Parent directory/ | - | - |
A Formal Security Analysis of the W3C Web Payment APIs Attacks and Verification.mp4 | 24.9 MiB | 2022 Sep 05 04:53 |
A Formal Security Analysis of the W3C Web Payment APIs Attacks and Verification.srt | 33.7 KiB | 2022 Sep 03 00:28 |
A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols.mp4 | 23.2 MiB | 2022 Sep 05 04:53 |
A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols.srt | 34.3 KiB | 2022 Sep 03 00:41 |
A Secret-Free Hypervisor Rethinking Isolation in the Age of Speculative Vulnerabilities.mp4 | 13.7 MiB | 2022 Sep 05 04:53 |
A Secret-Free Hypervisor Rethinking Isolation in the Age of Speculative Vulnerabilities.srt | 29.7 KiB | 2022 Sep 03 00:19 |
A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP.mp4 | 18.1 MiB | 2022 Sep 05 04:53 |
A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP.srt | 38.2 KiB | 2022 Sep 03 00:19 |
AccEar Accelerometer Acoustic Eavesdropping with Unconstrained Vocabulary.mp4 | 15.1 MiB | 2022 Sep 05 04:53 |
Adversarial Examples - for Proof-of-Learning.mp4 | 19.7 MiB | 2022 Sep 05 04:53 |
Adversarial Examples - for Proof-of-Learning.srt | 34.0 KiB | 2022 Sep 03 01:19 |
Adversarial Prefetch New Cross-Core Cache Side Channel Attacks.mp4 | 14.2 MiB | 2022 Sep 05 04:53 |
Adversarial Prefetch New Cross-Core Cache Side Channel Attacks.srt | 35.5 KiB | 2022 Sep 03 01:02 |
Analyzing Ground-Truth Data of Mobile Gambling Scam.mp4 | 17.4 MiB | 2022 Sep 05 04:53 |
Analyzing Ground-Truth Data of Mobile Gambling Scam.srt | 27.9 KiB | 2022 Sep 03 01:42 |
Anti-Tamper Radio System-Level Tamper Detection for Computing Systems.mp4 | 26.6 MiB | 2022 Sep 05 04:53 |
Anti-Tamper Radio System-Level Tamper Detection for Computing Systems.srt | 37.4 KiB | 2022 Sep 03 01:35 |
Arbitrary Modulation of Electromagnetic Noise from Unprivileged Software Impacting Emission Security.mp4 | 11.9 MiB | 2022 Sep 05 04:53 |
Arbitrary Modulation of Electromagnetic Noise from Unprivileged Software Impacting Emission Security.srt | 30.0 KiB | 2022 Sep 03 01:26 |
Are We There Yet Timing and Floating-Point Attacks on Differential Privacy Systems.mp4 | 16.1 MiB | 2022 Sep 05 04:53 |
Are We There Yet Timing and Floating-Point Attacks on Differential Privacy Systems.srt | 27.8 KiB | 2022 Sep 03 00:35 |
Asleep at the Keyboard Assessing the Security of GitHub Copilot's Code Contributions.mp4 | 23.9 MiB | 2022 Sep 05 04:53 |
Asleep at the Keyboard Assessing the Security of GitHub Copilot's Code Contributions.srt | 44.7 KiB | 2022 Sep 03 00:36 |
Attacks on Wireless Coexistence.mp4 | 16.9 MiB | 2022 Sep 05 04:53 |
Attacks on Wireless Coexistence.srt | 27.9 KiB | 2022 Sep 03 01:28 |
Augury Using Data Memory-Dependent Prefetchers to Leak Data at Rest.mp4 | 18.2 MiB | 2022 Sep 05 04:53 |
Augury Using Data Memory-Dependent Prefetchers to Leak Data at Rest.srt | 30.6 KiB | 2022 Sep 03 01:04 |
Automated Attack Synthesis by Extracting Finite State Machines from Protocol Specification Documents.mp4 | 14.7 MiB | 2022 Sep 05 04:53 |
Automated Attack Synthesis by Extracting Finite State Machines from Protocol Specification Documents.srt | 43.8 KiB | 2022 Sep 03 00:25 |
BEACON - Directed Grey-Box Fuzzing with Provable Path Pruning.mp4 | 13.6 MiB | 2022 Sep 05 04:53 |
BEACON - Directed Grey-Box Fuzzing with Provable Path Pruning.srt | 38.0 KiB | 2022 Sep 03 00:19 |
Back to the Drawing Board A Critical Evaluation of Poisoning Attacks on Federated Learning.mp4 | 17.9 MiB | 2022 Sep 05 04:53 |
Back to the Drawing Board A Critical Evaluation of Poisoning Attacks on Federated Learning.srt | 37.5 KiB | 2022 Sep 03 01:16 |
Bad Characters Imperceptible NLP Attacks.mp4 | 18.2 MiB | 2022 Sep 05 04:53 |
Bad Characters Imperceptible NLP Attacks.srt | 42.0 KiB | 2022 Sep 03 01:55 |
BadEncoder Backdoor Attacks to Pre-trained Encoders in Self-Supervised Learning.mp4 | 18.3 MiB | 2022 Sep 05 04:53 |
BadEncoder Backdoor Attacks to Pre-trained Encoders in Self-Supervised Learning.srt | 36.9 KiB | 2022 Sep 03 01:58 |
Blacksmith Compromising Target Row Refresh by Rowhammering in the Frequency Domain.mp4 | 21.8 MiB | 2022 Sep 05 04:53 |
Blacksmith Compromising Target Row Refresh by Rowhammering in the Frequency Domain.srt | 36.8 KiB | 2022 Sep 03 00:24 |
COBRA Dynamic Proactive Secret Sharing for Confidential BFT Services.mp4 | 15.0 MiB | 2022 Sep 05 04:53 |
COBRA Dynamic Proactive Secret Sharing for Confidential BFT Services.srt | 31.3 KiB | 2022 Sep 03 01:32 |
Cats vs. Spectre An Axiomatic Approach to Modeling Speculative Execution Attacks.mp4 | 16.3 MiB | 2022 Sep 05 04:53 |
Cats vs. Spectre An Axiomatic Approach to Modeling Speculative Execution Attacks.srt | 38.8 KiB | 2022 Sep 03 00:30 |
CirC Compiler infrastructure for proof systems, software verification, and more.mp4 | 20.4 MiB | 2022 Sep 05 04:53 |
CirC Compiler infrastructure for proof systems, software verification, and more.srt | 45.2 KiB | 2022 Sep 03 01:59 |
Committed to Trust A Qualitative Study on Security & Trust in Open Source Software Projects.mp4 | 13.3 MiB | 2022 Sep 05 04:53 |
Committed to Trust A Qualitative Study on Security & Trust in Open Source Software Projects.srt | 27.3 KiB | 2022 Sep 03 01:52 |
Copy, Right A Testing Framework for Copyright Protection of Deep Learning Models.mp4 | 21.6 MiB | 2022 Sep 05 04:53 |
Copy, Right A Testing Framework for Copyright Protection of Deep Learning Models.srt | 33.4 KiB | 2022 Sep 03 00:39 |
DEPCOMM Graph Summarization on System Audit Logs for Attack Investigation.mp4 | 17.7 MiB | 2022 Sep 05 04:53 |
DEPCOMM Graph Summarization on System Audit Logs for Attack Investigation.srt | 24.5 KiB | 2022 Sep 03 00:49 |
De-Identification's Impact on Minority Representation and Privacy Preservation in the US Census.mp4 | 18.7 MiB | 2022 Sep 05 04:53 |
De-Identification's Impact on Minority Representation and Privacy Preservation in the US Census.srt | 39.9 KiB | 2022 Sep 03 00:34 |
DeepCASE Semi-Supervised Contextual Analysis of Security Events.mp4 | 21.2 MiB | 2022 Sep 05 04:53 |
DeepCASE Semi-Supervised Contextual Analysis of Security Events.srt | 31.4 KiB | 2022 Sep 03 00:49 |
DeepCoFFEA Improved Flow Correlation Attacks on Tor via Metric Learning and Amplification.mp4 | 9.9 MiB | 2022 Sep 05 04:53 |
DeepCoFFEA Improved Flow Correlation Attacks on Tor via Metric Learning and Amplification.srt | 27.1 KiB | 2022 Sep 03 02:01 |
DeepSteal Advanced Model Extractions Leveraging Efficient Weight Stealing in Memories.mp4 | 21.7 MiB | 2022 Sep 05 04:53 |
DeepSteal Advanced Model Extractions Leveraging Efficient Weight Stealing in Memories.srt | 38.7 KiB | 2022 Sep 03 01:14 |
Delay Wreaks Havoc on Your Smart Home Delay-based Automation Interference Attacks.mp4 | 27.3 MiB | 2022 Sep 05 04:53 |
Delay Wreaks Havoc on Your Smart Home Delay-based Automation Interference Attacks.srt | 41.5 KiB | 2022 Sep 03 00:45 |
Deployment of Source Address Validation by Network Operators A Randomized Control Trial.mp4 | 22.0 MiB | 2022 Sep 05 04:53 |
Deployment of Source Address Validation by Network Operators A Randomized Control Trial.srt | 32.9 KiB | 2022 Sep 03 01:47 |
Desperate Times Call for Desperate Measures - User Concerns with Mobile Loan Apps in Kenya.mp4 | 24.0 MiB | 2022 Sep 05 04:53 |
Desperate Times Call for Desperate Measures - User Concerns with Mobile Loan Apps in Kenya.srt | 36.5 KiB | 2022 Sep 03 02:07 |
Device Fingerprinting with Peripheral Timestamps.mp4 | 12.4 MiB | 2022 Sep 05 04:53 |
Differentially Private Histograms in the Shuffle Model from Fake Users.mp4 | 12.3 MiB | 2022 Sep 05 04:53 |
Differentially Private Histograms in the Shuffle Model from Fake Users.srt | 30.7 KiB | 2022 Sep 03 00:34 |
Domains Do Change Their Spots Quantifying Potential Abuse of Residual Trust.mp4 | 26.0 MiB | 2022 Sep 05 04:53 |
Domains Do Change Their Spots Quantifying Potential Abuse of Residual Trust.srt | 43.9 KiB | 2022 Sep 03 01:39 |
Evaluating Physical-Layer BLE Location Tracking Attacks on Mobile Devices.mp4 | 25.9 MiB | 2022 Sep 05 04:53 |
Evaluating Physical-Layer BLE Location Tracking Attacks on Mobile Devices.srt | 48.0 KiB | 2022 Sep 03 01:33 |
Exploit the Last Straw That Breaks Android Systems.mp4 | 18.1 MiB | 2022 Sep 05 04:53 |
Exploit the Last Straw That Breaks Android Systems.srt | 31.6 KiB | 2022 Sep 03 01:45 |
Exposed Infrastructures-Discovery, Attacks and Remediation of Insecure ICS Remote Management Devices.mp4 | 22.5 MiB | 2022 Sep 05 04:53 |
Exposed Infrastructures-Discovery, Attacks and Remediation of Insecure ICS Remote Management Devices.srt | 28.2 KiB | 2022 Sep 03 01:48 |
Finding and Exploiting CPU Features using MSR Templating.mp4 | 19.0 MiB | 2022 Sep 05 04:53 |
Finding and Exploiting CPU Features using MSR Templating.srt | 38.7 KiB | 2022 Sep 03 01:03 |
Formal Model-Driven Discovery of Bluetooth Protocol Design Vulnerabilities.mp4 | 21.3 MiB | 2022 Sep 05 04:53 |
Formal Model-Driven Discovery of Bluetooth Protocol Design Vulnerabilities.srt | 33.1 KiB | 2022 Sep 03 02:00 |
Foundations of Dynamic BFT.mp4 | 18.9 MiB | 2022 Sep 05 04:53 |
Four Attacks and a Proof for Telegram.mp4 | 11.8 MiB | 2022 Sep 05 04:53 |
Four Attacks and a Proof for Telegram.srt | 31.2 KiB | 2022 Sep 03 00:28 |
FuzzUSB Hybrid Stateful Fuzzing of USB Gadget Stacks.mp4 | 21.8 MiB | 2022 Sep 05 04:53 |
FuzzUSB Hybrid Stateful Fuzzing of USB Gadget Stacks.srt | 36.1 KiB | 2022 Sep 03 01:44 |
GREBE Unveiling Exploitation Potential for Linux Kernel Bugs.mp4 | 18.5 MiB | 2022 Sep 05 04:53 |
GREBE Unveiling Exploitation Potential for Linux Kernel Bugs.srt | 27.8 KiB | 2022 Sep 03 02:05 |
Goshawk Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis.mp4 | 15.7 MiB | 2022 Sep 05 04:53 |
Graphics Peeping Unit Exploiting EM Side-Channel Information of GPUs to Eavesdrop on Your Neighbors.mp4 | 20.0 MiB | 2022 Sep 05 04:53 |
Graphics Peeping Unit Exploiting EM Side-Channel Information of GPUs to Eavesdrop on Your Neighbors.srt | 32.7 KiB | 2022 Sep 03 01:01 |
HAMRAZ Resilient Partitioning and Replication.mp4 | 11.8 MiB | 2022 Sep 05 04:53 |
HAMRAZ Resilient Partitioning and Replication.srt | 31.4 KiB | 2022 Sep 03 01:59 |
HardLog Practical Tamper-Proof System Auditing Using a Novel Audit Device.mp4 | 25.3 MiB | 2022 Sep 05 04:53 |
HardLog Practical Tamper-Proof System Auditing Using a Novel Audit Device.srt | 46.3 KiB | 2022 Sep 03 01:35 |
Hark A Deep Learning System for Navigating Privacy Feedback at Scale.mp4 | 14.9 MiB | 2022 Sep 05 04:53 |
Hark A Deep Learning System for Navigating Privacy Feedback at Scale.srt | 35.9 KiB | 2022 Sep 03 02:00 |
Heapster Analyzing the Security of Dynamic Allocators for Monolithic Firmware Images.mp4 | 22.7 MiB | 2022 Sep 05 04:53 |
Heapster Analyzing the Security of Dynamic Allocators for Monolithic Firmware Images.srt | 36.5 KiB | 2022 Sep 03 01:00 |
How Does Usable Security Not End Up in Software Products Results From a Qualitative Interview Study.mp4 | 27.1 MiB | 2022 Sep 05 04:53 |
How Does Usable Security Not End Up in Software Products Results From a Qualitative Interview Study.srt | 39.7 KiB | 2022 Sep 03 00:57 |
How Not to Protect Your IP - An Industry-Wide Break of IEEE 1735 Implementations.mp4 | 18.2 MiB | 2022 Sep 05 04:53 |
How Not to Protect Your IP - An Industry-Wide Break of IEEE 1735 Implementations.srt | 38.6 KiB | 2022 Sep 03 01:23 |
How to Attack and Generate Honeywords.mp4 | 21.1 MiB | 2022 Sep 05 04:53 |
How to Attack and Generate Honeywords.srt | 33.8 KiB | 2022 Sep 03 01:12 |
IEEE S&P 2022 Opening Session.mp4 | 48.8 MiB | 2022 Sep 05 04:53 |
IEEE S&P 2022 Opening Session.srt | 90.0 KiB | 2022 Sep 03 00:18 |
IRQDebloat Reducing Driver Attack Surface in Embedded Devices.mp4 | 21.3 MiB | 2022 Sep 05 04:53 |
IRQDebloat Reducing Driver Attack Surface in Embedded Devices.srt | 34.8 KiB | 2022 Sep 03 01:21 |
IRShield A Countermeasure Against Adversarial Physical-Layer Wireless Sensing.mp4 | 27.9 MiB | 2022 Sep 05 04:53 |
IRShield A Countermeasure Against Adversarial Physical-Layer Wireless Sensing.srt | 37.1 KiB | 2022 Sep 03 01:33 |
Investigating Influencer VPN Ads on YouTube.mp4 | 25.6 MiB | 2022 Sep 05 04:53 |
Investigating Influencer VPN Ads on YouTube.srt | 41.1 KiB | 2022 Sep 03 00:57 |
Investigating the Use of Email Encryption for an Entire University.mp4 | 12.9 MiB | 2022 Sep 05 04:53 |
Investigating the Use of Email Encryption for an Entire University.srt | 36.0 KiB | 2022 Sep 03 00:57 |
Invisible Finger Practical Electromagnetic Interference Attack on Touchscreen Electronic Devices.mp4 | 41.4 MiB | 2022 Sep 05 04:53 |
Invisible Finger Practical Electromagnetic Interference Attack on Touchscreen Electronic Devices.srt | 47.5 KiB | 2022 Sep 03 01:28 |
IronMask Versatile Verification of Masking Security.mp4 | 9.1 MiB | 2022 Sep 05 04:53 |
IronMask Versatile Verification of Masking Security.srt | 31.1 KiB | 2022 Sep 03 00:42 |
Jigsaw Efficient and Scalable Path Constraints Fuzzing.mp4 | 13.7 MiB | 2022 Sep 05 04:53 |
Jigsaw Efficient and Scalable Path Constraints Fuzzing.srt | 31.4 KiB | 2022 Sep 03 00:18 |
K-Scheduler Effective Seed Scheduling for Fuzzing with Graph Centrality Analysis.mp4 | 23.5 MiB | 2022 Sep 05 04:53 |
K-Scheduler Effective Seed Scheduling for Fuzzing with Graph Centrality Analysis.srt | 32.0 KiB | 2022 Sep 03 01:43 |
LangSec Keynote Trojan Source and Bad Characters Invisible Hacks and Reluctant Patching.mp4 | 64.1 MiB | 2022 Sep 05 04:53 |
LangSec Keynote Trojan Source and Bad Characters Invisible Hacks and Reluctant Patching.srt | 134.4 KiB | 2022 Sep 03 02:13 |
LinkTeller Recovering Private Edges from Graph Neural Networks via Influence Analysis.mp4 | 12.2 MiB | 2022 Sep 05 04:53 |
LinkTeller Recovering Private Edges from Graph Neural Networks via Influence Analysis.srt | 29.5 KiB | 2022 Sep 03 01:55 |
Locally Differentially Private Sparse Vector Aggregation.mp4 | 16.8 MiB | 2022 Sep 05 04:53 |
Locally Differentially Private Sparse Vector Aggregation.srt | 33.0 KiB | 2022 Sep 03 00:32 |
Low-Bandwidth Threshold ECDSA via Pseudorandom Correlation Generators.mp4 | 12.9 MiB | 2022 Sep 05 04:53 |
MatRiCT More Efficient Post-Quantum Private Blockchain Payments.mp4 | 17.6 MiB | 2022 Sep 05 04:53 |
MatRiCT More Efficient Post-Quantum Private Blockchain Payments.srt | 38.1 KiB | 2022 Sep 03 01:28 |
Measuring and Mitigating the Risk of IP Reuse on Public Clouds.mp4 | 24.7 MiB | 2022 Sep 05 04:53 |
Measuring and Mitigating the Risk of IP Reuse on Public Clouds.srt | 44.7 KiB | 2022 Sep 03 00:51 |
Membership inference attacks from first principles.mp4 | 21.1 MiB | 2022 Sep 05 04:53 |
Membership inference attacks from first principles.srt | 51.8 KiB | 2022 Sep 03 01:53 |
MeshUp Stateless Cache Side-channel Attack on CPU Mesh.mp4 | 10.6 MiB | 2022 Sep 05 04:53 |
MeshUp Stateless Cache Side-channel Attack on CPU Mesh.srt | 19.3 KiB | 2022 Sep 03 01:05 |
Mind the Gap Studying the Insecurity of Provably Secure Embedded Trusted Execution Architectures.mp4 | 16.8 MiB | 2022 Sep 05 04:53 |
Mind the Gap Studying the Insecurity of Provably Secure Embedded Trusted Execution Architectures.srt | 32.9 KiB | 2022 Sep 03 01:21 |
Mitigating Information Leakage Vulnerabilities with Type-based Data Isolation.mp4 | 23.5 MiB | 2022 Sep 05 04:53 |
Mitigating Information Leakage Vulnerabilities with Type-based Data Isolation.srt | 42.7 KiB | 2022 Sep 03 00:59 |
Model Orthogonalization Class Distance Hardening in Neural Networks for Better Security.mp4 | 15.4 MiB | 2022 Sep 05 04:53 |
Model Orthogonalization Class Distance Hardening in Neural Networks for Better Security.srt | 30.1 KiB | 2022 Sep 03 01:17 |
Model Stealing Attacks Against Inductive Graph Neural Networks.mp4 | 19.7 MiB | 2022 Sep 05 04:53 |
Model Stealing Attacks Against Inductive Graph Neural Networks.srt | 28.5 KiB | 2022 Sep 03 01:15 |
Multi-Server Verifiable Computation of Low-Degree Polynomials.mp4 | 16.5 MiB | 2022 Sep 05 04:53 |
Noise A Library of Verified High-Performance Secure Channel Protocol Implementations.mp4 | 26.1 MiB | 2022 Sep 05 04:53 |
Noise A Library of Verified High-Performance Secure Channel Protocol Implementations.srt | 36.5 KiB | 2022 Sep 03 00:41 |
PCR-Auth Solving Authentication Puzzle Challenges with Encoded Palm Contact Responses.mp4 | 16.4 MiB | 2022 Sep 05 04:53 |
PCR-Auth Solving Authentication Puzzle Challenges with Encoded Palm Contact Responses.srt | 36.6 KiB | 2022 Sep 03 01:25 |
PGPATCH Policy-Guided Logic Bug Patching for Robotic Vehicles.mp4 | 20.3 MiB | 2022 Sep 05 04:53 |
PGPATCH Policy-Guided Logic Bug Patching for Robotic Vehicles.srt | 35.1 KiB | 2022 Sep 03 01:38 |
PICCOLO Exposing Complex Backdoors in NLP Transformer Models.mp4 | 20.0 MiB | 2022 Sep 05 04:53 |
PICCOLO Exposing Complex Backdoors in NLP Transformer Models.srt | 34.4 KiB | 2022 Sep 03 01:57 |
PROTRR Principled yet Optimal In-DRAM Target Row Refresh.mp4 | 16.3 MiB | 2022 Sep 05 04:53 |
PROTRR Principled yet Optimal In-DRAM Target Row Refresh.srt | 33.1 KiB | 2022 Sep 03 00:25 |
Peekaboo A Hub-Based Approach to Enable Transparency in Data Processing within Smart Homes.mp4 | 28.6 MiB | 2022 Sep 05 04:53 |
Peekaboo A Hub-Based Approach to Enable Transparency in Data Processing within Smart Homes.srt | 39.5 KiB | 2022 Sep 03 00:45 |
Phishing in Organizations Findings from a Large-Scale and Long-Term Study.mp4 | 19.9 MiB | 2022 Sep 05 04:53 |
Phishing in Organizations Findings from a Large-Scale and Long-Term Study.srt | 42.4 KiB | 2022 Sep 03 00:56 |
Practical Asynchronous Distributed Key Generation.mp4 | 28.5 MiB | 2022 Sep 05 04:53 |
Practical Asynchronous Distributed Key Generation.srt | 39.6 KiB | 2022 Sep 03 02:10 |
Practical EMV Relay Protection.mp4 | 29.2 MiB | 2022 Sep 05 04:53 |
Practical EMV Relay Protection.srt | 30.1 KiB | 2022 Sep 03 01:35 |
Privacy-from-Birth Protecting Sensed Data from Malicious Sensors with VERSA.mp4 | 22.5 MiB | 2022 Sep 05 04:53 |
Privacy-from-Birth Protecting Sensed Data from Malicious Sensors with VERSA.srt | 42.4 KiB | 2022 Sep 03 01:50 |
Private Nearest Neighbor Search with Sublinear Communication and Malicious Security.mp4 | 16.3 MiB | 2022 Sep 05 04:53 |
Private Nearest Neighbor Search with Sublinear Communication and Malicious Security.srt | 38.6 KiB | 2022 Sep 03 01:12 |
ProVerif with Lemmas, Induction, Fast Subsumption, and Much More.mp4 | 21.5 MiB | 2022 Sep 05 04:53 |
ProVerif with Lemmas, Induction, Fast Subsumption, and Much More.srt | 31.5 KiB | 2022 Sep 03 00:26 |
Property Inference from Poisoning.mp4 | 14.6 MiB | 2022 Sep 05 04:53 |
Property Inference from Poisoning.srt | 33.1 KiB | 2022 Sep 03 01:13 |
Publicly Accountable Robust Multi-Party Computation.mp4 | 20.0 MiB | 2022 Sep 05 04:53 |
Publicly Accountable Robust Multi-Party Computation.srt | 34.2 KiB | 2022 Sep 03 02:00 |
Quantifying Blockchain Extractable Value How dark is the forest.mp4 | 13.9 MiB | 2022 Sep 05 04:53 |
Quantifying Blockchain Extractable Value How dark is the forest.srt | 26.0 KiB | 2022 Sep 03 00:19 |
RT-TEE Real-time System Availability for Cyber-physical Systems using ARM TrustZone.mp4 | 24.1 MiB | 2022 Sep 05 04:53 |
RT-TEE Real-time System Availability for Cyber-physical Systems using ARM TrustZone.srt | 34.3 KiB | 2022 Sep 03 00:19 |
Reconstructing Training Data with Informed Adversaries.mp4 | 21.4 MiB | 2022 Sep 05 04:53 |
Reconstructing Training Data with Informed Adversaries.srt | 41.2 KiB | 2022 Sep 03 01:14 |
Repairing DoS Vulnerability of Real-World Regexes.mp4 | 21.1 MiB | 2022 Sep 05 04:53 |
Repairing DoS Vulnerability of Real-World Regexes.srt | 28.1 KiB | 2022 Sep 03 02:05 |
SAILFISH Vetting Smart Contract State-Inconsistency Bugs in Seconds.mp4 | 15.1 MiB | 2022 Sep 05 04:53 |
SAILFISH Vetting Smart Contract State-Inconsistency Bugs in Seconds.srt | 37.1 KiB | 2022 Sep 03 00:19 |
SIRAJ A Unified Framework for Aggregation of Malicious Entity Detectors.mp4 | 23.1 MiB | 2022 Sep 05 04:53 |
SIRAJ A Unified Framework for Aggregation of Malicious Entity Detectors.srt | 27.1 KiB | 2022 Sep 03 00:47 |
SMILE Secure Memory Introspection for Live Enclave.mp4 | 17.6 MiB | 2022 Sep 05 04:53 |
SMILE Secure Memory Introspection for Live Enclave.srt | 27.9 KiB | 2022 Sep 03 00:21 |
SNARKBlock Federated Anonymous Blocklisting from Hidden Common Input Aggregate Proofs.mp4 | 15.2 MiB | 2022 Sep 05 04:53 |
SNARKBlock Federated Anonymous Blocklisting from Hidden Common Input Aggregate Proofs.srt | 32.9 KiB | 2022 Sep 03 01:12 |
SPURT Scalable Distributed Randomness Beacon with Transparent Setup.mp4 | 21.4 MiB | 2022 Sep 05 04:53 |
SPURT Scalable Distributed Randomness Beacon with Transparent Setup.srt | 31.0 KiB | 2022 Sep 03 02:10 |
SYMBEXCEL Automated Analysis and Understanding of Malicious Excel 4.0 Macros.mp4 | 19.4 MiB | 2022 Sep 05 04:53 |
SYMBEXCEL Automated Analysis and Understanding of Malicious Excel 4.0 Macros.srt | 36.3 KiB | 2022 Sep 03 01:00 |
Sabre Sender-Anonymous Messaging with Fast Audits.mp4 | 16.1 MiB | 2022 Sep 05 04:53 |
Sabre Sender-Anonymous Messaging with Fast Audits.srt | 36.3 KiB | 2022 Sep 03 02:04 |
Scraping Sticky Leftovers App User Information Left on Servers After Account Deletion.mp4 | 15.2 MiB | 2022 Sep 05 04:53 |
Scraping Sticky Leftovers App User Information Left on Servers After Account Deletion.srt | 39.9 KiB | 2022 Sep 03 01:40 |
SecFloat Accurate Floating-Point meets Secure 2-Party Computation.mp4 | 13.7 MiB | 2022 Sep 05 04:53 |
SecFloat Accurate Floating-Point meets Secure 2-Party Computation.srt | 34.7 KiB | 2022 Sep 03 00:52 |
Security Analysis of the MLS Key Derivation.mp4 | 16.4 MiB | 2022 Sep 05 04:53 |
Security Analysis of the MLS Key Derivation.srt | 28.9 KiB | 2022 Sep 03 02:11 |
Security Foundations for Application-Based Covert Communication Channels.mp4 | 32.5 MiB | 2022 Sep 05 04:53 |
Security Foundations for Application-Based Covert Communication Channels.srt | 49.2 KiB | 2022 Sep 03 02:04 |
ShadeWatcher Recommendation-guided Cyber Threat Analysis using System Audit Records.mp4 | 23.3 MiB | 2022 Sep 05 04:53 |
ShadeWatcher Recommendation-guided Cyber Threat Analysis using System Audit Records.srt | 33.7 KiB | 2022 Sep 03 00:46 |
ShorTor Improving Tor Network Latency via Multi-hop Overlay Routing.mp4 | 9.6 MiB | 2022 Sep 05 04:53 |
SoK Authentication in Augmented and Virtual Reality.mp4 | 14.6 MiB | 2022 Sep 05 04:53 |
SoK Authentication in Augmented and Virtual Reality.srt | 32.4 KiB | 2022 Sep 03 00:43 |
SoK Demystifying Binary Lifters Through the Lens of Downstream Applications.mp4 | 11.8 MiB | 2022 Sep 05 04:53 |
SoK Demystifying Binary Lifters Through the Lens of Downstream Applications.srt | 25.6 KiB | 2022 Sep 03 01:00 |
SoK How Robust is Image Classification Deep Neural Network Watermarking.mp4 | 19.6 MiB | 2022 Sep 05 04:53 |
SoK How Robust is Image Classification Deep Neural Network Watermarking.srt | 32.5 KiB | 2022 Sep 03 00:39 |
SoK Practical Foundations for Software Spectre Defenses.mp4 | 14.6 MiB | 2022 Sep 05 04:53 |
SoK Practical Foundations for Software Spectre Defenses.srt | 31.4 KiB | 2022 Sep 03 00:22 |
SoK Social Cybersecurity.mp4 | 19.0 MiB | 2022 Sep 05 04:53 |
SoK Social Cybersecurity.srt | 43.5 KiB | 2022 Sep 03 01:52 |
SoK The Dual Nature of Technology in Sexual Assault.mp4 | 28.0 MiB | 2022 Sep 05 04:53 |
SoK The Dual Nature of Technology in Sexual Assault.srt | 29.0 KiB | 2022 Sep 03 02:08 |
SoK Unifying and Applying At-Risk User Research.mp4 | 25.2 MiB | 2022 Sep 05 04:53 |
SoK Unifying and Applying At-Risk User Research.srt | 34.4 KiB | 2022 Sep 03 02:09 |
SpecHammer Combining Spectre and Rowhammer for New Speculative Attacks.mp4 | 16.9 MiB | 2022 Sep 05 04:53 |
SpecHammer Combining Spectre and Rowhammer for New Speculative Attacks.srt | 42.9 KiB | 2022 Sep 03 00:23 |
Sphinx Enabling Privacy-Preserving Online Learning over the Cloud.mp4 | 22.4 MiB | 2022 Sep 05 04:53 |
Sphinx Enabling Privacy-Preserving Online Learning over the Cloud.srt | 37.6 KiB | 2022 Sep 03 02:00 |
Spinning Language Models Risks of Propaganda-as-a-Service and Countermeasures.mp4 | 19.2 MiB | 2022 Sep 05 04:53 |
Spinning Language Models Risks of Propaganda-as-a-Service and Countermeasures.srt | 32.5 KiB | 2022 Sep 03 00:37 |
Spiral Fast, High-Rate Single-Server PIR via FHE Composition.mp4 | 19.1 MiB | 2022 Sep 05 04:53 |
Spiral Fast, High-Rate Single-Server PIR via FHE Composition.srt | 38.6 KiB | 2022 Sep 03 01:12 |
Spook.js Attacking Chrome Strict Site Isolation via Speculative Execution.mp4 | 21.7 MiB | 2022 Sep 05 04:53 |
Spook.js Attacking Chrome Strict Site Isolation via Speculative Execution.srt | 32.8 KiB | 2022 Sep 03 00:24 |
Statistical Quantification of Differential Privacy A Local Approach.mp4 | 15.3 MiB | 2022 Sep 05 04:53 |
Statistical Quantification of Differential Privacy A Local Approach.srt | 32.9 KiB | 2022 Sep 03 00:32 |
Surakav Generating Realistic Traces for a Strong Website Fingerprinting Defense.mp4 | 11.2 MiB | 2022 Sep 05 04:53 |
Surakav Generating Realistic Traces for a Strong Website Fingerprinting Defense.srt | 29.6 KiB | 2022 Sep 03 01:08 |
SwarmFlawFinder Discovering and Exploiting Logic Flaws of Swarm Algorithms.mp4 | 31.8 MiB | 2022 Sep 05 04:53 |
SwarmFlawFinder Discovering and Exploiting Logic Flaws of Swarm Algorithms.srt | 43.4 KiB | 2022 Sep 03 01:37 |
TASHAROK-Using Mechanism Design for Enhancing Security Resource Allocation in Interdependent Systems.mp4 | 31.7 MiB | 2022 Sep 05 04:53 |
TASHAROK-Using Mechanism Design for Enhancing Security Resource Allocation in Interdependent Systems.srt | 44.6 KiB | 2022 Sep 03 00:30 |
TROLLMAGNIFIER Detecting State-Sponsored Troll Accounts on Reddit.mp4 | 17.7 MiB | 2022 Sep 05 04:53 |
TROLLMAGNIFIER Detecting State-Sponsored Troll Accounts on Reddit.srt | 38.2 KiB | 2022 Sep 03 01:41 |
The Experts' Insights on the Peer Review Process of Evaluating Security Papers.mp4 | 16.2 MiB | 2022 Sep 05 04:53 |
The Experts' Insights on the Peer Review Process of Evaluating Security Papers.srt | 38.4 KiB | 2022 Sep 03 01:51 |
The State of the SameSite Studying the Usage, Effectiveness, and Adequacy of SameSite Cookies.mp4 | 15.6 MiB | 2022 Sep 05 04:53 |
The State of the SameSite Studying the Usage, Effectiveness, and Adequacy of SameSite Cookies.srt | 34.7 KiB | 2022 Sep 03 01:10 |
They're not that hard to mitigate -What Cryptographic Library Developers Think About Timing Attacks.mp4 | 26.8 MiB | 2022 Sep 05 04:53 |
They're not that hard to mitigate -What Cryptographic Library Developers Think About Timing Attacks.srt | 40.6 KiB | 2022 Sep 03 00:54 |
Time-Print Authenticating USB Flash Drives with Novel Timing Fingerprints.mp4 | 20.8 MiB | 2022 Sep 05 04:53 |
Time-Print Authenticating USB Flash Drives with Novel Timing Fingerprints.srt | 28.0 KiB | 2022 Sep 03 01:25 |
Timing-Based Browsing Privacy Vulnerabilities Via Site Isolation.mp4 | 18.2 MiB | 2022 Sep 05 04:53 |
Timing-Based Browsing Privacy Vulnerabilities Via Site Isolation.srt | 25.6 KiB | 2022 Sep 03 01:06 |
Transcending TRANSCEND Revisiting Malware Classification in the Presence of Concept Drift.mp4 | 18.5 MiB | 2022 Sep 05 04:53 |
Transcending TRANSCEND Revisiting Malware Classification in the Presence of Concept Drift.srt | 36.7 KiB | 2022 Sep 03 00:39 |
Transfer Attacks Revisited A Large-Scale Empirical Study in Real Computer Vision Settings.mp4 | 9.1 MiB | 2022 Sep 05 04:53 |
Transfer Attacks Revisited A Large-Scale Empirical Study in Real Computer Vision Settings.srt | 20.6 KiB | 2022 Sep 03 01:19 |
Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms.mp4 | 13.4 MiB | 2022 Sep 05 04:53 |
Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms.srt | 21.9 KiB | 2022 Sep 03 01:50 |
Universal 3-Dimensional Perturbations for Black-Box Attacks on Video Recognition Systems.mp4 | 18.7 MiB | 2022 Sep 05 04:53 |
Universal 3-Dimensional Perturbations for Black-Box Attacks on Video Recognition Systems.srt | 29.1 KiB | 2022 Sep 03 01:17 |
Universal Atomic Swaps Secure Exchange of Coins Across All Blockchains.mp4 | 13.0 MiB | 2022 Sep 05 04:53 |
Universal Atomic Swaps Secure Exchange of Coins Across All Blockchains.srt | 32.7 KiB | 2022 Sep 03 01:30 |
Using Throughput-Centric Byzantine Broadcast to Tolerate Malicious Majority in Blockchains.mp4 | 16.9 MiB | 2022 Sep 05 04:53 |
Using Throughput-Centric Byzantine Broadcast to Tolerate Malicious Majority in Blockchains.srt | 38.6 KiB | 2022 Sep 03 01:29 |
WIGHT Wired Ghost Touch Attack on Capacitive Touchscreens.mp4 | 19.1 MiB | 2022 Sep 05 04:53 |
Waldo A Private Time-Series Database from Function Secret-Sharing.mp4 | 17.5 MiB | 2022 Sep 05 04:53 |
Waldo A Private Time-Series Database from Function Secret-Sharing.srt | 37.6 KiB | 2022 Sep 03 02:00 |
Why Crypto-detectors Fail A Systematic Evaluation of Cryptographic Misuse Detection Techniques.mp4 | 12.5 MiB | 2022 Sep 05 04:53 |
Why Crypto-detectors Fail A Systematic Evaluation of Cryptographic Misuse Detection Techniques.srt | 31.5 KiB | 2022 Sep 03 00:53 |
Wobfuscator Obfuscating JavaScript Malware via Opportunistic Translation to WebAssembly.mp4 | 19.5 MiB | 2022 Sep 05 04:53 |
Wobfuscator Obfuscating JavaScript Malware via Opportunistic Translation to WebAssembly.srt | 42.8 KiB | 2022 Sep 03 01:10 |
WtaGraph Web Tracking and Advertising Detection using Graph Neural Networks.mp4 | 16.7 MiB | 2022 Sep 05 04:53 |
WtaGraph Web Tracking and Advertising Detection using Graph Neural Networks.srt | 38.1 KiB | 2022 Sep 03 01:08 |
ZeeStar Private Smart Contracts by Homomorphic Encryption and Zero-knowledge Proofs.mp4 | 14.7 MiB | 2022 Sep 05 04:53 |
ZeeStar Private Smart Contracts by Homomorphic Encryption and Zero-knowledge Proofs.srt | 38.3 KiB | 2022 Sep 03 00:19 |
mmSpy Spying Phone Calls using mmWave Radars.mp4 | 18.5 MiB | 2022 Sep 05 04:53 |
mmSpy Spying Phone Calls using mmWave Radars.srt | 39.8 KiB | 2022 Sep 03 01:27 |
vSGX Virtualizing SGX Enclaves on AMD SEV.mp4 | 22.2 MiB | 2022 Sep 05 04:53 |
vSGX Virtualizing SGX Enclaves on AMD SEV.srt | 37.0 KiB | 2022 Sep 03 00:19 |