搜索
USENIX Security
磁力链接/BT种子名称
USENIX Security
磁力链接/BT种子简介
种子哈希:
a837c7d3691a4e98291f67dcc999d7e06b259f9c
文件大小:
26.63G
已经下载:
175
次
下载速度:
极快
收录时间:
2022-05-06
最近下载:
2025-06-10
移花宫入口
移花宫.com
邀月.com
怜星.com
花无缺.com
yhgbt.icu
yhgbt.top
磁力链接下载
magnet:?xt=urn:btih:A837C7D3691A4E98291F67DCC999D7E06B259F9C
推荐使用
PIKPAK网盘
下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看
下载BT种子文件
磁力链接
迅雷下载
PIKPAK在线播放
世界之窗
91视频
含羞草
欲漫涩
逼哩逼哩
成人快手
51品茶
抖阴破解版
极乐禁地
91短视频
TikTok成人版
PornHub
草榴社区
91未成年
乱伦巴士
呦乐园
萝莉岛
最近搜索
台湾 拉拉队
言哥
各种插入
体育生
贵在真 实中年夫妻脱光了操逼还给毒龙无套内
清纯系学生妹妹
酒疯
约了
【爱欲随风起】
亲爸
ibm ai
贾宝玉秦可卿
行 玫瑰
忽悠套路
美少女流出
大奶 丰满
小手
会爱
明星淫梦
ゆずちゃん
随后下药
cp-001
绿帽夫妻雷林xxx
b站流出
僕の教師
舞蹈更衣间
kou
cubase
巨乳学霸
东北美少妇
文件列表
USENIX Security 2020/sec20__full_proceedings.pdf
280.8 MB
USENIX Security 2020/sec20_full_proceedings_interior.pdf
279.5 MB
USENIX Security 2019/USENIX Security 2019 Full Proceedings.pdf
210.5 MB
USENIX Security 2019/USENIX Security 2019 Full Proceedings interior.pdf
209.7 MB
USENIX Security 2020/USENIX Security 2020 Panels/USENIX Security 20 - Panel Digital Contact Tracing.mp4
183.0 MB
USENIX Security 2018/USENIX Security 2018 Full Proceedings.mobi
155.2 MB
USENIX Security 2019/USENIX Security 2019 Video/Security Educational Panel.mp4
146.5 MB
USENIX Security 2020/USENIX Security 2020 Panels/USENIX Security 20 - Panel The 2020 Election Remote Voting, Disinformation, and Audit.mp4
125.7 MB
USENIX Security 2017/USENIX Security 2017 Full Proceedings.pdf
121.2 MB
USENIX Security 2017/USENIX Security 2017 Full Proceedings Interior.pdf
120.9 MB
USENIX Security 2017/USENIX Security 2017 Full Proceedings.mobi
118.5 MB
USENIX Security 2018/USENIX Security 2018 Full Proceedings.pdf
108.5 MB
USENIX Security 2018/USENIX Security 2018 Full Proceedings Interior.pdf
107.3 MB
USENIX Security 2020/USENIX Security 2020 Videos/Panel Digital Contact Tracing.mp4
107.3 MB
USENIX Security 2016/USENIX Security 2016 Videos/Security Competitions.mp4
105.2 MB
USENIX Security 2015/USENIX Security 2015 Videos/Conducting Usable Security Studies - It s Complicated.mp4
101.2 MB
USENIX Security 2010/USENIX Security 2010 Videos/Vulnerable Compliance - Dan Geer.mp4
99.3 MB
USENIX Security 2016/USENIX Security 2016 Videos/The Moral Character of Cryptographic Work.mp4
96.6 MB
USENIX Security 2013/USENIX Security 2013 Videos/The White House's Priorities for Cybersecurity - Andy Ozment.mp4
96.0 MB
USENIX Security 2011/USENIX Security 2011 Videos/Deport on Arrival Adventures in Technology, Politics, and Power - J. Alex Halderman.mp4
95.4 MB
USENIX Security 2014/USENIX Security 2014 Videos/The Future of Crypto Getting from Here to Guarantees - Daniel J. Bernstein, Matt Blaze, Tanja Lange.mp4
95.3 MB
USENIX Security 2016/USENIX Security 2016 Videos/When Governments Attack Malware Targeting Activists, Lawyers, and Journalists.mp4
93.3 MB
USENIX Security 2009/USENIX Security 2009 Videos/Toward a New Legal Framework for Cybersecurity - Deirdre K. Mulligan.mp4
93.2 MB
USENIX Security 2010/USENIX Security 2010 Videos/The Evolution of the Flash Security Model - Peleus Uhley.mp4
90.7 MB
USENIX Security 2009/USENIX Security 2009 Videos/Modern Exploitation and Memory Protection Bypasses - Alexander Sotirov.mp4
90.0 MB
USENIX Security 2018/USENIX Security 2018 Full Proceedings.epub
89.9 MB
USENIX Security 2012/USENIX Security 2012 Videos/Keynote - The Evolution of Information Assurance - Dickie George.mp4
89.9 MB
USENIX Security 2015/USENIX Security 2015 Videos/Inherent Cyber Insecurity and Our National Security - Surviving on a Diet of Poisoned Fruit.mp4
89.4 MB
USENIX Security 2014/USENIX Security 2014 Videos/Battling Human Trafficking with Big Data - Rolando R. Lopez.mp4
89.1 MB
USENIX Security 2011/USENIX Security 2011 Videos/Privacy in the Age of Augmented Reality - Alessandro Acquisti.mp4
88.1 MB
USENIX Security 2016/USENIX Security 2016 Videos/Teaching Computer Security Thoughts from the Field.mp4
87.7 MB
USENIX Security 2013/USENIX Security 2013 Videos/Dr. Felten Goes To Washington - Lessons from 18 Months in Government - Edward W. Felten.mp4
85.0 MB
USENIX Security 2011/USENIX Security 2011 Videos/I'm from the Government and I'm Here to Help - Perspectives from a Privacy Tech Wonk - Tara Whalen.mp4
83.9 MB
USENIX Security 2010/USENIX Security 2010 Videos/Proving Voltaire Right Security Blunders Dumber Than Dog Snot - Roger G. Johnston.mp4
82.8 MB
USENIX Security 2008/USENIX Security 2008 Videos/Dr. Strangevote or How I Learned to Stop Worrying and Love the Paper Ballot - Debra Bowen.mp4
82.2 MB
USENIX Security 2016/USENIX Security 2016 Videos/The Unfalsifiability of Security Claims.mp4
81.0 MB
USENIX Security 2013/USENIX Security 2013 Videos/Security Team 2.0 - Chris Evans.mp4
80.9 MB
USENIX Security 2011/USENIX Security 2011 Videos/SSLTLS Certificates Threat or Menace - Eric Rescorla, Adam Langley, Brian Smith, Stephen Schultze, Steve Kent.mp4
80.6 MB
USENIX Security 2011/USENIX Security 2011 Videos/Pico No More Passwords - Frank Stajano.mp4
80.3 MB
USENIX Security 2015/USENIX Security 2015 Videos/Why Johnny and Janie Can’t Code Safely - Bringing Software Assurance to the Masses.mp4
79.3 MB
USENIX Security 2020/USENIX Security 2020 Videos/Panel The 2020 Election Remote Voting, Disinformation, and Audit.mp4
78.7 MB
USENIX Security 2009/USENIX Security 2009 Videos/Work-in-Progress Reports (WiPs) - Session Chair Sven Dietrich.mp4
78.5 MB
USENIX Security 2016/USENIX Security 2016 Videos/Making HTTPS the Default in the World's Largest Bureaucracy.mp4
77.0 MB
USENIX Security 2015/USENIX Security 2015 Videos/Preventing Security Bugs through Software Design.mp4
76.9 MB
USENIX Security 2013/USENIX Security 2013 Videos/Confessions of a Recovering Data Broker Responsible Innovation in the Age of Big Data, Big Brother, and the Coming Skynet Terminators - Jim Adler.mp4
76.3 MB
USENIX Security 2011/USENIX Security 2011 Videos/Crossing the Chasm Pitching Security Research to Mainstream Browser Vendors - Collin Jackson.mp4
75.8 MB
USENIX Security 2016/USENIX Security 2016 Videos/Crashing Drones and Hijacked Cameras CyberTrust Meets CyberPhysical.mp4
75.7 MB
USENIX Security 2015/USENIX Security 2015 Full Proceedings.mobi
74.7 MB
USENIX Security 2011/USENIX Security 2011 Videos/The Three Cyber-War Fallacies - Dave Aitel.mp4
73.6 MB
USENIX Security 2010/USENIX Security 2010 Videos/Docile No More The Tussle to Redefine the Internet - James Lewis.mp4
73.1 MB
USENIX Security 2010/USENIX Security 2010 Videos/Toward an Open and Secure Platform for Using the Web - Will Drewry.mp4
72.9 MB
USENIX Security 2010/USENIX Security 2010 Videos/Windows 7 Security from a UNIX Perspective - Crispin Cowan.mp4
72.7 MB
USENIX Security 2009/USENIX Security 2009 Videos/Android Securing a Mobile Platform from the Ground Up - Rich Cannings.mp4
71.5 MB
USENIX Security 2012/USENIX Security 2012 Videos/Cyber Security Education in a Time of Change - Cynthia E. Irvine.mp4
71.2 MB
USENIX Security 2009/USENIX Security 2009 Videos/Baggy Bounds Checking An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors - Periklis Akritidis, Manuel Costa, Miguel Castro, Steven Hand.mp4
70.5 MB
USENIX Security 2014/USENIX Security 2014 Videos/Information Security War Room - Sergey Bratus, Dartmouth College, Felix FX Lindner.mp4
69.7 MB
USENIX Security 2016/USENIX Security 2016 Videos/Privacy and Threat in Practice Mobile Messaging by Low-Income New Yorkers.mp4
69.7 MB
USENIX Security 2016/USENIX Security 2016 Full Proceedings.epub
68.1 MB
USENIX Security 2010/USENIX Security 2010 Videos/Grid, PhD Smart Grid, Cyber Security, and the Future of Keeping the Lights On - Kelly Ziegler.mp4
67.2 MB
USENIX Security 2009/USENIX Security 2009 Videos/Hash Functions and Their Many Uses in Cryptography - Shai Halevi.mp4
65.1 MB
USENIX Security 2012/USENIX Security 2012 Videos/Life as a Target-Welcome to the Club - Dickie George.mp4
64.5 MB
USENIX Security 2017/USENIX Security 2017 Full Proceedings.epub
62.5 MB
USENIX Security 2013/USENIX Security 2013 Videos/Building Securable Infrastructure Open-Source Private Clouds - Pravir Chandra.mp4
62.3 MB
USENIX Security 2016/USENIX Security 2016 Videos/AMD x86 Memory Encryption Technologies.mp4
59.8 MB
USENIX Security 2019/USENIX Security 2019 Video/Security Research and Public Policy.mp4
59.7 MB
USENIX Security 2017/USENIX Security 2017 Videos/Data Hemorrhage, Inequality, and You.mp4
59.4 MB
USENIX Security 2011/USENIX Security 2011 Videos/Network Security in the Medium Term 2061-2561 AD - Charles Stross.mp4
59.2 MB
USENIX Security 2010/USENIX Security 2010 Videos/Network Security in the Medium Term 2061-2561 AD - stross.mp4
59.2 MB
USENIX Security 2019/USENIX Security 2019 Video/Baby Steps towards the Precipice How the Web Became a Scary.mp4
58.3 MB
USENIX Security 2019/USENIX Security 2019 Video/Tackling the Trust and Safety Crisis.mp4
57.6 MB
USENIX Security 2016/USENIX Security 2016 Videos/Finding and Fixing Security Bugs in Flash.mp4
57.3 MB
USENIX Security 2016/USENIX Security 2016 Videos/2016 Test of Time Award Panel.mp4
57.1 MB
USENIX Security 2009/USENIX Security 2009 Videos/Top Ten Web Hacking Techniques of 2008 What's possible, not probable - Jeremiah Grossman.mp4
56.8 MB
USENIX Security 2013/USENIX Security 2013 Proceedings.epub
56.1 MB
USENIX Security 2015/USENIX Security 2015 Full Proceedings.epub
55.5 MB
USENIX Security 2019/USENIX Security 2019 Video/The Spies Hacking our Phones are Going Dark, and We're All in Trouble.mp4
54.7 MB
USENIX Security 2018/USENIX Security 2018 Videos/Q - Why Do Keynote Speakers Keep Suggesting That Improving Security Is Possible.mp4
54.3 MB
USENIX Security 2019/USENIX Security 2019 Video/From Privacy by Design to Data Protection by Design The Challenges of.mp4
53.3 MB
USENIX Security 2012/USENIX Security 2012 Videos/Emerging Trends and Their Security Implications - Doug Burger.mp4
52.9 MB
USENIX Security 2021/People Count Contact Tracing Apps and Public Health.mp4
52.6 MB
USENIX Security 2013/USENIX Security 2013 Videos/Tracking the Casino Computer Wars Who’s Winning - the Casino or the Cheat - Richard Marcus.mp4
52.5 MB
USENIX Security 2017/USENIX Security 2017 Videos/When Your Threat Model Is - Everything - Defensive Security in Modern Newsrooms.mp4
51.2 MB
USENIX Security 2016/USENIX Security 2016 Videos/Report from the Field A CDN's Role in Repelling Attacks against Banking.mp4
50.0 MB
USENIX Security 2014/USENIX Security 2014 Videos/USENIX SECURITY 2014 Keynote - Phone Phreaks What We Can Learn From the First Network Hackers - Phil Lapsely.mp4
49.9 MB
USENIX Security 2012/USENIX Security 2012 Videos/Nature is a Language Can't You Read - Meredith L. Patterson.mp4
49.7 MB
USENIX Security 2019/USENIX Security 2019 Video/Shining Light on Internet-based Crimes Against Children.mp4
48.7 MB
USENIX Security 2018/USENIX Security 2018 Videos/The Law and Economics of Bug Bounties.mp4
48.1 MB
USENIX Security 2016/USENIX Security 2016 Full Proceedings.pdf
46.1 MB
USENIX Security 2016/USENIX Security 2016 Full Proceedings.mobi
45.7 MB
USENIX Security 2016/USENIX Security 2016 Full Proceedings Interior.pdf
45.0 MB
USENIX Security 2018/USENIX Security 2018 Videos/Analogy Cyber Security-From 0101 to Mixed Signals.mp4
45.0 MB
USENIX Security 2019/USENIX Security 2019 Video/Embracing the - Hack. - A Better Strategy for Team-Defense.mp4
44.9 MB
USENIX Security 2018/USENIX Security 2018 Videos/Chipmunk or Pepe Using Acoustical Analysis to Detect Voice-Channel Fraud at Scale.mp4
44.8 MB
USENIX Security 2019/USENIX Security 2019 Video/Evaluating Mobile Messengers for Implementation Vulnerabilities.mp4
44.6 MB
USENIX Security 2018/USENIX Security 2018 Videos/Solving the Next Billion-People Privacy Problem.mp4
44.5 MB
USENIX Security 2017/USENIX Security 2017 Videos/How the Web Tangled Itself.mp4
44.3 MB
USENIX Security 2018/USENIX Security 2018 Videos/Medical Device Cybersecurity through the FDA Lens.mp4
42.9 MB
USENIX Security 2017/USENIX Security 2017 Videos/OSS-Fuzz - Google's continuous fuzzing service for open source software.mp4
42.8 MB
USENIX Security 2019/USENIX Security 2019 Video/Lessons Learned About Building Secure Software It's About the Developers.mp4
42.2 MB
USENIX Security 2014/USENIX Security 2014 Full Proceedings.pdf
41.9 MB
USENIX Security 2014/USENIX Security 2014 Full Proceedings Interrior.pdf
41.1 MB
USENIX Security 2013/USENIX Security 2013 Videos/Windows 8 Security - Supporting User Confidence - Crispin Cowan.mp4
40.9 MB
USENIX Security 2013/USENIX Security 2013 Videos/Windows 8 Security Supporting User Confidence - Crispin Cowan.mp4
40.6 MB
USENIX Security 2011/USENIX Security 2011 Videos/The Cloud-y Future of Security Technologies - Adam O'Donnell.mp4
40.5 MB
USENIX Security 2019/USENIX Security 2019 Video/Lessons Learned from Evaluating the Robustness of Defenses to.mp4
39.5 MB
USENIX Security 2018/USENIX Security 2018 Videos/Privacy for Tigers.mp4
37.6 MB
USENIX Security 2016/USENIX Security 2016 Videos/fTPM A Software-Only Implementation of a TPM Chip.mp4
37.5 MB
USENIX Security 2018/USENIX Security 2018 Videos/The Second Crypto War-What's Different Now.mp4
37.4 MB
USENIX Security 2017/USENIX Security 2017 Videos/Game of Registrars.mp4
37.3 MB
USENIX Security 2007/Presentations/The Human Factor in Online Fraud - Markus Jakobsson.pdf
36.9 MB
USENIX Security 2015/USENIX Security 2015 Full Proceedings.pdf
35.8 MB
USENIX Security 2015/USENIX Security 2015 Presentations/sec15_full_proceedings.pdf
35.7 MB
USENIX Security 2015/USENIX Security 2015 Full Proceedings Interior.pdf
35.5 MB
USENIX Security 2015/USENIX Security 2015 Presentations/sec15_full_proceedings_interior.pdf
35.5 MB
USENIX Security 2010/USENIX Security 2010 Videos/Making Linux Protection Mechanisms Egalitarian with UserFS - Taesoo Kim, Nickolai Zeldovich.mp4
35.4 MB
USENIX Security 2017/USENIX Security 2017 Videos/Malton - Towards On-Device Non-Invasive Mobile Malware Analysis for ART.mp4
35.2 MB
USENIX Security 2012/USENIX Security 2012 Presentations/TARDIS Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without Clocks Slides - Amir Rahmati, Mastooreh Salajegheh, Dan Holcomb, Jacob Sorber, W.pdf
35.1 MB
USENIX Security 2017/USENIX Security 2017 Videos/Measuring the Insecurity of Mobile Deep Links of Android.mp4
35.0 MB
USENIX Security 2012/USENIX Security 2012 Videos/On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces - Ivan Martinovic, Doug Davies, Mario Frank, Daniele Perito, Tomas Ros, Dawn Song.mp4
34.5 MB
USENIX Security 2017/USENIX Security 2017 Videos/ROTE - Rollback Protection for Trusted Execution.mp4
34.5 MB
USENIX Security 2010/USENIX Security 2010 Videos/Baaz A System for Detecting Access Control Misconfigurations - Tathagata Das, Ranjita Bhagwan, Prasad Naldurg.mp4
34.4 MB
USENIX Security 2017/USENIX Security 2017 Videos/Hacking in Darkness - Return-oriented Programming against Secure Enclaves.mp4
34.3 MB
USENIX Security 2018/USENIX Security 2018 Videos/BlackIoT - IoT Botnet of High Wattage Devices Can Disrupt the Power Grid.mp4
33.7 MB
USENIX Security 2017/USENIX Security 2017 Videos/6thSense - A Context-aware Sensor-based Attack Detector for Smart Devices.mp4
32.9 MB
USENIX Security 2017/USENIX Security 2017 Videos/DR. CHECKER - A Soundy Analysis for Linux Kernel Drivers.mp4
32.5 MB
USENIX Security 2012/USENIX Security 2012 Proceedings.epub
32.3 MB
USENIX Security 2017/USENIX Security 2017 Videos/Differential Privacy - From Theory to Deployment.mp4
32.3 MB
USENIX Security 2010/USENIX Security 2010 Videos/PrETP Privacy-Preserving Electronic Toll Pricing - Josep Balasch, Alfredo Rial, Carmela Troncoso, Bart Preneel, Ingrid Verbauwhede, Christophe Geuens.mp4
32.2 MB
USENIX Security 2010/USENIX Security 2010 Videos/Security and Privacy Vulnerabilities of In-Car Wireless Networks A Tire Pressure Monitoring System Case Study - Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis Taylor, Sangho Oh.mp4
32.1 MB
USENIX Security 2017/USENIX Security 2017 Videos/Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing.mp4
31.9 MB
USENIX Security 2010/USENIX Security 2010 Videos/The Case for Ubiquitous Transport-Level Encryption - Andrea Bittau, Michael Hamburg, Mark Handley, David Mazieres, Dan Boneh.mp4
31.8 MB
USENIX Security 2009/USENIX Security 2009 Videos/Effective and Efficient Malware Detection at the End Host - Clemens Kolbitsch, Paolo Milani Comparetti, Christopher Kruegel, Engin Kirda, Sophia Antipolis, Xiaoyong Zhou, Xia.mp4
31.8 MB
USENIX Security 2017/USENIX Security 2017 Videos/REM - Resource-Efficient Mining for Blockchains.mp4
31.8 MB
USENIX Security 2009/USENIX Security 2009 Videos/NOZZLE A Defense Against Heap-spraying Code Injection Attacks - Paruj Ratanaworabhan, Benjamin Livshits, Benjamin Zorn.mp4
31.8 MB
USENIX Security 2018/USENIX Security 2018 Videos/When Does Machine Learning FAIL Generalized Transferability for Evasion and Poisoning Attacks.mp4
31.6 MB
USENIX Security 2009/USENIX Security 2009 Videos/Compromising Electromagnetic Emanations of Wired and Wireless Keyboards - Martin Vuagnoux, Sylvain Pasini.mp4
31.3 MB
USENIX Security 2009/USENIX Security 2009 Videos/Crying Wolf An Empirical Study of SSL Warning Effectiveness - Joshua Sunshine, Serge Egelman, Hazim Almuhimedi, Neha Atri, and Lorrie Faith Cranor.mp4
31.2 MB
USENIX Security 2010/USENIX Security 2010 Videos/Building a Dynamic Reputation System for DNS - Manos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee, Nick Feamster.mp4
31.1 MB
USENIX Security 2017/USENIX Security 2017 Videos/PDF Mirage - Content Masking Attack Against Information-Based Online Services.mp4
31.1 MB
USENIX Security 2010/USENIX Security 2010 Videos/BotGrep Finding P2P Bots with Structured Graph Analysis - Shishir Nagaraja, Prateek Mittal, Chi-Yao Hong, Matthew Caesar, Nikita Borisov.mp4
31.1 MB
USENIX Security 2014/USENIX Security 2014 Videos/USENIX Security 2014 Lightning Talks.mp4
30.8 MB
USENIX Security 2009/USENIX Security 2009 Videos/Return-Oriented Rootkits Bypassing Kernel Code Integrity Protection Mechanisms - Ralf Hund, Thorsten Holz, Felix C. Freiling.mp4
30.7 MB
USENIX Security 2017/USENIX Security 2017 Videos/Same-Origin Policy - Evaluation in Modern Browsers.mp4
30.7 MB
USENIX Security 2017/USENIX Security 2017 Videos/BinSim - Trace-based Semantic Binary Diffing.mp4
30.7 MB
USENIX Security 2011/USENIX Security 2011 Videos/ZOZZLE Fast and Precise In-Browser JavaScript Malware Detection - Charlie Curtsinger, Benjamin Livshits, Benjamin Zorn, Christian Seifert.mp4
30.5 MB
USENIX Security 2018/USENIX Security 2018 Videos/Security Namespace - Making Linux Security Frameworks Available to Containers.mp4
30.5 MB
USENIX Security 2016/USENIX Security 2016 Videos/Post-quantum Key Exchange-A New Hope.mp4
30.3 MB
USENIX Security 2017/USENIX Security 2017 Videos/AWare - Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings.mp4
30.3 MB
USENIX Security 2019/USENIX Security 2019 Video/SafeHidden An Efficient and Secure Information Hiding Technique Using.mp4
30.2 MB
USENIX Security 2012/USENIX Security 2012 Videos/Securing Early Software Development - Riley Eller.mp4
30.2 MB
USENIX Security 2019/USENIX Security 2019 Video/Wireless Attacks on Aircraft Instrument Landing Systems.mp4
30.2 MB
USENIX Security 2017/USENIX Security 2017 Videos/Attacking the Brain - Races in the SDN Control Plane.mp4
30.2 MB
USENIX Security 2009/USENIX Security 2009 Videos/Protecting Confidential Data on Personal Computers with Storage Capsules - Kevin Borders, Eric Vander Weele, Billy Lau, Atul Prakash.mp4
29.9 MB
USENIX Security 2017/USENIX Security 2017 Videos/Transcend - Detecting Concept Drift in Malware Classification Models.mp4
29.9 MB
USENIX Security 2018/USENIX Security 2018 Videos/Understanding the Reproducibility of Crowd-reported Security Vulnerabilities.mp4
29.8 MB
USENIX Security 2017/USENIX Security 2017 Videos/SmartPool - Practical Decentralized Pooled Mining.mp4
29.8 MB
USENIX Security 2009/USENIX Security 2009 Videos/Vanish Increasing Data Privacy with Self-Destructing Data - Roxana Geambasu, Tadayoshi Kohno, Amit A. Levy, Henry M. Levy.mp4
29.8 MB
USENIX Security 2017/USENIX Security 2017 Videos/CCSP - Controlled Relaxation of Content Security Policies.mp4
29.7 MB
USENIX Security 2009/USENIX Security 2009 Videos/xBook Redesigning Privacy Control in Social Networking Platforms - Kapil Singh, Sumeer Bhola, Wenke Lee.mp4
29.7 MB
USENIX Security 2009/USENIX Security 2009 Videos/VPriv Protecting Privacy in Location-Based Vehicular Services - Raluca Ada Popa, Hari Balakrishnan, Andrew J. Blumberg.mp4
29.6 MB
USENIX Security 2010/USENIX Security 2010 Videos/Fighting Coercion Attacks in Key Generation using Skin Conductance - Payas Gupta, Debin Gao.mp4
29.6 MB
USENIX Security 2016/USENIX Security 2016 Videos/Specification Mining for Intrusion Detection in Networked Control Systems.mp4
29.5 MB
USENIX Security 2017/USENIX Security 2017 Videos/How Double-Fetch Situations turn into Double-Fetch Vulnerabilities.mp4
29.5 MB
USENIX Security 2019/USENIX Security 2019 Video/On (The Lack Of) Location Privacy in Crowdsourcing Applications.mp4
29.4 MB
USENIX Security 2011/USENIX Security 2011 Videos/Show Me the Money Characterizing Spam-advertised Revenue - Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorso, Christian Kreibich, Kirill Levchenko, Vern Paxson, Geoffrey.mp4
29.2 MB
USENIX Security 2017/USENIX Security 2017 Videos/A Privacy Analysis of Cross-device Tracking.mp4
29.1 MB
USENIX Security 2011/USENIX Security 2011 Videos/TRESOR Runs Encryption Securely Outside RAM - Tilo Müller, Felix C. Freiling, Andreas Dewald.mp4
29.1 MB
USENIX Security 2017/USENIX Security 2017 Videos/An Ant in a World of Grasshoppers.mp4
29.0 MB
USENIX Security 2009/USENIX Security 2009 Videos/Detecting Spammers with SNARE Spatio-temporal Network-level Automatic Reputation Engine - Shuang Hao, Nadeem Ahmed Syed, Nick Feamster, Alexander G. Gray, Sven Krasser.mp4
29.0 MB
USENIX Security 2017/USENIX Security 2017 Videos/Qapla - Policy compliance for database-backed systems.mp4
28.9 MB
USENIX Security 2019/USENIX Security 2019 Video/No Right to Remain Silent Isolating Malicious Mixes.mp4
28.9 MB
USENIX Security 2010/USENIX Security 2010 Videos/VEX Vetting Browser Extensions for Security Vulnerabilities - Sruthi Bandhakavi, Samuel T. King, P. Madhusudan, Marianne Winslett.mp4
28.9 MB
USENIX Security 2010/USENIX Security 2010 Videos/AdJail Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements - Mike Ter Louw, Karthik Thotta Ganesh, V.N. Venkatakrishnan.mp4
28.8 MB
USENIX Security 2011/USENIX Security 2011 Videos/Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade - Nektarios Leontiadis, Tyler Moore, Nicolas Christin.mp4
28.8 MB
USENIX Security 2013/USENIX Security 2013 Presentations/Confessions of a Recovering Data Broker Responsible Innovation in the Age of Big Data, Big Brother, and the Coming Skynet Terminators Slides - Jim Adler.pdf
28.7 MB
USENIX Security 2017/USENIX Security 2017 Videos/SLEUTH - Real-time Attack Scenario Reconstruction from COTS Audit Data.mp4
28.7 MB
USENIX Security 2011/USENIX Security 2011 Videos/Bubble Trouble Off-Line De-Anonymization of Bubble Forms - Joseph A. Calandrino, William Clarkson, Edward W. Felten.mp4
28.6 MB
USENIX Security 2009/USENIX Security 2009 Videos/Locating Prefix Hijackers using LOCK - Tongqing Qiu, Lusheng Ji, Dan Pei, Jia Wang, Jun (Jim) Xu, Hitesh Ballani.mp4
28.5 MB
USENIX Security 2014/USENIX Security 2014 Videos/How To Live In Paradise Pearls of Wisdom for New and Prospective Faculty - David Evans.mp4
28.5 MB
USENIX Security 2012/USENIX Security 2012 Videos/Data Node Encrypted File System Efficient Secure Deletion for Flash Memory - Joel Reardon, Srdjan Capkun, David Basin.mp4
28.4 MB
USENIX Security 2009/USENIX Security 2009 Videos/Improving Tor using a TCP-over-DTLS Tunnel - Joel Reardon, Ian Goldberg.mp4
28.4 MB
USENIX Security 2017/USENIX Security 2017 Videos/Understanding the Mirai Botnet.mp4
28.4 MB
USENIX Security 2013/USENIX Security 2013 Proceedings.mobi
28.2 MB
USENIX Security 2012/USENIX Security 2012 Videos/Impact of Spam Exposure on User Engagement - Anirban Dasgupta, - Kunal Punera, Justin M. Rao, Xuanhui Wang.mp4
28.2 MB
USENIX Security 2013/USENIX Security 2013 Proceedings.pdf
27.9 MB
USENIX Security 2011/USENIX Security 2011 Videos/SMS of Death From Analyzing to Attacking Mobile Phones on a Large Scale - Collin Mulliner, Nico Golde, Jean-Pierre Seifert.mp4
27.9 MB
USENIX Security 2017/USENIX Security 2017 Videos/Towards Practical Tools for Side Channel Aware Software Engineering.mp4
27.8 MB
USENIX Security 2017/USENIX Security 2017 Videos/SmartAuth - User-Centered Authorization for the Internet of Things.mp4
27.8 MB
USENIX Security 2017/USENIX Security 2017 Videos/Identifier Binding Attacks and Defenses in Software-Defined Networks.mp4
27.7 MB
USENIX Security 2019/USENIX Security 2019 Video/ERIM Secure, Efficient In-process Isolation with Protection Keys (MPK).mp4
27.7 MB
USENIX Security 2010/USENIX Security 2010 Videos/Adapting Software Fault Isolation to Contemporary CPU Architectures - David Sehr, Robert Muth, Cliff Biffle, Victor Khimenko, Egor Pasko, Karl Schimpf, Bennet Yee, Brad Chen.mp4
27.7 MB
USENIX Security 2012/USENIX Security 2012 Videos/Neuroscience Meets Cryptography Designing Crypto Primitives Secure Against Rubber Hose Attacks - Hristo Bojinov, Daniel Sanchez, Paul Reber, Northw.mp4
27.7 MB
USENIX Security 2012/USENIX Security 2012 Videos/Gone in 360 Seconds Hijacking with Hitag2 - Roel Verdult, Flavio D. Garcia, Josep Balasch, KU Leuven.mp4
27.7 MB
USENIX Security 2013/USENIX Security 2013 Proceedings Interior.pdf
27.6 MB
USENIX Security 2017/USENIX Security 2017 Videos/When the Weakest Link is Strong.mp4
27.6 MB
USENIX Security 2009/USENIX Security 2009 Videos/The Multi-Principal OS Construction of the Gazelle Web Browser.mp4
27.4 MB
USENIX Security 2010/USENIX Security 2010 Videos/Scantegrity II Municipal Election at Takoma Park The First E2E Binding Governmental Election with Ballot Privacy - Richard Carback, David Chaum, Jeremy Clark, John Conway, Aleksand.mp4
27.4 MB
USENIX Security 2011/USENIX Security 2011 Videos/Measuring Pay-per-Install The Commoditization of Malware Distribution - Juan Caballero, Chris Grier, Christian Kreibich, Vern Paxson.mp4
27.3 MB
USENIX Security 2010/USENIX Security 2010 Videos/Securing Script-Based Extensibility in Web Browsers - Vladan Djeric, Ashvin Goel.mp4
27.3 MB
USENIX Security 2011/USENIX Security 2011 Videos/Comprehensive Experimental Analyses of Automotive Attack Surfaces - Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl.mp4
27.3 MB
USENIX Security 2011/USENIX Security 2011 Videos/ADsafety Type-Based Verification of JavaScript Sandboxing - Joe Gibbs Politz, Spiridon Aristides Eliopoulos, Arjun Guha, Shriram Krishnamurthi.mp4
27.2 MB
USENIX Security 2016/USENIX Security 2016 Videos/Mirror Enabling Proofs of Data Replication and Retrievability in the Cloud.mp4
27.0 MB
USENIX Security 2012/USENIX Security 2012 Videos/PharmaLeaks Understanding the Business of Online Pharmaceutical Affiliate Programs - Damon McCoy, Andreas Pitsillidis, Grant Jordan, Nicholas Weaver, Christian Kreibich, Brian Kreb.mp4
27.0 MB
USENIX Security 2017/USENIX Security 2017 Videos/AuthentiCall - Efficient Identity and Content Authentication for Phone Calls.mp4
27.0 MB
USENIX Security 2017/USENIX Security 2017 Videos/See No Evil, Hear No Evil, Feel No Evil.mp4
27.0 MB
USENIX Security 2019/USENIX Security 2019 Video/EnTrust Regulating Sensor Access by Cooperating Programs.mp4
26.9 MB
USENIX Security 2010/USENIX Security 2010 Videos/Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking - Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidiah R. Crandall.mp4
26.8 MB
USENIX Security 2017/USENIX Security 2017 Videos/Seeing Through The Same Lens.mp4
26.8 MB
USENIX Security 2017/USENIX Security 2017 Videos/Walkie-Talkie.mp4
26.6 MB
USENIX Security 2011/USENIX Security 2011 Videos/The Phantom Tollbooth Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion - Sarah Meiklejohn, Keaton Mowery, Stephen Checkoway, Hovav Shacham.mp4
26.6 MB
USENIX Security 2011/USENIX Security 2011 Videos/Secure In-Band Wireless Pairing - Shyamnath Gollakota, Nabeel Ahmed, Nickolai Zeldovich, Dina Katabi.mp4
26.6 MB
USENIX Security 2018/USENIX Security 2018 Videos/Enter the Hydra - Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts.mp4
26.6 MB
USENIX Security 2013/USENIX Security 2013 Videos/MetaSymploit Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis - Ruowen Wang, Peng Ning, Tao Xie, Quan Chen.mp4
26.5 MB
USENIX Security 2012/USENIX Security 2012 Videos/Mining Your Ps and Qs Detection of Widespread Weak Keys in Network Devices - Nadia Heninger, Zakir Durumeric, Eric Wustrow, J. Alex Halderm.mp4
26.5 MB
USENIX Security 2010/USENIX Security 2010 Videos/Toward Automated Detection of Logic Vulnerabilities in Web Applications - Viktoria Felmetsger, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna.mp4
26.4 MB
USENIX Security 2013/USENIX Security 2013 Videos/Measuring the Practical Impact of DNSSEC Deployment - Wilson Lian, Eric Rescorla, Hovav Shacham, Stefan Savage.mp4
26.4 MB
USENIX Security 2012/USENIX Security 2012 Videos/I Forgot Your Password Randomness Attacks Against PHP Applications - George Argyros, Aggelos Kiayias.mp4
26.3 MB
USENIX Security 2012/USENIX Security 2012 Videos/How Does Your Password Measure Up - The Effect of Strength Meters on Password Creation - Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Mazu.mp4
26.3 MB
USENIX Security 2010/USENIX Security 2010 Videos/P4P Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users - Yitao Duan, NetEase Youdao, John Canny, Justin Zhan.mp4
26.3 MB
USENIX Security 2017/USENIX Security 2017 Videos/HELP - Helper-Enabled In-Band Device Pairing.mp4
26.3 MB
USENIX Security 2012/USENIX Security 2012 Videos/Whispers in the Hyper-space High-speed Covert Channel Attacks in the Cloud - Zhenyu Wu, Zhang Xu, Haining Wang.mp4
26.2 MB
USENIX Security 2018/USENIX Security 2018 Videos/Translation Leak-aside Buffer - Defeating Cache Side-channel Protections with TLB Attacks.mp4
26.2 MB
USENIX Security 2009/USENIX Security 2009 Videos/Memory Safety for Low-Level Software Hardware Interactions - John Criswell, Nicolas Geoffray, Pierre et Marie Curie, Vikram Adve.mp4
26.2 MB
USENIX Security 2017/USENIX Security 2017 Videos/I Have No Idea What I'm Doing - On the Usability of Deploying HTTPS.mp4
26.2 MB
USENIX Security 2009/USENIX Security 2009 Videos/Physical-layer Identification of RFID Devices - Boris Danev, Thomas S. Heydt-Benjamin, Srdjan Capkun.mp4
26.2 MB
USENIX Security 2013/USENIX Security 2013 Videos/Dismantling Megamos Crypto Wirelessly Lockpicking a Vehicle Immobilizer - Roel Verdult, Flavio D. Garcia, Baris Ege.mp4
26.1 MB
USENIX Security 2013/USENIX Security 2013 Videos/The Velocity of Censorship High-Fidelity Detection of Microblog Post Deletions - Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall.mp4
26.1 MB
USENIX Security 2011/USENIX Security 2011 Videos/Why (Special Agent) Johnny (Still) Can't Encrypt A Security Analysis of the APCO Project 25 Two-Way Radio System - Sandy Clark, Travis Goodspeed, Perry Metzger, Zachary Wasserman.mp4
26.1 MB
USENIX Security 2016/USENIX Security 2016 Videos/UNVEIL A Large-Scale, Automated Approach to Detecting Ransomware.mp4
26.1 MB
USENIX Security 2019/USENIX Security 2019 Video/Hiding in Plain Signal Physical Signal Overshadowing Attack on LTE.mp4
26.1 MB
USENIX Security 2013/USENIX Security 2013 Videos/ZMap Fast Internet-wide Scanning and Its Security Applications - durumeric.mp4
26.0 MB
USENIX Security 2013/USENIX Security 2013 Videos/WHYPER Towards Automating Risk Assessment of Mobile Applications - Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, Tao Xie.mp4
26.0 MB
USENIX Security 2017/USENIX Security 2017 Videos/Towards Efficient Heap Overflow Discovery.mp4
26.0 MB
USENIX Security 2011/USENIX Security 2011 Videos/JACKSTRAWS Picking Command and Control Connections from Bot Traffic - Gregoire Jacob, Ralf Hund, Christopher Kruegel.mp4
25.9 MB
USENIX Security 2017/USENIX Security 2017 Videos/Phoenix - Rebirth of a Cryptographic Password-Hardening Service.mp4
25.9 MB
USENIX Security 2017/USENIX Security 2017 Videos/Detecting Credential Spearphishing in Enterprise Settings.mp4
25.9 MB
USENIX Security 2012/USENIX Security 2012 Videos/DroidScope Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis - Lok Kwong Yan, Heng Yin.mp4
25.8 MB
USENIX Security 2011/USENIX Security 2011 Videos/Q Exploit Hardening Made Easy - Edward J. Schwartz, Thanassis Avgerinos, David Brumley.mp4
25.8 MB
USENIX Security 2015/USENIX Security 2015 Videos/Sound-Proof - Usable Two-Factor Authentication Based on Ambient Sound.mp4
25.8 MB
USENIX Security 2018/USENIX Security 2018 Videos/SAQL - A Stream-based Query System for Real-Time Abnormal System Behavior Detection.mp4
25.8 MB
USENIX Security 2013/USENIX Security 2013 Videos/Trafficking Fradulent Accounts The Role of the Underground Market in Twitter Spam and Abuse - Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, Vern Paxson.mp4
25.8 MB
USENIX Security 2010/USENIX Security 2010 Videos/Fast Regular Expression Matching Using Small TCAMs for Network Intrusion Detection and Prevention Systems - Chad R. Meiners, Jignesh Patel, Eric Norige, Eric Torng, and Alex X. Liu.mp4
25.7 MB
USENIX Security 2012/USENIX Security 2012 Videos/Security and Usability Challenges of Moving-Object CAPTCHAs Decoding Codewords in Motion - Y. Xu, G. Reynaga, S. Chiasson, J.-M. Frahm, F. Monrose, P. van Oorschot.mp4
25.7 MB
USENIX Security 2011/USENIX Security 2011 Videos/Forensic Triage for Mobile Phones with DEC0DE - Robert J. Walls, Erik Learned-Miller, Brian Neil Levine.mp4
25.7 MB
USENIX Security 2012/USENIX Security 2012 Videos/An Evaluation of the Google Chrome Extension Security Architecture - Nicholas Carlini, Adrienne Porter Felt, David Wagner.mp4
25.6 MB
USENIX Security 2012/USENIX Security 2012 Videos/Policy-Sealed Data A New Abstraction for Building Trusted Cloud Services - Nuno Santos, Rodrigo Rodrigues, Krishna P. Gummadi.mp4
25.6 MB
USENIX Security 2015/USENIX Security 2015 Videos/Investigating the Computer Security Practices and Needs of Journalists.mp4
25.6 MB
USENIX Security 2012/USENIX Security 2012 Videos/Establishing Browser Security Guarantees through Formal Shim Verification - Dongseok Jang, Zachary Tatlock, Sorin Lerner.mp4
25.5 MB
USENIX Security 2012/USENIX Security 2012 Videos/PUBCRAWL Protecting Users and Businesses from CRAWLers - Gregoire Jacob, Engin Kirda, Christopher Kruegel, Giovanni Vigna.mp4
25.5 MB
USENIX Security 2019/USENIX Security 2019 Video/Birthday, Name and Bifacial-security Understanding Passwords.mp4
25.5 MB
USENIX Security 2015/USENIX Security 2015 Videos/All Your Biases Belong to Us - Breaking RC4 in WPA-TKIP and TLS.mp4
25.5 MB
USENIX Security 2013/USENIX Security 2013 Videos/Towards Automatic Software Lineage Inference - Jiyong Jang, Maverick Woo, David Brumley.mp4
25.5 MB
USENIX Security 2010/USENIX Security 2010 Videos/Cling A Memory Allocator to Mitigate Dangling Pointers - Periklis Akritidis.mp4
25.4 MB
USENIX Security 2017/USENIX Security 2017 Videos/USB Snooping Made Easy - Crosstalk Leakage Attacks on USB Hubs.mp4
25.3 MB
USENIX Security 2012/USENIX Security 2012 Videos/TARDIS Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without Clocks - Amir Rahmati, Mastooreh Salajegheh, Dan Holcomb, Jacob Sorber, Wayne P. B.mp4
25.3 MB
USENIX Security 2012/USENIX Security 2012 Videos/Social Networking with Frientegrity Privacy and Integrity with an Untrusted Provider - Ariel J. Feldman, Aaron Blankstein, Michael J. Freedman, Edward W. Felten.mp4
25.3 MB
USENIX Security 2015/USENIX Security 2015 Videos/Trustworthy Whole-System Provenance for the Linux Kernel.mp4
25.3 MB
USENIX Security 2019/USENIX Security 2019 Video/CANvas Fast and Inexpensive Automotive Network Mapping.mp4
25.3 MB
USENIX Security 2012/USENIX Security 2012 Videos/Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization - Cristiano Giuffrida, Anton Kuijsten, Andrew S. Tanenbaum.mp4
25.2 MB
USENIX Security 2010/USENIX Security 2010 Videos/Structuring Protocol Implementations to Protect Sensitive Data - Petr Marchenko, Brad Karp.mp4
25.2 MB
USENIX Security 2018/USENIX Security 2018 Videos/With Great Training Comes Great Vulnerability - Practical Attacks against Transfer Learning.mp4
25.1 MB
USENIX Security 2011/USENIX Security 2011 Videos/Fast and Precise Sanitizer Analysis with BEK - Pieter Hooimeijer, Benjamin Livshits, David Molnar, Prateek Saxena, Margus Veanes.mp4
25.1 MB
USENIX Security 2019/USENIX Security 2019 Video/Protecting accounts from credential stuffing with password breach alerting.mp4
25.1 MB
USENIX Security 2017/USENIX Security 2017 Videos/Computer Security, Privacy, and DNA Sequencing.mp4
25.1 MB
USENIX Security 2012/USENIX Security 2012 Videos/Chimera A Declarative Language for Streaming Network Traffic Analysis - Kevin Borders, Jonathan Springer, Matthew Burnside.mp4
25.0 MB
USENIX Security 2010/USENIX Security 2010 Videos/An Analysis of Private Browsing Modes in Modern Browsers - Gaurav Aggarwal, Elie Bursztein, Collin Jackson, Dan Boneh.mp4
25.0 MB
USENIX Security 2016/USENIX Security 2016 Videos/Off-Path TCP Exploits Global Rate Limit Considered Dangerous.mp4
25.0 MB
USENIX Security 2010/USENIX Security 2010 Videos/Acoustic Side-Channel Attacks on Printers - backes.mp4
25.0 MB
USENIX Security 2012/USENIX Security 2012 Videos/AdSplit Separating Smartphone Advertising from Applications - Shashi Shekhar, Michael Dietz, Dan S. Wallach.mp4
25.0 MB
USENIX Security 2010/USENIX Security 2010 Videos/ZKPDL A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash - Sarah Meiklejohn, C. Chris Erway, Alptekin Kupcu, Theodora Hinkle, Anna Lysyanskaya.mp4
24.9 MB
USENIX Security 2018/USENIX Security 2018 Videos/A Bad Dream - Subverting Trusted Platform Module While You Are Sleeping.mp4
24.9 MB
USENIX Security 2018/USENIX Security 2018 Videos/Better managed than memorized Studying the Impact of Managers on Password Strength and Reuse.mp4
24.9 MB
USENIX Security 2017/USENIX Security 2017 Videos/The Loopix Anonymity System.mp4
24.9 MB
USENIX Security 2011/USENIX Security 2011 Videos/Permission Re-Delegation Attacks and Defenses - Adrienne Porter Felt, Helen J. Wang, Alexander Moshchuk, Steve Hanna, Erika Chin.mp4
24.9 MB
USENIX Security 2013/USENIX Security 2013 Videos/Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation - Frank Imeson, Ariq Emtenan, Siddharth Garg, Mahesh V. Tripunita.mp4
24.8 MB
USENIX Security 2012/USENIX Security 2012 Videos/Progressive Authentication Deciding When to Authenticate on Mobile Phones - Oriana Riva, Chuan Qin, Karin Strauss, Dimitrios Lymberopoulos.mp4
24.8 MB
USENIX Security 2015/USENIX Security 2015 Videos/Post-Mortem of a Zombie - Conficker Cleanup After Six Years.mp4
24.8 MB
USENIX Security 2012/USENIX Security 2012 Videos/On Breaking SAML Be Whoever You Want to Be - Juraj Somorovsky, Andreas Mayer, Jorg Schwenk, Marco Kampmann, Meiko Jensen.mp4
24.8 MB
USENIX Security 2013/USENIX Security 2013 Videos/Jekyll on iOS When Benign Apps Become Evil - Tielei Wang, Kangjie Lu, Long Lu, Simon Chung, Wenke Lee.mp4
24.8 MB
USENIX Security 2016/USENIX Security 2016 Videos/Poking Holes in Information Hiding.mp4
24.8 MB
USENIX Security 2011/USENIX Security 2011 Videos/Differential Privacy Under Fire - Andreas Haeberlen, Benjamin C. Pierce, Arjun Narayan.mp4
24.8 MB
USENIX Security 2017/USENIX Security 2017 Videos/Measuring HTTPS Adoption on the Web.mp4
24.7 MB
USENIX Security 2011/USENIX Security 2011 Videos/deSEO Combating Search-Result Poisoning - John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy, Martin Abadi.mp4
24.7 MB
USENIX Security 2011/USENIX Security 2011 Videos/Cloaking Malware with the Trusted Platform Module - Alan M. Dunn, Owen S. Hofmann, Brent Waters, Emmett Witchel.mp4
24.7 MB
USENIX Security 2011/USENIX Security 2011 Videos/BOTMAGNIFIER Locating Spambots on the Internet - Gianluca Stringhini, Thorsten Holz, Brett Stone-Gross, Christopher Kruegel, Giovanni Vigna.mp4
24.6 MB
USENIX Security 2017/USENIX Security 2017 Videos/Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts.mp4
24.6 MB
USENIX Security 2019/USENIX Security 2019 Video/What Are You Searching For A Remote Keylogging Attack.mp4
24.6 MB
USENIX Security 2017/USENIX Security 2017 Videos/CHAINIAC - Proactive Software-Update Transparency.mp4
24.5 MB
USENIX Security 2017/USENIX Security 2017 Videos/Detecting Android Root Exploits by Learning from Root Providers.mp4
24.5 MB
USENIX Security 2013/USENIX Security 2013 Videos/Control Flow Integrity for COTS Binaries - Mingwei Zhang, R. Sekar.mp4
24.5 MB
USENIX Security 2012/USENIX Security 2012 Videos/Aurasium Practical Policy Enforcement for Android Applications - Rubin Xu, Hassen Saidi, Ross Anderson.mp4
24.4 MB
USENIX Security 2016/USENIX Security 2016 Videos/Making USB Great Again with USBFILTER.mp4
24.4 MB
USENIX Security 2012/USENIX Security 2012 Videos/Babel Leveraging Email Delivery for Spam Mitigation - Gianluca Stringhini, Manuel Egele, Apostolis Zarras, Thorsten Holz, Christopher Kruegel, Giovanni Vigna.mp4
24.3 MB
USENIX Security 2019/USENIX Security 2019 Video/Not Everything is Dark and Gloomy Power Grid Protections Against IoT.mp4
24.3 MB
USENIX Security 2013/USENIX Security 2013 Videos/Transparent ROP Exploit Mitigation Using Indirect Branch Tracing - Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis.mp4
24.3 MB
USENIX Security 2017/USENIX Security 2017 Videos/MCMix - Anonymous Messaging via Secure Multiparty Computation.mp4
24.3 MB
USENIX Security 2017/USENIX Security 2017 Videos/PrimeAbort - A Timer-Free High-Precision L3 Cache Attack using Intel TSX.mp4
24.2 MB
USENIX Security 2011/USENIX Security 2011 Videos/mCarve Carving Attributed Dump Sets - Ton van Deursen, Sjouke Mauw, and Sasa Radomirovic.mp4
24.2 MB
USENIX Security 2017/USENIX Security 2017 Videos/Predicting the Resilience of Obfuscated Code.mp4
24.2 MB
USENIX Security 2013/USENIX Security 2013 Videos/FIE on Firmware Finding Vulnerabilities in Embedded Systems Using Symbolic Execution - Drew Davidson, Benjamin Moench, Somesh Jha, Thomas Ristenpart.mp4
24.2 MB
USENIX Security 2012/USENIX Security 2012 Videos/Clickjacking Attacks and Defenses - Lin-Shung Huang, Alex Moshchuk, Helen J. Wang, Stuart Schechter, Collin Jackson.mp4
24.2 MB
USENIX Security 2013/USENIX Security 2013 Videos/Eradicating DNS Rebinding with the Extended Same-origin Policy - Martin Johns, Sebastian Lekies, Ben Stock.mp4
24.2 MB
USENIX Security 2012/USENIX Security 2012 Videos/STING Finding Name Resolution Vulnerabilities in Programs - Hayawardh Vijayakumar, Joshua Schiffman, Trent Jaeger.mp4
24.2 MB
USENIX Security 2013/USENIX Security 2013 Videos/Dowsing for Ovrflows A Guided Fuzzer to Find Buffer Boundary Violations - Istvan Haller, Asia Slowinska, Matthias Neugschwandtner, Herbert Bos.mp4
24.1 MB
USENIX Security 2010/USENIX Security 2010 Videos/Realization of RF Distance Bounding - Kasper Bonne Rasmussen, Srdjan Capkun.mp4
24.1 MB
USENIX Security 2013/USENIX Security 2013 Videos/Secure Outsourced Garbled Circuit Evaluation for Mobile Devices - Henry Carter, Benjamin Mood, Patrick Traynor, Kevin Butler.mp4
24.1 MB
USENIX Security 2019/USENIX Security 2019 Video/All Your Clicks Belong to Me Investigating Click Interception on the Web.mp4
24.1 MB
USENIX Security 2016/USENIX Security 2016 Videos/Practical DIFC Enforcement on Android.mp4
24.1 MB
USENIX Security 2018/USENIX Security 2018 Videos/Foreshadow - Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution.mp4
24.0 MB
USENIX Security 2015/USENIX Security 2015 Videos/Type Casting Verification - Stopping an Emerging Attack Vector.mp4
24.0 MB
USENIX Security 2010/USENIX Security 2010 Videos/Chipping Away at Censorship Firewalls with User-Generated Content - Sam Burnett, Nick Feamster, Santosh Vempala.mp4
24.0 MB
USENIX Security 2009/USENIX Security 2009 Videos/A Practical Congestion Attack on Tor Using Long Paths - Nathan S. Evans, Roger Dingledine, Christian Grothoff.mp4
24.0 MB
USENIX Security 2011/USENIX Security 2011 Videos/Toward Secure Embedded Web Interfaces - Baptiste Gourdin, Chinmay Soman, Hristo Bojinov, Elie Bursztein.mp4
24.0 MB
USENIX Security 2017/USENIX Security 2017 Videos/Ensuring Authorized Updates in Multi-user Database-Backed Applications.mp4
23.9 MB
USENIX Security 2017/USENIX Security 2017 Videos/Global Measurement of DNS Manipulation.mp4
23.9 MB
USENIX Security 2009/USENIX Security 2009 Videos/Static Enforcement of Web Application Integrity Through Strong Typing - William Robertson, Giovanni Vigna.mp4
23.9 MB
USENIX Security 2017/USENIX Security 2017 Videos/Speeding up detection of SHA-1 collision attacks.mp4
23.9 MB
USENIX Security 2019/USENIX Security 2019 Video/Losing the Car Keys Wireless PHY-Layer Insecurity in EV Charging.mp4
23.9 MB
USENIX Security 2017/USENIX Security 2017 Videos/PlatPal - Detecting Malicious Documents with Platform Diversity.mp4
23.9 MB
USENIX Security 2009/USENIX Security 2009 Videos/Efficient Data Structures for Tamper-Evident Logging - Scott A. Crosby, Dan S. Wallach.mp4
23.9 MB
USENIX Security 2016/USENIX Security 2016 Videos/Stealing Machine Learning Models via Prediction APIs.mp4
23.9 MB
USENIX Security 2016/USENIX Security 2016 Videos/Hey, You Have a Problem On the Feasibility of Large-Scale Web Vulnerability.mp4
23.9 MB
USENIX Security 2014/USENIX Security 2014 Videos/Blanket Execution Dynamic Similarity Testing for Program Binaries and Components - Manuel Egele, Maverick Woo, Peter Chapman, David Brumley.mp4
23.8 MB
USENIX Security 2019/USENIX Security 2019 Video/CONFIRM Evaluating Compatibility and Relevance of Control-flow.mp4
23.8 MB
USENIX Security 2017/USENIX Security 2017 Videos/Loophole - Timing Attacks on Shared Event Loops in Chrome.mp4
23.8 MB
USENIX Security 2018/USENIX Security 2018 Videos/GAZELLE - A Low Latency Framework for Secure Neural Network Inference.mp4
23.8 MB
USENIX Security 2017/USENIX Security 2017 Videos/Dead Store Elimination (Still) Considered Harmful.mp4
23.8 MB
USENIX Security 2011/USENIX Security 2011 Videos/Dark Clouds on the Horizon Using Cloud Storage as Attack Vector and Online Slack Space - Martin Mulazzani, Sebastian Schrittwieser, Manuel Leithner, Markus Huber, Edgar Weippl.mp4
23.7 MB
USENIX Security 2019/USENIX Security 2019 Video/PolicyLint Investigating Internal Privacy Policy Contradictions on Google.mp4
23.7 MB
USENIX Security 2019/USENIX Security 2019 Video/CT-GAN Malicious Tampering of 3D Medical Imagery using Deep Learning.mp4
23.7 MB
USENIX Security 2017/USENIX Security 2017 Videos/TrustBase - An Architecture to Repair and Strengthen.mp4
23.7 MB
USENIX Security 2013/USENIX Security 2013 Videos/Sancus Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base - Job Noorman, Pieter Agten, Wilfried Daniels, Raoul Strackx, Anthony Van Herre.mp4
23.6 MB
USENIX Security 2018/USENIX Security 2018 Videos/The Rewards and Costs of Stronger Passwords in a University - Linking Password Lifetime to Strength.mp4
23.6 MB
USENIX Security 2009/USENIX Security 2009 Videos/CCCP Secure Remote Storage for Computational RFIDs - Mastooreh Salajegheh, Shane Clark, Benjamin Ransford, Kevin Fu, Ari Juels.mp4
23.6 MB
USENIX Security 2017/USENIX Security 2017 Videos/Neural Nets Can Learn Function Type Signatures From Binaries.mp4
23.6 MB
USENIX Security 2016/USENIX Security 2016 Videos/zxcvbn Low-Budget Password Strength Estimation.mp4
23.6 MB
USENIX Security 2012/USENIX Security 2012 Proceedings.mobi
23.6 MB
USENIX Security 2014/USENIX Security 2014 Videos/Panel Discussion - Stuart Schechter.mp4
23.5 MB
USENIX Security 2017/USENIX Security 2017 Videos/Beauty and the Burst - Remote Identification of Encrypted Video Streams.mp4
23.5 MB
USENIX Security 2016/USENIX Security 2016 Videos/Verifying Constant-Time Implementations.mp4
23.5 MB
USENIX Security 2018/USENIX Security 2018 Videos/Modelling and Analysis of a Hierarchy of Distance Bounding Attacks.mp4
23.5 MB
USENIX Security 2015/USENIX Security 2015 Videos/Towards Discovering and Understanding Task Hijacking in Android.mp4
23.5 MB
USENIX Security 2017/USENIX Security 2017 Videos/BLENDER - Enabling Local Search with a Hybrid Differential Privacy Model.mp4
23.5 MB
USENIX Security 2018/USENIX Security 2018 Videos/teEther - Gnawing at Ethereum to Automatically Exploit Smart Contracts.mp4
23.5 MB
USENIX Security 2017/USENIX Security 2017 Videos/Telling Your Secrets without Page Faults.mp4
23.4 MB
USENIX Security 2017/USENIX Security 2017 Videos/Constant-Time Callees with Variable-Time Callers.mp4
23.4 MB
USENIX Security 2013/USENIX Security 2013 Videos/Proactively Accountable Anonymous Messaging in Verdict - Henry Corrigan-Gibbs, David Isaac Wolinsky, Bryan Ford.mp4
23.4 MB
USENIX Security 2015/USENIX Security 2015 Videos/Cloudy with a Chance of Breach - Forecasting Cyber Security Incidents.mp4
23.4 MB
USENIX Security 2016/USENIX Security 2016 Videos/The Million-Key Question-Investigating the Origins of RSA Public Keys.mp4
23.4 MB
USENIX Security 2014/USENIX Security 2014 Full Proceedings.mobi
23.3 MB
USENIX Security 2016/USENIX Security 2016 Videos/Authenticated Network Time Synchronization.mp4
23.3 MB
USENIX Security 2017/USENIX Security 2017 Videos/Oscar - A Practical Page-Permissions-Based Scheme.mp4
23.3 MB
USENIX Security 2012/USENIX Security 2012 Videos/Tachyon Tandem Execution for Efficient Live Patch Testing - Matthew Maurer, David Brumley.mp4
23.3 MB
USENIX Security 2016/USENIX Security 2016 Videos/Screen after Previous Screens Spatial-Temporal Recreation of Android App.mp4
23.3 MB
USENIX Security 2012/USENIX Security 2012 Videos/Let Me Answer That for You Exploiting Broadcast Information in Cellular Networks - golde.mp4
23.3 MB
USENIX Security 2015/USENIX Security 2015 Videos/Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors.mp4
23.2 MB
USENIX Security 2017/USENIX Security 2017 Videos/Strong and Efficient Cache Side-Channel Protection.mp4
23.2 MB
USENIX Security 2009/USENIX Security 2009 Videos/Designing Trustworthy User Agents for a Hostile Web - Eric Lawrence.mp4
23.2 MB
USENIX Security 2011/USENIX Security 2011 Videos/PIR-Tor Scalable Anonymous Communication Using Private Information Retrieval - Prateek Mittal, Femi Olumofin, Carmela Troncoso, Nikita Borisov, Ian Goldberg.mp4
23.1 MB
USENIX Security 2011/USENIX Security 2011 Videos/Dirty Jobs The Role of Freelance Labor in Web Service Abuse - Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker.mp4
23.1 MB
USENIX Security 2018/USENIX Security 2018 Videos/Analysis of Privacy Protections in Fitness Tracking Social Networks -or- You can run.mp4
23.1 MB
USENIX Security 2012/USENIX Security 2012 Videos/STEALTHMEM System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud - Taesoo Kim, Marcus Peinado, Gloria Mainar-Ruiz.mp4
23.0 MB
USENIX Security 2013/USENIX Security 2013 Videos/On the Security of RC4 in TLS - Nadhem AlFardan, Royal Holloway, Daniel J. Bernstein, Kenneth G. Paterson, Bertram Poettering, Jacob C.N. Schuldt.mp4
23.0 MB
USENIX Security 2009/USENIX Security 2009 Videos/Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs - David Molnar, Xue Cong Li, and David A. Wagner.mp4
23.0 MB
USENIX Security 2011/USENIX Security 2011 Videos/QUIRE Lightweight Provenance for Smart Phone Operating Systems - Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anhei Shu, Dan S. Wallach.mp4
23.0 MB
USENIX Security 2012/USENIX Security 2012 Videos/Billion-Gate Secure Computation with Malicious Adversaries - Benjamin Kreuter, abhi shelat, and Chih-hao Shen.mp4
23.0 MB
USENIX Security 2019/USENIX Security 2019 Video/Evaluating the Contextual Integrity of Privacy Regulation Parents' IoT.mp4
23.0 MB
USENIX Security 2019/USENIX Security 2019 Video/TESSERACT Eliminating Experimental Bias in Malware Classification.mp4
23.0 MB
USENIX Security 2016/USENIX Security 2016 Videos/Internet Jones and the Raiders of the Lost Trackers.mp4
23.0 MB
USENIX Security 2013/USENIX Security 2013 Videos/Explicating SDKs Uncovering Assumptions Underlying Secure Authentication and Authorization - Rui Wang, Yuchen Zhou, Shuo Chen, Shaz Qadeer, David Evans, Yuri Gurevich.mp4
22.8 MB
USENIX Security 2016/USENIX Security 2016 Videos/The Ever-Changing Labyrinth A Large-Scale Analysis of Wildcard DNS Powered.mp4
22.8 MB
USENIX Security 2017/USENIX Security 2017 Videos/On the effectiveness of mitigations against floating-point timing channels.mp4
22.8 MB
FOCI 2014/TRIST Circumventing Censorship with Transcoding-Resistant Image Steganography.mp4
22.7 MB
USENIX Security 2019/USENIX Security 2019 Video/Identifying Cache-Based Side Channels through Secret-Augmented.mp4
22.7 MB
USENIX Security 2016/USENIX Security 2016 Videos/Secure, Precise, and Fast Floating-Point Operations on x86 Processors.mp4
22.7 MB
USENIX Security 2019/USENIX Security 2019 Video/PAC it up Towards Pointer Integrity using ARM Pointer Authentication.mp4
22.7 MB
USENIX Security 2013/USENIX Security 2013 Videos/Steal This Movie Automatically Bypassing DRM Protection in Streaming Media Services - Ruoyu Wang, Santa Barbara, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna.mp4
22.7 MB
USENIX Security 2013/USENIX Security 2013 Videos/ZQL A Compiler for Privacy-Preserving Data Processing - Cedric Fournet, Markulf Kohlweiss, George Danezis.mp4
22.6 MB
USENIX Security 2011/USENIX Security 2011 Proceedings.pdf
22.6 MB
USENIX Security 2013/USENIX Security 2013 Videos/Alice in Warningland A Large-Scale Field Study of Browser Security Warning Effectiveness - Devdatta Akhawe, Adrienne Porter Felt.mp4
22.6 MB
USENIX Security 2009/USENIX Security 2009 Videos/Keynote Address - Rich Cannings.mp4
22.6 MB
USENIX Security 2013/USENIX Security 2013 Videos/Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring - Edward J. Schwartz, JongHyup Lee, Maverick Woo, David Brumley.mp4
22.6 MB
USENIX Security 2017/USENIX Security 2017 Videos/Digtool - A Virtualization-Based Framework for Detecting Kernel Vulnerabilities.mp4
22.6 MB
USENIX Security 2016/USENIX Security 2016 Videos/Identifying and Characterizing Sybils in the Tor Network.mp4
22.5 MB
USENIX Security 2017/USENIX Security 2017 Videos/Venerable Variadic Vulnerabilities Vanquished.mp4
22.5 MB
USENIX Security 2016/USENIX Security 2016 Videos/AuthLoop End-to-End Cryptographic Authentication for Telephony.mp4
22.5 MB
USENIX Security 2018/USENIX Security 2018 Videos/Dependence-Preserving Data Compaction for Scalable Forensic Analysis.mp4
22.4 MB
USENIX Security 2013/USENIX Security 2013 Videos/Effective Inter-Component Communication Mapping in Android An Essential Step Towards Holistic Security Analysis - Damien Octeau, Patrick McDaniel, Somesh Jha, Alexandre Bartel, Eri.mp4
22.4 MB
USENIX Security 2013/USENIX Security 2013 Videos/Take This Personally Pollution Attacks on Personalized Services - Xinyu Xing, Wei Meng, Dan Doozan, Alex C. Snoeren, Nick Feamster, Wenke Lee.mp4
22.4 MB
USENIX Security 2016/USENIX Security 2016 Videos/überSpark Enforcing Verifiable Object Abstractions for Automated.mp4
22.3 MB
USENIX Security 2016/USENIX Security 2016 Videos/A Comprehensive Measurement Study of Domain Generating Malware.mp4
22.3 MB
USENIX Security 2016/USENIX Security 2016 Videos/Hidden Voice Commands.mp4
22.3 MB
USENIX Security 2016/USENIX Security 2016 Videos/Predicting, Decrypting, and Abusing WPA2 802.11 Group Keys.mp4
22.3 MB
USENIX Security 2012/USENIX Security 2012 Videos/Optimally Robust Private Information Retrieval - Casey Devet, Ian Goldberg, Nadia Heninger.mp4
22.2 MB
USENIX Security 2011/USENIX Security 2011 Videos/A Study of Android Application Security - William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri.mp4
22.2 MB
USENIX Security 2012/USENIX Security 2012 Videos/Privacy-Preserving Social Plugins - Georgios Kontaxis, Michalis Polychronakis, Angelos D. Keromytis, Evangelos P. Markatos.mp4
22.2 MB
USENIX Security 2019/USENIX Security 2019 Video/The CrossPath Attack Disrupting the SDN Control Channel via Shared Links.mp4
22.1 MB
USENIX Security 2017/USENIX Security 2017 Videos/CLKSCREW - Exposing the Perils of Security-Oblivious Energy Management.mp4
22.1 MB
USENIX Security 2018/USENIX Security 2018 Videos/Rethinking Access Control and Authentication for the Home Internet of Things (IoT).mp4
22.1 MB
USENIX Security 2019/USENIX Security 2019 Video/VRASED A Verified Hardware Software Co-Design for Remote Attestation.mp4
22.1 MB
USENIX Security 2017/USENIX Security 2017 Videos/Characterizing the Nature and Dynamics of Tor Exit Blocking.mp4
22.0 MB
USENIX Security 2016/USENIX Security 2016 Videos/Micro-Virtualization Memory Tracing to Detect and Prevent Spraying Attacks.mp4
22.0 MB
USENIX Security 2011/USENIX Security 2011 Videos/SHELLOS Enabling Fast Detection and Forensic Analysis of Code Injection Attacks - Kevin Z. Snow, Srinivas Krishnan, Fabian Monrose, Niels Provos.mp4
22.0 MB
USENIX Security 2018/USENIX Security 2018 Videos/FUZE - Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities.mp4
22.0 MB
USENIX Security 2019/USENIX Security 2019 Video/Improving Robustness of ML Classifiers against Realizable Evasio.mp4
22.0 MB
USENIX Security 2018/USENIX Security 2018 Videos/One&Done - A Single-Decryption EM-Based Attack on OpenSSL's Constant-Time Blinded RSA.mp4
22.0 MB
USENIX Security 2018/USENIX Security 2018 Videos/End-to-End Measurements of Email Spoofing Attacks.mp4
22.0 MB
USENIX Security 2016/USENIX Security 2016 Videos/Request and Conquer Exposing Cross-Origin Resource Size.mp4
22.0 MB
USENIX Security 2011/USENIX Security 2011 Videos/Faster Secure Two-Party Computation Using Garbled Circuits - Yan Huang, David Evans, Jonathan Katz.mp4
21.9 MB
USENIX Security 2010/USENIX Security 2010 Videos/SEPIA Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics - Martin Burkhart, Mario Strasser, Dilip Many, Xenofontas Dimitropoulos.mp4
21.9 MB
USENIX Security 2019/USENIX Security 2019 Video/Please Pay Inside Evaluating Bluetooth-based Detection of Gas Pump Skimmers.mp4
21.9 MB
USENIX Security 2019/USENIX Security 2019 Video/Utility-Optimized Local Differential Privacy Mechanisms for.mp4
21.9 MB
USENIX Security 2017/USENIX Security 2017 Videos/vTZ - Virtualizing ARM TrustZone.mp4
21.9 MB
USENIX Security 2018/USENIX Security 2018 Videos/Skill Squatting Attacks on Amazon Alexa.mp4
21.9 MB
USENIX Security 2018/USENIX Security 2018 Videos/Acquisitional Rule-based Engine for Discovering Internet-of-Things Devices.mp4
21.9 MB
USENIX Security 2016/USENIX Security 2016 Videos/Trusted Browsers for Uncertain Times.mp4
21.8 MB
USENIX Security 2014/USENIX Security 2014 Videos/Security Analysis of a Full-Body Scanner - Keaton Mowery, Eric Wustrow, Tom Wypych, Corey Singleton, Chris Comfort, Eric Rescorla, Stephen Checkoway, J. Alex Halderman, Hovav Shach.mp4
21.8 MB
USENIX Security 2011/USENIX Security 2011 Videos/MACE Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery - Chia Yuan Cho, Domagoj Babic, Pongsin Poosankam, Kevin Zhijie Chen, Edward XueJun Wu.mp4
21.8 MB
USENIX Security 2019/USENIX Security 2019 Video/CSI NN Reverse Engineering of Neural Network Architectures.mp4
21.8 MB
USENIX Security 2018/USENIX Security 2018 Videos/NAVEX - Precise and Scalable Exploit Generation for Dynamic Web Applications.mp4
21.8 MB
USENIX Security 2013/USENIX Security 2013 Videos/An Empirical Study of Vulnerability Rewards Programs - Matthew Finifter, Devdatta Akhawe, David Wagner.mp4
21.8 MB
USENIX Security 2014/USENIX Security 2014 Videos/Oxymoron Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing - Michael Backes, Stefan Nurnberger.mp4
21.8 MB
USENIX Security 2017/USENIX Security 2017 Videos/CAn’t Touch This.mp4
21.8 MB
USENIX Security 2017/USENIX Security 2017 Videos/Syntia - Synthesizing the Semantics of Obfuscated Code.mp4
21.7 MB
USENIX Security 2013/USENIX Security 2013 Videos/On the Security of Picture Gesture Authentication - Ziming Zhao, Gail-Joon Ahn, Jeong-Jin Seo, Hongxin Hu.mp4
21.7 MB
USENIX Security 2013/USENIX Security 2013 Videos/ExecScent Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates - Terry Nelms, Roberto Perdisci, Mustaque Ahamad.mp4
21.7 MB
USENIX Security 2019/USENIX Security 2019 Video/Misleading Authorship Attribution of Source Code using Adversarial Learning.mp4
21.7 MB
USENIX Security 2018/USENIX Security 2018 Videos/Unveiling and Quantifying Facebook Exploitation of Sensitive Personal Data for Advertising Purposes.mp4
21.7 MB
USENIX Security 2017/USENIX Security 2017 Videos/CacheD - Identifying Cache-Based Timing Channels in Production Software.mp4
21.7 MB
USENIX Security 2018/USENIX Security 2018 Videos/MoonShine - Optimizing OS Fuzzer Seed Selection with Trace Distillation.mp4
21.6 MB
USENIX Security 2019/USENIX Security 2019 Video/FIRM-AFL High-Throughput Greybox Fuzzing of IoT Firmware via.mp4
21.6 MB
USENIX Security 2019/USENIX Security 2019 Video/uXOM Efficient eXecute-Only Memory on ARM Cortex-M.mp4
21.6 MB
USENIX Security 2018/USENIX Security 2018 Videos/Plug and Prey Measuring the Commoditization of Cybercrime via Online Anonymous Markets.mp4
21.6 MB
USENIX Security 2019/USENIX Security 2019 Video/Inadvertently Making Cyber Criminals Rich A Comprehensive Study of.mp4
21.5 MB
USENIX Security 2011/USENIX Security 2011 Videos/Detecting Malware Domains at the Upper DNS Hierarchy - Manos Antonakakis, Roberto Perdisci, Wenke Lee, Nikolaos Vasiloglou II, David Dagon.mp4
21.5 MB
USENIX Security 2017/USENIX Security 2017 Videos/Adaptive Android Kernel Live Patching.mp4
21.5 MB
USENIX Security 2016/USENIX Security 2016 Videos/Dancing on the Lip of the Volcano Chosen Ciphertext Attacks on Apple iMessage.mp4
21.4 MB
USENIX Security 2018/USENIX Security 2018 Videos/A4NT - Author Attribute Anonymity by Adversarial Training of Neural Machine Translation.mp4
21.4 MB
USENIX Security 2014/USENIX Security 2014 Presentations/iSeeYou Disabling the MacBook Webcam Indicator LED Slides - Matthew Brocker, Stephen Checkoway.pdf
21.4 MB
USENIX Security 2018/USENIX Security 2018 Videos/Bamboozling Certificate Authorities with BGP.mp4
21.4 MB
USENIX Security 2016/USENIX Security 2016 Videos/Investigating Commercial Pay-Per-Install and the Distribution of Unwanted.mp4
21.4 MB
USENIX Security 2016/USENIX Security 2016 Videos/Privacy in Epigenetics Temporal Linkability of MicroRNA Expression Profiles.mp4
21.3 MB
USENIX Security 2017/USENIX Security 2017 Videos/MPI - Multiple Perspective Attack Investigation.mp4
21.3 MB
USENIX Security 2013/USENIX Security 2013 Videos/Securing Embedded User Interfaces Android and Beyond - Franziska Roesner, Tadayoshi Kohno.mp4
21.3 MB
USENIX Security 2019/USENIX Security 2019 Video/simTPM User-centric TPM for Mobile Devices.mp4
21.2 MB
USENIX Security 2016/USENIX Security 2016 Videos/Egalitarian Computing.mp4
21.2 MB
USENIX Security 2016/USENIX Security 2016 Videos/Oblivious Multi-Party Machine Learning on Trusted Processors.mp4
21.2 MB
USENIX Security 2013/USENIX Security 2013 Videos/Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers - Suman Jana, David Molnar, Alexander Moshchuk, Alan Dunn, Benjamin Livshits, Helen J. Wang, E.mp4
21.1 MB
USENIX Security 2018/USENIX Security 2018 Videos/We Still Don't Have Secure Cross-Domain Requests - an Empirical Study of CORS.mp4
21.1 MB
USENIX Security 2012/USENIX Security 2012 Videos/New Attacks on Timing-based Network Flow Watermarks - Zi Lin, Nicholas Hopper.mp4
21.1 MB
USENIX Security 2020/PEPR '20/PEPR 20 - Privacy in Deployment.mp4
21.1 MB
USENIX Security 2016/USENIX Security 2016 Videos/Measuring PUP Prevalence and PUP Distribution through Pay-Per-Install Services.mp4
21.1 MB
USENIX Security 2016/USENIX Security 2016 Videos/PIkit A New Kernel-Independent Processor-Interconnect Rootkit.mp4
21.1 MB
USENIX Security 2018/USENIX Security 2018 Videos/Polisis - Automated Analysis and Presentation of Privacy Policies Using Deep Learning.mp4
21.0 MB
USENIX Security 2011/USENIX Security 2011 Videos/Telex Anticensorship in the Network Infrastructure - Eric Wustrow, Scott Wolchok, Ian Goldberg, J. Alex Halderman.mp4
21.0 MB
USENIX Security 2014/USENIX Security 2014 Full Proceedings.epub
21.0 MB
USENIX Security 2018/USENIX Security 2018 Videos/The Dangers of Key Reuse - Practical Attacks on IPsec IKE.mp4
20.9 MB
USENIX Security 2019/USENIX Security 2019 Video/Point Break A Study of Bandwidth Denial-of-Service Attacks against Tor.mp4
20.9 MB
USENIX Security 2010/USENIX Security 2010 Presentations/USENIX Security 2010 Proceedings.pdf
20.8 MB
USENIX Security 2018/USENIX Security 2018 Videos/Quack - Scalable Remote Measurement of Application-Layer Censorship.mp4
20.8 MB
USENIX Security 2016/USENIX Security 2016 Videos/Fingerprinting Electronic Control Units for Vehicle Intrusion Detection.mp4
20.8 MB
USENIX Security 2012/USENIX Security 2012 Videos/Enemy of the State A State-Aware Black-Box Web Vulnerability Scanner - Adam Doupe, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna.mp4
20.7 MB
USENIX Security 2018/USENIX Security 2018 Videos/Discovering Flaws in Security-Focused Static Analysis Tools for Android using Systematic Mutation.mp4
20.7 MB
USENIX Security 2016/USENIX Security 2016 Videos/Sanctum Minimal Hardware Extensions for Strong Software Isolation.mp4
20.7 MB
USENIX Security 2012/USENIX Security 2012 Videos/Origin-Bound Certificates A Fresh Approach to Strong Client Authentication for the Web - Michael Dietz, Alexei Czeskis, Dirk Balfanz, Dan S. Wallach.mp4
20.7 MB
USENIX Security 2009/USENIX Security 2009 Videos/GATEKEEPER Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code - Salvatore Guarnieri, Benjamin Livshits.mp4
20.6 MB
USENIX Security 2017/USENIX Security 2017 Videos/Locally Differentially Private Protocols for Frequency Estimation.mp4
20.6 MB
USENIX Security 2017/USENIX Security 2017 Videos/Vale - Verifying High-Performance Cryptographic Assembly Code.mp4
20.6 MB
USENIX Security 2016/USENIX Security 2016 Videos/Towards Measuring and Mitigating Social Engineering Software Download Attacks.mp4
20.6 MB
USENIX Security 2016/USENIX Security 2016 Videos/On Omitting Commits and Committing Omissions Preventing Git Metadata.mp4
20.6 MB
USENIX Security 2016/USENIX Security 2016 Videos/On Demystifying the Android Application Framework Re-Visiting Android.mp4
20.5 MB
USENIX Security 2019/USENIX Security 2019 Video/Probability Model Transforming Encoders Against Encoding Attacks.mp4
20.5 MB
USENIX Security 2018/USENIX Security 2018 Videos/NetHide - Secure and Practical Network Topology Obfuscation.mp4
20.5 MB
USENIX Security 2019/USENIX Security 2019 Video/Blind Bernoulli Trials A Noninteractive Protocol For Hidden-Weight Coin Flips.mp4
20.5 MB
USENIX Security 2019/USENIX Security 2019 Video/The Anatomy of a Cryptocurrency Pump-and-Dump Scheme.mp4
20.5 MB
USENIX Security 2016/USENIX Security 2016 Videos/Thoth Comprehensive Policy Compliance in Data Retrieval Systems.mp4
20.5 MB
USENIX Security 2016/USENIX Security 2016 Videos/You've Got Vulnerability Exploring Effective Vulnerability Notifications.mp4
20.5 MB
USENIX Security 2019/USENIX Security 2019 Video/From IP ID to Device ID and KASLR Bypass.mp4
20.4 MB
USENIX Security 2009/USENIX Security 2009 Videos/Peeping Tom in the Neighborhood Keystroke Eavesdropping on Multi-User Systems - Kehuan Zhang, XiaoFeng Wang.mp4
20.4 MB
USENIX Security 2018/USENIX Security 2018 Videos/A Sense of Time for JavaScript and Node.js.mp4
20.4 MB
USENIX Security 2018/USENIX Security 2018 Videos/DelegaTEE - Brokered Delegation Using Trusted Execution Environments.mp4
20.4 MB
USENIX Security 2012/USENIX Security 2012 Videos/Fuzzing with Code Fragments - Christian Holler, Kim Herzig, Andreas Zeller.mp4
20.4 MB
USENIX Security 2019/USENIX Security 2019 Video/Leaky Images Targeted Privacy Attacks in the Web.mp4
20.4 MB
USENIX Security 2012/USENIX Security 2012 Videos/kGuard Lightweight Kernel Protection against Return-to-User Attacks - Vasileios P. Kemerlis, Georgios Portokalidis, Angelos D. Keromytis.mp4
20.3 MB
USENIX Security 2018/USENIX Security 2018 Videos/Shielding Software From Privileged Side-Channel Attacks.mp4
20.3 MB
USENIX Security 2014/USENIX Security 2014 Videos/iSeeYou Disabling the MacBook Webcam Indicator LED - Matthew Brocker, Stephen Checkoway.mp4
20.3 MB
USENIX Security 2018/USENIX Security 2018 Videos/BurnBox - Self-Revocable Encryption in a World Of Compelled Access.mp4
20.3 MB
USENIX Security 2017/USENIX Security 2017 Videos/kAFL - Hardware-Assisted Feedback Fuzzing for OS Kernels.mp4
20.3 MB
USENIX Security 2014/USENIX Security 2014 Videos/JIGSAW Protecting Resource Access by Inferring Programmer Expectations - Hayawardh Vijayakumar, Xinyang Ge, Mathias Payer, Trent Jaeger.mp4
20.2 MB
USENIX Security 2017/USENIX Security 2017 Videos/Extension Breakdown.mp4
20.2 MB
FOCI 2014/Catching Bandits and Only Bandits Privacy-Preserving Intersection Warrants for Lawful.mp4
20.2 MB
USENIX Security 2014/USENIX Security 2014 Videos/XRay Enhancing the Web’s Transparency with Differential Correlation - Mathias Lecuyer, Guillaume Ducoffe, Francis Lan, Andrei Papancea, Theofilos Petsios, Riley Spahn, Augustin Cha.mp4
20.2 MB
USENIX Security 2016/USENIX Security 2016 Videos/Fast, Lean, and Accurate Modeling Password Guessability Using Neural Networks.mp4
20.2 MB
USENIX Security 2019/USENIX Security 2019 Video/Rendered Private Making GLSL Execution Uniform to Prevent WebGL-based.mp4
20.1 MB
USENIX Security 2016/USENIX Security 2016 Videos/FlowFence Practical Data Protection for Emerging IoT Application Frameworks.mp4
20.1 MB
USENIX Security 2019/USENIX Security 2019 Video/MOPT Optimized Mutation Scheduling for Fuzzers.mp4
20.1 MB
USENIX Security 2020/PEPR '20/PEPR 20 - Design of a Privacy Infrastructure for the Internet of Things.mp4
20.1 MB
USENIX Security 2017/USENIX Security 2017 Videos/Picking Up My Tab.mp4
20.0 MB
USENIX Security 2014/USENIX Security 2014 Videos/Static Detection of Second-Order Vulnerabilities in Web Applications - Johannes Dahse, Thorsten Holz.mp4
20.0 MB
USENIX Security 2019/USENIX Security 2019 Video/HardFails Insights into Software-Exploitable Hardware Bugs.mp4
20.0 MB
USENIX Security 2019/USENIX Security 2019 Video/in-toto Providing farm-to-table guarantees for bits and bytes.mp4
20.0 MB
USENIX Security 2019/USENIX Security 2019 Video/KEPLER Facilitating Control-flow Hijacking Primitive Evaluation for Linux.mp4
20.0 MB
USENIX Security 2018/USENIX Security 2018 Videos/QSYM - A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing.mp4
20.0 MB
USENIX Security 2019/USENIX Security 2019 Video/The KNOB is Broken Exploiting Low Entropy in the Encryption Key.mp4
19.9 MB
USENIX Security 2020/PEPR '20/PEPR 20 - Beyond the Individual Exploring Data Protection by Design in Connected Communal Spaces.mp4
19.9 MB
USENIX Security 2014/USENIX Security 2014 Videos/Burst ORAM Minimizing ORAM Response Times for Bursty Access Patterns - Jonathan Dautrich, University of California, Riverside - Emil Stefanov, Elaine Shi.mp4
19.9 MB
USENIX Security 2014/USENIX Security 2014 Videos/BareCloud Bare-metal Analysis-based Evasive Malware Detection - Dhilung Kirat, Giovanni Vigna, Christopher Kruegel.mp4
19.9 MB
USENIX Security 2018/USENIX Security 2018 Videos/All Your GPS Are Belong To Us - Towards Stealthy Manipulation of Road Navigation Systems.mp4
19.9 MB
USENIX Security 2014/USENIX Security 2014 Videos/SSOScan Automated Testing of Web Applications for Single Sign-On Vulnerabilities - Yuchen Zhou, David Evans.mp4
19.8 MB
USENIX Security 2018/USENIX Security 2018 Videos/Rampart - Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks.mp4
19.8 MB
USENIX Security 2014/USENIX Security 2014 Videos/Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens - Daniel Demmler, Thomas Schneider, Michael Zohner.mp4
19.8 MB
USENIX Security 2014/USENIX Security 2014 Videos/On the Effective Prevention of TLS Man-in-the-Middle Attacks in Web Applications - Nikolaos Karapanos, Srdjan Capkun.mp4
19.8 MB
USENIX Security 2014/USENIX Security 2014 Videos/TapDance End-to-Middle Anticensorship without Flow Blocking - Eric Wustrow, Colleen M. Swanson, J. Alex Halderman.mp4
19.8 MB
USENIX Security 2019/USENIX Security 2019 Video/FastKitten Practical Smart Contracts on Bitcoin.mp4
19.8 MB
USENIX Security 2012/USENIX Security 2012 Proceedings.pdf
19.8 MB
USENIX Security 2011/USENIX Security 2011 Videos/Outsourcing the Decryption of ABE Ciphertexts - Matthew Green, Susan Hohenberger, Brent Waters.mp4
19.8 MB
USENIX Security 2016/USENIX Security 2016 Videos/ARMageddon Cache Attacks on Mobile Devices.mp4
19.7 MB
USENIX Security 2014/USENIX Security 2014 Videos/Peeking into Your App without Actually Seeing It UI State Inference and Novel Android Attacks - Qi Alfred Chen, Zhiyun Qian, Z. Morley Mao.mp4
19.7 MB
USENIX Security 2017/USENIX Security 2017 Videos/DeTor - Provably Avoiding Geographic Regions in Tor.mp4
19.7 MB
USENIX Security 2016/USENIX Security 2016 Videos/k-fingerprinting A Robust Scalable Website Fingerprinting Technique.mp4
19.7 MB
USENIX Security 2016/USENIX Security 2016 Videos/One Bit Flips, One Cloud Flops Cross-VM Row Hammer Attacks.mp4
19.7 MB
USENIX Security 2014/USENIX Security 2014 Videos/Never Been KIST Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport - Rob Jansen, John Geddes, Chris Wacek, Micah Sherr, Paul Syverson.mp4
19.7 MB
USENIX Security 2018/USENIX Security 2018 Videos/Injected and Delivered - Fabricating Implicit Control over Actuation Systems by Spoofing.mp4
19.6 MB
USENIX Security 2016/USENIX Security 2016 Videos/An Empirical Study of Textual Key-Fingerprint Representations.mp4
19.6 MB
USENIX Security 2017/USENIX Security 2017 Videos/AutoLock - Why Cache Attacks on ARM Are Harder Than You Think.mp4
19.6 MB
USENIX Security 2016/USENIX Security 2016 Videos/Tracing Information Flows Between Ad Exchanges Using Retargeted Ads.mp4
19.5 MB
USENIX Security 2012/USENIX Security 2012 Videos/Throttling Tor Bandwidth Parasites - Rob Jansen, Paul Syverson, Nicholas Hopper.mp4
19.5 MB
USENIX Security 2019/USENIX Security 2019 Video/ATTACK2VEC Leveraging Temporal Word Embeddings to Understand the.mp4
19.5 MB
USENIX Security 2013/USENIX Security 2013 Videos/You Are How You Click Clickstream Analysis for Sybil Detection - Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng, Ben Y. Zhao.mp4
19.4 MB
USENIX Security 2018/USENIX Security 2018 Videos/Effective Detection of Multimedia Protocol Tunneling using Machine Learning.mp4
19.4 MB
USENIX Security 2018/USENIX Security 2018 Videos/FlowCog - Context-aware Semantics Extraction and Analysis of Information Flow Leaks in Android Apps.mp4
19.4 MB
USENIX Security 2014/USENIX Security 2014 Videos/SpanDex Secure Password Tracking for Android - Landon P. Cox , Peter Gilbert, Geoffrey Lawler, Valentin Pistol, Ali Razeen, Bi Wu, Sai Cheemalapati.mp4
19.4 MB
USENIX Security 2014/USENIX Security 2014 Videos/Towards Reliable Storage of 56-bit Secrets in Human Memory - Joseph Bonneau, Stuart Schechter.mp4
19.4 MB
USENIX Security 2019/USENIX Security 2019 Video/Origin-sensitive Control Flow Integrity.mp4
19.4 MB
USENIX Security 2019/USENIX Security 2019 Video/EverParse Verified Secure Zero-Copy Parsers for Authenticated Message Formats.mp4
19.4 MB
USENIX Security 2017/USENIX Security 2017 Videos/ORide - A Privacy-Preserving yet Accountable Ride-Hailing Service.mp4
19.4 MB
USENIX Security 2019/USENIX Security 2019 Video/Why Do Adversarial Attacks Transfer Explaining Transferability of.mp4
19.3 MB
USENIX Security 2015/USENIX Security 2015 Videos/The Unexpected Dangers of Dynamic JavaScript.mp4
19.3 MB
USENIX Security 2014/USENIX Security 2014 Videos/Faster Private Set Intersection Based on OT Extension - Benny Pinkas, Thomas Schneider, Michael Zohner.mp4
19.3 MB
USENIX Security 2016/USENIX Security 2016 Videos/Lock It and Still Lose It -on the (In)Security of Automotive Remote Keyless.mp4
19.3 MB
USENIX Security 2019/USENIX Security 2019 Video/The Web's Identity Crisis Understanding the Effectiveness of Website Identity.mp4
19.3 MB
USENIX Security 2010/USENIX Security 2010 Videos/Automatic Generation of Remediation Procedures for Malware Infections - Michael Backes, Markus Durmuth, Sebastian Gerling, Manfred Pinkal, Caroline Sporleder.mp4
19.3 MB
USENIX Security 2019/USENIX Security 2019 Video/Users Really Do Answer Telephone Scams.mp4
19.3 MB
USENIX Security 2016/USENIX Security 2016 Videos/Faster Malicious 2-Party Secure Computation with Online Offline Dual Execution.mp4
19.3 MB
USENIX Security 2016/USENIX Security 2016 Videos/DRAMA Exploiting DRAM Addressing for Cross-CPU Attacks.mp4
19.2 MB
USENIX Security 2019/USENIX Security 2019 Video/Understanding and Improving Security and Privacy in Multi-User.mp4
19.2 MB
USENIX Security 2019/USENIX Security 2019 Video/Discovering and Understanding the Security Hazards in the.mp4
19.2 MB
USENIX Security 2014/USENIX Security 2014 Videos/The Emperor’s New Password Manager Security Analysis of Web-based Password Managers - Zhiwei Li, Warren He, Devdatta Akhawe, Dawn Song.mp4
19.2 MB
USENIX Security 2018/USENIX Security 2018 Videos/Meltdown - Reading Kernel Memory from User Space.mp4
19.1 MB
USENIX Security 2018/USENIX Security 2018 Videos/Turning Your Weakness Into a Strength - Watermarking Deep Neural Networks by Backdooring.mp4
19.1 MB
USENIX Security 2013/USENIX Security 2013 Videos/Greystar Fast and Accurate Detection of SMS Spam Numbers in Large Cellular Networks Using Gray Phone Space - Nan Jiang, Yu Jin, Ann Skudlark, Zhi-Li Zhang.mp4
19.1 MB
USENIX Security 2014/USENIX Security 2014 Videos/Man vs. Machine Practical Adversarial Detection of Malicious Crowdsourcing Workers - Gang Wang, Tianyi Wang, Santa Barbara, Haitao Zheng, Ben Y. Zhao.mp4
19.1 MB
USENIX Security 2019/USENIX Security 2019 Video/Platforms in Everything Analyzing Ground-Truth Data on the Anatomy and.mp4
19.1 MB
USENIX Security 2017/USENIX Security 2017 Videos/A Longitudinal, End-to-End View of the DNSSEC Ecosystem.mp4
19.1 MB
USENIX Security 2013/USENIX Security 2013 Videos/Revolver An Automated Approach to the Detection of Evasive Web-based Malware - Alexandros Kapravelos, Yan Shoshitaishvili, Marco Cova, Christopher Kruegel, Giovanni Vigna.mp4
19.1 MB
USENIX Security 2011/USENIX Security 2011 Proceedings.epub
19.0 MB
USENIX Security 2016/USENIX Security 2016 Videos/An In-Depth Analysis of Disassembly on Full-Scale x86 x64 Binaries.mp4
19.0 MB
USENIX Security 2016/USENIX Security 2016 Videos/APISan Sanitizing API Usages through Semantic Cross-Checking.mp4
19.0 MB
USENIX Security 2019/USENIX Security 2019 Video/Understanding and Securing Device Vulnerabilities through.mp4
19.0 MB
USENIX Security 2019/USENIX Security 2019 Video/A Billion Open Interfaces for Eve and Mallory MitM, DoS, and Tracking.mp4
18.9 MB
USENIX Security 2014/USENIX Security 2014 Videos/Optimizing Seed Selection for Fuzzing - Alexandre Rebert, Sang Kil Cha, Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, David Brumley.mp4
18.9 MB
USENIX Security 2018/USENIX Security 2018 Videos/An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications.mp4
18.9 MB
USENIX Security 2014/USENIX Security 2014 Videos/FLUSH-RELOAD A High Resolution, Low Noise, L3 Cache Side-Channel Attack - Yuval Yarom, Katrina Falkner.mp4
18.9 MB
USENIX Security 2019/USENIX Security 2019 Video/JEDI Many-to-Many End-to-End Encryption and Key Delegation for IoT.mp4
18.9 MB
USENIX Security 2019/USENIX Security 2019 Video/UWB-ED Distance Enlargement Attack Detection in Ultra-Wideband.mp4
18.9 MB
USENIX Security 2014/USENIX Security 2014 Videos/Telepathwords Preventing Weak Passwords by Reading Users’ Minds - Saranga Komanduri, Richard Shay, Lorrie Faith Cranor, Cormac Herley Stuart Schechter.mp4
18.8 MB
USENIX Security 2017/USENIX Security 2017 Videos/Reverse Engineering x86 Processor Microcode.mp4
18.8 MB
USENIX Security 2019/USENIX Security 2019 Video/RVFuzzer Finding Input Validation Bugs in Robotic Vehicles through.mp4
18.8 MB
USENIX Security 2019/USENIX Security 2019 Video/WAVE A Decentralized Authorization Framework with Transitive Delegation.mp4
18.8 MB
USENIX Security 2012/USENIX Security 2012 Videos/Tracking Rootkit Footprints with a Practical Memory Analysis System - Weidong Cui, Marcus Peinado, Zhilei Xu, Ellick Chan.mp4
18.8 MB
USENIX Security 2017/USENIX Security 2017 Videos/Ninja - Towards Transparent Tracing and Debugging on ARM.mp4
18.8 MB
USENIX Security 2014/USENIX Security 2014 Videos/A Large-Scale Analysis of the Security of Embedded Firmwares - Andrei Costin, Jonas Zaddach, Aurelien Francillon, and Davide Balzarotti.mp4
18.8 MB
USENIX Security 2016/USENIX Security 2016 Videos/Optimized Invariant Representation of Network Traffic for Detecting Unseen.mp4
18.8 MB
USENIX Security 2016/USENIX Security 2016 Videos/Virtual U Defeating Face Liveness Detection by Building Virtual Models.mp4
18.8 MB
USENIX Security 2018/USENIX Security 2018 Videos/The Broken Shield - Measuring Revocation Effectiveness in the Windows Code-Signing PKI.mp4
18.7 MB
USENIX Security 2014/USENIX Security 2014 Videos/Password Portfolios and the Finite-Effort User Sustainably Managing Large Numbers of Accounts - Dinei Florencio, Cormac Herley, Paul C. van Oorschot.mp4
18.7 MB
USENIX Security 2019/USENIX Security 2019 Video/Everyone is Different Client-side Diversification for Defending.mp4
18.7 MB
USENIX Security 2014/USENIX Security 2014 Videos/From the Aether to the Ethernet-Attacking the Internet using Broadcast Digital Television - Yossef Oren, Angelos D. Keromytis.mp4
18.7 MB
USENIX Security 2018/USENIX Security 2018 Videos/The Guard's Dilemma - Efficient Code-Reuse Attacks Against Intel SGX.mp4
18.7 MB
USENIX Security 2019/USENIX Security 2019 Video/The Betrayal At Cloud City An Empirical Analysis Of Cloud-Based Mobile.mp4
18.7 MB
USENIX Security 2014/USENIX Security 2014 Videos/A Bayesian Approach to Privacy Enforcement in Smartphones - Omer Tripp, Julia Rubin.mp4
18.6 MB
USENIX Security 2018/USENIX Security 2018 Videos/Charm - Facilitating Dynamic Analysis of Device Drivers of Mobile Systems.mp4
18.6 MB
USENIX Security 2013/USENIX Security 2013 Videos/Impression Fraud in On-line Advertising via Pay-Per-View Networks - Kevin Springborn, Paul Barford.mp4
18.6 MB
USENIX Security 2016/USENIX Security 2016 Videos/Protecting Privacy of BLE Device Users.mp4
18.6 MB
USENIX Security 2020/PEPR '20/PEPR 20 - A Differentially Private Data Analytics API at Scale.mp4
18.5 MB
USENIX Security 2019/USENIX Security 2019 Video/Reading the Tea leaves A Comparative Analysis of Threat Intelligence.mp4
18.4 MB
USENIX Security 2017/USENIX Security 2017 Videos/Exploring User Perceptions of Discrimination in Online Targeted Advertising.mp4
18.4 MB
USENIX Security 2016/USENIX Security 2016 Videos/Enhancing Bitcoin Security and Performance with Strong Consistency via.mp4
18.4 MB
USENIX Security 2017/USENIX Security 2017 Videos/Efficient Protection of Path-Sensitive Control Security.mp4
18.4 MB
USENIX Security 2012/USENIX Security 2012 Videos/Privilege Separation in HTML5 Applications - Devdatta Akhawe, Prateek Saxena, Dawn Song.mp4
18.4 MB
USENIX Security 2017/USENIX Security 2017 Videos/BootStomp - On the Security of Bootloaders in Mobile Devices.mp4
18.4 MB
USENIX Security 2020/FOCI '20/FOCI 20 - Turbo Tunnel, a good way to design censorship circumvention protocols.mp4
18.4 MB
USENIX Security 2014/USENIX Security 2014 Videos/Gyrophone Recognizing Speech from Gyroscope Signals - Yan Michalevsky, Dan Boneh, Gabi Nakibly.mp4
18.4 MB
USENIX Security 2019/USENIX Security 2019 Video/Johnny, you are fired - Spoofing OpenPGP and S MIME Signatures in Emails.mp4
18.4 MB
USENIX Security 2014/USENIX Security 2014 Videos/Privacy in Pharmacogenetics An End-to-End Case Study of Personalized Warfarin Dosing - Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon Lin, David Page, Thomas Ristenpart.mp4
18.4 MB
USENIX Security 2016/USENIX Security 2016 Videos/Website-Targeted False Content Injection by Network Operators.mp4
18.4 MB
USENIX Security 2012/USENIX Security 2012 Videos/Taking Proof-Based Verified Computation a Few Steps Closer to Practicality - Srinath Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Andrew J. Blumberg, Michael Walfish.mp4
18.3 MB
USENIX Security 2018/USENIX Security 2018 Videos/Vetting Single Sign-On SDK Implementations via Symbolic Reasoning.mp4
18.3 MB
USENIX Security 2019/USENIX Security 2019 Video/ScatterCache Thwarting Cache Attacks via Cache Set Randomization.mp4
18.3 MB
USENIX Security 2014/USENIX Security 2014 Videos/An Internet-Wide View of Internet-Wide Scanning - Zakir Durumeric, Michael Bailey, J. Alex Halderman.mp4
18.3 MB
USENIX Security 2014/USENIX Security 2014 Videos/X-Force Force-Executing Binary Programs for Security Applications - Fei Peng, Zhui Deng, Xiangyu Zhang, Dongyan Xu, Zhiqiang Lin, Zhendong Su.mp4
18.3 MB
USENIX Security 2014/USENIX Security 2014 Videos/BYTEWEIGHT Learning to Recognize Functions in Binary Code - Tiffany Bao, Jonathan Burket, Maverick Woo, Rafael Turner, David Brumley.mp4
18.2 MB
USENIX Security 2014/USENIX Security 2014 Videos/Towards Detecting Anomalous User Behavior in Online Social Networks - Bimal Viswanath, M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna P. Gummadi, Max Planck, Balachander Kris.mp4
18.2 MB
USENIX Security 2018/USENIX Security 2018 Videos/Forgetting of Passwords - Ecological Theory and Data.mp4
18.2 MB
USENIX Security 2014/USENIX Security 2014 Videos/DSCRETE Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse - Brendan Saltaformaggio, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu.mp4
18.2 MB
USENIX Security 2020/PEPR '20/PEPR 20 - How to (In)Effectively Convey Privacy Choices with Icons and Link Text.mp4
18.1 MB
USENIX Security 2015/USENIX Security 2015 Videos/RAPTOR - Routing Attacks on Privacy in Tor.mp4
18.1 MB
FOCI 2014/Security Audit of Safeplug - Tor in a Box.mp4
18.1 MB
USENIX Security 2019/USENIX Security 2019 Video/Less is More Quantifying the Security Benefits of Debloating Web Applications.mp4
18.1 MB
USENIX Security 2016/USENIX Security 2016 Videos/Ariadne A Minimal Approach to State Continuity.mp4
18.1 MB
USENIX Security 2014/USENIX Security 2014 Videos/Precise Client-side Protection against DOM-based Cross-Site Scripting - Ben Stock, Sebastian Lekies, Tobias Mueller, Patrick Spiegel, and Martin Johns.mp4
18.1 MB
USENIX Security 2019/USENIX Security 2019 Video/Pythia Remote Oracles for the Masses.mp4
18.1 MB
USENIX Security 2016/USENIX Security 2016 Videos/You Are Who You Know and How You Behave Attribute Inference Attacks.mp4
18.0 MB
USENIX Security 2014/USENIX Security 2014 Videos/Understanding the Dark Side of Domain Parking - Sumayah Alrwais, Kan Yuan, Eihal Alowaisheq, Zhou Li, XiaoFeng Wang.mp4
18.0 MB
USENIX Security 2014/USENIX Security 2014 Videos/USENIX Security 2014 Opening Remarks and Awards - Kevin Fu.mp4
18.0 MB
USENIX Security 2018/USENIX Security 2018 Videos/Man-in-the-Machine - Exploiting Ill-Secured Communication Inside the Computer.mp4
18.0 MB
USENIX Security 2014/USENIX Security 2014 Videos/Targeted Threat Index Characterizing and Quantifying Politically-Motivated Targeted Malware - Seth Hardy, Masashi Crete-Nishihata, Katharine Kleemola, Adam Senft, Byron Sonne, Greg.mp4
18.0 MB
USENIX Security 2018/USENIX Security 2018 Videos/Off-Path TCP Exploit - How Wireless Routers Can Jeopardize Your Secrets.mp4
18.0 MB
USENIX Security 2019/USENIX Security 2019 Video/Iframes Popups Are Dangerous in Mobile WebView Studying and.mp4
18.0 MB
USENIX Security 2019/USENIX Security 2019 Video/RAZOR A Framework for Post-deployment Software Debloating.mp4
18.0 MB
USENIX Security 2018/USENIX Security 2018 Videos/Formal Security Analysis of Neural Networks using Symbolic Intervals.mp4
17.9 MB
USENIX Security 2020/CSET '20/CSET 20 - Expansion of ICS Testbed for Security Validation based on MITRE ATT&CK Techniques.mp4
17.9 MB
USENIX Security 2014/USENIX Security 2014 Videos/On the Feasibility of Large-Scale Infections of iOS Devices - Tielei Wang, Yeongjin Jang, Yizheng Chen, Simon Chung, Billy Lau, Wenke Lee.mp4
17.9 MB
USENIX Security 2019/USENIX Security 2019 Video/Detecting and Characterizing Lateral Phishing at Scale.mp4
17.9 MB
USENIX Security 2019/USENIX Security 2019 Video/BITE Bitcoin Lightweight Client Privacy using Trusted Execution.mp4
17.9 MB
USENIX Security 2018/USENIX Security 2018 Videos/Automatic Heap Layout Manipulation for Exploitation.mp4
17.9 MB
USENIX Security 2014/USENIX Security 2014 Videos/Hulk Eliciting Malicious Behavior in Browser Extensions - Alexandros Kapravelos, Chris Grier, Neha Chachra, Christopher Kruegel, Giovanni Vigna, Vern Paxson.mp4
17.8 MB
USENIX Security 2016/USENIX Security 2016 Videos/Flip Feng Shui Hammering a Needle in the Software Stack.mp4
17.8 MB
USENIX Security 2016/USENIX Security 2016 Videos/Harvesting Inconsistent Security Configurations in Custom Android ROMs.mp4
17.8 MB
USENIX Security 2018/USENIX Security 2018 Videos/Who Is Answering My Queries - Understanding and Characterizing Interception.mp4
17.8 MB
USENIX Security 2018/USENIX Security 2018 Videos/The Secure Socket API - TLS as an Operating System Service.mp4
17.8 MB
USENIX Security 2019/USENIX Security 2019 Video/Clinical Computer Security for Victims of Intimate Partner Violence.mp4
17.8 MB
USENIX Security 2014/USENIX Security 2014 Videos/Brahmastra Driving Apps to Test the Security of Third-Party Components - Ravi Bhoraskar, Seungyeop Han, Jinseong Jeon, Tanzirul Azim, Shuo Chen, Jaeyeon Jung, Suman Nath, Rui Wang.mp4
17.8 MB
USENIX Security 2019/USENIX Security 2019 Video/Terminal Brain Damage Exposing the Graceless Degradation in Deep.mp4
17.8 MB
USENIX Security 2019/USENIX Security 2019 Video/ALOHA Auxiliary Loss Optimization for Hypothesis Augmentation.mp4
17.8 MB
USENIX Security 2014/USENIX Security 2014 Videos/Scheduler-based Defenses against Cross-VM Side-channels - Venkatanathan Varadarajan, Thomas Ristenpart, Michael Swift.mp4
17.7 MB
USENIX Security 2012/USENIX Security 2012 Videos/Efficient and Scalable Socware Detection in Online Social Networks - Md Sazzadur Rahman, Ting-Kai Huang, Harsha V. Madhyastha, Michalis Faloutsos.mp4
17.7 MB
USENIX Security 2017/USENIX Security 2017 Videos/Opening Remarks and Awards.mp4
17.7 MB
USENIX Security 2018/USENIX Security 2018 Videos/ATtention Spanned - Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem.mp4
17.6 MB
USENIX Security 2018/USENIX Security 2018 Videos/The Battle for New York - A Case Study of Applied Digital Threat Modeling at the Enterprise Level.mp4
17.6 MB
USENIX Security 2014/USENIX Security 2014 Videos/Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM - Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, Ulfar Erlingsson, Luis Lozano, Geoff Pike.mp4
17.6 MB
USENIX Security 2020/PEPR '20/PEPR 20 - Engineering Ethics into the NIST Privacy Framework.mp4
17.6 MB
USENIX Security 2014/USENIX Security 2014 Videos/Preventing Cryptographic Key Leakage in Cloud Virtual Machines - Erman Pattuk, Murat Kantarcioglu, Zhiqiang Lin, Huseyin Ulusoy.mp4
17.6 MB
USENIX Security 2014/USENIX Security 2014 Videos/Effective Attacks and Provable Defenses for Website Fingerprinting - Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, Ian Goldberg.mp4
17.5 MB
USENIX Security 2016/USENIX Security 2016 Videos/Defending against Malicious Peripherals with Cinch.mp4
17.5 MB
USENIX Security 2014/USENIX Security 2014 Videos/A Large-Scale Empirical Analysis of Chinese Web Passwords - Zhigong Li, Weili Han, Wenyuan Xu.mp4
17.5 MB
USENIX Security 2014/USENIX Security 2014 Videos/Password Managers Attacks and Defenses - David Silver, Suman Jana, and Dan Boneh, Stanford University - Eric Chen, Collin Jackson.mp4
17.4 MB
USENIX Security 2018/USENIX Security 2018 Videos/Sensitive Information Tracking in Commodity IoT.mp4
17.4 MB
USENIX Security 2019/USENIX Security 2019 Video/High Precision Detection of Business Email Compromise.mp4
17.4 MB
USENIX Security 2018/USENIX Security 2018 Videos/CommanderSong - A Systematic Approach for Practical Adversarial Voice Recognition.mp4
17.4 MB
USENIX Security 2016/USENIX Security 2016 Videos/What Cannot Be Read, Cannot Be Leveraged Revisiting Assumptions of JIT-ROP.mp4
17.4 MB
USENIX Security 2018/USENIX Security 2018 Videos/Guarder - A Tunable Secure Allocator.mp4
17.4 MB
USENIX Security 2020/PEPR '20/PEPR 20 - Beyond Access Using Abac Frameworks to Implement Privacy and Security Policies.mp4
17.4 MB
USENIX Security 2014/USENIX Security 2014 Videos/Mimesis Aegis A Mimicry Privacy Shield-A System’s Approach to Data Privacy on Public Cloud - Billy Lau, Simon Chung, Chengyu Song, Yeongjin Jang, Wenke Lee, Alexandra Boldyreva.mp4
17.4 MB
USENIX Security 2018/USENIX Security 2018 Videos/Fear the Reaper - Characterization and Fast Detection of Card Skimmers.mp4
17.3 MB
USENIX Security 2016/USENIX Security 2016 Videos/Automatically Detecting Error Handling Bugs Using Error Specifications.mp4
17.3 MB
USENIX Security 2014/USENIX Security 2014 Videos/Cardinal Pill Testing of System Virtual Machines - Hao Shi, Abdulla Alwabel, Jelena Mirkovic.mp4
17.3 MB
USENIX Security 2021/EVMPatch Timely and Automated Patching of Ethereum Smart Contracts.mp4
17.3 MB
USENIX Security 2014/USENIX Security 2014 Videos/Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture - Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza.mp4
17.3 MB
USENIX Security 2019/USENIX Security 2019 Video/PeX A Permission Check Analysis Framework for Linux Kernel.mp4
17.2 MB
USENIX Security 2020/PEPR '20/PEPR 20 - Responsible Design through Experimentation Learnings from LinkedIn.mp4
17.2 MB
USENIX Security 2019/USENIX Security 2019 Video/Protecting Cloud Virtual Machines from Hypervisor and Host Operating.mp4
17.2 MB
USENIX Security 2018/USENIX Security 2018 Videos/An Empirical Analysis of Anonymity in Zcash.mp4
17.2 MB
USENIX Security 2019/USENIX Security 2019 Video/Stack Overflow Considered Helpful Deep Learning Security Nudges Towards.mp4
17.2 MB
USENIX Security 2018/USENIX Security 2018 Videos/Precise and Accurate Patch Presence Test for Binaries.mp4
17.2 MB
USENIX Security 2016/USENIX Security 2016 Videos/ZKBoo Faster Zero-Knowledge for Boolean Circuits.mp4
17.1 MB
USENIX Security 2018/USENIX Security 2018 Videos/From Patching Delays to Infection Symptoms.mp4
17.1 MB
USENIX Security 2018/USENIX Security 2018 Videos/Return Of Bleichenbacher's Oracle Threat (ROBOT).mp4
17.1 MB
USENIX Security 2019/USENIX Security 2019 Video/Mobile Private Contact Discovery at Scale.mp4
17.1 MB
USENIX Security 2014/USENIX Security 2014 Videos/Privee An Architecture for Automatically Analyzing Web Privacy Policies -Sebastian Zimmeck, Steven M. Bellovin.mp4
17.1 MB
CSET 2020/Expansion of ICS Testbed for Security Validation based on MITRE ATT&CK Techniques.mp4
17.0 MB
USENIX Security 2019/USENIX Security 2019 Video/Seeing is Not Believing Camouflage Attacks on Image Scaling Algorithms.mp4
17.0 MB
USENIX Security 2014/USENIX Security 2014 Videos/Z0 An Optimizing Distributing Zero-Knowledge Compiler - Matthew Fredrikson, Benjamin Livshits.mp4
17.0 MB
USENIX Security 2018/USENIX Security 2018 Videos/Fast and Service-preserving Recovery from Malware Infections Using CRIU.mp4
17.0 MB
USENIX Security 2020/FOCI '20/FOCI 20 - Opening Digital Borders Cautiously yet Decisively Digital Filtering in Saudi Arabia.mp4
17.0 MB
USENIX Security 2014/USENIX Security 2014 Videos/Exit from Hell Reducing the Impact of Amplification DDoS Attacks - Marc Kuhrer, Thomas Hupperich, Christian Rossow, Thorsten Holz.mp4
17.0 MB
USENIX Security 2016/USENIX Security 2016 Videos/OblivP2P An Oblivious Peer-to-Peer Content Sharing System.mp4
17.0 MB
USENIX Security 2019/USENIX Security 2019 Video/EnFuzz Ensemble Fuzzing with Seed Synchronization among Diverse Fuzzers.mp4
16.9 MB
USENIX Security 2016/USENIX Security 2016 Videos/Undermining Information Hiding (and What to Do about It).mp4
16.9 MB
USENIX Security 2018/USENIX Security 2018 Videos/O Single Sign-Off, Where Art Thou An Empirical Analysis of Single Sign-On.mp4
16.8 MB
USENIX Security 2020/PEPR '20/PEPR 20 - Improving Usability of Differential Privacy at Scale.mp4
16.8 MB
USENIX Security 2020/CSET '20/CSET 20 - Towards Adversarial Phishing Detection.mp4
16.8 MB
USENIX Security 2014/USENIX Security 2014 Videos/Revisiting SSLTLS Implementations New Bleichenbacher Side Channels and Attacks - Christopher Meyer, Juraj Somorovsky, Eugen Weiss, Jorg Schwenk, Sebastian Schinzel, Erik Tews.mp4
16.7 MB
USENIX Security 2019/USENIX Security 2019 Video/When the Signal is in the Noise Exploiting Diffix's Sticky Noise.mp4
16.7 MB
USENIX Security 2019/USENIX Security 2019 Video/Cognitive Triaging of Phishing Attacks.mp4
16.7 MB
USENIX Security 2018/USENIX Security 2018 Videos/How Do Tor Users Interact With Onion Services.mp4
16.7 MB
USENIX Security 2018/USENIX Security 2018 Videos/Malicious Management Unit - Why Stopping Cache Attacks in Software is Harder Than You Think.mp4
16.7 MB
USENIX Security 2014/USENIX Security 2014 Videos/TRUESET Faster Verifiable et Computations - Ahmed E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Mahmoud F. Sayed, Elaine Shi, Nikos Triandopoulos.mp4
16.7 MB
USENIX Security 2018/USENIX Security 2018 Videos/Inception - System-Wide Security Testing of Real-World Embedded Systems Software.mp4
16.7 MB
USENIX Security 2019/USENIX Security 2019 Video/Exploiting Unprotected I O Operations in AMD's Secure Encrypted Virtualization.mp4
16.6 MB
USENIX Security 2020/PEPR '20/PEPR 20 - Wikipedia and the Lean Data Diet.mp4
16.6 MB
USENIX Security 2019/USENIX Security 2019 Video/Towards the Detection of Inconsistencies in Public Security.mp4
16.6 MB
USENIX Security 2018/USENIX Security 2018 Videos/Arbitrum - Scalable, private smart contracts.mp4
16.6 MB
USENIX Security 2019/USENIX Security 2019 Video/DEEPVSA Facilitating Value-set Analysis with Deep Learning for.mp4
16.6 MB
USENIX Security 2016/USENIX Security 2016 Videos/DROWN Breaking TLS Using SSLv2.mp4
16.5 MB
USENIX Security 2019/USENIX Security 2019 Video/SPOILER Speculative Load Hazards Boost Rowhammer and Cache Attacks.mp4
16.5 MB
USENIX Security 2020/USENIX Security 2020 Videos/The Unpatchable Silicon A Full Break of the Bitstream Encryption of Xilinx.mp4
16.5 MB
USENIX Security 2014/USENIX Security 2014 Videos/When Governments Hack Opponents A Look at Actors and Technology - William R. Marczak, John Scott-Railton, Morgan Marquis-Boire, Vern Paxson.mp4
16.5 MB
USENIX Security 2018/USENIX Security 2018 Videos/Enabling Refinable Cross-Host Attack Investigation with Efficient Data Flow Tagging and Tracking.mp4
16.5 MB
USENIX Security 2014/USENIX Security 2014 Videos/SDDR Light-Weight, Secure Mobile Encounters - Matthew Lentz, Viktor Erdélyi, Paarijaat Aditya, Elaine Shi, Peter Druschel, Bobby Bhattacharjee.mp4
16.4 MB
USENIX Security 2018/USENIX Security 2018 Videos/End-Users Get Maneuvered - Empirical Analysis of Redirection Hijacking in Content Delivery Networks.mp4
16.4 MB
ScAINet 2020/Combating Social Media Information Operations with Neural Language Models.mp4
16.4 MB
USENIX Security 2018/USENIX Security 2018 Videos/DATA - Differential Address Trace Analysis - Finding Address-based Side-Channels in Binaries.mp4
16.4 MB
USENIX Security 2014/USENIX Security 2014 Videos/LibFTE A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes - Daniel Luchaup, Kevin P. Dyer, Somesh Jha, Thomas Ristenpart, Thomas Shrimpton.mp4
16.3 MB
USENIX Security 2018/USENIX Security 2018 Videos/AttriGuard - A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning.mp4
16.3 MB
USENIX Security 2019/USENIX Security 2019 Video/Tracing Transactions Across Cryptocurrency Ledgers.mp4
16.2 MB
USENIX Security 2014/USENIX Security 2014 Videos/Dynamic Hooks Hiding Control Flow Changes within Non-Control Data - Sebastian Vogl, Robert Gawlik, Behrad Garmany, Thomas Kittel, Jonas Pfoh, Claudia Eckert, Thorsten Holz.mp4
16.2 MB
USENIX Security 2020/PEPR '20/PEPR 20 - Building and Deploying a Privacy Preserving Data Analysis Platform.mp4
16.2 MB
USENIX Security 2018/USENIX Security 2018 Videos/Practical Accountability of Secret Processes.mp4
16.1 MB
USENIX Security 2021/Risky Business Investigating the Security Practices of Vendors on an Online.mp4
16.1 MB
USENIX Security 2018/USENIX Security 2018 Videos/Debloating Software through Piece-Wise Compilation and Loading.mp4
16.1 MB
CSET 2020/Towards Adversarial Phishing Detection.mp4
16.1 MB
USENIX Security 2019/USENIX Security 2019 Video/The Art of The Scam Demystifying Honeypots in Ethereum Smart Contracts.mp4
16.1 MB
USENIX Security 2019/USENIX Security 2019 Video/Detecting Missing-Check Bugs via Semantic- and Context-Aware.mp4
16.1 MB
USENIX Security 2016/USENIX Security 2016 Videos/The Cut-and-Choose Game and Its Application to Cryptographic Protocols.mp4
16.1 MB
USENIX Security 2019/USENIX Security 2019 Video/StrongChain Transparent and Collaborative Proof-of-Work Consensus.mp4
16.0 MB
USENIX Security 2019/USENIX Security 2019 Video/All Things Considered An Analysis of IoT Devices on Home Networks.mp4
16.0 MB
USENIX Security 2018/USENIX Security 2018 Videos/Tackling runtime-based obfuscation in Android with TIRO.mp4
15.9 MB
USENIX Security 2018/USENIX Security 2018 Videos/Freezing the Web - A Study of ReDoS Vulnerabilities in JavaScript-based Web Servers.mp4
15.9 MB
USENIX Security 2018/USENIX Security 2018 Videos/Reading Thieves' Cant - Automatically Identifying and Understanding Dark Jargons from Cybercrime.mp4
15.9 MB
USENIX Security 2014/USENIX Security 2014 Videos/ASM A Programmable Interface for Extending Android Security - Stephan Heuser, Adwait Nadkarni, William Enck, Ahmad-Reza Sadeghi.mp4
15.8 MB
USENIX Security 2020/PEPR '20/PEPR 20 - Taking Responsibility for Someone Elses Code Studying the Privacy Behaviors of Mobile.mp4
15.8 MB
USENIX Security 2020/CSET '20/CSET 20 - On Design and Enhancement of Smart Grid Honeypot System for Practical Collection....mp4
15.8 MB
USENIX Security 2018/USENIX Security 2018 Videos/Efail - Breaking S MIME and OpenPGP Email Encryption using Exfiltration Channels.mp4
15.8 MB
USENIX Security 2014/USENIX Security 2014 Videos/Automatically Detecting Vulnerable Websites Before They Turn Malicious - Kyle Soska Nicolas Christin.mp4
15.7 MB
USENIX Security 2014/USENIX Security 2014 Videos/ret2dir Rethinking Kernel Isolation - Vasileios P. Kemerlis, Michalis Polychronakis, Angelos D. Keromytis.mp4
15.6 MB
USENIX Security 2018/USENIX Security 2018 Videos/Fp-Scanner - The Privacy Implications of Browser Fingerprint Inconsistencies.mp4
15.6 MB
USENIX Security 2018/USENIX Security 2018 Videos/Erays - Reverse Engineering Ethereum's Opaque Smart Contracts.mp4
15.6 MB
USENIX Security 2011/USENIX Security 2011 Presentations/Toward Secure Embedded Web Interfaces Slides - Baptiste Gourdin, Chinmay Soman, Hristo Bojinov, Elie Bursztein.pdf
15.6 MB
USENIX Security 2020/ScAINet '20/ScAINet 20 - Combating Social Media Information Operations with Neural Language Models.mp4
15.6 MB
USENIX Security 2019/USENIX Security 2019 Video/XONN XNOR-based Oblivious Deep Neural Network Inference.mp4
15.6 MB
USENIX Security 2018/USENIX Security 2018 Videos/SAD THUG - Structural Anomaly Detection for Transmissions of High-value Information Using Graphics.mp4
15.5 MB
CSET 2020/On Design and Enhancement of Smart Grid Honeypot System for Practical Collection.mp4
15.5 MB
ScAINet 2020/On Adaptive Attacks to Adversarial Example Defenses.mp4
15.5 MB
USENIX Security 2019/USENIX Security 2019 Video/Looking from the Mirror Evaluating IoT Device Security through.mp4
15.5 MB
USENIX Security 2014/USENIX Security 2014 Videos/On the Practical Exploitability of Dual EC in TLS Implementations - Stephen Checkoway, Matthew Fredrikson, Ruben Niederhagen, Adam Everspaugh, Matthew Green, Tanja Lange, Thomas Ri.mp4
15.5 MB
USENIX Security 2014/USENIX Security 2014 Videos/A Look at Targeted Attacks Through the Lense of an NGO - Stevens Le Blond, Adina Uritesc, Cedric Gilbert, Zheng Leong Chua, Prateek Saxena, Engin Kirda.mp4
15.5 MB
USENIX Security 2013/USENIX Security 2013 Videos/PCF A Portable Circuit Format for Scalable Two-Party Secure Computation - Ben Kreuter, Benjamin Mood, Abhi Shelat, Kevin Butler.mp4
15.4 MB
USENIX Security 2019/USENIX Security 2019 Video/Robust Website Fingerprinting Through the Cache Occupancy Channel.mp4
15.4 MB
USENIX Security 2019/USENIX Security 2019 Video/Computer Security and Privacy in the Interactions Between Victim.mp4
15.4 MB
USENIX Security 2014/USENIX Security 2014 Videos/Stitching the Gadgets On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection - Lucas Davi, Ahmad-Reza Sadeghi, Daniel Lehmann, Fabian Monrose.mp4
15.3 MB
USENIX Security 2019/USENIX Security 2019 Video/A Systematic Evaluation of Transient Execution Attacks and Defenses.mp4
15.3 MB
USENIX Security 2018/USENIX Security 2018 Videos/Towards a Secure Zero-rating Framework with Three Parties.mp4
15.3 MB
USENIX Security 2020/ScAINet '20/ScAINet 20 - On Adaptive Attacks to Adversarial Example Defenses.mp4
15.3 MB
USENIX Security 2014/USENIX Security 2014 Videos/The Long Taile of Typosquatting Domain Names - Janos Szurdi, Balazs Kocso, Gabor Cseh, Jonathan Spring, Mark Felegyhazi, Chris Kanich.mp4
15.2 MB
USENIX Security 2019/USENIX Security 2019 Video/Scalable Scanning and Automatic Classification of TLS Padding Oracle.mp4
15.2 MB
USENIX Security 2011/USENIX Security 2011 Proceedings.mobi
15.2 MB
USENIX Security 2020/PEPR '20/PEPR 20 - A Backdoor by Any Other Name, and How to Stop It.mp4
15.2 MB
USENIX Security 2014/USENIX Security 2014 Presentations/Information Security War Room - Sergey Bratus, Dartmouth College, Felix FX Lindner.pdf
15.0 MB
USENIX Security 2021/CLARION Sound and Clear Provenance Tracking for Microservice Deployments.mp4
15.0 MB
USENIX Security 2019/USENIX Security 2019 Video/Secure Multi-User Content Sharing for Augmented Reality Applications.mp4
15.0 MB
USENIX Security 2019/USENIX Security 2019 Video/HideMyApp Hiding the Presence of Sensitive Apps on Android.mp4
15.0 MB
USENIX Security 2019/USENIX Security 2019 Video/Small World with High Risks A Study of Security Threats in the npm Ecosystem.mp4
14.9 MB
USENIX Security 2018/USENIX Security 2018 Videos/FANCI - Feature-based Automated NXDomain Classification and Intelligence.mp4
14.9 MB
USENIX Security 2010/USENIX Security 2010 Proceedings.mobi
14.9 MB
USENIX Security 2018/USENIX Security 2018 Videos/Towards Predicting Efficient and Anonymous Tor Circuits.mp4
14.9 MB
USENIX Security 2019/USENIX Security 2019 Video/Understanding iOS-based Crowdturfing Through Hidden UI Analysis.mp4
14.8 MB
USENIX Security 2018/USENIX Security 2018 Videos/Who Left Open the Cookie Jar A Comprehensive Evaluation of Third-Party Cookie Policies.mp4
14.7 MB
USENIX Security 2020/FOCI '20/FOCI 20 - Slitheen Stealth TLS-based Decoy Routing.mp4
14.7 MB
USENIX Security 2014/USENIX Security 2014 Videos/ROP is Still Dangerous Breaking Modern Defenses - Nicholas Carlini, David Wagner.mp4
14.7 MB
USENIX Security 2010/USENIX Security 2010 Proceedings.epub
14.7 MB
USENIX Security 2019/USENIX Security 2019 Video/50 Ways to Leak Your Data An Exploration of Apps'.mp4
14.7 MB
USENIX Security 2014/USENIX Security 2014 Videos/Size Does Matter Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard - Enes Goktas, Elias Athanasopoulos, Michalis Polychronakis, Herbert Bos, Georgios Portokalidis.mp4
14.6 MB
USENIX Security 2019/USENIX Security 2019 Video/AntiFuzz Impeding Fuzzing Audits of Binary Executables.mp4
14.6 MB
USENIX Security 2020/PEPR '20/PEPR 20 - When Things Go Wrong.mp4
14.5 MB
USENIX Security 2016/USENIX Security 2016 Videos/All Your Queries Are Belong to Us The Power of File-Injection Attacks.mp4
14.4 MB
USENIX Security 2019/USENIX Security 2019 Video/The Secret Sharer Evaluating and Testing Unintended Memorization in.mp4
14.4 MB
USENIX Security 2019/USENIX Security 2019 Video/IODINE Verifying Constant-Time Execution of Hardware.mp4
14.4 MB
ScAINet 2020/Getting Passive Aggressive about False Positives.mp4
14.4 MB
USENIX Security 2021/The Circle Of Life A Large-Scale Study of The IoT Malware Lifecycle.mp4
14.2 MB
USENIX Security 2020/PEPR '20/PEPR 20 - Privacy Architecture for Data-Driven Innovation Configure.mp4
14.2 MB
USENIX Security 2020/CSET '20/CSET 20 - Historical Analysis of Exploit Availability Timelines.mp4
14.2 MB
USENIX Security 2019/USENIX Security 2019 Video/GRIMOIRE Synthesizing Structure while Fuzzing.mp4
14.2 MB
USENIX Security 2019/USENIX Security 2019 Video/Evaluating Differentially Private Machine Learning in Practice.mp4
14.1 MB
USENIX Security 2020/FOCI '20/FOCI 20 - Padding Aint Enough Assessing the Privacy Guarantees of Encrypted DNS.mp4
14.1 MB
USENIX Security 2020/USENIX Security 2020 Videos/Data Recovery from Scrubbed NAND Flash Storage Need for Analog Sanitization.mp4
14.1 MB
USENIX Security 2019/USENIX Security 2019 Video/Fuzzification Anti-Fuzzing Techniques.mp4
14.0 MB
USENIX Security 2021/Once is Never Enough Foundations for Sound Statistical Inference in Tor.mp4
14.0 MB
USENIX Security 2020/FOCI '20/FOCI 20 - A Comprehensive Study of DNS-over-HTTPS Downgrade Attack.mp4
14.0 MB
USENIX Security 2012/USENIX Security 2012 Presentations/Fuzzing with Code Fragments Slides - Christian Holler, Kim Herzig, Andreas Zeller.pdf
14.0 MB
USENIX Security 2018/USENIX Security 2018 Videos/ACES - Automatic Compartments for Embedded Systems.mp4
13.9 MB
USENIX Security 2021/Too Good to Be Safe Tricking Lane Detection in Autonomous Driving with Craft.mp4
13.9 MB
USENIX Security 2020/USENIX Security 2020 Videos/FuzzGen Automatic Fuzzer Generation.mp4
13.8 MB
USENIX Security 2020/USENIX Security 2020 Videos/You Are What You Broadcast Identification of Mobile and IoT Devices.mp4
13.8 MB
USENIX Security 2020/CSET '20/CSET 20 - Toward Orchestration of Complex Networking Experiments.mp4
13.8 MB
CSET 2020/Toward Orchestration of Complex Networking Experiments.mp4
13.8 MB
USENIX Security 2020/USENIX Security 2020 Videos/Towards Robust LiDAR-based Perception in Autonomous Driving General Black-box.mp4
13.7 MB
USENIX Security 2020/FOCI '20/FOCI 20 - Triplet Censors Demystifying Great Firewall’s DNS Censorship Behavior.mp4
13.7 MB
USENIX Security 2019/USENIX Security 2019 Video/Site Isolation Process Separation for Web Sites within the Browser.mp4
13.7 MB
USENIX Security 2020/USENIX Security 2020 Videos/Light Commands Laser-Based Audio Injection Attacks on Voice-Controllable.mp4
13.7 MB
USENIX Security 2018/USENIX Security 2018 Videos/WPSE - Fortifying Web Protocols via Browser-Side Security Monitoring.mp4
13.6 MB
CSET 2020/Historical Analysis of Exploit Availability Timelines.mp4
13.6 MB
USENIX Security 2020/CSET '20/CSET 20 - APTGen An Approach towards Generating Practical Dataset Labelled with Targeted....mp4
13.6 MB
USENIX Security 2019/USENIX Security 2019 Video/Back to the Whiteboard a Principled Approach for the Assessment and.mp4
13.5 MB
USENIX Security 2009/USENIX Security 2009 Presentations/Compromising Electromagnetic Emanations of Wired and Wireless Keyboards Slides - Martin Vuagnoux, Sylvain Pasini.pdf
13.5 MB
USENIX Security 2018/USENIX Security 2018 Videos/DIZK - A Distributed Zero Knowledge Proof System.mp4
13.5 MB
USENIX Security 2009/USENIX Security 2009 Presentations/USENIX Security 2009 - Interior.pdf
13.4 MB
USENIX Security 2021/Dirty Road Can Attack Security of Deep Learning based Automated Lane.mp4
13.4 MB
USENIX Security 2020/PEPR '20/PEPR 20 - Assessing Privacy Risk with the IPA Triad.mp4
13.4 MB
USENIX Security 2020/ScAINet '20/ScAINet 20 - Getting Passive Aggressive about False Positives.mp4
13.4 MB
USENIX Security 2020/USENIX Security 2020 Videos/TextShield Robust Text Classification Based on Multimodal Embedding.mp4
13.4 MB
USENIX Security 2021/Weak Links in Authentication Chains A Large-scale Analysis of Email Sender.mp4
13.3 MB
USENIX Security 2020/USENIX Security 2020 Videos/APEX A Verified Architecture for Proofs of Execution on Remote Devices.mp4
13.3 MB
USENIX Security 2018/USENIX Security 2018 Videos/The aftermath of a crypto-ransomware attack at a large academic institution.mp4
13.3 MB
USENIX Security 2021/Can I Take Your Subdomain Exploring Same-Site Attacks in the Modern Web.mp4
13.3 MB
CSET 2020/APTGen An Approach towards Generating Practical Dataset Labelled with Targeted.mp4
13.3 MB
USENIX Security 2021/CSProp Ciphertext and Signature Propagation Low-Overhead Public-Key.mp4
13.3 MB
USENIX Security 2021/Catching Phishers By Their Bait Investigating the Dutch Phishing Landscape.mp4
13.2 MB
USENIX Security 2020/USENIX Security 2020 Videos/COUNTERFOIL Verifying Provenance of Integrated Circuits using Intrinsic.mp4
13.2 MB
USENIX Security 2021/SiamHAN IPv6 Address Correlation Attacks on TLS Encrypted Traffic.mp4
13.1 MB
USENIX Security 2020/FOCI '20/FOCI 20 - Bystanders’ Privacy The Perspectives of Nannies on Smart Home Surveillance.mp4
13.1 MB
USENIX Security 2021/Forecasting Malware Capabilities From Cyber Attack Memory Images.mp4
13.1 MB
USENIX Security 2021/Deep-Dup An Adversarial Weight Duplication Attack Framework to Crush Deep.mp4
13.1 MB
USENIX Security 2020/CSET '20/CSET 20 - Representativeness in the Benchmark for Vulnerability Analysis Tools (B-VAT).mp4
13.0 MB
USENIX Security 2014/USENIX Security 2014 Presentations/Privacy in Pharmacogenetics An End-to-End Case Study of Personalized Warfarin Dosing Slides - Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon Lin, David Page, Tho.pdf
13.0 MB
USENIX Security 2021/Jaqen A High-Performance Switch-Native Approach for Detecting and Mitigating.mp4
12.9 MB
CSET 2020/Representativeness in the Benchmark for Vulnerability Analysis Tools (B-VAT).mp4
12.9 MB
USENIX Security 2019/USENIX Security 2019 Video/A Study of the Feasibility of Co-located App Attacks against BLE.mp4
12.9 MB
USENIX Security 2019/USENIX Security 2019 Video/Devils in the Guidance Predicting Logic Vulnerabilities in Payment.mp4
12.9 MB
USENIX Security 2020/USENIX Security 2020 Videos/SHA-1 is a Shambles First Chosen-Prefix Collision on SHA-1 and Application.mp4
12.6 MB
USENIX Security 2021/Automatic Firmware Emulation through Invalidity-guided Knowledge Inference.mp4
12.6 MB
USENIX Security 2020/USENIX Security 2020 Videos/SAVIOR Securing Autonomous Vehicles with Robust Physical Invariants.mp4
12.6 MB
USENIX Security 2020/USENIX Security 2020 Videos/MVP Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures.mp4
12.6 MB
USENIX Security 2020/USENIX Security 2020 Videos/Agamotto Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine.mp4
12.5 MB
USENIX Security 2020/USENIX Security 2020 Videos/BigMAC Fine-Grained Policy Analysis of Android Firmware.mp4
12.4 MB
USENIX Security 2021/FlowDist Multi-Staged Refinement-Based Dynamic Information Flow Analysis for.mp4
12.4 MB
USENIX Security 2012/USENIX Security 2012 Presentations/Gone in 360 Seconds Hijacking with Hitag2 Slides - Roel Verdult, Flavio D. Garcia, Josep Balasch, KU Leuven.pdf
12.3 MB
USENIX Security 2020/USENIX Security 2020 Videos/Visor Privacy-Preserving Video Analytics as a Cloud Service.mp4
12.3 MB
FOCI 2020/Opening Digital Borders Cautiously yet Decisively Digital Filtering in Saudi Arabia.mp4
12.3 MB
USENIX Security 2020/USENIX Security 2020 Videos/HybCache Hybrid Side-Channel-Resilient Caches for Trusted Execution.mp4
12.3 MB
USENIX Security 2020/USENIX Security 2020 Videos/Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade Attacks.mp4
12.3 MB
USENIX Security 2021/Reducing Bias in Modeling Real-world Password Strength via Deep Learning.mp4
12.3 MB
USENIX Security 2020/USENIX Security 2020 Videos/NXNSAttack Recursive DNS Inefficiencies and Vulnerabilities.mp4
12.2 MB
USENIX Security 2021/Where's Crypto Automated Identification and Classification of Proprietary.mp4
12.2 MB
USENIX Security 2018/USENIX Security 2018 Videos/HeapHopper - Bringing Bounded Model Checking to Heap Implementation Security.mp4
12.2 MB
USENIX Security 2021/CANARY - a reactive defense mechanism for Controller Area Networks based.mp4
12.1 MB
USENIX Security 2020/USENIX Security 2020 Videos/PHMon A Programmable Hardware Monitor and Its Security Use Cases.mp4
12.1 MB
USENIX Security 2020/USENIX Security 2020 Videos/From Control Model to Program Investigating Robotic Aerial Vehicle Accidents.mp4
12.1 MB
USENIX Security 2012/USENIX Security 2012 Presentations/Throttling Tor Bandwidth Parasites Slides - Rob Jansen, Paul Syverson, Nicholas Hopper.pdf
12.0 MB
USENIX Security 2021/MAZE Towards Automated Heap Feng Shui.mp4
12.0 MB
USENIX Security 2021/ATLAS A Sequence-based Learning Approach for Attack Investigation.mp4
12.0 MB
USENIX Security 2020/USENIX Security 2020 Videos/MUZZ Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded.mp4
12.0 MB
FOCI 2020/Turbo Tunnel, a good way to design censorship circumvention protocols.mp4
12.0 MB
USENIX Security 2020/USENIX Security 2020 Videos/A Longitudinal and Comprehensive Study of the DANE Ecosystem in Email.mp4
11.9 MB
USENIX Security 2020/USENIX Security 2020 Videos/The Industrial Age of Hacking.mp4
11.9 MB
USENIX Security 2021/EOSAFE Security Analysis of EOSIO Smart Contracts.mp4
11.9 MB
USENIX Security 2020/USENIX Security 2020 Videos/GREYONE Data Flow Sensitive Fuzzing.mp4
11.9 MB
USENIX Security 2009/USENIX Security 2009 Presentations/Compression, Correction, Confidentiality, and Comprehension A Modern Look at Commercial Telegraph Codes - Steven M. Bellovin.pdf
11.9 MB
USENIX Security 2021/Automated Discovery of Denial-of-Service Vulnerabilities in Connected Vehicle.mp4
11.9 MB
USENIX Security 2021/Weaponizing Middleboxes for TCP Reflected Amplification.mp4
11.9 MB
USENIX Security 2020/USENIX Security 2020 Videos/A different cup of TI The added value of commercial threat intelligence.mp4
11.8 MB
USENIX Security 2020/USENIX Security 2020 Videos/Composition Kills A Case Study of Email Sender Authentication.mp4
11.8 MB
ScAINet 2020/Optimization for Attack Surface Exploration The Case of TLS.mp4
11.8 MB
USENIX Security 2021/Senate A Maliciously-Secure MPC Platform for Collaborative Analytics.mp4
11.8 MB
USENIX Security 2009/USENIX Security 2009 Presentations/USENIX Security 2009 Track - Proceedings.tgz
11.8 MB
USENIX Security 2020/USENIX Security 2020 Videos/Temporal System Call Specialization for Attack Surface Reduction.mp4
11.7 MB
USENIX Security 2020/USENIX Security 2020 Videos/Actions Speak Louder than Words Entity-Sensitive Privacy Policy and Data Flow.mp4
11.7 MB
USENIX Security 2021/Frontal Attack Leaking Control-Flow in SGX via the CPU Frontend.mp4
11.7 MB
USENIX Security 2020/USENIX Security 2020 Videos/iOS, Your OS, Everybodys OS Vetting and Analyzing Network Services of iOS.mp4
11.7 MB
USENIX Security 2020/CSET '20/CSET 20 - HAI 1.0 HIL-based Augmented ICS Security Dataset.mp4
11.7 MB
USENIX Security 2021/Security Obstacles and Motivations for Small Businesses from a CISO's.mp4
11.7 MB
USENIX Security 2020/USENIX Security 2020 Videos/The Impact of Ad-Blockers on Product Search and Purchase Behavior.mp4
11.7 MB
USENIX Security 2013/USENIX Security 2013 Presentations/Dismantling Megamos Crypto Wirelessly Lockpicking a Vehicle Immobilizer Slides - Roel Verdult, Flavio D. Garcia, Baris Ege.pdf
11.6 MB
USENIX Security 2021/Causal Analysis for Software-Defined Networking Attacks.mp4
11.6 MB
USENIX Security 2020/USENIX Security 2020 Videos/Hall Spoofing A Non-Invasive DoS Attack on Grid-Tied Solar Inverter.mp4
11.6 MB
USENIX Security 2018/USENIX Security 2018 Videos/IMIX - In-Process Memory Isolation EXtension.mp4
11.6 MB
USENIX Security 2020/USENIX Security 2020 Videos/Frankenstein Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation.mp4
11.6 MB
USENIX Security 2021/Automatic Policy Generation for Inter-Service Access Control of Microservices.mp4
11.6 MB
USENIX Security 2020/USENIX Security 2020 Videos/BesFS A POSIX Filesystem for Enclaves with a Mechanized Safety Proof.mp4
11.6 MB
USENIX Security 2021/Understanding Malicious Cross-library Data Harvesting on Android.mp4
11.6 MB
USENIX Security 2020/USENIX Security 2020 Videos/Call Me Maybe Eavesdropping Encrypted LTE Calls With ReVoLTE.mp4
11.5 MB
CSET 2020/UBCIS Ultimate Benchmark for Container Image Scanning.mp4
11.5 MB
USENIX Security 2021/Static Detection of Unsafe DMA Accesses in Device Drivers.mp4
11.5 MB
USENIX Security 2021/Examining the Efficacy of Decoy-based and Psychological Cyber Deception.mp4
11.5 MB
USENIX Security 2020/CSET '20/CSET 20 - UBCIS Ultimate Benchmark for Container Image Scanning.mp4
11.5 MB
USENIX Security 2021/Messy States of Wiring Vulnerabilities in Emerging Personal Payment Systems.mp4
11.5 MB
USENIX Security 2017/USENIX Security 2017 Videos/From Problems to Patterns to Practice.mp4
11.5 MB
USENIX Security 2021/Collective Information Security in Large-Scale Urban Protests.mp4
11.5 MB
USENIX Security 2021/Assessing Browser-level Defense against IDN-based Phishing.mp4
11.4 MB
USENIX Security 2021/Research on the Security of Visual Reasoning CAPTCHA.mp4
11.4 MB
USENIX Security 2020/USENIX Security 2020 Videos/Automatic Hot Patch Generation for Android Kernels.mp4
11.4 MB
USENIX Security 2020/PEPR '20/PEPR 20 - Privacy Professional Boss Mode.mp4
11.4 MB
CSET 2020/HAI 1.0 HIL-based Augmented ICS Security Dataset.mp4
11.3 MB
USENIX Security 2021/Automatic Extraction of Secrets from the Transistor Jungle using.mp4
11.3 MB
USENIX Security 2021/SLAP Improving Physical Adversarial Examples with Short-Lived Adversarial.mp4
11.3 MB
USENIX Security 2021/Identifying Harmful Media in End-to-End Encrypted Communication.mp4
11.3 MB
USENIX Security 2020/USENIX Security 2020 Videos/DeepHammer Depleting the Intelligence of Deep Neural Networks through Target.mp4
11.3 MB
USENIX Security 2020/USENIX Security 2020 Videos/I am uncomfortable sharing what I cant see - Privacy Concerns.mp4
11.3 MB
USENIX Security 2021/Smart Contract Vulnerabilities Vulnerable Does Not Imply Exploited.mp4
11.3 MB
USENIX Security 2020/USENIX Security 2020 Videos/McTiny Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers.mp4
11.2 MB
USENIX Security 2020/USENIX Security 2020 Videos/Interpretable Deep Learning under Fire.mp4
11.2 MB
USENIX Security 2018/USENIX Security 2018 Videos/Simple Password-Hardened Encryption Services.mp4
11.2 MB
USENIX Security 2020/USENIX Security 2020 Videos/Cardpliance PCI DSS Compliance of Android Applications.mp4
11.2 MB
USENIX Security 2020/ScAINet '20/ScAINet 20 - Optimization for Attack Surface Exploration The Case of TLS.mp4
11.2 MB
USENIX Security 2020/USENIX Security 2020 Videos/Drift with Devil Security of Multi-Sensor Fusion based Localization.mp4
11.2 MB
USENIX Security 2020/USENIX Security 2020 Videos/The Tools and Tactics Used in Intimate Partner Surveillance An Analysis.mp4
11.2 MB
USENIX Security 2021/Share First, Ask Later (or Never) Studying Violations of GDPR's Explicit.mp4
11.2 MB
USENIX Security 2020/USENIX Security 2020 Videos/MIRAGE Succinct Arguments for Randomized Algorithms with Applications.mp4
11.2 MB
USENIX Security 2020/USENIX Security 2020 Videos/A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web.mp4
11.2 MB
USENIX Security 2021/Double-Cross Attacks Subverting Active Learning Systems.mp4
11.1 MB
USENIX Security 2021/Scalable Detection of Promotional Website Defacements in Black Hat SEO.mp4
11.1 MB
USENIX Security 2021/SyzVegas Beating Kernel Fuzzing Odds with Reinforcement Learning.mp4
11.1 MB
USENIX Security 2021/Privacy-Preserving and Standard-Compatible AKA Protocol for 5G.mp4
11.1 MB
USENIX Security 2020/USENIX Security 2020 Videos/See No Evil Phishing for Permissions with False Transparency.mp4
11.1 MB
USENIX Security 2021/Fantastic Four Honest-Majority Four-Party Secure Computation With Malicious.mp4
11.0 MB
USENIX Security 2020/USENIX Security 2020 Videos/EPIC Every Packet Is Checked in the Data Plane of a Path-Aware Internet.mp4
11.0 MB
USENIX Security 2020/PEPR '20/PEPR 20 - When Engineers and Lawyers Talk Right-Sizing Your Data Protection Risk Profile.mp4
11.0 MB
USENIX Security 2021/Are Privacy Dashboards Good for End Users Evaluating User Perceptions.mp4
11.0 MB
USENIX Security 2020/USENIX Security 2020 Videos/Shattered Chain of Trust Understanding Security Risks in Cross-Cloud IoT.mp4
11.0 MB
USENIX Security 2021/Hiding the Access Pattern is Not Enough Exploiting Search Pattern Leakage.mp4
11.0 MB
USENIX Security 2020/USENIX Security 2020 Videos/SENG, the SGX-Enforcing Network Gateway Authorizing Communication.mp4
11.0 MB
USENIX Security 2021/Experiences Deploying Multi-Vantage-Point Domain Validation at Let's Encrypt.mp4
11.0 MB
USENIX Security 2021/VScape Assessing and Escaping Virtual Call Protections.mp4
11.0 MB
USENIX Security 2020/USENIX Security 2020 Videos/Secure Multi-party Computation of Differentially Private Median.mp4
11.0 MB
USENIX Security 2020/USENIX Security 2020 Videos/PCKV Locally Differentially Private Correlated Key-Value Data Collection.mp4
10.9 MB
USENIX Security 2021/Blinder Partition-Oblivious Hierarchical Scheduling.mp4
10.9 MB
USENIX Security 2021/MPInspector A Systematic and Automatic Approach for Evaluating the Security.mp4
10.9 MB
USENIX Security 2021/Virtual Secure Platform A Five-Stage Pipeline Processor over TFHE.mp4
10.9 MB
FOCI 2020/Slitheen Stealth TLS-based Decoy Routing.mp4
10.9 MB
USENIX Security 2021/CURE A Security Architecture with CUstomizable and Resilient Enclaves.mp4
10.9 MB
USENIX Security 2020/USENIX Security 2020 Videos/FANS Fuzzing Android Native System Services via Automated Interface Analysis.mp4
10.9 MB
USENIX Security 2020/USENIX Security 2020 Videos/Devil’s Whisper A General Approach for Physical Adversarial Attacks.mp4
10.9 MB
USENIX Security 2020/USENIX Security 2020 Videos/SANNS Scaling Up Secure Approximate k-Nearest Neighbors Search.mp4
10.9 MB
USENIX Security 2020/USENIX Security 2020 Videos/him Shimmeny Evaluating the Security & Privacy Contributions of Link Shimming.mp4
10.8 MB
USENIX Security 2014/USENIX Security 2014 Opening Remarks - sec14_slides_fu.pdf
10.8 MB
CSET 2020/ICS Testbed Tetris Practical Building Blocks Towards a Cyber Security Resource.mp4
10.8 MB
USENIX Security 2021/Dynamic proofs of retrievability with low server storage.mp4
10.8 MB
USENIX Security 2020/USENIX Security 2020 Videos/Chaperone Real-time Locking and Loss Prevention for Smartphones.mp4
10.8 MB
USENIX Security 2021/SEApp Bringing Mandatory Access Control to Android Apps.mp4
10.8 MB
USENIX Security 2020/USENIX Security 2020 Videos/Liveness is Not Enough Enhancing Fingerprint Authentication with Behavioral.mp4
10.8 MB
USENIX Security 2020/CSET '20/CSET 20 - ICS Testbed Tetris Practical Building Blocks Towards a Cyber Security Resource.mp4
10.8 MB
USENIX Security 2020/USENIX Security 2020 Videos/Void A fast and light voice liveness detection system.mp4
10.8 MB
USENIX Security 2021/Constrain't-guided Directed Greybox Fuzzing.mp4
10.7 MB
USENIX Security 2018/USENIX Security 2018 Videos/Schrödinger's RAT - Profiling the Stakeholders in the Remote Access Trojan Ecosystem.mp4
10.7 MB
USENIX Security 2020/USENIX Security 2020 Videos/TPM-FAIL TPM meets Timing and Lattice Attacks.mp4
10.7 MB
USENIX Security 2021/Blind Backdoors in Deep Learning Models.mp4
10.7 MB
USENIX Security 2020/USENIX Security 2020 Videos/HALucinator Firmware Re-hosting Through Abstraction Layer Emulation.mp4
10.7 MB
USENIX Security 2021/Fingerprinting in Style Detecting Browser Extensions via Injected Style.mp4
10.7 MB
USENIX Security 2021/ReDMArk Bypassing RDMA Security Mechanisms.mp4
10.6 MB
USENIX Security 2020/USENIX Security 2020 Videos/Towards HTTPS Everywhere on Android We Are Not There Yet.mp4
10.6 MB
USENIX Security 2020/USENIX Security 2020 Videos/RELOADREFRESH Abusing Cache Replacement Policies to Perform Stealthy Cache.mp4
10.6 MB
USENIX Security 2020/USENIX Security 2020 Videos/An Observational Investigation of Reverse Engineers’ Processes.mp4
10.6 MB
USENIX Security 2021/Saphire Sandboxing PHP Applications with Tailored System Call Allowlists.mp4
10.6 MB
USENIX Security 2021/Mind Your Weight(s) A Large-scale Study on Insufficient Machine Learning.mp4
10.6 MB
USENIX Security 2020/USENIX Security 2020 Videos/SpecFuzz Bringing Spectre-type vulnerabilities to the surface.mp4
10.5 MB
USENIX Security 2021/How Great is the Great Firewall Measuring China's DNS Censorship.mp4
10.5 MB
USENIX Security 2020/PEPR '20/PEPR 20 - Product Privacy Journey Towards a Product Centric Privacy Engineering Framework.mp4
10.5 MB
USENIX Security 2020/CSET '20/CSET 20 - Bridging Missing Gaps in Evaluating DDoS Research.mp4
10.5 MB
USENIX Security 2021/SandTrap Securing JavaScript-driven Trigger-Action Platforms.mp4
10.5 MB
USENIX Security 2021/Sharing More and Checking Less Leveraging Common Input Keywords to Detect.mp4
10.5 MB
USENIX Security 2021/Searching Encrypted Data with Size-Locked Indexes.mp4
10.5 MB
USENIX Security 2021/Defeating DNN-Based Traffic Analysis Systems in Real-Time With Blind.mp4
10.5 MB
USENIX Security 2014/USENIX Security 2014 Presentations/On the Effective Prevention of TLS Man-in-the-Middle Attacks in Web Applications Slides - Nikolaos Karapanos and Srdjan Capkun.pdf
10.5 MB
USENIX Security 2021/Driving 2FA Adoption at Scale Optimizing Two-Factor Authentication.mp4
10.5 MB
USENIX Security 2020/USENIX Security 2020 Videos/Justinians GAAvernor Robust Distributed Learning with Gradient Aggregation.mp4
10.4 MB
USENIX Security 2021/UNIFUZZ A Holistic and Pragmatic Metrics-Driven Platform for Evaluating.mp4
10.4 MB
USENIX Security 2021/PhishPrint Evading Phishing Detection Crawlers by Prior Profiling.mp4
10.4 MB
USENIX Security 2021/Stars Can Tell A Robust Method to Defend against GPS Spoofing Attacks.mp4
10.4 MB
USENIX Security 2021/Now I'm a bit angry - Individuals' Awareness, Perception, and Responses.mp4
10.4 MB
USENIX Security 2020/USENIX Security 2020 Videos/Plug-N-Pwned Comprehensive Vulnerability Analysis of OBD-II Dongles.mp4
10.4 MB
USENIX Security 2021/Rage Against the Machine Clear A Systematic Analysis of Machine Clears.mp4
10.4 MB
USENIX Security 2020/USENIX Security 2020 Videos/EcoFuzz Adaptive Energy-Saving Greybox Fuzzing as a Variant.mp4
10.4 MB
USENIX Security 2021/MIRAGE Mitigating Conflict-Based Cache Attacks with a Practical.mp4
10.4 MB
USENIX Security 2021/V0Finder Discovering the Correct Origin of Publicly Reported Software.mp4
10.4 MB
USENIX Security 2021/Adapting Security Warnings to Counter Online Disinformation.mp4
10.3 MB
USENIX Security 2021/VoltPillager Hardware-based fault injection attacks against Intel SGX Enclaves.mp4
10.3 MB
USENIX Security 2020/USENIX Security 2020 Videos/Big Numbers - Big Troubles Systematically Analyzing Nonce Leakage in (EC)DSA.mp4
10.3 MB
USENIX Security 2012/USENIX Security 2012 Presentations/Babel Leveraging Email Delivery for Spam Mitigation Slides - Gianluca Stringhini, Manuel Egele, Apostolis Zarras, Thorsten Holz, Christopher Kruegel, Giovanni Vigna.pdf
10.3 MB
CSET 2020/Bridging Missing Gaps in Evaluating DDoS Research.mp4
10.3 MB
USENIX Security 2020/USENIX Security 2020 Videos/Walking Onions Scaling Anonymity Networks while Protecting Users.mp4
10.3 MB
USENIX Security 2021/WaveGuard Understanding and Mitigating Audio Adversarial Examples.mp4
10.2 MB
USENIX Security 2021/Graph Backdoor.mp4
10.2 MB
USENIX Security 2021/Protecting Cryptography Against Compelled Self-Incrimination.mp4
10.2 MB
USENIX Security 2021/PASAN Detecting Peripheral Access Concurrency Bugs within Bare-Metal.mp4
10.2 MB
USENIX Security 2021/Breaking Through Binaries Compiler-quality Instrumentation for Better.mp4
10.2 MB
USENIX Security 2020/USENIX Security 2020 Videos/Cached and Confused Web Cache Deception in the Wild.mp4
10.2 MB
USENIX Security 2021/PACStack an Authenticated Call Stack.mp4
10.2 MB
USENIX Security 2020/USENIX Security 2020 Videos/who's Calling Characterizing Robocalls through Audio and Metadata Analysis.mp4
10.2 MB
USENIX Security 2021/Charger-Surfing Exploiting a Power Line Side-Channel for Smartphone.mp4
10.2 MB
USENIX Security 2021/Minerva- An Efficient Risk-Limiting Ballot Polling Audit.mp4
10.1 MB
USENIX Security 2021/Exposing New Vulnerabilities of Error Handling Mechanism in CAN.mp4
10.1 MB
USENIX Security 2021/ReDoSHunter A Combined Static and Dynamic Approach for Regular Expression DoS.mp4
10.1 MB
FOCI 2020/Padding Ain't Enough Assessing the Privacy Guarantees of Encrypted DNS.mp4
10.1 MB
USENIX Security 2021/The Role of Computer Security Customer Support in Helping Survivors.mp4
10.1 MB
USENIX Security 2021/Domain Shadowing Leveraging Content Delivery Networks for Robust Blocking.mp4
10.1 MB
USENIX Security 2021/ICSFuzz Manipulating I Os and Repurposing Binary Code to Enable Instrumented.mp4
10.1 MB
USENIX Security 2021/Ripple A Programmable, Decentralized Link-Flooding Defense Against Adaptive.mp4
10.1 MB
USENIX Security 2020/USENIX Security 2020 Videos/KOOBE Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write.mp4
10.0 MB
USENIX Security 2014/USENIX Security 2014 Presentations/On the Feasibility of Large-Scale Infections of iOS Devices Slides - Tielei Wang, Yeongjin Jang, Yizheng Chen, Simon Chung, Billy Lau, Wenke Lee tielei.pdf
10.0 MB
USENIX Security 2020/USENIX Security 2020 Videos/CopyCat Controlled Instruction-Level Attacks on Enclaves.mp4
10.0 MB
USENIX Security 2021/Fragment and Forge Breaking Wi-Fi Through Frame Aggregation and Fragmentation.mp4
10.0 MB
USENIX Security 2008/USENIX Security 2008 Videos/Lest We Remember Cold Boot Attacks on Encryption Keys - J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ariel J. Feldman.opus
10.0 MB
USENIX Security 2021/Dompteur Taming Audio Adversarial Examples.mp4
10.0 MB
USENIX Security 2021/YARIX Scalable YARA-based Malware Intelligence.mp4
10.0 MB
USENIX Security 2021/A Highly Accurate Query-Recovery Attack against Searchable Encryption.mp4
10.0 MB
FOCI 2020/Triplet Censors Demystifying Great Firewall’s DNS Censorship Behavior.mp4
10.0 MB
FOCI 2020/A Comprehensive Study of DNS-over-HTTPS Downgrade Attack.mp4
10.0 MB
USENIX Security 2021/Extracting Training Data from Large Language Models.mp4
9.9 MB
USENIX Security 2021/Why Eve and Mallory Still Love Android Revisiting TLS (In)Security in Android.mp4
9.9 MB
USENIX Security 2020/USENIX Security 2020 Videos/Automating the Development of Chosen Ciphertext Attacks.mp4
9.9 MB
USENIX Security 2021/GForce GPU-Friendly Oblivious and Rapid Neural Network Inference.mp4
9.9 MB
USENIX Security 2020/USENIX Security 2020 Videos/Security Analysis of Unified Payments Interface and Payment Apps in India.mp4
9.9 MB
USENIX Security 2020/USENIX Security 2020 Videos/An Ever-evolving Game Evaluation of Real-world Attacks and Defenses.mp4
9.9 MB
USENIX Security 2020/USENIX Security 2020 Videos/Pixel Multi-signatures for Consensus.mp4
9.9 MB
USENIX Security 2021/Phishpedia A Hybrid Deep Learning Based Approach to Visually Identify.mp4
9.9 MB
USENIX Security 2020/USENIX Security 2020 Videos/Timeless Timing Attacks Exploiting Concurrency to Leak Secrets over Remote.mp4
9.9 MB
USENIX Security 2020/USENIX Security 2020 Videos/Sys A Static Symbolic Tool for Finding Good Bugs in Good (Browser) Code.mp4
9.8 MB
USENIX Security 2021/Finding Bugs Using Your Own Code Detecting Functionally-similar yet.mp4
9.8 MB
USENIX Security 2021/Locally Differentially Private Analysis of Graph Statistics.mp4
9.8 MB
USENIX Security 2020/USENIX Security 2020 Videos/Medusa Microarchitectural Data Leakage via Automated Attack Synthesis.mp4
9.8 MB
USENIX Security 2011/USENIX Security 2011 Presentations/Forensic Triage for Mobile Phones with DEC0DE Slides - Robert J. Walls, Erik Learned-Miller, and Brian Neil Levine.pdf
9.8 MB
USENIX Security 2021/Lord of the Ring(s) Side Channel Attacks on the CPU On-Chip Ring.mp4
9.8 MB
USENIX Security 2020/USENIX Security 2020 Videos/Updates-Leak Data Set Inference and Reconstruction Attacks in Online Learning.mp4
9.8 MB
USENIX Security 2020/FOCI '20/FOCI 20 - Detecting and Evading Censorship-in-Depth A Case Study of Iran’s Protocol Whitelister.mp4
9.8 MB
USENIX Security 2021/mID Tracing Screen Photos via Moiré Patterns.mp4
9.8 MB
USENIX Security 2020/USENIX Security 2020 Videos/Fawkes Protecting Privacy against Unauthorized Deep Learning Models.mp4
9.8 MB
USENIX Security 2011/USENIX Security 2011 Presentations/The Phantom Tollbooth Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion Slides - Sarah Meiklejohn, Keaton Mowery, Stephen Checkoway.pdf
9.8 MB
USENIX Security 2020/USENIX Security 2020 Videos/DELF Safeguarding deletion correctness in Online Social Networks.mp4
9.8 MB
USENIX Security 2021/PolyScope Multi-Policy Access Control Analysis to Compute Authorized Attack.mp4
9.8 MB
USENIX Security 2020/USENIX Security 2020 Videos/Estonian Electronic Identity Card Security Flaws in Key Management.mp4
9.8 MB
USENIX Security 2020/USENIX Security 2020 Videos/Cache Telepathy Leveraging Shared Resource Attacks to Learn DNN Architectures.mp4
9.7 MB
USENIX Security 2021/HAWatcher Semantics-Aware Anomaly Detection for Appified Smart Homes.mp4
9.7 MB
USENIX Security 2020/USENIX Security 2020 Videos/Fuzzing Error Handling Code using Context-Sensitive Software Fault Injection.mp4
9.7 MB
USENIX Security 2021/Accurately Measuring Global Risk of Amplification Attacks using AmpMap.mp4
9.7 MB
USENIX Security 2020/USENIX Security 2020 Videos/Sunrise to Sunset Analyzing the End-to-end Life Cycle and Effectiveness.mp4
9.7 MB
USENIX Security 2020/USENIX Security 2020 Videos/Retrofitting Fine Grain Isolation in the Firefox Renderer.mp4
9.7 MB
USENIX Security 2021/You Autocomplete Me Poisoning Vulnerabilities in Neural Code Completion.mp4
9.7 MB
USENIX Security 2021/What's in a Name Exploring CA Certificate Control.mp4
9.7 MB
USENIX Security 2020/USENIX Security 2020 Videos/PARTEMU Enabling Dynamic Analysis of Real-World TrustZone Software.mp4
9.7 MB
USENIX Security 2020/USENIX Security 2020 Videos/DECAF Automatic, Adaptive De-bloating and Hardening of COTS Firmware.mp4
9.7 MB
USENIX Security 2021/Detecting Kernel Refcount Bugs with Two-Dimensional Consistency Checking.mp4
9.7 MB
USENIX Security 2021/The Hijackers Guide To The Galaxy Off-Path Taking Over Internet Resources.mp4
9.6 MB
USENIX Security 2020/USENIX Security 2020 Videos/SEAL Attack Mitigation for Encrypted Databases via Adjustable Leakage.mp4
9.6 MB
USENIX Security 2021/ObliCheck Efficient Verification of Oblivious Algorithms with Unobservable.mp4
9.6 MB
USENIX Security 2021/Security Analysis of the Democracy Live Online Voting System.mp4
9.6 MB
USENIX Security 2021/SMASH Synchronized Many-sided Rowhammer Attacks from JavaScript.mp4
9.6 MB
USENIX Security 2021/Hopper Modeling and Detecting Lateral Movement.mp4
9.6 MB
USENIX Security 2011/USENIX Security 2011 Presentations/Why (Special Agent) Johnny (Still) Can't Encrypt A Security Analysis of the APCO Project 25 Two-Way Radio System - Sandy Clark, Travis Goodspeed, Perry Metzger, Zac.pdf
9.6 MB
USENIX Security 2021/Kalεido Real-Time Privacy Control for Eye-Tracking Systems.mp4
9.6 MB
USENIX Security 2020/USENIX Security 2020 Videos/Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines.mp4
9.6 MB
USENIX Security 2021/Helping Users Automatically Find and Manage Sensitive, Expendable Files.mp4
9.6 MB
USENIX Security 2021/Adversarial Policy Training against Deep Reinforcement Learning.mp4
9.5 MB
USENIX Security 2020/USENIX Security 2020 Videos/Stealthy Tracking of Autonomous Vehicles with Cache Side Channels.mp4
9.5 MB
USENIX Security 2021/Formally Verified Memory Protection for a Commodity Multiprocessor Hypervisor.mp4
9.5 MB
USENIX Security 2020/USENIX Security 2020 Videos/Automatic Techniques to Systematically Discover New Heap Exploitation.mp4
9.5 MB
USENIX Security 2021/SIGL Securing Software Installations Through Deep Graph Learning.mp4
9.5 MB
USENIX Security 2021/A11y and Privacy don't have to be mutually exclusive Constraining.mp4
9.5 MB
USENIX Security 2020/USENIX Security 2020 Videos/A Spectral Analysis of Noise A Comprehensive, Automated, Formal Analysis.mp4
9.5 MB
USENIX Security 2021/Poisoning the Unlabeled Dataset of Semi-Supervised Learning.mp4
9.5 MB
USENIX Security 2021/Fuzzy Labeled Private Set Intersection with Applications to Private.mp4
9.5 MB
USENIX Security 2021/Systematic Evaluation of Privacy Risks of Machine Learning Models.mp4
9.5 MB
USENIX Security 2021/Abusing Hidden Properties to Attack the Node.js Ecosystem.mp4
9.5 MB
USENIX Security 2020/USENIX Security 2020 Videos/An Off-Chip Attack on Hardware Enclaves via the Memory Bus.mp4
9.5 MB
USENIX Security 2020/USENIX Security 2020 Videos/Differentially-Private Control-Flow Node Coverage for Software Usage Analysis.mp4
9.4 MB
USENIX Security 2020/USENIX Security 2020 Videos/ShadowMove A Stealthy Lateral Movement Strategy.mp4
9.4 MB
USENIX Security 2021/ALPACA Application Layer Protocol Confusion - Analyzing and Mitigating Cracks.mp4
9.4 MB
USENIX Security 2020/USENIX Security 2020 Videos/Programmable In-Network Security for Context-aware BYOD Policies.mp4
9.4 MB
USENIX Security 2021/AdCube WebVR Ad Fraud and Practical Confinement of Third-Party Ads.mp4
9.4 MB
USENIX Security 2020/USENIX Security 2020 Videos/DatashareNetwork A Decentralized Privacy-Preserving Search Engine.mp4
9.4 MB
USENIX Security 2020/USENIX Security 2020 Videos/FIRMSCOPE Automatic Uncovering of Privilege-Escalation Vulnerabilities.mp4
9.4 MB
USENIX Security 2020/USENIX Security 2020 Videos/That Was Then, This Is Now A Security Evaluation of Password Generation.mp4
9.4 MB
USENIX Security 2020/USENIX Security 2020 Videos/SkillExplorer Understanding the Behavior of Skills in Large Scale.mp4
9.4 MB
USENIX Security 2020/USENIX Security 2020 Videos/Datalog Disassembly.mp4
9.3 MB
USENIX Security 2021/Understanding and Detecting Disordered Error Handling with Precise Function.mp4
9.3 MB
USENIX Security 2020/USENIX Security 2020 Videos/On Training Robust PDF Malware Classifiers.mp4
9.3 MB
USENIX Security 2021/T-Miner A Generative Approach to Defend Against Trojan Attacks on DNN-based.mp4
9.3 MB
USENIX Security 2020/USENIX Security 2020 Videos/Detecting Stuffing of a User’s Credentials at Her Own Accounts.mp4
9.3 MB
USENIX Security 2020/USENIX Security 2020 Videos/Adversarial Preprocessing Understanding and Preventing Image-Scaling Attacks.mp4
9.3 MB
FOCI 2020/Bystanders’ Privacy The Perspectives of Nannies on Smart Home Surveillance.mp4
9.3 MB
USENIX Security 2021/Inexpensive Brainwave Authentication New Techniques and Insights.mp4
9.2 MB
USENIX Security 2020/FOCI '20/FOCI 20 - MIMIQ Masking IPs with Migration in QUIC.mp4
9.2 MB
USENIX Security 2021/On the Routing-Aware Peering against Network-Eclipse Attacks in Bitcoin.mp4
9.2 MB
USENIX Security 2021/ELISE A Storage Efficient Logging System Powered by Redundancy Reduction.mp4
9.2 MB
USENIX Security 2020/USENIX Security 2020 Videos/PKU Pitfalls Attacks on PKU-based Memory Isolation Systems.mp4
9.2 MB
USENIX Security 2021/Demon in the Variant Statistical Analysis of DNNs for Robust Backdoor.mp4
9.2 MB
USENIX Security 2021/It's Stored, Hopefully, on an Encrypted Server Mitigating Users.mp4
9.2 MB
USENIX Security 2020/USENIX Security 2020 Videos/SmartVerif Push the Limit of Automation Capability of Verifying Security.mp4
9.2 MB
USENIX Security 2021/Rollercoaster An Efficient Group-Multicast Scheme for Mix Networks.mp4
9.2 MB
USENIX Security 2021/Disrupting Continuity of Apple's Wireless Ecosystem Security New Tracking.mp4
9.2 MB
USENIX Security 2021/PrivateDrop Practical Privacy-Preserving Authentication for Apple AirDrop.mp4
9.2 MB
USENIX Security 2021/SelectiveTain't Efficient Data Flow Tracking With Static Binary Rewriting.mp4
9.2 MB
USENIX Security 2021/M2MON Building an MMIO-based Security Reference Monitor for Unmanned Vehicles.mp4
9.2 MB
USENIX Security 2020/USENIX Security 2020 Videos/TeeRex Discovery and Exploitation of Memory Corruption Vulnerabilities.mp4
9.1 MB
USENIX Security 2021/Precise and Scalable Detection of Use-after-Compacting-Garbage-Collection Bugs.mp4
9.1 MB
USENIX Security 2014/USENIX Security 2014 Presentations/Effective Attacks and Provable Defenses for Website Fingerprinting Slides - Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, Ian Goldberg.pdf
9.1 MB
USENIX Security 2021/JAW Studying Client-side CSRF with Hybrid Property Graphs and Declarative.mp4
9.1 MB
USENIX Security 2021/Private Blocklist Lookups with Checklist.mp4
9.1 MB
USENIX Security 2020/USENIX Security 2020 Videos/Civet An Efficient Java Partitioning Framework for Hardware Enclaves.mp4
9.1 MB
USENIX Security 2020/USENIX Security 2020 Videos/A Formal Analysis of IEEE 802.11s WPA2 Countering the Kracks Caused by.mp4
9.1 MB
USENIX Security 2021/Acoustics to the Rescue Physical Key Inference Attack Revisited.mp4
9.0 MB
USENIX Security 2020/USENIX Security 2020 Videos/USBFuzz A Framework for Fuzzing USB Drivers by Device Emulation.mp4
9.0 MB
USENIX Security 2020/USENIX Security 2020 Videos/Everything Old is New Again Binary Security of WebAssembly.mp4
9.0 MB
USENIX Security 2020/USENIX Security 2020 Videos/FuzzGuard Filtering out Unreachable Inputs in Directed Grey-box Fuzzing.mp4
9.0 MB
USENIX Security 2020/FOCI '20/FOCI 20 - Identifying Disinformation Websites Using Infrastructure Features.mp4
9.0 MB
USENIX Security 2020/USENIX Security 2020 Videos/Certified Side Channels.mp4
9.0 MB
USENIX Security 2021/An Investigation of the Android Kernel Patch Ecosystem.mp4
9.0 MB
USENIX Security 2021/Pretty Good Phone Privacy.mp4
9.0 MB
USENIX Security 2021/LZR Identifying Unexpected Internet Services.mp4
9.0 MB
USENIX Security 2020/USENIX Security 2020 Videos/The Ballot is Busted Before the Blockchain A Security Analysis of Voatz.mp4
8.9 MB
USENIX Security 2020/USENIX Security 2020 Videos/Donky Domain Keys - Efficient In-Process Isolation for RISC-V and x86.mp4
8.9 MB
USENIX Security 2020/USENIX Security 2020 Videos/Remote Side-Channel Attacks on Anonymous Transactions.mp4
8.9 MB
USENIX Security 2021/PatchGuard A Provably Robust Defense against Adversarial Patches via Small.mp4
8.9 MB
USENIX Security 2020/USENIX Security 2020 Videos/P2IM Scalable and Hardware-independent Firmware Testing via Automatic.mp4
8.9 MB
USENIX Security 2020/USENIX Security 2020 Videos/Horizontal Privilege Escalation in Trusted Applications.mp4
8.9 MB
USENIX Security 2021/PriSEC A Privacy Settings Enforcement Controller.mp4
8.9 MB
USENIX Security 2021/Injection Attacks Reloaded Tunnelling Malicious Payloads over DNS.mp4
8.9 MB
USENIX Security 2021/Data Poisoning Attacks to Local Differential Privacy Protocols.mp4
8.9 MB
USENIX Security 2020/USENIX Security 2020 Videos/Secure parallel computation on national scale volumes of data.mp4
8.9 MB
USENIX Security 2020/USENIX Security 2020 Videos/ParmeSan Sanitizer-guided Greybox Fuzzing.mp4
8.9 MB
USENIX Security 2020/USENIX Security 2020 Videos/Analysis of DTLS Implementations Using Protocol State Fuzzing.mp4
8.9 MB
USENIX Security 2021/Evil Under the Sun Understanding and Discovering Attacks on Ethereum.mp4
8.8 MB
USENIX Security 2021/On the Usability of Authenticity Checks for Hardware Security Tokens.mp4
8.8 MB
USENIX Security 2020/USENIX Security 2020 Videos/Local Model Poisoning Attacks to Byzantine-Robust Federated Learning.mp4
8.8 MB
USENIX Security 2021/On the Design and Misuse of Microcoded (Embedded) Processors-A Cautionary Note.mp4
8.8 MB
USENIX Security 2020/USENIX Security 2020 Videos/A Tale of Two Headers A Formal Analysis of Inconsistent Click-Jacking.mp4
8.8 MB
USENIX Security 2021/Privacy and Integrity Preserving Computations with CRISP.mp4
8.8 MB
USENIX Security 2021/The Complexities of Healing in Secure Group Messaging Why Cross-Group Effects.mp4
8.8 MB
USENIX Security 2021/Card Brand Mixup Attack Bypassing the PIN in non-Visa Cards by Using Them.mp4
8.8 MB
USENIX Security 2021/APICraft Fuzz Driver Generation for Closed-source SDK Libraries.mp4
8.8 MB
USENIX Security 2020/USENIX Security 2020 Videos/PhishTime Continuous Longitudinal Measurement of the Effectiveness.mp4
8.8 MB
USENIX Security 2021/Database Reconstruction from Noisy Volumes A Cache Side-Channel Attack.mp4
8.7 MB
USENIX Security 2021/A Large-Scale Interview Study on Information Security in and Attacks.mp4
8.7 MB
USENIX Security 2020/USENIX Security 2020 Videos/Pancake Frequency Smoothing for Encrypted Data Stores.mp4
8.7 MB
USENIX Security 2021/When Malware Changed Its Mind An Empirical Study of Variable Program Behavior.mp4
8.7 MB
USENIX Security 2021/Muse Secure Inference Resilient to Malicious Clients.mp4
8.7 MB
USENIX Security 2021/Cross-VM and Cross-Processor Covert Channels Exploiting Processor Idle.mp4
8.7 MB
USENIX Security 2020/USENIX Security 2020 Videos/NetWarden Mitigating Network Covert Channels while Preserving Performance.mp4
8.7 MB
USENIX Security 2020/USENIX Security 2020 Videos/Human Distinguishable Visual Key Fingerprints.mp4
8.7 MB
USENIX Security 2021/Coco Co-Design and Co-Verification of Masked Software Implementations on CPUs.mp4
8.7 MB
USENIX Security 2021/Why wouldn't someone think of democracy as a target.mp4
8.6 MB
USENIX Security 2021/Is Real-time Phishing Eliminated with FIDO Social Engineering Downgrade.mp4
8.6 MB
USENIX Security 2020/USENIX Security 2020 Videos/Symbolic execution with SymCC don't interpret, compile.mp4
8.6 MB
USENIX Security 2014/USENIX Security 2014 Presentations/From the Aether to the Ethernet-Attacking the Internet using Broadcast Digital Television Slides - Yossef Oren, Angelos D. Keromytis.pdf
8.6 MB
USENIX Security 2021/Hermes Attack Steal DNN Models with Lossless Inference Accuracy.mp4
8.6 MB
USENIX Security 2021/Partitioning Oracle Attacks.mp4
8.6 MB
USENIX Security 2021/Deep Entity Classification Abusive Account Detection for Online Social.mp4
8.6 MB
USENIX Security 2020/USENIX Security 2020 Videos/Scaling Verifiable Computation Using Efficient Set Accumulators.mp4
8.6 MB
USENIX Security 2020/USENIX Security 2020 Videos/Boxer Preventing fraud by scanning credit cards.mp4
8.6 MB
USENIX Security 2021/SWIFT Super-fast and Robust Privacy-Preserving Machine Learning.mp4
8.6 MB
USENIX Security 2021/LIGHTBLUE Automatic Profile-Aware Debloating of Bluetooth Stacks.mp4
8.5 MB
USENIX Security 2020/USENIX Security 2020 Videos/(Mostly) Exitless VM Protection from Untrusted Hypervisor through Disaggregate.mp4
8.5 MB
USENIX Security 2021/Blitz Secure Multi-Hop Payments Without Two-Phase Commits.mp4
8.5 MB
USENIX Security 2021/Undo Workarounds for Kernel Bugs.mp4
8.5 MB
USENIX Security 2021/U Can't Debug This Detecting JavaScript Anti-Debugging Techniques in the Wild.mp4
8.5 MB
USENIX Security 2021/A Side Journey To Titan.mp4
8.5 MB
USENIX Security 2021/Frontrunner Jones and the Raiders of the Dark Forest An Empirical Study.mp4
8.5 MB
USENIX Security 2020/USENIX Security 2020 Videos/Achieving Keyless CDNs with Conclaves.mp4
8.5 MB
USENIX Security 2021/CIPHERLEAKS Breaking Constant-time Cryptography on AMD SEV via.mp4
8.4 MB
USENIX Security 2021/Can Systems Explain Permissions Better Understanding Users' Misperceptions.mp4
8.4 MB
USENIX Security 2020/USENIX Security 2020 Videos/From Needs to Actions to Secure Apps The Effect of Requirements.mp4
8.4 MB
USENIX Security 2021/The Use of Likely Invariants as Feedback for Fuzzers.mp4
8.4 MB
USENIX Security 2021/SEAL Storage-efficient Causality Analysis on Enterprise Logs.mp4
8.4 MB
USENIX Security 2020/USENIX Security 2020 Videos/What Twitter Knows Characterizing Ad Targeting Practices, User Perceptions.mp4
8.4 MB
USENIX Security 2021/Osiris Automated Discovery of Microarchitectural Side Channels.mp4
8.4 MB
USENIX Security 2020/USENIX Security 2020 Videos/Understanding security mistakes developers make Qualitative analysis.mp4
8.4 MB
USENIX Security 2021/Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing.mp4
8.4 MB
USENIX Security 2021/A Large Scale Study of User Behavior, Expectations and Engagement with.mp4
8.4 MB
USENIX Security 2020/USENIX Security 2020 Videos/TXSPECTOR Uncovering Attacks in Ethereum from Transactions.mp4
8.3 MB
USENIX Security 2021/ABY2.0 Improved Mixed-Protocol Secure Two-Party Computation.mp4
8.3 MB
USENIX Security 2020/USENIX Security 2020 Videos/Hybrid Batch Attacks Finding Black-box Adversarial Examples with Limited.mp4
8.3 MB
USENIX Security 2021/Entangled Watermarks as a Defense against Model Extraction.mp4
8.3 MB
USENIX Security 2021/DRMI A Dataset Reduction Technology based on Mutual Information for Black-box.mp4
8.3 MB
USENIX Security 2021/Stealing Links from Graph Neural Networks.mp4
8.3 MB
USENIX Security 2021/DEFInit An Analysis of Exposed Android Init Routines.mp4
8.3 MB
USENIX Security 2021/Reducing HSM Reliance in Payments through Proxy Re-Encryption.mp4
8.2 MB
USENIX Security 2020/USENIX Security 2020 Videos/Delphi A Cryptographic Inference Service for Neural Networks.mp4
8.2 MB
USENIX Security 2020/USENIX Security 2020 Videos/Silhouette Efficient Protected Shadow Stacks for Embedded Systems.mp4
8.2 MB
USENIX Security 2021/Effective Notification Campaigns on the Web A Matter of Trust, Framing, and.mp4
8.2 MB
USENIX Security 2021/CADE Detecting and Explaining Concept Drift Samples for Security Applications.mp4
8.2 MB
USENIX Security 2020/USENIX Security 2020 Videos/Montage A Neural Network Language Model-Guided JavaScript Engine Fuzzer.mp4
8.2 MB
USENIX Security 2014/USENIX Security 2014 Presentations/Security Analysis of a Full-Body Scanner Slides - Keaton Mowery, Eric Wustrow, Tom Wypych, Corey Singleton, Chris Comfort, Eric Rescorla, Stephen Checkoway, J. Alex.pdf
8.2 MB
USENIX Security 2021/A Stealthy Location Identification Attack Exploiting Carrier Aggregation.mp4
8.2 MB
USENIX Security 2020/USENIX Security 2020 Videos/Droplet Decentralized Authorization and Access Control for Encrypted Data.mp4
8.2 MB
USENIX Security 2021/Towards Formal Verification of State Continuity for Enclave Programs.mp4
8.1 MB
USENIX Security 2021/DICE - A Formally Verified Implementation of DICE Measured Boot.mp4
8.1 MB
USENIX Security 2021/Preventing Use-After-Free Attacks with Fast Forward Allocation.mp4
8.1 MB
USENIX Security 2021/It's stressful having all these phones - Investigating Sex Workers Safety.mp4
8.1 MB
USENIX Security 2020/USENIX Security 2020 Videos/Preech A System for Privacy-Preserving Speech Transcription.mp4
8.1 MB
USENIX Security 2021/Strategies and Perceived Risks of Sending Sensitive Documents.mp4
8.1 MB
USENIX Security 2021/'Passwords Keep Me Safe' - Understanding What Children Think about Passwords.mp4
8.1 MB
USENIX Security 2021/ExpRace Exploiting Kernel Races through Raising Interrupts.mp4
8.1 MB
USENIX Security 2020/USENIX Security 2020 Videos/BScout Direct Whole Patch Presence Test for Java Executables.mp4
8.1 MB
USENIX Security 2021/Evaluating In-Workflow Messages for Improving Mental Models of End-to-End.mp4
8.0 MB
USENIX Security 2021/PrivSyn Differentially Private Data Synthesis.mp4
8.0 MB
USENIX Security 2021/Capture Centralized Library Management for Heterogeneous IoT Devices.mp4
8.0 MB
USENIX Security 2021/Reducing Test Cases with Attention Mechanism of Neural Networks.mp4
8.0 MB
USENIX Security 2021/Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers.mp4
8.0 MB
USENIX Security 2020/USENIX Security 2020 Videos/I have too much respect for my elders Understanding South African Mobile.mp4
7.9 MB
USENIX Security 2021/KeyForge Non-Attributable Email from Forward-Forgeable Signatures.mp4
7.9 MB
USENIX Security 2021/Communication-Computation Trade-offs in PIR.mp4
7.9 MB
USENIX Security 2021/Swiped Analyzing Ground-truth Data of a Marketplace for Stolen Debit.mp4
7.9 MB
USENIX Security 2021/CACTI Captcha Avoidance via Client-side TEE Integration.mp4
7.9 MB
USENIX Security 2021/Having Your Cake and Eating It An Analysis of Concession-Abuse-as-a-Service.mp4
7.8 MB
USENIX Security 2021/Compromised or Attacker-Owned A Large Scale Classification and Study.mp4
7.8 MB
USENIX Security 2021/Nyx Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types.mp4
7.8 MB
USENIX Security 2012/USENIX Security 2012 Presentations/Data Node Encrypted File System Efficient Secure Deletion for Flash Memory Slides - Joel Reardon, Srdjan Capkun, David Basin.pdf
7.8 MB
USENIX Security 2020/USENIX Security 2020 Videos/V0LTpwn Attacking x86 Processor Integrity from Software.mp4
7.8 MB
USENIX Security 2021/Using Amnesia to Detect Credential Database Breaches.mp4
7.8 MB
USENIX Security 2021/Balboa Bobbing and Weaving around Network Censorship.mp4
7.8 MB
USENIX Security 2021/DeepReflect Discovering Malicious Functionality through Binary Reconstruction.mp4
7.8 MB
FOCI 2020/MIMIQ Masking IPs with Migration in QUIC.mp4
7.7 MB
USENIX Security 2021/DOLMA Securing Speculation with the Principle of Transient Non-Observability.mp4
7.7 MB
USENIX Security 2021/Effect of Mood, Location, Trust, and Presence of Others on Video-Based.mp4
7.7 MB
USENIX Security 2021/Express Lowering the Cost of Metadata-hiding Communication with Cryptographic.mp4
7.7 MB
USENIX Security 2021/SocialHEISTing Understanding Stolen Facebook Accounts.mp4
7.7 MB
USENIX Security 2011/USENIX Security 2011 Videos/Opening Remarks, Awards, and Keynote Address - David Wagner.mp4
7.7 MB
USENIX Security 2021/An Analysis of Speculative Type Confusion Vulnerabilities in the Wild.mp4
7.6 MB
USENIX Security 2020/FOCI '20/FOCI 20 - HTTPT A Probe-Resistant Proxy.mp4
7.6 MB
USENIX Security 2021/ARCUS Symbolic Root Cause Analysis of Exploits in Production Systems.mp4
7.6 MB
USENIX Security 2020/USENIX Security 2020 Videos/BlockSci Design and applications of a blockchain analysis platform.mp4
7.6 MB
USENIX Security 2021/Incrementally Updateable Honey Password Vaults.mp4
7.6 MB
USENIX Security 2020/USENIX Security 2020 Videos/ETHBMC A Bounded Model Checker for Smart Contracts.mp4
7.6 MB
USENIX Security 2021/SmarTest Effectively Hunting Vulnerable Transaction Sequences in Smart.mp4
7.5 MB
FOCI 2020/Detecting and Evading Censorship-in-Depth A Case Study of Iran’s Protocol Whitelister.mp4
7.5 MB
USENIX Security 2021/How to Make Private Distributed Cardinality Estimation Practical.mp4
7.4 MB
USENIX Security 2021/Cerebro A Platform for Multi-Party Cryptographic Collaborative Learning.mp4
7.4 MB
USENIX Security 2021/Fine Grained Dataflow Tracking with Proximal Gradients.mp4
7.4 MB
USENIX Security 2021/Blind In On-Path Attacks and Applications to VPNs.mp4
7.4 MB
USENIX Security 2020/USENIX Security 2020 Videos/AURORA Statistical Crash Analysis for Automated Root Cause Explanation.mp4
7.3 MB
USENIX Security 2021/Jetset Targeted Firmware Rehosting for Embedded Systems.mp4
7.3 MB
USENIX Security 2020/USENIX Security 2020 Videos/Stolen Memories Leveraging Model Memorization for Calibrated White-Box.mp4
7.3 MB
USENIX Security 2021/Why Older Adults (Don't) Use Password Managers.mp4
7.3 MB
USENIX Security 2020/USENIX Security 2020 Videos/High Accuracy and High Fidelity Extraction of Neural Networks.mp4
7.2 MB
FOCI 2020/Identifying Disinformation Websites Using Infrastructure Features.mp4
7.2 MB
USENIX Security 2020/PEPR '20/PEPR 20 - Building an Effective Feedback Loop for Your Privacy Program through Privacy Incident.mp4
7.2 MB
USENIX Security 2020/USENIX Security 2020 Videos/Poison Over Troubled Forwarders A Cache Poisoning Attack Targeting DNS.mp4
7.2 MB
USENIX Security 2021/Explanation Beats Context The Effect of Timing & Rationales on Users'.mp4
7.1 MB
USENIX Security 2021/PrimeProbe 1, JavaScript 0 Overcoming Browser-based Side-Channel Defenses.mp4
7.1 MB
USENIX Security 2010/USENIX Security 2010 Presentations/How Cyber Attacks Will Be Used in International Conflicts - Scott Borg.pdf
7.1 MB
USENIX Security 2021/Does logic locking work with EDA tools.mp4
7.1 MB
USENIX Security 2020/USENIX Security 2020 Videos/Exploring Connections Between Active Learning and Model Extraction.mp4
7.1 MB
USENIX Security 2021/Why TLS is better without STARTTLS A Security Analysis of STARTTLS.mp4
7.0 MB
USENIX Security 2012/USENIX Security 2012 Videos/Welcome - Tadayoshi Kohno.mp4
7.0 MB
USENIX Security 2021/It's the Company, the Government, You and I - User Perceptions of.mp4
6.9 MB
USENIX Security 2021/I Always Feel Like Somebody's Sensing Me A Framework to Detect, Identify, and.mp4
6.9 MB
USENIX Security 2021/Leakage of Dataset Properties in Multi-Party Machine Learning.mp4
6.9 MB
USENIX Security 2020/USENIX Security 2020 Videos/Empirical Measurement of Systemic 2FA Usability.mp4
6.9 MB
USENIX Security 2021/Raccoon Attack Finding and Exploiting Most-Significant-Bit-Oracles.mp4
6.8 MB
USENIX Security 2021/PEARL Plausibly Deniable Flash Translation Layer using WOM coding.mp4
6.8 MB
USENIX Security 2021/Shhhbe quiet - Reducing the Unwanted Interruptions of Notification.mp4
6.8 MB
USENIX Security 2021/Poseidon A New Hash Function for Zero-Knowledge Proof Systems.mp4
6.8 MB
USENIX Security 2013/USENIX Security 2013 Presentations/Let Me Answer That for You Exploiting Broadcast Information in Cellular Networks Slides - Nico Golde, Kévin Redon, and Jean-Pierre Seifert.pdf
6.7 MB
USENIX Security 2021/PTAuth Temporal Memory Safety via Robust Points-to Authentication.mp4
6.7 MB
USENIX Security 2021/Swivel Hardening WebAssembly against Spectre.mp4
6.7 MB
USENIX Security 2009/USENIX Security 2009 Presentations/Static Enforcement of Web Application Integrity Through Strong Typing Slides - William Robertson, Giovanni Vigna.pdf
6.7 MB
USENIX Security 2020/USENIX Security 2020 Videos/Zero-delay Lightweight Defenses against Website Fingerprinting.mp4
6.7 MB
USENIX Security 2021/SHARD Fine-Grained Kernel Specialization with Context-Aware Hardening.mp4
6.5 MB
FOCI 2020/HTTPT A Probe-Resistant Proxy.mp4
6.5 MB
USENIX Security 2014/USENIX Security 2014 Presentations/BareCloud Bare-metal Analysis-based Evasive Malware Detection Slides - Dhilung Kirat, Giovanni Vigna, Christopher Kruegel.pdf
6.4 MB
USENIX Security 2021/Mystique Efficient Conversions for Zero-Knowledge Proofs with Applications.mp4
6.2 MB
USENIX Security 2013/USENIX Security 2013 Presentations/You Are How You Click Clickstream Analysis for Sybil Detection Slides - Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng, Ben Y. Zhao.pdf
6.2 MB
USENIX Security 2021/Obfuscation-Resilient Executable Payload Extraction From Packed Malware.mp4
6.1 MB
USENIX Security 2014/USENIX Security 2014 Presentations/Oxymoron Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing Slides - Michael Backes, Stefan Nurnberger.pdf
6.1 MB
USENIX Security 2021/MBA-Blast Unveiling and Simplifying Mixed Boolean-Arithmetic Obfuscation.mp4
6.1 MB
USENIX Security 2021/Cost-Aware Robust Tree Ensembles for Security Applications.mp4
6.1 MB
USENIX Security 2020/PEPR '20/PEPR 20 - Throwing Out the Checklist.mp4
6.0 MB
USENIX Security 2012/USENIX Security 2012 Presentations/Aurasium Practical Policy Enforcement for Android Applications Slides - Rubin Xu, Hassen Saidi, Ross Anderson.pdf
6.0 MB
USENIX Security 2013/USENIX Security 2013 Presentations/Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies Slides - Sven Bugiel, Stephan Heuser, Ahmad-Reza Sadeghi.pdf
5.9 MB
USENIX Security 2013/USENIX Security 2013 Presentations/Greystar Fast and Accurate Detection of SMS Spam Numbers in Large Cellular Networks Using Gray Phone Space - Nan Jiang, Yu Jin, Ann Skudlark, Zhi-Li Zhang.pdf
5.9 MB
USENIX Security 2009/USENIX Security 2009 Presentations/How the Pursuit of Truth Led Me to Selling Viagra - Vern Paxson.pdf
5.9 MB
USENIX Security 2021/Token-Level Fuzzing.mp4
5.8 MB
USENIX Security 2014/USENIX Security 2014 Presentations/Gyrophone Recognizing Speech from Gyroscope Signals Slides - Yan Michalevsky, Dan Boneh, Gabi Nakibly.pdf
5.7 MB
USENIX Security 2014/USENIX Security 2014 Presentations/The Emperor’s New Password Manager Security Analysis of Web-based Password Managers Slides - Zhiwei Li, Warren He, Devdatta Akhawe, Dawn Song.pdf
5.7 MB
USENIX Security 2014/USENIX Security 2014 Presentations/A Bayesian Approach to Privacy Enforcement in Smartphones Slides - Omer Tripp, Julia Rubin.pdf
5.6 MB
USENIX Security 2014/USENIX Security 2014 Presentations/When Governments Hack Opponents A Look at Actors and Technology - William R. Marczak, John Scott-Railton, Morgan Marquis-Boire, Vern Paxson.pdf
5.5 MB
USENIX Security 2013/USENIX Security 2013 Presentations/Securing Embedded User Interfaces Android and Beyond Slides - Franziska Roesner, Tadayoshi Kohnos.pdf
5.3 MB
USENIX Security 2011/USENIX Security 2011 Presentations/Telex Anticensorship in the Network Infrastructure Slides - Eric Wustrow, Scott Wolchok, Ian Goldberg, J. Alex Halderman.pdf
5.2 MB
USENIX Security 2008/USENIX Security 2008 Presentations/Political DDoS Estonia and Beyond Slides - Jose Nazario.pdf
5.1 MB
USENIX Security 2011/USENIX Security 2011 Presentations/Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade Slides - Nektarios Leontiadis, Tyler Moore, Nicolas Christin.pdf
5.1 MB
USENIX Security 2012/USENIX Security 2012 Presentations/STING Finding Name Resolution Vulnerabilities in Programs Slides - Hayawardh Vijayakumar, Joshua Schiffman, Trent Jaeger.pdf
5.1 MB
USENIX Security 2009/USENIX Security 2009 Presentations/Designing Trustworthy User Agents for a Hostile Web Slides - Eric Lawrence.pdf
5.0 MB
USENIX Security 2013/USENIX Security 2013 Presentations/Practical Comprehensive Bounds on Surreptitious Communication over DNS - Rao, Reiner Sailer, Douglas Lee Schales, Marc Ph. Stoecklin, Kurt Thomas, Wietse Venema.pdf
5.0 MB
USENIX Security 2014/USENIX Security 2014 Presentations/Man vs. Machine Practical Adversarial Detection of Malicious Crowdsourcing Workers Slides - Gang Wang, Tianyi Wang, Santa Barbara, Haitao Zheng, Ben Y. Zhao.pdf
4.9 MB
USENIX Security 2011/USENIX Security 2011 Presentations/deSEO Combating Search-Result Poisoning Slides - John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy, Martin Abadi.pdf
4.8 MB
USENIX Security 2014/USENIX Security 2014 Presentations/Automatically Detecting Vulnerable Websites Before They Turn Malicious Slides - Kyle Soska, Nicolas Christin.pdf
4.7 MB
USENIX Security 2014/USENIX Security 2014 Presentations/Never Been KIST Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport Slides - Rob Jansen, John Geddes, Chris Wacek, Micah Sherr, Paul Syverson.pdf
4.6 MB
USENIX Security 2013/USENIX Security 2013 Presentations/On the Security of Picture Gesture Authentication - Ziming Zhao, Gail-Joon Ahn, Jeong-Jin Seo, Hongxin Hu.pdf
4.6 MB
USENIX Security 2011/USENIX Security 2011 Presentations/ADsafety Type-Based Verification of JavaScript Sandboxing Slides - Joe Gibbs Politz, Spiridon Aristides Eliopoulos, Arjun Guha, Shriram Krishnamurthi.pdf
4.5 MB
USENIX Security 2011/USENIX Security 2011 Presentations/Crossing the Chasm Pitching Security Research to Mainstream Browser Vendors - Collin Jackson.pdf
4.5 MB
USENIX Security 2014/USENIX Security 2014 Presentations/SpanDex Secure Password Tracking for Android Slides - Landon P. Cox , Peter Gilbert, Geoffrey Lawler, Valentin Pistol, Ali Razeen, Bi Wu, Sai Cheemalapati.pdf
4.4 MB
USENIX Security 2014/USENIX Security 2014 Presentations/An Internet-Wide View of Internet-Wide Scanning Slides - Zakir Durumeric, Michael Bailey, J. Alex Halderman.pdf
4.4 MB
USENIX Security 2014/USENIX Security 2014 Presentations/LibFTE A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes Slides - Daniel Luchaup, Kevin P. Dyer, Somesh Jha, Thomas Ristenpart, Thomas Shrimpt.pdf
4.3 MB
USENIX Security 2011/USENIX Security 2011 Presentations/Outsourcing the Decryption of ABE Ciphertexts Slides - Matthew Green, Susan Hohenberger, Brent Waters.pdf
4.3 MB
USENIX Security 2013/USENIX Security 2013 Presentations/Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation - Frank Imeson, Ariq Emtenan, Siddharth Garg, and Mah.pdf
4.1 MB
USENIX Security 2014/USENIX Security 2014 Presentations/Security Analysis of a Full-Body Scanner - Keaton Mowery, Eric Wustrow, Tom Wypych, Corey Singleton, Chris Comfort, Eric Rescorla, Stephen Checkoway, J. Alex Halder.pdf
4.1 MB
USENIX Security 2012/USENIX Security 2012 Presentations/Security and Usability Challenges of Moving-Object CAPTCHAs Decoding Codewords in Motion Slides - Y. Xu, G. Reynaga, S. Chiasson, J.-M. Frahm, F. Monrose, P. van Oorschot.pdf
4.1 MB
USENIX Security 2012/USENIX Security 2012 Presentations/New Attacks on Timing-based Network Flow Watermarks Slides - Zi Lin, Nicholas Hopper.pdf
4.0 MB
USENIX Security 2011/USENIX Security 2011 Presentations/Show Me the Money Characterizing Spam-advertised Revenue Slides - Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorso, Christian Kreibich, Kirill Levchenko.pdf
4.0 MB
USENIX Security 2014/USENIX Security 2014 Presentations/Scheduler-based Defenses against Cross-VM Side-channels Slides - Venkatanathan Varadarajan, Thomas Ristenpart, Michael Swift.pdf
3.9 MB
USENIX Security 2009/USENIX Security 2009 Presentations/The Building Security in Maturity Model (BSIMM) - Gary McGraw, Brian Chess.pdf
3.9 MB
USENIX Security 2009/USENIX Security 2009 Presentations/The Building Security in Maturity Model (BSIMM) Slides - Gary McGraw, Brian Chess.pdf
3.9 MB
USENIX Security 2014/USENIX Security 2014 Presentations/Targeted Threat Index Characterizing and Quantifying Politically-Motivated Targeted Malware - Seth Hardy, Masashi Crete-Nishihata, Katharine Kleemola, Adam Senft, B.pdf
3.9 MB
USENIX Security 2013/USENIX Security 2013 Presentations/Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers - Suman Jana, David Molnar, Alexander Moshchuk, Alan Dunn, Benjamin Livshits, .pdf
3.8 MB
USENIX Security 2014/USENIX Security 2014 Presentations/Burst ORAM Minimizing ORAM Response Times for Bursty Access Patterns - Jonathan Dautrich, University of California, Riverside; Emil Stefanov, Elaine Shi.pdf
3.8 MB
USENIX Security 2010/USENIX Security 2010 Presentations/Grid, PhD Smart Grid, Cyber Security, and the Future of Keeping the Lights On - Kelly Ziegler.pdf
3.8 MB
USENIX Security 2009/USENIX Security 2009 Presentations/Vanish Increasing Data Privacy with Self-Destructing Data Slides - Roxana Geambasu, Tadayoshi Kohno, Amit A. Levy, Henry M. Levy.pdf
3.7 MB
USENIX Security 2014/USENIX Security 2014 Presentations/Peeking into Your App without Actually Seeing It UI State Inference and Novel Android Attacks Slides - Qi Alfred Chen, Zhiyun Qian, Z. Morley Mao.pdf
3.7 MB
USENIX Security 2012/USENIX Security 2012 Presentations/Clickjacking Attacks and Defenses Slides Slides - Lin-Shung Huang, Alex Moshchuk, Helen J. Wang, Stuart Schechter, Collin Jackson.pdf
3.7 MB
USENIX Security 2011/USENIX Security 2011 Presentations/SMS of Death From Analyzing to Attacking Mobile Phones on a Large Scale Slides - Collin Mulliner, Nico Golde, Jean-Pierre Seifert.pdf
3.6 MB
USENIX Security 2013/USENIX Security 2013 Presentations/The Velocity of Censorship High-Fidelity Detection of Microblog Post Deletions Slides - Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall.pdf
3.6 MB
USENIX Security 2012/USENIX Security 2012 Presentations/Social Networking with Frientegrity Privacy and Integrity with an Untrusted Provider Slides - Ariel J. Feldman, Aaron Blankstein, Michael J. Freedman, Edward W. Felten.pdf
3.6 MB
USENIX Security 2014/USENIX Security 2014 Presentations/Gyrophone Recognizing Speech from Gyroscope Signals - Yan Michalevsky, Dan Boneh, Gabi Nakibly.pdf
3.5 MB
USENIX Security 2013/USENIX Security 2013 Presentations/Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation Slides - Frank Imeson, Ariq Emtenan, Siddharth Garg.pdf
3.4 MB
USENIX Security 2013/USENIX Security 2013 Presentations/Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers Slides - Suman Jana, David Molnar, Alexander Moshchuk, Alan Dunn, Benjamin Liv.pdf
3.3 MB
USENIX Security 2012/USENIX Security 2012 Presentations/Privacy-Preserving Social Plugins Slides - Georgios Kontaxis, Michalis Polychronakis, Angelos D. Keromytis, Evangelos P. Markatos.pdf
3.3 MB
USENIX Security 2013/USENIX Security 2013 Presentations/On the Security of RC4 in TLS Slides - Nadhem AlFardan, Royal Holloway, Daniel J. Bernstein, Kenneth G. Paterson, Bertram Poettering, Jacob C.N. Schuldt.pdf
3.3 MB
USENIX Security 2009/USENIX Security 2009 Presentations/USENIX Security 2009 Track - Attacks.pdf
3.3 MB
USENIX Security 2010/USENIX Security 2010 Presentations/Staying Safe on the Web Yesterday, Today, and Tomorrow - Sid Stamm.pdf
3.1 MB
USENIX Security 2014/USENIX Security 2014 Presentations/SDDR Light-Weight, Secure Mobile Encounters Slides - Matthew Lentz, Viktor Erdélyi, Paarijaat Aditya, Elaine Shi, Peter Druschel, Bobby Bhattacharjee.pdf
3.1 MB
USENIX Security 2014/USENIX Security 2014 Presentations/A Large-Scale Analysis of the Security of Embedded Firmwares Slides - Andrei Costin, Jonas Zaddach, Aurelien Francillon, and Davide Balzarotti.pdf
3.1 MB
USENIX Security 2014/USENIX Security 2014 Presentations/On the Feasibility of Large-Scale Infections of iOS Devices Slides - Tielei Wang, Yeongjin Jang, Yizheng Chen, Simon Chung, Billy Lau, Wenke Lee costin.pdf
3.1 MB
USENIX Security 2013/USENIX Security 2013 Presentations/Let Me Answer That for You Exploiting Broadcast Information in Cellular Networks - Nico Golde, Kévin Redon, and Jean-Pierre Seifert.pdf
3.1 MB
USENIX Security 2014/USENIX Security 2014 Presentations/Towards Detecting Anomalous User Behavior in Online Social Networks Slides - Bimal Viswanath, M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna P. Gummadi, Max P.pdf
3.0 MB
USENIX Security 2009/USENIX Security 2009 Presentations/Top Ten Web Hacking Techniques of 2008 What's possible, not probable - Jeremiah Grossman.pdf
3.0 MB
USENIX Security 2013/USENIX Security 2013 Presentations/Trafficking Fraudulent Accounts The Role of the Underground Market in Twitter Spam and Abuse Slides - Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, Vern Paxson.pdf
2.9 MB
USENIX Security 2011/USENIX Security 2011 Presentations/Faster Secure Two-Party Computation Using Garbled Circuits Slides - Yan Huang, David Evans, Jonathan Katz.pdf
2.9 MB
USENIX Security 2011/USENIX Security 2011 Presentations/The Cloud-y Future of Security Technologies - Adam O'Donnell.pdf
2.9 MB
USENIX Security 2014/USENIX Security 2014 Presentations/Brahmastra Driving Apps to Test the Security of Third-Party Components Slides - Ravi Bhoraskar, Seungyeop Han, Jinseong Jeon, Tanzirul Azim, Shuo Chen, Jaeyeon Jung.pdf
2.9 MB
USENIX Security 2012/USENIX Security 2012 Presentations/Efficient and Scalable Socware Detection in Online Social Networks Slides - Md Sazzadur Rahman, Ting-Kai Huang, Harsha V. Madhyastha, Michalis Faloutsos.pdf
2.9 MB
USENIX Security 2014/USENIX Security 2014 Presentations/Telepathwords Preventing Weak Passwords by Reading Users’ Minds Slides - Saranga Komanduri, Richard Shay, Lorrie Faith Cranor, Cormac Herley Stuart Schechter.pdf
2.9 MB
USENIX Security 2013/USENIX Security 2013 Presentations/Take This Personally Pollution Attacks on Personalized Services - Xinyu Xing, Wei Meng, Dan Doozan, Alex C. Snoeren, Nick Feamster, Wenke Lee.pdf
2.9 MB
USENIX Security 2012/USENIX Security 2012 Presentations/Enemy of the State A State-Aware Black-Box Web Vulnerability Scanner Slides - Adam Doupe, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna.pdf
2.8 MB
USENIX Security 2014/USENIX Security 2014 Presentations/JIGSAW Protecting Resource Access by Inferring Programmer Expectations Slides - Hayawardh Vijayakumar, Xinyang Ge, Mathias Payer, Trent Jaeger.pdf
2.8 MB
USENIX Security 2014/USENIX Security 2014 Presentations/ret2dir Rethinking Kernel Isolation Slides - Vasileios P. Kemerlis, Michalis Polychronakis, Angelos D. Keromytis.pdf
2.8 MB
USENIX Security 2011/USENIX Security 2011 Presentations/Q Exploit Hardening Made Easy Slides - Edward J. Schwartz, Thanassis Avgerinos, David Brumley.pdf
2.7 MB
USENIX Security 2013/USENIX Security 2013 Presentations/Jekyll on iOS When Benign Apps Become Evil - Tielei Wang, Kangjie Lu, Long Lu, Simon Chung, Wenke Lee.pdf
2.7 MB
USENIX Security 2013/USENIX Security 2013 Presentations/Securing Embedded User Interfaces Android and Beyond - Franziska Roesner, Tadayoshi Kohno.pdf
2.7 MB
USENIX Security 2012/USENIX Security 2012 Presentations/How Does Your Password Measure Up - The Effect of Strength Meters on Password Creation Slides - Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michell.pdf
2.7 MB
USENIX Security 2011/USENIX Security 2011 Presentations/The (Decentralized) SSL Observatory - Peter Eckersley, Jesse Burns.pdf
2.7 MB
USENIX Security 2014/USENIX Security 2014 Presentations/DSCRETE Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse Slides - Brendan Saltaformaggio, Zhongshu Gu, Xiangyu Zhang, Dong.pdf
2.6 MB
USENIX Security 2009/USENIX Security 2009 Presentations/USENIX Security 2009 Track - Securing Web Apps.pdf
2.6 MB
USENIX Security 2013/USENIX Security 2013 Presentations/Transparent ROP Exploit Mitigation Using Indirect Branch Tracing - Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis.pdf
2.6 MB
USENIX Security 2013/USENIX Security 2013 Presentations/Impression Fraud in On-line Advertising via Pay-Per-View Networks - Kevin Springborn, Paul Barford.pdf
2.5 MB
USENIX Security 2013/USENIX Security 2013 Presentations/Automatic Mediation of Privacy-Sensitive Resource Access in Smartphone Applications - Benjamin Livshits, Jaeyeon Jung.pdf
2.5 MB
USENIX Security 2013/USENIX Security 2013 Presentations/Language-based Defenses Against Untrusted Browser Origins - Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Sergio Maffeisn.pdf
2.5 MB
USENIX Security 2014/USENIX Security 2014 Presentations/TRUESET Faster Verifiable Set Computations - Ahmed E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Mahmoud F. Sayed, Elaine Shi, Nikos Triandopoulos.pdf
2.5 MB
USENIX Security 2013/USENIX Security 2013 Presentations/Secure Outsourced Garbled Circuit Evaluation for Mobile Devices - Henry Carter, Benjamin Mood, Patrick Traynor, Kevin Butler.pdf
2.5 MB
USENIX Security 2011/USENIX Security 2011 Presentations/Telex Anticensorship in the Network Infrastructure - Eric Wustrow, Scott Wolchok, Ian Goldberg, J. Alex Halderman.pdf
2.5 MB
USENIX Security 2013/USENIX Security 2013 Presentations/Dowsing for Overflows A Guided Fuzzer to Find Buffer Boundary Violations - Istvan Haller, Asia Slowinska, Matthias Neugschwandtner, Herbert Bos.pdf
2.5 MB
USENIX Security 2011/USENIX Security 2011 Presentations/Dirty Jobs The Role of Freelance Labor in Web Service Abuse Slides - motoyama.pdf
2.4 MB
USENIX Security 2013/USENIX Security 2013 Presentations/Explicating SDKs Uncovering Assumptions Underlying Secure Authentication and Authorization - Rui Wang, Yuchen Zhou, Shuo Chen, Shaz Qadeer, David Evans, Yuri Gurevi.pdf
2.4 MB
USENIX Security 2011/USENIX Security 2011 Presentations/Measuring Pay-per-Install The Commoditization of Malware Distribution Slides - Juan Caballero, Chris Grier, Christian Kreibich, Vern Paxson.pdf
2.4 MB
USENIX Security 2012/USENIX Security 2012 Presentations/Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization Slides - Cristiano Giuffrida, Anton Kuijsten, Andrew S. Tanenbaum.pdf
2.4 MB
USENIX Security 2014/USENIX Security 2014 Presentations/Stitching the Gadgets On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection Slides - Lucas Davi, Ahmad-Reza Sadeghi, Daniel Lehmann, Fabian Mon.pdf
2.4 MB
USENIX Security 2011/USENIX Security 2011 Presentations/ZOZZLE Fast and Precise In-Browser JavaScript Malware Detection - Charlie Curtsinger, Benjamin Livshits, Benjamin Zorn, Christian Seifert.pdf
2.4 MB
USENIX Security 2013/USENIX Security 2013 Presentations/Alice in Warningland A Large-Scale Field Study of Browser Security Warning Effectiveness - Devdatta Akhawe, Adrienne Porter Felt.pdf
2.3 MB
USENIX Security 2012/USENIX Security 2012 Presentations/TARDIS Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without Clocks - Amir Rahmati, Mastooreh Salajegheh, Dan Holcomb, Jacob Sorber, Wayne P..pdf
2.3 MB
USENIX Security 2014/USENIX Security 2014 Presentations/SSOScan Automated Testing of Web Applications for Single Sign-On Vulnerabilities Slides - Yuchen Zhou, David Evans.pdf
2.3 MB
USENIX Security 2013/USENIX Security 2013 Presentations/You Are How You Click Clickstream Analysis for Sybil Detection - Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng, Ben Y. Zhao.pdf
2.3 MB
USENIX Security 2013/USENIX Security 2013 Presentations/KI-Mon A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel Object - Hojoon Lee, HyunGon Moon, DaeHee Jang, Kihwan Kim, Jihoon Lee, Yunheung P.pdf
2.3 MB
USENIX Security 2013/USENIX Security 2013 Presentations/Revolver An Automated Approach to the Detection of Evasive Web-based Malware - Alexandros Kapravelos, Yan Shoshitaishvili, Marco Cova, Christopher Kruegel, Giovanni.pdf
2.3 MB
USENIX Security 2013/USENIX Security 2013 Presentations/ExecScent Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates - Terry Nelms, Roberto Perdisci, Mustaque Ahamad.pdf
2.3 MB
USENIX Security 2014/USENIX Security 2014 Presentations/Password Managers Attacks and Defenses Slides - David Silver, Suman Jana, and Dan Boneh, Stanford University; Eric Chen, Collin Jackson.pdf
2.3 MB
USENIX Security 2013/USENIX Security 2013 Presentations/Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies - Sven Bugiel, Stephan Heuser, Ahmad-Reza Sadeghi.pdf
2.3 MB
USENIX Security 2013/USENIX Security 2013 Presentations/Measuring the Practical Impact of DNSSEC Deployment - Wilson Lian, Eric Rescorla, Hovav Shacham, Stefan Savage.pdf
2.3 MB
USENIX Security 2014/USENIX Security 2014 Presentations/Towards Reliable Storage of 56-bit Secrets in Human Memory Slides - Joseph Bonneau, Princeton University; Stuart Schechter.pdf
2.3 MB
USENIX Security 2012/USENIX Security 2012 Presentations/kGuard Lightweight Kernel Protection against Return-to-User Attacks Slides - Vasileios P. Kemerlis, Georgios Portokalidis, and Angelos D. Keromytis.pdf
2.3 MB
USENIX Security 2013/USENIX Security 2013 Presentations/Proactively Accountable Anonymous Messaging in Verdict - Henry Corrigan-Gibbs, David Isaac Wolinsky, Bryan Ford.pdf
2.3 MB
USENIX Security 2013/USENIX Security 2013 Presentations/Explicating SDKs Uncovering Assumptions Underlying Secure Authentication and Authorization Slides - Rui Wang, Yuchen Zhou, Shuo Chen, Shaz Qadeer, David Evans, Yuri.pdf
2.3 MB
USENIX Security 2013/USENIX Security 2013 Presentations/The Velocity of Censorship High-Fidelity Detection of Microblog Post Deletions - Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall.pdf
2.3 MB
USENIX Security 2014/USENIX Security 2014 Presentations/Hulk Eliciting Malicious Behavior in Browser Extensions Slides - Alexandros Kapravelos, Chris Grier, Neha Chachra, Christopher Kruegel, Giovanni Vigna, Vern Paxson.pdf
2.3 MB
USENIX Security 2013/USENIX Security 2013 Presentations/Effective Inter-Component Communication Mapping in Android An Essential Step Towards Holistic Security Analysis - Damien Octeau, Patrick McDaniel, Somesh Jha, Alexa.pdf
2.3 MB
USENIX Security 2014/USENIX Security 2014 Presentations/SDDR Light-Weight, Secure Mobile Encounters - Matthew Lentz, Viktor Erdélyi, Paarijaat Aditya, Elaine Shi, Peter Druschel, Bobby Bhattacharjee.pdf
2.3 MB
USENIX Security 2013/USENIX Security 2013 Presentations/Towards Automatic Software Lineage Inference - Jiyong Jang, Maverick Woo, David Brumley.pdf
2.2 MB
USENIX Security 2014/USENIX Security 2014 Presentations/Mimesis Aegis A Mimicry Privacy Shield-A System’s Approach to Data Privacy on Public Cloud Slides - Billy Lau, Simon Chung, Chengyu Song, Yeongjin Jang, Wenke Lee.pdf
2.2 MB
USENIX Security 2014/USENIX Security 2014 Presentations/Exit from Hell Reducing the Impact of Amplification DDoS Attacks - Marc Kuhrer, Thomas Hupperich, Christian Rossow, Thorsten Holz.pdf
2.2 MB
USENIX Security 2013/USENIX Security 2013 Presentations/ExecScent Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates Slides - Terry Nelms, Roberto Perdisci, Mustaque Ahamad.pdf
2.2 MB
USENIX Security 2013/USENIX Security 2013 Presentations/Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring - Edward J. Schwartz, JongHyup Lee, Maverick Woo, Dav.pdf
2.2 MB
USENIX Security 2013/USENIX Security 2013 Presentations/Strato A Retargetable Framework for Low-Level Inlined-Reference Monitors Slides - Bin Zeng, Gang Tan, Ulfar Erlingsson.pdf
2.2 MB
USENIX Security 2013/USENIX Security 2013 Presentations/On the Security of RC4 in TLS - Nadhem AlFardan, Royal Holloway, Daniel J. Bernstein, Kenneth G. Paterson, Bertram Poettering, Jacob C.N. Schuldt.pdf
2.2 MB
USENIX Security 2013/USENIX Security 2013 Presentations/Steal This Movie Automatically Bypassing DRM Protection in Streaming Media Services Slides - Ruoyu Wang, Santa Barbara, Yan Shoshitaishvili, Christopher Kruegel, Gi.pdf
2.2 MB
USENIX Security 2013/USENIX Security 2013 Presentations/WHYPER Towards Automating Risk Assessment of Mobile Applications - Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, Tao Xie.pdf
2.2 MB
USENIX Security 2013/USENIX Security 2013 Presentations/An Empirical Study of Vulnerability Rewards Programs - Matthew Finifter, Devdatta Akhawe, David Wagner.pdf
2.2 MB
USENIX Security 2013/USENIX Security 2013 Presentations/Trafficking Fraudulent Accounts The Role of the Underground Market in Twitter Spam and Abuse - Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, Vern Paxson.pdf
2.2 MB
USENIX Security 2011/USENIX Security 2011 Presentations/Privacy in the Age of Augmented Reality - Alessandro Acquisti.pdf
2.1 MB
USENIX Security 2013/USENIX Security 2013 Presentations/ZQL A Compiler for Privacy-Preserving Data Processing - Cedric Fournet, Markulf Kohlweiss, George Danezis.pdf
2.1 MB
USENIX Security 2020/USENIX Security 2020 Videos/VoteAgain A scalable coercion-resistant voting system.mp4
2.1 MB
USENIX Security 2014/USENIX Security 2014 Presentations/LibFTE A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes - Daniel Luchaup, Kevin P. Dyer, Somesh Jha, Thomas Ristenpart, Thomas Shrimpton.pdf
2.1 MB
USENIX Security 2013/USENIX Security 2013 Presentations/MetaSymploit Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis - Ruowen Wang, Peng Ning, Tao Xie, Quan Chen.pdf
2.1 MB
USENIX Security 2014/USENIX Security 2014 Presentations/Size Does Matter Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard Slides - Enes Goktas, Elias Athanasopoulos, Michalis Polychronakis, Herbert Bos.pdf
2.1 MB
USENIX Security 2013/USENIX Security 2013 Presentations/FIE on Firmware Finding Vulnerabilities in Embedded Systems Using Symbolic Execution - Drew Davidson, Benjamin Moench, Somesh Jha, Thomas Ristenpart.pdf
2.1 MB
USENIX Security 2014/USENIX Security 2014 Presentations/The Long Taile of Typosquatting Domain Names Slides - Janos Szurdi, Balazs Kocso, Gabor Cseh, Jonathan Spring, Mark Felegyhazi, Chris Kanich.pdf
2.1 MB
USENIX Security 2012/USENIX Security 2012 Presentations/PharmaLeaks Understanding the Business of Online Pharmaceutical Affiliate Programs Slides - Damon McCoy, Andreas Pitsillidis, Grant Jordan, Nicholas Weaver, Christian Kreibich, B.pdf
2.1 MB
USENIX Security 2013/USENIX Security 2013 Presentations/Strato A Retargetable Framework for Low-Level Inlined-Reference Monitors - Bin Zeng, Gang Tan, Ulfar Erlingsson.pdf
2.1 MB
USENIX Security 2013/USENIX Security 2013 Presentations/CacheAudit A Tool for the Static Analysis of Cache Side Channels - Goran Doychev, Dominik Feld, Boris Kopf, Laurent Mauborgne, Jan Reineke.pdf
2.1 MB
USENIX Security 2009/USENIX Security 2009 Presentations/Locating Prefix Hijackers using LOCK Slides - Tongqing Qiu, Lusheng Ji, Dan Pei, Jia Wang, Jun (Jim) Xu, Hitesh Ballani.pdf
2.1 MB
USENIX Security 2013/USENIX Security 2013 Presentations/DupLESS Server-Aided Encryption for Deduplicated Storage - Mihir Bellare, Sriram Keelveedhi, Thomas Ristenpart.pdf
2.1 MB
USENIX Security 2013/USENIX Security 2013 Presentations/Eradicating DNS Rebinding with the Extended Same-origin Policy - Martin Johns, Sebastian Lekies, Ben Stock.pdf
2.1 MB
USENIX Security 2013/USENIX Security 2013 Presentations/Control Flow Integrity for COTS Binaries - Mingwei Zhang, R. Sekar.pdf
2.1 MB
USENIX Security 2013/USENIX Security 2013 Presentations/Sancus Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base - Job Noorman, Pieter Agten, Wilfried Daniels, Raoul Strackx, A.pdf
2.1 MB
USENIX Security 2009/USENIX Security 2009 Presentations/USENIX Security 2009 Track - Radio.pdf
2.1 MB
USENIX Security 2014/USENIX Security 2014 Presentations/A Bayesian Approach to Privacy Enforcement in Smartphones - Omer Tripp, Julia Rubin.pdf
2.1 MB
USENIX Security 2013/USENIX Security 2013 Presentations/PCF A Portable Circuit Format for Scalable Two-Party Secure Computation - Ben Kreuter, Benjamin Mood, Abhi Shelat, Kevin Butler.pdf
2.1 MB
USENIX Security 2011/USENIX Security 2011 Presentations/Detecting Malware Domains at the Upper DNS Hierarchy Slides - Manos Antonakakis, Roberto Perdisci, Wenke Lee, Nikolaos Vasiloglou II, David Dagon.pdf
2.1 MB
USENIX Security 2013/USENIX Security 2013 Presentations/Steal This Movie Automatically Bypassing DRM Protection in Streaming Media Services - Ruoyu Wang, Santa Barbara, Yan Shoshitaishvili, Christopher Kruegel, Giovanni .pdf
2.0 MB
USENIX Security 2014/USENIX Security 2014 Presentations/Hulk Eliciting Malicious Behavior in Browser Extensions - Alexandros Kapravelos, Chris Grier, Neha Chachra, Christopher Kruegel, Giovanni Vigna, Vern Paxson.pdf
2.0 MB
USENIX Security 2013/USENIX Security 2013 Presentations/On the Security of Picture Gesture Authentication Slides - Ziming Zhao, Gail-Joon Ahn, Jeong-Jin Seo, Hongxin Hu.pdf
2.0 MB
USENIX Security 2013/USENIX Security 2013 Presentations/MetaSymploit Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis Slides - Ruowen Wang, Peng Ning, Tao Xie, Quan Chen.pdf
2.0 MB
USENIX Security 2014/USENIX Security 2014 Presentations/The Long Taile of Typosquatting Domain Names - Janos Szurdi, Balazs Kocso, Gabor Cseh, Jonathan Spring, Mark Felegyhazi, Chris Kanich.pdf
2.0 MB
USENIX Security 2009/USENIX Security 2009 Presentations/xBook Redesigning Privacy Control in Social Networking Platforms - Kapil Singh, Sumeer Bhola, Wenke Lee.pdf
2.0 MB
USENIX Security 2008/USENIX Security 2008 Presentations/Enterprise Security in the Brave New (Virtual) World - Tal Garfinkel.pdf
2.0 MB
USENIX Security 2011/USENIX Security 2011 Presentations/Show Me the Money Characterizing Spam-advertised Revenue - Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorso, Christian Kreibich, Kirill Levchenko, Vern.pdf
1.9 MB
USENIX Security 2009/USENIX Security 2009 Presentations/xBook Redesigning Privacy Control in Social Networking Platforms Slides - Kapil Singh, Sumeer Bhola, Wenke Lee.pdf
1.9 MB
USENIX Security 2012/USENIX Security 2012 Presentations/On Breaking SAML Be Whoever You Want to Be Slides - Juraj Somorovsky, Andreas Mayer, Jorg Schwenk, Marco Kampmann, Meiko Jensen.pdf
1.9 MB
USENIX Security 2008/USENIX Security 2008 Presentations/Lest We Remember - Cold Boot Attacks on Encryption Keys - J. Alex Haldermam, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ar.pdf
1.9 MB
USENIX Security 2012/USENIX Security 2012 Presentations/Security and Usability Challenges of Moving-Object CAPTCHAs Decoding Codewords in Motion - Y. Xu, G. Reynaga, S. Chiasson, J.-M. Frahm, F. Monrose, P. van Oorschot.pdf
1.9 MB
USENIX Security 2011/USENIX Security 2011 Presentations/BOTMAGNIFIER Locating Spambots on the Internet Slides - Gianluca Stringhini, Thorsten Holz, Brett Stone-Gross, Christopher Kruegel, Giovanni Vigna.pdf
1.9 MB
USENIX Security 2011/USENIX Security 2011 Presentations/Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade - Nektarios Leontiadis, Tyler Moore, Nicolas Christin.pdf
1.9 MB
USENIX Security 2012/USENIX Security 2012 Presentations/On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces - Ivan Martinovic, Doug Davies, Mario Frank, Daniele Perito, Tomas Ros, Dawn Song.pdf
1.9 MB
USENIX Security 2013/USENIX Security 2013 Presentations/Practical Comprehensive Bounds on Surreptitious Communication over DNS Slides - Rao, Reiner Sailer, Douglas Lee Schales, Marc Ph. Stoecklin, Kurt Thomas, Wietse Ven.pdf
1.9 MB
USENIX Security 2007/Presentations/How To Obtain and Assert Composable Security - Ran Canetti.pdf
1.9 MB
USENIX Security 2009/USENIX Security 2009 Presentations/Improving Tor using a TCP-over-DTLS Tunnel - Joel Reardon, Ian Goldberg.pdf
1.8 MB
USENIX Security 2009/USENIX Security 2009 Presentations/Memory Safety for Low-Level Software Hardware Interactions Slides - John Criswell, Nicolas Geoffray, Pierre et Marie Curie, Vikram Adve.pdf
1.8 MB
USENIX Security 2009/USENIX Security 2009 Presentations/Network Security - sec09_network.pdf
1.8 MB
USENIX Security 2012/USENIX Security 2012 Presentations/Progressive Authentication Deciding When to Authenticate on Mobile Phones Slides - Oriana Riva, Chuan Qin, Karin Strauss, Dimitrios Lymberopoulos.pdf
1.8 MB
USENIX Security 2012/USENIX Security 2012 Presentations/Progressive Authentication Deciding When to Authenticate on Mobile Phones - Oriana Riva, Chuan Qin, Karin Strauss, Dimitrios Lymberopoulos.pdf
1.8 MB
USENIX Security 2012/USENIX Security 2012 Presentations/Whispers in the Hyper-space High-speed Covert Channel Attacks in the Cloud Slides Slides Zhenyu Wu, Zhang Xu, Haining Wang.pdf
1.7 MB
USENIX Security 2009/USENIX Security 2009 Presentations/NOZZLE A Defense Against Heap-spraying Code Injection Attacks - Paruj Ratanaworabhan, Benjamin Livshits, Benjamin Zorn.pdf
1.7 MB
USENIX Security 2013/USENIX Security 2013 Presentations/An Empirical Study of Vulnerability Rewards Programs Slides Slides - Matthew Finifter, Devdatta Akhawe, David Wagner.pdf
1.7 MB
USENIX Security 2009/USENIX Security 2009 Presentations/The Multi-Principal OS Construction of the Gazelle Web Browser Slides - Helen J. Wang, Chris Grier, Alex Moshchuk, Samuel T. King, Piali Choudhury, Herman Vente.pdf
1.7 MB
USENIX Security 2014/USENIX Security 2014 Presentations/TapDance End-to-Middle Anticensorship without Flow Blocking Slides - Eric Wustrow, Colleen M. Swanson, J. Alex Halderman.pdf
1.7 MB
USENIX Security 2010/USENIX Security 2010 Presentations/Understanding CAPTCHA-Solving Services in an Economic Context - Marti Motoyama, Kirill Levchenko, Chris Kanich, Damon McCoy, Geoffrey M. Voelker, Stefan Savage.pdf
1.7 MB
USENIX Security 2009/USENIX Security 2009 Presentations/Hash Functions and Their Many Uses in Cryptography - Shai Halevi.pdf
1.7 MB
USENIX Security 2009/USENIX Security 2009 Presentations/CCCP Secure Remote Storage for Computational RFIDs Slides - Mastooreh Salajegheh, Shane Clark, Benjamin Ransford, Kevin Fu, Ari Juels.pdf
1.7 MB
USENIX Security 2014/USENIX Security 2014 Presentations/iSeeYou Disabling the MacBook Webcam Indicator LED - Matthew Brocker, Stephen Checkoway.pdf
1.6 MB
USENIX Security 2014/USENIX Security 2014 Presentations/Brahmastra Driving Apps to Test the Security of Third-Party Components - Ravi Bhoraskar, Seungyeop Han, Jinseong Jeon, Tanzirul Azim, Shuo Chen, Jaeyeon Jung, Suman.pdf
1.6 MB
USENIX Security 2012/USENIX Security 2012 Presentations/Mining Your Ps and Qs Detection of Widespread Weak Keys in Network Devices Slides - Nadia Heninger, Zakir Durumeric, Eric Wustrow, J. Alex Halderm.pdf
1.6 MB
USENIX Security 2013/USENIX Security 2013 Presentations/Language-based Defenses Against Untrusted Browser Origins Slides - Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Sergio Maffeis.pdf
1.6 MB
USENIX Security 2014/USENIX Security 2014 Presentations/Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture Slides - Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza.pdf
1.5 MB
USENIX Security 2009/USENIX Security 2009 Presentations/Compromising Electromagnetic Emanations of Wired and Wireless Keyboards - Martin Vuagnoux, Sylvain Pasini.pdf
1.5 MB
USENIX Security 2014/USENIX Security 2014 Presentations/Understanding the Dark Side of Domain Parking - Sumayah Alrwais, Kan Yuan, Eihal Alowaisheq, Zhou Li, XiaoFeng Wang.pdf
1.5 MB
USENIX Security 2012/USENIX Security 2012 Presentations/Tracking Rootkit Footprints with a Practical Memory Analysis System Slides - Weidong Cui, Marcus Peinado, Zhilei Xu, Ellick Chan.pdf
1.5 MB
USENIX Security 2013/USENIX Security 2013 Presentations/DupLESS Server-Aided Encryption for Deduplicated Storage Slides - Mihir Bellare, Sriram Keelveedhi, Thomas Ristenpart.pdf
1.5 MB
USENIX Security 2009/USENIX Security 2009 Presentations/A Practical Congestion Attack on Tor Using Long Paths - Nathan S. Evans, Roger Dingledine, Christian Grothoff.pdf
1.5 MB
USENIX Security 2013/USENIX Security 2013 Presentations/Alice in Warningland A Large-Scale Field Study of Browser Security Warning Effectiveness Slides - Devdatta Akhawe, Adrienne Porter Felt.pdf
1.5 MB
USENIX Security 2009/USENIX Security 2009 Presentations/JavaScript Security - sec09_javascript.pdf
1.4 MB
USENIX Security 2011/USENIX Security 2011 Presentations/Dark Clouds on the Horizon Using Cloud Storage as Attack Vector and Online Slack Space Slides - Martin Mulazzani, Sebastian Schrittwieser, Manuel Leithner, Markus H.pdf
1.4 MB
USENIX Security 2010/USENIX Security 2010 Presentations/Building a Dynamic Reputation System for DNS - Manos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee, Nick Feamster.pdf
1.4 MB
USENIX Security 2011/USENIX Security 2011 Presentations/A Study of Android Application Security - William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri.pdf
1.4 MB
USENIX Security 2009/USENIX Security 2009 Presentations/A Practical Congestion Attack on Tor Using Long Paths Slides - Nathan S. Evans, Roger Dingledine, Christian Grothoff.pdf
1.4 MB
USENIX Security 2011/USENIX Security 2011 Presentations/Measuring Pay-per-Install The Commoditization of Malware Distribution - Juan Caballero, Chris Grier, Christian Kreibich, Vern Paxson.pdf
1.4 MB
USENIX Security 2014/USENIX Security 2014 Presentations/Revisiting SSL-TLS Implementations New Bleichenbacher Side Channels and Attacks Slides - Christopher Meyer, Juraj Somorovsky, Eugen Weiss, Jorg Schwenk, Sebastian S.pdf
1.4 MB
USENIX Security 2012/USENIX Security 2012 Presentations/New Attacks on Timing-based Network Flow Watermarks - Zi Lin, Nicholas Hopper.pdf
1.4 MB
USENIX Security 2013/USENIX Security 2013 Presentations/FIE on Firmware Finding Vulnerabilities in Embedded Systems Using Symbolic Execution Slides - Drew Davidson, Benjamin Moench, Somesh Jha, Thomas Ristenpart.pdf
1.3 MB
USENIX Security 2013/USENIX Security 2013 Presentations/Secure Outsourced Garbled Circuit Evaluation for Mobile Devices Slides - Henry Carter, Benjamin Mood, Patrick Traynor, Kevin Butler.pdf
1.3 MB
USENIX Security 2014/USENIX Security 2014 Presentations/Faster Private Set Intersection Based on OT Extension Slides - Benny Pinkas, Thomas Schneider, Michael Zohner.pdf
1.3 MB
USENIX Security 2010/USENIX Security 2010 Presentations/Security and Privacy Vulnerabilities of In-Car Wireless Networks A Tire Pressure Monitoring System Case Study - Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis Tay.pdf
1.3 MB
USENIX Security 2012/USENIX Security 2012 Presentations/How Does Your Password Measure Up - The Effect of Strength Meters on Password Creation - Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Ma.pdf
1.3 MB
USENIX Security 2012/USENIX Security 2012 Presentations/Neuroscience Meets Cryptography Designing Crypto Primitives Secure Against Rubber Hose Attacks Slides - Hristo Bojinov, Daniel Sanchez, Paul Reber, Northw.pdf
1.3 MB
USENIX Security 2009/USENIX Security 2009 Presentations/Peeping Tom in the Neighborhood Keystroke Eavesdropping on Multi-User Systems Slides - Kehuan Zhang, XiaoFeng Wang.pdf
1.3 MB
USENIX Security 2012/USENIX Security 2012 Presentations/An Evaluation of the Google Chrome Extension Security Architecture Slides -Slides - Nicholas Carlini, Adrienne Porter Felt, David Wagner.pdf
1.3 MB
USENIX Security 2011/USENIX Security 2011 Presentations/QUIRE Lightweight Provenance for Smart Phone Operating Systems - Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anhei Shu, Dan S. Wallach.pdf
1.3 MB
USENIX Security 2007/Presentations/On Attack Causality in Internet-Connected Cellular Networks - Patrick Traynor, Patrick McDaniel, Thomas La Porta.pdf
1.2 MB
USENIX Security 2009/USENIX Security 2009 Presentations/Malware Detection and Protection.pdf
1.2 MB
USENIX Security 2008/USENIX Security 2008 Presentations/Helios Web-based Open-Audit Voting - Ben Adida.pdf
1.2 MB
USENIX Security 2014/USENIX Security 2014 Presentations/Precise Client-side Protection against DOM-based Cross-Site Scripting Slides - Ben Stock, Sebastian Lekies, Tobias Mueller, Patrick Spiegel, and Martin Johns.pdf
1.2 MB
USENIX Security 2010/USENIX Security 2010 Presentations/Fighting Coercion Attacks in Key Generation using Skin Conductance - Payas Gupta, Debin Gao.pdf
1.2 MB
USENIX Security 2007/Presentations/Mobile Malware - Mikko Hypponen.pdf
1.2 MB
USENIX Security 2011/USENIX Security 2011 Presentations/Detecting Malware Domains at the Upper DNS Hierarchy - Manos Antonakakis, Roberto Perdisci, Wenke Lee, Nikolaos Vasiloglou II, David Dagon.pdf
1.2 MB
USENIX Security 2011/USENIX Security 2011 Presentations/Comprehensive Experimental Analyses of Automotive Attack Surfaces - Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl.pdf
1.2 MB
USENIX Security 2012/USENIX Security 2012 Presentations/Throttling Tor Bandwidth Parasites - Rob Jansen, Paul Syverson, Nicholas Hopper.pdf
1.2 MB
USENIX Security 2012/USENIX Security 2012 Presentations/PharmaLeaks Understanding the Business of Online Pharmaceutical Affiliate Programs - Damon McCoy, Andreas Pitsillidis, Grant Jordan, Nicholas Weaver, Christian Kreibich, Brian Kr.pdf
1.2 MB
USENIX Security 2012/USENIX Security 2012 Presentations/STEALTHMEM System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud Slides - Taesoo Kim, Marcus Peinado, Gloria Mainar-Ruiz.pdf
1.2 MB
USENIX Security 2009/USENIX Security 2009 Presentations/Crying Wolf An Empirical Study of SSL Warning Effectiveness Slides - Joshua Sunshine, Serge Egelman, Hazim Almuhimedi, Neha Atri, Lorrie Faith Cranor.pdf
1.2 MB
USENIX Security 2014/USENIX Security 2014 Presentations/TRUESET Faster Verifiable Set Computations Slides - Ahmed E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Mahmoud F. Sayed, Elaine Shi, Nikos Triandopoul.pdf
1.2 MB
USENIX Security 2012/USENIX Security 2012 Presentations/Establishing Browser Security Guarantees through Formal Shim Verification Slides - Dongseok Jang, Zachary Tatlock, Sorin Lerner.pdf
1.1 MB
USENIX Security 2011/USENIX Security 2011 Presentations/Toward Secure Embedded Web Interfaces - Baptiste Gourdin, Chinmay Soman, Hristo Bojinov, Elie Bursztein.pdf
1.1 MB
USENIX Security 2012/USENIX Security 2012 Presentations/Clickjacking Attacks and Defenses - Lin-Shung Huang, Alex Moshchuk, Helen J. Wang, Stuart Schechter, Collin Jackson.pdf
1.1 MB
USENIX Security 2014/USENIX Security 2014 Presentations/Optimizing Seed Selection for Fuzzing Slides - Alexandre Rebert, Sang Kil Cha, Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, David Brumley.pdf
1.1 MB
USENIX Security 2009/USENIX Security 2009 Presentations/Baggy Bounds Checking An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors - Periklis Akritidis, Manuel Costa, Miguel Castro, Steven Hand.pdf
1.1 MB
USENIX Security 2014/USENIX Security 2014 Presentations/Exit from Hell Reducing the Impact of Amplification DDoS Attacks Slides - Marc Kuhrer, Thomas Hupperich, Christian Rossow, Thorsten Holz.pdf
1.1 MB
USENIX Security 2011/USENIX Security 2011 Presentations/deSEO Combating Search-Result Poisoning - John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy, Martin Abadi.pdf
1.1 MB
USENIX Security 2008/USENIX Security 2008 Presentations/Panalyst Privacy-Aware Remote Error Analysis on Commodity Software - Rui Wang, XiaoFeng Wang, Zhuowei Li.pdf
1.1 MB
USENIX Security 2014/USENIX Security 2014 Presentations/ASM A Programmable Interface for Extending Android Security Slides - Stephan Heuser, Adwait Nadkarni, William Enck, Ahmad-Reza Sadeghi.pdf
1.1 MB
USENIX Security 2014/USENIX Security 2014 Presentations/Oxymoron Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing - Michael Backes, Stefan Nurnberger.pdf
1.1 MB
USENIX Security 2007/Presentations/Devices That Tell on You Privacy Trends in Consumer Ubiquitous Computing - T. Scott Saponas, Jonathan Lester, Carl Hartung, Sameer Agarwal, Tadayoshi Kohno.pdf
1.1 MB
USENIX Security 2012/USENIX Security 2012 Reports.pdf
1.1 MB
USENIX Security 2012/USENIX Security 2012 Presentations/Billion-Gate Secure Computation with Malicious Adversaries Slides Slides - Benjamin Kreuter, abhi shelat, and Chih-hao Shen.pdf
1.1 MB
USENIX Security 2009/USENIX Security 2009 Presentations/VPriv Protecting Privacy in Location-Based Vehicular Services Slides - Raluca Ada Popa, Hari Balakrishnan, Andrew J. Blumberg.pdf
1.1 MB
USENIX Security 2014/USENIX Security 2014 Presentations/XRay Enhancing the Web’s Transparency with Differential Correlation Slides - Mathias Lecuyer, Guillaume Ducoffe, Francis Lan, Andrei Papancea, Theofilos Petsios, Ri.pdf
1.0 MB
USENIX Security 2011/USENIX Security 2011 Presentations/Permission Re-Delegation Attacks and Defenses - Adrienne Porter Felt, Helen J. Wang, Alexander Moshchuk, Steve Hanna, Erika Chin.pdf
1.0 MB
USENIX Security 2014/USENIX Security 2014 Presentations/X-Force Force-Executing Binary Programs for Security Applications - Fei Peng, Zhui Deng, Xiangyu Zhang, and Dongyan Xu, Purdue University; Zhiqiang Lin, The Univers.pdf
1.0 MB
USENIX Security 2011/USENIX Security 2011 Presentations/Forensic Triage for Mobile Phones with DEC0DE - Robert J. Walls, Erik Learned-Miller, and Brian Neil Levine.pdf
1.0 MB
USENIX Security 2008/USENIX Security 2008 Presentations/Securing Frame Communication in Browsers - Adam Barth, Collin Jackson, John C. Mitchell.pdf
1.0 MB
USENIX Security 2014/USENIX Security 2014 Presentations/Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens Slides - Daniel Demmler, Thomas Schneider, Michael Zohner.pdf
1.0 MB
USENIX Security 2014/USENIX Security 2014 Presentations/A Large-Scale Empirical Analysis of Chinese Web Passwords Slides - Zhigong Li, Weili Han, Wenyuan Xu.pdf
986.6 kB
USENIX Security 2014/USENIX Security 2014 Presentations/Static Detection of Second-Order Vulnerabilities in Web Applications Slides - Johannes Dahse, Thorsten Holz.pdf
982.8 kB
USENIX Security 2011/USENIX Security 2011 Presentations/TRESOR Runs Encryption Securely Outside RAM Slides - Tilo Müller, Felix C. Freiling, Andreas Dewald.pdf
970.6 kB
USENIX Security 2013/USENIX Security 2013 Presentations/Dowsing for Overflows A Guided Fuzzer to Find Buffer Boundary Violations Slides - Istvan Haller, Asia Slowinska, Matthias Neugschwandtner, Herbert Bos.pdf
967.7 kB
USENIX Security 2011/USENIX Security 2011 Presentations/Static Detection of Access Control Vulnerabilities in Web Applications Slides - Fangqi Sun, Liang Xu, and Zhendong Su.pdf
963.8 kB
USENIX Security 2014/USENIX Security 2014 Presentations/Automatically Detecting Vulnerable Websites Before They Turn Malicious - Kyle Soska, Nicolas Christin.pdf
961.0 kB
USENIX Security 2012/USENIX Security 2012 Presentations/Babel Leveraging Email Delivery for Spam Mitigation - Gianluca Stringhini, Manuel Egele, Apostolis Zarras, Thorsten Holz, Christopher Kruegel, Giovanni Vigna.pdf
958.1 kB
USENIX Security 2010/USENIX Security 2010 Presentations/Realization of RF Distance Bounding - Kasper Bonne Rasmussen, Srdjan Capkun.pdf
958.0 kB
USENIX Security 2014/USENIX Security 2014 Presentations/Blanket Execution Dynamic Similarity Testing for Program Binaries and Components Slides - Manuel Egele, Maverick Woo, Peter Chapman, David Brumley.pdf
953.2 kB
USENIX Security 2014/USENIX Security 2014 Presentations/Password Portfolios and the Finite-Effort User Sustainably Managing Large Numbers of Accounts Slides - Dinei Florencio, Cormac Herley, Paul C. van Oorschot.pdf
952.9 kB
USENIX Security 2014/USENIX Security 2014 Presentations/Preventing Cryptographic Key Leakage in Cloud Virtual Machines Slides - Erman Pattuk, Murat Kantarcioglu, Zhiqiang Lin, Huseyin Ulusoy.pdf
936.6 kB
USENIX Security 2009/USENIX Security 2009 Presentations/Physical-layer Identification of RFID Devices - Boris Danev, Thomas S. Heydt-Benjamin, Srdjan Capkun.pdf
935.2 kB
USENIX Security 2008/USENIX Security 2008 Presentations/A Couple Billion Lines of Code Later Static Checking in the Real World Slides - Dawson Engler, Ben Chelf, Andy Chou, Seth Hallem.pdf
933.7 kB
USENIX Security 2014/USENIX Security 2014 Presentations/On the Effective Prevention of TLS Man-in-the-Middle Attacks in Web Applications - Nikolaos Karapanos and Srdjan Capkun.pdf
927.8 kB
USENIX Security 2011/USENIX Security 2011 Presentations/Outsourcing the Decryption of ABE Ciphertexts - Matthew Green, Susan Hohenberger, Brent Waters.pdf
921.6 kB
USENIX Security 2007/Presentations/Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords - Julie Thorpe, P.C. van Oorschot.pdf
914.0 kB
USENIX Security 2010/USENIX Security 2010 Presentations/Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking - Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidiah R. Cranda.pdf
901.0 kB
USENIX Security 2007/Presentations/SpyProxy Execution-based Detection of Malicious Web Content - Alexander Moshchuk, Tanya Bragin, Damien Deville, Steven D. Gribble, Henry M. Levy.pdf
889.7 kB
USENIX Security 2008/USENIX Security 2008 Presentations/CloudAV N-Version Antivirus in the Network Cloud - Jon Oberheide, Evan Cooke, Farnam Jahanian.pdf
885.7 kB
USENIX Security 2014/USENIX Security 2014 Presentations/Mimesis Aegis A Mimicry Privacy Shield-A System’s Approach to Data Privacy on Public Cloud - Billy Lau, Simon Chung, Chengyu Song, Yeongjin Jang, Wenke Lee, Alexand.pdf
881.1 kB
USENIX Security 2010/USENIX Security 2010 Presentations/Chipping Away at Censorship Firewalls with User-Generated Content Slides - Sam Burnett, Nick Feamster, Santosh Vempala.pdf
868.3 kB
USENIX Security 2014/USENIX Security 2014 Presentations/Burst ORAM Minimizing ORAM Response Times for Bursty Access Patterns Slides - Jonathan Dautrich, University of California, Riverside; Emil Stefanov, Elaine Shi.pdf
861.3 kB
USENIX Security 2009/USENIX Security 2009 Presentations/GATEKEEPER Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code - Salvatore Guarnieri, Benjamin Livshits.pdf
854.9 kB
USENIX Security 2010/USENIX Security 2010 Presentations/Acoustic Side-Channel Attacks on Printers - Michael Backes, Markus Durmuth, Sebastian Gerling, Manfred Pinkal, Caroline Sporleder.pdf
847.2 kB
USENIX Security 2013/USENIX Security 2013 Presentations/Eradicating DNS Rebinding with the Extended Same-origin Policy Slides - Martin Johns, Sebastian Lekies, Ben Stock.pdf
836.2 kB
USENIX Security 2009/USENIX Security 2009 Presentations/Browser Security Proceedings.pdf
833.1 kB
USENIX Security 2009/USENIX Security 2009 Presentations/Browser Security.pdf
833.1 kB
USENIX Security 2013/USENIX Security 2013 Presentations/Impression Fraud in On-line Advertising via Pay-Per-View Networks Slides - Kevin Springborn, Paul Barford.pdf
827.1 kB
USENIX Security 2009/USENIX Security 2009 Presentations/Vanish Increasing Data Privacy with Self-Destructing Data - Roxana Geambasu, Tadayoshi Kohno, Amit A. Levy, Henry M. Levy.pdf
812.8 kB
USENIX Security 2014/USENIX Security 2014 Presentations/Telepathwords Preventing Weak Passwords by Reading Users’ Minds - Saranga Komanduri, Richard Shay, Lorrie Faith Cranor, Cormac Herley Stuart Schechter.pdf
811.5 kB
USENIX Security 2008/USENIX Security 2008 Presentations/Setting DNS's Hair on Fire - Niels Provos, David Dagon, Paul Vixie.pdf
811.2 kB
USENIX Security 2010/USENIX Security 2010 Presentations/AdJail Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements - Mike Ter Louw, Karthik Thotta Ganesh, V.N. Venkatakrishnan.pdf
809.9 kB
USENIX Security 2014/USENIX Security 2014 Presentations/Never Been KIST Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport - Rob Jansen, John Geddes, Chris Wacek, Micah Sherr, Paul Syverson.pdf
809.1 kB
USENIX Security 2012/USENIX Security 2012 Presentations/Tracking Rootkit Footprints with a Practical Memory Analysis System - Weidong Cui, Marcus Peinado, Zhilei Xu, Ellick Chan.pdf
808.3 kB
USENIX Security 2008/USENIX Security 2008 Presentations/Proactive Surge Protection A Defense Mechanism for Bandwidth-Based Attacks - Jerry Chou, Bill Lin, Subhabrata Sen, Oliver Spatscheck.pdf
802.2 kB
USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX.html
801.2 kB
USENIX Security 2012/USENIX Security 2012 Presentations/Whispers in the Hyper-space High-speed Covert Channel Attacks in the Cloud - Zhenyu Wu, Zhang Xu, Haining Wang.pdf
799.4 kB
USENIX Security 2014/USENIX Security 2014 Presentations/Man vs. Machine Practical Adversarial Detection of Malicious Crowdsourcing Workers - Gang Wang, Tianyi Wang, Santa Barbara, Haitao Zheng, Ben Y. Zhao.pdf
798.6 kB
USENIX Security 2014/USENIX Security 2014 Presentations/DSCRETE Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse - Brendan Saltaformaggio, Zhongshu Gu, Xiangyu Zhang, Dongyan.pdf
789.4 kB
USENIX Security 2014/USENIX Security 2014 Presentations/Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens - Daniel Demmler, Thomas Schneider, Michael Zohner.pdf
771.3 kB
USENIX Security 2014/USENIX Security 2014 Presentations/Privee An Architecture for Automatically Analyzing Web Privacy Policies - Sebastian Zimmeck, Steven M. Bellovin.pdf
769.7 kB
USENIX Security 2020/sec20_cover.pdf
769.2 kB
USENIX Security 2012/USENIX Security 2012 Presentations/Establishing Browser Security Guarantees through Formal Shim Verification - Dongseok Jang, Zachary Tatlock, Sorin Lerner.pdf
769.1 kB
USENIX Security 2011/USENIX Security 2011 Presentations/Cloaking Malware with the Trusted Platform Module Slides - Alan M. Dunn, Owen S. Hofmann, Brent Waters, Emmett Witchel.pdf
765.1 kB
USENIX Security 2012/USENIX Security 2012 Presentations/From Throw-Away Traffic to Bots Detecting the Rise of DGA-Based Malware Slides - Manos Antonakakis, Roberto Perdisci, Yacin Nadji, Nikolaos Vasiloglou, Saeed Abu-Nimeh, Wenke Lee.pdf
764.5 kB
USENIX Security 2014/USENIX Security 2014 Presentations/Stitching the Gadgets On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection - Lucas Davi, Ahmad-Reza Sadeghi, Daniel Lehmann, Fabian Monrose.pdf
749.1 kB
USENIX Security 2009/USENIX Security 2009 Presentations/Protecting Confidential Data on Personal Computers with Storage Capsules Slides - Kevin Borders, Eric Vander Weele, Billy Lau, Atul Prakash.pdf
744.9 kB
USENIX Security 2019/USENIX Security 2019 Program errata-3.pdf
744.0 kB
USENIX Security 2008/USENIX Security 2008 Presentations/Security Analysis of Network Protocols Slides - John Mitchell.pdf
743.2 kB
USENIX Security 2007/Presentations/Report of the California Voting Systems Review - David Wagner,.pdf
742.5 kB
USENIX Security 2012/USENIX Security 2012 Presentations/Privacy-Preserving Social Plugins - Georgios Kontaxis, Michalis Polychronakis, Angelos D. Keromytis, Evangelos P. Markatos.pdf
740.9 kB
USENIX Security 2007/Presentations/Keep Your Enemies Close Distance Bounding Against Smartcard Relay Attacks - Saar Drimer, Steven J. Murdoch.pdf
740.2 kB
USENIX Security 2009/USENIX Security 2009 Presentations/Detecting Spammers with SNARE Spatio-temporal Network-level Automatic Reputation Engine Slides - Shuang Hao, Nadeem Ahmed Syed, Nick Feamster, Alexander G. Gray, Sv.pdf
738.6 kB
USENIX Security 2012/USENIX Security 2012 Presentations/PUBCRAWL Protecting Users and Businesses from CRAWLers Slides - Gregoire Jacob, Engin Kirda, Christopher Kruegel, Giovanni Vigna.pdf
735.7 kB
USENIX Security 2012/USENIX Security 2012 Presentations/On Breaking SAML Be Whoever You Want to Be - Juraj Somorovsky, Andreas Mayer, Jorg Schwenk, Marco Kampmann, Meiko Jensen.pdf
725.7 kB
USENIX Security 2008/USENIX Security 2008 Presentations/Multi-flow Attacks Against Network Flow Watermarking Schemes - Negar Kiyavash, Amir Houmansadr, Nikita Borisov.pdf
719.4 kB
USENIX Security 2012/USENIX Security 2012 Presentations/From Throw-Away Traffic to Bots Detecting the Rise of DGA-Based Malware - Manos Antonakakis, Roberto Perdisci, Yacin Nadji, Nikolaos Vasiloglou, Saeed Abu-Nimeh, Wenke Lee, David.pdf
713.4 kB
USENIX Security 2010/USENIX Security 2010 Presentations/Searching the Searchers with SearchAudit - John P. John, Fang Yu, Yinglian Xie, Martin Abadi, Arvind Krishnamurthy.pdf
711.2 kB
USENIX Security 2010/USENIX Security 2010 Presentations/Vulnerable Compliance - Dan Geer.pdf
710.6 kB
USENIX Security 2014/USENIX Security 2014 Presentations/From the Aether to the Ethernet-Attacking the Internet using Broadcast Digital Television - Yossef Oren, Angelos D. Keromytis.pdf
708.0 kB
USENIX Security 2012/USENIX Security 2012 Presentations/Chimera A Declarative Language for Streaming Network Traffic Analysis Slides - Kevin Borders, Jonathan Springer, Matthew Burnside.pdf
706.3 kB
USENIX Security 2014/USENIX Security 2014 Presentations/BYTEWEIGHT Learning to Recognize Functions in Binary Code Slides - Tiffany Bao, Jonathan Burket, Maverick Woo, Rafael Turner, David Brumley.pdf
704.9 kB
USENIX Security 2011/USENIX Security 2011 Presentations/Q Exploit Hardening Made Easy - Edward J. Schwartz, Thanassis Avgerinos, David Brumley.pdf
700.9 kB
USENIX Security 2010/USENIX Security 2010 Presentations/ZKPDL A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash - Sarah Meiklejohn, C. Chris Erway, Alptekin Kupcu, Theodora Hinkle, Anna Lysy.pdf
694.5 kB
USENIX Security 2014/USENIX Security 2014 Presentations/A Large-Scale Analysis of the Security of Embedded Firmwares - Andrei Costin, Jonas Zaddach, Aurelien Francillon, and Davide Balzarotti.pdf
691.2 kB
USENIX Security 2014/USENIX Security 2014 Presentations/On the Feasibility of Large-Scale Infections of iOS Devices Slides - Tielei Wang, Yeongjin Jang, Yizheng Chen, Simon Chung, Billy Lau, Wenke Lee.pdf
691.2 kB
USENIX Security 2014/USENIX Security 2014 Presentations/Scheduler-based Defenses against Cross-VM Side-channels - Venkatanathan Varadarajan, Thomas Ristenpart, Michael Swift.pdf
689.3 kB
USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services - Sebastian Zander, Steven J. Murdoch.pdf
685.0 kB
USENIX Security 2012/USENIX Security 2012 Presentations/Efficient and Scalable Socware Detection in Online Social Networks - Md Sazzadur Rahman, Ting-Kai Huang, Harsha V. Madhyastha, Michalis Faloutsos.pdf
683.3 kB
USENIX Security 2011/USENIX Security 2011 Presentations/Static Detection of Access Control Vulnerabilities in Web Applications - Fangqi Sun, Liang Xu, and Zhendong Su.pdf
666.3 kB
USENIX Security 2012/USENIX Security 2012 Presentations/Gone in 360 Seconds Hijacking with Hitag2 - Roel Verdult, Flavio D. Garcia, Josep Balasch, KU Leuven.pdf
665.3 kB
USENIX Security 2011/USENIX Security 2011 Presentations/Secure In-Band Wireless Pairing Slides - Shyamnath Gollakota, Nabeel Ahmed, Nickolai Zeldovich, Dina Katabi.pptx
653.0 kB
USENIX Security 2014/USENIX Security 2014 Presentations/Peeking into Your App without Actually Seeing It UI State Inference and Novel Android Attacks - Qi Alfred Chen, Zhiyun Qian, Z. Morley Mao.pdf
651.4 kB
USENIX Security 2011/USENIX Security 2011 Presentations/The Phantom Tollbooth Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion - Sarah Meiklejohn, Keaton Mowery, Stephen Checkoway, Hovav.pdf
651.3 kB
USENIX Security 2014/USENIX Security 2014 Presentations/SSOScan Automated Testing of Web Applications for Single Sign-On Vulnerabilities - Yuchen Zhou, David Evans.pdf
646.8 kB
USENIX Security 2011/USENIX Security 2011 Presentations/MACE Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery Slides - Chia Yuan Cho, Domagoj Babic, Pongsin Poosankam, Kevin Zhijie C.pdf
645.1 kB
USENIX Security 2009/USENIX Security 2009 Presentations/Effective and Efficient Malware Detection at the End Host Slides - Clemens Kolbitsch, Paolo Milani Comparetti, Christopher Kruegel, Engin Kirda, Sophia Antipolis, X.pdf
641.3 kB
USENIX Security 2014/USENIX Security 2014 Presentations/Revisiting SSL-TLS Implementations New Bleichenbacher Side Channels and Attacks - Christopher Meyer, Juraj Somorovsky, Eugen Weiss, Jorg Schwenk, Sebastian Schinzel.pdf
640.5 kB
USENIX Security 2009/USENIX Security 2009 Presentations/Jamming-resistant Broadcast Communication without Shared Keys - Christina Popper, Mario Strasser, Srdjan Capkun.pdf
639.9 kB
USENIX Security 2011/USENIX Security 2011 Presentations/JACKSTRAWS Picking Command and Control Connections from Bot Traffic Slides - Gregoire Jacob, Ralf Hund, Christopher Kruegel.pdf
633.5 kB
USENIX Security 2007/Presentations/Halting Password Puzzles Hard-to-break Encryption from Human-memorable Keys - Xavier Boyen.pdf
633.0 kB
USENIX Security 2012/USENIX Security 2012 Presentations/Origin-Bound Certificates A Fresh Approach to Strong Client Authentication for the Web - Michael Dietz, Alexei Czeskis, Dirk Balfanz, Dan S. Wallach.pdf
625.6 kB
USENIX Security 2009/USENIX Security 2009 Presentations/Jamming-resistant Broadcast Communication without Shared Keys Slides - Christina Popper, Mario Strasser, and Srdjan Capkun.pdf
624.6 kB
USENIX Security 2014/USENIX Security 2014 Presentations/The Emperor’s New Password Manager Security Analysis of Web-based Password Managers - Zhiwei Li, Warren He, Devdatta Akhawe, Dawn Song.pdf
624.5 kB
USENIX Security 2013/USENIX Security 2013 Presentations/ZMap Fast Internet-wide Scanning and Its Security Applications Slides - Zakir Durumeric, Eric Wustrow, J. Alex Halderman.pdf
621.8 kB
USENIX Security 2008/USENIX Security 2008 Presentations/Hypervisor Support for Identifying Covertly Executing Binaries - Lionel Litty, H. Andrs Lagar-Cavilla, David Lie.pdf
616.9 kB
USENIX Security 2010/USENIX Security 2010 Presentations/An Analysis of Private Browsing Modes in Modern Browsers - Gaurav Aggarwal, Elie Bursztein, Collin Jackson, Dan Boneh.pdf
611.6 kB
USENIX Security 2014/USENIX 2014 Security report.pdf
611.6 kB
USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/css_Pen3ncMGQyB3Q2LWoTho2yu6X-D2T6zOqWITJ4iG9A8.css
611.0 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/css_Pen3ncMGQyB3Q2LWoTho2yu6X-D2T6zOqWITJ4iG9A8.css
611.0 kB
USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/css_mMMIpDBXDqo0rCZrN7FoMlBPY0tKvHCE04XYURHXl9M.css
610.1 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/css_mMMIpDBXDqo0rCZrN7FoMlBPY0tKvHCE04XYURHXl9M.css
610.1 kB
USENIX Security 2018/USENIX Security 2018 Program at a Glance USENIX_files/css_mMMIpDBXDqo0rCZrN7FoMlBPY0tKvHCE04XYURHXl9M.css
610.1 kB
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/css_mMMIpDBXDqo0rCZrN7FoMlBPY0tKvHCE04XYURHXl9M.css
610.1 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/css_mMMIpDBXDqo0rCZrN7FoMlBPY0tKvHCE04XYURHXl9M.css
610.1 kB
USENIX Security 2019/USENIX Security 2019 Program at a Glance USENIX_files/css_mMMIpDBXDqo0rCZrN7FoMlBPY0tKvHCE04XYURHXl9M.css
610.1 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/css_mMMIpDBXDqo0rCZrN7FoMlBPY0tKvHCE04XYURHXl9M.css
610.1 kB
USENIX Security 2012/USENIX Security 2012 Presentations/DroidScope Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis - Lok Kwong Yan, Heng Yin.pdf
608.3 kB
USENIX Security 2013/USENIX Security 2013 Presentations/Sancus Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base Slides - Job Noorman, Pieter Agten, Wilfried Daniels, Raoul Str.pdf
607.0 kB
USENIX Security 2014/USENIX Security 2014 Presentations/Z0 An Optimizing Distributing Zero-Knowledge Compiler - Matthew Fredrikson, Benjamin Livshits.pdf
599.6 kB
USENIX Security 2012/USENIX Security 2012 Presentations/Optimally Robust Private Information Retrieval Slides - Casey Devet, Ian Goldberg, Nadia Heninger.pdf
595.2 kB
USENIX Security 2012/USENIX Security 2012 Presentations/PUBCRAWL Protecting Users and Businesses from CRAWLers - Gregoire Jacob, Engin Kirda, Christopher Kruegel, Giovanni Vigna.pdf
589.7 kB
USENIX Security 2014/USENIX Security 2014 Presentations/TapDance End-to-Middle Anticensorship without Flow Blocking - Eric Wustrow, Colleen M. Swanson, J. Alex Halderman.pdf
585.9 kB
USENIX Security 2016/Technical Sessions 2016 USENIX.htm
578.7 kB
USENIX Security 2007/Presentations/Active Hardware Metering for Intellectual Property Protection and Security - Yousra M. Alkabani, Farinaz Koushanfar.pdf
571.7 kB
USENIX Security 2013/USENIX Security 2013 Presentations/ZMap Fast Internet-wide Scanning and Its Security Applications - Zakir Durumeric, Eric Wustrow, J. Alex Halderman.pdf
571.6 kB
USENIX Security 2007/Presentations/Integrity Checking in Cryptographic File Systems with Constant Trusted Storage - Alina Oprea, Michael K. Reiter.pdf
570.4 kB
USENIX Security 2012/USENIX Security 2012 Presentations/Fuzzing with Code Fragments - Christian Holler, Kim Herzig, Andreas Zeller.pdf
570.3 kB
USENIX Security 2009/USENIX Security 2009 Presentations/USENIX Security 2009 - Cover.pdf
568.3 kB
USENIX Security 2008/USENIX Security 2008 Presentations/Unidirectional Key Distribution Across Time and Space with Applications to RFID Security - Ari Juels, Ravikanth Pappu, Bryan Parno.pdf
564.6 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/hyatt_santa_clara_600_neat_6.png
560.8 kB
USENIX Security 2012/USENIX Security 2012 Presentations/Social Networking with Frientegrity Privacy and Integrity with an Untrusted Provider - Ariel J. Feldman, Aaron Blankstein, Michael J. Freedman, Edward W. Felten.pdf
555.5 kB
USENIX Security 2015/USENIX Security 2015 Presentations/sec15_proceedings_cover.pdf
553.0 kB
USENIX Security 2009/USENIX Security 2009 Presentations/Detecting Spammers with SNARE Spatio-temporal Network-level Automatic Reputation Engine - Shuang Hao, Nadeem Ahmed Syed, Nick Feamster, Alexander G. Gray, Sven Kras.pdf
551.4 kB
USENIX Security 2008/USENIX Security 2008 Presentations/AutoISES Automatically Inferring Security Specification and Detecting Violations - Lin Tan, Xiaolan Zhang, Xiao Ma, Weiwei Xiong, Yuanyuan Zhou.pdf
550.0 kB
USENIX Security 2013/USENIX Security 2013 Presentations/Control Flow Integrity for COTS Binaries Slides - Mingwei Zhang, R. Sekar.pdf
548.5 kB
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX.htm
547.6 kB
USENIX Security 2015/Technical Sessions 2015 USENIX.htm
544.5 kB
USENIX Security 2014/USENIX Security 2014 Presentations/On the Feasibility of Large-Scale Infections of iOS Devices - Tielei Wang, Yeongjin Jang, Yizheng Chen, Simon Chung, Billy Lau, Wenke Lee.pdf
541.8 kB
USENIX Security 2009/USENIX Security 2009 Presentations/Efficient Data Structures for Tamper-Evident Logging Slides - Scott A. Crosby, Dan S. Wallach.pdf
539.8 kB
USENIX Security 2014/USENIX Security 2014 Presentations/Size Does Matter Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard - Enes Goktas, Elias Athanasopoulos, Michalis Polychronakis, Herbert Bos.pdf
538.4 kB
USENIX Security 2011/USENIX Security 2011 Presentations/SHELLOS Enabling Fast Detection and Forensic Analysis of Code Injection Attacks - Kevin Z. Snow, Srinivas Krishnan, Fabian Monrose, Niels Provos.pdf
536.0 kB
USENIX Security 2012/USENIX Security 2012 Presentations/DroidScope Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis Slides - Lok Kwong Yan, Heng Yin.pdf
535.3 kB
USENIX Security 2012/USENIX Security 2012 Presentations/Neuroscience Meets Cryptography Designing Crypto Primitives Secure Against Rubber Hose Attacks - Hristo Bojinov, Daniel Sanchez, Paul Reber, Northw.pdf
530.3 kB
USENIX Security 2011/USENIX Security 2011 Presentations/PIR-Tor Scalable Anonymous Communication Using Private Information Retrieval - Prateek Mittal, Femi Olumofin, Carmela Troncoso, Nikita Borisov, Ian Goldberg.pdf
529.6 kB
USENIX Security 2012/USENIX Security 2012 Presentations/Privilege Separation in HTML5 Applications - Devdatta Akhawe, Prateek Saxena, Dawn Song.pdf
522.5 kB
USENIX Security 2014/USENIX Security 2014 Presentations/A Look at Targeted Attacks Through the Lense of an NGO - Stevens Le Blond, Adina Uritesc, Cedric Gilbert, Zheng Leong Chua, Prateek Saxena, Engin Kirda.pdf
519.6 kB
USENIX Security 2014/USENIX Security 2014 Presentations/Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture - Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza.pdf
519.1 kB
USENIX Security 2012/USENIX Security 2012 Presentations/STEALTHMEM System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud - Taesoo Kim, Marcus Peinado, Gloria Mainar-Ruiz.pdf
517.9 kB
USENIX Security 2007/Presentations/Secretly Monopolizing the CPU Without Superuser Privileges - Dan Tsafrir, Yoav Etsion, Dror G. Feitelson.pdf
517.9 kB
USENIX Security 2014/USENIX Security 2014 Presentations/X-Force Force-Executing Binary Programs for Security Applications Slides - Fei Peng, Zhui Deng, Xiangyu Zhang, and Dongyan Xu, Purdue University; Zhiqiang Lin, The.pdf
516.4 kB
USENIX Security 2010/USENIX Security 2010 Presentations/SEPIA Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics - Martin Burkhart, Mario Strasser, Dilip Many, Xenofontas Dimitropoulos.pdf
513.0 kB
USENIX Security 2014/USENIX Security 2014 Presentations/Blanket Execution Dynamic Similarity Testing for Program Binaries and Components - Manuel Egele, Maverick Woo, Peter Chapman, David Brumley.pdf
509.6 kB
USENIX Security 2008/USENIX Security 2008 Presentations/VoteBox A Tamper-evident, Verifiable Electronic Voting System - Daniel Sandler, Kyle Derr, Dan S. Wallach.pdf
508.9 kB
USENIX Security 2014/USENIX Security 2014 Presentations/Preventing Cryptographic Key Leakage in Cloud Virtual Machines - Erman Pattuk, Murat Kantarcioglu, Zhiqiang Lin, Huseyin Ulusoy.pdf
508.8 kB
USENIX Security 2009/USENIX Security 2009 Presentations/Effective and Efficient Malware Detection at the End Host - Clemens Kolbitsch, Paolo Milani Comparetti, Christopher Kruegel, Engin Kirda, Sophia Antipolis, Xiaoyong.pdf
503.6 kB
USENIX Security 2009/USENIX Security 2009 Presentations/Crying Wolf An Empirical Study of SSL Warning Effectiveness - Joshua Sunshine, Serge Egelman, Hazim Almuhimedi, Neha Atri, Lorrie Faith Cranor.pdf
501.6 kB
USENIX Security 2014/USENIX Security 2014 Presentations/Privee An Architecture for Automatically Analyzing Web Privacy Policies Slides - Sebastian Zimmeck, Steven M. Bellovin.pdf
501.0 kB
USENIX Security 2012/USENIX Security 2012 Presentations/STING Finding Name Resolution Vulnerabilities in Programs - Hayawardh Vijayakumar, Joshua Schiffman, Trent Jaeger.pdf
500.9 kB
USENIX Security 2014/USENIX Security 2014 Presentations/Towards Detecting Anomalous User Behavior in Online Social Networks - Bimal Viswanath, M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna P. Gummadi, Max Planck, .pdf
500.6 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/sec18_hotel.png
500.5 kB
USENIX Security 2012/USENIX Security 2012 Presentations/AdSplit Separating Smartphone Advertising from Applications - Shashi Shekhar, Michael Dietz, Dan S. Wallach.pdf
499.0 kB
USENIX Security 2014/USENIX Security 2014 Presentations/JIGSAW Protecting Resource Access by Inferring Programmer Expectations - Hayawardh Vijayakumar, Xinyang Ge, Mathias Payer, Trent Jaeger.pdf
497.2 kB
USENIX Security 2009/USENIX Security 2009 Presentations/Static Enforcement of Web Application Integrity Through Strong Typing - William Robertson, Giovanni Vigna.pdf
495.1 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions.htm
494.7 kB
USENIX Security 2010/USENIX Security 2010 Presentations/Scantegrity II Municipal Election at Takoma Park The First E2E Binding Governmental Election with Ballot Privacy - Richard Carback, David Chaum, Jeremy Clark, John.pdf
492.2 kB
USENIX Security 2014/USENIX Security 2014 Presentations/An Internet-Wide View of Internet-Wide Scanning - Zakir Durumeric, Michael Bailey, J. Alex Halderman.pdf
489.7 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/sheraton_vancouver_600.png
487.7 kB
USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX.htm
487.2 kB
USENIX Security 2007/Presentations/SIF Enforcing Confidentiality and Integrity in Web Applications - Stephen Chong, K. Vikram, Andrew C. Myers.pdf
484.2 kB
USENIX Security 2015/USENIX Security 2015 Full Proceedings Supplement.pdf
481.6 kB
USENIX Security 2015/USENIX Security 2015 Presentations/sec15_supplement.pdf
481.6 kB
USENIX Security 2014/USENIX Security 2014 Presentations/A Large-Scale Empirical Analysis of Chinese Web Passwords - Zhigong Li, Weili Han, Wenyuan Xu.pdf
481.2 kB
USENIX Security 2012/USENIX Security 2012 Presentations/Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization - Cristiano Giuffrida, Anton Kuijsten, Andrew S. Tanenbaum.pdf
477.3 kB
USENIX Security 2010/USENIX Security 2010 Presentations/Chipping Away at Censorship Firewalls with User-Generated Content - Sam Burnett, Nick Feamster, Santosh Vempala.pdf
474.8 kB
USENIX Security 2008/USENIX Security 2008 Presentations/All Your iFRAMEs Point to Us - Niels Provos, Panayiotis Mavrommatis, Moheeb Abu Rajab, Fabian Monrose.pdf
474.1 kB
USENIX Security 2014/USENIX Security 2014 Presentations/BYTEWEIGHT Learning to Recognize Functions in Binary Code - Tiffany Bao, Jonathan Burket, Maverick Woo, Rafael Turner, David Brumley.pdf
473.4 kB
USENIX Security 2011/USENIX Security 2011 Presentations/Fast and Precise Sanitizer Analysis with BEK - Pieter Hooimeijer, Benjamin Livshits, David Molnar, Prateek Saxena, Margus Veanes.pdf
470.7 kB
USENIX Security 2012/USENIX Security 2012 Presentations/I Forgot Your Password Randomness Attacks Against PHP Applications - George Argyros, Aggelos Kiayias.pdf
470.3 kB
USENIX Security 2009/USENIX Security 2009 Presentations/Peeping Tom in the Neighborhood Keystroke Eavesdropping on Multi-User Systems - Kehuan Zhang, XiaoFeng Wang.pdf
467.9 kB
USENIX Security 2014/USENIX Security 2014 Presentations/XRay Enhancing the Web’s Transparency with Differential Correlation - Mathias Lecuyer, Guillaume Ducoffe, Francis Lan, Andrei Papancea, Theofilos Petsios, Riley Spa.pdf
467.8 kB
USENIX Security 2007/Presentations/Combating Click Fraud via Premium Clicks - Ari Juels, Sid Stamm, Markus Jakobsson.pdf
467.0 kB
USENIX Security 2014/USENIX Security 2014 Presentations/FLUSH-RELOAD A High Resolution, Low Noise, L3 Cache Side-Channel Attack Slides - Yuval Yarom, Katrina Falkner.pdf
465.4 kB
USENIX Security 2014/USENIX Security 2014 Presentations/Password Portfolios and the Finite-Effort User Sustainably Managing Large Numbers of Accounts - Dinei Florencio, Cormac Herley, Paul C. van Oorschot.pdf
460.4 kB
USENIX Security 2014/USENIX Security 2014 Presentations/SpanDex Secure Password Tracking for Android - Landon P. Cox , Peter Gilbert, Geoffrey Lawler, Valentin Pistol, Ali Razeen, Bi Wu, Sai Cheemalapati.pdf
460.0 kB
USENIX Security 2010/USENIX Security 2010 Presentations/VEX Vetting Browser Extensions for Security Vulnerabilities - Sruthi Bandhakavi, Samuel T. King, P. Madhusudan, Marianne Winslett.pdf
456.1 kB
USENIX Security 2010/USENIX Security 2010 Presentations/Cling A Memory Allocator to Mitigate Dangling Pointers - Periklis Akritidis.pdf
454.9 kB
USENIX Security 2009/USENIX Security 2009 Presentations/Nemesis Preventing Authentication and Access Control Vulnerabilities in Web Applications - Michael Dalton, Christos Kozyrakis, Nickolai Zeldovich.pdf
453.3 kB
USENIX Security 2014/USENIX Security 2014 Presentations/ret2dir Rethinking Kernel Isolation - Vasileios P. Kemerlis, Michalis Polychronakis, Angelos D. Keromytis.pdf
447.6 kB
USENIX Security 2012/USENIX Security 2012 Presentations/Taking Proof-Based Verified Computation a Few Steps Closer to Practicality - Srinath Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Andrew J. Blumberg, Michael Walfish.pdf
445.4 kB
USENIX Security 2008/USENIX Security 2008 Presentations/Lest We Remember - Cold Boot Attacks on Encryption Keys_files/memory_5.jpg
440.7 kB
USENIX Security 2014/USENIX Security 2014 Presentations/ROP is Still Dangerous Breaking Modern Defenses - Nicholas Carlini, David Wagner.pdf
440.0 kB
USENIX Security 2019/28th USENIX Security Symposium Grid.htm
439.3 kB
USENIX Security 2011/USENIX Security 2011 Presentations/Secure In-Band Wireless Pairing - Shyamnath Gollakota, Nabeel Ahmed, Nickolai Zeldovich, Dina Katabi.pdf
438.6 kB
USENIX Security 2009/USENIX Security 2009 Presentations/Return-Oriented Rootkits Bypassing Kernel Code Integrity Protection Mechanisms Slides - Ralf Hund, Thorsten Holz, Felix C. Freiling.pdf
437.6 kB
USENIX Security 2011/USENIX Security 2011 Presentations/Bubble Trouble Off-Line De-Anonymization of Bubble Forms - Joseph A. Calandrino, William Clarkson, Edward W. Felten.pdf
433.4 kB
USENIX Security 2008/USENIX Security 2008 Presentations/Highly Predictive Blacklisting - Jian Zhang, Phillip Porras, Johannes Ullrich.pdf
431.3 kB
USENIX Security 2010/USENIX Security 2010 Presentations/PrETP Privacy-Preserving Electronic Toll Pricing - Josep Balasch, Alfredo Rial, Carmela Troncoso, Bart Preneel, Ingrid Verbauwhede, Christophe Geuens.pdf
430.1 kB
USENIX Security 2014/USENIX Security 2014 Presentations/Towards Reliable Storage of 56-bit Secrets in Human Memory - Joseph Bonneau, Princeton University; Stuart Schechter.pdf
427.4 kB
USENIX Security 2008/USENIX Security 2008 Presentations/BotMiner Clustering Analysis of Network Traffic for Protocol and Structure-Independent Botnet Detection - Guofei Gu, Roberto Perdisci, Junjie Zhang, Wenke Lee.pdf
425.1 kB
USENIX Security 2011/USENIX Security 2011 Presentations/Faster Secure Two-Party Computation Using Garbled Circuits - Yan Huang, David Evans, Jonathan Katz.pdf
424.7 kB
USENIX Security 2008/USENIX Security 2008 Presentations/Measurement and Classification of Humans and Bots in Internet Chat - Steven Gianvecchio, Mengjun Xie, Zhengyu Wu, Haining Wang.pdf
421.6 kB
USENIX Security 2007/Presentations/On Web Browsing Privacy in Anonymized NetFlows - S.E. Coull, M.P. Collins, C.V. Wright, F. Monrose, M.K. Reiter.pdf
419.3 kB
USENIX Security 2008/USENIX Security 2008 Presentations/Hackernomics Slides - Hugh Thompson.pdf
417.2 kB
USENIX Security 2014/USENIX Security 2014 Presentations/Dynamic Hooks Hiding Control Flow Changes within Non-Control Data - Sebastian Vogl, Robert Gawlik, Behrad Garmany, Thomas Kittel, Jonas Pfoh, Claudia Eckert, Thorst.pdf
415.9 kB
USENIX Security 2014/USENIX Security 2014 Presentations/Privacy in Pharmacogenetics An End-to-End Case Study of Personalized Warfarin Dosing - Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon Lin, David Page, Thomas Ris.pdf
415.3 kB
USENIX Security 2009/USENIX Security 2009 Presentations/Improving Tor using a TCP-over-DTLS Tunnel Slides - Joel Reardon, Ian Goldberg.pdf
413.4 kB
USENIX Security 2012/USENIX Security 2012 Presentations/Data Node Encrypted File System Efficient Secure Deletion for Flash Memory - Joel Reardon, Srdjan Capkun, David Basin.pdf
413.4 kB
USENIX Security 2011/USENIX Security 2011 Presentations/PIR-Tor Scalable Anonymous Communication Using Private Information Retrieval Slides - Prateek Mittal, Femi Olumofin, Carmela Troncoso, Nikita Borisov, Ian Goldberg.pptx
409.6 kB
USENIX Security 2008/USENIX Security 2008 Presentations/To Catch a Predator A Natural Language Approach for Eliciting Malicious Payloads - Sam Small, Joshua Mason, Fabian Monrose, Niels Provos, Adam Stubblefield.pdf
409.4 kB
USENIX Security 2012/USENIX Security 2012 Presentations/Aurasium Practical Policy Enforcement for Android Applications - Rubin Xu, Hassen Saidi, Ross Anderson.pdf
407.5 kB
USENIX Security 2013/USENIX Security 2013 login article.pdf
406.6 kB
USENIX Security 2008/USENIX Security 2008 Presentations/Lest We Remember - Cold Boot Attacks on Encryption Keys_files/memory_2.jpg
405.5 kB
USENIX Security 2018/27th USENIX Security Symposium Grid.htm
405.4 kB
USENIX Security 2009/USENIX Security 2009 Presentations/VPriv Protecting Privacy in Location-Based Vehicular Services - Raluca Ada Popa, Hari Balakrishnan, Andrew J. Blumberg.pdf
397.3 kB
USENIX Security 2008/USENIX Security 2008 Presentations/Lest We Remember - Cold Boot Attacks on Encryption Keys_files/memory_6.jpg
395.6 kB
USENIX Security 2014/USENIX Security 2014 Presentations/BareCloud Bare-metal Analysis-based Evasive Malware Detection - Dhilung Kirat, Giovanni Vigna, Christopher Kruegel.pdf
395.3 kB
USENIX Security 2007/Presentations/Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation - David Brumley, Juan Caballero, Zhenkai Liang.pdf
393.7 kB
USENIX Security 2012/USENIX Security 2012 Presentations/Mining Your Ps and Qs Detection of Widespread Weak Keys in Network Devices - Nadia Heninger, Zakir Durumeric, Eric Wustrow, J. Alex Halderm.pdf
386.2 kB
USENIX Security 2017/USENIX Security 2017 Full Proceedings program grid.pdf
385.6 kB
USENIX Security 2014/USENIX Security 2014 Presentations/Cardinal Pill Testing of System Virtual Machines - Hao Shi, Abdulla Alwabel, Jelena Mirkovic.pdf
384.9 kB
USENIX Security 2007/Presentations/Spamscatter Characterizing Internet Scam Hosting Infrastructure - David S. Anderson, Chris Fleizach, Stefan Savage, Geoffrey M. Voelker.pdf
383.2 kB
USENIX Security 2010/USENIX Security 2010 Presentations/Fast Regular Expression Matching Using Small TCAMs for Network Intrusion Detection and Prevention Systems - Chad R. Meiners, Jignesh Patel, Eric Norige, Eric Torng.pdf
381.8 kB
USENIX Security 2014/USENIX Security 2014 Presentations/ASM A Programmable Interface for Extending Android Security - Stephan Heuser, Adwait Nadkarni, William Enck, Ahmad-Reza Sadeghi.pdf
381.6 kB
USENIX Security 2014/USENIX Security 2014 Presentations/Optimizing Seed Selection for Fuzzing - Alexandre Rebert, Sang Kil Cha, Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, David Brumley.pdf
377.5 kB
USENIX Security 2007/Presentations/Web-Based Inference Detection - Jessica Staddon, Philippe Golle, Bryce Zimny.pdf
377.2 kB
USENIX Security 2011/USENIX Security 2011 Presentations/SMS of Death From Analyzing to Attacking Mobile Phones on a Large Scale - Collin Mulliner, Nico Golde, Jean-Pierre Seifert.pdf
376.8 kB
USENIX Security 2007/Presentations/Exploiting Network Structure for Proactive Spam Mitigation - Shobha Venkataraman, Subhabrata Sen, Oliver Spatscheck, Patrick Haffner, Dawn Song.pdf
371.8 kB
USENIX Security 2014/USENIX Security 2014 Presentations/Static Detection of Second-Order Vulnerabilities in Web Applications - Johannes Dahse, Thorsten Holz.pdf
371.6 kB
USENIX Security 2009/USENIX Security 2009 Presentations/Return-Oriented Rootkits Bypassing Kernel Code Integrity Protection Mechanisms - Ralf Hund, Thorsten Holz, Felix C. Freiling.pdf
370.4 kB
USENIX Security 2007/Presentations/Memory Performance Attacks Denial of Memory Service in Multi-Core Systems - Thomas Moscibroda, Onur Mutlu.pdf
369.4 kB
USENIX Security 2013/Technical Sessions 2013 USENIX.htm
367.9 kB
USENIX Security 2014/USENIX Security 2014 Presentations/Cardinal Pill Testing of System Virtual Machines Slides - Hao Shi, Abdulla Alwabel, Jelena Mirkovic.pdf
367.4 kB
USENIX Security 2014/USENIX Security 2014 Presentations/On the Practical Exploitability of Dual EC in TLS Implementations - Stephen Checkoway, Matthew Fredrikson, Ruben Niederhagen, Adam Everspaugh, Matthew Green, Tanja.pdf
365.2 kB
USENIX Security 2014/USENIX Security 2014 Presentations/Faster Private Set Intersection Based on OT Extension - Benny Pinkas, Thomas Schneider, Michael Zohner.pdf
363.5 kB
USENIX Security 2009/USENIX Security 2009 Presentations/Baggy Bounds Checking An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors Slides - Periklis Akritidis, Manuel Costa, Miguel Castro, Steven Ha.pdf
362.1 kB
USENIX Security 2011/USENIX Security 2011 Presentations/Dirty Jobs The Role of Freelance Labor in Web Service Abuse - Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker.pdf
358.0 kB
USENIX Security 2011/USENIX Security 2011 Presentations/Dirty Jobs The Role of Freelance Labor in Web Service Abuse - Motoyama.pdf
358.0 kB
USENIX Security 2014/USENIX Security 2014 Presentations/Password Managers Attacks and Defenses - David Silver, Suman Jana, and Dan Boneh, Stanford University; Eric Chen, Collin Jackson.pdf
356.3 kB
USENIX Security 2007/Presentations/Language Identification of Encrypted VoIP Traffic Alejandra y Roberto or Alice and Bob - Charles V. Wright, Lucas Ballard, Fabian Monrose, Gerald M. Masson.pdf
356.0 kB
USENIX Security 2007/Presentations/Discoverer Automatic Protocol Reverse Engineering from Network Traces - Weidong Cui, Jayanthkumar Kannan, Helen J. Wang.pdf
350.0 kB
USENIX Security 2011/USENIX Security 2011 Presentations/mCarve Carving Attributed Dump Sets Slides - Ton van Deursen, Sjouke Mauw, and Sasa Radomirovic.pdf
347.0 kB
USENIX Security 2012/Technical Sessions 2012 USENIX.htm
345.0 kB
USENIX Security 2007/Presentations/BotHunter Detecting Malware Infection Through IDS-Driven Dialog Correlation - Guofei Gu, Phillip Porras, Vinod Yegneswaran, Martin Fong, Wenke Lee.pdf
339.4 kB
USENIX Security 2008/USENIX Security 2008 Presentations/Lest We Remember - Cold Boot Attacks on Encryption Keys_files/mona_30s.png
338.1 kB
USENIX Security 2007/Presentations/Proximity Breeds Danger Emerging Threats in Metro-area Wireless Networks - P. Akritidis, W.Y. Chin, V.T. Lam, S. Sidiroglou, K.G. Anagnostakis.pdf
337.2 kB
USENIX Security 2010/USENIX Security 2010 Presentations/Capsicum Practical Capabilities for UNIX - Robert N.M. Watson, Jonathan Anderson, Ben Laurie, Kris Kennaway.pdf
334.0 kB
USENIX Security 2008/USENIX Security 2008 Presentations/Lest We Remember - Cold Boot Attacks on Encryption Keys_files/mona_60s.png
332.0 kB
USENIX Security 2014/USENIX Security 2014 Presentations/FLUSH-RELOAD A High Resolution, Low Noise, L3 Cache Side-Channel Attack - Yuval Yarom, Katrina Falkner.pdf
330.1 kB
USENIX Security 2011/USENIX Security 2011 Presentations/Dark Clouds on the Horizon Using Cloud Storage as Attack Vector and Online Slack Space - Martin Mulazzani, Sebastian Schrittwieser, Manuel Leithner, Markus Huber.pdf
329.8 kB
USENIX Security 2008/USENIX Security 2008 Presentations/Practical Symmetric Key Cryptography on Modern Graphics Hardware - Owen Harrison, John Waldron.pdf
325.9 kB
USENIX Security 2011/USENIX Security 2011 Presentations/Differential Privacy Under Fire Slides - Andreas Haeberlen, Benjamin C. Pierce, Arjun Narayan.pptx
322.9 kB
USENIX Security 2014/USENIX Security 2014 Presentations/Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM - Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, Ulfar Erlingsson, Luis Lozano, Geof.pdf
321.1 kB
USENIX Security 2014/USENIX Security 2014 Presentations/Precise Client-side Protection against DOM-based Cross-Site Scripting - Ben Stock, Sebastian Lekies, Tobias Mueller, Patrick Spiegel, and Martin Johns.pdf
314.6 kB
USENIX Security 2009/USENIX Security 2009 Presentations/Memory Safety for Low-Level Software Hardware Interactions - John Criswell, Nicolas Geoffray, Pierre et Marie Curie, Vikram Adve.pdf
313.7 kB
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation - Lucas Ballard, Seny Kamara, Michael K. Reiter.pdf
313.5 kB
USENIX Security 2012/USENIX Security 2012 Presentations/kGuard Lightweight Kernel Protection against Return-to-User Attacks - Vasileios P. Kemerlis, Georgios Portokalidis, and Angelos D. Keromytis.pdf
311.2 kB
USENIX Security 2009/USENIX Security 2009 Presentations/Physical-layer Identification of RFID Devices Slides - Boris Danev, Thomas S. Heydt-Benjamin, Srdjan Capkun.pdf
307.9 kB
USENIX Security 2008/USENIX Security 2008 Presentations/Verifying Compliance of Trusted Programs - Sandra Rueda, Dave King, Trent Jaeger.pdf
307.7 kB
USENIX Security 2014/USENIX Security 2014 Presentations/Effective Attacks and Provable Defenses for Website Fingerprinting - Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, Ian Goldberg.pdf
307.7 kB
USENIX Security 2007/Presentations/Binary Obfuscation Using Signals - Igor V. Popov, Saumya K. Debray, Gregory R. Andrews.pdf
307.3 kB
USENIX Security 2010/USENIX Security 2010 Presentations/Baaz A System for Detecting Access Control Misconfigurations - Tathagata Das, Ranjita Bhagwan, Prasad Naldurg.pdf
303.6 kB
USENIX Security 2012/USENIX Security 2012 Presentations/Chimera A Declarative Language for Streaming Network Traffic Analysis - Kevin Borders, Jonathan Springer, Matthew Burnside.pdf
302.3 kB
USENIX Security 2008/USENIX Security 2008 Presentations/Lest We Remember - Cold Boot Attacks on Encryption Keys_files/mona_5s.png
297.5 kB
USENIX Security 2008/USENIX Security 2008 Presentations/Privacy-Preserving Location Tracking of Lost or Stolen Devices Cryptographic Techniques and Replacing Trusted Third Parties with DHTs - Thomas Ristenpart, Gabriel Ma.pdf
297.3 kB
USENIX Security 2018/USENIX Security 2018 Program errata_slip.pdf
297.1 kB
USENIX Security 2010/USENIX Security 2010 Presentations/BotGrep Finding P2P Bots with Structured Graph Analysis - Shishir Nagaraja, Prateek Mittal, Chi-Yao Hong, Matthew Caesar, Nikita Borisov.pdf
296.0 kB
USENIX Security 2012/USENIX Security 2012 Presentations/Policy-Sealed Data A New Abstraction for Building Trusted Cloud Services - Nuno Santos, Rodrigo Rodrigues, Krishna P. Gummadi.pdf
294.3 kB
USENIX Security 2009/USENIX Security 2009 Presentations/Nemesis Preventing Authentication and Access Control Vulnerabilities in Web Applications Slides - Michael Dalton, Christos Kozyrakis, Nickolai Zeldovich.pdf
290.9 kB
USENIX Security 2020/sec20_errata_3.pdf
285.1 kB
USENIX Security 2010/USENIX Security 2010 Presentations/Making Linux Protection Mechanisms Egalitarian with UserFS - Taesoo Kim, Nickolai Zeldovich.pdf
285.1 kB
USENIX Security 2011/USENIX Security 2011 Presentations/Differential Privacy Under Fire - Andreas Haeberlen, Benjamin C. Pierce, Arjun Narayan.pdf
285.0 kB
USENIX Security 2008/USENIX Security 2008 Presentations/Selective Versioning in a Secure Disk System - Swaminathan Sundararaman, Gopalan Sivathanu, Erez Zadok.pdf
283.3 kB
USENIX Security 2008/USENIX Security 2008 Presentations/Real-World Buffer Overflow Protection for Userspace and Kernelspace - Michael Dalton, Hari Kannan, Christos Kozyrakis.pdf
283.3 kB
USENIX Security 2008/USENIX Security 2008 Presentations/Reverse-Engineering a Cryptographic RFID Tag - Karsten Nohl, David Evans, Starbug, Henryk Platz.pdf
282.1 kB
USENIX Security 2012/USENIX Security 2012 Presentations/Tachyon Tandem Execution for Efficient Live Patch Testing - Matthew Maurer, David Brumley.pdf
280.9 kB
USENIX Security 2011/USENIX Security 2011 Presentations/TRESOR Runs Encryption Securely Outside RAM - Tilo Müller, Felix C. Freiling, Andreas Dewald.pdf
274.0 kB
USENIX Security 2012/USENIX Security 2012 Presentations/Billion-Gate Secure Computation with Malicious Adversaries - Benjamin Kreuter, abhi shelat, Chih-hao Shen.pdf
272.4 kB
USENIX Security 2014/USENIX Security 2014 Presentations/Dynamic Hooks Hiding Control Flow Changes within Non-Control Data Slides - Sebastian Vogl, Robert Gawlik, Behrad Garmany, Thomas Kittel, Jonas Pfoh, Claudia Eckert.pdf
265.3 kB
USENIX Security 2011/USENIX Security 2011 Presentations/mCarve Carving Attributed Dump Sets - Ton van Deursen, Sjouke Mauw, and Sasa Radomirovic.pdf
264.1 kB
USENIX Security 2011/USENIX Security 2011 Presentations/Cloaking Malware with the Trusted Platform Module - Alan M. Dunn, Owen S. Hofmann, Brent Waters, Emmett Witchel.pdf
261.8 kB
USENIX Security 2009/USENIX Security 2009 Presentations/The Multi-Principal OS Construction of the Gazelle Web Browser - Helen J. Wang, Chris Grier, Alex Moshchuk, Samuel T. King, Piali Choudhury, Herman Venter.pdf
261.2 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/css_IBrrqJUtXAVsLrrlZ8VqVTS3di7E2-x10BVJwZwbroU.css
260.3 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/css_IBrrqJUtXAVsLrrlZ8VqVTS3di7E2-x10BVJwZwbroU.css
260.3 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/css_IBrrqJUtXAVsLrrlZ8VqVTS3di7E2-x10BVJwZwbroU.css
260.3 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/css_IBrrqJUtXAVsLrrlZ8VqVTS3di7E2-x10BVJwZwbroU.css
260.3 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/css_ciODmkFfqCSx2xBu95VX29BZ0r4mdoEz3gy-MriTJBM.css
257.9 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/css_ciODmkFfqCSx2xBu95VX29BZ0r4mdoEz3gy-MriTJBM.css
257.9 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/css_XQfCg5kiuU6ACblHn3rDXdgaKZR8AxbhrQR4Gznu5qA.css
257.3 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/css_XQfCg5kiuU6ACblHn3rDXdgaKZR8AxbhrQR4Gznu5qA.css
257.3 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/css_XQfCg5kiuU6ACblHn3rDXdgaKZR8AxbhrQR4Gznu5qA.css
257.3 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/css_XQfCg5kiuU6ACblHn3rDXdgaKZR8AxbhrQR4Gznu5qA.css
257.3 kB
USENIX Security 2014/USENIX Security 2014 Presentations/On the Practical Exploitability of Dual EC in TLS Implementations Slides - Stephen Checkoway, Matthew Fredrikson, Ruben Niederhagen, Adam Everspaugh, Matthew Green.pdf
256.1 kB
USENIX Security 2020/sec20_contents.pdf
255.9 kB
USENIX Security 2008/USENIX Security 2008 Presentations/Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking - Michael Martin, Monica S. Lam.pdf
252.9 kB
USENIX Security 2010/USENIX Security 2010 Presentations/Toward Automated Detection of Logic Vulnerabilities in Web Applications - Viktoria Felmetsger, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna.pdf
252.8 kB
USENIX Security 2010/USENIX Security 2010 Presentations/Automatic Generation of Remediation Procedures for Malware Infections - Paleari.pdf
248.2 kB
USENIX Security 2007/Presentations/OSLO Improving the Security of Trusted Computing - Bernhard Kauer.pdf
247.1 kB
USENIX Security 2007/Presentations/OSLO Improving the Security of Trusted Computing Paper - Bernhard Kauer.pdf
247.1 kB
USENIX Security 2009/USENIX Security 2009 Presentations/Cross-Origin JavaScript Capability Leaks Detection, Exploitation, and Defense - Adam Barth, Joel Weinberger, Dawn Song.pdf
238.0 kB
USENIX Security 2012/USENIX Security 2012 Presentations/Enemy of the State A State-Aware Black-Box Web Vulnerability Scanner - Adam Doupe, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna.pdf
236.4 kB
USENIX Security 2010/USENIX Security 2010 Presentations/Structuring Protocol Implementations to Protect Sensitive Data - Petr Marchenko, Brad Karp.pdf
234.5 kB
USENIX Security 2019/USENIX Security 2019 Program errata.pdf
234.2 kB
USENIX Security 2011/USENIX Security 2011 Presentations/ADsafety Type-Based Verification of JavaScript Sandboxing - Joe Gibbs Politz, Spiridon Aristides Eliopoulos, Arjun Guha, Shriram Krishnamurthi.pdf
230.3 kB
USENIX Security 2008/USENIX Security 2008 Presentations/NetAuth Supporting User-Based Network Services - Manigandan Radhakrishnan, Jon A. Solworth.pdf
228.0 kB
USENIX Security 2014/USENIX Security 2014 Presentations/Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM Slides - Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, Ulfar Erlingsson, Luis Lozan.pdf
227.3 kB
USENIX Security 2009/USENIX Security 2009 Presentations/Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs - David Molnar, Xue Cong Li, David A. Wagner.pdf
226.3 kB
USENIX Security 2009/USENIX Security 2009 Presentations/Locating Prefix Hijackers using LOCK - Tongqing Qiu, Lusheng Ji, Dan Pei, Jia Wang, Jun (Jim) Xu, Hitesh Ballani.pdf
223.9 kB
USENIX Security 2014/USENIX Security 2014 Presentations/ROP is Still Dangerous Breaking Modern Defenses Slides - Nicholas Carlini, David Wagner.pdf
221.8 kB
USENIX Security 2009/USENIX Security 2009 Presentations/Efficient Data Structures for Tamper-Evident Logging - Scott A. Crosby, Dan S. Wallach.pdf
220.9 kB
USENIX Security 2012/USENIX Security 2012 Presentations/Optimally Robust Private Information Retrieval - Casey Devet, Ian Goldberg, Nadia Heninger.pdf
217.6 kB
USENIX Security 2011/USENIX Security 2011 Presentations/MACE Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery - Chia Yuan Cho, Domagoj Babic, Pongsin Poosankam, Kevin Zhijie Chen, Ed.pdf
216.3 kB
USENIX Security 2009/USENIX Security 2009 Presentations/CCCP Secure Remote Storage for Computational RFIDs - Mastooreh Salajegheh, Shane Clark, Benjamin Ransford, Kevin Fu, Ari Juels.pdf
212.1 kB
USENIX Security 2009/USENIX Security 2009 Presentations/Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs Slides - David Molnar, Xue Cong Li, David A. Wagner.pdf
211.4 kB
USENIX Security 2017/USENIX Security 2017 Full Proceedings errata.pdf
211.3 kB
USENIX Security 2008/USENIX Security 2008 Presentations/An Empirical Security Study of the Native Code in the JDK - Gang Tan, Jason Croft.pdf
210.3 kB
USENIX Security 2010/USENIX Security 2010 Presentations/The Case for Ubiquitous Transport-Level Encryption - Andrea Bittau, Michael Hamburg, Mark Handley, David Mazieres, Dan Boneh.pdf
208.2 kB
USENIX Security 2012/USENIX Security 2012 Presentations/Impact of Spam Exposure on User Engagement - Anirban Dasgupta, Kunal Punera, Justin M. Rao, Xuanhui Wang.pdf
194.9 kB
USENIX Security 2012/USENIX Security 2012 Presentations/An Evaluation of the Google Chrome Extension Security Architecture - Nicholas Carlini, Adrienne Porter Felt, David Wagner.pdf
191.4 kB
USENIX Security 2019/USENIX Security 2019 Video/Security Educational Panel.eng.srt
189.7 kB
USENIX Security 2009/USENIX Security 2009 Presentations/Designing Trustworthy User Agents for a Hostile Web - Eric Lawrence.pdf
186.3 kB
USENIX Security 2007/Presentations/Exploiting Concurrency Vulnerabilities in System Call Wrappers - watson.pdf
185.7 kB
USENIX Security 2016/USENIX Security 2016 Videos/The Unfalsifiability of Security Claims.eng.srt
184.9 kB
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation.htm
180.6 kB
USENIX Security 2013/USENIX Security 2013 Presentations/PCF A Portable Circuit Format for Scalable Two-Party Secure Computation Slides - Ben Kreuter, Benjamin Mood, Abhi Shelat, Kevin Butler.pdf
168.4 kB
USENIX Security 2018/USENIX Security 2018 Videos/Q - Why Do Keynote Speakers Keep Suggesting That Improving Security Is Possible.eng.srt
155.9 kB
USENIX Security 2009/USENIX Security 2009 Presentations/Toward a New Legal Framework for Cybersecurity - Deirdre K. Mulligan.pdf
147.8 kB
USENIX Security 2010/USENIX Security 2010 Presentations/Adapting Software Fault Isolation to Contemporary CPU Architectures - David Sehr, Robert Muth, Cliff Biffle, Victor Khimenko, Egor Pasko, Karl Schimpf, Bennet Yee.pdf
145.9 kB
USENIX Security 2009/USENIX Security 2009 Presentations/Protecting Confidential Data on Personal Computers with Storage Capsules - Kevin Borders, Eric Vander Weele, Billy Lau, Atul Prakash.pdf
145.6 kB
USENIX Security 2010/USENIX Security 2010 Presentations/Securing Script-Based Extensibility in Web Browsers - Vladan Djeric, Ashvin Goel.pdf
145.3 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/cbgapi.loaded_0
144.0 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/cbgapi.loaded_0
144.0 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/cbgapi.loaded_0
144.0 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/cbgapi.loaded_0
144.0 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/cbgapi.loaded_0
144.0 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/cbgapi.loaded_0
144.0 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/cbgapi.loaded_0
144.0 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/cbgapi.loaded_0
144.0 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/cbgapi.loaded_0
144.0 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/cbgapi.loaded_0
144.0 kB
USENIX Security 2009/USENIX Security 2009 Technical Sessions_files/sec09opening.jpg
143.8 kB
USENIX Security 2010/USENIX Security 2010 Technical Sessions_files/sec09opening.jpg
143.8 kB
USENIX Security 2013/USENIX Security 2013 Videos/The White House's Priorities for Cybersecurity - Andy Ozment.srt
142.2 kB
USENIX Security 2018/USENIX Security 2018 Videos/Chipmunk or Pepe Using Acoustical Analysis to Detect Voice-Channel Fraud at Scale.eng.srt
142.2 kB
USENIX Security 2012/USENIX Security 2012 Presentations/Taking Proof-Based Verified Computation a Few Steps Closer to Practicality Slides - Srinath Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Andrew J. Blumberg, Michael Walfish.pdf
141.6 kB
USENIX Security 2010/USENIX Security 2010 Presentations/End-to-End Arguments The Internet and Beyond - David P. Reed.pdf
140.2 kB
USENIX Security 2013/USENIX Security 2013 Videos/Dr. Felten Goes To Washington - Lessons from 18 Months in Government - Edward W. Felten.srt
139.4 kB
USENIX Security 2016/USENIX Security 2016 Videos/Finding and Fixing Security Bugs in Flash.eng.srt
136.6 kB
USENIX Security 2018/27th USENIX Security Symposium Grid_files/main-current.css
135.9 kB
USENIX Security 2019/28th USENIX Security Symposium Grid_files/main-current.css
135.9 kB
USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera22x.png
135.5 kB
USENIX Security 2019/USENIX Security 2019 Video/Tackling the Trust and Safety Crisis.eng.srt
135.4 kB
USENIX Security 2016/USENIX Security 2016 Videos/Crashing Drones and Hijacked Cameras CyberTrust Meets CyberPhysical.eng.srt
135.3 kB
USENIX Security 2018/USENIX Security 2018 Videos/Solving the Next Billion-People Privacy Problem.eng.srt
133.4 kB
USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/js_wKyFX46tVKJtPKN12qNjRfS4aubW4G2u7LK22vlDiKo.js
133.2 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/js_wKyFX46tVKJtPKN12qNjRfS4aubW4G2u7LK22vlDiKo.js
133.2 kB
USENIX Security 2020/sec20_message.pdf
133.1 kB
USENIX Security 2018/USENIX Security 2018 Videos/The Law and Economics of Bug Bounties.eng.srt
133.0 kB
USENIX Security 2019/USENIX Security 2019 USENIX.htm
132.9 kB
USENIX Security 2020/USENIX Security 2020 Panels/USENIX Security 20 - Panel Digital Contact Tracing.eng.srt
132.7 kB
USENIX Security 2020/USENIX Security 2020 Videos/Panel Digital Contact Tracing.eng.srt
132.7 kB
USENIX Security 2018/USENIX Security 2018 Videos/The Second Crypto War-What's Different Now.eng.srt
131.8 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/js_U0vng6nr8yfSzrWPiyS9QtbOsmQ8XMOn1mS4JIpHltg.js
131.3 kB
USENIX Security 2018/USENIX Security 2018 Program at a Glance USENIX_files/css_Tvyih1Dm489siBROXzFSkKUCFbsEK9kCr0p3JDiev80.css
129.3 kB
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/css_Tvyih1Dm489siBROXzFSkKUCFbsEK9kCr0p3JDiev80.css
129.3 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/css_Tvyih1Dm489siBROXzFSkKUCFbsEK9kCr0p3JDiev80.css
129.3 kB
USENIX Security 2019/USENIX Security 2019 Program at a Glance USENIX_files/css_Tvyih1Dm489siBROXzFSkKUCFbsEK9kCr0p3JDiev80.css
129.3 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/css_Tvyih1Dm489siBROXzFSkKUCFbsEK9kCr0p3JDiev80.css
129.3 kB
USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/css_Tvyih1Dm489siBROXzFSkKUCFbsEK9kCr0p3JDiev80.css
129.3 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/css_Tvyih1Dm489siBROXzFSkKUCFbsEK9kCr0p3JDiev80.css
129.3 kB
USENIX Security 2013/USENIX Security 2013 Videos/Security Team 2.0 - Chris Evans.srt
129.0 kB
USENIX Security 2013/USENIX Security 2013 Videos/Building Securable Infrastructure Open-Source Private Clouds - Pravir Chandra.srt
128.5 kB
USENIX Security 2015/USENIX Security 2015 Videos/Conducting Usable Security Studies - It s Complicated.srt
128.4 kB
USENIX Security 2008/USENIX Security 2008 Presentations/Lest We Remember - Cold Boot Attacks on Encryption Keys_files/mona_300s.png
127.9 kB
USENIX Security 2020/USENIX Security 2020 Panels/USENIX Security 20 - Panel The 2020 Election Remote Voting, Disinformation, and Audit.eng.srt
127.6 kB
USENIX Security 2020/USENIX Security 2020 Videos/Panel The 2020 Election Remote Voting, Disinformation, and Audit.eng.srt
127.6 kB
USENIX Security 2020/sec20_title_copyright_organizers.pdf
126.7 kB
USENIX Security 2018/USENIX Security 2018 Videos/Privacy for Tigers.eng.srt
126.3 kB
USENIX Security 2020/USENIX Security '20 USENIX.html
125.1 kB
USENIX Security 2008/USENIX Security 2008 Presentations/Lest We Remember - Cold Boot Attacks on Encryption Keys.htm
122.7 kB
USENIX Security 2013/USENIX Security 2013 Videos/Confessions of a Recovering Data Broker Responsible Innovation in the Age of Big Data, Big Brother, and the Coming Skynet Terminators - Jim Adler.srt
121.2 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js
120.3 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js
120.3 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js
120.3 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js
120.3 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js
120.3 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js
120.3 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js
120.3 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js
120.3 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js
120.3 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js
120.3 kB
USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js
120.3 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js
120.3 kB
USENIX Security 2018/USENIX Security 2018 Program at a Glance USENIX_files/js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js
120.3 kB
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js
120.3 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js
120.3 kB
USENIX Security 2019/USENIX Security 2019 Program at a Glance USENIX_files/js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js
120.3 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js
120.3 kB
USENIX Security 2019/USENIX Security 2019 Video/Shining Light on Internet-based Crimes Against Children.eng.srt
119.4 kB
USENIX Security 2015/USENIX Security 2015 Videos/Inherent Cyber Insecurity and Our National Security - Surviving on a Diet of Poisoned Fruit.srt
119.3 kB
USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera23x.png
118.4 kB
USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services.htm
111.2 kB
USENIX Security 2019/USENIX Security 2019 Video/The Spies Hacking our Phones are Going Dark, and We're All in Trouble.eng.srt
110.8 kB
USENIX Security 2015/USENIX Security 2015 Videos/Preventing Security Bugs through Software Design.srt
110.0 kB
USENIX Security 2015/USENIX Security 2015 Videos/Why Johnny and Janie Can’t Code Safely - Bringing Software Assurance to the Masses.srt
110.0 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/js_5eZSC3tfzCwTta-_4qxrBau4YdctcIhVqovRK7sPRFo.js
107.7 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/js_5eZSC3tfzCwTta-_4qxrBau4YdctcIhVqovRK7sPRFo.js
107.7 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/js_5eZSC3tfzCwTta-_4qxrBau4YdctcIhVqovRK7sPRFo.js
107.7 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/js_5eZSC3tfzCwTta-_4qxrBau4YdctcIhVqovRK7sPRFo.js
107.7 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/js_5eZSC3tfzCwTta-_4qxrBau4YdctcIhVqovRK7sPRFo.js
107.7 kB
USENIX Security 2018/USENIX Security 2018 Videos/Medical Device Cybersecurity through the FDA Lens.eng.srt
107.5 kB
USENIX Security 2018/USENIX Security 2018 USENIX.htm
106.9 kB
USENIX Security 2020/sec20_errata_1.pdf
106.1 kB
USENIX Security 2018/USENIX Security 2018 Videos/Analogy Cyber Security-From 0101 to Mixed Signals.eng.srt
105.1 kB
USENIX Security 2016/USENIX Security 2016 Full Proceedings errata2.pdf
104.6 kB
USENIX Security 2011/USENIX Security 2011 Poster Session_files/sec11_banner.jpg
103.8 kB
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/sec08_banner_750.jpg
102.2 kB
USENIX Security 2008/USENIX Security 2008 Presentations/USENIX Security 2008 Poster Session_files/sec08_banner_750.jpg
102.2 kB
USENIX Security 2008/USENIX Security 2008 Technical Sessions_files/sec08_banner_750.jpg
102.2 kB
USENIX Security 2008/USENIX Security 2008 WiPs_files/sec08_banner_750.jpg
102.2 kB
USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera4x.png
102.0 kB
USENIX Security 2009/USENIX Security 2009 Presentations/JavaScript Security - sec09_corrigendum.pdf
101.6 kB
USENIX Security 2009/USENIX Security 2009 Presentations/USENIX Security 2009 - Corrigendum.pdf
101.6 kB
USENIX Security 2015/USENIX Security 2015 USENIX.htm
100.6 kB
USENIX Security 2016/USENIX Security 2016 USENIX.htm
99.5 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/js_ILONILlX06kZtY3IVUMaeuMs_GJ1hSJY46daikoF9fA.js
99.4 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/js_ILONILlX06kZtY3IVUMaeuMs_GJ1hSJY46daikoF9fA.js
99.4 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/js_ILONILlX06kZtY3IVUMaeuMs_GJ1hSJY46daikoF9fA.js
99.4 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/js_ILONILlX06kZtY3IVUMaeuMs_GJ1hSJY46daikoF9fA.js
99.4 kB
USENIX Security 2019/USENIX Security 2019 Program errata-4.pdf
98.8 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/widgets.js
98.5 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/widgets.js
98.5 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/widgets.js
98.5 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/widgets.js
98.5 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/widgets.js
98.5 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/widgets.js
98.5 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/widgets.js
98.5 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/widgets.js
98.5 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/widgets.js
98.5 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/widgets.js
98.5 kB
USENIX Security 2020/sec20_errata_2.pdf
98.0 kB
USENIX Security 2010/USENIX Security 2010 Presentations/USENIX Security 2010 Errata.pdf
97.9 kB
USENIX Security 2018/27th USENIX Security Symposium Grid_files/jquery.js
97.2 kB
USENIX Security 2019/28th USENIX Security Symposium Grid_files/jquery_002.js
97.2 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/cbgapi.loaded_1
97.1 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/cbgapi.loaded_1
97.1 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/cbgapi.loaded_1
97.1 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/cbgapi.loaded_1
97.1 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/cbgapi.loaded_1
97.1 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/cbgapi.loaded_1
97.1 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/cbgapi.loaded_1
97.1 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/cbgapi.loaded_1
97.1 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/cbgapi.loaded_1
97.1 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/cbgapi.loaded_1
97.1 kB
USENIX Security 2018/27th USENIX Security Symposium Grid_files/jquery_003.js
96.4 kB
USENIX Security 2019/28th USENIX Security Symposium Grid_files/jquery_004.js
96.4 kB
USENIX Security 2016/USENIX Security 2016 Full Proceedings errata.pdf
95.9 kB
USENIX Security 2018/27th USENIX Security Symposium Grid_files/bootstrap-custom.css
94.0 kB
USENIX Security 2019/28th USENIX Security Symposium Grid_files/bootstrap-custom.css
94.0 kB
USENIX Security 2019/USENIX Security 2019 Video/Baby Steps towards the Precipice How the Web Became a Scary.eng.srt
93.3 kB
USENIX Security 2017/USENIX Security 2017 USENIX.htm
92.5 kB
USENIX Security 2018/USENIX Security 2018 Videos/Practical Accountability of Secret Processes.eng.srt
89.1 kB
USENIX Security 2019/USENIX Security 2019 Video/Lessons Learned from Evaluating the Robustness of Defenses to.eng.srt
88.7 kB
USENIX Security 2013/USENIX Security 2013 USENIX.htm
88.6 kB
USENIX Security 2018/USENIX Security 2018 Videos/Security Namespace - Making Linux Security Frameworks Available to Containers.eng.srt
87.0 kB
USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera12x.png
86.4 kB
USENIX Security 2019/USENIX Security 2019 Video/Security Research and Public Policy.eng.srt
86.2 kB
USENIX Security 2019/USENIX Security 2019 Program errata-5.pdf
86.0 kB
USENIX Security 2019/USENIX Security 2019 Program at a Glance USENIX.htm
85.8 kB
USENIX Security 2016/USENIX Security 2016 Videos/Post-quantum Key Exchange-A New Hope.eng.srt
85.7 kB
USENIX Security 2019/USENIX Security 2019 Video/Evaluating Mobile Messengers for Implementation Vulnerabilities.eng.srt
85.1 kB
USENIX Security 2018/USENIX Security 2018 Videos/Enter the Hydra - Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts.eng.srt
85.1 kB
USENIX Security 2013/USENIX Security 2013 Videos/Tracking the Casino Computer Wars Who’s Winning - the Casino or the Cheat - Richard Marcus.srt
84.8 kB
USENIX Security 2014/USENIX Security 2014 USENIX.htm
84.6 kB
USENIX Security 2019/USENIX Security 2019 Video/Lessons Learned About Building Secure Software It's About the Developers.eng.srt
84.1 kB
USENIX Security 2010/USENIX Security 2010 Technical Sessions.htm
83.7 kB
USENIX Security 2018/USENIX Security 2018 Videos/Skill Squatting Attacks on Amazon Alexa.eng.srt
83.0 kB
USENIX Security 2007/Presentations/Flayer Exposing Application Internals - Will Drewry, Tavis Ormandy .pdf
82.9 kB
USENIX Security 2018/USENIX Security 2018 Videos/The Secure Socket API - TLS as an Operating System Service.eng.srt
82.4 kB
USENIX Security 2012/USENIX Security 2012 USENIX.htm
82.0 kB
USENIX Security 2009/USENIX Security 2009 Technical Sessions.htm
81.7 kB
USENIX Security 2018/USENIX Security 2018 Program at a Glance USENIX.htm
81.1 kB
USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera29x.png
80.8 kB
USENIX Security 2019/USENIX Security 2019 Video/Embracing the - Hack. - A Better Strategy for Team-Defense.eng.srt
79.7 kB
USENIX Security 2017/USENIX Security 2017 Full Proceedings errata 2.pdf
79.4 kB
USENIX Security 2011/USENIX Security 2011 Proceedings Errata.pdf
79.3 kB
USENIX Security 2015/USENIX Security 2015 Presentations/sec15_contents-update.pdf
79.1 kB
USENIX Security 2008/USENIX Security 2008 Presentations/Practical Symmetric Key Cryptography on Modern Graphics Hardware.htm
77.8 kB
USENIX Security 2013/USENIX Security 2013 Proceedings erratum.pdf
77.1 kB
USENIX Security 2018/USENIX Security 2018 Videos/Better managed than memorized Studying the Impact of Managers on Password Strength and Reuse.eng.srt
76.8 kB
USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera11x.png
76.8 kB
USENIX Security 2019/USENIX Security 2019 Video/From Privacy by Design to Data Protection by Design The Challenges of.eng.srt
76.7 kB
USENIX Security 2018/USENIX Security 2018 Videos/DelegaTEE - Brokered Delegation Using Trusted Execution Environments.eng.srt
76.3 kB
USENIX Security 2018/USENIX Security 2018 Videos/Translation Leak-aside Buffer - Defeating Cache Side-channel Protections with TLB Attacks.eng.srt
75.1 kB
USENIX Security 2018/USENIX Security 2018 Videos/Fast and Service-preserving Recovery from Malware Infections Using CRIU.eng.srt
74.7 kB
USENIX Security 2018/27th USENIX Security Symposium Grid_files/main.js
73.7 kB
USENIX Security 2019/28th USENIX Security Symposium Grid_files/main.js
73.7 kB
USENIX Security 2019/USENIX Security 2019 Program errata-6.pdf
73.7 kB
USENIX Security 2018/USENIX Security 2018 Videos/Quack - Scalable Remote Measurement of Application-Layer Censorship.eng.srt
73.0 kB
USENIX Security 2008/USENIX Security 2008 Technical Sessions.htm
72.4 kB
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/security07_banner.jpg
71.7 kB
USENIX Security 2007/Presentations/Security 2007 Poster Session_files/security07_banner.jpg
71.7 kB
USENIX Security 2018/USENIX Security 2018 Videos/Turning Your Weakness Into a Strength - Watermarking Deep Neural Networks by Backdooring.eng.srt
71.5 kB
USENIX Security 2016/USENIX Security 2016 Videos/Hey, You Have a Problem On the Feasibility of Large-Scale Web Vulnerability.eng.srt
70.8 kB
USENIX Security 2018/USENIX Security 2018 Videos/A4NT - Author Attribute Anonymity by Adversarial Training of Neural Machine Translation.eng.srt
70.5 kB
USENIX Security 2008/USENIX Security 2008 Presentations/Reverse-Engineering a Cryptographic RFID Tag_files/Mifare-anotated.jpg
70.5 kB
USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera19x.png
70.1 kB
USENIX Security 2018/USENIX Security 2018 Videos/When Does Machine Learning FAIL Generalized Transferability for Evasion and Poisoning Attacks.eng.srt
69.4 kB
USENIX Security 2016/USENIX Security 2016 Videos/You've Got Vulnerability Exploring Effective Vulnerability Notifications.eng.srt
69.2 kB
USENIX Security 2018/USENIX Security 2018 Videos/Automatic Heap Layout Manipulation for Exploitation.eng.srt
68.7 kB
USENIX Security 2016/USENIX Security 2016 Videos/Dancing on the Lip of the Volcano Chosen Ciphertext Attacks on Apple iMessage.eng.srt
68.5 kB
USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera28x.png
68.4 kB
USENIX Security 2016/USENIX Security 2016 Videos/A Comprehensive Measurement Study of Domain Generating Malware.eng.srt
68.3 kB
USENIX Security 2019/USENIX Security 2019 Program errata-2.pdf
68.3 kB
USENIX Security 2016/USENIX Security 2016 Videos/fTPM A Software-Only Implementation of a TPM Chip.eng.srt
67.4 kB
USENIX Security 2018/USENIX Security 2018 Videos/MoonShine - Optimizing OS Fuzzer Seed Selection with Trace Distillation.eng.srt
66.6 kB
USENIX Security 2016/USENIX Security 2016 Videos/Verifying Constant-Time Implementations.eng.srt
66.3 kB
USENIX Security 2018/USENIX Security 2018 Videos/The Rewards and Costs of Stronger Passwords in a University - Linking Password Lifetime to Strength.eng.srt
65.9 kB
USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera25x.png
65.8 kB
USENIX Security 2016/USENIX Security 2016 Videos/Practical DIFC Enforcement on Android.eng.srt
65.8 kB
USENIX Security 2018/USENIX Security 2018 Videos/Bamboozling Certificate Authorities with BGP.eng.srt
65.6 kB
USENIX Security 2018/USENIX Security 2018 Videos/BlackIoT - IoT Botnet of High Wattage Devices Can Disrupt the Power Grid.eng.srt
65.1 kB
USENIX Security 2018/USENIX Security 2018 Videos/Plug and Prey Measuring the Commoditization of Cybercrime via Online Anonymous Markets.eng.srt
65.0 kB
USENIX Security 2018/USENIX Security 2018 Videos/The Dangers of Key Reuse - Practical Attacks on IPsec IKE.eng.srt
64.4 kB
USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera15x.png
63.9 kB
USENIX Security 2016/USENIX Security 2016 Videos/Trusted Browsers for Uncertain Times.eng.srt
63.8 kB
USENIX Security 2018/USENIX Security 2018 Videos/Effective Detection of Multimedia Protocol Tunneling using Machine Learning.eng.srt
63.7 kB
USENIX Security 2018/USENIX Security 2018 Videos/Rethinking Access Control and Authentication for the Home Internet of Things (IoT).eng.srt
63.6 kB
USENIX Security 2018/USENIX Security 2018 Videos/SAQL - A Stream-based Query System for Real-Time Abnormal System Behavior Detection.eng.srt
63.3 kB
USENIX Security 2018/USENIX Security 2018 Videos/The Guard's Dilemma - Efficient Code-Reuse Attacks Against Intel SGX.eng.srt
63.3 kB
USENIX Security 2018/USENIX Security 2018 Videos/Towards Predicting Efficient and Anonymous Tor Circuits.eng.srt
63.1 kB
USENIX Security 2014/USENIX Security 2014 Full Proceedings errata_slip.pdf
63.0 kB
USENIX Security 2014/USENIX Security 2014 Presentations/Privacy in Pharmacogenetics An End-to-End Case Study of Personalized Warfarin Dosing Eratta - Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon Lin, David Page, Tho.pdf
63.0 kB
USENIX Security 2018/USENIX Security 2018 Videos/Malicious Management Unit - Why Stopping Cache Attacks in Software is Harder Than You Think.eng.srt
63.0 kB
USENIX Security 2018/USENIX Security 2018 Videos/NetHide - Secure and Practical Network Topology Obfuscation.eng.srt
63.0 kB
USENIX Security 2017/USENIX Security 2017 Full Proceedings errata 3.pdf
62.2 kB
USENIX Security 2018/USENIX Security 2018 Videos/BurnBox - Self-Revocable Encryption in a World Of Compelled Access.eng.srt
62.0 kB
USENIX Security 2018/USENIX Security 2018 Videos/Tackling runtime-based obfuscation in Android with TIRO.eng.srt
62.0 kB
USENIX Security 2016/USENIX Security 2016 Videos/Flip Feng Shui Hammering a Needle in the Software Stack.eng.srt
61.7 kB
USENIX Security 2016/USENIX Security 2016 Videos/Hidden Voice Commands.eng.srt
61.6 kB
USENIX Security 2018/USENIX Security 2018 Videos/A Sense of Time for JavaScript and Node.js.eng.srt
61.6 kB
USENIX Security 2016/USENIX Security 2016 Videos/Investigating Commercial Pay-Per-Install and the Distribution of Unwanted.eng.srt
61.5 kB
USENIX Security 2018/USENIX Security 2018 Videos/Return Of Bleichenbacher's Oracle Threat (ROBOT).eng.srt
61.2 kB
USENIX Security 2018/USENIX Security 2018 Videos/Guarder - A Tunable Secure Allocator.eng.srt
61.0 kB
USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera27x.png
60.9 kB
USENIX Security 2018/USENIX Security 2018 Videos/Polisis - Automated Analysis and Presentation of Privacy Policies Using Deep Learning.eng.srt
60.6 kB
USENIX Security 2016/USENIX Security 2016 Videos/Internet Jones and the Raiders of the Lost Trackers.eng.srt
60.5 kB
USENIX Security 2018/USENIX Security 2018 Videos/An Empirical Analysis of Anonymity in Zcash.eng.srt
60.1 kB
USENIX Security 2013/USENIX Security 2013 Videos/Windows 8 Security - Supporting User Confidence - Crispin Cowan.srt
60.0 kB
USENIX Security 2018/USENIX Security 2018 Videos/Modelling and Analysis of a Hierarchy of Distance Bounding Attacks.eng.srt
59.4 kB
USENIX Security 2018/USENIX Security 2018 Videos/Precise and Accurate Patch Presence Test for Binaries.eng.srt
59.4 kB
USENIX Security 2018/USENIX Security 2018 Videos/HeapHopper - Bringing Bounded Model Checking to Heap Implementation Security.eng.srt
59.0 kB
USENIX Security 2018/USENIX Security 2018 Videos/Arbitrum - Scalable, private smart contracts.eng.srt
58.8 kB
USENIX Security 2018/USENIX Security 2018 Videos/DATA - Differential Address Trace Analysis - Finding Address-based Side-Channels in Binaries.eng.srt
58.5 kB
USENIX Security 2018/USENIX Security 2018 Videos/Dependence-Preserving Data Compaction for Scalable Forensic Analysis.eng.srt
58.4 kB
USENIX Security 2018/USENIX Security 2018 Videos/With Great Training Comes Great Vulnerability - Practical Attacks against Transfer Learning.eng.srt
58.4 kB
USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera26x.png
57.8 kB
USENIX Security 2018/USENIX Security 2018 Videos/Debloating Software through Piece-Wise Compilation and Loading.eng.srt
57.8 kB
USENIX Security 2018/USENIX Security 2018 Videos/Meltdown - Reading Kernel Memory from User Space.eng.srt
57.5 kB
USENIX Security 2018/USENIX Security 2018 Videos/The Battle for New York - A Case Study of Applied Digital Threat Modeling at the Enterprise Level.eng.srt
57.1 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/js_2sjNGyfj3O57w8bimxly5mzgG70GrcIxxxYOEInwu1Q.js
57.0 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/js_2sjNGyfj3O57w8bimxly5mzgG70GrcIxxxYOEInwu1Q.js
57.0 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/js_2sjNGyfj3O57w8bimxly5mzgG70GrcIxxxYOEInwu1Q.js
57.0 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/js_2sjNGyfj3O57w8bimxly5mzgG70GrcIxxxYOEInwu1Q.js
57.0 kB
USENIX Security 2018/USENIX Security 2018 Videos/The Broken Shield - Measuring Revocation Effectiveness in the Windows Code-Signing PKI.eng.srt
56.9 kB
USENIX Security 2018/USENIX Security 2018 Videos/Fp-Scanner - The Privacy Implications of Browser Fingerprint Inconsistencies.eng.srt
56.8 kB
USENIX Security 2018/USENIX Security 2018 Videos/Unveiling and Quantifying Facebook Exploitation of Sensitive Personal Data for Advertising Purposes.eng.srt
56.8 kB
USENIX Security 2018/USENIX Security 2018 Videos/End-to-End Measurements of Email Spoofing Attacks.eng.srt
56.4 kB
USENIX Security 2018/USENIX Security 2018 Videos/SAD THUG - Structural Anomaly Detection for Transmissions of High-value Information Using Graphics.eng.srt
55.9 kB
USENIX Security 2016/USENIX Security 2016 Videos/k-fingerprinting A Robust Scalable Website Fingerprinting Technique.eng.srt
55.6 kB
USENIX Security 2018/USENIX Security 2018 Videos/ATtention Spanned - Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem.eng.srt
55.5 kB
USENIX Security 2016/USENIX Security 2016 Videos/Stealing Machine Learning Models via Prediction APIs.eng.srt
55.5 kB
USENIX Security 2018/USENIX Security 2018 Videos/All Your GPS Are Belong To Us - Towards Stealthy Manipulation of Road Navigation Systems.eng.srt
55.3 kB
USENIX Security 2018/USENIX Security 2018 Videos/Erays - Reverse Engineering Ethereum's Opaque Smart Contracts.eng.srt
55.2 kB
USENIX Security 2016/USENIX Security 2016 Videos/Making USB Great Again with USBFILTER.eng.srt
55.1 kB
USENIX Security 2018/USENIX Security 2018 Videos/How Do Tor Users Interact With Onion Services.eng.srt
55.0 kB
USENIX Security 2018/USENIX Security 2018 Videos/Fear the Reaper - Characterization and Fast Detection of Card Skimmers.eng.srt
54.9 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/postmessageRelay_data/cbgapi.loaded_0
54.9 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/postmessageRelay_data/cbgapi.loaded_0
54.9 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/postmessageRelay_data/cbgapi.loaded_0
54.9 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/postmessageRelay_data/cbgapi.loaded_0
54.9 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/postmessageRelay_data/cbgapi.loaded_0
54.9 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/postmessageRelay_data/cbgapi.loaded_0
54.9 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/postmessageRelay_data/cbgapi.loaded_0
54.9 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/postmessageRelay_data/cbgapi.loaded_0
54.9 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/postmessageRelay_data/cbgapi.loaded_0
54.9 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/postmessageRelay_data/cbgapi.loaded_0
54.9 kB
USENIX Security 2016/USENIX Security 2016 Videos/Fingerprinting Electronic Control Units for Vehicle Intrusion Detection.eng.srt
54.4 kB
USENIX Security 2016/USENIX Security 2016 Videos/AuthLoop End-to-End Cryptographic Authentication for Telephony.eng.srt
54.3 kB
USENIX Security 2016/USENIX Security 2016 Videos/Micro-Virtualization Memory Tracing to Detect and Prevent Spraying Attacks.eng.srt
54.3 kB
USENIX Security 2018/USENIX Security 2018 Videos/A Bad Dream - Subverting Trusted Platform Module While You Are Sleeping.eng.srt
54.3 kB
USENIX Security 2018/USENIX Security 2018 Videos/From Patching Delays to Infection Symptoms.eng.srt
54.3 kB
USENIX Security 2018/USENIX Security 2018 Videos/Analysis of Privacy Protections in Fitness Tracking Social Networks -or- You can run.eng.srt
54.1 kB
USENIX Security 2016/USENIX Security 2016 Videos/Sanctum Minimal Hardware Extensions for Strong Software Isolation.eng.srt
53.8 kB
USENIX Security 2016/USENIX Security 2016 Videos/Privacy in Epigenetics Temporal Linkability of MicroRNA Expression Profiles.eng.srt
53.7 kB
USENIX Security 2016/USENIX Security 2016 Videos/ARMageddon Cache Attacks on Mobile Devices.eng.srt
53.6 kB
USENIX Security 2018/USENIX Security 2018 Videos/ACES - Automatic Compartments for Embedded Systems.eng.srt
53.6 kB
USENIX Security 2016/USENIX Security 2016 Videos/Oblivious Multi-Party Machine Learning on Trusted Processors.eng.srt
53.6 kB
USENIX Security 2018/USENIX Security 2018 Videos/Who Left Open the Cookie Jar A Comprehensive Evaluation of Third-Party Cookie Policies.eng.srt
53.5 kB
USENIX Security 2016/USENIX Security 2016 Videos/Virtual U Defeating Face Liveness Detection by Building Virtual Models.eng.srt
53.5 kB
USENIX Security 2016/USENIX Security 2016 Videos/On Omitting Commits and Committing Omissions Preventing Git Metadata.eng.srt
53.2 kB
USENIX Security 2018/USENIX Security 2018 Videos/Formal Security Analysis of Neural Networks using Symbolic Intervals.eng.srt
53.2 kB
USENIX Security 2016/USENIX Security 2016 Videos/Thoth Comprehensive Policy Compliance in Data Retrieval Systems.eng.srt
53.2 kB
USENIX Security 2018/USENIX Security 2018 Videos/Understanding the Reproducibility of Crowd-reported Security Vulnerabilities.eng.srt
53.2 kB
USENIX Security 2018/USENIX Security 2018 Videos/CommanderSong - A Systematic Approach for Practical Adversarial Voice Recognition.eng.srt
53.0 kB
USENIX Security 2018/USENIX Security 2018 Videos/Shielding Software From Privileged Side-Channel Attacks.eng.srt
53.0 kB
USENIX Security 2016/USENIX Security 2016 Videos/Identifying and Characterizing Sybils in the Tor Network.eng.srt
52.9 kB
USENIX Security 2016/USENIX Security 2016 Videos/FlowFence Practical Data Protection for Emerging IoT Application Frameworks.eng.srt
52.9 kB
USENIX Security 2016/USENIX Security 2016 Videos/Towards Measuring and Mitigating Social Engineering Software Download Attacks.eng.srt
52.8 kB
USENIX Security 2018/USENIX Security 2018 Videos/O Single Sign-Off, Where Art Thou An Empirical Analysis of Single Sign-On.eng.srt
52.7 kB
USENIX Security 2016/USENIX Security 2016 Videos/Fast, Lean, and Accurate Modeling Password Guessability Using Neural Networks.eng.srt
52.7 kB
USENIX Security 2018/USENIX Security 2018 Videos/Freezing the Web - A Study of ReDoS Vulnerabilities in JavaScript-based Web Servers.eng.srt
52.3 kB
USENIX Security 2016/USENIX Security 2016 Videos/Mirror Enabling Proofs of Data Replication and Retrievability in the Cloud.eng.srt
52.2 kB
USENIX Security 2020/PEPR '20/PEPR 20 - Responsible Design through Experimentation Learnings from LinkedIn.eng.srt
52.1 kB
USENIX Security 2016/USENIX Security 2016 Videos/Defending against Malicious Peripherals with Cinch.eng.srt
51.7 kB
USENIX Security 2018/USENIX Security 2018 Videos/DIZK - A Distributed Zero Knowledge Proof System.eng.srt
51.6 kB
USENIX Security 2018/USENIX Security 2018 Videos/The aftermath of a crypto-ransomware attack at a large academic institution.eng.srt
51.6 kB
USENIX Security 2018/USENIX Security 2018 Videos/QSYM - A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing.eng.srt
51.5 kB
USENIX Security 2018/USENIX Security 2018 Videos/Towards a Secure Zero-rating Framework with Three Parties.eng.srt
51.4 kB
USENIX Security 2016/USENIX Security 2016 Videos/Off-Path TCP Exploits Global Rate Limit Considered Dangerous.eng.srt
51.3 kB
USENIX Security 2016/USENIX Security 2016 Videos/The Million-Key Question-Investigating the Origins of RSA Public Keys.eng.srt
51.3 kB
USENIX Security 2010/USENIX Security 2010 Presentations/Toward an Open and Secure Platform for Using the Web - Will Drewry.html
51.2 kB
USENIX Security 2008/USENIX Security 2008 Presentations/Reverse-Engineering a Cryptographic RFID Tag_files/Mifare-orig-scale.jpg
50.8 kB
USENIX Security 2018/USENIX Security 2018 Videos/We Still Don't Have Secure Cross-Domain Requests - an Empirical Study of CORS.eng.srt
50.7 kB
USENIX Security 2018/USENIX Security 2018 Videos/Charm - Facilitating Dynamic Analysis of Device Drivers of Mobile Systems.eng.srt
50.2 kB
USENIX Security 2018/USENIX Security 2018 Videos/Discovering Flaws in Security-Focused Static Analysis Tools for Android using Systematic Mutation.eng.srt
50.0 kB
USENIX Security 2018/USENIX Security 2018 Videos/NAVEX - Precise and Scalable Exploit Generation for Dynamic Web Applications.eng.srt
49.9 kB
USENIX Security 2018/USENIX Security 2018 Videos/Off-Path TCP Exploit - How Wireless Routers Can Jeopardize Your Secrets.eng.srt
49.8 kB
USENIX Security 2016/USENIX Security 2016 Videos/UNVEIL A Large-Scale, Automated Approach to Detecting Ransomware.eng.srt
49.8 kB
USENIX Security 2016/USENIX Security 2016 Videos/Predicting, Decrypting, and Abusing WPA2 802.11 Group Keys.eng.srt
49.7 kB
USENIX Security 2018/USENIX Security 2018 Videos/Inception - System-Wide Security Testing of Real-World Embedded Systems Software.eng.srt
49.6 kB
USENIX Security 2018/USENIX Security 2018 Videos/Reading Thieves' Cant - Automatically Identifying and Understanding Dark Jargons from Cybercrime.eng.srt
49.6 kB
USENIX Security 2018/USENIX Security 2018 Videos/FlowCog - Context-aware Semantics Extraction and Analysis of Information Flow Leaks in Android Apps.eng.srt
49.5 kB
USENIX Security 2016/USENIX Security 2016 Videos/Faster Malicious 2-Party Secure Computation with Online Offline Dual Execution.eng.srt
49.3 kB
USENIX Security 2016/USENIX Security 2016 Videos/On Demystifying the Android Application Framework Re-Visiting Android.eng.srt
49.3 kB
USENIX Security 2016/USENIX Security 2016 Videos/An In-Depth Analysis of Disassembly on Full-Scale x86 x64 Binaries.eng.srt
49.2 kB
USENIX Security 2016/USENIX Security 2016 Videos/Tracing Information Flows Between Ad Exchanges Using Retargeted Ads.eng.srt
49.0 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/plusone.js
49.0 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/plusone.js
49.0 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/plusone.js
49.0 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/plusone.js
49.0 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/plusone.js
49.0 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/plusone.js
49.0 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/plusone.js
49.0 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/plusone.js
49.0 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/plusone.js
49.0 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/plusone.js
49.0 kB
USENIX Security 2016/USENIX Security 2016 Videos/Screen after Previous Screens Spatial-Temporal Recreation of Android App.eng.srt
48.9 kB
USENIX Security 2020/PEPR '20/PEPR 20 - Taking Responsibility for Someone Elses Code Studying the Privacy Behaviors of Mobile.eng.srt
48.6 kB
USENIX Security 2016/USENIX Security 2016 Videos/Protecting Privacy of BLE Device Users.eng.srt
48.6 kB
USENIX Security 2018/USENIX Security 2018 Videos/Who Is Answering My Queries - Understanding and Characterizing Interception.eng.srt
48.5 kB
USENIX Security 2016/USENIX Security 2016 Videos/All Your Queries Are Belong to Us The Power of File-Injection Attacks.eng.srt
48.3 kB
USENIX Security 2016/USENIX Security 2016 Videos/Authenticated Network Time Synchronization.eng.srt
48.2 kB
USENIX Security 2015/USENIX Security 2015 Presentations/sec15_title_organizers.pdf
48.0 kB
USENIX Security 2016/USENIX Security 2016 Videos/One Bit Flips, One Cloud Flops Cross-VM Row Hammer Attacks.eng.srt
47.8 kB
USENIX Security 2018/USENIX Security 2018 Videos/Man-in-the-Machine - Exploiting Ill-Secured Communication Inside the Computer.eng.srt
47.8 kB
USENIX Security 2016/USENIX Security 2016 Videos/What Cannot Be Read, Cannot Be Leveraged Revisiting Assumptions of JIT-ROP.eng.srt
47.6 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/js_sWOO4PbSe161nCKWEJProMMhdbu_pfXMDzdRrMGBIE0.js
47.6 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/js_sWOO4PbSe161nCKWEJProMMhdbu_pfXMDzdRrMGBIE0.js
47.6 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/js_zKsxChQ0ZiM23lE1j-H3wIlMQpnOrGQN3oQ-70N6r40.js
47.6 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/js_sWOO4PbSe161nCKWEJProMMhdbu_pfXMDzdRrMGBIE0.js
47.6 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/js_sWOO4PbSe161nCKWEJProMMhdbu_pfXMDzdRrMGBIE0.js
47.6 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/js_sWOO4PbSe161nCKWEJProMMhdbu_pfXMDzdRrMGBIE0.js
47.6 kB
USENIX Security 2018/USENIX Security 2018 Videos/WPSE - Fortifying Web Protocols via Browser-Side Security Monitoring.eng.srt
47.5 kB
USENIX Security 2016/USENIX Security 2016 Videos/Harvesting Inconsistent Security Configurations in Custom Android ROMs.eng.srt
47.4 kB
USENIX Security 2016/USENIX Security 2016 Videos/Specification Mining for Intrusion Detection in Networked Control Systems.eng.srt
47.2 kB
USENIX Security 2019/USENIX Security 2019 Video/Please Pay Inside Evaluating Bluetooth-based Detection of Gas Pump Skimmers.eng.srt
46.9 kB
USENIX Security 2018/USENIX Security 2018 Videos/IMIX - In-Process Memory Isolation EXtension.eng.srt
46.8 kB
USENIX Security 2016/USENIX Security 2016 Videos/Egalitarian Computing.eng.srt
46.5 kB
USENIX Security 2019/USENIX Security 2019 Video/JEDI Many-to-Many End-to-End Encryption and Key Delegation for IoT.eng.srt
46.4 kB
USENIX Security 2020/PEPR '20/PEPR 20 - Building and Deploying a Privacy Preserving Data Analysis Platform.eng.srt
46.2 kB
USENIX Security 2018/USENIX Security 2018 Videos/An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications.eng.srt
45.9 kB
USENIX Security 2016/USENIX Security 2016 Videos/DRAMA Exploiting DRAM Addressing for Cross-CPU Attacks.eng.srt
45.7 kB
USENIX Security 2016/USENIX Security 2016 Videos/APISan Sanitizing API Usages through Semantic Cross-Checking.eng.srt
45.4 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/analytics.js
45.2 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/analytics.js
45.2 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/analytics.js
45.2 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/analytics.js
45.2 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/analytics.js
45.2 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/analytics.js
45.2 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/analytics.js
45.2 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/analytics.js
45.2 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/analytics.js
45.2 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/analytics.js
45.2 kB
USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/analytics.js
45.2 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/analytics.js
45.2 kB
USENIX Security 2018/USENIX Security 2018 Program at a Glance USENIX_files/analytics.js
45.2 kB
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/analytics.js
45.2 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/analytics.js
45.2 kB
USENIX Security 2019/USENIX Security 2019 Program at a Glance USENIX_files/analytics.js
45.2 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/analytics.js
45.2 kB
USENIX Security 2008/USENIX Security 2008 Presentations/Reverse-Engineering a Cryptographic RFID Tag.htm
45.1 kB
USENIX Security 2019/USENIX Security 2019 Video/Protecting accounts from credential stuffing with password breach alerting.eng.srt
44.9 kB
USENIX Security 2020/PEPR '20/PEPR 20 - Privacy Architecture for Data-Driven Innovation Configure.eng.srt
44.9 kB
USENIX Security 2020/PEPR '20/PEPR 20 - When Things Go Wrong.eng.srt
44.6 kB
USENIX Security 2019/USENIX Security 2019 Video/Detecting and Characterizing Lateral Phishing at Scale.eng.srt
44.4 kB
USENIX Security 2020/PEPR '20/PEPR 20 - Design of a Privacy Infrastructure for the Internet of Things.eng.srt
44.3 kB
USENIX Security 2015/USENIX Security 2015 Presentations/sec15_message.pdf
43.9 kB
USENIX Security 2016/USENIX Security 2016 Videos/Lock It and Still Lose It -on the (In)Security of Automotive Remote Keyless.eng.srt
43.9 kB
USENIX Security 2018/USENIX Security 2018 Videos/FANCI - Feature-based Automated NXDomain Classification and Intelligence.eng.srt
43.7 kB
USENIX Security 2016/USENIX Security 2016 Videos/OblivP2P An Oblivious Peer-to-Peer Content Sharing System.eng.srt
43.7 kB
USENIX Security 2016/USENIX Security 2016 Videos/Optimized Invariant Representation of Network Traffic for Detecting Unseen.eng.srt
43.6 kB
USENIX Security 2016/USENIX Security 2016 Videos/DROWN Breaking TLS Using SSLv2.eng.srt
43.5 kB
USENIX Security 2016/USENIX Security 2016 Videos/Request and Conquer Exposing Cross-Origin Resource Size.eng.srt
43.3 kB
USENIX Security 2020/PEPR '20/PEPR 20 - How to (In)Effectively Convey Privacy Choices with Icons and Link Text.eng.srt
43.2 kB
USENIX Security 2019/USENIX Security 2019 Video/The Art of The Scam Demystifying Honeypots in Ethereum Smart Contracts.eng.srt
43.1 kB
USENIX Security 2019/USENIX Security 2019 Video/WAVE A Decentralized Authorization Framework with Transitive Delegation.eng.srt
42.9 kB
USENIX Security 2015/USENIX Security 2015 Videos/Investigating the Computer Security Practices and Needs of Journalists.srt
42.7 kB
USENIX Security 2018/USENIX Security 2018 Videos/Enabling Refinable Cross-Host Attack Investigation with Efficient Data Flow Tagging and Tracking.eng.srt
42.3 kB
ScAINet 2020/On Adaptive Attacks to Adversarial Example Defenses.eng.srt
41.7 kB
USENIX Security 2019/USENIX Security 2019 Video/Inadvertently Making Cyber Criminals Rich A Comprehensive Study of.eng.srt
41.6 kB
USENIX Security 2019/USENIX Security 2019 Video/Understanding and Improving Security and Privacy in Multi-User.eng.srt
41.6 kB
USENIX Security 2018/USENIX Security 2018 Videos/End-Users Get Maneuvered - Empirical Analysis of Redirection Hijacking in Content Delivery Networks.eng.srt
40.6 kB
USENIX Security 2015/USENIX Security 2015 Videos/Trustworthy Whole-System Provenance for the Linux Kernel.srt
40.5 kB
USENIX Security 2016/USENIX Security 2016 Videos/The Ever-Changing Labyrinth A Large-Scale Analysis of Wildcard DNS Powered.eng.srt
40.5 kB
USENIX Security 2019/USENIX Security 2019 Video/Leaky Images Targeted Privacy Attacks in the Web.eng.srt
40.4 kB
USENIX Security 2013/USENIX Security 2013 Videos/Dismantling Megamos Crypto Wirelessly Lockpicking a Vehicle Immobilizer - Roel Verdult, Flavio D. Garcia, Baris Ege.srt
40.3 kB
USENIX Security 2015/USENIX Security 2015 Videos/The Unexpected Dangers of Dynamic JavaScript.srt
40.3 kB
USENIX Security 2019/USENIX Security 2019 Video/Evaluating the Contextual Integrity of Privacy Regulation Parents' IoT.eng.srt
40.1 kB
USENIX Security 2019/USENIX Security 2019 Video/Misleading Authorship Attribution of Source Code using Adversarial Learning.eng.srt
39.9 kB
USENIX Security 2019/USENIX Security 2019 Video/Scalable Scanning and Automatic Classification of TLS Padding Oracle.eng.srt
39.6 kB
USENIX Security 2016/USENIX Security 2016 Videos/An Empirical Study of Textual Key-Fingerprint Representations.eng.srt
39.3 kB
USENIX Security 2018/USENIX Security 2018 Videos/Sensitive Information Tracking in Commodity IoT.eng.srt
39.3 kB
USENIX Security 2018/USENIX Security 2018 Videos/Schrödinger's RAT - Profiling the Stakeholders in the Remote Access Trojan Ecosystem.eng.srt
39.3 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/sec16_button_180.png
39.2 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/sec16_button_180.png
39.2 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/sec16_button_180.png
39.2 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/sec16_button_180.png
39.2 kB
USENIX Security 2020/PEPR '20/PEPR 20 - Assessing Privacy Risk with the IPA Triad.eng.srt
39.2 kB
USENIX Security 2020/PEPR '20/PEPR 20 - Privacy in Deployment.eng.srt
39.1 kB
USENIX Security 2016/USENIX Security 2016 Videos/Undermining Information Hiding (and What to Do about It).eng.srt
39.0 kB
USENIX Security 2019/USENIX Security 2019 Video/Platforms in Everything Analyzing Ground-Truth Data on the Anatomy and.eng.srt
39.0 kB
USENIX Security 2019/USENIX Security 2019 Video/simTPM User-centric TPM for Mobile Devices.eng.srt
39.0 kB
USENIX Security 2019/USENIX Security 2019 Video/On (The Lack Of) Location Privacy in Crowdsourcing Applications.eng.srt
39.0 kB
USENIX Security 2019/USENIX Security 2019 Video/The Secret Sharer Evaluating and Testing Unintended Memorization in.eng.srt
38.9 kB
USENIX Security 2020/PEPR '20/PEPR 20 - Wikipedia and the Lean Data Diet.eng.srt
38.9 kB
USENIX Security 2016/USENIX Security 2016 Videos/PIkit A New Kernel-Independent Processor-Interconnect Rootkit.eng.srt
38.8 kB
USENIX Security 2019/USENIX Security 2019 Video/in-toto Providing farm-to-table guarantees for bits and bytes.eng.srt
38.8 kB
USENIX Security 2018/USENIX Security 2018 Videos/Forgetting of Passwords - Ecological Theory and Data.eng.srt
38.7 kB
USENIX Security 2019/USENIX Security 2019 Video/CONFIRM Evaluating Compatibility and Relevance of Control-flow.eng.srt
38.6 kB
USENIX Security 2019/USENIX Security 2019 Video/Site Isolation Process Separation for Web Sites within the Browser.eng.srt
38.5 kB
USENIX Security 2019/USENIX Security 2019 Video/All Things Considered An Analysis of IoT Devices on Home Networks.eng.srt
38.4 kB
USENIX Security 2019/USENIX Security 2019 Video/Point Break A Study of Bandwidth Denial-of-Service Attacks against Tor.eng.srt
38.4 kB
USENIX Security 2018/27th USENIX Security Symposium Grid_files/jquery_004.js
38.3 kB
USENIX Security 2019/28th USENIX Security Symposium Grid_files/jquery.js
38.3 kB
USENIX Security 2020/PEPR '20/PEPR 20 - Improving Usability of Differential Privacy at Scale.eng.srt
38.2 kB
USENIX Security 2018/USENIX Security 2018 Videos/Injected and Delivered - Fabricating Implicit Control over Actuation Systems by Spoofing.eng.srt
38.1 kB
USENIX Security 2016/USENIX Security 2016 Videos/ZKBoo Faster Zero-Knowledge for Boolean Circuits.eng.srt
38.0 kB
USENIX Security 2019/USENIX Security 2019 Video/A Study of the Feasibility of Co-located App Attacks against BLE.eng.srt
37.9 kB
USENIX Security 2019/USENIX Security 2019 Video/Tracing Transactions Across Cryptocurrency Ledgers.eng.srt
37.8 kB
USENIX Security 2019/USENIX Security 2019 Video/HardFails Insights into Software-Exploitable Hardware Bugs.eng.srt
37.7 kB
USENIX Security 2016/USENIX Security 2016 Videos/Automatically Detecting Error Handling Bugs Using Error Specifications.eng.srt
37.5 kB
USENIX Security 2019/USENIX Security 2019 Video/Clinical Computer Security for Victims of Intimate Partner Violence.eng.srt
37.5 kB
USENIX Security 2018/USENIX Security 2018 Videos/Acquisitional Rule-based Engine for Discovering Internet-of-Things Devices.eng.srt
37.5 kB
USENIX Security 2019/USENIX Security 2019 Video/The Web's Identity Crisis Understanding the Effectiveness of Website Identity.eng.srt
37.5 kB
USENIX Security 2019/USENIX Security 2019 Video/50 Ways to Leak Your Data An Exploration of Apps'.eng.srt
37.1 kB
USENIX Security 2019/USENIX Security 2019 Video/ScatterCache Thwarting Cache Attacks via Cache Set Randomization.eng.srt
36.9 kB
USENIX Security 2019/USENIX Security 2019 Video/ERIM Secure, Efficient In-process Isolation with Protection Keys (MPK).eng.srt
36.9 kB
ScAINet 2020/Combating Social Media Information Operations with Neural Language Models.eng.srt
36.8 kB
USENIX Security 2020/ScAINet '20/ScAINet 20 - Combating Social Media Information Operations with Neural Language Models.eng.srt
36.8 kB
USENIX Security 2019/USENIX Security 2019 Video/Computer Security and Privacy in the Interactions Between Victim.eng.srt
36.7 kB
USENIX Security 2019/USENIX Security 2019 Video/Pythia Remote Oracles for the Masses.eng.srt
36.7 kB
USENIX Security 2019/USENIX Security 2019 Video/All Your Clicks Belong to Me Investigating Click Interception on the Web.eng.srt
36.7 kB
USENIX Security 2019/USENIX Security 2019 Video/AntiFuzz Impeding Fuzzing Audits of Binary Executables.eng.srt
36.4 kB
USENIX Security 2019/USENIX Security 2019 Video/VRASED A Verified Hardware Software Co-Design for Remote Attestation.eng.srt
36.4 kB
USENIX Security 2019/USENIX Security 2019 Video/CT-GAN Malicious Tampering of 3D Medical Imagery using Deep Learning.eng.srt
36.3 kB
USENIX Security 2019/USENIX Security 2019 Video/FastKitten Practical Smart Contracts on Bitcoin.eng.srt
36.1 kB
USENIX Security 2009/USENIX Security 2009 Videos/Opening Remarks - Fabian Monrose.mp3
36.0 kB
USENIX Security 2019/USENIX Security 2019 Video/High Precision Detection of Business Email Compromise.eng.srt
35.8 kB
USENIX Security 2019/USENIX Security 2019 Video/TESSERACT Eliminating Experimental Bias in Malware Classification.eng.srt
35.8 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/ozment_andy_sec13.jpg
35.8 kB
USENIX Security 2018/USENIX Security 2018 Videos/Vetting Single Sign-On SDK Implementations via Symbolic Reasoning.eng.srt
35.7 kB
USENIX Security 2019/USENIX Security 2019 Video/Improving Robustness of ML Classifiers against Realizable Evasio.eng.srt
35.6 kB
USENIX Security 2019/USENIX Security 2019 Video/Not Everything is Dark and Gloomy Power Grid Protections Against IoT.eng.srt
35.5 kB
USENIX Security 2019/USENIX Security 2019 Video/BITE Bitcoin Lightweight Client Privacy using Trusted Execution.eng.srt
35.5 kB
USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera5x.png
35.4 kB
USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera6x.png
35.4 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/sec09_banner.jpg
35.3 kB
USENIX Security 2009/USENIX Security 2009 Technical Sessions_files/sec09_banner.jpg
35.3 kB
USENIX Security 2009/USENIX Security 2009 WiPs_files/sec09_banner.jpg
35.3 kB
USENIX Security 2020/PEPR '20/PEPR 20 - Beyond Access Using Abac Frameworks to Implement Privacy and Security Policies.eng.srt
35.0 kB
USENIX Security 2019/USENIX Security 2019 Video/Discovering and Understanding the Security Hazards in the.eng.srt
34.9 kB
USENIX Security 2015/USENIX Security 2015 Videos/All Your Biases Belong to Us - Breaking RC4 in WPA-TKIP and TLS.srt
34.8 kB
USENIX Security 2019/USENIX Security 2019 Video/Losing the Car Keys Wireless PHY-Layer Insecurity in EV Charging.eng.srt
34.8 kB
USENIX Security 2019/USENIX Security 2019 Video/Users Really Do Answer Telephone Scams.eng.srt
34.4 kB
USENIX Security 2019/USENIX Security 2019 Video/ALOHA Auxiliary Loss Optimization for Hypothesis Augmentation.eng.srt
34.4 kB
USENIX Security 2019/USENIX Security 2019 Video/PAC it up Towards Pointer Integrity using ARM Pointer Authentication.eng.srt
34.3 kB
USENIX Security 2019/USENIX Security 2019 Video/Mobile Private Contact Discovery at Scale.eng.srt
34.3 kB
USENIX Security 2019/USENIX Security 2019 Video/EnTrust Regulating Sensor Access by Cooperating Programs.eng.srt
34.2 kB
USENIX Security 2015/USENIX Security 2015 Videos/Sound-Proof - Usable Two-Factor Authentication Based on Ambient Sound.srt
34.2 kB
USENIX Security 2019/USENIX Security 2019 Video/KEPLER Facilitating Control-flow Hijacking Primitive Evaluation for Linux.eng.srt
34.1 kB
ScAINet 2020/Getting Passive Aggressive about False Positives.eng.srt
34.0 kB
USENIX Security 2020/ScAINet '20/ScAINet 20 - Getting Passive Aggressive about False Positives.eng.srt
34.0 kB
USENIX Security 2019/USENIX Security 2019 Video/What Are You Searching For A Remote Keylogging Attack.eng.srt
33.9 kB
USENIX Security 2019/USENIX Security 2019 Video/SafeHidden An Efficient and Secure Information Hiding Technique Using.eng.srt
33.8 kB
USENIX Security 2015/USENIX Security 2015 Videos/Cloudy with a Chance of Breach - Forecasting Cyber Security Incidents.srt
33.8 kB
USENIX Security 2020/PEPR '20/PEPR 20 - Engineering Ethics into the NIST Privacy Framework.eng.srt
33.7 kB
USENIX Security 2020/PEPR '20/PEPR 20 - When Engineers and Lawyers Talk Right-Sizing Your Data Protection Risk Profile.eng.srt
33.5 kB
USENIX Security 2019/USENIX Security 2019 Video/IODINE Verifying Constant-Time Execution of Hardware.eng.srt
33.4 kB
USENIX Security 2019/USENIX Security 2019 Video/SPOILER Speculative Load Hazards Boost Rowhammer and Cache Attacks.eng.srt
33.4 kB
USENIX Security 2019/USENIX Security 2019 Video/Detecting Missing-Check Bugs via Semantic- and Context-Aware.eng.srt
33.4 kB
USENIX Security 2019/USENIX Security 2019 Video/Blind Bernoulli Trials A Noninteractive Protocol For Hidden-Weight Coin Flips.eng.srt
33.4 kB
USENIX Security 2015/USENIX Security 2015 Videos/Type Casting Verification - Stopping an Emerging Attack Vector.srt
33.3 kB
USENIX Security 2019/USENIX Security 2019 Video/Terminal Brain Damage Exposing the Graceless Degradation in Deep.eng.srt
33.3 kB
USENIX Security 2019/USENIX Security 2019 Video/A Systematic Evaluation of Transient Execution Attacks and Defenses.eng.srt
33.3 kB
USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera21x.png
33.2 kB
USENIX Security 2019/USENIX Security 2019 Video/PolicyLint Investigating Internal Privacy Policy Contradictions on Google.eng.srt
33.0 kB
USENIX Security 2019/USENIX Security 2019 Video/Secure Multi-User Content Sharing for Augmented Reality Applications.eng.srt
32.9 kB
USENIX Security 2019/USENIX Security 2019 Video/Everyone is Different Client-side Diversification for Defending.eng.srt
32.9 kB
USENIX Security 2019/USENIX Security 2019 Video/Exploiting Unprotected I O Operations in AMD's Secure Encrypted Virtualization.eng.srt
32.8 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/js_yui9lDPs2dTDFfQPtmwCCL63T1k2MGsGrsTM-7Eo2Ts.js
32.8 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/js_yui9lDPs2dTDFfQPtmwCCL63T1k2MGsGrsTM-7Eo2Ts.js
32.8 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/js_yui9lDPs2dTDFfQPtmwCCL63T1k2MGsGrsTM-7Eo2Ts.js
32.8 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/js_yui9lDPs2dTDFfQPtmwCCL63T1k2MGsGrsTM-7Eo2Ts.js
32.8 kB
USENIX Security 2019/USENIX Security 2019 Video/Johnny, you are fired - Spoofing OpenPGP and S MIME Signatures in Emails.eng.srt
32.8 kB
USENIX Security 2019/USENIX Security 2019 Video/StrongChain Transparent and Collaborative Proof-of-Work Consensus.eng.srt
32.6 kB
ScAINet 2020/Optimization for Attack Surface Exploration The Case of TLS.eng.srt
32.5 kB
USENIX Security 2020/ScAINet '20/ScAINet 20 - Optimization for Attack Surface Exploration The Case of TLS.eng.srt
32.5 kB
USENIX Security 2018/USENIX Security 2018 Videos/Simple Password-Hardened Encryption Services.eng.srt
32.3 kB
USENIX Security 2019/USENIX Security 2019 Video/CANvas Fast and Inexpensive Automotive Network Mapping.eng.srt
32.2 kB
USENIX Security 2019/USENIX Security 2019 Video/UWB-ED Distance Enlargement Attack Detection in Ultra-Wideband.eng.srt
32.1 kB
USENIX Security 2019/USENIX Security 2019 Video/The KNOB is Broken Exploiting Low Entropy in the Encryption Key.eng.srt
32.0 kB
USENIX Security 2019/USENIX Security 2019 Video/RAZOR A Framework for Post-deployment Software Debloating.eng.srt
31.9 kB
USENIX Security 2019/USENIX Security 2019 Video/Reading the Tea leaves A Comparative Analysis of Threat Intelligence.eng.srt
31.8 kB
USENIX Security 2019/USENIX Security 2019 Video/ATTACK2VEC Leveraging Temporal Word Embeddings to Understand the.eng.srt
31.6 kB
USENIX Security 2019/USENIX Security 2019 Video/HideMyApp Hiding the Presence of Sensitive Apps on Android.eng.srt
31.5 kB
USENIX Security 2019/USENIX Security 2019 Video/A Billion Open Interfaces for Eve and Mallory MitM, DoS, and Tracking.eng.srt
31.5 kB
USENIX Security 2019/USENIX Security 2019 Video/Hiding in Plain Signal Physical Signal Overshadowing Attack on LTE.eng.srt
31.3 kB
USENIX Security 2019/USENIX Security 2019 Video/The Betrayal At Cloud City An Empirical Analysis Of Cloud-Based Mobile.eng.srt
31.2 kB
USENIX Security 2019/USENIX Security 2019 Video/Protecting Cloud Virtual Machines from Hypervisor and Host Operating.eng.srt
31.1 kB
USENIX Security 2020/PEPR '20/PEPR 20 - Beyond the Individual Exploring Data Protection by Design in Connected Communal Spaces.eng.srt
31.0 kB
USENIX Security 2019/USENIX Security 2019 Video/RVFuzzer Finding Input Validation Bugs in Robotic Vehicles through.eng.srt
31.0 kB
USENIX Security 2019/USENIX Security 2019 Video/Back to the Whiteboard a Principled Approach for the Assessment and.eng.srt
31.0 kB
USENIX Security 2010/USENIX Security 2010 Poster Session_files/sec10_banner.jpg
30.8 kB
USENIX Security 2010/USENIX Security 2010 Technical Sessions_files/sec10_banner.jpg
30.8 kB
USENIX Security 2019/USENIX Security 2019 Video/Identifying Cache-Based Side Channels through Secret-Augmented.eng.srt
30.8 kB
USENIX Security 2019/USENIX Security 2019 Video/Rendered Private Making GLSL Execution Uniform to Prevent WebGL-based.eng.srt
30.8 kB
USENIX Security 2019/USENIX Security 2019 Video/The Anatomy of a Cryptocurrency Pump-and-Dump Scheme.eng.srt
30.7 kB
USENIX Security 2021/Communication-Computation Trade-offs in PIR.eng.srt
30.7 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/sec14_media.png
30.6 kB
USENIX Security 2019/USENIX Security 2019 Video/From IP ID to Device ID and KASLR Bypass.eng.srt
30.6 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/sec13_media.png
30.6 kB
USENIX Security 2019/USENIX Security 2019 Video/Towards the Detection of Inconsistencies in Public Security.eng.srt
30.3 kB
USENIX Security 2019/USENIX Security 2019 Video/GRIMOIRE Synthesizing Structure while Fuzzing.eng.srt
30.2 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/ie.htm
30.2 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/ie.htm
30.2 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/ie.htm
30.2 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/ie.htm
30.2 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/ie.htm
30.2 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/ie.htm
30.2 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/ie.htm
30.2 kB
USENIX Security 2015/USENIX Security 2015 Full Proceedings erratum.pdf
30.1 kB
USENIX Security 2015/USENIX Security 2015 Presentations/sec15_erratum.pdf
30.1 kB
USENIX Security 2019/USENIX Security 2019 Video/MOPT Optimized Mutation Scheduling for Fuzzers.eng.srt
30.1 kB
USENIX Security 2019/USENIX Security 2019 Video/When the Signal is in the Noise Exploiting Diffix's Sticky Noise.eng.srt
30.1 kB
USENIX Security 2019/USENIX Security 2019 Video/Origin-sensitive Control Flow Integrity.eng.srt
30.0 kB
USENIX Security 2019/USENIX Security 2019 Video/The CrossPath Attack Disrupting the SDN Control Channel via Shared Links.eng.srt
29.8 kB
USENIX Security 2019/USENIX Security 2019 Video/FIRM-AFL High-Throughput Greybox Fuzzing of IoT Firmware via.eng.srt
29.8 kB
USENIX Security 2021/Breaking Through Binaries Compiler-quality Instrumentation for Better.eng.srt
29.7 kB
USENIX Security 2020/USENIX Security 2020 Videos/Stolen Memories Leveraging Model Memorization for Calibrated White-Box.eng.srt
29.6 kB
USENIX Security 2019/USENIX Security 2019 Video/Understanding iOS-based Crowdturfing Through Hidden UI Analysis.eng.srt
29.5 kB
USENIX Security 2020/USENIX Security 2020 Videos/Towards HTTPS Everywhere on Android We Are Not There Yet.eng.srt
29.5 kB
USENIX Security 2019/USENIX Security 2019 Video/Stack Overflow Considered Helpful Deep Learning Security Nudges Towards.eng.srt
29.5 kB
USENIX Security 2020/USENIX Security 2020 Videos/Light Commands Laser-Based Audio Injection Attacks on Voice-Controllable.eng.srt
29.4 kB
USENIX Security 2019/USENIX Security 2019 Video/Looking from the Mirror Evaluating IoT Device Security through.eng.srt
29.3 kB
USENIX Security 2019/USENIX Security 2019 Video/Iframes Popups Are Dangerous in Mobile WebView Studying and.eng.srt
29.2 kB
USENIX Security 2019/USENIX Security 2019 Video/Birthday, Name and Bifacial-security Understanding Passwords.eng.srt
28.9 kB
USENIX Security 2019/USENIX Security 2019 Video/EnFuzz Ensemble Fuzzing with Seed Synchronization among Diverse Fuzzers.eng.srt
28.9 kB
USENIX Security 2019/USENIX Security 2019 Video/PeX A Permission Check Analysis Framework for Linux Kernel.eng.srt
28.9 kB
USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera14x.png
28.8 kB
USENIX Security 2019/USENIX Security 2019 Video/uXOM Efficient eXecute-Only Memory on ARM Cortex-M.eng.srt
28.8 kB
USENIX Security 2021/Security Analysis of the Democracy Live Online Voting System.eng.srt
28.7 kB
USENIX Security 2019/USENIX Security 2019 Video/Probability Model Transforming Encoders Against Encoding Attacks.eng.srt
28.5 kB
USENIX Security 2020/USENIX Security 2020 Videos/Automatic Techniques to Systematically Discover New Heap Exploitation.eng.srt
28.5 kB
CSET 2020/Historical Analysis of Exploit Availability Timelines.eng.srt
28.3 kB
USENIX Security 2020/CSET '20/CSET 20 - Historical Analysis of Exploit Availability Timelines.eng.srt
28.3 kB
USENIX Security 2020/PEPR '20/PEPR 20 - Privacy Professional Boss Mode.eng.srt
28.2 kB
CSET 2020/Toward Orchestration of Complex Networking Experiments.eng.srt
28.0 kB
USENIX Security 2020/CSET '20/CSET 20 - Toward Orchestration of Complex Networking Experiments.eng.srt
28.0 kB
USENIX Security 2015/USENIX Security 2015 Videos/Post-Mortem of a Zombie - Conficker Cleanup After Six Years.srt
28.0 kB
USENIX Security 2019/USENIX Security 2019 Video/Fuzzification Anti-Fuzzing Techniques.eng.srt
28.0 kB
USENIX Security 2019/USENIX Security 2019 Video/Devils in the Guidance Predicting Logic Vulnerabilities in Payment.eng.srt
27.7 kB
USENIX Security 2020/USENIX Security 2020 Videos/Scaling Verifiable Computation Using Efficient Set Accumulators.eng.srt
27.6 kB
USENIX Security 2019/USENIX Security 2019 Video/Utility-Optimized Local Differential Privacy Mechanisms for.eng.srt
27.6 kB
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008).htm
27.3 kB
USENIX Security 2020/USENIX Security 2020 Videos/The Impact of Ad-Blockers on Product Search and Purchase Behavior.eng.srt
27.3 kB
FOCI 2020/Bystanders’ Privacy The Perspectives of Nannies on Smart Home Surveillance.eng.srt
27.2 kB
USENIX Security 2020/FOCI '20/FOCI 20 - Bystanders’ Privacy The Perspectives of Nannies on Smart Home Surveillance.eng.srt
27.2 kB
USENIX Security 2020/USENIX Security 2020 Videos/PhishTime Continuous Longitudinal Measurement of the Effectiveness.eng.srt
27.2 kB
USENIX Security 2020/USENIX Security 2020 Videos/Data Recovery from Scrubbed NAND Flash Storage Need for Analog Sanitization.eng.srt
27.1 kB
USENIX Security 2021/Poisoning the Unlabeled Dataset of Semi-Supervised Learning.eng.srt
27.1 kB
CSET 2020/Expansion of ICS Testbed for Security Validation based on MITRE ATT&CK Techniques.eng.srt
27.0 kB
USENIX Security 2020/CSET '20/CSET 20 - Expansion of ICS Testbed for Security Validation based on MITRE ATT&CK Techniques.eng.srt
27.0 kB
USENIX Security 2020/USENIX Security 2020 Videos/Everything Old is New Again Binary Security of WebAssembly.eng.srt
27.0 kB
CSET 2020/ICS Testbed Tetris Practical Building Blocks Towards a Cyber Security Resource.eng.srt
27.0 kB
USENIX Security 2020/CSET '20/CSET 20 - ICS Testbed Tetris Practical Building Blocks Towards a Cyber Security Resource.eng.srt
27.0 kB
USENIX Security 2021/Risky Business Investigating the Security Practices of Vendors on an Online.eng.srt
26.9 kB
USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js
26.8 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js
26.8 kB
USENIX Security 2018/USENIX Security 2018 Program at a Glance USENIX_files/js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js
26.8 kB
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js
26.8 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js
26.8 kB
USENIX Security 2019/USENIX Security 2019 Program at a Glance USENIX_files/js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js
26.8 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js
26.8 kB
USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js
26.8 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js
26.8 kB
USENIX Security 2015/USENIX Security 2015 Videos/Towards Discovering and Understanding Task Hijacking in Android.srt
26.8 kB
USENIX Security 2018/USENIX Security 2018 Program at a Glance USENIX_files/font-awesome.css
26.7 kB
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/font-awesome.css
26.7 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/font-awesome.css
26.7 kB
USENIX Security 2019/USENIX Security 2019 Program at a Glance USENIX_files/font-awesome.css
26.7 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/font-awesome.css
26.7 kB
USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/font-awesome.css
26.7 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/font-awesome.css
26.7 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009).htm
26.6 kB
USENIX Security 2019/USENIX Security 2019 Video/Evaluating Differentially Private Machine Learning in Practice.eng.srt
26.5 kB
USENIX Security 2019/USENIX Security 2019 Video/Why Do Adversarial Attacks Transfer Explaining Transferability of.eng.srt
26.3 kB
USENIX Security 2020/USENIX Security 2020 Videos/Medusa Microarchitectural Data Leakage via Automated Attack Synthesis.eng.srt
26.3 kB
USENIX Security 2020/USENIX Security 2020 Videos/Detecting Stuffing of a User’s Credentials at Her Own Accounts.eng.srt
26.3 kB
USENIX Security 2021/Identifying Harmful Media in End-to-End Encrypted Communication.eng.srt
26.3 kB
USENIX Security 2009/USENIX Security 2009 WiPs.htm
26.2 kB
USENIX Security 2020/USENIX Security 2020 Videos/The Ballot is Busted Before the Blockchain A Security Analysis of Voatz.eng.srt
26.2 kB
USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera10x.png
26.2 kB
USENIX Security 2021/Hopper Modeling and Detecting Lateral Movement.eng.srt
26.1 kB
USENIX Security 2020/USENIX Security 2020 Videos/Understanding security mistakes developers make Qualitative analysis.eng.srt
26.1 kB
USENIX Security 2021/Causal Analysis for Software-Defined Networking Attacks.eng.srt
26.1 kB
USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/teague_vanessa_200x230.png
26.0 kB
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/schwartz_susan_200x230.png
26.0 kB
USENIX Security 2020/USENIX Security 2020 Videos/Visor Privacy-Preserving Video Analytics as a Cloud Service.eng.srt
25.9 kB
USENIX Security 2020/USENIX Security 2020 Videos/CopyCat Controlled Instruction-Level Attacks on Enclaves.eng.srt
25.9 kB
USENIX Security 2021/Balboa Bobbing and Weaving around Network Censorship.eng.srt
25.9 kB
USENIX Security 2020/USENIX Security 2020 Videos/Sunrise to Sunset Analyzing the End-to-end Life Cycle and Effectiveness.eng.srt
25.8 kB
USENIX Security 2021/Where's Crypto Automated Identification and Classification of Proprietary.eng.srt
25.6 kB
USENIX Security 2021/DeepReflect Discovering Malicious Functionality through Binary Reconstruction.eng.srt
25.6 kB
CSET 2020/UBCIS Ultimate Benchmark for Container Image Scanning.eng.srt
25.6 kB
USENIX Security 2020/CSET '20/CSET 20 - UBCIS Ultimate Benchmark for Container Image Scanning.eng.srt
25.6 kB
USENIX Security 2019/USENIX Security 2019 Video/DEEPVSA Facilitating Value-set Analysis with Deep Learning for.eng.srt
25.5 kB
USENIX Security 2020/USENIX Security 2020 Videos/Human Distinguishable Visual Key Fingerprints.eng.srt
25.5 kB
USENIX Security 2021/Acoustics to the Rescue Physical Key Inference Attack Revisited.eng.srt
25.5 kB
USENIX Security 2020/USENIX Security 2020 Videos/HALucinator Firmware Re-hosting Through Abstraction Layer Emulation.eng.srt
25.4 kB
USENIX Security 2020/PEPR '20/PEPR 20 - Building an Effective Feedback Loop for Your Privacy Program through Privacy Incident.eng.srt
25.3 kB
USENIX Security 2020/USENIX Security 2020 Videos/VoteAgain A scalable coercion-resistant voting system.eng.srt
25.3 kB
USENIX Security 2020/USENIX Security 2020 Videos/What Twitter Knows Characterizing Ad Targeting Practices, User Perceptions.eng.srt
25.3 kB
USENIX Security 2020/USENIX Security 2020 Videos/ParmeSan Sanitizer-guided Greybox Fuzzing.eng.srt
25.3 kB
USENIX Security 2020/USENIX Security 2020 Videos/MIRAGE Succinct Arguments for Randomized Algorithms with Applications.eng.srt
24.9 kB
USENIX Security 2021/Using Amnesia to Detect Credential Database Breaches.eng.srt
24.9 kB
USENIX Security 2020/USENIX Security 2020 Videos/The Industrial Age of Hacking.eng.srt
24.9 kB
USENIX Security 2021/Frontal Attack Leaking Control-Flow in SGX via the CPU Frontend.eng.srt
24.8 kB
USENIX Security 2020/USENIX Security 2020 Videos/Pancake Frequency Smoothing for Encrypted Data Stores.eng.srt
24.8 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/adler_jim.jpg
24.8 kB
USENIX Security 2015/USENIX Security 2015 Videos/RAPTOR - Routing Attacks on Privacy in Tor.srt
24.8 kB
USENIX Security 2021/Demon in the Variant Statistical Analysis of DNNs for Robust Backdoor.eng.srt
24.8 kB
USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/narayan_shankar_100x115.png
24.8 kB
USENIX Security 2021/Jetset Targeted Firmware Rehosting for Embedded Systems.eng.srt
24.8 kB
USENIX Security 2021/Once is Never Enough Foundations for Sound Statistical Inference in Tor.eng.srt
24.8 kB
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/mickens_james_200x230.png
24.7 kB
USENIX Security 2020/USENIX Security 2020 Videos/DECAF Automatic, Adaptive De-bloating and Hardening of COTS Firmware.eng.srt
24.6 kB
USENIX Security 2020/USENIX Security 2020 Videos/FIRMSCOPE Automatic Uncovering of Privilege-Escalation Vulnerabilities.eng.srt
24.5 kB
USENIX Security 2020/USENIX Security 2020 Videos/SAVIOR Securing Autonomous Vehicles with Robust Physical Invariants.eng.srt
24.5 kB
USENIX Security 2008/USENIX Security 2008 Presentations/Reverse-Engineering a Cryptographic RFID Tag_files/c1.png
24.5 kB
USENIX Security 2020/USENIX Security 2020 Videos/Cardpliance PCI DSS Compliance of Android Applications.eng.srt
24.5 kB
USENIX Security 2020/USENIX Security 2020 Videos/BigMAC Fine-Grained Policy Analysis of Android Firmware.eng.srt
24.5 kB
USENIX Security 2021/CANARY - a reactive defense mechanism for Controller Area Networks based.eng.srt
24.5 kB
USENIX Security 2021/Jaqen A High-Performance Switch-Native Approach for Detecting and Mitigating.eng.srt
24.4 kB
USENIX Security 2021/Smart Contract Vulnerabilities Vulnerable Does Not Imply Exploited.eng.srt
24.4 kB
USENIX Security 2021/On the Design and Misuse of Microcoded (Embedded) Processors-A Cautionary Note.eng.srt
24.4 kB
FOCI 2020/Detecting and Evading Censorship-in-Depth A Case Study of Iran’s Protocol Whitelister.eng.srt
24.4 kB
USENIX Security 2020/FOCI '20/FOCI 20 - Detecting and Evading Censorship-in-Depth A Case Study of Iran’s Protocol Whitelister.eng.srt
24.4 kB
USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera9x.png
24.3 kB
USENIX Security 2021/Evaluating In-Workflow Messages for Improving Mental Models of End-to-End.eng.srt
24.2 kB
USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera17x.png
24.2 kB
USENIX Security 2021/It's stressful having all these phones - Investigating Sex Workers Safety.eng.srt
24.1 kB
USENIX Security 2020/USENIX Security 2020 Videos/Achieving Keyless CDNs with Conclaves.eng.srt
24.1 kB
CSET 2020/On Design and Enhancement of Smart Grid Honeypot System for Practical Collection.eng.srt
24.0 kB
USENIX Security 2021/How Great is the Great Firewall Measuring China's DNS Censorship.eng.srt
24.0 kB
USENIX Security 2019/USENIX Security 2019 Video/Understanding and Securing Device Vulnerabilities through.eng.srt
23.9 kB
USENIX Security 2021/PrivateDrop Practical Privacy-Preserving Authentication for Apple AirDrop.eng.srt
23.9 kB
USENIX Security 2021/EVMPatch Timely and Automated Patching of Ethereum Smart Contracts.eng.srt
23.9 kB
USENIX Security 2020/USENIX Security 2020 Videos/Datalog Disassembly.eng.srt
23.9 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/enck_william_200x230.png
23.9 kB
USENIX Security 2021/What's in a Name Exploring CA Certificate Control.eng.srt
23.9 kB
USENIX Security 2020/USENIX Security 2020 Videos/Sys A Static Symbolic Tool for Finding Good Bugs in Good (Browser) Code.eng.srt
23.8 kB
USENIX Security 2020/USENIX Security 2020 Videos/Composition Kills A Case Study of Email Sender Authentication.eng.srt
23.8 kB
USENIX Security 2021/Domain Shadowing Leveraging Content Delivery Networks for Robust Blocking.eng.srt
23.8 kB
USENIX Security 2021/Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers.eng.srt
23.8 kB
USENIX Security 2020/USENIX Security 2020 Videos/SENG, the SGX-Enforcing Network Gateway Authorizing Communication.eng.srt
23.7 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/porter-felt_adrienne_200x230.png
23.7 kB
USENIX Security 2020/USENIX Security 2020 Videos/Devil’s Whisper A General Approach for Physical Adversarial Attacks.eng.srt
23.7 kB
USENIX Security 2020/USENIX Security 2020 Videos/SANNS Scaling Up Secure Approximate k-Nearest Neighbors Search.eng.srt
23.7 kB
USENIX Security 2021/You Autocomplete Me Poisoning Vulnerabilities in Neural Code Completion.eng.srt
23.6 kB
USENIX Security 2020/USENIX Security 2020 Videos/Walking Onions Scaling Anonymity Networks while Protecting Users.eng.srt
23.6 kB
USENIX Security 2021/Why TLS is better without STARTTLS A Security Analysis of STARTTLS.eng.srt
23.6 kB
USENIX Security 2020/USENIX Security 2020 Videos/Analysis of DTLS Implementations Using Protocol State Fuzzing.eng.srt
23.6 kB
USENIX Security 2007/16th USENIX Security Symposium (Security 2007).htm
23.6 kB
USENIX Security 2020/USENIX Security 2020 Videos/Automatic Hot Patch Generation for Android Kernels.eng.srt
23.5 kB
FOCI 2020/Opening Digital Borders Cautiously yet Decisively Digital Filtering in Saudi Arabia.eng.srt
23.5 kB
USENIX Security 2020/FOCI '20/FOCI 20 - Opening Digital Borders Cautiously yet Decisively Digital Filtering in Saudi Arabia.eng.srt
23.5 kB
USENIX Security 2021/Reducing HSM Reliance in Payments through Proxy Re-Encryption.eng.srt
23.5 kB
USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/adida_ben_2018_200x230.png
23.4 kB
USENIX Security 2020/USENIX Security 2020 Videos/Fawkes Protecting Privacy against Unauthorized Deep Learning Models.eng.srt
23.4 kB
FOCI 2020/Triplet Censors Demystifying Great Firewall’s DNS Censorship Behavior.eng.srt
23.4 kB
USENIX Security 2020/FOCI '20/FOCI 20 - Triplet Censors Demystifying Great Firewall’s DNS Censorship Behavior.eng.srt
23.4 kB
USENIX Security 2021/Charger-Surfing Exploiting a Power Line Side-Channel for Smartphone.eng.srt
23.4 kB
USENIX Security 2020/CSET '20/CSET 20 - Representativeness in the Benchmark for Vulnerability Analysis Tools (B-VAT).eng.srt
23.3 kB
USENIX Security 2021/Security Obstacles and Motivations for Small Businesses from a CISO's.eng.srt
23.3 kB
USENIX Security 2021/Dynamic proofs of retrievability with low server storage.eng.srt
23.2 kB
USENIX Security 2020/USENIX Security 2020 Videos/Silhouette Efficient Protected Shadow Stacks for Embedded Systems.eng.srt
23.2 kB
USENIX Security 2020/USENIX Security 2020 Videos/An Off-Chip Attack on Hardware Enclaves via the Memory Bus.eng.srt
23.2 kB
USENIX Security 2020/USENIX Security 2020 Videos/A Longitudinal and Comprehensive Study of the DANE Ecosystem in Email.eng.srt
23.1 kB
USENIX Security 2021/Automated Discovery of Denial-of-Service Vulnerabilities in Connected Vehicle.eng.srt
23.1 kB
USENIX Security 2020/USENIX Security 2020 Videos/Hybrid Batch Attacks Finding Black-box Adversarial Examples with Limited.eng.srt
23.0 kB
USENIX Security 2021/Osiris Automated Discovery of Microarchitectural Side Channels.eng.srt
23.0 kB
USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/kowalczyk_ellen_110x115.png
23.0 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/js_nPhKWi17GlWfUPto14Dqfk5lpAFMD2XUrRDYY3jnD2c.js
23.0 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/js_nPhKWi17GlWfUPto14Dqfk5lpAFMD2XUrRDYY3jnD2c.js
23.0 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/js_nPhKWi17GlWfUPto14Dqfk5lpAFMD2XUrRDYY3jnD2c.js
23.0 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/js_nPhKWi17GlWfUPto14Dqfk5lpAFMD2XUrRDYY3jnD2c.js
23.0 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/js_nPhKWi17GlWfUPto14Dqfk5lpAFMD2XUrRDYY3jnD2c.js
23.0 kB
USENIX Security 2020/USENIX Security 2020 Videos/A different cup of TI The added value of commercial threat intelligence.eng.srt
22.9 kB
USENIX Security 2020/USENIX Security 2020 Videos/Chaperone Real-time Locking and Loss Prevention for Smartphones.eng.srt
22.9 kB
USENIX Security 2021/Collective Information Security in Large-Scale Urban Protests.eng.srt
22.8 kB
USENIX Security 2020/USENIX Security 2020 Videos/Cache Telepathy Leveraging Shared Resource Attacks to Learn DNN Architectures.eng.srt
22.8 kB
FOCI 2020/Identifying Disinformation Websites Using Infrastructure Features.eng.srt
22.8 kB
USENIX Security 2020/FOCI '20/FOCI 20 - Identifying Disinformation Websites Using Infrastructure Features.eng.srt
22.8 kB
USENIX Security 2021/Data Poisoning Attacks to Local Differential Privacy Protocols.eng.srt
22.8 kB
USENIX Security 2021/Now I'm a bit angry - Individuals' Awareness, Perception, and Responses.eng.srt
22.7 kB
USENIX Security 2021/Sharing More and Checking Less Leveraging Common Input Keywords to Detect.eng.srt
22.7 kB
USENIX Security 2020/USENIX Security 2020 Videos/Hall Spoofing A Non-Invasive DoS Attack on Grid-Tied Solar Inverter.eng.srt
22.6 kB
USENIX Security 2020/USENIX Security 2020 Videos/I have too much respect for my elders Understanding South African Mobile.eng.srt
22.5 kB
USENIX Security 2020/USENIX Security 2020 Videos/PHMon A Programmable Hardware Monitor and Its Security Use Cases.eng.srt
22.5 kB
USENIX Security 2020/USENIX Security 2020 Videos/Adversarial Preprocessing Understanding and Preventing Image-Scaling Attacks.eng.srt
22.5 kB
USENIX Security 2021/Kalεido Real-Time Privacy Control for Eye-Tracking Systems.eng.srt
22.5 kB
USENIX Security 2020/USENIX Security 2020 Videos/Temporal System Call Specialization for Attack Surface Reduction.eng.srt
22.4 kB
USENIX Security 2020/USENIX Security 2020 Videos/SpecFuzz Bringing Spectre-type vulnerabilities to the surface.eng.srt
22.4 kB
USENIX Security 2021/Disrupting Continuity of Apple's Wireless Ecosystem Security New Tracking.eng.srt
22.3 kB
USENIX Security 2021/Frontrunner Jones and the Raiders of the Dark Forest An Empirical Study.eng.srt
22.3 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/wing_jeannette_100x115.png
22.3 kB
USENIX Security 2021/Searching Encrypted Data with Size-Locked Indexes.eng.srt
22.1 kB
USENIX Security 2020/USENIX Security 2020 Videos/Shattered Chain of Trust Understanding Security Risks in Cross-Cloud IoT.eng.srt
22.1 kB
USENIX Security 2020/USENIX Security 2020 Videos/Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines.eng.srt
22.1 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/evans_chris.png
22.1 kB
FOCI 2020/MIMIQ Masking IPs with Migration in QUIC.eng.srt
22.1 kB
USENIX Security 2021/Is Real-time Phishing Eliminated with FIDO Social Engineering Downgrade.eng.srt
22.0 kB
FOCI 2020/Turbo Tunnel, a good way to design censorship circumvention protocols.eng.srt
22.0 kB
USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera13x.png
22.0 kB
USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/serebryany_konstantin_100x115.png
22.0 kB
USENIX Security 2020/USENIX Security 2020 Videos/Montage A Neural Network Language Model-Guided JavaScript Engine Fuzzer.eng.srt
22.0 kB
USENIX Security 2021/Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing.eng.srt
22.0 kB
USENIX Security 2021/A Large Scale Study of User Behavior, Expectations and Engagement with.eng.srt
21.9 kB
USENIX Security 2020/USENIX Security 2020 Videos/Pixel Multi-signatures for Consensus.eng.srt
21.8 kB
USENIX Security 2020/USENIX Security 2020 Videos/Boxer Preventing fraud by scanning credit cards.eng.srt
21.8 kB
USENIX Security 2020/USENIX Security 2020 Videos/who's Calling Characterizing Robocalls through Audio and Metadata Analysis.eng.srt
21.7 kB
USENIX Security 2020/USENIX Security 2020 Videos/Estonian Electronic Identity Card Security Flaws in Key Management.eng.srt
21.7 kB
USENIX Security 2021/A Large-Scale Interview Study on Information Security in and Attacks.eng.srt
21.7 kB
USENIX Security 2021/Ripple A Programmable, Decentralized Link-Flooding Defense Against Adaptive.eng.srt
21.7 kB
USENIX Security 2019/USENIX Security 2019 Video/Robust Website Fingerprinting Through the Cache Occupancy Channel.eng.srt
21.6 kB
USENIX Security 2020/USENIX Security 2020 Videos/KOOBE Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write.eng.srt
21.6 kB
USENIX Security 2021/Capture Centralized Library Management for Heterogeneous IoT Devices.eng.srt
21.6 kB
USENIX Security 2021/Graph Backdoor.eng.srt
21.6 kB
USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera20x.png
21.6 kB
USENIX Security 2020/USENIX Security 2020 Videos/Call Me Maybe Eavesdropping Encrypted LTE Calls With ReVoLTE.eng.srt
21.5 kB
USENIX Security 2020/USENIX Security 2020 Videos/That Was Then, This Is Now A Security Evaluation of Password Generation.eng.srt
21.4 kB
USENIX Security 2020/USENIX Security 2020 Videos/Void A fast and light voice liveness detection system.eng.srt
21.4 kB
USENIX Security 2020/USENIX Security 2020 Videos/Retrofitting Fine Grain Isolation in the Firefox Renderer.eng.srt
21.4 kB
USENIX Security 2021/M2MON Building an MMIO-based Security Reference Monitor for Unmanned Vehicles.eng.srt
21.4 kB
USENIX Security 2020/USENIX Security 2020 Videos/DatashareNetwork A Decentralized Privacy-Preserving Search Engine.eng.srt
21.4 kB
USENIX Security 2021/Blind In On-Path Attacks and Applications to VPNs.eng.srt
21.3 kB
USENIX Security 2021/Messy States of Wiring Vulnerabilities in Emerging Personal Payment Systems.eng.srt
21.3 kB
USENIX Security 2020/USENIX Security 2020 Videos/ShadowMove A Stealthy Lateral Movement Strategy.eng.srt
21.2 kB
USENIX Security 2020/USENIX Security 2020 Videos/SmartVerif Push the Limit of Automation Capability of Verifying Security.eng.srt
21.2 kB
USENIX Security 2020/USENIX Security 2020 Videos/The Unpatchable Silicon A Full Break of the Bitstream Encryption of Xilinx.eng.srt
21.1 kB
USENIX Security 2021/The Role of Computer Security Customer Support in Helping Survivors.eng.srt
21.1 kB
USENIX Security 2021/Stars Can Tell A Robust Method to Defend against GPS Spoofing Attacks.eng.srt
21.1 kB
USENIX Security 2021/EOSAFE Security Analysis of EOSIO Smart Contracts.eng.srt
21.1 kB
USENIX Security 2020/USENIX Security 2020 Videos/NXNSAttack Recursive DNS Inefficiencies and Vulnerabilities.eng.srt
21.1 kB
USENIX Security 2020/USENIX Security 2020 Videos/High Accuracy and High Fidelity Extraction of Neural Networks.eng.srt
21.0 kB
USENIX Security 2020/USENIX Security 2020 Videos/BesFS A POSIX Filesystem for Enclaves with a Mechanized Safety Proof.eng.srt
20.9 kB
USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera16x.png
20.9 kB
USENIX Security 2021/Formally Verified Memory Protection for a Commodity Multiprocessor Hypervisor.eng.srt
20.8 kB
USENIX Security 2020/USENIX Security 2020 Videos/A Tale of Two Headers A Formal Analysis of Inconsistent Click-Jacking.eng.srt
20.8 kB
USENIX Security 2020/USENIX Security 2020 Videos/Horizontal Privilege Escalation in Trusted Applications.eng.srt
20.8 kB
USENIX Security 2020/USENIX Security 2020 Videos/Civet An Efficient Java Partitioning Framework for Hardware Enclaves.eng.srt
20.8 kB
USENIX Security 2021/Deep Entity Classification Abusive Account Detection for Online Social.eng.srt
20.7 kB
USENIX Security 2021/The Hijackers Guide To The Galaxy Off-Path Taking Over Internet Resources.eng.srt
20.7 kB
USENIX Security 2020/USENIX Security 2020 Videos/FANS Fuzzing Android Native System Services via Automated Interface Analysis.eng.srt
20.7 kB
USENIX Security 2021/Assessing Browser-level Defense against IDN-based Phishing.eng.srt
20.7 kB
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/new_usenix.jpg
20.6 kB
USENIX Security 2007/Presentations/Security 2007 Poster Session_files/new_usenix.jpg
20.6 kB
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/new_usenix.jpg
20.6 kB
USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/new_usenix.jpg
20.6 kB
USENIX Security 2008/USENIX Security 2008 Presentations/Lest We Remember - Cold Boot Attacks on Encryption Keys_files/new_usenix.jpg
20.6 kB
USENIX Security 2008/USENIX Security 2008 Presentations/Practical Symmetric Key Cryptography on Modern Graphics Hardware_files/new_usenix.jpg
20.6 kB
USENIX Security 2008/USENIX Security 2008 Presentations/Reverse-Engineering a Cryptographic RFID Tag_files/new_usenix.jpg
20.6 kB
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/new_usenix.jpg
20.6 kB
USENIX Security 2008/USENIX Security 2008 Presentations/USENIX Security 2008 Poster Session_files/new_usenix.jpg
20.6 kB
USENIX Security 2008/USENIX Security 2008 WiPs_files/new_usenix.jpg
20.6 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/new_usenix.jpg
20.6 kB
USENIX Security 2009/USENIX Security 2009 WiPs_files/new_usenix.jpg
20.6 kB
USENIX Security 2010/USENIX Security 2010 Poster Session_files/new_usenix.jpg
20.6 kB
USENIX Security 2011/USENIX Security 2011 Poster Session_files/new_usenix.jpg
20.6 kB
USENIX Security 2021/Towards Formal Verification of State Continuity for Enclave Programs.eng.srt
20.6 kB
USENIX Security 2020/USENIX Security 2020 Videos/BlockSci Design and applications of a blockchain analysis platform.eng.srt
20.6 kB
USENIX Security 2020/USENIX Security 2020 Videos/ETHBMC A Bounded Model Checker for Smart Contracts.eng.srt
20.5 kB
USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera24x.png
20.5 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js
20.5 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js
20.5 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js
20.5 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js
20.5 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js
20.5 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js
20.5 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js
20.5 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js
20.5 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js
20.5 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js
20.5 kB
USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js
20.5 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js
20.5 kB
USENIX Security 2018/USENIX Security 2018 Program at a Glance USENIX_files/js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js
20.5 kB
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js
20.5 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js
20.5 kB
USENIX Security 2019/USENIX Security 2019 Program at a Glance USENIX_files/js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js
20.5 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js
20.5 kB
USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js
20.5 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js
20.5 kB
USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera18x.png
20.4 kB
USENIX Security 2021/Minerva- An Efficient Risk-Limiting Ballot Polling Audit.eng.srt
20.3 kB
USENIX Security 2021/Dirty Road Can Attack Security of Deep Learning based Automated Lane.eng.srt
20.2 kB
USENIX Security 2021/ELISE A Storage Efficient Logging System Powered by Redundancy Reduction.eng.srt
20.1 kB
USENIX Security 2021/PACStack an Authenticated Call Stack.eng.srt
20.1 kB
USENIX Security 2020/USENIX Security 2020 Videos/Drift with Devil Security of Multi-Sensor Fusion based Localization.eng.srt
20.1 kB
USENIX Security 2021/A Stealthy Location Identification Attack Exploiting Carrier Aggregation.eng.srt
20.0 kB
USENIX Security 2021/Evil Under the Sun Understanding and Discovering Attacks on Ethereum.eng.srt
20.0 kB
FOCI 2020/Slitheen Stealth TLS-based Decoy Routing.eng.srt
20.0 kB
USENIX Security 2021/CLARION Sound and Clear Provenance Tracking for Microservice Deployments.eng.srt
19.8 kB
USENIX Security 2020/USENIX Security 2020 Videos/Symbolic execution with SymCC don't interpret, compile.eng.srt
19.8 kB
USENIX Security 2021/DEFInit An Analysis of Exposed Android Init Routines.eng.srt
19.7 kB
USENIX Security 2021/Poseidon A New Hash Function for Zero-Knowledge Proof Systems.eng.srt
19.7 kB
USENIX Security 2020/USENIX Security 2020 Videos/From Needs to Actions to Secure Apps The Effect of Requirements.eng.srt
19.7 kB
USENIX Security 2020/USENIX Security 2020 Videos/A Spectral Analysis of Noise A Comprehensive, Automated, Formal Analysis.eng.srt
19.6 kB
USENIX Security 2015/USENIX Security 2015 Videos/Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors.srt
19.6 kB
USENIX Security 2021/On the Routing-Aware Peering against Network-Eclipse Attacks in Bitcoin.eng.srt
19.6 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/mozilla_firefox_logo_002.png
19.4 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/mozilla_firefox_logo_002.png
19.4 kB
USENIX Security 2021/Scalable Detection of Promotional Website Defacements in Black Hat SEO.eng.srt
19.4 kB
USENIX Security 2021/SyzVegas Beating Kernel Fuzzing Odds with Reinforcement Learning.eng.srt
19.4 kB
USENIX Security 2021/Understanding Malicious Cross-library Data Harvesting on Android.eng.srt
19.3 kB
USENIX Security 2020/USENIX Security 2020 Videos/Interpretable Deep Learning under Fire.eng.srt
19.2 kB
USENIX Security 2021/Phishpedia A Hybrid Deep Learning Based Approach to Visually Identify.eng.srt
19.1 kB
USENIX Security 2021/It's the Company, the Government, You and I - User Perceptions of.eng.srt
19.1 kB
USENIX Security 2021/SocialHEISTing Understanding Stolen Facebook Accounts.eng.srt
19.1 kB
CSET 2020/Bridging Missing Gaps in Evaluating DDoS Research.eng.srt
18.8 kB
USENIX Security 2020/CSET '20/CSET 20 - Bridging Missing Gaps in Evaluating DDoS Research.eng.srt
18.8 kB
USENIX Security 2021/UNIFUZZ A Holistic and Pragmatic Metrics-Driven Platform for Evaluating.eng.srt
18.8 kB
USENIX Security 2021/Finding Bugs Using Your Own Code Detecting Functionally-similar yet.eng.srt
18.8 kB
USENIX Security 2021/PASAN Detecting Peripheral Access Concurrency Bugs within Bare-Metal.eng.srt
18.8 kB
USENIX Security 2021/Coco Co-Design and Co-Verification of Masked Software Implementations on CPUs.eng.srt
18.7 kB
USENIX Security 2021/V0Finder Discovering the Correct Origin of Publicly Reported Software.eng.srt
18.7 kB
USENIX Security 2021/How to Make Private Distributed Cardinality Estimation Practical.eng.srt
18.6 kB
USENIX Security 2021/PrivSyn Differentially Private Data Synthesis.eng.srt
18.6 kB
USENIX Security 2020/USENIX Security 2020 Videos/Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade Attacks.eng.srt
18.5 kB
USENIX Security 2021/Too Good to Be Safe Tricking Lane Detection in Autonomous Driving with Craft.eng.srt
18.5 kB
USENIX Security 2020/PEPR '20/PEPR 20 - Throwing Out the Checklist.eng.srt
18.4 kB
USENIX Security 2021/ReDoSHunter A Combined Static and Dynamic Approach for Regular Expression DoS.eng.srt
18.4 kB
USENIX Security 2021/LZR Identifying Unexpected Internet Services.eng.srt
18.4 kB
USENIX Security 2021/Research on the Security of Visual Reasoning CAPTCHA.eng.srt
18.3 kB
USENIX Security 2021/Virtual Secure Platform A Five-Stage Pipeline Processor over TFHE.eng.srt
18.3 kB
USENIX Security 2021/Swivel Hardening WebAssembly against Spectre.eng.srt
18.2 kB
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/balasubramaniyan_vijay_200x230.png
18.2 kB
USENIX Security 2020/USENIX Security 2020 Videos/P2IM Scalable and Hardware-independent Firmware Testing via Automatic.eng.srt
18.2 kB
USENIX Security 2021/YARIX Scalable YARA-based Malware Intelligence.eng.srt
18.1 kB
USENIX Security 2021/Automatic Policy Generation for Inter-Service Access Control of Microservices.eng.srt
18.1 kB
USENIX Security 2020/USENIX Security 2020 Videos/Zero-delay Lightweight Defenses against Website Fingerprinting.eng.srt
18.0 kB
USENIX Security 2020/USENIX Security 2020 Videos/You Are What You Broadcast Identification of Mobile and IoT Devices.eng.srt
18.0 kB
USENIX Security 2021/Shhhbe quiet - Reducing the Unwanted Interruptions of Notification.eng.srt
18.0 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/challenge_button_170x107.jpg
18.0 kB
USENIX Security 2021/Share First, Ask Later (or Never) Studying Violations of GDPR's Explicit.eng.srt
17.9 kB
USENIX Security 2020/USENIX Security 2020 Videos/An Ever-evolving Game Evaluation of Real-world Attacks and Defenses.eng.srt
17.9 kB
USENIX Security 2021/Static Detection of Unsafe DMA Accesses in Device Drivers.eng.srt
17.9 kB
USENIX Security 2020/USENIX Security 2020 Videos/USBFuzz A Framework for Fuzzing USB Drivers by Device Emulation.eng.srt
17.8 kB
USENIX Security 2021/Privacy-Preserving and Standard-Compatible AKA Protocol for 5G.eng.srt
17.7 kB
USENIX Security 2020/USENIX Security 2020 Videos/Poison Over Troubled Forwarders A Cache Poisoning Attack Targeting DNS.eng.srt
17.6 kB
USENIX Security 2020/USENIX Security 2020 Videos/Liveness is Not Enough Enhancing Fingerprint Authentication with Behavioral.eng.srt
17.5 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/css_0tsfTZCLp9yBXG5eWU1vu1kZaV3OzOpnDDjEGiL42Cs.css
17.4 kB
USENIX Security 2021/SEApp Bringing Mandatory Access Control to Android Apps.eng.srt
17.3 kB
USENIX Security 2021/SmarTest Effectively Hunting Vulnerable Transaction Sequences in Smart.eng.srt
17.2 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/mozilla_firefox_logo.png
17.2 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/mozilla_firefox_logo.png
17.2 kB
USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/kissner_lea_100x115.png
17.2 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/nsf_300x120_v2_1.png
17.0 kB
USENIX Security 2021/LIGHTBLUE Automatic Profile-Aware Debloating of Bluetooth Stacks.eng.srt
16.9 kB
USENIX Security 2021/ABY2.0 Improved Mixed-Protocol Secure Two-Party Computation.eng.srt
16.7 kB
USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/js_l3lGSHpmjPG_uzcz3Shpsi9Iwu4IaSB7us0ldgM0q7g.js
16.3 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/js_l3lGSHpmjPG_uzcz3Shpsi9Iwu4IaSB7us0ldgM0q7g.js
16.3 kB
FOCI 2020/Padding Ain't Enough Assessing the Privacy Guarantees of Encrypted DNS.eng.srt
16.1 kB
USENIX Security 2018/USENIX Security 2018 Program at a Glance USENIX_files/js_fjSBcoQiz2s5JFYU7Z0v2w3fhgZkax8CZA1Fi71bsVc.js
15.9 kB
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/js_fjSBcoQiz2s5JFYU7Z0v2w3fhgZkax8CZA1Fi71bsVc.js
15.9 kB
USENIX Security 2019/USENIX Security 2019 Program at a Glance USENIX_files/js_fjSBcoQiz2s5JFYU7Z0v2w3fhgZkax8CZA1Fi71bsVc.js
15.9 kB
USENIX Security 2008/USENIX Security 2008 Presentations/Lest We Remember - Cold Boot Attacks on Encryption Keys_files/x60_t43p.png
15.6 kB
USENIX Security 2021/Why Eve and Mallory Still Love Android Revisiting TLS (In)Security in Android.eng.srt
15.5 kB
USENIX Security 2021/PTAuth Temporal Memory Safety via Robust Points-to Authentication.eng.srt
15.4 kB
CSET 2020/HAI 1.0 HIL-based Augmented ICS Security Dataset.eng.srt
15.1 kB
USENIX Security 2020/CSET '20/CSET 20 - HAI 1.0 HIL-based Augmented ICS Security Dataset.eng.srt
15.1 kB
FOCI 2020/HTTPT A Probe-Resistant Proxy.eng.srt
15.0 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/usenix_logo_300x150_neat_2.png
15.0 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/usenix_logo_300x150_neat_2.png
15.0 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/usenix_logo_300x150_neat_2.png
15.0 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/usenix_logo_300x150_neat_2.png
15.0 kB
USENIX Security 2008/USENIX Security 2008 WiPs.htm
14.9 kB
USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/js_nKHPel07iQ7X6ouVrkRIeMs9JzgU_FAp9nBhDfrhyQc.js
14.8 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/js_nKHPel07iQ7X6ouVrkRIeMs9JzgU_FAp9nBhDfrhyQc.js
14.8 kB
USENIX Security 2011/USENIX Security 2011 Poster Session.htm
14.7 kB
USENIX Security 2010/USENIX Security 2010 Technical Sessions_files/johnston_roger200x170.jpg
14.7 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/css_m9t3SZ2dKv6HQuOuf0zINIRA5GjP4lkCCtmRRbSjaXs.css
14.7 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/css_m9t3SZ2dKv6HQuOuf0zINIRA5GjP4lkCCtmRRbSjaXs.css
14.7 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/css_m9t3SZ2dKv6HQuOuf0zINIRA5GjP4lkCCtmRRbSjaXs.css
14.7 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/heninger_nadia_200x230.jpg
14.3 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/js_1_m_mRX0UrchQnV5E0UZ6141Ts6jK5YnRLQe7J2kaX4.js
14.3 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/js_1_m_mRX0UrchQnV5E0UZ6141Ts6jK5YnRLQe7J2kaX4.js
14.3 kB
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/elazari-bar-on-amit_200x230.jpg
14.2 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/woot13_banner_mini.png
14.2 kB
USENIX Security 2010/USENIX Security 2010 Poster Session.htm
14.1 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/beyond_security_002.png
14.1 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/beyond_security_002.png
14.1 kB
USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/js_AQDKCRqaqaAAAzbvxcaEQBooKEQA-dFTfff7tzCklI8.js
14.0 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/js_AQDKCRqaqaAAAzbvxcaEQBooKEQA-dFTfff7tzCklI8.js
14.0 kB
USENIX Security 2018/USENIX Security 2018 Program at a Glance USENIX_files/js_AQDKCRqaqaAAAzbvxcaEQBooKEQA-dFTfff7tzCklI8.js
14.0 kB
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/js_AQDKCRqaqaAAAzbvxcaEQBooKEQA-dFTfff7tzCklI8.js
14.0 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/js_AQDKCRqaqaAAAzbvxcaEQBooKEQA-dFTfff7tzCklI8.js
14.0 kB
USENIX Security 2019/USENIX Security 2019 Program at a Glance USENIX_files/js_AQDKCRqaqaAAAzbvxcaEQBooKEQA-dFTfff7tzCklI8.js
14.0 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/js_AQDKCRqaqaAAAzbvxcaEQBooKEQA-dFTfff7tzCklI8.js
14.0 kB
CSET 2020/APTGen An Approach towards Generating Practical Dataset Labelled with Targeted.eng.srt
14.0 kB
USENIX Security 2008/USENIX Security 2008 Presentations/Lest We Remember - Cold Boot Attacks on Encryption Keys_files/toshiba_lenovo.png
14.0 kB
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/monica_lam_200x230.jpg
13.9 kB
USENIX Security 2021/SEAL Storage-efficient Causality Analysis on Enterprise Logs.eng.srt
13.9 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/healthtech13_banner_mini.png
13.9 kB
USENIX Security 2021/Incrementally Updateable Honey Password Vaults.eng.srt
13.8 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/traynor_patrick_200x230.jpg
13.8 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/leet13_banner_mini.png
13.7 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/crc_press_150x60_002.png
13.7 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/crc_press_150x60_002.png
13.7 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/crc_press_150x60_002.png
13.7 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/crc_press_150x60_002.png
13.7 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/crc_press_150x60_002.png
13.7 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/crc_press_150x60_002.png
13.7 kB
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/evt-deter_button.jpg
13.6 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/nsf_600x240_1.png
13.4 kB
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/linuxProMagazine_webLogo.jpg
13.3 kB
USENIX Security 2018/27th USENIX Security Symposium Grid_files/loading-3x.gif
13.3 kB
USENIX Security 2019/28th USENIX Security Symposium Grid_files/loading-3x.gif
13.3 kB
USENIX Security 2008/USENIX Security 2008 Presentations/Lest We Remember - Cold Boot Attacks on Encryption Keys_files/ramjet_5100.png
13.2 kB
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/susan_landau_200x230.jpg
13.2 kB
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/viel-search.png
13.1 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/postmessageRelay_data/rpcshindig_random.js
13.0 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/postmessageRelay_data/rpcshindig_random.js
13.0 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/postmessageRelay_data/rpcshindig_random.js
13.0 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/postmessageRelay_data/rpcshindig_random.js
13.0 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/postmessageRelay_data/rpcshindig_random.js
13.0 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/postmessageRelay_data/rpcshindig_random.js
13.0 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/postmessageRelay_data/rpcshindig_random.js
13.0 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/postmessageRelay_data/rpcshindig_random.js
13.0 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/postmessageRelay_data/rpcshindig_random.js
13.0 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/postmessageRelay_data/rpcshindig_random.js
13.0 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/kaust_600x240.png
13.0 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/foci13_banner_mini.png
12.7 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/google_logo_300x110.png
12.5 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/google_logo_300x110.png
12.5 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/ieee_cybersecurity_150x73.png
12.5 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/ieee_cybersecurity_150x73.png
12.5 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/fsm_150x86_2.png
12.4 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/fsm_150x86_2.png
12.4 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/hotsec13_banner_mini.png
12.3 kB
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/ross-anderson_200x230.jpg
12.3 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/css_JfUmRW-Hr0U8TZVXkaC2BcGIYyK5guphAqwPzo1s5JM.css
11.9 kB
USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/halderman_alex_200x230.jpg
11.8 kB
USENIX Security 2016/USENIX Security 2016 Videos/Ariadne A Minimal Approach to State Continuity.eng.srt
11.8 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/capkun_srdjan_200x230.jpg
11.8 kB
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/wenyuanxu_200x230.jpg
11.8 kB
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/donna_dodson_200x230.jpg
11.8 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/cset13_banner_mini.png
11.7 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/evtwote13_banner_mini_0.png
11.7 kB
USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/rubin_avi_200x230.jpg
11.6 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/symantec_logo_1.png
11.5 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/symantec_logo_1.png
11.5 kB
USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/sec17_wordmark_stacked.svg
11.5 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/sec17_wordmark_stacked.svg
11.5 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/sec17_wordmark_stacked_002.svg
11.5 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/roesner_franziska_200.jpg
11.4 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/admin_125x47_0_002.png
11.4 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/admin_125x47_0_002.png
11.4 kB
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/paul_kocher_200x230.jpg
11.4 kB
USENIX Security 2008/USENIX Security 2008 Presentations/USENIX Security 2008 Poster Session.htm
11.2 kB
USENIX Security 2019/USENIX Security 2019 Video/USENIX Security '19.m3u
11.1 kB
USENIX Security 2007/Presentations/Security 2007 Poster Session.htm
10.9 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/felten_ed_sec13.jpg
10.9 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/symantec_150x60.png
10.6 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/symantec_150x60_002.png
10.6 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/symantec_150x60.png
10.6 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/symantec_150x60.png
10.6 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/linux_journal_150x72_0_002.png
10.3 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/linux_journal_150x72_0_002.png
10.3 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/linux_journal_150x72_2_002.png
10.3 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/linux_journal_150x72_2_002.png
10.3 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/linux_journal_150x72_2_002.png
10.3 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/linux_journal_150x72_2_002.png
10.3 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/ieee_cybersecurity_150x73_002.png
10.2 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/ieee_cybersecurity_150x73_002.png
10.2 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/hpcwire_150x55_0_002.png
10.1 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/hpcwire_150x55_0_002.png
10.1 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/hpcwire_150x55_0_002.png
10.1 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/hpcwire_150x55_0_002.png
10.1 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/hpcwire_150x55_0_002.png
10.1 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/hpcwire_150x55_0_002.png
10.1 kB
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/fw-search.png
10.1 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/postmessageRelay_data/829555168-postmessagerelay.js
10.0 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/postmessageRelay_data/829555168-postmessagerelay.js
10.0 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/postmessageRelay_data/829555168-postmessagerelay.js
10.0 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/postmessageRelay_data/829555168-postmessagerelay.js
10.0 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/postmessageRelay_data/829555168-postmessagerelay.js
10.0 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/postmessageRelay_data/829555168-postmessagerelay.js
10.0 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/postmessageRelay_data/829555168-postmessagerelay.js
10.0 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/postmessageRelay_data/829555168-postmessagerelay.js
10.0 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/postmessageRelay_data/829555168-postmessagerelay.js
10.0 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/postmessageRelay_data/829555168-postmessagerelay.js
10.0 kB
USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/js_qq8Htu2Ei-eV_IteNYMM8zM4yBe6NOtuXBD56RXHvN4.js
9.9 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/danzig_richard_115x125.jpg
9.9 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/nsf_90x80_0.png
9.8 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/nsf_90x80_0_002.png
9.8 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/nsf_90x80_0.png
9.8 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/nsf_90x80_0_002.png
9.8 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/palo-alto-networks_600x240.png
9.8 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/fsm_150x44_0_002.png
9.7 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/fsm_150x44_0_002.png
9.7 kB
USENIX Security 2008/USENIX Security 2008 Presentations/Practical Symmetric Key Cryptography on Modern Graphics Hardware_files/img12.png
9.6 kB
USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/css_mTaWTa-gjA-dVa8tJl4KV4v7oKx8qHNzCSd2Zupzqn4.css
9.6 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/css_mTaWTa-gjA-dVa8tJl4KV4v7oKx8qHNzCSd2Zupzqn4.css
9.6 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/it_dev_150x39.png
9.5 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/it_dev_150x39.png
9.5 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/css_SKdvFJ9YoZ2Zlnl17QxUbae5QC-NQDrH8ynBbHJFAaM.css
9.2 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/css_SKdvFJ9YoZ2Zlnl17QxUbae5QC-NQDrH8ynBbHJFAaM.css
9.2 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/css_dY0FNz4qF00fqwtbSA930BrnJH15HL9efi8t-qF8ZFs.css
9.2 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/css_SKdvFJ9YoZ2Zlnl17QxUbae5QC-NQDrH8ynBbHJFAaM.css
9.2 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/css_SKdvFJ9YoZ2Zlnl17QxUbae5QC-NQDrH8ynBbHJFAaM.css
9.2 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/sec19_wordmark_stacked_456x186_002.png
9.2 kB
USENIX Security 2008/USENIX Security 2008 Presentations/Practical Symmetric Key Cryptography on Modern Graphics Hardware_files/img13.png
9.0 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/google_600x240_0.png
9.0 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/google_600x240_6.png
9.0 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/security_orb_tagline_150x47_002.png
9.0 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/security_orb_tagline_150x47.png
9.0 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/sec20_wordmark_stacked_white_002.png
9.0 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/facebook_150x50_0_002.png
8.9 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/facebook_150x50_0_002.png
8.9 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/facebook_150x50_3.png
8.9 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/facebook_150x50_3.png
8.9 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/sec18_wordmark_stacked_450x186.png
8.9 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/google_150x50_3_002.png
8.7 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/google_150x50_3.png
8.7 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/ieee_sp_150x36_0.png
8.7 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/ieee_sp_150x36_0.png
8.7 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/ieee_sp_150x36_4.png
8.6 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/ieee_sp_150x36_4.png
8.6 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/facebook_5_002.png
8.6 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/facebook_5_002.png
8.6 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/userfriendly_150x60_002.png
8.4 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/userfriendly_150x60_002.png
8.4 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/userfriendly_150x60_002.png
8.4 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/userfriendly_150x60.png
8.4 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/userfriendly_150x60_002.png
8.4 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/userfriendly_150x60_002.png
8.4 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/userfriendly_150x60_002.png
8.4 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/userfriendly_150x60_002.png
8.4 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/baidu_600x240.png
8.4 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/baidu_600x240_1.png
8.4 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/avast_600x240.png
8.3 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/js_PACmgStbFksqYzX-HlEqBZWNu18Gac4c9Dc2EzyjEsM.js
8.3 kB
USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/js_zsU7pE_En9PuEzx00IjN_iCxIwgABAiEwJNkh1iTG9k.js
8.2 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/js_zsU7pE_En9PuEzx00IjN_iCxIwgABAiEwJNkh1iTG9k.js
8.2 kB
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/js_zsU7pE_En9PuEzx00IjN_iCxIwgABAiEwJNkh1iTG9k.js
8.2 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/js_zsU7pE_En9PuEzx00IjN_iCxIwgABAiEwJNkh1iTG9k.js
8.2 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/js_zsU7pE_En9PuEzx00IjN_iCxIwgABAiEwJNkh1iTG9k.js
8.2 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/lxer_150x53_0_002.png
8.2 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/lxer_150x53_0_002.png
8.2 kB
USENIX Security 2008/USENIX Security 2008 Presentations/Practical Symmetric Key Cryptography on Modern Graphics Hardware_files/img8.png
8.1 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/dmtf_150x53_0.png
8.0 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/dmtf_150x53_0.png
8.0 kB
USENIX Security 2018/27th USENIX Security Symposium Grid_files/app-apple.svg
7.9 kB
USENIX Security 2019/28th USENIX Security Symposium Grid_files/app-apple.svg
7.9 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/google_8.png
7.8 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/google_8.png
7.8 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/google_6_002.png
7.8 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/google_6_002.png
7.8 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/oxford_university_press_150x55.png
7.8 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/oxford_university_press_150x55.png
7.8 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/metricon70_banner_colo.jpg
7.8 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/cryptography_research_150x46_002.png
7.8 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/cryptography_research_150x46.png
7.8 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/sec17_button_180.png
7.7 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/beyond_security.png
7.5 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/beyond_security.png
7.5 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/fsm_150x86_2_002.png
7.5 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/fsm_150x86_2_002.png
7.5 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/bit_150x60.png
7.3 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/bit_150x60.png
7.3 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/bit_150x60.png
7.3 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/national_science_foundation_002.gif
7.3 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/national_science_foundation_002.gif
7.3 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/nsf_150x60_v2_002.png
7.3 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/nsf_150x60_v2.png
7.3 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/nsf_150x60_v2_002.png
7.3 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/nsf_150x60_v2_002.png
7.3 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/nsf_150x60_v2_002.png
7.3 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/nsf_150x60_v2_002.png
7.3 kB
USENIX Security 2008/USENIX Security 2008 Presentations/Practical Symmetric Key Cryptography on Modern Graphics Hardware_files/img9.png
7.1 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/usc_isi_black_600x240.png
7.1 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/acmqueue_600x240_1.png
7.0 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/acmqueue_600x240_1.png
7.0 kB
USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera1x.png
7.0 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/eff_horizontal_150x66_1.png
7.0 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/eff_horizontal_150x66_1.png
7.0 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/healthsec12_banner_colo.jpg
7.0 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/admin_150x60_002.png
7.0 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/admin_150x60_002.png
7.0 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/admin_150x60_002.png
7.0 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/admin_150x60_002.png
7.0 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/admin_150x60_002.png
7.0 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/admin_150x60_002.png
7.0 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/admin_150x60_002.png
7.0 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/admin_150x60.png
7.0 kB
USENIX Security 2008/USENIX Security 2008 Presentations/Practical Symmetric Key Cryptography on Modern Graphics Hardware_files/img14.png
7.0 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/oxford_university_press_150x55_002.png
6.9 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/oxford_university_press_150x55_002.png
6.9 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/hotsec09_button_170x74.jpg
6.8 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/hakin9_en150x40_002.png
6.8 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/hakin9_en150x40_002.png
6.8 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/userfriendly_150x38_0_002.png
6.7 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/userfriendly_150x38_0_002.png
6.7 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/facebook_150x50_0.png
6.7 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/facebook_150x50_0.png
6.7 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/facebook_150x50_3_002.png
6.7 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/facebook_150x50_3_002.png
6.7 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/lxer_150x60.png
6.6 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/lxer_150x60_002.png
6.6 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/lxer_150x60.png
6.6 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/lxer_150x60.png
6.6 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/lxer_150x60.png
6.6 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/lxer_150x60.png
6.6 kB
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/fsm.jpg
6.6 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/linux_journal_150x72_0.png
6.6 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/linux_journal_150x72_0.png
6.6 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/linux_journal_150x72_2.png
6.6 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/linux_journal_150x72_2.png
6.6 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/linux_journal_150x72_2.png
6.6 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/linux_journal_150x72_2.png
6.6 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/sec16_media.png
6.6 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/evtwote09_button_170x73.jpg
6.5 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/cisco_300x120.png
6.5 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/hackett_bankwell_125x81.jpg
6.5 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/hotsec12_banner_colo.jpg
6.4 kB
USENIX Security 2018/27th USENIX Security Symposium Grid_files/responsive.css
6.4 kB
USENIX Security 2019/28th USENIX Security Symposium Grid_files/responsive.css
6.4 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/woot09_button_170x72.jpg
6.4 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/cset12_banner_colo.jpg
6.4 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/kaspersky_600x240_1.png
6.3 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/cset09_button_170x73.jpg
6.3 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/lapsley-phil_100x115.jpg
6.3 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/bytedance_600x240_3.png
6.2 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/netflix_300x120_0.png
6.2 kB
USENIX Security 2010/USENIX Security 2010 Proceedings Errata.epub
6.2 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/dcj_150x27_0_002.png
6.2 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/dcj_150x27_0_002.png
6.2 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/arbor_networks_150x42_002.png
6.1 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/arbor_networks_150x42_002.png
6.1 kB
USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera8x.png
6.1 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/dcj_150x27_3_002.png
6.1 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/dcj_150x27_3_002.png
6.1 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/cisco_600x240.png
6.1 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/cisco_600x240.png
6.1 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/ibm_research_150x60_002.png
6.0 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/ibm_research_150x60_002.png
6.0 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/ibm_research_150x60_002.png
6.0 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/ibm_research_150x60_002.png
6.0 kB
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/google.jpg
6.0 kB
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/google.jpg
6.0 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/stack_exchange_150x37_0.png
6.0 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/stack_exchange_150x37_0.png
6.0 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/marcus_richard.jpg
5.9 kB
USENIX Security 2008/USENIX Security 2008 Presentations/Practical Symmetric Key Cryptography on Modern Graphics Hardware_files/img10.png
5.9 kB
USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera.css
5.8 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/cryptography_research_150x46.png
5.8 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/cryptography_research_150x46_002.png
5.8 kB
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img177.png
5.8 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/metricon09_button_170x74.jpg
5.7 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/infosecnews_150x120_0_002.png
5.6 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/infosecnews_150x120_0_002.png
5.6 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/salesforce_600x240.png
5.6 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/foci12_banner_colo.jpg
5.6 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/ibm_research_stacked_300x120_0.png
5.6 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css
5.6 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css
5.6 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css
5.6 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css
5.6 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css
5.6 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css
5.6 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css
5.6 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css
5.6 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css
5.6 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css
5.6 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/google_logo_300x110_002.png
5.6 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/google_logo_300x110_002.png
5.6 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/woot12_banner_colo.jpg
5.5 kB
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/evt_cset_button.jpg
5.5 kB
USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css
5.4 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css
5.4 kB
USENIX Security 2018/USENIX Security 2018 Program at a Glance USENIX_files/css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css
5.4 kB
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css
5.4 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css
5.4 kB
USENIX Security 2019/USENIX Security 2019 Program at a Glance USENIX_files/css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css
5.4 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css
5.4 kB
USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css
5.4 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css
5.4 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/evtwote12_banner_colo.jpg
5.4 kB
USENIX Security 2008/USENIX Security 2008 Presentations/Practical Symmetric Key Cryptography on Modern Graphics Hardware_files/img11.png
5.4 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/visa_research_300x120.png
5.4 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/symantec_150x60_002.png
5.4 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/symantec_150x60.png
5.4 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/symantec_150x60_002.png
5.4 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/symantec_150x60_002.png
5.4 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/linux_pro_150x57_0_002.png
5.3 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/linux_pro_150x57_0_002.png
5.3 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/virus_bulletin_150x60.png
5.2 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/virus_bulletin_150x60.png
5.2 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/virus_bulletin_150x60.png
5.2 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/virus_bulletin_150x60.png
5.2 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/virus_bulletin_150x60.png
5.2 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/virus_bulletin_150x60.png
5.2 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/virus_bulletin_150x60.png
5.2 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/virus_bulletin_150x60.png
5.2 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/infosecnews_150x120_0.png
5.2 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/infosecnews_150x120_0.png
5.2 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/symantec_logo_1_002.png
5.1 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/symantec_logo_1_002.png
5.1 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/dfrws_button.jpg
5.1 kB
USENIX Security 2008/USENIX Security 2008 Technical Sessions_files/bowen_debra.jpg
5.0 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/linux_pro_150x60_002.png
5.0 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/linux_pro_150x60_002.png
5.0 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/linux_pro_150x60_002.png
5.0 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/linux_pro_150x60_002.png
5.0 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/linux_pro_150x60_002.png
5.0 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/linux_pro_150x60_002.png
5.0 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/linux_pro_150x60_002.png
5.0 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/linux_pro_150x60_002.png
5.0 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/infosecnews_150x38_002.png
4.9 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/infosecnews_150x38_002.png
4.9 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/infosecnews_150x38_002.png
4.9 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/infosecnews_150x38_002.png
4.9 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/infosecnews_150x38_002.png
4.9 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/infosecnews_150x38_002.png
4.9 kB
USENIX Security 2008/USENIX Security 2008 Presentations/Practical Symmetric Key Cryptography on Modern Graphics Hardware_files/img15.png
4.9 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/microsoft_research_0.png
4.9 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/microsoft_research_0.png
4.9 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/google_600x240_13.png
4.8 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/facebook_600x240_6.png
4.8 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/facebook_5.png
4.8 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/facebook_5.png
4.8 kB
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/symantec.jpg
4.8 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/nsf_150x60_v2.png
4.8 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/nsf_150x60_v2_002.png
4.8 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/nsf_150x60_v2.png
4.8 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/nsf_150x60_v2.png
4.8 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/nsf_150x60_v2.png
4.8 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/nsf_150x60_v2.png
4.8 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/facebook_2016_300x120_1.png
4.8 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/facebook_2016_300x120_1.png
4.8 kB
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/sec07.css
4.8 kB
USENIX Security 2007/Presentations/Security 2007 Poster Session_files/sec07.css
4.8 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/akamai_150x62.png
4.7 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/akamai_150x62.png
4.7 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/nsp_logo_black.png
4.7 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/nsp_logo_black_002.png
4.7 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/nsp_logo_black.png
4.7 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/nsp_logo_black_002.png
4.7 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/acmqueue_600x240_1.png
4.7 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/acmqueue_600x240_1.png
4.7 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/acmqueue_600x240_1.png
4.7 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/acmqueue_600x240_1.png
4.7 kB
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/techxworld_logo.jpg
4.7 kB
USENIX Security 2019/USENIX Security 2019 Program at a Glance USENIX_files/sec19_wordmark_stacked_456x186.png
4.7 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/sec19_wordmark_stacked_456x186.png
4.7 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/lxer_150x53_0.png
4.6 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/lxer_150x53_0.png
4.6 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/intel_600x240.png
4.6 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/neustar_150x60.png
4.5 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/neustar_150x60_002.png
4.5 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/ieee_sp_150x36_4_002.png
4.5 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/ieee_sp_150x36_4_002.png
4.5 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/ieee_sp_150x36_0_002.png
4.5 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/ieee_sp_150x36_0_002.png
4.5 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/microsoft_150x60_0.png
4.5 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/microsoft_150x60_0.png
4.5 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/acmqueue_150x48_0_002.png
4.5 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/acmqueue_150x48_0_002.png
4.5 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/acmqueue_150x48_3.png
4.5 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/acmqueue_150x48_3.png
4.5 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/acmqueue_150x48_3.png
4.5 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/acmqueue_150x48_3.png
4.5 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/acmqueue_150x48_3_002.png
4.5 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/acmqueue_150x48_3_002.png
4.5 kB
USENIX Security 2018/27th USENIX Security Symposium Grid_files/app-google.svg
4.5 kB
USENIX Security 2019/28th USENIX Security Symposium Grid_files/app-google.svg
4.5 kB
USENIX logo.jpg
4.4 kB
USENIX Security 2010/USENIX Security 2010 Proceedings Errata.mobi
4.4 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/dmtf_150x53_0_002.png
4.4 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/dmtf_150x53_0_002.png
4.4 kB
USENIX Security 2018/USENIX Security 2018 Program at a Glance USENIX_files/css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css
4.3 kB
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css
4.3 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css
4.3 kB
USENIX Security 2019/USENIX Security 2019 Program at a Glance USENIX_files/css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css
4.3 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css
4.3 kB
USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css
4.3 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css
4.3 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/baidu_600x240_0.png
4.3 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/security_orb_tagline_150x47.png
4.3 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/security_orb_tagline_150x47_002.png
4.3 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/computer_150x33_0.png
4.2 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/computer_150x33_0.png
4.2 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/eff_horizontal_150x66_1_002.png
4.2 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/eff_horizontal_150x66_1_002.png
4.2 kB
USENIX Security 2011/USENIX Security 2011 Proceedings Errata.mobi
4.2 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/national_science_foundation.gif
4.2 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/national_science_foundation.gif
4.2 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/microsoft-logo_600x240.png
4.2 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/microsoft-logo_600x240_0.png
4.2 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/admin_150x60.png
4.2 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/admin_150x60.png
4.2 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/admin_150x60.png
4.2 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/admin_150x60.png
4.2 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/admin_150x60.png
4.2 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/admin_150x60.png
4.2 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/admin_150x60.png
4.2 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/admin_150x60_002.png
4.2 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/fsm_150x44_0.png
4.1 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/fsm_150x44_0.png
4.1 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/ibm_research_150x60.png
4.1 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/ibm_research_150x60.png
4.1 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/ibm_research_150x60.png
4.1 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/ibm_research_150x60.png
4.1 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/dmtf_600x240.png
4.1 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/dmtf_600x240.png
4.1 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/dmtf_600x240_002.png
4.1 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/dmtf_600x240_002.png
4.1 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/dmtf_600x240_002.png
4.1 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/dmtf_600x240_002.png
4.1 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/dmtf_600x240.png
4.1 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/dmtf_600x240.png
4.1 kB
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/AW_PH_stacked.jpg
4.0 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/arbor_networks_150x42.png
4.0 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/arbor_networks_150x42.png
4.0 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/google_150x50_3.png
4.0 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/google_150x50_3_002.png
4.0 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/crc_press_150x60.png
3.9 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/crc_press_150x60.png
3.9 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/crc_press_150x60.png
3.9 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/crc_press_150x60.png
3.9 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/crc_press_150x60.png
3.9 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/crc_press_150x60.png
3.9 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/nostarch_600x240_1.png
3.9 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/nostarch_600x240_1.png
3.9 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/nostarch_600x240_1.png
3.9 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/nostarch_600x240_1.png
3.9 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/nostarch_600x240_1.png
3.9 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/nostarch_600x240_1.png
3.9 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/nostarch_600x240_1.png
3.9 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/nostarch_600x240_1.png
3.9 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/cmu_cert_150x73.png
3.9 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/cmu_cert_150x73_002.png
3.9 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/google_2016_150x60_0_002.png
3.9 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/google_2016_150x60_0.png
3.9 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/cowan_crispin.jpg
3.9 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/facebook_600x240_17.png
3.9 kB
USENIX Security 2011/USENIX Security 2011 Proceedings Eratta.epub
3.8 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/chandra_pravir.jpg
3.8 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/yubico_300x120_1.png
3.8 kB
USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/sec20_wordmark_stacked_white.png
3.8 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/sec20_wordmark_stacked_white.png
3.8 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/oreilly_150x28_0_002.png
3.8 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/oreilly_150x28_0_002.png
3.8 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/oreilly_150x28_3_002.png
3.8 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/oreilly_150x28_3_002.png
3.8 kB
USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css
3.8 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css
3.8 kB
USENIX Security 2018/USENIX Security 2018 Program at a Glance USENIX_files/css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css
3.8 kB
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css
3.8 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css
3.8 kB
USENIX Security 2019/USENIX Security 2019 Program at a Glance USENIX_files/css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css
3.8 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css
3.8 kB
USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css
3.8 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css
3.8 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/qc_600x240_1.png
3.8 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/hpcwire_150x55_0.png
3.8 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/hpcwire_150x55_0.png
3.8 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/hpcwire_150x55_0.png
3.8 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/hpcwire_150x55_0.png
3.8 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/hpcwire_150x55_0.png
3.8 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/hpcwire_150x55_0.png
3.8 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/microsoft_150x60_0_002.png
3.8 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/microsoft_150x60_0_002.png
3.8 kB
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/linux_gazette.gif
3.8 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/linux_gazette_125x125.gif
3.8 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/hns_125_50.jpg
3.8 kB
USENIX Security 2018/USENIX Security 2018 Program at a Glance USENIX_files/sec18_wordmark_stacked_450x186.png
3.7 kB
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/sec18_wordmark_stacked_450x186.png
3.7 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/sec18_wordmark_stacked_450x186_002.png
3.7 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/neustar_150x60_002.png
3.7 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/neustar_150x60.png
3.7 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/nostarch_90x104.jpg
3.7 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/lxer_150x60_002.png
3.7 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/lxer_150x60.png
3.7 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/lxer_150x60_002.png
3.7 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/lxer_150x60_002.png
3.7 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/lxer_150x60_002.png
3.7 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/lxer_150x60_002.png
3.7 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/kaspersky_600x240.png
3.7 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/admin_125x47_0.png
3.7 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/admin_125x47_0.png
3.7 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/oreilly_150x60_002.png
3.6 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/oreilly_150x60_002.png
3.6 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/linux_journal_100x48.jpg
3.5 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/linux_pro_150x57_0.png
3.5 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/linux_pro_150x57_0.png
3.5 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/userfriendly_150x38_0.png
3.5 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/userfriendly_150x38_0.png
3.5 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/hakin9_en150x40.png
3.5 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/hakin9_en150x40.png
3.5 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/google_140x58.gif
3.5 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/ibm-research.png
3.5 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/ibm-research.png
3.5 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/intel_600x240.png
3.4 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/freebsd_foundation_600x240.png
3.4 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/freebsd_foundation_600x240.png
3.4 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/freebsdfoundation_600x240_0.png
3.4 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/freebsdfoundation_600x240_0.png
3.4 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/serverfault_150x35_0_002.png
3.4 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/serverfault_150x35_0_002.png
3.4 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/stack_exchange_150x37_0_002.png
3.3 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/stack_exchange_150x37_0_002.png
3.3 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/ibm_research_150x60_0_002.png
3.3 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/ibm_research_150x60_0_002.png
3.3 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/google_2016_150x60_0.png
3.3 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/google_2016_150x60_0_002.png
3.3 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/dropbox_2018_600x240_0.png
3.3 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/dropbox_2018_600x240_2.png
3.3 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/dropbox_2018_600x240_1_1.png
3.3 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/craigslist_150x35_1.png
3.3 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/craigslist_150x35_1.png
3.3 kB
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/ittoolbox.gif
3.3 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/computer_150x33_0_002.png
3.2 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/computer_150x33_0_002.png
3.2 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/all.js
3.2 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/all.js
3.2 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/all.js
3.2 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/all.js
3.2 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/all.js
3.2 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/all.js
3.2 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/all.js
3.2 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/all.js
3.2 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/all.js
3.2 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/all.js
3.2 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/dmtf_600x240.png
3.2 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/dmtf_600x240.png
3.2 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/dmtf_600x240.png
3.2 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/dcj_150x27_0.png
3.2 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/dcj_150x27_0.png
3.2 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/dcj_150x27_3.png
3.2 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/dcj_150x27_3.png
3.2 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/microsoft_research_150x42_2.png
3.2 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/microsoft_research_150x42_2.png
3.2 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/microsoft_research_150x42_2.png
3.2 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/microsoft_research_150x42_2.png
3.2 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/google_8_002.png
3.2 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/google_8_002.png
3.2 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/google_6.png
3.2 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/google_6.png
3.2 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/acmqueue_150x48_0.png
3.1 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/acmqueue_150x48_0.png
3.1 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/acmqueue_150x48_3_002.png
3.1 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/acmqueue_150x48_3_002.png
3.1 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/acmqueue_150x48_3_002.png
3.1 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/acmqueue_150x48_3_002.png
3.1 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/acmqueue_150x48_3.png
3.1 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/acmqueue_150x48_3.png
3.1 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/infosecnews_150x38.png
3.1 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/infosecnews_150x38.png
3.1 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/infosecnews_150x38.png
3.1 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/infosecnews_150x38.png
3.1 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/infosecnews_150x38.png
3.1 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/infosecnews_150x38.png
3.1 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/it_dev_150x39_002.png
3.1 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/it_dev_150x39_002.png
3.1 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/baidu_150x60.png
3.0 kB
USENIX Security 2008/USENIX Security 2008 Presentations/Practical Symmetric Key Cryptography on Modern Graphics Hardware_files/img7.png
3.0 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/microsoft_600x240_0_002.png
3.0 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/microsoft_600x240_0_002.png
3.0 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/userfriendly_150x60.png
3.0 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/userfriendly_150x60.png
3.0 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/userfriendly_150x60.png
3.0 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/userfriendly_150x60_002.png
3.0 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/userfriendly_150x60.png
3.0 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/userfriendly_150x60.png
3.0 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/userfriendly_150x60.png
3.0 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/userfriendly_150x60.png
3.0 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/toolbox_100x76.gif
3.0 kB
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/infosecnews.gif
3.0 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/virus_bulletin_150x60_002.png
3.0 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/virus_bulletin_150x60_002.png
3.0 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/virus_bulletin_150x60_002.png
3.0 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/virus_bulletin_150x60_002.png
3.0 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/virus_bulletin_150x60_002.png
3.0 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/virus_bulletin_150x60_002.png
3.0 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/virus_bulletin_150x60_002.png
3.0 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/virus_bulletin_150x60_002.png
3.0 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/qualcomm_150x22_002.png
2.9 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/qualcomm_150x22.png
2.9 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/qualcomm_150x22_002.png
2.9 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/qualcomm_150x22_002.png
2.9 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/linux_pro_150x60.png
2.9 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/linux_pro_150x60.png
2.9 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/linux_pro_150x60.png
2.9 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/linux_pro_150x60.png
2.9 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/linux_pro_150x60.png
2.9 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/linux_pro_150x60.png
2.9 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/linux_pro_150x60.png
2.9 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/linux_pro_150x60.png
2.9 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/facebook_2016_150x60_1.png
2.9 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/facebook_2016_150x60_1.png
2.9 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/cmu_cert_150x73_002.png
2.9 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/cmu_cert_150x73.png
2.9 kB
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/dr_dobbs.gif
2.9 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/ibm_research_150x60_0.png
2.8 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/ibm_research_150x60_0.png
2.8 kB
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/storage_networking.gif
2.8 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/bit_150x60_002.png
2.8 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/bit_150x60_002.png
2.8 kB
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/betanews.gif
2.8 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/akamai_150x62_002.png
2.8 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/akamai_150x62_002.png
2.8 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/microsoft_research_150x42_2_002.png
2.8 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/microsoft_research_150x42_2_002.png
2.8 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/microsoft_research_150x42_2_002.png
2.8 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/microsoft_research_150x42_2_002.png
2.8 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/mars_horizontal_300x120.png
2.8 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/cisco_150x60_002.png
2.7 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/cisco_150x60_002.png
2.7 kB
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/userfriendly.gif
2.6 kB
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/user_friendly.gif
2.6 kB
USENIX Security 2018/27th USENIX Security Symposium Grid_files/jquery_002.js
2.6 kB
USENIX Security 2019/28th USENIX Security Symposium Grid_files/jquery_003.js
2.6 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/nostarch_600x240_1.png
2.6 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/nostarch_600x240_1.png
2.6 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/nostarch_600x240_1.png
2.6 kB
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/hpc.gif
2.6 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/ibm_research_600x240.png
2.6 kB
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img155.png
2.5 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/microsoft_600x240_0.png
2.5 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/microsoft_600x240_0.png
2.5 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/dmtf_600x240_002.png
2.5 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/dmtf_600x240_002.png
2.5 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/dmtf_600x240.png
2.5 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/dmtf_600x240.png
2.5 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/dmtf_600x240.png
2.5 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/dmtf_600x240.png
2.5 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/dmtf_600x240_002.png
2.5 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/dmtf_600x240_002.png
2.5 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/acmqueue_600x240_1_002.png
2.5 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/acmqueue_600x240_1_002.png
2.5 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/oreilly_150x60.png
2.5 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/oreilly_150x60.png
2.5 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/oreilly_150x28_0.png
2.4 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/oreilly_150x28_0.png
2.4 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/oreilly_150x28_3.png
2.4 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/oreilly_150x28_3.png
2.4 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/facebook_2016_150x60_1_002.png
2.4 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/facebook_2016_150x60_1_002.png
2.4 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/serverfault_150x35_0.png
2.4 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/serverfault_150x35_0.png
2.4 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/microsoft_research_0_002.png
2.4 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/microsoft_research_0_002.png
2.4 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/confguru_125x34.jpg
2.3 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/ibm_600x240_2.png
2.3 kB
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/microsoft.gif
2.3 kB
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/microsoft_research.gif
2.3 kB
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img169.png
2.3 kB
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/bae_systems.gif
2.2 kB
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/bae_systems.gif
2.2 kB
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/ieee_security.gif
2.2 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/craigslist_150x35_1_002.png
2.1 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/craigslist_150x35_1_002.png
2.1 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/meraki_logo_145x58.jpg
2.1 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/cisco_150x60.png
2.1 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/cisco_150x60.png
2.1 kB
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/ieee_security.gif
2.1 kB
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img173.png
2.1 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/fsm_125x36.gif
2.0 kB
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img171.png
2.0 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/betanews_125x23.jpg
2.0 kB
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/storagenetworking.gif
1.9 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/acmqueue_new_100x32.jpg
1.9 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/ibm-research_002.png
1.9 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/ibm-research_002.png
1.9 kB
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/grid_today.gif
1.9 kB
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/barracuda.gif
1.9 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/qualcomm_150x22.png
1.9 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/qualcomm_150x22_002.png
1.9 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/qualcomm_150x22.png
1.9 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/qualcomm_150x22.png
1.9 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/in-icon.jpeg
1.9 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/in-icon.jpeg
1.9 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/in-icon.jpeg
1.9 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/in-icon.jpeg
1.9 kB
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/the_register.gif
1.8 kB
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/ists_logo.gif
1.8 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/fastbutton.htm
1.8 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/fastbutton.htm
1.8 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/fastbutton.htm
1.8 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/fastbutton.htm
1.8 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/fastbutton.htm
1.8 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/fastbutton.htm
1.8 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/fastbutton.htm
1.8 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/fastbutton.htm
1.8 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/fastbutton.htm
1.8 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/fastbutton.htm
1.8 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/twitter-icon.jpeg
1.7 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/twitter-icon.jpeg
1.7 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/twitter-icon.jpeg
1.7 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/twitter-icon.jpeg
1.7 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/ibm_research_145x15.jpg
1.7 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/fastbutton_002.htm
1.7 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/fastbutton_002.htm
1.7 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/fastbutton_002.htm
1.7 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/fastbutton_002.htm
1.7 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/fastbutton_002.htm
1.7 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/fastbutton_002.htm
1.7 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/fastbutton_002.htm
1.7 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/fastbutton_002.htm
1.7 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/fastbutton_002.htm
1.7 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/fastbutton_002.htm
1.7 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/ieee_sp_125x30.gif
1.7 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/youtube-icon.jpg
1.7 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/youtube-icon.jpg
1.7 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/youtube-icon.jpg
1.7 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/youtube-icon.jpg
1.7 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/infosecnews_100x80.gif
1.7 kB
USENIX Security 2011/USENIX Security 2011 Poster Session_files/left_bottom.gif
1.7 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/facebook-icon.jpeg
1.7 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/facebook-icon.jpeg
1.7 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/facebook-icon.jpeg
1.7 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/facebook-icon.jpeg
1.7 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/googleplus-icon.jpg
1.7 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/googleplus-icon.jpg
1.7 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/googleplus-icon.jpg
1.7 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/googleplus-icon.jpg
1.7 kB
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/linux_journal.gif
1.7 kB
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/linux_journal.gif
1.6 kB
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img165.png
1.6 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/eff_2018_red_600x240_1.png
1.6 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/eff_2018_red_600x240_1.png
1.6 kB
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img162.png
1.6 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/nostarch_600x240_1_002.png
1.6 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/nostarch_600x240_1_002.png
1.6 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/nostarch_600x240_1_002.png
1.6 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/nostarch_600x240_1_002.png
1.6 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/nostarch_600x240_1_002.png
1.6 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/nostarch_600x240_1_002.png
1.6 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/nostarch_600x240_1_002.png
1.6 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/nostarch_600x240_1_002.png
1.6 kB
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/DDJ.gif
1.6 kB
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/nostarch.gif
1.6 kB
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/nostarch.gif
1.6 kB
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/netwitness.gif
1.5 kB
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/hdj.gif
1.5 kB
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/fsm.gif
1.5 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css
1.5 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css
1.5 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css
1.5 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css
1.5 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css
1.5 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css
1.5 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css
1.5 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css
1.5 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css
1.5 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css
1.5 kB
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/queue.gif
1.5 kB
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/queue.gif
1.5 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js
1.4 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js
1.4 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js
1.4 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js
1.4 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js
1.4 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js
1.4 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js
1.4 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js
1.4 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js
1.4 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js
1.4 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/aw_ph.gif
1.4 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/microsoft_research_150.gif
1.4 kB
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/ibm_research.gif
1.4 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/video_16.png
1.4 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/video_16.png
1.4 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/video_16.png
1.4 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/video_16.png
1.4 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/video_16.png
1.4 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/dmtf_logo_100.gif
1.4 kB
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img151.png
1.4 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/network_world_itr_125x27.gif
1.4 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/usenix-locked.png
1.4 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/usenix-locked.png
1.4 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/usenix-locked.png
1.4 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/usenix-locked.png
1.4 kB
USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/usenix-locked.png
1.4 kB
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/usenix-locked.png
1.4 kB
USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/usenix-locked.png
1.4 kB
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/ittoolbox.gif
1.3 kB
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/snia_logo.gif
1.3 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/slides_16.png
1.3 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/slides_16.png
1.3 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/slides_16.png
1.3 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/slides_16.png
1.3 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/slides_16.png
1.3 kB
USENIX Security 2008/USENIX Security 2008 Technical Sessions_files/video_icon.gif
1.3 kB
USENIX Security 2009/USENIX Security 2009 Technical Sessions_files/video_icon.gif
1.3 kB
USENIX Security 2010/USENIX Security 2010 Technical Sessions_files/video_icon.gif
1.3 kB
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img166.png
1.2 kB
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img145.png
1.2 kB
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/AW_PH_stacked.gif
1.2 kB
USENIX Security 2011/USENIX Security 2011 Poster Session_files/longbar.gif
1.2 kB
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/lxer.gif
1.2 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/linuxpro_100x38.gif
1.2 kB
USENIX Security 2008/USENIX Security 2008 Presentations/Practical Symmetric Key Cryptography on Modern Graphics Hardware_files/img4.png
1.2 kB
USENIX Security 2011/USENIX Security 2011 Poster Session_files/left_bar.gif
1.2 kB
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img129.png
1.2 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/userfriendly_125x26.gif
1.2 kB
USENIX Security 2008/USENIX Security 2008 Presentations/Practical Symmetric Key Cryptography on Modern Graphics Hardware_files/img3.png
1.1 kB
USENIX Security 2008/USENIX Security 2008 Presentations/Practical Symmetric Key Cryptography on Modern Graphics Hardware_files/img5.png
1.0 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/peerj_600x240.png
1.0 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/peerj_600x240.png
1.0 kB
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/bkgs.css
1.0 kB
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/linuxpro.gif
1.0 kB
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img127.png
1.0 kB
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img27.png
992 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img58.png
987 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img144.png
961 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img49.png
951 Bytes
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/lxer_80x28.gif
947 Bytes
USENIX Security 2013/Technical Sessions 2013 USENIX_files/js_RGgtt0xyoog3aEbqA3PACaZnzIbopLWdKtKDjg0Ge54.js
937 Bytes
USENIX Security thank you.txt
929 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img128.png
903 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/Practical Symmetric Key Cryptography on Modern Graphics Hardware_files/usenix_layout_html.css
891 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img163.png
885 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img158.png
871 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img103.png
870 Bytes
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/ciscopress.gif
863 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img119.png
849 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img146.png
846 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img142.png
845 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img70.png
824 Bytes
USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/video.svg
818 Bytes
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/video.svg
818 Bytes
USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/video.svg
818 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img100.png
816 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img99.png
808 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img139.png
785 Bytes
USENIX Security 2008/USENIX Security 2008 Technical Sessions_files/mp3_icon.gif
777 Bytes
USENIX Security 2009/USENIX Security 2009 Technical Sessions_files/mp3_icon.gif
777 Bytes
USENIX Security 2010/USENIX Security 2010 Technical Sessions_files/mp3_icon.gif
777 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img57.png
773 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img174.png
770 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img40.png
770 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img47.png
755 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img56.png
749 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/Practical Symmetric Key Cryptography on Modern Graphics Hardware_files/img6.png
745 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img179.png
741 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img92.png
737 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img68.png
733 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img63.png
723 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img126.png
719 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img42.png
708 Bytes
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/left_bottom.gif
705 Bytes
USENIX Security 2007/Presentations/Security 2007 Poster Session_files/left_bottom.gif
705 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img181.png
684 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img98.png
683 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img178.png
677 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img105.png
672 Bytes
USENIX Security 2012/Technical Sessions 2012 USENIX_files/postmessageRelay.htm
659 Bytes
USENIX Security 2012/USENIX Security 2012 USENIX_files/postmessageRelay.htm
659 Bytes
USENIX Security 2013/Technical Sessions 2013 USENIX_files/postmessageRelay.htm
659 Bytes
USENIX Security 2013/USENIX Security 2013 USENIX_files/postmessageRelay.htm
659 Bytes
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/postmessageRelay.htm
659 Bytes
USENIX Security 2014/USENIX Security 2014 USENIX_files/postmessageRelay.htm
659 Bytes
USENIX Security 2015/Technical Sessions 2015 USENIX_files/postmessageRelay.htm
659 Bytes
USENIX Security 2015/USENIX Security 2015 USENIX_files/postmessageRelay.htm
659 Bytes
USENIX Security 2016/Technical Sessions 2016 USENIX_files/postmessageRelay.htm
659 Bytes
USENIX Security 2016/USENIX Security 2016 USENIX_files/postmessageRelay.htm
659 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img160.png
657 Bytes
USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/slides.svg
655 Bytes
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/slides.svg
655 Bytes
USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/slides.svg
655 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img11.png
646 Bytes
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/linux.gif
639 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img83.png
639 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img111.png
638 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img149.png
632 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera0x.png
628 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera3x.png
628 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img72.png
624 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img122.png
612 Bytes
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/audio.svg
610 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img159.png
605 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img6.png
604 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img81.png
597 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img41.png
594 Bytes
USENIX Security 2012/Technical Sessions 2012 USENIX_files/ibm-research_gs.png
588 Bytes
USENIX Security 2012/USENIX Security 2012 USENIX_files/ibm-research_gs.png
588 Bytes
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/ciscopress.gif
578 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img180.png
569 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img120.png
565 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img66.png
556 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img73.png
547 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera2x.png
545 Bytes
USENIX Security 2015/USENIX Security 2015 USENIX_files/ie.css
543 Bytes
USENIX Security 2016/USENIX Security 2016 USENIX_files/ie.css
543 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img102.png
542 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img156.png
540 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img82.png
533 Bytes
USENIX Security 2010/USENIX Security 2010 Poster Session_files/left_bottom.gif
533 Bytes
USENIX Security 2010/USENIX Security 2010 Technical Sessions_files/left_bottom.gif
533 Bytes
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/left_bottom.gif
531 Bytes
USENIX Security 2009/USENIX Security 2009 Technical Sessions_files/left_bottom.gif
531 Bytes
USENIX Security 2009/USENIX Security 2009 WiPs_files/left_bottom.gif
531 Bytes
USENIX Security 2012/Technical Sessions 2012 USENIX_files/audio_16.png
531 Bytes
USENIX Security 2013/Technical Sessions 2013 USENIX_files/audio_16.png
531 Bytes
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/audio_16.png
531 Bytes
USENIX Security 2015/Technical Sessions 2015 USENIX_files/audio_16.png
531 Bytes
USENIX Security 2016/Technical Sessions 2016 USENIX_files/audio_16.png
531 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img134.png
518 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img23.png
518 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img36.png
517 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img37.png
512 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img121.png
505 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img104.png
501 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img106.png
495 Bytes
USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/pdf.svg
493 Bytes
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/pdf.svg
493 Bytes
USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/pdf.svg
493 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img69.png
487 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img101.png
481 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img24.png
480 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera7x.png
464 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img38.png
460 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img175.png
458 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img22.png
457 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img43.png
448 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img123.png
444 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img60.png
432 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img5.png
430 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img7.png
425 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img168.png
424 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img108.png
423 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img109.png
419 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img124.png
418 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img172.png
415 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img14.png
414 Bytes
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/left_bottom.gif
407 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/USENIX Security 2008 Poster Session_files/left_bottom.gif
407 Bytes
USENIX Security 2008/USENIX Security 2008 Technical Sessions_files/left_bottom.gif
407 Bytes
USENIX Security 2008/USENIX Security 2008 WiPs_files/left_bottom.gif
407 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img170.png
400 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img84.png
398 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img93.png
398 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img90.png
395 Bytes
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/usenix_face.gif
374 Bytes
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/usenix_face.gif
374 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img50.png
373 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img35.png
371 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img21.png
368 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img176.png
367 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img88.png
365 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img79.png
356 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img55.png
354 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img110.png
352 Bytes
USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/js_fyV0VVkC6Q3xduxGurKMTFIU2dMmArUrbAdZORL-9WQ.js
350 Bytes
USENIX Security 2020/USENIX Security '20 USENIX_files/js_fyV0VVkC6Q3xduxGurKMTFIU2dMmArUrbAdZORL-9WQ.js
350 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img133.png
348 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img96.png
348 Bytes
USENIX Security 2012/Technical Sessions 2012 USENIX_files/conference-schedule-pdf.png
346 Bytes
USENIX Security 2012/Technical Sessions 2012 USENIX_files/pdf_16.png
346 Bytes
USENIX Security 2013/Technical Sessions 2013 USENIX_files/conference-schedule-pdf.png
346 Bytes
USENIX Security 2013/Technical Sessions 2013 USENIX_files/pdf_16.png
346 Bytes
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/application-pdf.png
346 Bytes
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/pdf_16.png
346 Bytes
USENIX Security 2015/Technical Sessions 2015 USENIX_files/application-pdf.png
346 Bytes
USENIX Security 2015/Technical Sessions 2015 USENIX_files/conference-schedule-pdf.png
346 Bytes
USENIX Security 2015/Technical Sessions 2015 USENIX_files/pdf_16.png
346 Bytes
USENIX Security 2016/Technical Sessions 2016 USENIX_files/application-pdf.png
346 Bytes
USENIX Security 2016/Technical Sessions 2016 USENIX_files/conference-schedule-pdf.png
346 Bytes
USENIX Security 2016/Technical Sessions 2016 USENIX_files/pdf_16.png
346 Bytes
USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/application-pdf.png
346 Bytes
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/application-pdf.png
346 Bytes
USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/application-pdf.png
346 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img28.png
345 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img54.png
345 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img97.png
345 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img112.png
335 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img161.png
322 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img182.png
320 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img153.png
311 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img148.png
306 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img113.png
305 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img115.png
305 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img137.png
305 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img154.png
304 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img143.png
302 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img95.png
302 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img147.png
297 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img34.png
297 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img53.png
297 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img140.png
294 Bytes
USENIX Security 2018/27th USENIX Security Symposium Grid_files/custom-screen.css
293 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img135.png
292 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img141.png
289 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img80.png
288 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img131.png
287 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img117.png
285 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img20.png
285 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img33.png
282 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img52.png
282 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img4.png
280 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img86.png
280 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img89.png
280 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img25.png
277 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img3.png
277 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img2.png
276 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img18.png
275 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img75.png
272 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img87.png
272 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img116.png
265 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img62.png
265 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img1.png
264 Bytes
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/footer.gif
263 Bytes
USENIX Security 2007/Presentations/Security 2007 Poster Session_files/footer.gif
263 Bytes
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/footer.gif
263 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/USENIX Security 2008 Poster Session_files/footer.gif
263 Bytes
USENIX Security 2008/USENIX Security 2008 Technical Sessions_files/footer.gif
263 Bytes
USENIX Security 2008/USENIX Security 2008 WiPs_files/footer.gif
263 Bytes
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/footer.gif
263 Bytes
USENIX Security 2009/USENIX Security 2009 Technical Sessions_files/footer.gif
263 Bytes
USENIX Security 2009/USENIX Security 2009 WiPs_files/footer.gif
263 Bytes
USENIX Security 2010/USENIX Security 2010 Poster Session_files/footer.gif
263 Bytes
USENIX Security 2010/USENIX Security 2010 Technical Sessions_files/footer.gif
263 Bytes
USENIX Security 2011/USENIX Security 2011 Poster Session_files/footer.gif
263 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img32.png
261 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img71.png
261 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img64.png
260 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img65.png
260 Bytes
USENIX Security 2013/Technical Sessions 2013 USENIX_files/package-x-generic.png
260 Bytes
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/package-x-generic.png
260 Bytes
USENIX Security 2015/Technical Sessions 2015 USENIX_files/package-x-generic.png
260 Bytes
USENIX Security 2016/Technical Sessions 2016 USENIX_files/package-x-generic.png
260 Bytes
USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/package-x-generic.png
260 Bytes
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/package-x-generic.png
260 Bytes
USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/package-x-generic.png
260 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img107.png
257 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img29.png
257 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img85.png
257 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img167.png
254 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img91.png
254 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img138.png
253 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img67.png
245 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img12.png
242 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img13.png
242 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img31.png
240 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img17.png
236 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img136.png
235 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img51.png
235 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img132.png
231 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img157.png
231 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img16.png
230 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img9.png
230 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img78.png
229 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/Practical Symmetric Key Cryptography on Modern Graphics Hardware_files/img1.png
228 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img152.png
228 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img26.png
228 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img74.png
226 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img150.png
225 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img48.png
224 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img77.png
221 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img15.png
220 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img8.png
220 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img45.png
219 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img164.png
215 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img44.png
212 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img39.png
211 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img61.png
208 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img114.png
206 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img19.png
206 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img30.png
206 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img76.png
201 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img118.png
195 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img130.png
189 Bytes
USENIX Security 2012/Technical Sessions 2012 USENIX_files/application-octet-stream.png
189 Bytes
USENIX Security 2013/Technical Sessions 2013 USENIX_files/application-octet-stream.png
189 Bytes
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/application-octet-stream.png
189 Bytes
USENIX Security 2015/Technical Sessions 2015 USENIX_files/application-octet-stream.png
189 Bytes
USENIX Security 2016/Technical Sessions 2016 USENIX_files/application-octet-stream.png
189 Bytes
USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/application-octet-stream.png
189 Bytes
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/application-octet-stream.png
189 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img46.png
182 Bytes
USENIX Security 2012/Technical Sessions 2012 USENIX_files/css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css
141 Bytes
USENIX Security 2012/USENIX Security 2012 USENIX_files/css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css
141 Bytes
USENIX Security 2013/Technical Sessions 2013 USENIX_files/css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css
141 Bytes
USENIX Security 2013/USENIX Security 2013 USENIX_files/css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css
141 Bytes
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css
141 Bytes
USENIX Security 2014/USENIX Security 2014 USENIX_files/css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css
141 Bytes
USENIX Security 2015/Technical Sessions 2015 USENIX_files/css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css
141 Bytes
USENIX Security 2015/USENIX Security 2015 USENIX_files/css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css
141 Bytes
USENIX Security 2016/Technical Sessions 2016 USENIX_files/css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css
141 Bytes
USENIX Security 2016/USENIX Security 2016 USENIX_files/css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css
141 Bytes
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/back_border.gif
140 Bytes
USENIX Security 2007/Presentations/Security 2007 Poster Session_files/back_border.gif
140 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/Practical Symmetric Key Cryptography on Modern Graphics Hardware_files/img2.png
138 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img125.png
128 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/The Practical Subtleties of Biometric Key Generation_files/img10.png
124 Bytes
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/long_bar.gif
113 Bytes
USENIX Security 2007/Presentations/Security 2007 Poster Session_files/long_bar.gif
113 Bytes
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/questmark.gif
108 Bytes
USENIX Security 2007/Presentations/Security 2007 Poster Session_files/questmark.gif
108 Bytes
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/questmark.gif
108 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/USENIX Security 2008 Poster Session_files/questmark.gif
108 Bytes
USENIX Security 2008/USENIX Security 2008 Technical Sessions_files/questmark.gif
108 Bytes
USENIX Security 2008/USENIX Security 2008 WiPs_files/questmark.gif
108 Bytes
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/questmark.gif
108 Bytes
USENIX Security 2009/USENIX Security 2009 Technical Sessions_files/questmark.gif
108 Bytes
USENIX Security 2009/USENIX Security 2009 WiPs_files/questmark.gif
108 Bytes
USENIX Security 2010/USENIX Security 2010 Poster Session_files/questmark.gif
108 Bytes
USENIX Security 2010/USENIX Security 2010 Technical Sessions_files/questmark.gif
108 Bytes
USENIX Security 2011/USENIX Security 2011 Poster Session_files/questmark.gif
108 Bytes
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/longbar.gif
106 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/USENIX Security 2008 Poster Session_files/longbar.gif
106 Bytes
USENIX Security 2008/USENIX Security 2008 Technical Sessions_files/longbar.gif
106 Bytes
USENIX Security 2008/USENIX Security 2008 WiPs_files/longbar.gif
106 Bytes
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/longbar.gif
106 Bytes
USENIX Security 2009/USENIX Security 2009 Technical Sessions_files/longbar.gif
106 Bytes
USENIX Security 2009/USENIX Security 2009 WiPs_files/longbar.gif
106 Bytes
USENIX Security 2010/USENIX Security 2010 Poster Session_files/longbar.gif
106 Bytes
USENIX Security 2010/USENIX Security 2010 Technical Sessions_files/longbar.gif
106 Bytes
USENIX Security 2015/USENIX Security 2015 USENIX_files/sec15_media.htm
70 Bytes
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/left_bar.gif
56 Bytes
USENIX Security 2007/Presentations/Security 2007 Poster Session_files/left_bar.gif
56 Bytes
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/left_bar.gif
56 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/USENIX Security 2008 Poster Session_files/left_bar.gif
56 Bytes
USENIX Security 2008/USENIX Security 2008 Technical Sessions_files/left_bar.gif
56 Bytes
USENIX Security 2008/USENIX Security 2008 WiPs_files/left_bar.gif
56 Bytes
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/left_bar.gif
56 Bytes
USENIX Security 2009/USENIX Security 2009 Technical Sessions_files/left_bar.gif
56 Bytes
USENIX Security 2009/USENIX Security 2009 WiPs_files/left_bar.gif
56 Bytes
USENIX Security 2010/USENIX Security 2010 Poster Session_files/left_bar.gif
56 Bytes
USENIX Security 2010/USENIX Security 2010 Technical Sessions_files/left_bar.gif
56 Bytes
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/dot_clear.gif
43 Bytes
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/dot_clear_002.gif
43 Bytes
USENIX Security 2007/Presentations/Security 2007 Poster Session_files/dot_clear.gif
43 Bytes
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/dot_clear.gif
43 Bytes
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/dot_clear_002.gif
43 Bytes
USENIX Security 2008/USENIX Security 2008 Presentations/USENIX Security 2008 Poster Session_files/dot_clear.gif
43 Bytes
USENIX Security 2008/USENIX Security 2008 Technical Sessions_files/dot_clear.gif
43 Bytes
USENIX Security 2008/USENIX Security 2008 WiPs_files/dot_clear.gif
43 Bytes
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/dot_clear.gif
43 Bytes
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/dot_clear_002.gif
43 Bytes
USENIX Security 2009/USENIX Security 2009 Technical Sessions_files/dot_clear.gif
43 Bytes
USENIX Security 2009/USENIX Security 2009 WiPs_files/dot_clear.gif
43 Bytes
USENIX Security 2010/USENIX Security 2010 Poster Session_files/dot_clear.gif
43 Bytes
USENIX Security 2010/USENIX Security 2010 Poster Session_files/dot_clear_002.gif
43 Bytes
USENIX Security 2010/USENIX Security 2010 Technical Sessions_files/dot_clear.gif
43 Bytes
USENIX Security 2010/USENIX Security 2010 Technical Sessions_files/dot_clear_002.gif
43 Bytes
USENIX Security 2011/USENIX Security 2011 Poster Session_files/dot_clear.gif
43 Bytes
USENIX Security 2011/USENIX Security 2011 Poster Session_files/dot_clear_002.gif
43 Bytes
随机展示
相关说明
本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!
>