2022-12-19 | CrossTalk Speculative Data Leaks Across Cores Are Real | 13:47 | 1 | |
|
2022-12-19 | Bomberman Defining and Defeating Hardware Ticking Timebombs at Design time | 14:54 | 2 | |
|
2022-12-19 | Ebb and Flow Protocols A Resolution of the Availability Finality Dilemma | 15:30 | 1 | |
|
2022-12-19 | CRYLOGGER Detecting Crypto Misuses Dynamically | 15:01 | 1 | Vlog |
|
2022-12-19 | Ed25519 Signature Schemes Theory and Practice | 14:23 | 23 | |
|
2022-12-16 | Security of GPS INS based On road Location Tracking Systems | 19:09 | 2 | |
|
2022-12-16 | The 9 Lives of Bleichenbachers CAT New Cache ATtacks on TLS Implementations | 17:23 | 2 | |
|
2022-12-16 | Self Encrypting Deception Weaknesses in the Encryption of Solid State Drives | 20:01 | 10 | |
|
2022-12-16 | The Code That Never Ran Modeling Attacks on Speculative Evaluation | 17:25 | 0 | |
|
2022-12-16 | SensorID Sensor Calibration Fingerprinting for Smartphones | 19:26 | 3 | |
|
2022-12-16 | Theory and Practice of Finding Eviction Sets | 20:09 | 1 | |
|
2022-12-16 | Short Text, Large Effect Measuring the Impact of User Reviews on Android App Security & Privacy | 17:24 | 0 | Review |
|
2022-12-16 | Threshold ECDSA from ECDSA Assumptions The Multiparty Case | 16:36 | 4 | |
|
2022-12-16 | Should I Worry A Cross Cultural Examination of Account Security Incident Response | 20:35 | 2 | |
|
2022-12-16 | Simple High Level Code for Cryptographic Arithmetic With Proofs, Without Compromises | 17:33 | 0 | |
|
2022-12-16 | Touching the Untouchables Dynamic Security Analysis of the LTE Control Plane | 21:22 | 0 | |
|
2022-12-16 | SoK General Purpose Frameworks for Secure Multi Party Computation | 18:50 | 1 | |
|
2022-12-16 | Towards Automated Safety Vetting of PLC Code in Real World Plants Mu Zhang | 23:05 | 1 | |
|
2022-12-16 | Towards Practical Differentialy Private Convex Optimization | 21:59 | 2 | |
|
2022-12-16 | SoK Sanitizing for Security Dokyung Song | 19:15 | 1 | |
|
2022-12-16 | True2F Backdoor resistant authentication tokens Emma Dauterman | 19:18 | 1 | |
|
2022-12-16 | SoK Security Evaluation of Home Based IoT Deployment | 17:41 | 1 | |
|
2022-12-16 | Understanding the Security of ARM Debugging Features | 17:19 | 0 | |
|
2022-12-16 | SoK Shining Light on Shadow Stacks | 19:01 | 2 | |
|
2022-12-16 | Using Safety Properties to Generate Vulnerability Patches | 20:25 | 1 | |
|
2022-12-16 | SoK The Challenges Pitfalls and Perils of Using Hardware Performance Counters for Security | 18:24 | 1 | |
|
2022-12-16 | Why Does Your Data Leak Uncovering the Data Leakage in Cloud from Mobile Apps | 18:54 | 3 | |
|
2022-12-16 | Spectre Attacks Exploiting Speculative Execution | 21:11 | 1 | |
|
2022-12-16 | XCLAIM Trustless Interoperable Cryptocurrency Backed Assets | 17:27 | 2 | |
|
2022-12-16 | Stealthy Porn Understanding Real World Adversarial Images for I'llicit Online Promotion | 19:05 | 2 | |
|
2022-12-16 | Synesthesia Detecting Screen Content via Remote Acoustic Side Channels | 21:24 | 1 | |
|
2022-12-16 | Tap 'n Ghost A Compilation of Novel Attack Techniques against Smartphone Touchscreens | 20:13 | 2 | |
|
2022-12-16 | A Comparative Usability Study of FIDO2 Passwordless Authentication | 16:57 | 13 | |
|
2022-12-16 | A Programming Framework for Differential Privacy with Accuracy Concentration Bounds | 17:19 | 0 | |
|
2022-12-16 | Birds of a Feather A Hardware & Security Panel Deprecated | 40:30 | 0 | |
|
2022-12-16 | A Security Analysis of the Facebook Ad Library | 17:14 | 1 | |
|
2022-12-16 | A Stealthier Partitioning Attack against Bitcoin Peer to Peer Network | 16:25 | 1 | |
|
2022-12-16 | Birds of a Feather A Hardware & Security Panel Updated | 27:30 | 0 | Vlog |
|
2022-12-16 | Ex vivo Dynamic Analysis Framework for Android Device Drivers | 16:24 | 3 | |
|
2022-12-16 | A Tale of Sea and Sky On the Security of Maritime VSAT Communications | 17:08 | 6 | |
|
2022-12-16 | ICLab A Global, Longitudinal Internet Censorship Measurement Platform | 16:47 | 1 | |
|
2022-12-16 | Flaw Label Exploiting IPv6 Flow Label | 15:10 | 9 | |
|
2022-12-16 | AdGraph A Graph Based Approach to Ad and Tracker Blocking | 16:16 | 3 | |
|
2022-12-16 | IJON Exploring Deep State Spaces via Fuzzing | 16:35 | 1 | |
|
2022-12-16 | FlyClient Super Light Clients for Cryptocurrencies | 17:06 | 2 | |
|
2022-12-16 | Influencing Photo Sharing Decisions on Social Media A Case of Paradoxical Findings | 17:06 | 0 | |
|
2022-12-16 | An Analysis of Pre installed Android Software | 16:07 | 3 | |
|
2022-12-16 | Birds of a Feather Sharing Cybersecurity Research Artifacts To Accelerate Progress | 37:01 | 1 | |
|
2022-12-16 | Formal Modelling and Proof in the CHERI Design and Implementation Process | 15:27 | 0 | |
|
2022-12-16 | Are Anonymity Seekers Just like Everybody Else An Analysis of Contributions to Wikipedia from Tor | 16:59 | 0 | |
|
2022-12-16 | Intriguing Properties of Adversarial ML Attacks in the Problem Space | 16:02 | 1 | |
|
2022-12-16 | Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability | 17:10 | 6 | |
|
2022-12-16 | Are We Susceptible to Rowhammer An End to End Methodology for Cloud Providers | 16:58 | 1 | Vlog |
|
2022-12-16 | Breaking and Partially Fixing Provably Secure Onion Routing | 16:38 | 2 | |
|
2022-12-16 | Full band De anonymization of Bluetooth Classic Devices | 16:46 | 0 | |
|
2022-12-16 | JIT Leaks Inducing Timing Side Channels through Just In Time Compilation | 16:44 | 1 | |
|
2022-12-16 | Fuzzing JavaScript Engines with Aspect Preserving Mutation | 16:56 | 2 | |
|
2022-12-16 | Ask the Experts What Should Be on an IoT Privacy and Security Label | 16:03 | 0 | |
|
2022-12-16 | Browsing Unicity On the Limits of Anonymizing Web Tracking Data | 16:53 | 0 | |
|
2022-12-16 | KARONTE Detecting Insecure Multi binary Interactions in Embedded Firmware | 16:13 | 0 | |
|
2022-12-16 | Gesture Authentication for Smartphones Evaluation of Gesture Password Selection Policies | 16:33 | 1 | |
|
2022-12-16 | Can Voters Detect Malicious Manipulation of Ballot Marking Devices | 12:08 | 2 | |
|
2022-12-16 | Automated Reverse Engineering and Privacy Analysis of Modern Cars | 16:59 | 3 | |
|
2022-12-16 | Kobold Evaluating Decentralized Access Control for Remote NSXPC Methods on iOS | 16:40 | 2 | |
|
2022-12-16 | High Precision Open World Website Fingerprinting | 16:56 | 3 | |
|
2022-12-16 | Combating Dependence Explosion in Forensic Analysis Using Alternative Tag Propagation Semantics | 16:55 | 0 | |
|
2022-12-16 | Automatic Uncovering of Hidden Behaviors from Input Validation in Mobile Apps | 16:13 | 0 | |
|
2022-12-16 | Krace Data Race Fuzzing for Kernel File Systems | 16:59 | 0 | |
|
2022-12-16 | Hijacking Transient Execution through Microarchitectural Load Value Injection | 17:00 | 2 | |
|
2022-12-16 | Automatically Detecting Bystanders in Photos to Reduce Privacy Risks | 15:45 | 3 | |
|
2022-12-16 | Cornucopia Temporal Safety for CHERI Heaps | 13:47 | 0 | |
|
2022-12-16 | HopSkipJumpAttack A Query Efficient Decision Based Attack | 17:00 | 4 | |
|
2022-12-16 | Leveraging EM Side Channel Information to Detect Rowhammer Attacks | 16:55 | 7 | Guide |
|
2022-12-16 | BIAS Bluetooth Impersonation AttackS | 11:47 | 4 | |
|
2022-12-16 | CrypTFlow Secure TensorFlow Inference | 16:59 | 0 | |
|
2022-12-16 | How Not to Prove Your Election Outcome | 17:01 | 1 | |
|
2022-12-16 | Binsec Rel Efficient Relational Symbolic Execution for Constant Time at Binary Level | 16:28 | 1 | |
|
2022-12-16 | MarkUs Drop in Use After Free Prevention for Low Level Languages | 13:10 | 3 | |
|
2022-12-16 | Detection of Electromagnetic Interference Attacks on Sensor Systems | 15:44 | 1 | |
|
2022-12-16 | Humpty Dumpty Controlling Word Meanings via Corpus Poisoning | 16:52 | 1 | |
|
2022-12-16 | Dragonblood Analyzing the Dragonfly Handshake of WPA3 and EAP pwd | 16:56 | 13 | |
|
2022-12-16 | Measuring Legal Compliance of Banners from IAB Europe's Transparancy and Consent Framework | 13:09 | 0 | |
|
2022-12-16 | HydRand Efficient Continuous Distributed Randomness | 17:01 | 0 | |
|
2022-12-16 | Efficient and Secure Multiparty Computation from Fixed Key Block Ciphers | 16:38 | 1 | |
|
2022-12-16 | Meddling Middlemen Empirical Analysis of the Risks of Data Saving Mobile Browsers | 16:59 | 5 | |
|
2022-12-16 | ICAS An Extensible Framework for Estimating the Susceptibility of IC Layouts to Additive Trojans | 17:10 | 0 | |
|
2022-12-16 | Message Time of Arrival Codes A Fundamental Primitive for Secure Distance Measurement | 17:28 | 3 | |
|
2022-12-16 | Enabling Rack scale Confidential Computing Using Heterogeneous Trusted Execution Environment | 17:01 | 6 | |
|
2022-12-16 | NetCAT Practical Cache Attacks from the Network | 17:00 | 1 | |
|
2022-12-16 | Establishing Economic Incentives for Security Patching of IoT Consumer Products | 15:20 | 1 | |
|
2022-12-16 | Neutain't Efficient Dynamic Tain't Analysis with Neural Networks | 17:08 | 1 | |
|
2022-12-16 | EverCrypt A Fast, Verified, Cross Platform Cryptographic Provider | 16:47 | 1 | |
|
2022-12-12 | Oblix An Efficient Oblivious Search Index | 17:54 | 12 | |
|
2022-12-12 | Sonar Detecting SS7 Redirection Attacks With Audio Based Distance Bounding | 20:31 | 3 | |
|
2022-12-12 | xJsnark A Framework for Efficient Verifiable Computation | 18:55 | 6 | |
|
2022-12-12 | OmniLedger A Secure, Scale Out, Decentralized Ledger via Sharding | 20:03 | 16 | |
|
2022-12-12 | Speechless Analyzing the Threat to Speech Privacy from Smartphone Motion Sensors | 20:59 | 6 | |
|
2022-12-12 | On Enforcing the Digital Immunity of a Large Humanitarian Organization | 23:04 | 0 | |
|
2022-12-12 | Static Evaluation of Noninterference using Approximate Model Counting | 17:08 | 1 | |
|
2022-12-12 | On the Economics of Offline Password Cracking | 21:55 | 1 | |
|