Parent directory/ | - | - |
A Method for Verifying Privacy-Type Properties - The Unbounded Case.eng.srt | 41.6 KiB | 2019 Oct 01 00:30 |
A Method for Verifying Privacy-Type Properties - The Unbounded Case.mp4 | 14.6 MiB | 2021 Jun 05 06:45 |
A Practical Oblivious Map Data Structure with Secure Deletion and History Independence.eng.srt | 66.0 KiB | 2019 Oct 01 00:30 |
A Practical Oblivious Map Data Structure with Secure Deletion and History Independence.mp4 | 18.4 MiB | 2021 Jun 05 06:45 |
A Tough call - Mitigating Advanced Code-Reuse Attacks At The Binary Level.eng.srt | 35.3 KiB | 2019 Oct 01 00:30 |
A Tough call - Mitigating Advanced Code-Reuse Attacks At The Binary Level.mp4 | 17.3 MiB | 2021 Jun 05 06:45 |
A2 - Analog Malicious Hardware.eng.srt | 67.6 KiB | 2019 Oct 01 00:30 |
A2 - Analog Malicious Hardware.mp4 | 23.0 MiB | 2021 Jun 05 06:45 |
Algorithmic Transparency via Quantitative Input Influence ....eng.srt | 52.5 KiB | 2019 Oct 01 00:30 |
Algorithmic Transparency via Quantitative Input Influence ....mp4 | 24.1 MiB | 2021 Jun 05 06:45 |
Automated Analysis and Verification of TLS 1.3 - 0-RTT, Resumption and Delayed Authentication.eng.srt | 43.4 KiB | 2019 Oct 01 00:30 |
Automated Analysis and Verification of TLS 1.3 - 0-RTT, Resumption and Delayed Authentication.mp4 | 16.0 MiB | 2021 Jun 05 06:45 |
Back in Black - Towards Formal, Black Box Analysis of Sanitizers and Filters.eng.srt | 52.3 KiB | 2019 Oct 01 00:30 |
Back in Black - Towards Formal, Black Box Analysis of Sanitizers and Filters.mp4 | 15.6 MiB | 2021 Jun 05 06:45 |
Beauty and the Beast - Diverting modern web browsers to build unique browser fingerprints.eng.srt | 56.1 KiB | 2019 Oct 01 00:30 |
Beauty and the Beast - Diverting modern web browsers to build unique browser fingerprints.mp4 | 18.9 MiB | 2021 Jun 05 06:45 |
CaSE - Cache-Assisted Secure Execution on ARM Processors.eng.srt | 52.5 KiB | 2019 Oct 01 00:30 |
CaSE - Cache-Assisted Secure Execution on ARM Processors.mp4 | 22.7 MiB | 2021 Jun 05 06:45 |
Cache Storage Channels - Alias-Driven Attacks and Verified Countermeasures.eng.srt | 43.5 KiB | 2019 Oct 01 00:30 |
Cache Storage Channels - Alias-Driven Attacks and Verified Countermeasures.mp4 | 15.3 MiB | 2021 Jun 05 06:45 |
Cinderella - Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with ....eng.srt | 44.9 KiB | 2019 Oct 01 00:30 |
Cinderella - Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with ....mp4 | 18.5 MiB | 2021 Jun 05 06:45 |
Cloak of Visibility - Detecting When Machines Browse a Different Web.eng.srt | 35.0 KiB | 2019 Oct 01 00:29 |
Cloak of Visibility - Detecting When Machines Browse a Different Web.mp4 | 11.4 MiB | 2021 Jun 05 06:45 |
Data-Oriented Programming - On the Expressiveness of Non-Control Data Attacks.eng.srt | 62.7 KiB | 2019 Oct 01 00:30 |
Data-Oriented Programming - On the Expressiveness of Non-Control Data Attacks.mp4 | 17.7 MiB | 2021 Jun 05 06:45 |
Dedup Est Machina - Memory Deduplication as an Advanced Exploitation Vector.eng.srt | 29.2 KiB | 2019 Oct 01 00:29 |
Dedup Est Machina - Memory Deduplication as an Advanced Exploitation Vector.mp4 | 12.8 MiB | 2021 Jun 05 06:45 |
Distillation as a Defense to Adversarial Perturbations against Deep Neural Networks.eng.srt | 48.1 KiB | 2019 Oct 01 00:29 |
Distillation as a Defense to Adversarial Perturbations against Deep Neural Networks.mp4 | 19.2 MiB | 2021 Jun 05 06:45 |
Domain-Z - 28 Registrations Later.eng.srt | 45.8 KiB | 2019 Oct 01 00:30 |
Domain-Z - 28 Registrations Later.mp4 | 17.0 MiB | 2021 Jun 05 06:45 |
Downgrade Resilience in Key-Exchange Protocols.eng.srt | 35.9 KiB | 2019 Oct 01 00:30 |
Downgrade Resilience in Key-Exchange Protocols.mp4 | 18.2 MiB | 2021 Jun 05 06:45 |
Following Devil's Footprints - Cross-Platform Analysis of Potentially Harmful Libraries ....eng.srt | 51.0 KiB | 2019 Oct 01 00:30 |
Following Devil's Footprints - Cross-Platform Analysis of Potentially Harmful Libraries ....mp4 | 18.9 MiB | 2021 Jun 05 06:45 |
HDFI - Hardware-Assisted Data-Flow Isolation.eng.srt | 47.5 KiB | 2019 Oct 01 00:30 |
HDFI - Hardware-Assisted Data-Flow Isolation.mp4 | 12.9 MiB | 2021 Jun 05 06:45 |
Hawk - The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts.eng.srt | 54.5 KiB | 2019 Oct 01 00:30 |
Hawk - The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts.mp4 | 14.9 MiB | 2021 Jun 05 06:45 |
Helping Johnny to Analyze Malware - A Usability-Optimized Decompiler and Malware Analysis User Study.eng.srt | 56.3 KiB | 2019 Oct 01 00:30 |
Helping Johnny to Analyze Malware - A Usability-Optimized Decompiler and Malware Analysis User Study.mp4 | 19.8 MiB | 2021 Jun 05 06:45 |
High-Speed Inter-domain Fault Localization.eng.srt | 33.4 KiB | 2019 Oct 01 00:30 |
High-Speed Inter-domain Fault Localization.mp4 | 19.3 MiB | 2021 Jun 05 06:45 |
I Think They're Trying to Tell Me Something - Advice Sources and Selection for Digital Security.eng.srt | 35.3 KiB | 2019 Oct 01 00:29 |
I Think They're Trying to Tell Me Something - Advice Sources and Selection for Digital Security.mp4 | 14.0 MiB | 2021 Jun 05 06:45 |
Inferring User Routes and Locations using Zero-Permission Mobile Sensors.eng.srt | 39.6 KiB | 2019 Oct 01 00:30 |
Inferring User Routes and Locations using Zero-Permission Mobile Sensors.mp4 | 17.0 MiB | 2021 Jun 05 06:45 |
Keeping Authorities - Honest or Bust - with Decentralized Witness Cosigning.eng.srt | 59.0 KiB | 2019 Oct 01 00:30 |
Keeping Authorities - Honest or Bust - with Decentralized Witness Cosigning.mp4 | 22.1 MiB | 2021 Jun 05 06:45 |
Key Confirmation in Key Exchange - A Formal Treatment and Implications for TLS 1.3.eng.srt | 44.8 KiB | 2019 Oct 01 00:30 |
Key Confirmation in Key Exchange - A Formal Treatment and Implications for TLS 1.3.mp4 | 19.0 MiB | 2021 Jun 05 06:45 |
LAVA - Large-scale Automated Vulnerability Addition.eng.srt | 61.6 KiB | 2019 Oct 01 00:30 |
LAVA - Large-scale Automated Vulnerability Addition.mp4 | 17.0 MiB | 2021 Jun 05 06:45 |
MitM Attack by Name Collision - Cause Analysis and Vulnerability Assessment in the New gTLD Era.eng.srt | 48.6 KiB | 2019 Oct 01 00:30 |
MitM Attack by Name Collision - Cause Analysis and Vulnerability Assessment in the New gTLD Era.mp4 | 19.8 MiB | 2021 Jun 05 06:45 |
Multiple Handshakes Security of TLS 1.3 Candidates.eng.srt | 42.3 KiB | 2019 Oct 01 00:30 |
Multiple Handshakes Security of TLS 1.3 Candidates.mp4 | 17.2 MiB | 2021 Jun 05 06:45 |
NITRD Panel - Federal Cybersecurity and Privacy R&D Strategic Plans.eng.srt | 179.0 KiB | 2019 Oct 01 00:29 |
NITRD Panel - Federal Cybersecurity and Privacy R&D Strategic Plans.mp4 | 49.4 MiB | 2021 Jun 05 06:45 |
No Pardon for the Interruption - New Inference Attacks on Android Through Interrupt Timing Analysis.eng.srt | 33.9 KiB | 2019 Oct 01 00:30 |
No Pardon for the Interruption - New Inference Attacks on Android Through Interrupt Timing Analysis.mp4 | 14.4 MiB | 2021 Jun 05 06:45 |
On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud.eng.srt | 49.6 KiB | 2019 Oct 01 00:29 |
On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud.mp4 | 18.2 MiB | 2021 Jun 05 06:45 |
Opening Remarks of the 2016 IEEE Symposium on Security & Privacy.eng.srt | 25.6 KiB | 2019 Oct 01 00:30 |
Opening Remarks of the 2016 IEEE Symposium on Security & Privacy.mp4 | 7.8 MiB | 2021 Jun 05 06:45 |
PhotoProof - Cryptographic Image Authentication for Any Set of Permissible Transformations.eng.srt | 43.5 KiB | 2019 Oct 01 00:30 |
PhotoProof - Cryptographic Image Authentication for Any Set of Permissible Transformations.mp4 | 19.7 MiB | 2021 Jun 05 06:45 |
Prepose - Privacy, Security, and Reliability for Gesture-Based Programming.eng.srt | 49.7 KiB | 2019 Oct 01 00:30 |
Prepose - Privacy, Security, and Reliability for Gesture-Based Programming.mp4 | 17.0 MiB | 2021 Jun 05 06:45 |
Return to the Zombie Gadgets - Undermining Destructive Code Reads via Code-Inference Attacks.eng.srt | 49.0 KiB | 2019 Oct 01 00:30 |
Return to the Zombie Gadgets - Undermining Destructive Code Reads via Code-Inference Attacks.mp4 | 17.2 MiB | 2021 Jun 05 06:45 |
Revisiting Square Root ORAM - Efficient Random Access in Multi-Party Computation.eng.srt | 32.9 KiB | 2019 Oct 01 00:29 |
Revisiting Square Root ORAM - Efficient Random Access in Multi-Party Computation.mp4 | 13.7 MiB | 2021 Jun 05 06:45 |
S&P TC Business Meeting.eng.srt | 98.3 KiB | 2019 Oct 01 00:29 |
S&P TC Business Meeting.mp4 | 38.7 MiB | 2021 Jun 05 06:45 |
Security Analysis of Emerging Smart Home Applications.eng.srt | 54.1 KiB | 2019 Oct 01 00:30 |
Security Analysis of Emerging Smart Home Applications.mp4 | 19.4 MiB | 2021 Jun 05 06:45 |
Seeking Nonsense, Looking for Trouble - Efficient Promotional-Infection Detection through ....eng.srt | 31.7 KiB | 2019 Oct 01 00:30 |
Seeking Nonsense, Looking for Trouble - Efficient Promotional-Infection Detection through ....mp4 | 14.7 MiB | 2021 Jun 05 06:45 |
Sending out an SMS - Characterizing the Security of the SMS Ecosystem with Public Gateways.eng.srt | 32.5 KiB | 2019 Oct 01 00:30 |
Sending out an SMS - Characterizing the Security of the SMS Ecosystem with Public Gateways.mp4 | 13.7 MiB | 2021 Jun 05 06:45 |
Shreds - Fine-grained Execution Units with Private Memory.eng.srt | 51.1 KiB | 2019 Oct 01 00:30 |
Shreds - Fine-grained Execution Units with Private Memory.mp4 | 18.1 MiB | 2021 Jun 05 06:45 |
SoK - (State of) The Art of War - Offensive Techniques in Binary Analysis.eng.srt | 44.6 KiB | 2019 Oct 01 00:30 |
SoK - (State of) The Art of War - Offensive Techniques in Binary Analysis.mp4 | 15.7 MiB | 2021 Jun 05 06:45 |
SoK - Everyone Hates Robocalls - A Survey of Techniques against Telephone Spam.eng.srt | 53.3 KiB | 2019 Oct 01 00:30 |
SoK - Everyone Hates Robocalls - A Survey of Techniques against Telephone Spam.mp4 | 17.5 MiB | 2021 Jun 05 06:45 |
SoK - Towards Grounding Censorship Circumvention in Empiricism.eng.srt | 43.5 KiB | 2019 Oct 01 00:30 |
SoK - Towards Grounding Censorship Circumvention in Empiricism.mp4 | 16.5 MiB | 2021 Jun 05 06:45 |
Staying Secure and Unprepared - Understanding and Mitigating the Security Risks of Apple ZeroConf.eng.srt | 34.7 KiB | 2019 Oct 01 00:29 |
Staying Secure and Unprepared - Understanding and Mitigating the Security Risks of Apple ZeroConf.mp4 | 17.7 MiB | 2021 Jun 05 06:45 |
Synthesizing Plausible Privacy-Preserving Location Traces.eng.srt | 54.0 KiB | 2019 Oct 01 00:30 |
Synthesizing Plausible Privacy-Preserving Location Traces.mp4 | 18.2 MiB | 2021 Jun 05 06:45 |
Talos - Neutralizing Vulnerabilities with Security Workarounds for Rapid Response.eng.srt | 41.7 KiB | 2019 Oct 01 00:30 |
Talos - Neutralizing Vulnerabilities with Security Workarounds for Rapid Response.mp4 | 18.5 MiB | 2021 Jun 05 06:45 |
TaoStore - Overcoming Asynchronicity in Oblivious Data Storage.eng.srt | 40.8 KiB | 2019 Oct 01 00:30 |
TaoStore - Overcoming Asynchronicity in Oblivious Data Storage.mp4 | 20.5 MiB | 2021 Jun 05 06:45 |
The Cracked Cookie Jar - HTTP Cookie Hijacking and the Exposure of Private Information.eng.srt | 62.6 KiB | 2019 Oct 01 00:30 |
The Cracked Cookie Jar - HTTP Cookie Hijacking and the Exposure of Private Information.mp4 | 17.6 MiB | 2021 Jun 05 06:45 |
TriggerScope - Towards Detecting Logic Bombs in Android Applications.eng.srt | 62.6 KiB | 2019 Oct 01 00:30 |
TriggerScope - Towards Detecting Logic Bombs in Android Applications.mp4 | 17.9 MiB | 2021 Jun 05 06:45 |
Users Really Do Plug in USB Drives They Find.eng.srt | 47.4 KiB | 2019 Oct 01 00:30 |
Users Really Do Plug in USB Drives They Find.mp4 | 20.3 MiB | 2021 Jun 05 06:45 |
Verena - End-to-End Integrity Protection for Web Applications.mp4 | 20.3 MiB | 2021 Jun 05 06:45 |
Verifiable ASICs.eng.srt | 62.8 KiB | 2019 Oct 01 00:29 |
Verifiable ASICs.mp4 | 21.8 MiB | 2021 Jun 05 06:45 |
You Get Where You're Looking For - The Impact Of Information Sources On Code Security.eng.srt | 50.6 KiB | 2019 Oct 01 00:30 |
You Get Where You're Looking For - The Impact Of Information Sources On Code Security.mp4 | 17.3 MiB | 2021 Jun 05 06:45 |
pASSWORD tYPOS and How to Correct Them Securely.eng.srt | 50.9 KiB | 2019 Oct 01 00:30 |
pASSWORD tYPOS and How to Correct Them Securely.mp4 | 19.6 MiB | 2021 Jun 05 06:45 |