Toggle navigation
About
Blog
Subscribe
Log in
About
Blog
Subscribe
Log in
Topic: Security
Follow
Followers: 0
Security At Devops Speed
Ryan Sheldrake
(Sonatype)
DevOps
Security
11.20.2017
at DevOpsDays Warsaw
, Warsaw
The State of Node.js Security
Tim Kadlec
(Snyk)
NodeJS
Security
10.04.2017
at Node.js Interactive
, Vancouver
DevOps For Application Security
Krzysztof Kopera
(Intelligent Services)
DevOps
Security
11.20.2017
at DevOpsDays Warsaw
, Warsaw
FOCI '20 - MIMIQ: Masking IPs with Migration in QUIC
Security
09.15.2020
FOCI '20 - HTTPT: A Probe-Resistant Proxy
Security
09.15.2020
FOCI '20 - Identifying Disinformation Websites Using Infrastructure Features
Security
09.15.2020
FOCI '20 - A Comprehensive Study of DNS-over-HTTPS Downgrade Attack
Security
09.15.2020
FOCI '20 - Triplet Censors: Demystifying Great Firewall’s DNS Censorship Behavior
Security
09.15.2020
FOCI '20 - Turbo Tunnel, a good way to design censorship circumvention protocols
Security
09.15.2020
FOCI '20 - Detecting and Evading Censorship-in-Depth: A Case Study of Iran’s Protocol Whitelister
Security
09.15.2020
CSET '20 - Expansion of ICS Testbed for Security Validation based on MITRE ATT&CK Techniques
Security
09.15.2020
CSET '20 - On Design and Enhancement of Smart Grid Honeypot System for Practical Collection...
Security
09.15.2020
CSET '20 - Toward Orchestration of Complex Networking Experiments
Security
09.15.2020
CSET '20 - ICS Testbed Tetris: Practical Building Blocks Towards a Cyber Security Resource
Security
09.15.2020
CSET '20 - Representativeness in the Benchmark for Vulnerability Analysis Tools (B-VAT)
Security
09.15.2020
CSET '20 - Bridging Missing Gaps in Evaluating DDoS Research
Security
09.15.2020
CSET '20 - Towards Adversarial Phishing Detection
Security
09.15.2020
CSET '20 - HAI 1.0: HIL-based Augmented ICS Security Dataset
Security
09.15.2020
CSET '20 - APTGen: An Approach towards Generating Practical Dataset Labelled with Targeted...
Security
09.15.2020
CSET '20 - UBCIS: Ultimate Benchmark for Container Image Scanning
Security
09.15.2020
WOOT '20 - OS Security Is Hard: Why All the Fuzzers in the World Won't Change the Way...
Security
09.15.2020
WOOT '20 - Firmware Insider: Bluetooth Randomness is Mostly Random
Security
09.15.2020
WOOT '20 - One Exploit to Rule them All? On the Security of Drop-in Replacement and Counterfeit...
Security
09.15.2020
WOOT '20 - Automatic Generation of Compact Printable Shellcodes for x86
Security
09.15.2020
WOOT '20 - Hardware Security Is Hard: How Hardware Boundaries Define Platform Security
Security
09.15.2020
WOOT '20 - ToothPicker: Apple Picking in the iOS Bluetooth Stack
Security
09.15.2020
WOOT '20 - Unearthing the TrustedCore: A Critical Review on Huawei’s Trusted Execution Environment
Security
09.15.2020
WOOT '20 - When Is a Proof Actually Not?
Security
09.15.2020
WOOT '20 - Bankrupt Covert Channel: Turning Network Predictability into Vulnerability
Security
09.15.2020
WOOT '20 - AFL++ : Combining Incremental Steps of Fuzzing Research
Security
09.15.2020
WOOT '20 - BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy
Security
09.15.2020
WOOT '20 - NFCGate: Opening the Door for NFC Security Research with a Smartphone-Based Toolkit
Security
09.15.2020
WOOT '20 - Office Document Security and Privacy
Security
09.15.2020
CSET '20 - Historical Analysis of Exploit Availability Timelines
Security
09.15.2020
WOOT '20 - Exploiting Uses of Uninitialized Stack Variables in Linux Kernels to Leak Kernel Pointers
Security
09.15.2020
WOOT '20 - When Oblivious is Not: Attacks against OPAM
Security
09.15.2020
USENIX Security '20 - MIRAGE: Succinct Arguments for Randomized Algorithms with Applications
Security
09.15.2020
USENIX Security '20 - EcoFuzz: Adaptive Energy-Saving Greybox Fuzzing as a Variant
Security
09.15.2020
USENIX Security '20 - Delphi: A Cryptographic Inference Service for Neural Networks
Security
09.15.2020
USENIX Security '20 - TPM-FAIL: TPM meets Timing and Lattice Attacks
Security
09.15.2020
USENIX Security '20 - Automating the Development of Chosen Ciphertext Attacks
Security
09.15.2020
USENIX Security '20 - FuzzGuard: Filtering out Unreachable Inputs in Directed Grey-box Fuzzing
Security
09.15.2020
USENIX Security '20 - Analysis of DTLS Implementations Using Protocol State Fuzzing
Security
09.15.2020
USENIX Security '20 - Preech: A System for Privacy-Preserving Speech Transcription
Security
09.15.2020
USENIX Security '20 - Silhouette: Efficient Protected Shadow Stacks for Embedded Systems
Security
09.15.2020
USENIX Security '20 - Temporal System Call Specialization for Attack Surface Reduction
Security
09.15.2020
USENIX Security '20 - Local Model Poisoning Attacks to Byzantine-Robust Federated Learning
Security
09.15.2020
USENIX Security '20 - Big Numbers - Big Troubles: Systematically Analyzing Nonce Leakage in (EC)DSA
Security
09.15.2020
USENIX Security '20 - Exploring Connections Between Active Learning and Model Extraction
Security
09.15.2020
USENIX Security '20 - An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses
Security
09.15.2020
USENIX Security '20 - RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache
Security
09.15.2020
USENIX Security '20 - HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation
Security
09.15.2020
USENIX Security '20 - DECAF: Automatic, Adaptive De-bloating and Hardening of COTS Firmware
Security
09.15.2020
USENIX Security '20 - The Ballot is Busted Before the Blockchain: A Security Analysis of Voatz
Security
09.15.2020
USENIX Security '20 - High Accuracy and High Fidelity Extraction of Neural Networks
Security
09.15.2020
USENIX Security '20 - Boxer: Preventing fraud by scanning credit cards
Security
09.15.2020
USENIX Security '20 - Stolen Memories: Leveraging Model Memorization for Calibrated White-Box
Security
09.15.2020
USENIX Security '20 - Detecting Stuffing of a User’s Credentials at Her Own Accounts
Security
09.15.2020
USENIX Security '20 - TXSPECTOR: Uncovering Attacks in Ethereum from Transactions
Security
09.15.2020
USENIX Security '20 - SANNS: Scaling Up Secure Approximate k-Nearest Neighbors Search
Security
09.15.2020
USENIX Security '20 - SkillExplorer: Understanding the Behavior of Skills in Large Scale
Security
09.15.2020
USENIX Security '20 - Pancake: Frequency Smoothing for Encrypted Data Stores
Security
09.15.2020
USENIX Security '20 - MUZZ: Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded
Security
09.15.2020
USENIX Security '20 - Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine
Security
09.15.2020
USENIX Security '20 - SEAL: Attack Mitigation for Encrypted Databases via Adjustable Leakage
Security
09.15.2020
USENIX Security '20 - Scaling Verifiable Computation Using Efficient Set Accumulators
Security
09.15.2020
USENIX Security '20 - Composition Kills: A Case Study of Email Sender Authentication
Security
09.15.2020
USENIX Security '20 - A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis
Security
09.15.2020
USENIX Security '20 - Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines
Security
09.15.2020
USENIX Security '20 - On Training Robust PDF Malware Classifiers
Security
09.15.2020
USENIX Security '20 - DatashareNetwork: A Decentralized Privacy-Preserving Search Engine
Security
09.15.2020
USENIX Security '20 - Estonian Electronic Identity Card: Security Flaws in Key Management
Security
09.15.2020
USENIX Security '20 - NetWarden: Mitigating Network Covert Channels while Preserving Performance
Security
09.15.2020
USENIX Security '20 - The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis
Security
09.15.2020
USENIX Security '20 - Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote
Security
09.15.2020
USENIX Security '20 - SHA-1 is a Shambles: First Chosen-Prefix Collision on SHA-1 and Application
Security
09.15.2020
USENIX Security '20 - Automatic Hot Patch Generation for Android Kernels
Security
09.15.2020
USENIX Security '20 - A Formal Analysis of IEEE 802.11's WPA2: Countering the Kracks Caused by...
Security
09.15.2020
USENIX Security '20 - You Are What You Broadcast: Identification of Mobile and IoT Devices...
Security
09.15.2020
USENIX Security '20 - What Twitter Knows: Characterizing Ad Targeting Practices, User Perceptions...
Security
09.15.2020
USENIX Security '20 - Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation...
Security
09.15.2020
USENIX Security '20 - Towards HTTPS Everywhere on Android: We Are Not There Yet
Security
09.15.2020
USENIX Security '20 - Understanding security mistakes developers make: Qualitative analysis...
Security
09.15.2020
USENIX Security '20 - Sys: A Static/Symbolic Tool for Finding Good Bugs in Good (Browser) Code
Security
09.15.2020
USENIX Security '20 - SmartVerif: Push the Limit of Automation Capability of Verifying Security...
Security
09.15.2020
USENIX Security '20 - AURORA: Statistical Crash Analysis for Automated Root Cause Explanation
Security
09.15.2020
USENIX Security '20 - Symbolic execution with SymCC: Don't interpret, compile!
Security
09.15.2020
USENIX Security '20 - Fawkes: Protecting Privacy against Unauthorized Deep Learning Models
Security
09.15.2020
USENIX Security '20 - P2IM: Scalable and Hardware-independent Firmware Testing via Automatic
Security
09.15.2020
USENIX Security '20 - Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning
Security
09.15.2020
USENIX Security '20 - Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow
Security
09.15.2020
USENIX Security '20 - Interpretable Deep Learning under Fire
Security
09.15.2020
USENIX Security '20 - TextShield: Robust Text Classification Based on Multimodal Embedding
Security
09.15.2020
USENIX Security '20 - ParmeSan: Sanitizer-guided Greybox Fuzzing
Security
09.15.2020
USENIX Security '20 - Hall Spoofing: A Non-Invasive DoS Attack on Grid-Tied Solar Inverter
Security
09.15.2020
SpecFuzz: Bringing Spectre-type vulnerabilities to the surface
Security
09.27.2020
USENIX Security '20 - iOS, Your OS, Everybody's OS: Vetting and Analyzing Network Services of iOS
Security
09.15.2020
USENIX Security '20 - The Unpatchable Silicon: A Full Break of the Bitstream Encryption of Xilinx
Security
09.15.2020
USENIX Security '20 - (Mostly) Exitless VM Protection from Untrusted Hypervisor through Disaggregate
Security
09.15.2020
USENIX Security '20 - Human Distinguishable Visual Key Fingerprints
Security
09.15.2020
USENIX Security '20 - Devil’s Whisper: A General Approach for Physical Adversarial Attacks
Security
09.15.2020
USENIX Security '20 - FANS: Fuzzing Android Native System Services via Automated Interface Analysis
Security
09.15.2020
USENIX Security '20 - The Impact of Ad-Blockers on Product Search and Purchase Behavior
Security
09.15.2020
USENIX Security '20 - Chaperone: Real-time Locking and Loss Prevention for Smartphones
Security
09.15.2020
USENIX Security '20 - Call Me Maybe: Eavesdropping Encrypted LTE Calls With ReVoLTE
Security
09.15.2020
USENIX Security '20 - From Needs to Actions to Secure Apps? The Effect of Requirements...
Security
09.15.2020
USENIX Security '20 - BigMAC: Fine-Grained Policy Analysis of Android Firmware
Security
09.15.2020
USENIX Security '20 - DELF: Safeguarding deletion correctness in Online Social Networks
Security
09.15.2020
USENIX Security '20 - McTiny: Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers
Security
09.15.2020
USENIX Security '20 - FIRMSCOPE: Automatic Uncovering of Privilege-Escalation Vulnerabilities
Security
09.15.2020
USENIX Security '20 - Fuzzing Error Handling Code using Context-Sensitive Software Fault Injection
Security
09.15.2020
USENIX Security '20 - Cardpliance: PCI DSS Compliance of Android Applications
Security
09.15.2020
USENIX Security '20 - Visor: Privacy-Preserving Video Analytics as a Cloud Service
Security
09.15.2020
USENIX Security '20 - Justinian's GAAvernor: Robust Distributed Learning with Gradient Aggregation
Security
09.15.2020
USENIX Security '20 - Empirical Measurement of Systemic 2FA Usability
Security
09.15.2020
USENIX Security '20 - A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web
Security
09.15.2020
USENIX Security '20 - Differentially-Private Control-Flow Node Coverage for Software Usage Analysis
Security
09.15.2020
USENIX Security '20 - Liveness is Not Enough: Enhancing Fingerprint Authentication with Behavioral
Security
09.15.2020
USENIX Security '20 - FuzzGen: Automatic Fuzzer Generation
Security
09.15.2020
USENIX Security '20 - An Observational Investigation of Reverse Engineers’ Processes
Security
09.15.2020
USENIX Security '20 - 'I have too much respect for my elders': Understanding South African Mobile
Security
09.15.2020
USENIX Security '20 - Void: A fast and light voice liveness detection system
Security
09.15.2020
USENIX Security '20 - Plug-N-Pwned: Comprehensive Vulnerability Analysis of OBD-II Dongles...
Security
09.15.2020
USENIX Security '20 - An Off-Chip Attack on Hardware Enclaves via the Memory Bus
Security
09.15.2020
USENIX Security '20 - MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures
Security
09.15.2020
USENIX Security '20 - PHMon: A Programmable Hardware Monitor and Its Security Use Cases
Security
09.15.2020
USENIX Security '20 - EPIC: Every Packet Is Checked in the Data Plane of a Path-Aware Internet
Security
09.15.2020
USENIX Security '20 - HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution...
Security
09.15.2020
USENIX Security '20 - APEX: A Verified Architecture for Proofs of Execution on Remote Devices...
Security
09.15.2020
USENIX Security '20 - PhishTime: Continuous Longitudinal Measurement of the Effectiveness...
Security
09.15.2020
USENIX Security '20 - Horizontal Privilege Escalation in Trusted Applications
Security
09.15.2020
USENIX Security '20 - Programmable In-Network Security for Context-aware BYOD Policies
Security
09.15.2020
USENIX Security '20 - Drift with Devil: Security of Multi-Sensor Fusion based Localization...
Security
09.15.2020
USENIX Security '20 - Towards Robust LiDAR-based Perception in Autonomous Driving: General Black-box
Security
09.15.2020
USENIX Security '20 - PARTEMU: Enabling Dynamic Analysis of Real-World TrustZone Software...
Security
09.15.2020
USENIX Security '20 - A different cup of TI? The added value of commercial threat intelligence
Security
09.15.2020
USENIX Security '20 - Stealthy Tracking of Autonomous Vehicles with Cache Side Channels
Security
09.15.2020
USENIX Security '20 - KOOBE: Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write
Security
09.15.2020
USENIX Security '20 - DeepHammer: Depleting the Intelligence of Deep Neural Networks through Target
Security
09.15.2020
USENIX Security '20 - Civet: An Efficient Java Partitioning Framework for Hardware Enclaves
Security
09.15.2020
USENIX Security '20 - SENG, the SGX-Enforcing Network Gateway: Authorizing Communication...
Security
09.15.2020
USENIX Security '20 - Everything Old is New Again: Binary Security of WebAssembly
Security
09.15.2020
USENIX Security '20 - Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT
Security
09.15.2020
USENIX Security '20 - Medusa: Microarchitectural Data Leakage via Automated Attack Synthesis
Security
09.15.2020
USENIX Security '20 - BScout: Direct Whole Patch Presence Test for Java Executables
Security
09.15.2020
USENIX Security '20 - A Longitudinal and Comprehensive Study of the DANE Ecosystem in Email
Security
09.15.2020
USENIX Security '20 - SAVIOR: Securing Autonomous Vehicles with Robust Physical Invariants
Security
09.15.2020
USENIX Security '20 - Data Recovery from “Scrubbed” NAND Flash Storage: Need for Analog Sanitization
Security
09.15.2020
USENIX Security '20 - Datalog Disassembly
Security
09.15.2020
USENIX Security '20 - TeeRex: Discovery and Exploitation of Memory Corruption Vulnerabilities...
Security
09.15.2020
USENIX Security '20 - PCKV: Locally Differentially Private Correlated Key-Value Data Collection
Security
09.15.2020
USENIX Security '20 - PKU Pitfalls: Attacks on PKU-based Memory Isolation Systems
Security
09.15.2020
USENIX Security '20 - Poison Over Troubled Forwarders: A Cache Poisoning Attack Targeting DNS...
Security
09.15.2020
USENIX Security '20 - The Industrial Age of Hacking
Security
09.15.2020
USENIX Security '20 - Achieving Keyless CDNs with Conclaves
Security
09.15.2020
USENIX Security '20 - A Tale of Two Headers: A Formal Analysis of Inconsistent Click-Jacking...
Security
09.15.2020
USENIX Security '20 - Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited
Security
09.15.2020
USENIX Security '20 - CopyCat: Controlled Instruction-Level Attacks on Enclaves
Security
09.15.2020
USENIX Security '20 - ShadowMove: A Stealthy Lateral Movement Strategy
Security
09.15.2020
USENIX Security '20 - Retrofitting Fine Grain Isolation in the Firefox Renderer
Security
09.15.2020
USENIX Security '20 - Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness...
Security
09.15.2020
USENIX Security '20 - V0LTpwn: Attacking x86 Processor Integrity from Software
Security
09.15.2020
USENIX Security '20 - Zero-delay Lightweight Defenses against Website Fingerprinting
Security
09.15.2020
USENIX Security '20 - From Control Model to Program: Investigating Robotic Aerial Vehicle Accidents
Security
09.15.2020
USENIX Security '20 - Who's Calling? Characterizing Robocalls through Audio and Metadata Analysis
Security
09.15.2020
USENIX Security '20 - Adversarial Preprocessing: Understanding and Preventing Image-Scaling Attacks
Security
09.15.2020
USENIX Security '20 - Automatic Techniques to Systematically Discover New Heap Exploitation
Security
09.15.2020
USENIX Security '20 - NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities
Security
09.15.2020
USENIX Security '20 - Cached and Confused: Web Cache Deception in the Wild
Security
09.15.2020
USENIX Security '20 - See No Evil: Phishing for Permissions with False Transparency
Security
09.15.2020
USENIX Security '20 - BesFS: A POSIX Filesystem for Enclaves with a Mechanized Safety Proof
Security
09.15.2020
USENIX Security '20 - Security Analysis of Unified Payments Interface and Payment Apps in India
Security
09.15.2020
SOUPS 2020 - “You still use the password after all” – Exploring FIDO2 Security Keys in a Small
Security
09.21.2020
SOUPS 2020 - From Intent to Action: Nudging Users Towards Secure Mobile Payments
Security
09.21.2020
SOUPS 2020 - Making GDPR Usable (Lightning Talk)
Security
09.21.2020
SOUPS 2020 - An Exploratory Study of Hardware Reverse Engineering — Technical and Cognitive Process
Security
09.21.2020
SOUPS 2020 - Enhancing Privacy through the Visual Design of Privacy Notices: Exploring the Interplay
Security
09.21.2020
SOUPS 2020 - Knock, Knock. Who’s There? On the Security of LG’s Knock Codes
Security
09.21.2020
SOUPS 2020 - An investigation of phishing awareness and education over time: When and how to best
Security
09.21.2020
SOUPS 2020 - Do Privacy and Security Matter to Everyone? Quantifying and Clustering User-Centric
Security
09.21.2020
SOUPS 2020 - Tr(b)usted Identity Proofing (Lightning Talk)
Security
09.21.2020
SOUPS 2020 - Industry Responses to the European Directive on Security of Network and Information
Security
09.21.2020
SOUPS 2020 - Realizing Choice: Online Safeguards for Couples Adapting to Cognitive Challenges
Security
09.21.2020
SOUPS 2020 - Passworld: A Serious Game to Promote Password Awareness and Diversity in an Enterprise
Security
09.21.2020
SOUPS 2020 - End-to-End File Encryption in Browser with Open Source Penumbra (Lightning Talk)
Security
09.21.2020
SOUPS 2020 - Usable Sexurity: Studying People’s Concerns and Strategies When Sexting
Security
09.21.2020
SOUPS 2020 - An Ethnographic Understanding of Software (In)Security and a Co-Creation Model
Security
09.21.2020
SOUPS 2020 - "You've Got Your Nice List of Bugs, Now What?" Vulnerability Discovery and Management
Security
09.21.2020
SOUPS 2020 - "I Have a Narrow Thought Process": Constraints on Explanations Connecting Inferences
Security
09.21.2020
SOUPS 2020 - Blind and Human: Exploring More Usable Audio CAPTCHA Designs
Security
09.21.2020
SOUPS 2020 - Towards Understanding Privacy and Trust in Online Reporting of Sexual Assault
Security
09.21.2020
SOUPS 2020 - Lessons Learnt from Comparing WhatsApp Privacy Concerns Across Saudi and Indian
Security
09.21.2020
SOUPS 2020 - Sustainable, Scalable and Secure IoT Architecture (Lightning Talk)
Security
09.21.2020
SOUPS 2020 - User Mental Models of Cryptocurrency Systems - A Grounded Theory Approach
Security
09.21.2020
SOUPS 2020 - Innovation Inaction or In Action? The Role of User Experience in the Security
Security
09.21.2020
SOUPS 2020 - An Empirical Study of Wireless Carrier Authentication for SIM Swaps
Security
09.21.2020
SOUPS 2020 - Replication: On the Ecological Validity of Online Security Developer Studies
Security
09.21.2020
SOUPS 2020 - How Risky Are Real Users' IFTTT Applets?
Security
09.21.2020
SOUPS 2020 - Cloudy with a Chance of Misconceptions: Exploring Users' Perceptions and Expectations
Security
09.21.2020
SOUPS 2020 - Why Can't Johnny Fix Vulnerabilities: A Usability Evaluation of Static Analysis Tools
Security
09.21.2020
SOUPS 2020- Users Are still Not the Enemy: Applying Security Usability Principles...(Lightning Talk)
Security
09.21.2020
SOUPS 2020 - Security, Availability, and Multiple Information Sources: Exploring Update Behavior
Security
09.21.2020
SOUPS 2020 - Replication: Why We Still Can't Browse in Peace On the Uniqueness and Reidentifiability
Security
09.21.2020
Facebook Connect 2020 | Securing Your Content
Security
09.25.2020
How we saved the Black Friday sales for a major jewelry shop - Niklas Bae Pedersen - NDC Oslo 2020
Security
09.30.2020
DIY security and privacy: roll your own VPN in 10 minutes - Jonas Nordstrand - NDC Oslo 2020
Security
09.30.2020
seccomp — Your Next Layer of Defense
Security
10.10.2020
Browser Fingerprinting: Stalking With a Personal Touch - Eivind Arvesen - NDC Oslo 2020
Security
10.13.2020
Confessions of a reformed pentester - Nick Murison - NDC Oslo 2020
Security
10.13.2020
Say Goodbye to Passwords and Hello to WebAuthn at JSConf Korea 2020 Home Edition
Security
10.14.2020
PEPR '20 - Beyond Access: Using Abac Frameworks to Implement Privacy and Security Policies
Security
10.15.2020
PEPR '20 - Privacy Architecture for Data-Driven Innovation Configure
Security
10.15.2020
PEPR '20 - Responsible Design through Experimentation: Learnings from LinkedIn
Security
10.15.2020
PEPR '20 - Product Privacy Journey: Towards a Product Centric Privacy Engineering Framework
Security
10.15.2020
PEPR '20 - Improving Usability of Differential Privacy at Scale
Security
10.15.2020
PEPR '20 - Privacy Professional Boss Mode
Security
10.15.2020
PEPR '20 - Building and Deploying a Privacy Preserving Data Analysis Platform
Security
10.15.2020
PEPR '20 - A Differentially Private Data Analytics API at Scale
Security
10.15.2020
PEPR '20 - How to (In)Effectively Convey Privacy Choices with Icons and Link Text
Security
10.15.2020
PEPR '20 - Throwing Out the Checklist
Security
10.15.2020
PEPR '20 - Beyond the Individual: Exploring Data Protection by Design in Connected Communal Spaces
Security
10.15.2020
PEPR '20 - Wikipedia and the Lean Data Diet
Security
10.15.2020
PEPR '20 - When Engineers and Lawyers Talk: Right-Sizing Your Data Protection Risk Profile
Security
10.16.2020
PEPR '20 - When Things Go Wrong
Security
10.16.2020
PEPR '20 - Building an Effective Feedback Loop for Your Privacy Program through Privacy Incident
Security
10.16.2020
PEPR '20 - Assessing Privacy Risk with the IPA Triad
Security
10.16.2020
PEPR '20 - Privacy in Deployment
Security
10.16.2020
PEPR '20 - Engineering Ethics into the NIST Privacy Framework
Security
10.16.2020
PEPR '20 - Design of a Privacy Infrastructure for the Internet of Things
Security
10.16.2020
PEPR '20 - A Backdoor by Any Other Name, and How to Stop It
Security
10.16.2020
PEPR '20 - Taking Responsibility for Someone Else's Code: Studying the Privacy Behaviors of Mobile
Security
10.16.2020
Keep your nose out of it. Denying yourself access to production - Glenn F. Henriksen
Security
10.21.2020
Proactive Security, less buzzword, more action - Siren Hofvander
Security
10.30.2020
How secure is your build/server? a story of packages and trust
Security
11.04.2020
Security Practices for Developers by Prima Virani #AgileIndia2020
Security
11.07.2020
Building Resilient Security Log Pipelines with Chaos by Prima Virani #AgileIndia2020
Security
11.07.2020
Securing Your Pipes with a TACO by Peter Maddison #AgileIndia2020
Security
11.07.2020
How Secure Is Your Build Server? A Story of Packages and Trust
Security
11.07.2020
OSDI '20 - SafetyPin: Encrypted Backups with Human-Memorable Secrets
Security
11.18.2020
OSDI '20 - Efficiently Mitigating Transient Execution Attacks using the Unmapped Speculation...
Security
11.18.2020
GOTO 2020 • Q4 - Are You Keeping Hosts Up to Date with the Latest Security Releases? • Liz Rice
Security
12.01.2020
Validating your Trusted Web Activity’s Digital Asset Links
Security
12.08.2020
GOTO 2020 • Q5 - Are Your Secrets Encrypted at Rest and in Transit? • Liz Rice
Security
12.08.2020
USENIX Security ’20 - NetWarden: Mitigating Network Covert Channels while Preserving Performance
Security
12.16.2020
GOTO 2020 • Secure Your Containers with Expert Advice • Liz Rice & Eoin Woods
Security
12.17.2020
Building Security into your Continuous Delivery pipelines by Harinee Muralinath #SeConf2020
Security
01.05.2021
Start with the scariest feature - how to prioritise what to test by Shi Ling Tai #SeConf2020
Security
01.05.2021
Build a responsive typescript wdio framework by Varuna Srivastava & Wim Selles #SeConf2020
Security
01.05.2021
Is Quality Really Everyone's Responsibility? The Accountability Conundrum by Deepak Koul #SeConf2020
Security
01.07.2021
How to Break PDF Security
Security
02.22.2021
OWASP Top 10 (Security Risks and Vulnerabilities)
Security
03.10.2021
All things security with Troy Hunt | Tech Skills Day
Security
04.22.2021
Advertising on a privacy-first web
Security
04.26.2021
Anti-tracking: What you need to know
Security
04.26.2021
Demystifying Front-End Security - Ilya Verbitskiy
Security
05.10.2021
Effective password management
Security
05.12.2021
From security as opt-in to security by default
Security
05.12.2021
GOTO 2021 • Embarking on Your Security Journey • Seth Vargo
Security
05.17.2021
Getting Started in Cybersecurity
Security
05.23.2021
LISA21 - Lessons Learned from a Ransomware Attack
Security
06.09.2021
LISA21 - The Cornerstone for Cybersecurity—Cryptographic Standards
Security
06.09.2021
LISA21 - The Remote Working Security Conundrum: What Is Reasonably Secure Anyway?
Security
06.09.2021
LISA21 - Beyond Firefighter vs. Safety Matches: Growing the DevSecOps Pipeline
Security
06.09.2021
HTTP Security Headers You Need To Have On Your Web Apps - Scott Sauber - NDC London 2021
Security
06.15.2021
Security Chaos Engineering: From Theory to Practice • Jamie Dicken • GOTO 2021
Security
06.21.2021
The Rise of Software Supply-Chain Attacks – How Secure is your .NET Application? - Niels Tanis
Security
06.22.2021
Differential Privacy – What is it and why should you care?
Security
06.23.2021
Secure That App!
06.28.2021
Changing the “S” in SDLC to Secure
06.28.2021
Achieving next-level security with secretless apps
07.08.2021
How to Start or Transition into Cyber Security
07.26.2021
The Growing Field of Cloud Security & What It Means To You
08.02.2021
USENIX Security '21 - The Use of Likely Invariants as Feedback for Fuzzers
09.04.2021
USENIX Security '21 - APICraft: Fuzz Driver Generation for Closed-source SDK Libraries
09.04.2021
USENIX Security '21 - People Count: Contact Tracing Apps and Public Health
09.04.2021
USENIX Security '21 - Cerebro: A Platform for Multi-Party Cryptographic Collaborative Learning
09.04.2021
USENIX Security '21 - Fantastic Four: Honest-Majority Four-Party Secure Computation With Malicious
09.04.2021
USENIX Security '21 - Defeating DNN-Based Traffic Analysis Systems in Real-Time With Blind
09.04.2021
USENIX Security '21 - JAW: Studying Client-side CSRF with Hybrid Property Graphs and Declarative
09.04.2021
USENIX Security '21 - Token-Level Fuzzing
09.04.2021
USENIX Security '21 - Extracting Training Data from Large Language Models
09.04.2021
USENIX Security '21 - Fingerprinting in Style: Detecting Browser Extensions via Injected Style
09.04.2021
USENIX Security '21 - CACTI: Captcha Avoidance via Client-side TEE Integration
09.04.2021
USENIX Security '21 - Cost-Aware Robust Tree Ensembles for Security Applications
09.04.2021
USENIX Security '21 - T-Miner: A Generative Approach to Defend Against Trojan Attacks on DNN-based
09.04.2021
USENIX Security '21 - ARCUS: Symbolic Root Cause Analysis of Exploits in Production Systems
09.04.2021
USENIX Security '21 - Dompteur: Taming Audio Adversarial Examples
09.04.2021
USENIX Security '21 - Preventing Use-After-Free Attacks with Fast Forward Allocation
09.04.2021
USENIX Security '21 - Senate: A Maliciously-Secure MPC Platform for Collaborative Analytics
09.04.2021
USENIX Security '21 - An Analysis of Speculative Type Confusion Vulnerabilities in the Wild
09.04.2021
USENIX Security '21 - Hermes Attack: Steal DNN Models with Lossless Inference Accuracy
09.04.2021
USENIX Security '21 - Reducing Test Cases with Attention Mechanism of Neural Networks
09.04.2021
USENIX Security '21 - Blinder: Partition-Oblivious Hierarchical Scheduling
09.04.2021
USENIX Security '21 - Entangled Watermarks as a Defense against Model Extraction
09.04.2021
USENIX Security '21 - Privacy and Integrity Preserving Computations with CRISP
09.04.2021
USENIX Security '21 - GForce: GPU-Friendly Oblivious and Rapid Neural Network Inference
09.04.2021
USENIX Security '21 - Deep-Dup: An Adversarial Weight Duplication Attack Framework to Crush Deep
09.04.2021
USENIX Security '21 - AdCube: WebVR Ad Fraud and Practical Confinement of Third-Party Ads
09.04.2021
USENIX Security '21 - Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing
09.04.2021
USENIX Security '21 - Can I Take Your Subdomain? Exploring Same-Site Attacks in the Modern Web
09.04.2021
USENIX Security '21 - ICSFuzz: Manipulating I/Os and Repurposing Binary Code to Enable Instrumented
09.04.2021
USENIX Security '21 - Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types
09.04.2021
USENIX Security '21 - PolyScope: Multi-Policy Access Control Analysis to Compute Authorized Attack
09.04.2021
USENIX Security '21 - UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating
09.04.2021
USENIX Security '21 - Stealing Links from Graph Neural Networks
09.04.2021
USENIX Security '21 - Kalεido: Real-Time Privacy Control for Eye-Tracking Systems
09.04.2021
USENIX Security '21 - SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial
09.04.2021
USENIX Security '21 - Breaking Through Binaries: Compiler-quality Instrumentation for Better
09.04.2021
USENIX Security '21 - Rage Against the Machine Clear: A Systematic Analysis of Machine Clears...
09.04.2021
USENIX Security '21 - Swivel: Hardening WebAssembly against Spectre
09.04.2021
USENIX Security '21 - KeyForge: Non-Attributable Email from Forward-Forgeable Signatures
09.04.2021
USENIX Security '21 - DOLMA: Securing Speculation with the Principle of Transient Non-Observability
09.04.2021
USENIX Security '21 - Express: Lowering the Cost of Metadata-hiding Communication with Cryptographic
09.04.2021
USENIX Security '21 - MAZE: Towards Automated Heap Feng Shui
09.04.2021
USENIX Security '21 - DRMI: A Dataset Reduction Technology based on Mutual Information for Black-box
09.04.2021
USENIX Security '21 - I Always Feel Like Somebody's Sensing Me! A Framework to Detect, Identify, and
09.04.2021
USENIX Security '21 - Demon in the Variant: Statistical Analysis of DNNs for Robust Backdoor
09.04.2021
USENIX Security '21 - Static Detection of Unsafe DMA Accesses in Device Drivers
09.04.2021
USENIX Security '21 - The Complexities of Healing in Secure Group Messaging: Why Cross-Group Effects
09.04.2021
USENIX Security '21 - Fine Grained Dataflow Tracking with Proximal Gradients
09.04.2021
USENIX Security '21 - Blind Backdoors in Deep Learning Models
09.04.2021
USENIX Security '21 - Communication–Computation Trade-offs in PIR
09.04.2021
USENIX Security '21 - ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation
09.04.2021
USENIX Security '21 - Mind Your Weight(s): A Large-scale Study on Insufficient Machine Learning
09.04.2021
USENIX Security '21 - CADE: Detecting and Explaining Concept Drift Samples for Security Applications
09.04.2021
USENIX Security '21 - Muse: Secure Inference Resilient to Malicious Clients
09.04.2021
USENIX Security '21 - FlowDist: Multi-Staged Refinement-Based Dynamic Information Flow Analysis for
09.04.2021
USENIX Security '21 - SIGL: Securing Software Installations Through Deep Graph Learning
09.04.2021
USENIX Security '21 - PatchGuard: A Provably Robust Defense against Adversarial Patches via Small
09.04.2021
USENIX Security '21 - Understanding and Detecting Disordered Error Handling with Precise Function
09.04.2021
USENIX Security '21 - Precise and Scalable Detection of Use-after-Compacting-Garbage-Collection Bugs
09.04.2021
USENIX Security '21 - Graph Backdoor
09.04.2021
USENIX Security '21 - Pretty Good Phone Privacy
09.04.2021
USENIX Security '21 - Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers
09.04.2021
USENIX Security '21 - Double-Cross Attacks: Subverting Active Learning Systems
09.04.2021
USENIX Security '21 - You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion
09.04.2021
USENIX Security '21 - SelectiveTaint: Efficient Data Flow Tracking With Static Binary Rewriting
09.04.2021
USENIX Security '21 - Adversarial Policy Training against Deep Reinforcement Learning
09.04.2021
USENIX Security '21 - VScape: Assessing and Escaping Virtual Call Protections
09.04.2021
USENIX Security '21 - Osiris: Automated Discovery of Microarchitectural Side Channels
09.04.2021
USENIX Security '21 - Poisoning the Unlabeled Dataset of Semi-Supervised Learning
09.04.2021
USENIX Security '21 - MIRAGE: Mitigating Conflict-Based Cache Attacks with a Practical...
09.04.2021
USENIX Security '21 - PrivSyn: Differentially Private Data Synthesis
09.04.2021
USENIX Security '21 - Finding Bugs Using Your Own Code: Detecting Functionally-similar yet
09.04.2021
USENIX Security '21 - MBA-Blast: Unveiling and Simplifying Mixed Boolean-Arithmetic Obfuscation
09.04.2021
USENIX Security '21 - WaveGuard: Understanding and Mitigating Audio Adversarial Examples
09.04.2021
USENIX Security '21 - Automatic Firmware Emulation through Invalidity-guided Knowledge Inference
09.04.2021
USENIX Security '21 - Can Systems Explain Permissions Better? Understanding Users' Misperceptions...
09.04.2021
USENIX Security '21 - "It's the Company, the Government, You and I": User Perceptions of...
09.04.2021
USENIX Security '21 - CSProp: Ciphertext and Signature Propagation Low-Overhead Public-Key...
09.04.2021
USENIX Security '21 - Where's Crypto?: Automated Identification and Classification of Proprietary...
09.04.2021
USENIX Security '21 - Database Reconstruction from Noisy Volumes: A Cache Side-Channel Attack...
09.04.2021
USENIX Security '21 - Identifying Harmful Media in End-to-End Encrypted Communication...
09.04.2021
USENIX Security '21 - CURE: A Security Architecture with CUstomizable and Resilient Enclaves
09.04.2021
USENIX Security '21 - DICE*: A Formally Verified Implementation of DICE Measured Boot
09.04.2021
USENIX Security '21 - Incrementally Updateable Honey Password Vaults
09.04.2021
USENIX Security '21 - Private Blocklist Lookups with Checklist
09.04.2021
USENIX Security '21 - Strategies and Perceived Risks of Sending Sensitive Documents
09.04.2021
USENIX Security '21 - Adapting Security Warnings to Counter Online Disinformation
09.04.2021
USENIX Security '21 - Does logic locking work with EDA tools?
09.04.2021
USENIX Security '21 - EOSAFE: Security Analysis of EOSIO Smart Contracts
09.04.2021
USENIX Security '21 - "Why wouldn't someone think of democracy as a target?"...
09.04.2021
USENIX Security '21 - EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts
09.04.2021
USENIX Security '21 - Fuzzy Labeled Private Set Intersection with Applications to Private...
09.04.2021
USENIX Security '21 - Smart Contract Vulnerabilities: Vulnerable Does Not Imply Exploited
09.04.2021
USENIX Security '21 - Examining the Efficacy of Decoy-based and Psychological Cyber Deception
09.04.2021
USENIX Security '21 - Evil Under the Sun: Understanding and Discovering Attacks on Ethereum...
09.04.2021
USENIX Security '21 - PTAuth: Temporal Memory Safety via Robust Points-to Authentication
09.04.2021
USENIX Security '21 - A Large-Scale Interview Study on Information Security in and Attacks...
09.04.2021
USENIX Security '21 - Data Poisoning Attacks to Local Differential Privacy Protocols
09.04.2021
USENIX Security '21 - Locally Differentially Private Analysis of Graph Statistics
09.04.2021
USENIX Security '21 - PEARL: Plausibly Deniable Flash Translation Layer using WOM coding
09.04.2021
USENIX Security '21 - How to Make Private Distributed Cardinality Estimation Practical...
09.04.2021
USENIX Security '21 - Using Amnesia to Detect Credential Database Breaches
09.04.2021
USENIX Security '21 - Helping Users Automatically Find and Manage Sensitive, Expendable Files...
09.04.2021
USENIX Security '21 - Frontrunner Jones and the Raiders of the Dark Forest: An Empirical Study...
09.04.2021
USENIX Security '21 - Effect of Mood, Location, Trust, and Presence of Others on Video-Based...
09.04.2021
USENIX Security '21 - "It's Stored, Hopefully, on an Encrypted Server'': Mitigating Users'...
09.04.2021
USENIX Security '21 - Why Older Adults (Don't) Use Password Managers
09.04.2021
USENIX Security '21 - Protecting Cryptography Against Compelled Self-Incrimination
09.04.2021
USENIX Security '21 - Cross-VM and Cross-Processor Covert Channels Exploiting Processor Idle...
09.04.2021
USENIX Security '21 - The Role of Computer Security Customer Support in Helping Survivors...
09.04.2021
USENIX Security '21 - Evaluating In-Workflow Messages for Improving Mental Models of End-to-End...
09.04.2021
USENIX Security '21 - CIPHERLEAKS: Breaking Constant-time Cryptography on AMD SEV via...
09.04.2021
USENIX Security '21 - M2MON: Building an MMIO-based Security Reference Monitor for Unmanned Vehicles
09.04.2021
USENIX Security '21 - Explanation Beats Context: The Effect of Timing & Rationales on Users'...
09.04.2021
USENIX Security '21 - PASAN: Detecting Peripheral Access Concurrency Bugs within Bare-Metal...
09.04.2021
USENIX Security '21-VoltPillager: Hardware-based fault injection attacks against Intel SGX Enclaves
09.04.2021
USENIX Security '21 - "Now I'm a bit angry:" Individuals' Awareness, Perception, and Responses...
09.04.2021
USENIX Security '21 - A Large Scale Study of User Behavior, Expectations and Engagement with...
09.04.2021
USENIX Security '21 - Jetset: Targeted Firmware Rehosting for Embedded Systems
09.04.2021
USENIX Security '21 - Sharing More and Checking Less: Leveraging Common Input Keywords to Detect...
09.04.2021
USENIX Security '21 - Dynamic proofs of retrievability with low server storage
09.04.2021
USENIX Security '21 - PACStack: an Authenticated Call Stack
09.04.2021
USENIX Security '21 - Reducing Bias in Modeling Real-world Password Strength via Deep Learning...
09.04.2021
USENIX Security '21 - Frontal Attack: Leaking Control-Flow in SGX via the CPU Frontend
09.04.2021
USENIX Security '21 - Charger-Surfing: Exploiting a Power Line Side-Channel for Smartphone...
09.04.2021
USENIX Security '21 - Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring...
09.04.2021
USENIX Security '21 - "It's stressful having all these phones": Investigating Sex Workers' Safety...
09.04.2021
USENIX Security '21 - "Shhh...be quiet!" Reducing the Unwanted Interruptions of Notification...
09.04.2021
USENIX Security '21 - On the Design and Misuse of Microcoded (Embedded) Processors—A Cautionary Note
09.04.2021
USENIX Security '21 - Automatic Extraction of Secrets from the Transistor Jungle using...
09.04.2021
USENIX Security '21 - Inexpensive Brainwave Authentication: New Techniques and Insights...
09.04.2021
USENIX Security '21 - V0Finder: Discovering the Correct Origin of Publicly Reported Software
09.04.2021
USENIX Security '21 - Driving 2FA Adoption at Scale: Optimizing Two-Factor Authentication...
09.04.2021
USENIX Security '21 - Capture: Centralized Library Management for Heterogeneous IoT Devices
09.04.2021
USENIX Security '21 - Hiding the Access Pattern is Not Enough: Exploiting Search Pattern Leakage...
09.04.2021
USENIX Security '21 - Are Privacy Dashboards Good for End Users? Evaluating User Perceptions...
09.04.2021
USENIX Security '21 - PriSEC: A Privacy Settings Enforcement Controller
09.04.2021
USENIX Security '21 - Deep Entity Classification: Abusive Account Detection for Online Social
09.04.2021
USENIX Security '21 - Minerva– An Efficient Risk-Limiting Ballot Polling Audit
09.04.2021
USENIX Security '21 - Searching Encrypted Data with Size-Locked Indexes
09.04.2021
USENIX Security '21 - A Highly Accurate Query-Recovery Attack against Searchable Encryption...
09.04.2021
USENIX Security '21 - On the Usability of Authenticity Checks for Hardware Security Tokens
09.04.2021
USENIX Security '21 - Card Brand Mixup Attack: Bypassing the PIN in non-Visa Cards by Using Them...
09.04.2021
USENIX Security '21 - 'Passwords Keep Me Safe' – Understanding What Children Think about Passwords
09.04.2021
USENIX Security '21 - Understanding Malicious Cross-library Data Harvesting on Android
09.04.2021
USENIX Security '21 - Mystique: Efficient Conversions for Zero-Knowledge Proofs with Applications...
09.04.2021
USENIX Security '21 - Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation
09.04.2021
USENIX Security '21 - Ripple: A Programmable, Decentralized Link-Flooding Defense Against Adaptive
09.04.2021
USENIX Security '21 - Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles...
09.04.2021
USENIX Security '21 - A Side Journey To Titan
09.04.2021
USENIX Security '21 - LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks
09.04.2021
USENIX Security '21 - Assessing Browser-level Defense against IDN-based Phishing
09.04.2021
USENIX Security '21 - Exposing New Vulnerabilities of Error Handling Mechanism in CAN
09.04.2021
USENIX Security '21 - Blind In/On-Path Attacks and Applications to VPNs
09.04.2021
USENIX Security '21 - Risky Business? Investigating the Security Practices of Vendors on an Online
09.04.2021
USENIX Security '21 - Causal Analysis for Software-Defined Networking Attacks
09.04.2021
USENIX Security '21 - Privacy-Preserving and Standard-Compatible AKA Protocol for 5G
09.04.2021
USENIX Security '21 - Compromised or Attacker-Owned: A Large Scale Classification and Study
09.04.2021
USENIX Security '21 - LZR: Identifying Unexpected Internet Services
09.04.2021
USENIX Security '21 - Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service
09.04.2021
USENIX Security '21 - Acoustics to the Rescue: Physical Key Inference Attack Revisited
09.04.2021
USENIX Security '21 - Virtual Secure Platform: A Five-Stage Pipeline Processor over TFHE
09.04.2021
USENIX Security '21 - Accurately Measuring Global Risk of Amplification Attacks using AmpMap
09.04.2021
USENIX Security '21 - Domain Shadowing: Leveraging Content Delivery Networks for Robust Blocking
09.04.2021
USENIX Security '21 - DeepReflect: Discovering Malicious Functionality through Binary Reconstruction
09.04.2021
USENIX Security '21 - Phishpedia: A Hybrid Deep Learning Based Approach to Visually Identify
09.04.2021
USENIX Security '21 - HAWatcher: Semantics-Aware Anomaly Detection for Appified Smart Homes
09.04.2021
USENIX Security '21 - ReDoSHunter: A Combined Static and Dynamic Approach for Regular Expression DoS
09.04.2021
USENIX Security '21 - PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop
09.04.2021
USENIX Security '21 - Formally Verified Memory Protection for a Commodity Multiprocessor Hypervisor
09.04.2021
USENIX Security '21 - Automated Discovery of Denial-of-Service Vulnerabilities in Connected Vehicle
09.04.2021
USENIX Security '21 - Once is Never Enough: Foundations for Sound Statistical Inference in Tor
09.04.2021
USENIX Security '21 - Hopper: Modeling and Detecting Lateral Movement
09.04.2021
USENIX Security '21 - Stars Can Tell: A Robust Method to Defend against GPS Spoofing Attacks
09.04.2021
USENIX Security '21 - SiamHAN: IPv6 Address Correlation Attacks on TLS Encrypted Traffic
09.04.2021
USENIX Security '21 - Research on the Security of Visual Reasoning CAPTCHA
09.04.2021
USENIX Security '21 - Disrupting Continuity of Apple's Wireless Ecosystem Security: New Tracking
09.04.2021
USENIX Security '21 - DEFInit: An Analysis of Exposed Android Init Routines
09.04.2021
USENIX Security '21 - Collective Information Security in Large-Scale Urban Protests
09.04.2021
USENIX Security '21 - SEAL: Storage-efficient Causality Analysis on Enterprise Logs
09.04.2021
USENIX Security '21 - Injection Attacks Reloaded: Tunnelling Malicious Payloads over DNS
09.04.2021
USENIX Security '21 - ELISE: A Storage Efficient Logging System Powered by Redundancy Reduction
09.04.2021
USENIX Security '21 - CLARION: Sound and Clear Provenance Tracking for Microservice Deployments
09.04.2021
USENIX Security '21 - A11y and Privacy don't have to be mutually exclusive: Constraining
09.04.2021
USENIX Security '21 - Reducing HSM Reliance in Payments through Proxy Re-Encryption
09.04.2021
USENIX Security '21 - Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender
09.04.2021
USENIX Security '21 - ReDMArk: Bypassing RDMA Security Mechanisms
09.04.2021
USENIX Security '21 - SEApp: Bringing Mandatory Access Control to Android Apps
09.04.2021
USENIX Security '21 - Scalable Detection of Promotional Website Defacements in Black Hat SEO
09.04.2021
USENIX Security '21 - Jaqen: A High-Performance Switch-Native Approach for Detecting and Mitigating
09.04.2021
USENIX Security '21 - Balboa: Bobbing and Weaving around Network Censorship
09.04.2021
USENIX Security '21 - SocialHEISTing: Understanding Stolen Facebook Accounts
09.04.2021
USENIX Security '21 - Why Eve and Mallory Still Love Android: Revisiting TLS (In)Security in Android
09.04.2021
USENIX Security '21 - What's in a Name? Exploring CA Certificate Control
09.04.2021
USENIX Security '21 - Security Analysis of the Democracy Live Online Voting System
09.04.2021
USENIX Security '21 - Share First, Ask Later (or Never?) Studying Violations of GDPR's Explicit
09.04.2021
USENIX Security '21 - Messy States of Wiring: Vulnerabilities in Emerging Personal Payment Systems
09.04.2021
USENIX Security '21 - YARIX: Scalable YARA-based Malware Intelligence
09.04.2021
USENIX Security '21 - Weaponizing Middleboxes for TCP Reflected Amplification
09.04.2021
USENIX Security '21 - The Circle Of Life: A Large-Scale Study of The IoT Malware Lifecycle
09.04.2021
USENIX Security '21 - mID: Tracing Screen Photos via Moiré Patterns
09.04.2021
USENIX Security '21 - Catching Phishers By Their Bait: Investigating the Dutch Phishing Landscape
09.04.2021
USENIX Security '21 - Swiped: Analyzing Ground-truth Data of a Marketplace for Stolen Debit
09.04.2021
SOUPS 2021 - On the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging Security
09.04.2021
SOUPS 2021 - Exploring Authentication for Security-Sensitive Tasks on Smart Home Voice Assistants
09.04.2021
USENIX Security '21 - The Hijackers Guide To The Galaxy: Off-Path Taking Over Internet Resources
09.04.2021
USENIX Security '21 - Why TLS is better without STARTTLS: A Security Analysis of STARTTLS
09.04.2021
USENIX Security '21 - Rollercoaster: An Efficient Group-Multicast Scheme for Mix Networks
09.04.2021
USENIX Security '21 - Constraint-guided Directed Greybox Fuzzing
09.04.2021
USENIX Security '21 - A Stealthy Location Identification Attack Exploiting Carrier Aggregation
09.04.2021
USENIX Security '21 - Obfuscation-Resilient Executable Payload Extraction From Packed Malware
09.04.2021
USENIX Security '21 - CANARY - a reactive defense mechanism for Controller Area Networks based
09.04.2021
USENIX Security '21 - How Great is the Great Firewall? Measuring China's DNS Censorship
09.04.2021
USENIX Security '21 - Is Real-time Phishing Eliminated with FIDO? Social Engineering Downgrade
09.04.2021
USENIX Security '21 - ALPACA: Application Layer Protocol Confusion - Analyzing and Mitigating Cracks
09.04.2021
SOUPS 2021 - Examining the Examiners: Students' Privacy and Security Perceptions of Online
09.04.2021
USENIX Security '21 - PhishPrint: Evading Phishing Detection Crawlers by Prior Profiling
09.04.2021
USENIX Security '21 - Forecasting Malware Capabilities From Cyber Attack Memory Images
09.04.2021
USENIX Security '21 - Experiences Deploying Multi-Vantage-Point Domain Validation at Let's Encrypt
09.04.2021
USENIX Security '21 - Blitz: Secure Multi-Hop Payments Without Two-Phase Commits
09.04.2021
USENIX Security '21 - When Malware Changed Its Mind: An Empirical Study of Variable Program Behavior
09.04.2021
USENIX Security '21 - ATLAS: A Sequence-based Learning Approach for Attack Investigation
09.04.2021
SOUPS 2021 - Code Reviewing as Methodology for Online Security Studies with Developers - A Case
09.04.2021
SOUPS 2021 - An Analysis of the Role of Situated Learning in Starting a Security Culture in a
09.04.2021
SOUPS 2021 - Using a Blocklist to Improve the Security of User Selection of Android Patterns
09.04.2021
SOUPS 2021 - Understanding Users' Knowledge about the Privacy and Security of Browser Extensions
09.04.2021
SOUPS 2021 - User Perceptions of the Usability and Security of Smartphones as FIDO2 Roaming
09.04.2021
SOUPS 2021 - "I'm Literally Just Hoping This Will Work:'' Obstacles Blocking the Online Security
09.04.2021
SOUPS 2021 - Comparing Security and Privacy Attitudes Among U.S. Users of Different Smartphone and
09.04.2021
"Why security is the biggest benefit of using the Cloud" by AJ Yawn
10.15.2021
"Why security is the biggest benefit of using the Cloud" by AJ Yawn
10.15.2021
"Injecting Security at the Cloud Edge" by Susan Hinrichs
10.16.2021
"Injecting Security at the Cloud Edge" by Susan Hinrichs
10.16.2021
Automated Application Security Testing with StackHawk - Scott Gerlach, React Advanced 2021
10.27.2021
Creating a Security Pipeline to cover your ASSets
11.04.2021
LISA16 - The Road to Mordor: Information Security Issues and Your Open Source Project
11.20.2021
LISA16 - Behind Closed Doors: Managing Passwords in a Dangerous World
11.20.2021
FAST '15 - Efficient Intra-Operating System Protection Against Harmful DMAs
11.22.2021
Security and usability with cross-origin isolation | Workshop
12.01.2021
USENIX Security '16 - Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks
12.02.2021
USENIX Security '16 - zxcvbn: Low-Budget Password Strength Estimation
12.02.2021
USENIX Security '16 - An Empirical Study of Textual Key-Fingerprint Representations
12.02.2021
USENIX Security '16 - Faster Malicious 2-Party Secure Computation with Online/Offline Dual Execution
12.03.2021
USENIX Security '16 - Micro-Virtualization Memory Tracing to Detect and Prevent Spraying Attacks
12.03.2021
USENIX Security '16 - Trusted Browsers for Uncertain Times
12.03.2021
USENIX Security '16 - ARMageddon: Cache Attacks on Mobile Devices
12.03.2021
USENIX Security '16 - An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries
12.03.2021
USENIX Security '16 - DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks
12.03.2021
USENIX Security '16 - Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage
12.03.2021
USENIX Security '16 - All Your Queries Are Belong to Us: The Power of File-Injection Attacks...
12.03.2021
USENIX Security '16 - Predicting, Decrypting, and Abusing WPA2/802.11 Group Keys
12.03.2021
USENIX Security '16 - Measuring PUP Prevalence and PUP Distribution through Pay-Per-Install Services
12.03.2021
USENIX Security '16 - Investigating Commercial Pay-Per-Install and the Distribution of Unwanted...
12.03.2021
USENIX Security '16 - UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware
12.03.2021
USENIX Security '16 - Towards Measuring and Mitigating Social Engineering Software Download Attacks
12.03.2021
USENIX Security '16 - The Unfalsifiability of Security Claims
12.03.2021
USENIX Security '16 - Teaching Computer Security: Thoughts from the Field
12.03.2021
USENIX Security '16 - Authenticated Network Time Synchronization
12.03.2021
USENIX Security '16 - Specification Mining for Intrusion Detection in Networked Control Systems
12.03.2021
USENIX Security '16 - Optimized Invariant Representation of Network Traffic for Detecting Unseen...
12.03.2021
USENIX Security '16 - Sanctum: Minimal Hardware Extensions for Strong Software Isolation
12.03.2021
USENIX Security '16 - Ariadne: A Minimal Approach to State Continuity
12.03.2021
USENIX Security '16 - fTPM: A Software-Only Implementation of a TPM Chip
12.03.2021
USENIX Security '16 - The Million-Key Question—Investigating the Origins of RSA Public Keys
12.03.2021
USENIX Security '16 - Lock It and Still Lose It —on the (In)Security of Automotive Remote Keyless...
12.03.2021
USENIX Security '16 - Fingerprinting Electronic Control Units for Vehicle Intrusion Detection
12.03.2021
USENIX Security '16 - Finding and Fixing Security Bugs in Flash
12.03.2021
USENIX Security '16 - OblivP2P: An Oblivious Peer-to-Peer Content Sharing System
12.03.2021
USENIX Security '16 - AuthLoop: End-to-End Cryptographic Authentication for Telephony...
12.03.2021
USENIX Security '16 - Report from the Field: A CDN's Role in Repelling Attacks against Banking...
12.03.2021
USENIX Security '16 - You Are Who You Know and How You Behave: Attribute Inference Attacks...
12.03.2021
USENIX Security '16 - You've Got Vulnerability: Exploring Effective Vulnerability Notifications
12.03.2021
USENIX Security '16 - Mirror: Enabling Proofs of Data Replication and Retrievability in the Cloud
12.03.2021
USENIX Security '16 - ZKBoo: Faster Zero-Knowledge for Boolean Circuits
12.03.2021
USENIX Security '16 - The Cut-and-Choose Game and Its Application to Cryptographic Protocols
12.03.2021
USENIX Security '16-Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study...
12.03.2021
USENIX Security '16 - AMD x86 Memory Encryption Technologies
12.03.2021
USENIX Security '16 - Harvesting Inconsistent Security Configurations in Custom Android ROMs...
12.03.2021
USENIX Security '16 - k-fingerprinting: A Robust Scalable Website Fingerprinting Technique
12.03.2021
USENIX Security '16 - Identifying and Characterizing Sybils in the Tor Network
12.03.2021
USENIX Security '16 - Protecting Privacy of BLE Device Users
12.03.2021
USENIX Security '16 - Privacy in Epigenetics: Temporal Linkability of MicroRNA Expression Profiles
12.03.2021
USENIX Security '16 - Security Competitions
12.03.2021
USENIX Security '16-Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability...
12.03.2021
LISA15 - Sysadmins and Their Role in Cyberwar: Why Several Governments Want to Spy on and Hack You
12.09.2021
LISA15 - Vulnerability Scanning's Not Good Enough: Enforcing Security and Compliance at Velocity
12.09.2021
USENIX Security '15 - Under-Constrained Symbolic Execution: Correctness Checking for Real Code
12.09.2021
USENIX Security '15 - Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications
12.09.2021
USENIX Security '15 - Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS
12.09.2021
USENIX Security '15 - Transforming Innovative Security Concepts into Disruptive Security Companies
12.10.2021
USENIX Security '15 - Protocol State Fuzzing of TLS Implementations
12.10.2021
USENIX Security '15 - Verified Correctness and Security of OpenSSL HMAC
12.10.2021
USENIX Security '15 - De-anonymizing Programmers via Code Stylometry
12.10.2021
USENIX Security '15 - To Pin or Not to Pin—Helping App Developers Bullet Proof Their TLS Connections
12.10.2021
USENIX Security '15 - SecGraph: A Uniform and Open-source Evaluation System for Graph Data...
12.10.2021
USENIX Security '15 - Not-Quite-So-Broken TLS: Lessons in Re-Engineering a Security Protocol...
12.10.2021
USENIX Security '15 - Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services
12.10.2021
USENIX Security '15 - Securing Self-Virtualizing Ethernet Devices
12.10.2021
USENIX Security '15 - Marionette: A Programmable Network Traffic Obfuscation System
12.10.2021
USENIX Security '15 - EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced...
12.10.2021
USENIX Security '15 - Constants Count: Practical Improvements to Oblivious RAM
12.10.2021
USENIX Security '15 - CONIKS: Bringing Key Transparency to End Users
12.10.2021
USENIX Security '15 - M2R: Enabling Stronger Privacy in MapReduce Computation
12.10.2021
USENIX Security '15 - Measuring Real-World Accuracies and Biases in Modeling Password Guessability
12.10.2021
USENIX Security '15 - Raccoon: Closing Digital Side-Channels through Obfuscated Execution
12.10.2021
USENIX Security '15 - Faster Secure Computation through Automatic Parallelization
12.10.2021
USENIX Security '15 - Trends and Lessons from Three Years Fighting Malicious Extensions
12.10.2021
USENIX Security '15 - Trends and Lessons from Three Years Fighting Malicious Extensions
12.10.2021
USENIX Security '15 - The Pythia PRF Service
12.10.2021
USENIX Security '15 - Phasing: Private Set Intersection Using Permutation-based Hashing
12.10.2021
USENIX Security '15 - Phasing: Private Set Intersection Using Permutation-based Hashing
12.10.2021
USENIX Security '15 - EVILCOHORT: Detecting Communities of Malicious Accounts on Online Services
12.10.2021
USENIX Security '15 - EVILCOHORT: Detecting Communities of Malicious Accounts on Online Services
12.10.2021
USENIX Security '15 - Reassembleable Disassembling
12.10.2021
USENIX Security '15 - Reassembleable Disassembling
12.10.2021
USENIX Security '15 - Recognizing Functions in Binaries with Neural Networks
12.10.2021
USENIX Security '15 - Recognizing Functions in Binaries with Neural Networks
12.10.2021
USENIX Security '15 - How the ELF Ruined Christmas
12.10.2021
USENIX Security '15 - How the ELF Ruined Christmas
12.10.2021
USENIX Security '15 - Using Formal Methods to Eliminate Exploitable Bugs
12.10.2021
USENIX Security '15 - You Shouldn’t Collect My Secrets: Thwarting Sensitive Keystroke Leakage...
12.10.2021
USENIX Security '15 - Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats...
12.10.2021
USENIX Security '15 - Boxify: Full-fledged App Sandboxing for Stock Android
12.10.2021
USENIX Security '15 - Cookies Lack Integrity: Real-World Implications
12.10.2021
USENIX Security '15 - Perspectives on Securing Cyberspace
12.10.2021
USENIX Security '15 - ZigZag: Automatically Hardening Web Applications Against Client-side...
12.10.2021
USENIX Security '15 - Aggregation of App Usage Behaviors
12.10.2021
USENIX Security '15 - In the Compression Hornet’s Nest: A Security Study of Data Compression...
12.10.2021
USENIX Security '15 - Anatomization and Protection of Mobile Apps’ Location Privacy Threats
12.10.2021
USENIX Security '15 - PowerSpy: Location Tracking Using Mobile Device Power Analysis
12.10.2021
USENIX Security '15 - Bohatei: Flexible and Elastic DDoS Defense
12.10.2021
USENIX Security '15 - Boxed Out: Blocking Cellular Interconnect Bypass Fraud at the Network Edge
12.10.2021
USENIX Security '15 - Thermal Covert Channels on Multi-core Platforms
12.10.2021
USENIX Security '15 - GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies
12.10.2021
USENIX Security '15 - Cashtags: Protecting the Input and Display of Sensitive Data
12.10.2021
USENIX Security '15 - Needles in a Haystack: Mining Information from Public Dynamic Analysis...
12.10.2021
USENIX Security '15 - Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches
12.10.2021
USENIX Security '15 - A Placement Vulnerability Study in Multi-Tenant Public Clouds
12.10.2021
USENIX Security '15 - Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter...
12.10.2021
USENIX Security '15 - UIPicker: User-Input Privacy Identification in Mobile Applications
12.10.2021
USENIX Security '15 - WebWitness: Investigating, Categorizing, and Mitigating Malware Download Paths
12.10.2021
USENIX Security '15 - A Measurement Study on Co-residence Threat inside the Cloud
12.10.2021
USENIX Security '15 - SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps
12.10.2021
Cybersecurity Domains in the Cloud Environment
12.17.2021
Cybersecurity Domains in the Cloud Environment
12.17.2021
USENIX Security '14 - Brahmastra: Driving Apps to Test the Security of Third-Party Components
12.23.2021
USENIX Security '14 - Information Security War Room
12.23.2021
USENIX Security '14 - iSeeYou: Disabling the MacBook Webcam Indicator LED
12.23.2021
USENIX Security '14 - ROP is Still Dangerous: Breaking Modern Defenses
12.23.2021
USENIX Security '14 - A Large-Scale Analysis of the Security of Embedded Firmwares
12.23.2021
USENIX Security '14 - Burst ORAM: Minimizing ORAM Response Times for Bursty Access Patterns
12.23.2021
USENIX Security '14 - SpanDex: Secure Password Tracking for Android
12.23.2021
USENIX Security '14 - Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow
12.23.2021
USENIX Security '14 - Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens
12.23.2021
USENIX Security '14 - An Internet-Wide View of Internet-Wide Scanning
12.23.2021
USENIX Security '14 - Blanket Execution: Dynamic Similarity Testing for Program Binaries
12.23.2021
USENIX Security '14 - How To Live In Paradise: Pearls of Wisdom for New and Prospective Faculty
12.23.2021
USENIX Security '14 - Password Portfolios and the Finite-Effort User: Sustainably Managing Large
12.23.2021
USENIX Security '14 - ZØ: An Optimizing Distributing Zero-Knowledge Compiler
12.23.2021
USENIX Security '14 - Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin
12.23.2021
USENIX Security '14 - Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks
12.23.2021
USENIX Security '14 - Targeted Threat Index: Characterizing and Quantifying Politically-Motivated
12.23.2021
10 Java Security Practices They Didn't Teach You In School by Brian Vermeer
01.06.2022
Shift-Left-Security with the Security Test Pyramid by Andreas Falk
01.06.2022
USENIX Security '14 - Privee: An Architecture for Automatically Analyzing Web Privacy Policies
01.06.2022
USENIX Security '14 - SSOScan: Automated Testing of Web Applications for Single Sign-On
01.06.2022
USENIX Security '14 - FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack
01.07.2022
USENIX Security '14 - Towards Detecting Anomalous User Behavior in Online Social Networks
01.07.2022
USENIX Security '14 - JIGSAW: Protecting Resource Access by Inferring Programmer Expectations
01.07.2022
USENIX Security '14 - Scheduler-based Defenses against Cross-VM Side-channels
01.07.2022
USENIX Security '14 - A Bayesian Approach to Privacy Enforcement in Smartphones
01.07.2022
USENIX Security '14 - Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM
01.07.2022
USENIX Security '14 - The Long “Taile” of Typosquatting Domain Names
01.07.2022
USENIX Security '14 - Precise Client-side Protection against DOM-based Cross-Site Scripting
01.07.2022
USENIX Security '14 - Password Managers: Attacks and Defenses
01.07.2022
USENIX Security '14 - Cardinal Pill Testing of System Virtual Machines
01.07.2022
USENIX Security '14 - Opening Remarks and Awards
01.10.2022
USENIX Security '14 - Panel Discussion
01.10.2022
USENIX Security '14 - Optimizing Seed Selection for Fuzzing
01.10.2022
USENIX Security '14 - Faster Private Set Intersection Based on OT Extension
01.10.2022
USENIX Security '14 - X-Force: Force-Executing Binary Programs for Security Applications
01.10.2022
USENIX Security '14 - Preventing Cryptographic Key Leakage in Cloud Virtual Machines
01.10.2022
USENIX Security '14 - From the Aether to the Ethernet—Attacking the Internet using Broadcast Digital
01.10.2022
USENIX Security '14 - Gyrophone: Recognizing Speech from Gyroscope Signals
01.10.2022
USENIX Security '14 - Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels
01.10.2022
USENIX Security '14 - When Governments Hack Opponents: A Look at Actors and Technology
01.10.2022
USENIX Security '14 - LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption
01.10.2022
USENIX Security '14 - A Large-Scale Analysis of the Security of Embedded Firmwares
01.10.2022
USENIX Security '14 - SDDR: Light-Weight, Secure Mobile Encounters
01.10.2022
USENIX Security '14 - A Look at Targeted Attacks Through the Lense of an NGO
01.10.2022
USENIX Security '14 - Mimesis Aegis: A Mimicry Privacy Shield–A System’s Approach to Data Privacy
01.10.2022
USENIX Security '14 - TRUESET: Faster Verifiable Set Computations
01.10.2022
USENIX Security '14 - Exit from Hell? Reducing the Impact of Amplification DDoS Attacks
01.10.2022
USENIX Security '14 - Telepathwords: Preventing Weak Passwords by Reading Users’ Minds
01.10.2022
USENIX Security '14 - BareCloud: Bare-metal Analysis-based Evasive Malware Detection
01.10.2022
USENIX Security '14 - ret2dir: Rethinking Kernel Isolation
01.10.2022
USENIX Security '14 - On the Effective Prevention of TLS Man-in-the-Middle Attacks in Web
01.10.2022
The Developers Guide to CyberSecurity
01.13.2022
Defending against PowerShell attacks - in theory, and in practice by Lee holmes
01.13.2022
Securing your Environment with Just Enough Administration by James Petty
01.13.2022
Ignite: Managing Security Across All Devices In Your Network Infrastructure by Sanjay Shitole
01.14.2022
How To Be Your Security Team's Best Friend by Emily Gladstone Cole
01.14.2022
FAST '13 - Horus: Fine-Grained Encryption-Based Security for Large-Scale Storage
01.13.2022
NSDI '13 - P3: Toward Privacy-Preserving Photo Sharing
01.19.2022
Serverless Security: New Risks Require New Approaches • Itay Rozenman • GOTO 2021
02.02.2022
Passwords are so 1990 - Sam Bellen - NDC Oslo 2021
02.21.2022
Passwords are so 1990 - Sam Bellen - NDC Oslo 2021
02.21.2022
Expert Talk: Software Security • Jim Manico & John Steven • GOTO 2022
03.28.2022
Networking, security & observability with Cilium
03.10.2022
Cilium - eBPF Powered Networking, Security & Observability
04.03.2022
Security Architecture
04.05.2022
Security aspect of mobile payments
04.12.2022
Jillian Ratliff - Gamify your Security - NDC Security 2022
05.03.2022
Security: From basic principles to PHP specifics | Alexander Makarov | phpday 2021
Security
05.04.2022
A path to a world without passwords
05.12.2022
NDC Quick Bits - Jim Manico - Introduction to Security Testing History
05.18.2022
Niall Merrigan - On Building Teams - NDC Security 2022
05.18.2022
Patricia Aas - Classic Vulnerabilities - NDC Security 2022
05.18.2022
Philippe De Ryck - AppSec is Too Hard!? - NDC Security 2022
05.18.2022
Security Warning: Your Java Attack Surface Just Got Bigger by Brian Vermeer
05.18.2022
Protecting your organization against attacks via the build system by Louis Jacomet
05.18.2022
Security Risk: Single-Page Applications by Andreas Falk
05.18.2022
a gatekeeper named behavior analysis by Rachid Zarouali
05.18.2022
Security lessons from Mother Nature by Grace Jansen
05.18.2022
Application security: What should the attack landscape look like in 2030? by Chris Swan
05.18.2022
Scott Helme - Hyper Speed: When Big Data Blooms - NDC Security 2022
05.20.2022
Rob Bos - Protect Yourself Against Supply Chain Attacks - NDC Security 2022
05.20.2022
Rob Bos - Protect your code with GitHub security features - NDC Security 2022
05.20.2022
2022-05-26 - Ecosystem Security WG meeting
05.26.2022
02-06-2022 Ecosystem Security WG meeting
06.02.2022
Jim Manico - Security Control Enhancements - NDC Security 2022
06.07.2022
Anders Abel - Why We Should Kill Saml2 - NDC Security 2022
06.07.2022
Alexander Lystad - It doesn't take much to be above average - NDC Security 2022
06.07.2022
Anders Abel - ASP.NET Core Meets Owasp Top 10 - NDC Security 2022
06.07.2022
Anders Abel - ASP.NET Core Meets Owasp Top 10 - NDC Security 2022
06.07.2022
Philippe De Ryck - Getting API Security Right - NDC Security 2022
06.07.2022
Philippe De Ryck - Getting API Security Right - NDC Security 2022
06.07.2022
Per Thorsheim - Passwords are not going away - NDC Security 2022
06.07.2022
Per Thorsheim - Passwords are not going away - NDC Security 2022
06.07.2022
Jillian Ratliff - Vulnerabilities that Hide from your Tools - NDC Security 2022
06.07.2022
Jillian Ratliff - Vulnerabilities that Hide from your Tools - NDC Security 2022
06.07.2022
Marit Iren Rognli Tokle & Christian Resell - Demostrating Binary Exploitation - NDC Security 2022
06.07.2022
Marit Iren Rognli Tokle & Christian Resell - Demostrating Binary Exploitation - NDC Security 2022
06.07.2022
Turid Herland - Breaking AES with side channel analysis - NDC Security 2022
06.07.2022
David Melamed - Minimum Viable Security - NDC Security 2022
06.07.2022
Dag Helge Østerhagen & Rune Andreas Grimstad - HelseID - NDC Security 2022
06.09.2022
Petteri Kivimäki - Secure Data Exchange in Digital Government Context - NDC Security 2022
06.09.2022
Erlend Oftedal - Secure Coding Back to Basics - NDC Security 2022
06.09.2022
Noaa Barki - Centralized Policy Management - NDC Security 2022
06.09.2022
Code Quality and Security
06.14.2022
Automated Serverless Security Testing: Delivering Secure Apps Continuously - Mike Khusid
07.18.2022
2022-07-21 Ecosystem Security WG meeting
07.21.2022
2022-07-21 Ecosystem Security WG meeting
07.21.2022
Web Security Basics
08.09.2022
Web Security Basics
08.09.2022
NDC Quick Bits - Jim Manico - Password History
08.10.2022
NDC Quick Bits - Jim Manico - Password History
08.10.2022
ML Security Operations at One of the Largest Brewing Companies • Maurits van der Goes • GOTO 2022
08.10.2022
ML Security Operations at One of the Largest Brewing Companies • Maurits van der Goes • GOTO 2022
08.10.2022
Web Security Basics
08.10.2022
2022-08-18 - Ecosystem Security WG meeting
08.18.2022
2022-08-18 - Ecosystem Security WG meeting
08.18.2022
PEPR '22 - Privacy Shift Left: A Machine-Assisted Threat Modeling Approach
08.23.2022
Triaging Real Time Security Threats with eBPF Powered Observability • Daniel Kim • GOTO 2022
08.29.2022
2022-09-15 Ecosystem Security WG meeting
09.15.2022
2022-09-15 Ecosystem Security WG meeting
09.15.2022
USENIX Security '16 - Internet Jones and the Raiders of the Lost Trackers...
09.28.2022
SOUPS 2022 Keynote - Understanding and Reducing Online Misinformation Across 16 Countries...
09.30.2022
SOUPS 2022 - Runtime Permissions for Privacy in Proactive Intelligent Assistants
09.30.2022
SOUPS 2022 - Balancing Power Dynamics in Smart Homes: Nannies' Perspectives on How Cameras...
09.30.2022
SOUPS 2022 - Sharing without Scaring: Enabling Smartphones to Become Aware of Temporary Sharing
09.30.2022
SOUPS 2022 Lightning Talk - IoT Inspector: a platform for real-world smart home research
09.30.2022
SOUPS 2022 - On recruiting and retaining users for security-sensitive longitudinal measurement...
09.30.2022
SOUPS 2022 - Comparing User Perceptions of Anti-Stalkerware Apps with the Technical Reality
09.30.2022
SOUPS 2022 - Replication: How Well Do My Results Generalize Now? The External Validity of Online...
09.30.2022
SOUPS 2022 - Evaluating the Usability of Privacy Choice Mechanisms
09.30.2022
SOUPS 2022 - DualCheck: Exploiting Human Verification Tasks for Opportunistic Online Safety...
09.30.2022
SOUPS 2022 - Exploring User-Suitable Metaphors for Differentially Private Data Analyses
09.30.2022
SOUPS 2022 - Industrial practitioners' mental models of adversarial machine learning
09.30.2022
SOUPS 2022 - Usability and Security of Trusted Platform Module (TPM) Library APIs
09.30.2022
SOUPS 2022 - Is it a concern or a preference? An investigation into the ability of privacy scales...
09.30.2022
SOUPS 2022 - An Empirical Study of a Decentralized Identity Wallet...
09.30.2022
SOUPS 2022 - Let’s Hash: Helping Developers with Password Security
09.30.2022
SOUPS 2022 - Investigating How University Students in the United States Encounter and Deal With...
09.30.2022
SOUPS 2022 -“Fast, Easy, Convenient.” Studying Adoption and Perception of Digital Covid Certificates
09.30.2022
SOUPS 2022 - Replication: The Effect of Differential Privacy Communication on German Users'...
09.30.2022
SOUPS 2022 - Let The Right One In: Attestation as a Usable CAPTCHA Alternative
09.30.2022
SOUPS 2022 - Anti-Privacy and Anti-Security Advice on TikTok: Case Studies of Technology-Enabled...
09.30.2022
SOUPS 2022 - Do Password Managers Nudge Secure (Random) Passwords?
09.30.2022
SOUPS 2022 - Increasing security without decreasing usability: A comparison of various verifiable...
09.30.2022
SOUPS 2022 - Users' Perceptions of Chrome Compromised Credential Notification
09.30.2022
SOUPS 2022 Lightning Talk - E-Commerce Payment Security Evaluation and Literature Review
09.30.2022
SOUPS 2022 - Replication: Stories as Informal Lessons about Security
09.30.2022
SOUPS 2022 - An open door may tempt a saint: Examining situational and individual determinants...
09.30.2022
SOUPS 2022 Lightning Talk - Skilled or Gullible? Gender Stereotypes Related to Computer Security...
09.30.2022
SOUPS 2022 - Understanding Non-Experts’ Security- and Privacy-Related Questions on a Q&A Site
09.30.2022
SOUPS 2022 - If You Can’t Get Them to the Lab: Evaluating a Virtual Study Environment with...
09.30.2022
SOUPS 2022 - Being Hacked: Understanding Victims' Experiences of IoT Hacking
09.30.2022
SOUPS 2022 - Presenting Suspicious Details in User-Facing E-mail Headers Does Not Improve...
09.30.2022
SOUPS 2022 - Detecting iPhone Security Compromise in Simulated Stalking Scenarios: Strategies and...
09.30.2022
SOUPS 2022 Lightning Talk - Moving Usable Security and Privacy Research Out of the Lab...
09.30.2022
SOUPS 2022 - The Nerd Factor: The Potential of S&P Adepts to Serve as a Social Resource...
09.30.2022
SOUPS 2022 - Normative and Non-Social Beliefs about Sensor Data: Implications for Collective...
09.30.2022
SOUPS 2022 - Improving Password Generation Through the Design of a Password Composition Policy...
09.30.2022
SOUPS 2022 - "As soon as it's a risk, I want to require MFA": How Administrators Configure...
09.30.2022
SOUPS 2022 Lightning Talk - Informed Consent: Are your participants aware of what they share
09.30.2022
SOUPS 2022 - "I don’t know why I check this...'' Investigating Expert Users' Strategies to Detect...
09.30.2022
SOUPS 2022 - Password policies of most top websites fail to follow best practices
09.30.2022
"The Secure Software Supply Chain" by Kelsey Hightower (Strange Loop 2022)
10.04.2022
"The Secure Software Supply Chain" by Kelsey Hightower (Strange Loop 2022)
10.04.2022
Cloud Security - Minimum Security Baseline
10.11.2022
PGConf NYC 2021 - Row Level Security Explained by Stephen Frost
10.12.2022
PGConf NYC 2021 - Data Security using Roles, Privileges and Row Level Security by Abbas Butt
10.12.2022
2022-10-13 - Ecosystem Security WG meeting
10.13.2022
!!Con 2021 - The musical password manifesto: you have nothing to lose but your... by Amara Jaeger
10.13.2022
Championing Security for your Agile Development by Neelu Tripathy #AgileIndia 2022
10.15.2022
Understanding the Cyber Security Acronym Soup - Kieran Jacobsen - NDC Melbourne 2022
10.18.2022
Cybersecurity solutions to stop an attack | Pluralsight webinar
10.20.2022
Security & Observability For All Apps - Combining The User/Kernel Powers - Neeraj Poddar #AgileIndia
10.21.2022
USENIX Security '22 - Jenny: Securing Syscalls for PKU-based Memory Isolation Systems
10.25.2022
USENIX Security '22 - How Are Your Zombie Accounts? Understanding Users' Practices & Expectations...
10.25.2022
USENIX Security '22 - Piranha: A GPU Platform for Secure Computation
10.25.2022
USENIX Security '22 - Many Roads Lead To Rome: How Packet Headers Influence DNS Censorship...
10.25.2022
USENIX Security '22 - Unleash the Simulacrum: Shifting Browser Realities for Robust...
10.25.2022
USENIX Security '22 - OpenVPN is Open to VPN Fingerprinting
10.25.2022
USENIX Security '22 - AMD Prefetch Attacks through Power and Time
10.25.2022
USENIX Security '22-Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86
10.25.2022
USENIX Security '22 - "OK, Siri" or "Hey, Google": Evaluating Voiceprint Distinctiveness via...
10.25.2022
USENIX Security '22 - Breaking Bridgefy, again: Adopting libsignal is not enough
10.25.2022
USENIX Security '22 - Online Website Fingerprinting: Evaluating Website Fingerprinting Attacks...
10.25.2022
USENIX Security '22 - "How Do You Not Lose Friends?": Synthesizing a Design Space of Social Controls
10.25.2022
USENIX Security '22 - Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery...
10.25.2022
USENIX Security '22 - The Dangers of Human Touch: Fingerprinting Browser Extensions through...
10.25.2022
USENIX Security '22 - Communication-Efficient Triangle Counting under Local Differential Privacy
10.25.2022
USENIX Security '22 - Building an Open, Robust, and Stable Voting-Based Domain Top List
10.25.2022
USENIX Security '22 - Caring about Sharing: User Perceptions of Multiparty Data Sharing
10.25.2022
USENIX Security '22 - Binoculars: Contention-Based Side-Channel Attacks Exploiting the Page Walker
10.25.2022
USENIX Security '22 - Secure Poisson Regression
10.25.2022
USENIX Security '22 - Physical-Layer Attacks Against Pulse Width Modulation-Controlled Actuators
10.25.2022
USENIX Security '22 - Cheetah: Lean and Fast Secure Two-Party Deep Neural Network Inference
10.25.2022
USENIX Security '22 - Networks of Care: Tech Abuse Advocates' Digital Security Practices
10.25.2022
USENIX Security '22 - Neither Access nor Control: A Longitudinal Investigation of the Efficacy...
10.25.2022
USENIX Security '22 - Spoki: Unveiling a New Wave of Scanners through a Reactive Network Telescope
10.25.2022
USENIX Security '22 - Expected Exploitability: Predicting the Development of Functional...
10.25.2022
USENIX Security '22 - Watching the watchers: bias and vulnerability in remote proctoring software
10.25.2022
USENIX Security '22 - Pool Inference Attacks on Local Differential Privacy...
10.25.2022
USENIX Security '22 - OpenSSLNTRU: Faster post-quantum TLS key exchange
10.25.2022
USENIX Security '22 - AmpFuzz: Fuzzing for Amplification DDoS Vulnerabilities
10.25.2022
USENIX Security '22 - Twilight: A Differentially Private Payment Channel Network
10.25.2022
USENIX Security '22 - OS-Aware Vulnerability Prioritization via Differential Severity Analysis
10.25.2022
USENIX Security '22 - BrakTooth: Causing Havoc on Bluetooth Link Manager via Directed Fuzzing
10.25.2022
USENIX Security '22 - GET /out: Automated Discovery of Application-Layer Censorship Evasion...
10.25.2022
USENIX Security '22 - An Audit of Facebook's Political Ad Policy Enforcement
10.25.2022
USENIX Security '22 - FRAMESHIFTER: Security Implications of HTTP/2-to-HTTP/1 Conversion Anomalies
10.25.2022
USENIX Security '22 - SkillDetective: Automated Policy-Violation Detection of Voice Assistant...
10.25.2022
USENIX Security '22 - ""Like Lesbians Walking the Perimeter"": Experiences of U.S. LGBTQ+ Folks...
10.25.2022
USENIX Security '22 - Hiding in Plain Sight? On the Efficacy of Power Side Channel-Based Control...
10.25.2022
USENIX Security '22 - Poisoning Attacks to Local Differential Privacy Protocols for Key-Value Data
10.25.2022
USENIX Security '22 - Helping hands: Measuring the impact of a large threat intelligence sharing...
10.25.2022
USENIX Security '22 - Branch History Injection: On the Effectiveness of Hardware Mitigations...
10.25.2022
USENIX Security '22 - "I feel invaded, annoyed, anxious and I may protect myself"...
10.25.2022
USENIX Security '22 - "They Look at Vulnerability and Use That to Abuse You''...
10.25.2022
USENIX Security '22 - How Long Do Vulnerabilities Live in the Code? A Large-Scale Empirical...
10.25.2022
USENIX Security '22 - TLS-Anvil: Adapting Combinatorial Testing for TLS Libraries
10.25.2022
USENIX Security '22 - Playing for K(H)eaps: Understanding and Improving Linux Kernel Exploit...
10.25.2022
USENIX Security '22 - Mistrust Plugins You Must: A Large-Scale Study Of Malicious Plugins...
10.25.2022
USENIX Security '22 - Mining Node.js Vulnerabilities via Object Dependence Graph and Query
10.25.2022
USENIX Security '22 - LinKRID: Vetting Imbalance Reference Counting in Linux kernel with Symbolic...
10.25.2022
USENIX Security '22 - Exploring the Unchartered Space of Container Registry Typosquatting
10.25.2022
USENIX Security '22 - FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities
10.25.2022
USENIX Security '22 - Uninvited Guests: Analyzing the Identity and Behavior of Certificate...
10.25.2022
USENIX Security '22 - Seeing the Forest for the Trees: Understanding Security Hazards in the 3GPP...
10.25.2022
USENIX Security '22 - Midas: Systematic Kernel TOCTTOU Protection
10.25.2022
USENIX Security '22 - Web Cache Deception Escalates!
10.25.2022
USENIX Security '22 - In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer...
10.25.2022
USENIX Security '22 - Open to a fault: On the passive compromise of TLS keys via transient errors
10.25.2022
USENIX Security '22 - Trust Dies in Darkness: Shedding Light on Samsung's TrustZone Keymaster Design
10.25.2022
USENIX Security '22 - Under the Hood of DANE Mismanagement in SMTP
10.25.2022
USENIX Security '22 - FLAME: Taming Backdoors in Federated Learning
10.25.2022
USENIX Security '22 - Ghost Peak: Practical Distance Reduction Attacks Against HRP UWB Ranging
10.25.2022
USENIX Security '22 - MundoFuzz: Hypervisor Fuzzing with Statistical Coverage Testing and Grammar...
10.25.2022
USENIX Security '22 - Efficient Differentially Private Secure Aggregation for Federated Learning...
10.25.2022
USENIX Security '22 - Morphuzz: Bending (Input) Space to Fuzz Virtual Devices
10.25.2022
USENIX Security '22 - Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing
10.25.2022
USENIX Security '22 - Label Inference Attacks Against Vertical Federated Learning
10.25.2022
USENIX Security '22 - LTrack: Stealthy Tracking of Mobile Phones in LTE
10.25.2022
USENIX Security '22 - A Large-scale Temporal Measurement of Android Malicious Apps...
10.25.2022
USENIX Security '22 - A Large-scale Investigation into Geodifferences in Mobile Apps
10.25.2022
USENIX Security '22 - Drifuzz: Harvesting Bugs in Device Drivers from Golden Seeds
10.25.2022
USENIX Security '22 - Watching the Watchers: Practical Video Identification Attack in LTE Networks
10.25.2022
USENIX Security '22 - DoLTEst: In-depth Downlink Negative Testing Framework for LTE Devices
10.25.2022
USENIX Security '22 - SIMC: ML Inference Secure Against Malicious Clients at Semi-Honest Cost
10.25.2022
USENIX Security '22 - A Large-scale and Longitudinal Measurement Study of DKIM Deployment
10.25.2022
USENIX Security '22 - Your Microphone Array Retains Your Identity: A Robust Voice Liveness...
10.25.2022
USENIX Security '22 - FuzzOrigin: Detecting UXSS vulnerabilities in Browsers through Origin Fuzzing
10.25.2022
USENIX Security '22- TLB;DR: Enhancing TLB-based Attacks with TLB Desynchronized Reverse Engineering
10.25.2022
USENIX Security '22 - QCSD: A QUIC Client-Side Website-Fingerprinting Defence Framework
10.25.2022
USENIX Security '22- The Antrim County 2020 Election Incident: An Independent Forensic Investigation
10.25.2022
"Demystifying Privacy Preserving Computing" by Tejas Chopra (Strange Loop 2022)
10.26.2022
USENIX Security '22 - Composable Cachelets: Protecting Enclaves from Cache Side-Channel Attacks
10.26.2022
USENIX Security '22 - Khaleesi: Breaker of Advertising and Tracking Request Chains
10.26.2022
USENIX Security '22 - Phish in Sheep's Clothing: Exploring the Authentication Pitfalls...
10.26.2022
USENIX Security '22 - Polynomial Commitment with a One-to-Many Prover and Applications
10.26.2022
USENIX Security '22 - Pacer: Comprehensive Network Side-Channel Mitigation in the Cloud
10.26.2022
USENIX Security '22 - WebGraph: Capturing Advertising and Tracking Information Flows
10.26.2022
USENIX Security '22 - Characterizing the Security of Github CI Workflows
10.26.2022
USENIX Security '22 - Hyperproofs: Aggregating and Maintaining Proofs in Vector Commitments
10.26.2022
USENIX Security '22 - 99% False Positives: A Qualitative Study of SOC Analysts' Perspectives
10.26.2022
USENIX Security '22 - PatchCleanser: Certifiably Robust Defense against Adversarial Patches...
10.26.2022
USENIX Security '22 - Shuffle-based Private Set Union: Faster and More Secure
10.26.2022
USENIX Security '22 - ppSAT: Towards Two-Party Private SAT Solving
10.26.2022
USENIX Security '22 - HyperDegrade: From GHz to MHz Effective CPU Frequencies
10.26.2022
USENIX Security '22 - PolyCruise: A Cross-Language Dynamic Information Flow Analysis
10.26.2022
USENIX Security '22 - Practical Data Access Minimization in Trigger-Action Platforms
10.26.2022
USENIX Security '22 - Don't Mesh Around: Side-Channel Attacks and Mitigations on Mesh Interconnects
10.26.2022
USENIX Security '22 - DeepPhish: Understanding User Trust Towards Artificially Generated Profiles...
10.26.2022
USENIX Security '22 - Towards More Robust Keyword Spotting for Voice Assistants
10.26.2022
USENIX Security '22 - ReZone: Disarming TrustZone with TEE Privilege Reduction
10.26.2022
USENIX Security '22 - Who Are You (I Really Wanna Know)? Detecting Audio DeepFakes Through Vocal
10.26.2022
USENIX Security '22 - Ground Truth for Binary Disassembly is Not Easy
10.26.2022
USENIX Security '22 - ALASTOR: Reconstructing the Provenance of Serverless Intrusions
10.26.2022
USENIX Security '22 - When Sally Met Trackers: Web Tracking From the Users' Perspective
10.26.2022
USENIX Security '22 - Holistic Control-Flow Protection on Real-Time Embedded Systems with Kage
10.26.2022
USENIX Security '22 - DeepDi: Learning a Relational Graph Convolutional Network Model on Instruction
10.26.2022
USENIX Security '22 - IHOP: Improved Statistical Query Recovery against Searchable Symmetric
10.26.2022
USENIX Security '22 - GAROTA: Generalized Active Root-Of-Trust Architecture
10.26.2022
USENIX Security '22 - Seeing is Living? Rethinking the Security of Facial Liveness Verification
10.26.2022
USENIX Security '22 - How to Peel a Million: Validating and Expanding Bitcoin Clusters
10.26.2022
USENIX Security '22 - CellIFT: Leveraging Cells for Scalable and Precise Dynamic Information Flow
10.26.2022
USENIX Security '22 - VerLoc: Verifiable Localization in Decentralized Systems
10.26.2022
USENIX Security '22 - Creating a Secure Underlay for the Internet
10.26.2022
USENIX Security '22 - FreeWill: Automatically Diagnosing Use-after-free Bugs via Reference
10.26.2022
USENIX Security '22 - Back-Propagating System Dependency Impact for Attack Investigation
10.26.2022
USENIX Security '22 - SYMSAN: Time and Space Efficient Concolic Execution via Dynamic Data-flow
10.26.2022
USENIX Security '22 - Omnes pro uno: Practical Multi-Writer Encrypted Database
10.26.2022
USENIX Security '22 - RE-Mind: a First Look Inside the Mind of a Reverse Engineer
10.26.2022
USENIX Security '22 - Off-Path Network Traffic Manipulation via Revitalized ICMP Redirect Attacks
10.26.2022
USENIX Security '22 - End-to-Same-End Encryption: Modularly Augmenting an App with an Efficient
10.26.2022
USENIX Security '22 - RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices
10.26.2022
USENIX Security '22 - Adversarial Detection Avoidance Attacks: Evaluating the robustness
10.26.2022
USENIX Security '22 - Bedrock: Programmable Network Support for Secure RDMA Systems
10.26.2022
USENIX Security '22 - FlowMatrix: GPU-Assisted Information-Flow Analysis through Matrix-Based
10.26.2022
USENIX Security '22 - Automating Cookie Consent and GDPR Violation Detection
10.26.2022
USENIX Security '22 - Gossamer: Securely Measuring Password-based Logins
10.26.2022
USENIX Security '22 - Backporting Security Patches of Web Applications: A Prototype Design
10.26.2022
USENIX Security '22 - Leaky Forms: A Study of Email and Password Exfiltration Before Form Submission
10.26.2022
USENIX Security '22 - Incremental Offline/Online PIR
10.26.2022
USENIX Security '22 - SWAPP: A New Programmable Playground for Web Application Security
10.26.2022
USENIX Security '22 - Might I Get Pwned: A Second Generation Compromised Credential Checking Service
10.26.2022
USENIX Security '22 - Blacklight: Scalable Defense for Neural Networks against Query-Based Black-Box
10.26.2022
USENIX Security '22 - Estimating Incidental Collection in Foreign Intelligence Surveillance
10.26.2022
USENIX Security '22 - Security Analysis of Camera-LiDAR Fusion Against Black-Box Attacks
10.26.2022
USENIX Security '22 - Rolling Colors: Adversarial Laser Exploits against Traffic Light Recognition
10.26.2022
USENIX Security '22 - Identity Confusion in WebView-based Mobile App-in-app Ecosystems
10.26.2022
USENIX Security '22 - The Security Lottery: Measuring Client-Side Web Security Inconsistencies
10.26.2022
USENIX Security '22 - Behind the Tube: Exploitative Monetization of Content on YouTube
10.26.2022
USENIX Security '22 - Increasing Adversarial Uncertainty to Scale Private Similarity Testing
10.26.2022
USENIX Security '22 - Pre-hijacked accounts: An Empirical Study of Security Failures in User Account
10.26.2022
USENIX Security '22 - SAID: State-aware Defense Against Injection Attacks on In-vehicle Network
10.26.2022
USENIX Security '22 - Transferring Adversarial Robustness Through Robust Representation Matching
10.26.2022
USENIX Security '22 - How Machine Learning Is Solving the Binary Function Similarity Problem
10.26.2022
USENIX Security '22 - Measurement by Proxy: On the Accuracy of Online Marketplace Measurements
10.26.2022
USENIX Security '22 - FOAP: Fine-Grained Open-World Android App Fingerprinting
10.26.2022
USENIX Security '22 - Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand
10.26.2022
USENIX Security '22 - GPU-accelerated PIR with Client-Independent Preprocessing for Large-Scale
10.26.2022
USENIX Security '22 - Towards Automatically Reverse Engineering Vehicle Diagnostic Protocols
10.26.2022
USENIX Security '22 - Provably-Safe Multilingual Software Sandboxing using WebAssembly
10.26.2022
USENIX Security '22 - DoubleStar: Long-Range Attack Towards Depth Estimation based Obstacle
10.26.2022
USENIX Security '22 - Why Users (Don't) Use Password Managers at a Large Educational Institution
10.26.2022
USENIX Security '22 - Automated Detection of Automated Traffic
10.26.2022
USENIX Security '22 - Inferring Phishing Intention via Webpage Appearance and Dynamics
10.26.2022
USENIX Security '22 - DnD: A Cross-Architecture Deep Neural Network Decompiler
10.26.2022
USENIX Security '22 - FReD: Identifying File Re-Delegation in Android System Services
10.26.2022
USENIX Security '22 - Targeted Deanonymization via the Cache Side Channel: Attacks and Defenses
10.26.2022
USENIX Security '22 - Synthetic Data – Anonymisation Groundhog Day
10.26.2022
USENIX Security '22 - SARA: Secure Android Remote Authorization
10.26.2022
USENIX Security '22 - Birds of a Feather Flock Together: How Set Bias Helps to Deanonymize You
10.26.2022
USENIX Security '22 - GhostTouch: Targeted Attacks on Touchscreens without Physical Touch
10.26.2022
USENIX Security '22 - Mitigating Membership Inference Attacks by Self-Distillation Through a Novel
10.26.2022
USENIX Security '22 - Constant-weight PIR: Single-round Keyword PIR via Constant-weight Equality
10.26.2022
USENIX Security '22 - Experimental Security Analysis of the App Model in Business Collaboration
10.26.2022
USENIX Security '22 - Attacks on Deidentification's Defenses
10.26.2022
USENIX Security '22 - Dynamic Searchable Encryption with Optimal Search in the Presence of Deletions
10.26.2022
USENIX Security '22 - Faster Yet Safer: Logging System Via Fixed-Key Blockcipher
10.26.2022
USENIX Security '22 - Hecate: Abuse Reporting in Secure Messengers with Sealed Sender
10.26.2022
USENIX Security '22 - Orca: Blocklisting in Sender-Anonymous Messaging
10.26.2022
2022-10-27 - Ecosystem Security WG meeting
10.27.2022
USENIX Security '22 - Are Your Sensitive Attributes Private? Novel Model Inversion Attribute
10.27.2022
USENIX Security '22 - Membership Inference Attacks and Defenses in Neural Network Pruning
10.27.2022
USENIX Security '22 - Minefield: A Software-only Protection for SGX Enclaves against DVFS Attacks
10.27.2022