Parent directory/ | - | - |
IEEE Security & Privacy 2022 captions/ | - | 2024 Oct 25 10:13 |
A Formal Security Analysis of the W3C Web Payment APIs Attacks and Verification.mp4 | 28.1 MiB | 2024 Oct 24 13:07 |
A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols.mp4 | 26.6 MiB | 2024 Oct 24 13:07 |
A Secret-Free Hypervisor Rethinking Isolation in the Age of Speculative Vulnerabilities.mp4 | 13.5 MiB | 2024 Oct 24 13:07 |
A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP.mp4 | 19.1 MiB | 2024 Oct 24 13:07 |
AccEar Accelerometer Acoustic Eavesdropping with Unconstrained Vocabulary.mp4 | 14.9 MiB | 2024 Oct 24 13:07 |
Adversarial Examples - for Proof-of-Learning.mp4 | 18.2 MiB | 2024 Oct 24 13:07 |
Adversarial Prefetch New Cross-Core Cache Side Channel Attacks.mp4 | 14.0 MiB | 2024 Oct 24 13:07 |
Analyzing Ground-Truth Data of Mobile Gambling Scam.mp4 | 14.8 MiB | 2024 Oct 24 13:07 |
Anti-Tamper Radio System-Level Tamper Detection for Computing Systems.mp4 | 29.3 MiB | 2024 Oct 24 13:07 |
Arbitrary Modulation of Electromagnetic Noise from Unprivileged Software Impacting Emission Security.mp4 | 11.1 MiB | 2024 Oct 24 13:07 |
Are We There Yet Timing and Floating-Point Attacks on Differential Privacy Systems.mp4 | 15.8 MiB | 2024 Oct 24 13:07 |
Asleep at the Keyboard Assessing the Security of GitHub Copilot's Code Contributions.mp4 | 22.1 MiB | 2024 Oct 24 13:07 |
Attacks on Wireless Coexistence.mp4 | 17.2 MiB | 2024 Oct 24 13:07 |
Augury Using Data Memory-Dependent Prefetchers to Leak Data at Rest.mp4 | 18.1 MiB | 2024 Oct 24 13:07 |
Automated Attack Synthesis by Extracting Finite State Machines from Protocol Specification Documents.mp4 | 14.2 MiB | 2024 Oct 24 13:07 |
BEACON - Directed Grey-Box Fuzzing with Provable Path Pruning.mp4 | 11.9 MiB | 2024 Oct 24 13:07 |
Back to the Drawing Board A Critical Evaluation of Poisoning Attacks on Federated Learning.mp4 | 19.6 MiB | 2024 Oct 24 13:07 |
Bad Characters Imperceptible NLP Attacks.mp4 | 19.3 MiB | 2024 Oct 24 13:07 |
BadEncoder Backdoor Attacks to Pre-trained Encoders in Self-Supervised Learning.mp4 | 20.6 MiB | 2024 Oct 24 13:07 |
Blacksmith Compromising Target Row Refresh by Rowhammering in the Frequency Domain.mp4 | 21.7 MiB | 2024 Oct 24 13:07 |
COBRA Dynamic Proactive Secret Sharing for Confidential BFT Services.mp4 | 14.5 MiB | 2024 Oct 24 13:07 |
Cats vs. Spectre An Axiomatic Approach to Modeling Speculative Execution Attacks.mp4 | 18.2 MiB | 2024 Oct 24 13:07 |
CirC Compiler infrastructure for proof systems, software verification, and more.mp4 | 22.0 MiB | 2024 Oct 24 13:07 |
Committed to Trust A Qualitative Study on Security & Trust in Open Source Software Projects.mp4 | 15.2 MiB | 2024 Oct 24 13:07 |
Copy, Right A Testing Framework for Copyright Protection of Deep Learning Models.mp4 | 22.5 MiB | 2024 Oct 24 13:07 |
DEPCOMM Graph Summarization on System Audit Logs for Attack Investigation.mp4 | 15.7 MiB | 2024 Oct 24 13:07 |
De-Identification's Impact on Minority Representation and Privacy Preservation in the US Census.mp4 | 19.4 MiB | 2024 Oct 24 13:07 |
DeepCASE Semi-Supervised Contextual Analysis of Security Events.mp4 | 22.4 MiB | 2024 Oct 24 13:07 |
DeepCoFFEA Improved Flow Correlation Attacks on Tor via Metric Learning and Amplification.mp4 | 9.4 MiB | 2024 Oct 24 13:07 |
DeepSteal Advanced Model Extractions Leveraging Efficient Weight Stealing in Memories.mp4 | 22.6 MiB | 2024 Oct 24 13:07 |
Delay Wreaks Havoc on Your Smart Home Delay-based Automation Interference Attacks.mp4 | 23.7 MiB | 2024 Oct 24 13:07 |
Deployment of Source Address Validation by Network Operators A Randomized Control Trial.mp4 | 23.1 MiB | 2024 Oct 24 13:07 |
Desperate Times Call for Desperate Measures - User Concerns with Mobile Loan Apps in Kenya.mp4 | 23.3 MiB | 2024 Oct 24 13:07 |
Device Fingerprinting with Peripheral Timestamps.mp4 | 12.2 MiB | 2024 Oct 24 13:07 |
Differentially Private Histograms in the Shuffle Model from Fake Users.mp4 | 13.3 MiB | 2024 Oct 24 13:07 |
Domains Do Change Their Spots Quantifying Potential ***** of Residual Trust.mp4 | 28.4 MiB | 2024 Oct 24 13:07 |
Evaluating Physical-Layer BLE Location Tracking Attacks on Mobile Devices.mp4 | 29.8 MiB | 2024 Oct 24 13:07 |
Exploit the Last Straw That Breaks Android Systems.mp4 | 16.2 MiB | 2024 Oct 24 13:07 |
Exposed Infrastructures-Discovery, Attacks and Remediation of Insecure ICS Remote Management Devices.mp4 | 19.7 MiB | 2024 Oct 24 13:07 |
Finding and Exploiting *****U Features using MSR Templating.mp4 | 21.7 MiB | 2024 Oct 24 13:07 |
Formal Model-Driven Discovery of Bluetooth Protocol Design Vulnerabilities.mp4 | 23.7 MiB | 2024 Oct 24 13:07 |
Foundations of Dynamic BFT.mp4 | 17.9 MiB | 2024 Oct 24 13:07 |
Four Attacks and a Proof for Telegram.mp4 | 11.8 MiB | 2024 Oct 24 13:07 |
FuzzUSB Hybrid Stateful Fuzzing of USB Gadget Stacks.mp4 | 20.2 MiB | 2024 Oct 24 13:07 |
GREBE Unveiling Exploitation Potential for Linux Kernel Bugs.mp4 | 19.1 MiB | 2024 Oct 24 13:07 |
Goshawk Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis.mp4 | 17.3 MiB | 2024 Oct 24 13:07 |
Graphics Peeping Unit Exploiting EM Side-Channel Information of GPUs to Eavesdrop on Your Neighbors.mp4 | 19.2 MiB | 2024 Oct 24 13:07 |
HAMRAZ Resilient Partitioning and Replication.mp4 | 11.4 MiB | 2024 Oct 24 13:07 |
HardLog Practical Tamper-Proof System Auditing Using a Novel Audit Device.mp4 | 28.5 MiB | 2024 Oct 24 13:07 |
Hark A Deep Learning System for Navigating Privacy Feedback at Scale.mp4 | 14.7 MiB | 2024 Oct 24 13:07 |
Heapster Analyzing the Security of Dynamic Allocators for Monolithic Firmware Images.mp4 | 24.8 MiB | 2024 Oct 24 13:07 |
How Does Usable Security Not End Up in Software Products Results From a Qualitative Interview Study.mp4 | 27.3 MiB | 2024 Oct 24 13:07 |
How Not to Protect Your IP - An Industry-Wide Break of IEEE 1735 Implementations.mp4 | 18.9 MiB | 2024 Oct 24 13:07 |
How to Attack and Generate Honeywords.mp4 | 20.8 MiB | 2024 Oct 24 13:07 |
IEEE S&P 2022 Opening Session.mp4 | 49.2 MiB | 2024 Oct 24 13:07 |
IRQDebloat Reducing Driver Attack Surface in Embedded Devices.mp4 | 23.2 MiB | 2024 Oct 24 13:07 |
IRShield A Countermeasure Against Adversarial Physical-Layer Wireless Sensing.mp4 | 28.8 MiB | 2024 Oct 24 13:07 |
Investigating Influencer VPN Ads on YouTube.mp4 | 24.4 MiB | 2024 Oct 24 13:07 |
Investigating the Use of Email Encryption for an Entire University.mp4 | 13.0 MiB | 2024 Oct 24 13:07 |
Invisible Finger Practical Electromagnetic Interference Attack on Touchscreen Electronic Devices.mp4 | 50.2 MiB | 2024 Oct 24 13:07 |
IronMask Versatile Verification of Masking Security.mp4 | 8.8 MiB | 2024 Oct 24 13:07 |
Jigsaw Efficient and Scalable Path Constraints Fuzzing.mp4 | 14.0 MiB | 2024 Oct 24 13:07 |
K-Scheduler Effective Seed Scheduling for Fuzzing with Graph Centrality Analysis.mp4 | 24.5 MiB | 2024 Oct 24 13:07 |
LangSec Keynote Trojan Source and Bad Characters Invisible Hacks and Reluctant Patching.mp4 | 66.4 MiB | 2024 Oct 24 13:07 |
LinkTeller Recovering Private Edges from Graph Neural Networks via Influence Analysis.mp4 | 11.6 MiB | 2024 Oct 24 13:07 |
Locally Differentially Private Sparse Vector Aggregation.mp4 | 18.3 MiB | 2024 Oct 24 13:07 |
Low-Bandwidth Threshold ECDSA via Pseudorandom Correlation Generators.mp4 | 11.6 MiB | 2024 Oct 24 13:07 |
MatRiCT More Efficient Post-Quantum Private Blockchain Payments.mp4 | 19.2 MiB | 2024 Oct 24 13:07 |
Measuring and Mitigating the Risk of IP Reuse on Public Clouds.mp4 | 26.9 MiB | 2024 Oct 24 13:07 |
Membership inference attacks from first principles.mp4 | 22.1 MiB | 2024 Oct 24 13:07 |
MeshUp Stateless Cache Side-channel Attack on *****U Mesh.mp4 | 9.7 MiB | 2024 Oct 24 13:07 |
Mind the Gap Studying the Insecurity of Provably Secure Embedded Trusted Execution Architectures.mp4 | 18.1 MiB | 2024 Oct 24 13:07 |
Mitigating Information Leakage Vulnerabilities with Type-based Data Isolation.mp4 | 25.8 MiB | 2024 Oct 24 13:07 |
Model Orthogonalization Class Distance Hardening in Neural Networks for Better Security.mp4 | 16.3 MiB | 2024 Oct 24 13:07 |
Model Stealing Attacks Against Inductive Graph Neural Networks.mp4 | 18.4 MiB | 2024 Oct 24 13:07 |
Multi-Server Verifiable Computation of Low-Degree Polynomials.mp4 | 15.0 MiB | 2024 Oct 24 13:07 |
Noise A Library of Verified High-Performance Secure Channel Protocol Implementations.mp4 | 27.8 MiB | 2024 Oct 24 13:07 |
PCR-Auth Solving Authentication Puzzle Challenges with Encoded Palm Contact Responses.mp4 | 15.3 MiB | 2024 Oct 24 13:07 |
PGPATCH Policy-Guided Logic Bug Patching for Robotic Vehicles.mp4 | 20.4 MiB | 2024 Oct 24 13:07 |
PICCOLO Exposing Complex Backdoors in NLP Transformer Models.mp4 | 19.8 MiB | 2024 Oct 24 13:07 |
PROTRR Principled yet Optimal In-DRAM Target Row Refresh.mp4 | 17.0 MiB | 2024 Oct 24 13:07 |
Peekaboo A Hub-Based Approach to Enable Transparency in Data Processing within Smart Homes.mp4 | 33.9 MiB | 2024 Oct 24 13:07 |
Phishing in Organizations Findings from a Large-Scale and Long-Term Study.mp4 | 21.0 MiB | 2024 Oct 24 13:07 |
Practical Asynchronous Distributed Key Generation.mp4 | 30.9 MiB | 2024 Oct 24 13:07 |
Practical EMV Relay Protection.mp4 | 36.1 MiB | 2024 Oct 24 13:07 |
Privacy-from-Birth Protecting Sensed Data from Malicious Sensors with VERSA.mp4 | 22.2 MiB | 2024 Oct 24 13:07 |
Private Nearest Neighbor Search with Sublinear Communication and Malicious Security.mp4 | 17.9 MiB | 2024 Oct 24 13:07 |
ProVerif with Lemmas, Induction, Fast Subsumption, and Much More.mp4 | 22.7 MiB | 2024 Oct 24 13:07 |
Property Inference from Poisoning.mp4 | 15.8 MiB | 2024 Oct 24 13:07 |
Publicly Accountable Robust Multi-Party Computation.mp4 | 20.7 MiB | 2024 Oct 24 13:07 |
Quantifying Blockchain Extractable Value How dark is the forest.mp4 | 13.2 MiB | 2024 Oct 24 13:07 |
RT-TEE Real-time System Availability for Cyber-physical Systems using ARM TrustZone.mp4 | 23.0 MiB | 2024 Oct 24 13:07 |
Reconstructing Training Data with Informed Adversaries.mp4 | 24.0 MiB | 2024 Oct 24 13:07 |
Repairing DoS Vulnerability of Real-World Regexes.mp4 | 22.1 MiB | 2024 Oct 24 13:07 |
SAILFISH Vetting Smart Contract State-Inconsistency Bugs in Seconds.mp4 | 15.0 MiB | 2024 Oct 24 13:07 |
SIRAJ A Unified Framework for Aggregation of Malicious Entity Detectors.mp4 | 23.4 MiB | 2024 Oct 24 13:07 |
SMILE Secure Memory Introspection for Live Enclave.mp4 | 19.0 MiB | 2024 Oct 24 13:07 |
SNARKBlock Federated Anonymous Blocklisting from Hidden Common Input Aggregate Proofs.mp4 | 16.2 MiB | 2024 Oct 24 13:07 |
SPURT Scalable Distributed Randomness Beacon with Transparent Setup.mp4 | 24.0 MiB | 2024 Oct 24 13:07 |
SYMBEXCEL Automated Analysis and Understanding of Malicious Excel 4.0 Macros.mp4 | 20.2 MiB | 2024 Oct 24 13:07 |
Sabre Sender-Anonymous Messaging with Fast Audits.mp4 | 19.5 MiB | 2024 Oct 24 13:07 |
Scraping Sticky Leftovers App User Information Left on Servers After Account Deletion.mp4 | 14.7 MiB | 2024 Oct 24 13:07 |
SecFloat Accurate Floating-Point meets Secure 2-Party Computation.mp4 | 14.1 MiB | 2024 Oct 24 13:07 |
Security Analysis of the MLS Key Derivation.mp4 | 17.8 MiB | 2024 Oct 24 13:07 |
Security Foundations for Application-Based Covert Communication Channels.mp4 | 37.6 MiB | 2024 Oct 24 13:07 |
ShadeWatcher Recommendation-guided Cyber Threat Analysis using System Audit Records.mp4 | 24.6 MiB | 2024 Oct 24 13:07 |
ShorTor Improving Tor Network Latency via Multi-hop Overlay Routing.mp4 | 9.1 MiB | 2024 Oct 24 13:07 |
SoK Authentication in Augmented and Virtual Reality.mp4 | 14.0 MiB | 2024 Oct 24 13:07 |
SoK Demystifying Binary Lifters Through the Lens of Downstream Applications.mp4 | 10.2 MiB | 2024 Oct 24 13:07 |
SoK How Robust is Image Classification Deep Neural Network Watermarking.mp4 | 20.5 MiB | 2024 Oct 24 13:07 |
SoK Practical Foundations for Software Spectre Defenses.mp4 | 16.4 MiB | 2024 Oct 24 13:07 |
SoK Social Cybersecurity.mp4 | 22.1 MiB | 2024 Oct 24 13:07 |
SoK The Dual Nature of Technology in *****ual Assault.mp4 | 34.3 MiB | 2024 Oct 24 13:07 |
SoK Unifying and Applying At-Risk User Research.mp4 | 28.8 MiB | 2024 Oct 24 13:07 |
SpecHammer Combining Spectre and Rowhammer for New Speculative Attacks.mp4 | 17.5 MiB | 2024 Oct 24 13:07 |
Sphinx Enabling Privacy-Preserving Online Learning over the Cloud.mp4 | 22.4 MiB | 2024 Oct 24 13:07 |
Spinning Language Models Risks of Propaganda-as-a-Service and Countermeasures.mp4 | 19.9 MiB | 2024 Oct 24 13:07 |
Spiral Fast, High-Rate Single-Server PIR via FHE Composition.mp4 | 19.4 MiB | 2024 Oct 24 13:07 |
Spook.js Attacking Chrome Strict Site Isolation via Speculative Execution.mp4 | 25.0 MiB | 2024 Oct 24 13:07 |
Statistical Quantification of Differential Privacy A Local Approach.mp4 | 17.0 MiB | 2024 Oct 24 13:07 |
Surakav Generating Realistic Traces for a Strong Website Fingerprinting Defense.mp4 | 10.5 MiB | 2024 Oct 24 13:07 |
SwarmFlawFinder Discovering and Exploiting Logic Flaws of Swarm Algorithms.mp4 | 32.0 MiB | 2024 Oct 24 13:07 |
TASHAROK-Using Mechanism Design for Enhancing Security Resource Allocation in Interdependent Systems.mp4 | 29.6 MiB | 2024 Oct 24 13:07 |
TROLLMAGNIFIER Detecting State-Sponsored Troll Accounts on Reddit.mp4 | 17.9 MiB | 2024 Oct 24 13:07 |
The Experts' Insights on the Peer Review Process of Evaluating Security Papers.mp4 | 17.8 MiB | 2024 Oct 24 13:07 |
The State of the SameSite Studying the Usage, Effectiveness, and Adequacy of SameSite Cookies.mp4 | 15.1 MiB | 2024 Oct 24 13:07 |
They're not that hard to mitigate -What Cryptographic Library Developers Think About Timing Attacks.mp4 | 28.4 MiB | 2024 Oct 24 13:07 |
Time-Print Authenticating USB Flash Drives with Novel Timing Fingerprints.mp4 | 22.3 MiB | 2024 Oct 24 13:07 |
Timing-Based Browsing Privacy Vulnerabilities Via Site Isolation.mp4 | 17.4 MiB | 2024 Oct 24 13:07 |
Transcending TRANSCEND Revisiting Malware Classification in the Presence of Concept Drift.mp4 | 19.4 MiB | 2024 Oct 24 13:07 |
Transfer Attacks Revisited A Large-Scale Empirical Study in Real Computer Vision Settings.mp4 | 8.8 MiB | 2024 Oct 24 13:07 |
Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms.mp4 | 10.7 MiB | 2024 Oct 24 13:07 |
Universal 3-Dimensional Perturbations for Black-Box Attacks on Video Recognition Systems.mp4 | 18.8 MiB | 2024 Oct 24 13:07 |
Universal Atomic Swaps Secure Exchange of Coins Across All Blockchains.mp4 | 12.4 MiB | 2024 Oct 24 13:07 |
Using Throughput-Centric Byzantine Broadcast to Tolerate Malicious Majority in Blockchains.mp4 | 15.5 MiB | 2024 Oct 24 13:07 |
WIGHT Wired Ghost Touch Attack on Capacitive Touchscreens.mp4 | 18.4 MiB | 2024 Oct 24 13:07 |
Waldo A Private Time-Series Database from Function Secret-Sharing.mp4 | 18.8 MiB | 2024 Oct 24 13:07 |
Why Crypto-detectors Fail A Systematic Evaluation of Cryptographic Misuse Detection Techniques.mp4 | 11.9 MiB | 2024 Oct 24 13:07 |
Wobfuscator Obfuscating JavaScript Malware via Opportunistic Translation to WebAssembly.mp4 | 20.6 MiB | 2024 Oct 24 13:07 |
WtaGraph Web Tracking and Advertising Detection using Graph Neural Networks.mp4 | 14.6 MiB | 2024 Oct 24 13:07 |
ZeeStar Private Smart Contracts by Homomorphic Encryption and Zero-knowledge Proofs.mp4 | 16.7 MiB | 2024 Oct 24 13:07 |
mmSpy Spying Phone Calls using mmWave Radars.mp4 | 20.9 MiB | 2024 Oct 24 13:07 |
vSGX Virtualizing SGX Enclaves on AMD SEV.mp4 | 24.4 MiB | 2024 Oct 24 13:07 |