Parent directory/ | - | - |
Dismantling Megamos Crypto Wirelessly Lockpicking a Vehicle Immobilizer - Roel Verdult, Flavio D. Garcia, Baris Ege.srt | 39.4 KiB | 2019 Oct 01 03:56 |
Windows 8 Security - Supporting User Confidence - Crispin Cowan.srt | 58.6 KiB | 2019 Oct 01 03:56 |
Tracking the Casino Computer Wars Who’s Winning - the Casino or the Cheat - Richard Marcus.srt | 82.8 KiB | 2019 Oct 01 03:56 |
Confessions of a Recovering Data Broker Responsible Innovation in the Age of Big Data, Big Brother, and the Coming Skynet Terminators - Jim Adler.srt | 118.4 KiB | 2019 Oct 01 03:56 |
Building Securable Infrastructure Open-Source Private Clouds - Pravir Chandra.srt | 125.5 KiB | 2019 Oct 01 03:56 |
Security Team 2.0 - Chris Evans.srt | 126.0 KiB | 2019 Oct 01 03:56 |
Dr. Felten Goes To Washington - Lessons from 18 Months in Government - Edward W. Felten.srt | 136.1 KiB | 2019 Oct 01 03:56 |
The White House's Priorities for Cybersecurity - Andy Ozment.srt | 138.8 KiB | 2019 Oct 01 03:56 |
PCF A Portable Circuit Format for Scalable Two-Party Secure Computation - Ben Kreuter, Benjamin Mood, Abhi Shelat, Kevin Butler.mp4 | 14.7 MiB | 2022 Jan 23 03:00 |
Impression Fraud in On-line Advertising via Pay-Per-View Networks - Kevin Springborn, Paul Barford.mp4 | 17.7 MiB | 2022 Jan 23 03:00 |
Revolver An Automated Approach to the Detection of Evasive Web-based Malware - Alexandros Kapravelos, Yan Shoshitaishvili, Marco Cova, Christopher Kruegel, Giovanni Vigna.mp4 | 18.2 MiB | 2022 Jan 23 03:00 |
Greystar Fast and Accurate Detection of SMS Spam Numbers in Large Cellular Networks Using Gray Phone Space - Nan Jiang, Yu Jin, Ann Skudlark, Zhi-Li Zhang.mp4 | 18.2 MiB | 2022 Jan 23 03:00 |
You Are How You Click Clickstream Analysis for Sybil Detection - Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng, Ben Y. Zhao.mp4 | 18.5 MiB | 2022 Jan 23 03:00 |
Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers - Suman Jana, David Molnar, Alexander Moshchuk, Alan Dunn, Benjamin Livshits, Helen J. Wang, E.mp4 | 20.2 MiB | 2022 Jan 23 03:00 |
Securing Embedded User Interfaces Android and Beyond - Franziska Roesner, Tadayoshi Kohno.mp4 | 20.3 MiB | 2022 Jan 23 03:00 |
ExecScent Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates - Terry Nelms, Roberto Perdisci, Mustaque Ahamad.mp4 | 20.7 MiB | 2022 Jan 23 03:00 |
On the Security of Picture Gesture Authentication - Ziming Zhao, Gail-Joon Ahn, Jeong-Jin Seo, Hongxin Hu.mp4 | 20.7 MiB | 2022 Jan 23 03:00 |
An Empirical Study of Vulnerability Rewards Programs - Matthew Finifter, Devdatta Akhawe, David Wagner.mp4 | 20.8 MiB | 2022 Jan 23 03:00 |
Take This Personally Pollution Attacks on Personalized Services - Xinyu Xing, Wei Meng, Dan Doozan, Alex C. Snoeren, Nick Feamster, Wenke Lee.mp4 | 21.3 MiB | 2022 Jan 23 03:00 |
Effective Inter-Component Communication Mapping in Android An Essential Step Towards Holistic Security Analysis - Damien Octeau, Patrick McDaniel, Somesh Jha, Alexandre Bartel, Eri.mp4 | 21.3 MiB | 2022 Jan 23 03:00 |
Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring - Edward J. Schwartz, JongHyup Lee, Maverick Woo, David Brumley.mp4 | 21.5 MiB | 2022 Jan 23 03:00 |
Alice in Warningland A Large-Scale Field Study of Browser Security Warning Effectiveness - Devdatta Akhawe, Adrienne Porter Felt.mp4 | 21.5 MiB | 2022 Jan 23 03:00 |
ZQL A Compiler for Privacy-Preserving Data Processing - Cedric Fournet, Markulf Kohlweiss, George Danezis.mp4 | 21.6 MiB | 2022 Jan 23 03:00 |
Steal This Movie Automatically Bypassing DRM Protection in Streaming Media Services - Ruoyu Wang, Santa Barbara, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna.mp4 | 21.6 MiB | 2022 Jan 23 03:00 |
Explicating SDKs Uncovering Assumptions Underlying Secure Authentication and Authorization - Rui Wang, Yuchen Zhou, Shuo Chen, Shaz Qadeer, David Evans, Yuri Gurevich.mp4 | 21.8 MiB | 2022 Jan 23 03:00 |
On the Security of RC4 in TLS - Nadhem AlFardan, Royal Holloway, Daniel J. Bernstein, Kenneth G. Paterson, Bertram Poettering, Jacob C.N. Schuldt.mp4 | 22.0 MiB | 2022 Jan 23 03:00 |
Proactively Accountable Anonymous Messaging in Verdict - Henry Corrigan-Gibbs, David Isaac Wolinsky, Bryan Ford.mp4 | 22.3 MiB | 2022 Jan 23 03:00 |
Sancus Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base - Job Noorman, Pieter Agten, Wilfried Daniels, Raoul Strackx, Anthony Van Herre.mp4 | 22.5 MiB | 2022 Jan 23 03:00 |
Secure Outsourced Garbled Circuit Evaluation for Mobile Devices - Henry Carter, Benjamin Mood, Patrick Traynor, Kevin Butler.mp4 | 23.0 MiB | 2022 Jan 23 03:00 |
Dowsing for Ovrflows A Guided Fuzzer to Find Buffer Boundary Violations - Istvan Haller, Asia Slowinska, Matthias Neugschwandtner, Herbert Bos.mp4 | 23.0 MiB | 2022 Jan 23 03:00 |
Eradicating DNS Rebinding with the Extended Same-origin Policy - Martin Johns, Sebastian Lekies, Ben Stock.mp4 | 23.1 MiB | 2022 Jan 23 03:00 |
FIE on Firmware Finding Vulnerabilities in Embedded Systems Using Symbolic Execution - Drew Davidson, Benjamin Moench, Somesh Jha, Thomas Ristenpart.mp4 | 23.1 MiB | 2022 Jan 23 03:00 |
Transparent ROP Exploit Mitigation Using Indirect Branch Tracing - Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis.mp4 | 23.2 MiB | 2022 Jan 23 03:00 |
Control Flow Integrity for COTS Binaries - Mingwei Zhang, R. Sekar.mp4 | 23.4 MiB | 2022 Jan 23 03:00 |
Jekyll on iOS When Benign Apps Become Evil - Tielei Wang, Kangjie Lu, Long Lu, Simon Chung, Wenke Lee.mp4 | 23.6 MiB | 2022 Jan 23 03:00 |
Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation - Frank Imeson, Ariq Emtenan, Siddharth Garg, Mahesh V. Tripunita.mp4 | 23.7 MiB | 2022 Jan 23 03:00 |
Towards Automatic Software Lineage Inference - Jiyong Jang, Maverick Woo, David Brumley.mp4 | 24.3 MiB | 2022 Jan 23 03:00 |
Trafficking Fradulent Accounts The Role of the Underground Market in Twitter Spam and ***** - Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, Vern Paxson.mp4 | 24.6 MiB | 2022 Jan 23 03:00 |
WHYPER Towards Automating Risk Assessment of Mobile Applications - Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, Tao Xie.mp4 | 24.8 MiB | 2022 Jan 23 03:00 |
ZMap Fast Internet-wide Scanning and Its Security Applications - durumeric.mp4 | 24.8 MiB | 2022 Jan 23 03:00 |
The Velocity of Censorship High-Fidelity Detection of Microblog Post Deletions - Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall.mp4 | 24.9 MiB | 2022 Jan 23 03:00 |
Dismantling Megamos Crypto Wirelessly Lockpicking a Vehicle Immobilizer - Roel Verdult, Flavio D. Garcia, Baris Ege.mp4 | 24.9 MiB | 2022 Jan 23 03:00 |
Measuring the Practical Impact of DNSSEC Deployment - Wilson Lian, Eric Rescorla, Hovav Shacham, Stefan Savage.mp4 | 25.2 MiB | 2022 Jan 23 03:00 |
MetaSymploit Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis - Ruowen Wang, Peng Ning, Tao Xie, Quan Chen.mp4 | 25.3 MiB | 2022 Jan 23 03:00 |
Windows 8 Security Supporting User Confidence - Crispin Cowan.mp4 | 38.7 MiB | 2022 Jan 23 03:00 |
Windows 8 Security - Supporting User Confidence - Crispin Cowan.mp4 | 39.0 MiB | 2022 Jan 23 03:00 |
Tracking the Casino Computer Wars Who’s Winning - the Casino or the Cheat - Richard Marcus.mp4 | 50.1 MiB | 2022 Jan 23 03:00 |
Building Securable Infrastructure Open-Source Private Clouds - Pravir Chandra.mp4 | 59.4 MiB | 2022 Jan 23 03:00 |
Confessions of a Recovering Data Broker Responsible Innovation in the Age of Big Data, Big Brother, and the Coming Skynet Terminators - Jim Adler.mp4 | 72.8 MiB | 2022 Jan 23 03:00 |
Security Team 2.0 - Chris Evans.mp4 | 77.1 MiB | 2022 Jan 23 03:00 |
Dr. Felten Goes To Washington - Lessons from 18 Months in Government - Edward W. Felten.mp4 | 81.0 MiB | 2022 Jan 23 03:00 |
The White House's Priorities for Cybersecurity - Andy Ozment.mp4 | 91.6 MiB | 2022 Jan 23 03:00 |