Parent directory/ | - | - |
IEEE Security & Privacy 2017 captions/ | - | 2024 Oct 25 10:13 |
vSQL - Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases.mp4 | 25.4 MiB | 2024 Oct 24 03:34 |
Your Exploit is Mine - Automatic Shellcode Transplant for Remote Exploits.mp4 | 18.8 MiB | 2024 Oct 24 03:34 |
XHOUND - Quantifying the Fingerprintability of Browser Extensions.mp4 | 24.6 MiB | 2024 Oct 24 03:34 |
Verifying and Synthesizing Constant-Resource Implementations with Types.mp4 | 20.1 MiB | 2024 Oct 24 03:34 |
Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate.mp4 | 25.3 MiB | 2024 Oct 24 03:34 |
VUDDY - A Scalable Approach for Vulnerable Code Clone Discovery.mp4 | 30.5 MiB | 2024 Oct 24 03:34 |
Under the Shadow of Sunshine - Understanding & Detecting Bulletproof Hosting.mp4 | 15.0 MiB | 2024 Oct 24 03:34 |
Towards Evaluating the Robustness of Neural Networks.mp4 | 19.3 MiB | 2024 Oct 24 03:34 |
To Catch a Ratter - Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild.mp4 | 22.2 MiB | 2024 Oct 24 03:34 |
SysPal System-guided Pattern Locks for Android.mp4 | 25.5 MiB | 2024 Oct 24 03:34 |
SymCerts - Practical Symbolic Execution For Exposing Noncompliance in X.509 Certificate Validation.mp4 | 29.0 MiB | 2024 Oct 24 03:34 |
Stack Overflow Considered Harmful - The Impact of Copy&Paste on Android Application Security.mp4 | 21.2 MiB | 2024 Oct 24 03:34 |
Spotless Sandboxes - Evading Malware Analysis Systems using Wear-and-Tear Artifacts.mp4 | 16.0 MiB | 2024 Oct 24 03:34 |
SoK - Science, Security, and the Elusive Goal of Security as a Scientific Pursuit.mp4 | 34.9 MiB | 2024 Oct 24 03:34 |
SoK - Exploiting Network Printers.mp4 | 19.3 MiB | 2024 Oct 24 03:34 |
SoK - Cryptographically Protected Database Search.mp4 | 23.7 MiB | 2024 Oct 24 03:34 |
SmarPer - Context-Aware and Automatic Runtime-Permissions for Mobile Devices.mp4 | 27.4 MiB | 2024 Oct 24 03:34 |
Skyfire - Data-Driven Seed Generation for Fuzzing.mp4 | 15.3 MiB | 2024 Oct 24 03:34 |
Side-Channel Attacks on Shared Search Indexes.mp4 | 23.4 MiB | 2024 Oct 24 03:34 |
Securing Augmented Reality Output.mp4 | 20.0 MiB | 2024 Oct 24 03:34 |
SecureML - A System for Scalable Privacy-Preserving Machine Learning.mp4 | 19.5 MiB | 2024 Oct 24 03:34 |
Scalable Bias-Resistant Distributed Randomness.mp4 | 25.9 MiB | 2024 Oct 24 03:34 |
Pyramid - Enhancing Selectivity in Big Data Protection with Count Featurization.mp4 | 23.5 MiB | 2024 Oct 24 03:34 |
Protecting Bare-metal Embedded Systems with Privilege Overlays.mp4 | 24.6 MiB | 2024 Oct 24 03:34 |
Optimized Honest-Majority MPC for Malicious Adversaries - Breaking 1 Billion-Gate Second Barrier.mp4 | 23.2 MiB | 2024 Oct 24 03:34 |
One TPM to Bind Them All - Fixing TPM2.0 for Provably Secure Anonymous Attestation.mp4 | 23.1 MiB | 2024 Oct 24 03:34 |
Obstacles to the Adoption of Secure Communication Tools.mp4 | 17.2 MiB | 2024 Oct 24 03:34 |
Norax - Enabling Execute-Only Memory for COTS Binaries on AArch64.mp4 | 22.5 MiB | 2024 Oct 24 03:34 |
NEZHA - Efficient Domain-independent Differential Testing.mp4 | 21.5 MiB | 2024 Oct 24 03:34 |
Multi-touch Authentication Using Hand Geometry and Behavioral Information.mp4 | 19.4 MiB | 2024 Oct 24 03:34 |
Membership Inference Attacks against Machine Learning Models.mp4 | 12.9 MiB | 2024 Oct 24 03:34 |
Machine-Checked Proofs of Privacy for Electronic Voting Protocols.mp4 | 18.9 MiB | 2024 Oct 24 03:34 |
Leakage-***** Attacks on Order-Revealing Encryption.mp4 | 21.9 MiB | 2024 Oct 24 03:34 |
Is Interaction Necessary for Distributed Private Learning.mp4 | 25.8 MiB | 2024 Oct 24 03:34 |
IoT Goes Nuclear - Creating a Zigbee Chain Reaction.mp4 | 23.2 MiB | 2024 Oct 24 03:34 |
Implementing and Proving the TLS 1.3 Record Layer.mp4 | 23.2 MiB | 2024 Oct 24 03:34 |
Identifying Personal DNA Methylation Profiles by Genotype Inference.mp4 | 24.0 MiB | 2024 Oct 24 03:34 |
IVD - Automatic Learning and Enforcement of Authorization Rules in Online Social Networks.mp4 | 19.5 MiB | 2024 Oct 24 03:34 |
IKP - Turning a PKI Around with Decentralized Automated Incentives.mp4 | 29.2 MiB | 2024 Oct 24 03:34 |
How They Did It - An Analysis of Emission Defeat Devices in Modern Automobiles.mp4 | 23.1 MiB | 2024 Oct 24 03:34 |
Hijacking Bitcoin - Routing Attacks on Cryptocurrencies.mp4 | 27.7 MiB | 2024 Oct 24 03:34 |
Hardening Java's Access Control by Abolishing Implicit Privilege Elevation.mp4 | 22.8 MiB | 2024 Oct 24 03:34 |
HVLearn - Automated Black-box Analysis of Hostname Verification in SSL TLS Implementations.mp4 | 25.1 MiB | 2024 Oct 24 03:34 |
From Trash to Treasure - Timing-Sensitive Garbage Collection.mp4 | 23.0 MiB | 2024 Oct 24 03:34 |
Finding and Preventing Bugs in JavaScript Bindings.mp4 | 23.1 MiB | 2024 Oct 24 03:34 |
Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping.mp4 | 38.9 MiB | 2024 Oct 24 03:34 |
Counter-RAPTOR - Safeguarding Tor Against Active Routing Attacks.mp4 | 24.1 MiB | 2024 Oct 24 03:34 |
Comparing the Usability of Cryptographic APIs.mp4 | 19.3 MiB | 2024 Oct 24 03:34 |
CoSMeDis - A Distributed Social Media Platform with Formally Verified Confidentiality Guarantees.mp4 | 19.3 MiB | 2024 Oct 24 03:34 |
Cloak and Dagger - From Two Permissions to Complete Control of the UI Feedback Loop.mp4 | 26.5 MiB | 2024 Oct 24 03:34 |
Catena - Efficient Non-equivocation via Bitcoin.mp4 | 18.3 MiB | 2024 Oct 24 03:34 |
CRLite - A Scalable System for Pushing All TLS Revocations to All Browsers.mp4 | 24.9 MiB | 2024 Oct 24 03:34 |
Backward-bounded DSE - Targeting Infeasibility Questions on Obfuscated Codes.mp4 | 29.7 MiB | 2024 Oct 24 03:34 |
Augur - Internet-Wide Detection of Connectivity Disruptions.mp4 | 19.9 MiB | 2024 Oct 24 03:34 |
An Experimental Security Analysis of an Industrial Robot Controller.mp4 | 21.8 MiB | 2024 Oct 24 03:34 |
A Lustrum of Malware Network Communication - Evolution and Insights.mp4 | 25.4 MiB | 2024 Oct 24 03:34 |
A Framework for Universally Composable Diffie-Hellman Key Exchange.mp4 | 23.8 MiB | 2024 Oct 24 03:34 |