Parent directory/ | - | - |
A Formal Treatment of Accountable Proxying over TLS.eng.srt | 57.1 KiB | 2019 Oct 01 00:30 |
A Formal Treatment of Accountable Proxying over TLS.mp4 | 27.4 MiB | 2021 Jun 05 23:14 |
A Machine Learning Approach to Prevent Malicious Calls Over Telephony Networks.eng.srt | 45.9 KiB | 2019 Oct 01 00:30 |
A Machine Learning Approach to Prevent Malicious Calls Over Telephony Networks.mp4 | 28.9 MiB | 2021 Jun 05 23:14 |
A Tale of Two Studies - The Best and Worst of YubiKey Usability.eng.srt | 48.9 KiB | 2019 Oct 01 00:30 |
A Tale of Two Studies - The Best and Worst of YubiKey Usability.mp4 | 18.1 MiB | 2021 Jun 05 23:14 |
AI2 - Safety and Robustness Certification of Neural Networks.eng.srt | 33.0 KiB | 2019 Oct 01 00:30 |
AI2 - Safety and Robustness Certification of Neural Networks.mp4 | 16.1 MiB | 2021 Jun 05 23:14 |
Angora - Efficient Fuzzing by Principled Search.eng.srt | 37.0 KiB | 2019 Oct 01 00:30 |
Angora - Efficient Fuzzing by Principled Search.mp4 | 25.9 MiB | 2021 Jun 05 23:14 |
Anonymity Trilemma - Strong Anonymity, Low Bandwidth Overhead, Low Latency -- Choose Two.eng.srt | 44.4 KiB | 2019 Oct 01 00:30 |
Anonymity Trilemma - Strong Anonymity, Low Bandwidth Overhead, Low Latency -- Choose Two.mp4 | 19.9 MiB | 2021 Jun 05 23:14 |
Another Flip in the Wall of Rowhammer Defenses.eng.srt | 60.8 KiB | 2019 Oct 01 00:30 |
Another Flip in the Wall of Rowhammer Defenses.mp4 | 27.0 MiB | 2021 Jun 05 23:14 |
Blue Note - How Intentional Acoustic Interference Damages Availablity and Integrity -.eng.srt | 59.0 KiB | 2019 Oct 01 00:30 |
Blue Note - How Intentional Acoustic Interference Damages Availablity and Integrity -.mp4 | 27.0 MiB | 2021 Jun 05 23:14 |
Bulletproofs - Short Proofs for Confidential Transactions and More.eng.srt | 57.4 KiB | 2019 Oct 01 00:30 |
Bulletproofs - Short Proofs for Confidential Transactions and More.mp4 | 23.4 MiB | 2021 Jun 05 23:14 |
Compiler-assisted Code Randomization.eng.srt | 38.0 KiB | 2019 Oct 01 00:30 |
Compiler-assisted Code Randomization.mp4 | 24.1 MiB | 2021 Jun 05 23:14 |
Computer Security and Privacy for Refugees in the United States.eng.srt | 64.9 KiB | 2019 Oct 01 00:30 |
Computer Security and Privacy for Refugees in the United States.mp4 | 22.0 MiB | 2021 Jun 05 23:14 |
Crowd-GPS-Sec - Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks.mp4 | 20.3 MiB | 2021 Jun 05 23:14 |
DEEPSEC - Deciding Equivalence Properties in Security Protocols - Theory and Practice.eng.srt | 40.4 KiB | 2019 Oct 01 00:30 |
DEEPSEC - Deciding Equivalence Properties in Security Protocols - Theory and Practice.mp4 | 16.7 MiB | 2021 Jun 05 23:14 |
Distance-Bounding Protocols - Verification without Time and Location.eng.srt | 51.5 KiB | 2019 Oct 01 00:30 |
Distance-Bounding Protocols - Verification without Time and Location.mp4 | 25.1 MiB | 2021 Jun 05 23:14 |
Double-efficient zkSNARKs Without Trusted Setup.eng.srt | 64.5 KiB | 2019 Oct 01 00:30 |
Double-efficient zkSNARKs Without Trusted Setup.mp4 | 24.4 MiB | 2021 Jun 05 23:14 |
Enabling Autonomous IoT Device Pairing using Different Sensor Types.eng.srt | 55.4 KiB | 2019 Oct 01 00:30 |
Enabling Autonomous IoT Device Pairing using Different Sensor Types.mp4 | 26.3 MiB | 2021 Jun 05 23:14 |
EnclaveDB - A Secure Database using SGX.eng.srt | 63.9 KiB | 2019 Oct 01 00:30 |
EnclaveDB - A Secure Database using SGX.mp4 | 22.4 MiB | 2021 Jun 05 23:14 |
Enumerating Active IPv6 Hosts for Large-scale Security Scans via DNSSEC-signed Reverse Zones.eng.srt | 60.1 KiB | 2019 Oct 01 00:30 |
Enumerating Active IPv6 Hosts for Large-scale Security Scans via DNSSEC-signed Reverse Zones.mp4 | 23.3 MiB | 2021 Jun 05 23:14 |
EyeTell - Video-Assisted Touchscreen Keystroke Inference from Eye Movements.eng.srt | 42.4 KiB | 2019 Oct 01 00:30 |
EyeTell - Video-Assisted Touchscreen Keystroke Inference from Eye Movements.mp4 | 25.6 MiB | 2021 Jun 05 23:14 |
FP-Stalker - Tracking Browser Fingerprint Evolutions - Antoine Vastel.eng.srt | 49.6 KiB | 2019 Oct 01 00:30 |
FP-Stalker - Tracking Browser Fingerprint Evolutions - Antoine Vastel.mp4 | 18.0 MiB | 2021 Jun 05 23:14 |
FPGA-Based Remote Power Side-Channel Attacks.eng.srt | 40.8 KiB | 2019 Oct 01 00:30 |
FPGA-Based Remote Power Side-Channel Attacks.mp4 | 19.1 MiB | 2021 Jun 05 23:14 |
FuturesMEX - Secure, Distributed Futures Market Exchange.eng.srt | 46.0 KiB | 2019 Oct 01 00:30 |
FuturesMEX - Secure, Distributed Futures Market Exchange.mp4 | 25.1 MiB | 2021 Jun 05 23:14 |
Grand Pwning Unit - Accelerating Microarchitectural Attacks with the GPU.eng.srt | 52.5 KiB | 2019 Oct 01 00:30 |
Grand Pwning Unit - Accelerating Microarchitectural Attacks with the GPU.mp4 | 21.3 MiB | 2021 Jun 05 23:14 |
Hackers vs. Testers - A Comparison of Software Vulnerability Discovery Processes.eng.srt | 62.9 KiB | 2019 Oct 01 00:30 |
Hackers vs. Testers - A Comparison of Software Vulnerability Discovery Processes.mp4 | 24.8 MiB | 2021 Jun 05 23:14 |
Implementing Conjunction Obfuscation under Entropic Ring LWE.eng.srt | 47.7 KiB | 2019 Oct 01 00:30 |
Implementing Conjunction Obfuscation under Entropic Ring LWE.mp4 | 22.5 MiB | 2021 Jun 05 23:14 |
Impossibility of Precise and Sound Termination-Sensitive Security Enforcements.eng.srt | 41.7 KiB | 2019 Oct 01 00:30 |
Impossibility of Precise and Sound Termination-Sensitive Security Enforcements.mp4 | 18.9 MiB | 2021 Jun 05 23:14 |
Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage.eng.srt | 50.4 KiB | 2019 Oct 01 00:30 |
Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage.mp4 | 20.8 MiB | 2021 Jun 05 23:14 |
Learning from Mutants - Using Code Mutation to Learn and Monitor Invariants of a CPS.eng.srt | 54.5 KiB | 2019 Oct 01 00:30 |
Learning from Mutants - Using Code Mutation to Learn and Monitor Invariants of a CPS.mp4 | 22.7 MiB | 2021 Jun 05 23:14 |
Locally Differentially Private Frequent Itemset Mining.eng.srt | 34.3 KiB | 2019 Oct 01 00:30 |
Locally Differentially Private Frequent Itemset Mining.mp4 | 21.2 MiB | 2021 Jun 05 23:14 |
Manipulating Machine Learning - Poisoning Attacks & Countermeasures.eng.srt | 48.9 KiB | 2019 Oct 01 00:30 |
Manipulating Machine Learning - Poisoning Attacks & Countermeasures.mp4 | 22.5 MiB | 2021 Jun 05 23:14 |
Mobile Application Web API Reconnaissance.eng.srt | 46.9 KiB | 2019 Oct 01 00:30 |
Mobile Application Web API Reconnaissance.mp4 | 22.9 MiB | 2021 Jun 05 23:14 |
Oblix - An Efficient Oblivious Search Index.eng.srt | 48.7 KiB | 2019 Oct 01 00:30 |
Oblix - An Efficient Oblivious Search Index.mp4 | 17.9 MiB | 2021 Jun 05 23:14 |
OmniLedger - A Secure, Scale-Out, Decentralized Ledger via Sharding.mp4 | 22.3 MiB | 2021 Jun 05 23:14 |
On Enforcing the Digital Immunity of a Large Humanitarian Organization.eng.srt | 50.1 KiB | 2019 Oct 01 00:30 |
On Enforcing the Digital Immunity of a Large Humanitarian Organization.mp4 | 24.6 MiB | 2021 Jun 05 23:14 |
On the Economics of Offline Password Cracking.eng.srt | 49.7 KiB | 2019 Oct 01 00:30 |
On the Economics of Offline Password Cracking.mp4 | 27.2 MiB | 2021 Jun 05 23:14 |
Opening Remarks of the 39th IEEE Symposium on Security & Privacy.eng.srt | 51.9 KiB | 2019 Oct 01 00:30 |
Opening Remarks of the 39th IEEE Symposium on Security & Privacy.mp4 | 20.2 MiB | 2021 Jun 05 23:14 |
PIR with Compressed Queries and Amortized Query Processing.eng.srt | 57.4 KiB | 2019 Oct 01 00:30 |
PIR with Compressed Queries and Amortized Query Processing.mp4 | 24.8 MiB | 2021 Jun 05 23:14 |
Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels.eng.srt | 60.1 KiB | 2019 Oct 01 00:30 |
Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels.mp4 | 25.5 MiB | 2021 Jun 05 23:14 |
Privacy Risks with Facebook's PII-based Targeting.eng.srt | 51.8 KiB | 2019 Oct 01 00:30 |
Privacy Risks with Facebook's PII-based Targeting.mp4 | 21.4 MiB | 2021 Jun 05 23:14 |
Protecting the Stack with Metadata Policies and Tagged Hardware.eng.srt | 64.3 KiB | 2019 Oct 01 00:30 |
Protecting the Stack with Metadata Policies and Tagged Hardware.mp4 | 23.6 MiB | 2021 Jun 05 23:14 |
Racing in Hyperspace - Closing Hyper Threading Side Channels on SGX.eng.srt | 41.8 KiB | 2019 Oct 01 00:30 |
Racing in Hyperspace - Closing Hyper Threading Side Channels on SGX.mp4 | 22.0 MiB | 2021 Jun 05 23:14 |
Routing Around Congestion - Defeating DDoS Attacks and Adverse Network Conditions via Reactive....eng.srt | 73.5 KiB | 2019 Oct 01 00:30 |
Routing Around Congestion - Defeating DDoS Attacks and Adverse Network Conditions via Reactive....mp4 | 28.6 MiB | 2021 Jun 05 23:14 |
Secure Device Bootstrapping without Secrets Resistant to Signal Manipulation Attacks.eng.srt | 35.2 KiB | 2019 Oct 01 00:30 |
Secure Device Bootstrapping without Secrets Resistant to Signal Manipulation Attacks.mp4 | 19.0 MiB | 2021 Jun 05 23:14 |
SoK - Keylogging Side Channels.eng.srt | 51.3 KiB | 2019 Oct 01 00:30 |
SoK - Keylogging Side Channels.mp4 | 19.7 MiB | 2021 Jun 05 23:14 |
SoK - Plug & Pray - Today - Understanding USB Insecurity in Versions 1 through C.eng.srt | 45.3 KiB | 2019 Oct 01 00:30 |
SoK - Plug & Pray - Today - Understanding USB Insecurity in Versions 1 through C.mp4 | 20.9 MiB | 2021 Jun 05 23:14 |
Sonar - Detecting SS7 Redirection Attacks With Audio-Based Distance Bounding.eng.srt | 45.8 KiB | 2019 Oct 01 00:30 |
Sonar - Detecting SS7 Redirection Attacks With Audio-Based Distance Bounding.mp4 | 22.7 MiB | 2021 Jun 05 23:14 |
Speechless - Analyzing the Threat to Speech Privacy from Smartphone Motion Sensors.eng.srt | 50.2 KiB | 2019 Oct 01 00:30 |
Speechless - Analyzing the Threat to Speech Privacy from Smartphone Motion Sensors.mp4 | 22.6 MiB | 2021 Jun 05 23:14 |
Static Evaluation of Noninterference using Approximate Model Counting.eng.srt | 41.4 KiB | 2019 Oct 01 00:30 |
Static Evaluation of Noninterference using Approximate Model Counting.mp4 | 24.4 MiB | 2021 Jun 05 23:14 |
Stealing Hyperparameters in Machine Learning.eng.srt | 44.6 KiB | 2019 Oct 01 00:30 |
Stealing Hyperparameters in Machine Learning.mp4 | 20.4 MiB | 2021 Jun 05 23:14 |
Study and Mitigation of Origin Stripping Vulnerabilities in Hybrid-postMessage Enabled Mobile Apps.eng.srt | 44.1 KiB | 2019 Oct 01 00:30 |
Study and Mitigation of Origin Stripping Vulnerabilities in Hybrid-postMessage Enabled Mobile Apps.mp4 | 24.3 MiB | 2021 Jun 05 23:14 |
Surveylance - Automatically Detecting Online Survey Scams.eng.srt | 40.3 KiB | 2019 Oct 01 00:30 |
Surveylance - Automatically Detecting Online Survey Scams.mp4 | 20.3 MiB | 2021 Jun 05 23:14 |
T-Fuzz Fuzzing by Program Transformation - Hui Peng.eng.srt | 43.4 KiB | 2019 Oct 01 00:30 |
T-Fuzz Fuzzing by Program Transformation - Hui Peng.mp4 | 21.3 MiB | 2021 Jun 05 23:14 |
The Cards Aren't Alright - Detecting Counterfeit Gift Cards Using Encoding Jitter.eng.srt | 63.9 KiB | 2019 Oct 01 00:30 |
The Cards Aren't Alright - Detecting Counterfeit Gift Cards Using Encoding Jitter.mp4 | 27.1 MiB | 2021 Jun 05 23:14 |
The Rise of the Citizen Developer - Assessing the Security Impact of Online App Generators.eng.srt | 50.6 KiB | 2019 Oct 01 00:30 |
The Rise of the Citizen Developer - Assessing the Security Impact of Online App Generators.mp4 | 24.1 MiB | 2021 Jun 05 23:14 |
Towards Security and Privacy for Multi User Augmented Reality.eng.srt | 59.6 KiB | 2019 Oct 01 00:30 |
Towards Security and Privacy for Multi User Augmented Reality.mp4 | 24.4 MiB | 2021 Jun 05 23:14 |
Tracking Certificate Misissuance in the Wild.eng.srt | 53.7 KiB | 2019 Oct 01 00:30 |
Tracking Certificate Misissuance in the Wild.mp4 | 19.8 MiB | 2021 Jun 05 23:14 |
Tracking Ransomware End-to-end.eng.srt | 56.4 KiB | 2019 Oct 01 00:30 |
Tracking Ransomware End-to-end.mp4 | 25.0 MiB | 2021 Jun 05 23:14 |
Understanding Linux Malware.eng.srt | 52.6 KiB | 2019 Oct 01 00:30 |
Understanding Linux Malware.mp4 | 18.1 MiB | 2021 Jun 05 23:14 |
When Your Fitness Tracker Betrays You - Quantifying the Predictability....eng.srt | 60.0 KiB | 2019 Oct 01 00:30 |
When Your Fitness Tracker Betrays You - Quantifying the Predictability....mp4 | 25.8 MiB | 2021 Jun 05 23:14 |
vRAM - Faster Verifiable RAM With Program-Independent Preprocessing.eng.srt | 53.7 KiB | 2019 Oct 01 00:30 |
vRAM - Faster Verifiable RAM With Program-Independent Preprocessing.mp4 | 24.3 MiB | 2021 Jun 05 23:14 |
xJsnark - A Framework for Efficient Verifiable Computation.eng.srt | 55.2 KiB | 2019 Oct 01 00:30 |
xJsnark - A Framework for Efficient Verifiable Computation.mp4 | 23.7 MiB | 2021 Jun 05 23:14 |