Enigma 2020/Presentations/Platform Data Privacy and Security Strategies for Public Interest Research - enigma2020_slides_buccini.pdf 64.0 MB
Enigma 2016/Presentations/A Million Hit Points and Infinite Charisma How Games Can Fix Computer Security Education - enigma_slides_peterson.pdf 62.5 MB
Enigma 2017/Presentations/Deviation from the Norms The Necessity and Challenges of a Norms-based Approach to Digital Offense - enigma_slides_limbago.pdf 10.3 MB
Enigma 2018/Presentations/Protecting Financial Stability against Cyber Threats Proposal for an International Agreement - enigma18_maurer_0.pdf 10.2 MB
Enigma 2017/Presentations/IoT a Cybercriminal Paradise - enigma17_slides_marosi.pdf 9.8 MB
Enigma 2018/Presentations/Privacy at Instagram - enigma18_slides_jiang.pdf 7.2 MB
Enigma 2019/Presentations/Hardware Security Modules The Ultimate Black Boxes - enigma2019_slides_lackey.pdf 7.2 MB
Enigma 2018/Presentations/Social Cybersecurity Reshaping Security through an Empirical Understanding of Human Social Behavior - enigma18_das.pdf 7.1 MB
Enigma 2018/Presentations/The Great Cryptographic Divide - enigma18_truppi.pdf 7.1 MB
Enigma 2016/Presentations/The Global Conversation on Encryption - enigma16_slides_stepanovich.pdf 6.8 MB
Enigma 2017/Presentations/Ghost in the Machine Challenges in Embedded Binary Security - enigma_slides_wetzels.pdf 4.7 MB
Enigma 2020/Presentations/Privacy at Speed Privacy by Design for Agile Development at Uber - enigma2020_slides_bozdag.pdf 4.5 MB
Enigma 2017/Presentations/Security for Vulnerable Populations-On the Interplay of Weapons of Influence and Life Domains - enigma2017_slides_oliveira.pdf 4.4 MB
Enigma 2018/Presentations/We Gave You This Internet, Now Play by Our Rules - enigma18_slides_gebhart.pdf 4.3 MB
Enigma 2018/Presentations/The Impact of Third-party Code on Android App Security - enigma18_derr.pdf 2.0 MB
Enigma 2016/Presentations/Verification, Auditing, and Evidence If We Didn’t Notice Anything Wrong, Is the Election Outcome Right - enigma_slides_teague.pdf 2.0 MB
Enigma 2016/Presentations/ToStaticHTML for Everyone! About DOMPurify, Security in the DOM, and Why We Really Need Both - enigma16_slides_heiderich.pdf 134.1 kB
Enigma 2019/Video/USENIX Enigma 2019 - Mobile App Privacy Analysis at Scale.eng.srt 68.2 kB
Enigma 2019/Video/USENIX Enigma 2019 - User Agent 2.0 - What Can the Browser Do for the User.eng.srt 67.7 kB
Enigma 2018/Video/USENIX Enigma 2018 - Modern Mind Control - Public Opinion Manipulation in Our Online World.eng.srt 67.4 kB
Enigma 2019/Video/USENIX Enigma 2019 - Mr. Lord Goes to Washington, or Applying Security outside the Tech World.eng.srt 67.1 kB
Enigma 2018/Video/USENIX Enigma 2018 - Hats off to DevSecOps.eng.srt 66.9 kB
Enigma 2018/Video/USENIX Enigma 2018 - Crypto Crumple Zones - Protecting Encryption in a Time of Political Uncertainty.eng.srt 66.2 kB
Enigma 2018/Video/USENIX Enigma 2018 - The Future of Cyber-Autonomy.eng.srt 66.2 kB
Enigma 2018/Video/USENIX Enigma 2018 - Bits & Bytes, Flesh & Blood, and Saving Real Lives via Clinical Simulations.eng.srt 65.7 kB
Enigma 2016/Presentations/Keys Under Doormats Mandating Insecurity by Requiring Government Access to All Data and Communications - enigma_2016_slides_rivest.pdf 65.4 kB