2022-12-08 | A Practical Oblivious Map Data Structure with Secure Deletion and History Independence | 20:45 | 1 | |
|
2022-12-08 | Domain Z 28 Registrations Later | 18:33 | 0 | |
|
2022-12-08 | No Pardon for the Interruption New Inference Attacks on Android Through Interrupt Timing Analysis | 16:50 | 0 | |
|
2022-12-08 | A Tough call Mitigating Advanced Code Reuse Attacks At The Binary Level | 20:24 | 0 | |
|
2022-12-08 | Downgrade Resilience in Key Exchange Protocols | 19:51 | 1 | |
|
2022-12-08 | SoK Towards Grounding Censorship Circumvention in Empiricism | 16:55 | 2 | |
|
2022-12-08 | On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud | 19:40 | 1 | |
|
2022-12-08 | A2 Analog Malicious Hardware | 24:07 | 4 | Vlog |
|
2022-12-08 | Staying Secure and Unprepared Understanding and Mitigating the Security Risks of Apple ZeroConf | 21:00 | 1 | |
|
2022-12-08 | Following Devil's Footprints Cross Platform Analysis of Potentially Harmful Libraries | 21:38 | 0 | |
|
2022-12-08 | Opening Remarks of the 2016 IEEE Symposium on Security & Privacy | 9:32 | 0 | |
|
2022-12-08 | Synthesizing Plausible Privacy Preserving Location Traces | 20:17 | 0 | |
|
2022-12-08 | pASSWORD tYPOS and How to Correct Them Securely | 19:56 | 1 | Guide |
|
2022-12-08 | Algorithmic Transparency via Quantitative Input Influence | 26:18 | 3 | |
|
2022-12-08 | Hawk The Blockchain Model of Cryptography and Privacy Preserving Smart Contracts | 17:21 | 11 | |
|
2022-12-08 | HDFI Hardware Assisted Data Flow Isolation | 18:07 | 0 | |
|
2022-12-08 | Talos Neutralizing Vulnerabilities with Security Workarounds for Rapid Response | 20:03 | 1 | |
|
2022-12-08 | PhotoProof Cryptographic Image Authentication for Any Set of Permissible Transformations | 22:09 | 5 | |
|
2022-12-08 | Automated Analysis and Verification of TLS 1 3 0 RTT, Resumption and Delayed Authentication | 19:27 | 10 | |
|
2022-12-08 | Helping Johnny to Analyze Malware A Usability Optimized Decompiler and Malware Analysis User Study | 25:03 | 0 | |
|
2022-12-08 | TaoStore Overcoming Asynchronicity in Oblivious Data Storage | 20:30 | 1 | |
|
2022-12-08 | Prepose Privacy, Security, and Reliability for Gesture Based Programming | 20:20 | 1 | |
|
2022-12-08 | Back in Black Towards Formal, Black Box Analysis of Sanitizers and Filters | 18:52 | 0 | |
|
2022-12-08 | High Speed Inter domain Fault Localization | 19:27 | 0 | |
|
2022-12-08 | Beauty and the Beast Diverting modern web browsers to build unique browser fingerprints | 20:17 | 1 | |
|
2022-12-08 | Return to the Zombie Gadgets Undermining Destructive Code Reads via Code Inference Attacks | 20:52 | 0 | |
|
2022-12-08 | The Cracked Cookie Jar HTTP Cookie Hijacking and the Exposure of Private Information | 20:52 | 4 | Guide |
|
2022-12-08 | I Think They're Trying to Tell Me Something Advice Sources and Selection for Digital Security | 16:34 | 0 | |
|
2022-12-08 | Revisiting Square Root ORAM Efficient Random Access in Multi Party Computation | 14:22 | 4 | |
|
2022-12-08 | Cache Storage Channels Alias Driven Attacks and Verified Countermeasures | 19:50 | 2 | |
|
2022-12-08 | Inferring User Routes and Locations using Zero Permission Mobile Sensors | 21:45 | 4 | |
|
2022-12-08 | TriggerScope Towards Detecting Logic Bombs in Android Applications | 21:23 | 1 | Vlog |
|
2022-12-08 | S&P TC Business Meeting | 45:32 | 0 | |
|
2022-12-08 | CaSE Cache Assisted Secure Execution on ARM Processors | 22:58 | 4 | |
|
2022-12-08 | Users Really Do Plug in USB Drives They Find | 20:26 | 1 | |
|
2022-12-08 | Keeping Authorities Honest or Bust with Decentralized Witness Cosigning | 22:58 | 0 | |
|
2022-12-08 | Verena End to End Integrity Protection for Web Applications | 20:35 | 0 | |
|
2022-12-08 | Cinderella Turning Shabby X 509 Certificates into Elegant Anonymous Credentials with | 20:29 | 3 | |
|
2022-12-08 | Key Confirmation in Key Exchange A Formal Treatment and Implications for TLS 1 3 | 20:53 | 0 | |
|
2022-12-08 | Security Analysis of Emerging Smart Home Applications | 19:44 | 7 | |
|
2022-12-08 | Verifiable ASICs | 20:08 | 0 | |
|
2022-12-08 | Cloak of Visibility Detecting When Machines Browse a Different Web | 14:12 | 0 | |
|
2022-12-08 | LAVA Large scale Automated Vulnerability Addition | 19:48 | 2 | |
|
2022-12-08 | Seeking Nonsense, Looking for Trouble Efficient Promotional Infection Detection through | 18:02 | 1 | |
|
2022-12-08 | Data Oriented Programming On the Expressiveness of Non Control Data Attacks | 20:14 | 8 | |
|
2022-12-08 | You Get Where You're Looking For The Impact Of Information Sources On Code Security | 21:25 | 1 | Guide |
|
2022-12-08 | MitM Attack by Name Collision Cause Analysis and Vulnerability Assessment in the New gTLD Era | 19:37 | 3 | |
|
2022-12-08 | Sending out an SMS Characterizing the Security of the SMS Ecosystem with Public Gateways | 14:38 | 5 | |
|
2022-12-08 | Dedup Est Machina Memory Deduplication as an Advanced Exploitation Vector | 16:18 | 0 | |
|
2022-12-08 | Shreds Fine grained Execution Units with Private Memory | 23:03 | 1 | |
|
2022-12-08 | Distillation as a Defense to Adversarial Perturbations against Deep Neural Networks | 21:55 | 5 | |
|
2022-12-08 | Multiple Handshakes Security of TLS 1 3 Candidates | 20:54 | 0 | |
|
2022-12-08 | SoK State of The Art of War Offensive Techniques in Binary Analysis | 18:32 | 10 | |
|
2022-12-08 | NITRD Panel Federal Cybersecurity and Privacy R&D Strategic Plans | 1:03:12 | 2 | |
|
2022-12-08 | SoK Everyone Hates Robocalls A Survey of Techniques against Telephone Spam | 21:37 | 1 | |
|
2022-12-07 | A Generic Approach to Automatic Deobfuscation of Executable Code | 20:21 | 4 | |
|
2022-12-07 | A Messy State of the Union Taming the Composite State Machines of TLS | 21:02 | 1 | |
|
2022-12-07 | Ad Injection at Scale Assessing Deceptive Advertisement Modifications | 18:05 | 1 | |
|
2022-12-07 | ADSNARK Nearly Practical and Privacy Preserving Proofs on Authenticated Data | 20:54 | 1 | |
|
2022-12-07 | Automatic Inference of Search Patterns for Tain't Style Vulnerabilities | 17:32 | 0 | |
|
2022-12-07 | Bitcoin over Tor isn't a Good Idea | 21:33 | 4 | |
|
2022-12-07 | Caelus Verifying the Consistency of Cloud Services with Battery Powered Devices | 19:49 | 1 | |
|
2022-12-07 | CHERI A Hybrid Capability System Architecture for Scalable Software Compartmentalization | 22:02 | 1 | |
|
2022-12-07 | Counterfeit Object oriented Programming | 20:46 | 3 | |
|
2022-12-07 | Cracking Resistant Password Vaults Using Natural Language Encoders | 16:12 | 2 | |
|
2022-12-07 | Cross Architecture Bug Search in Binary Executables | 22:47 | 1 | |
|
2022-12-07 | Effective Real Time Android Application Auditing | 22:04 | 1 | |
|
2022-12-07 | Forward Secure Asynchronous Messaging from Puncturable Encryption | 20:57 | 10 | |
|
2022-12-07 | Every Second Counts Quantifying the Negative Externalities of Cybercrime via Typosquatting | 21:34 | 4 | |
|
2022-12-07 | GenoGuard Protecting Genomic Data against Brute Force Attacks | 20:56 | 1 | |
|
2022-12-07 | filenection Oriented DNS to Improve Privacy and Security | 19:07 | 4 | |
|
2022-12-07 | Geppetto Versatile Verifiable Computation | 16:22 | 0 | |
|
2022-12-07 | filetrolled Channel Attacks Deterministic Side Channels for Untrusted Operating Systems | 16:55 | 2 | |
|
2022-12-07 | GraphSC Parallel Secure Computation Made Easy | 16:26 | 0 | |
|
2022-12-07 | High System Code Security with Low Overhead | 21:40 | 2 | |
|
2022-12-07 | How Secure and Quick is QUIC Provable Security and Performance Analyses | 18:59 | 7 | |
|
2022-12-07 | Last Level Cache Side Channel Attacks are Practical | 19:33 | 12 | |
|
2022-12-07 | Leave Me Alone App Level Protection against Runtime Information Gathering on Android | 17:50 | 1 | Guide |
|
2022-12-07 | Malicious Client Security in Blind Seer A Scalable Private DBMS | 18:30 | 1 | |
|
2022-12-07 | Press Conference ICANN 44 Prague | 48:12 | 0 | |
|
2022-12-07 | Minister Kuba Opening Speech ICANN 44 Prague 25 June 2012 | 7:51 | 0 | |
|
2022-12-07 | Leaders Reflect on ICANN 44 ICANN 44 Prague 29 June 2012 | 10:46 | 1 | |
|
2022-12-07 | ICANN 44 Highlights ALAC at 10 Years ICANN 44 Prague 25 June 2012 | 2:06 | 0 | |
|
2022-12-07 | Fadi Chehadé Opening Speech ICANN 44 Prague 25 June 2012 | 21:03 | 0 | |
|
2022-12-07 | Akram Atallah Opening Speech ICANN 44 Prague 25 June 2012 | 4:40 | 3 | |
|
2022-12-07 | Toronto Reflections Looking Back, Moving Ahead ICANN 45 Toronto 19 Oct 2012 | 15:07 | 0 | |
|
2022-12-07 | Tony Clement Opening Speech ICANN 45 Toronto 15 Oct 2012 | 20:44 | 0 | |
|
2022-12-07 | Steve Crocker Opening Speech ICANN 45 Toronto 15 Oct 2012 | 18:39 | 0 | |
|
2022-12-07 | Prioritization Drawing ICANN 45 Toronto 17 Oct 12 | 1:13:22 | 0 | |
|
2022-12-07 | Latin America and the Caribbean A Regional Strategy ICANN 45 Toronto 17 Oct 2012 | 26:16 | 1 | |
|
2022-12-07 | ICANN Theatre The Toronto Fellowship Experience 16 Dec 2012 | 6:10 | 0 | |
|
2022-12-07 | Fadi Explains Draft Internet Governance Diagrams ICANN 45 Toronto 15 Oct 12 | 2:07 | 0 | |
|
2022-12-07 | Fadi Chehadé Demonstrates MyICANN ICANN 45 Toronto 16 Oct | 4:44 | 0 | |
|
2022-12-07 | Fadi Chehadé CEO Addresses ICANN 45 Part 3 Toronto 15 Oct 2012 | 21:36 | 0 | |
|
2022-12-07 | Fadi Chehadé CEO Addresses ICANN 45 Part 2 Toronto 15 Oct 2012 | 20:57 | 0 | |
|
2022-12-07 | Fadi Chehadé CEO Addresses ICANN 45 Part 1 Toronto 15 Oct 2012 | 19:25 | 2 | |
|
2022-12-07 | Byron Holland Opening Speech ICANN 45 Toronto 15 Oct 2012 | 5:03 | 0 | |
|
2022-12-07 | Board GAC Meeting ICANN 45 Toronto 17 Oct 2012 | 1:10:33 | 0 | |
|
2022-12-07 | Africa An Overdue Priority ICANN 45 Toronto 16 Oct 12 | 1:08:58 | 0 | |
|
2022-12-07 | Wang Feng, Deputy Director of the State Commission Office for Public Sector Reform | 5:49 | 0 | |
|