IEEE Security and Privacy
File List
- IEEE Security and Privacy 2017/Securing Augmented Reality Output.84d6e03b-b9a3-43cb-99ad-5277a4f98362.part 179.0 MB
- IEEE Security and Privacy 2020/SSP 2020 Opening Remarks.mp4 95.6 MB
- IEEE Security and Privacy 2022/LangSec Keynote Trojan Source and Bad Characters Invisible Hacks and Reluctant Patching.mp4 64.1 MB
- IEEE Security and Privacy 2016/NITRD Panel - Federal Cybersecurity and Privacy R&D Strategic Plans.mp4 49.4 MB
- IEEE Security and Privacy 2022/IEEE S&P 2022 Opening Session.mp4 48.8 MB
- IEEE Security and Privacy 2019/IEEE S&P 2019 - TC Business Meeting.mp4 46.6 MB
- IEEE Security and Privacy 2019/IEEE S&P 2019 - 40th Celebration Plenary Session Panel Reflections on four decades of the symposium.mp4 45.6 MB
- IEEE Security and Privacy 2015/Missing the Point(er) - On the Effectiveness of Code Pointer Integrity.mp4 41.6 MB
- IEEE Security and Privacy 2022/Invisible Finger Practical Electromagnetic Interference Attack on Touchscreen Electronic Devices.mp4 41.4 MB
- IEEE Security and Privacy 2023/IEEE S&P 2023 Short Talks.mp4 40.0 MB
- IEEE Security and Privacy 2015/Cross-Architecture Bug Search in Binary Executables.mp4 39.9 MB
- IEEE Security and Privacy 2017/Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping.mp4 39.0 MB
- IEEE Security and Privacy 2015/Temporal Lensing and Its Application in Pulsing Denial-of-Service Attacks.mp4 38.8 MB
- IEEE Security and Privacy 2016/S&P TC Business Meeting.mp4 38.7 MB
- IEEE Security and Privacy 2017/SoK - Science, Security, and the Elusive Goal of Security as a Scientific Pursuit.mp4 37.7 MB
- IEEE Security and Privacy 2020/Birds of a Feather A Hardware & Security Panel (Updated).mp4 36.9 MB
- IEEE Security and Privacy 2015/Forward Secure Asynchronous Messaging from Puncturable Encryption.mp4 36.8 MB
- IEEE Security and Privacy 2015/High System-Code Security with Low Overhead.mp4 36.6 MB
- IEEE Security and Privacy 2015/Secure Track Verification.mp4 36.0 MB
- IEEE Security and Privacy 2017/Backward-bounded DSE - Targeting Infeasibility Questions on Obfuscated Codes.mp4 35.1 MB
- IEEE Security and Privacy 2015/SurroundWeb - Mitigating Privacy Concerns in a 3D Web Browser.mp4 34.2 MB
- IEEE Security and Privacy 2019/Hard Drive of Hearing Disks that Eavesdrop with a Synthesized Microphone.mp4 34.2 MB
- IEEE Security and Privacy 2015/Riposte - An Anonymous Messaging System Handling Millions of Users.mp4 34.0 MB
- IEEE Security and Privacy 2015/The Attack of the Clones - A Study of the Impact of Shared Code on Vulnerability Patching.mp4 34.0 MB
- IEEE Security and Privacy 2017/VUDDY - A Scalable Approach for Vulnerable Code Clone Discovery.mp4 33.9 MB
- IEEE Security and Privacy 2015/GenoGuard - Protecting Genomic Data against Brute-Force Attacks.mp4 33.8 MB
- IEEE Security and Privacy 2017/SmarPer - Context-Aware and Automatic Runtime-Permissions for Mobile Devices - YouTube.mp4 33.4 MB
- IEEE Security and Privacy 2017/IKP - Turning a PKI Around with Decentralized Automated Incentives.mp4 33.1 MB
- IEEE Security and Privacy 2015/S$A - A Shared Cache Attack That Works across Cores and Defies VM Sandboxing ....mp4 32.9 MB
- IEEE Security and Privacy 2015/ADSNARK - Nearly Practical and Privacy-Preserving Proofs on Authenticated Data.mp4 32.7 MB
- IEEE Security and Privacy 2017/SymCerts - Practical Symbolic Execution For Exposing Noncompliance in X.509 Certificate Validation.mp4 32.7 MB
- IEEE Security and Privacy 2015/On Subnormal Floating Point and Abnormal Timing.mp4 32.6 MB
- IEEE Security and Privacy 2022/Security Foundations for Application-Based Covert Communication Channels.mp4 32.5 MB
- IEEE Security and Privacy 2015/SoK - Research Perspectives and Challenges for Bitcoin and Cryptocurrencies.mp4 32.2 MB
- IEEE Security and Privacy 2017/Cloak and Dagger - From Two Permissions to Complete Control of the UI Feedback Loop.mp4 31.8 MB
- IEEE Security and Privacy 2022/SwarmFlawFinder Discovering and Exploiting Logic Flaws of Swarm Algorithms.mp4 31.8 MB
- IEEE Security and Privacy 2019/Drones' Cryptanalysis - Detecting Privacy Invasion Attacks Conducted by Drone.mp4 31.8 MB
- IEEE Security and Privacy 2019/LBM A Security Framework for Peripherals within the Linux Kernel.mp4 31.7 MB
- IEEE Security and Privacy 2022/TASHAROK-Using Mechanism Design for Enhancing Security Resource Allocation in Interdependent Systems.mp4 31.7 MB
- IEEE Security and Privacy 2015/What the App is That Deception and Countermeasures in the Android User Interface.mp4 31.7 MB
- IEEE Security and Privacy 2017/Is Interaction Necessary for Distributed Private Learning.mp4 31.3 MB
- IEEE Security and Privacy 2015/Counterfeit Object-oriented Programming.mp4 31.2 MB
- IEEE Security and Privacy 2015/Security of the J-PAKE Password-Authenticated Key Exchange Protocol.mp4 31.1 MB
- IEEE Security and Privacy 2015/Understanding and Monitoring Embedded Web Scripts.mp4 30.9 MB
- IEEE Security and Privacy 2015/Micro-Policies - Formally Verified, Tag-Based Security Monitors.mp4 30.8 MB
- IEEE Security and Privacy 2017/HVLearn - Automated Black-box Analysis of Hostname Verification in SSL TLS Implementations.mp4 30.7 MB
- IEEE Security and Privacy 2017/Scalable Bias-Resistant Distributed Randomness.mp4 30.7 MB
- IEEE Security and Privacy 2015/SoK - Deep Packer Inspection - A Longitudinal Study of the Complexity of Run-Time Packers.mp4 30.3 MB
- IEEE Security and Privacy 2015/Towards Making Systems Forget with Machine Unlearning.mp4 30.3 MB
- IEEE Security and Privacy 2017/Hijacking Bitcoin - Routing Attacks on Cryptocurrencies.mp4 30.2 MB
- IEEE Security and Privacy 2017/Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate.mp4 30.2 MB
- IEEE Security and Privacy 2019/ProFuzzer On-the-fly Input Type Probing for Better Zero-day Vulnerability Discovery.mp4 30.1 MB
- IEEE Security and Privacy 2017/SysPal System-guided Pattern Locks for Android.mp4 30.0 MB
- IEEE Security and Privacy 2015/Readactor - Practical Code Randomization Resilient to Memory Disclosure.mp4 29.9 MB
- IEEE Security and Privacy 2017/Protecting Bare-metal Embedded Systems with Privilege Overlays.mp4 29.9 MB
- IEEE Security and Privacy 2019/Formally Verified Cryptographic Web Applications in WebAssembly.mp4 29.7 MB
- IEEE Security and Privacy 2017/vSQL - Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases.mp4 29.6 MB
- IEEE Security and Privacy 2019/Dominance as a New Trusted Computing Primitive for the IoT.mp4 29.4 MB
- IEEE Security and Privacy 2017/A Lustrum of Malware Network Communication - Evolution and Insights.mp4 29.3 MB
- IEEE Security and Privacy 2022/Practical EMV Relay Protection.mp4 29.2 MB
- IEEE Security and Privacy 2017/Optimized Honest-Majority MPC for Malicious Adversaries - Breaking 1 Billion-Gate Second Barrier.mp4 29.1 MB
- IEEE Security and Privacy 2017/SoK - Cryptographically Protected Database Search.mp4 29.0 MB
- IEEE Security and Privacy 2019/SensorID Sensor Calibration Fingerprinting for Smartphones.mp4 29.0 MB
- IEEE Security and Privacy 2019/Why Does Your Data Leak Uncovering the Data Leakage in Cloud from Mobile Apps.mp4 28.9 MB
- IEEE Security and Privacy 2018/A Machine Learning Approach to Prevent Malicious Calls Over Telephony Networks.mp4 28.9 MB
- IEEE Security and Privacy 2019/If HTTPS Were Secure I wouldn't Need 2FA End User and Administrator Mental Models of HTTPS.mp4 28.8 MB
- IEEE Security and Privacy 2019/Dangerous Skills Understanding and Mitigating Security Risks of Voice-Controlled Third-Party....mp4 28.8 MB
- IEEE Security and Privacy 2019/Breaking LTE on Layer Two.mp4 28.8 MB
- IEEE Security and Privacy 2019/Security of GPS INS based On-road Location Tracking Systems.mp4 28.7 MB
- IEEE Security and Privacy 2017/A Framework for Universally Composable Diffie-Hellman Key Exchange.mp4 28.7 MB
- IEEE Security and Privacy 2015/CHERI - A Hybrid Capability-System Architecture for Scalable Software Compartmentalization.mp4 28.7 MB
- IEEE Security and Privacy 2018/Routing Around Congestion - Defeating DDoS Attacks and Adverse Network Conditions via Reactive....mp4 28.6 MB
- IEEE Security and Privacy 2017/CRLite - A Scalable System for Pushing All TLS Revocations to All Browsers.mp4 28.6 MB
- IEEE Security and Privacy 2022/Peekaboo A Hub-Based Approach to Enable Transparency in Data Processing within Smart Homes.mp4 28.6 MB
- IEEE Security and Privacy 2015/A Messy State of the Union - Taming the Composite State Machines of TLS.mp4 28.6 MB
- IEEE Security and Privacy 2017/Hardening Java's Access Control by Abolishing Implicit Privilege Elevation.mp4 28.5 MB
- IEEE Security and Privacy 2015/Malicious-Client Security in Blind Seer - A Scalable Private DBMS.mp4 28.5 MB
- IEEE Security and Privacy 2019/New Primitives for Actively-Secure MPC over Rings with Applications to Private Machine Learning.mp4 28.5 MB
- IEEE Security and Privacy 2015/Bitcoin over Tor isn't a Good Idea.mp4 28.5 MB
- IEEE Security and Privacy 2022/Practical Asynchronous Distributed Key Generation.mp4 28.5 MB
- IEEE Security and Privacy 2015/Every Second Counts - Quantifying the Negative Externalities of Cybercrime via Typosquatting.mp4 28.4 MB
- IEEE Security and Privacy 2015/Post-Quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors Problem.mp4 28.3 MB
- IEEE Security and Privacy 2019/Learning to Reconstruct Statistical Learning Theory and Encrypted Database Attacks.mp4 28.3 MB
- IEEE Security and Privacy 2015/Program-Adaptive Mutational Fuzzing.mp4 28.3 MB
- IEEE Security and Privacy 2017/Identifying Personal DNA Methylation Profiles by Genotype Inference.mp4 28.3 MB
- IEEE Security and Privacy 2017/Implementing and Proving the TLS 1.3 Record Layer.mp4 28.2 MB
- IEEE Security and Privacy 2017/Side-Channel Attacks on Shared Search Indexes.mp4 28.0 MB
- IEEE Security and Privacy 2022/SoK The Dual Nature of Technology in Sexual Assault.mp4 28.0 MB
- IEEE Security and Privacy 2017/XHOUND - Quantifying the Fingerprintability of Browser Extensions.mp4 28.0 MB
- IEEE Security and Privacy 2017/Norax - Enabling Execute-Only Memory for COTS Binaries on AArch64.mp4 28.0 MB
- IEEE Security and Privacy 2017/From Trash to Treasure - Timing-Sensitive Garbage Collection.mp4 27.9 MB
- IEEE Security and Privacy 2022/IRShield A Countermeasure Against Adversarial Physical-Layer Wireless Sensing.mp4 27.9 MB
- IEEE Security and Privacy 2019/Data Recovery on Encrypted Databases with k-Nearest Neighbor Query Leakage.mp4 27.9 MB
- IEEE Security and Privacy 2015/Virtual Proofs of Reality and their Physical Implementation.mp4 27.7 MB
- IEEE Security and Privacy 2019/How Well Do My Results Generalize Comparing Security and Privacy Survey Results from....mp4 27.7 MB
- IEEE Security and Privacy 2019/SoK General Purpose Frameworks for Secure Multi-Party Computation.mp4 27.6 MB
- IEEE Security and Privacy 2015/Caelus - Verifying the Consistency of Cloud Services with Battery-Powered Devices.mp4 27.6 MB
- IEEE Security and Privacy 2019/SoK Shining Light on Shadow Stacks.mp4 27.6 MB
- IEEE Security and Privacy 2019/Differentially Private Model Publishing For Deep Learning.mp4 27.5 MB
- IEEE Security and Privacy 2017/Counter-RAPTOR - Safeguarding Tor Against Active Routing Attacks.mp4 27.5 MB
- IEEE Security and Privacy 2015/ObliVM - A Programming Framework for Secure Computation.mp4 27.5 MB
- IEEE Security and Privacy 2018/A Formal Treatment of Accountable Proxying over TLS.mp4 27.4 MB
- IEEE Security and Privacy 2017/How They Did It - An Analysis of Emission Defeat Devices in Modern Automobiles.mp4 27.4 MB
- IEEE Security and Privacy 2017/One TPM to Bind Them All - Fixing TPM2.0 for Provably Secure Anonymous Attestation.mp4 27.3 MB
- IEEE Security and Privacy 2019/SoK Sanitizing for Security Dokyung Song.mp4 27.3 MB
- IEEE Security and Privacy 2022/Delay Wreaks Havoc on Your Smart Home Delay-based Automation Interference Attacks.mp4 27.3 MB
- IEEE Security and Privacy 2018/On the Economics of Offline Password Cracking.mp4 27.2 MB
- IEEE Security and Privacy 2020/Birds of a Feather A Hardware & Security Panel (Deprecated).mp4 27.2 MB
- IEEE Security and Privacy 2018/The Cards Aren't Alright - Detecting Counterfeit Gift Cards Using Encoding Jitter.mp4 27.1 MB
- IEEE Security and Privacy 2019/Touching the Untouchables Dynamic Security Analysis of the LTE Control Plane.mp4 27.1 MB
- IEEE Security and Privacy 2022/How Does Usable Security Not End Up in Software Products Results From a Qualitative Interview Study.mp4 27.1 MB
- IEEE Security and Privacy 2019/Synesthesia Detecting Screen Content via Remote Acoustic Side Channels.mp4 27.1 MB
- IEEE Security and Privacy 2015/Effective Real-Time Android Application Auditing.mp4 27.1 MB
- IEEE Security and Privacy 2017/Pyramid - Enhancing Selectivity in Big Data Protection with Count Featurization.mp4 27.0 MB
- IEEE Security and Privacy 2018/Another Flip in the Wall of Rowhammer Defenses.mp4 27.0 MB
- IEEE Security and Privacy 2018/Blue Note - How Intentional Acoustic Interference Damages Availablity and Integrity -.mp4 27.0 MB
- IEEE Security and Privacy 2015/Using Hardware Features for Increased Debugging Transparency.mp4 26.9 MB
- IEEE Security and Privacy 2015/How Secure and Quick is QUIC Provable Security and Performance Analyses.mp4 26.9 MB
- IEEE Security and Privacy 2017/Finding and Preventing Bugs in JavaScript Bindings.mp4 26.8 MB
- IEEE Security and Privacy 2022/They're not that hard to mitigate -What Cryptographic Library Developers Think About Timing Attacks.mp4 26.8 MB
- IEEE Security and Privacy 2015/Connection-Oriented DNS to Improve Privacy and Security.mp4 26.6 MB
- IEEE Security and Privacy 2022/Anti-Tamper Radio System-Level Tamper Detection for Computing Systems.mp4 26.6 MB
- IEEE Security and Privacy 2017/IoT Goes Nuclear - Creating a Zigbee Chain Reaction.mp4 26.5 MB
- IEEE Security and Privacy 2018/Enabling Autonomous IoT Device Pairing using Different Sensor Types.mp4 26.3 MB
- IEEE Security and Privacy 2015/Securing Multiparty Online Services Via Certification of Symbolic Transactions.mp4 26.2 MB
- IEEE Security and Privacy 2017/NEZHA - Efficient Domain-independent Differential Testing.mp4 26.2 MB
- IEEE Security and Privacy 2019/Comprehensive Privacy Analysis of Deep Learning.mp4 26.2 MB
- IEEE Security and Privacy 2017/Leakage-Abuse Attacks on Order-Revealing Encryption.mp4 26.2 MB
- IEEE Security and Privacy 2022/Noise A Library of Verified High-Performance Secure Channel Protocol Implementations.mp4 26.1 MB
- IEEE Security and Privacy 2019/The Code That Never Ran Modeling Attacks on Speculative Evaluation.mp4 26.0 MB
- IEEE Security and Privacy 2022/Domains Do Change Their Spots Quantifying Potential Abuse of Residual Trust.mp4 26.0 MB
- IEEE Security and Privacy 2022/Evaluating Physical-Layer BLE Location Tracking Attacks on Mobile Devices.mp4 25.9 MB
- IEEE Security and Privacy 2018/Angora - Efficient Fuzzing by Principled Search.mp4 25.9 MB
- IEEE Security and Privacy 2015/Vetting SSL Usage in Applications with SSLINT.mp4 25.9 MB
- IEEE Security and Privacy 2019/Asm2Vec Boosting Static Representation Robustness for Binary Clone Search....mp4 25.8 MB
- IEEE Security and Privacy 2018/When Your Fitness Tracker Betrays You - Quantifying the Predictability....mp4 25.8 MB
- IEEE Security and Privacy 2017/To Catch a Ratter - Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild.mp4 25.6 MB
- IEEE Security and Privacy 2018/EyeTell - Video-Assisted Touchscreen Keystroke Inference from Eye Movements.mp4 25.6 MB
- IEEE Security and Privacy 2022/Investigating Influencer VPN Ads on YouTube.mp4 25.6 MB
- IEEE Security and Privacy 2018/Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels.mp4 25.5 MB
- IEEE Security and Privacy 2019/Characterizing Pixel Tracking through the Lens of Disposable Email Services.mp4 25.4 MB
- IEEE Security and Privacy 2019/SoK Security Evaluation of Home Based IoT Deployment.mp4 25.4 MB
- IEEE Security and Privacy 2022/HardLog Practical Tamper-Proof System Auditing Using a Novel Audit Device.mp4 25.3 MB
- IEEE Security and Privacy 2019/Simple High-Level Code for Cryptographic Arithmetic - With Proofs, Without Compromises.mp4 25.3 MB
- IEEE Security and Privacy 2022/SoK Unifying and Applying At-Risk User Research.mp4 25.2 MB
- IEEE Security and Privacy 2015/VC3 - Trustworthy Data Analytics in the Cloud Using SGX.mp4 25.2 MB
- IEEE Security and Privacy 2017/Stack Overflow Considered Harmful -- The Impact of Copy&Paste on Android Application Security.mp4 25.1 MB
- IEEE Security and Privacy 2018/Distance-Bounding Protocols - Verification without Time and Location.mp4 25.1 MB
- IEEE Security and Privacy 2018/FuturesMEX - Secure, Distributed Futures Market Exchange.mp4 25.1 MB
- IEEE Security and Privacy 2017/Securing Augmented Reality Output.mp4 25.0 MB
- IEEE Security and Privacy 2018/Tracking Ransomware End-to-end.mp4 25.0 MB
- IEEE Security and Privacy 2019/Using Safety Properties to Generate Vulnerability Patches.mp4 25.0 MB
- IEEE Security and Privacy 2019/The 9 Lives of Bleichenbachers CAT New Cache ATtacks on TLS Implementations.mp4 25.0 MB
- IEEE Security and Privacy 2015/Protecting Private Keys against Memory Disclosure Attacks Using Hardware Transactional Memory.mp4 24.9 MB
- IEEE Security and Privacy 2022/A Formal Security Analysis of the W3C Web Payment APIs Attacks and Verification.mp4 24.9 MB
- IEEE Security and Privacy 2018/Hackers vs. Testers - A Comparison of Software Vulnerability Discovery Processes.mp4 24.8 MB
- IEEE Security and Privacy 2019/Spectre Attacks Exploiting Speculative Execution.mp4 24.8 MB
- IEEE Security and Privacy 2018/PIR with Compressed Queries and Amortized Query Processing.mp4 24.8 MB
- IEEE Security and Privacy 2023/Examining Zero-Shot Vulnerability Repair with Large Language Models.mp4 24.7 MB
- IEEE Security and Privacy 2022/Measuring and Mitigating the Risk of IP Reuse on Public Clouds.mp4 24.7 MB
- IEEE Security and Privacy 2019/Stealthy Porn Understanding Real World Adversarial Images for I'llicit Online Promotion.mp4 24.6 MB
- IEEE Security and Privacy 2018/On Enforcing the Digital Immunity of a Large Humanitarian Organization.mp4 24.6 MB
- IEEE Security and Privacy 2015/The Miner's Dilemma.mp4 24.5 MB
- IEEE Security and Privacy 2018/Towards Security and Privacy for Multi User Augmented Reality.mp4 24.4 MB
- IEEE Security and Privacy 2019/Threshold ECDSA from ECDSA Assumptions The Multiparty Case.mp4 24.4 MB
- IEEE Security and Privacy 2018/Double-efficient zkSNARKs Without Trusted Setup.mp4 24.4 MB
- IEEE Security and Privacy 2017/CoSMeDis - A Distributed Social Media Platform with Formally Verified Confidentiality Guarantees.mp4 24.4 MB
- IEEE Security and Privacy 2018/Static Evaluation of Noninterference using Approximate Model Counting.mp4 24.4 MB
- IEEE Security and Privacy 2019/Postcards from the Post HTTP World Amplification of HTTPS Vulnerabilities in the Web Ecosystem.mp4 24.3 MB
- IEEE Security and Privacy 2019/Reasoning Analytically About Password Cracking Software Alex Liu.mp4 24.3 MB
- IEEE Security and Privacy 2018/vRAM - Faster Verifiable RAM With Program-Independent Preprocessing.mp4 24.3 MB
- IEEE Security and Privacy 2018/Study and Mitigation of Origin Stripping Vulnerabilities in Hybrid-postMessage Enabled Mobile Apps.mp4 24.3 MB
- IEEE Security and Privacy 2017/Comparing the Usability of Cryptographic APIs.mp4 24.2 MB
- IEEE Security and Privacy 2017/An Experimental Security Analysis of an Industrial Robot Controller.mp4 24.2 MB
- IEEE Security and Privacy 2018/Compiler-assisted Code Randomization.mp4 24.1 MB
- IEEE Security and Privacy 2015/A Generic Approach to Automatic Deobfuscation of Executable Code.mp4 24.1 MB
- IEEE Security and Privacy 2022/RT-TEE Real-time System Availability for Cyber-physical Systems using ARM TrustZone.mp4 24.1 MB
- IEEE Security and Privacy 2018/The Rise of the Citizen Developer - Assessing the Security Impact of Online App Generators.mp4 24.1 MB
- IEEE Security and Privacy 2016/Algorithmic Transparency via Quantitative Input Influence ....mp4 24.1 MB
- IEEE Security and Privacy 2017/Verifying and Synthesizing Constant-Resource Implementations with Types.mp4 24.0 MB
- IEEE Security and Privacy 2015/Last-Level Cache Side-Channel Attacks are Practical.mp4 24.0 MB
- IEEE Security and Privacy 2022/Desperate Times Call for Desperate Measures - User Concerns with Mobile Loan Apps in Kenya.mp4 24.0 MB
- IEEE Security and Privacy 2022/Asleep at the Keyboard Assessing the Security of GitHub Copilot's Code Contributions.mp4 23.9 MB
- IEEE Security and Privacy 2019/Attack Directories, Not Caches Side Channel Attacks in a Non Inclusive World.mp4 23.9 MB
- IEEE Security and Privacy 2019/Towards Practical Differentialy Private Convex Optimization.mp4 23.9 MB
- IEEE Security and Privacy 2017/IVD - Automatic Learning and Enforcement of Authorization Rules in Online Social Networks - YouTube.mp4 23.8 MB
- IEEE Security and Privacy 2023/Discop Provably Secure Steganography in Practice Based on Distribution Copies.mp4 23.8 MB
- IEEE Security and Privacy 2017/Augur - Internet-Wide Detection of Connectivity Disruptions.mp4 23.8 MB
- IEEE Security and Privacy 2018/xJsnark - A Framework for Efficient Verifiable Computation.mp4 23.7 MB
- IEEE Security and Privacy 2018/Protecting the Stack with Metadata Policies and Tagged Hardware.mp4 23.6 MB
- IEEE Security and Privacy 2015/GraphSC - Parallel Secure Computation Made Easy.mp4 23.5 MB
- IEEE Security and Privacy 2022/K-Scheduler Effective Seed Scheduling for Fuzzing with Graph Centrality Analysis.mp4 23.5 MB
- IEEE Security and Privacy 2022/Mitigating Information Leakage Vulnerabilities with Type-based Data Isolation.mp4 23.5 MB
- IEEE Security and Privacy 2019/Iodine Fast Dynamic Tain't Tracking Using Rollback free Optimistic Hybrid Analysis.mp4 23.5 MB
- IEEE Security and Privacy 2015/Privacy and Access Control for Outsourced Personal Records.mp4 23.5 MB
- IEEE Security and Privacy 2018/Bulletproofs - Short Proofs for Confidential Transactions and More.mp4 23.4 MB
- IEEE Security and Privacy 2019/True2F Backdoor resistant authentication tokens Emma Dauterman.mp4 23.4 MB
- IEEE Security and Privacy 2015/TinyGarble - Highly Compressed and Scalable Sequential Garbled Circuits.mp4 23.3 MB
- IEEE Security and Privacy 2022/ShadeWatcher Recommendation-guided Cyber Threat Analysis using System Audit Records.mp4 23.3 MB
- IEEE Security and Privacy 2018/Enumerating Active IPv6 Hosts for Large-scale Security Scans via DNSSEC-signed Reverse Zones.mp4 23.3 MB
- IEEE Security and Privacy 2015/Geppetto - Versatile Verifiable Computation.mp4 23.2 MB
- IEEE Security and Privacy 2019/Does Certificate Transparency Break the Web Measuring Adoption and Error Rate.mp4 23.2 MB
- IEEE Security and Privacy 2022/A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols.mp4 23.2 MB
- IEEE Security and Privacy 2019/KHyperLogLog Estimating Reidentifiability and Joinability of Large Data at Scale Pern Hui Chia.mp4 23.2 MB
- IEEE Security and Privacy 2019/Beyond Credential Stuffing Password Similarity Models using Neural Networks.mp4 23.2 MB
- IEEE Security and Privacy 2022/SIRAJ A Unified Framework for Aggregation of Malicious Entity Detectors.mp4 23.1 MB
- IEEE Security and Privacy 2016/A2 - Analog Malicious Hardware.mp4 23.0 MB
- IEEE Security and Privacy 2018/Mobile Application Web API Reconnaissance.mp4 22.9 MB
- IEEE Security and Privacy 2019/Should I Worry A Cross Cultural Examination of Account Security Incident Response.mp4 22.9 MB
- IEEE Security and Privacy 2019/Exploiting Correcting Codes On the Effectiveness of ECC Memory Against Rowhammer Attacks.mp4 22.9 MB
- IEEE Security and Privacy 2023/SCAPHY Detecting Modern ICS Attacks by Correlating Behaviors in SCADA and PHYsical.mp4 22.8 MB
- IEEE Security and Privacy 2016/CaSE - Cache-Assisted Secure Execution on ARM Processors.mp4 22.7 MB
- IEEE Security and Privacy 2019/NEUZZ Efficient Fuzzing with Neural Program Smoothing.mp4 22.7 MB
- IEEE Security and Privacy 2018/Sonar - Detecting SS7 Redirection Attacks With Audio-Based Distance Bounding.mp4 22.7 MB
- IEEE Security and Privacy 2017/Towards Evaluating the Robustness of Neural Networks.mp4 22.7 MB
- IEEE Security and Privacy 2018/Learning from Mutants - Using Code Mutation to Learn and Monitor Invariants of a CPS.mp4 22.7 MB
- IEEE Security and Privacy 2022/Heapster Analyzing the Security of Dynamic Allocators for Monolithic Firmware Images.mp4 22.7 MB
- IEEE Security and Privacy 2019/CaSym Cache Aware Symbolic Execution for Side Channel Detection and Mitigation.mp4 22.6 MB
- IEEE Security and Privacy 2018/Speechless - Analyzing the Threat to Speech Privacy from Smartphone Motion Sensors.mp4 22.6 MB
- IEEE Security and Privacy 2017/SecureML - A System for Scalable Privacy-Preserving Machine Learning.mp4 22.5 MB
- IEEE Security and Privacy 2022/Privacy-from-Birth Protecting Sensed Data from Malicious Sensors with VERSA.mp4 22.5 MB
- IEEE Security and Privacy 2022/Exposed Infrastructures-Discovery, Attacks and Remediation of Insecure ICS Remote Management Devices.mp4 22.5 MB
- IEEE Security and Privacy 2018/Manipulating Machine Learning - Poisoning Attacks & Countermeasures.mp4 22.5 MB
- IEEE Security and Privacy 2018/Implementing Conjunction Obfuscation under Entropic Ring LWE.mp4 22.5 MB
- IEEE Security and Privacy 2022/Sphinx Enabling Privacy-Preserving Online Learning over the Cloud.mp4 22.4 MB
- IEEE Security and Privacy 2018/EnclaveDB - A Secure Database using SGX.mp4 22.4 MB
- IEEE Security and Privacy 2019/Ouroboros Crypsinous Privacy Preserving Proof of Stake.mp4 22.4 MB
- IEEE Security and Privacy 2019/An Extensive Formal Security Analysis of the OpenID Financial grade API Pedram Hosseyni.mp4 22.4 MB
- IEEE Security and Privacy 2017/Multi-touch Authentication Using Hand Geometry and Behavioral Information.mp4 22.3 MB
- IEEE Security and Privacy 2017/Catena - Efficient Non-equivocation via Bitcoin.mp4 22.3 MB
- IEEE Security and Privacy 2018/OmniLedger - A Secure, Scale-Out, Decentralized Ledger via Sharding.mp4 22.3 MB
- IEEE Security and Privacy 2017/SoK - Exploiting Network Printers.mp4 22.2 MB
- IEEE Security and Privacy 2022/vSGX Virtualizing SGX Enclaves on AMD SEV.mp4 22.2 MB
- IEEE Security and Privacy 2020/Birds of a Feather Sharing Cybersecurity Research Artifacts To Accelerate Progress.mp4 22.1 MB
- IEEE Security and Privacy 2017/Machine-Checked Proofs of Privacy for Electronic Voting Protocols.mp4 22.1 MB
- IEEE Security and Privacy 2016/Keeping Authorities - Honest or Bust - with Decentralized Witness Cosigning.mp4 22.1 MB
- IEEE Security and Privacy 2019/PhishFarm A Scalable Framework for Measuring the Effectivness of Evasion Techniques Against....mp4 22.1 MB
- IEEE Security and Privacy 2023/Confident Monte Carlo Rigorous Analysis of Guessing Curves for Probabilistic Password Models.mp4 22.1 MB
- IEEE Security and Privacy 2018/Racing in Hyperspace - Closing Hyper Threading Side Channels on SGX.mp4 22.0 MB
- IEEE Security and Privacy 2018/Computer Security and Privacy for Refugees in the United States.mp4 22.0 MB
- IEEE Security and Privacy 2022/Deployment of Source Address Validation by Network Operators A Randomized Control Trial.mp4 22.0 MB
- IEEE Security and Privacy 2020/Intriguing Properties of Adversarial ML Attacks in the Problem Space.mp4 21.9 MB
- IEEE Security and Privacy 2023/Certifiably Robust Object Detection against Patch Hiding Attacks via Patch-agnostic Masking.mp4 21.9 MB
- IEEE Security and Privacy 2022/FuzzUSB Hybrid Stateful Fuzzing of USB Gadget Stacks.mp4 21.8 MB
- IEEE Security and Privacy 2017/Your Exploit is Mine - Automatic Shellcode Transplant for Remote Exploits.mp4 21.8 MB
- IEEE Security and Privacy 2022/Blacksmith Compromising Target Row Refresh by Rowhammering in the Frequency Domain.mp4 21.8 MB
- IEEE Security and Privacy 2019/XCLAIM Trustless Interoperable Cryptocurrency Backed Assets.mp4 21.8 MB
- IEEE Security and Privacy 2016/Verifiable ASICs.mp4 21.8 MB
- IEEE Security and Privacy 2019/Understanding the Security of ARM Debugging Features.mp4 21.8 MB
- IEEE Security and Privacy 2015/Ad Injection at Scale - Assessing Deceptive Advertisement Modifications.mp4 21.8 MB
- IEEE Security and Privacy 2022/Spook.js Attacking Chrome Strict Site Isolation via Speculative Execution.mp4 21.7 MB
- IEEE Security and Privacy 2022/DeepSteal Advanced Model Extractions Leveraging Efficient Weight Stealing in Memories.mp4 21.7 MB
- IEEE Security and Privacy 2019/Fidelius Protecting User Secrets from Compromised Browsers.mp4 21.7 MB
- IEEE Security and Privacy 2015/Automatic Inference of Search Patterns for Tain't-Style Vulnerabilities.mp4 21.6 MB
- IEEE Security and Privacy 2022/Copy, Right A Testing Framework for Copyright Protection of Deep Learning Models.mp4 21.6 MB
- IEEE Security and Privacy 2019/Redactable Blockchain in the Permissionless Setting.mp4 21.6 MB
- IEEE Security and Privacy 2015/Cracking-Resistant Password Vaults Using Natural Language Encoders.mp4 21.5 MB
- IEEE Security and Privacy 2022/ProVerif with Lemmas, Induction, Fast Subsumption, and Much More.mp4 21.5 MB
- IEEE Security and Privacy 2023/Inducing Wireless Chargers to Voice Out for Inaudible Command Attacks.mp4 21.5 MB
- IEEE Security and Privacy 2022/SPURT Scalable Distributed Randomness Beacon with Transparent Setup.mp4 21.4 MB
- IEEE Security and Privacy 2022/Reconstructing Training Data with Informed Adversaries.mp4 21.4 MB
- IEEE Security and Privacy 2018/Privacy Risks with Facebook's PII-based Targeting.mp4 21.4 MB
- IEEE Security and Privacy 2022/IRQDebloat Reducing Driver Attack Surface in Embedded Devices.mp4 21.3 MB
- IEEE Security and Privacy 2018/T-Fuzz Fuzzing by Program Transformation - Hui Peng.mp4 21.3 MB
- IEEE Security and Privacy 2018/Grand Pwning Unit - Accelerating Microarchitectural Attacks with the GPU.mp4 21.3 MB
- IEEE Security and Privacy 2022/Formal Model-Driven Discovery of Bluetooth Protocol Design Vulnerabilities.mp4 21.3 MB
- IEEE Security and Privacy 2023/PyFET Forensically Equivalent Transformation for Python Binary Decompilation.mp4 21.3 MB
- IEEE Security and Privacy 2018/Locally Differentially Private Frequent Itemset Mining.mp4 21.2 MB
- IEEE Security and Privacy 2022/DeepCASE Semi-Supervised Contextual Analysis of Security Events.mp4 21.2 MB
- IEEE Security and Privacy 2019/Measuring and Analyzing Search Engine Poisoning of Linguistic Collisions.mp4 21.2 MB
- IEEE Security and Privacy 2022/How to Attack and Generate Honeywords.mp4 21.1 MB
- IEEE Security and Privacy 2022/Repairing DoS Vulnerability of Real-World Regexes.mp4 21.1 MB
- IEEE Security and Privacy 2022/Membership inference attacks from first principles.mp4 21.1 MB
- IEEE Security and Privacy 2018/SoK - Plug & Pray - Today - Understanding USB Insecurity in Versions 1 through C.mp4 20.9 MB
- IEEE Security and Privacy 2023/Security and Privacy Challenges, Advice, and Opportunities at Cybercafes in Kenya.mp4 20.9 MB
- IEEE Security and Privacy 2018/Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage.mp4 20.8 MB
- IEEE Security and Privacy 2023/AEM Facilitating Cross-Version Exploitability Assessment of Linux Kernel Vulnerabilities.mp4 20.8 MB
- IEEE Security and Privacy 2022/Time-Print Authenticating USB Flash Drives with Novel Timing Fingerprints.mp4 20.8 MB
- IEEE Security and Privacy 2023/Space Odyssey An Experimental Software Security Analysis of Satellites.mp4 20.7 MB
- IEEE Security and Privacy 2015/Leave Me Alone - App-Level Protection against Runtime Information Gathering on Android.mp4 20.7 MB
- IEEE Security and Privacy 2019/Towards Automated Safety Vetting of PLC Code in Real World Plants Mu Zhang.mp4 20.6 MB
- IEEE Security and Privacy 2015/SoK - Secure Messaging.mp4 20.6 MB
- IEEE Security and Privacy 2019/Proof Of Stake Sidechains.mp4 20.6 MB
- IEEE Security and Privacy 2019/SoK The Challenges Pitfalls and Perils of Using Hardware Performance Counters for Security.mp4 20.5 MB
- IEEE Security and Privacy 2016/TaoStore - Overcoming Asynchronicity in Oblivious Data Storage.mp4 20.5 MB
- IEEE Security and Privacy 2018/Stealing Hyperparameters in Machine Learning.mp4 20.4 MB
- IEEE Security and Privacy 2022/CirC Compiler infrastructure for proof systems, software verification, and more.mp4 20.4 MB
- IEEE Security and Privacy 2020/Are We Susceptible to Rowhammer An End-to-End Methodology for Cloud Providers.mp4 20.4 MB
- IEEE Security and Privacy 2019/Fuzzing File Systems via Two-Dimensional Input Space Exploration.mp4 20.3 MB
- IEEE Security and Privacy 2018/Crowd-GPS-Sec - Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks.mp4 20.3 MB
- IEEE Security and Privacy 2018/Surveylance - Automatically Detecting Online Survey Scams.mp4 20.3 MB
- IEEE Security and Privacy 2022/PGPATCH Policy-Guided Logic Bug Patching for Robotic Vehicles.mp4 20.3 MB
- IEEE Security and Privacy 2016/Users Really Do Plug in USB Drives They Find.mp4 20.3 MB
- IEEE Security and Privacy 2016/Verena - End-to-End Integrity Protection for Web Applications.mp4 20.3 MB
- IEEE Security and Privacy 2018/Opening Remarks of the 39th IEEE Symposium on Security & Privacy.mp4 20.2 MB
- IEEE Security and Privacy 2019/Razzer Finding Kernel Race Bugs through Fuzzing.mp4 20.1 MB
- IEEE Security and Privacy 2022/Graphics Peeping Unit Exploiting EM Side-Channel Information of GPUs to Eavesdrop on Your Neighbors.mp4 20.0 MB
- IEEE Security and Privacy 2022/PICCOLO Exposing Complex Backdoors in NLP Transformer Models.mp4 20.0 MB
- IEEE Security and Privacy 2023/LAMBRETTA Learning to Rank for Twitter Soft Moderation.mp4 20.0 MB
- IEEE Security and Privacy 2022/Publicly Accountable Robust Multi-Party Computation.mp4 20.0 MB
- IEEE Security and Privacy 2018/Anonymity Trilemma - Strong Anonymity, Low Bandwidth Overhead, Low Latency -- Choose Two.mp4 19.9 MB
- IEEE Security and Privacy 2022/Phishing in Organizations Findings from a Large-Scale and Long-Term Study.mp4 19.9 MB
- IEEE Security and Privacy 2019/Exploiting Unintended Feature leakage in Collaborative Learning Congzheng Song.mp4 19.9 MB
- IEEE Security and Privacy 2016/Helping Johnny to Analyze Malware - A Usability-Optimized Decompiler and Malware Analysis User Study.mp4 19.8 MB
- IEEE Security and Privacy 2016/MitM Attack by Name Collision - Cause Analysis and Vulnerability Assessment in the New gTLD Era.mp4 19.8 MB
- IEEE Security and Privacy 2018/Tracking Certificate Misissuance in the Wild.mp4 19.8 MB
- IEEE Security and Privacy 2022/Model Stealing Attacks Against Inductive Graph Neural Networks.mp4 19.7 MB
- IEEE Security and Privacy 2016/PhotoProof - Cryptographic Image Authentication for Any Set of Permissible Transformations.mp4 19.7 MB
- IEEE Security and Privacy 2022/Adversarial Examples - for Proof-of-Learning.mp4 19.7 MB
- IEEE Security and Privacy 2018/SoK - Keylogging Side Channels.mp4 19.7 MB
- IEEE Security and Privacy 2020/ICAS An Extensible Framework for Estimating the Susceptibility of IC Layouts to Additive Trojans.mp4 19.7 MB
- IEEE Security and Privacy 2017/Spotless Sandboxes - Evading Malware Analysis Systems using Wear-and-Tear Artifacts.mp4 19.6 MB
- IEEE Security and Privacy 2019/On the Security of Two-Round Multi-Signatures.mp4 19.6 MB
- IEEE Security and Privacy 2022/SoK How Robust is Image Classification Deep Neural Network Watermarking.mp4 19.6 MB
- IEEE Security and Privacy 2016/pASSWORD tYPOS and How to Correct Them Securely.mp4 19.6 MB
- IEEE Security and Privacy 2022/Wobfuscator Obfuscating JavaScript Malware via Opportunistic Translation to WebAssembly.mp4 19.5 MB
- IEEE Security and Privacy 2021/An Interactive Prover for Protocol Verification in the Computational Model.mp4 19.5 MB
- IEEE Security and Privacy 2017/Obstacles to the Adoption of Secure Communication Tools.mp4 19.5 MB
- IEEE Security and Privacy 2019/Theory and Practice of Finding Eviction Sets.mp4 19.4 MB
- IEEE Security and Privacy 2019/PrivKV Key Value Data Collection with Local Differential Privacy.mp4 19.4 MB
- IEEE Security and Privacy 2021/ConDySTA Context-Aware Dynamic Supplement to Static Tain't Analysis.mp4 19.4 MB
- IEEE Security and Privacy 2016/Security Analysis of Emerging Smart Home Applications.mp4 19.4 MB
- IEEE Security and Privacy 2022/SYMBEXCEL Automated Analysis and Understanding of Malicious Excel 4.0 Macros.mp4 19.4 MB
- IEEE Security and Privacy 2023/SNAP Efficient Extraction of Private Properties with Poisoning.mp4 19.3 MB
- IEEE Security and Privacy 2023/Deep perceptual hashing algorithms with hidden dual purpose client-side scanning facial recognition.mp4 19.3 MB
- IEEE Security and Privacy 2016/High-Speed Inter-domain Fault Localization.mp4 19.3 MB
- IEEE Security and Privacy 2016/Distillation as a Defense to Adversarial Perturbations against Deep Neural Networks.mp4 19.2 MB
- IEEE Security and Privacy 2022/Spinning Language Models Risks of Propaganda-as-a-Service and Countermeasures.mp4 19.2 MB
- IEEE Security and Privacy 2022/Spiral Fast, High-Rate Single-Server PIR via FHE Composition.mp4 19.1 MB
- IEEE Security and Privacy 2022/WIGHT Wired Ghost Touch Attack on Capacitive Touchscreens.mp4 19.1 MB
- IEEE Security and Privacy 2018/FPGA-Based Remote Power Side-Channel Attacks.mp4 19.1 MB
- IEEE Security and Privacy 2023/WarpAttack Bypassing CFI through Compiler-Introduced Double-Fetches.mp4 19.1 MB
- IEEE Security and Privacy 2018/Secure Device Bootstrapping without Secrets Resistant to Signal Manipulation Attacks.mp4 19.0 MB
- IEEE Security and Privacy 2021/Post-Quantum WireGuard.mp4 19.0 MB
- IEEE Security and Privacy 2016/Key Confirmation in Key Exchange - A Formal Treatment and Implications for TLS 1.3.mp4 19.0 MB
- IEEE Security and Privacy 2022/SoK Social Cybersecurity.mp4 19.0 MB
- IEEE Security and Privacy 2017/Skyfire - Data-Driven Seed Generation for Fuzzing.mp4 19.0 MB
- IEEE Security and Privacy 2022/Finding and Exploiting CPU Features using MSR Templating.mp4 19.0 MB
- IEEE Security and Privacy 2023/Not Yet Another Digital ID Privacy-preserving Humanitarian Aid Distribution.mp4 19.0 MB
- IEEE Security and Privacy 2016/Following Devil's Footprints - Cross-Platform Analysis of Potentially Harmful Libraries ....mp4 18.9 MB
- IEEE Security and Privacy 2022/Foundations of Dynamic BFT.mp4 18.9 MB
- IEEE Security and Privacy 2018/Impossibility of Precise and Sound Termination-Sensitive Security Enforcements.mp4 18.9 MB
- IEEE Security and Privacy 2016/Beauty and the Beast - Diverting modern web browsers to build unique browser fingerprints.mp4 18.9 MB
- IEEE Security and Privacy 2020/Pseudorandom Black Swans Cache Attacks on CTR_DRBG.mp4 18.8 MB
- IEEE Security and Privacy 2022/Universal 3-Dimensional Perturbations for Black-Box Attacks on Video Recognition Systems.mp4 18.7 MB
- IEEE Security and Privacy 2022/De-Identification's Impact on Minority Representation and Privacy Preservation in the US Census.mp4 18.7 MB
- IEEE Security and Privacy 2021/The EMV Standard Break, Fix, Verify.mp4 18.7 MB
- IEEE Security and Privacy 2017/Under the Shadow of Sunshine - Understanding & Detecting Bulletproof Hosting.mp4 18.6 MB
- IEEE Security and Privacy 2023/On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security.mp4 18.5 MB
- IEEE Security and Privacy 2016/Cinderella - Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with ....mp4 18.5 MB
- IEEE Security and Privacy 2022/GREBE Unveiling Exploitation Potential for Linux Kernel Bugs.mp4 18.5 MB
- IEEE Security and Privacy 2022/Transcending TRANSCEND Revisiting Malware Classification in the Presence of Concept Drift.mp4 18.5 MB
- IEEE Security and Privacy 2016/Talos - Neutralizing Vulnerabilities with Security Workarounds for Rapid Response.mp4 18.5 MB
- IEEE Security and Privacy 2022/mmSpy Spying Phone Calls using mmWave Radars.mp4 18.5 MB
- IEEE Security and Privacy 2016/A Practical Oblivious Map Data Structure with Secure Deletion and History Independence.mp4 18.4 MB
- IEEE Security and Privacy 2022/BadEncoder Backdoor Attacks to Pre-trained Encoders in Self-Supervised Learning.mp4 18.3 MB
- IEEE Security and Privacy 2022/Bad Characters Imperceptible NLP Attacks.mp4 18.2 MB
- IEEE Security and Privacy 2016/Downgrade Resilience in Key-Exchange Protocols.mp4 18.2 MB
- IEEE Security and Privacy 2022/Timing-Based Browsing Privacy Vulnerabilities Via Site Isolation.mp4 18.2 MB
- IEEE Security and Privacy 2016/Synthesizing Plausible Privacy-Preserving Location Traces.mp4 18.2 MB
- IEEE Security and Privacy 2022/How Not to Protect Your IP - An Industry-Wide Break of IEEE 1735 Implementations.mp4 18.2 MB
- IEEE Security and Privacy 2016/On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud.mp4 18.2 MB
- IEEE Security and Privacy 2019/EmPoWeb Empowering Web Applications with Browser Extensions.mp4 18.2 MB
- IEEE Security and Privacy 2022/Augury Using Data Memory-Dependent Prefetchers to Leak Data at Rest.mp4 18.2 MB
- IEEE Security and Privacy 2020/Combating Dependence Explosion in Forensic Analysis Using Alternative Tag Propagation Semantics.mp4 18.1 MB
- IEEE Security and Privacy 2018/Understanding Linux Malware.mp4 18.1 MB
- IEEE Security and Privacy 2016/Shreds - Fine-grained Execution Units with Private Memory.mp4 18.1 MB
- IEEE Security and Privacy 2018/A Tale of Two Studies - The Best and Worst of YubiKey Usability.mp4 18.1 MB
- IEEE Security and Privacy 2022/Exploit the Last Straw That Breaks Android Systems.mp4 18.1 MB
- IEEE Security and Privacy 2019/F-BLEAU Fast Black-box Leakage Estimation.mp4 18.1 MB
- IEEE Security and Privacy 2022/A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP.mp4 18.1 MB
- IEEE Security and Privacy 2018/FP-Stalker - Tracking Browser Fingerprint Evolutions - Antoine Vastel.mp4 18.0 MB
- IEEE Security and Privacy 2016/TriggerScope - Towards Detecting Logic Bombs in Android Applications.mp4 17.9 MB
- IEEE Security and Privacy 2023/TELEPATH A Minecraft-based Covert Communication System.mp4 17.9 MB
- IEEE Security and Privacy 2018/Oblix - An Efficient Oblivious Search Index.mp4 17.9 MB
- IEEE Security and Privacy 2022/Back to the Drawing Board A Critical Evaluation of Poisoning Attacks on Federated Learning.mp4 17.9 MB
- IEEE Security and Privacy 2015/Controlled-Channel Attacks - Deterministic Side Channels for Untrusted Operating Systems.mp4 17.9 MB
- IEEE Security and Privacy 2021/SoK Quantifying Cyber Risk.mp4 17.8 MB
- IEEE Security and Privacy 2023/On the (In)security of Peer-to-Peer Decentralized Machine Learning.mp4 17.8 MB
- IEEE Security and Privacy 2019/Lay Down the Common Metrics Evaluating Proof of Work Consensus Protocols' Security.mp4 17.8 MB
- IEEE Security and Privacy 2022/TROLLMAGNIFIER Detecting State-Sponsored Troll Accounts on Reddit.mp4 17.7 MB
- IEEE Security and Privacy 2016/Data-Oriented Programming - On the Expressiveness of Non-Control Data Attacks.mp4 17.7 MB
- IEEE Security and Privacy 2022/DEPCOMM Graph Summarization on System Audit Logs for Attack Investigation.mp4 17.7 MB
- IEEE Security and Privacy 2020/Transparent Polynomial Delegation and Its Applications to Zero Knowledge Proof.mp4 17.7 MB
- IEEE Security and Privacy 2020/MarkUs Drop-in Use-After-Free Prevention for Low-Level Languages.mp4 17.7 MB
- IEEE Security and Privacy 2016/Staying Secure and Unprepared - Understanding and Mitigating the Security Risks of Apple ZeroConf.mp4 17.7 MB
- IEEE Security and Privacy 2022/SMILE Secure Memory Introspection for Live Enclave.mp4 17.6 MB
- IEEE Security and Privacy 2022/MatRiCT More Efficient Post-Quantum Private Blockchain Payments.mp4 17.6 MB
- IEEE Security and Privacy 2016/The Cracked Cookie Jar - HTTP Cookie Hijacking and the Exposure of Private Information.mp4 17.6 MB
- IEEE Security and Privacy 2016/SoK - Everyone Hates Robocalls - A Survey of Techniques against Telephone Spam.mp4 17.5 MB
- IEEE Security and Privacy 2022/Waldo A Private Time-Series Database from Function Secret-Sharing.mp4 17.5 MB
- IEEE Security and Privacy 2023/Scalable and Privacy-Preserving Federated Principal Component Analysis.mp4 17.5 MB
- IEEE Security and Privacy 2023/LazyTAP On-Demand Data Minimization for Trigger-Action Applications.mp4 17.4 MB
- IEEE Security and Privacy 2019/RIDL Rogue In-Flight Data Load.mp4 17.4 MB
- IEEE Security and Privacy 2022/Analyzing Ground-Truth Data of Mobile Gambling Scam.mp4 17.4 MB
- IEEE Security and Privacy 2023/No Privacy in the Electronics Repair Industry.mp4 17.3 MB
- IEEE Security and Privacy 2020/Towards Effective Differential Privacy Comms for Users' Data Sharing Decision and Comprehension.mp4 17.3 MB
- IEEE Security and Privacy 2016/A Tough call - Mitigating Advanced Code-Reuse Attacks At The Binary Level.mp4 17.3 MB
- IEEE Security and Privacy 2023/A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations.mp4 17.3 MB
- IEEE Security and Privacy 2023/High-Order Masking of Lattice Signatures in Quasilinear Time.mp4 17.3 MB
- IEEE Security and Privacy 2016/You Get Where You're Looking For - The Impact Of Information Sources On Code Security.mp4 17.3 MB
- IEEE Security and Privacy 2016/Multiple Handshakes Security of TLS 1.3 Candidates.mp4 17.2 MB
- IEEE Security and Privacy 2020/HydRand Efficient Continuous Distributed Randomness.mp4 17.2 MB
- IEEE Security and Privacy 2016/Return to the Zombie Gadgets - Undermining Destructive Code Reads via Code-Inference Attacks.mp4 17.2 MB
- IEEE Security and Privacy 2020/SoK A Minimalist Approach to Formalizing Analog Sensor Security.mp4 17.0 MB
- IEEE Security and Privacy 2023/Characterizing the Limits of POV Acoustic Eavesdropping from Smartphone Cameras.mp4 17.0 MB
- IEEE Security and Privacy 2023/Practical Timing Side-Channel Attacks on Memory Compression.mp4 17.0 MB
- IEEE Security and Privacy 2016/Prepose - Privacy, Security, and Reliability for Gesture-Based Programming.mp4 17.0 MB
- IEEE Security and Privacy 2016/LAVA - Large-scale Automated Vulnerability Addition.mp4 17.0 MB
- IEEE Security and Privacy 2016/Domain-Z - 28 Registrations Later.mp4 17.0 MB
- IEEE Security and Privacy 2016/Inferring User Routes and Locations using Zero-Permission Mobile Sensors.mp4 17.0 MB
- IEEE Security and Privacy 2022/Attacks on Wireless Coexistence.mp4 16.9 MB
- IEEE Security and Privacy 2023/Is Cryptographic Deniability Sufficient Non-Expert Perceptions of Deniability in Secure Messaging.mp4 16.9 MB
- IEEE Security and Privacy 2019/Helen Maliciously Secure Coopetitive Learning for Linear Models.mp4 16.9 MB
- IEEE Security and Privacy 2022/Using Throughput-Centric Byzantine Broadcast to Tolerate Malicious Majority in Blockchains.mp4 16.9 MB
- IEEE Security and Privacy 2022/SpecHammer Combining Spectre and Rowhammer for New Speculative Attacks.mp4 16.9 MB
- IEEE Security and Privacy 2023/Breaking Security-Critical Voice Authentication.mp4 16.8 MB
- IEEE Security and Privacy 2023/User Perceptions and Experiences with Smart Home Updates.mp4 16.8 MB
- IEEE Security and Privacy 2022/Locally Differentially Private Sparse Vector Aggregation.mp4 16.8 MB
- IEEE Security and Privacy 2022/Mind the Gap Studying the Insecurity of Provably Secure Embedded Trusted Execution Architectures.mp4 16.8 MB
- IEEE Security and Privacy 2023/RAB Provable Robustness Against Backdoor Attacks.mp4 16.8 MB
- IEEE Security and Privacy 2019/IEEE S&P 2019 - Opening Remarks - Program Chair.mp4 16.8 MB
- IEEE Security and Privacy 2018/DEEPSEC - Deciding Equivalence Properties in Security Protocols - Theory and Practice.mp4 16.7 MB
- IEEE Security and Privacy 2023/SecureCells A Secure Compartmentalized Architecture.mp4 16.7 MB
- IEEE Security and Privacy 2023/Analyzing Leakage of Personally Identifiable Information in Language Models.mp4 16.7 MB
- IEEE Security and Privacy 2023/GraphSPD Graph-Based Security Patch Detection with Enriched Code Semantics.mp4 16.7 MB
- IEEE Security and Privacy 2023/FLUTE Fast and Secure Lookup Table Evaluations.mp4 16.7 MB
- IEEE Security and Privacy 2023/Collaborative Ad Transparency Promises and Limitations.mp4 16.7 MB
- IEEE Security and Privacy 2021/Survivalism Systematic Analysis of Malware Living-Off-The-Land.mp4 16.7 MB
- IEEE Security and Privacy 2022/WtaGraph Web Tracking and Advertising Detection using Graph Neural Networks.mp4 16.7 MB
- IEEE Security and Privacy 2019/Bitcoin vs. Bitcoin Cash Coexistence or Downfall of Bitcoin Cash.mp4 16.6 MB
- IEEE Security and Privacy 2021/SoK An Overview of FHE Compilers and Tools.mp4 16.6 MB
- IEEE Security and Privacy 2017/Membership Inference Attacks against Machine Learning Models.mp4 16.6 MB
- IEEE Security and Privacy 2022/Multi-Server Verifiable Computation of Low-Degree Polynomials.mp4 16.5 MB
- IEEE Security and Privacy 2016/SoK - Towards Grounding Censorship Circumvention in Empiricism.mp4 16.5 MB
- IEEE Security and Privacy 2019/Kiss from a Rogue Evaluating Detectability of Pay-at-the-Pump Card Skimmers.mp4 16.4 MB
- IEEE Security and Privacy 2023/PCspooF Compromising the Safety of Time-Triggered Ethernet.mp4 16.4 MB
- IEEE Security and Privacy 2023/Private Eye On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing.mp4 16.4 MB
- IEEE Security and Privacy 2022/PCR-Auth Solving Authentication Puzzle Challenges with Encoded Palm Contact Responses.mp4 16.4 MB
- IEEE Security and Privacy 2022/Security Analysis of the MLS Key Derivation.mp4 16.4 MB
- IEEE Security and Privacy 2023/AUC Accountable Universal Composability.mp4 16.3 MB
- IEEE Security and Privacy 2022/Private Nearest Neighbor Search with Sublinear Communication and Malicious Security.mp4 16.3 MB
- IEEE Security and Privacy 2022/PROTRR Principled yet Optimal In-DRAM Target Row Refresh.mp4 16.3 MB
- IEEE Security and Privacy 2023/A Theory to Instruct Differentially-Private Learning via Clipping Bias Reduction.mp4 16.3 MB
- IEEE Security and Privacy 2022/Cats vs. Spectre An Axiomatic Approach to Modeling Speculative Execution Attacks.mp4 16.3 MB
- IEEE Security and Privacy 2023/Threshold BBS Signatures for Distributed Anonymous Credential Issuance.mp4 16.3 MB
- IEEE Security and Privacy 2023/SoK History is a Vast Early Warning System Auditing the Provenance of System Intrusions.mp4 16.2 MB
- IEEE Security and Privacy 2023/Detection of Inconsistencies in Privacy Practices of Browser Extensions.mp4 16.2 MB
- IEEE Security and Privacy 2022/The Experts' Insights on the Peer Review Process of Evaluating Security Papers.mp4 16.2 MB
- IEEE Security and Privacy 2018/AI2 - Safety and Robustness Certification of Neural Networks.mp4 16.1 MB
- IEEE Security and Privacy 2022/Are We There Yet Timing and Floating-Point Attacks on Differential Privacy Systems.mp4 16.1 MB
- IEEE Security and Privacy 2022/Sabre Sender-Anonymous Messaging with Fast Audits.mp4 16.1 MB
- IEEE Security and Privacy 2023/A Generic, Efficient, and Effortless Solver with Self-Supervised Learning for Breaking Text Captchas.mp4 16.1 MB
- IEEE Security and Privacy 2023/Typing High-Speed Cryptography against Spectre v1.mp4 16.1 MB
- IEEE Security and Privacy 2016/Automated Analysis and Verification of TLS 1.3 - 0-RTT, Resumption and Delayed Authentication.mp4 16.0 MB
- IEEE Security and Privacy 2023/Teaching and Learning Cybersecurity and AI Ethics in High School.mp4 16.0 MB
- IEEE Security and Privacy 2021/Wolverine Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and ....mp4 16.0 MB
- IEEE Security and Privacy 2021/CacheOut Leaking Data on Intel CPUs via Cache Evictions.mp4 16.0 MB
- IEEE Security and Privacy 2023/TrojanModel A Practical Trojan Attack against Automatic Speech Recognition Systems.mp4 16.0 MB
- IEEE Security and Privacy 2023/D-DAE Defense-Penetrating Model Extraction Attacks.mp4 15.8 MB
- IEEE Security and Privacy 2023/Hide and Seek with Spectres Efficient discovery of speculative vulnerabilities with random testing.mp4 15.8 MB
- IEEE Security and Privacy 2021/Bomberman Defining and Defeating Hardware Ticking Timebombs at Design-time.mp4 15.8 MB
- IEEE Security and Privacy 2023/Spectral-DP Differentially Private Deep Learning through Spectral Perturbation and Filtering.mp4 15.7 MB
- IEEE Security and Privacy 2022/Goshawk Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis.mp4 15.7 MB
- IEEE Security and Privacy 2016/SoK - (State of) The Art of War - Offensive Techniques in Binary Analysis.mp4 15.7 MB
- IEEE Security and Privacy 2023/ADI Adversarial Dominating Inputs in Vertical Federated Learning Systems.mp4 15.7 MB
- IEEE Security and Privacy 2022/The State of the SameSite Studying the Usage, Effectiveness, and Adequacy of SameSite Cookies.mp4 15.6 MB
- IEEE Security and Privacy 2023/Deepfake Text Detection Limitations and Opportunities.mp4 15.6 MB
- IEEE Security and Privacy 2016/Back in Black - Towards Formal, Black Box Analysis of Sanitizers and Filters.mp4 15.6 MB
- IEEE Security and Privacy 2023/mmEcho A mmWave-based Acoustic Eavesdropping Method.mp4 15.5 MB
- IEEE Security and Privacy 2023/Understanding the Security and Privacy Attitudes of Smart Home Users on Reddit.mp4 15.5 MB
- IEEE Security and Privacy 2021/Red Belly a Deterministic Scalable Open Permissioned Blockchain.mp4 15.5 MB
- IEEE Security and Privacy 2023/REDEEM MYSELF Purifying Backdoors in Deep Learning Models using Self Attention Distillation.mp4 15.5 MB
- IEEE Security and Privacy 2022/Model Orthogonalization Class Distance Hardening in Neural Networks for Better Security.mp4 15.4 MB
- IEEE Security and Privacy 2023/PublicCheck Public Integrity Verification for Services of Run-time Deep Models.mp4 15.4 MB
- IEEE Security and Privacy 2022/Statistical Quantification of Differential Privacy A Local Approach.mp4 15.3 MB
- IEEE Security and Privacy 2023/Man-in-the-Middle Attacks without Rogue AP When WPAs Meet ICMP Redirects.mp4 15.3 MB
- IEEE Security and Privacy 2016/Cache Storage Channels - Alias-Driven Attacks and Verified Countermeasures.mp4 15.3 MB
- IEEE Security and Privacy 2023/SoK Let the Privacy Games Begin A Unified Treatment of Data Inference Privacy in Machine Learning.mp4 15.3 MB
- IEEE Security and Privacy 2022/Scraping Sticky Leftovers App User Information Left on Servers After Account Deletion.mp4 15.2 MB
- IEEE Security and Privacy 2023/Shedding Light on Inconsistencies in Grid Cybersecurity Disconnects and Recommendations.mp4 15.2 MB
- IEEE Security and Privacy 2023/Perceptions of Distributed Ledger Technology Key Management-Interviews with Finance Professionals.mp4 15.2 MB
- IEEE Security and Privacy 2022/SNARKBlock Federated Anonymous Blocklisting from Hidden Common Input Aggregate Proofs.mp4 15.2 MB
- IEEE Security and Privacy 2023/Discovering Java Deserialization Vulnerabilities via Structure-Aware Directed Greybox Fuzzing.mp4 15.1 MB
- IEEE Security and Privacy 2023/SoK Taxonomy of Attacks on Open-Source Software Supply Chains.mp4 15.1 MB
- IEEE Security and Privacy 2022/AccEar Accelerometer Acoustic Eavesdropping with Unconstrained Vocabulary.mp4 15.1 MB
- IEEE Security and Privacy 2022/SAILFISH Vetting Smart Contract State-Inconsistency Bugs in Seconds.mp4 15.1 MB
- IEEE Security and Privacy 2021/CryptGPU Fast Privacy-Preserving Machine Learning on the GPU.mp4 15.0 MB
- IEEE Security and Privacy 2023/DeHiREC Detecting Hidden Voice Recorders via ADC Electromagnetic Radiation.mp4 15.0 MB
- IEEE Security and Privacy 2022/COBRA Dynamic Proactive Secret Sharing for Confidential BFT Services.mp4 15.0 MB
- IEEE Security and Privacy 2023/IPvSeeYou Exploiting Leaked Identifiers in IPv6 for Street-Level Geolocation.mp4 15.0 MB
- IEEE Security and Privacy 2023/SyzDescribe Principled, Automated, Static Generation of Syscall Descriptions for Kernel Drivers.mp4 15.0 MB
- IEEE Security and Privacy 2023/SoK Certified Robustness for Deep Neural Networks.mp4 15.0 MB
- IEEE Security and Privacy 2020/TextExerciser Feedback-Driven Text Input Exercising for Android Applications.mp4 14.9 MB
- IEEE Security and Privacy 2016/Hawk - The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts.mp4 14.9 MB
- IEEE Security and Privacy 2023/When and Why Do People Want Ad Targeting Explanations Evidence from a Mixed-Methods Field Study.mp4 14.9 MB
- IEEE Security and Privacy 2022/Hark A Deep Learning System for Navigating Privacy Feedback at Scale.mp4 14.9 MB
- IEEE Security and Privacy 2023/WeRLman To Tackle Whale (Transactions), Go Deep (RL).mp4 14.9 MB
- IEEE Security and Privacy 2023/From 5G Sniffing to Harvesting Leakages of Privacy-Preserving Messengers.mp4 14.9 MB
- IEEE Security and Privacy 2021/Randomized Last-Level Caches Are Still Vulnerable to Cache Side-Channel Attacks But We Can Fix It.mp4 14.8 MB
- IEEE Security and Privacy 2023/WaVe A Verifiably Secure WebAssembly Sandboxing Runtime.mp4 14.8 MB
- IEEE Security and Privacy 2020/Breaking and (Partially) Fixing Provably Secure Onion Routing.mp4 14.8 MB
- IEEE Security and Privacy 2022/ZeeStar Private Smart Contracts by Homomorphic Encryption and Zero-knowledge Proofs.mp4 14.7 MB
- IEEE Security and Privacy 2020/Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers.mp4 14.7 MB
- IEEE Security and Privacy 2021/Bitcoin-Compatible Virtual Channels.mp4 14.7 MB
- IEEE Security and Privacy 2016/Seeking Nonsense, Looking for Trouble - Efficient Promotional-Infection Detection through ....mp4 14.7 MB
- IEEE Security and Privacy 2022/Automated Attack Synthesis by Extracting Finite State Machines from Protocol Specification Documents.mp4 14.7 MB
- IEEE Security and Privacy 2023/SoK Decentralized Finance (DeFi) Attacks.mp4 14.7 MB
- IEEE Security and Privacy 2016/A Method for Verifying Privacy-Type Properties - The Unbounded Case.mp4 14.6 MB
- IEEE Security and Privacy 2022/SoK Practical Foundations for Software Spectre Defenses.mp4 14.6 MB
- IEEE Security and Privacy 2022/SoK Authentication in Augmented and Virtual Reality.mp4 14.6 MB
- IEEE Security and Privacy 2023/Blue Is the New Black (Market) Privacy Leaks and Re-Victimization from Police-Auctioned Cellphones.mp4 14.6 MB
- IEEE Security and Privacy 2023/3DFed Adaptive and Extensible Framework for Covert Backdoor Attack in Federated Learning.mp4 14.6 MB
- IEEE Security and Privacy 2022/Property Inference from Poisoning.mp4 14.6 MB
- IEEE Security and Privacy 2023/Mew Enabling Large-Scale and Dynamic Link-Flooding Defenses on Programmable Switches.mp4 14.6 MB
- IEEE Security and Privacy 2023/Scaling JavaScript Abstract Interpretation to Detect and Exploit Node.js Taint-style Vulnerability.mp4 14.6 MB
- IEEE Security and Privacy 2020/KARONTE Detecting Insecure Multi-binary Interactions in Embedded Firmware.mp4 14.5 MB
- IEEE Security and Privacy 2023/SPHINCSC Compressing SPHINCS With (Almost) No Cost.mp4 14.5 MB
- IEEE Security and Privacy 2023/An Interview on the Security and Privacy Development Practices in Turkish Software Startups.mp4 14.4 MB
- IEEE Security and Privacy 2016/No Pardon for the Interruption - New Inference Attacks on Android Through Interrupt Timing Analysis.mp4 14.4 MB
- IEEE Security and Privacy 2023/Blue's Clues Practical Discovery of Non-Discoverable Bluetooth Devices.mp4 14.4 MB
- IEEE Security and Privacy 2020/NetCAT Practical Cache Attacks from the Network.mp4 14.4 MB
- IEEE Security and Privacy 2023/Private Collaborative Data Cleaning via Non-Equi PSI.mp4 14.4 MB
- IEEE Security and Privacy 2020/Leveraging EM Side-Channel Information to Detect Rowhammer Attacks.mp4 14.4 MB
- IEEE Security and Privacy 2023/TEEzz Fuzzing Trusted Applications on COTS Android Devices.mp4 14.4 MB
- IEEE Security and Privacy 2020/SEIMI Efficient and Secure SMAP-Enabled Intra-process Memory Isolation.mp4 14.3 MB
- IEEE Security and Privacy 2023/How IoT Re-using Threatens Your Sensitive Data Exploring the User-Data Disposal in Used IoT Devices.mp4 14.3 MB
- IEEE Security and Privacy 2023/Attitudes towards Client-Side Scanning for CSAM, Terrorism, Drug Trafficking, Drug Use, Tax Evasion.mp4 14.3 MB
- IEEE Security and Privacy 2023/UTOPIA Automatic Generation of Fuzz Driver using Unit Tests.mp4 14.3 MB
- IEEE Security and Privacy 2023/Practical Program Modularization with Type-Based Dependence Analysis.mp4 14.3 MB
- IEEE Security and Privacy 2023/Volttack Control IoT Devices by Manipulating Power Supply Voltage.mp4 14.2 MB
- IEEE Security and Privacy 2023/One Key to Rule Them All Secure Group Pairing for Heterogeneous IoT Devices.mp4 14.2 MB
- IEEE Security and Privacy 2022/Adversarial Prefetch New Cross-Core Cache Side Channel Attacks.mp4 14.2 MB
- IEEE Security and Privacy 2023/It’s (DOM) Clobbering Time Attack Techniques, Prevalence, and Defenses.mp4 14.2 MB
- IEEE Security and Privacy 2023/Towards a Rigorous Statistical Analysis of Empirical Password Datasets.mp4 14.1 MB
- IEEE Security and Privacy 2023/SoK A Critical Evaluation of Efficient Website Fingerprinting Defenses.mp4 14.1 MB
- IEEE Security and Privacy 2023/Disassembling ARM Binaries by Lightweight Superset Instruction Interpretation and Graph Modeling.mp4 14.1 MB
- IEEE Security and Privacy 2023/VIDEZZO Dependency-aware Virtual Device Fuzzing.mp4 14.1 MB
- IEEE Security and Privacy 2019/IEEE S&P 2019 - Opening Remarks - General Chair.mp4 14.1 MB
- IEEE Security and Privacy 2023/MagBackdoor Beware of Your Loudspeaker as A Backdoor For Magnetic Injection Attacks.mp4 14.1 MB
- IEEE Security and Privacy 2016/I Think They're Trying to Tell Me Something - Advice Sources and Selection for Digital Security.mp4 14.0 MB
- IEEE Security and Privacy 2023/SoK Cryptographic Neural-Network Computation.mp4 14.0 MB
- IEEE Security and Privacy 2020/Semantic Understanding of Smart Contracts Executable Operational Semantics of Solidity.mp4 14.0 MB
- IEEE Security and Privacy 2020/The Many Kinds of Creepware Used for Interpersonal Attacks.mp4 14.0 MB
- IEEE Security and Privacy 2023/Design and Evaluation of Inclusive Email Security Indicators for People with Visual Impairments.mp4 14.0 MB
- IEEE Security and Privacy 2021/A Secure and Formally Verified Linux KVM Hypervisor.mp4 14.0 MB
- IEEE Security and Privacy 2023/RuleKeeper GDPR-Aware Personal Data Compliance for Web Frameworks.mp4 14.0 MB
- IEEE Security and Privacy 2023/Bitcoin-Enhanced Proof-of-Stake Security Possibilities and Impossibilities.mp4 13.9 MB
- IEEE Security and Privacy 2023/Threshold Signatures in the Multiverse.mp4 13.9 MB
- IEEE Security and Privacy 2023/No One Drinks From the Firehose How Organizations Filter and Prioritize Vulnerability Information.mp4 13.9 MB
- IEEE Security and Privacy 2022/Quantifying Blockchain Extractable Value How dark is the forest.mp4 13.9 MB
- IEEE Security and Privacy 2023/Skilled or Gullible Gender Stereotypes Related to Computer Security and Privacy.mp4 13.9 MB
- IEEE Security and Privacy 2023/WebSpec Towards Machine-Checked Analysis of Browser Security Mechanisms.mp4 13.9 MB
- IEEE Security and Privacy 2023/Weak Fiat-Shamir Attacks on Modern Proof Systems.mp4 13.9 MB
- IEEE Security and Privacy 2020/xMP Selective Memory Protection for Kernel and User Space.mp4 13.8 MB
- IEEE Security and Privacy 2023/MEGA Malleable Encryption Goes Awry.mp4 13.8 MB
- IEEE Security and Privacy 2020/Kobold Evaluating Decentralized Access Control for Remote NSXPC Methods on iOS.mp4 13.8 MB
- IEEE Security and Privacy 2021/DP-Sniper Black-Box Discovery of Differential Privacy Violations using Classifiers.mp4 13.8 MB
- IEEE Security and Privacy 2023/TeSec Accurate Server-side Attack Investigation for Web Applications.mp4 13.8 MB
- IEEE Security and Privacy 2023/mmSpoof Resilient Spoofing of Automotive Millimeter-wave Radars using Reflect Array.mp4 13.7 MB
- IEEE Security and Privacy 2022/SecFloat Accurate Floating-Point meets Secure 2-Party Computation.mp4 13.7 MB
- IEEE Security and Privacy 2022/Jigsaw Efficient and Scalable Path Constraints Fuzzing.mp4 13.7 MB
- IEEE Security and Privacy 2016/Sending out an SMS - Characterizing the Security of the SMS Ecosystem with Public Gateways.mp4 13.7 MB
- IEEE Security and Privacy 2021/SoK All You Ever Wanted to Know About Binary Disassembly But Were Afraid to Ask.mp4 13.7 MB
- IEEE Security and Privacy 2016/Revisiting Square Root ORAM - Efficient Random Access in Multi-Party Computation.mp4 13.7 MB
- IEEE Security and Privacy 2022/A Secret-Free Hypervisor Rethinking Isolation in the Age of Speculative Vulnerabilities.mp4 13.7 MB
- IEEE Security and Privacy 2022/BEACON - Directed Grey-Box Fuzzing with Provable Path Pruning.mp4 13.6 MB
- IEEE Security and Privacy 2023/Tyr Finding Consensus Failure Bugs in Blockchain System with Behaviour Divergent Model.mp4 13.6 MB
- IEEE Security and Privacy 2023/FIDO2, CTAP 2.1, and WebAuthn 2 Provable Security and Post-Quantum Instantiation.mp4 13.5 MB
- IEEE Security and Privacy 2019/On the Feasibility of Rerouting-Based DDoS Defenses.mp4 13.5 MB
- IEEE Security and Privacy 2020/OHIE Blockchain Scaling Made Simple.mp4 13.5 MB
- IEEE Security and Privacy 2021/Poltergeist Acoustic Manipulation of Image Stabilization towards Object Mis-Labeling.mp4 13.5 MB
- IEEE Security and Privacy 2021/Defensive Technology Use by Political Activists During the Sudanese Revolution.mp4 13.4 MB
- IEEE Security and Privacy 2019/Demystifying Hidden Privacy Settings in Mobile Apps.mp4 13.4 MB
- IEEE Security and Privacy 2023/Protected or Porous A Comparative Analysis of Threat Detection Capability of IoT Safeguards.mp4 13.4 MB
- IEEE Security and Privacy 2022/Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms.mp4 13.4 MB
- IEEE Security and Privacy 2023/Characterizing Everyday Misuse of Smart Home Devices.mp4 13.4 MB
- IEEE Security and Privacy 2023/Always Contribute Back A Qualitative Study on Security Challenges of the Open Source Supply Chain.mp4 13.4 MB
- IEEE Security and Privacy 2020/ICLab A Global, Longitudinal Internet Censorship Measurement Platform.mp4 13.4 MB
- IEEE Security and Privacy 2023/QueryX Symbolic Query on Decompiled Code for Finding Bugs in COTS Binaries.mp4 13.3 MB
- IEEE Security and Privacy 2022/Committed to Trust A Qualitative Study on Security & Trust in Open Source Software Projects.mp4 13.3 MB
- IEEE Security and Privacy 2023/OWL Compositional Verification of Security Protocols via an Information-Flow Type System.mp4 13.3 MB
- IEEE Security and Privacy 2023/ShadowNet A Secure and Efficient On-device Model Inference System for Convolutional Neural Networks.mp4 13.3 MB
- IEEE Security and Privacy 2020/WaveSpy Remote and Through-wall Screen Attack via mmWave Sensing.mp4 13.3 MB
- IEEE Security and Privacy 2023/Uncovering User Interactions on Smartphones via Contactless Wireless Charging Side Channels.mp4 13.3 MB
- IEEE Security and Privacy 2021/DynPTA Combining Static and Dynamic Analysis for Practical Selective Data Protection.mp4 13.3 MB
- IEEE Security and Privacy 2021/Hear No Evil, See Kenansville Efficient and Transferable Black-Box Attacks on Automatic ....mp4 13.3 MB
- IEEE Security and Privacy 2019/Certified Robustness to Adversarial Examples with Differential Privacy.mp4 13.3 MB
- IEEE Security and Privacy 2023/Improving Developers' Understanding of Regex Denial of Service Tools.mp4 13.3 MB
- IEEE Security and Privacy 2023/ELSA Secure Aggregation for Federated Learning with Malicious Actors.mp4 13.3 MB
- IEEE Security and Privacy 2020/SAVIOR Towards Bug-Driven Hybrid Testing.mp4 13.2 MB
- IEEE Security and Privacy 2023/Half&Half Demystifying Intel’s Directional Branch Predictors for Fast, Secure Partitioned Execution.mp4 13.2 MB
- IEEE Security and Privacy 2023/The Leaky Web Automated Discovery of Cross-Site Information Leaks in Browsers and the Web.mp4 13.2 MB
- IEEE Security and Privacy 2023/Protecting Models Trained by Multi-party Learning with Differential Privacy.mp4 13.1 MB
- IEEE Security and Privacy 2023/DVFS Frequently Leaks Secrets Hertzbleed Attacks Beyond SIKE, Cryptography, and CPU-Only Data.mp4 13.0 MB
- IEEE Security and Privacy 2023/Investigating Package Related Security Threats in Software Registries.mp4 13.0 MB
- IEEE Security and Privacy 2022/Universal Atomic Swaps Secure Exchange of Coins Across All Blockchains.mp4 13.0 MB
- IEEE Security and Privacy 2020/The State of the Uniform Attacks on Encrypted Databases beyond the Uniform Query Distribution.mp4 12.9 MB
- IEEE Security and Privacy 2020/Flaw Label Exploiting IPv6 Flow Label.mp4 12.9 MB
- IEEE Security and Privacy 2022/Low-Bandwidth Threshold ECDSA via Pseudorandom Correlation Generators.mp4 12.9 MB
- IEEE Security and Privacy 2016/HDFI - Hardware-Assisted Data-Flow Isolation.mp4 12.9 MB
- IEEE Security and Privacy 2023/AI-Guardian Defeating Adversarial Attacks using Backdoors.mp4 12.9 MB
- IEEE Security and Privacy 2023/Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation.mp4 12.9 MB
- IEEE Security and Privacy 2022/Investigating the Use of Email Encryption for an Entire University.mp4 12.9 MB
- IEEE Security and Privacy 2019/Short Text, Large Effect Measuring the Impact of User Reviews on Android App Security & Privacy.mp4 12.8 MB
- IEEE Security and Privacy 2023/BLEDiff Scalable and Property-Agnostic Noncompliance Checking for BLE Implementations.mp4 12.8 MB
- IEEE Security and Privacy 2023/Low-effort VR Headset User Authentication Using Head-reverberated Sounds with Replay Resistance.mp4 12.8 MB
- IEEE Security and Privacy 2016/Dedup Est Machina - Memory Deduplication as an Advanced Exploitation Vector.mp4 12.8 MB
- IEEE Security and Privacy 2020/SEVurity No Security Without Integrity - Breaking Integrity.mp4 12.8 MB
- IEEE Security and Privacy 2023/Silph A Framework for Scalable and Accurate Generation of Hybrid MPC Protocols.mp4 12.7 MB
- IEEE Security and Privacy 2020/Automated Reverse Engineering and Privacy Analysis of Modern Cars.mp4 12.7 MB
- IEEE Security and Privacy 2021/SoK Security and Privacy in the Age of Commercial Drones.mp4 12.6 MB
- IEEE Security and Privacy 2023/Sound Verification of Security Protocols From Design to Interoperable Implementations.mp4 12.6 MB
- IEEE Security and Privacy 2023/Disguising Attacks with Explanation-Aware Backdoors.mp4 12.6 MB
- IEEE Security and Privacy 2020/A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network.mp4 12.6 MB
- IEEE Security and Privacy 2020/Unexpected Data Dependency Creation and Chaining A New Attack to SDN.mp4 12.6 MB
- IEEE Security and Privacy 2023/Multi-Round Single-Server Secure Aggregation with Applications to Private Federated Learning.mp4 12.6 MB
- IEEE Security and Privacy 2020/A Tale of Sea and Sky On the Security of Maritime VSAT Communications.mp4 12.5 MB
- IEEE Security and Privacy 2023/RoFL Robustness of Secure Federated Learning.mp4 12.5 MB
- IEEE Security and Privacy 2022/Why Crypto-detectors Fail A Systematic Evaluation of Cryptographic Misuse Detection Techniques.mp4 12.5 MB
- IEEE Security and Privacy 2023/Beyond Phish Toward Detecting Fraudulent e-Commerce Websites at Scale.mp4 12.5 MB
- IEEE Security and Privacy 2023/Adaptive Risk-Limiting Comparison Audits.mp4 12.5 MB
- IEEE Security and Privacy 2023/EC Embedded Systems Compartmentalization via Intra-Kernel Isolation.mp4 12.5 MB
- IEEE Security and Privacy 2023/Vulnerability Discovery for All Experiences of Marginalization in Vulnerability Discovery.mp4 12.4 MB
- IEEE Security and Privacy 2021/Breaking the Specification Certified PDF.mp4 12.4 MB
- IEEE Security and Privacy 2022/Device Fingerprinting with Peripheral Timestamps.mp4 12.4 MB
- IEEE Security and Privacy 2023/SoK Distributed Randomness Beacons.mp4 12.4 MB
- IEEE Security and Privacy 2021/A Novel Dynamic Analysis Infrastructure to Instrument Untrusted Execution Flow Across User-Kernel....mp4 12.4 MB
- IEEE Security and Privacy 2023/Clockwork Finance Automated Analysis of Economic Security in Smart Contracts.mp4 12.3 MB
- IEEE Security and Privacy 2022/Differentially Private Histograms in the Shuffle Model from Fake Users.mp4 12.3 MB
- IEEE Security and Privacy 2023/Limits of I O Based Ransomware Detection An Imitation Based Attack.mp4 12.3 MB
- IEEE Security and Privacy 2020/Ask the Experts What Should Be on an IoT Privacy and Security Label.mp4 12.3 MB
- IEEE Security and Privacy 2023/Jolt Recovering TLS Signing Keys via Rowhammer Faults.mp4 12.3 MB
- IEEE Security and Privacy 2020/Krace Data Race Fuzzing for Kernel File Systems.mp4 12.3 MB
- IEEE Security and Privacy 2022/LinkTeller Recovering Private Edges from Graph Neural Networks via Influence Analysis.mp4 12.2 MB
- IEEE Security and Privacy 2023/Jigsaw Puzzle Selective Backdoor Attack to Subvert Malware Classifiers.mp4 12.2 MB
- IEEE Security and Privacy 2020/Establishing Economic Incentives for Security Patching of IoT Consumer Products.mp4 12.2 MB
- IEEE Security and Privacy 2020/RAMBleed Reading Bits in Memory without Accessing Them.mp4 12.2 MB
- IEEE Security and Privacy 2020/Humpty Dumpty Controlling Word Meanings via Corpus Poisoning.mp4 12.2 MB
- IEEE Security and Privacy 2020/A Security Analysis of the Facebook Ad Library.mp4 12.1 MB
- IEEE Security and Privacy 2021/Many-out-of-Many Proofs and Applications to Anonymous Zether.mp4 12.1 MB
- IEEE Security and Privacy 2021/OSPREY Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary.mp4 12.1 MB
- IEEE Security and Privacy 2020/Path Oblivious Heap Optimal and Practical Oblivious Priority Queue.mp4 12.1 MB
- IEEE Security and Privacy 2021/Self-Supervised Euphemism Detection and Identification for Content Moderation.mp4 12.1 MB
- IEEE Security and Privacy 2021/PLATYPUS Software-based Power Side-Channel Attacks on x86.mp4 12.0 MB
- IEEE Security and Privacy 2021/Merkle2 A Low-Latency Transparency Log System.mp4 12.0 MB
- IEEE Security and Privacy 2020/AdGraph A Graph-Based Approach to Ad and Tracker Blocking.mp4 12.0 MB
- IEEE Security and Privacy 2023/Private Access Control for Function Secret Sharing.mp4 11.9 MB
- IEEE Security and Privacy 2021/Co-Inflow Coarse-grained Information Flow Control for Java-like Languages.mp4 11.9 MB
- IEEE Security and Privacy 2020/Ex-vivo Dynamic Analysis Framework for Android Device Drivers.mp4 11.9 MB
- IEEE Security and Privacy 2021/Cross-Domain Access Control Encryption - Arbitrary-policy, Constant-size, Efficient.mp4 11.9 MB
- IEEE Security and Privacy 2022/Arbitrary Modulation of Electromagnetic Noise from Unprivileged Software Impacting Emission Security.mp4 11.9 MB
- IEEE Security and Privacy 2022/HAMRAZ Resilient Partitioning and Replication.mp4 11.8 MB
- IEEE Security and Privacy 2021/Fingerprinting the Fingerprinters Learning to Detect Browser Fingerprinting Behaviors.mp4 11.8 MB
- IEEE Security and Privacy 2019/Blind Certificate Authorities.mp4 11.8 MB
- IEEE Security and Privacy 2023/Less Is More Refinement Proofs for Probabilistic Proofs.mp4 11.8 MB
- IEEE Security and Privacy 2022/SoK Demystifying Binary Lifters Through the Lens of Downstream Applications.mp4 11.8 MB
- IEEE Security and Privacy 2023/REGA Scalable Rowhammer Mitigation with Refresh-Generating Activations.mp4 11.8 MB
- IEEE Security and Privacy 2022/Four Attacks and a Proof for Telegram.mp4 11.8 MB
- IEEE Security and Privacy 2021/CanDID Bootstrapping Decentralized Identity from Legacy Providers.mp4 11.7 MB
- IEEE Security and Privacy 2020/SPECTECTOR Principled Detection of Speculative Information Flows.mp4 11.7 MB
- IEEE Security and Privacy 2023/On Efficient, High-Fidelity and Blind Suppression of Backdoor Effects in Trojaned ML Models.mp4 11.7 MB
- IEEE Security and Privacy 2021/SoK Hate, Harassment, and the Changing Landscape of Online Abuse.mp4 11.6 MB
- IEEE Security and Privacy 2020/Transys Leveraging Common Security Properties across Hardware Designs.mp4 11.6 MB
- IEEE Security and Privacy 2021/Android Custom Permissions Demystified From Privilege Escalation to Design Shortcomings.mp4 11.6 MB
- IEEE Security and Privacy 2021/Method Confusion Attack on the Bluetooth Pairing Process.mp4 11.5 MB
- IEEE Security and Privacy 2021/Did you mix me Formally Verifying Verifiable Mix Nets in Electronic Voting.mp4 11.5 MB
- IEEE Security and Privacy 2021/Electromagnetic Covert Channels Can Be Super Resilient.mp4 11.5 MB
- IEEE Security and Privacy 2023/Leveraging Sandboxes for a Minimally Invasive Browser Fingerprinting Defense.mp4 11.4 MB
- IEEE Security and Privacy 2020/Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability.mp4 11.4 MB
- IEEE Security and Privacy 2021/STOCHFUZZ Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic ....mp4 11.4 MB
- IEEE Security and Privacy 2021/Good Bot, Bad Bot Characterizing Automated Browsing Activity.mp4 11.4 MB
- IEEE Security and Privacy 2016/Cloak of Visibility - Detecting When Machines Browse a Different Web.mp4 11.4 MB
- IEEE Security and Privacy 2021/Epochal Signatures for Deniable Group Chats.mp4 11.4 MB
- IEEE Security and Privacy 2021/Linking Bluetooth LE & Classic and Implications for Privacy-Preserving Bluetooth-Based Protocols.mp4 11.3 MB
- IEEE Security and Privacy 2023/DepthFake Spoofing 3D Face Authentication with a 2D Photo.mp4 11.3 MB
- IEEE Security and Privacy 2023/Practically-Exploitable Cryptographic Vulnerabilities in Matrix.mp4 11.3 MB
- IEEE Security and Privacy 2023/Continual Observation under User-level Differential Privacy.mp4 11.3 MB
- IEEE Security and Privacy 2020/TARDIS Rolling Back the Clock on CMS-Targeting Cyber Attacks.mp4 11.3 MB
- IEEE Security and Privacy 2023/PLA-LiDAR Physical Laser Attacks against LiDAR-based 3D Object Detection in Autonomous Vehicle.mp4 11.3 MB
- IEEE Security and Privacy 2021/Happer Unpacking Android Apps via a Hardware-Assisted Approach.mp4 11.3 MB
- IEEE Security and Privacy 2021/ARBITRAR User-Guided API Misuse Detection.mp4 11.2 MB
- IEEE Security and Privacy 2021/Adversarial Watermarking Transformer Towards Tracing Text Provenance with Data Hiding.mp4 11.2 MB
- IEEE Security and Privacy 2023/Scatter and Split Securely Defeating Cache Contention and Occupancy Attacks.mp4 11.2 MB
- IEEE Security and Privacy 2022/Surakav Generating Realistic Traces for a Strong Website Fingerprinting Defense.mp4 11.2 MB
- IEEE Security and Privacy 2023/Precise Detection of Kernel Data Races with Probabilistic Lockset Analysis.mp4 11.2 MB
- IEEE Security and Privacy 2020/SPECCFI Mitigating Spectre Attacks Using CFI Informed Speculation.mp4 11.2 MB
- IEEE Security and Privacy 2020/Towards a Natural Perspective of Smart Homes for Practical Security and Safety Analyses.mp4 11.2 MB
- IEEE Security and Privacy 2023/Understanding the (In)Security of Cross-side Face Verification Systems in Mobile Apps.mp4 11.0 MB
- IEEE Security and Privacy 2023/MPCAuth Multi-factor Authentication for Distributed-trust Systems.mp4 11.0 MB
- IEEE Security and Privacy 2023/XFL Naming Functions in Binaries with Extreme Multi-label Learning.mp4 11.0 MB
- IEEE Security and Privacy 2023/DevIOus Device-Driven Side-Channel Attacks on the IOMMU.mp4 11.0 MB
- IEEE Security and Privacy 2020/Enabling Rack-scale Confidential Computing Using Heterogeneous Trusted Execution Environment.mp4 11.0 MB
- IEEE Security and Privacy 2023/SQUIP Exploiting the Scheduler Queue Contention Side Channel.mp4 11.0 MB
- IEEE Security and Privacy 2023/Three-party Non-linear Computation without Preprocessing for Privacy-preserving Machine Learning.mp4 11.0 MB
- IEEE Security and Privacy 2020/The Last Mile High-Assurance and High-Speed Cryptographic Implementations.mp4 10.9 MB
- IEEE Security and Privacy 2021/Security of Multi-Sensor Fusion based Perception in Autonomous Driving Under Physical-World Attacks.mp4 10.9 MB
- IEEE Security and Privacy 2019/Port Contention for Fun and Profit.mp4 10.9 MB
- IEEE Security and Privacy 2020/Cornucopia Temporal Safety for CHERI Heaps.mp4 10.9 MB
- IEEE Security and Privacy 2020/Private Resource Allocators and Their Applications.mp4 10.9 MB
- IEEE Security and Privacy 2020/Automatic Uncovering of Hidden Behaviors from Input Validation in Mobile Apps.mp4 10.9 MB
- IEEE Security and Privacy 2023/BlindHub Bitcoin-Compatible Privacy-Preserving Payment Channel Hubs Supporting Variable Amounts.mp4 10.9 MB
- IEEE Security and Privacy 2023/Continuous Intrusion Characterizing the Security of Continuous Integration Services.mp4 10.8 MB
- IEEE Security and Privacy 2021/Machine unlearning.mp4 10.8 MB
- IEEE Security and Privacy 2021/On the Anonymity Guarantees of Anonymous Proof-of-Stake Protocols.mp4 10.8 MB
- IEEE Security and Privacy 2023/Rethinking Searchable Symmetric Encryption.mp4 10.8 MB
- IEEE Security and Privacy 2020/Influencing Photo Sharing Decisions on Social Media A Case of Paradoxical Findings.mp4 10.8 MB
- IEEE Security and Privacy 2020/HopSkipJumpAttack A Query-Efficient Decision-Based Attack.mp4 10.8 MB
- IEEE Security and Privacy 2020/Throwing Darts in the Dark Detecting Bots with Limited Data using Neural Data Augmentation.mp4 10.7 MB
- IEEE Security and Privacy 2023/Finding Specification Blind Spots via Fuzz Testing.mp4 10.7 MB
- IEEE Security and Privacy 2020/VerX Safety Verification of Smart Contracts.mp4 10.7 MB
- IEEE Security and Privacy 2020/How Not to Prove Your Election Outcome.mp4 10.7 MB
- IEEE Security and Privacy 2021/Real-World Snapshots vs. Theory Questioning the t-Probing Security Model..mp4 10.7 MB
- IEEE Security and Privacy 2021/Compositional Security for Reentrant Applications.mp4 10.7 MB
- IEEE Security and Privacy 2021/A First Look at Zoombombing.mp4 10.7 MB
- IEEE Security and Privacy 2020/High Precision Open-World Website Fingerprinting.mp4 10.6 MB
- IEEE Security and Privacy 2023/SelectFuzz Efficient Directed Fuzzing with Selective Path Exploration.mp4 10.6 MB
- IEEE Security and Privacy 2022/MeshUp Stateless Cache Side-channel Attack on CPU Mesh.mp4 10.6 MB
- IEEE Security and Privacy 2021/Learning Differentially Private Mechanisms.mp4 10.6 MB
- IEEE Security and Privacy 2021/SoK The Faults in our ASRs An Overview of Attacks against Automatic Speech Recognition and ....mp4 10.6 MB
- IEEE Security and Privacy 2020/Dragonblood Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd.mp4 10.6 MB
- IEEE Security and Privacy 2023/A Security RISC Microarchitectural Attacks on Hardware RISC-V CPUs.mp4 10.6 MB
- IEEE Security and Privacy 2021/Ed25519 Signature Schemes Theory and Practice.mp4 10.6 MB
- IEEE Security and Privacy 2021/Detecting AI Trojans Using Meta Neural Analysis.mp4 10.5 MB
- IEEE Security and Privacy 2020/Fuzzing JavaScript Engines with Aspect-Preserving Mutation.mp4 10.5 MB
- IEEE Security and Privacy 2023/CSIRowhammer - Cryptographic Security and Integrity against Rowhammer.mp4 10.5 MB
- IEEE Security and Privacy 2020/Gesture Authentication for Smartphones Evaluation of Gesture Password Selection Policies.mp4 10.4 MB
- IEEE Security and Privacy 2021/Lightweight Techniques for Private Heavy Hitters.mp4 10.4 MB
- IEEE Security and Privacy 2021/Improving Password Guessing via Representation Learning.mp4 10.4 MB
- IEEE Security and Privacy 2021/When Function Signature Recovery Meets Compiler Optimization.mp4 10.4 MB
- IEEE Security and Privacy 2020/FlyClient Super-Light Clients for Cryptocurrencies.mp4 10.4 MB
- IEEE Security and Privacy 2021/Compositional Non-Interference for Fine-Grained Concurrent Programs.mp4 10.3 MB
- IEEE Security and Privacy 2021/CANnon Reliable and Stealthy Remote Shutdown Attacks via Unaltered Automotive Microcontrollers.mp4 10.3 MB
- IEEE Security and Privacy 2020/Tactical Provenance Analysis our Endpoint Detection and Response Systems.mp4 10.3 MB
- IEEE Security and Privacy 2020/Browsing Unicity On the Limits of Anonymizing Web Tracking Data.mp4 10.3 MB
- IEEE Security and Privacy 2023/Accuracy-Privacy Trade-off in Deep Ensemble A Membership Inference Perspective.mp4 10.3 MB
- IEEE Security and Privacy 2021/An I O Separation Model for Formal Verification of Kernel Implementations.mp4 10.2 MB
- IEEE Security and Privacy 2023/FedRecover Recovering from Poisoning Attacks in Federated Learning using Historical Information.mp4 10.2 MB
- IEEE Security and Privacy 2020/EverCrypt A Fast, Verified, Cross-Platform Cryptographic Provider.mp4 10.2 MB
- IEEE Security and Privacy 2020/Plundervolt Software-Based Fault Injection Attacks against Intel SGX.mp4 10.2 MB
- IEEE Security and Privacy 2021/CrossTalk Speculative Data Leaks Across Cores Are Real.mp4 10.2 MB
- IEEE Security and Privacy 2019/Full speed Fuzzing Reducing Fuzzing Overhead through Coverage-guided Tracing.mp4 10.1 MB
- IEEE Security and Privacy 2023/Low-Cost Privilege Separation with Compile Time Compartmentalization for Embedded Systems.mp4 10.1 MB
- IEEE Security and Privacy 2020/Neutain't Efficient Dynamic Tain't Analysis with Neural Networks.mp4 10.0 MB
- IEEE Security and Privacy 2021/Reading Between the Lines An Extensive Evaluation of the Security and Privacy Implications ....mp4 10.0 MB
- IEEE Security and Privacy 2020/VeriSmart A Highly Precise Safety Verifier for Ethereum Smart Contracts.mp4 10.0 MB
- IEEE Security and Privacy 2019/Resident Evil Understanding Residential IP Proxy as a Dark Service.mp4 10.0 MB
- IEEE Security and Privacy 2021/DICE Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis.mp4 10.0 MB
- IEEE Security and Privacy 2022/DeepCoFFEA Improved Flow Correlation Attacks on Tor via Metric Learning and Amplification.mp4 9.9 MB
- IEEE Security and Privacy 2021/Using Selective Memoization to Defeat Regular Expression Denial of Service (ReDoS).mp4 9.9 MB
- IEEE Security and Privacy 2020/ZEXE Enabling Decentralized Private Computation.mp4 9.9 MB
- IEEE Security and Privacy 2020/OAT Attesting Operation Integrity of Embedded Devices.mp4 9.9 MB
- IEEE Security and Privacy 2021/SIRNN A Math Library for Secure RNN Inference.mp4 9.8 MB
- IEEE Security and Privacy 2020/Measuring Legal Compliance of Banners from IAB Europe's Transparancy and Consent Framework.mp4 9.8 MB
- IEEE Security and Privacy 2021/Which Privacy and Security Attributes Most Impact Consumers' Risk Perception and Willingness to ....mp4 9.8 MB
- IEEE Security and Privacy 2020/Replicated State Machines without Replicated Execution.mp4 9.8 MB
- IEEE Security and Privacy 2021/Keep the Dirt Tain'ted TreeKEM, Adaptively and Actively Secure Continuous Group Key Agreement.mp4 9.8 MB
- IEEE Security and Privacy 2021/Doing good by fighting fraud Ethical anti-fraud systems for mobile payments.mp4 9.8 MB
- IEEE Security and Privacy 2021/Cross Layer Attacks and How to Use Them (for DNS Cache Poisoning, Device Tracking and More).mp4 9.8 MB
- IEEE Security and Privacy 2020/Pangolin Incremental Hybrid Fuzzing with Polyhedral Path Abstraction.mp4 9.8 MB
- IEEE Security and Privacy 2021/Compact Certificates of Collective Knowledge.mp4 9.8 MB
- IEEE Security and Privacy 2020/TRRespass Exploiting the Many Sides of Target Row Refresh.mp4 9.7 MB
- IEEE Security and Privacy 2021/Lockable Signatures for Blockchains Scriptless Scripts for all Signatures.mp4 9.7 MB
- IEEE Security and Privacy 2021/Data Privacy in Trigger-Action IoT Systems.mp4 9.7 MB
- IEEE Security and Privacy 2020/A Comparative Usability Study of FIDO2 Passwordless Authentication.mp4 9.7 MB
- IEEE Security and Privacy 2020/Full-band De-anonymization of Bluetooth Classic Devices.mp4 9.7 MB
- IEEE Security and Privacy 2021/They Would do Better if They Worked Together The Case of Interaction Problems Between Password ....mp4 9.6 MB
- IEEE Security and Privacy 2020/Are Anonymity-Seekers Just like Everybody Else An Analysis of Contributions to Wikipedia from Tor.mp4 9.6 MB
- IEEE Security and Privacy 2020/Detection of Electromagnetic Interference Attacks on Sensor Systems.mp4 9.6 MB
- IEEE Security and Privacy 2022/ShorTor Improving Tor Network Latency via Multi-hop Overlay Routing.mp4 9.6 MB
- IEEE Security and Privacy 2023/ImU Physical Impersonating Attack for Face Recognition System with Natural Style Changes.mp4 9.6 MB
- IEEE Security and Privacy 2023/Locally Differentially Private Frequency Estimation Based on Convolution Framework.mp4 9.6 MB
- IEEE Security and Privacy 2023/SoK Anti-Facial Recognition Technology.mp4 9.6 MB
- IEEE Security and Privacy 2020/CrypTFlow - Secure TensorFlow Inference.mp4 9.6 MB
- IEEE Security and Privacy 2019/Self-Encrypting Deception Weaknesses in the Encryption of Solid State Drives.mp4 9.6 MB
- IEEE Security and Privacy 2020/SoK Understanding the Prevailing Security Vulnerabilities in TrustZone-Assisted TEE Systems.mp4 9.6 MB
- IEEE Security and Privacy 2021/One Engine to Fuzz 'em All Generic Language Processor Testing with Semantic Validation.mp4 9.5 MB
- IEEE Security and Privacy 2020/Meddling Middlemen Empirical Analysis of the Risks of Data-Saving Mobile Browsers.mp4 9.5 MB
- IEEE Security and Privacy 2020/Formal Modelling and Proof in the CHERI Design and Implementation Process.mp4 9.5 MB
- IEEE Security and Privacy 2020/A Programming Framework for Differential Privacy with Accuracy Concentration Bounds.mp4 9.5 MB
- IEEE Security and Privacy 2021/Who is Real Bob Adversarial Attacks on Speaker Recognition Systems.mp4 9.4 MB
- IEEE Security and Privacy 2020/Binsec Rel Efficient Relational Symbolic Execution for Constant-Time at Binary-Level.mp4 9.4 MB
- IEEE Security and Privacy 2020/SoK Cyber Insurance - Technical Challenges and a System Security Roadmap.mp4 9.4 MB
- IEEE Security and Privacy 2020/PMP Cost-Effective Forced Execution with Probabilistic Memory Pre-planning.mp4 9.4 MB
- IEEE Security and Privacy 2021/Bookworm Game Automatic Discovery of LTE Vulnerabilities Through Documentation Analysis.mp4 9.3 MB
- IEEE Security and Privacy 2021/Trouble Over-The-Air An Analysis of FOTA Apps in the Android Ecosystem.mp4 9.3 MB
- IEEE Security and Privacy 2021/Adversary Instantiation Lower bounds for differentially private machine learning.mp4 9.2 MB
- IEEE Security and Privacy 2020/Understanding and Mitigating Security Risks of General Messaging Protocols on IoT Clouds.mp4 9.1 MB
- IEEE Security and Privacy 2022/Transfer Attacks Revisited A Large-Scale Empirical Study in Real Computer Vision Settings.mp4 9.1 MB
- IEEE Security and Privacy 2022/IronMask Versatile Verification of Masking Security.mp4 9.1 MB
- IEEE Security and Privacy 2020/JIT Leaks Inducing Timing Side Channels through Just-In-Time Compilation.mp4 9.1 MB
- IEEE Security and Privacy 2020/SoK Differential Privacy as a Causal Property.mp4 9.1 MB
- IEEE Security and Privacy 2021/NTFUZZ Enabling Type-Aware Kernel Fuzzing on Windows with Static Binary Analysis.mp4 9.1 MB
- IEEE Security and Privacy 2021/HackEd A Pedagogical Analysis of Online Vulnerability Discovery Exercises.mp4 9.0 MB
- IEEE Security and Privacy 2021/Hardware-Software Contracts for Secure Speculation.mp4 9.0 MB
- IEEE Security and Privacy 2021/Systematic Analysis of Randomization-based Protected Cache Architectures.mp4 9.0 MB
- IEEE Security and Privacy 2021/SoK Computer-Aided Cryptography.mp4 9.0 MB
- IEEE Security and Privacy 2021/On the Just-In-Time Discovery of Profit-Generating Transactions in DeFi Protocols.mp4 9.0 MB
- IEEE Security and Privacy 2020/IJON Exploring Deep State Spaces via Fuzzing.mp4 9.0 MB
- IEEE Security and Privacy 2021/SmartPulse Automated Checking of Temporal Properties in Smart Contracts.mp4 9.0 MB
- IEEE Security and Privacy 2021/Trust, But Verify A Longitudinal Analysis Of Android OEM Compliance and Customization.mp4 8.9 MB
- IEEE Security and Privacy 2021/Is Private Learning Possible with Instance Encoding.mp4 8.9 MB
- IEEE Security and Privacy 2015/Opening Remarks of the 2015 IEEE Symposium on Security & Privacy.mp4 8.9 MB
- IEEE Security and Privacy 2020/This PIN Can Be Easily Guessed Analyzing the Security of Smartphone Unlock PINs.mp4 8.9 MB
- IEEE Security and Privacy 2021/MAD-HTLC Because HTLC is Crazy-Cheap to Attack.mp4 8.8 MB
- IEEE Security and Privacy 2021/Proactive Threshold Wallets with Offline Devices.mp4 8.7 MB
- IEEE Security and Privacy 2021/CRYLOGGER Detecting Crypto Misuses Dynamically.mp4 8.6 MB
- IEEE Security and Privacy 2020/Automatically Detecting Bystanders in Photos to Reduce Privacy Risks.mp4 8.6 MB
- IEEE Security and Privacy 2021/High-Frequency Trading on Decentralized On-Chain Exchanges.mp4 8.6 MB
- IEEE Security and Privacy 2021/Diogenes Lightweight Scalable RSA Modulus Generation with a Dishonest Majority.mp4 8.6 MB
- IEEE Security and Privacy 2021/High-Assurance Cryptography in the Spectre Era.mp4 8.6 MB
- IEEE Security and Privacy 2021/How Did That Get In My Phone Unwanted App Distribution on Android Devices.mp4 8.6 MB
- IEEE Security and Privacy 2020/An Analysis of Pre-installed Android Software.mp4 8.5 MB
- IEEE Security and Privacy 2021/Revealer Detecting and Exploiting Regular Expression Denial-of-Service Vulnerabilities.mp4 8.5 MB
- IEEE Security and Privacy 2021/Black Widow Blackbox Data-driven Web Scanning.mp4 8.5 MB
- IEEE Security and Privacy 2020/Message Time of Arrival Codes A Fundamental Primitive for Secure Distance Measurement.mp4 8.5 MB
- IEEE Security and Privacy 2020/The Value of Collaboration in Convex Machine Learning with Differential Privacy.mp4 8.5 MB
- IEEE Security and Privacy 2021/DIFUZZRTL Differential Fuzz Testing to Find CPU Bugs.mp4 8.4 MB
- IEEE Security and Privacy 2020/Sync HotStuff Simple and Practical Synchronous State Machine Replication.mp4 8.2 MB
- IEEE Security and Privacy 2020/RetroWrite Statically Instrumenting COTS Binaries for Fuzzing and Sanitization.mp4 8.2 MB
- IEEE Security and Privacy 2020/SPIDER Enabling Fast Patch Propagation in Related Software Repositories.mp4 8.2 MB
- IEEE Security and Privacy 2021/Runtime Recovery of Web Applications under Zero-Day ReDoS Attacks.mp4 8.2 MB
- IEEE Security and Privacy 2020/Hijacking Transient Execution through Microarchitectural Load Value Injection..mp4 8.1 MB
- IEEE Security and Privacy 2021/A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer.mp4 8.0 MB
- IEEE Security and Privacy 2021/A2L Anonymous Atomic Locks for Scalability in Payment Channel Hubs.mp4 8.0 MB
- IEEE Security and Privacy 2021/Zero Knowledge for Everything and Everyone Fast ZK Processor with Cached ORAM for ANSI C Programs.mp4 8.0 MB
- IEEE Security and Privacy 2021/Proof-of-Learning Definitions and Practice.mp4 7.9 MB
- IEEE Security and Privacy 2021/Detecting Filter List Evasion With Event-Loop-Turn Granularity JavaScript Signatures.mp4 7.9 MB
- IEEE Security and Privacy 2021/CrawlPhish Large-scale Analysis of Client-side Cloaking Techniques in Phishing.mp4 7.9 MB
- IEEE Security and Privacy 2021/Ebb-and-Flow Protocols A Resolution of the Availability-Finality Dilemma.mp4 7.9 MB
- IEEE Security and Privacy 2020/Can Voters Detect Malicious Manipulation of Ballot Marking Devices.mp4 7.8 MB
- IEEE Security and Privacy 2016/Opening Remarks of the 2016 IEEE Symposium on Security & Privacy.mp4 7.8 MB
- IEEE Security and Privacy 2021/Invisible Probe Timing Attacks with PCIe Congestion Side-channel.mp4 7.7 MB
- IEEE Security and Privacy 2021/Response-Hiding Encrypted Ranges Revisiting Security via Parametrized Leakage-Abuse Attacks.mp4 7.7 MB
- IEEE Security and Privacy 2020/Towards Scalable Threshold Cryptosystems.mp4 7.5 MB
- IEEE Security and Privacy 2019/PERUN Virtual Payment Hubs over Cryptographic Currencies.mp4 7.5 MB
- IEEE Security and Privacy 2021/A Decentralized and Encrypted National Gun Registry.mp4 7.5 MB
- IEEE Security and Privacy 2023/On the Evolution of (Hateful) Memes by Means of Multimodal Contrastive Learning.mp4 7.4 MB
- IEEE Security and Privacy 2020/BIAS Bluetooth Impersonation AttackS.mp4 7.3 MB
- IEEE Security and Privacy 2023/Leaking Arbitrarily Many Secrets Any-out-of-Many Proofs and Applications to RingCT Protocols.mp4 7.3 MB
- IEEE Security and Privacy 2023/On The Empirical Effectiveness of Unrealistic Adversarial Hardening Against Realistic Attacks.mp4 7.2 MB
- IEEE Security and Privacy 2021/Pegasus Bridging Polynomial and Non-polynomial Evaluations in Homomorphic Encryption.mp4 7.2 MB
- IEEE Security and Privacy 2021/Manipulation Attacks in Local Differential Privacy.mp4 7.0 MB
- IEEE Security and Privacy 2021/BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures.mp4 7.0 MB
- IEEE Security and Privacy 2021/SGUARD Smart Contracts Made Vulnerability-Free.mp4 6.7 MB
- IEEE Security and Privacy 2021/Journey to the Center of the Cookie Ecosystem Unraveling Actors' Roles and Relationships.mp4 6.6 MB
- IEEE Security and Privacy 2019/Tap 'n Ghost A Compilation of Novel Attack Techniques against Smartphone Touchscreens.mp4 6.4 MB
- IEEE Security and Privacy 2021/DIANE Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices.mp4 6.2 MB
- IEEE Security and Privacy 2019/IEEE S&P 2019 - Awards Ceremony.mp4 4.0 MB
- IEEE Security and Privacy 2019/Neural Cleanse Identifying and Mitigating Backdoor Attacks in Neural Networks.mp4 1.6 MB
- IEEE Security and Privacy 2016/NITRD Panel - Federal Cybersecurity and Privacy R&D Strategic Plans.eng.srt 179.0 KB
- IEEE Security and Privacy 2022/LangSec Keynote Trojan Source and Bad Characters Invisible Hacks and Reluctant Patching.srt 134.4 KB
- IEEE Security and Privacy 2019/IEEE S&P 2019 - 40th Celebration Plenary Session Panel Reflections on four decades of the symposium.eng.srt 105.9 KB
- IEEE Security and Privacy 2016/S&P TC Business Meeting.eng.srt 98.3 KB
- IEEE Security and Privacy 2022/IEEE S&P 2022 Opening Session.srt 90.0 KB
- IEEE Security and Privacy 2023/IEEE S&P 2023 Short Talks.eng.srt 79.2 KB
- IEEE Security and Privacy 2015/CHERI - A Hybrid Capability-System Architecture for Scalable Software Compartmentalization.eng.srt 77.3 KB
- IEEE Security and Privacy 2017/SoK - Science, Security, and the Elusive Goal of Security as a Scientific Pursuit.eng.srt 75.3 KB
- IEEE Security and Privacy 2018/Routing Around Congestion - Defeating DDoS Attacks and Adverse Network Conditions via Reactive....eng.srt 73.5 KB
- IEEE Security and Privacy 2017/Cloak and Dagger - From Two Permissions to Complete Control of the UI Feedback Loop.eng.srt 72.0 KB
- IEEE Security and Privacy 2015/On Subnormal Floating Point and Abnormal Timing.eng.srt 69.6 KB
- IEEE Security and Privacy 2017/Towards Evaluating the Robustness of Neural Networks.eng.srt 67.9 KB
- IEEE Security and Privacy 2016/A2 - Analog Malicious Hardware.eng.srt 67.6 KB
- IEEE Security and Privacy 2017/Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate.eng.srt 66.2 KB
- IEEE Security and Privacy 2016/A Practical Oblivious Map Data Structure with Secure Deletion and History Independence.eng.srt 66.0 KB
- IEEE Security and Privacy 2018/Computer Security and Privacy for Refugees in the United States.eng.srt 64.9 KB
- IEEE Security and Privacy 2018/Double-efficient zkSNARKs Without Trusted Setup.eng.srt 64.5 KB
- IEEE Security and Privacy 2018/Protecting the Stack with Metadata Policies and Tagged Hardware.eng.srt 64.3 KB
- IEEE Security and Privacy 2015/SoK - Research Perspectives and Challenges for Bitcoin and Cryptocurrencies.eng.srt 64.2 KB
- IEEE Security and Privacy 2019/IEEE S&P 2019 - TC Business Meeting.eng.srt 64.0 KB
- IEEE Security and Privacy 2018/EnclaveDB - A Secure Database using SGX.eng.srt 63.9 KB
- IEEE Security and Privacy 2018/The Cards Aren't Alright - Detecting Counterfeit Gift Cards Using Encoding Jitter.eng.srt 63.9 KB
- IEEE Security and Privacy 2018/Hackers vs. Testers - A Comparison of Software Vulnerability Discovery Processes.eng.srt 62.9 KB
- IEEE Security and Privacy 2016/Verifiable ASICs.eng.srt 62.8 KB
- IEEE Security and Privacy 2016/Data-Oriented Programming - On the Expressiveness of Non-Control Data Attacks.eng.srt 62.7 KB
- IEEE Security and Privacy 2016/TriggerScope - Towards Detecting Logic Bombs in Android Applications.eng.srt 62.6 KB
- IEEE Security and Privacy 2016/The Cracked Cookie Jar - HTTP Cookie Hijacking and the Exposure of Private Information.eng.srt 62.6 KB
- IEEE Security and Privacy 2015/Riposte - An Anonymous Messaging System Handling Millions of Users.eng.srt 62.4 KB
- IEEE Security and Privacy 2015/Ad Injection at Scale - Assessing Deceptive Advertisement Modifications.eng.srt 61.9 KB
- IEEE Security and Privacy 2016/LAVA - Large-scale Automated Vulnerability Addition.eng.srt 61.6 KB
- IEEE Security and Privacy 2015/Missing the Point(er) - On the Effectiveness of Code Pointer Integrity.eng.srt 61.4 KB
- IEEE Security and Privacy 2018/Another Flip in the Wall of Rowhammer Defenses.eng.srt 60.8 KB
- IEEE Security and Privacy 2018/Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels.eng.srt 60.1 KB
- IEEE Security and Privacy 2018/Enumerating Active IPv6 Hosts for Large-scale Security Scans via DNSSEC-signed Reverse Zones.eng.srt 60.1 KB
- IEEE Security and Privacy 2018/When Your Fitness Tracker Betrays You - Quantifying the Predictability....eng.srt 60.0 KB
- IEEE Security and Privacy 2018/Towards Security and Privacy for Multi User Augmented Reality.eng.srt 59.6 KB
- IEEE Security and Privacy 2017/Scalable Bias-Resistant Distributed Randomness.eng.srt 59.2 KB
- IEEE Security and Privacy 2016/Keeping Authorities - Honest or Bust - with Decentralized Witness Cosigning.eng.srt 59.0 KB
- IEEE Security and Privacy 2018/Blue Note - How Intentional Acoustic Interference Damages Availablity and Integrity -.eng.srt 59.0 KB
- IEEE Security and Privacy 2017/A Lustrum of Malware Network Communication - Evolution and Insights.eng.srt 58.9 KB
- IEEE Security and Privacy 2017/SoK - Cryptographically Protected Database Search.eng.srt 58.3 KB
- IEEE Security and Privacy 2015/Geppetto - Versatile Verifiable Computation.eng.srt 57.5 KB
- IEEE Security and Privacy 2017/IKP - Turning a PKI Around with Decentralized Automated Incentives.eng.srt 57.4 KB
- IEEE Security and Privacy 2018/PIR with Compressed Queries and Amortized Query Processing.eng.srt 57.4 KB
- IEEE Security and Privacy 2018/Bulletproofs - Short Proofs for Confidential Transactions and More.eng.srt 57.4 KB
- IEEE Security and Privacy 2017/HVLearn - Automated Black-box Analysis of Hostname Verification in SSL TLS Implementations.eng.srt 57.3 KB
- IEEE Security and Privacy 2015/Virtual Proofs of Reality and their Physical Implementation.eng.srt 57.3 KB
- IEEE Security and Privacy 2017/Is Interaction Necessary for Distributed Private Learning.eng.srt 57.2 KB
- IEEE Security and Privacy 2018/A Formal Treatment of Accountable Proxying over TLS.eng.srt 57.1 KB
- IEEE Security and Privacy 2017/Catena - Efficient Non-equivocation via Bitcoin.eng.srt 56.9 KB
- IEEE Security and Privacy 2017/Norax - Enabling Execute-Only Memory for COTS Binaries on AArch64.eng.srt 56.8 KB
- IEEE Security and Privacy 2018/Tracking Ransomware End-to-end.eng.srt 56.4 KB
- IEEE Security and Privacy 2016/Helping Johnny to Analyze Malware - A Usability-Optimized Decompiler and Malware Analysis User Study.eng.srt 56.3 KB
- IEEE Security and Privacy 2017/Hardening Java's Access Control by Abolishing Implicit Privilege Elevation.eng.srt 56.2 KB
- IEEE Security and Privacy 2016/Beauty and the Beast - Diverting modern web browsers to build unique browser fingerprints.eng.srt 56.1 KB
- IEEE Security and Privacy 2017/Spotless Sandboxes - Evading Malware Analysis Systems using Wear-and-Tear Artifacts.eng.srt 56.0 KB
- IEEE Security and Privacy 2017/Backward-bounded DSE - Targeting Infeasibility Questions on Obfuscated Codes.eng.srt 55.8 KB
- IEEE Security and Privacy 2017/Securing Augmented Reality Output.eng.srt 55.6 KB
- IEEE Security and Privacy 2015/How Secure and Quick is QUIC Provable Security and Performance Analyses.eng.srt 55.5 KB
- IEEE Security and Privacy 2018/Enabling Autonomous IoT Device Pairing using Different Sensor Types.eng.srt 55.4 KB
- IEEE Security and Privacy 2017/From Trash to Treasure - Timing-Sensitive Garbage Collection.eng.srt 55.2 KB
- IEEE Security and Privacy 2018/xJsnark - A Framework for Efficient Verifiable Computation.eng.srt 55.2 KB
- IEEE Security and Privacy 2017/Pyramid - Enhancing Selectivity in Big Data Protection with Count Featurization.eng.srt 55.0 KB
- IEEE Security and Privacy 2015/A Messy State of the Union - Taming the Composite State Machines of TLS.eng.srt 55.0 KB
- IEEE Security and Privacy 2016/Hawk - The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts.eng.srt 54.5 KB
- IEEE Security and Privacy 2018/Learning from Mutants - Using Code Mutation to Learn and Monitor Invariants of a CPS.eng.srt 54.5 KB
- IEEE Security and Privacy 2016/Security Analysis of Emerging Smart Home Applications.eng.srt 54.1 KB
- IEEE Security and Privacy 2017/Leakage-Abuse Attacks on Order-Revealing Encryption.eng.srt 54.1 KB
- IEEE Security and Privacy 2016/Synthesizing Plausible Privacy-Preserving Location Traces.eng.srt 54.0 KB
- IEEE Security and Privacy 2017/How They Did It - An Analysis of Emission Defeat Devices in Modern Automobiles.eng.srt 53.7 KB
- IEEE Security and Privacy 2018/Tracking Certificate Misissuance in the Wild.eng.srt 53.7 KB
- IEEE Security and Privacy 2018/vRAM - Faster Verifiable RAM With Program-Independent Preprocessing.eng.srt 53.7 KB
- IEEE Security and Privacy 2015/The Miner's Dilemma.eng.srt 53.4 KB
- IEEE Security and Privacy 2016/SoK - Everyone Hates Robocalls - A Survey of Techniques against Telephone Spam.eng.srt 53.3 KB
- IEEE Security and Privacy 2015/GenoGuard - Protecting Genomic Data against Brute-Force Attacks.eng.srt 52.8 KB
- IEEE Security and Privacy 2015/Program-Adaptive Mutational Fuzzing.eng.srt 52.7 KB
- IEEE Security and Privacy 2015/VC3 - Trustworthy Data Analytics in the Cloud Using SGX.eng.srt 52.6 KB
- IEEE Security and Privacy 2018/Understanding Linux Malware.eng.srt 52.6 KB
- IEEE Security and Privacy 2016/CaSE - Cache-Assisted Secure Execution on ARM Processors.eng.srt 52.5 KB
- IEEE Security and Privacy 2016/Algorithmic Transparency via Quantitative Input Influence ....eng.srt 52.5 KB
- IEEE Security and Privacy 2018/Grand Pwning Unit - Accelerating Microarchitectural Attacks with the GPU.eng.srt 52.5 KB
- IEEE Security and Privacy 2017/SymCerts - Practical Symbolic Execution For Exposing Noncompliance in X.509 Certificate Validation.eng.srt 52.3 KB
- IEEE Security and Privacy 2016/Back in Black - Towards Formal, Black Box Analysis of Sanitizers and Filters.eng.srt 52.3 KB
- IEEE Security and Privacy 2015/Counterfeit Object-oriented Programming.eng.srt 52.2 KB
- IEEE Security and Privacy 2015/Privacy and Access Control for Outsourced Personal Records.eng.srt 52.2 KB
- IEEE Security and Privacy 2017/Hijacking Bitcoin - Routing Attacks on Cryptocurrencies.eng.srt 52.1 KB
- IEEE Security and Privacy 2017/SmarPer - Context-Aware and Automatic Runtime-Permissions for Mobile Devices - YouTube.eng.srt 52.0 KB
- IEEE Security and Privacy 2018/Opening Remarks of the 39th IEEE Symposium on Security & Privacy.eng.srt 51.9 KB
- IEEE Security and Privacy 2018/Privacy Risks with Facebook's PII-based Targeting.eng.srt 51.8 KB
- IEEE Security and Privacy 2022/Membership inference attacks from first principles.srt 51.8 KB
- IEEE Security and Privacy 2015/Last-Level Cache Side-Channel Attacks are Practical.eng.srt 51.6 KB
- IEEE Security and Privacy 2017/Protecting Bare-metal Embedded Systems with Privilege Overlays.eng.srt 51.6 KB
- IEEE Security and Privacy 2018/Distance-Bounding Protocols - Verification without Time and Location.eng.srt 51.5 KB
- IEEE Security and Privacy 2017/Comparing the Usability of Cryptographic APIs.eng.srt 51.5 KB
- IEEE Security and Privacy 2017/SoK - Exploiting Network Printers.eng.srt 51.4 KB
- IEEE Security and Privacy 2018/SoK - Keylogging Side Channels.eng.srt 51.3 KB
- IEEE Security and Privacy 2015/Forward Secure Asynchronous Messaging from Puncturable Encryption.eng.srt 51.2 KB
- IEEE Security and Privacy 2016/Shreds - Fine-grained Execution Units with Private Memory.eng.srt 51.1 KB
- IEEE Security and Privacy 2016/Following Devil's Footprints - Cross-Platform Analysis of Potentially Harmful Libraries ....eng.srt 51.0 KB
- IEEE Security and Privacy 2016/pASSWORD tYPOS and How to Correct Them Securely.eng.srt 50.9 KB
- IEEE Security and Privacy 2018/The Rise of the Citizen Developer - Assessing the Security Impact of Online App Generators.eng.srt 50.6 KB
- IEEE Security and Privacy 2016/You Get Where You're Looking For - The Impact Of Information Sources On Code Security.eng.srt 50.6 KB
- IEEE Security and Privacy 2015/Cross-Architecture Bug Search in Binary Executables.eng.srt 50.4 KB
- IEEE Security and Privacy 2018/Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage.eng.srt 50.4 KB
- IEEE Security and Privacy 2017/NEZHA - Efficient Domain-independent Differential Testing.eng.srt 50.4 KB
- IEEE Security and Privacy 2017/A Framework for Universally Composable Diffie-Hellman Key Exchange.eng.srt 50.3 KB
- IEEE Security and Privacy 2018/Speechless - Analyzing the Threat to Speech Privacy from Smartphone Motion Sensors.eng.srt 50.2 KB
- IEEE Security and Privacy 2017/Finding and Preventing Bugs in JavaScript Bindings.eng.srt 50.1 KB
- IEEE Security and Privacy 2018/On Enforcing the Digital Immunity of a Large Humanitarian Organization.eng.srt 50.1 KB
- IEEE Security and Privacy 2015/ADSNARK - Nearly Practical and Privacy-Preserving Proofs on Authenticated Data.eng.srt 49.9 KB
- IEEE Security and Privacy 2015/Micro-Policies - Formally Verified, Tag-Based Security Monitors.eng.srt 49.9 KB
- IEEE Security and Privacy 2018/On the Economics of Offline Password Cracking.eng.srt 49.7 KB
- IEEE Security and Privacy 2016/Prepose - Privacy, Security, and Reliability for Gesture-Based Programming.eng.srt 49.7 KB
- IEEE Security and Privacy 2018/FP-Stalker - Tracking Browser Fingerprint Evolutions - Antoine Vastel.eng.srt 49.6 KB
- IEEE Security and Privacy 2016/On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud.eng.srt 49.6 KB
- IEEE Security and Privacy 2017/Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping.eng.srt 49.4 KB
- IEEE Security and Privacy 2017/IoT Goes Nuclear - Creating a Zigbee Chain Reaction.eng.srt 49.3 KB
- IEEE Security and Privacy 2017/One TPM to Bind Them All - Fixing TPM2.0 for Provably Secure Anonymous Attestation.eng.srt 49.3 KB
- IEEE Security and Privacy 2022/Security Foundations for Application-Based Covert Communication Channels.srt 49.2 KB
- IEEE Security and Privacy 2017/Optimized Honest-Majority MPC for Malicious Adversaries - Breaking 1 Billion-Gate Second Barrier.eng.srt 49.2 KB
- IEEE Security and Privacy 2015/S$A - A Shared Cache Attack That Works across Cores and Defies VM Sandboxing ....eng.srt 49.0 KB
- IEEE Security and Privacy 2016/Return to the Zombie Gadgets - Undermining Destructive Code Reads via Code-Inference Attacks.eng.srt 49.0 KB
- IEEE Security and Privacy 2018/A Tale of Two Studies - The Best and Worst of YubiKey Usability.eng.srt 48.9 KB
- IEEE Security and Privacy 2018/Manipulating Machine Learning - Poisoning Attacks & Countermeasures.eng.srt 48.9 KB
- IEEE Security and Privacy 2018/Oblix - An Efficient Oblivious Search Index.eng.srt 48.7 KB
- IEEE Security and Privacy 2016/MitM Attack by Name Collision - Cause Analysis and Vulnerability Assessment in the New gTLD Era.eng.srt 48.6 KB
- IEEE Security and Privacy 2017/Identifying Personal DNA Methylation Profiles by Genotype Inference.eng.srt 48.6 KB
- IEEE Security and Privacy 2017/vSQL - Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases.eng.srt 48.3 KB
- IEEE Security and Privacy 2016/Distillation as a Defense to Adversarial Perturbations against Deep Neural Networks.eng.srt 48.1 KB
- IEEE Security and Privacy 2022/Evaluating Physical-Layer BLE Location Tracking Attacks on Mobile Devices.srt 48.0 KB
- IEEE Security and Privacy 2018/Implementing Conjunction Obfuscation under Entropic Ring LWE.eng.srt 47.7 KB
- IEEE Security and Privacy 2022/Invisible Finger Practical Electromagnetic Interference Attack on Touchscreen Electronic Devices.srt 47.5 KB
- IEEE Security and Privacy 2015/Malicious-Client Security in Blind Seer - A Scalable Private DBMS.eng.srt 47.5 KB
- IEEE Security and Privacy 2016/HDFI - Hardware-Assisted Data-Flow Isolation.eng.srt 47.5 KB
- IEEE Security and Privacy 2016/Users Really Do Plug in USB Drives They Find.eng.srt 47.4 KB
- IEEE Security and Privacy 2015/Bitcoin over Tor isn't a Good Idea.eng.srt 47.2 KB
- IEEE Security and Privacy 2017/XHOUND - Quantifying the Fingerprintability of Browser Extensions.eng.srt 47.0 KB
- IEEE Security and Privacy 2018/Mobile Application Web API Reconnaissance.eng.srt 46.9 KB
- IEEE Security and Privacy 2015/What the App is That Deception and Countermeasures in the Android User Interface.eng.srt 46.8 KB
- IEEE Security and Privacy 2015/Post-Quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors Problem.eng.srt 46.8 KB
- IEEE Security and Privacy 2022/HardLog Practical Tamper-Proof System Auditing Using a Novel Audit Device.srt 46.3 KB
- IEEE Security and Privacy 2018/FuturesMEX - Secure, Distributed Futures Market Exchange.eng.srt 46.0 KB
- IEEE Security and Privacy 2018/A Machine Learning Approach to Prevent Malicious Calls Over Telephony Networks.eng.srt 45.9 KB
- IEEE Security and Privacy 2017/Stack Overflow Considered Harmful -- The Impact of Copy&Paste on Android Application Security.eng.srt 45.9 KB
- IEEE Security and Privacy 2016/Domain-Z - 28 Registrations Later.eng.srt 45.8 KB
- IEEE Security and Privacy 2018/Sonar - Detecting SS7 Redirection Attacks With Audio-Based Distance Bounding.eng.srt 45.8 KB
- IEEE Security and Privacy 2017/Obstacles to the Adoption of Secure Communication Tools.eng.srt 45.6 KB
- IEEE Security and Privacy 2015/Temporal Lensing and Its Application in Pulsing Denial-of-Service Attacks.eng.srt 45.6 KB
- IEEE Security and Privacy 2018/SoK - Plug & Pray - Today - Understanding USB Insecurity in Versions 1 through C.eng.srt 45.3 KB
- IEEE Security and Privacy 2022/CirC Compiler infrastructure for proof systems, software verification, and more.srt 45.2 KB
- IEEE Security and Privacy 2017/CoSMeDis - A Distributed Social Media Platform with Formally Verified Confidentiality Guarantees.eng.srt 45.1 KB
- IEEE Security and Privacy 2017/VUDDY - A Scalable Approach for Vulnerable Code Clone Discovery.eng.srt 45.1 KB
- IEEE Security and Privacy 2015/ObliVM - A Programming Framework for Secure Computation.eng.srt 44.9 KB
- IEEE Security and Privacy 2016/Cinderella - Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with ....eng.srt 44.9 KB
- IEEE Security and Privacy 2019/Spectre Attacks Exploiting Speculative Execution.eng.srt 44.8 KB
- IEEE Security and Privacy 2017/Side-Channel Attacks on Shared Search Indexes.eng.srt 44.8 KB
- IEEE Security and Privacy 2016/Key Confirmation in Key Exchange - A Formal Treatment and Implications for TLS 1.3.eng.srt 44.8 KB
- IEEE Security and Privacy 2015/Every Second Counts - Quantifying the Negative Externalities of Cybercrime via Typosquatting.eng.srt 44.8 KB
- IEEE Security and Privacy 2022/Measuring and Mitigating the Risk of IP Reuse on Public Clouds.srt 44.7 KB
- IEEE Security and Privacy 2022/Asleep at the Keyboard Assessing the Security of GitHub Copilot's Code Contributions.srt 44.7 KB
- IEEE Security and Privacy 2017/SecureML - A System for Scalable Privacy-Preserving Machine Learning.eng.srt 44.7 KB
- IEEE Security and Privacy 2018/Stealing Hyperparameters in Machine Learning.eng.srt 44.6 KB
- IEEE Security and Privacy 2022/TASHAROK-Using Mechanism Design for Enhancing Security Resource Allocation in Interdependent Systems.srt 44.6 KB
- IEEE Security and Privacy 2017/CRLite - A Scalable System for Pushing All TLS Revocations to All Browsers.eng.srt 44.6 KB
- IEEE Security and Privacy 2016/SoK - (State of) The Art of War - Offensive Techniques in Binary Analysis.eng.srt 44.6 KB
- IEEE Security and Privacy 2017/Augur - Internet-Wide Detection of Connectivity Disruptions.eng.srt 44.4 KB
- IEEE Security and Privacy 2015/Effective Real-Time Android Application Auditing.eng.srt 44.4 KB
- IEEE Security and Privacy 2018/Anonymity Trilemma - Strong Anonymity, Low Bandwidth Overhead, Low Latency -- Choose Two.eng.srt 44.4 KB
- IEEE Security and Privacy 2018/Study and Mitigation of Origin Stripping Vulnerabilities in Hybrid-postMessage Enabled Mobile Apps.eng.srt 44.1 KB
- IEEE Security and Privacy 2022/Domains Do Change Their Spots Quantifying Potential Abuse of Residual Trust.srt 43.9 KB
- IEEE Security and Privacy 2022/Automated Attack Synthesis by Extracting Finite State Machines from Protocol Specification Documents.srt 43.8 KB
- IEEE Security and Privacy 2019/New Primitives for Actively-Secure MPC over Rings with Applications to Private Machine Learning.eng.srt 43.6 KB
- IEEE Security and Privacy 2022/SoK Social Cybersecurity.srt 43.5 KB
- IEEE Security and Privacy 2016/PhotoProof - Cryptographic Image Authentication for Any Set of Permissible Transformations.eng.srt 43.5 KB
- IEEE Security and Privacy 2016/SoK - Towards Grounding Censorship Circumvention in Empiricism.eng.srt 43.5 KB
- IEEE Security and Privacy 2016/Cache Storage Channels - Alias-Driven Attacks and Verified Countermeasures.eng.srt 43.5 KB
- IEEE Security and Privacy 2018/T-Fuzz Fuzzing by Program Transformation - Hui Peng.eng.srt 43.4 KB
- IEEE Security and Privacy 2016/Automated Analysis and Verification of TLS 1.3 - 0-RTT, Resumption and Delayed Authentication.eng.srt 43.4 KB
- IEEE Security and Privacy 2022/SwarmFlawFinder Discovering and Exploiting Logic Flaws of Swarm Algorithms.srt 43.4 KB
- IEEE Security and Privacy 2019/Fidelius Protecting User Secrets from Compromised Browsers.eng.srt 43.4 KB
- IEEE Security and Privacy 2015/A Generic Approach to Automatic Deobfuscation of Executable Code.eng.srt 43.3 KB
- IEEE Security and Privacy 2019/Full speed Fuzzing Reducing Fuzzing Overhead through Coverage-guided Tracing.eng.srt 43.1 KB
- IEEE Security and Privacy 2022/SpecHammer Combining Spectre and Rowhammer for New Speculative Attacks.srt 42.9 KB
- IEEE Security and Privacy 2015/Using Hardware Features for Increased Debugging Transparency.eng.srt 42.9 KB
- IEEE Security and Privacy 2022/Wobfuscator Obfuscating JavaScript Malware via Opportunistic Translation to WebAssembly.srt 42.8 KB
- IEEE Security and Privacy 2017/Counter-RAPTOR - Safeguarding Tor Against Active Routing Attacks.eng.srt 42.8 KB
- IEEE Security and Privacy 2022/Mitigating Information Leakage Vulnerabilities with Type-based Data Isolation.srt 42.7 KB
- IEEE Security and Privacy 2017/Your Exploit is Mine - Automatic Shellcode Transplant for Remote Exploits.eng.srt 42.5 KB
- IEEE Security and Privacy 2018/EyeTell - Video-Assisted Touchscreen Keystroke Inference from Eye Movements.eng.srt 42.4 KB
- IEEE Security and Privacy 2015/SurroundWeb - Mitigating Privacy Concerns in a 3D Web Browser.eng.srt 42.4 KB
- IEEE Security and Privacy 2022/Privacy-from-Birth Protecting Sensed Data from Malicious Sensors with VERSA.srt 42.4 KB
- IEEE Security and Privacy 2022/Phishing in Organizations Findings from a Large-Scale and Long-Term Study.srt 42.4 KB
- IEEE Security and Privacy 2016/Multiple Handshakes Security of TLS 1.3 Candidates.eng.srt 42.3 KB
- IEEE Security and Privacy 2017/An Experimental Security Analysis of an Industrial Robot Controller.eng.srt 42.1 KB
- IEEE Security and Privacy 2017/To Catch a Ratter - Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild.eng.srt 42.0 KB
- IEEE Security and Privacy 2022/Bad Characters Imperceptible NLP Attacks.srt 42.0 KB
- IEEE Security and Privacy 2018/Racing in Hyperspace - Closing Hyper Threading Side Channels on SGX.eng.srt 41.8 KB
- IEEE Security and Privacy 2015/High System-Code Security with Low Overhead.eng.srt 41.7 KB
- IEEE Security and Privacy 2016/Talos - Neutralizing Vulnerabilities with Security Workarounds for Rapid Response.eng.srt 41.7 KB
- IEEE Security and Privacy 2018/Impossibility of Precise and Sound Termination-Sensitive Security Enforcements.eng.srt 41.7 KB
- IEEE Security and Privacy 2016/A Method for Verifying Privacy-Type Properties - The Unbounded Case.eng.srt 41.6 KB
- IEEE Security and Privacy 2017/Machine-Checked Proofs of Privacy for Electronic Voting Protocols.eng.srt 41.5 KB
- IEEE Security and Privacy 2022/Delay Wreaks Havoc on Your Smart Home Delay-based Automation Interference Attacks.srt 41.5 KB
- IEEE Security and Privacy 2017/Membership Inference Attacks against Machine Learning Models.eng.srt 41.5 KB
- IEEE Security and Privacy 2018/Static Evaluation of Noninterference using Approximate Model Counting.eng.srt 41.4 KB
- IEEE Security and Privacy 2022/Reconstructing Training Data with Informed Adversaries.srt 41.2 KB
- IEEE Security and Privacy 2022/Investigating Influencer VPN Ads on YouTube.srt 41.1 KB
- IEEE Security and Privacy 2015/Readactor - Practical Code Randomization Resilient to Memory Disclosure.eng.srt 41.1 KB
- IEEE Security and Privacy 2017/SysPal System-guided Pattern Locks for Android.eng.srt 40.9 KB
- IEEE Security and Privacy 2016/TaoStore - Overcoming Asynchronicity in Oblivious Data Storage.eng.srt 40.8 KB
- IEEE Security and Privacy 2018/FPGA-Based Remote Power Side-Channel Attacks.eng.srt 40.8 KB
- IEEE Security and Privacy 2022/They're not that hard to mitigate -What Cryptographic Library Developers Think About Timing Attacks.srt 40.6 KB
- IEEE Security and Privacy 2019/True2F Backdoor resistant authentication tokens Emma Dauterman.eng.srt 40.5 KB
- IEEE Security and Privacy 2019/PhishFarm A Scalable Framework for Measuring the Effectivness of Evasion Techniques Against....eng.srt 40.4 KB
- IEEE Security and Privacy 2018/DEEPSEC - Deciding Equivalence Properties in Security Protocols - Theory and Practice.eng.srt 40.4 KB
- IEEE Security and Privacy 2018/Surveylance - Automatically Detecting Online Survey Scams.eng.srt 40.3 KB
- IEEE Security and Privacy 2015/The Attack of the Clones - A Study of the Impact of Shared Code on Vulnerability Patching.eng.srt 40.2 KB
- IEEE Security and Privacy 2022/De-Identification's Impact on Minority Representation and Privacy Preservation in the US Census.srt 39.9 KB
- IEEE Security and Privacy 2022/Scraping Sticky Leftovers App User Information Left on Servers After Account Deletion.srt 39.9 KB
- IEEE Security and Privacy 2022/mmSpy Spying Phone Calls using mmWave Radars.srt 39.8 KB
- IEEE Security and Privacy 2015/Controlled-Channel Attacks - Deterministic Side Channels for Untrusted Operating Systems.eng.srt 39.8 KB
- IEEE Security and Privacy 2015/Leave Me Alone - App-Level Protection against Runtime Information Gathering on Android.eng.srt 39.7 KB
- IEEE Security and Privacy 2022/How Does Usable Security Not End Up in Software Products Results From a Qualitative Interview Study.srt 39.7 KB
- IEEE Security and Privacy 2017/Verifying and Synthesizing Constant-Resource Implementations with Types.eng.srt 39.6 KB
- IEEE Security and Privacy 2016/Inferring User Routes and Locations using Zero-Permission Mobile Sensors.eng.srt 39.6 KB
- IEEE Security and Privacy 2022/Practical Asynchronous Distributed Key Generation.srt 39.6 KB
- IEEE Security and Privacy 2022/Peekaboo A Hub-Based Approach to Enable Transparency in Data Processing within Smart Homes.srt 39.5 KB
- IEEE Security and Privacy 2019/Should I Worry A Cross Cultural Examination of Account Security Incident Response.eng.srt 39.5 KB
- IEEE Security and Privacy 2015/Vetting SSL Usage in Applications with SSLINT.eng.srt 39.2 KB
- IEEE Security and Privacy 2015/Protecting Private Keys against Memory Disclosure Attacks Using Hardware Transactional Memory.eng.srt 39.2 KB
- IEEE Security and Privacy 2015/Understanding and Monitoring Embedded Web Scripts.eng.srt 39.2 KB
- IEEE Security and Privacy 2022/Cats vs. Spectre An Axiomatic Approach to Modeling Speculative Execution Attacks.srt 38.8 KB
- IEEE Security and Privacy 2022/DeepSteal Advanced Model Extractions Leveraging Efficient Weight Stealing in Memories.srt 38.7 KB
- IEEE Security and Privacy 2022/Finding and Exploiting CPU Features using MSR Templating.srt 38.7 KB
- IEEE Security and Privacy 2022/How Not to Protect Your IP - An Industry-Wide Break of IEEE 1735 Implementations.srt 38.6 KB
- IEEE Security and Privacy 2022/Spiral Fast, High-Rate Single-Server PIR via FHE Composition.srt 38.6 KB
- IEEE Security and Privacy 2022/Private Nearest Neighbor Search with Sublinear Communication and Malicious Security.srt 38.6 KB
- IEEE Security and Privacy 2022/Using Throughput-Centric Byzantine Broadcast to Tolerate Malicious Majority in Blockchains.srt 38.6 KB
- IEEE Security and Privacy 2023/Examining Zero-Shot Vulnerability Repair with Large Language Models.eng.srt 38.5 KB
- IEEE Security and Privacy 2022/The Experts' Insights on the Peer Review Process of Evaluating Security Papers.srt 38.4 KB
- IEEE Security and Privacy 2022/ZeeStar Private Smart Contracts by Homomorphic Encryption and Zero-knowledge Proofs.srt 38.3 KB
- IEEE Security and Privacy 2015/Towards Making Systems Forget with Machine Unlearning.eng.srt 38.2 KB
- IEEE Security and Privacy 2022/A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP.srt 38.2 KB
- IEEE Security and Privacy 2022/TROLLMAGNIFIER Detecting State-Sponsored Troll Accounts on Reddit.srt 38.2 KB
- IEEE Security and Privacy 2022/WtaGraph Web Tracking and Advertising Detection using Graph Neural Networks.srt 38.1 KB
- IEEE Security and Privacy 2019/Dominance as a New Trusted Computing Primitive for the IoT.eng.srt 38.1 KB
- IEEE Security and Privacy 2022/MatRiCT More Efficient Post-Quantum Private Blockchain Payments.srt 38.1 KB
- IEEE Security and Privacy 2022/BEACON - Directed Grey-Box Fuzzing with Provable Path Pruning.srt 38.0 KB
- IEEE Security and Privacy 2018/Compiler-assisted Code Randomization.eng.srt 38.0 KB
- IEEE Security and Privacy 2019/Iodine Fast Dynamic Tain't Tracking Using Rollback free Optimistic Hybrid Analysis.eng.srt 37.8 KB
- IEEE Security and Privacy 2022/Sphinx Enabling Privacy-Preserving Online Learning over the Cloud.srt 37.6 KB
- IEEE Security and Privacy 2022/Waldo A Private Time-Series Database from Function Secret-Sharing.srt 37.6 KB
- IEEE Security and Privacy 2022/Back to the Drawing Board A Critical Evaluation of Poisoning Attacks on Federated Learning.srt 37.5 KB
- IEEE Security and Privacy 2022/Anti-Tamper Radio System-Level Tamper Detection for Computing Systems.srt 37.4 KB
- IEEE Security and Privacy 2017/IVD - Automatic Learning and Enforcement of Authorization Rules in Online Social Networks - YouTube.eng.srt 37.3 KB
- IEEE Security and Privacy 2019/RIDL Rogue In-Flight Data Load.eng.srt 37.3 KB
- IEEE Security and Privacy 2015/TinyGarble - Highly Compressed and Scalable Sequential Garbled Circuits.eng.srt 37.2 KB
- IEEE Security and Privacy 2019/Postcards from the Post HTTP World Amplification of HTTPS Vulnerabilities in the Web Ecosystem.eng.srt 37.1 KB
- IEEE Security and Privacy 2022/SAILFISH Vetting Smart Contract State-Inconsistency Bugs in Seconds.srt 37.1 KB
- IEEE Security and Privacy 2022/IRShield A Countermeasure Against Adversarial Physical-Layer Wireless Sensing.srt 37.1 KB
- IEEE Security and Privacy 2017/Multi-touch Authentication Using Hand Geometry and Behavioral Information.eng.srt 37.1 KB
- IEEE Security and Privacy 2022/vSGX Virtualizing SGX Enclaves on AMD SEV.srt 37.0 KB
- IEEE Security and Privacy 2019/Proof Of Stake Sidechains.eng.srt 37.0 KB
- IEEE Security and Privacy 2018/Angora - Efficient Fuzzing by Principled Search.eng.srt 37.0 KB
- IEEE Security and Privacy 2019/Formally Verified Cryptographic Web Applications in WebAssembly.eng.srt 36.9 KB
- IEEE Security and Privacy 2022/BadEncoder Backdoor Attacks to Pre-trained Encoders in Self-Supervised Learning.srt 36.9 KB
- IEEE Security and Privacy 2021/SoK An Overview of FHE Compilers and Tools.eng.srt 36.8 KB
- IEEE Security and Privacy 2022/Blacksmith Compromising Target Row Refresh by Rowhammering in the Frequency Domain.srt 36.8 KB
- IEEE Security and Privacy 2022/Transcending TRANSCEND Revisiting Malware Classification in the Presence of Concept Drift.srt 36.7 KB
- IEEE Security and Privacy 2022/PCR-Auth Solving Authentication Puzzle Challenges with Encoded Palm Contact Responses.srt 36.6 KB
- IEEE Security and Privacy 2022/Desperate Times Call for Desperate Measures - User Concerns with Mobile Loan Apps in Kenya.srt 36.5 KB
- IEEE Security and Privacy 2022/Heapster Analyzing the Security of Dynamic Allocators for Monolithic Firmware Images.srt 36.5 KB
- IEEE Security and Privacy 2022/Noise A Library of Verified High-Performance Secure Channel Protocol Implementations.srt 36.5 KB
- IEEE Security and Privacy 2019/XCLAIM Trustless Interoperable Cryptocurrency Backed Assets.eng.srt 36.3 KB
- IEEE Security and Privacy 2022/SYMBEXCEL Automated Analysis and Understanding of Malicious Excel 4.0 Macros.srt 36.3 KB
- IEEE Security and Privacy 2022/Sabre Sender-Anonymous Messaging with Fast Audits.srt 36.3 KB
- IEEE Security and Privacy 2015/Caelus - Verifying the Consistency of Cloud Services with Battery-Powered Devices.eng.srt 36.2 KB
- IEEE Security and Privacy 2019/Does Certificate Transparency Break the Web Measuring Adoption and Error Rate.eng.srt 36.1 KB
- IEEE Security and Privacy 2022/FuzzUSB Hybrid Stateful Fuzzing of USB Gadget Stacks.srt 36.1 KB
- IEEE Security and Privacy 2022/Investigating the Use of Email Encryption for an Entire University.srt 36.0 KB
- IEEE Security and Privacy 2015/Secure Track Verification.eng.srt 36.0 KB
- IEEE Security and Privacy 2016/Downgrade Resilience in Key-Exchange Protocols.eng.srt 35.9 KB
- IEEE Security and Privacy 2022/Hark A Deep Learning System for Navigating Privacy Feedback at Scale.srt 35.9 KB
- IEEE Security and Privacy 2019/If HTTPS Were Secure I wouldn't Need 2FA End User and Administrator Mental Models of HTTPS.eng.srt 35.6 KB
- IEEE Security and Privacy 2022/Adversarial Prefetch New Cross-Core Cache Side Channel Attacks.srt 35.5 KB
- IEEE Security and Privacy 2023/ELSA Secure Aggregation for Federated Learning with Malicious Actors.eng.srt 35.4 KB
- IEEE Security and Privacy 2023/RAB Provable Robustness Against Backdoor Attacks.eng.srt 35.4 KB
- IEEE Security and Privacy 2016/I Think They're Trying to Tell Me Something - Advice Sources and Selection for Digital Security.eng.srt 35.3 KB
- IEEE Security and Privacy 2016/A Tough call - Mitigating Advanced Code-Reuse Attacks At The Binary Level.eng.srt 35.3 KB
- IEEE Security and Privacy 2019/Hard Drive of Hearing Disks that Eavesdrop with a Synthesized Microphone.eng.srt 35.3 KB
- IEEE Security and Privacy 2018/Secure Device Bootstrapping without Secrets Resistant to Signal Manipulation Attacks.eng.srt 35.2 KB
- IEEE Security and Privacy 2022/PGPATCH Policy-Guided Logic Bug Patching for Robotic Vehicles.srt 35.1 KB
- IEEE Security and Privacy 2019/SoK Shining Light on Shadow Stacks.eng.srt 35.1 KB
- IEEE Security and Privacy 2019/Kiss from a Rogue Evaluating Detectability of Pay-at-the-Pump Card Skimmers.eng.srt 35.1 KB
- IEEE Security and Privacy 2016/Cloak of Visibility - Detecting When Machines Browse a Different Web.eng.srt 35.0 KB
- IEEE Security and Privacy 2019/SoK General Purpose Frameworks for Secure Multi-Party Computation.eng.srt 35.0 KB
- IEEE Security and Privacy 2022/IRQDebloat Reducing Driver Attack Surface in Embedded Devices.srt 34.8 KB
- IEEE Security and Privacy 2021/SoK Hate, Harassment, and the Changing Landscape of Online Abuse.eng.srt 34.8 KB
- IEEE Security and Privacy 2019/How Well Do My Results Generalize Comparing Security and Privacy Survey Results from....eng.srt 34.8 KB
- IEEE Security and Privacy 2019/PERUN Virtual Payment Hubs over Cryptographic Currencies.eng.srt 34.7 KB
- IEEE Security and Privacy 2023/Teaching and Learning Cybersecurity and AI Ethics in High School.eng.srt 34.7 KB
- IEEE Security and Privacy 2022/SecFloat Accurate Floating-Point meets Secure 2-Party Computation.srt 34.7 KB
- IEEE Security and Privacy 2016/Staying Secure and Unprepared - Understanding and Mitigating the Security Risks of Apple ZeroConf.eng.srt 34.7 KB
- IEEE Security and Privacy 2022/The State of the SameSite Studying the Usage, Effectiveness, and Adequacy of SameSite Cookies.srt 34.7 KB
- IEEE Security and Privacy 2019/Simple High-Level Code for Cryptographic Arithmetic - With Proofs, Without Compromises.eng.srt 34.5 KB
- IEEE Security and Privacy 2019/Self-Encrypting Deception Weaknesses in the Encryption of Solid State Drives.eng.srt 34.5 KB
- IEEE Security and Privacy 2015/Automatic Inference of Search Patterns for Tain't-Style Vulnerabilities.eng.srt 34.4 KB
- IEEE Security and Privacy 2022/PICCOLO Exposing Complex Backdoors in NLP Transformer Models.srt 34.4 KB
- IEEE Security and Privacy 2022/SoK Unifying and Applying At-Risk User Research.srt 34.4 KB
- IEEE Security and Privacy 2018/Locally Differentially Private Frequent Itemset Mining.eng.srt 34.3 KB
- IEEE Security and Privacy 2015/SoK - Secure Messaging.eng.srt 34.3 KB
- IEEE Security and Privacy 2019/Attack Directories, Not Caches Side Channel Attacks in a Non Inclusive World.eng.srt 34.3 KB
- IEEE Security and Privacy 2021/A Decentralized and Encrypted National Gun Registry.eng.srt 34.3 KB
- IEEE Security and Privacy 2022/A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols.srt 34.3 KB
- IEEE Security and Privacy 2022/RT-TEE Real-time System Availability for Cyber-physical Systems using ARM TrustZone.srt 34.3 KB
- IEEE Security and Privacy 2022/Publicly Accountable Robust Multi-Party Computation.srt 34.2 KB
- IEEE Security and Privacy 2019/Reasoning Analytically About Password Cracking Software Alex Liu.eng.srt 34.1 KB
- IEEE Security and Privacy 2023/Threshold BBS Signatures for Distributed Anonymous Credential Issuance.eng.srt 34.0 KB
- IEEE Security and Privacy 2023/WaVe A Verifiably Secure WebAssembly Sandboxing Runtime.eng.srt 34.0 KB
- IEEE Security and Privacy 2022/Adversarial Examples - for Proof-of-Learning.srt 34.0 KB
- IEEE Security and Privacy 2019/Neural Cleanse Identifying and Mitigating Backdoor Attacks in Neural Networks.eng.srt 33.9 KB
- IEEE Security and Privacy 2016/No Pardon for the Interruption - New Inference Attacks on Android Through Interrupt Timing Analysis.eng.srt 33.9 KB
- IEEE Security and Privacy 2019/Synesthesia Detecting Screen Content via Remote Acoustic Side Channels.eng.srt 33.9 KB
- IEEE Security and Privacy 2019/EmPoWeb Empowering Web Applications with Browser Extensions.eng.srt 33.8 KB
- IEEE Security and Privacy 2023/RoFL Robustness of Secure Federated Learning.eng.srt 33.8 KB
- IEEE Security and Privacy 2022/How to Attack and Generate Honeywords.srt 33.8 KB
- IEEE Security and Privacy 2015/Cracking-Resistant Password Vaults Using Natural Language Encoders.eng.srt 33.8 KB
- IEEE Security and Privacy 2022/A Formal Security Analysis of the W3C Web Payment APIs Attacks and Verification.srt 33.7 KB
- IEEE Security and Privacy 2019/LBM A Security Framework for Peripherals within the Linux Kernel.eng.srt 33.7 KB
- IEEE Security and Privacy 2022/ShadeWatcher Recommendation-guided Cyber Threat Analysis using System Audit Records.srt 33.7 KB
- IEEE Security and Privacy 2023/Vulnerability Discovery for All Experiences of Marginalization in Vulnerability Discovery.eng.srt 33.6 KB
- IEEE Security and Privacy 2019/Theory and Practice of Finding Eviction Sets.eng.srt 33.5 KB
- IEEE Security and Privacy 2023/Security and Privacy Challenges, Advice, and Opportunities at Cybercafes in Kenya.eng.srt 33.5 KB
- IEEE Security and Privacy 2022/Copy, Right A Testing Framework for Copyright Protection of Deep Learning Models.srt 33.4 KB
- IEEE Security and Privacy 2016/High-Speed Inter-domain Fault Localization.eng.srt 33.4 KB
- IEEE Security and Privacy 2023/Space Odyssey An Experimental Software Security Analysis of Satellites.eng.srt 33.4 KB
- IEEE Security and Privacy 2021/Doing good by fighting fraud Ethical anti-fraud systems for mobile payments.eng.srt 33.3 KB
- IEEE Security and Privacy 2022/PROTRR Principled yet Optimal In-DRAM Target Row Refresh.srt 33.1 KB
- IEEE Security and Privacy 2022/Formal Model-Driven Discovery of Bluetooth Protocol Design Vulnerabilities.srt 33.1 KB
- IEEE Security and Privacy 2022/Property Inference from Poisoning.srt 33.1 KB
- IEEE Security and Privacy 2022/Locally Differentially Private Sparse Vector Aggregation.srt 33.0 KB
- IEEE Security and Privacy 2019/NEUZZ Efficient Fuzzing with Neural Program Smoothing.eng.srt 33.0 KB
- IEEE Security and Privacy 2019/Towards Practical Differentialy Private Convex Optimization.eng.srt 33.0 KB
- IEEE Security and Privacy 2018/AI2 - Safety and Robustness Certification of Neural Networks.eng.srt 33.0 KB
- IEEE Security and Privacy 2022/Deployment of Source Address Validation by Network Operators A Randomized Control Trial.srt 32.9 KB
- IEEE Security and Privacy 2022/Mind the Gap Studying the Insecurity of Provably Secure Embedded Trusted Execution Architectures.srt 32.9 KB
- IEEE Security and Privacy 2022/SNARKBlock Federated Anonymous Blocklisting from Hidden Common Input Aggregate Proofs.srt 32.9 KB
- IEEE Security and Privacy 2016/Revisiting Square Root ORAM - Efficient Random Access in Multi-Party Computation.eng.srt 32.9 KB
- IEEE Security and Privacy 2022/Statistical Quantification of Differential Privacy A Local Approach.srt 32.9 KB
- IEEE Security and Privacy 2019/Redactable Blockchain in the Permissionless Setting.eng.srt 32.8 KB
- IEEE Security and Privacy 2022/Spook.js Attacking Chrome Strict Site Isolation via Speculative Execution.srt 32.8 KB
- IEEE Security and Privacy 2021/Diogenes Lightweight Scalable RSA Modulus Generation with a Dishonest Majority.eng.srt 32.7 KB
- IEEE Security and Privacy 2022/Universal Atomic Swaps Secure Exchange of Coins Across All Blockchains.srt 32.7 KB
- IEEE Security and Privacy 2022/Graphics Peeping Unit Exploiting EM Side-Channel Information of GPUs to Eavesdrop on Your Neighbors.srt 32.7 KB
- IEEE Security and Privacy 2023/Blue's Clues Practical Discovery of Non-Discoverable Bluetooth Devices.eng.srt 32.7 KB
- IEEE Security and Privacy 2021/Bitcoin-Compatible Virtual Channels.eng.srt 32.5 KB
- IEEE Security and Privacy 2022/Spinning Language Models Risks of Propaganda-as-a-Service and Countermeasures.srt 32.5 KB
- IEEE Security and Privacy 2023/Blue Is the New Black (Market) Privacy Leaks and Re-Victimization from Police-Auctioned Cellphones.eng.srt 32.5 KB
- IEEE Security and Privacy 2019/Towards Automated Safety Vetting of PLC Code in Real World Plants Mu Zhang.eng.srt 32.5 KB
- IEEE Security and Privacy 2016/Sending out an SMS - Characterizing the Security of the SMS Ecosystem with Public Gateways.eng.srt 32.5 KB
- IEEE Security and Privacy 2022/SoK How Robust is Image Classification Deep Neural Network Watermarking.srt 32.5 KB
- IEEE Security and Privacy 2022/SoK Authentication in Augmented and Virtual Reality.srt 32.4 KB
- IEEE Security and Privacy 2019/Differentially Private Model Publishing For Deep Learning.eng.srt 32.2 KB
- IEEE Security and Privacy 2021/Is Private Learning Possible with Instance Encoding.eng.srt 32.1 KB
- IEEE Security and Privacy 2019/Threshold ECDSA from ECDSA Assumptions The Multiparty Case.eng.srt 32.1 KB
- IEEE Security and Privacy 2021/SoK Computer-Aided Cryptography.eng.srt 32.0 KB
- IEEE Security and Privacy 2019/Asm2Vec Boosting Static Representation Robustness for Binary Clone Search....eng.srt 32.0 KB
- IEEE Security and Privacy 2019/Ouroboros Crypsinous Privacy Preserving Proof of Stake.eng.srt 32.0 KB
- IEEE Security and Privacy 2022/K-Scheduler Effective Seed Scheduling for Fuzzing with Graph Centrality Analysis.srt 32.0 KB
- IEEE Security and Privacy 2023/Is Cryptographic Deniability Sufficient Non-Expert Perceptions of Deniability in Secure Messaging.eng.srt 31.9 KB
- IEEE Security and Privacy 2023/Hide and Seek with Spectres Efficient discovery of speculative vulnerabilities with random testing.eng.srt 31.9 KB
- IEEE Security and Privacy 2021/HackEd A Pedagogical Analysis of Online Vulnerability Discovery Exercises.eng.srt 31.7 KB
- IEEE Security and Privacy 2016/Seeking Nonsense, Looking for Trouble - Efficient Promotional-Infection Detection through ....eng.srt 31.7 KB
- IEEE Security and Privacy 2021/Adversarial Watermarking Transformer Towards Tracing Text Provenance with Data Hiding.eng.srt 31.7 KB
- IEEE Security and Privacy 2021/Trust, But Verify A Longitudinal Analysis Of Android OEM Compliance and Customization.eng.srt 31.7 KB
- IEEE Security and Privacy 2017/Under the Shadow of Sunshine - Understanding & Detecting Bulletproof Hosting.eng.srt 31.6 KB
- IEEE Security and Privacy 2023/SoK A Critical Evaluation of Efficient Website Fingerprinting Defenses.eng.srt 31.6 KB
- IEEE Security and Privacy 2019/CaSym Cache Aware Symbolic Execution for Side Channel Detection and Mitigation.eng.srt 31.6 KB
- IEEE Security and Privacy 2022/Exploit the Last Straw That Breaks Android Systems.srt 31.6 KB
- IEEE Security and Privacy 2021/SmartPulse Automated Checking of Temporal Properties in Smart Contracts.eng.srt 31.5 KB
- IEEE Security and Privacy 2022/Why Crypto-detectors Fail A Systematic Evaluation of Cryptographic Misuse Detection Techniques.srt 31.5 KB
- IEEE Security and Privacy 2022/ProVerif with Lemmas, Induction, Fast Subsumption, and Much More.srt 31.5 KB
- IEEE Security and Privacy 2021/STOCHFUZZ Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic ....eng.srt 31.5 KB
- IEEE Security and Privacy 2019/SensorID Sensor Calibration Fingerprinting for Smartphones.eng.srt 31.4 KB
- IEEE Security and Privacy 2022/SoK Practical Foundations for Software Spectre Defenses.srt 31.4 KB
- IEEE Security and Privacy 2022/DeepCASE Semi-Supervised Contextual Analysis of Security Events.srt 31.4 KB
- IEEE Security and Privacy 2022/Jigsaw Efficient and Scalable Path Constraints Fuzzing.srt 31.4 KB
- IEEE Security and Privacy 2022/HAMRAZ Resilient Partitioning and Replication.srt 31.4 KB
- IEEE Security and Privacy 2019/Helen Maliciously Secure Coopetitive Learning for Linear Models.eng.srt 31.4 KB
- IEEE Security and Privacy 2021/Compact Certificates of Collective Knowledge.eng.srt 31.3 KB
- IEEE Security and Privacy 2022/COBRA Dynamic Proactive Secret Sharing for Confidential BFT Services.srt 31.3 KB
- IEEE Security and Privacy 2021/Epochal Signatures for Deniable Group Chats.eng.srt 31.3 KB
- IEEE Security and Privacy 2022/Four Attacks and a Proof for Telegram.srt 31.2 KB
- IEEE Security and Privacy 2019/Exploiting Correcting Codes On the Effectiveness of ECC Memory Against Rowhammer Attacks.eng.srt 31.2 KB
- IEEE Security and Privacy 2023/Silph A Framework for Scalable and Accurate Generation of Hybrid MPC Protocols.eng.srt 31.1 KB
- IEEE Security and Privacy 2022/IronMask Versatile Verification of Masking Security.srt 31.1 KB
- IEEE Security and Privacy 2019/SoK Sanitizing for Security Dokyung Song.eng.srt 31.0 KB
- IEEE Security and Privacy 2023/MEGA Malleable Encryption Goes Awry.eng.srt 31.0 KB
- IEEE Security and Privacy 2019/Characterizing Pixel Tracking through the Lens of Disposable Email Services.eng.srt 31.0 KB
- IEEE Security and Privacy 2022/SPURT Scalable Distributed Randomness Beacon with Transparent Setup.srt 31.0 KB
- IEEE Security and Privacy 2023/Private Eye On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing.eng.srt 30.9 KB
- IEEE Security and Privacy 2021/High-Assurance Cryptography in the Spectre Era.eng.srt 30.9 KB
- IEEE Security and Privacy 2021/Self-Supervised Euphemism Detection and Identification for Content Moderation.eng.srt 30.8 KB
- IEEE Security and Privacy 2019/Measuring and Analyzing Search Engine Poisoning of Linguistic Collisions.eng.srt 30.8 KB
- IEEE Security and Privacy 2022/Differentially Private Histograms in the Shuffle Model from Fake Users.srt 30.7 KB
- IEEE Security and Privacy 2023/Shedding Light on Inconsistencies in Grid Cybersecurity Disconnects and Recommendations.eng.srt 30.7 KB
- IEEE Security and Privacy 2019/Certified Robustness to Adversarial Examples with Differential Privacy.eng.srt 30.7 KB
- IEEE Security and Privacy 2021/Zero Knowledge for Everything and Everyone Fast ZK Processor with Cached ORAM for ANSI C Programs.eng.srt 30.6 KB
- IEEE Security and Privacy 2022/Augury Using Data Memory-Dependent Prefetchers to Leak Data at Rest.srt 30.6 KB
- IEEE Security and Privacy 2019/Drones' Cryptanalysis - Detecting Privacy Invasion Attacks Conducted by Drone.eng.srt 30.5 KB
- IEEE Security and Privacy 2021/Bookworm Game Automatic Discovery of LTE Vulnerabilities Through Documentation Analysis.eng.srt 30.3 KB
- IEEE Security and Privacy 2023/SoK History is a Vast Early Warning System Auditing the Provenance of System Intrusions.eng.srt 30.3 KB
- IEEE Security and Privacy 2019/Short Text, Large Effect Measuring the Impact of User Reviews on Android App Security & Privacy.eng.srt 30.3 KB
- IEEE Security and Privacy 2019/Security of GPS INS based On-road Location Tracking Systems.eng.srt 30.2 KB
- IEEE Security and Privacy 2021/SoK The Faults in our ASRs An Overview of Attacks against Automatic Speech Recognition and ....eng.srt 30.2 KB
- IEEE Security and Privacy 2022/Model Orthogonalization Class Distance Hardening in Neural Networks for Better Security.srt 30.1 KB
- IEEE Security and Privacy 2022/Practical EMV Relay Protection.srt 30.1 KB
- IEEE Security and Privacy 2021/CanDID Bootstrapping Decentralized Identity from Legacy Providers.eng.srt 30.1 KB
- IEEE Security and Privacy 2023/Skilled or Gullible Gender Stereotypes Related to Computer Security and Privacy.eng.srt 30.0 KB
- IEEE Security and Privacy 2023/FLUTE Fast and Secure Lookup Table Evaluations.eng.srt 30.0 KB
- IEEE Security and Privacy 2022/Arbitrary Modulation of Electromagnetic Noise from Unprivileged Software Impacting Emission Security.srt 30.0 KB
- IEEE Security and Privacy 2019/The Code That Never Ran Modeling Attacks on Speculative Evaluation.eng.srt 30.0 KB
- IEEE Security and Privacy 2023/Certifiably Robust Object Detection against Patch Hiding Attacks via Patch-agnostic Masking.eng.srt 29.9 KB
- IEEE Security and Privacy 2019/Port Contention for Fun and Profit.eng.srt 29.9 KB
- IEEE Security and Privacy 2019/Breaking LTE on Layer Two.eng.srt 29.9 KB
- IEEE Security and Privacy 2019/Understanding the Security of ARM Debugging Features.eng.srt 29.9 KB
- IEEE Security and Privacy 2023/SCAPHY Detecting Modern ICS Attacks by Correlating Behaviors in SCADA and PHYsical.eng.srt 29.9 KB
- IEEE Security and Privacy 2023/OWL Compositional Verification of Security Protocols via an Information-Flow Type System.eng.srt 29.9 KB
- IEEE Security and Privacy 2023/PCspooF Compromising the Safety of Time-Triggered Ethernet.eng.srt 29.8 KB
- IEEE Security and Privacy 2021/Systematic Analysis of Randomization-based Protected Cache Architectures.eng.srt 29.7 KB
- IEEE Security and Privacy 2021/A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer.eng.srt 29.7 KB
- IEEE Security and Privacy 2022/A Secret-Free Hypervisor Rethinking Isolation in the Age of Speculative Vulnerabilities.srt 29.7 KB
- IEEE Security and Privacy 2015/Connection-Oriented DNS to Improve Privacy and Security.eng.srt 29.6 KB
- IEEE Security and Privacy 2022/Surakav Generating Realistic Traces for a Strong Website Fingerprinting Defense.srt 29.6 KB
- IEEE Security and Privacy 2019/SoK Security Evaluation of Home Based IoT Deployment.eng.srt 29.5 KB
- IEEE Security and Privacy 2022/LinkTeller Recovering Private Edges from Graph Neural Networks via Influence Analysis.srt 29.5 KB
- IEEE Security and Privacy 2023/One Key to Rule Them All Secure Group Pairing for Heterogeneous IoT Devices.eng.srt 29.4 KB
- IEEE Security and Privacy 2023/Not Yet Another Digital ID Privacy-preserving Humanitarian Aid Distribution.eng.srt 29.4 KB
- IEEE Security and Privacy 2019/Demystifying Hidden Privacy Settings in Mobile Apps.eng.srt 29.3 KB
- IEEE Security and Privacy 2023/Multi-Round Single-Server Secure Aggregation with Applications to Private Federated Learning.eng.srt 29.3 KB
- IEEE Security and Privacy 2016/Dedup Est Machina - Memory Deduplication as an Advanced Exploitation Vector.eng.srt 29.2 KB
- IEEE Security and Privacy 2022/Universal 3-Dimensional Perturbations for Black-Box Attacks on Video Recognition Systems.srt 29.1 KB
- IEEE Security and Privacy 2021/Many-out-of-Many Proofs and Applications to Anonymous Zether.eng.srt 29.1 KB
- IEEE Security and Privacy 2022/SoK The Dual Nature of Technology in Sexual Assault.srt 29.0 KB
- IEEE Security and Privacy 2019/On the Feasibility of Rerouting-Based DDoS Defenses.eng.srt 29.0 KB
- IEEE Security and Privacy 2021/Electromagnetic Covert Channels Can Be Super Resilient.eng.srt 28.9 KB
- IEEE Security and Privacy 2023/On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security.eng.srt 28.9 KB
- IEEE Security and Privacy 2021/Using Selective Memoization to Defeat Regular Expression Denial of Service (ReDoS).eng.srt 28.9 KB
- IEEE Security and Privacy 2019/Lay Down the Common Metrics Evaluating Proof of Work Consensus Protocols' Security.eng.srt 28.9 KB
- IEEE Security and Privacy 2022/Security Analysis of the MLS Key Derivation.srt 28.9 KB
- IEEE Security and Privacy 2023/Deep perceptual hashing algorithms with hidden dual purpose client-side scanning facial recognition.eng.srt 28.9 KB
- IEEE Security and Privacy 2019/ProFuzzer On-the-fly Input Type Probing for Better Zero-day Vulnerability Discovery.eng.srt 28.8 KB
- IEEE Security and Privacy 2023/Practically-Exploitable Cryptographic Vulnerabilities in Matrix.eng.srt 28.8 KB
- IEEE Security and Privacy 2021/Lightweight Techniques for Private Heavy Hitters.eng.srt 28.8 KB
- IEEE Security and Privacy 2021/Hear No Evil, See Kenansville Efficient and Transferable Black-Box Attacks on Automatic ....eng.srt 28.8 KB
- IEEE Security and Privacy 2023/PyFET Forensically Equivalent Transformation for Python Binary Decompilation.eng.srt 28.7 KB
- IEEE Security and Privacy 2021/ARBITRAR User-Guided API Misuse Detection.eng.srt 28.6 KB
- IEEE Security and Privacy 2019/Touching the Untouchables Dynamic Security Analysis of the LTE Control Plane.eng.srt 28.6 KB
- IEEE Security and Privacy 2023/TELEPATH A Minecraft-based Covert Communication System.eng.srt 28.6 KB
- IEEE Security and Privacy 2022/Model Stealing Attacks Against Inductive Graph Neural Networks.srt 28.5 KB
- IEEE Security and Privacy 2019/Razzer Finding Kernel Race Bugs through Fuzzing.eng.srt 28.5 KB
- IEEE Security and Privacy 2023/Confident Monte Carlo Rigorous Analysis of Guessing Curves for Probabilistic Password Models.eng.srt 28.5 KB
- IEEE Security and Privacy 2019/IEEE S&P 2019 - Opening Remarks - Program Chair.eng.srt 28.5 KB
- IEEE Security and Privacy 2021/Detecting Filter List Evasion With Event-Loop-Turn Granularity JavaScript Signatures.eng.srt 28.5 KB
- IEEE Security and Privacy 2023/Typing High-Speed Cryptography against Spectre v1.eng.srt 28.4 KB
- IEEE Security and Privacy 2021/Good Bot, Bad Bot Characterizing Automated Browsing Activity.eng.srt 28.4 KB
- IEEE Security and Privacy 2023/Breaking Security-Critical Voice Authentication.eng.srt 28.4 KB
- IEEE Security and Privacy 2023/The Leaky Web Automated Discovery of Cross-Site Information Leaks in Browsers and the Web.eng.srt 28.4 KB
- IEEE Security and Privacy 2019/Resident Evil Understanding Residential IP Proxy as a Dark Service.eng.srt 28.4 KB
- IEEE Security and Privacy 2022/Exposed Infrastructures-Discovery, Attacks and Remediation of Insecure ICS Remote Management Devices.srt 28.2 KB
- IEEE Security and Privacy 2023/WeRLman To Tackle Whale (Transactions), Go Deep (RL).eng.srt 28.2 KB
- IEEE Security and Privacy 2022/Repairing DoS Vulnerability of Real-World Regexes.srt 28.1 KB
- IEEE Security and Privacy 2019/Comprehensive Privacy Analysis of Deep Learning.eng.srt 28.0 KB
- IEEE Security and Privacy 2022/Time-Print Authenticating USB Flash Drives with Novel Timing Fingerprints.srt 28.0 KB
- IEEE Security and Privacy 2021/OSPREY Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary.eng.srt 28.0 KB
- IEEE Security and Privacy 2021/They Would do Better if They Worked Together The Case of Interaction Problems Between Password ....eng.srt 28.0 KB
- IEEE Security and Privacy 2023/LazyTAP On-Demand Data Minimization for Trigger-Action Applications.eng.srt 28.0 KB
- IEEE Security and Privacy 2023/Adaptive Risk-Limiting Comparison Audits.eng.srt 27.9 KB
- IEEE Security and Privacy 2022/Attacks on Wireless Coexistence.srt 27.9 KB
- IEEE Security and Privacy 2022/SMILE Secure Memory Introspection for Live Enclave.srt 27.9 KB
- IEEE Security and Privacy 2015/Securing Multiparty Online Services Via Certification of Symbolic Transactions.eng.srt 27.9 KB
- IEEE Security and Privacy 2021/SoK Quantifying Cyber Risk.eng.srt 27.9 KB
- IEEE Security and Privacy 2022/Analyzing Ground-Truth Data of Mobile Gambling Scam.srt 27.9 KB
- IEEE Security and Privacy 2021/Security of Multi-Sensor Fusion based Perception in Autonomous Driving Under Physical-World Attacks.eng.srt 27.8 KB
- IEEE Security and Privacy 2022/Are We There Yet Timing and Floating-Point Attacks on Differential Privacy Systems.srt 27.8 KB
- IEEE Security and Privacy 2022/GREBE Unveiling Exploitation Potential for Linux Kernel Bugs.srt 27.8 KB
- IEEE Security and Privacy 2019/On the Security of Two-Round Multi-Signatures.eng.srt 27.7 KB
- IEEE Security and Privacy 2023/Leveraging Sandboxes for a Minimally Invasive Browser Fingerprinting Defense.eng.srt 27.7 KB
- IEEE Security and Privacy 2023/DVFS Frequently Leaks Secrets Hertzbleed Attacks Beyond SIKE, Cryptography, and CPU-Only Data.eng.srt 27.7 KB
- IEEE Security and Privacy 2023/IPvSeeYou Exploiting Leaked Identifiers in IPv6 for Street-Level Geolocation.eng.srt 27.7 KB
- IEEE Security and Privacy 2021/A Secure and Formally Verified Linux KVM Hypervisor.eng.srt 27.7 KB
- IEEE Security and Privacy 2023/Collaborative Ad Transparency Promises and Limitations.eng.srt 27.6 KB
- IEEE Security and Privacy 2023/SPHINCSC Compressing SPHINCS With (Almost) No Cost.eng.srt 27.6 KB
- IEEE Security and Privacy 2023/Rethinking Searchable Symmetric Encryption.eng.srt 27.5 KB
- IEEE Security and Privacy 2021/Proof-of-Learning Definitions and Practice.eng.srt 27.5 KB
- IEEE Security and Privacy 2021/The EMV Standard Break, Fix, Verify.eng.srt 27.5 KB
- IEEE Security and Privacy 2021/NTFUZZ Enabling Type-Aware Kernel Fuzzing on Windows with Static Binary Analysis.eng.srt 27.4 KB
- IEEE Security and Privacy 2021/Which Privacy and Security Attributes Most Impact Consumers' Risk Perception and Willingness to ....eng.srt 27.4 KB
- IEEE Security and Privacy 2021/PLATYPUS Software-based Power Side-Channel Attacks on x86.eng.srt 27.4 KB
- IEEE Security and Privacy 2023/Practical Timing Side-Channel Attacks on Memory Compression.eng.srt 27.3 KB
- IEEE Security and Privacy 2023/When and Why Do People Want Ad Targeting Explanations Evidence from a Mixed-Methods Field Study.eng.srt 27.3 KB
- IEEE Security and Privacy 2022/Committed to Trust A Qualitative Study on Security & Trust in Open Source Software Projects.srt 27.3 KB
- IEEE Security and Privacy 2023/No Privacy in the Electronics Repair Industry.eng.srt 27.3 KB
- IEEE Security and Privacy 2021/Method Confusion Attack on the Bluetooth Pairing Process.eng.srt 27.2 KB
- IEEE Security and Privacy 2021/DP-Sniper Black-Box Discovery of Differential Privacy Violations using Classifiers.eng.srt 27.1 KB
- IEEE Security and Privacy 2022/DeepCoFFEA Improved Flow Correlation Attacks on Tor via Metric Learning and Amplification.srt 27.1 KB
- IEEE Security and Privacy 2021/Cross-Domain Access Control Encryption - Arbitrary-policy, Constant-size, Efficient.eng.srt 27.1 KB
- IEEE Security and Privacy 2023/Bitcoin-Enhanced Proof-of-Stake Security Possibilities and Impossibilities.eng.srt 27.1 KB
- IEEE Security and Privacy 2023/From 5G Sniffing to Harvesting Leakages of Privacy-Preserving Messengers.eng.srt 27.1 KB
- IEEE Security and Privacy 2019/Bitcoin vs. Bitcoin Cash Coexistence or Downfall of Bitcoin Cash.eng.srt 27.1 KB
- IEEE Security and Privacy 2022/SIRAJ A Unified Framework for Aggregation of Malicious Entity Detectors.srt 27.1 KB
- IEEE Security and Privacy 2023/On the (In)security of Peer-to-Peer Decentralized Machine Learning.eng.srt 27.0 KB
- IEEE Security and Privacy 2023/Deepfake Text Detection Limitations and Opportunities.eng.srt 27.0 KB
- IEEE Security and Privacy 2021/Wolverine Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and ....eng.srt 26.9 KB
- IEEE Security and Privacy 2019/Dangerous Skills Understanding and Mitigating Security Risks of Voice-Controlled Third-Party....eng.srt 26.9 KB
- IEEE Security and Privacy 2023/Understanding the Security and Privacy Attitudes of Smart Home Users on Reddit.eng.srt 26.9 KB
- IEEE Security and Privacy 2019/F-BLEAU Fast Black-box Leakage Estimation.eng.srt 26.9 KB
- IEEE Security and Privacy 2023/GraphSPD Graph-Based Security Patch Detection with Enriched Code Semantics.eng.srt 26.8 KB
- IEEE Security and Privacy 2023/It’s (DOM) Clobbering Time Attack Techniques, Prevalence, and Defenses.eng.srt 26.8 KB
- IEEE Security and Privacy 2023/SNAP Efficient Extraction of Private Properties with Poisoning.eng.srt 26.8 KB
- IEEE Security and Privacy 2023/Detection of Inconsistencies in Privacy Practices of Browser Extensions.eng.srt 26.7 KB
- IEEE Security and Privacy 2023/Always Contribute Back A Qualitative Study on Security Challenges of the Open Source Supply Chain.eng.srt 26.7 KB
- IEEE Security and Privacy 2021/Ebb-and-Flow Protocols A Resolution of the Availability-Finality Dilemma.eng.srt 26.7 KB
- IEEE Security and Privacy 2019/SoK The Challenges Pitfalls and Perils of Using Hardware Performance Counters for Security.eng.srt 26.7 KB
- IEEE Security and Privacy 2021/Merkle2 A Low-Latency Transparency Log System.eng.srt 26.7 KB
- IEEE Security and Privacy 2023/Characterizing Everyday Misuse of Smart Home Devices.eng.srt 26.7 KB
- IEEE Security and Privacy 2019/Fuzzing File Systems via Two-Dimensional Input Space Exploration.eng.srt 26.6 KB
- IEEE Security and Privacy 2023/REGA Scalable Rowhammer Mitigation with Refresh-Generating Activations.eng.srt 26.6 KB
- IEEE Security and Privacy 2023/User Perceptions and Experiences with Smart Home Updates.eng.srt 26.6 KB
- IEEE Security and Privacy 2021/On the Anonymity Guarantees of Anonymous Proof-of-Stake Protocols.eng.srt 26.5 KB
- IEEE Security and Privacy 2023/A Theory to Instruct Differentially-Private Learning via Clipping Bias Reduction.eng.srt 26.5 KB
- IEEE Security and Privacy 2021/An Interactive Prover for Protocol Verification in the Computational Model.eng.srt 26.5 KB
- IEEE Security and Privacy 2023/SoK Distributed Randomness Beacons.eng.srt 26.4 KB
- IEEE Security and Privacy 2023/Improving Developers' Understanding of Regex Denial of Service Tools.eng.srt 26.4 KB
- IEEE Security and Privacy 2021/CrossTalk Speculative Data Leaks Across Cores Are Real.eng.srt 26.4 KB
- IEEE Security and Privacy 2019/An Extensive Formal Security Analysis of the OpenID Financial grade API Pedram Hosseyni.eng.srt 26.4 KB
- IEEE Security and Privacy 2023/mmSpoof Resilient Spoofing of Automotive Millimeter-wave Radars using Reflect Array.eng.srt 26.3 KB
- IEEE Security and Privacy 2021/Journey to the Center of the Cookie Ecosystem Unraveling Actors' Roles and Relationships.eng.srt 26.3 KB
- IEEE Security and Privacy 2021/Survivalism Systematic Analysis of Malware Living-Off-The-Land.eng.srt 26.1 KB
- IEEE Security and Privacy 2023/SecureCells A Secure Compartmentalized Architecture.eng.srt 26.1 KB
- IEEE Security and Privacy 2023/Less Is More Refinement Proofs for Probabilistic Proofs.eng.srt 26.1 KB
- IEEE Security and Privacy 2021/SoK Security and Privacy in the Age of Commercial Drones.eng.srt 26.0 KB
- IEEE Security and Privacy 2022/Quantifying Blockchain Extractable Value How dark is the forest.srt 26.0 KB
- IEEE Security and Privacy 2021/DIANE Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices.eng.srt 25.9 KB
- IEEE Security and Privacy 2023/RuleKeeper GDPR-Aware Personal Data Compliance for Web Frameworks.eng.srt 25.9 KB
- IEEE Security and Privacy 2023/SoK Let the Privacy Games Begin A Unified Treatment of Data Inference Privacy in Machine Learning.eng.srt 25.9 KB
- IEEE Security and Privacy 2021/CryptGPU Fast Privacy-Preserving Machine Learning on the GPU.eng.srt 25.8 KB
- IEEE Security and Privacy 2023/TrojanModel A Practical Trojan Attack against Automatic Speech Recognition Systems.eng.srt 25.8 KB
- IEEE Security and Privacy 2021/Black Widow Blackbox Data-driven Web Scanning.eng.srt 25.8 KB
- IEEE Security and Privacy 2023/High-Order Masking of Lattice Signatures in Quasilinear Time.eng.srt 25.8 KB
- IEEE Security and Privacy 2023/BLEDiff Scalable and Property-Agnostic Noncompliance Checking for BLE Implementations.eng.srt 25.8 KB
- IEEE Security and Privacy 2023/Inducing Wireless Chargers to Voice Out for Inaudible Command Attacks.eng.srt 25.7 KB
- IEEE Security and Privacy 2023/Disassembling ARM Binaries by Lightweight Superset Instruction Interpretation and Graph Modeling.eng.srt 25.7 KB
- IEEE Security and Privacy 2019/Why Does Your Data Leak Uncovering the Data Leakage in Cloud from Mobile Apps.eng.srt 25.7 KB
- IEEE Security and Privacy 2023/SoK Anti-Facial Recognition Technology.eng.srt 25.7 KB
- IEEE Security and Privacy 2021/Happer Unpacking Android Apps via a Hardware-Assisted Approach.eng.srt 25.7 KB
- IEEE Security and Privacy 2023/A Security RISC Microarchitectural Attacks on Hardware RISC-V CPUs.eng.srt 25.7 KB
- IEEE Security and Privacy 2023/Threshold Signatures in the Multiverse.eng.srt 25.7 KB
- IEEE Security and Privacy 2023/Perceptions of Distributed Ledger Technology Key Management-Interviews with Finance Professionals.eng.srt 25.7 KB
- IEEE Security and Privacy 2023/TeSec Accurate Server-side Attack Investigation for Web Applications.eng.srt 25.7 KB
- IEEE Security and Privacy 2021/Revealer Detecting and Exploiting Regular Expression Denial-of-Service Vulnerabilities.eng.srt 25.6 KB
- IEEE Security and Privacy 2022/SoK Demystifying Binary Lifters Through the Lens of Downstream Applications.srt 25.6 KB
- IEEE Security and Privacy 2022/Timing-Based Browsing Privacy Vulnerabilities Via Site Isolation.srt 25.6 KB
- IEEE Security and Privacy 2016/Opening Remarks of the 2016 IEEE Symposium on Security & Privacy.eng.srt 25.6 KB
- IEEE Security and Privacy 2023/Characterizing the Limits of POV Acoustic Eavesdropping from Smartphone Cameras.eng.srt 25.5 KB
- IEEE Security and Privacy 2023/Private Access Control for Function Secret Sharing.eng.srt 25.5 KB
- IEEE Security and Privacy 2021/Breaking the Specification Certified PDF.eng.srt 25.5 KB
- IEEE Security and Privacy 2019/KHyperLogLog Estimating Reidentifiability and Joinability of Large Data at Scale Pern Hui Chia.eng.srt 25.4 KB
- IEEE Security and Privacy 2023/Disguising Attacks with Explanation-Aware Backdoors.eng.srt 25.3 KB
- IEEE Security and Privacy 2023/Design and Evaluation of Inclusive Email Security Indicators for People with Visual Impairments.eng.srt 25.3 KB
- IEEE Security and Privacy 2023/Scatter and Split Securely Defeating Cache Contention and Occupancy Attacks.eng.srt 25.2 KB
- IEEE Security and Privacy 2023/ImU Physical Impersonating Attack for Face Recognition System with Natural Style Changes.eng.srt 25.2 KB
- IEEE Security and Privacy 2021/High-Frequency Trading on Decentralized On-Chain Exchanges.eng.srt 25.2 KB
- IEEE Security and Privacy 2023/Sound Verification of Security Protocols From Design to Interoperable Implementations.eng.srt 25.1 KB
- IEEE Security and Privacy 2021/A Novel Dynamic Analysis Infrastructure to Instrument Untrusted Execution Flow Across User-Kernel....eng.srt 25.1 KB
- IEEE Security and Privacy 2023/Jigsaw Puzzle Selective Backdoor Attack to Subvert Malware Classifiers.eng.srt 24.9 KB
- IEEE Security and Privacy 2023/SyzDescribe Principled, Automated, Static Generation of Syscall Descriptions for Kernel Drivers.eng.srt 24.8 KB
- IEEE Security and Privacy 2023/Precise Detection of Kernel Data Races with Probabilistic Lockset Analysis.eng.srt 24.8 KB
- IEEE Security and Privacy 2023/Uncovering User Interactions on Smartphones via Contactless Wireless Charging Side Channels.eng.srt 24.8 KB
- IEEE Security and Privacy 2023/AEM Facilitating Cross-Version Exploitability Assessment of Linux Kernel Vulnerabilities.eng.srt 24.7 KB
- IEEE Security and Privacy 2023/BlindHub Bitcoin-Compatible Privacy-Preserving Payment Channel Hubs Supporting Variable Amounts.eng.srt 24.7 KB
- IEEE Security and Privacy 2019/The 9 Lives of Bleichenbachers CAT New Cache ATtacks on TLS Implementations.eng.srt 24.6 KB
- IEEE Security and Privacy 2023/Practical Program Modularization with Type-Based Dependence Analysis.eng.srt 24.6 KB
- IEEE Security and Privacy 2022/DEPCOMM Graph Summarization on System Audit Logs for Attack Investigation.srt 24.5 KB
- IEEE Security and Privacy 2019/Tap 'n Ghost A Compilation of Novel Attack Techniques against Smartphone Touchscreens.eng.srt 24.5 KB
- IEEE Security and Privacy 2021/Invisible Probe Timing Attacks with PCIe Congestion Side-channel.eng.srt 24.4 KB
- IEEE Security and Privacy 2023/ShadowNet A Secure and Efficient On-device Model Inference System for Convolutional Neural Networks.eng.srt 24.4 KB
- IEEE Security and Privacy 2019/Exploiting Unintended Feature leakage in Collaborative Learning Congzheng Song.eng.srt 24.3 KB
- IEEE Security and Privacy 2023/An Interview on the Security and Privacy Development Practices in Turkish Software Startups.eng.srt 24.3 KB
- IEEE Security and Privacy 2021/A First Look at Zoombombing.eng.srt 24.3 KB
- IEEE Security and Privacy 2023/SoK Certified Robustness for Deep Neural Networks.eng.srt 24.3 KB
- IEEE Security and Privacy 2021/Keep the Dirt Tain'ted TreeKEM, Adaptively and Actively Secure Continuous Group Key Agreement.eng.srt 24.3 KB
- IEEE Security and Privacy 2023/Half&Half Demystifying Intel’s Directional Branch Predictors for Fast, Secure Partitioned Execution.eng.srt 24.2 KB
- IEEE Security and Privacy 2023/MPCAuth Multi-factor Authentication for Distributed-trust Systems.eng.srt 24.2 KB
- IEEE Security and Privacy 2023/EC Embedded Systems Compartmentalization via Intra-Kernel Isolation.eng.srt 24.2 KB
- IEEE Security and Privacy 2023/WebSpec Towards Machine-Checked Analysis of Browser Security Mechanisms.eng.srt 24.2 KB
- IEEE Security and Privacy 2019/Blind Certificate Authorities.eng.srt 24.1 KB
- IEEE Security and Privacy 2023/TEEzz Fuzzing Trusted Applications on COTS Android Devices.eng.srt 24.1 KB
- IEEE Security and Privacy 2023/Low-Cost Privilege Separation with Compile Time Compartmentalization for Embedded Systems.eng.srt 24.1 KB
- IEEE Security and Privacy 2023/A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations.eng.srt 24.0 KB
- IEEE Security and Privacy 2023/CSIRowhammer - Cryptographic Security and Integrity against Rowhammer.eng.srt 24.0 KB
- IEEE Security and Privacy 2023/Beyond Phish Toward Detecting Fraudulent e-Commerce Websites at Scale.eng.srt 24.0 KB
- IEEE Security and Privacy 2023/Scalable and Privacy-Preserving Federated Principal Component Analysis.eng.srt 23.8 KB
- IEEE Security and Privacy 2023/LAMBRETTA Learning to Rank for Twitter Soft Moderation.eng.srt 23.8 KB
- IEEE Security and Privacy 2023/On Efficient, High-Fidelity and Blind Suppression of Backdoor Effects in Trojaned ML Models.eng.srt 23.7 KB
- IEEE Security and Privacy 2023/SoK Taxonomy of Attacks on Open-Source Software Supply Chains.eng.srt 23.7 KB
- IEEE Security and Privacy 2023/SoK Cryptographic Neural-Network Computation.eng.srt 23.7 KB
- IEEE Security and Privacy 2023/Analyzing Leakage of Personally Identifiable Information in Language Models.eng.srt 23.5 KB
- IEEE Security and Privacy 2023/No One Drinks From the Firehose How Organizations Filter and Prioritize Vulnerability Information.eng.srt 23.5 KB
- IEEE Security and Privacy 2021/When Function Signature Recovery Meets Compiler Optimization.eng.srt 23.4 KB
- IEEE Security and Privacy 2023/Clockwork Finance Automated Analysis of Economic Security in Smart Contracts.eng.srt 23.4 KB
- IEEE Security and Privacy 2023/AUC Accountable Universal Composability.eng.srt 23.4 KB
- IEEE Security and Privacy 2023/VIDEZZO Dependency-aware Virtual Device Fuzzing.eng.srt 23.3 KB
- IEEE Security and Privacy 2023/How IoT Re-using Threatens Your Sensitive Data Exploring the User-Data Disposal in Used IoT Devices.eng.srt 23.0 KB
- IEEE Security and Privacy 2023/SelectFuzz Efficient Directed Fuzzing with Selective Path Exploration.eng.srt 23.0 KB
- IEEE Security and Privacy 2021/Defensive Technology Use by Political Activists During the Sudanese Revolution.eng.srt 23.0 KB
- IEEE Security and Privacy 2023/Locally Differentially Private Frequency Estimation Based on Convolution Framework.eng.srt 23.0 KB
- IEEE Security and Privacy 2021/BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures.eng.srt 23.0 KB
- IEEE Security and Privacy 2023/Man-in-the-Middle Attacks without Rogue AP When WPAs Meet ICMP Redirects.eng.srt 23.0 KB
- IEEE Security and Privacy 2023/SoK Decentralized Finance (DeFi) Attacks.eng.srt 22.9 KB
- IEEE Security and Privacy 2023/Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation.eng.srt 22.9 KB
- IEEE Security and Privacy 2023/XFL Naming Functions in Binaries with Extreme Multi-label Learning.eng.srt 22.8 KB
- IEEE Security and Privacy 2021/Did you mix me Formally Verifying Verifiable Mix Nets in Electronic Voting.eng.srt 22.8 KB
- IEEE Security and Privacy 2023/Scaling JavaScript Abstract Interpretation to Detect and Exploit Node.js Taint-style Vulnerability.eng.srt 22.8 KB
- IEEE Security and Privacy 2021/Machine unlearning.eng.srt 22.7 KB
- IEEE Security and Privacy 2023/Towards a Rigorous Statistical Analysis of Empirical Password Datasets.eng.srt 22.6 KB
- IEEE Security and Privacy 2019/Using Safety Properties to Generate Vulnerability Patches.eng.srt 22.5 KB
- IEEE Security and Privacy 2023/Mew Enabling Large-Scale and Dynamic Link-Flooding Defenses on Programmable Switches.eng.srt 22.5 KB
- IEEE Security and Privacy 2023/D-DAE Defense-Penetrating Model Extraction Attacks.eng.srt 22.4 KB
- IEEE Security and Privacy 2021/Manipulation Attacks in Local Differential Privacy.eng.srt 22.4 KB
- IEEE Security and Privacy 2023/Private Collaborative Data Cleaning via Non-Equi PSI.eng.srt 22.4 KB
- IEEE Security and Privacy 2021/CrawlPhish Large-scale Analysis of Client-side Cloaking Techniques in Phishing.eng.srt 22.3 KB
- IEEE Security and Privacy 2023/3DFed Adaptive and Extensible Framework for Covert Backdoor Attack in Federated Learning.eng.srt 22.3 KB
- IEEE Security and Privacy 2023/Finding Specification Blind Spots via Fuzz Testing.eng.srt 22.3 KB
- IEEE Security and Privacy 2023/Three-party Non-linear Computation without Preprocessing for Privacy-preserving Machine Learning.eng.srt 22.2 KB
- IEEE Security and Privacy 2023/DevIOus Device-Driven Side-Channel Attacks on the IOMMU.eng.srt 22.2 KB
- IEEE Security and Privacy 2023/QueryX Symbolic Query on Decompiled Code for Finding Bugs in COTS Binaries.eng.srt 22.2 KB
- IEEE Security and Privacy 2023/Weak Fiat-Shamir Attacks on Modern Proof Systems.eng.srt 22.1 KB
- IEEE Security and Privacy 2023/Attitudes towards Client-Side Scanning for CSAM, Terrorism, Drug Trafficking, Drug Use, Tax Evasion.eng.srt 22.1 KB
- IEEE Security and Privacy 2019/Stealthy Porn Understanding Real World Adversarial Images for I'llicit Online Promotion.eng.srt 22.0 KB
- IEEE Security and Privacy 2021/SIRNN A Math Library for Secure RNN Inference.eng.srt 22.0 KB
- IEEE Security and Privacy 2022/Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms.srt 21.9 KB
- IEEE Security and Privacy 2023/mmEcho A mmWave-based Acoustic Eavesdropping Method.eng.srt 21.8 KB
- IEEE Security and Privacy 2021/Poltergeist Acoustic Manipulation of Image Stabilization towards Object Mis-Labeling.eng.srt 21.7 KB
- IEEE Security and Privacy 2021/Fingerprinting the Fingerprinters Learning to Detect Browser Fingerprinting Behaviors.eng.srt 21.7 KB
- IEEE Security and Privacy 2023/Protected or Porous A Comparative Analysis of Threat Detection Capability of IoT Safeguards.eng.srt 21.6 KB
- IEEE Security and Privacy 2023/Discovering Java Deserialization Vulnerabilities via Structure-Aware Directed Greybox Fuzzing.eng.srt 21.5 KB
- IEEE Security and Privacy 2023/Protecting Models Trained by Multi-party Learning with Differential Privacy.eng.srt 21.4 KB
- IEEE Security and Privacy 2021/Co-Inflow Coarse-grained Information Flow Control for Java-like Languages.eng.srt 21.3 KB
- IEEE Security and Privacy 2021/CacheOut Leaking Data on Intel CPUs via Cache Evictions.eng.srt 21.3 KB
- IEEE Security and Privacy 2021/Cross Layer Attacks and How to Use Them (for DNS Cache Poisoning, Device Tracking and More).eng.srt 21.3 KB
- IEEE Security and Privacy 2021/CANnon Reliable and Stealthy Remote Shutdown Attacks via Unaltered Automotive Microcontrollers.eng.srt 21.3 KB
- IEEE Security and Privacy 2023/Low-effort VR Headset User Authentication Using Head-reverberated Sounds with Replay Resistance.eng.srt 21.3 KB
- IEEE Security and Privacy 2023/DepthFake Spoofing 3D Face Authentication with a 2D Photo.eng.srt 21.3 KB
- IEEE Security and Privacy 2023/WarpAttack Bypassing CFI through Compiler-Introduced Double-Fetches.eng.srt 20.9 KB
- IEEE Security and Privacy 2021/Post-Quantum WireGuard.eng.srt 20.8 KB
- IEEE Security and Privacy 2023/Accuracy-Privacy Trade-off in Deep Ensemble A Membership Inference Perspective.eng.srt 20.8 KB
- IEEE Security and Privacy 2019/PrivKV Key Value Data Collection with Local Differential Privacy.eng.srt 20.8 KB
- IEEE Security and Privacy 2021/Hardware-Software Contracts for Secure Speculation.eng.srt 20.8 KB
- IEEE Security and Privacy 2021/Lockable Signatures for Blockchains Scriptless Scripts for all Signatures.eng.srt 20.7 KB
- IEEE Security and Privacy 2023/UTOPIA Automatic Generation of Fuzz Driver using Unit Tests.eng.srt 20.7 KB
- IEEE Security and Privacy 2022/Transfer Attacks Revisited A Large-Scale Empirical Study in Real Computer Vision Settings.srt 20.6 KB
- IEEE Security and Privacy 2023/Tyr Finding Consensus Failure Bugs in Blockchain System with Behaviour Divergent Model.eng.srt 20.6 KB
- IEEE Security and Privacy 2023/Jolt Recovering TLS Signing Keys via Rowhammer Faults.eng.srt 20.5 KB
- IEEE Security and Privacy 2023/A Generic, Efficient, and Effortless Solver with Self-Supervised Learning for Breaking Text Captchas.eng.srt 20.4 KB
- IEEE Security and Privacy 2021/MAD-HTLC Because HTLC is Crazy-Cheap to Attack.eng.srt 20.4 KB
- IEEE Security and Privacy 2021/On the Just-In-Time Discovery of Profit-Generating Transactions in DeFi Protocols.eng.srt 20.3 KB
- IEEE Security and Privacy 2021/Bomberman Defining and Defeating Hardware Ticking Timebombs at Design-time.eng.srt 20.3 KB
- IEEE Security and Privacy 2019/IEEE S&P 2019 - Opening Remarks - General Chair.eng.srt 20.2 KB
- IEEE Security and Privacy 2021/Pegasus Bridging Polynomial and Non-polynomial Evaluations in Homomorphic Encryption.eng.srt 20.2 KB
- IEEE Security and Privacy 2023/Volttack Control IoT Devices by Manipulating Power Supply Voltage.eng.srt 20.1 KB
- IEEE Security and Privacy 2021/CRYLOGGER Detecting Crypto Misuses Dynamically.eng.srt 20.1 KB
- IEEE Security and Privacy 2023/FIDO2, CTAP 2.1, and WebAuthn 2 Provable Security and Post-Quantum Instantiation.eng.srt 19.9 KB
- IEEE Security and Privacy 2023/REDEEM MYSELF Purifying Backdoors in Deep Learning Models using Self Attention Distillation.eng.srt 19.9 KB
- IEEE Security and Privacy 2023/FedRecover Recovering from Poisoning Attacks in Federated Learning using Historical Information.eng.srt 19.9 KB
- IEEE Security and Privacy 2021/Proactive Threshold Wallets with Offline Devices.eng.srt 19.7 KB
- IEEE Security and Privacy 2023/PublicCheck Public Integrity Verification for Services of Run-time Deep Models.eng.srt 19.5 KB
- IEEE Security and Privacy 2021/Reading Between the Lines An Extensive Evaluation of the Security and Privacy Implications ....eng.srt 19.3 KB
- IEEE Security and Privacy 2022/MeshUp Stateless Cache Side-channel Attack on CPU Mesh.srt 19.3 KB
- IEEE Security and Privacy 2023/Continual Observation under User-level Differential Privacy.eng.srt 19.2 KB
- IEEE Security and Privacy 2023/DeHiREC Detecting Hidden Voice Recorders via ADC Electromagnetic Radiation.eng.srt 19.2 KB
- IEEE Security and Privacy 2021/Randomized Last-Level Caches Are Still Vulnerable to Cache Side-Channel Attacks But We Can Fix It.eng.srt 18.9 KB
- IEEE Security and Privacy 2021/Runtime Recovery of Web Applications under Zero-Day ReDoS Attacks.eng.srt 18.8 KB
- IEEE Security and Privacy 2021/SGUARD Smart Contracts Made Vulnerability-Free.eng.srt 18.6 KB
- IEEE Security and Privacy 2021/Compositional Security for Reentrant Applications.eng.srt 18.4 KB
- IEEE Security and Privacy 2021/Compositional Non-Interference for Fine-Grained Concurrent Programs.eng.srt 18.4 KB
- IEEE Security and Privacy 2021/Detecting AI Trojans Using Meta Neural Analysis.eng.srt 18.2 KB
- IEEE Security and Privacy 2023/PLA-LiDAR Physical Laser Attacks against LiDAR-based 3D Object Detection in Autonomous Vehicle.eng.srt 18.2 KB
- IEEE Security and Privacy 2023/SQUIP Exploiting the Scheduler Queue Contention Side Channel.eng.srt 18.2 KB
- IEEE Security and Privacy 2021/Trouble Over-The-Air An Analysis of FOTA Apps in the Android Ecosystem.eng.srt 18.1 KB
- IEEE Security and Privacy 2023/Limits of I O Based Ransomware Detection An Imitation Based Attack.eng.srt 17.8 KB
- IEEE Security and Privacy 2023/Understanding the (In)Security of Cross-side Face Verification Systems in Mobile Apps.eng.srt 17.8 KB
- IEEE Security and Privacy 2023/MagBackdoor Beware of Your Loudspeaker as A Backdoor For Magnetic Injection Attacks.eng.srt 17.5 KB
- IEEE Security and Privacy 2023/On The Empirical Effectiveness of Unrealistic Adversarial Hardening Against Realistic Attacks.eng.srt 17.4 KB
- IEEE Security and Privacy 2021/ConDySTA Context-Aware Dynamic Supplement to Static Tain't Analysis.eng.srt 17.0 KB
- IEEE Security and Privacy 2023/Investigating Package Related Security Threats in Software Registries.eng.srt 16.9 KB
- IEEE Security and Privacy 2021/How Did That Get In My Phone Unwanted App Distribution on Android Devices.eng.srt 16.9 KB
- IEEE Security and Privacy 2021/Real-World Snapshots vs. Theory Questioning the t-Probing Security Model..eng.srt 16.9 KB
- IEEE Security and Privacy 2023/On the Evolution of (Hateful) Memes by Means of Multimodal Contrastive Learning.eng.srt 16.8 KB
- IEEE Security and Privacy 2021/Linking Bluetooth LE & Classic and Implications for Privacy-Preserving Bluetooth-Based Protocols.eng.srt 16.4 KB
- IEEE Security and Privacy 2021/Data Privacy in Trigger-Action IoT Systems.eng.srt 15.9 KB
- IEEE Security and Privacy 2021/SoK All You Ever Wanted to Know About Binary Disassembly But Were Afraid to Ask.eng.srt 15.9 KB
- IEEE Security and Privacy 2023/Continuous Intrusion Characterizing the Security of Continuous Integration Services.eng.srt 15.8 KB
- IEEE Security and Privacy 2021/Who is Real Bob Adversarial Attacks on Speaker Recognition Systems.eng.srt 15.6 KB
- IEEE Security and Privacy 2021/One Engine to Fuzz 'em All Generic Language Processor Testing with Semantic Validation.eng.srt 14.6 KB
- IEEE Security and Privacy 2023/Leaking Arbitrarily Many Secrets Any-out-of-Many Proofs and Applications to RingCT Protocols.eng.srt 14.5 KB
- IEEE Security and Privacy 2021/DIFUZZRTL Differential Fuzz Testing to Find CPU Bugs.eng.srt 14.4 KB
- IEEE Security and Privacy 2021/An I O Separation Model for Formal Verification of Kernel Implementations.eng.srt 14.4 KB
- IEEE Security and Privacy 2015/Opening Remarks of the 2015 IEEE Symposium on Security & Privacy.eng.srt 14.1 KB
- IEEE Security and Privacy 2021/Ed25519 Signature Schemes Theory and Practice.eng.srt 12.6 KB
- IEEE Security and Privacy 2021/DICE Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis.eng.srt 12.1 KB
- IEEE Security and Privacy 2021/Red Belly a Deterministic Scalable Open Permissioned Blockchain.eng.srt 10.2 KB
- IEEE Security and Privacy 2019/IEEE S&P 2019 - Awards Ceremony.eng.srt 10.1 KB
- IEEE logo.jpg 8.3 KB
- IEEE Security and Privacy thank you.txt 1.0 KB
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via anywarmservice[AT]gmail.com. Remember to include the full url in your complaint.