Parent directory/ | - | - |
uXOM Efficient eXecute-Only Memory on ARM Cortex-M.mp4 | 20.6 MiB | 2022 Jan 24 08:29 |
uXOM Efficient eXecute-Only Memory on ARM Cortex-M.eng.srt | 28.1 KiB | 2019 Dec 16 23:58 |
simTPM User-centric TPM for Mobile Devices.mp4 | 20.2 MiB | 2022 Jan 24 08:29 |
simTPM User-centric TPM for Mobile Devices.eng.srt | 38.1 KiB | 2019 Dec 17 00:00 |
in-toto Providing farm-to-table guarantees for bits and bytes.mp4 | 19.1 MiB | 2022 Jan 24 08:29 |
in-toto Providing farm-to-table guarantees for bits and bytes.eng.srt | 37.9 KiB | 2019 Dec 17 04:31 |
XONN XNOR-based Oblivious Deep Neural Network Inference.mp4 | 14.8 MiB | 2022 Jan 24 08:29 |
Wireless Attacks on Aircraft Instrument Landing Systems.mp4 | 28.8 MiB | 2022 Jan 24 08:29 |
Why Do Adversarial Attacks Transfer Explaining Transferability of.mp4 | 18.5 MiB | 2022 Jan 24 08:29 |
Why Do Adversarial Attacks Transfer Explaining Transferability of.eng.srt | 25.7 KiB | 2019 Dec 17 04:21 |
When the Signal is in the Noise Exploiting Diffix's Sticky Noise.mp4 | 15.9 MiB | 2022 Jan 24 08:29 |
When the Signal is in the Noise Exploiting Diffix's Sticky Noise.eng.srt | 29.4 KiB | 2019 Dec 17 00:02 |
What Are You Searching For A Remote Keylogging Attack.mp4 | 23.4 MiB | 2022 Jan 24 08:29 |
What Are You Searching For A Remote Keylogging Attack.eng.srt | 33.2 KiB | 2019 Dec 17 00:02 |
WAVE A Decentralized Authorization Framework with Transitive Delegation.mp4 | 17.9 MiB | 2022 Jan 24 08:29 |
WAVE A Decentralized Authorization Framework with Transitive Delegation.eng.srt | 41.9 KiB | 2019 Dec 17 00:04 |
VRASED A Verified Hardware Software Co-Design for Remote Attestation.mp4 | 21.0 MiB | 2022 Jan 24 08:29 |
VRASED A Verified Hardware Software Co-Design for Remote Attestation.eng.srt | 35.5 KiB | 2019 Dec 17 00:04 |
Utility-Optimized Local Differential Privacy Mechanisms for.mp4 | 20.9 MiB | 2022 Jan 24 08:29 |
Utility-Optimized Local Differential Privacy Mechanisms for.eng.srt | 26.9 KiB | 2019 Dec 17 00:06 |
Users Really Do Answer Telephone Scams.mp4 | 18.4 MiB | 2022 Jan 24 08:29 |
Users Really Do Answer Telephone Scams.eng.srt | 33.6 KiB | 2019 Dec 17 04:29 |
Understanding iOS-based Crowdturfing Through Hidden UI Analysis.mp4 | 14.1 MiB | 2022 Jan 24 08:29 |
Understanding iOS-based Crowdturfing Through Hidden UI Analysis.eng.srt | 28.9 KiB | 2019 Dec 17 00:01 |
Understanding and Securing Device Vulnerabilities through.mp4 | 18.1 MiB | 2022 Jan 24 08:29 |
Understanding and Securing Device Vulnerabilities through.eng.srt | 23.4 KiB | 2019 Dec 17 00:01 |
Understanding and Improving Security and Privacy in Multi-User.mp4 | 18.3 MiB | 2022 Jan 24 08:29 |
Understanding and Improving Security and Privacy in Multi-User.eng.srt | 40.6 KiB | 2019 Dec 16 23:58 |
UWB-ED Distance Enlargement Attack Detection in Ultra-Wideband.mp4 | 18.0 MiB | 2022 Jan 24 08:29 |
UWB-ED Distance Enlargement Attack Detection in Ultra-Wideband.eng.srt | 31.4 KiB | 2019 Dec 17 04:17 |
USENIX Security '19.m3u | 10.8 KiB | 2019 Dec 15 19:32 |
Tracing Transactions Across Cryptocurrency Ledgers.mp4 | 15.5 MiB | 2022 Jan 24 08:29 |
Tracing Transactions Across Cryptocurrency Ledgers.eng.srt | 36.9 KiB | 2019 Dec 17 04:26 |
Towards the Detection of Inconsistencies in Public Security.mp4 | 15.9 MiB | 2022 Jan 24 08:29 |
Towards the Detection of Inconsistencies in Public Security.eng.srt | 29.6 KiB | 2019 Dec 17 04:26 |
The Web's Identity Crisis Understanding the Effectiveness of Website Identity.mp4 | 18.4 MiB | 2022 Jan 24 08:29 |
The Web's Identity Crisis Understanding the Effectiveness of Website Identity.eng.srt | 36.6 KiB | 2019 Dec 17 04:33 |
The Spies Hacking our Phones are Going Dark, and We're All in Trouble.mp4 | 52.2 MiB | 2022 Jan 24 08:29 |
The Spies Hacking our Phones are Going Dark, and We're All in Trouble.eng.srt | 108.2 KiB | 2019 Dec 17 04:24 |
The Secret Sharer Evaluating and Testing Unintended Memorization in.mp4 | 13.7 MiB | 2022 Jan 24 08:29 |
The Secret Sharer Evaluating and Testing Unintended Memorization in.eng.srt | 38.0 KiB | 2019 Dec 16 23:58 |
The KNOB is Broken Exploiting Low Entropy in the Encryption Key.mp4 | 19.0 MiB | 2022 Jan 24 08:29 |
The KNOB is Broken Exploiting Low Entropy in the Encryption Key.eng.srt | 31.3 KiB | 2019 Dec 15 19:33 |
The CrossPath Attack Disrupting the SDN Control Channel via Shared Links.mp4 | 21.1 MiB | 2022 Jan 24 08:29 |
The CrossPath Attack Disrupting the SDN Control Channel via Shared Links.eng.srt | 29.1 KiB | 2019 Dec 16 23:56 |
The Betrayal At Cloud City An Empirical Analysis Of Cloud-Based Mobile.mp4 | 17.8 MiB | 2022 Jan 24 08:29 |
The Betrayal At Cloud City An Empirical Analysis Of Cloud-Based Mobile.eng.srt | 30.4 KiB | 2019 Dec 16 23:59 |
The Art of The Scam Demystifying Honeypots in Ethereum Smart Contracts.mp4 | 15.3 MiB | 2022 Jan 24 08:29 |
The Art of The Scam Demystifying Honeypots in Ethereum Smart Contracts.eng.srt | 42.1 KiB | 2019 Dec 17 00:04 |
The Anatomy of a Cryptocurrency Pump-and-Dump Scheme.mp4 | 19.5 MiB | 2022 Jan 24 08:29 |
The Anatomy of a Cryptocurrency Pump-and-Dump Scheme.eng.srt | 30.0 KiB | 2019 Dec 17 00:05 |
Terminal Brain Damage Exposing the Graceless Degradation in Deep.mp4 | 17.0 MiB | 2022 Jan 24 08:29 |
Terminal Brain Damage Exposing the Graceless Degradation in Deep.eng.srt | 32.5 KiB | 2019 Dec 17 00:00 |
Tackling the Trust and Safety Crisis.mp4 | 54.9 MiB | 2022 Jan 24 08:29 |
Tackling the Trust and Safety Crisis.eng.srt | 132.2 KiB | 2019 Dec 16 17:22 |
TESSERACT Eliminating Experimental Bias in Malware Classification.mp4 | 21.9 MiB | 2022 Jan 24 08:29 |
TESSERACT Eliminating Experimental Bias in Malware Classification.eng.srt | 35.0 KiB | 2019 Dec 17 00:01 |
StrongChain Transparent and Collaborative Proof-of-Work Consensus.mp4 | 15.3 MiB | 2022 Jan 24 08:29 |
StrongChain Transparent and Collaborative Proof-of-Work Consensus.eng.srt | 31.8 KiB | 2019 Dec 17 00:01 |
Stack Overflow Considered Helpful Deep Learning Security Nudges Towards.mp4 | 16.4 MiB | 2022 Jan 24 08:29 |
Stack Overflow Considered Helpful Deep Learning Security Nudges Towards.eng.srt | 28.8 KiB | 2019 Dec 16 23:58 |
Small World with High Risks A Study of Security Threats in the npm Ecosystem.mp4 | 14.2 MiB | 2022 Jan 24 08:29 |
Site Isolation Process Separation for Web Sites within the Browser.mp4 | 13.1 MiB | 2022 Jan 24 08:29 |
Site Isolation Process Separation for Web Sites within the Browser.eng.srt | 37.6 KiB | 2019 Dec 17 00:04 |
Shining Light on Internet-based Crimes Against *****ren.mp4 | 46.4 MiB | 2022 Jan 24 08:29 |
Shining Light on Internet-based Crimes Against *****ren.eng.srt | 116.6 KiB | 2019 Dec 17 19:52 |
Seeing is Not Believing Camouflage Attacks on Image Scaling Algorithms.mp4 | 16.2 MiB | 2022 Jan 24 08:29 |
Security Research and Public Policy.mp4 | 57.0 MiB | 2022 Jan 24 08:29 |
Security Research and Public Policy.eng.srt | 84.2 KiB | 2019 Dec 17 04:23 |
Security Educational Panel.mp4 | 139.7 MiB | 2022 Jan 24 08:29 |
Security Educational Panel.eng.srt | 185.3 KiB | 2019 Dec 17 04:33 |
Secure Multi-User Content Sharing for Augmented Reality Applications.mp4 | 14.3 MiB | 2022 Jan 24 08:29 |
Secure Multi-User Content Sharing for Augmented Reality Applications.eng.srt | 32.1 KiB | 2019 Dec 16 23:57 |
ScatterCache Thwarting Cache Attacks via Cache Set Randomization.mp4 | 17.5 MiB | 2022 Jan 24 08:29 |
ScatterCache Thwarting Cache Attacks via Cache Set Randomization.eng.srt | 36.1 KiB | 2019 Dec 17 04:25 |
Scalable Scanning and Automatic Classification of TLS Padding Oracle.mp4 | 14.5 MiB | 2022 Jan 24 08:29 |
Scalable Scanning and Automatic Classification of TLS Padding Oracle.eng.srt | 38.7 KiB | 2019 Dec 17 00:02 |
SafeHidden An Efficient and Secure Information Hiding Technique Using.mp4 | 28.8 MiB | 2022 Jan 24 08:29 |
SafeHidden An Efficient and Secure Information Hiding Technique Using.eng.srt | 33.0 KiB | 2019 Dec 17 04:29 |
SPOILER Speculative Load Hazards Boost Rowhammer and Cache Attacks.mp4 | 15.7 MiB | 2022 Jan 24 08:29 |
SPOILER Speculative Load Hazards Boost Rowhammer and Cache Attacks.eng.srt | 32.6 KiB | 2019 Dec 17 04:23 |
Robust Website Fingerprinting Through the Cache Occupancy Channel.mp4 | 14.7 MiB | 2022 Jan 24 08:29 |
Robust Website Fingerprinting Through the Cache Occupancy Channel.eng.srt | 21.1 KiB | 2019 Dec 17 00:00 |
Rendered Private Making GLSL Execution Uniform to Prevent WebGL-based.mp4 | 19.2 MiB | 2022 Jan 24 08:29 |
Rendered Private Making GLSL Execution Uniform to Prevent WebGL-based.eng.srt | 30.1 KiB | 2019 Dec 15 19:33 |
Reading the Tea leaves A Comparative Analysis of Threat Intelligence.mp4 | 17.6 MiB | 2022 Jan 24 08:29 |
Reading the Tea leaves A Comparative Analysis of Threat Intelligence.eng.srt | 31.1 KiB | 2019 Dec 17 04:26 |
RVFuzzer Finding Input Validation Bugs in Robotic Vehicles through.mp4 | 18.0 MiB | 2022 Jan 24 08:29 |
RVFuzzer Finding Input Validation Bugs in Robotic Vehicles through.eng.srt | 30.3 KiB | 2019 Dec 17 04:25 |
RAZOR A Framework for Post-deployment Software Debloating.mp4 | 17.2 MiB | 2022 Jan 24 08:29 |
RAZOR A Framework for Post-deployment Software Debloating.eng.srt | 31.1 KiB | 2019 Dec 17 00:05 |
Pythia Remote Oracles for the Masses.mp4 | 17.2 MiB | 2022 Jan 24 08:29 |
Pythia Remote Oracles for the Masses.eng.srt | 35.8 KiB | 2019 Dec 17 00:01 |
Protecting accounts from credential stuffing with password breach alerting.mp4 | 23.9 MiB | 2022 Jan 24 08:29 |
Protecting accounts from credential stuffing with password breach alerting.eng.srt | 43.9 KiB | 2019 Dec 17 00:04 |
Protecting Cloud Virtual Machines from Hypervisor and Host Operating.mp4 | 16.4 MiB | 2022 Jan 24 08:29 |
Protecting Cloud Virtual Machines from Hypervisor and Host Operating.eng.srt | 30.3 KiB | 2019 Dec 17 00:03 |
Probability Model Transforming Encoders Against Encoding Attacks.mp4 | 19.6 MiB | 2022 Jan 24 08:29 |
Probability Model Transforming Encoders Against Encoding Attacks.eng.srt | 27.8 KiB | 2019 Dec 17 00:04 |
PolicyLint Investigating Internal Privacy Policy Contradictions on Google.mp4 | 22.6 MiB | 2022 Jan 24 08:29 |
PolicyLint Investigating Internal Privacy Policy Contradictions on Google.eng.srt | 32.2 KiB | 2019 Dec 17 00:00 |
Point Break A Study of Bandwidth Denial-of-Service Attacks against Tor.mp4 | 19.9 MiB | 2022 Jan 24 08:29 |
Point Break A Study of Bandwidth Denial-of-Service Attacks against Tor.eng.srt | 37.5 KiB | 2019 Dec 17 00:05 |
Please Pay Inside Evaluating Bluetooth-based Detection of Gas Pump Skimmers.mp4 | 20.9 MiB | 2022 Jan 24 08:29 |
Please Pay Inside Evaluating Bluetooth-based Detection of Gas Pump Skimmers.eng.srt | 45.8 KiB | 2019 Dec 16 23:59 |
Platforms in Everything Analyzing Ground-Truth Data on the Anatomy and.mp4 | 18.2 MiB | 2022 Jan 24 08:29 |
Platforms in Everything Analyzing Ground-Truth Data on the Anatomy and.eng.srt | 38.1 KiB | 2019 Dec 17 00:03 |
PeX A Permission Check Analysis Framework for Linux Kernel.mp4 | 16.4 MiB | 2022 Jan 24 08:29 |
PeX A Permission Check Analysis Framework for Linux Kernel.eng.srt | 28.2 KiB | 2019 Dec 17 04:29 |
PAC it up Towards Pointer Integrity using ARM Pointer Authentication.mp4 | 21.7 MiB | 2022 Jan 24 08:29 |
PAC it up Towards Pointer Integrity using ARM Pointer Authentication.eng.srt | 33.5 KiB | 2019 Dec 16 23:58 |
Origin-sensitive Control Flow Integrity.mp4 | 18.5 MiB | 2022 Jan 24 08:29 |
Origin-sensitive Control Flow Integrity.eng.srt | 29.3 KiB | 2019 Dec 16 23:58 |
On (The Lack Of) Location Privacy in Crowdsourcing Applications.mp4 | 28.0 MiB | 2022 Jan 24 08:29 |
On (The Lack Of) Location Privacy in Crowdsourcing Applications.eng.srt | 38.0 KiB | 2019 Dec 17 00:06 |
Not Everything is Dark and Gloomy Power Grid Protections Against IoT.mp4 | 23.2 MiB | 2022 Jan 24 08:29 |
Not Everything is Dark and Gloomy Power Grid Protections Against IoT.eng.srt | 34.6 KiB | 2019 Dec 17 00:02 |
No Right to Remain Silent Isolating Malicious Mixes.mp4 | 27.5 MiB | 2022 Jan 24 08:29 |
Mobile Private Contact Discovery at Scale.mp4 | 16.3 MiB | 2022 Jan 24 08:29 |
Mobile Private Contact Discovery at Scale.eng.srt | 33.5 KiB | 2019 Dec 17 04:31 |
Misleading Authorship Attribution of Source Code using Adversarial Learning.mp4 | 20.7 MiB | 2022 Jan 24 08:29 |
Misleading Authorship Attribution of Source Code using Adversarial Learning.eng.srt | 38.9 KiB | 2019 Dec 17 04:23 |
MOPT Optimized Mutation Scheduling for Fuzzers.mp4 | 19.2 MiB | 2022 Jan 24 08:29 |
MOPT Optimized Mutation Scheduling for Fuzzers.eng.srt | 29.4 KiB | 2019 Dec 17 04:34 |
Losing the Car Keys Wireless PHY-Layer Insecurity in EV Charging.mp4 | 22.8 MiB | 2022 Jan 24 08:29 |
Losing the Car Keys Wireless PHY-Layer Insecurity in EV Charging.eng.srt | 33.9 KiB | 2019 Dec 16 23:59 |
Looking from the Mirror Evaluating IoT Device Security through.mp4 | 14.8 MiB | 2022 Jan 24 08:29 |
Looking from the Mirror Evaluating IoT Device Security through.eng.srt | 28.6 KiB | 2019 Dec 17 00:02 |
Lessons Learned from Evaluating the Robustness of Defenses to.mp4 | 37.7 MiB | 2022 Jan 24 08:29 |
Lessons Learned from Evaluating the Robustness of Defenses to.eng.srt | 86.6 KiB | 2019 Dec 17 00:01 |
Lessons Learned About Building Secure Software It's About the Developers.mp4 | 40.2 MiB | 2022 Jan 24 08:29 |
Lessons Learned About Building Secure Software It's About the Developers.eng.srt | 82.1 KiB | 2019 Dec 17 04:32 |
Less is More Quantifying the Security Benefits of Debloating Web Applications.mp4 | 17.3 MiB | 2022 Jan 24 08:29 |
Leaky Images Targeted Privacy Attacks in the Web.mp4 | 19.4 MiB | 2022 Jan 24 08:29 |
Leaky Images Targeted Privacy Attacks in the Web.eng.srt | 39.5 KiB | 2019 Dec 17 00:02 |
KEPLER Facilitating Control-flow Hijacking Primitive Evaluation for Linux.mp4 | 19.0 MiB | 2022 Jan 24 08:29 |
KEPLER Facilitating Control-flow Hijacking Primitive Evaluation for Linux.eng.srt | 33.3 KiB | 2019 Dec 17 04:28 |
Johnny, you are fired - Spoofing OpenPGP and S MIME Signatures in Emails.mp4 | 17.5 MiB | 2022 Jan 24 08:29 |
Johnny, you are fired - Spoofing OpenPGP and S MIME Signatures in Emails.eng.srt | 32.0 KiB | 2019 Dec 17 06:56 |
JEDI Many-to-Many End-to-End Encryption and Key Delegation for IoT.mp4 | 18.0 MiB | 2022 Jan 24 08:29 |
JEDI Many-to-Many End-to-End Encryption and Key Delegation for IoT.eng.srt | 45.3 KiB | 2019 Dec 17 04:30 |
Inadvertently Making Cyber Criminals Rich A Comprehensive Study of.mp4 | 20.5 MiB | 2022 Jan 24 08:29 |
Inadvertently Making Cyber Criminals Rich A Comprehensive Study of.eng.srt | 40.6 KiB | 2019 Dec 17 04:34 |
Improving Robustness of ML Classifiers against Realizable Evasio.mp4 | 21.0 MiB | 2022 Jan 24 08:29 |
Improving Robustness of ML Classifiers against Realizable Evasio.eng.srt | 34.8 KiB | 2019 Dec 16 23:58 |
Iframes Popups Are Dangerous in Mobile WebView Studying and.mp4 | 17.2 MiB | 2022 Jan 24 08:29 |
Iframes Popups Are Dangerous in Mobile WebView Studying and.eng.srt | 28.5 KiB | 2019 Dec 17 00:02 |
Identifying Cache-Based Side Channels through Secret-Augmented.mp4 | 21.7 MiB | 2022 Jan 24 08:29 |
Identifying Cache-Based Side Channels through Secret-Augmented.eng.srt | 30.1 KiB | 2019 Dec 17 00:00 |
IODINE Verifying Constant-Time Execution of Hardware.mp4 | 13.7 MiB | 2022 Jan 24 08:29 |
IODINE Verifying Constant-Time Execution of Hardware.eng.srt | 32.7 KiB | 2019 Dec 17 00:03 |
High Precision Detection of Business Email Compromise.mp4 | 16.6 MiB | 2022 Jan 24 08:29 |
High Precision Detection of Business Email Compromise.eng.srt | 35.0 KiB | 2019 Dec 17 00:03 |
Hiding in Plain Signal Physical Signal Overshadowing Attack on LTE.mp4 | 24.9 MiB | 2022 Jan 24 08:29 |
Hiding in Plain Signal Physical Signal Overshadowing Attack on LTE.eng.srt | 30.6 KiB | 2019 Dec 17 19:52 |
HideMyApp Hiding the Presence of Sensitive Apps on Android.mp4 | 14.3 MiB | 2022 Jan 24 08:29 |
HideMyApp Hiding the Presence of Sensitive Apps on Android.eng.srt | 30.7 KiB | 2019 Dec 17 00:01 |
HardFails Insights into Software-Exploitable Hardware Bugs.mp4 | 19.1 MiB | 2022 Jan 24 08:29 |
HardFails Insights into Software-Exploitable Hardware Bugs.eng.srt | 36.8 KiB | 2019 Dec 17 04:21 |
GRIMOIRE Synthesizing Structure while Fuzzing.mp4 | 13.5 MiB | 2022 Jan 24 08:29 |
GRIMOIRE Synthesizing Structure while Fuzzing.eng.srt | 29.5 KiB | 2019 Dec 17 00:06 |
Fuzzification Anti-Fuzzing Techniques.mp4 | 13.4 MiB | 2022 Jan 24 08:29 |
Fuzzification Anti-Fuzzing Techniques.eng.srt | 27.3 KiB | 2019 Dec 17 00:06 |
From Privacy by Design to Data Protection by Design The Challenges of.mp4 | 50.8 MiB | 2022 Jan 24 08:29 |
From Privacy by Design to Data Protection by Design The Challenges of.eng.srt | 75.0 KiB | 2019 Dec 17 04:22 |
From IP ID to Device ID and KASLR Bypass.mp4 | 19.5 MiB | 2022 Jan 24 08:29 |
From IP ID to Device ID and KASLR Bypass.eng.srt | 29.9 KiB | 2019 Dec 17 04:28 |
FastKitten Practical Smart Contracts on Bitcoin.mp4 | 18.9 MiB | 2022 Jan 24 08:29 |
FastKitten Practical Smart Contracts on Bitcoin.eng.srt | 35.2 KiB | 2019 Dec 17 04:26 |
FIRM-AFL High-Throughput Greybox Fuzzing of IoT Firmware via.mp4 | 20.6 MiB | 2022 Jan 24 08:29 |
FIRM-AFL High-Throughput Greybox Fuzzing of IoT Firmware via.eng.srt | 29.1 KiB | 2019 Dec 17 00:02 |
Exploiting Unprotected I O Operations in AMD's Secure Encrypted Virtualization.mp4 | 15.9 MiB | 2022 Jan 24 08:29 |
Exploiting Unprotected I O Operations in AMD's Secure Encrypted Virtualization.eng.srt | 32.1 KiB | 2019 Dec 17 00:03 |
Everyone is Different Client-side Diversification for Defending.mp4 | 17.8 MiB | 2022 Jan 24 08:29 |
Everyone is Different Client-side Diversification for Defending.eng.srt | 32.1 KiB | 2019 Dec 17 00:05 |
EverParse Verified Secure Zero-Copy Parsers for Authenticated Message Formats.mp4 | 18.5 MiB | 2022 Jan 24 08:29 |
Evaluating the Contextual Integrity of Privacy Regulation Parents' IoT.mp4 | 21.9 MiB | 2022 Jan 24 08:29 |
Evaluating the Contextual Integrity of Privacy Regulation Parents' IoT.eng.srt | 39.2 KiB | 2019 Dec 17 04:19 |
Evaluating Mobile Messengers for Implementation Vulnerabilities.mp4 | 42.5 MiB | 2022 Jan 24 08:29 |
Evaluating Mobile Messengers for Implementation Vulnerabilities.eng.srt | 83.1 KiB | 2019 Dec 16 23:58 |
Evaluating Differentially Private Machine Learning in Practice.mp4 | 13.4 MiB | 2022 Jan 24 08:29 |
Evaluating Differentially Private Machine Learning in Practice.eng.srt | 25.9 KiB | 2019 Dec 17 00:06 |
EnTrust Regulating Sensor Access by Cooperating Programs.mp4 | 25.7 MiB | 2022 Jan 24 08:29 |
EnTrust Regulating Sensor Access by Cooperating Programs.eng.srt | 33.4 KiB | 2019 Dec 17 04:26 |
EnFuzz Ensemble Fuzzing with Seed Synchronization among Diverse Fuzzers.mp4 | 16.1 MiB | 2022 Jan 24 08:29 |
EnFuzz Ensemble Fuzzing with Seed Synchronization among Diverse Fuzzers.eng.srt | 28.2 KiB | 2019 Dec 17 00:06 |
Embracing the - Hack. - A Better Strategy for Team-Defense.mp4 | 42.8 MiB | 2022 Jan 24 08:29 |
Embracing the - Hack. - A Better Strategy for Team-Defense.eng.srt | 77.8 KiB | 2019 Dec 16 23:58 |
ERIM Secure, Efficient In-process Isolation with Protection Keys (MPK).mp4 | 26.4 MiB | 2022 Jan 24 08:29 |
ERIM Secure, Efficient In-process Isolation with Protection Keys (MPK).eng.srt | 36.0 KiB | 2019 Dec 17 00:03 |
Discovering and Understanding the Security Hazards in the.mp4 | 18.3 MiB | 2022 Jan 24 08:29 |
Discovering and Understanding the Security Hazards in the.eng.srt | 34.1 KiB | 2019 Dec 17 04:29 |
Devils in the Guidance Predicting Logic Vulnerabilities in Payment.mp4 | 12.3 MiB | 2022 Jan 24 08:29 |
Devils in the Guidance Predicting Logic Vulnerabilities in Payment.eng.srt | 27.0 KiB | 2019 Dec 17 04:25 |
Detecting and Characterizing Lateral Phishing at Scale.mp4 | 17.1 MiB | 2022 Jan 24 08:29 |
Detecting and Characterizing Lateral Phishing at Scale.eng.srt | 43.3 KiB | 2019 Dec 17 04:29 |
Detecting Missing-Check Bugs via Semantic- and Context-Aware.mp4 | 15.3 MiB | 2022 Jan 24 08:29 |
Detecting Missing-Check Bugs via Semantic- and Context-Aware.eng.srt | 32.6 KiB | 2019 Dec 17 00:05 |
DEEPVSA Facilitating Value-set Analysis with Deep Learning for.mp4 | 15.8 MiB | 2022 Jan 24 08:29 |
DEEPVSA Facilitating Value-set Analysis with Deep Learning for.eng.srt | 24.9 KiB | 2019 Dec 17 00:05 |
Computer Security and Privacy in the Interactions Between Victim.mp4 | 14.7 MiB | 2022 Jan 24 08:29 |
Computer Security and Privacy in the Interactions Between Victim.eng.srt | 35.9 KiB | 2019 Dec 16 23:57 |
Cognitive Triaging of Phishing Attacks.mp4 | 15.9 MiB | 2022 Jan 24 08:29 |
Clinical Computer Security for Victims of Intimate Partner Violence.mp4 | 17.0 MiB | 2022 Jan 24 08:29 |
Clinical Computer Security for Victims of Intimate Partner Violence.eng.srt | 36.6 KiB | 2019 Dec 16 23:57 |
CT-GAN Malicious Tampering of 3D Medical Imagery using Deep Learning.mp4 | 22.6 MiB | 2022 Jan 24 08:29 |
CT-GAN Malicious Tampering of 3D Medical Imagery using Deep Learning.eng.srt | 35.4 KiB | 2019 Dec 17 00:00 |
CSI NN Reverse Engineering of Neural Network Architectures.mp4 | 20.8 MiB | 2022 Jan 24 08:29 |
CONFIRM Evaluating Compatibility and Relevance of Control-flow.mp4 | 22.7 MiB | 2022 Jan 24 08:29 |
CONFIRM Evaluating Compatibility and Relevance of Control-flow.eng.srt | 37.7 KiB | 2019 Dec 17 00:05 |
CANvas Fast and Inexpensive Automotive Network Mapping.mp4 | 24.1 MiB | 2022 Jan 24 08:29 |
CANvas Fast and Inexpensive Automotive Network Mapping.eng.srt | 31.4 KiB | 2019 Dec 17 04:22 |
Blind Bernoulli Trials A Noninteractive Protocol For Hidden-Weight Coin Flips.mp4 | 19.5 MiB | 2022 Jan 24 08:29 |
Blind Bernoulli Trials A Noninteractive Protocol For Hidden-Weight Coin Flips.eng.srt | 32.6 KiB | 2019 Dec 17 00:04 |
Birthday, Name and Bifacial-security Understanding Passwords.mp4 | 24.3 MiB | 2022 Jan 24 08:29 |
Birthday, Name and Bifacial-security Understanding Passwords.eng.srt | 28.3 KiB | 2019 Dec 17 04:31 |
Back to the Whiteboard a Principled Approach for the Assessment and.mp4 | 12.9 MiB | 2022 Jan 24 08:29 |
Back to the Whiteboard a Principled Approach for the Assessment and.eng.srt | 30.3 KiB | 2019 Dec 17 00:05 |
Baby Steps towards the Precipice How the Web Became a Scary.mp4 | 55.6 MiB | 2022 Jan 24 08:29 |
Baby Steps towards the Precipice How the Web Became a Scary.eng.srt | 91.1 KiB | 2019 Dec 17 04:33 |
BITE Bitcoin Lightweight Client Privacy using Trusted Execution.mp4 | 17.0 MiB | 2022 Jan 24 08:29 |
BITE Bitcoin Lightweight Client Privacy using Trusted Execution.eng.srt | 34.6 KiB | 2019 Dec 17 00:01 |
AntiFuzz Impeding Fuzzing Audits of Binary Executables.mp4 | 13.9 MiB | 2022 Jan 24 08:29 |
AntiFuzz Impeding Fuzzing Audits of Binary Executables.eng.srt | 35.6 KiB | 2019 Dec 17 00:06 |
All Your Clicks Belong to Me Investigating Click Interception on the Web.mp4 | 23.0 MiB | 2022 Jan 24 08:29 |
All Your Clicks Belong to Me Investigating Click Interception on the Web.eng.srt | 35.8 KiB | 2019 Dec 17 00:01 |
All Things Considered An Analysis of IoT Devices on Home Networks.mp4 | 15.2 MiB | 2022 Jan 24 08:29 |
All Things Considered An Analysis of IoT Devices on Home Networks.eng.srt | 37.5 KiB | 2019 Dec 17 00:02 |
ATTACK2VEC Leveraging Temporal Word Embeddings to Understand the.mp4 | 18.6 MiB | 2022 Jan 24 08:29 |
ATTACK2VEC Leveraging Temporal Word Embeddings to Understand the.eng.srt | 30.8 KiB | 2019 Dec 17 00:01 |
ALOHA Auxiliary Loss Optimization for Hypothesis Augmentation.mp4 | 17.0 MiB | 2022 Jan 24 08:29 |
ALOHA Auxiliary Loss Optimization for Hypothesis Augmentation.eng.srt | 33.6 KiB | 2019 Dec 16 23:58 |
A Systematic Evaluation of Transient Execution Attacks and Defenses.mp4 | 14.6 MiB | 2022 Jan 24 08:29 |
A Systematic Evaluation of Transient Execution Attacks and Defenses.eng.srt | 32.5 KiB | 2019 Dec 16 23:58 |
A Study of the Feasibility of Co-located App Attacks against BLE.mp4 | 12.3 MiB | 2022 Jan 24 08:29 |
A Study of the Feasibility of Co-located App Attacks against BLE.eng.srt | 37.0 KiB | 2019 Dec 16 23:56 |
A Billion Open Interfaces for Eve and Mallory MitM, DoS, and Tracking.mp4 | 18.1 MiB | 2022 Jan 24 08:29 |
A Billion Open Interfaces for Eve and Mallory MitM, DoS, and Tracking.eng.srt | 30.7 KiB | 2019 Dec 16 23:56 |
50 Ways to Leak Your Data An Exploration of Apps'.mp4 | 14.0 MiB | 2022 Jan 24 08:29 |
50 Ways to Leak Your Data An Exploration of Apps'.eng.srt | 36.2 KiB | 2019 Dec 17 00:00 |