB

Does logic locking work with EDA tools.eng.txt

9.7 KB

Does logic locking work with EDA tools.eng.vtt

9.4 KB

DOLMA Securing Speculation with the Principle of Transient Non-Observability.eng.json

562.4 KB

DOLMA Securing Speculation with the Principle of Transient Non-Observability.eng.lrc

15.0 KB

DOLMA Securing Speculation with the Principle of Transient Non-Observability.eng.srt

15.2 KB

DOLMA Securing Speculation with the Principle of Transient Non-Observability.eng.text

11.7 KB

DOLMA Securing Speculation with the Principle of Transient Non-Observability.eng.tsv

13.5 KB

DOLMA Securing Speculation with the Principle of Transient Non-Observability.eng.txt

15.1 KB

DOLMA Securing Speculation with the Principle of Transient Non-Observability.eng.vtt

14.3 KB

Domain Shadowing Leveraging Content Delivery Networks for Robust Blocking.eng.srt

23.8 KB

Dompteur Taming Audio Adversarial Examples.eng.json

404.2 KB

Dompteur Taming Audio Adversarial Examples.eng.lrc

10.8 KB

Dompteur Taming Audio Adversarial Examples.eng.srt

11.7 KB

Dompteur Taming Audio Adversarial Examples.eng.text

8.7 KB

Dompteur Taming Audio Adversarial Examples.eng.tsv

9.8 KB

Dompteur Taming Audio Adversarial Examples.eng.txt

10.8 KB

Dompteur Taming Audio Adversarial Examples.eng.vtt

10.9 KB

Double-Cross Attacks Subverting Active Learning Systems.eng.json

544.3 KB

Double-Cross Attacks Subverting Active Learning Systems.eng.lrc

15.3 KB

Double-Cross Attacks Subverting Active Learning Systems.eng.srt

16.5 KB

Double-Cross Attacks Subverting Active Learning Systems.eng.text

12.0 KB

Double-Cross Attacks Subverting Active Learning Systems.eng.tsv

13.7 KB

Double-Cross Attacks Subverting Active Learning Systems.eng.txt

15.4 KB

Double-Cross Attacks Subverting Active Learning Systems.eng.vtt

15.3 KB

Driving 2FA Adoption at Scale Optimizing Two-Factor Authentication.eng.json

537.1 KB

Driving 2FA Adoption at Scale Optimizing Two-Factor Authentication.eng.lrc

14.8 KB

Driving 2FA Adoption at Scale Optimizing Two-Factor Authentication.eng.srt

14.6 KB

Driving 2FA Adoption at Scale Optimizing Two-Factor Authentication.eng.text

11.6 KB

Driving 2FA Adoption at Scale Optimizing Two-Factor Authentication.eng.tsv

13.3 KB

Driving 2FA Adoption at Scale Optimizing Two-Factor Authentication.eng.txt

15.0 KB

Driving 2FA Adoption at Scale Optimizing Two-Factor Authentication.eng.vtt

13.8 KB

DRMI A Dataset Reduction Technology based on Mutual Information for Black-box.eng.json

456.5 KB

DRMI A Dataset Reduction Technology based on Mutual Information for Black-box.eng.lrc

13.0 KB

DRMI A Dataset Reduction Technology based on Mutual Information for Black-box.eng.srt

12.1 KB

DRMI A Dataset Reduction Technology based on Mutual Information for Black-box.eng.text

8.1 KB

DRMI A Dataset Reduction Technology based on Mutual Information for Black-box.eng.tsv

10.7 KB

DRMI A Dataset Reduction Technology based on Mutual Information for Black-box.eng.txt

13.2 KB

DRMI A Dataset Reduction Technology based on Mutual Information for Black-box.eng.vtt

11.0 KB

Dynamic proofs of retrievability with low server storage.eng.srt

23.2 KB

Effect of Mood, Location, Trust, and Presence of Others on Video-Based.eng.json

425.0 KB

Effect of Mood, Location, Trust, and Presence of Others on Video-Based.eng.lrc

11.3 KB

Effect of Mood, Location, Trust, and Presence of Others on Video-Based.eng.srt

12.7 KB

Effect of Mood, Location, Trust, and Presence of Others on Video-Based.eng.text

8.8 KB

Effect of Mood, Location, Trust, and Presence of Others on Video-Based.eng.tsv

10.2 KB

Effect of Mood, Location, Trust, and Presence of Others on Video-Based.eng.txt

11.4 KB

Effect of Mood, Location, Trust, and Presence of Others on Video-Based.eng.vtt

11.7 KB

Effective Notification Campaigns on the Web A Matter of Trust, Framing, and.eng.json

490.1 KB

Effective Notification Campaigns on the Web A Matter of Trust, Framing, and.eng.lrc

12.7 KB

Effective Notification Campaigns on the Web A Matter of Trust, Framing, and.eng.srt

12.9 KB

Effective Notification Campaigns on the Web A Matter of Trust, Framing, and.eng.text

9.9 KB

Effective Notification Campaigns on the Web A Matter of Trust, Framing, and.eng.tsv

11.4 KB

Effective Notification Campaigns on the Web A Matter of Trust, Framing, and.eng.txt

12.8 KB

Effective Notification Campaigns on the Web A Matter of Trust, Framing, and.eng.vtt

12.1 KB

ELISE A Storage Efficient Logging System Powered by Redundancy Reduction.eng.srt

20.1 KB

Entangled Watermarks as a Defense against Model Extraction.eng.json

610.9 KB

Entangled Watermarks as a Defense against Model Extraction.eng.lrc

16.2 KB

Entangled Watermarks as a Defense against Model Extraction.eng.srt

17.1 KB

Entangled Watermarks as a Defense against Model Extraction.eng.text

12.7 KB

Entangled Watermarks as a Defense against Model Extraction.eng.tsv

14.6 KB

Entangled Watermarks as a Defense against Model Extraction.eng.txt

16.4 KB

Entangled Watermarks as a Defense against Model Extraction.eng.vtt

15.9 KB

EOSAFE Security Analysis of EOSIO Smart Contracts.eng.srt

21.1 KB

Evaluating In-Workflow Messages for Improving Mental Models of End-to-End.eng.srt

24.2 KB

Evil Under the Sun Understanding and Discovering Attacks on Ethereum.eng.srt

20.0 KB

EVMPatch Timely and Automated Patching of Ethereum Smart Contracts.eng.srt

23.9 KB

Examining the Efficacy of Decoy-based and Psychological Cyber Deception.eng.json

521.9 KB

Examining the Efficacy of Decoy-based and Psychological Cyber Deception.eng.lrc

15.1 KB

Examining the Efficacy of Decoy-based and Psychological Cyber Deception.eng.srt

15.5 KB

Examining the Efficacy of Decoy-based and Psychological Cyber Deception.eng.text

11.8 KB

Examining the Efficacy of Decoy-based and Psychological Cyber Deception.eng.tsv

13.6 KB

Examining the Efficacy of Decoy-based and Psychological Cyber Deception.eng.txt

15.3 KB

Examining the Efficacy of Decoy-based and Psychological Cyber Deception.eng.vtt

14.5 KB

Experiences Deploying Multi-Vantage-Point Domain Validation at Let's Encrypt.eng.json

488.0 KB

Experiences Deploying Multi-Vantage-Point Domain Validation at Let's Encrypt.eng.lrc

13.5 KB

Experiences Deploying Multi-Vantage-Point Domain Validation at Let's Encrypt.eng.srt

13.9 KB

Experiences Deploying Multi-Vantage-Point Domain Validation at Let's Encrypt.eng.text

10.4 KB

Experiences Deploying Multi-Vantage-Point Domain Validation at Let's Encrypt.eng.tsv

12.0 KB

Experiences Deploying Multi-Vantage-Point Domain Validation at Let's Encrypt.eng.txt

13.6 KB

Experiences Deploying Multi-Vantage-Point Domain Validation at Let's Encrypt.eng.vtt

13.0 KB

Explanation Beats Context The Effect of Timing & Rationales on Users'.eng.json

436.2 KB

Explanation Beats Context The Effect of Timing & Rationales on Users'.eng.lrc

12.4 KB

Explanation Beats Context The Effect of Timing & Rationales on Users'.eng.srt

12.0 KB

Explanation Beats Context The Effect of Timing & Rationales on Users'.eng.text

9.5 KB

Explanation Beats Context The Effect of Timing & Rationales on Users'.eng.tsv

11.0 KB

Explanation Beats Context The Effect of Timing & Rationales on Users'.eng.txt

12.5 KB

Explanation Beats Context The Effect of Timing & Rationales on Users'.eng.vtt

11.4 KB

Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers.eng.srt

23.8 KB

Exposing New Vulnerabilities of Error Handling Mechanism in CAN.eng.json

538.5 KB

Exposing New Vulnerabilities of Error Handling Mechanism in CAN.eng.lrc

14.7 KB

Exposing New Vulnerabilities of Error Handling Mechanism in CAN.eng.srt

14.7 KB

Exposing New Vulnerabilities of Error Handling Mechanism in CAN.eng.text

11.5 KB

Exposing New Vulnerabilities of Error Handling Mechanism in CAN.eng.tsv

13.2 KB

Exposing New Vulnerabilities of Error Handling Mechanism in CAN.eng.txt

14.8 KB

Exposing New Vulnerabilities of Error Handling Mechanism in CAN.eng.vtt

13.8 KB

ExpRace Exploiting Kernel Races through Raising Interrupts.eng.json

328.9 KB

ExpRace Exploiting Kernel Races through Raising Interrupts.eng.lrc

8.7 KB

ExpRace Exploiting Kernel Races through Raising Interrupts.eng.srt

9.7 KB

ExpRace Exploiting Kernel Races through Raising Interrupts.eng.text

6.7 KB

ExpRace Exploiting Kernel Races through Raising Interrupts.eng.tsv

7.8 KB

ExpRace Exploiting Kernel Races through Raising Interrupts.eng.txt

8.8 KB

ExpRace Exploiting Kernel Races through Raising Interrupts.eng.vtt

8.9 KB

Express Lowering the Cost of Metadata-hiding Communication with Cryptographic.eng.json

723.5 KB

Express Lowering the Cost of Metadata-hiding Communication with Cryptographic.eng.lrc

18.8 KB

Express Lowering the Cost of Metadata-hiding Communication with Cryptographic.eng.srt

18.4 KB

Express Lowering the Cost of Metadata-hiding Communication with Cryptographic.eng.text

14.8 KB

Express Lowering the Cost of Metadata-hiding Communication with Cryptographic.eng.tsv

16.9 KB

Express Lowering the Cost of Metadata-hiding Communication with Cryptographic.eng.txt

19.0 KB

Express Lowering the Cost of Metadata-hiding Communication with Cryptographic.eng.vtt

17.4 KB

Extracting Training Data from Large Language Models.eng.json

568.1 KB

Extracting Training Data from Large Language Models.eng.lrc

14.4 KB

Extracting Training Data from Large Language Models.eng.srt

15.2 KB

Extracting Training Data from Large Language Models.eng.text

11.3 KB

Extracting Training Data from Large Language Models.eng.tsv

13.0 KB

Extracting Training Data from Large Language Models.eng.txt

14.6 KB

Extracting Training Data from Large Language Models.eng.vtt

14.2 KB

Fantastic Four Honest-Majority Four-Party Secure Computation With Malicious.eng.json

592.9 KB

Fantastic Four Honest-Majority Four-Party Secure Computation With Malicious.eng.lrc

15.0 KB

Fantastic Four Honest-Majority Four-Party Secure Computation With Malicious.eng.srt

15.4 KB

Fantastic Four Honest-Majority Four-Party Secure Computation With Malicious.eng.text

11.5 KB

Fantastic Four Honest-Majority Four-Party Secure Computation With Malicious.eng.tsv

13.3 KB

Fantastic Four Honest-Majority Four-Party Secure Computation With Malicious.eng.txt

15.1 KB

Fantastic Four Honest-Majority Four-Party Secure Computation With Malicious.eng.vtt

14.3 KB

Finding Bugs Using Your Own Code Detecting Functionally-similar yet.eng.srt

18.8 KB

Fine Grained Dataflow Tracking with Proximal Gradients.eng.json

383.0 KB

Fine Grained Dataflow Tracking with Proximal Gradients.eng.lrc

10.5 KB

Fine Grained Dataflow Tracking with Proximal Gradients.eng.srt

10.4 KB

Fine Grained Dataflow Tracking with Proximal Gradients.eng.text

8.1 KB

Fine Grained Dataflow Tracking with Proximal Gradients.eng.tsv

9.4 KB

Fine Grained Dataflow Tracking with Proximal Gradients.eng.txt

10.6 KB

Fine Grained Dataflow Tracking with Proximal Gradients.eng.vtt

9.8 KB

Fingerprinting in Style Detecting Browser Extensions via Injected Style.eng.json

504.6 KB

Fingerprinting in Style Detecting Browser Extensions via Injected Style.eng.lrc

12.9 KB

Fingerprinting in Style Detecting Browser Extensions via Injected Style.eng.srt

13.6 KB

Fingerprinting in Style Detecting Browser Extensions via Injected Style.eng.text

10.0 KB

Fingerprinting in Style Detecting Browser Extensions via Injected Style.eng.tsv

11.5 KB

Fingerprinting in Style Detecting Browser Extensions via Injected Style.eng.txt

13.0 KB

Fingerprinting in Style Detecting Browser Extensions via Injected Style.eng.vtt

12.6 KB

FlowDist Multi-Staged Refinement-Based Dynamic Information Flow Analysis for.eng.json

330.3 KB

FlowDist Multi-Staged Refinement-Based Dynamic Information Flow Analysis for.eng.lrc

9.3 KB

FlowDist Multi-Staged Refinement-Based Dynamic Information Flow Analysis for.eng.srt

10.2 KB

FlowDist Multi-Staged Refinement-Based Dynamic Information Flow Analysis for.eng.text

7.4 KB

FlowDist Multi-Staged Refinement-Based Dynamic Information Flow Analysis for.eng.tsv

8.4 KB

FlowDist Multi-Staged Refinement-Based Dynamic Information Flow Analysis for.eng.txt

9.4 KB

FlowDist Multi-Staged Refinement-Based Dynamic Information Flow Analysis for.eng.vtt

9.5 KB

Forecasting Malware Capabilities From Cyber Attack Memory Images.eng.json

369.9 KB

Forecasting Malware Capabilities From Cyber Attack Memory Images.eng.lrc

10.3 KB

Forecasting Malware Capabilities From Cyber Attack Memory Images.eng.srt

10.5 KB

Forecasting Malware Capabilities From Cyber Attack Memory Images.eng.text

8.0 KB

Forecasting Malware Capabilities From Cyber Attack Memory Images.eng.tsv

9.2 KB

Forecasting Malware Capabilities From Cyber Attack Memory Images.eng.txt

10.4 KB

Forecasting Malware Capabilities From Cyber Attack Memory Images.eng.vtt

9.9 KB

Formally Verified Memory Protection for a Commodity Multiprocessor Hypervisor.eng.srt

20.8 KB

Fragment and Forge Breaking Wi-Fi Through Frame Aggregation and Fragmentation.eng.json

550.6 KB

Fragment and Forge Breaking Wi-Fi Through Frame Aggregation and Fragmentation.eng.lrc

14.9 KB

Fragment and Forge Breaking Wi-Fi Through Frame Aggregation and Fragmentation.eng.srt

14.7 KB

Fragment and Forge Breaking Wi-Fi Through Frame Aggregation and Fragmentation.eng.text

11.4 KB

Fragment and Forge Breaking Wi-Fi Through Frame Aggregation and Fragmentation.eng.tsv

13.2 KB

Fragment and Forge Breaking Wi-Fi Through Frame Aggregation and Fragmentation.eng.txt

15.0 KB

Fragment and Forge Breaking Wi-Fi Through Frame Aggregation and Fragmentation.eng.vtt

13.8 KB

Frontal Attack Leaking Control-Flow in SGX via the CPU Frontend.eng.srt

24.8 KB

Frontrunner Jones and the Raiders of the Dark Forest An Empirical Study.eng.srt

22.3 KB

Fuzzy Labeled Private Set Intersection with Applications to Private.eng.json

460.9 KB

Fuzzy Labeled Private Set Intersection with Applications to Private.eng.lrc

14.2 KB

Fuzzy Labeled Private Set Intersection with Applications to Private.eng.srt

11.6 KB

Fuzzy Labeled Private Set Intersection with Applications to Private.eng.text

8.7 KB

Fuzzy Labeled Private Set Intersection with Applications to Private.eng.tsv

11.6 KB

Fuzzy Labeled Private Set Intersection with Applications to Private.eng.txt

14.4 KB

Fuzzy Labeled Private Set Intersection with Applications to Private.eng.vtt

10.8 KB

GForce GPU-Friendly Oblivious and Rapid Neural Network Inference.eng.json

561.2 KB

GForce GPU-Friendly Oblivious and Rapid Neural Network Inference.eng.lrc

14.3 KB

GForce GPU-Friendly Oblivious and Rapid Neural Network Inference.eng.srt

15.7 KB

GForce GPU-Friendly Oblivious and Rapid Neural Network Inference.eng.text

11.5 KB

GForce GPU-Friendly Oblivious and Rapid Neural Network Inference.eng.tsv

13.0 KB

GForce GPU-Friendly Oblivious and Rapid Neural Network Inference.eng.txt

14.5 KB

GForce GPU-Friendly Oblivious and Rapid Neural Network Inference.eng.vtt

14.5 KB

Graph Backdoor.eng.srt

21.6 KB

Having Your Cake and Eating It An Analysis of Concession-Abuse-as-a-Service.eng.json

402.7 KB

Having Your Cake and Eating It An Analysis of Concession-Abuse-as-a-Service.eng.lrc

11.1 KB

Having Your Cake and Eating It An Analysis of Concession-Abuse-as-a-Service.eng.srt

10.9 KB

Having Your Cake and Eating It An Analysis of Concession-Abuse-as-a-Service.eng.text

8.1 KB

Having Your Cake and Eating It An Analysis of Concession-Abuse-as-a-Service.eng.tsv

9.7 KB

Having Your Cake and Eating It An Analysis of Concession-Abuse-as-a-Service.eng.txt

11.2 KB

Having Your Cake and Eating It An Analysis of Concession-Abuse-as-a-Service.eng.vtt

10.2 KB

HAWatcher Semantics-Aware Anomaly Detection for Appified Smart Homes.eng.json

335.9 KB

HAWatcher Semantics-Aware Anomaly Detection for Appified Smart Homes.eng.lrc

9.1 KB

HAWatcher Semantics-Aware Anomaly Detection for Appified Smart Homes.eng.srt

9.7 KB

HAWatcher Semantics-Aware Anomaly Detection for Appified Smart Homes.eng.text

7.0 KB

HAWatcher Semantics-Aware Anomaly Detection for Appified Smart Homes.eng.tsv

8.1 KB

HAWatcher Semantics-Aware Anomaly Detection for Appified Smart Homes.eng.txt

9.2 KB

HAWatcher Semantics-Aware Anomaly Detection for Appified Smart Homes.eng.vtt

8.9 KB

Helping Users Automatically Find and Manage Sensitive, Expendable Files.eng.json

527.0 KB

Helping Users Automatically Find and Manage Sensitive, Expendable Files.eng.lrc

14.7 KB

Helping Users Automatically Find and Manage Sensitive, Expendable Files.eng.srt

15.5 KB

Helping Users Automatically Find and Manage Sensitive, Expendable Files.eng.text

11.5 KB

Helping Users Automatically Find and Manage Sensitive, Expendable Files.eng.tsv

13.2 KB

Helping Users Automatically Find and Manage Sensitive, Expendable Files.eng.txt

14.8 KB

Helping Users Automatically Find and Manage Sensitive, Expendable Files.eng.vtt

14.4 KB

Hermes Attack Steal DNN Models with Lossless Inference Accuracy.eng.json

479.1 KB

Hermes Attack Steal DNN Models with Lossless Inference Accuracy.eng.lrc

12.3 KB

Hermes Attack Steal DNN Models with Lossless Inference Accuracy.eng.srt

13.7 KB

Hermes Attack Steal DNN Models with Lossless Inference Accuracy.eng.text

9.6 KB

Hermes Attack Steal DNN Models with Lossless Inference Accuracy.eng.tsv

11.0 KB

Hermes Attack Steal DNN Models with Lossless Inference Accuracy.eng.txt

12.4 KB

Hermes Attack Steal DNN Models with Lossless Inference Accuracy.eng.vtt

12.6 KB

Hiding the Access Pattern is Not Enough Exploiting Search Pattern Leakage.eng.json

539.4 KB

Hiding the Access Pattern is Not Enough Exploiting Search Pattern Leakage.eng.lrc

14.8 KB

Hiding the Access Pattern is Not Enough Exploiting Search Pattern Leakage.eng.srt

15.2 KB

Hiding the Access Pattern is Not Enough Exploiting Search Pattern Leakage.eng.text

11.6 KB

Hiding the Access Pattern is Not Enough Exploiting Search Pattern Leakage.eng.tsv

13.3 KB

Hiding the Access Pattern is Not Enough Exploiting Search Pattern Leakage.eng.txt

14.9 KB

Hiding the Access Pattern is Not Enough Exploiting Search Pattern Leakage.eng.vtt

14.2 KB

Hopper Modeling and Detecting Lateral Movement.eng.srt

26.1 KB

How Great is the Great Firewall Measuring China's DNS Censorship.eng.srt

24.0 KB

How to Make Private Distributed Cardinality Estimation Practical.eng.srt

18.6 KB

I Always Feel Like Somebody's Sensing Me A Framework to Detect, Identify, and.eng.json

622.3 KB

I Always Feel Like Somebody's Sensing Me A Framework to Detect, Identify, and.eng.lrc

18.9 KB

I Always Feel Like Somebody's Sensing Me A Framework to Detect, Identify, and.eng.srt

14.6 KB

I Always Feel Like Somebody's Sensing Me A Framework to Detect, Identify, and.eng.text

10.6 KB

I Always Feel Like Somebody's Sensing Me A Framework to Detect, Identify, and.eng.tsv

15.0 KB

I Always Feel Like Somebody's Sensing Me A Framework to Detect, Identify, and.eng.txt

19.3 KB

I Always Feel Like Somebody's Sensing Me A Framework to Detect, Identify, and.eng.vtt

13.5 KB

ICSFuzz Manipulating I Os and Repurposing Binary Code to Enable Instrumented.eng.json

574.6 KB

ICSFuzz Manipulating I Os and Repurposing Binary Code to Enable Instrumented.eng.lrc

15.2 KB

ICSFuzz Manipulating I Os and Repurposing Binary Code to Enable Instrumented.eng.srt

16.7 KB

ICSFuzz Manipulating I Os and Repurposing Binary Code to Enable Instrumented.eng.text

11.9 KB

ICSFuzz Manipulating I Os and Repurposing Binary Code to Enable Instrumented.eng.tsv

13.7 KB

ICSFuzz Manipulating I Os and Repurposing Binary Code to Enable Instrumented.eng.txt

15.3 KB

ICSFuzz Manipulating I Os and Repurposing Binary Code to Enable Instrumented.eng.vtt

15.4 KB

Identifying Harmful Media in End-to-End Encrypted Communication.eng.srt

26.3 KB

Incrementally Updateable Honey Password Vaults.eng.srt

13.8 KB

Inexpensive Brainwave Authentication New Techniques and Insights.eng.json

427.0 KB

Inexpensive Brainwave Authentication New Techniques and Insights.eng.lrc

11.7 KB

Inexpensive Brainwave Authentication New Techniques and Insights.eng.srt

11.9 KB

Inexpensive Brainwave Authentication New Techniques and Insights.eng.text

9.1 KB

Inexpensive Brainwave Authentication New Techniques and Insights.eng.tsv

10.5 KB

Inexpensive Brainwave Authentication New Techniques and Insights.eng.txt

11.8 KB

Inexpensive Brainwave Authentication New Techniques and Insights.eng.vtt

11.2 KB

Injection Attacks Reloaded Tunnelling Malicious Payloads over DNS.eng.json

504.7 KB

Injection Attacks Reloaded Tunnelling Malicious Payloads over DNS.eng.lrc

15.0 KB

Injection Attacks Reloaded Tunnelling Malicious Payloads over DNS.eng.srt

12.1 KB

Injection Attacks Reloaded Tunnelling Malicious Payloads over DNS.eng.text

9.4 KB

Injection Attacks Reloaded Tunnelling Malicious Payloads over DNS.eng.tsv

12.4 KB

Injection Attacks Reloaded Tunnelling Malicious Payloads over DNS.eng.txt

15.2 KB

Injection Attacks Reloaded Tunnelling Malicious Payloads over DNS.eng.vtt

11.4 KB

Is Real-time Phishing Eliminated with FIDO Social Engineering Downgrade.eng.srt

22.0 KB

It's Stored, Hopefully, on an Encrypted Server Mitigating Users.eng.json

466.7 KB

It's Stored, Hopefully, on an Encrypted Server Mitigating Users.eng.lrc

12.7 KB

It's Stored, Hopefully, on an Encrypted Server Mitigating Users.eng.srt

13.1 KB

It's Stored, Hopefully, on an Encrypted Server Mitigating Users.eng.text

9.7 KB

It's Stored, Hopefully, on an Encrypted Server Mitigating Users.eng.tsv

11.3 KB

It's Stored, Hopefully, on an Encrypted Server Mitigating Users.eng.txt

12.8 KB

It's Stored, Hopefully, on an Encrypted Server Mitigating Users.eng.vtt

12.2 KB

It's stressful having all these phones - Investigating Sex Workers Safety.eng.srt

24.1 KB

It's the Company, the Government, You and I - User Perceptions of.eng.srt

19.1 KB

Jaqen A High-Performance Switch-Native Approach for Detecting and Mitigating.eng.srt

24.4 KB

JAW Studying Client-side CSRF with Hybrid Property Graphs and Declarative.eng.json

595.4 KB

JAW Studying Client-side CSRF with Hybrid Property Graphs and Declarative.eng.lrc

15.6 KB

JAW Studying Client-side CSRF with Hybrid Property Graphs and Declarative.eng.srt

15.6 KB

JAW Studying Client-side CSRF with Hybrid Property Graphs and Declarative.eng.text

12.3 KB

JAW Studying Client-side CSRF with Hybrid Property Graphs and Declarative.eng.tsv

14.1 KB

JAW Studying Client-side CSRF with Hybrid Property Graphs and Declarative.eng.txt

15.8 KB

JAW Studying Client-side CSRF with Hybrid Property Graphs and Declarative.eng.vtt

14.7 KB

Jetset Targeted Firmware Rehosting for Embedded Systems.eng.srt

24.8 KB

Kalεido Real-Time Privacy Control for Eye-Tracking Systems.eng.srt

22.5 KB

KeyForge Non-Attributable Email from Forward-Forgeable Signatures.eng.json

552.5 KB

KeyForge Non-Attributable Email from Forward-Forgeable Signatures.eng.lrc

16.3 KB

KeyForge Non-Attributable Email from Forward-Forgeable Signatures.eng.srt

13.6 KB

KeyForge Non-Attributable Email from Forward-Forgeable Signatures.eng.text

10.1 KB

KeyForge Non-Attributable Email from Forward-Forgeable Signatures.eng.tsv

13.4 KB

KeyForge Non-Attributable Email from Forward-Forgeable Signatures.eng.txt

16.5 KB

KeyForge Non-Attributable Email from Forward-Forgeable Signatures.eng.vtt

12.6 KB

Leakage of Dataset Properties in Multi-Party Machine Learning.eng.json

403.4 KB

Leakage of Dataset Properties in Multi-Party Machine Learning.eng.lrc

11.3 KB

Leakage of Dataset Properties in Multi-Party Machine Learning.eng.srt

11.4 KB

Leakage of Dataset Properties in Multi-Party Machine Learning.eng.text

8.5 KB

Leakage of Dataset Properties in Multi-Party Machine Learning.eng.tsv

10.0 KB

Leakage of Dataset Properties in Multi-Party Machine Learning.eng.txt

11.4 KB

Leakage of Dataset Properties in Multi-Party Machine Learning.eng.vtt

10.6 KB

LIGHTBLUE Automatic Profile-Aware Debloating of Bluetooth Stacks.eng.srt

16.9 KB

Locally Differentially Private Analysis of Graph Statistics.eng.json

424.5 KB

Locally Differentially Private Analysis of Graph Statistics.eng.lrc

10.6 KB

Locally Differentially Private Analysis of Graph Statistics.eng.srt

12.5 KB

Locally Differentially Private Analysis of Graph Statistics.eng.text

8.1 KB

Locally Differentially Private Analysis of Graph Statistics.eng.tsv

9.4 KB

Locally Differentially Private Analysis of Graph Statistics.eng.txt

10.7 KB

Locally Differentially Private Analysis of Graph Statistics.eng.vtt

11.3 KB

Lord of the Ring(s) Side Channel Attacks on the CPU On-Chip Ring.eng.json

676.2 KB

Lord of the Ring(s) Side Channel Attacks on the CPU On-Chip Ring.eng.lrc

17.2 KB

Lord of the Ring(s) Side Channel Attacks on the CPU On-Chip Ring.eng.srt

17.8 KB

Lord of the Ring(s) Side Channel Attacks on the CPU On-Chip Ring.eng.text

13.4 KB

Lord of the Ring(s) Side Channel Attacks on the CPU On-Chip Ring.eng.tsv

15.4 KB

Lord of the Ring(s) Side Channel Attacks on the CPU On-Chip Ring.eng.txt

17.3 KB

Lord of the Ring(s) Side Channel Attacks on the CPU On-Chip Ring.eng.vtt

16.6 KB

LZR Identifying Unexpected Internet Services.eng.srt

18.4 KB

M2MON Building an MMIO-based Security Reference Monitor for Unmanned Vehicles.eng.srt

21.4 KB

MAZE Towards Automated Heap Feng Shui.eng.json

375.7 KB

MAZE Towards Automated Heap Feng Shui.eng.lrc

9.6 KB

MAZE Towards Automated Heap Feng Shui.eng.srt

10.3 KB

MAZE Towards Automated Heap Feng Shui.eng.text

7.5 KB

MAZE Towards Automated Heap Feng Shui.eng.tsv

8.6 KB

MAZE Towards Automated Heap Feng Shui.eng.txt

9.7 KB

MAZE Towards Automated Heap Feng Shui.eng.vtt

9.5 KB

MBA-Blast Unveiling and Simplifying Mixed Boolean-Arithmetic Obfuscation.eng.json

367.2 KB

MBA-Blast Unveiling and Simplifying Mixed Boolean-Arithmetic Obfuscation.eng.lrc

9.8 KB

MBA-Blast Unveiling and Simplifying Mixed Boolean-Arithmetic Obfuscation.eng.srt

10.2 KB

MBA-Blast Unveiling and Simplifying Mixed Boolean-Arithmetic Obfuscation.eng.text

7.5 KB

MBA-Blast Unveiling and Simplifying Mixed Boolean-Arithmetic Obfuscation.eng.tsv

8.7 KB

MBA-Blast Unveiling and Simplifying Mixed Boolean-Arithmetic Obfuscation.eng.txt

9.9 KB

MBA-Blast Unveiling and Simplifying Mixed Boolean-Arithmetic Obfuscation.eng.vtt

9.5 KB

Messy States of Wiring Vulnerabilities in Emerging Personal Payment Systems.eng.srt

21.3 KB

mID Tracing Screen Photos via Moiré Patterns.eng.json

454.7 KB

mID Tracing Screen Photos via Moiré Patterns.eng.lrc

12.4 KB

mID Tracing Screen Photos via Moiré Patterns.eng.srt

12.4 KB

mID Tracing Screen Photos via Moiré Patterns.eng.text

9.2 KB

mID Tracing Screen Photos via Moiré Patterns.eng.tsv

10.9 KB

mID Tracing Screen Photos via Moiré Patterns.eng.txt

12.5 KB

mID Tracing Screen Photos via Moiré Patterns.eng.vtt

11.5 KB

Mind Your Weight(s) A Large-scale Study on Insufficient Machine Learning.eng.json

537.2 KB

Mind Your Weight(s) A Large-scale Study on Insufficient Machine Learning.eng.lrc

16.4 KB

Mind Your Weight(s) A Large-scale Study on Insufficient Machine Learning.eng.srt

13.6 KB

Mind Your Weight(s) A Large-scale Study on Insufficient Machine Learning.eng.text

9.9 KB

Mind Your Weight(s) A Large-scale Study on Insufficient Machine Learning.eng.tsv

13.4 KB

Mind Your Weight(s) A Large-scale Study on Insufficient Machine Learning.eng.txt

16.6 KB

Mind Your Weight(s) A Large-scale Study on Insufficient Machine Learning.eng.vtt

12.6 KB

Minerva- An Efficient Risk-Limiting Ballot Polling Audit.eng.srt

20.3 KB

MIRAGE Mitigating Conflict-Based Cache Attacks with a Practical.eng.json

596.2 KB

MIRAGE Mitigating Conflict-Based Cache Attacks with a Practical.eng.lrc

18.3 KB

MIRAGE Mitigating Conflict-Based Cache Attacks with a Practical.eng.srt

14.3 KB

MIRAGE Mitigating Conflict-Based Cache Attacks with a Practical.eng.text

11.2 KB

MIRAGE Mitigating Conflict-Based Cache Attacks with a Practical.eng.tsv

15.0 KB

MIRAGE Mitigating Conflict-Based Cache Attacks with a Practical.eng.txt

18.5 KB

MIRAGE Mitigating Conflict-Based Cache Attacks with a Practical.eng.vtt

13.5 KB

MPInspector A Systematic and Automatic Approach for Evaluating the Security.eng.json

401.1 KB

MPInspector A Systematic and Automatic Approach for Evaluating the Security.eng.lrc

11.8 KB

MPInspector A Systematic and Automatic Approach for Evaluating the Security.eng.srt

11.6 KB

MPInspector A Systematic and Automatic Approach for Evaluating the Security.eng.text

8.1 KB

MPInspector A Systematic and Automatic Approach for Evaluating the Security.eng.tsv

10.0 KB

MPInspector A Systematic and Automatic Approach for Evaluating the Security.eng.txt

11.9 KB

MPInspector A Systematic and Automatic Approach for Evaluating the Security.eng.vtt

10.6 KB

Muse Secure Inference Resilient to Malicious Clients.eng.json

588.5 KB

Muse Secure Inference Resilient to Malicious Clients.eng.lrc

16.0 KB

Muse Secure Inference Resilient to Malicious Clients.eng.srt

15.9 KB

Muse Secure Inference Resilient to Malicious Clients.eng.text

12.4 KB

Muse Secure Inference Resilient to Malicious Clients.eng.tsv

14.3 KB

Muse Secure Inference Resilient to Malicious Clients.eng.txt

16.1 KB

Muse Secure Inference Resilient to Malicious Clients.eng.vtt

15.0 KB

Mystique Efficient Conversions for Zero-Knowledge Proofs with Applications.eng.json

358.6 KB

Mystique Efficient Conversions for Zero-Knowledge Proofs with Applications.eng.lrc

9.6 KB

Mystique Efficient Conversions for Zero-Knowledge Proofs with Applications.eng.srt

10.3 KB

Mystique Efficient Conversions for Zero-Knowledge Proofs with Applications.eng.text

7.4 KB

Mystique Efficient Conversions for Zero-Knowledge Proofs with Applications.eng.tsv

8.6 KB

Mystique Efficient Conversions for Zero-Knowledge Proofs with Applications.eng.txt

9.7 KB

Mystique Efficient Conversions for Zero-Knowledge Proofs with Applications.eng.vtt

9.5 KB

Now I'm a bit angry - Individuals' Awareness, Perception, and Responses.eng.srt

22.7 KB

Nyx Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types.eng.json

489.8 KB

Nyx Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types.eng.lrc

12.5 KB

Nyx Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types.eng.srt

12.6 KB

Nyx Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types.eng.text

9.8 KB

Nyx Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types.eng.tsv

11.2 KB

Nyx Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types.eng.txt

12.6 KB

Nyx Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types.eng.vtt

11.8 KB

Obfuscation-Resilient Executable Payload Extraction From Packed Malware.eng.json

299.7 KB

Obfuscation-Resilient Executable Payload Extraction From Packed Malware.eng.lrc

8.1 KB

Obfuscation-Resilient Executable Payload Extraction From Packed Malware.eng.srt

8.3 KB

Obfuscation-Resilient Executable Payload Extraction From Packed Malware.eng.text

5.7 KB

Obfuscation-Resilient Executable Payload Extraction From Packed Malware.eng.tsv

7.0 KB

Obfuscation-Resilient Executable Payload Extraction From Packed Malware.eng.txt

8.2 KB

Obfuscation-Resilient Executable Payload Extraction From Packed Malware.eng.vtt

7.6 KB

ObliCheck Efficient Verification of Oblivious Algorithms with Unobservable.eng.json

519.9 KB

ObliCheck Efficient Verification of Oblivious Algorithms with Unobservable.eng.lrc

14.1 KB

ObliCheck Efficient Verification of Oblivious Algorithms with Unobservable.eng.srt

15.5 KB

ObliCheck Efficient Verification of Oblivious Algorithms with Unobservable.eng.text

11.0 KB

ObliCheck Efficient Verification of Oblivious Algorithms with Unobservable.eng.tsv

12.6 KB

ObliCheck Efficient Verification of Oblivious Algorithms with Unobservable.eng.txt

14.2 KB

ObliCheck Efficient Verification of Oblivious Algorithms with Unobservable.eng.vtt

14.3 KB

On the Design and Misuse of Microcoded (Embedded) Processors-A Cautionary Note.eng.srt

24.4 KB

On the Routing-Aware Peering against Network-Eclipse Attacks in Bitcoin.eng.srt

19.6 KB

On the Usability of Authenticity Checks for Hardware Security Tokens.eng.json

399.2 KB

On the Usability of Authenticity Checks for Hardware Security Tokens.eng.lrc

11.0 KB

On the Usability of Authenticity Checks for Hardware Security Tokens.eng.srt

10.7 KB

On the Usability of Authenticity Checks for Hardware Security Tokens.eng.text

8.5 KB

On the Usability of Authenticity Checks for Hardware Security Tokens.eng.tsv

9.8 KB

On the Usability of Authenticity Checks for Hardware Security Tokens.eng.txt

11.1 KB

On the Usability of Authenticity Checks for Hardware Security Tokens.eng.vtt

10.1 KB

Once is Never Enough Foundations for Sound Statistical Inference in Tor.eng.srt

24.8 KB

Osiris Automated Discovery of Microarchitectural Side Channels.eng.srt

23.0 KB

PACStack an Authenticated Call Stack.eng.srt

20.1 KB

Partitioning Oracle Attacks.eng.json

516.7 KB

Partitioning Oracle Attacks.eng.lrc

13.7 KB

Partitioning Oracle Attacks.eng.srt

14.5 KB

Partitioning Oracle Attacks.eng.text

10.7 KB

Partitioning Oracle Attacks.eng.tsv

12.3 KB

Partitioning Oracle Attacks.eng.txt

13.8 KB

Partitioning Oracle Attacks.eng.vtt

13.5 KB

PASAN Detecting Peripheral Access Concurrency Bugs within Bare-Metal.eng.srt

18.8 KB

'Passwords Keep Me Safe' - Understanding What Children Think about Passwords.eng.json

429.0 KB

'Passwords Keep Me Safe' - Understanding What Children Think about Passwords.eng.lrc

12.1 KB

'Passwords Keep Me Safe' - Understanding What Children Think about Passwords.eng.srt

12.5 KB

'Passwords Keep Me Safe' - Understanding What Children Think about Passwords.eng.text

9.2 KB

'Passwords Keep Me Safe' - Understanding What Children Think about Passwords.eng.tsv

10.8 KB

'Passwords Keep Me Safe' - Understanding What Children Think about Passwords.eng.txt

12.3 KB

'Passwords Keep Me Safe' - Understanding What Children Think about Passwords.eng.vtt

11.6 KB

PatchGuard A Provably Robust Defense against Adversarial Patches via Small.eng.json

512.6 KB

PatchGuard A Provably Robust Defense against Adversarial Patches via Small.eng.lrc

14.1 KB

PatchGuard A Provably Robust Defense against Adversarial Patches via Small.eng.srt

14.4 KB

PatchGuard A Provably Robust Defense against Adversarial Patches via Small.eng.text

9.9 KB

PatchGuard A Provably Robust Defense against Adversarial Patches via Small.eng.tsv

12.1 KB

PatchGuard A Provably Robust Defense against Adversarial Patches via Small.eng.txt

14.3 KB

PatchGuard A Provably Robust Defense against Adversarial Patches via Small.eng.vtt

13.2 KB

PEARL Plausibly Deniable Flash Translation Layer using WOM coding.eng.json

610.2 KB

PEARL Plausibly Deniable Flash Translation Layer using WOM coding.eng.lrc

17.6 KB

PEARL Plausibly Deniable Flash Translation Layer using WOM coding.eng.srt

14.1 KB

PEARL Plausibly Deniable Flash Translation Layer using WOM coding.eng.text

11.0 KB

PEARL Plausibly Deniable Flash Translation Layer using WOM coding.eng.tsv

14.5 KB

PEARL Plausibly Deniable Flash Translation Layer using WOM coding.eng.txt

17.8 KB

PEARL Plausibly Deniable Flash Translation Layer using WOM coding.eng.vtt

13.2 KB

People Count Contact Tracing Apps and Public Health.eng.json

2.6 MB

People Count Contact Tracing Apps and Public Health.eng.lrc

65.7 KB

People Count Contact Tracing Apps and Public Health.eng.srt

72.7 KB

People Count Contact Tracing Apps and Public Health.eng.text

51.0 KB

People Count Contact Tracing Apps and Public Health.eng.tsv

59.7 KB

People Count Contact Tracing Apps and Public Health.eng.txt

66.2 KB

People Count Contact Tracing Apps and Public Health.eng.vtt

66.6 KB

Phishpedia A Hybrid Deep Learning Based Approach to Visually Identify.eng.srt

19.1 KB

PhishPrint Evading Phishing Detection Crawlers by Prior Profiling.eng.json

466.9 KB

PhishPrint Evading Phishing Detection Crawlers by Prior Profiling.eng.lrc

12.2 KB

PhishPrint Evading Phishing Detection Crawlers by Prior Profiling.eng.srt

13.3 KB

PhishPrint Evading Phishing Detection Crawlers by Prior Profiling.eng.text

9.9 KB

PhishPrint Evading Phishing Detection Crawlers by Prior Profiling.eng.tsv

11.1 KB

PhishPrint Evading Phishing Detection Crawlers by Prior Profiling.eng.txt

12.3 KB

PhishPrint Evading Phishing Detection Crawlers by Prior Profiling.eng.vtt

12.4 KB

Poisoning the Unlabeled Dataset of Semi-Supervised Learning.eng.srt

27.1 KB

PolyScope Multi-Policy Access Control Analysis to Compute Authorized Attack.eng.json

439.5 KB

PolyScope Multi-Policy Access Control Analysis to Compute Authorized Attack.eng.lrc

11.9 KB

PolyScope Multi-Policy Access Control Analysis to Compute Authorized Attack.eng.srt

12.7 KB

PolyScope Multi-Policy Access Control Analysis to Compute Authorized Attack.eng.text

9.2 KB

PolyScope Multi-Policy Access Control Analysis to Compute Authorized Attack.eng.tsv

10.6 KB

PolyScope Multi-Policy Access Control Analysis to Compute Authorized Attack.eng.txt

12.0 KB

PolyScope Multi-Policy Access Control Analysis to Compute Authorized Attack.eng.vtt

11.7 KB

Poseidon A New Hash Function for Zero-Knowledge Proof Systems.eng.srt

19.7 KB

Precise and Scalable Detection of Use-after-Compacting-Garbage-Collection Bugs.eng.json

470.4 KB

Precise and Scalable Detection of Use-after-Compacting-Garbage-Collection Bugs.eng.lrc

12.7 KB

Precise and Scalable Detection of Use-after-Compacting-Garbage-Collection Bugs.eng.srt

13.2 KB

Precise and Scalable Detection of Use-after-Compacting-Garbage-Collection Bugs.eng.text

9.8 KB

Precise and Scalable Detection of Use-after-Compacting-Garbage-Collection Bugs.eng.tsv

11.3 KB

Precise and Scalable Detection of Use-after-Compacting-Garbage-Collection Bugs.eng.txt

12.8 KB

Precise and Scalable Detection of Use-after-Compacting-Garbage-Collection Bugs.eng.vtt

12.3 KB

Pretty Good Phone Privacy.eng.json

576.7 KB

Pretty Good Phone Privacy.eng.lrc

14.7 KB

Pretty Good Phone Privacy.eng.srt

15.7 KB

Pretty Good Phone Privacy.eng.text

11.6 KB

Pretty Good Phone Privacy.eng.tsv

13.3 KB

Pretty Good Phone Privacy.eng.txt

14.8 KB

Pretty Good Phone Privacy.eng.vtt

14.6 KB

Preventing Use-After-Free Attacks with Fast Forward Allocation.eng.json

476.0 KB

Preventing Use-After-Free Attacks with Fast Forward Allocation.eng.lrc

13.2 KB

Preventing Use-After-Free Attacks with Fast Forward Allocation.eng.srt

13.4 KB

Preventing Use-After-Free Attacks with Fast Forward Allocation.eng.text

10.2 KB

Preventing Use-After-Free Attacks with Fast Forward Allocation.eng.tsv

11.8 KB

Preventing Use-After-Free Attacks with Fast Forward Allocation.eng.txt

13.3 KB

Preventing Use-After-Free Attacks with Fast Forward Allocation.eng.vtt

12.5 KB

PrimeProbe 1, JavaScript 0 Overcoming Browser-based Side-Channel Defenses.eng.json

353.0 KB

PrimeProbe 1, JavaScript 0 Overcoming Browser-based Side-Channel Defenses.eng.lrc

9.3 KB

PrimeProbe 1, JavaScript 0 Overcoming Browser-based Side-Channel Defenses.eng.srt

10.6 KB

PrimeProbe 1, JavaScript 0 Overcoming Browser-based Side-Channel Defenses.eng.text

7.1 KB

PrimeProbe 1, JavaScript 0 Overcoming Browser-based Side-Channel Defenses.eng.tsv

8.3 KB

PrimeProbe 1, JavaScript 0 Overcoming Browser-based Side-Channel Defenses.eng.txt

9.4 KB

PrimeProbe 1, JavaScript 0 Overcoming Browser-based Side-Channel Defenses.eng.vtt

9.7 KB

PriSEC A Privacy Settings Enforcement Controller.eng.json

552.5 KB

PriSEC A Privacy Settings Enforcement Controller.eng.lrc

14.5 KB

PriSEC A Privacy Settings Enforcement Controller.eng.srt

15.3 KB

PriSEC A Privacy Settings Enforcement Controller.eng.text

11.3 KB

PriSEC A Privacy Settings Enforcement Controller.eng.tsv

13.0 KB

PriSEC A Privacy Settings Enforcement Controller.eng.txt

14.6 KB

PriSEC A Privacy Settings Enforcement Controller.eng.vtt

14.2 KB

Privacy and Integrity Preserving Computations with CRISP.eng.json

494.0 KB

Privacy and Integrity Preserving Computations with CRISP.eng.lrc

13.5 KB

Privacy and Integrity Preserving Computations with CRISP.eng.srt

13.6 KB

Privacy and Integrity Preserving Computations with CRISP.eng.text

10.6 KB

Privacy and Integrity Preserving Computations with CRISP.eng.tsv

12.2 KB

Privacy and Integrity Preserving Computations with CRISP.eng.txt

13.6 KB

Privacy and Integrity Preserving Computations with CRISP.eng.vtt

12.8 KB

Privacy-Preserving and Standard-Compatible AKA Protocol for 5G.eng.srt

17.7 KB

Private Blocklist Lookups with Checklist.eng.json

566.9 KB

Private Blocklist Lookups with Checklist.eng.lrc

15.2 KB

Private Blocklist Lookups with Checklist.eng.srt

15.7 KB

Private Blocklist Lookups with Checklist.eng.text

12.0 KB

Private Blocklist Lookups with Checklist.eng.tsv

13.7 KB

Private Blocklist Lookups with Checklist.eng.txt

15.4 KB

Private Blocklist Lookups with Checklist.eng.vtt

14.7 KB

PrivateDrop Practical Privacy-Preserving Authentication for Apple AirDrop.eng.srt

23.9 KB

PrivSyn Differentially Private Data Synthesis.eng.srt

18.6 KB

Protecting Cryptography Against Compelled Self-Incrimination.eng.json

582.2 KB

Protecting Cryptography Against Compelled Self-Incrimination.eng.lrc

15.3 KB

Protecting Cryptography Against Compelled Self-Incrimination.eng.srt

16.2 KB

Protecting Cryptography Against Compelled Self-Incrimination.eng.text

12.0 KB

Protecting Cryptography Against Compelled Self-Incrimination.eng.tsv

13.8 KB

Protecting Cryptography Against Compelled Self-Incrimination.eng.txt

15.5 KB

Protecting Cryptography Against Compelled Self-Incrimination.eng.vtt

15.1 KB

PTAuth Temporal Memory Safety via Robust Points-to Authentication.eng.srt

15.4 KB

Raccoon Attack Finding and Exploiting Most-Significant-Bit-Oracles.eng.json

646.5 KB

Raccoon Attack Finding and Exploiting Most-Significant-Bit-Oracles.eng.lrc

18.1 KB

Raccoon Attack Finding and Exploiting Most-Significant-Bit-Oracles.eng.srt

16.0 KB

Raccoon Attack Finding and Exploiting Most-Significant-Bit-Oracles.eng.text

12.7 KB

Raccoon Attack Finding and Exploiting Most-Significant-Bit-Oracles.eng.tsv

15.6 KB

Raccoon Attack Finding and Exploiting Most-Significant-Bit-Oracles.eng.txt

18.3 KB

Raccoon Attack Finding and Exploiting Most-Significant-Bit-Oracles.eng.vtt

15.1 KB

Rage Against the Machine Clear A Systematic Analysis of Machine Clears.eng.json

584.5 KB

Rage Against the Machine Clear A Systematic Analysis of Machine Clears.eng.lrc

15.6 KB

Rage Against the Machine Clear A Systematic Analysis of Machine Clears.eng.srt

16.2 KB

Rage Against the Machine Clear A Systematic Analysis of Machine Clears.eng.text

12.5 KB

Rage Against the Machine Clear A Systematic Analysis of Machine Clears.eng.tsv

14.2 KB

Rage Against the Machine Clear A Systematic Analysis of Machine Clears.eng.txt

15.7 KB

Rage Against the Machine Clear A Systematic Analysis of Machine Clears.eng.vtt

15.2 KB

ReDMArk Bypassing RDMA Security Mechanisms.eng.json

431.6 KB

ReDMArk Bypassing RDMA Security Mechanisms.eng.lrc

11.5 KB

ReDMArk Bypassing RDMA Security Mechanisms.eng.srt

12.1 KB

ReDMArk Bypassing RDMA Security Mechanisms.eng.text

8.8 KB

ReDMArk Bypassing RDMA Security Mechanisms.eng.tsv

10.2 KB

ReDMArk Bypassing RDMA Security Mechanisms.eng.txt

11.6 KB

ReDMArk Bypassing RDMA Security Mechanisms.eng.vtt

11.2 KB

ReDoSHunter A Combined Static and Dynamic Approach for Regular Expression DoS.eng.srt

18.4 KB

Reducing Bias in Modeling Real-world Password Strength via Deep Learning.eng.json

508.5 KB

Reducing Bias in Modeling Real-world Password Strength via Deep Learning.eng.lrc

13.9 KB

Reducing Bias in Modeling Real-world Password Strength via Deep Learning.eng.srt

14.1 KB

Reducing Bias in Modeling Real-world Password Strength via Deep Learning.eng.text

10.8 KB

Reducing Bias in Modeling Real-world Password Strength via Deep Learning.eng.tsv

12.5 KB

Reducing Bias in Modeling Real-world Password Strength via Deep Learning.eng.txt

14.1 KB

Reducing Bias in Modeling Real-world Password Strength via Deep Learning.eng.vtt

13.2 KB

Reducing HSM Reliance in Payments through Proxy Re-Encryption.eng.srt

23.5 KB

Reducing Test Cases with Attention Mechanism of Neural Networks.eng.json

345.5 KB

Reducing Test Cases with Attention Mechanism of Neural Networks.eng.lrc

9.4 KB

Reducing Test Cases with Attention Mechanism of Neural Networks.eng.srt

10.1 KB

Reducing Test Cases with Attention Mechanism of Neural Networks.eng.text

7.3 KB

Reducing Test Cases with Attention Mechanism of Neural Networks.eng.tsv

8.4 KB

Reducing Test Cases with Attention Mechanism of Neural Networks.eng.txt

9.4 KB

Reducing Test Cases with Attention Mechanism of Neural Networks.eng.vtt

9.4 KB

Research on the Security of Visual Reasoning CAPTCHA.eng.srt

18.3 KB

Ripple A Programmable, Decentralized Link-Flooding Defense Against Adaptive.eng.srt

21.7 KB

Risky Business Investigating the Security Practices of Vendors on an Online.eng.srt

26.9 KB

Rollercoaster An Efficient Group-Multicast Scheme for Mix Networks.eng.json

507.6 KB

Rollercoaster An Efficient Group-Multicast Scheme for Mix Networks.eng.lrc

13.5 KB

Rollercoaster An Efficient Group-Multicast Scheme for Mix Networks.eng.srt

14.5 KB

Rollercoaster An Efficient Group-Multicast Scheme for Mix Networks.eng.text

10.6 KB

Rollercoaster An Efficient Group-Multicast Scheme for Mix Networks.eng.tsv

12.2 KB

Rollercoaster An Efficient Group-Multicast Scheme for Mix Networks.eng.txt

13.7 KB

Rollercoaster An Efficient Group-Multicast Scheme for Mix Networks.eng.vtt

13.5 KB

SandTrap Securing JavaScript-driven Trigger-Action Platforms.eng.json

491.6 KB

SandTrap Securing JavaScript-driven Trigger-Action Platforms.eng.lrc

13.3 KB

SandTrap Securing JavaScript-driven Trigger-Action Platforms.eng.srt

14.0 KB

SandTrap Securing JavaScript-driven Trigger-Action Platforms.eng.text

10.3 KB

SandTrap Securing JavaScript-driven Trigger-Action Platforms.eng.tsv

11.9 KB

SandTrap Securing JavaScript-driven Trigger-Action Platforms.eng.txt

13.4 KB

SandTrap Securing JavaScript-driven Trigger-Action Platforms.eng.vtt

13.0 KB

Saphire Sandboxing PHP Applications with Tailored System Call Allowlists.eng.json

606.1 KB

Saphire Sandboxing PHP Applications with Tailored System Call Allowlists.eng.lrc

16.2 KB

Saphire Sandboxing PHP Applications with Tailored System Call Allowlists.eng.srt

16.9 KB

Saphire Sandboxing PHP Applications with Tailored System Call Allowlists.eng.text

12.7 KB

Saphire Sandboxing PHP Applications with Tailored System Call Allowlists.eng.tsv

14.6 KB

Saphire Sandboxing PHP Applications with Tailored System Call Allowlists.eng.txt

16.3 KB

Saphire Sandboxing PHP Applications with Tailored System Call Allowlists.eng.vtt

15.7 KB

Scalable Detection of Promotional Website Defacements in Black Hat SEO.eng.srt

19.4 KB

SEAL Storage-efficient Causality Analysis on Enterprise Logs.eng.srt

13.9 KB

SEApp Bringing Mandatory Access Control to Android Apps.eng.srt

17.3 KB

Searching Encrypted Data with Size-Locked Indexes.eng.srt

22.1 KB

Security Analysis of the Democracy Live Online Voting System.eng.srt

28.7 KB

Security Obstacles and Motivations for Small Businesses from a CISO's.eng.srt

23.3 KB

SelectiveTain't Efficient Data Flow Tracking With Static Binary Rewriting.eng.json

466.9 KB

SelectiveTain't Efficient Data Flow Tracking With Static Binary Rewriting.eng.lrc

12.0 KB

SelectiveTain't Efficient Data Flow Tracking With Static Binary Rewriting.eng.srt

13.6 KB

SelectiveTain't Efficient Data Flow Tracking With Static Binary Rewriting.eng.text

9.3 KB

SelectiveTain't Efficient Data Flow Tracking With Static Binary Rewriting.eng.tsv

10.8 KB

SelectiveTain't Efficient Data Flow Tracking With Static Binary Rewriting.eng.txt

12.1 KB

SelectiveTain't Efficient Data Flow Tracking With Static Binary Rewriting.eng.vtt

12.4 KB

Senate A Maliciously-Secure MPC Platform for Collaborative Analytics.eng.json

510.0 KB

Senate A Maliciously-Secure MPC Platform for Collaborative Analytics.eng.lrc

14.1 KB

Senate A Maliciously-Secure MPC Platform for Collaborative Analytics.eng.srt

14.1 KB

Senate A Maliciously-Secure MPC Platform for Collaborative Analytics.eng.text

10.9 KB

Senate A Maliciously-Secure MPC Platform for Collaborative Analytics.eng.tsv

12.6 KB

Senate A Maliciously-Secure MPC Platform for Collaborative Analytics.eng.txt

14.3 KB

Senate A Maliciously-Secure MPC Platform for Collaborative Analytics.eng.vtt

13.3 KB

SHARD Fine-Grained Kernel Specialization with Context-Aware Hardening.eng.json

516.7 KB

SHARD Fine-Grained Kernel Specialization with Context-Aware Hardening.eng.lrc

14.4 KB

SHARD Fine-Grained Kernel Specialization with Context-Aware Hardening.eng.srt

14.9 KB

SHARD Fine-Grained Kernel Specialization with Context-Aware Hardening.eng.text

10.8 KB

SHARD Fine-Grained Kernel Specialization with Context-Aware Hardening.eng.tsv

12.7 KB

SHARD Fine-Grained Kernel Specialization with Context-Aware Hardening.eng.txt

14.5 KB

SHARD Fine-Grained Kernel Specialization with Context-Aware Hardening.eng.vtt

13.8 KB

Share First, Ask Later (or Never) Studying Violations of GDPR's Explicit.eng.srt

17.9 KB

Sharing More and Checking Less Leveraging Common Input Keywords to Detect.eng.srt

22.7 KB

Shhhbe quiet - Reducing the Unwanted Interruptions of Notification.eng.srt

18.0 KB

SiamHAN IPv6 Address Correlation Attacks on TLS Encrypted Traffic.eng.json

403.5 KB

SiamHAN IPv6 Address Correlation Attacks on TLS Encrypted Traffic.eng.lrc

11.5 KB

SiamHAN IPv6 Address Correlation Attacks on TLS Encrypted Traffic.eng.srt

11.9 KB

SiamHAN IPv6 Address Correlation Attacks on TLS Encrypted Traffic.eng.text

9.0 KB

SiamHAN IPv6 Address Correlation Attacks on TLS Encrypted Traffic.eng.tsv

10.4 KB

SiamHAN IPv6 Address Correlation Attacks on TLS Encrypted Traffic.eng.txt

11.6 KB

SiamHAN IPv6 Address Correlation Attacks on TLS Encrypted Traffic.eng.vtt

11.1 KB

SIGL Securing Software Installations Through Deep Graph Learning.eng.json

495.7 KB

SIGL Securing Software Installations Through Deep Graph Learning.eng.lrc

13.9 KB

SIGL Securing Software Installations Through Deep Graph Learning.eng.srt

14.6 KB

SIGL Securing Software Installations Through Deep Graph Learning.eng.text

10.9 KB

SIGL Securing Software Installations Through Deep Graph Learning.eng.tsv

12.5 KB

SIGL Securing Software Installations Through Deep Graph Learning.eng.txt

14.0 KB

SIGL Securing Software Installations Through Deep Graph Learning.eng.vtt

13.6 KB

SLAP Improving Physical Adversarial Examples with Short-Lived Adversarial.eng.json

514.9 KB

SLAP Improving Physical Adversarial Examples with Short-Lived Adversarial.eng.lrc

13.8 KB

SLAP Improving Physical Adversarial Examples with Short-Lived Adversarial.eng.srt

14.0 KB

SLAP Improving Physical Adversarial Examples with Short-Lived Adversarial.eng.text

10.8 KB

SLAP Improving Physical Adversarial Examples with Short-Lived Adversarial.eng.tsv

12.4 KB

SLAP Improving Physical Adversarial Examples with Short-Lived Adversarial.eng.txt

13.9 KB

SLAP Improving Physical Adversarial Examples with Short-Lived Adversarial.eng.vtt

13.2 KB

Smart Contract Vulnerabilities Vulnerable Does Not Imply Exploited.eng.srt

24.4 KB

SmarTest Effectively Hunting Vulnerable Transaction Sequences in Smart.eng.srt

17.2 KB

SMASH Synchronized Many-sided Rowhammer Attacks from JavaScript.eng.json

565.9 KB

SMASH Synchronized Many-sided Rowhammer Attacks from JavaScript.eng.lrc

13.9 KB

SMASH Synchronized Many-sided Rowhammer Attacks from JavaScript.eng.srt

16.0 KB

SMASH Synchronized Many-sided Rowhammer Attacks from JavaScript.eng.text

10.8 KB

SMASH Synchronized Many-sided Rowhammer Attacks from JavaScript.eng.tsv

12.5 KB

SMASH Synchronized Many-sided Rowhammer Attacks from JavaScript.eng.txt

14.0 KB

SMASH Synchronized Many-sided Rowhammer Attacks from JavaScript.eng.vtt

14.6 KB

SocialHEISTing Understanding Stolen Facebook Accounts.eng.srt

19.1 KB

Stars Can Tell A Robust Method to Defend against GPS Spoofing Attacks.eng.srt

21.1 KB

Static Detection of Unsafe DMA Accesses in Device Drivers.eng.srt

17.9 KB

Stealing Links from Graph Neural Networks.eng.json

549.4 KB

Stealing Links from Graph Neural Networks.eng.lrc

15.9 KB

Stealing Links from Graph Neural Networks.eng.srt

13.8 KB

Stealing Links from Graph Neural Networks.eng.text

9.7 KB

Stealing Links from Graph Neural Networks.eng.tsv

13.0 KB

Stealing Links from Graph Neural Networks.eng.txt

16.2 KB

Stealing Links from Graph Neural Networks.eng.vtt

12.7 KB

Strategies and Perceived Risks of Sending Sensitive Documents.eng.json

523.7 KB

Strategies and Perceived Risks of Sending Sensitive Documents.eng.lrc

14.5 KB

Strategies and Perceived Risks of Sending Sensitive Documents.eng.srt

14.8 KB

Strategies and Perceived Risks of Sending Sensitive Documents.eng.text

11.2 KB

Strategies and Perceived Risks of Sending Sensitive Documents.eng.tsv

13.0 KB

Strategies and Perceived Risks of Sending Sensitive Documents.eng.txt

14.6 KB

Strategies and Perceived Risks of Sending Sensitive Documents.eng.vtt

13.9 KB

SWIFT Super-fast and Robust Privacy-Preserving Machine Learning.eng.json

534.0 KB

SWIFT Super-fast and Robust Privacy-Preserving Machine Learning.eng.lrc

13.7 KB

SWIFT Super-fast and Robust Privacy-Preserving Machine Learning.eng.srt

14.9 KB

SWIFT Super-fast and Robust Privacy-Preserving Machine Learning.eng.text

10.8 KB

SWIFT Super-fast and Robust Privacy-Preserving Machine Learning.eng.tsv

12.3 KB

SWIFT Super-fast and Robust Privacy-Preserving Machine Learning.eng.txt

13.8 KB

SWIFT Super-fast and Robust Privacy-Preserving Machine Learning.eng.vtt

13.8 KB

Swiped Analyzing Ground-truth Data of a Marketplace for Stolen Debit.eng.json

652.3 KB

Swiped Analyzing Ground-truth Data of a Marketplace for Stolen Debit.eng.lrc

17.5 KB

Swiped Analyzing Ground-truth Data of a Marketplace for Stolen Debit.eng.srt

18.1 KB

Swiped Analyzing Ground-truth Data of a Marketplace for Stolen Debit.eng.text

13.7 KB

Swiped Analyzing Ground-truth Data of a Marketplace for Stolen Debit.eng.tsv

15.7 KB

Swiped Analyzing Ground-truth Data of a Marketplace for Stolen Debit.eng.txt

17.6 KB

Swiped Analyzing Ground-truth Data of a Marketplace for Stolen Debit.eng.vtt

16.9 KB

Swivel Hardening WebAssembly against Spectre.eng.srt

18.2 KB

Systematic Evaluation of Privacy Risks of Machine Learning Models.eng.json

338.0 KB

Systematic Evaluation of Privacy Risks of Machine Learning Models.eng.lrc

10.0 KB

Systematic Evaluation of Privacy Risks of Machine Learning Models.eng.srt

9.6 KB

Systematic Evaluation of Privacy Risks of Machine Learning Models.eng.text

7.2 KB

Systematic Evaluation of Privacy Risks of Machine Learning Models.eng.tsv

8.7 KB

Systematic Evaluation of Privacy Risks of Machine Learning Models.eng.txt

10.1 KB

Systematic Evaluation of Privacy Risks of Machine Learning Models.eng.vtt

9.0 KB

SyzVegas Beating Kernel Fuzzing Odds with Reinforcement Learning.eng.srt

19.4 KB

The Circle Of Life A Large-Scale Study of The IoT Malware Lifecycle.eng.json

573.8 KB

The Circle Of Life A Large-Scale Study of The IoT Malware Lifecycle.eng.lrc

16.3 KB

The Circle Of Life A Large-Scale Study of The IoT Malware Lifecycle.eng.srt

15.7 KB

The Circle Of Life A Large-Scale Study of The IoT Malware Lifecycle.eng.text

11.6 KB

The Circle Of Life A Large-Scale Study of The IoT Malware Lifecycle.eng.tsv

14.1 KB

The Circle Of Life A Large-Scale Study of The IoT Malware Lifecycle.eng.txt

16.5 KB

The Circle Of Life A Large-Scale Study of The IoT Malware Lifecycle.eng.vtt

14.6 KB

The Complexities of Healing in Secure Group Messaging Why Cross-Group Effects.eng.json

436.5 KB

The Complexities of Healing in Secure Group Messaging Why Cross-Group Effects.eng.lrc

11.3 KB

The Complexities of Healing in Secure Group Messaging Why Cross-Group Effects.eng.srt

11.6 KB

The Complexities of Healing in Secure Group Messaging Why Cross-Group Effects.eng.text

8.8 KB

The Complexities of Healing in Secure Group Messaging Why Cross-Group Effects.eng.tsv

10.1 KB

The Complexities of Healing in Secure Group Messaging Why Cross-Group Effects.eng.txt

11.4 KB

The Complexities of Healing in Secure Group Messaging Why Cross-Group Effects.eng.vtt

10.8 KB

The Hijackers Guide To The Galaxy Off-Path Taking Over Internet Resources.eng.srt

20.7 KB

The Role of Computer Security Customer Support in Helping Survivors.eng.srt

21.1 KB

The Use of Likely Invariants as Feedback for Fuzzers.eng.json

524.6 KB

The Use of Likely Invariants as Feedback for Fuzzers.eng.lrc

13.5 KB

The Use of Likely Invariants as Feedback for Fuzzers.eng.srt

13.7 KB

The Use of Likely Invariants as Feedback for Fuzzers.eng.text

10.5 KB

The Use of Likely Invariants as Feedback for Fuzzers.eng.tsv

12.1 KB

The Use of Likely Invariants as Feedback for Fuzzers.eng.txt

13.6 KB

The Use of Likely Invariants as Feedback for Fuzzers.eng.vtt

12.8 KB

T-Miner A Generative Approach to Defend Against Trojan Attacks on DNN-based.eng.json

545.4 KB

T-Miner A Generative Approach to Defend Against Trojan Attacks on DNN-based.eng.lrc

15.2 KB

T-Miner A Generative Approach to Defend Against Trojan Attacks on DNN-based.eng.srt

15.3 KB

T-Miner A Generative Approach to Defend Against Trojan Attacks on DNN-based.eng.text

11.0 KB

T-Miner A Generative Approach to Defend Against Trojan Attacks on DNN-based.eng.tsv

13.2 KB

T-Miner A Generative Approach to Defend Against Trojan Attacks on DNN-based.eng.txt

15.3 KB

T-Miner A Generative Approach to Defend Against Trojan Attacks on DNN-based.eng.vtt

14.1 KB

Token-Level Fuzzing.eng.json

480.3 KB

Token-Level Fuzzing.eng.lrc

11.9 KB

Token-Level Fuzzing.eng.srt

13.1 KB

Token-Level Fuzzing.eng.text

9.3 KB

Token-Level Fuzzing.eng.tsv

10.7 KB

Token-Level Fuzzing.eng.txt

12.0 KB

Token-Level Fuzzing.eng.vtt

12.1 KB

Too Good to Be Safe Tricking Lane Detection in Autonomous Driving with Craft.eng.srt

18.5 KB

Towards Formal Verification of State Continuity for Enclave Programs.eng.srt

20.6 KB

U Can't Debug This Detecting JavaScript Anti-Debugging Techniques in the Wild.eng.json

616.8 KB

U Can't Debug This Detecting JavaScript Anti-Debugging Techniques in the Wild.eng.lrc

17.6 KB

U Can't Debug This Detecting JavaScript Anti-Debugging Techniques in the Wild.eng.srt

15.4 KB

U Can't Debug This Detecting JavaScript Anti-Debugging Techniques in the Wild.eng.text

11.3 KB

U Can't Debug This Detecting JavaScript Anti-Debugging Techniques in the Wild.eng.tsv

14.6 KB

U Can't Debug This Detecting JavaScript Anti-Debugging Techniques in the Wild.eng.txt

17.8 KB

U Can't Debug This Detecting JavaScript Anti-Debugging Techniques in the Wild.eng.vtt

14.2 KB

Understanding and Detecting Disordered Error Handling with Precise Function.eng.json

497.7 KB

Understanding and Detecting Disordered Error Handling with Precise Function.eng.lrc

13.8 KB

Understanding and Detecting Disordered Error Handling with Precise Function.eng.srt

13.2 KB

Understanding and Detecting Disordered Error Handling with Precise Function.eng.text

9.9 KB

Understanding and Detecting Disordered Error Handling with Precise Function.eng.tsv

12.0 KB

Understanding and Detecting Disordered Error Handling with Precise Function.eng.txt

13.9 KB

Understanding and Detecting Disordered Error Handling with Precise Function.eng.vtt

12.3 KB

Understanding Malicious Cross-library Data Harvesting on Android.eng.srt

19.3 KB

Undo Workarounds for Kernel Bugs.eng.json

474.0 KB

Undo Workarounds for Kernel Bugs.eng.lrc

12.7 KB

Undo Workarounds for Kernel Bugs.eng.srt

14.2 KB

Undo Workarounds for Kernel Bugs.eng.text

9.7 KB

Undo Workarounds for Kernel Bugs.eng.tsv

11.3 KB

Undo Workarounds for Kernel Bugs.eng.txt

12.8 KB

Undo Workarounds for Kernel Bugs.eng.vtt

13.0 KB

UNIFUZZ A Holistic and Pragmatic Metrics-Driven Platform for Evaluating.eng.srt

18.8 KB

Using Amnesia to Detect Credential Database Breaches.eng.srt

24.9 KB

V0Finder Discovering the Correct Origin of Publicly Reported Software.eng.srt

18.7 KB

Virtual Secure Platform A Five-Stage Pipeline Processor over TFHE.eng.srt

18.3 KB

VoltPillager Hardware-based fault injection attacks against Intel SGX Enclaves.eng.json

441.6 KB

VoltPillager Hardware-based fault injection attacks against Intel SGX Enclaves.eng.lrc

11.2 KB

VoltPillager Hardware-based fault injection attacks against Intel SGX Enclaves.eng.srt

12.9 KB

VoltPillager Hardware-based fault injection attacks against Intel SGX Enclaves.eng.text

8.7 KB

VoltPillager Hardware-based fault injection attacks against Intel SGX Enclaves.eng.tsv

10.0 KB

VoltPillager Hardware-based fault injection attacks against Intel SGX Enclaves.eng.txt

11.3 KB

VoltPillager Hardware-based fault injection attacks against Intel SGX Enclaves.eng.vtt

11.7 KB

VScape Assessing and Escaping Virtual Call Protections.eng.json

412.0 KB

VScape Assessing and Escaping Virtual Call Protections.eng.lrc

11.7 KB

VScape Assessing and Escaping Virtual Call Protections.eng.srt

12.0 KB

VScape Assessing and Escaping Virtual Call Protections.eng.text

8.8 KB

VScape Assessing and Escaping Virtual Call Protections.eng.tsv

10.3 KB

VScape Assessing and Escaping Virtual Call Protections.eng.txt

11.8 KB

VScape Assessing and Escaping Virtual Call Protections.eng.vtt

11.2 KB

WaveGuard Understanding and Mitigating Audio Adversarial Examples.eng.json

524.3 KB

WaveGuard Understanding and Mitigating Audio Adversarial Examples.eng.lrc

15.2 KB

WaveGuard Understanding and Mitigating Audio Adversarial Examples.eng.srt

13.7 KB

WaveGuard Understanding and Mitigating Audio Adversarial Examples.eng.text

10.7 KB

WaveGuard Understanding and Mitigating Audio Adversarial Examples.eng.tsv

13.1 KB

WaveGuard Understanding and Mitigating Audio Adversarial Examples.eng.txt

15.4 KB

WaveGuard Understanding and Mitigating Audio Adversarial Examples.eng.vtt

12.9 KB

Weak Links in Authentication Chains A Large-scale Analysis of Email Sender.eng.json

405.3 KB

Weak Links in Authentication Chains A Large-scale Analysis of Email Sender.eng.lrc

11.0 KB

Weak Links in Authentication Chains A Large-scale Analysis of Email Sender.eng.srt

12.3 KB

Weak Links in Authentication Chains A Large-scale Analysis of Email Sender.eng.text

8.6 KB

Weak Links in Authentication Chains A Large-scale Analysis of Email Sender.eng.tsv

9.9 KB

Weak Links in Authentication Chains A Large-scale Analysis of Email Sender.eng.txt

11.1 KB

Weak Links in Authentication Chains A Large-scale Analysis of Email Sender.eng.vtt

11.3 KB

Weaponizing Middleboxes for TCP Reflected Amplification.eng.json

666.7 KB

Weaponizing Middleboxes for TCP Reflected Amplification.eng.lrc

17.4 KB

Weaponizing Middleboxes for TCP Reflected Amplification.eng.srt

18.6 KB

Weaponizing Middleboxes for TCP Reflected Amplification.eng.text

13.6 KB

Weaponizing Middleboxes for TCP Reflected Amplification.eng.tsv

15.7 KB

Weaponizing Middleboxes for TCP Reflected Amplification.eng.txt

17.6 KB

Weaponizing Middleboxes for TCP Reflected Amplification.eng.vtt

17.3 KB

What's in a Name Exploring CA Certificate Control.eng.srt

23.9 KB

When Malware Changed Its Mind An Empirical Study of Variable Program Behavior.eng.json

500.3 KB

When Malware Changed Its Mind An Empirical Study of Variable Program Behavior.eng.lrc

13.0 KB

When Malware Changed Its Mind An Empirical Study of Variable Program Behavior.eng.srt

13.3 KB

When Malware Changed Its Mind An Empirical Study of Variable Program Behavior.eng.text

10.2 KB

When Malware Changed Its Mind An Empirical Study of Variable Program Behavior.eng.tsv

11.7 KB

When Malware Changed Its Mind An Empirical Study of Variable Program Behavior.eng.txt

13.1 KB

When Malware Changed Its Mind An Empirical Study of Variable Program Behavior.eng.vtt

12.4 KB

Where's Crypto Automated Identification and Classification of Proprietary.eng.srt

25.6 KB

Why Eve and Mallory Still Love Android Revisiting TLS (In)Security in Android.eng.srt

15.5 KB

Why Older Adults (Don't) Use Password Managers.eng.json

447.8 KB

Why Older Adults (Don't) Use Password Managers.eng.lrc

12.7 KB

Why Older Adults (Don't) Use Password Managers.eng.srt

12.3 KB

Why Older Adults (Don't) Use Password Managers.eng.text

9.4 KB

Why Older Adults (Don't) Use Password Managers.eng.tsv

11.2 KB

Why Older Adults (Don't) Use Password Managers.eng.txt

12.8 KB

Why Older Adults (Don't) Use Password Managers.eng.vtt

11.6 KB

Why TLS is better without STARTTLS A Security Analysis of STARTTLS.eng.srt

23.6 KB

Why wouldn't someone think of democracy as a target.eng.json

564.8 KB

Why wouldn't someone think of democracy as a target.eng.lrc

15.2 KB

Why wouldn't someone think of democracy as a target.eng.srt

15.2 KB

Why wouldn't someone think of democracy as a target.eng.text

12.0 KB

Why wouldn't someone think of democracy as a target.eng.tsv

13.7 KB

Why wouldn't someone think of democracy as a target.eng.txt

15.4 KB

Why wouldn't someone think of democracy as a target.eng.vtt

14.3 KB

YARIX Scalable YARA-based Malware Intelligence.eng.srt

18.1 KB

You Autocomplete Me Poisoning Vulnerabilities in Neural Code Completion.eng.srt

23.6 KB

/USENIX Security 2022/

99% False Positives A Qualitative Study of SOC Analysts' Perspectives.mp4

13.1 MB

A Hardware-Software Co-design for Efficient Intra-Enclave Isolation.mp4

8.8 MB

A Large-scale and Longitudinal Measurement Study of DKIM Deployment.mp4

12.4 MB

A Large-scale Investigation into Geodifferences in Mobile Apps.mp4

9.8 MB

A Large-scale Temporal Measurement of Android Malicious Apps.mp4

7.5 MB

Aardvark An Asynchronous Authenticated Dictionary with Applications to.mp4

9.3 MB

Adversarial Detection Avoidance Attacks Evaluating the robustness.mp4

13.2 MB

ÆPIC Leak Architecturally Leaking Uninitialized Data from the.mp4

9.6 MB

ALASTOR Reconstructing the Provenance of Serverless Intrusions.mp4

11.0 MB

AMD Prefetch Attacks through Power and Time.mp4

9.0 MB

AmpFuzz Fuzzing for Amplification DDoS Vulnerabilities.mp4

10.1 MB

An Audit of Facebook's Political Ad Policy Enforcement.mp4

8.9 MB

An Experimental Study of GPS Spoofing and Takeover Attacks on UAVs.mp4

13.7 MB

Anycast Agility Network Playbooks to Fight DDoS.mp4

12.0 MB

Arbiter Bridging the Static and Dynamic Divide in Vulnerability Discovery.mp4

9.1 MB

Are Your Sensitive Attributes Private Novel Model Inversion Attribute.mp4

12.8 MB

Attacks on Deidentification's Defenses.mp4

11.2 MB

Augmenting Decompiler Output with Learned Variable Names and Types.mp4

8.6 MB

AutoDA Automated Decision-based Iterative Adversarial Attacks.mp4

10.1 MB

Automated Detection of Automated Traffic.mp4

12.9 MB

Automated Side Channel Analysis of Media Software with Manifold Learning.mp4

10.9 MB

Automating Cookie Consent and GDPR Violation Detection.mp4

13.2 MB

Backporting Security Patches of Web Applications A Prototype Design.mp4

11.5 MB

Back-Propagating System Dependency Impact for Attack Investigation.mp4

13.0 MB

Batched Differentially Private Information Retrieval.mp4

10.9 MB

Bedrock Programmable Network Support for Secure RDMA Systems.mp4

12.1 MB

Behind the Tube Exploitative Monetization of Content on YouTube.mp4

8.8 MB

Binoculars Contention-Based Side-Channel Attacks Exploiting the Page Walker.mp4

11.5 MB

Birds of a Feather Flock Together How Set Bias Helps to Deanonymize You.mp4

7.5 MB

Blacklight Scalable Defense for Neural Networks against Query-Based Black-Box.mp4

9.1 MB

BrakTooth Causing Havoc on Bluetooth Link Manager via Directed Fuzzing.mp4

16.2 MB

Branch History Injection On the Effectiveness of Hardware Mitigations.mp4

12.1 MB

Breaking Bridgefy, again Adopting libsignal is not enough.mp4

11.1 MB

Building an Open, Robust, and Stable Voting-Based Domain Top List.mp4

9.3 MB

CamShield Securing Smart Cameras through Physical Replication and Isolation.mp4

11.6 MB

Can one hear the shape of a neural network Snooping the GPU via Magnetic.mp4

15.8 MB

Caring about Sharing User Perceptions of Multiparty Data Sharing.mp4

9.6 MB

CellIFT Leveraging Cells for Scalable and Precise Dynamic Information Flow.mp4

9.4 MB

Characterizing the Security of Github CI Workflows.mp4

9.9 MB

Cheetah Lean and Fast Secure Two-Party Deep Neural Network Inference.mp4

10.0 MB

Communication-Efficient Triangle Counting under Local Differential Privacy.mp4

10.1 MB

Composable Cachelets Protecting Enclaves from Cache Side-Channel Attacks.mp4

8.8 MB

COMRace Detecting Data Race Vulnerabilities in COM Objects.mp4

13.5 MB

Constant-weight PIR Single-round Keyword PIR via Constant-weight Equality.mp4

12.3 MB

Counting in Regexes Considered Harmful Exposing ReDoS Vulnerability of.mp4

11.1 MB

Creating a Secure Underlay for the Internet.mp4

11.0 MB

Debloating Address Sanitizer.mp4

9.5 MB

Decomperson How Humans Decompile and What We Can Learn From It.mp4

9.0 MB

DeepDi Learning a Relational Graph Convolutional Network Model on Instruction.mp4

12.5 MB

DeepPhish Understanding User Trust Towards Artificially Generated Profiles.mp4

11.9 MB

Detecting Logical Bugs of DBMS with Coverage-based Guidance.mp4

8.6 MB

DnD A Cross-Architecture Deep Neural Network Decompiler.mp4

9.9 MB

DoLTEst In-depth Downlink Negative Testing Framework for LTE Devices.mp4

11.6 MB

Don't Mesh Around Side-Channel Attacks and Mitigations on Mesh Interconnects.mp4

12.1 MB

Dos and Don'ts of Machine Learning in Computer Security.mp4

10.2 MB

Double Trouble Combined Heterogeneous Attacks on Non-Inclusive Cache.mp4

11.0 MB

DoubleStar Long-Range Attack Towards Depth Estimation based Obstacle.mp4

11.2 MB

Drifuzz Harvesting Bugs in Device Drivers from Golden Seeds.mp4

14.0 MB

Dynamic Searchable Encryption with Optimal Search in the Presence of Deletions.mp4

13.3 MB

Efficient Differentially Private Secure Aggregation for Federated Learning.mp4

12.3 MB

Efficient Representation of Numerical Optimization Problems for SNARKs.mp4

9.5 MB

Elasticlave An Efficient Memory Model for Enclaves.mp4

8.3 MB

Electronic Monitoring Smartphone Apps An Analysis of Risks from Technical,.mp4

8.0 MB

Empirical Understanding of Deletion Privacy Experiences, Expectations, and.mp4

10.7 MB

End-to-Same-End Encryption Modularly Augmenting an App with an Efficient.mp4

18.1 MB

Estimating Incidental Collection in Foreign Intelligence Surveillance.mp4

11.1 MB

Expected Exploitability Predicting the Development of Functional.mp4

11.1 MB

Experimental Security Analysis of the App Model in Business Collaboration.mp4

8.3 MB

Experimenting with Collaborative zk-SNARKs Zero-Knowledge Proofs for.mp4

9.0 MB

Exploring the Security Boundary of Data Reconstruction via Neuron Exclusivity.mp4

11.1 MB

Exploring the Unchartered Space of Container Registry Typosquatting.mp4

13.0 MB

Faster Yet Safer Logging System Via Fixed-Key Blockcipher.mp4

8.9 MB

Ferry State-Aware Symbolic Execution for Exploring State-Dependent Program.mp4

12.3 MB

FIXREVERTER A Realistic Bug Injection Methodology for Benchmarking Fuzz.mp4

12.8 MB

FLAME Taming Backdoors in Federated Learning.mp4

9.0 MB

FlowMatrix GPU-Assisted Information-Flow Analysis through Matrix-Based.mp4

9.4 MB

FOAP Fine-Grained Open-World Android App Fingerprinting.mp4

9.8 MB

FRAMESHIFTER Security Implications of HTTP 2-to-HTTP 1 Conversion Anomalies.mp4

7.9 MB

FReD Identifying File Re-Delegation in Android System Services.mp4

11.8 MB

FreeWill Automatically Diagnosing Use-after-free Bugs via Reference.mp4

8.7 MB

FUGIO Automatic Exploit Generation for PHP Object Injection Vulnerabilities.mp4

9.3 MB

Fuzzing Hardware Like Software.mp4

13.5 MB

FuzzOrigin Detecting UXSS vulnerabilities in Browsers through Origin Fuzzing.mp4

8.1 MB

Fuzzware Using Precise MMIO Modeling for Effective Firmware Fuzzing.mp4

8.7 MB

GAROTA Generalized Active Root-Of-Trust Architecture.mp4

12.0 MB

GET - out Automated Discovery of Application-Layer Censorship Evasion.mp4

10.4 MB

Ghost Peak Practical Distance Reduction Attacks Against HRP UWB Ranging.mp4

9.5 MB

GhostTouch Targeted Attacks on Touchscreens without Physical Touch.mp4

7.7 MB

Gossamer Securely Measuring Password-based Logins.mp4

8.1 MB

GPU-accelerated PIR with Client-Independent Preprocessing for Large-Scale.mp4

11.6 MB

Ground Truth for Binary Disassembly is Not Easy.mp4

10.9 MB

Half-Double Hammering From the Next Row Over.mp4

9.4 MB

Hand Me Your PIN Inferring ATM PINs of Users Typing with a Covered Hand.mp4

10.1 MB

Hecate Abuse Reporting in Secure Messengers with Sealed Sender.mp4

9.2 MB

Helping hands Measuring the impact of a large threat intelligence sharing.mp4

9.6 MB

Hidden Trigger Backdoor Attack on NLP Models via Linguistic Style Manipulation.mp4

8.4 MB

Hiding in Plain Sight On the Efficacy of Power Side Channel-Based Control.mp4

10.4 MB

Holistic Control-Flow Protection on Real-Time Embedded Systems with Kage.mp4

12.2 MB

How and Why People Use Virtual Private Networks.mp4

10.0 MB

How Are Your Zombie Accounts Understanding Users' Practices & Expectations.mp4

10.4 MB

How Do You Not Lose Friends - Synthesizing a Design Space of Social Controls.mp4

12.8 MB

How Long Do Vulnerabilities Live in the Code A Large-Scale Empirical.mp4

11.5 MB

How Machine Learning Is Solving the Binary Function Similarity Problem.mp4

9.4 MB

How to Abuse and Fix Authenticated Encryption Without Key Commitment.mp4

10.3 MB

How to Peel a Million Validating and Expanding Bitcoin Clusters.mp4

9.0 MB

HyperDegrade From GHz to MHz Effective CPU Frequencies.mp4

8.4 MB

Hyperproofs Aggregating and Main'taining Proofs in Vector Commitments.mp4

11.4 MB

I feel invaded, annoyed, anxious and I may protect myself.mp4

9.8 MB

Identity Confusion in WebView-based Mobile App-in-app Ecosystems.mp4

9.3 MB

IHOP Improved Statistical Query Recovery against Searchable Symmetric.mp4

11.9 MB

Increasing Adversarial Uncertain'ty to Scale Private Similarity Testing.mp4

9.0 MB

Incremental Offline Online PIR.mp4

9.3 MB

Inference Attacks Against Graph Neural Networks.mp4

11.8 MB

Inferring Phishing Intention via Webpage Appearance and Dynamics.mp4

10.5 MB

In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer.mp4

9.3 MB

Investigating State-of-the-Art Practices for Fostering Subjective Trust in.mp4

5.9 MB

Jenny Securing Syscalls for PKU-based Memory Isolation Systems.mp4

5.6 MB

Khaleesi Breaker of Advertising and Tracking Request Chains.mp4

12.1 MB

Label Inference Attacks Against Vertical Federated Learning.mp4

14.2 MB

Lamphone Passive Sound Recovery from a Desk Lamp's Light Bulb Vibrations.mp4

13.4 MB

Leaky Forms A Study of Email and Password Exfiltration Before Form Submission.mp4

10.2 MB

Lend Me Your Ear Passive Remote Physical Side Channels on PCs.mp4

11.1 MB

Like Lesbians Walking the Perimeter - Experiences of U.S. LGBTQ Folks.mp4

8.0 MB

LinKRID Vetting Imbalance Reference Counting in Linux kernel with Symbolic.mp4

11.9 MB

Loki Hardening Code Obfuscation Against Automated Attacks.mp4

7.2 MB

LTrack Stealthy Tracking of Mobile Phones in LTE.mp4

10.4 MB

Lumos Identifying and Localizing Diverse Hidden IoT Devices.mp4

11.6 MB

MaDIoT 2.0 Modern High-Wattage IoT Botnet Attacks and Defenses.mp4

13.8 MB

MAGE Mutual Attestation for a Group of Enclaves without Trusted Third Parties.mp4

7.8 MB

Many Roads Lead To Rome How Packet Headers Influence DNS Censorship.mp4

11.6 MB

Measurement by Proxy On the Accuracy of Online Marketplace Measurements.mp4

8.8 MB

Membership Inference Attacks and Defenses in Neural Network Pruning.mp4

11.8 MB

Midas Systematic Kernel TOCTTOU Protection.mp4

9.5 MB

Might I Get Pwned A Second Generation Compromised Credential Checking Service.mp4

7.8 MB

Minefield A Software-only Protection for SGX Enclaves against DVFS Attacks.mp4

7.3 MB

Mining Node.js Vulnerabilities via Object Dependence Graph and Query.mp4

11.0 MB

Mistrust Plugins You Must A Large-Scale Study Of Malicious Plugins.mp4

15.3 MB

Mitigating Membership Inference Attacks by Self-Distillation Through a Novel.mp4

8.4 MB

ML-Doctor Holistic Risk Assessment of Inference Attacks Against Machine.mp4

10.6 MB

Morphuzz Bending (Input) Space to Fuzz Virtual Devices.mp4

13.3 MB

MOVERY A Precise Approach for Modified Vulnerable Code Clone Discovery from.mp4

10.2 MB

MundoFuzz Hypervisor Fuzzing with Statistical Coverage Testing and Grammar.mp4

8.3 MB

Neither Access nor Control A Longitudinal Investigation of the Efficacy.mp4

9.7 MB

Networks of Care Tech Abuse Advocates' Digital Security Practices.mp4

9.1 MB

Off-Path Network Traffic Manipulation via Revitalized ICMP Redirect Attacks.mp4

13.6 MB

OK, Siri - or - Hey, Google - Evaluating Voiceprint Distinctiveness via.mp4

10.5 MB

Omnes pro uno Practical Multi-Writer Encrypted Database.mp4

17.5 MB

On the Necessity of Auditable Algorithmic Definitions for Machine Unlearning.mp4

7.8 MB

On the Security Risks of AutoML.mp4

9.0 MB

One-off Disclosure Control by Heterogeneous Generalization.mp4

12.3 MB

Online Website Fingerprinting Evaluating Website Fingerprinting Attacks.mp4

13.6 MB

Oops Code Execution and Content Spoofing The First Comprehensive Analysis.mp4

10.4 MB

Open to a fault On the passive compromise of TLS keys via transient errors.mp4

12.9 MB

OpenSSLNTRU Faster post-quantum TLS key exchange.mp4

14.5 MB

OpenVPN is Open to VPN Fingerprinting.mp4

11.9 MB

Orca Blocklisting in Sender-Anonymous Messaging.mp4

12.7 MB

OS-Aware Vulnerability Prioritization via Differential Severity Analysis.mp4

11.1 MB

OVRseen Auditing Network Traffic and Privacy Policies in Oculus VR.mp4

11.7 MB

Pacer Comprehensive Network Side-Channel Mitigation in the Cloud.mp4

13.3 MB

PatchCleanser Certifiably Robust Defense against Adversarial Patches.mp4

11.7 MB

Phish in Sheep's Clothing Exploring the Authentication Pitfalls.mp4

13.3 MB

Physical-Layer Attacks Against Pulse Width Modulation-Controlled Actuators.mp4

12.2 MB

Piranha A GPU Platform for Secure Computation.mp4

10.8 MB

PISTIS Trusted Computing Architecture for Low-end Embedded Systems.mp4

11.1 MB

Playing for K(H)eaps Understanding and Improving Linux Kernel Exploit.mp4

8.1 MB

Playing Without Paying Detecting Vulnerable Payment Verification in Native.mp4

9.7 MB

Poison Forensics Traceback of Data Poisoning Attacks in Neural Networks.mp4

11.7 MB

PoisonedEncoder Poisoning the Unlabeled Pre-training Data in Contrastive.mp4

7.4 MB

Poisoning Attacks to Local Differential Privacy Protocols for Key-Value Data.mp4

12.1 MB

PolyCruise A Cross-Language Dynamic Information Flow Analysis.mp4

9.9 MB

Polynomial Commitment with a One-to-Many Prover and Applications.mp4

10.4 MB

Pool Inference Attacks on Local Differential Privacy.mp4

13.5 MB

Post-Quantum Cryptography with Contemporary Co-Processors Beyond Kronecker,.mp4

11.8 MB

ppSAT Towards Two-Party Private SAT Solving.mp4

10.5 MB

Practical Data Access Minimization in Trigger-Action Platforms.mp4

8.2 MB

Practical Privacy-Preserving Authentication for SSH.mp4

10.4 MB

Pre-hijacked accounts An Empirical Study of Security Failures in User Account.mp4

8.2 MB

Private Signaling.mp4

11.0 MB

PrivGuard Privacy Regulation Compliance Made Easier.mp4

7.8 MB

ProFactory Improving IoT Security via Formalized Protocol Customization.mp4

11.1 MB

Provably-Safe Multilingual Software Sandboxing using WebAssembly.mp4

9.9 MB

QCSD A QUIC Client-Side Website-Fingerprinting Defence Framework.mp4

11.3 MB

QuORAM A Quorum-Replicated Fault Tolerant ORAM Datastore.mp4

11.0 MB

Rapid Prototyping for Microarchitectural Attacks.mp4

11.8 MB

RapidPatch Firmware Hotpatching for Real-Time Embedded Devices.mp4

12.0 MB

RegexScalpel Regular Expression Denial of Service (ReDoS) Defense by.mp4

8.8 MB

Regulator Dynamic Analysis to Detect ReDoS.mp4

12.8 MB

RE-Mind a First Look Inside the Mind of a Reverse Engineer.mp4

10.2 MB

Rendering Contention Channel Made Practical in Web Browsers.mp4

8.6 MB

Repurposing Segmentation as a Practical LVI-NULL Mitigation in SGX.mp4

7.8 MB

RETBLEED Arbitrary Speculative Code Execution with Return Instructions.mp4

9.4 MB

ReZone Disarming TrustZone with TEE Privilege Reduction.mp4

9.1 MB

Rolling Colors Adversarial Laser Exploits against Traffic Light Recognition.mp4

12.8 MB

SAID State-aware Defense Against Injection Attacks on In-vehicle Network.mp4

10.8 MB

SAPIC protocol verifiers of the world, unite.mp4

9.9 MB

SARA Secure Android Remote Authorization.mp4

10.6 MB

SCRAPS Scalable Collective Remote Attestation for Pub-Sub IoT Networks with.mp4

10.0 MB

SecSMT Securing SMT Processors against Contention-Based Covert Channels.mp4

7.8 MB

Secure Poisson Regression.mp4

10.7 MB

Security Analysis of Camera-LiDAR Fusion Against Black-Box Attacks.mp4

14.3 MB

Security and Privacy Perceptions of Third-Party Application Access for Google.mp4

8.8 MB

Security at the End of the Tunnel The Anatomy of VPN Mental Models Among.mp4

10.9 MB

Seeing is Living Rethinking the Security of Facial Liveness Verification.mp4

10.5 MB

Seeing the Forest for the Trees Understanding Security Hazards in the 3GPP.mp4

7.5 MB

SGXFuzz Efficiently Synthesizing Nested Structures for SGX Enclave Fuzzing.mp4

7.5 MB

SGXLock Towards Efficiently Establishing Mutual Distrust Between Host.mp4

7.6 MB

Shuffle-based Private Set Union Faster and More Secure.mp4

9.8 MB

SIMC ML Inference Secure Against Malicious Clients at Semi-Honest Cost.mp4

20.1 MB

SkillDetective Automated Policy-Violation Detection of Voice Assistant.mp4

16.3 MB

Smart Home Privacy Policies Demystified A Study of Availability, Content, and.mp4

12.9 MB

Spoki Unveiling a New Wave of Scanners through a Reactive Network Telescope.mp4

9.5 MB

Stalloris RPKI Downgrade Attack.mp4

9.8 MB

Stateful Greybox Fuzzing.mp4

10.0 MB

StateFuzz System Call-Based State-Aware Linux Driver Fuzzing.mp4

11.2 MB

Stick It to The Man Correcting for Non-Cooperative Behavior of Subjects in.mp4

10.4 MB

SWAPP A New Programmable Playground for Web Application Security.mp4

7.7 MB

SYMSAN Time and Space Efficient Concolic Execution via Dynamic Data-flow.mp4

7.1 MB

Synthetic Data - Anonymisation Groundhog Day.mp4

6.4 MB

SyzScope Revealing High-Risk Security Impacts of Fuzzer-Exposed Bugs in Linux.mp4

15.2 MB

Targeted Deanonymization via the Cache Side Channel Attacks and Defenses.mp4

8.0 MB

Teacher Model Fingerprinting Attacks Against Transfer Learning.mp4

9.4 MB

The Dangers of Human Touch Fingerprinting Browser Extensions through.mp4

11.5 MB

The Same PIN, Just Longer - On the (In)Security of Upgrading PINs from 4 to.mp4

10.4 MB

The Security Lottery Measuring Client-Side Web Security Inconsistencies.mp4

11.0 MB

TheHuzz Instruction Fuzzing of Processors Using Golden-Reference Models for.mp4

14.3 MB

Themis Accelerating the Detection of Route Origin Hijacking by Distinguishing.mp4

9.5 MB

They Look at Vulnerability and Use That to Abuse You.mp4

10.6 MB

Tightly Seal Your Sensitive Pointers with PACTight.mp4

10.3 MB

TLS-Anvil Adapting Combinatorial Testing for TLS Libraries.mp4

6.7 MB

Total Eclipse of the Heart - Disrupting the InterPlanetary File System.mp4

9.5 MB

Towards Automatically Reverse Engineering Vehicle Diagnostic Protocols.mp4

12.0 MB

Towards More Robust Keyword Spotting for Voice Assistants.mp4

9.7 MB

Transferring Adversarial Robustness Through Robust Representation Matching.mp4

11.4 MB

Trust Dies in Darkness Shedding Light on Samsung's TrustZone Keymaster Design.mp4

10.6 MB

Twilight A Differentially Private Payment Channel Network.mp4

10.3 MB

Under the Hood of DANE Mismanagement in SMTP.mp4

11.9 MB

Understanding and Improving Usability of Data Dashboards for Simplified.mp4

9.3 MB

Uninvited Guests Analyzing the Identity and Behavior of Certificate.mp4

6.2 MB

Unleash the Simulacrum Shifting Browser Realities for Robust.mp4

8.2 MB

USENIX Security '22- The Antrim County 2020 Election Incident An Independent Forensic Investigation.mp4

13.6 MB

USENIX Security '22- TLB - DR Enhancing TLB-based Attacks with TLB Desynchronized Reverse Engineering.mp4

8.3 MB

USENIX Security '22-Hertzbleed Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86.mp4

11.6 MB

Using Trātṛ to tame Adversarial Synchronization.mp4

14.7 MB

V'CER Efficient Certificate Validation in Constrained Networks.mp4

11.5 MB

VerLoc Verifiable Localization in Decentralized Systems.mp4

10.2 MB

Watching the watchers bias and vulnerability in remote proctoring software.mp4

9.9 MB

Watching the Watchers Practical Video Identification Attack in LTE Networks.mp4

12.2 MB

Web Cache Deception Escalates.mp4

10.1 MB

WebGraph Capturing Advertising and Tracking Information Flows.mp4

9.2 MB

When Sally Met Trackers Web Tracking From the Users' Perspective.mp4

8.0 MB

Where to Recruit for Security Development Studies Comparing Six Software.mp4

8.7 MB

Who Are You (I Really Wanna Know) Detecting Audio DeepFakes Through Vocal.mp4

18.4 MB

Why Users (Don't) Use Password Managers at a Large Educational Institution.mp4

10.2 MB

XDRI Attacks - and - How to Enhance Resilience of Residential Routers.mp4

12.6 MB

Your Microphone Array Retains Your Identity A Robust Voice Liveness.mp4

11.1 MB

Zero-Knowledge Middleboxes.mp4

8.9 MB

/.../USENIX Security 2022 captions/

99% False Positives A Qualitative Study of SOC Analysts' Perspectives.eng.srt

25.1 KB

A Hardware-Software Co-design for Efficient Intra-Enclave Isolation.eng.json

320.6 KB

A Hardware-Software Co-design for Efficient Intra-Enclave Isolation.eng.lrc

9.1 KB

A Hardware-Software Co-design for Efficient Intra-Enclave Isolation.eng.srt

9.5 KB

A Hardware-Software Co-design for Efficient Intra-Enclave Isolation.eng.text

7.1 KB

A Hardware-Software Co-design for Efficient Intra-Enclave Isolation.eng.tsv

8.2 KB

A Hardware-Software Co-design for Efficient Intra-Enclave Isolation.eng.txt

9.2 KB

A Hardware-Software Co-design for Efficient Intra-Enclave Isolation.eng.vtt

8.9 KB

A Large-scale and Longitudinal Measurement Study of DKIM Deployment.eng.srt

18.0 KB

A Large-scale Investigation into Geodifferences in Mobile Apps.eng.srt

20.3 KB

A Large-scale Temporal Measurement of Android Malicious Apps.eng.srt

18.3 KB

Aardvark An Asynchronous Authenticated Dictionary with Applications to.eng.srt

22.9 KB

Adversarial Detection Avoidance Attacks Evaluating the robustness.eng.srt

26.8 KB

ÆPIC Leak Architecturally Leaking Uninitialized Data from the.eng.srt

23.2 KB

ALASTOR Reconstructing the Provenance of Serverless Intrusions.eng.srt

19.1 KB

AMD Prefetch Attacks through Power and Time.eng.json

547.9 KB

AMD Prefetch Attacks through Power and Time.eng.lrc

16.1 KB

AMD Prefetch Attacks through Power and Time.eng.srt

13.0 KB

AMD Prefetch Attacks through Power and Time.eng.text

9.9 KB

AMD Prefetch Attacks through Power and Time.eng.tsv

13.2 KB

AMD Prefetch Attacks through Power and Time.eng.txt

16.3 KB

AMD Prefetch Attacks through Power and Time.eng.vtt

12.1 KB

AmpFuzz Fuzzing for Amplification DDoS Vulnerabilities.eng.srt

23.3 KB

An Audit of Facebook's Political Ad Policy Enforcement.eng.json

518.0 KB

An Audit of Facebook's Political Ad Policy Enforcement.eng.lrc

15.4 KB

An Audit of Facebook's Political Ad Policy Enforcement.eng.srt

13.0 KB

An Audit of Facebook's Political Ad Policy Enforcement.eng.text

9.7 KB

An Audit of Facebook's Political Ad Policy Enforcement.eng.tsv

12.7 KB

An Audit of Facebook's Political Ad Policy Enforcement.eng.txt

15.6 KB

An Audit of Facebook's Political Ad Policy Enforcement.eng.vtt

12.1 KB

An Experimental Study of GPS Spoofing and Takeover Attacks on UAVs.eng.srt

22.7 KB

Anycast Agility Network Playbooks to Fight DDoS.eng.srt

20.5 KB

Arbiter Bridging the Static and Dynamic Divide in Vulnerability Discovery.eng.json

541.8 KB

Arbiter Bridging the Static and Dynamic Divide in Vulnerability Discovery.eng.lrc

16.5 KB

Arbiter Bridging the Static and Dynamic Divide in Vulnerability Discovery.eng.srt

12.9 KB

Arbiter Bridging the Static and Dynamic Divide in Vulnerability Discovery.eng.text

10.3 KB

Arbiter Bridging the Static and Dynamic Divide in Vulnerability Discovery.eng.tsv

13.6 KB

Arbiter Bridging the Static and Dynamic Divide in Vulnerability Discovery.eng.txt

16.7 KB

Arbiter Bridging the Static and Dynamic Divide in Vulnerability Discovery.eng.vtt

12.2 KB

Are Your Sensitive Attributes Private Novel Model Inversion Attribute.eng.srt

25.8 KB

Attacks on Deidentification's Defenses.eng.srt

25.8 KB

Augmenting Decompiler Output with Learned Variable Names and Types.eng.srt

21.1 KB

AutoDA Automated Decision-based Iterative Adversarial Attacks.eng.srt

20.7 KB

Automated Detection of Automated Traffic.eng.srt

30.6 KB

Automated Side Channel Analysis of Media Software with Manifold Learning.eng.srt

19.1 KB

Automating Cookie Consent and GDPR Violation Detection.eng.srt

24.2 KB

Backporting Security Patches of Web Applications A Prototype Design.eng.srt

21.8 KB

Back-Propagating System Dependency Impact for Attack Investigation.eng.srt

20.5 KB

Batched Differentially Private Information Retrieval.eng.srt

27.0 KB

Bedrock Programmable Network Support for Secure RDMA Systems.eng.srt

19.2 KB

Behind the Tube Exploitative Monetization of Content on YouTube.eng.json

540.3 KB

Behind the Tube Exploitative Monetization of Content on YouTube.eng.lrc

15.1 KB

Behind the Tube Exploitative Monetization of Content on YouTube.eng.srt

15.5 KB

Behind the Tube Exploitative Monetization of Content on YouTube.eng.text

11.8 KB

Behind the Tube Exploitative Monetization of Content on YouTube.eng.tsv

13.6 KB

Behind the Tube Exploitative Monetization of Content on YouTube.eng.txt

15.3 KB

Behind the Tube Exploitative Monetization of Content on YouTube.eng.vtt

14.5 KB

Binoculars Contention-Based Side-Channel Attacks Exploiting the Page Walker.eng.json

613.1 KB

Binoculars Contention-Based Side-Channel Attacks Exploiting the Page Walker.eng.lrc

18.1 KB

Binoculars Contention-Based Side-Channel Attacks Exploiting the Page Walker.eng.srt

14.6 KB

Binoculars Contention-Based Side-Channel Attacks Exploiting the Page Walker.eng.text

11.1 KB

Binoculars Contention-Based Side-Channel Attacks Exploiting the Page Walker.eng.tsv

14.8 KB

Binoculars Contention-Based Side-Channel Attacks Exploiting the Page Walker.eng.txt

18.3 KB

Binoculars Contention-Based Side-Channel Attacks Exploiting the Page Walker.eng.vtt

13.6 KB

Birds of a Feather Flock Together How Set Bias Helps to Deanonymize You.eng.srt

17.3 KB

Blacklight Scalable Defense for Neural Networks against Query-Based Black-Box.eng.srt

15.9 KB

BrakTooth Causing Havoc on Bluetooth Link Manager via Directed Fuzzing.eng.json

843.3 KB

BrakTooth Causing Havoc on Bluetooth Link Manager via Directed Fuzzing.eng.lrc

23.3 KB

BrakTooth Causing Havoc on Bluetooth Link Manager via Directed Fuzzing.eng.srt

19.9 KB

BrakTooth Causing Havoc on Bluetooth Link Manager via Directed Fuzzing.eng.text

15.4 KB

BrakTooth Causing Havoc on Bluetooth Link Manager via Directed Fuzzing.eng.tsv

19.6 KB

BrakTooth Causing Havoc on Bluetooth Link Manager via Directed Fuzzing.eng.txt

23.6 KB

BrakTooth Causing Havoc on Bluetooth Link Manager via Directed Fuzzing.eng.vtt

18.6 KB

Branch History Injection On the Effectiveness of Hardware Mitigations.eng.json

618.2 KB

Branch History Injection On the Effectiveness of Hardware Mitigations.eng.lrc

16.9 KB

Branch History Injection On the Effectiveness of Hardware Mitigations.eng.srt

14.5 KB

Branch History Injection On the Effectiveness of Hardware Mitigations.eng.text

11.0 KB

Branch History Injection On the Effectiveness of Hardware Mitigations.eng.tsv

14.2 KB

Branch History Injection On the Effectiveness of Hardware Mitigations.eng.txt

17.2 KB

Branch History Injection On the Effectiveness of Hardware Mitigations.eng.vtt

13.5 KB

Breaking Bridgefy, again Adopting libsignal is not enough.eng.srt

17.3 KB

Building an Open, Robust, and Stable Voting-Based Domain Top List.eng.srt

19.3 KB

CamShield Securing Smart Cameras through Physical Replication and Isolation.eng.srt

18.4 KB

Can one hear the shape of a neural network Snooping the GPU via Magnetic.eng.srt

24.3 KB

Caring about Sharing User Perceptions of Multiparty Data Sharing.eng.srt

22.1 KB

CellIFT Leveraging Cells for Scalable and Precise Dynamic Information Flow.eng.srt

22.6 KB

Characterizing the Security of Github CI Workflows.eng.srt

20.9 KB

Cheetah Lean and Fast Secure Two-Party Deep Neural Network Inference.eng.json

429.8 KB

Cheetah Lean and Fast Secure Two-Party Deep Neural Network Inference.eng.lrc

11.5 KB

Cheetah Lean and Fast Secure Two-Party Deep Neural Network Inference.eng.srt

12.2 KB

Cheetah Lean and Fast Secure Two-Party Deep Neural Network Inference.eng.text

8.8 KB

Cheetah Lean and Fast Secure Two-Party Deep Neural Network Inference.eng.tsv

10.2 KB

Cheetah Lean and Fast Secure Two-Party Deep Neural Network Inference.eng.txt

11.6 KB

Cheetah Lean and Fast Secure Two-Party Deep Neural Network Inference.eng.vtt

11.3 KB

Communication-Efficient Triangle Counting under Local Differential Privacy.eng.srt

18.2 KB

Composable Cachelets Protecting Enclaves from Cache Side-Channel Attacks.eng.srt

18.7 KB

COMRace Detecting Data Race Vulnerabilities in COM Objects.eng.srt

23.5 KB

Constant-weight PIR Single-round Keyword PIR via Constant-weight Equality.eng.srt

26.0 KB

Counting in Regexes Considered Harmful Exposing ReDoS Vulnerability of.eng.srt

23.7 KB

Creating a Secure Underlay for the Internet.eng.srt

24.6 KB

Debloating Address Sanitizer.eng.srt

17.0 KB

Decomperson How Humans Decompile and What We Can Learn From It.eng.srt

26.2 KB

DeepDi Learning a Relational Graph Convolutional Network Model on Instruction.eng.srt

18.4 KB

DeepPhish Understanding User Trust Towards Artificially Generated Profiles.eng.json

656.4 KB

DeepPhish Understanding User Trust Towards Artificially Generated Profiles.eng.lrc

21.1 KB

DeepPhish Understanding User Trust Towards Artificially Generated Profiles.eng.srt

16.4 KB

DeepPhish Understanding User Trust Towards Artificially Generated Profiles.eng.text

13.1 KB

DeepPhish Understanding User Trust Towards Artificially Generated Profiles.eng.tsv

17.3 KB

DeepPhish Understanding User Trust Towards Artificially Generated Profiles.eng.txt

21.4 KB

DeepPhish Understanding User Trust Towards Artificially Generated Profiles.eng.vtt

15.5 KB

Detecting Logical Bugs of DBMS with Coverage-based Guidance.eng.srt

20.9 KB

DnD A Cross-Architecture Deep Neural Network Decompiler.eng.srt

18.3 KB

DoLTEst In-depth Downlink Negative Testing Framework for LTE Devices.eng.srt

15.7 KB

Don't Mesh Around Side-Channel Attacks and Mitigations on Mesh Interconnects.eng.srt

30.2 KB

Dos and Don'ts of Machine Learning in Computer Security.eng.srt

24.1 KB

Double Trouble Combined Heterogeneous Attacks on Non-Inclusive Cache.eng.srt

23.5 KB

DoubleStar Long-Range Attack Towards Depth Estimation based Obstacle.eng.srt

21.5 KB

Drifuzz Harvesting Bugs in Device Drivers from Golden Seeds.eng.json

410.3 KB

Drifuzz Harvesting Bugs in Device Drivers from Golden Seeds.eng.lrc

11.1 KB

Drifuzz Harvesting Bugs in Device Drivers from Golden Seeds.eng.srt

11.6 KB

Drifuzz Harvesting Bugs in Device Drivers from Golden Seeds.eng.text

8.5 KB

Drifuzz Harvesting Bugs in Device Drivers from Golden Seeds.eng.tsv

9.9 KB

Drifuzz Harvesting Bugs in Device Drivers from Golden Seeds.eng.txt

11.2 KB

Drifuzz Harvesting Bugs in Device Drivers from Golden Seeds.eng.vtt

10.8 KB

Dynamic Searchable Encryption with Optimal Search in the Presence of Deletions.eng.srt

24.7 KB

Efficient Differentially Private Secure Aggregation for Federated Learning.eng.srt

20.7 KB

Efficient Representation of Numerical Optimization Problems for SNARKs.eng.srt

23.7 KB

Elasticlave An Efficient Memory Model for Enclaves.eng.srt

26.3 KB

Electronic Monitoring Smartphone Apps An Analysis of Risks from Technical,.eng.srt

25.5 KB

Empirical Understanding of Deletion Privacy Experiences, Expectations, and.eng.srt

25.0 KB

End-to-Same-End Encryption Modularly Augmenting an App with an Efficient.eng.srt

27.9 KB

Estimating Incidental Collection in Foreign Intelligence Surveillance.eng.srt

22.8 KB

Expected Exploitability Predicting the Development of Functional.eng.json

601.3 KB

Expected Exploitability Predicting the Development of Functional.eng.lrc

19.1 KB

Expected Exploitability Predicting the Development of Functional.eng.srt

14.9 KB

Expected Exploitability Predicting the Development of Functional.eng.text

11.8 KB

Expected Exploitability Predicting the Development of Functional.eng.tsv

15.7 KB

Expected Exploitability Predicting the Development of Functional.eng.txt

19.4 KB

Expected Exploitability Predicting the Development of Functional.eng.vtt

14.0 KB

Experimental Security Analysis of the App Model in Business Collaboration.eng.srt

20.9 KB

Experimenting with Collaborative zk-SNARKs Zero-Knowledge Proofs for.eng.srt

28.3 KB

Exploring the Security Boundary of Data Reconstruction via Neuron Exclusivity.eng.srt

23.6 KB

Exploring the Unchartered Space of Container Registry Typosquatting.eng.json

464.3 KB

Exploring the Unchartered Space of Container Registry Typosquatting.eng.lrc

13.7 KB

Exploring the Unchartered Space of Container Registry Typosquatting.eng.srt

11.2 KB

Exploring the Unchartered Space of Container Registry Typosquatting.eng.text

8.5 KB

Exploring the Unchartered Space of Container Registry Typosquatting.eng.tsv

11.3 KB

Exploring the Unchartered Space of Container Registry Typosquatting.eng.txt

13.9 KB

Exploring the Unchartered Space of Container Registry Typosquatting.eng.vtt

10.5 KB

Faster Yet Safer Logging System Via Fixed-Key Blockcipher.eng.srt

15.6 KB

Ferry State-Aware Symbolic Execution for Exploring State-Dependent Program.eng.srt

21.8 KB

FIXREVERTER A Realistic Bug Injection Methodology for Benchmarking Fuzz.eng.srt

19.0 KB

FLAME Taming Backdoors in Federated Learning.eng.srt

14.2 KB

FlowMatrix GPU-Assisted Information-Flow Analysis through Matrix-Based.eng.srt

21.5 KB

FOAP Fine-Grained Open-World Android App Fingerprinting.eng.srt

16.6 KB

FRAMESHIFTER Security Implications of HTTP 2-to-HTTP 1 Conversion Anomalies.eng.json

424.3 KB

FRAMESHIFTER Security Implications of HTTP 2-to-HTTP 1 Conversion Anomalies.eng.lrc

11.2 KB

FRAMESHIFTER Security Implications of HTTP 2-to-HTTP 1 Conversion Anomalies.eng.srt

12.1 KB

FRAMESHIFTER Security Implications of HTTP 2-to-HTTP 1 Conversion Anomalies.eng.text

8.7 KB

FRAMESHIFTER Security Implications of HTTP 2-to-HTTP 1 Conversion Anomalies.eng.tsv

10.0 KB

FRAMESHIFTER Security Implications of HTTP 2-to-HTTP 1 Conversion Anomalies.eng.txt

11.3 KB

FRAMESHIFTER Security Implications of HTTP 2-to-HTTP 1 Conversion Anomalies.eng.vtt

11.2 KB

FReD Identifying File Re-Delegation in Android System Services.eng.srt

27.8 KB

FreeWill Automatically Diagnosing Use-after-free Bugs via Reference.eng.srt

23.7 KB

FUGIO Automatic Exploit Generation for PHP Object Injection Vulnerabilities.eng.srt

19.0 KB

Fuzzing Hardware Like Software.eng.srt

22.8 KB

FuzzOrigin Detecting UXSS vulnerabilities in Browsers through Origin Fuzzing.eng.srt

16.0 KB

Fuzzware Using Precise MMIO Modeling for Effective Firmware Fuzzing.eng.srt

18.4 KB

GAROTA Generalized Active Root-Of-Trust Architecture.eng.srt

24.1 KB

GET - out Automated Discovery of Application-Layer Censorship Evasion.eng.srt

23.4 KB

Ghost Peak Practical Distance Reduction Attacks Against HRP UWB Ranging.eng.srt

16.6 KB

GhostTouch Targeted Attacks on Touchscreens without Physical Touch.eng.srt

16.0 KB

Gossamer Securely Measuring Password-based Logins.eng.srt

22.5 KB

GPU-accelerated PIR with Client-Independent Preprocessing for Large-Scale.eng.srt

20.5 KB

Ground Truth for Binary Disassembly is Not Easy.eng.srt

19.1 KB

Half-Double Hammering From the Next Row Over.eng.srt

22.0 KB

Hand Me Your PIN Inferring ATM PINs of Users Typing with a Covered Hand.eng.srt

19.9 KB

Hecate Abuse Reporting in Secure Messengers with Sealed Sender.eng.srt

23.3 KB

Helping hands Measuring the impact of a large threat intelligence sharing.eng.srt

20.7 KB

Hidden Trigger Backdoor Attack on NLP Models via Linguistic Style Manipulation.eng.srt

21.4 KB

Hiding in Plain Sight On the Efficacy of Power Side Channel-Based Control.eng.srt

21.1 KB

Holistic Control-Flow Protection on Real-Time Embedded Systems with Kage.eng.srt

19.7 KB

How and Why People Use Virtual Private Networks.eng.srt

20.9 KB

How Are Your Zombie Accounts Understanding Users' Practices & Expectations.eng.srt

19.2 KB

How Do You Not Lose Friends - Synthesizing a Design Space of Social Controls.eng.srt

19.9 KB

How Long Do Vulnerabilities Live in the Code A Large-Scale Empirical.eng.srt

21.5 KB

How Machine Learning Is Solving the Binary Function Similarity Problem.eng.srt

19.2 KB

How to Abuse and Fix Authenticated Encryption Without Key Commitment.eng.srt

22.9 KB

How to Peel a Million Validating and Expanding Bitcoin Clusters.eng.srt

29.5 KB

HyperDegrade From GHz to MHz Effective CPU Frequencies.eng.srt

16.2 KB

Hyperproofs Aggregating and Main'taining Proofs in Vector Commitments.eng.srt

23.2 KB

I feel invaded, annoyed, anxious and I may protect myself.eng.srt

23.5 KB

Identity Confusion in WebView-based Mobile App-in-app Ecosystems.eng.srt

18.4 KB

IHOP Improved Statistical Query Recovery against Searchable Symmetric.eng.srt

23.9 KB

Increasing Adversarial Uncertain'ty to Scale Private Similarity Testing.eng.srt

24.4 KB

Incremental Offline Online PIR.eng.json

494.7 KB

Incremental Offline Online PIR.eng.lrc

12.6 KB

Incremental Offline Online PIR.eng.srt

13.1 KB

Incremental Offline Online PIR.eng.text

9.9 KB

Incremental Offline Online PIR.eng.tsv

11.3 KB

Incremental Offline Online PIR.eng.txt

12.7 KB

Incremental Offline Online PIR.eng.vtt

12.3 KB

Inference Attacks Against Graph Neural Networks.eng.srt

20.6 KB

Inferring Phishing Intention via Webpage Appearance and Dynamics.eng.srt

19.5 KB

In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer.eng.json

356.9 KB

In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer.eng.lrc

9.7 KB

In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer.eng.srt

10.3 KB

In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer.eng.text

7.2 KB

In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer.eng.tsv

8.5 KB

In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer.eng.txt

9.8 KB

In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer.eng.vtt

9.5 KB

Investigating State-of-the-Art Practices for Fostering Subjective Trust in.eng.srt

17.0 KB

Jenny Securing Syscalls for PKU-based Memory Isolation Systems.eng.srt

16.1 KB

Khaleesi Breaker of Advertising and Tracking Request Chains.eng.srt

22.7 KB

Label Inference Attacks Against Vertical Federated Learning.eng.srt

17.4 KB

Lamphone Passive Sound Recovery from a Desk Lamp's Light Bulb Vibrations.eng.srt

24.9 KB

Leaky Forms A Study of Email and Password Exfiltration Before Form Submission.eng.json

480.4 KB

Leaky Forms A Study of Email and Password Exfiltration Before Form Submission.eng.lrc

13.1 KB

Leaky Forms A Study of Email and Password Exfiltration Before Form Submission.eng.srt

13.0 KB

Leaky Forms A Study of Email and Password Exfiltration Before Form Submission.eng.text

9.7 KB

Leaky Forms A Study of Email and Password Exfiltration Before Form Submission.eng.tsv

11.5 KB

Leaky Forms A Study of Email and Password Exfiltration Before Form Submission.eng.txt

13.3 KB

Leaky Forms A Study of Email and Password Exfiltration Before Form Submission.eng.vtt

12.2 KB

Lend Me Your Ear Passive Remote Physical Side Channels on PCs.eng.srt

21.2 KB

Like Lesbians Walking the Perimeter - Experiences of U.S. LGBTQ Folks.eng.srt

18.5 KB

LinKRID Vetting Imbalance Reference Counting in Linux kernel with Symbolic.eng.json

559.1 KB

LinKRID Vetting Imbalance Reference Counting in Linux kernel with Symbolic.eng.lrc

15.6 KB

LinKRID Vetting Imbalance Reference Counting in Linux kernel with Symbolic.eng.srt

12.6 KB

LinKRID Vetting Imbalance Reference Counting in Linux kernel with Symbolic.eng.text

9.8 KB

LinKRID Vetting Imbalance Reference Counting in Linux kernel with Symbolic.eng.tsv

12.9 KB

LinKRID Vetting Imbalance Reference Counting in Linux kernel with Symbolic.eng.txt

15.9 KB

LinKRID Vetting Imbalance Reference Counting in Linux kernel with Symbolic.eng.vtt

11.8 KB

Loki Hardening Code Obfuscation Against Automated Attacks.eng.srt

19.4 KB

LTrack Stealthy Tracking of Mobile Phones in LTE.eng.srt

19.9 KB

Lumos Identifying and Localizing Diverse Hidden IoT Devices.eng.srt

19.8 KB

MaDIoT 2.0 Modern High-Wattage IoT Botnet Attacks and Defenses.eng.srt

19.0 KB

MAGE Mutual Attestation for a Group of Enclaves without Trusted Third Parties.eng.srt

15.8 KB

Many Roads Lead To Rome How Packet Headers Influence DNS Censorship.eng.srt

21.8 KB

Measurement by Proxy On the Accuracy of Online Marketplace Measurements.eng.srt

24.3 KB

Membership Inference Attacks and Defenses in Neural Network Pruning.eng.srt

24.0 KB

Midas Systematic Kernel TOCTTOU Protection.eng.json

500.5 KB

Midas Systematic Kernel TOCTTOU Protection.eng.lrc

14.3 KB

Midas Systematic Kernel TOCTTOU Protection.eng.srt

11.5 KB

Midas Systematic Kernel TOCTTOU Protection.eng.text

8.8 KB

Midas Systematic Kernel TOCTTOU Protection.eng.tsv

11.7 KB

Midas Systematic Kernel TOCTTOU Protection.eng.txt

14.5 KB

Midas Systematic Kernel TOCTTOU Protection.eng.vtt

10.8 KB

Might I Get Pwned A Second Generation Compromised Credential Checking Service.eng.srt

18.8 KB

Minefield A Software-only Protection for SGX Enclaves against DVFS Attacks.eng.srt

18.4 KB

Mining Node.js Vulnerabilities via Object Dependence Graph and Query.eng.json

467.5 KB

Mining Node.js Vulnerabilities via Object Dependence Graph and Query.eng.lrc

12.1 KB

Mining Node.js Vulnerabilities via Object Dependence Graph and Query.eng.srt

12.6 KB

Mining Node.js Vulnerabilities via Object Dependence Graph and Query.eng.text

9.5 KB

Mining Node.js Vulnerabilities via Object Dependence Graph and Query.eng.tsv

10.9 KB

Mining Node.js Vulnerabilities via Object Dependence Graph and Query.eng.txt

12.2 KB

Mining Node.js Vulnerabilities via Object Dependence Graph and Query.eng.vtt

11.8 KB

Mistrust Plugins You Must A Large-Scale Study Of Malicious Plugins.eng.srt

23.8 KB

Mitigating Membership Inference Attacks by Self-Distillation Through a Novel.eng.srt

20.5 KB

ML-Doctor Holistic Risk Assessment of Inference Attacks Against Machine.eng.srt

18.0 KB

Morphuzz Bending (Input) Space to Fuzz Virtual Devices.eng.srt

24.6 KB

MOVERY A Precise Approach for Modified Vulnerable Code Clone Discovery from.eng.srt

19.1 KB

MundoFuzz Hypervisor Fuzzing with Statistical Coverage Testing and Grammar.eng.srt

17.5 KB

Neither Access nor Control A Longitudinal Investigation of the Efficacy.eng.srt

23.4 KB

Networks of Care Tech Abuse Advocates' Digital Security Practices.eng.json

525.6 KB

Networks of Care Tech Abuse Advocates' Digital Security Practices.eng.lrc

14.9 KB

Networks of Care Tech Abuse Advocates' Digital Security Practices.eng.srt

13.1 KB

Networks of Care Tech Abuse Advocates' Digital Security Practices.eng.text

10.8 KB

Networks of Care Tech Abuse Advocates' Digital Security Practices.eng.tsv

13.0 KB

Networks of Care Tech Abuse Advocates' Digital Security Practices.eng.txt

15.1 KB

Networks of Care Tech Abuse Advocates' Digital Security Practices.eng.vtt

12.5 KB

Off-Path Network Traffic Manipulation via Revitalized ICMP Redirect Attacks.eng.srt

20.3 KB

OK, Siri - or - Hey, Google - Evaluating Voiceprint Distinctiveness via.eng.srt

19.1 KB

Omnes pro uno Practical Multi-Writer Encrypted Database.eng.json

419.5 KB

Omnes pro uno Practical Multi-Writer Encrypted Database.eng.lrc

11.4 KB

Omnes pro uno Practical Multi-Writer Encrypted Database.eng.srt

12.4 KB

Omnes pro uno Practical Multi-Writer Encrypted Database.eng.text

9.1 KB

Omnes pro uno Practical Multi-Writer Encrypted Database.eng.tsv

10.3 KB

Omnes pro uno Practical Multi-Writer Encrypted Database.eng.txt

11.5 KB

Omnes pro uno Practical Multi-Writer Encrypted Database.eng.vtt

11.6 KB

On the Necessity of Auditable Algorithmic Definitions for Machine Unlearning.eng.srt

20.8 KB

On the Security Risks of AutoML.eng.srt

14.1 KB

One-off Disclosure Control by Heterogeneous Generalization.eng.srt

20.8 KB

Online Website Fingerprinting Evaluating Website Fingerprinting Attacks.eng.srt

25.5 KB

Oops Code Execution and Content Spoofing The First Comprehensive Analysis.eng.srt

15.5 KB

Open to a fault On the passive compromise of TLS keys via transient errors.eng.srt

24.1 KB

OpenSSLNTRU Faster post-quantum TLS key exchange.eng.srt

26.0 KB

OpenVPN is Open to VPN Fingerprinting.eng.json

544.1 KB

OpenVPN is Open to VPN Fingerprinting.eng.lrc

15.9 KB

OpenVPN is Open to VPN Fingerprinting.eng.srt

13.7 KB

OpenVPN is Open to VPN Fingerprinting.eng.text

10.7 KB

OpenVPN is Open to VPN Fingerprinting.eng.tsv

13.5 KB

OpenVPN is Open to VPN Fingerprinting.eng.txt

16.1 KB

OpenVPN is Open to VPN Fingerprinting.eng.vtt

12.9 KB

Orca Blocklisting in Sender-Anonymous Messaging.eng.srt

26.5 KB

OS-Aware Vulnerability Prioritization via Differential Severity Analysis.eng.srt

17.7 KB

OVRseen Auditing Network Traffic and Privacy Policies in Oculus VR.eng.srt

24.6 KB

Pacer Comprehensive Network Side-Channel Mitigation in the Cloud.eng.srt

27.2 KB

PatchCleanser Certifiably Robust Defense against Adversarial Patches.eng.srt

24.1 KB

Phish in Sheep's Clothing Exploring the Authentication Pitfalls.eng.srt

16.8 KB

Physical-Layer Attacks Against Pulse Width Modulation-Controlled Actuators.eng.srt

20.3 KB

Piranha A GPU Platform for Secure Computation.eng.srt

26.2 KB

PISTIS Trusted Computing Architecture for Low-end Embedded Systems.eng.srt

23.3 KB

Playing for K(H)eaps Understanding and Improving Linux Kernel Exploit.eng.srt

18.3 KB

Playing Without Paying Detecting Vulnerable Payment Verification in Native.eng.srt

20.1 KB

Poison Forensics Traceback of Data Poisoning Attacks in Neural Networks.eng.srt

26.6 KB

PoisonedEncoder Poisoning the Unlabeled Pre-training Data in Contrastive.eng.srt

19.3 KB

Poisoning Attacks to Local Differential Privacy Protocols for Key-Value Data.eng.json

466.0 KB

Poisoning Attacks to Local Differential Privacy Protocols for Key-Value Data.eng.lrc

12.0 KB

Poisoning Attacks to Local Differential Privacy Protocols for Key-Value Data.eng.srt

13.3 KB

Poisoning Attacks to Local Differential Privacy Protocols for Key-Value Data.eng.text

9.4 KB

Poisoning Attacks to Local Differential Privacy Protocols for Key-Value Data.eng.tsv

10.8 KB

Poisoning Attacks to Local Differential Privacy Protocols for Key-Value Data.eng.txt

12.1 KB

Poisoning Attacks to Local Differential Privacy Protocols for Key-Value Data.eng.vtt

12.2 KB

PolyCruise A Cross-Language Dynamic Information Flow Analysis.eng.srt

18.4 KB

Polynomial Commitment with a One-to-Many Prover and Applications.eng.srt

18.1 KB

Pool Inference Attacks on Local Differential Privacy.eng.json

609.1 KB

Pool Inference Attacks on Local Differential Privacy.eng.lrc

17.8 KB

Pool Inference Attacks on Local Differential Privacy.eng.srt

14.7 KB

Pool Inference Attacks on Local Differential Privacy.eng.text

11.4 KB

Pool Inference Attacks on Local Differential Privacy.eng.tsv

14.8 KB

Pool Inference Attacks on Local Differential Privacy.eng.txt

18.1 KB

Pool Inference Attacks on Local Differential Privacy.eng.vtt

13.8 KB

Post-Quantum Cryptography with Contemporary Co-Processors Beyond Kronecker,.eng.srt

22.0 KB

ppSAT Towards Two-Party Private SAT Solving.eng.srt

21.8 KB

Practical Data Access Minimization in Trigger-Action Platforms.eng.srt

20.9 KB

Practical Privacy-Preserving Authentication for SSH.eng.srt

27.5 KB

Pre-hijacked accounts An Empirical Study of Security Failures in User Account.eng.srt

24.5 KB

Private Signaling.eng.json

769.8 KB

Private Signaling.eng.lrc

18.5 KB

Private Signaling.eng.srt

19.5 KB

Private Signaling.eng.text

14.4 KB

Private Signaling.eng.tsv

16.6 KB

Private Signaling.eng.txt

18.7 KB

Private Signaling.eng.vtt

18.1 KB

PrivGuard Privacy Regulation Compliance Made Easier.eng.srt

19.2 KB

ProFactory Improving IoT Security via Formalized Protocol Customization.eng.srt

23.3 KB

Provably-Safe Multilingual Software Sandboxing using WebAssembly.eng.srt

19.7 KB

QCSD A QUIC Client-Side Website-Fingerprinting Defence Framework.eng.srt

23.4 KB

QuORAM A Quorum-Replicated Fault Tolerant ORAM Datastore.eng.srt

23.5 KB

Rapid Prototyping for Microarchitectural Attacks.eng.srt

31.2 KB

RapidPatch Firmware Hotpatching for Real-Time Embedded Devices.eng.json

552.2 KB

RapidPatch Firmware Hotpatching for Real-Time Embedded Devices.eng.lrc

16.1 KB

RapidPatch Firmware Hotpatching for Real-Time Embedded Devices.eng.srt

13.7 KB

RapidPatch Firmware Hotpatching for Real-Time Embedded Devices.eng.text

10.2 KB

RapidPatch Firmware Hotpatching for Real-Time Embedded Devices.eng.tsv

13.4 KB

RapidPatch Firmware Hotpatching for Real-Time Embedded Devices.eng.txt

16.4 KB

RapidPatch Firmware Hotpatching for Real-Time Embedded Devices.eng.vtt

12.7 KB

RegexScalpel Regular Expression Denial of Service (ReDoS) Defense by.eng.srt

21.4 KB

Regulator Dynamic Analysis to Detect ReDoS.eng.srt

26.7 KB

RE-Mind a First Look Inside the Mind of a Reverse Engineer.eng.srt

20.4 KB

Rendering Contention Channel Made Practical in Web Browsers.eng.srt

15.6 KB

Repurposing Segmentation as a Practical LVI-NULL Mitigation in SGX.eng.json

641.7 KB

Repurposing Segmentation as a Practical LVI-NULL Mitigation in SGX.eng.lrc

19.5 KB

Repurposing Segmentation as a Practical LVI-NULL Mitigation in SGX.eng.srt

13.7 KB

Repurposing Segmentation as a Practical LVI-NULL Mitigation in SGX.eng.text

10.3 KB

Repurposing Segmentation as a Practical LVI-NULL Mitigation in SGX.eng.tsv

15.2 KB

Repurposing Segmentation as a Practical LVI-NULL Mitigation in SGX.eng.txt

19.8 KB

Repurposing Segmentation as a Practical LVI-NULL Mitigation in SGX.eng.vtt

12.7 KB

RETBLEED Arbitrary Speculative Code Execution with Return Instructions.eng.srt

21.6 KB

ReZone Disarming TrustZone with TEE Privilege Reduction.eng.srt

22.6 KB

Rolling Colors Adversarial Laser Exploits against Traffic Light Recognition.eng.srt

20.7 KB

SAID State-aware Defense Against Injection Attacks on In-vehicle Network.eng.json

452.8 KB

SAID State-aware Defense Against Injection Attacks on In-vehicle Network.eng.lrc

12.0 KB

SAID State-aware Defense Against Injection Attacks on In-vehicle Network.eng.srt

12.6 KB

SAID State-aware Defense Against Injection Attacks on In-vehicle Network.eng.text

9.3 KB

SAID State-aware Defense Against Injection Attacks on In-vehicle Network.eng.tsv

10.7 KB

SAID State-aware Defense Against Injection Attacks on In-vehicle Network.eng.txt

12.1 KB

SAID State-aware Defense Against Injection Attacks on In-vehicle Network.eng.vtt

11.7 KB

SAPIC protocol verifiers of the world, unite.eng.srt

25.8 KB

SARA Secure Android Remote Authorization.eng.json

670.1 KB

SARA Secure Android Remote Authorization.eng.lrc

20.4 KB

SARA Secure Android Remote Authorization.eng.srt

15.4 KB

SARA Secure Android Remote Authorization.eng.text

11.7 KB

SARA Secure Android Remote Authorization.eng.tsv

16.3 KB

SARA Secure Android Remote Authorization.eng.txt

20.7 KB

SARA Secure Android Remote Authorization.eng.vtt

14.3 KB

SCRAPS Scalable Collective Remote Attestation for Pub-Sub IoT Networks with.eng.srt

23.8 KB

SecSMT Securing SMT Processors against Contention-Based Covert Channels.eng.srt

18.9 KB

Secure Poisson Regression.eng.srt

28.6 KB

Security Analysis of Camera-LiDAR Fusion Against Black-Box Attacks.eng.srt

30.8 KB

Security and Privacy Perceptions of Third-Party Application Access for Google.eng.srt

19.5 KB

Security at the End of the Tunnel The Anatomy of VPN Mental Models Among.eng.srt

20.1 KB

Seeing is Living Rethinking the Security of Facial Liveness Verification.eng.srt

13.7 KB

Seeing the Forest for the Trees Understanding Security Hazards in the 3GPP.eng.json

450.6 KB

Seeing the Forest for the Trees Understanding Security Hazards in the 3GPP.eng.lrc

12.9 KB

Seeing the Forest for the Trees Understanding Security Hazards in the 3GPP.eng.srt

12.8 KB

Seeing the Forest for the Trees Understanding Security Hazards in the 3GPP.eng.text

9.0 KB

Seeing the Forest for the Trees Understanding Security Hazards in the 3GPP.eng.tsv

11.1 KB

Seeing the Forest for the Trees Understanding Security Hazards in the 3GPP.eng.txt

13.1 KB

Seeing the Forest for the Trees Understanding Security Hazards in the 3GPP.eng.vtt

11.7 KB

SGXFuzz Efficiently Synthesizing Nested Structures for SGX Enclave Fuzzing.eng.srt

15.9 KB

SGXLock Towards Efficiently Establishing Mutual Distrust Between Host.eng.srt

15.9 KB

Shuffle-based Private Set Union Faster and More Secure.eng.srt

16.6 KB

SIMC ML Inference Secure Against Malicious Clients at Semi-Honest Cost.eng.srt

32.6 KB

SkillDetective Automated Policy-Violation Detection of Voice Assistant.eng.json

661.7 KB

SkillDetective Automated Policy-Violation Detection of Voice Assistant.eng.lrc

16.3 KB

SkillDetective Automated Policy-Violation Detection of Voice Assistant.eng.srt

18.3 KB

SkillDetective Automated Policy-Violation Detection of Voice Assistant.eng.text

12.8 KB

SkillDetective Automated Policy-Violation Detection of Voice Assistant.eng.tsv

14.7 KB

SkillDetective Automated Policy-Violation Detection of Voice Assistant.eng.txt

16.4 KB

SkillDetective Automated Policy-Violation Detection of Voice Assistant.eng.vtt

16.8 KB

Smart Home Privacy Policies Demystified A Study of Availability, Content, and.eng.srt

27.2 KB

Spoki Unveiling a New Wave of Scanners through a Reactive Network Telescope.eng.srt

22.4 KB

Stalloris RPKI Downgrade Attack.eng.srt

20.3 KB

Stateful Greybox Fuzzing.eng.srt

20.6 KB

StateFuzz System Call-Based State-Aware Linux Driver Fuzzing.eng.srt

18.9 KB

Stick It to The Man Correcting for Non-Cooperative Behavior of Subjects in.eng.srt

21.1 KB

SWAPP A New Programmable Playground for Web Application Security.eng.srt

15.4 KB

SYMSAN Time and Space Efficient Concolic Execution via Dynamic Data-flow.eng.srt

15.8 KB

Synthetic Data - Anonymisation Groundhog Day.eng.srt

21.0 KB

SyzScope Revealing High-Risk Security Impacts of Fuzzer-Exposed Bugs in Linux.eng.srt

21.2 KB

Targeted Deanonymization via the Cache Side Channel Attacks and Defenses.eng.srt

19.0 KB

Teacher Model Fingerprinting Attacks Against Transfer Learning.eng.srt

19.8 KB

The Dangers of Human Touch Fingerprinting Browser Extensions through.eng.json

593.2 KB

The Dangers of Human Touch Fingerprinting Browser Extensions through.eng.lrc

17.2 KB

The Dangers of Human Touch Fingerprinting Browser Extensions through.eng.srt

15.3 KB

The Dangers of Human Touch Fingerprinting Browser Extensions through.eng.text

11.7 KB

The Dangers of Human Touch Fingerprinting Browser Extensions through.eng.tsv

14.7 KB

The Dangers of Human Touch Fingerprinting Browser Extensions through.eng.txt

17.5 KB

The Dangers of Human Touch Fingerprinting Browser Extensions through.eng.vtt

14.3 KB

The Same PIN, Just Longer - On the (In)Security of Upgrading PINs from 4 to.eng.json

517.2 KB

The Same PIN, Just Longer - On the (In)Security of Upgrading PINs from 4 to.eng.lrc

15.1 KB

The Same PIN, Just Longer - On the (In)Security of Upgrading PINs from 4 to.eng.srt

12.5 KB

The Same PIN, Just Longer - On the (In)Security of Upgrading PINs from 4 to.eng.text

9.7 KB

The Same PIN, Just Longer - On the (In)Security of Upgrading PINs from 4 to.eng.tsv

12.6 KB

The Same PIN, Just Longer - On the (In)Security of Upgrading PINs from 4 to.eng.txt

15.3 KB

The Same PIN, Just Longer - On the (In)Security of Upgrading PINs from 4 to.eng.vtt

11.7 KB

The Security Lottery Measuring Client-Side Web Security Inconsistencies.eng.srt

20.6 KB

TheHuzz Instruction Fuzzing of Processors Using Golden-Reference Models for.eng.srt

23.2 KB

Themis Accelerating the Detection of Route Origin Hijacking by Distinguishing.eng.srt

13.6 KB

They Look at Vulnerability and Use That to Abuse You.eng.srt

23.0 KB

Tightly Seal Your Sensitive Pointers with PACTight.eng.srt

24.4 KB

TLS-Anvil Adapting Combinatorial Testing for TLS Libraries.eng.json

580.8 KB

TLS-Anvil Adapting Combinatorial Testing for TLS Libraries.eng.lrc

17.5 KB

TLS-Anvil Adapting Combinatorial Testing for TLS Libraries.eng.srt

14.0 KB

TLS-Anvil Adapting Combinatorial Testing for TLS Libraries.eng.text

11.0 KB

TLS-Anvil Adapting Combinatorial Testing for TLS Libraries.eng.tsv

14.4 KB

TLS-Anvil Adapting Combinatorial Testing for TLS Libraries.eng.txt

17.7 KB

TLS-Anvil Adapting Combinatorial Testing for TLS Libraries.eng.vtt

13.1 KB

Total Eclipse of the Heart - Disrupting the InterPlanetary File System.eng.srt

22.3 KB

Towards Automatically Reverse Engineering Vehicle Diagnostic Protocols.eng.srt

20.5 KB

Towards More Robust Keyword Spotting for Voice Assistants.eng.srt

19.3 KB

Transferring Adversarial Robustness Through Robust Representation Matching.eng.srt

25.5 KB

Trust Dies in Darkness Shedding Light on Samsung's TrustZone Keymaster Design.eng.srt

28.7 KB

Twilight A Differentially Private Payment Channel Network.eng.srt

18.6 KB

Under the Hood of DANE Mismanagement in SMTP.eng.srt

26.2 KB

Understanding and Improving Usability of Data Dashboards for Simplified.eng.json

575.0 KB

Understanding and Improving Usability of Data Dashboards for Simplified.eng.lrc

15.9 KB

Understanding and Improving Usability of Data Dashboards for Simplified.eng.srt

15.9 KB

Understanding and Improving Usability of Data Dashboards for Simplified.eng.text

12.2 KB

Understanding and Improving Usability of Data Dashboards for Simplified.eng.tsv

14.2 KB

Understanding and Improving Usability of Data Dashboards for Simplified.eng.txt

16.1 KB

Understanding and Improving Usability of Data Dashboards for Simplified.eng.vtt

14.9 KB

Uninvited Guests Analyzing the Identity and Behavior of Certificate.eng.srt

15.9 KB

Unleash the Simulacrum Shifting Browser Realities for Robust.eng.srt

16.1 KB

USENIX Security '22- The Antrim County 2020 Election Incident An Independent Forensic Investigation.eng.srt

24.5 KB

USENIX Security '22- TLB - DR Enhancing TLB-based Attacks with TLB Desynchronized Reverse Engineering.eng.srt

20.2 KB

USENIX Security '22-Hertzbleed Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86.eng.json

707.3 KB

USENIX Security '22-Hertzbleed Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86.eng.lrc

19.7 KB

USENIX Security '22-Hertzbleed Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86.eng.srt

18.2 KB

USENIX Security '22-Hertzbleed Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86.eng.text

13.3 KB

USENIX Security '22-Hertzbleed Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86.eng.tsv

16.7 KB

USENIX Security '22-Hertzbleed Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86.eng.txt

20.0 KB

USENIX Security '22-Hertzbleed Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86.eng.vtt

16.8 KB

Using Trātṛ to tame Adversarial Synchronization.eng.srt

27.7 KB

V'CER Efficient Certificate Validation in Constrained Networks.eng.srt

20.8 KB

VerLoc Verifiable Localization in Decentralized Systems.eng.srt

22.4 KB

Watching the watchers bias and vulnerability in remote proctoring software.eng.srt

26.2 KB

Watching the Watchers Practical Video Identification Attack in LTE Networks.eng.srt

16.6 KB

Web Cache Deception Escalates.eng.srt

19.8 KB

WebGraph Capturing Advertising and Tracking Information Flows.eng.srt

23.6 KB

When Sally Met Trackers Web Tracking From the Users' Perspective.eng.srt

21.8 KB

Where to Recruit for Security Development Studies Comparing Six Software.eng.srt

22.8 KB

Who Are You (I Really Wanna Know) Detecting Audio DeepFakes Through Vocal.eng.srt

31.1 KB

Why Users (Don't) Use Password Managers at a Large Educational Institution.eng.srt

19.5 KB

XDRI Attacks - and - How to Enhance Resilience of Residential Routers.eng.srt

23.2 KB

Your Microphone Array Retains Your Identity A Robust Voice Liveness.eng.srt

20.7 KB

Zero-Knowledge Middleboxes.eng.json

539.3 KB

Zero-Knowledge Middleboxes.eng.lrc

14.1 KB

Zero-Knowledge Middleboxes.eng.srt

15.4 KB

Zero-Knowledge Middleboxes.eng.text

10.8 KB

Zero-Knowledge Middleboxes.eng.tsv

12.6 KB

Zero-Knowledge Middleboxes.eng.txt

14.3 KB

Zero-Knowledge Middleboxes.eng.vtt

14.2 KB

/USENIX Security 2023/

(M)WAIT for It Bridging the Gap between Microarchitectural and.mp4

7.4 MB

µFUZZ Redesign of Parallel Fuzzing using Microservice Architecture.mp4

9.0 MB

A Bug's Life Analyzing the Lifecycle and Mitigation Process of Content.mp4

9.7 MB

A comprehensive, formal and automated analysis of the EDHOC protocol.mp4

8.2 MB

A Data-free Backdoor Injection Approach in Neural Networks.mp4

10.4 MB

A Hybrid Alias Analysis and Its Application to Global Variable Protection.mp4

8.9 MB

A Large Scale Study of the Ethereum Arbitrage Ecosystem.mp4

11.7 MB

A Large-Scale Measurement of Website Login Policies.mp4

8.8 MB

A Mixed-Methods Study of Security Practices of Smart Contract Developers.mp4

10.9 MB

A Peek into the Metaverse Detecting 3D Model Clones in Mobile Games.mp4

11.7 MB

A Plot is Worth a Thousand Words Model Information Stealing Attacks via.mp4

11.3 MB

A Research Framework and Initial Study of Browser Security for the Visually.mp4

14.8 MB

A Study of China's Censorship and Its Evasion Through the Lens of Online.mp4

11.4 MB

A Study of Multi-Factor and Risk-Based Authentication Availability.mp4

8.0 MB

A Two-Decade Retrospective Analysis of a University's Vulnerability to.mp4

9.0 MB

A Verified Confidential Computing as a Service Framework for Privacy.mp4

7.0 MB

Abuse Vectors A Framework for Conceptualizing IoT-Enabled Interpersonal Abuse.mp4

9.1 MB

Access Denied Assessing Physical Risks to Internet Access Networks.mp4

11.5 MB

Account Security Interfaces Important, Unintuitive, and Untrustworth.mp4

9.3 MB

Account Verification on Social Media User Perceptions and Paid Enrollment.mp4

11.5 MB

ACFA Secure Runtime Auditing & Guaranteed Device Healing via Active.mp4

8.9 MB

ACon2 Adaptive Conformal Consensus for Provable Blockchain Oracles.mp4

8.2 MB

ACORN Input Validation for Secure Aggregation.mp4

12.0 MB

ACTOR Action-Guided Kernel Fuzzing.mp4

7.5 MB

Adversarial Training for Raw-Binary Malware Classifiers.mp4

10.0 MB

Aegis Mitigating Targeted Bit-flip Attacks against Deep Neural Networks.mp4

11.8 MB

AEX-Notify Thwarting Precise Single-Stepping Attacks through Interrupt.mp4

11.4 MB

AIFORE Smart Fuzzing Based on Automatic Input Format Reverse Engineering.mp4

10.9 MB

AIRS Explanation for Deep Reinforcement Learning based Security Applications.mp4

11.3 MB

AIRTAG Towards Automated Attack Investigation by Unsupervised Learning.mp4

7.8 MB

Aliasing Backdoor Attacks on Pre-trained Models.mp4

12.9 MB

All cops are broadcasting TETRA under scrutiny.mp4

21.5 MB

All of them claim to be the best - Multi-perspective study of VPN user.mp4

10.2 MB

AlphaEXP An Expert System for Identifying Security-Sensitive Kernel Objects.mp4

8.6 MB

An Efficient Design of Intelligent Network Data Plane.mp4

10.5 MB

An Empirical Study & Evaluation of Modern CAPTCHAs.mp4

8.8 MB

An Input-Agnostic Hierarchical Deep Learning Framework for Traffic.mp4

10.1 MB

Anatomy of a High-Profile Data Breach Dissecting the Aftermath of a Crypto.mp4

10.3 MB

AnimateDead Debloating Web Applications Using Concolic Execution.mp4

10.0 MB

Araña Discovering and Characterizing Password Guessing Attacks in Practice.mp4

9.2 MB

Are Consumers Willing to Pay for Security and Privacy of IoT Devices.mp4

10.9 MB

Are You Spying on Me Large-Scale Analysis on IoT Data Exposure through.mp4

11.2 MB

ARGUS A Framework for Staged Static Taint Analysis of GitHub Workflows and.mp4

11.0 MB

ARGUS Context-Based Detection of Stealthy IoT Infiltration Attacks.mp4

9.3 MB

ARI Attestation of Real-time Mission Execution Integrity.mp4

10.7 MB

ARMore Pushing Love Back Into Binaries.mp4

8.2 MB

Assessing Anonymity Techniques Employed in German Court Decisions A.mp4

9.5 MB

ASSET Robust Backdoor Data Detection Across a Multiplicity of Deep Learning.mp4

11.0 MB

Attacks are Forwarded Breaking the Isolation of MicroVM-based Containers.mp4

13.4 MB

Auditing Framework APIs via Inferred App-side Security Specifications.mp4

12.7 MB

Auditing Frameworks Need Resource Isolation A Systematic Study on the.mp4

10.0 MB

Auditory Eyesight Demystifying μs-Precision Keystroke Tracking Attacks on.mp4

12.9 MB

AURC Detecting Errors in Program Code and Documentation.mp4

9.1 MB

Authenticated private information retrieval.mp4

12.0 MB

AutoFR Automated Filter Rule Generation for Adblocking.mp4

11.1 MB

autofz Automated Fuzzer Composition at Runtime.mp4

10.7 MB

Automata-Guided Control-Flow-Sensitive Fuzz Driver Generation.mp4

12.2 MB

Automated Analysis of Protocols that use Authenticated Encryption How.mp4

9.3 MB

Automated Cookie Notice Analysis and Enforcement.mp4

10.9 MB

Automated Exploitable Heap Layout Generation for Heap Overflows Through.mp4

9.5 MB

Automated Inference on Financial Security of Ethereum Smart Contracts.mp4

8.7 MB

Automated Security Analysis of Exposure Notification Systems.mp4

8.7 MB

Back to School On the (In)Security of Academic VPNs.mp4

8.9 MB

BalanceProofs Maintainable Vector Commitments with Fast Aggregation.mp4

8.4 MB

BASECOMP A Comparative Analysis for Integrity Protection in Cellular.mp4

9.4 MB

Beyond The Gates An Empirical Analysis of HTTP-Managed Password Stealers.mp4

10.5 MB

Beyond Typosquatting An In-depth Look at Package Confusion.mp4

12.0 MB

Bilingual Problems Studying the Security Risks Incurred by Native.mp4

10.2 MB

Black-box Adversarial Example Attack towards FCG Based Android Malware.mp4

7.7 MB

Bleem Packet Sequence Oriented Fuzzing for Protocol Implementations.mp4

8.1 MB

BoKASAN Binary-only Kernel Address Sanitizer for Effective Kernel Fuzzing.mp4

9.4 MB

BotScreen Trust Everybody, but Cut the Aimbots Yourself.mp4

7.0 MB

Bug Hunters’ Perspectives on the Challenges and Benefits of the Bug Bounty.mp4

11.3 MB

BunnyHop Exploiting the Instruction Prefetcher.mp4

8.8 MB

Bypassing Tunnels Leaking VPN Client Traffic by Abusing Routing Tables.mp4

11.1 MB

CacheQL Quantifying and Localizing Cache Side-Channel Vulnerabilities in.mp4

11.9 MB

Calpric Inclusive and Fine-grain Labeling of Privacy Policies with.mp4

11.6 MB

Can a Deep Learning Model for One Architecture Be Used for Others.mp4

9.3 MB

CAPatch Physical Adversarial Patch against Image Captioning Systems.mp4

10.8 MB

Capstone A Capability-based Foundation for Trustless Secure Memory Access.mp4

10.6 MB

CarpetFuzz Automatic Program Option Constraint Extraction from.mp4

6.6 MB

Catch You and I Can Revealing Source Voiceprint Against Voice Conversion.mp4

9.1 MB

Checking Passwords on Leaky Computers A Side Channel Analysis of Chrome's.mp4

11.8 MB

Cheesecloth Zero-Knowledge Proofs of Real World Vulnerabilities.mp4

11.0 MB

Cipherfix Mitigating Ciphertext Side-Channel Attacks in Software.mp4

8.4 MB

CipherH Automated Detection of Ciphertext Side-channel Vulnerabilities in.mp4

8.8 MB

ClepsydraCache - Preventing Cache Attacks with Time-Based Evictions.mp4

9.6 MB

CodexLeaks Privacy Leaks from Code Generation Language Models in GitHub.mp4

11.5 MB

CollidePower Leaking Inaccessible Data with Software-based Power Side.mp4

10.2 MB

Combating Robocalls with Phone Virtual Assistant Mediated Interaction.mp4

12.8 MB

Confusum Contractum Confused Deputy Vulnerabilities in Ethereum Smart.mp4

11.0 MB

Content-Type multipart oracle - Tapping into Format Oracles in Email.mp4

10.0 MB

Continuous Learning for Android Malware Detection.mp4

9.9 MB

Controlled Data Races in Enclaves Attacks and Detection.mp4

8.3 MB

Cookie Crumbles Breaking and Fixing Web Session Integrity.mp4

11.2 MB

Credit Karma Understanding Security Implications of Exposed Cloud Services.mp4

11.9 MB

Cross Container Attacks The Bewildered eBPF on Clouds.mp4

10.6 MB

Cryptographic Administration for Secure Group Messaging.mp4

9.9 MB

Cryptographic Deniability A Multi-perspective Study of User Perceptions.mp4

7.5 MB

CSHER A System for Compact Storage with HE-Retrieval.mp4

12.2 MB

Curve Trees Practical and Transparent Zero-Knowledge Accumulators.mp4

6.7 MB

DAFL Directed Grey-box Fuzzing guided by Data Dependency.mp4

8.3 MB

DDRace Finding Concurrency UAF Vulnerabilities in Linux Drivers with.mp4

10.2 MB

Decompiling x86 Deep Neural Network Executables.mp4

11.0 MB

Defining - Broken - User Experiences and Remediation Tactics When Ad-Blocking.mp4

8.3 MB

Demystifying Pointer Authentication on Apple M1.mp4

10.4 MB

DeResistor Toward Detection-Resistant Probing for Evasion of Internet.mp4

10.9 MB

Design of Access Control Mechanisms in Systems-on-Chip with Formal.mp4

9.4 MB

Detecting and Handling IoT Interaction Threats in Multi-Platform Multi.mp4

16.6 MB

Detecting API Post-Handling Bugs Using Code and Description in Patches.mp4

11.9 MB

Detecting Multi-Step IAM Attacks in AWS Environments via Model Checking.mp4

10.0 MB

Detecting Union Type Confusion in Component Object Model.mp4

9.2 MB

Device Tracking via Linux’s New TCP Source Port Selection Algorithm.mp4

10.1 MB

Did the Shark Eat the Watchdog in the NTP Pool Deceiving the NTP Pool’s.mp4

9.9 MB

Differential Testing of Cross Deep Learning Framework APIs Revealing.mp4

9.0 MB

DiffSmooth Certifiably Robust Learning via Diffusion Models and Local.mp4

11.9 MB

Discovering Adversarial Driving Maneuvers against Autonomous Vehicles.mp4

10.5 MB

Distance-Aware Private Set Intersection.mp4

10.2 MB

DISTDET A Cost-Effective Distributed Cyber Threat Detection System.mp4

15.1 MB

Diving into Robocall Content with SnorCall.mp4

12.7 MB

Don’t be Dense Efficient Keyword PIR for Sparse Databases.mp4

8.6 MB

Downfall Exploiting Speculative Data Gathering.mp4

18.1 MB

Downgrading DNSSEC How to Exploit Crypto Agility for Hijacking Signed Zones.mp4

9.9 MB

DScope A Cloud-Native Internet Telescope.mp4

13.1 MB

Dubhe Succinct Zero-Knowledge Proofs for Standard AES and relate.mp4

8.9 MB

Duoram A Bandwidth-Efficient Distributed ORAM for 2- and 3-Party Computation.mp4

14.0 MB

DynSQL Stateful Fuzzing for Database Management Systems with Complex and.mp4

8.4 MB

Eavesdropping Mobile App Activity via Radio-Frequency Energy Harvesting.mp4

10.0 MB

Educators’ Perspectives of Using (or Not Using) Online Exam Proctoring.mp4

9.0 MB

Efficient 3PC for Binary Circuits with Application to Maliciously-Secure.mp4

7.7 MB

Efficient Unbalanced Private Set Intersection Cardinality and User-friendly.mp4

8.0 MB

Egg Hunt in Tesla Infotainment A First Look at Reverse Engineering of Qt.mp4

11.1 MB

ELASM Error-Latency-Aware Scale Management for Fully Homomorphic Encryption.mp4

10.0 MB

Employees Who Don’t Accept the Time Security Takes Are Not Aware Enough.mp4

11.1 MB

EnigMap External-Memory Oblivious Map for Secure Enclaves.mp4

9.4 MB

Eos Efficient Private Delegation of zkSNARK Provers.mp4

9.8 MB

Erebus Access Control for Augmented Reality Systems.mp4

10.3 MB

Ethical Frameworks and Computer Security Trolley Problems Foundations for.mp4

10.9 MB

Evading Provenance-Based ML Detectors with Adversarial System Action.mp4

10.8 MB

Every Signature is Broken On the Insecurity of Microsoft Office’s OOXML.mp4

9.8 MB

Every Vote Counts Ranking-Based Training of Federated Learning to Resist.mp4

10.7 MB

Examining Consumer Reviews to Understand Security and Privacy Issues in the.mp4

8.9 MB

Examining Power Dynamics and User Privacy in Smart Technology Use Among.mp4

7.0 MB

Exorcising - Wraith - Protecting LiDAR-based Object Detector in Automated.mp4

10.8 MB

Exploring Privacy and Incentives Considerations in Adoption of COVID-19.mp4

9.5 MB

Exploring Tenants' Preferences of Privacy Negotiation in Airbnb.mp4

8.9 MB

Exploring the Unknown DTLS Universe Analysis of the DTLS Server Ecosystem.mp4

10.3 MB

Exploring User Reactions and Mental Models Towards Perceptual Manipulation.mp4

9.0 MB

Extended Hell(o) A Comprehensive Large-Scale Study on Email.mp4

7.8 MB

Extending a Hand to Attackers Browser Privilege Escalation Attacks via.mp4

9.5 MB

Extracting Protocol Format as State Machine via Controlled Static Loop.mp4

9.8 MB

Extracting Training Data from Diffusion Models.mp4

10.3 MB

Eye-Shield Real-Time Protection of Mobile Device Screen Information from.mp4

11.2 MB

FABRID Flexible Attestation-Based Routing for Inter-Domain Networks.mp4

9.2 MB

FACE-AUDITOR Data Auditing in Facial Recognition Systems.mp4

8.3 MB

Fact-Saboteurs A Taxonomy of Evidence Manipulation Attacks against.mp4

8.9 MB

Fairness Properties of Face Recognition and Obfuscation Systems.mp4

8.0 MB

Fast IDentity Online with Anonymous Credentials (FIDO-AC).mp4

9.1 MB

FedVal Different good or different bad in federated learning.mp4

8.4 MB

Fine-grained Poisoning Attack to Local Differential Privacy Protocols for.mp4

14.8 MB

FirmSolo Enabling dynamic analysis of binary Linux-based IoT kernel modules.mp4

10.6 MB

FISHFUZZ Catch Deeper Bugs by Throwing Larger Nets.mp4

11.0 MB

FloatZone Accelerating Memory Error Detection using the Floating Point Unit.mp4

8.2 MB

Formal Analysis and Patching of BLE-SC Pairing.mp4

7.4 MB

Formal Analysis of Session-Handling in Secure Messaging Lifting Security.mp4

8.5 MB

Formal Analysis of SPDM Security Protocol and Data Model version 1.2.mp4

9.0 MB

Forming Faster Firmware Fuzzers.mp4

9.6 MB

Fourteen Years in the Life A Root Server’s Perspective on DNS Resolve.mp4

9.2 MB

Framing Frames Bypassing Wi-Fi Encryption by Manipulating Transmit Queues.mp4

10.8 MB

Freaky Leaky SMS Extracting User Locations by Analyzing SMS Timings.mp4

12.1 MB

FreeEagle Detecting Complex Neural Trojans in Data-Free Cases.mp4

9.5 MB

FuncTeller How Well Does eFPGA Hide Functionality.mp4

10.7 MB

Fuzz The Power Dual-role State Guided Black-box Fuzzing for USB Power.mp4

13.3 MB

FuzzJIT Oracle-Enhanced Fuzzing for JavaScript Engine JIT Compiler.mp4

8.7 MB

Fuzztruction Using Fault Injection-based Fuzzing to Leverage Implicit.mp4

9.3 MB

GAP Differentially Private Graph Neural Networks with Aggregation.mp4

7.4 MB

Generative Intrusion Detection and Prevention on Data Stream.mp4

10.2 MB

GigaDORAM Breaking the Billion Address Barrier.mp4

10.7 MB

Glaze Protecting Artists from Style Mimicry by Text-to-Image Models.mp4

12.6 MB

GLeeFuzz Fuzzing WebGL Through Error Message Guided Mutation.mp4

10.4 MB

Glimpse On-Demand PoW Light Client with Constant-Size Storage for DeFi.mp4

8.5 MB

GlitchHiker Uncovering Vulnerabilities of Image Signal Transmission with IEMI.mp4

10.3 MB

Glowing in the Dark Uncovering IPv6 Address Discovery and Scanning.mp4

9.1 MB

Going through the motions AR VR keylogging from user head motions.mp4

10.3 MB

Gradient Obfuscation Gives a False Sense of Security in Federated Learning.mp4

10.7 MB

Greenhouse Single-Service Rehosting of Linux-Based Firmware Binaries in.mp4

9.1 MB

Guarding Serverless Applications with Kalium.mp4

9.6 MB

Hard-label Black-box Universal Adversarial Patch Attack.mp4

9.5 MB

Hash Gone Bad Automated discovery of protocol attacks that exploit hash.mp4

8.5 MB

HashTag Hash-based Integrity Protection for Tagged Architectures.mp4

12.0 MB

HECO Fully Homomorphic Encryption Compiler.mp4

11.7 MB

Hey Kimya, Is My Smart Speaker Spying on Me Taking Control of Sensor.mp4

7.7 MB

Hidden Reality Caution, Your Hand Gesture Inputs in the Immersive Virtual.mp4

11.6 MB

Hiding in Plain Sight An Empirical Study of Web Application Abuse in Malware.mp4

10.3 MB

High Recovery with Fewer Injections Practical Binary Volumetric Injection.mp4

9.3 MB

Hoedur Embedded Firmware Fuzzing using Multi-Stream Inputs.mp4

10.3 MB

HOLMES Efficient Distribution Testing for Secure Collaborative Learning.mp4

8.6 MB

HOMESPY The Invisible Sniffer of Infrared Remote Control of Smart TVs.mp4

12.3 MB

HorusEye A Realtime IoT Malicious Traffic Detection Framework using.mp4

9.2 MB

Hot Pixels Frequency, Power, and Temperature Attacks on GPUs and Arm SoCs.mp4

15.0 MB

How Effective is Multiple-Vantage-Point Domain Control Validation.mp4

10.7 MB

How fast do you heal A taxonomy for post-compromise security in.mp4

10.0 MB

How Library IT Staff Navigate Privacy and Security Challenges and.mp4

9.0 MB

How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic.mp4

9.5 MB

How to Bind Anonymous Credentials to Humans.mp4

8.8 MB

How to Cover up Anomalous Accesses to Electronic Health Records.mp4

10.9 MB

Humans vs. Machines in Malware Classification.mp4

13.6 MB

HyPFuzz Formal-Assisted Processor Fuzzing.mp4

9.4 MB

I wouldn't want my unsafe code to run my pacemaker An Interview Study on.mp4

8.9 MB

ICSPatch Automated Vulnerability Localization and Non-Intrusive.mp4

8.7 MB

If I could do this, I feel anyone could - The Design and Evaluation.mp4

9.4 MB

If sighted people know, I should be able to know Privacy Perceptions of.mp4

8.4 MB

I'm going to trust this until it burns me - Parents' Privacy Concerns and.mp4

11.5 MB

Improving Logging to Reduce Permission Over-Granting Mistakes.mp4

12.5 MB

Improving Real-world Password Guessing Attacks via Bi-directional Transformers.mp4

8.0 MB

In the Quest to Protect Users from Side-Channel Attacks - A User-Centred.mp4

10.2 MB

Inception Exposing New Attack Surfaces with Training in Transient Execution.mp4

11.3 MB

Inducing Authentication Failures to Bypass Credit Card PINs.mp4

14.3 MB

Inductive Graph Unlearning.mp4

10.9 MB

InfinityGauntlet Expose Smartphone Fingerprint Authentication to.mp4

13.1 MB

Instructions Unclear Undefined Behaviour in Cellular Network Specifications.mp4

9.0 MB

Intender Fuzzing Intent-Based Networking with Intent-State Transition.mp4

11.1 MB

Internet Service Providers' and Individuals' Attitudes, Barriers, and.mp4

9.2 MB

Investigating Verification Behavior and Perceptions of Visual Digital.mp4

9.2 MB

Is Your Wallet Snitching On You An Analysis on the Privacy Implications.mp4

8.1 MB

Isolated and Exhausted Attacking Operating Systems via Site Isolation in.mp4

9.0 MB

It's all in your head(set) Side-channel attacks on AR VR systems.mp4

10.1 MB

It's the Equivalent of Feeling Like You're in Jail Lessons from Firsthand.mp4

9.4 MB

IvySyn Automated Vulnerability Discovery in Deep Learning Frameworks.mp4

8.2 MB

Jinn Hijacking Safe Programs with Trojans.mp4

10.4 MB

Keep Your Friends Close, but Your Routeservers Closer Insights into RPK.mp4

9.4 MB

KENKU Towards Efficient and Stealthy Black-box Adversarial Attacks against.mp4

12.6 MB

KextFuzz Fuzzing macOS Kernel EXTensions on Apple Silicon via Exploiting.mp4

8.4 MB

Know Your Cybercriminal Evaluating Attacker Preferences by Measuring.mp4

13.0 MB

Knowledge Expansion and Counterfactual Interaction for Reference-Based.mp4

9.6 MB

Lalaine Measuring and Characterizing Non-Compliance of Apple Privacy Labels.mp4

9.2 MB

Learning Normality is Enough A Software-based Mitigation against Inaudible.mp4

11.7 MB

Lessons Lost Incident Response in the Age of Cyber Insurance and Breach.mp4

12.0 MB

LibScan Towards More Precise Third-Party Library Identification for.mp4

13.3 MB

LightThief Your Optical Communication Information is Stolen behind the Wall.mp4

9.5 MB

Linear Private Set Union from Multi-Query Reverse Private Membership Test.mp4

10.3 MB

LocIn Inferring Semantic Location from Spatial Maps in Mixed Reality.mp4

11.2 MB

Log It’s Big, It’s Heavy, It’s Filled with Personal Data Measuring the.mp4

14.0 MB

Long Live The Honey Badger Robust Asynchronous DPSS and its Applications.mp4

12.0 MB

Lost at C A User Study on the Security Implications of Large Language Model.mp4

9.0 MB

Lost in Conversion Exploit Data Structure Conversion with Attribute Loss.mp4

11.2 MB

Machine-checking Multi-Round Proofs of Shuffle Terelius-Wikstrom and.mp4

8.7 MB

McFIL Model Counting Functionality-Inherent Leakage.mp4

13.8 MB

Measuring Up to (Reasonable) Consumer Expectations Providing an Empirical.mp4

8.8 MB

Medusa Attack Exploring Security Hazards of In-App QR Code Scanning.mp4

10.8 MB

Meta-Sift How to Sift Out a Clean Subset in the Presence of Data Poisoning.mp4

11.6 MB

Millions of people are watching you Understanding the Digital-Safety.mp4

9.5 MB

MINER A Hybrid Data-Driven Approach for REST API Fuzzing.mp4

11.1 MB

Minimalist Semi-automated Debloating of PHP Web Applications through.mp4

7.7 MB

Mitigating Security Risks in Linux with KLAUS A Method for Evaluating.mp4

8.9 MB

Mixed Signals Analyzing Ground-Truth Data on the Users and Economics.mp4

9.3 MB

MobileAtlas Geographically Decoupled Measurements in Cellular Networks for.mp4

9.7 MB

MorFuzz Fuzzing Processor via Runtime Instruction Morphing enhanced.mp4

9.7 MB

MTSan A Feasible and Practical Memory Sanitizer for Fuzzing COTS Binaries.mp4

12.2 MB

Multi-Factor Key Derivation Function (MFKDF) for Fast, Flexible, Secure, &.mp4

8.2 MB

Multiview Finding Blind Spots in Access-Deny Issues Diagnosis.mp4

10.0 MB

My Privacy for their Security - Employees' Privacy Perspectives and.mp4

10.3 MB

NAUTILUS Automated RESTful API Vulnerability Detection.mp4

11.9 MB

Near-Optimal Oblivious Key-Value Stores for Efficient PSI, PSU and Volume.mp4

8.2 MB

Near-Ultrasound Inaudible Trojan (Nuit) Exploiting Your Speaker to Attack.mp4

10.9 MB

Network Detection of Interactive SSH Impostors Using Deep Learning.mp4

8.0 MB

Network Responses to Russia's Invasion of Ukraine in 2022 A Cautionary Tale.mp4

13.3 MB

NeuroPots Realtime Proactive Defense against Bit-Flip Attacks in Neural.mp4

12.6 MB

No Linux, No Problem Fast and Correct Windows Binary Fuzzing via.mp4

8.3 MB

No more Reviewer #2 Subverting Automatic Paper-Reviewer Assignment using.mp4

9.6 MB

No Single Silver Bullet Measuring the Accuracy of Password Strength Meters.mp4

11.7 MB

Not All Data are Created Equal Data and Pointer Prioritization for Scalable.mp4

10.0 MB

Notice the Imposter A Study on User Tag Spoofing Attack in Mobile Apps.mp4

10.3 MB

NRDelegationAttack Complexity DDoS attack on DNS Recursive Resolvers.mp4

11.7 MB

NVLeak Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems.mp4

9.6 MB

On the Feasibility of Malware Unpacking via Hardware-assisted Loop Profiling.mp4

11.5 MB

On the Security Risks of Knowledge Graph Reasoning.mp4

8.6 MB

One Server for the Price of Two Simple and Fast Single-Server Private.mp4

10.2 MB

One Size Does not Fit All Quantifying the Risk of Malicious App Encounters.mp4

9.9 MB

One Size Does Not Fit All Uncovering and Exploiting Cross Platform.mp4

9.8 MB

Oops.. I Glitched It Again How to Multi-Glitch the Glitching-Protections.mp4

9.2 MB

Othered, Silenced and Scapegoated Understanding the Situated Security of.mp4

9.1 MB

Panda Security Analysis of Algorand Smart Contracts.mp4

9.0 MB

Pass2Edit A Multi-Step Generative Model for Guessing Edited Passwords.mp4

8.8 MB

Password Guessing Using Random Forest.mp4

8.5 MB

PatchVerif Discovering Faulty Patches in Robotic Vehicles.mp4

12.0 MB

PATROL Provable Defense against Adversarial Policy in Two-player Games.mp4

13.5 MB

PCAT Functionality and Data Stealing from Split Learning by Pseudo-Client.mp4

9.7 MB

PELICAN Exploiting Backdoors of Naturally Trained Deep Learning Models In.mp4

11.3 MB

Person Re-identification in 3D Space A WiFi Vision-based Approach.mp4

9.5 MB

PET Prevent Discovered Errors from Being Triggered in the Linux Kerne.mp4

12.3 MB

PhyAuth Physical-Layer Message Authentication for ZigBee Networks.mp4

10.7 MB

Place Your Locks Well Understanding and Detecting Lock Misuse Bugs.mp4

11.3 MB

POLICYCOMP Counterpart Comparison of Privacy Policies Uncovers.mp4

10.2 MB

PoliGraph Automated Privacy Policy Analysis using Knowledge Graphs.mp4

12.4 MB

PolyFuzz Holistic Greybox Fuzzing of Multi-Language Systems.mp4

9.0 MB

Pool-Party Exploiting Browser Resource Pools for Web Tracking.mp4

7.6 MB

PORE Provably Robust Recommender Systems against Data Poisoning Attacks.mp4

8.6 MB

Powering for Privacy Improving User Trust in Smart Speaker Microphones with.mp4

10.4 MB

Powering Privacy On the Energy Demand and Feasibility of Anonymity.mp4

10.8 MB

Practical Asynchronous High-threshold Distributed Key Generation and.mp4

12.5 MB

Precise and Generalized Robustness Certification for Neural Networks.mp4

10.6 MB

Prime Match A Privacy-Preserving Inventory Matching System.mp4

11.7 MB

Private Proof-of-Stake Blockchains using Differentially-Private Stake.mp4

10.2 MB

PrivateFL Accurate, Differentially Private Federated Learning via.mp4

10.9 MB

PrivGraph Differentially Private Graph Data Publication by Exploiting.mp4

8.2 MB

PrivTrace Differentially Private Trajectory Synthesis by Adaptive Markov.mp4

7.9 MB

Problematic Advertising and its Disparate Exposure on Facebook.mp4

10.8 MB

PROGRAPHER An Anomaly Detection System based on Provenance Graph Embedding.mp4

12.4 MB

ProSpeCT Provably Secure Speculation for the Constant-Time Policy.mp4

10.3 MB

PROVIDENCE a Flexible Round-by-Round Risk-Limiting Audit.mp4

8.1 MB

Proxy Hunting Understanding and Characterizing Proxy-based Upgradeable.mp4

15.0 MB

Pspray Timing Side-Channel based Linux Kernel Heap Exploitation Technique.mp4

9.0 MB

PTW Pivotal Tuning Watermarking for Pre-Trained Image Generators.mp4

9.7 MB

PUMM Preventing Use-After-Free Using Execution Unit Partitioning.mp4

9.4 MB

Pushed by Accident A Mixed-Methods Study on Strategies of Handling Secret.mp4

10.2 MB

QFA2SR Query-Free Adversarial Transfer Attacks to Speaker Recognition Systems.mp4

9.7 MB

Reassembly is Hard A Reflection on Challenges and Strategies.mp4

12.3 MB

Remote Attacks on Speech Recognition Systems Using Sound from Power Supply.mp4

12.0 MB

Remote Code Execution from SSTI in the Sandbox Automatically Detecting and.mp4

10.4 MB

Remote Direct Memory Introspection.mp4

7.7 MB

Rethinking System Audit Architectures for High Event Coverage and.mp4

7.9 MB

Rethinking White-Box Watermarks on Deep Learning Models under Neural.mp4

8.4 MB

Reusable Enclaves for Confidential Serverless Computing.mp4

12.5 MB

ReUSB Replay-Guided USB Driver Fuzzing.mp4

12.3 MB

Reversing, Breaking, and Fixing the French Legislative Election E-Voting.mp4

11.2 MB

RIDAS Real-time identification of attack sources on controller area networks.mp4

9.8 MB

RøB Ransomware over Modern Web Browsers.mp4

11.9 MB

Rods with Laser Beams Understanding Browser Fingerprinting on Phishing Pages.mp4

6.8 MB

Rosetta Enabling Robust TLS Encrypted Traffic Classification in Diverse.mp4

12.4 MB

SAFER Efficient and Error-Tolerant Binary Instrumentation.mp4

9.1 MB

SandDriller A Fully-Automated Approach for Testing Language-Based.mp4

11.4 MB

SCARF - A Low-Latency Block Cipher for Secure Cache-Randomization.mp4

8.9 MB

Secure Floating-Point Training.mp4

8.4 MB

Security Analysis of MongoDB Queryable Encryption.mp4

8.9 MB

Security and Privacy Failures in Popular 2FA Apps.mp4

10.2 MB

Security is not my field, I’m a stats guy A Qualitative Root Cause.mp4

10.8 MB

SHELTER Extending Arm CCA with Isolation in User Space.mp4

11.2 MB

Sherlock on Specs Building LTE Conformance Tests through Automated Reasoning.mp4

8.5 MB

Side-Channel Attacks on Optane Persistent Memory.mp4

9.0 MB

Silent Bugs Matter A Study of Compiler-Introduced Security Bugs.mp4

9.8 MB

Silent Spring Prototype Pollution Leads to Remote Code Execution in Node.js.mp4

11.0 MB

SMACK Semantically Meaningful Adversarial Audio Attack.mp4

11.2 MB

Smart Learning to Find Dumb Contracts.mp4

12.4 MB

Snapping Snap Sync Practical Attacks on Go Ethereum Synchronising Nodes.mp4

10.0 MB

Sneaky Spy Devices and Defective Detectors The Ecosystem of Intimate.mp4

10.2 MB

Sparsity Brings Vulnerabilities Exploring New Metrics in Backdoor Attacks.mp4

12.0 MB

SpectrEM Exploiting Electromagnetic Emanations During Transient Execution.mp4

7.8 MB

Speculation at Fault Modeling and Testing Microarchitectural Leakage of.mp4

7.9 MB

Spying through Your Voice Assistants Realistic Voice Command Fingerprinting.mp4

10.1 MB

SQIRL Grey-Box Detection of SQL Injection Vulnerabilities Using.mp4

12.1 MB

Squint Hard Enough Attacking Perceptual Hashing with Adversarial Machine.mp4

13.8 MB

Squirrel A Scalable Secure Two-Party Computation Framework for Training.mp4

13.6 MB

Strategies and Vulnerabilities of Participants in Venezuelan Influence.mp4

10.8 MB

Subverting Website Fingerprinting Defenses with Robust Traffic Representation.mp4

9.9 MB

Synchronization Storage Channels (S2C) Timer-less Cache Side-Channel.mp4

8.3 MB

Systematic Assessment of Fuzzers using Mutation Analysis.mp4

7.4 MB

TAP Transparent and Privacy-Preserving Data Services.mp4

11.6 MB

Temporal CDN-Convex Lens A CDN-Assisted Practical Pulsing DDoS Attack.mp4

12.1 MB

That Person Moves Like A Car Misclassification Attack Detection fo.mp4

11.6 MB

The Blockchain Imitation Game.mp4

8.5 MB

The Case for Learned Provenance Graph Storage Systems.mp4

7.1 MB

The Digital-Safety Risks of Financial Technologies for Survivors of.mp4

9.1 MB

The Gates of Time Improving Cache Attacks with Transient Execution.mp4

11.3 MB

The Impostor Among US(B) Off-Path Injection Attacks on USB Communications.mp4

9.6 MB

The Maginot Line Attacking the Boundary of DNS Caching Protection.mp4

12.1 MB

The Most Dangerous Codec in the World Finding and Exploiting.mp4

11.0 MB

The OK Is Not Enough A Large Scale Study of Consent Dialogs in Smartphone.mp4

9.9 MB

The Role of Professional Product Reviewers in Evaluating Security and Privacy.mp4

9.1 MB

The Space of Adversarial Strategies.mp4

11.1 MB

The Writing on the Wall and 3D Digital Twins Personal Information in.mp4

8.4 MB

Three Lessons From Threema Analysis of a Secure Messenger.mp4

9.6 MB

Tight Auditing of Differentially Private Machine Learning.mp4

11.9 MB

Time for Change How Clocks Break UWB Secure Ranging.mp4

9.0 MB

Timeless Timing Attacks and Preload Defenses in Tor's DNS Cache.mp4

10.9 MB

To Cloud or not to Cloud A Qualitative Study on Self-Hosters' Motivation.mp4

8.6 MB

To Do This Properly, You Need More Resources The Hidden Costs of.mp4

10.1 MB

Token Spammers, Rug Pulls, and Sniper Bots An Analysis of the Ecosystem.mp4

8.0 MB

Towards a General Video-based Keystroke Inference Attack.mp4

9.5 MB

Towards A Proactive ML Approach for Detecting Backdoor Poison Samples.mp4

13.5 MB

Towards Targeted Obfuscation of Adversarial Unsafe Images using.mp4

8.4 MB

TPatch A Triggered Physical Adversarial Patch.mp4

11.6 MB

TreeSync Authenticated Group Management for Messaging Layer Security.mp4

9.3 MB

TRIDENT Towards Detecting and Mitigating Web-based Social Engineering Attacks.mp4

10.8 MB

Trojan Source Invisible Vulnerabilities.mp4

10.5 MB

TRust A Compilation Framework for In-process Isolation to Protect Safe.mp4

10.6 MB

Tubes Among Us Analog Attack on Automatic Speaker Identification.mp4

6.4 MB

TVA A multi-party computation system for secure and expressive time series.mp4

7.9 MB

Two Sides of the Shield Understanding Protective DNS adoption factors.mp4

13.0 MB

Two-in-One A Model Hijacking Attack Against Text Generation Models.mp4

10.1 MB

UCBlocker Unwanted Call Blocking Using Anonymous Authentication.mp4

10.7 MB

Ultimate SLH Taking Speculative Load Hardening to the Next Level.mp4

8.8 MB

Uncontained Uncovering Container Confusion in the Linux Kernel.mp4

6.9 MB

Understand Users' Privacy Perception and Decision of V2X Communication in.mp4

8.6 MB

Un-Equal Online Safety - A Gender Analysis of Security and Privacy.mp4

10.6 MB

UnGANable Defending Against GAN-based Face Manipulation.mp4

9.2 MB

Union under Duress Understanding Hazards of Duplicate Resource Mismediation.mp4

10.1 MB

Unique Identification of 50,000 Virtual Reality Users from Head & Hand.mp4

8.3 MB

URET Universal Robustness Evaluation Toolkit (for Evasion).mp4

11.0 MB

User Awareness and Behaviors Concerning Encrypted DNS Settings in Web Browsers.mp4

9.5 MB

UVSCAN Detecting Third-Party Component Usage Violations in IoT Firmware.mp4

11.6 MB

V1SCAN Discovering 1-day Vulnerabilities in Reused C C Open-source.mp4

9.7 MB

V-Cloak Intelligibility-, Naturalness- & Timbre-Preserving Real-Time Voice.mp4

9.5 MB

VeriZexe Decentralized Private Computation with Universal Setup.mp4

13.0 MB

VILLAIN Backdoor Attacks Against Vertical Split Learning.mp4

8.4 MB

VIPER Spotting Syscall-Guard Variables for Data-Only Attacks.mp4

8.3 MB

VulChecker Graph-based Vulnerability Localization in Source Code.mp4

14.4 MB

Watch your Watch Inferring Personality Traits from Wearable Activity Trackers.mp4

9.9 MB

WaterBear Practical Asynchronous BFT Matching Security Guarantees of.mp4

11.5 MB

We Really Need to Talk About Session Tickets A Large-Scale Analysis of.mp4

9.1 MB

What Are the Chances Explaining the Epsilon Parameter in Differential Privacy.mp4

9.9 MB

WHIP Improving Static Vulnerability Detection in Web Application by.mp4

9.7 MB

Wink Deniable Secure Messaging.mp4

10.3 MB

Work-From-Home and COVID-19 Trajectories of Endpoint Security Management.mp4

11.6 MB

X-Adv Physical Adversarial Object Attacks against X-ray Prohibited Item.mp4

11.0 MB

XCheck Verifying Integrity of 3D Printed Patient-Specific Devices via.mp4

8.5 MB

xNIDS Explaining Deep Learning-based Network Intrusion Detection Systems.mp4

9.2 MB

You Can't See Me Physical Removal Attacks on LiDAR-based Autonomous.mp4

13.4 MB

Your Exploit is Mine Instantly Synthesizing Counterattack Smart Contract.mp4

11.9 MB

You've Got Report Measurement and Security Implications of DMARC Reporting.mp4

9.0 MB

ZBCAN A Zero-Byte CAN Defense System.mp4

10.5 MB

zkSaaS Zero-Knowledge SNARKs as a Service.mp4

11.6 MB

/.../USENIX Security 2023 captions/

(M)WAIT for It Bridging the Gap between Microarchitectural and.eng.srt

17.7 KB

µFUZZ Redesign of Parallel Fuzzing using Microservice Architecture.eng.srt

17.8 KB

A Bug's Life Analyzing the Lifecycle and Mitigation Process of Content.eng.srt

19.2 KB

A comprehensive, formal and automated analysis of the EDHOC protocol.eng.srt

19.3 KB

A Data-free Backdoor Injection Approach in Neural Networks.eng.srt

15.0 KB

A Hybrid Alias Analysis and Its Application to Global Variable Protection.eng.srt

18.1 KB

A Large Scale Study of the Ethereum Arbitrage Ecosystem.eng.srt

25.7 KB

A Large-Scale Measurement of Website Login Policies.eng.srt

22.5 KB

A Mixed-Methods Study of Security Practices of Smart Contract Developers.eng.srt

21.1 KB

A Peek into the Metaverse Detecting 3D Model Clones in Mobile Games.eng.srt

19.0 KB

A Plot is Worth a Thousand Words Model Information Stealing Attacks via.eng.srt

20.4 KB

A Research Framework and Initial Study of Browser Security for the Visually.eng.srt

24.1 KB

A Study of China's Censorship and Its Evasion Through the Lens of Online.eng.srt

20.2 KB

A Study of Multi-Factor and Risk-Based Authentication Availability.eng.srt

26.1 KB

A Two-Decade Retrospective Analysis of a University's Vulnerability to.eng.srt

22.8 KB

A Verified Confidential Computing as a Service Framework for Privacy.eng.srt

14.8 KB

Abuse Vectors A Framework for Conceptualizing IoT-Enabled Interpersonal Abuse.eng.srt

20.8 KB

Access Denied Assessing Physical Risks to Internet Access Networks.eng.srt

22.2 KB

Account Security Interfaces Important, Unintuitive, and Untrustworth.eng.srt

22.1 KB

Account Verification on Social Media User Perceptions and Paid Enrollment.eng.srt

23.8 KB

ACFA Secure Runtime Auditing & Guaranteed Device Healing via Active.eng.srt

23.8 KB

ACon2 Adaptive Conformal Consensus for Provable Blockchain Oracles.eng.srt

18.5 KB

ACORN Input Validation for Secure Aggregation.eng.srt

25.3 KB

ACTOR Action-Guided Kernel Fuzzing.eng.srt

20.7 KB

Adversarial Training for Raw-Binary Malware Classifiers.eng.srt

26.2 KB

Aegis Mitigating Targeted Bit-flip Attacks against Deep Neural Networks.eng.srt

17.8 KB

AEX-Notify Thwarting Precise Single-Stepping Attacks through Interrupt.eng.srt

25.3 KB

AIFORE Smart Fuzzing Based on Automatic Input Format Reverse Engineering.eng.srt

19.0 KB

AIRS Explanation for Deep Reinforcement Learning based Security Applications.eng.srt

23.3 KB

AIRTAG Towards Automated Attack Investigation by Unsupervised Learning.eng.srt

15.5 KB

Aliasing Backdoor Attacks on Pre-trained Models.eng.srt

20.0 KB

All cops are broadcasting TETRA under scrutiny.eng.srt

24.3 KB

All of them claim to be the best - Multi-perspective study of VPN user.eng.srt

24.0 KB

AlphaEXP An Expert System for Identifying Security-Sensitive Kernel Objects.eng.srt

14.4 KB

An Efficient Design of Intelligent Network Data Plane.eng.srt

17.8 KB

An Empirical Study & Evaluation of Modern CAPTCHAs.eng.srt

16.6 KB

An Input-Agnostic Hierarchical Deep Learning Framework for Traffic.eng.srt

19.3 KB

Anatomy of a High-Profile Data Breach Dissecting the Aftermath of a Crypto.eng.srt

22.3 KB

AnimateDead Debloating Web Applications Using Concolic Execution.eng.srt

24.4 KB

Araña Discovering and Characterizing Password Guessing Attacks in Practice.eng.srt

20.9 KB

Are Consumers Willing to Pay for Security and Privacy of IoT Devices.eng.srt

21.3 KB

Are You Spying on Me Large-Scale Analysis on IoT Data Exposure through.eng.srt

20.7 KB

ARGUS A Framework for Staged Static Taint Analysis of GitHub Workflows and.eng.srt

24.0 KB

ARGUS Context-Based Detection of Stealthy IoT Infiltration Attacks.eng.srt

24.7 KB

ARI Attestation of Real-time Mission Execution Integrity.eng.srt

19.0 KB

ARMore Pushing Love Back Into Binaries.eng.srt

19.1 KB

Assessing Anonymity Techniques Employed in German Court Decisions A.eng.srt

20.4 KB

ASSET Robust Backdoor Data Detection Across a Multiplicity of Deep Learning.eng.json

575.5 KB

ASSET Robust Backdoor Data Detection Across a Multiplicity of Deep Learning.eng.lrc

16.2 KB

ASSET Robust Backdoor Data Detection Across a Multiplicity of Deep Learning.eng.srt

15.2 KB

ASSET Robust Backdoor Data Detection Across a Multiplicity of Deep Learning.eng.text

11.7 KB

ASSET Robust Backdoor Data Detection Across a Multiplicity of Deep Learning.eng.tsv

14.1 KB

ASSET Robust Backdoor Data Detection Across a Multiplicity of Deep Learning.eng.txt

16.4 KB

ASSET Robust Backdoor Data Detection Across a Multiplicity of Deep Learning.eng.vtt

14.2 KB

ASSET Robust Backdoor Data Detection Across a Multiplicity of Deep Learningeng.srt

23.5 KB

Attacks are Forwarded Breaking the Isolation of MicroVM-based Containers.eng.srt

23.0 KB

Auditing Framework APIs via Inferred App-side Security Specifications.eng.srt

21.8 KB

Auditing Frameworks Need Resource Isolation A Systematic Study on the.eng.srt

15.4 KB

Auditory Eyesight Demystifying μs-Precision Keystroke Tracking Attacks on.eng.srt

16.9 KB

AURC Detecting Errors in Program Code and Documentation.eng.srt

15.5 KB

Authenticated private information retrieval.eng.srt

21.2 KB

AutoFR Automated Filter Rule Generation for Adblocking.eng.srt

27.5 KB

autofz Automated Fuzzer Composition at Runtime.eng.json

447.5 KB

autofz Automated Fuzzer Composition at Runtime.eng.lrc

12.2 KB

autofz Automated Fuzzer Composition at Runtime.eng.srt

12.6 KB

autofz Automated Fuzzer Composition at Runtime.eng.text

8.7 KB

autofz Automated Fuzzer Composition at Runtime.eng.tsv

10.6 KB

autofz Automated Fuzzer Composition at Runtime.eng.txt

12.4 KB

autofz Automated Fuzzer Composition at Runtime.eng.vtt

11.6 KB

Automata-Guided Control-Flow-Sensitive Fuzz Driver Generation.eng.srt

21.7 KB

Automated Analysis of Protocols that use Authenticated Encryption How.eng.srt

17.6 KB

Automated Cookie Notice Analysis and Enforcement.eng.srt

22.1 KB

Automated Exploitable Heap Layout Generation for Heap Overflows Through.eng.srt

14.8 KB

Automated Inference on Financial Security of Ethereum Smart Contracts.eng.srt

18.0 KB

Automated Security Analysis of Exposure Notification Systems.eng.srt

22.7 KB

Back to School On the (In)Security of Academic VPNs.eng.srt

19.2 KB

BalanceProofs Maintainable Vector Commitments with Fast Aggregation.eng.srt

16.9 KB

BASECOMP A Comparative Analysis for Integrity Protection in Cellular.eng.srt

21.5 KB

Beyond The Gates An Empirical Analysis of HTTP-Managed Password Stealers.eng.srt

18.9 KB

Beyond Typosquatting An In-depth Look at Package Confusion.eng.srt

18.9 KB

Bilingual Problems Studying the Security Risks Incurred by Native.eng.srt

21.7 KB

Black-box Adversarial Example Attack towards FCG Based Android Malware.eng.srt

15.5 KB

Bleem Packet Sequence Oriented Fuzzing for Protocol Implementations.eng.srt

14.8 KB

BoKASAN Binary-only Kernel Address Sanitizer for Effective Kernel Fuzzing.eng.srt

16.0 KB

BotScreen Trust Everybody, but Cut the Aimbots Yourself.eng.srt

13.4 KB

Bug Hunters’ Perspectives on the Challenges and Benefits of the Bug Bounty.eng.srt

24.8 KB

BunnyHop Exploiting the Instruction Prefetcher.eng.srt

21.7 KB

Bypassing Tunnels Leaking VPN Client Traffic by Abusing Routing Tables.eng.srt

23.0 KB

CacheQL Quantifying and Localizing Cache Side-Channel Vulnerabilities in.eng.srt

20.7 KB

Calpric Inclusive and Fine-grain Labeling of Privacy Policies with.eng.srt

24.3 KB

Can a Deep Learning Model for One Architecture Be Used for Others.eng.srt

19.4 KB

CAPatch Physical Adversarial Patch against Image Captioning Systems.eng.srt

17.8 KB

Capstone A Capability-based Foundation for Trustless Secure Memory Access.eng.srt

24.7 KB

CarpetFuzz Automatic Program Option Constraint Extraction from.eng.srt

14.8 KB

Catch You and I Can Revealing Source Voiceprint Against Voice Conversion.eng.srt

15.2 KB

Checking Passwords on Leaky Computers A Side Channel Analysis of Chrome's.eng.srt

25.3 KB

Cheesecloth Zero-Knowledge Proofs of Real World Vulnerabilities.eng.srt

23.9 KB

Cipherfix Mitigating Ciphertext Side-Channel Attacks in Software.eng.srt

19.4 KB

CipherH Automated Detection of Ciphertext Side-channel Vulnerabilities in.eng.srt

14.0 KB

ClepsydraCache - Preventing Cache Attacks with Time-Based Evictions.eng.srt

21.4 KB

CodexLeaks Privacy Leaks from Code Generation Language Models in GitHub.eng.srt

20.1 KB

CollidePower Leaking Inaccessible Data with Software-based Power Side.eng.srt

24.2 KB

Combating Robocalls with Phone Virtual Assistant Mediated Interaction.eng.srt

23.9 KB

Confusum Contractum Confused Deputy Vulnerabilities in Ethereum Smart.eng.srt

21.8 KB

Content-Type multipart oracle - Tapping into Format Oracles in Email.eng.srt

27.4 KB

Continuous Learning for Android Malware Detection.eng.srt

24.8 KB

Controlled Data Races in Enclaves Attacks and Detection.eng.srt

18.1 KB

Cookie Crumbles Breaking and Fixing Web Session Integrity.eng.srt

21.7 KB

Credit Karma Understanding Security Implications of Exposed Cloud Services.eng.srt

23.9 KB

Cross Container Attacks The Bewildered eBPF on Clouds.eng.srt

15.5 KB

Cryptographic Administration for Secure Group Messaging.eng.srt

20.6 KB

Cryptographic Deniability A Multi-perspective Study of User Perceptions.eng.srt

19.1 KB

CSHER A System for Compact Storage with HE-Retrieval.eng.srt

24.7 KB

Curve Trees Practical and Transparent Zero-Knowledge Accumulators.eng.srt

16.8 KB

DAFL Directed Grey-box Fuzzing guided by Data Dependency.eng.srt

19.4 KB

DDRace Finding Concurrency UAF Vulnerabilities in Linux Drivers with.eng.json

508.3 KB

DDRace Finding Concurrency UAF Vulnerabilities in Linux Drivers with.eng.lrc

15.3 KB

DDRace Finding Concurrency UAF Vulnerabilities in Linux Drivers with.eng.srt

13.1 KB

DDRace Finding Concurrency UAF Vulnerabilities in Linux Drivers with.eng.text

9.5 KB

DDRace Finding Concurrency UAF Vulnerabilities in Linux Drivers with.eng.tsv

12.6 KB

DDRace Finding Concurrency UAF Vulnerabilities in Linux Drivers with.eng.txt

15.6 KB

DDRace Finding Concurrency UAF Vulnerabilities in Linux Drivers with.eng.vtt

12.1 KB

Decompiling x86 Deep Neural Network Executables.eng.srt

19.5 KB

Defining - Broken - User Experiences and Remediation Tactics When Ad-Blocking.eng.json

479.5 KB

Defining - Broken - User Experiences and Remediation Tactics When Ad-Blocking.eng.lrc

13.0 KB

Defining - Broken - User Experiences and Remediation Tactics When Ad-Blocking.eng.srt

13.0 KB

Defining - Broken - User Experiences and Remediation Tactics When Ad-Blocking.eng.text

10.2 KB

Defining - Broken - User Experiences and Remediation Tactics When Ad-Blocking.eng.tsv

11.7 KB

Defining - Broken - User Experiences and Remediation Tactics When Ad-Blocking.eng.txt

13.1 KB

Defining - Broken - User Experiences and Remediation Tactics When Ad-Blocking.eng.vtt

12.3 KB

Defining - Broken - User Experiences and Remediation Tactics When Ad-Blockingeng.srt

21.0 KB

Demystifying Pointer Authentication on Apple M1.eng.srt

20.4 KB

DeResistor Toward Detection-Resistant Probing for Evasion of Internet.eng.srt

21.8 KB

Design of Access Control Mechanisms in Systems-on-Chip with Formal.eng.srt

18.3 KB

Detecting and Handling IoT Interaction Threats in Multi-Platform Multi.eng.srt

27.7 KB

Detecting API Post-Handling Bugs Using Code and Description in Patches.eng.srt

20.6 KB

Detecting Multi-Step IAM Attacks in AWS Environments via Model Checking.eng.srt

18.5 KB

Detecting Union Type Confusion in Component Object Model.eng.srt

18.8 KB

Device Tracking via Linux’s New TCP Source Port Selection Algorithm.eng.srt

21.4 KB

Did the Shark Eat the Watchdog in the NTP Pool Deceiving the NTP Pool’s.eng.srt

16.0 KB

Differential Testing of Cross Deep Learning Framework APIs Revealing.eng.srt

17.7 KB

DiffSmooth Certifiably Robust Learning via Diffusion Models and Local.eng.srt

18.9 KB

Discovering Adversarial Driving Maneuvers against Autonomous Vehicles.eng.srt

18.6 KB

Distance-Aware Private Set Intersection.eng.srt

29.5 KB

DISTDET A Cost-Effective Distributed Cyber Threat Detection System.eng.srt

21.6 KB

Diving into Robocall Content with SnorCall.eng.srt

26.8 KB

Don’t be Dense Efficient Keyword PIR for Sparse Databases.eng.srt

22.4 KB

Downfall Exploiting Speculative Data Gathering.eng.srt

30.8 KB

Downgrading DNSSEC How to Exploit Crypto Agility for Hijacking Signed Zones.eng.srt

21.8 KB

DScope A Cloud-Native Internet Telescope.eng.srt

30.8 KB

Dubhe Succinct Zero-Knowledge Proofs for Standard AES and relate.eng.srt

21.2 KB

Duoram A Bandwidth-Efficient Distributed ORAM for 2- and 3-Party Computation.eng.srt

31.0 KB

DynSQL Stateful Fuzzing for Database Management Systems with Complex and.eng.srt

15.7 KB

Eavesdropping Mobile App Activity via Radio-Frequency Energy Harvesting.eng.srt

20.7 KB

Educators’ Perspectives of Using (or Not Using) Online Exam Proctoring.eng.srt

22.6 KB

Efficient 3PC for Binary Circuits with Application to Maliciously-Secure.eng.srt

16.8 KB

Efficient Unbalanced Private Set Intersection Cardinality and User-friendly.eng.srt

15.8 KB

Egg Hunt in Tesla Infotainment A First Look at Reverse Engineering of Qt.eng.srt

25.3 KB

ELASM Error-Latency-Aware Scale Management for Fully Homomorphic Encryption.eng.srt

19.0 KB

Employees Who Don’t Accept the Time Security Takes Are Not Aware Enough.eng.srt

18.2 KB

EnigMap External-Memory Oblivious Map for Secure Enclaves.eng.srt

21.4 KB

Eos Efficient Private Delegation of zkSNARK Provers.eng.srt

24.9 KB

Erebus Access Control for Augmented Reality Systems.eng.srt

22.2 KB

Ethical Frameworks and Computer Security Trolley Problems Foundations for.eng.srt

26.8 KB

Evading Provenance-Based ML Detectors with Adversarial System Action.eng.srt

24.0 KB

Every Signature is Broken On the Insecurity of Microsoft Office’s OOXML.eng.srt

21.7 KB

Every Vote Counts Ranking-Based Training of Federated Learning to Resist.eng.srt

19.9 KB

Examining Consumer Reviews to Understand Security and Privacy Issues in the.eng.srt

23.6 KB

Examining Power Dynamics and User Privacy in Smart Technology Use Among.eng.srt

18.2 KB

Exorcising - Wraith - Protecting LiDAR-based Object Detector in Automated.eng.srt

18.3 KB

Exploring Privacy and Incentives Considerations in Adoption of COVID-19.eng.srt

20.8 KB

Exploring Tenants' Preferences of Privacy Negotiation in Airbnb.eng.srt

16.8 KB

Exploring the Unknown DTLS Universe Analysis of the DTLS Server Ecosystem.eng.srt

21.1 KB

Exploring User Reactions and Mental Models Towards Perceptual Manipulation.eng.srt

17.9 KB

Extended Hell(o) A Comprehensive Large-Scale Study on Email.eng.srt

19.6 KB

Extending a Hand to Attackers Browser Privilege Escalation Attacks via.eng.srt

17.8 KB

Extracting Protocol Format as State Machine via Controlled Static Loop.eng.srt

21.9 KB

Extracting Training Data from Diffusion Models.eng.srt

25.5 KB

Eye-Shield Real-Time Protection of Mobile Device Screen Information from.eng.srt

19.2 KB

FABRID Flexible Attestation-Based Routing for Inter-Domain Networks.eng.srt

21.5 KB

FACE-AUDITOR Data Auditing in Facial Recognition Systems.eng.srt

15.1 KB

Fact-Saboteurs A Taxonomy of Evidence Manipulation Attacks against.eng.srt

16.6 KB

Fairness Properties of Face Recognition and Obfuscation Systems.eng.srt

16.9 KB

Fast IDentity Online with Anonymous Credentials (FIDO-AC).eng.srt

22.3 KB

FedVal Different good or different bad in federated learning.eng.srt

14.1 KB

Fine-grained Poisoning Attack to Local Differential Privacy Protocols for.eng.srt

28.5 KB

FirmSolo Enabling dynamic analysis of binary Linux-based IoT kernel modules.eng.srt

21.7 KB

FISHFUZZ Catch Deeper Bugs by Throwing Larger Nets.eng.srt

18.6 KB

FloatZone Accelerating Memory Error Detection using the Floating Point Unit.eng.srt

22.6 KB

Formal Analysis and Patching of BLE-SC Pairing.eng.json

452.2 KB

Formal Analysis and Patching of BLE-SC Pairing.eng.lrc

13.4 KB

Formal Analysis and Patching of BLE-SC Pairing.eng.srt

13.0 KB

Formal Analysis and Patching of BLE-SC Pairing.eng.text

9.4 KB

Formal Analysis and Patching of BLE-SC Pairing.eng.tsv

11.5 KB

Formal Analysis and Patching of BLE-SC Pairing.eng.txt

13.5 KB

Formal Analysis and Patching of BLE-SC Pairing.eng.vtt

12.0 KB

Formal Analysis of Session-Handling in Secure Messaging Lifting Security.eng.srt

21.5 KB

Formal Analysis of SPDM Security Protocol and Data Model version 1.2.eng.srt

22.8 KB

Forming Faster Firmware Fuzzers.eng.srt

21.3 KB

Fourteen Years in the Life A Root Server’s Perspective on DNS Resolve.eng.srt

20.0 KB

Framing Frames Bypassing Wi-Fi Encryption by Manipulating Transmit Queues.eng.srt

24.5 KB

Freaky Leaky SMS Extracting User Locations by Analyzing SMS Timings.eng.srt

19.6 KB

FreeEagle Detecting Complex Neural Trojans in Data-Free Cases.eng.srt

16.4 KB

FuncTeller How Well Does eFPGA Hide Functionality.eng.srt

18.6 KB

Fuzz The Power Dual-role State Guided Black-box Fuzzing for USB Power.eng.srt

20.5 KB

FuzzJIT Oracle-Enhanced Fuzzing for JavaScript Engine JIT Compiler.eng.srt

19.1 KB

Fuzztruction Using Fault Injection-based Fuzzing to Leverage Implicit.eng.srt

19.8 KB

GAP Differentially Private Graph Neural Networks with Aggregation.eng.srt

23.0 KB

Generative Intrusion Detection and Prevention on Data Stream.eng.srt

16.6 KB

GigaDORAM Breaking the Billion Address Barrier.eng.srt

22.3 KB

Glaze Protecting Artists from Style Mimicry by Text-to-Image Models.eng.srt

24.3 KB

GLeeFuzz Fuzzing WebGL Through Error Message Guided Mutation.eng.srt

18.3 KB

Glimpse On-Demand PoW Light Client with Constant-Size Storage for DeFi.eng.srt

18.0 KB

GlitchHiker Uncovering Vulnerabilities of Image Signal Transmission with IEMI.eng.srt

16.4 KB

Glowing in the Dark Uncovering IPv6 Address Discovery and Scanning.eng.srt

21.0 KB

Going through the motions AR VR keylogging from user head motions.eng.srt

23.4 KB

Gradient Obfuscation Gives a False Sense of Security in Federated Learning.eng.srt

21.4 KB

Greenhouse Single-Service Rehosting of Linux-Based Firmware Binaries in.eng.srt

24.7 KB

Guarding Serverless Applications with Kalium.eng.srt

22.3 KB

Hard-label Black-box Universal Adversarial Patch Attack.eng.srt

20.2 KB

Hash Gone Bad Automated discovery of protocol attacks that exploit hash.eng.srt

17.0 KB

HashTag Hash-based Integrity Protection for Tagged Architectures.eng.srt

26.8 KB

HECO Fully Homomorphic Encryption Compiler.eng.srt

23.1 KB

Hey Kimya, Is My Smart Speaker Spying on Me Taking Control of Sensor.eng.srt

19.9 KB

Hidden Reality Caution, Your Hand Gesture Inputs in the Immersive Virtual.eng.srt

21.7 KB

Hiding in Plain Sight An Empirical Study of Web Application Abuse in Malware.eng.srt

20.7 KB

High Recovery with Fewer Injections Practical Binary Volumetric Injection.eng.srt

17.6 KB

Hoedur Embedded Firmware Fuzzing using Multi-Stream Inputs.eng.srt

22.7 KB

HOLMES Efficient Distribution Testing for Secure Collaborative Learning.eng.srt

22.0 KB

HOMESPY The Invisible Sniffer of Infrared Remote Control of Smart TVs.eng.srt

19.7 KB

HorusEye A Realtime IoT Malicious Traffic Detection Framework using.eng.srt

22.0 KB

Hot Pixels Frequency, Power, and Temperature Attacks on GPUs and Arm SoCs.eng.srt

24.6 KB

How Effective is Multiple-Vantage-Point Domain Control Validation.eng.srt

21.3 KB

How fast do you heal A taxonomy for post-compromise security in.eng.srt

18.0 KB

How Library IT Staff Navigate Privacy and Security Challenges and.eng.srt

21.3 KB

How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic.eng.srt

21.5 KB

How to Bind Anonymous Credentials to Humans.eng.srt

19.7 KB

How to Cover up Anomalous Accesses to Electronic Health Records.eng.srt

22.1 KB

Humans vs. Machines in Malware Classification.eng.srt

26.2 KB

HyPFuzz Formal-Assisted Processor Fuzzing.eng.srt

20.1 KB

I wouldn't want my unsafe code to run my pacemaker An Interview Study on.eng.srt

23.0 KB

ICSPatch Automated Vulnerability Localization and Non-Intrusive.eng.srt

21.0 KB

If I could do this, I feel anyone could - The Design and Evaluation.eng.srt

22.6 KB

If sighted people know, I should be able to know Privacy Perceptions of.eng.srt

21.5 KB

I'm going to trust this until it burns me - Parents' Privacy Concerns and.eng.srt

25.0 KB

Improving Logging to Reduce Permission Over-Granting Mistakes.eng.srt

23.3 KB

Improving Real-world Password Guessing Attacks via Bi-directional Transformers.eng.srt

16.0 KB

In the Quest to Protect Users from Side-Channel Attacks - A User-Centred.eng.srt

25.5 KB

Inception Exposing New Attack Surfaces with Training in Transient Execution.eng.srt

21.9 KB

Inducing Authentication Failures to Bypass Credit Card PINs.eng.srt

26.7 KB

Inductive Graph Unlearning.eng.srt

22.6 KB

InfinityGauntlet Expose Smartphone Fingerprint Authentication to.eng.json

382.3 KB

InfinityGauntlet Expose Smartphone Fingerprint Authentication to.eng.lrc

10.5 KB

InfinityGauntlet Expose Smartphone Fingerprint Authentication to.eng.srt

11.5 KB

InfinityGauntlet Expose Smartphone Fingerprint Authentication to.eng.text

8.3 KB

InfinityGauntlet Expose Smartphone Fingerprint Authentication to.eng.tsv

9.5 KB

InfinityGauntlet Expose Smartphone Fingerprint Authentication to.eng.txt

10.6 KB

InfinityGauntlet Expose Smartphone Fingerprint Authentication to.eng.vtt

10.6 KB

Instructions Unclear Undefined Behaviour in Cellular Network Specifications.eng.srt

20.3 KB

Intender Fuzzing Intent-Based Networking with Intent-State Transition.eng.srt

21.1 KB

Internet Service Providers' and Individuals' Attitudes, Barriers, and.eng.srt

19.3 KB

Investigating Verification Behavior and Perceptions of Visual Digital.eng.srt

24.3 KB

Is Your Wallet Snitching On You An Analysis on the Privacy Implications.eng.srt

24.2 KB

Isolated and Exhausted Attacking Operating Systems via Site Isolation in.eng.srt

22.1 KB

It's all in your head(set) Side-channel attacks on AR VR systems.eng.srt

21.9 KB

It's the Equivalent of Feeling Like You're in Jail Lessons from Firsthand.eng.json

550.9 KB

It's the Equivalent of Feeling Like You're in Jail Lessons from Firsthand.eng.lrc

14.4 KB

It's the Equivalent of Feeling Like You're in Jail Lessons from Firsthand.eng.srt

14.9 KB

It's the Equivalent of Feeling Like You're in Jail Lessons from Firsthand.eng.text

11.2 KB

It's the Equivalent of Feeling Like You're in Jail Lessons from Firsthand.eng.tsv

12.9 KB

It's the Equivalent of Feeling Like You're in Jail Lessons from Firsthand.eng.txt

14.6 KB

It's the Equivalent of Feeling Like You're in Jail Lessons from Firsthand.eng.vtt

14.0 KB

It's the Equivalent of Feeling Like You're in Jail Lessons from Firsthandeng.srt

22.8 KB

IvySyn Automated Vulnerability Discovery in Deep Learning Frameworks.eng.srt

17.1 KB

Jinn Hijacking Safe Programs with Trojans.eng.srt

23.0 KB

Keep Your Friends Close, but Your Routeservers Closer Insights into RPK.eng.srt

25.2 KB

KENKU Towards Efficient and Stealthy Black-box Adversarial Attacks against.eng.srt

22.7 KB

KextFuzz Fuzzing macOS Kernel EXTensions on Apple Silicon via Exploiting.eng.srt

16.0 KB

Know Your Cybercriminal Evaluating Attacker Preferences by Measuring.eng.srt

21.8 KB

Knowledge Expansion and Counterfactual Interaction for Reference-Based.eng.srt

22.6 KB

Lalaine Measuring and Characterizing Non-Compliance of Apple Privacy Labels.eng.srt

18.7 KB

Learning Normality is Enough A Software-based Mitigation against Inaudible.eng.srt

18.8 KB

Lessons Lost Incident Response in the Age of Cyber Insurance and Breach.eng.srt

23.3 KB

LibScan Towards More Precise Third-Party Library Identification for.eng.srt

18.6 KB

LightThief Your Optical Communication Information is Stolen behind the Wall.eng.srt

18.5 KB

Linear Private Set Union from Multi-Query Reverse Private Membership Test.eng.srt

18.1 KB

LocIn Inferring Semantic Location from Spatial Maps in Mixed Reality.eng.srt

25.5 KB

Log It’s Big, It’s Heavy, It’s Filled with Personal Data Measuring the.eng.srt

25.3 KB

Long Live The Honey Badger Robust Asynchronous DPSS and its Applications.eng.srt

25.2 KB

Lost at C A User Study on the Security Implications of Large Language Model.eng.json

450.8 KB

Lost at C A User Study on the Security Implications of Large Language Model.eng.lrc

11.8 KB

Lost at C A User Study on the Security Implications of Large Language Model.eng.srt

12.3 KB

Lost at C A User Study on the Security Implications of Large Language Model.eng.text

9.1 KB

Lost at C A User Study on the Security Implications of Large Language Model.eng.tsv

10.6 KB

Lost at C A User Study on the Security Implications of Large Language Model.eng.txt

11.9 KB

Lost at C A User Study on the Security Implications of Large Language Model.eng.vtt

11.5 KB

Lost at C A User Study on the Security Implications of Large Language Modeleng.srt

19.6 KB

Lost in Conversion Exploit Data Structure Conversion with Attribute Loss.eng.srt

15.7 KB

Machine-checking Multi-Round Proofs of Shuffle Terelius-Wikstrom and.eng.srt

14.6 KB

McFIL Model Counting Functionality-Inherent Leakage.eng.srt

26.0 KB

Measuring Up to (Reasonable) Consumer Expectations Providing an Empirical.eng.srt

21.0 KB

Medusa Attack Exploring Security Hazards of In-App QR Code Scanning.eng.srt

18.7 KB

Meta-Sift How to Sift Out a Clean Subset in the Presence of Data Poisoning.eng.srt

19.6 KB

Millions of people are watching you Understanding the Digital-Safety.eng.srt

27.8 KB

MINER A Hybrid Data-Driven Approach for REST API Fuzzing.eng.srt

14.6 KB

Minimalist Semi-automated Debloating of PHP Web Applications through.eng.srt

19.2 KB

Mitigating Security Risks in Linux with KLAUS A Method for Evaluating.eng.json

414.0 KB

Mitigating Security Risks in Linux with KLAUS A Method for Evaluating.eng.lrc

11.0 KB

Mitigating Security Risks in Linux with KLAUS A Method for Evaluating.eng.srt

12.0 KB

Mitigating Security Risks in Linux with KLAUS A Method for Evaluating.eng.text

8.6 KB

Mitigating Security Risks in Linux with KLAUS A Method for Evaluating.eng.tsv

9.8 KB

Mitigating Security Risks in Linux with KLAUS A Method for Evaluating.eng.txt

11.1 KB

Mitigating Security Risks in Linux with KLAUS A Method for Evaluating.eng.vtt

11.1 KB

Mixed Signals Analyzing Ground-Truth Data on the Users and Economics.eng.srt

22.8 KB

MobileAtlas Geographically Decoupled Measurements in Cellular Networks for.eng.srt

21.6 KB

MorFuzz Fuzzing Processor via Runtime Instruction Morphing enhanced.eng.srt

16.2 KB

MTSan A Feasible and Practical Memory Sanitizer for Fuzzing COTS Binaries.eng.srt

28.3 KB

Multi-Factor Key Derivation Function (MFKDF) for Fast, Flexible, Secure, &.eng.srt

20.9 KB

Multiview Finding Blind Spots in Access-Deny Issues Diagnosis.eng.srt

23.7 KB

My Privacy for their Security - Employees' Privacy Perspectives and.eng.srt

20.8 KB

NAUTILUS Automated RESTful API Vulnerability Detection.eng.srt

20.9 KB

Near-Optimal Oblivious Key-Value Stores for Efficient PSI, PSU and Volume.eng.srt

18.2 KB

Near-Ultrasound Inaudible Trojan (Nuit) Exploiting Your Speaker to Attack.eng.srt

18.9 KB

Network Detection of Interactive SSH Impostors Using Deep Learning.eng.srt

23.7 KB

Network Responses to Russia's Invasion of Ukraine in 2022 A Cautionary Tale.eng.json

612.5 KB

Network Responses to Russia's Invasion of Ukraine in 2022 A Cautionary Tale.eng.lrc

18.8 KB

Network Responses to Russia's Invasion of Ukraine in 2022 A Cautionary Tale.eng.srt

15.6 KB

Network Responses to Russia's Invasion of Ukraine in 2022 A Cautionary Tale.eng.text

12.0 KB

Network Responses to Russia's Invasion of Ukraine in 2022 A Cautionary Tale.eng.tsv

15.6 KB

Network Responses to Russia's Invasion of Ukraine in 2022 A Cautionary Tale.eng.txt

19.0 KB

Network Responses to Russia's Invasion of Ukraine in 2022 A Cautionary Tale.eng.vtt

14.6 KB

Network Responses to Russia's Invasion of Ukraine in 2022 A Cautionary Taleeng.srt

24.9 KB

NeuroPots Realtime Proactive Defense against Bit-Flip Attacks in Neural.eng.srt

19.7 KB

No Linux, No Problem Fast and Correct Windows Binary Fuzzing via.eng.srt

23.0 KB

No more Reviewer #2 Subverting Automatic Paper-Reviewer Assignment using.eng.srt

22.4 KB

No Single Silver Bullet Measuring the Accuracy of Password Strength Meters.eng.srt

15.6 KB

Not All Data are Created Equal Data and Pointer Prioritization for Scalable.eng.json

455.8 KB

Not All Data are Created Equal Data and Pointer Prioritization for Scalable.eng.lrc

11.9 KB

Not All Data are Created Equal Data and Pointer Prioritization for Scalable.eng.srt

12.3 KB

Not All Data are Created Equal Data and Pointer Prioritization for Scalable.eng.text

9.3 KB

Not All Data are Created Equal Data and Pointer Prioritization for Scalable.eng.tsv

10.7 KB

Not All Data are Created Equal Data and Pointer Prioritization for Scalable.eng.txt

12.0 KB

Not All Data are Created Equal Data and Pointer Prioritization for Scalable.eng.vtt

11.5 KB

Not All Data are Created Equal Data and Pointer Prioritization for Scalableeng.srt

19.4 KB

Notice the Imposter A Study on User Tag Spoofing Attack in Mobile Apps.eng.srt

23.6 KB

NRDelegationAttack Complexity DDoS attack on DNS Recursive Resolvers.eng.srt

20.7 KB

NVLeak Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems.eng.srt

19.1 KB

On the Feasibility of Malware Unpacking via Hardware-assisted Loop Profiling.eng.srt

21.0 KB

On the Security Risks of Knowledge Graph Reasoning.eng.srt

17.1 KB

One Server for the Price of Two Simple and Fast Single-Server Private.eng.srt

22.5 KB

One Size Does not Fit All Quantifying the Risk of Malicious App Encounters.eng.srt

25.6 KB

One Size Does Not Fit All Uncovering and Exploiting Cross Platform.eng.srt

17.5 KB

Oops.. I Glitched It Again How to Multi-Glitch the Glitching-Protections.eng.srt

16.2 KB

Othered, Silenced and Scapegoated Understanding the Situated Security of.eng.srt

23.5 KB

Panda Security Analysis of Algorand Smart Contracts.eng.srt

16.3 KB

Pass2Edit A Multi-Step Generative Model for Guessing Edited Passwords.eng.srt

17.3 KB

Password Guessing Using Random Forest.eng.srt

16.9 KB

PatchVerif Discovering Faulty Patches in Robotic Vehicles.eng.srt

19.5 KB

PATROL Provable Defense against Adversarial Policy in Two-player Games.eng.srt

25.1 KB

PCAT Functionality and Data Stealing from Split Learning by Pseudo-Client.eng.srt

17.1 KB

PELICAN Exploiting Backdoors of Naturally Trained Deep Learning Models In.eng.srt

18.3 KB

Person Re-identification in 3D Space A WiFi Vision-based Approach.eng.srt

20.5 KB

PET Prevent Discovered Errors from Being Triggered in the Linux Kerne.eng.srt

20.2 KB

PhyAuth Physical-Layer Message Authentication for ZigBee Networks.eng.srt

22.1 KB

Place Your Locks Well Understanding and Detecting Lock Misuse Bugs.eng.srt

20.8 KB

POLICYCOMP Counterpart Comparison of Privacy Policies Uncovers.eng.srt

18.1 KB

PoliGraph Automated Privacy Policy Analysis using Knowledge Graphs.eng.srt

21.2 KB

PolyFuzz Holistic Greybox Fuzzing of Multi-Language Systems.eng.srt

17.1 KB

Pool-Party Exploiting Browser Resource Pools for Web Tracking.eng.srt

21.0 KB

PORE Provably Robust Recommender Systems against Data Poisoning Attacks.eng.srt

19.0 KB

Powering for Privacy Improving User Trust in Smart Speaker Microphones with.eng.json

427.8 KB

Powering for Privacy Improving User Trust in Smart Speaker Microphones with.eng.lrc

11.6 KB

Powering for Privacy Improving User Trust in Smart Speaker Microphones with.eng.srt

11.9 KB

Powering for Privacy Improving User Trust in Smart Speaker Microphones with.eng.text

8.8 KB

Powering for Privacy Improving User Trust in Smart Speaker Microphones with.eng.tsv

10.3 KB

Powering for Privacy Improving User Trust in Smart Speaker Microphones with.eng.txt

11.7 KB

Powering for Privacy Improving User Trust in Smart Speaker Microphones with.eng.vtt

11.1 KB

Powering for Privacy Improving User Trust in Smart Speaker Microphones witheng.srt

18.7 KB

Powering Privacy On the Energy Demand and Feasibility of Anonymity.eng.srt

23.9 KB

Practical Asynchronous High-threshold Distributed Key Generation and.eng.srt

28.3 KB

Precise and Generalized Robustness Certification for Neural Networks.eng.srt

20.5 KB

Prime Match A Privacy-Preserving Inventory Matching System.eng.srt

28.7 KB

Private Proof-of-Stake Blockchains using Differentially-Private Stake.eng.srt

24.4 KB

PrivateFL Accurate, Differentially Private Federated Learning via.eng.srt

20.5 KB

PrivGraph Differentially Private Graph Data Publication by Exploiting.eng.srt

15.6 KB

PrivTrace Differentially Private Trajectory Synthesis by Adaptive Markov.eng.srt

15.1 KB

Problematic Advertising and its Disparate Exposure on Facebook.eng.srt

26.6 KB

PROGRAPHER An Anomaly Detection System based on Provenance Graph Embedding.eng.srt

21.7 KB

ProSpeCT Provably Secure Speculation for the Constant-Time Policy.eng.srt

18.7 KB

PROVIDENCE a Flexible Round-by-Round Risk-Limiting Audit.eng.srt

24.6 KB

Proxy Hunting Understanding and Characterizing Proxy-based Upgradeable.eng.srt

25.8 KB

Pspray Timing Side-Channel based Linux Kernel Heap Exploitation Technique.eng.srt

18.6 KB

PTW Pivotal Tuning Watermarking for Pre-Trained Image Generators.eng.srt

19.8 KB

PUMM Preventing Use-After-Free Using Execution Unit Partitioning.eng.srt

16.8 KB

Pushed by Accident A Mixed-Methods Study on Strategies of Handling Secret.eng.srt

23.8 KB

QFA2SR Query-Free Adversarial Transfer Attacks to Speaker Recognition Systems.eng.srt

13.8 KB

Reassembly is Hard A Reflection on Challenges and Strategies.eng.srt

18.2 KB

Remote Attacks on Speech Recognition Systems Using Sound from Power Supply.eng.srt

17.5 KB

Remote Code Execution from SSTI in the Sandbox Automatically Detecting and.eng.srt

16.8 KB

Remote Direct Memory Introspection.eng.srt

20.2 KB

Rethinking System Audit Architectures for High Event Coverage and.eng.srt

21.2 KB

Rethinking White-Box Watermarks on Deep Learning Models under Neural.eng.srt

18.1 KB

Reusable Enclaves for Confidential Serverless Computing.eng.srt

24.1 KB

ReUSB Replay-Guided USB Driver Fuzzing.eng.srt

19.9 KB

Reversing, Breaking, and Fixing the French Legislative Election E-Voting.eng.srt

23.4 KB

RIDAS Real-time identification of attack sources on controller area networks.eng.srt

20.0 KB

RøB Ransomware over Modern Web Browsers.eng.srt

19.7 KB

Rods with Laser Beams Understanding Browser Fingerprinting on Phishing Pages.eng.srt

16.4 KB

Rosetta Enabling Robust TLS Encrypted Traffic Classification in Diverse.eng.srt

17.5 KB

SAFER Efficient and Error-Tolerant Binary Instrumentation.eng.srt

19.5 KB

SandDriller A Fully-Automated Approach for Testing Language-Based.eng.srt

19.5 KB

SCARF - A Low-Latency Block Cipher for Secure Cache-Randomization.eng.srt

19.0 KB

Secure Floating-Point Training.eng.srt

25.4 KB

Security Analysis of MongoDB Queryable Encryption.eng.srt

20.0 KB

Security and Privacy Failures in Popular 2FA Apps.eng.srt

27.6 KB

Security is not my field, I’m a stats guy A Qualitative Root Cause.eng.srt

29.0 KB

SHELTER Extending Arm CCA with Isolation in User Space.eng.srt

19.8 KB

Sherlock on Specs Building LTE Conformance Tests through Automated Reasoning.eng.srt

19.4 KB

Side-Channel Attacks on Optane Persistent Memory.eng.srt

22.4 KB

Silent Bugs Matter A Study of Compiler-Introduced Security Bugs.eng.srt

16.7 KB

Silent Spring Prototype Pollution Leads to Remote Code Execution in Node.js.eng.srt

17.4 KB

SMACK Semantically Meaningful Adversarial Audio Attack.eng.srt

19.0 KB

Smart Learning to Find Dumb Contracts.eng.srt

24.3 KB

Snapping Snap Sync Practical Attacks on Go Ethereum Synchronising Nodes.eng.srt

23.7 KB

Sneaky Spy Devices and Defective Detectors The Ecosystem of Intimate.eng.srt

23.9 KB

Sparsity Brings Vulnerabilities Exploring New Metrics in Backdoor Attacks.eng.srt

24.1 KB

SpectrEM Exploiting Electromagnetic Emanations During Transient Execution.eng.srt

20.8 KB

Speculation at Fault Modeling and Testing Microarchitectural Leakage of.eng.srt

16.2 KB

Spying through Your Voice Assistants Realistic Voice Command Fingerprinting.eng.srt

24.3 KB

SQIRL Grey-Box Detection of SQL Injection Vulnerabilities Using.eng.srt

22.3 KB

Squint Hard Enough Attacking Perceptual Hashing with Adversarial Machine.eng.srt

32.9 KB

Squirrel A Scalable Secure Two-Party Computation Framework for Training.eng.srt

22.7 KB

Strategies and Vulnerabilities of Participants in Venezuelan Influence.eng.srt

23.7 KB

Subverting Website Fingerprinting Defenses with Robust Traffic Representation.eng.srt

18.8 KB

Synchronization Storage Channels (S2C) Timer-less Cache Side-Channel.eng.srt

21.4 KB

Systematic Assessment of Fuzzers using Mutation Analysis.eng.srt

15.3 KB

TAP Transparent and Privacy-Preserving Data Services.eng.srt

17.9 KB

Temporal CDN-Convex Lens A CDN-Assisted Practical Pulsing DDoS Attack.eng.srt

19.5 KB

That Person Moves Like A Car Misclassification Attack Detection fo.eng.srt

20.7 KB

The Blockchain Imitation Game.eng.srt

18.4 KB

The Case for Learned Provenance Graph Storage Systems.eng.srt

17.2 KB

The Digital-Safety Risks of Financial Technologies for Survivors of.eng.srt

24.1 KB

The Gates of Time Improving Cache Attacks with Transient Execution.eng.srt

23.6 KB

The Impostor Among US(B) Off-Path Injection Attacks on USB Communications.eng.srt

19.5 KB

The Maginot Line Attacking the Boundary of DNS Caching Protection.eng.srt

15.1 KB

The Most Dangerous Codec in the World Finding and Exploiting.eng.srt

20.7 KB

The OK Is Not Enough A Large Scale Study of Consent Dialogs in Smartphone.eng.srt

23.5 KB

The Role of Professional Product Reviewers in Evaluating Security and Privacy.eng.srt

23.8 KB

The Space of Adversarial Strategies.eng.srt

23.0 KB

The Writing on the Wall and 3D Digital Twins Personal Information in.eng.json

441.7 KB

The Writing on the Wall and 3D Digital Twins Personal Information in.eng.lrc

11.5 KB

The Writing on the Wall and 3D Digital Twins Personal Information in.eng.srt

12.4 KB

The Writing on the Wall and 3D Digital Twins Personal Information in.eng.text

8.9 KB

The Writing on the Wall and 3D Digital Twins Personal Information in.eng.tsv

10.3 KB

The Writing on the Wall and 3D Digital Twins Personal Information in.eng.txt

11.6 KB

The Writing on the Wall and 3D Digital Twins Personal Information in.eng.vtt

11.5 KB

The Writing on the Wall and 3D Digital Twins Personal Information ineng.srt

18.7 KB

Three Lessons From Threema Analysis of a Secure Messenger.eng.srt

26.4 KB

Tight Auditing of Differentially Private Machine Learning.eng.srt

22.8 KB

Time for Change How Clocks Break UWB Secure Ranging.eng.srt

23.8 KB

Timeless Timing Attacks and Preload Defenses in Tor's DNS Cache.eng.srt

22.2 KB

To Cloud or not to Cloud A Qualitative Study on Self-Hosters' Motivation.eng.srt

20.9 KB

To Do This Properly, You Need More Resources The Hidden Costs of.eng.srt

16.6 KB

Token Spammers, Rug Pulls, and Sniper Bots An Analysis of the Ecosystem.eng.srt

17.6 KB

Towards a General Video-based Keystroke Inference Attack.eng.srt

15.4 KB

Towards A Proactive ML Approach for Detecting Backdoor Poison Samples.eng.srt

26.9 KB

Towards Targeted Obfuscation of Adversarial Unsafe Images using.eng.srt

18.8 KB

TPatch A Triggered Physical Adversarial Patch.eng.srt

19.4 KB

TreeSync Authenticated Group Management for Messaging Layer Security.eng.srt

19.4 KB

TRIDENT Towards Detecting and Mitigating Web-based Social Engineering Attacks.eng.srt

25.0 KB

Trojan Source Invisible Vulnerabilities.eng.srt

28.0 KB

TRust A Compilation Framework for In-process Isolation to Protect Safe.eng.srt

19.1 KB

Tubes Among Us Analog Attack on Automatic Speaker Identification.eng.srt

16.9 KB

TVA A multi-party computation system for secure and expressive time series.eng.srt

19.1 KB

Two Sides of the Shield Understanding Protective DNS adoption factors.eng.srt

21.3 KB

Two-in-One A Model Hijacking Attack Against Text Generation Models.eng.srt

22.0 KB

UCBlocker Unwanted Call Blocking Using Anonymous Authentication.eng.srt

17.3 KB

Ultimate SLH Taking Speculative Load Hardening to the Next Level.eng.srt

21.1 KB

Uncontained Uncovering Container Confusion in the Linux Kernel.eng.srt

17.8 KB

Understand Users' Privacy Perception and Decision of V2X Communication in.eng.srt

21.9 KB

Un-Equal Online Safety - A Gender Analysis of Security and Privacy.eng.srt

20.8 KB

UnGANable Defending Against GAN-based Face Manipulation.eng.srt

17.9 KB

Union under Duress Understanding Hazards of Duplicate Resource Mismediation.eng.json

458.2 KB

Union under Duress Understanding Hazards of Duplicate Resource Mismediation.eng.lrc

12.8 KB

Union under Duress Understanding Hazards of Duplicate Resource Mismediation.eng.srt

12.9 KB

Union under Duress Understanding Hazards of Duplicate Resource Mismediation.eng.text

9.5 KB

Union under Duress Understanding Hazards of Duplicate Resource Mismediation.eng.tsv

11.2 KB

Union under Duress Understanding Hazards of Duplicate Resource Mismediation.eng.txt

12.9 KB

Union under Duress Understanding Hazards of Duplicate Resource Mismediation.eng.vtt

11.9 KB

Union under Duress Understanding Hazards of Duplicate Resource Mismediationeng.srt

19.5 KB

Unique Identification of 50,000 Virtual Reality Users from Head & Hand.eng.srt

18.8 KB

URET Universal Robustness Evaluation Toolkit (for Evasion).eng.srt

28.2 KB

User Awareness and Behaviors Concerning Encrypted DNS Settings in Web Browsers.eng.srt

25.5 KB

UVSCAN Detecting Third-Party Component Usage Violations in IoT Firmware.eng.srt

22.3 KB

V1SCAN Discovering 1-day Vulnerabilities in Reused C C Open-source.eng.srt

19.6 KB

V-Cloak Intelligibility-, Naturalness- & Timbre-Preserving Real-Time Voice.eng.srt

15.5 KB

VeriZexe Decentralized Private Computation with Universal Setup.eng.srt

32.1 KB

VILLAIN Backdoor Attacks Against Vertical Split Learning.eng.srt

16.2 KB

VIPER Spotting Syscall-Guard Variables for Data-Only Attacks.eng.srt

17.9 KB

VulChecker Graph-based Vulnerability Localization in Source Code.eng.srt

32.8 KB

Watch your Watch Inferring Personality Traits from Wearable Activity Trackers.eng.srt

17.5 KB

WaterBear Practical Asynchronous BFT Matching Security Guarantees of.eng.srt

22.0 KB

We Really Need to Talk About Session Tickets A Large-Scale Analysis of.eng.srt

21.3 KB

What Are the Chances Explaining the Epsilon Parameter in Differential Privacy.eng.srt

26.3 KB

WHIP Improving Static Vulnerability Detection in Web Application by.eng.srt

27.5 KB

Wink Deniable Secure Messaging.eng.srt

30.5 KB

Work-From-Home and COVID-19 Trajectories of Endpoint Security Management.eng.srt

25.4 KB

X-Adv Physical Adversarial Object Attacks against X-ray Prohibited Item.eng.srt

17.3 KB

XCheck Verifying Integrity of 3D Printed Patient-Specific Devices via.eng.srt

13.9 KB

xNIDS Explaining Deep Learning-based Network Intrusion Detection Systems.eng.srt

20.8 KB

You Can't See Me Physical Removal Attacks on LiDAR-based Autonomous.eng.srt

26.9 KB

Your Exploit is Mine Instantly Synthesizing Counterattack Smart Contract.eng.srt

19.6 KB

You've Got Report Measurement and Security Implications of DMARC Reporting.eng.srt

25.6 KB

ZBCAN A Zero-Byte CAN Defense System.eng.srt

24.3 KB

zkSaaS Zero-Knowledge SNARKs as a Service.eng.srt

27.0 KB

/USENIX Security 2024/

00SEVen - Re-enabling Virtual Machine Forensics Introspecting Confidential.mp4

13.5 MB

6Sense Internet-Wide IPv6 Scanning and its Security Applications.mp4

10.4 MB

A Binary-level Thread Sanitizer or Why Sanitizing on the Binary Level is Hard.mp4

11.5 MB

A Broad Comparative Evaluation of Software Debloating Tools.mp4

11.8 MB

A Decade of Privacy-Relevant Android App Reviews Large Scale Trends.mp4

14.0 MB

A First Physical-World Trajectory Prediction Attack via LiDAR-induced.mp4

12.6 MB

A Flushing Attack on the DNS Cache.mp4

8.5 MB

A Friend's Eye is A Good Mirror Synthesizing MCU Peripheral Models from.mp4

13.2 MB

A High Coverage Cybersecurity Scale Predictive of User Behavior.mp4

8.6 MB

A Linear Reconstruction Approach for Attribute Inference Attacks against.mp4

9.4 MB

A Mixed-Methods Study on User Experiences and Challenges of Recovery.mp4

8.3 MB

A NEW HOPE Contextual Privacy Policies for Mobile Applications and An.mp4

15.1 MB

A Taxonomy of C Decompiler Fidelity Issues.mp4

10.5 MB

A Wolf in Sheep's Clothing Practical Black-box Adversarial Attacks for.mp4

10.6 MB

A World Where We Trust Hard-Won Lessons in Security Research, Technology,.mp4

32.8 MB

ABACuS All-Bank Activation Counters for Scalable and Low Overhead.mp4

11.8 MB

Abandon All Hope Ye Who Enter Here A Dynamic, Longitudinal Investigation.mp4

12.7 MB

Abuse Reporting for Metadata-Hiding Communication Based on Secret Sharing.mp4

6.8 MB

Abuse-Resistant Location Tracking Balancing Privacy and Safety in the.mp4

10.4 MB

ACAI Protecting Accelerator Execution with Arm Confidential Computing.mp4

9.0 MB

Accelerating Secure Collaborative Machine Learning with Protocol-Aware RDMA.mp4

12.7 MB

ACE A Model Poisoning Attack on Contribution Evaluation Methods.mp4

11.2 MB

Adversarial Illusions in Multi-Modal Embeddings.mp4

9.8 MB

Adversary is on the Road Attacks on Visual SLAM using Unnoticeable.mp4

11.7 MB

AE-Morpher Improve Physical Robustness of Adversarial Objects against.mp4

6.5 MB

Ahoy SAILR There is No Need to DREAM of C A Compiler-Aware Structuring.mp4

11.0 MB

AI Psychiatry Forensic Investigation of Deep Learning Networks in Memory.mp4

10.5 MB

All Your Tokens are Belong to Us Demystifying Address Verification.mp4

8.9 MB

An Interview Study on Third-Party Cyber Threat Hunting Processes in the U.S.mp4

9.2 MB

An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models.mp4

11.5 MB

Arcanum Detecting and Evaluating the Privacy Risks of Browser Extensions.mp4

9.7 MB

Argus All your (PHP) Injection-sinks are belong to us.mp4

11.4 MB

Assessing Suspicious Emails with Banner Warnings Among Blind and Low-Vision.mp4

12.0 MB

Athena Analyzing and Quantifying Side Channels of Transport Layer Protocols.mp4

11.6 MB

Atropos Effective Fuzzing of Web Applications for Server-Side Vulnerabilities.mp4

10.2 MB

AttackGNN Red-Teaming GNNs in Hardware Security Using Reinforcement Learning.mp4

12.4 MB

ATTention Please An Investigation of the App Tracking Transparency Permission.mp4

10.7 MB

AutoFHE Automated Adaption of CNNs for Efficient Evaluation over FHE.mp4

11.3 MB

Automated Large-Scale Analysis of Cookie Notice Compliance.mp4

8.6 MB

BackdoorIndicator Leveraging OOD Data for Proactive Backdoor Detection in.mp4

14.0 MB

Batch PIR and Labeled PSI with Oblivious Ciphertext Compression.mp4

8.2 MB

BeeBox Hardening BPF against Transient Execution Attacks.mp4

9.4 MB

Being Transparent is Merely the Beginning Enforcing Purpose Limitation.mp4

12.7 MB

Belt and suspenders - or - just red tape - Investigating Early Artifacts.mp4

11.4 MB

Bending microarchitectural weird machines towards practicality.mp4

8.3 MB

Biosignal Authentication Considered Harmful Today.mp4

10.9 MB

Bridging Barriers A Survey of Challenges and Priorities in the Censorship.mp4

9.8 MB

BUDAlloc Defeating Use-After-Free Bugs by Decoupling Virtual Address.mp4

10.6 MB

But they have overlooked a few things in Afghanistan - An Analysis of the.mp4

10.0 MB

CacheWarp Software-based Fault Injection using Selective State Reset.mp4

9.9 MB

CalcuLatency Leveraging Cross-Layer Network Latency Measurements to Detect.mp4

9.8 MB

CAMP Compiler and Allocator-based Heap Memory Protection.mp4

8.4 MB

CAMP Compositional Amplification Attacks against DNS.mp4

9.2 MB

Can I Hear Your Face Pervasive Attack on Voice Authentication Systems with.mp4

9.0 MB

Can Virtual Reality Protect Users from Keystroke Inference Attacks.mp4

8.8 MB

CARDSHARK Understanding and Stablizing Linux Kernel Concurrency Bugs.mp4

7.0 MB

Cascade CPU Fuzzing via Intricate Program Generation.mp4

12.8 MB

CDN Cannon Exploiting CDN Back-to-Origin Strategies for Amplification Attacks.mp4

10.3 MB

CellularLint A Systematic Approach to Identify Inconsistent Behavior in.mp4

9.3 MB

ChainPatrol Balancing Attack Detection and Classification with Performance.mp4

10.8 MB

ChainReactor Automated Privilege Escalation Chain Discovery via AI Planning.mp4

7.4 MB

ClearStamp A Human-Visible and Robust Model-Ownership Proof based on.mp4

11.0 MB

Closed-Form Bounds for DP-SGD against Record-level Inference Attacks.mp4

11.9 MB

CO3 Concolic Co-execution for Firmware.mp4

11.1 MB

Code is not Natural Language Unlock the Power of Semantics-Oriented Graph.mp4

9.0 MB

Co-Designing a Mobile App for Bystander Privacy Protection in Jordanian.mp4

8.3 MB

Correction-based Defense Against Adversarial Video Attacks via.mp4

10.2 MB

Cost-effective Attack Forensics by Recording and Correlating File System.mp4

13.5 MB

Critical Code Guided Directed Greybox Fuzzing for Commits.mp4

10.4 MB

Cross the Zone Toward a Covert Domain Hijacking via Shared DNS Infrastructure.mp4

9.1 MB

Cryptographic Analysis of Delta Chat.mp4

10.5 MB

DaCapo Automatic Bootstrapping Management for Efficient Fully Homomorphic.mp4

10.0 MB

Dancer in the Dark Synthesizing and Evaluating Polyglots for Blind.mp4

8.2 MB

DARKFLEECE Probing the Dark Side of Android Subscription Apps.mp4

8.9 MB

Data Coverage for Guided Fuzzing.mp4

12.1 MB

Data Subjects' Reactions to Exercising Their Right of Access.mp4

11.9 MB

d-DSE Distinct Dynamic Searchable Encryption Resisting Volume Leakage in.mp4

10.0 MB

Deciphering Textual Authenticity A Generalized Strategy through the Lens.mp4

9.9 MB

DeepEclipse How to Break White-Box DNN-Watermarking Schemes.mp4

9.5 MB

DEEPTYPE Refining Indirect Call Targets with Strong Multi-layer Type Analysis.mp4

11.8 MB

Defects-in-Depth Analyzing the Integration of Effective Defenses against.mp4

12.5 MB

Defending Against Data Reconstruction Attacks in Federated Learning An.mp4

10.6 MB

Demystifying the Security Implications in IoT Device Rental Services.mp4

11.6 MB

Detecting and Mitigating Sampling Bias in Cybersecurity with Unlabeled Data.mp4

9.2 MB

Detecting Kernel Memory Bugs through Inconsistent Memory Management.mp4

13.8 MB

Devil in the Room Triggering Audio Backdoors in the Physical World.mp4

9.4 MB

D-Helix A Generic Decompiler Testing Framework Using Symbolic Differentiation.mp4

9.0 MB

Did the Neurons Read your Book Document-level Membership Inference for.mp4

12.9 MB

Did They F ing Consent to That - Safer Digital Intimacy via Proactive.mp4

12.3 MB

Diffie-Hellman Picture Show Key Exchange Stories from Commercial VoWiFi.mp4

10.8 MB

Digital Discrimination of Users in Sanctioned States The Case of the Cuba.mp4

10.2 MB

Dissecting Privacy Perspectives of Websites Around the World - Aceptar Todo.mp4

9.6 MB

Divide and Surrender Exploiting Variable Division Instruction Timing in.mp4

8.8 MB

DMAAUTH A Lightweight Pointer Integrity-based Secure Architecture to Defeat..mp4

9.1 MB

DNN-GP Diagnosing and Mitigating Model's Faults Using Latent Concepts.mp4

9.7 MB

Do You See How I Pose Using Poses as an Implicit Authentication Factor for.mp4

7.0 MB

Does Online Anonymous Market Vendor Reputation Matter.mp4

8.7 MB

DONAPI Malicious NPM Packages Detector using Behavior Sequence Knowledge.mp4

11.2 MB

Don't Listen To Me Understanding and Exploring Jailbreak Prompts of Large.mp4

9.5 MB

Don't Waste My Efforts Pruning Redundant Sanitizer Checks by.mp4

12.0 MB

Double Face Leveraging User Intelligence to Characterize and Recognize.mp4

9.0 MB

DPAdapter Improving Differentially Private Deep Learning through Noise.mp4

8.4 MB

dp-promise Differentially Private Diffusion Probabilistic Models for Image.mp4

8.4 MB

DVa Extracting Victims and Abuse Vectors from Android Accessibility Malware.mp4

10.0 MB

DVSorder Ballot Randomization Flaws Threaten Voter Privacy.mp4

10.1 MB

EaTVul ChatGPT-based Evasion Attack Against Software Vulnerability Detection.mp4

12.9 MB

Efficient Privacy Auditing in Federated Learning.mp4

9.2 MB

EL3XIR Fuzzing COTS Secure Monitors.mp4

9.5 MB

Election Eligibility with OpenID Turning Authentication into Transferable.mp4

8.3 MB

ElectionGuard a Cryptographic Toolkit to Enable Verifiable Elections.mp4

13.8 MB

Enabling Contextual Soft Moderation on Social Media through Contrastive.mp4

9.8 MB

Enabling Developers, Protecting Users Investigating Harassment and Safety.mp4

10.5 MB

Endokernel A Thread Safe Monitor for Lightweight Subprocess Isolation.mp4

9.6 MB

ENG25519 Faster TLS 1.3 handshake using optimized X25519 and Ed25519.mp4

12.9 MB

Engaging Company Developers in Security Research Studies A Comprehensive.mp4

8.2 MB

Enhancing Network Attack Detection with Distributed and In-Network Data.mp4

10.0 MB

EVOKE Efficient Revocation of Verifiable Credentials in IoT Networks.mp4

9.3 MB

Exploiting Leakage in Password Managers via Injection Attacks.mp4

12.3 MB

Exploring ChatGPT's Capabilities on Vulnerability Management.mp4

11.7 MB

Exploring Covert Third-party Identifiers through External Storage in the.mp4

10.4 MB

Exploring digital security and privacy in relative poverty in Germany.mp4

9.9 MB

Eye of Sauron Long-Range Hidden Spy Camera Detection and Positioning with.mp4

14.6 MB

FaceObfuscator Defending Deep Learning-based Privacy Attacks with Gradient.mp4

9.7 MB

FakeBehalf Imperceptible Email Spoofing Attacks against the Delegation.mp4

9.7 MB

False Claims against Model Ownership Resolution.mp4

10.6 MB

FAMOS Robust Privacy-Preserving Authentication on Payment Apps via.mp4

11.1 MB

Fast and Private Inference of Deep Neural Networks by Co-designing.mp4

10.4 MB

Fast RS-IOP Multivariate Polynomial Commitments and Verifiable Secret Sharing.mp4

8.1 MB

FEASE Fast and Expressive Asymmetric Searchable Encryption.mp4

11.9 MB

FFXE Dynamic Control Flow Graph Recovery for Embedded Firmware Binaries.mp4

11.3 MB

Finding Traceability Attacks in the Bluetooth Low Energy Specification.mp4

10.5 MB

Fingerprinting Obfuscated Proxy Traffic with Encapsulated TLS Handshakes.mp4

9.8 MB

FIRE Combining Multi-Stage Filtering with Taint Analysis for Scalable.mp4

10.7 MB

Fledging Will Continue Until Privacy Improves Empirical Analysis of.mp4

10.0 MB

Forget and Rewire Enhancing the Resilience of Transformer-based Models.mp4

9.9 MB

Formal Security Analysis of Widevine through the W3C EME Standard.mp4

12.3 MB

Formal verification of the PQXDH Post-Quantum key agreement protocol for.mp4

13.9 MB

Formalizing and Benchmarking Prompt Injection Attacks and Defenses.mp4

7.3 MB

Formalizing Soundness Proofs of Linear PCP SNARKs.mp4

11.1 MB

FraudWhistler A Resilient, Robust and Plug-and-play Adversarial Example.mp4

9.0 MB

From One Thousand Pages of Specification to Unveiling Hidden Bugs Large.mp4

6.6 MB

From the Childhood Past Views of Young Adults on Parental Sharing of.mp4

12.6 MB

Fuzzing BusyBox Leveraging LLM and Crash Reuse for Embedded Bug Unearthing.mp4

12.5 MB

FV8 A Forced Execution JavaScript Engine for Detecting Evasive Techniques.mp4

10.5 MB

FVD-DPM Fine-grained Vulnerability Detection via Conditional Diffusion.mp4

10.7 MB

GFWeb Measuring the Great Firewall's Web Censorship at Scale.mp4

10.0 MB

GhostRace Exploiting and Mitigating Speculative Race Conditions.mp4

11.0 MB

GHunter Universal Prototype Pollution Gadgets in JavaScript Runtimes.mp4

9.4 MB

GlobalConfusion TrustZone Trusted Application 0-Days by Design.mp4

9.8 MB

Go Go Gadget Hammer Flipping Nested Pointers for Arbitrary Data Leakage.mp4

9.2 MB

GoFetch Breaking Constant-Time Cryptographic Implementations Using Data.mp4

10.3 MB

GPU Memory Exploitation for Fun and Profit.mp4

10.0 MB

Gradients Look Alike Sensitivity is Often Overestimated in DP-SGD.mp4

9.7 MB

GraphGuard Private Time-Constrained Pattern Detection Over Streaming.mp4

9.4 MB

GridSE Towards Practical Secure Geographic Search via Prefix Symmetric.mp4

8.5 MB

Guardians of the Galaxy Content Moderation in the InterPlanetary File System.mp4

9.5 MB

GuideEnricher Protecting the Anonymity of Ethereum Mixing Service Users.mp4

8.0 MB

HECKLER Breaking Confidential VMs with Malicious Interrupts.mp4

9.3 MB

Hermes Unlocking Security Analysis of Cellular Network Protocols by.mp4

10.3 MB

Hijacking Attacks against Neural Network by Analyzing Training Data.mp4

9.7 MB

HIVE A Hardware-assisted Isolated Execution Environment for eBPF on AArch64.mp4

10.6 MB

Holding Secrets Accountable Auditing Privacy-Preserving Machine Learning.mp4

11.4 MB

How Does a Deep Learning Model Architecture Impact Its Privacy.mp4

11.0 MB

How does Endpoint Detection use the MITRE ATT&CK Framework.mp4

10.5 MB

How WEIRD is Usable Privacy and Security Research.mp4

10.6 MB

HYPERPILL Fuzzing for Hypervisor-bugs by Leveraging the Hardware.mp4

14.0 MB

I chose to fight, be brave, and to deal with it - Threat Experiences and.mp4

8.7 MB

I Don't Know If We're Doing Good. I Don't Know If We're Doing Bad.mp4

12.7 MB

I Experienced More than 10 DeFi Scams On DeFi Users' Perception of.mp4

9.3 MB

I feel physically safe but not politically safe - Understanding the Digital..mp4

8.7 MB

I just hated it and I want my money back - Data-driven Understanding of.mp4

10.3 MB

I O-Efficient Dynamic Searchable Encryption meets Forward & Backward Privacy.mp4

12.2 MB

I really just leaned on my community for support - Barriers, Challenges.mp4

9.7 MB

iHunter Hunting Privacy Violations at Scale in the Software Supply Chain.mp4

10.8 MB

I'm not convinced that they don't collect more than is necessary.mp4

11.2 MB

Improving Indirect-Call Analysis in LLVM with Type and Data-Flow Co-Analysis.mp4

9.7 MB

Improving ML-based Binary Function Similarity Detection by Assessing and.mp4

10.5 MB

Improving the Ability of Thermal Radiation Based Hardware Trojan Detection.mp4

9.6 MB

In Wallet We Trust Bypassing the Digital Wallets Payment Security for Free.mp4

9.1 MB

Indirector High-Precision Branch Target Injection Attacks Exploiting the.mp4

12.2 MB

Inf2Guard An Information-Theoretic Framework for Learning.mp4

10.6 MB

Inference of Error Specifications and Bug Detection Using Structural.mp4

7.8 MB

Information Flow Control in Machine Learning through Modular Model.mp4

11.8 MB

INSIGHT Attacking Industry-Adopted Learning Resilient Logic Locking.mp4

8.1 MB

InSpectre Gadget Inspecting the Residual Attack Surface of Cross-privilege.mp4

9.0 MB

Instruction Backdoor Attacks Against Customized LLMs.mp4

10.5 MB

Intellectual Property Exposure Subverting and Securing Intellectual.mp4

9.8 MB

Into the Dark Unveiling Internal Site Search Abused for Black Hat SEO.mp4

11.2 MB

InvalidateCompare A Timer-Free GPU Cache Attack Primitive.mp4

10.9 MB

Investigating Moderation Challenges to Combating Hate and Harassment The.mp4

9.8 MB

Invisibility Cloak Proactive Defense Against Visual Game Cheating.mp4

14.6 MB

IoT Market Dynamics An Analysis of Device Sales, Security and Privacy.mp4

7.3 MB

Is It a Trap A Large-scale Empirical Study And Comprehensive Assessment.mp4

14.7 MB

It Doesn't Look Like Anything to Me Using Diffusion Model to Subvert.mp4

9.9 MB

Key Recovery Attacks on Approximate Homomorphic Encryption with.mp4

8.9 MB

KnowPhish Large Language Models Meet Multimodal Knowledge Graphs for.mp4

12.6 MB

K-Waay Fast and Deniable Post-Quantum X3DH without Ring Signatures.mp4

13.1 MB

LaKey Efficient Lattice-Based Distributed PRFs Enable Scalable Distributed.mp4

13.3 MB

LanDscAPe Exploring LDAP Weaknesses and Data Leaks at Internet Scale.mp4

9.7 MB

Landscape More Secure Than Portrait Zooming Into the Directionality of.mp4

11.6 MB

Large Language Models for Code Analysis Do LLMs Really Do Their Job.mp4

12.3 MB

LaserAdv Laser Adversarial Attacks on Speech Recognition Systems.mp4

9.3 MB

Leakage-Abuse Attacks Against Structured Encryption for SQL.mp4

13.5 MB

Learning with Semantics Towards a Semantics-Aware Routing Anomaly Detection.mp4

10.6 MB

Length Leakage in Oblivious Data Access Mechanisms.mp4

9.6 MB

Less Defined Knowledge and More True Alarms Reference-based Phishing.mp4

4.8 MB

Less is More Revisiting the Gaussian Mechanism for Differential Privacy.mp4

11.9 MB

Leveraging Semantic Relations in Code and Data to Enhance Taint Analysis of.mp4

11.2 MB

LLM-Fuzzer Scaling Assessment of Large Language Model Jailbreaks.mp4

9.3 MB

Logic Gone Astray A Security Analysis Framework for the Control Plane.mp4

13.4 MB

Loopy Hell(ow) Infinite Traffic Loops at the Application Layer.mp4

7.1 MB

Lotto Secure Participant Selection against Adversarial Servers in Federated..mp4

10.6 MB

LR-Miner Static Race Detection in OS Kernels by Mining Locking Rules.mp4

10.1 MB

Lurking in the shadows Unveiling Stealthy Backdoor Attacks agains.mp4

14.3 MB

Machine Learning needs Better Randomness Standards Randomised Smoothing.mp4

12.8 MB

MAGIC Detecting Advanced Persistent Threats via Masked Graph Representation..mp4

11.2 MB

Making Them Ask and Answer Jailbreaking Large Language Models in Few.mp4

13.3 MB

Malla Demystifying Real-world Large Language Model Integrated Malicious.mp4

13.9 MB

Max Attestation Matters Making Honest Parties Lose Their Incentives in.mp4

9.9 MB

MD-ML Super Fast Privacy-Preserving Machine Learning for Malicious.mp4

11.5 MB

Mempool Privacy via Batched Threshold Encryption Attacks and Defense.mp4

8.2 MB

MetaSafe Compiling for Protecting Smart Pointer Metadata to Ensure Safe.mp4

11.8 MB

MFKDF Multiple Factors Knocked Down Flat.mp4

9.6 MB

MicGuard A Comprehensive Detection System against Out-of-band Injection.mp4

14.7 MB

MIST Defending Against Membership Inference Attacks Through.mp4

10.4 MB

MOAT Towards Safe BPF Kernel Extension.mp4

12.3 MB

ModelGuard Information-Theoretic Defense Against Model Extraction Attacks.mp4

10.7 MB

Moderating Illicit Online Image Promotion for Unsafe User Generated Content.mp4

12.7 MB

More Simplicity for Trainers, More Opportunity for Attackers Black-Box.mp4

10.6 MB

Mudjacking Patching Backdoor Vulnerabilities in Foundation Models.mp4

8.3 MB

MultiFuzz A Multi-Stream Fuzzer For Testing Monolithic Firmware.mp4

10.2 MB

MUSES Efficient Multi-User Searchable Encrypted Database.mp4

11.1 MB

Navigating the Privacy Compliance Maze Understanding Risks with.mp4

10.4 MB

Navigating Traumatic Stress Reactions During Computer Security Interventions.mp4

10.2 MB

Near-Optimal Constrained Padding for Object Retrievals with Dependencies.mp4

10.6 MB

NetShaper A Differentially Private Network Side-Channel Mitigation System.mp4

10.1 MB

Neural Network Semantic Backdoor Detection and Mitigation A Causality-Based..mp4

8.4 MB

Notus Dynamic Proofs of Liabilities from Zero-knowledge RSA Accumulators.mp4

14.4 MB

OblivGNN Oblivious Inference on Transductive and Inductive Graph Neural.mp4

13.4 MB

On a Collision Course Unveiling Wireless Attacks to the Aircraft Traffic.mp4

9.2 MB

On Bridging the Gap between Control Flow Integrity and Attestation Schemes.mp4

13.5 MB

On Data Fabrication in Collaborative Vehicular Perception Attacks and.mp4

10.4 MB

On the Criticality of Integrity Protection in 5G Fronthaul Networks.mp4

11.6 MB

On the Difficulty of Defending Contrastive Learning against Backdoor Attacks.mp4

9.4 MB

Operation Mango Scalable Discovery of Taint-Style Vulnerabilities in.mp4

9.0 MB

Opportunistic Data Flow Integrity for Real-time Cyber-physical Systems.mp4

11.1 MB

OptFuzz Optimization Path Guided Fuzzing for JavaScript JIT Compilers.mp4

9.3 MB

OPTIKS An Optimized Key Transparency System.mp4

10.7 MB

OPTISAN Using Multiple Spatial Error Defenses to Optimize Stack Memory.mp4

8.2 MB

ORANalyst Systematic Testing Framework for Open RAN Implementations.mp4

10.7 MB

Orbital Trust and Privacy SoK on PKI and Location Privacy Challenges in.mp4

10.7 MB

O-Ring and K-Star Efficient Multi-party Private Set Intersection.mp4

11.7 MB

Page-Oriented Programming Subverting Control-Flow Integrity of Commodity..mp4

14.3 MB

Pandawan Quantifying Progress in Linux-based Firmware Rehosting.mp4

13.0 MB

PatchCURE Improving Certifiable Robustness, Model Utility, and Computation.mp4

8.5 MB

Peep With A Mirror Breaking The Integrity of Android App Sandboxing via.mp4

13.5 MB

Penetration Vision through Virtual Reality Headsets Identifying 360-degree.mp4

10.6 MB

PentestGPT Evaluating and Harnessing Large Language Models for Automated.mp4

9.6 MB

PEPSI Practically Efficient Private Set Intersection in the Unbalanced.mp4

11.8 MB

PerfOMR Oblivious Message Retrieval with Reduced Communication and.mp4

7.7 MB

PhishDecloaker Detecting CAPTCHA-cloaked Phishing Websites via Hybrid.mp4

11.6 MB

PINE Efficient Verification of a Euclidean Norm Bound of a Secret-Shared.mp4

10.3 MB

Pixel and Pixel Compact and Efficient Forward-Secure Multi-Signatures.mp4

8.7 MB

Pixel Thief Exploiting SVG Filter Leakage in Firefox and Chrome.mp4

7.4 MB

PIXELMOD Improving Soft Moderation of Visual Misleading Information on.mp4

12.4 MB

PointerGuess Targeted Password Guessing Model Using Pointer Mechanism.mp4

10.2 MB

POPSTAR Lightweight Threshold Reporting with Reduced Leakage.mp4

9.8 MB

Practical Data-Only Attack Generation.mp4

9.5 MB

Practical Security Analysis of Zero-Knowledge Proof Circuits.mp4

10.2 MB

Privacy Side Channels in Machine Learning Systems.mp4

8.9 MB

Privacy-Preserving Data Aggregation with Public Verifiability Against.mp4

11.4 MB

PrivImage Differentially Private Synthetic Image Generation using.mp4

14.5 MB

Prompt Stealing Attacks Against Text-to-Image Generation Models.mp4

11.8 MB

Property Existence Inference against Generative Models.mp4

12.8 MB

PURE Payments with UWB RElay-protectio.mp4

10.2 MB

PURL Safe and Effective Sanitization of Link Decoration.mp4

8.6 MB

Quantifying Privacy Risks of Prompts in Visual Prompt Learning.mp4

8.0 MB

Query Recovery from Easy to Hard Jigsaw Attack against SSE.mp4

10.9 MB

Rabbit-Mix Robust Algebraic Anonymous Broadcast from Additive Bases.mp4

8.7 MB

Racing for TLS Certificate Validation A Hijacker's Guide to the Android.mp4

12.7 MB

Racing on the Negative Force Efficient Vulnerability Root-Cause Analysis.mp4

9.7 MB

RADIUS UDP Considered Harmful.mp4

11.3 MB

Reconstructing training data from document understanding models.mp4

8.4 MB

RECORD A RECeption-Only Region Determination Attack on LEO Satellite Users.mp4

10.2 MB

Reef Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs.mp4

9.7 MB

 

Showing first 10000 files of 10642 total files


Copyright © 2025 FileMood.com