2022-12-28 | HTTPAUTH 20150326 1740 | 59:22 | 0 | |
|
2022-12-28 | ISIS 20150327 0900 | 1:26:21 | 1 | |
|
2022-12-28 | AQM 20150324 1730 | 35:38 | 3 | |
|
2022-12-28 | HTTPBIS 20150324 1300 | 1:49:12 | 0 | |
|
2022-12-28 | DANE 20150324 1730 | 1:03:40 | 0 | |
|
2022-12-28 | MPLS 20150327 1150 | 1:34:52 | 0 | |
|
2022-12-28 | JOSE 20150324 1730 | 1:03:02 | 0 | |
|
2022-12-28 | I2RS 20150327 0900 | 1:55:33 | 1 | |
|
2022-12-28 | DHC 20150326 1300 | 2:04:04 | 0 | |
|
2022-12-28 | KITTEN 20150327 1150 | 1:17:21 | 1 | |
|
2022-12-28 | NETCONF 20150324 1300 | 2:02:25 | 0 | |
|
2022-12-28 | DIME 20150325 0900 | 2:24:08 | 1 | |
|
2022-12-28 | NETMOD 20150323 0900 | 2:34:17 | 1 | |
|
2022-12-28 | IRTF Open Meeting | 2:05:48 | 7 | |
|
2022-12-19 | OAT Attesting Operation Integrity of Embedded Devices | 17:59 | 1 | |
|
2022-12-19 | OHIE Blockchain Scaling Made Simple | 16:47 | 7 | |
|
2022-12-19 | Pangolin Incremental Hybrid Fuzzing with Polyhedral Path Abstraction | 16:24 | 3 | |
|
2022-12-19 | Path Oblivious Heap Optimal and Practical Oblivious Priority Queue | 16:21 | 1 | |
|
2022-12-19 | Plundervolt Software Based Fault Injection Attacks against Intel SGX | 14:58 | 10 | |
|
2022-12-19 | PMP Cost Effective Forced Execution with Probabilistic Memory Pre planning | 16:57 | 3 | |
|
2022-12-19 | SoK A Minimalist Approach to Formalizing Analog Sensor Security | 17:01 | 1 | Vlog |
|
2022-12-19 | Private Resource Allocators and Their Applications | 17:18 | 1 | |
|
2022-12-19 | SoK Cyber Insurance Technical Challenges and a System Security Roadmap | 16:57 | 9 | |
|
2022-12-19 | The Value of Collaboration in Convex Machine Learning with Differential Privacy | 15:36 | 3 | |
|
2022-12-19 | Pseudorandom Black Swans Cache Attacks on CTR DRBG | 16:52 | 12 | |
|
2022-12-19 | ZEXE Enabling Decentralized Private Computation | 14:52 | 1 | |
|
2022-12-19 | This PIN Can Be Easily Guessed Analyzing the Security of Smartphone Unlock PINs | 14:36 | 2 | |
|
2022-12-19 | SoK Differential Privacy as a Causal Property | 16:06 | 5 | |
|
2022-12-19 | SoK Understanding the Prevailing Security Vulnerabilities in TrustZone Assisted TEE Systems | 16:52 | 2 | |
|
2022-12-19 | Throwing Darts in the Dark Detecting Bots with Limited Data using Neural Data Augmentation | 16:22 | 1 | |
|
2022-12-19 | RAMBleed Reading Bits in Memory without Accessing Them | 15:38 | 0 | |
|
2022-12-19 | SPECCFI Mitigating Spectre Attacks Using CFI Informed Speculation | 16:45 | 1 | |
|
2022-12-19 | Towards a Natural Perspective of Smart Homes for Practical Security and Safety Analyses | 16:44 | 1 | |
|
2022-12-19 | Replicated State Machines without Replicated Execution | 15:53 | 0 | |
|
2022-12-19 | SPECTECTOR Principled Detection of Speculative Information Flows | 16:57 | 0 | Guide |
|
2022-12-19 | Towards Effective Differential Privacy Comms for Users' Data Sharing Decision and Comprehension | 16:39 | 5 | |
|
2022-12-19 | RetroWrite Statically Instrumenting COTS Binaries for Fuzzing and Sanitization | 15:31 | 2 | |
|
2022-12-19 | SAVIOR Towards Bug Driven Hybrid Testing | 16:57 | 0 | |
|
2022-12-19 | SPIDER Enabling Fast Patch Propagation in Related Software Repositories | 16:56 | 0 | |
|
2022-12-19 | Towards Scalable Threshold Cryptosystems | 10:45 | 1 | |
|
2022-12-19 | SSP 2020 Opening Remarks | 1:22:43 | 1 | |
|
2022-12-19 | SEIMI Efficient and Secure SMAP Enabled Intra process Memory Isolation | 16:36 | 1 | |
|
2022-12-19 | Transparent Polynomial Delegation and Its Applications to Zero Knowledge Proof | 16:46 | 3 | |
|
2022-12-19 | Semantic Understanding of Smart Contracts Executable Operational Semantics of Solidity | 16:18 | 5 | |
|
2022-12-19 | Transys Leveraging Common Security Properties across Hardware Designs | 17:09 | 0 | |
|
2022-12-19 | SEVurity No Security Without Integrity Breaking Integrity | 17:03 | 0 | |
|
2022-12-19 | TRRespass Exploiting the Many Sides of Target Row Refresh | 17:01 | 1 | |
|
2022-12-19 | Understanding and Mitigating Security Risks of General Messaging Protocols on IoT Clouds | 16:01 | 0 | |
|
2022-12-19 | Unexpected Data Dependency Creation and Chaining A New Attack to SDN | 17:01 | 0 | |
|
2022-12-19 | VeriSmart A Highly Precise Safety Verifier for Ethereum Smart Contracts | 16:54 | 0 | |
|
2022-12-19 | VerX Safety Verification of Smart Contracts | 15:23 | 0 | |
|
2022-12-19 | Sync HotStuff Simple and Practical Synchronous State Machine Replication | 17:01 | 2 | |
|
2022-12-19 | WaveSpy Remote and Through wall Screen Attack via mmWave Sensing | 16:17 | 4 | |
|
2022-12-19 | Tactical Provenance Analysis our Endpoint Detection and Response Systems | 14:31 | 4 | |
|
2022-12-19 | xMP Selective Memory Protection for Kernel and User Space | 16:39 | 0 | |
|
2022-12-19 | TARDIS Rolling Back the Clock on CMS Targeting Cyber Attacks | 16:40 | 1 | |
|
2022-12-19 | TextExerciser Feedback Driven Text Input Exercising for Android Applications | 16:13 | 0 | |
|
2022-12-19 | The Last Mile High Assurance and High Speed Cryptographic Implementations | 17:07 | 1 | |
|
2022-12-19 | The Many Kinds of Creepware Used for Interpersonal Attacks | 16:20 | 9 | |
|
2022-12-19 | The State of the Uniform Attacks on Encrypted Databases beyond the Uniform Query Distribution | 16:43 | 2 | |
|
2022-12-19 | A Decentralized and Encrypted National Gun Registry | 14:50 | 2 | |
|
2022-12-19 | A First Look at Zoombombing | 13:30 | 6 | |
|
2022-12-19 | Bookworm Game Automatic Discovery of LTE Vulnerabilities Through Documentation Analysis | 16:47 | 1 | |
|
2022-12-19 | A Novel Dynamic Analysis Infrastructure to Instrument Untrusted Execution Flow Across User Kernel | 15:01 | 2 | |
|
2022-12-19 | CryptGPU Fast Privacy Preserving Machine Learning on the GPU | 14:54 | 3 | |
|
2022-12-19 | Breaking the Specification Certified PDF | 14:58 | 0 | |
|
2022-12-19 | A Secure and Formally Verified Linux KVM Hypervisor | 15:08 | 4 | |
|
2022-12-19 | BUFFing signature schemes beyond unforgeability and the case of post quantum signatures | 12:23 | 1 | |
|
2022-12-19 | Data Privacy in Trigger Action IoT Systems | 15:26 | 0 | |
|
2022-12-19 | A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer | 14:59 | 0 | |
|
2022-12-19 | CacheOut Leaking Data on Intel CPUs via Cache Evictions | 14:46 | 0 | |
|
2022-12-19 | Defensive Technology Use by Political Activists During the Sudanese Revolution | 15:21 | 1 | Vlog |
|
2022-12-19 | A2L Anonymous Atomic Locks for Scalability in Payment Channel Hubs | 14:10 | 4 | |
|
2022-12-19 | CanDID Bootstrapping Decentralized Identity from Legacy Providers | 14:52 | 2 | |
|
2022-12-19 | Detecting AI Trojans Using Meta Neural Analysis | 15:01 | 1 | |
|
2022-12-19 | Adversarial Watermarking Transformer Towards Tracing Text Provenance with Data Hiding | 16:13 | 1 | |
|
2022-12-19 | CANnon Reliable and Stealthy Remote Shutdown Attacks via Unaltered Automotive Microcontrollers | 15:06 | 5 | |
|
2022-12-19 | Detecting Filter List Evasion With Event Loop Turn Granularity JavaScript Signatures | 15:01 | 0 | |
|
2022-12-19 | Adversary Instantiation Lower bounds for differentially private machine learning | 15:00 | 2 | |
|
2022-12-19 | Co Inflow Coarse grained Information Flow Control for Java like Languages | 15:26 | 1 | Guide |
|
2022-12-19 | DIANE Identifying Fuzzing Triggers in Apps to Generate Under constrained Inputs for IoT Devices | 14:16 | 2 | |
|
2022-12-19 | An I O Separation Model for Formal Verification of Kernel Implementations | 15:15 | 1 | |
|
2022-12-19 | DICE Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis | 12:39 | 1 | |
|
2022-12-19 | Compact Certificates of Collective Knowledge | 14:53 | 3 | |
|
2022-12-19 | An Interactive Prover for Protocol Verification in the Computational Model | 13:44 | 0 | |
|
2022-12-19 | Did you mix me Formally Verifying Verifiable Mix Nets in Electronic Voting | 14:57 | 0 | |
|
2022-12-19 | Compositional Non Interference for Fine Grained Concurrent Programs | 14:32 | 0 | |
|
2022-12-19 | DIFUZZRTL Differential Fuzz Testing to Find CPU Bugs | 13:31 | 2 | |
|
2022-12-19 | Android Custom Permissions Demystified From Privilege Escalation to Design Shortcomings | 14:41 | 7 | |
|
2022-12-19 | Compositional Security for Reentrant Applications | 14:00 | 1 | |
|
2022-12-19 | Diogenes Lightweight Scalable RSA Modulus Generation with a Dishonest Majority | 15:34 | 1 | |
|
2022-12-19 | ARBITRAR User Guided API Misuse Detection | 15:00 | 0 | Guide |
|
2022-12-19 | CrawlPhish Large scale Analysis of Client side Cloaking Techniques in Phishing | 14:28 | 0 | |
|
2022-12-19 | Doing good by fighting fraud Ethical anti fraud systems for mobile payments | 14:56 | 5 | |
|
2022-12-19 | Cross Layer Attacks and How to Use Them for DNS Cache Poisoning, Device Tracking and More | 13:18 | 1 | Guide |
|
2022-12-19 | Bitcoin Compatible Virtual Channels | 14:58 | 0 | |
|
2022-12-19 | DP Sniper Black Box Discovery of Differential Privacy Violations using Classifiers | 14:44 | 1 | |
|
2022-12-19 | Cross Domain Access Control Encryption Arbitrary policy, Constant size, Efficient | 14:35 | 2 | |
|
2022-12-19 | Black Widow Blackbox Data driven Web Scanning | 13:14 | 7 | |
|
2022-12-19 | DynPTA Combining Static and Dynamic Analysis for Practical Selective Data Protection | 15:33 | 3 | |
|