搜索
IEEE Security and Privacy
磁力链接/BT种子名称
IEEE Security and Privacy
磁力链接/BT种子简介
种子哈希:
5e9c81bf3ccf9fc1bec201328ef8d7f1dd1dace3
文件大小:
15.19G
已经下载:
6857
次
下载速度:
极快
收录时间:
2024-01-03
最近下载:
2025-05-13
移花宫入口
移花宫.com
邀月.com
怜星.com
花无缺.com
yhgbt.icu
yhgbt.top
磁力链接下载
magnet:?xt=urn:btih:5E9C81BF3CCF9FC1BEC201328EF8D7F1DD1DACE3
推荐使用
PIKPAK网盘
下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看
下载BT种子文件
磁力链接
迅雷下载
PIKPAK在线播放
世界之窗
91视频
含羞草
欲漫涩
逼哩逼哩
成人快手
51品茶
抖阴破解版
极乐禁地
91短视频
TikTok成人版
PornHub
草榴社区
91未成年
乱伦巴士
呦乐园
萝莉岛
最近搜索
money+talks
adn-310
woodman - xcalibur
戴眼镜学生
midv-999
npjs+068
维修
可爱+尿
使劲
星空之上
知名导演和女艺人ktv淫乱现场流出
fc2ppv -3274782
dass-395
哪吒
korn
不可以
niva+bupa+health+ins
潇潇姐
wwsd
黄袜
迷姫のお姉さん
七天探花
欧美vr
小樱
vrkm-01581
启示录
5k
也不知高潮了几次
清纯第一次
金品梅+磁力
文件列表
IEEE Security and Privacy 2017/Securing Augmented Reality Output.84d6e03b-b9a3-43cb-99ad-5277a4f98362.part
187.7 MB
IEEE Security and Privacy 2020/SSP 2020 Opening Remarks.mp4
100.2 MB
IEEE Security and Privacy 2022/LangSec Keynote Trojan Source and Bad Characters Invisible Hacks and Reluctant Patching.mp4
67.2 MB
IEEE Security and Privacy 2016/NITRD Panel - Federal Cybersecurity and Privacy R&D Strategic Plans.mp4
51.8 MB
IEEE Security and Privacy 2022/IEEE S&P 2022 Opening Session.mp4
51.2 MB
IEEE Security and Privacy 2019/IEEE S&P 2019 - TC Business Meeting.mp4
48.9 MB
IEEE Security and Privacy 2019/IEEE S&P 2019 - 40th Celebration Plenary Session Panel Reflections on four decades of the symposium.mp4
47.8 MB
IEEE Security and Privacy 2015/Missing the Point(er) - On the Effectiveness of Code Pointer Integrity.mp4
43.6 MB
IEEE Security and Privacy 2022/Invisible Finger Practical Electromagnetic Interference Attack on Touchscreen Electronic Devices.mp4
43.4 MB
IEEE Security and Privacy 2023/IEEE S&P 2023 Short Talks.mp4
41.9 MB
IEEE Security and Privacy 2015/Cross-Architecture Bug Search in Binary Executables.mp4
41.8 MB
IEEE Security and Privacy 2017/Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping.mp4
40.9 MB
IEEE Security and Privacy 2015/Temporal Lensing and Its Application in Pulsing Denial-of-Service Attacks.mp4
40.7 MB
IEEE Security and Privacy 2016/S&P TC Business Meeting.mp4
40.6 MB
IEEE Security and Privacy 2017/SoK - Science, Security, and the Elusive Goal of Security as a Scientific Pursuit.mp4
39.6 MB
IEEE Security and Privacy 2020/Birds of a Feather A Hardware & Security Panel (Updated).mp4
38.7 MB
IEEE Security and Privacy 2015/Forward Secure Asynchronous Messaging from Puncturable Encryption.mp4
38.5 MB
IEEE Security and Privacy 2015/High System-Code Security with Low Overhead.mp4
38.3 MB
IEEE Security and Privacy 2015/Secure Track Verification.mp4
37.8 MB
IEEE Security and Privacy 2017/Backward-bounded DSE - Targeting Infeasibility Questions on Obfuscated Codes.mp4
36.8 MB
IEEE Security and Privacy 2015/SurroundWeb - Mitigating Privacy Concerns in a 3D Web Browser.mp4
35.9 MB
IEEE Security and Privacy 2019/Hard Drive of Hearing Disks that Eavesdrop with a Synthesized Microphone.mp4
35.9 MB
IEEE Security and Privacy 2015/Riposte - An Anonymous Messaging System Handling Millions of Users.mp4
35.7 MB
IEEE Security and Privacy 2015/The Attack of the Clones - A Study of the Impact of Shared Code on Vulnerability Patching.mp4
35.7 MB
IEEE Security and Privacy 2017/VUDDY - A Scalable Approach for Vulnerable Code Clone Discovery.mp4
35.5 MB
IEEE Security and Privacy 2015/GenoGuard - Protecting Genomic Data against Brute-Force Attacks.mp4
35.4 MB
IEEE Security and Privacy 2017/SmarPer - Context-Aware and Automatic Runtime-Permissions for Mobile Devices - YouTube.mp4
35.1 MB
IEEE Security and Privacy 2017/IKP - Turning a PKI Around with Decentralized Automated Incentives.mp4
34.7 MB
IEEE Security and Privacy 2015/S$A - A Shared Cache Attack That Works across Cores and Defies VM Sandboxing ....mp4
34.5 MB
IEEE Security and Privacy 2015/ADSNARK - Nearly Practical and Privacy-Preserving Proofs on Authenticated Data.mp4
34.3 MB
IEEE Security and Privacy 2017/SymCerts - Practical Symbolic Execution For Exposing Noncompliance in X.509 Certificate Validation.mp4
34.3 MB
IEEE Security and Privacy 2015/On Subnormal Floating Point and Abnormal Timing.mp4
34.2 MB
IEEE Security and Privacy 2022/Security Foundations for Application-Based Covert Communication Channels.mp4
34.1 MB
IEEE Security and Privacy 2015/SoK - Research Perspectives and Challenges for Bitcoin and Cryptocurrencies.mp4
33.8 MB
IEEE Security and Privacy 2017/Cloak and Dagger - From Two Permissions to Complete Control of the UI Feedback Loop.mp4
33.4 MB
IEEE Security and Privacy 2022/SwarmFlawFinder Discovering and Exploiting Logic Flaws of Swarm Algorithms.mp4
33.4 MB
IEEE Security and Privacy 2019/Drones' Cryptanalysis - Detecting Privacy Invasion Attacks Conducted by Drone.mp4
33.4 MB
IEEE Security and Privacy 2019/LBM A Security Framework for Peripherals within the Linux Kernel.mp4
33.3 MB
IEEE Security and Privacy 2022/TASHAROK-Using Mechanism Design for Enhancing Security Resource Allocation in Interdependent Systems.mp4
33.2 MB
IEEE Security and Privacy 2015/What the App is That Deception and Countermeasures in the Android User Interface.mp4
33.2 MB
IEEE Security and Privacy 2017/Is Interaction Necessary for Distributed Private Learning.mp4
32.9 MB
IEEE Security and Privacy 2015/Counterfeit Object-oriented Programming.mp4
32.7 MB
IEEE Security and Privacy 2015/Security of the J-PAKE Password-Authenticated Key Exchange Protocol.mp4
32.6 MB
IEEE Security and Privacy 2015/Understanding and Monitoring Embedded Web Scripts.mp4
32.4 MB
IEEE Security and Privacy 2015/Micro-Policies - Formally Verified, Tag-Based Security Monitors.mp4
32.3 MB
IEEE Security and Privacy 2017/HVLearn - Automated Black-box Analysis of Hostname Verification in SSL TLS Implementations.mp4
32.2 MB
IEEE Security and Privacy 2017/Scalable Bias-Resistant Distributed Randomness.mp4
32.2 MB
IEEE Security and Privacy 2015/SoK - Deep Packer Inspection - A Longitudinal Study of the Complexity of Run-Time Packers.mp4
31.8 MB
IEEE Security and Privacy 2015/Towards Making Systems Forget with Machine Unlearning.mp4
31.7 MB
IEEE Security and Privacy 2017/Hijacking Bitcoin - Routing Attacks on Cryptocurrencies.mp4
31.7 MB
IEEE Security and Privacy 2017/Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate.mp4
31.6 MB
IEEE Security and Privacy 2019/ProFuzzer On-the-fly Input Type Probing for Better Zero-day Vulnerability Discovery.mp4
31.5 MB
IEEE Security and Privacy 2017/SysPal System-guided Pattern Locks for Android.mp4
31.5 MB
IEEE Security and Privacy 2015/Readactor - Practical Code Randomization Resilient to Memory Disclosure.mp4
31.4 MB
IEEE Security and Privacy 2017/Protecting Bare-metal Embedded Systems with Privilege Overlays.mp4
31.4 MB
IEEE Security and Privacy 2019/Formally Verified Cryptographic Web Applications in WebAssembly.mp4
31.1 MB
IEEE Security and Privacy 2017/vSQL - Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases.mp4
31.1 MB
IEEE Security and Privacy 2019/Dominance as a New Trusted Computing Primitive for the IoT.mp4
30.8 MB
IEEE Security and Privacy 2017/A Lustrum of Malware Network Communication - Evolution and Insights.mp4
30.7 MB
IEEE Security and Privacy 2022/Practical EMV Relay Protection.mp4
30.6 MB
IEEE Security and Privacy 2017/Optimized Honest-Majority MPC for Malicious Adversaries - Breaking 1 Billion-Gate Second Barrier.mp4
30.5 MB
IEEE Security and Privacy 2017/SoK - Cryptographically Protected Database Search.mp4
30.5 MB
IEEE Security and Privacy 2019/SensorID Sensor Calibration Fingerprinting for Smartphones.mp4
30.4 MB
IEEE Security and Privacy 2019/Why Does Your Data Leak Uncovering the Data Leakage in Cloud from Mobile Apps.mp4
30.3 MB
IEEE Security and Privacy 2018/A Machine Learning Approach to Prevent Malicious Calls Over Telephony Networks.mp4
30.3 MB
IEEE Security and Privacy 2019/If HTTPS Were Secure I wouldn't Need 2FA End User and Administrator Mental Models of HTTPS.mp4
30.2 MB
IEEE Security and Privacy 2019/Dangerous Skills Understanding and Mitigating Security Risks of Voice-Controlled Third-Party....mp4
30.2 MB
IEEE Security and Privacy 2019/Breaking LTE on Layer Two.mp4
30.2 MB
IEEE Security and Privacy 2019/Security of GPS INS based On-road Location Tracking Systems.mp4
30.1 MB
IEEE Security and Privacy 2017/A Framework for Universally Composable Diffie-Hellman Key Exchange.mp4
30.1 MB
IEEE Security and Privacy 2015/CHERI - A Hybrid Capability-System Architecture for Scalable Software Compartmentalization.mp4
30.1 MB
IEEE Security and Privacy 2018/Routing Around Congestion - Defeating DDoS Attacks and Adverse Network Conditions via Reactive....mp4
30.0 MB
IEEE Security and Privacy 2017/CRLite - A Scalable System for Pushing All TLS Revocations to All Browsers.mp4
30.0 MB
IEEE Security and Privacy 2022/Peekaboo A Hub-Based Approach to Enable Transparency in Data Processing within Smart Homes.mp4
30.0 MB
IEEE Security and Privacy 2015/A Messy State of the Union - Taming the Composite State Machines of TLS.mp4
29.9 MB
IEEE Security and Privacy 2017/Hardening Java's Access Control by Abolishing Implicit Privilege Elevation.mp4
29.9 MB
IEEE Security and Privacy 2015/Malicious-Client Security in Blind Seer - A Scalable Private DBMS.mp4
29.9 MB
IEEE Security and Privacy 2019/New Primitives for Actively-Secure MPC over Rings with Applications to Private Machine Learning.mp4
29.9 MB
IEEE Security and Privacy 2015/Bitcoin over Tor isn't a Good Idea.mp4
29.9 MB
IEEE Security and Privacy 2022/Practical Asynchronous Distributed Key Generation.mp4
29.8 MB
IEEE Security and Privacy 2015/Every Second Counts - Quantifying the Negative Externalities of Cybercrime via Typosquatting.mp4
29.8 MB
IEEE Security and Privacy 2015/Post-Quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors Problem.mp4
29.7 MB
IEEE Security and Privacy 2019/Learning to Reconstruct Statistical Learning Theory and Encrypted Database Attacks.mp4
29.7 MB
IEEE Security and Privacy 2015/Program-Adaptive Mutational Fuzzing.mp4
29.7 MB
IEEE Security and Privacy 2017/Identifying Personal DNA Methylation Profiles by Genotype Inference.mp4
29.7 MB
IEEE Security and Privacy 2017/Implementing and Proving the TLS 1.3 Record Layer.mp4
29.6 MB
IEEE Security and Privacy 2017/Side-Channel Attacks on Shared Search Indexes.mp4
29.4 MB
IEEE Security and Privacy 2022/SoK The Dual Nature of Technology in Sexual Assault.mp4
29.4 MB
IEEE Security and Privacy 2017/XHOUND - Quantifying the Fingerprintability of Browser Extensions.mp4
29.4 MB
IEEE Security and Privacy 2017/Norax - Enabling Execute-Only Memory for COTS Binaries on AArch64.mp4
29.3 MB
IEEE Security and Privacy 2017/From Trash to Treasure - Timing-Sensitive Garbage Collection.mp4
29.3 MB
IEEE Security and Privacy 2022/IRShield A Countermeasure Against Adversarial Physical-Layer Wireless Sensing.mp4
29.3 MB
IEEE Security and Privacy 2019/Data Recovery on Encrypted Databases with k-Nearest Neighbor Query Leakage.mp4
29.3 MB
IEEE Security and Privacy 2015/Virtual Proofs of Reality and their Physical Implementation.mp4
29.1 MB
IEEE Security and Privacy 2019/How Well Do My Results Generalize Comparing Security and Privacy Survey Results from....mp4
29.0 MB
IEEE Security and Privacy 2019/SoK General Purpose Frameworks for Secure Multi-Party Computation.mp4
29.0 MB
IEEE Security and Privacy 2015/Caelus - Verifying the Consistency of Cloud Services with Battery-Powered Devices.mp4
28.9 MB
IEEE Security and Privacy 2019/SoK Shining Light on Shadow Stacks.mp4
28.9 MB
IEEE Security and Privacy 2019/Differentially Private Model Publishing For Deep Learning.mp4
28.9 MB
IEEE Security and Privacy 2017/Counter-RAPTOR - Safeguarding Tor Against Active Routing Attacks.mp4
28.8 MB
IEEE Security and Privacy 2015/ObliVM - A Programming Framework for Secure Computation.mp4
28.8 MB
IEEE Security and Privacy 2018/A Formal Treatment of Accountable Proxying over TLS.mp4
28.8 MB
IEEE Security and Privacy 2017/How They Did It - An Analysis of Emission Defeat Devices in Modern Automobiles.mp4
28.7 MB
IEEE Security and Privacy 2017/One TPM to Bind Them All - Fixing TPM2.0 for Provably Secure Anonymous Attestation.mp4
28.7 MB
IEEE Security and Privacy 2019/SoK Sanitizing for Security Dokyung Song.mp4
28.6 MB
IEEE Security and Privacy 2022/Delay Wreaks Havoc on Your Smart Home Delay-based Automation Interference Attacks.mp4
28.6 MB
IEEE Security and Privacy 2018/On the Economics of Offline Password Cracking.mp4
28.5 MB
IEEE Security and Privacy 2020/Birds of a Feather A Hardware & Security Panel (Deprecated).mp4
28.5 MB
IEEE Security and Privacy 2018/The Cards Aren't Alright - Detecting Counterfeit Gift Cards Using Encoding Jitter.mp4
28.5 MB
IEEE Security and Privacy 2019/Touching the Untouchables Dynamic Security Analysis of the LTE Control Plane.mp4
28.4 MB
IEEE Security and Privacy 2022/How Does Usable Security Not End Up in Software Products Results From a Qualitative Interview Study.mp4
28.4 MB
IEEE Security and Privacy 2019/Synesthesia Detecting Screen Content via Remote Acoustic Side Channels.mp4
28.4 MB
IEEE Security and Privacy 2015/Effective Real-Time Android Application Auditing.mp4
28.4 MB
IEEE Security and Privacy 2017/Pyramid - Enhancing Selectivity in Big Data Protection with Count Featurization.mp4
28.4 MB
IEEE Security and Privacy 2018/Another Flip in the Wall of Rowhammer Defenses.mp4
28.3 MB
IEEE Security and Privacy 2018/Blue Note - How Intentional Acoustic Interference Damages Availablity and Integrity -.mp4
28.3 MB
IEEE Security and Privacy 2015/Using Hardware Features for Increased Debugging Transparency.mp4
28.2 MB
IEEE Security and Privacy 2015/How Secure and Quick is QUIC Provable Security and Performance Analyses.mp4
28.2 MB
IEEE Security and Privacy 2017/Finding and Preventing Bugs in JavaScript Bindings.mp4
28.1 MB
IEEE Security and Privacy 2022/They're not that hard to mitigate -What Cryptographic Library Developers Think About Timing Attacks.mp4
28.1 MB
IEEE Security and Privacy 2015/Connection-Oriented DNS to Improve Privacy and Security.mp4
27.9 MB
IEEE Security and Privacy 2022/Anti-Tamper Radio System-Level Tamper Detection for Computing Systems.mp4
27.8 MB
IEEE Security and Privacy 2017/IoT Goes Nuclear - Creating a Zigbee Chain Reaction.mp4
27.8 MB
IEEE Security and Privacy 2018/Enabling Autonomous IoT Device Pairing using Different Sensor Types.mp4
27.6 MB
IEEE Security and Privacy 2015/Securing Multiparty Online Services Via Certification of Symbolic Transactions.mp4
27.5 MB
IEEE Security and Privacy 2017/NEZHA - Efficient Domain-independent Differential Testing.mp4
27.5 MB
IEEE Security and Privacy 2019/Comprehensive Privacy Analysis of Deep Learning.mp4
27.5 MB
IEEE Security and Privacy 2017/Leakage-Abuse Attacks on Order-Revealing Encryption.mp4
27.5 MB
IEEE Security and Privacy 2022/Noise A Library of Verified High-Performance Secure Channel Protocol Implementations.mp4
27.3 MB
IEEE Security and Privacy 2019/The Code That Never Ran Modeling Attacks on Speculative Evaluation.mp4
27.3 MB
IEEE Security and Privacy 2022/Domains Do Change Their Spots Quantifying Potential Abuse of Residual Trust.mp4
27.2 MB
IEEE Security and Privacy 2022/Evaluating Physical-Layer BLE Location Tracking Attacks on Mobile Devices.mp4
27.2 MB
IEEE Security and Privacy 2018/Angora - Efficient Fuzzing by Principled Search.mp4
27.2 MB
IEEE Security and Privacy 2015/Vetting SSL Usage in Applications with SSLINT.mp4
27.2 MB
IEEE Security and Privacy 2019/Asm2Vec Boosting Static Representation Robustness for Binary Clone Search....mp4
27.1 MB
IEEE Security and Privacy 2018/When Your Fitness Tracker Betrays You - Quantifying the Predictability....mp4
27.0 MB
IEEE Security and Privacy 2017/To Catch a Ratter - Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild.mp4
26.9 MB
IEEE Security and Privacy 2018/EyeTell - Video-Assisted Touchscreen Keystroke Inference from Eye Movements.mp4
26.9 MB
IEEE Security and Privacy 2022/Investigating Influencer VPN Ads on YouTube.mp4
26.8 MB
IEEE Security and Privacy 2018/Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels.mp4
26.8 MB
IEEE Security and Privacy 2019/Characterizing Pixel Tracking through the Lens of Disposable Email Services.mp4
26.7 MB
IEEE Security and Privacy 2019/SoK Security Evaluation of Home Based IoT Deployment.mp4
26.6 MB
IEEE Security and Privacy 2022/HardLog Practical Tamper-Proof System Auditing Using a Novel Audit Device.mp4
26.5 MB
IEEE Security and Privacy 2019/Simple High-Level Code for Cryptographic Arithmetic - With Proofs, Without Compromises.mp4
26.5 MB
IEEE Security and Privacy 2022/SoK Unifying and Applying At-Risk User Research.mp4
26.4 MB
IEEE Security and Privacy 2015/VC3 - Trustworthy Data Analytics in the Cloud Using SGX.mp4
26.4 MB
IEEE Security and Privacy 2017/Stack Overflow Considered Harmful -- The Impact of Copy&Paste on Android Application Security.mp4
26.4 MB
IEEE Security and Privacy 2018/Distance-Bounding Protocols - Verification without Time and Location.mp4
26.3 MB
IEEE Security and Privacy 2018/FuturesMEX - Secure, Distributed Futures Market Exchange.mp4
26.3 MB
IEEE Security and Privacy 2017/Securing Augmented Reality Output.mp4
26.2 MB
IEEE Security and Privacy 2018/Tracking Ransomware End-to-end.mp4
26.2 MB
IEEE Security and Privacy 2019/Using Safety Properties to Generate Vulnerability Patches.mp4
26.2 MB
IEEE Security and Privacy 2019/The 9 Lives of Bleichenbachers CAT New Cache ATtacks on TLS Implementations.mp4
26.2 MB
IEEE Security and Privacy 2015/Protecting Private Keys against Memory Disclosure Attacks Using Hardware Transactional Memory.mp4
26.1 MB
IEEE Security and Privacy 2022/A Formal Security Analysis of the W3C Web Payment APIs Attacks and Verification.mp4
26.1 MB
IEEE Security and Privacy 2018/Hackers vs. Testers - A Comparison of Software Vulnerability Discovery Processes.mp4
26.1 MB
IEEE Security and Privacy 2019/Spectre Attacks Exploiting Speculative Execution.mp4
26.0 MB
IEEE Security and Privacy 2018/PIR with Compressed Queries and Amortized Query Processing.mp4
26.0 MB
IEEE Security and Privacy 2023/Examining Zero-Shot Vulnerability Repair with Large Language Models.mp4
25.9 MB
IEEE Security and Privacy 2022/Measuring and Mitigating the Risk of IP Reuse on Public Clouds.mp4
25.9 MB
IEEE Security and Privacy 2019/Stealthy Porn Understanding Real World Adversarial Images for I'llicit Online Promotion.mp4
25.8 MB
IEEE Security and Privacy 2018/On Enforcing the Digital Immunity of a Large Humanitarian Organization.mp4
25.8 MB
IEEE Security and Privacy 2015/The Miner's Dilemma.mp4
25.7 MB
IEEE Security and Privacy 2018/Towards Security and Privacy for Multi User Augmented Reality.mp4
25.6 MB
IEEE Security and Privacy 2019/Threshold ECDSA from ECDSA Assumptions The Multiparty Case.mp4
25.6 MB
IEEE Security and Privacy 2018/Double-efficient zkSNARKs Without Trusted Setup.mp4
25.6 MB
IEEE Security and Privacy 2017/CoSMeDis - A Distributed Social Media Platform with Formally Verified Confidentiality Guarantees.mp4
25.6 MB
IEEE Security and Privacy 2018/Static Evaluation of Noninterference using Approximate Model Counting.mp4
25.5 MB
IEEE Security and Privacy 2019/Postcards from the Post HTTP World Amplification of HTTPS Vulnerabilities in the Web Ecosystem.mp4
25.5 MB
IEEE Security and Privacy 2019/Reasoning Analytically About Password Cracking Software Alex Liu.mp4
25.5 MB
IEEE Security and Privacy 2018/vRAM - Faster Verifiable RAM With Program-Independent Preprocessing.mp4
25.5 MB
IEEE Security and Privacy 2018/Study and Mitigation of Origin Stripping Vulnerabilities in Hybrid-postMessage Enabled Mobile Apps.mp4
25.5 MB
IEEE Security and Privacy 2017/Comparing the Usability of Cryptographic APIs.mp4
25.4 MB
IEEE Security and Privacy 2017/An Experimental Security Analysis of an Industrial Robot Controller.mp4
25.4 MB
IEEE Security and Privacy 2018/Compiler-assisted Code Randomization.mp4
25.3 MB
IEEE Security and Privacy 2015/A Generic Approach to Automatic Deobfuscation of Executable Code.mp4
25.3 MB
IEEE Security and Privacy 2022/RT-TEE Real-time System Availability for Cyber-physical Systems using ARM TrustZone.mp4
25.3 MB
IEEE Security and Privacy 2018/The Rise of the Citizen Developer - Assessing the Security Impact of Online App Generators.mp4
25.3 MB
IEEE Security and Privacy 2016/Algorithmic Transparency via Quantitative Input Influence ....mp4
25.2 MB
IEEE Security and Privacy 2017/Verifying and Synthesizing Constant-Resource Implementations with Types.mp4
25.2 MB
IEEE Security and Privacy 2015/Last-Level Cache Side-Channel Attacks are Practical.mp4
25.1 MB
IEEE Security and Privacy 2022/Desperate Times Call for Desperate Measures - User Concerns with Mobile Loan Apps in Kenya.mp4
25.1 MB
IEEE Security and Privacy 2022/Asleep at the Keyboard Assessing the Security of GitHub Copilot's Code Contributions.mp4
25.1 MB
IEEE Security and Privacy 2019/Attack Directories, Not Caches Side Channel Attacks in a Non Inclusive World.mp4
25.0 MB
IEEE Security and Privacy 2019/Towards Practical Differentialy Private Convex Optimization.mp4
25.0 MB
IEEE Security and Privacy 2017/IVD - Automatic Learning and Enforcement of Authorization Rules in Online Social Networks - YouTube.mp4
25.0 MB
IEEE Security and Privacy 2023/Discop Provably Secure Steganography in Practice Based on Distribution Copies.mp4
25.0 MB
IEEE Security and Privacy 2017/Augur - Internet-Wide Detection of Connectivity Disruptions.mp4
24.9 MB
IEEE Security and Privacy 2018/xJsnark - A Framework for Efficient Verifiable Computation.mp4
24.9 MB
IEEE Security and Privacy 2018/Protecting the Stack with Metadata Policies and Tagged Hardware.mp4
24.7 MB
IEEE Security and Privacy 2015/GraphSC - Parallel Secure Computation Made Easy.mp4
24.7 MB
IEEE Security and Privacy 2022/K-Scheduler Effective Seed Scheduling for Fuzzing with Graph Centrality Analysis.mp4
24.7 MB
IEEE Security and Privacy 2022/Mitigating Information Leakage Vulnerabilities with Type-based Data Isolation.mp4
24.6 MB
IEEE Security and Privacy 2019/Iodine Fast Dynamic Tain't Tracking Using Rollback free Optimistic Hybrid Analysis.mp4
24.6 MB
IEEE Security and Privacy 2015/Privacy and Access Control for Outsourced Personal Records.mp4
24.6 MB
IEEE Security and Privacy 2018/Bulletproofs - Short Proofs for Confidential Transactions and More.mp4
24.6 MB
IEEE Security and Privacy 2019/True2F Backdoor resistant authentication tokens Emma Dauterman.mp4
24.6 MB
IEEE Security and Privacy 2015/TinyGarble - Highly Compressed and Scalable Sequential Garbled Circuits.mp4
24.4 MB
IEEE Security and Privacy 2022/ShadeWatcher Recommendation-guided Cyber Threat Analysis using System Audit Records.mp4
24.4 MB
IEEE Security and Privacy 2018/Enumerating Active IPv6 Hosts for Large-scale Security Scans via DNSSEC-signed Reverse Zones.mp4
24.4 MB
IEEE Security and Privacy 2015/Geppetto - Versatile Verifiable Computation.mp4
24.4 MB
IEEE Security and Privacy 2019/Does Certificate Transparency Break the Web Measuring Adoption and Error Rate.mp4
24.3 MB
IEEE Security and Privacy 2022/A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols.mp4
24.3 MB
IEEE Security and Privacy 2019/KHyperLogLog Estimating Reidentifiability and Joinability of Large Data at Scale Pern Hui Chia.mp4
24.3 MB
IEEE Security and Privacy 2019/Beyond Credential Stuffing Password Similarity Models using Neural Networks.mp4
24.3 MB
IEEE Security and Privacy 2022/SIRAJ A Unified Framework for Aggregation of Malicious Entity Detectors.mp4
24.2 MB
IEEE Security and Privacy 2016/A2 - Analog Malicious Hardware.mp4
24.1 MB
IEEE Security and Privacy 2018/Mobile Application Web API Reconnaissance.mp4
24.1 MB
IEEE Security and Privacy 2019/Should I Worry A Cross Cultural Examination of Account Security Incident Response.mp4
24.1 MB
IEEE Security and Privacy 2019/Exploiting Correcting Codes On the Effectiveness of ECC Memory Against Rowhammer Attacks.mp4
24.0 MB
IEEE Security and Privacy 2023/SCAPHY Detecting Modern ICS Attacks by Correlating Behaviors in SCADA and PHYsical.mp4
23.9 MB
IEEE Security and Privacy 2016/CaSE - Cache-Assisted Secure Execution on ARM Processors.mp4
23.8 MB
IEEE Security and Privacy 2019/NEUZZ Efficient Fuzzing with Neural Program Smoothing.mp4
23.8 MB
IEEE Security and Privacy 2018/Sonar - Detecting SS7 Redirection Attacks With Audio-Based Distance Bounding.mp4
23.8 MB
IEEE Security and Privacy 2017/Towards Evaluating the Robustness of Neural Networks.mp4
23.8 MB
IEEE Security and Privacy 2018/Learning from Mutants - Using Code Mutation to Learn and Monitor Invariants of a CPS.mp4
23.8 MB
IEEE Security and Privacy 2022/Heapster Analyzing the Security of Dynamic Allocators for Monolithic Firmware Images.mp4
23.8 MB
IEEE Security and Privacy 2019/CaSym Cache Aware Symbolic Execution for Side Channel Detection and Mitigation.mp4
23.7 MB
IEEE Security and Privacy 2018/Speechless - Analyzing the Threat to Speech Privacy from Smartphone Motion Sensors.mp4
23.7 MB
IEEE Security and Privacy 2017/SecureML - A System for Scalable Privacy-Preserving Machine Learning.mp4
23.6 MB
IEEE Security and Privacy 2022/Privacy-from-Birth Protecting Sensed Data from Malicious Sensors with VERSA.mp4
23.6 MB
IEEE Security and Privacy 2022/Exposed Infrastructures-Discovery, Attacks and Remediation of Insecure ICS Remote Management Devices.mp4
23.6 MB
IEEE Security and Privacy 2018/Manipulating Machine Learning - Poisoning Attacks & Countermeasures.mp4
23.6 MB
IEEE Security and Privacy 2018/Implementing Conjunction Obfuscation under Entropic Ring LWE.mp4
23.5 MB
IEEE Security and Privacy 2022/Sphinx Enabling Privacy-Preserving Online Learning over the Cloud.mp4
23.5 MB
IEEE Security and Privacy 2018/EnclaveDB - A Secure Database using SGX.mp4
23.5 MB
IEEE Security and Privacy 2019/Ouroboros Crypsinous Privacy Preserving Proof of Stake.mp4
23.5 MB
IEEE Security and Privacy 2019/An Extensive Formal Security Analysis of the OpenID Financial grade API Pedram Hosseyni.mp4
23.4 MB
IEEE Security and Privacy 2017/Multi-touch Authentication Using Hand Geometry and Behavioral Information.mp4
23.4 MB
IEEE Security and Privacy 2017/Catena - Efficient Non-equivocation via Bitcoin.mp4
23.4 MB
IEEE Security and Privacy 2018/OmniLedger - A Secure, Scale-Out, Decentralized Ledger via Sharding.mp4
23.3 MB
IEEE Security and Privacy 2017/SoK - Exploiting Network Printers.mp4
23.3 MB
IEEE Security and Privacy 2022/vSGX Virtualizing SGX Enclaves on AMD SEV.mp4
23.2 MB
IEEE Security and Privacy 2020/Birds of a Feather Sharing Cybersecurity Research Artifacts To Accelerate Progress.mp4
23.2 MB
IEEE Security and Privacy 2017/Machine-Checked Proofs of Privacy for Electronic Voting Protocols.mp4
23.2 MB
IEEE Security and Privacy 2016/Keeping Authorities - Honest or Bust - with Decentralized Witness Cosigning.mp4
23.1 MB
IEEE Security and Privacy 2019/PhishFarm A Scalable Framework for Measuring the Effectivness of Evasion Techniques Against....mp4
23.1 MB
IEEE Security and Privacy 2023/Confident Monte Carlo Rigorous Analysis of Guessing Curves for Probabilistic Password Models.mp4
23.1 MB
IEEE Security and Privacy 2018/Racing in Hyperspace - Closing Hyper Threading Side Channels on SGX.mp4
23.1 MB
IEEE Security and Privacy 2018/Computer Security and Privacy for Refugees in the United States.mp4
23.1 MB
IEEE Security and Privacy 2022/Deployment of Source Address Validation by Network Operators A Randomized Control Trial.mp4
23.0 MB
IEEE Security and Privacy 2020/Intriguing Properties of Adversarial ML Attacks in the Problem Space.mp4
23.0 MB
IEEE Security and Privacy 2023/Certifiably Robust Object Detection against Patch Hiding Attacks via Patch-agnostic Masking.mp4
23.0 MB
IEEE Security and Privacy 2022/FuzzUSB Hybrid Stateful Fuzzing of USB Gadget Stacks.mp4
22.9 MB
IEEE Security and Privacy 2017/Your Exploit is Mine - Automatic Shellcode Transplant for Remote Exploits.mp4
22.9 MB
IEEE Security and Privacy 2022/Blacksmith Compromising Target Row Refresh by Rowhammering in the Frequency Domain.mp4
22.9 MB
IEEE Security and Privacy 2019/XCLAIM Trustless Interoperable Cryptocurrency Backed Assets.mp4
22.9 MB
IEEE Security and Privacy 2016/Verifiable ASICs.mp4
22.8 MB
IEEE Security and Privacy 2019/Understanding the Security of ARM Debugging Features.mp4
22.8 MB
IEEE Security and Privacy 2015/Ad Injection at Scale - Assessing Deceptive Advertisement Modifications.mp4
22.8 MB
IEEE Security and Privacy 2022/Spook.js Attacking Chrome Strict Site Isolation via Speculative Execution.mp4
22.8 MB
IEEE Security and Privacy 2022/DeepSteal Advanced Model Extractions Leveraging Efficient Weight Stealing in Memories.mp4
22.7 MB
IEEE Security and Privacy 2019/Fidelius Protecting User Secrets from Compromised Browsers.mp4
22.7 MB
IEEE Security and Privacy 2015/Automatic Inference of Search Patterns for Tain't-Style Vulnerabilities.mp4
22.7 MB
IEEE Security and Privacy 2022/Copy, Right A Testing Framework for Copyright Protection of Deep Learning Models.mp4
22.6 MB
IEEE Security and Privacy 2019/Redactable Blockchain in the Permissionless Setting.mp4
22.6 MB
IEEE Security and Privacy 2015/Cracking-Resistant Password Vaults Using Natural Language Encoders.mp4
22.5 MB
IEEE Security and Privacy 2022/ProVerif with Lemmas, Induction, Fast Subsumption, and Much More.mp4
22.5 MB
IEEE Security and Privacy 2023/Inducing Wireless Chargers to Voice Out for Inaudible Command Attacks.mp4
22.5 MB
IEEE Security and Privacy 2022/SPURT Scalable Distributed Randomness Beacon with Transparent Setup.mp4
22.5 MB
IEEE Security and Privacy 2022/Reconstructing Training Data with Informed Adversaries.mp4
22.5 MB
IEEE Security and Privacy 2018/Privacy Risks with Facebook's PII-based Targeting.mp4
22.4 MB
IEEE Security and Privacy 2022/IRQDebloat Reducing Driver Attack Surface in Embedded Devices.mp4
22.4 MB
IEEE Security and Privacy 2018/T-Fuzz Fuzzing by Program Transformation - Hui Peng.mp4
22.3 MB
IEEE Security and Privacy 2018/Grand Pwning Unit - Accelerating Microarchitectural Attacks with the GPU.mp4
22.3 MB
IEEE Security and Privacy 2022/Formal Model-Driven Discovery of Bluetooth Protocol Design Vulnerabilities.mp4
22.3 MB
IEEE Security and Privacy 2023/PyFET Forensically Equivalent Transformation for Python Binary Decompilation.mp4
22.3 MB
IEEE Security and Privacy 2018/Locally Differentially Private Frequent Itemset Mining.mp4
22.3 MB
IEEE Security and Privacy 2022/DeepCASE Semi-Supervised Contextual Analysis of Security Events.mp4
22.3 MB
IEEE Security and Privacy 2019/Measuring and Analyzing Search Engine Poisoning of Linguistic Collisions.mp4
22.2 MB
IEEE Security and Privacy 2022/How to Attack and Generate Honeywords.mp4
22.2 MB
IEEE Security and Privacy 2022/Repairing DoS Vulnerability of Real-World Regexes.mp4
22.1 MB
IEEE Security and Privacy 2022/Membership inference attacks from first principles.mp4
22.1 MB
IEEE Security and Privacy 2018/SoK - Plug & Pray - Today - Understanding USB Insecurity in Versions 1 through C.mp4
21.9 MB
IEEE Security and Privacy 2023/Security and Privacy Challenges, Advice, and Opportunities at Cybercafes in Kenya.mp4
21.9 MB
IEEE Security and Privacy 2018/Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage.mp4
21.8 MB
IEEE Security and Privacy 2023/AEM Facilitating Cross-Version Exploitability Assessment of Linux Kernel Vulnerabilities.mp4
21.8 MB
IEEE Security and Privacy 2022/Time-Print Authenticating USB Flash Drives with Novel Timing Fingerprints.mp4
21.8 MB
IEEE Security and Privacy 2023/Space Odyssey An Experimental Software Security Analysis of Satellites.mp4
21.7 MB
IEEE Security and Privacy 2015/Leave Me Alone - App-Level Protection against Runtime Information Gathering on Android.mp4
21.7 MB
IEEE Security and Privacy 2019/Towards Automated Safety Vetting of PLC Code in Real World Plants Mu Zhang.mp4
21.6 MB
IEEE Security and Privacy 2015/SoK - Secure Messaging.mp4
21.6 MB
IEEE Security and Privacy 2019/Proof Of Stake Sidechains.mp4
21.6 MB
IEEE Security and Privacy 2019/SoK The Challenges Pitfalls and Perils of Using Hardware Performance Counters for Security.mp4
21.5 MB
IEEE Security and Privacy 2016/TaoStore - Overcoming Asynchronicity in Oblivious Data Storage.mp4
21.4 MB
IEEE Security and Privacy 2018/Stealing Hyperparameters in Machine Learning.mp4
21.4 MB
IEEE Security and Privacy 2022/CirC Compiler infrastructure for proof systems, software verification, and more.mp4
21.3 MB
IEEE Security and Privacy 2020/Are We Susceptible to Rowhammer An End-to-End Methodology for Cloud Providers.mp4
21.3 MB
IEEE Security and Privacy 2019/Fuzzing File Systems via Two-Dimensional Input Space Exploration.mp4
21.3 MB
IEEE Security and Privacy 2018/Crowd-GPS-Sec - Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks.mp4
21.3 MB
IEEE Security and Privacy 2018/Surveylance - Automatically Detecting Online Survey Scams.mp4
21.3 MB
IEEE Security and Privacy 2022/PGPATCH Policy-Guided Logic Bug Patching for Robotic Vehicles.mp4
21.3 MB
IEEE Security and Privacy 2016/Users Really Do Plug in USB Drives They Find.mp4
21.3 MB
IEEE Security and Privacy 2016/Verena - End-to-End Integrity Protection for Web Applications.mp4
21.3 MB
IEEE Security and Privacy 2018/Opening Remarks of the 39th IEEE Symposium on Security & Privacy.mp4
21.2 MB
IEEE Security and Privacy 2019/Razzer Finding Kernel Race Bugs through Fuzzing.mp4
21.1 MB
IEEE Security and Privacy 2022/Graphics Peeping Unit Exploiting EM Side-Channel Information of GPUs to Eavesdrop on Your Neighbors.mp4
21.0 MB
IEEE Security and Privacy 2022/PICCOLO Exposing Complex Backdoors in NLP Transformer Models.mp4
21.0 MB
IEEE Security and Privacy 2023/LAMBRETTA Learning to Rank for Twitter Soft Moderation.mp4
20.9 MB
IEEE Security and Privacy 2022/Publicly Accountable Robust Multi-Party Computation.mp4
20.9 MB
IEEE Security and Privacy 2018/Anonymity Trilemma - Strong Anonymity, Low Bandwidth Overhead, Low Latency -- Choose Two.mp4
20.9 MB
IEEE Security and Privacy 2022/Phishing in Organizations Findings from a Large-Scale and Long-Term Study.mp4
20.9 MB
IEEE Security and Privacy 2019/Exploiting Unintended Feature leakage in Collaborative Learning Congzheng Song.mp4
20.9 MB
IEEE Security and Privacy 2016/Helping Johnny to Analyze Malware - A Usability-Optimized Decompiler and Malware Analysis User Study.mp4
20.8 MB
IEEE Security and Privacy 2016/MitM Attack by Name Collision - Cause Analysis and Vulnerability Assessment in the New gTLD Era.mp4
20.7 MB
IEEE Security and Privacy 2018/Tracking Certificate Misissuance in the Wild.mp4
20.7 MB
IEEE Security and Privacy 2022/Model Stealing Attacks Against Inductive Graph Neural Networks.mp4
20.7 MB
IEEE Security and Privacy 2016/PhotoProof - Cryptographic Image Authentication for Any Set of Permissible Transformations.mp4
20.7 MB
IEEE Security and Privacy 2022/Adversarial Examples - for Proof-of-Learning.mp4
20.6 MB
IEEE Security and Privacy 2018/SoK - Keylogging Side Channels.mp4
20.6 MB
IEEE Security and Privacy 2020/ICAS An Extensible Framework for Estimating the Susceptibility of IC Layouts to Additive Trojans.mp4
20.6 MB
IEEE Security and Privacy 2017/Spotless Sandboxes - Evading Malware Analysis Systems using Wear-and-Tear Artifacts.mp4
20.6 MB
IEEE Security and Privacy 2019/On the Security of Two-Round Multi-Signatures.mp4
20.5 MB
IEEE Security and Privacy 2022/SoK How Robust is Image Classification Deep Neural Network Watermarking.mp4
20.5 MB
IEEE Security and Privacy 2016/pASSWORD tYPOS and How to Correct Them Securely.mp4
20.5 MB
IEEE Security and Privacy 2022/Wobfuscator Obfuscating JavaScript Malware via Opportunistic Translation to WebAssembly.mp4
20.5 MB
IEEE Security and Privacy 2021/An Interactive Prover for Protocol Verification in the Computational Model.mp4
20.5 MB
IEEE Security and Privacy 2017/Obstacles to the Adoption of Secure Communication Tools.mp4
20.5 MB
IEEE Security and Privacy 2019/Theory and Practice of Finding Eviction Sets.mp4
20.4 MB
IEEE Security and Privacy 2019/PrivKV Key Value Data Collection with Local Differential Privacy.mp4
20.3 MB
IEEE Security and Privacy 2021/ConDySTA Context-Aware Dynamic Supplement to Static Tain't Analysis.mp4
20.3 MB
IEEE Security and Privacy 2016/Security Analysis of Emerging Smart Home Applications.mp4
20.3 MB
IEEE Security and Privacy 2022/SYMBEXCEL Automated Analysis and Understanding of Malicious Excel 4.0 Macros.mp4
20.3 MB
IEEE Security and Privacy 2023/SNAP Efficient Extraction of Private Properties with Poisoning.mp4
20.2 MB
IEEE Security and Privacy 2023/Deep perceptual hashing algorithms with hidden dual purpose client-side scanning facial recognition.mp4
20.2 MB
IEEE Security and Privacy 2016/High-Speed Inter-domain Fault Localization.mp4
20.2 MB
IEEE Security and Privacy 2016/Distillation as a Defense to Adversarial Perturbations against Deep Neural Networks.mp4
20.2 MB
IEEE Security and Privacy 2022/Spinning Language Models Risks of Propaganda-as-a-Service and Countermeasures.mp4
20.2 MB
IEEE Security and Privacy 2022/Spiral Fast, High-Rate Single-Server PIR via FHE Composition.mp4
20.1 MB
IEEE Security and Privacy 2022/WIGHT Wired Ghost Touch Attack on Capacitive Touchscreens.mp4
20.0 MB
IEEE Security and Privacy 2018/FPGA-Based Remote Power Side-Channel Attacks.mp4
20.0 MB
IEEE Security and Privacy 2023/WarpAttack Bypassing CFI through Compiler-Introduced Double-Fetches.mp4
20.0 MB
IEEE Security and Privacy 2018/Secure Device Bootstrapping without Secrets Resistant to Signal Manipulation Attacks.mp4
20.0 MB
IEEE Security and Privacy 2021/Post-Quantum WireGuard.mp4
20.0 MB
IEEE Security and Privacy 2016/Key Confirmation in Key Exchange - A Formal Treatment and Implications for TLS 1.3.mp4
20.0 MB
IEEE Security and Privacy 2022/SoK Social Cybersecurity.mp4
19.9 MB
IEEE Security and Privacy 2017/Skyfire - Data-Driven Seed Generation for Fuzzing.mp4
19.9 MB
IEEE Security and Privacy 2022/Finding and Exploiting CPU Features using MSR Templating.mp4
19.9 MB
IEEE Security and Privacy 2023/Not Yet Another Digital ID Privacy-preserving Humanitarian Aid Distribution.mp4
19.9 MB
IEEE Security and Privacy 2016/Following Devil's Footprints - Cross-Platform Analysis of Potentially Harmful Libraries ....mp4
19.9 MB
IEEE Security and Privacy 2022/Foundations of Dynamic BFT.mp4
19.8 MB
IEEE Security and Privacy 2018/Impossibility of Precise and Sound Termination-Sensitive Security Enforcements.mp4
19.8 MB
IEEE Security and Privacy 2016/Beauty and the Beast - Diverting modern web browsers to build unique browser fingerprints.mp4
19.8 MB
IEEE Security and Privacy 2020/Pseudorandom Black Swans Cache Attacks on CTR_DRBG.mp4
19.7 MB
IEEE Security and Privacy 2022/Universal 3-Dimensional Perturbations for Black-Box Attacks on Video Recognition Systems.mp4
19.7 MB
IEEE Security and Privacy 2022/De-Identification's Impact on Minority Representation and Privacy Preservation in the US Census.mp4
19.6 MB
IEEE Security and Privacy 2021/The EMV Standard Break, Fix, Verify.mp4
19.6 MB
IEEE Security and Privacy 2017/Under the Shadow of Sunshine - Understanding & Detecting Bulletproof Hosting.mp4
19.5 MB
IEEE Security and Privacy 2023/On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security.mp4
19.4 MB
IEEE Security and Privacy 2016/Cinderella - Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with ....mp4
19.4 MB
IEEE Security and Privacy 2022/GREBE Unveiling Exploitation Potential for Linux Kernel Bugs.mp4
19.4 MB
IEEE Security and Privacy 2022/Transcending TRANSCEND Revisiting Malware Classification in the Presence of Concept Drift.mp4
19.4 MB
IEEE Security and Privacy 2016/Talos - Neutralizing Vulnerabilities with Security Workarounds for Rapid Response.mp4
19.4 MB
IEEE Security and Privacy 2022/mmSpy Spying Phone Calls using mmWave Radars.mp4
19.3 MB
IEEE Security and Privacy 2016/A Practical Oblivious Map Data Structure with Secure Deletion and History Independence.mp4
19.3 MB
IEEE Security and Privacy 2022/BadEncoder Backdoor Attacks to Pre-trained Encoders in Self-Supervised Learning.mp4
19.2 MB
IEEE Security and Privacy 2022/Bad Characters Imperceptible NLP Attacks.mp4
19.1 MB
IEEE Security and Privacy 2016/Downgrade Resilience in Key-Exchange Protocols.mp4
19.1 MB
IEEE Security and Privacy 2022/Timing-Based Browsing Privacy Vulnerabilities Via Site Isolation.mp4
19.1 MB
IEEE Security and Privacy 2016/Synthesizing Plausible Privacy-Preserving Location Traces.mp4
19.1 MB
IEEE Security and Privacy 2022/How Not to Protect Your IP - An Industry-Wide Break of IEEE 1735 Implementations.mp4
19.1 MB
IEEE Security and Privacy 2016/On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud.mp4
19.1 MB
IEEE Security and Privacy 2019/EmPoWeb Empowering Web Applications with Browser Extensions.mp4
19.1 MB
IEEE Security and Privacy 2022/Augury Using Data Memory-Dependent Prefetchers to Leak Data at Rest.mp4
19.0 MB
IEEE Security and Privacy 2020/Combating Dependence Explosion in Forensic Analysis Using Alternative Tag Propagation Semantics.mp4
19.0 MB
IEEE Security and Privacy 2018/Understanding Linux Malware.mp4
19.0 MB
IEEE Security and Privacy 2016/Shreds - Fine-grained Execution Units with Private Memory.mp4
19.0 MB
IEEE Security and Privacy 2018/A Tale of Two Studies - The Best and Worst of YubiKey Usability.mp4
19.0 MB
IEEE Security and Privacy 2022/Exploit the Last Straw That Breaks Android Systems.mp4
19.0 MB
IEEE Security and Privacy 2019/F-BLEAU Fast Black-box Leakage Estimation.mp4
18.9 MB
IEEE Security and Privacy 2022/A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP.mp4
18.9 MB
IEEE Security and Privacy 2018/FP-Stalker - Tracking Browser Fingerprint Evolutions - Antoine Vastel.mp4
18.9 MB
IEEE Security and Privacy 2016/TriggerScope - Towards Detecting Logic Bombs in Android Applications.mp4
18.8 MB
IEEE Security and Privacy 2023/TELEPATH A Minecraft-based Covert Communication System.mp4
18.8 MB
IEEE Security and Privacy 2018/Oblix - An Efficient Oblivious Search Index.mp4
18.8 MB
IEEE Security and Privacy 2022/Back to the Drawing Board A Critical Evaluation of Poisoning Attacks on Federated Learning.mp4
18.7 MB
IEEE Security and Privacy 2015/Controlled-Channel Attacks - Deterministic Side Channels for Untrusted Operating Systems.mp4
18.7 MB
IEEE Security and Privacy 2021/SoK Quantifying Cyber Risk.mp4
18.7 MB
IEEE Security and Privacy 2023/On the (In)security of Peer-to-Peer Decentralized Machine Learning.mp4
18.7 MB
IEEE Security and Privacy 2019/Lay Down the Common Metrics Evaluating Proof of Work Consensus Protocols' Security.mp4
18.6 MB
IEEE Security and Privacy 2022/TROLLMAGNIFIER Detecting State-Sponsored Troll Accounts on Reddit.mp4
18.6 MB
IEEE Security and Privacy 2016/Data-Oriented Programming - On the Expressiveness of Non-Control Data Attacks.mp4
18.6 MB
IEEE Security and Privacy 2022/DEPCOMM Graph Summarization on System Audit Logs for Attack Investigation.mp4
18.6 MB
IEEE Security and Privacy 2020/Transparent Polynomial Delegation and Its Applications to Zero Knowledge Proof.mp4
18.6 MB
IEEE Security and Privacy 2020/MarkUs Drop-in Use-After-Free Prevention for Low-Level Languages.mp4
18.6 MB
IEEE Security and Privacy 2016/Staying Secure and Unprepared - Understanding and Mitigating the Security Risks of Apple ZeroConf.mp4
18.5 MB
IEEE Security and Privacy 2022/SMILE Secure Memory Introspection for Live Enclave.mp4
18.5 MB
IEEE Security and Privacy 2022/MatRiCT More Efficient Post-Quantum Private Blockchain Payments.mp4
18.5 MB
IEEE Security and Privacy 2016/The Cracked Cookie Jar - HTTP Cookie Hijacking and the Exposure of Private Information.mp4
18.5 MB
IEEE Security and Privacy 2016/SoK - Everyone Hates Robocalls - A Survey of Techniques against Telephone Spam.mp4
18.4 MB
IEEE Security and Privacy 2022/Waldo A Private Time-Series Database from Function Secret-Sharing.mp4
18.3 MB
IEEE Security and Privacy 2023/Scalable and Privacy-Preserving Federated Principal Component Analysis.mp4
18.3 MB
IEEE Security and Privacy 2023/LazyTAP On-Demand Data Minimization for Trigger-Action Applications.mp4
18.3 MB
IEEE Security and Privacy 2019/RIDL Rogue In-Flight Data Load.mp4
18.2 MB
IEEE Security and Privacy 2022/Analyzing Ground-Truth Data of Mobile Gambling Scam.mp4
18.2 MB
IEEE Security and Privacy 2023/No Privacy in the Electronics Repair Industry.mp4
18.2 MB
IEEE Security and Privacy 2020/Towards Effective Differential Privacy Comms for Users' Data Sharing Decision and Comprehension.mp4
18.2 MB
IEEE Security and Privacy 2016/A Tough call - Mitigating Advanced Code-Reuse Attacks At The Binary Level.mp4
18.1 MB
IEEE Security and Privacy 2023/A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations.mp4
18.1 MB
IEEE Security and Privacy 2023/High-Order Masking of Lattice Signatures in Quasilinear Time.mp4
18.1 MB
IEEE Security and Privacy 2016/You Get Where You're Looking For - The Impact Of Information Sources On Code Security.mp4
18.1 MB
IEEE Security and Privacy 2016/Multiple Handshakes Security of TLS 1.3 Candidates.mp4
18.1 MB
IEEE Security and Privacy 2020/HydRand Efficient Continuous Distributed Randomness.mp4
18.0 MB
IEEE Security and Privacy 2016/Return to the Zombie Gadgets - Undermining Destructive Code Reads via Code-Inference Attacks.mp4
18.0 MB
IEEE Security and Privacy 2020/SoK A Minimalist Approach to Formalizing Analog Sensor Security.mp4
17.9 MB
IEEE Security and Privacy 2023/Characterizing the Limits of POV Acoustic Eavesdropping from Smartphone Cameras.mp4
17.9 MB
IEEE Security and Privacy 2023/Practical Timing Side-Channel Attacks on Memory Compression.mp4
17.9 MB
IEEE Security and Privacy 2016/Prepose - Privacy, Security, and Reliability for Gesture-Based Programming.mp4
17.8 MB
IEEE Security and Privacy 2016/LAVA - Large-scale Automated Vulnerability Addition.mp4
17.8 MB
IEEE Security and Privacy 2016/Domain-Z - 28 Registrations Later.mp4
17.8 MB
IEEE Security and Privacy 2016/Inferring User Routes and Locations using Zero-Permission Mobile Sensors.mp4
17.8 MB
IEEE Security and Privacy 2022/Attacks on Wireless Coexistence.mp4
17.8 MB
IEEE Security and Privacy 2023/Is Cryptographic Deniability Sufficient Non-Expert Perceptions of Deniability in Secure Messaging.mp4
17.8 MB
IEEE Security and Privacy 2019/Helen Maliciously Secure Coopetitive Learning for Linear Models.mp4
17.7 MB
IEEE Security and Privacy 2022/Using Throughput-Centric Byzantine Broadcast to Tolerate Malicious Majority in Blockchains.mp4
17.7 MB
IEEE Security and Privacy 2022/SpecHammer Combining Spectre and Rowhammer for New Speculative Attacks.mp4
17.7 MB
IEEE Security and Privacy 2023/Breaking Security-Critical Voice Authentication.mp4
17.6 MB
IEEE Security and Privacy 2023/User Perceptions and Experiences with Smart Home Updates.mp4
17.6 MB
IEEE Security and Privacy 2022/Locally Differentially Private Sparse Vector Aggregation.mp4
17.6 MB
IEEE Security and Privacy 2022/Mind the Gap Studying the Insecurity of Provably Secure Embedded Trusted Execution Architectures.mp4
17.6 MB
IEEE Security and Privacy 2023/RAB Provable Robustness Against Backdoor Attacks.mp4
17.6 MB
IEEE Security and Privacy 2019/IEEE S&P 2019 - Opening Remarks - Program Chair.mp4
17.6 MB
IEEE Security and Privacy 2018/DEEPSEC - Deciding Equivalence Properties in Security Protocols - Theory and Practice.mp4
17.6 MB
IEEE Security and Privacy 2023/SecureCells A Secure Compartmentalized Architecture.mp4
17.5 MB
IEEE Security and Privacy 2023/Analyzing Leakage of Personally Identifiable Information in Language Models.mp4
17.5 MB
IEEE Security and Privacy 2023/GraphSPD Graph-Based Security Patch Detection with Enriched Code Semantics.mp4
17.5 MB
IEEE Security and Privacy 2023/FLUTE Fast and Secure Lookup Table Evaluations.mp4
17.5 MB
IEEE Security and Privacy 2023/Collaborative Ad Transparency Promises and Limitations.mp4
17.5 MB
IEEE Security and Privacy 2021/Survivalism Systematic Analysis of Malware Living-Off-The-Land.mp4
17.5 MB
IEEE Security and Privacy 2022/WtaGraph Web Tracking and Advertising Detection using Graph Neural Networks.mp4
17.5 MB
IEEE Security and Privacy 2019/Bitcoin vs. Bitcoin Cash Coexistence or Downfall of Bitcoin Cash.mp4
17.4 MB
IEEE Security and Privacy 2021/SoK An Overview of FHE Compilers and Tools.mp4
17.4 MB
IEEE Security and Privacy 2017/Membership Inference Attacks against Machine Learning Models.mp4
17.4 MB
IEEE Security and Privacy 2022/Multi-Server Verifiable Computation of Low-Degree Polynomials.mp4
17.3 MB
IEEE Security and Privacy 2016/SoK - Towards Grounding Censorship Circumvention in Empiricism.mp4
17.3 MB
IEEE Security and Privacy 2019/Kiss from a Rogue Evaluating Detectability of Pay-at-the-Pump Card Skimmers.mp4
17.2 MB
IEEE Security and Privacy 2023/PCspooF Compromising the Safety of Time-Triggered Ethernet.mp4
17.2 MB
IEEE Security and Privacy 2023/Private Eye On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing.mp4
17.2 MB
IEEE Security and Privacy 2022/PCR-Auth Solving Authentication Puzzle Challenges with Encoded Palm Contact Responses.mp4
17.2 MB
IEEE Security and Privacy 2022/Security Analysis of the MLS Key Derivation.mp4
17.1 MB
IEEE Security and Privacy 2023/AUC Accountable Universal Composability.mp4
17.1 MB
IEEE Security and Privacy 2022/Private Nearest Neighbor Search with Sublinear Communication and Malicious Security.mp4
17.1 MB
IEEE Security and Privacy 2022/PROTRR Principled yet Optimal In-DRAM Target Row Refresh.mp4
17.1 MB
IEEE Security and Privacy 2023/A Theory to Instruct Differentially-Private Learning via Clipping Bias Reduction.mp4
17.1 MB
IEEE Security and Privacy 2022/Cats vs. Spectre An Axiomatic Approach to Modeling Speculative Execution Attacks.mp4
17.1 MB
IEEE Security and Privacy 2023/Threshold BBS Signatures for Distributed Anonymous Credential Issuance.mp4
17.0 MB
IEEE Security and Privacy 2023/SoK History is a Vast Early Warning System Auditing the Provenance of System Intrusions.mp4
17.0 MB
IEEE Security and Privacy 2023/Detection of Inconsistencies in Privacy Practices of Browser Extensions.mp4
17.0 MB
IEEE Security and Privacy 2022/The Experts' Insights on the Peer Review Process of Evaluating Security Papers.mp4
17.0 MB
IEEE Security and Privacy 2018/AI2 - Safety and Robustness Certification of Neural Networks.mp4
16.9 MB
IEEE Security and Privacy 2022/Are We There Yet Timing and Floating-Point Attacks on Differential Privacy Systems.mp4
16.9 MB
IEEE Security and Privacy 2022/Sabre Sender-Anonymous Messaging with Fast Audits.mp4
16.9 MB
IEEE Security and Privacy 2023/A Generic, Efficient, and Effortless Solver with Self-Supervised Learning for Breaking Text Captchas.mp4
16.9 MB
IEEE Security and Privacy 2023/Typing High-Speed Cryptography against Spectre v1.mp4
16.8 MB
IEEE Security and Privacy 2016/Automated Analysis and Verification of TLS 1.3 - 0-RTT, Resumption and Delayed Authentication.mp4
16.8 MB
IEEE Security and Privacy 2023/Teaching and Learning Cybersecurity and AI Ethics in High School.mp4
16.8 MB
IEEE Security and Privacy 2021/Wolverine Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and ....mp4
16.8 MB
IEEE Security and Privacy 2021/CacheOut Leaking Data on Intel CPUs via Cache Evictions.mp4
16.8 MB
IEEE Security and Privacy 2023/TrojanModel A Practical Trojan Attack against Automatic Speech Recognition Systems.mp4
16.7 MB
IEEE Security and Privacy 2023/D-DAE Defense-Penetrating Model Extraction Attacks.mp4
16.6 MB
IEEE Security and Privacy 2023/Hide and Seek with Spectres Efficient discovery of speculative vulnerabilities with random testing.mp4
16.6 MB
IEEE Security and Privacy 2021/Bomberman Defining and Defeating Hardware Ticking Timebombs at Design-time.mp4
16.5 MB
IEEE Security and Privacy 2023/Spectral-DP Differentially Private Deep Learning through Spectral Perturbation and Filtering.mp4
16.5 MB
IEEE Security and Privacy 2022/Goshawk Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis.mp4
16.5 MB
IEEE Security and Privacy 2016/SoK - (State of) The Art of War - Offensive Techniques in Binary Analysis.mp4
16.5 MB
IEEE Security and Privacy 2023/ADI Adversarial Dominating Inputs in Vertical Federated Learning Systems.mp4
16.5 MB
IEEE Security and Privacy 2022/The State of the SameSite Studying the Usage, Effectiveness, and Adequacy of SameSite Cookies.mp4
16.4 MB
IEEE Security and Privacy 2023/Deepfake Text Detection Limitations and Opportunities.mp4
16.3 MB
IEEE Security and Privacy 2016/Back in Black - Towards Formal, Black Box Analysis of Sanitizers and Filters.mp4
16.3 MB
IEEE Security and Privacy 2023/mmEcho A mmWave-based Acoustic Eavesdropping Method.mp4
16.3 MB
IEEE Security and Privacy 2023/Understanding the Security and Privacy Attitudes of Smart Home Users on Reddit.mp4
16.3 MB
IEEE Security and Privacy 2021/Red Belly a Deterministic Scalable Open Permissioned Blockchain.mp4
16.3 MB
IEEE Security and Privacy 2023/REDEEM MYSELF Purifying Backdoors in Deep Learning Models using Self Attention Distillation.mp4
16.2 MB
IEEE Security and Privacy 2022/Model Orthogonalization Class Distance Hardening in Neural Networks for Better Security.mp4
16.2 MB
IEEE Security and Privacy 2023/PublicCheck Public Integrity Verification for Services of Run-time Deep Models.mp4
16.1 MB
IEEE Security and Privacy 2022/Statistical Quantification of Differential Privacy A Local Approach.mp4
16.1 MB
IEEE Security and Privacy 2023/Man-in-the-Middle Attacks without Rogue AP When WPAs Meet ICMP Redirects.mp4
16.1 MB
IEEE Security and Privacy 2016/Cache Storage Channels - Alias-Driven Attacks and Verified Countermeasures.mp4
16.0 MB
IEEE Security and Privacy 2023/SoK Let the Privacy Games Begin A Unified Treatment of Data Inference Privacy in Machine Learning.mp4
16.0 MB
IEEE Security and Privacy 2022/Scraping Sticky Leftovers App User Information Left on Servers After Account Deletion.mp4
16.0 MB
IEEE Security and Privacy 2023/Shedding Light on Inconsistencies in Grid Cybersecurity Disconnects and Recommendations.mp4
16.0 MB
IEEE Security and Privacy 2023/Perceptions of Distributed Ledger Technology Key Management-Interviews with Finance Professionals.mp4
16.0 MB
IEEE Security and Privacy 2022/SNARKBlock Federated Anonymous Blocklisting from Hidden Common Input Aggregate Proofs.mp4
15.9 MB
IEEE Security and Privacy 2023/Discovering Java Deserialization Vulnerabilities via Structure-Aware Directed Greybox Fuzzing.mp4
15.9 MB
IEEE Security and Privacy 2023/SoK Taxonomy of Attacks on Open-Source Software Supply Chains.mp4
15.9 MB
IEEE Security and Privacy 2022/AccEar Accelerometer Acoustic Eavesdropping with Unconstrained Vocabulary.mp4
15.8 MB
IEEE Security and Privacy 2022/SAILFISH Vetting Smart Contract State-Inconsistency Bugs in Seconds.mp4
15.8 MB
IEEE Security and Privacy 2021/CryptGPU Fast Privacy-Preserving Machine Learning on the GPU.mp4
15.8 MB
IEEE Security and Privacy 2023/DeHiREC Detecting Hidden Voice Recorders via ADC Electromagnetic Radiation.mp4
15.8 MB
IEEE Security and Privacy 2022/COBRA Dynamic Proactive Secret Sharing for Confidential BFT Services.mp4
15.7 MB
IEEE Security and Privacy 2023/IPvSeeYou Exploiting Leaked Identifiers in IPv6 for Street-Level Geolocation.mp4
15.7 MB
IEEE Security and Privacy 2023/SyzDescribe Principled, Automated, Static Generation of Syscall Descriptions for Kernel Drivers.mp4
15.7 MB
IEEE Security and Privacy 2023/SoK Certified Robustness for Deep Neural Networks.mp4
15.7 MB
IEEE Security and Privacy 2020/TextExerciser Feedback-Driven Text Input Exercising for Android Applications.mp4
15.6 MB
IEEE Security and Privacy 2016/Hawk - The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts.mp4
15.6 MB
IEEE Security and Privacy 2023/When and Why Do People Want Ad Targeting Explanations Evidence from a Mixed-Methods Field Study.mp4
15.6 MB
IEEE Security and Privacy 2022/Hark A Deep Learning System for Navigating Privacy Feedback at Scale.mp4
15.6 MB
IEEE Security and Privacy 2023/WeRLman To Tackle Whale (Transactions), Go Deep (RL).mp4
15.6 MB
IEEE Security and Privacy 2023/From 5G Sniffing to Harvesting Leakages of Privacy-Preserving Messengers.mp4
15.6 MB
IEEE Security and Privacy 2021/Randomized Last-Level Caches Are Still Vulnerable to Cache Side-Channel Attacks But We Can Fix It.mp4
15.5 MB
IEEE Security and Privacy 2023/WaVe A Verifiably Secure WebAssembly Sandboxing Runtime.mp4
15.5 MB
IEEE Security and Privacy 2020/Breaking and (Partially) Fixing Provably Secure Onion Routing.mp4
15.5 MB
IEEE Security and Privacy 2022/ZeeStar Private Smart Contracts by Homomorphic Encryption and Zero-knowledge Proofs.mp4
15.4 MB
IEEE Security and Privacy 2020/Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers.mp4
15.4 MB
IEEE Security and Privacy 2021/Bitcoin-Compatible Virtual Channels.mp4
15.4 MB
IEEE Security and Privacy 2016/Seeking Nonsense, Looking for Trouble - Efficient Promotional-Infection Detection through ....mp4
15.4 MB
IEEE Security and Privacy 2022/Automated Attack Synthesis by Extracting Finite State Machines from Protocol Specification Documents.mp4
15.4 MB
IEEE Security and Privacy 2023/SoK Decentralized Finance (DeFi) Attacks.mp4
15.4 MB
IEEE Security and Privacy 2016/A Method for Verifying Privacy-Type Properties - The Unbounded Case.mp4
15.3 MB
IEEE Security and Privacy 2022/SoK Practical Foundations for Software Spectre Defenses.mp4
15.3 MB
IEEE Security and Privacy 2022/SoK Authentication in Augmented and Virtual Reality.mp4
15.3 MB
IEEE Security and Privacy 2023/Blue Is the New Black (Market) Privacy Leaks and Re-Victimization from Police-Auctioned Cellphones.mp4
15.3 MB
IEEE Security and Privacy 2023/3DFed Adaptive and Extensible Framework for Covert Backdoor Attack in Federated Learning.mp4
15.3 MB
IEEE Security and Privacy 2022/Property Inference from Poisoning.mp4
15.3 MB
IEEE Security and Privacy 2023/Mew Enabling Large-Scale and Dynamic Link-Flooding Defenses on Programmable Switches.mp4
15.3 MB
IEEE Security and Privacy 2023/Scaling JavaScript Abstract Interpretation to Detect and Exploit Node.js Taint-style Vulnerability.mp4
15.3 MB
IEEE Security and Privacy 2020/KARONTE Detecting Insecure Multi-binary Interactions in Embedded Firmware.mp4
15.2 MB
IEEE Security and Privacy 2023/SPHINCSC Compressing SPHINCS With (Almost) No Cost.mp4
15.2 MB
IEEE Security and Privacy 2023/An Interview on the Security and Privacy Development Practices in Turkish Software Startups.mp4
15.1 MB
IEEE Security and Privacy 2016/No Pardon for the Interruption - New Inference Attacks on Android Through Interrupt Timing Analysis.mp4
15.1 MB
IEEE Security and Privacy 2023/Blue's Clues Practical Discovery of Non-Discoverable Bluetooth Devices.mp4
15.1 MB
IEEE Security and Privacy 2020/NetCAT Practical Cache Attacks from the Network.mp4
15.1 MB
IEEE Security and Privacy 2023/Private Collaborative Data Cleaning via Non-Equi PSI.mp4
15.1 MB
IEEE Security and Privacy 2020/Leveraging EM Side-Channel Information to Detect Rowhammer Attacks.mp4
15.1 MB
IEEE Security and Privacy 2023/TEEzz Fuzzing Trusted Applications on COTS Android Devices.mp4
15.1 MB
IEEE Security and Privacy 2020/SEIMI Efficient and Secure SMAP-Enabled Intra-process Memory Isolation.mp4
15.0 MB
IEEE Security and Privacy 2023/How IoT Re-using Threatens Your Sensitive Data Exploring the User-Data Disposal in Used IoT Devices.mp4
15.0 MB
IEEE Security and Privacy 2023/Attitudes towards Client-Side Scanning for CSAM, Terrorism, Drug Trafficking, Drug Use, Tax Evasion.mp4
15.0 MB
IEEE Security and Privacy 2023/UTOPIA Automatic Generation of Fuzz Driver using Unit Tests.mp4
15.0 MB
IEEE Security and Privacy 2023/Practical Program Modularization with Type-Based Dependence Analysis.mp4
15.0 MB
IEEE Security and Privacy 2023/Volttack Control IoT Devices by Manipulating Power Supply Voltage.mp4
14.9 MB
IEEE Security and Privacy 2023/One Key to Rule Them All Secure Group Pairing for Heterogeneous IoT Devices.mp4
14.9 MB
IEEE Security and Privacy 2022/Adversarial Prefetch New Cross-Core Cache Side Channel Attacks.mp4
14.9 MB
IEEE Security and Privacy 2023/It’s (DOM) Clobbering Time Attack Techniques, Prevalence, and Defenses.mp4
14.9 MB
IEEE Security and Privacy 2023/Towards a Rigorous Statistical Analysis of Empirical Password Datasets.mp4
14.8 MB
IEEE Security and Privacy 2023/SoK A Critical Evaluation of Efficient Website Fingerprinting Defenses.mp4
14.8 MB
IEEE Security and Privacy 2023/Disassembling ARM Binaries by Lightweight Superset Instruction Interpretation and Graph Modeling.mp4
14.8 MB
IEEE Security and Privacy 2023/VIDEZZO Dependency-aware Virtual Device Fuzzing.mp4
14.8 MB
IEEE Security and Privacy 2019/IEEE S&P 2019 - Opening Remarks - General Chair.mp4
14.8 MB
IEEE Security and Privacy 2023/MagBackdoor Beware of Your Loudspeaker as A Backdoor For Magnetic Injection Attacks.mp4
14.8 MB
IEEE Security and Privacy 2016/I Think They're Trying to Tell Me Something - Advice Sources and Selection for Digital Security.mp4
14.7 MB
IEEE Security and Privacy 2023/SoK Cryptographic Neural-Network Computation.mp4
14.7 MB
IEEE Security and Privacy 2020/Semantic Understanding of Smart Contracts Executable Operational Semantics of Solidity.mp4
14.7 MB
IEEE Security and Privacy 2020/The Many Kinds of Creepware Used for Interpersonal Attacks.mp4
14.7 MB
IEEE Security and Privacy 2023/Design and Evaluation of Inclusive Email Security Indicators for People with Visual Impairments.mp4
14.7 MB
IEEE Security and Privacy 2021/A Secure and Formally Verified Linux KVM Hypervisor.mp4
14.6 MB
IEEE Security and Privacy 2023/RuleKeeper GDPR-Aware Personal Data Compliance for Web Frameworks.mp4
14.6 MB
IEEE Security and Privacy 2023/Bitcoin-Enhanced Proof-of-Stake Security Possibilities and Impossibilities.mp4
14.6 MB
IEEE Security and Privacy 2023/Threshold Signatures in the Multiverse.mp4
14.6 MB
IEEE Security and Privacy 2023/No One Drinks From the Firehose How Organizations Filter and Prioritize Vulnerability Information.mp4
14.6 MB
IEEE Security and Privacy 2022/Quantifying Blockchain Extractable Value How dark is the forest.mp4
14.6 MB
IEEE Security and Privacy 2023/Skilled or Gullible Gender Stereotypes Related to Computer Security and Privacy.mp4
14.6 MB
IEEE Security and Privacy 2023/WebSpec Towards Machine-Checked Analysis of Browser Security Mechanisms.mp4
14.6 MB
IEEE Security and Privacy 2023/Weak Fiat-Shamir Attacks on Modern Proof Systems.mp4
14.5 MB
IEEE Security and Privacy 2020/xMP Selective Memory Protection for Kernel and User Space.mp4
14.5 MB
IEEE Security and Privacy 2023/MEGA Malleable Encryption Goes Awry.mp4
14.5 MB
IEEE Security and Privacy 2020/Kobold Evaluating Decentralized Access Control for Remote NSXPC Methods on iOS.mp4
14.5 MB
IEEE Security and Privacy 2021/DP-Sniper Black-Box Discovery of Differential Privacy Violations using Classifiers.mp4
14.5 MB
IEEE Security and Privacy 2023/TeSec Accurate Server-side Attack Investigation for Web Applications.mp4
14.4 MB
IEEE Security and Privacy 2023/mmSpoof Resilient Spoofing of Automotive Millimeter-wave Radars using Reflect Array.mp4
14.4 MB
IEEE Security and Privacy 2022/SecFloat Accurate Floating-Point meets Secure 2-Party Computation.mp4
14.4 MB
IEEE Security and Privacy 2022/Jigsaw Efficient and Scalable Path Constraints Fuzzing.mp4
14.4 MB
IEEE Security and Privacy 2016/Sending out an SMS - Characterizing the Security of the SMS Ecosystem with Public Gateways.mp4
14.4 MB
IEEE Security and Privacy 2021/SoK All You Ever Wanted to Know About Binary Disassembly But Were Afraid to Ask.mp4
14.3 MB
IEEE Security and Privacy 2016/Revisiting Square Root ORAM - Efficient Random Access in Multi-Party Computation.mp4
14.3 MB
IEEE Security and Privacy 2022/A Secret-Free Hypervisor Rethinking Isolation in the Age of Speculative Vulnerabilities.mp4
14.3 MB
IEEE Security and Privacy 2022/BEACON - Directed Grey-Box Fuzzing with Provable Path Pruning.mp4
14.3 MB
IEEE Security and Privacy 2023/Tyr Finding Consensus Failure Bugs in Blockchain System with Behaviour Divergent Model.mp4
14.3 MB
IEEE Security and Privacy 2023/FIDO2, CTAP 2.1, and WebAuthn 2 Provable Security and Post-Quantum Instantiation.mp4
14.2 MB
IEEE Security and Privacy 2019/On the Feasibility of Rerouting-Based DDoS Defenses.mp4
14.2 MB
IEEE Security and Privacy 2020/OHIE Blockchain Scaling Made Simple.mp4
14.1 MB
IEEE Security and Privacy 2021/Poltergeist Acoustic Manipulation of Image Stabilization towards Object Mis-Labeling.mp4
14.1 MB
IEEE Security and Privacy 2021/Defensive Technology Use by Political Activists During the Sudanese Revolution.mp4
14.1 MB
IEEE Security and Privacy 2019/Demystifying Hidden Privacy Settings in Mobile Apps.mp4
14.1 MB
IEEE Security and Privacy 2023/Protected or Porous A Comparative Analysis of Threat Detection Capability of IoT Safeguards.mp4
14.1 MB
IEEE Security and Privacy 2022/Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms.mp4
14.1 MB
IEEE Security and Privacy 2023/Characterizing Everyday Misuse of Smart Home Devices.mp4
14.0 MB
IEEE Security and Privacy 2023/Always Contribute Back A Qualitative Study on Security Challenges of the Open Source Supply Chain.mp4
14.0 MB
IEEE Security and Privacy 2020/ICLab A Global, Longitudinal Internet Censorship Measurement Platform.mp4
14.0 MB
IEEE Security and Privacy 2023/QueryX Symbolic Query on Decompiled Code for Finding Bugs in COTS Binaries.mp4
14.0 MB
IEEE Security and Privacy 2022/Committed to Trust A Qualitative Study on Security & Trust in Open Source Software Projects.mp4
14.0 MB
IEEE Security and Privacy 2023/OWL Compositional Verification of Security Protocols via an Information-Flow Type System.mp4
14.0 MB
IEEE Security and Privacy 2023/ShadowNet A Secure and Efficient On-device Model Inference System for Convolutional Neural Networks.mp4
14.0 MB
IEEE Security and Privacy 2020/WaveSpy Remote and Through-wall Screen Attack via mmWave Sensing.mp4
14.0 MB
IEEE Security and Privacy 2023/Uncovering User Interactions on Smartphones via Contactless Wireless Charging Side Channels.mp4
14.0 MB
IEEE Security and Privacy 2021/DynPTA Combining Static and Dynamic Analysis for Practical Selective Data Protection.mp4
13.9 MB
IEEE Security and Privacy 2021/Hear No Evil, See Kenansville Efficient and Transferable Black-Box Attacks on Automatic ....mp4
13.9 MB
IEEE Security and Privacy 2019/Certified Robustness to Adversarial Examples with Differential Privacy.mp4
13.9 MB
IEEE Security and Privacy 2023/Improving Developers' Understanding of Regex Denial of Service Tools.mp4
13.9 MB
IEEE Security and Privacy 2023/ELSA Secure Aggregation for Federated Learning with Malicious Actors.mp4
13.9 MB
IEEE Security and Privacy 2020/SAVIOR Towards Bug-Driven Hybrid Testing.mp4
13.9 MB
IEEE Security and Privacy 2023/Half&Half Demystifying Intel’s Directional Branch Predictors for Fast, Secure Partitioned Execution.mp4
13.9 MB
IEEE Security and Privacy 2023/The Leaky Web Automated Discovery of Cross-Site Information Leaks in Browsers and the Web.mp4
13.8 MB
IEEE Security and Privacy 2023/Protecting Models Trained by Multi-party Learning with Differential Privacy.mp4
13.7 MB
IEEE Security and Privacy 2023/DVFS Frequently Leaks Secrets Hertzbleed Attacks Beyond SIKE, Cryptography, and CPU-Only Data.mp4
13.7 MB
IEEE Security and Privacy 2023/Investigating Package Related Security Threats in Software Registries.mp4
13.7 MB
IEEE Security and Privacy 2022/Universal Atomic Swaps Secure Exchange of Coins Across All Blockchains.mp4
13.6 MB
IEEE Security and Privacy 2020/The State of the Uniform Attacks on Encrypted Databases beyond the Uniform Query Distribution.mp4
13.6 MB
IEEE Security and Privacy 2020/Flaw Label Exploiting IPv6 Flow Label.mp4
13.6 MB
IEEE Security and Privacy 2022/Low-Bandwidth Threshold ECDSA via Pseudorandom Correlation Generators.mp4
13.5 MB
IEEE Security and Privacy 2016/HDFI - Hardware-Assisted Data-Flow Isolation.mp4
13.5 MB
IEEE Security and Privacy 2023/AI-Guardian Defeating Adversarial Attacks using Backdoors.mp4
13.5 MB
IEEE Security and Privacy 2023/Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation.mp4
13.5 MB
IEEE Security and Privacy 2022/Investigating the Use of Email Encryption for an Entire University.mp4
13.5 MB
IEEE Security and Privacy 2019/Short Text, Large Effect Measuring the Impact of User Reviews on Android App Security & Privacy.mp4
13.5 MB
IEEE Security and Privacy 2023/BLEDiff Scalable and Property-Agnostic Noncompliance Checking for BLE Implementations.mp4
13.4 MB
IEEE Security and Privacy 2023/Low-effort VR Headset User Authentication Using Head-reverberated Sounds with Replay Resistance.mp4
13.4 MB
IEEE Security and Privacy 2016/Dedup Est Machina - Memory Deduplication as an Advanced Exploitation Vector.mp4
13.4 MB
IEEE Security and Privacy 2020/SEVurity No Security Without Integrity - Breaking Integrity.mp4
13.4 MB
IEEE Security and Privacy 2023/Silph A Framework for Scalable and Accurate Generation of Hybrid MPC Protocols.mp4
13.3 MB
IEEE Security and Privacy 2020/Automated Reverse Engineering and Privacy Analysis of Modern Cars.mp4
13.3 MB
IEEE Security and Privacy 2021/SoK Security and Privacy in the Age of Commercial Drones.mp4
13.2 MB
IEEE Security and Privacy 2023/Sound Verification of Security Protocols From Design to Interoperable Implementations.mp4
13.2 MB
IEEE Security and Privacy 2023/Disguising Attacks with Explanation-Aware Backdoors.mp4
13.2 MB
IEEE Security and Privacy 2020/A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network.mp4
13.2 MB
IEEE Security and Privacy 2020/Unexpected Data Dependency Creation and Chaining A New Attack to SDN.mp4
13.2 MB
IEEE Security and Privacy 2023/Multi-Round Single-Server Secure Aggregation with Applications to Private Federated Learning.mp4
13.2 MB
IEEE Security and Privacy 2020/A Tale of Sea and Sky On the Security of Maritime VSAT Communications.mp4
13.2 MB
IEEE Security and Privacy 2023/RoFL Robustness of Secure Federated Learning.mp4
13.1 MB
IEEE Security and Privacy 2022/Why Crypto-detectors Fail A Systematic Evaluation of Cryptographic Misuse Detection Techniques.mp4
13.1 MB
IEEE Security and Privacy 2023/Beyond Phish Toward Detecting Fraudulent e-Commerce Websites at Scale.mp4
13.1 MB
IEEE Security and Privacy 2023/Adaptive Risk-Limiting Comparison Audits.mp4
13.1 MB
IEEE Security and Privacy 2023/EC Embedded Systems Compartmentalization via Intra-Kernel Isolation.mp4
13.1 MB
IEEE Security and Privacy 2023/Vulnerability Discovery for All Experiences of Marginalization in Vulnerability Discovery.mp4
13.1 MB
IEEE Security and Privacy 2021/Breaking the Specification Certified PDF.mp4
13.0 MB
IEEE Security and Privacy 2022/Device Fingerprinting with Peripheral Timestamps.mp4
13.0 MB
IEEE Security and Privacy 2023/SoK Distributed Randomness Beacons.mp4
13.0 MB
IEEE Security and Privacy 2021/A Novel Dynamic Analysis Infrastructure to Instrument Untrusted Execution Flow Across User-Kernel....mp4
13.0 MB
IEEE Security and Privacy 2023/Clockwork Finance Automated Analysis of Economic Security in Smart Contracts.mp4
12.9 MB
IEEE Security and Privacy 2022/Differentially Private Histograms in the Shuffle Model from Fake Users.mp4
12.9 MB
IEEE Security and Privacy 2023/Limits of I O Based Ransomware Detection An Imitation Based Attack.mp4
12.9 MB
IEEE Security and Privacy 2020/Ask the Experts What Should Be on an IoT Privacy and Security Label.mp4
12.9 MB
IEEE Security and Privacy 2023/Jolt Recovering TLS Signing Keys via Rowhammer Faults.mp4
12.9 MB
IEEE Security and Privacy 2020/Krace Data Race Fuzzing for Kernel File Systems.mp4
12.9 MB
IEEE Security and Privacy 2022/LinkTeller Recovering Private Edges from Graph Neural Networks via Influence Analysis.mp4
12.8 MB
IEEE Security and Privacy 2023/Jigsaw Puzzle Selective Backdoor Attack to Subvert Malware Classifiers.mp4
12.8 MB
IEEE Security and Privacy 2020/Establishing Economic Incentives for Security Patching of IoT Consumer Products.mp4
12.8 MB
IEEE Security and Privacy 2020/RAMBleed Reading Bits in Memory without Accessing Them.mp4
12.8 MB
IEEE Security and Privacy 2020/Humpty Dumpty Controlling Word Meanings via Corpus Poisoning.mp4
12.8 MB
IEEE Security and Privacy 2020/A Security Analysis of the Facebook Ad Library.mp4
12.7 MB
IEEE Security and Privacy 2021/Many-out-of-Many Proofs and Applications to Anonymous Zether.mp4
12.7 MB
IEEE Security and Privacy 2021/OSPREY Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary.mp4
12.7 MB
IEEE Security and Privacy 2020/Path Oblivious Heap Optimal and Practical Oblivious Priority Queue.mp4
12.7 MB
IEEE Security and Privacy 2021/Self-Supervised Euphemism Detection and Identification for Content Moderation.mp4
12.7 MB
IEEE Security and Privacy 2021/PLATYPUS Software-based Power Side-Channel Attacks on x86.mp4
12.6 MB
IEEE Security and Privacy 2021/Merkle2 A Low-Latency Transparency Log System.mp4
12.6 MB
IEEE Security and Privacy 2020/AdGraph A Graph-Based Approach to Ad and Tracker Blocking.mp4
12.6 MB
IEEE Security and Privacy 2023/Private Access Control for Function Secret Sharing.mp4
12.5 MB
IEEE Security and Privacy 2021/Co-Inflow Coarse-grained Information Flow Control for Java-like Languages.mp4
12.5 MB
IEEE Security and Privacy 2020/Ex-vivo Dynamic Analysis Framework for Android Device Drivers.mp4
12.5 MB
IEEE Security and Privacy 2021/Cross-Domain Access Control Encryption - Arbitrary-policy, Constant-size, Efficient.mp4
12.5 MB
IEEE Security and Privacy 2022/Arbitrary Modulation of Electromagnetic Noise from Unprivileged Software Impacting Emission Security.mp4
12.5 MB
IEEE Security and Privacy 2022/HAMRAZ Resilient Partitioning and Replication.mp4
12.4 MB
IEEE Security and Privacy 2021/Fingerprinting the Fingerprinters Learning to Detect Browser Fingerprinting Behaviors.mp4
12.4 MB
IEEE Security and Privacy 2019/Blind Certificate Authorities.mp4
12.4 MB
IEEE Security and Privacy 2023/Less Is More Refinement Proofs for Probabilistic Proofs.mp4
12.4 MB
IEEE Security and Privacy 2022/SoK Demystifying Binary Lifters Through the Lens of Downstream Applications.mp4
12.4 MB
IEEE Security and Privacy 2023/REGA Scalable Rowhammer Mitigation with Refresh-Generating Activations.mp4
12.4 MB
IEEE Security and Privacy 2022/Four Attacks and a Proof for Telegram.mp4
12.3 MB
IEEE Security and Privacy 2021/CanDID Bootstrapping Decentralized Identity from Legacy Providers.mp4
12.3 MB
IEEE Security and Privacy 2020/SPECTECTOR Principled Detection of Speculative Information Flows.mp4
12.3 MB
IEEE Security and Privacy 2023/On Efficient, High-Fidelity and Blind Suppression of Backdoor Effects in Trojaned ML Models.mp4
12.2 MB
IEEE Security and Privacy 2021/SoK Hate, Harassment, and the Changing Landscape of Online Abuse.mp4
12.2 MB
IEEE Security and Privacy 2020/Transys Leveraging Common Security Properties across Hardware Designs.mp4
12.1 MB
IEEE Security and Privacy 2021/Android Custom Permissions Demystified From Privilege Escalation to Design Shortcomings.mp4
12.1 MB
IEEE Security and Privacy 2021/Method Confusion Attack on the Bluetooth Pairing Process.mp4
12.1 MB
IEEE Security and Privacy 2021/Did you mix me Formally Verifying Verifiable Mix Nets in Electronic Voting.mp4
12.1 MB
IEEE Security and Privacy 2021/Electromagnetic Covert Channels Can Be Super Resilient.mp4
12.0 MB
IEEE Security and Privacy 2023/Leveraging Sandboxes for a Minimally Invasive Browser Fingerprinting Defense.mp4
12.0 MB
IEEE Security and Privacy 2020/Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability.mp4
12.0 MB
IEEE Security and Privacy 2021/STOCHFUZZ Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic ....mp4
12.0 MB
IEEE Security and Privacy 2021/Good Bot, Bad Bot Characterizing Automated Browsing Activity.mp4
11.9 MB
IEEE Security and Privacy 2016/Cloak of Visibility - Detecting When Machines Browse a Different Web.mp4
11.9 MB
IEEE Security and Privacy 2021/Epochal Signatures for Deniable Group Chats.mp4
11.9 MB
IEEE Security and Privacy 2021/Linking Bluetooth LE & Classic and Implications for Privacy-Preserving Bluetooth-Based Protocols.mp4
11.9 MB
IEEE Security and Privacy 2023/DepthFake Spoofing 3D Face Authentication with a 2D Photo.mp4
11.9 MB
IEEE Security and Privacy 2023/Practically-Exploitable Cryptographic Vulnerabilities in Matrix.mp4
11.9 MB
IEEE Security and Privacy 2023/Continual Observation under User-level Differential Privacy.mp4
11.8 MB
IEEE Security and Privacy 2020/TARDIS Rolling Back the Clock on CMS-Targeting Cyber Attacks.mp4
11.8 MB
IEEE Security and Privacy 2023/PLA-LiDAR Physical Laser Attacks against LiDAR-based 3D Object Detection in Autonomous Vehicle.mp4
11.8 MB
IEEE Security and Privacy 2021/Happer Unpacking Android Apps via a Hardware-Assisted Approach.mp4
11.8 MB
IEEE Security and Privacy 2021/ARBITRAR User-Guided API Misuse Detection.mp4
11.8 MB
IEEE Security and Privacy 2021/Adversarial Watermarking Transformer Towards Tracing Text Provenance with Data Hiding.mp4
11.8 MB
IEEE Security and Privacy 2023/Scatter and Split Securely Defeating Cache Contention and Occupancy Attacks.mp4
11.8 MB
IEEE Security and Privacy 2022/Surakav Generating Realistic Traces for a Strong Website Fingerprinting Defense.mp4
11.8 MB
IEEE Security and Privacy 2023/Precise Detection of Kernel Data Races with Probabilistic Lockset Analysis.mp4
11.8 MB
IEEE Security and Privacy 2020/SPECCFI Mitigating Spectre Attacks Using CFI Informed Speculation.mp4
11.7 MB
IEEE Security and Privacy 2020/Towards a Natural Perspective of Smart Homes for Practical Security and Safety Analyses.mp4
11.7 MB
IEEE Security and Privacy 2023/Understanding the (In)Security of Cross-side Face Verification Systems in Mobile Apps.mp4
11.6 MB
IEEE Security and Privacy 2023/MPCAuth Multi-factor Authentication for Distributed-trust Systems.mp4
11.5 MB
IEEE Security and Privacy 2023/XFL Naming Functions in Binaries with Extreme Multi-label Learning.mp4
11.5 MB
IEEE Security and Privacy 2023/DevIOus Device-Driven Side-Channel Attacks on the IOMMU.mp4
11.5 MB
IEEE Security and Privacy 2020/Enabling Rack-scale Confidential Computing Using Heterogeneous Trusted Execution Environment.mp4
11.5 MB
IEEE Security and Privacy 2023/SQUIP Exploiting the Scheduler Queue Contention Side Channel.mp4
11.5 MB
IEEE Security and Privacy 2023/Three-party Non-linear Computation without Preprocessing for Privacy-preserving Machine Learning.mp4
11.5 MB
IEEE Security and Privacy 2020/The Last Mile High-Assurance and High-Speed Cryptographic Implementations.mp4
11.5 MB
IEEE Security and Privacy 2021/Security of Multi-Sensor Fusion based Perception in Autonomous Driving Under Physical-World Attacks.mp4
11.5 MB
IEEE Security and Privacy 2019/Port Contention for Fun and Profit.mp4
11.5 MB
IEEE Security and Privacy 2020/Cornucopia Temporal Safety for CHERI Heaps.mp4
11.4 MB
IEEE Security and Privacy 2020/Private Resource Allocators and Their Applications.mp4
11.4 MB
IEEE Security and Privacy 2020/Automatic Uncovering of Hidden Behaviors from Input Validation in Mobile Apps.mp4
11.4 MB
IEEE Security and Privacy 2023/BlindHub Bitcoin-Compatible Privacy-Preserving Payment Channel Hubs Supporting Variable Amounts.mp4
11.4 MB
IEEE Security and Privacy 2023/Continuous Intrusion Characterizing the Security of Continuous Integration Services.mp4
11.4 MB
IEEE Security and Privacy 2021/Machine unlearning.mp4
11.4 MB
IEEE Security and Privacy 2021/On the Anonymity Guarantees of Anonymous Proof-of-Stake Protocols.mp4
11.3 MB
IEEE Security and Privacy 2023/Rethinking Searchable Symmetric Encryption.mp4
11.3 MB
IEEE Security and Privacy 2020/Influencing Photo Sharing Decisions on Social Media A Case of Paradoxical Findings.mp4
11.3 MB
IEEE Security and Privacy 2020/HopSkipJumpAttack A Query-Efficient Decision-Based Attack.mp4
11.3 MB
IEEE Security and Privacy 2020/Throwing Darts in the Dark Detecting Bots with Limited Data using Neural Data Augmentation.mp4
11.3 MB
IEEE Security and Privacy 2023/Finding Specification Blind Spots via Fuzz Testing.mp4
11.3 MB
IEEE Security and Privacy 2020/VerX Safety Verification of Smart Contracts.mp4
11.3 MB
IEEE Security and Privacy 2020/How Not to Prove Your Election Outcome.mp4
11.2 MB
IEEE Security and Privacy 2021/Real-World Snapshots vs. Theory Questioning the t-Probing Security Model..mp4
11.2 MB
IEEE Security and Privacy 2021/Compositional Security for Reentrant Applications.mp4
11.2 MB
IEEE Security and Privacy 2021/A First Look at Zoombombing.mp4
11.2 MB
IEEE Security and Privacy 2020/High Precision Open-World Website Fingerprinting.mp4
11.1 MB
IEEE Security and Privacy 2023/SelectFuzz Efficient Directed Fuzzing with Selective Path Exploration.mp4
11.1 MB
IEEE Security and Privacy 2022/MeshUp Stateless Cache Side-channel Attack on CPU Mesh.mp4
11.1 MB
IEEE Security and Privacy 2021/Learning Differentially Private Mechanisms.mp4
11.1 MB
IEEE Security and Privacy 2021/SoK The Faults in our ASRs An Overview of Attacks against Automatic Speech Recognition and ....mp4
11.1 MB
IEEE Security and Privacy 2020/Dragonblood Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd.mp4
11.1 MB
IEEE Security and Privacy 2023/A Security RISC Microarchitectural Attacks on Hardware RISC-V CPUs.mp4
11.1 MB
IEEE Security and Privacy 2021/Ed25519 Signature Schemes Theory and Practice.mp4
11.1 MB
IEEE Security and Privacy 2021/Detecting AI Trojans Using Meta Neural Analysis.mp4
11.1 MB
IEEE Security and Privacy 2020/Fuzzing JavaScript Engines with Aspect-Preserving Mutation.mp4
11.1 MB
IEEE Security and Privacy 2023/CSIRowhammer - Cryptographic Security and Integrity against Rowhammer.mp4
11.0 MB
IEEE Security and Privacy 2020/Gesture Authentication for Smartphones Evaluation of Gesture Password Selection Policies.mp4
11.0 MB
IEEE Security and Privacy 2021/Lightweight Techniques for Private Heavy Hitters.mp4
10.9 MB
IEEE Security and Privacy 2021/Improving Password Guessing via Representation Learning.mp4
10.9 MB
IEEE Security and Privacy 2021/When Function Signature Recovery Meets Compiler Optimization.mp4
10.9 MB
IEEE Security and Privacy 2020/FlyClient Super-Light Clients for Cryptocurrencies.mp4
10.9 MB
IEEE Security and Privacy 2021/Compositional Non-Interference for Fine-Grained Concurrent Programs.mp4
10.8 MB
IEEE Security and Privacy 2021/CANnon Reliable and Stealthy Remote Shutdown Attacks via Unaltered Automotive Microcontrollers.mp4
10.8 MB
IEEE Security and Privacy 2020/Tactical Provenance Analysis our Endpoint Detection and Response Systems.mp4
10.8 MB
IEEE Security and Privacy 2020/Browsing Unicity On the Limits of Anonymizing Web Tracking Data.mp4
10.8 MB
IEEE Security and Privacy 2023/Accuracy-Privacy Trade-off in Deep Ensemble A Membership Inference Perspective.mp4
10.8 MB
IEEE Security and Privacy 2021/An I O Separation Model for Formal Verification of Kernel Implementations.mp4
10.7 MB
IEEE Security and Privacy 2023/FedRecover Recovering from Poisoning Attacks in Federated Learning using Historical Information.mp4
10.7 MB
IEEE Security and Privacy 2020/EverCrypt A Fast, Verified, Cross-Platform Cryptographic Provider.mp4
10.7 MB
IEEE Security and Privacy 2020/Plundervolt Software-Based Fault Injection Attacks against Intel SGX.mp4
10.7 MB
IEEE Security and Privacy 2021/CrossTalk Speculative Data Leaks Across Cores Are Real.mp4
10.6 MB
IEEE Security and Privacy 2019/Full speed Fuzzing Reducing Fuzzing Overhead through Coverage-guided Tracing.mp4
10.6 MB
IEEE Security and Privacy 2023/Low-Cost Privilege Separation with Compile Time Compartmentalization for Embedded Systems.mp4
10.6 MB
IEEE Security and Privacy 2020/Neutain't Efficient Dynamic Tain't Analysis with Neural Networks.mp4
10.5 MB
IEEE Security and Privacy 2021/Reading Between the Lines An Extensive Evaluation of the Security and Privacy Implications ....mp4
10.5 MB
IEEE Security and Privacy 2020/VeriSmart A Highly Precise Safety Verifier for Ethereum Smart Contracts.mp4
10.5 MB
IEEE Security and Privacy 2019/Resident Evil Understanding Residential IP Proxy as a Dark Service.mp4
10.5 MB
IEEE Security and Privacy 2021/DICE Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis.mp4
10.5 MB
IEEE Security and Privacy 2022/DeepCoFFEA Improved Flow Correlation Attacks on Tor via Metric Learning and Amplification.mp4
10.4 MB
IEEE Security and Privacy 2021/Using Selective Memoization to Defeat Regular Expression Denial of Service (ReDoS).mp4
10.4 MB
IEEE Security and Privacy 2020/ZEXE Enabling Decentralized Private Computation.mp4
10.4 MB
IEEE Security and Privacy 2020/OAT Attesting Operation Integrity of Embedded Devices.mp4
10.4 MB
IEEE Security and Privacy 2021/SIRNN A Math Library for Secure RNN Inference.mp4
10.3 MB
IEEE Security and Privacy 2020/Measuring Legal Compliance of Banners from IAB Europe's Transparancy and Consent Framework.mp4
10.3 MB
IEEE Security and Privacy 2021/Which Privacy and Security Attributes Most Impact Consumers' Risk Perception and Willingness to ....mp4
10.3 MB
IEEE Security and Privacy 2020/Replicated State Machines without Replicated Execution.mp4
10.3 MB
IEEE Security and Privacy 2021/Keep the Dirt Tain'ted TreeKEM, Adaptively and Actively Secure Continuous Group Key Agreement.mp4
10.3 MB
IEEE Security and Privacy 2021/Doing good by fighting fraud Ethical anti-fraud systems for mobile payments.mp4
10.3 MB
IEEE Security and Privacy 2021/Cross Layer Attacks and How to Use Them (for DNS Cache Poisoning, Device Tracking and More).mp4
10.3 MB
IEEE Security and Privacy 2020/Pangolin Incremental Hybrid Fuzzing with Polyhedral Path Abstraction.mp4
10.3 MB
IEEE Security and Privacy 2021/Compact Certificates of Collective Knowledge.mp4
10.2 MB
IEEE Security and Privacy 2020/TRRespass Exploiting the Many Sides of Target Row Refresh.mp4
10.2 MB
IEEE Security and Privacy 2021/Lockable Signatures for Blockchains Scriptless Scripts for all Signatures.mp4
10.2 MB
IEEE Security and Privacy 2021/Data Privacy in Trigger-Action IoT Systems.mp4
10.2 MB
IEEE Security and Privacy 2020/A Comparative Usability Study of FIDO2 Passwordless Authentication.mp4
10.1 MB
IEEE Security and Privacy 2020/Full-band De-anonymization of Bluetooth Classic Devices.mp4
10.1 MB
IEEE Security and Privacy 2021/They Would do Better if They Worked Together The Case of Interaction Problems Between Password ....mp4
10.1 MB
IEEE Security and Privacy 2020/Are Anonymity-Seekers Just like Everybody Else An Analysis of Contributions to Wikipedia from Tor.mp4
10.1 MB
IEEE Security and Privacy 2020/Detection of Electromagnetic Interference Attacks on Sensor Systems.mp4
10.1 MB
IEEE Security and Privacy 2022/ShorTor Improving Tor Network Latency via Multi-hop Overlay Routing.mp4
10.1 MB
IEEE Security and Privacy 2023/ImU Physical Impersonating Attack for Face Recognition System with Natural Style Changes.mp4
10.1 MB
IEEE Security and Privacy 2023/Locally Differentially Private Frequency Estimation Based on Convolution Framework.mp4
10.1 MB
IEEE Security and Privacy 2023/SoK Anti-Facial Recognition Technology.mp4
10.1 MB
IEEE Security and Privacy 2020/CrypTFlow - Secure TensorFlow Inference.mp4
10.0 MB
IEEE Security and Privacy 2019/Self-Encrypting Deception Weaknesses in the Encryption of Solid State Drives.mp4
10.0 MB
IEEE Security and Privacy 2020/SoK Understanding the Prevailing Security Vulnerabilities in TrustZone-Assisted TEE Systems.mp4
10.0 MB
IEEE Security and Privacy 2021/One Engine to Fuzz 'em All Generic Language Processor Testing with Semantic Validation.mp4
10.0 MB
IEEE Security and Privacy 2020/Meddling Middlemen Empirical Analysis of the Risks of Data-Saving Mobile Browsers.mp4
10.0 MB
IEEE Security and Privacy 2020/Formal Modelling and Proof in the CHERI Design and Implementation Process.mp4
10.0 MB
IEEE Security and Privacy 2020/A Programming Framework for Differential Privacy with Accuracy Concentration Bounds.mp4
10.0 MB
IEEE Security and Privacy 2021/Who is Real Bob Adversarial Attacks on Speaker Recognition Systems.mp4
9.9 MB
IEEE Security and Privacy 2020/Binsec Rel Efficient Relational Symbolic Execution for Constant-Time at Binary-Level.mp4
9.9 MB
IEEE Security and Privacy 2020/SoK Cyber Insurance - Technical Challenges and a System Security Roadmap.mp4
9.9 MB
IEEE Security and Privacy 2020/PMP Cost-Effective Forced Execution with Probabilistic Memory Pre-planning.mp4
9.9 MB
IEEE Security and Privacy 2021/Bookworm Game Automatic Discovery of LTE Vulnerabilities Through Documentation Analysis.mp4
9.7 MB
IEEE Security and Privacy 2021/Trouble Over-The-Air An Analysis of FOTA Apps in the Android Ecosystem.mp4
9.7 MB
IEEE Security and Privacy 2021/Adversary Instantiation Lower bounds for differentially private machine learning.mp4
9.7 MB
IEEE Security and Privacy 2020/Understanding and Mitigating Security Risks of General Messaging Protocols on IoT Clouds.mp4
9.6 MB
IEEE Security and Privacy 2022/Transfer Attacks Revisited A Large-Scale Empirical Study in Real Computer Vision Settings.mp4
9.6 MB
IEEE Security and Privacy 2022/IronMask Versatile Verification of Masking Security.mp4
9.5 MB
IEEE Security and Privacy 2020/JIT Leaks Inducing Timing Side Channels through Just-In-Time Compilation.mp4
9.5 MB
IEEE Security and Privacy 2020/SoK Differential Privacy as a Causal Property.mp4
9.5 MB
IEEE Security and Privacy 2021/NTFUZZ Enabling Type-Aware Kernel Fuzzing on Windows with Static Binary Analysis.mp4
9.5 MB
IEEE Security and Privacy 2021/HackEd A Pedagogical Analysis of Online Vulnerability Discovery Exercises.mp4
9.5 MB
IEEE Security and Privacy 2021/Hardware-Software Contracts for Secure Speculation.mp4
9.4 MB
IEEE Security and Privacy 2021/Systematic Analysis of Randomization-based Protected Cache Architectures.mp4
9.4 MB
IEEE Security and Privacy 2021/SoK Computer-Aided Cryptography.mp4
9.4 MB
IEEE Security and Privacy 2021/On the Just-In-Time Discovery of Profit-Generating Transactions in DeFi Protocols.mp4
9.4 MB
IEEE Security and Privacy 2020/IJON Exploring Deep State Spaces via Fuzzing.mp4
9.4 MB
IEEE Security and Privacy 2021/SmartPulse Automated Checking of Temporal Properties in Smart Contracts.mp4
9.4 MB
IEEE Security and Privacy 2021/Trust, But Verify A Longitudinal Analysis Of Android OEM Compliance and Customization.mp4
9.4 MB
IEEE Security and Privacy 2021/Is Private Learning Possible with Instance Encoding.mp4
9.4 MB
IEEE Security and Privacy 2015/Opening Remarks of the 2015 IEEE Symposium on Security & Privacy.mp4
9.3 MB
IEEE Security and Privacy 2020/This PIN Can Be Easily Guessed Analyzing the Security of Smartphone Unlock PINs.mp4
9.3 MB
IEEE Security and Privacy 2021/MAD-HTLC Because HTLC is Crazy-Cheap to Attack.mp4
9.2 MB
IEEE Security and Privacy 2021/Proactive Threshold Wallets with Offline Devices.mp4
9.1 MB
IEEE Security and Privacy 2021/CRYLOGGER Detecting Crypto Misuses Dynamically.mp4
9.0 MB
IEEE Security and Privacy 2020/Automatically Detecting Bystanders in Photos to Reduce Privacy Risks.mp4
9.0 MB
IEEE Security and Privacy 2021/High-Frequency Trading on Decentralized On-Chain Exchanges.mp4
9.0 MB
IEEE Security and Privacy 2021/Diogenes Lightweight Scalable RSA Modulus Generation with a Dishonest Majority.mp4
9.0 MB
IEEE Security and Privacy 2021/High-Assurance Cryptography in the Spectre Era.mp4
9.0 MB
IEEE Security and Privacy 2021/How Did That Get In My Phone Unwanted App Distribution on Android Devices.mp4
9.0 MB
IEEE Security and Privacy 2020/An Analysis of Pre-installed Android Software.mp4
9.0 MB
IEEE Security and Privacy 2021/Revealer Detecting and Exploiting Regular Expression Denial-of-Service Vulnerabilities.mp4
9.0 MB
IEEE Security and Privacy 2021/Black Widow Blackbox Data-driven Web Scanning.mp4
8.9 MB
IEEE Security and Privacy 2020/Message Time of Arrival Codes A Fundamental Primitive for Secure Distance Measurement.mp4
8.9 MB
IEEE Security and Privacy 2020/The Value of Collaboration in Convex Machine Learning with Differential Privacy.mp4
8.9 MB
IEEE Security and Privacy 2021/DIFUZZRTL Differential Fuzz Testing to Find CPU Bugs.mp4
8.8 MB
IEEE Security and Privacy 2020/Sync HotStuff Simple and Practical Synchronous State Machine Replication.mp4
8.6 MB
IEEE Security and Privacy 2020/RetroWrite Statically Instrumenting COTS Binaries for Fuzzing and Sanitization.mp4
8.6 MB
IEEE Security and Privacy 2020/SPIDER Enabling Fast Patch Propagation in Related Software Repositories.mp4
8.6 MB
IEEE Security and Privacy 2021/Runtime Recovery of Web Applications under Zero-Day ReDoS Attacks.mp4
8.6 MB
IEEE Security and Privacy 2020/Hijacking Transient Execution through Microarchitectural Load Value Injection..mp4
8.5 MB
IEEE Security and Privacy 2021/A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer.mp4
8.4 MB
IEEE Security and Privacy 2021/A2L Anonymous Atomic Locks for Scalability in Payment Channel Hubs.mp4
8.4 MB
IEEE Security and Privacy 2021/Zero Knowledge for Everything and Everyone Fast ZK Processor with Cached ORAM for ANSI C Programs.mp4
8.3 MB
IEEE Security and Privacy 2021/Proof-of-Learning Definitions and Practice.mp4
8.3 MB
IEEE Security and Privacy 2021/Detecting Filter List Evasion With Event-Loop-Turn Granularity JavaScript Signatures.mp4
8.3 MB
IEEE Security and Privacy 2021/CrawlPhish Large-scale Analysis of Client-side Cloaking Techniques in Phishing.mp4
8.3 MB
IEEE Security and Privacy 2021/Ebb-and-Flow Protocols A Resolution of the Availability-Finality Dilemma.mp4
8.2 MB
IEEE Security and Privacy 2020/Can Voters Detect Malicious Manipulation of Ballot Marking Devices.mp4
8.2 MB
IEEE Security and Privacy 2016/Opening Remarks of the 2016 IEEE Symposium on Security & Privacy.mp4
8.2 MB
IEEE Security and Privacy 2021/Invisible Probe Timing Attacks with PCIe Congestion Side-channel.mp4
8.1 MB
IEEE Security and Privacy 2021/Response-Hiding Encrypted Ranges Revisiting Security via Parametrized Leakage-Abuse Attacks.mp4
8.1 MB
IEEE Security and Privacy 2020/Towards Scalable Threshold Cryptosystems.mp4
7.9 MB
IEEE Security and Privacy 2019/PERUN Virtual Payment Hubs over Cryptographic Currencies.mp4
7.9 MB
IEEE Security and Privacy 2021/A Decentralized and Encrypted National Gun Registry.mp4
7.8 MB
IEEE Security and Privacy 2023/On the Evolution of (Hateful) Memes by Means of Multimodal Contrastive Learning.mp4
7.7 MB
IEEE Security and Privacy 2020/BIAS Bluetooth Impersonation AttackS.mp4
7.7 MB
IEEE Security and Privacy 2023/Leaking Arbitrarily Many Secrets Any-out-of-Many Proofs and Applications to RingCT Protocols.mp4
7.6 MB
IEEE Security and Privacy 2023/On The Empirical Effectiveness of Unrealistic Adversarial Hardening Against Realistic Attacks.mp4
7.5 MB
IEEE Security and Privacy 2021/Pegasus Bridging Polynomial and Non-polynomial Evaluations in Homomorphic Encryption.mp4
7.5 MB
IEEE Security and Privacy 2021/Manipulation Attacks in Local Differential Privacy.mp4
7.4 MB
IEEE Security and Privacy 2021/BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures.mp4
7.3 MB
IEEE Security and Privacy 2021/SGUARD Smart Contracts Made Vulnerability-Free.mp4
7.0 MB
IEEE Security and Privacy 2021/Journey to the Center of the Cookie Ecosystem Unraveling Actors' Roles and Relationships.mp4
6.9 MB
IEEE Security and Privacy 2019/Tap 'n Ghost A Compilation of Novel Attack Techniques against Smartphone Touchscreens.mp4
6.8 MB
IEEE Security and Privacy 2021/DIANE Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices.mp4
6.5 MB
IEEE Security and Privacy 2019/IEEE S&P 2019 - Awards Ceremony.mp4
4.2 MB
IEEE Security and Privacy 2019/Neural Cleanse Identifying and Mitigating Backdoor Attacks in Neural Networks.mp4
1.7 MB
IEEE Security and Privacy 2016/NITRD Panel - Federal Cybersecurity and Privacy R&D Strategic Plans.eng.srt
183.3 kB
IEEE Security and Privacy 2022/LangSec Keynote Trojan Source and Bad Characters Invisible Hacks and Reluctant Patching.srt
137.6 kB
IEEE Security and Privacy 2019/IEEE S&P 2019 - 40th Celebration Plenary Session Panel Reflections on four decades of the symposium.eng.srt
108.4 kB
IEEE Security and Privacy 2016/S&P TC Business Meeting.eng.srt
100.7 kB
IEEE Security and Privacy 2022/IEEE S&P 2022 Opening Session.srt
92.1 kB
IEEE Security and Privacy 2023/IEEE S&P 2023 Short Talks.eng.srt
81.1 kB
IEEE Security and Privacy 2015/CHERI - A Hybrid Capability-System Architecture for Scalable Software Compartmentalization.eng.srt
79.1 kB
IEEE Security and Privacy 2017/SoK - Science, Security, and the Elusive Goal of Security as a Scientific Pursuit.eng.srt
77.2 kB
IEEE Security and Privacy 2018/Routing Around Congestion - Defeating DDoS Attacks and Adverse Network Conditions via Reactive....eng.srt
75.2 kB
IEEE Security and Privacy 2017/Cloak and Dagger - From Two Permissions to Complete Control of the UI Feedback Loop.eng.srt
73.8 kB
IEEE Security and Privacy 2015/On Subnormal Floating Point and Abnormal Timing.eng.srt
71.3 kB
IEEE Security and Privacy 2017/Towards Evaluating the Robustness of Neural Networks.eng.srt
69.5 kB
IEEE Security and Privacy 2016/A2 - Analog Malicious Hardware.eng.srt
69.2 kB
IEEE Security and Privacy 2017/Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate.eng.srt
67.8 kB
IEEE Security and Privacy 2016/A Practical Oblivious Map Data Structure with Secure Deletion and History Independence.eng.srt
67.6 kB
IEEE Security and Privacy 2018/Computer Security and Privacy for Refugees in the United States.eng.srt
66.5 kB
IEEE Security and Privacy 2018/Double-efficient zkSNARKs Without Trusted Setup.eng.srt
66.0 kB
IEEE Security and Privacy 2018/Protecting the Stack with Metadata Policies and Tagged Hardware.eng.srt
65.9 kB
IEEE Security and Privacy 2015/SoK - Research Perspectives and Challenges for Bitcoin and Cryptocurrencies.eng.srt
65.8 kB
IEEE Security and Privacy 2019/IEEE S&P 2019 - TC Business Meeting.eng.srt
65.6 kB
IEEE Security and Privacy 2018/EnclaveDB - A Secure Database using SGX.eng.srt
65.4 kB
IEEE Security and Privacy 2018/The Cards Aren't Alright - Detecting Counterfeit Gift Cards Using Encoding Jitter.eng.srt
65.4 kB
IEEE Security and Privacy 2018/Hackers vs. Testers - A Comparison of Software Vulnerability Discovery Processes.eng.srt
64.4 kB
IEEE Security and Privacy 2016/Verifiable ASICs.eng.srt
64.3 kB
IEEE Security and Privacy 2016/Data-Oriented Programming - On the Expressiveness of Non-Control Data Attacks.eng.srt
64.2 kB
IEEE Security and Privacy 2016/TriggerScope - Towards Detecting Logic Bombs in Android Applications.eng.srt
64.1 kB
IEEE Security and Privacy 2016/The Cracked Cookie Jar - HTTP Cookie Hijacking and the Exposure of Private Information.eng.srt
64.1 kB
IEEE Security and Privacy 2015/Riposte - An Anonymous Messaging System Handling Millions of Users.eng.srt
63.9 kB
IEEE Security and Privacy 2015/Ad Injection at Scale - Assessing Deceptive Advertisement Modifications.eng.srt
63.4 kB
IEEE Security and Privacy 2016/LAVA - Large-scale Automated Vulnerability Addition.eng.srt
63.1 kB
IEEE Security and Privacy 2015/Missing the Point(er) - On the Effectiveness of Code Pointer Integrity.eng.srt
62.9 kB
IEEE Security and Privacy 2018/Another Flip in the Wall of Rowhammer Defenses.eng.srt
62.2 kB
IEEE Security and Privacy 2018/Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels.eng.srt
61.6 kB
IEEE Security and Privacy 2018/Enumerating Active IPv6 Hosts for Large-scale Security Scans via DNSSEC-signed Reverse Zones.eng.srt
61.5 kB
IEEE Security and Privacy 2018/When Your Fitness Tracker Betrays You - Quantifying the Predictability....eng.srt
61.5 kB
IEEE Security and Privacy 2018/Towards Security and Privacy for Multi User Augmented Reality.eng.srt
61.1 kB
IEEE Security and Privacy 2017/Scalable Bias-Resistant Distributed Randomness.eng.srt
60.6 kB
IEEE Security and Privacy 2016/Keeping Authorities - Honest or Bust - with Decentralized Witness Cosigning.eng.srt
60.4 kB
IEEE Security and Privacy 2018/Blue Note - How Intentional Acoustic Interference Damages Availablity and Integrity -.eng.srt
60.4 kB
IEEE Security and Privacy 2017/A Lustrum of Malware Network Communication - Evolution and Insights.eng.srt
60.3 kB
IEEE Security and Privacy 2017/SoK - Cryptographically Protected Database Search.eng.srt
59.7 kB
IEEE Security and Privacy 2015/Geppetto - Versatile Verifiable Computation.eng.srt
58.9 kB
IEEE Security and Privacy 2017/IKP - Turning a PKI Around with Decentralized Automated Incentives.eng.srt
58.8 kB
IEEE Security and Privacy 2018/PIR with Compressed Queries and Amortized Query Processing.eng.srt
58.8 kB
IEEE Security and Privacy 2018/Bulletproofs - Short Proofs for Confidential Transactions and More.eng.srt
58.7 kB
IEEE Security and Privacy 2017/HVLearn - Automated Black-box Analysis of Hostname Verification in SSL TLS Implementations.eng.srt
58.7 kB
IEEE Security and Privacy 2015/Virtual Proofs of Reality and their Physical Implementation.eng.srt
58.6 kB
IEEE Security and Privacy 2017/Is Interaction Necessary for Distributed Private Learning.eng.srt
58.5 kB
IEEE Security and Privacy 2018/A Formal Treatment of Accountable Proxying over TLS.eng.srt
58.5 kB
IEEE Security and Privacy 2017/Catena - Efficient Non-equivocation via Bitcoin.eng.srt
58.3 kB
IEEE Security and Privacy 2017/Norax - Enabling Execute-Only Memory for COTS Binaries on AArch64.eng.srt
58.2 kB
IEEE Security and Privacy 2018/Tracking Ransomware End-to-end.eng.srt
57.8 kB
IEEE Security and Privacy 2016/Helping Johnny to Analyze Malware - A Usability-Optimized Decompiler and Malware Analysis User Study.eng.srt
57.7 kB
IEEE Security and Privacy 2017/Hardening Java's Access Control by Abolishing Implicit Privilege Elevation.eng.srt
57.5 kB
IEEE Security and Privacy 2016/Beauty and the Beast - Diverting modern web browsers to build unique browser fingerprints.eng.srt
57.4 kB
IEEE Security and Privacy 2017/Spotless Sandboxes - Evading Malware Analysis Systems using Wear-and-Tear Artifacts.eng.srt
57.3 kB
IEEE Security and Privacy 2017/Backward-bounded DSE - Targeting Infeasibility Questions on Obfuscated Codes.eng.srt
57.1 kB
IEEE Security and Privacy 2017/Securing Augmented Reality Output.eng.srt
56.9 kB
IEEE Security and Privacy 2015/How Secure and Quick is QUIC Provable Security and Performance Analyses.eng.srt
56.8 kB
IEEE Security and Privacy 2018/Enabling Autonomous IoT Device Pairing using Different Sensor Types.eng.srt
56.7 kB
IEEE Security and Privacy 2017/From Trash to Treasure - Timing-Sensitive Garbage Collection.eng.srt
56.6 kB
IEEE Security and Privacy 2018/xJsnark - A Framework for Efficient Verifiable Computation.eng.srt
56.5 kB
IEEE Security and Privacy 2017/Pyramid - Enhancing Selectivity in Big Data Protection with Count Featurization.eng.srt
56.4 kB
IEEE Security and Privacy 2015/A Messy State of the Union - Taming the Composite State Machines of TLS.eng.srt
56.3 kB
IEEE Security and Privacy 2016/Hawk - The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts.eng.srt
55.8 kB
IEEE Security and Privacy 2018/Learning from Mutants - Using Code Mutation to Learn and Monitor Invariants of a CPS.eng.srt
55.8 kB
IEEE Security and Privacy 2016/Security Analysis of Emerging Smart Home Applications.eng.srt
55.4 kB
IEEE Security and Privacy 2017/Leakage-Abuse Attacks on Order-Revealing Encryption.eng.srt
55.4 kB
IEEE Security and Privacy 2016/Synthesizing Plausible Privacy-Preserving Location Traces.eng.srt
55.3 kB
IEEE Security and Privacy 2017/How They Did It - An Analysis of Emission Defeat Devices in Modern Automobiles.eng.srt
55.0 kB
IEEE Security and Privacy 2018/Tracking Certificate Misissuance in the Wild.eng.srt
55.0 kB
IEEE Security and Privacy 2018/vRAM - Faster Verifiable RAM With Program-Independent Preprocessing.eng.srt
54.9 kB
IEEE Security and Privacy 2015/The Miner's Dilemma.eng.srt
54.7 kB
IEEE Security and Privacy 2016/SoK - Everyone Hates Robocalls - A Survey of Techniques against Telephone Spam.eng.srt
54.6 kB
IEEE Security and Privacy 2015/GenoGuard - Protecting Genomic Data against Brute-Force Attacks.eng.srt
54.0 kB
IEEE Security and Privacy 2015/Program-Adaptive Mutational Fuzzing.eng.srt
54.0 kB
IEEE Security and Privacy 2015/VC3 - Trustworthy Data Analytics in the Cloud Using SGX.eng.srt
53.9 kB
IEEE Security and Privacy 2018/Understanding Linux Malware.eng.srt
53.8 kB
IEEE Security and Privacy 2016/CaSE - Cache-Assisted Secure Execution on ARM Processors.eng.srt
53.8 kB
IEEE Security and Privacy 2016/Algorithmic Transparency via Quantitative Input Influence ....eng.srt
53.8 kB
IEEE Security and Privacy 2018/Grand Pwning Unit - Accelerating Microarchitectural Attacks with the GPU.eng.srt
53.7 kB
IEEE Security and Privacy 2017/SymCerts - Practical Symbolic Execution For Exposing Noncompliance in X.509 Certificate Validation.eng.srt
53.6 kB
IEEE Security and Privacy 2016/Back in Black - Towards Formal, Black Box Analysis of Sanitizers and Filters.eng.srt
53.5 kB
IEEE Security and Privacy 2015/Counterfeit Object-oriented Programming.eng.srt
53.5 kB
IEEE Security and Privacy 2015/Privacy and Access Control for Outsourced Personal Records.eng.srt
53.5 kB
IEEE Security and Privacy 2017/Hijacking Bitcoin - Routing Attacks on Cryptocurrencies.eng.srt
53.3 kB
IEEE Security and Privacy 2017/SmarPer - Context-Aware and Automatic Runtime-Permissions for Mobile Devices - YouTube.eng.srt
53.3 kB
IEEE Security and Privacy 2018/Opening Remarks of the 39th IEEE Symposium on Security & Privacy.eng.srt
53.1 kB
IEEE Security and Privacy 2018/Privacy Risks with Facebook's PII-based Targeting.eng.srt
53.0 kB
IEEE Security and Privacy 2022/Membership inference attacks from first principles.srt
53.0 kB
IEEE Security and Privacy 2015/Last-Level Cache Side-Channel Attacks are Practical.eng.srt
52.8 kB
IEEE Security and Privacy 2017/Protecting Bare-metal Embedded Systems with Privilege Overlays.eng.srt
52.8 kB
IEEE Security and Privacy 2018/Distance-Bounding Protocols - Verification without Time and Location.eng.srt
52.7 kB
IEEE Security and Privacy 2017/Comparing the Usability of Cryptographic APIs.eng.srt
52.7 kB
IEEE Security and Privacy 2017/SoK - Exploiting Network Printers.eng.srt
52.6 kB
IEEE Security and Privacy 2018/SoK - Keylogging Side Channels.eng.srt
52.5 kB
IEEE Security and Privacy 2015/Forward Secure Asynchronous Messaging from Puncturable Encryption.eng.srt
52.4 kB
IEEE Security and Privacy 2016/Shreds - Fine-grained Execution Units with Private Memory.eng.srt
52.4 kB
IEEE Security and Privacy 2016/Following Devil's Footprints - Cross-Platform Analysis of Potentially Harmful Libraries ....eng.srt
52.2 kB
IEEE Security and Privacy 2016/pASSWORD tYPOS and How to Correct Them Securely.eng.srt
52.1 kB
IEEE Security and Privacy 2018/The Rise of the Citizen Developer - Assessing the Security Impact of Online App Generators.eng.srt
51.8 kB
IEEE Security and Privacy 2016/You Get Where You're Looking For - The Impact Of Information Sources On Code Security.eng.srt
51.8 kB
IEEE Security and Privacy 2015/Cross-Architecture Bug Search in Binary Executables.eng.srt
51.6 kB
IEEE Security and Privacy 2018/Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage.eng.srt
51.6 kB
IEEE Security and Privacy 2017/NEZHA - Efficient Domain-independent Differential Testing.eng.srt
51.6 kB
IEEE Security and Privacy 2017/A Framework for Universally Composable Diffie-Hellman Key Exchange.eng.srt
51.5 kB
IEEE Security and Privacy 2018/Speechless - Analyzing the Threat to Speech Privacy from Smartphone Motion Sensors.eng.srt
51.4 kB
IEEE Security and Privacy 2017/Finding and Preventing Bugs in JavaScript Bindings.eng.srt
51.3 kB
IEEE Security and Privacy 2018/On Enforcing the Digital Immunity of a Large Humanitarian Organization.eng.srt
51.3 kB
IEEE Security and Privacy 2015/ADSNARK - Nearly Practical and Privacy-Preserving Proofs on Authenticated Data.eng.srt
51.1 kB
IEEE Security and Privacy 2015/Micro-Policies - Formally Verified, Tag-Based Security Monitors.eng.srt
51.1 kB
IEEE Security and Privacy 2018/On the Economics of Offline Password Cracking.eng.srt
50.9 kB
IEEE Security and Privacy 2016/Prepose - Privacy, Security, and Reliability for Gesture-Based Programming.eng.srt
50.9 kB
IEEE Security and Privacy 2018/FP-Stalker - Tracking Browser Fingerprint Evolutions - Antoine Vastel.eng.srt
50.8 kB
IEEE Security and Privacy 2016/On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud.eng.srt
50.8 kB
IEEE Security and Privacy 2017/Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping.eng.srt
50.6 kB
IEEE Security and Privacy 2017/IoT Goes Nuclear - Creating a Zigbee Chain Reaction.eng.srt
50.5 kB
IEEE Security and Privacy 2017/One TPM to Bind Them All - Fixing TPM2.0 for Provably Secure Anonymous Attestation.eng.srt
50.5 kB
IEEE Security and Privacy 2022/Security Foundations for Application-Based Covert Communication Channels.srt
50.4 kB
IEEE Security and Privacy 2017/Optimized Honest-Majority MPC for Malicious Adversaries - Breaking 1 Billion-Gate Second Barrier.eng.srt
50.3 kB
IEEE Security and Privacy 2015/S$A - A Shared Cache Attack That Works across Cores and Defies VM Sandboxing ....eng.srt
50.2 kB
IEEE Security and Privacy 2016/Return to the Zombie Gadgets - Undermining Destructive Code Reads via Code-Inference Attacks.eng.srt
50.2 kB
IEEE Security and Privacy 2018/A Tale of Two Studies - The Best and Worst of YubiKey Usability.eng.srt
50.1 kB
IEEE Security and Privacy 2018/Manipulating Machine Learning - Poisoning Attacks & Countermeasures.eng.srt
50.1 kB
IEEE Security and Privacy 2018/Oblix - An Efficient Oblivious Search Index.eng.srt
49.9 kB
IEEE Security and Privacy 2016/MitM Attack by Name Collision - Cause Analysis and Vulnerability Assessment in the New gTLD Era.eng.srt
49.8 kB
IEEE Security and Privacy 2017/Identifying Personal DNA Methylation Profiles by Genotype Inference.eng.srt
49.7 kB
IEEE Security and Privacy 2017/vSQL - Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases.eng.srt
49.4 kB
IEEE Security and Privacy 2016/Distillation as a Defense to Adversarial Perturbations against Deep Neural Networks.eng.srt
49.2 kB
IEEE Security and Privacy 2022/Evaluating Physical-Layer BLE Location Tracking Attacks on Mobile Devices.srt
49.2 kB
IEEE Security and Privacy 2018/Implementing Conjunction Obfuscation under Entropic Ring LWE.eng.srt
48.8 kB
IEEE Security and Privacy 2022/Invisible Finger Practical Electromagnetic Interference Attack on Touchscreen Electronic Devices.srt
48.7 kB
IEEE Security and Privacy 2015/Malicious-Client Security in Blind Seer - A Scalable Private DBMS.eng.srt
48.6 kB
IEEE Security and Privacy 2016/HDFI - Hardware-Assisted Data-Flow Isolation.eng.srt
48.6 kB
IEEE Security and Privacy 2016/Users Really Do Plug in USB Drives They Find.eng.srt
48.5 kB
IEEE Security and Privacy 2015/Bitcoin over Tor isn't a Good Idea.eng.srt
48.3 kB
IEEE Security and Privacy 2017/XHOUND - Quantifying the Fingerprintability of Browser Extensions.eng.srt
48.1 kB
IEEE Security and Privacy 2018/Mobile Application Web API Reconnaissance.eng.srt
48.1 kB
IEEE Security and Privacy 2015/What the App is That Deception and Countermeasures in the Android User Interface.eng.srt
47.9 kB
IEEE Security and Privacy 2015/Post-Quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors Problem.eng.srt
47.9 kB
IEEE Security and Privacy 2022/HardLog Practical Tamper-Proof System Auditing Using a Novel Audit Device.srt
47.4 kB
IEEE Security and Privacy 2018/FuturesMEX - Secure, Distributed Futures Market Exchange.eng.srt
47.1 kB
IEEE Security and Privacy 2018/A Machine Learning Approach to Prevent Malicious Calls Over Telephony Networks.eng.srt
47.0 kB
IEEE Security and Privacy 2017/Stack Overflow Considered Harmful -- The Impact of Copy&Paste on Android Application Security.eng.srt
47.0 kB
IEEE Security and Privacy 2016/Domain-Z - 28 Registrations Later.eng.srt
46.9 kB
IEEE Security and Privacy 2018/Sonar - Detecting SS7 Redirection Attacks With Audio-Based Distance Bounding.eng.srt
46.9 kB
IEEE Security and Privacy 2017/Obstacles to the Adoption of Secure Communication Tools.eng.srt
46.7 kB
IEEE Security and Privacy 2015/Temporal Lensing and Its Application in Pulsing Denial-of-Service Attacks.eng.srt
46.7 kB
IEEE Security and Privacy 2018/SoK - Plug & Pray - Today - Understanding USB Insecurity in Versions 1 through C.eng.srt
46.3 kB
IEEE Security and Privacy 2022/CirC Compiler infrastructure for proof systems, software verification, and more.srt
46.2 kB
IEEE Security and Privacy 2017/CoSMeDis - A Distributed Social Media Platform with Formally Verified Confidentiality Guarantees.eng.srt
46.2 kB
IEEE Security and Privacy 2017/VUDDY - A Scalable Approach for Vulnerable Code Clone Discovery.eng.srt
46.2 kB
IEEE Security and Privacy 2015/ObliVM - A Programming Framework for Secure Computation.eng.srt
46.0 kB
IEEE Security and Privacy 2016/Cinderella - Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with ....eng.srt
46.0 kB
IEEE Security and Privacy 2019/Spectre Attacks Exploiting Speculative Execution.eng.srt
45.9 kB
IEEE Security and Privacy 2017/Side-Channel Attacks on Shared Search Indexes.eng.srt
45.9 kB
IEEE Security and Privacy 2016/Key Confirmation in Key Exchange - A Formal Treatment and Implications for TLS 1.3.eng.srt
45.9 kB
IEEE Security and Privacy 2015/Every Second Counts - Quantifying the Negative Externalities of Cybercrime via Typosquatting.eng.srt
45.9 kB
IEEE Security and Privacy 2022/Measuring and Mitigating the Risk of IP Reuse on Public Clouds.srt
45.8 kB
IEEE Security and Privacy 2022/Asleep at the Keyboard Assessing the Security of GitHub Copilot's Code Contributions.srt
45.8 kB
IEEE Security and Privacy 2017/SecureML - A System for Scalable Privacy-Preserving Machine Learning.eng.srt
45.8 kB
IEEE Security and Privacy 2018/Stealing Hyperparameters in Machine Learning.eng.srt
45.7 kB
IEEE Security and Privacy 2022/TASHAROK-Using Mechanism Design for Enhancing Security Resource Allocation in Interdependent Systems.srt
45.7 kB
IEEE Security and Privacy 2017/CRLite - A Scalable System for Pushing All TLS Revocations to All Browsers.eng.srt
45.6 kB
IEEE Security and Privacy 2016/SoK - (State of) The Art of War - Offensive Techniques in Binary Analysis.eng.srt
45.6 kB
IEEE Security and Privacy 2017/Augur - Internet-Wide Detection of Connectivity Disruptions.eng.srt
45.5 kB
IEEE Security and Privacy 2015/Effective Real-Time Android Application Auditing.eng.srt
45.5 kB
IEEE Security and Privacy 2018/Anonymity Trilemma - Strong Anonymity, Low Bandwidth Overhead, Low Latency -- Choose Two.eng.srt
45.4 kB
IEEE Security and Privacy 2018/Study and Mitigation of Origin Stripping Vulnerabilities in Hybrid-postMessage Enabled Mobile Apps.eng.srt
45.1 kB
IEEE Security and Privacy 2022/Domains Do Change Their Spots Quantifying Potential Abuse of Residual Trust.srt
45.0 kB
IEEE Security and Privacy 2022/Automated Attack Synthesis by Extracting Finite State Machines from Protocol Specification Documents.srt
44.8 kB
IEEE Security and Privacy 2019/New Primitives for Actively-Secure MPC over Rings with Applications to Private Machine Learning.eng.srt
44.7 kB
IEEE Security and Privacy 2022/SoK Social Cybersecurity.srt
44.6 kB
IEEE Security and Privacy 2016/PhotoProof - Cryptographic Image Authentication for Any Set of Permissible Transformations.eng.srt
44.5 kB
IEEE Security and Privacy 2016/SoK - Towards Grounding Censorship Circumvention in Empiricism.eng.srt
44.5 kB
IEEE Security and Privacy 2016/Cache Storage Channels - Alias-Driven Attacks and Verified Countermeasures.eng.srt
44.5 kB
IEEE Security and Privacy 2018/T-Fuzz Fuzzing by Program Transformation - Hui Peng.eng.srt
44.5 kB
IEEE Security and Privacy 2016/Automated Analysis and Verification of TLS 1.3 - 0-RTT, Resumption and Delayed Authentication.eng.srt
44.5 kB
IEEE Security and Privacy 2022/SwarmFlawFinder Discovering and Exploiting Logic Flaws of Swarm Algorithms.srt
44.4 kB
IEEE Security and Privacy 2019/Fidelius Protecting User Secrets from Compromised Browsers.eng.srt
44.4 kB
IEEE Security and Privacy 2015/A Generic Approach to Automatic Deobfuscation of Executable Code.eng.srt
44.3 kB
IEEE Security and Privacy 2019/Full speed Fuzzing Reducing Fuzzing Overhead through Coverage-guided Tracing.eng.srt
44.1 kB
IEEE Security and Privacy 2022/SpecHammer Combining Spectre and Rowhammer for New Speculative Attacks.srt
44.0 kB
IEEE Security and Privacy 2015/Using Hardware Features for Increased Debugging Transparency.eng.srt
43.9 kB
IEEE Security and Privacy 2022/Wobfuscator Obfuscating JavaScript Malware via Opportunistic Translation to WebAssembly.srt
43.8 kB
IEEE Security and Privacy 2017/Counter-RAPTOR - Safeguarding Tor Against Active Routing Attacks.eng.srt
43.8 kB
IEEE Security and Privacy 2022/Mitigating Information Leakage Vulnerabilities with Type-based Data Isolation.srt
43.7 kB
IEEE Security and Privacy 2017/Your Exploit is Mine - Automatic Shellcode Transplant for Remote Exploits.eng.srt
43.6 kB
IEEE Security and Privacy 2018/EyeTell - Video-Assisted Touchscreen Keystroke Inference from Eye Movements.eng.srt
43.4 kB
IEEE Security and Privacy 2015/SurroundWeb - Mitigating Privacy Concerns in a 3D Web Browser.eng.srt
43.4 kB
IEEE Security and Privacy 2022/Privacy-from-Birth Protecting Sensed Data from Malicious Sensors with VERSA.srt
43.4 kB
IEEE Security and Privacy 2022/Phishing in Organizations Findings from a Large-Scale and Long-Term Study.srt
43.4 kB
IEEE Security and Privacy 2016/Multiple Handshakes Security of TLS 1.3 Candidates.eng.srt
43.3 kB
IEEE Security and Privacy 2017/An Experimental Security Analysis of an Industrial Robot Controller.eng.srt
43.1 kB
IEEE Security and Privacy 2017/To Catch a Ratter - Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild.eng.srt
43.0 kB
IEEE Security and Privacy 2022/Bad Characters Imperceptible NLP Attacks.srt
43.0 kB
IEEE Security and Privacy 2018/Racing in Hyperspace - Closing Hyper Threading Side Channels on SGX.eng.srt
42.8 kB
IEEE Security and Privacy 2015/High System-Code Security with Low Overhead.eng.srt
42.7 kB
IEEE Security and Privacy 2016/Talos - Neutralizing Vulnerabilities with Security Workarounds for Rapid Response.eng.srt
42.7 kB
IEEE Security and Privacy 2018/Impossibility of Precise and Sound Termination-Sensitive Security Enforcements.eng.srt
42.7 kB
IEEE Security and Privacy 2016/A Method for Verifying Privacy-Type Properties - The Unbounded Case.eng.srt
42.6 kB
IEEE Security and Privacy 2017/Machine-Checked Proofs of Privacy for Electronic Voting Protocols.eng.srt
42.5 kB
IEEE Security and Privacy 2022/Delay Wreaks Havoc on Your Smart Home Delay-based Automation Interference Attacks.srt
42.5 kB
IEEE Security and Privacy 2017/Membership Inference Attacks against Machine Learning Models.eng.srt
42.5 kB
IEEE Security and Privacy 2018/Static Evaluation of Noninterference using Approximate Model Counting.eng.srt
42.4 kB
IEEE Security and Privacy 2022/Reconstructing Training Data with Informed Adversaries.srt
42.2 kB
IEEE Security and Privacy 2022/Investigating Influencer VPN Ads on YouTube.srt
42.1 kB
IEEE Security and Privacy 2015/Readactor - Practical Code Randomization Resilient to Memory Disclosure.eng.srt
42.0 kB
IEEE Security and Privacy 2017/SysPal System-guided Pattern Locks for Android.eng.srt
41.9 kB
IEEE Security and Privacy 2016/TaoStore - Overcoming Asynchronicity in Oblivious Data Storage.eng.srt
41.8 kB
IEEE Security and Privacy 2018/FPGA-Based Remote Power Side-Channel Attacks.eng.srt
41.7 kB
IEEE Security and Privacy 2022/They're not that hard to mitigate -What Cryptographic Library Developers Think About Timing Attacks.srt
41.5 kB
IEEE Security and Privacy 2019/True2F Backdoor resistant authentication tokens Emma Dauterman.eng.srt
41.5 kB
IEEE Security and Privacy 2019/PhishFarm A Scalable Framework for Measuring the Effectivness of Evasion Techniques Against....eng.srt
41.4 kB
IEEE Security and Privacy 2018/DEEPSEC - Deciding Equivalence Properties in Security Protocols - Theory and Practice.eng.srt
41.3 kB
IEEE Security and Privacy 2018/Surveylance - Automatically Detecting Online Survey Scams.eng.srt
41.3 kB
IEEE Security and Privacy 2015/The Attack of the Clones - A Study of the Impact of Shared Code on Vulnerability Patching.eng.srt
41.2 kB
IEEE Security and Privacy 2022/De-Identification's Impact on Minority Representation and Privacy Preservation in the US Census.srt
40.9 kB
IEEE Security and Privacy 2022/Scraping Sticky Leftovers App User Information Left on Servers After Account Deletion.srt
40.9 kB
IEEE Security and Privacy 2022/mmSpy Spying Phone Calls using mmWave Radars.srt
40.8 kB
IEEE Security and Privacy 2015/Controlled-Channel Attacks - Deterministic Side Channels for Untrusted Operating Systems.eng.srt
40.7 kB
IEEE Security and Privacy 2015/Leave Me Alone - App-Level Protection against Runtime Information Gathering on Android.eng.srt
40.7 kB
IEEE Security and Privacy 2022/How Does Usable Security Not End Up in Software Products Results From a Qualitative Interview Study.srt
40.6 kB
IEEE Security and Privacy 2017/Verifying and Synthesizing Constant-Resource Implementations with Types.eng.srt
40.6 kB
IEEE Security and Privacy 2016/Inferring User Routes and Locations using Zero-Permission Mobile Sensors.eng.srt
40.5 kB
IEEE Security and Privacy 2022/Practical Asynchronous Distributed Key Generation.srt
40.5 kB
IEEE Security and Privacy 2022/Peekaboo A Hub-Based Approach to Enable Transparency in Data Processing within Smart Homes.srt
40.5 kB
IEEE Security and Privacy 2019/Should I Worry A Cross Cultural Examination of Account Security Incident Response.eng.srt
40.4 kB
IEEE Security and Privacy 2015/Vetting SSL Usage in Applications with SSLINT.eng.srt
40.2 kB
IEEE Security and Privacy 2015/Protecting Private Keys against Memory Disclosure Attacks Using Hardware Transactional Memory.eng.srt
40.1 kB
IEEE Security and Privacy 2015/Understanding and Monitoring Embedded Web Scripts.eng.srt
40.1 kB
IEEE Security and Privacy 2022/Cats vs. Spectre An Axiomatic Approach to Modeling Speculative Execution Attacks.srt
39.8 kB
IEEE Security and Privacy 2022/DeepSteal Advanced Model Extractions Leveraging Efficient Weight Stealing in Memories.srt
39.7 kB
IEEE Security and Privacy 2022/Finding and Exploiting CPU Features using MSR Templating.srt
39.6 kB
IEEE Security and Privacy 2022/How Not to Protect Your IP - An Industry-Wide Break of IEEE 1735 Implementations.srt
39.5 kB
IEEE Security and Privacy 2022/Spiral Fast, High-Rate Single-Server PIR via FHE Composition.srt
39.5 kB
IEEE Security and Privacy 2022/Private Nearest Neighbor Search with Sublinear Communication and Malicious Security.srt
39.5 kB
IEEE Security and Privacy 2022/Using Throughput-Centric Byzantine Broadcast to Tolerate Malicious Majority in Blockchains.srt
39.5 kB
IEEE Security and Privacy 2023/Examining Zero-Shot Vulnerability Repair with Large Language Models.eng.srt
39.5 kB
IEEE Security and Privacy 2022/The Experts' Insights on the Peer Review Process of Evaluating Security Papers.srt
39.4 kB
IEEE Security and Privacy 2022/ZeeStar Private Smart Contracts by Homomorphic Encryption and Zero-knowledge Proofs.srt
39.2 kB
IEEE Security and Privacy 2015/Towards Making Systems Forget with Machine Unlearning.eng.srt
39.1 kB
IEEE Security and Privacy 2022/A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP.srt
39.1 kB
IEEE Security and Privacy 2022/TROLLMAGNIFIER Detecting State-Sponsored Troll Accounts on Reddit.srt
39.1 kB
IEEE Security and Privacy 2022/WtaGraph Web Tracking and Advertising Detection using Graph Neural Networks.srt
39.0 kB
IEEE Security and Privacy 2019/Dominance as a New Trusted Computing Primitive for the IoT.eng.srt
39.0 kB
IEEE Security and Privacy 2022/MatRiCT More Efficient Post-Quantum Private Blockchain Payments.srt
39.0 kB
IEEE Security and Privacy 2022/BEACON - Directed Grey-Box Fuzzing with Provable Path Pruning.srt
38.9 kB
IEEE Security and Privacy 2018/Compiler-assisted Code Randomization.eng.srt
38.9 kB
IEEE Security and Privacy 2019/Iodine Fast Dynamic Tain't Tracking Using Rollback free Optimistic Hybrid Analysis.eng.srt
38.7 kB
IEEE Security and Privacy 2022/Sphinx Enabling Privacy-Preserving Online Learning over the Cloud.srt
38.5 kB
IEEE Security and Privacy 2022/Waldo A Private Time-Series Database from Function Secret-Sharing.srt
38.5 kB
IEEE Security and Privacy 2022/Back to the Drawing Board A Critical Evaluation of Poisoning Attacks on Federated Learning.srt
38.4 kB
IEEE Security and Privacy 2022/Anti-Tamper Radio System-Level Tamper Detection for Computing Systems.srt
38.3 kB
IEEE Security and Privacy 2017/IVD - Automatic Learning and Enforcement of Authorization Rules in Online Social Networks - YouTube.eng.srt
38.2 kB
IEEE Security and Privacy 2019/RIDL Rogue In-Flight Data Load.eng.srt
38.2 kB
IEEE Security and Privacy 2015/TinyGarble - Highly Compressed and Scalable Sequential Garbled Circuits.eng.srt
38.1 kB
IEEE Security and Privacy 2019/Postcards from the Post HTTP World Amplification of HTTPS Vulnerabilities in the Web Ecosystem.eng.srt
38.0 kB
IEEE Security and Privacy 2022/SAILFISH Vetting Smart Contract State-Inconsistency Bugs in Seconds.srt
38.0 kB
IEEE Security and Privacy 2022/IRShield A Countermeasure Against Adversarial Physical-Layer Wireless Sensing.srt
38.0 kB
IEEE Security and Privacy 2017/Multi-touch Authentication Using Hand Geometry and Behavioral Information.eng.srt
37.9 kB
IEEE Security and Privacy 2022/vSGX Virtualizing SGX Enclaves on AMD SEV.srt
37.9 kB
IEEE Security and Privacy 2019/Proof Of Stake Sidechains.eng.srt
37.9 kB
IEEE Security and Privacy 2018/Angora - Efficient Fuzzing by Principled Search.eng.srt
37.9 kB
IEEE Security and Privacy 2019/Formally Verified Cryptographic Web Applications in WebAssembly.eng.srt
37.8 kB
IEEE Security and Privacy 2022/BadEncoder Backdoor Attacks to Pre-trained Encoders in Self-Supervised Learning.srt
37.8 kB
IEEE Security and Privacy 2021/SoK An Overview of FHE Compilers and Tools.eng.srt
37.7 kB
IEEE Security and Privacy 2022/Blacksmith Compromising Target Row Refresh by Rowhammering in the Frequency Domain.srt
37.7 kB
IEEE Security and Privacy 2022/Transcending TRANSCEND Revisiting Malware Classification in the Presence of Concept Drift.srt
37.6 kB
IEEE Security and Privacy 2022/PCR-Auth Solving Authentication Puzzle Challenges with Encoded Palm Contact Responses.srt
37.5 kB
IEEE Security and Privacy 2022/Desperate Times Call for Desperate Measures - User Concerns with Mobile Loan Apps in Kenya.srt
37.4 kB
IEEE Security and Privacy 2022/Heapster Analyzing the Security of Dynamic Allocators for Monolithic Firmware Images.srt
37.4 kB
IEEE Security and Privacy 2022/Noise A Library of Verified High-Performance Secure Channel Protocol Implementations.srt
37.3 kB
IEEE Security and Privacy 2019/XCLAIM Trustless Interoperable Cryptocurrency Backed Assets.eng.srt
37.2 kB
IEEE Security and Privacy 2022/SYMBEXCEL Automated Analysis and Understanding of Malicious Excel 4.0 Macros.srt
37.2 kB
IEEE Security and Privacy 2022/Sabre Sender-Anonymous Messaging with Fast Audits.srt
37.2 kB
IEEE Security and Privacy 2015/Caelus - Verifying the Consistency of Cloud Services with Battery-Powered Devices.eng.srt
37.1 kB
IEEE Security and Privacy 2019/Does Certificate Transparency Break the Web Measuring Adoption and Error Rate.eng.srt
36.9 kB
IEEE Security and Privacy 2022/FuzzUSB Hybrid Stateful Fuzzing of USB Gadget Stacks.srt
36.9 kB
IEEE Security and Privacy 2022/Investigating the Use of Email Encryption for an Entire University.srt
36.8 kB
IEEE Security and Privacy 2015/Secure Track Verification.eng.srt
36.8 kB
IEEE Security and Privacy 2016/Downgrade Resilience in Key-Exchange Protocols.eng.srt
36.8 kB
IEEE Security and Privacy 2022/Hark A Deep Learning System for Navigating Privacy Feedback at Scale.srt
36.7 kB
IEEE Security and Privacy 2019/If HTTPS Were Secure I wouldn't Need 2FA End User and Administrator Mental Models of HTTPS.eng.srt
36.5 kB
IEEE Security and Privacy 2022/Adversarial Prefetch New Cross-Core Cache Side Channel Attacks.srt
36.3 kB
IEEE Security and Privacy 2023/ELSA Secure Aggregation for Federated Learning with Malicious Actors.eng.srt
36.3 kB
IEEE Security and Privacy 2023/RAB Provable Robustness Against Backdoor Attacks.eng.srt
36.2 kB
IEEE Security and Privacy 2016/I Think They're Trying to Tell Me Something - Advice Sources and Selection for Digital Security.eng.srt
36.2 kB
IEEE Security and Privacy 2016/A Tough call - Mitigating Advanced Code-Reuse Attacks At The Binary Level.eng.srt
36.1 kB
IEEE Security and Privacy 2019/Hard Drive of Hearing Disks that Eavesdrop with a Synthesized Microphone.eng.srt
36.1 kB
IEEE Security and Privacy 2018/Secure Device Bootstrapping without Secrets Resistant to Signal Manipulation Attacks.eng.srt
36.0 kB
IEEE Security and Privacy 2022/PGPATCH Policy-Guided Logic Bug Patching for Robotic Vehicles.srt
36.0 kB
IEEE Security and Privacy 2019/SoK Shining Light on Shadow Stacks.eng.srt
35.9 kB
IEEE Security and Privacy 2019/Kiss from a Rogue Evaluating Detectability of Pay-at-the-Pump Card Skimmers.eng.srt
35.9 kB
IEEE Security and Privacy 2016/Cloak of Visibility - Detecting When Machines Browse a Different Web.eng.srt
35.9 kB
IEEE Security and Privacy 2019/SoK General Purpose Frameworks for Secure Multi-Party Computation.eng.srt
35.8 kB
IEEE Security and Privacy 2022/IRQDebloat Reducing Driver Attack Surface in Embedded Devices.srt
35.7 kB
IEEE Security and Privacy 2021/SoK Hate, Harassment, and the Changing Landscape of Online Abuse.eng.srt
35.7 kB
IEEE Security and Privacy 2019/How Well Do My Results Generalize Comparing Security and Privacy Survey Results from....eng.srt
35.6 kB
IEEE Security and Privacy 2019/PERUN Virtual Payment Hubs over Cryptographic Currencies.eng.srt
35.6 kB
IEEE Security and Privacy 2023/Teaching and Learning Cybersecurity and AI Ethics in High School.eng.srt
35.6 kB
IEEE Security and Privacy 2022/SecFloat Accurate Floating-Point meets Secure 2-Party Computation.srt
35.5 kB
IEEE Security and Privacy 2016/Staying Secure and Unprepared - Understanding and Mitigating the Security Risks of Apple ZeroConf.eng.srt
35.5 kB
IEEE Security and Privacy 2022/The State of the SameSite Studying the Usage, Effectiveness, and Adequacy of SameSite Cookies.srt
35.5 kB
IEEE Security and Privacy 2019/Simple High-Level Code for Cryptographic Arithmetic - With Proofs, Without Compromises.eng.srt
35.4 kB
IEEE Security and Privacy 2019/Self-Encrypting Deception Weaknesses in the Encryption of Solid State Drives.eng.srt
35.3 kB
IEEE Security and Privacy 2015/Automatic Inference of Search Patterns for Tain't-Style Vulnerabilities.eng.srt
35.2 kB
IEEE Security and Privacy 2022/PICCOLO Exposing Complex Backdoors in NLP Transformer Models.srt
35.2 kB
IEEE Security and Privacy 2022/SoK Unifying and Applying At-Risk User Research.srt
35.2 kB
IEEE Security and Privacy 2018/Locally Differentially Private Frequent Itemset Mining.eng.srt
35.2 kB
IEEE Security and Privacy 2015/SoK - Secure Messaging.eng.srt
35.1 kB
IEEE Security and Privacy 2019/Attack Directories, Not Caches Side Channel Attacks in a Non Inclusive World.eng.srt
35.1 kB
IEEE Security and Privacy 2021/A Decentralized and Encrypted National Gun Registry.eng.srt
35.1 kB
IEEE Security and Privacy 2022/A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols.srt
35.1 kB
IEEE Security and Privacy 2022/RT-TEE Real-time System Availability for Cyber-physical Systems using ARM TrustZone.srt
35.1 kB
IEEE Security and Privacy 2022/Publicly Accountable Robust Multi-Party Computation.srt
35.1 kB
IEEE Security and Privacy 2019/Reasoning Analytically About Password Cracking Software Alex Liu.eng.srt
34.9 kB
IEEE Security and Privacy 2023/Threshold BBS Signatures for Distributed Anonymous Credential Issuance.eng.srt
34.9 kB
IEEE Security and Privacy 2023/WaVe A Verifiably Secure WebAssembly Sandboxing Runtime.eng.srt
34.8 kB
IEEE Security and Privacy 2022/Adversarial Examples - for Proof-of-Learning.srt
34.8 kB
IEEE Security and Privacy 2019/Neural Cleanse Identifying and Mitigating Backdoor Attacks in Neural Networks.eng.srt
34.7 kB
IEEE Security and Privacy 2016/No Pardon for the Interruption - New Inference Attacks on Android Through Interrupt Timing Analysis.eng.srt
34.7 kB
IEEE Security and Privacy 2019/Synesthesia Detecting Screen Content via Remote Acoustic Side Channels.eng.srt
34.7 kB
IEEE Security and Privacy 2019/EmPoWeb Empowering Web Applications with Browser Extensions.eng.srt
34.6 kB
IEEE Security and Privacy 2023/RoFL Robustness of Secure Federated Learning.eng.srt
34.6 kB
IEEE Security and Privacy 2022/How to Attack and Generate Honeywords.srt
34.6 kB
IEEE Security and Privacy 2015/Cracking-Resistant Password Vaults Using Natural Language Encoders.eng.srt
34.6 kB
IEEE Security and Privacy 2022/A Formal Security Analysis of the W3C Web Payment APIs Attacks and Verification.srt
34.5 kB
IEEE Security and Privacy 2019/LBM A Security Framework for Peripherals within the Linux Kernel.eng.srt
34.5 kB
IEEE Security and Privacy 2022/ShadeWatcher Recommendation-guided Cyber Threat Analysis using System Audit Records.srt
34.5 kB
IEEE Security and Privacy 2023/Vulnerability Discovery for All Experiences of Marginalization in Vulnerability Discovery.eng.srt
34.4 kB
IEEE Security and Privacy 2019/Theory and Practice of Finding Eviction Sets.eng.srt
34.3 kB
IEEE Security and Privacy 2023/Security and Privacy Challenges, Advice, and Opportunities at Cybercafes in Kenya.eng.srt
34.3 kB
IEEE Security and Privacy 2022/Copy, Right A Testing Framework for Copyright Protection of Deep Learning Models.srt
34.2 kB
IEEE Security and Privacy 2016/High-Speed Inter-domain Fault Localization.eng.srt
34.2 kB
IEEE Security and Privacy 2023/Space Odyssey An Experimental Software Security Analysis of Satellites.eng.srt
34.2 kB
IEEE Security and Privacy 2021/Doing good by fighting fraud Ethical anti-fraud systems for mobile payments.eng.srt
34.1 kB
IEEE Security and Privacy 2022/PROTRR Principled yet Optimal In-DRAM Target Row Refresh.srt
33.9 kB
IEEE Security and Privacy 2022/Formal Model-Driven Discovery of Bluetooth Protocol Design Vulnerabilities.srt
33.9 kB
IEEE Security and Privacy 2022/Property Inference from Poisoning.srt
33.9 kB
IEEE Security and Privacy 2022/Locally Differentially Private Sparse Vector Aggregation.srt
33.8 kB
IEEE Security and Privacy 2019/NEUZZ Efficient Fuzzing with Neural Program Smoothing.eng.srt
33.8 kB
IEEE Security and Privacy 2019/Towards Practical Differentialy Private Convex Optimization.eng.srt
33.8 kB
IEEE Security and Privacy 2018/AI2 - Safety and Robustness Certification of Neural Networks.eng.srt
33.8 kB
IEEE Security and Privacy 2022/Deployment of Source Address Validation by Network Operators A Randomized Control Trial.srt
33.7 kB
IEEE Security and Privacy 2022/Mind the Gap Studying the Insecurity of Provably Secure Embedded Trusted Execution Architectures.srt
33.7 kB
IEEE Security and Privacy 2022/SNARKBlock Federated Anonymous Blocklisting from Hidden Common Input Aggregate Proofs.srt
33.7 kB
IEEE Security and Privacy 2016/Revisiting Square Root ORAM - Efficient Random Access in Multi-Party Computation.eng.srt
33.7 kB
IEEE Security and Privacy 2022/Statistical Quantification of Differential Privacy A Local Approach.srt
33.7 kB
IEEE Security and Privacy 2019/Redactable Blockchain in the Permissionless Setting.eng.srt
33.6 kB
IEEE Security and Privacy 2022/Spook.js Attacking Chrome Strict Site Isolation via Speculative Execution.srt
33.6 kB
IEEE Security and Privacy 2021/Diogenes Lightweight Scalable RSA Modulus Generation with a Dishonest Majority.eng.srt
33.5 kB
IEEE Security and Privacy 2022/Universal Atomic Swaps Secure Exchange of Coins Across All Blockchains.srt
33.5 kB
IEEE Security and Privacy 2022/Graphics Peeping Unit Exploiting EM Side-Channel Information of GPUs to Eavesdrop on Your Neighbors.srt
33.5 kB
IEEE Security and Privacy 2023/Blue's Clues Practical Discovery of Non-Discoverable Bluetooth Devices.eng.srt
33.5 kB
IEEE Security and Privacy 2021/Bitcoin-Compatible Virtual Channels.eng.srt
33.3 kB
IEEE Security and Privacy 2022/Spinning Language Models Risks of Propaganda-as-a-Service and Countermeasures.srt
33.3 kB
IEEE Security and Privacy 2023/Blue Is the New Black (Market) Privacy Leaks and Re-Victimization from Police-Auctioned Cellphones.eng.srt
33.2 kB
IEEE Security and Privacy 2019/Towards Automated Safety Vetting of PLC Code in Real World Plants Mu Zhang.eng.srt
33.2 kB
IEEE Security and Privacy 2016/Sending out an SMS - Characterizing the Security of the SMS Ecosystem with Public Gateways.eng.srt
33.2 kB
IEEE Security and Privacy 2022/SoK How Robust is Image Classification Deep Neural Network Watermarking.srt
33.2 kB
IEEE Security and Privacy 2022/SoK Authentication in Augmented and Virtual Reality.srt
33.2 kB
IEEE Security and Privacy 2019/Differentially Private Model Publishing For Deep Learning.eng.srt
33.0 kB
IEEE Security and Privacy 2021/Is Private Learning Possible with Instance Encoding.eng.srt
32.9 kB
IEEE Security and Privacy 2019/Threshold ECDSA from ECDSA Assumptions The Multiparty Case.eng.srt
32.9 kB
IEEE Security and Privacy 2021/SoK Computer-Aided Cryptography.eng.srt
32.8 kB
IEEE Security and Privacy 2019/Asm2Vec Boosting Static Representation Robustness for Binary Clone Search....eng.srt
32.8 kB
IEEE Security and Privacy 2019/Ouroboros Crypsinous Privacy Preserving Proof of Stake.eng.srt
32.7 kB
IEEE Security and Privacy 2022/K-Scheduler Effective Seed Scheduling for Fuzzing with Graph Centrality Analysis.srt
32.7 kB
IEEE Security and Privacy 2023/Is Cryptographic Deniability Sufficient Non-Expert Perceptions of Deniability in Secure Messaging.eng.srt
32.7 kB
IEEE Security and Privacy 2023/Hide and Seek with Spectres Efficient discovery of speculative vulnerabilities with random testing.eng.srt
32.6 kB
IEEE Security and Privacy 2021/HackEd A Pedagogical Analysis of Online Vulnerability Discovery Exercises.eng.srt
32.5 kB
IEEE Security and Privacy 2016/Seeking Nonsense, Looking for Trouble - Efficient Promotional-Infection Detection through ....eng.srt
32.4 kB
IEEE Security and Privacy 2021/Adversarial Watermarking Transformer Towards Tracing Text Provenance with Data Hiding.eng.srt
32.4 kB
IEEE Security and Privacy 2021/Trust, But Verify A Longitudinal Analysis Of Android OEM Compliance and Customization.eng.srt
32.4 kB
IEEE Security and Privacy 2017/Under the Shadow of Sunshine - Understanding & Detecting Bulletproof Hosting.eng.srt
32.4 kB
IEEE Security and Privacy 2023/SoK A Critical Evaluation of Efficient Website Fingerprinting Defenses.eng.srt
32.4 kB
IEEE Security and Privacy 2019/CaSym Cache Aware Symbolic Execution for Side Channel Detection and Mitigation.eng.srt
32.3 kB
IEEE Security and Privacy 2022/Exploit the Last Straw That Breaks Android Systems.srt
32.3 kB
IEEE Security and Privacy 2021/SmartPulse Automated Checking of Temporal Properties in Smart Contracts.eng.srt
32.3 kB
IEEE Security and Privacy 2022/Why Crypto-detectors Fail A Systematic Evaluation of Cryptographic Misuse Detection Techniques.srt
32.3 kB
IEEE Security and Privacy 2022/ProVerif with Lemmas, Induction, Fast Subsumption, and Much More.srt
32.2 kB
IEEE Security and Privacy 2021/STOCHFUZZ Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic ....eng.srt
32.2 kB
IEEE Security and Privacy 2019/SensorID Sensor Calibration Fingerprinting for Smartphones.eng.srt
32.2 kB
IEEE Security and Privacy 2022/SoK Practical Foundations for Software Spectre Defenses.srt
32.2 kB
IEEE Security and Privacy 2022/DeepCASE Semi-Supervised Contextual Analysis of Security Events.srt
32.1 kB
IEEE Security and Privacy 2022/Jigsaw Efficient and Scalable Path Constraints Fuzzing.srt
32.1 kB
IEEE Security and Privacy 2022/HAMRAZ Resilient Partitioning and Replication.srt
32.1 kB
IEEE Security and Privacy 2019/Helen Maliciously Secure Coopetitive Learning for Linear Models.eng.srt
32.1 kB
IEEE Security and Privacy 2021/Compact Certificates of Collective Knowledge.eng.srt
32.1 kB
IEEE Security and Privacy 2022/COBRA Dynamic Proactive Secret Sharing for Confidential BFT Services.srt
32.1 kB
IEEE Security and Privacy 2021/Epochal Signatures for Deniable Group Chats.eng.srt
32.0 kB
IEEE Security and Privacy 2022/Four Attacks and a Proof for Telegram.srt
32.0 kB
IEEE Security and Privacy 2019/Exploiting Correcting Codes On the Effectiveness of ECC Memory Against Rowhammer Attacks.eng.srt
32.0 kB
IEEE Security and Privacy 2023/Silph A Framework for Scalable and Accurate Generation of Hybrid MPC Protocols.eng.srt
31.8 kB
IEEE Security and Privacy 2022/IronMask Versatile Verification of Masking Security.srt
31.8 kB
IEEE Security and Privacy 2019/SoK Sanitizing for Security Dokyung Song.eng.srt
31.8 kB
IEEE Security and Privacy 2023/MEGA Malleable Encryption Goes Awry.eng.srt
31.8 kB
IEEE Security and Privacy 2019/Characterizing Pixel Tracking through the Lens of Disposable Email Services.eng.srt
31.8 kB
IEEE Security and Privacy 2022/SPURT Scalable Distributed Randomness Beacon with Transparent Setup.srt
31.7 kB
IEEE Security and Privacy 2023/Private Eye On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing.eng.srt
31.7 kB
IEEE Security and Privacy 2021/High-Assurance Cryptography in the Spectre Era.eng.srt
31.6 kB
IEEE Security and Privacy 2021/Self-Supervised Euphemism Detection and Identification for Content Moderation.eng.srt
31.5 kB
IEEE Security and Privacy 2019/Measuring and Analyzing Search Engine Poisoning of Linguistic Collisions.eng.srt
31.5 kB
IEEE Security and Privacy 2022/Differentially Private Histograms in the Shuffle Model from Fake Users.srt
31.5 kB
IEEE Security and Privacy 2023/Shedding Light on Inconsistencies in Grid Cybersecurity Disconnects and Recommendations.eng.srt
31.5 kB
IEEE Security and Privacy 2019/Certified Robustness to Adversarial Examples with Differential Privacy.eng.srt
31.5 kB
IEEE Security and Privacy 2021/Zero Knowledge for Everything and Everyone Fast ZK Processor with Cached ORAM for ANSI C Programs.eng.srt
31.3 kB
IEEE Security and Privacy 2022/Augury Using Data Memory-Dependent Prefetchers to Leak Data at Rest.srt
31.3 kB
IEEE Security and Privacy 2019/Drones' Cryptanalysis - Detecting Privacy Invasion Attacks Conducted by Drone.eng.srt
31.2 kB
IEEE Security and Privacy 2021/Bookworm Game Automatic Discovery of LTE Vulnerabilities Through Documentation Analysis.eng.srt
31.1 kB
IEEE Security and Privacy 2023/SoK History is a Vast Early Warning System Auditing the Provenance of System Intrusions.eng.srt
31.1 kB
IEEE Security and Privacy 2019/Short Text, Large Effect Measuring the Impact of User Reviews on Android App Security & Privacy.eng.srt
31.0 kB
IEEE Security and Privacy 2019/Security of GPS INS based On-road Location Tracking Systems.eng.srt
30.9 kB
IEEE Security and Privacy 2021/SoK The Faults in our ASRs An Overview of Attacks against Automatic Speech Recognition and ....eng.srt
30.9 kB
IEEE Security and Privacy 2022/Model Orthogonalization Class Distance Hardening in Neural Networks for Better Security.srt
30.9 kB
IEEE Security and Privacy 2022/Practical EMV Relay Protection.srt
30.8 kB
IEEE Security and Privacy 2021/CanDID Bootstrapping Decentralized Identity from Legacy Providers.eng.srt
30.8 kB
IEEE Security and Privacy 2023/Skilled or Gullible Gender Stereotypes Related to Computer Security and Privacy.eng.srt
30.8 kB
IEEE Security and Privacy 2023/FLUTE Fast and Secure Lookup Table Evaluations.eng.srt
30.7 kB
IEEE Security and Privacy 2022/Arbitrary Modulation of Electromagnetic Noise from Unprivileged Software Impacting Emission Security.srt
30.7 kB
IEEE Security and Privacy 2019/The Code That Never Ran Modeling Attacks on Speculative Evaluation.eng.srt
30.7 kB
IEEE Security and Privacy 2023/Certifiably Robust Object Detection against Patch Hiding Attacks via Patch-agnostic Masking.eng.srt
30.6 kB
IEEE Security and Privacy 2019/Port Contention for Fun and Profit.eng.srt
30.6 kB
IEEE Security and Privacy 2019/Breaking LTE on Layer Two.eng.srt
30.6 kB
IEEE Security and Privacy 2019/Understanding the Security of ARM Debugging Features.eng.srt
30.6 kB
IEEE Security and Privacy 2023/SCAPHY Detecting Modern ICS Attacks by Correlating Behaviors in SCADA and PHYsical.eng.srt
30.6 kB
IEEE Security and Privacy 2023/OWL Compositional Verification of Security Protocols via an Information-Flow Type System.eng.srt
30.6 kB
IEEE Security and Privacy 2023/PCspooF Compromising the Safety of Time-Triggered Ethernet.eng.srt
30.5 kB
IEEE Security and Privacy 2021/Systematic Analysis of Randomization-based Protected Cache Architectures.eng.srt
30.4 kB
IEEE Security and Privacy 2021/A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer.eng.srt
30.4 kB
IEEE Security and Privacy 2022/A Secret-Free Hypervisor Rethinking Isolation in the Age of Speculative Vulnerabilities.srt
30.4 kB
IEEE Security and Privacy 2015/Connection-Oriented DNS to Improve Privacy and Security.eng.srt
30.3 kB
IEEE Security and Privacy 2022/Surakav Generating Realistic Traces for a Strong Website Fingerprinting Defense.srt
30.3 kB
IEEE Security and Privacy 2019/SoK Security Evaluation of Home Based IoT Deployment.eng.srt
30.2 kB
IEEE Security and Privacy 2022/LinkTeller Recovering Private Edges from Graph Neural Networks via Influence Analysis.srt
30.2 kB
IEEE Security and Privacy 2023/One Key to Rule Them All Secure Group Pairing for Heterogeneous IoT Devices.eng.srt
30.2 kB
IEEE Security and Privacy 2023/Not Yet Another Digital ID Privacy-preserving Humanitarian Aid Distribution.eng.srt
30.1 kB
IEEE Security and Privacy 2019/Demystifying Hidden Privacy Settings in Mobile Apps.eng.srt
30.0 kB
IEEE Security and Privacy 2023/Multi-Round Single-Server Secure Aggregation with Applications to Private Federated Learning.eng.srt
30.0 kB
IEEE Security and Privacy 2016/Dedup Est Machina - Memory Deduplication as an Advanced Exploitation Vector.eng.srt
29.9 kB
IEEE Security and Privacy 2022/Universal 3-Dimensional Perturbations for Black-Box Attacks on Video Recognition Systems.srt
29.8 kB
IEEE Security and Privacy 2021/Many-out-of-Many Proofs and Applications to Anonymous Zether.eng.srt
29.8 kB
IEEE Security and Privacy 2022/SoK The Dual Nature of Technology in Sexual Assault.srt
29.7 kB
IEEE Security and Privacy 2019/On the Feasibility of Rerouting-Based DDoS Defenses.eng.srt
29.7 kB
IEEE Security and Privacy 2021/Electromagnetic Covert Channels Can Be Super Resilient.eng.srt
29.6 kB
IEEE Security and Privacy 2023/On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security.eng.srt
29.6 kB
IEEE Security and Privacy 2021/Using Selective Memoization to Defeat Regular Expression Denial of Service (ReDoS).eng.srt
29.6 kB
IEEE Security and Privacy 2019/Lay Down the Common Metrics Evaluating Proof of Work Consensus Protocols' Security.eng.srt
29.6 kB
IEEE Security and Privacy 2022/Security Analysis of the MLS Key Derivation.srt
29.6 kB
IEEE Security and Privacy 2023/Deep perceptual hashing algorithms with hidden dual purpose client-side scanning facial recognition.eng.srt
29.6 kB
IEEE Security and Privacy 2019/ProFuzzer On-the-fly Input Type Probing for Better Zero-day Vulnerability Discovery.eng.srt
29.5 kB
IEEE Security and Privacy 2023/Practically-Exploitable Cryptographic Vulnerabilities in Matrix.eng.srt
29.5 kB
IEEE Security and Privacy 2021/Lightweight Techniques for Private Heavy Hitters.eng.srt
29.5 kB
IEEE Security and Privacy 2021/Hear No Evil, See Kenansville Efficient and Transferable Black-Box Attacks on Automatic ....eng.srt
29.4 kB
IEEE Security and Privacy 2023/PyFET Forensically Equivalent Transformation for Python Binary Decompilation.eng.srt
29.4 kB
IEEE Security and Privacy 2021/ARBITRAR User-Guided API Misuse Detection.eng.srt
29.3 kB
IEEE Security and Privacy 2019/Touching the Untouchables Dynamic Security Analysis of the LTE Control Plane.eng.srt
29.3 kB
IEEE Security and Privacy 2023/TELEPATH A Minecraft-based Covert Communication System.eng.srt
29.3 kB
IEEE Security and Privacy 2022/Model Stealing Attacks Against Inductive Graph Neural Networks.srt
29.2 kB
IEEE Security and Privacy 2019/Razzer Finding Kernel Race Bugs through Fuzzing.eng.srt
29.2 kB
IEEE Security and Privacy 2023/Confident Monte Carlo Rigorous Analysis of Guessing Curves for Probabilistic Password Models.eng.srt
29.2 kB
IEEE Security and Privacy 2019/IEEE S&P 2019 - Opening Remarks - Program Chair.eng.srt
29.2 kB
IEEE Security and Privacy 2021/Detecting Filter List Evasion With Event-Loop-Turn Granularity JavaScript Signatures.eng.srt
29.2 kB
IEEE Security and Privacy 2023/Typing High-Speed Cryptography against Spectre v1.eng.srt
29.1 kB
IEEE Security and Privacy 2021/Good Bot, Bad Bot Characterizing Automated Browsing Activity.eng.srt
29.1 kB
IEEE Security and Privacy 2023/Breaking Security-Critical Voice Authentication.eng.srt
29.0 kB
IEEE Security and Privacy 2023/The Leaky Web Automated Discovery of Cross-Site Information Leaks in Browsers and the Web.eng.srt
29.0 kB
IEEE Security and Privacy 2019/Resident Evil Understanding Residential IP Proxy as a Dark Service.eng.srt
29.0 kB
IEEE Security and Privacy 2022/Exposed Infrastructures-Discovery, Attacks and Remediation of Insecure ICS Remote Management Devices.srt
28.9 kB
IEEE Security and Privacy 2023/WeRLman To Tackle Whale (Transactions), Go Deep (RL).eng.srt
28.8 kB
IEEE Security and Privacy 2022/Repairing DoS Vulnerability of Real-World Regexes.srt
28.7 kB
IEEE Security and Privacy 2019/Comprehensive Privacy Analysis of Deep Learning.eng.srt
28.7 kB
IEEE Security and Privacy 2022/Time-Print Authenticating USB Flash Drives with Novel Timing Fingerprints.srt
28.7 kB
IEEE Security and Privacy 2021/OSPREY Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary.eng.srt
28.7 kB
IEEE Security and Privacy 2021/They Would do Better if They Worked Together The Case of Interaction Problems Between Password ....eng.srt
28.7 kB
IEEE Security and Privacy 2023/LazyTAP On-Demand Data Minimization for Trigger-Action Applications.eng.srt
28.6 kB
IEEE Security and Privacy 2023/Adaptive Risk-Limiting Comparison Audits.eng.srt
28.6 kB
IEEE Security and Privacy 2022/Attacks on Wireless Coexistence.srt
28.6 kB
IEEE Security and Privacy 2022/SMILE Secure Memory Introspection for Live Enclave.srt
28.6 kB
IEEE Security and Privacy 2015/Securing Multiparty Online Services Via Certification of Symbolic Transactions.eng.srt
28.5 kB
IEEE Security and Privacy 2021/SoK Quantifying Cyber Risk.eng.srt
28.5 kB
IEEE Security and Privacy 2022/Analyzing Ground-Truth Data of Mobile Gambling Scam.srt
28.5 kB
IEEE Security and Privacy 2021/Security of Multi-Sensor Fusion based Perception in Autonomous Driving Under Physical-World Attacks.eng.srt
28.5 kB
IEEE Security and Privacy 2022/Are We There Yet Timing and Floating-Point Attacks on Differential Privacy Systems.srt
28.5 kB
IEEE Security and Privacy 2022/GREBE Unveiling Exploitation Potential for Linux Kernel Bugs.srt
28.5 kB
IEEE Security and Privacy 2019/On the Security of Two-Round Multi-Signatures.eng.srt
28.4 kB
IEEE Security and Privacy 2023/Leveraging Sandboxes for a Minimally Invasive Browser Fingerprinting Defense.eng.srt
28.4 kB
IEEE Security and Privacy 2023/DVFS Frequently Leaks Secrets Hertzbleed Attacks Beyond SIKE, Cryptography, and CPU-Only Data.eng.srt
28.3 kB
IEEE Security and Privacy 2023/IPvSeeYou Exploiting Leaked Identifiers in IPv6 for Street-Level Geolocation.eng.srt
28.3 kB
IEEE Security and Privacy 2021/A Secure and Formally Verified Linux KVM Hypervisor.eng.srt
28.3 kB
IEEE Security and Privacy 2023/Collaborative Ad Transparency Promises and Limitations.eng.srt
28.3 kB
IEEE Security and Privacy 2023/SPHINCSC Compressing SPHINCS With (Almost) No Cost.eng.srt
28.2 kB
IEEE Security and Privacy 2023/Rethinking Searchable Symmetric Encryption.eng.srt
28.2 kB
IEEE Security and Privacy 2021/Proof-of-Learning Definitions and Practice.eng.srt
28.1 kB
IEEE Security and Privacy 2021/The EMV Standard Break, Fix, Verify.eng.srt
28.1 kB
IEEE Security and Privacy 2021/NTFUZZ Enabling Type-Aware Kernel Fuzzing on Windows with Static Binary Analysis.eng.srt
28.1 kB
IEEE Security and Privacy 2021/Which Privacy and Security Attributes Most Impact Consumers' Risk Perception and Willingness to ....eng.srt
28.1 kB
IEEE Security and Privacy 2021/PLATYPUS Software-based Power Side-Channel Attacks on x86.eng.srt
28.1 kB
IEEE Security and Privacy 2023/Practical Timing Side-Channel Attacks on Memory Compression.eng.srt
28.0 kB
IEEE Security and Privacy 2023/When and Why Do People Want Ad Targeting Explanations Evidence from a Mixed-Methods Field Study.eng.srt
28.0 kB
IEEE Security and Privacy 2022/Committed to Trust A Qualitative Study on Security & Trust in Open Source Software Projects.srt
28.0 kB
IEEE Security and Privacy 2023/No Privacy in the Electronics Repair Industry.eng.srt
27.9 kB
IEEE Security and Privacy 2021/Method Confusion Attack on the Bluetooth Pairing Process.eng.srt
27.9 kB
IEEE Security and Privacy 2021/DP-Sniper Black-Box Discovery of Differential Privacy Violations using Classifiers.eng.srt
27.8 kB
IEEE Security and Privacy 2022/DeepCoFFEA Improved Flow Correlation Attacks on Tor via Metric Learning and Amplification.srt
27.8 kB
IEEE Security and Privacy 2021/Cross-Domain Access Control Encryption - Arbitrary-policy, Constant-size, Efficient.eng.srt
27.8 kB
IEEE Security and Privacy 2023/Bitcoin-Enhanced Proof-of-Stake Security Possibilities and Impossibilities.eng.srt
27.8 kB
IEEE Security and Privacy 2023/From 5G Sniffing to Harvesting Leakages of Privacy-Preserving Messengers.eng.srt
27.7 kB
IEEE Security and Privacy 2019/Bitcoin vs. Bitcoin Cash Coexistence or Downfall of Bitcoin Cash.eng.srt
27.7 kB
IEEE Security and Privacy 2022/SIRAJ A Unified Framework for Aggregation of Malicious Entity Detectors.srt
27.7 kB
IEEE Security and Privacy 2023/On the (In)security of Peer-to-Peer Decentralized Machine Learning.eng.srt
27.6 kB
IEEE Security and Privacy 2023/Deepfake Text Detection Limitations and Opportunities.eng.srt
27.6 kB
IEEE Security and Privacy 2021/Wolverine Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and ....eng.srt
27.6 kB
IEEE Security and Privacy 2019/Dangerous Skills Understanding and Mitigating Security Risks of Voice-Controlled Third-Party....eng.srt
27.6 kB
IEEE Security and Privacy 2023/Understanding the Security and Privacy Attitudes of Smart Home Users on Reddit.eng.srt
27.5 kB
IEEE Security and Privacy 2019/F-BLEAU Fast Black-box Leakage Estimation.eng.srt
27.5 kB
IEEE Security and Privacy 2023/GraphSPD Graph-Based Security Patch Detection with Enriched Code Semantics.eng.srt
27.4 kB
IEEE Security and Privacy 2023/It’s (DOM) Clobbering Time Attack Techniques, Prevalence, and Defenses.eng.srt
27.4 kB
IEEE Security and Privacy 2023/SNAP Efficient Extraction of Private Properties with Poisoning.eng.srt
27.4 kB
IEEE Security and Privacy 2023/Detection of Inconsistencies in Privacy Practices of Browser Extensions.eng.srt
27.4 kB
IEEE Security and Privacy 2023/Always Contribute Back A Qualitative Study on Security Challenges of the Open Source Supply Chain.eng.srt
27.4 kB
IEEE Security and Privacy 2021/Ebb-and-Flow Protocols A Resolution of the Availability-Finality Dilemma.eng.srt
27.3 kB
IEEE Security and Privacy 2019/SoK The Challenges Pitfalls and Perils of Using Hardware Performance Counters for Security.eng.srt
27.3 kB
IEEE Security and Privacy 2021/Merkle2 A Low-Latency Transparency Log System.eng.srt
27.3 kB
IEEE Security and Privacy 2023/Characterizing Everyday Misuse of Smart Home Devices.eng.srt
27.3 kB
IEEE Security and Privacy 2019/Fuzzing File Systems via Two-Dimensional Input Space Exploration.eng.srt
27.3 kB
IEEE Security and Privacy 2023/REGA Scalable Rowhammer Mitigation with Refresh-Generating Activations.eng.srt
27.3 kB
IEEE Security and Privacy 2023/User Perceptions and Experiences with Smart Home Updates.eng.srt
27.2 kB
IEEE Security and Privacy 2021/On the Anonymity Guarantees of Anonymous Proof-of-Stake Protocols.eng.srt
27.2 kB
IEEE Security and Privacy 2023/A Theory to Instruct Differentially-Private Learning via Clipping Bias Reduction.eng.srt
27.2 kB
IEEE Security and Privacy 2021/An Interactive Prover for Protocol Verification in the Computational Model.eng.srt
27.1 kB
IEEE Security and Privacy 2023/SoK Distributed Randomness Beacons.eng.srt
27.1 kB
IEEE Security and Privacy 2023/Improving Developers' Understanding of Regex Denial of Service Tools.eng.srt
27.1 kB
IEEE Security and Privacy 2021/CrossTalk Speculative Data Leaks Across Cores Are Real.eng.srt
27.0 kB
IEEE Security and Privacy 2019/An Extensive Formal Security Analysis of the OpenID Financial grade API Pedram Hosseyni.eng.srt
27.0 kB
IEEE Security and Privacy 2023/mmSpoof Resilient Spoofing of Automotive Millimeter-wave Radars using Reflect Array.eng.srt
27.0 kB
IEEE Security and Privacy 2021/Journey to the Center of the Cookie Ecosystem Unraveling Actors' Roles and Relationships.eng.srt
26.9 kB
IEEE Security and Privacy 2021/Survivalism Systematic Analysis of Malware Living-Off-The-Land.eng.srt
26.8 kB
IEEE Security and Privacy 2023/SecureCells A Secure Compartmentalized Architecture.eng.srt
26.7 kB
IEEE Security and Privacy 2023/Less Is More Refinement Proofs for Probabilistic Proofs.eng.srt
26.7 kB
IEEE Security and Privacy 2021/SoK Security and Privacy in the Age of Commercial Drones.eng.srt
26.7 kB
IEEE Security and Privacy 2022/Quantifying Blockchain Extractable Value How dark is the forest.srt
26.6 kB
IEEE Security and Privacy 2021/DIANE Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices.eng.srt
26.5 kB
IEEE Security and Privacy 2023/RuleKeeper GDPR-Aware Personal Data Compliance for Web Frameworks.eng.srt
26.5 kB
IEEE Security and Privacy 2023/SoK Let the Privacy Games Begin A Unified Treatment of Data Inference Privacy in Machine Learning.eng.srt
26.5 kB
IEEE Security and Privacy 2021/CryptGPU Fast Privacy-Preserving Machine Learning on the GPU.eng.srt
26.5 kB
IEEE Security and Privacy 2023/TrojanModel A Practical Trojan Attack against Automatic Speech Recognition Systems.eng.srt
26.4 kB
IEEE Security and Privacy 2021/Black Widow Blackbox Data-driven Web Scanning.eng.srt
26.4 kB
IEEE Security and Privacy 2023/High-Order Masking of Lattice Signatures in Quasilinear Time.eng.srt
26.4 kB
IEEE Security and Privacy 2023/BLEDiff Scalable and Property-Agnostic Noncompliance Checking for BLE Implementations.eng.srt
26.4 kB
IEEE Security and Privacy 2023/Inducing Wireless Chargers to Voice Out for Inaudible Command Attacks.eng.srt
26.4 kB
IEEE Security and Privacy 2023/Disassembling ARM Binaries by Lightweight Superset Instruction Interpretation and Graph Modeling.eng.srt
26.3 kB
IEEE Security and Privacy 2019/Why Does Your Data Leak Uncovering the Data Leakage in Cloud from Mobile Apps.eng.srt
26.3 kB
IEEE Security and Privacy 2023/SoK Anti-Facial Recognition Technology.eng.srt
26.3 kB
IEEE Security and Privacy 2021/Happer Unpacking Android Apps via a Hardware-Assisted Approach.eng.srt
26.3 kB
IEEE Security and Privacy 2023/A Security RISC Microarchitectural Attacks on Hardware RISC-V CPUs.eng.srt
26.3 kB
IEEE Security and Privacy 2023/Threshold Signatures in the Multiverse.eng.srt
26.3 kB
IEEE Security and Privacy 2023/Perceptions of Distributed Ledger Technology Key Management-Interviews with Finance Professionals.eng.srt
26.3 kB
IEEE Security and Privacy 2023/TeSec Accurate Server-side Attack Investigation for Web Applications.eng.srt
26.3 kB
IEEE Security and Privacy 2021/Revealer Detecting and Exploiting Regular Expression Denial-of-Service Vulnerabilities.eng.srt
26.3 kB
IEEE Security and Privacy 2022/SoK Demystifying Binary Lifters Through the Lens of Downstream Applications.srt
26.2 kB
IEEE Security and Privacy 2022/Timing-Based Browsing Privacy Vulnerabilities Via Site Isolation.srt
26.2 kB
IEEE Security and Privacy 2016/Opening Remarks of the 2016 IEEE Symposium on Security & Privacy.eng.srt
26.2 kB
IEEE Security and Privacy 2023/Characterizing the Limits of POV Acoustic Eavesdropping from Smartphone Cameras.eng.srt
26.1 kB
IEEE Security and Privacy 2023/Private Access Control for Function Secret Sharing.eng.srt
26.1 kB
IEEE Security and Privacy 2021/Breaking the Specification Certified PDF.eng.srt
26.1 kB
IEEE Security and Privacy 2019/KHyperLogLog Estimating Reidentifiability and Joinability of Large Data at Scale Pern Hui Chia.eng.srt
26.0 kB
IEEE Security and Privacy 2023/Disguising Attacks with Explanation-Aware Backdoors.eng.srt
25.9 kB
IEEE Security and Privacy 2023/Design and Evaluation of Inclusive Email Security Indicators for People with Visual Impairments.eng.srt
25.9 kB
IEEE Security and Privacy 2023/Scatter and Split Securely Defeating Cache Contention and Occupancy Attacks.eng.srt
25.8 kB
IEEE Security and Privacy 2023/ImU Physical Impersonating Attack for Face Recognition System with Natural Style Changes.eng.srt
25.8 kB
IEEE Security and Privacy 2021/High-Frequency Trading on Decentralized On-Chain Exchanges.eng.srt
25.8 kB
IEEE Security and Privacy 2023/Sound Verification of Security Protocols From Design to Interoperable Implementations.eng.srt
25.7 kB
IEEE Security and Privacy 2021/A Novel Dynamic Analysis Infrastructure to Instrument Untrusted Execution Flow Across User-Kernel....eng.srt
25.7 kB
IEEE Security and Privacy 2023/Jigsaw Puzzle Selective Backdoor Attack to Subvert Malware Classifiers.eng.srt
25.5 kB
IEEE Security and Privacy 2023/SyzDescribe Principled, Automated, Static Generation of Syscall Descriptions for Kernel Drivers.eng.srt
25.4 kB
IEEE Security and Privacy 2023/Precise Detection of Kernel Data Races with Probabilistic Lockset Analysis.eng.srt
25.4 kB
IEEE Security and Privacy 2023/Uncovering User Interactions on Smartphones via Contactless Wireless Charging Side Channels.eng.srt
25.4 kB
IEEE Security and Privacy 2023/AEM Facilitating Cross-Version Exploitability Assessment of Linux Kernel Vulnerabilities.eng.srt
25.3 kB
IEEE Security and Privacy 2023/BlindHub Bitcoin-Compatible Privacy-Preserving Payment Channel Hubs Supporting Variable Amounts.eng.srt
25.3 kB
IEEE Security and Privacy 2019/The 9 Lives of Bleichenbachers CAT New Cache ATtacks on TLS Implementations.eng.srt
25.2 kB
IEEE Security and Privacy 2023/Practical Program Modularization with Type-Based Dependence Analysis.eng.srt
25.1 kB
IEEE Security and Privacy 2022/DEPCOMM Graph Summarization on System Audit Logs for Attack Investigation.srt
25.1 kB
IEEE Security and Privacy 2019/Tap 'n Ghost A Compilation of Novel Attack Techniques against Smartphone Touchscreens.eng.srt
25.1 kB
IEEE Security and Privacy 2021/Invisible Probe Timing Attacks with PCIe Congestion Side-channel.eng.srt
25.0 kB
IEEE Security and Privacy 2023/ShadowNet A Secure and Efficient On-device Model Inference System for Convolutional Neural Networks.eng.srt
24.9 kB
IEEE Security and Privacy 2019/Exploiting Unintended Feature leakage in Collaborative Learning Congzheng Song.eng.srt
24.9 kB
IEEE Security and Privacy 2023/An Interview on the Security and Privacy Development Practices in Turkish Software Startups.eng.srt
24.9 kB
IEEE Security and Privacy 2021/A First Look at Zoombombing.eng.srt
24.9 kB
IEEE Security and Privacy 2023/SoK Certified Robustness for Deep Neural Networks.eng.srt
24.9 kB
IEEE Security and Privacy 2021/Keep the Dirt Tain'ted TreeKEM, Adaptively and Actively Secure Continuous Group Key Agreement.eng.srt
24.8 kB
IEEE Security and Privacy 2023/Half&Half Demystifying Intel’s Directional Branch Predictors for Fast, Secure Partitioned Execution.eng.srt
24.8 kB
IEEE Security and Privacy 2023/MPCAuth Multi-factor Authentication for Distributed-trust Systems.eng.srt
24.8 kB
IEEE Security and Privacy 2023/EC Embedded Systems Compartmentalization via Intra-Kernel Isolation.eng.srt
24.8 kB
IEEE Security and Privacy 2023/WebSpec Towards Machine-Checked Analysis of Browser Security Mechanisms.eng.srt
24.7 kB
IEEE Security and Privacy 2019/Blind Certificate Authorities.eng.srt
24.7 kB
IEEE Security and Privacy 2023/TEEzz Fuzzing Trusted Applications on COTS Android Devices.eng.srt
24.7 kB
IEEE Security and Privacy 2023/Low-Cost Privilege Separation with Compile Time Compartmentalization for Embedded Systems.eng.srt
24.6 kB
IEEE Security and Privacy 2023/A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations.eng.srt
24.6 kB
IEEE Security and Privacy 2023/CSIRowhammer - Cryptographic Security and Integrity against Rowhammer.eng.srt
24.6 kB
IEEE Security and Privacy 2023/Beyond Phish Toward Detecting Fraudulent e-Commerce Websites at Scale.eng.srt
24.5 kB
IEEE Security and Privacy 2023/Scalable and Privacy-Preserving Federated Principal Component Analysis.eng.srt
24.4 kB
IEEE Security and Privacy 2023/LAMBRETTA Learning to Rank for Twitter Soft Moderation.eng.srt
24.3 kB
IEEE Security and Privacy 2023/On Efficient, High-Fidelity and Blind Suppression of Backdoor Effects in Trojaned ML Models.eng.srt
24.3 kB
IEEE Security and Privacy 2023/SoK Taxonomy of Attacks on Open-Source Software Supply Chains.eng.srt
24.3 kB
IEEE Security and Privacy 2023/SoK Cryptographic Neural-Network Computation.eng.srt
24.3 kB
IEEE Security and Privacy 2023/Analyzing Leakage of Personally Identifiable Information in Language Models.eng.srt
24.1 kB
IEEE Security and Privacy 2023/No One Drinks From the Firehose How Organizations Filter and Prioritize Vulnerability Information.eng.srt
24.0 kB
IEEE Security and Privacy 2021/When Function Signature Recovery Meets Compiler Optimization.eng.srt
24.0 kB
IEEE Security and Privacy 2023/Clockwork Finance Automated Analysis of Economic Security in Smart Contracts.eng.srt
23.9 kB
IEEE Security and Privacy 2023/AUC Accountable Universal Composability.eng.srt
23.9 kB
IEEE Security and Privacy 2023/VIDEZZO Dependency-aware Virtual Device Fuzzing.eng.srt
23.8 kB
IEEE Security and Privacy 2023/How IoT Re-using Threatens Your Sensitive Data Exploring the User-Data Disposal in Used IoT Devices.eng.srt
23.6 kB
IEEE Security and Privacy 2023/SelectFuzz Efficient Directed Fuzzing with Selective Path Exploration.eng.srt
23.6 kB
IEEE Security and Privacy 2021/Defensive Technology Use by Political Activists During the Sudanese Revolution.eng.srt
23.5 kB
IEEE Security and Privacy 2023/Locally Differentially Private Frequency Estimation Based on Convolution Framework.eng.srt
23.5 kB
IEEE Security and Privacy 2021/BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures.eng.srt
23.5 kB
IEEE Security and Privacy 2023/Man-in-the-Middle Attacks without Rogue AP When WPAs Meet ICMP Redirects.eng.srt
23.5 kB
IEEE Security and Privacy 2023/SoK Decentralized Finance (DeFi) Attacks.eng.srt
23.5 kB
IEEE Security and Privacy 2023/Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation.eng.srt
23.5 kB
IEEE Security and Privacy 2023/XFL Naming Functions in Binaries with Extreme Multi-label Learning.eng.srt
23.4 kB
IEEE Security and Privacy 2021/Did you mix me Formally Verifying Verifiable Mix Nets in Electronic Voting.eng.srt
23.4 kB
IEEE Security and Privacy 2023/Scaling JavaScript Abstract Interpretation to Detect and Exploit Node.js Taint-style Vulnerability.eng.srt
23.3 kB
IEEE Security and Privacy 2021/Machine unlearning.eng.srt
23.2 kB
IEEE Security and Privacy 2023/Towards a Rigorous Statistical Analysis of Empirical Password Datasets.eng.srt
23.2 kB
IEEE Security and Privacy 2019/Using Safety Properties to Generate Vulnerability Patches.eng.srt
23.0 kB
IEEE Security and Privacy 2023/Mew Enabling Large-Scale and Dynamic Link-Flooding Defenses on Programmable Switches.eng.srt
23.0 kB
IEEE Security and Privacy 2023/D-DAE Defense-Penetrating Model Extraction Attacks.eng.srt
22.9 kB
IEEE Security and Privacy 2021/Manipulation Attacks in Local Differential Privacy.eng.srt
22.9 kB
IEEE Security and Privacy 2023/Private Collaborative Data Cleaning via Non-Equi PSI.eng.srt
22.9 kB
IEEE Security and Privacy 2021/CrawlPhish Large-scale Analysis of Client-side Cloaking Techniques in Phishing.eng.srt
22.9 kB
IEEE Security and Privacy 2023/3DFed Adaptive and Extensible Framework for Covert Backdoor Attack in Federated Learning.eng.srt
22.8 kB
IEEE Security and Privacy 2023/Finding Specification Blind Spots via Fuzz Testing.eng.srt
22.8 kB
IEEE Security and Privacy 2023/Three-party Non-linear Computation without Preprocessing for Privacy-preserving Machine Learning.eng.srt
22.8 kB
IEEE Security and Privacy 2023/DevIOus Device-Driven Side-Channel Attacks on the IOMMU.eng.srt
22.8 kB
IEEE Security and Privacy 2023/QueryX Symbolic Query on Decompiled Code for Finding Bugs in COTS Binaries.eng.srt
22.7 kB
IEEE Security and Privacy 2023/Weak Fiat-Shamir Attacks on Modern Proof Systems.eng.srt
22.7 kB
IEEE Security and Privacy 2023/Attitudes towards Client-Side Scanning for CSAM, Terrorism, Drug Trafficking, Drug Use, Tax Evasion.eng.srt
22.6 kB
IEEE Security and Privacy 2019/Stealthy Porn Understanding Real World Adversarial Images for I'llicit Online Promotion.eng.srt
22.5 kB
IEEE Security and Privacy 2021/SIRNN A Math Library for Secure RNN Inference.eng.srt
22.5 kB
IEEE Security and Privacy 2022/Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms.srt
22.4 kB
IEEE Security and Privacy 2023/mmEcho A mmWave-based Acoustic Eavesdropping Method.eng.srt
22.3 kB
IEEE Security and Privacy 2021/Poltergeist Acoustic Manipulation of Image Stabilization towards Object Mis-Labeling.eng.srt
22.3 kB
IEEE Security and Privacy 2021/Fingerprinting the Fingerprinters Learning to Detect Browser Fingerprinting Behaviors.eng.srt
22.2 kB
IEEE Security and Privacy 2023/Protected or Porous A Comparative Analysis of Threat Detection Capability of IoT Safeguards.eng.srt
22.1 kB
IEEE Security and Privacy 2023/Discovering Java Deserialization Vulnerabilities via Structure-Aware Directed Greybox Fuzzing.eng.srt
22.0 kB
IEEE Security and Privacy 2023/Protecting Models Trained by Multi-party Learning with Differential Privacy.eng.srt
21.9 kB
IEEE Security and Privacy 2021/Co-Inflow Coarse-grained Information Flow Control for Java-like Languages.eng.srt
21.9 kB
IEEE Security and Privacy 2021/CacheOut Leaking Data on Intel CPUs via Cache Evictions.eng.srt
21.8 kB
IEEE Security and Privacy 2021/Cross Layer Attacks and How to Use Them (for DNS Cache Poisoning, Device Tracking and More).eng.srt
21.8 kB
IEEE Security and Privacy 2021/CANnon Reliable and Stealthy Remote Shutdown Attacks via Unaltered Automotive Microcontrollers.eng.srt
21.8 kB
IEEE Security and Privacy 2023/Low-effort VR Headset User Authentication Using Head-reverberated Sounds with Replay Resistance.eng.srt
21.8 kB
IEEE Security and Privacy 2023/DepthFake Spoofing 3D Face Authentication with a 2D Photo.eng.srt
21.8 kB
IEEE Security and Privacy 2023/WarpAttack Bypassing CFI through Compiler-Introduced Double-Fetches.eng.srt
21.4 kB
IEEE Security and Privacy 2021/Post-Quantum WireGuard.eng.srt
21.3 kB
IEEE Security and Privacy 2023/Accuracy-Privacy Trade-off in Deep Ensemble A Membership Inference Perspective.eng.srt
21.3 kB
IEEE Security and Privacy 2019/PrivKV Key Value Data Collection with Local Differential Privacy.eng.srt
21.3 kB
IEEE Security and Privacy 2021/Hardware-Software Contracts for Secure Speculation.eng.srt
21.3 kB
IEEE Security and Privacy 2021/Lockable Signatures for Blockchains Scriptless Scripts for all Signatures.eng.srt
21.2 kB
IEEE Security and Privacy 2023/UTOPIA Automatic Generation of Fuzz Driver using Unit Tests.eng.srt
21.2 kB
IEEE Security and Privacy 2022/Transfer Attacks Revisited A Large-Scale Empirical Study in Real Computer Vision Settings.srt
21.1 kB
IEEE Security and Privacy 2023/Tyr Finding Consensus Failure Bugs in Blockchain System with Behaviour Divergent Model.eng.srt
21.1 kB
IEEE Security and Privacy 2023/Jolt Recovering TLS Signing Keys via Rowhammer Faults.eng.srt
21.0 kB
IEEE Security and Privacy 2023/A Generic, Efficient, and Effortless Solver with Self-Supervised Learning for Breaking Text Captchas.eng.srt
20.9 kB
IEEE Security and Privacy 2021/MAD-HTLC Because HTLC is Crazy-Cheap to Attack.eng.srt
20.9 kB
IEEE Security and Privacy 2021/On the Just-In-Time Discovery of Profit-Generating Transactions in DeFi Protocols.eng.srt
20.8 kB
IEEE Security and Privacy 2021/Bomberman Defining and Defeating Hardware Ticking Timebombs at Design-time.eng.srt
20.8 kB
IEEE Security and Privacy 2019/IEEE S&P 2019 - Opening Remarks - General Chair.eng.srt
20.7 kB
IEEE Security and Privacy 2021/Pegasus Bridging Polynomial and Non-polynomial Evaluations in Homomorphic Encryption.eng.srt
20.7 kB
IEEE Security and Privacy 2023/Volttack Control IoT Devices by Manipulating Power Supply Voltage.eng.srt
20.6 kB
IEEE Security and Privacy 2021/CRYLOGGER Detecting Crypto Misuses Dynamically.eng.srt
20.6 kB
IEEE Security and Privacy 2023/FIDO2, CTAP 2.1, and WebAuthn 2 Provable Security and Post-Quantum Instantiation.eng.srt
20.4 kB
IEEE Security and Privacy 2023/REDEEM MYSELF Purifying Backdoors in Deep Learning Models using Self Attention Distillation.eng.srt
20.4 kB
IEEE Security and Privacy 2023/FedRecover Recovering from Poisoning Attacks in Federated Learning using Historical Information.eng.srt
20.3 kB
IEEE Security and Privacy 2021/Proactive Threshold Wallets with Offline Devices.eng.srt
20.2 kB
IEEE Security and Privacy 2023/PublicCheck Public Integrity Verification for Services of Run-time Deep Models.eng.srt
20.0 kB
IEEE Security and Privacy 2021/Reading Between the Lines An Extensive Evaluation of the Security and Privacy Implications ....eng.srt
19.8 kB
IEEE Security and Privacy 2022/MeshUp Stateless Cache Side-channel Attack on CPU Mesh.srt
19.7 kB
IEEE Security and Privacy 2023/Continual Observation under User-level Differential Privacy.eng.srt
19.7 kB
IEEE Security and Privacy 2023/DeHiREC Detecting Hidden Voice Recorders via ADC Electromagnetic Radiation.eng.srt
19.7 kB
IEEE Security and Privacy 2021/Randomized Last-Level Caches Are Still Vulnerable to Cache Side-Channel Attacks But We Can Fix It.eng.srt
19.4 kB
IEEE Security and Privacy 2021/Runtime Recovery of Web Applications under Zero-Day ReDoS Attacks.eng.srt
19.3 kB
IEEE Security and Privacy 2021/SGUARD Smart Contracts Made Vulnerability-Free.eng.srt
19.0 kB
IEEE Security and Privacy 2021/Compositional Security for Reentrant Applications.eng.srt
18.8 kB
IEEE Security and Privacy 2021/Compositional Non-Interference for Fine-Grained Concurrent Programs.eng.srt
18.8 kB
IEEE Security and Privacy 2021/Detecting AI Trojans Using Meta Neural Analysis.eng.srt
18.7 kB
IEEE Security and Privacy 2023/PLA-LiDAR Physical Laser Attacks against LiDAR-based 3D Object Detection in Autonomous Vehicle.eng.srt
18.7 kB
IEEE Security and Privacy 2023/SQUIP Exploiting the Scheduler Queue Contention Side Channel.eng.srt
18.6 kB
IEEE Security and Privacy 2021/Trouble Over-The-Air An Analysis of FOTA Apps in the Android Ecosystem.eng.srt
18.5 kB
IEEE Security and Privacy 2023/Limits of I O Based Ransomware Detection An Imitation Based Attack.eng.srt
18.2 kB
IEEE Security and Privacy 2023/Understanding the (In)Security of Cross-side Face Verification Systems in Mobile Apps.eng.srt
18.2 kB
IEEE Security and Privacy 2023/MagBackdoor Beware of Your Loudspeaker as A Backdoor For Magnetic Injection Attacks.eng.srt
17.9 kB
IEEE Security and Privacy 2023/On The Empirical Effectiveness of Unrealistic Adversarial Hardening Against Realistic Attacks.eng.srt
17.8 kB
IEEE Security and Privacy 2021/ConDySTA Context-Aware Dynamic Supplement to Static Tain't Analysis.eng.srt
17.4 kB
IEEE Security and Privacy 2023/Investigating Package Related Security Threats in Software Registries.eng.srt
17.3 kB
IEEE Security and Privacy 2021/How Did That Get In My Phone Unwanted App Distribution on Android Devices.eng.srt
17.3 kB
IEEE Security and Privacy 2021/Real-World Snapshots vs. Theory Questioning the t-Probing Security Model..eng.srt
17.3 kB
IEEE Security and Privacy 2023/On the Evolution of (Hateful) Memes by Means of Multimodal Contrastive Learning.eng.srt
17.3 kB
IEEE Security and Privacy 2021/Linking Bluetooth LE & Classic and Implications for Privacy-Preserving Bluetooth-Based Protocols.eng.srt
16.8 kB
IEEE Security and Privacy 2021/Data Privacy in Trigger-Action IoT Systems.eng.srt
16.3 kB
IEEE Security and Privacy 2021/SoK All You Ever Wanted to Know About Binary Disassembly But Were Afraid to Ask.eng.srt
16.3 kB
IEEE Security and Privacy 2023/Continuous Intrusion Characterizing the Security of Continuous Integration Services.eng.srt
16.2 kB
IEEE Security and Privacy 2021/Who is Real Bob Adversarial Attacks on Speaker Recognition Systems.eng.srt
16.0 kB
IEEE Security and Privacy 2021/One Engine to Fuzz 'em All Generic Language Processor Testing with Semantic Validation.eng.srt
15.0 kB
IEEE Security and Privacy 2023/Leaking Arbitrarily Many Secrets Any-out-of-Many Proofs and Applications to RingCT Protocols.eng.srt
14.8 kB
IEEE Security and Privacy 2021/DIFUZZRTL Differential Fuzz Testing to Find CPU Bugs.eng.srt
14.8 kB
IEEE Security and Privacy 2021/An I O Separation Model for Formal Verification of Kernel Implementations.eng.srt
14.7 kB
IEEE Security and Privacy 2015/Opening Remarks of the 2015 IEEE Symposium on Security & Privacy.eng.srt
14.4 kB
IEEE Security and Privacy 2021/Ed25519 Signature Schemes Theory and Practice.eng.srt
12.9 kB
IEEE Security and Privacy 2021/DICE Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis.eng.srt
12.4 kB
IEEE Security and Privacy 2021/Red Belly a Deterministic Scalable Open Permissioned Blockchain.eng.srt
10.4 kB
IEEE Security and Privacy 2019/IEEE S&P 2019 - Awards Ceremony.eng.srt
10.3 kB
IEEE logo.jpg
8.5 kB
IEEE Security and Privacy thank you.txt
1.0 kB
随机展示
相关说明
本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!
>