Toggle navigation
About
Blog
Subscribe
Log in
About
Blog
Subscribe
Log in
Topic: Security
Follow
Followers: 0
Security At Devops Speed
Ryan Sheldrake
(Sonatype)
DevOps
Security
11.20.2017
at DevOpsDays Warsaw
, Warsaw
The State of Node.js Security
Tim Kadlec
(Snyk)
NodeJS
Security
10.04.2017
at Node.js Interactive
, Vancouver
DevOps For Application Security
Krzysztof Kopera
(Intelligent Services)
DevOps
Security
11.20.2017
at DevOpsDays Warsaw
, Warsaw
FOCI '20 - MIMIQ: Masking IPs with Migration in QUIC
Security
09.15.2020
FOCI '20 - HTTPT: A Probe-Resistant Proxy
Security
09.15.2020
FOCI '20 - Identifying Disinformation Websites Using Infrastructure Features
Security
09.15.2020
FOCI '20 - A Comprehensive Study of DNS-over-HTTPS Downgrade Attack
Security
09.15.2020
FOCI '20 - Triplet Censors: Demystifying Great Firewall’s DNS Censorship Behavior
Security
09.15.2020
FOCI '20 - Turbo Tunnel, a good way to design censorship circumvention protocols
Security
09.15.2020
FOCI '20 - Detecting and Evading Censorship-in-Depth: A Case Study of Iran’s Protocol Whitelister
Security
09.15.2020
CSET '20 - Expansion of ICS Testbed for Security Validation based on MITRE ATT&CK Techniques
Security
09.15.2020
CSET '20 - On Design and Enhancement of Smart Grid Honeypot System for Practical Collection...
Security
09.15.2020
CSET '20 - Toward Orchestration of Complex Networking Experiments
Security
09.15.2020
CSET '20 - ICS Testbed Tetris: Practical Building Blocks Towards a Cyber Security Resource
Security
09.15.2020
CSET '20 - Representativeness in the Benchmark for Vulnerability Analysis Tools (B-VAT)
Security
09.15.2020
CSET '20 - Bridging Missing Gaps in Evaluating DDoS Research
Security
09.15.2020
CSET '20 - Towards Adversarial Phishing Detection
Security
09.15.2020
CSET '20 - HAI 1.0: HIL-based Augmented ICS Security Dataset
Security
09.15.2020
CSET '20 - APTGen: An Approach towards Generating Practical Dataset Labelled with Targeted...
Security
09.15.2020
CSET '20 - UBCIS: Ultimate Benchmark for Container Image Scanning
Security
09.15.2020
WOOT '20 - OS Security Is Hard: Why All the Fuzzers in the World Won't Change the Way...
Security
09.15.2020
WOOT '20 - Firmware Insider: Bluetooth Randomness is Mostly Random
Security
09.15.2020
WOOT '20 - One Exploit to Rule them All? On the Security of Drop-in Replacement and Counterfeit...
Security
09.15.2020
WOOT '20 - Automatic Generation of Compact Printable Shellcodes for x86
Security
09.15.2020
WOOT '20 - Hardware Security Is Hard: How Hardware Boundaries Define Platform Security
Security
09.15.2020
WOOT '20 - ToothPicker: Apple Picking in the iOS Bluetooth Stack
Security
09.15.2020
WOOT '20 - Unearthing the TrustedCore: A Critical Review on Huawei’s Trusted Execution Environment
Security
09.15.2020
WOOT '20 - When Is a Proof Actually Not?
Security
09.15.2020
WOOT '20 - Bankrupt Covert Channel: Turning Network Predictability into Vulnerability
Security
09.15.2020
WOOT '20 - AFL++ : Combining Incremental Steps of Fuzzing Research
Security
09.15.2020
WOOT '20 - BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy
Security
09.15.2020
WOOT '20 - NFCGate: Opening the Door for NFC Security Research with a Smartphone-Based Toolkit
Security
09.15.2020
WOOT '20 - Office Document Security and Privacy
Security
09.15.2020
CSET '20 - Historical Analysis of Exploit Availability Timelines
Security
09.15.2020
WOOT '20 - Exploiting Uses of Uninitialized Stack Variables in Linux Kernels to Leak Kernel Pointers
Security
09.15.2020
WOOT '20 - When Oblivious is Not: Attacks against OPAM
Security
09.15.2020
USENIX Security '20 - MIRAGE: Succinct Arguments for Randomized Algorithms with Applications
Security
09.15.2020
USENIX Security '20 - EcoFuzz: Adaptive Energy-Saving Greybox Fuzzing as a Variant
Security
09.15.2020
USENIX Security '20 - Delphi: A Cryptographic Inference Service for Neural Networks
Security
09.15.2020
USENIX Security '20 - TPM-FAIL: TPM meets Timing and Lattice Attacks
Security
09.15.2020
USENIX Security '20 - Automating the Development of Chosen Ciphertext Attacks
Security
09.15.2020
USENIX Security '20 - FuzzGuard: Filtering out Unreachable Inputs in Directed Grey-box Fuzzing
Security
09.15.2020
USENIX Security '20 - Analysis of DTLS Implementations Using Protocol State Fuzzing
Security
09.15.2020
USENIX Security '20 - Preech: A System for Privacy-Preserving Speech Transcription
Security
09.15.2020
USENIX Security '20 - Silhouette: Efficient Protected Shadow Stacks for Embedded Systems
Security
09.15.2020
USENIX Security '20 - Temporal System Call Specialization for Attack Surface Reduction
Security
09.15.2020
USENIX Security '20 - Local Model Poisoning Attacks to Byzantine-Robust Federated Learning
Security
09.15.2020
USENIX Security '20 - Big Numbers - Big Troubles: Systematically Analyzing Nonce Leakage in (EC)DSA
Security
09.15.2020
USENIX Security '20 - Exploring Connections Between Active Learning and Model Extraction
Security
09.15.2020
USENIX Security '20 - An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses
Security
09.15.2020
USENIX Security '20 - RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache
Security
09.15.2020
USENIX Security '20 - HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation
Security
09.15.2020
USENIX Security '20 - DECAF: Automatic, Adaptive De-bloating and Hardening of COTS Firmware
Security
09.15.2020
USENIX Security '20 - The Ballot is Busted Before the Blockchain: A Security Analysis of Voatz
Security
09.15.2020
USENIX Security '20 - High Accuracy and High Fidelity Extraction of Neural Networks
Security
09.15.2020
USENIX Security '20 - Boxer: Preventing fraud by scanning credit cards
Security
09.15.2020
USENIX Security '20 - Stolen Memories: Leveraging Model Memorization for Calibrated White-Box
Security
09.15.2020
USENIX Security '20 - Detecting Stuffing of a User’s Credentials at Her Own Accounts
Security
09.15.2020
USENIX Security '20 - TXSPECTOR: Uncovering Attacks in Ethereum from Transactions
Security
09.15.2020
USENIX Security '20 - SANNS: Scaling Up Secure Approximate k-Nearest Neighbors Search
Security
09.15.2020
USENIX Security '20 - SkillExplorer: Understanding the Behavior of Skills in Large Scale
Security
09.15.2020
USENIX Security '20 - Pancake: Frequency Smoothing for Encrypted Data Stores
Security
09.15.2020
USENIX Security '20 - MUZZ: Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded
Security
09.15.2020
USENIX Security '20 - Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine
Security
09.15.2020
USENIX Security '20 - SEAL: Attack Mitigation for Encrypted Databases via Adjustable Leakage
Security
09.15.2020
USENIX Security '20 - Scaling Verifiable Computation Using Efficient Set Accumulators
Security
09.15.2020
USENIX Security '20 - Composition Kills: A Case Study of Email Sender Authentication
Security
09.15.2020
USENIX Security '20 - A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis
Security
09.15.2020
USENIX Security '20 - Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines
Security
09.15.2020
USENIX Security '20 - On Training Robust PDF Malware Classifiers
Security
09.15.2020
USENIX Security '20 - DatashareNetwork: A Decentralized Privacy-Preserving Search Engine
Security
09.15.2020
USENIX Security '20 - Estonian Electronic Identity Card: Security Flaws in Key Management
Security
09.15.2020
USENIX Security '20 - NetWarden: Mitigating Network Covert Channels while Preserving Performance
Security
09.15.2020
USENIX Security '20 - The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis
Security
09.15.2020
USENIX Security '20 - Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote
Security
09.15.2020
USENIX Security '20 - SHA-1 is a Shambles: First Chosen-Prefix Collision on SHA-1 and Application
Security
09.15.2020
USENIX Security '20 - Automatic Hot Patch Generation for Android Kernels
Security
09.15.2020
USENIX Security '20 - A Formal Analysis of IEEE 802.11's WPA2: Countering the Kracks Caused by...
Security
09.15.2020
USENIX Security '20 - You Are What You Broadcast: Identification of Mobile and IoT Devices...
Security
09.15.2020
USENIX Security '20 - What Twitter Knows: Characterizing Ad Targeting Practices, User Perceptions...
Security
09.15.2020
USENIX Security '20 - Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation...
Security
09.15.2020
USENIX Security '20 - Towards HTTPS Everywhere on Android: We Are Not There Yet
Security
09.15.2020
USENIX Security '20 - Understanding security mistakes developers make: Qualitative analysis...
Security
09.15.2020
USENIX Security '20 - Sys: A Static/Symbolic Tool for Finding Good Bugs in Good (Browser) Code
Security
09.15.2020
USENIX Security '20 - SmartVerif: Push the Limit of Automation Capability of Verifying Security...
Security
09.15.2020
USENIX Security '20 - AURORA: Statistical Crash Analysis for Automated Root Cause Explanation
Security
09.15.2020
USENIX Security '20 - Symbolic execution with SymCC: Don't interpret, compile!
Security
09.15.2020
USENIX Security '20 - Fawkes: Protecting Privacy against Unauthorized Deep Learning Models
Security
09.15.2020
USENIX Security '20 - P2IM: Scalable and Hardware-independent Firmware Testing via Automatic
Security
09.15.2020
USENIX Security '20 - Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning
Security
09.15.2020
USENIX Security '20 - Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow
Security
09.15.2020
USENIX Security '20 - Interpretable Deep Learning under Fire
Security
09.15.2020
USENIX Security '20 - TextShield: Robust Text Classification Based on Multimodal Embedding
Security
09.15.2020
USENIX Security '20 - ParmeSan: Sanitizer-guided Greybox Fuzzing
Security
09.15.2020
USENIX Security '20 - Hall Spoofing: A Non-Invasive DoS Attack on Grid-Tied Solar Inverter
Security
09.15.2020
SpecFuzz: Bringing Spectre-type vulnerabilities to the surface
Security
09.27.2020
USENIX Security '20 - iOS, Your OS, Everybody's OS: Vetting and Analyzing Network Services of iOS
Security
09.15.2020
USENIX Security '20 - The Unpatchable Silicon: A Full Break of the Bitstream Encryption of Xilinx
Security
09.15.2020
USENIX Security '20 - (Mostly) Exitless VM Protection from Untrusted Hypervisor through Disaggregate
Security
09.15.2020
USENIX Security '20 - Human Distinguishable Visual Key Fingerprints
Security
09.15.2020
USENIX Security '20 - Devil’s Whisper: A General Approach for Physical Adversarial Attacks
Security
09.15.2020
USENIX Security '20 - FANS: Fuzzing Android Native System Services via Automated Interface Analysis
Security
09.15.2020
USENIX Security '20 - The Impact of Ad-Blockers on Product Search and Purchase Behavior
Security
09.15.2020
USENIX Security '20 - Chaperone: Real-time Locking and Loss Prevention for Smartphones
Security
09.15.2020
USENIX Security '20 - Call Me Maybe: Eavesdropping Encrypted LTE Calls With ReVoLTE
Security
09.15.2020
USENIX Security '20 - From Needs to Actions to Secure Apps? The Effect of Requirements...
Security
09.15.2020
USENIX Security '20 - BigMAC: Fine-Grained Policy Analysis of Android Firmware
Security
09.15.2020
USENIX Security '20 - DELF: Safeguarding deletion correctness in Online Social Networks
Security
09.15.2020
USENIX Security '20 - McTiny: Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers
Security
09.15.2020
USENIX Security '20 - FIRMSCOPE: Automatic Uncovering of Privilege-Escalation Vulnerabilities
Security
09.15.2020
USENIX Security '20 - Fuzzing Error Handling Code using Context-Sensitive Software Fault Injection
Security
09.15.2020
USENIX Security '20 - Cardpliance: PCI DSS Compliance of Android Applications
Security
09.15.2020
USENIX Security '20 - Visor: Privacy-Preserving Video Analytics as a Cloud Service
Security
09.15.2020
USENIX Security '20 - Justinian's GAAvernor: Robust Distributed Learning with Gradient Aggregation
Security
09.15.2020
USENIX Security '20 - Empirical Measurement of Systemic 2FA Usability
Security
09.15.2020
USENIX Security '20 - A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web
Security
09.15.2020
USENIX Security '20 - Differentially-Private Control-Flow Node Coverage for Software Usage Analysis
Security
09.15.2020
USENIX Security '20 - Liveness is Not Enough: Enhancing Fingerprint Authentication with Behavioral
Security
09.15.2020
USENIX Security '20 - FuzzGen: Automatic Fuzzer Generation
Security
09.15.2020
USENIX Security '20 - An Observational Investigation of Reverse Engineers’ Processes
Security
09.15.2020
USENIX Security '20 - 'I have too much respect for my elders': Understanding South African Mobile
Security
09.15.2020
USENIX Security '20 - Void: A fast and light voice liveness detection system
Security
09.15.2020
USENIX Security '20 - Plug-N-Pwned: Comprehensive Vulnerability Analysis of OBD-II Dongles...
Security
09.15.2020
USENIX Security '20 - An Off-Chip Attack on Hardware Enclaves via the Memory Bus
Security
09.15.2020
USENIX Security '20 - MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures
Security
09.15.2020
USENIX Security '20 - PHMon: A Programmable Hardware Monitor and Its Security Use Cases
Security
09.15.2020
USENIX Security '20 - EPIC: Every Packet Is Checked in the Data Plane of a Path-Aware Internet
Security
09.15.2020
USENIX Security '20 - HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution...
Security
09.15.2020
USENIX Security '20 - APEX: A Verified Architecture for Proofs of Execution on Remote Devices...
Security
09.15.2020
USENIX Security '20 - PhishTime: Continuous Longitudinal Measurement of the Effectiveness...
Security
09.15.2020
USENIX Security '20 - Horizontal Privilege Escalation in Trusted Applications
Security
09.15.2020
USENIX Security '20 - Programmable In-Network Security for Context-aware BYOD Policies
Security
09.15.2020
USENIX Security '20 - Drift with Devil: Security of Multi-Sensor Fusion based Localization...
Security
09.15.2020
USENIX Security '20 - Towards Robust LiDAR-based Perception in Autonomous Driving: General Black-box
Security
09.15.2020
USENIX Security '20 - PARTEMU: Enabling Dynamic Analysis of Real-World TrustZone Software...
Security
09.15.2020
USENIX Security '20 - A different cup of TI? The added value of commercial threat intelligence
Security
09.15.2020
USENIX Security '20 - Stealthy Tracking of Autonomous Vehicles with Cache Side Channels
Security
09.15.2020
USENIX Security '20 - KOOBE: Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write
Security
09.15.2020
USENIX Security '20 - DeepHammer: Depleting the Intelligence of Deep Neural Networks through Target
Security
09.15.2020
USENIX Security '20 - Civet: An Efficient Java Partitioning Framework for Hardware Enclaves
Security
09.15.2020
USENIX Security '20 - SENG, the SGX-Enforcing Network Gateway: Authorizing Communication...
Security
09.15.2020
USENIX Security '20 - Everything Old is New Again: Binary Security of WebAssembly
Security
09.15.2020
USENIX Security '20 - Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT
Security
09.15.2020
USENIX Security '20 - Medusa: Microarchitectural Data Leakage via Automated Attack Synthesis
Security
09.15.2020
USENIX Security '20 - BScout: Direct Whole Patch Presence Test for Java Executables
Security
09.15.2020
USENIX Security '20 - A Longitudinal and Comprehensive Study of the DANE Ecosystem in Email
Security
09.15.2020
USENIX Security '20 - SAVIOR: Securing Autonomous Vehicles with Robust Physical Invariants
Security
09.15.2020
USENIX Security '20 - Data Recovery from “Scrubbed” NAND Flash Storage: Need for Analog Sanitization
Security
09.15.2020
USENIX Security '20 - Datalog Disassembly
Security
09.15.2020
USENIX Security '20 - TeeRex: Discovery and Exploitation of Memory Corruption Vulnerabilities...
Security
09.15.2020
USENIX Security '20 - PCKV: Locally Differentially Private Correlated Key-Value Data Collection
Security
09.15.2020
USENIX Security '20 - PKU Pitfalls: Attacks on PKU-based Memory Isolation Systems
Security
09.15.2020
USENIX Security '20 - Poison Over Troubled Forwarders: A Cache Poisoning Attack Targeting DNS...
Security
09.15.2020
USENIX Security '20 - The Industrial Age of Hacking
Security
09.15.2020
USENIX Security '20 - Achieving Keyless CDNs with Conclaves
Security
09.15.2020
USENIX Security '20 - A Tale of Two Headers: A Formal Analysis of Inconsistent Click-Jacking...
Security
09.15.2020
USENIX Security '20 - Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited
Security
09.15.2020
USENIX Security '20 - CopyCat: Controlled Instruction-Level Attacks on Enclaves
Security
09.15.2020
USENIX Security '20 - ShadowMove: A Stealthy Lateral Movement Strategy
Security
09.15.2020
USENIX Security '20 - Retrofitting Fine Grain Isolation in the Firefox Renderer
Security
09.15.2020
USENIX Security '20 - Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness...
Security
09.15.2020
USENIX Security '20 - V0LTpwn: Attacking x86 Processor Integrity from Software
Security
09.15.2020
USENIX Security '20 - Zero-delay Lightweight Defenses against Website Fingerprinting
Security
09.15.2020
USENIX Security '20 - From Control Model to Program: Investigating Robotic Aerial Vehicle Accidents
Security
09.15.2020
USENIX Security '20 - Who's Calling? Characterizing Robocalls through Audio and Metadata Analysis
Security
09.15.2020
USENIX Security '20 - Adversarial Preprocessing: Understanding and Preventing Image-Scaling Attacks
Security
09.15.2020
USENIX Security '20 - Automatic Techniques to Systematically Discover New Heap Exploitation
Security
09.15.2020
USENIX Security '20 - NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities
Security
09.15.2020
USENIX Security '20 - Cached and Confused: Web Cache Deception in the Wild
Security
09.15.2020
USENIX Security '20 - See No Evil: Phishing for Permissions with False Transparency
Security
09.15.2020
USENIX Security '20 - BesFS: A POSIX Filesystem for Enclaves with a Mechanized Safety Proof
Security
09.15.2020
USENIX Security '20 - Security Analysis of Unified Payments Interface and Payment Apps in India
Security
09.15.2020
SOUPS 2020 - “You still use the password after all” – Exploring FIDO2 Security Keys in a Small
Security
09.21.2020
SOUPS 2020 - From Intent to Action: Nudging Users Towards Secure Mobile Payments
Security
09.21.2020
SOUPS 2020 - Making GDPR Usable (Lightning Talk)
Security
09.21.2020
SOUPS 2020 - An Exploratory Study of Hardware Reverse Engineering — Technical and Cognitive Process
Security
09.21.2020
SOUPS 2020 - Enhancing Privacy through the Visual Design of Privacy Notices: Exploring the Interplay
Security
09.21.2020
SOUPS 2020 - Knock, Knock. Who’s There? On the Security of LG’s Knock Codes
Security
09.21.2020
SOUPS 2020 - An investigation of phishing awareness and education over time: When and how to best
Security
09.21.2020
SOUPS 2020 - Do Privacy and Security Matter to Everyone? Quantifying and Clustering User-Centric
Security
09.21.2020
SOUPS 2020 - Tr(b)usted Identity Proofing (Lightning Talk)
Security
09.21.2020
SOUPS 2020 - Industry Responses to the European Directive on Security of Network and Information
Security
09.21.2020
SOUPS 2020 - Realizing Choice: Online Safeguards for Couples Adapting to Cognitive Challenges
Security
09.21.2020
SOUPS 2020 - Passworld: A Serious Game to Promote Password Awareness and Diversity in an Enterprise
Security
09.21.2020
SOUPS 2020 - End-to-End File Encryption in Browser with Open Source Penumbra (Lightning Talk)
Security
09.21.2020
SOUPS 2020 - Usable Sexurity: Studying People’s Concerns and Strategies When Sexting
Security
09.21.2020
SOUPS 2020 - An Ethnographic Understanding of Software (In)Security and a Co-Creation Model
Security
09.21.2020
SOUPS 2020 - "You've Got Your Nice List of Bugs, Now What?" Vulnerability Discovery and Management
Security
09.21.2020
SOUPS 2020 - "I Have a Narrow Thought Process": Constraints on Explanations Connecting Inferences
Security
09.21.2020
SOUPS 2020 - Blind and Human: Exploring More Usable Audio CAPTCHA Designs
Security
09.21.2020
SOUPS 2020 - Towards Understanding Privacy and Trust in Online Reporting of Sexual Assault
Security
09.21.2020
SOUPS 2020 - Lessons Learnt from Comparing WhatsApp Privacy Concerns Across Saudi and Indian
Security
09.21.2020
SOUPS 2020 - Sustainable, Scalable and Secure IoT Architecture (Lightning Talk)
Security
09.21.2020
SOUPS 2020 - User Mental Models of Cryptocurrency Systems - A Grounded Theory Approach
Security
09.21.2020
SOUPS 2020 - Innovation Inaction or In Action? The Role of User Experience in the Security
Security
09.21.2020
SOUPS 2020 - An Empirical Study of Wireless Carrier Authentication for SIM Swaps
Security
09.21.2020
SOUPS 2020 - Replication: On the Ecological Validity of Online Security Developer Studies
Security
09.21.2020
SOUPS 2020 - How Risky Are Real Users' IFTTT Applets?
Security
09.21.2020
SOUPS 2020 - Cloudy with a Chance of Misconceptions: Exploring Users' Perceptions and Expectations
Security
09.21.2020
SOUPS 2020 - Why Can't Johnny Fix Vulnerabilities: A Usability Evaluation of Static Analysis Tools
Security
09.21.2020
SOUPS 2020- Users Are still Not the Enemy: Applying Security Usability Principles...(Lightning Talk)
Security
09.21.2020
SOUPS 2020 - Security, Availability, and Multiple Information Sources: Exploring Update Behavior
Security
09.21.2020
SOUPS 2020 - Replication: Why We Still Can't Browse in Peace On the Uniqueness and Reidentifiability
Security
09.21.2020
Facebook Connect 2020 | Securing Your Content
Security
09.25.2020
How we saved the Black Friday sales for a major jewelry shop - Niklas Bae Pedersen - NDC Oslo 2020
Security
09.30.2020
DIY security and privacy: roll your own VPN in 10 minutes - Jonas Nordstrand - NDC Oslo 2020
Security
09.30.2020
seccomp — Your Next Layer of Defense
Security
10.10.2020
Browser Fingerprinting: Stalking With a Personal Touch - Eivind Arvesen - NDC Oslo 2020
Security
10.13.2020
Confessions of a reformed pentester - Nick Murison - NDC Oslo 2020
Security
10.13.2020
Say Goodbye to Passwords and Hello to WebAuthn at JSConf Korea 2020 Home Edition
Security
10.14.2020
PEPR '20 - Beyond Access: Using Abac Frameworks to Implement Privacy and Security Policies
Security
10.15.2020
PEPR '20 - Privacy Architecture for Data-Driven Innovation Configure
Security
10.15.2020
PEPR '20 - Responsible Design through Experimentation: Learnings from LinkedIn
Security
10.15.2020
PEPR '20 - Product Privacy Journey: Towards a Product Centric Privacy Engineering Framework
Security
10.15.2020
PEPR '20 - Improving Usability of Differential Privacy at Scale
Security
10.15.2020
PEPR '20 - Privacy Professional Boss Mode
Security
10.15.2020
PEPR '20 - Building and Deploying a Privacy Preserving Data Analysis Platform
Security
10.15.2020
PEPR '20 - A Differentially Private Data Analytics API at Scale
Security
10.15.2020
PEPR '20 - How to (In)Effectively Convey Privacy Choices with Icons and Link Text
Security
10.15.2020
PEPR '20 - Throwing Out the Checklist
Security
10.15.2020
PEPR '20 - Beyond the Individual: Exploring Data Protection by Design in Connected Communal Spaces
Security
10.15.2020
PEPR '20 - Wikipedia and the Lean Data Diet
Security
10.15.2020
PEPR '20 - When Engineers and Lawyers Talk: Right-Sizing Your Data Protection Risk Profile
Security
10.16.2020
PEPR '20 - When Things Go Wrong
Security
10.16.2020
PEPR '20 - Building an Effective Feedback Loop for Your Privacy Program through Privacy Incident
Security
10.16.2020
PEPR '20 - Assessing Privacy Risk with the IPA Triad
Security
10.16.2020
PEPR '20 - Privacy in Deployment
Security
10.16.2020
PEPR '20 - Engineering Ethics into the NIST Privacy Framework
Security
10.16.2020
PEPR '20 - Design of a Privacy Infrastructure for the Internet of Things
Security
10.16.2020
PEPR '20 - A Backdoor by Any Other Name, and How to Stop It
Security
10.16.2020
PEPR '20 - Taking Responsibility for Someone Else's Code: Studying the Privacy Behaviors of Mobile
Security
10.16.2020
Keep your nose out of it. Denying yourself access to production - Glenn F. Henriksen
Security
10.21.2020
Proactive Security, less buzzword, more action - Siren Hofvander
Security
10.30.2020
How secure is your build/server? a story of packages and trust
Security
11.04.2020
Security Practices for Developers by Prima Virani #AgileIndia2020
Security
11.07.2020
Building Resilient Security Log Pipelines with Chaos by Prima Virani #AgileIndia2020
Security
11.07.2020
Securing Your Pipes with a TACO by Peter Maddison #AgileIndia2020
Security
11.07.2020
How Secure Is Your Build Server? A Story of Packages and Trust
Security
11.07.2020
OSDI '20 - SafetyPin: Encrypted Backups with Human-Memorable Secrets
Security
11.18.2020
OSDI '20 - Efficiently Mitigating Transient Execution Attacks using the Unmapped Speculation...
Security
11.18.2020
GOTO 2020 • Q4 - Are You Keeping Hosts Up to Date with the Latest Security Releases? • Liz Rice
Security
12.01.2020
Validating your Trusted Web Activity’s Digital Asset Links
Security
12.08.2020
GOTO 2020 • Q5 - Are Your Secrets Encrypted at Rest and in Transit? • Liz Rice
Security
12.08.2020
USENIX Security ’20 - NetWarden: Mitigating Network Covert Channels while Preserving Performance
Security
12.16.2020
GOTO 2020 • Secure Your Containers with Expert Advice • Liz Rice & Eoin Woods
Security
12.17.2020
Building Security into your Continuous Delivery pipelines by Harinee Muralinath #SeConf2020
Security
01.05.2021
Start with the scariest feature - how to prioritise what to test by Shi Ling Tai #SeConf2020
Security
01.05.2021
Build a responsive typescript wdio framework by Varuna Srivastava & Wim Selles #SeConf2020
Security
01.05.2021
Is Quality Really Everyone's Responsibility? The Accountability Conundrum by Deepak Koul #SeConf2020
Security
01.07.2021
How to Break PDF Security
Security
02.22.2021
OWASP Top 10 (Security Risks and Vulnerabilities)
Security
03.10.2021
All things security with Troy Hunt | Tech Skills Day
Security
04.22.2021
Advertising on a privacy-first web
Security
04.26.2021
Anti-tracking: What you need to know
Security
04.26.2021
Demystifying Front-End Security - Ilya Verbitskiy
Security
05.10.2021
Effective password management
Security
05.12.2021
From security as opt-in to security by default
Security
05.12.2021
GOTO 2021 • Embarking on Your Security Journey • Seth Vargo
Security
05.17.2021
Getting Started in Cybersecurity
Security
05.23.2021
LISA21 - Lessons Learned from a Ransomware Attack
Security
06.09.2021
LISA21 - The Cornerstone for Cybersecurity—Cryptographic Standards
Security
06.09.2021
LISA21 - The Remote Working Security Conundrum: What Is Reasonably Secure Anyway?
Security
06.09.2021
LISA21 - Beyond Firefighter vs. Safety Matches: Growing the DevSecOps Pipeline
Security
06.09.2021
HTTP Security Headers You Need To Have On Your Web Apps - Scott Sauber - NDC London 2021
Security
06.15.2021
Security Chaos Engineering: From Theory to Practice • Jamie Dicken • GOTO 2021
Security
06.21.2021
The Rise of Software Supply-Chain Attacks – How Secure is your .NET Application? - Niels Tanis
Security
06.22.2021
Differential Privacy – What is it and why should you care?
Security
06.23.2021
Secure That App!
06.28.2021
Changing the “S” in SDLC to Secure
06.28.2021
Achieving next-level security with secretless apps
07.08.2021
How to Start or Transition into Cyber Security
07.26.2021
The Growing Field of Cloud Security & What It Means To You
08.02.2021
USENIX Security '21 - The Use of Likely Invariants as Feedback for Fuzzers
09.04.2021
USENIX Security '21 - APICraft: Fuzz Driver Generation for Closed-source SDK Libraries
09.04.2021
USENIX Security '21 - People Count: Contact Tracing Apps and Public Health
09.04.2021
USENIX Security '21 - Cerebro: A Platform for Multi-Party Cryptographic Collaborative Learning
09.04.2021
USENIX Security '21 - Fantastic Four: Honest-Majority Four-Party Secure Computation With Malicious
09.04.2021
USENIX Security '21 - Defeating DNN-Based Traffic Analysis Systems in Real-Time With Blind
09.04.2021
USENIX Security '21 - JAW: Studying Client-side CSRF with Hybrid Property Graphs and Declarative
09.04.2021
USENIX Security '21 - Token-Level Fuzzing
09.04.2021
USENIX Security '21 - Extracting Training Data from Large Language Models
09.04.2021
USENIX Security '21 - Fingerprinting in Style: Detecting Browser Extensions via Injected Style
09.04.2021
USENIX Security '21 - CACTI: Captcha Avoidance via Client-side TEE Integration
09.04.2021
USENIX Security '21 - Cost-Aware Robust Tree Ensembles for Security Applications
09.04.2021
USENIX Security '21 - T-Miner: A Generative Approach to Defend Against Trojan Attacks on DNN-based
09.04.2021
USENIX Security '21 - ARCUS: Symbolic Root Cause Analysis of Exploits in Production Systems
09.04.2021
USENIX Security '21 - Dompteur: Taming Audio Adversarial Examples
09.04.2021
USENIX Security '21 - Preventing Use-After-Free Attacks with Fast Forward Allocation
09.04.2021
USENIX Security '21 - Senate: A Maliciously-Secure MPC Platform for Collaborative Analytics
09.04.2021
USENIX Security '21 - An Analysis of Speculative Type Confusion Vulnerabilities in the Wild
09.04.2021
USENIX Security '21 - Hermes Attack: Steal DNN Models with Lossless Inference Accuracy
09.04.2021
USENIX Security '21 - Reducing Test Cases with Attention Mechanism of Neural Networks
09.04.2021
USENIX Security '21 - Blinder: Partition-Oblivious Hierarchical Scheduling
09.04.2021
USENIX Security '21 - Entangled Watermarks as a Defense against Model Extraction
09.04.2021
USENIX Security '21 - Privacy and Integrity Preserving Computations with CRISP
09.04.2021
USENIX Security '21 - GForce: GPU-Friendly Oblivious and Rapid Neural Network Inference
09.04.2021
USENIX Security '21 - Deep-Dup: An Adversarial Weight Duplication Attack Framework to Crush Deep
09.04.2021
USENIX Security '21 - AdCube: WebVR Ad Fraud and Practical Confinement of Third-Party Ads
09.04.2021
USENIX Security '21 - Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing
09.04.2021
USENIX Security '21 - Can I Take Your Subdomain? Exploring Same-Site Attacks in the Modern Web
09.04.2021
USENIX Security '21 - ICSFuzz: Manipulating I/Os and Repurposing Binary Code to Enable Instrumented
09.04.2021
USENIX Security '21 - Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types
09.04.2021
USENIX Security '21 - PolyScope: Multi-Policy Access Control Analysis to Compute Authorized Attack
09.04.2021
USENIX Security '21 - UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating
09.04.2021
USENIX Security '21 - Stealing Links from Graph Neural Networks
09.04.2021
USENIX Security '21 - Kalεido: Real-Time Privacy Control for Eye-Tracking Systems
09.04.2021
USENIX Security '21 - SLAP: Improving Physical Adversarial Examples with Short-Lived Adversarial
09.04.2021
USENIX Security '21 - Breaking Through Binaries: Compiler-quality Instrumentation for Better
09.04.2021
USENIX Security '21 - Rage Against the Machine Clear: A Systematic Analysis of Machine Clears...
09.04.2021
USENIX Security '21 - Swivel: Hardening WebAssembly against Spectre
09.04.2021
USENIX Security '21 - KeyForge: Non-Attributable Email from Forward-Forgeable Signatures
09.04.2021
USENIX Security '21 - DOLMA: Securing Speculation with the Principle of Transient Non-Observability
09.04.2021
USENIX Security '21 - Express: Lowering the Cost of Metadata-hiding Communication with Cryptographic
09.04.2021
USENIX Security '21 - MAZE: Towards Automated Heap Feng Shui
09.04.2021
USENIX Security '21 - DRMI: A Dataset Reduction Technology based on Mutual Information for Black-box
09.04.2021
USENIX Security '21 - I Always Feel Like Somebody's Sensing Me! A Framework to Detect, Identify, and
09.04.2021
USENIX Security '21 - Demon in the Variant: Statistical Analysis of DNNs for Robust Backdoor
09.04.2021
USENIX Security '21 - Static Detection of Unsafe DMA Accesses in Device Drivers
09.04.2021
USENIX Security '21 - The Complexities of Healing in Secure Group Messaging: Why Cross-Group Effects
09.04.2021
USENIX Security '21 - Fine Grained Dataflow Tracking with Proximal Gradients
09.04.2021
USENIX Security '21 - Blind Backdoors in Deep Learning Models
09.04.2021
USENIX Security '21 - Communication–Computation Trade-offs in PIR
09.04.2021
USENIX Security '21 - ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation
09.04.2021
USENIX Security '21 - Mind Your Weight(s): A Large-scale Study on Insufficient Machine Learning
09.04.2021
USENIX Security '21 - CADE: Detecting and Explaining Concept Drift Samples for Security Applications
09.04.2021
USENIX Security '21 - Muse: Secure Inference Resilient to Malicious Clients
09.04.2021
USENIX Security '21 - FlowDist: Multi-Staged Refinement-Based Dynamic Information Flow Analysis for
09.04.2021
USENIX Security '21 - SIGL: Securing Software Installations Through Deep Graph Learning
09.04.2021
USENIX Security '21 - PatchGuard: A Provably Robust Defense against Adversarial Patches via Small
09.04.2021
USENIX Security '21 - Understanding and Detecting Disordered Error Handling with Precise Function
09.04.2021
USENIX Security '21 - Precise and Scalable Detection of Use-after-Compacting-Garbage-Collection Bugs
09.04.2021
USENIX Security '21 - Graph Backdoor
09.04.2021
USENIX Security '21 - Pretty Good Phone Privacy
09.04.2021
USENIX Security '21 - Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers
09.04.2021
USENIX Security '21 - Double-Cross Attacks: Subverting Active Learning Systems
09.04.2021
USENIX Security '21 - You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion
09.04.2021
USENIX Security '21 - SelectiveTaint: Efficient Data Flow Tracking With Static Binary Rewriting
09.04.2021
USENIX Security '21 - Adversarial Policy Training against Deep Reinforcement Learning
09.04.2021
USENIX Security '21 - VScape: Assessing and Escaping Virtual Call Protections
09.04.2021
USENIX Security '21 - Osiris: Automated Discovery of Microarchitectural Side Channels
09.04.2021
USENIX Security '21 - Poisoning the Unlabeled Dataset of Semi-Supervised Learning
09.04.2021
USENIX Security '21 - MIRAGE: Mitigating Conflict-Based Cache Attacks with a Practical...
09.04.2021
USENIX Security '21 - PrivSyn: Differentially Private Data Synthesis
09.04.2021
USENIX Security '21 - Finding Bugs Using Your Own Code: Detecting Functionally-similar yet
09.04.2021
USENIX Security '21 - MBA-Blast: Unveiling and Simplifying Mixed Boolean-Arithmetic Obfuscation
09.04.2021
USENIX Security '21 - WaveGuard: Understanding and Mitigating Audio Adversarial Examples
09.04.2021
USENIX Security '21 - Automatic Firmware Emulation through Invalidity-guided Knowledge Inference
09.04.2021
USENIX Security '21 - Can Systems Explain Permissions Better? Understanding Users' Misperceptions...
09.04.2021
USENIX Security '21 - "It's the Company, the Government, You and I": User Perceptions of...
09.04.2021
USENIX Security '21 - CSProp: Ciphertext and Signature Propagation Low-Overhead Public-Key...
09.04.2021
USENIX Security '21 - Where's Crypto?: Automated Identification and Classification of Proprietary...
09.04.2021
USENIX Security '21 - Database Reconstruction from Noisy Volumes: A Cache Side-Channel Attack...
09.04.2021
USENIX Security '21 - Identifying Harmful Media in End-to-End Encrypted Communication...
09.04.2021
USENIX Security '21 - CURE: A Security Architecture with CUstomizable and Resilient Enclaves
09.04.2021
USENIX Security '21 - DICE*: A Formally Verified Implementation of DICE Measured Boot
09.04.2021
USENIX Security '21 - Incrementally Updateable Honey Password Vaults
09.04.2021
USENIX Security '21 - Private Blocklist Lookups with Checklist
09.04.2021
USENIX Security '21 - Strategies and Perceived Risks of Sending Sensitive Documents
09.04.2021
USENIX Security '21 - Adapting Security Warnings to Counter Online Disinformation
09.04.2021
USENIX Security '21 - Does logic locking work with EDA tools?
09.04.2021
USENIX Security '21 - EOSAFE: Security Analysis of EOSIO Smart Contracts
09.04.2021
USENIX Security '21 - "Why wouldn't someone think of democracy as a target?"...
09.04.2021
USENIX Security '21 - EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts
09.04.2021
USENIX Security '21 - Fuzzy Labeled Private Set Intersection with Applications to Private...
09.04.2021
USENIX Security '21 - Smart Contract Vulnerabilities: Vulnerable Does Not Imply Exploited
09.04.2021
USENIX Security '21 - Examining the Efficacy of Decoy-based and Psychological Cyber Deception
09.04.2021
USENIX Security '21 - Evil Under the Sun: Understanding and Discovering Attacks on Ethereum...
09.04.2021
USENIX Security '21 - PTAuth: Temporal Memory Safety via Robust Points-to Authentication
09.04.2021
USENIX Security '21 - A Large-Scale Interview Study on Information Security in and Attacks...
09.04.2021
USENIX Security '21 - Data Poisoning Attacks to Local Differential Privacy Protocols
09.04.2021
USENIX Security '21 - Locally Differentially Private Analysis of Graph Statistics
09.04.2021
USENIX Security '21 - PEARL: Plausibly Deniable Flash Translation Layer using WOM coding
09.04.2021
USENIX Security '21 - How to Make Private Distributed Cardinality Estimation Practical...
09.04.2021
USENIX Security '21 - Using Amnesia to Detect Credential Database Breaches
09.04.2021
USENIX Security '21 - Helping Users Automatically Find and Manage Sensitive, Expendable Files...
09.04.2021
USENIX Security '21 - Frontrunner Jones and the Raiders of the Dark Forest: An Empirical Study...
09.04.2021
USENIX Security '21 - Effect of Mood, Location, Trust, and Presence of Others on Video-Based...
09.04.2021
USENIX Security '21 - "It's Stored, Hopefully, on an Encrypted Server'': Mitigating Users'...
09.04.2021
USENIX Security '21 - Why Older Adults (Don't) Use Password Managers
09.04.2021
USENIX Security '21 - Protecting Cryptography Against Compelled Self-Incrimination
09.04.2021
USENIX Security '21 - Cross-VM and Cross-Processor Covert Channels Exploiting Processor Idle...
09.04.2021
USENIX Security '21 - The Role of Computer Security Customer Support in Helping Survivors...
09.04.2021
USENIX Security '21 - Evaluating In-Workflow Messages for Improving Mental Models of End-to-End...
09.04.2021
USENIX Security '21 - CIPHERLEAKS: Breaking Constant-time Cryptography on AMD SEV via...
09.04.2021
USENIX Security '21 - M2MON: Building an MMIO-based Security Reference Monitor for Unmanned Vehicles
09.04.2021
USENIX Security '21 - Explanation Beats Context: The Effect of Timing & Rationales on Users'...
09.04.2021
USENIX Security '21 - PASAN: Detecting Peripheral Access Concurrency Bugs within Bare-Metal...
09.04.2021
USENIX Security '21-VoltPillager: Hardware-based fault injection attacks against Intel SGX Enclaves
09.04.2021
USENIX Security '21 - "Now I'm a bit angry:" Individuals' Awareness, Perception, and Responses...
09.04.2021
USENIX Security '21 - A Large Scale Study of User Behavior, Expectations and Engagement with...
09.04.2021
USENIX Security '21 - Jetset: Targeted Firmware Rehosting for Embedded Systems
09.04.2021
USENIX Security '21 - Sharing More and Checking Less: Leveraging Common Input Keywords to Detect...
09.04.2021
USENIX Security '21 - Dynamic proofs of retrievability with low server storage
09.04.2021
USENIX Security '21 - PACStack: an Authenticated Call Stack
09.04.2021
USENIX Security '21 - Reducing Bias in Modeling Real-world Password Strength via Deep Learning...
09.04.2021
USENIX Security '21 - Frontal Attack: Leaking Control-Flow in SGX via the CPU Frontend
09.04.2021
USENIX Security '21 - Charger-Surfing: Exploiting a Power Line Side-Channel for Smartphone...
09.04.2021
USENIX Security '21 - Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring...
09.04.2021
USENIX Security '21 - "It's stressful having all these phones": Investigating Sex Workers' Safety...
09.04.2021
USENIX Security '21 - "Shhh...be quiet!" Reducing the Unwanted Interruptions of Notification...
09.04.2021
USENIX Security '21 - On the Design and Misuse of Microcoded (Embedded) Processors—A Cautionary Note
09.04.2021
USENIX Security '21 - Automatic Extraction of Secrets from the Transistor Jungle using...
09.04.2021
USENIX Security '21 - Inexpensive Brainwave Authentication: New Techniques and Insights...
09.04.2021
USENIX Security '21 - V0Finder: Discovering the Correct Origin of Publicly Reported Software
09.04.2021
USENIX Security '21 - Driving 2FA Adoption at Scale: Optimizing Two-Factor Authentication...
09.04.2021
USENIX Security '21 - Capture: Centralized Library Management for Heterogeneous IoT Devices
09.04.2021
USENIX Security '21 - Hiding the Access Pattern is Not Enough: Exploiting Search Pattern Leakage...
09.04.2021
USENIX Security '21 - Are Privacy Dashboards Good for End Users? Evaluating User Perceptions...
09.04.2021
USENIX Security '21 - PriSEC: A Privacy Settings Enforcement Controller
09.04.2021
USENIX Security '21 - Deep Entity Classification: Abusive Account Detection for Online Social
09.04.2021
USENIX Security '21 - Minerva– An Efficient Risk-Limiting Ballot Polling Audit
09.04.2021
USENIX Security '21 - Searching Encrypted Data with Size-Locked Indexes
09.04.2021
USENIX Security '21 - A Highly Accurate Query-Recovery Attack against Searchable Encryption...
09.04.2021
USENIX Security '21 - On the Usability of Authenticity Checks for Hardware Security Tokens
09.04.2021
USENIX Security '21 - Card Brand Mixup Attack: Bypassing the PIN in non-Visa Cards by Using Them...
09.04.2021
USENIX Security '21 - 'Passwords Keep Me Safe' – Understanding What Children Think about Passwords
09.04.2021
USENIX Security '21 - Understanding Malicious Cross-library Data Harvesting on Android
09.04.2021
USENIX Security '21 - Mystique: Efficient Conversions for Zero-Knowledge Proofs with Applications...
09.04.2021
USENIX Security '21 - Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation
09.04.2021
USENIX Security '21 - Ripple: A Programmable, Decentralized Link-Flooding Defense Against Adaptive
09.04.2021
USENIX Security '21 - Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles...
09.04.2021
USENIX Security '21 - A Side Journey To Titan
09.04.2021
USENIX Security '21 - LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks
09.04.2021
USENIX Security '21 - Assessing Browser-level Defense against IDN-based Phishing
09.04.2021
USENIX Security '21 - Exposing New Vulnerabilities of Error Handling Mechanism in CAN
09.04.2021
USENIX Security '21 - Blind In/On-Path Attacks and Applications to VPNs
09.04.2021
USENIX Security '21 - Risky Business? Investigating the Security Practices of Vendors on an Online
09.04.2021
USENIX Security '21 - Causal Analysis for Software-Defined Networking Attacks
09.04.2021
USENIX Security '21 - Privacy-Preserving and Standard-Compatible AKA Protocol for 5G
09.04.2021
USENIX Security '21 - Compromised or Attacker-Owned: A Large Scale Classification and Study
09.04.2021
USENIX Security '21 - LZR: Identifying Unexpected Internet Services
09.04.2021
USENIX Security '21 - Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service
09.04.2021
USENIX Security '21 - Acoustics to the Rescue: Physical Key Inference Attack Revisited
09.04.2021
USENIX Security '21 - Virtual Secure Platform: A Five-Stage Pipeline Processor over TFHE
09.04.2021
USENIX Security '21 - Accurately Measuring Global Risk of Amplification Attacks using AmpMap
09.04.2021
USENIX Security '21 - Domain Shadowing: Leveraging Content Delivery Networks for Robust Blocking
09.04.2021
USENIX Security '21 - DeepReflect: Discovering Malicious Functionality through Binary Reconstruction
09.04.2021
USENIX Security '21 - Phishpedia: A Hybrid Deep Learning Based Approach to Visually Identify
09.04.2021
USENIX Security '21 - HAWatcher: Semantics-Aware Anomaly Detection for Appified Smart Homes
09.04.2021
USENIX Security '21 - ReDoSHunter: A Combined Static and Dynamic Approach for Regular Expression DoS
09.04.2021
USENIX Security '21 - PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop
09.04.2021
USENIX Security '21 - Formally Verified Memory Protection for a Commodity Multiprocessor Hypervisor
09.04.2021
USENIX Security '21 - Automated Discovery of Denial-of-Service Vulnerabilities in Connected Vehicle
09.04.2021
USENIX Security '21 - Once is Never Enough: Foundations for Sound Statistical Inference in Tor
09.04.2021
USENIX Security '21 - Hopper: Modeling and Detecting Lateral Movement
09.04.2021
USENIX Security '21 - Stars Can Tell: A Robust Method to Defend against GPS Spoofing Attacks
09.04.2021
USENIX Security '21 - SiamHAN: IPv6 Address Correlation Attacks on TLS Encrypted Traffic
09.04.2021
USENIX Security '21 - Research on the Security of Visual Reasoning CAPTCHA
09.04.2021
USENIX Security '21 - Disrupting Continuity of Apple's Wireless Ecosystem Security: New Tracking
09.04.2021
USENIX Security '21 - DEFInit: An Analysis of Exposed Android Init Routines
09.04.2021
USENIX Security '21 - Collective Information Security in Large-Scale Urban Protests
09.04.2021
USENIX Security '21 - SEAL: Storage-efficient Causality Analysis on Enterprise Logs
09.04.2021
USENIX Security '21 - Injection Attacks Reloaded: Tunnelling Malicious Payloads over DNS
09.04.2021
USENIX Security '21 - ELISE: A Storage Efficient Logging System Powered by Redundancy Reduction
09.04.2021
USENIX Security '21 - CLARION: Sound and Clear Provenance Tracking for Microservice Deployments
09.04.2021
USENIX Security '21 - A11y and Privacy don't have to be mutually exclusive: Constraining
09.04.2021
USENIX Security '21 - Reducing HSM Reliance in Payments through Proxy Re-Encryption
09.04.2021
USENIX Security '21 - Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender
09.04.2021
USENIX Security '21 - ReDMArk: Bypassing RDMA Security Mechanisms
09.04.2021
USENIX Security '21 - SEApp: Bringing Mandatory Access Control to Android Apps
09.04.2021
USENIX Security '21 - Scalable Detection of Promotional Website Defacements in Black Hat SEO
09.04.2021
USENIX Security '21 - Jaqen: A High-Performance Switch-Native Approach for Detecting and Mitigating
09.04.2021
USENIX Security '21 - Balboa: Bobbing and Weaving around Network Censorship
09.04.2021
USENIX Security '21 - SocialHEISTing: Understanding Stolen Facebook Accounts
09.04.2021
USENIX Security '21 - Why Eve and Mallory Still Love Android: Revisiting TLS (In)Security in Android
09.04.2021
USENIX Security '21 - What's in a Name? Exploring CA Certificate Control
09.04.2021
USENIX Security '21 - Security Analysis of the Democracy Live Online Voting System
09.04.2021
USENIX Security '21 - Share First, Ask Later (or Never?) Studying Violations of GDPR's Explicit
09.04.2021
USENIX Security '21 - Messy States of Wiring: Vulnerabilities in Emerging Personal Payment Systems
09.04.2021
USENIX Security '21 - YARIX: Scalable YARA-based Malware Intelligence
09.04.2021
USENIX Security '21 - Weaponizing Middleboxes for TCP Reflected Amplification
09.04.2021
USENIX Security '21 - The Circle Of Life: A Large-Scale Study of The IoT Malware Lifecycle
09.04.2021
USENIX Security '21 - mID: Tracing Screen Photos via Moiré Patterns
09.04.2021
USENIX Security '21 - Catching Phishers By Their Bait: Investigating the Dutch Phishing Landscape
09.04.2021
USENIX Security '21 - Swiped: Analyzing Ground-truth Data of a Marketplace for Stolen Debit
09.04.2021
SOUPS 2021 - On the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging Security
09.04.2021
SOUPS 2021 - Exploring Authentication for Security-Sensitive Tasks on Smart Home Voice Assistants
09.04.2021
USENIX Security '21 - The Hijackers Guide To The Galaxy: Off-Path Taking Over Internet Resources
09.04.2021
USENIX Security '21 - Why TLS is better without STARTTLS: A Security Analysis of STARTTLS
09.04.2021
USENIX Security '21 - Rollercoaster: An Efficient Group-Multicast Scheme for Mix Networks
09.04.2021
USENIX Security '21 - Constraint-guided Directed Greybox Fuzzing
09.04.2021
USENIX Security '21 - A Stealthy Location Identification Attack Exploiting Carrier Aggregation
09.04.2021
USENIX Security '21 - Obfuscation-Resilient Executable Payload Extraction From Packed Malware
09.04.2021
USENIX Security '21 - CANARY - a reactive defense mechanism for Controller Area Networks based
09.04.2021
USENIX Security '21 - How Great is the Great Firewall? Measuring China's DNS Censorship
09.04.2021
USENIX Security '21 - Is Real-time Phishing Eliminated with FIDO? Social Engineering Downgrade
09.04.2021
USENIX Security '21 - ALPACA: Application Layer Protocol Confusion - Analyzing and Mitigating Cracks
09.04.2021
SOUPS 2021 - Examining the Examiners: Students' Privacy and Security Perceptions of Online
09.04.2021
USENIX Security '21 - PhishPrint: Evading Phishing Detection Crawlers by Prior Profiling
09.04.2021
USENIX Security '21 - Forecasting Malware Capabilities From Cyber Attack Memory Images
09.04.2021
USENIX Security '21 - Experiences Deploying Multi-Vantage-Point Domain Validation at Let's Encrypt
09.04.2021
USENIX Security '21 - Blitz: Secure Multi-Hop Payments Without Two-Phase Commits
09.04.2021
USENIX Security '21 - When Malware Changed Its Mind: An Empirical Study of Variable Program Behavior
09.04.2021
USENIX Security '21 - ATLAS: A Sequence-based Learning Approach for Attack Investigation
09.04.2021
SOUPS 2021 - Code Reviewing as Methodology for Online Security Studies with Developers - A Case
09.04.2021
SOUPS 2021 - An Analysis of the Role of Situated Learning in Starting a Security Culture in a
09.04.2021
SOUPS 2021 - Using a Blocklist to Improve the Security of User Selection of Android Patterns
09.04.2021
SOUPS 2021 - Understanding Users' Knowledge about the Privacy and Security of Browser Extensions
09.04.2021
SOUPS 2021 - User Perceptions of the Usability and Security of Smartphones as FIDO2 Roaming
09.04.2021
SOUPS 2021 - "I'm Literally Just Hoping This Will Work:'' Obstacles Blocking the Online Security
09.04.2021
SOUPS 2021 - Comparing Security and Privacy Attitudes Among U.S. Users of Different Smartphone and
09.04.2021
"Why security is the biggest benefit of using the Cloud" by AJ Yawn
10.15.2021
"Why security is the biggest benefit of using the Cloud" by AJ Yawn
10.15.2021
"Injecting Security at the Cloud Edge" by Susan Hinrichs
10.16.2021
"Injecting Security at the Cloud Edge" by Susan Hinrichs
10.16.2021
Automated Application Security Testing with StackHawk - Scott Gerlach, React Advanced 2021
10.27.2021
Creating a Security Pipeline to cover your ASSets
11.04.2021
LISA16 - The Road to Mordor: Information Security Issues and Your Open Source Project
11.20.2021
LISA16 - Behind Closed Doors: Managing Passwords in a Dangerous World
11.20.2021
FAST '15 - Efficient Intra-Operating System Protection Against Harmful DMAs
11.22.2021
Security and usability with cross-origin isolation | Workshop
12.01.2021
USENIX Security '16 - Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks
12.02.2021
USENIX Security '16 - zxcvbn: Low-Budget Password Strength Estimation
12.02.2021
USENIX Security '16 - An Empirical Study of Textual Key-Fingerprint Representations
12.02.2021
USENIX Security '16 - Faster Malicious 2-Party Secure Computation with Online/Offline Dual Execution
12.03.2021
USENIX Security '16 - Micro-Virtualization Memory Tracing to Detect and Prevent Spraying Attacks
12.03.2021
USENIX Security '16 - Trusted Browsers for Uncertain Times
12.03.2021
USENIX Security '16 - ARMageddon: Cache Attacks on Mobile Devices
12.03.2021
USENIX Security '16 - An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries
12.03.2021
USENIX Security '16 - DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks
12.03.2021
USENIX Security '16 - Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage
12.03.2021
USENIX Security '16 - All Your Queries Are Belong to Us: The Power of File-Injection Attacks...
12.03.2021
USENIX Security '16 - Predicting, Decrypting, and Abusing WPA2/802.11 Group Keys
12.03.2021
USENIX Security '16 - Measuring PUP Prevalence and PUP Distribution through Pay-Per-Install Services
12.03.2021
USENIX Security '16 - Investigating Commercial Pay-Per-Install and the Distribution of Unwanted...
12.03.2021
USENIX Security '16 - UNVEIL: A Large-Scale, Automated Approach to Detecting Ransomware
12.03.2021
USENIX Security '16 - Towards Measuring and Mitigating Social Engineering Software Download Attacks
12.03.2021
USENIX Security '16 - The Unfalsifiability of Security Claims
12.03.2021
USENIX Security '16 - Teaching Computer Security: Thoughts from the Field
12.03.2021
USENIX Security '16 - Authenticated Network Time Synchronization
12.03.2021
USENIX Security '16 - Specification Mining for Intrusion Detection in Networked Control Systems
12.03.2021
USENIX Security '16 - Optimized Invariant Representation of Network Traffic for Detecting Unseen...
12.03.2021
USENIX Security '16 - Sanctum: Minimal Hardware Extensions for Strong Software Isolation
12.03.2021
USENIX Security '16 - Ariadne: A Minimal Approach to State Continuity
12.03.2021
USENIX Security '16 - fTPM: A Software-Only Implementation of a TPM Chip
12.03.2021
USENIX Security '16 - The Million-Key Question—Investigating the Origins of RSA Public Keys
12.03.2021
USENIX Security '16 - Lock It and Still Lose It —on the (In)Security of Automotive Remote Keyless...
12.03.2021
USENIX Security '16 - Fingerprinting Electronic Control Units for Vehicle Intrusion Detection
12.03.2021
USENIX Security '16 - Finding and Fixing Security Bugs in Flash
12.03.2021
USENIX Security '16 - OblivP2P: An Oblivious Peer-to-Peer Content Sharing System
12.03.2021
USENIX Security '16 - AuthLoop: End-to-End Cryptographic Authentication for Telephony...
12.03.2021
USENIX Security '16 - Report from the Field: A CDN's Role in Repelling Attacks against Banking...
12.03.2021
USENIX Security '16 - You Are Who You Know and How You Behave: Attribute Inference Attacks...
12.03.2021
USENIX Security '16 - You've Got Vulnerability: Exploring Effective Vulnerability Notifications
12.03.2021
USENIX Security '16 - Mirror: Enabling Proofs of Data Replication and Retrievability in the Cloud
12.03.2021
USENIX Security '16 - ZKBoo: Faster Zero-Knowledge for Boolean Circuits
12.03.2021
USENIX Security '16 - The Cut-and-Choose Game and Its Application to Cryptographic Protocols
12.03.2021
USENIX Security '16-Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study...
12.03.2021
USENIX Security '16 - AMD x86 Memory Encryption Technologies
12.03.2021
USENIX Security '16 - Harvesting Inconsistent Security Configurations in Custom Android ROMs...
12.03.2021
USENIX Security '16 - k-fingerprinting: A Robust Scalable Website Fingerprinting Technique
12.03.2021
USENIX Security '16 - Identifying and Characterizing Sybils in the Tor Network
12.03.2021
USENIX Security '16 - Protecting Privacy of BLE Device Users
12.03.2021
USENIX Security '16 - Privacy in Epigenetics: Temporal Linkability of MicroRNA Expression Profiles
12.03.2021
USENIX Security '16 - Security Competitions
12.03.2021
USENIX Security '16-Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability...
12.03.2021
LISA15 - Sysadmins and Their Role in Cyberwar: Why Several Governments Want to Spy on and Hack You
12.09.2021
LISA15 - Vulnerability Scanning's Not Good Enough: Enforcing Security and Compliance at Velocity
12.09.2021
USENIX Security '15 - Under-Constrained Symbolic Execution: Correctness Checking for Real Code
12.09.2021
USENIX Security '15 - Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications
12.09.2021
USENIX Security '15 - Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS
12.09.2021
USENIX Security '15 - Transforming Innovative Security Concepts into Disruptive Security Companies
12.10.2021
USENIX Security '15 - Protocol State Fuzzing of TLS Implementations
12.10.2021
USENIX Security '15 - Verified Correctness and Security of OpenSSL HMAC
12.10.2021
USENIX Security '15 - De-anonymizing Programmers via Code Stylometry
12.10.2021
USENIX Security '15 - To Pin or Not to Pin—Helping App Developers Bullet Proof Their TLS Connections
12.10.2021
USENIX Security '15 - SecGraph: A Uniform and Open-source Evaluation System for Graph Data...
12.10.2021
USENIX Security '15 - Not-Quite-So-Broken TLS: Lessons in Re-Engineering a Security Protocol...
12.10.2021
USENIX Security '15 - Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services
12.10.2021
USENIX Security '15 - Securing Self-Virtualizing Ethernet Devices
12.10.2021
USENIX Security '15 - Marionette: A Programmable Network Traffic Obfuscation System
12.10.2021
USENIX Security '15 - EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced...
12.10.2021
USENIX Security '15 - Constants Count: Practical Improvements to Oblivious RAM
12.10.2021
USENIX Security '15 - CONIKS: Bringing Key Transparency to End Users
12.10.2021
USENIX Security '15 - M2R: Enabling Stronger Privacy in MapReduce Computation
12.10.2021
USENIX Security '15 - Measuring Real-World Accuracies and Biases in Modeling Password Guessability
12.10.2021
USENIX Security '15 - Raccoon: Closing Digital Side-Channels through Obfuscated Execution
12.10.2021
USENIX Security '15 - Faster Secure Computation through Automatic Parallelization
12.10.2021
USENIX Security '15 - Trends and Lessons from Three Years Fighting Malicious Extensions
12.10.2021
USENIX Security '15 - Trends and Lessons from Three Years Fighting Malicious Extensions
12.10.2021
USENIX Security '15 - The Pythia PRF Service
12.10.2021
USENIX Security '15 - Phasing: Private Set Intersection Using Permutation-based Hashing
12.10.2021
USENIX Security '15 - Phasing: Private Set Intersection Using Permutation-based Hashing
12.10.2021
USENIX Security '15 - EVILCOHORT: Detecting Communities of Malicious Accounts on Online Services
12.10.2021
USENIX Security '15 - EVILCOHORT: Detecting Communities of Malicious Accounts on Online Services
12.10.2021
USENIX Security '15 - Reassembleable Disassembling
12.10.2021
USENIX Security '15 - Reassembleable Disassembling
12.10.2021
USENIX Security '15 - Recognizing Functions in Binaries with Neural Networks
12.10.2021
USENIX Security '15 - Recognizing Functions in Binaries with Neural Networks
12.10.2021
USENIX Security '15 - How the ELF Ruined Christmas
12.10.2021
USENIX Security '15 - How the ELF Ruined Christmas
12.10.2021
USENIX Security '15 - Using Formal Methods to Eliminate Exploitable Bugs
12.10.2021
USENIX Security '15 - You Shouldn’t Collect My Secrets: Thwarting Sensitive Keystroke Leakage...
12.10.2021
USENIX Security '15 - Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats...
12.10.2021
USENIX Security '15 - Boxify: Full-fledged App Sandboxing for Stock Android
12.10.2021
USENIX Security '15 - Cookies Lack Integrity: Real-World Implications
12.10.2021
USENIX Security '15 - Perspectives on Securing Cyberspace
12.10.2021
USENIX Security '15 - ZigZag: Automatically Hardening Web Applications Against Client-side...
12.10.2021
USENIX Security '15 - Aggregation of App Usage Behaviors
12.10.2021
USENIX Security '15 - In the Compression Hornet’s Nest: A Security Study of Data Compression...
12.10.2021
USENIX Security '15 - Anatomization and Protection of Mobile Apps’ Location Privacy Threats
12.10.2021
USENIX Security '15 - PowerSpy: Location Tracking Using Mobile Device Power Analysis
12.10.2021
USENIX Security '15 - Bohatei: Flexible and Elastic DDoS Defense
12.10.2021
USENIX Security '15 - Boxed Out: Blocking Cellular Interconnect Bypass Fraud at the Network Edge
12.10.2021
USENIX Security '15 - Thermal Covert Channels on Multi-core Platforms
12.10.2021
USENIX Security '15 - GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies
12.10.2021
USENIX Security '15 - Cashtags: Protecting the Input and Display of Sensitive Data
12.10.2021
USENIX Security '15 - Needles in a Haystack: Mining Information from Public Dynamic Analysis...
12.10.2021
USENIX Security '15 - Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches
12.10.2021
USENIX Security '15 - A Placement Vulnerability Study in Multi-Tenant Public Clouds
12.10.2021
USENIX Security '15 - Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter...
12.10.2021
USENIX Security '15 - UIPicker: User-Input Privacy Identification in Mobile Applications
12.10.2021
USENIX Security '15 - WebWitness: Investigating, Categorizing, and Mitigating Malware Download Paths
12.10.2021
USENIX Security '15 - A Measurement Study on Co-residence Threat inside the Cloud
12.10.2021
USENIX Security '15 - SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps
12.10.2021
Cybersecurity Domains in the Cloud Environment
12.17.2021
Cybersecurity Domains in the Cloud Environment
12.17.2021
USENIX Security '14 - Brahmastra: Driving Apps to Test the Security of Third-Party Components
12.23.2021
USENIX Security '14 - Information Security War Room
12.23.2021
USENIX Security '14 - iSeeYou: Disabling the MacBook Webcam Indicator LED
12.23.2021
USENIX Security '14 - ROP is Still Dangerous: Breaking Modern Defenses
12.23.2021
USENIX Security '14 - A Large-Scale Analysis of the Security of Embedded Firmwares
12.23.2021
USENIX Security '14 - Burst ORAM: Minimizing ORAM Response Times for Bursty Access Patterns
12.23.2021
USENIX Security '14 - SpanDex: Secure Password Tracking for Android
12.23.2021
USENIX Security '14 - Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow
12.23.2021
USENIX Security '14 - Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens
12.23.2021
USENIX Security '14 - An Internet-Wide View of Internet-Wide Scanning
12.23.2021
USENIX Security '14 - Blanket Execution: Dynamic Similarity Testing for Program Binaries
12.23.2021
USENIX Security '14 - How To Live In Paradise: Pearls of Wisdom for New and Prospective Faculty
12.23.2021
USENIX Security '14 - Password Portfolios and the Finite-Effort User: Sustainably Managing Large
12.23.2021
USENIX Security '14 - ZØ: An Optimizing Distributing Zero-Knowledge Compiler
12.23.2021
USENIX Security '14 - Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin
12.23.2021
USENIX Security '14 - Size Does Matter: Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks
12.23.2021
USENIX Security '14 - Targeted Threat Index: Characterizing and Quantifying Politically-Motivated
12.23.2021
10 Java Security Practices They Didn't Teach You In School by Brian Vermeer
01.06.2022
Shift-Left-Security with the Security Test Pyramid by Andreas Falk
01.06.2022
USENIX Security '14 - Privee: An Architecture for Automatically Analyzing Web Privacy Policies
01.06.2022
USENIX Security '14 - SSOScan: Automated Testing of Web Applications for Single Sign-On
01.06.2022
USENIX Security '14 - FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack
01.07.2022
USENIX Security '14 - Towards Detecting Anomalous User Behavior in Online Social Networks
01.07.2022
USENIX Security '14 - JIGSAW: Protecting Resource Access by Inferring Programmer Expectations
01.07.2022
USENIX Security '14 - Scheduler-based Defenses against Cross-VM Side-channels
01.07.2022
USENIX Security '14 - A Bayesian Approach to Privacy Enforcement in Smartphones
01.07.2022
USENIX Security '14 - Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM
01.07.2022
USENIX Security '14 - The Long “Taile” of Typosquatting Domain Names
01.07.2022
USENIX Security '14 - Precise Client-side Protection against DOM-based Cross-Site Scripting
01.07.2022
USENIX Security '14 - Password Managers: Attacks and Defenses
01.07.2022
USENIX Security '14 - Cardinal Pill Testing of System Virtual Machines
01.07.2022
USENIX Security '14 - Opening Remarks and Awards
01.10.2022
USENIX Security '14 - Panel Discussion
01.10.2022
USENIX Security '14 - Optimizing Seed Selection for Fuzzing
01.10.2022
USENIX Security '14 - Faster Private Set Intersection Based on OT Extension
01.10.2022
USENIX Security '14 - X-Force: Force-Executing Binary Programs for Security Applications
01.10.2022
USENIX Security '14 - Preventing Cryptographic Key Leakage in Cloud Virtual Machines
01.10.2022
USENIX Security '14 - From the Aether to the Ethernet—Attacking the Internet using Broadcast Digital
01.10.2022
USENIX Security '14 - Gyrophone: Recognizing Speech from Gyroscope Signals
01.10.2022
USENIX Security '14 - Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels
01.10.2022
USENIX Security '14 - When Governments Hack Opponents: A Look at Actors and Technology
01.10.2022
USENIX Security '14 - LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption
01.10.2022
USENIX Security '14 - A Large-Scale Analysis of the Security of Embedded Firmwares
01.10.2022
USENIX Security '14 - SDDR: Light-Weight, Secure Mobile Encounters
01.10.2022
USENIX Security '14 - A Look at Targeted Attacks Through the Lense of an NGO
01.10.2022
USENIX Security '14 - Mimesis Aegis: A Mimicry Privacy Shield–A System’s Approach to Data Privacy
01.10.2022
USENIX Security '14 - TRUESET: Faster Verifiable Set Computations
01.10.2022
USENIX Security '14 - Exit from Hell? Reducing the Impact of Amplification DDoS Attacks
01.10.2022
USENIX Security '14 - Telepathwords: Preventing Weak Passwords by Reading Users’ Minds
01.10.2022
USENIX Security '14 - BareCloud: Bare-metal Analysis-based Evasive Malware Detection
01.10.2022
USENIX Security '14 - ret2dir: Rethinking Kernel Isolation
01.10.2022
USENIX Security '14 - On the Effective Prevention of TLS Man-in-the-Middle Attacks in Web
01.10.2022
The Developers Guide to CyberSecurity
01.13.2022
Defending against PowerShell attacks - in theory, and in practice by Lee holmes
01.13.2022
Securing your Environment with Just Enough Administration by James Petty
01.13.2022
Ignite: Managing Security Across All Devices In Your Network Infrastructure by Sanjay Shitole
01.14.2022
How To Be Your Security Team's Best Friend by Emily Gladstone Cole
01.14.2022
FAST '13 - Horus: Fine-Grained Encryption-Based Security for Large-Scale Storage
01.13.2022
NSDI '13 - P3: Toward Privacy-Preserving Photo Sharing
01.19.2022
Serverless Security: New Risks Require New Approaches • Itay Rozenman • GOTO 2021
02.02.2022
Passwords are so 1990 - Sam Bellen - NDC Oslo 2021
02.21.2022
Passwords are so 1990 - Sam Bellen - NDC Oslo 2021
02.21.2022
Expert Talk: Software Security • Jim Manico & John Steven • GOTO 2022
03.28.2022
Networking, security & observability with Cilium
03.10.2022
Cilium - eBPF Powered Networking, Security & Observability
04.03.2022
Security Architecture
04.05.2022
Security aspect of mobile payments
04.12.2022
Jillian Ratliff - Gamify your Security - NDC Security 2022
05.03.2022
Security: From basic principles to PHP specifics | Alexander Makarov | phpday 2021
05.05.2022
A path to a world without passwords
05.12.2022
NDC Quick Bits - Jim Manico - Introduction to Security Testing History
05.18.2022
Niall Merrigan - On Building Teams - NDC Security 2022
05.18.2022
Patricia Aas - Classic Vulnerabilities - NDC Security 2022
05.18.2022
Philippe De Ryck - AppSec is Too Hard!? - NDC Security 2022
05.18.2022
Security Warning: Your Java Attack Surface Just Got Bigger by Brian Vermeer
05.18.2022
Protecting your organization against attacks via the build system by Louis Jacomet
05.18.2022
Security Risk: Single-Page Applications by Andreas Falk
05.18.2022
a gatekeeper named behavior analysis by Rachid Zarouali
05.18.2022
Security lessons from Mother Nature by Grace Jansen
05.18.2022
Application security: What should the attack landscape look like in 2030? by Chris Swan
05.18.2022
Scott Helme - Hyper Speed: When Big Data Blooms - NDC Security 2022
05.20.2022
Rob Bos - Protect Yourself Against Supply Chain Attacks - NDC Security 2022
05.20.2022
Rob Bos - Protect your code with GitHub security features - NDC Security 2022
05.20.2022
Blog
Microservices meetups were all over the place in April 2022
A new roundup for you folks: let’s see what the four most crowd-pleasing meetups were last month. De...
React & React Native: The champions of meetups in April 2022
There was a lot going on in April in terms of meetups all over the world. Let’s see what the top 8 m...
Top 11 Angular talks in March 2022
Angular-related talks were in the spotlight last month: let’s see the top 11 from Angular experts fr...