2022-12-10 | IVD Automatic Learning and Enforcement of Authorization Rules in Online Social Networks YouTube | 17:35 | 0 | |
|
2022-12-10 | Counter RAPTOR Safeguarding Tor Against Active Routing Attacks | 18:20 | 3 | |
|
2022-12-10 | Leakage Abuse Attacks on Order Revealing Encryption | 19:50 | 1 | |
|
2022-12-10 | CRLite A Scalable System for Pushing All TLS Revocations to All Browsers | 16:40 | 3 | |
|
2022-12-10 | Machine Checked Proofs of Privacy for Electronic Voting Protocols | 16:13 | 0 | |
|
2022-12-10 | Cryptographic Function Detection in Obfuscated Binaries via Bit precise Symbolic Loop Mapping | 23:43 | 1 | |
|
2022-12-10 | Membership Inference Attacks against Machine Learning Models | 20:15 | 50 | |
|
2022-12-10 | Finding and Preventing Bugs in JavaScript Bindings | 18:08 | 4 | |
|
2022-12-10 | Multi touch Authentication Using Hand Geometry and Behavioral Information | 17:16 | 0 | Guide |
|
2022-12-10 | From Trash to Treasure Timing Sensitive Garbage Collection | 20:40 | 1 | |
|
2022-12-10 | NEZHA Efficient Domain independent Differential Testing | 17:38 | 2 | |
|
2022-12-10 | Hardening Java's Access Control by Abolishing Implicit Privilege Elevation | 20:32 | 1 | |
|
2022-12-10 | Norax Enabling Execute Only Memory for COTS Binaries on AArch64 | 21:07 | 4 | |
|
2022-12-10 | Obstacles to the Adoption of Secure Communication Tools | 18:46 | 2 | |
|
2022-12-10 | One TPM to Bind Them All Fixing TPM2 0 for Provably Secure Anonymous Attestation | 18:25 | 1 | |
|
2022-12-10 | Optimized Honest Majority MPC for Malicious Adversaries Breaking 1 Billion Gate Second Barrier | 19:15 | 1 | |
|
2022-12-10 | Protecting Bare metal Embedded Systems with Privilege Overlays | 18:51 | 5 | |
|
2022-12-10 | Pyramid Enhancing Selectivity in Big Data Protection with Count Featurization | 20:03 | 0 | |
|
2022-12-10 | Scalable Bias Resistant Distributed Randomness | 22:48 | 1 | |
|
2022-12-10 | Stack Overflow Considered Harmful The Impact of Copy&Paste on Android Application Security | 21:22 | 1 | |
|
2022-12-10 | SecureML A System for Scalable Privacy Preserving Machine Learning | 18:36 | 9 | |
|
2022-12-10 | SymCerts Practical Symbolic Execution For Exposing Noncompliance in X 509 Certificate Validation | 20:35 | 2 | |
|
2022-12-10 | Securing Augmented Reality Output | 19:42 | 0 | |
|
2022-12-10 | SysPal System guided Pattern Locks for Android | 20:21 | 1 | Guide |
|
2022-12-10 | Side Channel Attacks on Shared Search Indexes | 20:33 | 0 | |
|
2022-12-10 | To Catch a Ratter Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild | 17:41 | 23 | |
|
2022-12-10 | Skyfire Data Driven Seed Generation for Fuzzing | 15:56 | 2 | |
|
2022-12-10 | Towards Evaluating the Robustness of Neural Networks | 20:49 | 7 | |
|
2022-12-10 | SmarPer Context Aware and Automatic Runtime Permissions for Mobile Devices YouTube | 22:58 | 0 | |
|
2022-12-10 | Under the Shadow of Sunshine Understanding & Detecting Bulletproof Hosting | 14:40 | 2 | |
|
2022-12-10 | SoK Cryptographically Protected Database Search | 21:25 | 0 | |
|
2022-12-10 | Verified Models and Reference Implementations for the TLS 1 3 Standard Candidate | 21:03 | 5 | |
|
2022-12-10 | SoK Exploiting Network Printers | 19:38 | 2 | |
|
2022-12-10 | Verifying and Synthesizing Constant Resource Implementations with Types | 18:52 | 0 | |
|
2022-12-10 | SoK Science, Security, and the Elusive Goal of Security as a Scientific Pursuit | 22:40 | 3 | |
|
2022-12-10 | vSQL Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases | 20:15 | 0 | |
|
2022-12-10 | Spotless Sandboxes Evading Malware Analysis Systems using Wear and Tear Artifacts | 20:43 | 9 | |
|
2022-12-10 | VUDDY A Scalable Approach for Vulnerable Code Clone Discovery | 19:18 | 1 | |
|
2022-12-10 | XHOUND Quantifying the Fingerprintability of Browser Extensions | 18:21 | 0 | |
|
2022-12-10 | Your Exploit is Mine Automatic Shellcode Transplant for Remote Exploits | 19:29 | 2 | |
|
2022-12-10 | A Formal Treatment of Accountable Proxying over TLS | 21:08 | 0 | |
|
2022-12-10 | Enabling Autonomous IoT Device Pairing using Different Sensor Types | 21:32 | 9 | |
|
2022-12-10 | A Machine Learning Approach to Prevent Malicious Calls Over Telephony Networks | 24:15 | 4 | |
|
2022-12-10 | EnclaveDB A Secure Database using SGX | 22:57 | 2 | |
|
2022-12-10 | A Tale of Two Studies The Best and Worst of YubiKey Usability | 17:08 | 18 | |
|
2022-12-10 | Enumerating Active IPv6 Hosts for Large scale Security Scans via DNSSEC signed Reverse Zones | 20:31 | 5 | |
|
2022-12-10 | AI2 Safety and Robustness Certification of Neural Networks | 14:08 | 3 | |
|
2022-12-10 | EyeTell Video Assisted Touchscreen Keystroke Inference from Eye Movements | 21:31 | 0 | |
|
2022-12-10 | Angora Efficient Fuzzing by Principled Search | 21:19 | 2 | |
|
2022-12-10 | FPGA Based Remote Power Side Channel Attacks | 17:30 | 4 | |
|
2022-12-10 | Anonymity Trilemma Strong Anonymity, Low Bandwidth Overhead, Low Latency Choose Two | 19:00 | 0 | |
|
2022-12-10 | FP Stalker Tracking Browser Fingerprint Evolutions Antoine Vastel | 18:18 | 9 | |
|
2022-12-10 | Another Flip in the Wall of Rowhammer Defenses | 25:23 | 0 | |
|
2022-12-10 | FuturesMEX Secure, Distributed Futures Market Exchange | 20:54 | 0 | |
|
2022-12-10 | Blue Note How Intentional Acoustic Interference Damages Availablity and Integrity | 20:29 | 2 | |
|
2022-12-10 | Grand Pwning Unit Accelerating Microarchitectural Attacks with the GPU | 17:41 | 2 | |
|
2022-12-10 | Bulletproofs Short Proofs for Confidential Transactions and More | 22:06 | 1 | |
|
2022-12-10 | Hackers vs Testers A Comparison of Software Vulnerability Discovery Processes | 20:33 | 9 | |
|
2022-12-10 | Compiler assisted Code Randomization | 20:22 | 0 | |
|
2022-12-10 | Implementing Conjunction Obfuscation under Entropic Ring LWE | 20:15 | 3 | |
|
2022-12-10 | Computer Security and Privacy for Refugees in the United States | 20:31 | 2 | |
|
2022-12-10 | Impossibility of Precise and Sound Termination Sensitive Security Enforcements | 17:43 | 0 | |
|
2022-12-10 | Crowd GPS Sec Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks | 15:20 | 3 | |
|
2022-12-10 | Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage | 19:49 | 1 | |
|
2022-12-10 | DEEPSEC Deciding Equivalence Properties in Security Protocols Theory and Practice | 16:20 | 3 | |
|
2022-12-10 | Learning from Mutants Using Code Mutation to Learn and Monitor Invariants of a CPS | 20:46 | 0 | |
|
2022-12-10 | Distance Bounding Protocols Verification without Time and Location | 21:54 | 3 | |
|
2022-12-10 | Locally Differentially Private Frequent Itemset Mining | 17:56 | 6 | |
|
2022-12-10 | Double efficient zkSNARKs Without Trusted Setup | 21:02 | 1 | |
|
2022-12-10 | Manipulating Machine Learning Poisoning Attacks & Countermeasures | 17:24 | 10 | |
|
2022-12-08 | Micro Policies Formally Verified, Tag Based Security Monitors | 21:37 | 5 | |
|
2022-12-08 | Missing the Pointer On the Effectiveness of Code Pointer Integrity | 23:53 | 3 | |
|
2022-12-08 | SoK Research Perspectives and Challenges for Bitcoin and Cryptocurrencies | 21:59 | 3 | |
|
2022-12-08 | SoK Secure Messaging | 19:12 | 6 | |
|
2022-12-08 | ObliVM A Programming Framework for Secure Computation | 20:59 | 9 | |
|
2022-12-08 | SurroundWeb Mitigating Privacy Concerns in a 3D Web Browser | 18:44 | 2 | |
|
2022-12-08 | On Subnormal Floating Point and Abnormal Timing | 22:42 | 3 | |
|
2022-12-08 | Temporal Lensing and Its Application in Pulsing Denial of Service Attacks | 22:11 | 3 | |
|
2022-12-08 | Opening Remarks of the 2015 IEEE Symposium on Security & Privacy | 6:20 | 0 | |
|
2022-12-08 | Privacy and Access Control for Outsourced Personal Records | 18:19 | 2 | |
|
2022-12-08 | The Attack of the Clones A Study of the Impact of Shared Code on Vulnerability Patching | 20:28 | 0 | |
|
2022-12-08 | Program Adaptive Mutational Fuzzing | 21:25 | 0 | |
|
2022-12-08 | The Miner's Dilemma | 21:14 | 1 | |
|
2022-12-08 | Protecting Private Keys against Memory Disclosure Attacks Using Hardware Transactional Memory | 18:53 | 6 | |
|
2022-12-08 | TinyGarble Highly Compressed and Scalable Sequential Garbled Circuits | 19:33 | 2 | |
|
2022-12-08 | Readactor Practical Code Randomization Resilient to Memory Disclosure | 19:32 | 1 | |
|
2022-12-08 | Towards Making Systems Forget with Machine Unlearning | 18:27 | 11 | |
|
2022-12-08 | Riposte An Anonymous Messaging System Handling Millions of Users | 18:28 | 2 | |
|
2022-12-08 | Understanding and Monitoring Embedded Web Scripts | 19:52 | 0 | |
|
2022-12-08 | S$A A Shared Cache Attack That Works across Cores and Defies VM Sandboxing | 17:56 | 1 | |
|
2022-12-08 | Using Hardware Features for Increased Debugging Transparency | 20:47 | 1 | |
|
2022-12-08 | Secure Track Verification | 20:55 | 2 | |
|
2022-12-08 | VC3 Trustworthy Data Analytics in the Cloud Using SGX | 21:40 | 1 | |
|
2022-12-08 | Vetting SSL Usage in Applications with SSLINT | 18:54 | 1 | |
|
2022-12-08 | Securing Multiparty Online Services Via Certification of Symbolic Transactions | 16:20 | 0 | |
|
2022-12-08 | Virtual Proofs of Reality and their Physical Implementation | 19:26 | 0 | |
|
2022-12-08 | Security of the J PAKE Password Authenticated Key Exchange Protocol | 16:55 | 5 | |
|
2022-12-08 | What the App is That Deception and Countermeasures in the Android User Interface | 21:46 | 2 | |
|
2022-12-08 | SoK Deep Packer Inspection A Longitudinal Study of the Complexity of Run Time Packers | 20:32 | 0 | |
|
2022-12-08 | A Method for Verifying Privacy Type Properties The Unbounded Case | 16:47 | 0 | |
|