搜索
IEEE Security and Privacy
磁力链接/BT种子名称
IEEE Security and Privacy
磁力链接/BT种子简介
种子哈希:
5e9c81bf3ccf9fc1bec201328ef8d7f1dd1dace3
文件大小:
15.19G
已经下载:
6542
次
下载速度:
极快
收录时间:
2024-01-03
最近下载:
2025-02-19
移花宫入口
移花宫.com
邀月.com
怜星.com
花无缺.com
yhgbt.icu
yhgbt.top
磁力链接下载
magnet:?xt=urn:btih:5E9C81BF3CCF9FC1BEC201328EF8D7F1DD1DACE3
推荐使用
PIKPAK网盘
下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看
下载BT种子文件
磁力链接
迅雷下载
PIKPAK在线播放
91视频
含羞草
欲漫涩
逼哩逼哩
成人快手
51品茶
抖阴破解版
暗网禁地
91短视频
TikTok成人版
PornHub
草榴社区
乱伦社区
少女初夜
萝莉岛
最近搜索
陳可
rjk
pervmom 23 10 09 1080p hevc
专属小女友
尤物气质白领
바른생각
金发苗条
少女馆
蹭穴
young imageset
333
air supply
同时看
fc2-ppv-4620098
无码猛插
lena paul brazzers
最新of流出韩国ts超美气质
小宝寻花高清
高颜值混血coser美人妖小母狗ts
tadeo
涉世未深
limited
大尺度大秀合集
被老大
creamy spot
흰탑녀
waylon jennings
突然电话
金先生 白领丽人
息子嫁
文件列表
IEEE Security and Privacy 2017/Securing Augmented Reality Output.84d6e03b-b9a3-43cb-99ad-5277a4f98362.part
187.7 MB
IEEE Security and Privacy 2020/SSP 2020 Opening Remarks.mp4
100.2 MB
IEEE Security and Privacy 2022/LangSec Keynote Trojan Source and Bad Characters Invisible Hacks and Reluctant Patching.mp4
67.2 MB
IEEE Security and Privacy 2016/NITRD Panel - Federal Cybersecurity and Privacy R&D Strategic Plans.mp4
51.8 MB
IEEE Security and Privacy 2022/IEEE S&P 2022 Opening Session.mp4
51.2 MB
IEEE Security and Privacy 2019/IEEE S&P 2019 - TC Business Meeting.mp4
48.9 MB
IEEE Security and Privacy 2019/IEEE S&P 2019 - 40th Celebration Plenary Session Panel Reflections on four decades of the symposium.mp4
47.8 MB
IEEE Security and Privacy 2015/Missing the Point(er) - On the Effectiveness of Code Pointer Integrity.mp4
43.6 MB
IEEE Security and Privacy 2022/Invisible Finger Practical Electromagnetic Interference Attack on Touchscreen Electronic Devices.mp4
43.4 MB
IEEE Security and Privacy 2023/IEEE S&P 2023 Short Talks.mp4
41.9 MB
IEEE Security and Privacy 2015/Cross-Architecture Bug Search in Binary Executables.mp4
41.8 MB
IEEE Security and Privacy 2017/Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping.mp4
40.9 MB
IEEE Security and Privacy 2015/Temporal Lensing and Its Application in Pulsing Denial-of-Service Attacks.mp4
40.7 MB
IEEE Security and Privacy 2016/S&P TC Business Meeting.mp4
40.6 MB
IEEE Security and Privacy 2017/SoK - Science, Security, and the Elusive Goal of Security as a Scientific Pursuit.mp4
39.6 MB
IEEE Security and Privacy 2020/Birds of a Feather A Hardware & Security Panel (Updated).mp4
38.7 MB
IEEE Security and Privacy 2015/Forward Secure Asynchronous Messaging from Puncturable Encryption.mp4
38.5 MB
IEEE Security and Privacy 2015/High System-Code Security with Low Overhead.mp4
38.3 MB
IEEE Security and Privacy 2015/Secure Track Verification.mp4
37.8 MB
IEEE Security and Privacy 2017/Backward-bounded DSE - Targeting Infeasibility Questions on Obfuscated Codes.mp4
36.8 MB
IEEE Security and Privacy 2015/SurroundWeb - Mitigating Privacy Concerns in a 3D Web Browser.mp4
35.9 MB
IEEE Security and Privacy 2019/Hard Drive of Hearing Disks that Eavesdrop with a Synthesized Microphone.mp4
35.9 MB
IEEE Security and Privacy 2015/Riposte - An Anonymous Messaging System Handling Millions of Users.mp4
35.7 MB
IEEE Security and Privacy 2015/The Attack of the Clones - A Study of the Impact of Shared Code on Vulnerability Patching.mp4
35.7 MB
IEEE Security and Privacy 2017/VUDDY - A Scalable Approach for Vulnerable Code Clone Discovery.mp4
35.5 MB
IEEE Security and Privacy 2015/GenoGuard - Protecting Genomic Data against Brute-Force Attacks.mp4
35.4 MB
IEEE Security and Privacy 2017/SmarPer - Context-Aware and Automatic Runtime-Permissions for Mobile Devices - YouTube.mp4
35.1 MB
IEEE Security and Privacy 2017/IKP - Turning a PKI Around with Decentralized Automated Incentives.mp4
34.7 MB
IEEE Security and Privacy 2015/S$A - A Shared Cache Attack That Works across Cores and Defies VM Sandboxing ....mp4
34.5 MB
IEEE Security and Privacy 2015/ADSNARK - Nearly Practical and Privacy-Preserving Proofs on Authenticated Data.mp4
34.3 MB
IEEE Security and Privacy 2017/SymCerts - Practical Symbolic Execution For Exposing Noncompliance in X.509 Certificate Validation.mp4
34.3 MB
IEEE Security and Privacy 2015/On Subnormal Floating Point and Abnormal Timing.mp4
34.2 MB
IEEE Security and Privacy 2022/Security Foundations for Application-Based Covert Communication Channels.mp4
34.1 MB
IEEE Security and Privacy 2015/SoK - Research Perspectives and Challenges for Bitcoin and Cryptocurrencies.mp4
33.8 MB
IEEE Security and Privacy 2017/Cloak and Dagger - From Two Permissions to Complete Control of the UI Feedback Loop.mp4
33.4 MB
IEEE Security and Privacy 2022/SwarmFlawFinder Discovering and Exploiting Logic Flaws of Swarm Algorithms.mp4
33.4 MB
IEEE Security and Privacy 2019/Drones' Cryptanalysis - Detecting Privacy Invasion Attacks Conducted by Drone.mp4
33.4 MB
IEEE Security and Privacy 2019/LBM A Security Framework for Peripherals within the Linux Kernel.mp4
33.3 MB
IEEE Security and Privacy 2022/TASHAROK-Using Mechanism Design for Enhancing Security Resource Allocation in Interdependent Systems.mp4
33.2 MB
IEEE Security and Privacy 2015/What the App is That Deception and Countermeasures in the Android User Interface.mp4
33.2 MB
IEEE Security and Privacy 2017/Is Interaction Necessary for Distributed Private Learning.mp4
32.9 MB
IEEE Security and Privacy 2015/Counterfeit Object-oriented Programming.mp4
32.7 MB
IEEE Security and Privacy 2015/Security of the J-PAKE Password-Authenticated Key Exchange Protocol.mp4
32.6 MB
IEEE Security and Privacy 2015/Understanding and Monitoring Embedded Web Scripts.mp4
32.4 MB
IEEE Security and Privacy 2015/Micro-Policies - Formally Verified, Tag-Based Security Monitors.mp4
32.3 MB
IEEE Security and Privacy 2017/HVLearn - Automated Black-box Analysis of Hostname Verification in SSL TLS Implementations.mp4
32.2 MB
IEEE Security and Privacy 2017/Scalable Bias-Resistant Distributed Randomness.mp4
32.2 MB
IEEE Security and Privacy 2015/SoK - Deep Packer Inspection - A Longitudinal Study of the Complexity of Run-Time Packers.mp4
31.8 MB
IEEE Security and Privacy 2015/Towards Making Systems Forget with Machine Unlearning.mp4
31.7 MB
IEEE Security and Privacy 2017/Hijacking Bitcoin - Routing Attacks on Cryptocurrencies.mp4
31.7 MB
IEEE Security and Privacy 2017/Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate.mp4
31.6 MB
IEEE Security and Privacy 2019/ProFuzzer On-the-fly Input Type Probing for Better Zero-day Vulnerability Discovery.mp4
31.5 MB
IEEE Security and Privacy 2017/SysPal System-guided Pattern Locks for Android.mp4
31.5 MB
IEEE Security and Privacy 2015/Readactor - Practical Code Randomization Resilient to Memory Disclosure.mp4
31.4 MB
IEEE Security and Privacy 2017/Protecting Bare-metal Embedded Systems with Privilege Overlays.mp4
31.4 MB
IEEE Security and Privacy 2019/Formally Verified Cryptographic Web Applications in WebAssembly.mp4
31.1 MB
IEEE Security and Privacy 2017/vSQL - Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases.mp4
31.1 MB
IEEE Security and Privacy 2019/Dominance as a New Trusted Computing Primitive for the IoT.mp4
30.8 MB
IEEE Security and Privacy 2017/A Lustrum of Malware Network Communication - Evolution and Insights.mp4
30.7 MB
IEEE Security and Privacy 2022/Practical EMV Relay Protection.mp4
30.6 MB
IEEE Security and Privacy 2017/Optimized Honest-Majority MPC for Malicious Adversaries - Breaking 1 Billion-Gate Second Barrier.mp4
30.5 MB
IEEE Security and Privacy 2017/SoK - Cryptographically Protected Database Search.mp4
30.5 MB
IEEE Security and Privacy 2019/SensorID Sensor Calibration Fingerprinting for Smartphones.mp4
30.4 MB
IEEE Security and Privacy 2019/Why Does Your Data Leak Uncovering the Data Leakage in Cloud from Mobile Apps.mp4
30.3 MB
IEEE Security and Privacy 2018/A Machine Learning Approach to Prevent Malicious Calls Over Telephony Networks.mp4
30.3 MB
IEEE Security and Privacy 2019/If HTTPS Were Secure I wouldn't Need 2FA End User and Administrator Mental Models of HTTPS.mp4
30.2 MB
IEEE Security and Privacy 2019/Dangerous Skills Understanding and Mitigating Security Risks of Voice-Controlled Third-Party....mp4
30.2 MB
IEEE Security and Privacy 2019/Breaking LTE on Layer Two.mp4
30.2 MB
IEEE Security and Privacy 2019/Security of GPS INS based On-road Location Tracking Systems.mp4
30.1 MB
IEEE Security and Privacy 2017/A Framework for Universally Composable Diffie-Hellman Key Exchange.mp4
30.1 MB
IEEE Security and Privacy 2015/CHERI - A Hybrid Capability-System Architecture for Scalable Software Compartmentalization.mp4
30.1 MB
IEEE Security and Privacy 2018/Routing Around Congestion - Defeating DDoS Attacks and Adverse Network Conditions via Reactive....mp4
30.0 MB
IEEE Security and Privacy 2017/CRLite - A Scalable System for Pushing All TLS Revocations to All Browsers.mp4
30.0 MB
IEEE Security and Privacy 2022/Peekaboo A Hub-Based Approach to Enable Transparency in Data Processing within Smart Homes.mp4
30.0 MB
IEEE Security and Privacy 2015/A Messy State of the Union - Taming the Composite State Machines of TLS.mp4
29.9 MB
IEEE Security and Privacy 2017/Hardening Java's Access Control by Abolishing Implicit Privilege Elevation.mp4
29.9 MB
IEEE Security and Privacy 2015/Malicious-Client Security in Blind Seer - A Scalable Private DBMS.mp4
29.9 MB
IEEE Security and Privacy 2019/New Primitives for Actively-Secure MPC over Rings with Applications to Private Machine Learning.mp4
29.9 MB
IEEE Security and Privacy 2015/Bitcoin over Tor isn't a Good Idea.mp4
29.9 MB
IEEE Security and Privacy 2022/Practical Asynchronous Distributed Key Generation.mp4
29.8 MB
IEEE Security and Privacy 2015/Every Second Counts - Quantifying the Negative Externalities of Cybercrime via Typosquatting.mp4
29.8 MB
IEEE Security and Privacy 2015/Post-Quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors Problem.mp4
29.7 MB
IEEE Security and Privacy 2019/Learning to Reconstruct Statistical Learning Theory and Encrypted Database Attacks.mp4
29.7 MB
IEEE Security and Privacy 2015/Program-Adaptive Mutational Fuzzing.mp4
29.7 MB
IEEE Security and Privacy 2017/Identifying Personal DNA Methylation Profiles by Genotype Inference.mp4
29.7 MB
IEEE Security and Privacy 2017/Implementing and Proving the TLS 1.3 Record Layer.mp4
29.6 MB
IEEE Security and Privacy 2017/Side-Channel Attacks on Shared Search Indexes.mp4
29.4 MB
IEEE Security and Privacy 2022/SoK The Dual Nature of Technology in Sexual Assault.mp4
29.4 MB
IEEE Security and Privacy 2017/XHOUND - Quantifying the Fingerprintability of Browser Extensions.mp4
29.4 MB
IEEE Security and Privacy 2017/Norax - Enabling Execute-Only Memory for COTS Binaries on AArch64.mp4
29.3 MB
IEEE Security and Privacy 2017/From Trash to Treasure - Timing-Sensitive Garbage Collection.mp4
29.3 MB
IEEE Security and Privacy 2022/IRShield A Countermeasure Against Adversarial Physical-Layer Wireless Sensing.mp4
29.3 MB
IEEE Security and Privacy 2019/Data Recovery on Encrypted Databases with k-Nearest Neighbor Query Leakage.mp4
29.3 MB
IEEE Security and Privacy 2015/Virtual Proofs of Reality and their Physical Implementation.mp4
29.1 MB
IEEE Security and Privacy 2019/How Well Do My Results Generalize Comparing Security and Privacy Survey Results from....mp4
29.0 MB
IEEE Security and Privacy 2019/SoK General Purpose Frameworks for Secure Multi-Party Computation.mp4
29.0 MB
IEEE Security and Privacy 2015/Caelus - Verifying the Consistency of Cloud Services with Battery-Powered Devices.mp4
28.9 MB
IEEE Security and Privacy 2019/SoK Shining Light on Shadow Stacks.mp4
28.9 MB
IEEE Security and Privacy 2019/Differentially Private Model Publishing For Deep Learning.mp4
28.9 MB
IEEE Security and Privacy 2017/Counter-RAPTOR - Safeguarding Tor Against Active Routing Attacks.mp4
28.8 MB
IEEE Security and Privacy 2015/ObliVM - A Programming Framework for Secure Computation.mp4
28.8 MB
IEEE Security and Privacy 2018/A Formal Treatment of Accountable Proxying over TLS.mp4
28.8 MB
IEEE Security and Privacy 2017/How They Did It - An Analysis of Emission Defeat Devices in Modern Automobiles.mp4
28.7 MB
IEEE Security and Privacy 2017/One TPM to Bind Them All - Fixing TPM2.0 for Provably Secure Anonymous Attestation.mp4
28.7 MB
IEEE Security and Privacy 2019/SoK Sanitizing for Security Dokyung Song.mp4
28.6 MB
IEEE Security and Privacy 2022/Delay Wreaks Havoc on Your Smart Home Delay-based Automation Interference Attacks.mp4
28.6 MB
IEEE Security and Privacy 2018/On the Economics of Offline Password Cracking.mp4
28.5 MB
IEEE Security and Privacy 2020/Birds of a Feather A Hardware & Security Panel (Deprecated).mp4
28.5 MB
IEEE Security and Privacy 2018/The Cards Aren't Alright - Detecting Counterfeit Gift Cards Using Encoding Jitter.mp4
28.5 MB
IEEE Security and Privacy 2019/Touching the Untouchables Dynamic Security Analysis of the LTE Control Plane.mp4
28.4 MB
IEEE Security and Privacy 2022/How Does Usable Security Not End Up in Software Products Results From a Qualitative Interview Study.mp4
28.4 MB
IEEE Security and Privacy 2019/Synesthesia Detecting Screen Content via Remote Acoustic Side Channels.mp4
28.4 MB
IEEE Security and Privacy 2015/Effective Real-Time Android Application Auditing.mp4
28.4 MB
IEEE Security and Privacy 2017/Pyramid - Enhancing Selectivity in Big Data Protection with Count Featurization.mp4
28.4 MB
IEEE Security and Privacy 2018/Another Flip in the Wall of Rowhammer Defenses.mp4
28.3 MB
IEEE Security and Privacy 2018/Blue Note - How Intentional Acoustic Interference Damages Availablity and Integrity -.mp4
28.3 MB
IEEE Security and Privacy 2015/Using Hardware Features for Increased Debugging Transparency.mp4
28.2 MB
IEEE Security and Privacy 2015/How Secure and Quick is QUIC Provable Security and Performance Analyses.mp4
28.2 MB
IEEE Security and Privacy 2017/Finding and Preventing Bugs in JavaScript Bindings.mp4
28.1 MB
IEEE Security and Privacy 2022/They're not that hard to mitigate -What Cryptographic Library Developers Think About Timing Attacks.mp4
28.1 MB
IEEE Security and Privacy 2015/Connection-Oriented DNS to Improve Privacy and Security.mp4
27.9 MB
IEEE Security and Privacy 2022/Anti-Tamper Radio System-Level Tamper Detection for Computing Systems.mp4
27.8 MB
IEEE Security and Privacy 2017/IoT Goes Nuclear - Creating a Zigbee Chain Reaction.mp4
27.8 MB
IEEE Security and Privacy 2018/Enabling Autonomous IoT Device Pairing using Different Sensor Types.mp4
27.6 MB
IEEE Security and Privacy 2015/Securing Multiparty Online Services Via Certification of Symbolic Transactions.mp4
27.5 MB
IEEE Security and Privacy 2017/NEZHA - Efficient Domain-independent Differential Testing.mp4
27.5 MB
IEEE Security and Privacy 2019/Comprehensive Privacy Analysis of Deep Learning.mp4
27.5 MB
IEEE Security and Privacy 2017/Leakage-Abuse Attacks on Order-Revealing Encryption.mp4
27.5 MB
IEEE Security and Privacy 2022/Noise A Library of Verified High-Performance Secure Channel Protocol Implementations.mp4
27.3 MB
IEEE Security and Privacy 2019/The Code That Never Ran Modeling Attacks on Speculative Evaluation.mp4
27.3 MB
IEEE Security and Privacy 2022/Domains Do Change Their Spots Quantifying Potential Abuse of Residual Trust.mp4
27.2 MB
IEEE Security and Privacy 2022/Evaluating Physical-Layer BLE Location Tracking Attacks on Mobile Devices.mp4
27.2 MB
IEEE Security and Privacy 2018/Angora - Efficient Fuzzing by Principled Search.mp4
27.2 MB
IEEE Security and Privacy 2015/Vetting SSL Usage in Applications with SSLINT.mp4
27.2 MB
IEEE Security and Privacy 2019/Asm2Vec Boosting Static Representation Robustness for Binary Clone Search....mp4
27.1 MB
IEEE Security and Privacy 2018/When Your Fitness Tracker Betrays You - Quantifying the Predictability....mp4
27.0 MB
IEEE Security and Privacy 2017/To Catch a Ratter - Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild.mp4
26.9 MB
IEEE Security and Privacy 2018/EyeTell - Video-Assisted Touchscreen Keystroke Inference from Eye Movements.mp4
26.9 MB
IEEE Security and Privacy 2022/Investigating Influencer VPN Ads on YouTube.mp4
26.8 MB
IEEE Security and Privacy 2018/Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels.mp4
26.8 MB
IEEE Security and Privacy 2019/Characterizing Pixel Tracking through the Lens of Disposable Email Services.mp4
26.7 MB
IEEE Security and Privacy 2019/SoK Security Evaluation of Home Based IoT Deployment.mp4
26.6 MB
IEEE Security and Privacy 2022/HardLog Practical Tamper-Proof System Auditing Using a Novel Audit Device.mp4
26.5 MB
IEEE Security and Privacy 2019/Simple High-Level Code for Cryptographic Arithmetic - With Proofs, Without Compromises.mp4
26.5 MB
IEEE Security and Privacy 2022/SoK Unifying and Applying At-Risk User Research.mp4
26.4 MB
IEEE Security and Privacy 2015/VC3 - Trustworthy Data Analytics in the Cloud Using SGX.mp4
26.4 MB
IEEE Security and Privacy 2017/Stack Overflow Considered Harmful -- The Impact of Copy&Paste on Android Application Security.mp4
26.4 MB
IEEE Security and Privacy 2018/Distance-Bounding Protocols - Verification without Time and Location.mp4
26.3 MB
IEEE Security and Privacy 2018/FuturesMEX - Secure, Distributed Futures Market Exchange.mp4
26.3 MB
IEEE Security and Privacy 2017/Securing Augmented Reality Output.mp4
26.2 MB
IEEE Security and Privacy 2018/Tracking Ransomware End-to-end.mp4
26.2 MB
IEEE Security and Privacy 2019/Using Safety Properties to Generate Vulnerability Patches.mp4
26.2 MB
IEEE Security and Privacy 2019/The 9 Lives of Bleichenbachers CAT New Cache ATtacks on TLS Implementations.mp4
26.2 MB
IEEE Security and Privacy 2015/Protecting Private Keys against Memory Disclosure Attacks Using Hardware Transactional Memory.mp4
26.1 MB
IEEE Security and Privacy 2022/A Formal Security Analysis of the W3C Web Payment APIs Attacks and Verification.mp4
26.1 MB
IEEE Security and Privacy 2018/Hackers vs. Testers - A Comparison of Software Vulnerability Discovery Processes.mp4
26.1 MB
IEEE Security and Privacy 2019/Spectre Attacks Exploiting Speculative Execution.mp4
26.0 MB
IEEE Security and Privacy 2018/PIR with Compressed Queries and Amortized Query Processing.mp4
26.0 MB
IEEE Security and Privacy 2023/Examining Zero-Shot Vulnerability Repair with Large Language Models.mp4
25.9 MB
IEEE Security and Privacy 2022/Measuring and Mitigating the Risk of IP Reuse on Public Clouds.mp4
25.9 MB
IEEE Security and Privacy 2019/Stealthy Porn Understanding Real World Adversarial Images for I'llicit Online Promotion.mp4
25.8 MB
IEEE Security and Privacy 2018/On Enforcing the Digital Immunity of a Large Humanitarian Organization.mp4
25.8 MB
IEEE Security and Privacy 2015/The Miner's Dilemma.mp4
25.7 MB
IEEE Security and Privacy 2018/Towards Security and Privacy for Multi User Augmented Reality.mp4
25.6 MB
IEEE Security and Privacy 2019/Threshold ECDSA from ECDSA Assumptions The Multiparty Case.mp4
25.6 MB
IEEE Security and Privacy 2018/Double-efficient zkSNARKs Without Trusted Setup.mp4
25.6 MB
IEEE Security and Privacy 2017/CoSMeDis - A Distributed Social Media Platform with Formally Verified Confidentiality Guarantees.mp4
25.6 MB
IEEE Security and Privacy 2018/Static Evaluation of Noninterference using Approximate Model Counting.mp4
25.5 MB
IEEE Security and Privacy 2019/Postcards from the Post HTTP World Amplification of HTTPS Vulnerabilities in the Web Ecosystem.mp4
25.5 MB
IEEE Security and Privacy 2019/Reasoning Analytically About Password Cracking Software Alex Liu.mp4
25.5 MB
IEEE Security and Privacy 2018/vRAM - Faster Verifiable RAM With Program-Independent Preprocessing.mp4
25.5 MB
IEEE Security and Privacy 2018/Study and Mitigation of Origin Stripping Vulnerabilities in Hybrid-postMessage Enabled Mobile Apps.mp4
25.5 MB
IEEE Security and Privacy 2017/Comparing the Usability of Cryptographic APIs.mp4
25.4 MB
IEEE Security and Privacy 2017/An Experimental Security Analysis of an Industrial Robot Controller.mp4
25.4 MB
IEEE Security and Privacy 2018/Compiler-assisted Code Randomization.mp4
25.3 MB
IEEE Security and Privacy 2015/A Generic Approach to Automatic Deobfuscation of Executable Code.mp4
25.3 MB
IEEE Security and Privacy 2022/RT-TEE Real-time System Availability for Cyber-physical Systems using ARM TrustZone.mp4
25.3 MB
IEEE Security and Privacy 2018/The Rise of the Citizen Developer - Assessing the Security Impact of Online App Generators.mp4
25.3 MB
IEEE Security and Privacy 2016/Algorithmic Transparency via Quantitative Input Influence ....mp4
25.2 MB
IEEE Security and Privacy 2017/Verifying and Synthesizing Constant-Resource Implementations with Types.mp4
25.2 MB
IEEE Security and Privacy 2015/Last-Level Cache Side-Channel Attacks are Practical.mp4
25.1 MB
IEEE Security and Privacy 2022/Desperate Times Call for Desperate Measures - User Concerns with Mobile Loan Apps in Kenya.mp4
25.1 MB
IEEE Security and Privacy 2022/Asleep at the Keyboard Assessing the Security of GitHub Copilot's Code Contributions.mp4
25.1 MB
IEEE Security and Privacy 2019/Attack Directories, Not Caches Side Channel Attacks in a Non Inclusive World.mp4
25.0 MB
IEEE Security and Privacy 2019/Towards Practical Differentialy Private Convex Optimization.mp4
25.0 MB
IEEE Security and Privacy 2017/IVD - Automatic Learning and Enforcement of Authorization Rules in Online Social Networks - YouTube.mp4
25.0 MB
IEEE Security and Privacy 2023/Discop Provably Secure Steganography in Practice Based on Distribution Copies.mp4
25.0 MB
IEEE Security and Privacy 2017/Augur - Internet-Wide Detection of Connectivity Disruptions.mp4
24.9 MB
IEEE Security and Privacy 2018/xJsnark - A Framework for Efficient Verifiable Computation.mp4
24.9 MB
IEEE Security and Privacy 2018/Protecting the Stack with Metadata Policies and Tagged Hardware.mp4
24.7 MB
IEEE Security and Privacy 2015/GraphSC - Parallel Secure Computation Made Easy.mp4
24.7 MB
IEEE Security and Privacy 2022/K-Scheduler Effective Seed Scheduling for Fuzzing with Graph Centrality Analysis.mp4
24.7 MB
IEEE Security and Privacy 2022/Mitigating Information Leakage Vulnerabilities with Type-based Data Isolation.mp4
24.6 MB
IEEE Security and Privacy 2019/Iodine Fast Dynamic Tain't Tracking Using Rollback free Optimistic Hybrid Analysis.mp4
24.6 MB
IEEE Security and Privacy 2015/Privacy and Access Control for Outsourced Personal Records.mp4
24.6 MB
IEEE Security and Privacy 2018/Bulletproofs - Short Proofs for Confidential Transactions and More.mp4
24.6 MB
IEEE Security and Privacy 2019/True2F Backdoor resistant authentication tokens Emma Dauterman.mp4
24.6 MB
IEEE Security and Privacy 2015/TinyGarble - Highly Compressed and Scalable Sequential Garbled Circuits.mp4
24.4 MB
IEEE Security and Privacy 2022/ShadeWatcher Recommendation-guided Cyber Threat Analysis using System Audit Records.mp4
24.4 MB
IEEE Security and Privacy 2018/Enumerating Active IPv6 Hosts for Large-scale Security Scans via DNSSEC-signed Reverse Zones.mp4
24.4 MB
IEEE Security and Privacy 2015/Geppetto - Versatile Verifiable Computation.mp4
24.4 MB
IEEE Security and Privacy 2019/Does Certificate Transparency Break the Web Measuring Adoption and Error Rate.mp4
24.3 MB
IEEE Security and Privacy 2022/A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols.mp4
24.3 MB
IEEE Security and Privacy 2019/KHyperLogLog Estimating Reidentifiability and Joinability of Large Data at Scale Pern Hui Chia.mp4
24.3 MB
IEEE Security and Privacy 2019/Beyond Credential Stuffing Password Similarity Models using Neural Networks.mp4
24.3 MB
IEEE Security and Privacy 2022/SIRAJ A Unified Framework for Aggregation of Malicious Entity Detectors.mp4
24.2 MB
IEEE Security and Privacy 2016/A2 - Analog Malicious Hardware.mp4
24.1 MB
IEEE Security and Privacy 2018/Mobile Application Web API Reconnaissance.mp4
24.1 MB
IEEE Security and Privacy 2019/Should I Worry A Cross Cultural Examination of Account Security Incident Response.mp4
24.1 MB
IEEE Security and Privacy 2019/Exploiting Correcting Codes On the Effectiveness of ECC Memory Against Rowhammer Attacks.mp4
24.0 MB
IEEE Security and Privacy 2023/SCAPHY Detecting Modern ICS Attacks by Correlating Behaviors in SCADA and PHYsical.mp4
23.9 MB
IEEE Security and Privacy 2016/CaSE - Cache-Assisted Secure Execution on ARM Processors.mp4
23.8 MB
IEEE Security and Privacy 2019/NEUZZ Efficient Fuzzing with Neural Program Smoothing.mp4
23.8 MB
IEEE Security and Privacy 2018/Sonar - Detecting SS7 Redirection Attacks With Audio-Based Distance Bounding.mp4
23.8 MB
IEEE Security and Privacy 2017/Towards Evaluating the Robustness of Neural Networks.mp4
23.8 MB
IEEE Security and Privacy 2018/Learning from Mutants - Using Code Mutation to Learn and Monitor Invariants of a CPS.mp4
23.8 MB
IEEE Security and Privacy 2022/Heapster Analyzing the Security of Dynamic Allocators for Monolithic Firmware Images.mp4
23.8 MB
IEEE Security and Privacy 2019/CaSym Cache Aware Symbolic Execution for Side Channel Detection and Mitigation.mp4
23.7 MB
IEEE Security and Privacy 2018/Speechless - Analyzing the Threat to Speech Privacy from Smartphone Motion Sensors.mp4
23.7 MB
IEEE Security and Privacy 2017/SecureML - A System for Scalable Privacy-Preserving Machine Learning.mp4
23.6 MB
IEEE Security and Privacy 2022/Privacy-from-Birth Protecting Sensed Data from Malicious Sensors with VERSA.mp4
23.6 MB
IEEE Security and Privacy 2022/Exposed Infrastructures-Discovery, Attacks and Remediation of Insecure ICS Remote Management Devices.mp4
23.6 MB
IEEE Security and Privacy 2018/Manipulating Machine Learning - Poisoning Attacks & Countermeasures.mp4
23.6 MB
IEEE Security and Privacy 2018/Implementing Conjunction Obfuscation under Entropic Ring LWE.mp4
23.5 MB
IEEE Security and Privacy 2022/Sphinx Enabling Privacy-Preserving Online Learning over the Cloud.mp4
23.5 MB
IEEE Security and Privacy 2018/EnclaveDB - A Secure Database using SGX.mp4
23.5 MB
IEEE Security and Privacy 2019/Ouroboros Crypsinous Privacy Preserving Proof of Stake.mp4
23.5 MB
IEEE Security and Privacy 2019/An Extensive Formal Security Analysis of the OpenID Financial grade API Pedram Hosseyni.mp4
23.4 MB
IEEE Security and Privacy 2017/Multi-touch Authentication Using Hand Geometry and Behavioral Information.mp4
23.4 MB
IEEE Security and Privacy 2017/Catena - Efficient Non-equivocation via Bitcoin.mp4
23.4 MB
IEEE Security and Privacy 2018/OmniLedger - A Secure, Scale-Out, Decentralized Ledger via Sharding.mp4
23.3 MB
IEEE Security and Privacy 2017/SoK - Exploiting Network Printers.mp4
23.3 MB
IEEE Security and Privacy 2022/vSGX Virtualizing SGX Enclaves on AMD SEV.mp4
23.2 MB
IEEE Security and Privacy 2020/Birds of a Feather Sharing Cybersecurity Research Artifacts To Accelerate Progress.mp4
23.2 MB
IEEE Security and Privacy 2017/Machine-Checked Proofs of Privacy for Electronic Voting Protocols.mp4
23.2 MB
IEEE Security and Privacy 2016/Keeping Authorities - Honest or Bust - with Decentralized Witness Cosigning.mp4
23.1 MB
IEEE Security and Privacy 2019/PhishFarm A Scalable Framework for Measuring the Effectivness of Evasion Techniques Against....mp4
23.1 MB
IEEE Security and Privacy 2023/Confident Monte Carlo Rigorous Analysis of Guessing Curves for Probabilistic Password Models.mp4
23.1 MB
IEEE Security and Privacy 2018/Racing in Hyperspace - Closing Hyper Threading Side Channels on SGX.mp4
23.1 MB
IEEE Security and Privacy 2018/Computer Security and Privacy for Refugees in the United States.mp4
23.1 MB
IEEE Security and Privacy 2022/Deployment of Source Address Validation by Network Operators A Randomized Control Trial.mp4
23.0 MB
IEEE Security and Privacy 2020/Intriguing Properties of Adversarial ML Attacks in the Problem Space.mp4
23.0 MB
IEEE Security and Privacy 2023/Certifiably Robust Object Detection against Patch Hiding Attacks via Patch-agnostic Masking.mp4
23.0 MB
IEEE Security and Privacy 2022/FuzzUSB Hybrid Stateful Fuzzing of USB Gadget Stacks.mp4
22.9 MB
IEEE Security and Privacy 2017/Your Exploit is Mine - Automatic Shellcode Transplant for Remote Exploits.mp4
22.9 MB
IEEE Security and Privacy 2022/Blacksmith Compromising Target Row Refresh by Rowhammering in the Frequency Domain.mp4
22.9 MB
IEEE Security and Privacy 2019/XCLAIM Trustless Interoperable Cryptocurrency Backed Assets.mp4
22.9 MB
IEEE Security and Privacy 2016/Verifiable ASICs.mp4
22.8 MB
IEEE Security and Privacy 2019/Understanding the Security of ARM Debugging Features.mp4
22.8 MB
IEEE Security and Privacy 2015/Ad Injection at Scale - Assessing Deceptive Advertisement Modifications.mp4
22.8 MB
IEEE Security and Privacy 2022/Spook.js Attacking Chrome Strict Site Isolation via Speculative Execution.mp4
22.8 MB
IEEE Security and Privacy 2022/DeepSteal Advanced Model Extractions Leveraging Efficient Weight Stealing in Memories.mp4
22.7 MB
IEEE Security and Privacy 2019/Fidelius Protecting User Secrets from Compromised Browsers.mp4
22.7 MB
IEEE Security and Privacy 2015/Automatic Inference of Search Patterns for Tain't-Style Vulnerabilities.mp4
22.7 MB
IEEE Security and Privacy 2022/Copy, Right A Testing Framework for Copyright Protection of Deep Learning Models.mp4
22.6 MB
IEEE Security and Privacy 2019/Redactable Blockchain in the Permissionless Setting.mp4
22.6 MB
IEEE Security and Privacy 2015/Cracking-Resistant Password Vaults Using Natural Language Encoders.mp4
22.5 MB
IEEE Security and Privacy 2022/ProVerif with Lemmas, Induction, Fast Subsumption, and Much More.mp4
22.5 MB
IEEE Security and Privacy 2023/Inducing Wireless Chargers to Voice Out for Inaudible Command Attacks.mp4
22.5 MB
IEEE Security and Privacy 2022/SPURT Scalable Distributed Randomness Beacon with Transparent Setup.mp4
22.5 MB
IEEE Security and Privacy 2022/Reconstructing Training Data with Informed Adversaries.mp4
22.5 MB
IEEE Security and Privacy 2018/Privacy Risks with Facebook's PII-based Targeting.mp4
22.4 MB
IEEE Security and Privacy 2022/IRQDebloat Reducing Driver Attack Surface in Embedded Devices.mp4
22.4 MB
IEEE Security and Privacy 2018/T-Fuzz Fuzzing by Program Transformation - Hui Peng.mp4
22.3 MB
IEEE Security and Privacy 2018/Grand Pwning Unit - Accelerating Microarchitectural Attacks with the GPU.mp4
22.3 MB
IEEE Security and Privacy 2022/Formal Model-Driven Discovery of Bluetooth Protocol Design Vulnerabilities.mp4
22.3 MB
IEEE Security and Privacy 2023/PyFET Forensically Equivalent Transformation for Python Binary Decompilation.mp4
22.3 MB
IEEE Security and Privacy 2018/Locally Differentially Private Frequent Itemset Mining.mp4
22.3 MB
IEEE Security and Privacy 2022/DeepCASE Semi-Supervised Contextual Analysis of Security Events.mp4
22.3 MB
IEEE Security and Privacy 2019/Measuring and Analyzing Search Engine Poisoning of Linguistic Collisions.mp4
22.2 MB
IEEE Security and Privacy 2022/How to Attack and Generate Honeywords.mp4
22.2 MB
IEEE Security and Privacy 2022/Repairing DoS Vulnerability of Real-World Regexes.mp4
22.1 MB
IEEE Security and Privacy 2022/Membership inference attacks from first principles.mp4
22.1 MB
IEEE Security and Privacy 2018/SoK - Plug & Pray - Today - Understanding USB Insecurity in Versions 1 through C.mp4
21.9 MB
IEEE Security and Privacy 2023/Security and Privacy Challenges, Advice, and Opportunities at Cybercafes in Kenya.mp4
21.9 MB
IEEE Security and Privacy 2018/Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage.mp4
21.8 MB
IEEE Security and Privacy 2023/AEM Facilitating Cross-Version Exploitability Assessment of Linux Kernel Vulnerabilities.mp4
21.8 MB
IEEE Security and Privacy 2022/Time-Print Authenticating USB Flash Drives with Novel Timing Fingerprints.mp4
21.8 MB
IEEE Security and Privacy 2023/Space Odyssey An Experimental Software Security Analysis of Satellites.mp4
21.7 MB
IEEE Security and Privacy 2015/Leave Me Alone - App-Level Protection against Runtime Information Gathering on Android.mp4
21.7 MB
IEEE Security and Privacy 2019/Towards Automated Safety Vetting of PLC Code in Real World Plants Mu Zhang.mp4
21.6 MB
IEEE Security and Privacy 2015/SoK - Secure Messaging.mp4
21.6 MB
IEEE Security and Privacy 2019/Proof Of Stake Sidechains.mp4
21.6 MB
IEEE Security and Privacy 2019/SoK The Challenges Pitfalls and Perils of Using Hardware Performance Counters for Security.mp4
21.5 MB
IEEE Security and Privacy 2016/TaoStore - Overcoming Asynchronicity in Oblivious Data Storage.mp4
21.4 MB
IEEE Security and Privacy 2018/Stealing Hyperparameters in Machine Learning.mp4
21.4 MB
IEEE Security and Privacy 2022/CirC Compiler infrastructure for proof systems, software verification, and more.mp4
21.3 MB
IEEE Security and Privacy 2020/Are We Susceptible to Rowhammer An End-to-End Methodology for Cloud Providers.mp4
21.3 MB
IEEE Security and Privacy 2019/Fuzzing File Systems via Two-Dimensional Input Space Exploration.mp4
21.3 MB
IEEE Security and Privacy 2018/Crowd-GPS-Sec - Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks.mp4
21.3 MB
IEEE Security and Privacy 2018/Surveylance - Automatically Detecting Online Survey Scams.mp4
21.3 MB
IEEE Security and Privacy 2022/PGPATCH Policy-Guided Logic Bug Patching for Robotic Vehicles.mp4
21.3 MB
IEEE Security and Privacy 2016/Users Really Do Plug in USB Drives They Find.mp4
21.3 MB
IEEE Security and Privacy 2016/Verena - End-to-End Integrity Protection for Web Applications.mp4
21.3 MB
IEEE Security and Privacy 2018/Opening Remarks of the 39th IEEE Symposium on Security & Privacy.mp4
21.2 MB
IEEE Security and Privacy 2019/Razzer Finding Kernel Race Bugs through Fuzzing.mp4
21.1 MB
IEEE Security and Privacy 2022/Graphics Peeping Unit Exploiting EM Side-Channel Information of GPUs to Eavesdrop on Your Neighbors.mp4
21.0 MB
IEEE Security and Privacy 2022/PICCOLO Exposing Complex Backdoors in NLP Transformer Models.mp4
21.0 MB
IEEE Security and Privacy 2023/LAMBRETTA Learning to Rank for Twitter Soft Moderation.mp4
20.9 MB
IEEE Security and Privacy 2022/Publicly Accountable Robust Multi-Party Computation.mp4
20.9 MB
IEEE Security and Privacy 2018/Anonymity Trilemma - Strong Anonymity, Low Bandwidth Overhead, Low Latency -- Choose Two.mp4
20.9 MB
IEEE Security and Privacy 2022/Phishing in Organizations Findings from a Large-Scale and Long-Term Study.mp4
20.9 MB
IEEE Security and Privacy 2019/Exploiting Unintended Feature leakage in Collaborative Learning Congzheng Song.mp4
20.9 MB
IEEE Security and Privacy 2016/Helping Johnny to Analyze Malware - A Usability-Optimized Decompiler and Malware Analysis User Study.mp4
20.8 MB
IEEE Security and Privacy 2016/MitM Attack by Name Collision - Cause Analysis and Vulnerability Assessment in the New gTLD Era.mp4
20.7 MB
IEEE Security and Privacy 2018/Tracking Certificate Misissuance in the Wild.mp4
20.7 MB
IEEE Security and Privacy 2022/Model Stealing Attacks Against Inductive Graph Neural Networks.mp4
20.7 MB
IEEE Security and Privacy 2016/PhotoProof - Cryptographic Image Authentication for Any Set of Permissible Transformations.mp4
20.7 MB
IEEE Security and Privacy 2022/Adversarial Examples - for Proof-of-Learning.mp4
20.6 MB
IEEE Security and Privacy 2018/SoK - Keylogging Side Channels.mp4
20.6 MB
IEEE Security and Privacy 2020/ICAS An Extensible Framework for Estimating the Susceptibility of IC Layouts to Additive Trojans.mp4
20.6 MB
IEEE Security and Privacy 2017/Spotless Sandboxes - Evading Malware Analysis Systems using Wear-and-Tear Artifacts.mp4
20.6 MB
IEEE Security and Privacy 2019/On the Security of Two-Round Multi-Signatures.mp4
20.5 MB
IEEE Security and Privacy 2022/SoK How Robust is Image Classification Deep Neural Network Watermarking.mp4
20.5 MB
IEEE Security and Privacy 2016/pASSWORD tYPOS and How to Correct Them Securely.mp4
20.5 MB
IEEE Security and Privacy 2022/Wobfuscator Obfuscating JavaScript Malware via Opportunistic Translation to WebAssembly.mp4
20.5 MB
IEEE Security and Privacy 2021/An Interactive Prover for Protocol Verification in the Computational Model.mp4
20.5 MB
IEEE Security and Privacy 2017/Obstacles to the Adoption of Secure Communication Tools.mp4
20.5 MB
IEEE Security and Privacy 2019/Theory and Practice of Finding Eviction Sets.mp4
20.4 MB
IEEE Security and Privacy 2019/PrivKV Key Value Data Collection with Local Differential Privacy.mp4
20.3 MB
IEEE Security and Privacy 2021/ConDySTA Context-Aware Dynamic Supplement to Static Tain't Analysis.mp4
20.3 MB
IEEE Security and Privacy 2016/Security Analysis of Emerging Smart Home Applications.mp4
20.3 MB
IEEE Security and Privacy 2022/SYMBEXCEL Automated Analysis and Understanding of Malicious Excel 4.0 Macros.mp4
20.3 MB
IEEE Security and Privacy 2023/SNAP Efficient Extraction of Private Properties with Poisoning.mp4
20.2 MB
IEEE Security and Privacy 2023/Deep perceptual hashing algorithms with hidden dual purpose client-side scanning facial recognition.mp4
20.2 MB
IEEE Security and Privacy 2016/High-Speed Inter-domain Fault Localization.mp4
20.2 MB
IEEE Security and Privacy 2016/Distillation as a Defense to Adversarial Perturbations against Deep Neural Networks.mp4
20.2 MB
IEEE Security and Privacy 2022/Spinning Language Models Risks of Propaganda-as-a-Service and Countermeasures.mp4
20.2 MB
IEEE Security and Privacy 2022/Spiral Fast, High-Rate Single-Server PIR via FHE Composition.mp4
20.1 MB
IEEE Security and Privacy 2022/WIGHT Wired Ghost Touch Attack on Capacitive Touchscreens.mp4
20.0 MB
IEEE Security and Privacy 2018/FPGA-Based Remote Power Side-Channel Attacks.mp4
20.0 MB
IEEE Security and Privacy 2023/WarpAttack Bypassing CFI through Compiler-Introduced Double-Fetches.mp4
20.0 MB
IEEE Security and Privacy 2018/Secure Device Bootstrapping without Secrets Resistant to Signal Manipulation Attacks.mp4
20.0 MB
IEEE Security and Privacy 2021/Post-Quantum WireGuard.mp4
20.0 MB
IEEE Security and Privacy 2016/Key Confirmation in Key Exchange - A Formal Treatment and Implications for TLS 1.3.mp4
20.0 MB
IEEE Security and Privacy 2022/SoK Social Cybersecurity.mp4
19.9 MB
IEEE Security and Privacy 2017/Skyfire - Data-Driven Seed Generation for Fuzzing.mp4
19.9 MB
IEEE Security and Privacy 2022/Finding and Exploiting CPU Features using MSR Templating.mp4
19.9 MB
IEEE Security and Privacy 2023/Not Yet Another Digital ID Privacy-preserving Humanitarian Aid Distribution.mp4
19.9 MB
IEEE Security and Privacy 2016/Following Devil's Footprints - Cross-Platform Analysis of Potentially Harmful Libraries ....mp4
19.9 MB
IEEE Security and Privacy 2022/Foundations of Dynamic BFT.mp4
19.8 MB
IEEE Security and Privacy 2018/Impossibility of Precise and Sound Termination-Sensitive Security Enforcements.mp4
19.8 MB
IEEE Security and Privacy 2016/Beauty and the Beast - Diverting modern web browsers to build unique browser fingerprints.mp4
19.8 MB
IEEE Security and Privacy 2020/Pseudorandom Black Swans Cache Attacks on CTR_DRBG.mp4
19.7 MB
IEEE Security and Privacy 2022/Universal 3-Dimensional Perturbations for Black-Box Attacks on Video Recognition Systems.mp4
19.7 MB
IEEE Security and Privacy 2022/De-Identification's Impact on Minority Representation and Privacy Preservation in the US Census.mp4
19.6 MB
IEEE Security and Privacy 2021/The EMV Standard Break, Fix, Verify.mp4
19.6 MB
IEEE Security and Privacy 2017/Under the Shadow of Sunshine - Understanding & Detecting Bulletproof Hosting.mp4
19.5 MB
IEEE Security and Privacy 2023/On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security.mp4
19.4 MB
IEEE Security and Privacy 2016/Cinderella - Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with ....mp4
19.4 MB
IEEE Security and Privacy 2022/GREBE Unveiling Exploitation Potential for Linux Kernel Bugs.mp4
19.4 MB
IEEE Security and Privacy 2022/Transcending TRANSCEND Revisiting Malware Classification in the Presence of Concept Drift.mp4
19.4 MB
IEEE Security and Privacy 2016/Talos - Neutralizing Vulnerabilities with Security Workarounds for Rapid Response.mp4
19.4 MB
IEEE Security and Privacy 2022/mmSpy Spying Phone Calls using mmWave Radars.mp4
19.3 MB
IEEE Security and Privacy 2016/A Practical Oblivious Map Data Structure with Secure Deletion and History Independence.mp4
19.3 MB
IEEE Security and Privacy 2022/BadEncoder Backdoor Attacks to Pre-trained Encoders in Self-Supervised Learning.mp4
19.2 MB
IEEE Security and Privacy 2022/Bad Characters Imperceptible NLP Attacks.mp4
19.1 MB
IEEE Security and Privacy 2016/Downgrade Resilience in Key-Exchange Protocols.mp4
19.1 MB
IEEE Security and Privacy 2022/Timing-Based Browsing Privacy Vulnerabilities Via Site Isolation.mp4
19.1 MB
IEEE Security and Privacy 2016/Synthesizing Plausible Privacy-Preserving Location Traces.mp4
19.1 MB
IEEE Security and Privacy 2022/How Not to Protect Your IP - An Industry-Wide Break of IEEE 1735 Implementations.mp4
19.1 MB
IEEE Security and Privacy 2016/On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud.mp4
19.1 MB
IEEE Security and Privacy 2019/EmPoWeb Empowering Web Applications with Browser Extensions.mp4
19.1 MB
IEEE Security and Privacy 2022/Augury Using Data Memory-Dependent Prefetchers to Leak Data at Rest.mp4
19.0 MB
IEEE Security and Privacy 2020/Combating Dependence Explosion in Forensic Analysis Using Alternative Tag Propagation Semantics.mp4
19.0 MB
IEEE Security and Privacy 2018/Understanding Linux Malware.mp4
19.0 MB
IEEE Security and Privacy 2016/Shreds - Fine-grained Execution Units with Private Memory.mp4
19.0 MB
IEEE Security and Privacy 2018/A Tale of Two Studies - The Best and Worst of YubiKey Usability.mp4
19.0 MB
IEEE Security and Privacy 2022/Exploit the Last Straw That Breaks Android Systems.mp4
19.0 MB
IEEE Security and Privacy 2019/F-BLEAU Fast Black-box Leakage Estimation.mp4
18.9 MB
IEEE Security and Privacy 2022/A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP.mp4
18.9 MB
IEEE Security and Privacy 2018/FP-Stalker - Tracking Browser Fingerprint Evolutions - Antoine Vastel.mp4
18.9 MB
IEEE Security and Privacy 2016/TriggerScope - Towards Detecting Logic Bombs in Android Applications.mp4
18.8 MB
IEEE Security and Privacy 2023/TELEPATH A Minecraft-based Covert Communication System.mp4
18.8 MB
IEEE Security and Privacy 2018/Oblix - An Efficient Oblivious Search Index.mp4
18.8 MB
IEEE Security and Privacy 2022/Back to the Drawing Board A Critical Evaluation of Poisoning Attacks on Federated Learning.mp4
18.7 MB
IEEE Security and Privacy 2015/Controlled-Channel Attacks - Deterministic Side Channels for Untrusted Operating Systems.mp4
18.7 MB
IEEE Security and Privacy 2021/SoK Quantifying Cyber Risk.mp4
18.7 MB
IEEE Security and Privacy 2023/On the (In)security of Peer-to-Peer Decentralized Machine Learning.mp4
18.7 MB
IEEE Security and Privacy 2019/Lay Down the Common Metrics Evaluating Proof of Work Consensus Protocols' Security.mp4
18.6 MB
IEEE Security and Privacy 2022/TROLLMAGNIFIER Detecting State-Sponsored Troll Accounts on Reddit.mp4
18.6 MB
IEEE Security and Privacy 2016/Data-Oriented Programming - On the Expressiveness of Non-Control Data Attacks.mp4
18.6 MB
IEEE Security and Privacy 2022/DEPCOMM Graph Summarization on System Audit Logs for Attack Investigation.mp4
18.6 MB
IEEE Security and Privacy 2020/Transparent Polynomial Delegation and Its Applications to Zero Knowledge Proof.mp4
18.6 MB
IEEE Security and Privacy 2020/MarkUs Drop-in Use-After-Free Prevention for Low-Level Languages.mp4
18.6 MB
IEEE Security and Privacy 2016/Staying Secure and Unprepared - Understanding and Mitigating the Security Risks of Apple ZeroConf.mp4
18.5 MB
IEEE Security and Privacy 2022/SMILE Secure Memory Introspection for Live Enclave.mp4
18.5 MB
IEEE Security and Privacy 2022/MatRiCT More Efficient Post-Quantum Private Blockchain Payments.mp4
18.5 MB
IEEE Security and Privacy 2016/The Cracked Cookie Jar - HTTP Cookie Hijacking and the Exposure of Private Information.mp4
18.5 MB
IEEE Security and Privacy 2016/SoK - Everyone Hates Robocalls - A Survey of Techniques against Telephone Spam.mp4
18.4 MB
IEEE Security and Privacy 2022/Waldo A Private Time-Series Database from Function Secret-Sharing.mp4
18.3 MB
IEEE Security and Privacy 2023/Scalable and Privacy-Preserving Federated Principal Component Analysis.mp4
18.3 MB
IEEE Security and Privacy 2023/LazyTAP On-Demand Data Minimization for Trigger-Action Applications.mp4
18.3 MB
IEEE Security and Privacy 2019/RIDL Rogue In-Flight Data Load.mp4
18.2 MB
IEEE Security and Privacy 2022/Analyzing Ground-Truth Data of Mobile Gambling Scam.mp4
18.2 MB
IEEE Security and Privacy 2023/No Privacy in the Electronics Repair Industry.mp4
18.2 MB
IEEE Security and Privacy 2020/Towards Effective Differential Privacy Comms for Users' Data Sharing Decision and Comprehension.mp4
18.2 MB
IEEE Security and Privacy 2016/A Tough call - Mitigating Advanced Code-Reuse Attacks At The Binary Level.mp4
18.1 MB
IEEE Security and Privacy 2023/A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations.mp4
18.1 MB
IEEE Security and Privacy 2023/High-Order Masking of Lattice Signatures in Quasilinear Time.mp4
18.1 MB
IEEE Security and Privacy 2016/You Get Where You're Looking For - The Impact Of Information Sources On Code Security.mp4
18.1 MB
IEEE Security and Privacy 2016/Multiple Handshakes Security of TLS 1.3 Candidates.mp4
18.1 MB
IEEE Security and Privacy 2020/HydRand Efficient Continuous Distributed Randomness.mp4
18.0 MB
IEEE Security and Privacy 2016/Return to the Zombie Gadgets - Undermining Destructive Code Reads via Code-Inference Attacks.mp4
18.0 MB
IEEE Security and Privacy 2020/SoK A Minimalist Approach to Formalizing Analog Sensor Security.mp4
17.9 MB
IEEE Security and Privacy 2023/Characterizing the Limits of POV Acoustic Eavesdropping from Smartphone Cameras.mp4
17.9 MB
IEEE Security and Privacy 2023/Practical Timing Side-Channel Attacks on Memory Compression.mp4
17.9 MB
IEEE Security and Privacy 2016/Prepose - Privacy, Security, and Reliability for Gesture-Based Programming.mp4
17.8 MB
IEEE Security and Privacy 2016/LAVA - Large-scale Automated Vulnerability Addition.mp4
17.8 MB
IEEE Security and Privacy 2016/Domain-Z - 28 Registrations Later.mp4
17.8 MB
IEEE Security and Privacy 2016/Inferring User Routes and Locations using Zero-Permission Mobile Sensors.mp4
17.8 MB
IEEE Security and Privacy 2022/Attacks on Wireless Coexistence.mp4
17.8 MB
IEEE Security and Privacy 2023/Is Cryptographic Deniability Sufficient Non-Expert Perceptions of Deniability in Secure Messaging.mp4
17.8 MB
IEEE Security and Privacy 2019/Helen Maliciously Secure Coopetitive Learning for Linear Models.mp4
17.7 MB
IEEE Security and Privacy 2022/Using Throughput-Centric Byzantine Broadcast to Tolerate Malicious Majority in Blockchains.mp4
17.7 MB
IEEE Security and Privacy 2022/SpecHammer Combining Spectre and Rowhammer for New Speculative Attacks.mp4
17.7 MB
IEEE Security and Privacy 2023/Breaking Security-Critical Voice Authentication.mp4
17.6 MB
IEEE Security and Privacy 2023/User Perceptions and Experiences with Smart Home Updates.mp4
17.6 MB
IEEE Security and Privacy 2022/Locally Differentially Private Sparse Vector Aggregation.mp4
17.6 MB
IEEE Security and Privacy 2022/Mind the Gap Studying the Insecurity of Provably Secure Embedded Trusted Execution Architectures.mp4
17.6 MB
IEEE Security and Privacy 2023/RAB Provable Robustness Against Backdoor Attacks.mp4
17.6 MB
IEEE Security and Privacy 2019/IEEE S&P 2019 - Opening Remarks - Program Chair.mp4
17.6 MB
IEEE Security and Privacy 2018/DEEPSEC - Deciding Equivalence Properties in Security Protocols - Theory and Practice.mp4
17.6 MB
IEEE Security and Privacy 2023/SecureCells A Secure Compartmentalized Architecture.mp4
17.5 MB
IEEE Security and Privacy 2023/Analyzing Leakage of Personally Identifiable Information in Language Models.mp4
17.5 MB
IEEE Security and Privacy 2023/GraphSPD Graph-Based Security Patch Detection with Enriched Code Semantics.mp4
17.5 MB
IEEE Security and Privacy 2023/FLUTE Fast and Secure Lookup Table Evaluations.mp4
17.5 MB
IEEE Security and Privacy 2023/Collaborative Ad Transparency Promises and Limitations.mp4
17.5 MB
IEEE Security and Privacy 2021/Survivalism Systematic Analysis of Malware Living-Off-The-Land.mp4
17.5 MB
IEEE Security and Privacy 2022/WtaGraph Web Tracking and Advertising Detection using Graph Neural Networks.mp4
17.5 MB
IEEE Security and Privacy 2019/Bitcoin vs. Bitcoin Cash Coexistence or Downfall of Bitcoin Cash.mp4
17.4 MB
IEEE Security and Privacy 2021/SoK An Overview of FHE Compilers and Tools.mp4
17.4 MB
IEEE Security and Privacy 2017/Membership Inference Attacks against Machine Learning Models.mp4
17.4 MB
IEEE Security and Privacy 2022/Multi-Server Verifiable Computation of Low-Degree Polynomials.mp4
17.3 MB
IEEE Security and Privacy 2016/SoK - Towards Grounding Censorship Circumvention in Empiricism.mp4
17.3 MB
IEEE Security and Privacy 2019/Kiss from a Rogue Evaluating Detectability of Pay-at-the-Pump Card Skimmers.mp4
17.2 MB
IEEE Security and Privacy 2023/PCspooF Compromising the Safety of Time-Triggered Ethernet.mp4
17.2 MB
IEEE Security and Privacy 2023/Private Eye On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing.mp4
17.2 MB
IEEE Security and Privacy 2022/PCR-Auth Solving Authentication Puzzle Challenges with Encoded Palm Contact Responses.mp4
17.2 MB
IEEE Security and Privacy 2022/Security Analysis of the MLS Key Derivation.mp4
17.1 MB
IEEE Security and Privacy 2023/AUC Accountable Universal Composability.mp4
17.1 MB
IEEE Security and Privacy 2022/Private Nearest Neighbor Search with Sublinear Communication and Malicious Security.mp4
17.1 MB
IEEE Security and Privacy 2022/PROTRR Principled yet Optimal In-DRAM Target Row Refresh.mp4
17.1 MB
IEEE Security and Privacy 2023/A Theory to Instruct Differentially-Private Learning via Clipping Bias Reduction.mp4
17.1 MB
IEEE Security and Privacy 2022/Cats vs. Spectre An Axiomatic Approach to Modeling Speculative Execution Attacks.mp4
17.1 MB
IEEE Security and Privacy 2023/Threshold BBS Signatures for Distributed Anonymous Credential Issuance.mp4
17.0 MB
IEEE Security and Privacy 2023/SoK History is a Vast Early Warning System Auditing the Provenance of System Intrusions.mp4
17.0 MB
IEEE Security and Privacy 2023/Detection of Inconsistencies in Privacy Practices of Browser Extensions.mp4
17.0 MB
IEEE Security and Privacy 2022/The Experts' Insights on the Peer Review Process of Evaluating Security Papers.mp4
17.0 MB
IEEE Security and Privacy 2018/AI2 - Safety and Robustness Certification of Neural Networks.mp4
16.9 MB
IEEE Security and Privacy 2022/Are We There Yet Timing and Floating-Point Attacks on Differential Privacy Systems.mp4
16.9 MB
IEEE Security and Privacy 2022/Sabre Sender-Anonymous Messaging with Fast Audits.mp4
16.9 MB
IEEE Security and Privacy 2023/A Generic, Efficient, and Effortless Solver with Self-Supervised Learning for Breaking Text Captchas.mp4
16.9 MB
IEEE Security and Privacy 2023/Typing High-Speed Cryptography against Spectre v1.mp4
16.8 MB
IEEE Security and Privacy 2016/Automated Analysis and Verification of TLS 1.3 - 0-RTT, Resumption and Delayed Authentication.mp4
16.8 MB
IEEE Security and Privacy 2023/Teaching and Learning Cybersecurity and AI Ethics in High School.mp4
16.8 MB
IEEE Security and Privacy 2021/Wolverine Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and ....mp4
16.8 MB
IEEE Security and Privacy 2021/CacheOut Leaking Data on Intel CPUs via Cache Evictions.mp4
16.8 MB
IEEE Security and Privacy 2023/TrojanModel A Practical Trojan Attack against Automatic Speech Recognition Systems.mp4
16.7 MB
IEEE Security and Privacy 2023/D-DAE Defense-Penetrating Model Extraction Attacks.mp4
16.6 MB
IEEE Security and Privacy 2023/Hide and Seek with Spectres Efficient discovery of speculative vulnerabilities with random testing.mp4
16.6 MB
IEEE Security and Privacy 2021/Bomberman Defining and Defeating Hardware Ticking Timebombs at Design-time.mp4
16.5 MB
IEEE Security and Privacy 2023/Spectral-DP Differentially Private Deep Learning through Spectral Perturbation and Filtering.mp4
16.5 MB
IEEE Security and Privacy 2022/Goshawk Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis.mp4
16.5 MB
IEEE Security and Privacy 2016/SoK - (State of) The Art of War - Offensive Techniques in Binary Analysis.mp4
16.5 MB
IEEE Security and Privacy 2023/ADI Adversarial Dominating Inputs in Vertical Federated Learning Systems.mp4
16.5 MB
IEEE Security and Privacy 2022/The State of the SameSite Studying the Usage, Effectiveness, and Adequacy of SameSite Cookies.mp4
16.4 MB
IEEE Security and Privacy 2023/Deepfake Text Detection Limitations and Opportunities.mp4
16.3 MB
IEEE Security and Privacy 2016/Back in Black - Towards Formal, Black Box Analysis of Sanitizers and Filters.mp4
16.3 MB
IEEE Security and Privacy 2023/mmEcho A mmWave-based Acoustic Eavesdropping Method.mp4
16.3 MB
IEEE Security and Privacy 2023/Understanding the Security and Privacy Attitudes of Smart Home Users on Reddit.mp4
16.3 MB
IEEE Security and Privacy 2021/Red Belly a Deterministic Scalable Open Permissioned Blockchain.mp4
16.3 MB
IEEE Security and Privacy 2023/REDEEM MYSELF Purifying Backdoors in Deep Learning Models using Self Attention Distillation.mp4
16.2 MB
IEEE Security and Privacy 2022/Model Orthogonalization Class Distance Hardening in Neural Networks for Better Security.mp4
16.2 MB
IEEE Security and Privacy 2023/PublicCheck Public Integrity Verification for Services of Run-time Deep Models.mp4
16.1 MB
IEEE Security and Privacy 2022/Statistical Quantification of Differential Privacy A Local Approach.mp4
16.1 MB
IEEE Security and Privacy 2023/Man-in-the-Middle Attacks without Rogue AP When WPAs Meet ICMP Redirects.mp4
16.1 MB
IEEE Security and Privacy 2016/Cache Storage Channels - Alias-Driven Attacks and Verified Countermeasures.mp4
16.0 MB
IEEE Security and Privacy 2023/SoK Let the Privacy Games Begin A Unified Treatment of Data Inference Privacy in Machine Learning.mp4
16.0 MB
IEEE Security and Privacy 2022/Scraping Sticky Leftovers App User Information Left on Servers After Account Deletion.mp4
16.0 MB
IEEE Security and Privacy 2023/Shedding Light on Inconsistencies in Grid Cybersecurity Disconnects and Recommendations.mp4
16.0 MB
IEEE Security and Privacy 2023/Perceptions of Distributed Ledger Technology Key Management-Interviews with Finance Professionals.mp4
16.0 MB
IEEE Security and Privacy 2022/SNARKBlock Federated Anonymous Blocklisting from Hidden Common Input Aggregate Proofs.mp4
15.9 MB
IEEE Security and Privacy 2023/Discovering Java Deserialization Vulnerabilities via Structure-Aware Directed Greybox Fuzzing.mp4
15.9 MB
IEEE Security and Privacy 2023/SoK Taxonomy of Attacks on Open-Source Software Supply Chains.mp4
15.9 MB
IEEE Security and Privacy 2022/AccEar Accelerometer Acoustic Eavesdropping with Unconstrained Vocabulary.mp4
15.8 MB
IEEE Security and Privacy 2022/SAILFISH Vetting Smart Contract State-Inconsistency Bugs in Seconds.mp4
15.8 MB
IEEE Security and Privacy 2021/CryptGPU Fast Privacy-Preserving Machine Learning on the GPU.mp4
15.8 MB
IEEE Security and Privacy 2023/DeHiREC Detecting Hidden Voice Recorders via ADC Electromagnetic Radiation.mp4
15.8 MB
IEEE Security and Privacy 2022/COBRA Dynamic Proactive Secret Sharing for Confidential BFT Services.mp4
15.7 MB
IEEE Security and Privacy 2023/IPvSeeYou Exploiting Leaked Identifiers in IPv6 for Street-Level Geolocation.mp4
15.7 MB
IEEE Security and Privacy 2023/SyzDescribe Principled, Automated, Static Generation of Syscall Descriptions for Kernel Drivers.mp4
15.7 MB
IEEE Security and Privacy 2023/SoK Certified Robustness for Deep Neural Networks.mp4
15.7 MB
IEEE Security and Privacy 2020/TextExerciser Feedback-Driven Text Input Exercising for Android Applications.mp4
15.6 MB
IEEE Security and Privacy 2016/Hawk - The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts.mp4
15.6 MB
IEEE Security and Privacy 2023/When and Why Do People Want Ad Targeting Explanations Evidence from a Mixed-Methods Field Study.mp4
15.6 MB
IEEE Security and Privacy 2022/Hark A Deep Learning System for Navigating Privacy Feedback at Scale.mp4
15.6 MB
IEEE Security and Privacy 2023/WeRLman To Tackle Whale (Transactions), Go Deep (RL).mp4
15.6 MB
IEEE Security and Privacy 2023/From 5G Sniffing to Harvesting Leakages of Privacy-Preserving Messengers.mp4
15.6 MB
IEEE Security and Privacy 2021/Randomized Last-Level Caches Are Still Vulnerable to Cache Side-Channel Attacks But We Can Fix It.mp4
15.5 MB
IEEE Security and Privacy 2023/WaVe A Verifiably Secure WebAssembly Sandboxing Runtime.mp4
15.5 MB
IEEE Security and Privacy 2020/Breaking and (Partially) Fixing Provably Secure Onion Routing.mp4
15.5 MB
IEEE Security and Privacy 2022/ZeeStar Private Smart Contracts by Homomorphic Encryption and Zero-knowledge Proofs.mp4
15.4 MB
IEEE Security and Privacy 2020/Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers.mp4
15.4 MB
IEEE Security and Privacy 2021/Bitcoin-Compatible Virtual Channels.mp4
15.4 MB
IEEE Security and Privacy 2016/Seeking Nonsense, Looking for Trouble - Efficient Promotional-Infection Detection through ....mp4
15.4 MB
IEEE Security and Privacy 2022/Automated Attack Synthesis by Extracting Finite State Machines from Protocol Specification Documents.mp4
15.4 MB
IEEE Security and Privacy 2023/SoK Decentralized Finance (DeFi) Attacks.mp4
15.4 MB
IEEE Security and Privacy 2016/A Method for Verifying Privacy-Type Properties - The Unbounded Case.mp4
15.3 MB
IEEE Security and Privacy 2022/SoK Practical Foundations for Software Spectre Defenses.mp4
15.3 MB
IEEE Security and Privacy 2022/SoK Authentication in Augmented and Virtual Reality.mp4
15.3 MB
IEEE Security and Privacy 2023/Blue Is the New Black (Market) Privacy Leaks and Re-Victimization from Police-Auctioned Cellphones.mp4
15.3 MB
IEEE Security and Privacy 2023/3DFed Adaptive and Extensible Framework for Covert Backdoor Attack in Federated Learning.mp4
15.3 MB
IEEE Security and Privacy 2022/Property Inference from Poisoning.mp4
15.3 MB
IEEE Security and Privacy 2023/Mew Enabling Large-Scale and Dynamic Link-Flooding Defenses on Programmable Switches.mp4
15.3 MB
IEEE Security and Privacy 2023/Scaling JavaScript Abstract Interpretation to Detect and Exploit Node.js Taint-style Vulnerability.mp4
15.3 MB
IEEE Security and Privacy 2020/KARONTE Detecting Insecure Multi-binary Interactions in Embedded Firmware.mp4
15.2 MB
IEEE Security and Privacy 2023/SPHINCSC Compressing SPHINCS With (Almost) No Cost.mp4
15.2 MB
IEEE Security and Privacy 2023/An Interview on the Security and Privacy Development Practices in Turkish Software Startups.mp4
15.1 MB
IEEE Security and Privacy 2016/No Pardon for the Interruption - New Inference Attacks on Android Through Interrupt Timing Analysis.mp4
15.1 MB
IEEE Security and Privacy 2023/Blue's Clues Practical Discovery of Non-Discoverable Bluetooth Devices.mp4
15.1 MB
IEEE Security and Privacy 2020/NetCAT Practical Cache Attacks from the Network.mp4
15.1 MB
IEEE Security and Privacy 2023/Private Collaborative Data Cleaning via Non-Equi PSI.mp4
15.1 MB
IEEE Security and Privacy 2020/Leveraging EM Side-Channel Information to Detect Rowhammer Attacks.mp4
15.1 MB
IEEE Security and Privacy 2023/TEEzz Fuzzing Trusted Applications on COTS Android Devices.mp4
15.1 MB
IEEE Security and Privacy 2020/SEIMI Efficient and Secure SMAP-Enabled Intra-process Memory Isolation.mp4
15.0 MB
IEEE Security and Privacy 2023/How IoT Re-using Threatens Your Sensitive Data Exploring the User-Data Disposal in Used IoT Devices.mp4
15.0 MB
IEEE Security and Privacy 2023/Attitudes towards Client-Side Scanning for CSAM, Terrorism, Drug Trafficking, Drug Use, Tax Evasion.mp4
15.0 MB
IEEE Security and Privacy 2023/UTOPIA Automatic Generation of Fuzz Driver using Unit Tests.mp4
15.0 MB
IEEE Security and Privacy 2023/Practical Program Modularization with Type-Based Dependence Analysis.mp4
15.0 MB
IEEE Security and Privacy 2023/Volttack Control IoT Devices by Manipulating Power Supply Voltage.mp4
14.9 MB
IEEE Security and Privacy 2023/One Key to Rule Them All Secure Group Pairing for Heterogeneous IoT Devices.mp4
14.9 MB
IEEE Security and Privacy 2022/Adversarial Prefetch New Cross-Core Cache Side Channel Attacks.mp4
14.9 MB
IEEE Security and Privacy 2023/It’s (DOM) Clobbering Time Attack Techniques, Prevalence, and Defenses.mp4
14.9 MB
IEEE Security and Privacy 2023/Towards a Rigorous Statistical Analysis of Empirical Password Datasets.mp4
14.8 MB
IEEE Security and Privacy 2023/SoK A Critical Evaluation of Efficient Website Fingerprinting Defenses.mp4
14.8 MB
IEEE Security and Privacy 2023/Disassembling ARM Binaries by Lightweight Superset Instruction Interpretation and Graph Modeling.mp4
14.8 MB
IEEE Security and Privacy 2023/VIDEZZO Dependency-aware Virtual Device Fuzzing.mp4
14.8 MB
IEEE Security and Privacy 2019/IEEE S&P 2019 - Opening Remarks - General Chair.mp4
14.8 MB
IEEE Security and Privacy 2023/MagBackdoor Beware of Your Loudspeaker as A Backdoor For Magnetic Injection Attacks.mp4
14.8 MB
IEEE Security and Privacy 2016/I Think They're Trying to Tell Me Something - Advice Sources and Selection for Digital Security.mp4
14.7 MB
IEEE Security and Privacy 2023/SoK Cryptographic Neural-Network Computation.mp4
14.7 MB
IEEE Security and Privacy 2020/Semantic Understanding of Smart Contracts Executable Operational Semantics of Solidity.mp4
14.7 MB
IEEE Security and Privacy 2020/The Many Kinds of Creepware Used for Interpersonal Attacks.mp4
14.7 MB
IEEE Security and Privacy 2023/Design and Evaluation of Inclusive Email Security Indicators for People with Visual Impairments.mp4
14.7 MB
IEEE Security and Privacy 2021/A Secure and Formally Verified Linux KVM Hypervisor.mp4
14.6 MB
IEEE Security and Privacy 2023/RuleKeeper GDPR-Aware Personal Data Compliance for Web Frameworks.mp4
14.6 MB
IEEE Security and Privacy 2023/Bitcoin-Enhanced Proof-of-Stake Security Possibilities and Impossibilities.mp4
14.6 MB
IEEE Security and Privacy 2023/Threshold Signatures in the Multiverse.mp4
14.6 MB
IEEE Security and Privacy 2023/No One Drinks From the Firehose How Organizations Filter and Prioritize Vulnerability Information.mp4
14.6 MB
IEEE Security and Privacy 2022/Quantifying Blockchain Extractable Value How dark is the forest.mp4
14.6 MB
IEEE Security and Privacy 2023/Skilled or Gullible Gender Stereotypes Related to Computer Security and Privacy.mp4
14.6 MB
IEEE Security and Privacy 2023/WebSpec Towards Machine-Checked Analysis of Browser Security Mechanisms.mp4
14.6 MB
IEEE Security and Privacy 2023/Weak Fiat-Shamir Attacks on Modern Proof Systems.mp4
14.5 MB
IEEE Security and Privacy 2020/xMP Selective Memory Protection for Kernel and User Space.mp4
14.5 MB
IEEE Security and Privacy 2023/MEGA Malleable Encryption Goes Awry.mp4
14.5 MB
IEEE Security and Privacy 2020/Kobold Evaluating Decentralized Access Control for Remote NSXPC Methods on iOS.mp4
14.5 MB
IEEE Security and Privacy 2021/DP-Sniper Black-Box Discovery of Differential Privacy Violations using Classifiers.mp4
14.5 MB
IEEE Security and Privacy 2023/TeSec Accurate Server-side Attack Investigation for Web Applications.mp4
14.4 MB
IEEE Security and Privacy 2023/mmSpoof Resilient Spoofing of Automotive Millimeter-wave Radars using Reflect Array.mp4
14.4 MB
IEEE Security and Privacy 2022/SecFloat Accurate Floating-Point meets Secure 2-Party Computation.mp4
14.4 MB
IEEE Security and Privacy 2022/Jigsaw Efficient and Scalable Path Constraints Fuzzing.mp4
14.4 MB
IEEE Security and Privacy 2016/Sending out an SMS - Characterizing the Security of the SMS Ecosystem with Public Gateways.mp4
14.4 MB
IEEE Security and Privacy 2021/SoK All You Ever Wanted to Know About Binary Disassembly But Were Afraid to Ask.mp4
14.3 MB
IEEE Security and Privacy 2016/Revisiting Square Root ORAM - Efficient Random Access in Multi-Party Computation.mp4
14.3 MB
IEEE Security and Privacy 2022/A Secret-Free Hypervisor Rethinking Isolation in the Age of Speculative Vulnerabilities.mp4
14.3 MB
IEEE Security and Privacy 2022/BEACON - Directed Grey-Box Fuzzing with Provable Path Pruning.mp4
14.3 MB
IEEE Security and Privacy 2023/Tyr Finding Consensus Failure Bugs in Blockchain System with Behaviour Divergent Model.mp4
14.3 MB
IEEE Security and Privacy 2023/FIDO2, CTAP 2.1, and WebAuthn 2 Provable Security and Post-Quantum Instantiation.mp4
14.2 MB
IEEE Security and Privacy 2019/On the Feasibility of Rerouting-Based DDoS Defenses.mp4
14.2 MB
IEEE Security and Privacy 2020/OHIE Blockchain Scaling Made Simple.mp4
14.1 MB
IEEE Security and Privacy 2021/Poltergeist Acoustic Manipulation of Image Stabilization towards Object Mis-Labeling.mp4
14.1 MB
IEEE Security and Privacy 2021/Defensive Technology Use by Political Activists During the Sudanese Revolution.mp4
14.1 MB
IEEE Security and Privacy 2019/Demystifying Hidden Privacy Settings in Mobile Apps.mp4
14.1 MB
IEEE Security and Privacy 2023/Protected or Porous A Comparative Analysis of Threat Detection Capability of IoT Safeguards.mp4
14.1 MB
IEEE Security and Privacy 2022/Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms.mp4
14.1 MB
IEEE Security and Privacy 2023/Characterizing Everyday Misuse of Smart Home Devices.mp4
14.0 MB
IEEE Security and Privacy 2023/Always Contribute Back A Qualitative Study on Security Challenges of the Open Source Supply Chain.mp4
14.0 MB
IEEE Security and Privacy 2020/ICLab A Global, Longitudinal Internet Censorship Measurement Platform.mp4
14.0 MB
IEEE Security and Privacy 2023/QueryX Symbolic Query on Decompiled Code for Finding Bugs in COTS Binaries.mp4
14.0 MB
IEEE Security and Privacy 2022/Committed to Trust A Qualitative Study on Security & Trust in Open Source Software Projects.mp4
14.0 MB
IEEE Security and Privacy 2023/OWL Compositional Verification of Security Protocols via an Information-Flow Type System.mp4
14.0 MB
IEEE Security and Privacy 2023/ShadowNet A Secure and Efficient On-device Model Inference System for Convolutional Neural Networks.mp4
14.0 MB
IEEE Security and Privacy 2020/WaveSpy Remote and Through-wall Screen Attack via mmWave Sensing.mp4
14.0 MB
IEEE Security and Privacy 2023/Uncovering User Interactions on Smartphones via Contactless Wireless Charging Side Channels.mp4
14.0 MB
IEEE Security and Privacy 2021/DynPTA Combining Static and Dynamic Analysis for Practical Selective Data Protection.mp4
13.9 MB
IEEE Security and Privacy 2021/Hear No Evil, See Kenansville Efficient and Transferable Black-Box Attacks on Automatic ....mp4
13.9 MB
IEEE Security and Privacy 2019/Certified Robustness to Adversarial Examples with Differential Privacy.mp4
13.9 MB
IEEE Security and Privacy 2023/Improving Developers' Understanding of Regex Denial of Service Tools.mp4
13.9 MB
IEEE Security and Privacy 2023/ELSA Secure Aggregation for Federated Learning with Malicious Actors.mp4
13.9 MB
IEEE Security and Privacy 2020/SAVIOR Towards Bug-Driven Hybrid Testing.mp4
13.9 MB
IEEE Security and Privacy 2023/Half&Half Demystifying Intel’s Directional Branch Predictors for Fast, Secure Partitioned Execution.mp4
13.9 MB
IEEE Security and Privacy 2023/The Leaky Web Automated Discovery of Cross-Site Information Leaks in Browsers and the Web.mp4
13.8 MB
IEEE Security and Privacy 2023/Protecting Models Trained by Multi-party Learning with Differential Privacy.mp4
13.7 MB
IEEE Security and Privacy 2023/DVFS Frequently Leaks Secrets Hertzbleed Attacks Beyond SIKE, Cryptography, and CPU-Only Data.mp4
13.7 MB
IEEE Security and Privacy 2023/Investigating Package Related Security Threats in Software Registries.mp4
13.7 MB
IEEE Security and Privacy 2022/Universal Atomic Swaps Secure Exchange of Coins Across All Blockchains.mp4
13.6 MB
IEEE Security and Privacy 2020/The State of the Uniform Attacks on Encrypted Databases beyond the Uniform Query Distribution.mp4
13.6 MB
IEEE Security and Privacy 2020/Flaw Label Exploiting IPv6 Flow Label.mp4
13.6 MB
IEEE Security and Privacy 2022/Low-Bandwidth Threshold ECDSA via Pseudorandom Correlation Generators.mp4
13.5 MB
IEEE Security and Privacy 2016/HDFI - Hardware-Assisted Data-Flow Isolation.mp4
13.5 MB
IEEE Security and Privacy 2023/AI-Guardian Defeating Adversarial Attacks using Backdoors.mp4
13.5 MB
IEEE Security and Privacy 2023/Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation.mp4
13.5 MB
IEEE Security and Privacy 2022/Investigating the Use of Email Encryption for an Entire University.mp4
13.5 MB
IEEE Security and Privacy 2019/Short Text, Large Effect Measuring the Impact of User Reviews on Android App Security & Privacy.mp4
13.5 MB
IEEE Security and Privacy 2023/BLEDiff Scalable and Property-Agnostic Noncompliance Checking for BLE Implementations.mp4
13.4 MB
IEEE Security and Privacy 2023/Low-effort VR Headset User Authentication Using Head-reverberated Sounds with Replay Resistance.mp4
13.4 MB
IEEE Security and Privacy 2016/Dedup Est Machina - Memory Deduplication as an Advanced Exploitation Vector.mp4
13.4 MB
IEEE Security and Privacy 2020/SEVurity No Security Without Integrity - Breaking Integrity.mp4
13.4 MB
IEEE Security and Privacy 2023/Silph A Framework for Scalable and Accurate Generation of Hybrid MPC Protocols.mp4
13.3 MB
IEEE Security and Privacy 2020/Automated Reverse Engineering and Privacy Analysis of Modern Cars.mp4
13.3 MB
IEEE Security and Privacy 2021/SoK Security and Privacy in the Age of Commercial Drones.mp4
13.2 MB
IEEE Security and Privacy 2023/Sound Verification of Security Protocols From Design to Interoperable Implementations.mp4
13.2 MB
IEEE Security and Privacy 2023/Disguising Attacks with Explanation-Aware Backdoors.mp4
13.2 MB
IEEE Security and Privacy 2020/A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network.mp4
13.2 MB
IEEE Security and Privacy 2020/Unexpected Data Dependency Creation and Chaining A New Attack to SDN.mp4
13.2 MB
IEEE Security and Privacy 2023/Multi-Round Single-Server Secure Aggregation with Applications to Private Federated Learning.mp4
13.2 MB
IEEE Security and Privacy 2020/A Tale of Sea and Sky On the Security of Maritime VSAT Communications.mp4
13.2 MB
IEEE Security and Privacy 2023/RoFL Robustness of Secure Federated Learning.mp4
13.1 MB
IEEE Security and Privacy 2022/Why Crypto-detectors Fail A Systematic Evaluation of Cryptographic Misuse Detection Techniques.mp4
13.1 MB
IEEE Security and Privacy 2023/Beyond Phish Toward Detecting Fraudulent e-Commerce Websites at Scale.mp4
13.1 MB
IEEE Security and Privacy 2023/Adaptive Risk-Limiting Comparison Audits.mp4
13.1 MB
IEEE Security and Privacy 2023/EC Embedded Systems Compartmentalization via Intra-Kernel Isolation.mp4
13.1 MB
IEEE Security and Privacy 2023/Vulnerability Discovery for All Experiences of Marginalization in Vulnerability Discovery.mp4
13.1 MB
IEEE Security and Privacy 2021/Breaking the Specification Certified PDF.mp4
13.0 MB
IEEE Security and Privacy 2022/Device Fingerprinting with Peripheral Timestamps.mp4
13.0 MB
IEEE Security and Privacy 2023/SoK Distributed Randomness Beacons.mp4
13.0 MB
IEEE Security and Privacy 2021/A Novel Dynamic Analysis Infrastructure to Instrument Untrusted Execution Flow Across User-Kernel....mp4
13.0 MB
IEEE Security and Privacy 2023/Clockwork Finance Automated Analysis of Economic Security in Smart Contracts.mp4
12.9 MB
IEEE Security and Privacy 2022/Differentially Private Histograms in the Shuffle Model from Fake Users.mp4
12.9 MB
IEEE Security and Privacy 2023/Limits of I O Based Ransomware Detection An Imitation Based Attack.mp4
12.9 MB
IEEE Security and Privacy 2020/Ask the Experts What Should Be on an IoT Privacy and Security Label.mp4
12.9 MB
IEEE Security and Privacy 2023/Jolt Recovering TLS Signing Keys via Rowhammer Faults.mp4
12.9 MB
IEEE Security and Privacy 2020/Krace Data Race Fuzzing for Kernel File Systems.mp4
12.9 MB
IEEE Security and Privacy 2022/LinkTeller Recovering Private Edges from Graph Neural Networks via Influence Analysis.mp4
12.8 MB
IEEE Security and Privacy 2023/Jigsaw Puzzle Selective Backdoor Attack to Subvert Malware Classifiers.mp4
12.8 MB
IEEE Security and Privacy 2020/Establishing Economic Incentives for Security Patching of IoT Consumer Products.mp4
12.8 MB
IEEE Security and Privacy 2020/RAMBleed Reading Bits in Memory without Accessing Them.mp4
12.8 MB
IEEE Security and Privacy 2020/Humpty Dumpty Controlling Word Meanings via Corpus Poisoning.mp4
12.8 MB
IEEE Security and Privacy 2020/A Security Analysis of the Facebook Ad Library.mp4
12.7 MB
IEEE Security and Privacy 2021/Many-out-of-Many Proofs and Applications to Anonymous Zether.mp4
12.7 MB
IEEE Security and Privacy 2021/OSPREY Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary.mp4
12.7 MB
IEEE Security and Privacy 2020/Path Oblivious Heap Optimal and Practical Oblivious Priority Queue.mp4
12.7 MB
IEEE Security and Privacy 2021/Self-Supervised Euphemism Detection and Identification for Content Moderation.mp4
12.7 MB
IEEE Security and Privacy 2021/PLATYPUS Software-based Power Side-Channel Attacks on x86.mp4
12.6 MB
IEEE Security and Privacy 2021/Merkle2 A Low-Latency Transparency Log System.mp4
12.6 MB
IEEE Security and Privacy 2020/AdGraph A Graph-Based Approach to Ad and Tracker Blocking.mp4
12.6 MB
IEEE Security and Privacy 2023/Private Access Control for Function Secret Sharing.mp4
12.5 MB
IEEE Security and Privacy 2021/Co-Inflow Coarse-grained Information Flow Control for Java-like Languages.mp4
12.5 MB
IEEE Security and Privacy 2020/Ex-vivo Dynamic Analysis Framework for Android Device Drivers.mp4
12.5 MB
IEEE Security and Privacy 2021/Cross-Domain Access Control Encryption - Arbitrary-policy, Constant-size, Efficient.mp4
12.5 MB
IEEE Security and Privacy 2022/Arbitrary Modulation of Electromagnetic Noise from Unprivileged Software Impacting Emission Security.mp4
12.5 MB
IEEE Security and Privacy 2022/HAMRAZ Resilient Partitioning and Replication.mp4
12.4 MB
IEEE Security and Privacy 2021/Fingerprinting the Fingerprinters Learning to Detect Browser Fingerprinting Behaviors.mp4
12.4 MB
IEEE Security and Privacy 2019/Blind Certificate Authorities.mp4
12.4 MB
IEEE Security and Privacy 2023/Less Is More Refinement Proofs for Probabilistic Proofs.mp4
12.4 MB
IEEE Security and Privacy 2022/SoK Demystifying Binary Lifters Through the Lens of Downstream Applications.mp4
12.4 MB
IEEE Security and Privacy 2023/REGA Scalable Rowhammer Mitigation with Refresh-Generating Activations.mp4
12.4 MB
IEEE Security and Privacy 2022/Four Attacks and a Proof for Telegram.mp4
12.3 MB
IEEE Security and Privacy 2021/CanDID Bootstrapping Decentralized Identity from Legacy Providers.mp4
12.3 MB
IEEE Security and Privacy 2020/SPECTECTOR Principled Detection of Speculative Information Flows.mp4
12.3 MB
IEEE Security and Privacy 2023/On Efficient, High-Fidelity and Blind Suppression of Backdoor Effects in Trojaned ML Models.mp4
12.2 MB
IEEE Security and Privacy 2021/SoK Hate, Harassment, and the Changing Landscape of Online Abuse.mp4
12.2 MB
IEEE Security and Privacy 2020/Transys Leveraging Common Security Properties across Hardware Designs.mp4
12.1 MB
IEEE Security and Privacy 2021/Android Custom Permissions Demystified From Privilege Escalation to Design Shortcomings.mp4
12.1 MB
IEEE Security and Privacy 2021/Method Confusion Attack on the Bluetooth Pairing Process.mp4
12.1 MB
IEEE Security and Privacy 2021/Did you mix me Formally Verifying Verifiable Mix Nets in Electronic Voting.mp4
12.1 MB
IEEE Security and Privacy 2021/Electromagnetic Covert Channels Can Be Super Resilient.mp4
12.0 MB
IEEE Security and Privacy 2023/Leveraging Sandboxes for a Minimally Invasive Browser Fingerprinting Defense.mp4
12.0 MB
IEEE Security and Privacy 2020/Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability.mp4
12.0 MB
IEEE Security and Privacy 2021/STOCHFUZZ Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic ....mp4
12.0 MB
IEEE Security and Privacy 2021/Good Bot, Bad Bot Characterizing Automated Browsing Activity.mp4
11.9 MB
IEEE Security and Privacy 2016/Cloak of Visibility - Detecting When Machines Browse a Different Web.mp4
11.9 MB
IEEE Security and Privacy 2021/Epochal Signatures for Deniable Group Chats.mp4
11.9 MB
IEEE Security and Privacy 2021/Linking Bluetooth LE & Classic and Implications for Privacy-Preserving Bluetooth-Based Protocols.mp4
11.9 MB
IEEE Security and Privacy 2023/DepthFake Spoofing 3D Face Authentication with a 2D Photo.mp4
11.9 MB
IEEE Security and Privacy 2023/Practically-Exploitable Cryptographic Vulnerabilities in Matrix.mp4
11.9 MB
IEEE Security and Privacy 2023/Continual Observation under User-level Differential Privacy.mp4
11.8 MB
IEEE Security and Privacy 2020/TARDIS Rolling Back the Clock on CMS-Targeting Cyber Attacks.mp4
11.8 MB
IEEE Security and Privacy 2023/PLA-LiDAR Physical Laser Attacks against LiDAR-based 3D Object Detection in Autonomous Vehicle.mp4
11.8 MB
IEEE Security and Privacy 2021/Happer Unpacking Android Apps via a Hardware-Assisted Approach.mp4
11.8 MB
IEEE Security and Privacy 2021/ARBITRAR User-Guided API Misuse Detection.mp4
11.8 MB
IEEE Security and Privacy 2021/Adversarial Watermarking Transformer Towards Tracing Text Provenance with Data Hiding.mp4
11.8 MB
IEEE Security and Privacy 2023/Scatter and Split Securely Defeating Cache Contention and Occupancy Attacks.mp4
11.8 MB
IEEE Security and Privacy 2022/Surakav Generating Realistic Traces for a Strong Website Fingerprinting Defense.mp4
11.8 MB
IEEE Security and Privacy 2023/Precise Detection of Kernel Data Races with Probabilistic Lockset Analysis.mp4
11.8 MB
IEEE Security and Privacy 2020/SPECCFI Mitigating Spectre Attacks Using CFI Informed Speculation.mp4
11.7 MB
IEEE Security and Privacy 2020/Towards a Natural Perspective of Smart Homes for Practical Security and Safety Analyses.mp4
11.7 MB
IEEE Security and Privacy 2023/Understanding the (In)Security of Cross-side Face Verification Systems in Mobile Apps.mp4
11.6 MB
IEEE Security and Privacy 2023/MPCAuth Multi-factor Authentication for Distributed-trust Systems.mp4
11.5 MB
IEEE Security and Privacy 2023/XFL Naming Functions in Binaries with Extreme Multi-label Learning.mp4
11.5 MB
IEEE Security and Privacy 2023/DevIOus Device-Driven Side-Channel Attacks on the IOMMU.mp4
11.5 MB
IEEE Security and Privacy 2020/Enabling Rack-scale Confidential Computing Using Heterogeneous Trusted Execution Environment.mp4
11.5 MB
IEEE Security and Privacy 2023/SQUIP Exploiting the Scheduler Queue Contention Side Channel.mp4
11.5 MB
IEEE Security and Privacy 2023/Three-party Non-linear Computation without Preprocessing for Privacy-preserving Machine Learning.mp4
11.5 MB
IEEE Security and Privacy 2020/The Last Mile High-Assurance and High-Speed Cryptographic Implementations.mp4
11.5 MB
IEEE Security and Privacy 2021/Security of Multi-Sensor Fusion based Perception in Autonomous Driving Under Physical-World Attacks.mp4
11.5 MB
IEEE Security and Privacy 2019/Port Contention for Fun and Profit.mp4
11.5 MB
IEEE Security and Privacy 2020/Cornucopia Temporal Safety for CHERI Heaps.mp4
11.4 MB
IEEE Security and Privacy 2020/Private Resource Allocators and Their Applications.mp4
11.4 MB
IEEE Security and Privacy 2020/Automatic Uncovering of Hidden Behaviors from Input Validation in Mobile Apps.mp4
11.4 MB
IEEE Security and Privacy 2023/BlindHub Bitcoin-Compatible Privacy-Preserving Payment Channel Hubs Supporting Variable Amounts.mp4
11.4 MB
IEEE Security and Privacy 2023/Continuous Intrusion Characterizing the Security of Continuous Integration Services.mp4
11.4 MB
IEEE Security and Privacy 2021/Machine unlearning.mp4
11.4 MB
IEEE Security and Privacy 2021/On the Anonymity Guarantees of Anonymous Proof-of-Stake Protocols.mp4
11.3 MB
IEEE Security and Privacy 2023/Rethinking Searchable Symmetric Encryption.mp4
11.3 MB
IEEE Security and Privacy 2020/Influencing Photo Sharing Decisions on Social Media A Case of Paradoxical Findings.mp4
11.3 MB
IEEE Security and Privacy 2020/HopSkipJumpAttack A Query-Efficient Decision-Based Attack.mp4
11.3 MB
IEEE Security and Privacy 2020/Throwing Darts in the Dark Detecting Bots with Limited Data using Neural Data Augmentation.mp4
11.3 MB
IEEE Security and Privacy 2023/Finding Specification Blind Spots via Fuzz Testing.mp4
11.3 MB
IEEE Security and Privacy 2020/VerX Safety Verification of Smart Contracts.mp4
11.3 MB
IEEE Security and Privacy 2020/How Not to Prove Your Election Outcome.mp4
11.2 MB
IEEE Security and Privacy 2021/Real-World Snapshots vs. Theory Questioning the t-Probing Security Model..mp4
11.2 MB
IEEE Security and Privacy 2021/Compositional Security for Reentrant Applications.mp4
11.2 MB
IEEE Security and Privacy 2021/A First Look at Zoombombing.mp4
11.2 MB
IEEE Security and Privacy 2020/High Precision Open-World Website Fingerprinting.mp4
11.1 MB
IEEE Security and Privacy 2023/SelectFuzz Efficient Directed Fuzzing with Selective Path Exploration.mp4
11.1 MB
IEEE Security and Privacy 2022/MeshUp Stateless Cache Side-channel Attack on CPU Mesh.mp4
11.1 MB
IEEE Security and Privacy 2021/Learning Differentially Private Mechanisms.mp4
11.1 MB
IEEE Security and Privacy 2021/SoK The Faults in our ASRs An Overview of Attacks against Automatic Speech Recognition and ....mp4
11.1 MB
IEEE Security and Privacy 2020/Dragonblood Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd.mp4
11.1 MB
IEEE Security and Privacy 2023/A Security RISC Microarchitectural Attacks on Hardware RISC-V CPUs.mp4
11.1 MB
IEEE Security and Privacy 2021/Ed25519 Signature Schemes Theory and Practice.mp4
11.1 MB
IEEE Security and Privacy 2021/Detecting AI Trojans Using Meta Neural Analysis.mp4
11.1 MB
IEEE Security and Privacy 2020/Fuzzing JavaScript Engines with Aspect-Preserving Mutation.mp4
11.1 MB
IEEE Security and Privacy 2023/CSIRowhammer - Cryptographic Security and Integrity against Rowhammer.mp4
11.0 MB
IEEE Security and Privacy 2020/Gesture Authentication for Smartphones Evaluation of Gesture Password Selection Policies.mp4
11.0 MB
IEEE Security and Privacy 2021/Lightweight Techniques for Private Heavy Hitters.mp4
10.9 MB
IEEE Security and Privacy 2021/Improving Password Guessing via Representation Learning.mp4
10.9 MB
IEEE Security and Privacy 2021/When Function Signature Recovery Meets Compiler Optimization.mp4
10.9 MB
IEEE Security and Privacy 2020/FlyClient Super-Light Clients for Cryptocurrencies.mp4
10.9 MB
IEEE Security and Privacy 2021/Compositional Non-Interference for Fine-Grained Concurrent Programs.mp4
10.8 MB
IEEE Security and Privacy 2021/CANnon Reliable and Stealthy Remote Shutdown Attacks via Unaltered Automotive Microcontrollers.mp4
10.8 MB
IEEE Security and Privacy 2020/Tactical Provenance Analysis our Endpoint Detection and Response Systems.mp4
10.8 MB
IEEE Security and Privacy 2020/Browsing Unicity On the Limits of Anonymizing Web Tracking Data.mp4
10.8 MB
IEEE Security and Privacy 2023/Accuracy-Privacy Trade-off in Deep Ensemble A Membership Inference Perspective.mp4
10.8 MB
IEEE Security and Privacy 2021/An I O Separation Model for Formal Verification of Kernel Implementations.mp4
10.7 MB
IEEE Security and Privacy 2023/FedRecover Recovering from Poisoning Attacks in Federated Learning using Historical Information.mp4
10.7 MB
IEEE Security and Privacy 2020/EverCrypt A Fast, Verified, Cross-Platform Cryptographic Provider.mp4
10.7 MB
IEEE Security and Privacy 2020/Plundervolt Software-Based Fault Injection Attacks against Intel SGX.mp4
10.7 MB
IEEE Security and Privacy 2021/CrossTalk Speculative Data Leaks Across Cores Are Real.mp4
10.6 MB
IEEE Security and Privacy 2019/Full speed Fuzzing Reducing Fuzzing Overhead through Coverage-guided Tracing.mp4
10.6 MB
IEEE Security and Privacy 2023/Low-Cost Privilege Separation with Compile Time Compartmentalization for Embedded Systems.mp4
10.6 MB
IEEE Security and Privacy 2020/Neutain't Efficient Dynamic Tain't Analysis with Neural Networks.mp4
10.5 MB
IEEE Security and Privacy 2021/Reading Between the Lines An Extensive Evaluation of the Security and Privacy Implications ....mp4
10.5 MB
IEEE Security and Privacy 2020/VeriSmart A Highly Precise Safety Verifier for Ethereum Smart Contracts.mp4
10.5 MB
IEEE Security and Privacy 2019/Resident Evil Understanding Residential IP Proxy as a Dark Service.mp4
10.5 MB
IEEE Security and Privacy 2021/DICE Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis.mp4
10.5 MB
IEEE Security and Privacy 2022/DeepCoFFEA Improved Flow Correlation Attacks on Tor via Metric Learning and Amplification.mp4
10.4 MB
IEEE Security and Privacy 2021/Using Selective Memoization to Defeat Regular Expression Denial of Service (ReDoS).mp4
10.4 MB
IEEE Security and Privacy 2020/ZEXE Enabling Decentralized Private Computation.mp4
10.4 MB
IEEE Security and Privacy 2020/OAT Attesting Operation Integrity of Embedded Devices.mp4
10.4 MB
IEEE Security and Privacy 2021/SIRNN A Math Library for Secure RNN Inference.mp4
10.3 MB
IEEE Security and Privacy 2020/Measuring Legal Compliance of Banners from IAB Europe's Transparancy and Consent Framework.mp4
10.3 MB
IEEE Security and Privacy 2021/Which Privacy and Security Attributes Most Impact Consumers' Risk Perception and Willingness to ....mp4
10.3 MB
IEEE Security and Privacy 2020/Replicated State Machines without Replicated Execution.mp4
10.3 MB
IEEE Security and Privacy 2021/Keep the Dirt Tain'ted TreeKEM, Adaptively and Actively Secure Continuous Group Key Agreement.mp4
10.3 MB
IEEE Security and Privacy 2021/Doing good by fighting fraud Ethical anti-fraud systems for mobile payments.mp4
10.3 MB
IEEE Security and Privacy 2021/Cross Layer Attacks and How to Use Them (for DNS Cache Poisoning, Device Tracking and More).mp4
10.3 MB
IEEE Security and Privacy 2020/Pangolin Incremental Hybrid Fuzzing with Polyhedral Path Abstraction.mp4
10.3 MB
IEEE Security and Privacy 2021/Compact Certificates of Collective Knowledge.mp4
10.2 MB
IEEE Security and Privacy 2020/TRRespass Exploiting the Many Sides of Target Row Refresh.mp4
10.2 MB
IEEE Security and Privacy 2021/Lockable Signatures for Blockchains Scriptless Scripts for all Signatures.mp4
10.2 MB
IEEE Security and Privacy 2021/Data Privacy in Trigger-Action IoT Systems.mp4
10.2 MB
IEEE Security and Privacy 2020/A Comparative Usability Study of FIDO2 Passwordless Authentication.mp4
10.1 MB
IEEE Security and Privacy 2020/Full-band De-anonymization of Bluetooth Classic Devices.mp4
10.1 MB
IEEE Security and Privacy 2021/They Would do Better if They Worked Together The Case of Interaction Problems Between Password ....mp4
10.1 MB
IEEE Security and Privacy 2020/Are Anonymity-Seekers Just like Everybody Else An Analysis of Contributions to Wikipedia from Tor.mp4
10.1 MB
IEEE Security and Privacy 2020/Detection of Electromagnetic Interference Attacks on Sensor Systems.mp4
10.1 MB
IEEE Security and Privacy 2022/ShorTor Improving Tor Network Latency via Multi-hop Overlay Routing.mp4
10.1 MB
IEEE Security and Privacy 2023/ImU Physical Impersonating Attack for Face Recognition System with Natural Style Changes.mp4
10.1 MB
IEEE Security and Privacy 2023/Locally Differentially Private Frequency Estimation Based on Convolution Framework.mp4
10.1 MB
IEEE Security and Privacy 2023/SoK Anti-Facial Recognition Technology.mp4
10.1 MB
IEEE Security and Privacy 2020/CrypTFlow - Secure TensorFlow Inference.mp4
10.0 MB
IEEE Security and Privacy 2019/Self-Encrypting Deception Weaknesses in the Encryption of Solid State Drives.mp4
10.0 MB
IEEE Security and Privacy 2020/SoK Understanding the Prevailing Security Vulnerabilities in TrustZone-Assisted TEE Systems.mp4
10.0 MB
IEEE Security and Privacy 2021/One Engine to Fuzz 'em All Generic Language Processor Testing with Semantic Validation.mp4
10.0 MB
IEEE Security and Privacy 2020/Meddling Middlemen Empirical Analysis of the Risks of Data-Saving Mobile Browsers.mp4
10.0 MB
IEEE Security and Privacy 2020/Formal Modelling and Proof in the CHERI Design and Implementation Process.mp4
10.0 MB
IEEE Security and Privacy 2020/A Programming Framework for Differential Privacy with Accuracy Concentration Bounds.mp4
10.0 MB
IEEE Security and Privacy 2021/Who is Real Bob Adversarial Attacks on Speaker Recognition Systems.mp4
9.9 MB
IEEE Security and Privacy 2020/Binsec Rel Efficient Relational Symbolic Execution for Constant-Time at Binary-Level.mp4
9.9 MB
IEEE Security and Privacy 2020/SoK Cyber Insurance - Technical Challenges and a System Security Roadmap.mp4
9.9 MB
IEEE Security and Privacy 2020/PMP Cost-Effective Forced Execution with Probabilistic Memory Pre-planning.mp4
9.9 MB
IEEE Security and Privacy 2021/Bookworm Game Automatic Discovery of LTE Vulnerabilities Through Documentation Analysis.mp4
9.7 MB
IEEE Security and Privacy 2021/Trouble Over-The-Air An Analysis of FOTA Apps in the Android Ecosystem.mp4
9.7 MB
IEEE Security and Privacy 2021/Adversary Instantiation Lower bounds for differentially private machine learning.mp4
9.7 MB
IEEE Security and Privacy 2020/Understanding and Mitigating Security Risks of General Messaging Protocols on IoT Clouds.mp4
9.6 MB
IEEE Security and Privacy 2022/Transfer Attacks Revisited A Large-Scale Empirical Study in Real Computer Vision Settings.mp4
9.6 MB
IEEE Security and Privacy 2022/IronMask Versatile Verification of Masking Security.mp4
9.5 MB
IEEE Security and Privacy 2020/JIT Leaks Inducing Timing Side Channels through Just-In-Time Compilation.mp4
9.5 MB
IEEE Security and Privacy 2020/SoK Differential Privacy as a Causal Property.mp4
9.5 MB
IEEE Security and Privacy 2021/NTFUZZ Enabling Type-Aware Kernel Fuzzing on Windows with Static Binary Analysis.mp4
9.5 MB
IEEE Security and Privacy 2021/HackEd A Pedagogical Analysis of Online Vulnerability Discovery Exercises.mp4
9.5 MB
IEEE Security and Privacy 2021/Hardware-Software Contracts for Secure Speculation.mp4
9.4 MB
IEEE Security and Privacy 2021/Systematic Analysis of Randomization-based Protected Cache Architectures.mp4
9.4 MB
IEEE Security and Privacy 2021/SoK Computer-Aided Cryptography.mp4
9.4 MB
IEEE Security and Privacy 2021/On the Just-In-Time Discovery of Profit-Generating Transactions in DeFi Protocols.mp4
9.4 MB
IEEE Security and Privacy 2020/IJON Exploring Deep State Spaces via Fuzzing.mp4
9.4 MB
IEEE Security and Privacy 2021/SmartPulse Automated Checking of Temporal Properties in Smart Contracts.mp4
9.4 MB
IEEE Security and Privacy 2021/Trust, But Verify A Longitudinal Analysis Of Android OEM Compliance and Customization.mp4
9.4 MB
IEEE Security and Privacy 2021/Is Private Learning Possible with Instance Encoding.mp4
9.4 MB
IEEE Security and Privacy 2015/Opening Remarks of the 2015 IEEE Symposium on Security & Privacy.mp4
9.3 MB
IEEE Security and Privacy 2020/This PIN Can Be Easily Guessed Analyzing the Security of Smartphone Unlock PINs.mp4
9.3 MB
IEEE Security and Privacy 2021/MAD-HTLC Because HTLC is Crazy-Cheap to Attack.mp4
9.2 MB
IEEE Security and Privacy 2021/Proactive Threshold Wallets with Offline Devices.mp4
9.1 MB
IEEE Security and Privacy 2021/CRYLOGGER Detecting Crypto Misuses Dynamically.mp4
9.0 MB
IEEE Security and Privacy 2020/Automatically Detecting Bystanders in Photos to Reduce Privacy Risks.mp4
9.0 MB
IEEE Security and Privacy 2021/High-Frequency Trading on Decentralized On-Chain Exchanges.mp4
9.0 MB
IEEE Security and Privacy 2021/Diogenes Lightweight Scalable RSA Modulus Generation with a Dishonest Majority.mp4
9.0 MB
IEEE Security and Privacy 2021/High-Assurance Cryptography in the Spectre Era.mp4
9.0 MB
IEEE Security and Privacy 2021/How Did That Get In My Phone Unwanted App Distribution on Android Devices.mp4
9.0 MB
IEEE Security and Privacy 2020/An Analysis of Pre-installed Android Software.mp4
9.0 MB
IEEE Security and Privacy 2021/Revealer Detecting and Exploiting Regular Expression Denial-of-Service Vulnerabilities.mp4
9.0 MB
IEEE Security and Privacy 2021/Black Widow Blackbox Data-driven Web Scanning.mp4
8.9 MB
IEEE Security and Privacy 2020/Message Time of Arrival Codes A Fundamental Primitive for Secure Distance Measurement.mp4
8.9 MB
IEEE Security and Privacy 2020/The Value of Collaboration in Convex Machine Learning with Differential Privacy.mp4
8.9 MB
IEEE Security and Privacy 2021/DIFUZZRTL Differential Fuzz Testing to Find CPU Bugs.mp4
8.8 MB
IEEE Security and Privacy 2020/Sync HotStuff Simple and Practical Synchronous State Machine Replication.mp4
8.6 MB
IEEE Security and Privacy 2020/RetroWrite Statically Instrumenting COTS Binaries for Fuzzing and Sanitization.mp4
8.6 MB
IEEE Security and Privacy 2020/SPIDER Enabling Fast Patch Propagation in Related Software Repositories.mp4
8.6 MB
IEEE Security and Privacy 2021/Runtime Recovery of Web Applications under Zero-Day ReDoS Attacks.mp4
8.6 MB
IEEE Security and Privacy 2020/Hijacking Transient Execution through Microarchitectural Load Value Injection..mp4
8.5 MB
IEEE Security and Privacy 2021/A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer.mp4
8.4 MB
IEEE Security and Privacy 2021/A2L Anonymous Atomic Locks for Scalability in Payment Channel Hubs.mp4
8.4 MB
IEEE Security and Privacy 2021/Zero Knowledge for Everything and Everyone Fast ZK Processor with Cached ORAM for ANSI C Programs.mp4
8.3 MB
IEEE Security and Privacy 2021/Proof-of-Learning Definitions and Practice.mp4
8.3 MB
IEEE Security and Privacy 2021/Detecting Filter List Evasion With Event-Loop-Turn Granularity JavaScript Signatures.mp4
8.3 MB
IEEE Security and Privacy 2021/CrawlPhish Large-scale Analysis of Client-side Cloaking Techniques in Phishing.mp4
8.3 MB
IEEE Security and Privacy 2021/Ebb-and-Flow Protocols A Resolution of the Availability-Finality Dilemma.mp4
8.2 MB
IEEE Security and Privacy 2020/Can Voters Detect Malicious Manipulation of Ballot Marking Devices.mp4
8.2 MB
IEEE Security and Privacy 2016/Opening Remarks of the 2016 IEEE Symposium on Security & Privacy.mp4
8.2 MB
IEEE Security and Privacy 2021/Invisible Probe Timing Attacks with PCIe Congestion Side-channel.mp4
8.1 MB
IEEE Security and Privacy 2021/Response-Hiding Encrypted Ranges Revisiting Security via Parametrized Leakage-Abuse Attacks.mp4
8.1 MB
IEEE Security and Privacy 2020/Towards Scalable Threshold Cryptosystems.mp4
7.9 MB
IEEE Security and Privacy 2019/PERUN Virtual Payment Hubs over Cryptographic Currencies.mp4
7.9 MB
IEEE Security and Privacy 2021/A Decentralized and Encrypted National Gun Registry.mp4
7.8 MB
IEEE Security and Privacy 2023/On the Evolution of (Hateful) Memes by Means of Multimodal Contrastive Learning.mp4
7.7 MB
IEEE Security and Privacy 2020/BIAS Bluetooth Impersonation AttackS.mp4
7.7 MB
IEEE Security and Privacy 2023/Leaking Arbitrarily Many Secrets Any-out-of-Many Proofs and Applications to RingCT Protocols.mp4
7.6 MB
IEEE Security and Privacy 2023/On The Empirical Effectiveness of Unrealistic Adversarial Hardening Against Realistic Attacks.mp4
7.5 MB
IEEE Security and Privacy 2021/Pegasus Bridging Polynomial and Non-polynomial Evaluations in Homomorphic Encryption.mp4
7.5 MB
IEEE Security and Privacy 2021/Manipulation Attacks in Local Differential Privacy.mp4
7.4 MB
IEEE Security and Privacy 2021/BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures.mp4
7.3 MB
IEEE Security and Privacy 2021/SGUARD Smart Contracts Made Vulnerability-Free.mp4
7.0 MB
IEEE Security and Privacy 2021/Journey to the Center of the Cookie Ecosystem Unraveling Actors' Roles and Relationships.mp4
6.9 MB
IEEE Security and Privacy 2019/Tap 'n Ghost A Compilation of Novel Attack Techniques against Smartphone Touchscreens.mp4
6.8 MB
IEEE Security and Privacy 2021/DIANE Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices.mp4
6.5 MB
IEEE Security and Privacy 2019/IEEE S&P 2019 - Awards Ceremony.mp4
4.2 MB
IEEE Security and Privacy 2019/Neural Cleanse Identifying and Mitigating Backdoor Attacks in Neural Networks.mp4
1.7 MB
IEEE Security and Privacy 2016/NITRD Panel - Federal Cybersecurity and Privacy R&D Strategic Plans.eng.srt
183.3 kB
IEEE Security and Privacy 2022/LangSec Keynote Trojan Source and Bad Characters Invisible Hacks and Reluctant Patching.srt
137.6 kB
IEEE Security and Privacy 2019/IEEE S&P 2019 - 40th Celebration Plenary Session Panel Reflections on four decades of the symposium.eng.srt
108.4 kB
IEEE Security and Privacy 2016/S&P TC Business Meeting.eng.srt
100.7 kB
IEEE Security and Privacy 2022/IEEE S&P 2022 Opening Session.srt
92.1 kB
IEEE Security and Privacy 2023/IEEE S&P 2023 Short Talks.eng.srt
81.1 kB
IEEE Security and Privacy 2015/CHERI - A Hybrid Capability-System Architecture for Scalable Software Compartmentalization.eng.srt
79.1 kB
IEEE Security and Privacy 2017/SoK - Science, Security, and the Elusive Goal of Security as a Scientific Pursuit.eng.srt
77.2 kB
IEEE Security and Privacy 2018/Routing Around Congestion - Defeating DDoS Attacks and Adverse Network Conditions via Reactive....eng.srt
75.2 kB
IEEE Security and Privacy 2017/Cloak and Dagger - From Two Permissions to Complete Control of the UI Feedback Loop.eng.srt
73.8 kB
IEEE Security and Privacy 2015/On Subnormal Floating Point and Abnormal Timing.eng.srt
71.3 kB
IEEE Security and Privacy 2017/Towards Evaluating the Robustness of Neural Networks.eng.srt
69.5 kB
IEEE Security and Privacy 2016/A2 - Analog Malicious Hardware.eng.srt
69.2 kB
IEEE Security and Privacy 2017/Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate.eng.srt
67.8 kB
IEEE Security and Privacy 2016/A Practical Oblivious Map Data Structure with Secure Deletion and History Independence.eng.srt
67.6 kB
IEEE Security and Privacy 2018/Computer Security and Privacy for Refugees in the United States.eng.srt
66.5 kB
IEEE Security and Privacy 2018/Double-efficient zkSNARKs Without Trusted Setup.eng.srt
66.0 kB
IEEE Security and Privacy 2018/Protecting the Stack with Metadata Policies and Tagged Hardware.eng.srt
65.9 kB
IEEE Security and Privacy 2015/SoK - Research Perspectives and Challenges for Bitcoin and Cryptocurrencies.eng.srt
65.8 kB
IEEE Security and Privacy 2019/IEEE S&P 2019 - TC Business Meeting.eng.srt
65.6 kB
IEEE Security and Privacy 2018/EnclaveDB - A Secure Database using SGX.eng.srt
65.4 kB
IEEE Security and Privacy 2018/The Cards Aren't Alright - Detecting Counterfeit Gift Cards Using Encoding Jitter.eng.srt
65.4 kB
IEEE Security and Privacy 2018/Hackers vs. Testers - A Comparison of Software Vulnerability Discovery Processes.eng.srt
64.4 kB
IEEE Security and Privacy 2016/Verifiable ASICs.eng.srt
64.3 kB
IEEE Security and Privacy 2016/Data-Oriented Programming - On the Expressiveness of Non-Control Data Attacks.eng.srt
64.2 kB
IEEE Security and Privacy 2016/TriggerScope - Towards Detecting Logic Bombs in Android Applications.eng.srt
64.1 kB
IEEE Security and Privacy 2016/The Cracked Cookie Jar - HTTP Cookie Hijacking and the Exposure of Private Information.eng.srt
64.1 kB
IEEE Security and Privacy 2015/Riposte - An Anonymous Messaging System Handling Millions of Users.eng.srt
63.9 kB
IEEE Security and Privacy 2015/Ad Injection at Scale - Assessing Deceptive Advertisement Modifications.eng.srt
63.4 kB
IEEE Security and Privacy 2016/LAVA - Large-scale Automated Vulnerability Addition.eng.srt
63.1 kB
IEEE Security and Privacy 2015/Missing the Point(er) - On the Effectiveness of Code Pointer Integrity.eng.srt
62.9 kB
IEEE Security and Privacy 2018/Another Flip in the Wall of Rowhammer Defenses.eng.srt
62.2 kB
IEEE Security and Privacy 2018/Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels.eng.srt
61.6 kB
IEEE Security and Privacy 2018/Enumerating Active IPv6 Hosts for Large-scale Security Scans via DNSSEC-signed Reverse Zones.eng.srt
61.5 kB
IEEE Security and Privacy 2018/When Your Fitness Tracker Betrays You - Quantifying the Predictability....eng.srt
61.5 kB
IEEE Security and Privacy 2018/Towards Security and Privacy for Multi User Augmented Reality.eng.srt
61.1 kB
IEEE Security and Privacy 2017/Scalable Bias-Resistant Distributed Randomness.eng.srt
60.6 kB
IEEE Security and Privacy 2016/Keeping Authorities - Honest or Bust - with Decentralized Witness Cosigning.eng.srt
60.4 kB
IEEE Security and Privacy 2018/Blue Note - How Intentional Acoustic Interference Damages Availablity and Integrity -.eng.srt
60.4 kB
IEEE Security and Privacy 2017/A Lustrum of Malware Network Communication - Evolution and Insights.eng.srt
60.3 kB
IEEE Security and Privacy 2017/SoK - Cryptographically Protected Database Search.eng.srt
59.7 kB
IEEE Security and Privacy 2015/Geppetto - Versatile Verifiable Computation.eng.srt
58.9 kB
IEEE Security and Privacy 2017/IKP - Turning a PKI Around with Decentralized Automated Incentives.eng.srt
58.8 kB
IEEE Security and Privacy 2018/PIR with Compressed Queries and Amortized Query Processing.eng.srt
58.8 kB
IEEE Security and Privacy 2018/Bulletproofs - Short Proofs for Confidential Transactions and More.eng.srt
58.7 kB
IEEE Security and Privacy 2017/HVLearn - Automated Black-box Analysis of Hostname Verification in SSL TLS Implementations.eng.srt
58.7 kB
IEEE Security and Privacy 2015/Virtual Proofs of Reality and their Physical Implementation.eng.srt
58.6 kB
IEEE Security and Privacy 2017/Is Interaction Necessary for Distributed Private Learning.eng.srt
58.5 kB
IEEE Security and Privacy 2018/A Formal Treatment of Accountable Proxying over TLS.eng.srt
58.5 kB
IEEE Security and Privacy 2017/Catena - Efficient Non-equivocation via Bitcoin.eng.srt
58.3 kB
IEEE Security and Privacy 2017/Norax - Enabling Execute-Only Memory for COTS Binaries on AArch64.eng.srt
58.2 kB
IEEE Security and Privacy 2018/Tracking Ransomware End-to-end.eng.srt
57.8 kB
IEEE Security and Privacy 2016/Helping Johnny to Analyze Malware - A Usability-Optimized Decompiler and Malware Analysis User Study.eng.srt
57.7 kB
IEEE Security and Privacy 2017/Hardening Java's Access Control by Abolishing Implicit Privilege Elevation.eng.srt
57.5 kB
IEEE Security and Privacy 2016/Beauty and the Beast - Diverting modern web browsers to build unique browser fingerprints.eng.srt
57.4 kB
IEEE Security and Privacy 2017/Spotless Sandboxes - Evading Malware Analysis Systems using Wear-and-Tear Artifacts.eng.srt
57.3 kB
IEEE Security and Privacy 2017/Backward-bounded DSE - Targeting Infeasibility Questions on Obfuscated Codes.eng.srt
57.1 kB
IEEE Security and Privacy 2017/Securing Augmented Reality Output.eng.srt
56.9 kB
IEEE Security and Privacy 2015/How Secure and Quick is QUIC Provable Security and Performance Analyses.eng.srt
56.8 kB
IEEE Security and Privacy 2018/Enabling Autonomous IoT Device Pairing using Different Sensor Types.eng.srt
56.7 kB
IEEE Security and Privacy 2017/From Trash to Treasure - Timing-Sensitive Garbage Collection.eng.srt
56.6 kB
IEEE Security and Privacy 2018/xJsnark - A Framework for Efficient Verifiable Computation.eng.srt
56.5 kB
IEEE Security and Privacy 2017/Pyramid - Enhancing Selectivity in Big Data Protection with Count Featurization.eng.srt
56.4 kB
IEEE Security and Privacy 2015/A Messy State of the Union - Taming the Composite State Machines of TLS.eng.srt
56.3 kB
IEEE Security and Privacy 2016/Hawk - The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts.eng.srt
55.8 kB
IEEE Security and Privacy 2018/Learning from Mutants - Using Code Mutation to Learn and Monitor Invariants of a CPS.eng.srt
55.8 kB
IEEE Security and Privacy 2016/Security Analysis of Emerging Smart Home Applications.eng.srt
55.4 kB
IEEE Security and Privacy 2017/Leakage-Abuse Attacks on Order-Revealing Encryption.eng.srt
55.4 kB
IEEE Security and Privacy 2016/Synthesizing Plausible Privacy-Preserving Location Traces.eng.srt
55.3 kB
IEEE Security and Privacy 2017/How They Did It - An Analysis of Emission Defeat Devices in Modern Automobiles.eng.srt
55.0 kB
IEEE Security and Privacy 2018/Tracking Certificate Misissuance in the Wild.eng.srt
55.0 kB
IEEE Security and Privacy 2018/vRAM - Faster Verifiable RAM With Program-Independent Preprocessing.eng.srt
54.9 kB
IEEE Security and Privacy 2015/The Miner's Dilemma.eng.srt
54.7 kB
IEEE Security and Privacy 2016/SoK - Everyone Hates Robocalls - A Survey of Techniques against Telephone Spam.eng.srt
54.6 kB
IEEE Security and Privacy 2015/GenoGuard - Protecting Genomic Data against Brute-Force Attacks.eng.srt
54.0 kB
IEEE Security and Privacy 2015/Program-Adaptive Mutational Fuzzing.eng.srt
54.0 kB
IEEE Security and Privacy 2015/VC3 - Trustworthy Data Analytics in the Cloud Using SGX.eng.srt
53.9 kB
IEEE Security and Privacy 2018/Understanding Linux Malware.eng.srt
53.8 kB
IEEE Security and Privacy 2016/CaSE - Cache-Assisted Secure Execution on ARM Processors.eng.srt
53.8 kB
IEEE Security and Privacy 2016/Algorithmic Transparency via Quantitative Input Influence ....eng.srt
53.8 kB
IEEE Security and Privacy 2018/Grand Pwning Unit - Accelerating Microarchitectural Attacks with the GPU.eng.srt
53.7 kB
IEEE Security and Privacy 2017/SymCerts - Practical Symbolic Execution For Exposing Noncompliance in X.509 Certificate Validation.eng.srt
53.6 kB
IEEE Security and Privacy 2016/Back in Black - Towards Formal, Black Box Analysis of Sanitizers and Filters.eng.srt
53.5 kB
IEEE Security and Privacy 2015/Counterfeit Object-oriented Programming.eng.srt
53.5 kB
IEEE Security and Privacy 2015/Privacy and Access Control for Outsourced Personal Records.eng.srt
53.5 kB
IEEE Security and Privacy 2017/Hijacking Bitcoin - Routing Attacks on Cryptocurrencies.eng.srt
53.3 kB
IEEE Security and Privacy 2017/SmarPer - Context-Aware and Automatic Runtime-Permissions for Mobile Devices - YouTube.eng.srt
53.3 kB
IEEE Security and Privacy 2018/Opening Remarks of the 39th IEEE Symposium on Security & Privacy.eng.srt
53.1 kB
IEEE Security and Privacy 2018/Privacy Risks with Facebook's PII-based Targeting.eng.srt
53.0 kB
IEEE Security and Privacy 2022/Membership inference attacks from first principles.srt
53.0 kB
IEEE Security and Privacy 2015/Last-Level Cache Side-Channel Attacks are Practical.eng.srt
52.8 kB
IEEE Security and Privacy 2017/Protecting Bare-metal Embedded Systems with Privilege Overlays.eng.srt
52.8 kB
IEEE Security and Privacy 2018/Distance-Bounding Protocols - Verification without Time and Location.eng.srt
52.7 kB
IEEE Security and Privacy 2017/Comparing the Usability of Cryptographic APIs.eng.srt
52.7 kB
IEEE Security and Privacy 2017/SoK - Exploiting Network Printers.eng.srt
52.6 kB
IEEE Security and Privacy 2018/SoK - Keylogging Side Channels.eng.srt
52.5 kB
IEEE Security and Privacy 2015/Forward Secure Asynchronous Messaging from Puncturable Encryption.eng.srt
52.4 kB
IEEE Security and Privacy 2016/Shreds - Fine-grained Execution Units with Private Memory.eng.srt
52.4 kB
IEEE Security and Privacy 2016/Following Devil's Footprints - Cross-Platform Analysis of Potentially Harmful Libraries ....eng.srt
52.2 kB
IEEE Security and Privacy 2016/pASSWORD tYPOS and How to Correct Them Securely.eng.srt
52.1 kB
IEEE Security and Privacy 2018/The Rise of the Citizen Developer - Assessing the Security Impact of Online App Generators.eng.srt
51.8 kB
IEEE Security and Privacy 2016/You Get Where You're Looking For - The Impact Of Information Sources On Code Security.eng.srt
51.8 kB
IEEE Security and Privacy 2015/Cross-Architecture Bug Search in Binary Executables.eng.srt
51.6 kB
IEEE Security and Privacy 2018/Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage.eng.srt
51.6 kB
IEEE Security and Privacy 2017/NEZHA - Efficient Domain-independent Differential Testing.eng.srt
51.6 kB
IEEE Security and Privacy 2017/A Framework for Universally Composable Diffie-Hellman Key Exchange.eng.srt
51.5 kB
IEEE Security and Privacy 2018/Speechless - Analyzing the Threat to Speech Privacy from Smartphone Motion Sensors.eng.srt
51.4 kB
IEEE Security and Privacy 2017/Finding and Preventing Bugs in JavaScript Bindings.eng.srt
51.3 kB
IEEE Security and Privacy 2018/On Enforcing the Digital Immunity of a Large Humanitarian Organization.eng.srt
51.3 kB
IEEE Security and Privacy 2015/ADSNARK - Nearly Practical and Privacy-Preserving Proofs on Authenticated Data.eng.srt
51.1 kB
IEEE Security and Privacy 2015/Micro-Policies - Formally Verified, Tag-Based Security Monitors.eng.srt
51.1 kB
IEEE Security and Privacy 2018/On the Economics of Offline Password Cracking.eng.srt
50.9 kB
IEEE Security and Privacy 2016/Prepose - Privacy, Security, and Reliability for Gesture-Based Programming.eng.srt
50.9 kB
IEEE Security and Privacy 2018/FP-Stalker - Tracking Browser Fingerprint Evolutions - Antoine Vastel.eng.srt
50.8 kB
IEEE Security and Privacy 2016/On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud.eng.srt
50.8 kB
IEEE Security and Privacy 2017/Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping.eng.srt
50.6 kB
IEEE Security and Privacy 2017/IoT Goes Nuclear - Creating a Zigbee Chain Reaction.eng.srt
50.5 kB
IEEE Security and Privacy 2017/One TPM to Bind Them All - Fixing TPM2.0 for Provably Secure Anonymous Attestation.eng.srt
50.5 kB
IEEE Security and Privacy 2022/Security Foundations for Application-Based Covert Communication Channels.srt
50.4 kB
IEEE Security and Privacy 2017/Optimized Honest-Majority MPC for Malicious Adversaries - Breaking 1 Billion-Gate Second Barrier.eng.srt
50.3 kB
IEEE Security and Privacy 2015/S$A - A Shared Cache Attack That Works across Cores and Defies VM Sandboxing ....eng.srt
50.2 kB
IEEE Security and Privacy 2016/Return to the Zombie Gadgets - Undermining Destructive Code Reads via Code-Inference Attacks.eng.srt
50.2 kB
IEEE Security and Privacy 2018/A Tale of Two Studies - The Best and Worst of YubiKey Usability.eng.srt
50.1 kB
IEEE Security and Privacy 2018/Manipulating Machine Learning - Poisoning Attacks & Countermeasures.eng.srt
50.1 kB
IEEE Security and Privacy 2018/Oblix - An Efficient Oblivious Search Index.eng.srt
49.9 kB
IEEE Security and Privacy 2016/MitM Attack by Name Collision - Cause Analysis and Vulnerability Assessment in the New gTLD Era.eng.srt
49.8 kB
IEEE Security and Privacy 2017/Identifying Personal DNA Methylation Profiles by Genotype Inference.eng.srt
49.7 kB
IEEE Security and Privacy 2017/vSQL - Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases.eng.srt
49.4 kB
IEEE Security and Privacy 2016/Distillation as a Defense to Adversarial Perturbations against Deep Neural Networks.eng.srt
49.2 kB
IEEE Security and Privacy 2022/Evaluating Physical-Layer BLE Location Tracking Attacks on Mobile Devices.srt
49.2 kB
IEEE Security and Privacy 2018/Implementing Conjunction Obfuscation under Entropic Ring LWE.eng.srt
48.8 kB
IEEE Security and Privacy 2022/Invisible Finger Practical Electromagnetic Interference Attack on Touchscreen Electronic Devices.srt
48.7 kB
IEEE Security and Privacy 2015/Malicious-Client Security in Blind Seer - A Scalable Private DBMS.eng.srt
48.6 kB
IEEE Security and Privacy 2016/HDFI - Hardware-Assisted Data-Flow Isolation.eng.srt
48.6 kB
IEEE Security and Privacy 2016/Users Really Do Plug in USB Drives They Find.eng.srt
48.5 kB
IEEE Security and Privacy 2015/Bitcoin over Tor isn't a Good Idea.eng.srt
48.3 kB
IEEE Security and Privacy 2017/XHOUND - Quantifying the Fingerprintability of Browser Extensions.eng.srt
48.1 kB
IEEE Security and Privacy 2018/Mobile Application Web API Reconnaissance.eng.srt
48.1 kB
IEEE Security and Privacy 2015/What the App is That Deception and Countermeasures in the Android User Interface.eng.srt
47.9 kB
IEEE Security and Privacy 2015/Post-Quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors Problem.eng.srt
47.9 kB
IEEE Security and Privacy 2022/HardLog Practical Tamper-Proof System Auditing Using a Novel Audit Device.srt
47.4 kB
IEEE Security and Privacy 2018/FuturesMEX - Secure, Distributed Futures Market Exchange.eng.srt
47.1 kB
IEEE Security and Privacy 2018/A Machine Learning Approach to Prevent Malicious Calls Over Telephony Networks.eng.srt
47.0 kB
IEEE Security and Privacy 2017/Stack Overflow Considered Harmful -- The Impact of Copy&Paste on Android Application Security.eng.srt
47.0 kB
IEEE Security and Privacy 2016/Domain-Z - 28 Registrations Later.eng.srt
46.9 kB
IEEE Security and Privacy 2018/Sonar - Detecting SS7 Redirection Attacks With Audio-Based Distance Bounding.eng.srt
46.9 kB
IEEE Security and Privacy 2017/Obstacles to the Adoption of Secure Communication Tools.eng.srt
46.7 kB
IEEE Security and Privacy 2015/Temporal Lensing and Its Application in Pulsing Denial-of-Service Attacks.eng.srt
46.7 kB
IEEE Security and Privacy 2018/SoK - Plug & Pray - Today - Understanding USB Insecurity in Versions 1 through C.eng.srt
46.3 kB
IEEE Security and Privacy 2022/CirC Compiler infrastructure for proof systems, software verification, and more.srt
46.2 kB
IEEE Security and Privacy 2017/CoSMeDis - A Distributed Social Media Platform with Formally Verified Confidentiality Guarantees.eng.srt
46.2 kB
IEEE Security and Privacy 2017/VUDDY - A Scalable Approach for Vulnerable Code Clone Discovery.eng.srt
46.2 kB
IEEE Security and Privacy 2015/ObliVM - A Programming Framework for Secure Computation.eng.srt
46.0 kB
IEEE Security and Privacy 2016/Cinderella - Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with ....eng.srt
46.0 kB
IEEE Security and Privacy 2019/Spectre Attacks Exploiting Speculative Execution.eng.srt
45.9 kB
IEEE Security and Privacy 2017/Side-Channel Attacks on Shared Search Indexes.eng.srt
45.9 kB
IEEE Security and Privacy 2016/Key Confirmation in Key Exchange - A Formal Treatment and Implications for TLS 1.3.eng.srt
45.9 kB
IEEE Security and Privacy 2015/Every Second Counts - Quantifying the Negative Externalities of Cybercrime via Typosquatting.eng.srt
45.9 kB
IEEE Security and Privacy 2022/Measuring and Mitigating the Risk of IP Reuse on Public Clouds.srt
45.8 kB
IEEE Security and Privacy 2022/Asleep at the Keyboard Assessing the Security of GitHub Copilot's Code Contributions.srt
45.8 kB
IEEE Security and Privacy 2017/SecureML - A System for Scalable Privacy-Preserving Machine Learning.eng.srt
45.8 kB
IEEE Security and Privacy 2018/Stealing Hyperparameters in Machine Learning.eng.srt
45.7 kB
IEEE Security and Privacy 2022/TASHAROK-Using Mechanism Design for Enhancing Security Resource Allocation in Interdependent Systems.srt
45.7 kB
IEEE Security and Privacy 2017/CRLite - A Scalable System for Pushing All TLS Revocations to All Browsers.eng.srt
45.6 kB
IEEE Security and Privacy 2016/SoK - (State of) The Art of War - Offensive Techniques in Binary Analysis.eng.srt
45.6 kB
IEEE Security and Privacy 2017/Augur - Internet-Wide Detection of Connectivity Disruptions.eng.srt
45.5 kB
IEEE Security and Privacy 2015/Effective Real-Time Android Application Auditing.eng.srt
45.5 kB
IEEE Security and Privacy 2018/Anonymity Trilemma - Strong Anonymity, Low Bandwidth Overhead, Low Latency -- Choose Two.eng.srt
45.4 kB
IEEE Security and Privacy 2018/Study and Mitigation of Origin Stripping Vulnerabilities in Hybrid-postMessage Enabled Mobile Apps.eng.srt
45.1 kB
IEEE Security and Privacy 2022/Domains Do Change Their Spots Quantifying Potential Abuse of Residual Trust.srt
45.0 kB
IEEE Security and Privacy 2022/Automated Attack Synthesis by Extracting Finite State Machines from Protocol Specification Documents.srt
44.8 kB
IEEE Security and Privacy 2019/New Primitives for Actively-Secure MPC over Rings with Applications to Private Machine Learning.eng.srt
44.7 kB
IEEE Security and Privacy 2022/SoK Social Cybersecurity.srt
44.6 kB
IEEE Security and Privacy 2016/PhotoProof - Cryptographic Image Authentication for Any Set of Permissible Transformations.eng.srt
44.5 kB
IEEE Security and Privacy 2016/SoK - Towards Grounding Censorship Circumvention in Empiricism.eng.srt
44.5 kB
IEEE Security and Privacy 2016/Cache Storage Channels - Alias-Driven Attacks and Verified Countermeasures.eng.srt
44.5 kB
IEEE Security and Privacy 2018/T-Fuzz Fuzzing by Program Transformation - Hui Peng.eng.srt
44.5 kB
IEEE Security and Privacy 2016/Automated Analysis and Verification of TLS 1.3 - 0-RTT, Resumption and Delayed Authentication.eng.srt
44.5 kB
IEEE Security and Privacy 2022/SwarmFlawFinder Discovering and Exploiting Logic Flaws of Swarm Algorithms.srt
44.4 kB
IEEE Security and Privacy 2019/Fidelius Protecting User Secrets from Compromised Browsers.eng.srt
44.4 kB
IEEE Security and Privacy 2015/A Generic Approach to Automatic Deobfuscation of Executable Code.eng.srt
44.3 kB
IEEE Security and Privacy 2019/Full speed Fuzzing Reducing Fuzzing Overhead through Coverage-guided Tracing.eng.srt
44.1 kB
IEEE Security and Privacy 2022/SpecHammer Combining Spectre and Rowhammer for New Speculative Attacks.srt
44.0 kB
IEEE Security and Privacy 2015/Using Hardware Features for Increased Debugging Transparency.eng.srt
43.9 kB
IEEE Security and Privacy 2022/Wobfuscator Obfuscating JavaScript Malware via Opportunistic Translation to WebAssembly.srt
43.8 kB
IEEE Security and Privacy 2017/Counter-RAPTOR - Safeguarding Tor Against Active Routing Attacks.eng.srt
43.8 kB
IEEE Security and Privacy 2022/Mitigating Information Leakage Vulnerabilities with Type-based Data Isolation.srt
43.7 kB
IEEE Security and Privacy 2017/Your Exploit is Mine - Automatic Shellcode Transplant for Remote Exploits.eng.srt
43.6 kB
IEEE Security and Privacy 2018/EyeTell - Video-Assisted Touchscreen Keystroke Inference from Eye Movements.eng.srt
43.4 kB
IEEE Security and Privacy 2015/SurroundWeb - Mitigating Privacy Concerns in a 3D Web Browser.eng.srt
43.4 kB
IEEE Security and Privacy 2022/Privacy-from-Birth Protecting Sensed Data from Malicious Sensors with VERSA.srt
43.4 kB
IEEE Security and Privacy 2022/Phishing in Organizations Findings from a Large-Scale and Long-Term Study.srt
43.4 kB
IEEE Security and Privacy 2016/Multiple Handshakes Security of TLS 1.3 Candidates.eng.srt
43.3 kB
IEEE Security and Privacy 2017/An Experimental Security Analysis of an Industrial Robot Controller.eng.srt
43.1 kB
IEEE Security and Privacy 2017/To Catch a Ratter - Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild.eng.srt
43.0 kB
IEEE Security and Privacy 2022/Bad Characters Imperceptible NLP Attacks.srt
43.0 kB
IEEE Security and Privacy 2018/Racing in Hyperspace - Closing Hyper Threading Side Channels on SGX.eng.srt
42.8 kB
IEEE Security and Privacy 2015/High System-Code Security with Low Overhead.eng.srt
42.7 kB
IEEE Security and Privacy 2016/Talos - Neutralizing Vulnerabilities with Security Workarounds for Rapid Response.eng.srt
42.7 kB
IEEE Security and Privacy 2018/Impossibility of Precise and Sound Termination-Sensitive Security Enforcements.eng.srt
42.7 kB
IEEE Security and Privacy 2016/A Method for Verifying Privacy-Type Properties - The Unbounded Case.eng.srt
42.6 kB
IEEE Security and Privacy 2017/Machine-Checked Proofs of Privacy for Electronic Voting Protocols.eng.srt
42.5 kB
IEEE Security and Privacy 2022/Delay Wreaks Havoc on Your Smart Home Delay-based Automation Interference Attacks.srt
42.5 kB
IEEE Security and Privacy 2017/Membership Inference Attacks against Machine Learning Models.eng.srt
42.5 kB
IEEE Security and Privacy 2018/Static Evaluation of Noninterference using Approximate Model Counting.eng.srt
42.4 kB
IEEE Security and Privacy 2022/Reconstructing Training Data with Informed Adversaries.srt
42.2 kB
IEEE Security and Privacy 2022/Investigating Influencer VPN Ads on YouTube.srt
42.1 kB
IEEE Security and Privacy 2015/Readactor - Practical Code Randomization Resilient to Memory Disclosure.eng.srt
42.0 kB
IEEE Security and Privacy 2017/SysPal System-guided Pattern Locks for Android.eng.srt
41.9 kB
IEEE Security and Privacy 2016/TaoStore - Overcoming Asynchronicity in Oblivious Data Storage.eng.srt
41.8 kB
IEEE Security and Privacy 2018/FPGA-Based Remote Power Side-Channel Attacks.eng.srt
41.7 kB
IEEE Security and Privacy 2022/They're not that hard to mitigate -What Cryptographic Library Developers Think About Timing Attacks.srt
41.5 kB
IEEE Security and Privacy 2019/True2F Backdoor resistant authentication tokens Emma Dauterman.eng.srt
41.5 kB
IEEE Security and Privacy 2019/PhishFarm A Scalable Framework for Measuring the Effectivness of Evasion Techniques Against....eng.srt
41.4 kB
IEEE Security and Privacy 2018/DEEPSEC - Deciding Equivalence Properties in Security Protocols - Theory and Practice.eng.srt
41.3 kB
IEEE Security and Privacy 2018/Surveylance - Automatically Detecting Online Survey Scams.eng.srt
41.3 kB
IEEE Security and Privacy 2015/The Attack of the Clones - A Study of the Impact of Shared Code on Vulnerability Patching.eng.srt
41.2 kB
IEEE Security and Privacy 2022/De-Identification's Impact on Minority Representation and Privacy Preservation in the US Census.srt
40.9 kB
IEEE Security and Privacy 2022/Scraping Sticky Leftovers App User Information Left on Servers After Account Deletion.srt
40.9 kB
IEEE Security and Privacy 2022/mmSpy Spying Phone Calls using mmWave Radars.srt
40.8 kB
IEEE Security and Privacy 2015/Controlled-Channel Attacks - Deterministic Side Channels for Untrusted Operating Systems.eng.srt
40.7 kB
IEEE Security and Privacy 2015/Leave Me Alone - App-Level Protection against Runtime Information Gathering on Android.eng.srt
40.7 kB
IEEE Security and Privacy 2022/How Does Usable Security Not End Up in Software Products Results From a Qualitative Interview Study.srt
40.6 kB
IEEE Security and Privacy 2017/Verifying and Synthesizing Constant-Resource Implementations with Types.eng.srt
40.6 kB
IEEE Security and Privacy 2016/Inferring User Routes and Locations using Zero-Permission Mobile Sensors.eng.srt
40.5 kB
IEEE Security and Privacy 2022/Practical Asynchronous Distributed Key Generation.srt
40.5 kB
IEEE Security and Privacy 2022/Peekaboo A Hub-Based Approach to Enable Transparency in Data Processing within Smart Homes.srt
40.5 kB
IEEE Security and Privacy 2019/Should I Worry A Cross Cultural Examination of Account Security Incident Response.eng.srt
40.4 kB
IEEE Security and Privacy 2015/Vetting SSL Usage in Applications with SSLINT.eng.srt
40.2 kB
IEEE Security and Privacy 2015/Protecting Private Keys against Memory Disclosure Attacks Using Hardware Transactional Memory.eng.srt
40.1 kB
IEEE Security and Privacy 2015/Understanding and Monitoring Embedded Web Scripts.eng.srt
40.1 kB
IEEE Security and Privacy 2022/Cats vs. Spectre An Axiomatic Approach to Modeling Speculative Execution Attacks.srt
39.8 kB
IEEE Security and Privacy 2022/DeepSteal Advanced Model Extractions Leveraging Efficient Weight Stealing in Memories.srt
39.7 kB
IEEE Security and Privacy 2022/Finding and Exploiting CPU Features using MSR Templating.srt
39.6 kB
IEEE Security and Privacy 2022/How Not to Protect Your IP - An Industry-Wide Break of IEEE 1735 Implementations.srt
39.5 kB
IEEE Security and Privacy 2022/Spiral Fast, High-Rate Single-Server PIR via FHE Composition.srt
39.5 kB
IEEE Security and Privacy 2022/Private Nearest Neighbor Search with Sublinear Communication and Malicious Security.srt
39.5 kB
IEEE Security and Privacy 2022/Using Throughput-Centric Byzantine Broadcast to Tolerate Malicious Majority in Blockchains.srt
39.5 kB
IEEE Security and Privacy 2023/Examining Zero-Shot Vulnerability Repair with Large Language Models.eng.srt
39.5 kB
IEEE Security and Privacy 2022/The Experts' Insights on the Peer Review Process of Evaluating Security Papers.srt
39.4 kB
IEEE Security and Privacy 2022/ZeeStar Private Smart Contracts by Homomorphic Encryption and Zero-knowledge Proofs.srt
39.2 kB
IEEE Security and Privacy 2015/Towards Making Systems Forget with Machine Unlearning.eng.srt
39.1 kB
IEEE Security and Privacy 2022/A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP.srt
39.1 kB
IEEE Security and Privacy 2022/TROLLMAGNIFIER Detecting State-Sponsored Troll Accounts on Reddit.srt
39.1 kB
IEEE Security and Privacy 2022/WtaGraph Web Tracking and Advertising Detection using Graph Neural Networks.srt
39.0 kB
IEEE Security and Privacy 2019/Dominance as a New Trusted Computing Primitive for the IoT.eng.srt
39.0 kB
IEEE Security and Privacy 2022/MatRiCT More Efficient Post-Quantum Private Blockchain Payments.srt
39.0 kB
IEEE Security and Privacy 2022/BEACON - Directed Grey-Box Fuzzing with Provable Path Pruning.srt
38.9 kB
IEEE Security and Privacy 2018/Compiler-assisted Code Randomization.eng.srt
38.9 kB
IEEE Security and Privacy 2019/Iodine Fast Dynamic Tain't Tracking Using Rollback free Optimistic Hybrid Analysis.eng.srt
38.7 kB
IEEE Security and Privacy 2022/Sphinx Enabling Privacy-Preserving Online Learning over the Cloud.srt
38.5 kB
IEEE Security and Privacy 2022/Waldo A Private Time-Series Database from Function Secret-Sharing.srt
38.5 kB
IEEE Security and Privacy 2022/Back to the Drawing Board A Critical Evaluation of Poisoning Attacks on Federated Learning.srt
38.4 kB
IEEE Security and Privacy 2022/Anti-Tamper Radio System-Level Tamper Detection for Computing Systems.srt
38.3 kB
IEEE Security and Privacy 2017/IVD - Automatic Learning and Enforcement of Authorization Rules in Online Social Networks - YouTube.eng.srt
38.2 kB
IEEE Security and Privacy 2019/RIDL Rogue In-Flight Data Load.eng.srt
38.2 kB
IEEE Security and Privacy 2015/TinyGarble - Highly Compressed and Scalable Sequential Garbled Circuits.eng.srt
38.1 kB
IEEE Security and Privacy 2019/Postcards from the Post HTTP World Amplification of HTTPS Vulnerabilities in the Web Ecosystem.eng.srt
38.0 kB
IEEE Security and Privacy 2022/SAILFISH Vetting Smart Contract State-Inconsistency Bugs in Seconds.srt
38.0 kB
IEEE Security and Privacy 2022/IRShield A Countermeasure Against Adversarial Physical-Layer Wireless Sensing.srt
38.0 kB
IEEE Security and Privacy 2017/Multi-touch Authentication Using Hand Geometry and Behavioral Information.eng.srt
37.9 kB
IEEE Security and Privacy 2022/vSGX Virtualizing SGX Enclaves on AMD SEV.srt
37.9 kB
IEEE Security and Privacy 2019/Proof Of Stake Sidechains.eng.srt
37.9 kB
IEEE Security and Privacy 2018/Angora - Efficient Fuzzing by Principled Search.eng.srt
37.9 kB
IEEE Security and Privacy 2019/Formally Verified Cryptographic Web Applications in WebAssembly.eng.srt
37.8 kB
IEEE Security and Privacy 2022/BadEncoder Backdoor Attacks to Pre-trained Encoders in Self-Supervised Learning.srt
37.8 kB
IEEE Security and Privacy 2021/SoK An Overview of FHE Compilers and Tools.eng.srt
37.7 kB
IEEE Security and Privacy 2022/Blacksmith Compromising Target Row Refresh by Rowhammering in the Frequency Domain.srt
37.7 kB
IEEE Security and Privacy 2022/Transcending TRANSCEND Revisiting Malware Classification in the Presence of Concept Drift.srt
37.6 kB
IEEE Security and Privacy 2022/PCR-Auth Solving Authentication Puzzle Challenges with Encoded Palm Contact Responses.srt
37.5 kB
IEEE Security and Privacy 2022/Desperate Times Call for Desperate Measures - User Concerns with Mobile Loan Apps in Kenya.srt
37.4 kB
IEEE Security and Privacy 2022/Heapster Analyzing the Security of Dynamic Allocators for Monolithic Firmware Images.srt
37.4 kB
IEEE Security and Privacy 2022/Noise A Library of Verified High-Performance Secure Channel Protocol Implementations.srt
37.3 kB
IEEE Security and Privacy 2019/XCLAIM Trustless Interoperable Cryptocurrency Backed Assets.eng.srt
37.2 kB
IEEE Security and Privacy 2022/SYMBEXCEL Automated Analysis and Understanding of Malicious Excel 4.0 Macros.srt
37.2 kB
IEEE Security and Privacy 2022/Sabre Sender-Anonymous Messaging with Fast Audits.srt
37.2 kB
IEEE Security and Privacy 2015/Caelus - Verifying the Consistency of Cloud Services with Battery-Powered Devices.eng.srt
37.1 kB
IEEE Security and Privacy 2019/Does Certificate Transparency Break the Web Measuring Adoption and Error Rate.eng.srt
36.9 kB
IEEE Security and Privacy 2022/FuzzUSB Hybrid Stateful Fuzzing of USB Gadget Stacks.srt
36.9 kB
IEEE Security and Privacy 2022/Investigating the Use of Email Encryption for an Entire University.srt
36.8 kB
IEEE Security and Privacy 2015/Secure Track Verification.eng.srt
36.8 kB
IEEE Security and Privacy 2016/Downgrade Resilience in Key-Exchange Protocols.eng.srt
36.8 kB
IEEE Security and Privacy 2022/Hark A Deep Learning System for Navigating Privacy Feedback at Scale.srt
36.7 kB
IEEE Security and Privacy 2019/If HTTPS Were Secure I wouldn't Need 2FA End User and Administrator Mental Models of HTTPS.eng.srt
36.5 kB
IEEE Security and Privacy 2022/Adversarial Prefetch New Cross-Core Cache Side Channel Attacks.srt
36.3 kB
IEEE Security and Privacy 2023/ELSA Secure Aggregation for Federated Learning with Malicious Actors.eng.srt
36.3 kB
IEEE Security and Privacy 2023/RAB Provable Robustness Against Backdoor Attacks.eng.srt
36.2 kB
IEEE Security and Privacy 2016/I Think They're Trying to Tell Me Something - Advice Sources and Selection for Digital Security.eng.srt
36.2 kB
IEEE Security and Privacy 2016/A Tough call - Mitigating Advanced Code-Reuse Attacks At The Binary Level.eng.srt
36.1 kB
IEEE Security and Privacy 2019/Hard Drive of Hearing Disks that Eavesdrop with a Synthesized Microphone.eng.srt
36.1 kB
IEEE Security and Privacy 2018/Secure Device Bootstrapping without Secrets Resistant to Signal Manipulation Attacks.eng.srt
36.0 kB
IEEE Security and Privacy 2022/PGPATCH Policy-Guided Logic Bug Patching for Robotic Vehicles.srt
36.0 kB
IEEE Security and Privacy 2019/SoK Shining Light on Shadow Stacks.eng.srt
35.9 kB
IEEE Security and Privacy 2019/Kiss from a Rogue Evaluating Detectability of Pay-at-the-Pump Card Skimmers.eng.srt
35.9 kB
IEEE Security and Privacy 2016/Cloak of Visibility - Detecting When Machines Browse a Different Web.eng.srt
35.9 kB
IEEE Security and Privacy 2019/SoK General Purpose Frameworks for Secure Multi-Party Computation.eng.srt
35.8 kB
IEEE Security and Privacy 2022/IRQDebloat Reducing Driver Attack Surface in Embedded Devices.srt
35.7 kB
IEEE Security and Privacy 2021/SoK Hate, Harassment, and the Changing Landscape of Online Abuse.eng.srt
35.7 kB
IEEE Security and Privacy 2019/How Well Do My Results Generalize Comparing Security and Privacy Survey Results from....eng.srt
35.6 kB
IEEE Security and Privacy 2019/PERUN Virtual Payment Hubs over Cryptographic Currencies.eng.srt
35.6 kB
IEEE Security and Privacy 2023/Teaching and Learning Cybersecurity and AI Ethics in High School.eng.srt
35.6 kB
IEEE Security and Privacy 2022/SecFloat Accurate Floating-Point meets Secure 2-Party Computation.srt
35.5 kB
IEEE Security and Privacy 2016/Staying Secure and Unprepared - Understanding and Mitigating the Security Risks of Apple ZeroConf.eng.srt
35.5 kB
IEEE Security and Privacy 2022/The State of the SameSite Studying the Usage, Effectiveness, and Adequacy of SameSite Cookies.srt
35.5 kB
IEEE Security and Privacy 2019/Simple High-Level Code for Cryptographic Arithmetic - With Proofs, Without Compromises.eng.srt
35.4 kB
IEEE Security and Privacy 2019/Self-Encrypting Deception Weaknesses in the Encryption of Solid State Drives.eng.srt
35.3 kB
IEEE Security and Privacy 2015/Automatic Inference of Search Patterns for Tain't-Style Vulnerabilities.eng.srt
35.2 kB
IEEE Security and Privacy 2022/PICCOLO Exposing Complex Backdoors in NLP Transformer Models.srt
35.2 kB
IEEE Security and Privacy 2022/SoK Unifying and Applying At-Risk User Research.srt
35.2 kB
IEEE Security and Privacy 2018/Locally Differentially Private Frequent Itemset Mining.eng.srt
35.2 kB
IEEE Security and Privacy 2015/SoK - Secure Messaging.eng.srt
35.1 kB
IEEE Security and Privacy 2019/Attack Directories, Not Caches Side Channel Attacks in a Non Inclusive World.eng.srt
35.1 kB
IEEE Security and Privacy 2021/A Decentralized and Encrypted National Gun Registry.eng.srt
35.1 kB
IEEE Security and Privacy 2022/A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols.srt
35.1 kB
IEEE Security and Privacy 2022/RT-TEE Real-time System Availability for Cyber-physical Systems using ARM TrustZone.srt
35.1 kB
IEEE Security and Privacy 2022/Publicly Accountable Robust Multi-Party Computation.srt
35.1 kB
IEEE Security and Privacy 2019/Reasoning Analytically About Password Cracking Software Alex Liu.eng.srt
34.9 kB
IEEE Security and Privacy 2023/Threshold BBS Signatures for Distributed Anonymous Credential Issuance.eng.srt
34.9 kB
IEEE Security and Privacy 2023/WaVe A Verifiably Secure WebAssembly Sandboxing Runtime.eng.srt
34.8 kB
IEEE Security and Privacy 2022/Adversarial Examples - for Proof-of-Learning.srt
34.8 kB
IEEE Security and Privacy 2019/Neural Cleanse Identifying and Mitigating Backdoor Attacks in Neural Networks.eng.srt
34.7 kB
IEEE Security and Privacy 2016/No Pardon for the Interruption - New Inference Attacks on Android Through Interrupt Timing Analysis.eng.srt
34.7 kB
IEEE Security and Privacy 2019/Synesthesia Detecting Screen Content via Remote Acoustic Side Channels.eng.srt
34.7 kB
IEEE Security and Privacy 2019/EmPoWeb Empowering Web Applications with Browser Extensions.eng.srt
34.6 kB
IEEE Security and Privacy 2023/RoFL Robustness of Secure Federated Learning.eng.srt
34.6 kB
IEEE Security and Privacy 2022/How to Attack and Generate Honeywords.srt
34.6 kB
IEEE Security and Privacy 2015/Cracking-Resistant Password Vaults Using Natural Language Encoders.eng.srt
34.6 kB
IEEE Security and Privacy 2022/A Formal Security Analysis of the W3C Web Payment APIs Attacks and Verification.srt
34.5 kB
IEEE Security and Privacy 2019/LBM A Security Framework for Peripherals within the Linux Kernel.eng.srt
34.5 kB
IEEE Security and Privacy 2022/ShadeWatcher Recommendation-guided Cyber Threat Analysis using System Audit Records.srt
34.5 kB
IEEE Security and Privacy 2023/Vulnerability Discovery for All Experiences of Marginalization in Vulnerability Discovery.eng.srt
34.4 kB
IEEE Security and Privacy 2019/Theory and Practice of Finding Eviction Sets.eng.srt
34.3 kB
IEEE Security and Privacy 2023/Security and Privacy Challenges, Advice, and Opportunities at Cybercafes in Kenya.eng.srt
34.3 kB
IEEE Security and Privacy 2022/Copy, Right A Testing Framework for Copyright Protection of Deep Learning Models.srt
34.2 kB
IEEE Security and Privacy 2016/High-Speed Inter-domain Fault Localization.eng.srt
34.2 kB
IEEE Security and Privacy 2023/Space Odyssey An Experimental Software Security Analysis of Satellites.eng.srt
34.2 kB
IEEE Security and Privacy 2021/Doing good by fighting fraud Ethical anti-fraud systems for mobile payments.eng.srt
34.1 kB
IEEE Security and Privacy 2022/PROTRR Principled yet Optimal In-DRAM Target Row Refresh.srt
33.9 kB
IEEE Security and Privacy 2022/Formal Model-Driven Discovery of Bluetooth Protocol Design Vulnerabilities.srt
33.9 kB
IEEE Security and Privacy 2022/Property Inference from Poisoning.srt
33.9 kB
IEEE Security and Privacy 2022/Locally Differentially Private Sparse Vector Aggregation.srt
33.8 kB
IEEE Security and Privacy 2019/NEUZZ Efficient Fuzzing with Neural Program Smoothing.eng.srt
33.8 kB
IEEE Security and Privacy 2019/Towards Practical Differentialy Private Convex Optimization.eng.srt
33.8 kB
IEEE Security and Privacy 2018/AI2 - Safety and Robustness Certification of Neural Networks.eng.srt
33.8 kB
IEEE Security and Privacy 2022/Deployment of Source Address Validation by Network Operators A Randomized Control Trial.srt
33.7 kB
IEEE Security and Privacy 2022/Mind the Gap Studying the Insecurity of Provably Secure Embedded Trusted Execution Architectures.srt
33.7 kB
IEEE Security and Privacy 2022/SNARKBlock Federated Anonymous Blocklisting from Hidden Common Input Aggregate Proofs.srt
33.7 kB
IEEE Security and Privacy 2016/Revisiting Square Root ORAM - Efficient Random Access in Multi-Party Computation.eng.srt
33.7 kB
IEEE Security and Privacy 2022/Statistical Quantification of Differential Privacy A Local Approach.srt
33.7 kB
IEEE Security and Privacy 2019/Redactable Blockchain in the Permissionless Setting.eng.srt
33.6 kB
IEEE Security and Privacy 2022/Spook.js Attacking Chrome Strict Site Isolation via Speculative Execution.srt
33.6 kB
IEEE Security and Privacy 2021/Diogenes Lightweight Scalable RSA Modulus Generation with a Dishonest Majority.eng.srt
33.5 kB
IEEE Security and Privacy 2022/Universal Atomic Swaps Secure Exchange of Coins Across All Blockchains.srt
33.5 kB
IEEE Security and Privacy 2022/Graphics Peeping Unit Exploiting EM Side-Channel Information of GPUs to Eavesdrop on Your Neighbors.srt
33.5 kB
IEEE Security and Privacy 2023/Blue's Clues Practical Discovery of Non-Discoverable Bluetooth Devices.eng.srt
33.5 kB
IEEE Security and Privacy 2021/Bitcoin-Compatible Virtual Channels.eng.srt
33.3 kB
IEEE Security and Privacy 2022/Spinning Language Models Risks of Propaganda-as-a-Service and Countermeasures.srt
33.3 kB
IEEE Security and Privacy 2023/Blue Is the New Black (Market) Privacy Leaks and Re-Victimization from Police-Auctioned Cellphones.eng.srt
33.2 kB
IEEE Security and Privacy 2019/Towards Automated Safety Vetting of PLC Code in Real World Plants Mu Zhang.eng.srt
33.2 kB
IEEE Security and Privacy 2016/Sending out an SMS - Characterizing the Security of the SMS Ecosystem with Public Gateways.eng.srt
33.2 kB
IEEE Security and Privacy 2022/SoK How Robust is Image Classification Deep Neural Network Watermarking.srt
33.2 kB
IEEE Security and Privacy 2022/SoK Authentication in Augmented and Virtual Reality.srt
33.2 kB
IEEE Security and Privacy 2019/Differentially Private Model Publishing For Deep Learning.eng.srt
33.0 kB
IEEE Security and Privacy 2021/Is Private Learning Possible with Instance Encoding.eng.srt
32.9 kB
IEEE Security and Privacy 2019/Threshold ECDSA from ECDSA Assumptions The Multiparty Case.eng.srt
32.9 kB
IEEE Security and Privacy 2021/SoK Computer-Aided Cryptography.eng.srt
32.8 kB
IEEE Security and Privacy 2019/Asm2Vec Boosting Static Representation Robustness for Binary Clone Search....eng.srt
32.8 kB
IEEE Security and Privacy 2019/Ouroboros Crypsinous Privacy Preserving Proof of Stake.eng.srt
32.7 kB
IEEE Security and Privacy 2022/K-Scheduler Effective Seed Scheduling for Fuzzing with Graph Centrality Analysis.srt
32.7 kB
IEEE Security and Privacy 2023/Is Cryptographic Deniability Sufficient Non-Expert Perceptions of Deniability in Secure Messaging.eng.srt
32.7 kB
IEEE Security and Privacy 2023/Hide and Seek with Spectres Efficient discovery of speculative vulnerabilities with random testing.eng.srt
32.6 kB
IEEE Security and Privacy 2021/HackEd A Pedagogical Analysis of Online Vulnerability Discovery Exercises.eng.srt
32.5 kB
IEEE Security and Privacy 2016/Seeking Nonsense, Looking for Trouble - Efficient Promotional-Infection Detection through ....eng.srt
32.4 kB
IEEE Security and Privacy 2021/Adversarial Watermarking Transformer Towards Tracing Text Provenance with Data Hiding.eng.srt
32.4 kB
IEEE Security and Privacy 2021/Trust, But Verify A Longitudinal Analysis Of Android OEM Compliance and Customization.eng.srt
32.4 kB
IEEE Security and Privacy 2017/Under the Shadow of Sunshine - Understanding & Detecting Bulletproof Hosting.eng.srt
32.4 kB
IEEE Security and Privacy 2023/SoK A Critical Evaluation of Efficient Website Fingerprinting Defenses.eng.srt
32.4 kB
IEEE Security and Privacy 2019/CaSym Cache Aware Symbolic Execution for Side Channel Detection and Mitigation.eng.srt
32.3 kB
IEEE Security and Privacy 2022/Exploit the Last Straw That Breaks Android Systems.srt
32.3 kB
IEEE Security and Privacy 2021/SmartPulse Automated Checking of Temporal Properties in Smart Contracts.eng.srt
32.3 kB
IEEE Security and Privacy 2022/Why Crypto-detectors Fail A Systematic Evaluation of Cryptographic Misuse Detection Techniques.srt
32.3 kB
IEEE Security and Privacy 2022/ProVerif with Lemmas, Induction, Fast Subsumption, and Much More.srt
32.2 kB
IEEE Security and Privacy 2021/STOCHFUZZ Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic ....eng.srt
32.2 kB
IEEE Security and Privacy 2019/SensorID Sensor Calibration Fingerprinting for Smartphones.eng.srt
32.2 kB
IEEE Security and Privacy 2022/SoK Practical Foundations for Software Spectre Defenses.srt
32.2 kB
IEEE Security and Privacy 2022/DeepCASE Semi-Supervised Contextual Analysis of Security Events.srt
32.1 kB
IEEE Security and Privacy 2022/Jigsaw Efficient and Scalable Path Constraints Fuzzing.srt
32.1 kB
IEEE Security and Privacy 2022/HAMRAZ Resilient Partitioning and Replication.srt
32.1 kB
IEEE Security and Privacy 2019/Helen Maliciously Secure Coopetitive Learning for Linear Models.eng.srt
32.1 kB
IEEE Security and Privacy 2021/Compact Certificates of Collective Knowledge.eng.srt
32.1 kB
IEEE Security and Privacy 2022/COBRA Dynamic Proactive Secret Sharing for Confidential BFT Services.srt
32.1 kB
IEEE Security and Privacy 2021/Epochal Signatures for Deniable Group Chats.eng.srt
32.0 kB
IEEE Security and Privacy 2022/Four Attacks and a Proof for Telegram.srt
32.0 kB
IEEE Security and Privacy 2019/Exploiting Correcting Codes On the Effectiveness of ECC Memory Against Rowhammer Attacks.eng.srt
32.0 kB
IEEE Security and Privacy 2023/Silph A Framework for Scalable and Accurate Generation of Hybrid MPC Protocols.eng.srt
31.8 kB
IEEE Security and Privacy 2022/IronMask Versatile Verification of Masking Security.srt
31.8 kB
IEEE Security and Privacy 2019/SoK Sanitizing for Security Dokyung Song.eng.srt
31.8 kB
IEEE Security and Privacy 2023/MEGA Malleable Encryption Goes Awry.eng.srt
31.8 kB
IEEE Security and Privacy 2019/Characterizing Pixel Tracking through the Lens of Disposable Email Services.eng.srt
31.8 kB
IEEE Security and Privacy 2022/SPURT Scalable Distributed Randomness Beacon with Transparent Setup.srt
31.7 kB
IEEE Security and Privacy 2023/Private Eye On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing.eng.srt
31.7 kB
IEEE Security and Privacy 2021/High-Assurance Cryptography in the Spectre Era.eng.srt
31.6 kB
IEEE Security and Privacy 2021/Self-Supervised Euphemism Detection and Identification for Content Moderation.eng.srt
31.5 kB
IEEE Security and Privacy 2019/Measuring and Analyzing Search Engine Poisoning of Linguistic Collisions.eng.srt
31.5 kB
IEEE Security and Privacy 2022/Differentially Private Histograms in the Shuffle Model from Fake Users.srt
31.5 kB
IEEE Security and Privacy 2023/Shedding Light on Inconsistencies in Grid Cybersecurity Disconnects and Recommendations.eng.srt
31.5 kB
IEEE Security and Privacy 2019/Certified Robustness to Adversarial Examples with Differential Privacy.eng.srt
31.5 kB
IEEE Security and Privacy 2021/Zero Knowledge for Everything and Everyone Fast ZK Processor with Cached ORAM for ANSI C Programs.eng.srt
31.3 kB
IEEE Security and Privacy 2022/Augury Using Data Memory-Dependent Prefetchers to Leak Data at Rest.srt
31.3 kB
IEEE Security and Privacy 2019/Drones' Cryptanalysis - Detecting Privacy Invasion Attacks Conducted by Drone.eng.srt
31.2 kB
IEEE Security and Privacy 2021/Bookworm Game Automatic Discovery of LTE Vulnerabilities Through Documentation Analysis.eng.srt
31.1 kB
IEEE Security and Privacy 2023/SoK History is a Vast Early Warning System Auditing the Provenance of System Intrusions.eng.srt
31.1 kB
IEEE Security and Privacy 2019/Short Text, Large Effect Measuring the Impact of User Reviews on Android App Security & Privacy.eng.srt
31.0 kB
IEEE Security and Privacy 2019/Security of GPS INS based On-road Location Tracking Systems.eng.srt
30.9 kB
IEEE Security and Privacy 2021/SoK The Faults in our ASRs An Overview of Attacks against Automatic Speech Recognition and ....eng.srt
30.9 kB
IEEE Security and Privacy 2022/Model Orthogonalization Class Distance Hardening in Neural Networks for Better Security.srt
30.9 kB
IEEE Security and Privacy 2022/Practical EMV Relay Protection.srt
30.8 kB
IEEE Security and Privacy 2021/CanDID Bootstrapping Decentralized Identity from Legacy Providers.eng.srt
30.8 kB
IEEE Security and Privacy 2023/Skilled or Gullible Gender Stereotypes Related to Computer Security and Privacy.eng.srt
30.8 kB
IEEE Security and Privacy 2023/FLUTE Fast and Secure Lookup Table Evaluations.eng.srt
30.7 kB
IEEE Security and Privacy 2022/Arbitrary Modulation of Electromagnetic Noise from Unprivileged Software Impacting Emission Security.srt
30.7 kB
IEEE Security and Privacy 2019/The Code That Never Ran Modeling Attacks on Speculative Evaluation.eng.srt
30.7 kB
IEEE Security and Privacy 2023/Certifiably Robust Object Detection against Patch Hiding Attacks via Patch-agnostic Masking.eng.srt
30.6 kB
IEEE Security and Privacy 2019/Port Contention for Fun and Profit.eng.srt
30.6 kB
IEEE Security and Privacy 2019/Breaking LTE on Layer Two.eng.srt
30.6 kB
IEEE Security and Privacy 2019/Understanding the Security of ARM Debugging Features.eng.srt
30.6 kB
IEEE Security and Privacy 2023/SCAPHY Detecting Modern ICS Attacks by Correlating Behaviors in SCADA and PHYsical.eng.srt
30.6 kB
IEEE Security and Privacy 2023/OWL Compositional Verification of Security Protocols via an Information-Flow Type System.eng.srt
30.6 kB
IEEE Security and Privacy 2023/PCspooF Compromising the Safety of Time-Triggered Ethernet.eng.srt
30.5 kB
IEEE Security and Privacy 2021/Systematic Analysis of Randomization-based Protected Cache Architectures.eng.srt
30.4 kB
IEEE Security and Privacy 2021/A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer.eng.srt
30.4 kB
IEEE Security and Privacy 2022/A Secret-Free Hypervisor Rethinking Isolation in the Age of Speculative Vulnerabilities.srt
30.4 kB
IEEE Security and Privacy 2015/Connection-Oriented DNS to Improve Privacy and Security.eng.srt
30.3 kB
IEEE Security and Privacy 2022/Surakav Generating Realistic Traces for a Strong Website Fingerprinting Defense.srt
30.3 kB
IEEE Security and Privacy 2019/SoK Security Evaluation of Home Based IoT Deployment.eng.srt
30.2 kB
IEEE Security and Privacy 2022/LinkTeller Recovering Private Edges from Graph Neural Networks via Influence Analysis.srt
30.2 kB
IEEE Security and Privacy 2023/One Key to Rule Them All Secure Group Pairing for Heterogeneous IoT Devices.eng.srt
30.2 kB
IEEE Security and Privacy 2023/Not Yet Another Digital ID Privacy-preserving Humanitarian Aid Distribution.eng.srt
30.1 kB
IEEE Security and Privacy 2019/Demystifying Hidden Privacy Settings in Mobile Apps.eng.srt
30.0 kB
IEEE Security and Privacy 2023/Multi-Round Single-Server Secure Aggregation with Applications to Private Federated Learning.eng.srt
30.0 kB
IEEE Security and Privacy 2016/Dedup Est Machina - Memory Deduplication as an Advanced Exploitation Vector.eng.srt
29.9 kB
IEEE Security and Privacy 2022/Universal 3-Dimensional Perturbations for Black-Box Attacks on Video Recognition Systems.srt
29.8 kB
IEEE Security and Privacy 2021/Many-out-of-Many Proofs and Applications to Anonymous Zether.eng.srt
29.8 kB
IEEE Security and Privacy 2022/SoK The Dual Nature of Technology in Sexual Assault.srt
29.7 kB
IEEE Security and Privacy 2019/On the Feasibility of Rerouting-Based DDoS Defenses.eng.srt
29.7 kB
IEEE Security and Privacy 2021/Electromagnetic Covert Channels Can Be Super Resilient.eng.srt
29.6 kB
IEEE Security and Privacy 2023/On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security.eng.srt
29.6 kB
IEEE Security and Privacy 2021/Using Selective Memoization to Defeat Regular Expression Denial of Service (ReDoS).eng.srt
29.6 kB
IEEE Security and Privacy 2019/Lay Down the Common Metrics Evaluating Proof of Work Consensus Protocols' Security.eng.srt
29.6 kB
IEEE Security and Privacy 2022/Security Analysis of the MLS Key Derivation.srt
29.6 kB
IEEE Security and Privacy 2023/Deep perceptual hashing algorithms with hidden dual purpose client-side scanning facial recognition.eng.srt
29.6 kB
IEEE Security and Privacy 2019/ProFuzzer On-the-fly Input Type Probing for Better Zero-day Vulnerability Discovery.eng.srt
29.5 kB
IEEE Security and Privacy 2023/Practically-Exploitable Cryptographic Vulnerabilities in Matrix.eng.srt
29.5 kB
IEEE Security and Privacy 2021/Lightweight Techniques for Private Heavy Hitters.eng.srt
29.5 kB
IEEE Security and Privacy 2021/Hear No Evil, See Kenansville Efficient and Transferable Black-Box Attacks on Automatic ....eng.srt
29.4 kB
IEEE Security and Privacy 2023/PyFET Forensically Equivalent Transformation for Python Binary Decompilation.eng.srt
29.4 kB
IEEE Security and Privacy 2021/ARBITRAR User-Guided API Misuse Detection.eng.srt
29.3 kB
IEEE Security and Privacy 2019/Touching the Untouchables Dynamic Security Analysis of the LTE Control Plane.eng.srt
29.3 kB
IEEE Security and Privacy 2023/TELEPATH A Minecraft-based Covert Communication System.eng.srt
29.3 kB
IEEE Security and Privacy 2022/Model Stealing Attacks Against Inductive Graph Neural Networks.srt
29.2 kB
IEEE Security and Privacy 2019/Razzer Finding Kernel Race Bugs through Fuzzing.eng.srt
29.2 kB
IEEE Security and Privacy 2023/Confident Monte Carlo Rigorous Analysis of Guessing Curves for Probabilistic Password Models.eng.srt
29.2 kB
IEEE Security and Privacy 2019/IEEE S&P 2019 - Opening Remarks - Program Chair.eng.srt
29.2 kB
IEEE Security and Privacy 2021/Detecting Filter List Evasion With Event-Loop-Turn Granularity JavaScript Signatures.eng.srt
29.2 kB
IEEE Security and Privacy 2023/Typing High-Speed Cryptography against Spectre v1.eng.srt
29.1 kB
IEEE Security and Privacy 2021/Good Bot, Bad Bot Characterizing Automated Browsing Activity.eng.srt
29.1 kB
IEEE Security and Privacy 2023/Breaking Security-Critical Voice Authentication.eng.srt
29.0 kB
IEEE Security and Privacy 2023/The Leaky Web Automated Discovery of Cross-Site Information Leaks in Browsers and the Web.eng.srt
29.0 kB
IEEE Security and Privacy 2019/Resident Evil Understanding Residential IP Proxy as a Dark Service.eng.srt
29.0 kB
IEEE Security and Privacy 2022/Exposed Infrastructures-Discovery, Attacks and Remediation of Insecure ICS Remote Management Devices.srt
28.9 kB
IEEE Security and Privacy 2023/WeRLman To Tackle Whale (Transactions), Go Deep (RL).eng.srt
28.8 kB
IEEE Security and Privacy 2022/Repairing DoS Vulnerability of Real-World Regexes.srt
28.7 kB
IEEE Security and Privacy 2019/Comprehensive Privacy Analysis of Deep Learning.eng.srt
28.7 kB
IEEE Security and Privacy 2022/Time-Print Authenticating USB Flash Drives with Novel Timing Fingerprints.srt
28.7 kB
IEEE Security and Privacy 2021/OSPREY Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary.eng.srt
28.7 kB
IEEE Security and Privacy 2021/They Would do Better if They Worked Together The Case of Interaction Problems Between Password ....eng.srt
28.7 kB
IEEE Security and Privacy 2023/LazyTAP On-Demand Data Minimization for Trigger-Action Applications.eng.srt
28.6 kB
IEEE Security and Privacy 2023/Adaptive Risk-Limiting Comparison Audits.eng.srt
28.6 kB
IEEE Security and Privacy 2022/Attacks on Wireless Coexistence.srt
28.6 kB
IEEE Security and Privacy 2022/SMILE Secure Memory Introspection for Live Enclave.srt
28.6 kB
IEEE Security and Privacy 2015/Securing Multiparty Online Services Via Certification of Symbolic Transactions.eng.srt
28.5 kB
IEEE Security and Privacy 2021/SoK Quantifying Cyber Risk.eng.srt
28.5 kB
IEEE Security and Privacy 2022/Analyzing Ground-Truth Data of Mobile Gambling Scam.srt
28.5 kB
IEEE Security and Privacy 2021/Security of Multi-Sensor Fusion based Perception in Autonomous Driving Under Physical-World Attacks.eng.srt
28.5 kB
IEEE Security and Privacy 2022/Are We There Yet Timing and Floating-Point Attacks on Differential Privacy Systems.srt
28.5 kB
IEEE Security and Privacy 2022/GREBE Unveiling Exploitation Potential for Linux Kernel Bugs.srt
28.5 kB
IEEE Security and Privacy 2019/On the Security of Two-Round Multi-Signatures.eng.srt
28.4 kB
IEEE Security and Privacy 2023/Leveraging Sandboxes for a Minimally Invasive Browser Fingerprinting Defense.eng.srt
28.4 kB
IEEE Security and Privacy 2023/DVFS Frequently Leaks Secrets Hertzbleed Attacks Beyond SIKE, Cryptography, and CPU-Only Data.eng.srt
28.3 kB
IEEE Security and Privacy 2023/IPvSeeYou Exploiting Leaked Identifiers in IPv6 for Street-Level Geolocation.eng.srt
28.3 kB
IEEE Security and Privacy 2021/A Secure and Formally Verified Linux KVM Hypervisor.eng.srt
28.3 kB
IEEE Security and Privacy 2023/Collaborative Ad Transparency Promises and Limitations.eng.srt
28.3 kB
IEEE Security and Privacy 2023/SPHINCSC Compressing SPHINCS With (Almost) No Cost.eng.srt
28.2 kB
IEEE Security and Privacy 2023/Rethinking Searchable Symmetric Encryption.eng.srt
28.2 kB
IEEE Security and Privacy 2021/Proof-of-Learning Definitions and Practice.eng.srt
28.1 kB
IEEE Security and Privacy 2021/The EMV Standard Break, Fix, Verify.eng.srt
28.1 kB
IEEE Security and Privacy 2021/NTFUZZ Enabling Type-Aware Kernel Fuzzing on Windows with Static Binary Analysis.eng.srt
28.1 kB
IEEE Security and Privacy 2021/Which Privacy and Security Attributes Most Impact Consumers' Risk Perception and Willingness to ....eng.srt
28.1 kB
IEEE Security and Privacy 2021/PLATYPUS Software-based Power Side-Channel Attacks on x86.eng.srt
28.1 kB
IEEE Security and Privacy 2023/Practical Timing Side-Channel Attacks on Memory Compression.eng.srt
28.0 kB
IEEE Security and Privacy 2023/When and Why Do People Want Ad Targeting Explanations Evidence from a Mixed-Methods Field Study.eng.srt
28.0 kB
IEEE Security and Privacy 2022/Committed to Trust A Qualitative Study on Security & Trust in Open Source Software Projects.srt
28.0 kB
IEEE Security and Privacy 2023/No Privacy in the Electronics Repair Industry.eng.srt
27.9 kB
IEEE Security and Privacy 2021/Method Confusion Attack on the Bluetooth Pairing Process.eng.srt
27.9 kB
IEEE Security and Privacy 2021/DP-Sniper Black-Box Discovery of Differential Privacy Violations using Classifiers.eng.srt
27.8 kB
IEEE Security and Privacy 2022/DeepCoFFEA Improved Flow Correlation Attacks on Tor via Metric Learning and Amplification.srt
27.8 kB
IEEE Security and Privacy 2021/Cross-Domain Access Control Encryption - Arbitrary-policy, Constant-size, Efficient.eng.srt
27.8 kB
IEEE Security and Privacy 2023/Bitcoin-Enhanced Proof-of-Stake Security Possibilities and Impossibilities.eng.srt
27.8 kB
IEEE Security and Privacy 2023/From 5G Sniffing to Harvesting Leakages of Privacy-Preserving Messengers.eng.srt
27.7 kB
IEEE Security and Privacy 2019/Bitcoin vs. Bitcoin Cash Coexistence or Downfall of Bitcoin Cash.eng.srt
27.7 kB
IEEE Security and Privacy 2022/SIRAJ A Unified Framework for Aggregation of Malicious Entity Detectors.srt
27.7 kB
IEEE Security and Privacy 2023/On the (In)security of Peer-to-Peer Decentralized Machine Learning.eng.srt
27.6 kB
IEEE Security and Privacy 2023/Deepfake Text Detection Limitations and Opportunities.eng.srt
27.6 kB
IEEE Security and Privacy 2021/Wolverine Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and ....eng.srt
27.6 kB
IEEE Security and Privacy 2019/Dangerous Skills Understanding and Mitigating Security Risks of Voice-Controlled Third-Party....eng.srt
27.6 kB
IEEE Security and Privacy 2023/Understanding the Security and Privacy Attitudes of Smart Home Users on Reddit.eng.srt
27.5 kB
IEEE Security and Privacy 2019/F-BLEAU Fast Black-box Leakage Estimation.eng.srt
27.5 kB
IEEE Security and Privacy 2023/GraphSPD Graph-Based Security Patch Detection with Enriched Code Semantics.eng.srt
27.4 kB
IEEE Security and Privacy 2023/It’s (DOM) Clobbering Time Attack Techniques, Prevalence, and Defenses.eng.srt
27.4 kB
IEEE Security and Privacy 2023/SNAP Efficient Extraction of Private Properties with Poisoning.eng.srt
27.4 kB
IEEE Security and Privacy 2023/Detection of Inconsistencies in Privacy Practices of Browser Extensions.eng.srt
27.4 kB
IEEE Security and Privacy 2023/Always Contribute Back A Qualitative Study on Security Challenges of the Open Source Supply Chain.eng.srt
27.4 kB
IEEE Security and Privacy 2021/Ebb-and-Flow Protocols A Resolution of the Availability-Finality Dilemma.eng.srt
27.3 kB
IEEE Security and Privacy 2019/SoK The Challenges Pitfalls and Perils of Using Hardware Performance Counters for Security.eng.srt
27.3 kB
IEEE Security and Privacy 2021/Merkle2 A Low-Latency Transparency Log System.eng.srt
27.3 kB
IEEE Security and Privacy 2023/Characterizing Everyday Misuse of Smart Home Devices.eng.srt
27.3 kB
IEEE Security and Privacy 2019/Fuzzing File Systems via Two-Dimensional Input Space Exploration.eng.srt
27.3 kB
IEEE Security and Privacy 2023/REGA Scalable Rowhammer Mitigation with Refresh-Generating Activations.eng.srt
27.3 kB
IEEE Security and Privacy 2023/User Perceptions and Experiences with Smart Home Updates.eng.srt
27.2 kB
IEEE Security and Privacy 2021/On the Anonymity Guarantees of Anonymous Proof-of-Stake Protocols.eng.srt
27.2 kB
IEEE Security and Privacy 2023/A Theory to Instruct Differentially-Private Learning via Clipping Bias Reduction.eng.srt
27.2 kB
IEEE Security and Privacy 2021/An Interactive Prover for Protocol Verification in the Computational Model.eng.srt
27.1 kB
IEEE Security and Privacy 2023/SoK Distributed Randomness Beacons.eng.srt
27.1 kB
IEEE Security and Privacy 2023/Improving Developers' Understanding of Regex Denial of Service Tools.eng.srt
27.1 kB
IEEE Security and Privacy 2021/CrossTalk Speculative Data Leaks Across Cores Are Real.eng.srt
27.0 kB
IEEE Security and Privacy 2019/An Extensive Formal Security Analysis of the OpenID Financial grade API Pedram Hosseyni.eng.srt
27.0 kB
IEEE Security and Privacy 2023/mmSpoof Resilient Spoofing of Automotive Millimeter-wave Radars using Reflect Array.eng.srt
27.0 kB
IEEE Security and Privacy 2021/Journey to the Center of the Cookie Ecosystem Unraveling Actors' Roles and Relationships.eng.srt
26.9 kB
IEEE Security and Privacy 2021/Survivalism Systematic Analysis of Malware Living-Off-The-Land.eng.srt
26.8 kB
IEEE Security and Privacy 2023/SecureCells A Secure Compartmentalized Architecture.eng.srt
26.7 kB
IEEE Security and Privacy 2023/Less Is More Refinement Proofs for Probabilistic Proofs.eng.srt
26.7 kB
IEEE Security and Privacy 2021/SoK Security and Privacy in the Age of Commercial Drones.eng.srt
26.7 kB
IEEE Security and Privacy 2022/Quantifying Blockchain Extractable Value How dark is the forest.srt
26.6 kB
IEEE Security and Privacy 2021/DIANE Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices.eng.srt
26.5 kB
IEEE Security and Privacy 2023/RuleKeeper GDPR-Aware Personal Data Compliance for Web Frameworks.eng.srt
26.5 kB
IEEE Security and Privacy 2023/SoK Let the Privacy Games Begin A Unified Treatment of Data Inference Privacy in Machine Learning.eng.srt
26.5 kB
IEEE Security and Privacy 2021/CryptGPU Fast Privacy-Preserving Machine Learning on the GPU.eng.srt
26.5 kB
IEEE Security and Privacy 2023/TrojanModel A Practical Trojan Attack against Automatic Speech Recognition Systems.eng.srt
26.4 kB
IEEE Security and Privacy 2021/Black Widow Blackbox Data-driven Web Scanning.eng.srt
26.4 kB
IEEE Security and Privacy 2023/High-Order Masking of Lattice Signatures in Quasilinear Time.eng.srt
26.4 kB
IEEE Security and Privacy 2023/BLEDiff Scalable and Property-Agnostic Noncompliance Checking for BLE Implementations.eng.srt
26.4 kB
IEEE Security and Privacy 2023/Inducing Wireless Chargers to Voice Out for Inaudible Command Attacks.eng.srt
26.4 kB
IEEE Security and Privacy 2023/Disassembling ARM Binaries by Lightweight Superset Instruction Interpretation and Graph Modeling.eng.srt
26.3 kB
IEEE Security and Privacy 2019/Why Does Your Data Leak Uncovering the Data Leakage in Cloud from Mobile Apps.eng.srt
26.3 kB
IEEE Security and Privacy 2023/SoK Anti-Facial Recognition Technology.eng.srt
26.3 kB
IEEE Security and Privacy 2021/Happer Unpacking Android Apps via a Hardware-Assisted Approach.eng.srt
26.3 kB
IEEE Security and Privacy 2023/A Security RISC Microarchitectural Attacks on Hardware RISC-V CPUs.eng.srt
26.3 kB
IEEE Security and Privacy 2023/Threshold Signatures in the Multiverse.eng.srt
26.3 kB
IEEE Security and Privacy 2023/Perceptions of Distributed Ledger Technology Key Management-Interviews with Finance Professionals.eng.srt
26.3 kB
IEEE Security and Privacy 2023/TeSec Accurate Server-side Attack Investigation for Web Applications.eng.srt
26.3 kB
IEEE Security and Privacy 2021/Revealer Detecting and Exploiting Regular Expression Denial-of-Service Vulnerabilities.eng.srt
26.3 kB
IEEE Security and Privacy 2022/SoK Demystifying Binary Lifters Through the Lens of Downstream Applications.srt
26.2 kB
IEEE Security and Privacy 2022/Timing-Based Browsing Privacy Vulnerabilities Via Site Isolation.srt
26.2 kB
IEEE Security and Privacy 2016/Opening Remarks of the 2016 IEEE Symposium on Security & Privacy.eng.srt
26.2 kB
IEEE Security and Privacy 2023/Characterizing the Limits of POV Acoustic Eavesdropping from Smartphone Cameras.eng.srt
26.1 kB
IEEE Security and Privacy 2023/Private Access Control for Function Secret Sharing.eng.srt
26.1 kB
IEEE Security and Privacy 2021/Breaking the Specification Certified PDF.eng.srt
26.1 kB
IEEE Security and Privacy 2019/KHyperLogLog Estimating Reidentifiability and Joinability of Large Data at Scale Pern Hui Chia.eng.srt
26.0 kB
IEEE Security and Privacy 2023/Disguising Attacks with Explanation-Aware Backdoors.eng.srt
25.9 kB
IEEE Security and Privacy 2023/Design and Evaluation of Inclusive Email Security Indicators for People with Visual Impairments.eng.srt
25.9 kB
IEEE Security and Privacy 2023/Scatter and Split Securely Defeating Cache Contention and Occupancy Attacks.eng.srt
25.8 kB
IEEE Security and Privacy 2023/ImU Physical Impersonating Attack for Face Recognition System with Natural Style Changes.eng.srt
25.8 kB
IEEE Security and Privacy 2021/High-Frequency Trading on Decentralized On-Chain Exchanges.eng.srt
25.8 kB
IEEE Security and Privacy 2023/Sound Verification of Security Protocols From Design to Interoperable Implementations.eng.srt
25.7 kB
IEEE Security and Privacy 2021/A Novel Dynamic Analysis Infrastructure to Instrument Untrusted Execution Flow Across User-Kernel....eng.srt
25.7 kB
IEEE Security and Privacy 2023/Jigsaw Puzzle Selective Backdoor Attack to Subvert Malware Classifiers.eng.srt
25.5 kB
IEEE Security and Privacy 2023/SyzDescribe Principled, Automated, Static Generation of Syscall Descriptions for Kernel Drivers.eng.srt
25.4 kB
IEEE Security and Privacy 2023/Precise Detection of Kernel Data Races with Probabilistic Lockset Analysis.eng.srt
25.4 kB
IEEE Security and Privacy 2023/Uncovering User Interactions on Smartphones via Contactless Wireless Charging Side Channels.eng.srt
25.4 kB
IEEE Security and Privacy 2023/AEM Facilitating Cross-Version Exploitability Assessment of Linux Kernel Vulnerabilities.eng.srt
25.3 kB
IEEE Security and Privacy 2023/BlindHub Bitcoin-Compatible Privacy-Preserving Payment Channel Hubs Supporting Variable Amounts.eng.srt
25.3 kB
IEEE Security and Privacy 2019/The 9 Lives of Bleichenbachers CAT New Cache ATtacks on TLS Implementations.eng.srt
25.2 kB
IEEE Security and Privacy 2023/Practical Program Modularization with Type-Based Dependence Analysis.eng.srt
25.1 kB
IEEE Security and Privacy 2022/DEPCOMM Graph Summarization on System Audit Logs for Attack Investigation.srt
25.1 kB
IEEE Security and Privacy 2019/Tap 'n Ghost A Compilation of Novel Attack Techniques against Smartphone Touchscreens.eng.srt
25.1 kB
IEEE Security and Privacy 2021/Invisible Probe Timing Attacks with PCIe Congestion Side-channel.eng.srt
25.0 kB
IEEE Security and Privacy 2023/ShadowNet A Secure and Efficient On-device Model Inference System for Convolutional Neural Networks.eng.srt
24.9 kB
IEEE Security and Privacy 2019/Exploiting Unintended Feature leakage in Collaborative Learning Congzheng Song.eng.srt
24.9 kB
IEEE Security and Privacy 2023/An Interview on the Security and Privacy Development Practices in Turkish Software Startups.eng.srt
24.9 kB
IEEE Security and Privacy 2021/A First Look at Zoombombing.eng.srt
24.9 kB
IEEE Security and Privacy 2023/SoK Certified Robustness for Deep Neural Networks.eng.srt
24.9 kB
IEEE Security and Privacy 2021/Keep the Dirt Tain'ted TreeKEM, Adaptively and Actively Secure Continuous Group Key Agreement.eng.srt
24.8 kB
IEEE Security and Privacy 2023/Half&Half Demystifying Intel’s Directional Branch Predictors for Fast, Secure Partitioned Execution.eng.srt
24.8 kB
IEEE Security and Privacy 2023/MPCAuth Multi-factor Authentication for Distributed-trust Systems.eng.srt
24.8 kB
IEEE Security and Privacy 2023/EC Embedded Systems Compartmentalization via Intra-Kernel Isolation.eng.srt
24.8 kB
IEEE Security and Privacy 2023/WebSpec Towards Machine-Checked Analysis of Browser Security Mechanisms.eng.srt
24.7 kB
IEEE Security and Privacy 2019/Blind Certificate Authorities.eng.srt
24.7 kB
IEEE Security and Privacy 2023/TEEzz Fuzzing Trusted Applications on COTS Android Devices.eng.srt
24.7 kB
IEEE Security and Privacy 2023/Low-Cost Privilege Separation with Compile Time Compartmentalization for Embedded Systems.eng.srt
24.6 kB
IEEE Security and Privacy 2023/A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations.eng.srt
24.6 kB
IEEE Security and Privacy 2023/CSIRowhammer - Cryptographic Security and Integrity against Rowhammer.eng.srt
24.6 kB
IEEE Security and Privacy 2023/Beyond Phish Toward Detecting Fraudulent e-Commerce Websites at Scale.eng.srt
24.5 kB
IEEE Security and Privacy 2023/Scalable and Privacy-Preserving Federated Principal Component Analysis.eng.srt
24.4 kB
IEEE Security and Privacy 2023/LAMBRETTA Learning to Rank for Twitter Soft Moderation.eng.srt
24.3 kB
IEEE Security and Privacy 2023/On Efficient, High-Fidelity and Blind Suppression of Backdoor Effects in Trojaned ML Models.eng.srt
24.3 kB
IEEE Security and Privacy 2023/SoK Taxonomy of Attacks on Open-Source Software Supply Chains.eng.srt
24.3 kB
IEEE Security and Privacy 2023/SoK Cryptographic Neural-Network Computation.eng.srt
24.3 kB
IEEE Security and Privacy 2023/Analyzing Leakage of Personally Identifiable Information in Language Models.eng.srt
24.1 kB
IEEE Security and Privacy 2023/No One Drinks From the Firehose How Organizations Filter and Prioritize Vulnerability Information.eng.srt
24.0 kB
IEEE Security and Privacy 2021/When Function Signature Recovery Meets Compiler Optimization.eng.srt
24.0 kB
IEEE Security and Privacy 2023/Clockwork Finance Automated Analysis of Economic Security in Smart Contracts.eng.srt
23.9 kB
IEEE Security and Privacy 2023/AUC Accountable Universal Composability.eng.srt
23.9 kB
IEEE Security and Privacy 2023/VIDEZZO Dependency-aware Virtual Device Fuzzing.eng.srt
23.8 kB
IEEE Security and Privacy 2023/How IoT Re-using Threatens Your Sensitive Data Exploring the User-Data Disposal in Used IoT Devices.eng.srt
23.6 kB
IEEE Security and Privacy 2023/SelectFuzz Efficient Directed Fuzzing with Selective Path Exploration.eng.srt
23.6 kB
IEEE Security and Privacy 2021/Defensive Technology Use by Political Activists During the Sudanese Revolution.eng.srt
23.5 kB
IEEE Security and Privacy 2023/Locally Differentially Private Frequency Estimation Based on Convolution Framework.eng.srt
23.5 kB
IEEE Security and Privacy 2021/BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures.eng.srt
23.5 kB
IEEE Security and Privacy 2023/Man-in-the-Middle Attacks without Rogue AP When WPAs Meet ICMP Redirects.eng.srt
23.5 kB
IEEE Security and Privacy 2023/SoK Decentralized Finance (DeFi) Attacks.eng.srt
23.5 kB
IEEE Security and Privacy 2023/Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation.eng.srt
23.5 kB
IEEE Security and Privacy 2023/XFL Naming Functions in Binaries with Extreme Multi-label Learning.eng.srt
23.4 kB
IEEE Security and Privacy 2021/Did you mix me Formally Verifying Verifiable Mix Nets in Electronic Voting.eng.srt
23.4 kB
IEEE Security and Privacy 2023/Scaling JavaScript Abstract Interpretation to Detect and Exploit Node.js Taint-style Vulnerability.eng.srt
23.3 kB
IEEE Security and Privacy 2021/Machine unlearning.eng.srt
23.2 kB
IEEE Security and Privacy 2023/Towards a Rigorous Statistical Analysis of Empirical Password Datasets.eng.srt
23.2 kB
IEEE Security and Privacy 2019/Using Safety Properties to Generate Vulnerability Patches.eng.srt
23.0 kB
IEEE Security and Privacy 2023/Mew Enabling Large-Scale and Dynamic Link-Flooding Defenses on Programmable Switches.eng.srt
23.0 kB
IEEE Security and Privacy 2023/D-DAE Defense-Penetrating Model Extraction Attacks.eng.srt
22.9 kB
IEEE Security and Privacy 2021/Manipulation Attacks in Local Differential Privacy.eng.srt
22.9 kB
IEEE Security and Privacy 2023/Private Collaborative Data Cleaning via Non-Equi PSI.eng.srt
22.9 kB
IEEE Security and Privacy 2021/CrawlPhish Large-scale Analysis of Client-side Cloaking Techniques in Phishing.eng.srt
22.9 kB
IEEE Security and Privacy 2023/3DFed Adaptive and Extensible Framework for Covert Backdoor Attack in Federated Learning.eng.srt
22.8 kB
IEEE Security and Privacy 2023/Finding Specification Blind Spots via Fuzz Testing.eng.srt
22.8 kB
IEEE Security and Privacy 2023/Three-party Non-linear Computation without Preprocessing for Privacy-preserving Machine Learning.eng.srt
22.8 kB
IEEE Security and Privacy 2023/DevIOus Device-Driven Side-Channel Attacks on the IOMMU.eng.srt
22.8 kB
IEEE Security and Privacy 2023/QueryX Symbolic Query on Decompiled Code for Finding Bugs in COTS Binaries.eng.srt
22.7 kB
IEEE Security and Privacy 2023/Weak Fiat-Shamir Attacks on Modern Proof Systems.eng.srt
22.7 kB
IEEE Security and Privacy 2023/Attitudes towards Client-Side Scanning for CSAM, Terrorism, Drug Trafficking, Drug Use, Tax Evasion.eng.srt
22.6 kB
IEEE Security and Privacy 2019/Stealthy Porn Understanding Real World Adversarial Images for I'llicit Online Promotion.eng.srt
22.5 kB
IEEE Security and Privacy 2021/SIRNN A Math Library for Secure RNN Inference.eng.srt
22.5 kB
IEEE Security and Privacy 2022/Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms.srt
22.4 kB
IEEE Security and Privacy 2023/mmEcho A mmWave-based Acoustic Eavesdropping Method.eng.srt
22.3 kB
IEEE Security and Privacy 2021/Poltergeist Acoustic Manipulation of Image Stabilization towards Object Mis-Labeling.eng.srt
22.3 kB
IEEE Security and Privacy 2021/Fingerprinting the Fingerprinters Learning to Detect Browser Fingerprinting Behaviors.eng.srt
22.2 kB
IEEE Security and Privacy 2023/Protected or Porous A Comparative Analysis of Threat Detection Capability of IoT Safeguards.eng.srt
22.1 kB
IEEE Security and Privacy 2023/Discovering Java Deserialization Vulnerabilities via Structure-Aware Directed Greybox Fuzzing.eng.srt
22.0 kB
IEEE Security and Privacy 2023/Protecting Models Trained by Multi-party Learning with Differential Privacy.eng.srt
21.9 kB
IEEE Security and Privacy 2021/Co-Inflow Coarse-grained Information Flow Control for Java-like Languages.eng.srt
21.9 kB
IEEE Security and Privacy 2021/CacheOut Leaking Data on Intel CPUs via Cache Evictions.eng.srt
21.8 kB
IEEE Security and Privacy 2021/Cross Layer Attacks and How to Use Them (for DNS Cache Poisoning, Device Tracking and More).eng.srt
21.8 kB
IEEE Security and Privacy 2021/CANnon Reliable and Stealthy Remote Shutdown Attacks via Unaltered Automotive Microcontrollers.eng.srt
21.8 kB
IEEE Security and Privacy 2023/Low-effort VR Headset User Authentication Using Head-reverberated Sounds with Replay Resistance.eng.srt
21.8 kB
IEEE Security and Privacy 2023/DepthFake Spoofing 3D Face Authentication with a 2D Photo.eng.srt
21.8 kB
IEEE Security and Privacy 2023/WarpAttack Bypassing CFI through Compiler-Introduced Double-Fetches.eng.srt
21.4 kB
IEEE Security and Privacy 2021/Post-Quantum WireGuard.eng.srt
21.3 kB
IEEE Security and Privacy 2023/Accuracy-Privacy Trade-off in Deep Ensemble A Membership Inference Perspective.eng.srt
21.3 kB
IEEE Security and Privacy 2019/PrivKV Key Value Data Collection with Local Differential Privacy.eng.srt
21.3 kB
IEEE Security and Privacy 2021/Hardware-Software Contracts for Secure Speculation.eng.srt
21.3 kB
IEEE Security and Privacy 2021/Lockable Signatures for Blockchains Scriptless Scripts for all Signatures.eng.srt
21.2 kB
IEEE Security and Privacy 2023/UTOPIA Automatic Generation of Fuzz Driver using Unit Tests.eng.srt
21.2 kB
IEEE Security and Privacy 2022/Transfer Attacks Revisited A Large-Scale Empirical Study in Real Computer Vision Settings.srt
21.1 kB
IEEE Security and Privacy 2023/Tyr Finding Consensus Failure Bugs in Blockchain System with Behaviour Divergent Model.eng.srt
21.1 kB
IEEE Security and Privacy 2023/Jolt Recovering TLS Signing Keys via Rowhammer Faults.eng.srt
21.0 kB
IEEE Security and Privacy 2023/A Generic, Efficient, and Effortless Solver with Self-Supervised Learning for Breaking Text Captchas.eng.srt
20.9 kB
IEEE Security and Privacy 2021/MAD-HTLC Because HTLC is Crazy-Cheap to Attack.eng.srt
20.9 kB
IEEE Security and Privacy 2021/On the Just-In-Time Discovery of Profit-Generating Transactions in DeFi Protocols.eng.srt
20.8 kB
IEEE Security and Privacy 2021/Bomberman Defining and Defeating Hardware Ticking Timebombs at Design-time.eng.srt
20.8 kB
IEEE Security and Privacy 2019/IEEE S&P 2019 - Opening Remarks - General Chair.eng.srt
20.7 kB
IEEE Security and Privacy 2021/Pegasus Bridging Polynomial and Non-polynomial Evaluations in Homomorphic Encryption.eng.srt
20.7 kB
IEEE Security and Privacy 2023/Volttack Control IoT Devices by Manipulating Power Supply Voltage.eng.srt
20.6 kB
IEEE Security and Privacy 2021/CRYLOGGER Detecting Crypto Misuses Dynamically.eng.srt
20.6 kB
IEEE Security and Privacy 2023/FIDO2, CTAP 2.1, and WebAuthn 2 Provable Security and Post-Quantum Instantiation.eng.srt
20.4 kB
IEEE Security and Privacy 2023/REDEEM MYSELF Purifying Backdoors in Deep Learning Models using Self Attention Distillation.eng.srt
20.4 kB
IEEE Security and Privacy 2023/FedRecover Recovering from Poisoning Attacks in Federated Learning using Historical Information.eng.srt
20.3 kB
IEEE Security and Privacy 2021/Proactive Threshold Wallets with Offline Devices.eng.srt
20.2 kB
IEEE Security and Privacy 2023/PublicCheck Public Integrity Verification for Services of Run-time Deep Models.eng.srt
20.0 kB
IEEE Security and Privacy 2021/Reading Between the Lines An Extensive Evaluation of the Security and Privacy Implications ....eng.srt
19.8 kB
IEEE Security and Privacy 2022/MeshUp Stateless Cache Side-channel Attack on CPU Mesh.srt
19.7 kB
IEEE Security and Privacy 2023/Continual Observation under User-level Differential Privacy.eng.srt
19.7 kB
IEEE Security and Privacy 2023/DeHiREC Detecting Hidden Voice Recorders via ADC Electromagnetic Radiation.eng.srt
19.7 kB
IEEE Security and Privacy 2021/Randomized Last-Level Caches Are Still Vulnerable to Cache Side-Channel Attacks But We Can Fix It.eng.srt
19.4 kB
IEEE Security and Privacy 2021/Runtime Recovery of Web Applications under Zero-Day ReDoS Attacks.eng.srt
19.3 kB
IEEE Security and Privacy 2021/SGUARD Smart Contracts Made Vulnerability-Free.eng.srt
19.0 kB
IEEE Security and Privacy 2021/Compositional Security for Reentrant Applications.eng.srt
18.8 kB
IEEE Security and Privacy 2021/Compositional Non-Interference for Fine-Grained Concurrent Programs.eng.srt
18.8 kB
IEEE Security and Privacy 2021/Detecting AI Trojans Using Meta Neural Analysis.eng.srt
18.7 kB
IEEE Security and Privacy 2023/PLA-LiDAR Physical Laser Attacks against LiDAR-based 3D Object Detection in Autonomous Vehicle.eng.srt
18.7 kB
IEEE Security and Privacy 2023/SQUIP Exploiting the Scheduler Queue Contention Side Channel.eng.srt
18.6 kB
IEEE Security and Privacy 2021/Trouble Over-The-Air An Analysis of FOTA Apps in the Android Ecosystem.eng.srt
18.5 kB
IEEE Security and Privacy 2023/Limits of I O Based Ransomware Detection An Imitation Based Attack.eng.srt
18.2 kB
IEEE Security and Privacy 2023/Understanding the (In)Security of Cross-side Face Verification Systems in Mobile Apps.eng.srt
18.2 kB
IEEE Security and Privacy 2023/MagBackdoor Beware of Your Loudspeaker as A Backdoor For Magnetic Injection Attacks.eng.srt
17.9 kB
IEEE Security and Privacy 2023/On The Empirical Effectiveness of Unrealistic Adversarial Hardening Against Realistic Attacks.eng.srt
17.8 kB
IEEE Security and Privacy 2021/ConDySTA Context-Aware Dynamic Supplement to Static Tain't Analysis.eng.srt
17.4 kB
IEEE Security and Privacy 2023/Investigating Package Related Security Threats in Software Registries.eng.srt
17.3 kB
IEEE Security and Privacy 2021/How Did That Get In My Phone Unwanted App Distribution on Android Devices.eng.srt
17.3 kB
IEEE Security and Privacy 2021/Real-World Snapshots vs. Theory Questioning the t-Probing Security Model..eng.srt
17.3 kB
IEEE Security and Privacy 2023/On the Evolution of (Hateful) Memes by Means of Multimodal Contrastive Learning.eng.srt
17.3 kB
IEEE Security and Privacy 2021/Linking Bluetooth LE & Classic and Implications for Privacy-Preserving Bluetooth-Based Protocols.eng.srt
16.8 kB
IEEE Security and Privacy 2021/Data Privacy in Trigger-Action IoT Systems.eng.srt
16.3 kB
IEEE Security and Privacy 2021/SoK All You Ever Wanted to Know About Binary Disassembly But Were Afraid to Ask.eng.srt
16.3 kB
IEEE Security and Privacy 2023/Continuous Intrusion Characterizing the Security of Continuous Integration Services.eng.srt
16.2 kB
IEEE Security and Privacy 2021/Who is Real Bob Adversarial Attacks on Speaker Recognition Systems.eng.srt
16.0 kB
IEEE Security and Privacy 2021/One Engine to Fuzz 'em All Generic Language Processor Testing with Semantic Validation.eng.srt
15.0 kB
IEEE Security and Privacy 2023/Leaking Arbitrarily Many Secrets Any-out-of-Many Proofs and Applications to RingCT Protocols.eng.srt
14.8 kB
IEEE Security and Privacy 2021/DIFUZZRTL Differential Fuzz Testing to Find CPU Bugs.eng.srt
14.8 kB
IEEE Security and Privacy 2021/An I O Separation Model for Formal Verification of Kernel Implementations.eng.srt
14.7 kB
IEEE Security and Privacy 2015/Opening Remarks of the 2015 IEEE Symposium on Security & Privacy.eng.srt
14.4 kB
IEEE Security and Privacy 2021/Ed25519 Signature Schemes Theory and Practice.eng.srt
12.9 kB
IEEE Security and Privacy 2021/DICE Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis.eng.srt
12.4 kB
IEEE Security and Privacy 2021/Red Belly a Deterministic Scalable Open Permissioned Blockchain.eng.srt
10.4 kB
IEEE Security and Privacy 2019/IEEE S&P 2019 - Awards Ceremony.eng.srt
10.3 kB
IEEE logo.jpg
8.5 kB
IEEE Security and Privacy thank you.txt
1.0 kB
随机展示
相关说明
本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!
>