magnet:?xt=urn:btih:10373C0EC0B38DC05D0E581C916AF83007FAEC9F
USENIX Security 2020/sec20__full_proceedings.pdf 280.8 MB
USENIX Security 2020/sec20_full_proceedings_interior.pdf 279.5 MB
USENIX Security 2009/Video/Toward a New Legal Framework for Cybersecurity - Deirdre K. Mulligan.mp4 239.7 MB
USENIX Security 2011/Video/Deport on Arrival Adventures in Technology, Politics, and Power - J. Alex Halderman.mp4 229.4 MB
USENIX Security 2009/Video/Modern Exploitation and Memory Protection Bypasses - Alexander Sotirov.mp4 228.4 MB
USENIX Security 2010/Video/Vulnerable Compliance - Dan Geer.mp4 224.8 MB
USENIX Security 2014/Video/The Future of Crypto Getting from Here to Guarantees - Daniel J. Bernstein, Matt Blaze, Tanja Lange.mp4 224.1 MB
USENIX Security 2011/Video/Privacy in the Age of Augmented Reality - Alessandro Acquisti.mp4 222.8 MB
USENIX Security 2011/Video/SSLTLS Certificates Threat or Menace - Eric Rescorla, Adam Langley, Brian Smith, Stephen Schultze, Steve Kent.mp4 218.2 MB
USENIX Security 2013/Video/The White House s Priorities for Cybersecurity.mp4 210.8 MB
USENIX Security 2019/USENIX Security 2019 Full Proceedings.pdf 210.5 MB
USENIX Security 2019/USENIX Security 2019 Full Proceedings interior.pdf 209.7 MB
USENIX Security 2008/Video/Keynote - The Evolution of Information Assurance - Dickie George.mp4 206.7 MB
USENIX Security 2013/Video/The White House's Priorities for Cybersecurity - Andy Ozment.mp4 203.3 MB
USENIX Security 2008/Video/Dr. Strangevote or How I Learned to Stop Worrying and Love the Paper Ballot - Debra Bowen.mp4 203.1 MB
USENIX Security 2009/Video/Work-in-Progress Reports (WiPs) - Session Chair Sven Dietrich.mp4 199.3 MB
USENIX Security 2011/Video/I'm from the Government and I'm Here to Help - Perspectives from a Privacy Tech Wonk - Tara Whalen.mp4 196.2 MB
USENIX Security 2013/Video/Dr. Felten Goes To Washington Lessons from 18 Months in Government.mp4 195.7 MB
USENIX Security 2011/Video/Network Security in the Medium Term 2061-2561 AD - Charles Stross.mp4 187.3 MB
USENIX Security 2011/Video/Pico No More Passwords - Frank Stajano.mp4 183.2 MB
USENIX Security 2020/USENIX Security 2020 Panels/USENIX Security 20 - Panel Digital Contact Tracing.mp4 183.0 MB
USENIX Security 2020/Videos/USENIX Security 20 - Panel Digital Contact Tracing.mp4 183.0 MB
USENIX Security 2013/Video/Dr. Felten Goes To Washington Lessons from 18 Months in Government - Edward W. Felten.mp4 181.3 MB
USENIX Security 2009/Video/Baggy Bounds Checking An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors - Periklis Akritidis, Manuel Costa, Miguel Castro, Steven Hand.mp4 180.2 MB
USENIX Security 2009/Video/Android Securing a Mobile Platform from the Ground Up - Rich Cannings.mp4 179.1 MB
USENIX Security 2014/Video/Battling Human Trafficking with Big Data - Rolando R. Lopez.mp4 177.2 MB
USENIX Security 2011/Video/Crossing the Chasm Pitching Security Research to Mainstream Browser Vendors - Collin Jackson.mp4 175.9 MB
USENIX Security 2011/Video/The Three Cyber-War Fallacies - Dave Aitel.mp4 175.7 MB
USENIX Security 2009/Video/Hash Functions and Their Many Uses in Cryptography - Shai Halevi.mp4 169.6 MB
USENIX Security 2010/Video/Docile No More The Tussle to Redefine the Internet - James Lewis.mp4 156.9 MB
USENIX Security 2018/USENIX Security 2018 Full Proceedings.mobi 155.2 MB
USENIX Security 2010/Video/The Evolution of the Flash Security Model - Peleus Uhley.mp4 151.1 MB
USENIX Security 2013/Video/Security Team 2.0 - Chris Evans.mp4 149.0 MB
USENIX Security 2019/Video/USENIX Security '19 - Security Educational Panel.mp4 147.0 MB
USENIX Security 2012/Video/Life as a Target-Welcome to the Club - Dickie George.mp4 146.8 MB
USENIX Security 2009/Video/Top Ten Web Hacking Techniques of 2008 What's possible, not probable - Jeremiah Grossman.mp4 145.9 MB
USENIX Security 2010/Video/Windows 7 Security from a UNIX Perspective - Crispin Cowan.mp4 136.9 MB
USENIX Security 2010/Video/Grid, PhD Smart Grid, Cyber Security, and the Future of Keeping the Lights On - Kelly Ziegler.mp4 134.1 MB
USENIX Security 2010/Video/Network Security in the Medium Term 2061–2561 AD - stross.mp4 133.4 MB
USENIX Security 2010/Video/Toward an Open and Secure Platform for Using the Web - Will Drewry.mp4 129.9 MB
USENIX Security 2017/Video/USENIX Security '17 - When Your Threat Model Is Everything Defensive Security in Modern Newsrooms.mp4 126.7 MB
USENIX Security 2019/Video/USENIX Security '19 - Tackling the Trust and Safety Crisis.mp4 126.2 MB
USENIX Security 2020/USENIX Security 2020 Panels/USENIX Security 20 - Panel The 2020 Election Remote Voting, Disinformation, and Audit.mp4 125.7 MB
USENIX Security 2020/Videos/USENIX Security 20 - Panel The 2020 Election Remote Voting, Disinformation, and Audit.mp4 125.7 MB
USENIX Security 2010/Video/Proving Voltaire Right Security Blunders Dumber Than Dog Snot - Roger G. Johnston.mp4 124.7 MB
USENIX Security 2013/Video/Confessions of a Recovering Data Broker.mp4 123.1 MB
USENIX Security 2017/USENIX Security 2017 Full Proceedings.pdf 121.2 MB
USENIX Security 2017/USENIX Security 2017 Full Proceedings Interior.pdf 120.9 MB
USENIX Security 2017/USENIX Security 2017 Full Proceedings.mobi 118.5 MB
USENIX Security 2015/Video/Inherent Cyber Insecurity and Our National Security Surviving on a Diet of Poisoned Fruit.mp4 117.9 MB
USENIX Security 2019/Video/USENIX Security '19 - Shining Light on Internet-based Crimes Against Children.mp4 116.1 MB
USENIX Security 2013/Video/Security Team 2.0.mp4 114.0 MB
USENIX Security 2015/Video/Conducting Usable Security Studies It s Complicated.mp4 113.0 MB
USENIX Security 2013/Video/Confessions of a Recovering Data Broker Responsible Innovation in the Age of Big Data, Big Brother, and the Coming Skynet Terminators - Jim Adler.mp4 112.9 MB
USENIX Security 2015/Video/Why Johnny and Janie Can’t Code Safely Bringing Software Assurance to the Masses.mp4 112.7 MB
USENIX Security 2019/Video/USENIX Security '19 - Embracing the Hack. A Better Strategy for Team-Defense.mp4 111.7 MB
USENIX Security 2018/USENIX Security 2018 Full Proceedings.pdf 108.5 MB
USENIX Security 2018/USENIX Security 2018 Full Proceedings Interior.pdf 107.3 MB
USENIX Security 2014/Video/USENIX SECURITY 2014 Keynote - Phone Phreaks What We Can Learn From the First Network Hackers - Phil Lapsely.mp4 103.2 MB
USENIX Security 2014/Video/Information Security War Room - Sergey Bratus, Dartmouth College, Felix FX Lindner.mp4 102.6 MB
USENIX Security 2013/Video/Building Securable Infrastructure Open-Source Private Clouds.mp4 101.0 MB
USENIX Security 2013/Video/Tracking the Casino Computer Wars Who’s Winning - the Casino or the Cheat - Richard Marcus.mp4 95.8 MB
USENIX Security 2012/Video/Emerging Trends and Their Security Implications - Doug Burger.mp4 93.3 MB
USENIX Security 2017/Video/USENIX Security '17 - How the Web Tangled Itself.mp4 93.2 MB
USENIX Security 2013/Video/Tracking the Casino Computer Wars Who is Winning-the Casino or the Cheat.mp4 91.4 MB
USENIX Security 2013/Video/Building Securable Infrastructure Open-Source Private Clouds - Pravir Chandra.mp4 90.5 MB
USENIX Security 2017/Video/USENIX Security '17 - Data Hemorrhage, Inequality, and You....mp4 89.9 MB
USENIX Security 2018/USENIX Security 2018 Full Proceedings.epub 89.9 MB
USENIX Security 2012/Video/Cyber Security Education in a Time of Change - Cynthia E. Irvine.mp4 89.4 MB
USENIX Security 2011/Video/ZOZZLE Fast and Precise In-Browser JavaScript Malware Detection - Charlie Curtsinger, Benjamin Livshits, Benjamin Zorn, Christian Seifert.mp4 86.3 MB
USENIX Security 2011/Video/The Cloud-y Future of Security Technologies - Adam O'Donnell.mp4 86.3 MB
USENIX Security 2012/Video/Nature is a Language Can't You Read - Meredith L. Patterson.mp4 85.7 MB
USENIX Security 2017/Video/USENIX Security '17 - REM Resource-Efficient Mining for Blockchains.mp4 84.4 MB
USENIX Security 2011/Video/Show Me the Money Characterizing Spam-advertised Revenue - Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorso, Christian Kreibich, Kirill Levchenko, Vern Paxson, Geoffrey.mp4 83.3 MB
USENIX Security 2017/Video/USENIX Security '17 - OSS-Fuzz - Google's continuous fuzzing service for open source software.mp4 81.6 MB
USENIX Security 2011/Video/ADsafety Type-Based Verification of JavaScript Sandboxing - Joe Gibbs Politz, Spiridon Aristides Eliopoulos, Arjun Guha, Shriram Krishnamurthi.mp4 80.3 MB
USENIX Security 2009/Video/Compromising Electromagnetic Emanations of Wired and Wireless Keyboards - Martin Vuagnoux, Sylvain Pasini.mp4 78.8 MB
USENIX Security 2009/Video/Effective and Efficient Malware Detection at the End Host - Clemens Kolbitsch, Paolo Milani Comparetti, Christopher Kruegel, Engin Kirda, Sophia Antipolis, Xiaoyong Zhou, Xia.mp4 78.8 MB
USENIX Security 2009/Video/Crying Wolf An Empirical Study of SSL Warning Effectiveness - Joshua Sunshine, Serge Egelman, Hazim Almuhimedi, Neha Atri, and Lorrie Faith Cranor.mp4 77.9 MB
USENIX Security 2009/Video/Return-Oriented Rootkits Bypassing Kernel Code Integrity Protection Mechanisms - Ralf Hund, Thorsten Holz, Felix C. Freiling.mp4 76.7 MB
USENIX Security 2017/Video/USENIX Security '17 - Game of Registrars....mp4 76.1 MB
USENIX Security 2017/Video/USENIX Security '17 - Malton Towards On-Device Non-Invasive Mobile Malware Analysis for ART.mp4 76.0 MB
USENIX Security 2019/Video/USENIX Security '19 - Lessons Learned from Evaluating the Robustness of Defenses to.mp4 76.0 MB
USENIX Security 2011/Video/Comprehensive Experimental Analyses of Automotive Attack Surfaces - Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl.mp4 75.7 MB
USENIX Security 2015/Video/Preventing Security Bugs through Software Design.mp4 75.2 MB
USENIX Security 2015/USENIX Security 2015 Full Proceedings.mobi 74.7 MB
USENIX Security 2009/Video/Protecting Confidential Data on Personal Computers with Storage Capsules - Kevin Borders, Eric Vander Weele, Billy Lau, Atul Prakash.mp4 74.0 MB
USENIX Security 2009/Video/xBook Redesigning Privacy Control in Social Networking Platforms - Kapil Singh, Sumeer Bhola, Wenke Lee.mp4 73.3 MB
USENIX Security 2019/Video/USENIX Security '19 - Baby Steps towards the Precipice How the Web Became a Scary.mp4 73.0 MB
USENIX Security 2013/Video/Windows 8 Security Supporting User Confidence.mp4 73.0 MB
USENIX Security 2009/Video/VPriv Protecting Privacy in Location-Based Vehicular Services - Raluca Ada Popa, Hari Balakrishnan, Andrew J. Blumberg.mp4 72.8 MB
USENIX Security 2009/Video/Detecting Spammers with SNARE Spatio-temporal Network-level Automatic Reputation Engine - Shuang Hao, Nadeem Ahmed Syed, Nick Feamster, Alexander G. Gray, Sven Krasser.mp4 72.6 MB
USENIX Security 2011/Video/Bubble Trouble Off-Line De-Anonymization of Bubble Forms - Joseph A. Calandrino, William Clarkson, Edward W. Felten.mp4 72.6 MB
USENIX Security 2012/Video/On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces - Ivan Martinovic, Doug Davies, Mario Frank, Daniele Perito, Tomas Ros, Dawn Song.mp4 71.9 MB
USENIX Security 2011/Video/TRESOR Runs Encryption Securely Outside RAM - Tilo Müller, Felix C. Freiling, Andreas Dewald.mp4 71.7 MB
USENIX Security 2011/Video/Secure In-Band Wireless Pairing - Shyamnath Gollakota, Nabeel Ahmed, Nickolai Zeldovich, Dina Katabi.mp4 71.2 MB
USENIX Security 2009/Video/Locating Prefix Hijackers using LOCK - Tongqing Qiu, Lusheng Ji, Dan Pei, Jia Wang, Jun (Jim) Xu, Hitesh Ballani.mp4 70.8 MB
USENIX Security 2013/Video/Windows 8 Security Supporting User Confidence - Crispin Cowan.mp4 70.7 MB
USENIX Security 2019/Video/USENIX Security '19 - Security Research and Public Policy.mp4 68.2 MB
USENIX Security 2016/USENIX Security 2016 Full Proceedings.epub 68.1 MB
USENIX Security 2009/Video/The Multi-Principal OS Construction of the Gazelle Web Browser.mp4 67.5 MB
USENIX Security 2011/Video/Measuring Pay-per-Install The Commoditization of Malware Distribution - Juan Caballero, Chris Grier, Christian Kreibich, Vern Paxson.mp4 67.2 MB
USENIX Security 2011/Video/A Study of Android Application Security - William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri.mp4 66.1 MB
USENIX Security 2011/Video/deSEO Combating Search-Result Poisoning - John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy, Martin Abadi.mp4 65.7 MB
USENIX Security 2011/Video/SMS of Death From Analyzing to Attacking Mobile Phones on a Large Scale - Collin Mulliner, Nico Golde, Jean-Pierre Seifert.mp4 65.4 MB
USENIX Security 2017/Video/USENIX Security '17 - Measuring the Insecurity of Mobile Deep Links of Android.mp4 65.3 MB
USENIX Security 2011/Video/BOTMAGNIFIER Locating Spambots on the Internet - Gianluca Stringhini, Thorsten Holz, Brett Stone-Gross, Christopher Kruegel, Giovanni Vigna.mp4 65.2 MB
USENIX Security 2019/Video/USENIX Security '19 - The Spies Hacking our Phones are Going Dark, and We're All in Trouble.mp4 65.1 MB
USENIX Security 2011/Video/Dark Clouds on the Horizon Using Cloud Storage as Attack Vector and Online Slack Space - Martin Mulazzani, Sebastian Schrittwieser, Manuel Leithner, Markus Huber, Edgar Weippl.mp4 65.0 MB
USENIX Security 2009/Video/Memory Safety for Low-Level Software Hardware Interactions - John Criswell, Nicolas Geoffray, Pierre et Marie Curie, Vikram Adve.mp4 65.0 MB
USENIX Security 2009/Video/Physical-layer Identification of RFID Devices - Boris Danev, Thomas S. Heydt-Benjamin, Srdjan Capkun.mp4 64.0 MB
USENIX Security 2014/Video/Blanket Execution Dynamic Similarity Testing for Program Binaries and Components - Manuel Egele, Maverick Woo, Peter Chapman, David Brumley.mp4 63.8 MB
USENIX Security 2019/Video/USENIX Security '19 - From Privacy by Design to Data Protection by Design The Challenges of.mp4 62.6 MB
USENIX Security 2017/USENIX Security 2017 Full Proceedings.epub 62.5 MB
USENIX Security 2017/Video/USENIX Security '17 - PDF Mirage Content Masking Attack Against Information-Based Online Services.mp4 62.1 MB
USENIX Security 2011/Video/Why (Special Agent) Johnny (Still) Can't Encrypt A Security Analysis of the APCO Project 25 Two-Way Radio System - Sandy Clark, Travis Goodspeed, Perry Metzger, Zachary Wasserman.mp4 61.8 MB
USENIX Security 2011/Video/Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade - Nektarios Leontiadis, Tyler Moore, Nicolas Christin.mp4 61.6 MB
USENIX Security 2019/Video/USENIX Security '19 - Evaluating Mobile Messengers for Implementation Vulnerabilities.mp4 61.5 MB
USENIX Security 2017/Video/USENIX Security '17 - ROTE Rollback Protection for Trusted Execution.mp4 61.0 MB
USENIX Security 2010/Video/Baaz A System for Detecting Access Control Misconfigurations - Tathagata Das, Ranjita Bhagwan, Prasad Naldurg.mp4 59.9 MB
USENIX Security 2009/Video/Static Enforcement of Web Application Integrity Through Strong Typing - William Robertson, Giovanni Vigna.mp4 59.5 MB
USENIX Security 2011/Video/Forensic Triage for Mobile Phones with DEC0DE - Robert J. Walls, Erik Learned-Miller, Brian Neil Levine.mp4 59.5 MB
USENIX Security 2013/Video/Windows 8 Security Supporting User Confidence - Crispin Cowan.mp4 59.4 MB
USENIX Security 2009/Video/A Practical Congestion Attack on Tor Using Long Paths - Nathan S. Evans, Roger Dingledine, Christian Grothoff.mp4 59.3 MB
USENIX Security 2011/Video/The Phantom Tollbooth Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion - Sarah Meiklejohn, Keaton Mowery, Stephen Checkoway, Hovav Shacham.mp4 59.2 MB
USENIX Security 2017/Video/USENIX Security '17 - Differential Privacy From Theory to Deployment.mp4 58.9 MB
USENIX Security 2009/Video/Efficient Data Structures for Tamper-Evident Logging - Scott A. Crosby, Dan S. Wallach.mp4 58.9 MB
USENIX Security 2011/Video/JACKSTRAWS Picking Command and Control Connections from Bot Traffic - Gregoire Jacob, Ralf Hund, Christopher Kruegel.mp4 58.3 MB
USENIX Security 2018/Video/Q Why Do Keynote Speakers Keep Suggesting That Improving Security Is Possible.mp4 58.0 MB
USENIX Security 2014/Video/USENIX Security 2014 Lightning Talks.mp4 57.5 MB
USENIX Security 2010/Video/The Case for Ubiquitous Transport-Level Encryption - Andrea Bittau, Michael Hamburg, Mark Handley, David Mazieres, Dan Boneh.mp4 57.5 MB
USENIX Security 2011/Video/Toward Secure Embedded Web Interfaces - Baptiste Gourdin, Chinmay Soman, Hristo Bojinov, Elie Bursztein.mp4 57.1 MB
USENIX Security 2010/Video/Building a Dynamic Reputation System for DNS - Manos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee, Nick Feamster.mp4 56.9 MB
USENIX Security 2009/Video/Keynote Address - Rich Cannings.mp4 56.9 MB
USENIX Security 2009/Video/Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs - David Molnar, Xue Cong Li, and David A. Wagner.mp4 56.8 MB
USENIX Security 2014/Video/Panel Discussion - Stuart Schechter.mp4 56.1 MB
USENIX Security 2013/USENIX Security 2013 Proceedings.epub 56.1 MB
USENIX Security 2010/Video/Security and Privacy Vulnerabilities of In-Car Wireless Networks A Tire Pressure Monitoring System Case Study - Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis Taylor, Sangho Oh.mp4 55.5 MB
USENIX Security 2015/USENIX Security 2015 Full Proceedings.epub 55.5 MB
USENIX Security 2010/Video/Making Linux Protection Mechanisms Egalitarian with UserFS - Taesoo Kim, Nickolai Zeldovich.mp4 55.4 MB
USENIX Security 2019/Video/USENIX Security '19 - Lessons Learned About Building Secure Software It's About the Developers!.mp4 55.4 MB
USENIX Security 2017/Video/USENIX Security '17 - Hacking in Darkness Return-oriented Programming against Secure Enclaves.mp4 55.0 MB
USENIX Security 2011/Video/QUIRE Lightweight Provenance for Smart Phone Operating Systems - Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anhei Shu, Dan S. Wallach.mp4 55.0 MB
USENIX Security 2010/Video/AdJail Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements - Mike Ter Louw, Karthik Thotta Ganesh, V.N. Venkatakrishnan.mp4 55.0 MB
USENIX Security 2012/Video/Gone in 360 Seconds Hijacking with Hitag2 - Roel Verdult, Flavio D. Garcia, Josep Balasch, KU Leuven.mp4 54.8 MB
USENIX Security 2017/Video/USENIX Security '17 - CCSP Controlled Relaxation of Content Security Policies....mp4 54.0 MB
USENIX Security 2009/Video/NOZZLE A Defense Against Heap-spraying Code Injection Attacks - Paruj Ratanaworabhan, Benjamin Livshits, Benjamin Zorn.mp4 53.6 MB
USENIX Security 2010/Video/Securing Script-Based Extensibility in Web Browsers - Vladan Djeric, Ashvin Goel.mp4 53.6 MB
USENIX Security 2009/Video/Vanish Increasing Data Privacy with Self-Destructing Data - Roxana Geambasu, Tadayoshi Kohno, Amit A. Levy, Henry M. Levy.mp4 53.5 MB
USENIX Security 2017/Video/USENIX Security '17 - Same-Origin Policy Evaluation in Modern Browsers.mp4 53.4 MB
USENIX Security 2011/Video/PIR-Tor Scalable Anonymous Communication Using Private Information Retrieval - Prateek Mittal, Femi Olumofin, Carmela Troncoso, Nikita Borisov, Ian Goldberg.mp4 52.9 MB
USENIX Security 2011/Video/Q Exploit Hardening Made Easy - Edward J. Schwartz, Thanassis Avgerinos, David Brumley.mp4 52.7 MB
USENIX Security 2011/Video/Fast and Precise Sanitizer Analysis with BEK - Pieter Hooimeijer, Benjamin Livshits, David Molnar, Prateek Saxena, Margus Veanes.mp4 52.5 MB
USENIX Security 2014/Video/TapDance End-to-Middle Anticensorship without Flow Blocking - Eric Wustrow, Colleen M. Swanson, J. Alex Halderman.mp4 52.5 MB
USENIX Security 2014/Video/Towards Reliable Storage of 56-bit Secrets in Human Memory - Joseph Bonneau, Stuart Schechter.mp4 52.3 MB
USENIX Security 2010/Video/Fighting Coercion Attacks in Key Generation using Skin Conductance - Payas Gupta, Debin Gao.mp4 52.2 MB
USENIX Security 2010/Video/VEX Vetting Browser Extensions for Security Vulnerabilities - Sruthi Bandhakavi, Samuel T. King, P. Madhusudan, Marianne Winslett.mp4 52.2 MB
USENIX Security 2011/Video/Detecting Malware Domains at the Upper DNS Hierarchy - Manos Antonakakis, Roberto Perdisci, Wenke Lee, Nikolaos Vasiloglou II, David Dagon.mp4 51.9 MB
USENIX Security 2012/Video/Neuroscience Meets Cryptography Designing Crypto Primitives Secure Against Rubber Hose Attacks - Hristo Bojinov, Daniel Sanchez, Paul Reber, Northw.mp4 50.8 MB
USENIX Security 2014/Video/DSCRETE Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse - Brendan Saltaformaggio, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu.mp4 50.5 MB
USENIX Security 2010/Video/PrETP Privacy-Preserving Electronic Toll Pricing - Josep Balasch, Alfredo Rial, Carmela Troncoso, Bart Preneel, Ingrid Verbauwhede, Christophe Geuens.mp4 50.5 MB
USENIX Security 2011/Video/mCarve Carving Attributed Dump Sets - Ton van Deursen, Sjouke Mauw, and Sasa Radomirovic.mp4 50.5 MB
USENIX Security 2014/Video/Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens - Daniel Demmler, Thomas Schneider, Michael Zohner.mp4 50.4 MB
USENIX Security 2011/Video/Differential Privacy Under Fire - Andreas Haeberlen, Benjamin C. Pierce, Arjun Narayan.mp4 50.4 MB
USENIX Security 2009/Video/Peeping Tom in the Neighborhood Keystroke Eavesdropping on Multi-User Systems - Kehuan Zhang, XiaoFeng Wang.mp4 50.2 MB
USENIX Security 2013/Video/Dismantling Megamos Crypto Wirelessly Lockpicking a Vehicle Immobilizer - Roel Verdult, Flavio D. Garcia, Baris Ege.mp4 49.9 MB
USENIX Security 2014/Video/Peeking into Your App without Actually Seeing It UI State Inference and Novel Android Attacks - Qi Alfred Chen, Zhiyun Qian, Z. Morley Mao.mp4 49.8 MB
USENIX Security 2014/Video/Password Portfolios and the Finite-Effort User Sustainably Managing Large Numbers of Accounts - Dinei Florencio, Cormac Herley, Paul C. van Oorschot.mp4 49.6 MB
USENIX Security 2017/Video/USENIX Security '17 - Loophole Timing Attacks on Shared Event Loops in Chrome.mp4 49.5 MB
USENIX Security 2011/Video/Cloaking Malware with the Trusted Platform Module - Alan M. Dunn, Owen S. Hofmann, Brent Waters, Emmett Witchel.mp4 49.3 MB
USENIX Security 2010/Video/Scantegrity II Municipal Election at Takoma Park The First E2E Binding Governmental Election with Ballot Privacy - Richard Carback, David Chaum, Jeremy Clark, John Conway, Aleksand.mp4 49.0 MB
USENIX Security 2011/Video/Telex Anticensorship in the Network Infrastructure - Eric Wustrow, Scott Wolchok, Ian Goldberg, J. Alex Halderman.mp4 48.8 MB
USENIX Security 2017/Video/USENIX Security '17 - AWare Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings.mp4 48.3 MB
USENIX Security 2017/Video/USENIX Security '17 - Picking Up My Tab....mp4 48.1 MB
USENIX Security 2011/Video/Outsourcing the Decryption of ABE Ciphertexts - Matthew Green, Susan Hohenberger, Brent Waters.mp4 47.5 MB
USENIX Security 2014/Video/SSOScan Automated Testing of Web Applications for Single Sign-On Vulnerabilities - Yuchen Zhou, David Evans.mp4 47.5 MB
USENIX Security 2017/Video/USENIX Security '17 - 6thSense A Context-aware Sensor-based Attack Detector for Smart Devices.mp4 47.4 MB
USENIX Security 2018/Video/Analogy Cyber Security-From 0101 to Mixed Signals.mp4 47.3 MB
USENIX Security 2011/Video/Permission Re-Delegation Attacks and Defenses - Adrienne Porter Felt, Helen J. Wang, Alexander Moshchuk, Steve Hanna, Erika Chin.mp4 47.3 MB
USENIX Security 2014/Video/How To Live In Paradise Pearls of Wisdom for New and Prospective Faculty - David Evans.mp4 47.2 MB
USENIX Security 2011/Video/Faster Secure Two-Party Computation Using Garbled Circuits - Yan Huang, David Evans, Jonathan Katz.mp4 47.2 MB
USENIX Security 2011/Video/Dirty Jobs The Role of Freelance Labor in Web Service Abuse - Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker.mp4 46.8 MB
USENIX Security 2010/Video/Chipping Away at Censorship Firewalls with User-Generated Content - Sam Burnett, Nick Feamster, Santosh Vempala.mp4 46.7 MB
USENIX Security 2017/Video/USENIX Security '17 - How Double-Fetch Situations turn into Double-Fetch Vulnerabilities....mp4 46.3 MB
USENIX Security 2018/Video/The Law and Economics of Bug Bounties.mp4 46.3 MB
USENIX Security 2011/Video/MACE Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery - Chia Yuan Cho, Domagoj Babic, Pongsin Poosankam, Kevin Zhijie Chen, Edward XueJun Wu.mp4 46.2 MB
USENIX Security 2016/USENIX Security 2016 Full Proceedings.pdf 46.1 MB
USENIX Security 2009/Video/Improving Tor using a TCP-over-DTLS Tunnel - Joel Reardon, Ian Goldberg.mp4 46.0 MB
USENIX Security 2012/Video/Data Node Encrypted File System Efficient Secure Deletion for Flash Memory - Joel Reardon, Srdjan Capkun, David Basin.mp4 46.0 MB
USENIX Security 2012/Video/AdSplit Separating Smartphone Advertising from Applications - Shashi Shekhar, Michael Dietz, Dan S. Wallach.mp4 45.8 MB
USENIX Security 2018/Video/Solving the Next Billion-People Privacy Problem.mp4 45.8 MB
USENIX Security 2016/USENIX Security 2016 Full Proceedings.mobi 45.7 MB
USENIX Security 2010/Video/BotGrep Finding P2P Bots with Structured Graph Analysis - Shishir Nagaraja, Prateek Mittal, Chi-Yao Hong, Matthew Caesar, Nikita Borisov.mp4 45.7 MB
USENIX Security 2017/Video/USENIX Security '17 - BinSim Trace-based Semantic Binary Diffing....mp4 45.6 MB
USENIX Security 2017/Video/USENIX Security '17 - SmartPool Practical Decentralized Pooled Mining.mp4 45.6 MB
USENIX Security 2017/Video/USENIX Security '17 - An Ant in a World of Grasshoppers.mp4 45.6 MB
USENIX Security 2010/Video/Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking - Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidiah R. Crandall.mp4 45.5 MB
USENIX Security 2017/Video/USENIX Security '17 - See No Evil, Hear No Evil, Feel No Evil.mp4 45.5 MB
USENIX Security 2010/Video/Structuring Protocol Implementations to Protect Sensitive Data - Petr Marchenko, Brad Karp.mp4 45.4 MB
USENIX Security 2012/Video/Impact of Spam Exposure on User Engagement - Anirban Dasgupta, Kunal Punera, Justin M. Rao, Xuanhui Wang.mp4 45.3 MB
USENIX Security 2013/Video/The Velocity of Censorship High-Fidelity Detection of Microblog Post Deletions - Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall.mp4 45.1 MB
USENIX Security 2014/Video/Oxymoron Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing - Michael Backes, Stefan Nurnberger.mp4 45.0 MB
USENIX Security 2016/USENIX Security 2016 Full Proceedings Interior.pdf 45.0 MB
USENIX Security 2017/Video/USENIX Security '17 - SmartAuth User-Centered Authorization for the Internet of Things.mp4 45.0 MB
USENIX Security 2011/Video/SHELLOS Enabling Fast Detection and Forensic Analysis of Code Injection Attacks - Kevin Z. Snow, Srinivas Krishnan, Fabian Monrose, Niels Provos.mp4 44.8 MB
USENIX Security 2017/Video/USENIX Security '17 - Walkie-Talkie....mp4 44.7 MB
USENIX Security 2017/Video/USENIX Security '17 - AuthentiCall Efficient Identity and Content Authentication for Phone Calls.mp4 44.7 MB
USENIX Security 2017/Video/USENIX Security ’17 - Understanding the Mirai Botnet.mp4 44.6 MB
USENIX Security 2017/Video/USENIX Security '17 - MPI Multiple Perspective Attack Investigation....mp4 44.6 MB
USENIX Security 2018/Video/Medical Device Cybersecurity through the FDA Lens.mp4 44.5 MB
USENIX Security 2012/Video/Securing Early Software Development - Riley Eller.mp4 44.5 MB
USENIX Security 2010/Video/Acoustic Side-Channel Attacks on Printers - backes.mp4 44.5 MB
USENIX Security 2017/Video/USENIX Security '17 - Attacking the Brain Races in the SDN Control Plane - YouTube.mp4 44.2 MB
USENIX Security 2018/Video/Chipmunk or Pepe Using Acoustical Analysis to Detect Voice-Channel Fraud at Scale.mp4 44.0 MB
USENIX Security 2017/Video/USENIX Security '17 - Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing.mp4 43.9 MB
USENIX Security 2012/Video/Babel Leveraging Email Delivery for Spam Mitigation - Gianluca Stringhini, Manuel Egele, Apostolis Zarras, Thorsten Holz, Christopher Kruegel, Giovanni Vigna.mp4 43.4 MB
USENIX Security 2017/Video/USENIX Security '17 - Transcend Detecting Concept Drift in Malware Classification Models.mp4 43.1 MB
USENIX Security 2013/Video/Measuring the Practical Impact of DNSSEC Deployment - Wilson Lian, Eric Rescorla, Hovav Shacham, Stefan Savage.mp4 42.7 MB
USENIX Security 2012/Video/Social Networking with Frientegrity Privacy and Integrity with an Untrusted Provider - Ariel J. Feldman, Aaron Blankstein, Michael J. Freedman, Edward W. Felten.mp4 42.6 MB
USENIX Security 2010/Video/Realization of RF Distance Bounding - Kasper Bonne Rasmussen, Srdjan Capkun.mp4 42.6 MB
USENIX Security 2017/Video/USENIX Security '17 - Beauty and the Burst Remote Identification of Encrypted Video Streams.mp4 42.4 MB
USENIX Security 2017/Video/USENIX Security '17 - The Loopix Anonymity System.mp4 42.3 MB
USENIX Security 2017/Video/USENIX Security '17 - A Privacy Analysis of Cross-device Tracking.mp4 42.3 MB
USENIX Security 2012/Video/How Does Your Password Measure Up - The Effect of Strength Meters on Password Creation - Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Mazu.mp4 42.2 MB
USENIX Security 2014/USENIX Security 2014 Full Proceedings.pdf 41.9 MB
USENIX Security 2012/Video/DroidScope Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis - Lok Kwong Yan, Heng Yin.mp4 41.7 MB
USENIX Security 2012/Video/Whispers in the Hyper-space High-speed Covert Channel Attacks in the Cloud - Zhenyu Wu, Zhang Xu, Haining Wang.mp4 41.7 MB
USENIX Security 2017/Video/USENIX Security '17 - Neural Nets Can Learn Function Type Signatures From Binaries.mp4 41.4 MB
USENIX Security 2014/Video/Faster Private Set Intersection Based on OT Extension - Benny Pinkas, Thomas Schneider, Michael Zohner.mp4 41.3 MB
USENIX Security 2010/Video/Fast Regular Expression Matching Using Small TCAMs for Network Intrusion Detection and Prevention Systems - Chad R. Meiners, Jignesh Patel, Eric Norige, Eric Torng, and Alex X. Liu.mp4 41.3 MB
USENIX Security 2017/Video/USENIX Security '17 - CHAINIAC Proactive Software-Update Transparency....mp4 41.3 MB
USENIX Security 2014/Video/JIGSAW Protecting Resource Access by Inferring Programmer Expectations - Hayawardh Vijayakumar, Xinyang Ge, Mathias Payer, Trent Jaeger.mp4 41.2 MB
USENIX Security 2014/Video/Man vs. Machine Practical Adversarial Detection of Malicious Crowdsourcing Workers - Gang Wang, Tianyi Wang, Santa Barbara, Haitao Zheng, Ben Y. Zhao.mp4 41.1 MB
USENIX Security 2014/USENIX Security 2014 Full Proceedings Interrior.pdf 41.1 MB
USENIX Security 2012/Video/Aurasium Practical Policy Enforcement for Android Applications - Rubin Xu, Hassen Saidi, Ross Anderson.mp4 41.0 MB
USENIX Security 2013/Video/MetaSymploit Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis - Ruowen Wang, Peng Ning, Tao Xie, Quan Chen.mp4 40.9 MB
USENIX Security 2012/Video/An Evaluation of the Google Chrome Extension Security Architecture - Nicholas Carlini, Adrienne Porter Felt, David Wagner.mp4 40.8 MB
USENIX Security 2013/Video/Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation - Frank Imeson, Ariq Emtenan, Siddharth Garg, Mahesh V. Tripunita.mp4 40.7 MB
USENIX Security 2013/Video/Towards Automatic Software Lineage Inference - Jiyong Jang, Maverick Woo, David Brumley.mp4 40.7 MB
USENIX Security 2017/Video/USENIX Security '17 - Detecting Credential Spearphishing in Enterprise Settings.mp4 40.7 MB
USENIX Security 2009/Video/CCCP Secure Remote Storage for Computational RFIDs - Mastooreh Salajegheh, Shane Clark, Benjamin Ransford, Kevin Fu, Ari Juels.mp4 40.7 MB
USENIX Security 2014/Video/Burst ORAM Minimizing ORAM Response Times for Bursty Access Patterns - Jonathan Dautrich, University of California, Riverside_ Emil Stefanov, Elaine Shi.mp4 40.6 MB
USENIX Security 2017/Video/USENIX Security '17 - DR. CHECKER A Soundy Analysis for Linux Kernel Drivers.mp4 40.5 MB
USENIX Security 2010/Video/Adapting Software Fault Isolation to Contemporary CPU Architectures - David Sehr, Robert Muth, Cliff Biffle, Victor Khimenko, Egor Pasko, Karl Schimpf, Bennet Yee, Brad Chen.mp4 40.3 MB
USENIX Security 2017/Video/USENIX Security '17 - kAFL Hardware-Assisted Feedback Fuzzing for OS Kernels.mp4 40.2 MB
USENIX Security 2017/Video/USENIX Security '17 - Prime+Abort A Timer-Free High-Precision L3 Cache Attack using Intel TSX.mp4 40.2 MB
USENIX Security 2018/Video/The Second Crypto War-What's Different Now.mp4 40.1 MB
USENIX Security 2012/Video/PharmaLeaks Understanding the Business of Online Pharmaceutical Affiliate Programs - Damon McCoy, Andreas Pitsillidis, Grant Jordan, Nicholas Weaver, Christian Kreibich, Brian Kreb.mp4 40.0 MB
USENIX Security 2017/Video/USENIX Security '17 - Identifier Binding Attacks and Defenses in Software-Defined Networks.mp4 39.9 MB
USENIX Security 2017/Video/USENIX Security '17 - Seeing Through The Same Lens....mp4 39.9 MB
USENIX Security 2014/Video/FLUSH-RELOAD A High Resolution, Low Noise, L3 Cache Side-Channel Attack - Yuval Yarom, Katrina Falkner.mp4 39.8 MB
USENIX Security 2012/Video/Establishing Browser Security Guarantees through Formal Shim Verification - Dongseok Jang, Zachary Tatlock, Sorin Lerner.mp4 39.8 MB
USENIX Security 2012/Video/Chimera A Declarative Language for Streaming Network Traffic Analysis - Kevin Borders, Jonathan Springer, Matthew Burnside.mp4 39.7 MB
USENIX Security 2017/Video/USENIX Security '17 - TrustBase An Architecture to Repair and Strengthen....mp4 39.7 MB
USENIX Security 2012/Video/Security and Usability Challenges of Moving-Object CAPTCHAs Decoding Codewords in Motion - Y. Xu, G. Reynaga, S. Chiasson, J.-M. Frahm, F. Monrose, P. van Oorschot.mp4 39.6 MB
USENIX Security 2013/Video/Secure Outsourced Garbled Circuit Evaluation for Mobile Devices - Henry Carter, Benjamin Mood, Patrick Traynor, Kevin Butler.mp4 39.6 MB
USENIX Security 2017/Video/USENIX Security '17 - Speeding up detection of SHA-1 collision attacks....mp4 39.6 MB
USENIX Security 2013/Video/Control Flow Integrity for COTS Binaries - Mingwei Zhang, R. Sekar.mp4 39.6 MB
USENIX Security 2013/Video/ZMap Fast Internet-wide Scanning and Its Security Applications - durumeric.mp4 39.5 MB
USENIX Security 2012/Video/I Forgot Your Password Randomness Attacks Against PHP Applications - George Argyros, Aggelos Kiayias.mp4 39.5 MB
USENIX Security 2014/Video/Towards Detecting Anomalous User Behavior in Online Social Networks - Bimal Viswanath, M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna P. Gummadi, Max Planck, Balachander Kris.mp4 39.5 MB
USENIX Security 2013/Video/Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring - Edward J. Schwartz, JongHyup Lee, Maverick Woo, David Brumley.mp4 39.4 MB
USENIX Security 2010/Video/P4P Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users - Yitao Duan, NetEase Youdao, John Canny, Justin Zhan.mp4 39.3 MB
USENIX Security 2018/Video/Privacy for Tigers.mp4 39.2 MB
USENIX Security 2017/Video/USENIX Security '17 - USB Snooping Made Easy Crosstalk Leakage Attacks on USB Hubs.mp4 39.1 MB
USENIX Security 2012/Video/Progressive Authentication Deciding When to Authenticate on Mobile Phones - Oriana Riva, Chuan Qin, Karin Strauss, Dimitrios Lymberopoulos.mp4 38.8 MB
USENIX Security 2017/Video/USENIX Security '17 - HELP Helper-Enabled In-Band Device Pairing….mp4 38.8 MB
USENIX Security 2017/Video/USENIX Security '17 - MCMix Anonymous Messaging via Secure Multiparty Computation.mp4 38.7 MB
USENIX Security 2013/Video/An Empirical Study of Vulnerability Rewards Programs - Matthew Finifter, Devdatta Akhawe, David Wagner.mp4 38.7 MB
USENIX Security 2017/Video/USENIX Security '17 - CAn’t Touch This....mp4 38.7 MB
USENIX Security 2013/Video/ExecScent Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates - Terry Nelms, Roberto Perdisci, Mustaque Ahamad.mp4 38.4 MB
USENIX Security 2017/Video/USENIX Security '17 - Phoenix Rebirth of a Cryptographic Password-Hardening Service.mp4 38.4 MB
USENIX Security 2010/Video/ZKPDL A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash - Sarah Meiklejohn, C. Chris Erway, Alptekin Kupcu, Theodora Hinkle, Anna Lysyanskaya.mp4 38.4 MB
USENIX Security 2012/Video/Policy-Sealed Data A New Abstraction for Building Trusted Cloud Services - Nuno Santos, Rodrigo Rodrigues, Krishna P. Gummadi.mp4 38.3 MB
USENIX Security 2012/Video/Clickjacking Attacks and Defenses - Lin-Shung Huang, Alex Moshchuk, Helen J. Wang, Stuart Schechter, Collin Jackson.mp4 38.3 MB
USENIX Security 2012/Video/STING Finding Name Resolution Vulnerabilities in Programs - Hayawardh Vijayakumar, Joshua Schiffman, Trent Jaeger.mp4 38.2 MB
USENIX Security 2014/Video/Targeted Threat Index Characterizing and Quantifying Politically-Motivated Targeted Malware - Seth Hardy, Masashi Crete-Nishihata, Katharine Kleemola, Adam Senft, Byron Sonne, Greg.mp4 38.1 MB
USENIX Security 2017/Video/USENIX Security '17 - Strong and Efficient Cache Side-Channel Protection....mp4 38.0 MB
USENIX Security 2017/Video/USENIX Security '17 - I Have No Idea What I'm Doing - On the Usability of Deploying HTTPS.mp4 38.0 MB
USENIX Security 2017/Video/USENIX Security '17 - When the Weakest Link is Strong....mp4 38.0 MB
USENIX Security 2013/Video/On the Security of RC4 in TLS - Nadhem AlFardan, Royal Holloway, Daniel J. Bernstein, Kenneth G. Paterson, Bertram Poettering, Jacob C.N. Schuldt.mp4 37.9 MB
USENIX Security 2018/Video/When Does Machine Learning FAIL Generalized Transferability for Evasion and Poisoning Attacks.mp4 37.5 MB
USENIX Security 2009/Video/Designing Trustworthy User Agents for a Hostile Web - Eric Lawrence.mp4 37.5 MB
USENIX Security 2014/Video/XRay Enhancing the Web’s Transparency with Differential Correlation - Mathias Lecuyer, Guillaume Ducoffe, Francis Lan, Andrei Papancea, Theofilos Petsios, Riley Spahn, Augustin Cha.mp4 37.5 MB
USENIX Security 2012/Video/Billion-Gate Secure Computation with Malicious Adversaries - Benjamin Kreuter, abhi shelat, and Chih-hao Shen.mp4 37.4 MB
USENIX Security 2013/Video/Alice in Warningland A Large-Scale Field Study of Browser Security Warning Effectiveness - Devdatta Akhawe, Adrienne Porter Felt.mp4 37.2 MB
USENIX Security 2012/Video/Mining Your Ps and Qs Detection of Widespread Weak Keys in Network Devices - Nadia Heninger, Zakir Durumeric, Eric Wustrow, J. Alex Halderm.mp4 37.1 MB
USENIX Security 2013/Video/You Are How You Click Clickstream Analysis for Sybil Detection - Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng, Ben Y. Zhao.mp4 37.0 MB
USENIX Security 2017/Video/USENIX Security '17 - Venerable Variadic Vulnerabilities Vanquished.mp4 37.0 MB
USENIX Security 2017/Video/USENIX Security '17 - Syntia Synthesizing the Semantics of Obfuscated Code.mp4 36.9 MB
USENIX Security 2007/Presentations/The Human Factor in Online Fraud - Markus Jakobsson.pdf 36.9 MB
USENIX Security 2014/Video/Telepathwords Preventing Weak Passwords by Reading Users’ Minds - Saranga Komanduri, Richard Shay, Lorrie Faith Cranor, Cormac Herley Stuart Schechter.mp4 36.8 MB
USENIX Security 2017/Video/USENIX Security '17 - Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts.mp4 36.8 MB
USENIX Security 2014/Video/On the Effective Prevention of TLS Man-in-the-Middle Attacks in Web Applications - Nikolaos Karapanos, Srdjan Capkun.mp4 36.6 MB
USENIX Security 2017/Video/USENIX Security '17 - Digtool A Virtualization-Based Framework for Detecting Kernel Vulnerabilities.mp4 36.6 MB
USENIX Security 2014/Video/BareCloud Bare-metal Analysis-based Evasive Malware Detection - Dhilung Kirat, Giovanni Vigna, Christopher Kruegel.mp4 36.6 MB
USENIX Security 2014/Video/Understanding the Dark Side of Domain Parking - Sumayah Alrwais, Kan Yuan, Eihal Alowaisheq, Zhou Li, XiaoFeng Wang.mp4 36.5 MB
USENIX Security 2013/Video/Trafficking Fradulent Accounts The Role of the Underground Market in Twitter Spam and Abuse - Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, Vern Paxson.mp4 36.4 MB
USENIX Security 2010/Video/An Analysis of Private Browsing Modes in Modern Browsers - Gaurav Aggarwal, Elie Bursztein, Collin Jackson, Dan Boneh.mp4 36.3 MB
USENIX Security 2012/Video/TARDIS Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without Clocks - Amir Rahmati, Mastooreh Salajegheh, Dan Holcomb, Jacob Sorber, Wayne P. B.mp4 36.3 MB
USENIX Security 2010/Video/Cling A Memory Allocator to Mitigate Dangling Pointers - Periklis Akritidis.mp4 36.3 MB
USENIX Security 2017/Video/USENIX Security '17 - On the effectiveness of mitigations against floating-point timing channels.mp4 36.3 MB
USENIX Security 2012/Video/New Attacks on Timing-based Network Flow Watermarks - Zi Lin, Nicholas Hopper.mp4 36.3 MB
USENIX Security 2013/Video/Effective Inter-Component Communication Mapping in Android An Essential Step Towards Holistic Security Analysis - Damien Octeau, Patrick McDaniel, Somesh Jha, Alexandre Bartel, Eri.mp4 36.2 MB
USENIX Security 2014/Video/Hulk Eliciting Malicious Behavior in Browser Extensions - Alexandros Kapravelos, Chris Grier, Neha Chachra, Christopher Kruegel, Giovanni Vigna, Vern Paxson.mp4 36.2 MB
USENIX Security 2017/Video/USENIX Security '17 - Measuring HTTPS Adoption on the Web.mp4 36.2 MB
USENIX Security 2017/Video/USENIX Security '17 - Detecting Android Root Exploits by Learning from Root Providers.mp4 36.2 MB
USENIX Security 2014/Video/Security Analysis of a Full-Body Scanner - Keaton Mowery, Eric Wustrow, Tom Wypych, Corey Singleton, Chris Comfort, Eric Rescorla, Stephen Checkoway, J. Alex Halderman, Hovav Shach.mp4 36.1 MB
USENIX Security 2017/Video/USENIX Security '17 - BLENDER Enabling Local Search with a Hybrid Differential Privacy Model.mp4 36.0 MB
USENIX Security 2010/Video/SEPIA Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics - Martin Burkhart, Mario Strasser, Dilip Many, Xenofontas Dimitropoulos.mp4 36.0 MB
USENIX Security 2014/Video/Never Been KIST Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport - Rob Jansen, John Geddes, Chris Wacek, Micah Sherr, Paul Syverson.mp4 35.9 MB
USENIX Security 2014/Video/Optimizing Seed Selection for Fuzzing - Alexandre Rebert, Sang Kil Cha, Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, David Brumley.mp4 35.9 MB
USENIX Security 2013/Video/On the Security of Picture Gesture Authentication - Ziming Zhao, Gail-Joon Ahn, Jeong-Jin Seo, Hongxin Hu.mp4 35.8 MB
USENIX Security 2013/Video/Take This Personally Pollution Attacks on Personalized Services - Xinyu Xing, Wei Meng, Dan Doozan, Alex C. Snoeren, Nick Feamster, Wenke Lee.mp4 35.8 MB
USENIX Security 2015/USENIX Security 2015 Full Proceedings.pdf 35.8 MB
USENIX Security 2017/Video/USENIX Security '17 - Extension Breakdown....mp4 35.7 MB
USENIX Security 2015/Presentations/sec15_full_proceedings.pdf 35.7 MB
USENIX Security 2013/Video/Sancus Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base - Job Noorman, Pieter Agten, Wilfried Daniels, Raoul Strackx, Anthony Van Herre.mp4 35.7 MB
USENIX Security 2010/Video/Toward Automated Detection of Logic Vulnerabilities in Web Applications - Viktoria Felmetsger, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna.mp4 35.6 MB
USENIX Security 2015/Presentations/sec15_full_proceedings_interior.pdf 35.5 MB
USENIX Security 2015/USENIX Security 2015 Full Proceedings Interior.pdf 35.5 MB
USENIX Security 2017/Video/USENIX Security '17 - Qapla Policy compliance for database-backed systems.mp4 35.5 MB
USENIX Security 2017/Video/USENIX Security '17 - Adaptive Android Kernel Live Patching.mp4 35.5 MB
USENIX Security 2012/Video/Tachyon Tandem Execution for Efficient Live Patch Testing - Matthew Maurer, David Brumley.mp4 35.4 MB
USENIX Security 2017/Video/USENIX Security '17 - Computer Security, Privacy, and DNA Sequencing....mp4 35.4 MB
USENIX Security 2014/Video/Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture - Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza.mp4 35.4 MB
USENIX Security 2014/Video/Gyrophone Recognizing Speech from Gyroscope Signals - Yan Michalevsky, Dan Boneh, Gabi Nakibly.mp4 35.4 MB
USENIX Security 2017/Video/USENIX Security '17 - SLEUTH Real-time Attack Scenario Reconstruction from COTS Audit Data.mp4 35.3 MB
USENIX Security 2013/Video/FIE on Firmware Finding Vulnerabilities in Embedded Systems Using Symbolic Execution - Drew Davidson, Benjamin Moench, Somesh Jha, Thomas Ristenpart.mp4 35.2 MB
USENIX Security 2017/Video/USENIX Security '17 - Vale Verifying High-Performance Cryptographic Assembly Code.mp4 35.2 MB
USENIX Security 2012/Presentations/TARDIS Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without Clocks Slides - Amir Rahmati, Mastooreh Salajegheh, Dan Holcomb, Jacob Sorber, W.pdf 35.1 MB
USENIX Security 2012/Video/Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization - Cristiano Giuffrida, Anton Kuijsten, Andrew S. Tanenbaum.mp4 35.1 MB
USENIX Security 2013/Video/Dismantling Megamos Crypto Wirelessly Lockpicking a Vehicle Immobilizer.mp4 35.0 MB
USENIX Security 2012/Video/STEALTHMEM System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud - Taesoo Kim, Marcus Peinado, Gloria Mainar-Ruiz.mp4 35.0 MB
USENIX Security 2010/Video/Automatic Generation of Remediation Procedures for Malware Infections - Michael Backes, Markus Durmuth, Sebastian Gerling, Manfred Pinkal, Caroline Sporleder.mp4 34.9 MB
USENIX Security 2014/Video/Scheduler-based Defenses against Cross-VM Side-channels - Venkatanathan Varadarajan, Thomas Ristenpart, Michael Swift.mp4 34.9 MB
USENIX Security 2017/Video/USENIX Security '17 - Constant-Time Callees with Variable-Time Callers.mp4 34.6 MB
USENIX Security 2017/Video/USENIX Security '17 - CLKSCREW Exposing the Perils of Security-Oblivious Energy Management.mp4 34.5 MB
USENIX Security 2013/Video/Steal This Movie Automatically Bypassing DRM Protection in Streaming Media Services - Ruoyu Wang, Santa Barbara, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna.mp4 34.3 MB
USENIX Security 2014/Video/A Large-Scale Analysis of the Security of Embedded Firmwares - Andrei Costin, Jonas Zaddach, Aurelien Francillon, and Davide Balzarotti.mp4 34.3 MB
USENIX Security 2017/Video/USENIX Security '17 - vTZ Virtualizing ARM TrustZone.mp4 34.3 MB
USENIX Security 2013/Video/Explicating SDKs Uncovering Assumptions Underlying Secure Authentication and Authorization - Rui Wang, Yuchen Zhou, Shuo Chen, Shaz Qadeer, David Evans, Yuri Gurevich.mp4 34.2 MB
USENIX Security 2017/Video/USENIX Security '17 - Global Measurement of DNS Manipulation.mp4 34.2 MB
USENIX Security 2012/Video/On Breaking SAML Be Whoever You Want to Be - Juraj Somorovsky, Andreas Mayer, Jorg Schwenk, Marco Kampmann, Meiko Jensen.mp4 34.0 MB
USENIX Security 2015/Video/Trustworthy Whole-System Provenance for the Linux Kernel.mp4 34.0 MB
USENIX Security 2014/Video/X-Force Force-Executing Binary Programs for Security Applications - Fei Peng, Zhui Deng, Xiangyu Zhang, Dongyan Xu, Zhiqiang Lin, Zhendong Su.mp4 34.0 MB
USENIX Security 2014/Video/A Large-Scale Empirical Analysis of Chinese Web Passwords - Zhigong Li, Weili Han, Wenyuan Xu.mp4 34.0 MB
USENIX Security 2017/Video/USENIX Security '17 - DeTor Provably Avoiding Geographic Regions in Tor.mp4 33.9 MB
USENIX Security 2017/Video/USENIX Security '17 - PlatPal Detecting Malicious Documents with Platform Diversity.mp4 33.9 MB
USENIX Security 2014/Video/A Bayesian Approach to Privacy Enforcement in Smartphones - Omer Tripp, Julia Rubin.mp4 33.8 MB
USENIX Security 2012/Video/PUBCRAWL Protecting Users and Businesses from CRAWLers - Gregoire Jacob, Engin Kirda, Christopher Kruegel, Giovanni Vigna.mp4 33.8 MB
USENIX Security 2018/Video/Enter the Hydra Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts.mp4 33.8 MB
USENIX Security 2014/Video/An Internet-Wide View of Internet-Wide Scanning - Zakir Durumeric, Michael Bailey, J. Alex Halderman.mp4 33.8 MB
USENIX Security 2014/Video/SpanDex Secure Password Tracking for Android - Landon P. Cox , Peter Gilbert, Geoffrey Lawler, Valentin Pistol, Ali Razeen, Bi Wu, Sai Cheemalapati.mp4 33.7 MB
USENIX Security 2014/Video/When Governments Hack Opponents A Look at Actors and Technology - William R. Marczak, John Scott-Railton, Morgan Marquis-Boire, Vern Paxson.mp4 33.7 MB
USENIX Security 2012/Video/Origin-Bound Certificates A Fresh Approach to Strong Client Authentication for the Web - Michael Dietz, Alexei Czeskis, Dirk Balfanz, Dan S. Wallach.mp4 33.6 MB
USENIX Security 2014/Video/From the Aether to the Ethernet-Attacking the Internet using Broadcast Digital Television - Yossef Oren, Angelos D. Keromytis.mp4 33.6 MB
USENIX Security 2013/Video/Revolver An Automated Approach to the Detection of Evasive Web-based Malware - Alexandros Kapravelos, Yan Shoshitaishvili, Marco Cova, Christopher Kruegel, Giovanni Vigna.mp4 33.5 MB
USENIX Security 2014/Video/iSeeYou Disabling the MacBook Webcam Indicator LED - Matthew Brocker, Stephen Checkoway.mp4 33.3 MB
USENIX Security 2014/Video/On the Feasibility of Large-Scale Infections of iOS Devices - Tielei Wang, Yeongjin Jang, Yizheng Chen, Simon Chung, Billy Lau, Wenke Lee.mp4 33.3 MB
USENIX Security 2015/Video/All Your Biases Belong to Us Breaking RC4 in WPA-TKIP and TLS.mp4 33.1 MB
USENIX Security 2017/Video/USENIX Security '17 - AutoLock Why Cache Attacks on ARM Are Harder Than You Think.mp4 33.1 MB
USENIX Security 2014/Video/Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM - Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, Ulfar Erlingsson, Luis Lozano, Geoff Pike.mp4 33.1 MB
USENIX Security 2013/Video/Securing Embedded User Interfaces Android and Beyond - Franziska Roesner, Tadayoshi Kohno.mp4 32.9 MB
USENIX Security 2014/Video/Brahmastra Driving Apps to Test the Security of Third-Party Components - Ravi Bhoraskar, Seungyeop Han, Jinseong Jeon, Tanzirul Azim, Shuo Chen, Jaeyeon Jung, Suman Nath, Rui Wang.mp4 32.9 MB
USENIX Security 2014/Video/Mimesis Aegis A Mimicry Privacy Shield-A System’s Approach to Data Privacy on Public Cloud - Billy Lau, Simon Chung, Chengyu Song, Yeongjin Jang, Wenke Lee, Alexandra Boldyreva.mp4 32.7 MB
USENIX Security 2017/Video/USENIX Security '17 - BootStomp On the Security of Bootloaders in Mobile Devices.mp4 32.6 MB
USENIX Security 2012/Video/Enemy of the State A State-Aware Black-Box Web Vulnerability Scanner - Adam Doupe, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna.mp4 32.6 MB
USENIX Security 2017/Video/USENIX Security '17 - Telling Your Secrets without Page Faults....mp4 32.6 MB
USENIX Security 2017/Video/USENIX Security '17 - A Longitudinal, End-to-End View of the DNSSEC Ecosystem.mp4 32.5 MB
USENIX Security 2014/Video/The Emperor’s New Password Manager Security Analysis of Web-based Password Managers - Zhiwei Li, Warren He, Devdatta Akhawe, Dawn Song.mp4 32.5 MB
USENIX Security 2017/Video/USENIX Security '17 - Predicting the Resilience of Obfuscated Code....mp4 32.5 MB
USENIX Security 2014/Video/Password Managers Attacks and Defenses - David Silver, Suman Jana, and Dan Boneh, Stanford University_ Eric Chen, Collin Jackson.mp4 32.4 MB
USENIX Security 2012/USENIX Security 2012 Proceedings.epub 32.3 MB
USENIX Security 2014/Video/On the Practical Exploitability of Dual EC in TLS Implementations - Stephen Checkoway, Matthew Fredrikson, Ruben Niederhagen, Adam Everspaugh, Matthew Green, Tanja Lange, Thomas Ri.mp4 32.3 MB
USENIX Security 2017/Video/USENIX Security '17 - Exploring User Perceptions of Discrimination in Online Targeted Advertising.mp4 32.2 MB
USENIX Security 2014/Video/Privacy in Pharmacogenetics An End-to-End Case Study of Personalized Warfarin Dosing - Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon Lin, David Page, Thomas Ristenpart.mp4 31.9 MB
USENIX Security 2017/Video/USENIX Security '17 - Oscar A Practical Page-Permissions-Based Scheme....mp4 31.9 MB
USENIX Security 2014/Video/Effective Attacks and Provable Defenses for Website Fingerprinting - Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, Ian Goldberg.mp4 31.9 MB
USENIX Security 2014/Video/Preventing Cryptographic Key Leakage in Cloud Virtual Machines - Erman Pattuk, Murat Kantarcioglu, Zhiqiang Lin, Huseyin Ulusoy.mp4 31.7 MB
USENIX Security 2017/Video/USENIX Security '17 - Reverse Engineering x86 Processor Microcode.mp4 31.6 MB
USENIX Security 2012/Video/Fuzzing with Code Fragments - Christian Holler, Kim Herzig, Andreas Zeller.mp4 31.5 MB
USENIX Security 2017/Video/USENIX Security '17 - Towards Efficient Heap Overflow Discovery.mp4 31.4 MB
USENIX Security 2014/Video/Z0 An Optimizing Distributing Zero-Knowledge Compiler - Matthew Fredrikson, Benjamin Livshits.mp4 31.4 MB
USENIX Security 2017/Video/USENIX Security '17 - Towards Practical Tools for Side Channel Aware Software Engineering....mp4 31.3 MB
USENIX Security 2013/Video/Proactively Accountable Anonymous Messaging in Verdict - Henry Corrigan-Gibbs, David Isaac Wolinsky, Bryan Ford.mp4 31.3 MB
USENIX Security 2017/Video/USENIX Security '17 - Ensuring Authorized Updates in Multi-user Database-Backed Applications.mp4 31.2 MB
USENIX Security 2014/Video/TRUESET Faster Verifiable et Computations - Ahmed E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Mahmoud F. Sayed, Elaine Shi, Nikos Triandopoulos.mp4 31.2 MB
USENIX Security 2012/Video/Privacy-Preserving Social Plugins - Georgios Kontaxis, Michalis Polychronakis, Angelos D. Keromytis, Evangelos P. Markatos.mp4 31.0 MB
USENIX Security 2018/Video/Understanding the Reproducibility of Crowd-reported Security Vulnerabilities.mp4 31.0 MB
USENIX Security 2014/Video/BYTEWEIGHT Learning to Recognize Functions in Binary Code - Tiffany Bao, Jonathan Burket, Maverick Woo, Rafael Turner, David Brumley.mp4 31.0 MB
USENIX Security 2014/Video/Privee An Architecture for Automatically Analyzing Web Privacy Policies -Sebastian Zimmeck, Steven M. Bellovin.mp4 30.9 MB
USENIX Security 2014/Video/Cardinal Pill Testing of System Virtual Machines - Hao Shi, Abdulla Alwabel, Jelena Mirkovic.mp4 30.8 MB
USENIX Security 2014/Video/Precise Client-side Protection against DOM-based Cross-Site Scripting - Ben Stock, Sebastian Lekies, Tobias Mueller, Patrick Spiegel, and Martin Johns.mp4 30.8 MB
USENIX Security 2014/Video/Static Detection of Second-Order Vulnerabilities in Web Applications - Johannes Dahse, Thorsten Holz.mp4 30.6 MB
USENIX Security 2017/Video/USENIX Security '17 - Opening Remarks and Awards.mp4 30.4 MB
USENIX Security 2013/Video/Dowsing for Ovrflows A Guided Fuzzer to Find Buffer Boundary Violations - Istvan Haller, Asia Slowinska, Matthias Neugschwandtner, Herbert Bos.mp4 30.3 MB
USENIX Security 2013/Video/ZQL A Compiler for Privacy-Preserving Data Processing - Cedric Fournet, Markulf Kohlweiss, George Danezis.mp4 30.2 MB
USENIX Security 2017/Video/USENIX Security '17 - Dead Store Elimination (Still) Considered Harmful.mp4 30.1 MB
USENIX Security 2014/Video/Automatically Detecting Vulnerable Websites Before They Turn Malicious - Kyle Soska Nicolas Christin.mp4 30.1 MB
USENIX Security 2014/Video/SDDR Light-Weight, Secure Mobile Encounters - Matthew Lentz, Viktor Erdélyi, Paarijaat Aditya, Elaine Shi, Peter Druschel, Bobby Bhattacharjee.mp4 30.0 MB
USENIX Security 2009/Video/GATEKEEPER Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code - Salvatore Guarnieri, Benjamin Livshits.mp4 29.7 MB
USENIX Security 2017/Video/USENIX Security '17 - Efficient Protection of Path-Sensitive Control Security.mp4 29.7 MB
USENIX Security 2012/Video/Optimally Robust Private Information Retrieval - Casey Devet, Ian Goldberg, Nadia Heninger.mp4 29.7 MB
USENIX Security 2012/Video/Privilege Separation in HTML5 Applications - Devdatta Akhawe, Prateek Saxena, Dawn Song.mp4 29.5 MB
USENIX Security 2017/Video/USENIX Security '17 - Locally Differentially Private Protocols for Frequency Estimation.mp4 29.4 MB
USENIX Security 2017/Video/USENIX Security '17 - Ninja Towards Transparent Tracing and Debugging on ARM.mp4 29.4 MB
USENIX Security 2018/Video/Translation Leak-aside Buffer Defeating Cache Side-channel Protections with TLB Attacks.mp4 29.2 MB
USENIX Security 2014/Video/Dynamic Hooks Hiding Control Flow Changes within Non-Control Data - Sebastian Vogl, Robert Gawlik, Behrad Garmany, Thomas Kittel, Jonas Pfoh, Claudia Eckert, Thorsten Holz.mp4 28.9 MB
USENIX Security 2012/Video/Tracking Rootkit Footprints with a Practical Memory Analysis System - Weidong Cui, Marcus Peinado, Zhilei Xu, Ellick Chan.mp4 28.8 MB
USENIX Security 2014/Video/The Long Taile of Typosquatting Domain Names - Janos Szurdi, Balazs Kocso, Gabor Cseh, Jonathan Spring, Mark Felegyhazi, Chris Kanich.mp4 28.8 MB
USENIX Security 2017/Video/USENIX Security '17 - CacheD Identifying Cache-Based Timing Channels in Production Software.mp4 28.8 MB
USENIX Security 2013/Presentations/Confessions of a Recovering Data Broker Responsible Innovation in the Age of Big Data, Big Brother, and the Coming Skynet Terminators Slides - Jim Adler.pdf 28.7 MB
USENIX Security 2018/Video/BlackIoT IoT Botnet of High Wattage Devices Can Disrupt the Power Grid.mp4 28.6 MB
USENIX Security 2015/Video/Type Casting Verification Stopping an Emerging Attack Vector.mp4 28.4 MB
USENIX Security 2014/Video/Stitching the Gadgets On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection - Lucas Davi, Ahmad-Reza Sadeghi, Daniel Lehmann, Fabian Monrose.mp4 28.3 MB
USENIX Security 2013/USENIX Security 2013 Proceedings.mobi 28.2 MB
USENIX Security 2012/Video/Throttling Tor Bandwidth Parasites - Rob Jansen, Paul Syverson, Nicholas Hopper.mp4 28.1 MB
USENIX Security 2019/Video/USENIX Security '19 - Wireless Attacks on Aircraft Instrument Landing Systems.mp4 28.1 MB
USENIX Security 2015/Video/Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors.mp4 28.1 MB
USENIX Security 2017/Video/USENIX Security '17 - Characterizing the Nature and Dynamics of Tor Exit Blocking.mp4 28.0 MB
USENIX Security 2013/Video/Transparent ROP Exploit Mitigation Using Indirect Branch Tracing - Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis.mp4 28.0 MB
USENIX Security 2014/Video/ASM A Programmable Interface for Extending Android Security - Stephan Heuser, Adwait Nadkarni, William Enck, Ahmad-Reza Sadeghi.mp4 28.0 MB
USENIX Security 2017/Video/USENIX Security '17 - ORide A Privacy-Preserving yet Accountable Ride-Hailing Service.mp4 27.9 MB
USENIX Security 2013/USENIX Security 2013 Proceedings.pdf 27.9 MB
USENIX Security 2014/Video/ret2dir Rethinking Kernel Isolation - Vasileios P. Kemerlis, Michalis Polychronakis, Angelos D. Keromytis.mp4 27.8 MB
USENIX Security 2014/Video/A Look at Targeted Attacks Through the Lense of an NGO - Stevens Le Blond, Adina Uritesc, Cedric Gilbert, Zheng Leong Chua, Prateek Saxena, Engin Kirda.mp4 27.7 MB
USENIX Security 2015/Video/Post-Mortem of a Zombie Conficker Cleanup After Six Years.mp4 27.7 MB
USENIX Security 2015/Video/Investigating the Computer Security Practices and Needs of Journalists.mp4 27.6 MB
USENIX Security 2013/USENIX Security 2013 Proceedings Interior.pdf 27.6 MB
USENIX Security 2013/Video/Eradicating DNS Rebinding with the Extended Same-origin Policy - Martin Johns, Sebastian Lekies, Ben Stock.mp4 27.6 MB
USENIX Security 2013/Video/WHYPER Towards Automating Risk Assessment of Mobile Applications - Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, Tao Xie.mp4 27.3 MB
USENIX Security 2015/Video/Towards Discovering and Understanding Task Hijacking in Android.mp4 27.2 MB
USENIX Security 2014/Video/USENIX Security 2014 Opening Remarks and Awards - Kevin Fu.mp4 27.2 MB
USENIX Security 2015/Video/Sound-Proof Usable Two-Factor Authentication Based on Ambient Sound.mp4 27.2 MB
USENIX Security 2014/Video/LibFTE A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes - Daniel Luchaup, Kevin P. Dyer, Somesh Jha, Thomas Ristenpart, Thomas Shrimpton.mp4 27.1 MB
USENIX Security 2014/Video/Exit from Hell Reducing the Impact of Amplification DDoS Attacks - Marc Kuhrer, Thomas Hupperich, Christian Rossow, Thorsten Holz.mp4 26.9 MB
USENIX Security 2012/Video/Taking Proof-Based Verified Computation a Few Steps Closer to Practicality - Srinath Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Andrew J. Blumberg, Michael Walfish.mp4 26.9 MB
USENIX Security 2014/Video/Revisiting SSLTLS Implementations New Bleichenbacher Side Channels and Attacks - Christopher Meyer, Juraj Somorovsky, Eugen Weiss, Jorg Schwenk, Sebastian Schinzel, Erik Tews.mp4 26.9 MB
USENIX Security 2012/Video/kGuard Lightweight Kernel Protection against Return-to-User Attacks - Vasileios P. Kemerlis, Georgios Portokalidis, Angelos D. Keromytis.mp4 26.8 MB
USENIX Security 2019/Video/USENIX Security '19 - CT-GAN Malicious Tampering of 3D Medical Imagery using Deep Learning.mp4 26.8 MB
USENIX Security 2014/Video/ROP is Still Dangerous Breaking Modern Defenses - Nicholas Carlini, David Wagner.mp4 26.4 MB
USENIX Security 2018/Video/Better managed than memorized Studying the Impact of Managers on Password Strength and Reuse.mp4 26.3 MB
USENIX Security 2018/Video/With Great Training Comes Great Vulnerability Practical Attacks against Transfer Learning.mp4 26.2 MB
USENIX Security 2019/Video/USENIX Security '19 - Please Pay Inside Evaluating Bluetooth-based Detection of Gas Pump Skimmers.mp4 26.2 MB
USENIX Security 2013/Video/Jekyll on iOS When Benign Apps Become Evil - Tielei Wang, Kangjie Lu, Long Lu, Simon Chung, Wenke Lee.mp4 26.0 MB
USENIX Security 2013/Video/Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers - Suman Jana, David Molnar, Alexander Moshchuk, Alan Dunn, Benjamin Livshits, Helen J. Wang, E.mp4 26.0 MB
USENIX Security 2015/Video/Cloudy with a Chance of Breach Forecasting Cyber Security Incidents.mp4 25.8 MB
USENIX Security 2015/Video/The Unexpected Dangers of Dynamic JavaScript.mp4 25.8 MB
USENIX Security 2018/Video/Modelling and Analysis of a Hierarchy of Distance Bounding Attacks.mp4 25.7 MB
USENIX Security 2019/Video/USENIX Security '19 - TESSERACT Eliminating Experimental Bias in Malware Classification.mp4 25.6 MB
USENIX Security 2019/Video/USENIX Security '19 - CONFIRM Evaluating Compatibility and Relevance of Control-flow.mp4 25.5 MB
USENIX Security 2020/Videos/USENIX Security 20 - The Unpatchable Silicon A Full Break of the Bitstream Encryption of Xilinx.mp4 25.4 MB
USENIX Security 2013/Video/Impression Fraud in On-line Advertising via Pay-Per-View Networks - Kevin Springborn, Paul Barford.mp4 25.4 MB
USENIX Security 2014/Video/Size Does Matter Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard - Enes Goktas, Elias Athanasopoulos, Michalis Polychronakis, Herbert Bos, Georgios Portokalidis.mp4 25.2 MB
USENIX Security 2018/Video/A Bad Dream Subverting Trusted Platform Module While You Are Sleeping.mp4 25.0 MB
USENIX Security 2019/Video/USENIX Security '19 - Hiding in Plain Signal Physical Signal Overshadowing Attack on LTE.mp4 25.0 MB
USENIX Security 2019/Video/USENIX Security '19 - The Web's Identity Crisis Understanding the Effectiveness of Website Identity.mp4 24.8 MB
USENIX Security 2018/Video/Security Namespace Making Linux Security Frameworks Available to Containers.mp4 24.6 MB
USENIX Security 2019/Video/USENIX Security '19 - Misleading Authorship Attribution of Source Code using Adversarial Learning.mp4 24.6 MB
USENIX Security 2012/Video/Efficient and Scalable Socware Detection in Online Social Networks - Md Sazzadur Rahman, Ting-Kai Huang, Harsha V. Madhyastha, Michalis Faloutsos.mp4 24.6 MB
USENIX Security 2019/Video/USENIX Security '19 - CSI NN Reverse Engineering of Neural Network Architectures.mp4 24.5 MB
USENIX Security 2018/Video/NetHide Secure and Practical Network Topology Obfuscation.mp4 24.4 MB
USENIX Security 2018/Video/Foreshadow Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution.mp4 24.4 MB
USENIX Security 2018/Video/SAQL A Stream-based Query System for Real-Time Abnormal System Behavior Detection.mp4 24.3 MB
USENIX Security 2019/Video/USENIX Security '19 - The Anatomy of a Cryptocurrency Pump-and-Dump Scheme.mp4 24.3 MB
USENIX Security 2018/Video/teEther Gnawing at Ethereum to Automatically Exploit Smart Contracts.mp4 24.2 MB
USENIX Security 2018/Video/Bamboozling Certificate Authorities with BGP.mp4 23.7 MB
USENIX Security 2018/Video/Analysis of Privacy Protections in Fitness Tracking Social Networks -or- You can run.mp4 23.6 MB
USENIX Security 2019/Video/USENIX Security '19 - Inadvertently Making Cyber Criminals Rich A Comprehensive Study of.mp4 23.6 MB
USENIX Security 2019/Video/USENIX Security '19 - Users Really Do Answer Telephone Scams.mp4 23.6 MB
USENIX Security 2019/Video/USENIX Security '19 - Discovering and Understanding the Security Hazards in the.mp4 23.6 MB
USENIX Security 2012/USENIX Security 2012 Proceedings.mobi 23.6 MB
USENIX Security 2018/Video/Skill Squatting Attacks on Amazon Alexa.mp4 23.4 MB
USENIX Security 2019/Video/USENIX Security '19 - in-toto Providing farm-to-table guarantees for bits and bytes.mp4 23.4 MB
USENIX Security 2019/Video/USENIX Security '19 - Utility-Optimized Local Differential Privacy Mechanisms for.mp4 23.3 MB
USENIX Security 2014/USENIX Security 2014 Full Proceedings.mobi 23.3 MB
USENIX Security 2018/Video/A4NT Author Attribute Anonymity by Adversarial Training of Neural Machine Translation.mp4 23.3 MB
USENIX Security 2019/Video/USENIX Security '19 - HardFails Insights into Software-Exploitable Hardware Bugs.mp4 23.3 MB
USENIX Security 2018/Video/The Guard's Dilemma Efficient Code-Reuse Attacks Against Intel SGX.mp4 23.1 MB
USENIX Security 2018/Video/Turning Your Weakness Into a Strength Watermarking Deep Neural Networks by Backdooring.mp4 23.1 MB
USENIX Security 2019/Video/USENIX Security '19 - Evaluating the Contextual Integrity of Privacy Regulation Parents' IoT.mp4 23.1 MB
USENIX Security 2018/Video/DelegaTEE Brokered Delegation Using Trusted Execution Environments.mp4 23.0 MB
USENIX Security 2018/Video/End-to-End Measurements of Email Spoofing Attacks.mp4 23.0 MB
USENIX Security 2019/Video/USENIX Security '19 - Not Everything is Dark and Gloomy Power Grid Protections Against IoT.mp4 23.0 MB
USENIX Security 2013/Video/PCF A Portable Circuit Format for Scalable Two-Party Secure Computation - Ben Kreuter, Benjamin Mood, Abhi Shelat, Kevin Butler.mp4 22.8 MB
USENIX Security 2011/USENIX Security 2011 Proceedings.pdf 22.6 MB
USENIX Security 2018/Video/GAZELLE A Low Latency Framework for Secure Neural Network Inference.mp4 22.6 MB
USENIX Security 2019/Video/USENIX Security '19 - simTPM User-centric TPM for Mobile Devices.mp4 22.4 MB
USENIX Security 2019/Video/USENIX Security '19 - JEDI Many-to-Many End-to-End Encryption and Key Delegation for IoT.mp4 22.4 MB
USENIX Security 2019/Video/USENIX Security '19 - Reading the Tea leaves A Comparative Analysis of Threat Intelligence.mp4 22.4 MB
USENIX Security 2018/Video/Unveiling and Quantifying Facebook Exploitation of Sensitive Personal Data for Advertising Purposes.mp4 22.3 MB
USENIX Security 2018/Video/One&Done A Single-Decryption EM-Based Attack on OpenSSL's Constant-Time Blinded RSA.mp4 22.3 MB
USENIX Security 2018/Video/Quack Scalable Remote Measurement of Application-Layer Censorship.mp4 22.3 MB
USENIX Security 2019/Video/USENIX Security '19 - EverParse Verified Secure Zero-Copy Parsers for Authenticated Message Formats.mp4 22.3 MB
USENIX Security 2019/Video/USENIX Security '19 - MOPT Optimized Mutation Scheduling for Fuzzers.mp4 22.3 MB
USENIX Security 2015/Video/RAPTOR Routing Attacks on Privacy in Tor.mp4 22.2 MB
USENIX Security 2020/Videos/USENIX Security 20 - FuzzGen Automatic Fuzzer Generation.mp4 22.2 MB
USENIX Security 2019/Video/USENIX Security '19 - Improving Robustness of ML Classifiers against Realizable Evasio.mp4 22.1 MB
USENIX Security 2019/Video/USENIX Security '19 - The KNOB is Broken Exploiting Low Entropy in the Encryption Key.mp4 22.1 MB
USENIX Security 2019/Video/USENIX Security '19 - SafeHidden An Efficient and Secure Information Hiding Technique Using.mp4 22.1 MB
USENIX Security 2019/Video/USENIX Security '19 - Understanding and Improving Security and Privacy in Multi-User.mp4 22.0 MB
USENIX Security 2019/Video/USENIX Security '19 - EnTrust Regulating Sensor Access by Cooperating Programs.mp4 22.0 MB
USENIX Security 2019/Video/USENIX Security '19 - The Betrayal At Cloud City An Empirical Analysis Of Cloud-Based Mobile.mp4 22.0 MB
USENIX Security 2018/Video/NAVEX Precise and Scalable Exploit Generation for Dynamic Web Applications.mp4 21.9 MB
USENIX Security 2019/Video/USENIX Security '19 - ScatterCache Thwarting Cache Attacks via Cache Set Randomization.mp4 21.7 MB
USENIX Security 2018/Video/Charm Facilitating Dynamic Analysis of Device Drivers of Mobile Systems.mp4 21.7 MB
USENIX Security 2018/Video/The Battle for New York A Case Study of Applied Digital Threat Modeling at the Enterprise Level.mp4 21.7 MB
USENIX Security 2018/Video/The Rewards and Costs of Stronger Passwords in a University Linking Password Lifetime to Strength.mp4 21.7 MB
USENIX Security 2019/Video/USENIX Security '19 - On (The Lack Of) Location Privacy in Crowdsourcing Applications.mp4 21.6 MB
USENIX Security 2019/Video/USENIX Security '19 - A Billion Open Interfaces for Eve and Mallory MitM, DoS, and Tracking.mp4 21.6 MB
USENIX Security 2019/Video/USENIX Security '19 - BITE Bitcoin Lightweight Client Privacy using Trusted Execution.mp4 21.6 MB
USENIX Security 2019/Video/USENIX Security '19 - Point Break A Study of Bandwidth Denial-of-Service Attacks against Tor.mp4 21.5 MB
USENIX Security 2019/Video/USENIX Security '19 - Detecting and Characterizing Lateral Phishing at Scale.mp4 21.5 MB
USENIX Security 2019/Video/USENIX Security '19 - The CrossPath Attack Disrupting the SDN Control Channel via Shared Links.mp4 21.5 MB
USENIX Security 2019/Video/USENIX Security '19 - UWB-ED Distance Enlargement Attack Detection in Ultra-Wideband.mp4 21.5 MB
USENIX Security 2018/Video/We Still Don't Have Secure Cross-Domain Requests an Empirical Study of CORS.mp4 21.5 MB
USENIX Security 2019/Video/USENIX Security '19 - Origin-sensitive Control Flow Integrity.mp4 21.4 MB
USENIX Security 2014/Presentations/iSeeYou Disabling the MacBook Webcam Indicator LED Slides - Matthew Brocker, Stephen Checkoway.pdf 21.4 MB
USENIX Security 2018/Video/Dependence-Preserving Data Compaction for Scalable Forensic Analysis.mp4 21.4 MB
USENIX Security 2011/Video/Opening Remarks, Awards, and Keynote Address - David Wagner.mp4 21.3 MB
USENIX Security 2019/Video/USENIX Security '19 - Why Do Adversarial Attacks Transfer Explaining Transferability of.mp4 21.3 MB
USENIX Security 2019/Video/USENIX Security '19 - Pythia Remote Oracles for the Masses.mp4 21.3 MB
USENIX Security 2019/Video/USENIX Security '19 - Rendered Private Making GLSL Execution Uniform to Prevent WebGL-based.mp4 21.3 MB
USENIX Security 2019/Video/USENIX Security '19 - Seeing is Not Believing Camouflage Attacks on Image Scaling Algorithms.mp4 21.3 MB
USENIX Security 2019/Video/USENIX Security '19 - Understanding and Securing Device Vulnerabilities through.mp4 21.2 MB
USENIX Security 2019/Video/USENIX Security '19 - Identifying Cache-Based Side Channels through Secret-Augmented.mp4 21.2 MB
USENIX Security 2018/Video/Fp-Scanner The Privacy Implications of Browser Fingerprint Inconsistencies.mp4 21.2 MB
USENIX Security 2019/Video/USENIX Security '19 - KEPLER Facilitating Control-flow Hijacking Primitive Evaluation for Linux.mp4 21.1 MB
USENIX Security 2019/Video/USENIX Security '19 - Platforms in Everything Analyzing Ground-Truth Data on the Anatomy and.mp4 21.1 MB
USENIX Security 2020/Videos/USENIX Security 20 - You Are What You Broadcast Identification of Mobile and IoT Devices....mp4 21.1 MB
USENIX Security 2019/Video/USENIX Security '19 - Probability Model Transforming Encoders Against Encoding Attacks.mp4 21.0 MB
USENIX Security 2018/Video/Polisis Automated Analysis and Presentation of Privacy Policies Using Deep Learning.mp4 21.0 MB
USENIX Security 2014/USENIX Security 2014 Full Proceedings.epub 21.0 MB
USENIX Security 2018/Video/The Dangers of Key Reuse Practical Attacks on IPsec IKE.mp4 21.0 MB
USENIX Security 2019/Video/USENIX Security '19 - Mobile Private Contact Discovery at Scale.mp4 20.9 MB
USENIX Security 2019/Video/USENIX Security '19 - RAZOR A Framework for Post-deployment Software Debloating.mp4 20.9 MB
USENIX Security 2010/Presentations/USENIX Security 2010 Proceedings.pdf 20.8 MB
USENIX Security 2019/Video/USENIX Security '19 - From IP ID to Device ID and KASLR Bypass.mp4 20.8 MB
USENIX Security 2019/Video/USENIX Security '19 - No Right to Remain Silent Isolating Malicious Mixes.mp4 20.7 MB
USENIX Security 2018/Video/Meltdown Reading Kernel Memory from User Space.mp4 20.7 MB
USENIX Security 2019/Video/USENIX Security '19 - “Johnny, you are fired!” - Spoofing OpenPGP and S MIME Signatures in Emails.mp4 20.7 MB
USENIX Security 2018/Video/All Your GPS Are Belong To Us Towards Stealthy Manipulation of Road Navigation Systems.mp4 20.7 MB
USENIX Security 2018/Video/Rethinking Access Control and Authentication for the Home Internet of Things (IoT).mp4 20.7 MB
USENIX Security 2019/Video/USENIX Security '19 - FIRM-AFL High-Throughput Greybox Fuzzing of IoT Firmware via.mp4 20.6 MB
USENIX Security 2020/Videos/USENIX Security 20 - Light Commands Laser-Based Audio Injection Attacks on Voice-Controllable.mp4 20.5 MB
USENIX Security 2019/Video/USENIX Security '19 - uXOM Efficient eXecute-Only Memory on ARM Cortex-M.mp4 20.5 MB
USENIX Security 2019/Video/USENIX Security '19 - VRASED A Verified Hardware Software Co-Design for Remote Attestation.mp4 20.5 MB
USENIX Security 2020/Videos/USENIX Security 20 - COUNTERFOIL Verifying Provenance of Integrated Circuits using Intrinsic.mp4 20.5 MB
USENIX Security 2019/Video/USENIX Security '19 - AntiFuzz Impeding Fuzzing Audits of Binary Executables.mp4 20.4 MB
USENIX Security 2019/Video/USENIX Security '19 - Less is More Quantifying the Security Benefits of Debloating Web Applications.mp4 20.3 MB
USENIX Security 2013/Video/Greystar Fast and Accurate Detection of SMS Spam Numbers in Large Cellular Networks Using Gray Phone Space - Nan Jiang, Yu Jin, Ann Skudlark, Zhi-Li Zhang.mp4 20.2 MB
USENIX Security 2019/Video/USENIX Security '19 - RVFuzzer Finding Input Validation Bugs in Robotic Vehicles through.mp4 20.2 MB
USENIX Security 2019/Video/USENIX Security '19 - High Precision Detection of Business Email Compromise.mp4 20.2 MB
USENIX Security 2019/Video/USENIX Security '19 - The Art of The Scam Demystifying Honeypots in Ethereum Smart Contracts.mp4 20.2 MB
USENIX Security 2018/Video/Discovering Flaws in Security-Focused Static Analysis Tools for Android using Systematic Mutation.mp4 20.2 MB
USENIX Security 2019/Video/USENIX Security '19 - Leaky Images Targeted Privacy Attacks in the Web.mp4 20.2 MB
USENIX Security 2019/Video/USENIX Security '19 - Terminal Brain Damage Exposing the Graceless Degradation in Deep.mp4 20.2 MB
USENIX Security 2019/Video/USENIX Security '19 - ERIM Secure, Efficient In-process Isolation with Protection Keys (MPK).mp4 20.2 MB
USENIX Security 2019/Video/USENIX Security '19 - GRIMOIRE Synthesizing Structure while Fuzzing.mp4 20.2 MB
USENIX Security 2018/Video/QSYM A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing.mp4 20.1 MB
USENIX Security 2019/Video/USENIX Security '19 - ATTACK2VEC Leveraging Temporal Word Embeddings to Understand the.mp4 20.1 MB
USENIX Security 2018/Video/Acquisitional Rule-based Engine for Discovering Internet-of-Things Devices.mp4 20.1 MB
USENIX Security 2019/Video/USENIX Security '19 - ALOHA Auxiliary Loss Optimization for Hypothesis Augmentation.mp4 20.0 MB
USENIX Security 2019/Video/USENIX Security '19 - PeX A Permission Check Analysis Framework for Linux Kernel.mp4 20.0 MB
USENIX Security 2018/Video/FlowCog Context-aware Semantics Extraction and Analysis of Information Flow Leaks in Android Apps.mp4 19.9 MB
USENIX Security 2019/Video/USENIX Security '19 - FastKitten Practical Smart Contracts on Bitcoin.mp4 19.9 MB
USENIX Security 2019/Video/USENIX Security '19 - StrongChain Transparent and Collaborative Proof-of-Work Consensus.mp4 19.9 MB
USENIX Security 2019/Video/USENIX Security '19 - WAVE A Decentralized Authorization Framework with Transitive Delegation.mp4 19.9 MB
USENIX Security 2018/Video/Rampart Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks.mp4 19.8 MB
USENIX Security 2019/Video/USENIX Security '19 - Clinical Computer Security for Victims of Intimate Partner Violence.mp4 19.8 MB
USENIX Security 2020/Videos/USENIX Security 20 - Data Recovery from Scrubbed NAND Flash Storage Need for Analog Sanitization.mp4 19.8 MB
USENIX Security 2012/USENIX Security 2012 Proceedings.pdf 19.8 MB
USENIX Security 2018/Video/Formal Security Analysis of Neural Networks using Symbolic Intervals.mp4 19.8 MB
USENIX Security 2019/Video/USENIX Security '19 - The Secret Sharer Evaluating and Testing Unintended Memorization in.mp4 19.7 MB
USENIX Security 2019/Video/USENIX Security '19 - Towards the Detection of Inconsistencies in Public Security.mp4 19.7 MB
USENIX Security 2020/Videos/USENIX Security 20 - Towards Robust LiDAR-based Perception in Autonomous Driving General Black-box.mp4 19.7 MB
USENIX Security 2019/Video/USENIX Security '19 - All Your Clicks Belong to Me Investigating Click Interception on the Web.mp4 19.7 MB
USENIX Security 2018/Video/Plug and Prey Measuring the Commoditization of Cybercrime via Online Anonymous Markets.mp4 19.7 MB
USENIX Security 2018/Video/CommanderSong A Systematic Approach for Practical Adversarial Voice Recognition.mp4 19.5 MB
USENIX Security 2019/Video/USENIX Security '19 - Small World with High Risks A Study of Security Threats in the npm Ecosystem.mp4 19.5 MB
USENIX Security 2019/Video/USENIX Security '19 - Exploiting Unprotected I O Operations in AMD's Secure Encrypted Virtualization.mp4 19.5 MB
USENIX Security 2019/Video/USENIX Security '19 - Blind Bernoulli Trials A Noninteractive Protocol For Hidden-Weight Coin Flips.mp4 19.5 MB
USENIX Security 2019/Video/USENIX Security '19 - SPOILER Speculative Load Hazards Boost Rowhammer and Cache Attacks.mp4 19.5 MB
USENIX Security 2019/Video/USENIX Security '19 - XONN XNOR-based Oblivious Deep Neural Network Inference.mp4 19.5 MB
USENIX Security 2018/Video/Shielding Software From Privileged Side-Channel Attacks.mp4 19.5 MB
USENIX Security 2018/Video/MoonShine Optimizing OS Fuzzer Seed Selection with Trace Distillation.mp4 19.5 MB
USENIX Security 2018/Video/Injected and Delivered Fabricating Implicit Control over Actuation Systems by Spoofing.mp4 19.3 MB
USENIX Security 2019/Video/USENIX Security '19 - Iframes Popups Are Dangerous in Mobile WebView Studying and.mp4 19.3 MB
USENIX Security 2018/Video/The Secure Socket API TLS as an Operating System Service.mp4 19.2 MB
USENIX Security 2019/Video/USENIX Security '19 - Protecting Cloud Virtual Machines from Hypervisor and Host Operating.mp4 19.2 MB
USENIX Security 2019/Video/USENIX Security '19 - Scalable Scanning and Automatic Classification of TLS Padding Oracle.mp4 19.2 MB
USENIX Security 2019/Video/USENIX Security '19 - A Systematic Evaluation of Transient Execution Attacks and Defenses.mp4 19.2 MB
USENIX Security 2018/Video/BurnBox Self-Revocable Encryption in a World Of Compelled Access.mp4 19.2 MB
USENIX Security 2019/Video/USENIX Security '19 - Birthday, Name and Bifacial-security Understanding Passwords.mp4 19.1 MB
USENIX Security 2020/Videos/USENIX Security 20 - TextShield Robust Text Classification Based on Multimodal Embedding.mp4 19.1 MB
USENIX Security 2018/Video/From Patching Delays to Infection Symptoms....mp4 19.1 MB
USENIX Security 2018/Video/Reading Thieves' Cant Automatically Identifying and Understanding Dark Jargons from Cybercrime.mp4 19.1 MB
USENIX Security 2019/Video/USENIX Security '19 - Detecting Missing-Check Bugs via Semantic- and Context-Aware.mp4 19.1 MB
USENIX Security 2019/Video/USENIX Security '19 - When the Signal is in the Noise Exploiting Diffix's Sticky Noise.mp4 19.1 MB
USENIX Security 2011/USENIX Security 2011 Proceedings.epub 19.0 MB
USENIX Security 2018/Video/Enabling Refinable Cross-Host Attack Investigation with Efficient Data Flow Tagging and Tracking.mp4 19.0 MB
USENIX Security 2018/Video/Who Is Answering My Queries Understanding and Characterizing Interception....mp4 19.0 MB
USENIX Security 2018/Video/Debloating Software through Piece-Wise Compilation and Loading.mp4 19.0 MB
USENIX Security 2018/Video/Precise and Accurate Patch Presence Test for Binaries.mp4 19.0 MB
USENIX Security 2019/Video/USENIX Security '19 - All Things Considered An Analysis of IoT Devices on Home Networks.mp4 18.9 MB
USENIX Security 2019/Video/USENIX Security '19 - Protecting accounts from credential stuffing with password breach alerting.mp4 18.9 MB
USENIX Security 2019/Video/USENIX Security '19 - DEEPVSA Facilitating Value-set Analysis with Deep Learning for.mp4 18.8 MB
USENIX Security 2018/Video/Fast and Service-preserving Recovery from Malware Infections Using CRIU.mp4 18.8 MB
USENIX Security 2018/Video/ATtention Spanned Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem.mp4 18.8 MB
USENIX Security 2018/Video/Erays Reverse Engineering Ethereum's Opaque Smart Contracts.mp4 18.8 MB
USENIX Security 2018/Video/Automatic Heap Layout Manipulation for Exploitation.mp4 18.8 MB
USENIX Security 2019/Video/USENIX Security '19 - EnFuzz Ensemble Fuzzing with Seed Synchronization among Diverse Fuzzers.mp4 18.8 MB
USENIX Security 2019/Video/USENIX Security '19 - PolicyLint Investigating Internal Privacy Policy Contradictions on Google.mp4 18.8 MB
USENIX Security 2018/Video/FUZE Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities.mp4 18.8 MB
USENIX Security 2019/Video/USENIX Security '19 - Computer Security and Privacy in the Interactions Between Victim.mp4 18.7 MB
USENIX Security 2018/Video/The Broken Shield Measuring Revocation Effectiveness in the Windows Code-Signing PKI.mp4 18.7 MB
USENIX Security 2019/Video/USENIX Security '19 - IODINE Verifying Constant-Time Execution of Hardware.mp4 18.7 MB
USENIX Security 2019/Video/USENIX Security '19 - What Are You Searching For A Remote Keylogging Attack.mp4 18.6 MB
USENIX Security 2019/Video/USENIX Security '19 - Tracing Transactions Across Cryptocurrency Ledgers.mp4 18.6 MB
USENIX Security 2018/Video/Arbitrum Scalable, private smart contracts.mp4 18.5 MB
USENIX Security 2019/Video/USENIX Security '19 - Losing the Car Keys Wireless PHY-Layer Insecurity in EV Charging.mp4 18.5 MB
USENIX Security 2018/Video/Man-in-the-Machine Exploiting Ill-Secured Communication Inside the Computer.mp4 18.5 MB
USENIX Security 2018/Video/Malicious Management Unit Why Stopping Cache Attacks in Software is Harder Than You Think.mp4 18.5 MB
USENIX Security 2019/Video/USENIX Security '19 - Everyone is Different Client-side Diversification for Defending.mp4 18.4 MB
USENIX Security 2018/Video/How Do Tor Users Interact With Onion Services.mp4 18.4 MB
USENIX Security 2018/Video/Fear the Reaper Characterization and Fast Detection of Card Skimmers.mp4 18.3 MB
USENIX Security 2018/Video/Off-Path TCP Exploit How Wireless Routers Can Jeopardize Your Secrets.mp4 18.3 MB
USENIX Security 2018/Video/Practical Accountability of Secret Processes.mp4 18.3 MB
USENIX Security 2019/Video/USENIX Security '19 - Cognitive Triaging of Phishing Attacks.mp4 18.3 MB
USENIX Security 2019/Video/USENIX Security '19 - Looking from the Mirror Evaluating IoT Device Security through.mp4 18.3 MB
USENIX Security 2020/Videos/USENIX Security 20 - APEX A Verified Architecture for Proofs of Execution on Remote Devices....mp4 18.1 MB
USENIX Security 2019/Video/USENIX Security '19 - CANvas Fast and Inexpensive Automotive Network Mapping.mp4 18.1 MB
USENIX Security 2018/Video/DATA - Differential Address Trace Analysis Finding Address-based Side-Channels in Binaries.mp4 18.0 MB
USENIX Security 2019/Video/USENIX Security '19 - Stack Overflow Considered Helpful! Deep Learning Security Nudges Towards.mp4 18.0 MB
USENIX Security 2018/Video/An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications.mp4 18.0 MB
USENIX Security 2020/Videos/USENIX Security 20 - SHA-1 is a Shambles First Chosen-Prefix Collision on SHA-1 and Application.mp4 18.0 MB
USENIX Security 2019/Video/USENIX Security '19 - PAC it up Towards Pointer Integrity using ARM Pointer Authentication.mp4 18.0 MB
USENIX Security 2018/Video/AttriGuard A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning.mp4 18.0 MB
USENIX Security 2019/Video/USENIX Security '19 - 50 Ways to Leak Your Data An Exploration of Apps'.mp4 17.9 MB
USENIX Security 2018/Video/Inception System-Wide Security Testing of Real-World Embedded Systems Software.mp4 17.9 MB
USENIX Security 2020/Videos/USENIX Security 20 - NXNSAttack Recursive DNS Inefficiencies and Vulnerabilities.mp4 17.9 MB
USENIX Security 2020/Videos/USENIX Security 20 - BigMAC Fine-Grained Policy Analysis of Android Firmware.mp4 17.9 MB
USENIX Security 2018/Video/Towards Predicting Efficient and Anonymous Tor Circuits.mp4 17.9 MB
USENIX Security 2018/Video/Forgetting of Passwords Ecological Theory and Data.mp4 17.8 MB
USENIX Security 2018/Video/Vetting Single Sign-On SDK Implementations via Symbolic Reasoning.mp4 17.8 MB
USENIX Security 2018/Video/O Single Sign-Off, Where Art Thou An Empirical Analysis of Single Sign-On.mp4 17.8 MB
USENIX Security 2019/Video/USENIX Security '19 - HideMyApp Hiding the Presence of Sensitive Apps on Android.mp4 17.8 MB
USENIX Security 2018/Video/Sensitive Information Tracking in Commodity IoT.mp4 17.8 MB
USENIX Security 2019/Video/USENIX Security '19 - Understanding iOS-based Crowdturfing Through Hidden UI Analysis.mp4 17.7 MB
USENIX Security 2020/Videos/USENIX Security 20 - Actions Speak Louder than Words Entity-Sensitive Privacy Policy and Data Flow.mp4 17.7 MB
USENIX Security 2018/Video/Return Of Bleichenbacher's Oracle Threat (ROBOT).mp4 17.7 MB
USENIX Security 2020/Videos/USENIX Security 20 - The Industrial Age of Hacking.mp4 17.7 MB
USENIX Security 2018/Video/A Sense of Time for JavaScript and Node.js.mp4 17.7 MB
USENIX Security 2019/Video/USENIX Security '19 - Back to the Whiteboard a Principled Approach for the Assessment and.mp4 17.7 MB
USENIX Security 2019/Video/USENIX Security '19 - Site Isolation Process Separation for Web Sites within the Browser.mp4 17.6 MB
USENIX Security 2020/Videos/USENIX Security 20 - SAVIOR Securing Autonomous Vehicles with Robust Physical Invariants.mp4 17.6 MB
USENIX Security 2020/Videos/USENIX Security 20 - The Impact of Ad-Blockers on Product Search and Purchase Behavior.mp4 17.5 MB
USENIX Security 2020/Videos/USENIX Security 20 - MUZZ Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded.mp4 17.5 MB
USENIX Security 2018/Video/Effective Detection of Multimedia Protocol Tunneling using Machine Learning.mp4 17.4 MB
USENIX Security 2020/Videos/USENIX Security 20 - MVP Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures.mp4 17.4 MB
USENIX Security 2020/Videos/USENIX Security 20 - Frankenstein Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation....mp4 17.4 MB
USENIX Security 2018/Video/Who Left Open the Cookie Jar A Comprehensive Evaluation of Third-Party Cookie Policies.mp4 17.3 MB
USENIX Security 2020/Videos/USENIX Security 20 - Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade Attacks.mp4 17.3 MB
USENIX Security 2018/Video/Freezing the Web A Study of ReDoS Vulnerabilities in JavaScript-based Web Servers.mp4 17.3 MB
USENIX Security 2019/Video/USENIX Security '19 - Robust Website Fingerprinting Through the Cache Occupancy Channel.mp4 17.2 MB
USENIX Security 2020/Videos/USENIX Security 20 - PHMon A Programmable Hardware Monitor and Its Security Use Cases.mp4 17.2 MB
USENIX Security 2020/Videos/USENIX Security 20 - Agamotto Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine.mp4 17.2 MB
USENIX Security 2018/Video/Efail Breaking S MIME and OpenPGP Email Encryption using Exfiltration Channels.mp4 17.1 MB
USENIX Security 2020/Videos/USENIX Security 20 - GREYONE Data Flow Sensitive Fuzzing.mp4 17.1 MB
USENIX Security 2018/Video/Towards a Secure Zero-rating Framework with Three Parties.mp4 17.1 MB
USENIX Security 2018/Video/An Empirical Analysis of Anonymity in Zcash.mp4 17.1 MB
USENIX Security 2020/Videos/USENIX Security 20 - From Control Model to Program Investigating Robotic Aerial Vehicle Accidents.mp4 16.9 MB
USENIX Security 2020/Videos/USENIX Security 20 - Visor Privacy-Preserving Video Analytics as a Cloud Service.mp4 16.8 MB
USENIX Security 2020/Videos/USENIX Security 20 - Call Me Maybe Eavesdropping Encrypted LTE Calls With ReVoLTE.mp4 16.8 MB
USENIX Security 2019/Video/USENIX Security '19 - A Study of the Feasibility of Co-located App Attacks against BLE.mp4 16.8 MB
USENIX Security 2019/Video/USENIX Security '19 - Fuzzification Anti-Fuzzing Techniques.mp4 16.7 MB
USENIX Security 2020/Videos/USENIX Security 20 - HybCache Hybrid Side-Channel-Resilient Caches for Trusted Execution....mp4 16.6 MB
USENIX Security 2020/Videos/USENIX Security 20 - Temporal System Call Specialization for Attack Surface Reduction.mp4 16.6 MB
USENIX Security 2020/Videos/USENIX Security 20 - Hall Spoofing A Non-Invasive DoS Attack on Grid-Tied Solar Inverter.mp4 16.6 MB
USENIX Security 2020/Videos/USENIX Security 20 - A Longitudinal and Comprehensive Study of the DANE Ecosystem in Email.mp4 16.6 MB
USENIX Security 2018/Video/SAD THUG Structural Anomaly Detection for Transmissions of High-value Information Using Graphics.mp4 16.6 MB
USENIX Security 2018/Video/Guarder A Tunable Secure Allocator.mp4 16.5 MB
USENIX Security 2018/Video/End-Users Get Maneuvered Empirical Analysis of Redirection Hijacking in Content Delivery Networks.mp4 16.5 MB
USENIX Security 2018/Video/Tackling runtime-based obfuscation in Android with TIRO.mp4 16.4 MB
USENIX Security 2020/Videos/USENIX Security 20 - BesFS A POSIX Filesystem for Enclaves with a Mechanized Safety Proof.mp4 16.4 MB
USENIX Security 2020/Videos/USENIX Security 20 - Drift with Devil Security of Multi-Sensor Fusion based Localization....mp4 16.4 MB
USENIX Security 2020/Videos/USENIX Security 20 - iOS, Your OS, Everybodys OS Vetting and Analyzing Network Services of iOS.mp4 16.2 MB
USENIX Security 2020/Videos/USENIX Security 20 - A different cup of TI The added value of commercial threat intelligence.mp4 16.2 MB
USENIX Security 2020/Videos/USENIX Security 20 - Interpretable Deep Learning under Fire.mp4 16.2 MB
USENIX Security 2019/Video/USENIX Security '19 - Secure Multi-User Content Sharing for Augmented Reality Applications.mp4 16.0 MB
USENIX Security 2020/Videos/USENIX Security 20 - Automatic Hot Patch Generation for Android Kernels.mp4 16.0 MB
USENIX Security 2019/Video/USENIX Security '19 - Devils in the Guidance Predicting Logic Vulnerabilities in Payment.mp4 16.0 MB
USENIX Security 2019/Video/USENIX Security '19 - Evaluating Differentially Private Machine Learning in Practice.mp4 16.0 MB
USENIX Security 2020/Videos/USENIX Security 20 - I am uncomfortable sharing what I cant see Privacy Concerns.mp4 15.9 MB
USENIX Security 2020/Videos/USENIX Security 20 - MIRAGE Succinct Arguments for Randomized Algorithms with Applications.mp4 15.7 MB
USENIX Security 2020/Videos/USENIX Security 20 - Composition Kills A Case Study of Email Sender Authentication.mp4 15.7 MB
USENIX Security 2020/Videos/USENIX Security 20 - See No Evil Phishing for Permissions with False Transparency.mp4 15.6 MB
USENIX Security 2020/Videos/USENIX Security 20 - DeepHammer Depleting the Intelligence of Deep Neural Networks through Target.mp4 15.6 MB
USENIX Security 2011/Presentations/Toward Secure Embedded Web Interfaces Slides - Baptiste Gourdin, Chinmay Soman, Hristo Bojinov, Elie Bursztein.pdf 15.6 MB
USENIX Security 2020/Videos/USENIX Security 20 - EPIC Every Packet Is Checked in the Data Plane of a Path-Aware Internet.mp4 15.5 MB
USENIX Security 2020/Videos/USENIX Security 20 - SpecFuzz Bringing Spectre-type vulnerabilities to the surface.mp4 15.5 MB
USENIX Security 2020/Videos/USENIX Security 20 - Liveness is Not Enough Enhancing Fingerprint Authentication with Behavioral.mp4 15.3 MB
USENIX Security 2011/USENIX Security 2011 Proceedings.mobi 15.2 MB
USENIX Security 2020/Videos/USENIX Security 20 - Chaperone Real-time Locking and Loss Prevention for Smartphones.mp4 15.1 MB
USENIX Security 2018/Video/DIZK A Distributed Zero Knowledge Proof System.mp4 15.1 MB
USENIX Security 2020/Videos/USENIX Security 20 - The Tools and Tactics Used in Intimate Partner Surveillance An Analysis.mp4 15.1 MB
USENIX Security 2014/Presentations/Information Security War Room - Sergey Bratus, Dartmouth College, Felix FX Lindner.pdf 15.0 MB
USENIX Security 2020/Videos/USENIX Security 20 - A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web.mp4 15.0 MB
USENIX Security 2020/Videos/USENIX Security 20 - HALucinator Firmware Re-hosting Through Abstraction Layer Emulation.mp4 15.0 MB
USENIX Security 2020/Videos/USENIX Security 20 - McTiny Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers.mp4 15.0 MB
USENIX Security 2020/Videos/USENIX Security 20 - Shim Shimmeny Evaluating the Security & Privacy Contributions of Link Shimming.mp4 15.0 MB
USENIX Security 2020/Videos/USENIX Security 20 - Cardpliance PCI DSS Compliance of Android Applications.mp4 15.0 MB
USENIX Security 2018/Video/IMIX In-Process Memory Isolation EXtension.mp4 15.0 MB
USENIX Security 2010/USENIX Security 2010 Proceedings.mobi 14.9 MB
USENIX Security 2020/Videos/USENIX Security 20 - An Observational Investigation of Reverse Engineers’ Processes.mp4 14.9 MB
USENIX Security 2020/Videos/USENIX Security 20 - Shattered Chain of Trust Understanding Security Risks in Cross-Cloud IoT.mp4 14.8 MB
USENIX Security 2020/Videos/USENIX Security 20 - Secure Multi-party Computation of Differentially Private Median.mp4 14.8 MB
USENIX Security 2018/Video/FANCI Feature-based Automated NXDomain Classification and Intelligence.mp4 14.8 MB
USENIX Security 2020/Videos/USENIX Security 20 - SENG, the SGX-Enforcing Network Gateway Authorizing Communication....mp4 14.8 MB
USENIX Security 2010/USENIX Security 2010 Proceedings.epub 14.7 MB
USENIX Security 2020/Videos/USENIX Security 20 - Plug-N-Pwned Comprehensive Vulnerability Analysis of OBD-II Dongles....mp4 14.7 MB
USENIX Security 2020/Videos/USENIX Security 20 - TPM-FAIL TPM meets Timing and Lattice Attacks.mp4 14.6 MB
USENIX Security 2020/Videos/USENIX Security 20 - FANS Fuzzing Android Native System Services via Automated Interface Analysis.mp4 14.5 MB
USENIX Security 2020/Videos/USENIX Security 20 - PCKV Locally Differentially Private Correlated Key-Value Data Collection.mp4 14.5 MB
USENIX Security 2020/Videos/USENIX Security 20 - Whos Calling Characterizing Robocalls through Audio and Metadata Analysis.mp4 14.5 MB
USENIX Security 2012/Video/Lest We Remember Cold Boot Attacks on Encryption Keys - J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ariel J. Feldman.m4a 14.4 MB
USENIX Security 2020/Videos/USENIX Security 20 - Devil’s Whisper A General Approach for Physical Adversarial Attacks.mp4 14.2 MB
USENIX Security 2020/Videos/USENIX Security 20 - SANNS Scaling Up Secure Approximate k-Nearest Neighbors Search.mp4 14.2 MB
USENIX Security 2020/Videos/USENIX Security 20 - Security Analysis of Unified Payments Interface and Payment Apps in India.mp4 14.2 MB
USENIX Security 2018/Video/HeapHopper Bringing Bounded Model Checking to Heap Implementation Security.mp4 14.2 MB
USENIX Security 2018/Video/ACES Automatic Compartments for Embedded Systems.mp4 14.1 MB
USENIX Security 2018/Video/The aftermath of a crypto-ransomware attack at a large academic institution.mp4 14.1 MB
USENIX Security 2020/Videos/USENIX Security 20 - Void A fast and light voice liveness detection system.mp4 14.0 MB
USENIX Security 2020/Videos/USENIX Security 20 - Towards HTTPS Everywhere on Android We Are Not There Yet.mp4 14.0 MB
USENIX Security 2012/Presentations/Fuzzing with Code Fragments Slides - Christian Holler, Kim Herzig, Andreas Zeller.pdf 14.0 MB
USENIX Security 2020/Videos/USENIX Security 20 - RELOAD+REFRESH Abusing Cache Replacement Policies to Perform Stealthy Cache.mp4 13.9 MB
USENIX Security 2020/Videos/USENIX Security 20 - Big Numbers - Big Troubles Systematically Analyzing Nonce Leakage in (EC)DSA.mp4 13.8 MB
USENIX Security 2020/Videos/USENIX Security 20 - An Ever-evolving Game Evaluation of Real-world Attacks and Defenses.mp4 13.8 MB
USENIX Security 2020/Videos/USENIX Security 20 - KOOBE Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write.mp4 13.8 MB
USENIX Security 2020/Videos/USENIX Security 20 - Justinians GAAvernor Robust Distributed Learning with Gradient Aggregation.mp4 13.8 MB
USENIX Security 2020/Videos/USENIX Security 20 - EcoFuzz Adaptive Energy-Saving Greybox Fuzzing as a Variant.mp4 13.7 MB
USENIX Security 2020/Videos/USENIX Security 20 - Fawkes Protecting Privacy against Unauthorized Deep Learning Models.mp4 13.5 MB
USENIX Security 2020/Videos/USENIX Security 20 - Medusa Microarchitectural Data Leakage via Automated Attack Synthesis.mp4 13.5 MB
USENIX Security 2009/Presentations/Compromising Electromagnetic Emanations of Wired and Wireless Keyboards Slides - Martin Vuagnoux, Sylvain Pasini.pdf 13.5 MB
USENIX Security 2020/Videos/USENIX Security 20 - Cached and Confused Web Cache Deception in the Wild.mp4 13.5 MB
USENIX Security 2020/Videos/USENIX Security 20 - CopyCat Controlled Instruction-Level Attacks on Enclaves.mp4 13.5 MB
USENIX Security 2020/Videos/USENIX Security 20 - Updates-Leak Data Set Inference and Reconstruction Attacks in Online Learning.mp4 13.5 MB
USENIX Security 2020/Videos/USENIX Security 20 - Fuzzing Error Handling Code using Context-Sensitive Software Fault Injection.mp4 13.4 MB
USENIX Security 2009/Presentations/USENIX Security 2009 - Interior.pdf 13.4 MB
USENIX Security 2020/Videos/USENIX Security 20 - Pixel Multi-signatures for Consensus.mp4 13.4 MB
USENIX Security 2020/Videos/USENIX Security 20 - Walking Onions Scaling Anonymity Networks while Protecting Users.mp4 13.4 MB
USENIX Security 2020/Videos/USENIX Security 20 - DELF Safeguarding deletion correctness in Online Social Networks.mp4 13.4 MB
USENIX Security 2020/Videos/USENIX Security 20 - A Spectral Analysis of Noise A Comprehensive, Automated, Formal Analysis.mp4 13.4 MB
USENIX Security 2018/Video/Schrödinger's RAT Profiling the Stakeholders in the Remote Access Trojan Ecosystem.mp4 13.4 MB
USENIX Security 2020/Videos/USENIX Security 20 - ShadowMove A Stealthy Lateral Movement Strategy.mp4 13.3 MB
USENIX Security 2020/Videos/USENIX Security 20 - Estonian Electronic Identity Card Security Flaws in Key Management.mp4 13.2 MB
USENIX Security 2020/Videos/USENIX Security 20 - Stealthy Tracking of Autonomous Vehicles with Cache Side Channels.mp4 13.2 MB
USENIX Security 2020/Videos/USENIX Security 20 - Sunrise to Sunset Analyzing the End-to-end Life Cycle and Effectiveness....mp4 13.2 MB
USENIX Security 2018/Video/WPSE Fortifying Web Protocols via Browser-Side Security Monitoring.mp4 13.1 MB
USENIX Security 2020/Videos/USENIX Security 20 - Timeless Timing Attacks Exploiting Concurrency to Leak Secrets over Remote.mp4 13.1 MB
USENIX Security 2017/Video/USENIX Security '17 - From Problems to Patterns to Practice....mp4 13.1 MB
USENIX Security 2020/Videos/USENIX Security 20 - Sys A Static Symbolic Tool for Finding Good Bugs in Good (Browser) Code.mp4 13.0 MB
USENIX Security 2020/Videos/USENIX Security 20 - DatashareNetwork A Decentralized Privacy-Preserving Search Engine.mp4 13.0 MB
USENIX Security 2014/Presentations/Privacy in Pharmacogenetics An End-to-End Case Study of Personalized Warfarin Dosing Slides - Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon Lin, David Page, Tho.pdf 13.0 MB
USENIX Security 2020/Videos/USENIX Security 20 - PARTEMU Enabling Dynamic Analysis of Real-World TrustZone Software....mp4 12.9 MB
USENIX Security 2020/Videos/USENIX Security 20 - FuzzGuard Filtering out Unreachable Inputs in Directed Grey-box Fuzzing.mp4 12.9 MB
USENIX Security 2020/Videos/USENIX Security 20 - A Formal Analysis of IEEE 802.11s WPA2 Countering the Kracks Caused by....mp4 12.8 MB
USENIX Security 2020/Videos/USENIX Security 20 - That Was Then, This Is Now A Security Evaluation of Password Generation.mp4 12.7 MB
USENIX Security 2020/Videos/USENIX Security 20 - Boxer Preventing fraud by scanning credit cards.mp4 12.7 MB
USENIX Security 2020/Videos/USENIX Security 20 - DECAF Automatic, Adaptive De-bloating and Hardening of COTS Firmware.mp4 12.6 MB
USENIX Security 2020/Videos/USENIX Security 20 - Automating the Development of Chosen Ciphertext Attacks.mp4 12.5 MB
USENIX Security 2020/Videos/USENIX Security 20 - TeeRex Discovery and Exploitation of Memory Corruption Vulnerabilities....mp4 12.5 MB
USENIX Security 2020/Videos/USENIX Security 20 - Certified Side Channels.mp4 12.4 MB
USENIX Security 2020/Videos/USENIX Security 20 - Retrofitting Fine Grain Isolation in the Firefox Renderer.mp4 12.4 MB
USENIX Security 2012/Presentations/Gone in 360 Seconds Hijacking with Hitag2 Slides - Roel Verdult, Flavio D. Garcia, Josep Balasch, KU Leuven.pdf 12.3 MB
USENIX Security 2020/Videos/USENIX Security 20 - Cache Telepathy Leveraging Shared Resource Attacks to Learn DNN Architectures.mp4 12.3 MB
USENIX Security 2020/Videos/USENIX Security 20 - Adversarial Preprocessing Understanding and Preventing Image-Scaling Attacks.mp4 12.2 MB
USENIX Security 2020/Videos/USENIX Security 20 - Datalog Disassembly.mp4 12.2 MB
USENIX Security 2020/Videos/USENIX Security 20 - An Off-Chip Attack on Hardware Enclaves via the Memory Bus.mp4 12.1 MB
USENIX Security 2020/Videos/USENIX Security 20 - Detecting Stuffing of a User’s Credentials at Her Own Accounts.mp4 12.0 MB
USENIX Security 2020/Videos/USENIX Security 20 - Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines.mp4 12.0 MB
USENIX Security 2012/Presentations/Throttling Tor Bandwidth Parasites Slides - Rob Jansen, Paul Syverson, Nicholas Hopper.pdf 12.0 MB
USENIX Security 2020/Videos/USENIX Security 20 - Symbolic execution with SymCC Dont interpret, compile.mp4 12.0 MB
USENIX Security 2020/Videos/USENIX Security 20 - Differentially-Private Control-Flow Node Coverage for Software Usage Analysis.mp4 12.0 MB
USENIX Security 2020/Videos/USENIX Security 20 - SkillExplorer Understanding the Behavior of Skills in Large Scale.mp4 12.0 MB
USENIX Security 2009/Presentations/Compression, Correction, Confidentiality, and Comprehension A Modern Look at Commercial Telegraph Codes - Steven M. Bellovin.pdf 11.9 MB
USENIX Security 2020/Videos/USENIX Security 20 - SEAL Attack Mitigation for Encrypted Databases via Adjustable Leakage.mp4 11.9 MB
USENIX Security 2020/Videos/USENIX Security 20 - Automatic Techniques to Systematically Discover New Heap Exploitation.mp4 11.9 MB
USENIX Security 2020/Videos/USENIX Security 20 - Programmable In-Network Security for Context-aware BYOD Policies.mp4 11.8 MB
USENIX Security 2020/Videos/USENIX Security 20 - USBFuzz A Framework for Fuzzing USB Drivers by Device Emulation.mp4 11.8 MB
USENIX Security 2020/Videos/USENIX Security 20 - On Training Robust PDF Malware Classifiers.mp4 11.8 MB
USENIX Security 2009/Presentations/USENIX Security 2009 Track - Proceedings.tgz 11.8 MB
USENIX Security 2020/Videos/USENIX Security 20 - Achieving Keyless CDNs with Conclaves.mp4 11.7 MB
USENIX Security 2020/Videos/USENIX Security 20 - Horizontal Privilege Escalation in Trusted Applications.mp4 11.7 MB
USENIX Security 2020/Videos/USENIX Security 20 - PKU Pitfalls Attacks on PKU-based Memory Isolation Systems.mp4 11.7 MB
USENIX Security 2020/Videos/USENIX Security 20 - Understanding security mistakes developers make Qualitative analysis....mp4 11.7 MB
USENIX Security 2013/Presentations/Dismantling Megamos Crypto Wirelessly Lockpicking a Vehicle Immobilizer Slides - Roel Verdult, Flavio D. Garcia, Baris Ege.pdf 11.6 MB
USENIX Security 2020/Videos/USENIX Security 20 - Everything Old is New Again Binary Security of WebAssembly.mp4 11.6 MB
USENIX Security 2020/Videos/USENIX Security 20 - ParmeSan Sanitizer-guided Greybox Fuzzing.mp4 11.6 MB
USENIX Security 2020/Videos/USENIX Security 20 - Analysis of DTLS Implementations Using Protocol State Fuzzing.mp4 11.5 MB
USENIX Security 2020/Videos/USENIX Security 20 - Donky Domain Keys - Efficient In-Process Isolation for RISC-V and x86.mp4 11.5 MB
USENIX Security 2020/Videos/USENIX Security 20 - Secure parallel computation on national scale volumes of data.mp4 11.5 MB
USENIX Security 2020/Videos/USENIX Security 20 - Civet An Efficient Java Partitioning Framework for Hardware Enclaves.mp4 11.5 MB
USENIX Security 2018/Video/Simple Password-Hardened Encryption Services.mp4 11.4 MB
USENIX Security 2020/Videos/USENIX Security 20 - P2IM Scalable and Hardware-independent Firmware Testing via Automatic.mp4 11.3 MB
USENIX Security 2020/Videos/USENIX Security 20 - The Ballot is Busted Before the Blockchain A Security Analysis of Voatz.mp4 11.3 MB
USENIX Security 2020/Videos/USENIX Security 20 - Remote Side-Channel Attacks on Anonymous Transactions.mp4 11.2 MB
USENIX Security 2020/Videos/USENIX Security 20 - Pancake Frequency Smoothing for Encrypted Data Stores.mp4 11.2 MB
USENIX Security 2020/Videos/USENIX Security 20 - PhishTime Continuous Longitudinal Measurement of the Effectiveness....mp4 11.1 MB
USENIX Security 2020/Videos/USENIX Security 20 - From Needs to Actions to Secure Apps The Effect of Requirements....mp4 11.1 MB
USENIX Security 2020/Videos/USENIX Security 20 - SmartVerif Push the Limit of Automation Capability of Verifying Security....mp4 11.1 MB
USENIX Security 2020/Videos/USENIX Security 20 - What Twitter Knows Characterizing Ad Targeting Practices, User Perceptions....mp4 11.1 MB
USENIX Security 2020/Videos/USENIX Security 20 - NetWarden Mitigating Network Covert Channels while Preserving Performance.mp4 11.0 MB
USENIX Security 2020/Videos/USENIX Security 20 - Human Distinguishable Visual Key Fingerprints.mp4 11.0 MB
USENIX Security 2020/Videos/USENIX Security 20 - Local Model Poisoning Attacks to Byzantine-Robust Federated Learning.mp4 10.9 MB
USENIX Security 2014/USENIX Security 2014 Opening Remarks - sec14_slides_fu.pdf 10.8 MB
USENIX Security 2020/Videos/USENIX Security 20 - Droplet Decentralized Authorization and Access Control for Encrypted Data.mp4 10.8 MB
USENIX Security 2020/Videos/USENIX Security 20 - FIRMSCOPE Automatic Uncovering of Privilege-Escalation Vulnerabilities.mp4 10.7 MB
USENIX Security 2020/Videos/USENIX Security 20 - Delphi A Cryptographic Inference Service for Neural Networks.mp4 10.7 MB
USENIX Security 2020/Videos/USENIX Security 20 - Scaling Verifiable Computation Using Efficient Set Accumulators.mp4 10.7 MB
USENIX Security 2020/Videos/USENIX Security 20 - (Mostly) Exitless VM Protection from Untrusted Hypervisor through Disaggregate.mp4 10.6 MB
USENIX Security 2020/Videos/USENIX Security 20 - TXSPECTOR Uncovering Attacks in Ethereum from Transactions.mp4 10.5 MB
USENIX Security 2020/Videos/USENIX Security 20 - Hybrid Batch Attacks Finding Black-box Adversarial Examples with Limited.mp4 10.5 MB
USENIX Security 2014/Presentations/On the Effective Prevention of TLS Man-in-the-Middle Attacks in Web Applications Slides - Nikolaos Karapanos and Srdjan Capkun.pdf 10.5 MB
USENIX Security 2020/Videos/USENIX Security 20 - ETHBMC A Bounded Model Checker for Smart Contracts.mp4 10.4 MB
USENIX Security 2020/Videos/USENIX Security 20 - BScout Direct Whole Patch Presence Test for Java Executables.mp4 10.4 MB
USENIX Security 2020/Videos/USENIX Security 20 - I have too much respect for my elders Understanding South African Mobile.mp4 10.4 MB
USENIX Security 2012/Presentations/Babel Leveraging Email Delivery for Spam Mitigation Slides - Gianluca Stringhini, Manuel Egele, Apostolis Zarras, Thorsten Holz, Christopher Kruegel, Giovanni Vigna.pdf 10.3 MB
USENIX Security 2020/Videos/USENIX Security 20 - A Tale of Two Headers A Formal Analysis of Inconsistent Click-Jacking....mp4 10.3 MB
USENIX Security 2020/Videos/USENIX Security 20 - Preech A System for Privacy-Preserving Speech Transcription.mp4 10.2 MB
USENIX Security 2020/Videos/USENIX Security 20 - Silhouette Efficient Protected Shadow Stacks for Embedded Systems.mp4 10.0 MB
USENIX Security 2014/Presentations/On the Feasibility of Large-Scale Infections of iOS Devices Slides - Tielei Wang, Yeongjin Jang, Yizheng Chen, Simon Chung, Billy Lau, Wenke Lee tielei.pdf 10.0 MB
USENIX Security 2020/Videos/USENIX Security 20 - Montage A Neural Network Language Model-Guided JavaScript Engine Fuzzer.mp4 10.0 MB
USENIX Security 2011/Presentations/Forensic Triage for Mobile Phones with DEC0DE Slides - Robert J. Walls, Erik Learned-Miller, and Brian Neil Levine.pdf 9.8 MB
USENIX Security 2011/Presentations/The Phantom Tollbooth Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion Slides - Sarah Meiklejohn, Keaton Mowery, Stephen Checkoway.pdf 9.8 MB
USENIX Security 2020/Videos/USENIX Security 20 - V0LTpwn Attacking x86 Processor Integrity from Software.mp4 9.7 MB
USENIX Security 2011/Presentations/Why (Special Agent) Johnny (Still) Can't Encrypt A Security Analysis of the APCO Project 25 Two-Way Radio System - Sandy Clark, Travis Goodspeed, Perry Metzger, Zac.pdf 9.6 MB
USENIX Security 2020/Videos/USENIX Security 20 - BlockSci Design and applications of a blockchain analysis platform.mp4 9.4 MB
USENIX Security 2020/Videos/USENIX Security 20 - Poison Over Troubled Forwarders A Cache Poisoning Attack Targeting DNS....mp4 9.4 MB
USENIX Security 2020/Videos/USENIX Security 20 - High Accuracy and High Fidelity Extraction of Neural Networks.mp4 9.3 MB
USENIX Security 2012/Video/Welcome - Tadayoshi Kohno.mp4 9.2 MB
USENIX Security 2020/Videos/USENIX Security 20 - AURORA Statistical Crash Analysis for Automated Root Cause Explanation.mp4 9.2 MB
USENIX Security 2014/Presentations/Effective Attacks and Provable Defenses for Website Fingerprinting Slides - Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, Ian Goldberg.pdf 9.1 MB
USENIX Security 2020/Videos/USENIX Security 20 - Exploring Connections Between Active Learning and Model Extraction.mp4 9.1 MB
USENIX Security 2020/Videos/USENIX Security 20 - Stolen Memories Leveraging Model Memorization for Calibrated White-Box.mp4 9.1 MB
USENIX Security 2020/Videos/USENIX Security 20 - Empirical Measurement of Systemic 2FA Usability.mp4 8.6 MB
USENIX Security 2014/Presentations/From the Aether to the Ethernet-Attacking the Internet using Broadcast Digital Television Slides - Yossef Oren, Angelos D. Keromytis.pdf 8.6 MB
USENIX Security 2020/Videos/USENIX Security 20 - Zero-delay Lightweight Defenses against Website Fingerprinting.mp4 8.4 MB
USENIX Security 2014/Presentations/Security Analysis of a Full-Body Scanner Slides - Keaton Mowery, Eric Wustrow, Tom Wypych, Corey Singleton, Chris Comfort, Eric Rescorla, Stephen Checkoway, J. Alex.pdf 8.2 MB
USENIX Security 2012/Presentations/Data Node Encrypted File System Efficient Secure Deletion for Flash Memory Slides - Joel Reardon, Srdjan Capkun, David Basin.pdf 7.8 MB
USENIX Security 2010/Presentations/How Cyber Attacks Will Be Used in International Conflicts - Scott Borg.pdf 7.1 MB
USENIX Security 2013/Presentations/Let Me Answer That for You Exploiting Broadcast Information in Cellular Networks Slides - Nico Golde, Kévin Redon, and Jean-Pierre Seifert.pdf 6.7 MB
USENIX Security 2009/Presentations/Static Enforcement of Web Application Integrity Through Strong Typing Slides - William Robertson, Giovanni Vigna.pdf 6.7 MB
USENIX Security 2014/Presentations/BareCloud Bare-metal Analysis-based Evasive Malware Detection Slides - Dhilung Kirat, Giovanni Vigna, Christopher Kruegel.pdf 6.4 MB
USENIX Security 2013/Presentations/You Are How You Click Clickstream Analysis for Sybil Detection Slides - Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng, Ben Y. Zhao.pdf 6.2 MB
USENIX Security 2014/Presentations/Oxymoron Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing Slides - Michael Backes, Stefan Nurnberger.pdf 6.1 MB
USENIX Security 2012/Presentations/Aurasium Practical Policy Enforcement for Android Applications Slides - Rubin Xu, Hassen Saidi, Ross Anderson.pdf 6.0 MB
USENIX Security 2013/Presentations/Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies Slides - Sven Bugiel, Stephan Heuser, Ahmad-Reza Sadeghi.pdf 5.9 MB
USENIX Security 2013/Presentations/Greystar Fast and Accurate Detection of SMS Spam Numbers in Large Cellular Networks Using Gray Phone Space - Nan Jiang, Yu Jin, Ann Skudlark, Zhi-Li Zhang.pdf 5.9 MB
USENIX Security 2009/Presentations/How the Pursuit of Truth Led Me to Selling Viagra - Vern Paxson.pdf 5.9 MB
USENIX Security 2014/Presentations/Gyrophone Recognizing Speech from Gyroscope Signals Slides - Yan Michalevsky, Dan Boneh, Gabi Nakibly.pdf 5.7 MB
USENIX Security 2014/Presentations/The Emperor’s New Password Manager Security Analysis of Web-based Password Managers Slides - Zhiwei Li, Warren He, Devdatta Akhawe, Dawn Song.pdf 5.7 MB
USENIX Security 2014/Presentations/A Bayesian Approach to Privacy Enforcement in Smartphones Slides - Omer Tripp, Julia Rubin.pdf 5.6 MB
USENIX Security 2014/Presentations/When Governments Hack Opponents A Look at Actors and Technology - William R. Marczak, John Scott-Railton, Morgan Marquis-Boire, Vern Paxson.pdf 5.5 MB
USENIX Security 2013/Presentations/Securing Embedded User Interfaces Android and Beyond Slides - Franziska Roesner, Tadayoshi Kohnos.pdf 5.3 MB
USENIX Security 2011/Presentations/Telex Anticensorship in the Network Infrastructure Slides - Eric Wustrow, Scott Wolchok, Ian Goldberg, J. Alex Halderman.pdf 5.2 MB
USENIX Security 2008/Presentations/Political DDoS Estonia and Beyond Slides - Jose Nazario.pdf 5.1 MB
USENIX Security 2011/Presentations/Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade Slides - Nektarios Leontiadis, Tyler Moore, Nicolas Christin.pdf 5.1 MB
USENIX Security 2012/Presentations/STING Finding Name Resolution Vulnerabilities in Programs Slides - Hayawardh Vijayakumar, Joshua Schiffman, Trent Jaeger.pdf 5.1 MB
USENIX Security 2009/Presentations/Designing Trustworthy User Agents for a Hostile Web Slides - Eric Lawrence.pdf 5.0 MB
USENIX Security 2013/Presentations/Practical Comprehensive Bounds on Surreptitious Communication over DNS - Rao, Reiner Sailer, Douglas Lee Schales, Marc Ph. Stoecklin, Kurt Thomas, Wietse Venema.pdf 5.0 MB
USENIX Security 2014/Presentations/Man vs. Machine Practical Adversarial Detection of Malicious Crowdsourcing Workers Slides - Gang Wang, Tianyi Wang, Santa Barbara, Haitao Zheng, Ben Y. Zhao.pdf 4.9 MB
USENIX Security 2011/Presentations/deSEO Combating Search-Result Poisoning Slides - John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy, Martin Abadi.pdf 4.8 MB
USENIX Security 2014/Presentations/Automatically Detecting Vulnerable Websites Before They Turn Malicious Slides - Kyle Soska, Nicolas Christin.pdf 4.7 MB
USENIX Security 2014/Presentations/Never Been KIST Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport Slides - Rob Jansen, John Geddes, Chris Wacek, Micah Sherr, Paul Syverson.pdf 4.6 MB
USENIX Security 2013/Presentations/On the Security of Picture Gesture Authentication - Ziming Zhao, Gail-Joon Ahn, Jeong-Jin Seo, Hongxin Hu.pdf 4.6 MB
USENIX Security 2011/Presentations/ADsafety Type-Based Verification of JavaScript Sandboxing Slides - Joe Gibbs Politz, Spiridon Aristides Eliopoulos, Arjun Guha, Shriram Krishnamurthi.pdf 4.5 MB
USENIX Security 2011/Presentations/Crossing the Chasm Pitching Security Research to Mainstream Browser Vendors - Collin Jackson.pdf 4.5 MB
USENIX Security 2014/Presentations/SpanDex Secure Password Tracking for Android Slides - Landon P. Cox , Peter Gilbert, Geoffrey Lawler, Valentin Pistol, Ali Razeen, Bi Wu, Sai Cheemalapati.pdf 4.4 MB
USENIX Security 2014/Presentations/An Internet-Wide View of Internet-Wide Scanning Slides - Zakir Durumeric, Michael Bailey, J. Alex Halderman.pdf 4.4 MB
USENIX Security 2014/Presentations/LibFTE A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes Slides - Daniel Luchaup, Kevin P. Dyer, Somesh Jha, Thomas Ristenpart, Thomas Shrimpt.pdf 4.3 MB
USENIX Security 2011/Presentations/Outsourcing the Decryption of ABE Ciphertexts Slides - Matthew Green, Susan Hohenberger, Brent Waters.pdf 4.3 MB
USENIX Security 2013/Presentations/Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation - Frank Imeson, Ariq Emtenan, Siddharth Garg, and Mah.pdf 4.1 MB
USENIX Security 2014/Presentations/Security Analysis of a Full-Body Scanner - Keaton Mowery, Eric Wustrow, Tom Wypych, Corey Singleton, Chris Comfort, Eric Rescorla, Stephen Checkoway, J. Alex Halder.pdf 4.1 MB
USENIX Security 2012/Presentations/Security and Usability Challenges of Moving-Object CAPTCHAs Decoding Codewords in Motion Slides - Y. Xu, G. Reynaga, S. Chiasson, J.-M. Frahm, F. Monrose, P. van Oorschot.pdf 4.1 MB
USENIX Security 2012/Presentations/New Attacks on Timing-based Network Flow Watermarks Slides - Zi Lin, Nicholas Hopper.pdf 4.0 MB
USENIX Security 2011/Presentations/Show Me the Money Characterizing Spam-advertised Revenue Slides - Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorso, Christian Kreibich, Kirill Levchenko.pdf 4.0 MB
USENIX Security 2014/Presentations/Scheduler-based Defenses against Cross-VM Side-channels Slides - Venkatanathan Varadarajan, Thomas Ristenpart, Michael Swift.pdf 3.9 MB
USENIX Security 2009/Presentations/The Building Security in Maturity Model (BSIMM) - Gary McGraw, Brian Chess.pdf 3.9 MB
USENIX Security 2009/Presentations/The Building Security in Maturity Model (BSIMM) Slides - Gary McGraw, Brian Chess.pdf 3.9 MB
USENIX Security 2014/Presentations/Targeted Threat Index Characterizing and Quantifying Politically-Motivated Targeted Malware - Seth Hardy, Masashi Crete-Nishihata, Katharine Kleemola, Adam Senft, B.pdf 3.9 MB
USENIX Security 2013/Presentations/Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers - Suman Jana, David Molnar, Alexander Moshchuk, Alan Dunn, Benjamin Livshits, .pdf 3.8 MB
USENIX Security 2014/Presentations/Burst ORAM Minimizing ORAM Response Times for Bursty Access Patterns - Jonathan Dautrich, University of California, Riverside; Emil Stefanov, Elaine Shi.pdf 3.8 MB
USENIX Security 2010/Presentations/Grid, PhD Smart Grid, Cyber Security, and the Future of Keeping the Lights On - Kelly Ziegler.pdf 3.8 MB
USENIX Security 2009/Presentations/Vanish Increasing Data Privacy with Self-Destructing Data Slides - Roxana Geambasu, Tadayoshi Kohno, Amit A. Levy, Henry M. Levy.pdf 3.7 MB
USENIX Security 2014/Presentations/Peeking into Your App without Actually Seeing It UI State Inference and Novel Android Attacks Slides - Qi Alfred Chen, Zhiyun Qian, Z. Morley Mao.pdf 3.7 MB
USENIX Security 2012/Presentations/Clickjacking Attacks and Defenses Slides Slides - Lin-Shung Huang, Alex Moshchuk, Helen J. Wang, Stuart Schechter, Collin Jackson.pdf 3.7 MB
USENIX Security 2011/Presentations/SMS of Death From Analyzing to Attacking Mobile Phones on a Large Scale Slides - Collin Mulliner, Nico Golde, Jean-Pierre Seifert.pdf 3.6 MB
USENIX Security 2013/Presentations/The Velocity of Censorship High-Fidelity Detection of Microblog Post Deletions Slides - Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall.pdf 3.6 MB
USENIX Security 2012/Presentations/Social Networking with Frientegrity Privacy and Integrity with an Untrusted Provider Slides - Ariel J. Feldman, Aaron Blankstein, Michael J. Freedman, Edward W. Felten.pdf 3.6 MB
USENIX Security 2014/Presentations/Gyrophone Recognizing Speech from Gyroscope Signals - Yan Michalevsky, Dan Boneh, Gabi Nakibly.pdf 3.5 MB
USENIX Security 2013/Presentations/Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation Slides - Frank Imeson, Ariq Emtenan, Siddharth Garg.pdf 3.4 MB
USENIX Security 2013/Presentations/Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers Slides - Suman Jana, David Molnar, Alexander Moshchuk, Alan Dunn, Benjamin Liv.pdf 3.3 MB
USENIX Security 2012/Presentations/Privacy-Preserving Social Plugins Slides - Georgios Kontaxis, Michalis Polychronakis, Angelos D. Keromytis, Evangelos P. Markatos.pdf 3.3 MB
USENIX Security 2013/Presentations/On the Security of RC4 in TLS Slides - Nadhem AlFardan, Royal Holloway, Daniel J. Bernstein, Kenneth G. Paterson, Bertram Poettering, Jacob C.N. Schuldt.pdf 3.3 MB
USENIX Security 2009/Presentations/USENIX Security 2009 Track - Attacks.pdf 3.3 MB
USENIX Security 2010/Presentations/Staying Safe on the Web Yesterday, Today, and Tomorrow - Sid Stamm.pdf 3.1 MB
USENIX Security 2014/Presentations/SDDR Light-Weight, Secure Mobile Encounters Slides - Matthew Lentz, Viktor Erdélyi, Paarijaat Aditya, Elaine Shi, Peter Druschel, Bobby Bhattacharjee.pdf 3.1 MB
USENIX Security 2014/Presentations/A Large-Scale Analysis of the Security of Embedded Firmwares Slides - Andrei Costin, Jonas Zaddach, Aurelien Francillon, and Davide Balzarotti.pdf 3.1 MB
USENIX Security 2014/Presentations/On the Feasibility of Large-Scale Infections of iOS Devices Slides - Tielei Wang, Yeongjin Jang, Yizheng Chen, Simon Chung, Billy Lau, Wenke Lee costin.pdf 3.1 MB
USENIX Security 2013/Presentations/Let Me Answer That for You Exploiting Broadcast Information in Cellular Networks - Nico Golde, Kévin Redon, and Jean-Pierre Seifert.pdf 3.1 MB
USENIX Security 2014/Presentations/Towards Detecting Anomalous User Behavior in Online Social Networks Slides - Bimal Viswanath, M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna P. Gummadi, Max P.pdf 3.0 MB
USENIX Security 2009/Presentations/Top Ten Web Hacking Techniques of 2008 What's possible, not probable - Jeremiah Grossman.pdf 3.0 MB
USENIX Security 2013/Presentations/Trafficking Fraudulent Accounts The Role of the Underground Market in Twitter Spam and Abuse Slides - Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, Vern Paxson.pdf 2.9 MB
USENIX Security 2011/Presentations/Faster Secure Two-Party Computation Using Garbled Circuits Slides - Yan Huang, David Evans, Jonathan Katz.pdf 2.9 MB
USENIX Security 2011/Presentations/The Cloud-y Future of Security Technologies - Adam O'Donnell.pdf 2.9 MB
USENIX Security 2014/Presentations/Brahmastra Driving Apps to Test the Security of Third-Party Components Slides - Ravi Bhoraskar, Seungyeop Han, Jinseong Jeon, Tanzirul Azim, Shuo Chen, Jaeyeon Jung.pdf 2.9 MB
USENIX Security 2012/Presentations/Efficient and Scalable Socware Detection in Online Social Networks Slides - Md Sazzadur Rahman, Ting-Kai Huang, Harsha V. Madhyastha, Michalis Faloutsos.pdf 2.9 MB
USENIX Security 2014/Presentations/Telepathwords Preventing Weak Passwords by Reading Users’ Minds Slides - Saranga Komanduri, Richard Shay, Lorrie Faith Cranor, Cormac Herley Stuart Schechter.pdf 2.9 MB
USENIX Security 2013/Presentations/Take This Personally Pollution Attacks on Personalized Services - Xinyu Xing, Wei Meng, Dan Doozan, Alex C. Snoeren, Nick Feamster, Wenke Lee.pdf 2.9 MB
USENIX Security 2012/Presentations/Enemy of the State A State-Aware Black-Box Web Vulnerability Scanner Slides - Adam Doupe, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna.pdf 2.8 MB
USENIX Security 2014/Presentations/JIGSAW Protecting Resource Access by Inferring Programmer Expectations Slides - Hayawardh Vijayakumar, Xinyang Ge, Mathias Payer, Trent Jaeger.pdf 2.8 MB
USENIX Security 2014/Presentations/ret2dir Rethinking Kernel Isolation Slides - Vasileios P. Kemerlis, Michalis Polychronakis, Angelos D. Keromytis.pdf 2.8 MB
USENIX Security 2011/Presentations/Q Exploit Hardening Made Easy Slides - Edward J. Schwartz, Thanassis Avgerinos, David Brumley.pdf 2.7 MB
USENIX Security 2013/Presentations/Jekyll on iOS When Benign Apps Become Evil - Tielei Wang, Kangjie Lu, Long Lu, Simon Chung, Wenke Lee.pdf 2.7 MB
USENIX Security 2013/Presentations/Securing Embedded User Interfaces Android and Beyond - Franziska Roesner, Tadayoshi Kohno.pdf 2.7 MB
USENIX Security 2012/Presentations/How Does Your Password Measure Up - The Effect of Strength Meters on Password Creation Slides - Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michell.pdf 2.7 MB
USENIX Security 2011/Presentations/The (Decentralized) SSL Observatory - Peter Eckersley, Jesse Burns.pdf 2.7 MB
USENIX Security 2014/Presentations/DSCRETE Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse Slides - Brendan Saltaformaggio, Zhongshu Gu, Xiangyu Zhang, Dong.pdf 2.6 MB
USENIX Security 2009/Presentations/USENIX Security 2009 Track - Securing Web Apps.pdf 2.6 MB
USENIX Security 2013/Presentations/Transparent ROP Exploit Mitigation Using Indirect Branch Tracing - Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis.pdf 2.6 MB
USENIX Security 2013/Presentations/Impression Fraud in On-line Advertising via Pay-Per-View Networks - Kevin Springborn, Paul Barford.pdf 2.5 MB
USENIX Security 2013/Presentations/Automatic Mediation of Privacy-Sensitive Resource Access in Smartphone Applications - Benjamin Livshits, Jaeyeon Jung.pdf 2.5 MB
USENIX Security 2013/Presentations/Language-based Defenses Against Untrusted Browser Origins - Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Sergio Maffeisn.pdf 2.5 MB
USENIX Security 2014/Presentations/TRUESET Faster Verifiable Set Computations - Ahmed E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Mahmoud F. Sayed, Elaine Shi, Nikos Triandopoulos.pdf 2.5 MB
USENIX Security 2013/Presentations/Secure Outsourced Garbled Circuit Evaluation for Mobile Devices - Henry Carter, Benjamin Mood, Patrick Traynor, Kevin Butler.pdf 2.5 MB
USENIX Security 2011/Presentations/Telex Anticensorship in the Network Infrastructure - Eric Wustrow, Scott Wolchok, Ian Goldberg, J. Alex Halderman.pdf 2.5 MB
USENIX Security 2013/Presentations/Dowsing for Overflows A Guided Fuzzer to Find Buffer Boundary Violations - Istvan Haller, Asia Slowinska, Matthias Neugschwandtner, Herbert Bos.pdf 2.5 MB
USENIX Security 2011/Presentations/Dirty Jobs The Role of Freelance Labor in Web Service Abuse Slides - motoyama.pdf 2.4 MB
USENIX Security 2013/Presentations/Explicating SDKs Uncovering Assumptions Underlying Secure Authentication and Authorization - Rui Wang, Yuchen Zhou, Shuo Chen, Shaz Qadeer, David Evans, Yuri Gurevi.pdf 2.4 MB
USENIX Security 2011/Presentations/Measuring Pay-per-Install The Commoditization of Malware Distribution Slides - Juan Caballero, Chris Grier, Christian Kreibich, Vern Paxson.pdf 2.4 MB
USENIX Security 2012/Presentations/Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization Slides - Cristiano Giuffrida, Anton Kuijsten, Andrew S. Tanenbaum.pdf 2.4 MB
USENIX Security 2014/Presentations/Stitching the Gadgets On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection Slides - Lucas Davi, Ahmad-Reza Sadeghi, Daniel Lehmann, Fabian Mon.pdf 2.4 MB
USENIX Security 2011/Presentations/ZOZZLE Fast and Precise In-Browser JavaScript Malware Detection - Charlie Curtsinger, Benjamin Livshits, Benjamin Zorn, Christian Seifert.pdf 2.4 MB
USENIX Security 2013/Presentations/Alice in Warningland A Large-Scale Field Study of Browser Security Warning Effectiveness - Devdatta Akhawe, Adrienne Porter Felt.pdf 2.3 MB
USENIX Security 2012/Presentations/TARDIS Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without Clocks - Amir Rahmati, Mastooreh Salajegheh, Dan Holcomb, Jacob Sorber, Wayne P..pdf 2.3 MB
USENIX Security 2014/Presentations/SSOScan Automated Testing of Web Applications for Single Sign-On Vulnerabilities Slides - Yuchen Zhou, David Evans.pdf 2.3 MB
USENIX Security 2013/Presentations/You Are How You Click Clickstream Analysis for Sybil Detection - Gang Wang, Tristan Konolige, Christo Wilson, Xiao Wang, Haitao Zheng, Ben Y. Zhao.pdf 2.3 MB
USENIX Security 2013/Presentations/KI-Mon A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel Object - Hojoon Lee, HyunGon Moon, DaeHee Jang, Kihwan Kim, Jihoon Lee, Yunheung P.pdf 2.3 MB
USENIX Security 2013/Presentations/Revolver An Automated Approach to the Detection of Evasive Web-based Malware - Alexandros Kapravelos, Yan Shoshitaishvili, Marco Cova, Christopher Kruegel, Giovanni.pdf 2.3 MB
USENIX Security 2013/Presentations/ExecScent Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates - Terry Nelms, Roberto Perdisci, Mustaque Ahamad.pdf 2.3 MB
USENIX Security 2014/Presentations/Password Managers Attacks and Defenses Slides - David Silver, Suman Jana, and Dan Boneh, Stanford University; Eric Chen, Collin Jackson.pdf 2.3 MB
USENIX Security 2013/Presentations/Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies - Sven Bugiel, Stephan Heuser, Ahmad-Reza Sadeghi.pdf 2.3 MB
USENIX Security 2013/Presentations/Measuring the Practical Impact of DNSSEC Deployment - Wilson Lian, Eric Rescorla, Hovav Shacham, Stefan Savage.pdf 2.3 MB
USENIX Security 2014/Presentations/Towards Reliable Storage of 56-bit Secrets in Human Memory Slides - Joseph Bonneau, Princeton University; Stuart Schechter.pdf 2.3 MB
USENIX Security 2012/Presentations/kGuard Lightweight Kernel Protection against Return-to-User Attacks Slides - Vasileios P. Kemerlis, Georgios Portokalidis, and Angelos D. Keromytis.pdf 2.3 MB
USENIX Security 2013/Presentations/Proactively Accountable Anonymous Messaging in Verdict - Henry Corrigan-Gibbs, David Isaac Wolinsky, Bryan Ford.pdf 2.3 MB
USENIX Security 2013/Presentations/Explicating SDKs Uncovering Assumptions Underlying Secure Authentication and Authorization Slides - Rui Wang, Yuchen Zhou, Shuo Chen, Shaz Qadeer, David Evans, Yuri.pdf 2.3 MB
USENIX Security 2013/Presentations/The Velocity of Censorship High-Fidelity Detection of Microblog Post Deletions - Tao Zhu, David Phipps, Adam Pridgen, Jedidiah R. Crandall.pdf 2.3 MB
USENIX Security 2014/Presentations/Hulk Eliciting Malicious Behavior in Browser Extensions Slides - Alexandros Kapravelos, Chris Grier, Neha Chachra, Christopher Kruegel, Giovanni Vigna, Vern Paxson.pdf 2.3 MB
USENIX Security 2013/Presentations/Effective Inter-Component Communication Mapping in Android An Essential Step Towards Holistic Security Analysis - Damien Octeau, Patrick McDaniel, Somesh Jha, Alexa.pdf 2.3 MB
USENIX Security 2014/Presentations/SDDR Light-Weight, Secure Mobile Encounters - Matthew Lentz, Viktor Erdélyi, Paarijaat Aditya, Elaine Shi, Peter Druschel, Bobby Bhattacharjee.pdf 2.3 MB
USENIX Security 2013/Presentations/Towards Automatic Software Lineage Inference - Jiyong Jang, Maverick Woo, David Brumley.pdf 2.2 MB
USENIX Security 2014/Presentations/Mimesis Aegis A Mimicry Privacy Shield-A System’s Approach to Data Privacy on Public Cloud Slides - Billy Lau, Simon Chung, Chengyu Song, Yeongjin Jang, Wenke Lee.pdf 2.2 MB
USENIX Security 2014/Presentations/Exit from Hell Reducing the Impact of Amplification DDoS Attacks - Marc Kuhrer, Thomas Hupperich, Christian Rossow, Thorsten Holz.pdf 2.2 MB
USENIX Security 2013/Presentations/ExecScent Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates Slides - Terry Nelms, Roberto Perdisci, Mustaque Ahamad.pdf 2.2 MB
USENIX Security 2013/Presentations/Native x86 Decompilation Using Semantics-Preserving Structural Analysis and Iterative Control-Flow Structuring - Edward J. Schwartz, JongHyup Lee, Maverick Woo, Dav.pdf 2.2 MB
USENIX Security 2013/Presentations/Strato A Retargetable Framework for Low-Level Inlined-Reference Monitors Slides - Bin Zeng, Gang Tan, Ulfar Erlingsson.pdf 2.2 MB
USENIX Security 2013/Presentations/On the Security of RC4 in TLS - Nadhem AlFardan, Royal Holloway, Daniel J. Bernstein, Kenneth G. Paterson, Bertram Poettering, Jacob C.N. Schuldt.pdf 2.2 MB
USENIX Security 2013/Presentations/Steal This Movie Automatically Bypassing DRM Protection in Streaming Media Services Slides - Ruoyu Wang, Santa Barbara, Yan Shoshitaishvili, Christopher Kruegel, Gi.pdf 2.2 MB
USENIX Security 2013/Presentations/WHYPER Towards Automating Risk Assessment of Mobile Applications - Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, Tao Xie.pdf 2.2 MB
USENIX Security 2013/Presentations/An Empirical Study of Vulnerability Rewards Programs - Matthew Finifter, Devdatta Akhawe, David Wagner.pdf 2.2 MB
USENIX Security 2013/Presentations/Trafficking Fraudulent Accounts The Role of the Underground Market in Twitter Spam and Abuse - Kurt Thomas, Damon McCoy, Chris Grier, Alek Kolcz, Vern Paxson.pdf 2.2 MB
USENIX Security 2011/Presentations/Privacy in the Age of Augmented Reality - Alessandro Acquisti.pdf 2.1 MB
USENIX Security 2013/Presentations/ZQL A Compiler for Privacy-Preserving Data Processing - Cedric Fournet, Markulf Kohlweiss, George Danezis.pdf 2.1 MB
USENIX Security 2014/Presentations/LibFTE A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes - Daniel Luchaup, Kevin P. Dyer, Somesh Jha, Thomas Ristenpart, Thomas Shrimpton.pdf 2.1 MB
USENIX Security 2013/Presentations/MetaSymploit Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis - Ruowen Wang, Peng Ning, Tao Xie, Quan Chen.pdf 2.1 MB
USENIX Security 2014/Presentations/Size Does Matter Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard Slides - Enes Goktas, Elias Athanasopoulos, Michalis Polychronakis, Herbert Bos.pdf 2.1 MB
USENIX Security 2013/Presentations/FIE on Firmware Finding Vulnerabilities in Embedded Systems Using Symbolic Execution - Drew Davidson, Benjamin Moench, Somesh Jha, Thomas Ristenpart.pdf 2.1 MB
USENIX Security 2014/Presentations/The Long Taile of Typosquatting Domain Names Slides - Janos Szurdi, Balazs Kocso, Gabor Cseh, Jonathan Spring, Mark Felegyhazi, Chris Kanich.pdf 2.1 MB
USENIX Security 2012/Presentations/PharmaLeaks Understanding the Business of Online Pharmaceutical Affiliate Programs Slides - Damon McCoy, Andreas Pitsillidis, Grant Jordan, Nicholas Weaver, Christian Kreibich, B.pdf 2.1 MB
USENIX Security 2013/Presentations/Strato A Retargetable Framework for Low-Level Inlined-Reference Monitors - Bin Zeng, Gang Tan, Ulfar Erlingsson.pdf 2.1 MB
USENIX Security 2013/Presentations/CacheAudit A Tool for the Static Analysis of Cache Side Channels - Goran Doychev, Dominik Feld, Boris Kopf, Laurent Mauborgne, Jan Reineke.pdf 2.1 MB
USENIX Security 2009/Presentations/Locating Prefix Hijackers using LOCK Slides - Tongqing Qiu, Lusheng Ji, Dan Pei, Jia Wang, Jun (Jim) Xu, Hitesh Ballani.pdf 2.1 MB
USENIX Security 2013/Presentations/DupLESS Server-Aided Encryption for Deduplicated Storage - Mihir Bellare, Sriram Keelveedhi, Thomas Ristenpart.pdf 2.1 MB
USENIX Security 2013/Presentations/Eradicating DNS Rebinding with the Extended Same-origin Policy - Martin Johns, Sebastian Lekies, Ben Stock.pdf 2.1 MB
USENIX Security 2013/Presentations/Control Flow Integrity for COTS Binaries - Mingwei Zhang, R. Sekar.pdf 2.1 MB
USENIX Security 2013/Presentations/Sancus Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base - Job Noorman, Pieter Agten, Wilfried Daniels, Raoul Strackx, A.pdf 2.1 MB
USENIX Security 2009/Presentations/USENIX Security 2009 Track - Radio.pdf 2.1 MB
USENIX Security 2014/Presentations/A Bayesian Approach to Privacy Enforcement in Smartphones - Omer Tripp, Julia Rubin.pdf 2.1 MB
USENIX Security 2013/Presentations/PCF A Portable Circuit Format for Scalable Two-Party Secure Computation - Ben Kreuter, Benjamin Mood, Abhi Shelat, Kevin Butler.pdf 2.1 MB
USENIX Security 2011/Presentations/Detecting Malware Domains at the Upper DNS Hierarchy Slides - Manos Antonakakis, Roberto Perdisci, Wenke Lee, Nikolaos Vasiloglou II, David Dagon.pdf 2.1 MB
USENIX Security 2013/Presentations/Steal This Movie Automatically Bypassing DRM Protection in Streaming Media Services - Ruoyu Wang, Santa Barbara, Yan Shoshitaishvili, Christopher Kruegel, Giovanni .pdf 2.0 MB
USENIX Security 2014/Presentations/Hulk Eliciting Malicious Behavior in Browser Extensions - Alexandros Kapravelos, Chris Grier, Neha Chachra, Christopher Kruegel, Giovanni Vigna, Vern Paxson.pdf 2.0 MB
USENIX Security 2013/Presentations/On the Security of Picture Gesture Authentication Slides - Ziming Zhao, Gail-Joon Ahn, Jeong-Jin Seo, Hongxin Hu.pdf 2.0 MB
USENIX Security 2013/Presentations/MetaSymploit Day-One Defense against Script-based Attacks with Security-Enhanced Symbolic Analysis Slides - Ruowen Wang, Peng Ning, Tao Xie, Quan Chen.pdf 2.0 MB
USENIX Security 2014/Presentations/The Long Taile of Typosquatting Domain Names - Janos Szurdi, Balazs Kocso, Gabor Cseh, Jonathan Spring, Mark Felegyhazi, Chris Kanich.pdf 2.0 MB
USENIX Security 2009/Presentations/xBook Redesigning Privacy Control in Social Networking Platforms - Kapil Singh, Sumeer Bhola, Wenke Lee.pdf 2.0 MB
USENIX Security 2020/Videos/USENIX Security 20 - VoteAgain A scalable coercion-resistant voting system.mp4 2.0 MB
USENIX Security 2008/Presentations/Enterprise Security in the Brave New (Virtual) World - Tal Garfinkel.pdf 2.0 MB
USENIX Security 2011/Presentations/Show Me the Money Characterizing Spam-advertised Revenue - Chris Kanich, Nicholas Weaver, Damon McCoy, Tristan Halvorso, Christian Kreibich, Kirill Levchenko, Vern.pdf 1.9 MB
USENIX Security 2009/Presentations/xBook Redesigning Privacy Control in Social Networking Platforms Slides - Kapil Singh, Sumeer Bhola, Wenke Lee.pdf 1.9 MB
USENIX Security 2012/Presentations/On Breaking SAML Be Whoever You Want to Be Slides - Juraj Somorovsky, Andreas Mayer, Jorg Schwenk, Marco Kampmann, Meiko Jensen.pdf 1.9 MB
USENIX Security 2008/Presentations/Lest We Remember - Cold Boot Attacks on Encryption Keys - J. Alex Haldermam, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ar.pdf 1.9 MB
USENIX Security 2012/Presentations/Security and Usability Challenges of Moving-Object CAPTCHAs Decoding Codewords in Motion - Y. Xu, G. Reynaga, S. Chiasson, J.-M. Frahm, F. Monrose, P. van Oorschot.pdf 1.9 MB
USENIX Security 2011/Presentations/BOTMAGNIFIER Locating Spambots on the Internet Slides - Gianluca Stringhini, Thorsten Holz, Brett Stone-Gross, Christopher Kruegel, Giovanni Vigna.pdf 1.9 MB
USENIX Security 2011/Presentations/Measuring and Analyzing Search-Redirection Attacks in the Illicit Online Prescription Drug Trade - Nektarios Leontiadis, Tyler Moore, Nicolas Christin.pdf 1.9 MB
USENIX Security 2012/Presentations/On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces - Ivan Martinovic, Doug Davies, Mario Frank, Daniele Perito, Tomas Ros, Dawn Song.pdf 1.9 MB
USENIX Security 2013/Presentations/Practical Comprehensive Bounds on Surreptitious Communication over DNS Slides - Rao, Reiner Sailer, Douglas Lee Schales, Marc Ph. Stoecklin, Kurt Thomas, Wietse Ven.pdf 1.9 MB
USENIX Security 2007/Presentations/How To Obtain and Assert Composable Security - Ran Canetti.pdf 1.9 MB
USENIX Security 2009/Presentations/Improving Tor using a TCP-over-DTLS Tunnel - Joel Reardon, Ian Goldberg.pdf 1.8 MB
USENIX Security 2009/Presentations/Memory Safety for Low-Level Software Hardware Interactions Slides - John Criswell, Nicolas Geoffray, Pierre et Marie Curie, Vikram Adve.pdf 1.8 MB
USENIX Security 2009/Presentations/Network Security - sec09_network.pdf 1.8 MB
USENIX Security 2012/Presentations/Progressive Authentication Deciding When to Authenticate on Mobile Phones Slides - Oriana Riva, Chuan Qin, Karin Strauss, Dimitrios Lymberopoulos.pdf 1.8 MB
USENIX Security 2012/Presentations/Progressive Authentication Deciding When to Authenticate on Mobile Phones - Oriana Riva, Chuan Qin, Karin Strauss, Dimitrios Lymberopoulos.pdf 1.8 MB
USENIX Security 2012/Presentations/Whispers in the Hyper-space High-speed Covert Channel Attacks in the Cloud Slides Slides Zhenyu Wu, Zhang Xu, Haining Wang.pdf 1.7 MB
USENIX Security 2009/Presentations/NOZZLE A Defense Against Heap-spraying Code Injection Attacks - Paruj Ratanaworabhan, Benjamin Livshits, Benjamin Zorn.pdf 1.7 MB
USENIX Security 2013/Presentations/An Empirical Study of Vulnerability Rewards Programs Slides Slides - Matthew Finifter, Devdatta Akhawe, David Wagner.pdf 1.7 MB
USENIX Security 2009/Presentations/The Multi-Principal OS Construction of the Gazelle Web Browser Slides - Helen J. Wang, Chris Grier, Alex Moshchuk, Samuel T. King, Piali Choudhury, Herman Vente.pdf 1.7 MB
USENIX Security 2014/Presentations/TapDance End-to-Middle Anticensorship without Flow Blocking Slides - Eric Wustrow, Colleen M. Swanson, J. Alex Halderman.pdf 1.7 MB
USENIX Security 2010/Presentations/Understanding CAPTCHA-Solving Services in an Economic Context - Marti Motoyama, Kirill Levchenko, Chris Kanich, Damon McCoy, Geoffrey M. Voelker, Stefan Savage.pdf 1.7 MB
USENIX Security 2009/Presentations/Hash Functions and Their Many Uses in Cryptography - Shai Halevi.pdf 1.7 MB
USENIX Security 2009/Presentations/CCCP Secure Remote Storage for Computational RFIDs Slides - Mastooreh Salajegheh, Shane Clark, Benjamin Ransford, Kevin Fu, Ari Juels.pdf 1.7 MB
USENIX Security 2014/Presentations/iSeeYou Disabling the MacBook Webcam Indicator LED - Matthew Brocker, Stephen Checkoway.pdf 1.6 MB
USENIX Security 2014/Presentations/Brahmastra Driving Apps to Test the Security of Third-Party Components - Ravi Bhoraskar, Seungyeop Han, Jinseong Jeon, Tanzirul Azim, Shuo Chen, Jaeyeon Jung, Suman.pdf 1.6 MB
USENIX Security 2012/Presentations/Mining Your Ps and Qs Detection of Widespread Weak Keys in Network Devices Slides - Nadia Heninger, Zakir Durumeric, Eric Wustrow, J. Alex Halderm.pdf 1.6 MB
USENIX Security 2013/Presentations/Language-based Defenses Against Untrusted Browser Origins Slides - Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Sergio Maffeis.pdf 1.6 MB
USENIX Security 2014/Presentations/Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture Slides - Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza.pdf 1.5 MB
USENIX Security 2009/Presentations/Compromising Electromagnetic Emanations of Wired and Wireless Keyboards - Martin Vuagnoux, Sylvain Pasini.pdf 1.5 MB
USENIX Security 2014/Presentations/Understanding the Dark Side of Domain Parking - Sumayah Alrwais, Kan Yuan, Eihal Alowaisheq, Zhou Li, XiaoFeng Wang.pdf 1.5 MB
USENIX Security 2012/Presentations/Tracking Rootkit Footprints with a Practical Memory Analysis System Slides - Weidong Cui, Marcus Peinado, Zhilei Xu, Ellick Chan.pdf 1.5 MB
USENIX Security 2013/Presentations/DupLESS Server-Aided Encryption for Deduplicated Storage Slides - Mihir Bellare, Sriram Keelveedhi, Thomas Ristenpart.pdf 1.5 MB
USENIX Security 2009/Presentations/A Practical Congestion Attack on Tor Using Long Paths - Nathan S. Evans, Roger Dingledine, Christian Grothoff.pdf 1.5 MB
USENIX Security 2013/Presentations/Alice in Warningland A Large-Scale Field Study of Browser Security Warning Effectiveness Slides - Devdatta Akhawe, Adrienne Porter Felt.pdf 1.5 MB
USENIX Security 2009/Presentations/JavaScript Security - sec09_javascript.pdf 1.4 MB
USENIX Security 2011/Presentations/Dark Clouds on the Horizon Using Cloud Storage as Attack Vector and Online Slack Space Slides - Martin Mulazzani, Sebastian Schrittwieser, Manuel Leithner, Markus H.pdf 1.4 MB
USENIX Security 2010/Presentations/Building a Dynamic Reputation System for DNS - Manos Antonakakis, Roberto Perdisci, David Dagon, Wenke Lee, Nick Feamster.pdf 1.4 MB
USENIX Security 2011/Presentations/A Study of Android Application Security - William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri.pdf 1.4 MB
USENIX Security 2009/Presentations/A Practical Congestion Attack on Tor Using Long Paths Slides - Nathan S. Evans, Roger Dingledine, Christian Grothoff.pdf 1.4 MB
USENIX Security 2011/Presentations/Measuring Pay-per-Install The Commoditization of Malware Distribution - Juan Caballero, Chris Grier, Christian Kreibich, Vern Paxson.pdf 1.4 MB
USENIX Security 2014/Presentations/Revisiting SSL-TLS Implementations New Bleichenbacher Side Channels and Attacks Slides - Christopher Meyer, Juraj Somorovsky, Eugen Weiss, Jorg Schwenk, Sebastian S.pdf 1.4 MB
USENIX Security 2012/Presentations/New Attacks on Timing-based Network Flow Watermarks - Zi Lin, Nicholas Hopper.pdf 1.4 MB
USENIX Security 2013/Presentations/FIE on Firmware Finding Vulnerabilities in Embedded Systems Using Symbolic Execution Slides - Drew Davidson, Benjamin Moench, Somesh Jha, Thomas Ristenpart.pdf 1.3 MB
USENIX Security 2013/Presentations/Secure Outsourced Garbled Circuit Evaluation for Mobile Devices Slides - Henry Carter, Benjamin Mood, Patrick Traynor, Kevin Butler.pdf 1.3 MB
USENIX Security 2014/Presentations/Faster Private Set Intersection Based on OT Extension Slides - Benny Pinkas, Thomas Schneider, Michael Zohner.pdf 1.3 MB
USENIX Security 2010/Presentations/Security and Privacy Vulnerabilities of In-Car Wireless Networks A Tire Pressure Monitoring System Case Study - Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis Tay.pdf 1.3 MB
USENIX Security 2012/Presentations/How Does Your Password Measure Up - The Effect of Strength Meters on Password Creation - Blase Ur, Patrick Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle L. Ma.pdf 1.3 MB
USENIX Security 2012/Presentations/Neuroscience Meets Cryptography Designing Crypto Primitives Secure Against Rubber Hose Attacks Slides - Hristo Bojinov, Daniel Sanchez, Paul Reber, Northw.pdf 1.3 MB
USENIX Security 2009/Presentations/Peeping Tom in the Neighborhood Keystroke Eavesdropping on Multi-User Systems Slides - Kehuan Zhang, XiaoFeng Wang.pdf 1.3 MB
USENIX Security 2012/Presentations/An Evaluation of the Google Chrome Extension Security Architecture Slides -Slides - Nicholas Carlini, Adrienne Porter Felt, David Wagner.pdf 1.3 MB
USENIX Security 2011/Presentations/QUIRE Lightweight Provenance for Smart Phone Operating Systems - Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anhei Shu, Dan S. Wallach.pdf 1.3 MB
USENIX Security 2007/Presentations/On Attack Causality in Internet-Connected Cellular Networks - Patrick Traynor, Patrick McDaniel, Thomas La Porta.pdf 1.2 MB
USENIX Security 2009/Presentations/Malware Detection and Protection.pdf 1.2 MB
USENIX Security 2008/Presentations/Helios Web-based Open-Audit Voting - Ben Adida.pdf 1.2 MB
USENIX Security 2014/Presentations/Precise Client-side Protection against DOM-based Cross-Site Scripting Slides - Ben Stock, Sebastian Lekies, Tobias Mueller, Patrick Spiegel, and Martin Johns.pdf 1.2 MB
USENIX Security 2010/Presentations/Fighting Coercion Attacks in Key Generation using Skin Conductance - Payas Gupta, Debin Gao.pdf 1.2 MB
USENIX Security 2007/Presentations/Mobile Malware - Mikko Hypponen.pdf 1.2 MB
USENIX Security 2011/Presentations/Detecting Malware Domains at the Upper DNS Hierarchy - Manos Antonakakis, Roberto Perdisci, Wenke Lee, Nikolaos Vasiloglou II, David Dagon.pdf 1.2 MB
USENIX Security 2011/Presentations/Comprehensive Experimental Analyses of Automotive Attack Surfaces - Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl.pdf 1.2 MB
USENIX Security 2012/Presentations/Throttling Tor Bandwidth Parasites - Rob Jansen, Paul Syverson, Nicholas Hopper.pdf 1.2 MB
USENIX Security 2012/Presentations/PharmaLeaks Understanding the Business of Online Pharmaceutical Affiliate Programs - Damon McCoy, Andreas Pitsillidis, Grant Jordan, Nicholas Weaver, Christian Kreibich, Brian Kr.pdf 1.2 MB
USENIX Security 2012/Presentations/STEALTHMEM System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud Slides - Taesoo Kim, Marcus Peinado, Gloria Mainar-Ruiz.pdf 1.2 MB
USENIX Security 2009/Presentations/Crying Wolf An Empirical Study of SSL Warning Effectiveness Slides - Joshua Sunshine, Serge Egelman, Hazim Almuhimedi, Neha Atri, Lorrie Faith Cranor.pdf 1.2 MB
USENIX Security 2014/Presentations/TRUESET Faster Verifiable Set Computations Slides - Ahmed E. Kosba, Dimitrios Papadopoulos, Charalampos Papamanthou, Mahmoud F. Sayed, Elaine Shi, Nikos Triandopoul.pdf 1.2 MB
USENIX Security 2012/Presentations/Establishing Browser Security Guarantees through Formal Shim Verification Slides - Dongseok Jang, Zachary Tatlock, Sorin Lerner.pdf 1.1 MB
USENIX Security 2011/Presentations/Toward Secure Embedded Web Interfaces - Baptiste Gourdin, Chinmay Soman, Hristo Bojinov, Elie Bursztein.pdf 1.1 MB
USENIX Security 2012/Presentations/Clickjacking Attacks and Defenses - Lin-Shung Huang, Alex Moshchuk, Helen J. Wang, Stuart Schechter, Collin Jackson.pdf 1.1 MB
USENIX Security 2014/Presentations/Optimizing Seed Selection for Fuzzing Slides - Alexandre Rebert, Sang Kil Cha, Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, David Brumley.pdf 1.1 MB
USENIX Security 2009/Presentations/Baggy Bounds Checking An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors - Periklis Akritidis, Manuel Costa, Miguel Castro, Steven Hand.pdf 1.1 MB
USENIX Security 2014/Presentations/Exit from Hell Reducing the Impact of Amplification DDoS Attacks Slides - Marc Kuhrer, Thomas Hupperich, Christian Rossow, Thorsten Holz.pdf 1.1 MB
USENIX Security 2011/Presentations/deSEO Combating Search-Result Poisoning - John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy, Martin Abadi.pdf 1.1 MB
USENIX Security 2008/Presentations/Panalyst Privacy-Aware Remote Error Analysis on Commodity Software - Rui Wang, XiaoFeng Wang, Zhuowei Li.pdf 1.1 MB
USENIX Security 2014/Presentations/ASM A Programmable Interface for Extending Android Security Slides - Stephan Heuser, Adwait Nadkarni, William Enck, Ahmad-Reza Sadeghi.pdf 1.1 MB
USENIX Security 2014/Presentations/Oxymoron Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing - Michael Backes, Stefan Nurnberger.pdf 1.1 MB
USENIX Security 2007/Presentations/Devices That Tell on You Privacy Trends in Consumer Ubiquitous Computing - T. Scott Saponas, Jonathan Lester, Carl Hartung, Sameer Agarwal, Tadayoshi Kohno.pdf 1.1 MB
USENIX Security 2012/USENIX Security 2012 Reports.pdf 1.1 MB
USENIX Security 2012/Presentations/Billion-Gate Secure Computation with Malicious Adversaries Slides Slides - Benjamin Kreuter, abhi shelat, and Chih-hao Shen.pdf 1.1 MB
USENIX Security 2009/Presentations/VPriv Protecting Privacy in Location-Based Vehicular Services Slides - Raluca Ada Popa, Hari Balakrishnan, Andrew J. Blumberg.pdf 1.1 MB
USENIX Security 2014/Presentations/XRay Enhancing the Web’s Transparency with Differential Correlation Slides - Mathias Lecuyer, Guillaume Ducoffe, Francis Lan, Andrei Papancea, Theofilos Petsios, Ri.pdf 1.0 MB
USENIX Security 2011/Presentations/Permission Re-Delegation Attacks and Defenses - Adrienne Porter Felt, Helen J. Wang, Alexander Moshchuk, Steve Hanna, Erika Chin.pdf 1.0 MB
USENIX Security 2014/Presentations/X-Force Force-Executing Binary Programs for Security Applications - Fei Peng, Zhui Deng, Xiangyu Zhang, and Dongyan Xu, Purdue University; Zhiqiang Lin, The Univers.pdf 1.0 MB
USENIX Security 2011/Presentations/Forensic Triage for Mobile Phones with DEC0DE - Robert J. Walls, Erik Learned-Miller, and Brian Neil Levine.pdf 1.0 MB
USENIX Security 2008/Presentations/Securing Frame Communication in Browsers - Adam Barth, Collin Jackson, John C. Mitchell.pdf 1.0 MB
USENIX Security 2014/Presentations/Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens Slides - Daniel Demmler, Thomas Schneider, Michael Zohner.pdf 1.0 MB
USENIX Security 2014/Presentations/A Large-Scale Empirical Analysis of Chinese Web Passwords Slides - Zhigong Li, Weili Han, Wenyuan Xu.pdf 986.6 kB
USENIX Security 2014/Presentations/Static Detection of Second-Order Vulnerabilities in Web Applications Slides - Johannes Dahse, Thorsten Holz.pdf 982.8 kB
USENIX Security 2011/Presentations/TRESOR Runs Encryption Securely Outside RAM Slides - Tilo Müller, Felix C. Freiling, Andreas Dewald.pdf 970.6 kB
USENIX Security 2013/Presentations/Dowsing for Overflows A Guided Fuzzer to Find Buffer Boundary Violations Slides - Istvan Haller, Asia Slowinska, Matthias Neugschwandtner, Herbert Bos.pdf 967.7 kB
USENIX Security 2011/Presentations/Static Detection of Access Control Vulnerabilities in Web Applications Slides - Fangqi Sun, Liang Xu, and Zhendong Su.pdf 963.8 kB
USENIX Security 2014/Presentations/Automatically Detecting Vulnerable Websites Before They Turn Malicious - Kyle Soska, Nicolas Christin.pdf 961.0 kB
USENIX Security 2012/Presentations/Babel Leveraging Email Delivery for Spam Mitigation - Gianluca Stringhini, Manuel Egele, Apostolis Zarras, Thorsten Holz, Christopher Kruegel, Giovanni Vigna.pdf 958.1 kB
USENIX Security 2010/Presentations/Realization of RF Distance Bounding - Kasper Bonne Rasmussen, Srdjan Capkun.pdf 958.0 kB
USENIX Security 2014/Presentations/Blanket Execution Dynamic Similarity Testing for Program Binaries and Components Slides - Manuel Egele, Maverick Woo, Peter Chapman, David Brumley.pdf 953.2 kB
USENIX Security 2014/Presentations/Password Portfolios and the Finite-Effort User Sustainably Managing Large Numbers of Accounts Slides - Dinei Florencio, Cormac Herley, Paul C. van Oorschot.pdf 952.9 kB
USENIX Security 2014/Presentations/Preventing Cryptographic Key Leakage in Cloud Virtual Machines Slides - Erman Pattuk, Murat Kantarcioglu, Zhiqiang Lin, Huseyin Ulusoy.pdf 936.6 kB
USENIX Security 2009/Presentations/Physical-layer Identification of RFID Devices - Boris Danev, Thomas S. Heydt-Benjamin, Srdjan Capkun.pdf 935.2 kB
USENIX Security 2008/Presentations/A Couple Billion Lines of Code Later Static Checking in the Real World Slides - Dawson Engler, Ben Chelf, Andy Chou, Seth Hallem.pdf 933.7 kB
USENIX Security 2014/Presentations/On the Effective Prevention of TLS Man-in-the-Middle Attacks in Web Applications - Nikolaos Karapanos and Srdjan Capkun.pdf 927.8 kB
USENIX Security 2011/Presentations/Outsourcing the Decryption of ABE Ciphertexts - Matthew Green, Susan Hohenberger, Brent Waters.pdf 921.6 kB
USENIX Security 2007/Presentations/Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords - Julie Thorpe, P.C. van Oorschot.pdf 914.0 kB
USENIX Security 2010/Presentations/Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking - Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidiah R. Cranda.pdf 901.0 kB
USENIX Security 2007/Presentations/SpyProxy Execution-based Detection of Malicious Web Content - Alexander Moshchuk, Tanya Bragin, Damien Deville, Steven D. Gribble, Henry M. Levy.pdf 889.7 kB
USENIX Security 2008/Presentations/CloudAV N-Version Antivirus in the Network Cloud - Jon Oberheide, Evan Cooke, Farnam Jahanian.pdf 885.7 kB
USENIX Security 2014/Presentations/Mimesis Aegis A Mimicry Privacy Shield-A System’s Approach to Data Privacy on Public Cloud - Billy Lau, Simon Chung, Chengyu Song, Yeongjin Jang, Wenke Lee, Alexand.pdf 881.1 kB
USENIX Security 2010/Presentations/Chipping Away at Censorship Firewalls with User-Generated Content Slides - Sam Burnett, Nick Feamster, Santosh Vempala.pdf 868.3 kB
USENIX Security 2014/Presentations/Burst ORAM Minimizing ORAM Response Times for Bursty Access Patterns Slides - Jonathan Dautrich, University of California, Riverside; Emil Stefanov, Elaine Shi.pdf 861.3 kB
USENIX Security 2009/Presentations/GATEKEEPER Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code - Salvatore Guarnieri, Benjamin Livshits.pdf 854.9 kB
USENIX Security 2010/Presentations/Acoustic Side-Channel Attacks on Printers - Michael Backes, Markus Durmuth, Sebastian Gerling, Manfred Pinkal, Caroline Sporleder.pdf 847.2 kB
USENIX Security 2013/Presentations/Eradicating DNS Rebinding with the Extended Same-origin Policy Slides - Martin Johns, Sebastian Lekies, Ben Stock.pdf 836.2 kB
USENIX Security 2009/Presentations/Browser Security Proceedings.pdf 833.1 kB
USENIX Security 2009/Presentations/Browser Security.pdf 833.1 kB
USENIX Security 2013/Presentations/Impression Fraud in On-line Advertising via Pay-Per-View Networks Slides - Kevin Springborn, Paul Barford.pdf 827.1 kB
USENIX Security 2009/Presentations/Vanish Increasing Data Privacy with Self-Destructing Data - Roxana Geambasu, Tadayoshi Kohno, Amit A. Levy, Henry M. Levy.pdf 812.8 kB
USENIX Security 2014/Presentations/Telepathwords Preventing Weak Passwords by Reading Users’ Minds - Saranga Komanduri, Richard Shay, Lorrie Faith Cranor, Cormac Herley Stuart Schechter.pdf 811.5 kB
USENIX Security 2008/Presentations/Setting DNS's Hair on Fire - Niels Provos, David Dagon, Paul Vixie.pdf 811.2 kB
USENIX Security 2010/Presentations/AdJail Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements - Mike Ter Louw, Karthik Thotta Ganesh, V.N. Venkatakrishnan.pdf 809.9 kB
USENIX Security 2014/Presentations/Never Been KIST Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport - Rob Jansen, John Geddes, Chris Wacek, Micah Sherr, Paul Syverson.pdf 809.1 kB
USENIX Security 2012/Presentations/Tracking Rootkit Footprints with a Practical Memory Analysis System - Weidong Cui, Marcus Peinado, Zhilei Xu, Ellick Chan.pdf 808.3 kB
USENIX Security 2008/Presentations/Proactive Surge Protection A Defense Mechanism for Bandwidth-Based Attacks - Jerry Chou, Bill Lin, Subhabrata Sen, Oliver Spatscheck.pdf 802.2 kB
USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX.html 801.2 kB
USENIX Security 2012/Presentations/Whispers in the Hyper-space High-speed Covert Channel Attacks in the Cloud - Zhenyu Wu, Zhang Xu, Haining Wang.pdf 799.4 kB
USENIX Security 2014/Presentations/Man vs. Machine Practical Adversarial Detection of Malicious Crowdsourcing Workers - Gang Wang, Tianyi Wang, Santa Barbara, Haitao Zheng, Ben Y. Zhao.pdf 798.6 kB
USENIX Security 2014/Presentations/DSCRETE Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse - Brendan Saltaformaggio, Zhongshu Gu, Xiangyu Zhang, Dongyan.pdf 789.4 kB
USENIX Security 2014/Presentations/Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens - Daniel Demmler, Thomas Schneider, Michael Zohner.pdf 771.3 kB
USENIX Security 2014/Presentations/Privee An Architecture for Automatically Analyzing Web Privacy Policies - Sebastian Zimmeck, Steven M. Bellovin.pdf 769.7 kB
USENIX Security 2020/sec20_cover.pdf 769.2 kB
USENIX Security 2012/Presentations/Establishing Browser Security Guarantees through Formal Shim Verification - Dongseok Jang, Zachary Tatlock, Sorin Lerner.pdf 769.1 kB
USENIX Security 2011/Presentations/Cloaking Malware with the Trusted Platform Module Slides - Alan M. Dunn, Owen S. Hofmann, Brent Waters, Emmett Witchel.pdf 765.1 kB
USENIX Security 2012/Presentations/From Throw-Away Traffic to Bots Detecting the Rise of DGA-Based Malware Slides - Manos Antonakakis, Roberto Perdisci, Yacin Nadji, Nikolaos Vasiloglou, Saeed Abu-Nimeh, Wenke Lee.pdf 764.5 kB
USENIX Security 2014/Presentations/Stitching the Gadgets On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection - Lucas Davi, Ahmad-Reza Sadeghi, Daniel Lehmann, Fabian Monrose.pdf 749.1 kB
USENIX Security 2009/Presentations/Protecting Confidential Data on Personal Computers with Storage Capsules Slides - Kevin Borders, Eric Vander Weele, Billy Lau, Atul Prakash.pdf 744.9 kB
USENIX Security 2019/USENIX Security 2019 Program errata-3.pdf 744.0 kB
USENIX Security 2008/Presentations/Security Analysis of Network Protocols Slides - John Mitchell.pdf 743.2 kB
USENIX Security 2007/Presentations/Report of the California Voting Systems Review - David Wagner,.pdf 742.5 kB
USENIX Security 2012/Presentations/Privacy-Preserving Social Plugins - Georgios Kontaxis, Michalis Polychronakis, Angelos D. Keromytis, Evangelos P. Markatos.pdf 740.9 kB
USENIX Security 2007/Presentations/Keep Your Enemies Close Distance Bounding Against Smartcard Relay Attacks - Saar Drimer, Steven J. Murdoch.pdf 740.2 kB
USENIX Security 2009/Presentations/Detecting Spammers with SNARE Spatio-temporal Network-level Automatic Reputation Engine Slides - Shuang Hao, Nadeem Ahmed Syed, Nick Feamster, Alexander G. Gray, Sv.pdf 738.6 kB
USENIX Security 2012/Presentations/PUBCRAWL Protecting Users and Businesses from CRAWLers Slides - Gregoire Jacob, Engin Kirda, Christopher Kruegel, Giovanni Vigna.pdf 735.7 kB
USENIX Security 2012/Presentations/On Breaking SAML Be Whoever You Want to Be - Juraj Somorovsky, Andreas Mayer, Jorg Schwenk, Marco Kampmann, Meiko Jensen.pdf 725.7 kB
USENIX Security 2008/Presentations/Multi-flow Attacks Against Network Flow Watermarking Schemes - Negar Kiyavash, Amir Houmansadr, Nikita Borisov.pdf 719.4 kB
USENIX Security 2012/Presentations/From Throw-Away Traffic to Bots Detecting the Rise of DGA-Based Malware - Manos Antonakakis, Roberto Perdisci, Yacin Nadji, Nikolaos Vasiloglou, Saeed Abu-Nimeh, Wenke Lee, David.pdf 713.4 kB
USENIX Security 2010/Presentations/Searching the Searchers with SearchAudit - John P. John, Fang Yu, Yinglian Xie, Martin Abadi, Arvind Krishnamurthy.pdf 711.2 kB
USENIX Security 2010/Presentations/Vulnerable Compliance - Dan Geer.pdf 710.6 kB
USENIX Security 2014/Presentations/From the Aether to the Ethernet-Attacking the Internet using Broadcast Digital Television - Yossef Oren, Angelos D. Keromytis.pdf 708.0 kB
USENIX Security 2012/Presentations/Chimera A Declarative Language for Streaming Network Traffic Analysis Slides - Kevin Borders, Jonathan Springer, Matthew Burnside.pdf 706.3 kB
USENIX Security 2014/Presentations/BYTEWEIGHT Learning to Recognize Functions in Binary Code Slides - Tiffany Bao, Jonathan Burket, Maverick Woo, Rafael Turner, David Brumley.pdf 704.9 kB
USENIX Security 2011/Presentations/Q Exploit Hardening Made Easy - Edward J. Schwartz, Thanassis Avgerinos, David Brumley.pdf 700.9 kB
USENIX Security 2010/Presentations/ZKPDL A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash - Sarah Meiklejohn, C. Chris Erway, Alptekin Kupcu, Theodora Hinkle, Anna Lysy.pdf 694.5 kB
USENIX Security 2014/Presentations/A Large-Scale Analysis of the Security of Embedded Firmwares - Andrei Costin, Jonas Zaddach, Aurelien Francillon, and Davide Balzarotti.pdf 691.2 kB
USENIX Security 2014/Presentations/On the Feasibility of Large-Scale Infections of iOS Devices Slides - Tielei Wang, Yeongjin Jang, Yizheng Chen, Simon Chung, Billy Lau, Wenke Lee.pdf 691.2 kB
USENIX Security 2014/Presentations/Scheduler-based Defenses against Cross-VM Side-channels - Venkatanathan Varadarajan, Thomas Ristenpart, Michael Swift.pdf 689.3 kB
USENIX Security 2008/Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services - Sebastian Zander, Steven J. Murdoch.pdf 685.0 kB
USENIX Security 2012/Presentations/Efficient and Scalable Socware Detection in Online Social Networks - Md Sazzadur Rahman, Ting-Kai Huang, Harsha V. Madhyastha, Michalis Faloutsos.pdf 683.3 kB
USENIX Security 2011/Presentations/Static Detection of Access Control Vulnerabilities in Web Applications - Fangqi Sun, Liang Xu, and Zhendong Su.pdf 666.3 kB
USENIX Security 2012/Presentations/Gone in 360 Seconds Hijacking with Hitag2 - Roel Verdult, Flavio D. Garcia, Josep Balasch, KU Leuven.pdf 665.3 kB
USENIX Security 2011/Presentations/Secure In-Band Wireless Pairing Slides - Shyamnath Gollakota, Nabeel Ahmed, Nickolai Zeldovich, Dina Katabi.pptx 653.0 kB
USENIX Security 2014/Presentations/Peeking into Your App without Actually Seeing It UI State Inference and Novel Android Attacks - Qi Alfred Chen, Zhiyun Qian, Z. Morley Mao.pdf 651.4 kB
USENIX Security 2011/Presentations/The Phantom Tollbooth Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion - Sarah Meiklejohn, Keaton Mowery, Stephen Checkoway, Hovav.pdf 651.3 kB
USENIX Security 2014/Presentations/SSOScan Automated Testing of Web Applications for Single Sign-On Vulnerabilities - Yuchen Zhou, David Evans.pdf 646.8 kB
USENIX Security 2011/Presentations/MACE Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery Slides - Chia Yuan Cho, Domagoj Babic, Pongsin Poosankam, Kevin Zhijie C.pdf 645.1 kB
USENIX Security 2009/Presentations/Effective and Efficient Malware Detection at the End Host Slides - Clemens Kolbitsch, Paolo Milani Comparetti, Christopher Kruegel, Engin Kirda, Sophia Antipolis, X.pdf 641.3 kB
USENIX Security 2014/Presentations/Revisiting SSL-TLS Implementations New Bleichenbacher Side Channels and Attacks - Christopher Meyer, Juraj Somorovsky, Eugen Weiss, Jorg Schwenk, Sebastian Schinzel.pdf 640.5 kB
USENIX Security 2009/Presentations/Jamming-resistant Broadcast Communication without Shared Keys - Christina Popper, Mario Strasser, Srdjan Capkun.pdf 639.9 kB
USENIX Security 2011/Presentations/JACKSTRAWS Picking Command and Control Connections from Bot Traffic Slides - Gregoire Jacob, Ralf Hund, Christopher Kruegel.pdf 633.5 kB
USENIX Security 2007/Presentations/Halting Password Puzzles Hard-to-break Encryption from Human-memorable Keys - Xavier Boyen.pdf 633.0 kB
USENIX Security 2012/Presentations/Origin-Bound Certificates A Fresh Approach to Strong Client Authentication for the Web - Michael Dietz, Alexei Czeskis, Dirk Balfanz, Dan S. Wallach.pdf 625.6 kB
USENIX Security 2009/Presentations/Jamming-resistant Broadcast Communication without Shared Keys Slides - Christina Popper, Mario Strasser, and Srdjan Capkun.pdf 624.6 kB
USENIX Security 2014/Presentations/The Emperor’s New Password Manager Security Analysis of Web-based Password Managers - Zhiwei Li, Warren He, Devdatta Akhawe, Dawn Song.pdf 624.5 kB
USENIX Security 2013/Presentations/ZMap Fast Internet-wide Scanning and Its Security Applications Slides - Zakir Durumeric, Eric Wustrow, J. Alex Halderman.pdf 621.8 kB
USENIX Security 2008/Presentations/Hypervisor Support for Identifying Covertly Executing Binaries - Lionel Litty, H. Andrs Lagar-Cavilla, David Lie.pdf 616.9 kB
USENIX Security 2010/Presentations/An Analysis of Private Browsing Modes in Modern Browsers - Gaurav Aggarwal, Elie Bursztein, Collin Jackson, Dan Boneh.pdf 611.6 kB
USENIX Security 2014/USENIX 2014 Security report.pdf 611.6 kB
USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/css_Pen3ncMGQyB3Q2LWoTho2yu6X-D2T6zOqWITJ4iG9A8.css 611.0 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/css_Pen3ncMGQyB3Q2LWoTho2yu6X-D2T6zOqWITJ4iG9A8.css 611.0 kB
USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/css_mMMIpDBXDqo0rCZrN7FoMlBPY0tKvHCE04XYURHXl9M.css 610.1 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/css_mMMIpDBXDqo0rCZrN7FoMlBPY0tKvHCE04XYURHXl9M.css 610.1 kB
USENIX Security 2018/USENIX Security 2018 Program at a Glance USENIX_files/css_mMMIpDBXDqo0rCZrN7FoMlBPY0tKvHCE04XYURHXl9M.css 610.1 kB
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/css_mMMIpDBXDqo0rCZrN7FoMlBPY0tKvHCE04XYURHXl9M.css 610.1 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/css_mMMIpDBXDqo0rCZrN7FoMlBPY0tKvHCE04XYURHXl9M.css 610.1 kB
USENIX Security 2019/USENIX Security 2019 Program at a Glance USENIX_files/css_mMMIpDBXDqo0rCZrN7FoMlBPY0tKvHCE04XYURHXl9M.css 610.1 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/css_mMMIpDBXDqo0rCZrN7FoMlBPY0tKvHCE04XYURHXl9M.css 610.1 kB
USENIX Security 2012/Presentations/DroidScope Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis - Lok Kwong Yan, Heng Yin.pdf 608.3 kB
USENIX Security 2013/Presentations/Sancus Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base Slides - Job Noorman, Pieter Agten, Wilfried Daniels, Raoul Str.pdf 607.0 kB
USENIX Security 2014/Presentations/Z0 An Optimizing Distributing Zero-Knowledge Compiler - Matthew Fredrikson, Benjamin Livshits.pdf 599.6 kB
USENIX Security 2012/Presentations/Optimally Robust Private Information Retrieval Slides - Casey Devet, Ian Goldberg, Nadia Heninger.pdf 595.2 kB
USENIX Security 2012/Presentations/PUBCRAWL Protecting Users and Businesses from CRAWLers - Gregoire Jacob, Engin Kirda, Christopher Kruegel, Giovanni Vigna.pdf 589.7 kB
USENIX Security 2014/Presentations/TapDance End-to-Middle Anticensorship without Flow Blocking - Eric Wustrow, Colleen M. Swanson, J. Alex Halderman.pdf 585.9 kB
USENIX Security 2016/Technical Sessions 2016 USENIX.htm 578.7 kB
USENIX Security 2007/Presentations/Active Hardware Metering for Intellectual Property Protection and Security - Yousra M. Alkabani, Farinaz Koushanfar.pdf 571.7 kB
USENIX Security 2013/Presentations/ZMap Fast Internet-wide Scanning and Its Security Applications - Zakir Durumeric, Eric Wustrow, J. Alex Halderman.pdf 571.6 kB
USENIX Security 2007/Presentations/Integrity Checking in Cryptographic File Systems with Constant Trusted Storage - Alina Oprea, Michael K. Reiter.pdf 570.4 kB
USENIX Security 2012/Presentations/Fuzzing with Code Fragments - Christian Holler, Kim Herzig, Andreas Zeller.pdf 570.3 kB
USENIX Security 2009/Presentations/USENIX Security 2009 - Cover.pdf 568.3 kB
USENIX Security 2008/Presentations/Unidirectional Key Distribution Across Time and Space with Applications to RFID Security - Ari Juels, Ravikanth Pappu, Bryan Parno.pdf 564.6 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/hyatt_santa_clara_600_neat_6.png 560.8 kB
USENIX Security 2012/Presentations/Social Networking with Frientegrity Privacy and Integrity with an Untrusted Provider - Ariel J. Feldman, Aaron Blankstein, Michael J. Freedman, Edward W. Felten.pdf 555.5 kB
USENIX Security 2015/Presentations/sec15_proceedings_cover.pdf 553.0 kB
USENIX Security 2009/Presentations/Detecting Spammers with SNARE Spatio-temporal Network-level Automatic Reputation Engine - Shuang Hao, Nadeem Ahmed Syed, Nick Feamster, Alexander G. Gray, Sven Kras.pdf 551.4 kB
USENIX Security 2008/Presentations/AutoISES Automatically Inferring Security Specification and Detecting Violations - Lin Tan, Xiaolan Zhang, Xiao Ma, Weiwei Xiong, Yuanyuan Zhou.pdf 550.0 kB
USENIX Security 2013/Presentations/Control Flow Integrity for COTS Binaries Slides - Mingwei Zhang, R. Sekar.pdf 548.5 kB
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX.htm 547.6 kB
USENIX Security 2015/Technical Sessions 2015 USENIX.htm 544.5 kB
USENIX Security 2014/Presentations/On the Feasibility of Large-Scale Infections of iOS Devices - Tielei Wang, Yeongjin Jang, Yizheng Chen, Simon Chung, Billy Lau, Wenke Lee.pdf 541.8 kB
USENIX Security 2009/Presentations/Efficient Data Structures for Tamper-Evident Logging Slides - Scott A. Crosby, Dan S. Wallach.pdf 539.8 kB
USENIX Security 2014/Presentations/Size Does Matter Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard - Enes Goktas, Elias Athanasopoulos, Michalis Polychronakis, Herbert Bos.pdf 538.4 kB
USENIX Security 2011/Presentations/SHELLOS Enabling Fast Detection and Forensic Analysis of Code Injection Attacks - Kevin Z. Snow, Srinivas Krishnan, Fabian Monrose, Niels Provos.pdf 536.0 kB
USENIX Security 2012/Presentations/DroidScope Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis Slides - Lok Kwong Yan, Heng Yin.pdf 535.3 kB
USENIX Security 2012/Presentations/Neuroscience Meets Cryptography Designing Crypto Primitives Secure Against Rubber Hose Attacks - Hristo Bojinov, Daniel Sanchez, Paul Reber, Northw.pdf 530.3 kB
USENIX Security 2011/Presentations/PIR-Tor Scalable Anonymous Communication Using Private Information Retrieval - Prateek Mittal, Femi Olumofin, Carmela Troncoso, Nikita Borisov, Ian Goldberg.pdf 529.6 kB
USENIX Security 2012/Presentations/Privilege Separation in HTML5 Applications - Devdatta Akhawe, Prateek Saxena, Dawn Song.pdf 522.5 kB
USENIX Security 2014/Presentations/A Look at Targeted Attacks Through the Lense of an NGO - Stevens Le Blond, Adina Uritesc, Cedric Gilbert, Zheng Leong Chua, Prateek Saxena, Engin Kirda.pdf 519.6 kB
USENIX Security 2014/Presentations/Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture - Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza.pdf 519.1 kB
USENIX Security 2012/Presentations/STEALTHMEM System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud - Taesoo Kim, Marcus Peinado, Gloria Mainar-Ruiz.pdf 517.9 kB
USENIX Security 2007/Presentations/Secretly Monopolizing the CPU Without Superuser Privileges - Dan Tsafrir, Yoav Etsion, Dror G. Feitelson.pdf 517.9 kB
USENIX Security 2014/Presentations/X-Force Force-Executing Binary Programs for Security Applications Slides - Fei Peng, Zhui Deng, Xiangyu Zhang, and Dongyan Xu, Purdue University; Zhiqiang Lin, The.pdf 516.4 kB
USENIX Security 2010/Presentations/SEPIA Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics - Martin Burkhart, Mario Strasser, Dilip Many, Xenofontas Dimitropoulos.pdf 513.0 kB
USENIX Security 2014/Presentations/Blanket Execution Dynamic Similarity Testing for Program Binaries and Components - Manuel Egele, Maverick Woo, Peter Chapman, David Brumley.pdf 509.6 kB
USENIX Security 2008/Presentations/VoteBox A Tamper-evident, Verifiable Electronic Voting System - Daniel Sandler, Kyle Derr, Dan S. Wallach.pdf 508.9 kB
USENIX Security 2014/Presentations/Preventing Cryptographic Key Leakage in Cloud Virtual Machines - Erman Pattuk, Murat Kantarcioglu, Zhiqiang Lin, Huseyin Ulusoy.pdf 508.8 kB
USENIX Security 2009/Presentations/Effective and Efficient Malware Detection at the End Host - Clemens Kolbitsch, Paolo Milani Comparetti, Christopher Kruegel, Engin Kirda, Sophia Antipolis, Xiaoyong.pdf 503.6 kB
USENIX Security 2009/Presentations/Crying Wolf An Empirical Study of SSL Warning Effectiveness - Joshua Sunshine, Serge Egelman, Hazim Almuhimedi, Neha Atri, Lorrie Faith Cranor.pdf 501.6 kB
USENIX Security 2014/Presentations/Privee An Architecture for Automatically Analyzing Web Privacy Policies Slides - Sebastian Zimmeck, Steven M. Bellovin.pdf 501.0 kB
USENIX Security 2012/Presentations/STING Finding Name Resolution Vulnerabilities in Programs - Hayawardh Vijayakumar, Joshua Schiffman, Trent Jaeger.pdf 500.9 kB
USENIX Security 2014/Presentations/Towards Detecting Anomalous User Behavior in Online Social Networks - Bimal Viswanath, M. Ahmad Bashir, Mark Crovella, Saikat Guha, Krishna P. Gummadi, Max Planck, .pdf 500.6 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/sec18_hotel.png 500.5 kB
USENIX Security 2012/Presentations/AdSplit Separating Smartphone Advertising from Applications - Shashi Shekhar, Michael Dietz, Dan S. Wallach.pdf 499.0 kB
USENIX Security 2014/Presentations/JIGSAW Protecting Resource Access by Inferring Programmer Expectations - Hayawardh Vijayakumar, Xinyang Ge, Mathias Payer, Trent Jaeger.pdf 497.2 kB
USENIX Security 2009/Presentations/Static Enforcement of Web Application Integrity Through Strong Typing - William Robertson, Giovanni Vigna.pdf 495.1 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions.htm 494.7 kB
USENIX Security 2010/Presentations/Scantegrity II Municipal Election at Takoma Park The First E2E Binding Governmental Election with Ballot Privacy - Richard Carback, David Chaum, Jeremy Clark, John.pdf 492.2 kB
USENIX Security 2014/Presentations/An Internet-Wide View of Internet-Wide Scanning - Zakir Durumeric, Michael Bailey, J. Alex Halderman.pdf 489.7 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/sheraton_vancouver_600.png 487.7 kB
USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX.htm 487.2 kB
USENIX Security 2007/Presentations/SIF Enforcing Confidentiality and Integrity in Web Applications - Stephen Chong, K. Vikram, Andrew C. Myers.pdf 484.2 kB
USENIX Security 2015/Presentations/sec15_supplement.pdf 481.6 kB
USENIX Security 2015/USENIX Security 2015 Full Proceedings Supplement.pdf 481.6 kB
USENIX Security 2014/Presentations/A Large-Scale Empirical Analysis of Chinese Web Passwords - Zhigong Li, Weili Han, Wenyuan Xu.pdf 481.2 kB
USENIX Security 2012/Presentations/Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization - Cristiano Giuffrida, Anton Kuijsten, Andrew S. Tanenbaum.pdf 477.3 kB
USENIX Security 2010/Presentations/Chipping Away at Censorship Firewalls with User-Generated Content - Sam Burnett, Nick Feamster, Santosh Vempala.pdf 474.8 kB
USENIX Security 2008/Presentations/All Your iFRAMEs Point to Us - Niels Provos, Panayiotis Mavrommatis, Moheeb Abu Rajab, Fabian Monrose.pdf 474.1 kB
USENIX Security 2014/Presentations/BYTEWEIGHT Learning to Recognize Functions in Binary Code - Tiffany Bao, Jonathan Burket, Maverick Woo, Rafael Turner, David Brumley.pdf 473.4 kB
USENIX Security 2011/Presentations/Fast and Precise Sanitizer Analysis with BEK - Pieter Hooimeijer, Benjamin Livshits, David Molnar, Prateek Saxena, Margus Veanes.pdf 470.7 kB
USENIX Security 2012/Presentations/I Forgot Your Password Randomness Attacks Against PHP Applications - George Argyros, Aggelos Kiayias.pdf 470.3 kB
USENIX Security 2009/Presentations/Peeping Tom in the Neighborhood Keystroke Eavesdropping on Multi-User Systems - Kehuan Zhang, XiaoFeng Wang.pdf 467.9 kB
USENIX Security 2014/Presentations/XRay Enhancing the Web’s Transparency with Differential Correlation - Mathias Lecuyer, Guillaume Ducoffe, Francis Lan, Andrei Papancea, Theofilos Petsios, Riley Spa.pdf 467.8 kB
USENIX Security 2007/Presentations/Combating Click Fraud via Premium Clicks - Ari Juels, Sid Stamm, Markus Jakobsson.pdf 467.0 kB
USENIX Security 2014/Presentations/FLUSH-RELOAD A High Resolution, Low Noise, L3 Cache Side-Channel Attack Slides - Yuval Yarom, Katrina Falkner.pdf 465.4 kB
USENIX Security 2014/Presentations/Password Portfolios and the Finite-Effort User Sustainably Managing Large Numbers of Accounts - Dinei Florencio, Cormac Herley, Paul C. van Oorschot.pdf 460.4 kB
USENIX Security 2014/Presentations/SpanDex Secure Password Tracking for Android - Landon P. Cox , Peter Gilbert, Geoffrey Lawler, Valentin Pistol, Ali Razeen, Bi Wu, Sai Cheemalapati.pdf 460.0 kB
USENIX Security 2010/Presentations/VEX Vetting Browser Extensions for Security Vulnerabilities - Sruthi Bandhakavi, Samuel T. King, P. Madhusudan, Marianne Winslett.pdf 456.1 kB
USENIX Security 2010/Presentations/Cling A Memory Allocator to Mitigate Dangling Pointers - Periklis Akritidis.pdf 454.9 kB
USENIX Security 2009/Presentations/Nemesis Preventing Authentication and Access Control Vulnerabilities in Web Applications - Michael Dalton, Christos Kozyrakis, Nickolai Zeldovich.pdf 453.3 kB
USENIX Security 2014/Presentations/ret2dir Rethinking Kernel Isolation - Vasileios P. Kemerlis, Michalis Polychronakis, Angelos D. Keromytis.pdf 447.6 kB
USENIX Security 2012/Presentations/Taking Proof-Based Verified Computation a Few Steps Closer to Practicality - Srinath Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Andrew J. Blumberg, Michael Walfish.pdf 445.4 kB
USENIX Security 2008/Presentations/Lest We Remember - Cold Boot Attacks on Encryption Keys_files/memory_5.jpg 440.7 kB
USENIX Security 2014/Presentations/ROP is Still Dangerous Breaking Modern Defenses - Nicholas Carlini, David Wagner.pdf 440.0 kB
USENIX Security 2019/28th USENIX Security Symposium Grid.htm 439.3 kB
USENIX Security 2011/Presentations/Secure In-Band Wireless Pairing - Shyamnath Gollakota, Nabeel Ahmed, Nickolai Zeldovich, Dina Katabi.pdf 438.6 kB
USENIX Security 2009/Presentations/Return-Oriented Rootkits Bypassing Kernel Code Integrity Protection Mechanisms Slides - Ralf Hund, Thorsten Holz, Felix C. Freiling.pdf 437.6 kB
USENIX Security 2011/Presentations/Bubble Trouble Off-Line De-Anonymization of Bubble Forms - Joseph A. Calandrino, William Clarkson, Edward W. Felten.pdf 433.4 kB
USENIX Security 2008/Presentations/Highly Predictive Blacklisting - Jian Zhang, Phillip Porras, Johannes Ullrich.pdf 431.3 kB
USENIX Security 2010/Presentations/PrETP Privacy-Preserving Electronic Toll Pricing - Josep Balasch, Alfredo Rial, Carmela Troncoso, Bart Preneel, Ingrid Verbauwhede, Christophe Geuens.pdf 430.1 kB
USENIX Security 2014/Presentations/Towards Reliable Storage of 56-bit Secrets in Human Memory - Joseph Bonneau, Princeton University; Stuart Schechter.pdf 427.4 kB
USENIX Security 2008/Presentations/BotMiner Clustering Analysis of Network Traffic for Protocol and Structure-Independent Botnet Detection - Guofei Gu, Roberto Perdisci, Junjie Zhang, Wenke Lee.pdf 425.1 kB
USENIX Security 2011/Presentations/Faster Secure Two-Party Computation Using Garbled Circuits - Yan Huang, David Evans, Jonathan Katz.pdf 424.7 kB
USENIX Security 2008/Presentations/Measurement and Classification of Humans and Bots in Internet Chat - Steven Gianvecchio, Mengjun Xie, Zhengyu Wu, Haining Wang.pdf 421.6 kB
USENIX Security 2007/Presentations/On Web Browsing Privacy in Anonymized NetFlows - S.E. Coull, M.P. Collins, C.V. Wright, F. Monrose, M.K. Reiter.pdf 419.3 kB
USENIX Security 2008/Presentations/Hackernomics Slides - Hugh Thompson.pdf 417.2 kB
USENIX Security 2014/Presentations/Dynamic Hooks Hiding Control Flow Changes within Non-Control Data - Sebastian Vogl, Robert Gawlik, Behrad Garmany, Thomas Kittel, Jonas Pfoh, Claudia Eckert, Thorst.pdf 415.9 kB
USENIX Security 2014/Presentations/Privacy in Pharmacogenetics An End-to-End Case Study of Personalized Warfarin Dosing - Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon Lin, David Page, Thomas Ris.pdf 415.3 kB
USENIX Security 2009/Presentations/Improving Tor using a TCP-over-DTLS Tunnel Slides - Joel Reardon, Ian Goldberg.pdf 413.4 kB
USENIX Security 2012/Presentations/Data Node Encrypted File System Efficient Secure Deletion for Flash Memory - Joel Reardon, Srdjan Capkun, David Basin.pdf 413.4 kB
USENIX Security 2011/Presentations/PIR-Tor Scalable Anonymous Communication Using Private Information Retrieval Slides - Prateek Mittal, Femi Olumofin, Carmela Troncoso, Nikita Borisov, Ian Goldberg.pptx 409.6 kB
USENIX Security 2008/Presentations/To Catch a Predator A Natural Language Approach for Eliciting Malicious Payloads - Sam Small, Joshua Mason, Fabian Monrose, Niels Provos, Adam Stubblefield.pdf 409.4 kB
USENIX Security 2012/Presentations/Aurasium Practical Policy Enforcement for Android Applications - Rubin Xu, Hassen Saidi, Ross Anderson.pdf 407.5 kB
USENIX Security 2013/USENIX Security 2013 login article.pdf 406.6 kB
USENIX Security 2008/Presentations/Lest We Remember - Cold Boot Attacks on Encryption Keys_files/memory_2.jpg 405.5 kB
USENIX Security 2018/27th USENIX Security Symposium Grid.htm 405.4 kB
USENIX Security 2009/Presentations/VPriv Protecting Privacy in Location-Based Vehicular Services - Raluca Ada Popa, Hari Balakrishnan, Andrew J. Blumberg.pdf 397.3 kB
USENIX Security 2008/Presentations/Lest We Remember - Cold Boot Attacks on Encryption Keys_files/memory_6.jpg 395.6 kB
USENIX Security 2014/Presentations/BareCloud Bare-metal Analysis-based Evasive Malware Detection - Dhilung Kirat, Giovanni Vigna, Christopher Kruegel.pdf 395.3 kB
USENIX Security 2007/Presentations/Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation - David Brumley, Juan Caballero, Zhenkai Liang.pdf 393.7 kB
USENIX Security 2012/Presentations/Mining Your Ps and Qs Detection of Widespread Weak Keys in Network Devices - Nadia Heninger, Zakir Durumeric, Eric Wustrow, J. Alex Halderm.pdf 386.2 kB
USENIX Security 2017/USENIX Security 2017 Full Proceedings program grid.pdf 385.6 kB
USENIX Security 2014/Presentations/Cardinal Pill Testing of System Virtual Machines - Hao Shi, Abdulla Alwabel, Jelena Mirkovic.pdf 384.9 kB
USENIX Security 2007/Presentations/Spamscatter Characterizing Internet Scam Hosting Infrastructure - David S. Anderson, Chris Fleizach, Stefan Savage, Geoffrey M. Voelker.pdf 383.2 kB
USENIX Security 2010/Presentations/Fast Regular Expression Matching Using Small TCAMs for Network Intrusion Detection and Prevention Systems - Chad R. Meiners, Jignesh Patel, Eric Norige, Eric Torng.pdf 381.8 kB
USENIX Security 2014/Presentations/ASM A Programmable Interface for Extending Android Security - Stephan Heuser, Adwait Nadkarni, William Enck, Ahmad-Reza Sadeghi.pdf 381.6 kB
USENIX Security 2014/Presentations/Optimizing Seed Selection for Fuzzing - Alexandre Rebert, Sang Kil Cha, Thanassis Avgerinos, Jonathan Foote, David Warren, Gustavo Grieco, David Brumley.pdf 377.5 kB
USENIX Security 2007/Presentations/Web-Based Inference Detection - Jessica Staddon, Philippe Golle, Bryce Zimny.pdf 377.2 kB
USENIX Security 2011/Presentations/SMS of Death From Analyzing to Attacking Mobile Phones on a Large Scale - Collin Mulliner, Nico Golde, Jean-Pierre Seifert.pdf 376.8 kB
USENIX Security 2007/Presentations/Exploiting Network Structure for Proactive Spam Mitigation - Shobha Venkataraman, Subhabrata Sen, Oliver Spatscheck, Patrick Haffner, Dawn Song.pdf 371.8 kB
USENIX Security 2014/Presentations/Static Detection of Second-Order Vulnerabilities in Web Applications - Johannes Dahse, Thorsten Holz.pdf 371.6 kB
USENIX Security 2009/Presentations/Return-Oriented Rootkits Bypassing Kernel Code Integrity Protection Mechanisms - Ralf Hund, Thorsten Holz, Felix C. Freiling.pdf 370.4 kB
USENIX Security 2007/Presentations/Memory Performance Attacks Denial of Memory Service in Multi-Core Systems - Thomas Moscibroda, Onur Mutlu.pdf 369.4 kB
USENIX Security 2013/Technical Sessions 2013 USENIX.htm 367.9 kB
USENIX Security 2014/Presentations/Cardinal Pill Testing of System Virtual Machines Slides - Hao Shi, Abdulla Alwabel, Jelena Mirkovic.pdf 367.4 kB
USENIX Security 2014/Presentations/On the Practical Exploitability of Dual EC in TLS Implementations - Stephen Checkoway, Matthew Fredrikson, Ruben Niederhagen, Adam Everspaugh, Matthew Green, Tanja.pdf 365.2 kB
USENIX Security 2014/Presentations/Faster Private Set Intersection Based on OT Extension - Benny Pinkas, Thomas Schneider, Michael Zohner.pdf 363.5 kB
USENIX Security 2009/Presentations/Baggy Bounds Checking An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors Slides - Periklis Akritidis, Manuel Costa, Miguel Castro, Steven Ha.pdf 362.1 kB
USENIX Security 2011/Presentations/Dirty Jobs The Role of Freelance Labor in Web Service Abuse - Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker.pdf 358.0 kB
USENIX Security 2011/Presentations/Dirty Jobs The Role of Freelance Labor in Web Service Abuse - Motoyama.pdf 358.0 kB
USENIX Security 2014/Presentations/Password Managers Attacks and Defenses - David Silver, Suman Jana, and Dan Boneh, Stanford University; Eric Chen, Collin Jackson.pdf 356.3 kB
USENIX Security 2007/Presentations/Language Identification of Encrypted VoIP Traffic Alejandra y Roberto or Alice and Bob - Charles V. Wright, Lucas Ballard, Fabian Monrose, Gerald M. Masson.pdf 356.0 kB
USENIX Security 2007/Presentations/Discoverer Automatic Protocol Reverse Engineering from Network Traces - Weidong Cui, Jayanthkumar Kannan, Helen J. Wang.pdf 350.0 kB
USENIX Security 2011/Presentations/mCarve Carving Attributed Dump Sets Slides - Ton van Deursen, Sjouke Mauw, and Sasa Radomirovic.pdf 347.0 kB
USENIX Security 2012/Technical Sessions 2012 USENIX.htm 345.0 kB
USENIX Security 2007/Presentations/BotHunter Detecting Malware Infection Through IDS-Driven Dialog Correlation - Guofei Gu, Phillip Porras, Vinod Yegneswaran, Martin Fong, Wenke Lee.pdf 339.4 kB
USENIX Security 2008/Presentations/Lest We Remember - Cold Boot Attacks on Encryption Keys_files/mona_30s.png 338.1 kB
USENIX Security 2007/Presentations/Proximity Breeds Danger Emerging Threats in Metro-area Wireless Networks - P. Akritidis, W.Y. Chin, V.T. Lam, S. Sidiroglou, K.G. Anagnostakis.pdf 337.2 kB
USENIX Security 2010/Presentations/Capsicum Practical Capabilities for UNIX - Robert N.M. Watson, Jonathan Anderson, Ben Laurie, Kris Kennaway.pdf 334.0 kB
USENIX Security 2008/Presentations/Lest We Remember - Cold Boot Attacks on Encryption Keys_files/mona_60s.png 332.0 kB
USENIX Security 2014/Presentations/FLUSH-RELOAD A High Resolution, Low Noise, L3 Cache Side-Channel Attack - Yuval Yarom, Katrina Falkner.pdf 330.1 kB
USENIX Security 2011/Presentations/Dark Clouds on the Horizon Using Cloud Storage as Attack Vector and Online Slack Space - Martin Mulazzani, Sebastian Schrittwieser, Manuel Leithner, Markus Huber.pdf 329.8 kB
USENIX Security 2008/Presentations/Practical Symmetric Key Cryptography on Modern Graphics Hardware - Owen Harrison, John Waldron.pdf 325.9 kB
USENIX Security 2011/Presentations/Differential Privacy Under Fire Slides - Andreas Haeberlen, Benjamin C. Pierce, Arjun Narayan.pptx 322.9 kB
USENIX Security 2014/Presentations/Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM - Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, Ulfar Erlingsson, Luis Lozano, Geof.pdf 321.1 kB
USENIX Security 2014/Presentations/Precise Client-side Protection against DOM-based Cross-Site Scripting - Ben Stock, Sebastian Lekies, Tobias Mueller, Patrick Spiegel, and Martin Johns.pdf 314.6 kB
USENIX Security 2009/Presentations/Memory Safety for Low-Level Software Hardware Interactions - John Criswell, Nicolas Geoffray, Pierre et Marie Curie, Vikram Adve.pdf 313.7 kB
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation - Lucas Ballard, Seny Kamara, Michael K. Reiter.pdf 313.5 kB
USENIX Security 2012/Presentations/kGuard Lightweight Kernel Protection against Return-to-User Attacks - Vasileios P. Kemerlis, Georgios Portokalidis, and Angelos D. Keromytis.pdf 311.2 kB
USENIX Security 2009/Presentations/Physical-layer Identification of RFID Devices Slides - Boris Danev, Thomas S. Heydt-Benjamin, Srdjan Capkun.pdf 307.9 kB
USENIX Security 2008/Presentations/Verifying Compliance of Trusted Programs - Sandra Rueda, Dave King, Trent Jaeger.pdf 307.7 kB
USENIX Security 2014/Presentations/Effective Attacks and Provable Defenses for Website Fingerprinting - Tao Wang, Xiang Cai, Rishab Nithyanand, Rob Johnson, Ian Goldberg.pdf 307.7 kB
USENIX Security 2007/Presentations/Binary Obfuscation Using Signals - Igor V. Popov, Saumya K. Debray, Gregory R. Andrews.pdf 307.3 kB
USENIX Security 2010/Presentations/Baaz A System for Detecting Access Control Misconfigurations - Tathagata Das, Ranjita Bhagwan, Prasad Naldurg.pdf 303.6 kB
USENIX Security 2012/Presentations/Chimera A Declarative Language for Streaming Network Traffic Analysis - Kevin Borders, Jonathan Springer, Matthew Burnside.pdf 302.3 kB
USENIX Security 2008/Presentations/Lest We Remember - Cold Boot Attacks on Encryption Keys_files/mona_5s.png 297.5 kB
USENIX Security 2008/Presentations/Privacy-Preserving Location Tracking of Lost or Stolen Devices Cryptographic Techniques and Replacing Trusted Third Parties with DHTs - Thomas Ristenpart, Gabriel Ma.pdf 297.3 kB
USENIX Security 2018/USENIX Security 2018 Program errata_slip.pdf 297.1 kB
USENIX Security 2010/Presentations/BotGrep Finding P2P Bots with Structured Graph Analysis - Shishir Nagaraja, Prateek Mittal, Chi-Yao Hong, Matthew Caesar, Nikita Borisov.pdf 296.0 kB
USENIX Security 2012/Presentations/Policy-Sealed Data A New Abstraction for Building Trusted Cloud Services - Nuno Santos, Rodrigo Rodrigues, Krishna P. Gummadi.pdf 294.3 kB
USENIX Security 2009/Presentations/Nemesis Preventing Authentication and Access Control Vulnerabilities in Web Applications Slides - Michael Dalton, Christos Kozyrakis, Nickolai Zeldovich.pdf 290.9 kB
USENIX Security 2020/sec20_errata_3.pdf 285.1 kB
USENIX Security 2010/Presentations/Making Linux Protection Mechanisms Egalitarian with UserFS - Taesoo Kim, Nickolai Zeldovich.pdf 285.1 kB
USENIX Security 2011/Presentations/Differential Privacy Under Fire - Andreas Haeberlen, Benjamin C. Pierce, Arjun Narayan.pdf 285.0 kB
USENIX Security 2008/Presentations/Selective Versioning in a Secure Disk System - Swaminathan Sundararaman, Gopalan Sivathanu, Erez Zadok.pdf 283.3 kB
USENIX Security 2008/Presentations/Real-World Buffer Overflow Protection for Userspace and Kernelspace - Michael Dalton, Hari Kannan, Christos Kozyrakis.pdf 283.3 kB
USENIX Security 2008/Presentations/Reverse-Engineering a Cryptographic RFID Tag - Karsten Nohl, David Evans, Starbug, Henryk Platz.pdf 282.1 kB
USENIX Security 2012/Presentations/Tachyon Tandem Execution for Efficient Live Patch Testing - Matthew Maurer, David Brumley.pdf 280.9 kB
USENIX Security 2011/Presentations/TRESOR Runs Encryption Securely Outside RAM - Tilo Müller, Felix C. Freiling, Andreas Dewald.pdf 274.0 kB
USENIX Security 2012/Presentations/Billion-Gate Secure Computation with Malicious Adversaries - Benjamin Kreuter, abhi shelat, Chih-hao Shen.pdf 272.4 kB
USENIX Security 2014/Presentations/Dynamic Hooks Hiding Control Flow Changes within Non-Control Data Slides - Sebastian Vogl, Robert Gawlik, Behrad Garmany, Thomas Kittel, Jonas Pfoh, Claudia Eckert.pdf 265.3 kB
USENIX Security 2011/Presentations/mCarve Carving Attributed Dump Sets - Ton van Deursen, Sjouke Mauw, and Sasa Radomirovic.pdf 264.1 kB
USENIX Security 2011/Presentations/Cloaking Malware with the Trusted Platform Module - Alan M. Dunn, Owen S. Hofmann, Brent Waters, Emmett Witchel.pdf 261.8 kB
USENIX Security 2009/Presentations/The Multi-Principal OS Construction of the Gazelle Web Browser - Helen J. Wang, Chris Grier, Alex Moshchuk, Samuel T. King, Piali Choudhury, Herman Venter.pdf 261.2 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/css_IBrrqJUtXAVsLrrlZ8VqVTS3di7E2-x10BVJwZwbroU.css 260.3 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/css_IBrrqJUtXAVsLrrlZ8VqVTS3di7E2-x10BVJwZwbroU.css 260.3 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/css_IBrrqJUtXAVsLrrlZ8VqVTS3di7E2-x10BVJwZwbroU.css 260.3 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/css_IBrrqJUtXAVsLrrlZ8VqVTS3di7E2-x10BVJwZwbroU.css 260.3 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/css_ciODmkFfqCSx2xBu95VX29BZ0r4mdoEz3gy-MriTJBM.css 257.9 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/css_ciODmkFfqCSx2xBu95VX29BZ0r4mdoEz3gy-MriTJBM.css 257.9 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/css_XQfCg5kiuU6ACblHn3rDXdgaKZR8AxbhrQR4Gznu5qA.css 257.3 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/css_XQfCg5kiuU6ACblHn3rDXdgaKZR8AxbhrQR4Gznu5qA.css 257.3 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/css_XQfCg5kiuU6ACblHn3rDXdgaKZR8AxbhrQR4Gznu5qA.css 257.3 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/css_XQfCg5kiuU6ACblHn3rDXdgaKZR8AxbhrQR4Gznu5qA.css 257.3 kB
USENIX Security 2014/Presentations/On the Practical Exploitability of Dual EC in TLS Implementations Slides - Stephen Checkoway, Matthew Fredrikson, Ruben Niederhagen, Adam Everspaugh, Matthew Green.pdf 256.1 kB
USENIX Security 2020/sec20_contents.pdf 255.9 kB
USENIX Security 2008/Presentations/Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking - Michael Martin, Monica S. Lam.pdf 252.9 kB
USENIX Security 2010/Presentations/Toward Automated Detection of Logic Vulnerabilities in Web Applications - Viktoria Felmetsger, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna.pdf 252.8 kB
USENIX Security 2010/Presentations/Automatic Generation of Remediation Procedures for Malware Infections - Paleari.pdf 248.2 kB
USENIX Security 2007/Presentations/OSLO Improving the Security of Trusted Computing - Bernhard Kauer.pdf 247.1 kB
USENIX Security 2007/Presentations/OSLO Improving the Security of Trusted Computing Paper - Bernhard Kauer.pdf 247.1 kB
USENIX Security 2009/Presentations/Cross-Origin JavaScript Capability Leaks Detection, Exploitation, and Defense - Adam Barth, Joel Weinberger, Dawn Song.pdf 238.0 kB
USENIX Security 2012/Presentations/Enemy of the State A State-Aware Black-Box Web Vulnerability Scanner - Adam Doupe, Ludovico Cavedon, Christopher Kruegel, Giovanni Vigna.pdf 236.4 kB
USENIX Security 2010/Presentations/Structuring Protocol Implementations to Protect Sensitive Data - Petr Marchenko, Brad Karp.pdf 234.5 kB
USENIX Security 2019/USENIX Security 2019 Program errata.pdf 234.2 kB
USENIX Security 2011/Presentations/ADsafety Type-Based Verification of JavaScript Sandboxing - Joe Gibbs Politz, Spiridon Aristides Eliopoulos, Arjun Guha, Shriram Krishnamurthi.pdf 230.3 kB
USENIX Security 2008/Presentations/NetAuth Supporting User-Based Network Services - Manigandan Radhakrishnan, Jon A. Solworth.pdf 228.0 kB
USENIX Security 2014/Presentations/Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM Slides - Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, Ulfar Erlingsson, Luis Lozan.pdf 227.3 kB
USENIX Security 2009/Presentations/Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs - David Molnar, Xue Cong Li, David A. Wagner.pdf 226.3 kB
USENIX Security 2009/Presentations/Locating Prefix Hijackers using LOCK - Tongqing Qiu, Lusheng Ji, Dan Pei, Jia Wang, Jun (Jim) Xu, Hitesh Ballani.pdf 223.9 kB
USENIX Security 2014/Presentations/ROP is Still Dangerous Breaking Modern Defenses Slides - Nicholas Carlini, David Wagner.pdf 221.8 kB
USENIX Security 2009/Presentations/Efficient Data Structures for Tamper-Evident Logging - Scott A. Crosby, Dan S. Wallach.pdf 220.9 kB
USENIX Security 2012/Presentations/Optimally Robust Private Information Retrieval - Casey Devet, Ian Goldberg, Nadia Heninger.pdf 217.6 kB
USENIX Security 2011/Presentations/MACE Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery - Chia Yuan Cho, Domagoj Babic, Pongsin Poosankam, Kevin Zhijie Chen, Ed.pdf 216.3 kB
USENIX Security 2009/Presentations/CCCP Secure Remote Storage for Computational RFIDs - Mastooreh Salajegheh, Shane Clark, Benjamin Ransford, Kevin Fu, Ari Juels.pdf 212.1 kB
USENIX Security 2009/Presentations/Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs Slides - David Molnar, Xue Cong Li, David A. Wagner.pdf 211.4 kB
USENIX Security 2017/USENIX Security 2017 Full Proceedings errata.pdf 211.3 kB
USENIX Security 2008/Presentations/An Empirical Security Study of the Native Code in the JDK - Gang Tan, Jason Croft.pdf 210.3 kB
USENIX Security 2010/Presentations/The Case for Ubiquitous Transport-Level Encryption - Andrea Bittau, Michael Hamburg, Mark Handley, David Mazieres, Dan Boneh.pdf 208.2 kB
USENIX Security 2012/Presentations/Impact of Spam Exposure on User Engagement - Anirban Dasgupta, Kunal Punera, Justin M. Rao, Xuanhui Wang.pdf 194.9 kB
USENIX Security 2012/Presentations/An Evaluation of the Google Chrome Extension Security Architecture - Nicholas Carlini, Adrienne Porter Felt, David Wagner.pdf 191.4 kB
USENIX Security 2019/Video/USENIX Security '19 - Security Educational Panel.en.transcribed.srt 189.7 kB
USENIX Security 2009/Presentations/Designing Trustworthy User Agents for a Hostile Web - Eric Lawrence.pdf 186.3 kB
USENIX Security 2007/Presentations/Exploiting Concurrency Vulnerabilities in System Call Wrappers - watson.pdf 185.7 kB
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation.htm 180.6 kB
USENIX Security 2013/Presentations/PCF A Portable Circuit Format for Scalable Two-Party Secure Computation Slides - Ben Kreuter, Benjamin Mood, Abhi Shelat, Kevin Butler.pdf 168.4 kB
USENIX Security 2018/Video/Q Why Do Keynote Speakers Keep Suggesting That Improving Security Is Possible.en.transcribed.srt 155.9 kB
USENIX Security 2009/Presentations/Toward a New Legal Framework for Cybersecurity - Deirdre K. Mulligan.pdf 147.8 kB
USENIX Security 2010/Presentations/Adapting Software Fault Isolation to Contemporary CPU Architectures - David Sehr, Robert Muth, Cliff Biffle, Victor Khimenko, Egor Pasko, Karl Schimpf, Bennet Yee.pdf 145.9 kB
USENIX Security 2009/Presentations/Protecting Confidential Data on Personal Computers with Storage Capsules - Kevin Borders, Eric Vander Weele, Billy Lau, Atul Prakash.pdf 145.6 kB
USENIX Security 2010/Presentations/Securing Script-Based Extensibility in Web Browsers - Vladan Djeric, Ashvin Goel.pdf 145.3 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/cbgapi.loaded_0 144.0 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/cbgapi.loaded_0 144.0 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/cbgapi.loaded_0 144.0 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/cbgapi.loaded_0 144.0 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/cbgapi.loaded_0 144.0 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/cbgapi.loaded_0 144.0 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/cbgapi.loaded_0 144.0 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/cbgapi.loaded_0 144.0 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/cbgapi.loaded_0 144.0 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/cbgapi.loaded_0 144.0 kB
USENIX Security 2009/USENIX Security 2009 Technical Sessions_files/sec09opening.jpg 143.8 kB
USENIX Security 2010/USENIX Security 2010 Technical Sessions_files/sec09opening.jpg 143.8 kB
USENIX Security 2013/Video/The White House s Priorities for Cybersecurity.srt 142.2 kB
USENIX Security 2018/Video/Chipmunk or Pepe Using Acoustical Analysis to Detect Voice-Channel Fraud at Scale.en.transcribed.srt 142.2 kB
USENIX Security 2012/Presentations/Taking Proof-Based Verified Computation a Few Steps Closer to Practicality Slides - Srinath Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Andrew J. Blumberg, Michael Walfish.pdf 141.6 kB
USENIX Security 2010/Presentations/End-to-End Arguments The Internet and Beyond - David P. Reed.pdf 140.2 kB
USENIX Security 2013/Video/Dr. Felten Goes To Washington Lessons from 18 Months in Government.srt 139.4 kB
USENIX Security 2018/27th USENIX Security Symposium Grid_files/main-current.css 135.9 kB
USENIX Security 2019/28th USENIX Security Symposium Grid_files/main-current.css 135.9 kB
USENIX Security 2008/Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera22x.png 135.5 kB
USENIX Security 2019/Video/USENIX Security '19 - Tackling the Trust and Safety Crisis.en.transcribed.srt 135.4 kB
USENIX Security 2018/Video/Solving the Next Billion-People Privacy Problem.en.transcribed.srt 133.4 kB
USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/js_wKyFX46tVKJtPKN12qNjRfS4aubW4G2u7LK22vlDiKo.js 133.2 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/js_wKyFX46tVKJtPKN12qNjRfS4aubW4G2u7LK22vlDiKo.js 133.2 kB
USENIX Security 2020/sec20_message.pdf 133.1 kB
USENIX Security 2018/Video/The Law and Economics of Bug Bounties.en.transcribed.srt 133.0 kB
USENIX Security 2019/USENIX Security 2019 USENIX.htm 132.9 kB
USENIX Security 2020/USENIX Security 2020 Panels/USENIX Security 20 - Panel Digital Contact Tracing.eng.srt 132.7 kB
USENIX Security 2020/Videos/USENIX Security 20 - Panel Digital Contact Tracing.eng.srt 132.7 kB
USENIX Security 2018/Video/The Second Crypto War-What's Different Now.en.transcribed.srt 131.8 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/js_U0vng6nr8yfSzrWPiyS9QtbOsmQ8XMOn1mS4JIpHltg.js 131.3 kB
USENIX Security 2018/USENIX Security 2018 Program at a Glance USENIX_files/css_Tvyih1Dm489siBROXzFSkKUCFbsEK9kCr0p3JDiev80.css 129.3 kB
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/css_Tvyih1Dm489siBROXzFSkKUCFbsEK9kCr0p3JDiev80.css 129.3 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/css_Tvyih1Dm489siBROXzFSkKUCFbsEK9kCr0p3JDiev80.css 129.3 kB
USENIX Security 2019/USENIX Security 2019 Program at a Glance USENIX_files/css_Tvyih1Dm489siBROXzFSkKUCFbsEK9kCr0p3JDiev80.css 129.3 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/css_Tvyih1Dm489siBROXzFSkKUCFbsEK9kCr0p3JDiev80.css 129.3 kB
USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/css_Tvyih1Dm489siBROXzFSkKUCFbsEK9kCr0p3JDiev80.css 129.3 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/css_Tvyih1Dm489siBROXzFSkKUCFbsEK9kCr0p3JDiev80.css 129.3 kB
USENIX Security 2013/Video/Security Team 2.0.srt 129.0 kB
USENIX Security 2013/Video/Building Securable Infrastructure Open-Source Private Clouds.srt 128.5 kB
USENIX Security 2015/Video/Conducting Usable Security Studies It s Complicated.srt 128.4 kB
USENIX Security 2008/Presentations/Lest We Remember - Cold Boot Attacks on Encryption Keys_files/mona_300s.png 127.9 kB
USENIX Security 2020/USENIX Security 2020 Panels/USENIX Security 20 - Panel The 2020 Election Remote Voting, Disinformation, and Audit.eng.srt 127.6 kB
USENIX Security 2020/Videos/USENIX Security 20 - Panel The 2020 Election Remote Voting, Disinformation, and Audit.eng.srt 127.6 kB
USENIX Security 2020/sec20_title_copyright_organizers.pdf 126.7 kB
USENIX Security 2018/Video/Privacy for Tigers.en.transcribed.srt 126.3 kB
USENIX Security 2020/USENIX Security '20 USENIX.html 125.1 kB
USENIX Security 2008/Presentations/Lest We Remember - Cold Boot Attacks on Encryption Keys.htm 122.7 kB
USENIX Security 2013/Video/Confessions of a Recovering Data Broker.srt 121.2 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js 120.3 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js 120.3 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js 120.3 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js 120.3 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js 120.3 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js 120.3 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js 120.3 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js 120.3 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js 120.3 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js 120.3 kB
USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js 120.3 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js 120.3 kB
USENIX Security 2018/USENIX Security 2018 Program at a Glance USENIX_files/js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js 120.3 kB
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js 120.3 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js 120.3 kB
USENIX Security 2019/USENIX Security 2019 Program at a Glance USENIX_files/js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js 120.3 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/js_dYOGV15VEcvR5zyP3UKzyEH3a6wcYkaWkQCEZ8Wpd8c.js 120.3 kB
USENIX Security 2019/Video/USENIX Security '19 - Shining Light on Internet-based Crimes Against Children.en.transcribed.srt 119.4 kB
USENIX Security 2015/Video/Inherent Cyber Insecurity and Our National Security Surviving on a Diet of Poisoned Fruit.srt 119.3 kB
USENIX Security 2008/Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera23x.png 118.4 kB
USENIX Security 2008/Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services.htm 111.2 kB
USENIX Security 2019/Video/USENIX Security '19 - The Spies Hacking our Phones are Going Dark, and We're All in Trouble.en.transcribed.srt 110.8 kB
USENIX Security 2015/Video/Preventing Security Bugs through Software Design.srt 110.0 kB
USENIX Security 2015/Video/Why Johnny and Janie Can’t Code Safely Bringing Software Assurance to the Masses.srt 110.0 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/js_5eZSC3tfzCwTta-_4qxrBau4YdctcIhVqovRK7sPRFo.js 107.7 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/js_5eZSC3tfzCwTta-_4qxrBau4YdctcIhVqovRK7sPRFo.js 107.7 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/js_5eZSC3tfzCwTta-_4qxrBau4YdctcIhVqovRK7sPRFo.js 107.7 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/js_5eZSC3tfzCwTta-_4qxrBau4YdctcIhVqovRK7sPRFo.js 107.7 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/js_5eZSC3tfzCwTta-_4qxrBau4YdctcIhVqovRK7sPRFo.js 107.7 kB
USENIX Security 2018/Video/Medical Device Cybersecurity through the FDA Lens.en.transcribed.srt 107.5 kB
USENIX Security 2018/USENIX Security 2018 USENIX.htm 106.9 kB
USENIX Security 2020/sec20_errata_1.pdf 106.1 kB
USENIX Security 2018/Video/Analogy Cyber Security-From 0101 to Mixed Signals.en.transcribed.srt 105.1 kB
USENIX Security 2016/USENIX Security 2016 Full Proceedings errata2.pdf 104.6 kB
USENIX Security 2011/USENIX Security 2011 Poster Session_files/sec11_banner.jpg 103.8 kB
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/sec08_banner_750.jpg 102.2 kB
USENIX Security 2008/Presentations/USENIX Security 2008 Poster Session_files/sec08_banner_750.jpg 102.2 kB
USENIX Security 2008/USENIX Security 2008 Technical Sessions_files/sec08_banner_750.jpg 102.2 kB
USENIX Security 2008/USENIX Security 2008 WiPs_files/sec08_banner_750.jpg 102.2 kB
USENIX Security 2008/Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera4x.png 102.0 kB
USENIX Security 2009/Presentations/JavaScript Security - sec09_corrigendum.pdf 101.6 kB
USENIX Security 2009/Presentations/USENIX Security 2009 - Corrigendum.pdf 101.6 kB
USENIX Security 2015/USENIX Security 2015 USENIX.htm 100.6 kB
USENIX Security 2016/USENIX Security 2016 USENIX.htm 99.5 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/js_ILONILlX06kZtY3IVUMaeuMs_GJ1hSJY46daikoF9fA.js 99.4 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/js_ILONILlX06kZtY3IVUMaeuMs_GJ1hSJY46daikoF9fA.js 99.4 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/js_ILONILlX06kZtY3IVUMaeuMs_GJ1hSJY46daikoF9fA.js 99.4 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/js_ILONILlX06kZtY3IVUMaeuMs_GJ1hSJY46daikoF9fA.js 99.4 kB
USENIX Security 2019/USENIX Security 2019 Program errata-4.pdf 98.8 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/widgets.js 98.5 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/widgets.js 98.5 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/widgets.js 98.5 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/widgets.js 98.5 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/widgets.js 98.5 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/widgets.js 98.5 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/widgets.js 98.5 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/widgets.js 98.5 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/widgets.js 98.5 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/widgets.js 98.5 kB
USENIX Security 2020/sec20_errata_2.pdf 98.0 kB
USENIX Security 2010/Presentations/USENIX Security 2010 Errata.pdf 97.9 kB
USENIX Security 2018/27th USENIX Security Symposium Grid_files/jquery.js 97.2 kB
USENIX Security 2019/28th USENIX Security Symposium Grid_files/jquery_002.js 97.2 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/cbgapi.loaded_1 97.1 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/cbgapi.loaded_1 97.1 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/cbgapi.loaded_1 97.1 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/cbgapi.loaded_1 97.1 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/cbgapi.loaded_1 97.1 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/cbgapi.loaded_1 97.1 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/cbgapi.loaded_1 97.1 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/cbgapi.loaded_1 97.1 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/cbgapi.loaded_1 97.1 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/cbgapi.loaded_1 97.1 kB
USENIX Security 2018/27th USENIX Security Symposium Grid_files/jquery_003.js 96.4 kB
USENIX Security 2019/28th USENIX Security Symposium Grid_files/jquery_004.js 96.4 kB
USENIX Security 2016/USENIX Security 2016 Full Proceedings errata.pdf 95.9 kB
USENIX Security 2018/27th USENIX Security Symposium Grid_files/bootstrap-custom.css 94.0 kB
USENIX Security 2019/28th USENIX Security Symposium Grid_files/bootstrap-custom.css 94.0 kB
USENIX Security 2019/Video/USENIX Security '19 - Baby Steps towards the Precipice How the Web Became a Scary.en.transcribed.srt 93.3 kB
USENIX Security 2017/USENIX Security 2017 USENIX.htm 92.5 kB
USENIX Security 2014/Video/Phone Phreaks What We Can Learn From the First Network Hackers.srt 92.0 kB
USENIX Security 2018/Video/Practical Accountability of Secret Processes.en.transcribed.srt 89.1 kB
USENIX Security 2019/Video/USENIX Security '19 - Lessons Learned from Evaluating the Robustness of Defenses to.en.transcribed.srt 88.7 kB
USENIX Security 2013/USENIX Security 2013 USENIX.htm 88.6 kB
USENIX Security 2018/Video/Security Namespace Making Linux Security Frameworks Available to Containers.en.transcribed.srt 87.0 kB
USENIX Security 2008/Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera12x.png 86.4 kB
USENIX Security 2019/Video/USENIX Security '19 - Security Research and Public Policy.en.transcribed.srt 86.2 kB
USENIX Security 2019/USENIX Security 2019 Program errata-5.pdf 86.0 kB
USENIX Security 2019/USENIX Security 2019 Program at a Glance USENIX.htm 85.8 kB
USENIX Security 2019/Video/USENIX Security '19 - Evaluating Mobile Messengers for Implementation Vulnerabilities.en.transcribed.srt 85.1 kB
USENIX Security 2018/Video/Enter the Hydra Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts.en.transcribed.srt 85.1 kB
USENIX Security 2013/Video/Tracking the Casino Computer Wars Who 1s Winning-the Casino or the Cheat.srt 84.8 kB
USENIX Security 2014/USENIX Security 2014 USENIX.htm 84.6 kB
USENIX Security 2019/Video/USENIX Security '19 - Lessons Learned About Building Secure Software It's About the Developers!.en.transcribed.srt 84.1 kB
USENIX Security 2010/USENIX Security 2010 Technical Sessions.htm 83.7 kB
USENIX Security 2018/Video/Skill Squatting Attacks on Amazon Alexa.en.transcribed.srt 83.0 kB
USENIX Security 2007/Presentations/Flayer Exposing Application Internals - Will Drewry, Tavis Ormandy .pdf 82.9 kB
USENIX Security 2018/Video/The Secure Socket API TLS as an Operating System Service.en.transcribed.srt 82.4 kB
USENIX Security 2012/USENIX Security 2012 USENIX.htm 82.0 kB
USENIX Security 2009/USENIX Security 2009 Technical Sessions.htm 81.7 kB
USENIX Security 2018/USENIX Security 2018 Program at a Glance USENIX.htm 81.1 kB
USENIX Security 2008/Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera29x.png 80.8 kB
USENIX Security 2019/Video/USENIX Security '19 - Embracing the Hack. A Better Strategy for Team-Defense.en.transcribed.srt 79.7 kB
USENIX Security 2017/USENIX Security 2017 Full Proceedings errata 2.pdf 79.4 kB
USENIX Security 2011/USENIX Security 2011 Proceedings Errata.pdf 79.3 kB
USENIX Security 2015/Presentations/sec15_contents-update.pdf 79.1 kB
USENIX Security 2008/Presentations/Practical Symmetric Key Cryptography on Modern Graphics Hardware.htm 77.8 kB
USENIX Security 2013/USENIX Security 2013 Proceedings erratum.pdf 77.1 kB
USENIX Security 2018/Video/Better managed than memorized Studying the Impact of Managers on Password Strength and Reuse.en.transcribed.srt 76.8 kB
USENIX Security 2008/Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera11x.png 76.8 kB
USENIX Security 2019/Video/USENIX Security '19 - From Privacy by Design to Data Protection by Design The Challenges of.en.transcribed.srt 76.7 kB
USENIX Security 2018/Video/DelegaTEE Brokered Delegation Using Trusted Execution Environments.en.transcribed.srt 76.3 kB
USENIX Security 2018/Video/Translation Leak-aside Buffer Defeating Cache Side-channel Protections with TLB Attacks.en.transcribed.srt 75.1 kB
USENIX Security 2018/Video/Fast and Service-preserving Recovery from Malware Infections Using CRIU.en.transcribed.srt 74.7 kB
USENIX Security 2018/27th USENIX Security Symposium Grid_files/main.js 73.7 kB
USENIX Security 2019/28th USENIX Security Symposium Grid_files/main.js 73.7 kB
USENIX Security 2019/USENIX Security 2019 Program errata-6.pdf 73.7 kB
USENIX Security 2018/Video/Quack Scalable Remote Measurement of Application-Layer Censorship.en.transcribed.srt 73.0 kB
USENIX Security 2008/USENIX Security 2008 Technical Sessions.htm 72.4 kB
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/security07_banner.jpg 71.7 kB
USENIX Security 2007/Presentations/Security 2007 Poster Session_files/security07_banner.jpg 71.7 kB
USENIX Security 2018/Video/Turning Your Weakness Into a Strength Watermarking Deep Neural Networks by Backdooring.en.transcribed.srt 71.5 kB
USENIX Security 2018/Video/A4NT Author Attribute Anonymity by Adversarial Training of Neural Machine Translation.en.transcribed.srt 70.5 kB
USENIX Security 2008/Presentations/Reverse-Engineering a Cryptographic RFID Tag_files/Mifare-anotated.jpg 70.5 kB
USENIX Security 2008/Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera19x.png 70.1 kB
USENIX Security 2018/Video/When Does Machine Learning FAIL Generalized Transferability for Evasion and Poisoning Attacks.en.transcribed.srt 69.4 kB
USENIX Security 2018/Video/Automatic Heap Layout Manipulation for Exploitation.en.transcribed.srt 68.7 kB
USENIX Security 2008/Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera28x.png 68.4 kB
USENIX Security 2019/USENIX Security 2019 Program errata-2.pdf 68.3 kB
USENIX Security 2018/Video/MoonShine Optimizing OS Fuzzer Seed Selection with Trace Distillation.en.transcribed.srt 66.6 kB
USENIX Security 2018/Video/The Rewards and Costs of Stronger Passwords in a University Linking Password Lifetime to Strength.en.transcribed.srt 65.9 kB
USENIX Security 2008/Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera25x.png 65.8 kB
USENIX Security 2018/Video/Bamboozling Certificate Authorities with BGP.en.transcribed.srt 65.6 kB
USENIX Security 2018/Video/BlackIoT IoT Botnet of High Wattage Devices Can Disrupt the Power Grid.en.transcribed.srt 65.1 kB
USENIX Security 2018/Video/Plug and Prey Measuring the Commoditization of Cybercrime via Online Anonymous Markets.en.transcribed.srt 65.0 kB
USENIX Security 2018/Video/The Dangers of Key Reuse Practical Attacks on IPsec IKE.en.transcribed.srt 64.4 kB
USENIX Security 2008/Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera15x.png 63.9 kB
USENIX Security 2018/Video/Effective Detection of Multimedia Protocol Tunneling using Machine Learning.en.transcribed.srt 63.7 kB
USENIX Security 2018/Video/Rethinking Access Control and Authentication for the Home Internet of Things (IoT).en.transcribed.srt 63.6 kB
USENIX Security 2018/Video/SAQL A Stream-based Query System for Real-Time Abnormal System Behavior Detection.en.transcribed.srt 63.3 kB
USENIX Security 2018/Video/The Guard's Dilemma Efficient Code-Reuse Attacks Against Intel SGX.en.transcribed.srt 63.3 kB
USENIX Security 2018/Video/Towards Predicting Efficient and Anonymous Tor Circuits.en.transcribed.srt 63.1 kB
USENIX Security 2014/Presentations/Privacy in Pharmacogenetics An End-to-End Case Study of Personalized Warfarin Dosing Eratta - Matthew Fredrikson, Eric Lantz, Somesh Jha, Simon Lin, David Page, Tho.pdf 63.0 kB
USENIX Security 2014/USENIX Security 2014 Full Proceedings errata_slip.pdf 63.0 kB
USENIX Security 2018/Video/Malicious Management Unit Why Stopping Cache Attacks in Software is Harder Than You Think.en.transcribed.srt 63.0 kB
USENIX Security 2018/Video/NetHide Secure and Practical Network Topology Obfuscation.en.transcribed.srt 63.0 kB
USENIX Security 2017/USENIX Security 2017 Full Proceedings errata 3.pdf 62.2 kB
USENIX Security 2018/Video/BurnBox Self-Revocable Encryption in a World Of Compelled Access.en.transcribed.srt 62.0 kB
USENIX Security 2018/Video/Tackling runtime-based obfuscation in Android with TIRO.en.transcribed.srt 62.0 kB
USENIX Security 2018/Video/A Sense of Time for JavaScript and Node.js.en.transcribed.srt 61.6 kB
USENIX Security 2018/Video/Return Of Bleichenbacher's Oracle Threat (ROBOT).en.transcribed.srt 61.2 kB
USENIX Security 2018/Video/Guarder A Tunable Secure Allocator.en.transcribed.srt 61.0 kB
USENIX Security 2008/Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera27x.png 60.9 kB
USENIX Security 2018/Video/Polisis Automated Analysis and Presentation of Privacy Policies Using Deep Learning.en.transcribed.srt 60.6 kB
USENIX Security 2018/Video/An Empirical Analysis of Anonymity in Zcash.en.transcribed.srt 60.1 kB
USENIX Security 2013/Video/Windows 8 Security Supporting User Confidence.srt 60.0 kB
USENIX Security 2018/Video/Modelling and Analysis of a Hierarchy of Distance Bounding Attacks.en.transcribed.srt 59.4 kB
USENIX Security 2018/Video/Precise and Accurate Patch Presence Test for Binaries.en.transcribed.srt 59.4 kB
USENIX Security 2018/Video/HeapHopper Bringing Bounded Model Checking to Heap Implementation Security.en.transcribed.srt 59.0 kB
USENIX Security 2018/Video/Arbitrum Scalable, private smart contracts.en.transcribed.srt 58.8 kB
USENIX Security 2018/Video/DATA - Differential Address Trace Analysis Finding Address-based Side-Channels in Binaries.en.transcribed.srt 58.5 kB
USENIX Security 2018/Video/Dependence-Preserving Data Compaction for Scalable Forensic Analysis.en.transcribed.srt 58.4 kB
USENIX Security 2018/Video/With Great Training Comes Great Vulnerability Practical Attacks against Transfer Learning.en.transcribed.srt 58.4 kB
USENIX Security 2008/Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera26x.png 57.8 kB
USENIX Security 2018/Video/Debloating Software through Piece-Wise Compilation and Loading.en.transcribed.srt 57.8 kB
USENIX Security 2018/Video/Meltdown Reading Kernel Memory from User Space.en.transcribed.srt 57.5 kB
USENIX Security 2018/Video/The Battle for New York A Case Study of Applied Digital Threat Modeling at the Enterprise Level.en.transcribed.srt 57.1 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/js_2sjNGyfj3O57w8bimxly5mzgG70GrcIxxxYOEInwu1Q.js 57.0 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/js_2sjNGyfj3O57w8bimxly5mzgG70GrcIxxxYOEInwu1Q.js 57.0 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/js_2sjNGyfj3O57w8bimxly5mzgG70GrcIxxxYOEInwu1Q.js 57.0 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/js_2sjNGyfj3O57w8bimxly5mzgG70GrcIxxxYOEInwu1Q.js 57.0 kB
USENIX Security 2018/Video/The Broken Shield Measuring Revocation Effectiveness in the Windows Code-Signing PKI.en.transcribed.srt 56.9 kB
USENIX Security 2018/Video/Fp-Scanner The Privacy Implications of Browser Fingerprint Inconsistencies.en.transcribed.srt 56.8 kB
USENIX Security 2018/Video/Unveiling and Quantifying Facebook Exploitation of Sensitive Personal Data for Advertising Purposes.en.transcribed.srt 56.8 kB
USENIX Security 2018/Video/End-to-End Measurements of Email Spoofing Attacks.en.transcribed.srt 56.4 kB
USENIX Security 2018/Video/SAD THUG Structural Anomaly Detection for Transmissions of High-value Information Using Graphics.en.transcribed.srt 55.9 kB
USENIX Security 2018/Video/ATtention Spanned Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem.en.transcribed.srt 55.5 kB
USENIX Security 2018/Video/All Your GPS Are Belong To Us Towards Stealthy Manipulation of Road Navigation Systems.en.transcribed.srt 55.3 kB
USENIX Security 2018/Video/Erays Reverse Engineering Ethereum's Opaque Smart Contracts.en.transcribed.srt 55.2 kB
USENIX Security 2018/Video/How Do Tor Users Interact With Onion Services.en.transcribed.srt 55.0 kB
USENIX Security 2018/Video/Fear the Reaper Characterization and Fast Detection of Card Skimmers.en.transcribed.srt 54.9 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/postmessageRelay_data/cbgapi.loaded_0 54.9 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/postmessageRelay_data/cbgapi.loaded_0 54.9 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/postmessageRelay_data/cbgapi.loaded_0 54.9 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/postmessageRelay_data/cbgapi.loaded_0 54.9 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/postmessageRelay_data/cbgapi.loaded_0 54.9 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/postmessageRelay_data/cbgapi.loaded_0 54.9 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/postmessageRelay_data/cbgapi.loaded_0 54.9 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/postmessageRelay_data/cbgapi.loaded_0 54.9 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/postmessageRelay_data/cbgapi.loaded_0 54.9 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/postmessageRelay_data/cbgapi.loaded_0 54.9 kB
USENIX Security 2018/Video/A Bad Dream Subverting Trusted Platform Module While You Are Sleeping.en.transcribed.srt 54.3 kB
USENIX Security 2018/Video/From Patching Delays to Infection Symptoms....en.transcribed.srt 54.3 kB
USENIX Security 2018/Video/Analysis of Privacy Protections in Fitness Tracking Social Networks -or- You can run.en.transcribed.srt 54.1 kB
USENIX Security 2018/Video/ACES Automatic Compartments for Embedded Systems.en.transcribed.srt 53.6 kB
USENIX Security 2018/Video/Who Left Open the Cookie Jar A Comprehensive Evaluation of Third-Party Cookie Policies.en.transcribed.srt 53.5 kB
USENIX Security 2018/Video/Formal Security Analysis of Neural Networks using Symbolic Intervals.en.transcribed.srt 53.2 kB
USENIX Security 2018/Video/Understanding the Reproducibility of Crowd-reported Security Vulnerabilities.en.transcribed.srt 53.2 kB
USENIX Security 2018/Video/CommanderSong A Systematic Approach for Practical Adversarial Voice Recognition.en.transcribed.srt 53.0 kB
USENIX Security 2018/Video/Shielding Software From Privileged Side-Channel Attacks.en.transcribed.srt 53.0 kB
USENIX Security 2018/Video/O Single Sign-Off, Where Art Thou An Empirical Analysis of Single Sign-On.en.transcribed.srt 52.7 kB
USENIX Security 2018/Video/Freezing the Web A Study of ReDoS Vulnerabilities in JavaScript-based Web Servers.en.transcribed.srt 52.3 kB
USENIX Security 2018/Video/DIZK A Distributed Zero Knowledge Proof System.en.transcribed.srt 51.6 kB
USENIX Security 2018/Video/The aftermath of a crypto-ransomware attack at a large academic institution.en.transcribed.srt 51.6 kB
USENIX Security 2018/Video/QSYM A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing.en.transcribed.srt 51.5 kB
USENIX Security 2018/Video/Towards a Secure Zero-rating Framework with Three Parties.en.transcribed.srt 51.4 kB
USENIX Security 2010/Presentations/Toward an Open and Secure Platform for Using the Web - Will Drewry.html 51.2 kB
USENIX Security 2008/Presentations/Reverse-Engineering a Cryptographic RFID Tag_files/Mifare-orig-scale.jpg 50.8 kB
USENIX Security 2018/Video/We Still Don't Have Secure Cross-Domain Requests an Empirical Study of CORS.en.transcribed.srt 50.7 kB
USENIX Security 2018/Video/Charm Facilitating Dynamic Analysis of Device Drivers of Mobile Systems.en.transcribed.srt 50.2 kB
USENIX Security 2018/Video/Discovering Flaws in Security-Focused Static Analysis Tools for Android using Systematic Mutation.en.transcribed.srt 50.0 kB
USENIX Security 2018/Video/NAVEX Precise and Scalable Exploit Generation for Dynamic Web Applications.en.transcribed.srt 49.9 kB
USENIX Security 2018/Video/Off-Path TCP Exploit How Wireless Routers Can Jeopardize Your Secrets.en.transcribed.srt 49.8 kB
USENIX Security 2018/Video/Inception System-Wide Security Testing of Real-World Embedded Systems Software.en.transcribed.srt 49.6 kB
USENIX Security 2018/Video/Reading Thieves' Cant Automatically Identifying and Understanding Dark Jargons from Cybercrime.en.transcribed.srt 49.6 kB
USENIX Security 2018/Video/FlowCog Context-aware Semantics Extraction and Analysis of Information Flow Leaks in Android Apps.en.transcribed.srt 49.5 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/plusone.js 49.0 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/plusone.js 49.0 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/plusone.js 49.0 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/plusone.js 49.0 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/plusone.js 49.0 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/plusone.js 49.0 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/plusone.js 49.0 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/plusone.js 49.0 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/plusone.js 49.0 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/plusone.js 49.0 kB
USENIX Security 2018/Video/Who Is Answering My Queries Understanding and Characterizing Interception....en.transcribed.srt 48.5 kB
USENIX Security 2015/Presentations/sec15_title_organizers.pdf 48.0 kB
USENIX Security 2018/Video/Man-in-the-Machine Exploiting Ill-Secured Communication Inside the Computer.en.transcribed.srt 47.8 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/js_sWOO4PbSe161nCKWEJProMMhdbu_pfXMDzdRrMGBIE0.js 47.6 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/js_sWOO4PbSe161nCKWEJProMMhdbu_pfXMDzdRrMGBIE0.js 47.6 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/js_zKsxChQ0ZiM23lE1j-H3wIlMQpnOrGQN3oQ-70N6r40.js 47.6 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/js_sWOO4PbSe161nCKWEJProMMhdbu_pfXMDzdRrMGBIE0.js 47.6 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/js_sWOO4PbSe161nCKWEJProMMhdbu_pfXMDzdRrMGBIE0.js 47.6 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/js_sWOO4PbSe161nCKWEJProMMhdbu_pfXMDzdRrMGBIE0.js 47.6 kB
USENIX Security 2018/Video/WPSE Fortifying Web Protocols via Browser-Side Security Monitoring.en.transcribed.srt 47.5 kB
USENIX Security 2019/Video/USENIX Security '19 - Please Pay Inside Evaluating Bluetooth-based Detection of Gas Pump Skimmers.en.transcribed.srt 46.9 kB
USENIX Security 2018/Video/IMIX In-Process Memory Isolation EXtension.en.transcribed.srt 46.8 kB
USENIX Security 2019/Video/USENIX Security '19 - JEDI Many-to-Many End-to-End Encryption and Key Delegation for IoT.en.transcribed.srt 46.4 kB
USENIX Security 2018/Video/An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications.en.transcribed.srt 45.9 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/analytics.js 45.2 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/analytics.js 45.2 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/analytics.js 45.2 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/analytics.js 45.2 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/analytics.js 45.2 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/analytics.js 45.2 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/analytics.js 45.2 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/analytics.js 45.2 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/analytics.js 45.2 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/analytics.js 45.2 kB
USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/analytics.js 45.2 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/analytics.js 45.2 kB
USENIX Security 2018/USENIX Security 2018 Program at a Glance USENIX_files/analytics.js 45.2 kB
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/analytics.js 45.2 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/analytics.js 45.2 kB
USENIX Security 2019/USENIX Security 2019 Program at a Glance USENIX_files/analytics.js 45.2 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/analytics.js 45.2 kB
USENIX Security 2008/Presentations/Reverse-Engineering a Cryptographic RFID Tag.htm 45.1 kB
USENIX Security 2019/Video/USENIX Security '19 - Protecting accounts from credential stuffing with password breach alerting.en.transcribed.srt 44.9 kB
USENIX Security 2019/Video/USENIX Security '19 - Detecting and Characterizing Lateral Phishing at Scale.en.transcribed.srt 44.4 kB
USENIX Security 2015/Presentations/sec15_message.pdf 43.9 kB
USENIX Security 2018/Video/FANCI Feature-based Automated NXDomain Classification and Intelligence.en.transcribed.srt 43.7 kB
USENIX Security 2019/Video/USENIX Security '19 - The Art of The Scam Demystifying Honeypots in Ethereum Smart Contracts.en.transcribed.srt 43.1 kB
USENIX Security 2019/Video/USENIX Security '19 - WAVE A Decentralized Authorization Framework with Transitive Delegation.en.transcribed.srt 42.9 kB
USENIX Security 2015/Video/Investigating the Computer Security Practices and Needs of Journalists.srt 42.7 kB
USENIX Security 2018/Video/Enabling Refinable Cross-Host Attack Investigation with Efficient Data Flow Tagging and Tracking.en.transcribed.srt 42.3 kB
USENIX Security 2019/Video/USENIX Security '19 - Inadvertently Making Cyber Criminals Rich A Comprehensive Study of.en.transcribed.srt 41.6 kB
USENIX Security 2019/Video/USENIX Security '19 - Understanding and Improving Security and Privacy in Multi-User.en.transcribed.srt 41.6 kB
USENIX Security 2018/Video/End-Users Get Maneuvered Empirical Analysis of Redirection Hijacking in Content Delivery Networks.en.transcribed.srt 40.6 kB
USENIX Security 2015/Video/Trustworthy Whole-System Provenance for the Linux Kernel.srt 40.5 kB
USENIX Security 2019/Video/USENIX Security '19 - Leaky Images Targeted Privacy Attacks in the Web.en.transcribed.srt 40.4 kB
USENIX Security 2013/Video/Dismantling Megamos Crypto Wirelessly Lockpicking a Vehicle Immobilizer.srt 40.3 kB
USENIX Security 2015/Video/The Unexpected Dangers of Dynamic JavaScript.srt 40.3 kB
USENIX Security 2019/Video/USENIX Security '19 - Evaluating the Contextual Integrity of Privacy Regulation Parents' IoT.en.transcribed.srt 40.1 kB
USENIX Security 2019/Video/USENIX Security '19 - Misleading Authorship Attribution of Source Code using Adversarial Learning.en.transcribed.srt 39.9 kB
USENIX Security 2019/Video/USENIX Security '19 - Scalable Scanning and Automatic Classification of TLS Padding Oracle.en.transcribed.srt 39.6 kB
USENIX Security 2018/Video/Sensitive Information Tracking in Commodity IoT.en.transcribed.srt 39.3 kB
USENIX Security 2018/Video/Schrödinger's RAT Profiling the Stakeholders in the Remote Access Trojan Ecosystem.en.transcribed.srt 39.3 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/sec16_button_180.png 39.2 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/sec16_button_180.png 39.2 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/sec16_button_180.png 39.2 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/sec16_button_180.png 39.2 kB
USENIX Security 2019/Video/USENIX Security '19 - Platforms in Everything Analyzing Ground-Truth Data on the Anatomy and.en.transcribed.srt 39.0 kB
USENIX Security 2019/Video/USENIX Security '19 - simTPM User-centric TPM for Mobile Devices.en.transcribed.srt 39.0 kB
USENIX Security 2019/Video/USENIX Security '19 - On (The Lack Of) Location Privacy in Crowdsourcing Applications.en.transcribed.srt 39.0 kB
USENIX Security 2019/Video/USENIX Security '19 - The Secret Sharer Evaluating and Testing Unintended Memorization in.en.transcribed.srt 38.9 kB
USENIX Security 2019/Video/USENIX Security '19 - in-toto Providing farm-to-table guarantees for bits and bytes.en.transcribed.srt 38.8 kB
USENIX Security 2018/Video/Forgetting of Passwords Ecological Theory and Data.en.transcribed.srt 38.7 kB
USENIX Security 2019/Video/USENIX Security '19 - CONFIRM Evaluating Compatibility and Relevance of Control-flow.en.transcribed.srt 38.6 kB
USENIX Security 2019/Video/USENIX Security '19 - Site Isolation Process Separation for Web Sites within the Browser.en.transcribed.srt 38.5 kB
USENIX Security 2019/Video/USENIX Security '19 - All Things Considered An Analysis of IoT Devices on Home Networks.en.transcribed.srt 38.4 kB
USENIX Security 2019/Video/USENIX Security '19 - Point Break A Study of Bandwidth Denial-of-Service Attacks against Tor.en.transcribed.srt 38.4 kB
USENIX Security 2018/27th USENIX Security Symposium Grid_files/jquery_004.js 38.3 kB
USENIX Security 2019/28th USENIX Security Symposium Grid_files/jquery.js 38.3 kB
USENIX Security 2018/Video/Injected and Delivered Fabricating Implicit Control over Actuation Systems by Spoofing.en.transcribed.srt 38.1 kB
USENIX Security 2019/Video/USENIX Security '19 - A Study of the Feasibility of Co-located App Attacks against BLE.en.transcribed.srt 37.9 kB
USENIX Security 2019/Video/USENIX Security '19 - Tracing Transactions Across Cryptocurrency Ledgers.en.transcribed.srt 37.8 kB
USENIX Security 2019/Video/USENIX Security '19 - HardFails Insights into Software-Exploitable Hardware Bugs.en.transcribed.srt 37.7 kB
USENIX Security 2019/Video/USENIX Security '19 - Clinical Computer Security for Victims of Intimate Partner Violence.en.transcribed.srt 37.5 kB
USENIX Security 2018/Video/Acquisitional Rule-based Engine for Discovering Internet-of-Things Devices.en.transcribed.srt 37.5 kB
USENIX Security 2019/Video/USENIX Security '19 - The Web's Identity Crisis Understanding the Effectiveness of Website Identity.en.transcribed.srt 37.5 kB
USENIX Security 2019/Video/USENIX Security '19 - 50 Ways to Leak Your Data An Exploration of Apps'.en.transcribed.srt 37.1 kB
USENIX Security 2019/Video/USENIX Security '19 - ScatterCache Thwarting Cache Attacks via Cache Set Randomization.en.transcribed.srt 36.9 kB
USENIX Security 2019/Video/USENIX Security '19 - ERIM Secure, Efficient In-process Isolation with Protection Keys (MPK).en.transcribed.srt 36.9 kB
USENIX Security 2019/Video/USENIX Security '19 - Computer Security and Privacy in the Interactions Between Victim.en.transcribed.srt 36.7 kB
USENIX Security 2019/Video/USENIX Security '19 - Pythia Remote Oracles for the Masses.en.transcribed.srt 36.7 kB
USENIX Security 2019/Video/USENIX Security '19 - All Your Clicks Belong to Me Investigating Click Interception on the Web.en.transcribed.srt 36.7 kB
USENIX Security 2019/Video/USENIX Security '19 - AntiFuzz Impeding Fuzzing Audits of Binary Executables.en.transcribed.srt 36.4 kB
USENIX Security 2019/Video/USENIX Security '19 - VRASED A Verified Hardware Software Co-Design for Remote Attestation.en.transcribed.srt 36.4 kB
USENIX Security 2019/Video/USENIX Security '19 - CT-GAN Malicious Tampering of 3D Medical Imagery using Deep Learning.en.transcribed.srt 36.3 kB
USENIX Security 2019/Video/USENIX Security '19 - FastKitten Practical Smart Contracts on Bitcoin.en.transcribed.srt 36.1 kB
USENIX Security 2019/Video/USENIX Security '19 - High Precision Detection of Business Email Compromise.en.transcribed.srt 35.8 kB
USENIX Security 2019/Video/USENIX Security '19 - TESSERACT Eliminating Experimental Bias in Malware Classification.en.transcribed.srt 35.8 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/ozment_andy_sec13.jpg 35.8 kB
USENIX Security 2018/Video/Vetting Single Sign-On SDK Implementations via Symbolic Reasoning.en.transcribed.srt 35.7 kB
USENIX Security 2019/Video/USENIX Security '19 - Improving Robustness of ML Classifiers against Realizable Evasio.en.transcribed.srt 35.6 kB
USENIX Security 2019/Video/USENIX Security '19 - Not Everything is Dark and Gloomy Power Grid Protections Against IoT.en.transcribed.srt 35.5 kB
USENIX Security 2019/Video/USENIX Security '19 - BITE Bitcoin Lightweight Client Privacy using Trusted Execution.en.transcribed.srt 35.5 kB
USENIX Security 2008/Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera5x.png 35.4 kB
USENIX Security 2008/Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera6x.png 35.4 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/sec09_banner.jpg 35.3 kB
USENIX Security 2009/USENIX Security 2009 Technical Sessions_files/sec09_banner.jpg 35.3 kB
USENIX Security 2009/USENIX Security 2009 WiPs_files/sec09_banner.jpg 35.3 kB
USENIX Security 2019/Video/USENIX Security '19 - Discovering and Understanding the Security Hazards in the.en.transcribed.srt 34.9 kB
USENIX Security 2015/Video/All Your Biases Belong to Us Breaking RC4 in WPA-TKIP and TLS.srt 34.8 kB
USENIX Security 2019/Video/USENIX Security '19 - Losing the Car Keys Wireless PHY-Layer Insecurity in EV Charging.en.transcribed.srt 34.8 kB
USENIX Security 2019/Video/USENIX Security '19 - Users Really Do Answer Telephone Scams.en.transcribed.srt 34.4 kB
USENIX Security 2019/Video/USENIX Security '19 - ALOHA Auxiliary Loss Optimization for Hypothesis Augmentation.en.transcribed.srt 34.4 kB
USENIX Security 2019/Video/USENIX Security '19 - PAC it up Towards Pointer Integrity using ARM Pointer Authentication.en.transcribed.srt 34.3 kB
USENIX Security 2019/Video/USENIX Security '19 - Mobile Private Contact Discovery at Scale.en.transcribed.srt 34.3 kB
USENIX Security 2019/Video/USENIX Security '19 - EnTrust Regulating Sensor Access by Cooperating Programs.en.transcribed.srt 34.2 kB
USENIX Security 2015/Video/Sound-Proof Usable Two-Factor Authentication Based on Ambient Sound.srt 34.2 kB
USENIX Security 2019/Video/USENIX Security '19 - KEPLER Facilitating Control-flow Hijacking Primitive Evaluation for Linux.en.transcribed.srt 34.1 kB
USENIX Security 2019/Video/USENIX Security '19 - What Are You Searching For A Remote Keylogging Attack.en.transcribed.srt 33.9 kB
USENIX Security 2019/Video/USENIX Security '19 - SafeHidden An Efficient and Secure Information Hiding Technique Using.en.transcribed.srt 33.8 kB
USENIX Security 2015/Video/Cloudy with a Chance of Breach Forecasting Cyber Security Incidents.srt 33.8 kB
USENIX Security 2019/Video/USENIX Security '19 - IODINE Verifying Constant-Time Execution of Hardware.en.transcribed.srt 33.4 kB
USENIX Security 2019/Video/USENIX Security '19 - SPOILER Speculative Load Hazards Boost Rowhammer and Cache Attacks.en.transcribed.srt 33.4 kB
USENIX Security 2019/Video/USENIX Security '19 - Detecting Missing-Check Bugs via Semantic- and Context-Aware.en.transcribed.srt 33.4 kB
USENIX Security 2019/Video/USENIX Security '19 - Blind Bernoulli Trials A Noninteractive Protocol For Hidden-Weight Coin Flips.en.transcribed.srt 33.4 kB
USENIX Security 2015/Video/Type Casting Verification Stopping an Emerging Attack Vector.srt 33.3 kB
USENIX Security 2019/Video/USENIX Security '19 - Terminal Brain Damage Exposing the Graceless Degradation in Deep.en.transcribed.srt 33.3 kB
USENIX Security 2019/Video/USENIX Security '19 - A Systematic Evaluation of Transient Execution Attacks and Defenses.en.transcribed.srt 33.3 kB
USENIX Security 2008/Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera21x.png 33.2 kB
USENIX Security 2019/Video/USENIX Security '19 - PolicyLint Investigating Internal Privacy Policy Contradictions on Google.en.transcribed.srt 33.0 kB
USENIX Security 2019/Video/USENIX Security '19 - Secure Multi-User Content Sharing for Augmented Reality Applications.en.transcribed.srt 32.9 kB
USENIX Security 2019/Video/USENIX Security '19 - Everyone is Different Client-side Diversification for Defending.en.transcribed.srt 32.9 kB
USENIX Security 2019/Video/USENIX Security '19 - Exploiting Unprotected I O Operations in AMD's Secure Encrypted Virtualization.en.transcribed.srt 32.8 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/js_yui9lDPs2dTDFfQPtmwCCL63T1k2MGsGrsTM-7Eo2Ts.js 32.8 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/js_yui9lDPs2dTDFfQPtmwCCL63T1k2MGsGrsTM-7Eo2Ts.js 32.8 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/js_yui9lDPs2dTDFfQPtmwCCL63T1k2MGsGrsTM-7Eo2Ts.js 32.8 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/js_yui9lDPs2dTDFfQPtmwCCL63T1k2MGsGrsTM-7Eo2Ts.js 32.8 kB
USENIX Security 2019/Video/USENIX Security '19 - “Johnny, you are fired!” - Spoofing OpenPGP and S MIME Signatures in Emails.en.transcribed.srt 32.8 kB
USENIX Security 2019/Video/USENIX Security '19 - StrongChain Transparent and Collaborative Proof-of-Work Consensus.en.transcribed.srt 32.6 kB
USENIX Security 2018/Video/Simple Password-Hardened Encryption Services.en.transcribed.srt 32.3 kB
USENIX Security 2019/Video/USENIX Security '19 - CANvas Fast and Inexpensive Automotive Network Mapping.en.transcribed.srt 32.2 kB
USENIX Security 2019/Video/USENIX Security '19 - UWB-ED Distance Enlargement Attack Detection in Ultra-Wideband.en.transcribed.srt 32.1 kB
USENIX Security 2019/Video/USENIX Security '19 - The KNOB is Broken Exploiting Low Entropy in the Encryption Key.en.transcribed.srt 32.0 kB
USENIX Security 2019/Video/USENIX Security '19 - RAZOR A Framework for Post-deployment Software Debloating.en.transcribed.srt 31.9 kB
USENIX Security 2019/Video/USENIX Security '19 - Reading the Tea leaves A Comparative Analysis of Threat Intelligence.en.transcribed.srt 31.8 kB
USENIX Security 2019/Video/USENIX Security '19 - ATTACK2VEC Leveraging Temporal Word Embeddings to Understand the.en.transcribed.srt 31.6 kB
USENIX Security 2019/Video/USENIX Security '19 - HideMyApp Hiding the Presence of Sensitive Apps on Android.en.transcribed.srt 31.5 kB
USENIX Security 2019/Video/USENIX Security '19 - A Billion Open Interfaces for Eve and Mallory MitM, DoS, and Tracking.en.transcribed.srt 31.5 kB
USENIX Security 2019/Video/USENIX Security '19 - Hiding in Plain Signal Physical Signal Overshadowing Attack on LTE.en.transcribed.srt 31.3 kB
USENIX Security 2019/Video/USENIX Security '19 - The Betrayal At Cloud City An Empirical Analysis Of Cloud-Based Mobile.en.transcribed.srt 31.2 kB
USENIX Security 2019/Video/USENIX Security '19 - Protecting Cloud Virtual Machines from Hypervisor and Host Operating.en.transcribed.srt 31.1 kB
USENIX Security 2019/Video/USENIX Security '19 - RVFuzzer Finding Input Validation Bugs in Robotic Vehicles through.en.transcribed.srt 31.0 kB
USENIX Security 2019/Video/USENIX Security '19 - Back to the Whiteboard a Principled Approach for the Assessment and.en.transcribed.srt 31.0 kB
USENIX Security 2010/USENIX Security 2010 Poster Session_files/sec10_banner.jpg 30.8 kB
USENIX Security 2010/USENIX Security 2010 Technical Sessions_files/sec10_banner.jpg 30.8 kB
USENIX Security 2019/Video/USENIX Security '19 - Identifying Cache-Based Side Channels through Secret-Augmented.en.transcribed.srt 30.8 kB
USENIX Security 2019/Video/USENIX Security '19 - Rendered Private Making GLSL Execution Uniform to Prevent WebGL-based.en.transcribed.srt 30.8 kB
USENIX Security 2019/Video/USENIX Security '19 - The Anatomy of a Cryptocurrency Pump-and-Dump Scheme.en.transcribed.srt 30.7 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/sec14_media.png 30.6 kB
USENIX Security 2019/Video/USENIX Security '19 - From IP ID to Device ID and KASLR Bypass.en.transcribed.srt 30.6 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/sec13_media.png 30.6 kB
USENIX Security 2019/Video/USENIX Security '19 - Towards the Detection of Inconsistencies in Public Security.en.transcribed.srt 30.3 kB
USENIX Security 2014/Video/On the Feasibility of Large-Scale Infections of iOS Devices - Tielei Wang, Yeongjin Jang, Yizheng Chen, Simon Chung, Billy Lau, Wenke Lee.srt 30.2 kB
USENIX Security 2019/Video/USENIX Security '19 - GRIMOIRE Synthesizing Structure while Fuzzing.en.transcribed.srt 30.2 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/ie.htm 30.2 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/ie.htm 30.2 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/ie.htm 30.2 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/ie.htm 30.2 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/ie.htm 30.2 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/ie.htm 30.2 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/ie.htm 30.2 kB
USENIX Security 2015/Presentations/sec15_erratum.pdf 30.1 kB
USENIX Security 2015/USENIX Security 2015 Full Proceedings erratum.pdf 30.1 kB
USENIX Security 2019/Video/USENIX Security '19 - MOPT Optimized Mutation Scheduling for Fuzzers.en.transcribed.srt 30.1 kB
USENIX Security 2019/Video/USENIX Security '19 - When the Signal is in the Noise Exploiting Diffix's Sticky Noise.en.transcribed.srt 30.1 kB
USENIX Security 2019/Video/USENIX Security '19 - Origin-sensitive Control Flow Integrity.en.transcribed.srt 30.0 kB
USENIX Security 2019/Video/USENIX Security '19 - The CrossPath Attack Disrupting the SDN Control Channel via Shared Links.en.transcribed.srt 29.8 kB
USENIX Security 2019/Video/USENIX Security '19 - FIRM-AFL High-Throughput Greybox Fuzzing of IoT Firmware via.en.transcribed.srt 29.8 kB
USENIX Security 2020/Videos/USENIX Security 20 - Stolen Memories Leveraging Model Memorization for Calibrated White-Box.eng.srt 29.6 kB
USENIX Security 2019/Video/USENIX Security '19 - Understanding iOS-based Crowdturfing Through Hidden UI Analysis.en.transcribed.srt 29.5 kB
USENIX Security 2020/Videos/USENIX Security 20 - Towards HTTPS Everywhere on Android We Are Not There Yet.eng.srt 29.5 kB
USENIX Security 2019/Video/USENIX Security '19 - Stack Overflow Considered Helpful! Deep Learning Security Nudges Towards.en.transcribed.srt 29.5 kB
USENIX Security 2020/Videos/USENIX Security 20 - Light Commands Laser-Based Audio Injection Attacks on Voice-Controllable.eng.srt 29.4 kB
USENIX Security 2019/Video/USENIX Security '19 - Looking from the Mirror Evaluating IoT Device Security through.en.transcribed.srt 29.3 kB
USENIX Security 2019/Video/USENIX Security '19 - Iframes Popups Are Dangerous in Mobile WebView Studying and.en.transcribed.srt 29.2 kB
USENIX Security 2019/Video/USENIX Security '19 - Birthday, Name and Bifacial-security Understanding Passwords.en.transcribed.srt 28.9 kB
USENIX Security 2019/Video/USENIX Security '19 - EnFuzz Ensemble Fuzzing with Seed Synchronization among Diverse Fuzzers.en.transcribed.srt 28.9 kB
USENIX Security 2019/Video/USENIX Security '19 - PeX A Permission Check Analysis Framework for Linux Kernel.en.transcribed.srt 28.9 kB
USENIX Security 2008/Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera14x.png 28.8 kB
USENIX Security 2019/Video/USENIX Security '19 - uXOM Efficient eXecute-Only Memory on ARM Cortex-M.en.transcribed.srt 28.8 kB
USENIX Security 2019/Video/USENIX Security '19 - Probability Model Transforming Encoders Against Encoding Attacks.en.transcribed.srt 28.5 kB
USENIX Security 2020/Videos/USENIX Security 20 - Automatic Techniques to Systematically Discover New Heap Exploitation.eng.srt 28.5 kB
USENIX Security 2015/Video/Post-Mortem of a Zombie Conficker Cleanup After Six Years.srt 28.0 kB
USENIX Security 2019/Video/USENIX Security '19 - Fuzzification Anti-Fuzzing Techniques.en.transcribed.srt 28.0 kB
USENIX Security 2019/Video/USENIX Security '19 - Devils in the Guidance Predicting Logic Vulnerabilities in Payment.en.transcribed.srt 27.7 kB
USENIX Security 2020/Videos/USENIX Security 20 - Scaling Verifiable Computation Using Efficient Set Accumulators.eng.srt 27.6 kB
USENIX Security 2019/Video/USENIX Security '19 - Utility-Optimized Local Differential Privacy Mechanisms for.en.transcribed.srt 27.6 kB
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008).htm 27.3 kB
USENIX Security 2020/Videos/USENIX Security 20 - The Impact of Ad-Blockers on Product Search and Purchase Behavior.eng.srt 27.3 kB
USENIX Security 2020/Videos/USENIX Security 20 - PhishTime Continuous Longitudinal Measurement of the Effectiveness....eng.srt 27.2 kB
USENIX Security 2020/Videos/USENIX Security 20 - Data Recovery from Scrubbed NAND Flash Storage Need for Analog Sanitization.eng.srt 27.1 kB
USENIX Security 2020/Videos/USENIX Security 20 - Everything Old is New Again Binary Security of WebAssembly.eng.srt 27.0 kB
USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js 26.8 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js 26.8 kB
USENIX Security 2018/USENIX Security 2018 Program at a Glance USENIX_files/js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js 26.8 kB
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js 26.8 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js 26.8 kB
USENIX Security 2019/USENIX Security 2019 Program at a Glance USENIX_files/js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js 26.8 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js 26.8 kB
USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js 26.8 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/js_PV_aNkPxIlLyZ1F-ZjJTzlSwwaaHK2fsTz0qyH_VGsg.js 26.8 kB
USENIX Security 2015/Video/Towards Discovering and Understanding Task Hijacking in Android.srt 26.8 kB
USENIX Security 2018/USENIX Security 2018 Program at a Glance USENIX_files/font-awesome.css 26.7 kB
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/font-awesome.css 26.7 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/font-awesome.css 26.7 kB
USENIX Security 2019/USENIX Security 2019 Program at a Glance USENIX_files/font-awesome.css 26.7 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/font-awesome.css 26.7 kB
USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/font-awesome.css 26.7 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/font-awesome.css 26.7 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009).htm 26.6 kB
USENIX Security 2019/Video/USENIX Security '19 - Evaluating Differentially Private Machine Learning in Practice.en.transcribed.srt 26.5 kB
USENIX Security 2019/Video/USENIX Security '19 - Why Do Adversarial Attacks Transfer Explaining Transferability of.en.transcribed.srt 26.3 kB
USENIX Security 2020/Videos/USENIX Security 20 - Medusa Microarchitectural Data Leakage via Automated Attack Synthesis.eng.srt 26.3 kB
USENIX Security 2020/Videos/USENIX Security 20 - Detecting Stuffing of a User’s Credentials at Her Own Accounts.eng.srt 26.3 kB
USENIX Security 2009/USENIX Security 2009 WiPs.htm 26.2 kB
USENIX Security 2020/Videos/USENIX Security 20 - The Ballot is Busted Before the Blockchain A Security Analysis of Voatz.eng.srt 26.2 kB
USENIX Security 2008/Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera10x.png 26.2 kB
USENIX Security 2020/Videos/USENIX Security 20 - Understanding security mistakes developers make Qualitative analysis....eng.srt 26.1 kB
USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/teague_vanessa_200x230.png 26.0 kB
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/schwartz_susan_200x230.png 26.0 kB
USENIX Security 2020/Videos/USENIX Security 20 - Visor Privacy-Preserving Video Analytics as a Cloud Service.eng.srt 25.9 kB
USENIX Security 2020/Videos/USENIX Security 20 - CopyCat Controlled Instruction-Level Attacks on Enclaves.eng.srt 25.9 kB
USENIX Security 2020/Videos/USENIX Security 20 - Sunrise to Sunset Analyzing the End-to-end Life Cycle and Effectiveness....eng.srt 25.8 kB
USENIX Security 2019/Video/USENIX Security '19 - DEEPVSA Facilitating Value-set Analysis with Deep Learning for.en.transcribed.srt 25.5 kB
USENIX Security 2020/Videos/USENIX Security 20 - Human Distinguishable Visual Key Fingerprints.eng.srt 25.5 kB
USENIX Security 2020/Videos/USENIX Security 20 - HALucinator Firmware Re-hosting Through Abstraction Layer Emulation.eng.srt 25.4 kB
USENIX Security 2020/Videos/USENIX Security 20 - VoteAgain A scalable coercion-resistant voting system.eng.srt 25.3 kB
USENIX Security 2020/Videos/USENIX Security 20 - What Twitter Knows Characterizing Ad Targeting Practices, User Perceptions....eng.srt 25.3 kB
USENIX Security 2020/Videos/USENIX Security 20 - ParmeSan Sanitizer-guided Greybox Fuzzing.eng.srt 25.3 kB
USENIX Security 2020/Videos/USENIX Security 20 - MIRAGE Succinct Arguments for Randomized Algorithms with Applications.eng.srt 24.9 kB
USENIX Security 2020/Videos/USENIX Security 20 - The Industrial Age of Hacking.eng.srt 24.9 kB
USENIX Security 2020/Videos/USENIX Security 20 - Pancake Frequency Smoothing for Encrypted Data Stores.eng.srt 24.8 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/adler_jim.jpg 24.8 kB
USENIX Security 2015/Video/RAPTOR Routing Attacks on Privacy in Tor.srt 24.8 kB
USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/narayan_shankar_100x115.png 24.8 kB
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/mickens_james_200x230.png 24.7 kB
USENIX Security 2020/Videos/USENIX Security 20 - DECAF Automatic, Adaptive De-bloating and Hardening of COTS Firmware.eng.srt 24.6 kB
USENIX Security 2020/Videos/USENIX Security 20 - FIRMSCOPE Automatic Uncovering of Privilege-Escalation Vulnerabilities.eng.srt 24.5 kB
USENIX Security 2020/Videos/USENIX Security 20 - SAVIOR Securing Autonomous Vehicles with Robust Physical Invariants.eng.srt 24.5 kB
USENIX Security 2008/Presentations/Reverse-Engineering a Cryptographic RFID Tag_files/c1.png 24.5 kB
USENIX Security 2020/Videos/USENIX Security 20 - Cardpliance PCI DSS Compliance of Android Applications.eng.srt 24.5 kB
USENIX Security 2020/Videos/USENIX Security 20 - BigMAC Fine-Grained Policy Analysis of Android Firmware.eng.srt 24.5 kB
USENIX Security 2008/Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera9x.png 24.3 kB
USENIX Security 2008/Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera17x.png 24.2 kB
USENIX Security 2020/Videos/USENIX Security 20 - Achieving Keyless CDNs with Conclaves.eng.srt 24.1 kB
USENIX Security 2019/Video/USENIX Security '19 - Understanding and Securing Device Vulnerabilities through.en.transcribed.srt 23.9 kB
USENIX Security 2020/Videos/USENIX Security 20 - Datalog Disassembly.eng.srt 23.9 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/enck_william_200x230.png 23.9 kB
USENIX Security 2020/Videos/USENIX Security 20 - Sys A Static Symbolic Tool for Finding Good Bugs in Good (Browser) Code.eng.srt 23.8 kB
USENIX Security 2020/Videos/USENIX Security 20 - Composition Kills A Case Study of Email Sender Authentication.eng.srt 23.8 kB
USENIX Security 2020/Videos/USENIX Security 20 - SENG, the SGX-Enforcing Network Gateway Authorizing Communication....eng.srt 23.7 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/porter-felt_adrienne_200x230.png 23.7 kB
USENIX Security 2020/Videos/USENIX Security 20 - Devil’s Whisper A General Approach for Physical Adversarial Attacks.eng.srt 23.7 kB
USENIX Security 2020/Videos/USENIX Security 20 - SANNS Scaling Up Secure Approximate k-Nearest Neighbors Search.eng.srt 23.7 kB
USENIX Security 2020/Videos/USENIX Security 20 - Walking Onions Scaling Anonymity Networks while Protecting Users.eng.srt 23.6 kB
USENIX Security 2020/Videos/USENIX Security 20 - Analysis of DTLS Implementations Using Protocol State Fuzzing.eng.srt 23.6 kB
USENIX Security 2007/16th USENIX Security Symposium (Security 2007).htm 23.6 kB
USENIX Security 2020/Videos/USENIX Security 20 - Automatic Hot Patch Generation for Android Kernels.eng.srt 23.5 kB
USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/adida_ben_2018_200x230.png 23.4 kB
USENIX Security 2020/Videos/USENIX Security 20 - Fawkes Protecting Privacy against Unauthorized Deep Learning Models.eng.srt 23.4 kB
USENIX Security 2020/Videos/USENIX Security 20 - Silhouette Efficient Protected Shadow Stacks for Embedded Systems.eng.srt 23.2 kB
USENIX Security 2020/Videos/USENIX Security 20 - An Off-Chip Attack on Hardware Enclaves via the Memory Bus.eng.srt 23.2 kB
USENIX Security 2020/Videos/USENIX Security 20 - A Longitudinal and Comprehensive Study of the DANE Ecosystem in Email.eng.srt 23.1 kB
USENIX Security 2020/Videos/USENIX Security 20 - Hybrid Batch Attacks Finding Black-box Adversarial Examples with Limited.eng.srt 23.0 kB
USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/kowalczyk_ellen_110x115.png 23.0 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/js_nPhKWi17GlWfUPto14Dqfk5lpAFMD2XUrRDYY3jnD2c.js 23.0 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/js_nPhKWi17GlWfUPto14Dqfk5lpAFMD2XUrRDYY3jnD2c.js 23.0 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/js_nPhKWi17GlWfUPto14Dqfk5lpAFMD2XUrRDYY3jnD2c.js 23.0 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/js_nPhKWi17GlWfUPto14Dqfk5lpAFMD2XUrRDYY3jnD2c.js 23.0 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/js_nPhKWi17GlWfUPto14Dqfk5lpAFMD2XUrRDYY3jnD2c.js 23.0 kB
USENIX Security 2020/Videos/USENIX Security 20 - A different cup of TI The added value of commercial threat intelligence.eng.srt 22.9 kB
USENIX Security 2020/Videos/USENIX Security 20 - Chaperone Real-time Locking and Loss Prevention for Smartphones.eng.srt 22.9 kB
USENIX Security 2020/Videos/USENIX Security 20 - Cache Telepathy Leveraging Shared Resource Attacks to Learn DNN Architectures.eng.srt 22.8 kB
USENIX Security 2020/Videos/USENIX Security 20 - Hall Spoofing A Non-Invasive DoS Attack on Grid-Tied Solar Inverter.eng.srt 22.6 kB
USENIX Security 2020/Videos/USENIX Security 20 - I have too much respect for my elders Understanding South African Mobile.eng.srt 22.5 kB
USENIX Security 2020/Videos/USENIX Security 20 - PHMon A Programmable Hardware Monitor and Its Security Use Cases.eng.srt 22.5 kB
USENIX Security 2020/Videos/USENIX Security 20 - Adversarial Preprocessing Understanding and Preventing Image-Scaling Attacks.eng.srt 22.5 kB
USENIX Security 2020/Videos/USENIX Security 20 - Temporal System Call Specialization for Attack Surface Reduction.eng.srt 22.4 kB
USENIX Security 2020/Videos/USENIX Security 20 - SpecFuzz Bringing Spectre-type vulnerabilities to the surface.eng.srt 22.4 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/wing_jeannette_100x115.png 22.3 kB
USENIX Security 2020/Videos/USENIX Security 20 - Shattered Chain of Trust Understanding Security Risks in Cross-Cloud IoT.eng.srt 22.1 kB
USENIX Security 2020/Videos/USENIX Security 20 - Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines.eng.srt 22.1 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/evans_chris.png 22.1 kB
USENIX Security 2008/Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera13x.png 22.0 kB
USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/serebryany_konstantin_100x115.png 22.0 kB
USENIX Security 2020/Videos/USENIX Security 20 - Montage A Neural Network Language Model-Guided JavaScript Engine Fuzzer.eng.srt 22.0 kB
USENIX Security 2020/Videos/USENIX Security 20 - Pixel Multi-signatures for Consensus.eng.srt 21.8 kB
USENIX Security 2020/Videos/USENIX Security 20 - Boxer Preventing fraud by scanning credit cards.eng.srt 21.8 kB
USENIX Security 2020/Videos/USENIX Security 20 - Whos Calling Characterizing Robocalls through Audio and Metadata Analysis.eng.srt 21.7 kB
USENIX Security 2020/Videos/USENIX Security 20 - Estonian Electronic Identity Card Security Flaws in Key Management.eng.srt 21.7 kB
USENIX Security 2019/Video/USENIX Security '19 - Robust Website Fingerprinting Through the Cache Occupancy Channel.en.transcribed.srt 21.6 kB
USENIX Security 2020/Videos/USENIX Security 20 - KOOBE Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write.eng.srt 21.6 kB
USENIX Security 2008/Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera20x.png 21.6 kB
USENIX Security 2020/Videos/USENIX Security 20 - Call Me Maybe Eavesdropping Encrypted LTE Calls With ReVoLTE.eng.srt 21.5 kB
USENIX Security 2020/Videos/USENIX Security 20 - That Was Then, This Is Now A Security Evaluation of Password Generation.eng.srt 21.4 kB
USENIX Security 2020/Videos/USENIX Security 20 - Void A fast and light voice liveness detection system.eng.srt 21.4 kB
USENIX Security 2020/Videos/USENIX Security 20 - Retrofitting Fine Grain Isolation in the Firefox Renderer.eng.srt 21.4 kB
USENIX Security 2020/Videos/USENIX Security 20 - DatashareNetwork A Decentralized Privacy-Preserving Search Engine.eng.srt 21.4 kB
USENIX Security 2020/Videos/USENIX Security 20 - ShadowMove A Stealthy Lateral Movement Strategy.eng.srt 21.2 kB
USENIX Security 2020/Videos/USENIX Security 20 - SmartVerif Push the Limit of Automation Capability of Verifying Security....eng.srt 21.2 kB
USENIX Security 2020/Videos/USENIX Security 20 - The Unpatchable Silicon A Full Break of the Bitstream Encryption of Xilinx.eng.srt 21.1 kB
USENIX Security 2020/Videos/USENIX Security 20 - NXNSAttack Recursive DNS Inefficiencies and Vulnerabilities.eng.srt 21.1 kB
USENIX Security 2020/Videos/USENIX Security 20 - High Accuracy and High Fidelity Extraction of Neural Networks.eng.srt 21.0 kB
USENIX Security 2020/Videos/USENIX Security 20 - BesFS A POSIX Filesystem for Enclaves with a Mechanized Safety Proof.eng.srt 20.9 kB
USENIX Security 2008/Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera16x.png 20.9 kB
USENIX Security 2020/Videos/USENIX Security 20 - A Tale of Two Headers A Formal Analysis of Inconsistent Click-Jacking....eng.srt 20.8 kB
USENIX Security 2020/Videos/USENIX Security 20 - Horizontal Privilege Escalation in Trusted Applications.eng.srt 20.8 kB
USENIX Security 2020/Videos/USENIX Security 20 - Civet An Efficient Java Partitioning Framework for Hardware Enclaves.eng.srt 20.8 kB
USENIX Security 2020/Videos/USENIX Security 20 - FANS Fuzzing Android Native System Services via Automated Interface Analysis.eng.srt 20.7 kB
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/new_usenix.jpg 20.6 kB
USENIX Security 2007/Presentations/Security 2007 Poster Session_files/new_usenix.jpg 20.6 kB
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/new_usenix.jpg 20.6 kB
USENIX Security 2008/Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/new_usenix.jpg 20.6 kB
USENIX Security 2008/Presentations/Lest We Remember - Cold Boot Attacks on Encryption Keys_files/new_usenix.jpg 20.6 kB
USENIX Security 2008/Presentations/Practical Symmetric Key Cryptography on Modern Graphics Hardware_files/new_usenix.jpg 20.6 kB
USENIX Security 2008/Presentations/Reverse-Engineering a Cryptographic RFID Tag_files/new_usenix.jpg 20.6 kB
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/new_usenix.jpg 20.6 kB
USENIX Security 2008/Presentations/USENIX Security 2008 Poster Session_files/new_usenix.jpg 20.6 kB
USENIX Security 2008/USENIX Security 2008 WiPs_files/new_usenix.jpg 20.6 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/new_usenix.jpg 20.6 kB
USENIX Security 2009/USENIX Security 2009 WiPs_files/new_usenix.jpg 20.6 kB
USENIX Security 2010/USENIX Security 2010 Poster Session_files/new_usenix.jpg 20.6 kB
USENIX Security 2011/USENIX Security 2011 Poster Session_files/new_usenix.jpg 20.6 kB
USENIX Security 2020/Videos/USENIX Security 20 - BlockSci Design and applications of a blockchain analysis platform.eng.srt 20.6 kB
USENIX Security 2020/Videos/USENIX Security 20 - ETHBMC A Bounded Model Checker for Smart Contracts.eng.srt 20.5 kB
USENIX Security 2008/Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera24x.png 20.5 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js 20.5 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js 20.5 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js 20.5 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js 20.5 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js 20.5 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js 20.5 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js 20.5 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js 20.5 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js 20.5 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js 20.5 kB
USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js 20.5 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js 20.5 kB
USENIX Security 2018/USENIX Security 2018 Program at a Glance USENIX_files/js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js 20.5 kB
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js 20.5 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js 20.5 kB
USENIX Security 2019/USENIX Security 2019 Program at a Glance USENIX_files/js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js 20.5 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js 20.5 kB
USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js 20.5 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/js_2lJC5gTZ8B3-P19n2LPEd0viiCEmLJ5gcIAFYex1r0U.js 20.5 kB
USENIX Security 2008/Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera18x.png 20.4 kB
USENIX Security 2020/Videos/USENIX Security 20 - Drift with Devil Security of Multi-Sensor Fusion based Localization....eng.srt 20.1 kB
USENIX Security 2020/Videos/USENIX Security 20 - Symbolic execution with SymCC Dont interpret, compile.eng.srt 19.8 kB
USENIX Security 2020/Videos/USENIX Security 20 - From Needs to Actions to Secure Apps The Effect of Requirements....eng.srt 19.7 kB
USENIX Security 2020/Videos/USENIX Security 20 - A Spectral Analysis of Noise A Comprehensive, Automated, Formal Analysis.eng.srt 19.6 kB
USENIX Security 2015/Video/Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors.srt 19.6 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/mozilla_firefox_logo_002.png 19.4 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/mozilla_firefox_logo_002.png 19.4 kB
USENIX Security 2020/Videos/USENIX Security 20 - Interpretable Deep Learning under Fire.eng.srt 19.2 kB
USENIX Security 2020/Videos/USENIX Security 20 - Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade Attacks.eng.srt 18.5 kB
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/balasubramaniyan_vijay_200x230.png 18.2 kB
USENIX Security 2020/Videos/USENIX Security 20 - P2IM Scalable and Hardware-independent Firmware Testing via Automatic.eng.srt 18.2 kB
USENIX Security 2020/Videos/USENIX Security 20 - Zero-delay Lightweight Defenses against Website Fingerprinting.eng.srt 18.0 kB
USENIX Security 2020/Videos/USENIX Security 20 - You Are What You Broadcast Identification of Mobile and IoT Devices....eng.srt 18.0 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/challenge_button_170x107.jpg 18.0 kB
USENIX Security 2020/Videos/USENIX Security 20 - An Ever-evolving Game Evaluation of Real-world Attacks and Defenses.eng.srt 17.9 kB
USENIX Security 2020/Videos/USENIX Security 20 - USBFuzz A Framework for Fuzzing USB Drivers by Device Emulation.eng.srt 17.8 kB
USENIX Security 2020/Videos/USENIX Security 20 - Poison Over Troubled Forwarders A Cache Poisoning Attack Targeting DNS....eng.srt 17.6 kB
USENIX Security 2020/Videos/USENIX Security 20 - Liveness is Not Enough Enhancing Fingerprint Authentication with Behavioral.eng.srt 17.5 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/css_0tsfTZCLp9yBXG5eWU1vu1kZaV3OzOpnDDjEGiL42Cs.css 17.4 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/mozilla_firefox_logo.png 17.2 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/mozilla_firefox_logo.png 17.2 kB
USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/kissner_lea_100x115.png 17.2 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/nsf_300x120_v2_1.png 17.0 kB
USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/js_l3lGSHpmjPG_uzcz3Shpsi9Iwu4IaSB7us0ldgM0q7g.js 16.3 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/js_l3lGSHpmjPG_uzcz3Shpsi9Iwu4IaSB7us0ldgM0q7g.js 16.3 kB
USENIX Security 2018/USENIX Security 2018 Program at a Glance USENIX_files/js_fjSBcoQiz2s5JFYU7Z0v2w3fhgZkax8CZA1Fi71bsVc.js 15.9 kB
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/js_fjSBcoQiz2s5JFYU7Z0v2w3fhgZkax8CZA1Fi71bsVc.js 15.9 kB
USENIX Security 2019/USENIX Security 2019 Program at a Glance USENIX_files/js_fjSBcoQiz2s5JFYU7Z0v2w3fhgZkax8CZA1Fi71bsVc.js 15.9 kB
USENIX Security 2008/Presentations/Lest We Remember - Cold Boot Attacks on Encryption Keys_files/x60_t43p.png 15.6 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/usenix_logo_300x150_neat_2.png 15.0 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/usenix_logo_300x150_neat_2.png 15.0 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/usenix_logo_300x150_neat_2.png 15.0 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/usenix_logo_300x150_neat_2.png 15.0 kB
USENIX Security 2008/USENIX Security 2008 WiPs.htm 14.9 kB
USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/js_nKHPel07iQ7X6ouVrkRIeMs9JzgU_FAp9nBhDfrhyQc.js 14.8 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/js_nKHPel07iQ7X6ouVrkRIeMs9JzgU_FAp9nBhDfrhyQc.js 14.8 kB
USENIX Security 2011/USENIX Security 2011 Poster Session.htm 14.7 kB
USENIX Security 2010/USENIX Security 2010 Technical Sessions_files/johnston_roger200x170.jpg 14.7 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/css_m9t3SZ2dKv6HQuOuf0zINIRA5GjP4lkCCtmRRbSjaXs.css 14.7 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/css_m9t3SZ2dKv6HQuOuf0zINIRA5GjP4lkCCtmRRbSjaXs.css 14.7 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/css_m9t3SZ2dKv6HQuOuf0zINIRA5GjP4lkCCtmRRbSjaXs.css 14.7 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/heninger_nadia_200x230.jpg 14.3 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/js_1_m_mRX0UrchQnV5E0UZ6141Ts6jK5YnRLQe7J2kaX4.js 14.3 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/js_1_m_mRX0UrchQnV5E0UZ6141Ts6jK5YnRLQe7J2kaX4.js 14.3 kB
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/elazari-bar-on-amit_200x230.jpg 14.2 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/woot13_banner_mini.png 14.2 kB
USENIX Security 2010/USENIX Security 2010 Poster Session.htm 14.1 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/beyond_security_002.png 14.1 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/beyond_security_002.png 14.1 kB
USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/js_AQDKCRqaqaAAAzbvxcaEQBooKEQA-dFTfff7tzCklI8.js 14.0 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/js_AQDKCRqaqaAAAzbvxcaEQBooKEQA-dFTfff7tzCklI8.js 14.0 kB
USENIX Security 2018/USENIX Security 2018 Program at a Glance USENIX_files/js_AQDKCRqaqaAAAzbvxcaEQBooKEQA-dFTfff7tzCklI8.js 14.0 kB
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/js_AQDKCRqaqaAAAzbvxcaEQBooKEQA-dFTfff7tzCklI8.js 14.0 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/js_AQDKCRqaqaAAAzbvxcaEQBooKEQA-dFTfff7tzCklI8.js 14.0 kB
USENIX Security 2019/USENIX Security 2019 Program at a Glance USENIX_files/js_AQDKCRqaqaAAAzbvxcaEQBooKEQA-dFTfff7tzCklI8.js 14.0 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/js_AQDKCRqaqaAAAzbvxcaEQBooKEQA-dFTfff7tzCklI8.js 14.0 kB
USENIX Security 2008/Presentations/Lest We Remember - Cold Boot Attacks on Encryption Keys_files/toshiba_lenovo.png 14.0 kB
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/monica_lam_200x230.jpg 13.9 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/healthtech13_banner_mini.png 13.9 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/traynor_patrick_200x230.jpg 13.8 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/leet13_banner_mini.png 13.7 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/crc_press_150x60_002.png 13.7 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/crc_press_150x60_002.png 13.7 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/crc_press_150x60_002.png 13.7 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/crc_press_150x60_002.png 13.7 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/crc_press_150x60_002.png 13.7 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/crc_press_150x60_002.png 13.7 kB
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/evt-deter_button.jpg 13.6 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/nsf_600x240_1.png 13.4 kB
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/linuxProMagazine_webLogo.jpg 13.3 kB
USENIX Security 2018/27th USENIX Security Symposium Grid_files/loading-3x.gif 13.3 kB
USENIX Security 2019/28th USENIX Security Symposium Grid_files/loading-3x.gif 13.3 kB
USENIX Security 2008/Presentations/Lest We Remember - Cold Boot Attacks on Encryption Keys_files/ramjet_5100.png 13.2 kB
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/susan_landau_200x230.jpg 13.2 kB
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/viel-search.png 13.1 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/postmessageRelay_data/rpcshindig_random.js 13.0 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/postmessageRelay_data/rpcshindig_random.js 13.0 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/postmessageRelay_data/rpcshindig_random.js 13.0 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/postmessageRelay_data/rpcshindig_random.js 13.0 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/postmessageRelay_data/rpcshindig_random.js 13.0 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/postmessageRelay_data/rpcshindig_random.js 13.0 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/postmessageRelay_data/rpcshindig_random.js 13.0 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/postmessageRelay_data/rpcshindig_random.js 13.0 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/postmessageRelay_data/rpcshindig_random.js 13.0 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/postmessageRelay_data/rpcshindig_random.js 13.0 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/kaust_600x240.png 13.0 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/foci13_banner_mini.png 12.7 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/google_logo_300x110.png 12.5 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/google_logo_300x110.png 12.5 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/ieee_cybersecurity_150x73.png 12.5 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/ieee_cybersecurity_150x73.png 12.5 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/fsm_150x86_2.png 12.4 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/fsm_150x86_2.png 12.4 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/hotsec13_banner_mini.png 12.3 kB
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/ross-anderson_200x230.jpg 12.3 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/css_JfUmRW-Hr0U8TZVXkaC2BcGIYyK5guphAqwPzo1s5JM.css 11.9 kB
USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/halderman_alex_200x230.jpg 11.8 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/capkun_srdjan_200x230.jpg 11.8 kB
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/wenyuanxu_200x230.jpg 11.8 kB
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/donna_dodson_200x230.jpg 11.8 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/cset13_banner_mini.png 11.7 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/evtwote13_banner_mini_0.png 11.7 kB
USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/rubin_avi_200x230.jpg 11.6 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/symantec_logo_1.png 11.5 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/symantec_logo_1.png 11.5 kB
USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/sec17_wordmark_stacked.svg 11.5 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/sec17_wordmark_stacked.svg 11.5 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/sec17_wordmark_stacked_002.svg 11.5 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/roesner_franziska_200.jpg 11.4 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/admin_125x47_0_002.png 11.4 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/admin_125x47_0_002.png 11.4 kB
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/paul_kocher_200x230.jpg 11.4 kB
USENIX Security 2008/Presentations/USENIX Security 2008 Poster Session.htm 11.2 kB
USENIX Security 2007/Presentations/Security 2007 Poster Session.htm 10.9 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/felten_ed_sec13.jpg 10.9 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/symantec_150x60.png 10.6 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/symantec_150x60_002.png 10.6 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/symantec_150x60.png 10.6 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/symantec_150x60.png 10.6 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/linux_journal_150x72_0_002.png 10.3 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/linux_journal_150x72_0_002.png 10.3 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/linux_journal_150x72_2_002.png 10.3 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/linux_journal_150x72_2_002.png 10.3 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/linux_journal_150x72_2_002.png 10.3 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/linux_journal_150x72_2_002.png 10.3 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/ieee_cybersecurity_150x73_002.png 10.2 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/ieee_cybersecurity_150x73_002.png 10.2 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/hpcwire_150x55_0_002.png 10.1 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/hpcwire_150x55_0_002.png 10.1 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/hpcwire_150x55_0_002.png 10.1 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/hpcwire_150x55_0_002.png 10.1 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/hpcwire_150x55_0_002.png 10.1 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/hpcwire_150x55_0_002.png 10.1 kB
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/fw-search.png 10.1 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/postmessageRelay_data/829555168-postmessagerelay.js 10.0 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/postmessageRelay_data/829555168-postmessagerelay.js 10.0 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/postmessageRelay_data/829555168-postmessagerelay.js 10.0 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/postmessageRelay_data/829555168-postmessagerelay.js 10.0 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/postmessageRelay_data/829555168-postmessagerelay.js 10.0 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/postmessageRelay_data/829555168-postmessagerelay.js 10.0 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/postmessageRelay_data/829555168-postmessagerelay.js 10.0 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/postmessageRelay_data/829555168-postmessagerelay.js 10.0 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/postmessageRelay_data/829555168-postmessagerelay.js 10.0 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/postmessageRelay_data/829555168-postmessagerelay.js 10.0 kB
USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/js_qq8Htu2Ei-eV_IteNYMM8zM4yBe6NOtuXBD56RXHvN4.js 9.9 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/danzig_richard_115x125.jpg 9.9 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/nsf_90x80_0.png 9.8 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/nsf_90x80_0_002.png 9.8 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/nsf_90x80_0.png 9.8 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/nsf_90x80_0_002.png 9.8 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/palo-alto-networks_600x240.png 9.8 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/fsm_150x44_0_002.png 9.7 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/fsm_150x44_0_002.png 9.7 kB
USENIX Security 2008/Presentations/Practical Symmetric Key Cryptography on Modern Graphics Hardware_files/img12.png 9.6 kB
USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/css_mTaWTa-gjA-dVa8tJl4KV4v7oKx8qHNzCSd2Zupzqn4.css 9.6 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/css_mTaWTa-gjA-dVa8tJl4KV4v7oKx8qHNzCSd2Zupzqn4.css 9.6 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/it_dev_150x39.png 9.5 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/it_dev_150x39.png 9.5 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/css_SKdvFJ9YoZ2Zlnl17QxUbae5QC-NQDrH8ynBbHJFAaM.css 9.2 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/css_SKdvFJ9YoZ2Zlnl17QxUbae5QC-NQDrH8ynBbHJFAaM.css 9.2 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/css_dY0FNz4qF00fqwtbSA930BrnJH15HL9efi8t-qF8ZFs.css 9.2 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/css_SKdvFJ9YoZ2Zlnl17QxUbae5QC-NQDrH8ynBbHJFAaM.css 9.2 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/css_SKdvFJ9YoZ2Zlnl17QxUbae5QC-NQDrH8ynBbHJFAaM.css 9.2 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/sec19_wordmark_stacked_456x186_002.png 9.2 kB
USENIX Security 2008/Presentations/Practical Symmetric Key Cryptography on Modern Graphics Hardware_files/img13.png 9.0 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/google_600x240_0.png 9.0 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/google_600x240_6.png 9.0 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/security_orb_tagline_150x47_002.png 9.0 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/security_orb_tagline_150x47.png 9.0 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/sec20_wordmark_stacked_white_002.png 9.0 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/facebook_150x50_0_002.png 8.9 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/facebook_150x50_0_002.png 8.9 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/facebook_150x50_3.png 8.9 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/facebook_150x50_3.png 8.9 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/sec18_wordmark_stacked_450x186.png 8.9 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/google_150x50_3_002.png 8.7 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/google_150x50_3.png 8.7 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/ieee_sp_150x36_0.png 8.7 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/ieee_sp_150x36_0.png 8.7 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/ieee_sp_150x36_4.png 8.6 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/ieee_sp_150x36_4.png 8.6 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/facebook_5_002.png 8.6 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/facebook_5_002.png 8.6 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/userfriendly_150x60_002.png 8.4 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/userfriendly_150x60_002.png 8.4 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/userfriendly_150x60_002.png 8.4 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/userfriendly_150x60.png 8.4 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/userfriendly_150x60_002.png 8.4 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/userfriendly_150x60_002.png 8.4 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/userfriendly_150x60_002.png 8.4 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/userfriendly_150x60_002.png 8.4 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/baidu_600x240.png 8.4 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/baidu_600x240_1.png 8.4 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/avast_600x240.png 8.3 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/js_PACmgStbFksqYzX-HlEqBZWNu18Gac4c9Dc2EzyjEsM.js 8.3 kB
USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/js_zsU7pE_En9PuEzx00IjN_iCxIwgABAiEwJNkh1iTG9k.js 8.2 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/js_zsU7pE_En9PuEzx00IjN_iCxIwgABAiEwJNkh1iTG9k.js 8.2 kB
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/js_zsU7pE_En9PuEzx00IjN_iCxIwgABAiEwJNkh1iTG9k.js 8.2 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/js_zsU7pE_En9PuEzx00IjN_iCxIwgABAiEwJNkh1iTG9k.js 8.2 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/js_zsU7pE_En9PuEzx00IjN_iCxIwgABAiEwJNkh1iTG9k.js 8.2 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/lxer_150x53_0_002.png 8.2 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/lxer_150x53_0_002.png 8.2 kB
USENIX Security 2008/Presentations/Practical Symmetric Key Cryptography on Modern Graphics Hardware_files/img8.png 8.1 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/dmtf_150x53_0.png 8.0 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/dmtf_150x53_0.png 8.0 kB
USENIX Security 2018/27th USENIX Security Symposium Grid_files/app-apple.svg 7.9 kB
USENIX Security 2019/28th USENIX Security Symposium Grid_files/app-apple.svg 7.9 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/google_8.png 7.8 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/google_8.png 7.8 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/google_6_002.png 7.8 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/google_6_002.png 7.8 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/oxford_university_press_150x55.png 7.8 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/oxford_university_press_150x55.png 7.8 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/metricon70_banner_colo.jpg 7.8 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/cryptography_research_150x46_002.png 7.8 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/cryptography_research_150x46.png 7.8 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/sec17_button_180.png 7.7 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/beyond_security.png 7.5 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/beyond_security.png 7.5 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/fsm_150x86_2_002.png 7.5 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/fsm_150x86_2_002.png 7.5 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/bit_150x60.png 7.3 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/bit_150x60.png 7.3 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/bit_150x60.png 7.3 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/national_science_foundation_002.gif 7.3 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/national_science_foundation_002.gif 7.3 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/nsf_150x60_v2_002.png 7.3 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/nsf_150x60_v2.png 7.3 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/nsf_150x60_v2_002.png 7.3 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/nsf_150x60_v2_002.png 7.3 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/nsf_150x60_v2_002.png 7.3 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/nsf_150x60_v2_002.png 7.3 kB
USENIX Security 2008/Presentations/Practical Symmetric Key Cryptography on Modern Graphics Hardware_files/img9.png 7.1 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/usc_isi_black_600x240.png 7.1 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/acmqueue_600x240_1.png 7.0 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/acmqueue_600x240_1.png 7.0 kB
USENIX Security 2008/Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera1x.png 7.0 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/eff_horizontal_150x66_1.png 7.0 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/eff_horizontal_150x66_1.png 7.0 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/healthsec12_banner_colo.jpg 7.0 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/admin_150x60_002.png 7.0 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/admin_150x60_002.png 7.0 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/admin_150x60_002.png 7.0 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/admin_150x60_002.png 7.0 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/admin_150x60_002.png 7.0 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/admin_150x60_002.png 7.0 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/admin_150x60_002.png 7.0 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/admin_150x60.png 7.0 kB
USENIX Security 2008/Presentations/Practical Symmetric Key Cryptography on Modern Graphics Hardware_files/img14.png 7.0 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/oxford_university_press_150x55_002.png 6.9 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/oxford_university_press_150x55_002.png 6.9 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/hotsec09_button_170x74.jpg 6.8 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/hakin9_en150x40_002.png 6.8 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/hakin9_en150x40_002.png 6.8 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/userfriendly_150x38_0_002.png 6.7 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/userfriendly_150x38_0_002.png 6.7 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/facebook_150x50_0.png 6.7 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/facebook_150x50_0.png 6.7 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/facebook_150x50_3_002.png 6.7 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/facebook_150x50_3_002.png 6.7 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/lxer_150x60.png 6.6 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/lxer_150x60_002.png 6.6 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/lxer_150x60.png 6.6 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/lxer_150x60.png 6.6 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/lxer_150x60.png 6.6 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/lxer_150x60.png 6.6 kB
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/fsm.jpg 6.6 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/linux_journal_150x72_0.png 6.6 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/linux_journal_150x72_0.png 6.6 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/linux_journal_150x72_2.png 6.6 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/linux_journal_150x72_2.png 6.6 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/linux_journal_150x72_2.png 6.6 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/linux_journal_150x72_2.png 6.6 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/sec16_media.png 6.6 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/evtwote09_button_170x73.jpg 6.5 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/cisco_300x120.png 6.5 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/hackett_bankwell_125x81.jpg 6.5 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/hotsec12_banner_colo.jpg 6.4 kB
USENIX Security 2018/27th USENIX Security Symposium Grid_files/responsive.css 6.4 kB
USENIX Security 2019/28th USENIX Security Symposium Grid_files/responsive.css 6.4 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/woot09_button_170x72.jpg 6.4 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/cset12_banner_colo.jpg 6.4 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/kaspersky_600x240_1.png 6.3 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/cset09_button_170x73.jpg 6.3 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/lapsley-phil_100x115.jpg 6.3 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/bytedance_600x240_3.png 6.2 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/netflix_300x120_0.png 6.2 kB
USENIX Security 2010/USENIX Security 2010 Proceedings Errata.epub 6.2 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/dcj_150x27_0_002.png 6.2 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/dcj_150x27_0_002.png 6.2 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/arbor_networks_150x42_002.png 6.1 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/arbor_networks_150x42_002.png 6.1 kB
USENIX Security 2008/Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera8x.png 6.1 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/dcj_150x27_3_002.png 6.1 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/dcj_150x27_3_002.png 6.1 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/cisco_600x240.png 6.1 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/cisco_600x240.png 6.1 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/ibm_research_150x60_002.png 6.0 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/ibm_research_150x60_002.png 6.0 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/ibm_research_150x60_002.png 6.0 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/ibm_research_150x60_002.png 6.0 kB
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/google.jpg 6.0 kB
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/google.jpg 6.0 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/stack_exchange_150x37_0.png 6.0 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/stack_exchange_150x37_0.png 6.0 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/marcus_richard.jpg 5.9 kB
USENIX Security 2008/Presentations/Practical Symmetric Key Cryptography on Modern Graphics Hardware_files/img10.png 5.9 kB
USENIX Security 2008/Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera.css 5.8 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/cryptography_research_150x46.png 5.8 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/cryptography_research_150x46_002.png 5.8 kB
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img177.png 5.8 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/metricon09_button_170x74.jpg 5.7 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/infosecnews_150x120_0_002.png 5.6 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/infosecnews_150x120_0_002.png 5.6 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/salesforce_600x240.png 5.6 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/foci12_banner_colo.jpg 5.6 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/ibm_research_stacked_300x120_0.png 5.6 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css 5.6 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css 5.6 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css 5.6 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css 5.6 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css 5.6 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css 5.6 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css 5.6 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css 5.6 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css 5.6 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/css_1Cns3L1_TrifKTSgp644ViF6O9TZ1O0lZsCwyMt9kfE.css 5.6 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/google_logo_300x110_002.png 5.6 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/google_logo_300x110_002.png 5.6 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/woot12_banner_colo.jpg 5.5 kB
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/evt_cset_button.jpg 5.5 kB
USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css 5.4 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css 5.4 kB
USENIX Security 2018/USENIX Security 2018 Program at a Glance USENIX_files/css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css 5.4 kB
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css 5.4 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css 5.4 kB
USENIX Security 2019/USENIX Security 2019 Program at a Glance USENIX_files/css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css 5.4 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css 5.4 kB
USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css 5.4 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/css_ywqYrtSodM0qVMzAkOSnqZ_iBnAVpkSeD_yPtUN9tBk.css 5.4 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/evtwote12_banner_colo.jpg 5.4 kB
USENIX Security 2008/Presentations/Practical Symmetric Key Cryptography on Modern Graphics Hardware_files/img11.png 5.4 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/visa_research_300x120.png 5.4 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/symantec_150x60_002.png 5.4 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/symantec_150x60.png 5.4 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/symantec_150x60_002.png 5.4 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/symantec_150x60_002.png 5.4 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/linux_pro_150x57_0_002.png 5.3 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/linux_pro_150x57_0_002.png 5.3 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/virus_bulletin_150x60.png 5.2 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/virus_bulletin_150x60.png 5.2 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/virus_bulletin_150x60.png 5.2 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/virus_bulletin_150x60.png 5.2 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/virus_bulletin_150x60.png 5.2 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/virus_bulletin_150x60.png 5.2 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/virus_bulletin_150x60.png 5.2 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/virus_bulletin_150x60.png 5.2 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/infosecnews_150x120_0.png 5.2 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/infosecnews_150x120_0.png 5.2 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/symantec_logo_1_002.png 5.1 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/symantec_logo_1_002.png 5.1 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/dfrws_button.jpg 5.1 kB
USENIX Security 2008/USENIX Security 2008 Technical Sessions_files/bowen_debra.jpg 5.0 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/linux_pro_150x60_002.png 5.0 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/linux_pro_150x60_002.png 5.0 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/linux_pro_150x60_002.png 5.0 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/linux_pro_150x60_002.png 5.0 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/linux_pro_150x60_002.png 5.0 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/linux_pro_150x60_002.png 5.0 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/linux_pro_150x60_002.png 5.0 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/linux_pro_150x60_002.png 5.0 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/infosecnews_150x38_002.png 4.9 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/infosecnews_150x38_002.png 4.9 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/infosecnews_150x38_002.png 4.9 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/infosecnews_150x38_002.png 4.9 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/infosecnews_150x38_002.png 4.9 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/infosecnews_150x38_002.png 4.9 kB
USENIX Security 2008/Presentations/Practical Symmetric Key Cryptography on Modern Graphics Hardware_files/img15.png 4.9 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/microsoft_research_0.png 4.9 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/microsoft_research_0.png 4.9 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/google_600x240_13.png 4.8 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/facebook_600x240_6.png 4.8 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/facebook_5.png 4.8 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/facebook_5.png 4.8 kB
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/symantec.jpg 4.8 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/nsf_150x60_v2.png 4.8 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/nsf_150x60_v2_002.png 4.8 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/nsf_150x60_v2.png 4.8 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/nsf_150x60_v2.png 4.8 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/nsf_150x60_v2.png 4.8 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/nsf_150x60_v2.png 4.8 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/facebook_2016_300x120_1.png 4.8 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/facebook_2016_300x120_1.png 4.8 kB
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/sec07.css 4.8 kB
USENIX Security 2007/Presentations/Security 2007 Poster Session_files/sec07.css 4.8 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/akamai_150x62.png 4.7 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/akamai_150x62.png 4.7 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/nsp_logo_black.png 4.7 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/nsp_logo_black_002.png 4.7 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/nsp_logo_black.png 4.7 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/nsp_logo_black_002.png 4.7 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/acmqueue_600x240_1.png 4.7 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/acmqueue_600x240_1.png 4.7 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/acmqueue_600x240_1.png 4.7 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/acmqueue_600x240_1.png 4.7 kB
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/techxworld_logo.jpg 4.7 kB
USENIX Security 2019/USENIX Security 2019 Program at a Glance USENIX_files/sec19_wordmark_stacked_456x186.png 4.7 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/sec19_wordmark_stacked_456x186.png 4.7 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/lxer_150x53_0.png 4.6 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/lxer_150x53_0.png 4.6 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/intel_600x240.png 4.6 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/neustar_150x60.png 4.5 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/neustar_150x60_002.png 4.5 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/ieee_sp_150x36_4_002.png 4.5 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/ieee_sp_150x36_4_002.png 4.5 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/ieee_sp_150x36_0_002.png 4.5 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/ieee_sp_150x36_0_002.png 4.5 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/microsoft_150x60_0.png 4.5 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/microsoft_150x60_0.png 4.5 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/acmqueue_150x48_0_002.png 4.5 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/acmqueue_150x48_0_002.png 4.5 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/acmqueue_150x48_3.png 4.5 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/acmqueue_150x48_3.png 4.5 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/acmqueue_150x48_3.png 4.5 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/acmqueue_150x48_3.png 4.5 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/acmqueue_150x48_3_002.png 4.5 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/acmqueue_150x48_3_002.png 4.5 kB
USENIX Security 2018/27th USENIX Security Symposium Grid_files/app-google.svg 4.5 kB
USENIX Security 2019/28th USENIX Security Symposium Grid_files/app-google.svg 4.5 kB
USENIX logo.jpg 4.4 kB
USENIX Security 2010/USENIX Security 2010 Proceedings Errata.mobi 4.4 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/dmtf_150x53_0_002.png 4.4 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/dmtf_150x53_0_002.png 4.4 kB
USENIX Security 2018/USENIX Security 2018 Program at a Glance USENIX_files/css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css 4.3 kB
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css 4.3 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css 4.3 kB
USENIX Security 2019/USENIX Security 2019 Program at a Glance USENIX_files/css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css 4.3 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css 4.3 kB
USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css 4.3 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/css_fie1FTfhqzQzqQgTa3efy5dIrK4YpjbsVN5badjjFOo.css 4.3 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/baidu_600x240_0.png 4.3 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/security_orb_tagline_150x47.png 4.3 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/security_orb_tagline_150x47_002.png 4.3 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/computer_150x33_0.png 4.2 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/computer_150x33_0.png 4.2 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/eff_horizontal_150x66_1_002.png 4.2 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/eff_horizontal_150x66_1_002.png 4.2 kB
USENIX Security 2011/USENIX Security 2011 Proceedings Errata.mobi 4.2 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/national_science_foundation.gif 4.2 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/national_science_foundation.gif 4.2 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/microsoft-logo_600x240.png 4.2 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/microsoft-logo_600x240_0.png 4.2 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/admin_150x60.png 4.2 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/admin_150x60.png 4.2 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/admin_150x60.png 4.2 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/admin_150x60.png 4.2 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/admin_150x60.png 4.2 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/admin_150x60.png 4.2 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/admin_150x60.png 4.2 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/admin_150x60_002.png 4.2 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/fsm_150x44_0.png 4.1 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/fsm_150x44_0.png 4.1 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/ibm_research_150x60.png 4.1 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/ibm_research_150x60.png 4.1 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/ibm_research_150x60.png 4.1 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/ibm_research_150x60.png 4.1 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/dmtf_600x240.png 4.1 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/dmtf_600x240.png 4.1 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/dmtf_600x240_002.png 4.1 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/dmtf_600x240_002.png 4.1 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/dmtf_600x240_002.png 4.1 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/dmtf_600x240_002.png 4.1 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/dmtf_600x240.png 4.1 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/dmtf_600x240.png 4.1 kB
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/AW_PH_stacked.jpg 4.0 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/arbor_networks_150x42.png 4.0 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/arbor_networks_150x42.png 4.0 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/google_150x50_3.png 4.0 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/google_150x50_3_002.png 4.0 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/crc_press_150x60.png 3.9 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/crc_press_150x60.png 3.9 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/crc_press_150x60.png 3.9 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/crc_press_150x60.png 3.9 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/crc_press_150x60.png 3.9 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/crc_press_150x60.png 3.9 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/nostarch_600x240_1.png 3.9 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/nostarch_600x240_1.png 3.9 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/nostarch_600x240_1.png 3.9 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/nostarch_600x240_1.png 3.9 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/nostarch_600x240_1.png 3.9 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/nostarch_600x240_1.png 3.9 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/nostarch_600x240_1.png 3.9 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/nostarch_600x240_1.png 3.9 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/cmu_cert_150x73.png 3.9 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/cmu_cert_150x73_002.png 3.9 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/google_2016_150x60_0_002.png 3.9 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/google_2016_150x60_0.png 3.9 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/cowan_crispin.jpg 3.9 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/facebook_600x240_17.png 3.9 kB
USENIX Security 2011/USENIX Security 2011 Proceedings Eratta.epub 3.8 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/chandra_pravir.jpg 3.8 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/yubico_300x120_1.png 3.8 kB
USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/sec20_wordmark_stacked_white.png 3.8 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/sec20_wordmark_stacked_white.png 3.8 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/oreilly_150x28_0_002.png 3.8 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/oreilly_150x28_0_002.png 3.8 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/oreilly_150x28_3_002.png 3.8 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/oreilly_150x28_3_002.png 3.8 kB
USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css 3.8 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css 3.8 kB
USENIX Security 2018/USENIX Security 2018 Program at a Glance USENIX_files/css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css 3.8 kB
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css 3.8 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css 3.8 kB
USENIX Security 2019/USENIX Security 2019 Program at a Glance USENIX_files/css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css 3.8 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css 3.8 kB
USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css 3.8 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/css_wn5vXo8qkBPuGeIEQvsbl2FYLhNAL-hadBx5xI5frRA.css 3.8 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/qc_600x240_1.png 3.8 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/hpcwire_150x55_0.png 3.8 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/hpcwire_150x55_0.png 3.8 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/hpcwire_150x55_0.png 3.8 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/hpcwire_150x55_0.png 3.8 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/hpcwire_150x55_0.png 3.8 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/hpcwire_150x55_0.png 3.8 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/microsoft_150x60_0_002.png 3.8 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/microsoft_150x60_0_002.png 3.8 kB
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/linux_gazette.gif 3.8 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/linux_gazette_125x125.gif 3.8 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/hns_125_50.jpg 3.8 kB
USENIX Security 2018/USENIX Security 2018 Program at a Glance USENIX_files/sec18_wordmark_stacked_450x186.png 3.7 kB
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/sec18_wordmark_stacked_450x186.png 3.7 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/sec18_wordmark_stacked_450x186_002.png 3.7 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/neustar_150x60_002.png 3.7 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/neustar_150x60.png 3.7 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/nostarch_90x104.jpg 3.7 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/lxer_150x60_002.png 3.7 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/lxer_150x60.png 3.7 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/lxer_150x60_002.png 3.7 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/lxer_150x60_002.png 3.7 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/lxer_150x60_002.png 3.7 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/lxer_150x60_002.png 3.7 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/kaspersky_600x240.png 3.7 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/admin_125x47_0.png 3.7 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/admin_125x47_0.png 3.7 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/oreilly_150x60_002.png 3.6 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/oreilly_150x60_002.png 3.6 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/linux_journal_100x48.jpg 3.5 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/linux_pro_150x57_0.png 3.5 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/linux_pro_150x57_0.png 3.5 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/userfriendly_150x38_0.png 3.5 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/userfriendly_150x38_0.png 3.5 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/hakin9_en150x40.png 3.5 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/hakin9_en150x40.png 3.5 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/google_140x58.gif 3.5 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/ibm-research.png 3.5 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/ibm-research.png 3.5 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/intel_600x240.png 3.4 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/freebsd_foundation_600x240.png 3.4 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/freebsd_foundation_600x240.png 3.4 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/freebsdfoundation_600x240_0.png 3.4 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/freebsdfoundation_600x240_0.png 3.4 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/serverfault_150x35_0_002.png 3.4 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/serverfault_150x35_0_002.png 3.4 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/stack_exchange_150x37_0_002.png 3.3 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/stack_exchange_150x37_0_002.png 3.3 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/ibm_research_150x60_0_002.png 3.3 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/ibm_research_150x60_0_002.png 3.3 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/google_2016_150x60_0.png 3.3 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/google_2016_150x60_0_002.png 3.3 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/dropbox_2018_600x240_0.png 3.3 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/dropbox_2018_600x240_2.png 3.3 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/dropbox_2018_600x240_1_1.png 3.3 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/craigslist_150x35_1.png 3.3 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/craigslist_150x35_1.png 3.3 kB
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/ittoolbox.gif 3.3 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/computer_150x33_0_002.png 3.2 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/computer_150x33_0_002.png 3.2 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/all.js 3.2 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/all.js 3.2 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/all.js 3.2 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/all.js 3.2 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/all.js 3.2 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/all.js 3.2 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/all.js 3.2 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/all.js 3.2 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/all.js 3.2 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/all.js 3.2 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/dmtf_600x240.png 3.2 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/dmtf_600x240.png 3.2 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/dmtf_600x240.png 3.2 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/dcj_150x27_0.png 3.2 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/dcj_150x27_0.png 3.2 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/dcj_150x27_3.png 3.2 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/dcj_150x27_3.png 3.2 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/microsoft_research_150x42_2.png 3.2 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/microsoft_research_150x42_2.png 3.2 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/microsoft_research_150x42_2.png 3.2 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/microsoft_research_150x42_2.png 3.2 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/google_8_002.png 3.2 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/google_8_002.png 3.2 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/google_6.png 3.2 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/google_6.png 3.2 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/acmqueue_150x48_0.png 3.1 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/acmqueue_150x48_0.png 3.1 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/acmqueue_150x48_3_002.png 3.1 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/acmqueue_150x48_3_002.png 3.1 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/acmqueue_150x48_3_002.png 3.1 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/acmqueue_150x48_3_002.png 3.1 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/acmqueue_150x48_3.png 3.1 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/acmqueue_150x48_3.png 3.1 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/infosecnews_150x38.png 3.1 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/infosecnews_150x38.png 3.1 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/infosecnews_150x38.png 3.1 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/infosecnews_150x38.png 3.1 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/infosecnews_150x38.png 3.1 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/infosecnews_150x38.png 3.1 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/it_dev_150x39_002.png 3.1 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/it_dev_150x39_002.png 3.1 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/baidu_150x60.png 3.0 kB
USENIX Security 2008/Presentations/Practical Symmetric Key Cryptography on Modern Graphics Hardware_files/img7.png 3.0 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/microsoft_600x240_0_002.png 3.0 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/microsoft_600x240_0_002.png 3.0 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/userfriendly_150x60.png 3.0 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/userfriendly_150x60.png 3.0 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/userfriendly_150x60.png 3.0 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/userfriendly_150x60_002.png 3.0 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/userfriendly_150x60.png 3.0 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/userfriendly_150x60.png 3.0 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/userfriendly_150x60.png 3.0 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/userfriendly_150x60.png 3.0 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/toolbox_100x76.gif 3.0 kB
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/infosecnews.gif 3.0 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/virus_bulletin_150x60_002.png 3.0 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/virus_bulletin_150x60_002.png 3.0 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/virus_bulletin_150x60_002.png 3.0 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/virus_bulletin_150x60_002.png 3.0 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/virus_bulletin_150x60_002.png 3.0 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/virus_bulletin_150x60_002.png 3.0 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/virus_bulletin_150x60_002.png 3.0 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/virus_bulletin_150x60_002.png 3.0 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/qualcomm_150x22_002.png 2.9 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/qualcomm_150x22.png 2.9 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/qualcomm_150x22_002.png 2.9 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/qualcomm_150x22_002.png 2.9 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/linux_pro_150x60.png 2.9 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/linux_pro_150x60.png 2.9 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/linux_pro_150x60.png 2.9 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/linux_pro_150x60.png 2.9 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/linux_pro_150x60.png 2.9 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/linux_pro_150x60.png 2.9 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/linux_pro_150x60.png 2.9 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/linux_pro_150x60.png 2.9 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/facebook_2016_150x60_1.png 2.9 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/facebook_2016_150x60_1.png 2.9 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/cmu_cert_150x73_002.png 2.9 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/cmu_cert_150x73.png 2.9 kB
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/dr_dobbs.gif 2.9 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/ibm_research_150x60_0.png 2.8 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/ibm_research_150x60_0.png 2.8 kB
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/storage_networking.gif 2.8 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/bit_150x60_002.png 2.8 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/bit_150x60_002.png 2.8 kB
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/betanews.gif 2.8 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/akamai_150x62_002.png 2.8 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/akamai_150x62_002.png 2.8 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/microsoft_research_150x42_2_002.png 2.8 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/microsoft_research_150x42_2_002.png 2.8 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/microsoft_research_150x42_2_002.png 2.8 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/microsoft_research_150x42_2_002.png 2.8 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/mars_horizontal_300x120.png 2.8 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/cisco_150x60_002.png 2.7 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/cisco_150x60_002.png 2.7 kB
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/userfriendly.gif 2.6 kB
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/user_friendly.gif 2.6 kB
USENIX Security 2018/27th USENIX Security Symposium Grid_files/jquery_002.js 2.6 kB
USENIX Security 2019/28th USENIX Security Symposium Grid_files/jquery_003.js 2.6 kB
USENIX Security 2017/USENIX Security 2017 USENIX_files/nostarch_600x240_1.png 2.6 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/nostarch_600x240_1.png 2.6 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/nostarch_600x240_1.png 2.6 kB
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/hpc.gif 2.6 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/ibm_research_600x240.png 2.6 kB
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img155.png 2.5 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/microsoft_600x240_0.png 2.5 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/microsoft_600x240_0.png 2.5 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/dmtf_600x240_002.png 2.5 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/dmtf_600x240_002.png 2.5 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/dmtf_600x240.png 2.5 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/dmtf_600x240.png 2.5 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/dmtf_600x240.png 2.5 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/dmtf_600x240.png 2.5 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/dmtf_600x240_002.png 2.5 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/dmtf_600x240_002.png 2.5 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/acmqueue_600x240_1_002.png 2.5 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/acmqueue_600x240_1_002.png 2.5 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/oreilly_150x60.png 2.5 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/oreilly_150x60.png 2.5 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/oreilly_150x28_0.png 2.4 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/oreilly_150x28_0.png 2.4 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/oreilly_150x28_3.png 2.4 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/oreilly_150x28_3.png 2.4 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/facebook_2016_150x60_1_002.png 2.4 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/facebook_2016_150x60_1_002.png 2.4 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/serverfault_150x35_0.png 2.4 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/serverfault_150x35_0.png 2.4 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/microsoft_research_0_002.png 2.4 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/microsoft_research_0_002.png 2.4 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/confguru_125x34.jpg 2.3 kB
USENIX Security 2020/USENIX Security '20 USENIX_files/ibm_600x240_2.png 2.3 kB
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/microsoft.gif 2.3 kB
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/microsoft_research.gif 2.3 kB
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img169.png 2.3 kB
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/bae_systems.gif 2.2 kB
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/bae_systems.gif 2.2 kB
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/ieee_security.gif 2.2 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/craigslist_150x35_1_002.png 2.1 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/craigslist_150x35_1_002.png 2.1 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/meraki_logo_145x58.jpg 2.1 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/cisco_150x60.png 2.1 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/cisco_150x60.png 2.1 kB
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/ieee_security.gif 2.1 kB
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img173.png 2.1 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/fsm_125x36.gif 2.0 kB
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img171.png 2.0 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/betanews_125x23.jpg 2.0 kB
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/storagenetworking.gif 1.9 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/acmqueue_new_100x32.jpg 1.9 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/ibm-research_002.png 1.9 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/ibm-research_002.png 1.9 kB
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/grid_today.gif 1.9 kB
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/barracuda.gif 1.9 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/qualcomm_150x22.png 1.9 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/qualcomm_150x22_002.png 1.9 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/qualcomm_150x22.png 1.9 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/qualcomm_150x22.png 1.9 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/in-icon.jpeg 1.9 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/in-icon.jpeg 1.9 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/in-icon.jpeg 1.9 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/in-icon.jpeg 1.9 kB
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/the_register.gif 1.8 kB
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/ists_logo.gif 1.8 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/fastbutton.htm 1.8 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/fastbutton.htm 1.8 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/fastbutton.htm 1.8 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/fastbutton.htm 1.8 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/fastbutton.htm 1.8 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/fastbutton.htm 1.8 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/fastbutton.htm 1.8 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/fastbutton.htm 1.8 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/fastbutton.htm 1.8 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/fastbutton.htm 1.8 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/twitter-icon.jpeg 1.7 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/twitter-icon.jpeg 1.7 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/twitter-icon.jpeg 1.7 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/twitter-icon.jpeg 1.7 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/ibm_research_145x15.jpg 1.7 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/fastbutton_002.htm 1.7 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/fastbutton_002.htm 1.7 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/fastbutton_002.htm 1.7 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/fastbutton_002.htm 1.7 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/fastbutton_002.htm 1.7 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/fastbutton_002.htm 1.7 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/fastbutton_002.htm 1.7 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/fastbutton_002.htm 1.7 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/fastbutton_002.htm 1.7 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/fastbutton_002.htm 1.7 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/ieee_sp_125x30.gif 1.7 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/youtube-icon.jpg 1.7 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/youtube-icon.jpg 1.7 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/youtube-icon.jpg 1.7 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/youtube-icon.jpg 1.7 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/infosecnews_100x80.gif 1.7 kB
USENIX Security 2011/USENIX Security 2011 Poster Session_files/left_bottom.gif 1.7 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/facebook-icon.jpeg 1.7 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/facebook-icon.jpeg 1.7 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/facebook-icon.jpeg 1.7 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/facebook-icon.jpeg 1.7 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/googleplus-icon.jpg 1.7 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/googleplus-icon.jpg 1.7 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/googleplus-icon.jpg 1.7 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/googleplus-icon.jpg 1.7 kB
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/linux_journal.gif 1.7 kB
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/linux_journal.gif 1.6 kB
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img165.png 1.6 kB
USENIX Security 2018/USENIX Security 2018 USENIX_files/eff_2018_red_600x240_1.png 1.6 kB
USENIX Security 2019/USENIX Security 2019 USENIX_files/eff_2018_red_600x240_1.png 1.6 kB
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img162.png 1.6 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/nostarch_600x240_1_002.png 1.6 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/nostarch_600x240_1_002.png 1.6 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/nostarch_600x240_1_002.png 1.6 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/nostarch_600x240_1_002.png 1.6 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/nostarch_600x240_1_002.png 1.6 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/nostarch_600x240_1_002.png 1.6 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/nostarch_600x240_1_002.png 1.6 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/nostarch_600x240_1_002.png 1.6 kB
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/DDJ.gif 1.6 kB
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/nostarch.gif 1.6 kB
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/nostarch.gif 1.6 kB
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/netwitness.gif 1.5 kB
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/hdj.gif 1.5 kB
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/fsm.gif 1.5 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css 1.5 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css 1.5 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css 1.5 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css 1.5 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css 1.5 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css 1.5 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css 1.5 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css 1.5 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css 1.5 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/css_sbgTGmf2o20zX-SsljIhYu6svBJ0rt4TSOkkyk8ONGw.css 1.5 kB
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/queue.gif 1.5 kB
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/queue.gif 1.5 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js 1.4 kB
USENIX Security 2012/USENIX Security 2012 USENIX_files/js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js 1.4 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js 1.4 kB
USENIX Security 2013/USENIX Security 2013 USENIX_files/js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js 1.4 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js 1.4 kB
USENIX Security 2014/USENIX Security 2014 USENIX_files/js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js 1.4 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js 1.4 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js 1.4 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js 1.4 kB
USENIX Security 2016/USENIX Security 2016 USENIX_files/js_ByQqoFmos53DlLDLfNaeXBXbxiumZmAoP08wXIegdFk.js 1.4 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/aw_ph.gif 1.4 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/microsoft_research_150.gif 1.4 kB
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/ibm_research.gif 1.4 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/video_16.png 1.4 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/video_16.png 1.4 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/video_16.png 1.4 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/video_16.png 1.4 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/video_16.png 1.4 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/dmtf_logo_100.gif 1.4 kB
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img151.png 1.4 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/network_world_itr_125x27.gif 1.4 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/usenix-locked.png 1.4 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/usenix-locked.png 1.4 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/usenix-locked.png 1.4 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/usenix-locked.png 1.4 kB
USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/usenix-locked.png 1.4 kB
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/usenix-locked.png 1.4 kB
USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/usenix-locked.png 1.4 kB
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/ittoolbox.gif 1.3 kB
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/snia_logo.gif 1.3 kB
USENIX Security 2012/Technical Sessions 2012 USENIX_files/slides_16.png 1.3 kB
USENIX Security 2013/Technical Sessions 2013 USENIX_files/slides_16.png 1.3 kB
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/slides_16.png 1.3 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/slides_16.png 1.3 kB
USENIX Security 2016/Technical Sessions 2016 USENIX_files/slides_16.png 1.3 kB
USENIX Security 2008/USENIX Security 2008 Technical Sessions_files/video_icon.gif 1.3 kB
USENIX Security 2009/USENIX Security 2009 Technical Sessions_files/video_icon.gif 1.3 kB
USENIX Security 2010/USENIX Security 2010 Technical Sessions_files/video_icon.gif 1.3 kB
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img166.png 1.2 kB
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img145.png 1.2 kB
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/AW_PH_stacked.gif 1.2 kB
USENIX Security 2011/USENIX Security 2011 Poster Session_files/longbar.gif 1.2 kB
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/lxer.gif 1.2 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/linuxpro_100x38.gif 1.2 kB
USENIX Security 2008/Presentations/Practical Symmetric Key Cryptography on Modern Graphics Hardware_files/img4.png 1.2 kB
USENIX Security 2011/USENIX Security 2011 Poster Session_files/left_bar.gif 1.2 kB
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img129.png 1.2 kB
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/userfriendly_125x26.gif 1.2 kB
USENIX Security 2008/Presentations/Practical Symmetric Key Cryptography on Modern Graphics Hardware_files/img3.png 1.1 kB
USENIX Security 2008/Presentations/Practical Symmetric Key Cryptography on Modern Graphics Hardware_files/img5.png 1.0 kB
USENIX Security 2015/Technical Sessions 2015 USENIX_files/peerj_600x240.png 1.0 kB
USENIX Security 2015/USENIX Security 2015 USENIX_files/peerj_600x240.png 1.0 kB
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/bkgs.css 1.0 kB
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/linuxpro.gif 1.0 kB
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img127.png 1.0 kB
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img27.png 992 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img58.png 987 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img144.png 961 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img49.png 951 Bytes
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/lxer_80x28.gif 947 Bytes
USENIX Security 2013/Technical Sessions 2013 USENIX_files/js_RGgtt0xyoog3aEbqA3PACaZnzIbopLWdKtKDjg0Ge54.js 937 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img128.png 903 Bytes
USENIX Security 2008/Presentations/Practical Symmetric Key Cryptography on Modern Graphics Hardware_files/usenix_layout_html.css 891 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img163.png 885 Bytes
USENIX Security thank you.txt 877 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img158.png 871 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img103.png 870 Bytes
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/ciscopress.gif 863 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img119.png 849 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img146.png 846 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img142.png 845 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img70.png 824 Bytes
USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/video.svg 818 Bytes
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/video.svg 818 Bytes
USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/video.svg 818 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img100.png 816 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img99.png 808 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img139.png 785 Bytes
USENIX Security 2008/USENIX Security 2008 Technical Sessions_files/mp3_icon.gif 777 Bytes
USENIX Security 2009/USENIX Security 2009 Technical Sessions_files/mp3_icon.gif 777 Bytes
USENIX Security 2010/USENIX Security 2010 Technical Sessions_files/mp3_icon.gif 777 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img57.png 773 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img174.png 770 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img40.png 770 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img47.png 755 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img56.png 749 Bytes
USENIX Security 2008/Presentations/Practical Symmetric Key Cryptography on Modern Graphics Hardware_files/img6.png 745 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img179.png 741 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img92.png 737 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img68.png 733 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img63.png 723 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img126.png 719 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img42.png 708 Bytes
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/left_bottom.gif 705 Bytes
USENIX Security 2007/Presentations/Security 2007 Poster Session_files/left_bottom.gif 705 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img181.png 684 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img98.png 683 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img178.png 677 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img105.png 672 Bytes
USENIX Security 2012/Technical Sessions 2012 USENIX_files/postmessageRelay.htm 659 Bytes
USENIX Security 2012/USENIX Security 2012 USENIX_files/postmessageRelay.htm 659 Bytes
USENIX Security 2013/Technical Sessions 2013 USENIX_files/postmessageRelay.htm 659 Bytes
USENIX Security 2013/USENIX Security 2013 USENIX_files/postmessageRelay.htm 659 Bytes
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/postmessageRelay.htm 659 Bytes
USENIX Security 2014/USENIX Security 2014 USENIX_files/postmessageRelay.htm 659 Bytes
USENIX Security 2015/Technical Sessions 2015 USENIX_files/postmessageRelay.htm 659 Bytes
USENIX Security 2015/USENIX Security 2015 USENIX_files/postmessageRelay.htm 659 Bytes
USENIX Security 2016/Technical Sessions 2016 USENIX_files/postmessageRelay.htm 659 Bytes
USENIX Security 2016/USENIX Security 2016 USENIX_files/postmessageRelay.htm 659 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img160.png 657 Bytes
USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/slides.svg 655 Bytes
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/slides.svg 655 Bytes
USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/slides.svg 655 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img11.png 646 Bytes
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/linux.gif 639 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img83.png 639 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img111.png 638 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img149.png 632 Bytes
USENIX Security 2008/Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera0x.png 628 Bytes
USENIX Security 2008/Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera3x.png 628 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img72.png 624 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img122.png 612 Bytes
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/audio.svg 610 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img159.png 605 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img6.png 604 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img81.png 597 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img41.png 594 Bytes
USENIX Security 2012/Technical Sessions 2012 USENIX_files/ibm-research_gs.png 588 Bytes
USENIX Security 2012/USENIX Security 2012 USENIX_files/ibm-research_gs.png 588 Bytes
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/ciscopress.gif 578 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img180.png 569 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img120.png 565 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img66.png 556 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img73.png 547 Bytes
USENIX Security 2008/Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera2x.png 545 Bytes
USENIX Security 2015/USENIX Security 2015 USENIX_files/ie.css 543 Bytes
USENIX Security 2016/USENIX Security 2016 USENIX_files/ie.css 543 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img102.png 542 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img156.png 540 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img82.png 533 Bytes
USENIX Security 2010/USENIX Security 2010 Poster Session_files/left_bottom.gif 533 Bytes
USENIX Security 2010/USENIX Security 2010 Technical Sessions_files/left_bottom.gif 533 Bytes
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/left_bottom.gif 531 Bytes
USENIX Security 2009/USENIX Security 2009 Technical Sessions_files/left_bottom.gif 531 Bytes
USENIX Security 2009/USENIX Security 2009 WiPs_files/left_bottom.gif 531 Bytes
USENIX Security 2012/Technical Sessions 2012 USENIX_files/audio_16.png 531 Bytes
USENIX Security 2013/Technical Sessions 2013 USENIX_files/audio_16.png 531 Bytes
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/audio_16.png 531 Bytes
USENIX Security 2015/Technical Sessions 2015 USENIX_files/audio_16.png 531 Bytes
USENIX Security 2016/Technical Sessions 2016 USENIX_files/audio_16.png 531 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img134.png 518 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img23.png 518 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img36.png 517 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img37.png 512 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img121.png 505 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img104.png 501 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img106.png 495 Bytes
USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/pdf.svg 493 Bytes
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/pdf.svg 493 Bytes
USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/pdf.svg 493 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img69.png 487 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img101.png 481 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img24.png 480 Bytes
USENIX Security 2008/Presentations/An Improved Clock-skew Measurement Technique for Revealing Hidden Services_files/improved-skew-est-camera7x.png 464 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img38.png 460 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img175.png 458 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img22.png 457 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img43.png 448 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img123.png 444 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img60.png 432 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img5.png 430 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img7.png 425 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img168.png 424 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img108.png 423 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img109.png 419 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img124.png 418 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img172.png 415 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img14.png 414 Bytes
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/left_bottom.gif 407 Bytes
USENIX Security 2008/Presentations/USENIX Security 2008 Poster Session_files/left_bottom.gif 407 Bytes
USENIX Security 2008/USENIX Security 2008 Technical Sessions_files/left_bottom.gif 407 Bytes
USENIX Security 2008/USENIX Security 2008 WiPs_files/left_bottom.gif 407 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img170.png 400 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img84.png 398 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img93.png 398 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img90.png 395 Bytes
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/usenix_face.gif 374 Bytes
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/usenix_face.gif 374 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img50.png 373 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img35.png 371 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img21.png 368 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img176.png 367 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img88.png 365 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img79.png 356 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img55.png 354 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img110.png 352 Bytes
USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/js_fyV0VVkC6Q3xduxGurKMTFIU2dMmArUrbAdZORL-9WQ.js 350 Bytes
USENIX Security 2020/USENIX Security '20 USENIX_files/js_fyV0VVkC6Q3xduxGurKMTFIU2dMmArUrbAdZORL-9WQ.js 350 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img133.png 348 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img96.png 348 Bytes
USENIX Security 2012/Technical Sessions 2012 USENIX_files/conference-schedule-pdf.png 346 Bytes
USENIX Security 2012/Technical Sessions 2012 USENIX_files/pdf_16.png 346 Bytes
USENIX Security 2013/Technical Sessions 2013 USENIX_files/conference-schedule-pdf.png 346 Bytes
USENIX Security 2013/Technical Sessions 2013 USENIX_files/pdf_16.png 346 Bytes
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/application-pdf.png 346 Bytes
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/pdf_16.png 346 Bytes
USENIX Security 2015/Technical Sessions 2015 USENIX_files/application-pdf.png 346 Bytes
USENIX Security 2015/Technical Sessions 2015 USENIX_files/conference-schedule-pdf.png 346 Bytes
USENIX Security 2015/Technical Sessions 2015 USENIX_files/pdf_16.png 346 Bytes
USENIX Security 2016/Technical Sessions 2016 USENIX_files/application-pdf.png 346 Bytes
USENIX Security 2016/Technical Sessions 2016 USENIX_files/conference-schedule-pdf.png 346 Bytes
USENIX Security 2016/Technical Sessions 2016 USENIX_files/pdf_16.png 346 Bytes
USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/application-pdf.png 346 Bytes
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/application-pdf.png 346 Bytes
USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/application-pdf.png 346 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img28.png 345 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img54.png 345 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img97.png 345 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img112.png 335 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img161.png 322 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img182.png 320 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img153.png 311 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img148.png 306 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img113.png 305 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img115.png 305 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img137.png 305 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img154.png 304 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img143.png 302 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img95.png 302 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img147.png 297 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img34.png 297 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img53.png 297 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img140.png 294 Bytes
USENIX Security 2018/27th USENIX Security Symposium Grid_files/custom-screen.css 293 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img135.png 292 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img141.png 289 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img80.png 288 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img131.png 287 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img117.png 285 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img20.png 285 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img33.png 282 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img52.png 282 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img4.png 280 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img86.png 280 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img89.png 280 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img25.png 277 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img3.png 277 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img2.png 276 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img18.png 275 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img75.png 272 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img87.png 272 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img116.png 265 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img62.png 265 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img1.png 264 Bytes
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/footer.gif 263 Bytes
USENIX Security 2007/Presentations/Security 2007 Poster Session_files/footer.gif 263 Bytes
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/footer.gif 263 Bytes
USENIX Security 2008/Presentations/USENIX Security 2008 Poster Session_files/footer.gif 263 Bytes
USENIX Security 2008/USENIX Security 2008 Technical Sessions_files/footer.gif 263 Bytes
USENIX Security 2008/USENIX Security 2008 WiPs_files/footer.gif 263 Bytes
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/footer.gif 263 Bytes
USENIX Security 2009/USENIX Security 2009 Technical Sessions_files/footer.gif 263 Bytes
USENIX Security 2009/USENIX Security 2009 WiPs_files/footer.gif 263 Bytes
USENIX Security 2010/USENIX Security 2010 Poster Session_files/footer.gif 263 Bytes
USENIX Security 2010/USENIX Security 2010 Technical Sessions_files/footer.gif 263 Bytes
USENIX Security 2011/USENIX Security 2011 Poster Session_files/footer.gif 263 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img32.png 261 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img71.png 261 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img64.png 260 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img65.png 260 Bytes
USENIX Security 2013/Technical Sessions 2013 USENIX_files/package-x-generic.png 260 Bytes
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/package-x-generic.png 260 Bytes
USENIX Security 2015/Technical Sessions 2015 USENIX_files/package-x-generic.png 260 Bytes
USENIX Security 2016/Technical Sessions 2016 USENIX_files/package-x-generic.png 260 Bytes
USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/package-x-generic.png 260 Bytes
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/package-x-generic.png 260 Bytes
USENIX Security 2020/USENIX Security '20 Technical Sessions USENIX_files/package-x-generic.png 260 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img107.png 257 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img29.png 257 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img85.png 257 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img167.png 254 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img91.png 254 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img138.png 253 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img67.png 245 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img12.png 242 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img13.png 242 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img31.png 240 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img17.png 236 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img136.png 235 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img51.png 235 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img132.png 231 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img157.png 231 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img16.png 230 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img9.png 230 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img78.png 229 Bytes
USENIX Security 2008/Presentations/Practical Symmetric Key Cryptography on Modern Graphics Hardware_files/img1.png 228 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img152.png 228 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img26.png 228 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img74.png 226 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img150.png 225 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img48.png 224 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img77.png 221 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img15.png 220 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img8.png 220 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img45.png 219 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img164.png 215 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img44.png 212 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img39.png 211 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img61.png 208 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img114.png 206 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img19.png 206 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img30.png 206 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img76.png 201 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img118.png 195 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img130.png 189 Bytes
USENIX Security 2012/Technical Sessions 2012 USENIX_files/application-octet-stream.png 189 Bytes
USENIX Security 2013/Technical Sessions 2013 USENIX_files/application-octet-stream.png 189 Bytes
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/application-octet-stream.png 189 Bytes
USENIX Security 2015/Technical Sessions 2015 USENIX_files/application-octet-stream.png 189 Bytes
USENIX Security 2016/Technical Sessions 2016 USENIX_files/application-octet-stream.png 189 Bytes
USENIX Security 2017/USENIX Security 2017 Technical Sessions USENIX_files/application-octet-stream.png 189 Bytes
USENIX Security 2018/USENIX Security 2018 Technical Sessions USENIX_files/application-octet-stream.png 189 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img46.png 182 Bytes
USENIX Security 2012/Technical Sessions 2012 USENIX_files/css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css 141 Bytes
USENIX Security 2012/USENIX Security 2012 USENIX_files/css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css 141 Bytes
USENIX Security 2013/Technical Sessions 2013 USENIX_files/css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css 141 Bytes
USENIX Security 2013/USENIX Security 2013 USENIX_files/css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css 141 Bytes
USENIX Security 2014/USENIX Security 2014 Technical Sessions_files/css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css 141 Bytes
USENIX Security 2014/USENIX Security 2014 USENIX_files/css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css 141 Bytes
USENIX Security 2015/Technical Sessions 2015 USENIX_files/css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css 141 Bytes
USENIX Security 2015/USENIX Security 2015 USENIX_files/css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css 141 Bytes
USENIX Security 2016/Technical Sessions 2016 USENIX_files/css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css 141 Bytes
USENIX Security 2016/USENIX Security 2016 USENIX_files/css_vZ_wrMQ9Og-YPPxa1q4us3N7DsZMJa-14jShHgRoRNo.css 141 Bytes
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/back_border.gif 140 Bytes
USENIX Security 2007/Presentations/Security 2007 Poster Session_files/back_border.gif 140 Bytes
USENIX Security 2008/Presentations/Practical Symmetric Key Cryptography on Modern Graphics Hardware_files/img2.png 138 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img125.png 128 Bytes
USENIX Security 2008/Presentations/The Practical Subtleties of Biometric Key Generation_files/img10.png 124 Bytes
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/long_bar.gif 113 Bytes
USENIX Security 2007/Presentations/Security 2007 Poster Session_files/long_bar.gif 113 Bytes
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/questmark.gif 108 Bytes
USENIX Security 2007/Presentations/Security 2007 Poster Session_files/questmark.gif 108 Bytes
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/questmark.gif 108 Bytes
USENIX Security 2008/Presentations/USENIX Security 2008 Poster Session_files/questmark.gif 108 Bytes
USENIX Security 2008/USENIX Security 2008 Technical Sessions_files/questmark.gif 108 Bytes
USENIX Security 2008/USENIX Security 2008 WiPs_files/questmark.gif 108 Bytes
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/questmark.gif 108 Bytes
USENIX Security 2009/USENIX Security 2009 Technical Sessions_files/questmark.gif 108 Bytes
USENIX Security 2009/USENIX Security 2009 WiPs_files/questmark.gif 108 Bytes
USENIX Security 2010/USENIX Security 2010 Poster Session_files/questmark.gif 108 Bytes
USENIX Security 2010/USENIX Security 2010 Technical Sessions_files/questmark.gif 108 Bytes
USENIX Security 2011/USENIX Security 2011 Poster Session_files/questmark.gif 108 Bytes
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/longbar.gif 106 Bytes
USENIX Security 2008/Presentations/USENIX Security 2008 Poster Session_files/longbar.gif 106 Bytes
USENIX Security 2008/USENIX Security 2008 Technical Sessions_files/longbar.gif 106 Bytes
USENIX Security 2008/USENIX Security 2008 WiPs_files/longbar.gif 106 Bytes
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/longbar.gif 106 Bytes
USENIX Security 2009/USENIX Security 2009 Technical Sessions_files/longbar.gif 106 Bytes
USENIX Security 2009/USENIX Security 2009 WiPs_files/longbar.gif 106 Bytes
USENIX Security 2010/USENIX Security 2010 Poster Session_files/longbar.gif 106 Bytes
USENIX Security 2010/USENIX Security 2010 Technical Sessions_files/longbar.gif 106 Bytes
USENIX Security 2015/USENIX Security 2015 USENIX_files/sec15_media.htm 70 Bytes
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/left_bar.gif 56 Bytes
USENIX Security 2007/Presentations/Security 2007 Poster Session_files/left_bar.gif 56 Bytes
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/left_bar.gif 56 Bytes
USENIX Security 2008/Presentations/USENIX Security 2008 Poster Session_files/left_bar.gif 56 Bytes
USENIX Security 2008/USENIX Security 2008 Technical Sessions_files/left_bar.gif 56 Bytes
USENIX Security 2008/USENIX Security 2008 WiPs_files/left_bar.gif 56 Bytes
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/left_bar.gif 56 Bytes
USENIX Security 2009/USENIX Security 2009 Technical Sessions_files/left_bar.gif 56 Bytes
USENIX Security 2009/USENIX Security 2009 WiPs_files/left_bar.gif 56 Bytes
USENIX Security 2010/USENIX Security 2010 Poster Session_files/left_bar.gif 56 Bytes
USENIX Security 2010/USENIX Security 2010 Technical Sessions_files/left_bar.gif 56 Bytes
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/dot_clear.gif 43 Bytes
USENIX Security 2007/16th USENIX Security Symposium (Security 2007)_files/dot_clear_002.gif 43 Bytes
USENIX Security 2007/Presentations/Security 2007 Poster Session_files/dot_clear.gif 43 Bytes
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/dot_clear.gif 43 Bytes
USENIX Security 2008/17th USENIX Security Symposium (USENIX Security 2008)_files/dot_clear_002.gif 43 Bytes
USENIX Security 2008/Presentations/USENIX Security 2008 Poster Session_files/dot_clear.gif 43 Bytes
USENIX Security 2008/USENIX Security 2008 Technical Sessions_files/dot_clear.gif 43 Bytes
USENIX Security 2008/USENIX Security 2008 WiPs_files/dot_clear.gif 43 Bytes
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/dot_clear.gif 43 Bytes
USENIX Security 2009/18th USENIX Security Symposium (USENIX Security 2009)_files/dot_clear_002.gif 43 Bytes
USENIX Security 2009/USENIX Security 2009 Technical Sessions_files/dot_clear.gif 43 Bytes
USENIX Security 2009/USENIX Security 2009 WiPs_files/dot_clear.gif 43 Bytes
USENIX Security 2010/USENIX Security 2010 Poster Session_files/dot_clear.gif 43 Bytes
USENIX Security 2010/USENIX Security 2010 Poster Session_files/dot_clear_002.gif 43 Bytes
USENIX Security 2010/USENIX Security 2010 Technical Sessions_files/dot_clear.gif 43 Bytes
USENIX Security 2010/USENIX Security 2010 Technical Sessions_files/dot_clear_002.gif 43 Bytes
USENIX Security 2011/USENIX Security 2011 Poster Session_files/dot_clear.gif 43 Bytes
USENIX Security 2011/USENIX Security 2011 Poster Session_files/dot_clear_002.gif 43 Bytes
Bitdefender Total Security 2014 + BitDefender AntiVirus... 2.5 GB
AVG AntiVirus AVG Internet Security AVG Premium... 1.1 GB
AVG AntiVirus AVG Internet Security AVG Premium... 1.1 GB
AVG AntiVirus AVG Internet Security AVG Premium... 1.1 GB
Bitdefender Total Security 2014 + BitDefender AntiVirus... 1.2 GB
[ FreeCourseWeb.com ] Linkedin - Cisco CCNP SCOR... 842.3 MB
[ CourseMega.com ] Udemy - Cyber Security Class - Asset... 6.0 GB
ESET NOD32 Antivirus, Smart Security, Internet Security... 632.5 MB
ESET NOD32 Antivirus, Smart Security, Internet Security 10.0.386 385.8 MB
ESET NOD32 Antivirus, Smart Security, Internet Security... 632.5 MB
Andor [HDTV 720p][Cap.205] 8145次下载
Cap
HDTV
720p
Маня и Груня.2024.WEB-DL 720p.Files-x 5109次下载
2024
WEB
DL
Havoc.2025.1080p.NF.WEB-DL.DDP5.1.Atmos.H.264-EniaHD.mkv 5077次下载
WEB
DL
DDP5
The.Super.Cube.S01E09.1080p.iQ.WEB-DL.AAC2.0.H.264-VARYG.mkv 5040次下载
WEB
DL
Cube
Star.Wars.Andor.S02E05.I.Have.Friends.Everywhere.1080p.DS... 4944次下载
WEB
DL
Star
新桥恋人.电影港 地址发布页 www.dygang.me 收藏不迷路 4365次下载
me
www
发布页
Night at the Museum Battle of the Smithsonian 2009 2160p... 4161次下载
KiNGDOM
WEB
DL
www.UIndex.org - ... 4126次下载
www
MeGusta
HEVC
Palma.2.2024.WEB-DL.1080p.ExKinoRay.mkv 4000次下载
WEB
DL
2.2024
Guns N' Roses - Greatest Hits Live Broadcast Collection... 3915次下载
Live
Remastered
Hits
Andor [HDTV 720p][Cap.205] 8145次下载
Cap
HDTV
720p
(同人CG集) [白色絵の具 (無味ムスミ)] 友達の母が巨乳で金髪の淫乱美女でした.zip 6346次下载
zip
巨乳
CG
You.S05E02.720p.HEVC.x265-MeGusta[EZTVx.to].mkv 6221次下载
S05E02
HEVC
720p
up-mod-minecraft-play-with-friends-v1-21-80-28-... 6023次下载
982108028
mod
play
the.last.of.us.s02e02.1080p.web.h264-successful... 5335次下载
web
last
h264
异世降临.6v电影 地址发布页 www.6v123.net 收藏不迷路 5220次下载
www
发布页
6v123
Opasnaya.blizost.S01.2025.WEB-DL.1080p 5127次下载
WEB
DL
S01
Маня и Груня.2024.WEB-DL 720p.Files-x 5109次下载
2024
WEB
DL
Andor.S02E02.Sagrona.Teema.1080p.HEVC.x265-MeGu... 5100次下载
HEVC
Andor
mkv
Havoc.2025.1080p.NF.WEB-DL.DDP5.1.Atmos.H.264-E... 5077次下载
WEB
DL
DDP5
Shoot.Paragon.1970.DVDRip.XviD-AFO [NO-RAR] -...
Shoot
www
AFO
DASS-041-U
DASS
041
www.UIndex.org - Andy Richter Controls...
www
Episode
S01E04
[AniDub]_Sora_Kara_Furu_Ichioku_no_Hoshi_[Oriko_Qbiq]
Furu
no
Oriko
[BEST-TORRENTS.COM]...
Cheese
DL
2160p
【成人抖音-黑料-换妻-直播-手机搜7t7a.cc】麻豆传媒映画・爆操黑丝车模小姐姐・超级圆润...
麻豆
小姐姐
车模
Por siempre [HDTV 720p][Cap.106]
siempre
720p
Cap
Workaholics.S04E01.Season.4.Episode.1.WEBRip.72...
Workaholics
Episode
HoC
MobLand.S01E01.1080P.ENG.ITA.H264-TheBlackKing.mkv
ENG
H264
ITA
43606101 - Public Dick Flash Compilation..mp4
Dick
..
Compilation
吃瓜!去欧美留学的林淑瑶 ️被欧美大鸡巴驯化3P大战被洋吊深喉狂艹!
欧美
3P
被洋
Hellraiser III Hell On Earth 1992 1080p BluRay...
5.1
1992
AAC
Ghosts S04E21 Kyle 1080p PMTP WEB-DL DDP5 1 H...
WEB
DL
STC
[Gecko] Araiguma Calcal-dan - S01E07...
WEB
DL
AAC
salamander-2-salamander-deluxe-pack-play-statio...
salamander
play
full
Catalina Cruz live cam show pack
Catalina
show
live
SDMU-534
534
SDMU
dccdom.com@MIDV111C
com
MIDV111C
dccdom
