2022-12-12 | Stealing Hyperparameters in Machine Learning | 19:02 | 2 | |
|
2022-12-12 | Study and Mitigation of Origin Stripping Vulnerabilities in Hybrid postMessage Enabled Mobile Apps | 19:39 | 1 | |
|
2022-12-12 | Opening Remarks of the 39th IEEE Symposium on Security & Privacy | 18:25 | 0 | |
|
2022-12-12 | PIR with Compressed Queries and Amortized Query Processing | 19:07 | 39 | |
|
2022-12-12 | Surveylance Automatically Detecting Online Survey Scams | 19:51 | 1 | |
|
2022-12-12 | T Fuzz Fuzzing by Program Transformation Hui Peng | 20:03 | 1 | |
|
2022-12-12 | Precise and Scalable Detection of Double Fetch Bugs in OS Kernels | 22:05 | 1 | |
|
2022-12-12 | The Cards Aren't Alright Detecting Counterfeit Gift Cards Using Encoding Jitter | 22:09 | 1 | |
|
2022-12-12 | Privacy Risks with Facebook's PII based Targeting | 16:32 | 3 | |
|
2022-12-12 | The Rise of the Citizen Developer Assessing the Security Impact of Online App Generators | 20:08 | 0 | |
|
2022-12-12 | Protecting the Stack with Metadata Policies and Tagged Hardware | 20:26 | 0 | |
|
2022-12-12 | Racing in Hyperspace Closing Hyper Threading Side Channels on SGX | 17:48 | 1 | |
|
2022-12-12 | Towards Security and Privacy for Multi User Augmented Reality | 20:54 | 2 | |
|
2022-12-12 | Routing Around Congestion Defeating DDoS Attacks and Adverse Network Conditions via Reactive | 23:20 | 1 | |
|
2022-12-12 | Tracking Certificate Misissuance in the Wild | 17:32 | 0 | |
|
2022-12-12 | Tracking Ransomware End to end | 24:06 | 3 | |
|
2022-12-12 | Secure Device Bootstrapping without Secrets Resistant to Signal Manipulation Attacks | 17:13 | 3 | |
|
2022-12-12 | Understanding Linux Malware | 19:27 | 51 | |
|
2022-12-12 | SoK Keylogging Side Channels | 18:01 | 0 | Vlog |
|
2022-12-12 | SoK Plug & Pray Today Understanding USB Insecurity in Versions 1 through C | 17:56 | 0 | |
|
2022-12-12 | vRAM Faster Verifiable RAM With Program Independent Preprocessing | 20:14 | 0 | |
|
2022-12-12 | When Your Fitness Tracker Betrays You Quantifying the Predictability | 22:48 | 0 | |
|
2022-12-12 | An Extensive Formal Security Analysis of the OpenID Financial grade API Pedram Hosseyni | 17:22 | 2 | |
|
2022-12-12 | Does Certificate Transparency Break the Web Measuring Adoption and Error Rate | 20:47 | 4 | |
|
2022-12-12 | Asm2Vec Boosting Static Representation Robustness for Binary Clone Search | 18:52 | 1 | |
|
2022-12-12 | IEEE S&P 2019 Awards Ceremony | 7:33 | 0 | |
|
2022-12-12 | Dominance as a New Trusted Computing Primitive for the IoT | 20:58 | 1 | |
|
2022-12-12 | IEEE S&P 2019 Opening Remarks General Chair | 11:34 | 0 | |
|
2022-12-12 | Attack Directories, Not Caches Side Channel Attacks in a Non Inclusive World | 19:47 | 1 | |
|
2022-12-12 | On the Feasibility of Rerouting Based DDoS Defenses | 13:01 | 4 | |
|
2022-12-12 | IEEE S&P 2019 Opening Remarks Program Chair | 16:39 | 0 | |
|
2022-12-12 | On the Security of Two Round Multi Signatures | 16:25 | 1 | |
|
2022-12-12 | Beyond Credential Stuffing Password Similarity Models using Neural Networks | 16:48 | 0 | |
|
2022-12-12 | Drones' Cryptanalysis Detecting Privacy Invasion Attacks Conducted by Drone | 20:18 | 2 | |
|
2022-12-12 | IEEE S&P 2019 TC Business Meeting | 38:20 | 0 | |
|
2022-12-12 | Ouroboros Crypsinous Privacy Preserving Proof of Stake | 18:14 | 1 | |
|
2022-12-12 | Bitcoin vs Bitcoin Cash Coexistence or Downfall of Bitcoin Cash | 19:56 | 8 | |
|
2022-12-12 | EmPoWeb Empowering Web Applications with Browser Extensions | 19:48 | 2 | |
|
2022-12-12 | Blind Certificate Authorities | 10:18 | 1 | |
|
2022-12-12 | PERUN Virtual Payment Hubs over Cryptographic Currencies | 19:40 | 2 | |
|
2022-12-12 | PhishFarm A Scalable Framework for Measuring the Effectivness of Evasion Techniques Against | 22:02 | 0 | |
|
2022-12-12 | Exploiting Correcting Codes On the Effectiveness of ECC Memory Against Rowhammer Attacks | 20:08 | 5 | |
|
2022-12-12 | Breaking LTE on Layer Two | 19:23 | 2 | |
|
2022-12-12 | If HTTPS Were Secure I wouldn't Need 2FA End User and Administrator Mental Models of HTTPS | 20:14 | 0 | |
|
2022-12-12 | Port Contention for Fun and Profit | 9:45 | 1 | |
|
2022-12-12 | Exploiting Unintended Feature leakage in Collaborative Learning Congzheng Song | 16:49 | 2 | |
|
2022-12-12 | Iodine Fast Dynamic Tain't Tracking Using Rollback free Optimistic Hybrid Analysis | 19:54 | 1 | |
|
2022-12-12 | CaSym Cache Aware Symbolic Execution for Side Channel Detection and Mitigation | 16:47 | 2 | |
|
2022-12-12 | Postcards from the Post HTTP World Amplification of HTTPS Vulnerabilities in the Web Ecosystem | 20:15 | 1 | |
|
2022-12-12 | F BLEAU Fast Black box Leakage Estimation | 18:13 | 0 | |
|
2022-12-12 | Certified Robustness to Adversarial Examples with Differential Privacy | 19:38 | 6 | |
|
2022-12-12 | KHyperLogLog Estimating Reidentifiability and Joinability of Large Data at Scale Pern Hui Chia | 17:11 | 1 | Vlog |
|
2022-12-12 | PrivKV Key Value Data Collection with Local Differential Privacy | 17:46 | 4 | |
|
2022-12-12 | Fidelius Protecting User Secrets from Compromised Browsers | 18:48 | 3 | |
|
2022-12-12 | Characterizing Pixel Tracking through the Lens of Disposable Email Services | 18:36 | 2 | |
|
2022-12-12 | ProFuzzer On the fly Input Type Probing for Better Zero day Vulnerability Discovery | 18:44 | 4 | |
|
2022-12-12 | Kiss from a Rogue Evaluating Detectability of Pay at the Pump Card Skimmers | 12:06 | 4 | |
|
2022-12-12 | Formally Verified Cryptographic Web Applications in WebAssembly | 19:05 | 13 | |
|
2022-12-12 | Comprehensive Privacy Analysis of Deep Learning | 16:34 | 3 | |
|
2022-12-12 | Lay Down the Common Metrics Evaluating Proof of Work Consensus Protocols' Security | 18:28 | 0 | |
|
2022-12-12 | Proof Of Stake Sidechains | 19:46 | 1 | |
|
2022-12-12 | LBM A Security Framework for Peripherals within the Linux Kernel | 20:12 | 1 | |
|
2022-12-12 | Full speed Fuzzing Reducing Fuzzing Overhead through Coverage guided Tracing | 21:32 | 0 | Guide |
|
2022-12-12 | Dangerous Skills Understanding and Mitigating Security Risks of Voice Controlled Third Party | 18:32 | 0 | |
|
2022-12-12 | Fuzzing File Systems via Two Dimensional Input Space Exploration | 19:40 | 1 | |
|
2022-12-12 | Razzer Finding Kernel Race Bugs through Fuzzing | 20:06 | 3 | |
|
2022-12-12 | Learning to Reconstruct Statistical Learning Theory and Encrypted Database Attacks | 20:58 | 2 | |
|
2022-12-12 | Hard Drive of Hearing Disks that Eavesdrop with a Synthesized Microphone | 21:51 | 6 | |
|
2022-12-12 | Reasoning Analytically About Password Cracking Software Alex Liu | 20:27 | 6 | |
|
2022-12-12 | Data Recovery on Encrypted Databases with k Nearest Neighbor Query Leakage | 18:38 | 2 | |
|
2022-12-12 | Redactable Blockchain in the Permissionless Setting | 20:11 | 2 | |
|
2022-12-12 | Measuring and Analyzing Search Engine Poisoning of Linguistic Collisions | 18:12 | 0 | |
|
2022-12-12 | Demystifying Hidden Privacy Settings in Mobile Apps | 19:32 | 1 | |
|
2022-12-12 | Helen Maliciously Secure Coopetitive Learning for Linear Models | 18:01 | 0 | |
|
2022-12-12 | Differentially Private Model Publishing For Deep Learning | 23:13 | 1 | |
|
2022-12-12 | Resident Evil Understanding Residential IP Proxy as a Dark Service | 20:19 | 6 | |
|
2022-12-12 | Neural Cleanse Identifying and Mitigating Backdoor Attacks in Neural Networks | 5:00 | 11 | |
|
2022-12-12 | How Well Do My Results Generalize Comparing Security and Privacy Survey Results from | 19:05 | 0 | |
|
2022-12-12 | NEUZZ Efficient Fuzzing with Neural Program Smoothing | 21:54 | 2 | |
|
2022-12-12 | RIDL Rogue In Flight Data Load | 20:09 | 2 | |
|
2022-12-12 | New Primitives for Actively Secure MPC over Rings with Applications to Private Machine Learning | 22:06 | 4 | |
|
2022-12-12 | IEEE S&P 2019 40th Celebration Plenary Session Panel Reflections on four decades of the symposium | 1:03:27 | 3 | |
|
2022-12-12 | Mobile Application Web API Reconnaissance | 19:24 | 20 | |
|
2022-12-10 | A Framework for Universally Composable Diffie Hellman Key Exchange | 20:15 | 1 | |
|
2022-12-10 | Hijacking Bitcoin Routing Attacks on Cryptocurrencies | 21:14 | 8 | |
|
2022-12-10 | A Lustrum of Malware Network Communication Evolution and Insights | 18:59 | 3 | |
|
2022-12-10 | How They Did It An Analysis of Emission Defeat Devices in Modern Automobiles | 20:35 | 2 | |
|
2022-12-10 | An Experimental Security Analysis of an Industrial Robot Controller | 17:04 | 3 | |
|
2022-12-10 | HVLearn Automated Black box Analysis of Hostname Verification in SSL TLS Implementations | 20:32 | 2 | |
|
2022-12-10 | Augur Internet Wide Detection of Connectivity Disruptions | 19:24 | 1 | |
|
2022-12-10 | Identifying Personal DNA Methylation Profiles by Genotype Inference | 19:29 | 2 | |
|
2022-12-10 | Backward bounded DSE Targeting Infeasibility Questions on Obfuscated Codes | 22:28 | 0 | |
|
2022-12-10 | IKP Turning a PKI Around with Decentralized Automated Incentives | 21:16 | 0 | |
|
2022-12-10 | Catena Efficient Non equivocation via Bitcoin | 18:46 | 0 | |
|
2022-12-10 | Implementing and Proving the TLS 1 3 Record Layer | 20:45 | 2 | |
|
2022-12-10 | Cloak and Dagger From Two Permissions to Complete Control of the UI Feedback Loop | 22:46 | 0 | |
|
2022-12-10 | IoT Goes Nuclear Creating a Zigbee Chain Reaction | 19:04 | 6 | |
|
2022-12-10 | Comparing the Usability of Cryptographic APIs | 21:18 | 1 | |
|
2022-12-10 | Is Interaction Necessary for Distributed Private Learning | 20:46 | 1 | |
|
2022-12-10 | CoSMeDis A Distributed Social Media Platform with Formally Verified Confidentiality Guarantees | 19:15 | 0 | |
|