USENIX Security
File List
- USENIX Security 2020/sec20__full_proceedings.pdf 267.8 MB
- USENIX Security 2020/sec20_full_proceedings_interior.pdf 266.6 MB
- USENIX Security 2019/USENIX Security 2019 Full Proceedings.pdf 200.8 MB
- USENIX Security 2019/USENIX Security 2019 Full Proceedings interior.pdf 200.0 MB
- USENIX Security 2020/USENIX Security 2020 Panels/USENIX Security 20 - Panel Digital Contact Tracing.mp4 174.5 MB
- USENIX Security 2018/USENIX Security 2018 Full Proceedings.mobi 148.0 MB
- USENIX Security 2019/USENIX Security 2019 Video/Security Educational Panel.mp4 139.7 MB
- USENIX Security 2020/USENIX Security 2020 Panels/USENIX Security 20 - Panel The 2020 Election Remote Voting, Disinformation, and Audit.mp4 119.9 MB
- USENIX Security 2017/USENIX Security 2017 Full Proceedings.pdf 115.6 MB
- USENIX Security 2017/USENIX Security 2017 Full Proceedings Interior.pdf 115.3 MB
- USENIX Security 2017/USENIX Security 2017 Full Proceedings.mobi 113.0 MB
- USENIX Security 2018/USENIX Security 2018 Full Proceedings.pdf 103.5 MB
- USENIX Security 2018/USENIX Security 2018 Full Proceedings Interior.pdf 102.4 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Panel Digital Contact Tracing.mp4 102.3 MB
- USENIX Security 2016/USENIX Security 2016 Videos/Security Competitions.mp4 100.3 MB
- USENIX Security 2015/USENIX Security 2015 Videos/Conducting Usable Security Studies - It s Complicated.mp4 96.5 MB
- USENIX Security 2010/USENIX Security 2010 Videos/Vulnerable Compliance - Dan Geer.mp4 94.7 MB
- USENIX Security 2016/USENIX Security 2016 Videos/The Moral Character of Cryptographic Work.mp4 92.2 MB
- USENIX Security 2013/USENIX Security 2013 Videos/The White House's Priorities for Cybersecurity - Andy Ozment.mp4 91.6 MB
- USENIX Security 2011/USENIX Security 2011 Videos/Deport on Arrival Adventures in Technology, Politics, and Power - J. Alex Halderman.mp4 91.0 MB
- USENIX Security 2014/USENIX Security 2014 Videos/The Future of Crypto Getting from Here to Guarantees - Daniel J. Bernstein, Matt Blaze, Tanja Lange.mp4 90.9 MB
- USENIX Security 2016/USENIX Security 2016 Videos/When Governments Attack Malware Targeting Activists, Lawyers, and Journalists.mp4 89.0 MB
- USENIX Security 2009/USENIX Security 2009 Videos/Toward a New Legal Framework for Cybersecurity - Deirdre K. Mulligan.mp4 88.8 MB
- USENIX Security 2010/USENIX Security 2010 Videos/The Evolution of the Flash Security Model - Peleus Uhley.mp4 86.5 MB
- USENIX Security 2009/USENIX Security 2009 Videos/Modern Exploitation and Memory Protection Bypasses - Alexander Sotirov.mp4 85.9 MB
- USENIX Security 2018/USENIX Security 2018 Full Proceedings.epub 85.7 MB
- USENIX Security 2012/USENIX Security 2012 Videos/Keynote - The Evolution of Information Assurance - Dickie George.mp4 85.7 MB
- USENIX Security 2015/USENIX Security 2015 Videos/Inherent Cyber Insecurity and Our National Security - Surviving on a Diet of Poisoned Fruit.mp4 85.3 MB
- USENIX Security 2014/USENIX Security 2014 Videos/Battling Human Trafficking with Big Data - Rolando R. Lopez.mp4 85.0 MB
- USENIX Security 2011/USENIX Security 2011 Videos/Privacy in the Age of Augmented Reality - Alessandro Acquisti.mp4 84.0 MB
- USENIX Security 2016/USENIX Security 2016 Videos/Teaching Computer Security Thoughts from the Field.mp4 83.7 MB
- USENIX Security 2013/USENIX Security 2013 Videos/Dr. Felten Goes To Washington - Lessons from 18 Months in Government - Edward W. Felten.mp4 81.0 MB
- USENIX Security 2011/USENIX Security 2011 Videos/I'm from the Government and I'm Here to Help - Perspectives from a Privacy Tech Wonk - Tara Whalen.mp4 80.1 MB
- USENIX Security 2010/USENIX Security 2010 Videos/Proving Voltaire Right Security Blunders Dumber Than Dog Snot - Roger G. Johnston.mp4 79.0 MB
- USENIX Security 2008/USENIX Security 2008 Videos/Dr. Strangevote or How I Learned to Stop Worrying and Love the Paper Ballot - Debra Bowen.mp4 78.4 MB
- USENIX Security 2016/USENIX Security 2016 Videos/The Unfalsifiability of Security Claims.mp4 77.3 MB
- USENIX Security 2013/USENIX Security 2013 Videos/Security Team 2.0 - Chris Evans.mp4 77.1 MB
- USENIX Security 2011/USENIX Security 2011 Videos/SSLTLS Certificates Threat or Menace - Eric Rescorla, Adam Langley, Brian Smith, Stephen Schultze, Steve Kent.mp4 76.8 MB
- USENIX Security 2011/USENIX Security 2011 Videos/Pico No More Passwords - Frank Stajano.mp4 76.6 MB
- USENIX Security 2015/USENIX Security 2015 Videos/Why Johnny and Janie Can’t Code Safely - Bringing Software Assurance to the Masses.mp4 75.6 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Panel The 2020 Election Remote Voting, Disinformation, and Audit.mp4 75.0 MB
- USENIX Security 2009/USENIX Security 2009 Videos/Work-in-Progress Reports (WiPs) - Session Chair Sven Dietrich.mp4 74.9 MB
- USENIX Security 2016/USENIX Security 2016 Videos/Making HTTPS the Default in the World's Largest Bureaucracy.mp4 73.5 MB
- USENIX Security 2015/USENIX Security 2015 Videos/Preventing Security Bugs through Software Design.mp4 73.4 MB
- USENIX Security 2013/USENIX Security 2013 Videos/Confessions of a Recovering Data Broker Responsible Innovation in the Age of Big Data, Big Brother, and the Coming Skynet Terminators - Jim Adler.mp4 72.8 MB
- USENIX Security 2011/USENIX Security 2011 Videos/Crossing the Chasm Pitching Security Research to Mainstream Browser Vendors - Collin Jackson.mp4 72.3 MB
- USENIX Security 2016/USENIX Security 2016 Videos/Crashing Drones and Hijacked Cameras CyberTrust Meets CyberPhysical.mp4 72.2 MB
- USENIX Security 2015/USENIX Security 2015 Full Proceedings.mobi 71.3 MB
- USENIX Security 2011/USENIX Security 2011 Videos/The Three Cyber-War Fallacies - Dave Aitel.mp4 70.2 MB
- USENIX Security 2010/USENIX Security 2010 Videos/Docile No More The Tussle to Redefine the Internet - James Lewis.mp4 69.7 MB
- USENIX Security 2010/USENIX Security 2010 Videos/Toward an Open and Secure Platform for Using the Web - Will Drewry.mp4 69.5 MB
- USENIX Security 2010/USENIX Security 2010 Videos/Windows 7 Security from a UNIX Perspective - Crispin Cowan.mp4 69.3 MB
- USENIX Security 2009/USENIX Security 2009 Videos/Android Securing a Mobile Platform from the Ground Up - Rich Cannings.mp4 68.1 MB
- USENIX Security 2012/USENIX Security 2012 Videos/Cyber Security Education in a Time of Change - Cynthia E. Irvine.mp4 67.9 MB
- USENIX Security 2009/USENIX Security 2009 Videos/Baggy Bounds Checking An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors - Periklis Akritidis, Manuel Costa, Miguel Castro, Steven Hand.mp4 67.3 MB
- USENIX Security 2014/USENIX Security 2014 Videos/Information Security War Room - Sergey Bratus, Dartmouth College, Felix FX Lindner.mp4 66.5 MB
- USENIX Security 2016/USENIX Security 2016 Videos/Privacy and Threat in Practice Mobile Messaging by Low-Income New Yorkers.mp4 66.5 MB
- USENIX Security 2016/USENIX Security 2016 Full Proceedings.epub 65.0 MB
- USENIX Security 2010/USENIX Security 2010 Videos/Grid, PhD Smart Grid, Cyber Security, and the Future of Keeping the Lights On - Kelly Ziegler.mp4 64.1 MB
- USENIX Security 2009/USENIX Security 2009 Videos/Hash Functions and Their Many Uses in Cryptography - Shai Halevi.mp4 62.1 MB
- USENIX Security 2012/USENIX Security 2012 Videos/Life as a Target-Welcome to the Club - Dickie George.mp4 61.5 MB
- USENIX Security 2017/USENIX Security 2017 Full Proceedings.epub 59.6 MB
- USENIX Security 2013/USENIX Security 2013 Videos/Building Securable Infrastructure Open-Source Private Clouds - Pravir Chandra.mp4 59.4 MB
- USENIX Security 2016/USENIX Security 2016 Videos/AMD x86 Memory Encryption Technologies.mp4 57.1 MB
- USENIX Security 2019/USENIX Security 2019 Video/Security Research and Public Policy.mp4 57.0 MB
- USENIX Security 2017/USENIX Security 2017 Videos/Data Hemorrhage, Inequality, and You.mp4 56.7 MB
- USENIX Security 2011/USENIX Security 2011 Videos/Network Security in the Medium Term 2061-2561 AD - Charles Stross.mp4 56.5 MB
- USENIX Security 2010/USENIX Security 2010 Videos/Network Security in the Medium Term 2061-2561 AD - stross.mp4 56.5 MB
- USENIX Security 2019/USENIX Security 2019 Video/Baby Steps towards the Precipice How the Web Became a Scary.mp4 55.6 MB
- USENIX Security 2019/USENIX Security 2019 Video/Tackling the Trust and Safety Crisis.mp4 54.9 MB
- USENIX Security 2016/USENIX Security 2016 Videos/Finding and Fixing Security Bugs in Flash.mp4 54.6 MB
- USENIX Security 2016/USENIX Security 2016 Videos/2016 Test of Time Award Panel.mp4 54.4 MB
- USENIX Security 2009/USENIX Security 2009 Videos/Top Ten Web Hacking Techniques of 2008 What's possible, not probable - Jeremiah Grossman.mp4 54.2 MB
- USENIX Security 2013/USENIX Security 2013 Proceedings.epub 53.5 MB
- USENIX Security 2015/USENIX Security 2015 Full Proceedings.epub 52.9 MB
- USENIX Security 2019/USENIX Security 2019 Video/The Spies Hacking our Phones are Going Dark, and We're All in Trouble.mp4 52.2 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Q - Why Do Keynote Speakers Keep Suggesting That Improving Security Is Possible.mp4 51.8 MB
- USENIX Security 2019/USENIX Security 2019 Video/From Privacy by Design to Data Protection by Design The Challenges of.mp4 50.8 MB
- USENIX Security 2012/USENIX Security 2012 Videos/Emerging Trends and Their Security Implications - Doug Burger.mp4 50.5 MB
- USENIX Security 2021/People Count Contact Tracing Apps and Public Health.mp4 50.2 MB
- USENIX Security 2013/USENIX Security 2013 Videos/Tracking the Casino Computer Wars Who’s Winning - the Casino or the Cheat - Richard Marcus.mp4 50.1 MB
- USENIX Security 2017/USENIX Security 2017 Videos/When Your Threat Model Is - Everything - Defensive Security in Modern Newsrooms.mp4 48.8 MB
- USENIX Security 2016/USENIX Security 2016 Videos/Report from the Field A CDN's Role in Repelling Attacks against Banking.mp4 47.6 MB
- USENIX Security 2014/USENIX Security 2014 Videos/USENIX SECURITY 2014 Keynote - Phone Phreaks What We Can Learn From the First Network Hackers - Phil Lapsely.mp4 47.6 MB
- USENIX Security 2012/USENIX Security 2012 Videos/Nature is a Language Can't You Read - Meredith L. Patterson.mp4 47.4 MB
- USENIX Security 2019/USENIX Security 2019 Video/Shining Light on Internet-based Crimes Against Children.mp4 46.4 MB
- USENIX Security 2018/USENIX Security 2018 Videos/The Law and Economics of Bug Bounties.mp4 45.8 MB
- USENIX Security 2016/USENIX Security 2016 Full Proceedings.pdf 43.9 MB
- USENIX Security 2016/USENIX Security 2016 Full Proceedings.mobi 43.6 MB
- USENIX Security 2016/USENIX Security 2016 Full Proceedings Interior.pdf 42.9 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Analogy Cyber Security-From 0101 to Mixed Signals.mp4 42.9 MB
- USENIX Security 2019/USENIX Security 2019 Video/Embracing the - Hack. - A Better Strategy for Team-Defense.mp4 42.8 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Chipmunk or Pepe Using Acoustical Analysis to Detect Voice-Channel Fraud at Scale.mp4 42.7 MB
- USENIX Security 2019/USENIX Security 2019 Video/Evaluating Mobile Messengers for Implementation Vulnerabilities.mp4 42.5 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Solving the Next Billion-People Privacy Problem.mp4 42.5 MB
- USENIX Security 2017/USENIX Security 2017 Videos/How the Web Tangled Itself.mp4 42.3 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Medical Device Cybersecurity through the FDA Lens.mp4 40.9 MB
- USENIX Security 2017/USENIX Security 2017 Videos/OSS-Fuzz - Google's continuous fuzzing service for open source software.mp4 40.8 MB
- USENIX Security 2019/USENIX Security 2019 Video/Lessons Learned About Building Secure Software It's About the Developers.mp4 40.2 MB
- USENIX Security 2014/USENIX Security 2014 Full Proceedings.pdf 40.0 MB
- USENIX Security 2014/USENIX Security 2014 Full Proceedings Interrior.pdf 39.2 MB
- USENIX Security 2013/USENIX Security 2013 Videos/Windows 8 Security - Supporting User Confidence - Crispin Cowan.mp4 39.0 MB
- USENIX Security 2013/USENIX Security 2013 Videos/Windows 8 Security Supporting User Confidence - Crispin Cowan.mp4 38.7 MB
- USENIX Security 2011/USENIX Security 2011 Videos/The Cloud-y Future of Security Technologies - Adam O'Donnell.mp4 38.6 MB
- USENIX Security 2019/USENIX Security 2019 Video/Lessons Learned from Evaluating the Robustness of Defenses to.mp4 37.7 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Privacy for Tigers.mp4 35.8 MB
- USENIX Security 2016/USENIX Security 2016 Videos/fTPM A Software-Only Implementation of a TPM Chip.mp4 35.7 MB
- USENIX Security 2018/USENIX Security 2018 Videos/The Second Crypto War-What's Different Now.mp4 35.7 MB
- USENIX Security 2017/USENIX Security 2017 Videos/Game of Registrars.mp4 35.6 MB
- USENIX Security 2007/Presentations/The Human Factor in Online Fraud - Markus Jakobsson.pdf 35.2 MB
- USENIX Security 2015/USENIX Security 2015 Full Proceedings.pdf 34.1 MB
- USENIX Security 2015/USENIX Security 2015 Presentations/sec15_full_proceedings.pdf 34.0 MB
- USENIX Security 2015/USENIX Security 2015 Full Proceedings Interior.pdf 33.9 MB
- USENIX Security 2015/USENIX Security 2015 Presentations/sec15_full_proceedings_interior.pdf 33.9 MB
- USENIX Security 2010/USENIX Security 2010 Videos/Making Linux Protection Mechanisms Egalitarian with UserFS - Taesoo Kim, Nickolai Zeldovich.mp4 33.7 MB
- USENIX Security 2017/USENIX Security 2017 Videos/Malton - Towards On-Device Non-Invasive Mobile Malware Analysis for ART.mp4 33.6 MB
- USENIX Security 2012/USENIX Security 2012 Presentations/TARDIS Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without Clocks Slides - Amir Rahmati, Mastooreh Salajegheh, Dan Holcomb, Jacob Sorber, W.pdf 33.4 MB
- USENIX Security 2017/USENIX Security 2017 Videos/Measuring the Insecurity of Mobile Deep Links of Android.mp4 33.4 MB
- USENIX Security 2012/USENIX Security 2012 Videos/On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces - Ivan Martinovic, Doug Davies, Mario Frank, Daniele Perito, Tomas Ros, Dawn Song.mp4 32.9 MB
- USENIX Security 2017/USENIX Security 2017 Videos/ROTE - Rollback Protection for Trusted Execution.mp4 32.9 MB
- USENIX Security 2010/USENIX Security 2010 Videos/Baaz A System for Detecting Access Control Misconfigurations - Tathagata Das, Ranjita Bhagwan, Prasad Naldurg.mp4 32.8 MB
- USENIX Security 2017/USENIX Security 2017 Videos/Hacking in Darkness - Return-oriented Programming against Secure Enclaves.mp4 32.7 MB
- USENIX Security 2018/USENIX Security 2018 Videos/BlackIoT - IoT Botnet of High Wattage Devices Can Disrupt the Power Grid.mp4 32.1 MB
- USENIX Security 2017/USENIX Security 2017 Videos/6thSense - A Context-aware Sensor-based Attack Detector for Smart Devices.mp4 31.4 MB
- USENIX Security 2017/USENIX Security 2017 Videos/DR. CHECKER - A Soundy Analysis for Linux Kernel Drivers.mp4 31.0 MB
- USENIX Security 2012/USENIX Security 2012 Proceedings.epub 30.8 MB
- USENIX Security 2017/USENIX Security 2017 Videos/Differential Privacy - From Theory to Deployment.mp4 30.8 MB
- USENIX Security 2010/USENIX Security 2010 Videos/PrETP Privacy-Preserving Electronic Toll Pricing - Josep Balasch, Alfredo Rial, Carmela Troncoso, Bart Preneel, Ingrid Verbauwhede, Christophe Geuens.mp4 30.7 MB
- USENIX Security 2010/USENIX Security 2010 Videos/Security and Privacy Vulnerabilities of In-Car Wireless Networks A Tire Pressure Monitoring System Case Study - Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis Taylor, Sangho Oh.mp4 30.6 MB
- USENIX Security 2017/USENIX Security 2017 Videos/Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing.mp4 30.4 MB
- USENIX Security 2010/USENIX Security 2010 Videos/The Case for Ubiquitous Transport-Level Encryption - Andrea Bittau, Michael Hamburg, Mark Handley, David Mazieres, Dan Boneh.mp4 30.4 MB
- USENIX Security 2009/USENIX Security 2009 Videos/Effective and Efficient Malware Detection at the End Host - Clemens Kolbitsch, Paolo Milani Comparetti, Christopher Kruegel, Engin Kirda, Sophia Antipolis, Xiaoyong Zhou, Xia.mp4 30.4 MB
- USENIX Security 2017/USENIX Security 2017 Videos/REM - Resource-Efficient Mining for Blockchains.mp4 30.4 MB
- USENIX Security 2009/USENIX Security 2009 Videos/NOZZLE A Defense Against Heap-spraying Code Injection Attacks - Paruj Ratanaworabhan, Benjamin Livshits, Benjamin Zorn.mp4 30.3 MB
- USENIX Security 2018/USENIX Security 2018 Videos/When Does Machine Learning FAIL Generalized Transferability for Evasion and Poisoning Attacks.mp4 30.1 MB
- USENIX Security 2009/USENIX Security 2009 Videos/Compromising Electromagnetic Emanations of Wired and Wireless Keyboards - Martin Vuagnoux, Sylvain Pasini.mp4 29.8 MB
- USENIX Security 2009/USENIX Security 2009 Videos/Crying Wolf An Empirical Study of SSL Warning Effectiveness - Joshua Sunshine, Serge Egelman, Hazim Almuhimedi, Neha Atri, and Lorrie Faith Cranor.mp4 29.7 MB
- USENIX Security 2010/USENIX Security 2010 Videos/Building a Dynamic Reputation System for DNS - Manos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee, Nick Feamster.mp4 29.7 MB
- USENIX Security 2017/USENIX Security 2017 Videos/PDF Mirage - Content Masking Attack Against Information-Based Online Services.mp4 29.7 MB
- USENIX Security 2010/USENIX Security 2010 Videos/BotGrep Finding P2P Bots with Structured Graph Analysis - Shishir Nagaraja, Prateek Mittal, Chi-Yao Hong, Matthew Caesar, Nikita Borisov.mp4 29.7 MB
- USENIX Security 2014/USENIX Security 2014 Videos/USENIX Security 2014 Lightning Talks.mp4 29.4 MB
- USENIX Security 2009/USENIX Security 2009 Videos/Return-Oriented Rootkits Bypassing Kernel Code Integrity Protection Mechanisms - Ralf Hund, Thorsten Holz, Felix C. Freiling.mp4 29.3 MB
- USENIX Security 2017/USENIX Security 2017 Videos/Same-Origin Policy - Evaluation in Modern Browsers.mp4 29.3 MB
- USENIX Security 2017/USENIX Security 2017 Videos/BinSim - Trace-based Semantic Binary Diffing.mp4 29.2 MB
- USENIX Security 2011/USENIX Security 2011 Videos/ZOZZLE Fast and Precise In-Browser JavaScript Malware Detection - Charlie Curtsinger, Benjamin Livshits, Benjamin Zorn, Christian Seifert.mp4 29.1 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Security Namespace - Making Linux Security Frameworks Available to Containers.mp4 29.1 MB
- USENIX Security 2016/USENIX Security 2016 Videos/Post-quantum Key Exchange-A New Hope.mp4 28.9 MB
- USENIX Security 2017/USENIX Security 2017 Videos/AWare - Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings.mp4 28.9 MB
- USENIX Security 2019/USENIX Security 2019 Video/SafeHidden An Efficient and Secure Information Hiding Technique Using.mp4 28.8 MB
- USENIX Security 2012/USENIX Security 2012 Videos/Securing Early Software Development - Riley Eller.mp4 28.8 MB
- USENIX Security 2019/USENIX Security 2019 Video/Wireless Attacks on Aircraft Instrument Landing Systems.mp4 28.8 MB
- USENIX Security 2017/USENIX Security 2017 Videos/Attacking the Brain - Races in the SDN Control Plane.mp4 28.8 MB
- USENIX Security 2009/USENIX Security 2009 Videos/Protecting Confidential Data on Personal Computers with Storage Capsules - Kevin Borders, Eric Vander Weele, Billy Lau, Atul Prakash.mp4 28.5 MB
- USENIX Security 2017/USENIX Security 2017 Videos/Transcend - Detecting Concept Drift in Malware Classification Models.mp4 28.5 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Understanding the Reproducibility of Crowd-reported Security Vulnerabilities.mp4 28.4 MB
- USENIX Security 2017/USENIX Security 2017 Videos/SmartPool - Practical Decentralized Pooled Mining.mp4 28.4 MB
- USENIX Security 2009/USENIX Security 2009 Videos/Vanish Increasing Data Privacy with Self-Destructing Data - Roxana Geambasu, Tadayoshi Kohno, Amit A. Levy, Henry M. Levy.mp4 28.4 MB
- USENIX Security 2017/USENIX Security 2017 Videos/CCSP - Controlled Relaxation of Content Security Policies.mp4 28.4 MB
- USENIX Security 2009/USENIX Security 2009 Videos/xBook Redesigning Privacy Control in Social Networking Platforms - Kapil Singh, Sumeer Bhola, Wenke Lee.mp4 28.3 MB
- USENIX Security 2009/USENIX Security 2009 Videos/VPriv Protecting Privacy in Location-Based Vehicular Services - Raluca Ada Popa, Hari Balakrishnan, Andrew J. Blumberg.mp4 28.2 MB
- USENIX Security 2010/USENIX Security 2010 Videos/Fighting Coercion Attacks in Key Generation using Skin Conductance - Payas Gupta, Debin Gao.mp4 28.2 MB
- USENIX Security 2016/USENIX Security 2016 Videos/Specification Mining for Intrusion Detection in Networked Control Systems.mp4 28.1 MB
- USENIX Security 2017/USENIX Security 2017 Videos/How Double-Fetch Situations turn into Double-Fetch Vulnerabilities.mp4 28.1 MB
- USENIX Security 2019/USENIX Security 2019 Video/On (The Lack Of) Location Privacy in Crowdsourcing Applications.mp4 28.0 MB
- USENIX Security 2011/USENIX Security 2011 Videos/Show Me the Money Characterizing Spam-advertised Revenue - Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorso, Christian Kreibich, Kirill Levchenko, Vern Paxson, Geoffrey.mp4 27.8 MB
- USENIX Security 2017/USENIX Security 2017 Videos/A Privacy Analysis of Cross-device Tracking.mp4 27.7 MB
- USENIX Security 2011/USENIX Security 2011 Videos/TRESOR Runs Encryption Securely Outside RAM - Tilo Müller, Felix C. Freiling, Andreas Dewald.mp4 27.7 MB
- USENIX Security 2017/USENIX Security 2017 Videos/An Ant in a World of Grasshoppers.mp4 27.7 MB
- USENIX Security 2009/USENIX Security 2009 Videos/Detecting Spammers with SNARE Spatio-temporal Network-level Automatic Reputation Engine - Shuang Hao, Nadeem Ahmed Syed, Nick Feamster, Alexander G. Gray, Sven Krasser.mp4 27.6 MB
- USENIX Security 2017/USENIX Security 2017 Videos/Qapla - Policy compliance for database-backed systems.mp4 27.6 MB
- USENIX Security 2019/USENIX Security 2019 Video/No Right to Remain Silent Isolating Malicious Mixes.mp4 27.5 MB
- USENIX Security 2010/USENIX Security 2010 Videos/VEX Vetting Browser Extensions for Security Vulnerabilities - Sruthi Bandhakavi, Samuel T. King, P. Madhusudan, Marianne Winslett.mp4 27.5 MB
- USENIX Security 2010/USENIX Security 2010 Videos/AdJail Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements - Mike Ter Louw, Karthik Thotta Ganesh, V.N. Venkatakrishnan.mp4 27.5 MB
- USENIX Security 2011/USENIX Security 2011 Videos/Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade - Nektarios Leontiadis, Tyler Moore, Nicolas Christin.mp4 27.5 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/Confessions of a Recovering Data Broker Responsible Innovation in the Age of Big Data, Big Brother, and the Coming Skynet Terminators Slides - Jim Adler.pdf 27.4 MB
- USENIX Security 2017/USENIX Security 2017 Videos/SLEUTH - Real-time Attack Scenario Reconstruction from COTS Audit Data.mp4 27.3 MB
- USENIX Security 2011/USENIX Security 2011 Videos/Bubble Trouble Off-Line De-Anonymization of Bubble Forms - Joseph A. Calandrino, William Clarkson, Edward W. Felten.mp4 27.3 MB
- USENIX Security 2009/USENIX Security 2009 Videos/Locating Prefix Hijackers using LOCK - Tongqing Qiu, Lusheng Ji, Dan Pei, Jia Wang, Jun (Jim) Xu, Hitesh Ballani.mp4 27.2 MB
- USENIX Security 2014/USENIX Security 2014 Videos/How To Live In Paradise Pearls of Wisdom for New and Prospective Faculty - David Evans.mp4 27.2 MB
- USENIX Security 2012/USENIX Security 2012 Videos/Data Node Encrypted File System Efficient Secure Deletion for Flash Memory - Joel Reardon, Srdjan Capkun, David Basin.mp4 27.1 MB
- USENIX Security 2009/USENIX Security 2009 Videos/Improving Tor using a TCP-over-DTLS Tunnel - Joel Reardon, Ian Goldberg.mp4 27.1 MB
- USENIX Security 2017/USENIX Security 2017 Videos/Understanding the Mirai Botnet.mp4 27.1 MB
- USENIX Security 2013/USENIX Security 2013 Proceedings.mobi 26.9 MB
- USENIX Security 2012/USENIX Security 2012 Videos/Impact of Spam Exposure on User Engagement - Anirban Dasgupta, - Kunal Punera, Justin M. Rao, Xuanhui Wang.mp4 26.9 MB
- USENIX Security 2013/USENIX Security 2013 Proceedings.pdf 26.6 MB
- USENIX Security 2011/USENIX Security 2011 Videos/SMS of Death From Analyzing to Attacking Mobile Phones on a Large Scale - Collin Mulliner, Nico Golde, Jean-Pierre Seifert.mp4 26.6 MB
- USENIX Security 2017/USENIX Security 2017 Videos/Towards Practical Tools for Side Channel Aware Software Engineering.mp4 26.5 MB
- USENIX Security 2017/USENIX Security 2017 Videos/SmartAuth - User-Centered Authorization for the Internet of Things.mp4 26.5 MB
- USENIX Security 2017/USENIX Security 2017 Videos/Identifier Binding Attacks and Defenses in Software-Defined Networks.mp4 26.4 MB
- USENIX Security 2019/USENIX Security 2019 Video/ERIM Secure, Efficient In-process Isolation with Protection Keys (MPK).mp4 26.4 MB
- USENIX Security 2010/USENIX Security 2010 Videos/Adapting Software Fault Isolation to Contemporary CPU Architectures - David Sehr, Robert Muth, Cliff Biffle, Victor Khimenko, Egor Pasko, Karl Schimpf, Bennet Yee, Brad Chen.mp4 26.4 MB
- USENIX Security 2012/USENIX Security 2012 Videos/Neuroscience Meets Cryptography Designing Crypto Primitives Secure Against Rubber Hose Attacks - Hristo Bojinov, Daniel Sanchez, Paul Reber, Northw.mp4 26.4 MB
- USENIX Security 2012/USENIX Security 2012 Videos/Gone in 360 Seconds Hijacking with Hitag2 - Roel Verdult, Flavio D. Garcia, Josep Balasch, KU Leuven.mp4 26.4 MB
- USENIX Security 2013/USENIX Security 2013 Proceedings Interior.pdf 26.4 MB
- USENIX Security 2017/USENIX Security 2017 Videos/When the Weakest Link is Strong.mp4 26.3 MB
- USENIX Security 2009/USENIX Security 2009 Videos/The Multi-Principal OS Construction of the Gazelle Web Browser.mp4 26.2 MB
- USENIX Security 2010/USENIX Security 2010 Videos/Scantegrity II Municipal Election at Takoma Park The First E2E Binding Governmental Election with Ballot Privacy - Richard Carback, David Chaum, Jeremy Clark, John Conway, Aleksand.mp4 26.1 MB
- USENIX Security 2011/USENIX Security 2011 Videos/Measuring Pay-per-Install The Commoditization of Malware Distribution - Juan Caballero, Chris Grier, Christian Kreibich, Vern Paxson.mp4 26.1 MB
- USENIX Security 2010/USENIX Security 2010 Videos/Securing Script-Based Extensibility in Web Browsers - Vladan Djeric, Ashvin Goel.mp4 26.0 MB
- USENIX Security 2011/USENIX Security 2011 Videos/Comprehensive Experimental Analyses of Automotive Attack Surfaces - Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl.mp4 26.0 MB
- USENIX Security 2011/USENIX Security 2011 Videos/ADsafety Type-Based Verification of JavaScript Sandboxing - Joe Gibbs Politz, Spiridon Aristides Eliopoulos, Arjun Guha, Shriram Krishnamurthi.mp4 25.9 MB
- USENIX Security 2016/USENIX Security 2016 Videos/Mirror Enabling Proofs of Data Replication and Retrievability in the Cloud.mp4 25.8 MB
- USENIX Security 2012/USENIX Security 2012 Videos/PharmaLeaks Understanding the Business of Online Pharmaceutical Affiliate Programs - Damon McCoy, Andreas Pitsillidis, Grant Jordan, Nicholas Weaver, Christian Kreibich, Brian Kreb.mp4 25.8 MB
- USENIX Security 2017/USENIX Security 2017 Videos/AuthentiCall - Efficient Identity and Content Authentication for Phone Calls.mp4 25.8 MB
- USENIX Security 2017/USENIX Security 2017 Videos/See No Evil, Hear No Evil, Feel No Evil.mp4 25.7 MB
- USENIX Security 2019/USENIX Security 2019 Video/EnTrust Regulating Sensor Access by Cooperating Programs.mp4 25.7 MB
- USENIX Security 2010/USENIX Security 2010 Videos/Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking - Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidiah R. Crandall.mp4 25.6 MB
- USENIX Security 2017/USENIX Security 2017 Videos/Seeing Through The Same Lens.mp4 25.6 MB
- USENIX Security 2017/USENIX Security 2017 Videos/Walkie-Talkie.mp4 25.4 MB
- USENIX Security 2011/USENIX Security 2011 Videos/The Phantom Tollbooth Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion - Sarah Meiklejohn, Keaton Mowery, Stephen Checkoway, Hovav Shacham.mp4 25.4 MB
- USENIX Security 2011/USENIX Security 2011 Videos/Secure In-Band Wireless Pairing - Shyamnath Gollakota, Nabeel Ahmed, Nickolai Zeldovich, Dina Katabi.mp4 25.4 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Enter the Hydra - Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts.mp4 25.3 MB
- USENIX Security 2013/USENIX Security 2013 Videos/MetaSymploit Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis - Ruowen Wang, Peng Ning, Tao Xie, Quan Chen.mp4 25.3 MB
- USENIX Security 2012/USENIX Security 2012 Videos/Mining Your Ps and Qs Detection of Widespread Weak Keys in Network Devices - Nadia Heninger, Zakir Durumeric, Eric Wustrow, J. Alex Halderm.mp4 25.3 MB
- USENIX Security 2010/USENIX Security 2010 Videos/Toward Automated Detection of Logic Vulnerabilities in Web Applications - Viktoria Felmetsger, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna.mp4 25.2 MB
- USENIX Security 2013/USENIX Security 2013 Videos/Measuring the Practical Impact of DNSSEC Deployment - Wilson Lian, Eric Rescorla, Hovav Shacham, Stefan Savage.mp4 25.2 MB
- USENIX Security 2012/USENIX Security 2012 Videos/I Forgot Your Password Randomness Attacks Against PHP Applications - George Argyros, Aggelos Kiayias.mp4 25.1 MB
- USENIX Security 2012/USENIX Security 2012 Videos/How Does Your Password Measure Up - The Effect of Strength Meters on Password Creation - Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Mazu.mp4 25.1 MB
- USENIX Security 2010/USENIX Security 2010 Videos/P4P Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users - Yitao Duan, NetEase Youdao, John Canny, Justin Zhan.mp4 25.0 MB
- USENIX Security 2017/USENIX Security 2017 Videos/HELP - Helper-Enabled In-Band Device Pairing.mp4 25.0 MB
- USENIX Security 2012/USENIX Security 2012 Videos/Whispers in the Hyper-space High-speed Covert Channel Attacks in the Cloud - Zhenyu Wu, Zhang Xu, Haining Wang.mp4 25.0 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Translation Leak-aside Buffer - Defeating Cache Side-channel Protections with TLB Attacks.mp4 25.0 MB
- USENIX Security 2009/USENIX Security 2009 Videos/Memory Safety for Low-Level Software Hardware Interactions - John Criswell, Nicolas Geoffray, Pierre et Marie Curie, Vikram Adve.mp4 25.0 MB
- USENIX Security 2017/USENIX Security 2017 Videos/I Have No Idea What I'm Doing - On the Usability of Deploying HTTPS.mp4 25.0 MB
- USENIX Security 2009/USENIX Security 2009 Videos/Physical-layer Identification of RFID Devices - Boris Danev, Thomas S. Heydt-Benjamin, Srdjan Capkun.mp4 25.0 MB
- USENIX Security 2013/USENIX Security 2013 Videos/Dismantling Megamos Crypto Wirelessly Lockpicking a Vehicle Immobilizer - Roel Verdult, Flavio D. Garcia, Baris Ege.mp4 24.9 MB
- USENIX Security 2013/USENIX Security 2013 Videos/The Velocity of Censorship High-Fidelity Detection of Microblog Post Deletions - Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall.mp4 24.9 MB
- USENIX Security 2011/USENIX Security 2011 Videos/Why (Special Agent) Johnny (Still) Can't Encrypt A Security Analysis of the APCO Project 25 Two-Way Radio System - Sandy Clark, Travis Goodspeed, Perry Metzger, Zachary Wasserman.mp4 24.9 MB
- USENIX Security 2016/USENIX Security 2016 Videos/UNVEIL A Large-Scale, Automated Approach to Detecting Ransomware.mp4 24.9 MB
- USENIX Security 2019/USENIX Security 2019 Video/Hiding in Plain Signal Physical Signal Overshadowing Attack on LTE.mp4 24.9 MB
- USENIX Security 2013/USENIX Security 2013 Videos/ZMap Fast Internet-wide Scanning and Its Security Applications - durumeric.mp4 24.8 MB
- USENIX Security 2013/USENIX Security 2013 Videos/WHYPER Towards Automating Risk Assessment of Mobile Applications - Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, Tao Xie.mp4 24.8 MB
- USENIX Security 2017/USENIX Security 2017 Videos/Towards Efficient Heap Overflow Discovery.mp4 24.8 MB
- USENIX Security 2011/USENIX Security 2011 Videos/JACKSTRAWS Picking Command and Control Connections from Bot Traffic - Gregoire Jacob, Ralf Hund, Christopher Kruegel.mp4 24.7 MB
- USENIX Security 2017/USENIX Security 2017 Videos/Phoenix - Rebirth of a Cryptographic Password-Hardening Service.mp4 24.7 MB
- USENIX Security 2017/USENIX Security 2017 Videos/Detecting Credential Spearphishing in Enterprise Settings.mp4 24.7 MB
- USENIX Security 2012/USENIX Security 2012 Videos/DroidScope Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis - Lok Kwong Yan, Heng Yin.mp4 24.7 MB
- USENIX Security 2011/USENIX Security 2011 Videos/Q Exploit Hardening Made Easy - Edward J. Schwartz, Thanassis Avgerinos, David Brumley.mp4 24.6 MB
- USENIX Security 2015/USENIX Security 2015 Videos/Sound-Proof - Usable Two-Factor Authentication Based on Ambient Sound.mp4 24.6 MB
- USENIX Security 2018/USENIX Security 2018 Videos/SAQL - A Stream-based Query System for Real-Time Abnormal System Behavior Detection.mp4 24.6 MB
- USENIX Security 2013/USENIX Security 2013 Videos/Trafficking Fradulent Accounts The Role of the Underground Market in Twitter Spam and Abuse - Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, Vern Paxson.mp4 24.6 MB
- USENIX Security 2010/USENIX Security 2010 Videos/Fast Regular Expression Matching Using Small TCAMs for Network Intrusion Detection and Prevention Systems - Chad R. Meiners, Jignesh Patel, Eric Norige, Eric Torng, and Alex X. Liu.mp4 24.6 MB
- USENIX Security 2012/USENIX Security 2012 Videos/Security and Usability Challenges of Moving-Object CAPTCHAs Decoding Codewords in Motion - Y. Xu, G. Reynaga, S. Chiasson, J.-M. Frahm, F. Monrose, P. van Oorschot.mp4 24.6 MB
- USENIX Security 2011/USENIX Security 2011 Videos/Forensic Triage for Mobile Phones with DEC0DE - Robert J. Walls, Erik Learned-Miller, Brian Neil Levine.mp4 24.5 MB
- USENIX Security 2012/USENIX Security 2012 Videos/An Evaluation of the Google Chrome Extension Security Architecture - Nicholas Carlini, Adrienne Porter Felt, David Wagner.mp4 24.4 MB
- USENIX Security 2012/USENIX Security 2012 Videos/Policy-Sealed Data A New Abstraction for Building Trusted Cloud Services - Nuno Santos, Rodrigo Rodrigues, Krishna P. Gummadi.mp4 24.4 MB
- USENIX Security 2015/USENIX Security 2015 Videos/Investigating the Computer Security Practices and Needs of Journalists.mp4 24.4 MB
- USENIX Security 2012/USENIX Security 2012 Videos/Establishing Browser Security Guarantees through Formal Shim Verification - Dongseok Jang, Zachary Tatlock, Sorin Lerner.mp4 24.3 MB
- USENIX Security 2012/USENIX Security 2012 Videos/PUBCRAWL Protecting Users and Businesses from CRAWLers - Gregoire Jacob, Engin Kirda, Christopher Kruegel, Giovanni Vigna.mp4 24.3 MB
- USENIX Security 2019/USENIX Security 2019 Video/Birthday, Name and Bifacial-security Understanding Passwords.mp4 24.3 MB
- USENIX Security 2015/USENIX Security 2015 Videos/All Your Biases Belong to Us - Breaking RC4 in WPA-TKIP and TLS.mp4 24.3 MB
- USENIX Security 2013/USENIX Security 2013 Videos/Towards Automatic Software Lineage Inference - Jiyong Jang, Maverick Woo, David Brumley.mp4 24.3 MB
- USENIX Security 2010/USENIX Security 2010 Videos/Cling A Memory Allocator to Mitigate Dangling Pointers - Periklis Akritidis.mp4 24.3 MB
- USENIX Security 2017/USENIX Security 2017 Videos/USB Snooping Made Easy - Crosstalk Leakage Attacks on USB Hubs.mp4 24.2 MB
- USENIX Security 2012/USENIX Security 2012 Videos/TARDIS Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without Clocks - Amir Rahmati, Mastooreh Salajegheh, Dan Holcomb, Jacob Sorber, Wayne P. B.mp4 24.2 MB
- USENIX Security 2012/USENIX Security 2012 Videos/Social Networking with Frientegrity Privacy and Integrity with an Untrusted Provider - Ariel J. Feldman, Aaron Blankstein, Michael J. Freedman, Edward W. Felten.mp4 24.2 MB
- USENIX Security 2015/USENIX Security 2015 Videos/Trustworthy Whole-System Provenance for the Linux Kernel.mp4 24.1 MB
- USENIX Security 2019/USENIX Security 2019 Video/CANvas Fast and Inexpensive Automotive Network Mapping.mp4 24.1 MB
- USENIX Security 2012/USENIX Security 2012 Videos/Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization - Cristiano Giuffrida, Anton Kuijsten, Andrew S. Tanenbaum.mp4 24.0 MB
- USENIX Security 2010/USENIX Security 2010 Videos/Structuring Protocol Implementations to Protect Sensitive Data - Petr Marchenko, Brad Karp.mp4 24.0 MB
- USENIX Security 2018/USENIX Security 2018 Videos/With Great Training Comes Great Vulnerability - Practical Attacks against Transfer Learning.mp4 24.0 MB
- USENIX Security 2011/USENIX Security 2011 Videos/Fast and Precise Sanitizer Analysis with BEK - Pieter Hooimeijer, Benjamin Livshits, David Molnar, Prateek Saxena, Margus Veanes.mp4 24.0 MB
- USENIX Security 2019/USENIX Security 2019 Video/Protecting accounts from credential stuffing with password breach alerting.mp4 23.9 MB
- USENIX Security 2017/USENIX Security 2017 Videos/Computer Security, Privacy, and DNA Sequencing.mp4 23.9 MB
- USENIX Security 2012/USENIX Security 2012 Videos/Chimera A Declarative Language for Streaming Network Traffic Analysis - Kevin Borders, Jonathan Springer, Matthew Burnside.mp4 23.9 MB
- USENIX Security 2010/USENIX Security 2010 Videos/An Analysis of Private Browsing Modes in Modern Browsers - Gaurav Aggarwal, Elie Bursztein, Collin Jackson, Dan Boneh.mp4 23.9 MB
- USENIX Security 2016/USENIX Security 2016 Videos/Off-Path TCP Exploits Global Rate Limit Considered Dangerous.mp4 23.8 MB
- USENIX Security 2010/USENIX Security 2010 Videos/Acoustic Side-Channel Attacks on Printers - backes.mp4 23.8 MB
- USENIX Security 2012/USENIX Security 2012 Videos/AdSplit Separating Smartphone Advertising from Applications - Shashi Shekhar, Michael Dietz, Dan S. Wallach.mp4 23.8 MB
- USENIX Security 2010/USENIX Security 2010 Videos/ZKPDL A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash - Sarah Meiklejohn, C. Chris Erway, Alptekin Kupcu, Theodora Hinkle, Anna Lysyanskaya.mp4 23.7 MB
- USENIX Security 2018/USENIX Security 2018 Videos/A Bad Dream - Subverting Trusted Platform Module While You Are Sleeping.mp4 23.7 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Better managed than memorized Studying the Impact of Managers on Password Strength and Reuse.mp4 23.7 MB
- USENIX Security 2017/USENIX Security 2017 Videos/The Loopix Anonymity System.mp4 23.7 MB
- USENIX Security 2011/USENIX Security 2011 Videos/Permission Re-Delegation Attacks and Defenses - Adrienne Porter Felt, Helen J. Wang, Alexander Moshchuk, Steve Hanna, Erika Chin.mp4 23.7 MB
- USENIX Security 2013/USENIX Security 2013 Videos/Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation - Frank Imeson, Ariq Emtenan, Siddharth Garg, Mahesh V. Tripunita.mp4 23.7 MB
- USENIX Security 2012/USENIX Security 2012 Videos/Progressive Authentication Deciding When to Authenticate on Mobile Phones - Oriana Riva, Chuan Qin, Karin Strauss, Dimitrios Lymberopoulos.mp4 23.7 MB
- USENIX Security 2015/USENIX Security 2015 Videos/Post-Mortem of a Zombie - Conficker Cleanup After Six Years.mp4 23.6 MB
- USENIX Security 2012/USENIX Security 2012 Videos/On Breaking SAML Be Whoever You Want to Be - Juraj Somorovsky, Andreas Mayer, Jorg Schwenk, Marco Kampmann, Meiko Jensen.mp4 23.6 MB
- USENIX Security 2013/USENIX Security 2013 Videos/Jekyll on iOS When Benign Apps Become Evil - Tielei Wang, Kangjie Lu, Long Lu, Simon Chung, Wenke Lee.mp4 23.6 MB
- USENIX Security 2016/USENIX Security 2016 Videos/Poking Holes in Information Hiding.mp4 23.6 MB
- USENIX Security 2011/USENIX Security 2011 Videos/Differential Privacy Under Fire - Andreas Haeberlen, Benjamin C. Pierce, Arjun Narayan.mp4 23.6 MB
- USENIX Security 2017/USENIX Security 2017 Videos/Measuring HTTPS Adoption on the Web.mp4 23.6 MB
- USENIX Security 2011/USENIX Security 2011 Videos/deSEO Combating Search-Result Poisoning - John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy, Martin Abadi.mp4 23.6 MB
- USENIX Security 2011/USENIX Security 2011 Videos/Cloaking Malware with the Trusted Platform Module - Alan M. Dunn, Owen S. Hofmann, Brent Waters, Emmett Witchel.mp4 23.5 MB
- USENIX Security 2011/USENIX Security 2011 Videos/BOTMAGNIFIER Locating Spambots on the Internet - Gianluca Stringhini, Thorsten Holz, Brett Stone-Gross, Christopher Kruegel, Giovanni Vigna.mp4 23.5 MB
- USENIX Security 2017/USENIX Security 2017 Videos/Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts.mp4 23.5 MB
- USENIX Security 2019/USENIX Security 2019 Video/What Are You Searching For A Remote Keylogging Attack.mp4 23.4 MB
- USENIX Security 2017/USENIX Security 2017 Videos/CHAINIAC - Proactive Software-Update Transparency.mp4 23.4 MB
- USENIX Security 2017/USENIX Security 2017 Videos/Detecting Android Root Exploits by Learning from Root Providers.mp4 23.4 MB
- USENIX Security 2013/USENIX Security 2013 Videos/Control Flow Integrity for COTS Binaries - Mingwei Zhang, R. Sekar.mp4 23.4 MB
- USENIX Security 2012/USENIX Security 2012 Videos/Aurasium Practical Policy Enforcement for Android Applications - Rubin Xu, Hassen Saidi, Ross Anderson.mp4 23.3 MB
- USENIX Security 2016/USENIX Security 2016 Videos/Making USB Great Again with USBFILTER.mp4 23.2 MB
- USENIX Security 2012/USENIX Security 2012 Videos/Babel Leveraging Email Delivery for Spam Mitigation - Gianluca Stringhini, Manuel Egele, Apostolis Zarras, Thorsten Holz, Christopher Kruegel, Giovanni Vigna.mp4 23.2 MB
- USENIX Security 2019/USENIX Security 2019 Video/Not Everything is Dark and Gloomy Power Grid Protections Against IoT.mp4 23.2 MB
- USENIX Security 2013/USENIX Security 2013 Videos/Transparent ROP Exploit Mitigation Using Indirect Branch Tracing - Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis.mp4 23.2 MB
- USENIX Security 2017/USENIX Security 2017 Videos/MCMix - Anonymous Messaging via Secure Multiparty Computation.mp4 23.1 MB
- USENIX Security 2017/USENIX Security 2017 Videos/PrimeAbort - A Timer-Free High-Precision L3 Cache Attack using Intel TSX.mp4 23.1 MB
- USENIX Security 2011/USENIX Security 2011 Videos/mCarve Carving Attributed Dump Sets - Ton van Deursen, Sjouke Mauw, and Sasa Radomirovic.mp4 23.1 MB
- USENIX Security 2017/USENIX Security 2017 Videos/Predicting the Resilience of Obfuscated Code.mp4 23.1 MB
- USENIX Security 2013/USENIX Security 2013 Videos/FIE on Firmware Finding Vulnerabilities in Embedded Systems Using Symbolic Execution - Drew Davidson, Benjamin Moench, Somesh Jha, Thomas Ristenpart.mp4 23.1 MB
- USENIX Security 2012/USENIX Security 2012 Videos/Clickjacking Attacks and Defenses - Lin-Shung Huang, Alex Moshchuk, Helen J. Wang, Stuart Schechter, Collin Jackson.mp4 23.1 MB
- USENIX Security 2013/USENIX Security 2013 Videos/Eradicating DNS Rebinding with the Extended Same-origin Policy - Martin Johns, Sebastian Lekies, Ben Stock.mp4 23.1 MB
- USENIX Security 2012/USENIX Security 2012 Videos/STING Finding Name Resolution Vulnerabilities in Programs - Hayawardh Vijayakumar, Joshua Schiffman, Trent Jaeger.mp4 23.0 MB
- USENIX Security 2013/USENIX Security 2013 Videos/Dowsing for Ovrflows A Guided Fuzzer to Find Buffer Boundary Violations - Istvan Haller, Asia Slowinska, Matthias Neugschwandtner, Herbert Bos.mp4 23.0 MB
- USENIX Security 2010/USENIX Security 2010 Videos/Realization of RF Distance Bounding - Kasper Bonne Rasmussen, Srdjan Capkun.mp4 23.0 MB
- USENIX Security 2013/USENIX Security 2013 Videos/Secure Outsourced Garbled Circuit Evaluation for Mobile Devices - Henry Carter, Benjamin Mood, Patrick Traynor, Kevin Butler.mp4 23.0 MB
- USENIX Security 2019/USENIX Security 2019 Video/All Your Clicks Belong to Me Investigating Click Interception on the Web.mp4 23.0 MB
- USENIX Security 2016/USENIX Security 2016 Videos/Practical DIFC Enforcement on Android.mp4 23.0 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Foreshadow - Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution.mp4 22.9 MB
- USENIX Security 2015/USENIX Security 2015 Videos/Type Casting Verification - Stopping an Emerging Attack Vector.mp4 22.9 MB
- USENIX Security 2010/USENIX Security 2010 Videos/Chipping Away at Censorship Firewalls with User-Generated Content - Sam Burnett, Nick Feamster, Santosh Vempala.mp4 22.9 MB
- USENIX Security 2009/USENIX Security 2009 Videos/A Practical Congestion Attack on Tor Using Long Paths - Nathan S. Evans, Roger Dingledine, Christian Grothoff.mp4 22.9 MB
- USENIX Security 2011/USENIX Security 2011 Videos/Toward Secure Embedded Web Interfaces - Baptiste Gourdin, Chinmay Soman, Hristo Bojinov, Elie Bursztein.mp4 22.8 MB
- USENIX Security 2017/USENIX Security 2017 Videos/Ensuring Authorized Updates in Multi-user Database-Backed Applications.mp4 22.8 MB
- USENIX Security 2017/USENIX Security 2017 Videos/Global Measurement of DNS Manipulation.mp4 22.8 MB
- USENIX Security 2009/USENIX Security 2009 Videos/Static Enforcement of Web Application Integrity Through Strong Typing - William Robertson, Giovanni Vigna.mp4 22.8 MB
- USENIX Security 2017/USENIX Security 2017 Videos/Speeding up detection of SHA-1 collision attacks.mp4 22.8 MB
- USENIX Security 2019/USENIX Security 2019 Video/Losing the Car Keys Wireless PHY-Layer Insecurity in EV Charging.mp4 22.8 MB
- USENIX Security 2017/USENIX Security 2017 Videos/PlatPal - Detecting Malicious Documents with Platform Diversity.mp4 22.8 MB
- USENIX Security 2009/USENIX Security 2009 Videos/Efficient Data Structures for Tamper-Evident Logging - Scott A. Crosby, Dan S. Wallach.mp4 22.8 MB
- USENIX Security 2016/USENIX Security 2016 Videos/Stealing Machine Learning Models via Prediction APIs.mp4 22.8 MB
- USENIX Security 2016/USENIX Security 2016 Videos/Hey, You Have a Problem On the Feasibility of Large-Scale Web Vulnerability.mp4 22.8 MB
- USENIX Security 2014/USENIX Security 2014 Videos/Blanket Execution Dynamic Similarity Testing for Program Binaries and Components - Manuel Egele, Maverick Woo, Peter Chapman, David Brumley.mp4 22.7 MB
- USENIX Security 2019/USENIX Security 2019 Video/CONFIRM Evaluating Compatibility and Relevance of Control-flow.mp4 22.7 MB
- USENIX Security 2017/USENIX Security 2017 Videos/Loophole - Timing Attacks on Shared Event Loops in Chrome.mp4 22.7 MB
- USENIX Security 2018/USENIX Security 2018 Videos/GAZELLE - A Low Latency Framework for Secure Neural Network Inference.mp4 22.7 MB
- USENIX Security 2017/USENIX Security 2017 Videos/Dead Store Elimination (Still) Considered Harmful.mp4 22.6 MB
- USENIX Security 2011/USENIX Security 2011 Videos/Dark Clouds on the Horizon Using Cloud Storage as Attack Vector and Online Slack Space - Martin Mulazzani, Sebastian Schrittwieser, Manuel Leithner, Markus Huber, Edgar Weippl.mp4 22.6 MB
- USENIX Security 2019/USENIX Security 2019 Video/PolicyLint Investigating Internal Privacy Policy Contradictions on Google.mp4 22.6 MB
- USENIX Security 2019/USENIX Security 2019 Video/CT-GAN Malicious Tampering of 3D Medical Imagery using Deep Learning.mp4 22.6 MB
- USENIX Security 2017/USENIX Security 2017 Videos/TrustBase - An Architecture to Repair and Strengthen.mp4 22.6 MB
- USENIX Security 2013/USENIX Security 2013 Videos/Sancus Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base - Job Noorman, Pieter Agten, Wilfried Daniels, Raoul Strackx, Anthony Van Herre.mp4 22.5 MB
- USENIX Security 2018/USENIX Security 2018 Videos/The Rewards and Costs of Stronger Passwords in a University - Linking Password Lifetime to Strength.mp4 22.5 MB
- USENIX Security 2009/USENIX Security 2009 Videos/CCCP Secure Remote Storage for Computational RFIDs - Mastooreh Salajegheh, Shane Clark, Benjamin Ransford, Kevin Fu, Ari Juels.mp4 22.5 MB
- USENIX Security 2017/USENIX Security 2017 Videos/Neural Nets Can Learn Function Type Signatures From Binaries.mp4 22.5 MB
- USENIX Security 2016/USENIX Security 2016 Videos/zxcvbn Low-Budget Password Strength Estimation.mp4 22.5 MB
- USENIX Security 2012/USENIX Security 2012 Proceedings.mobi 22.5 MB
- USENIX Security 2014/USENIX Security 2014 Videos/Panel Discussion - Stuart Schechter.mp4 22.5 MB
- USENIX Security 2017/USENIX Security 2017 Videos/Beauty and the Burst - Remote Identification of Encrypted Video Streams.mp4 22.4 MB
- USENIX Security 2016/USENIX Security 2016 Videos/Verifying Constant-Time Implementations.mp4 22.4 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Modelling and Analysis of a Hierarchy of Distance Bounding Attacks.mp4 22.4 MB
- USENIX Security 2015/USENIX Security 2015 Videos/Towards Discovering and Understanding Task Hijacking in Android.mp4 22.4 MB
- USENIX Security 2017/USENIX Security 2017 Videos/BLENDER - Enabling Local Search with a Hybrid Differential Privacy Model.mp4 22.4 MB
- USENIX Security 2018/USENIX Security 2018 Videos/teEther - Gnawing at Ethereum to Automatically Exploit Smart Contracts.mp4 22.4 MB
- USENIX Security 2017/USENIX Security 2017 Videos/Telling Your Secrets without Page Faults.mp4 22.4 MB
- USENIX Security 2017/USENIX Security 2017 Videos/Constant-Time Callees with Variable-Time Callers.mp4 22.3 MB
- USENIX Security 2013/USENIX Security 2013 Videos/Proactively Accountable Anonymous Messaging in Verdict - Henry Corrigan-Gibbs, David Isaac Wolinsky, Bryan Ford.mp4 22.3 MB
- USENIX Security 2015/USENIX Security 2015 Videos/Cloudy with a Chance of Breach - Forecasting Cyber Security Incidents.mp4 22.3 MB
- USENIX Security 2016/USENIX Security 2016 Videos/The Million-Key Question-Investigating the Origins of RSA Public Keys.mp4 22.3 MB
- USENIX Security 2014/USENIX Security 2014 Full Proceedings.mobi 22.2 MB
- USENIX Security 2016/USENIX Security 2016 Videos/Authenticated Network Time Synchronization.mp4 22.2 MB
- USENIX Security 2017/USENIX Security 2017 Videos/Oscar - A Practical Page-Permissions-Based Scheme.mp4 22.2 MB
- USENIX Security 2012/USENIX Security 2012 Videos/Tachyon Tandem Execution for Efficient Live Patch Testing - Matthew Maurer, David Brumley.mp4 22.2 MB
- USENIX Security 2016/USENIX Security 2016 Videos/Screen after Previous Screens Spatial-Temporal Recreation of Android App.mp4 22.2 MB
- USENIX Security 2012/USENIX Security 2012 Videos/Let Me Answer That for You Exploiting Broadcast Information in Cellular Networks - golde.mp4 22.2 MB
- USENIX Security 2015/USENIX Security 2015 Videos/Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors.mp4 22.1 MB
- USENIX Security 2017/USENIX Security 2017 Videos/Strong and Efficient Cache Side-Channel Protection.mp4 22.1 MB
- USENIX Security 2009/USENIX Security 2009 Videos/Designing Trustworthy User Agents for a Hostile Web - Eric Lawrence.mp4 22.1 MB
- USENIX Security 2011/USENIX Security 2011 Videos/PIR-Tor Scalable Anonymous Communication Using Private Information Retrieval - Prateek Mittal, Femi Olumofin, Carmela Troncoso, Nikita Borisov, Ian Goldberg.mp4 22.1 MB
- USENIX Security 2011/USENIX Security 2011 Videos/Dirty Jobs The Role of Freelance Labor in Web Service Abuse - Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker.mp4 22.1 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Analysis of Privacy Protections in Fitness Tracking Social Networks -or- You can run.mp4 22.0 MB
- USENIX Security 2012/USENIX Security 2012 Videos/STEALTHMEM System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud - Taesoo Kim, Marcus Peinado, Gloria Mainar-Ruiz.mp4 22.0 MB
- USENIX Security 2013/USENIX Security 2013 Videos/On the Security of RC4 in TLS - Nadhem AlFardan, Royal Holloway, Daniel J. Bernstein, Kenneth G. Paterson, Bertram Poettering, Jacob C.N. Schuldt.mp4 22.0 MB
- USENIX Security 2009/USENIX Security 2009 Videos/Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs - David Molnar, Xue Cong Li, and David A. Wagner.mp4 21.9 MB
- USENIX Security 2011/USENIX Security 2011 Videos/QUIRE Lightweight Provenance for Smart Phone Operating Systems - Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anhei Shu, Dan S. Wallach.mp4 21.9 MB
- USENIX Security 2012/USENIX Security 2012 Videos/Billion-Gate Secure Computation with Malicious Adversaries - Benjamin Kreuter, abhi shelat, and Chih-hao Shen.mp4 21.9 MB
- USENIX Security 2019/USENIX Security 2019 Video/Evaluating the Contextual Integrity of Privacy Regulation Parents' IoT.mp4 21.9 MB
- USENIX Security 2019/USENIX Security 2019 Video/TESSERACT Eliminating Experimental Bias in Malware Classification.mp4 21.9 MB
- USENIX Security 2016/USENIX Security 2016 Videos/Internet Jones and the Raiders of the Lost Trackers.mp4 21.9 MB
- USENIX Security 2013/USENIX Security 2013 Videos/Explicating SDKs Uncovering Assumptions Underlying Secure Authentication and Authorization - Rui Wang, Yuchen Zhou, Shuo Chen, Shaz Qadeer, David Evans, Yuri Gurevich.mp4 21.8 MB
- USENIX Security 2016/USENIX Security 2016 Videos/The Ever-Changing Labyrinth A Large-Scale Analysis of Wildcard DNS Powered.mp4 21.8 MB
- FOCI 2023/Running a high-performance pluggable transports Tor bridge.mp4 21.8 MB
- USENIX Security 2017/USENIX Security 2017 Videos/On the effectiveness of mitigations against floating-point timing channels.mp4 21.7 MB
- FOCI 2014/TRIST Circumventing Censorship with Transcoding-Resistant Image Steganography.mp4 21.7 MB
- USENIX Security 2019/USENIX Security 2019 Video/Identifying Cache-Based Side Channels through Secret-Augmented.mp4 21.7 MB
- USENIX Security 2016/USENIX Security 2016 Videos/Secure, Precise, and Fast Floating-Point Operations on x86 Processors.mp4 21.7 MB
- USENIX Security 2019/USENIX Security 2019 Video/PAC it up Towards Pointer Integrity using ARM Pointer Authentication.mp4 21.7 MB
- USENIX Security 2013/USENIX Security 2013 Videos/Steal This Movie Automatically Bypassing DRM Protection in Streaming Media Services - Ruoyu Wang, Santa Barbara, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna.mp4 21.6 MB
- USENIX Security 2013/USENIX Security 2013 Videos/ZQL A Compiler for Privacy-Preserving Data Processing - Cedric Fournet, Markulf Kohlweiss, George Danezis.mp4 21.6 MB
- USENIX Security 2011/USENIX Security 2011 Proceedings.pdf 21.6 MB
- USENIX Security 2013/USENIX Security 2013 Videos/Alice in Warningland A Large-Scale Field Study of Browser Security Warning Effectiveness - Devdatta Akhawe, Adrienne Porter Felt.mp4 21.5 MB
- USENIX Security 2009/USENIX Security 2009 Videos/Keynote Address - Rich Cannings.mp4 21.5 MB
- USENIX Security 2013/USENIX Security 2013 Videos/Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring - Edward J. Schwartz, JongHyup Lee, Maverick Woo, David Brumley.mp4 21.5 MB
- USENIX Security 2017/USENIX Security 2017 Videos/Digtool - A Virtualization-Based Framework for Detecting Kernel Vulnerabilities.mp4 21.5 MB
- USENIX Security 2016/USENIX Security 2016 Videos/Identifying and Characterizing Sybils in the Tor Network.mp4 21.5 MB
- USENIX Security 2017/USENIX Security 2017 Videos/Venerable Variadic Vulnerabilities Vanquished.mp4 21.5 MB
- USENIX Security 2016/USENIX Security 2016 Videos/AuthLoop End-to-End Cryptographic Authentication for Telephony.mp4 21.4 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Dependence-Preserving Data Compaction for Scalable Forensic Analysis.mp4 21.4 MB
- USENIX Security 2013/USENIX Security 2013 Videos/Effective Inter-Component Communication Mapping in Android An Essential Step Towards Holistic Security Analysis - Damien Octeau, Patrick McDaniel, Somesh Jha, Alexandre Bartel, Eri.mp4 21.3 MB
- USENIX Security 2013/USENIX Security 2013 Videos/Take This Personally Pollution Attacks on Personalized Services - Xinyu Xing, Wei Meng, Dan Doozan, Alex C. Snoeren, Nick Feamster, Wenke Lee.mp4 21.3 MB
- USENIX Security 2016/USENIX Security 2016 Videos/überSpark Enforcing Verifiable Object Abstractions for Automated.mp4 21.3 MB
- USENIX Security 2016/USENIX Security 2016 Videos/A Comprehensive Measurement Study of Domain Generating Malware.mp4 21.3 MB
- USENIX Security 2016/USENIX Security 2016 Videos/Hidden Voice Commands.mp4 21.3 MB
- USENIX Security 2016/USENIX Security 2016 Videos/Predicting, Decrypting, and Abusing WPA2 802.11 Group Keys.mp4 21.3 MB
- USENIX Security 2012/USENIX Security 2012 Videos/Optimally Robust Private Information Retrieval - Casey Devet, Ian Goldberg, Nadia Heninger.mp4 21.2 MB
- USENIX Security 2011/USENIX Security 2011 Videos/A Study of Android Application Security - William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri.mp4 21.2 MB
- USENIX Security 2012/USENIX Security 2012 Videos/Privacy-Preserving Social Plugins - Georgios Kontaxis, Michalis Polychronakis, Angelos D. Keromytis, Evangelos P. Markatos.mp4 21.1 MB
- USENIX Security 2019/USENIX Security 2019 Video/The CrossPath Attack Disrupting the SDN Control Channel via Shared Links.mp4 21.1 MB
- USENIX Security 2017/USENIX Security 2017 Videos/CLKSCREW - Exposing the Perils of Security-Oblivious Energy Management.mp4 21.1 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Rethinking Access Control and Authentication for the Home Internet of Things (IoT).mp4 21.1 MB
- USENIX Security 2019/USENIX Security 2019 Video/VRASED A Verified Hardware Software Co-Design for Remote Attestation.mp4 21.0 MB
- USENIX Security 2017/USENIX Security 2017 Videos/Characterizing the Nature and Dynamics of Tor Exit Blocking.mp4 21.0 MB
- USENIX Security 2016/USENIX Security 2016 Videos/Micro-Virtualization Memory Tracing to Detect and Prevent Spraying Attacks.mp4 21.0 MB
- USENIX Security 2011/USENIX Security 2011 Videos/SHELLOS Enabling Fast Detection and Forensic Analysis of Code Injection Attacks - Kevin Z. Snow, Srinivas Krishnan, Fabian Monrose, Niels Provos.mp4 21.0 MB
- USENIX Security 2018/USENIX Security 2018 Videos/FUZE - Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities.mp4 21.0 MB
- USENIX Security 2019/USENIX Security 2019 Video/Improving Robustness of ML Classifiers against Realizable Evasio.mp4 21.0 MB
- USENIX Security 2018/USENIX Security 2018 Videos/One&Done - A Single-Decryption EM-Based Attack on OpenSSL's Constant-Time Blinded RSA.mp4 20.9 MB
- USENIX Security 2018/USENIX Security 2018 Videos/End-to-End Measurements of Email Spoofing Attacks.mp4 20.9 MB
- USENIX Security 2016/USENIX Security 2016 Videos/Request and Conquer Exposing Cross-Origin Resource Size.mp4 20.9 MB
- USENIX Security 2011/USENIX Security 2011 Videos/Faster Secure Two-Party Computation Using Garbled Circuits - Yan Huang, David Evans, Jonathan Katz.mp4 20.9 MB
- USENIX Security 2010/USENIX Security 2010 Videos/SEPIA Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics - Martin Burkhart, Mario Strasser, Dilip Many, Xenofontas Dimitropoulos.mp4 20.9 MB
- USENIX Security 2019/USENIX Security 2019 Video/Please Pay Inside Evaluating Bluetooth-based Detection of Gas Pump Skimmers.mp4 20.9 MB
- USENIX Security 2019/USENIX Security 2019 Video/Utility-Optimized Local Differential Privacy Mechanisms for.mp4 20.9 MB
- USENIX Security 2017/USENIX Security 2017 Videos/vTZ - Virtualizing ARM TrustZone.mp4 20.9 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Skill Squatting Attacks on Amazon Alexa.mp4 20.8 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Acquisitional Rule-based Engine for Discovering Internet-of-Things Devices.mp4 20.8 MB
- USENIX Security 2016/USENIX Security 2016 Videos/Trusted Browsers for Uncertain Times.mp4 20.8 MB
- USENIX Security 2014/USENIX Security 2014 Videos/Security Analysis of a Full-Body Scanner - Keaton Mowery, Eric Wustrow, Tom Wypych, Corey Singleton, Chris Comfort, Eric Rescorla, Stephen Checkoway, J. Alex Halderman, Hovav Shach.mp4 20.8 MB
- USENIX Security 2011/USENIX Security 2011 Videos/MACE Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery - Chia Yuan Cho, Domagoj Babic, Pongsin Poosankam, Kevin Zhijie Chen, Edward XueJun Wu.mp4 20.8 MB
- USENIX Security 2019/USENIX Security 2019 Video/CSI NN Reverse Engineering of Neural Network Architectures.mp4 20.8 MB
- USENIX Security 2018/USENIX Security 2018 Videos/NAVEX - Precise and Scalable Exploit Generation for Dynamic Web Applications.mp4 20.8 MB
- USENIX Security 2013/USENIX Security 2013 Videos/An Empirical Study of Vulnerability Rewards Programs - Matthew Finifter, Devdatta Akhawe, David Wagner.mp4 20.8 MB
- USENIX Security 2014/USENIX Security 2014 Videos/Oxymoron Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing - Michael Backes, Stefan Nurnberger.mp4 20.8 MB
- USENIX Security 2017/USENIX Security 2017 Videos/CAn’t Touch This.mp4 20.8 MB
- USENIX Security 2017/USENIX Security 2017 Videos/Syntia - Synthesizing the Semantics of Obfuscated Code.mp4 20.7 MB
- USENIX Security 2013/USENIX Security 2013 Videos/On the Security of Picture Gesture Authentication - Ziming Zhao, Gail-Joon Ahn, Jeong-Jin Seo, Hongxin Hu.mp4 20.7 MB
- USENIX Security 2013/USENIX Security 2013 Videos/ExecScent Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates - Terry Nelms, Roberto Perdisci, Mustaque Ahamad.mp4 20.7 MB
- USENIX Security 2019/USENIX Security 2019 Video/Misleading Authorship Attribution of Source Code using Adversarial Learning.mp4 20.7 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Unveiling and Quantifying Facebook Exploitation of Sensitive Personal Data for Advertising Purposes.mp4 20.7 MB
- USENIX Security 2017/USENIX Security 2017 Videos/CacheD - Identifying Cache-Based Timing Channels in Production Software.mp4 20.7 MB
- USENIX Security 2018/USENIX Security 2018 Videos/MoonShine - Optimizing OS Fuzzer Seed Selection with Trace Distillation.mp4 20.6 MB
- USENIX Security 2019/USENIX Security 2019 Video/FIRM-AFL High-Throughput Greybox Fuzzing of IoT Firmware via.mp4 20.6 MB
- USENIX Security 2019/USENIX Security 2019 Video/uXOM Efficient eXecute-Only Memory on ARM Cortex-M.mp4 20.6 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Plug and Prey Measuring the Commoditization of Cybercrime via Online Anonymous Markets.mp4 20.6 MB
- USENIX Security 2019/USENIX Security 2019 Video/Inadvertently Making Cyber Criminals Rich A Comprehensive Study of.mp4 20.5 MB
- USENIX Security 2011/USENIX Security 2011 Videos/Detecting Malware Domains at the Upper DNS Hierarchy - Manos Antonakakis, Roberto Perdisci, Wenke Lee, Nikolaos Vasiloglou II, David Dagon.mp4 20.5 MB
- USENIX Security 2017/USENIX Security 2017 Videos/Adaptive Android Kernel Live Patching.mp4 20.5 MB
- FOCI 2023/A Worldwide View of Nation state Internet Censorship.mp4 20.5 MB
- USENIX Security 2016/USENIX Security 2016 Videos/Dancing on the Lip of the Volcano Chosen Ciphertext Attacks on Apple iMessage.mp4 20.4 MB
- USENIX Security 2018/USENIX Security 2018 Videos/A4NT - Author Attribute Anonymity by Adversarial Training of Neural Machine Translation.mp4 20.4 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/iSeeYou Disabling the MacBook Webcam Indicator LED Slides - Matthew Brocker, Stephen Checkoway.pdf 20.4 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Bamboozling Certificate Authorities with BGP.mp4 20.4 MB
- USENIX Security 2016/USENIX Security 2016 Videos/Investigating Commercial Pay-Per-Install and the Distribution of Unwanted.mp4 20.4 MB
- USENIX Security 2016/USENIX Security 2016 Videos/Privacy in Epigenetics Temporal Linkability of MicroRNA Expression Profiles.mp4 20.3 MB
- USENIX Security 2017/USENIX Security 2017 Videos/MPI - Multiple Perspective Attack Investigation.mp4 20.3 MB
- USENIX Security 2013/USENIX Security 2013 Videos/Securing Embedded User Interfaces Android and Beyond - Franziska Roesner, Tadayoshi Kohno.mp4 20.3 MB
- USENIX Security 2019/USENIX Security 2019 Video/simTPM User-centric TPM for Mobile Devices.mp4 20.2 MB
- USENIX Security 2016/USENIX Security 2016 Videos/Egalitarian Computing.mp4 20.2 MB
- USENIX Security 2016/USENIX Security 2016 Videos/Oblivious Multi-Party Machine Learning on Trusted Processors.mp4 20.2 MB
- USENIX Security 2013/USENIX Security 2013 Videos/Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers - Suman Jana, David Molnar, Alexander Moshchuk, Alan Dunn, Benjamin Livshits, Helen J. Wang, E.mp4 20.2 MB
- USENIX Security 2018/USENIX Security 2018 Videos/We Still Don't Have Secure Cross-Domain Requests - an Empirical Study of CORS.mp4 20.2 MB
- USENIX Security 2012/USENIX Security 2012 Videos/New Attacks on Timing-based Network Flow Watermarks - Zi Lin, Nicholas Hopper.mp4 20.1 MB
- USENIX Security 2020/PEPR '20/PEPR 20 - Privacy in Deployment.mp4 20.1 MB
- USENIX Security 2016/USENIX Security 2016 Videos/Measuring PUP Prevalence and PUP Distribution through Pay-Per-Install Services.mp4 20.1 MB
- USENIX Security 2016/USENIX Security 2016 Videos/PIkit A New Kernel-Independent Processor-Interconnect Rootkit.mp4 20.1 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Polisis - Automated Analysis and Presentation of Privacy Policies Using Deep Learning.mp4 20.0 MB
- USENIX Security 2011/USENIX Security 2011 Videos/Telex Anticensorship in the Network Infrastructure - Eric Wustrow, Scott Wolchok, Ian Goldberg, J. Alex Halderman.mp4 20.0 MB
- USENIX Security 2014/USENIX Security 2014 Full Proceedings.epub 20.0 MB
- USENIX Security 2018/USENIX Security 2018 Videos/The Dangers of Key Reuse - Practical Attacks on IPsec IKE.mp4 19.9 MB
- USENIX Security 2019/USENIX Security 2019 Video/Point Break A Study of Bandwidth Denial-of-Service Attacks against Tor.mp4 19.9 MB
- USENIX Security 2010/USENIX Security 2010 Presentations/USENIX Security 2010 Proceedings.pdf 19.8 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Quack - Scalable Remote Measurement of Application-Layer Censorship.mp4 19.8 MB
- USENIX Security 2016/USENIX Security 2016 Videos/Fingerprinting Electronic Control Units for Vehicle Intrusion Detection.mp4 19.8 MB
- USENIX Security 2012/USENIX Security 2012 Videos/Enemy of the State A State-Aware Black-Box Web Vulnerability Scanner - Adam Doupe, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna.mp4 19.7 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Discovering Flaws in Security-Focused Static Analysis Tools for Android using Systematic Mutation.mp4 19.7 MB
- USENIX Security 2016/USENIX Security 2016 Videos/Sanctum Minimal Hardware Extensions for Strong Software Isolation.mp4 19.7 MB
- USENIX Security 2012/USENIX Security 2012 Videos/Origin-Bound Certificates A Fresh Approach to Strong Client Authentication for the Web - Michael Dietz, Alexei Czeskis, Dirk Balfanz, Dan S. Wallach.mp4 19.7 MB
- USENIX Security 2009/USENIX Security 2009 Videos/GATEKEEPER Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code - Salvatore Guarnieri, Benjamin Livshits.mp4 19.7 MB
- USENIX Security 2017/USENIX Security 2017 Videos/Locally Differentially Private Protocols for Frequency Estimation.mp4 19.7 MB
- USENIX Security 2017/USENIX Security 2017 Videos/Vale - Verifying High-Performance Cryptographic Assembly Code.mp4 19.6 MB
- USENIX Security 2016/USENIX Security 2016 Videos/Towards Measuring and Mitigating Social Engineering Software Download Attacks.mp4 19.6 MB
- USENIX Security 2016/USENIX Security 2016 Videos/On Omitting Commits and Committing Omissions Preventing Git Metadata.mp4 19.6 MB
- USENIX Security 2016/USENIX Security 2016 Videos/On Demystifying the Android Application Framework Re-Visiting Android.mp4 19.6 MB
- USENIX Security 2019/USENIX Security 2019 Video/Probability Model Transforming Encoders Against Encoding Attacks.mp4 19.6 MB
- USENIX Security 2018/USENIX Security 2018 Videos/NetHide - Secure and Practical Network Topology Obfuscation.mp4 19.5 MB
- USENIX Security 2019/USENIX Security 2019 Video/Blind Bernoulli Trials A Noninteractive Protocol For Hidden-Weight Coin Flips.mp4 19.5 MB
- USENIX Security 2019/USENIX Security 2019 Video/The Anatomy of a Cryptocurrency Pump-and-Dump Scheme.mp4 19.5 MB
- USENIX Security 2016/USENIX Security 2016 Videos/Thoth Comprehensive Policy Compliance in Data Retrieval Systems.mp4 19.5 MB
- USENIX Security 2016/USENIX Security 2016 Videos/You've Got Vulnerability Exploring Effective Vulnerability Notifications.mp4 19.5 MB
- USENIX Security 2019/USENIX Security 2019 Video/From IP ID to Device ID and KASLR Bypass.mp4 19.5 MB
- USENIX Security 2009/USENIX Security 2009 Videos/Peeping Tom in the Neighborhood Keystroke Eavesdropping on Multi-User Systems - Kehuan Zhang, XiaoFeng Wang.mp4 19.5 MB
- USENIX Security 2018/USENIX Security 2018 Videos/A Sense of Time for JavaScript and Node.js.mp4 19.5 MB
- USENIX Security 2018/USENIX Security 2018 Videos/DelegaTEE - Brokered Delegation Using Trusted Execution Environments.mp4 19.4 MB
- USENIX Security 2012/USENIX Security 2012 Videos/Fuzzing with Code Fragments - Christian Holler, Kim Herzig, Andreas Zeller.mp4 19.4 MB
- USENIX Security 2019/USENIX Security 2019 Video/Leaky Images Targeted Privacy Attacks in the Web.mp4 19.4 MB
- USENIX Security 2012/USENIX Security 2012 Videos/kGuard Lightweight Kernel Protection against Return-to-User Attacks - Vasileios P. Kemerlis, Georgios Portokalidis, Angelos D. Keromytis.mp4 19.4 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Shielding Software From Privileged Side-Channel Attacks.mp4 19.4 MB
- USENIX Security 2014/USENIX Security 2014 Videos/iSeeYou Disabling the MacBook Webcam Indicator LED - Matthew Brocker, Stephen Checkoway.mp4 19.4 MB
- USENIX Security 2018/USENIX Security 2018 Videos/BurnBox - Self-Revocable Encryption in a World Of Compelled Access.mp4 19.4 MB
- USENIX Security 2017/USENIX Security 2017 Videos/kAFL - Hardware-Assisted Feedback Fuzzing for OS Kernels.mp4 19.3 MB
- USENIX Security 2014/USENIX Security 2014 Videos/JIGSAW Protecting Resource Access by Inferring Programmer Expectations - Hayawardh Vijayakumar, Xinyang Ge, Mathias Payer, Trent Jaeger.mp4 19.3 MB
- USENIX Security 2017/USENIX Security 2017 Videos/Extension Breakdown.mp4 19.3 MB
- FOCI 2014/Catching Bandits and Only Bandits Privacy-Preserving Intersection Warrants for Lawful.mp4 19.3 MB
- USENIX Security 2014/USENIX Security 2014 Videos/XRay Enhancing the Web’s Transparency with Differential Correlation - Mathias Lecuyer, Guillaume Ducoffe, Francis Lan, Andrei Papancea, Theofilos Petsios, Riley Spahn, Augustin Cha.mp4 19.2 MB
- USENIX Security 2016/USENIX Security 2016 Videos/Fast, Lean, and Accurate Modeling Password Guessability Using Neural Networks.mp4 19.2 MB
- USENIX Security 2019/USENIX Security 2019 Video/Rendered Private Making GLSL Execution Uniform to Prevent WebGL-based.mp4 19.2 MB
- USENIX Security 2016/USENIX Security 2016 Videos/FlowFence Practical Data Protection for Emerging IoT Application Frameworks.mp4 19.2 MB
- USENIX Security 2019/USENIX Security 2019 Video/MOPT Optimized Mutation Scheduling for Fuzzers.mp4 19.2 MB
- USENIX Security 2020/PEPR '20/PEPR 20 - Design of a Privacy Infrastructure for the Internet of Things.mp4 19.2 MB
- USENIX Security 2017/USENIX Security 2017 Videos/Picking Up My Tab.mp4 19.1 MB
- USENIX Security 2014/USENIX Security 2014 Videos/Static Detection of Second-Order Vulnerabilities in Web Applications - Johannes Dahse, Thorsten Holz.mp4 19.1 MB
- USENIX Security 2019/USENIX Security 2019 Video/HardFails Insights into Software-Exploitable Hardware Bugs.mp4 19.1 MB
- USENIX Security 2019/USENIX Security 2019 Video/in-toto Providing farm-to-table guarantees for bits and bytes.mp4 19.1 MB
- USENIX Security 2019/USENIX Security 2019 Video/KEPLER Facilitating Control-flow Hijacking Primitive Evaluation for Linux.mp4 19.0 MB
- USENIX Security 2018/USENIX Security 2018 Videos/QSYM - A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing.mp4 19.0 MB
- USENIX Security 2019/USENIX Security 2019 Video/The KNOB is Broken Exploiting Low Entropy in the Encryption Key.mp4 19.0 MB
- USENIX Security 2020/PEPR '20/PEPR 20 - Beyond the Individual Exploring Data Protection by Design in Connected Communal Spaces.mp4 19.0 MB
- USENIX Security 2014/USENIX Security 2014 Videos/Burst ORAM Minimizing ORAM Response Times for Bursty Access Patterns - Jonathan Dautrich, University of California, Riverside - Emil Stefanov, Elaine Shi.mp4 19.0 MB
- USENIX Security 2014/USENIX Security 2014 Videos/BareCloud Bare-metal Analysis-based Evasive Malware Detection - Dhilung Kirat, Giovanni Vigna, Christopher Kruegel.mp4 18.9 MB
- USENIX Security 2018/USENIX Security 2018 Videos/All Your GPS Are Belong To Us - Towards Stealthy Manipulation of Road Navigation Systems.mp4 18.9 MB
- USENIX Security 2014/USENIX Security 2014 Videos/SSOScan Automated Testing of Web Applications for Single Sign-On Vulnerabilities - Yuchen Zhou, David Evans.mp4 18.9 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Rampart - Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks.mp4 18.9 MB
- USENIX Security 2014/USENIX Security 2014 Videos/Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens - Daniel Demmler, Thomas Schneider, Michael Zohner.mp4 18.9 MB
- USENIX Security 2014/USENIX Security 2014 Videos/On the Effective Prevention of TLS Man-in-the-Middle Attacks in Web Applications - Nikolaos Karapanos, Srdjan Capkun.mp4 18.9 MB
- USENIX Security 2014/USENIX Security 2014 Videos/TapDance End-to-Middle Anticensorship without Flow Blocking - Eric Wustrow, Colleen M. Swanson, J. Alex Halderman.mp4 18.9 MB
- USENIX Security 2019/USENIX Security 2019 Video/FastKitten Practical Smart Contracts on Bitcoin.mp4 18.9 MB
- USENIX Security 2012/USENIX Security 2012 Proceedings.pdf 18.9 MB
- USENIX Security 2011/USENIX Security 2011 Videos/Outsourcing the Decryption of ABE Ciphertexts - Matthew Green, Susan Hohenberger, Brent Waters.mp4 18.9 MB
- USENIX Security 2016/USENIX Security 2016 Videos/ARMageddon Cache Attacks on Mobile Devices.mp4 18.8 MB
- USENIX Security 2023/Detecting and Handling IoT Interaction Threats in Multi-Platform Multi.mp4 18.8 MB
- USENIX Security 2014/USENIX Security 2014 Videos/Peeking into Your App without Actually Seeing It UI State Inference and Novel Android Attacks - Qi Alfred Chen, Zhiyun Qian, Z. Morley Mao.mp4 18.8 MB
- USENIX Security 2017/USENIX Security 2017 Videos/DeTor - Provably Avoiding Geographic Regions in Tor.mp4 18.8 MB
- USENIX Security 2016/USENIX Security 2016 Videos/k-fingerprinting A Robust Scalable Website Fingerprinting Technique.mp4 18.8 MB
- USENIX Security 2016/USENIX Security 2016 Videos/One Bit Flips, One Cloud Flops Cross-VM Row Hammer Attacks.mp4 18.8 MB
- USENIX Security 2014/USENIX Security 2014 Videos/Never Been KIST Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport - Rob Jansen, John Geddes, Chris Wacek, Micah Sherr, Paul Syverson.mp4 18.7 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Injected and Delivered - Fabricating Implicit Control over Actuation Systems by Spoofing.mp4 18.7 MB
- USENIX Security 2016/USENIX Security 2016 Videos/An Empirical Study of Textual Key-Fingerprint Representations.mp4 18.7 MB
- USENIX Security 2017/USENIX Security 2017 Videos/AutoLock - Why Cache Attacks on ARM Are Harder Than You Think.mp4 18.7 MB
- USENIX Security 2016/USENIX Security 2016 Videos/Tracing Information Flows Between Ad Exchanges Using Retargeted Ads.mp4 18.6 MB
- USENIX Security 2012/USENIX Security 2012 Videos/Throttling Tor Bandwidth Parasites - Rob Jansen, Paul Syverson, Nicholas Hopper.mp4 18.6 MB
- USENIX Security 2019/USENIX Security 2019 Video/ATTACK2VEC Leveraging Temporal Word Embeddings to Understand the.mp4 18.6 MB
- USENIX Security 2013/USENIX Security 2013 Videos/You Are How You Click Clickstream Analysis for Sybil Detection - Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng, Ben Y. Zhao.mp4 18.5 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Effective Detection of Multimedia Protocol Tunneling using Machine Learning.mp4 18.5 MB
- USENIX Security 2018/USENIX Security 2018 Videos/FlowCog - Context-aware Semantics Extraction and Analysis of Information Flow Leaks in Android Apps.mp4 18.5 MB
- USENIX Security 2014/USENIX Security 2014 Videos/SpanDex Secure Password Tracking for Android - Landon P. Cox , Peter Gilbert, Geoffrey Lawler, Valentin Pistol, Ali Razeen, Bi Wu, Sai Cheemalapati.mp4 18.5 MB
- USENIX Security 2014/USENIX Security 2014 Videos/Towards Reliable Storage of 56-bit Secrets in Human Memory - Joseph Bonneau, Stuart Schechter.mp4 18.5 MB
- USENIX Security 2019/USENIX Security 2019 Video/Origin-sensitive Control Flow Integrity.mp4 18.5 MB
- USENIX Security 2019/USENIX Security 2019 Video/EverParse Verified Secure Zero-Copy Parsers for Authenticated Message Formats.mp4 18.5 MB
- USENIX Security 2017/USENIX Security 2017 Videos/ORide - A Privacy-Preserving yet Accountable Ride-Hailing Service.mp4 18.5 MB
- USENIX Security 2019/USENIX Security 2019 Video/Why Do Adversarial Attacks Transfer Explaining Transferability of.mp4 18.5 MB
- USENIX Security 2015/USENIX Security 2015 Videos/The Unexpected Dangers of Dynamic JavaScript.mp4 18.4 MB
- USENIX Security 2014/USENIX Security 2014 Videos/Faster Private Set Intersection Based on OT Extension - Benny Pinkas, Thomas Schneider, Michael Zohner.mp4 18.4 MB
- USENIX Security 2016/USENIX Security 2016 Videos/Lock It and Still Lose It -on the (In)Security of Automotive Remote Keyless.mp4 18.4 MB
- USENIX Security 2019/USENIX Security 2019 Video/The Web's Identity Crisis Understanding the Effectiveness of Website Identity.mp4 18.4 MB
- USENIX Security 2010/USENIX Security 2010 Videos/Automatic Generation of Remediation Procedures for Malware Infections - Michael Backes, Markus Durmuth, Sebastian Gerling, Manfred Pinkal, Caroline Sporleder.mp4 18.4 MB
- USENIX Security 2019/USENIX Security 2019 Video/Users Really Do Answer Telephone Scams.mp4 18.4 MB
- USENIX Security 2016/USENIX Security 2016 Videos/Faster Malicious 2-Party Secure Computation with Online Offline Dual Execution.mp4 18.4 MB
- USENIX Security 2016/USENIX Security 2016 Videos/DRAMA Exploiting DRAM Addressing for Cross-CPU Attacks.mp4 18.4 MB
- USENIX Security 2019/USENIX Security 2019 Video/Understanding and Improving Security and Privacy in Multi-User.mp4 18.3 MB
- USENIX Security 2019/USENIX Security 2019 Video/Discovering and Understanding the Security Hazards in the.mp4 18.3 MB
- USENIX Security 2014/USENIX Security 2014 Videos/The Emperor’s New Password Manager Security Analysis of Web-based Password Managers - Zhiwei Li, Warren He, Devdatta Akhawe, Dawn Song.mp4 18.3 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Meltdown - Reading Kernel Memory from User Space.mp4 18.3 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Turning Your Weakness Into a Strength - Watermarking Deep Neural Networks by Backdooring.mp4 18.3 MB
- USENIX Security 2013/USENIX Security 2013 Videos/Greystar Fast and Accurate Detection of SMS Spam Numbers in Large Cellular Networks Using Gray Phone Space - Nan Jiang, Yu Jin, Ann Skudlark, Zhi-Li Zhang.mp4 18.2 MB
- USENIX Security 2014/USENIX Security 2014 Videos/Man vs. Machine Practical Adversarial Detection of Malicious Crowdsourcing Workers - Gang Wang, Tianyi Wang, Santa Barbara, Haitao Zheng, Ben Y. Zhao.mp4 18.2 MB
- USENIX Security 2019/USENIX Security 2019 Video/Platforms in Everything Analyzing Ground-Truth Data on the Anatomy and.mp4 18.2 MB
- USENIX Security 2017/USENIX Security 2017 Videos/A Longitudinal, End-to-End View of the DNSSEC Ecosystem.mp4 18.2 MB
- USENIX Security 2013/USENIX Security 2013 Videos/Revolver An Automated Approach to the Detection of Evasive Web-based Malware - Alexandros Kapravelos, Yan Shoshitaishvili, Marco Cova, Christopher Kruegel, Giovanni Vigna.mp4 18.2 MB
- USENIX Security 2011/USENIX Security 2011 Proceedings.epub 18.2 MB
- USENIX Security 2016/USENIX Security 2016 Videos/An In-Depth Analysis of Disassembly on Full-Scale x86 x64 Binaries.mp4 18.2 MB
- USENIX Security 2022/SIMC ML Inference Secure Against Malicious Clients at Semi-Honest Cost.mp4 18.1 MB
- USENIX Security 2016/USENIX Security 2016 Videos/APISan Sanitizing API Usages through Semantic Cross-Checking.mp4 18.1 MB
- USENIX Security 2019/USENIX Security 2019 Video/Understanding and Securing Device Vulnerabilities through.mp4 18.1 MB
- USENIX Security 2019/USENIX Security 2019 Video/A Billion Open Interfaces for Eve and Mallory MitM, DoS, and Tracking.mp4 18.1 MB
- USENIX Security 2014/USENIX Security 2014 Videos/Optimizing Seed Selection for Fuzzing - Alexandre Rebert, Sang Kil Cha, Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, David Brumley.mp4 18.0 MB
- USENIX Security 2018/USENIX Security 2018 Videos/An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications.mp4 18.0 MB
- USENIX Security 2014/USENIX Security 2014 Videos/FLUSH-RELOAD A High Resolution, Low Noise, L3 Cache Side-Channel Attack - Yuval Yarom, Katrina Falkner.mp4 18.0 MB
- USENIX Security 2019/USENIX Security 2019 Video/JEDI Many-to-Many End-to-End Encryption and Key Delegation for IoT.mp4 18.0 MB
- USENIX Security 2019/USENIX Security 2019 Video/UWB-ED Distance Enlargement Attack Detection in Ultra-Wideband.mp4 18.0 MB
- USENIX Security 2014/USENIX Security 2014 Videos/Telepathwords Preventing Weak Passwords by Reading Users’ Minds - Saranga Komanduri, Richard Shay, Lorrie Faith Cranor, Cormac Herley Stuart Schechter.mp4 18.0 MB
- USENIX Security 2017/USENIX Security 2017 Videos/Reverse Engineering x86 Processor Microcode.mp4 18.0 MB
- USENIX Security 2019/USENIX Security 2019 Video/RVFuzzer Finding Input Validation Bugs in Robotic Vehicles through.mp4 18.0 MB
- USENIX Security 2019/USENIX Security 2019 Video/WAVE A Decentralized Authorization Framework with Transitive Delegation.mp4 17.9 MB
- USENIX Security 2022/End-to-Same-End Encryption Modularly Augmenting an App with an Efficient.mp4 17.9 MB
- USENIX Security 2012/USENIX Security 2012 Videos/Tracking Rootkit Footprints with a Practical Memory Analysis System - Weidong Cui, Marcus Peinado, Zhilei Xu, Ellick Chan.mp4 17.9 MB
- USENIX Security 2017/USENIX Security 2017 Videos/Ninja - Towards Transparent Tracing and Debugging on ARM.mp4 17.9 MB
- USENIX Security 2014/USENIX Security 2014 Videos/A Large-Scale Analysis of the Security of Embedded Firmwares - Andrei Costin, Jonas Zaddach, Aurelien Francillon, and Davide Balzarotti.mp4 17.9 MB
- USENIX Security 2016/USENIX Security 2016 Videos/Optimized Invariant Representation of Network Traffic for Detecting Unseen.mp4 17.9 MB
- USENIX Security 2016/USENIX Security 2016 Videos/Virtual U Defeating Face Liveness Detection by Building Virtual Models.mp4 17.9 MB
- USENIX Security 2018/USENIX Security 2018 Videos/The Broken Shield - Measuring Revocation Effectiveness in the Windows Code-Signing PKI.mp4 17.9 MB
- USENIX Security 2014/USENIX Security 2014 Videos/Password Portfolios and the Finite-Effort User Sustainably Managing Large Numbers of Accounts - Dinei Florencio, Cormac Herley, Paul C. van Oorschot.mp4 17.9 MB
- USENIX Security 2019/USENIX Security 2019 Video/Everyone is Different Client-side Diversification for Defending.mp4 17.8 MB
- USENIX Security 2014/USENIX Security 2014 Videos/From the Aether to the Ethernet-Attacking the Internet using Broadcast Digital Television - Yossef Oren, Angelos D. Keromytis.mp4 17.8 MB
- USENIX Security 2018/USENIX Security 2018 Videos/The Guard's Dilemma - Efficient Code-Reuse Attacks Against Intel SGX.mp4 17.8 MB
- USENIX Security 2019/USENIX Security 2019 Video/The Betrayal At Cloud City An Empirical Analysis Of Cloud-Based Mobile.mp4 17.8 MB
- USENIX Security 2014/USENIX Security 2014 Videos/A Bayesian Approach to Privacy Enforcement in Smartphones - Omer Tripp, Julia Rubin.mp4 17.8 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Charm - Facilitating Dynamic Analysis of Device Drivers of Mobile Systems.mp4 17.7 MB
- USENIX Security 2013/USENIX Security 2013 Videos/Impression Fraud in On-line Advertising via Pay-Per-View Networks - Kevin Springborn, Paul Barford.mp4 17.7 MB
- USENIX Security 2016/USENIX Security 2016 Videos/Protecting Privacy of BLE Device Users.mp4 17.7 MB
- USENIX Security 2020/PEPR '20/PEPR 20 - A Differentially Private Data Analytics API at Scale.mp4 17.6 MB
- USENIX Security 2019/USENIX Security 2019 Video/Reading the Tea leaves A Comparative Analysis of Threat Intelligence.mp4 17.6 MB
- USENIX Security 2017/USENIX Security 2017 Videos/Exploring User Perceptions of Discrimination in Online Targeted Advertising.mp4 17.6 MB
- USENIX Security 2016/USENIX Security 2016 Videos/Enhancing Bitcoin Security and Performance with Strong Consistency via.mp4 17.6 MB
- USENIX Security 2017/USENIX Security 2017 Videos/Efficient Protection of Path-Sensitive Control Security.mp4 17.6 MB
- USENIX Security 2012/USENIX Security 2012 Videos/Privilege Separation in HTML5 Applications - Devdatta Akhawe, Prateek Saxena, Dawn Song.mp4 17.5 MB
- USENIX Security 2017/USENIX Security 2017 Videos/BootStomp - On the Security of Bootloaders in Mobile Devices.mp4 17.5 MB
- USENIX Security 2020/FOCI '20/FOCI 20 - Turbo Tunnel, a good way to design censorship circumvention protocols.mp4 17.5 MB
- USENIX Security 2014/USENIX Security 2014 Videos/Gyrophone Recognizing Speech from Gyroscope Signals - Yan Michalevsky, Dan Boneh, Gabi Nakibly.mp4 17.5 MB
- USENIX Security 2019/USENIX Security 2019 Video/Johnny, you are fired - Spoofing OpenPGP and S MIME Signatures in Emails.mp4 17.5 MB
- USENIX Security 2014/USENIX Security 2014 Videos/Privacy in Pharmacogenetics An End-to-End Case Study of Personalized Warfarin Dosing - Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon Lin, David Page, Thomas Ristenpart.mp4 17.5 MB
- USENIX Security 2016/USENIX Security 2016 Videos/Website-Targeted False Content Injection by Network Operators.mp4 17.5 MB
- USENIX Security 2012/USENIX Security 2012 Videos/Taking Proof-Based Verified Computation a Few Steps Closer to Practicality - Srinath Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Andrew J. Blumberg, Michael Walfish.mp4 17.5 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Vetting Single Sign-On SDK Implementations via Symbolic Reasoning.mp4 17.5 MB
- USENIX Security 2019/USENIX Security 2019 Video/ScatterCache Thwarting Cache Attacks via Cache Set Randomization.mp4 17.5 MB
- USENIX Security 2014/USENIX Security 2014 Videos/An Internet-Wide View of Internet-Wide Scanning - Zakir Durumeric, Michael Bailey, J. Alex Halderman.mp4 17.5 MB
- USENIX Security 2014/USENIX Security 2014 Videos/X-Force Force-Executing Binary Programs for Security Applications - Fei Peng, Zhui Deng, Xiangyu Zhang, Dongyan Xu, Zhiqiang Lin, Zhendong Su.mp4 17.4 MB
- USENIX Security 2023/All cops are broadcasting TETRA under scrutiny.mp4 17.4 MB
- USENIX Security 2014/USENIX Security 2014 Videos/BYTEWEIGHT Learning to Recognize Functions in Binary Code - Tiffany Bao, Jonathan Burket, Maverick Woo, Rafael Turner, David Brumley.mp4 17.4 MB
- USENIX Security 2014/USENIX Security 2014 Videos/Towards Detecting Anomalous User Behavior in Online Social Networks - Bimal Viswanath, M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna P. Gummadi, Max Planck, Balachander Kris.mp4 17.4 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Forgetting of Passwords - Ecological Theory and Data.mp4 17.3 MB
- USENIX Security 2014/USENIX Security 2014 Videos/DSCRETE Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse - Brendan Saltaformaggio, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu.mp4 17.3 MB
- USENIX Security 2020/PEPR '20/PEPR 20 - How to (In)Effectively Convey Privacy Choices with Icons and Link Text.mp4 17.3 MB
- USENIX Security 2015/USENIX Security 2015 Videos/RAPTOR - Routing Attacks on Privacy in Tor.mp4 17.3 MB
- FOCI 2014/Security Audit of Safeplug - Tor in a Box.mp4 17.3 MB
- USENIX Security 2019/USENIX Security 2019 Video/Less is More Quantifying the Security Benefits of Debloating Web Applications.mp4 17.3 MB
- USENIX Security 2016/USENIX Security 2016 Videos/Ariadne A Minimal Approach to State Continuity.mp4 17.3 MB
- USENIX Security 2014/USENIX Security 2014 Videos/Precise Client-side Protection against DOM-based Cross-Site Scripting - Ben Stock, Sebastian Lekies, Tobias Mueller, Patrick Spiegel, and Martin Johns.mp4 17.2 MB
- USENIX Security 2019/USENIX Security 2019 Video/Pythia Remote Oracles for the Masses.mp4 17.2 MB
- USENIX Security 2016/USENIX Security 2016 Videos/You Are Who You Know and How You Behave Attribute Inference Attacks.mp4 17.2 MB
- USENIX Security 2014/USENIX Security 2014 Videos/Understanding the Dark Side of Domain Parking - Sumayah Alrwais, Kan Yuan, Eihal Alowaisheq, Zhou Li, XiaoFeng Wang.mp4 17.2 MB
- USENIX Security 2014/USENIX Security 2014 Videos/USENIX Security 2014 Opening Remarks and Awards - Kevin Fu.mp4 17.2 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Man-in-the-Machine - Exploiting Ill-Secured Communication Inside the Computer.mp4 17.2 MB
- USENIX Security 2014/USENIX Security 2014 Videos/Targeted Threat Index Characterizing and Quantifying Politically-Motivated Targeted Malware - Seth Hardy, Masashi Crete-Nishihata, Katharine Kleemola, Adam Senft, Byron Sonne, Greg.mp4 17.2 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Off-Path TCP Exploit - How Wireless Routers Can Jeopardize Your Secrets.mp4 17.2 MB
- USENIX Security 2019/USENIX Security 2019 Video/Iframes Popups Are Dangerous in Mobile WebView Studying and.mp4 17.2 MB
- USENIX Security 2019/USENIX Security 2019 Video/RAZOR A Framework for Post-deployment Software Debloating.mp4 17.2 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Formal Security Analysis of Neural Networks using Symbolic Intervals.mp4 17.1 MB
- USENIX Security 2020/CSET '20/CSET 20 - Expansion of ICS Testbed for Security Validation based on MITRE ATT&CK Techniques.mp4 17.1 MB
- USENIX Security 2014/USENIX Security 2014 Videos/On the Feasibility of Large-Scale Infections of iOS Devices - Tielei Wang, Yeongjin Jang, Yizheng Chen, Simon Chung, Billy Lau, Wenke Lee.mp4 17.1 MB
- USENIX Security 2019/USENIX Security 2019 Video/Detecting and Characterizing Lateral Phishing at Scale.mp4 17.1 MB
- USENIX Security 2019/USENIX Security 2019 Video/BITE Bitcoin Lightweight Client Privacy using Trusted Execution.mp4 17.0 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Automatic Heap Layout Manipulation for Exploitation.mp4 17.0 MB
- USENIX Security 2014/USENIX Security 2014 Videos/Hulk Eliciting Malicious Behavior in Browser Extensions - Alexandros Kapravelos, Chris Grier, Neha Chachra, Christopher Kruegel, Giovanni Vigna, Vern Paxson.mp4 17.0 MB
- USENIX Security 2016/USENIX Security 2016 Videos/Flip Feng Shui Hammering a Needle in the Software Stack.mp4 17.0 MB
- USENIX Security 2016/USENIX Security 2016 Videos/Harvesting Inconsistent Security Configurations in Custom Android ROMs.mp4 17.0 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Who Is Answering My Queries - Understanding and Characterizing Interception.mp4 17.0 MB
- USENIX Security 2018/USENIX Security 2018 Videos/The Secure Socket API - TLS as an Operating System Service.mp4 17.0 MB
- USENIX Security 2019/USENIX Security 2019 Video/Clinical Computer Security for Victims of Intimate Partner Violence.mp4 17.0 MB
- USENIX Security 2014/USENIX Security 2014 Videos/Brahmastra Driving Apps to Test the Security of Third-Party Components - Ravi Bhoraskar, Seungyeop Han, Jinseong Jeon, Tanzirul Azim, Shuo Chen, Jaeyeon Jung, Suman Nath, Rui Wang.mp4 17.0 MB
- USENIX Security 2019/USENIX Security 2019 Video/Terminal Brain Damage Exposing the Graceless Degradation in Deep.mp4 17.0 MB
- USENIX Security 2019/USENIX Security 2019 Video/ALOHA Auxiliary Loss Optimization for Hypothesis Augmentation.mp4 17.0 MB
- USENIX Security 2014/USENIX Security 2014 Videos/Scheduler-based Defenses against Cross-VM Side-channels - Venkatanathan Varadarajan, Thomas Ristenpart, Michael Swift.mp4 16.9 MB
- USENIX Security 2012/USENIX Security 2012 Videos/Efficient and Scalable Socware Detection in Online Social Networks - Md Sazzadur Rahman, Ting-Kai Huang, Harsha V. Madhyastha, Michalis Faloutsos.mp4 16.9 MB
- USENIX Security 2017/USENIX Security 2017 Videos/Opening Remarks and Awards.mp4 16.9 MB
- USENIX Security 2023/A Research Framework and Initial Study of Browser Security for the Visually.mp4 16.9 MB
- USENIX Security 2018/USENIX Security 2018 Videos/ATtention Spanned - Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem.mp4 16.8 MB
- USENIX Security 2018/USENIX Security 2018 Videos/The Battle for New York - A Case Study of Applied Digital Threat Modeling at the Enterprise Level.mp4 16.8 MB
- USENIX Security 2014/USENIX Security 2014 Videos/Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM - Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, Ulfar Erlingsson, Luis Lozano, Geoff Pike.mp4 16.7 MB
- USENIX Security 2020/PEPR '20/PEPR 20 - Engineering Ethics into the NIST Privacy Framework.mp4 16.7 MB
- USENIX Security 2014/USENIX Security 2014 Videos/Preventing Cryptographic Key Leakage in Cloud Virtual Machines - Erman Pattuk, Murat Kantarcioglu, Zhiqiang Lin, Huseyin Ulusoy.mp4 16.7 MB
- USENIX Security 2014/USENIX Security 2014 Videos/Effective Attacks and Provable Defenses for Website Fingerprinting - Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, Ian Goldberg.mp4 16.7 MB
- USENIX Security 2016/USENIX Security 2016 Videos/Defending against Malicious Peripherals with Cinch.mp4 16.7 MB
- USENIX Security 2014/USENIX Security 2014 Videos/A Large-Scale Empirical Analysis of Chinese Web Passwords - Zhigong Li, Weili Han, Wenyuan Xu.mp4 16.7 MB
- USENIX Security 2014/USENIX Security 2014 Videos/Password Managers Attacks and Defenses - David Silver, Suman Jana, and Dan Boneh, Stanford University - Eric Chen, Collin Jackson.mp4 16.6 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Sensitive Information Tracking in Commodity IoT.mp4 16.6 MB
- USENIX Security 2019/USENIX Security 2019 Video/High Precision Detection of Business Email Compromise.mp4 16.6 MB
- USENIX Security 2018/USENIX Security 2018 Videos/CommanderSong - A Systematic Approach for Practical Adversarial Voice Recognition.mp4 16.6 MB
- USENIX Security 2016/USENIX Security 2016 Videos/What Cannot Be Read, Cannot Be Leveraged Revisiting Assumptions of JIT-ROP.mp4 16.6 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Guarder - A Tunable Secure Allocator.mp4 16.6 MB
- USENIX Security 2020/PEPR '20/PEPR 20 - Beyond Access Using Abac Frameworks to Implement Privacy and Security Policies.mp4 16.6 MB
- USENIX Security 2014/USENIX Security 2014 Videos/Mimesis Aegis A Mimicry Privacy Shield-A System’s Approach to Data Privacy on Public Cloud - Billy Lau, Simon Chung, Chengyu Song, Yeongjin Jang, Wenke Lee, Alexandra Boldyreva.mp4 16.5 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Fear the Reaper - Characterization and Fast Detection of Card Skimmers.mp4 16.5 MB
- USENIX Security 2016/USENIX Security 2016 Videos/Automatically Detecting Error Handling Bugs Using Error Specifications.mp4 16.5 MB
- FOCI 2023/Rethinking Realistic Adversaries for Anonymous Communication Systems.mp4 16.5 MB
- USENIX Security 2014/USENIX Security 2014 Videos/Cardinal Pill Testing of System Virtual Machines - Hao Shi, Abdulla Alwabel, Jelena Mirkovic.mp4 16.5 MB
- USENIX Security 2021/EVMPatch Timely and Automated Patching of Ethereum Smart Contracts.mp4 16.5 MB
- USENIX Security 2014/USENIX Security 2014 Videos/Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture - Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza.mp4 16.5 MB
- USENIX Security 2019/USENIX Security 2019 Video/PeX A Permission Check Analysis Framework for Linux Kernel.mp4 16.4 MB
- USENIX Security 2020/PEPR '20/PEPR 20 - Responsible Design through Experimentation Learnings from LinkedIn.mp4 16.4 MB
- USENIX Security 2019/USENIX Security 2019 Video/Protecting Cloud Virtual Machines from Hypervisor and Host Operating.mp4 16.4 MB
- USENIX Security 2018/USENIX Security 2018 Videos/An Empirical Analysis of Anonymity in Zcash.mp4 16.4 MB
- USENIX Security 2019/USENIX Security 2019 Video/Stack Overflow Considered Helpful Deep Learning Security Nudges Towards.mp4 16.4 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Precise and Accurate Patch Presence Test for Binaries.mp4 16.4 MB
- USENIX Security 2016/USENIX Security 2016 Videos/ZKBoo Faster Zero-Knowledge for Boolean Circuits.mp4 16.3 MB
- USENIX Security 2018/USENIX Security 2018 Videos/From Patching Delays to Infection Symptoms.mp4 16.3 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Return Of Bleichenbacher's Oracle Threat (ROBOT).mp4 16.3 MB
- USENIX Security 2019/USENIX Security 2019 Video/Mobile Private Contact Discovery at Scale.mp4 16.3 MB
- USENIX Security 2014/USENIX Security 2014 Videos/Privee An Architecture for Automatically Analyzing Web Privacy Policies -Sebastian Zimmeck, Steven M. Bellovin.mp4 16.3 MB
- CSET 2020/Expansion of ICS Testbed for Security Validation based on MITRE ATT&CK Techniques.mp4 16.3 MB
- USENIX Security 2019/USENIX Security 2019 Video/Seeing is Not Believing Camouflage Attacks on Image Scaling Algorithms.mp4 16.2 MB
- USENIX Security 2014/USENIX Security 2014 Videos/Z0 An Optimizing Distributing Zero-Knowledge Compiler - Matthew Fredrikson, Benjamin Livshits.mp4 16.2 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Fast and Service-preserving Recovery from Malware Infections Using CRIU.mp4 16.2 MB
- USENIX Security 2020/FOCI '20/FOCI 20 - Opening Digital Borders Cautiously yet Decisively Digital Filtering in Saudi Arabia.mp4 16.2 MB
- USENIX Security 2014/USENIX Security 2014 Videos/Exit from Hell Reducing the Impact of Amplification DDoS Attacks - Marc Kuhrer, Thomas Hupperich, Christian Rossow, Thorsten Holz.mp4 16.2 MB
- USENIX Security 2016/USENIX Security 2016 Videos/OblivP2P An Oblivious Peer-to-Peer Content Sharing System.mp4 16.2 MB
- USENIX Security 2019/USENIX Security 2019 Video/EnFuzz Ensemble Fuzzing with Seed Synchronization among Diverse Fuzzers.mp4 16.1 MB
- USENIX Security 2016/USENIX Security 2016 Videos/Undermining Information Hiding (and What to Do about It).mp4 16.1 MB
- USENIX Security 2018/USENIX Security 2018 Videos/O Single Sign-Off, Where Art Thou An Empirical Analysis of Single Sign-On.mp4 16.0 MB
- USENIX Security 2020/PEPR '20/PEPR 20 - Improving Usability of Differential Privacy at Scale.mp4 16.0 MB
- USENIX Security 2022/Who Are You (I Really Wanna Know) Detecting Audio DeepFakes Through Vocal.mp4 16.0 MB
- USENIX Security 2020/CSET '20/CSET 20 - Towards Adversarial Phishing Detection.mp4 16.0 MB
- USENIX Security 2014/USENIX Security 2014 Videos/Revisiting SSLTLS Implementations New Bleichenbacher Side Channels and Attacks - Christopher Meyer, Juraj Somorovsky, Eugen Weiss, Jorg Schwenk, Sebastian Schinzel, Erik Tews.mp4 16.0 MB
- USENIX Security 2019/USENIX Security 2019 Video/When the Signal is in the Noise Exploiting Diffix's Sticky Noise.mp4 15.9 MB
- USENIX Security 2019/USENIX Security 2019 Video/Cognitive Triaging of Phishing Attacks.mp4 15.9 MB
- USENIX Security 2018/USENIX Security 2018 Videos/How Do Tor Users Interact With Onion Services.mp4 15.9 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Malicious Management Unit - Why Stopping Cache Attacks in Software is Harder Than You Think.mp4 15.9 MB
- USENIX Security 2014/USENIX Security 2014 Videos/TRUESET Faster Verifiable et Computations - Ahmed E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Mahmoud F. Sayed, Elaine Shi, Nikos Triandopoulos.mp4 15.9 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Inception - System-Wide Security Testing of Real-World Embedded Systems Software.mp4 15.9 MB
- USENIX Security 2019/USENIX Security 2019 Video/Exploiting Unprotected I O Operations in AMD's Secure Encrypted Virtualization.mp4 15.9 MB
- USENIX Security 2020/PEPR '20/PEPR 20 - Wikipedia and the Lean Data Diet.mp4 15.9 MB
- USENIX Security 2019/USENIX Security 2019 Video/Towards the Detection of Inconsistencies in Public Security.mp4 15.9 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Arbitrum - Scalable, private smart contracts.mp4 15.8 MB
- USENIX Security 2023/Inducing Authentication Failures to Bypass Credit Card PINs.mp4 15.8 MB
- USENIX Security 2019/USENIX Security 2019 Video/DEEPVSA Facilitating Value-set Analysis with Deep Learning for.mp4 15.8 MB
- USENIX Security 2016/USENIX Security 2016 Videos/DROWN Breaking TLS Using SSLv2.mp4 15.7 MB
- USENIX Security 2019/USENIX Security 2019 Video/SPOILER Speculative Load Hazards Boost Rowhammer and Cache Attacks.mp4 15.7 MB
- USENIX Security 2020/USENIX Security 2020 Videos/The Unpatchable Silicon A Full Break of the Bitstream Encryption of Xilinx.mp4 15.7 MB
- USENIX Security 2014/USENIX Security 2014 Videos/When Governments Hack Opponents A Look at Actors and Technology - William R. Marczak, John Scott-Railton, Morgan Marquis-Boire, Vern Paxson.mp4 15.7 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Enabling Refinable Cross-Host Attack Investigation with Efficient Data Flow Tagging and Tracking.mp4 15.7 MB
- USENIX Security 2014/USENIX Security 2014 Videos/SDDR Light-Weight, Secure Mobile Encounters - Matthew Lentz, Viktor Erdélyi, Paarijaat Aditya, Elaine Shi, Peter Druschel, Bobby Bhattacharjee.mp4 15.6 MB
- USENIX Security 2018/USENIX Security 2018 Videos/End-Users Get Maneuvered - Empirical Analysis of Redirection Hijacking in Content Delivery Networks.mp4 15.6 MB
- ScAINet 2020/Combating Social Media Information Operations with Neural Language Models.mp4 15.6 MB
- USENIX Security 2018/USENIX Security 2018 Videos/DATA - Differential Address Trace Analysis - Finding Address-based Side-Channels in Binaries.mp4 15.6 MB
- USENIX Security 2023/Fine-grained Poisoning Attack to Local Differential Privacy Protocols for.mp4 15.5 MB
- USENIX Security 2023/DISTDET A Cost-Effective Distributed Cyber Threat Detection System.mp4 15.5 MB
- USENIX Security 2014/USENIX Security 2014 Videos/LibFTE A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes - Daniel Luchaup, Kevin P. Dyer, Somesh Jha, Thomas Ristenpart, Thomas Shrimpton.mp4 15.5 MB
- USENIX Security 2018/USENIX Security 2018 Videos/AttriGuard - A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning.mp4 15.5 MB
- USENIX Security 2019/USENIX Security 2019 Video/Tracing Transactions Across Cryptocurrency Ledgers.mp4 15.5 MB
- USENIX Security 2014/USENIX Security 2014 Videos/Dynamic Hooks Hiding Control Flow Changes within Non-Control Data - Sebastian Vogl, Robert Gawlik, Behrad Garmany, Thomas Kittel, Jonas Pfoh, Claudia Eckert, Thorsten Holz.mp4 15.5 MB
- USENIX Security 2020/PEPR '20/PEPR 20 - Building and Deploying a Privacy Preserving Data Analysis Platform.mp4 15.5 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Practical Accountability of Secret Processes.mp4 15.4 MB
- USENIX Security 2021/Risky Business Investigating the Security Practices of Vendors on an Online.mp4 15.4 MB
- USENIX Security 2022/BrakTooth Causing Havoc on Bluetooth Link Manager via Directed Fuzzing.mp4 15.4 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Debloating Software through Piece-Wise Compilation and Loading.mp4 15.4 MB
- CSET 2020/Towards Adversarial Phishing Detection.mp4 15.3 MB
- USENIX Security 2019/USENIX Security 2019 Video/The Art of The Scam Demystifying Honeypots in Ethereum Smart Contracts.mp4 15.3 MB
- USENIX Security 2019/USENIX Security 2019 Video/Detecting Missing-Check Bugs via Semantic- and Context-Aware.mp4 15.3 MB
- USENIX Security 2016/USENIX Security 2016 Videos/The Cut-and-Choose Game and Its Application to Cryptographic Protocols.mp4 15.3 MB
- USENIX Security 2019/USENIX Security 2019 Video/StrongChain Transparent and Collaborative Proof-of-Work Consensus.mp4 15.3 MB
- USENIX Security 2019/USENIX Security 2019 Video/All Things Considered An Analysis of IoT Devices on Home Networks.mp4 15.2 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Tackling runtime-based obfuscation in Android with TIRO.mp4 15.2 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Freezing the Web - A Study of ReDoS Vulnerabilities in JavaScript-based Web Servers.mp4 15.2 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Reading Thieves' Cant - Automatically Identifying and Understanding Dark Jargons from Cybercrime.mp4 15.2 MB
- USENIX Security 2014/USENIX Security 2014 Videos/ASM A Programmable Interface for Extending Android Security - Stephan Heuser, Adwait Nadkarni, William Enck, Ahmad-Reza Sadeghi.mp4 15.1 MB
- USENIX Security 2020/PEPR '20/PEPR 20 - Taking Responsibility for Someone Elses Code Studying the Privacy Behaviors of Mobile.mp4 15.1 MB
- USENIX Security 2020/CSET '20/CSET 20 - On Design and Enhancement of Smart Grid Honeypot System for Practical Collection....mp4 15.1 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Efail - Breaking S MIME and OpenPGP Email Encryption using Exfiltration Channels.mp4 15.0 MB
- USENIX Security 2014/USENIX Security 2014 Videos/Automatically Detecting Vulnerable Websites Before They Turn Malicious - Kyle Soska Nicolas Christin.mp4 15.0 MB
- USENIX Security 2023/Downfall Exploiting Speculative Data Gathering.mp4 15.0 MB
- USENIX Security 2022/OpenSSLNTRU Faster post-quantum TLS key exchange.mp4 14.9 MB
- USENIX Security 2022/SyzScope Revealing High-Risk Security Impacts of Fuzzer-Exposed Bugs in Linux.mp4 14.9 MB
- USENIX Security 2014/USENIX Security 2014 Videos/ret2dir Rethinking Kernel Isolation - Vasileios P. Kemerlis, Michalis Polychronakis, Angelos D. Keromytis.mp4 14.9 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Fp-Scanner - The Privacy Implications of Browser Fingerprint Inconsistencies.mp4 14.9 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Erays - Reverse Engineering Ethereum's Opaque Smart Contracts.mp4 14.9 MB
- USENIX Security 2011/USENIX Security 2011 Presentations/Toward Secure Embedded Web Interfaces Slides - Baptiste Gourdin, Chinmay Soman, Hristo Bojinov, Elie Bursztein.pdf 14.9 MB
- USENIX Security 2020/ScAINet '20/ScAINet 20 - Combating Social Media Information Operations with Neural Language Models.mp4 14.9 MB
- USENIX Security 2019/USENIX Security 2019 Video/XONN XNOR-based Oblivious Deep Neural Network Inference.mp4 14.8 MB
- USENIX Security 2018/USENIX Security 2018 Videos/SAD THUG - Structural Anomaly Detection for Transmissions of High-value Information Using Graphics.mp4 14.8 MB
- CSET 2020/On Design and Enhancement of Smart Grid Honeypot System for Practical Collection.mp4 14.8 MB
- ScAINet 2020/On Adaptive Attacks to Adversarial Example Defenses.mp4 14.8 MB
- USENIX Security 2019/USENIX Security 2019 Video/Looking from the Mirror Evaluating IoT Device Security through.mp4 14.8 MB
- USENIX Security 2014/USENIX Security 2014 Videos/On the Practical Exploitability of Dual EC in TLS Implementations - Stephen Checkoway, Matthew Fredrikson, Ruben Niederhagen, Adam Everspaugh, Matthew Green, Tanja Lange, Thomas Ri.mp4 14.8 MB
- USENIX Security 2014/USENIX Security 2014 Videos/A Look at Targeted Attacks Through the Lense of an NGO - Stevens Le Blond, Adina Uritesc, Cedric Gilbert, Zheng Leong Chua, Prateek Saxena, Engin Kirda.mp4 14.8 MB
- USENIX Security 2023/Hot Pixels Frequency, Power, and Temperature Attacks on GPUs and Arm SoCs.mp4 14.8 MB
- USENIX Security 2013/USENIX Security 2013 Videos/PCF A Portable Circuit Format for Scalable Two-Party Secure Computation - Ben Kreuter, Benjamin Mood, Abhi Shelat, Kevin Butler.mp4 14.7 MB
- USENIX Security 2019/USENIX Security 2019 Video/Robust Website Fingerprinting Through the Cache Occupancy Channel.mp4 14.7 MB
- USENIX Security 2023/Squint Hard Enough Attacking Perceptual Hashing with Adversarial Machine.mp4 14.7 MB
- USENIX Security 2019/USENIX Security 2019 Video/Computer Security and Privacy in the Interactions Between Victim.mp4 14.7 MB
- USENIX Security 2014/USENIX Security 2014 Videos/Stitching the Gadgets On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection - Lucas Davi, Ahmad-Reza Sadeghi, Daniel Lehmann, Fabian Monrose.mp4 14.6 MB
- USENIX Security 2019/USENIX Security 2019 Video/A Systematic Evaluation of Transient Execution Attacks and Defenses.mp4 14.6 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Towards a Secure Zero-rating Framework with Three Parties.mp4 14.6 MB
- USENIX Security 2020/ScAINet '20/ScAINet 20 - On Adaptive Attacks to Adversarial Example Defenses.mp4 14.6 MB
- USENIX Security 2014/USENIX Security 2014 Videos/The Long Taile of Typosquatting Domain Names - Janos Szurdi, Balazs Kocso, Gabor Cseh, Jonathan Spring, Mark Felegyhazi, Chris Kanich.mp4 14.5 MB
- USENIX Security 2019/USENIX Security 2019 Video/Scalable Scanning and Automatic Classification of TLS Padding Oracle.mp4 14.5 MB
- USENIX Security 2022/SkillDetective Automated Policy-Violation Detection of Voice Assistant.mp4 14.5 MB
- USENIX Security 2011/USENIX Security 2011 Proceedings.mobi 14.5 MB
- USENIX Security 2020/PEPR '20/PEPR 20 - A Backdoor by Any Other Name, and How to Stop It.mp4 14.4 MB
- USENIX Security 2023/Proxy Hunting Understanding and Characterizing Proxy-based Upgradeable.mp4 14.4 MB
- USENIX Security 2023/Squirrel A Scalable Secure Two-Party Computation Framework for Training.mp4 14.4 MB
- USENIX Security 2022/Security Analysis of Camera-LiDAR Fusion Against Black-Box Attacks.mp4 14.4 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/Information Security War Room - Sergey Bratus, Dartmouth College, Felix FX Lindner.pdf 14.3 MB
- USENIX Security 2021/CLARION Sound and Clear Provenance Tracking for Microservice Deployments.mp4 14.3 MB
- USENIX Security 2019/USENIX Security 2019 Video/Secure Multi-User Content Sharing for Augmented Reality Applications.mp4 14.3 MB
- USENIX Security 2023/McFIL Model Counting Functionality-Inherent Leakage.mp4 14.3 MB
- USENIX Security 2019/USENIX Security 2019 Video/HideMyApp Hiding the Presence of Sensitive Apps on Android.mp4 14.3 MB
- USENIX Security 2019/USENIX Security 2019 Video/Small World with High Risks A Study of Security Threats in the npm Ecosystem.mp4 14.2 MB
- USENIX Security 2018/USENIX Security 2018 Videos/FANCI - Feature-based Automated NXDomain Classification and Intelligence.mp4 14.2 MB
- USENIX Security 2010/USENIX Security 2010 Proceedings.mobi 14.2 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Towards Predicting Efficient and Anonymous Tor Circuits.mp4 14.2 MB
- USENIX Security 2023/Attacks are Forwarded Breaking the Isolation of MicroVM-based Containers.mp4 14.2 MB
- USENIX Security 2023/LibScan Towards More Precise Third-Party Library Identification for.mp4 14.2 MB
- USENIX Security 2022/Omnes pro uno Practical Multi-Writer Encrypted Database.mp4 14.2 MB
- USENIX Security 2023/VulChecker Graph-based Vulnerability Localization in Source Code.mp4 14.2 MB
- USENIX Security 2019/USENIX Security 2019 Video/Understanding iOS-based Crowdturfing Through Hidden UI Analysis.mp4 14.1 MB
- USENIX Security 2023/Auditory Eyesight Demystifying μs-Precision Keystroke Tracking Attacks on.mp4 14.1 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Who Left Open the Cookie Jar A Comprehensive Evaluation of Third-Party Cookie Policies.mp4 14.1 MB
- USENIX Security 2020/FOCI '20/FOCI 20 - Slitheen Stealth TLS-based Decoy Routing.mp4 14.0 MB
- USENIX Security 2014/USENIX Security 2014 Videos/ROP is Still Dangerous Breaking Modern Defenses - Nicholas Carlini, David Wagner.mp4 14.0 MB
- USENIX Security 2010/USENIX Security 2010 Proceedings.epub 14.0 MB
- USENIX Security 2022/Fuzzing Hardware Like Software.mp4 14.0 MB
- USENIX Security 2019/USENIX Security 2019 Video/50 Ways to Leak Your Data An Exploration of Apps'.mp4 14.0 MB
- USENIX Security 2023/Aliasing Backdoor Attacks on Pre-trained Models.mp4 14.0 MB
- USENIX Security 2014/USENIX Security 2014 Videos/Size Does Matter Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard - Enes Goktas, Elias Athanasopoulos, Michalis Polychronakis, Herbert Bos, Georgios Portokalidis.mp4 13.9 MB
- USENIX Security 2023/Log It’s Big, It’s Heavy, It’s Filled with Personal Data Measuring the.mp4 13.9 MB
- USENIX Security 2019/USENIX Security 2019 Video/AntiFuzz Impeding Fuzzing Audits of Binary Executables.mp4 13.9 MB
- USENIX Security 2023/PATROL Provable Defense against Adversarial Policy in Two-player Games.mp4 13.9 MB
- USENIX Security 2020/PEPR '20/PEPR 20 - When Things Go Wrong.mp4 13.9 MB
- USENIX Security 2023/You Can't See Me Physical Removal Attacks on LiDAR-based Autonomous.mp4 13.8 MB
- USENIX Security 2022/An Experimental Study of GPS Spoofing and Takeover Attacks on UAVs.mp4 13.8 MB
- USENIX Security 2022/USENIX Security '22- The Antrim County 2020 Election Incident An Independent Forensic Investigation.mp4 13.8 MB
- USENIX Security 2022/Drifuzz Harvesting Bugs in Device Drivers from Golden Seeds.mp4 13.8 MB
- USENIX Security 2016/USENIX Security 2016 Videos/All Your Queries Are Belong to Us The Power of File-Injection Attacks.mp4 13.8 MB
- USENIX Security 2019/USENIX Security 2019 Video/The Secret Sharer Evaluating and Testing Unintended Memorization in.mp4 13.7 MB
- USENIX Security 2019/USENIX Security 2019 Video/IODINE Verifying Constant-Time Execution of Hardware.mp4 13.7 MB
- FOCI 2023/Crowdsourcing the Discovery of Server-side Censorship Evasion Strategies.mp4 13.7 MB
- ScAINet 2020/Getting Passive Aggressive about False Positives.mp4 13.7 MB
- USENIX Security 2023/Towards A Proactive ML Approach for Detecting Backdoor Poison Samples.mp4 13.7 MB
- USENIX Security 2023/NeuroPots Realtime Proactive Defense against Bit-Flip Attacks in Neural.mp4 13.7 MB
- USENIX Security 2022/Online Website Fingerprinting Evaluating Website Fingerprinting Attacks.mp4 13.7 MB
- USENIX Security 2021/The Circle Of Life A Large-Scale Study of The IoT Malware Lifecycle.mp4 13.6 MB
- USENIX Security 2020/PEPR '20/PEPR 20 - Privacy Architecture for Data-Driven Innovation Configure.mp4 13.6 MB
- USENIX Security 2023/Know Your Cybercriminal Evaluating Attacker Preferences by Measuring.mp4 13.6 MB
- USENIX Security 2022/Mistrust Plugins You Must A Large-Scale Study Of Malicious Plugins.mp4 13.6 MB
- USENIX Security 2020/CSET '20/CSET 20 - Historical Analysis of Exploit Availability Timelines.mp4 13.5 MB
- USENIX Security 2022/Off-Path Network Traffic Manipulation via Revitalized ICMP Redirect Attacks.mp4 13.5 MB
- USENIX Security 2019/USENIX Security 2019 Video/GRIMOIRE Synthesizing Structure while Fuzzing.mp4 13.5 MB
- USENIX Security 2023/InfinityGauntlet Expose Smartphone Fingerprint Authentication to.mp4 13.5 MB
- USENIX Security 2019/USENIX Security 2019 Video/Evaluating Differentially Private Machine Learning in Practice.mp4 13.4 MB
- USENIX Security 2020/FOCI '20/FOCI 20 - Padding Aint Enough Assessing the Privacy Guarantees of Encrypted DNS.mp4 13.4 MB
- USENIX Security 2022/99% False Positives A Qualitative Study of SOC Analysts' Perspectives.mp4 13.4 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Data Recovery from Scrubbed NAND Flash Storage Need for Analog Sanitization.mp4 13.4 MB
- USENIX Security 2019/USENIX Security 2019 Video/Fuzzification Anti-Fuzzing Techniques.mp4 13.4 MB
- USENIX Security 2021/Once is Never Enough Foundations for Sound Statistical Inference in Tor.mp4 13.4 MB
- USENIX Security 2020/FOCI '20/FOCI 20 - A Comprehensive Study of DNS-over-HTTPS Downgrade Attack.mp4 13.3 MB
- USENIX Security 2012/USENIX Security 2012 Presentations/Fuzzing with Code Fragments Slides - Christian Holler, Kim Herzig, Andreas Zeller.pdf 13.3 MB
- USENIX Security 2022/Label Inference Attacks Against Vertical Federated Learning.mp4 13.3 MB
- USENIX Security 2023/ReUSB Replay-Guided USB Driver Fuzzing.mp4 13.3 MB
- USENIX Security 2023/NAUTILUS Automated RESTful API Vulnerability Detection.mp4 13.3 MB
- USENIX Security 2022/Using Trātṛ to tame Adversarial Synchronization.mp4 13.3 MB
- USENIX Security 2023/Combating Robocalls with Phone Virtual Assistant Mediated Interaction.mp4 13.3 MB
- USENIX Security 2018/USENIX Security 2018 Videos/ACES - Automatic Compartments for Embedded Systems.mp4 13.2 MB
- USENIX Security 2021/Too Good to Be Safe Tricking Lane Detection in Autonomous Driving with Craft.mp4 13.2 MB
- USENIX Security 2023/Temporal CDN-Convex Lens A CDN-Assisted Practical Pulsing DDoS Attack.mp4 13.2 MB
- USENIX Security 2020/USENIX Security 2020 Videos/FuzzGen Automatic Fuzzer Generation.mp4 13.2 MB
- USENIX Security 2023/Duoram A Bandwidth-Efficient Distributed ORAM for 2- and 3-Party Computation.mp4 13.2 MB
- USENIX Security 2020/USENIX Security 2020 Videos/You Are What You Broadcast Identification of Mobile and IoT Devices.mp4 13.1 MB
- USENIX Security 2023/DScope A Cloud-Native Internet Telescope.mp4 13.1 MB
- USENIX Security 2020/CSET '20/CSET 20 - Toward Orchestration of Complex Networking Experiments.mp4 13.1 MB
- CSET 2020/Toward Orchestration of Complex Networking Experiments.mp4 13.1 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Towards Robust LiDAR-based Perception in Autonomous Driving General Black-box.mp4 13.1 MB
- USENIX Security 2020/FOCI '20/FOCI 20 - Triplet Censors Demystifying Great Firewall’s DNS Censorship Behavior.mp4 13.1 MB
- USENIX Security 2019/USENIX Security 2019 Video/Site Isolation Process Separation for Web Sites within the Browser.mp4 13.1 MB
- USENIX Security 2022/Back-Propagating System Dependency Impact for Attack Investigation.mp4 13.1 MB
- USENIX Security 2022/Lamphone Passive Sound Recovery from a Desk Lamp's Light Bulb Vibrations.mp4 13.1 MB
- USENIX Security 2023/PoliGraph Automated Privacy Policy Analysis using Knowledge Graphs.mp4 13.0 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Light Commands Laser-Based Audio Injection Attacks on Voice-Controllable.mp4 13.0 MB
- USENIX Security 2018/USENIX Security 2018 Videos/WPSE - Fortifying Web Protocols via Browser-Side Security Monitoring.mp4 13.0 MB
- CSET 2020/Historical Analysis of Exploit Availability Timelines.mp4 13.0 MB
- USENIX Security 2023/Smart Learning to Find Dumb Contracts.mp4 13.0 MB
- USENIX Security 2020/CSET '20/CSET 20 - APTGen An Approach towards Generating Practical Dataset Labelled with Targeted....mp4 12.9 MB
- USENIX Security 2022/Dynamic Searchable Encryption with Optimal Search in the Presence of Deletions.mp4 12.9 MB
- USENIX Security 2019/USENIX Security 2019 Video/Back to the Whiteboard a Principled Approach for the Assessment and.mp4 12.9 MB
- USENIX Security 2023/Detecting API Post-Handling Bugs Using Code and Description in Patches.mp4 12.9 MB
- USENIX Security 2009/USENIX Security 2009 Presentations/Compromising Electromagnetic Emanations of Wired and Wireless Keyboards Slides - Martin Vuagnoux, Sylvain Pasini.pdf 12.9 MB
- USENIX Security 2023/Diving into Robocall Content with SnorCall.mp4 12.9 MB
- USENIX Security 2023/Account Verification on Social Media User Perceptions and Paid Enrollment.mp4 12.8 MB
- USENIX Security 2018/USENIX Security 2018 Videos/DIZK - A Distributed Zero Knowledge Proof System.mp4 12.8 MB
- USENIX Security 2009/USENIX Security 2009 Presentations/USENIX Security 2009 - Interior.pdf 12.8 MB
- USENIX Security 2021/Dirty Road Can Attack Security of Deep Learning based Automated Lane.mp4 12.8 MB
- USENIX Security 2020/PEPR '20/PEPR 20 - Assessing Privacy Risk with the IPA Triad.mp4 12.8 MB
- USENIX Security 2020/ScAINet '20/ScAINet 20 - Getting Passive Aggressive about False Positives.mp4 12.8 MB
- USENIX Security 2022/One-off Disclosure Control by Heterogeneous Generalization.mp4 12.8 MB
- USENIX Security 2023/Credit Karma Understanding Security Implications of Exposed Cloud Services.mp4 12.8 MB
- USENIX Security 2023/Humans vs. Machines in Malware Classification.mp4 12.7 MB
- USENIX Security 2020/USENIX Security 2020 Videos/TextShield Robust Text Classification Based on Multimodal Embedding.mp4 12.7 MB
- USENIX Security 2021/Weak Links in Authentication Chains A Large-scale Analysis of Email Sender.mp4 12.7 MB
- USENIX Security 2020/USENIX Security 2020 Videos/APEX A Verified Architecture for Proofs of Execution on Remote Devices.mp4 12.7 MB
- USENIX Security 2018/USENIX Security 2018 Videos/The aftermath of a crypto-ransomware attack at a large academic institution.mp4 12.7 MB
- USENIX Security 2023/HashTag Hash-based Integrity Protection for Tagged Architectures.mp4 12.7 MB
- USENIX Security 2023/No Single Silver Bullet Measuring the Accuracy of Password Strength Meters.mp4 12.7 MB
- USENIX Security 2023/DiffSmooth Certifiably Robust Learning via Diffusion Models and Local.mp4 12.7 MB
- USENIX Security 2021/Can I Take Your Subdomain Exploring Same-Site Attacks in the Modern Web.mp4 12.7 MB
- CSET 2020/APTGen An Approach towards Generating Practical Dataset Labelled with Targeted.mp4 12.7 MB
- USENIX Security 2022/Exploring the Security Boundary of Data Reconstruction via Neuron Exclusivity.mp4 12.7 MB
- USENIX Security 2021/CSProp Ciphertext and Signature Propagation Low-Overhead Public-Key.mp4 12.7 MB
- USENIX Security 2023/VeriZexe Decentralized Private Computation with Universal Setup.mp4 12.7 MB
- USENIX Security 2022/COMRace Detecting Data Race Vulnerabilities in COM Objects.mp4 12.7 MB
- USENIX Security 2022/XDRI Attacks - and - How to Enhance Resilience of Residential Routers.mp4 12.6 MB
- USENIX Security 2021/Catching Phishers By Their Bait Investigating the Dutch Phishing Landscape.mp4 12.6 MB
- USENIX Security 2023/Two Sides of the Shield Understanding Protective DNS adoption factors.mp4 12.6 MB
- USENIX Security 2022/Physical-Layer Attacks Against Pulse Width Modulation-Controlled Actuators.mp4 12.6 MB
- USENIX Security 2022/Smart Home Privacy Policies Demystified A Study of Availability, Content, and.mp4 12.6 MB
- USENIX Security 2020/USENIX Security 2020 Videos/COUNTERFOIL Verifying Provenance of Integrated Circuits using Intrinsic.mp4 12.6 MB
- USENIX Security 2023/Silent Spring Prototype Pollution Leads to Remote Code Execution in Node.js.mp4 12.6 MB
- USENIX Security 2023/Network Responses to Russia's Invasion of Ukraine in 2022 A Cautionary Tale..mp4 12.6 MB
- USENIX Security 2021/SiamHAN IPv6 Address Correlation Attacks on TLS Encrypted Traffic.mp4 12.5 MB
- USENIX Security 2023/KENKU Towards Efficient and Stealthy Black-box Adversarial Attacks against.mp4 12.5 MB
- USENIX Security 2020/FOCI '20/FOCI 20 - Bystanders’ Privacy The Perspectives of Nannies on Smart Home Surveillance.mp4 12.5 MB
- USENIX Security 2021/Forecasting Malware Capabilities From Cyber Attack Memory Images.mp4 12.5 MB
- USENIX Security 2021/Deep-Dup An Adversarial Weight Duplication Attack Framework to Crush Deep.mp4 12.4 MB
- USENIX Security 2023/TAP Transparent and Privacy-Preserving Data Services.mp4 12.4 MB
- USENIX Security 2020/CSET '20/CSET 20 - Representativeness in the Benchmark for Vulnerability Analysis Tools (B-VAT).mp4 12.4 MB
- USENIX Security 2023/Calpric Inclusive and Fine-grain Labeling of Privacy Policies with.mp4 12.4 MB
- USENIX Security 2022/TheHuzz Instruction Fuzzing of Processors Using Golden-Reference Models for.mp4 12.4 MB
- USENIX Security 2023/Learning Normality is Enough A Software-based Mitigation against Inaudible.mp4 12.4 MB
- USENIX Security 2022/RapidPatch Firmware Hotpatching for Real-Time Embedded Devices.mp4 12.4 MB
- USENIX Security 2023/Meta-Sift How to Sift Out a Clean Subset in the Presence of Data Poisoning.mp4 12.4 MB
- USENIX Security 2022/Adversarial Detection Avoidance Attacks Evaluating the robustness.mp4 12.4 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/Privacy in Pharmacogenetics An End-to-End Case Study of Personalized Warfarin Dosing Slides - Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon Lin, David Page, Tho.pdf 12.4 MB
- USENIX Security 2022/Exploring the Unchartered Space of Container Registry Typosquatting.mp4 12.4 MB
- USENIX Security 2022/Ferry State-Aware Symbolic Execution for Exploring State-Dependent Program.mp4 12.4 MB
- USENIX Security 2023/PROGRAPHER An Anomaly Detection System based on Provenance Graph Embedding.mp4 12.4 MB
- USENIX Security 2023/Glaze Protecting Artists from Style Mimicry by Text-to-Image Models.mp4 12.4 MB
- USENIX Security 2023/CodexLeaks Privacy Leaks from Code Generation Language Models in GitHub.mp4 12.3 MB
- USENIX Security 2023/On the Feasibility of Malware Unpacking via Hardware-assisted Loop Profiling.mp4 12.3 MB
- USENIX Security 2022/A Large-scale and Longitudinal Measurement Study of DKIM Deployment.mp4 12.3 MB
- USENIX Security 2023/Aegis Mitigating Targeted Bit-flip Attacks against Deep Neural Networks.mp4 12.3 MB
- USENIX Security 2023/PET Prevent Discovered Errors from Being Triggered in the Linux Kerne.mp4 12.3 MB
- USENIX Security 2023/Freaky Leaky SMS Extracting User Locations by Analyzing SMS Timings.mp4 12.3 MB
- USENIX Security 2023/Are You Spying on Me Large-Scale Analysis on IoT Data Exposure through.mp4 12.3 MB
- USENIX Security 2021/Jaqen A High-Performance Switch-Native Approach for Detecting and Mitigating.mp4 12.3 MB
- CSET 2020/Representativeness in the Benchmark for Vulnerability Analysis Tools (B-VAT).mp4 12.3 MB
- USENIX Security 2023/ACORN Input Validation for Secure Aggregation.mp4 12.3 MB
- USENIX Security 2019/USENIX Security 2019 Video/A Study of the Feasibility of Co-located App Attacks against BLE.mp4 12.3 MB
- USENIX Security 2023/The Maginot Line Attacking the Boundary of DNS Caching Protection.mp4 12.3 MB
- USENIX Security 2019/USENIX Security 2019 Video/Devils in the Guidance Predicting Logic Vulnerabilities in Payment.mp4 12.3 MB
- USENIX Security 2023/Beyond Typosquatting An In-depth Look at Package Confusion.mp4 12.3 MB
- USENIX Security 2023/Automata-Guided Control-Flow-Sensitive Fuzz Driver Generation.mp4 12.2 MB
- USENIX Security 2023/Improving Logging to Reduce Permission Over-Granting Mistakes.mp4 12.2 MB
- USENIX Security 2023/Fuzz The Power Dual-role State Guided Black-box Fuzzing for USB Power.mp4 12.2 MB
- USENIX Security 2022/Automating Cookie Consent and GDPR Violation Detection.mp4 12.2 MB
- USENIX Security 2023/PatchVerif Discovering Faulty Patches in Robotic Vehicles.mp4 12.2 MB
- USENIX Security 2022/Towards Automatically Reverse Engineering Vehicle Diagnostic Protocols.mp4 12.1 MB
- USENIX Security 2023/UVSCAN Detecting Third-Party Component Usage Violations in IoT Firmware.mp4 12.1 MB
- USENIX Security 2023/Remote Attacks on Speech Recognition Systems Using Sound from Power Supply.mp4 12.1 MB
- USENIX Security 2023/Reassembly is Hard A Reflection on Challenges and Strategies.mp4 12.1 MB
- USENIX Security 2022/Anycast Agility Network Playbooks to Fight DDoS.mp4 12.1 MB
- USENIX Security 2023/MTSan A Feasible and Practical Memory Sanitizer for Fuzzing COTS Binaries.mp4 12.1 MB
- USENIX Security 2022/FReD Identifying File Re-Delegation in Android System Services.mp4 12.1 MB
- USENIX Security 2022/MaDIoT 2.0 Modern High-Wattage IoT Botnet Attacks and Defenses.mp4 12.1 MB
- USENIX Security 2023/WaterBear Practical Asynchronous BFT Matching Security Guarantees of.mp4 12.1 MB
- USENIX Security 2022/FIXREVERTER A Realistic Bug Injection Methodology for Benchmarking Fuzz.mp4 12.1 MB
- USENIX Security 2023/CacheQL Quantifying and Localizing Cache Side-Channel Vulnerabilities in.mp4 12.1 MB
- USENIX Security 2020/USENIX Security 2020 Videos/SHA-1 is a Shambles First Chosen-Prefix Collision on SHA-1 and Application.mp4 12.1 MB
- USENIX Security 2023/NRDelegationAttack Complexity DDoS attack on DNS Recursive Resolvers.mp4 12.1 MB
- USENIX Security 2023/X-Adv Physical Adversarial Object Attacks against X-ray Prohibited Item.mp4 12.1 MB
- USENIX Security 2021/Automatic Firmware Emulation through Invalidity-guided Knowledge Inference.mp4 12.1 MB
- USENIX Security 2020/USENIX Security 2020 Videos/SAVIOR Securing Autonomous Vehicles with Robust Physical Invariants.mp4 12.0 MB
- USENIX Security 2023/Lessons Lost Incident Response in the Age of Cyber Insurance and Breach.mp4 12.0 MB
- USENIX Security 2023/Long Live The Honey Badger Robust Asynchronous DPSS and its Applications.mp4 12.0 MB
- USENIX Security 2023/Exorcising - Wraith - Protecting LiDAR-based Object Detector in Automated.mp4 12.0 MB
- USENIX Security 2023/CSHER A System for Compact Storage with HE-Retrieval.mp4 12.0 MB
- USENIX Security 2023/HOMESPY The Invisible Sniffer of Infrared Remote Control of Smart TVs.mp4 12.0 MB
- USENIX Security 2023/TRIDENT Towards Detecting and Mitigating Web-based Social Engineering Attacks.mp4 12.0 MB
- USENIX Security 2020/USENIX Security 2020 Videos/MVP Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures.mp4 12.0 MB
- USENIX Security 2022/LinKRID Vetting Imbalance Reference Counting in Linux kernel with Symbolic.mp4 12.0 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Agamotto Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine.mp4 12.0 MB
- USENIX Security 2023/MINER A Hybrid Data-Driven Approach for REST API Fuzzing.mp4 11.9 MB
- USENIX Security 2023/That Person Moves Like A Car Misclassification Attack Detection fo.mp4 11.9 MB
- USENIX Security 2023/Reversing, Breaking, and Fixing the French Legislative Election E-Voting.mp4 11.9 MB
- USENIX Security 2023/Rosetta Enabling Robust TLS Encrypted Traffic Classification in Diverse.mp4 11.9 MB
- USENIX Security 2023/Sparsity Brings Vulnerabilities Exploring New Metrics in Backdoor Attacks.mp4 11.9 MB
- USENIX Security 2022/Watching the Watchers Practical Video Identification Attack in LTE Networks.mp4 11.9 MB
- USENIX Security 2020/USENIX Security 2020 Videos/BigMAC Fine-Grained Policy Analysis of Android Firmware.mp4 11.9 MB
- USENIX Security 2021/FlowDist Multi-Staged Refinement-Based Dynamic Information Flow Analysis for.mp4 11.9 MB
- USENIX Security 2022/Inference Attacks Against Graph Neural Networks.mp4 11.8 MB
- USENIX Security 2023/A Large Scale Study of the Ethereum Arbitrage Ecosystem.mp4 11.8 MB
- USENIX Security 2022/OVRseen Auditing Network Traffic and Privacy Policies in Oculus VR.mp4 11.8 MB
- USENIX Security 2023/Prime Match A Privacy-Preserving Inventory Matching System.mp4 11.8 MB
- USENIX Security 2023/I'm going to trust this until it burns me - Parents' Privacy Concerns and.mp4 11.8 MB
- USENIX Security 2022/Are Your Sensitive Attributes Private Novel Model Inversion Attribute.mp4 11.8 MB
- USENIX Security 2022/Membership Inference Attacks and Defenses in Neural Network Pruning.mp4 11.8 MB
- USENIX Security 2023/TPatch A Triggered Physical Adversarial Patch.mp4 11.8 MB
- USENIX Security 2023/LocIn Inferring Semantic Location from Spatial Maps in Mixed Reality.mp4 11.8 MB
- USENIX Security 2012/USENIX Security 2012 Presentations/Gone in 360 Seconds Hijacking with Hitag2 Slides - Roel Verdult, Flavio D. Garcia, Josep Balasch, KU Leuven.pdf 11.8 MB
- USENIX Security 2023/ARI Attestation of Real-time Mission Execution Integrity.mp4 11.8 MB
- USENIX Security 2023/zkSaaS Zero-Knowledge SNARKs as a Service.mp4 11.7 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Visor Privacy-Preserving Video Analytics as a Cloud Service.mp4 11.7 MB
- USENIX Security 2022/Rolling Colors Adversarial Laser Exploits against Traffic Light Recognition.mp4 11.7 MB
- FOCI 2020/Opening Digital Borders Cautiously yet Decisively Digital Filtering in Saudi Arabia.mp4 11.7 MB
- USENIX Security 2020/USENIX Security 2020 Videos/HybCache Hybrid Side-Channel-Resilient Caches for Trusted Execution.mp4 11.7 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade Attacks.mp4 11.7 MB
- USENIX Security 2022/Backporting Security Patches of Web Applications A Prototype Design.mp4 11.7 MB
- USENIX Security 2023/Checking Passwords on Leaky Computers A Side Channel Analysis of Chrome's.mp4 11.7 MB
- USENIX Security 2023/SMACK Semantically Meaningful Adversarial Audio Attack.mp4 11.7 MB
- USENIX Security 2023/Auditing Framework APIs via Inferred App-side Security Specifications.mp4 11.7 MB
- USENIX Security 2023/AIFORE Smart Fuzzing Based on Automatic Input Format Reverse Engineering.mp4 11.7 MB
- USENIX Security 2021/Reducing Bias in Modeling Real-world Password Strength via Deep Learning.mp4 11.7 MB
- USENIX Security 2023/Your Exploit is Mine Instantly Synthesizing Counterattack Smart Contract.mp4 11.7 MB
- USENIX Security 2023/Inductive Graph Unlearning.mp4 11.6 MB
- USENIX Security 2020/USENIX Security 2020 Videos/NXNSAttack Recursive DNS Inefficiencies and Vulnerabilities.mp4 11.6 MB
- USENIX Security 2023/Hidden Reality Caution, Your Hand Gesture Inputs in the Immersive Virtual.mp4 11.6 MB
- USENIX Security 2021/Where's Crypto Automated Identification and Classification of Proprietary.mp4 11.6 MB
- USENIX Security 2023/Place Your Locks Well Understanding and Detecting Lock Misuse Bugs.mp4 11.6 MB
- USENIX Security 2023/A Mixed-Methods Study of Security Practices of Smart Contract Developers.mp4 11.6 MB
- USENIX Security 2018/USENIX Security 2018 Videos/HeapHopper - Bringing Bounded Model Checking to Heap Implementation Security.mp4 11.6 MB
- USENIX Security 2023/Practical Asynchronous High-threshold Distributed Key Generation and.mp4 11.6 MB
- USENIX Security 2022/Automated Detection of Automated Traffic.mp4 11.6 MB
- USENIX Security 2022/Pacer Comprehensive Network Side-Channel Mitigation in the Cloud.mp4 11.6 MB
- USENIX Security 2022/Can one hear the shape of a neural network Snooping the GPU via Magnetic.mp4 11.6 MB
- USENIX Security 2022/Constant-weight PIR Single-round Keyword PIR via Constant-weight Equality.mp4 11.6 MB
- USENIX Security 2021/CANARY - a reactive defense mechanism for Controller Area Networks based.mp4 11.6 MB
- USENIX Security 2020/USENIX Security 2020 Videos/PHMon A Programmable Hardware Monitor and Its Security Use Cases.mp4 11.6 MB
- USENIX Security 2023/Lost in Conversion Exploit Data Structure Conversion with Attribute Loss.mp4 11.6 MB
- USENIX Security 2023/Near-Ultrasound Inaudible Trojan (Nuit) Exploiting Your Speaker to Attack.mp4 11.6 MB
- USENIX Security 2023/Remote Code Execution from SSTI in the Sandbox Automatically Detecting and.mp4 11.6 MB
- USENIX Security 2022/Counting in Regexes Considered Harmful Exposing ReDoS Vulnerability of.mp4 11.6 MB
- USENIX Security 2022/DeepDi Learning a Relational Graph Convolutional Network Model on Instruction.mp4 11.5 MB
- USENIX Security 2023/Reusable Enclaves for Confidential Serverless Computing.mp4 11.5 MB
- USENIX Security 2020/USENIX Security 2020 Videos/From Control Model to Program Investigating Robotic Aerial Vehicle Accidents.mp4 11.5 MB
- FOCI 2023/Towards a Comprehensive Understanding of Russian Transit Censorship.mp4 11.5 MB
- USENIX Security 2023/Egg Hunt in Tesla Infotainment A First Look at Reverse Engineering of Qt.mp4 11.5 MB
- USENIX Security 2022/Morphuzz Bending (Input) Space to Fuzz Virtual Devices.mp4 11.5 MB
- USENIX Security 2023/Bilingual Problems Studying the Security Risks Incurred by Native.mp4 11.5 MB
- USENIX Security 2023/Notice the Imposter A Study on User Tag Spoofing Attack in Mobile Apps.mp4 11.5 MB
- USENIX Security 2012/USENIX Security 2012 Presentations/Throttling Tor Bandwidth Parasites Slides - Rob Jansen, Paul Syverson, Nicholas Hopper.pdf 11.5 MB
- USENIX Security 2022/Open to a fault On the passive compromise of TLS keys via transient errors.mp4 11.4 MB
- USENIX Security 2023/Ethical Frameworks and Computer Security Trolley Problems Foundations for.mp4 11.4 MB
- USENIX Security 2021/MAZE Towards Automated Heap Feng Shui.mp4 11.4 MB
- USENIX Security 2023/Problematic Advertising and its Disparate Exposure on Facebook.mp4 11.4 MB
- USENIX Security 2021/ATLAS A Sequence-based Learning Approach for Attack Investigation.mp4 11.4 MB
- USENIX Security 2020/USENIX Security 2020 Videos/MUZZ Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded.mp4 11.4 MB
- FOCI 2020/Turbo Tunnel, a good way to design censorship circumvention protocols.mp4 11.4 MB
- USENIX Security 2023/Cheesecloth Zero-Knowledge Proofs of Real World Vulnerabilities.mp4 11.4 MB
- USENIX Security 2022/Phish in Sheep's Clothing Exploring the Authentication Pitfalls.mp4 11.4 MB
- USENIX Security 2023/Cookie Crumbles Breaking and Fixing Web Session Integrity.mp4 11.4 MB
- USENIX Security 2022/Under the Hood of DANE Mismanagement in SMTP.mp4 11.4 MB
- USENIX Security 2020/USENIX Security 2020 Videos/A Longitudinal and Comprehensive Study of the DANE Ecosystem in Email.mp4 11.4 MB
- USENIX Security 2023/Work-From-Home and COVID-19 Trajectories of Endpoint Security Management.mp4 11.4 MB
- USENIX Security 2022/OpenVPN is Open to VPN Fingerprinting.mp4 11.4 MB
- FOCI 2023/Detecting Network Interference Without Endpoint Participation.mp4 11.4 MB
- USENIX Security 2023/UCBlocker Unwanted Call Blocking Using Anonymous Authentication.mp4 11.4 MB
- USENIX Security 2020/USENIX Security 2020 Videos/The Industrial Age of Hacking.mp4 11.4 MB
- USENIX Security 2021/EOSAFE Security Analysis of EOSIO Smart Contracts.mp4 11.3 MB
- USENIX Security 2023/Demystifying Pointer Authentication on Apple M1.mp4 11.3 MB
- USENIX Security 2020/USENIX Security 2020 Videos/GREYONE Data Flow Sensitive Fuzzing.mp4 11.3 MB
- USENIX Security 2009/USENIX Security 2009 Presentations/Compression, Correction, Confidentiality, and Comprehension A Modern Look at Commercial Telegraph Codes - Steven M. Bellovin.pdf 11.3 MB
- USENIX Security 2023/Un-Equal Online Safety - A Gender Analysis of Security and Privacy.mp4 11.3 MB
- USENIX Security 2021/Automated Discovery of Denial-of-Service Vulnerabilities in Connected Vehicle.mp4 11.3 MB
- USENIX Security 2023/A Study of China's Censorship and Its Evasion Through the Lens of Online.mp4 11.3 MB
- USENIX Security 2021/Weaponizing Middleboxes for TCP Reflected Amplification.mp4 11.3 MB
- USENIX Security 2023/FuncTeller How Well Does eFPGA Hide Functionality.mp4 11.3 MB
- USENIX Security 2020/USENIX Security 2020 Videos/A different cup of TI The added value of commercial threat intelligence.mp4 11.3 MB
- USENIX Security 2023/Cross Container Attacks The Bewildered eBPF on Clouds.mp4 11.3 MB
- USENIX Security 2023/DeResistor Toward Detection-Resistant Probing for Evasion of Internet.mp4 11.3 MB
- USENIX Security 2022/DeepPhish Understanding User Trust Towards Artificially Generated Profiles.mp4 11.3 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Composition Kills A Case Study of Email Sender Authentication.mp4 11.3 MB
- USENIX Security 2022/Regulator Dynamic Analysis to Detect ReDoS.mp4 11.2 MB
- USENIX Security 2023/Intender Fuzzing Intent-Based Networking with Intent-State Transition.mp4 11.2 MB
- ScAINet 2020/Optimization for Attack Surface Exploration The Case of TLS.mp4 11.2 MB
- USENIX Security 2022/Your Microphone Array Retains Your Identity A Robust Voice Liveness.mp4 11.2 MB
- USENIX Security 2021/Senate A Maliciously-Secure MPC Platform for Collaborative Analytics.mp4 11.2 MB
- USENIX Security 2009/USENIX Security 2009 Presentations/USENIX Security 2009 Track - Proceedings.tgz 11.2 MB
- USENIX Security 2023/Authenticated private information retrieval.mp4 11.2 MB
- USENIX Security 2022/Automated Side Channel Analysis of Media Software with Manifold Learning.mp4 11.2 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Temporal System Call Specialization for Attack Surface Reduction.mp4 11.2 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Actions Speak Louder than Words Entity-Sensitive Privacy Policy and Data Flow.mp4 11.2 MB
- USENIX Security 2023/AutoFR Automated Filter Rule Generation for Adblocking.mp4 11.2 MB
- USENIX Security 2023/An Efficient Design of Intelligent Network Data Plane.mp4 11.2 MB
- USENIX Security 2023/TRust A Compilation Framework for In-process Isolation to Protect Safe.mp4 11.2 MB
- USENIX Security 2023/Decompiling x86 Deep Neural Network Executables.mp4 11.2 MB
- USENIX Security 2023/AEX-Notify Thwarting Precise Single-Stepping Attacks through Interrupt.mp4 11.2 MB
- USENIX Security 2021/Frontal Attack Leaking Control-Flow in SGX via the CPU Frontend.mp4 11.2 MB
- USENIX Security 2023/To Do This Properly, You Need More Resources The Hidden Costs of.mp4 11.2 MB
- USENIX Security 2022/Ground Truth for Binary Disassembly is Not Easy.mp4 11.1 MB
- USENIX Security 2023/Medusa Attack Exploring Security Hazards of In-App QR Code Scanning.mp4 11.1 MB
- USENIX Security 2023/A Peek into the Metaverse Detecting 3D Model Clones in Mobile Games.mp4 11.1 MB
- USENIX Security 2023/ARGUS A Framework for Staged Static Taint Analysis of GitHub Workflows and.mp4 11.1 MB
- USENIX Security 2020/USENIX Security 2020 Videos/iOS, Your OS, Everybodys OS Vetting and Analyzing Network Services of iOS.mp4 11.1 MB
- USENIX Security 2020/CSET '20/CSET 20 - HAI 1.0 HIL-based Augmented ICS Security Dataset.mp4 11.1 MB
- USENIX Security 2023/URET Universal Robustness Evaluation Toolkit (for Evasion).mp4 11.1 MB
- USENIX Security 2023/ASSET Robust Backdoor Data Detection Across a Multiplicity of Deep Learning..mp4 11.1 MB
- USENIX Security 2021/Security Obstacles and Motivations for Small Businesses from a CISO's.mp4 11.1 MB
- USENIX Security 2020/USENIX Security 2020 Videos/The Impact of Ad-Blockers on Product Search and Purchase Behavior.mp4 11.1 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/Dismantling Megamos Crypto Wirelessly Lockpicking a Vehicle Immobilizer Slides - Roel Verdult, Flavio D. Garcia, Baris Ege.pdf 11.1 MB
- USENIX Security 2021/Causal Analysis for Software-Defined Networking Attacks.mp4 11.1 MB
- USENIX Security 2023/The Space of Adversarial Strategies.mp4 11.1 MB
- USENIX Security 2023/Strategies and Vulnerabilities of Participants in Venezuelan Influence.mp4 11.1 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Hall Spoofing A Non-Invasive DoS Attack on Grid-Tied Solar Inverter.mp4 11.1 MB
- USENIX Security 2018/USENIX Security 2018 Videos/IMIX - In-Process Memory Isolation EXtension.mp4 11.1 MB
- USENIX Security 2023/PrivateFL Accurate, Differentially Private Federated Learning via.mp4 11.1 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Frankenstein Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation.mp4 11.1 MB
- USENIX Security 2022/USENIX Security '22-Hertzbleed Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86.mp4 11.0 MB
- USENIX Security 2021/Automatic Policy Generation for Inter-Service Access Control of Microservices.mp4 11.0 MB
- USENIX Security 2022/FOAP Fine-Grained Open-World Android App Fingerprinting.mp4 11.0 MB
- USENIX Security 2023/Access Denied Assessing Physical Risks to Internet Access Networks.mp4 11.0 MB
- USENIX Security 2023/PELICAN Exploiting Backdoors of Naturally Trained Deep Learning Models In.mp4 11.0 MB
- USENIX Security 2023/AIRS Explanation for Deep Reinforcement Learning based Security Applications.mp4 11.0 MB
- USENIX Security 2020/USENIX Security 2020 Videos/BesFS A POSIX Filesystem for Enclaves with a Mechanized Safety Proof.mp4 11.0 MB
- USENIX Security 2021/Understanding Malicious Cross-library Data Harvesting on Android.mp4 11.0 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Call Me Maybe Eavesdropping Encrypted LTE Calls With ReVoLTE.mp4 11.0 MB
- CSET 2020/UBCIS Ultimate Benchmark for Container Image Scanning.mp4 11.0 MB
- USENIX Security 2022/DoLTEst In-depth Downlink Negative Testing Framework for LTE Devices.mp4 11.0 MB
- USENIX Security 2022/Estimating Incidental Collection in Foreign Intelligence Surveillance.mp4 11.0 MB
- USENIX Security 2021/Static Detection of Unsafe DMA Accesses in Device Drivers.mp4 11.0 MB
- USENIX Security 2023/SandDriller A Fully-Automated Approach for Testing Language-Based.mp4 11.0 MB
- USENIX Security 2023/Employees Who Don’t Accept the Time Security Takes Are Not Aware Enough.mp4 11.0 MB
- USENIX Security 2021/Examining the Efficacy of Decoy-based and Psychological Cyber Deception.mp4 11.0 MB
- USENIX Security 2020/CSET '20/CSET 20 - UBCIS Ultimate Benchmark for Container Image Scanning.mp4 11.0 MB
- USENIX Security 2022/How Do You Not Lose Friends - Synthesizing a Design Space of Social Controls.mp4 11.0 MB
- USENIX Security 2022/ProFactory Improving IoT Security via Formalized Protocol Customization.mp4 11.0 MB
- USENIX Security 2023/Union under Duress Understanding Hazards of Duplicate Resource Mismediation..mp4 11.0 MB
- USENIX Security 2023/How to Cover up Anomalous Accesses to Electronic Health Records.mp4 11.0 MB
- USENIX Security 2023/autofz Automated Fuzzer Composition at Runtime.mp4 11.0 MB
- USENIX Security 2022/SAID State-aware Defense Against Injection Attacks on In-vehicle Network.mp4 11.0 MB
- USENIX Security 2022/IHOP Improved Statistical Query Recovery against Searchable Symmetric.mp4 11.0 MB
- USENIX Security 2023/SQIRL Grey-Box Detection of SQL Injection Vulnerabilities Using.mp4 11.0 MB
- USENIX Security 2022/StateFuzz System Call-Based State-Aware Linux Driver Fuzzing.mp4 10.9 MB
- USENIX Security 2021/Messy States of Wiring Vulnerabilities in Emerging Personal Payment Systems.mp4 10.9 MB
- USENIX Security 2023/CAPatch Physical Adversarial Patch against Image Captioning Systems.mp4 10.9 MB
- USENIX Security 2017/USENIX Security 2017 Videos/From Problems to Patterns to Practice.mp4 10.9 MB
- USENIX Security 2022/Don't Mesh Around Side-Channel Attacks and Mitigations on Mesh Interconnects.mp4 10.9 MB
- USENIX Security 2021/Collective Information Security in Large-Scale Urban Protests.mp4 10.9 MB
- USENIX Security 2023/Bug Hunters’ Perspectives on the Challenges and Benefits of the Bug Bounty.mp4 10.9 MB
- USENIX Security 2023/FirmSolo Enabling dynamic analysis of binary Linux-based IoT kernel modules.mp4 10.9 MB
- USENIX Security 2023/Auditing Frameworks Need Resource Isolation A Systematic Study on the.mp4 10.9 MB
- USENIX Security 2021/Assessing Browser-level Defense against IDN-based Phishing.mp4 10.9 MB
- USENIX Security 2023/Precise and Generalized Robustness Certification for Neural Networks.mp4 10.9 MB
- USENIX Security 2021/Research on the Security of Visual Reasoning CAPTCHA.mp4 10.9 MB
- USENIX Security 2023/Every Vote Counts Ranking-Based Training of Federated Learning to Resist.mp4 10.9 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Automatic Hot Patch Generation for Android Kernels.mp4 10.9 MB
- USENIX Security 2023/A Plot is Worth a Thousand Words Model Information Stealing Attacks via.mp4 10.9 MB
- USENIX Security 2023/DDRace Finding Concurrency UAF Vulnerabilities in Linux Drivers with.mp4 10.8 MB
- USENIX Security 2023/SHELTER Extending Arm CCA with Isolation in User Space.mp4 10.8 MB
- USENIX Security 2020/PEPR '20/PEPR 20 - Privacy Professional Boss Mode.mp4 10.8 MB
- USENIX Security 2022/ALASTOR Reconstructing the Provenance of Serverless Intrusions.mp4 10.8 MB
- CSET 2020/HAI 1.0 HIL-based Augmented ICS Security Dataset.mp4 10.8 MB
- USENIX Security 2022/GPU-accelerated PIR with Client-Independent Preprocessing for Large-Scale.mp4 10.8 MB
- USENIX Security 2021/Automatic Extraction of Secrets from the Transistor Jungle using.mp4 10.8 MB
- USENIX Security 2023/Gradient Obfuscation Gives a False Sense of Security in Federated Learning.mp4 10.8 MB
- USENIX Security 2023/Evading Provenance-Based ML Detectors with Adversarial System Action.mp4 10.8 MB
- USENIX Security 2021/SLAP Improving Physical Adversarial Examples with Short-Lived Adversarial.mp4 10.8 MB
- USENIX Security 2021/Identifying Harmful Media in End-to-End Encrypted Communication.mp4 10.8 MB
- USENIX Security 2020/USENIX Security 2020 Videos/DeepHammer Depleting the Intelligence of Deep Neural Networks through Target.mp4 10.8 MB
- USENIX Security 2022/Attacks on Deidentification's Defenses.mp4 10.8 MB
- USENIX Security 2020/USENIX Security 2020 Videos/I am uncomfortable sharing what I cant see - Privacy Concerns.mp4 10.8 MB
- USENIX Security 2023/The Gates of Time Improving Cache Attacks with Transient Execution.mp4 10.8 MB
- USENIX Security 2023/All of them claim to be the best - Multi-perspective study of VPN user.mp4 10.8 MB
- USENIX Security 2023/RøB Ransomware over Modern Web Browsers.mp4 10.8 MB
- USENIX Security 2022/Trust Dies in Darkness Shedding Light on Samsung's TrustZone Keymaster Design.mp4 10.7 MB
- USENIX Security 2021/Smart Contract Vulnerabilities Vulnerable Does Not Imply Exploited.mp4 10.7 MB
- USENIX Security 2023/Bypassing Tunnels Leaking VPN Client Traffic by Abusing Routing Tables.mp4 10.7 MB
- USENIX Security 2020/USENIX Security 2020 Videos/McTiny Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers.mp4 10.7 MB
- USENIX Security 2022/DoubleStar Long-Range Attack Towards Depth Estimation based Obstacle.mp4 10.7 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Interpretable Deep Learning under Fire.mp4 10.7 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Simple Password-Hardened Encryption Services.mp4 10.7 MB
- USENIX Security 2023/ZBCAN A Zero-Byte CAN Defense System.mp4 10.7 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Cardpliance PCI DSS Compliance of Android Applications.mp4 10.7 MB
- USENIX Security 2022/PatchCleanser Certifiably Robust Defense against Adversarial Patches.mp4 10.7 MB
- USENIX Security 2023/Security is not my field, I’m a stats guy A Qualitative Root Cause.mp4 10.7 MB
- USENIX Security 2020/ScAINet '20/ScAINet 20 - Optimization for Attack Surface Exploration The Case of TLS.mp4 10.7 MB
- USENIX Security 2023/Eavesdropping Mobile App Activity via Radio-Frequency Energy Harvesting.mp4 10.7 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Drift with Devil Security of Multi-Sensor Fusion based Localization.mp4 10.7 MB
- USENIX Security 2023/Generative Intrusion Detection and Prevention on Data Stream.mp4 10.7 MB
- USENIX Security 2023/A Data-free Backdoor Injection Approach in Neural Networks.mp4 10.7 MB
- USENIX Security 2023/Subverting Website Fingerprinting Defenses with Robust Traffic Representation.mp4 10.7 MB
- USENIX Security 2020/USENIX Security 2020 Videos/The Tools and Tactics Used in Intimate Partner Surveillance An Analysis.mp4 10.7 MB
- USENIX Security 2021/Share First, Ask Later (or Never) Studying Violations of GDPR's Explicit.mp4 10.7 MB
- USENIX Security 2022/Post-Quantum Cryptography with Contemporary Co-Processors Beyond Kronecker,.mp4 10.7 MB
- USENIX Security 2023/Eye-Shield Real-Time Protection of Mobile Device Screen Information from.mp4 10.7 MB
- USENIX Security 2020/USENIX Security 2020 Videos/MIRAGE Succinct Arguments for Randomized Algorithms with Applications.mp4 10.7 MB
- USENIX Security 2023/RIDAS Real-time identification of attack sources on controller area networks.mp4 10.7 MB
- USENIX Security 2023/Discovering Adversarial Driving Maneuvers against Autonomous Vehicles.mp4 10.6 MB
- USENIX Security 2022/GAROTA Generalized Active Root-Of-Trust Architecture.mp4 10.6 MB
- USENIX Security 2023/ELASM Error-Latency-Aware Scale Management for Fully Homomorphic Encryption.mp4 10.6 MB
- USENIX Security 2020/USENIX Security 2020 Videos/A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web.mp4 10.6 MB
- USENIX Security 2023/Pushed by Accident A Mixed-Methods Study on Strategies of Handling Secret.mp4 10.6 MB
- USENIX Security 2022/Poison Forensics Traceback of Data Poisoning Attacks in Neural Networks.mp4 10.6 MB
- USENIX Security 2021/Double-Cross Attacks Subverting Active Learning Systems.mp4 10.6 MB
- USENIX Security 2021/Scalable Detection of Promotional Website Defacements in Black Hat SEO.mp4 10.6 MB
- USENIX Security 2023/FISHFUZZ Catch Deeper Bugs by Throwing Larger Nets.mp4 10.6 MB
- USENIX Security 2023/Erebus Access Control for Augmented Reality Systems.mp4 10.6 MB
- USENIX Security 2023/PhyAuth Physical-Layer Message Authentication for ZigBee Networks.mp4 10.6 MB
- USENIX Security 2021/SyzVegas Beating Kernel Fuzzing Odds with Reinforcement Learning.mp4 10.6 MB
- USENIX Security 2023/Are Consumers Willing to Pay for Security and Privacy of IoT Devices.mp4 10.6 MB
- USENIX Security 2023/POLICYCOMP Counterpart Comparison of Privacy Policies Uncovers.mp4 10.6 MB
- USENIX Security 2023/Not All Data are Created Equal Data and Pointer Prioritization for Scalable..mp4 10.6 MB
- USENIX Security 2021/Privacy-Preserving and Standard-Compatible AKA Protocol for 5G.mp4 10.5 MB
- USENIX Security 2020/USENIX Security 2020 Videos/See No Evil Phishing for Permissions with False Transparency.mp4 10.5 MB
- USENIX Security 2022/Lend Me Your Ear Passive Remote Physical Side Channels on PCs.mp4 10.5 MB
- USENIX Security 2021/Fantastic Four Honest-Majority Four-Party Secure Computation With Malicious.mp4 10.5 MB
- USENIX Security 2020/USENIX Security 2020 Videos/EPIC Every Packet Is Checked in the Data Plane of a Path-Aware Internet.mp4 10.5 MB
- USENIX Security 2020/PEPR '20/PEPR 20 - When Engineers and Lawyers Talk Right-Sizing Your Data Protection Risk Profile.mp4 10.5 MB
- USENIX Security 2022/OS-Aware Vulnerability Prioritization via Differential Severity Analysis.mp4 10.5 MB
- USENIX Security 2021/Are Privacy Dashboards Good for End Users Evaluating User Perceptions.mp4 10.5 MB
- USENIX Security 2022/Orca Blocklisting in Sender-Anonymous Messaging.mp4 10.5 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Shattered Chain of Trust Understanding Security Risks in Cross-Cloud IoT.mp4 10.5 MB
- USENIX Security 2023/The OK Is Not Enough A Large Scale Study of Consent Dialogs in Smartphone.mp4 10.5 MB
- USENIX Security 2023/HECO Fully Homomorphic Encryption Compiler.mp4 10.5 MB
- USENIX Security 2023/Hiding in Plain Sight An Empirical Study of Web Application Abuse in Malware.mp4 10.5 MB
- USENIX Security 2021/Hiding the Access Pattern is Not Enough Exploiting Search Pattern Leakage.mp4 10.5 MB
- USENIX Security 2023/Tight Auditing of Differentially Private Machine Learning.mp4 10.5 MB
- USENIX Security 2020/USENIX Security 2020 Videos/SENG, the SGX-Enforcing Network Gateway Authorizing Communication.mp4 10.5 MB
- USENIX Security 2023/Sneaky Spy Devices and Defective Detectors The Ecosystem of Intimate.mp4 10.5 MB
- USENIX Security 2021/Experiences Deploying Multi-Vantage-Point Domain Validation at Let's Encrypt.mp4 10.5 MB
- USENIX Security 2021/VScape Assessing and Escaping Virtual Call Protections.mp4 10.5 MB
- USENIX Security 2022/Holistic Control-Flow Protection on Real-Time Embedded Systems with Kage.mp4 10.5 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Secure Multi-party Computation of Differentially Private Median.mp4 10.5 MB
- USENIX Security 2022/Leaky Forms A Study of Email and Password Exfiltration Before Form Submission.mp4 10.5 MB
- USENIX Security 2022/Communication-Efficient Triangle Counting under Local Differential Privacy.mp4 10.5 MB
- USENIX Security 2023/HorusEye A Realtime IoT Malicious Traffic Detection Framework using.mp4 10.5 MB
- USENIX Security 2023/Anatomy of a High-Profile Data Breach Dissecting the Aftermath of a Crypto.mp4 10.5 MB
- USENIX Security 2022/PISTIS Trusted Computing Architecture for Low-end Embedded Systems.mp4 10.5 MB
- USENIX Security 2022/Expected Exploitability Predicting the Development of Functional.mp4 10.4 MB
- USENIX Security 2023/Pass2Edit A Multi-Step Generative Model for Guessing Edited Passwords.mp4 10.4 MB
- USENIX Security 2020/USENIX Security 2020 Videos/PCKV Locally Differentially Private Correlated Key-Value Data Collection.mp4 10.4 MB
- USENIX Security 2021/Blinder Partition-Oblivious Hierarchical Scheduling.mp4 10.4 MB
- USENIX Security 2023/Powering Privacy On the Energy Demand and Feasibility of Anonymity.mp4 10.4 MB
- USENIX Security 2023/GigaDORAM Breaking the Billion Address Barrier.mp4 10.4 MB
- USENIX Security 2023/How Effective is Multiple-Vantage-Point Domain Control Validation.mp4 10.4 MB
- USENIX Security 2021/MPInspector A Systematic and Automatic Approach for Evaluating the Security.mp4 10.4 MB
- USENIX Security 2021/Virtual Secure Platform A Five-Stage Pipeline Processor over TFHE.mp4 10.4 MB
- USENIX Security 2023/GlitchHiker Uncovering Vulnerabilities of Image Signal Transmission with IEMI.mp4 10.4 MB
- USENIX Security 2022/Oops Code Execution and Content Spoofing The First Comprehensive Analysis.mp4 10.4 MB
- USENIX Security 2023/Beyond The Gates An Empirical Analysis of HTTP-Managed Password Stealers.mp4 10.4 MB
- FOCI 2020/Slitheen Stealth TLS-based Decoy Routing.mp4 10.4 MB
- USENIX Security 2021/CURE A Security Architecture with CUstomizable and Resilient Enclaves.mp4 10.4 MB
- USENIX Security 2023/Framing Frames Bypassing Wi-Fi Encryption by Manipulating Transmit Queues.mp4 10.4 MB
- USENIX Security 2023/ClepsydraCache - Preventing Cache Attacks with Time-Based Evictions.mp4 10.4 MB
- USENIX Security 2020/USENIX Security 2020 Videos/FANS Fuzzing Android Native System Services via Automated Interface Analysis.mp4 10.4 MB
- USENIX Security 2022/The Dangers of Human Touch Fingerprinting Browser Extensions through.mp4 10.4 MB
- USENIX Security 2023/My Privacy for their Security - Employees' Privacy Perspectives and.mp4 10.4 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Devil’s Whisper A General Approach for Physical Adversarial Attacks.mp4 10.4 MB
- USENIX Security 2020/USENIX Security 2020 Videos/SANNS Scaling Up Secure Approximate k-Nearest Neighbors Search.mp4 10.4 MB
- USENIX Security 2022/Security at the End of the Tunnel The Anatomy of VPN Mental Models Among.mp4 10.4 MB
- USENIX Security 2023/An Input-Agnostic Hierarchical Deep Learning Framework for Traffic.mp4 10.3 MB
- USENIX Security 2022/Bedrock Programmable Network Support for Secure RDMA Systems.mp4 10.3 MB
- USENIX Security 2022/The Same PIN, Just Longer - On the (In)Security of Upgrading PINs from 4 to.mp4 10.3 MB
- USENIX Security 2020/USENIX Security 2020 Videos/him Shimmeny Evaluating the Security & Privacy Contributions of Link Shimming.mp4 10.3 MB
- USENIX Security 2014/USENIX Security 2014 Opening Remarks - sec14_slides_fu.pdf 10.3 MB
- CSET 2020/ICS Testbed Tetris Practical Building Blocks Towards a Cyber Security Resource.mp4 10.3 MB
- USENIX Security 2023/Extracting Training Data from Diffusion Models.mp4 10.3 MB
- USENIX Security 2023/Automated Cookie Notice Analysis and Enforcement.mp4 10.3 MB
- USENIX Security 2021/Dynamic proofs of retrievability with low server storage.mp4 10.3 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Chaperone Real-time Locking and Loss Prevention for Smartphones.mp4 10.3 MB
- USENIX Security 2021/SEApp Bringing Mandatory Access Control to Android Apps.mp4 10.3 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Liveness is Not Enough Enhancing Fingerprint Authentication with Behavioral.mp4 10.3 MB
- USENIX Security 2023/Every Signature is Broken On the Insecurity of Microsoft Office’s OOXML.mp4 10.3 MB
- USENIX Security 2022/Many Roads Lead To Rome How Packet Headers Influence DNS Censorship.mp4 10.3 MB
- USENIX Security 2022/OK, Siri - or - Hey, Google - Evaluating Voiceprint Distinctiveness via.mp4 10.3 MB
- USENIX Security 2023/Fourteen Years in the Life A Root Server’s Perspective on DNS Resolve.mp4 10.3 MB
- USENIX Security 2023/FreeEagle Detecting Complex Neural Trojans in Data-Free Cases.mp4 10.3 MB
- USENIX Security 2023/ProSpeCT Provably Secure Speculation for the Constant-Time Policy.mp4 10.3 MB
- USENIX Security 2023/PCAT Functionality and Data Stealing from Split Learning by Pseudo-Client.mp4 10.3 MB
- USENIX Security 2023/Extracting Protocol Format as State Machine via Controlled Static Loop.mp4 10.3 MB
- USENIX Security 2020/CSET '20/CSET 20 - ICS Testbed Tetris Practical Building Blocks Towards a Cyber Security Resource.mp4 10.3 MB
- USENIX Security 2023/Going through the motions AR VR keylogging from user head motions.mp4 10.3 MB
- USENIX Security 2023/Guarding Serverless Applications with Kalium.mp4 10.3 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Void A fast and light voice liveness detection system.mp4 10.3 MB
- USENIX Security 2021/Constrain't-guided Directed Greybox Fuzzing.mp4 10.2 MB
- USENIX Security 2022/Pool Inference Attacks on Local Differential Privacy.mp4 10.2 MB
- USENIX Security 2023/Device Tracking via Linux’s New TCP Source Port Selection Algorithm.mp4 10.2 MB
- USENIX Security 2018/USENIX Security 2018 Videos/Schrödinger's RAT - Profiling the Stakeholders in the Remote Access Trojan Ecosystem.mp4 10.2 MB
- USENIX Security 2022/Mining Node.js Vulnerabilities via Object Dependence Graph and Query.mp4 10.2 MB
- USENIX Security 2020/USENIX Security 2020 Videos/TPM-FAIL TPM meets Timing and Lattice Attacks.mp4 10.2 MB
- USENIX Security 2022/Rapid Prototyping for Microarchitectural Attacks.mp4 10.2 MB
- USENIX Security 2023/Distance-Aware Private Set Intersection.mp4 10.2 MB
- USENIX Security 2021/Blind Backdoors in Deep Learning Models.mp4 10.2 MB
- USENIX Security 2023/One Size Does not Fit All Quantifying the Risk of Malicious App Encounters.mp4 10.2 MB
- USENIX Security 2023/MorFuzz Fuzzing Processor via Runtime Instruction Morphing enhanced.mp4 10.2 MB
- USENIX Security 2023/V1SCAN Discovering 1-day Vulnerabilities in Reused C C Open-source.mp4 10.2 MB
- USENIX Security 2020/USENIX Security 2020 Videos/HALucinator Firmware Re-hosting Through Abstraction Layer Emulation.mp4 10.2 MB
- USENIX Security 2023/One Server for the Price of Two Simple and Fast Single-Server Private.mp4 10.2 MB
- USENIX Security 2022/Binoculars Contention-Based Side-Channel Attacks Exploiting the Page Walker.mp4 10.2 MB
- USENIX Security 2023/Did the Shark Eat the Watchdog in the NTP Pool Deceiving the NTP Pool’s.mp4 10.2 MB
- USENIX Security 2022/Transferring Adversarial Robustness Through Robust Representation Matching.mp4 10.2 MB
- USENIX Security 2021/Fingerprinting in Style Detecting Browser Extensions via Injected Style.mp4 10.2 MB
- USENIX Security 2022/CamShield Securing Smart Cameras through Physical Replication and Isolation.mp4 10.2 MB
- USENIX Security 2022/How Long Do Vulnerabilities Live in the Code A Large-Scale Empirical.mp4 10.1 MB
- USENIX Security 2023/The Most Dangerous Codec in the World Finding and Exploiting.mp4 10.1 MB
- USENIX Security 2021/ReDMArk Bypassing RDMA Security Mechanisms.mp4 10.1 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Towards HTTPS Everywhere on Android We Are Not There Yet.mp4 10.1 MB
- USENIX Security 2023/AnimateDead Debloating Web Applications Using Concolic Execution.mp4 10.1 MB
- USENIX Security 2023/Adversarial Training for Raw-Binary Malware Classifiers.mp4 10.1 MB
- USENIX Security 2020/USENIX Security 2020 Videos/RELOADREFRESH Abusing Cache Replacement Policies to Perform Stealthy Cache.mp4 10.1 MB
- USENIX Security 2023/Millions of people are watching you Understanding the Digital-Safety.mp4 10.1 MB
- USENIX Security 2023/Confusum Contractum Confused Deputy Vulnerabilities in Ethereum Smart.mp4 10.1 MB
- USENIX Security 2020/USENIX Security 2020 Videos/An Observational Investigation of Reverse Engineers’ Processes.mp4 10.1 MB
- USENIX Security 2022/Empirical Understanding of Deletion Privacy Experiences, Expectations, and.mp4 10.1 MB
- USENIX Security 2023/MobileAtlas Geographically Decoupled Measurements in Cellular Networks for.mp4 10.1 MB
- USENIX Security 2021/Saphire Sandboxing PHP Applications with Tailored System Call Allowlists.mp4 10.1 MB
- USENIX Security 2021/Mind Your Weight(s) A Large-scale Study on Insufficient Machine Learning.mp4 10.1 MB
- USENIX Security 2023/Panda Security Analysis of Algorand Smart Contracts.mp4 10.1 MB
- USENIX Security 2023/You've Got Report Measurement and Security Implications of DMARC Reporting.mp4 10.1 MB
- USENIX Security 2022/Practical Privacy-Preserving Authentication for SSH.mp4 10.1 MB
- USENIX Security 2023/Detecting Union Type Confusion in Component Object Model.mp4 10.1 MB
- USENIX Security 2022/Khaleesi Breaker of Advertising and Tracking Request Chains.mp4 10.1 MB
- USENIX Security 2020/USENIX Security 2020 Videos/SpecFuzz Bringing Spectre-type vulnerabilities to the surface.mp4 10.1 MB
- USENIX Security 2021/How Great is the Great Firewall Measuring China's DNS Censorship.mp4 10.1 MB
- USENIX Security 2020/PEPR '20/PEPR 20 - Product Privacy Journey Towards a Product Centric Privacy Engineering Framework.mp4 10.0 MB
- USENIX Security 2023/Downgrading DNSSEC How to Exploit Crypto Agility for Hijacking Signed Zones.mp4 10.0 MB
- USENIX Security 2022/AutoDA Automated Decision-based Iterative Adversarial Attacks.mp4 10.0 MB
- USENIX Security 2022/Breaking Bridgefy, again Adopting libsignal is not enough.mp4 10.0 MB
- USENIX Security 2023/Account Security Interfaces Important, Unintuitive, and Untrustworth.mp4 10.0 MB
- USENIX Security 2023/LightThief Your Optical Communication Information is Stolen behind the Wall.mp4 10.0 MB
- USENIX Security 2020/CSET '20/CSET 20 - Bridging Missing Gaps in Evaluating DDoS Research.mp4 10.0 MB
- USENIX Security 2021/SandTrap Securing JavaScript-driven Trigger-Action Platforms.mp4 10.0 MB
- USENIX Security 2021/Sharing More and Checking Less Leveraging Common Input Keywords to Detect.mp4 10.0 MB
- USENIX Security 2022/Characterizing the Security of Github CI Workflows.mp4 10.0 MB
- USENIX Security 2022/Private Signaling.mp4 10.0 MB
- USENIX Security 2023/Wink Deniable Secure Messaging.mp4 10.0 MB
- USENIX Security 2023/Araña Discovering and Characterizing Password Guessing Attacks in Practice.mp4 10.0 MB
- USENIX Security 2023/Knowledge Expansion and Counterfactual Interaction for Reference-Based.mp4 10.0 MB
- USENIX Security 2021/Searching Encrypted Data with Size-Locked Indexes.mp4 10.0 MB
- USENIX Security 2022/Caring about Sharing User Perceptions of Multiparty Data Sharing.mp4 10.0 MB
- USENIX Security 2021/Defeating DNN-Based Traffic Analysis Systems in Real-Time With Blind.mp4 10.0 MB
- USENIX Security 2022/Hiding in Plain Sight On the Efficacy of Power Side Channel-Based Control.mp4 10.0 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/On the Effective Prevention of TLS Man-in-the-Middle Attacks in Web Applications Slides - Nikolaos Karapanos and Srdjan Capkun.pdf 10.0 MB
- USENIX Security 2021/Driving 2FA Adoption at Scale Optimizing Two-Factor Authentication.mp4 10.0 MB
- USENIX Security 2022/Branch History Injection On the Effectiveness of Hardware Mitigations.mp4 10.0 MB
- USENIX Security 2022/PolyCruise A Cross-Language Dynamic Information Flow Analysis.mp4 10.0 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Justinians GAAvernor Robust Distributed Learning with Gradient Aggregation.mp4 10.0 MB
- USENIX Security 2022/Efficient Differentially Private Secure Aggregation for Federated Learning.mp4 10.0 MB
- USENIX Security 2021/UNIFUZZ A Holistic and Pragmatic Metrics-Driven Platform for Evaluating.mp4 9.9 MB
- USENIX Security 2022/QCSD A QUIC Client-Side Website-Fingerprinting Defence Framework.mp4 9.9 MB
- USENIX Security 2023/Exploring the Unknown DTLS Universe Analysis of the DTLS Server Ecosystem.mp4 9.9 MB
- USENIX Security 2023/Two-in-One A Model Hijacking Attack Against Text Generation Models.mp4 9.9 MB
- USENIX Security 2022/The Security Lottery Measuring Client-Side Web Security Inconsistencies.mp4 9.9 MB
- USENIX Security 2023/It's all in your head(set) Side-channel attacks on AR VR systems.mp4 9.9 MB
- USENIX Security 2023/Othered, Silenced and Scapegoated Understanding the Situated Security of.mp4 9.9 MB
- USENIX Security 2023/Capstone A Capability-based Foundation for Trustless Secure Memory Access.mp4 9.9 MB
- USENIX Security 2023/Exploring Privacy and Incentives Considerations in Adoption of COVID-19.mp4 9.9 MB
- USENIX Security 2021/PhishPrint Evading Phishing Detection Crawlers by Prior Profiling.mp4 9.9 MB
- USENIX Security 2021/Stars Can Tell A Robust Method to Defend against GPS Spoofing Attacks.mp4 9.9 MB
- USENIX Security 2021/Now I'm a bit angry - Individuals' Awareness, Perception, and Responses.mp4 9.9 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Plug-N-Pwned Comprehensive Vulnerability Analysis of OBD-II Dongles.mp4 9.9 MB
- USENIX Security 2023/NVLeak Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems.mp4 9.9 MB
- USENIX Security 2021/Rage Against the Machine Clear A Systematic Analysis of Machine Clears.mp4 9.9 MB
- USENIX Security 2022/Playing Without Paying Detecting Vulnerable Payment Verification in Native.mp4 9.9 MB
- USENIX Security 2023/Automated Exploitable Heap Layout Generation for Heap Overflows Through.mp4 9.9 MB
- USENIX Security 2022/RegexScalpel Regular Expression Denial of Service (ReDoS) Defense by.mp4 9.9 MB
- USENIX Security 2022/Debloating Address Sanitizer.mp4 9.9 MB
- USENIX Security 2020/USENIX Security 2020 Videos/EcoFuzz Adaptive Energy-Saving Greybox Fuzzing as a Variant.mp4 9.9 MB
- USENIX Security 2021/MIRAGE Mitigating Conflict-Based Cache Attacks with a Practical.mp4 9.9 MB
- USENIX Security 2021/V0Finder Discovering the Correct Origin of Publicly Reported Software.mp4 9.9 MB
- USENIX Security 2021/Adapting Security Warnings to Counter Online Disinformation.mp4 9.9 MB
- USENIX Security 2022/I feel invaded, annoyed, anxious and I may protect myself.mp4 9.9 MB
- USENIX Security 2023/xNIDS Explaining Deep Learning-based Network Intrusion Detection Systems.mp4 9.9 MB
- USENIX Security 2023/Timeless Timing Attacks and Preload Defenses in Tor's DNS Cache.mp4 9.8 MB
- USENIX Security 2023/Eos Efficient Private Delegation of zkSNARK Provers.mp4 9.8 MB
- USENIX Security 2023/Password Guessing Using Random Forest.mp4 9.8 MB
- USENIX Security 2022/They Look at Vulnerability and Use That to Abuse You.mp4 9.8 MB
- USENIX Security 2023/Hoedur Embedded Firmware Fuzzing using Multi-Stream Inputs.mp4 9.8 MB
- USENIX Security 2021/VoltPillager Hardware-based fault injection attacks against Intel SGX Enclaves.mp4 9.8 MB
- USENIX Security 2023/Multiview Finding Blind Spots in Access-Deny Issues Diagnosis.mp4 9.8 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Big Numbers - Big Troubles Systematically Analyzing Nonce Leakage in (EC)DSA.mp4 9.8 MB
- USENIX Security 2022/Secure Poisson Regression.mp4 9.8 MB
- USENIX Security 2022/Understanding and Improving Usability of Data Dashboards for Simplified.mp4 9.8 MB
- USENIX Security 2023/A Two-Decade Retrospective Analysis of a University's Vulnerability to.mp4 9.8 MB
- USENIX Security 2012/USENIX Security 2012 Presentations/Babel Leveraging Email Delivery for Spam Mitigation Slides - Gianluca Stringhini, Manuel Egele, Apostolis Zarras, Thorsten Holz, Christopher Kruegel, Giovanni Vigna.pdf 9.8 MB
- CSET 2020/Bridging Missing Gaps in Evaluating DDoS Research.mp4 9.8 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Walking Onions Scaling Anonymity Networks while Protecting Users.mp4 9.8 MB
- USENIX Security 2023/Abuse Vectors A Framework for Conceptualizing IoT-Enabled Interpersonal Abuse.mp4 9.8 MB
- USENIX Security 2023/Forming Faster Firmware Fuzzers.mp4 9.8 MB
- USENIX Security 2021/WaveGuard Understanding and Mitigating Audio Adversarial Examples.mp4 9.8 MB
- USENIX Security 2023/Measuring Up to (Reasonable) Consumer Expectations Providing an Empirical.mp4 9.8 MB
- USENIX Security 2021/Graph Backdoor.mp4 9.8 MB
- USENIX Security 2021/Protecting Cryptography Against Compelled Self-Incrimination.mp4 9.8 MB
- USENIX Security 2021/PASAN Detecting Peripheral Access Concurrency Bugs within Bare-Metal.mp4 9.8 MB
- USENIX Security 2023/UnGANable Defending Against GAN-based Face Manipulation.mp4 9.8 MB
- USENIX Security 2023/AURC Detecting Errors in Program Code and Documentation.mp4 9.8 MB
- USENIX Security 2023/BASECOMP A Comparative Analysis for Integrity Protection in Cellular.mp4 9.7 MB
- USENIX Security 2021/Breaking Through Binaries Compiler-quality Instrumentation for Better.mp4 9.7 MB
- USENIX Security 2023/Internet Service Providers' and Individuals' Attitudes, Barriers, and.mp4 9.7 MB
- USENIX Security 2023/SAFER Efficient and Error-Tolerant Binary Instrumentation.mp4 9.7 MB
- USENIX Security 2023/Continuous Learning for Android Malware Detection.mp4 9.7 MB
- USENIX Security 2023/Educators’ Perspectives of Using (or Not Using) Online Exam Proctoring.mp4 9.7 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Cached and Confused Web Cache Deception in the Wild.mp4 9.7 MB
- USENIX Security 2023/Linear Private Set Union from Multi-Query Reverse Private Membership Test.mp4 9.7 MB
- USENIX Security 2023/Investigating Verification Behavior and Perceptions of Visual Digital.mp4 9.7 MB
- USENIX Security 2022/Creating a Secure Underlay for the Internet.mp4 9.7 MB
- USENIX Security 2023/Jinn Hijacking Safe Programs with Trojans.mp4 9.7 MB
- USENIX Security 2021/PACStack an Authenticated Call Stack.mp4 9.7 MB
- USENIX Security 2023/GLeeFuzz Fuzzing WebGL Through Error Message Guided Mutation.mp4 9.7 MB
- USENIX Security 2020/USENIX Security 2020 Videos/who's Calling Characterizing Robocalls through Audio and Metadata Analysis.mp4 9.7 MB
- USENIX Security 2023/WHIP Improving Static Vulnerability Detection in Web Application by.mp4 9.7 MB
- USENIX Security 2023/Detecting Multi-Step IAM Attacks in AWS Environments via Model Checking.mp4 9.7 MB
- USENIX Security 2022/Hidden Trigger Backdoor Attack on NLP Models via Linguistic Style Manipulation.mp4 9.7 MB
- USENIX Security 2023/How fast do you heal A taxonomy for post-compromise security in.mp4 9.7 MB
- USENIX Security 2021/Charger-Surfing Exploiting a Power Line Side-Channel for Smartphone.mp4 9.7 MB
- USENIX Security 2023/Private Proof-of-Stake Blockchains using Differentially-Private Stake.mp4 9.7 MB
- USENIX Security 2023/High Recovery with Fewer Injections Practical Binary Volumetric Injection.mp4 9.7 MB
- USENIX Security 2022/MOVERY A Precise Approach for Modified Vulnerable Code Clone Discovery from.mp4 9.7 MB
- USENIX Security 2023/Spying through Your Voice Assistants Realistic Voice Command Fingerprinting.mp4 9.7 MB
- USENIX Security 2023/Lalaine Measuring and Characterizing Non-Compliance of Apple Privacy Labels.mp4 9.7 MB
- USENIX Security 2021/Minerva- An Efficient Risk-Limiting Ballot Polling Audit.mp4 9.7 MB
- USENIX Security 2022/Stick It to The Man Correcting for Non-Cooperative Behavior of Subjects in.mp4 9.7 MB
- USENIX Security 2021/Exposing New Vulnerabilities of Error Handling Mechanism in CAN.mp4 9.7 MB
- USENIX Security 2021/ReDoSHunter A Combined Static and Dynamic Approach for Regular Expression DoS.mp4 9.6 MB
- USENIX Security 2023/Can a Deep Learning Model for One Architecture Be Used for Others.mp4 9.6 MB
- FOCI 2020/Padding Ain't Enough Assessing the Privacy Guarantees of Encrypted DNS.mp4 9.6 MB
- USENIX Security 2023/Security and Privacy Failures in Popular 2FA Apps.mp4 9.6 MB
- USENIX Security 2023/No more Reviewer #2 Subverting Automatic Paper-Reviewer Assignment using.mp4 9.6 MB
- USENIX Security 2023/Examining Consumer Reviews to Understand Security and Privacy Issues in the.mp4 9.6 MB
- USENIX Security 2022/ML-Doctor Holistic Risk Assessment of Inference Attacks Against Machine.mp4 9.6 MB
- USENIX Security 2023/Back to School On the (In)Security of Academic VPNs.mp4 9.6 MB
- USENIX Security 2021/The Role of Computer Security Customer Support in Helping Survivors.mp4 9.6 MB
- USENIX Security 2023/Powering for Privacy Improving User Trust in Smart Speaker Microphones with..mp4 9.6 MB
- USENIX Security 2023/EnigMap External-Memory Oblivious Map for Secure Enclaves.mp4 9.6 MB
- USENIX Security 2023/AlphaEXP An Expert System for Identifying Security-Sensitive Kernel Objects.mp4 9.6 MB
- USENIX Security 2021/Domain Shadowing Leveraging Content Delivery Networks for Robust Blocking.mp4 9.6 MB
- USENIX Security 2022/V'CER Efficient Certificate Validation in Constrained Networks.mp4 9.6 MB
- USENIX Security 2023/The Impostor Among US(B) Off-Path Injection Attacks on USB Communications.mp4 9.6 MB
- USENIX Security 2021/ICSFuzz Manipulating I Os and Repurposing Binary Code to Enable Instrumented.mp4 9.6 MB
- USENIX Security 2021/Ripple A Programmable, Decentralized Link-Flooding Defense Against Adaptive.mp4 9.6 MB
- USENIX Security 2022/Lumos Identifying and Localizing Diverse Hidden IoT Devices.mp4 9.6 MB
- USENIX Security 2022/ppSAT Towards Two-Party Private SAT Solving.mp4 9.6 MB
- USENIX Security 2022/Hand Me Your PIN Inferring ATM PINs of Users Typing with a Covered Hand.mp4 9.6 MB
- USENIX Security 2020/USENIX Security 2020 Videos/KOOBE Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write.mp4 9.6 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/On the Feasibility of Large-Scale Infections of iOS Devices Slides - Tielei Wang, Yeongjin Jang, Yizheng Chen, Simon Chung, Billy Lau, Wenke Lee tielei.pdf 9.6 MB
- USENIX Security 2023/Design of Access Control Mechanisms in Systems-on-Chip with Formal.mp4 9.6 MB
- USENIX Security 2023/CollidePower Leaking Inaccessible Data with Software-based Power Side.mp4 9.6 MB
- USENIX Security 2020/USENIX Security 2020 Videos/CopyCat Controlled Instruction-Level Attacks on Enclaves.mp4 9.6 MB
- USENIX Security 2023/Lost at C A User Study on the Security Implications of Large Language Model..mp4 9.6 MB
- USENIX Security 2021/Fragment and Forge Breaking Wi-Fi Through Frame Aggregation and Fragmentation.mp4 9.5 MB
- USENIX Security 2008/USENIX Security 2008 Videos/Lest We Remember Cold Boot Attacks on Encryption Keys - J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ariel J. Feldman.opus 9.5 MB
- USENIX Security 2021/Dompteur Taming Audio Adversarial Examples.mp4 9.5 MB
- USENIX Security 2021/YARIX Scalable YARA-based Malware Intelligence.mp4 9.5 MB
- USENIX Security 2021/A Highly Accurate Query-Recovery Attack against Searchable Encryption.mp4 9.5 MB
- USENIX Security 2023/BoKASAN Binary-only Kernel Address Sanitizer for Effective Kernel Fuzzing.mp4 9.5 MB
- USENIX Security 2023/Extending a Hand to Attackers Browser Privilege Escalation Attacks via.mp4 9.5 MB
- FOCI 2020/Triplet Censors Demystifying Great Firewall’s DNS Censorship Behavior.mp4 9.5 MB
- USENIX Security 2023/I wouldn't want my unsafe code to run my pacemaker An Interview Study on.mp4 9.5 MB
- USENIX Security 2023/Formal Analysis and Patching of BLE-SC Pairing.mp4 9.5 MB
- USENIX Security 2022/Stateful Greybox Fuzzing.mp4 9.5 MB
- USENIX Security 2023/Watch your Watch Inferring Personality Traits from Wearable Activity Trackers.mp4 9.5 MB
- USENIX Security 2022/Why Users (Don't) Use Password Managers at a Large Educational Institution.mp4 9.5 MB
- USENIX Security 2023/How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic.mp4 9.5 MB
- USENIX Security 2023/An Empirical Study & Evaluation of Modern CAPTCHAs.mp4 9.5 MB
- USENIX Security 2023/Towards Targeted Obfuscation of Adversarial Unsafe Images using.mp4 9.5 MB
- FOCI 2020/A Comprehensive Study of DNS-over-HTTPS Downgrade Attack.mp4 9.5 MB
- USENIX Security 2023/A Bug's Life Analyzing the Lifecycle and Mitigation Process of Content.mp4 9.5 MB
- USENIX Security 2022/QuORAM A Quorum-Replicated Fault Tolerant ORAM Datastore.mp4 9.5 MB
- USENIX Security 2022/GET - out Automated Discovery of Application-Layer Censorship Evasion.mp4 9.5 MB
- USENIX Security 2021/Extracting Training Data from Large Language Models.mp4 9.5 MB
- USENIX Security 2023/Person Re-identification in 3D Space A WiFi Vision-based Approach.mp4 9.5 MB
- USENIX Security 2021/Why Eve and Mallory Still Love Android Revisiting TLS (In)Security in Android.mp4 9.5 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Automating the Development of Chosen Ciphertext Attacks.mp4 9.5 MB
- USENIX Security 2023/If I could do this, I feel anyone could - The Design and Evaluation.mp4 9.5 MB
- USENIX Security 2023/Rethinking White-Box Watermarks on Deep Learning Models under Neural.mp4 9.5 MB
- USENIX Security 2023/In the Quest to Protect Users from Side-Channel Attacks - A User-Centred.mp4 9.5 MB
- USENIX Security 2021/GForce GPU-Friendly Oblivious and Rapid Neural Network Inference.mp4 9.5 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Security Analysis of Unified Payments Interface and Payment Apps in India.mp4 9.5 MB
- USENIX Security 2022/Neither Access nor Control A Longitudinal Investigation of the Efficacy.mp4 9.5 MB
- USENIX Security 2022/Watching the watchers bias and vulnerability in remote proctoring software.mp4 9.4 MB
- USENIX Security 2023/User Awareness and Behaviors Concerning Encrypted DNS Settings in Web Browsers.mp4 9.4 MB
- USENIX Security 2022/Shuffle-based Private Set Union Faster and More Secure.mp4 9.4 MB
- USENIX Security 2023/Trojan Source Invisible Vulnerabilities.mp4 9.4 MB
- USENIX Security 2020/USENIX Security 2020 Videos/An Ever-evolving Game Evaluation of Real-world Attacks and Defenses.mp4 9.4 MB
- USENIX Security 2023/PolyFuzz Holistic Greybox Fuzzing of Multi-Language Systems.mp4 9.4 MB
- USENIX Security 2023/On the Security Risks of Knowledge Graph Reasoning.mp4 9.4 MB
- USENIX Security 2023/Content-Type multipart oracle - Tapping into Format Oracles in Email.mp4 9.4 MB
- USENIX Security 2023/How to Bind Anonymous Credentials to Humans.mp4 9.4 MB
- USENIX Security 2022/Identity Confusion in WebView-based Mobile App-in-app Ecosystems.mp4 9.4 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Pixel Multi-signatures for Consensus.mp4 9.4 MB
- USENIX Security 2021/Phishpedia A Hybrid Deep Learning Based Approach to Visually Identify.mp4 9.4 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Timeless Timing Attacks Exploiting Concurrency to Leak Secrets over Remote.mp4 9.4 MB
- USENIX Security 2023/Glowing in the Dark Uncovering IPv6 Address Discovery and Scanning.mp4 9.4 MB
- USENIX Security 2023/V-Cloak Intelligibility-, Naturalness- & Timbre-Preserving Real-Time Voice.mp4 9.4 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Sys A Static Symbolic Tool for Finding Good Bugs in Good (Browser) Code.mp4 9.4 MB
- USENIX Security 2022/A Hardware-Software Co-design for Efficient Intra-Enclave Isolation.mp4 9.4 MB
- USENIX Security 2021/Finding Bugs Using Your Own Code Detecting Functionally-similar yet.mp4 9.4 MB
- USENIX Security 2021/Locally Differentially Private Analysis of Graph Statistics.mp4 9.4 MB
- USENIX Security 2022/Seeing is Living Rethinking the Security of Facial Liveness Verification.mp4 9.4 MB
- USENIX Security 2023/What Are the Chances Explaining the Epsilon Parameter in Differential Privacy.mp4 9.4 MB
- USENIX Security 2022/Inferring Phishing Intention via Webpage Appearance and Dynamics.mp4 9.4 MB
- USENIX Security 2023/It's the Equivalent of Feeling Like You're in Jail Lessons from Firsthand..mp4 9.4 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Medusa Microarchitectural Data Leakage via Automated Attack Synthesis.mp4 9.4 MB
- USENIX Security 2023/A Large-Scale Measurement of Website Login Policies.mp4 9.4 MB
- USENIX Security 2022/A Large-scale Investigation into Geodifferences in Mobile Apps.mp4 9.4 MB
- USENIX Security 2011/USENIX Security 2011 Presentations/Forensic Triage for Mobile Phones with DEC0DE Slides - Robert J. Walls, Erik Learned-Miller, and Brian Neil Levine.pdf 9.4 MB
- USENIX Security 2021/Lord of the Ring(s) Side Channel Attacks on the CPU On-Chip Ring.mp4 9.4 MB
- USENIX Security 2023/PTW Pivotal Tuning Watermarking for Pre-Trained Image Generators.mp4 9.4 MB
- USENIX Security 2022/Poisoning Attacks to Local Differential Privacy Protocols for Key-Value Data.mp4 9.4 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Updates-Leak Data Set Inference and Reconstruction Attacks in Online Learning.mp4 9.4 MB
- USENIX Security 2023/SCARF - A Low-Latency Block Cipher for Secure Cache-Randomization.mp4 9.4 MB
- USENIX Security 2022/Themis Accelerating the Detection of Route Origin Hijacking by Distinguishing.mp4 9.3 MB
- USENIX Security 2022/Double Trouble Combined Heterogeneous Attacks on Non-Inclusive Cache.mp4 9.3 MB
- USENIX Security 2020/FOCI '20/FOCI 20 - Detecting and Evading Censorship-in-Depth A Case Study of Iran’s Protocol Whitelister.mp4 9.3 MB
- USENIX Security 2021/mID Tracing Screen Photos via Moiré Patterns.mp4 9.3 MB
- USENIX Security 2022/Helping hands Measuring the impact of a large threat intelligence sharing.mp4 9.3 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Fawkes Protecting Privacy against Unauthorized Deep Learning Models.mp4 9.3 MB
- USENIX Security 2023/QFA2SR Query-Free Adversarial Transfer Attacks to Speaker Recognition Systems.mp4 9.3 MB
- USENIX Security 2023/Hard-label Black-box Universal Adversarial Patch Attack.mp4 9.3 MB
- USENIX Security 2011/USENIX Security 2011 Presentations/The Phantom Tollbooth Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion Slides - Sarah Meiklejohn, Keaton Mowery, Stephen Checkoway.pdf 9.3 MB
- USENIX Security 2020/USENIX Security 2020 Videos/DELF Safeguarding deletion correctness in Online Social Networks.mp4 9.3 MB
- USENIX Security 2021/PolyScope Multi-Policy Access Control Analysis to Compute Authorized Attack.mp4 9.3 MB
- USENIX Security 2023/The Digital-Safety Risks of Financial Technologies for Survivors of.mp4 9.3 MB
- USENIX Security 2022/VerLoc Verifiable Localization in Decentralized Systems.mp4 9.3 MB
- USENIX Security 2022/Total Eclipse of the Heart - Disrupting the InterPlanetary File System.mp4 9.3 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Estonian Electronic Identity Card Security Flaws in Key Management.mp4 9.3 MB
- USENIX Security 2023/Silent Bugs Matter A Study of Compiler-Introduced Security Bugs.mp4 9.3 MB
- USENIX Security 2022/Tightly Seal Your Sensitive Pointers with PACTight.mp4 9.3 MB
- USENIX Security 2022/SARA Secure Android Remote Authorization.mp4 9.3 MB
- USENIX Security 2022/Teacher Model Fingerprinting Attacks Against Transfer Learning.mp4 9.3 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Cache Telepathy Leveraging Shared Resource Attacks to Learn DNN Architectures.mp4 9.3 MB
- USENIX Security 2023/Automated Analysis of Protocols that use Authenticated Encryption How.mp4 9.3 MB
- USENIX Security 2022/How Are Your Zombie Accounts Understanding Users' Practices & Expectations.mp4 9.3 MB
- USENIX Security 2021/HAWatcher Semantics-Aware Anomaly Detection for Appified Smart Homes.mp4 9.3 MB
- USENIX Security 2023/µFUZZ Redesign of Parallel Fuzzing using Microservice Architecture.mp4 9.3 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Fuzzing Error Handling Code using Context-Sensitive Software Fault Injection.mp4 9.3 MB
- USENIX Security 2021/Accurately Measuring Global Risk of Amplification Attacks using AmpMap.mp4 9.3 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Sunrise to Sunset Analyzing the End-to-end Life Cycle and Effectiveness.mp4 9.2 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Retrofitting Fine Grain Isolation in the Firefox Renderer.mp4 9.2 MB
- USENIX Security 2022/LTrack Stealthy Tracking of Mobile Phones in LTE.mp4 9.2 MB
- USENIX Security 2023/Inception Exposing New Attack Surfaces with Training in Transient Execution.mp4 9.2 MB
- USENIX Security 2021/You Autocomplete Me Poisoning Vulnerabilities in Neural Code Completion.mp4 9.2 MB
- USENIX Security 2022/Where to Recruit for Security Development Studies Comparing Six Software.mp4 9.2 MB
- USENIX Security 2021/What's in a Name Exploring CA Certificate Control.mp4 9.2 MB
- USENIX Security 2020/USENIX Security 2020 Videos/PARTEMU Enabling Dynamic Analysis of Real-World TrustZone Software.mp4 9.2 MB
- USENIX Security 2023/Differential Testing of Cross Deep Learning Framework APIs Revealing.mp4 9.2 MB
- USENIX Security 2020/USENIX Security 2020 Videos/DECAF Automatic, Adaptive De-bloating and Hardening of COTS Firmware.mp4 9.2 MB
- USENIX Security 2021/Detecting Kernel Refcount Bugs with Two-Dimensional Consistency Checking.mp4 9.2 MB
- USENIX Security 2021/The Hijackers Guide To The Galaxy Off-Path Taking Over Internet Resources.mp4 9.2 MB
- USENIX Security 2020/USENIX Security 2020 Videos/SEAL Attack Mitigation for Encrypted Databases via Adjustable Leakage.mp4 9.2 MB
- USENIX Security 2021/ObliCheck Efficient Verification of Oblivious Algorithms with Unobservable.mp4 9.2 MB
- USENIX Security 2023/ICSPatch Automated Vulnerability Localization and Non-Intrusive.mp4 9.2 MB
- USENIX Security 2021/Security Analysis of the Democracy Live Online Voting System.mp4 9.2 MB
- USENIX Security 2022/Batched Differentially Private Information Retrieval.mp4 9.2 MB
- USENIX Security 2022/ReZone Disarming TrustZone with TEE Privilege Reduction.mp4 9.2 MB
- USENIX Security 2022/Dos and Don'ts of Machine Learning in Computer Security.mp4 9.2 MB
- USENIX Security 2023/ACFA Secure Runtime Auditing & Guaranteed Device Healing via Active.mp4 9.2 MB
- USENIX Security 2021/SMASH Synchronized Many-sided Rowhammer Attacks from JavaScript.mp4 9.2 MB
- USENIX Security 2023/Fast IDentity Online with Anonymous Credentials (FIDO-AC).mp4 9.2 MB
- USENIX Security 2021/Hopper Modeling and Detecting Lateral Movement.mp4 9.2 MB
- USENIX Security 2023/Isolated and Exhausted Attacking Operating Systems via Site Isolation in.mp4 9.2 MB
- USENIX Security 2022/Piranha A GPU Platform for Secure Computation.mp4 9.2 MB
- USENIX Security 2011/USENIX Security 2011 Presentations/Why (Special Agent) Johnny (Still) Can't Encrypt A Security Analysis of the APCO Project 25 Two-Way Radio System - Sandy Clark, Travis Goodspeed, Perry Metzger, Zac.pdf 9.2 MB
- USENIX Security 2021/Kalεido Real-Time Privacy Control for Eye-Tracking Systems.mp4 9.2 MB
- USENIX Security 2023/TreeSync Authenticated Group Management for Messaging Layer Security.mp4 9.2 MB
- USENIX Security 2023/FACE-AUDITOR Data Auditing in Facial Recognition Systems.mp4 9.2 MB
- USENIX Security 2023/Catch You and I Can Revealing Source Voiceprint Against Voice Conversion.mp4 9.1 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines.mp4 9.1 MB
- USENIX Security 2021/Helping Users Automatically Find and Manage Sensitive, Expendable Files.mp4 9.1 MB
- USENIX Security 2023/PrivGraph Differentially Private Graph Data Publication by Exploiting.mp4 9.1 MB
- USENIX Security 2021/Adversarial Policy Training against Deep Reinforcement Learning.mp4 9.1 MB
- USENIX Security 2023/Black-box Adversarial Example Attack towards FCG Based Android Malware.mp4 9.1 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Stealthy Tracking of Autonomous Vehicles with Cache Side Channels.mp4 9.1 MB
- USENIX Security 2022/Web Cache Deception Escalates.mp4 9.1 MB
- USENIX Security 2021/Formally Verified Memory Protection for a Commodity Multiprocessor Hypervisor.mp4 9.1 MB
- USENIX Security 2023/ARMore Pushing Love Back Into Binaries.mp4 9.1 MB
- USENIX Security 2023/FedVal Different good or different bad in federated learning.mp4 9.1 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Automatic Techniques to Systematically Discover New Heap Exploitation.mp4 9.1 MB
- USENIX Security 2021/SIGL Securing Software Installations Through Deep Graph Learning.mp4 9.1 MB
- USENIX Security 2023/Formal Analysis of SPDM Security Protocol and Data Model version 1.2.mp4 9.1 MB
- USENIX Security 2022/SCRAPS Scalable Collective Remote Attestation for Pub-Sub IoT Networks with.mp4 9.1 MB
- USENIX Security 2021/A11y and Privacy don't have to be mutually exclusive Constraining.mp4 9.1 MB
- USENIX Security 2023/Towards a General Video-based Keystroke Inference Attack.mp4 9.1 MB
- USENIX Security 2022/FlowMatrix GPU-Assisted Information-Flow Analysis through Matrix-Based.mp4 9.1 MB
- USENIX Security 2023/Sherlock on Specs Building LTE Conformance Tests through Automated Reasoning.mp4 9.1 MB
- USENIX Security 2022/Building an Open, Robust, and Stable Voting-Based Domain Top List.mp4 9.1 MB
- USENIX Security 2022/Measurement by Proxy On the Accuracy of Online Marketplace Measurements.mp4 9.1 MB
- USENIX Security 2020/USENIX Security 2020 Videos/A Spectral Analysis of Noise A Comprehensive, Automated, Formal Analysis.mp4 9.1 MB
- USENIX Security 2021/Poisoning the Unlabeled Dataset of Semi-Supervised Learning.mp4 9.0 MB
- USENIX Security 2021/Fuzzy Labeled Private Set Intersection with Applications to Private.mp4 9.0 MB
- USENIX Security 2021/Systematic Evaluation of Privacy Risks of Machine Learning Models.mp4 9.0 MB
- USENIX Security 2021/Abusing Hidden Properties to Attack the Node.js Ecosystem.mp4 9.0 MB
- USENIX Security 2023/Greenhouse Single-Service Rehosting of Linux-Based Firmware Binaries in.mp4 9.0 MB
- USENIX Security 2023/HyPFuzz Formal-Assisted Processor Fuzzing.mp4 9.0 MB
- USENIX Security 2022/How Machine Learning Is Solving the Binary Function Similarity Problem.mp4 9.0 MB
- USENIX Security 2022/AmpFuzz Fuzzing for Amplification DDoS Vulnerabilities.mp4 9.0 MB
- USENIX Security 2020/USENIX Security 2020 Videos/An Off-Chip Attack on Hardware Enclaves via the Memory Bus.mp4 9.0 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Differentially-Private Control-Flow Node Coverage for Software Usage Analysis.mp4 9.0 MB
- USENIX Security 2020/USENIX Security 2020 Videos/ShadowMove A Stealthy Lateral Movement Strategy.mp4 9.0 MB
- USENIX Security 2021/ALPACA Application Layer Protocol Confusion - Analyzing and Mitigating Cracks.mp4 9.0 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Programmable In-Network Security for Context-aware BYOD Policies.mp4 9.0 MB
- USENIX Security 2022/Hyperproofs Aggregating and Main'taining Proofs in Vector Commitments.mp4 9.0 MB
- USENIX Security 2021/AdCube WebVR Ad Fraud and Practical Confinement of Third-Party Ads.mp4 9.0 MB
- USENIX Security 2022/Decomperson How Humans Decompile and What We Can Learn From It.mp4 9.0 MB
- USENIX Security 2020/USENIX Security 2020 Videos/DatashareNetwork A Decentralized Privacy-Preserving Search Engine.mp4 9.0 MB
- USENIX Security 2022/How and Why People Use Virtual Private Networks.mp4 9.0 MB
- USENIX Security 2023/Keep Your Friends Close, but Your Routeservers Closer Insights into RPK.mp4 9.0 MB
- USENIX Security 2023/The Role of Professional Product Reviewers in Evaluating Security and Privacy.mp4 9.0 MB
- USENIX Security 2020/USENIX Security 2020 Videos/FIRMSCOPE Automatic Uncovering of Privilege-Escalation Vulnerabilities.mp4 9.0 MB
- USENIX Security 2020/USENIX Security 2020 Videos/That Was Then, This Is Now A Security Evaluation of Password Generation.mp4 9.0 MB
- USENIX Security 2023/Mitigating Security Risks in Linux with KLAUS A Method for Evaluating.mp4 9.0 MB
- USENIX Security 2023/Cryptographic Administration for Secure Group Messaging.mp4 9.0 MB
- USENIX Security 2023/We Really Need to Talk About Session Tickets A Large-Scale Analysis of.mp4 8.9 MB
- USENIX Security 2023/One Size Does Not Fit All Uncovering and Exploiting Cross Platform.mp4 8.9 MB
- USENIX Security 2023/Ultimate SLH Taking Speculative Load Hardening to the Next Level.mp4 8.9 MB
- USENIX Security 2020/USENIX Security 2020 Videos/SkillExplorer Understanding the Behavior of Skills in Large Scale.mp4 8.9 MB
- USENIX Security 2022/In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer.mp4 8.9 MB
- USENIX Security 2023/Assessing Anonymity Techniques Employed in German Court Decisions A.mp4 8.9 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Datalog Disassembly.mp4 8.9 MB
- USENIX Security 2023/XCheck Verifying Integrity of 3D Printed Patient-Specific Devices via.mp4 8.9 MB
- USENIX Security 2021/Understanding and Detecting Disordered Error Handling with Precise Function.mp4 8.9 MB
- USENIX Security 2020/USENIX Security 2020 Videos/On Training Robust PDF Malware Classifiers.mp4 8.9 MB
- USENIX Security 2022/Cheetah Lean and Fast Secure Two-Party Deep Neural Network Inference.mp4 8.9 MB
- USENIX Security 2022/DnD A Cross-Architecture Deep Neural Network Decompiler.mp4 8.9 MB
- USENIX Security 2023/No Linux, No Problem Fast and Correct Windows Binary Fuzzing via.mp4 8.9 MB
- USENIX Security 2021/T-Miner A Generative Approach to Defend Against Trojan Attacks on DNN-based.mp4 8.9 MB
- USENIX Security 2022/Twilight A Differentially Private Payment Channel Network.mp4 8.9 MB
- USENIX Security 2022/How to Abuse and Fix Authenticated Encryption Without Key Commitment.mp4 8.9 MB
- USENIX Security 2023/Mixed Signals Analyzing Ground-Truth Data on the Users and Economics.mp4 8.9 MB
- USENIX Security 2023/ARGUS Context-Based Detection of Stealthy IoT Infiltration Attacks.mp4 8.9 MB
- USENIX Security 2022/Spoki Unveiling a New Wave of Scanners through a Reactive Network Telescope.mp4 8.9 MB
- USENIX Security 2022/Stalloris RPKI Downgrade Attack.mp4 8.9 MB
- USENIX Security 2023/A Hybrid Alias Analysis and Its Application to Global Variable Protection.mp4 8.9 MB
- USENIX Security 2023/Defining - Broken - User Experiences and Remediation Tactics When Ad-Blocking..mp4 8.9 MB
- USENIX Security 2023/How Library IT Staff Navigate Privacy and Security Challenges and.mp4 8.9 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Detecting Stuffing of a User’s Credentials at Her Own Accounts.mp4 8.9 MB
- USENIX Security 2023/Fact-Saboteurs A Taxonomy of Evidence Manipulation Attacks against.mp4 8.9 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Adversarial Preprocessing Understanding and Preventing Image-Scaling Attacks.mp4 8.9 MB
- USENIX Security 2022/An Audit of Facebook's Political Ad Policy Enforcement.mp4 8.8 MB
- USENIX Security 2023/Snapping Snap Sync Practical Attacks on Go Ethereum Synchronising Nodes.mp4 8.8 MB
- USENIX Security 2022/Networks of Care Tech Abuse Advocates' Digital Security Practices.mp4 8.8 MB
- FOCI 2020/Bystanders’ Privacy The Perspectives of Nannies on Smart Home Surveillance.mp4 8.8 MB
- USENIX Security 2023/FABRID Flexible Attestation-Based Routing for Inter-Domain Networks.mp4 8.8 MB
- USENIX Security 2023/Exploring User Reactions and Mental Models Towards Perceptual Manipulation.mp4 8.8 MB
- USENIX Security 2022/Midas Systematic Kernel TOCTTOU Protection.mp4 8.8 MB
- USENIX Security 2021/Inexpensive Brainwave Authentication New Techniques and Insights.mp4 8.8 MB
- USENIX Security 2023/To Cloud or not to Cloud A Qualitative Study on Self-Hosters' Motivation.mp4 8.8 MB
- USENIX Security 2020/FOCI '20/FOCI 20 - MIMIQ Masking IPs with Migration in QUIC.mp4 8.8 MB
- USENIX Security 2023/Exploring Tenants' Preferences of Privacy Negotiation in Airbnb.mp4 8.8 MB
- USENIX Security 2021/On the Routing-Aware Peering against Network-Eclipse Attacks in Bitcoin.mp4 8.8 MB
- USENIX Security 2023/Glimpse On-Demand PoW Light Client with Constant-Size Storage for DeFi.mp4 8.8 MB
- USENIX Security 2021/ELISE A Storage Efficient Logging System Powered by Redundancy Reduction.mp4 8.8 MB
- USENIX Security 2020/USENIX Security 2020 Videos/PKU Pitfalls Attacks on PKU-based Memory Isolation Systems.mp4 8.8 MB
- USENIX Security 2021/Demon in the Variant Statistical Analysis of DNNs for Robust Backdoor.mp4 8.8 MB
- USENIX Security 2023/VILLAIN Backdoor Attacks Against Vertical Split Learning.mp4 8.8 MB
- USENIX Security 2021/It's Stored, Hopefully, on an Encrypted Server Mitigating Users.mp4 8.8 MB
- USENIX Security 2020/USENIX Security 2020 Videos/SmartVerif Push the Limit of Automation Capability of Verifying Security.mp4 8.8 MB
- USENIX Security 2023/Automated Inference on Financial Security of Ethereum Smart Contracts.mp4 8.8 MB
- USENIX Security 2021/Rollercoaster An Efficient Group-Multicast Scheme for Mix Networks.mp4 8.8 MB
- USENIX Security 2021/Disrupting Continuity of Apple's Wireless Ecosystem Security New Tracking.mp4 8.8 MB
- USENIX Security 2023/Pspray Timing Side-Channel based Linux Kernel Heap Exploitation Technique.mp4 8.8 MB
- USENIX Security 2022/RE-Mind a First Look Inside the Mind of a Reverse Engineer.mp4 8.8 MB
- USENIX Security 2023/Machine-checking Multi-Round Proofs of Shuffle Terelius-Wikstrom and.mp4 8.8 MB
- USENIX Security 2023/If sighted people know, I should be able to know Privacy Perceptions of.mp4 8.7 MB
- USENIX Security 2021/PrivateDrop Practical Privacy-Preserving Authentication for Apple AirDrop.mp4 8.7 MB
- USENIX Security 2023/Three Lessons From Threema Analysis of a Secure Messenger.mp4 8.7 MB
- USENIX Security 2021/SelectiveTain't Efficient Data Flow Tracking With Static Binary Rewriting.mp4 8.7 MB
- USENIX Security 2021/M2MON Building an MMIO-based Security Reference Monitor for Unmanned Vehicles.mp4 8.7 MB
- USENIX Security 2020/USENIX Security 2020 Videos/TeeRex Discovery and Exploitation of Memory Corruption Vulnerabilities.mp4 8.7 MB
- USENIX Security 2021/Precise and Scalable Detection of Use-after-Compacting-Garbage-Collection Bugs.mp4 8.7 MB
- USENIX Security 2023/Understand Users' Privacy Perception and Decision of V2X Communication in.mp4 8.7 MB
- USENIX Security 2023/Bleem Packet Sequence Oriented Fuzzing for Protocol Implementations.mp4 8.7 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/Effective Attacks and Provable Defenses for Website Fingerprinting Slides - Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, Ian Goldberg.pdf 8.7 MB
- USENIX Security 2023/A comprehensive, formal and automated analysis of the EDHOC protocol.mp4 8.7 MB
- USENIX Security 2023/Dubhe Succinct Zero-Knowledge Proofs for Standard AES and relate.mp4 8.7 MB
- USENIX Security 2023/BunnyHop Exploiting the Instruction Prefetcher.mp4 8.7 MB
- USENIX Security 2021/JAW Studying Client-side CSRF with Hybrid Property Graphs and Declarative.mp4 8.7 MB
- USENIX Security 2022/Polynomial Commitment with a One-to-Many Prover and Applications.mp4 8.7 MB
- USENIX Security 2023/Automated Security Analysis of Exposure Notification Systems.mp4 8.7 MB
- USENIX Security 2022/Security and Privacy Perceptions of Third-Party Application Access for Google.mp4 8.7 MB
- USENIX Security 2021/Private Blocklist Lookups with Checklist.mp4 8.6 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Civet An Efficient Java Partitioning Framework for Hardware Enclaves.mp4 8.6 MB
- USENIX Security 2022/Ghost Peak Practical Distance Reduction Attacks Against HRP UWB Ranging.mp4 8.6 MB
- USENIX Security 2020/USENIX Security 2020 Videos/A Formal Analysis of IEEE 802.11s WPA2 Countering the Kracks Caused by.mp4 8.6 MB
- USENIX Security 2023/Fuzztruction Using Fault Injection-based Fuzzing to Leverage Implicit.mp4 8.6 MB
- USENIX Security 2022/Detecting Logical Bugs of DBMS with Coverage-based Guidance.mp4 8.6 MB
- USENIX Security 2023/The Blockchain Imitation Game.mp4 8.6 MB
- USENIX Security 2022/Towards More Robust Keyword Spotting for Voice Assistants.mp4 8.6 MB
- USENIX Security 2023/Instructions Unclear Undefined Behaviour in Cellular Network Specifications.mp4 8.6 MB
- USENIX Security 2021/Acoustics to the Rescue Physical Key Inference Attack Revisited.mp4 8.6 MB
- USENIX Security 2020/USENIX Security 2020 Videos/USBFuzz A Framework for Fuzzing USB Drivers by Device Emulation.mp4 8.6 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Everything Old is New Again Binary Security of WebAssembly.mp4 8.6 MB
- USENIX Security 2020/USENIX Security 2020 Videos/FuzzGuard Filtering out Unreachable Inputs in Directed Grey-box Fuzzing.mp4 8.6 MB
- USENIX Security 2020/FOCI '20/FOCI 20 - Identifying Disinformation Websites Using Infrastructure Features.mp4 8.6 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Certified Side Channels.mp4 8.6 MB
- USENIX Security 2023/FuzzJIT Oracle-Enhanced Fuzzing for JavaScript Engine JIT Compiler.mp4 8.6 MB
- USENIX Security 2023/HOLMES Efficient Distribution Testing for Secure Collaborative Learning.mp4 8.6 MB
- USENIX Security 2021/An Investigation of the Android Kernel Patch Ecosystem.mp4 8.6 MB
- USENIX Security 2021/Pretty Good Phone Privacy.mp4 8.6 MB
- USENIX Security 2023/KextFuzz Fuzzing macOS Kernel EXTensions on Apple Silicon via Exploiting.mp4 8.6 MB
- USENIX Security 2021/LZR Identifying Unexpected Internet Services.mp4 8.6 MB
- USENIX Security 2023/VIPER Spotting Syscall-Guard Variables for Data-Only Attacks.mp4 8.5 MB
- USENIX Security 2022/WebGraph Capturing Advertising and Tracking Information Flows.mp4 8.5 MB
- USENIX Security 2020/USENIX Security 2020 Videos/The Ballot is Busted Before the Blockchain A Security Analysis of Voatz.mp4 8.5 MB
- USENIX Security 2022/HyperDegrade From GHz to MHz Effective CPU Frequencies.mp4 8.5 MB
- USENIX Security 2023/Controlled Data Races in Enclaves Attacks and Detection.mp4 8.5 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Donky Domain Keys - Efficient In-Process Isolation for RISC-V and x86.mp4 8.5 MB
- USENIX Security 2022/Composable Cachelets Protecting Enclaves from Cache Side-Channel Attacks.mp4 8.5 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Remote Side-Channel Attacks on Anonymous Transactions.mp4 8.5 MB
- USENIX Security 2023/Formal Analysis of Session-Handling in Secure Messaging Lifting Security.mp4 8.5 MB
- USENIX Security 2021/PatchGuard A Provably Robust Defense against Adversarial Patches via Small.mp4 8.5 MB
- USENIX Security 2020/USENIX Security 2020 Videos/P2IM Scalable and Hardware-independent Firmware Testing via Automatic.mp4 8.5 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Horizontal Privilege Escalation in Trusted Applications.mp4 8.5 MB
- USENIX Security 2021/PriSEC A Privacy Settings Enforcement Controller.mp4 8.5 MB
- USENIX Security 2021/Injection Attacks Reloaded Tunnelling Malicious Payloads over DNS.mp4 8.5 MB
- USENIX Security 2022/FLAME Taming Backdoors in Federated Learning.mp4 8.5 MB
- USENIX Security 2022/Blacklight Scalable Defense for Neural Networks against Query-Based Black-Box.mp4 8.5 MB
- USENIX Security 2023/Fairness Properties of Face Recognition and Obfuscation Systems.mp4 8.5 MB
- USENIX Security 2023/Time for Change How Clocks Break UWB Secure Ranging.mp4 8.5 MB
- USENIX Security 2021/Data Poisoning Attacks to Local Differential Privacy Protocols.mp4 8.5 MB
- USENIX Security 2023/Security Analysis of MongoDB Queryable Encryption.mp4 8.5 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Secure parallel computation on national scale volumes of data.mp4 8.5 MB
- USENIX Security 2022/Arbiter Bridging the Static and Dynamic Divide in Vulnerability Discovery.mp4 8.5 MB
- USENIX Security 2022/How to Peel a Million Validating and Expanding Bitcoin Clusters.mp4 8.5 MB
- USENIX Security 2020/USENIX Security 2020 Videos/ParmeSan Sanitizer-guided Greybox Fuzzing.mp4 8.4 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Analysis of DTLS Implementations Using Protocol State Fuzzing.mp4 8.4 MB
- USENIX Security 2021/Evil Under the Sun Understanding and Discovering Attacks on Ethereum.mp4 8.4 MB
- USENIX Security 2021/On the Usability of Authenticity Checks for Hardware Security Tokens.mp4 8.4 MB
- USENIX Security 2023/Side-Channel Attacks on Optane Persistent Memory.mp4 8.4 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Local Model Poisoning Attacks to Byzantine-Robust Federated Learning.mp4 8.4 MB
- USENIX Security 2023/Unique Identification of 50,000 Virtual Reality Users from Head & Hand.mp4 8.4 MB
- USENIX Security 2022/AMD Prefetch Attacks through Power and Time.mp4 8.4 MB
- USENIX Security 2021/On the Design and Misuse of Microcoded (Embedded) Processors-A Cautionary Note.mp4 8.4 MB
- USENIX Security 2022/FUGIO Automatic Exploit Generation for PHP Object Injection Vulnerabilities.mp4 8.4 MB
- USENIX Security 2023/PrivTrace Differentially Private Trajectory Synthesis by Adaptive Markov.mp4 8.4 MB
- USENIX Security 2020/USENIX Security 2020 Videos/A Tale of Two Headers A Formal Analysis of Inconsistent Click-Jacking.mp4 8.4 MB
- USENIX Security 2021/Privacy and Integrity Preserving Computations with CRISP.mp4 8.4 MB
- USENIX Security 2023/Oops.. I Glitched It Again How to Multi-Glitch the Glitching-Protections.mp4 8.4 MB
- USENIX Security 2023/Hash Gone Bad Automated discovery of protocol attacks that exploit hash.mp4 8.4 MB
- USENIX Security 2021/The Complexities of Healing in Secure Group Messaging Why Cross-Group Effects.mp4 8.4 MB
- USENIX Security 2022/Provably-Safe Multilingual Software Sandboxing using WebAssembly.mp4 8.4 MB
- USENIX Security 2021/Card Brand Mixup Attack Bypassing the PIN in non-Visa Cards by Using Them.mp4 8.4 MB
- USENIX Security 2023/DynSQL Stateful Fuzzing for Database Management Systems with Complex and.mp4 8.4 MB
- USENIX Security 2023/CipherH Automated Detection of Ciphertext Side-channel Vulnerabilities in.mp4 8.3 MB
- USENIX Security 2021/APICraft Fuzz Driver Generation for Closed-source SDK Libraries.mp4 8.3 MB
- USENIX Security 2020/USENIX Security 2020 Videos/PhishTime Continuous Longitudinal Measurement of the Effectiveness.mp4 8.3 MB
- USENIX Security 2022/ÆPIC Leak Architecturally Leaking Uninitialized Data from the.mp4 8.3 MB
- USENIX Security 2022/FreeWill Automatically Diagnosing Use-after-free Bugs via Reference.mp4 8.3 MB
- USENIX Security 2021/Database Reconstruction from Noisy Volumes A Cache Side-Channel Attack.mp4 8.3 MB
- USENIX Security 2023/Improving Real-world Password Guessing Attacks via Bi-directional Transformers.mp4 8.3 MB
- USENIX Security 2021/A Large-Scale Interview Study on Information Security in and Attacks.mp4 8.3 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Pancake Frequency Smoothing for Encrypted Data Stores.mp4 8.3 MB
- USENIX Security 2021/When Malware Changed Its Mind An Empirical Study of Variable Program Behavior.mp4 8.3 MB
- USENIX Security 2022/SAPIC protocol verifiers of the world, unite.mp4 8.3 MB
- USENIX Security 2021/Muse Secure Inference Resilient to Malicious Clients.mp4 8.3 MB
- USENIX Security 2023/Efficient Unbalanced Private Set Intersection Cardinality and User-friendly.mp4 8.3 MB
- USENIX Security 2023/PORE Provably Robust Recommender Systems against Data Poisoning Attacks.mp4 8.3 MB
- USENIX Security 2021/Cross-VM and Cross-Processor Covert Channels Exploiting Processor Idle.mp4 8.3 MB
- USENIX Security 2023/Secure Floating-Point Training.mp4 8.3 MB
- USENIX Security 2022/Gossamer Securely Measuring Password-based Logins.mp4 8.3 MB
- USENIX Security 2022/Efficient Representation of Numerical Optimization Problems for SNARKs.mp4 8.3 MB
- USENIX Security 2020/USENIX Security 2020 Videos/NetWarden Mitigating Network Covert Channels while Preserving Performance.mp4 8.3 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Human Distinguishable Visual Key Fingerprints.mp4 8.3 MB
- USENIX Security 2022/Behind the Tube Exploitative Monetization of Content on YouTube.mp4 8.3 MB
- USENIX Security 2021/Coco Co-Design and Co-Verification of Masked Software Implementations on CPUs.mp4 8.3 MB
- USENIX Security 2021/Why wouldn't someone think of democracy as a target.mp4 8.2 MB
- USENIX Security 2023/Efficient 3PC for Binary Circuits with Application to Maliciously-Secure.mp4 8.2 MB
- USENIX Security 2023/BalanceProofs Maintainable Vector Commitments with Fast Aggregation.mp4 8.2 MB
- USENIX Security 2021/Is Real-time Phishing Eliminated with FIDO Social Engineering Downgrade.mp4 8.2 MB
- USENIX Security 2023/Synchronization Storage Channels (S2C) Timer-less Cache Side-Channel.mp4 8.2 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Symbolic execution with SymCC don't interpret, compile.mp4 8.2 MB
- USENIX Security 2023/Don’t be Dense Efficient Keyword PIR for Sparse Databases.mp4 8.2 MB
- USENIX Security 2022/Hecate Abuse Reporting in Secure Messengers with Sealed Sender.mp4 8.2 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/From the Aether to the Ethernet-Attacking the Internet using Broadcast Digital Television Slides - Yossef Oren, Angelos D. Keromytis.pdf 8.2 MB
- USENIX Security 2021/Hermes Attack Steal DNN Models with Lossless Inference Accuracy.mp4 8.2 MB
- USENIX Security 2022/CellIFT Leveraging Cells for Scalable and Precise Dynamic Information Flow.mp4 8.2 MB
- USENIX Security 2021/Partitioning Oracle Attacks.mp4 8.2 MB
- USENIX Security 2021/Deep Entity Classification Abusive Account Detection for Online Social.mp4 8.2 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Scaling Verifiable Computation Using Efficient Set Accumulators.mp4 8.2 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Boxer Preventing fraud by scanning credit cards.mp4 8.2 MB
- USENIX Security 2023/PUMM Preventing Use-After-Free Using Execution Unit Partitioning.mp4 8.2 MB
- USENIX Security 2022/MundoFuzz Hypervisor Fuzzing with Statistical Coverage Testing and Grammar.mp4 8.2 MB
- USENIX Security 2022/Incremental Offline Online PIR.mp4 8.2 MB
- USENIX Security 2022/Increasing Adversarial Uncertain'ty to Scale Private Similarity Testing.mp4 8.2 MB
- USENIX Security 2021/SWIFT Super-fast and Robust Privacy-Preserving Machine Learning.mp4 8.2 MB
- USENIX Security 2023/Remote Direct Memory Introspection.mp4 8.2 MB
- USENIX Security 2021/LIGHTBLUE Automatic Profile-Aware Debloating of Bluetooth Stacks.mp4 8.1 MB
- USENIX Security 2023/Near-Optimal Oblivious Key-Value Stores for Efficient PSI, PSU and Volume.mp4 8.1 MB
- USENIX Security 2020/USENIX Security 2020 Videos/(Mostly) Exitless VM Protection from Untrusted Hypervisor through Disaggregate.mp4 8.1 MB
- USENIX Security 2023/ACon2 Adaptive Conformal Consensus for Provable Blockchain Oracles.mp4 8.1 MB
- USENIX Security 2021/Blitz Secure Multi-Hop Payments Without Two-Phase Commits.mp4 8.1 MB
- USENIX Security 2021/Undo Workarounds for Kernel Bugs.mp4 8.1 MB
- USENIX Security 2022/Pre-hijacked accounts An Empirical Study of Security Failures in User Account.mp4 8.1 MB
- USENIX Security 2023/The Writing on the Wall and 3D Digital Twins Personal Information in..mp4 8.1 MB
- USENIX Security 2021/U Can't Debug This Detecting JavaScript Anti-Debugging Techniques in the Wild.mp4 8.1 MB
- USENIX Security 2023/TVA A multi-party computation system for secure and expressive time series.mp4 8.1 MB
- USENIX Security 2021/A Side Journey To Titan.mp4 8.1 MB
- USENIX Security 2021/Frontrunner Jones and the Raiders of the Dark Forest An Empirical Study.mp4 8.1 MB
- USENIX Security 2022/Aardvark An Asynchronous Authenticated Dictionary with Applications to.mp4 8.1 MB
- USENIX Security 2023/PROVIDENCE a Flexible Round-by-Round Risk-Limiting Audit.mp4 8.1 MB
- USENIX Security 2022/Zero-Knowledge Middleboxes.mp4 8.1 MB
- USENIX Security 2022/FuzzOrigin Detecting UXSS vulnerabilities in Browsers through Origin Fuzzing.mp4 8.1 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Achieving Keyless CDNs with Conclaves.mp4 8.1 MB
- USENIX Security 2022/On the Security Risks of AutoML.mp4 8.1 MB
- USENIX Security 2023/DAFL Directed Grey-box Fuzzing guided by Data Dependency.mp4 8.1 MB
- USENIX Security 2022/PrivGuard Privacy Regulation Compliance Made Easier.mp4 8.1 MB
- USENIX Security 2021/CIPHERLEAKS Breaking Constant-time Cryptography on AMD SEV via.mp4 8.1 MB
- USENIX Security 2021/Can Systems Explain Permissions Better Understanding Users' Misperceptions.mp4 8.1 MB
- USENIX Security 2022/Half-Double Hammering From the Next Row Over.mp4 8.1 MB
- USENIX Security 2020/USENIX Security 2020 Videos/From Needs to Actions to Secure Apps The Effect of Requirements.mp4 8.1 MB
- USENIX Security 2022/Experimental Security Analysis of the App Model in Business Collaboration.mp4 8.0 MB
- USENIX Security 2021/The Use of Likely Invariants as Feedback for Fuzzers.mp4 8.0 MB
- USENIX Security 2023/Is Your Wallet Snitching On You An Analysis on the Privacy Implications.mp4 8.0 MB
- USENIX Security 2022/Practical Data Access Minimization in Trigger-Action Platforms.mp4 8.0 MB
- USENIX Security 2021/SEAL Storage-efficient Causality Analysis on Enterprise Logs.mp4 8.0 MB
- USENIX Security 2020/USENIX Security 2020 Videos/What Twitter Knows Characterizing Ad Targeting Practices, User Perceptions.mp4 8.0 MB
- USENIX Security 2022/Fuzzware Using Precise MMIO Modeling for Effective Firmware Fuzzing.mp4 8.0 MB
- USENIX Security 2021/Osiris Automated Discovery of Microarchitectural Side Channels.mp4 8.0 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Understanding security mistakes developers make Qualitative analysis.mp4 8.0 MB
- USENIX Security 2023/A Study of Multi-Factor and Risk-Based Authentication Availability.mp4 8.0 MB
- USENIX Security 2022/Mitigating Membership Inference Attacks by Self-Distillation Through a Novel.mp4 8.0 MB
- USENIX Security 2021/Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing.mp4 8.0 MB
- USENIX Security 2021/A Large Scale Study of User Behavior, Expectations and Engagement with.mp4 8.0 MB
- USENIX Security 2023/Multi-Factor Key Derivation Function (MFKDF) for Fast, Flexible, Secure, &.mp4 8.0 MB
- USENIX Security 2022/Elasticlave An Efficient Memory Model for Enclaves.mp4 8.0 MB
- USENIX Security 2020/USENIX Security 2020 Videos/TXSPECTOR Uncovering Attacks in Ethereum from Transactions.mp4 8.0 MB
- USENIX Security 2021/ABY2.0 Improved Mixed-Protocol Secure Two-Party Computation.mp4 7.9 MB
- USENIX Security 2022/Augmenting Decompiler Output with Learned Variable Names and Types.mp4 7.9 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Hybrid Batch Attacks Finding Black-box Adversarial Examples with Limited.mp4 7.9 MB
- USENIX Security 2021/Entangled Watermarks as a Defense against Model Extraction.mp4 7.9 MB
- USENIX Security 2021/DRMI A Dataset Reduction Technology based on Mutual Information for Black-box.mp4 7.9 MB
- USENIX Security 2022/Birds of a Feather Flock Together How Set Bias Helps to Deanonymize You.mp4 7.9 MB
- USENIX Security 2021/Stealing Links from Graph Neural Networks.mp4 7.9 MB
- USENIX Security 2022/Experimenting with Collaborative zk-SNARKs Zero-Knowledge Proofs for.mp4 7.9 MB
- USENIX Security 2021/DEFInit An Analysis of Exposed Android Init Routines.mp4 7.9 MB
- USENIX Security 2021/Reducing HSM Reliance in Payments through Proxy Re-Encryption.mp4 7.9 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Delphi A Cryptographic Inference Service for Neural Networks.mp4 7.9 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Silhouette Efficient Protected Shadow Stacks for Embedded Systems.mp4 7.9 MB
- USENIX Security 2021/Effective Notification Campaigns on the Web A Matter of Trust, Framing, and.mp4 7.8 MB
- USENIX Security 2023/Extended Hell(o) A Comprehensive Large-Scale Study on Email.mp4 7.8 MB
- USENIX Security 2023/Hey Kimya, Is My Smart Speaker Spying on Me Taking Control of Sensor.mp4 7.8 MB
- USENIX Security 2023/Minimalist Semi-automated Debloating of PHP Web Applications through.mp4 7.8 MB
- USENIX Security 2021/CADE Detecting and Explaining Concept Drift Samples for Security Applications.mp4 7.8 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Montage A Neural Network Language Model-Guided JavaScript Engine Fuzzer.mp4 7.8 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/Security Analysis of a Full-Body Scanner Slides - Keaton Mowery, Eric Wustrow, Tom Wypych, Corey Singleton, Chris Comfort, Eric Rescorla, Stephen Checkoway, J. Alex.pdf 7.8 MB
- USENIX Security 2021/A Stealthy Location Identification Attack Exploiting Carrier Aggregation.mp4 7.8 MB
- USENIX Security 2023/SpectrEM Exploiting Electromagnetic Emanations During Transient Execution.mp4 7.8 MB
- USENIX Security 2022/USENIX Security '22- TLB - DR Enhancing TLB-based Attacks with TLB Desynchronized Reverse Engineering.mp4 7.8 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Droplet Decentralized Authorization and Access Control for Encrypted Data.mp4 7.8 MB
- USENIX Security 2022/Rendering Contention Channel Made Practical in Web Browsers.mp4 7.8 MB
- USENIX Security 2023/Cipherfix Mitigating Ciphertext Side-Channel Attacks in Software.mp4 7.8 MB
- USENIX Security 2021/Towards Formal Verification of State Continuity for Enclave Programs.mp4 7.7 MB
- USENIX Security 2023/Tubes Among Us Analog Attack on Automatic Speaker Identification.mp4 7.7 MB
- USENIX Security 2023/IvySyn Automated Vulnerability Discovery in Deep Learning Frameworks.mp4 7.7 MB
- USENIX Security 2023/Cryptographic Deniability A Multi-perspective Study of User Perceptions.mp4 7.7 MB
- USENIX Security 2021/DICE - A Formally Verified Implementation of DICE Measured Boot.mp4 7.7 MB
- USENIX Security 2023/Rethinking System Audit Architectures for High Event Coverage and.mp4 7.7 MB
- USENIX Security 2021/Preventing Use-After-Free Attacks with Fast Forward Allocation.mp4 7.7 MB
- USENIX Security 2023/Pool-Party Exploiting Browser Resource Pools for Web Tracking.mp4 7.7 MB
- USENIX Security 2021/It's stressful having all these phones - Investigating Sex Workers Safety.mp4 7.7 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Preech A System for Privacy-Preserving Speech Transcription.mp4 7.7 MB
- USENIX Security 2021/Strategies and Perceived Risks of Sending Sensitive Documents.mp4 7.7 MB
- USENIX Security 2021/'Passwords Keep Me Safe' - Understanding What Children Think about Passwords.mp4 7.7 MB
- USENIX Security 2021/ExpRace Exploiting Kernel Races through Raising Interrupts.mp4 7.7 MB
- USENIX Security 2020/USENIX Security 2020 Videos/BScout Direct Whole Patch Presence Test for Java Executables.mp4 7.7 MB
- USENIX Security 2021/Evaluating In-Workflow Messages for Improving Mental Models of End-to-End.mp4 7.7 MB
- USENIX Security 2021/PrivSyn Differentially Private Data Synthesis.mp4 7.7 MB
- USENIX Security 2022/Repurposing Segmentation as a Practical LVI-NULL Mitigation in SGX.mp4 7.6 MB
- USENIX Security 2023/Network Detection of Interactive SSH Impostors Using Deep Learning.mp4 7.6 MB
- USENIX Security 2021/Capture Centralized Library Management for Heterogeneous IoT Devices.mp4 7.6 MB
- USENIX Security 2022/Electronic Monitoring Smartphone Apps An Analysis of Risks from Technical,.mp4 7.6 MB
- USENIX Security 2023/Examining Power Dynamics and User Privacy in Smart Technology Use Among.mp4 7.6 MB
- USENIX Security 2021/Reducing Test Cases with Attention Mechanism of Neural Networks.mp4 7.6 MB
- USENIX Security 2023/FloatZone Accelerating Memory Error Detection using the Floating Point Unit.mp4 7.6 MB
- USENIX Security 2023/GAP Differentially Private Graph Neural Networks with Aggregation.mp4 7.6 MB
- USENIX Security 2021/Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers.mp4 7.6 MB
- USENIX Security 2020/USENIX Security 2020 Videos/I have too much respect for my elders Understanding South African Mobile.mp4 7.6 MB
- USENIX Security 2021/KeyForge Non-Attributable Email from Forward-Forgeable Signatures.mp4 7.6 MB
- USENIX Security 2021/Communication-Computation Trade-offs in PIR.mp4 7.6 MB
- USENIX Security 2022/When Sally Met Trackers Web Tracking From the Users' Perspective.mp4 7.5 MB
- USENIX Security 2021/Swiped Analyzing Ground-truth Data of a Marketplace for Stolen Debit.mp4 7.5 MB
- USENIX Security 2023/Token Spammers, Rug Pulls, and Sniper Bots An Analysis of the Ecosystem.mp4 7.5 MB
- USENIX Security 2022/Like Lesbians Walking the Perimeter - Experiences of U.S. LGBTQ Folks.mp4 7.5 MB
- USENIX Security 2022/SGXLock Towards Efficiently Establishing Mutual Distrust Between Host.mp4 7.5 MB
- USENIX Security 2022/GhostTouch Targeted Attacks on Touchscreens without Physical Touch.mp4 7.5 MB
- USENIX Security 2021/CACTI Captcha Avoidance via Client-side TEE Integration.mp4 7.5 MB
- USENIX Security 2023/Speculation at Fault Modeling and Testing Microarchitectural Leakage of.mp4 7.5 MB
- USENIX Security 2021/Having Your Cake and Eating It An Analysis of Concession-Abuse-as-a-Service.mp4 7.5 MB
- USENIX Security 2021/Compromised or Attacker-Owned A Large Scale Classification and Study.mp4 7.5 MB
- USENIX Security 2021/Nyx Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types.mp4 7.5 MB
- USENIX Security 2012/USENIX Security 2012 Presentations/Data Node Encrypted File System Efficient Secure Deletion for Flash Memory Slides - Joel Reardon, Srdjan Capkun, David Basin.pdf 7.5 MB
- USENIX Security 2023/AIRTAG Towards Automated Attack Investigation by Unsupervised Learning.mp4 7.4 MB
- USENIX Security 2022/Targeted Deanonymization via the Cache Side Channel Attacks and Defenses.mp4 7.4 MB
- USENIX Security 2020/USENIX Security 2020 Videos/V0LTpwn Attacking x86 Processor Integrity from Software.mp4 7.4 MB
- USENIX Security 2021/Using Amnesia to Detect Credential Database Breaches.mp4 7.4 MB
- USENIX Security 2021/Balboa Bobbing and Weaving around Network Censorship.mp4 7.4 MB
- USENIX Security 2023/ACTOR Action-Guided Kernel Fuzzing.mp4 7.4 MB
- USENIX Security 2022/Might I Get Pwned A Second Generation Compromised Credential Checking Service.mp4 7.4 MB
- USENIX Security 2021/DeepReflect Discovering Malicious Functionality through Binary Reconstruction.mp4 7.4 MB
- USENIX Security 2022/MAGE Mutual Attestation for a Group of Enclaves without Trusted Third Parties.mp4 7.4 MB
- FOCI 2020/MIMIQ Masking IPs with Migration in QUIC.mp4 7.4 MB
- USENIX Security 2021/DOLMA Securing Speculation with the Principle of Transient Non-Observability.mp4 7.4 MB
- USENIX Security 2022/SecSMT Securing SMT Processors against Contention-Based Covert Channels.mp4 7.4 MB
- USENIX Security 2021/Effect of Mood, Location, Trust, and Presence of Others on Video-Based.mp4 7.4 MB
- USENIX Security 2021/Express Lowering the Cost of Metadata-hiding Communication with Cryptographic.mp4 7.3 MB
- USENIX Security 2022/Unleash the Simulacrum Shifting Browser Realities for Robust.mp4 7.3 MB
- USENIX Security 2022/Seeing the Forest for the Trees Understanding Security Hazards in the 3GPP.mp4 7.3 MB
- USENIX Security 2021/SocialHEISTing Understanding Stolen Facebook Accounts.mp4 7.3 MB
- USENIX Security 2011/USENIX Security 2011 Videos/Opening Remarks, Awards, and Keynote Address - David Wagner.mp4 7.3 MB
- USENIX Security 2022/SYMSAN Time and Space Efficient Concolic Execution via Dynamic Data-flow.mp4 7.3 MB
- USENIX Security 2021/An Analysis of Speculative Type Confusion Vulnerabilities in the Wild.mp4 7.3 MB
- USENIX Security 2020/FOCI '20/FOCI 20 - HTTPT A Probe-Resistant Proxy.mp4 7.3 MB
- USENIX Security 2021/ARCUS Symbolic Root Cause Analysis of Exploits in Production Systems.mp4 7.3 MB
- USENIX Security 2020/USENIX Security 2020 Videos/BlockSci Design and applications of a blockchain analysis platform.mp4 7.3 MB
- USENIX Security 2021/Incrementally Updateable Honey Password Vaults.mp4 7.2 MB
- USENIX Security 2020/USENIX Security 2020 Videos/ETHBMC A Bounded Model Checker for Smart Contracts.mp4 7.2 MB
- USENIX Security 2023/Rods with Laser Beams Understanding Browser Fingerprinting on Phishing Pages.mp4 7.2 MB
- USENIX Security 2021/SmarTest Effectively Hunting Vulnerable Transaction Sequences in Smart.mp4 7.2 MB
- USENIX Security 2022/Faster Yet Safer Logging System Via Fixed-Key Blockcipher.mp4 7.2 MB
- FOCI 2020/Detecting and Evading Censorship-in-Depth A Case Study of Iran’s Protocol Whitelister.mp4 7.2 MB
- USENIX Security 2021/How to Make Private Distributed Cardinality Estimation Practical.mp4 7.1 MB
- USENIX Security 2021/Cerebro A Platform for Multi-Party Cryptographic Collaborative Learning.mp4 7.1 MB
- USENIX Security 2022/RETBLEED Arbitrary Speculative Code Execution with Return Instructions.mp4 7.1 MB
- USENIX Security 2021/Fine Grained Dataflow Tracking with Proximal Gradients.mp4 7.1 MB
- USENIX Security 2022/PoisonedEncoder Poisoning the Unlabeled Pre-training Data in Contrastive.mp4 7.0 MB
- USENIX Security 2022/SGXFuzz Efficiently Synthesizing Nested Structures for SGX Enclave Fuzzing.mp4 7.0 MB
- USENIX Security 2023/Curve Trees Practical and Transparent Zero-Knowledge Accumulators.mp4 7.0 MB
- USENIX Security 2022/Playing for K(H)eaps Understanding and Improving Linux Kernel Exploit.mp4 7.0 MB
- USENIX Security 2021/Blind In On-Path Attacks and Applications to VPNs.mp4 7.0 MB
- USENIX Security 2020/USENIX Security 2020 Videos/AURORA Statistical Crash Analysis for Automated Root Cause Explanation.mp4 7.0 MB
- USENIX Security 2022/A Large-scale Temporal Measurement of Android Malicious Apps.mp4 7.0 MB
- USENIX Security 2023/CarpetFuzz Automatic Program Option Constraint Extraction from.mp4 7.0 MB
- USENIX Security 2021/Jetset Targeted Firmware Rehosting for Embedded Systems.mp4 7.0 MB
- USENIX Security 2022/FRAMESHIFTER Security Implications of HTTP 2-to-HTTP 1 Conversion Anomalies.mp4 6.9 MB
- USENIX Security 2023/The Case for Learned Provenance Graph Storage Systems.mp4 6.9 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Stolen Memories Leveraging Model Memorization for Calibrated White-Box.mp4 6.9 MB
- USENIX Security 2021/Why Older Adults (Don't) Use Password Managers.mp4 6.9 MB
- USENIX Security 2023/BotScreen Trust Everybody, but Cut the Aimbots Yourself.mp4 6.9 MB
- USENIX Security 2020/USENIX Security 2020 Videos/High Accuracy and High Fidelity Extraction of Neural Networks.mp4 6.9 MB
- USENIX Security 2022/SWAPP A New Programmable Playground for Web Application Security.mp4 6.9 MB
- USENIX Security 2023/Systematic Assessment of Fuzzers using Mutation Analysis.mp4 6.9 MB
- FOCI 2020/Identifying Disinformation Websites Using Infrastructure Features.mp4 6.9 MB
- USENIX Security 2020/PEPR '20/PEPR 20 - Building an Effective Feedback Loop for Your Privacy Program through Privacy Incident.mp4 6.9 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Poison Over Troubled Forwarders A Cache Poisoning Attack Targeting DNS.mp4 6.8 MB
- USENIX Security 2021/Explanation Beats Context The Effect of Timing & Rationales on Users'.mp4 6.8 MB
- USENIX Security 2021/PrimeProbe 1, JavaScript 0 Overcoming Browser-based Side-Channel Defenses.mp4 6.8 MB
- USENIX Security 2023/Uncontained Uncovering Container Confusion in the Linux Kernel.mp4 6.8 MB
- USENIX Security 2023/A Verified Confidential Computing as a Service Framework for Privacy.mp4 6.8 MB
- USENIX Security 2010/USENIX Security 2010 Presentations/How Cyber Attacks Will Be Used in International Conflicts - Scott Borg.pdf 6.7 MB
- USENIX Security 2021/Does logic locking work with EDA tools.mp4 6.7 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Exploring Connections Between Active Learning and Model Extraction.mp4 6.7 MB
- USENIX Security 2023/(M)WAIT for It Bridging the Gap between Microarchitectural and.mp4 6.7 MB
- USENIX Security 2022/TLS-Anvil Adapting Combinatorial Testing for TLS Libraries.mp4 6.7 MB
- USENIX Security 2022/Loki Hardening Code Obfuscation Against Automated Attacks.mp4 6.7 MB
- USENIX Security 2021/Why TLS is better without STARTTLS A Security Analysis of STARTTLS.mp4 6.7 MB
- USENIX Security 2012/USENIX Security 2012 Videos/Welcome - Tadayoshi Kohno.mp4 6.7 MB
- USENIX Security 2021/It's the Company, the Government, You and I - User Perceptions of.mp4 6.6 MB
- USENIX Security 2022/Synthetic Data - Anonymisation Groundhog Day.mp4 6.6 MB
- USENIX Security 2021/I Always Feel Like Somebody's Sensing Me A Framework to Detect, Identify, and.mp4 6.6 MB
- USENIX Security 2021/Leakage of Dataset Properties in Multi-Party Machine Learning.mp4 6.5 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Empirical Measurement of Systemic 2FA Usability.mp4 6.5 MB
- USENIX Security 2021/Raccoon Attack Finding and Exploiting Most-Significant-Bit-Oracles.mp4 6.5 MB
- USENIX Security 2021/PEARL Plausibly Deniable Flash Translation Layer using WOM coding.mp4 6.5 MB
- USENIX Security 2021/Shhhbe quiet - Reducing the Unwanted Interruptions of Notification.mp4 6.5 MB
- USENIX Security 2021/Poseidon A New Hash Function for Zero-Knowledge Proof Systems.mp4 6.5 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/Let Me Answer That for You Exploiting Broadcast Information in Cellular Networks Slides - Nico Golde, Kévin Redon, and Jean-Pierre Seifert.pdf 6.4 MB
- USENIX Security 2021/PTAuth Temporal Memory Safety via Robust Points-to Authentication.mp4 6.4 MB
- USENIX Security 2021/Swivel Hardening WebAssembly against Spectre.mp4 6.4 MB
- USENIX Security 2009/USENIX Security 2009 Presentations/Static Enforcement of Web Application Integrity Through Strong Typing Slides - William Robertson, Giovanni Vigna.pdf 6.4 MB
- USENIX Security 2020/USENIX Security 2020 Videos/Zero-delay Lightweight Defenses against Website Fingerprinting.mp4 6.3 MB
- USENIX Security 2021/SHARD Fine-Grained Kernel Specialization with Context-Aware Hardening.mp4 6.2 MB
- USENIX Security 2022/Minefield A Software-only Protection for SGX Enclaves against DVFS Attacks.mp4 6.2 MB
- USENIX Security 2022/On the Necessity of Auditable Algorithmic Definitions for Machine Unlearning.mp4 6.2 MB
- FOCI 2020/HTTPT A Probe-Resistant Proxy.mp4 6.2 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/BareCloud Bare-metal Analysis-based Evasive Malware Detection Slides - Dhilung Kirat, Giovanni Vigna, Christopher Kruegel.pdf 6.1 MB
- USENIX Security 2021/Mystique Efficient Conversions for Zero-Knowledge Proofs with Applications.mp4 6.0 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/You Are How You Click Clickstream Analysis for Sybil Detection Slides - Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng, Ben Y. Zhao.pdf 5.9 MB
- USENIX Security 2021/Obfuscation-Resilient Executable Payload Extraction From Packed Malware.mp4 5.9 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/Oxymoron Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing Slides - Michael Backes, Stefan Nurnberger.pdf 5.8 MB
- FOCI 2023/FOCI 2023 Awards and Closing.mp4 5.8 MB
- USENIX Security 2021/MBA-Blast Unveiling and Simplifying Mixed Boolean-Arithmetic Obfuscation.mp4 5.8 MB
- USENIX Security 2021/Cost-Aware Robust Tree Ensembles for Security Applications.mp4 5.8 MB
- USENIX Security 2022/Uninvited Guests Analyzing the Identity and Behavior of Certificate.mp4 5.8 MB
- USENIX Security 2020/PEPR '20/PEPR 20 - Throwing Out the Checklist.mp4 5.8 MB
- USENIX Security 2012/USENIX Security 2012 Presentations/Aurasium Practical Policy Enforcement for Android Applications Slides - Rubin Xu, Hassen Saidi, Ross Anderson.pdf 5.7 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies Slides - Sven Bugiel, Stephan Heuser, Ahmad-Reza Sadeghi.pdf 5.6 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/Greystar Fast and Accurate Detection of SMS Spam Numbers in Large Cellular Networks Using Gray Phone Space - Nan Jiang, Yu Jin, Ann Skudlark, Zhi-Li Zhang.pdf 5.6 MB
- USENIX Security 2022/Jenny Securing Syscalls for PKU-based Memory Isolation Systems.mp4 5.6 MB
- USENIX Security 2009/USENIX Security 2009 Presentations/How the Pursuit of Truth Led Me to Selling Viagra - Vern Paxson.pdf 5.6 MB
- USENIX Security 2021/Token-Level Fuzzing.mp4 5.5 MB
- USENIX Security 2022/Investigating State-of-the-Art Practices for Fostering Subjective Trust in.mp4 5.5 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/Gyrophone Recognizing Speech from Gyroscope Signals Slides - Yan Michalevsky, Dan Boneh, Gabi Nakibly.pdf 5.4 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/The Emperor’s New Password Manager Security Analysis of Web-based Password Managers Slides - Zhiwei Li, Warren He, Devdatta Akhawe, Dawn Song.pdf 5.4 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/A Bayesian Approach to Privacy Enforcement in Smartphones Slides - Omer Tripp, Julia Rubin.pdf 5.4 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/When Governments Hack Opponents A Look at Actors and Technology - William R. Marczak, John Scott-Railton, Morgan Marquis-Boire, Vern Paxson.pdf 5.2 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/Securing Embedded User Interfaces Android and Beyond Slides - Franziska Roesner, Tadayoshi Kohnos.pdf 5.1 MB
- USENIX Security 2011/USENIX Security 2011 Presentations/Telex Anticensorship in the Network Infrastructure Slides - Eric Wustrow, Scott Wolchok, Ian Goldberg, J. Alex Halderman.pdf 5.0 MB
- USENIX Security 2008/USENIX Security 2008 Presentations/Political DDoS Estonia and Beyond Slides - Jose Nazario.pdf 4.9 MB
- USENIX Security 2011/USENIX Security 2011 Presentations/Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade Slides - Nektarios Leontiadis, Tyler Moore, Nicolas Christin.pdf 4.8 MB
- USENIX Security 2012/USENIX Security 2012 Presentations/STING Finding Name Resolution Vulnerabilities in Programs Slides - Hayawardh Vijayakumar, Joshua Schiffman, Trent Jaeger.pdf 4.8 MB
- USENIX Security 2009/USENIX Security 2009 Presentations/Designing Trustworthy User Agents for a Hostile Web Slides - Eric Lawrence.pdf 4.8 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/Practical Comprehensive Bounds on Surreptitious Communication over DNS - Rao, Reiner Sailer, Douglas Lee Schales, Marc Ph. Stoecklin, Kurt Thomas, Wietse Venema.pdf 4.7 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/Man vs. Machine Practical Adversarial Detection of Malicious Crowdsourcing Workers Slides - Gang Wang, Tianyi Wang, Santa Barbara, Haitao Zheng, Ben Y. Zhao.pdf 4.7 MB
- USENIX Security 2011/USENIX Security 2011 Presentations/deSEO Combating Search-Result Poisoning Slides - John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy, Martin Abadi.pdf 4.6 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/Automatically Detecting Vulnerable Websites Before They Turn Malicious Slides - Kyle Soska, Nicolas Christin.pdf 4.5 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/Never Been KIST Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport Slides - Rob Jansen, John Geddes, Chris Wacek, Micah Sherr, Paul Syverson.pdf 4.4 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/On the Security of Picture Gesture Authentication - Ziming Zhao, Gail-Joon Ahn, Jeong-Jin Seo, Hongxin Hu.pdf 4.4 MB
- USENIX Security 2011/USENIX Security 2011 Presentations/ADsafety Type-Based Verification of JavaScript Sandboxing Slides - Joe Gibbs Politz, Spiridon Aristides Eliopoulos, Arjun Guha, Shriram Krishnamurthi.pdf 4.3 MB
- USENIX Security 2011/USENIX Security 2011 Presentations/Crossing the Chasm Pitching Security Research to Mainstream Browser Vendors - Collin Jackson.pdf 4.3 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/SpanDex Secure Password Tracking for Android Slides - Landon P. Cox , Peter Gilbert, Geoffrey Lawler, Valentin Pistol, Ali Razeen, Bi Wu, Sai Cheemalapati.pdf 4.2 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/An Internet-Wide View of Internet-Wide Scanning Slides - Zakir Durumeric, Michael Bailey, J. Alex Halderman.pdf 4.2 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/LibFTE A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes Slides - Daniel Luchaup, Kevin P. Dyer, Somesh Jha, Thomas Ristenpart, Thomas Shrimpt.pdf 4.1 MB
- USENIX Security 2011/USENIX Security 2011 Presentations/Outsourcing the Decryption of ABE Ciphertexts Slides - Matthew Green, Susan Hohenberger, Brent Waters.pdf 4.1 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation - Frank Imeson, Ariq Emtenan, Siddharth Garg, and Mah.pdf 3.9 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/Security Analysis of a Full-Body Scanner - Keaton Mowery, Eric Wustrow, Tom Wypych, Corey Singleton, Chris Comfort, Eric Rescorla, Stephen Checkoway, J. Alex Halder.pdf 3.9 MB
- USENIX Security 2012/USENIX Security 2012 Presentations/Security and Usability Challenges of Moving-Object CAPTCHAs Decoding Codewords in Motion Slides - Y. Xu, G. Reynaga, S. Chiasson, J.-M. Frahm, F. Monrose, P. van Oorschot.pdf 3.9 MB
- USENIX Security 2012/USENIX Security 2012 Presentations/New Attacks on Timing-based Network Flow Watermarks Slides - Zi Lin, Nicholas Hopper.pdf 3.8 MB
- USENIX Security 2011/USENIX Security 2011 Presentations/Show Me the Money Characterizing Spam-advertised Revenue Slides - Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorso, Christian Kreibich, Kirill Levchenko.pdf 3.8 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/Scheduler-based Defenses against Cross-VM Side-channels Slides - Venkatanathan Varadarajan, Thomas Ristenpart, Michael Swift.pdf 3.7 MB
- USENIX Security 2009/USENIX Security 2009 Presentations/The Building Security in Maturity Model (BSIMM) - Gary McGraw, Brian Chess.pdf 3.7 MB
- USENIX Security 2009/USENIX Security 2009 Presentations/The Building Security in Maturity Model (BSIMM) Slides - Gary McGraw, Brian Chess.pdf 3.7 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/Targeted Threat Index Characterizing and Quantifying Politically-Motivated Targeted Malware - Seth Hardy, Masashi Crete-Nishihata, Katharine Kleemola, Adam Senft, B.pdf 3.7 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers - Suman Jana, David Molnar, Alexander Moshchuk, Alan Dunn, Benjamin Livshits, .pdf 3.6 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/Burst ORAM Minimizing ORAM Response Times for Bursty Access Patterns - Jonathan Dautrich, University of California, Riverside; Emil Stefanov, Elaine Shi.pdf 3.6 MB
- USENIX Security 2010/USENIX Security 2010 Presentations/Grid, PhD Smart Grid, Cyber Security, and the Future of Keeping the Lights On - Kelly Ziegler.pdf 3.6 MB
- USENIX Security 2009/USENIX Security 2009 Presentations/Vanish Increasing Data Privacy with Self-Destructing Data Slides - Roxana Geambasu, Tadayoshi Kohno, Amit A. Levy, Henry M. Levy.pdf 3.6 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/Peeking into Your App without Actually Seeing It UI State Inference and Novel Android Attacks Slides - Qi Alfred Chen, Zhiyun Qian, Z. Morley Mao.pdf 3.6 MB
- USENIX Security 2012/USENIX Security 2012 Presentations/Clickjacking Attacks and Defenses Slides Slides - Lin-Shung Huang, Alex Moshchuk, Helen J. Wang, Stuart Schechter, Collin Jackson.pdf 3.6 MB
- USENIX Security 2011/USENIX Security 2011 Presentations/SMS of Death From Analyzing to Attacking Mobile Phones on a Large Scale Slides - Collin Mulliner, Nico Golde, Jean-Pierre Seifert.pdf 3.5 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/The Velocity of Censorship High-Fidelity Detection of Microblog Post Deletions Slides - Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall.pdf 3.5 MB
- USENIX Security 2012/USENIX Security 2012 Presentations/Social Networking with Frientegrity Privacy and Integrity with an Untrusted Provider Slides - Ariel J. Feldman, Aaron Blankstein, Michael J. Freedman, Edward W. Felten.pdf 3.4 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/Gyrophone Recognizing Speech from Gyroscope Signals - Yan Michalevsky, Dan Boneh, Gabi Nakibly.pdf 3.3 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation Slides - Frank Imeson, Ariq Emtenan, Siddharth Garg.pdf 3.3 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers Slides - Suman Jana, David Molnar, Alexander Moshchuk, Alan Dunn, Benjamin Liv.pdf 3.2 MB
- USENIX Security 2012/USENIX Security 2012 Presentations/Privacy-Preserving Social Plugins Slides - Georgios Kontaxis, Michalis Polychronakis, Angelos D. Keromytis, Evangelos P. Markatos.pdf 3.2 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/On the Security of RC4 in TLS Slides - Nadhem AlFardan, Royal Holloway, Daniel J. Bernstein, Kenneth G. Paterson, Bertram Poettering, Jacob C.N. Schuldt.pdf 3.1 MB
- USENIX Security 2009/USENIX Security 2009 Presentations/USENIX Security 2009 Track - Attacks.pdf 3.1 MB
- USENIX Security 2010/USENIX Security 2010 Presentations/Staying Safe on the Web Yesterday, Today, and Tomorrow - Sid Stamm.pdf 3.0 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/SDDR Light-Weight, Secure Mobile Encounters Slides - Matthew Lentz, Viktor Erdélyi, Paarijaat Aditya, Elaine Shi, Peter Druschel, Bobby Bhattacharjee.pdf 2.9 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/A Large-Scale Analysis of the Security of Embedded Firmwares Slides - Andrei Costin, Jonas Zaddach, Aurelien Francillon, and Davide Balzarotti.pdf 2.9 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/On the Feasibility of Large-Scale Infections of iOS Devices Slides - Tielei Wang, Yeongjin Jang, Yizheng Chen, Simon Chung, Billy Lau, Wenke Lee costin.pdf 2.9 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/Let Me Answer That for You Exploiting Broadcast Information in Cellular Networks - Nico Golde, Kévin Redon, and Jean-Pierre Seifert.pdf 2.9 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/Towards Detecting Anomalous User Behavior in Online Social Networks Slides - Bimal Viswanath, M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna P. Gummadi, Max P.pdf 2.8 MB
- USENIX Security 2009/USENIX Security 2009 Presentations/Top Ten Web Hacking Techniques of 2008 What's possible, not probable - Jeremiah Grossman.pdf 2.8 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/Trafficking Fraudulent Accounts The Role of the Underground Market in Twitter Spam and Abuse Slides - Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, Vern Paxson.pdf 2.8 MB
- USENIX Security 2011/USENIX Security 2011 Presentations/Faster Secure Two-Party Computation Using Garbled Circuits Slides - Yan Huang, David Evans, Jonathan Katz.pdf 2.8 MB
- USENIX Security 2011/USENIX Security 2011 Presentations/The Cloud-y Future of Security Technologies - Adam O'Donnell.pdf 2.8 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/Brahmastra Driving Apps to Test the Security of Third-Party Components Slides - Ravi Bhoraskar, Seungyeop Han, Jinseong Jeon, Tanzirul Azim, Shuo Chen, Jaeyeon Jung.pdf 2.8 MB
- USENIX Security 2012/USENIX Security 2012 Presentations/Efficient and Scalable Socware Detection in Online Social Networks Slides - Md Sazzadur Rahman, Ting-Kai Huang, Harsha V. Madhyastha, Michalis Faloutsos.pdf 2.7 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/Telepathwords Preventing Weak Passwords by Reading Users’ Minds Slides - Saranga Komanduri, Richard Shay, Lorrie Faith Cranor, Cormac Herley Stuart Schechter.pdf 2.7 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/Take This Personally Pollution Attacks on Personalized Services - Xinyu Xing, Wei Meng, Dan Doozan, Alex C. Snoeren, Nick Feamster, Wenke Lee.pdf 2.7 MB
- USENIX Security 2012/USENIX Security 2012 Presentations/Enemy of the State A State-Aware Black-Box Web Vulnerability Scanner Slides - Adam Doupe, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna.pdf 2.7 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/JIGSAW Protecting Resource Access by Inferring Programmer Expectations Slides - Hayawardh Vijayakumar, Xinyang Ge, Mathias Payer, Trent Jaeger.pdf 2.7 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/ret2dir Rethinking Kernel Isolation Slides - Vasileios P. Kemerlis, Michalis Polychronakis, Angelos D. Keromytis.pdf 2.7 MB
- USENIX Security 2011/USENIX Security 2011 Presentations/Q Exploit Hardening Made Easy Slides - Edward J. Schwartz, Thanassis Avgerinos, David Brumley.pdf 2.6 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/Jekyll on iOS When Benign Apps Become Evil - Tielei Wang, Kangjie Lu, Long Lu, Simon Chung, Wenke Lee.pdf 2.6 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/Securing Embedded User Interfaces Android and Beyond - Franziska Roesner, Tadayoshi Kohno.pdf 2.6 MB
- USENIX Security 2012/USENIX Security 2012 Presentations/How Does Your Password Measure Up - The Effect of Strength Meters on Password Creation Slides - Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michell.pdf 2.6 MB
- USENIX Security 2011/USENIX Security 2011 Presentations/The (Decentralized) SSL Observatory - Peter Eckersley, Jesse Burns.pdf 2.5 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/DSCRETE Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse Slides - Brendan Saltaformaggio, Zhongshu Gu, Xiangyu Zhang, Dong.pdf 2.5 MB
- USENIX Security 2009/USENIX Security 2009 Presentations/USENIX Security 2009 Track - Securing Web Apps.pdf 2.5 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/Transparent ROP Exploit Mitigation Using Indirect Branch Tracing - Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis.pdf 2.4 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/Impression Fraud in On-line Advertising via Pay-Per-View Networks - Kevin Springborn, Paul Barford.pdf 2.4 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/Automatic Mediation of Privacy-Sensitive Resource Access in Smartphone Applications - Benjamin Livshits, Jaeyeon Jung.pdf 2.4 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/Language-based Defenses Against Untrusted Browser Origins - Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Sergio Maffeisn.pdf 2.4 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/TRUESET Faster Verifiable Set Computations - Ahmed E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Mahmoud F. Sayed, Elaine Shi, Nikos Triandopoulos.pdf 2.4 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/Secure Outsourced Garbled Circuit Evaluation for Mobile Devices - Henry Carter, Benjamin Mood, Patrick Traynor, Kevin Butler.pdf 2.4 MB
- USENIX Security 2011/USENIX Security 2011 Presentations/Telex Anticensorship in the Network Infrastructure - Eric Wustrow, Scott Wolchok, Ian Goldberg, J. Alex Halderman.pdf 2.4 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/Dowsing for Overflows A Guided Fuzzer to Find Buffer Boundary Violations - Istvan Haller, Asia Slowinska, Matthias Neugschwandtner, Herbert Bos.pdf 2.3 MB
- USENIX Security 2011/USENIX Security 2011 Presentations/Dirty Jobs The Role of Freelance Labor in Web Service Abuse Slides - motoyama.pdf 2.3 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/Explicating SDKs Uncovering Assumptions Underlying Secure Authentication and Authorization - Rui Wang, Yuchen Zhou, Shuo Chen, Shaz Qadeer, David Evans, Yuri Gurevi.pdf 2.3 MB
- USENIX Security 2011/USENIX Security 2011 Presentations/Measuring Pay-per-Install The Commoditization of Malware Distribution Slides - Juan Caballero, Chris Grier, Christian Kreibich, Vern Paxson.pdf 2.3 MB
- USENIX Security 2012/USENIX Security 2012 Presentations/Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization Slides - Cristiano Giuffrida, Anton Kuijsten, Andrew S. Tanenbaum.pdf 2.3 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/Stitching the Gadgets On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection Slides - Lucas Davi, Ahmad-Reza Sadeghi, Daniel Lehmann, Fabian Mon.pdf 2.3 MB
- USENIX Security 2011/USENIX Security 2011 Presentations/ZOZZLE Fast and Precise In-Browser JavaScript Malware Detection - Charlie Curtsinger, Benjamin Livshits, Benjamin Zorn, Christian Seifert.pdf 2.3 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/Alice in Warningland A Large-Scale Field Study of Browser Security Warning Effectiveness - Devdatta Akhawe, Adrienne Porter Felt.pdf 2.2 MB
- USENIX Security 2012/USENIX Security 2012 Presentations/TARDIS Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without Clocks - Amir Rahmati, Mastooreh Salajegheh, Dan Holcomb, Jacob Sorber, Wayne P..pdf 2.2 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/SSOScan Automated Testing of Web Applications for Single Sign-On Vulnerabilities Slides - Yuchen Zhou, David Evans.pdf 2.2 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/You Are How You Click Clickstream Analysis for Sybil Detection - Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng, Ben Y. Zhao.pdf 2.2 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/KI-Mon A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel Object - Hojoon Lee, HyunGon Moon, DaeHee Jang, Kihwan Kim, Jihoon Lee, Yunheung P.pdf 2.2 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/Revolver An Automated Approach to the Detection of Evasive Web-based Malware - Alexandros Kapravelos, Yan Shoshitaishvili, Marco Cova, Christopher Kruegel, Giovanni.pdf 2.2 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/ExecScent Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates - Terry Nelms, Roberto Perdisci, Mustaque Ahamad.pdf 2.2 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/Password Managers Attacks and Defenses Slides - David Silver, Suman Jana, and Dan Boneh, Stanford University; Eric Chen, Collin Jackson.pdf 2.2 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies - Sven Bugiel, Stephan Heuser, Ahmad-Reza Sadeghi.pdf 2.2 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/Measuring the Practical Impact of DNSSEC Deployment - Wilson Lian, Eric Rescorla, Hovav Shacham, Stefan Savage.pdf 2.2 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/Towards Reliable Storage of 56-bit Secrets in Human Memory Slides - Joseph Bonneau, Princeton University; Stuart Schechter.pdf 2.2 MB
- USENIX Security 2012/USENIX Security 2012 Presentations/kGuard Lightweight Kernel Protection against Return-to-User Attacks Slides - Vasileios P. Kemerlis, Georgios Portokalidis, and Angelos D. Keromytis.pdf 2.2 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/Proactively Accountable Anonymous Messaging in Verdict - Henry Corrigan-Gibbs, David Isaac Wolinsky, Bryan Ford.pdf 2.2 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/Explicating SDKs Uncovering Assumptions Underlying Secure Authentication and Authorization Slides - Rui Wang, Yuchen Zhou, Shuo Chen, Shaz Qadeer, David Evans, Yuri.pdf 2.2 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/The Velocity of Censorship High-Fidelity Detection of Microblog Post Deletions - Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall.pdf 2.2 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/Hulk Eliciting Malicious Behavior in Browser Extensions Slides - Alexandros Kapravelos, Chris Grier, Neha Chachra, Christopher Kruegel, Giovanni Vigna, Vern Paxson.pdf 2.2 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/Effective Inter-Component Communication Mapping in Android An Essential Step Towards Holistic Security Analysis - Damien Octeau, Patrick McDaniel, Somesh Jha, Alexa.pdf 2.2 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/SDDR Light-Weight, Secure Mobile Encounters - Matthew Lentz, Viktor Erdélyi, Paarijaat Aditya, Elaine Shi, Peter Druschel, Bobby Bhattacharjee.pdf 2.2 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/Towards Automatic Software Lineage Inference - Jiyong Jang, Maverick Woo, David Brumley.pdf 2.1 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/Mimesis Aegis A Mimicry Privacy Shield-A System’s Approach to Data Privacy on Public Cloud Slides - Billy Lau, Simon Chung, Chengyu Song, Yeongjin Jang, Wenke Lee.pdf 2.1 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/Exit from Hell Reducing the Impact of Amplification DDoS Attacks - Marc Kuhrer, Thomas Hupperich, Christian Rossow, Thorsten Holz.pdf 2.1 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/ExecScent Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates Slides - Terry Nelms, Roberto Perdisci, Mustaque Ahamad.pdf 2.1 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring - Edward J. Schwartz, JongHyup Lee, Maverick Woo, Dav.pdf 2.1 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/Strato A Retargetable Framework for Low-Level Inlined-Reference Monitors Slides - Bin Zeng, Gang Tan, Ulfar Erlingsson.pdf 2.1 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/On the Security of RC4 in TLS - Nadhem AlFardan, Royal Holloway, Daniel J. Bernstein, Kenneth G. Paterson, Bertram Poettering, Jacob C.N. Schuldt.pdf 2.1 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/Steal This Movie Automatically Bypassing DRM Protection in Streaming Media Services Slides - Ruoyu Wang, Santa Barbara, Yan Shoshitaishvili, Christopher Kruegel, Gi.pdf 2.1 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/WHYPER Towards Automating Risk Assessment of Mobile Applications - Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, Tao Xie.pdf 2.1 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/An Empirical Study of Vulnerability Rewards Programs - Matthew Finifter, Devdatta Akhawe, David Wagner.pdf 2.1 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/Trafficking Fraudulent Accounts The Role of the Underground Market in Twitter Spam and Abuse - Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, Vern Paxson.pdf 2.1 MB
- USENIX Security 2011/USENIX Security 2011 Presentations/Privacy in the Age of Augmented Reality - Alessandro Acquisti.pdf 2.0 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/ZQL A Compiler for Privacy-Preserving Data Processing - Cedric Fournet, Markulf Kohlweiss, George Danezis.pdf 2.0 MB
- USENIX Security 2020/USENIX Security 2020 Videos/VoteAgain A scalable coercion-resistant voting system.mp4 2.0 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/LibFTE A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes - Daniel Luchaup, Kevin P. Dyer, Somesh Jha, Thomas Ristenpart, Thomas Shrimpton.pdf 2.0 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/MetaSymploit Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis - Ruowen Wang, Peng Ning, Tao Xie, Quan Chen.pdf 2.0 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/Size Does Matter Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard Slides - Enes Goktas, Elias Athanasopoulos, Michalis Polychronakis, Herbert Bos.pdf 2.0 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/FIE on Firmware Finding Vulnerabilities in Embedded Systems Using Symbolic Execution - Drew Davidson, Benjamin Moench, Somesh Jha, Thomas Ristenpart.pdf 2.0 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/The Long Taile of Typosquatting Domain Names Slides - Janos Szurdi, Balazs Kocso, Gabor Cseh, Jonathan Spring, Mark Felegyhazi, Chris Kanich.pdf 2.0 MB
- USENIX Security 2012/USENIX Security 2012 Presentations/PharmaLeaks Understanding the Business of Online Pharmaceutical Affiliate Programs Slides - Damon McCoy, Andreas Pitsillidis, Grant Jordan, Nicholas Weaver, Christian Kreibich, B.pdf 2.0 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/Strato A Retargetable Framework for Low-Level Inlined-Reference Monitors - Bin Zeng, Gang Tan, Ulfar Erlingsson.pdf 2.0 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/CacheAudit A Tool for the Static Analysis of Cache Side Channels - Goran Doychev, Dominik Feld, Boris Kopf, Laurent Mauborgne, Jan Reineke.pdf 2.0 MB
- USENIX Security 2009/USENIX Security 2009 Presentations/Locating Prefix Hijackers using LOCK Slides - Tongqing Qiu, Lusheng Ji, Dan Pei, Jia Wang, Jun (Jim) Xu, Hitesh Ballani.pdf 2.0 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/DupLESS Server-Aided Encryption for Deduplicated Storage - Mihir Bellare, Sriram Keelveedhi, Thomas Ristenpart.pdf 2.0 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/Eradicating DNS Rebinding with the Extended Same-origin Policy - Martin Johns, Sebastian Lekies, Ben Stock.pdf 2.0 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/Control Flow Integrity for COTS Binaries - Mingwei Zhang, R. Sekar.pdf 2.0 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/Sancus Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base - Job Noorman, Pieter Agten, Wilfried Daniels, Raoul Strackx, A.pdf 2.0 MB
- USENIX Security 2009/USENIX Security 2009 Presentations/USENIX Security 2009 Track - Radio.pdf 2.0 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/A Bayesian Approach to Privacy Enforcement in Smartphones - Omer Tripp, Julia Rubin.pdf 2.0 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/PCF A Portable Circuit Format for Scalable Two-Party Secure Computation - Ben Kreuter, Benjamin Mood, Abhi Shelat, Kevin Butler.pdf 2.0 MB
- USENIX Security 2011/USENIX Security 2011 Presentations/Detecting Malware Domains at the Upper DNS Hierarchy Slides - Manos Antonakakis, Roberto Perdisci, Wenke Lee, Nikolaos Vasiloglou II, David Dagon.pdf 2.0 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/Steal This Movie Automatically Bypassing DRM Protection in Streaming Media Services - Ruoyu Wang, Santa Barbara, Yan Shoshitaishvili, Christopher Kruegel, Giovanni .pdf 1.9 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/Hulk Eliciting Malicious Behavior in Browser Extensions - Alexandros Kapravelos, Chris Grier, Neha Chachra, Christopher Kruegel, Giovanni Vigna, Vern Paxson.pdf 1.9 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/On the Security of Picture Gesture Authentication Slides - Ziming Zhao, Gail-Joon Ahn, Jeong-Jin Seo, Hongxin Hu.pdf 1.9 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/MetaSymploit Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis Slides - Ruowen Wang, Peng Ning, Tao Xie, Quan Chen.pdf 1.9 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/The Long Taile of Typosquatting Domain Names - Janos Szurdi, Balazs Kocso, Gabor Cseh, Jonathan Spring, Mark Felegyhazi, Chris Kanich.pdf 1.9 MB
- USENIX Security 2009/USENIX Security 2009 Presentations/xBook Redesigning Privacy Control in Social Networking Platforms - Kapil Singh, Sumeer Bhola, Wenke Lee.pdf 1.9 MB
- USENIX Security 2008/USENIX Security 2008 Presentations/Enterprise Security in the Brave New (Virtual) World - Tal Garfinkel.pdf 1.9 MB
- USENIX Security 2011/USENIX Security 2011 Presentations/Show Me the Money Characterizing Spam-advertised Revenue - Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorso, Christian Kreibich, Kirill Levchenko, Vern.pdf 1.9 MB
- USENIX Security 2009/USENIX Security 2009 Presentations/xBook Redesigning Privacy Control in Social Networking Platforms Slides - Kapil Singh, Sumeer Bhola, Wenke Lee.pdf 1.8 MB
- USENIX Security 2012/USENIX Security 2012 Presentations/On Breaking SAML Be Whoever You Want to Be Slides - Juraj Somorovsky, Andreas Mayer, Jorg Schwenk, Marco Kampmann, Meiko Jensen.pdf 1.8 MB
- USENIX Security 2008/USENIX Security 2008 Presentations/Lest We Remember - Cold Boot Attacks on Encryption Keys - J. Alex Haldermam, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ar.pdf 1.8 MB
- USENIX Security 2012/USENIX Security 2012 Presentations/Security and Usability Challenges of Moving-Object CAPTCHAs Decoding Codewords in Motion - Y. Xu, G. Reynaga, S. Chiasson, J.-M. Frahm, F. Monrose, P. van Oorschot.pdf 1.8 MB
- USENIX Security 2011/USENIX Security 2011 Presentations/BOTMAGNIFIER Locating Spambots on the Internet Slides - Gianluca Stringhini, Thorsten Holz, Brett Stone-Gross, Christopher Kruegel, Giovanni Vigna.pdf 1.8 MB
- USENIX Security 2011/USENIX Security 2011 Presentations/Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade - Nektarios Leontiadis, Tyler Moore, Nicolas Christin.pdf 1.8 MB
- USENIX Security 2012/USENIX Security 2012 Presentations/On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces - Ivan Martinovic, Doug Davies, Mario Frank, Daniele Perito, Tomas Ros, Dawn Song.pdf 1.8 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/Practical Comprehensive Bounds on Surreptitious Communication over DNS Slides - Rao, Reiner Sailer, Douglas Lee Schales, Marc Ph. Stoecklin, Kurt Thomas, Wietse Ven.pdf 1.8 MB
- USENIX Security 2007/Presentations/How To Obtain and Assert Composable Security - Ran Canetti.pdf 1.8 MB
- USENIX Security 2009/USENIX Security 2009 Presentations/Improving Tor using a TCP-over-DTLS Tunnel - Joel Reardon, Ian Goldberg.pdf 1.8 MB
- USENIX Security 2009/USENIX Security 2009 Presentations/Memory Safety for Low-Level Software Hardware Interactions Slides - John Criswell, Nicolas Geoffray, Pierre et Marie Curie, Vikram Adve.pdf 1.7 MB
- USENIX Security 2009/USENIX Security 2009 Presentations/Network Security - sec09_network.pdf 1.7 MB
- USENIX Security 2012/USENIX Security 2012 Presentations/Progressive Authentication Deciding When to Authenticate on Mobile Phones Slides - Oriana Riva, Chuan Qin, Karin Strauss, Dimitrios Lymberopoulos.pdf 1.7 MB
- USENIX Security 2012/USENIX Security 2012 Presentations/Progressive Authentication Deciding When to Authenticate on Mobile Phones - Oriana Riva, Chuan Qin, Karin Strauss, Dimitrios Lymberopoulos.pdf 1.7 MB
- USENIX Security 2012/USENIX Security 2012 Presentations/Whispers in the Hyper-space High-speed Covert Channel Attacks in the Cloud Slides Slides Zhenyu Wu, Zhang Xu, Haining Wang.pdf 1.7 MB
- USENIX Security 2009/USENIX Security 2009 Presentations/NOZZLE A Defense Against Heap-spraying Code Injection Attacks - Paruj Ratanaworabhan, Benjamin Livshits, Benjamin Zorn.pdf 1.7 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/An Empirical Study of Vulnerability Rewards Programs Slides Slides - Matthew Finifter, Devdatta Akhawe, David Wagner.pdf 1.7 MB
- USENIX Security 2009/USENIX Security 2009 Presentations/The Multi-Principal OS Construction of the Gazelle Web Browser Slides - Helen J. Wang, Chris Grier, Alex Moshchuk, Samuel T. King, Piali Choudhury, Herman Vente.pdf 1.6 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/TapDance End-to-Middle Anticensorship without Flow Blocking Slides - Eric Wustrow, Colleen M. Swanson, J. Alex Halderman.pdf 1.6 MB
- USENIX Security 2010/USENIX Security 2010 Presentations/Understanding CAPTCHA-Solving Services in an Economic Context - Marti Motoyama, Kirill Levchenko, Chris Kanich, Damon McCoy, Geoffrey M. Voelker, Stefan Savage.pdf 1.6 MB
- USENIX Security 2009/USENIX Security 2009 Presentations/Hash Functions and Their Many Uses in Cryptography - Shai Halevi.pdf 1.6 MB
- USENIX Security 2009/USENIX Security 2009 Presentations/CCCP Secure Remote Storage for Computational RFIDs Slides - Mastooreh Salajegheh, Shane Clark, Benjamin Ransford, Kevin Fu, Ari Juels.pdf 1.6 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/iSeeYou Disabling the MacBook Webcam Indicator LED - Matthew Brocker, Stephen Checkoway.pdf 1.5 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/Brahmastra Driving Apps to Test the Security of Third-Party Components - Ravi Bhoraskar, Seungyeop Han, Jinseong Jeon, Tanzirul Azim, Shuo Chen, Jaeyeon Jung, Suman.pdf 1.5 MB
- USENIX Security 2012/USENIX Security 2012 Presentations/Mining Your Ps and Qs Detection of Widespread Weak Keys in Network Devices Slides - Nadia Heninger, Zakir Durumeric, Eric Wustrow, J. Alex Halderm.pdf 1.5 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/Language-based Defenses Against Untrusted Browser Origins Slides - Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Sergio Maffeis.pdf 1.5 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture Slides - Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza.pdf 1.5 MB
- USENIX Security 2009/USENIX Security 2009 Presentations/Compromising Electromagnetic Emanations of Wired and Wireless Keyboards - Martin Vuagnoux, Sylvain Pasini.pdf 1.4 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/Understanding the Dark Side of Domain Parking - Sumayah Alrwais, Kan Yuan, Eihal Alowaisheq, Zhou Li, XiaoFeng Wang.pdf 1.4 MB
- USENIX Security 2012/USENIX Security 2012 Presentations/Tracking Rootkit Footprints with a Practical Memory Analysis System Slides - Weidong Cui, Marcus Peinado, Zhilei Xu, Ellick Chan.pdf 1.4 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/DupLESS Server-Aided Encryption for Deduplicated Storage Slides - Mihir Bellare, Sriram Keelveedhi, Thomas Ristenpart.pdf 1.4 MB
- USENIX Security 2009/USENIX Security 2009 Presentations/A Practical Congestion Attack on Tor Using Long Paths - Nathan S. Evans, Roger Dingledine, Christian Grothoff.pdf 1.4 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/Alice in Warningland A Large-Scale Field Study of Browser Security Warning Effectiveness Slides - Devdatta Akhawe, Adrienne Porter Felt.pdf 1.4 MB
- USENIX Security 2009/USENIX Security 2009 Presentations/JavaScript Security - sec09_javascript.pdf 1.4 MB
- USENIX Security 2011/USENIX Security 2011 Presentations/Dark Clouds on the Horizon Using Cloud Storage as Attack Vector and Online Slack Space Slides - Martin Mulazzani, Sebastian Schrittwieser, Manuel Leithner, Markus H.pdf 1.4 MB
- USENIX Security 2010/USENIX Security 2010 Presentations/Building a Dynamic Reputation System for DNS - Manos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee, Nick Feamster.pdf 1.4 MB
- USENIX Security 2011/USENIX Security 2011 Presentations/A Study of Android Application Security - William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri.pdf 1.3 MB
- USENIX Security 2009/USENIX Security 2009 Presentations/A Practical Congestion Attack on Tor Using Long Paths Slides - Nathan S. Evans, Roger Dingledine, Christian Grothoff.pdf 1.3 MB
- USENIX Security 2011/USENIX Security 2011 Presentations/Measuring Pay-per-Install The Commoditization of Malware Distribution - Juan Caballero, Chris Grier, Christian Kreibich, Vern Paxson.pdf 1.3 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/Revisiting SSL-TLS Implementations New Bleichenbacher Side Channels and Attacks Slides - Christopher Meyer, Juraj Somorovsky, Eugen Weiss, Jorg Schwenk, Sebastian S.pdf 1.3 MB
- USENIX Security 2012/USENIX Security 2012 Presentations/New Attacks on Timing-based Network Flow Watermarks - Zi Lin, Nicholas Hopper.pdf 1.3 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/FIE on Firmware Finding Vulnerabilities in Embedded Systems Using Symbolic Execution Slides - Drew Davidson, Benjamin Moench, Somesh Jha, Thomas Ristenpart.pdf 1.3 MB
- USENIX Security 2013/USENIX Security 2013 Presentations/Secure Outsourced Garbled Circuit Evaluation for Mobile Devices Slides - Henry Carter, Benjamin Mood, Patrick Traynor, Kevin Butler.pdf 1.3 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/Faster Private Set Intersection Based on OT Extension Slides - Benny Pinkas, Thomas Schneider, Michael Zohner.pdf 1.3 MB
- USENIX Security 2010/USENIX Security 2010 Presentations/Security and Privacy Vulnerabilities of In-Car Wireless Networks A Tire Pressure Monitoring System Case Study - Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis Tay.pdf 1.2 MB
- USENIX Security 2012/USENIX Security 2012 Presentations/How Does Your Password Measure Up - The Effect of Strength Meters on Password Creation - Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Ma.pdf 1.2 MB
- USENIX Security 2012/USENIX Security 2012 Presentations/Neuroscience Meets Cryptography Designing Crypto Primitives Secure Against Rubber Hose Attacks Slides - Hristo Bojinov, Daniel Sanchez, Paul Reber, Northw.pdf 1.2 MB
- USENIX Security 2009/USENIX Security 2009 Presentations/Peeping Tom in the Neighborhood Keystroke Eavesdropping on Multi-User Systems Slides - Kehuan Zhang, XiaoFeng Wang.pdf 1.2 MB
- USENIX Security 2012/USENIX Security 2012 Presentations/An Evaluation of the Google Chrome Extension Security Architecture Slides -Slides - Nicholas Carlini, Adrienne Porter Felt, David Wagner.pdf 1.2 MB
- USENIX Security 2011/USENIX Security 2011 Presentations/QUIRE Lightweight Provenance for Smart Phone Operating Systems - Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anhei Shu, Dan S. Wallach.pdf 1.2 MB
- USENIX Security 2007/Presentations/On Attack Causality in Internet-Connected Cellular Networks - Patrick Traynor, Patrick McDaniel, Thomas La Porta.pdf 1.2 MB
- USENIX Security 2009/USENIX Security 2009 Presentations/Malware Detection and Protection.pdf 1.2 MB
- USENIX Security 2008/USENIX Security 2008 Presentations/Helios Web-based Open-Audit Voting - Ben Adida.pdf 1.2 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/Precise Client-side Protection against DOM-based Cross-Site Scripting Slides - Ben Stock, Sebastian Lekies, Tobias Mueller, Patrick Spiegel, and Martin Johns.pdf 1.2 MB
- USENIX Security 2010/USENIX Security 2010 Presentations/Fighting Coercion Attacks in Key Generation using Skin Conductance - Payas Gupta, Debin Gao.pdf 1.2 MB
- USENIX Security 2007/Presentations/Mobile Malware - Mikko Hypponen.pdf 1.2 MB
- USENIX Security 2011/USENIX Security 2011 Presentations/Detecting Malware Domains at the Upper DNS Hierarchy - Manos Antonakakis, Roberto Perdisci, Wenke Lee, Nikolaos Vasiloglou II, David Dagon.pdf 1.1 MB
- USENIX Security 2011/USENIX Security 2011 Presentations/Comprehensive Experimental Analyses of Automotive Attack Surfaces - Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl.pdf 1.1 MB
- USENIX Security 2012/USENIX Security 2012 Presentations/Throttling Tor Bandwidth Parasites - Rob Jansen, Paul Syverson, Nicholas Hopper.pdf 1.1 MB
- USENIX Security 2012/USENIX Security 2012 Presentations/PharmaLeaks Understanding the Business of Online Pharmaceutical Affiliate Programs - Damon McCoy, Andreas Pitsillidis, Grant Jordan, Nicholas Weaver, Christian Kreibich, Brian Kr.pdf 1.1 MB
- USENIX Security 2012/USENIX Security 2012 Presentations/STEALTHMEM System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud Slides - Taesoo Kim, Marcus Peinado, Gloria Mainar-Ruiz.pdf 1.1 MB
- USENIX Security 2009/USENIX Security 2009 Presentations/Crying Wolf An Empirical Study of SSL Warning Effectiveness Slides - Joshua Sunshine, Serge Egelman, Hazim Almuhimedi, Neha Atri, Lorrie Faith Cranor.pdf 1.1 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/TRUESET Faster Verifiable Set Computations Slides - Ahmed E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Mahmoud F. Sayed, Elaine Shi, Nikos Triandopoul.pdf 1.1 MB
- USENIX Security 2012/USENIX Security 2012 Presentations/Establishing Browser Security Guarantees through Formal Shim Verification Slides - Dongseok Jang, Zachary Tatlock, Sorin Lerner.pdf 1.1 MB
- USENIX Security 2011/USENIX Security 2011 Presentations/Toward Secure Embedded Web Interfaces - Baptiste Gourdin, Chinmay Soman, Hristo Bojinov, Elie Bursztein.pdf 1.1 MB
- USENIX Security 2012/USENIX Security 2012 Presentations/Clickjacking Attacks and Defenses - Lin-Shung Huang, Alex Moshchuk, Helen J. Wang, Stuart Schechter, Collin Jackson.pdf 1.1 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/Optimizing Seed Selection for Fuzzing Slides - Alexandre Rebert, Sang Kil Cha, Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, David Brumley.pdf 1.1 MB
- USENIX Security 2009/USENIX Security 2009 Presentations/Baggy Bounds Checking An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors - Periklis Akritidis, Manuel Costa, Miguel Castro, Steven Hand.pdf 1.0 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/Exit from Hell Reducing the Impact of Amplification DDoS Attacks Slides - Marc Kuhrer, Thomas Hupperich, Christian Rossow, Thorsten Holz.pdf 1.0 MB
- USENIX Security 2011/USENIX Security 2011 Presentations/deSEO Combating Search-Result Poisoning - John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy, Martin Abadi.pdf 1.0 MB
- USENIX Security 2008/USENIX Security 2008 Presentations/Panalyst Privacy-Aware Remote Error Analysis on Commodity Software - Rui Wang, XiaoFeng Wang, Zhuowei Li.pdf 1.0 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/ASM A Programmable Interface for Extending Android Security Slides - Stephan Heuser, Adwait Nadkarni, William Enck, Ahmad-Reza Sadeghi.pdf 1.0 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/Oxymoron Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing - Michael Backes, Stefan Nurnberger.pdf 1.0 MB
- USENIX Security 2007/Presentations/Devices That Tell on You Privacy Trends in Consumer Ubiquitous Computing - T. Scott Saponas, Jonathan Lester, Carl Hartung, Sameer Agarwal, Tadayoshi Kohno.pdf 1.0 MB
- USENIX Security 2012/USENIX Security 2012 Reports.pdf 1.0 MB
- USENIX Security 2012/USENIX Security 2012 Presentations/Billion-Gate Secure Computation with Malicious Adversaries Slides Slides - Benjamin Kreuter, abhi shelat, and Chih-hao Shen.pdf 1.0 MB
- USENIX Security 2009/USENIX Security 2009 Presentations/VPriv Protecting Privacy in Location-Based Vehicular Services Slides - Raluca Ada Popa, Hari Balakrishnan, Andrew J. Blumberg.pdf 1.0 MB
- USENIX Security 2014/USENIX Security 2014 Presentations/XRay Enhancing the Web’s Transparency with Differential Correlation Slides - Mathias Lecuyer, Guillaume Ducoffe, Francis Lan, Andrei Papancea, Theofilos Petsios, Ri.pdf 1009.0 KB
- USENIX Security 2011/USENIX Security 2011 Presentations/Permission Re-Delegation Attacks and Defenses - Adrienne Porter Felt, Helen J. Wang, Alexander Moshchuk, Steve Hanna, Erika Chin.pdf 1004.3 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/X-Force Force-Executing Binary Programs for Security Applications - Fei Peng, Zhui Deng, Xiangyu Zhang, and Dongyan Xu, Purdue University; Zhiqiang Lin, The Univers.pdf 998.0 KB
- USENIX Security 2011/USENIX Security 2011 Presentations/Forensic Triage for Mobile Phones with DEC0DE - Robert J. Walls, Erik Learned-Miller, and Brian Neil Levine.pdf 991.0 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/Securing Frame Communication in Browsers - Adam Barth, Collin Jackson, John C. Mitchell.pdf 983.3 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens Slides - Daniel Demmler, Thomas Schneider, Michael Zohner.pdf 980.9 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/A Large-Scale Empirical Analysis of Chinese Web Passwords Slides - Zhigong Li, Weili Han, Wenyuan Xu.pdf 963.5 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/Static Detection of Second-Order Vulnerabilities in Web Applications Slides - Johannes Dahse, Thorsten Holz.pdf 959.7 KB
- USENIX Security 2011/USENIX Security 2011 Presentations/TRESOR Runs Encryption Securely Outside RAM Slides - Tilo Müller, Felix C. Freiling, Andreas Dewald.pdf 947.9 KB
- USENIX Security 2013/USENIX Security 2013 Presentations/Dowsing for Overflows A Guided Fuzzer to Find Buffer Boundary Violations Slides - Istvan Haller, Asia Slowinska, Matthias Neugschwandtner, Herbert Bos.pdf 945.0 KB
- USENIX Security 2011/USENIX Security 2011 Presentations/Static Detection of Access Control Vulnerabilities in Web Applications Slides - Fangqi Sun, Liang Xu, and Zhendong Su.pdf 941.2 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/Automatically Detecting Vulnerable Websites Before They Turn Malicious - Kyle Soska, Nicolas Christin.pdf 938.5 KB
- USENIX Security 2012/USENIX Security 2012 Presentations/Babel Leveraging Email Delivery for Spam Mitigation - Gianluca Stringhini, Manuel Egele, Apostolis Zarras, Thorsten Holz, Christopher Kruegel, Giovanni Vigna.pdf 935.7 KB
- USENIX Security 2010/USENIX Security 2010 Presentations/Realization of RF Distance Bounding - Kasper Bonne Rasmussen, Srdjan Capkun.pdf 935.5 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/Blanket Execution Dynamic Similarity Testing for Program Binaries and Components Slides - Manuel Egele, Maverick Woo, Peter Chapman, David Brumley.pdf 930.9 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/Password Portfolios and the Finite-Effort User Sustainably Managing Large Numbers of Accounts Slides - Dinei Florencio, Cormac Herley, Paul C. van Oorschot.pdf 930.5 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/Preventing Cryptographic Key Leakage in Cloud Virtual Machines Slides - Erman Pattuk, Murat Kantarcioglu, Zhiqiang Lin, Huseyin Ulusoy.pdf 914.7 KB
- USENIX Security 2009/USENIX Security 2009 Presentations/Physical-layer Identification of RFID Devices - Boris Danev, Thomas S. Heydt-Benjamin, Srdjan Capkun.pdf 913.3 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/A Couple Billion Lines of Code Later Static Checking in the Real World Slides - Dawson Engler, Ben Chelf, Andy Chou, Seth Hallem.pdf 911.8 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/On the Effective Prevention of TLS Man-in-the-Middle Attacks in Web Applications - Nikolaos Karapanos and Srdjan Capkun.pdf 906.1 KB
- USENIX Security 2011/USENIX Security 2011 Presentations/Outsourcing the Decryption of ABE Ciphertexts - Matthew Green, Susan Hohenberger, Brent Waters.pdf 900.0 KB
- USENIX Security 2007/Presentations/Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords - Julie Thorpe, P.C. van Oorschot.pdf 892.6 KB
- USENIX Security 2010/USENIX Security 2010 Presentations/Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking - Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidiah R. Cranda.pdf 879.9 KB
- USENIX Security 2007/Presentations/SpyProxy Execution-based Detection of Malicious Web Content - Alexander Moshchuk, Tanya Bragin, Damien Deville, Steven D. Gribble, Henry M. Levy.pdf 868.9 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/CloudAV N-Version Antivirus in the Network Cloud - Jon Oberheide, Evan Cooke, Farnam Jahanian.pdf 864.9 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/Mimesis Aegis A Mimicry Privacy Shield-A System’s Approach to Data Privacy on Public Cloud - Billy Lau, Simon Chung, Chengyu Song, Yeongjin Jang, Wenke Lee, Alexand.pdf 860.4 KB
- USENIX Security 2010/USENIX Security 2010 Presentations/Chipping Away at Censorship Firewalls with User-Generated Content Slides - Sam Burnett, Nick Feamster, Santosh Vempala.pdf 848.0 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/Burst ORAM Minimizing ORAM Response Times for Bursty Access Patterns Slides - Jonathan Dautrich, University of California, Riverside; Emil Stefanov, Elaine Shi.pdf 841.2 KB
- USENIX Security 2009/USENIX Security 2009 Presentations/GATEKEEPER Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code - Salvatore Guarnieri, Benjamin Livshits.pdf 834.8 KB
- USENIX Security 2010/USENIX Security 2010 Presentations/Acoustic Side-Channel Attacks on Printers - Michael Backes, Markus Durmuth, Sebastian Gerling, Manfred Pinkal, Caroline Sporleder.pdf 827.4 KB
- USENIX Security 2013/USENIX Security 2013 Presentations/Eradicating DNS Rebinding with the Extended Same-origin Policy Slides - Martin Johns, Sebastian Lekies, Ben Stock.pdf 816.6 KB
- USENIX Security 2009/USENIX Security 2009 Presentations/Browser Security Proceedings.pdf 813.5 KB
- USENIX Security 2009/USENIX Security 2009 Presentations/Browser Security.pdf 813.5 KB
- USENIX Security 2013/USENIX Security 2013 Presentations/Impression Fraud in On-line Advertising via Pay-Per-View Networks Slides - Kevin Springborn, Paul Barford.pdf 807.8 KB
- USENIX Security 2009/USENIX Security 2009 Presentations/Vanish Increasing Data Privacy with Self-Destructing Data - Roxana Geambasu, Tadayoshi Kohno, Amit A. Levy, Henry M. Levy.pdf 793.7 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/Telepathwords Preventing Weak Passwords by Reading Users’ Minds - Saranga Komanduri, Richard Shay, Lorrie Faith Cranor, Cormac Herley Stuart Schechter.pdf 792.5 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/Setting DNS's Hair on Fire - Niels Provos, David Dagon, Paul Vixie.pdf 792.2 KB
- USENIX Security 2010/USENIX Security 2010 Presentations/AdJail Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements - Mike Ter Louw, Karthik Thotta Ganesh, V.N. Venkatakrishnan.pdf 790.9 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/Never Been KIST Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport - Rob Jansen, John Geddes, Chris Wacek, Micah Sherr, Paul Syverson.pdf 790.1 KB
- USENIX Security 2012/USENIX Security 2012 Presentations/Tracking Rootkit Footprints with a Practical Memory Analysis System - Weidong Cui, Marcus Peinado, Zhilei Xu, Ellick Chan.pdf 789.3 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/Proactive Surge Protection A Defense Mechanism for Bandwidth-Based Attacks - Jerry Chou, Bill Lin, Subhabrata Sen, Oliver Spatscheck.pdf 783.4 KB
- USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX.html 782.4 KB
- USENIX Security 2012/USENIX Security 2012 Presentations/Whispers in the Hyper-space High-speed Covert Channel Attacks in the Cloud - Zhenyu Wu, Zhang Xu, Haining Wang.pdf 780.6 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/Man vs. Machine Practical Adversarial Detection of Malicious Crowdsourcing Workers - Gang Wang, Tianyi Wang, Santa Barbara, Haitao Zheng, Ben Y. Zhao.pdf 779.9 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/DSCRETE Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse - Brendan Saltaformaggio, Zhongshu Gu, Xiangyu Zhang, Dongyan.pdf 770.9 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens - Daniel Demmler, Thomas Schneider, Michael Zohner.pdf 753.2 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/Privee An Architecture for Automatically Analyzing Web Privacy Policies - Sebastian Zimmeck, Steven M. Bellovin.pdf 751.7 KB
- USENIX Security 2020/sec20_cover.pdf 751.2 KB
- USENIX Security 2012/USENIX Security 2012 Presentations/Establishing Browser Security Guarantees through Formal Shim Verification - Dongseok Jang, Zachary Tatlock, Sorin Lerner.pdf 751.0 KB
- USENIX Security 2011/USENIX Security 2011 Presentations/Cloaking Malware with the Trusted Platform Module Slides - Alan M. Dunn, Owen S. Hofmann, Brent Waters, Emmett Witchel.pdf 747.2 KB
- USENIX Security 2012/USENIX Security 2012 Presentations/From Throw-Away Traffic to Bots Detecting the Rise of DGA-Based Malware Slides - Manos Antonakakis, Roberto Perdisci, Yacin Nadji, Nikolaos Vasiloglou, Saeed Abu-Nimeh, Wenke Lee.pdf 746.6 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/Stitching the Gadgets On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection - Lucas Davi, Ahmad-Reza Sadeghi, Daniel Lehmann, Fabian Monrose.pdf 731.6 KB
- USENIX Security 2009/USENIX Security 2009 Presentations/Protecting Confidential Data on Personal Computers with Storage Capsules Slides - Kevin Borders, Eric Vander Weele, Billy Lau, Atul Prakash.pdf 727.4 KB
- USENIX Security 2019/USENIX Security 2019 Program errata-3.pdf 726.5 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/Security Analysis of Network Protocols Slides - John Mitchell.pdf 725.8 KB
- USENIX Security 2007/Presentations/Report of the California Voting Systems Review - David Wagner,.pdf 725.1 KB
- USENIX Security 2012/USENIX Security 2012 Presentations/Privacy-Preserving Social Plugins - Georgios Kontaxis, Michalis Polychronakis, Angelos D. Keromytis, Evangelos P. Markatos.pdf 723.5 KB
- USENIX Security 2007/Presentations/Keep Your Enemies Close Distance Bounding Against Smartcard Relay Attacks - Saar Drimer, Steven J. Murdoch.pdf 722.8 KB
- USENIX Security 2009/USENIX Security 2009 Presentations/Detecting Spammers with SNARE Spatio-temporal Network-level Automatic Reputation Engine Slides - Shuang Hao, Nadeem Ahmed Syed, Nick Feamster, Alexander G. Gray, Sv.pdf 721.3 KB
- USENIX Security 2012/USENIX Security 2012 Presentations/PUBCRAWL Protecting Users and Businesses from CRAWLers Slides - Gregoire Jacob, Engin Kirda, Christopher Kruegel, Giovanni Vigna.pdf 718.5 KB
- USENIX Security 2012/USENIX Security 2012 Presentations/On Breaking SAML Be Whoever You Want to Be - Juraj Somorovsky, Andreas Mayer, Jorg Schwenk, Marco Kampmann, Meiko Jensen.pdf 708.7 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/Multi-flow Attacks Against Network Flow Watermarking Schemes - Negar Kiyavash, Amir Houmansadr, Nikita Borisov.pdf 702.6 KB
- USENIX Security 2012/USENIX Security 2012 Presentations/From Throw-Away Traffic to Bots Detecting the Rise of DGA-Based Malware - Manos Antonakakis, Roberto Perdisci, Yacin Nadji, Nikolaos Vasiloglou, Saeed Abu-Nimeh, Wenke Lee, David.pdf 696.7 KB
- USENIX Security 2010/USENIX Security 2010 Presentations/Searching the Searchers with SearchAudit - John P. John, Fang Yu, Yinglian Xie, Martin Abadi, Arvind Krishnamurthy.pdf 694.5 KB
- USENIX Security 2010/USENIX Security 2010 Presentations/Vulnerable Compliance - Dan Geer.pdf 693.9 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/From the Aether to the Ethernet-Attacking the Internet using Broadcast Digital Television - Yossef Oren, Angelos D. Keromytis.pdf 691.4 KB
- USENIX Security 2012/USENIX Security 2012 Presentations/Chimera A Declarative Language for Streaming Network Traffic Analysis Slides - Kevin Borders, Jonathan Springer, Matthew Burnside.pdf 689.7 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/BYTEWEIGHT Learning to Recognize Functions in Binary Code Slides - Tiffany Bao, Jonathan Burket, Maverick Woo, Rafael Turner, David Brumley.pdf 688.4 KB
- USENIX Security 2011/USENIX Security 2011 Presentations/Q Exploit Hardening Made Easy - Edward J. Schwartz, Thanassis Avgerinos, David Brumley.pdf 684.5 KB
- USENIX Security 2010/USENIX Security 2010 Presentations/ZKPDL A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash - Sarah Meiklejohn, C. Chris Erway, Alptekin Kupcu, Theodora Hinkle, Anna Lysy.pdf 678.2 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/A Large-Scale Analysis of the Security of Embedded Firmwares - Andrei Costin, Jonas Zaddach, Aurelien Francillon, and Davide Balzarotti.pdf 675.0 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/On the Feasibility of Large-Scale Infections of iOS Devices Slides - Tielei Wang, Yeongjin Jang, Yizheng Chen, Simon Chung, Billy Lau, Wenke Lee.pdf 675.0 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/Scheduler-based Defenses against Cross-VM Side-channels - Venkatanathan Varadarajan, Thomas Ristenpart, Michael Swift.pdf 673.2 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services - Sebastian Zander, Steven J. Murdoch.pdf 668.9 KB
- USENIX Security 2012/USENIX Security 2012 Presentations/Efficient and Scalable Socware Detection in Online Social Networks - Md Sazzadur Rahman, Ting-Kai Huang, Harsha V. Madhyastha, Michalis Faloutsos.pdf 667.3 KB
- USENIX Security 2011/USENIX Security 2011 Presentations/Static Detection of Access Control Vulnerabilities in Web Applications - Fangqi Sun, Liang Xu, and Zhendong Su.pdf 650.7 KB
- USENIX Security 2012/USENIX Security 2012 Presentations/Gone in 360 Seconds Hijacking with Hitag2 - Roel Verdult, Flavio D. Garcia, Josep Balasch, KU Leuven.pdf 649.7 KB
- USENIX Security 2011/USENIX Security 2011 Presentations/Secure In-Band Wireless Pairing Slides - Shyamnath Gollakota, Nabeel Ahmed, Nickolai Zeldovich, Dina Katabi.pptx 637.7 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/Peeking into Your App without Actually Seeing It UI State Inference and Novel Android Attacks - Qi Alfred Chen, Zhiyun Qian, Z. Morley Mao.pdf 636.1 KB
- USENIX Security 2011/USENIX Security 2011 Presentations/The Phantom Tollbooth Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion - Sarah Meiklejohn, Keaton Mowery, Stephen Checkoway, Hovav.pdf 636.1 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/SSOScan Automated Testing of Web Applications for Single Sign-On Vulnerabilities - Yuchen Zhou, David Evans.pdf 631.7 KB
- USENIX Security 2011/USENIX Security 2011 Presentations/MACE Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery Slides - Chia Yuan Cho, Domagoj Babic, Pongsin Poosankam, Kevin Zhijie C.pdf 630.0 KB
- USENIX Security 2009/USENIX Security 2009 Presentations/Effective and Efficient Malware Detection at the End Host Slides - Clemens Kolbitsch, Paolo Milani Comparetti, Christopher Kruegel, Engin Kirda, Sophia Antipolis, X.pdf 626.3 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/Revisiting SSL-TLS Implementations New Bleichenbacher Side Channels and Attacks - Christopher Meyer, Juraj Somorovsky, Eugen Weiss, Jorg Schwenk, Sebastian Schinzel.pdf 625.4 KB
- USENIX Security 2009/USENIX Security 2009 Presentations/Jamming-resistant Broadcast Communication without Shared Keys - Christina Popper, Mario Strasser, Srdjan Capkun.pdf 624.9 KB
- USENIX Security 2011/USENIX Security 2011 Presentations/JACKSTRAWS Picking Command and Control Connections from Bot Traffic Slides - Gregoire Jacob, Ralf Hund, Christopher Kruegel.pdf 618.6 KB
- USENIX Security 2007/Presentations/Halting Password Puzzles Hard-to-break Encryption from Human-memorable Keys - Xavier Boyen.pdf 618.2 KB
- USENIX Security 2012/USENIX Security 2012 Presentations/Origin-Bound Certificates A Fresh Approach to Strong Client Authentication for the Web - Michael Dietz, Alexei Czeskis, Dirk Balfanz, Dan S. Wallach.pdf 610.9 KB
- USENIX Security 2009/USENIX Security 2009 Presentations/Jamming-resistant Broadcast Communication without Shared Keys Slides - Christina Popper, Mario Strasser, and Srdjan Capkun.pdf 610.0 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/The Emperor’s New Password Manager Security Analysis of Web-based Password Managers - Zhiwei Li, Warren He, Devdatta Akhawe, Dawn Song.pdf 609.9 KB
- USENIX Security 2013/USENIX Security 2013 Presentations/ZMap Fast Internet-wide Scanning and Its Security Applications Slides - Zakir Durumeric, Eric Wustrow, J. Alex Halderman.pdf 607.2 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/Hypervisor Support for Identifying Covertly Executing Binaries - Lionel Litty, H. Andrs Lagar-Cavilla, David Lie.pdf 602.4 KB
- USENIX Security 2010/USENIX Security 2010 Presentations/An Analysis of Private Browsing Modes in Modern Browsers - Gaurav Aggarwal, Elie Bursztein, Collin Jackson, Dan Boneh.pdf 597.3 KB
- USENIX Security 2014/USENIX 2014 Security report.pdf 597.3 KB
- USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/css_Pen3ncMGQyB3Q2LWoTho2yu6X-D2T6zOqWITJ4iG9A8.css 596.7 KB
- USENIX Security 2020/USENIX Security '20 USENIX_files/css_Pen3ncMGQyB3Q2LWoTho2yu6X-D2T6zOqWITJ4iG9A8.css 596.7 KB
- USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/css_mMMIpDBXDqo0rCZrN7FoMlBPY0tKvHCE04XYURHXl9M.css 595.8 KB
- USENIX Security 2017/USENIX Security 2017 USENIX_files/css_mMMIpDBXDqo0rCZrN7FoMlBPY0tKvHCE04XYURHXl9M.css 595.8 KB
- USENIX Security 2018/USENIX Security 2018 Program at a Glance USENIX_files/css_mMMIpDBXDqo0rCZrN7FoMlBPY0tKvHCE04XYURHXl9M.css 595.8 KB
- USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/css_mMMIpDBXDqo0rCZrN7FoMlBPY0tKvHCE04XYURHXl9M.css 595.8 KB
- USENIX Security 2018/USENIX Security 2018 USENIX_files/css_mMMIpDBXDqo0rCZrN7FoMlBPY0tKvHCE04XYURHXl9M.css 595.8 KB
- USENIX Security 2019/USENIX Security 2019 Program at a Glance USENIX_files/css_mMMIpDBXDqo0rCZrN7FoMlBPY0tKvHCE04XYURHXl9M.css 595.8 KB
- USENIX Security 2019/USENIX Security 2019 USENIX_files/css_mMMIpDBXDqo0rCZrN7FoMlBPY0tKvHCE04XYURHXl9M.css 595.8 KB
- USENIX Security 2012/USENIX Security 2012 Presentations/DroidScope Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis - Lok Kwong Yan, Heng Yin.pdf 594.1 KB
- USENIX Security 2013/USENIX Security 2013 Presentations/Sancus Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base Slides - Job Noorman, Pieter Agten, Wilfried Daniels, Raoul Str.pdf 592.8 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/Z0 An Optimizing Distributing Zero-Knowledge Compiler - Matthew Fredrikson, Benjamin Livshits.pdf 585.5 KB
- USENIX Security 2012/USENIX Security 2012 Presentations/Optimally Robust Private Information Retrieval Slides - Casey Devet, Ian Goldberg, Nadia Heninger.pdf 581.2 KB
- USENIX Security 2012/USENIX Security 2012 Presentations/PUBCRAWL Protecting Users and Businesses from CRAWLers - Gregoire Jacob, Engin Kirda, Christopher Kruegel, Giovanni Vigna.pdf 575.9 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/TapDance End-to-Middle Anticensorship without Flow Blocking - Eric Wustrow, Colleen M. Swanson, J. Alex Halderman.pdf 572.1 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX.htm 565.1 KB
- USENIX Security 2007/Presentations/Active Hardware Metering for Intellectual Property Protection and Security - Yousra M. Alkabani, Farinaz Koushanfar.pdf 558.3 KB
- USENIX Security 2013/USENIX Security 2013 Presentations/ZMap Fast Internet-wide Scanning and Its Security Applications - Zakir Durumeric, Eric Wustrow, J. Alex Halderman.pdf 558.2 KB
- USENIX Security 2007/Presentations/Integrity Checking in Cryptographic File Systems with Constant Trusted Storage - Alina Oprea, Michael K. Reiter.pdf 557.1 KB
- USENIX Security 2012/USENIX Security 2012 Presentations/Fuzzing with Code Fragments - Christian Holler, Kim Herzig, Andreas Zeller.pdf 556.9 KB
- USENIX Security 2009/USENIX Security 2009 Presentations/USENIX Security 2009 - Cover.pdf 555.0 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/Unidirectional Key Distribution Across Time and Space with Applications to RFID Security - Ari Juels, Ravikanth Pappu, Bryan Parno.pdf 551.3 KB
- USENIX Security 2019/USENIX Security 2019 USENIX_files/hyatt_santa_clara_600_neat_6.png 547.7 KB
- USENIX Security 2012/USENIX Security 2012 Presentations/Social Networking with Frientegrity Privacy and Integrity with an Untrusted Provider - Ariel J. Feldman, Aaron Blankstein, Michael J. Freedman, Edward W. Felten.pdf 542.5 KB
- USENIX Security 2015/USENIX Security 2015 Presentations/sec15_proceedings_cover.pdf 540.0 KB
- USENIX Security 2009/USENIX Security 2009 Presentations/Detecting Spammers with SNARE Spatio-temporal Network-level Automatic Reputation Engine - Shuang Hao, Nadeem Ahmed Syed, Nick Feamster, Alexander G. Gray, Sven Kras.pdf 538.5 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/AutoISES Automatically Inferring Security Specification and Detecting Violations - Lin Tan, Xiaolan Zhang, Xiao Ma, Weiwei Xiong, Yuanyuan Zhou.pdf 537.1 KB
- USENIX Security 2013/USENIX Security 2013 Presentations/Control Flow Integrity for COTS Binaries Slides - Mingwei Zhang, R. Sekar.pdf 535.6 KB
- USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX.htm 534.7 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX.htm 531.8 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/On the Feasibility of Large-Scale Infections of iOS Devices - Tielei Wang, Yeongjin Jang, Yizheng Chen, Simon Chung, Billy Lau, Wenke Lee.pdf 529.1 KB
- USENIX Security 2009/USENIX Security 2009 Presentations/Efficient Data Structures for Tamper-Evident Logging Slides - Scott A. Crosby, Dan S. Wallach.pdf 527.1 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/Size Does Matter Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard - Enes Goktas, Elias Athanasopoulos, Michalis Polychronakis, Herbert Bos.pdf 525.8 KB
- USENIX Security 2011/USENIX Security 2011 Presentations/SHELLOS Enabling Fast Detection and Forensic Analysis of Code Injection Attacks - Kevin Z. Snow, Srinivas Krishnan, Fabian Monrose, Niels Provos.pdf 523.4 KB
- USENIX Security 2012/USENIX Security 2012 Presentations/DroidScope Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis Slides - Lok Kwong Yan, Heng Yin.pdf 522.8 KB
- USENIX Security 2012/USENIX Security 2012 Presentations/Neuroscience Meets Cryptography Designing Crypto Primitives Secure Against Rubber Hose Attacks - Hristo Bojinov, Daniel Sanchez, Paul Reber, Northw.pdf 517.9 KB
- USENIX Security 2011/USENIX Security 2011 Presentations/PIR-Tor Scalable Anonymous Communication Using Private Information Retrieval - Prateek Mittal, Femi Olumofin, Carmela Troncoso, Nikita Borisov, Ian Goldberg.pdf 517.2 KB
- USENIX Security 2012/USENIX Security 2012 Presentations/Privilege Separation in HTML5 Applications - Devdatta Akhawe, Prateek Saxena, Dawn Song.pdf 510.2 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/A Look at Targeted Attacks Through the Lense of an NGO - Stevens Le Blond, Adina Uritesc, Cedric Gilbert, Zheng Leong Chua, Prateek Saxena, Engin Kirda.pdf 507.5 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture - Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza.pdf 507.0 KB
- USENIX Security 2012/USENIX Security 2012 Presentations/STEALTHMEM System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud - Taesoo Kim, Marcus Peinado, Gloria Mainar-Ruiz.pdf 505.8 KB
- USENIX Security 2007/Presentations/Secretly Monopolizing the CPU Without Superuser Privileges - Dan Tsafrir, Yoav Etsion, Dror G. Feitelson.pdf 505.7 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/X-Force Force-Executing Binary Programs for Security Applications Slides - Fei Peng, Zhui Deng, Xiangyu Zhang, and Dongyan Xu, Purdue University; Zhiqiang Lin, The.pdf 504.3 KB
- USENIX Security 2010/USENIX Security 2010 Presentations/SEPIA Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics - Martin Burkhart, Mario Strasser, Dilip Many, Xenofontas Dimitropoulos.pdf 501.0 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/Blanket Execution Dynamic Similarity Testing for Program Binaries and Components - Manuel Egele, Maverick Woo, Peter Chapman, David Brumley.pdf 497.6 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/VoteBox A Tamper-evident, Verifiable Electronic Voting System - Daniel Sandler, Kyle Derr, Dan S. Wallach.pdf 496.9 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/Preventing Cryptographic Key Leakage in Cloud Virtual Machines - Erman Pattuk, Murat Kantarcioglu, Zhiqiang Lin, Huseyin Ulusoy.pdf 496.9 KB
- USENIX Security 2009/USENIX Security 2009 Presentations/Effective and Efficient Malware Detection at the End Host - Clemens Kolbitsch, Paolo Milani Comparetti, Christopher Kruegel, Engin Kirda, Sophia Antipolis, Xiaoyong.pdf 491.8 KB
- USENIX Security 2009/USENIX Security 2009 Presentations/Crying Wolf An Empirical Study of SSL Warning Effectiveness - Joshua Sunshine, Serge Egelman, Hazim Almuhimedi, Neha Atri, Lorrie Faith Cranor.pdf 489.9 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/Privee An Architecture for Automatically Analyzing Web Privacy Policies Slides - Sebastian Zimmeck, Steven M. Bellovin.pdf 489.2 KB
- USENIX Security 2012/USENIX Security 2012 Presentations/STING Finding Name Resolution Vulnerabilities in Programs - Hayawardh Vijayakumar, Joshua Schiffman, Trent Jaeger.pdf 489.2 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/Towards Detecting Anomalous User Behavior in Online Social Networks - Bimal Viswanath, M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna P. Gummadi, Max Planck, .pdf 488.9 KB
- USENIX Security 2018/USENIX Security 2018 USENIX_files/sec18_hotel.png 488.8 KB
- USENIX Security 2012/USENIX Security 2012 Presentations/AdSplit Separating Smartphone Advertising from Applications - Shashi Shekhar, Michael Dietz, Dan S. Wallach.pdf 487.3 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/JIGSAW Protecting Resource Access by Inferring Programmer Expectations - Hayawardh Vijayakumar, Xinyang Ge, Mathias Payer, Trent Jaeger.pdf 485.5 KB
- USENIX Security 2009/USENIX Security 2009 Presentations/Static Enforcement of Web Application Integrity Through Strong Typing - William Robertson, Giovanni Vigna.pdf 483.5 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions.htm 483.1 KB
- USENIX Security 2010/USENIX Security 2010 Presentations/Scantegrity II Municipal Election at Takoma Park The First E2E Binding Governmental Election with Ballot Privacy - Richard Carback, David Chaum, Jeremy Clark, John.pdf 480.7 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/An Internet-Wide View of Internet-Wide Scanning - Zakir Durumeric, Michael Bailey, J. Alex Halderman.pdf 478.3 KB
- USENIX Security 2017/USENIX Security 2017 USENIX_files/sheraton_vancouver_600.png 476.2 KB
- USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX.htm 475.8 KB
- USENIX Security 2007/Presentations/SIF Enforcing Confidentiality and Integrity in Web Applications - Stephen Chong, K. Vikram, Andrew C. Myers.pdf 472.9 KB
- USENIX Security 2015/USENIX Security 2015 Full Proceedings Supplement.pdf 470.3 KB
- USENIX Security 2015/USENIX Security 2015 Presentations/sec15_supplement.pdf 470.3 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/A Large-Scale Empirical Analysis of Chinese Web Passwords - Zhigong Li, Weili Han, Wenyuan Xu.pdf 469.9 KB
- USENIX Security 2012/USENIX Security 2012 Presentations/Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization - Cristiano Giuffrida, Anton Kuijsten, Andrew S. Tanenbaum.pdf 466.1 KB
- USENIX Security 2010/USENIX Security 2010 Presentations/Chipping Away at Censorship Firewalls with User-Generated Content - Sam Burnett, Nick Feamster, Santosh Vempala.pdf 463.6 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/All Your iFRAMEs Point to Us - Niels Provos, Panayiotis Mavrommatis, Moheeb Abu Rajab, Fabian Monrose.pdf 463.0 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/BYTEWEIGHT Learning to Recognize Functions in Binary Code - Tiffany Bao, Jonathan Burket, Maverick Woo, Rafael Turner, David Brumley.pdf 462.4 KB
- USENIX Security 2011/USENIX Security 2011 Presentations/Fast and Precise Sanitizer Analysis with BEK - Pieter Hooimeijer, Benjamin Livshits, David Molnar, Prateek Saxena, Margus Veanes.pdf 459.7 KB
- USENIX Security 2012/USENIX Security 2012 Presentations/I Forgot Your Password Randomness Attacks Against PHP Applications - George Argyros, Aggelos Kiayias.pdf 459.3 KB
- USENIX Security 2009/USENIX Security 2009 Presentations/Peeping Tom in the Neighborhood Keystroke Eavesdropping on Multi-User Systems - Kehuan Zhang, XiaoFeng Wang.pdf 456.9 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/XRay Enhancing the Web’s Transparency with Differential Correlation - Mathias Lecuyer, Guillaume Ducoffe, Francis Lan, Andrei Papancea, Theofilos Petsios, Riley Spa.pdf 456.8 KB
- USENIX Security 2007/Presentations/Combating Click Fraud via Premium Clicks - Ari Juels, Sid Stamm, Markus Jakobsson.pdf 456.0 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/FLUSH-RELOAD A High Resolution, Low Noise, L3 Cache Side-Channel Attack Slides - Yuval Yarom, Katrina Falkner.pdf 454.5 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/Password Portfolios and the Finite-Effort User Sustainably Managing Large Numbers of Accounts - Dinei Florencio, Cormac Herley, Paul C. van Oorschot.pdf 449.6 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/SpanDex Secure Password Tracking for Android - Landon P. Cox , Peter Gilbert, Geoffrey Lawler, Valentin Pistol, Ali Razeen, Bi Wu, Sai Cheemalapati.pdf 449.3 KB
- USENIX Security 2010/USENIX Security 2010 Presentations/VEX Vetting Browser Extensions for Security Vulnerabilities - Sruthi Bandhakavi, Samuel T. King, P. Madhusudan, Marianne Winslett.pdf 445.4 KB
- USENIX Security 2010/USENIX Security 2010 Presentations/Cling A Memory Allocator to Mitigate Dangling Pointers - Periklis Akritidis.pdf 444.3 KB
- USENIX Security 2009/USENIX Security 2009 Presentations/Nemesis Preventing Authentication and Access Control Vulnerabilities in Web Applications - Michael Dalton, Christos Kozyrakis, Nickolai Zeldovich.pdf 442.7 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/ret2dir Rethinking Kernel Isolation - Vasileios P. Kemerlis, Michalis Polychronakis, Angelos D. Keromytis.pdf 437.1 KB
- USENIX Security 2012/USENIX Security 2012 Presentations/Taking Proof-Based Verified Computation a Few Steps Closer to Practicality - Srinath Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Andrew J. Blumberg, Michael Walfish.pdf 434.9 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/Lest We Remember - Cold Boot Attacks on Encryption Keys_files/memory_5.jpg 430.4 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/ROP is Still Dangerous Breaking Modern Defenses - Nicholas Carlini, David Wagner.pdf 429.7 KB
- USENIX Security 2019/28th USENIX Security Symposium Grid.htm 429.0 KB
- USENIX Security 2011/USENIX Security 2011 Presentations/Secure In-Band Wireless Pairing - Shyamnath Gollakota, Nabeel Ahmed, Nickolai Zeldovich, Dina Katabi.pdf 428.3 KB
- USENIX Security 2009/USENIX Security 2009 Presentations/Return-Oriented Rootkits Bypassing Kernel Code Integrity Protection Mechanisms Slides - Ralf Hund, Thorsten Holz, Felix C. Freiling.pdf 427.3 KB
- USENIX Security 2011/USENIX Security 2011 Presentations/Bubble Trouble Off-Line De-Anonymization of Bubble Forms - Joseph A. Calandrino, William Clarkson, Edward W. Felten.pdf 423.3 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/Highly Predictive Blacklisting - Jian Zhang, Phillip Porras, Johannes Ullrich.pdf 421.2 KB
- USENIX Security 2010/USENIX Security 2010 Presentations/PrETP Privacy-Preserving Electronic Toll Pricing - Josep Balasch, Alfredo Rial, Carmela Troncoso, Bart Preneel, Ingrid Verbauwhede, Christophe Geuens.pdf 420.0 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/Towards Reliable Storage of 56-bit Secrets in Human Memory - Joseph Bonneau, Princeton University; Stuart Schechter.pdf 417.4 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/BotMiner Clustering Analysis of Network Traffic for Protocol and Structure-Independent Botnet Detection - Guofei Gu, Roberto Perdisci, Junjie Zhang, Wenke Lee.pdf 415.1 KB
- USENIX Security 2011/USENIX Security 2011 Presentations/Faster Secure Two-Party Computation Using Garbled Circuits - Yan Huang, David Evans, Jonathan Katz.pdf 414.8 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/Measurement and Classification of Humans and Bots in Internet Chat - Steven Gianvecchio, Mengjun Xie, Zhengyu Wu, Haining Wang.pdf 411.8 KB
- USENIX Security 2007/Presentations/On Web Browsing Privacy in Anonymized NetFlows - S.E. Coull, M.P. Collins, C.V. Wright, F. Monrose, M.K. Reiter.pdf 409.4 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/Hackernomics Slides - Hugh Thompson.pdf 407.4 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/Dynamic Hooks Hiding Control Flow Changes within Non-Control Data - Sebastian Vogl, Robert Gawlik, Behrad Garmany, Thomas Kittel, Jonas Pfoh, Claudia Eckert, Thorst.pdf 406.2 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/Privacy in Pharmacogenetics An End-to-End Case Study of Personalized Warfarin Dosing - Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon Lin, David Page, Thomas Ris.pdf 405.5 KB
- USENIX Security 2009/USENIX Security 2009 Presentations/Improving Tor using a TCP-over-DTLS Tunnel Slides - Joel Reardon, Ian Goldberg.pdf 403.7 KB
- USENIX Security 2012/USENIX Security 2012 Presentations/Data Node Encrypted File System Efficient Secure Deletion for Flash Memory - Joel Reardon, Srdjan Capkun, David Basin.pdf 403.7 KB
- USENIX Security 2011/USENIX Security 2011 Presentations/PIR-Tor Scalable Anonymous Communication Using Private Information Retrieval Slides - Prateek Mittal, Femi Olumofin, Carmela Troncoso, Nikita Borisov, Ian Goldberg.pptx 400.0 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/To Catch a Predator A Natural Language Approach for Eliciting Malicious Payloads - Sam Small, Joshua Mason, Fabian Monrose, Niels Provos, Adam Stubblefield.pdf 399.8 KB
- USENIX Security 2012/USENIX Security 2012 Presentations/Aurasium Practical Policy Enforcement for Android Applications - Rubin Xu, Hassen Saidi, Ross Anderson.pdf 397.9 KB
- USENIX Security 2013/USENIX Security 2013 login article.pdf 397.1 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/Lest We Remember - Cold Boot Attacks on Encryption Keys_files/memory_2.jpg 396.0 KB
- USENIX Security 2018/27th USENIX Security Symposium Grid.htm 395.9 KB
- USENIX Security 2009/USENIX Security 2009 Presentations/VPriv Protecting Privacy in Location-Based Vehicular Services - Raluca Ada Popa, Hari Balakrishnan, Andrew J. Blumberg.pdf 388.0 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/Lest We Remember - Cold Boot Attacks on Encryption Keys_files/memory_6.jpg 386.4 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/BareCloud Bare-metal Analysis-based Evasive Malware Detection - Dhilung Kirat, Giovanni Vigna, Christopher Kruegel.pdf 386.1 KB
- USENIX Security 2007/Presentations/Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation - David Brumley, Juan Caballero, Zhenkai Liang.pdf 384.5 KB
- USENIX Security 2012/USENIX Security 2012 Presentations/Mining Your Ps and Qs Detection of Widespread Weak Keys in Network Devices - Nadia Heninger, Zakir Durumeric, Eric Wustrow, J. Alex Halderm.pdf 377.1 KB
- USENIX Security 2017/USENIX Security 2017 Full Proceedings program grid.pdf 376.6 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/Cardinal Pill Testing of System Virtual Machines - Hao Shi, Abdulla Alwabel, Jelena Mirkovic.pdf 375.9 KB
- USENIX Security 2007/Presentations/Spamscatter Characterizing Internet Scam Hosting Infrastructure - David S. Anderson, Chris Fleizach, Stefan Savage, Geoffrey M. Voelker.pdf 374.2 KB
- USENIX Security 2010/USENIX Security 2010 Presentations/Fast Regular Expression Matching Using Small TCAMs for Network Intrusion Detection and Prevention Systems - Chad R. Meiners, Jignesh Patel, Eric Norige, Eric Torng.pdf 372.8 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/ASM A Programmable Interface for Extending Android Security - Stephan Heuser, Adwait Nadkarni, William Enck, Ahmad-Reza Sadeghi.pdf 372.6 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/Optimizing Seed Selection for Fuzzing - Alexandre Rebert, Sang Kil Cha, Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, David Brumley.pdf 368.7 KB
- USENIX Security 2007/Presentations/Web-Based Inference Detection - Jessica Staddon, Philippe Golle, Bryce Zimny.pdf 368.4 KB
- USENIX Security 2011/USENIX Security 2011 Presentations/SMS of Death From Analyzing to Attacking Mobile Phones on a Large Scale - Collin Mulliner, Nico Golde, Jean-Pierre Seifert.pdf 368.0 KB
- USENIX Security 2007/Presentations/Exploiting Network Structure for Proactive Spam Mitigation - Shobha Venkataraman, Subhabrata Sen, Oliver Spatscheck, Patrick Haffner, Dawn Song.pdf 363.1 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/Static Detection of Second-Order Vulnerabilities in Web Applications - Johannes Dahse, Thorsten Holz.pdf 362.9 KB
- USENIX Security 2009/USENIX Security 2009 Presentations/Return-Oriented Rootkits Bypassing Kernel Code Integrity Protection Mechanisms - Ralf Hund, Thorsten Holz, Felix C. Freiling.pdf 361.8 KB
- USENIX Security 2007/Presentations/Memory Performance Attacks Denial of Memory Service in Multi-Core Systems - Thomas Moscibroda, Onur Mutlu.pdf 360.7 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX.htm 359.3 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/Cardinal Pill Testing of System Virtual Machines Slides - Hao Shi, Abdulla Alwabel, Jelena Mirkovic.pdf 358.8 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/On the Practical Exploitability of Dual EC in TLS Implementations - Stephen Checkoway, Matthew Fredrikson, Ruben Niederhagen, Adam Everspaugh, Matthew Green, Tanja.pdf 356.6 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/Faster Private Set Intersection Based on OT Extension - Benny Pinkas, Thomas Schneider, Michael Zohner.pdf 355.0 KB
- USENIX Security 2009/USENIX Security 2009 Presentations/Baggy Bounds Checking An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors Slides - Periklis Akritidis, Manuel Costa, Miguel Castro, Steven Ha.pdf 353.6 KB
- USENIX Security 2011/USENIX Security 2011 Presentations/Dirty Jobs The Role of Freelance Labor in Web Service Abuse - Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker.pdf 349.6 KB
- USENIX Security 2011/USENIX Security 2011 Presentations/Dirty Jobs The Role of Freelance Labor in Web Service Abuse - Motoyama.pdf 349.6 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/Password Managers Attacks and Defenses - David Silver, Suman Jana, and Dan Boneh, Stanford University; Eric Chen, Collin Jackson.pdf 347.9 KB
- USENIX Security 2007/Presentations/Language Identification of Encrypted VoIP Traffic Alejandra y Roberto or Alice and Bob - Charles V. Wright, Lucas Ballard, Fabian Monrose, Gerald M. Masson.pdf 347.7 KB
- USENIX Security 2007/Presentations/Discoverer Automatic Protocol Reverse Engineering from Network Traces - Weidong Cui, Jayanthkumar Kannan, Helen J. Wang.pdf 341.8 KB
- USENIX Security 2011/USENIX Security 2011 Presentations/mCarve Carving Attributed Dump Sets Slides - Ton van Deursen, Sjouke Mauw, and Sasa Radomirovic.pdf 338.8 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX.htm 336.9 KB
- USENIX Security 2007/Presentations/BotHunter Detecting Malware Infection Through IDS-Driven Dialog Correlation - Guofei Gu, Phillip Porras, Vinod Yegneswaran, Martin Fong, Wenke Lee.pdf 331.4 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/Lest We Remember - Cold Boot Attacks on Encryption Keys_files/mona_30s.png 330.2 KB
- USENIX Security 2007/Presentations/Proximity Breeds Danger Emerging Threats in Metro-area Wireless Networks - P. Akritidis, W.Y. Chin, V.T. Lam, S. Sidiroglou, K.G. Anagnostakis.pdf 329.3 KB
- USENIX Security 2010/USENIX Security 2010 Presentations/Capsicum Practical Capabilities for UNIX - Robert N.M. Watson, Jonathan Anderson, Ben Laurie, Kris Kennaway.pdf 326.2 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/Lest We Remember - Cold Boot Attacks on Encryption Keys_files/mona_60s.png 324.3 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/FLUSH-RELOAD A High Resolution, Low Noise, L3 Cache Side-Channel Attack - Yuval Yarom, Katrina Falkner.pdf 322.4 KB
- USENIX Security 2011/USENIX Security 2011 Presentations/Dark Clouds on the Horizon Using Cloud Storage as Attack Vector and Online Slack Space - Martin Mulazzani, Sebastian Schrittwieser, Manuel Leithner, Markus Huber.pdf 322.1 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/Practical Symmetric Key Cryptography on Modern Graphics Hardware - Owen Harrison, John Waldron.pdf 318.3 KB
- USENIX Security 2011/USENIX Security 2011 Presentations/Differential Privacy Under Fire Slides - Andreas Haeberlen, Benjamin C. Pierce, Arjun Narayan.pptx 315.4 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM - Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, Ulfar Erlingsson, Luis Lozano, Geof.pdf 313.6 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/Precise Client-side Protection against DOM-based Cross-Site Scripting - Ben Stock, Sebastian Lekies, Tobias Mueller, Patrick Spiegel, and Martin Johns.pdf 307.2 KB
- USENIX Security 2009/USENIX Security 2009 Presentations/Memory Safety for Low-Level Software Hardware Interactions - John Criswell, Nicolas Geoffray, Pierre et Marie Curie, Vikram Adve.pdf 306.4 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation - Lucas Ballard, Seny Kamara, Michael K. Reiter.pdf 306.1 KB
- USENIX Security 2012/USENIX Security 2012 Presentations/kGuard Lightweight Kernel Protection against Return-to-User Attacks - Vasileios P. Kemerlis, Georgios Portokalidis, and Angelos D. Keromytis.pdf 304.0 KB
- USENIX Security 2009/USENIX Security 2009 Presentations/Physical-layer Identification of RFID Devices Slides - Boris Danev, Thomas S. Heydt-Benjamin, Srdjan Capkun.pdf 300.7 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/Verifying Compliance of Trusted Programs - Sandra Rueda, Dave King, Trent Jaeger.pdf 300.5 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/Effective Attacks and Provable Defenses for Website Fingerprinting - Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, Ian Goldberg.pdf 300.5 KB
- USENIX Security 2007/Presentations/Binary Obfuscation Using Signals - Igor V. Popov, Saumya K. Debray, Gregory R. Andrews.pdf 300.1 KB
- USENIX Security 2010/USENIX Security 2010 Presentations/Baaz A System for Detecting Access Control Misconfigurations - Tathagata Das, Ranjita Bhagwan, Prasad Naldurg.pdf 296.5 KB
- USENIX Security 2012/USENIX Security 2012 Presentations/Chimera A Declarative Language for Streaming Network Traffic Analysis - Kevin Borders, Jonathan Springer, Matthew Burnside.pdf 295.3 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/Lest We Remember - Cold Boot Attacks on Encryption Keys_files/mona_5s.png 290.5 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/Privacy-Preserving Location Tracking of Lost or Stolen Devices Cryptographic Techniques and Replacing Trusted Third Parties with DHTs - Thomas Ristenpart, Gabriel Ma.pdf 290.3 KB
- USENIX Security 2018/USENIX Security 2018 Program errata_slip.pdf 290.2 KB
- USENIX Security 2010/USENIX Security 2010 Presentations/BotGrep Finding P2P Bots with Structured Graph Analysis - Shishir Nagaraja, Prateek Mittal, Chi-Yao Hong, Matthew Caesar, Nikita Borisov.pdf 289.0 KB
- USENIX Security 2012/USENIX Security 2012 Presentations/Policy-Sealed Data A New Abstraction for Building Trusted Cloud Services - Nuno Santos, Rodrigo Rodrigues, Krishna P. Gummadi.pdf 287.5 KB
- USENIX Security 2009/USENIX Security 2009 Presentations/Nemesis Preventing Authentication and Access Control Vulnerabilities in Web Applications Slides - Michael Dalton, Christos Kozyrakis, Nickolai Zeldovich.pdf 284.1 KB
- USENIX Security 2020/sec20_errata_3.pdf 278.4 KB
- USENIX Security 2010/USENIX Security 2010 Presentations/Making Linux Protection Mechanisms Egalitarian with UserFS - Taesoo Kim, Nickolai Zeldovich.pdf 278.4 KB
- USENIX Security 2011/USENIX Security 2011 Presentations/Differential Privacy Under Fire - Andreas Haeberlen, Benjamin C. Pierce, Arjun Narayan.pdf 278.3 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/Selective Versioning in a Secure Disk System - Swaminathan Sundararaman, Gopalan Sivathanu, Erez Zadok.pdf 276.7 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/Real-World Buffer Overflow Protection for Userspace and Kernelspace - Michael Dalton, Hari Kannan, Christos Kozyrakis.pdf 276.6 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/Reverse-Engineering a Cryptographic RFID Tag - Karsten Nohl, David Evans, Starbug, Henryk Platz.pdf 275.5 KB
- USENIX Security 2012/USENIX Security 2012 Presentations/Tachyon Tandem Execution for Efficient Live Patch Testing - Matthew Maurer, David Brumley.pdf 274.4 KB
- USENIX Security 2011/USENIX Security 2011 Presentations/TRESOR Runs Encryption Securely Outside RAM - Tilo Müller, Felix C. Freiling, Andreas Dewald.pdf 267.6 KB
- USENIX Security 2012/USENIX Security 2012 Presentations/Billion-Gate Secure Computation with Malicious Adversaries - Benjamin Kreuter, abhi shelat, Chih-hao Shen.pdf 266.1 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/Dynamic Hooks Hiding Control Flow Changes within Non-Control Data Slides - Sebastian Vogl, Robert Gawlik, Behrad Garmany, Thomas Kittel, Jonas Pfoh, Claudia Eckert.pdf 259.1 KB
- USENIX Security 2011/USENIX Security 2011 Presentations/mCarve Carving Attributed Dump Sets - Ton van Deursen, Sjouke Mauw, and Sasa Radomirovic.pdf 257.9 KB
- USENIX Security 2011/USENIX Security 2011 Presentations/Cloaking Malware with the Trusted Platform Module - Alan M. Dunn, Owen S. Hofmann, Brent Waters, Emmett Witchel.pdf 255.7 KB
- USENIX Security 2009/USENIX Security 2009 Presentations/The Multi-Principal OS Construction of the Gazelle Web Browser - Helen J. Wang, Chris Grier, Alex Moshchuk, Samuel T. King, Piali Choudhury, Herman Venter.pdf 255.0 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/css_IBrrqJUtXAVsLrrlZ8VqVTS3di7E2-x10BVJwZwbroU.css 254.2 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/css_IBrrqJUtXAVsLrrlZ8VqVTS3di7E2-x10BVJwZwbroU.css 254.2 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/css_IBrrqJUtXAVsLrrlZ8VqVTS3di7E2-x10BVJwZwbroU.css 254.2 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/css_IBrrqJUtXAVsLrrlZ8VqVTS3di7E2-x10BVJwZwbroU.css 254.2 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/css_ciODmkFfqCSx2xBu95VX29BZ0r4mdoEz3gy-MriTJBM.css 251.9 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/css_ciODmkFfqCSx2xBu95VX29BZ0r4mdoEz3gy-MriTJBM.css 251.9 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/css_XQfCg5kiuU6ACblHn3rDXdgaKZR8AxbhrQR4Gznu5qA.css 251.3 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/css_XQfCg5kiuU6ACblHn3rDXdgaKZR8AxbhrQR4Gznu5qA.css 251.3 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/css_XQfCg5kiuU6ACblHn3rDXdgaKZR8AxbhrQR4Gznu5qA.css 251.3 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/css_XQfCg5kiuU6ACblHn3rDXdgaKZR8AxbhrQR4Gznu5qA.css 251.3 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/On the Practical Exploitability of Dual EC in TLS Implementations Slides - Stephen Checkoway, Matthew Fredrikson, Ruben Niederhagen, Adam Everspaugh, Matthew Green.pdf 250.1 KB
- USENIX Security 2020/sec20_contents.pdf 249.9 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking - Michael Martin, Monica S. Lam.pdf 247.0 KB
- USENIX Security 2010/USENIX Security 2010 Presentations/Toward Automated Detection of Logic Vulnerabilities in Web Applications - Viktoria Felmetsger, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna.pdf 246.9 KB
- USENIX Security 2010/USENIX Security 2010 Presentations/Automatic Generation of Remediation Procedures for Malware Infections - Paleari.pdf 242.3 KB
- USENIX Security 2007/Presentations/OSLO Improving the Security of Trusted Computing - Bernhard Kauer.pdf 241.3 KB
- USENIX Security 2007/Presentations/OSLO Improving the Security of Trusted Computing Paper - Bernhard Kauer.pdf 241.3 KB
- USENIX Security 2009/USENIX Security 2009 Presentations/Cross-Origin JavaScript Capability Leaks Detection, Exploitation, and Defense - Adam Barth, Joel Weinberger, Dawn Song.pdf 232.4 KB
- USENIX Security 2012/USENIX Security 2012 Presentations/Enemy of the State A State-Aware Black-Box Web Vulnerability Scanner - Adam Doupe, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna.pdf 230.8 KB
- USENIX Security 2010/USENIX Security 2010 Presentations/Structuring Protocol Implementations to Protect Sensitive Data - Petr Marchenko, Brad Karp.pdf 229.0 KB
- USENIX Security 2019/USENIX Security 2019 Program errata.pdf 228.8 KB
- USENIX Security 2011/USENIX Security 2011 Presentations/ADsafety Type-Based Verification of JavaScript Sandboxing - Joe Gibbs Politz, Spiridon Aristides Eliopoulos, Arjun Guha, Shriram Krishnamurthi.pdf 224.9 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/NetAuth Supporting User-Based Network Services - Manigandan Radhakrishnan, Jon A. Solworth.pdf 222.7 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM Slides - Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, Ulfar Erlingsson, Luis Lozan.pdf 221.9 KB
- USENIX Security 2009/USENIX Security 2009 Presentations/Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs - David Molnar, Xue Cong Li, David A. Wagner.pdf 221.0 KB
- USENIX Security 2009/USENIX Security 2009 Presentations/Locating Prefix Hijackers using LOCK - Tongqing Qiu, Lusheng Ji, Dan Pei, Jia Wang, Jun (Jim) Xu, Hitesh Ballani.pdf 218.7 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/ROP is Still Dangerous Breaking Modern Defenses Slides - Nicholas Carlini, David Wagner.pdf 216.6 KB
- USENIX Security 2009/USENIX Security 2009 Presentations/Efficient Data Structures for Tamper-Evident Logging - Scott A. Crosby, Dan S. Wallach.pdf 215.7 KB
- USENIX Security 2012/USENIX Security 2012 Presentations/Optimally Robust Private Information Retrieval - Casey Devet, Ian Goldberg, Nadia Heninger.pdf 212.5 KB
- USENIX Security 2011/USENIX Security 2011 Presentations/MACE Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery - Chia Yuan Cho, Domagoj Babic, Pongsin Poosankam, Kevin Zhijie Chen, Ed.pdf 211.3 KB
- USENIX Security 2009/USENIX Security 2009 Presentations/CCCP Secure Remote Storage for Computational RFIDs - Mastooreh Salajegheh, Shane Clark, Benjamin Ransford, Kevin Fu, Ari Juels.pdf 207.1 KB
- USENIX Security 2009/USENIX Security 2009 Presentations/Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs Slides - David Molnar, Xue Cong Li, David A. Wagner.pdf 206.4 KB
- USENIX Security 2017/USENIX Security 2017 Full Proceedings errata.pdf 206.4 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/An Empirical Security Study of the Native Code in the JDK - Gang Tan, Jason Croft.pdf 205.4 KB
- USENIX Security 2010/USENIX Security 2010 Presentations/The Case for Ubiquitous Transport-Level Encryption - Andrea Bittau, Michael Hamburg, Mark Handley, David Mazieres, Dan Boneh.pdf 203.4 KB
- USENIX Security 2012/USENIX Security 2012 Presentations/Impact of Spam Exposure on User Engagement - Anirban Dasgupta, Kunal Punera, Justin M. Rao, Xuanhui Wang.pdf 190.3 KB
- USENIX Security 2012/USENIX Security 2012 Presentations/An Evaluation of the Google Chrome Extension Security Architecture - Nicholas Carlini, Adrienne Porter Felt, David Wagner.pdf 186.9 KB
- USENIX Security 2019/USENIX Security 2019 Video/Security Educational Panel.eng.srt 185.3 KB
- USENIX Security 2009/USENIX Security 2009 Presentations/Designing Trustworthy User Agents for a Hostile Web - Eric Lawrence.pdf 182.0 KB
- USENIX Security 2007/Presentations/Exploiting Concurrency Vulnerabilities in System Call Wrappers - watson.pdf 181.3 KB
- USENIX Security 2016/USENIX Security 2016 Videos/The Unfalsifiability of Security Claims.eng.srt 180.6 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation.htm 176.3 KB
- USENIX Security 2013/USENIX Security 2013 Presentations/PCF A Portable Circuit Format for Scalable Two-Party Secure Computation Slides - Ben Kreuter, Benjamin Mood, Abhi Shelat, Kevin Butler.pdf 164.5 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Q - Why Do Keynote Speakers Keep Suggesting That Improving Security Is Possible.eng.srt 152.2 KB
- USENIX Security 2009/USENIX Security 2009 Presentations/Toward a New Legal Framework for Cybersecurity - Deirdre K. Mulligan.pdf 144.3 KB
- USENIX Security 2010/USENIX Security 2010 Presentations/Adapting Software Fault Isolation to Contemporary CPU Architectures - David Sehr, Robert Muth, Cliff Biffle, Victor Khimenko, Egor Pasko, Karl Schimpf, Bennet Yee.pdf 142.5 KB
- USENIX Security 2009/USENIX Security 2009 Presentations/Protecting Confidential Data on Personal Computers with Storage Capsules - Kevin Borders, Eric Vander Weele, Billy Lau, Atul Prakash.pdf 142.2 KB
- USENIX Security 2010/USENIX Security 2010 Presentations/Securing Script-Based Extensibility in Web Browsers - Vladan Djeric, Ashvin Goel.pdf 141.9 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/cbgapi.loaded_0 140.7 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/cbgapi.loaded_0 140.7 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/cbgapi.loaded_0 140.7 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/cbgapi.loaded_0 140.7 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/cbgapi.loaded_0 140.7 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/cbgapi.loaded_0 140.7 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/cbgapi.loaded_0 140.7 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/cbgapi.loaded_0 140.7 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/cbgapi.loaded_0 140.7 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/cbgapi.loaded_0 140.7 KB
- USENIX Security 2009/USENIX Security 2009 Technical Sessions_files/sec09opening.jpg 140.4 KB
- USENIX Security 2010/USENIX Security 2010 Technical Sessions_files/sec09opening.jpg 140.4 KB
- USENIX Security 2013/USENIX Security 2013 Videos/The White House's Priorities for Cybersecurity - Andy Ozment.srt 138.8 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Chipmunk or Pepe Using Acoustical Analysis to Detect Voice-Channel Fraud at Scale.eng.srt 138.8 KB
- USENIX Security 2012/USENIX Security 2012 Presentations/Taking Proof-Based Verified Computation a Few Steps Closer to Practicality Slides - Srinath Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Andrew J. Blumberg, Michael Walfish.pdf 138.3 KB
- USENIX Security 2010/USENIX Security 2010 Presentations/End-to-End Arguments The Internet and Beyond - David P. Reed.pdf 136.9 KB
- USENIX Security 2013/USENIX Security 2013 Videos/Dr. Felten Goes To Washington - Lessons from 18 Months in Government - Edward W. Felten.srt 136.1 KB
- USENIX Security 2016/USENIX Security 2016 Videos/Finding and Fixing Security Bugs in Flash.eng.srt 133.4 KB
- USENIX Security 2018/27th USENIX Security Symposium Grid_files/main-current.css 132.7 KB
- USENIX Security 2019/28th USENIX Security Symposium Grid_files/main-current.css 132.7 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera22x.png 132.3 KB
- USENIX Security 2019/USENIX Security 2019 Video/Tackling the Trust and Safety Crisis.eng.srt 132.2 KB
- USENIX Security 2016/USENIX Security 2016 Videos/Crashing Drones and Hijacked Cameras CyberTrust Meets CyberPhysical.eng.srt 132.2 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Solving the Next Billion-People Privacy Problem.eng.srt 130.3 KB
- USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/js_wKyFX46tVKJtPKN12qNjRfS4aubW4G2u7LK22vlDiKo.js 130.1 KB
- USENIX Security 2020/USENIX Security '20 USENIX_files/js_wKyFX46tVKJtPKN12qNjRfS4aubW4G2u7LK22vlDiKo.js 130.1 KB
- USENIX Security 2020/sec20_message.pdf 130.0 KB
- USENIX Security 2018/USENIX Security 2018 Videos/The Law and Economics of Bug Bounties.eng.srt 129.9 KB
- USENIX Security 2019/USENIX Security 2019 USENIX.htm 129.7 KB
- USENIX Security 2020/USENIX Security 2020 Panels/USENIX Security 20 - Panel Digital Contact Tracing.eng.srt 129.6 KB
- USENIX Security 2020/USENIX Security 2020 Videos/Panel Digital Contact Tracing.eng.srt 129.6 KB
- USENIX Security 2018/USENIX Security 2018 Videos/The Second Crypto War-What's Different Now.eng.srt 128.8 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/js_U0vng6nr8yfSzrWPiyS9QtbOsmQ8XMOn1mS4JIpHltg.js 128.3 KB
- USENIX Security 2018/USENIX Security 2018 Program at a Glance USENIX_files/css_Tvyih1Dm489siBROXzFSkKUCFbsEK9kCr0p3JDiev80.css 126.2 KB
- USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/css_Tvyih1Dm489siBROXzFSkKUCFbsEK9kCr0p3JDiev80.css 126.2 KB
- USENIX Security 2018/USENIX Security 2018 USENIX_files/css_Tvyih1Dm489siBROXzFSkKUCFbsEK9kCr0p3JDiev80.css 126.2 KB
- USENIX Security 2019/USENIX Security 2019 Program at a Glance USENIX_files/css_Tvyih1Dm489siBROXzFSkKUCFbsEK9kCr0p3JDiev80.css 126.2 KB
- USENIX Security 2019/USENIX Security 2019 USENIX_files/css_Tvyih1Dm489siBROXzFSkKUCFbsEK9kCr0p3JDiev80.css 126.2 KB
- USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/css_Tvyih1Dm489siBROXzFSkKUCFbsEK9kCr0p3JDiev80.css 126.2 KB
- USENIX Security 2020/USENIX Security '20 USENIX_files/css_Tvyih1Dm489siBROXzFSkKUCFbsEK9kCr0p3JDiev80.css 126.2 KB
- USENIX Security 2013/USENIX Security 2013 Videos/Security Team 2.0 - Chris Evans.srt 126.0 KB
- USENIX Security 2013/USENIX Security 2013 Videos/Building Securable Infrastructure Open-Source Private Clouds - Pravir Chandra.srt 125.5 KB
- USENIX Security 2015/USENIX Security 2015 Videos/Conducting Usable Security Studies - It s Complicated.srt 125.4 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/Lest We Remember - Cold Boot Attacks on Encryption Keys_files/mona_300s.png 124.9 KB
- USENIX Security 2020/USENIX Security 2020 Panels/USENIX Security 20 - Panel The 2020 Election Remote Voting, Disinformation, and Audit.eng.srt 124.6 KB
- USENIX Security 2020/USENIX Security 2020 Videos/Panel The 2020 Election Remote Voting, Disinformation, and Audit.eng.srt 124.6 KB
- USENIX Security 2020/sec20_title_copyright_organizers.pdf 123.7 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Privacy for Tigers.eng.srt 123.4 KB
- USENIX Security 2020/USENIX Security '20 USENIX.html 122.2 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/Lest We Remember - Cold Boot Attacks on Encryption Keys.htm 119.8 KB
- USENIX Security 2013/USENIX Security 2013 Videos/Confessions of a Recovering Data Broker Responsible Innovation in the Age of Big Data, Big Brother, and the Coming Skynet Terminators - Jim Adler.srt 118.4 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js 117.4 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js 117.4 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js 117.4 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js 117.4 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js 117.4 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js 117.4 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js 117.4 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js 117.4 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js 117.4 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js 117.4 KB
- USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js 117.4 KB
- USENIX Security 2017/USENIX Security 2017 USENIX_files/js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js 117.4 KB
- USENIX Security 2018/USENIX Security 2018 Program at a Glance USENIX_files/js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js 117.4 KB
- USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js 117.4 KB
- USENIX Security 2018/USENIX Security 2018 USENIX_files/js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js 117.4 KB
- USENIX Security 2019/USENIX Security 2019 Program at a Glance USENIX_files/js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js 117.4 KB
- USENIX Security 2019/USENIX Security 2019 USENIX_files/js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js 117.4 KB
- USENIX Security 2019/USENIX Security 2019 Video/Shining Light on Internet-based Crimes Against Children.eng.srt 116.6 KB
- USENIX Security 2015/USENIX Security 2015 Videos/Inherent Cyber Insecurity and Our National Security - Surviving on a Diet of Poisoned Fruit.srt 116.5 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera23x.png 115.6 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services.htm 108.6 KB
- USENIX Security 2019/USENIX Security 2019 Video/The Spies Hacking our Phones are Going Dark, and We're All in Trouble.eng.srt 108.2 KB
- USENIX Security 2015/USENIX Security 2015 Videos/Preventing Security Bugs through Software Design.srt 107.4 KB
- USENIX Security 2015/USENIX Security 2015 Videos/Why Johnny and Janie Can’t Code Safely - Bringing Software Assurance to the Masses.srt 107.4 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/js_5eZSC3tfzCwTta-_4qxrBau4YdctcIhVqovRK7sPRFo.js 105.2 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/js_5eZSC3tfzCwTta-_4qxrBau4YdctcIhVqovRK7sPRFo.js 105.2 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/js_5eZSC3tfzCwTta-_4qxrBau4YdctcIhVqovRK7sPRFo.js 105.2 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/js_5eZSC3tfzCwTta-_4qxrBau4YdctcIhVqovRK7sPRFo.js 105.2 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/js_5eZSC3tfzCwTta-_4qxrBau4YdctcIhVqovRK7sPRFo.js 105.2 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Medical Device Cybersecurity through the FDA Lens.eng.srt 105.0 KB
- USENIX Security 2018/USENIX Security 2018 USENIX.htm 104.4 KB
- USENIX Security 2020/sec20_errata_1.pdf 103.7 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Analogy Cyber Security-From 0101 to Mixed Signals.eng.srt 102.6 KB
- USENIX Security 2016/USENIX Security 2016 Full Proceedings errata2.pdf 102.1 KB
- USENIX Security 2011/USENIX Security 2011 Poster Session_files/sec11_banner.jpg 101.3 KB
- USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/sec08_banner_750.jpg 99.9 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/USENIX Security 2008 Poster Session_files/sec08_banner_750.jpg 99.9 KB
- USENIX Security 2008/USENIX Security 2008 Technical Sessions_files/sec08_banner_750.jpg 99.9 KB
- USENIX Security 2008/USENIX Security 2008 WiPs_files/sec08_banner_750.jpg 99.9 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera4x.png 99.6 KB
- USENIX Security 2009/USENIX Security 2009 Presentations/JavaScript Security - sec09_corrigendum.pdf 99.2 KB
- USENIX Security 2009/USENIX Security 2009 Presentations/USENIX Security 2009 - Corrigendum.pdf 99.2 KB
- USENIX Security 2015/USENIX Security 2015 USENIX.htm 98.2 KB
- USENIX Security 2016/USENIX Security 2016 USENIX.htm 97.2 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/js_ILONILlX06kZtY3IVUMaeuMs_GJ1hSJY46daikoF9fA.js 97.1 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/js_ILONILlX06kZtY3IVUMaeuMs_GJ1hSJY46daikoF9fA.js 97.1 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/js_ILONILlX06kZtY3IVUMaeuMs_GJ1hSJY46daikoF9fA.js 97.1 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/js_ILONILlX06kZtY3IVUMaeuMs_GJ1hSJY46daikoF9fA.js 97.1 KB
- USENIX Security 2019/USENIX Security 2019 Program errata-4.pdf 96.5 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/widgets.js 96.1 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/widgets.js 96.1 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/widgets.js 96.1 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/widgets.js 96.1 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/widgets.js 96.1 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/widgets.js 96.1 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/widgets.js 96.1 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/widgets.js 96.1 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/widgets.js 96.1 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/widgets.js 96.1 KB
- USENIX Security 2020/sec20_errata_2.pdf 95.7 KB
- USENIX Security 2010/USENIX Security 2010 Presentations/USENIX Security 2010 Errata.pdf 95.6 KB
- USENIX Security 2018/27th USENIX Security Symposium Grid_files/jquery.js 94.9 KB
- USENIX Security 2019/28th USENIX Security Symposium Grid_files/jquery_002.js 94.9 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/cbgapi.loaded_1 94.8 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/cbgapi.loaded_1 94.8 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/cbgapi.loaded_1 94.8 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/cbgapi.loaded_1 94.8 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/cbgapi.loaded_1 94.8 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/cbgapi.loaded_1 94.8 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/cbgapi.loaded_1 94.8 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/cbgapi.loaded_1 94.8 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/cbgapi.loaded_1 94.8 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/cbgapi.loaded_1 94.8 KB
- USENIX Security 2018/27th USENIX Security Symposium Grid_files/jquery_003.js 94.1 KB
- USENIX Security 2019/28th USENIX Security Symposium Grid_files/jquery_004.js 94.1 KB
- USENIX Security 2016/USENIX Security 2016 Full Proceedings errata.pdf 93.6 KB
- USENIX Security 2018/27th USENIX Security Symposium Grid_files/bootstrap-custom.css 91.8 KB
- USENIX Security 2019/28th USENIX Security Symposium Grid_files/bootstrap-custom.css 91.8 KB
- USENIX Security 2019/USENIX Security 2019 Video/Baby Steps towards the Precipice How the Web Became a Scary.eng.srt 91.1 KB
- USENIX Security 2017/USENIX Security 2017 USENIX.htm 90.3 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Practical Accountability of Secret Processes.eng.srt 87.0 KB
- USENIX Security 2019/USENIX Security 2019 Video/Lessons Learned from Evaluating the Robustness of Defenses to.eng.srt 86.6 KB
- USENIX Security 2013/USENIX Security 2013 USENIX.htm 86.5 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Security Namespace - Making Linux Security Frameworks Available to Containers.eng.srt 85.0 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera12x.png 84.3 KB
- USENIX Security 2019/USENIX Security 2019 Video/Security Research and Public Policy.eng.srt 84.2 KB
- USENIX Security 2019/USENIX Security 2019 Program errata-5.pdf 84.0 KB
- USENIX Security 2019/USENIX Security 2019 Program at a Glance USENIX.htm 83.8 KB
- USENIX Security 2016/USENIX Security 2016 Videos/Post-quantum Key Exchange-A New Hope.eng.srt 83.6 KB
- USENIX Security 2019/USENIX Security 2019 Video/Evaluating Mobile Messengers for Implementation Vulnerabilities.eng.srt 83.1 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Enter the Hydra - Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts.eng.srt 83.1 KB
- USENIX Security 2013/USENIX Security 2013 Videos/Tracking the Casino Computer Wars Who’s Winning - the Casino or the Cheat - Richard Marcus.srt 82.8 KB
- USENIX Security 2014/USENIX Security 2014 USENIX.htm 82.7 KB
- USENIX Security 2019/USENIX Security 2019 Video/Lessons Learned About Building Secure Software It's About the Developers.eng.srt 82.1 KB
- USENIX Security 2010/USENIX Security 2010 Technical Sessions.htm 81.7 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Skill Squatting Attacks on Amazon Alexa.eng.srt 81.0 KB
- USENIX Security 2007/Presentations/Flayer Exposing Application Internals - Will Drewry, Tavis Ormandy .pdf 81.0 KB
- USENIX Security 2018/USENIX Security 2018 Videos/The Secure Socket API - TLS as an Operating System Service.eng.srt 80.5 KB
- USENIX Security 2012/USENIX Security 2012 USENIX.htm 80.1 KB
- USENIX Security 2009/USENIX Security 2009 Technical Sessions.htm 79.8 KB
- USENIX Security 2018/USENIX Security 2018 Program at a Glance USENIX.htm 79.2 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera29x.png 78.9 KB
- USENIX Security 2019/USENIX Security 2019 Video/Embracing the - Hack. - A Better Strategy for Team-Defense.eng.srt 77.8 KB
- USENIX Security 2017/USENIX Security 2017 Full Proceedings errata 2.pdf 77.5 KB
- USENIX Security 2011/USENIX Security 2011 Proceedings Errata.pdf 77.4 KB
- USENIX Security 2015/USENIX Security 2015 Presentations/sec15_contents-update.pdf 77.2 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/Practical Symmetric Key Cryptography on Modern Graphics Hardware.htm 76.0 KB
- USENIX Security 2013/USENIX Security 2013 Proceedings erratum.pdf 75.3 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Better managed than memorized Studying the Impact of Managers on Password Strength and Reuse.eng.srt 75.0 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera11x.png 75.0 KB
- USENIX Security 2019/USENIX Security 2019 Video/From Privacy by Design to Data Protection by Design The Challenges of.eng.srt 75.0 KB
- USENIX Security 2018/USENIX Security 2018 Videos/DelegaTEE - Brokered Delegation Using Trusted Execution Environments.eng.srt 74.5 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Translation Leak-aside Buffer - Defeating Cache Side-channel Protections with TLB Attacks.eng.srt 73.4 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Fast and Service-preserving Recovery from Malware Infections Using CRIU.eng.srt 73.0 KB
- USENIX Security 2018/27th USENIX Security Symposium Grid_files/main.js 72.0 KB
- USENIX Security 2019/28th USENIX Security Symposium Grid_files/main.js 72.0 KB
- USENIX Security 2019/USENIX Security 2019 Program errata-6.pdf 71.9 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Quack - Scalable Remote Measurement of Application-Layer Censorship.eng.srt 71.3 KB
- USENIX Security 2008/USENIX Security 2008 Technical Sessions.htm 70.7 KB
- USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/security07_banner.jpg 70.0 KB
- USENIX Security 2007/Presentations/Security 2007 Poster Session_files/security07_banner.jpg 70.0 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Turning Your Weakness Into a Strength - Watermarking Deep Neural Networks by Backdooring.eng.srt 69.8 KB
- USENIX Security 2016/USENIX Security 2016 Videos/Hey, You Have a Problem On the Feasibility of Large-Scale Web Vulnerability.eng.srt 69.1 KB
- USENIX Security 2018/USENIX Security 2018 Videos/A4NT - Author Attribute Anonymity by Adversarial Training of Neural Machine Translation.eng.srt 68.9 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/Reverse-Engineering a Cryptographic RFID Tag_files/Mifare-anotated.jpg 68.9 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera19x.png 68.5 KB
- USENIX Security 2018/USENIX Security 2018 Videos/When Does Machine Learning FAIL Generalized Transferability for Evasion and Poisoning Attacks.eng.srt 67.8 KB
- USENIX Security 2016/USENIX Security 2016 Videos/You've Got Vulnerability Exploring Effective Vulnerability Notifications.eng.srt 67.6 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Automatic Heap Layout Manipulation for Exploitation.eng.srt 67.1 KB
- USENIX Security 2016/USENIX Security 2016 Videos/Dancing on the Lip of the Volcano Chosen Ciphertext Attacks on Apple iMessage.eng.srt 66.9 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera28x.png 66.8 KB
- USENIX Security 2016/USENIX Security 2016 Videos/A Comprehensive Measurement Study of Domain Generating Malware.eng.srt 66.7 KB
- USENIX Security 2019/USENIX Security 2019 Program errata-2.pdf 66.7 KB
- USENIX Security 2016/USENIX Security 2016 Videos/fTPM A Software-Only Implementation of a TPM Chip.eng.srt 65.8 KB
- USENIX Security 2018/USENIX Security 2018 Videos/MoonShine - Optimizing OS Fuzzer Seed Selection with Trace Distillation.eng.srt 65.1 KB
- USENIX Security 2016/USENIX Security 2016 Videos/Verifying Constant-Time Implementations.eng.srt 64.7 KB
- USENIX Security 2018/USENIX Security 2018 Videos/The Rewards and Costs of Stronger Passwords in a University - Linking Password Lifetime to Strength.eng.srt 64.3 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera25x.png 64.3 KB
- USENIX Security 2016/USENIX Security 2016 Videos/Practical DIFC Enforcement on Android.eng.srt 64.2 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Bamboozling Certificate Authorities with BGP.eng.srt 64.0 KB
- USENIX Security 2018/USENIX Security 2018 Videos/BlackIoT - IoT Botnet of High Wattage Devices Can Disrupt the Power Grid.eng.srt 63.5 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Plug and Prey Measuring the Commoditization of Cybercrime via Online Anonymous Markets.eng.srt 63.5 KB
- USENIX Security 2018/USENIX Security 2018 Videos/The Dangers of Key Reuse - Practical Attacks on IPsec IKE.eng.srt 62.9 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera15x.png 62.4 KB
- USENIX Security 2016/USENIX Security 2016 Videos/Trusted Browsers for Uncertain Times.eng.srt 62.3 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Effective Detection of Multimedia Protocol Tunneling using Machine Learning.eng.srt 62.2 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Rethinking Access Control and Authentication for the Home Internet of Things (IoT).eng.srt 62.2 KB
- USENIX Security 2018/USENIX Security 2018 Videos/SAQL - A Stream-based Query System for Real-Time Abnormal System Behavior Detection.eng.srt 61.9 KB
- USENIX Security 2018/USENIX Security 2018 Videos/The Guard's Dilemma - Efficient Code-Reuse Attacks Against Intel SGX.eng.srt 61.8 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Towards Predicting Efficient and Anonymous Tor Circuits.eng.srt 61.7 KB
- USENIX Security 2014/USENIX Security 2014 Full Proceedings errata_slip.pdf 61.6 KB
- USENIX Security 2014/USENIX Security 2014 Presentations/Privacy in Pharmacogenetics An End-to-End Case Study of Personalized Warfarin Dosing Eratta - Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon Lin, David Page, Tho.pdf 61.6 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Malicious Management Unit - Why Stopping Cache Attacks in Software is Harder Than You Think.eng.srt 61.5 KB
- USENIX Security 2018/USENIX Security 2018 Videos/NetHide - Secure and Practical Network Topology Obfuscation.eng.srt 61.5 KB
- USENIX Security 2017/USENIX Security 2017 Full Proceedings errata 3.pdf 60.7 KB
- USENIX Security 2018/USENIX Security 2018 Videos/BurnBox - Self-Revocable Encryption in a World Of Compelled Access.eng.srt 60.6 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Tackling runtime-based obfuscation in Android with TIRO.eng.srt 60.5 KB
- USENIX Security 2016/USENIX Security 2016 Videos/Flip Feng Shui Hammering a Needle in the Software Stack.eng.srt 60.2 KB
- USENIX Security 2016/USENIX Security 2016 Videos/Hidden Voice Commands.eng.srt 60.2 KB
- USENIX Security 2018/USENIX Security 2018 Videos/A Sense of Time for JavaScript and Node.js.eng.srt 60.1 KB
- USENIX Security 2016/USENIX Security 2016 Videos/Investigating Commercial Pay-Per-Install and the Distribution of Unwanted.eng.srt 60.0 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Return Of Bleichenbacher's Oracle Threat (ROBOT).eng.srt 59.8 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Guarder - A Tunable Secure Allocator.eng.srt 59.6 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera27x.png 59.4 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Polisis - Automated Analysis and Presentation of Privacy Policies Using Deep Learning.eng.srt 59.1 KB
- USENIX Security 2016/USENIX Security 2016 Videos/Internet Jones and the Raiders of the Lost Trackers.eng.srt 59.0 KB
- USENIX Security 2018/USENIX Security 2018 Videos/An Empirical Analysis of Anonymity in Zcash.eng.srt 58.7 KB
- USENIX Security 2013/USENIX Security 2013 Videos/Windows 8 Security - Supporting User Confidence - Crispin Cowan.srt 58.6 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Modelling and Analysis of a Hierarchy of Distance Bounding Attacks.eng.srt 58.0 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Precise and Accurate Patch Presence Test for Binaries.eng.srt 58.0 KB
- USENIX Security 2018/USENIX Security 2018 Videos/HeapHopper - Bringing Bounded Model Checking to Heap Implementation Security.eng.srt 57.6 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Arbitrum - Scalable, private smart contracts.eng.srt 57.4 KB
- USENIX Security 2018/USENIX Security 2018 Videos/DATA - Differential Address Trace Analysis - Finding Address-based Side-Channels in Binaries.eng.srt 57.1 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Dependence-Preserving Data Compaction for Scalable Forensic Analysis.eng.srt 57.0 KB
- USENIX Security 2018/USENIX Security 2018 Videos/With Great Training Comes Great Vulnerability - Practical Attacks against Transfer Learning.eng.srt 57.0 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera26x.png 56.5 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Debloating Software through Piece-Wise Compilation and Loading.eng.srt 56.4 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Meltdown - Reading Kernel Memory from User Space.eng.srt 56.1 KB
- USENIX Security 2018/USENIX Security 2018 Videos/The Battle for New York - A Case Study of Applied Digital Threat Modeling at the Enterprise Level.eng.srt 55.7 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/js_2sjNGyfj3O57w8bimxly5mzgG70GrcIxxxYOEInwu1Q.js 55.7 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/js_2sjNGyfj3O57w8bimxly5mzgG70GrcIxxxYOEInwu1Q.js 55.7 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/js_2sjNGyfj3O57w8bimxly5mzgG70GrcIxxxYOEInwu1Q.js 55.7 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/js_2sjNGyfj3O57w8bimxly5mzgG70GrcIxxxYOEInwu1Q.js 55.7 KB
- USENIX Security 2018/USENIX Security 2018 Videos/The Broken Shield - Measuring Revocation Effectiveness in the Windows Code-Signing PKI.eng.srt 55.5 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Fp-Scanner - The Privacy Implications of Browser Fingerprint Inconsistencies.eng.srt 55.5 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Unveiling and Quantifying Facebook Exploitation of Sensitive Personal Data for Advertising Purposes.eng.srt 55.5 KB
- USENIX Security 2018/USENIX Security 2018 Videos/End-to-End Measurements of Email Spoofing Attacks.eng.srt 55.1 KB
- USENIX Security 2018/USENIX Security 2018 Videos/SAD THUG - Structural Anomaly Detection for Transmissions of High-value Information Using Graphics.eng.srt 54.6 KB
- USENIX Security 2016/USENIX Security 2016 Videos/k-fingerprinting A Robust Scalable Website Fingerprinting Technique.eng.srt 54.3 KB
- USENIX Security 2018/USENIX Security 2018 Videos/ATtention Spanned - Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem.eng.srt 54.2 KB
- USENIX Security 2016/USENIX Security 2016 Videos/Stealing Machine Learning Models via Prediction APIs.eng.srt 54.2 KB
- USENIX Security 2018/USENIX Security 2018 Videos/All Your GPS Are Belong To Us - Towards Stealthy Manipulation of Road Navigation Systems.eng.srt 54.0 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Erays - Reverse Engineering Ethereum's Opaque Smart Contracts.eng.srt 53.9 KB
- USENIX Security 2016/USENIX Security 2016 Videos/Making USB Great Again with USBFILTER.eng.srt 53.8 KB
- USENIX Security 2018/USENIX Security 2018 Videos/How Do Tor Users Interact With Onion Services.eng.srt 53.7 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Fear the Reaper - Characterization and Fast Detection of Card Skimmers.eng.srt 53.6 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/postmessageRelay_data/cbgapi.loaded_0 53.6 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/postmessageRelay_data/cbgapi.loaded_0 53.6 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/postmessageRelay_data/cbgapi.loaded_0 53.6 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/postmessageRelay_data/cbgapi.loaded_0 53.6 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/postmessageRelay_data/cbgapi.loaded_0 53.6 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/postmessageRelay_data/cbgapi.loaded_0 53.6 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/postmessageRelay_data/cbgapi.loaded_0 53.6 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/postmessageRelay_data/cbgapi.loaded_0 53.6 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/postmessageRelay_data/cbgapi.loaded_0 53.6 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/postmessageRelay_data/cbgapi.loaded_0 53.6 KB
- USENIX Security 2016/USENIX Security 2016 Videos/Fingerprinting Electronic Control Units for Vehicle Intrusion Detection.eng.srt 53.1 KB
- USENIX Security 2016/USENIX Security 2016 Videos/AuthLoop End-to-End Cryptographic Authentication for Telephony.eng.srt 53.1 KB
- USENIX Security 2016/USENIX Security 2016 Videos/Micro-Virtualization Memory Tracing to Detect and Prevent Spraying Attacks.eng.srt 53.0 KB
- USENIX Security 2018/USENIX Security 2018 Videos/A Bad Dream - Subverting Trusted Platform Module While You Are Sleeping.eng.srt 53.0 KB
- USENIX Security 2018/USENIX Security 2018 Videos/From Patching Delays to Infection Symptoms.eng.srt 53.0 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Analysis of Privacy Protections in Fitness Tracking Social Networks -or- You can run.eng.srt 52.8 KB
- USENIX Security 2016/USENIX Security 2016 Videos/Sanctum Minimal Hardware Extensions for Strong Software Isolation.eng.srt 52.5 KB
- USENIX Security 2016/USENIX Security 2016 Videos/Privacy in Epigenetics Temporal Linkability of MicroRNA Expression Profiles.eng.srt 52.4 KB
- USENIX Security 2016/USENIX Security 2016 Videos/ARMageddon Cache Attacks on Mobile Devices.eng.srt 52.4 KB
- USENIX Security 2018/USENIX Security 2018 Videos/ACES - Automatic Compartments for Embedded Systems.eng.srt 52.3 KB
- USENIX Security 2016/USENIX Security 2016 Videos/Oblivious Multi-Party Machine Learning on Trusted Processors.eng.srt 52.3 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Who Left Open the Cookie Jar A Comprehensive Evaluation of Third-Party Cookie Policies.eng.srt 52.3 KB
- USENIX Security 2016/USENIX Security 2016 Videos/Virtual U Defeating Face Liveness Detection by Building Virtual Models.eng.srt 52.2 KB
- USENIX Security 2016/USENIX Security 2016 Videos/On Omitting Commits and Committing Omissions Preventing Git Metadata.eng.srt 52.0 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Formal Security Analysis of Neural Networks using Symbolic Intervals.eng.srt 52.0 KB
- USENIX Security 2016/USENIX Security 2016 Videos/Thoth Comprehensive Policy Compliance in Data Retrieval Systems.eng.srt 52.0 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Understanding the Reproducibility of Crowd-reported Security Vulnerabilities.eng.srt 51.9 KB
- FOCI 2023/A Worldwide View of Nation state Internet Censorship.eng.srt 51.8 KB
- USENIX Security 2018/USENIX Security 2018 Videos/CommanderSong - A Systematic Approach for Practical Adversarial Voice Recognition.eng.srt 51.8 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Shielding Software From Privileged Side-Channel Attacks.eng.srt 51.7 KB
- USENIX Security 2016/USENIX Security 2016 Videos/Identifying and Characterizing Sybils in the Tor Network.eng.srt 51.7 KB
- USENIX Security 2016/USENIX Security 2016 Videos/FlowFence Practical Data Protection for Emerging IoT Application Frameworks.eng.srt 51.7 KB
- USENIX Security 2016/USENIX Security 2016 Videos/Towards Measuring and Mitigating Social Engineering Software Download Attacks.eng.srt 51.6 KB
- USENIX Security 2018/USENIX Security 2018 Videos/O Single Sign-Off, Where Art Thou An Empirical Analysis of Single Sign-On.eng.srt 51.5 KB
- USENIX Security 2016/USENIX Security 2016 Videos/Fast, Lean, and Accurate Modeling Password Guessability Using Neural Networks.eng.srt 51.5 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Freezing the Web - A Study of ReDoS Vulnerabilities in JavaScript-based Web Servers.eng.srt 51.1 KB
- USENIX Security 2016/USENIX Security 2016 Videos/Mirror Enabling Proofs of Data Replication and Retrievability in the Cloud.eng.srt 50.9 KB
- USENIX Security 2020/PEPR '20/PEPR 20 - Responsible Design through Experimentation Learnings from LinkedIn.eng.srt 50.9 KB
- USENIX Security 2016/USENIX Security 2016 Videos/Defending against Malicious Peripherals with Cinch.eng.srt 50.5 KB
- USENIX Security 2018/USENIX Security 2018 Videos/DIZK - A Distributed Zero Knowledge Proof System.eng.srt 50.4 KB
- USENIX Security 2018/USENIX Security 2018 Videos/The aftermath of a crypto-ransomware attack at a large academic institution.eng.srt 50.4 KB
- USENIX Security 2018/USENIX Security 2018 Videos/QSYM - A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing.eng.srt 50.3 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Towards a Secure Zero-rating Framework with Three Parties.eng.srt 50.2 KB
- USENIX Security 2016/USENIX Security 2016 Videos/Off-Path TCP Exploits Global Rate Limit Considered Dangerous.eng.srt 50.1 KB
- USENIX Security 2016/USENIX Security 2016 Videos/The Million-Key Question-Investigating the Origins of RSA Public Keys.eng.srt 50.1 KB
- USENIX Security 2010/USENIX Security 2010 Presentations/Toward an Open and Secure Platform for Using the Web - Will Drewry.html 50.0 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/Reverse-Engineering a Cryptographic RFID Tag_files/Mifare-orig-scale.jpg 49.7 KB
- USENIX Security 2018/USENIX Security 2018 Videos/We Still Don't Have Secure Cross-Domain Requests - an Empirical Study of CORS.eng.srt 49.5 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Charm - Facilitating Dynamic Analysis of Device Drivers of Mobile Systems.eng.srt 49.0 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Discovering Flaws in Security-Focused Static Analysis Tools for Android using Systematic Mutation.eng.srt 48.8 KB
- USENIX Security 2018/USENIX Security 2018 Videos/NAVEX - Precise and Scalable Exploit Generation for Dynamic Web Applications.eng.srt 48.7 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Off-Path TCP Exploit - How Wireless Routers Can Jeopardize Your Secrets.eng.srt 48.7 KB
- USENIX Security 2016/USENIX Security 2016 Videos/UNVEIL A Large-Scale, Automated Approach to Detecting Ransomware.eng.srt 48.6 KB
- USENIX Security 2016/USENIX Security 2016 Videos/Predicting, Decrypting, and Abusing WPA2 802.11 Group Keys.eng.srt 48.5 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Inception - System-Wide Security Testing of Real-World Embedded Systems Software.eng.srt 48.5 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Reading Thieves' Cant - Automatically Identifying and Understanding Dark Jargons from Cybercrime.eng.srt 48.4 KB
- USENIX Security 2018/USENIX Security 2018 Videos/FlowCog - Context-aware Semantics Extraction and Analysis of Information Flow Leaks in Android Apps.eng.srt 48.3 KB
- USENIX Security 2016/USENIX Security 2016 Videos/Faster Malicious 2-Party Secure Computation with Online Offline Dual Execution.eng.srt 48.1 KB
- USENIX Security 2016/USENIX Security 2016 Videos/On Demystifying the Android Application Framework Re-Visiting Android.eng.srt 48.1 KB
- USENIX Security 2016/USENIX Security 2016 Videos/An In-Depth Analysis of Disassembly on Full-Scale x86 x64 Binaries.eng.srt 48.1 KB
- USENIX Security 2016/USENIX Security 2016 Videos/Tracing Information Flows Between Ad Exchanges Using Retargeted Ads.eng.srt 47.9 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/plusone.js 47.8 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/plusone.js 47.8 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/plusone.js 47.8 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/plusone.js 47.8 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/plusone.js 47.8 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/plusone.js 47.8 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/plusone.js 47.8 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/plusone.js 47.8 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/plusone.js 47.8 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/plusone.js 47.8 KB
- USENIX Security 2016/USENIX Security 2016 Videos/Screen after Previous Screens Spatial-Temporal Recreation of Android App.eng.srt 47.8 KB
- USENIX Security 2020/PEPR '20/PEPR 20 - Taking Responsibility for Someone Elses Code Studying the Privacy Behaviors of Mobile.eng.srt 47.5 KB
- USENIX Security 2016/USENIX Security 2016 Videos/Protecting Privacy of BLE Device Users.eng.srt 47.5 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Who Is Answering My Queries - Understanding and Characterizing Interception.eng.srt 47.4 KB
- USENIX Security 2016/USENIX Security 2016 Videos/All Your Queries Are Belong to Us The Power of File-Injection Attacks.eng.srt 47.2 KB
- USENIX Security 2016/USENIX Security 2016 Videos/Authenticated Network Time Synchronization.eng.srt 47.1 KB
- USENIX Security 2015/USENIX Security 2015 Presentations/sec15_title_organizers.pdf 46.8 KB
- USENIX Security 2016/USENIX Security 2016 Videos/One Bit Flips, One Cloud Flops Cross-VM Row Hammer Attacks.eng.srt 46.7 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Man-in-the-Machine - Exploiting Ill-Secured Communication Inside the Computer.eng.srt 46.7 KB
- FOCI 2023/Crowdsourcing the Discovery of Server-side Censorship Evasion Strategies.eng.srt 46.6 KB
- USENIX Security 2016/USENIX Security 2016 Videos/What Cannot Be Read, Cannot Be Leveraged Revisiting Assumptions of JIT-ROP.eng.srt 46.5 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/js_sWOO4PbSe161nCKWEJProMMhdbu_pfXMDzdRrMGBIE0.js 46.5 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/js_sWOO4PbSe161nCKWEJProMMhdbu_pfXMDzdRrMGBIE0.js 46.5 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/js_zKsxChQ0ZiM23lE1j-H3wIlMQpnOrGQN3oQ-70N6r40.js 46.5 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/js_sWOO4PbSe161nCKWEJProMMhdbu_pfXMDzdRrMGBIE0.js 46.5 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/js_sWOO4PbSe161nCKWEJProMMhdbu_pfXMDzdRrMGBIE0.js 46.5 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/js_sWOO4PbSe161nCKWEJProMMhdbu_pfXMDzdRrMGBIE0.js 46.5 KB
- FOCI 2023/Running a high-performance pluggable transports Tor bridge.eng.srt 46.5 KB
- USENIX Security 2018/USENIX Security 2018 Videos/WPSE - Fortifying Web Protocols via Browser-Side Security Monitoring.eng.srt 46.4 KB
- USENIX Security 2016/USENIX Security 2016 Videos/Harvesting Inconsistent Security Configurations in Custom Android ROMs.eng.srt 46.3 KB
- USENIX Security 2016/USENIX Security 2016 Videos/Specification Mining for Intrusion Detection in Networked Control Systems.eng.srt 46.0 KB
- USENIX Security 2019/USENIX Security 2019 Video/Please Pay Inside Evaluating Bluetooth-based Detection of Gas Pump Skimmers.eng.srt 45.8 KB
- USENIX Security 2018/USENIX Security 2018 Videos/IMIX - In-Process Memory Isolation EXtension.eng.srt 45.7 KB
- USENIX Security 2016/USENIX Security 2016 Videos/Egalitarian Computing.eng.srt 45.4 KB
- USENIX Security 2019/USENIX Security 2019 Video/JEDI Many-to-Many End-to-End Encryption and Key Delegation for IoT.eng.srt 45.3 KB
- USENIX Security 2020/PEPR '20/PEPR 20 - Building and Deploying a Privacy Preserving Data Analysis Platform.eng.srt 45.2 KB
- USENIX Security 2018/USENIX Security 2018 Videos/An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications.eng.srt 44.8 KB
- USENIX Security 2016/USENIX Security 2016 Videos/DRAMA Exploiting DRAM Addressing for Cross-CPU Attacks.eng.srt 44.7 KB
- USENIX Security 2016/USENIX Security 2016 Videos/APISan Sanitizing API Usages through Semantic Cross-Checking.eng.srt 44.3 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/analytics.js 44.2 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/analytics.js 44.2 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/analytics.js 44.2 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/analytics.js 44.2 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/analytics.js 44.2 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/analytics.js 44.2 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/analytics.js 44.2 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/analytics.js 44.2 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/analytics.js 44.2 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/analytics.js 44.2 KB
- USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/analytics.js 44.2 KB
- USENIX Security 2017/USENIX Security 2017 USENIX_files/analytics.js 44.2 KB
- USENIX Security 2018/USENIX Security 2018 Program at a Glance USENIX_files/analytics.js 44.2 KB
- USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/analytics.js 44.2 KB
- USENIX Security 2018/USENIX Security 2018 USENIX_files/analytics.js 44.2 KB
- USENIX Security 2019/USENIX Security 2019 Program at a Glance USENIX_files/analytics.js 44.2 KB
- USENIX Security 2019/USENIX Security 2019 USENIX_files/analytics.js 44.2 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/Reverse-Engineering a Cryptographic RFID Tag.htm 44.0 KB
- USENIX Security 2019/USENIX Security 2019 Video/Protecting accounts from credential stuffing with password breach alerting.eng.srt 43.9 KB
- USENIX Security 2020/PEPR '20/PEPR 20 - Privacy Architecture for Data-Driven Innovation Configure.eng.srt 43.8 KB
- FOCI 2023/Rethinking Realistic Adversaries for Anonymous Communication Systems.eng.srt 43.8 KB
- USENIX Security 2020/PEPR '20/PEPR 20 - When Things Go Wrong.eng.srt 43.6 KB
- USENIX Security 2019/USENIX Security 2019 Video/Detecting and Characterizing Lateral Phishing at Scale.eng.srt 43.3 KB
- USENIX Security 2020/PEPR '20/PEPR 20 - Design of a Privacy Infrastructure for the Internet of Things.eng.srt 43.2 KB
- USENIX Security 2015/USENIX Security 2015 Presentations/sec15_message.pdf 42.9 KB
- USENIX Security 2016/USENIX Security 2016 Videos/Lock It and Still Lose It -on the (In)Security of Automotive Remote Keyless.eng.srt 42.9 KB
- USENIX Security 2018/USENIX Security 2018 Videos/FANCI - Feature-based Automated NXDomain Classification and Intelligence.eng.srt 42.7 KB
- USENIX Security 2016/USENIX Security 2016 Videos/OblivP2P An Oblivious Peer-to-Peer Content Sharing System.eng.srt 42.7 KB
- USENIX Security 2016/USENIX Security 2016 Videos/Optimized Invariant Representation of Network Traffic for Detecting Unseen.eng.srt 42.5 KB
- USENIX Security 2016/USENIX Security 2016 Videos/DROWN Breaking TLS Using SSLv2.eng.srt 42.5 KB
- USENIX Security 2016/USENIX Security 2016 Videos/Request and Conquer Exposing Cross-Origin Resource Size.eng.srt 42.3 KB
- USENIX Security 2020/PEPR '20/PEPR 20 - How to (In)Effectively Convey Privacy Choices with Icons and Link Text.eng.srt 42.2 KB
- USENIX Security 2019/USENIX Security 2019 Video/The Art of The Scam Demystifying Honeypots in Ethereum Smart Contracts.eng.srt 42.1 KB
- USENIX Security 2019/USENIX Security 2019 Video/WAVE A Decentralized Authorization Framework with Transitive Delegation.eng.srt 41.9 KB
- USENIX Security 2015/USENIX Security 2015 Videos/Investigating the Computer Security Practices and Needs of Journalists.srt 41.7 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Enabling Refinable Cross-Host Attack Investigation with Efficient Data Flow Tagging and Tracking.eng.srt 41.3 KB
- ScAINet 2020/On Adaptive Attacks to Adversarial Example Defenses.eng.srt 40.7 KB
- USENIX Security 2019/USENIX Security 2019 Video/Inadvertently Making Cyber Criminals Rich A Comprehensive Study of.eng.srt 40.6 KB
- USENIX Security 2019/USENIX Security 2019 Video/Understanding and Improving Security and Privacy in Multi-User.eng.srt 40.6 KB
- USENIX Security 2018/USENIX Security 2018 Videos/End-Users Get Maneuvered - Empirical Analysis of Redirection Hijacking in Content Delivery Networks.eng.srt 39.6 KB
- USENIX Security 2015/USENIX Security 2015 Videos/Trustworthy Whole-System Provenance for the Linux Kernel.srt 39.6 KB
- USENIX Security 2016/USENIX Security 2016 Videos/The Ever-Changing Labyrinth A Large-Scale Analysis of Wildcard DNS Powered.eng.srt 39.5 KB
- USENIX Security 2019/USENIX Security 2019 Video/Leaky Images Targeted Privacy Attacks in the Web.eng.srt 39.5 KB
- USENIX Security 2013/USENIX Security 2013 Videos/Dismantling Megamos Crypto Wirelessly Lockpicking a Vehicle Immobilizer - Roel Verdult, Flavio D. Garcia, Baris Ege.srt 39.4 KB
- USENIX Security 2015/USENIX Security 2015 Videos/The Unexpected Dangers of Dynamic JavaScript.srt 39.3 KB
- USENIX Security 2019/USENIX Security 2019 Video/Evaluating the Contextual Integrity of Privacy Regulation Parents' IoT.eng.srt 39.2 KB
- USENIX Security 2019/USENIX Security 2019 Video/Misleading Authorship Attribution of Source Code using Adversarial Learning.eng.srt 38.9 KB
- USENIX Security 2019/USENIX Security 2019 Video/Scalable Scanning and Automatic Classification of TLS Padding Oracle.eng.srt 38.7 KB
- USENIX Security 2016/USENIX Security 2016 Videos/An Empirical Study of Textual Key-Fingerprint Representations.eng.srt 38.4 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Sensitive Information Tracking in Commodity IoT.eng.srt 38.4 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Schrödinger's RAT - Profiling the Stakeholders in the Remote Access Trojan Ecosystem.eng.srt 38.4 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/sec16_button_180.png 38.3 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/sec16_button_180.png 38.3 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/sec16_button_180.png 38.3 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/sec16_button_180.png 38.3 KB
- USENIX Security 2020/PEPR '20/PEPR 20 - Assessing Privacy Risk with the IPA Triad.eng.srt 38.2 KB
- USENIX Security 2020/PEPR '20/PEPR 20 - Privacy in Deployment.eng.srt 38.2 KB
- USENIX Security 2016/USENIX Security 2016 Videos/Undermining Information Hiding (and What to Do about It).eng.srt 38.1 KB
- USENIX Security 2019/USENIX Security 2019 Video/Platforms in Everything Analyzing Ground-Truth Data on the Anatomy and.eng.srt 38.1 KB
- USENIX Security 2019/USENIX Security 2019 Video/simTPM User-centric TPM for Mobile Devices.eng.srt 38.1 KB
- USENIX Security 2019/USENIX Security 2019 Video/On (The Lack Of) Location Privacy in Crowdsourcing Applications.eng.srt 38.0 KB
- USENIX Security 2019/USENIX Security 2019 Video/The Secret Sharer Evaluating and Testing Unintended Memorization in.eng.srt 38.0 KB
- USENIX Security 2020/PEPR '20/PEPR 20 - Wikipedia and the Lean Data Diet.eng.srt 38.0 KB
- USENIX Security 2016/USENIX Security 2016 Videos/PIkit A New Kernel-Independent Processor-Interconnect Rootkit.eng.srt 37.9 KB
- USENIX Security 2019/USENIX Security 2019 Video/in-toto Providing farm-to-table guarantees for bits and bytes.eng.srt 37.9 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Forgetting of Passwords - Ecological Theory and Data.eng.srt 37.8 KB
- FOCI 2023/Detecting Network Interference Without Endpoint Participation.eng.srt 37.7 KB
- USENIX Security 2019/USENIX Security 2019 Video/CONFIRM Evaluating Compatibility and Relevance of Control-flow.eng.srt 37.7 KB
- USENIX Security 2019/USENIX Security 2019 Video/Site Isolation Process Separation for Web Sites within the Browser.eng.srt 37.6 KB
- USENIX Security 2019/USENIX Security 2019 Video/All Things Considered An Analysis of IoT Devices on Home Networks.eng.srt 37.5 KB
- USENIX Security 2019/USENIX Security 2019 Video/Point Break A Study of Bandwidth Denial-of-Service Attacks against Tor.eng.srt 37.5 KB
- USENIX Security 2018/27th USENIX Security Symposium Grid_files/jquery_004.js 37.4 KB
- USENIX Security 2019/28th USENIX Security Symposium Grid_files/jquery.js 37.4 KB
- USENIX Security 2020/PEPR '20/PEPR 20 - Improving Usability of Differential Privacy at Scale.eng.srt 37.3 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Injected and Delivered - Fabricating Implicit Control over Actuation Systems by Spoofing.eng.srt 37.2 KB
- USENIX Security 2016/USENIX Security 2016 Videos/ZKBoo Faster Zero-Knowledge for Boolean Circuits.eng.srt 37.1 KB
- USENIX Security 2019/USENIX Security 2019 Video/A Study of the Feasibility of Co-located App Attacks against BLE.eng.srt 37.0 KB
- USENIX Security 2019/USENIX Security 2019 Video/Tracing Transactions Across Cryptocurrency Ledgers.eng.srt 36.9 KB
- USENIX Security 2019/USENIX Security 2019 Video/HardFails Insights into Software-Exploitable Hardware Bugs.eng.srt 36.8 KB
- USENIX Security 2016/USENIX Security 2016 Videos/Automatically Detecting Error Handling Bugs Using Error Specifications.eng.srt 36.7 KB
- USENIX Security 2019/USENIX Security 2019 Video/Clinical Computer Security for Victims of Intimate Partner Violence.eng.srt 36.6 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Acquisitional Rule-based Engine for Discovering Internet-of-Things Devices.eng.srt 36.6 KB
- USENIX Security 2019/USENIX Security 2019 Video/The Web's Identity Crisis Understanding the Effectiveness of Website Identity.eng.srt 36.6 KB
- USENIX Security 2019/USENIX Security 2019 Video/50 Ways to Leak Your Data An Exploration of Apps'.eng.srt 36.2 KB
- USENIX Security 2019/USENIX Security 2019 Video/ScatterCache Thwarting Cache Attacks via Cache Set Randomization.eng.srt 36.1 KB
- USENIX Security 2019/USENIX Security 2019 Video/ERIM Secure, Efficient In-process Isolation with Protection Keys (MPK).eng.srt 36.0 KB
- ScAINet 2020/Combating Social Media Information Operations with Neural Language Models.eng.srt 36.0 KB
- USENIX Security 2020/ScAINet '20/ScAINet 20 - Combating Social Media Information Operations with Neural Language Models.eng.srt 36.0 KB
- USENIX Security 2019/USENIX Security 2019 Video/Computer Security and Privacy in the Interactions Between Victim.eng.srt 35.9 KB
- USENIX Security 2019/USENIX Security 2019 Video/Pythia Remote Oracles for the Masses.eng.srt 35.8 KB
- USENIX Security 2019/USENIX Security 2019 Video/All Your Clicks Belong to Me Investigating Click Interception on the Web.eng.srt 35.8 KB
- USENIX Security 2019/USENIX Security 2019 Video/AntiFuzz Impeding Fuzzing Audits of Binary Executables.eng.srt 35.6 KB
- USENIX Security 2019/USENIX Security 2019 Video/VRASED A Verified Hardware Software Co-Design for Remote Attestation.eng.srt 35.5 KB
- USENIX Security 2019/USENIX Security 2019 Video/CT-GAN Malicious Tampering of 3D Medical Imagery using Deep Learning.eng.srt 35.4 KB
- FOCI 2023/Towards a Comprehensive Understanding of Russian Transit Censorship.eng.srt 35.4 KB
- USENIX Security 2019/USENIX Security 2019 Video/FastKitten Practical Smart Contracts on Bitcoin.eng.srt 35.2 KB
- USENIX Security 2009/USENIX Security 2009 Videos/Opening Remarks - Fabian Monrose.mp3 35.1 KB
- USENIX Security 2019/USENIX Security 2019 Video/High Precision Detection of Business Email Compromise.eng.srt 35.0 KB
- USENIX Security 2019/USENIX Security 2019 Video/TESSERACT Eliminating Experimental Bias in Malware Classification.eng.srt 35.0 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/ozment_andy_sec13.jpg 35.0 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Vetting Single Sign-On SDK Implementations via Symbolic Reasoning.eng.srt 34.8 KB
- USENIX Security 2019/USENIX Security 2019 Video/Improving Robustness of ML Classifiers against Realizable Evasio.eng.srt 34.8 KB
- USENIX Security 2019/USENIX Security 2019 Video/Not Everything is Dark and Gloomy Power Grid Protections Against IoT.eng.srt 34.6 KB
- USENIX Security 2019/USENIX Security 2019 Video/BITE Bitcoin Lightweight Client Privacy using Trusted Execution.eng.srt 34.6 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera5x.png 34.6 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera6x.png 34.5 KB
- USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/sec09_banner.jpg 34.4 KB
- USENIX Security 2009/USENIX Security 2009 Technical Sessions_files/sec09_banner.jpg 34.4 KB
- USENIX Security 2009/USENIX Security 2009 WiPs_files/sec09_banner.jpg 34.4 KB
- USENIX Security 2020/PEPR '20/PEPR 20 - Beyond Access Using Abac Frameworks to Implement Privacy and Security Policies.eng.srt 34.1 KB
- USENIX Security 2019/USENIX Security 2019 Video/Discovering and Understanding the Security Hazards in the.eng.srt 34.1 KB
- USENIX Security 2015/USENIX Security 2015 Videos/All Your Biases Belong to Us - Breaking RC4 in WPA-TKIP and TLS.srt 34.0 KB
- USENIX Security 2019/USENIX Security 2019 Video/Losing the Car Keys Wireless PHY-Layer Insecurity in EV Charging.eng.srt 33.9 KB
- USENIX Security 2019/USENIX Security 2019 Video/Users Really Do Answer Telephone Scams.eng.srt 33.6 KB
- USENIX Security 2019/USENIX Security 2019 Video/ALOHA Auxiliary Loss Optimization for Hypothesis Augmentation.eng.srt 33.6 KB
- USENIX Security 2019/USENIX Security 2019 Video/PAC it up Towards Pointer Integrity using ARM Pointer Authentication.eng.srt 33.5 KB
- USENIX Security 2019/USENIX Security 2019 Video/Mobile Private Contact Discovery at Scale.eng.srt 33.5 KB
- USENIX Security 2019/USENIX Security 2019 Video/EnTrust Regulating Sensor Access by Cooperating Programs.eng.srt 33.4 KB
- USENIX Security 2015/USENIX Security 2015 Videos/Sound-Proof - Usable Two-Factor Authentication Based on Ambient Sound.srt 33.4 KB
- USENIX Security 2019/USENIX Security 2019 Video/KEPLER Facilitating Control-flow Hijacking Primitive Evaluation for Linux.eng.srt 33.3 KB
- ScAINet 2020/Getting Passive Aggressive about False Positives.eng.srt 33.2 KB
- USENIX Security 2020/ScAINet '20/ScAINet 20 - Getting Passive Aggressive about False Positives.eng.srt 33.2 KB
- USENIX Security 2019/USENIX Security 2019 Video/What Are You Searching For A Remote Keylogging Attack.eng.srt 33.2 KB
- USENIX Security 2019/USENIX Security 2019 Video/SafeHidden An Efficient and Secure Information Hiding Technique Using.eng.srt 33.0 KB
- USENIX Security 2015/USENIX Security 2015 Videos/Cloudy with a Chance of Breach - Forecasting Cyber Security Incidents.srt 33.0 KB
- USENIX Security 2020/PEPR '20/PEPR 20 - Engineering Ethics into the NIST Privacy Framework.eng.srt 33.0 KB
- USENIX Security 2020/PEPR '20/PEPR 20 - When Engineers and Lawyers Talk Right-Sizing Your Data Protection Risk Profile.eng.srt 32.7 KB
- USENIX Security 2019/USENIX Security 2019 Video/IODINE Verifying Constant-Time Execution of Hardware.eng.srt 32.7 KB
- USENIX Security 2019/USENIX Security 2019 Video/SPOILER Speculative Load Hazards Boost Rowhammer and Cache Attacks.eng.srt 32.6 KB
- USENIX Security 2019/USENIX Security 2019 Video/Detecting Missing-Check Bugs via Semantic- and Context-Aware.eng.srt 32.6 KB
- USENIX Security 2019/USENIX Security 2019 Video/Blind Bernoulli Trials A Noninteractive Protocol For Hidden-Weight Coin Flips.eng.srt 32.6 KB
- USENIX Security 2015/USENIX Security 2015 Videos/Type Casting Verification - Stopping an Emerging Attack Vector.srt 32.5 KB
- USENIX Security 2019/USENIX Security 2019 Video/Terminal Brain Damage Exposing the Graceless Degradation in Deep.eng.srt 32.5 KB
- USENIX Security 2019/USENIX Security 2019 Video/A Systematic Evaluation of Transient Execution Attacks and Defenses.eng.srt 32.5 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera21x.png 32.4 KB
- USENIX Security 2019/USENIX Security 2019 Video/PolicyLint Investigating Internal Privacy Policy Contradictions on Google.eng.srt 32.2 KB
- USENIX Security 2023/Squint Hard Enough Attacking Perceptual Hashing with Adversarial Machine.eng.srt 32.1 KB
- USENIX Security 2019/USENIX Security 2019 Video/Secure Multi-User Content Sharing for Augmented Reality Applications.eng.srt 32.1 KB
- USENIX Security 2019/USENIX Security 2019 Video/Everyone is Different Client-side Diversification for Defending.eng.srt 32.1 KB
- USENIX Security 2019/USENIX Security 2019 Video/Exploiting Unprotected I O Operations in AMD's Secure Encrypted Virtualization.eng.srt 32.1 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/js_yui9lDPs2dTDFfQPtmwCCL63T1k2MGsGrsTM-7Eo2Ts.js 32.1 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/js_yui9lDPs2dTDFfQPtmwCCL63T1k2MGsGrsTM-7Eo2Ts.js 32.1 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/js_yui9lDPs2dTDFfQPtmwCCL63T1k2MGsGrsTM-7Eo2Ts.js 32.1 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/js_yui9lDPs2dTDFfQPtmwCCL63T1k2MGsGrsTM-7Eo2Ts.js 32.1 KB
- USENIX Security 2023/VulChecker Graph-based Vulnerability Localization in Source Code.eng.srt 32.0 KB
- USENIX Security 2019/USENIX Security 2019 Video/Johnny, you are fired - Spoofing OpenPGP and S MIME Signatures in Emails.eng.srt 32.0 KB
- USENIX Security 2022/SIMC ML Inference Secure Against Malicious Clients at Semi-Honest Cost.srt 31.9 KB
- USENIX Security 2019/USENIX Security 2019 Video/StrongChain Transparent and Collaborative Proof-of-Work Consensus.eng.srt 31.8 KB
- ScAINet 2020/Optimization for Attack Surface Exploration The Case of TLS.eng.srt 31.7 KB
- USENIX Security 2020/ScAINet '20/ScAINet 20 - Optimization for Attack Surface Exploration The Case of TLS.eng.srt 31.7 KB
- USENIX Security 2018/USENIX Security 2018 Videos/Simple Password-Hardened Encryption Services.eng.srt 31.6 KB
- USENIX Security 2019/USENIX Security 2019 Video/CANvas Fast and Inexpensive Automotive Network Mapping.eng.srt 31.4 KB
- USENIX Security 2023/VeriZexe Decentralized Private Computation with Universal Setup.eng.srt 31.4 KB
- USENIX Security 2019/USENIX Security 2019 Video/UWB-ED Distance Enlargement Attack Detection in Ultra-Wideband.eng.srt 31.4 KB
- USENIX Security 2019/USENIX Security 2019 Video/The KNOB is Broken Exploiting Low Entropy in the Encryption Key.eng.srt 31.3 KB
- USENIX Security 2019/USENIX Security 2019 Video/RAZOR A Framework for Post-deployment Software Debloating.eng.srt 31.1 KB
- USENIX Security 2019/USENIX Security 2019 Video/Reading the Tea leaves A Comparative Analysis of Threat Intelligence.eng.srt 31.1 KB
- USENIX Security 2019/USENIX Security 2019 Video/ATTACK2VEC Leveraging Temporal Word Embeddings to Understand the.eng.srt 30.8 KB
- USENIX Security 2019/USENIX Security 2019 Video/HideMyApp Hiding the Presence of Sensitive Apps on Android.eng.srt 30.7 KB
- USENIX Security 2019/USENIX Security 2019 Video/A Billion Open Interfaces for Eve and Mallory MitM, DoS, and Tracking.eng.srt 30.7 KB
- USENIX Security 2019/USENIX Security 2019 Video/Hiding in Plain Signal Physical Signal Overshadowing Attack on LTE.eng.srt 30.6 KB
- USENIX Security 2022/Rapid Prototyping for Microarchitectural Attacks.srt 30.5 KB
- USENIX Security 2019/USENIX Security 2019 Video/The Betrayal At Cloud City An Empirical Analysis Of Cloud-Based Mobile.eng.srt 30.4 KB
- USENIX Security 2019/USENIX Security 2019 Video/Protecting Cloud Virtual Machines from Hypervisor and Host Operating.eng.srt 30.3 KB
- USENIX Security 2022/Who Are You (I Really Wanna Know) Detecting Audio DeepFakes Through Vocal.srt 30.3 KB
- USENIX Security 2020/PEPR '20/PEPR 20 - Beyond the Individual Exploring Data Protection by Design in Connected Communal Spaces.eng.srt 30.3 KB
- USENIX Security 2023/Duoram A Bandwidth-Efficient Distributed ORAM for 2- and 3-Party Computation.eng.srt 30.3 KB
- USENIX Security 2019/USENIX Security 2019 Video/RVFuzzer Finding Input Validation Bugs in Robotic Vehicles through.eng.srt 30.3 KB
- USENIX Security 2019/USENIX Security 2019 Video/Back to the Whiteboard a Principled Approach for the Assessment and.eng.srt 30.3 KB
- USENIX Security 2023/DScope A Cloud-Native Internet Telescope.eng.srt 30.1 KB
- USENIX Security 2010/USENIX Security 2010 Poster Session_files/sec10_banner.jpg 30.1 KB
- USENIX Security 2010/USENIX Security 2010 Technical Sessions_files/sec10_banner.jpg 30.1 KB
- USENIX Security 2022/Security Analysis of Camera-LiDAR Fusion Against Black-Box Attacks.srt 30.1 KB
- USENIX Security 2019/USENIX Security 2019 Video/Identifying Cache-Based Side Channels through Secret-Augmented.eng.srt 30.1 KB
- USENIX Security 2023/Downfall Exploiting Speculative Data Gathering.eng.srt 30.1 KB
- USENIX Security 2019/USENIX Security 2019 Video/Rendered Private Making GLSL Execution Uniform to Prevent WebGL-based.eng.srt 30.1 KB
- USENIX Security 2019/USENIX Security 2019 Video/The Anatomy of a Cryptocurrency Pump-and-Dump Scheme.eng.srt 30.0 KB
- USENIX Security 2021/Communication-Computation Trade-offs in PIR.eng.srt 29.9 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/sec14_media.png 29.9 KB
- USENIX Security 2022/Automated Detection of Automated Traffic.srt 29.9 KB
- USENIX Security 2019/USENIX Security 2019 Video/From IP ID to Device ID and KASLR Bypass.eng.srt 29.9 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/sec13_media.png 29.8 KB
- USENIX Security 2023/Wink Deniable Secure Messaging.eng.srt 29.8 KB
- USENIX Security 2019/USENIX Security 2019 Video/Towards the Detection of Inconsistencies in Public Security.eng.srt 29.6 KB
- USENIX Security 2022/Don't Mesh Around Side-Channel Attacks and Mitigations on Mesh Interconnects.srt 29.5 KB
- USENIX Security 2019/USENIX Security 2019 Video/GRIMOIRE Synthesizing Structure while Fuzzing.eng.srt 29.5 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/ie.htm 29.5 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/ie.htm 29.5 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/ie.htm 29.5 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/ie.htm 29.5 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/ie.htm 29.5 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/ie.htm 29.5 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/ie.htm 29.5 KB
- USENIX Security 2015/USENIX Security 2015 Full Proceedings erratum.pdf 29.4 KB
- USENIX Security 2015/USENIX Security 2015 Presentations/sec15_erratum.pdf 29.4 KB
- USENIX Security 2019/USENIX Security 2019 Video/MOPT Optimized Mutation Scheduling for Fuzzers.eng.srt 29.4 KB
- USENIX Security 2019/USENIX Security 2019 Video/When the Signal is in the Noise Exploiting Diffix's Sticky Noise.eng.srt 29.4 KB
- USENIX Security 2019/USENIX Security 2019 Video/Origin-sensitive Control Flow Integrity.eng.srt 29.3 KB
- USENIX Security 2019/USENIX Security 2019 Video/The CrossPath Attack Disrupting the SDN Control Channel via Shared Links.eng.srt 29.1 KB
- USENIX Security 2019/USENIX Security 2019 Video/FIRM-AFL High-Throughput Greybox Fuzzing of IoT Firmware via.eng.srt 29.1 KB
- USENIX Security 2021/Breaking Through Binaries Compiler-quality Instrumentation for Better.eng.srt 29.0 KB
- USENIX Security 2020/USENIX Security 2020 Videos/Stolen Memories Leveraging Model Memorization for Calibrated White-Box.eng.srt 28.9 KB
- USENIX Security 2022/How to Peel a Million Validating and Expanding Bitcoin Clusters.srt 28.9 KB
- USENIX Security 2019/USENIX Security 2019 Video/Understanding iOS-based Crowdturfing Through Hidden UI Analysis.eng.srt 28.9 KB
- USENIX Security 2020/USENIX Security 2020 Videos/Towards HTTPS Everywhere on Android We Are Not There Yet.eng.srt 28.8 KB
- USENIX Security 2019/USENIX Security 2019 Video/Stack Overflow Considered Helpful Deep Learning Security Nudges Towards.eng.srt 28.8 KB
- USENIX Security 2023/Distance-Aware Private Set Intersection.eng.srt 28.8 KB
- USENIX Security 2020/USENIX Security 2020 Videos/Light Commands Laser-Based Audio Injection Attacks on Voice-Controllable.eng.srt 28.7 KB
- USENIX Security 2019/USENIX Security 2019 Video/Looking from the Mirror Evaluating IoT Device Security through.eng.srt 28.6 KB
- USENIX Security 2019/USENIX Security 2019 Video/Iframes Popups Are Dangerous in Mobile WebView Studying and.eng.srt 28.5 KB
- USENIX Security 2023/Security is not my field, I’m a stats guy A Qualitative Root Cause.eng.srt 28.3 KB
- USENIX Security 2019/USENIX Security 2019 Video/Birthday, Name and Bifacial-security Understanding Passwords.eng.srt 28.3 KB
- USENIX Security 2019/USENIX Security 2019 Video/EnFuzz Ensemble Fuzzing with Seed Synchronization among Diverse Fuzzers.eng.srt 28.2 KB
- USENIX Security 2019/USENIX Security 2019 Video/PeX A Permission Check Analysis Framework for Linux Kernel.eng.srt 28.2 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera14x.png 28.1 KB
- USENIX Security 2019/USENIX Security 2019 Video/uXOM Efficient eXecute-Only Memory on ARM Cortex-M.eng.srt 28.1 KB
- USENIX Security 2022/Trust Dies in Darkness Shedding Light on Samsung's TrustZone Keymaster Design.srt 28.1 KB
- USENIX Security 2023/Prime Match A Privacy-Preserving Inventory Matching System.eng.srt 28.0 KB
- USENIX Security 2021/Security Analysis of the Democracy Live Online Voting System.eng.srt 28.0 KB
- USENIX Security 2022/Secure Poisson Regression.srt 28.0 KB
- USENIX Security 2019/USENIX Security 2019 Video/Probability Model Transforming Encoders Against Encoding Attacks.eng.srt 27.8 KB
- USENIX Security 2023/Fine-grained Poisoning Attack to Local Differential Privacy Protocols for.eng.srt 27.8 KB
- USENIX Security 2020/USENIX Security 2020 Videos/Automatic Techniques to Systematically Discover New Heap Exploitation.eng.srt 27.8 KB
- USENIX Security 2022/Experimenting with Collaborative zk-SNARKs Zero-Knowledge Proofs for.srt 27.7 KB
- USENIX Security 2023/MTSan A Feasible and Practical Memory Sanitizer for Fuzzing COTS Binaries.eng.srt 27.7 KB
- CSET 2020/Historical Analysis of Exploit Availability Timelines.eng.srt 27.7 KB
- USENIX Security 2020/CSET '20/CSET 20 - Historical Analysis of Exploit Availability Timelines.eng.srt 27.7 KB
- USENIX Security 2023/Practical Asynchronous High-threshold Distributed Key Generation and.eng.srt 27.6 KB
- USENIX Security 2023/URET Universal Robustness Evaluation Toolkit (for Evasion).eng.srt 27.6 KB
- USENIX Security 2020/PEPR '20/PEPR 20 - Privacy Professional Boss Mode.eng.srt 27.5 KB
- CSET 2020/Toward Orchestration of Complex Networking Experiments.eng.srt 27.4 KB
- USENIX Security 2020/CSET '20/CSET 20 - Toward Orchestration of Complex Networking Experiments.eng.srt 27.4 KB
- USENIX Security 2015/USENIX Security 2015 Videos/Post-Mortem of a Zombie - Conficker Cleanup After Six Years.srt 27.3 KB
- USENIX Security 2023/Trojan Source Invisible Vulnerabilities.eng.srt 27.3 KB
- USENIX Security 2019/USENIX Security 2019 Video/Fuzzification Anti-Fuzzing Techniques.eng.srt 27.3 KB
- USENIX Security 2022/End-to-Same-End Encryption Modularly Augmenting an App with an Efficient.srt 27.3 KB
- USENIX Security 2022/FReD Identifying File Re-Delegation in Android System Services.srt 27.2 KB
- USENIX Security 2023/Millions of people are watching you Understanding the Digital-Safety.eng.srt 27.2 KB
- USENIX Security 2022/Using Trātṛ to tame Adversarial Synchronization.srt 27.1 KB
- USENIX Security 2023/Detecting and Handling IoT Interaction Threats in Multi-Platform Multi.eng.srt 27.0 KB
- USENIX Security 2019/USENIX Security 2019 Video/Devils in the Guidance Predicting Logic Vulnerabilities in Payment.eng.srt 27.0 KB
- USENIX Security 2020/USENIX Security 2020 Videos/Scaling Verifiable Computation Using Efficient Set Accumulators.eng.srt 27.0 KB
- USENIX Security 2019/USENIX Security 2019 Video/Utility-Optimized Local Differential Privacy Mechanisms for.eng.srt 26.9 KB
- USENIX Security 2023/Security and Privacy Failures in Popular 2FA Apps.eng.srt 26.9 KB
- USENIX Security 2023/AutoFR Automated Filter Rule Generation for Adblocking.eng.srt 26.9 KB
- USENIX Security 2022/Practical Privacy-Preserving Authentication for SSH.srt 26.9 KB
- USENIX Security 2023/WHIP Improving Static Vulnerability Detection in Web Application by.eng.srt 26.8 KB
- USENIX Security 2023/Content-Type multipart oracle - Tapping into Format Oracles in Email.eng.srt 26.7 KB
- USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008).htm 26.7 KB
- USENIX Security 2020/USENIX Security 2020 Videos/The Impact of Ad-Blockers on Product Search and Purchase Behavior.eng.srt 26.7 KB
- USENIX Security 2022/Smart Home Privacy Policies Demystified A Study of Availability, Content, and.srt 26.6 KB
- USENIX Security 2022/Pacer Comprehensive Network Side-Channel Mitigation in the Cloud.srt 26.6 KB
- FOCI 2020/Bystanders’ Privacy The Perspectives of Nannies on Smart Home Surveillance.eng.srt 26.5 KB
- USENIX Security 2020/FOCI '20/FOCI 20 - Bystanders’ Privacy The Perspectives of Nannies on Smart Home Surveillance.eng.srt 26.5 KB
- USENIX Security 2020/USENIX Security 2020 Videos/PhishTime Continuous Longitudinal Measurement of the Effectiveness.eng.srt 26.5 KB
- USENIX Security 2020/USENIX Security 2020 Videos/Data Recovery from Scrubbed NAND Flash Storage Need for Analog Sanitization.eng.srt 26.5 KB
- USENIX Security 2021/Poisoning the Unlabeled Dataset of Semi-Supervised Learning.eng.srt 26.5 KB
- CSET 2020/Expansion of ICS Testbed for Security Validation based on MITRE ATT&CK Techniques.eng.srt 26.4 KB
- USENIX Security 2020/CSET '20/CSET 20 - Expansion of ICS Testbed for Security Validation based on MITRE ATT&CK Techniques.eng.srt 26.4 KB
- USENIX Security 2020/USENIX Security 2020 Videos/Everything Old is New Again Binary Security of WebAssembly.eng.srt 26.4 KB
- USENIX Security 2023/zkSaaS Zero-Knowledge SNARKs as a Service.eng.srt 26.4 KB
- USENIX Security 2022/Batched Differentially Private Information Retrieval.srt 26.4 KB
- CSET 2020/ICS Testbed Tetris Practical Building Blocks Towards a Cyber Security Resource.eng.srt 26.3 KB
- USENIX Security 2020/CSET '20/CSET 20 - ICS Testbed Tetris Practical Building Blocks Towards a Cyber Security Resource.eng.srt 26.3 KB
- USENIX Security 2023/Towards A Proactive ML Approach for Detecting Backdoor Poison Samples.eng.srt 26.3 KB
- USENIX Security 2021/Risky Business Investigating the Security Practices of Vendors on an Online.eng.srt 26.3 KB
- USENIX Security 2023/You Can't See Me Physical Removal Attacks on LiDAR-based Autonomous.eng.srt 26.3 KB
- USENIX Security 2023/Diving into Robocall Content with SnorCall.eng.srt 26.2 KB
- USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js 26.2 KB
- USENIX Security 2017/USENIX Security 2017 USENIX_files/js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js 26.2 KB
- USENIX Security 2018/USENIX Security 2018 Program at a Glance USENIX_files/js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js 26.2 KB
- USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js 26.2 KB
- USENIX Security 2018/USENIX Security 2018 USENIX_files/js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js 26.2 KB
- USENIX Security 2019/USENIX Security 2019 Program at a Glance USENIX_files/js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js 26.2 KB
- USENIX Security 2019/USENIX Security 2019 USENIX_files/js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js 26.2 KB
- USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js 26.2 KB
- USENIX Security 2020/USENIX Security '20 USENIX_files/js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js 26.2 KB
- USENIX Security 2022/Adversarial Detection Avoidance Attacks Evaluating the robustness.srt 26.2 KB
- USENIX Security 2015/USENIX Security 2015 Videos/Towards Discovering and Understanding Task Hijacking in Android.srt 26.2 KB
- USENIX Security 2023/Ethical Frameworks and Computer Security Trolley Problems Foundations for.eng.srt 26.1 KB
- USENIX Security 2023/HashTag Hash-based Integrity Protection for Tagged Architectures.eng.srt 26.1 KB
- USENIX Security 2022/Regulator Dynamic Analysis to Detect ReDoS.srt 26.1 KB
- USENIX Security 2018/USENIX Security 2018 Program at a Glance USENIX_files/font-awesome.css 26.1 KB
- USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/font-awesome.css 26.1 KB
- USENIX Security 2018/USENIX Security 2018 USENIX_files/font-awesome.css 26.1 KB
- USENIX Security 2019/USENIX Security 2019 Program at a Glance USENIX_files/font-awesome.css 26.1 KB
- USENIX Security 2019/USENIX Security 2019 USENIX_files/font-awesome.css 26.1 KB
- USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/font-awesome.css 26.1 KB
- USENIX Security 2020/USENIX Security '20 USENIX_files/font-awesome.css 26.1 KB
- USENIX Security 2023/Inducing Authentication Failures to Bypass Credit Card PINs.eng.srt 26.1 KB
- USENIX Security 2022/Poison Forensics Traceback of Data Poisoning Attacks in Neural Networks.srt 26.0 KB
- USENIX Security 2023/Problematic Advertising and its Disparate Exposure on Facebook.eng.srt 26.0 KB
- USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009).htm 26.0 KB
- USENIX Security 2019/USENIX Security 2019 Video/Evaluating Differentially Private Machine Learning in Practice.eng.srt 25.9 KB
- USENIX Security 2022/Orca Blocklisting in Sender-Anonymous Messaging.srt 25.8 KB
- USENIX Security 2023/Three Lessons From Threema Analysis of a Secure Messenger.eng.srt 25.8 KB
- USENIX Security 2019/USENIX Security 2019 Video/Why Do Adversarial Attacks Transfer Explaining Transferability of.eng.srt 25.7 KB
- USENIX Security 2022/Elasticlave An Efficient Memory Model for Enclaves.srt 25.7 KB
- USENIX Security 2023/What Are the Chances Explaining the Epsilon Parameter in Differential Privacy.eng.srt 25.7 KB
- USENIX Security 2020/USENIX Security 2020 Videos/Medusa Microarchitectural Data Leakage via Automated Attack Synthesis.eng.srt 25.7 KB
- USENIX Security 2020/USENIX Security 2020 Videos/Detecting Stuffing of a User’s Credentials at Her Own Accounts.eng.srt 25.7 KB
- USENIX Security 2021/Identifying Harmful Media in End-to-End Encrypted Communication.eng.srt 25.6 KB
- USENIX Security 2023/Adversarial Training for Raw-Binary Malware Classifiers.eng.srt 25.6 KB
- USENIX Security 2022/Piranha A GPU Platform for Secure Computation.srt 25.6 KB
- USENIX Security 2023/Humans vs. Machines in Malware Classification.eng.srt 25.6 KB
- USENIX Security 2009/USENIX Security 2009 WiPs.htm 25.6 KB
- USENIX Security 2020/USENIX Security 2020 Videos/The Ballot is Busted Before the Blockchain A Security Analysis of Voatz.eng.srt 25.6 KB
- USENIX Security 2022/Under the Hood of DANE Mismanagement in SMTP.srt 25.6 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera10x.png 25.6 KB
- USENIX Security 2022/Watching the watchers bias and vulnerability in remote proctoring software.srt 25.6 KB
- USENIX Security 2022/Decomperson How Humans Decompile and What We Can Learn From It.srt 25.6 KB
- USENIX Security 2023/A Study of Multi-Factor and Risk-Based Authentication Availability.eng.srt 25.5 KB
- USENIX Security 2021/Hopper Modeling and Detecting Lateral Movement.eng.srt 25.5 KB
- USENIX Security 2020/USENIX Security 2020 Videos/Understanding security mistakes developers make Qualitative analysis.eng.srt 25.5 KB
- USENIX Security 2021/Causal Analysis for Software-Defined Networking Attacks.eng.srt 25.5 KB
- USENIX Security 2023/McFIL Model Counting Functionality-Inherent Leakage.eng.srt 25.4 KB
- USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/teague_vanessa_200x230.png 25.4 KB
- USENIX Security 2022/Constant-weight PIR Single-round Keyword PIR via Constant-weight Equality.srt 25.4 KB
- USENIX Security 2022/OpenSSLNTRU Faster post-quantum TLS key exchange.srt 25.4 KB
- USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/schwartz_susan_200x230.png 25.4 KB
- USENIX Security 2020/USENIX Security 2020 Videos/Visor Privacy-Preserving Video Analytics as a Cloud Service.eng.srt 25.3 KB
- USENIX Security 2020/USENIX Security 2020 Videos/CopyCat Controlled Instruction-Level Attacks on Enclaves.eng.srt 25.3 KB
- USENIX Security 2021/Balboa Bobbing and Weaving around Network Censorship.eng.srt 25.2 KB
- USENIX Security 2020/USENIX Security 2020 Videos/Sunrise to Sunset Analyzing the End-to-end Life Cycle and Effectiveness.eng.srt 25.2 KB
- USENIX Security 2022/Are Your Sensitive Attributes Private Novel Model Inversion Attribute.srt 25.2 KB
- USENIX Security 2022/Attacks on Deidentification's Defenses.srt 25.2 KB
- USENIX Security 2022/SAPIC protocol verifiers of the world, unite.srt 25.2 KB
- USENIX Security 2023/Proxy Hunting Understanding and Characterizing Proxy-based Upgradeable.eng.srt 25.2 KB
- USENIX Security 2023/A Large Scale Study of the Ethereum Arbitrage Ecosystem.eng.srt 25.1 KB
- USENIX Security 2023/One Size Does not Fit All Quantifying the Risk of Malicious App Encounters.eng.srt 25.0 KB
- USENIX Security 2021/Where's Crypto Automated Identification and Classification of Proprietary.eng.srt 25.0 KB
- USENIX Security 2021/DeepReflect Discovering Malicious Functionality through Binary Reconstruction.eng.srt 25.0 KB
- USENIX Security 2023/You've Got Report Measurement and Security Implications of DMARC Reporting.eng.srt 25.0 KB
- CSET 2020/UBCIS Ultimate Benchmark for Container Image Scanning.eng.srt 25.0 KB
- USENIX Security 2020/CSET '20/CSET 20 - UBCIS Ultimate Benchmark for Container Image Scanning.eng.srt 25.0 KB
- USENIX Security 2022/Online Website Fingerprinting Evaluating Website Fingerprinting Attacks.srt 24.9 KB
- USENIX Security 2022/Transferring Adversarial Robustness Through Robust Representation Matching.srt 24.9 KB
- USENIX Security 2023/Extracting Training Data from Diffusion Models.eng.srt 24.9 KB
- USENIX Security 2019/USENIX Security 2019 Video/DEEPVSA Facilitating Value-set Analysis with Deep Learning for.eng.srt 24.9 KB
- USENIX Security 2023/In the Quest to Protect Users from Side-Channel Attacks - A User-Centred.eng.srt 24.9 KB
- USENIX Security 2023/LocIn Inferring Semantic Location from Spatial Maps in Mixed Reality.eng.srt 24.9 KB
- USENIX Security 2020/USENIX Security 2020 Videos/Human Distinguishable Visual Key Fingerprints.eng.srt 24.9 KB
- USENIX Security 2022/Electronic Monitoring Smartphone Apps An Analysis of Risks from Technical,.srt 24.9 KB
- USENIX Security 2021/Acoustics to the Rescue Physical Key Inference Attack Revisited.eng.srt 24.9 KB
- USENIX Security 2023/User Awareness and Behaviors Concerning Encrypted DNS Settings in Web Browsers.eng.srt 24.9 KB
- USENIX Security 2023/Secure Floating-Point Training.eng.srt 24.8 KB
- USENIX Security 2023/Work-From-Home and COVID-19 Trajectories of Endpoint Security Management.eng.srt 24.8 KB
- USENIX Security 2020/USENIX Security 2020 Videos/HALucinator Firmware Re-hosting Through Abstraction Layer Emulation.eng.srt 24.8 KB
- USENIX Security 2023/Log It’s Big, It’s Heavy, It’s Filled with Personal Data Measuring the.eng.srt 24.7 KB
- USENIX Security 2023/ACORN Input Validation for Secure Aggregation.eng.srt 24.7 KB
- USENIX Security 2023/Checking Passwords on Leaky Computers A Side Channel Analysis of Chrome's.eng.srt 24.7 KB
- USENIX Security 2023/AEX-Notify Thwarting Precise Single-Stepping Attacks through Interrupt.eng.srt 24.7 KB
- USENIX Security 2023/Egg Hunt in Tesla Infotainment A First Look at Reverse Engineering of Qt.eng.srt 24.7 KB
- USENIX Security 2020/PEPR '20/PEPR 20 - Building an Effective Feedback Loop for Your Privacy Program through Privacy Incident.eng.srt 24.7 KB
- USENIX Security 2020/USENIX Security 2020 Videos/VoteAgain A scalable coercion-resistant voting system.eng.srt 24.7 KB
- USENIX Security 2020/USENIX Security 2020 Videos/What Twitter Knows Characterizing Ad Targeting Practices, User Perceptions.eng.srt 24.7 KB
- USENIX Security 2020/USENIX Security 2020 Videos/ParmeSan Sanitizer-guided Greybox Fuzzing.eng.srt 24.7 KB
- USENIX Security 2023/Keep Your Friends Close, but Your Routeservers Closer Insights into RPK.eng.srt 24.6 KB
- USENIX Security 2023/Long Live The Honey Badger Robust Asynchronous DPSS and its Applications.eng.srt 24.6 KB
- USENIX Security 2023/PATROL Provable Defense against Adversarial Policy in Two-player Games.eng.srt 24.6 KB
- USENIX Security 2022/99% False Positives A Qualitative Study of SOC Analysts' Perspectives.srt 24.5 KB
- USENIX Security 2022/Empirical Understanding of Deletion Privacy Experiences, Expectations, and.srt 24.5 KB
- USENIX Security 2023/TRIDENT Towards Detecting and Mitigating Web-based Social Engineering Attacks.eng.srt 24.4 KB
- USENIX Security 2023/I'm going to trust this until it burns me - Parents' Privacy Concerns and.eng.srt 24.4 KB
- USENIX Security 2020/USENIX Security 2020 Videos/MIRAGE Succinct Arguments for Randomized Algorithms with Applications.eng.srt 24.4 KB
- USENIX Security 2022/Lamphone Passive Sound Recovery from a Desk Lamp's Light Bulb Vibrations.srt 24.3 KB
- USENIX Security 2021/Using Amnesia to Detect Credential Database Breaches.eng.srt 24.3 KB
- USENIX Security 2023/Eos Efficient Private Delegation of zkSNARK Provers.eng.srt 24.3 KB
- USENIX Security 2020/USENIX Security 2020 Videos/The Industrial Age of Hacking.eng.srt 24.3 KB
- USENIX Security 2023/Network Responses to Russia's Invasion of Ukraine in 2022 A Cautionary Taleeng.srt 24.3 KB
- USENIX Security 2021/Frontal Attack Leaking Control-Flow in SGX via the CPU Frontend.eng.srt 24.2 KB
- USENIX Security 2020/USENIX Security 2020 Videos/Pancake Frequency Smoothing for Encrypted Data Stores.eng.srt 24.2 KB
- USENIX Security 2023/Bug Hunters’ Perspectives on the Challenges and Benefits of the Bug Bounty.eng.srt 24.2 KB
- USENIX Security 2023/Continuous Learning for Android Malware Detection.eng.srt 24.2 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/adler_jim.jpg 24.2 KB
- USENIX Security 2015/USENIX Security 2015 Videos/RAPTOR - Routing Attacks on Privacy in Tor.srt 24.2 KB
- USENIX Security 2021/Demon in the Variant Statistical Analysis of DNNs for Robust Backdoor.eng.srt 24.2 KB
- USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/narayan_shankar_100x115.png 24.2 KB
- USENIX Security 2021/Jetset Targeted Firmware Rehosting for Embedded Systems.eng.srt 24.2 KB
- USENIX Security 2021/Once is Never Enough Foundations for Sound Statistical Inference in Tor.eng.srt 24.2 KB
- USENIX Security 2022/Dynamic Searchable Encryption with Optimal Search in the Presence of Deletions.srt 24.2 KB
- USENIX Security 2023/Capstone A Capability-based Foundation for Trustless Secure Memory Access.eng.srt 24.1 KB
- USENIX Security 2023/CSHER A System for Compact Storage with HE-Retrieval.eng.srt 24.1 KB
- USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/mickens_james_200x230.png 24.1 KB
- USENIX Security 2023/ARGUS Context-Based Detection of Stealthy IoT Infiltration Attacks.eng.srt 24.1 KB
- USENIX Security 2023/Greenhouse Single-Service Rehosting of Linux-Based Firmware Binaries in.eng.srt 24.1 KB
- USENIX Security 2023/Hot Pixels Frequency, Power, and Temperature Attacks on GPUs and Arm SoCs.eng.srt 24.1 KB
- USENIX Security 2020/USENIX Security 2020 Videos/DECAF Automatic, Adaptive De-bloating and Hardening of COTS Firmware.eng.srt 24.1 KB
- USENIX Security 2023/PROVIDENCE a Flexible Round-by-Round Risk-Limiting Audit.eng.srt 24.0 KB
- USENIX Security 2022/Creating a Secure Underlay for the Internet.srt 24.0 KB
- USENIX Security 2022/Morphuzz Bending (Input) Space to Fuzz Virtual Devices.srt 24.0 KB
- USENIX Security 2022/OVRseen Auditing Network Traffic and Privacy Policies in Oculus VR.srt 24.0 KB
- USENIX Security 2020/USENIX Security 2020 Videos/FIRMSCOPE Automatic Uncovering of Privilege-Escalation Vulnerabilities.eng.srt 24.0 KB
- USENIX Security 2020/USENIX Security 2020 Videos/SAVIOR Securing Autonomous Vehicles with Robust Physical Invariants.eng.srt 23.9 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/Reverse-Engineering a Cryptographic RFID Tag_files/c1.png 23.9 KB
- USENIX Security 2022/Pre-hijacked accounts An Empirical Study of Security Failures in User Account.srt 23.9 KB
- USENIX Security 2023/Framing Frames Bypassing Wi-Fi Encryption by Manipulating Transmit Queues.eng.srt 23.9 KB
- USENIX Security 2020/USENIX Security 2020 Videos/Cardpliance PCI DSS Compliance of Android Applications.eng.srt 23.9 KB
- USENIX Security 2020/USENIX Security 2020 Videos/BigMAC Fine-Grained Policy Analysis of Android Firmware.eng.srt 23.9 KB
- USENIX Security 2022/USENIX Security '22- The Antrim County 2020 Election Incident An Independent Forensic Investigation.srt 23.9 KB
- USENIX Security 2021/CANARY - a reactive defense mechanism for Controller Area Networks based.eng.srt 23.9 KB
- USENIX Security 2021/Jaqen A High-Performance Switch-Native Approach for Detecting and Mitigating.eng.srt 23.9 KB
- USENIX Security 2021/Smart Contract Vulnerabilities Vulnerable Does Not Imply Exploited.eng.srt 23.9 KB
- USENIX Security 2022/Increasing Adversarial Uncertain'ty to Scale Private Similarity Testing.srt 23.9 KB
- USENIX Security 2023/AnimateDead Debloating Web Applications Using Concolic Execution.eng.srt 23.9 KB
- USENIX Security 2023/Private Proof-of-Stake Blockchains using Differentially-Private Stake.eng.srt 23.9 KB
- USENIX Security 2022/Tightly Seal Your Sensitive Pointers with PACTight.srt 23.8 KB
- USENIX Security 2021/On the Design and Misuse of Microcoded (Embedded) Processors-A Cautionary Note.eng.srt 23.8 KB
- FOCI 2020/Detecting and Evading Censorship-in-Depth A Case Study of Iran’s Protocol Whitelister.eng.srt 23.8 KB
- USENIX Security 2020/FOCI '20/FOCI 20 - Detecting and Evading Censorship-in-Depth A Case Study of Iran’s Protocol Whitelister.eng.srt 23.8 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera9x.png 23.8 KB
- USENIX Security 2023/Glaze Protecting Artists from Style Mimicry by Text-to-Image Models.eng.srt 23.8 KB
- USENIX Security 2023/Smart Learning to Find Dumb Contracts.eng.srt 23.8 KB
- USENIX Security 2022/Can one hear the shape of a neural network Snooping the GPU via Magnetic.srt 23.7 KB
- USENIX Security 2022/Measurement by Proxy On the Accuracy of Online Marketplace Measurements.srt 23.7 KB
- USENIX Security 2023/All cops are broadcasting TETRA under scrutiny.eng.srt 23.7 KB
- USENIX Security 2023/Spying through Your Voice Assistants Realistic Voice Command Fingerprinting.eng.srt 23.7 KB
- USENIX Security 2023/ZBCAN A Zero-Byte CAN Defense System.eng.srt 23.7 KB
- USENIX Security 2023/Calpric Inclusive and Fine-grain Labeling of Privacy Policies with.eng.srt 23.7 KB
- USENIX Security 2023/Investigating Verification Behavior and Perceptions of Visual Digital.eng.srt 23.7 KB
- USENIX Security 2023/Is Your Wallet Snitching On You An Analysis on the Privacy Implications.eng.srt 23.7 KB
- USENIX Security 2022/Automating Cookie Consent and GDPR Violation Detection.srt 23.6 KB
- USENIX Security 2023/CollidePower Leaking Inaccessible Data with Software-based Power Side.eng.srt 23.6 KB
- USENIX Security 2021/Evaluating In-Workflow Messages for Improving Mental Models of End-to-End.eng.srt 23.6 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera17x.png 23.6 KB
- USENIX Security 2023/Reusable Enclaves for Confidential Serverless Computing.eng.srt 23.6 KB
- USENIX Security 2021/It's stressful having all these phones - Investigating Sex Workers Safety.eng.srt 23.6 KB
- USENIX Security 2022/PatchCleanser Certifiably Robust Defense against Adversarial Patches.srt 23.5 KB
- USENIX Security 2023/A Research Framework and Initial Study of Browser Security for the Visually.eng.srt 23.5 KB
- USENIX Security 2020/USENIX Security 2020 Videos/Achieving Keyless CDNs with Conclaves.eng.srt 23.5 KB
- USENIX Security 2023/Sparsity Brings Vulnerabilities Exploring New Metrics in Backdoor Attacks.eng.srt 23.5 KB
- USENIX Security 2023/The Digital-Safety Risks of Financial Technologies for Survivors of.eng.srt 23.5 KB
- USENIX Security 2022/Dos and Don'ts of Machine Learning in Computer Security.srt 23.5 KB
- USENIX Security 2022/Open to a fault On the passive compromise of TLS keys via transient errors.srt 23.5 KB
- USENIX Security 2022/GAROTA Generalized Active Root-Of-Trust Architecture.srt 23.5 KB
- CSET 2020/On Design and Enhancement of Smart Grid Honeypot System for Practical Collection.eng.srt 23.5 KB
- USENIX Security 2021/How Great is the Great Firewall Measuring China's DNS Censorship.eng.srt 23.4 KB
- USENIX Security 2023/Evading Provenance-Based ML Detectors with Adversarial System Action.eng.srt 23.4 KB
- USENIX Security 2023/ARGUS A Framework for Staged Static Taint Analysis of GitHub Workflows and.eng.srt 23.4 KB
- USENIX Security 2023/All of them claim to be the best - Multi-perspective study of VPN user.eng.srt 23.4 KB
- USENIX Security 2022/Membership Inference Attacks and Defenses in Neural Network Pruning.srt 23.4 KB
- USENIX Security 2019/USENIX Security 2019 Video/Understanding and Securing Device Vulnerabilities through.eng.srt 23.4 KB
- USENIX Security 2023/Combating Robocalls with Phone Virtual Assistant Mediated Interaction.eng.srt 23.4 KB
- USENIX Security 2023/Credit Karma Understanding Security Implications of Exposed Cloud Services.eng.srt 23.4 KB
- USENIX Security 2023/Powering Privacy On the Energy Demand and Feasibility of Anonymity.eng.srt 23.4 KB
- USENIX Security 2023/Sneaky Spy Devices and Defective Detectors The Ecosystem of Intimate.eng.srt 23.4 KB
- USENIX Security 2021/PrivateDrop Practical Privacy-Preserving Authentication for Apple AirDrop.eng.srt 23.3 KB
- USENIX Security 2021/EVMPatch Timely and Automated Patching of Ethereum Smart Contracts.eng.srt 23.3 KB
- USENIX Security 2020/USENIX Security 2020 Videos/Datalog Disassembly.eng.srt 23.3 KB
- USENIX Security 2018/USENIX Security 2018 USENIX_files/enck_william_200x230.png 23.3 KB
- USENIX Security 2022/IHOP Improved Statistical Query Recovery against Searchable Symmetric.srt 23.3 KB
- USENIX Security 2021/What's in a Name Exploring CA Certificate Control.eng.srt 23.3 KB
- USENIX Security 2023/Cheesecloth Zero-Knowledge Proofs of Real World Vulnerabilities.eng.srt 23.3 KB
- USENIX Security 2023/Time for Change How Clocks Break UWB Secure Ranging.eng.srt 23.3 KB
- USENIX Security 2023/Account Verification on Social Media User Perceptions and Paid Enrollment.eng.srt 23.3 KB
- USENIX Security 2023/The Role of Professional Product Reviewers in Evaluating Security and Privacy.eng.srt 23.3 KB
- USENIX Security 2020/USENIX Security 2020 Videos/Sys A Static Symbolic Tool for Finding Good Bugs in Good (Browser) Code.eng.srt 23.3 KB
- USENIX Security 2020/USENIX Security 2020 Videos/Composition Kills A Case Study of Email Sender Authentication.eng.srt 23.3 KB
- USENIX Security 2021/Domain Shadowing Leveraging Content Delivery Networks for Robust Blocking.eng.srt 23.3 KB
- USENIX Security 2023/Pushed by Accident A Mixed-Methods Study on Strategies of Handling Secret.eng.srt 23.3 KB
- USENIX Security 2022/Mistrust Plugins You Must A Large-Scale Study Of Malicious Plugins.srt 23.3 KB
- USENIX Security 2023/ACFA Secure Runtime Auditing & Guaranteed Device Healing via Active.eng.srt 23.3 KB
- USENIX Security 2021/Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers.eng.srt 23.2 KB
- USENIX Security 2022/SCRAPS Scalable Collective Remote Attestation for Pub-Sub IoT Networks with.srt 23.2 KB
- USENIX Security 2020/USENIX Security 2020 Videos/SENG, the SGX-Enforcing Network Gateway Authorizing Communication.eng.srt 23.2 KB
- USENIX Security 2022/Efficient Representation of Numerical Optimization Problems for SNARKs.srt 23.2 KB
- USENIX Security 2018/USENIX Security 2018 USENIX_files/porter-felt_adrienne_200x230.png 23.2 KB
- USENIX Security 2022/FreeWill Automatically Diagnosing Use-after-free Bugs via Reference.srt 23.1 KB
- USENIX Security 2022/Counting in Regexes Considered Harmful Exposing ReDoS Vulnerability of.srt 23.1 KB
- USENIX Security 2023/Multiview Finding Blind Spots in Access-Deny Issues Diagnosis.eng.srt 23.1 KB
- USENIX Security 2023/Snapping Snap Sync Practical Attacks on Go Ethereum Synchronising Nodes.eng.srt 23.1 KB
- USENIX Security 2023/Network Detection of Interactive SSH Impostors Using Deep Learning.eng.srt 23.1 KB
- USENIX Security 2020/USENIX Security 2020 Videos/Devil’s Whisper A General Approach for Physical Adversarial Attacks.eng.srt 23.1 KB
- USENIX Security 2023/Strategies and Vulnerabilities of Participants in Venezuelan Influence.eng.srt 23.1 KB
- USENIX Security 2020/USENIX Security 2020 Videos/SANNS Scaling Up Secure Approximate k-Nearest Neighbors Search.eng.srt 23.1 KB
- USENIX Security 2023/Notice the Imposter A Study on User Tag Spoofing Attack in Mobile Apps.eng.srt 23.1 KB
- USENIX Security 2023/The Gates of Time Improving Cache Attacks with Transient Execution.eng.srt 23.1 KB
- USENIX Security 2021/You Autocomplete Me Poisoning Vulnerabilities in Neural Code Completion.eng.srt 23.1 KB
- USENIX Security 2022/WebGraph Capturing Advertising and Tracking Information Flows.srt 23.1 KB
- USENIX Security 2020/USENIX Security 2020 Videos/Walking Onions Scaling Anonymity Networks while Protecting Users.eng.srt 23.1 KB
- USENIX Security 2023/Examining Consumer Reviews to Understand Security and Privacy Issues in the.eng.srt 23.1 KB
- USENIX Security 2022/Exploring the Security Boundary of Data Reconstruction via Neuron Exclusivity.srt 23.0 KB
- USENIX Security 2021/Why TLS is better without STARTTLS A Security Analysis of STARTTLS.eng.srt 23.0 KB
- USENIX Security 2020/USENIX Security 2020 Videos/Analysis of DTLS Implementations Using Protocol State Fuzzing.eng.srt 23.0 KB
- USENIX Security 2007/16th USENIX Security Symposium (Security 2007).htm 23.0 KB
- USENIX Security 2022/QuORAM A Quorum-Replicated Fault Tolerant ORAM Datastore.srt 23.0 KB
- USENIX Security 2020/USENIX Security 2020 Videos/Automatic Hot Patch Generation for Android Kernels.eng.srt 23.0 KB
- USENIX Security 2022/COMRace Detecting Data Race Vulnerabilities in COM Objects.srt 23.0 KB
- USENIX Security 2022/Double Trouble Combined Heterogeneous Attacks on Non-Inclusive Cache.srt 23.0 KB
- USENIX Security 2023/ASSET Robust Backdoor Data Detection Across a Multiplicity of Deep Learningeng.srt 22.9 KB
- FOCI 2020/Opening Digital Borders Cautiously yet Decisively Digital Filtering in Saudi Arabia.eng.srt 22.9 KB
- USENIX Security 2020/FOCI '20/FOCI 20 - Opening Digital Borders Cautiously yet Decisively Digital Filtering in Saudi Arabia.eng.srt 22.9 KB
- USENIX Security 2023/The OK Is Not Enough A Large Scale Study of Consent Dialogs in Smartphone.eng.srt 22.9 KB
- USENIX Security 2022/I feel invaded, annoyed, anxious and I may protect myself.srt 22.9 KB
- USENIX Security 2021/Reducing HSM Reliance in Payments through Proxy Re-Encryption.eng.srt 22.9 KB
- USENIX Security 2023/Othered, Silenced and Scapegoated Understanding the Situated Security of.eng.srt 22.9 KB
- USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/adida_ben_2018_200x230.png 22.9 KB
- USENIX Security 2020/USENIX Security 2020 Videos/Fawkes Protecting Privacy against Unauthorized Deep Learning Models.eng.srt 22.9 KB
- USENIX Security 2022/Neither Access nor Control A Longitudinal Investigation of the Efficacy.srt 22.9 KB
- FOCI 2020/Triplet Censors Demystifying Great Firewall’s DNS Censorship Behavior.eng.srt 22.9 KB
- USENIX Security 2020/FOCI '20/FOCI 20 - Triplet Censors Demystifying Great Firewall’s DNS Censorship Behavior.eng.srt 22.9 KB
- USENIX Security 2022/QCSD A QUIC Client-Side Website-Fingerprinting Defence Framework.srt 22.9 KB
- USENIX Security 2021/Charger-Surfing Exploiting a Power Line Side-Channel for Smartphone.eng.srt 22.8 KB
- USENIX Security 2023/Reversing, Breaking, and Fixing the French Legislative Election E-Voting.eng.srt 22.8 KB
- USENIX Security 2023/Going through the motions AR VR keylogging from user head motions.eng.srt 22.8 KB
- USENIX Security 2022/GET - out Automated Discovery of Application-Layer Censorship Evasion.srt 22.8 KB
- USENIX Security 2023/Improving Logging to Reduce Permission Over-Granting Mistakes.eng.srt 22.8 KB
- USENIX Security 2020/CSET '20/CSET 20 - Representativeness in the Benchmark for Vulnerability Analysis Tools (B-VAT).eng.srt 22.8 KB
- USENIX Security 2021/Security Obstacles and Motivations for Small Businesses from a CISO's.eng.srt 22.8 KB
- USENIX Security 2022/AmpFuzz Fuzzing for Amplification DDoS Vulnerabilities.srt 22.8 KB
- USENIX Security 2022/Hecate Abuse Reporting in Secure Messengers with Sealed Sender.srt 22.8 KB
- USENIX Security 2022/ProFactory Improving IoT Security via Formalized Protocol Customization.srt 22.7 KB
- USENIX Security 2023/Lessons Lost Incident Response in the Age of Cyber Insurance and Breach.eng.srt 22.7 KB
- USENIX Security 2022/PISTIS Trusted Computing Architecture for Low-end Embedded Systems.srt 22.7 KB
- USENIX Security 2023/AIRS Explanation for Deep Reinforcement Learning based Security Applications.eng.srt 22.7 KB
- USENIX Security 2022/TheHuzz Instruction Fuzzing of Processors Using Golden-Reference Models for.srt 22.7 KB
- USENIX Security 2021/Dynamic proofs of retrievability with low server storage.eng.srt 22.7 KB
- USENIX Security 2020/USENIX Security 2020 Videos/Silhouette Efficient Protected Shadow Stacks for Embedded Systems.eng.srt 22.7 KB
- USENIX Security 2022/XDRI Attacks - and - How to Enhance Resilience of Residential Routers.srt 22.7 KB
- USENIX Security 2022/Hyperproofs Aggregating and Main'taining Proofs in Vector Commitments.srt 22.7 KB
- USENIX Security 2020/USENIX Security 2020 Videos/An Off-Chip Attack on Hardware Enclaves via the Memory Bus.eng.srt 22.6 KB
- USENIX Security 2022/ÆPIC Leak Architecturally Leaking Uninitialized Data from the.srt 22.6 KB
- USENIX Security 2023/HECO Fully Homomorphic Encryption Compiler.eng.srt 22.5 KB
- USENIX Security 2020/USENIX Security 2020 Videos/A Longitudinal and Comprehensive Study of the DANE Ecosystem in Email.eng.srt 22.5 KB
- USENIX Security 2021/Automated Discovery of Denial-of-Service Vulnerabilities in Connected Vehicle.eng.srt 22.5 KB
- USENIX Security 2020/USENIX Security 2020 Videos/Hybrid Batch Attacks Finding Black-box Adversarial Examples with Limited.eng.srt 22.5 KB
- USENIX Security 2022/They Look at Vulnerability and Use That to Abuse You.srt 22.5 KB
- USENIX Security 2023/No Linux, No Problem Fast and Correct Windows Binary Fuzzing via.eng.srt 22.5 KB
- USENIX Security 2023/GAP Differentially Private Graph Neural Networks with Aggregation.eng.srt 22.5 KB
- USENIX Security 2023/I wouldn't want my unsafe code to run my pacemaker An Interview Study on.eng.srt 22.5 KB
- USENIX Security 2023/Jinn Hijacking Safe Programs with Trojans.eng.srt 22.5 KB
- USENIX Security 2023/Bypassing Tunnels Leaking VPN Client Traffic by Abusing Routing Tables.eng.srt 22.5 KB
- USENIX Security 2021/Osiris Automated Discovery of Microarchitectural Side Channels.eng.srt 22.4 KB
- USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/kowalczyk_ellen_110x115.png 22.4 KB
- USENIX Security 2023/Attacks are Forwarded Breaking the Isolation of MicroVM-based Containers.eng.srt 22.4 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/js_nPhKWi17GlWfUPto14Dqfk5lpAFMD2XUrRDYY3jnD2c.js 22.4 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/js_nPhKWi17GlWfUPto14Dqfk5lpAFMD2XUrRDYY3jnD2c.js 22.4 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/js_nPhKWi17GlWfUPto14Dqfk5lpAFMD2XUrRDYY3jnD2c.js 22.4 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/js_nPhKWi17GlWfUPto14Dqfk5lpAFMD2XUrRDYY3jnD2c.js 22.4 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/js_nPhKWi17GlWfUPto14Dqfk5lpAFMD2XUrRDYY3jnD2c.js 22.4 KB
- USENIX Security 2023/The Space of Adversarial Strategies.eng.srt 22.4 KB
- USENIX Security 2020/USENIX Security 2020 Videos/A different cup of TI The added value of commercial threat intelligence.eng.srt 22.4 KB
- USENIX Security 2020/USENIX Security 2020 Videos/Chaperone Real-time Locking and Loss Prevention for Smartphones.eng.srt 22.4 KB
- USENIX Security 2022/How to Abuse and Fix Authenticated Encryption Without Key Commitment.srt 22.3 KB
- USENIX Security 2022/Aardvark An Asynchronous Authenticated Dictionary with Applications to.srt 22.3 KB
- USENIX Security 2023/Tight Auditing of Differentially Private Machine Learning.eng.srt 22.3 KB
- USENIX Security 2023/Mixed Signals Analyzing Ground-Truth Data on the Users and Economics.eng.srt 22.3 KB
- USENIX Security 2023/Formal Analysis of SPDM Security Protocol and Data Model version 1.2.eng.srt 22.3 KB
- USENIX Security 2021/Collective Information Security in Large-Scale Urban Protests.eng.srt 22.3 KB
- USENIX Security 2023/It's the Equivalent of Feeling Like You're in Jail Lessons from Firsthandeng.srt 22.3 KB
- USENIX Security 2020/USENIX Security 2020 Videos/Cache Telepathy Leveraging Shared Resource Attacks to Learn DNN Architectures.eng.srt 22.3 KB
- USENIX Security 2022/Estimating Incidental Collection in Foreign Intelligence Surveillance.srt 22.3 KB
- FOCI 2020/Identifying Disinformation Websites Using Infrastructure Features.eng.srt 22.3 KB
- USENIX Security 2020/FOCI '20/FOCI 20 - Identifying Disinformation Websites Using Infrastructure Features.eng.srt 22.3 KB
- USENIX Security 2022/Fuzzing Hardware Like Software.srt 22.3 KB
- USENIX Security 2023/A Two-Decade Retrospective Analysis of a University's Vulnerability to.eng.srt 22.2 KB
- USENIX Security 2021/Data Poisoning Attacks to Local Differential Privacy Protocols.eng.srt 22.2 KB
- USENIX Security 2022/Where to Recruit for Security Development Studies Comparing Six Software.srt 22.2 KB
- USENIX Security 2022/An Experimental Study of GPS Spoofing and Takeover Attacks on UAVs.srt 22.2 KB
- USENIX Security 2023/Squirrel A Scalable Secure Two-Party Computation Framework for Training.eng.srt 22.2 KB
- USENIX Security 2022/Khaleesi Breaker of Advertising and Tracking Request Chains.srt 22.2 KB
- USENIX Security 2023/KENKU Towards Efficient and Stealthy Black-box Adversarial Attacks against.eng.srt 22.2 KB
- USENIX Security 2021/Now I'm a bit angry - Individuals' Awareness, Perception, and Responses.eng.srt 22.2 KB
- USENIX Security 2023/Automated Security Analysis of Exposure Notification Systems.eng.srt 22.2 KB
- USENIX Security 2023/Hoedur Embedded Firmware Fuzzing using Multi-Stream Inputs.eng.srt 22.1 KB
- USENIX Security 2021/Sharing More and Checking Less Leveraging Common Input Keywords to Detect.eng.srt 22.1 KB
- USENIX Security 2023/Educators’ Perspectives of Using (or Not Using) Online Exam Proctoring.eng.srt 22.1 KB
- USENIX Security 2023/FloatZone Accelerating Memory Error Detection using the Floating Point Unit.eng.srt 22.1 KB
- USENIX Security 2023/If I could do this, I feel anyone could - The Design and Evaluation.eng.srt 22.1 KB
- USENIX Security 2022/CellIFT Leveraging Cells for Scalable and Precise Dynamic Information Flow.srt 22.0 KB
- USENIX Security 2023/Knowledge Expansion and Counterfactual Interaction for Reference-Based.eng.srt 22.0 KB
- USENIX Security 2022/ReZone Disarming TrustZone with TEE Privilege Reduction.srt 22.0 KB
- USENIX Security 2023/Inductive Graph Unlearning.eng.srt 22.0 KB
- USENIX Security 2020/USENIX Security 2020 Videos/Hall Spoofing A Non-Invasive DoS Attack on Grid-Tied Solar Inverter.eng.srt 22.0 KB
- USENIX Security 2023/A Large-Scale Measurement of Website Login Policies.eng.srt 22.0 KB
- USENIX Security 2020/USENIX Security 2020 Videos/I have too much respect for my elders Understanding South African Mobile.eng.srt 22.0 KB
- USENIX Security 2020/USENIX Security 2020 Videos/PHMon A Programmable Hardware Monitor and Its Security Use Cases.eng.srt 22.0 KB
- USENIX Security 2022/Gossamer Securely Measuring Password-based Logins.srt 22.0 KB
- USENIX Security 2020/USENIX Security 2020 Videos/Adversarial Preprocessing Understanding and Preventing Image-Scaling Attacks.eng.srt 22.0 KB
- USENIX Security 2023/One Server for the Price of Two Simple and Fast Single-Server Private.eng.srt 22.0 KB
- USENIX Security 2021/Kalεido Real-Time Privacy Control for Eye-Tracking Systems.eng.srt 21.9 KB
- USENIX Security 2022/Spoki Unveiling a New Wave of Scanners through a Reactive Network Telescope.srt 21.9 KB
- USENIX Security 2023/Side-Channel Attacks on Optane Persistent Memory.eng.srt 21.9 KB
- USENIX Security 2020/USENIX Security 2020 Videos/Temporal System Call Specialization for Attack Surface Reduction.eng.srt 21.9 KB
- USENIX Security 2023/No more Reviewer #2 Subverting Automatic Paper-Reviewer Assignment using.eng.srt 21.9 KB
- USENIX Security 2022/VerLoc Verifiable Localization in Decentralized Systems.srt 21.9 KB
- USENIX Security 2020/USENIX Security 2020 Videos/SpecFuzz Bringing Spectre-type vulnerabilities to the surface.eng.srt 21.8 KB
- USENIX Security 2023/Don’t be Dense Efficient Keyword PIR for Sparse Databases.eng.srt 21.8 KB
- USENIX Security 2023/SQIRL Grey-Box Detection of SQL Injection Vulnerabilities Using.eng.srt 21.8 KB
- USENIX Security 2022/Total Eclipse of the Heart - Disrupting the InterPlanetary File System.srt 21.8 KB
- USENIX Security 2021/Disrupting Continuity of Apple's Wireless Ecosystem Security New Tracking.eng.srt 21.8 KB
- USENIX Security 2023/Fast IDentity Online with Anonymous Credentials (FIDO-AC).eng.srt 21.8 KB
- USENIX Security 2023/GigaDORAM Breaking the Billion Address Barrier.eng.srt 21.8 KB
- USENIX Security 2021/Frontrunner Jones and the Raiders of the Dark Forest An Empirical Study.eng.srt 21.8 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/wing_jeannette_100x115.png 21.8 KB
- USENIX Security 2023/Guarding Serverless Applications with Kalium.eng.srt 21.8 KB
- USENIX Security 2023/UVSCAN Detecting Third-Party Component Usage Violations in IoT Firmware.eng.srt 21.8 KB
- USENIX Security 2023/Anatomy of a High-Profile Data Breach Dissecting the Aftermath of a Crypto.eng.srt 21.7 KB
- USENIX Security 2023/Access Denied Assessing Physical Risks to Internet Access Networks.eng.srt 21.7 KB
- USENIX Security 2023/Timeless Timing Attacks and Preload Defenses in Tor's DNS Cache.eng.srt 21.7 KB
- USENIX Security 2023/Erebus Access Control for Augmented Reality Systems.eng.srt 21.7 KB
- USENIX Security 2021/Searching Encrypted Data with Size-Locked Indexes.eng.srt 21.6 KB
- USENIX Security 2022/Caring about Sharing User Perceptions of Multiparty Data Sharing.srt 21.6 KB
- USENIX Security 2020/USENIX Security 2020 Videos/Shattered Chain of Trust Understanding Security Risks in Cross-Cloud IoT.eng.srt 21.6 KB
- USENIX Security 2023/Isolated and Exhausted Attacking Operating Systems via Site Isolation in.eng.srt 21.6 KB
- USENIX Security 2023/PhyAuth Physical-Layer Message Authentication for ZigBee Networks.eng.srt 21.6 KB
- USENIX Security 2023/Account Security Interfaces Important, Unintuitive, and Untrustworth.eng.srt 21.6 KB
- USENIX Security 2023/Automated Cookie Notice Analysis and Enforcement.eng.srt 21.6 KB
- USENIX Security 2023/How to Cover up Anomalous Accesses to Electronic Health Records.eng.srt 21.6 KB
- USENIX Security 2020/USENIX Security 2020 Videos/Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines.eng.srt 21.5 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/evans_chris.png 21.5 KB
- FOCI 2020/MIMIQ Masking IPs with Migration in QUIC.eng.srt 21.5 KB
- USENIX Security 2021/Is Real-time Phishing Eliminated with FIDO Social Engineering Downgrade.eng.srt 21.5 KB
- USENIX Security 2022/Half-Double Hammering From the Next Row Over.srt 21.5 KB
- FOCI 2020/Turbo Tunnel, a good way to design censorship circumvention protocols.eng.srt 21.5 KB
- USENIX Security 2023/HOLMES Efficient Distribution Testing for Secure Collaborative Learning.eng.srt 21.5 KB
- USENIX Security 2023/HorusEye A Realtime IoT Malicious Traffic Detection Framework using.eng.srt 21.5 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera13x.png 21.5 KB
- USENIX Security 2022/Post-Quantum Cryptography with Contemporary Co-Processors Beyond Kronecker,.srt 21.5 KB
- USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/serebryany_konstantin_100x115.png 21.5 KB
- USENIX Security 2023/WaterBear Practical Asynchronous BFT Matching Security Guarantees of.eng.srt 21.5 KB
- USENIX Security 2020/USENIX Security 2020 Videos/Montage A Neural Network Language Model-Guided JavaScript Engine Fuzzer.eng.srt 21.5 KB
- USENIX Security 2023/Two-in-One A Model Hijacking Attack Against Text Generation Models.eng.srt 21.5 KB
- USENIX Security 2021/Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing.eng.srt 21.4 KB
- USENIX Security 2023/It's all in your head(set) Side-channel attacks on AR VR systems.eng.srt 21.4 KB
- USENIX Security 2021/A Large Scale Study of User Behavior, Expectations and Engagement with.eng.srt 21.4 KB
- USENIX Security 2023/Extracting Protocol Format as State Machine via Controlled Static Loop.eng.srt 21.4 KB
- USENIX Security 2023/Inception Exposing New Attack Surfaces with Training in Transient Execution.eng.srt 21.4 KB
- USENIX Security 2023/Understand Users' Privacy Perception and Decision of V2X Communication in.eng.srt 21.4 KB
- USENIX Security 2023/DeResistor Toward Detection-Resistant Probing for Evasion of Internet.eng.srt 21.3 KB
- USENIX Security 2023/Confusum Contractum Confused Deputy Vulnerabilities in Ethereum Smart.eng.srt 21.3 KB
- USENIX Security 2023/Know Your Cybercriminal Evaluating Attacker Preferences by Measuring.eng.srt 21.3 KB
- USENIX Security 2022/When Sally Met Trackers Web Tracking From the Users' Perspective.srt 21.3 KB
- USENIX Security 2022/Ferry State-Aware Symbolic Execution for Exploring State-Dependent Program.srt 21.3 KB
- USENIX Security 2023/Auditing Framework APIs via Inferred App-side Security Specifications.eng.srt 21.3 KB
- USENIX Security 2022/ppSAT Towards Two-Party Private SAT Solving.srt 21.3 KB
- USENIX Security 2020/USENIX Security 2020 Videos/Pixel Multi-signatures for Consensus.eng.srt 21.3 KB
- USENIX Security 2023/Downgrading DNSSEC How to Exploit Crypto Agility for Hijacking Signed Zones.eng.srt 21.3 KB
- USENIX Security 2020/USENIX Security 2020 Videos/Boxer Preventing fraud by scanning credit cards.eng.srt 21.3 KB
- USENIX Security 2022/Many Roads Lead To Rome How Packet Headers Influence DNS Censorship.srt 21.3 KB
- USENIX Security 2022/Backporting Security Patches of Web Applications A Prototype Design.srt 21.3 KB
- USENIX Security 2020/USENIX Security 2020 Videos/who's Calling Characterizing Robocalls through Audio and Metadata Analysis.eng.srt 21.2 KB
- USENIX Security 2020/USENIX Security 2020 Videos/Estonian Electronic Identity Card Security Flaws in Key Management.eng.srt 21.2 KB
- USENIX Security 2023/Every Signature is Broken On the Insecurity of Microsoft Office’s OOXML.eng.srt 21.2 KB
- USENIX Security 2023/FirmSolo Enabling dynamic analysis of binary Linux-based IoT kernel modules.eng.srt 21.2 KB
- USENIX Security 2023/Automata-Guided Control-Flow-Sensitive Fuzz Driver Generation.eng.srt 21.2 KB
- USENIX Security 2023/PROGRAPHER An Anomaly Detection System based on Provenance Graph Embedding.eng.srt 21.2 KB
- USENIX Security 2021/A Large-Scale Interview Study on Information Security in and Attacks.eng.srt 21.2 KB
- USENIX Security 2023/BunnyHop Exploiting the Instruction Prefetcher.eng.srt 21.2 KB
- USENIX Security 2023/Hidden Reality Caution, Your Hand Gesture Inputs in the Immersive Virtual.eng.srt 21.2 KB
- USENIX Security 2023/Cookie Crumbles Breaking and Fixing Web Session Integrity.eng.srt 21.2 KB
- USENIX Security 2021/Ripple A Programmable, Decentralized Link-Flooding Defense Against Adaptive.eng.srt 21.1 KB
- USENIX Security 2023/Bilingual Problems Studying the Security Risks Incurred by Native.eng.srt 21.1 KB
- USENIX Security 2019/USENIX Security 2019 Video/Robust Website Fingerprinting Through the Cache Occupancy Channel.eng.srt 21.1 KB
- USENIX Security 2022/RETBLEED Arbitrary Speculative Code Execution with Return Instructions.srt 21.1 KB
- USENIX Security 2023/MobileAtlas Geographically Decoupled Measurements in Cellular Networks for.eng.srt 21.1 KB
- USENIX Security 2020/USENIX Security 2020 Videos/KOOBE Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write.eng.srt 21.1 KB
- USENIX Security 2023/DISTDET A Cost-Effective Distributed Cyber Threat Detection System.eng.srt 21.1 KB
- USENIX Security 2021/Capture Centralized Library Management for Heterogeneous IoT Devices.eng.srt 21.1 KB
- USENIX Security 2021/Graph Backdoor.eng.srt 21.1 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera20x.png 21.1 KB
- USENIX Security 2022/FlowMatrix GPU-Assisted Information-Flow Analysis through Matrix-Based.srt 21.0 KB
- USENIX Security 2020/USENIX Security 2020 Videos/Call Me Maybe Eavesdropping Encrypted LTE Calls With ReVoLTE.eng.srt 21.0 KB
- USENIX Security 2023/Formal Analysis of Session-Handling in Secure Messaging Lifting Security.eng.srt 21.0 KB
- USENIX Security 2023/If sighted people know, I should be able to know Privacy Perceptions of.eng.srt 21.0 KB
- USENIX Security 2023/FABRID Flexible Attestation-Based Routing for Inter-Domain Networks.eng.srt 21.0 KB
- USENIX Security 2023/How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic.eng.srt 21.0 KB
- USENIX Security 2022/DoubleStar Long-Range Attack Towards Depth Estimation based Obstacle.srt 21.0 KB
- USENIX Security 2022/How Long Do Vulnerabilities Live in the Code A Large-Scale Empirical.srt 21.0 KB
- USENIX Security 2023/BASECOMP A Comparative Analysis for Integrity Protection in Cellular.eng.srt 21.0 KB
- USENIX Security 2020/USENIX Security 2020 Videos/That Was Then, This Is Now A Security Evaluation of Password Generation.eng.srt 20.9 KB
- USENIX Security 2022/RegexScalpel Regular Expression Denial of Service (ReDoS) Defense by.srt 20.9 KB
- USENIX Security 2020/USENIX Security 2020 Videos/Void A fast and light voice liveness detection system.eng.srt 20.9 KB
- USENIX Security 2023/Gradient Obfuscation Gives a False Sense of Security in Federated Learning.eng.srt 20.9 KB
- USENIX Security 2020/USENIX Security 2020 Videos/Retrofitting Fine Grain Isolation in the Firefox Renderer.eng.srt 20.9 KB
- USENIX Security 2021/M2MON Building an MMIO-based Security Reference Monitor for Unmanned Vehicles.eng.srt 20.9 KB
- USENIX Security 2020/USENIX Security 2020 Videos/DatashareNetwork A Decentralized Privacy-Preserving Search Engine.eng.srt 20.9 KB
- USENIX Security 2023/Synchronization Storage Channels (S2C) Timer-less Cache Side-Channel.eng.srt 20.9 KB
- USENIX Security 2023/ClepsydraCache - Preventing Cache Attacks with Time-Based Evictions.eng.srt 20.9 KB
- USENIX Security 2023/EnigMap External-Memory Oblivious Map for Secure Enclaves.eng.srt 20.9 KB
- USENIX Security 2023/Device Tracking via Linux’s New TCP Source Port Selection Algorithm.eng.srt 20.9 KB
- USENIX Security 2022/Hidden Trigger Backdoor Attack on NLP Models via Linguistic Style Manipulation.srt 20.9 KB
- USENIX Security 2023/How Library IT Staff Navigate Privacy and Security Challenges and.eng.srt 20.8 KB
- USENIX Security 2023/We Really Need to Talk About Session Tickets A Large-Scale Analysis of.eng.srt 20.8 KB
- USENIX Security 2023/Are Consumers Willing to Pay for Security and Privacy of IoT Devices.eng.srt 20.8 KB
- USENIX Security 2023/How Effective is Multiple-Vantage-Point Domain Control Validation.eng.srt 20.8 KB
- USENIX Security 2021/Blind In On-Path Attacks and Applications to VPNs.eng.srt 20.8 KB
- USENIX Security 2023/Forming Faster Firmware Fuzzers.eng.srt 20.8 KB
- USENIX Security 2021/Messy States of Wiring Vulnerabilities in Emerging Personal Payment Systems.eng.srt 20.8 KB
- USENIX Security 2023/Two Sides of the Shield Understanding Protective DNS adoption factors.eng.srt 20.8 KB
- USENIX Security 2022/SyzScope Revealing High-Risk Security Impacts of Fuzzer-Exposed Bugs in Linux.srt 20.8 KB
- USENIX Security 2022/Lend Me Your Ear Passive Remote Physical Side Channels on PCs.srt 20.7 KB
- USENIX Security 2023/Authenticated private information retrieval.eng.srt 20.7 KB
- USENIX Security 2023/PoliGraph Automated Privacy Policy Analysis using Knowledge Graphs.eng.srt 20.7 KB
- USENIX Security 2020/USENIX Security 2020 Videos/ShadowMove A Stealthy Lateral Movement Strategy.eng.srt 20.7 KB
- USENIX Security 2023/Rethinking System Audit Architectures for High Event Coverage and.eng.srt 20.7 KB
- USENIX Security 2023/Dubhe Succinct Zero-Knowledge Proofs for Standard AES and relate.eng.srt 20.7 KB
- USENIX Security 2020/USENIX Security 2020 Videos/SmartVerif Push the Limit of Automation Capability of Verifying Security.eng.srt 20.7 KB
- USENIX Security 2023/Intender Fuzzing Intent-Based Networking with Intent-State Transition.eng.srt 20.7 KB
- USENIX Security 2022/Stick It to The Man Correcting for Non-Cooperative Behavior of Subjects in.srt 20.7 KB
- USENIX Security 2020/USENIX Security 2020 Videos/The Unpatchable Silicon A Full Break of the Bitstream Encryption of Xilinx.eng.srt 20.6 KB
- USENIX Security 2022/Hiding in Plain Sight On the Efficacy of Power Side Channel-Based Control.srt 20.6 KB
- USENIX Security 2023/Ultimate SLH Taking Speculative Load Hardening to the Next Level.eng.srt 20.6 KB
- USENIX Security 2021/The Role of Computer Security Customer Support in Helping Survivors.eng.srt 20.6 KB
- USENIX Security 2021/Stars Can Tell A Robust Method to Defend against GPS Spoofing Attacks.eng.srt 20.6 KB
- USENIX Security 2021/EOSAFE Security Analysis of EOSIO Smart Contracts.eng.srt 20.6 KB
- USENIX Security 2023/Exploring the Unknown DTLS Universe Analysis of the DTLS Server Ecosystem.eng.srt 20.6 KB
- USENIX Security 2023/A Mixed-Methods Study of Security Practices of Smart Contract Developers.eng.srt 20.6 KB
- USENIX Security 2022/Augmenting Decompiler Output with Learned Variable Names and Types.srt 20.6 KB
- USENIX Security 2020/USENIX Security 2020 Videos/NXNSAttack Recursive DNS Inefficiencies and Vulnerabilities.eng.srt 20.6 KB
- USENIX Security 2023/Defining - Broken - User Experiences and Remediation Tactics When Ad-Blockingeng.srt 20.5 KB
- USENIX Security 2023/ICSPatch Automated Vulnerability Localization and Non-Intrusive.eng.srt 20.5 KB
- USENIX Security 2022/Synthetic Data - Anonymisation Groundhog Day.srt 20.5 KB
- USENIX Security 2023/On the Feasibility of Malware Unpacking via Hardware-assisted Loop Profiling.eng.srt 20.5 KB
- USENIX Security 2023/Measuring Up to (Reasonable) Consumer Expectations Providing an Empirical.eng.srt 20.5 KB
- USENIX Security 2023/Pool-Party Exploiting Browser Resource Pools for Web Tracking.eng.srt 20.5 KB
- USENIX Security 2023/Glowing in the Dark Uncovering IPv6 Address Discovery and Scanning.eng.srt 20.5 KB
- USENIX Security 2020/USENIX Security 2020 Videos/High Accuracy and High Fidelity Extraction of Neural Networks.eng.srt 20.5 KB
- USENIX Security 2022/Detecting Logical Bugs of DBMS with Coverage-based Guidance.srt 20.5 KB
- USENIX Security 2022/Experimental Security Analysis of the App Model in Business Collaboration.srt 20.4 KB
- USENIX Security 2023/To Cloud or not to Cloud A Qualitative Study on Self-Hosters' Motivation.eng.srt 20.4 KB
- USENIX Security 2022/Practical Data Access Minimization in Trigger-Action Platforms.srt 20.4 KB
- USENIX Security 2023/Multi-Factor Key Derivation Function (MFKDF) for Fast, Flexible, Secure, &.eng.srt 20.4 KB
- USENIX Security 2022/Characterizing the Security of Github CI Workflows.srt 20.4 KB
- USENIX Security 2020/USENIX Security 2020 Videos/BesFS A POSIX Filesystem for Enclaves with a Mechanized Safety Proof.eng.srt 20.4 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera16x.png 20.4 KB
- USENIX Security 2023/Araña Discovering and Characterizing Password Guessing Attacks in Practice.eng.srt 20.4 KB
- USENIX Security 2023/NAUTILUS Automated RESTful API Vulnerability Detection.eng.srt 20.4 KB
- USENIX Security 2022/How and Why People Use Virtual Private Networks.srt 20.4 KB
- USENIX Security 2021/Formally Verified Memory Protection for a Commodity Multiprocessor Hypervisor.eng.srt 20.4 KB
- USENIX Security 2023/SpectrEM Exploiting Electromagnetic Emanations During Transient Execution.eng.srt 20.4 KB
- USENIX Security 2023/Exploring Privacy and Incentives Considerations in Adoption of COVID-19.eng.srt 20.4 KB
- USENIX Security 2022/On the Necessity of Auditable Algorithmic Definitions for Machine Unlearning.srt 20.3 KB
- USENIX Security 2020/USENIX Security 2020 Videos/A Tale of Two Headers A Formal Analysis of Inconsistent Click-Jacking.eng.srt 20.3 KB
- USENIX Security 2023/My Privacy for their Security - Employees' Privacy Perspectives and.eng.srt 20.3 KB
- USENIX Security 2020/USENIX Security 2020 Videos/Horizontal Privilege Escalation in Trusted Applications.eng.srt 20.3 KB
- USENIX Security 2023/Un-Equal Online Safety - A Gender Analysis of Security and Privacy.eng.srt 20.3 KB
- USENIX Security 2023/xNIDS Explaining Deep Learning-based Network Intrusion Detection Systems.eng.srt 20.3 KB
- USENIX Security 2020/USENIX Security 2020 Videos/Civet An Efficient Java Partitioning Framework for Hardware Enclaves.eng.srt 20.3 KB
- USENIX Security 2023/Abuse Vectors A Framework for Conceptualizing IoT-Enabled Interpersonal Abuse.eng.srt 20.3 KB
- USENIX Security 2023/Place Your Locks Well Understanding and Detecting Lock Misuse Bugs.eng.srt 20.3 KB
- USENIX Security 2022/One-off Disclosure Control by Heterogeneous Generalization.srt 20.3 KB
- USENIX Security 2022/V'CER Efficient Certificate Validation in Constrained Networks.srt 20.3 KB
- USENIX Security 2023/NRDelegationAttack Complexity DDoS attack on DNS Recursive Resolvers.eng.srt 20.3 KB
- USENIX Security 2023/The Most Dangerous Codec in the World Finding and Exploiting.eng.srt 20.2 KB
- USENIX Security 2022/Your Microphone Array Retains Your Identity A Robust Voice Liveness.srt 20.2 KB
- USENIX Security 2022/Efficient Differentially Private Secure Aggregation for Federated Learning.srt 20.2 KB
- USENIX Security 2023/ACTOR Action-Guided Kernel Fuzzing.eng.srt 20.2 KB
- USENIX Security 2023/CacheQL Quantifying and Localizing Cache Side-Channel Vulnerabilities in.eng.srt 20.2 KB
- USENIX Security 2023/Eavesdropping Mobile App Activity via Radio-Frequency Energy Harvesting.eng.srt 20.2 KB
- USENIX Security 2021/Deep Entity Classification Abusive Account Detection for Online Social.eng.srt 20.2 KB
- USENIX Security 2022/Helping hands Measuring the impact of a large threat intelligence sharing.srt 20.2 KB
- USENIX Security 2023/Are You Spying on Me Large-Scale Analysis on IoT Data Exposure through.eng.srt 20.2 KB
- USENIX Security 2021/The Hijackers Guide To The Galaxy Off-Path Taking Over Internet Resources.eng.srt 20.2 KB
- USENIX Security 2020/USENIX Security 2020 Videos/FANS Fuzzing Android Native System Services via Automated Interface Analysis.eng.srt 20.2 KB
- USENIX Security 2022/Rolling Colors Adversarial Laser Exploits against Traffic Light Recognition.srt 20.2 KB
- USENIX Security 2023/Hiding in Plain Sight An Empirical Study of Web Application Abuse in Malware.eng.srt 20.2 KB
- USENIX Security 2021/Assessing Browser-level Defense against IDN-based Phishing.eng.srt 20.2 KB
- USENIX Security 2022/AutoDA Automated Decision-based Iterative Adversarial Attacks.srt 20.2 KB
- USENIX Security 2023/That Person Moves Like A Car Misclassification Attack Detection fo.eng.srt 20.2 KB
- USENIX Security 2023/Detecting API Post-Handling Bugs Using Code and Description in Patches.eng.srt 20.2 KB
- USENIX Security 2023/Cryptographic Administration for Secure Group Messaging.eng.srt 20.1 KB
- USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/new_usenix.jpg 20.1 KB
- USENIX Security 2007/Presentations/Security 2007 Poster Session_files/new_usenix.jpg 20.1 KB
- USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/new_usenix.jpg 20.1 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/new_usenix.jpg 20.1 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/Lest We Remember - Cold Boot Attacks on Encryption Keys_files/new_usenix.jpg 20.1 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/Practical Symmetric Key Cryptography on Modern Graphics Hardware_files/new_usenix.jpg 20.1 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/Reverse-Engineering a Cryptographic RFID Tag_files/new_usenix.jpg 20.1 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/new_usenix.jpg 20.1 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/USENIX Security 2008 Poster Session_files/new_usenix.jpg 20.1 KB
- USENIX Security 2008/USENIX Security 2008 WiPs_files/new_usenix.jpg 20.1 KB
- USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/new_usenix.jpg 20.1 KB
- USENIX Security 2009/USENIX Security 2009 WiPs_files/new_usenix.jpg 20.1 KB
- USENIX Security 2010/USENIX Security 2010 Poster Session_files/new_usenix.jpg 20.1 KB
- USENIX Security 2011/USENIX Security 2011 Poster Session_files/new_usenix.jpg 20.1 KB
- USENIX Security 2022/Stateful Greybox Fuzzing.srt 20.1 KB
- USENIX Security 2021/Towards Formal Verification of State Continuity for Enclave Programs.eng.srt 20.1 KB
- USENIX Security 2020/USENIX Security 2020 Videos/BlockSci Design and applications of a blockchain analysis platform.eng.srt 20.1 KB
- USENIX Security 2022/Inference Attacks Against Graph Neural Networks.srt 20.1 KB
- USENIX Security 2022/The Security Lottery Measuring Client-Side Web Security Inconsistencies.srt 20.1 KB
- USENIX Security 2023/Precise and Generalized Robustness Certification for Neural Networks.eng.srt 20.1 KB
- USENIX Security 2023/Person Re-identification in 3D Space A WiFi Vision-based Approach.eng.srt 20.1 KB
- USENIX Security 2022/Mitigating Membership Inference Attacks by Self-Distillation Through a Novel.srt 20.1 KB
- USENIX Security 2022/Anycast Agility Network Playbooks to Fight DDoS.srt 20.1 KB
- USENIX Security 2023/Fuzz The Power Dual-role State Guided Black-box Fuzzing for USB Power.eng.srt 20.1 KB
- USENIX Security 2022/Back-Propagating System Dependency Impact for Attack Investigation.srt 20.0 KB
- USENIX Security 2022/Towards Automatically Reverse Engineering Vehicle Diagnostic Protocols.srt 20.0 KB
- USENIX Security 2023/PrivateFL Accurate, Differentially Private Federated Learning via.eng.srt 20.0 KB
- USENIX Security 2020/USENIX Security 2020 Videos/ETHBMC A Bounded Model Checker for Smart Contracts.eng.srt 20.0 KB
- USENIX Security 2022/GPU-accelerated PIR with Client-Independent Preprocessing for Large-Scale.srt 20.0 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera24x.png 20.0 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js 20.0 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js 20.0 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js 20.0 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js 20.0 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js 20.0 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js 20.0 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js 20.0 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js 20.0 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js 20.0 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js 20.0 KB
- USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js 20.0 KB
- USENIX Security 2017/USENIX Security 2017 USENIX_files/js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js 20.0 KB
- USENIX Security 2018/USENIX Security 2018 Program at a Glance USENIX_files/js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js 20.0 KB
- USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js 20.0 KB
- USENIX Security 2018/USENIX Security 2018 USENIX_files/js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js 20.0 KB
- USENIX Security 2019/USENIX Security 2019 Program at a Glance USENIX_files/js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js 20.0 KB
- USENIX Security 2019/USENIX Security 2019 USENIX_files/js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js 20.0 KB
- USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js 20.0 KB
- USENIX Security 2020/USENIX Security '20 USENIX_files/js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js 20.0 KB
- USENIX Security 2023/Assessing Anonymity Techniques Employed in German Court Decisions A.eng.srt 20.0 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera18x.png 19.9 KB
- USENIX Security 2023/Demystifying Pointer Authentication on Apple M1.eng.srt 19.9 KB
- USENIX Security 2023/A Plot is Worth a Thousand Words Model Information Stealing Attacks via.eng.srt 19.9 KB
- USENIX Security 2022/RE-Mind a First Look Inside the Mind of a Reverse Engineer.srt 19.9 KB
- USENIX Security 2022/Stalloris RPKI Downgrade Attack.srt 19.9 KB
- USENIX Security 2023/Instructions Unclear Undefined Behaviour in Cellular Network Specifications.eng.srt 19.8 KB
- USENIX Security 2022/Physical-Layer Attacks Against Pulse Width Modulation-Controlled Actuators.srt 19.8 KB
- USENIX Security 2021/Minerva- An Efficient Risk-Limiting Ballot Polling Audit.eng.srt 19.8 KB
- USENIX Security 2022/Off-Path Network Traffic Manipulation via Revitalized ICMP Redirect Attacks.srt 19.8 KB
- USENIX Security 2022/A Large-scale Investigation into Geodifferences in Mobile Apps.srt 19.8 KB
- USENIX Security 2023/A Study of China's Censorship and Its Evasion Through the Lens of Online.eng.srt 19.8 KB
- USENIX Security 2021/Dirty Road Can Attack Security of Deep Learning based Automated Lane.eng.srt 19.8 KB
- USENIX Security 2022/USENIX Security '22- TLB - DR Enhancing TLB-based Attacks with TLB Desynchronized Reverse Engineering.srt 19.7 KB
- USENIX Security 2023/Remote Direct Memory Introspection.eng.srt 19.7 KB
- USENIX Security 2023/Hard-label Black-box Universal Adversarial Patch Attack.eng.srt 19.7 KB
- USENIX Security 2023/PET Prevent Discovered Errors from Being Triggered in the Linux Kerne.eng.srt 19.7 KB
- USENIX Security 2021/ELISE A Storage Efficient Logging System Powered by Redundancy Reduction.eng.srt 19.7 KB
- USENIX Security 2022/Playing Without Paying Detecting Vulnerable Payment Verification in Native.srt 19.7 KB
- USENIX Security 2021/PACStack an Authenticated Call Stack.eng.srt 19.7 KB
- USENIX Security 2023/HyPFuzz Formal-Assisted Processor Fuzzing.eng.srt 19.7 KB
- USENIX Security 2020/USENIX Security 2020 Videos/Drift with Devil Security of Multi-Sensor Fusion based Localization.eng.srt 19.6 KB
- USENIX Security 2023/CodexLeaks Privacy Leaks from Code Generation Language Models in GitHub.eng.srt 19.6 KB
- USENIX Security 2022/Security at the End of the Tunnel The Anatomy of VPN Mental Models Among.srt 19.6 KB
- USENIX Security 2023/RIDAS Real-time identification of attack sources on controller area networks.eng.srt 19.6 KB
- USENIX Security 2021/A Stealthy Location Identification Attack Exploiting Carrier Aggregation.eng.srt 19.6 KB
- USENIX Security 2021/Evil Under the Sun Understanding and Discovering Attacks on Ethereum.eng.srt 19.6 KB
- USENIX Security 2023/Security Analysis of MongoDB Queryable Encryption.eng.srt 19.5 KB
- FOCI 2020/Slitheen Stealth TLS-based Decoy Routing.eng.srt 19.5 KB
- USENIX Security 2023/Fourteen Years in the Life A Root Server’s Perspective on DNS Resolve.eng.srt 19.5 KB
- USENIX Security 2023/Aliasing Backdoor Attacks on Pre-trained Models.eng.srt 19.5 KB
- USENIX Security 2022/LTrack Stealthy Tracking of Mobile Phones in LTE.srt 19.5 KB
- USENIX Security 2023/Hey Kimya, Is My Smart Speaker Spying on Me Taking Control of Sensor.eng.srt 19.5 KB
- USENIX Security 2023/Every Vote Counts Ranking-Based Training of Federated Learning to Resist.eng.srt 19.4 KB
- USENIX Security 2022/Hand Me Your PIN Inferring ATM PINs of Users Typing with a Covered Hand.srt 19.4 KB
- USENIX Security 2023/ReUSB Replay-Guided USB Driver Fuzzing.eng.srt 19.4 KB
- USENIX Security 2022/How Do You Not Lose Friends - Synthesizing a Design Space of Social Controls.srt 19.4 KB
- USENIX Security 2022/Teacher Model Fingerprinting Attacks Against Transfer Learning.srt 19.4 KB
- USENIX Security 2022/Lumos Identifying and Localizing Diverse Hidden IoT Devices.srt 19.4 KB
- USENIX Security 2021/CLARION Sound and Clear Provenance Tracking for Microservice Deployments.eng.srt 19.3 KB
- USENIX Security 2022/Web Cache Deception Escalates.srt 19.3 KB
- USENIX Security 2020/USENIX Security 2020 Videos/Symbolic execution with SymCC don't interpret, compile.eng.srt 19.3 KB
- USENIX Security 2023/Fuzztruction Using Fault Injection-based Fuzzing to Leverage Implicit.eng.srt 19.3 KB
- USENIX Security 2023/PTW Pivotal Tuning Watermarking for Pre-Trained Image Generators.eng.srt 19.3 KB
- USENIX Security 2023/SHELTER Extending Arm CCA with Isolation in User Space.eng.srt 19.3 KB
- USENIX Security 2021/DEFInit An Analysis of Exposed Android Init Routines.eng.srt 19.3 KB
- USENIX Security 2023/HOMESPY The Invisible Sniffer of Infrared Remote Control of Smart TVs.eng.srt 19.2 KB
- USENIX Security 2023/RøB Ransomware over Modern Web Browsers.eng.srt 19.2 KB
- USENIX Security 2021/Poseidon A New Hash Function for Zero-Knowledge Proof Systems.eng.srt 19.2 KB
- USENIX Security 2023/How to Bind Anonymous Credentials to Humans.eng.srt 19.2 KB
- USENIX Security 2022/Provably-Safe Multilingual Software Sandboxing using WebAssembly.srt 19.2 KB
- USENIX Security 2023/NeuroPots Realtime Proactive Defense against Bit-Flip Attacks in Neural.eng.srt 19.2 KB
- USENIX Security 2020/USENIX Security 2020 Videos/From Needs to Actions to Secure Apps The Effect of Requirements.eng.srt 19.2 KB
- USENIX Security 2022/Holistic Control-Flow Protection on Real-Time Embedded Systems with Kage.srt 19.2 KB
- USENIX Security 2020/USENIX Security 2020 Videos/A Spectral Analysis of Noise A Comprehensive, Automated, Formal Analysis.eng.srt 19.2 KB
- USENIX Security 2015/USENIX Security 2015 Videos/Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors.srt 19.2 KB
- USENIX Security 2023/Meta-Sift How to Sift Out a Clean Subset in the Presence of Data Poisoning.eng.srt 19.2 KB
- USENIX Security 2023/Extended Hell(o) A Comprehensive Large-Scale Study on Email.eng.srt 19.1 KB
- USENIX Security 2023/Freaky Leaky SMS Extracting User Locations by Analyzing SMS Timings.eng.srt 19.1 KB
- USENIX Security 2023/V1SCAN Discovering 1-day Vulnerabilities in Reused C C Open-source.eng.srt 19.1 KB
- USENIX Security 2021/On the Routing-Aware Peering against Network-Eclipse Attacks in Bitcoin.eng.srt 19.1 KB
- USENIX Security 2023/Lost at C A User Study on the Security Implications of Large Language Modeleng.srt 19.1 KB
- USENIX Security 2023/Your Exploit is Mine Instantly Synthesizing Counterattack Smart Contract.eng.srt 19.1 KB
- USENIX Security 2022/Inferring Phishing Intention via Webpage Appearance and Dynamics.srt 19.1 KB
- USENIX Security 2023/PatchVerif Discovering Faulty Patches in Robotic Vehicles.eng.srt 19.1 KB
- USENIX Security 2023/SAFER Efficient and Error-Tolerant Binary Instrumentation.eng.srt 19.1 KB
- USENIX Security 2023/SandDriller A Fully-Automated Approach for Testing Language-Based.eng.srt 19.1 KB
- USENIX Security 2023/Temporal CDN-Convex Lens A CDN-Assisted Practical Pulsing DDoS Attack.eng.srt 19.1 KB
- USENIX Security 2022/Why Users (Don't) Use Password Managers at a Large Educational Institution.srt 19.1 KB
- USENIX Security 2023/Union under Duress Understanding Hazards of Duplicate Resource Mismediationeng.srt 19.1 KB
- USENIX Security 2023/Decompiling x86 Deep Neural Network Executables.eng.srt 19.1 KB
- USENIX Security 2023/The Impostor Among US(B) Off-Path Injection Attacks on USB Communications.eng.srt 19.0 KB
- USENIX Security 2022/Security and Privacy Perceptions of Third-Party Application Access for Google.srt 19.0 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/mozilla_firefox_logo_002.png 19.0 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/mozilla_firefox_logo_002.png 19.0 KB
- USENIX Security 2023/Not All Data are Created Equal Data and Pointer Prioritization for Scalableeng.srt 19.0 KB
- USENIX Security 2023/TreeSync Authenticated Group Management for Messaging Layer Security.eng.srt 18.9 KB
- USENIX Security 2023/TPatch A Triggered Physical Adversarial Patch.eng.srt 18.9 KB
- USENIX Security 2021/Scalable Detection of Promotional Website Defacements in Black Hat SEO.eng.srt 18.9 KB
- USENIX Security 2021/SyzVegas Beating Kernel Fuzzing Odds with Reinforcement Learning.eng.srt 18.9 KB
- USENIX Security 2023/Cipherfix Mitigating Ciphertext Side-Channel Attacks in Software.eng.srt 18.9 KB
- USENIX Security 2023/Sherlock on Specs Building LTE Conformance Tests through Automated Reasoning.eng.srt 18.9 KB
- USENIX Security 2023/DAFL Directed Grey-box Fuzzing guided by Data Dependency.eng.srt 18.9 KB
- USENIX Security 2023/Can a Deep Learning Model for One Architecture Be Used for Others.eng.srt 18.9 KB
- USENIX Security 2022/Loki Hardening Code Obfuscation Against Automated Attacks.srt 18.9 KB
- USENIX Security 2021/Understanding Malicious Cross-library Data Harvesting on Android.eng.srt 18.9 KB
- USENIX Security 2023/A comprehensive, formal and automated analysis of the EDHOC protocol.eng.srt 18.9 KB
- USENIX Security 2023/An Input-Agnostic Hierarchical Deep Learning Framework for Traffic.eng.srt 18.9 KB
- USENIX Security 2022/Building an Open, Robust, and Stable Voting-Based Domain Top List.srt 18.8 KB
- USENIX Security 2022/PoisonedEncoder Poisoning the Unlabeled Pre-training Data in Contrastive.srt 18.8 KB
- USENIX Security 2023/Internet Service Providers' and Individuals' Attitudes, Barriers, and.eng.srt 18.8 KB
- USENIX Security 2022/Towards More Robust Keyword Spotting for Voice Assistants.srt 18.8 KB
- USENIX Security 2022/How Are Your Zombie Accounts Understanding Users' Practices & Expectations.srt 18.8 KB
- USENIX Security 2020/USENIX Security 2020 Videos/Interpretable Deep Learning under Fire.eng.srt 18.8 KB
- USENIX Security 2022/How Machine Learning Is Solving the Binary Function Similarity Problem.srt 18.8 KB
- USENIX Security 2022/Bedrock Programmable Network Support for Secure RDMA Systems.srt 18.8 KB
- USENIX Security 2023/A Bug's Life Analyzing the Lifecycle and Mitigation Process of Content.eng.srt 18.7 KB
- USENIX Security 2022/PrivGuard Privacy Regulation Compliance Made Easier.srt 18.7 KB
- USENIX Security 2023/Back to School On the (In)Security of Academic VPNs.eng.srt 18.7 KB
- USENIX Security 2023/Minimalist Semi-automated Debloating of PHP Web Applications through.eng.srt 18.7 KB
- USENIX Security 2023/Eye-Shield Real-Time Protection of Mobile Device Screen Information from.eng.srt 18.7 KB
- USENIX Security 2022/Automated Side Channel Analysis of Media Software with Manifold Learning.srt 18.7 KB
- USENIX Security 2022/ALASTOR Reconstructing the Provenance of Serverless Intrusions.srt 18.7 KB
- USENIX Security 2023/FuzzJIT Oracle-Enhanced Fuzzing for JavaScript Engine JIT Compiler.eng.srt 18.7 KB
- USENIX Security 2023/ARMore Pushing Love Back Into Binaries.eng.srt 18.7 KB
- USENIX Security 2022/MOVERY A Precise Approach for Modified Vulnerable Code Clone Discovery from.srt 18.7 KB
- USENIX Security 2023/TVA A multi-party computation system for secure and expressive time series.eng.srt 18.7 KB
- USENIX Security 2023/NVLeak Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems.eng.srt 18.7 KB
- USENIX Security 2022/Ground Truth for Binary Disassembly is Not Easy.srt 18.7 KB
- USENIX Security 2023/Cryptographic Deniability A Multi-perspective Study of User Perceptions.eng.srt 18.7 KB
- USENIX Security 2021/Phishpedia A Hybrid Deep Learning Based Approach to Visually Identify.eng.srt 18.6 KB
- USENIX Security 2022/OK, Siri - or - Hey, Google - Evaluating Voiceprint Distinctiveness via.srt 18.6 KB
- USENIX Security 2023/TRust A Compilation Framework for In-process Isolation to Protect Safe.eng.srt 18.6 KB
- USENIX Security 2021/It's the Company, the Government, You and I - User Perceptions of.eng.srt 18.6 KB
- USENIX Security 2021/SocialHEISTing Understanding Stolen Facebook Accounts.eng.srt 18.6 KB
- USENIX Security 2023/ELASM Error-Latency-Aware Scale Management for Fully Homomorphic Encryption.eng.srt 18.6 KB
- USENIX Security 2023/PORE Provably Robust Recommender Systems against Data Poisoning Attacks.eng.srt 18.6 KB
- USENIX Security 2022/MaDIoT 2.0 Modern High-Wattage IoT Botnet Attacks and Defenses.srt 18.6 KB
- USENIX Security 2022/FUGIO Automatic Exploit Generation for PHP Object Injection Vulnerabilities.srt 18.6 KB
- USENIX Security 2023/AIFORE Smart Fuzzing Based on Automatic Input Format Reverse Engineering.eng.srt 18.6 KB
- USENIX Security 2023/ARI Attestation of Real-time Mission Execution Integrity.eng.srt 18.6 KB
- USENIX Security 2022/FIXREVERTER A Realistic Bug Injection Methodology for Benchmarking Fuzz.srt 18.6 KB
- USENIX Security 2022/Targeted Deanonymization via the Cache Side Channel Attacks and Defenses.srt 18.6 KB
- USENIX Security 2023/A Peek into the Metaverse Detecting 3D Model Clones in Mobile Games.eng.srt 18.6 KB
- USENIX Security 2023/SCARF - A Low-Latency Block Cipher for Secure Cache-Randomization.eng.srt 18.5 KB
- USENIX Security 2023/SMACK Semantically Meaningful Adversarial Audio Attack.eng.srt 18.5 KB
- USENIX Security 2022/SecSMT Securing SMT Processors against Contention-Based Covert Channels.srt 18.5 KB
- USENIX Security 2023/Beyond The Gates An Empirical Analysis of HTTP-Managed Password Stealers.eng.srt 18.5 KB
- USENIX Security 2022/StateFuzz System Call-Based State-Aware Linux Driver Fuzzing.srt 18.5 KB
- USENIX Security 2023/Near-Ultrasound Inaudible Trojan (Nuit) Exploiting Your Speaker to Attack.eng.srt 18.4 KB
- USENIX Security 2023/Beyond Typosquatting An In-depth Look at Package Confusion.eng.srt 18.4 KB
- USENIX Security 2023/DiffSmooth Certifiably Robust Learning via Diffusion Models and Local.eng.srt 18.4 KB
- USENIX Security 2023/Unique Identification of 50,000 Virtual Reality Users from Head & Hand.eng.srt 18.4 KB
- CSET 2020/Bridging Missing Gaps in Evaluating DDoS Research.eng.srt 18.4 KB
- USENIX Security 2020/CSET '20/CSET 20 - Bridging Missing Gaps in Evaluating DDoS Research.eng.srt 18.4 KB
- USENIX Security 2023/Towards Targeted Obfuscation of Adversarial Unsafe Images using.eng.srt 18.4 KB
- USENIX Security 2022/Might I Get Pwned A Second Generation Compromised Credential Checking Service.srt 18.3 KB
- USENIX Security 2021/UNIFUZZ A Holistic and Pragmatic Metrics-Driven Platform for Evaluating.eng.srt 18.3 KB
- USENIX Security 2023/Detecting Union Type Confusion in Component Object Model.eng.srt 18.3 KB
- USENIX Security 2021/Finding Bugs Using Your Own Code Detecting Functionally-similar yet.eng.srt 18.3 KB
- USENIX Security 2021/PASAN Detecting Peripheral Access Concurrency Bugs within Bare-Metal.eng.srt 18.3 KB
- USENIX Security 2023/Learning Normality is Enough A Software-based Mitigation against Inaudible.eng.srt 18.3 KB
- USENIX Security 2023/Subverting Website Fingerprinting Defenses with Robust Traffic Representation.eng.srt 18.3 KB
- USENIX Security 2022/Composable Cachelets Protecting Enclaves from Cache Side-Channel Attacks.srt 18.3 KB
- USENIX Security 2021/Coco Co-Design and Co-Verification of Masked Software Implementations on CPUs.eng.srt 18.3 KB
- USENIX Security 2023/The Writing on the Wall and 3D Digital Twins Personal Information ineng.srt 18.3 KB
- USENIX Security 2023/Powering for Privacy Improving User Trust in Smart Speaker Microphones witheng.srt 18.3 KB
- USENIX Security 2023/Medusa Attack Exploring Security Hazards of In-App QR Code Scanning.eng.srt 18.3 KB
- USENIX Security 2023/ProSpeCT Provably Secure Speculation for the Constant-Time Policy.eng.srt 18.2 KB
- USENIX Security 2023/Lalaine Measuring and Characterizing Non-Compliance of Apple Privacy Labels.eng.srt 18.2 KB
- USENIX Security 2021/V0Finder Discovering the Correct Origin of Publicly Reported Software.eng.srt 18.2 KB
- USENIX Security 2023/Pspray Timing Side-Channel based Linux Kernel Heap Exploitation Technique.eng.srt 18.2 KB
- USENIX Security 2022/Twilight A Differentially Private Payment Channel Network.srt 18.2 KB
- USENIX Security 2023/LibScan Towards More Precise Third-Party Library Identification for.eng.srt 18.2 KB
- USENIX Security 2021/How to Make Private Distributed Cardinality Estimation Practical.eng.srt 18.2 KB
- USENIX Security 2021/PrivSyn Differentially Private Data Synthesis.eng.srt 18.2 KB
- USENIX Security 2023/FuncTeller How Well Does eFPGA Hide Functionality.eng.srt 18.2 KB
- USENIX Security 2023/Discovering Adversarial Driving Maneuvers against Autonomous Vehicles.eng.srt 18.1 KB
- USENIX Security 2023/FISHFUZZ Catch Deeper Bugs by Throwing Larger Nets.eng.srt 18.1 KB
- USENIX Security 2022/Like Lesbians Walking the Perimeter - Experiences of U.S. LGBTQ Folks.srt 18.1 KB
- USENIX Security 2023/Detecting Multi-Step IAM Attacks in AWS Environments via Model Checking.eng.srt 18.1 KB
- USENIX Security 2020/USENIX Security 2020 Videos/Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade Attacks.eng.srt 18.1 KB
- USENIX Security 2023/LightThief Your Optical Communication Information is Stolen behind the Wall.eng.srt 18.1 KB
- USENIX Security 2021/Too Good to Be Safe Tricking Lane Detection in Autonomous Driving with Craft.eng.srt 18.0 KB
- USENIX Security 2023/ACon2 Adaptive Conformal Consensus for Provable Blockchain Oracles.eng.srt 18.0 KB
- USENIX Security 2022/DeepDi Learning a Relational Graph Convolutional Network Model on Instruction.srt 18.0 KB
- USENIX Security 2022/PolyCruise A Cross-Language Dynamic Information Flow Analysis.srt 18.0 KB
- USENIX Security 2020/PEPR '20/PEPR 20 - Throwing Out the Checklist.eng.srt 18.0 KB
- USENIX Security 2022/Fuzzware Using Precise MMIO Modeling for Effective Firmware Fuzzing.srt 18.0 KB
- USENIX Security 2023/The Blockchain Imitation Game.eng.srt 18.0 KB
- USENIX Security 2022/Identity Confusion in WebView-based Mobile App-in-app Ecosystems.srt 18.0 KB
- USENIX Security 2022/Minefield A Software-only Protection for SGX Enclaves against DVFS Attacks.srt 18.0 KB
- USENIX Security 2022/CamShield Securing Smart Cameras through Physical Replication and Isolation.srt 17.9 KB
- USENIX Security 2021/ReDoSHunter A Combined Static and Dynamic Approach for Regular Expression DoS.eng.srt 17.9 KB
- USENIX Security 2021/LZR Identifying Unexpected Internet Services.eng.srt 17.9 KB
- USENIX Security 2022/A Large-scale Temporal Measurement of Android Malicious Apps.srt 17.9 KB
- USENIX Security 2022/DnD A Cross-Architecture Deep Neural Network Decompiler.srt 17.9 KB
- USENIX Security 2023/Design of Access Control Mechanisms in Systems-on-Chip with Formal.eng.srt 17.9 KB
- USENIX Security 2023/GLeeFuzz Fuzzing WebGL Through Error Message Guided Mutation.eng.srt 17.9 KB
- USENIX Security 2023/Exorcising - Wraith - Protecting LiDAR-based Object Detector in Automated.eng.srt 17.9 KB
- USENIX Security 2022/Playing for K(H)eaps Understanding and Improving Linux Kernel Exploit.srt 17.9 KB
- USENIX Security 2023/PELICAN Exploiting Backdoors of Naturally Trained Deep Learning Models In.eng.srt 17.9 KB
- USENIX Security 2021/Research on the Security of Visual Reasoning CAPTCHA.eng.srt 17.8 KB
- USENIX Security 2021/Virtual Secure Platform A Five-Stage Pipeline Processor over TFHE.eng.srt 17.8 KB
- USENIX Security 2023/Reassembly is Hard A Reflection on Challenges and Strategies.eng.srt 17.8 KB
- USENIX Security 2022/Communication-Efficient Triangle Counting under Local Differential Privacy.srt 17.8 KB
- USENIX Security 2023/Examining Power Dynamics and User Privacy in Smart Technology Use Among.eng.srt 17.8 KB
- USENIX Security 2023/Near-Optimal Oblivious Key-Value Stores for Efficient PSI, PSU and Volume.eng.srt 17.8 KB
- USENIX Security 2021/Swivel Hardening WebAssembly against Spectre.eng.srt 17.8 KB
- USENIX Security 2023/Employees Who Don’t Accept the Time Security Takes Are Not Aware Enough.eng.srt 17.8 KB
- USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/balasubramaniyan_vijay_200x230.png 17.8 KB
- USENIX Security 2020/USENIX Security 2020 Videos/P2IM Scalable and Hardware-independent Firmware Testing via Automatic.eng.srt 17.7 KB
- USENIX Security 2021/YARIX Scalable YARA-based Malware Intelligence.eng.srt 17.7 KB
- USENIX Security 2023/Linear Private Set Union from Multi-Query Reverse Private Membership Test.eng.srt 17.7 KB
- USENIX Security 2022/Polynomial Commitment with a One-to-Many Prover and Applications.srt 17.7 KB
- USENIX Security 2023/Rethinking White-Box Watermarks on Deep Learning Models under Neural.eng.srt 17.7 KB
- USENIX Security 2021/Automatic Policy Generation for Inter-Service Access Control of Microservices.eng.srt 17.6 KB
- USENIX Security 2023/A Hybrid Alias Analysis and Its Application to Global Variable Protection.eng.srt 17.6 KB
- USENIX Security 2023/Controlled Data Races in Enclaves Attacks and Detection.eng.srt 17.6 KB
- USENIX Security 2023/POLICYCOMP Counterpart Comparison of Privacy Policies Uncovers.eng.srt 17.6 KB
- USENIX Security 2020/USENIX Security 2020 Videos/Zero-delay Lightweight Defenses against Website Fingerprinting.eng.srt 17.6 KB
- USENIX Security 2023/How fast do you heal A taxonomy for post-compromise security in.eng.srt 17.6 KB
- USENIX Security 2020/USENIX Security 2020 Videos/You Are What You Broadcast Identification of Mobile and IoT Devices.eng.srt 17.6 KB
- USENIX Security 2023/Glimpse On-Demand PoW Light Client with Constant-Size Storage for DeFi.eng.srt 17.6 KB
- USENIX Security 2022/ML-Doctor Holistic Risk Assessment of Inference Attacks Against Machine.srt 17.6 KB
- USENIX Security 2022/A Large-scale and Longitudinal Measurement Study of DKIM Deployment.srt 17.5 KB
- USENIX Security 2023/Automated Inference on Financial Security of Ethereum Smart Contracts.eng.srt 17.5 KB
- USENIX Security 2021/Shhhbe quiet - Reducing the Unwanted Interruptions of Notification.eng.srt 17.5 KB
- USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/challenge_button_170x107.jpg 17.5 KB
- USENIX Security 2021/Share First, Ask Later (or Never) Studying Violations of GDPR's Explicit.eng.srt 17.5 KB
- USENIX Security 2023/UnGANable Defending Against GAN-based Face Manipulation.eng.srt 17.5 KB
- USENIX Security 2023/VIPER Spotting Syscall-Guard Variables for Data-Only Attacks.eng.srt 17.5 KB
- USENIX Security 2020/USENIX Security 2020 Videos/An Ever-evolving Game Evaluation of Real-world Attacks and Defenses.eng.srt 17.5 KB
- USENIX Security 2023/TAP Transparent and Privacy-Preserving Data Services.eng.srt 17.5 KB
- USENIX Security 2021/Static Detection of Unsafe DMA Accesses in Device Drivers.eng.srt 17.4 KB
- USENIX Security 2023/Exploring User Reactions and Mental Models Towards Perceptual Manipulation.eng.srt 17.4 KB
- USENIX Security 2023/µFUZZ Redesign of Parallel Fuzzing using Microservice Architecture.eng.srt 17.4 KB
- USENIX Security 2023/Extending a Hand to Attackers Browser Privilege Escalation Attacks via.eng.srt 17.4 KB
- USENIX Security 2023/Aegis Mitigating Targeted Bit-flip Attacks against Deep Neural Networks.eng.srt 17.4 KB
- USENIX Security 2023/CAPatch Physical Adversarial Patch against Image Captioning Systems.eng.srt 17.4 KB
- USENIX Security 2023/Uncontained Uncovering Container Confusion in the Linux Kernel.eng.srt 17.4 KB
- USENIX Security 2023/An Efficient Design of Intelligent Network Data Plane.eng.srt 17.4 KB
- USENIX Security 2020/USENIX Security 2020 Videos/USBFuzz A Framework for Fuzzing USB Drivers by Device Emulation.eng.srt 17.3 KB
- USENIX Security 2023/Differential Testing of Cross Deep Learning Framework APIs Revealing.eng.srt 17.3 KB
- USENIX Security 2021/Privacy-Preserving and Standard-Compatible AKA Protocol for 5G.eng.srt 17.3 KB
- USENIX Security 2023/(M)WAIT for It Bridging the Gap between Microarchitectural and.eng.srt 17.3 KB
- USENIX Security 2022/OS-Aware Vulnerability Prioritization via Differential Severity Analysis.srt 17.3 KB
- USENIX Security 2023/High Recovery with Fewer Injections Practical Binary Volumetric Injection.eng.srt 17.2 KB
- USENIX Security 2023/Token Spammers, Rug Pulls, and Sniper Bots An Analysis of the Ecosystem.eng.srt 17.2 KB
- USENIX Security 2023/Automated Analysis of Protocols that use Authenticated Encryption How.eng.srt 17.2 KB
- USENIX Security 2020/USENIX Security 2020 Videos/Poison Over Troubled Forwarders A Cache Poisoning Attack Targeting DNS.eng.srt 17.2 KB
- USENIX Security 2020/USENIX Security 2020 Videos/Liveness is Not Enough Enhancing Fingerprint Authentication with Behavioral.eng.srt 17.1 KB
- USENIX Security 2023/One Size Does Not Fit All Uncovering and Exploiting Cross Platform.eng.srt 17.1 KB
- USENIX Security 2023/Watch your Watch Inferring Personality Traits from Wearable Activity Trackers.eng.srt 17.1 KB
- USENIX Security 2022/MundoFuzz Hypervisor Fuzzing with Statistical Coverage Testing and Grammar.srt 17.1 KB
- USENIX Security 2023/Rosetta Enabling Robust TLS Encrypted Traffic Classification in Diverse.eng.srt 17.1 KB
- USENIX Security 2023/Remote Attacks on Speech Recognition Systems Using Sound from Power Supply.eng.srt 17.0 KB
- USENIX Security 2023/Silent Spring Prototype Pollution Leads to Remote Code Execution in Node.js.eng.srt 17.0 KB
- USENIX Security 2022/Label Inference Attacks Against Vertical Federated Learning.srt 17.0 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/css_0tsfTZCLp9yBXG5eWU1vu1kZaV3OzOpnDDjEGiL42Cs.css 17.0 KB
- USENIX Security 2022/Birds of a Feather Flock Together How Set Bias Helps to Deanonymize You.srt 16.9 KB
- USENIX Security 2022/Breaking Bridgefy, again Adopting libsignal is not enough.srt 16.9 KB
- USENIX Security 2021/SEApp Bringing Mandatory Access Control to Android Apps.eng.srt 16.9 KB
- USENIX Security 2023/UCBlocker Unwanted Call Blocking Using Anonymous Authentication.eng.srt 16.9 KB
- USENIX Security 2023/Pass2Edit A Multi-Step Generative Model for Guessing Edited Passwords.eng.srt 16.9 KB
- USENIX Security 2023/X-Adv Physical Adversarial Object Attacks against X-ray Prohibited Item.eng.srt 16.8 KB
- USENIX Security 2023/The Case for Learned Provenance Graph Storage Systems.eng.srt 16.8 KB
- USENIX Security 2021/SmarTest Effectively Hunting Vulnerable Transaction Sequences in Smart.eng.srt 16.8 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/mozilla_firefox_logo.png 16.8 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/mozilla_firefox_logo.png 16.8 KB
- USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/kissner_lea_100x115.png 16.8 KB
- USENIX Security 2023/PCAT Functionality and Data Stealing from Split Learning by Pseudo-Client.eng.srt 16.7 KB
- USENIX Security 2023/PolyFuzz Holistic Greybox Fuzzing of Multi-Language Systems.eng.srt 16.7 KB
- USENIX Security 2023/On the Security Risks of Knowledge Graph Reasoning.eng.srt 16.7 KB
- USENIX Security 2023/IvySyn Automated Vulnerability Discovery in Deep Learning Frameworks.eng.srt 16.7 KB
- USENIX Security 2017/USENIX Security 2017 USENIX_files/nsf_300x120_v2_1.png 16.6 KB
- USENIX Security 2022/Debloating Address Sanitizer.srt 16.6 KB
- USENIX Security 2023/Hash Gone Bad Automated discovery of protocol attacks that exploit hash.eng.srt 16.6 KB
- USENIX Security 2022/Investigating State-of-the-Art Practices for Fostering Subjective Trust in.srt 16.6 KB
- USENIX Security 2023/Fairness Properties of Face Recognition and Obfuscation Systems.eng.srt 16.5 KB
- USENIX Security 2023/Password Guessing Using Random Forest.eng.srt 16.5 KB
- USENIX Security 2023/Auditory Eyesight Demystifying μs-Precision Keystroke Tracking Attacks on.eng.srt 16.5 KB
- USENIX Security 2023/Tubes Among Us Analog Attack on Automatic Speaker Identification.eng.srt 16.5 KB
- USENIX Security 2021/LIGHTBLUE Automatic Profile-Aware Debloating of Bluetooth Stacks.eng.srt 16.5 KB
- USENIX Security 2023/BalanceProofs Maintainable Vector Commitments with Fast Aggregation.eng.srt 16.5 KB
- USENIX Security 2023/Remote Code Execution from SSTI in the Sandbox Automatically Detecting and.eng.srt 16.4 KB
- USENIX Security 2023/Exploring Tenants' Preferences of Privacy Negotiation in Airbnb.eng.srt 16.4 KB
- USENIX Security 2023/Curve Trees Practical and Transparent Zero-Knowledge Accumulators.eng.srt 16.4 KB
- USENIX Security 2023/Efficient 3PC for Binary Circuits with Application to Maliciously-Secure.eng.srt 16.4 KB
- USENIX Security 2023/PUMM Preventing Use-After-Free Using Execution Unit Partitioning.eng.srt 16.4 KB
- USENIX Security 2022/Phish in Sheep's Clothing Exploring the Authentication Pitfalls.srt 16.4 KB
- USENIX Security 2023/Silent Bugs Matter A Study of Compiler-Introduced Security Bugs.eng.srt 16.3 KB
- USENIX Security 2021/ABY2.0 Improved Mixed-Protocol Secure Two-Party Computation.eng.srt 16.3 KB
- USENIX Security 2023/To Do This Properly, You Need More Resources The Hidden Costs of.eng.srt 16.3 KB
- USENIX Security 2023/An Empirical Study & Evaluation of Modern CAPTCHAs.eng.srt 16.2 KB
- USENIX Security 2022/Shuffle-based Private Set Union Faster and More Secure.srt 16.2 KB
- USENIX Security 2023/Fact-Saboteurs A Taxonomy of Evidence Manipulation Attacks against.eng.srt 16.2 KB
- USENIX Security 2023/Generative Intrusion Detection and Prevention on Data Stream.eng.srt 16.2 KB
- USENIX Security 2022/Ghost Peak Practical Distance Reduction Attacks Against HRP UWB Ranging.srt 16.2 KB
- USENIX Security 2022/Watching the Watchers Practical Video Identification Attack in LTE Networks.srt 16.2 KB
- USENIX Security 2022/FOAP Fine-Grained Open-World Android App Fingerprinting.srt 16.2 KB
- USENIX Security 2023/FreeEagle Detecting Complex Neural Trojans in Data-Free Cases.eng.srt 16.0 KB
- USENIX Security 2023/GlitchHiker Uncovering Vulnerabilities of Image Signal Transmission with IEMI.eng.srt 16.0 KB
- USENIX Security 2023/Rods with Laser Beams Understanding Browser Fingerprinting on Phishing Pages.eng.srt 16.0 KB
- USENIX Security 2023/Panda Security Analysis of Algorand Smart Contracts.eng.srt 15.9 KB
- USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/js_l3lGSHpmjPG_uzcz3Shpsi9Iwu4IaSB7us0ldgM0q7g.js 15.9 KB
- USENIX Security 2020/USENIX Security '20 USENIX_files/js_l3lGSHpmjPG_uzcz3Shpsi9Iwu4IaSB7us0ldgM0q7g.js 15.9 KB
- USENIX Security 2023/Oops.. I Glitched It Again How to Multi-Glitch the Glitching-Protections.eng.srt 15.9 KB
- USENIX Security 2023/Speculation at Fault Modeling and Testing Microarchitectural Leakage of.eng.srt 15.9 KB
- USENIX Security 2023/VILLAIN Backdoor Attacks Against Vertical Split Learning.eng.srt 15.8 KB
- USENIX Security 2023/MorFuzz Fuzzing Processor via Runtime Instruction Morphing enhanced.eng.srt 15.8 KB
- USENIX Security 2022/HyperDegrade From GHz to MHz Effective CPU Frequencies.srt 15.8 KB
- FOCI 2020/Padding Ain't Enough Assessing the Privacy Guarantees of Encrypted DNS.eng.srt 15.7 KB
- USENIX Security 2022/Unleash the Simulacrum Shifting Browser Realities for Robust.srt 15.7 KB
- USENIX Security 2022/Jenny Securing Syscalls for PKU-based Memory Isolation Systems.srt 15.7 KB
- USENIX Security 2023/Did the Shark Eat the Watchdog in the NTP Pool Deceiving the NTP Pool’s.eng.srt 15.6 KB
- USENIX Security 2023/KextFuzz Fuzzing macOS Kernel EXTensions on Apple Silicon via Exploiting.eng.srt 15.6 KB
- USENIX Security 2022/GhostTouch Targeted Attacks on Touchscreens without Physical Touch.srt 15.6 KB
- USENIX Security 2022/FuzzOrigin Detecting UXSS vulnerabilities in Browsers through Origin Fuzzing.srt 15.6 KB
- USENIX Security 2023/Improving Real-world Password Guessing Attacks via Bi-directional Transformers.eng.srt 15.6 KB
- USENIX Security 2023/BoKASAN Binary-only Kernel Address Sanitizer for Effective Kernel Fuzzing.eng.srt 15.6 KB
- USENIX Security 2022/SGXFuzz Efficiently Synthesizing Nested Structures for SGX Enclave Fuzzing.srt 15.6 KB
- USENIX Security 2022/Uninvited Guests Analyzing the Identity and Behavior of Certificate.srt 15.6 KB
- USENIX Security 2018/USENIX Security 2018 Program at a Glance USENIX_files/js_fjSBcoQiz2s5JFYU7Z0v2w3fhgZkax8CZA1Fi71bsVc.js 15.5 KB
- USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/js_fjSBcoQiz2s5JFYU7Z0v2w3fhgZkax8CZA1Fi71bsVc.js 15.5 KB
- USENIX Security 2019/USENIX Security 2019 Program at a Glance USENIX_files/js_fjSBcoQiz2s5JFYU7Z0v2w3fhgZkax8CZA1Fi71bsVc.js 15.5 KB
- USENIX Security 2022/SGXLock Towards Efficiently Establishing Mutual Distrust Between Host.srt 15.5 KB
- USENIX Security 2022/Blacklight Scalable Defense for Neural Networks against Query-Based Black-Box.srt 15.5 KB
- USENIX Security 2022/SYMSAN Time and Space Efficient Concolic Execution via Dynamic Data-flow.srt 15.5 KB
- USENIX Security 2023/Efficient Unbalanced Private Set Intersection Cardinality and User-friendly.eng.srt 15.5 KB
- USENIX Security 2022/MAGE Mutual Attestation for a Group of Enclaves without Trusted Third Parties.srt 15.4 KB
- USENIX Security 2022/DoLTEst In-depth Downlink Negative Testing Framework for LTE Devices.srt 15.4 KB
- USENIX Security 2023/Lost in Conversion Exploit Data Structure Conversion with Attribute Loss.eng.srt 15.3 KB
- USENIX Security 2023/DynSQL Stateful Fuzzing for Database Management Systems with Complex and.eng.srt 15.3 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/Lest We Remember - Cold Boot Attacks on Encryption Keys_files/x60_t43p.png 15.3 KB
- USENIX Security 2023/PrivGraph Differentially Private Graph Data Publication by Exploiting.eng.srt 15.3 KB
- USENIX Security 2022/Faster Yet Safer Logging System Via Fixed-Key Blockcipher.srt 15.3 KB
- USENIX Security 2022/Rendering Contention Channel Made Practical in Web Browsers.srt 15.2 KB
- USENIX Security 2023/No Single Silver Bullet Measuring the Accuracy of Password Strength Meters.eng.srt 15.2 KB
- USENIX Security 2021/Why Eve and Mallory Still Love Android Revisiting TLS (In)Security in Android.eng.srt 15.2 KB
- USENIX Security 2022/Oops Code Execution and Content Spoofing The First Comprehensive Analysis.srt 15.2 KB
- USENIX Security 2023/AIRTAG Towards Automated Attack Investigation by Unsupervised Learning.eng.srt 15.1 KB
- USENIX Security 2023/Cross Container Attacks The Bewildered eBPF on Clouds.eng.srt 15.1 KB
- USENIX Security 2023/Black-box Adversarial Example Attack towards FCG Based Android Malware.eng.srt 15.1 KB
- USENIX Security 2023/V-Cloak Intelligibility-, Naturalness- & Timbre-Preserving Real-Time Voice.eng.srt 15.1 KB
- USENIX Security 2023/AURC Detecting Errors in Program Code and Documentation.eng.srt 15.1 KB
- USENIX Security 2021/PTAuth Temporal Memory Safety via Robust Points-to Authentication.eng.srt 15.1 KB
- USENIX Security 2022/SWAPP A New Programmable Playground for Web Application Security.srt 15.1 KB
- USENIX Security 2023/Towards a General Video-based Keystroke Inference Attack.eng.srt 15.0 KB
- USENIX Security 2023/Auditing Frameworks Need Resource Isolation A Systematic Study on the.eng.srt 15.0 KB
- USENIX Security 2023/Systematic Assessment of Fuzzers using Mutation Analysis.eng.srt 14.9 KB
- USENIX Security 2023/Catch You and I Can Revealing Source Voiceprint Against Voice Conversion.eng.srt 14.9 KB
- CSET 2020/HAI 1.0 HIL-based Augmented ICS Security Dataset.eng.srt 14.8 KB
- USENIX Security 2020/CSET '20/CSET 20 - HAI 1.0 HIL-based Augmented ICS Security Dataset.eng.srt 14.8 KB
- USENIX Security 2023/PrivTrace Differentially Private Trajectory Synthesis by Adaptive Markov.eng.srt 14.7 KB
- USENIX Security 2023/FACE-AUDITOR Data Auditing in Facial Recognition Systems.eng.srt 14.7 KB
- USENIX Security 2023/The Maginot Line Attacking the Boundary of DNS Caching Protection.eng.srt 14.7 KB
- USENIX Security 2023/A Data-free Backdoor Injection Approach in Neural Networks.eng.srt 14.7 KB
- FOCI 2020/HTTPT A Probe-Resistant Proxy.eng.srt 14.7 KB
- USENIX Security 2017/USENIX Security 2017 USENIX_files/usenix_logo_300x150_neat_2.png 14.6 KB
- USENIX Security 2018/USENIX Security 2018 USENIX_files/usenix_logo_300x150_neat_2.png 14.6 KB
- USENIX Security 2019/USENIX Security 2019 USENIX_files/usenix_logo_300x150_neat_2.png 14.6 KB
- USENIX Security 2020/USENIX Security '20 USENIX_files/usenix_logo_300x150_neat_2.png 14.6 KB
- USENIX Security 2008/USENIX Security 2008 WiPs.htm 14.6 KB
- USENIX Security 2023/A Verified Confidential Computing as a Service Framework for Privacy.eng.srt 14.5 KB
- USENIX Security 2023/Automated Exploitable Heap Layout Generation for Heap Overflows Through.eng.srt 14.5 KB
- USENIX Security 2023/Bleem Packet Sequence Oriented Fuzzing for Protocol Implementations.eng.srt 14.4 KB
- USENIX Security 2023/CarpetFuzz Automatic Program Option Constraint Extraction from.eng.srt 14.4 KB
- USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/js_nKHPel07iQ7X6ouVrkRIeMs9JzgU_FAp9nBhDfrhyQc.js 14.4 KB
- USENIX Security 2020/USENIX Security '20 USENIX_files/js_nKHPel07iQ7X6ouVrkRIeMs9JzgU_FAp9nBhDfrhyQc.js 14.4 KB
- USENIX Security 2011/USENIX Security 2011 Poster Session.htm 14.4 KB
- USENIX Security 2010/USENIX Security 2010 Technical Sessions_files/johnston_roger200x170.jpg 14.4 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/css_m9t3SZ2dKv6HQuOuf0zINIRA5GjP4lkCCtmRRbSjaXs.css 14.3 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/css_m9t3SZ2dKv6HQuOuf0zINIRA5GjP4lkCCtmRRbSjaXs.css 14.3 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/css_m9t3SZ2dKv6HQuOuf0zINIRA5GjP4lkCCtmRRbSjaXs.css 14.3 KB
- USENIX Security 2023/Machine-checking Multi-Round Proofs of Shuffle Terelius-Wikstrom and.eng.srt 14.3 KB
- USENIX Security 2023/MINER A Hybrid Data-Driven Approach for REST API Fuzzing.eng.srt 14.3 KB
- USENIX Security 2023/AlphaEXP An Expert System for Identifying Security-Sensitive Kernel Objects.eng.srt 14.0 KB
- USENIX Security 2019/USENIX Security 2019 USENIX_files/heninger_nadia_200x230.jpg 14.0 KB
- USENIX Security 2018/USENIX Security 2018 USENIX_files/js_1_m_mRX0UrchQnV5E0UZ6141Ts6jK5YnRLQe7J2kaX4.js 13.9 KB
- USENIX Security 2019/USENIX Security 2019 USENIX_files/js_1_m_mRX0UrchQnV5E0UZ6141Ts6jK5YnRLQe7J2kaX4.js 13.9 KB
- USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/elazari-bar-on-amit_200x230.jpg 13.9 KB
- USENIX Security 2022/FLAME Taming Backdoors in Federated Learning.srt 13.8 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/woot13_banner_mini.png 13.8 KB
- USENIX Security 2023/FedVal Different good or different bad in federated learning.eng.srt 13.8 KB
- USENIX Security 2010/USENIX Security 2010 Poster Session.htm 13.8 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/beyond_security_002.png 13.8 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/beyond_security_002.png 13.8 KB
- USENIX Security 2022/On the Security Risks of AutoML.srt 13.7 KB
- USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/js_AQDKCRqaqaAAAzbvxcaEQBooKEQA-dFTfff7tzCklI8.js 13.7 KB
- USENIX Security 2017/USENIX Security 2017 USENIX_files/js_AQDKCRqaqaAAAzbvxcaEQBooKEQA-dFTfff7tzCklI8.js 13.7 KB
- USENIX Security 2018/USENIX Security 2018 Program at a Glance USENIX_files/js_AQDKCRqaqaAAAzbvxcaEQBooKEQA-dFTfff7tzCklI8.js 13.7 KB
- USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/js_AQDKCRqaqaAAAzbvxcaEQBooKEQA-dFTfff7tzCklI8.js 13.7 KB
- USENIX Security 2018/USENIX Security 2018 USENIX_files/js_AQDKCRqaqaAAAzbvxcaEQBooKEQA-dFTfff7tzCklI8.js 13.7 KB
- USENIX Security 2019/USENIX Security 2019 Program at a Glance USENIX_files/js_AQDKCRqaqaAAAzbvxcaEQBooKEQA-dFTfff7tzCklI8.js 13.7 KB
- USENIX Security 2019/USENIX Security 2019 USENIX_files/js_AQDKCRqaqaAAAzbvxcaEQBooKEQA-dFTfff7tzCklI8.js 13.7 KB
- USENIX Security 2023/CipherH Automated Detection of Ciphertext Side-channel Vulnerabilities in.eng.srt 13.7 KB
- CSET 2020/APTGen An Approach towards Generating Practical Dataset Labelled with Targeted.eng.srt 13.6 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/Lest We Remember - Cold Boot Attacks on Encryption Keys_files/toshiba_lenovo.png 13.6 KB
- USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/monica_lam_200x230.jpg 13.6 KB
- USENIX Security 2021/SEAL Storage-efficient Causality Analysis on Enterprise Logs.eng.srt 13.6 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/healthtech13_banner_mini.png 13.6 KB
- USENIX Security 2023/XCheck Verifying Integrity of 3D Printed Patient-Specific Devices via.eng.srt 13.5 KB
- USENIX Security 2021/Incrementally Updateable Honey Password Vaults.eng.srt 13.5 KB
- USENIX Security 2019/USENIX Security 2019 USENIX_files/traynor_patrick_200x230.jpg 13.5 KB
- USENIX Security 2023/QFA2SR Query-Free Adversarial Transfer Attacks to Speaker Recognition Systems.eng.srt 13.5 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/leet13_banner_mini.png 13.4 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/crc_press_150x60_002.png 13.4 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/crc_press_150x60_002.png 13.4 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/crc_press_150x60_002.png 13.4 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/crc_press_150x60_002.png 13.4 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/crc_press_150x60_002.png 13.4 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/crc_press_150x60_002.png 13.4 KB
- USENIX Security 2022/Seeing is Living Rethinking the Security of Facial Liveness Verification.srt 13.3 KB
- USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/evt-deter_button.jpg 13.2 KB
- USENIX Security 2022/Themis Accelerating the Detection of Route Origin Hijacking by Distinguishing.srt 13.2 KB
- USENIX Security 2018/USENIX Security 2018 USENIX_files/nsf_600x240_1.png 13.1 KB
- USENIX Security 2023/BotScreen Trust Everybody, but Cut the Aimbots Yourself.eng.srt 13.1 KB
- USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/linuxProMagazine_webLogo.jpg 13.0 KB
- USENIX Security 2018/27th USENIX Security Symposium Grid_files/loading-3x.gif 13.0 KB
- USENIX Security 2019/28th USENIX Security Symposium Grid_files/loading-3x.gif 13.0 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/Lest We Remember - Cold Boot Attacks on Encryption Keys_files/ramjet_5100.png 12.9 KB
- USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/susan_landau_200x230.jpg 12.9 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/viel-search.png 12.8 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/postmessageRelay_data/rpcshindig_random.js 12.7 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/postmessageRelay_data/rpcshindig_random.js 12.7 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/postmessageRelay_data/rpcshindig_random.js 12.7 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/postmessageRelay_data/rpcshindig_random.js 12.7 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/postmessageRelay_data/rpcshindig_random.js 12.7 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/postmessageRelay_data/rpcshindig_random.js 12.7 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/postmessageRelay_data/rpcshindig_random.js 12.7 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/postmessageRelay_data/rpcshindig_random.js 12.7 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/postmessageRelay_data/rpcshindig_random.js 12.7 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/postmessageRelay_data/rpcshindig_random.js 12.7 KB
- USENIX Security 2019/USENIX Security 2019 USENIX_files/kaust_600x240.png 12.7 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/foci13_banner_mini.png 12.4 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/google_logo_300x110.png 12.3 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/google_logo_300x110.png 12.3 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/ieee_cybersecurity_150x73.png 12.2 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/ieee_cybersecurity_150x73.png 12.2 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/fsm_150x86_2.png 12.1 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/fsm_150x86_2.png 12.1 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/hotsec13_banner_mini.png 12.0 KB
- USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/ross-anderson_200x230.jpg 12.0 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/css_JfUmRW-Hr0U8TZVXkaC2BcGIYyK5guphAqwPzo1s5JM.css 11.7 KB
- USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/halderman_alex_200x230.jpg 11.6 KB
- USENIX Security 2016/USENIX Security 2016 Videos/Ariadne A Minimal Approach to State Continuity.eng.srt 11.5 KB
- USENIX Security 2020/USENIX Security '20 USENIX_files/capkun_srdjan_200x230.jpg 11.5 KB
- USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/wenyuanxu_200x230.jpg 11.5 KB
- USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/donna_dodson_200x230.jpg 11.5 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/cset13_banner_mini.png 11.5 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/evtwote13_banner_mini_0.png 11.4 KB
- USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/rubin_avi_200x230.jpg 11.3 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/symantec_logo_1.png 11.2 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/symantec_logo_1.png 11.2 KB
- USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/sec17_wordmark_stacked.svg 11.2 KB
- USENIX Security 2017/USENIX Security 2017 USENIX_files/sec17_wordmark_stacked.svg 11.2 KB
- USENIX Security 2017/USENIX Security 2017 USENIX_files/sec17_wordmark_stacked_002.svg 11.2 KB
- USENIX Security 2020/USENIX Security '20 USENIX_files/roesner_franziska_200.jpg 11.1 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/admin_125x47_0_002.png 11.1 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/admin_125x47_0_002.png 11.1 KB
- USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/paul_kocher_200x230.jpg 11.1 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/USENIX Security 2008 Poster Session.htm 10.9 KB
- USENIX Security 2019/USENIX Security 2019 Video/USENIX Security '19.m3u 10.8 KB
- USENIX Security 2007/Presentations/Security 2007 Poster Session.htm 10.6 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/felten_ed_sec13.jpg 10.6 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/symantec_150x60.png 10.3 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/symantec_150x60_002.png 10.3 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/symantec_150x60.png 10.3 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/symantec_150x60.png 10.3 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/linux_journal_150x72_0_002.png 10.1 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/linux_journal_150x72_0_002.png 10.1 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/linux_journal_150x72_2_002.png 10.1 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/linux_journal_150x72_2_002.png 10.1 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/linux_journal_150x72_2_002.png 10.1 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/linux_journal_150x72_2_002.png 10.1 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/ieee_cybersecurity_150x73_002.png 10.0 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/ieee_cybersecurity_150x73_002.png 10.0 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/hpcwire_150x55_0_002.png 9.9 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/hpcwire_150x55_0_002.png 9.9 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/hpcwire_150x55_0_002.png 9.9 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/hpcwire_150x55_0_002.png 9.9 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/hpcwire_150x55_0_002.png 9.9 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/hpcwire_150x55_0_002.png 9.9 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/fw-search.png 9.9 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/postmessageRelay_data/829555168-postmessagerelay.js 9.8 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/postmessageRelay_data/829555168-postmessagerelay.js 9.8 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/postmessageRelay_data/829555168-postmessagerelay.js 9.8 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/postmessageRelay_data/829555168-postmessagerelay.js 9.8 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/postmessageRelay_data/829555168-postmessagerelay.js 9.8 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/postmessageRelay_data/829555168-postmessagerelay.js 9.8 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/postmessageRelay_data/829555168-postmessagerelay.js 9.8 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/postmessageRelay_data/829555168-postmessagerelay.js 9.8 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/postmessageRelay_data/829555168-postmessagerelay.js 9.8 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/postmessageRelay_data/829555168-postmessagerelay.js 9.8 KB
- USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/js_qq8Htu2Ei-eV_IteNYMM8zM4yBe6NOtuXBD56RXHvN4.js 9.7 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/danzig_richard_115x125.jpg 9.7 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/nsf_90x80_0.png 9.6 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/nsf_90x80_0_002.png 9.6 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/nsf_90x80_0.png 9.6 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/nsf_90x80_0_002.png 9.6 KB
- USENIX Security 2019/USENIX Security 2019 USENIX_files/palo-alto-networks_600x240.png 9.5 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/fsm_150x44_0_002.png 9.5 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/fsm_150x44_0_002.png 9.5 KB
- FOCI 2023/FOCI 2023 Awards and Closing.eng.srt 9.5 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/Practical Symmetric Key Cryptography on Modern Graphics Hardware_files/img12.png 9.4 KB
- USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/css_mTaWTa-gjA-dVa8tJl4KV4v7oKx8qHNzCSd2Zupzqn4.css 9.4 KB
- USENIX Security 2017/USENIX Security 2017 USENIX_files/css_mTaWTa-gjA-dVa8tJl4KV4v7oKx8qHNzCSd2Zupzqn4.css 9.4 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/it_dev_150x39.png 9.3 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/it_dev_150x39.png 9.3 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/css_SKdvFJ9YoZ2Zlnl17QxUbae5QC-NQDrH8ynBbHJFAaM.css 9.0 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/css_SKdvFJ9YoZ2Zlnl17QxUbae5QC-NQDrH8ynBbHJFAaM.css 9.0 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/css_dY0FNz4qF00fqwtbSA930BrnJH15HL9efi8t-qF8ZFs.css 9.0 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/css_SKdvFJ9YoZ2Zlnl17QxUbae5QC-NQDrH8ynBbHJFAaM.css 9.0 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/css_SKdvFJ9YoZ2Zlnl17QxUbae5QC-NQDrH8ynBbHJFAaM.css 9.0 KB
- USENIX Security 2019/USENIX Security 2019 USENIX_files/sec19_wordmark_stacked_456x186_002.png 9.0 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/Practical Symmetric Key Cryptography on Modern Graphics Hardware_files/img13.png 8.8 KB
- USENIX Security 2018/USENIX Security 2018 USENIX_files/google_600x240_0.png 8.8 KB
- USENIX Security 2019/USENIX Security 2019 USENIX_files/google_600x240_6.png 8.8 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/security_orb_tagline_150x47_002.png 8.8 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/security_orb_tagline_150x47.png 8.8 KB
- USENIX Security 2020/USENIX Security '20 USENIX_files/sec20_wordmark_stacked_white_002.png 8.7 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/facebook_150x50_0_002.png 8.7 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/facebook_150x50_0_002.png 8.7 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/facebook_150x50_3.png 8.7 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/facebook_150x50_3.png 8.7 KB
- USENIX Security 2018/USENIX Security 2018 USENIX_files/sec18_wordmark_stacked_450x186.png 8.7 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/google_150x50_3_002.png 8.4 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/google_150x50_3.png 8.4 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/ieee_sp_150x36_0.png 8.4 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/ieee_sp_150x36_0.png 8.4 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/ieee_sp_150x36_4.png 8.4 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/ieee_sp_150x36_4.png 8.4 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/facebook_5_002.png 8.4 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/facebook_5_002.png 8.4 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/userfriendly_150x60_002.png 8.2 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/userfriendly_150x60_002.png 8.2 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/userfriendly_150x60_002.png 8.2 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/userfriendly_150x60.png 8.2 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/userfriendly_150x60_002.png 8.2 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/userfriendly_150x60_002.png 8.2 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/userfriendly_150x60_002.png 8.2 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/userfriendly_150x60_002.png 8.2 KB
- USENIX Security 2018/USENIX Security 2018 USENIX_files/baidu_600x240.png 8.2 KB
- USENIX Security 2019/USENIX Security 2019 USENIX_files/baidu_600x240_1.png 8.2 KB
- USENIX Security 2019/USENIX Security 2019 USENIX_files/avast_600x240.png 8.1 KB
- USENIX Security 2017/USENIX Security 2017 USENIX_files/js_PACmgStbFksqYzX-HlEqBZWNu18Gac4c9Dc2EzyjEsM.js 8.1 KB
- USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/js_zsU7pE_En9PuEzx00IjN_iCxIwgABAiEwJNkh1iTG9k.js 8.1 KB
- USENIX Security 2017/USENIX Security 2017 USENIX_files/js_zsU7pE_En9PuEzx00IjN_iCxIwgABAiEwJNkh1iTG9k.js 8.1 KB
- USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/js_zsU7pE_En9PuEzx00IjN_iCxIwgABAiEwJNkh1iTG9k.js 8.1 KB
- USENIX Security 2018/USENIX Security 2018 USENIX_files/js_zsU7pE_En9PuEzx00IjN_iCxIwgABAiEwJNkh1iTG9k.js 8.1 KB
- USENIX Security 2019/USENIX Security 2019 USENIX_files/js_zsU7pE_En9PuEzx00IjN_iCxIwgABAiEwJNkh1iTG9k.js 8.1 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/lxer_150x53_0_002.png 8.0 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/lxer_150x53_0_002.png 8.0 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/Practical Symmetric Key Cryptography on Modern Graphics Hardware_files/img8.png 7.9 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/dmtf_150x53_0.png 7.8 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/dmtf_150x53_0.png 7.8 KB
- USENIX Security 2018/27th USENIX Security Symposium Grid_files/app-apple.svg 7.7 KB
- USENIX Security 2019/28th USENIX Security Symposium Grid_files/app-apple.svg 7.7 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/google_8.png 7.7 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/google_8.png 7.7 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/google_6_002.png 7.7 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/google_6_002.png 7.7 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/oxford_university_press_150x55.png 7.6 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/oxford_university_press_150x55.png 7.6 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/metricon70_banner_colo.jpg 7.6 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/cryptography_research_150x46_002.png 7.6 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/cryptography_research_150x46.png 7.6 KB
- USENIX Security 2017/USENIX Security 2017 USENIX_files/sec17_button_180.png 7.6 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/beyond_security.png 7.4 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/beyond_security.png 7.4 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/fsm_150x86_2_002.png 7.3 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/fsm_150x86_2_002.png 7.3 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/bit_150x60.png 7.2 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/bit_150x60.png 7.2 KB
- USENIX Security 2017/USENIX Security 2017 USENIX_files/bit_150x60.png 7.2 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/national_science_foundation_002.gif 7.2 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/national_science_foundation_002.gif 7.2 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/nsf_150x60_v2_002.png 7.1 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/nsf_150x60_v2.png 7.1 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/nsf_150x60_v2_002.png 7.1 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/nsf_150x60_v2_002.png 7.1 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/nsf_150x60_v2_002.png 7.1 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/nsf_150x60_v2_002.png 7.1 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/Practical Symmetric Key Cryptography on Modern Graphics Hardware_files/img9.png 7.0 KB
- USENIX Security 2019/USENIX Security 2019 USENIX_files/usc_isi_black_600x240.png 6.9 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/acmqueue_600x240_1.png 6.9 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/acmqueue_600x240_1.png 6.9 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera1x.png 6.9 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/eff_horizontal_150x66_1.png 6.9 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/eff_horizontal_150x66_1.png 6.9 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/healthsec12_banner_colo.jpg 6.9 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/admin_150x60_002.png 6.8 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/admin_150x60_002.png 6.8 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/admin_150x60_002.png 6.8 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/admin_150x60_002.png 6.8 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/admin_150x60_002.png 6.8 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/admin_150x60_002.png 6.8 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/admin_150x60_002.png 6.8 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/admin_150x60.png 6.8 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/Practical Symmetric Key Cryptography on Modern Graphics Hardware_files/img14.png 6.8 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/oxford_university_press_150x55_002.png 6.8 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/oxford_university_press_150x55_002.png 6.8 KB
- USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/hotsec09_button_170x74.jpg 6.6 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/hakin9_en150x40_002.png 6.6 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/hakin9_en150x40_002.png 6.6 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/userfriendly_150x38_0_002.png 6.6 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/userfriendly_150x38_0_002.png 6.6 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/facebook_150x50_0.png 6.5 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/facebook_150x50_0.png 6.5 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/facebook_150x50_3_002.png 6.5 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/facebook_150x50_3_002.png 6.5 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/lxer_150x60.png 6.5 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/lxer_150x60_002.png 6.5 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/lxer_150x60.png 6.5 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/lxer_150x60.png 6.5 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/lxer_150x60.png 6.5 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/lxer_150x60.png 6.5 KB
- USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/fsm.jpg 6.5 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/linux_journal_150x72_0.png 6.4 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/linux_journal_150x72_0.png 6.4 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/linux_journal_150x72_2.png 6.4 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/linux_journal_150x72_2.png 6.4 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/linux_journal_150x72_2.png 6.4 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/linux_journal_150x72_2.png 6.4 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/sec16_media.png 6.4 KB
- USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/evtwote09_button_170x73.jpg 6.4 KB
- USENIX Security 2017/USENIX Security 2017 USENIX_files/cisco_300x120.png 6.3 KB
- USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/hackett_bankwell_125x81.jpg 6.3 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/hotsec12_banner_colo.jpg 6.3 KB
- USENIX Security 2018/27th USENIX Security Symposium Grid_files/responsive.css 6.3 KB
- USENIX Security 2019/28th USENIX Security Symposium Grid_files/responsive.css 6.3 KB
- USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/woot09_button_170x72.jpg 6.2 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/cset12_banner_colo.jpg 6.2 KB
- USENIX Security 2020/USENIX Security '20 USENIX_files/kaspersky_600x240_1.png 6.2 KB
- USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/cset09_button_170x73.jpg 6.1 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/lapsley-phil_100x115.jpg 6.1 KB
- USENIX Security 2020/USENIX Security '20 USENIX_files/bytedance_600x240_3.png 6.1 KB
- USENIX Security 2017/USENIX Security 2017 USENIX_files/netflix_300x120_0.png 6.1 KB
- USENIX Security 2010/USENIX Security 2010 Proceedings Errata.epub 6.0 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/dcj_150x27_0_002.png 6.0 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/dcj_150x27_0_002.png 6.0 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/arbor_networks_150x42_002.png 6.0 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/arbor_networks_150x42_002.png 6.0 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera8x.png 6.0 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/dcj_150x27_3_002.png 6.0 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/dcj_150x27_3_002.png 6.0 KB
- USENIX Security 2019/USENIX Security 2019 USENIX_files/cisco_600x240.png 6.0 KB
- USENIX Security 2020/USENIX Security '20 USENIX_files/cisco_600x240.png 6.0 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/ibm_research_150x60_002.png 5.9 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/ibm_research_150x60_002.png 5.9 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/ibm_research_150x60_002.png 5.9 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/ibm_research_150x60_002.png 5.9 KB
- USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/google.jpg 5.9 KB
- USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/google.jpg 5.9 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/stack_exchange_150x37_0.png 5.9 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/stack_exchange_150x37_0.png 5.9 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/marcus_richard.jpg 5.8 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/Practical Symmetric Key Cryptography on Modern Graphics Hardware_files/img10.png 5.7 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera.css 5.7 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/cryptography_research_150x46.png 5.7 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/cryptography_research_150x46_002.png 5.7 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img177.png 5.6 KB
- USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/metricon09_button_170x74.jpg 5.6 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/infosecnews_150x120_0_002.png 5.5 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/infosecnews_150x120_0_002.png 5.5 KB
- USENIX Security 2020/USENIX Security '20 USENIX_files/salesforce_600x240.png 5.5 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/foci12_banner_colo.jpg 5.5 KB
- USENIX Security 2017/USENIX Security 2017 USENIX_files/ibm_research_stacked_300x120_0.png 5.5 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css 5.5 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css 5.5 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css 5.5 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css 5.5 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css 5.5 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css 5.5 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css 5.5 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css 5.5 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css 5.5 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css 5.5 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/google_logo_300x110_002.png 5.4 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/google_logo_300x110_002.png 5.4 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/woot12_banner_colo.jpg 5.4 KB
- USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/evt_cset_button.jpg 5.3 KB
- USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css 5.3 KB
- USENIX Security 2017/USENIX Security 2017 USENIX_files/css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css 5.3 KB
- USENIX Security 2018/USENIX Security 2018 Program at a Glance USENIX_files/css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css 5.3 KB
- USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css 5.3 KB
- USENIX Security 2018/USENIX Security 2018 USENIX_files/css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css 5.3 KB
- USENIX Security 2019/USENIX Security 2019 Program at a Glance USENIX_files/css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css 5.3 KB
- USENIX Security 2019/USENIX Security 2019 USENIX_files/css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css 5.3 KB
- USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css 5.3 KB
- USENIX Security 2020/USENIX Security '20 USENIX_files/css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css 5.3 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/evtwote12_banner_colo.jpg 5.3 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/Practical Symmetric Key Cryptography on Modern Graphics Hardware_files/img11.png 5.3 KB
- USENIX Security 2017/USENIX Security 2017 USENIX_files/visa_research_300x120.png 5.2 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/symantec_150x60_002.png 5.2 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/symantec_150x60.png 5.2 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/symantec_150x60_002.png 5.2 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/symantec_150x60_002.png 5.2 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/linux_pro_150x57_0_002.png 5.2 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/linux_pro_150x57_0_002.png 5.2 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/virus_bulletin_150x60.png 5.0 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/virus_bulletin_150x60.png 5.0 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/virus_bulletin_150x60.png 5.0 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/virus_bulletin_150x60.png 5.0 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/virus_bulletin_150x60.png 5.0 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/virus_bulletin_150x60.png 5.0 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/virus_bulletin_150x60.png 5.0 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/virus_bulletin_150x60.png 5.0 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/infosecnews_150x120_0.png 5.0 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/infosecnews_150x120_0.png 5.0 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/symantec_logo_1_002.png 5.0 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/symantec_logo_1_002.png 5.0 KB
- USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/dfrws_button.jpg 5.0 KB
- USENIX Security 2008/USENIX Security 2008 Technical Sessions_files/bowen_debra.jpg 4.9 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/linux_pro_150x60_002.png 4.9 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/linux_pro_150x60_002.png 4.9 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/linux_pro_150x60_002.png 4.9 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/linux_pro_150x60_002.png 4.9 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/linux_pro_150x60_002.png 4.9 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/linux_pro_150x60_002.png 4.9 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/linux_pro_150x60_002.png 4.9 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/linux_pro_150x60_002.png 4.9 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/infosecnews_150x38_002.png 4.8 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/infosecnews_150x38_002.png 4.8 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/infosecnews_150x38_002.png 4.8 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/infosecnews_150x38_002.png 4.8 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/infosecnews_150x38_002.png 4.8 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/infosecnews_150x38_002.png 4.8 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/Practical Symmetric Key Cryptography on Modern Graphics Hardware_files/img15.png 4.8 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/microsoft_research_0.png 4.7 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/microsoft_research_0.png 4.7 KB
- USENIX Security 2020/USENIX Security '20 USENIX_files/google_600x240_13.png 4.7 KB
- USENIX Security 2019/USENIX Security 2019 USENIX_files/facebook_600x240_6.png 4.7 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/facebook_5.png 4.7 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/facebook_5.png 4.7 KB
- USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/symantec.jpg 4.7 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/nsf_150x60_v2.png 4.7 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/nsf_150x60_v2_002.png 4.7 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/nsf_150x60_v2.png 4.7 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/nsf_150x60_v2.png 4.7 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/nsf_150x60_v2.png 4.7 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/nsf_150x60_v2.png 4.7 KB
- USENIX Security 2017/USENIX Security 2017 USENIX_files/facebook_2016_300x120_1.png 4.7 KB
- USENIX Security 2018/USENIX Security 2018 USENIX_files/facebook_2016_300x120_1.png 4.7 KB
- USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/sec07.css 4.7 KB
- USENIX Security 2007/Presentations/Security 2007 Poster Session_files/sec07.css 4.7 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/akamai_150x62.png 4.6 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/akamai_150x62.png 4.6 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/nsp_logo_black.png 4.6 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/nsp_logo_black_002.png 4.6 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/nsp_logo_black.png 4.6 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/nsp_logo_black_002.png 4.6 KB
- USENIX Security 2017/USENIX Security 2017 USENIX_files/acmqueue_600x240_1.png 4.6 KB
- USENIX Security 2018/USENIX Security 2018 USENIX_files/acmqueue_600x240_1.png 4.6 KB
- USENIX Security 2019/USENIX Security 2019 USENIX_files/acmqueue_600x240_1.png 4.6 KB
- USENIX Security 2020/USENIX Security '20 USENIX_files/acmqueue_600x240_1.png 4.6 KB
- USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/techxworld_logo.jpg 4.6 KB
- USENIX Security 2019/USENIX Security 2019 Program at a Glance USENIX_files/sec19_wordmark_stacked_456x186.png 4.5 KB
- USENIX Security 2019/USENIX Security 2019 USENIX_files/sec19_wordmark_stacked_456x186.png 4.5 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/lxer_150x53_0.png 4.5 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/lxer_150x53_0.png 4.5 KB
- USENIX Security 2019/USENIX Security 2019 USENIX_files/intel_600x240.png 4.5 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/neustar_150x60.png 4.4 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/neustar_150x60_002.png 4.4 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/ieee_sp_150x36_4_002.png 4.4 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/ieee_sp_150x36_4_002.png 4.4 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/ieee_sp_150x36_0_002.png 4.4 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/ieee_sp_150x36_0_002.png 4.4 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/microsoft_150x60_0.png 4.4 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/microsoft_150x60_0.png 4.4 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/acmqueue_150x48_0_002.png 4.4 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/acmqueue_150x48_0_002.png 4.4 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/acmqueue_150x48_3.png 4.4 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/acmqueue_150x48_3.png 4.4 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/acmqueue_150x48_3.png 4.4 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/acmqueue_150x48_3.png 4.4 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/acmqueue_150x48_3_002.png 4.4 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/acmqueue_150x48_3_002.png 4.4 KB
- USENIX Security 2018/27th USENIX Security Symposium Grid_files/app-google.svg 4.3 KB
- USENIX Security 2019/28th USENIX Security Symposium Grid_files/app-google.svg 4.3 KB
- USENIX logo.jpg 4.3 KB
- USENIX Security 2010/USENIX Security 2010 Proceedings Errata.mobi 4.3 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/dmtf_150x53_0_002.png 4.3 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/dmtf_150x53_0_002.png 4.3 KB
- USENIX Security 2018/USENIX Security 2018 Program at a Glance USENIX_files/css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css 4.2 KB
- USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css 4.2 KB
- USENIX Security 2018/USENIX Security 2018 USENIX_files/css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css 4.2 KB
- USENIX Security 2019/USENIX Security 2019 Program at a Glance USENIX_files/css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css 4.2 KB
- USENIX Security 2019/USENIX Security 2019 USENIX_files/css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css 4.2 KB
- USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css 4.2 KB
- USENIX Security 2020/USENIX Security '20 USENIX_files/css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css 4.2 KB
- USENIX Security 2020/USENIX Security '20 USENIX_files/baidu_600x240_0.png 4.2 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/security_orb_tagline_150x47.png 4.2 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/security_orb_tagline_150x47_002.png 4.2 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/computer_150x33_0.png 4.1 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/computer_150x33_0.png 4.1 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/eff_horizontal_150x66_1_002.png 4.1 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/eff_horizontal_150x66_1_002.png 4.1 KB
- USENIX Security 2011/USENIX Security 2011 Proceedings Errata.mobi 4.1 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/national_science_foundation.gif 4.1 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/national_science_foundation.gif 4.1 KB
- USENIX Security 2019/USENIX Security 2019 USENIX_files/microsoft-logo_600x240.png 4.1 KB
- USENIX Security 2020/USENIX Security '20 USENIX_files/microsoft-logo_600x240_0.png 4.1 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/admin_150x60.png 4.1 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/admin_150x60.png 4.1 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/admin_150x60.png 4.1 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/admin_150x60.png 4.1 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/admin_150x60.png 4.1 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/admin_150x60.png 4.1 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/admin_150x60.png 4.1 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/admin_150x60_002.png 4.1 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/fsm_150x44_0.png 4.0 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/fsm_150x44_0.png 4.0 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/ibm_research_150x60.png 4.0 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/ibm_research_150x60.png 4.0 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/ibm_research_150x60.png 4.0 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/ibm_research_150x60.png 4.0 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/dmtf_600x240.png 4.0 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/dmtf_600x240.png 4.0 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/dmtf_600x240_002.png 4.0 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/dmtf_600x240_002.png 4.0 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/dmtf_600x240_002.png 4.0 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/dmtf_600x240_002.png 4.0 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/dmtf_600x240.png 4.0 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/dmtf_600x240.png 4.0 KB
- USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/AW_PH_stacked.jpg 4.0 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/arbor_networks_150x42.png 3.9 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/arbor_networks_150x42.png 3.9 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/google_150x50_3.png 3.9 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/google_150x50_3_002.png 3.9 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/crc_press_150x60.png 3.8 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/crc_press_150x60.png 3.8 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/crc_press_150x60.png 3.8 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/crc_press_150x60.png 3.8 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/crc_press_150x60.png 3.8 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/crc_press_150x60.png 3.8 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/nostarch_600x240_1.png 3.8 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/nostarch_600x240_1.png 3.8 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/nostarch_600x240_1.png 3.8 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/nostarch_600x240_1.png 3.8 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/nostarch_600x240_1.png 3.8 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/nostarch_600x240_1.png 3.8 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/nostarch_600x240_1.png 3.8 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/nostarch_600x240_1.png 3.8 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/cmu_cert_150x73.png 3.8 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/cmu_cert_150x73_002.png 3.8 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/google_2016_150x60_0_002.png 3.8 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/google_2016_150x60_0.png 3.8 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/cowan_crispin.jpg 3.8 KB
- USENIX Security 2020/USENIX Security '20 USENIX_files/facebook_600x240_17.png 3.8 KB
- USENIX Security 2011/USENIX Security 2011 Proceedings Eratta.epub 3.8 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/chandra_pravir.jpg 3.8 KB
- USENIX Security 2017/USENIX Security 2017 USENIX_files/yubico_300x120_1.png 3.7 KB
- USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/sec20_wordmark_stacked_white.png 3.7 KB
- USENIX Security 2020/USENIX Security '20 USENIX_files/sec20_wordmark_stacked_white.png 3.7 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/oreilly_150x28_0_002.png 3.7 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/oreilly_150x28_0_002.png 3.7 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/oreilly_150x28_3_002.png 3.7 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/oreilly_150x28_3_002.png 3.7 KB
- USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css 3.7 KB
- USENIX Security 2017/USENIX Security 2017 USENIX_files/css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css 3.7 KB
- USENIX Security 2018/USENIX Security 2018 Program at a Glance USENIX_files/css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css 3.7 KB
- USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css 3.7 KB
- USENIX Security 2018/USENIX Security 2018 USENIX_files/css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css 3.7 KB
- USENIX Security 2019/USENIX Security 2019 Program at a Glance USENIX_files/css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css 3.7 KB
- USENIX Security 2019/USENIX Security 2019 USENIX_files/css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css 3.7 KB
- USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css 3.7 KB
- USENIX Security 2020/USENIX Security '20 USENIX_files/css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css 3.7 KB
- USENIX Security 2020/USENIX Security '20 USENIX_files/qc_600x240_1.png 3.7 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/hpcwire_150x55_0.png 3.7 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/hpcwire_150x55_0.png 3.7 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/hpcwire_150x55_0.png 3.7 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/hpcwire_150x55_0.png 3.7 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/hpcwire_150x55_0.png 3.7 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/hpcwire_150x55_0.png 3.7 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/microsoft_150x60_0_002.png 3.7 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/microsoft_150x60_0_002.png 3.7 KB
- USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/linux_gazette.gif 3.7 KB
- USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/linux_gazette_125x125.gif 3.7 KB
- USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/hns_125_50.jpg 3.7 KB
- USENIX Security 2018/USENIX Security 2018 Program at a Glance USENIX_files/sec18_wordmark_stacked_450x186.png 3.7 KB
- USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/sec18_wordmark_stacked_450x186.png 3.7 KB
- USENIX Security 2018/USENIX Security 2018 USENIX_files/sec18_wordmark_stacked_450x186_002.png 3.7 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/neustar_150x60_002.png 3.6 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/neustar_150x60.png 3.6 KB
- USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/nostarch_90x104.jpg 3.6 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/lxer_150x60_002.png 3.6 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/lxer_150x60.png 3.6 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/lxer_150x60_002.png 3.6 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/lxer_150x60_002.png 3.6 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/lxer_150x60_002.png 3.6 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/lxer_150x60_002.png 3.6 KB
- USENIX Security 2019/USENIX Security 2019 USENIX_files/kaspersky_600x240.png 3.6 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/admin_125x47_0.png 3.6 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/admin_125x47_0.png 3.6 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/oreilly_150x60_002.png 3.5 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/oreilly_150x60_002.png 3.5 KB
- USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/linux_journal_100x48.jpg 3.4 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/linux_pro_150x57_0.png 3.4 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/linux_pro_150x57_0.png 3.4 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/userfriendly_150x38_0.png 3.4 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/userfriendly_150x38_0.png 3.4 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/hakin9_en150x40.png 3.4 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/hakin9_en150x40.png 3.4 KB
- USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/google_140x58.gif 3.4 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/ibm-research.png 3.4 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/ibm-research.png 3.4 KB
- USENIX Security 2020/USENIX Security '20 USENIX_files/intel_600x240.png 3.3 KB
- USENIX Security 2019/USENIX Security 2019 USENIX_files/freebsd_foundation_600x240.png 3.3 KB
- USENIX Security 2020/USENIX Security '20 USENIX_files/freebsd_foundation_600x240.png 3.3 KB
- USENIX Security 2017/USENIX Security 2017 USENIX_files/freebsdfoundation_600x240_0.png 3.3 KB
- USENIX Security 2018/USENIX Security 2018 USENIX_files/freebsdfoundation_600x240_0.png 3.3 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/serverfault_150x35_0_002.png 3.3 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/serverfault_150x35_0_002.png 3.3 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/stack_exchange_150x37_0_002.png 3.3 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/stack_exchange_150x37_0_002.png 3.3 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/ibm_research_150x60_0_002.png 3.2 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/ibm_research_150x60_0_002.png 3.2 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/google_2016_150x60_0.png 3.2 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/google_2016_150x60_0_002.png 3.2 KB
- USENIX Security 2018/USENIX Security 2018 USENIX_files/dropbox_2018_600x240_0.png 3.2 KB
- USENIX Security 2019/USENIX Security 2019 USENIX_files/dropbox_2018_600x240_2.png 3.2 KB
- USENIX Security 2020/USENIX Security '20 USENIX_files/dropbox_2018_600x240_1_1.png 3.2 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/craigslist_150x35_1.png 3.2 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/craigslist_150x35_1.png 3.2 KB
- USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/ittoolbox.gif 3.2 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/computer_150x33_0_002.png 3.2 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/computer_150x33_0_002.png 3.2 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/all.js 3.1 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/all.js 3.1 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/all.js 3.1 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/all.js 3.1 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/all.js 3.1 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/all.js 3.1 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/all.js 3.1 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/all.js 3.1 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/all.js 3.1 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/all.js 3.1 KB
- USENIX Security 2017/USENIX Security 2017 USENIX_files/dmtf_600x240.png 3.1 KB
- USENIX Security 2018/USENIX Security 2018 USENIX_files/dmtf_600x240.png 3.1 KB
- USENIX Security 2020/USENIX Security '20 USENIX_files/dmtf_600x240.png 3.1 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/dcj_150x27_0.png 3.1 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/dcj_150x27_0.png 3.1 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/dcj_150x27_3.png 3.1 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/dcj_150x27_3.png 3.1 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/microsoft_research_150x42_2.png 3.1 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/microsoft_research_150x42_2.png 3.1 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/microsoft_research_150x42_2.png 3.1 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/microsoft_research_150x42_2.png 3.1 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/google_8_002.png 3.1 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/google_8_002.png 3.1 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/google_6.png 3.1 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/google_6.png 3.1 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/acmqueue_150x48_0.png 3.1 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/acmqueue_150x48_0.png 3.1 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/acmqueue_150x48_3_002.png 3.1 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/acmqueue_150x48_3_002.png 3.1 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/acmqueue_150x48_3_002.png 3.1 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/acmqueue_150x48_3_002.png 3.1 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/acmqueue_150x48_3.png 3.1 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/acmqueue_150x48_3.png 3.1 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/infosecnews_150x38.png 3.0 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/infosecnews_150x38.png 3.0 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/infosecnews_150x38.png 3.0 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/infosecnews_150x38.png 3.0 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/infosecnews_150x38.png 3.0 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/infosecnews_150x38.png 3.0 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/it_dev_150x39_002.png 3.0 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/it_dev_150x39_002.png 3.0 KB
- USENIX Security 2017/USENIX Security 2017 USENIX_files/baidu_150x60.png 3.0 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/Practical Symmetric Key Cryptography on Modern Graphics Hardware_files/img7.png 2.9 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/microsoft_600x240_0_002.png 2.9 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/microsoft_600x240_0_002.png 2.9 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/userfriendly_150x60.png 2.9 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/userfriendly_150x60.png 2.9 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/userfriendly_150x60.png 2.9 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/userfriendly_150x60_002.png 2.9 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/userfriendly_150x60.png 2.9 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/userfriendly_150x60.png 2.9 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/userfriendly_150x60.png 2.9 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/userfriendly_150x60.png 2.9 KB
- USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/toolbox_100x76.gif 2.9 KB
- USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/infosecnews.gif 2.9 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/virus_bulletin_150x60_002.png 2.9 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/virus_bulletin_150x60_002.png 2.9 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/virus_bulletin_150x60_002.png 2.9 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/virus_bulletin_150x60_002.png 2.9 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/virus_bulletin_150x60_002.png 2.9 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/virus_bulletin_150x60_002.png 2.9 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/virus_bulletin_150x60_002.png 2.9 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/virus_bulletin_150x60_002.png 2.9 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/qualcomm_150x22_002.png 2.9 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/qualcomm_150x22.png 2.9 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/qualcomm_150x22_002.png 2.9 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/qualcomm_150x22_002.png 2.9 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/linux_pro_150x60.png 2.9 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/linux_pro_150x60.png 2.9 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/linux_pro_150x60.png 2.9 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/linux_pro_150x60.png 2.9 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/linux_pro_150x60.png 2.9 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/linux_pro_150x60.png 2.9 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/linux_pro_150x60.png 2.9 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/linux_pro_150x60.png 2.9 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/facebook_2016_150x60_1.png 2.9 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/facebook_2016_150x60_1.png 2.9 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/cmu_cert_150x73_002.png 2.8 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/cmu_cert_150x73.png 2.8 KB
- USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/dr_dobbs.gif 2.8 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/ibm_research_150x60_0.png 2.8 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/ibm_research_150x60_0.png 2.8 KB
- USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/storage_networking.gif 2.7 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/bit_150x60_002.png 2.7 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/bit_150x60_002.png 2.7 KB
- USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/betanews.gif 2.7 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/akamai_150x62_002.png 2.7 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/akamai_150x62_002.png 2.7 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/microsoft_research_150x42_2_002.png 2.7 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/microsoft_research_150x42_2_002.png 2.7 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/microsoft_research_150x42_2_002.png 2.7 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/microsoft_research_150x42_2_002.png 2.7 KB
- USENIX Security 2017/USENIX Security 2017 USENIX_files/mars_horizontal_300x120.png 2.7 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/cisco_150x60_002.png 2.7 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/cisco_150x60_002.png 2.7 KB
- USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/userfriendly.gif 2.5 KB
- USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/user_friendly.gif 2.5 KB
- USENIX Security 2018/27th USENIX Security Symposium Grid_files/jquery_002.js 2.5 KB
- USENIX Security 2019/28th USENIX Security Symposium Grid_files/jquery_003.js 2.5 KB
- USENIX Security 2017/USENIX Security 2017 USENIX_files/nostarch_600x240_1.png 2.5 KB
- USENIX Security 2018/USENIX Security 2018 USENIX_files/nostarch_600x240_1.png 2.5 KB
- USENIX Security 2019/USENIX Security 2019 USENIX_files/nostarch_600x240_1.png 2.5 KB
- USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/hpc.gif 2.5 KB
- USENIX Security 2019/USENIX Security 2019 USENIX_files/ibm_research_600x240.png 2.5 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img155.png 2.5 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/microsoft_600x240_0.png 2.5 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/microsoft_600x240_0.png 2.5 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/dmtf_600x240_002.png 2.4 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/dmtf_600x240_002.png 2.4 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/dmtf_600x240.png 2.4 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/dmtf_600x240.png 2.4 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/dmtf_600x240.png 2.4 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/dmtf_600x240.png 2.4 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/dmtf_600x240_002.png 2.4 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/dmtf_600x240_002.png 2.4 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/acmqueue_600x240_1_002.png 2.4 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/acmqueue_600x240_1_002.png 2.4 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/oreilly_150x60.png 2.4 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/oreilly_150x60.png 2.4 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/oreilly_150x28_0.png 2.4 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/oreilly_150x28_0.png 2.4 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/oreilly_150x28_3.png 2.4 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/oreilly_150x28_3.png 2.4 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/facebook_2016_150x60_1_002.png 2.3 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/facebook_2016_150x60_1_002.png 2.3 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/serverfault_150x35_0.png 2.3 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/serverfault_150x35_0.png 2.3 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/microsoft_research_0_002.png 2.3 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/microsoft_research_0_002.png 2.3 KB
- USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/confguru_125x34.jpg 2.3 KB
- USENIX Security 2020/USENIX Security '20 USENIX_files/ibm_600x240_2.png 2.2 KB
- USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/microsoft.gif 2.2 KB
- USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/microsoft_research.gif 2.2 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img169.png 2.2 KB
- USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/bae_systems.gif 2.2 KB
- USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/bae_systems.gif 2.2 KB
- USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/ieee_security.gif 2.1 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/craigslist_150x35_1_002.png 2.1 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/craigslist_150x35_1_002.png 2.1 KB
- USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/meraki_logo_145x58.jpg 2.1 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/cisco_150x60.png 2.1 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/cisco_150x60.png 2.1 KB
- USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/ieee_security.gif 2.1 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img173.png 2.0 KB
- USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/fsm_125x36.gif 2.0 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img171.png 1.9 KB
- USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/betanews_125x23.jpg 1.9 KB
- USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/storagenetworking.gif 1.9 KB
- USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/acmqueue_new_100x32.jpg 1.9 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/ibm-research_002.png 1.9 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/ibm-research_002.png 1.9 KB
- USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/grid_today.gif 1.9 KB
- USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/barracuda.gif 1.8 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/qualcomm_150x22.png 1.8 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/qualcomm_150x22_002.png 1.8 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/qualcomm_150x22.png 1.8 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/qualcomm_150x22.png 1.8 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/in-icon.jpeg 1.8 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/in-icon.jpeg 1.8 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/in-icon.jpeg 1.8 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/in-icon.jpeg 1.8 KB
- USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/the_register.gif 1.8 KB
- USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/ists_logo.gif 1.7 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/fastbutton.htm 1.7 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/fastbutton.htm 1.7 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/fastbutton.htm 1.7 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/fastbutton.htm 1.7 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/fastbutton.htm 1.7 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/fastbutton.htm 1.7 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/fastbutton.htm 1.7 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/fastbutton.htm 1.7 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/fastbutton.htm 1.7 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/fastbutton.htm 1.7 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/twitter-icon.jpeg 1.7 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/twitter-icon.jpeg 1.7 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/twitter-icon.jpeg 1.7 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/twitter-icon.jpeg 1.7 KB
- USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/ibm_research_145x15.jpg 1.7 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/fastbutton_002.htm 1.7 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/fastbutton_002.htm 1.7 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/fastbutton_002.htm 1.7 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/fastbutton_002.htm 1.7 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/fastbutton_002.htm 1.7 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/fastbutton_002.htm 1.7 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/fastbutton_002.htm 1.7 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/fastbutton_002.htm 1.7 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/fastbutton_002.htm 1.7 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/fastbutton_002.htm 1.7 KB
- USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/ieee_sp_125x30.gif 1.7 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/youtube-icon.jpg 1.7 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/youtube-icon.jpg 1.7 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/youtube-icon.jpg 1.7 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/youtube-icon.jpg 1.7 KB
- USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/infosecnews_100x80.gif 1.6 KB
- USENIX Security 2011/USENIX Security 2011 Poster Session_files/left_bottom.gif 1.6 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/facebook-icon.jpeg 1.6 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/facebook-icon.jpeg 1.6 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/facebook-icon.jpeg 1.6 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/facebook-icon.jpeg 1.6 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/googleplus-icon.jpg 1.6 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/googleplus-icon.jpg 1.6 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/googleplus-icon.jpg 1.6 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/googleplus-icon.jpg 1.6 KB
- USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/linux_journal.gif 1.6 KB
- USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/linux_journal.gif 1.6 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img165.png 1.6 KB
- USENIX Security 2018/USENIX Security 2018 USENIX_files/eff_2018_red_600x240_1.png 1.6 KB
- USENIX Security 2019/USENIX Security 2019 USENIX_files/eff_2018_red_600x240_1.png 1.6 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img162.png 1.5 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/nostarch_600x240_1_002.png 1.5 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/nostarch_600x240_1_002.png 1.5 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/nostarch_600x240_1_002.png 1.5 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/nostarch_600x240_1_002.png 1.5 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/nostarch_600x240_1_002.png 1.5 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/nostarch_600x240_1_002.png 1.5 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/nostarch_600x240_1_002.png 1.5 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/nostarch_600x240_1_002.png 1.5 KB
- USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/DDJ.gif 1.5 KB
- USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/nostarch.gif 1.5 KB
- USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/nostarch.gif 1.5 KB
- USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/netwitness.gif 1.5 KB
- USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/hdj.gif 1.5 KB
- USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/fsm.gif 1.5 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css 1.4 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css 1.4 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css 1.4 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css 1.4 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css 1.4 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css 1.4 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css 1.4 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css 1.4 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css 1.4 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css 1.4 KB
- USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/queue.gif 1.4 KB
- USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/queue.gif 1.4 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js 1.4 KB
- USENIX Security 2012/USENIX Security 2012 USENIX_files/js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js 1.4 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js 1.4 KB
- USENIX Security 2013/USENIX Security 2013 USENIX_files/js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js 1.4 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js 1.4 KB
- USENIX Security 2014/USENIX Security 2014 USENIX_files/js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js 1.4 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js 1.4 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js 1.4 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js 1.4 KB
- USENIX Security 2016/USENIX Security 2016 USENIX_files/js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js 1.4 KB
- USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/aw_ph.gif 1.4 KB
- USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/microsoft_research_150.gif 1.4 KB
- USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/ibm_research.gif 1.4 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/video_16.png 1.4 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/video_16.png 1.4 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/video_16.png 1.4 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/video_16.png 1.4 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/video_16.png 1.4 KB
- USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/dmtf_logo_100.gif 1.4 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img151.png 1.4 KB
- USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/network_world_itr_125x27.gif 1.3 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/usenix-locked.png 1.3 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/usenix-locked.png 1.3 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/usenix-locked.png 1.3 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/usenix-locked.png 1.3 KB
- USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/usenix-locked.png 1.3 KB
- USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/usenix-locked.png 1.3 KB
- USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/usenix-locked.png 1.3 KB
- USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/ittoolbox.gif 1.3 KB
- USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/snia_logo.gif 1.3 KB
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/slides_16.png 1.3 KB
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/slides_16.png 1.3 KB
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/slides_16.png 1.3 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/slides_16.png 1.3 KB
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/slides_16.png 1.3 KB
- USENIX Security 2008/USENIX Security 2008 Technical Sessions_files/video_icon.gif 1.2 KB
- USENIX Security 2009/USENIX Security 2009 Technical Sessions_files/video_icon.gif 1.2 KB
- USENIX Security 2010/USENIX Security 2010 Technical Sessions_files/video_icon.gif 1.2 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img166.png 1.2 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img145.png 1.2 KB
- USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/AW_PH_stacked.gif 1.2 KB
- USENIX Security 2011/USENIX Security 2011 Poster Session_files/longbar.gif 1.2 KB
- USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/lxer.gif 1.2 KB
- USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/linuxpro_100x38.gif 1.2 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/Practical Symmetric Key Cryptography on Modern Graphics Hardware_files/img4.png 1.2 KB
- USENIX Security 2011/USENIX Security 2011 Poster Session_files/left_bar.gif 1.1 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img129.png 1.1 KB
- USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/userfriendly_125x26.gif 1.1 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/Practical Symmetric Key Cryptography on Modern Graphics Hardware_files/img3.png 1.1 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/Practical Symmetric Key Cryptography on Modern Graphics Hardware_files/img5.png 1.0 KB
- USENIX Security thank you.txt 1.0 KB
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/peerj_600x240.png 1.0 KB
- USENIX Security 2015/USENIX Security 2015 USENIX_files/peerj_600x240.png 1.0 KB
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/bkgs.css 1021 bytes
- USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/linuxpro.gif 1014 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img127.png 1008 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img27.png 992 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img58.png 987 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img144.png 961 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img49.png 951 bytes
- USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/lxer_80x28.gif 947 bytes
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/js_RGgtt0xyoog3aEbqA3PACaZnzIbopLWdKtKDjg0Ge54.js 937 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img128.png 903 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/Practical Symmetric Key Cryptography on Modern Graphics Hardware_files/usenix_layout_html.css 891 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img163.png 885 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img158.png 871 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img103.png 870 bytes
- USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/ciscopress.gif 863 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img119.png 849 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img146.png 846 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img142.png 845 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img70.png 824 bytes
- USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/video.svg 818 bytes
- USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/video.svg 818 bytes
- USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/video.svg 818 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img100.png 816 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img99.png 808 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img139.png 785 bytes
- USENIX Security 2008/USENIX Security 2008 Technical Sessions_files/mp3_icon.gif 777 bytes
- USENIX Security 2009/USENIX Security 2009 Technical Sessions_files/mp3_icon.gif 777 bytes
- USENIX Security 2010/USENIX Security 2010 Technical Sessions_files/mp3_icon.gif 777 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img57.png 773 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img40.png 770 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img174.png 770 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img47.png 755 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img56.png 749 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/Practical Symmetric Key Cryptography on Modern Graphics Hardware_files/img6.png 745 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img179.png 741 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img92.png 737 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img68.png 733 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img63.png 723 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img126.png 719 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img42.png 708 bytes
- USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/left_bottom.gif 705 bytes
- USENIX Security 2007/Presentations/Security 2007 Poster Session_files/left_bottom.gif 705 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img181.png 684 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img98.png 683 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img178.png 677 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img105.png 672 bytes
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/postmessageRelay.htm 659 bytes
- USENIX Security 2012/USENIX Security 2012 USENIX_files/postmessageRelay.htm 659 bytes
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/postmessageRelay.htm 659 bytes
- USENIX Security 2013/USENIX Security 2013 USENIX_files/postmessageRelay.htm 659 bytes
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/postmessageRelay.htm 659 bytes
- USENIX Security 2014/USENIX Security 2014 USENIX_files/postmessageRelay.htm 659 bytes
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/postmessageRelay.htm 659 bytes
- USENIX Security 2015/USENIX Security 2015 USENIX_files/postmessageRelay.htm 659 bytes
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/postmessageRelay.htm 659 bytes
- USENIX Security 2016/USENIX Security 2016 USENIX_files/postmessageRelay.htm 659 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img160.png 657 bytes
- USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/slides.svg 655 bytes
- USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/slides.svg 655 bytes
- USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/slides.svg 655 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img11.png 646 bytes
- USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/linux.gif 639 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img83.png 639 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img111.png 638 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img149.png 632 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera0x.png 628 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera3x.png 628 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img72.png 624 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img122.png 612 bytes
- USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/audio.svg 610 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img159.png 605 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img6.png 604 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img81.png 597 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img41.png 594 bytes
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/ibm-research_gs.png 588 bytes
- USENIX Security 2012/USENIX Security 2012 USENIX_files/ibm-research_gs.png 588 bytes
- USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/ciscopress.gif 578 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img180.png 569 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img120.png 565 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img66.png 556 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img73.png 547 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera2x.png 545 bytes
- USENIX Security 2015/USENIX Security 2015 USENIX_files/ie.css 543 bytes
- USENIX Security 2016/USENIX Security 2016 USENIX_files/ie.css 543 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img102.png 542 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img156.png 540 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img82.png 533 bytes
- USENIX Security 2010/USENIX Security 2010 Poster Session_files/left_bottom.gif 533 bytes
- USENIX Security 2010/USENIX Security 2010 Technical Sessions_files/left_bottom.gif 533 bytes
- USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/left_bottom.gif 531 bytes
- USENIX Security 2009/USENIX Security 2009 Technical Sessions_files/left_bottom.gif 531 bytes
- USENIX Security 2009/USENIX Security 2009 WiPs_files/left_bottom.gif 531 bytes
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/audio_16.png 531 bytes
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/audio_16.png 531 bytes
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/audio_16.png 531 bytes
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/audio_16.png 531 bytes
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/audio_16.png 531 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img23.png 518 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img134.png 518 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img36.png 517 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img37.png 512 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img121.png 505 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img104.png 501 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img106.png 495 bytes
- USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/pdf.svg 493 bytes
- USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/pdf.svg 493 bytes
- USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/pdf.svg 493 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img69.png 487 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img101.png 481 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img24.png 480 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera7x.png 464 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img38.png 460 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img175.png 458 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img22.png 457 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img43.png 448 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img123.png 444 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img60.png 432 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img5.png 430 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img7.png 425 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img168.png 424 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img108.png 423 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img109.png 419 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img124.png 418 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img172.png 415 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img14.png 414 bytes
- USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/left_bottom.gif 407 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/USENIX Security 2008 Poster Session_files/left_bottom.gif 407 bytes
- USENIX Security 2008/USENIX Security 2008 Technical Sessions_files/left_bottom.gif 407 bytes
- USENIX Security 2008/USENIX Security 2008 WiPs_files/left_bottom.gif 407 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img170.png 400 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img84.png 398 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img93.png 398 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img90.png 395 bytes
- USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/usenix_face.gif 374 bytes
- USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/usenix_face.gif 374 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img50.png 373 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img35.png 371 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img21.png 368 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img176.png 367 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img88.png 365 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img79.png 356 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img55.png 354 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img110.png 352 bytes
- USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/js_fyV0VVkC6Q3xduxGurKMTFIU2dMmArUrbAdZORL-9WQ.js 350 bytes
- USENIX Security 2020/USENIX Security '20 USENIX_files/js_fyV0VVkC6Q3xduxGurKMTFIU2dMmArUrbAdZORL-9WQ.js 350 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img96.png 348 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img133.png 348 bytes
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/conference-schedule-pdf.png 346 bytes
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/pdf_16.png 346 bytes
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/conference-schedule-pdf.png 346 bytes
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/pdf_16.png 346 bytes
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/application-pdf.png 346 bytes
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/pdf_16.png 346 bytes
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/application-pdf.png 346 bytes
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/conference-schedule-pdf.png 346 bytes
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/pdf_16.png 346 bytes
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/application-pdf.png 346 bytes
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/conference-schedule-pdf.png 346 bytes
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/pdf_16.png 346 bytes
- USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/application-pdf.png 346 bytes
- USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/application-pdf.png 346 bytes
- USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/application-pdf.png 346 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img28.png 345 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img54.png 345 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img97.png 345 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img112.png 335 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img161.png 322 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img182.png 320 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img153.png 311 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img148.png 306 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img113.png 305 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img115.png 305 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img137.png 305 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img154.png 304 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img95.png 302 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img143.png 302 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img34.png 297 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img53.png 297 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img147.png 297 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img140.png 294 bytes
- USENIX Security 2018/27th USENIX Security Symposium Grid_files/custom-screen.css 293 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img135.png 292 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img141.png 289 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img80.png 288 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img131.png 287 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img20.png 285 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img117.png 285 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img33.png 282 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img52.png 282 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img4.png 280 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img86.png 280 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img89.png 280 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img3.png 277 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img25.png 277 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img2.png 276 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img18.png 275 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img75.png 272 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img87.png 272 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img62.png 265 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img116.png 265 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img1.png 264 bytes
- USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/footer.gif 263 bytes
- USENIX Security 2007/Presentations/Security 2007 Poster Session_files/footer.gif 263 bytes
- USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/footer.gif 263 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/USENIX Security 2008 Poster Session_files/footer.gif 263 bytes
- USENIX Security 2008/USENIX Security 2008 Technical Sessions_files/footer.gif 263 bytes
- USENIX Security 2008/USENIX Security 2008 WiPs_files/footer.gif 263 bytes
- USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/footer.gif 263 bytes
- USENIX Security 2009/USENIX Security 2009 Technical Sessions_files/footer.gif 263 bytes
- USENIX Security 2009/USENIX Security 2009 WiPs_files/footer.gif 263 bytes
- USENIX Security 2010/USENIX Security 2010 Poster Session_files/footer.gif 263 bytes
- USENIX Security 2010/USENIX Security 2010 Technical Sessions_files/footer.gif 263 bytes
- USENIX Security 2011/USENIX Security 2011 Poster Session_files/footer.gif 263 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img32.png 261 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img71.png 261 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img64.png 260 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img65.png 260 bytes
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/package-x-generic.png 260 bytes
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/package-x-generic.png 260 bytes
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/package-x-generic.png 260 bytes
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/package-x-generic.png 260 bytes
- USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/package-x-generic.png 260 bytes
- USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/package-x-generic.png 260 bytes
- USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/package-x-generic.png 260 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img29.png 257 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img85.png 257 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img107.png 257 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img91.png 254 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img167.png 254 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img138.png 253 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img67.png 245 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img12.png 242 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img13.png 242 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img31.png 240 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img17.png 236 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img51.png 235 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img136.png 235 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img132.png 231 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img157.png 231 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img9.png 230 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img16.png 230 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img78.png 229 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/Practical Symmetric Key Cryptography on Modern Graphics Hardware_files/img1.png 228 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img26.png 228 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img152.png 228 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img74.png 226 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img150.png 225 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img48.png 224 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img77.png 221 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img8.png 220 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img15.png 220 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img45.png 219 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img164.png 215 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img44.png 212 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img39.png 211 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img61.png 208 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img19.png 206 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img30.png 206 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img114.png 206 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img76.png 201 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img118.png 195 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img130.png 189 bytes
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/application-octet-stream.png 189 bytes
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/application-octet-stream.png 189 bytes
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/application-octet-stream.png 189 bytes
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/application-octet-stream.png 189 bytes
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/application-octet-stream.png 189 bytes
- USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/application-octet-stream.png 189 bytes
- USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/application-octet-stream.png 189 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img46.png 182 bytes
- USENIX Security 2012/Technical Sessions 2012 USENIX_files/css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css 141 bytes
- USENIX Security 2012/USENIX Security 2012 USENIX_files/css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css 141 bytes
- USENIX Security 2013/Technical Sessions 2013 USENIX_files/css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css 141 bytes
- USENIX Security 2013/USENIX Security 2013 USENIX_files/css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css 141 bytes
- USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css 141 bytes
- USENIX Security 2014/USENIX Security 2014 USENIX_files/css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css 141 bytes
- USENIX Security 2015/Technical Sessions 2015 USENIX_files/css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css 141 bytes
- USENIX Security 2015/USENIX Security 2015 USENIX_files/css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css 141 bytes
- USENIX Security 2016/Technical Sessions 2016 USENIX_files/css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css 141 bytes
- USENIX Security 2016/USENIX Security 2016 USENIX_files/css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css 141 bytes
- USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/back_border.gif 140 bytes
- USENIX Security 2007/Presentations/Security 2007 Poster Session_files/back_border.gif 140 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/Practical Symmetric Key Cryptography on Modern Graphics Hardware_files/img2.png 138 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img125.png 128 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img10.png 124 bytes
- USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/long_bar.gif 113 bytes
- USENIX Security 2007/Presentations/Security 2007 Poster Session_files/long_bar.gif 113 bytes
- USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/questmark.gif 108 bytes
- USENIX Security 2007/Presentations/Security 2007 Poster Session_files/questmark.gif 108 bytes
- USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/questmark.gif 108 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/USENIX Security 2008 Poster Session_files/questmark.gif 108 bytes
- USENIX Security 2008/USENIX Security 2008 Technical Sessions_files/questmark.gif 108 bytes
- USENIX Security 2008/USENIX Security 2008 WiPs_files/questmark.gif 108 bytes
- USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/questmark.gif 108 bytes
- USENIX Security 2009/USENIX Security 2009 Technical Sessions_files/questmark.gif 108 bytes
- USENIX Security 2009/USENIX Security 2009 WiPs_files/questmark.gif 108 bytes
- USENIX Security 2010/USENIX Security 2010 Poster Session_files/questmark.gif 108 bytes
- USENIX Security 2010/USENIX Security 2010 Technical Sessions_files/questmark.gif 108 bytes
- USENIX Security 2011/USENIX Security 2011 Poster Session_files/questmark.gif 108 bytes
- USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/longbar.gif 106 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/USENIX Security 2008 Poster Session_files/longbar.gif 106 bytes
- USENIX Security 2008/USENIX Security 2008 Technical Sessions_files/longbar.gif 106 bytes
- USENIX Security 2008/USENIX Security 2008 WiPs_files/longbar.gif 106 bytes
- USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/longbar.gif 106 bytes
- USENIX Security 2009/USENIX Security 2009 Technical Sessions_files/longbar.gif 106 bytes
- USENIX Security 2009/USENIX Security 2009 WiPs_files/longbar.gif 106 bytes
- USENIX Security 2010/USENIX Security 2010 Poster Session_files/longbar.gif 106 bytes
- USENIX Security 2010/USENIX Security 2010 Technical Sessions_files/longbar.gif 106 bytes
- USENIX Security 2015/USENIX Security 2015 USENIX_files/sec15_media.htm 70 bytes
- USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/left_bar.gif 56 bytes
- USENIX Security 2007/Presentations/Security 2007 Poster Session_files/left_bar.gif 56 bytes
- USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/left_bar.gif 56 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/USENIX Security 2008 Poster Session_files/left_bar.gif 56 bytes
- USENIX Security 2008/USENIX Security 2008 Technical Sessions_files/left_bar.gif 56 bytes
- USENIX Security 2008/USENIX Security 2008 WiPs_files/left_bar.gif 56 bytes
- USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/left_bar.gif 56 bytes
- USENIX Security 2009/USENIX Security 2009 Technical Sessions_files/left_bar.gif 56 bytes
- USENIX Security 2009/USENIX Security 2009 WiPs_files/left_bar.gif 56 bytes
- USENIX Security 2010/USENIX Security 2010 Poster Session_files/left_bar.gif 56 bytes
- USENIX Security 2010/USENIX Security 2010 Technical Sessions_files/left_bar.gif 56 bytes
- USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/dot_clear.gif 43 bytes
- USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/dot_clear_002.gif 43 bytes
- USENIX Security 2007/Presentations/Security 2007 Poster Session_files/dot_clear.gif 43 bytes
- USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/dot_clear.gif 43 bytes
- USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/dot_clear_002.gif 43 bytes
- USENIX Security 2008/USENIX Security 2008 Presentations/USENIX Security 2008 Poster Session_files/dot_clear.gif 43 bytes
- USENIX Security 2008/USENIX Security 2008 Technical Sessions_files/dot_clear.gif 43 bytes
- USENIX Security 2008/USENIX Security 2008 WiPs_files/dot_clear.gif 43 bytes
- USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/dot_clear.gif 43 bytes
- USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/dot_clear_002.gif 43 bytes
- USENIX Security 2009/USENIX Security 2009 Technical Sessions_files/dot_clear.gif 43 bytes
- USENIX Security 2009/USENIX Security 2009 WiPs_files/dot_clear.gif 43 bytes
- USENIX Security 2010/USENIX Security 2010 Poster Session_files/dot_clear.gif 43 bytes
- USENIX Security 2010/USENIX Security 2010 Poster Session_files/dot_clear_002.gif 43 bytes
- USENIX Security 2010/USENIX Security 2010 Technical Sessions_files/dot_clear.gif 43 bytes
- USENIX Security 2010/USENIX Security 2010 Technical Sessions_files/dot_clear_002.gif 43 bytes
- USENIX Security 2011/USENIX Security 2011 Poster Session_files/dot_clear.gif 43 bytes
- USENIX Security 2011/USENIX Security 2011 Poster Session_files/dot_clear_002.gif 43 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.