Parent directory/ | - | - |
A Framework for Universally Composable Diffie-Hellman Key Exchange.eng.srt | 50.3 KiB | 2019 Oct 01 00:29 |
A Framework for Universally Composable Diffie-Hellman Key Exchange.mp4 | 28.7 MiB | 2021 Jun 05 18:41 |
A Lustrum of Malware Network Communication - Evolution and Insights.eng.srt | 58.9 KiB | 2019 Oct 01 00:28 |
A Lustrum of Malware Network Communication - Evolution and Insights.mp4 | 29.3 MiB | 2021 Jun 05 18:41 |
An Experimental Security Analysis of an Industrial Robot Controller.eng.srt | 42.1 KiB | 2019 Oct 01 00:28 |
An Experimental Security Analysis of an Industrial Robot Controller.mp4 | 24.2 MiB | 2021 Jun 05 18:42 |
Augur - Internet-Wide Detection of Connectivity Disruptions.eng.srt | 44.4 KiB | 2019 Oct 01 00:29 |
Augur - Internet-Wide Detection of Connectivity Disruptions.mp4 | 23.8 MiB | 2021 Jun 05 18:42 |
Backward-bounded DSE - Targeting Infeasibility Questions on Obfuscated Codes.eng.srt | 55.8 KiB | 2019 Oct 01 00:29 |
Backward-bounded DSE - Targeting Infeasibility Questions on Obfuscated Codes.mp4 | 35.1 MiB | 2021 Jun 05 18:42 |
CRLite - A Scalable System for Pushing All TLS Revocations to All Browsers.eng.srt | 44.6 KiB | 2019 Oct 01 00:28 |
CRLite - A Scalable System for Pushing All TLS Revocations to All Browsers.mp4 | 28.6 MiB | 2021 Jun 05 18:42 |
Catena - Efficient Non-equivocation via Bitcoin.eng.srt | 56.9 KiB | 2019 Oct 01 00:29 |
Catena - Efficient Non-equivocation via Bitcoin.mp4 | 22.3 MiB | 2021 Jun 05 18:42 |
Cloak and Dagger - From Two Permissions to Complete Control of the UI Feedback Loop.eng.srt | 72.0 KiB | 2019 Oct 01 00:28 |
Cloak and Dagger - From Two Permissions to Complete Control of the UI Feedback Loop.mp4 | 31.8 MiB | 2021 Jun 05 18:42 |
CoSMeDis - A Distributed Social Media Platform with Formally Verified Confidentiality Guarantees.eng.srt | 45.1 KiB | 2019 Oct 01 00:28 |
CoSMeDis - A Distributed Social Media Platform with Formally Verified Confidentiality Guarantees.mp4 | 24.4 MiB | 2021 Jun 05 18:42 |
Comparing the Usability of Cryptographic APIs.eng.srt | 51.5 KiB | 2019 Oct 01 00:28 |
Comparing the Usability of Cryptographic APIs.mp4 | 24.2 MiB | 2021 Jun 05 18:42 |
Counter-RAPTOR - Safeguarding Tor Against Active Routing Attacks.eng.srt | 42.8 KiB | 2019 Oct 01 00:28 |
Counter-RAPTOR - Safeguarding Tor Against Active Routing Attacks.mp4 | 27.5 MiB | 2021 Jun 05 18:42 |
Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping.eng.srt | 49.4 KiB | 2019 Oct 01 00:29 |
Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping.mp4 | 39.0 MiB | 2021 Jun 05 18:42 |
Finding and Preventing Bugs in JavaScript Bindings.eng.srt | 50.1 KiB | 2019 Oct 01 00:28 |
Finding and Preventing Bugs in JavaScript Bindings.mp4 | 26.8 MiB | 2021 Jun 05 18:42 |
From Trash to Treasure - Timing-Sensitive Garbage Collection.eng.srt | 55.2 KiB | 2019 Oct 01 00:28 |
From Trash to Treasure - Timing-Sensitive Garbage Collection.mp4 | 27.9 MiB | 2021 Jun 05 18:42 |
HVLearn - Automated Black-box Analysis of Hostname Verification in SSL TLS Implementations.eng.srt | 57.3 KiB | 2019 Oct 01 00:28 |
HVLearn - Automated Black-box Analysis of Hostname Verification in SSL TLS Implementations.mp4 | 30.7 MiB | 2021 Jun 05 18:42 |
Hardening Java's Access Control by Abolishing Implicit Privilege Elevation.eng.srt | 56.2 KiB | 2019 Oct 01 00:28 |
Hardening Java's Access Control by Abolishing Implicit Privilege Elevation.mp4 | 28.5 MiB | 2021 Jun 05 18:42 |
Hijacking Bitcoin - Routing Attacks on Cryptocurrencies.eng.srt | 52.1 KiB | 2019 Oct 01 00:29 |
Hijacking Bitcoin - Routing Attacks on Cryptocurrencies.mp4 | 30.2 MiB | 2021 Jun 05 18:42 |
How They Did It - An Analysis of Emission Defeat Devices in Modern Automobiles.eng.srt | 53.7 KiB | 2019 Oct 01 00:29 |
How They Did It - An Analysis of Emission Defeat Devices in Modern Automobiles.mp4 | 27.4 MiB | 2021 Jun 05 18:42 |
IKP - Turning a PKI Around with Decentralized Automated Incentives.eng.srt | 57.4 KiB | 2019 Oct 01 00:28 |
IKP - Turning a PKI Around with Decentralized Automated Incentives.mp4 | 33.1 MiB | 2021 Jun 05 18:42 |
IVD - Automatic Learning and Enforcement of Authorization Rules in Online Social Networks - YouTube.eng.srt | 37.3 KiB | 2019 Oct 01 00:28 |
IVD - Automatic Learning and Enforcement of Authorization Rules in Online Social Networks - YouTube.mp4 | 23.8 MiB | 2021 Jun 05 18:42 |
Identifying Personal DNA Methylation Profiles by Genotype Inference.eng.srt | 48.6 KiB | 2019 Oct 01 00:28 |
Identifying Personal DNA Methylation Profiles by Genotype Inference.mp4 | 28.3 MiB | 2021 Jun 05 18:42 |
Implementing and Proving the TLS 1.3 Record Layer.mp4 | 28.2 MiB | 2021 Jun 05 18:42 |
IoT Goes Nuclear - Creating a Zigbee Chain Reaction.eng.srt | 49.3 KiB | 2019 Oct 01 00:29 |
IoT Goes Nuclear - Creating a Zigbee Chain Reaction.mp4 | 26.5 MiB | 2021 Jun 05 18:42 |
Is Interaction Necessary for Distributed Private Learning.eng.srt | 57.2 KiB | 2019 Oct 01 00:28 |
Is Interaction Necessary for Distributed Private Learning.mp4 | 31.3 MiB | 2021 Jun 05 18:42 |
Leakage-Abuse Attacks on Order-Revealing Encryption.eng.srt | 54.1 KiB | 2019 Oct 01 00:28 |
Leakage-Abuse Attacks on Order-Revealing Encryption.mp4 | 26.2 MiB | 2021 Jun 05 18:42 |
Machine-Checked Proofs of Privacy for Electronic Voting Protocols.eng.srt | 41.5 KiB | 2019 Oct 01 00:28 |
Machine-Checked Proofs of Privacy for Electronic Voting Protocols.mp4 | 22.1 MiB | 2021 Jun 05 18:42 |
Membership Inference Attacks against Machine Learning Models.eng.srt | 41.5 KiB | 2019 Oct 01 00:29 |
Membership Inference Attacks against Machine Learning Models.mp4 | 16.6 MiB | 2021 Jun 05 18:42 |
Multi-touch Authentication Using Hand Geometry and Behavioral Information.eng.srt | 37.1 KiB | 2019 Oct 01 00:28 |
Multi-touch Authentication Using Hand Geometry and Behavioral Information.mp4 | 22.3 MiB | 2021 Jun 05 18:42 |
NEZHA - Efficient Domain-independent Differential Testing.eng.srt | 50.4 KiB | 2019 Oct 01 00:29 |
NEZHA - Efficient Domain-independent Differential Testing.mp4 | 26.2 MiB | 2021 Jun 05 18:42 |
Norax - Enabling Execute-Only Memory for COTS Binaries on AArch64.eng.srt | 56.8 KiB | 2019 Oct 01 00:29 |
Norax - Enabling Execute-Only Memory for COTS Binaries on AArch64.mp4 | 28.0 MiB | 2021 Jun 05 18:42 |
Obstacles to the Adoption of Secure Communication Tools.eng.srt | 45.6 KiB | 2019 Oct 01 00:29 |
Obstacles to the Adoption of Secure Communication Tools.mp4 | 19.5 MiB | 2021 Jun 05 18:42 |
One TPM to Bind Them All - Fixing TPM2.0 for Provably Secure Anonymous Attestation.eng.srt | 49.3 KiB | 2019 Oct 01 00:28 |
One TPM to Bind Them All - Fixing TPM2.0 for Provably Secure Anonymous Attestation.mp4 | 27.3 MiB | 2021 Jun 05 18:42 |
Optimized Honest-Majority MPC for Malicious Adversaries - Breaking 1 Billion-Gate Second Barrier.eng.srt | 49.2 KiB | 2019 Oct 01 00:28 |
Optimized Honest-Majority MPC for Malicious Adversaries - Breaking 1 Billion-Gate Second Barrier.mp4 | 29.1 MiB | 2021 Jun 05 18:42 |
Protecting Bare-metal Embedded Systems with Privilege Overlays.eng.srt | 51.6 KiB | 2019 Oct 01 00:29 |
Protecting Bare-metal Embedded Systems with Privilege Overlays.mp4 | 29.9 MiB | 2021 Jun 05 18:42 |
Pyramid - Enhancing Selectivity in Big Data Protection with Count Featurization.eng.srt | 55.0 KiB | 2019 Oct 01 00:29 |
Pyramid - Enhancing Selectivity in Big Data Protection with Count Featurization.mp4 | 27.0 MiB | 2021 Jun 05 18:42 |
Scalable Bias-Resistant Distributed Randomness.eng.srt | 59.2 KiB | 2019 Oct 01 00:29 |
Scalable Bias-Resistant Distributed Randomness.mp4 | 30.7 MiB | 2021 Jun 05 18:42 |
SecureML - A System for Scalable Privacy-Preserving Machine Learning.eng.srt | 44.7 KiB | 2019 Oct 01 00:28 |
SecureML - A System for Scalable Privacy-Preserving Machine Learning.mp4 | 22.5 MiB | 2021 Jun 05 18:42 |
Securing Augmented Reality Output.84d6e03b-b9a3-43cb-99ad-5277a4f98362.part | 179.0 MiB | 2019 Oct 01 04:46 |
Securing Augmented Reality Output.eng.srt | 55.6 KiB | 2019 Oct 01 00:29 |
Securing Augmented Reality Output.mp4 | 25.0 MiB | 2021 Jun 05 18:42 |
Side-Channel Attacks on Shared Search Indexes.eng.srt | 44.8 KiB | 2019 Oct 01 00:29 |
Side-Channel Attacks on Shared Search Indexes.mp4 | 28.0 MiB | 2021 Jun 05 18:42 |
Skyfire - Data-Driven Seed Generation for Fuzzing.mp4 | 19.0 MiB | 2021 Jun 05 18:42 |
SmarPer - Context-Aware and Automatic Runtime-Permissions for Mobile Devices - YouTube.eng.srt | 52.0 KiB | 2019 Oct 01 00:29 |
SmarPer - Context-Aware and Automatic Runtime-Permissions for Mobile Devices - YouTube.mp4 | 33.4 MiB | 2021 Jun 05 18:42 |
SoK - Cryptographically Protected Database Search.eng.srt | 58.3 KiB | 2019 Oct 01 00:28 |
SoK - Cryptographically Protected Database Search.mp4 | 29.0 MiB | 2021 Jun 05 18:42 |
SoK - Exploiting Network Printers.eng.srt | 51.4 KiB | 2019 Oct 01 00:29 |
SoK - Exploiting Network Printers.mp4 | 22.2 MiB | 2021 Jun 05 18:42 |
SoK - Science, Security, and the Elusive Goal of Security as a Scientific Pursuit.eng.srt | 75.3 KiB | 2019 Oct 01 00:29 |
SoK - Science, Security, and the Elusive Goal of Security as a Scientific Pursuit.mp4 | 37.7 MiB | 2021 Jun 05 18:42 |
Spotless Sandboxes - Evading Malware Analysis Systems using Wear-and-Tear Artifacts.eng.srt | 56.0 KiB | 2019 Oct 01 00:28 |
Spotless Sandboxes - Evading Malware Analysis Systems using Wear-and-Tear Artifacts.mp4 | 19.6 MiB | 2021 Jun 05 18:42 |
Stack Overflow Considered Harmful -- The Impact of Copy&Paste on Android Application Security.eng.srt | 45.9 KiB | 2019 Oct 01 00:29 |
Stack Overflow Considered Harmful -- The Impact of Copy&Paste on Android Application Security.mp4 | 25.1 MiB | 2021 Jun 05 18:42 |
SymCerts - Practical Symbolic Execution For Exposing Noncompliance in X.509 Certificate Validation.eng.srt | 52.3 KiB | 2019 Oct 01 00:29 |
SymCerts - Practical Symbolic Execution For Exposing Noncompliance in X.509 Certificate Validation.mp4 | 32.7 MiB | 2021 Jun 05 18:42 |
SysPal System-guided Pattern Locks for Android.eng.srt | 40.9 KiB | 2019 Oct 01 00:29 |
SysPal System-guided Pattern Locks for Android.mp4 | 30.0 MiB | 2021 Jun 05 18:42 |
To Catch a Ratter - Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild.eng.srt | 42.0 KiB | 2019 Oct 01 00:29 |
To Catch a Ratter - Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild.mp4 | 25.6 MiB | 2021 Jun 05 18:42 |
Towards Evaluating the Robustness of Neural Networks.eng.srt | 67.9 KiB | 2019 Oct 01 00:29 |
Towards Evaluating the Robustness of Neural Networks.mp4 | 22.7 MiB | 2021 Jun 05 18:42 |
Under the Shadow of Sunshine - Understanding & Detecting Bulletproof Hosting.eng.srt | 31.6 KiB | 2019 Oct 01 00:29 |
Under the Shadow of Sunshine - Understanding & Detecting Bulletproof Hosting.mp4 | 18.6 MiB | 2021 Jun 05 18:42 |
VUDDY - A Scalable Approach for Vulnerable Code Clone Discovery.eng.srt | 45.1 KiB | 2019 Oct 01 00:29 |
VUDDY - A Scalable Approach for Vulnerable Code Clone Discovery.mp4 | 33.9 MiB | 2021 Jun 05 18:42 |
Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate.eng.srt | 66.2 KiB | 2019 Oct 01 00:28 |
Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate.mp4 | 30.2 MiB | 2021 Jun 05 18:42 |
Verifying and Synthesizing Constant-Resource Implementations with Types.eng.srt | 39.6 KiB | 2019 Oct 01 00:29 |
Verifying and Synthesizing Constant-Resource Implementations with Types.mp4 | 24.0 MiB | 2021 Jun 05 18:42 |
XHOUND - Quantifying the Fingerprintability of Browser Extensions.eng.srt | 47.0 KiB | 2019 Oct 01 00:29 |
XHOUND - Quantifying the Fingerprintability of Browser Extensions.mp4 | 28.0 MiB | 2021 Jun 05 18:42 |
Your Exploit is Mine - Automatic Shellcode Transplant for Remote Exploits.eng.srt | 42.5 KiB | 2019 Oct 01 00:28 |
Your Exploit is Mine - Automatic Shellcode Transplant for Remote Exploits.mp4 | 21.8 MiB | 2021 Jun 05 18:42 |
vSQL - Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases.eng.srt | 48.3 KiB | 2019 Oct 01 00:29 |
vSQL - Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases.mp4 | 29.6 MiB | 2021 Jun 05 18:42 |