搜索
IEEE Security & Privacy
磁力链接/BT种子名称
IEEE Security & Privacy
磁力链接/BT种子简介
种子哈希:
e3f959529c97f8f7e9e49379ef73f3c82b15831c
文件大小:
15.42G
已经下载:
143
次
下载速度:
极快
收录时间:
2024-10-29
最近下载:
2024-11-30
移花宫入口
移花宫.com
邀月.com
怜星.com
花无缺.com
yhgbt.icu
yhgbt.top
磁力链接下载
magnet:?xt=urn:btih:E3F959529C97F8F7E9E49379EF73F3C82B15831C
推荐使用
PIKPAK网盘
下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看
下载BT种子文件
磁力链接
迅雷下载
PIKPAK在线播放
91视频
含羞草
欲漫涩
逼哩逼哩
成人快手
51品茶
抖阴破解版
暗网禁地
91短视频
TikTok成人版
PornHub
草榴社区
乱伦社区
最近搜索
裸体秀
vicats
男爵+
我本初中+无密码
女体狂乱
直筆サイン入り生チェキ
the descent 2005
brokemodel
知一妹妹
纹身店
+七天探花合集
hjbb-182
of私
愛在黑夜
群p爆操
日本兄妹
minion
擦玻璃
metro.2013
演戏
李恩珠
the+intruder
sufiyum sujatayum 2020
天降女子
主动可爱
甜蛋黄
高压监狱
年上
美军
极品 直播
文件列表
IEEE Security & Privacy 2020/SSP 2020 Opening Remarks.mp4
100.6 MB
IEEE Security & Privacy 2022/LangSec Keynote Trojan Source and Bad Characters Invisible Hacks and Reluctant Patching.mp4
69.6 MB
IEEE Security & Privacy 2022/Invisible Finger Practical Electromagnetic Interference Attack on Touchscreen Electronic Devices.mp4
52.6 MB
IEEE Security & Privacy 2022/IEEE S&P 2022 Opening Session.mp4
51.6 MB
IEEE Security & Privacy 2015/Temporal Lensing and Its Application in Pulsing Denial-of-Service Attacks.mp4
51.6 MB
IEEE Security & Privacy 2015/Missing the Point(er) - On the Effectiveness of Code Pointer Integrity.mp4
50.5 MB
IEEE Security & Privacy 2019/IEEE S&P 2019 - 40th Celebration Plenary Session Panel Reflections on four decades of the symposium.mp4
46.4 MB
IEEE Security & Privacy 2016/NITRD Panel - Federal Cybersecurity and Privacy R&D Strategic Plans.mp4
45.6 MB
IEEE Security & Privacy 2015/SurroundWeb - Mitigating Privacy Concerns in a 3D Web Browser.mp4
44.7 MB
IEEE Security & Privacy 2023/IEEE S&P 2023 Short Talks.mp4
41.6 MB
IEEE Security & Privacy 2019/IEEE S&P 2019 - TC Business Meeting.mp4
40.9 MB
IEEE Security & Privacy 2017/Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping.mp4
40.8 MB
IEEE Security & Privacy 2015/Secure Track Verification.mp4
40.3 MB
IEEE Security & Privacy 2015/High System-Code Security with Low Overhead.mp4
40.2 MB
IEEE Security & Privacy 2022/Security Foundations for Application-Based Covert Communication Channels.mp4
39.4 MB
IEEE Security & Privacy 2015/Riposte - An Anonymous Messaging System Handling Millions of Users.mp4
39.0 MB
IEEE Security & Privacy 2015/Forward Secure Asynchronous Messaging from Puncturable Encryption.mp4
38.4 MB
IEEE Security & Privacy 2022/Practical EMV Relay Protection.mp4
37.9 MB
IEEE Security & Privacy 2015/Cross-Architecture Bug Search in Binary Executables.mp4
37.8 MB
IEEE Security & Privacy 2024/2024 431 Routing Attacks on Cryptocurrency Mining Pools - Muoi Tran.mp4
37.2 MB
IEEE Security & Privacy 2017/SoK - Science, Security, and the Elusive Goal of Security as a Scientific Pursuit.mp4
36.6 MB
IEEE Security & Privacy 2022/SoK The Dual Nature of Technology in Sexual Assault.mp4
36.0 MB
IEEE Security & Privacy 2015/The Attack of the Clones - A Study of the Impact of Shared Code on Vulnerability Patching.mp4
35.6 MB
IEEE Security & Privacy 2022/Peekaboo A Hub-Based Approach to Enable Transparency in Data Processing within Smart Homes.mp4
35.5 MB
IEEE Security & Privacy 2016/S&P TC Business Meeting.mp4
35.1 MB
IEEE Security & Privacy 2015/S$A - A Shared Cache Attack That Works across Cores and Defies VM Sandboxing.mp4
34.4 MB
IEEE Security & Privacy 2022/SwarmFlawFinder Discovering and Exploiting Logic Flaws of Swarm Algorithms.mp4
33.5 MB
IEEE Security & Privacy 2015/GenoGuard - Protecting Genomic Data against Brute-Force Attacks.mp4
32.4 MB
IEEE Security & Privacy 2022/Practical Asynchronous Distributed Key Generation.mp4
32.4 MB
IEEE Security & Privacy 2017/VUDDY - A Scalable Approach for Vulnerable Code Clone Discovery.mp4
32.0 MB
IEEE Security & Privacy 2015/Security of the J-PAKE Password-Authenticated Key Exchange Protocol.mp4
31.8 MB
IEEE Security & Privacy 2015/Towards Making Systems Forget with Machine Unlearning.mp4
31.5 MB
IEEE Security & Privacy 2022/Evaluating Physical-Layer BLE Location Tracking Attacks on Mobile Devices.mp4
31.2 MB
IEEE Security & Privacy 2017/Backward-bounded DSE - Targeting Infeasibility Questions on Obfuscated Codes.mp4
31.2 MB
IEEE Security & Privacy 2022/TASHAROK-Using Mechanism Design for Enhancing Security Resource Allocation in Interdependent Systems.mp4
31.1 MB
IEEE Security & Privacy 2022/Anti-Tamper Radio System-Level Tamper Detection for Computing Systems.mp4
30.7 MB
IEEE Security & Privacy 2017/IKP - Turning a PKI Around with Decentralized Automated Incentives.mp4
30.7 MB
IEEE Security & Privacy 2024/MIMOCrypt - Jun Luo John.mp4
30.7 MB
IEEE Security & Privacy 2015/Understanding and Monitoring Embedded Web Scripts.mp4
30.5 MB
IEEE Security & Privacy 2017/SymCerts - Practical Symbolic Execution For Exposing Noncompliance in X.509 Certificate Validation.mp4
30.4 MB
IEEE Security & Privacy 2022/SoK Unifying and Applying At-Risk User Research.mp4
30.2 MB
IEEE Security & Privacy 2022/IRShield A Countermeasure Against Adversarial Physical-Layer Wireless Sensing.mp4
30.2 MB
IEEE Security & Privacy 2015/SoK - Deep Packer Inspection - A Longitudinal Study of the Complexity of Run-Time Packers.mp4
30.0 MB
IEEE Security & Privacy 2015/On Subnormal Floating Point and Abnormal Timing.mp4
30.0 MB
IEEE Security & Privacy 2022/HardLog Practical Tamper-Proof System Auditing Using a Novel Audit Device.mp4
29.8 MB
IEEE Security & Privacy 2015/Micro-Policies - Formally Verified, Tag-Based Security Monitors.mp4
29.8 MB
IEEE Security & Privacy 2015/ADSNARK - Nearly Practical and Privacy-Preserving Proofs on Authenticated Data.mp4
29.8 MB
IEEE Security & Privacy 2022/They're not that hard to mitigate -What Cryptographic Library Developers Think About Timing Attacks.mp4
29.8 MB
IEEE Security & Privacy 2022/Domains Do Change Their Spots Quantifying Potential Abuse of Residual Trust.mp4
29.8 MB
IEEE Security & Privacy 2015/SoK - Research Perspectives and Challenges for Bitcoin and Cryptocurrencies.mp4
29.8 MB
IEEE Security & Privacy 2015/Counterfeit Object-oriented Programming.mp4
29.7 MB
IEEE Security & Privacy 2015/What the App is That Deception and Countermeasures in the Android User Interface.mp4
29.5 MB
IEEE Security & Privacy 2022/A Formal Security Analysis of the W3C Web Payment APIs Attacks and Verification.mp4
29.5 MB
IEEE Security & Privacy 2022/Noise A Library of Verified High-Performance Secure Channel Protocol Implementations.mp4
29.1 MB
IEEE Security & Privacy 2017/Hijacking Bitcoin - Routing Attacks on Cryptocurrencies.mp4
29.0 MB
IEEE Security & Privacy 2019/LBM A Security Framework for Peripherals within the Linux Kernel.mp4
29.0 MB
IEEE Security & Privacy 2017/SmarPer - Context-Aware and Automatic Runtime-Permissions for Mobile Devices.mp4
28.7 MB
IEEE Security & Privacy 2019/Hard Drive of Hearing Disks that Eavesdrop with a Synthesized Microphone.mp4
28.7 MB
IEEE Security & Privacy 2022/How Does Usable Security Not End Up in Software Products Results From a Qualitative Interview Study.mp4
28.7 MB
IEEE Security & Privacy 2015/Post-Quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors Problem.mp4
28.6 MB
IEEE Security & Privacy 2022/Measuring and Mitigating the Risk of IP Reuse on Public Clouds.mp4
28.2 MB
IEEE Security & Privacy 2022/A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols.mp4
27.8 MB
IEEE Security & Privacy 2017/Cloak and Dagger - From Two Permissions to Complete Control of the UI Feedback Loop.mp4
27.8 MB
IEEE Security & Privacy 2019/Drones' Cryptanalysis - Detecting Privacy Invasion Attacks Conducted by Drone.mp4
27.5 MB
IEEE Security & Privacy 2019/Why Does Your Data Leak Uncovering the Data Leakage in Cloud from Mobile Apps.mp4
27.4 MB
IEEE Security & Privacy 2017/Scalable Bias-Resistant Distributed Randomness.mp4
27.2 MB
IEEE Security & Privacy 2017/Is Interaction Necessary for Distributed Private Learning.mp4
27.1 MB
IEEE Security & Privacy 2022/Mitigating Information Leakage Vulnerabilities with Type-based Data Isolation.mp4
27.0 MB
IEEE Security & Privacy 2017/SysPal System-guided Pattern Locks for Android.mp4
26.8 MB
IEEE Security & Privacy 2017/vSQL - Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases.mp4
26.7 MB
IEEE Security & Privacy 2015/Privacy and Access Control for Outsourced Personal Records.mp4
26.6 MB
IEEE Security & Privacy 2021/An Interactive Prover for Protocol Verification in the Computational Model.mp4
26.6 MB
IEEE Security & Privacy 2017/A Lustrum of Malware Network Communication - Evolution and Insights.mp4
26.6 MB
IEEE Security & Privacy 2017/Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate.mp4
26.6 MB
IEEE Security & Privacy 2015/Bitcoin over Tor isn't a Good Idea.mp4
26.4 MB
IEEE Security & Privacy 2019/Security of GPS INS based On-road Location Tracking Systems.mp4
26.4 MB
IEEE Security & Privacy 2020/Birds of a Feather A Hardware & Security Panel (Updated).mp4
26.4 MB
IEEE Security & Privacy 2017/HVLearn - Automated Black-box Analysis of Hostname Verification in SSL TLS Implementations.mp4
26.3 MB
IEEE Security & Privacy 2019/Formally Verified Cryptographic Web Applications in WebAssembly.mp4
26.3 MB
IEEE Security & Privacy 2022/Spook.js Attacking Chrome Strict Site Isolation via Speculative Execution.mp4
26.3 MB
IEEE Security & Privacy 2017/CRLite - A Scalable System for Pushing All TLS Revocations to All Browsers.mp4
26.2 MB
IEEE Security & Privacy 2024/Eureka Presentation - Yu Wei.mp4
26.1 MB
IEEE Security & Privacy 2019/SoK Shining Light on Shadow Stacks.mp4
26.1 MB
IEEE Security & Privacy 2022/Heapster Analyzing the Security of Dynamic Allocators for Monolithic Firmware Images.mp4
26.0 MB
IEEE Security & Privacy 2015/Malicious-Client Security in Blind Seer - A Scalable Private DBMS.mp4
25.9 MB
IEEE Security & Privacy 2015/Readactor - Practical Code Randomization Resilient to Memory Disclosure.mp4
25.9 MB
IEEE Security & Privacy 2017/XHOUND - Quantifying the Fingerprintability of Browser Extensions.mp4
25.8 MB
IEEE Security & Privacy 2022/ShadeWatcher Recommendation-guided Cyber Threat Analysis using System Audit Records.mp4
25.8 MB
IEEE Security & Privacy 2017/Protecting Bare-metal Embedded Systems with Privilege Overlays.mp4
25.8 MB
IEEE Security & Privacy 2022/K-Scheduler Effective Seed Scheduling for Fuzzing with Graph Centrality Analysis.mp4
25.7 MB
IEEE Security & Privacy 2015/Program-Adaptive Mutational Fuzzing.mp4
25.6 MB
IEEE Security & Privacy 2022/vSGX Virtualizing SGX Enclaves on AMD SEV.mp4
25.6 MB
IEEE Security & Privacy 2022/Investigating Influencer VPN Ads on YouTube.mp4
25.6 MB
IEEE Security & Privacy 2019/If HTTPS Were Secure I wouldn't Need 2FA End User and Administrator Mental Models of HTTPS.mp4
25.6 MB
IEEE Security & Privacy 2019/Breaking LTE on Layer Two.mp4
25.5 MB
IEEE Security & Privacy 2019/Dangerous Skills Understanding and Mitigating Security Risks of Voice-Controlled Third-Party.mp4
25.3 MB
IEEE Security & Privacy 2017/Counter-RAPTOR - Safeguarding Tor Against Active Routing Attacks.mp4
25.2 MB
IEEE Security & Privacy 2017/Identifying Personal DNA Methylation Profiles by Genotype Inference.mp4
25.2 MB
IEEE Security & Privacy 2022/Reconstructing Training Data with Informed Adversaries.mp4
25.2 MB
IEEE Security & Privacy 2019/Data Recovery on Encrypted Databases with k-Nearest Neighbor Query Leakage.mp4
25.1 MB
IEEE Security & Privacy 2022/SPURT Scalable Distributed Randomness Beacon with Transparent Setup.mp4
25.1 MB
IEEE Security & Privacy 2015/A Messy State of the Union - Taming the Composite State Machines of TLS.mp4
25.1 MB
IEEE Security & Privacy 2017/A Framework for Universally Composable Diffie-Hellman Key Exchange.mp4
24.9 MB
IEEE Security & Privacy 2022/Delay Wreaks Havoc on Your Smart Home Delay-based Automation Interference Attacks.mp4
24.9 MB
IEEE Security & Privacy 2017/SoK - Cryptographically Protected Database Search.mp4
24.8 MB
IEEE Security & Privacy 2022/Formal Model-Driven Discovery of Bluetooth Protocol Design Vulnerabilities.mp4
24.8 MB
IEEE Security & Privacy 2019/New Primitives for Actively-Secure MPC over Rings with Applications to Private Machine Learning.mp4
24.8 MB
IEEE Security & Privacy 2024/2024 62 Enforcing End to end Security for Remote Conferencing - Triste L.mp4
24.8 MB
IEEE Security & Privacy 2019/Dominance as a New Trusted Computing Primitive for the IoT.mp4
24.7 MB
IEEE Security & Privacy 2015/Caelus - Verifying the Consistency of Cloud Services with Battery-Powered Devices.mp4
24.7 MB
IEEE Security & Privacy 2015/Using Hardware Features for Increased Debugging Transparency.mp4
24.6 MB
IEEE Security & Privacy 2017/Pyramid - Enhancing Selectivity in Big Data Protection with Count Featurization.mp4
24.6 MB
IEEE Security & Privacy 2017/Side-Channel Attacks on Shared Search Indexes.mp4
24.6 MB
IEEE Security & Privacy 2022/SIRAJ A Unified Framework for Aggregation of Malicious Entity Detectors.mp4
24.6 MB
IEEE Security & Privacy 2022/Desperate Times Call for Desperate Measures - User Concerns with Mobile Loan Apps in Kenya.mp4
24.5 MB
IEEE Security & Privacy 2022/IRQDebloat Reducing Driver Attack Surface in Embedded Devices.mp4
24.4 MB
IEEE Security & Privacy 2017/IoT Goes Nuclear - Creating a Zigbee Chain Reaction.mp4
24.3 MB
IEEE Security & Privacy 2017/Implementing and Proving the TLS 1.3 Record Layer.mp4
24.3 MB
IEEE Security & Privacy 2023/Examining Zero-Shot Vulnerability Repair with Large Language Models.mp4
24.3 MB
IEEE Security & Privacy 2017/Optimized Honest-Majority MPC for Malicious Adversaries - Breaking 1 Billion-Gate Second Barrier.mp4
24.3 MB
IEEE Security & Privacy 2017/How They Did It - An Analysis of Emission Defeat Devices in Modern Automobiles.mp4
24.2 MB
IEEE Security & Privacy 2017/One TPM to Bind Them All - Fixing TPM2.0 for Provably Secure Anonymous Attestation.mp4
24.2 MB
IEEE Security & Privacy 2023/Space Odyssey An Experimental Software Security Analysis of Satellites.mp4
24.2 MB
IEEE Security & Privacy 2022/Deployment of Source Address Validation by Network Operators A Randomized Control Trial.mp4
24.2 MB
IEEE Security & Privacy 2017/Finding and Preventing Bugs in JavaScript Bindings.mp4
24.2 MB
IEEE Security & Privacy 2022/RT-TEE Real-time System Availability for Cyber-physical Systems using ARM TrustZone.mp4
24.1 MB
IEEE Security & Privacy 2017/From Trash to Treasure - Timing-Sensitive Garbage Collection.mp4
24.1 MB
IEEE Security & Privacy 2015/Every Second Counts - Quantifying the Negative Externalities of Cybercrime via Typosquatting.mp4
24.1 MB
IEEE Security & Privacy 2019/How Well Do My Results Generalize Comparing Security and Privacy Survey Results from.mp4
24.0 MB
IEEE Security & Privacy 2015/Virtual Proofs of Reality and their Physical Implementation.mp4
24.0 MB
IEEE Security & Privacy 2017/Hardening Java's Access Control by Abolishing Implicit Privilege Elevation.mp4
23.9 MB
IEEE Security & Privacy 2023/WarpAttack Bypassing CFI through Compiler-Introduced Double-Fetches.mp4
23.9 MB
IEEE Security & Privacy 2019/Touching the Untouchables Dynamic Security Analysis of the LTE Control Plane.mp4
23.8 MB
IEEE Security & Privacy 2022/ProVerif with Lemmas, Induction, Fast Subsumption, and Much More.mp4
23.8 MB
IEEE Security & Privacy 2022/DeepSteal Advanced Model Extractions Leveraging Efficient Weight Stealing in Memories.mp4
23.7 MB
IEEE Security & Privacy 2015/CHERI - A Hybrid Capability-System Architecture for Scalable Software Compartmentalization.mp4
23.7 MB
IEEE Security & Privacy 2017/Norax - Enabling Execute-Only Memory for COTS Binaries on AArch64.mp4
23.6 MB
IEEE Security & Privacy 2022/Copy, Right A Testing Framework for Copyright Protection of Deep Learning Models.mp4
23.5 MB
IEEE Security & Privacy 2022/DeepCASE Semi-Supervised Contextual Analysis of Security Events.mp4
23.5 MB
IEEE Security & Privacy 2022/Sphinx Enabling Privacy-Preserving Online Learning over the Cloud.mp4
23.4 MB
IEEE Security & Privacy 2019/ProFuzzer On-the-fly Input Type Probing for Better Zero-day Vulnerability Discovery.mp4
23.4 MB
IEEE Security & Privacy 2019/SensorID Sensor Calibration Fingerprinting for Smartphones.mp4
23.4 MB
IEEE Security & Privacy 2022/Time-Print Authenticating USB Flash Drives with Novel Timing Fingerprints.mp4
23.4 MB
IEEE Security & Privacy 2024/Cohere Managing Differential Privacy in Large Scale Systems - Nicolas Küchler.mp4
23.3 MB
IEEE Security & Privacy 2015/How Secure and Quick is QUIC Provable Security and Performance Analyses.mp4
23.3 MB
IEEE Security & Privacy 2022/Privacy-from-Birth Protecting Sensed Data from Malicious Sensors with VERSA.mp4
23.3 MB
IEEE Security & Privacy 2017/To Catch a Ratter - Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild.mp4
23.3 MB
IEEE Security & Privacy 2023/Inducing Wireless Chargers to Voice Out for Inaudible Command Attacks.mp4
23.3 MB
IEEE Security & Privacy 2022/Membership inference attacks from first principles.mp4
23.2 MB
IEEE Security & Privacy 2022/SoK Social Cybersecurity.mp4
23.2 MB
IEEE Security & Privacy 2015/Geppetto - Versatile Verifiable Computation.mp4
23.2 MB
IEEE Security & Privacy 2020/Birds of a Feather Sharing Cybersecurity Research Artifacts To Accelerate Progress.mp4
23.2 MB
IEEE Security & Privacy 2015/Connection-Oriented DNS to Improve Privacy and Security.mp4
23.1 MB
IEEE Security & Privacy 2022/Repairing DoS Vulnerability of Real-World Regexes.mp4
23.1 MB
IEEE Security & Privacy 2022/Asleep at the Keyboard Assessing the Security of GitHub Copilot's Code Contributions.mp4
23.1 MB
IEEE Security & Privacy 2022/CirC Compiler infrastructure for proof systems, software verification, and more.mp4
23.1 MB
IEEE Security & Privacy 2015/Effective Real-Time Android Application Auditing.mp4
23.1 MB
IEEE Security & Privacy 2019/Asm2Vec Boosting Static Representation Robustness for Binary Clone Search.mp4
23.1 MB
IEEE Security & Privacy 2017/Leakage-Abuse Attacks on Order-Revealing Encryption.mp4
23.0 MB
IEEE Security & Privacy 2017/An Experimental Security Analysis of an Industrial Robot Controller.mp4
22.9 MB
IEEE Security & Privacy 2016/Verifiable ASICs.mp4
22.8 MB
IEEE Security & Privacy 2022/Blacksmith Compromising Target Row Refresh by Rowhammering in the Frequency Domain.mp4
22.8 MB
IEEE Security & Privacy 2022/Finding and Exploiting CPU Features using MSR Templating.mp4
22.8 MB
IEEE Security & Privacy 2019/Synesthesia Detecting Screen Content via Remote Acoustic Side Channels.mp4
22.7 MB
IEEE Security & Privacy 2015/Vetting SSL Usage in Applications with SSLINT.mp4
22.5 MB
IEEE Security & Privacy 2017/NEZHA - Efficient Domain-independent Differential Testing.mp4
22.5 MB
IEEE Security & Privacy 2015/GraphSC - Parallel Secure Computation Made Easy.mp4
22.5 MB
IEEE Security & Privacy 2023/Discop Provably Secure Steganography in Practice Based on Distribution Copies.mp4
22.5 MB
IEEE Security & Privacy 2019/Learning to Reconstruct Statistical Learning Theory and Encrypted Database Attacks.mp4
22.5 MB
IEEE Security & Privacy 2015/Securing Multiparty Online Services Via Certification of Symbolic Transactions.mp4
22.4 MB
IEEE Security & Privacy 2015/ObliVM - A Programming Framework for Secure Computation.mp4
22.3 MB
IEEE Security & Privacy 2019/Simple High-Level Code for Cryptographic Arithmetic - With Proofs, Without Compromises.mp4
22.3 MB
IEEE Security & Privacy 2015/VC3 - Trustworthy Data Analytics in the Cloud Using SGX.mp4
22.3 MB
IEEE Security & Privacy 2019/Spectre Attacks Exploiting Speculative Execution.mp4
22.3 MB
IEEE Security & Privacy 2017/Stack Overflow Considered Harmful - The Impact of Copy&Paste on Android Application Security.mp4
22.2 MB
IEEE Security & Privacy 2015/Protecting Private Keys against Memory Disclosure Attacks Using Hardware Transactional Memory.mp4
22.2 MB
IEEE Security & Privacy 2024/From Chatbots to Phishbots Phishing Scam Generation in Commercial Large Language Models - Sayak.mp4
22.2 MB
IEEE Security & Privacy 2023/Certifiably Robust Object Detection against Patch Hiding Attacks via Patch-agnostic Masking.mp4
22.1 MB
IEEE Security & Privacy 2019/SoK General Purpose Frameworks for Secure Multi-Party Computation.mp4
22.1 MB
IEEE Security & Privacy 2022/Phishing in Organizations Findings from a Large-Scale and Long-Term Study.mp4
22.0 MB
IEEE Security & Privacy 2022/mmSpy Spying Phone Calls using mmWave Radars.mp4
21.9 MB
IEEE Security & Privacy 2016/Keeping Authorities - Honest or Bust - with Decentralized Witness Cosigning.mp4
21.9 MB
IEEE Security & Privacy 2019/Reasoning Analytically About Password Cracking Software Alex Liu.mp4
21.9 MB
IEEE Security & Privacy 2023/SCAPHY Detecting Modern ICS Attacks by Correlating Behaviors in SCADA and PHYsical.mp4
21.9 MB
IEEE Security & Privacy 2023/Confident Monte Carlo Rigorous Analysis of Guessing Curves for Probabilistic Password Models.mp4
21.9 MB
IEEE Security & Privacy 2019/SoK Sanitizing for Security Dokyung Song.mp4
21.9 MB
IEEE Security & Privacy 2022/How to Attack and Generate Honeywords.mp4
21.9 MB
IEEE Security & Privacy 2015/The Miner's Dilemma.mp4
21.8 MB
IEEE Security & Privacy 2023/LAMBRETTA Learning to Rank for Twitter Soft Moderation.mp4
21.8 MB
IEEE Security & Privacy 2023/Is Cryptographic Deniability Sufficient Non-Expert Perceptions of Deniability in Secure Messaging.mp4
21.8 MB
IEEE Security & Privacy 2022/Publicly Accountable Robust Multi-Party Computation.mp4
21.7 MB
IEEE Security & Privacy 2022/BadEncoder Backdoor Attacks to Pre-trained Encoders in Self-Supervised Learning.mp4
21.6 MB
IEEE Security & Privacy 2024/2024 05 22 02 41 48 H 264 - Rui Xi.mp4
21.6 MB
IEEE Security & Privacy 2022/Wobfuscator Obfuscating JavaScript Malware via Opportunistic Translation to WebAssembly.mp4
21.6 MB
IEEE Security & Privacy 2022/SoK How Robust is Image Classification Deep Neural Network Watermarking.mp4
21.5 MB
IEEE Security & Privacy 2023/SNAP Efficient Extraction of Private Properties with Poisoning.mp4
21.5 MB
IEEE Security & Privacy 2019/Comprehensive Privacy Analysis of Deep Learning.mp4
21.4 MB
IEEE Security & Privacy 2019/The Code That Never Ran Modeling Attacks on Speculative Evaluation.mp4
21.3 MB
IEEE Security & Privacy 2022/PGPATCH Policy-Guided Logic Bug Patching for Robotic Vehicles.mp4
21.3 MB
IEEE Security & Privacy 2019/Exploiting Correcting Codes On the Effectiveness of ECC Memory Against Rowhammer Attacks.mp4
21.3 MB
IEEE Security & Privacy 2015/TinyGarble - Highly Compressed and Scalable Sequential Garbled Circuits.mp4
21.2 MB
IEEE Security & Privacy 2019/SoK Security Evaluation of Home Based IoT Deployment.mp4
21.2 MB
IEEE Security & Privacy 2022/SYMBEXCEL Automated Analysis and Understanding of Malicious Excel 4.0 Macros.mp4
21.2 MB
IEEE Security & Privacy 2022/FuzzUSB Hybrid Stateful Fuzzing of USB Gadget Stacks.mp4
21.2 MB
IEEE Security & Privacy 2019/Stealthy Porn Understanding Real World Adversarial Images for I'llicit Online Promotion.mp4
21.1 MB
IEEE Security & Privacy 2023/PyFET Forensically Equivalent Transformation for Python Binary Decompilation.mp4
21.1 MB
IEEE Security & Privacy 2019/Using Safety Properties to Generate Vulnerability Patches.mp4
21.1 MB
IEEE Security & Privacy 2016/Users Really Do Plug in USB Drives They Find.mp4
21.1 MB
IEEE Security & Privacy 2016/A2 - Analog Malicious Hardware.mp4
21.0 MB
IEEE Security & Privacy 2017/Verifying and Synthesizing Constant-Resource Implementations with Types.mp4
21.0 MB
IEEE Security & Privacy 2019/Characterizing Pixel Tracking through the Lens of Disposable Email Services.mp4
21.0 MB
IEEE Security & Privacy 2019/The 9 Lives of Bleichenbachers CAT New Cache ATtacks on TLS Implementations.mp4
21.0 MB
IEEE Security & Privacy 2016/CaSE - Cache-Assisted Secure Execution on ARM Processors.mp4
21.0 MB
IEEE Security & Privacy 2017/Securing Augmented Reality Output.mp4
21.0 MB
IEEE Security & Privacy 2023/Deep perceptual hashing algorithms with hidden dual purpose client-side scanning facial recognition.mp4
20.9 MB
IEEE Security & Privacy 2022/Spinning Language Models Risks of Propaganda-as-a-Service and Countermeasures.mp4
20.9 MB
IEEE Security & Privacy 2017/Augur - Internet-Wide Detection of Connectivity Disruptions.mp4
20.8 MB
IEEE Security & Privacy 2022/PICCOLO Exposing Complex Backdoors in NLP Transformer Models.mp4
20.8 MB
IEEE Security & Privacy 2015/A Generic Approach to Automatic Deobfuscation of Executable Code.mp4
20.7 MB
IEEE Security & Privacy 2022/Exposed Infrastructures-Discovery, Attacks and Remediation of Insecure ICS Remote Management Devices.mp4
20.6 MB
IEEE Security & Privacy 2022/Back to the Drawing Board A Critical Evaluation of Poisoning Attacks on Federated Learning.mp4
20.6 MB
IEEE Security & Privacy 2017/SecureML - A System for Scalable Privacy-Preserving Machine Learning.mp4
20.5 MB
IEEE Security & Privacy 2024/MAWSEO Adversarial Wiki Search Poisoning for Illicit Online Promotion - Zilong Lin.mp4
20.5 MB
IEEE Security & Privacy 2019/Towards Practical Differentialy Private Convex Optimization.mp4
20.5 MB
IEEE Security & Privacy 2019/Ouroboros Crypsinous Privacy Preserving Proof of Stake.mp4
20.4 MB
IEEE Security & Privacy 2019/True2F Backdoor resistant authentication tokens Emma Dauterman.mp4
20.4 MB
IEEE Security & Privacy 2016/Algorithmic Transparency via Quantitative Input Influence.mp4
20.4 MB
IEEE Security & Privacy 2022/Sabre Sender-Anonymous Messaging with Fast Audits.mp4
20.4 MB
IEEE Security & Privacy 2017/IVD - Automatic Learning and Enforcement of Authorization Rules in Online Social Networks.mp4
20.4 MB
IEEE Security & Privacy 2019/Threshold ECDSA from ECDSA Assumptions The Multiparty Case.mp4
20.4 MB
IEEE Security & Privacy 2019/Attack Directories, Not Caches Side Channel Attacks in a Non Inclusive World.mp4
20.4 MB
IEEE Security & Privacy 2022/Transcending TRANSCEND Revisiting Malware Classification in the Presence of Concept Drift.mp4
20.4 MB
IEEE Security & Privacy 2017/Multi-touch Authentication Using Hand Geometry and Behavioral Information.mp4
20.3 MB
IEEE Security & Privacy 2023/Not Yet Another Digital ID Privacy-preserving Humanitarian Aid Distribution.mp4
20.3 MB
IEEE Security & Privacy 2015/Last-Level Cache Side-Channel Attacks are Practical.mp4
20.3 MB
IEEE Security & Privacy 2022/De-Identification's Impact on Minority Representation and Privacy Preservation in the US Census.mp4
20.3 MB
IEEE Security & Privacy 2022/Spiral Fast, High-Rate Single-Server PIR via FHE Composition.mp4
20.3 MB
IEEE Security & Privacy 2017/SoK - Exploiting Network Printers.mp4
20.3 MB
IEEE Security & Privacy 2017/Towards Evaluating the Robustness of Neural Networks.mp4
20.3 MB
IEEE Security & Privacy 2022/Bad Characters Imperceptible NLP Attacks.mp4
20.3 MB
IEEE Security & Privacy 2017/CoSMeDis - A Distributed Social Media Platform with Formally Verified Confidentiality Guarantees.mp4
20.2 MB
IEEE Security & Privacy 2020/MarkUs Drop-in Use-After-Free Prevention for Low-Level Languages.mp4
20.2 MB
IEEE Security & Privacy 2017/Comparing the Usability of Cryptographic APIs.mp4
20.2 MB
IEEE Security & Privacy 2019/Does Certificate Transparency Break the Web Measuring Adoption and Error Rate.mp4
20.2 MB
IEEE Security & Privacy 2019/Iodine Fast Dynamic Tain't Tracking Using Rollback free Optimistic Hybrid Analysis.mp4
20.1 MB
IEEE Security & Privacy 2022/Graphics Peeping Unit Exploiting EM Side-Channel Information of GPUs to Eavesdrop on Your Neighbors.mp4
20.1 MB
IEEE Security & Privacy 2022/MatRiCT More Efficient Post-Quantum Private Blockchain Payments.mp4
20.1 MB
IEEE Security & Privacy 2022/GREBE Unveiling Exploitation Potential for Linux Kernel Bugs.mp4
20.1 MB
IEEE Security & Privacy 2022/A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP.mp4
20.0 MB
IEEE Security & Privacy 2019/Theory and Practice of Finding Eviction Sets.mp4
19.9 MB
IEEE Security & Privacy 2022/SMILE Secure Memory Introspection for Live Enclave.mp4
19.9 MB
IEEE Security & Privacy 2024/LLMs Cannot Reliably Identify and Reason About Security Vulnerabilities Yet - A Comprehensive Eva.mp4
19.9 MB
IEEE Security & Privacy 2019/KHyperLogLog Estimating Reidentifiability and Joinability of Large Data at Scale Pern Hui Chia.mp4
19.9 MB
IEEE Security & Privacy 2019/Should I Worry A Cross Cultural Examination of Account Security Incident Response.mp4
19.9 MB
IEEE Security & Privacy 2016/High-Speed Inter-domain Fault Localization.mp4
19.9 MB
IEEE Security & Privacy 2017/Machine-Checked Proofs of Privacy for Electronic Voting Protocols.mp4
19.9 MB
IEEE Security & Privacy 2022/How Not to Protect Your IP - An Industry-Wide Break of IEEE 1735 Implementations.mp4
19.8 MB
IEEE Security & Privacy 2019/PhishFarm A Scalable Framework for Measuring the Effectivness of Evasion Techniques Against.mp4
19.8 MB
IEEE Security & Privacy 2017/Your Exploit is Mine - Automatic Shellcode Transplant for Remote Exploits.mp4
19.7 MB
IEEE Security & Privacy 2022/Waldo A Private Time-Series Database from Function Secret-Sharing.mp4
19.7 MB
IEEE Security & Privacy 2022/Universal 3-Dimensional Perturbations for Black-Box Attacks on Video Recognition Systems.mp4
19.7 MB
IEEE Security & Privacy 2019/CaSym Cache Aware Symbolic Execution for Side Channel Detection and Mitigation.mp4
19.7 MB
IEEE Security & Privacy 2024/2024 519 From Individual Computation to Allied Optimization Remodeling Privacy Preserving Neural Inf.mp4
19.7 MB
IEEE Security & Privacy 2022/WIGHT Wired Ghost Touch Attack on Capacitive Touchscreens.mp4
19.3 MB
IEEE Security & Privacy 2015/Cracking-Resistant Password Vaults Using Natural Language Encoders.mp4
19.3 MB
IEEE Security & Privacy 2019/NEUZZ Efficient Fuzzing with Neural Program Smoothing.mp4
19.3 MB
IEEE Security & Privacy 2022/Model Stealing Attacks Against Inductive Graph Neural Networks.mp4
19.3 MB
IEEE Security & Privacy 2023/Practical Timing Side-Channel Attacks on Memory Compression.mp4
19.3 MB
IEEE Security & Privacy 2022/Locally Differentially Private Sparse Vector Aggregation.mp4
19.2 MB
IEEE Security & Privacy 2020/Combating Dependence Explosion in Forensic Analysis Using Alternative Tag Propagation Semantics.mp4
19.2 MB
IEEE Security & Privacy 2017/Catena - Efficient Non-equivocation via Bitcoin.mp4
19.1 MB
IEEE Security & Privacy 2022/Adversarial Examples - for Proof-of-Learning.mp4
19.1 MB
IEEE Security & Privacy 2022/Cats vs. Spectre An Axiomatic Approach to Modeling Speculative Execution Attacks.mp4
19.1 MB
IEEE Security & Privacy 2022/Mind the Gap Studying the Insecurity of Provably Secure Embedded Trusted Execution Architectures.mp4
19.0 MB
IEEE Security & Privacy 2022/Augury Using Data Memory-Dependent Prefetchers to Leak Data at Rest.mp4
18.9 MB
IEEE Security & Privacy 2016/TaoStore - Overcoming Asynchronicity in Oblivious Data Storage.mp4
18.9 MB
IEEE Security & Privacy 2019/Towards Automated Safety Vetting of PLC Code in Real World Plants Mu Zhang.mp4
18.9 MB
IEEE Security & Privacy 2022/Private Nearest Neighbor Search with Sublinear Communication and Malicious Security.mp4
18.8 MB
IEEE Security & Privacy 2018/A Machine Learning Approach to Prevent Malicious Calls Over Telephony Networks.mp4
18.8 MB
IEEE Security & Privacy 2022/Foundations of Dynamic BFT.mp4
18.8 MB
IEEE Security & Privacy 2023/Breaking Security-Critical Voice Authentication.mp4
18.8 MB
IEEE Security & Privacy 2022/TROLLMAGNIFIER Detecting State-Sponsored Troll Accounts on Reddit.mp4
18.7 MB
IEEE Security & Privacy 2019/XCLAIM Trustless Interoperable Cryptocurrency Backed Assets.mp4
18.7 MB
IEEE Security & Privacy 2019/Understanding the Security of ARM Debugging Features.mp4
18.7 MB
IEEE Security & Privacy 2022/Security Analysis of the MLS Key Derivation.mp4
18.7 MB
IEEE Security & Privacy 2019/An Extensive Formal Security Analysis of the OpenID Financial grade API Pedram Hosseyni.mp4
18.7 MB
IEEE Security & Privacy 2022/The Experts' Insights on the Peer Review Process of Evaluating Security Papers.mp4
18.6 MB
IEEE Security & Privacy 2023/On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security.mp4
18.6 MB
IEEE Security & Privacy 2023/LazyTAP On-Demand Data Minimization for Trigger-Action Applications.mp4
18.6 MB
IEEE Security & Privacy 2015/SoK - Secure Messaging.mp4
18.6 MB
IEEE Security & Privacy 2024/Efficient and Generic Microarchitectural Hash Function Recovery - Lukas Gerlach.mp4
18.6 MB
IEEE Security & Privacy 2015/Automatic Inference of Search Patterns for Tain't-Style Vulnerabilities.mp4
18.5 MB
IEEE Security & Privacy 2018/Routing Around Congestion - Defeating DDoS Attacks and Adverse Network Conditions via Reactive.mp4
18.5 MB
IEEE Security & Privacy 2015/Ad Injection at Scale - Assessing Deceptive Advertisement Modifications.mp4
18.4 MB
IEEE Security & Privacy 2019/Fidelius Protecting User Secrets from Compromised Browsers.mp4
18.4 MB
IEEE Security & Privacy 2019/Beyond Credential Stuffing Password Similarity Models using Neural Networks.mp4
18.4 MB
IEEE Security & Privacy 2016/Security Analysis of Emerging Smart Home Applications.mp4
18.4 MB
IEEE Security & Privacy 2021/SoK Quantifying Cyber Risk.mp4
18.4 MB
IEEE Security & Privacy 2016/MitM Attack by Name Collision - Cause Analysis and Vulnerability Assessment in the New gTLD Era.mp4
18.4 MB
IEEE Security & Privacy 2018/A Formal Treatment of Accountable Proxying over TLS.mp4
18.3 MB
IEEE Security & Privacy 2022/SpecHammer Combining Spectre and Rowhammer for New Speculative Attacks.mp4
18.3 MB
IEEE Security & Privacy 2016/Verena - End-to-End Integrity Protection for Web Applications.mp4
18.3 MB
IEEE Security & Privacy 2023/AUC Accountable Universal Composability.mp4
18.3 MB
IEEE Security & Privacy 2023/Security and Privacy Challenges, Advice, and Opportunities at Cybercafes in Kenya.mp4
18.3 MB
IEEE Security & Privacy 2018/Blue Note - How Intentional Acoustic Interference Damages Availablity and Integrity -.mp4
18.2 MB
IEEE Security & Privacy 2022/Timing-Based Browsing Privacy Vulnerabilities Via Site Isolation.mp4
18.2 MB
IEEE Security & Privacy 2019/Proof Of Stake Sidechains.mp4
18.2 MB
IEEE Security & Privacy 2023/On the (In)security of Peer-to-Peer Decentralized Machine Learning.mp4
18.2 MB
IEEE Security & Privacy 2023/Typing High-Speed Cryptography against Spectre v1.mp4
18.2 MB
IEEE Security & Privacy 2020/ICAS An Extensible Framework for Estimating the Susceptibility of IC Layouts to Additive Trojans.mp4
18.2 MB
IEEE Security & Privacy 2022/Goshawk Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis.mp4
18.1 MB
IEEE Security & Privacy 2016/PhotoProof - Cryptographic Image Authentication for Any Set of Permissible Transformations.mp4
18.1 MB
IEEE Security & Privacy 2022/Attacks on Wireless Coexistence.mp4
18.1 MB
IEEE Security & Privacy 2017/Obstacles to the Adoption of Secure Communication Tools.mp4
18.0 MB
IEEE Security & Privacy 2023/TELEPATH A Minecraft-based Covert Communication System.mp4
17.9 MB
IEEE Security & Privacy 2018/The Cards Aren't Alright - Detecting Counterfeit Gift Cards Using Encoding Jitter.mp4
17.9 MB
IEEE Security & Privacy 2016/Helping Johnny to Analyze Malware - A Usability-Optimized Decompiler and Malware Analysis User Study.mp4
17.9 MB
IEEE Security & Privacy 2019/SoK The Challenges Pitfalls and Perils of Using Hardware Performance Counters for Security.mp4
17.9 MB
IEEE Security & Privacy 2022/Statistical Quantification of Differential Privacy A Local Approach.mp4
17.9 MB
IEEE Security & Privacy 2015/Leave Me Alone - App-Level Protection against Runtime Information Gathering on Android.mp4
17.9 MB
IEEE Security & Privacy 2022/PROTRR Principled yet Optimal In-DRAM Target Row Refresh.mp4
17.8 MB
IEEE Security & Privacy 2019/Redactable Blockchain in the Permissionless Setting.mp4
17.8 MB
IEEE Security & Privacy 2019/Measuring and Analyzing Search Engine Poisoning of Linguistic Collisions.mp4
17.8 MB
IEEE Security & Privacy 2016/On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud.mp4
17.7 MB
IEEE Security & Privacy 2023/AEM Facilitating Cross-Version Exploitability Assessment of Linux Kernel Vulnerabilities.mp4
17.7 MB
IEEE Security & Privacy 2016/Distillation as a Defense to Adversarial Perturbations against Deep Neural Networks.mp4
17.6 MB
IEEE Security & Privacy 2019/Razzer Finding Kernel Race Bugs through Fuzzing.mp4
17.6 MB
IEEE Security & Privacy 2024/don't Eject the Impostor - Fast Three Party Computation With a Known Cheater - Andreas Brüggeman.mp4
17.6 MB
IEEE Security & Privacy 2022/ZeeStar Private Smart Contracts by Homomorphic Encryption and Zero-knowledge Proofs.mp4
17.5 MB
IEEE Security & Privacy 2023/No Privacy in the Electronics Repair Industry.mp4
17.5 MB
IEEE Security & Privacy 2019/On the Security of Two-Round Multi-Signatures.mp4
17.4 MB
IEEE Security & Privacy 2016/Following Devil's Footprints - Cross-Platform Analysis of Potentially Harmful Libraries.mp4
17.4 MB
IEEE Security & Privacy 2020/Kobold Evaluating Decentralized Access Control for Remote NSXPC Methods on iOS.mp4
17.4 MB
IEEE Security & Privacy 2016/Beauty and the Beast - Diverting modern web browsers to build unique browser fingerprints.mp4
17.3 MB
IEEE Security & Privacy 2023/ADI Adversarial Dominating Inputs in Vertical Federated Learning Systems.mp4
17.3 MB
IEEE Security & Privacy 2018/On the Economics of Offline Password Cracking.mp4
17.3 MB
IEEE Security & Privacy 2019/F-BLEAU Fast Black-box Leakage Estimation.mp4
17.3 MB
IEEE Security & Privacy 2023/Scalable and Privacy-Preserving Federated Principal Component Analysis.mp4
17.2 MB
IEEE Security & Privacy 2019/Fuzzing File Systems via Two-Dimensional Input Space Exploration.mp4
17.2 MB
IEEE Security & Privacy 2023/Collaborative Ad Transparency Promises and Limitations.mp4
17.2 MB
IEEE Security & Privacy 2021/SoK An Overview of FHE Compilers and Tools.mp4
17.2 MB
IEEE Security & Privacy 2022/SoK Practical Foundations for Software Spectre Defenses.mp4
17.2 MB
IEEE Security & Privacy 2018/Another Flip in the Wall of Rowhammer Defenses.mp4
17.2 MB
IEEE Security & Privacy 2019/Exploiting Unintended Feature leakage in Collaborative Learning Congzheng Song.mp4
17.1 MB
IEEE Security & Privacy 2022/Model Orthogonalization Class Distance Hardening in Neural Networks for Better Security.mp4
17.1 MB
IEEE Security & Privacy 2018/Enabling Autonomous IoT Device Pairing using Different Sensor Types.mp4
17.1 MB
IEEE Security & Privacy 2024/2024 500 Exploring the Orthogonality and Linearity of Backdoor Attacks - Kaiyuan Zhang.mp4
17.1 MB
IEEE Security & Privacy 2024/gpuzip 20 - yingchen wang.mp4
17.1 MB
IEEE Security & Privacy 2019/Differentially Private Model Publishing For Deep Learning.mp4
17.1 MB
IEEE Security & Privacy 2022/Exploit the Last Straw That Breaks Android Systems.mp4
17.0 MB
IEEE Security & Privacy 2022/SNARKBlock Federated Anonymous Blocklisting from Hidden Common Input Aggregate Proofs.mp4
17.0 MB
IEEE Security & Privacy 2024/2024 467 ARMOR A Formally Verified Implementation of X 509 Certificate Chain Validation - Joyanta De.mp4
17.0 MB
IEEE Security & Privacy 2019/RIDL Rogue In-Flight Data Load.mp4
17.0 MB
IEEE Security & Privacy 2016/Cinderella - Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with.mp4
16.9 MB
IEEE Security & Privacy 2024/Asterisk Super fast MPC with a Friend - Protik Paul.mp4
16.9 MB
IEEE Security & Privacy 2024/2024 57 Counterexample Guided Directed Fuzzing via Likely Invariant Inference - Shadow HUANG.mp4
16.9 MB
IEEE Security & Privacy 2024/S&P 2024 hvc - Nicholas Ngai.mp4
16.9 MB
IEEE Security & Privacy 2016/Staying Secure and Unprepared - Understanding and Mitigating the Security Risks of Apple ZeroConf.mp4
16.9 MB
IEEE Security & Privacy 2024/ItsSimplexIEEESP 20min - Andrew Cullen.mp4
16.9 MB
IEEE Security & Privacy 2024/Backdooring Multimodal Learning - 卡的不动弹.mp4
16.8 MB
IEEE Security & Privacy 2024/Backdooring Multimodal Learning.mp4
16.8 MB
IEEE Security & Privacy 2023/RAB Provable Robustness Against Backdoor Attacks.mp4
16.8 MB
IEEE Security & Privacy 2023/Bitcoin-Enhanced Proof-of-Stake Security Possibilities and Impossibilities.mp4
16.8 MB
IEEE Security & Privacy 2017/Spotless Sandboxes - Evading Malware Analysis Systems using Wear-and-Tear Artifacts.mp4
16.8 MB
IEEE Security & Privacy 2023/GraphSPD Graph-Based Security Patch Detection with Enriched Code Semantics.mp4
16.8 MB
IEEE Security & Privacy 2019/PrivKV Key Value Data Collection with Local Differential Privacy.mp4
16.7 MB
IEEE Security & Privacy 2024/The Great Request Robbery Soheil Khodayari - Soheil Khodayari.mp4
16.7 MB
IEEE Security & Privacy 2016/Talos - Neutralizing Vulnerabilities with Security Workarounds for Rapid Response.mp4
16.7 MB
IEEE Security & Privacy 2016/pASSWORD tYPOS and How to Correct Them Securely.mp4
16.6 MB
IEEE Security & Privacy 2024/Pudding Private User Discovery in Anonymity Networks - Ceren Kocaogullar.mp4
16.6 MB
IEEE Security & Privacy 2016/A Practical Oblivious Map Data Structure with Secure Deletion and History Independence.mp4
16.6 MB
IEEE Security & Privacy 2016/TriggerScope - Towards Detecting Logic Bombs in Android Applications.mp4
16.6 MB
IEEE Security & Privacy 2022/Property Inference from Poisoning.mp4
16.6 MB
IEEE Security & Privacy 2018/Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels.mp4
16.6 MB
IEEE Security & Privacy 2016/The Cracked Cookie Jar - HTTP Cookie Hijacking and the Exposure of Private Information.mp4
16.6 MB
IEEE Security & Privacy 2024/Pandora - Principled Symbolic Validation of Intel SGX Enclave Runtimes - Jo Van Bulck.mp4
16.6 MB
IEEE Security & Privacy 2023/A Theory to Instruct Differentially-Private Learning via Clipping Bias Reduction.mp4
16.6 MB
IEEE Security & Privacy 2022/Are We There Yet Timing and Floating-Point Attacks on Differential Privacy Systems.mp4
16.6 MB
IEEE Security & Privacy 2023/Spectral-DP Differentially Private Deep Learning through Spectral Perturbation and Filtering.mp4
16.5 MB
IEEE Security & Privacy 2022/DEPCOMM Graph Summarization on System Audit Logs for Attack Investigation.mp4
16.5 MB
IEEE Security & Privacy 2020/SoK A Minimalist Approach to Formalizing Analog Sensor Security.mp4
16.5 MB
IEEE Security & Privacy 2016/Synthesizing Plausible Privacy-Preserving Location Traces.mp4
16.4 MB
IEEE Security & Privacy 2023/Analyzing Leakage of Personally Identifiable Information in Language Models.mp4
16.4 MB
IEEE Security & Privacy 2023/A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations.mp4
16.4 MB
IEEE Security & Privacy 2023/High-Order Masking of Lattice Signatures in Quasilinear Time.mp4
16.4 MB
IEEE Security & Privacy 2018/FuturesMEX - Secure, Distributed Futures Market Exchange.mp4
16.4 MB
IEEE Security & Privacy 2023/Perceptions of Distributed Ledger Technology Key Management-Interviews with Finance Professionals.mp4
16.3 MB
IEEE Security & Privacy 2023/Characterizing the Limits of POV Acoustic Eavesdropping from Smartphone Cameras.mp4
16.3 MB
IEEE Security & Privacy 2018/EyeTell - Video-Assisted Touchscreen Keystroke Inference from Eye Movements.mp4
16.3 MB
IEEE Security & Privacy 2024/TuDoor new - Xiang Li.mp4
16.2 MB
IEEE Security & Privacy 2022/Using Throughput-Centric Byzantine Broadcast to Tolerate Malicious Majority in Blockchains.mp4
16.2 MB
IEEE Security & Privacy 2024/INVISILINE Invisible Plausibly Deniable Storage - Sandeep Kiran Pinjala.mp4
16.2 MB
IEEE Security & Privacy 2015/Controlled-Channel Attacks - Deterministic Side Channels for Untrusted Operating Systems.mp4
16.2 MB
IEEE Security & Privacy 2024/TuDoor - Xiang Li.mp4
16.2 MB
IEEE Security & Privacy 2023/Threshold BBS Signatures for Distributed Anonymous Credential Issuance.mp4
16.2 MB
IEEE Security & Privacy 2023/Blue Is the New Black (Market) Privacy Leaks and Re-Victimization from Police-Auctioned Cellphones.mp4
16.2 MB
IEEE Security & Privacy 2023/Private Eye On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing.mp4
16.1 MB
IEEE Security & Privacy 2018/When Your Fitness Tracker Betrays You - Quantifying the Predictability.mp4
16.1 MB
IEEE Security & Privacy 2021/Bomberman Defining and Defeating Hardware Ticking Timebombs at Design-time.mp4
16.1 MB
IEEE Security & Privacy 2024/2024 76 Formal Dolev Yao Models Meet Cryptographic Protocol Fuzz Testing - Max Ammann.mp4
16.0 MB
IEEE Security & Privacy 2022/PCR-Auth Solving Authentication Puzzle Challenges with Encoded Palm Contact Responses.mp4
16.0 MB
IEEE Security & Privacy 2017/Skyfire - Data-Driven Seed Generation for Fuzzing.mp4
16.0 MB
IEEE Security & Privacy 2023/SecureCells A Secure Compartmentalized Architecture.mp4
16.0 MB
IEEE Security & Privacy 2023/Shedding Light on Inconsistencies in Grid Cybersecurity Disconnects and Recommendations.mp4
16.0 MB
IEEE Security & Privacy 2018/On Enforcing the Digital Immunity of a Large Humanitarian Organization.mp4
16.0 MB
IEEE Security & Privacy 2018/Hackers vs. Testers - A Comparison of Software Vulnerability Discovery Processes.mp4
16.0 MB
IEEE Security & Privacy 2024/MEA Defender - Lv Peizhuo.mp4
16.0 MB
IEEE Security & Privacy 2022/Committed to Trust A Qualitative Study on Security & Trust in Open Source Software Projects.mp4
16.0 MB
IEEE Security & Privacy 2023/Hide and Seek with Spectres Efficient discovery of speculative vulnerabilities with random testing.mp4
16.0 MB
IEEE Security & Privacy 2023/Detection of Inconsistencies in Privacy Practices of Browser Extensions.mp4
15.9 MB
IEEE Security & Privacy 2016/Downgrade Resilience in Key-Exchange Protocols.mp4
15.9 MB
IEEE Security & Privacy 2018/Double-efficient zkSNARKs Without Trusted Setup.mp4
15.9 MB
IEEE Security & Privacy 2016/Shreds - Fine-grained Execution Units with Private Memory.mp4
15.9 MB
IEEE Security & Privacy 2018/xJsnark - A Framework for Efficient Verifiable Computation.mp4
15.9 MB
IEEE Security & Privacy 2023/mmEcho A mmWave-based Acoustic Eavesdropping Method.mp4
15.8 MB
IEEE Security & Privacy 2023/Deepfake Text Detection Limitations and Opportunities.mp4
15.8 MB
IEEE Security & Privacy 2022/The State of the SameSite Studying the Usage, Effectiveness, and Adequacy of SameSite Cookies.mp4
15.8 MB
IEEE Security & Privacy 2024/2024 449 Undefined oriented Programming - Detecting and Chaining Prototype Pollution Gadgets in Node.mp4
15.8 MB
IEEE Security & Privacy 2023/WeRLman To Tackle Whale (Transactions), Go Deep (RL).mp4
15.8 MB
IEEE Security & Privacy 2016/Key Confirmation in Key Exchange - A Formal Treatment and Implications for TLS 1.3.mp4
15.8 MB
IEEE Security & Privacy 2018/Distance-Bounding Protocols - Verification without Time and Location.mp4
15.8 MB
IEEE Security & Privacy 2018/Tracking Ransomware End-to-end.mp4
15.7 MB
IEEE Security & Privacy 2022/SAILFISH Vetting Smart Contract State-Inconsistency Bugs in Seconds.mp4
15.7 MB
IEEE Security & Privacy 2017/Under the Shadow of Sunshine - Understanding & Detecting Bulletproof Hosting.mp4
15.7 MB
IEEE Security & Privacy 2018/Towards Security and Privacy for Multi User Augmented Reality.mp4
15.7 MB
IEEE Security & Privacy 2019/IEEE S&P 2019 - Opening Remarks - Program Chair.mp4
15.7 MB
IEEE Security & Privacy 2023/Understanding the Security and Privacy Attitudes of Smart Home Users on Reddit.mp4
15.7 MB
IEEE Security & Privacy 2023/SoK History is a Vast Early Warning System Auditing the Provenance of System Intrusions.mp4
15.7 MB
IEEE Security & Privacy 2016/Inferring User Routes and Locations using Zero-Permission Mobile Sensors.mp4
15.7 MB
IEEE Security & Privacy 2022/Multi-Server Verifiable Computation of Low-Degree Polynomials.mp4
15.7 MB
IEEE Security & Privacy 2018/vRAM - Faster Verifiable RAM With Program-Independent Preprocessing.mp4
15.7 MB
IEEE Security & Privacy 2023/FLUTE Fast and Secure Lookup Table Evaluations.mp4
15.7 MB
IEEE Security & Privacy 2016/Data-Oriented Programming - On the Expressiveness of Non-Control Data Attacks.mp4
15.7 MB
IEEE Security & Privacy 2024/ALIF Low Cost Adversarial Audio Attacks on Black Box Speech Platforms using Linguistic Features.mp4
15.6 MB
IEEE Security & Privacy 2023/Half&Half Demystifying Intel’s Directional Branch Predictors for Fast, Secure Partitioned Execution.mp4
15.6 MB
IEEE Security & Privacy 2022/AccEar Accelerometer Acoustic Eavesdropping with Unconstrained Vocabulary.mp4
15.6 MB
IEEE Security & Privacy 2016/LAVA - Large-scale Automated Vulnerability Addition.mp4
15.6 MB
IEEE Security & Privacy 2022/Analyzing Ground-Truth Data of Mobile Gambling Scam.mp4
15.5 MB
IEEE Security & Privacy 2016/SoK - Everyone Hates Robocalls - A Survey of Techniques against Telephone Spam.mp4
15.5 MB
IEEE Security & Privacy 2018/The Rise of the Citizen Developer - Assessing the Security Impact of Online App Generators.mp4
15.5 MB
IEEE Security & Privacy 2016/Return to the Zombie Gadgets - Undermining Destructive Code Reads via Code-Inference Attacks.mp4
15.5 MB
IEEE Security & Privacy 2023/When and Why Do People Want Ad Targeting Explanations Evidence from a Mixed-Methods Field Study.mp4
15.5 MB
IEEE Security & Privacy 2022/Hark A Deep Learning System for Navigating Privacy Feedback at Scale.mp4
15.5 MB
IEEE Security & Privacy 2020/HydRand Efficient Continuous Distributed Randomness.mp4
15.4 MB
IEEE Security & Privacy 2024/43 P4Control Line Rate Cross Host Attack Prevention via In Network Information Flow Control Enabled.mp4
15.4 MB
IEEE Security & Privacy 2024/2024 567 More is Merrier Relax the Non Collusion Assumption in Multi Server PIR - esnierde.mp4
15.4 MB
IEEE Security & Privacy 2023/Blue's Clues Practical Discovery of Non-Discoverable Bluetooth Devices.mp4
15.4 MB
IEEE Security & Privacy 2022/Scraping Sticky Leftovers App User Information Left on Servers After Account Deletion.mp4
15.4 MB
IEEE Security & Privacy 2022/WtaGraph Web Tracking and Advertising Detection using Graph Neural Networks.mp4
15.4 MB
IEEE Security & Privacy 2018/Angora - Efficient Fuzzing by Principled Search.mp4
15.3 MB
IEEE Security & Privacy 2023/Attitudes towards Client-Side Scanning for CSAM, Terrorism, Drug Trafficking, Drug Use, Tax Evasion.mp4
15.3 MB
IEEE Security & Privacy 2023/WaVe A Verifiably Secure WebAssembly Sandboxing Runtime.mp4
15.3 MB
IEEE Security & Privacy 2024/2024 637 Poisoned ChatGPT Finds Work for Idle Hands Exploring Developers - Coding Practices with Inse.mp4
15.3 MB
IEEE Security & Privacy 2016/Automated Analysis and Verification of TLS 1.3 - 0-RTT, Resumption and Delayed Authentication.mp4
15.3 MB
IEEE Security & Privacy 2016/SoK - Towards Grounding Censorship Circumvention in Empiricism.mp4
15.3 MB
IEEE Security & Privacy 2019/EmPoWeb Empowering Web Applications with Browser Extensions.mp4
15.3 MB
IEEE Security & Privacy 2023/SoK Let the Privacy Games Begin A Unified Treatment of Data Inference Privacy in Machine Learning.mp4
15.2 MB
IEEE Security & Privacy 2016/Domain-Z - 28 Registrations Later.mp4
15.2 MB
IEEE Security & Privacy 2022/COBRA Dynamic Proactive Secret Sharing for Confidential BFT Services.mp4
15.2 MB
IEEE Security & Privacy 2023/SPHINCSC Compressing SPHINCS With (Almost) No Cost.mp4
15.2 MB
IEEE Security & Privacy 2021/Poltergeist Acoustic Manipulation of Image Stabilization towards Object Mis-Labeling.mp4
15.2 MB
IEEE Security & Privacy 2018/Enumerating Active IPv6 Hosts for Large-scale Security Scans via DNSSEC-signed Reverse Zones.mp4
15.2 MB
IEEE Security & Privacy 2018/Static Evaluation of Noninterference using Approximate Model Counting.mp4
15.2 MB
IEEE Security & Privacy 2016/A Tough call - Mitigating Advanced Code-Reuse Attacks At The Binary Level.mp4
15.2 MB
IEEE Security & Privacy 2023/Always Contribute Back A Qualitative Study on Security Challenges of the Open Source Supply Chain.mp4
15.1 MB
IEEE Security & Privacy 2023/Teaching and Learning Cybersecurity and AI Ethics in High School.mp4
15.1 MB
IEEE Security & Privacy 2018/PIR with Compressed Queries and Amortized Query Processing.mp4
15.1 MB
IEEE Security & Privacy 2023/PCspooF Compromising the Safety of Time-Triggered Ethernet.mp4
15.0 MB
IEEE Security & Privacy 2019/Helen Maliciously Secure Coopetitive Learning for Linear Models.mp4
15.0 MB
IEEE Security & Privacy 2024/2024 237 SoK Unintended Interactions among ML Defenses and Risks - Vasisht Duddu.mp4
15.0 MB
IEEE Security & Privacy 2024/2024 196 The Times They Are A Changin - Christos Tsoukaladelis.mp4
15.0 MB
IEEE Security & Privacy 2018/Protecting the Stack with Metadata Policies and Tagged Hardware.mp4
15.0 MB
IEEE Security & Privacy 2018/Compiler-assisted Code Randomization.mp4
15.0 MB
IEEE Security & Privacy 2023/Adaptive Risk-Limiting Comparison Audits.mp4
14.9 MB
IEEE Security & Privacy 2024/2024 606 BOLT Privacy Preserving, Accurate and Efficient Inference for Transformers - Qi Pang.mp4
14.9 MB
IEEE Security & Privacy 2022/Automated Attack Synthesis by Extracting Finite State Machines from Protocol Specification Documents.mp4
14.9 MB
IEEE Security & Privacy 2023/Characterizing Everyday Misuse of Smart Home Devices.mp4
14.9 MB
IEEE Security & Privacy 2024/Leaky Address Masking - Mathé Hertogh 1.mp4
14.9 MB
IEEE Security & Privacy 2024/2024 158 Jaehan Kim PassREfinder Credential Stuffing Risk Prediction by Representing Password Reuse.mp4
14.8 MB
IEEE Security & Privacy 2023/IPvSeeYou Exploiting Leaked Identifiers in IPv6 for Street-Level Geolocation.mp4
14.8 MB
IEEE Security & Privacy 2023/DeHiREC Detecting Hidden Voice Recorders via ADC Electromagnetic Radiation.mp4
14.8 MB
IEEE Security & Privacy 2023/ShadowNet A Secure and Efficient On-device Model Inference System for Convolutional Neural Networks.mp4
14.8 MB
IEEE Security & Privacy 2023/The Leaky Web Automated Discovery of Cross-Site Information Leaks in Browsers and the Web.mp4
14.8 MB
IEEE Security & Privacy 2016/Multiple Handshakes Security of TLS 1.3 Candidates.mp4
14.8 MB
IEEE Security & Privacy 2023/3DFed Adaptive and Extensible Framework for Covert Backdoor Attack in Federated Learning.mp4
14.8 MB
IEEE Security & Privacy 2023/User Perceptions and Experiences with Smart Home Updates.mp4
14.8 MB
IEEE Security & Privacy 2019/Bitcoin vs. Bitcoin Cash Coexistence or Downfall of Bitcoin Cash.mp4
14.8 MB
IEEE Security & Privacy 2018/Manipulating Machine Learning - Poisoning Attacks & Countermeasures.mp4
14.8 MB
IEEE Security & Privacy 2019/Postcards from the Post HTTP World Amplification of HTTPS Vulnerabilities in the Web Ecosystem.mp4
14.8 MB
IEEE Security & Privacy 2022/SecFloat Accurate Floating-Point meets Secure 2-Party Computation.mp4
14.8 MB
IEEE Security & Privacy 2023/MEGA Malleable Encryption Goes Awry.mp4
14.8 MB
IEEE Security & Privacy 2023/SoK Cryptographic Neural-Network Computation.mp4
14.7 MB
IEEE Security & Privacy 2022/SoK Authentication in Augmented and Virtual Reality.mp4
14.7 MB
IEEE Security & Privacy 2024/The Role of User Agent Interactions on Mobile Money Practices - Karen Sowon.mp4
14.7 MB
IEEE Security & Privacy 2022/Jigsaw Efficient and Scalable Path Constraints Fuzzing.mp4
14.7 MB
IEEE Security & Privacy 2022/Adversarial Prefetch New Cross-Core Cache Side Channel Attacks.mp4
14.7 MB
IEEE Security & Privacy 2018/OmniLedger - A Secure, Scale-Out, Decentralized Ledger via Sharding.mp4
14.7 MB
IEEE Security & Privacy 2023/SoK A Critical Evaluation of Efficient Website Fingerprinting Defenses.mp4
14.7 MB
IEEE Security & Privacy 2023/ELSA Secure Aggregation for Federated Learning with Malicious Actors.mp4
14.6 MB
IEEE Security & Privacy 2016/Prepose - Privacy, Security, and Reliability for Gesture-Based Programming.mp4
14.6 MB
IEEE Security & Privacy 2018/Study and Mitigation of Origin Stripping Vulnerabilities in Hybrid-postMessage Enabled Mobile Apps.mp4
14.6 MB
IEEE Security & Privacy 2023/D-DAE Defense-Penetrating Model Extraction Attacks.mp4
14.6 MB
IEEE Security & Privacy 2018/Bulletproofs - Short Proofs for Confidential Transactions and More.mp4
14.6 MB
IEEE Security & Privacy 2018/Mobile Application Web API Reconnaissance.mp4
14.6 MB
IEEE Security & Privacy 2024/SP24 HD - Florian Hantke.mp4
14.6 MB
IEEE Security & Privacy 2023/PublicCheck Public Integrity Verification for Services of Run-time Deep Models.mp4
14.6 MB
IEEE Security & Privacy 2023/Practical Program Modularization with Type-Based Dependence Analysis.mp4
14.6 MB
IEEE Security & Privacy 2024/6 Efficient Zero knowledge Arguments for Paillier Cryptosystem - Rae Gong1.mp4
14.5 MB
IEEE Security & Privacy 2020/SEIMI Efficient and Secure SMAP-Enabled Intra-process Memory Isolation.mp4
14.5 MB
IEEE Security & Privacy 2024/6 Efficient Zero knowledge Arguments for Paillier Cryptosystem - Rae Gong.mp4
14.5 MB
IEEE Security & Privacy 2023/RoFL Robustness of Secure Federated Learning.mp4
14.4 MB
IEEE Security & Privacy 2018/T-Fuzz Fuzzing by Program Transformation - Hui Peng.mp4
14.4 MB
IEEE Security & Privacy 2018/Learning from Mutants - Using Code Mutation to Learn and Monitor Invariants of a CPS.mp4
14.4 MB
IEEE Security & Privacy 2023/mmSpoof Resilient Spoofing of Automotive Millimeter-wave Radars using Reflect Array.mp4
14.4 MB
IEEE Security & Privacy 2018/Sonar - Detecting SS7 Redirection Attacks With Audio-Based Distance Bounding.mp4
14.4 MB
IEEE Security & Privacy 2023/TEEzz Fuzzing Trusted Applications on COTS Android Devices.mp4
14.4 MB
IEEE Security & Privacy 2023/Multi-Round Single-Server Secure Aggregation with Applications to Private Federated Learning.mp4
14.3 MB
IEEE Security & Privacy 2018/Implementing Conjunction Obfuscation under Entropic Ring LWE.mp4
14.3 MB
IEEE Security & Privacy 2021/Method Confusion Attack on the Bluetooth Pairing Process.mp4
14.3 MB
IEEE Security & Privacy 2023/Threshold Signatures in the Multiverse.mp4
14.3 MB
IEEE Security & Privacy 2024/Automated Synthesis of Effect Graph Policies for Microservice Aware Stateful System Call Special.mp4
14.3 MB
IEEE Security & Privacy 2020/The Many Kinds of Creepware Used for Interpersonal Attacks.mp4
14.3 MB
IEEE Security & Privacy 2018/Speechless - Analyzing the Threat to Speech Privacy from Smartphone Motion Sensors.mp4
14.2 MB
IEEE Security & Privacy 2023/SoK Certified Robustness for Deep Neural Networks.mp4
14.2 MB
IEEE Security & Privacy 2018/Racing in Hyperspace - Closing Hyper Threading Side Channels on SGX.mp4
14.2 MB
IEEE Security & Privacy 2018/EnclaveDB - A Secure Database using SGX.mp4
14.2 MB
IEEE Security & Privacy 2023/Towards a Rigorous Statistical Analysis of Empirical Password Datasets.mp4
14.2 MB
IEEE Security & Privacy 2018/Grand Pwning Unit - Accelerating Microarchitectural Attacks with the GPU.mp4
14.2 MB
IEEE Security & Privacy 2022/A Secret-Free Hypervisor Rethinking Isolation in the Age of Speculative Vulnerabilities.mp4
14.2 MB
IEEE Security & Privacy 2021/PLATYPUS Software-based Power Side-Channel Attacks on x86.mp4
14.2 MB
IEEE Security & Privacy 2023/REDEEM MYSELF Purifying Backdoors in Deep Learning Models using Self Attention Distillation.mp4
14.2 MB
IEEE Security & Privacy 2021/OSPREY Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary.mp4
14.2 MB
IEEE Security & Privacy 2023/BLEDiff - Scalable and Property-Agnostic Noncompliance Checking for BLE Implementations.mp4
14.1 MB
IEEE Security & Privacy 2023/OWL Compositional Verification of Security Protocols via an Information-Flow Type System.mp4
14.1 MB
IEEE Security & Privacy 2024/2024 22 BUSted Microarchitectural Side Channel Attacks on the MCU Bus Interconnect - Cristiano Rodri.mp4
14.1 MB
IEEE Security & Privacy 2020/Intriguing Properties of Adversarial ML Attacks in the Problem Space.mp4
14.1 MB
IEEE Security & Privacy 2023/One Key to Rule Them All Secure Group Pairing for Heterogeneous IoT Devices.mp4
14.0 MB
IEEE Security & Privacy 2023/Scaling JavaScript Abstract Interpretation to Detect and Exploit Node.js Taint-style Vulnerability.mp4
14.0 MB
IEEE Security & Privacy 2018/Privacy Risks with Facebook's PII-based Targeting.mp4
14.0 MB
IEEE Security & Privacy 2023/VIDEZZO Dependency-aware Virtual Device Fuzzing.mp4
14.0 MB
IEEE Security & Privacy 2024/Saiid El Hajj Chehade SINBAD 20 min - Saiid El Hajj Chehade.mp4
14.0 MB
IEEE Security & Privacy 2022/Differentially Private Histograms in the Shuffle Model from Fake Users.mp4
14.0 MB
IEEE Security & Privacy 2016/Back in Black - Towards Formal, Black Box Analysis of Sanitizers and Filters.mp4
14.0 MB
IEEE Security & Privacy 2020/A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network.mp4
14.0 MB
IEEE Security & Privacy 2024/211 - Multi Instance Adversarial Attack on GNN Based Malicious Domain Detection - Mahmoud Khaled Ahm.mp4
14.0 MB
IEEE Security & Privacy 2023/SyzDescribe Principled, Automated, Static Generation of Syscall Descriptions for Kernel Drivers.mp4
13.9 MB
IEEE Security & Privacy 2024/SHERPA Explainable Robust Algorithms for Privacy Preserved Federated Learning in Future Networks.mp4
13.9 MB
IEEE Security & Privacy 2023/Private Collaborative Data Cleaning via Non-Equi PSI.mp4
13.9 MB
IEEE Security & Privacy 2016/SoK - (State of) The Art of War - Offensive Techniques in Binary Analysis.mp4
13.9 MB
IEEE Security & Privacy 2020/Leveraging EM Side-Channel Information to Detect Rowhammer Attacks.mp4
13.9 MB
IEEE Security & Privacy 2024/Targeted and Troublesome Zahra Moti - Zahra Moti.mp4
13.9 MB
IEEE Security & Privacy 2024/Group Oblivious Message Retrieval - Thomas.mp4
13.9 MB
IEEE Security & Privacy 2024/SrcMarker Dual channel Source Code Watermarking via Scalable Code Transformations - 杨博睿.mp4
13.9 MB
IEEE Security & Privacy 2024/Break the Wall from bottom Automated Discovery of Protocol Level Evasion Vulnerabilities in Web.mp4
13.9 MB
IEEE Security & Privacy 2023/Silph A Framework for Scalable and Accurate Generation of Hybrid MPC Protocols.mp4
13.9 MB
IEEE Security & Privacy 2021/SoK Hate, Harassment, and the Changing Landscape of Online Abuse.mp4
13.8 MB
IEEE Security & Privacy 2016/You Get Where You're Looking For - The Impact Of Information Sources On Code Security.mp4
13.8 MB
IEEE Security & Privacy 2022/Quantifying Blockchain Extractable Value How dark is the forest.mp4
13.8 MB
IEEE Security & Privacy 2023/SoK Decentralized Finance (DeFi) Attacks.mp4
13.8 MB
IEEE Security & Privacy 2021/Randomized Last-Level Caches Are Still Vulnerable to Cache Side-Channel Attacks But We Can Fix It.mp4
13.8 MB
IEEE Security & Privacy 2023/Mew Enabling Large-Scale and Dynamic Link-Flooding Defenses on Programmable Switches.mp4
13.8 MB
IEEE Security & Privacy 2023/WebSpec Towards Machine-Checked Analysis of Browser Security Mechanisms.mp4
13.8 MB
IEEE Security & Privacy 2023/Uncovering User Interactions on Smartphones via Contactless Wireless Charging Side Channels.mp4
13.8 MB
IEEE Security & Privacy 2016/Seeking Nonsense, Looking for Trouble - Efficient Promotional-Infection Detection through.mp4
13.7 MB
IEEE Security & Privacy 2020/Birds of a Feather A Hardware & Security Panel (Deprecated).mp4
13.7 MB
IEEE Security & Privacy 2018/Computer Security and Privacy for Refugees in the United States.mp4
13.7 MB
IEEE Security & Privacy 2018/Crowd-GPS-Sec - Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks.mp4
13.7 MB
IEEE Security & Privacy 2023/Weak Fiat-Shamir Attacks on Modern Proof Systems.mp4
13.6 MB
IEEE Security & Privacy 2023/From 5G Sniffing to Harvesting Leakages of Privacy-Preserving Messengers.mp4
13.6 MB
IEEE Security & Privacy 2023/UTOPIA Automatic Generation of Fuzz Driver using Unit Tests.mp4
13.6 MB
IEEE Security & Privacy 2022/Investigating the Use of Email Encryption for an Entire University.mp4
13.6 MB
IEEE Security & Privacy 2017/Membership Inference Attacks against Machine Learning Models.mp4
13.6 MB
IEEE Security & Privacy 2024/2024 144 Withdrawing is believing Detecting Inconsistencies between Withdrawal Choices and Third par.mp4
13.6 MB
IEEE Security & Privacy 2016/Cache Storage Channels - Alias-Driven Attacks and Verified Countermeasures.mp4
13.5 MB
IEEE Security & Privacy 2023/Beyond Phish Toward Detecting Fraudulent e-Commerce Websites at Scale.mp4
13.5 MB
IEEE Security & Privacy 2023/Sound Verification of Security Protocols From Design to Interoperable Implementations.mp4
13.5 MB
IEEE Security & Privacy 2023/No One Drinks From the Firehose How Organizations Filter and Prioritize Vulnerability Information.mp4
13.5 MB
IEEE Security & Privacy 2018/Locally Differentially Private Frequent Itemset Mining.mp4
13.5 MB
IEEE Security & Privacy 2023/A Generic, Efficient, and Effortless Solver with Self-Supervised Learning for Breaking Text Captchas.mp4
13.5 MB
IEEE Security & Privacy 2024/NodeAwareSmoothing - Yuni Lai Lena.mp4
13.5 MB
IEEE Security & Privacy 2023/Skilled or Gullible Gender Stereotypes Related to Computer Security and Privacy.mp4
13.5 MB
IEEE Security & Privacy 2016/A Method for Verifying Privacy-Type Properties - The Unbounded Case.mp4
13.5 MB
IEEE Security & Privacy 2023/RuleKeeper GDPR-Aware Personal Data Compliance for Web Frameworks.mp4
13.4 MB
IEEE Security & Privacy 2023/SoK Taxonomy of Attacks on Open-Source Software Supply Chains.mp4
13.3 MB
IEEE Security & Privacy 2023/Disassembling ARM Binaries by Lightweight Superset Instruction Interpretation and Graph Modeling.mp4
13.3 MB
IEEE Security & Privacy 2019/IEEE S&P 2019 - Opening Remarks - General Chair.mp4
13.3 MB
IEEE Security & Privacy 2023/Disguising Attacks with Explanation-Aware Backdoors.mp4
13.3 MB
IEEE Security & Privacy 2023/DVFS Frequently Leaks Secrets Hertzbleed Attacks Beyond SIKE, Cryptography, and CPU-Only Data.mp4
13.3 MB
IEEE Security & Privacy 2023/Less Is More Refinement Proofs for Probabilistic Proofs.mp4
13.3 MB
IEEE Security & Privacy 2024/From Virtual Touch to Tesla Command Unlocking Unauthenticated Control Chains From Smart Glasses.mp4
13.3 MB
IEEE Security & Privacy 2024/#144 TCP Spoofing Reliable Payload Transmission Past the Spoofed TCP Handshake - Eric Pan.mp4
13.2 MB
IEEE Security & Privacy 2018/SoK - Plug & Pray - Today - Understanding USB Insecurity in Versions 1 through C.mp4
13.2 MB
IEEE Security & Privacy 2023/Discovering Java Deserialization Vulnerabilities via Structure-Aware Directed Greybox Fuzzing.mp4
13.2 MB
IEEE Security & Privacy 2020/OHIE Blockchain Scaling Made Simple.mp4
13.2 MB
IEEE Security & Privacy 2023/Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation.mp4
13.2 MB
IEEE Security & Privacy 2021/SoK All You Ever Wanted to Know About Binary Disassembly But Were Afraid to Ask.mp4
13.1 MB
IEEE Security & Privacy 2024/2024 11 NetShuffle Circumventing Censorship with Shuffle Proxies at the Edge - Patrick Kon.mp4
13.1 MB
IEEE Security & Privacy 2023/Protected or Porous A Comparative Analysis of Threat Detection Capability of IoT Safeguards.mp4
13.1 MB
IEEE Security & Privacy 2016/Hawk - The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts.mp4
13.1 MB
IEEE Security & Privacy 2019/Kiss from a Rogue Evaluating Detectability of Pay-at-the-Pump Card Skimmers.mp4
13.1 MB
IEEE Security & Privacy 2023/Improving Developers' Understanding of Regex Denial of Service Tools.mp4
13.1 MB
IEEE Security & Privacy 2021/STOCHFUZZ Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic.mp4
13.0 MB
IEEE Security & Privacy 2020/SEVurity No Security Without Integrity - Breaking Integrity.mp4
13.0 MB
IEEE Security & Privacy 2024/GAuV - Xingyu Xie.mp4
13.0 MB
IEEE Security & Privacy 2018/Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage.mp4
13.0 MB
IEEE Security & Privacy 2023/Design and Evaluation of Inclusive Email Security Indicators for People with Visual Impairments.mp4
13.0 MB
IEEE Security & Privacy 2022/Universal Atomic Swaps Secure Exchange of Coins Across All Blockchains.mp4
13.0 MB
IEEE Security & Privacy 2016/Sending out an SMS - Characterizing the Security of the SMS Ecosystem with Public Gateways.mp4
13.0 MB
IEEE Security & Privacy 2024/2024 18 A Practical Root Cause Analysis System with an Under Constrained State Mutation - 박영기.mp4
13.0 MB
IEEE Security & Privacy 2021/DynPTA Combining Static and Dynamic Analysis for Practical Selective Data Protection.mp4
12.9 MB
IEEE Security & Privacy 2023/Private Access Control for Function Secret Sharing.mp4
12.9 MB
IEEE Security & Privacy 2024/Text CRS A Generalized Certified Robustness Framework against Textual Adversarial Attacks - Jane.mp4
12.9 MB
IEEE Security & Privacy 2024/Understanding the Privacy Practices of Political Campaigns A Perspective from the 2020 US Election.mp4
12.9 MB
IEEE Security & Privacy 2023/Practically-Exploitable Cryptographic Vulnerabilities in Matrix.mp4
12.9 MB
IEEE Security & Privacy 2016/No Pardon for the Interruption - New Inference Attacks on Android Through Interrupt Timing Analysis.mp4
12.8 MB
IEEE Security & Privacy 2023/How IoT Re-using Threatens Your Sensitive Data Exploring the User-Data Disposal in Used IoT Devices.mp4
12.8 MB
IEEE Security & Privacy 2023/Clockwork Finance Automated Analysis of Economic Security in Smart Contracts.mp4
12.8 MB
IEEE Security & Privacy 2024/Tabbed Out Subverting the Android Custom Tab Security Model - Philipp Beer.mp4
12.8 MB
IEEE Security & Privacy 2023/An Interview on the Security and Privacy Development Practices in Turkish Software Startups.mp4
12.8 MB
IEEE Security & Privacy 2018/Stealing Hyperparameters in Machine Learning.mp4
12.8 MB
IEEE Security & Privacy 2023/Leveraging Sandboxes for a Minimally Invasive Browser Fingerprinting Defense.mp4
12.8 MB
IEEE Security & Privacy 2022/Device Fingerprinting with Peripheral Timestamps.mp4
12.8 MB
IEEE Security & Privacy 2021/SoK Security and Privacy in the Age of Commercial Drones.mp4
12.8 MB
IEEE Security & Privacy 2023/Vulnerability Discovery for All Experiences of Marginalization in Vulnerability Discovery.mp4
12.8 MB
IEEE Security & Privacy 2020/Pseudorandom Black Swans Cache Attacks on CTR DRBG.mp4
12.8 MB
IEEE Security & Privacy 2023/TeSec Accurate Server-side Attack Investigation for Web Applications.mp4
12.8 MB
IEEE Security & Privacy 2020/xMP Selective Memory Protection for Kernel and User Space.mp4
12.8 MB
IEEE Security & Privacy 2018/Surveylance - Automatically Detecting Online Survey Scams.mp4
12.7 MB
IEEE Security & Privacy 2021/Epochal Signatures for Deniable Group Chats.mp4
12.7 MB
IEEE Security & Privacy 2018/Opening Remarks of the 39th IEEE Symposium on Security & Privacy.mp4
12.7 MB
IEEE Security & Privacy 2023/TrojanModel A Practical Trojan Attack against Automatic Speech Recognition Systems.mp4
12.7 MB
IEEE Security & Privacy 2016/I Think They're Trying to Tell Me Something - Advice Sources and Selection for Digital Security.mp4
12.7 MB
IEEE Security & Privacy 2021/Using Selective Memoization to Defeat Regular Expression Denial of Service (ReDoS).mp4
12.7 MB
IEEE Security & Privacy 2024/Signing in Four Public Software Package Registries Quantity, Quality, and Influencing Factors.mp4
12.7 MB
IEEE Security & Privacy 2023/QueryX Symbolic Query on Decompiled Code for Finding Bugs in COTS Binaries.mp4
12.7 MB
IEEE Security & Privacy 2021/Breaking the Specification Certified PDF.mp4
12.7 MB
IEEE Security & Privacy 2024/Security Privacy and Data Sharing Challenges When Moving to the US Insights from a Qualitative s.mp4
12.7 MB
IEEE Security & Privacy 2023/REGA Scalable Rowhammer Mitigation with Refresh-Generating Activations.mp4
12.6 MB
IEEE Security & Privacy 2023/BlindHub Bitcoin-Compatible Privacy-Preserving Payment Channel Hubs Supporting Variable Amounts.mp4
12.6 MB
IEEE Security & Privacy 2023/MagBackdoor Beware of Your Loudspeaker as A Backdoor For Magnetic Injection Attacks.mp4
12.6 MB
IEEE Security & Privacy 2021/Happer Unpacking Android Apps via a Hardware-Assisted Approach.mp4
12.6 MB
IEEE Security & Privacy 2023/Tyr Finding Consensus Failure Bugs in Blockchain System with Behaviour Divergent Model.mp4
12.6 MB
IEEE Security & Privacy 2020/Establishing Economic Incentives for Security Patching of IoT Consumer Products.mp4
12.6 MB
IEEE Security & Privacy 2024/don't Shoot the Messenger - Localization Prevention of Satellite Internet Users - Richard Mitev.mp4
12.6 MB
IEEE Security & Privacy 2024/2024 108 DeepShuffle A Lightweight Defense Framework against Adversarial Fault Injection Attacks on.mp4
12.5 MB
IEEE Security & Privacy 2019/Lay Down the Common Metrics Evaluating Proof of Work Consensus Protocols' Security.mp4
12.5 MB
IEEE Security & Privacy 2023/Scatter and Split Securely Defeating Cache Contention and Occupancy Attacks.mp4
12.5 MB
IEEE Security & Privacy 2020/Are We Susceptible to Rowhammer An End-to-End Methodology for Cloud Providers.mp4
12.5 MB
IEEE Security & Privacy 2022/Why Crypto-detectors Fail A Systematic Evaluation of Cryptographic Misuse Detection Techniques.mp4
12.5 MB
IEEE Security & Privacy 2024/Practical Attacks Against DNS Reputation Systems.mp4
12.5 MB
IEEE Security & Privacy 2024/415 - SoK Efficient Design and Implementation of Polynomial Hash Functions over Prime Fields - Jan G.mp4
12.5 MB
IEEE Security & Privacy 2024/attackinng byzantine robustness in high dimensions - kolluri aashish.mp4
12.5 MB
IEEE Security & Privacy 2021/Merkle2 A Low-Latency Transparency Log System.mp4
12.4 MB
IEEE Security & Privacy 2018/Anonymity Trilemma - Strong Anonymity, Low Bandwidth Overhead, Low Latency - Choose Two.mp4
12.4 MB
IEEE Security & Privacy 2020/SAVIOR Towards Bug-Driven Hybrid Testing.mp4
12.4 MB
IEEE Security & Privacy 2022/BEACON - Directed Grey-Box Fuzzing with Provable Path Pruning.mp4
12.4 MB
IEEE Security & Privacy 2019/Demystifying Hidden Privacy Settings in Mobile Apps.mp4
12.4 MB
IEEE Security & Privacy 2023/SQUIP Exploiting the Scheduler Queue Contention Side Channel.mp4
12.4 MB
IEEE Security & Privacy 2023/Investigating Package Related Security Threats in Software Registries.mp4
12.4 MB
IEEE Security & Privacy 2024/Nightshade Prompt Specific Poisoning Attacks on Text to Image Generative Models - Shawn Shan.mp4
12.4 MB
IEEE Security & Privacy 2023/Jigsaw Puzzle Selective Backdoor Attack to Subvert Malware Classifiers.mp4
12.3 MB
IEEE Security & Privacy 2022/Four Attacks and a Proof for Telegram.mp4
12.3 MB
IEEE Security & Privacy 2023/FIDO2, CTAP 2.1, and WebAuthn 2 Provable Security and Post-Quantum Instantiation.mp4
12.3 MB
IEEE Security & Privacy 2018/SoK - Keylogging Side Channels.mp4
12.3 MB
IEEE Security & Privacy 2023/EC Embedded Systems Compartmentalization via Intra-Kernel Isolation.mp4
12.3 MB
IEEE Security & Privacy 2021/Security of Multi-Sensor Fusion based Perception in Autonomous Driving Under Physical-World Attacks.mp4
12.3 MB
IEEE Security & Privacy 2024/2024 100 The Dark Side of Scale Insecurity of Direct to Cell Satellite Mega Constellations - 刘威.mp4
12.3 MB
IEEE Security & Privacy 2020/Flaw Label Exploiting IPv6 Flow Label.mp4
12.3 MB
IEEE Security & Privacy 2023/On Efficient, High-Fidelity and Blind Suppression of Backdoor Effects in Trojaned ML Models.mp4
12.3 MB
IEEE Security & Privacy 2018/Secure Device Bootstrapping without Secrets Resistant to Signal Manipulation Attacks.mp4
12.3 MB
IEEE Security & Privacy 2024/2024 456 State aware Fuzzing on Trusted OS Designed for IoT Devices - Qinying.mp4
12.2 MB
IEEE Security & Privacy 2023/It’s (DOM) Clobbering Time Attack Techniques, Prevalence, and Defenses.mp4
12.2 MB
IEEE Security & Privacy 2024/SoK Security and Privacy of Blockchain Interoperability - André Augusto.mp4
12.2 MB
IEEE Security & Privacy 2018/Understanding Linux Malware.mp4
12.2 MB
IEEE Security & Privacy 2022/Low-Bandwidth Threshold ECDSA via Pseudorandom Correlation Generators.mp4
12.2 MB
IEEE Security & Privacy 2024/2024 61 ERASAN Efficient Rust Address Sanitizer - Jiun Min.mp4
12.2 MB
IEEE Security & Privacy 2023/SoK Distributed Randomness Beacons.mp4
12.1 MB
IEEE Security & Privacy 2022/LinkTeller Recovering Private Edges from Graph Neural Networks via Influence Analysis.mp4
12.1 MB
IEEE Security & Privacy 2018/Impossibility of Precise and Sound Termination-Sensitive Security Enforcements.mp4
12.1 MB
IEEE Security & Privacy 2020/RAMBleed Reading Bits in Memory without Accessing Them.mp4
12.1 MB
IEEE Security & Privacy 2018/FPGA-Based Remote Power Side-Channel Attacks.mp4
12.1 MB
IEEE Security & Privacy 2023/Low-effort VR Headset User Authentication Using Head-reverberated Sounds with Replay Resistance.mp4
12.1 MB
IEEE Security & Privacy 2024/SneakyPrompt Jailbreaking Text to image Generative Models - Yuchen Yang.mp4
12.1 MB
IEEE Security & Privacy 2016/Revisiting Square Root ORAM - Efficient Random Access in Multi-Party Computation.mp4
12.0 MB
IEEE Security & Privacy 2024/No Privacy Left Outside - Ziqi Zhang.mp4
12.0 MB
IEEE Security & Privacy 2024/video - Zhen Xiang.mp4
12.0 MB
IEEE Security & Privacy 2023/MPCAuth Multi-factor Authentication for Distributed-trust Systems.mp4
12.0 MB
IEEE Security & Privacy 2024/59 Hyena Balancing Packing, Reuse, and Rotations for Encrypted Inference - Sarabjeet Singh.mp4
12.0 MB
IEEE Security & Privacy 2024/Serberus Protecting Cryptographic Code frrom Spectres at Compile Time - Nicholas Hunter Mosier.mp4
12.0 MB
IEEE Security & Privacy 2024/Larger scale Nakamoto style Blockchains Don’t Necessarily Offer Better Security - Jannik Albrech.mp4
12.0 MB
IEEE Security & Privacy 2023/Volttack Control IoT Devices by Manipulating Power Supply Voltage.mp4
12.0 MB
IEEE Security & Privacy 2022/HAMRAZ Resilient Partitioning and Replication.mp4
12.0 MB
IEEE Security & Privacy 2023/DevIOus Device-Driven Side-Channel Attacks on the IOMMU.mp4
12.0 MB
IEEE Security & Privacy 2020/Humpty Dumpty Controlling Word Meanings via Corpus Poisoning.mp4
11.9 MB
IEEE Security & Privacy 2018/Tracking Certificate Misissuance in the Wild.mp4
11.9 MB
IEEE Security & Privacy 2021/A Novel Dynamic Analysis Infrastructure to Instrument Untrusted Execution Flow Across User-Kernel.mp4
11.9 MB
IEEE Security & Privacy 2023/Jolt Recovering TLS Signing Keys via Rowhammer Faults.mp4
11.8 MB
IEEE Security & Privacy 2018/A Tale of Two Studies - The Best and Worst of YubiKey Usability.mp4
11.8 MB
IEEE Security & Privacy 2021/Fingerprinting the Fingerprinters Learning to Detect Browser Fingerprinting Behaviors.mp4
11.8 MB
IEEE Security & Privacy 2024/2024 471 Private Hierarchical Governance for Encrypted Messaging - Armin Namavari.mp4
11.8 MB
IEEE Security & Privacy 2023/Protecting Models Trained by Multi-party Learning with Differential Privacy.mp4
11.8 MB
IEEE Security & Privacy 2023/Man-in-the-Middle Attacks without Rogue AP When WPAs Meet ICMP Redirects.mp4
11.8 MB
IEEE Security & Privacy 2021/CanDID Bootstrapping Decentralized Identity from Legacy Providers.mp4
11.8 MB
IEEE Security & Privacy 2021/Self-Supervised Euphemism Detection and Identification for Content Moderation.mp4
11.8 MB
IEEE Security & Privacy 2023/DepthFake Spoofing 3D Face Authentication with a 2D Photo.mp4
11.7 MB
IEEE Security & Privacy 2024/BULKOR:Enabling Bulk Loading for Path ORAM - Xiang Li.mp4
11.7 MB
IEEE Security & Privacy 2021/Cross-Domain Access Control Encryption - Arbitrary-policy, Constant-size, Efficient.mp4
11.7 MB
IEEE Security & Privacy 2023/XFL Naming Functions in Binaries with Extreme Multi-label Learning.mp4
11.7 MB
IEEE Security & Privacy 2020/TextExerciser Feedback-Driven Text Input Exercising for Android Applications.mp4
11.7 MB
IEEE Security & Privacy 2024/Rethinking IC Layout Vulnerability Simulation Based Hardware Trojan Threat Assessment with High.mp4
11.7 MB
IEEE Security & Privacy 2024/Obelix Mitigating Side Channels Through Dynamic Obfuscation - Jan.mp4
11.7 MB
IEEE Security & Privacy 2020/The State of the Uniform Attacks on Encrypted Databases beyond the Uniform Query Distribution.mp4
11.6 MB
IEEE Security & Privacy 2020/Ask the Experts What Should Be on an IoT Privacy and Security Label.mp4
11.6 MB
IEEE Security & Privacy 2024/Springproofs Efficient Inner Product Arguments for Vectors of Arbitrary Length - Ming Su.mp4
11.6 MB
IEEE Security & Privacy 2024/2024 124 LOKI Large scale Data Reconstruction Attack against Federated Learning through Model Manipu.mp4
11.6 MB
IEEE Security & Privacy 2022/Arbitrary Modulation of Electromagnetic Noise from Unprivileged Software Impacting Emission Security.mp4
11.6 MB
IEEE Security & Privacy 2024/UnTrustZone Systematic Accelerated Aging to Expose On chip - Jubayer Mahmod.mp4
11.6 MB
IEEE Security & Privacy 2020/Path Oblivious Heap Optimal and Practical Oblivious Priority Queue.mp4
11.6 MB
IEEE Security & Privacy 2024/2024 48 SwiftRange - Vincent.mp4
11.6 MB
IEEE Security & Privacy 2018/Oblix - An Efficient Oblivious Search Index.mp4
11.6 MB
IEEE Security & Privacy 2024/Janus Safe Biometric Deduplication for Humanitarian Aid Distribution - kasra EdalatNejad.mp4
11.6 MB
IEEE Security & Privacy 2016/HDFI - Hardware-Assisted Data-Flow Isolation.mp4
11.5 MB
IEEE Security & Privacy 2021/Did you mix me Formally Verifying Verifiable Mix Nets in Electronic Voting.mp4
11.5 MB
IEEE Security & Privacy 2023/FedRecover Recovering from Poisoning Attacks in Federated Learning using Historical Information.mp4
11.5 MB
IEEE Security & Privacy 2021/Adversarial Watermarking Transformer Towards Tracing Text Provenance with Data Hiding.mp4
11.5 MB
IEEE Security & Privacy 2016/Dedup Est Machina - Memory Deduplication as an Advanced Exploitation Vector.mp4
11.5 MB
IEEE Security & Privacy 2024/9 PrunePlumTree - Finding Eviction Sets at Scale - Tom Kissos.mp4
11.5 MB
IEEE Security & Privacy 2024/2024 25 MQTTactic Security Analysis and Verification for Logic Flaws in MQTT Implementations - szx.mp4
11.5 MB
IEEE Security & Privacy 2019/Certified Robustness to Adversarial Examples with Differential Privacy.mp4
11.4 MB
IEEE Security & Privacy 2024/An Analysis of Recent Advances in Deepfake Image Detection in an Evolving Threat Landscape - sif.mp4
11.4 MB
IEEE Security & Privacy 2020/A Security Analysis of the Facebook Ad Library.mp4
11.4 MB
IEEE Security & Privacy 2024/LLMIF Augmented Large Language Model for Fuzzing IoT Devices - Jincheng Wang.mp4
11.4 MB
IEEE Security & Privacy 2023/Accuracy-Privacy Trade-off in Deep Ensemble A Membership Inference Perspective.mp4
11.4 MB
IEEE Security & Privacy 2024/2024 267 Wear's my Data - Understanding the Cross Device Runtime Permission Model in Wearables - Dogu.mp4
11.4 MB
IEEE Security & Privacy 2019/On the Feasibility of Rerouting-Based DDoS Defenses.mp4
11.4 MB
IEEE Security & Privacy 2024/One for All and All for One - GNN based Control Flow Attestation for Embedded Devices - Richard M.mp4
11.4 MB
IEEE Security & Privacy 2020/Influencing Photo Sharing Decisions on Social Media A Case of Paradoxical Findings.mp4
11.4 MB
IEEE Security & Privacy 2018/FP-Stalker - Tracking Browser Fingerprint Evolutions - Antoine Vastel.mp4
11.3 MB
IEEE Security & Privacy 2020/SPECTECTOR Principled Detection of Speculative Information Flows.mp4
11.3 MB
IEEE Security & Privacy 2020/Throwing Darts in the Dark Detecting Bots with Limited Data using Neural Data Augmentation.mp4
11.3 MB
IEEE Security & Privacy 2020/A Tale of Sea and Sky On the Security of Maritime VSAT Communications.mp4
11.3 MB
IEEE Security & Privacy 2020/Automatic Uncovering of Hidden Behaviors from Input Validation in Mobile Apps.mp4
11.3 MB
IEEE Security & Privacy 2021/Co-Inflow Coarse-grained Information Flow Control for Java-like Languages.mp4
11.3 MB
IEEE Security & Privacy 2023/CSIRowhammer - Cryptographic Security and Integrity against Rowhammer.mp4
11.3 MB
IEEE Security & Privacy 2023/Precise Detection of Kernel Data Races with Probabilistic Lockset Analysis.mp4
11.3 MB
IEEE Security & Privacy 2022/Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms.mp4
11.3 MB
IEEE Security & Privacy 2020/Automated Reverse Engineering and Privacy Analysis of Modern Cars.mp4
11.2 MB
IEEE Security & Privacy 2024/S&PFinal - Louis Henri.mp4
11.2 MB
IEEE Security & Privacy 2019/Short Text, Large Effect Measuring the Impact of User Reviews on Android App Security & Privacy.mp4
11.2 MB
IEEE Security & Privacy 2023/Three-party Non-linear Computation without Preprocessing for Privacy-preserving Machine Learning.mp4
11.2 MB
IEEE Security & Privacy 2021/On the Anonymity Guarantees of Anonymous Proof-of-Stake Protocols.mp4
11.2 MB
IEEE Security & Privacy 2021/Post-Quantum WireGuard.mp4
11.2 MB
IEEE Security & Privacy 2023/Understanding the (In)Security of Cross-side Face Verification Systems in Mobile Apps.mp4
11.2 MB
IEEE Security & Privacy 2020/SPECCFI Mitigating Spectre Attacks Using CFI Informed Speculation.mp4
11.1 MB
IEEE Security & Privacy 2023/Limits of I O Based Ransomware Detection An Imitation Based Attack.mp4
11.1 MB
IEEE Security & Privacy 2020/Transys Leveraging Common Security Properties across Hardware Designs.mp4
11.1 MB
IEEE Security & Privacy 2020/AdGraph A Graph-Based Approach to Ad and Tracker Blocking.mp4
11.1 MB
IEEE Security & Privacy 2024/2024 517 Understanding and Benchmarking the Commonality of Adversarial Examples - cheng yushi.mp4
11.1 MB
IEEE Security & Privacy 2023/A Security RISC Microarchitectural Attacks on Hardware RISC-V CPUs.mp4
11.0 MB
IEEE Security & Privacy 2022/Surakav Generating Realistic Traces for a Strong Website Fingerprinting Defense.mp4
11.0 MB
IEEE Security & Privacy 2024/Nebula A Privacy First Platform for Data Backhaul - Jean Luc Watson.mp4
11.0 MB
IEEE Security & Privacy 2020/Private Resource Allocators and Their Applications.mp4
11.0 MB
IEEE Security & Privacy 2021/Machine unlearning.mp4
10.9 MB
IEEE Security & Privacy 2020/Pangolin Incremental Hybrid Fuzzing with Polyhedral Path Abstraction.mp4
10.9 MB
IEEE Security & Privacy 2020/Ex-vivo Dynamic Analysis Framework for Android Device Drivers.mp4
10.9 MB
IEEE Security & Privacy 2024/MPCitH without reputation IEEE S0P online - qw gao.mp4
10.9 MB
IEEE Security & Privacy 2021/ARBITRAR - User-Guided API Misuse Detection.mp4
10.9 MB
IEEE Security & Privacy 2024/WeSee Using Malicious #VC Interrupts to Break AMD SEV SNP - Supraja Sridhara.mp4
10.9 MB
IEEE Security & Privacy 2020/Tactical Provenance Analysis our Endpoint Detection and Response Systems.mp4
10.9 MB
IEEE Security & Privacy 2020/Unexpected Data Dependency Creation and Chaining A New Attack to SDN.mp4
10.8 MB
IEEE Security & Privacy 2020/VeriSmart A Highly Precise Safety Verifier for Ethereum Smart Contracts.mp4
10.8 MB
IEEE Security & Privacy 2021/Detecting AI Trojans Using Meta Neural Analysis.mp4
10.8 MB
IEEE Security & Privacy 2021/When Function Signature Recovery Meets Compiler Optimization.mp4
10.8 MB
IEEE Security & Privacy 2020/The Last Mile High-Assurance and High-Speed Cryptographic Implementations.mp4
10.8 MB
IEEE Security & Privacy 2023/SelectFuzz Efficient Directed Fuzzing with Selective Path Exploration.mp4
10.8 MB
IEEE Security & Privacy 2024/2024 176 PolySphinx Extending the Sphinx Mix Format with Better Multicast Support - Daniel Schadt.mp4
10.8 MB
IEEE Security & Privacy 2021/Linking Bluetooth LE & Classic and Implications for Privacy-Preserving Bluetooth-Based Protocols.mp4
10.8 MB
IEEE Security & Privacy 2021/Compositional Non-Interference for Fine-Grained Concurrent Programs.mp4
10.7 MB
IEEE Security & Privacy 2020/Cornucopia Temporal Safety for CHERI Heaps.mp4
10.7 MB
IEEE Security & Privacy 2021/The EMV Standard Break, Fix, Verify.mp4
10.7 MB
IEEE Security & Privacy 2024/Ehsanul Kabir FLShield A Validation Based Federated Learning Framework to Defend Against Poisonin.mp4
10.7 MB
IEEE Security & Privacy 2023/Finding Specification Blind Spots via Fuzz Testing.mp4
10.7 MB
IEEE Security & Privacy 2024/GroVE 20mins S&P - Asim Waheed.mp4
10.7 MB
IEEE Security & Privacy 2021/Which Privacy and Security Attributes Most Impact Consumers' Risk Perception and Willingness to.mp4
10.7 MB
IEEE Security & Privacy 2022/SoK Demystifying Binary Lifters Through the Lens of Downstream Applications.mp4
10.7 MB
IEEE Security & Privacy 2021/Android Custom Permissions Demystified From Privilege Escalation to Design Shortcomings.mp4
10.6 MB
IEEE Security & Privacy 2023/Continual Observation under User-level Differential Privacy.mp4
10.6 MB
IEEE Security & Privacy 2023/AI-Guardian Defeating Adversarial Attacks using Backdoors.mp4
10.6 MB
IEEE Security & Privacy 2020/Browsing Unicity On the Limits of Anonymizing Web Tracking Data.mp4
10.6 MB
IEEE Security & Privacy 2021/One Engine to Fuzz 'em All Generic Language Processor Testing with Semantic Validation.mp4
10.6 MB
IEEE Security & Privacy 2020/Plundervolt Software-Based Fault Injection Attacks against Intel SGX.mp4
10.6 MB
IEEE Security & Privacy 2021/Keep the Dirt Tain'ted TreeKEM, Adaptively and Actively Secure Continuous Group Key Agreement.mp4
10.5 MB
IEEE Security & Privacy 2018/DEEPSEC - Deciding Equivalence Properties in Security Protocols - Theory and Practice.mp4
10.5 MB
IEEE Security & Privacy 2021/CacheOut Leaking Data on Intel CPUs via Cache Evictions.mp4
10.5 MB
IEEE Security & Privacy 2024/2024 125 DeepTheft Stealing DNN Model Architectures through Power Side Channel - Garrison Gao.mp4
10.5 MB
IEEE Security & Privacy 2023/Low-Cost Privilege Separation with Compile Time Compartmentalization for Embedded Systems.mp4
10.5 MB
IEEE Security & Privacy 2020/Neutain't Efficient Dynamic Tain't Analysis with Neural Networks.mp4
10.4 MB
IEEE Security & Privacy 2021/Reading Between the Lines An Extensive Evaluation of the Security and Privacy Implications.mp4
10.4 MB
IEEE Security & Privacy 2021/Doing good by fighting fraud Ethical anti-fraud systems for mobile payments.mp4
10.4 MB
IEEE Security & Privacy 2021/Trust, But Verify A Longitudinal Analysis Of Android OEM Compliance and Customization.mp4
10.4 MB
IEEE Security & Privacy 2021/Good Bot, Bad Bot Characterizing Automated Browsing Activity.mp4
10.4 MB
IEEE Security & Privacy 2023/Continuous Intrusion Characterizing the Security of Continuous Integration Services.mp4
10.4 MB
IEEE Security & Privacy 2020/PMP Cost-Effective Forced Execution with Probabilistic Memory Pre-planning.mp4
10.3 MB
IEEE Security & Privacy 2020/Dragonblood Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd.mp4
10.3 MB
IEEE Security & Privacy 2018/AI2 - Safety and Robustness Certification of Neural Networks.mp4
10.3 MB
IEEE Security & Privacy 2024/Scalable Mixed Mode MPC - Radhika Garg.mp4
10.3 MB
IEEE Security & Privacy 2021/Bookworm Game Automatic Discovery of LTE Vulnerabilities Through Documentation Analysis.mp4
10.3 MB
IEEE Security & Privacy 2016/Cloak of Visibility - Detecting When Machines Browse a Different Web.mp4
10.2 MB
IEEE Security & Privacy 2022/MeshUp Stateless Cache Side-channel Attack on CPU Mesh.mp4
10.2 MB
IEEE Security & Privacy 2024/A Security Analysis of Honey Vaults - Fei Duan.mp4
10.2 MB
IEEE Security & Privacy 2019/Blind Certificate Authorities.mp4
10.2 MB
IEEE Security & Privacy 2020/Binsec Rel Efficient Relational Symbolic Execution for Constant-Time at Binary-Level.mp4
10.2 MB
IEEE Security & Privacy 2021/HackEd A Pedagogical Analysis of Online Vulnerability Discovery Exercises.mp4
10.2 MB
IEEE Security & Privacy 2020/Krace Data Race Fuzzing for Kernel File Systems.mp4
10.2 MB
IEEE Security & Privacy 2020/VerX Safety Verification of Smart Contracts.mp4
10.2 MB
IEEE Security & Privacy 2021/CrossTalk Speculative Data Leaks Across Cores Are Real.mp4
10.1 MB
IEEE Security & Privacy 2020/WaveSpy Remote and Through-wall Screen Attack via mmWave Sensing.mp4
10.1 MB
IEEE Security & Privacy 2021/Compositional Security for Reentrant Applications.mp4
10.1 MB
IEEE Security & Privacy 2024/Pulling Off The Mask Forensic Analysis of the Deceptive Creator Wallets Behind Smart Contract Fr.mp4
10.1 MB
IEEE Security & Privacy 2024/2024 13 Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis.mp4
10.1 MB
IEEE Security & Privacy 2021/Improving Password Guessing via Representation Learning.mp4
10.1 MB
IEEE Security & Privacy 2020/High Precision Open-World Website Fingerprinting.mp4
10.1 MB
IEEE Security & Privacy 2024/Everyone for Themselves - A Qualitative Study about Individual Security Setups of Open Source Sof.mp4
10.1 MB
IEEE Security & Privacy 2021/Learning Differentially Private Mechanisms.mp4
10.0 MB
IEEE Security & Privacy 2024/2024 305 Pianist Scalable zkRollups via Fully Distributed Zero Knowledge Proofs - Tianyi Liu.mp4
10.0 MB
IEEE Security & Privacy 2021/Ed25519 Signature Schemes Theory and Practice.mp4
10.0 MB
IEEE Security & Privacy 2020/Transparent Polynomial Delegation and Its Applications to Zero Knowledge Proof.mp4
10.0 MB
IEEE Security & Privacy 2020/Fuzzing JavaScript Engines with Aspect-Preserving Mutation.mp4
10.0 MB
IEEE Security & Privacy 2021/Real-World Snapshots vs. Theory Questioning the t-Probing Security Model.mp4
10.0 MB
IEEE Security & Privacy 2021/Lightweight Techniques for Private Heavy Hitters.mp4
10.0 MB
IEEE Security & Privacy 2021/CANnon Reliable and Stealthy Remote Shutdown Attacks via Unaltered Automotive Microcontrollers.mp4
10.0 MB
IEEE Security & Privacy 2020/Breaking and (Partially) Fixing Provably Secure Onion Routing.mp4
9.9 MB
IEEE Security & Privacy 2020/FlyClient Super-Light Clients for Cryptocurrencies.mp4
9.9 MB
IEEE Security & Privacy 2021/Lockable Signatures for Blockchains Scriptless Scripts for all Signatures.mp4
9.9 MB
IEEE Security & Privacy 2020/Understanding and Mitigating Security Risks of General Messaging Protocols on IoT Clouds.mp4
9.9 MB
IEEE Security & Privacy 2020/SoK Understanding the Prevailing Security Vulnerabilities in TrustZone-Assisted TEE Systems.mp4
9.9 MB
IEEE Security & Privacy 2024/2023 219 Formal Model Driven Analysis of Resilience of GossipSub to Attacks from Misbehaving Peers.mp4
9.9 MB
IEEE Security & Privacy 2020/How Not to Prove Your Election Outcome.mp4
9.9 MB
IEEE Security & Privacy 2020/HopSkipJumpAttack A Query-Efficient Decision-Based Attack.mp4
9.9 MB
IEEE Security & Privacy 2024/NFCEraser A Security Threat of NFC Message Modification Caused by Quartz Crystal Oscillator - Jo.mp4
9.9 MB
IEEE Security & Privacy 2024/2024 151 Shedding Light on CVSS Scoring Inconsistencies - A User Centric Study on Evaluating Widespre.mp4
9.9 MB
IEEE Security & Privacy 2015/Opening Remarks of the 2015 IEEE Symposium on Security & Privacy.mp4
9.9 MB
IEEE Security & Privacy 2020/TARDIS Rolling Back the Clock on CMS-Targeting Cyber Attacks.mp4
9.8 MB
IEEE Security & Privacy 2024/tor1 - Zhongtang Luo.mp4
9.8 MB
IEEE Security & Privacy 2022/DeepCoFFEA Improved Flow Correlation Attacks on Tor via Metric Learning and Amplification.mp4
9.8 MB
IEEE Security & Privacy 2020/Towards Effective Differential Privacy Comms for Users' Data Sharing Decision and Comprehension.mp4
9.8 MB
IEEE Security & Privacy 2021/Trouble Over-The-Air An Analysis of FOTA Apps in the Android Ecosystem.mp4
9.8 MB
IEEE Security & Privacy 2020/Towards a Natural Perspective of Smart Homes for Practical Security and Safety Analyses.mp4
9.8 MB
IEEE Security & Privacy 2024/Cheng Gongye Side Channel Assisted Reverse Engineering of Encrypted DNN Hardware Accelerator IP.mp4
9.8 MB
IEEE Security & Privacy 2020/Replicated State Machines without Replicated Execution.mp4
9.8 MB
IEEE Security & Privacy 2021/Is Private Learning Possible with Instance Encoding.mp4
9.7 MB
IEEE Security & Privacy 2020/OAT Attesting Operation Integrity of Embedded Devices.mp4
9.7 MB
IEEE Security & Privacy 2019/Port Contention for Fun and Profit.mp4
9.7 MB
IEEE Security & Privacy 2024/Flash a comprehensive approach to intrusion detection via provenance graph representation learning.mp4
9.7 MB
IEEE Security & Privacy 2023/PLA-LiDAR Physical Laser Attacks against LiDAR-based 3D Object Detection in Autonomous Vehicle.mp4
9.7 MB
IEEE Security & Privacy 2021/ConDySTA Context-Aware Dynamic Supplement to Static Tain't Analysis.mp4
9.7 MB
IEEE Security & Privacy 2024/2024 88 AFGEN Whole Function Fuzzing for Applications and Libraries - Yuwei LIU 1.mp4
9.7 MB
IEEE Security & Privacy 2021/CryptGPU Fast Privacy-Preserving Machine Learning on the GPU.mp4
9.7 MB
IEEE Security & Privacy 2020/EverCrypt A Fast, Verified, Cross-Platform Cryptographic Provider.mp4
9.6 MB
IEEE Security & Privacy 2024/Pryde - A Modular Generalizable Workflow for Uncovering Evasion Attacks Against Stateful Firewall.mp4
9.6 MB
IEEE Security & Privacy 2024/sp24 long recording - Jannis Rautenstrauch.mp4
9.6 MB
IEEE Security & Privacy 2021/SmartPulse Automated Checking of Temporal Properties in Smart Contracts.mp4
9.6 MB
IEEE Security & Privacy 2020/A Programming Framework for Differential Privacy with Accuracy Concentration Bounds.mp4
9.6 MB
IEEE Security & Privacy 2024/Where URLs Become Weapons - Automated Discovery of SSRF Vulnerabilities in Web Applications - Sam.mp4
9.6 MB
IEEE Security & Privacy 2021/DICE Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis.mp4
9.6 MB
IEEE Security & Privacy 2019/Resident Evil Understanding Residential IP Proxy as a Dark Service.mp4
9.6 MB
IEEE Security & Privacy 2022/ShorTor Improving Tor Network Latency via Multi-hop Overlay Routing.mp4
9.6 MB
IEEE Security & Privacy 2024/Architectural Mimicry - Innovative Instructions to Efficiently Address Control Flow Leakage in Dat.mp4
9.5 MB
IEEE Security & Privacy 2021/A Secure and Formally Verified Linux KVM Hypervisor.mp4
9.5 MB
IEEE Security & Privacy 2020/Semantic Understanding of Smart Contracts Executable Operational Semantics of Solidity.mp4
9.5 MB
IEEE Security & Privacy 2020/This PIN Can Be Easily Guessed Analyzing the Security of Smartphone Unlock PINs.mp4
9.5 MB
IEEE Security & Privacy 2021/Runtime Recovery of Web Applications under Zero-Day ReDoS Attacks.mp4
9.4 MB
IEEE Security & Privacy 2024/2024 50 BAFFLE - Mr HE Junda.mp4
9.4 MB
IEEE Security & Privacy 2021/Data Privacy in Trigger-Action IoT Systems.mp4
9.4 MB
IEEE Security & Privacy 2023/Locally Differentially Private Frequency Estimation Based on Convolution Framework.mp4
9.4 MB
IEEE Security & Privacy 2021/Cross Layer Attacks and How to Use Them (for DNS Cache Poisoning, Device Tracking and More).mp4
9.4 MB
IEEE Security & Privacy 2020/Enabling Rack-scale Confidential Computing Using Heterogeneous Trusted Execution Environment.mp4
9.4 MB
IEEE Security & Privacy 2021/DIFUZZRTL Differential Fuzz Testing to Find CPU Bugs.mp4
9.4 MB
IEEE Security & Privacy 2020/Sync HotStuff Simple and Practical Synchronous State Machine Replication.mp4
9.4 MB
IEEE Security & Privacy 2021/Systematic Analysis of Randomization-based Protected Cache Architectures.mp4
9.3 MB
IEEE Security & Privacy 2024/322 - SoK SGX Fail How Stuff Gets eXposed - Stephan van Schaik.mp4
9.3 MB
IEEE Security & Privacy 2020/TRRespass Exploiting the Many Sides of Target Row Refresh.mp4
9.3 MB
IEEE Security & Privacy 2020/A Comparative Usability Study of FIDO2 Passwordless Authentication.mp4
9.3 MB
IEEE Security & Privacy 2021/Proactive Threshold Wallets with Offline Devices.mp4
9.3 MB
IEEE Security & Privacy 2023/Rethinking Searchable Symmetric Encryption.mp4
9.3 MB
IEEE Security & Privacy 2022/Transfer Attacks Revisited A Large-Scale Empirical Study in Real Computer Vision Settings.mp4
9.3 MB
IEEE Security & Privacy 2023/SoK Anti-Facial Recognition Technology.mp4
9.2 MB
IEEE Security & Privacy 2020/SoK Differential Privacy as a Causal Property.mp4
9.2 MB
IEEE Security & Privacy 2021/High-Frequency Trading on Decentralized On-Chain Exchanges.mp4
9.2 MB
IEEE Security & Privacy 2024/Piano Extremely Simple Single Server PIR with Sublinear Server Computation - Mingxun Zhou.mp4
9.2 MB
IEEE Security & Privacy 2019/Full speed Fuzzing Reducing Fuzzing Overhead through Coverage-guided Tracing.mp4
9.2 MB
IEEE Security & Privacy 2021/Bitcoin-Compatible Virtual Channels.mp4
9.2 MB
IEEE Security & Privacy 2022/IronMask Versatile Verification of Masking Security.mp4
9.2 MB
IEEE Security & Privacy 2024/APP Miner Detecting API Misuses via Automatically Mining API Path Patterns - Jiasheng Jiang.mp4
9.1 MB
IEEE Security & Privacy 2021/SIRNN A Math Library for Secure RNN Inference.mp4
9.1 MB
IEEE Security & Privacy 2024/2024 102 BOUNCEATTACK A Query Efficient Decision based Adversarial Attack by Bouncing into the Wild.mp4
9.1 MB
IEEE Security & Privacy 2024/cut final presentation - Sönke Huster.mp4
9.1 MB
IEEE Security & Privacy 2020/Formal Modelling and Proof in the CHERI Design and Implementation Process.mp4
9.1 MB
IEEE Security & Privacy 2021/Wolverine Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and.mp4
9.1 MB
IEEE Security & Privacy 2020/Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability.mp4
9.1 MB
IEEE Security & Privacy 2021/Many-out-of-Many - Proofs and Applications to Anonymous Zether.mp4
9.0 MB
IEEE Security & Privacy 2021/Compact Certificates of Collective Knowledge.mp4
9.0 MB
IEEE Security & Privacy 2024/BELT Old School Backdoor Attacks can Evade the State of the Art Defense with Backdoor Exclusivity.mp4
9.0 MB
IEEE Security & Privacy 2021/Survivalism Systematic Analysis of Malware Living-Off-The-Land.mp4
9.0 MB
IEEE Security & Privacy 2021/NTFUZZ Enabling Type-Aware Kernel Fuzzing on Windows with Static Binary Analysis.mp4
8.9 MB
IEEE Security & Privacy 2024/SoK CollusionResistantMPSI - Jelle Vos.mp4
8.9 MB
IEEE Security & Privacy 2021/DP-Sniper Black-Box Discovery of Differential Privacy Violations using Classifiers.mp4
8.9 MB
IEEE Security & Privacy 2020/Meddling Middlemen Empirical Analysis of the Risks of Data-Saving Mobile Browsers.mp4
8.9 MB
IEEE Security & Privacy 2021/CrawlPhish Large-scale Analysis of Client-side Cloaking Techniques in Phishing.mp4
8.8 MB
IEEE Security & Privacy 2020/CrypTFlow - Secure TensorFlow Inference.mp4
8.8 MB
IEEE Security & Privacy 2021/Hardware-Software Contracts for Secure Speculation.mp4
8.8 MB
IEEE Security & Privacy 2021/Detecting Filter List Evasion With Event-Loop-Turn Granularity JavaScript Signatures.mp4
8.8 MB
IEEE Security & Privacy 2019/Self-Encrypting Deception Weaknesses in the Encryption of Solid State Drives.mp4
8.8 MB
IEEE Security & Privacy 2024/2024 171 Private Analytics via Streaming, Sketching, and Silently Verifiable Proofs - Mayank Rathee.mp4
8.8 MB
IEEE Security & Privacy 2024/Transferable Multimodal Attack on Vision Language Pre training Models - haodi wang.mp4
8.8 MB
IEEE Security & Privacy 2024/Thwarting Last Minute Voter Coercion - Rosario Giustolisi.mp4
8.7 MB
IEEE Security & Privacy 2023/ImU Physical Impersonating Attack for Face Recognition System with Natural Style Changes.mp4
8.7 MB
IEEE Security & Privacy 2024/2024 265 eAudit - A Fast, Scalable and Deployable Audit Data Collection System - Hanke Kimm.mp4
8.7 MB
IEEE Security & Privacy 2021/Electromagnetic Covert Channels Can Be Super Resilient.mp4
8.7 MB
IEEE Security & Privacy 2021/An I O Separation Model for Formal Verification of Kernel Implementations.mp4
8.7 MB
IEEE Security & Privacy 2021/Black Widow Blackbox Data-driven Web Scanning.mp4
8.6 MB
IEEE Security & Privacy 2020/ICLab A Global, Longitudinal Internet Censorship Measurement Platform.mp4
8.6 MB
IEEE Security & Privacy 2021/Diogenes Lightweight Scalable RSA Modulus Generation with a Dishonest Majority.mp4
8.6 MB
IEEE Security & Privacy 2024/Scalable Verification of Zero Knowledge Protocols - MIGUEL ISABEL MÁRQUEZ.mp4
8.5 MB
IEEE Security & Privacy 2021/Red Belly a Deterministic Scalable Open Permissioned Blockchain.mp4
8.5 MB
IEEE Security & Privacy 2020/KARONTE Detecting Insecure Multi-binary Interactions in Embedded Firmware.mp4
8.5 MB
IEEE Security & Privacy 2021/Defensive Technology Use by Political Activists During the Sudanese Revolution.mp4
8.5 MB
IEEE Security & Privacy 2024/Sabre Cutting through Adversarial Noise with Adaptive Spectral Filtering and Input Reconstructio.mp4
8.5 MB
IEEE Security & Privacy 2024/2024 winter 448 Efficient Actively Secure DPF and RAM based 2PC with One Bit Leakage - Wenhao Zhang.mp4
8.5 MB
IEEE Security & Privacy 2021/Revealer Detecting and Exploiting Regular Expression Denial-of-Service Vulnerabilities.mp4
8.5 MB
IEEE Security & Privacy 2024/From Principle to Practice Vertical Data Minimization for Machine Learning - Robin Staab.mp4
8.5 MB
IEEE Security & Privacy 2020/Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers.mp4
8.4 MB
IEEE Security & Privacy 2020/NetCAT Practical Cache Attacks from the Network.mp4
8.4 MB
IEEE Security & Privacy 2021/They Would do Better if They Worked Together The Case of Interaction Problems Between Password.mp4
8.4 MB
IEEE Security & Privacy 2021/On the Just-In-Time Discovery of Profit-Generating Transactions in DeFi Protocols.mp4
8.4 MB
IEEE Security & Privacy 2021/Who is Real Bob Adversarial Attacks on Speaker Recognition Systems.mp4
8.4 MB
IEEE Security & Privacy 2024/A Representative Study on Human Detection of Artificially Generated Media Across Countries - Joe.mp4
8.4 MB
IEEE Security & Privacy 2020/Can Voters Detect Malicious Manipulation of Ballot Marking Devices.mp4
8.3 MB
IEEE Security & Privacy 2021/CRYLOGGER Detecting Crypto Misuses Dynamically.mp4
8.3 MB
IEEE Security & Privacy 2020/Are Anonymity-Seekers Just like Everybody Else An Analysis of Contributions to Wikipedia from Tor.mp4
8.3 MB
IEEE Security & Privacy 2024/2024 614 Few shot Unlearning - Youngsik Yoon.mp4
8.3 MB
IEEE Security & Privacy 2024/LowerBoundsRDP - Tim Kutta.mp4
8.3 MB
IEEE Security & Privacy 2021/SoK Computer-Aided Cryptography.mp4
8.3 MB
IEEE Security & Privacy 2024/Test time Poisoning Attacks Against Test time Adaptation Models - Tianshuo Cong.mp4
8.3 MB
IEEE Security & Privacy 2021/Zero Knowledge for Everything and Everyone Fast ZK Processor with Cached ORAM for ANSI C Programs.mp4
8.3 MB
IEEE Security & Privacy 2020/IJON Exploring Deep State Spaces via Fuzzing.mp4
8.3 MB
IEEE Security & Privacy 2020/Automatically Detecting Bystanders in Photos to Reduce Privacy Risks.mp4
8.2 MB
IEEE Security & Privacy 2024/PIRANA - Faster Multi query PIR via Constant weight Codes - Jingyu Li.mp4
8.2 MB
IEEE Security & Privacy 2024/CaFA - Cost aware, Feasible Attacks With Database Constraints - Matan BT.mp4
8.2 MB
IEEE Security & Privacy 2024/Ad Inventory Pooling in the Ad Tech Supply Chain - Yash Vekaria.mp4
8.1 MB
IEEE Security & Privacy 2021/High-Assurance Cryptography in the Spectre Era.mp4
8.1 MB
IEEE Security & Privacy 2024/Practical Obfuscation of BLE Physical Layer Fingerprints on Mobile Devices - Hadi Givehchian.mp4
8.0 MB
IEEE Security & Privacy 2020/Detection of Electromagnetic Interference Attacks on Sensor Systems.mp4
8.0 MB
IEEE Security & Privacy 2021/How Did That Get In My Phone Unwanted App Distribution on Android Devices.mp4
8.0 MB
IEEE Security & Privacy 2021/Hear No Evil, See Kenansville Efficient and Transferable Black-Box Attacks on Automatic.mp4
8.0 MB
IEEE Security & Privacy 2021/Proof-of-Learning Definitions and Practice.mp4
7.9 MB
IEEE Security & Privacy 2023/On the Evolution of (Hateful) Memes by Means of Multimodal Contrastive Learning.mp4
7.9 MB
IEEE Security & Privacy 2024/#498 Learn What You Want to Unlearn Unlearning Inversion Attacks against Machine Unlearning - Hongsh.mp4
7.9 MB
IEEE Security & Privacy 2024/SoK Prudent Evaluation Practices for Fuzzing - Moritz Schloegel.mp4
7.9 MB
IEEE Security & Privacy 2020/Hijacking Transient Execution through Microarchitectural Load Value Injection.mp4
7.8 MB
IEEE Security & Privacy 2020/SPIDER Enabling Fast Patch Propagation in Related Software Repositories.mp4
7.8 MB
IEEE Security & Privacy 2024/Preserving Node level Privacy in Graph Neural Networks - ZH X.mp4
7.8 MB
IEEE Security & Privacy 2020/Full-band De-anonymization of Bluetooth Classic Devices.mp4
7.8 MB
IEEE Security & Privacy 2020/Measuring Legal Compliance of Banners from IAB Europe's Transparancy and Consent Framework.mp4
7.8 MB
IEEE Security & Privacy 2020/BIAS Bluetooth Impersonation AttackS.mp4
7.8 MB
IEEE Security & Privacy 2024/#518 LACMUS Latent Concept Masking for General Robustness Enhancement of DNNs - Hongsheng Hu.mp4
7.8 MB
IEEE Security & Privacy 2023/On The Empirical Effectiveness of Unrealistic Adversarial Hardening Against Realistic Attacks.mp4
7.7 MB
IEEE Security & Privacy 2024/Ati Priya Bajaj Len or index or count, anything but v1 Predicting Variable Names in Decompilation Ou.mp4
7.7 MB
IEEE Security & Privacy 2020/JIT Leaks Inducing Timing Side Channels through Just-In-Time Compilation.mp4
7.6 MB
IEEE Security & Privacy 2020/RetroWrite Statically Instrumenting COTS Binaries for Fuzzing and Sanitization.mp4
7.6 MB
IEEE Security & Privacy 2021/A First Look at Zoombombing.mp4
7.4 MB
IEEE Security & Privacy 2021/A Decentralized and Encrypted National Gun Registry.mp4
7.4 MB
IEEE Security & Privacy 2019/PERUN Virtual Payment Hubs over Cryptographic Currencies.mp4
7.3 MB
IEEE Security & Privacy 2020/ZEXE Enabling Decentralized Private Computation.mp4
7.3 MB
IEEE Security & Privacy 2024/CanWeCastABallotAsIntendedAndBeReceiptFree - Henri Devillez.mp4
7.3 MB
IEEE Security & Privacy 2020/The Value of Collaboration in Convex Machine Learning with Differential Privacy.mp4
7.2 MB
IEEE Security & Privacy 2021/Ebb-and-Flow Protocols A Resolution of the Availability-Finality Dilemma.mp4
7.2 MB
IEEE Security & Privacy 2020/SoK Cyber Insurance - Technical Challenges and a System Security Roadmap.mp4
7.2 MB
IEEE Security & Privacy 2021/A2L Anonymous Atomic Locks for Scalability in Payment Channel Hubs.mp4
7.2 MB
IEEE Security & Privacy 2021/Invisible Probe Timing Attacks with PCIe Congestion Side-channel.mp4
7.1 MB
IEEE Security & Privacy 2020/Gesture Authentication for Smartphones Evaluation of Gesture Password Selection Policies.mp4
7.1 MB
IEEE Security & Privacy 2023/Leaking Arbitrarily Many Secrets Any-out-of-Many Proofs and Applications to RingCT Protocols.mp4
7.1 MB
IEEE Security & Privacy 2021/Response-Hiding Encrypted Ranges Revisiting Security via Parametrized Leakage-Abuse Attacks.mp4
7.1 MB
IEEE Security & Privacy 2024/545video - Irina Ford.mp4
7.0 MB
IEEE Security & Privacy 2016/Opening Remarks of the 2016 IEEE Symposium on Security & Privacy.mp4
7.0 MB
IEEE Security & Privacy 2021/Manipulation Attacks in Local Differential Privacy.mp4
7.0 MB
IEEE Security & Privacy 2020/An Analysis of Pre-installed Android Software.mp4
7.0 MB
IEEE Security & Privacy 2021/Adversary Instantiation Lower bounds for differentially private machine learning.mp4
7.0 MB
IEEE Security & Privacy 2024/PromptCARE Prompt Copyright Protection by Watermark Injection and Verification - homeway yao.mp4
7.0 MB
IEEE Security & Privacy 2021/BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures.mp4
7.0 MB
IEEE Security & Privacy 2024/A Picture is Worth 500 Labels A Case Study of Demographic Disparities in Local Machine Learning M.mp4
6.9 MB
IEEE Security & Privacy 2021/Pegasus Bridging Polynomial and Non-polynomial Evaluations in Homomorphic Encryption.mp4
6.9 MB
IEEE Security & Privacy 2024/Understanding Parents' Perceptions and Practices Toward Children's Security and Privacy in Virtua.mp4
6.8 MB
IEEE Security & Privacy 2024/2024 531 Please Tell Me More - Liu Han.mp4
6.8 MB
IEEE Security & Privacy 2021/A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer.mp4
6.7 MB
IEEE Security & Privacy 2021/MAD-HTLC Because HTLC is Crazy-Cheap to Attack.mp4
6.7 MB
IEEE Security & Privacy 2024/BadVFL backdoor attacks in vertical federated learning - Mohammad Naseri.mp4
6.7 MB
IEEE Security & Privacy 2024/Casual Users and Rational Choices within Differential Privacy - Narges Ashena.mp4
6.6 MB
IEEE Security & Privacy 2024/sp 2024 holepunch final - Zachary Ratliff.mp4
6.5 MB
IEEE Security & Privacy 2021/Journey to the Center of the Cookie Ecosystem Unraveling Actors' Roles and Relationships.mp4
6.3 MB
IEEE Security & Privacy 2024/On SMS Phishing Tactics and Infrastructure - Alex Nahapetyan.mp4
6.2 MB
IEEE Security & Privacy 2024/Patchy Performance - Uncovering the Vulnerability Management Practices of IoT Centric Vendors.mp4
6.2 MB
IEEE Security & Privacy 2019/Tap 'n Ghost A Compilation of Novel Attack Techniques against Smartphone Touchscreens.mp4
6.1 MB
IEEE Security & Privacy 2024/Zihao Li NURGLE - zihao li.mp4
6.1 MB
IEEE Security & Privacy 2021/DIANE Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices.mp4
6.0 MB
IEEE Security & Privacy 2024/CoreLocker - Andrew Wang.mp4
6.0 MB
IEEE Security & Privacy 2024/Specular Towards Secure, Trust minimized Optimistic Blockchain Execution - Zhe Ye.mp4
5.8 MB
IEEE Security & Privacy 2024/Measure Observe Remeasure An Interactive Paradigm for Differentially Private Exploratory Analysis.mp4
5.6 MB
IEEE Security & Privacy 2024/Certifying Zero Knowledge Circuits with Refinement Types - Junrui Liu.mp4
5.5 MB
IEEE Security & Privacy 2021/SoK The Faults in our ASRs An Overview of Attacks against Automatic Speech Recognition and.mp4
5.5 MB
IEEE Security & Privacy 2024/video1092237667 - Hoang Nguyen Dai.mp4
5.3 MB
IEEE Security & Privacy 2024/Who Left the Door Open Investigating the Causes of Exposed IoT Devices in an Academic Network.mp4
5.3 MB
IEEE Security & Privacy 2020/Message Time of Arrival Codes A Fundamental Primitive for Secure Distance Measurement.mp4
5.3 MB
IEEE Security & Privacy 2024/2024 319 FCert - yantiing wang.mp4
5.2 MB
IEEE Security & Privacy 2024/2024 37 SoK Safer Digital Safety Research Involving At Risk Users - Rosanna Rosie Bellini.mp4
5.0 MB
IEEE Security & Privacy 2024/2024 205 FlowMur A Stealthy and Practical Audio Backdoor Attack with Limited Knowledge - Jiahe Lan.mp4
5.0 MB
IEEE Security & Privacy 2024/Chronos presentation - sard Chen.mp4
4.9 MB
IEEE Security & Privacy 2024/sokvideo v1 - Max N.mp4
4.8 MB
IEEE Security & Privacy 2021/SGUARD Smart Contracts Made Vulnerability-Free.mp4
4.7 MB
IEEE Security & Privacy 2020/Towards Scalable Threshold Cryptosystems.mp4
4.6 MB
IEEE Security & Privacy 2019/IEEE S&P 2019 - Awards Ceremony.mp4
4.1 MB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SSP 2020 Opening Remarks.eng.json
3.3 MB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Birds of a Feather A Hardware & Security Panel (Deprecated).eng.json
1.8 MB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Birds of a Feather Sharing Cybersecurity Research Artifacts To Accelerate Progress.eng.json
1.6 MB
IEEE Security & Privacy 2019/Neural Cleanse Identifying and Mitigating Backdoor Attacks in Neural Networks.mp4
1.6 MB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Birds of a Feather A Hardware & Security Panel (Updated).eng.json
1.2 MB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Learning to Reconstruct Statistical Learning Theory and Encrypted Database Attacks.eng.json
1.1 MB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/OmniLedger - A Secure, Scale-Out, Decentralized Ledger via Sharding.eng.json
1.0 MB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/High Precision Open-World Website Fingerprinting.eng.json
1.0 MB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Krace Data Race Fuzzing for Kernel File Systems.eng.json
1.0 MB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Waldo A Private Time-Series Database from Function Secret-Sharing.eng.json
953.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Tale of Sea and Sky On the Security of Maritime VSAT Communications.eng.json
953.0 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Implementing and Proving the TLS 1.3 Record Layer.eng.json
941.5 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Verena - End-to-End Integrity Protection for Web Applications.eng.json
920.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability.eng.json
898.0 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/SoK - Deep Packer Inspection - A Longitudinal Study of the Complexity of Run-Time Packers.eng.json
897.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SEVurity No Security Without Integrity - Breaking Integrity.eng.json
896.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Replicated State Machines without Replicated Execution.eng.json
895.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/How Not to Prove Your Election Outcome.eng.json
883.5 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Data Recovery on Encrypted Databases with k-Nearest Neighbor Query Leakage.eng.json
869.9 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/T-Fuzz Fuzzing by Program Transformation - Hui Peng.eng.json
866.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Automated Reverse Engineering and Privacy Analysis of Modern Cars.eng.json
860.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SPIDER Enabling Fast Patch Propagation in Related Software Repositories.eng.json
858.0 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/GraphSC - Parallel Secure Computation Made Easy.eng.json
849.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SoK Understanding the Prevailing Security Vulnerabilities in TrustZone-Assisted TEE Systems.eng.json
848.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/FlyClient Super-Light Clients for Cryptocurrencies.eng.json
845.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Private Resource Allocators and Their Applications.eng.json
838.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Hijacking Transient Execution through Microarchitectural Load Value Injection.eng.json
837.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SPECTECTOR Principled Detection of Speculative Information Flows.eng.json
818.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/AdGraph A Graph-Based Approach to Ad and Tracker Blocking.eng.json
817.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/The Many Kinds of Creepware Used for Interpersonal Attacks.eng.json
813.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Breaking and (Partially) Fixing Provably Secure Onion Routing.eng.json
812.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Path Oblivious Heap Optimal and Practical Oblivious Priority Queue.eng.json
812.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Towards a Natural Perspective of Smart Homes for Practical Security and Safety Analyses.eng.json
808.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/NetCAT Practical Cache Attacks from the Network.eng.json
804.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/RAMBleed Reading Bits in Memory without Accessing Them.eng.json
801.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Kobold Evaluating Decentralized Access Control for Remote NSXPC Methods on iOS.eng.json
801.3 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Low-Bandwidth Threshold ECDSA via Pseudorandom Correlation Generators.eng.json
801.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Security Analysis of the Facebook Ad Library.eng.json
795.1 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Foundations of Dynamic BFT.eng.json
794.2 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Device Fingerprinting with Peripheral Timestamps.eng.json
794.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/EverCrypt A Fast, Verified, Cross-Platform Cryptographic Provider.eng.json
784.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SoK Differential Privacy as a Causal Property.eng.json
778.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/VerX Safety Verification of Smart Contracts.eng.json
776.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/CrypTFlow - Secure TensorFlow Inference.eng.json
772.1 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Security of the J-PAKE Password-Authenticated Key Exchange Protocol.eng.json
766.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Programming Framework for Differential Privacy with Accuracy Concentration Bounds.eng.json
762.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Are Anonymity-Seekers Just like Everybody Else An Analysis of Contributions to Wikipedia from Tor.eng.json
757.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/ZEXE Enabling Decentralized Private Computation.eng.json
756.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Meddling Middlemen Empirical Analysis of the Risks of Data-Saving Mobile Browsers.eng.json
753.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/This PIN Can Be Easily Guessed Analyzing the Security of Smartphone Unlock PINs.eng.json
747.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/HydRand Efficient Continuous Distributed Randomness.eng.json
739.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Full-band De-anonymization of Bluetooth Classic Devices.eng.json
738.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/TRRespass Exploiting the Many Sides of Target Row Refresh.eng.json
738.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Transparent Polynomial Delegation and Its Applications to Zero Knowledge Proof.eng.json
738.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Intriguing Properties of Adversarial ML Attacks in the Problem Space.eng.json
738.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/xMP Selective Memory Protection for Kernel and User Space.eng.json
735.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/The State of the Uniform Attacks on Encrypted Databases beyond the Uniform Query Distribution.eng.json
734.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Humpty Dumpty Controlling Word Meanings via Corpus Poisoning.eng.json
733.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Ex-vivo Dynamic Analysis Framework for Android Device Drivers.eng.json
732.8 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/ShorTor Improving Tor Network Latency via Multi-hop Overlay Routing.eng.json
731.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SoK A Minimalist Approach to Formalizing Analog Sensor Security.eng.json
725.1 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/WIGHT Wired Ghost Touch Attack on Capacitive Touchscreens.eng.json
723.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Pseudorandom Black Swans Cache Attacks on CTR DRBG.eng.json
718.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Ask the Experts What Should Be on an IoT Privacy and Security Label.eng.json
717.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Are We Susceptible to Rowhammer An End-to-End Methodology for Cloud Providers.eng.json
707.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/OHIE Blockchain Scaling Made Simple.eng.json
704.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/ICAS An Extensible Framework for Estimating the Susceptibility of IC Layouts to Additive Trojans.eng.json
702.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Cornucopia Temporal Safety for CHERI Heaps.eng.json
698.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Message Time of Arrival Codes A Fundamental Primitive for Secure Distance Measurement.eng.json
692.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/JIT Leaks Inducing Timing Side Channels through Just-In-Time Compilation.eng.json
692.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Automatic Uncovering of Hidden Behaviors from Input Validation in Mobile Apps.eng.json
683.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SoK Cyber Insurance - Technical Challenges and a System Security Roadmap.eng.json
682.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Flaw Label Exploiting IPv6 Flow Label.eng.json
682.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Sync HotStuff Simple and Practical Synchronous State Machine Replication.eng.json
682.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/HopSkipJumpAttack A Query-Efficient Decision-Based Attack.eng.json
681.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Dragonblood Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd.eng.json
681.4 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/ADI Adversarial Dominating Inputs in Vertical Federated Learning Systems.eng.json
681.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Formal Modelling and Proof in the CHERI Design and Implementation Process.eng.json
681.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Semantic Understanding of Smart Contracts Executable Operational Semantics of Solidity.eng.json
678.3 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Beyond Credential Stuffing Password Similarity Models using Neural Networks.eng.json
674.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Combating Dependence Explosion in Forensic Analysis Using Alternative Tag Propagation Semantics.eng.json
673.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers.eng.json
670.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/RetroWrite Statically Instrumenting COTS Binaries for Fuzzing and Sanitization.eng.json
663.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Binsec Rel Efficient Relational Symbolic Execution for Constant-Time at Binary-Level.eng.json
663.0 kB
IEEE Security & Privacy 2024/2024 62 Enforcing End to end Security for Remote Conferencing - Triste L.eng.json
662.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Influencing Photo Sharing Decisions on Social Media A Case of Paradoxical Findings.eng.json
662.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Towards Effective Differential Privacy Comms for Users' Data Sharing Decision and Comprehension.eng.json
660.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/KARONTE Detecting Insecure Multi-binary Interactions in Embedded Firmware.eng.json
659.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Leveraging EM Side-Channel Information to Detect Rowhammer Attacks.eng.json
651.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Browsing Unicity On the Limits of Anonymizing Web Tracking Data.eng.json
647.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SPECCFI Mitigating Spectre Attacks Using CFI Informed Speculation.eng.json
647.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Fuzzing JavaScript Engines with Aspect-Preserving Mutation.eng.json
646.7 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/A2L Anonymous Atomic Locks for Scalability in Payment Channel Hubs.eng.json
642.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Automatically Detecting Bystanders in Photos to Reduce Privacy Risks.eng.json
637.7 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Adversary Instantiation Lower bounds for differentially private machine learning.eng.json
633.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/IJON Exploring Deep State Spaces via Fuzzing.eng.json
627.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Transys Leveraging Common Security Properties across Hardware Designs.eng.json
625.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Neutain't Efficient Dynamic Tain't Analysis with Neural Networks.eng.json
622.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Comparative Usability Study of FIDO2 Passwordless Authentication.eng.json
622.3 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Multi-Server Verifiable Computation of Low-Degree Polynomials.eng.json
620.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/PMP Cost-Effective Forced Execution with Probabilistic Memory Pre-planning.eng.json
615.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network.eng.json
612.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/ICLab A Global, Longitudinal Internet Censorship Measurement Platform.eng.json
605.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SEIMI Efficient and Secure SMAP-Enabled Intra-process Memory Isolation.eng.json
597.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Pangolin Incremental Hybrid Fuzzing with Polyhedral Path Abstraction.eng.json
596.6 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Crowd-GPS-Sec - Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks.eng.json
596.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Detection of Electromagnetic Interference Attacks on Sensor Systems.eng.json
595.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/An Analysis of Pre-installed Android Software.eng.json
594.2 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Discop Provably Secure Steganography in Practice Based on Distribution Copies.eng.json
591.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Unexpected Data Dependency Creation and Chaining A New Attack to SDN.eng.json
587.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Throwing Darts in the Dark Detecting Bots with Limited Data using Neural Data Augmentation.eng.json
585.6 kB
IEEE Security & Privacy 2024/Practical Obfuscation of BLE Physical Layer Fingerprints on Mobile Devices - Hadi Givehchian.eng.json
584.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/TARDIS Rolling Back the Clock on CMS-Targeting Cyber Attacks.eng.json
583.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Tactical Provenance Analysis our Endpoint Detection and Response Systems.eng.json
575.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Gesture Authentication for Smartphones Evaluation of Gesture Password Selection Policies.eng.json
567.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/VeriSmart A Highly Precise Safety Verifier for Ethereum Smart Contracts.eng.json
566.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Understanding and Mitigating Security Risks of General Messaging Protocols on IoT Clouds.eng.json
555.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/The Value of Collaboration in Convex Machine Learning with Differential Privacy.eng.json
555.0 kB
IEEE Security & Privacy 2024/2024 176 PolySphinx Extending the Sphinx Mix Format with Better Multicast Support - Daniel Schadt.eng.json
552.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/The Last Mile High-Assurance and High-Speed Cryptographic Implementations.eng.json
551.1 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Learning Differentially Private Mechanisms.eng.json
549.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/WaveSpy Remote and Through-wall Screen Attack via mmWave Sensing.eng.json
545.6 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Improving Password Guessing via Representation Learning.eng.json
545.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/BIAS Bluetooth Impersonation AttackS.eng.json
538.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Enabling Rack-scale Confidential Computing Using Heterogeneous Trusted Execution Environment.eng.json
533.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SAVIOR Towards Bug-Driven Hybrid Testing.eng.json
528.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Measuring Legal Compliance of Banners from IAB Europe's Transparancy and Consent Framework.eng.json
526.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/MarkUs Drop-in Use-After-Free Prevention for Low-Level Languages.eng.json
525.4 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/DynPTA Combining Static and Dynamic Analysis for Practical Selective Data Protection.eng.json
525.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Towards Scalable Threshold Cryptosystems.eng.json
510.5 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/AccEar Accelerometer Acoustic Eavesdropping with Unconstrained Vocabulary.eng.json
503.6 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Android Custom Permissions Demystified From Privilege Escalation to Design Shortcomings.eng.json
494.7 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Goshawk Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis.eng.json
494.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/OAT Attesting Operation Integrity of Embedded Devices.eng.json
492.8 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Spectral-DP Differentially Private Deep Learning through Spectral Perturbation and Filtering.eng.json
487.3 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Skyfire - Data-Driven Seed Generation for Fuzzing.eng.json
480.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/TextExerciser Feedback-Driven Text Input Exercising for Android Applications.eng.json
474.2 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Response-Hiding Encrypted Ranges Revisiting Security via Parametrized Leakage-Abuse Attacks.eng.json
474.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Establishing Economic Incentives for Security Patching of IoT Consumer Products.eng.json
470.3 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/AI-Guardian Defeating Adversarial Attacks using Backdoors.eng.json
466.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Plundervolt Software-Based Fault Injection Attacks against Intel SGX.eng.json
457.4 kB
IEEE Security & Privacy 2024/ALIF Low Cost Adversarial Audio Attacks on Black Box Speech Platforms using Linguistic Features.eng.json
449.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Can Voters Detect Malicious Manipulation of Ballot Marking Devices.eng.json
411.3 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/NITRD Panel - Federal Cybersecurity and Privacy R&D Strategic Plans.eng.srt
183.3 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/LangSec Keynote Trojan Source and Bad Characters Invisible Hacks and Reluctant Patching.eng.srt
137.6 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/IEEE S&P 2019 - 40th Celebration Plenary Session Panel Reflections on four decades of the symposium.eng.srt
108.4 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/S&P TC Business Meeting.eng.srt
100.7 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/IEEE S&P 2022 Opening Session.eng.srt
92.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SSP 2020 Opening Remarks.eng.srt
90.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SSP 2020 Opening Remarks.eng.txt
85.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SSP 2020 Opening Remarks.eng.lrc
84.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SSP 2020 Opening Remarks.eng.vtt
84.3 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/IEEE S&P 2023 Short Talks.eng.srt
81.1 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/CHERI - A Hybrid Capability-System Architecture for Scalable Software Compartmentalization.eng.srt
79.1 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/SoK - Science, Security, and the Elusive Goal of Security as a Scientific Pursuit.eng.srt
77.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SSP 2020 Opening Remarks.eng.tsv
75.4 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Routing Around Congestion - Defeating DDoS Attacks and Adverse Network Conditions via Reactive.eng.srt
75.2 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Cloak and Dagger - From Two Permissions to Complete Control of the UI Feedback Loop.eng.srt
73.8 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/On Subnormal Floating Point and Abnormal Timing.eng.srt
71.3 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Towards Evaluating the Robustness of Neural Networks.eng.srt
69.5 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/A2 - Analog Malicious Hardware.eng.srt
69.2 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate.eng.srt
67.8 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/A Practical Oblivious Map Data Structure with Secure Deletion and History Independence.eng.srt
67.6 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Computer Security and Privacy for Refugees in the United States.eng.srt
66.5 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Double-efficient zkSNARKs Without Trusted Setup.eng.srt
66.0 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Protecting the Stack with Metadata Policies and Tagged Hardware.eng.srt
65.9 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/SoK - Research Perspectives and Challenges for Bitcoin and Cryptocurrencies.eng.srt
65.8 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/IEEE S&P 2019 - TC Business Meeting.eng.srt
65.6 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/EnclaveDB - A Secure Database using SGX.eng.srt
65.4 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/The Cards Aren't Alright - Detecting Counterfeit Gift Cards Using Encoding Jitter.eng.srt
65.4 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Hackers vs. Testers - A Comparison of Software Vulnerability Discovery Processes.eng.srt
64.4 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Verifiable ASICs.eng.srt
64.3 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Data-Oriented Programming - On the Expressiveness of Non-Control Data Attacks.eng.srt
64.2 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/TriggerScope - Towards Detecting Logic Bombs in Android Applications.eng.srt
64.1 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/The Cracked Cookie Jar - HTTP Cookie Hijacking and the Exposure of Private Information.eng.srt
64.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SSP 2020 Opening Remarks.eng.text
64.1 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Riposte - An Anonymous Messaging System Handling Millions of Users.eng.srt
63.9 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Ad Injection at Scale - Assessing Deceptive Advertisement Modifications.eng.srt
63.4 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/LAVA - Large-scale Automated Vulnerability Addition.eng.srt
63.1 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Missing the Point(er) - On the Effectiveness of Code Pointer Integrity.eng.srt
62.9 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Another Flip in the Wall of Rowhammer Defenses.eng.srt
62.2 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels.eng.srt
61.6 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Enumerating Active IPv6 Hosts for Large-scale Security Scans via DNSSEC-signed Reverse Zones.eng.srt
61.5 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/When Your Fitness Tracker Betrays You - Quantifying the Predictability.eng.srt
61.5 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Towards Security and Privacy for Multi User Augmented Reality.eng.srt
61.1 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Scalable Bias-Resistant Distributed Randomness.eng.srt
60.6 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Keeping Authorities - Honest or Bust - with Decentralized Witness Cosigning.eng.srt
60.4 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Blue Note - How Intentional Acoustic Interference Damages Availablity and Integrity -.eng.srt
60.4 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/A Lustrum of Malware Network Communication - Evolution and Insights.eng.srt
60.3 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/SoK - Cryptographically Protected Database Search.eng.srt
59.7 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Geppetto - Versatile Verifiable Computation.eng.srt
58.9 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/IKP - Turning a PKI Around with Decentralized Automated Incentives.eng.srt
58.8 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/PIR with Compressed Queries and Amortized Query Processing.eng.srt
58.8 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Bulletproofs - Short Proofs for Confidential Transactions and More.eng.srt
58.7 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/HVLearn - Automated Black-box Analysis of Hostname Verification in SSL TLS Implementations.eng.srt
58.7 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Virtual Proofs of Reality and their Physical Implementation.eng.srt
58.6 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Is Interaction Necessary for Distributed Private Learning.eng.srt
58.5 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/A Formal Treatment of Accountable Proxying over TLS.eng.srt
58.5 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Catena - Efficient Non-equivocation via Bitcoin.eng.srt
58.3 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Norax - Enabling Execute-Only Memory for COTS Binaries on AArch64.eng.srt
58.2 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Tracking Ransomware End-to-end.eng.srt
57.8 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Helping Johnny to Analyze Malware - A Usability-Optimized Decompiler and Malware Analysis User Study.eng.srt
57.7 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Hardening Java's Access Control by Abolishing Implicit Privilege Elevation.eng.srt
57.5 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Beauty and the Beast - Diverting modern web browsers to build unique browser fingerprints.eng.srt
57.4 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Spotless Sandboxes - Evading Malware Analysis Systems using Wear-and-Tear Artifacts.eng.srt
57.3 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Backward-bounded DSE - Targeting Infeasibility Questions on Obfuscated Codes.eng.srt
57.1 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Securing Augmented Reality Output.eng.srt
56.9 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/How Secure and Quick is QUIC Provable Security and Performance Analyses.eng.srt
56.8 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Enabling Autonomous IoT Device Pairing using Different Sensor Types.eng.srt
56.7 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/From Trash to Treasure - Timing-Sensitive Garbage Collection.eng.srt
56.6 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/xJsnark - A Framework for Efficient Verifiable Computation.eng.srt
56.5 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Pyramid - Enhancing Selectivity in Big Data Protection with Count Featurization.eng.srt
56.4 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/A Messy State of the Union - Taming the Composite State Machines of TLS.eng.srt
56.3 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Hawk - The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts.eng.srt
55.8 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Learning from Mutants - Using Code Mutation to Learn and Monitor Invariants of a CPS.eng.srt
55.8 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Security Analysis of Emerging Smart Home Applications.eng.srt
55.4 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Leakage-Abuse Attacks on Order-Revealing Encryption.eng.srt
55.4 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Synthesizing Plausible Privacy-Preserving Location Traces.eng.srt
55.3 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/How They Did It - An Analysis of Emission Defeat Devices in Modern Automobiles.eng.srt
55.0 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Tracking Certificate Misissuance in the Wild.eng.srt
55.0 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/vRAM - Faster Verifiable RAM With Program-Independent Preprocessing.eng.srt
54.9 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/The Miner's Dilemma.eng.srt
54.7 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/SoK - Everyone Hates Robocalls - A Survey of Techniques against Telephone Spam.eng.srt
54.6 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/GenoGuard - Protecting Genomic Data against Brute-Force Attacks.eng.srt
54.0 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Program-Adaptive Mutational Fuzzing.eng.srt
54.0 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/VC3 - Trustworthy Data Analytics in the Cloud Using SGX.eng.srt
53.9 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Understanding Linux Malware.eng.srt
53.8 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/CaSE - Cache-Assisted Secure Execution on ARM Processors.eng.srt
53.8 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Algorithmic Transparency via Quantitative Input Influence.eng.srt
53.8 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Grand Pwning Unit - Accelerating Microarchitectural Attacks with the GPU.eng.srt
53.7 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/SymCerts - Practical Symbolic Execution For Exposing Noncompliance in X.509 Certificate Validation.eng.srt
53.6 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Back in Black - Towards Formal, Black Box Analysis of Sanitizers and Filters.eng.srt
53.5 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Counterfeit Object-oriented Programming.eng.srt
53.5 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Privacy and Access Control for Outsourced Personal Records.eng.srt
53.5 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Hijacking Bitcoin - Routing Attacks on Cryptocurrencies.eng.srt
53.3 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/SmarPer - Context-Aware and Automatic Runtime-Permissions for Mobile Devices.eng.srt
53.3 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Opening Remarks of the 39th IEEE Symposium on Security & Privacy.eng.srt
53.1 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Privacy Risks with Facebook's PII-based Targeting.eng.srt
53.0 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Membership inference attacks from first principles.eng.srt
53.0 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Last-Level Cache Side-Channel Attacks are Practical.eng.srt
52.8 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Protecting Bare-metal Embedded Systems with Privilege Overlays.eng.srt
52.8 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Distance-Bounding Protocols - Verification without Time and Location.eng.srt
52.7 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Comparing the Usability of Cryptographic APIs.eng.srt
52.7 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/SoK - Exploiting Network Printers.eng.srt
52.6 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/SoK - Keylogging Side Channels.eng.srt
52.5 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Forward Secure Asynchronous Messaging from Puncturable Encryption.eng.srt
52.4 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Shreds - Fine-grained Execution Units with Private Memory.eng.srt
52.4 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Following Devil's Footprints - Cross-Platform Analysis of Potentially Harmful Libraries.eng.srt
52.2 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/pASSWORD tYPOS and How to Correct Them Securely.eng.srt
52.1 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/The Rise of the Citizen Developer - Assessing the Security Impact of Online App Generators.eng.srt
51.8 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/You Get Where You're Looking For - The Impact Of Information Sources On Code Security.eng.srt
51.8 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Cross-Architecture Bug Search in Binary Executables.eng.srt
51.6 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage.eng.srt
51.6 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/NEZHA - Efficient Domain-independent Differential Testing.eng.srt
51.6 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/A Framework for Universally Composable Diffie-Hellman Key Exchange.eng.srt
51.5 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Speechless - Analyzing the Threat to Speech Privacy from Smartphone Motion Sensors.eng.srt
51.4 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Finding and Preventing Bugs in JavaScript Bindings.eng.srt
51.3 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/On Enforcing the Digital Immunity of a Large Humanitarian Organization.eng.srt
51.3 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/ADSNARK - Nearly Practical and Privacy-Preserving Proofs on Authenticated Data.eng.srt
51.1 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Micro-Policies - Formally Verified, Tag-Based Security Monitors.eng.srt
51.1 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/On the Economics of Offline Password Cracking.eng.srt
50.9 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Prepose - Privacy, Security, and Reliability for Gesture-Based Programming.eng.srt
50.9 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/FP-Stalker - Tracking Browser Fingerprint Evolutions - Antoine Vastel.eng.srt
50.8 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud.eng.srt
50.8 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping.eng.srt
50.6 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/IoT Goes Nuclear - Creating a Zigbee Chain Reaction.eng.srt
50.5 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/One TPM to Bind Them All - Fixing TPM2.0 for Provably Secure Anonymous Attestation.eng.srt
50.5 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Security Foundations for Application-Based Covert Communication Channels.eng.srt
50.4 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Optimized Honest-Majority MPC for Malicious Adversaries - Breaking 1 Billion-Gate Second Barrier.eng.srt
50.3 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/S$A - A Shared Cache Attack That Works across Cores and Defies VM Sandboxing.eng.srt
50.2 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Return to the Zombie Gadgets - Undermining Destructive Code Reads via Code-Inference Attacks.eng.srt
50.2 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/A Tale of Two Studies - The Best and Worst of YubiKey Usability.eng.srt
50.1 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Manipulating Machine Learning - Poisoning Attacks & Countermeasures.eng.srt
50.1 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Oblix - An Efficient Oblivious Search Index.eng.srt
49.9 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/MitM Attack by Name Collision - Cause Analysis and Vulnerability Assessment in the New gTLD Era.eng.srt
49.8 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Identifying Personal DNA Methylation Profiles by Genotype Inference.eng.srt
49.7 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/vSQL - Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases.eng.srt
49.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Birds of a Feather A Hardware & Security Panel (Deprecated).eng.srt
49.3 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Distillation as a Defense to Adversarial Perturbations against Deep Neural Networks.eng.srt
49.2 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Evaluating Physical-Layer BLE Location Tracking Attacks on Mobile Devices.eng.srt
49.2 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Implementing Conjunction Obfuscation under Entropic Ring LWE.eng.srt
48.8 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Invisible Finger Practical Electromagnetic Interference Attack on Touchscreen Electronic Devices.eng.srt
48.7 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Malicious-Client Security in Blind Seer - A Scalable Private DBMS.eng.srt
48.6 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/HDFI - Hardware-Assisted Data-Flow Isolation.eng.srt
48.6 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Users Really Do Plug in USB Drives They Find.eng.srt
48.5 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Bitcoin over Tor isn't a Good Idea.eng.srt
48.3 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/XHOUND - Quantifying the Fingerprintability of Browser Extensions.eng.srt
48.1 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Mobile Application Web API Reconnaissance.eng.srt
48.1 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/What the App is That Deception and Countermeasures in the Android User Interface.eng.srt
47.9 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Post-Quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors Problem.eng.srt
47.9 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/HardLog Practical Tamper-Proof System Auditing Using a Novel Audit Device.eng.srt
47.4 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/FuturesMEX - Secure, Distributed Futures Market Exchange.eng.srt
47.1 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/A Machine Learning Approach to Prevent Malicious Calls Over Telephony Networks.eng.srt
47.0 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Stack Overflow Considered Harmful - The Impact of Copy&Paste on Android Application Security.eng.srt
47.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Birds of a Feather Sharing Cybersecurity Research Artifacts To Accelerate Progress.eng.srt
46.9 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Domain-Z - 28 Registrations Later.eng.srt
46.9 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Sonar - Detecting SS7 Redirection Attacks With Audio-Based Distance Bounding.eng.srt
46.9 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Obstacles to the Adoption of Secure Communication Tools.eng.srt
46.7 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Temporal Lensing and Its Application in Pulsing Denial-of-Service Attacks.eng.srt
46.7 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/SoK - Plug & Pray - Today - Understanding USB Insecurity in Versions 1 through C.eng.srt
46.3 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/CirC Compiler infrastructure for proof systems, software verification, and more.eng.srt
46.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Birds of a Feather A Hardware & Security Panel (Deprecated).eng.txt
46.2 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/CoSMeDis - A Distributed Social Media Platform with Formally Verified Confidentiality Guarantees.eng.srt
46.2 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/VUDDY - A Scalable Approach for Vulnerable Code Clone Discovery.eng.srt
46.2 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/ObliVM - A Programming Framework for Secure Computation.eng.srt
46.0 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Cinderella - Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with.eng.srt
46.0 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Spectre Attacks Exploiting Speculative Execution.eng.srt
45.9 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Side-Channel Attacks on Shared Search Indexes.eng.srt
45.9 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Key Confirmation in Key Exchange - A Formal Treatment and Implications for TLS 1.3.eng.srt
45.9 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Every Second Counts - Quantifying the Negative Externalities of Cybercrime via Typosquatting.eng.srt
45.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Birds of a Feather A Hardware & Security Panel (Deprecated).eng.lrc
45.8 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Measuring and Mitigating the Risk of IP Reuse on Public Clouds.eng.srt
45.8 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Asleep at the Keyboard Assessing the Security of GitHub Copilot's Code Contributions.eng.srt
45.8 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/SecureML - A System for Scalable Privacy-Preserving Machine Learning.eng.srt
45.8 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Stealing Hyperparameters in Machine Learning.eng.srt
45.7 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/TASHAROK-Using Mechanism Design for Enhancing Security Resource Allocation in Interdependent Systems.eng.srt
45.7 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/CRLite - A Scalable System for Pushing All TLS Revocations to All Browsers.eng.srt
45.6 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/SoK - (State of) The Art of War - Offensive Techniques in Binary Analysis.eng.srt
45.6 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Augur - Internet-Wide Detection of Connectivity Disruptions.eng.srt
45.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Birds of a Feather A Hardware & Security Panel (Deprecated).eng.vtt
45.5 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Effective Real-Time Android Application Auditing.eng.srt
45.5 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Anonymity Trilemma - Strong Anonymity, Low Bandwidth Overhead, Low Latency - Choose Two.eng.srt
45.4 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Study and Mitigation of Origin Stripping Vulnerabilities in Hybrid-postMessage Enabled Mobile Apps.eng.srt
45.1 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Domains Do Change Their Spots Quantifying Potential Abuse of Residual Trust.eng.srt
45.0 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Automated Attack Synthesis by Extracting Finite State Machines from Protocol Specification Documents.eng.srt
44.8 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/New Primitives for Actively-Secure MPC over Rings with Applications to Private Machine Learning.eng.srt
44.7 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/SoK Social Cybersecurity.eng.srt
44.6 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/PhotoProof - Cryptographic Image Authentication for Any Set of Permissible Transformations.eng.srt
44.5 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/SoK - Towards Grounding Censorship Circumvention in Empiricism.eng.srt
44.5 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Cache Storage Channels - Alias-Driven Attacks and Verified Countermeasures.eng.srt
44.5 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/T-Fuzz Fuzzing by Program Transformation - Hui P.eng.srt
44.5 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Automated Analysis and Verification of TLS 1.3 - 0-RTT, Resumption and Delayed Authentication.eng.srt
44.5 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/SwarmFlawFinder Discovering and Exploiting Logic Flaws of Swarm Algorithms.eng.srt
44.4 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Fidelius Protecting User Secrets from Compromised Browsers.eng.srt
44.4 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/A Generic Approach to Automatic Deobfuscation of Executable Code.eng.srt
44.3 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Full speed Fuzzing Reducing Fuzzing Overhead through Coverage-guided Tracing.eng.srt
44.1 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/SpecHammer Combining Spectre and Rowhammer for New Speculative Attacks.eng.srt
44.0 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Using Hardware Features for Increased Debugging Transparency.eng.srt
43.9 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Wobfuscator Obfuscating JavaScript Malware via Opportunistic Translation to WebAssembly.eng.srt
43.8 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Counter-RAPTOR - Safeguarding Tor Against Active Routing Attacks.eng.srt
43.8 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Mitigating Information Leakage Vulnerabilities with Type-based Data Isolation.eng.srt
43.7 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Your Exploit is Mine - Automatic Shellcode Transplant for Remote Exploits.eng.srt
43.6 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/EyeTell - Video-Assisted Touchscreen Keystroke Inference from Eye Movements.eng.srt
43.4 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/SurroundWeb - Mitigating Privacy Concerns in a 3D Web Browser.eng.srt
43.4 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Privacy-from-Birth Protecting Sensed Data from Malicious Sensors with VERSA.eng.srt
43.4 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Phishing in Organizations Findings from a Large-Scale and Long-Term Study.eng.srt
43.4 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Multiple Handshakes Security of TLS 1.3 Candidates.eng.srt
43.3 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/An Experimental Security Analysis of an Industrial Robot Controller.eng.srt
43.1 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/To Catch a Ratter - Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild.eng.srt
43.0 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Bad Characters Imperceptible NLP Attacks.eng.srt
43.0 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Racing in Hyperspace - Closing Hyper Threading Side Channels on SGX.eng.srt
42.8 kB
IEEE Security & Privacy 2024/S&P 2024 hvc - Nicholas Ngai.eng.srt
42.8 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/High System-Code Security with Low Overhead.eng.srt
42.7 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Talos - Neutralizing Vulnerabilities with Security Workarounds for Rapid Response.eng.srt
42.7 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Impossibility of Precise and Sound Termination-Sensitive Security Enforcements.eng.srt
42.7 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/A Method for Verifying Privacy-Type Properties - The Unbounded Case.eng.srt
42.6 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Machine-Checked Proofs of Privacy for Electronic Voting Protocols.eng.srt
42.5 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Delay Wreaks Havoc on Your Smart Home Delay-based Automation Interference Attacks.eng.srt
42.5 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Membership Inference Attacks against Machine Learning Models.eng.srt
42.5 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Static Evaluation of Noninterference using Approximate Model Counting.eng.srt
42.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Birds of a Feather Sharing Cybersecurity Research Artifacts To Accelerate Progress.eng.vtt
42.3 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Reconstructing Training Data with Informed Adversaries.eng.srt
42.2 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Investigating Influencer VPN Ads on YouTube.eng.srt
42.1 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Readactor - Practical Code Randomization Resilient to Memory Disclosure.eng.srt
42.0 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/SysPal System-guided Pattern Locks for Android.eng.srt
41.9 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/TaoStore - Overcoming Asynchronicity in Oblivious Data Storage.eng.srt
41.8 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/FPGA-Based Remote Power Side-Channel Attacks.eng.srt
41.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Birds of a Feather A Hardware & Security Panel (Deprecated).eng.tsv
41.6 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/They're not that hard to mitigate -What Cryptographic Library Developers Think About Timing Attacks.eng.srt
41.5 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/True2F Backdoor resistant authentication tokens Emma Dauterman.eng.srt
41.5 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/PhishFarm A Scalable Framework for Measuring the Effectivness of Evasion Techniques Against.eng.srt
41.4 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/DEEPSEC - Deciding Equivalence Properties in Security Protocols - Theory and Practice.eng.srt
41.3 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Surveylance - Automatically Detecting Online Survey Scams.eng.srt
41.3 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/The Attack of the Clones - A Study of the Impact of Shared Code on Vulnerability Patching.eng.srt
41.2 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/De-Identification's Impact on Minority Representation and Privacy Preservation in the US Census.eng.srt
40.9 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Scraping Sticky Leftovers App User Information Left on Servers After Account Deletion.eng.srt
40.9 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/mmSpy Spying Phone Calls using mmWave Radars.eng.srt
40.8 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Controlled-Channel Attacks - Deterministic Side Channels for Untrusted Operating Systems.eng.srt
40.7 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Leave Me Alone - App-Level Protection against Runtime Information Gathering on Android.eng.srt
40.7 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/How Does Usable Security Not End Up in Software Products Results From a Qualitative Interview Study.eng.srt
40.6 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Verifying and Synthesizing Constant-Resource Implementations with Types.eng.srt
40.6 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Inferring User Routes and Locations using Zero-Permission Mobile Sensors.eng.srt
40.5 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Practical Asynchronous Distributed Key Generation.eng.srt
40.5 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Peekaboo A Hub-Based Approach to Enable Transparency in Data Processing within Smart Homes.eng.srt
40.5 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Should I Worry A Cross Cultural Examination of Account Security Incident Response.eng.srt
40.4 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Vetting SSL Usage in Applications with SSLINT.eng.srt
40.2 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Protecting Private Keys against Memory Disclosure Attacks Using Hardware Transactional Memory.eng.srt
40.1 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Understanding and Monitoring Embedded Web Scripts.eng.srt
40.1 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Cats vs. Spectre An Axiomatic Approach to Modeling Speculative Execution Attacks.eng.srt
39.8 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/DeepSteal Advanced Model Extractions Leveraging Efficient Weight Stealing in Memories.eng.srt
39.7 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Finding and Exploiting CPU Features using MSR Templating.eng.srt
39.6 kB
IEEE Security & Privacy 2024/2024 567 More is Merrier Relax the Non Collusion Assumption in Multi Server PIR - esnierde.eng.srt
39.6 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/How Not to Protect Your IP - An Industry-Wide Break of IEEE 1735 Implementations.eng.srt
39.5 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Spiral Fast, High-Rate Single-Server PIR via FHE Composition.eng.srt
39.5 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Private Nearest Neighbor Search with Sublinear Communication and Malicious Security.eng.srt
39.5 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Using Throughput-Centric Byzantine Broadcast to Tolerate Malicious Majority in Blockchains.eng.srt
39.5 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Examining Zero-Shot Vulnerability Repair with Large Language Models.eng.srt
39.5 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/The Experts' Insights on the Peer Review Process of Evaluating Security Papers.eng.srt
39.4 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/ZeeStar Private Smart Contracts by Homomorphic Encryption and Zero-knowledge Proofs.eng.srt
39.2 kB
IEEE Security & Privacy 2024/2024 124 LOKI Large scale Data Reconstruction Attack against Federated Learning through Model Manipu.eng.srt
39.2 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Towards Making Systems Forget with Machine Unlearning.eng.srt
39.1 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP.eng.srt
39.1 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/TROLLMAGNIFIER Detecting State-Sponsored Troll Accounts on Reddit.eng.srt
39.1 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/WtaGraph Web Tracking and Advertising Detection using Graph Neural Networks.eng.srt
39.0 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Dominance as a New Trusted Computing Primitive for the IoT.eng.srt
39.0 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/MatRiCT More Efficient Post-Quantum Private Blockchain Payments.eng.srt
39.0 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/BEACON - Directed Grey-Box Fuzzing with Provable Path Pruning.eng.srt
38.9 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Compiler-assisted Code Randomization.eng.srt
38.9 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Iodine Fast Dynamic Tain't Tracking Using Rollback free Optimistic Hybrid Analysis.eng.srt
38.7 kB
IEEE Security & Privacy 2024/don't Eject the Impostor - Fast Three Party Computation With a Known Cheater - Andreas Brüggeman.eng.srt
38.6 kB
IEEE Security & Privacy 2024/gpuzip 20 - yingchen wang.eng.srt
38.6 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Sphinx Enabling Privacy-Preserving Online Learning over the Cloud.eng.srt
38.5 kB
IEEE Security & Privacy 2024/ItsSimplexIEEESP 20min - Andrew Cullen.eng.srt
38.5 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Waldo A Private Time-Series Database from Function Secret-Sharing.eng.eng.srt
38.5 kB
IEEE Security & Privacy 2024/43 P4Control Line Rate Cross Host Attack Prevention via In Network Information Flow Control Enabled.eng.srt
38.4 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Back to the Drawing Board A Critical Evaluation of Poisoning Attacks on Federated Learning.eng.srt
38.4 kB
IEEE Security & Privacy 2024/MAWSEO Adversarial Wiki Search Poisoning for Illicit Online Promotion - Zilong Lin.eng.srt
38.3 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Anti-Tamper Radio System-Level Tamper Detection for Computing Systems.eng.srt
38.3 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/IVD - Automatic Learning and Enforcement of Authorization Rules in Online Social Networks.eng.srt
38.2 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/RIDL Rogue In-Flight Data Load.eng.srt
38.2 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/TinyGarble - Highly Compressed and Scalable Sequential Garbled Circuits.eng.srt
38.1 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Postcards from the Post HTTP World Amplification of HTTPS Vulnerabilities in the Web Ecosystem.eng.srt
38.0 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/SAILFISH Vetting Smart Contract State-Inconsistency Bugs in Seconds.eng.srt
38.0 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/IRShield A Countermeasure Against Adversarial Physical-Layer Wireless Sensing.eng.srt
38.0 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Multi-touch Authentication Using Hand Geometry and Behavioral Information.eng.srt
37.9 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/vSGX Virtualizing SGX Enclaves on AMD SEV.eng.srt
37.9 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Proof Of Stake Sidechains.eng.srt
37.9 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Angora - Efficient Fuzzing by Principled Search.eng.srt
37.9 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Formally Verified Cryptographic Web Applications in WebAssembly.eng.srt
37.8 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/BadEncoder Backdoor Attacks to Pre-trained Encoders in Self-Supervised Learning.eng.srt
37.8 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/SoK An Overview of FHE Compilers and Tools.eng.srt
37.7 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Blacksmith Compromising Target Row Refresh by Rowhammering in the Frequency Domain.eng.srt
37.7 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Transcending TRANSCEND Revisiting Malware Classification in the Presence of Concept Drift.eng.srt
37.6 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/PCR-Auth Solving Authentication Puzzle Challenges with Encoded Palm Contact Responses.eng.srt
37.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Birds of a Feather Sharing Cybersecurity Research Artifacts To Accelerate Progress.eng.txt
37.4 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Desperate Times Call for Desperate Measures - User Concerns with Mobile Loan Apps in Kenya.eng.srt
37.4 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Heapster Analyzing the Security of Dynamic Allocators for Monolithic Firmware Images.eng.srt
37.4 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Noise A Library of Verified High-Performance Secure Channel Protocol Implementations.eng.srt
37.3 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/XCLAIM Trustless Interoperable Cryptocurrency Backed Assets.eng.srt
37.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Birds of a Feather Sharing Cybersecurity Research Artifacts To Accelerate Progress.eng.lrc
37.2 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/SYMBEXCEL Automated Analysis and Understanding of Malicious Excel 4.0 Macros.eng.srt
37.2 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Sabre Sender-Anonymous Messaging with Fast Audits.eng.srt
37.2 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Caelus - Verifying the Consistency of Cloud Services with Battery-Powered Devices.eng.srt
37.1 kB
IEEE Security & Privacy 2024/Automated Synthesis of Effect Graph Policies for Microservice Aware Stateful System Call Special.eng.srt
37.1 kB
IEEE Security & Privacy 2024/Tabbed Out Subverting the Android Custom Tab Security Model - Philipp Beer.eng.srt
37.1 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Does Certificate Transparency Break the Web Measuring Adoption and Error Rate.eng.srt
36.9 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/FuzzUSB Hybrid Stateful Fuzzing of USB Gadget Stacks.eng.srt
36.9 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Investigating the Use of Email Encryption for an Entire University.eng.srt
36.8 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Secure Track Verification.eng.srt
36.8 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Downgrade Resilience in Key-Exchange Protocols.eng.srt
36.8 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Hark A Deep Learning System for Navigating Privacy Feedback at Scale.eng.srt
36.7 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/If HTTPS Were Secure I wouldn't Need 2FA End User and Administrator Mental Models of HTTPS.eng.srt
36.5 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Adversarial Prefetch New Cross-Core Cache Side Channel Attacks.eng.srt
36.3 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/ELSA Secure Aggregation for Federated Learning with Malicious Actors.eng.srt
36.3 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/RAB Provable Robustness Against Backdoor Attacks.eng.srt
36.2 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/I Think They're Trying to Tell Me Something - Advice Sources and Selection for Digital Security.eng.srt
36.2 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/A Tough call - Mitigating Advanced Code-Reuse Attacks At The Binary Level.eng.srt
36.1 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Hard Drive of Hearing Disks that Eavesdrop with a Synthesized Microphone.eng.srt
36.1 kB
IEEE Security & Privacy 2024/Pryde - A Modular Generalizable Workflow for Uncovering Evasion Attacks Against Stateful Firewall.eng.srt
36.0 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Secure Device Bootstrapping without Secrets Resistant to Signal Manipulation Attacks.eng.srt
36.0 kB
IEEE Security & Privacy 2024/Nebula A Privacy First Platform for Data Backhaul - Jean Luc Watson.eng.srt
36.0 kB
IEEE Security & Privacy 2024/Pandora - Principled Symbolic Validation of Intel SGX Enclave Runtimes - Jo Van Bulck.eng.srt
36.0 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Learning to Reconstruct Statistical Learning Theory and Encrypted Database Attacks.eng.txt
36.0 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/PGPATCH Policy-Guided Logic Bug Patching for Robotic Vehicles.eng.srt
36.0 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/SoK Shining Light on Shadow Stacks.eng.srt
35.9 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Kiss from a Rogue Evaluating Detectability of Pay-at-the-Pump Card Skimmers.eng.srt
35.9 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Cloak of Visibility - Detecting When Machines Browse a Different Web.eng.srt
35.9 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/SoK General Purpose Frameworks for Secure Multi-Party Computation.eng.srt
35.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Birds of a Feather A Hardware & Security Panel (Deprecated).eng.text
35.8 kB
IEEE Security & Privacy 2024/LowerBoundsRDP - Tim Kutta.eng.srt
35.7 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/IRQDebloat Reducing Driver Attack Surface in Embedded Devices.eng.srt
35.7 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/SoK Hate, Harassment, and the Changing Landscape of Online Abuse.eng.srt
35.7 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/How Well Do My Results Generalize Comparing Security and Privacy Survey Results from.eng.srt
35.6 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/PERUN Virtual Payment Hubs over Cryptographic Currencies.eng.srt
35.6 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Teaching and Learning Cybersecurity and AI Ethics in High School.eng.srt
35.6 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/SecFloat Accurate Floating-Point meets Secure 2-Party Computation.eng.srt
35.5 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Staying Secure and Unprepared - Understanding and Mitigating the Security Risks of Apple ZeroConf.eng.srt
35.5 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/The State of the SameSite Studying the Usage, Effectiveness, and Adequacy of SameSite Cookies.eng.srt
35.5 kB
IEEE Security & Privacy 2024/Asterisk Super fast MPC with a Friend - Protik Paul.eng.srt
35.4 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Simple High-Level Code for Cryptographic Arithmetic - With Proofs, Without Compromises.eng.srt
35.4 kB
IEEE Security & Privacy 2024/attackinng byzantine robustness in high dimensions - kolluri aashish.eng.srt
35.4 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Learning to Reconstruct Statistical Learning Theory and Encrypted Database Attacks.eng.lrc
35.4 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Self-Encrypting Deception Weaknesses in the Encryption of Solid State Drives.eng.srt
35.3 kB
IEEE Security & Privacy 2024/Group Oblivious Message Retrieval - Thomas.eng.srt
35.2 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Automatic Inference of Search Patterns for Tain't-Style Vulnerabilities.eng.srt
35.2 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/PICCOLO Exposing Complex Backdoors in NLP Transformer Models.eng.srt
35.2 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/SoK Unifying and Applying At-Risk User Research.eng.srt
35.2 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Locally Differentially Private Frequent Itemset Mining.eng.srt
35.2 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/SoK - Secure Messaging.eng.srt
35.1 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Attack Directories, Not Caches Side Channel Attacks in a Non Inclusive World.eng.srt
35.1 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/A Decentralized and Encrypted National Gun Registry.eng.srt
35.1 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols.eng.srt
35.1 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/RT-TEE Real-time System Availability for Cyber-physical Systems using ARM TrustZone.eng.srt
35.1 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Publicly Accountable Robust Multi-Party Computation.eng.srt
35.1 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Reasoning Analytically About Password Cracking Software Alex Liu.eng.srt
34.9 kB
IEEE Security & Privacy 2024/sp24 long recording - Jannis Rautenstrauch.eng.srt
34.9 kB
IEEE Security & Privacy 2024/2024 151 Shedding Light on CVSS Scoring Inconsistencies - A User Centric Study on Evaluating Widespre.eng.srt
34.9 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Threshold BBS Signatures for Distributed Anonymous Credential Issuance.eng.srt
34.9 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/WaVe A Verifiably Secure WebAssembly Sandboxing Runtime.eng.srt
34.8 kB
IEEE Security & Privacy 2024/An Analysis of Recent Advances in Deepfake Image Detection in an Evolving Threat Landscape - sif.eng.srt
34.8 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Adversarial Examples - for Proof-of-Learning.eng.srt
34.8 kB
IEEE Security & Privacy 2024/Scalable Verification of Zero Knowledge Protocols - MIGUEL ISABEL MÁRQUEZ.eng.srt
34.7 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Neural Cleanse Identifying and Mitigating Backdoor Attacks in Neural Networks.eng.srt
34.7 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/No Pardon for the Interruption - New Inference Attacks on Android Through Interrupt Timing Analysis.eng.srt
34.7 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Synesthesia Detecting Screen Content via Remote Acoustic Side Channels.eng.srt
34.7 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/EmPoWeb Empowering Web Applications with Browser Extensions.eng.srt
34.6 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/RoFL Robustness of Secure Federated Learning.eng.srt
34.6 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/How to Attack and Generate Honeywords.eng.srt
34.6 kB
IEEE Security & Privacy 2024/The Great Request Robbery Soheil Khodayari - Soheil Khodayari.eng.srt
34.6 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Cracking-Resistant Password Vaults Using Natural Language Encoders.eng.srt
34.6 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/A Formal Security Analysis of the W3C Web Payment APIs Attacks and Verification.eng.srt
34.5 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/LBM A Security Framework for Peripherals within the Linux Kernel.eng.srt
34.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Birds of a Feather A Hardware & Security Panel (Updated).eng.srt
34.5 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/ShadeWatcher Recommendation-guided Cyber Threat Analysis using System Audit Records.eng.srt
34.5 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Vulnerability Discovery for All Experiences of Marginalization in Vulnerability Discovery.eng.srt
34.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Birds of a Feather Sharing Cybersecurity Research Artifacts To Accelerate Progress.eng.tsv
34.3 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Theory and Practice of Finding Eviction Sets.eng.srt
34.3 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Security and Privacy Challenges, Advice, and Opportunities at Cybercafes in Kenya.eng.srt
34.3 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Copy, Right A Testing Framework for Copyright Protection of Deep Learning Models.eng.srt
34.2 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/High-Speed Inter-domain Fault Localization.eng.srt
34.2 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Space Odyssey An Experimental Software Security Analysis of Satellites.eng.srt
34.2 kB
IEEE Security & Privacy 2024/Cohere Managing Differential Privacy in Large Scale Systems - Nicolas Küchler.eng.srt
34.1 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Doing good by fighting fraud Ethical anti-fraud systems for mobile payments.eng.srt
34.1 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/PROTRR Principled yet Optimal In-DRAM Target Row Refresh.eng.srt
33.9 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Formal Model-Driven Discovery of Bluetooth Protocol Design Vulnerabilities.eng.srt
33.9 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Property Inference from Poisoning.eng.srt
33.9 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Locally Differentially Private Sparse Vector Aggregation.eng.srt
33.8 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/NEUZZ Efficient Fuzzing with Neural Program Smoothing.eng.srt
33.8 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Towards Practical Differentialy Private Convex Optimization.eng.srt
33.8 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/AI2 - Safety and Robustness Certification of Neural Networks.eng.srt
33.8 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Deployment of Source Address Validation by Network Operators A Randomized Control Trial.eng.srt
33.7 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Mind the Gap Studying the Insecurity of Provably Secure Embedded Trusted Execution Architectures.eng.srt
33.7 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/SNARKBlock Federated Anonymous Blocklisting from Hidden Common Input Aggregate Proofs.eng.srt
33.7 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Revisiting Square Root ORAM - Efficient Random Access in Multi-Party Computation.eng.srt
33.7 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Statistical Quantification of Differential Privacy A Local Approach.eng.srt
33.7 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Redactable Blockchain in the Permissionless Setting.eng.srt
33.6 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Spook.js Attacking Chrome Strict Site Isolation via Speculative Execution.eng.srt
33.6 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Diogenes Lightweight Scalable RSA Modulus Generation with a Dishonest Majority.eng.srt
33.5 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Universal Atomic Swaps Secure Exchange of Coins Across All Blockchains.eng.srt
33.5 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Graphics Peeping Unit Exploiting EM Side-Channel Information of GPUs to Eavesdrop on Your Neighbors.eng.srt
33.5 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Blue's Clues Practical Discovery of Non-Discoverable Bluetooth Devices.eng.srt
33.5 kB
IEEE Security & Privacy 2024/Pudding Private User Discovery in Anonymity Networks - Ceren Kocaogullar.eng.srt
33.4 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Bitcoin-Compatible Virtual Channels.eng.srt
33.3 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Spinning Language Models Risks of Propaganda-as-a-Service and Countermeasures.eng.srt
33.3 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Blue Is the New Black (Market) Privacy Leaks and Re-Victimization from Police-Auctioned Cellphones.eng.srt
33.2 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Towards Automated Safety Vetting of PLC Code in Real World Plants Mu Zhang.eng.srt
33.2 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Sending out an SMS - Characterizing the Security of the SMS Ecosystem with Public Gateways.eng.srt
33.2 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/SoK How Robust is Image Classification Deep Neural Network Watermarking.eng.srt
33.2 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/SoK Authentication in Augmented and Virtual Reality.eng.srt
33.2 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Differentially Private Model Publishing For Deep Learning.eng.srt
33.0 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Is Private Learning Possible with Instance Encoding.eng.srt
32.9 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Threshold ECDSA from ECDSA Assumptions The Multiparty Case.eng.srt
32.9 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/SoK Computer-Aided Cryptography.eng.srt
32.8 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Asm2Vec Boosting Static Representation Robustness for Binary Clone Search.eng.srt
32.8 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Ouroboros Crypsinous Privacy Preserving Proof of Stake.eng.srt
32.7 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/K-Scheduler Effective Seed Scheduling for Fuzzing with Graph Centrality Analysis.eng.srt
32.7 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Is Cryptographic Deniability Sufficient Non-Expert Perceptions of Deniability in Secure Messaging.eng.srt
32.7 kB
IEEE Security & Privacy 2024/MIMOCrypt - Jun Luo John.eng.srt
32.7 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Hide and Seek with Spectres Efficient discovery of speculative vulnerabilities with random testing.eng.srt
32.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Birds of a Feather A Hardware & Security Panel (Updated).eng.txt
32.6 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/HackEd A Pedagogical Analysis of Online Vulnerability Discovery Exercises.eng.srt
32.5 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Seeking Nonsense, Looking for Trouble - Efficient Promotional-Infection Detection through.eng.srt
32.4 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Adversarial Watermarking Transformer Towards Tracing Text Provenance with Data Hiding.eng.srt
32.4 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Trust, But Verify A Longitudinal Analysis Of Android OEM Compliance and Customization.eng.srt
32.4 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Under the Shadow of Sunshine - Understanding & Detecting Bulletproof Hosting.eng.srt
32.4 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/SoK A Critical Evaluation of Efficient Website Fingerprinting Defenses.eng.srt
32.4 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/CaSym Cache Aware Symbolic Execution for Side Channel Detection and Mitigation.eng.srt
32.3 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Exploit the Last Straw That Breaks Android Systems.eng.srt
32.3 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/SmartPulse Automated Checking of Temporal Properties in Smart Contracts.eng.srt
32.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Birds of a Feather A Hardware & Security Panel (Updated).eng.lrc
32.3 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Why Crypto-detectors Fail A Systematic Evaluation of Cryptographic Misuse Detection Techniques.eng.srt
32.3 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/ProVerif with Lemmas, Induction, Fast Subsumption, and Much More.eng.srt
32.2 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/STOCHFUZZ Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic.eng.srt
32.2 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/SensorID Sensor Calibration Fingerprinting for Smartphones.eng.srt
32.2 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/SoK Practical Foundations for Software Spectre Defenses.eng.srt
32.2 kB
IEEE Security & Privacy 2024/Serberus Protecting Cryptographic Code frrom Spectres at Compile Time - Nicholas Hunter Mosier.eng.srt
32.2 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/DeepCASE Semi-Supervised Contextual Analysis of Security Events.eng.srt
32.1 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Jigsaw Efficient and Scalable Path Constraints Fuzzing.eng.srt
32.1 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/HAMRAZ Resilient Partitioning and Replication.eng.srt
32.1 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Helen Maliciously Secure Coopetitive Learning for Linear Models.eng.srt
32.1 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Compact Certificates of Collective Knowledge.eng.srt
32.1 kB
IEEE Security & Privacy 2024/2024 471 Private Hierarchical Governance for Encrypted Messaging - Armin Namavari.eng.srt
32.1 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/COBRA Dynamic Proactive Secret Sharing for Confidential BFT Services.eng.srt
32.1 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Epochal Signatures for Deniable Group Chats.eng.srt
32.0 kB
IEEE Security & Privacy 2024/2024 606 BOLT Privacy Preserving, Accurate and Efficient Inference for Transformers - Qi Pang.eng.srt
32.0 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Four Attacks and a Proof for Telegram.eng.srt
32.0 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Exploiting Correcting Codes On the Effectiveness of ECC Memory Against Rowhammer Attacks.eng.srt
32.0 kB
IEEE Security & Privacy 2024/From Chatbots to Phishbots Phishing Scam Generation in Commercial Large Language Models - Sayak.eng.srt
32.0 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Silph A Framework for Scalable and Accurate Generation of Hybrid MPC Protocols.eng.srt
31.8 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/IronMask Versatile Verification of Masking Security.eng.srt
31.8 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/SoK Sanitizing for Security Dokyung Song.eng.srt
31.8 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/MEGA Malleable Encryption Goes Awry.eng.srt
31.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Birds of a Feather A Hardware & Security Panel (Updated).eng.vtt
31.8 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Characterizing Pixel Tracking through the Lens of Disposable Email Services.eng.srt
31.8 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/SPURT Scalable Distributed Randomness Beacon with Transparent Setup.eng.srt
31.7 kB
IEEE Security & Privacy 2024/Piano Extremely Simple Single Server PIR with Sublinear Server Computation - Mingxun Zhou.eng.srt
31.7 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Private Eye On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing.eng.srt
31.7 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/High-Assurance Cryptography in the Spectre Era.eng.srt
31.6 kB
IEEE Security & Privacy 2024/2024 11 NetShuffle Circumventing Censorship with Shuffle Proxies at the Edge - Patrick Kon.eng.srt
31.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/High Precision Open-World Website Fingerprinting.eng.txt
31.6 kB
IEEE Security & Privacy 2024/INVISILINE Invisible Plausibly Deniable Storage - Sandeep Kiran Pinjala.eng.srt
31.6 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Self-Supervised Euphemism Detection and Identification for Content Moderation.eng.srt
31.5 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Measuring and Analyzing Search Engine Poisoning of Linguistic Collisions.eng.srt
31.5 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Differentially Private Histograms in the Shuffle Model from Fake Users.eng.srt
31.5 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Shedding Light on Inconsistencies in Grid Cybersecurity Disconnects and Recommendations.eng.srt
31.5 kB
IEEE Security & Privacy 2024/Efficient and Generic Microarchitectural Hash Function Recovery - Lukas Gerlach.eng.srt
31.5 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Certified Robustness to Adversarial Examples with Differential Privacy.eng.srt
31.5 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Zero Knowledge for Everything and Everyone Fast ZK Processor with Cached ORAM for ANSI C Programs.eng.srt
31.3 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Augury Using Data Memory-Dependent Prefetchers to Leak Data at Rest.eng.srt
31.3 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Drones' Cryptanalysis - Detecting Privacy Invasion Attacks Conducted by Drone.eng.srt
31.2 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Bookworm Game Automatic Discovery of LTE Vulnerabilities Through Documentation Analysis.eng.srt
31.1 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/SoK History is a Vast Early Warning System Auditing the Provenance of System Intrusions.eng.srt
31.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/High Precision Open-World Website Fingerprinting.eng.lrc
31.1 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Short Text, Large Effect Measuring the Impact of User Reviews on Android App Security & Privacy.eng.srt
31.0 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Security of GPS INS based On-road Location Tracking Systems.eng.srt
30.9 kB
IEEE Security & Privacy 2024/Eureka Presentation - Yu Wei.eng.srt
30.9 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/SoK The Faults in our ASRs An Overview of Attacks against Automatic Speech Recognition and.eng.srt
30.9 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Model Orthogonalization Class Distance Hardening in Neural Networks for Better Security.eng.srt
30.9 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Practical EMV Relay Protection.eng.srt
30.8 kB
IEEE Security & Privacy 2024/2024 449 Undefined oriented Programming - Detecting and Chaining Prototype Pollution Gadgets in Node.eng.srt
30.8 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/CanDID Bootstrapping Decentralized Identity from Legacy Providers.eng.srt
30.8 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Skilled or Gullible Gender Stereotypes Related to Computer Security and Privacy.eng.srt
30.8 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/FLUTE Fast and Secure Lookup Table Evaluations.eng.srt
30.7 kB
IEEE Security & Privacy 2024/Everyone for Themselves - A Qualitative Study about Individual Security Setups of Open Source Sof.eng.srt
30.7 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Arbitrary Modulation of Electromagnetic Noise from Unprivileged Software Impacting Emission Security.eng.srt
30.7 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/The Code That Never Ran Modeling Attacks on Speculative Evaluation.eng.srt
30.7 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Certifiably Robust Object Detection against Patch Hiding Attacks via Patch-agnostic Masking.eng.srt
30.6 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Port Contention for Fun and Profit.eng.srt
30.6 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Breaking LTE on Layer Two.eng.srt
30.6 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Understanding the Security of ARM Debugging Features.eng.srt
30.6 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/SCAPHY Detecting Modern ICS Attacks by Correlating Behaviors in SCADA and PHYsical.eng.srt
30.6 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/OWL Compositional Verification of Security Protocols via an Information-Flow Type System.eng.srt
30.6 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/PCspooF Compromising the Safety of Time-Triggered Ethernet.eng.srt
30.5 kB
IEEE Security & Privacy 2024/2024 237 SoK Unintended Interactions among ML Defenses and Risks - Vasisht Duddu.eng.srt
30.5 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Systematic Analysis of Randomization-based Protected Cache Architectures.eng.srt
30.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Birds of a Feather Sharing Cybersecurity Research Artifacts To Accelerate Progress.eng.text
30.4 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer.eng.srt
30.4 kB
IEEE Security & Privacy 2024/Larger scale Nakamoto style Blockchains Don’t Necessarily Offer Better Security - Jannik Albrech.eng.srt
30.4 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/A Secret-Free Hypervisor Rethinking Isolation in the Age of Speculative Vulnerabilities.eng.srt
30.4 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Connection-Oriented DNS to Improve Privacy and Security.eng.srt
30.3 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Surakav Generating Realistic Traces for a Strong Website Fingerprinting Defense.eng.srt
30.3 kB
IEEE Security & Privacy 2024/Understanding the Privacy Practices of Political Campaigns A Perspective from the 2020 US Election.eng.srt
30.3 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/SoK Security Evaluation of Home Based IoT Deployment.eng.srt
30.2 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/LinkTeller Recovering Private Edges from Graph Neural Networks via Influence Analysis.eng.srt
30.2 kB
IEEE Security & Privacy 2024/Leaky Address Masking - Mathé Hertogh 1.eng.srt
30.2 kB
IEEE Security & Privacy 2024/2024 467 ARMOR A Formally Verified Implementation of X 509 Certificate Chain Validation - Joyanta De.eng.srt
30.2 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/One Key to Rule Them All Secure Group Pairing for Heterogeneous IoT Devices.eng.srt
30.2 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Not Yet Another Digital ID Privacy-preserving Humanitarian Aid Distribution.eng.srt
30.1 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Demystifying Hidden Privacy Settings in Mobile Apps.eng.srt
30.0 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Multi-Round Single-Server Secure Aggregation with Applications to Private Federated Learning.eng.srt
30.0 kB
IEEE Security & Privacy 2024/2024 18 A Practical Root Cause Analysis System with an Under Constrained State Mutation - 박영기.eng.srt
29.9 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Dedup Est Machina - Memory Deduplication as an Advanced Exploitation Vector.eng.srt
29.9 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Universal 3-Dimensional Perturbations for Black-Box Attacks on Video Recognition Systems.eng.srt
29.8 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Many-out-of-Many - Proofs and Applications to Anonymous Zether.eng.srt
29.8 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/SoK The Dual Nature of Technology in Sexual Assault.eng.srt
29.7 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/On the Feasibility of Rerouting-Based DDoS Defenses.eng.srt
29.7 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Electromagnetic Covert Channels Can Be Super Resilient.eng.srt
29.6 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security.eng.srt
29.6 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Using Selective Memoization to Defeat Regular Expression Denial of Service (ReDoS).eng.srt
29.6 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Lay Down the Common Metrics Evaluating Proof of Work Consensus Protocols' Security.eng.srt
29.6 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Security Analysis of the MLS Key Derivation.eng.srt
29.6 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Deep perceptual hashing algorithms with hidden dual purpose client-side scanning facial recognition.eng.srt
29.6 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/OmniLedger - A Secure, Scale-Out, Decentralized Ledger via Sharding.eng.txt
29.5 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/ProFuzzer On-the-fly Input Type Probing for Better Zero-day Vulnerability Discovery.eng.srt
29.5 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Practically-Exploitable Cryptographic Vulnerabilities in Matrix.eng.srt
29.5 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Lightweight Techniques for Private Heavy Hitters.eng.srt
29.5 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Hear No Evil, See Kenansville Efficient and Transferable Black-Box Attacks on Automatic.eng.srt
29.4 kB
IEEE Security & Privacy 2024/SP24 HD - Florian Hantke.eng.srt
29.4 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/PyFET Forensically Equivalent Transformation for Python Binary Decompilation.eng.srt
29.4 kB
IEEE Security & Privacy 2024/2024 76 Formal Dolev Yao Models Meet Cryptographic Protocol Fuzz Testing - Max Ammann.eng.srt
29.4 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/ARBITRAR - User-Guided API Misuse Detection.eng.srt
29.3 kB
IEEE Security & Privacy 2024/2024 05 22 02 41 48 H 264 - Rui Xi.eng.srt
29.3 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Touching the Untouchables Dynamic Security Analysis of the LTE Control Plane.eng.srt
29.3 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/TELEPATH A Minecraft-based Covert Communication System.eng.srt
29.3 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Model Stealing Attacks Against Inductive Graph Neural Networks.eng.srt
29.2 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Razzer Finding Kernel Race Bugs through Fuzzing.eng.srt
29.2 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Confident Monte Carlo Rigorous Analysis of Guessing Curves for Probabilistic Password Models.eng.srt
29.2 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/IEEE S&P 2019 - Opening Remarks - Program Chair.eng.srt
29.2 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Detecting Filter List Evasion With Event-Loop-Turn Granularity JavaScript Signatures.eng.srt
29.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Tale of Sea and Sky On the Security of Maritime VSAT Communications.eng.txt
29.1 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Typing High-Speed Cryptography against Spectre v1.eng.srt
29.1 kB
IEEE Security & Privacy 2024/2024 171 Private Analytics via Streaming, Sketching, and Silently Verifiable Proofs - Mayank Rathee.eng.srt
29.1 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Good Bot, Bad Bot Characterizing Automated Browsing Activity.eng.srt
29.1 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/OmniLedger - A Secure, Scale-Out, Decentralized Ledger via Sharding.eng.lrc
29.1 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Breaking Security-Critical Voice Authentication.eng.srt
29.0 kB
IEEE Security & Privacy 2024/SrcMarker Dual channel Source Code Watermarking via Scalable Code Transformations - 杨博睿.eng.srt
29.0 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/The Leaky Web Automated Discovery of Cross-Site Information Leaks in Browsers and the Web.eng.srt
29.0 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Resident Evil Understanding Residential IP Proxy as a Dark Service.eng.srt
29.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Birds of a Feather A Hardware & Security Panel (Updated).eng.tsv
29.0 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Exposed Infrastructures-Discovery, Attacks and Remediation of Insecure ICS Remote Management Devices.eng.srt
28.9 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/WeRLman To Tackle Whale (Transactions), Go Deep (RL).eng.srt
28.8 kB
IEEE Security & Privacy 2024/Janus Safe Biometric Deduplication for Humanitarian Aid Distribution - kasra EdalatNejad.eng.srt
28.8 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Repairing DoS Vulnerability of Real-World Regexes.eng.srt
28.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Tale of Sea and Sky On the Security of Maritime VSAT Communications.eng.lrc
28.7 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Comprehensive Privacy Analysis of Deep Learning.eng.srt
28.7 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Time-Print Authenticating USB Flash Drives with Novel Timing Fingerprints.eng.srt
28.7 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/OSPREY Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary.eng.srt
28.7 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/They Would do Better if They Worked Together The Case of Interaction Problems Between Password.eng.srt
28.7 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/LazyTAP On-Demand Data Minimization for Trigger-Action Applications.eng.srt
28.6 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Adaptive Risk-Limiting Comparison Audits.eng.srt
28.6 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Attacks on Wireless Coexistence.eng.srt
28.6 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/SMILE Secure Memory Introspection for Live Enclave.eng.srt
28.6 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Securing Multiparty Online Services Via Certification of Symbolic Transactions.eng.srt
28.5 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/SoK Quantifying Cyber Risk.eng.srt
28.5 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Analyzing Ground-Truth Data of Mobile Gambling Scam.eng.srt
28.5 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Security of Multi-Sensor Fusion based Perception in Autonomous Driving Under Physical-World Attacks.eng.srt
28.5 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Are We There Yet Timing and Floating-Point Attacks on Differential Privacy Systems.eng.srt
28.5 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/GREBE Unveiling Exploitation Potential for Linux Kernel Bugs.eng.srt
28.5 kB
IEEE Security & Privacy 2024/9 PrunePlumTree - Finding Eviction Sets at Scale - Tom Kissos.eng.srt
28.4 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/On the Security of Two-Round Multi-Signatures.eng.srt
28.4 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Leveraging Sandboxes for a Minimally Invasive Browser Fingerprinting Defense.eng.srt
28.4 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Learning to Reconstruct Statistical Learning Theory and Encrypted Database Attacks.eng.tsv
28.4 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/DVFS Frequently Leaks Secrets Hertzbleed Attacks Beyond SIKE, Cryptography, and CPU-Only Data.eng.srt
28.3 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/IPvSeeYou Exploiting Leaked Identifiers in IPv6 for Street-Level Geolocation.eng.srt
28.3 kB
IEEE Security & Privacy 2024/Architectural Mimicry - Innovative Instructions to Efficiently Address Control Flow Leakage in Dat.eng.srt
28.3 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/A Secure and Formally Verified Linux KVM Hypervisor.eng.srt
28.3 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Collaborative Ad Transparency Promises and Limitations.eng.srt
28.3 kB
IEEE Security & Privacy 2024/video - Zhen Xiang.eng.srt
28.3 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/T-Fuzz Fuzzing by Program Transformation - Hui Peng.eng.txt
28.2 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/SPHINCSC Compressing SPHINCS With (Almost) No Cost.eng.srt
28.2 kB
IEEE Security & Privacy 2024/Nightshade Prompt Specific Poisoning Attacks on Text to Image Generative Models - Shawn Shan.eng.srt
28.2 kB
IEEE Security & Privacy 2024/#144 TCP Spoofing Reliable Payload Transmission Past the Spoofed TCP Handshake - Eric Pan.eng.srt
28.2 kB
IEEE Security & Privacy 2024/Signing in Four Public Software Package Registries Quantity, Quality, and Influencing Factors.eng.srt
28.2 kB
IEEE Security & Privacy 2024/2024 267 Wear's my Data - Understanding the Cross Device Runtime Permission Model in Wearables - Dogu.eng.srt
28.2 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Rethinking Searchable Symmetric Encryption.eng.srt
28.2 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Proof-of-Learning Definitions and Practice.eng.srt
28.1 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/The EMV Standard Break, Fix, Verify.eng.srt
28.1 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/NTFUZZ Enabling Type-Aware Kernel Fuzzing on Windows with Static Binary Analysis.eng.srt
28.1 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Which Privacy and Security Attributes Most Impact Consumers' Risk Perception and Willingness to.eng.srt
28.1 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/PLATYPUS Software-based Power Side-Channel Attacks on x86.eng.srt
28.1 kB
IEEE Security & Privacy 2024/WeSee Using Malicious #VC Interrupts to Break AMD SEV SNP - Supraja Sridhara.eng.srt
28.0 kB
IEEE Security & Privacy 2024/2024 22 BUSted Microarchitectural Side Channel Attacks on the MCU Bus Interconnect - Cristiano Rodri.eng.srt
28.0 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Practical Timing Side-Channel Attacks on Memory Compression.eng.srt
28.0 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/When and Why Do People Want Ad Targeting Explanations Evidence from a Mixed-Methods Field Study.eng.srt
28.0 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Committed to Trust A Qualitative Study on Security & Trust in Open Source Software Projects.eng.srt
28.0 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/No Privacy in the Electronics Repair Industry.eng.srt
27.9 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Method Confusion Attack on the Bluetooth Pairing Process.eng.srt
27.9 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/DP-Sniper Black-Box Discovery of Differential Privacy Violations using Classifiers.eng.srt
27.8 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/DeepCoFFEA Improved Flow Correlation Attacks on Tor via Metric Learning and Amplification.eng.srt
27.8 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Cross-Domain Access Control Encryption - Arbitrary-policy, Constant-size, Efficient.eng.srt
27.8 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Bitcoin-Enhanced Proof-of-Stake Security Possibilities and Impossibilities.eng.srt
27.8 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/From 5G Sniffing to Harvesting Leakages of Privacy-Preserving Messengers.eng.srt
27.7 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/T-Fuzz Fuzzing by Program Transformation - Hui Peng.eng.lrc
27.7 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Bitcoin vs. Bitcoin Cash Coexistence or Downfall of Bitcoin Cash.eng.srt
27.7 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/SIRAJ A Unified Framework for Aggregation of Malicious Entity Detectors.eng.srt
27.7 kB
IEEE Security & Privacy 2024/Saiid El Hajj Chehade SINBAD 20 min - Saiid El Hajj Chehade.eng.srt
27.6 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/On the (In)security of Peer-to-Peer Decentralized Machine Learning.eng.srt
27.6 kB
IEEE Security & Privacy 2024/CanWeCastABallotAsIntendedAndBeReceiptFree - Henri Devillez.eng.srt
27.6 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Deepfake Text Detection Limitations and Opportunities.eng.srt
27.6 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Wolverine Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and.eng.srt
27.6 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Dangerous Skills Understanding and Mitigating Security Risks of Voice-Controlled Third-Party.eng.srt
27.6 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Understanding the Security and Privacy Attitudes of Smart Home Users on Reddit.eng.srt
27.5 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/F-BLEAU Fast Black-box Leakage Estimation.eng.srt
27.5 kB
IEEE Security & Privacy 2024/2024 431 Routing Attacks on Cryptocurrency Mining Pools - Muoi Tran.eng.srt
27.5 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/GraphSPD Graph-Based Security Patch Detection with Enriched Code Semantics.eng.srt
27.4 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/It’s (DOM) Clobbering Time Attack Techniques, Prevalence, and Defenses.eng.srt
27.4 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/SNAP Efficient Extraction of Private Properties with Poisoning.eng.srt
27.4 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Detection of Inconsistencies in Privacy Practices of Browser Extensions.eng.srt
27.4 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Always Contribute Back A Qualitative Study on Security Challenges of the Open Source Supply Chain.eng.srt
27.4 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Ebb-and-Flow Protocols A Resolution of the Availability-Finality Dilemma.eng.srt
27.3 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/SoK The Challenges Pitfalls and Perils of Using Hardware Performance Counters for Security.eng.srt
27.3 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Merkle2 A Low-Latency Transparency Log System.eng.srt
27.3 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Characterizing Everyday Misuse of Smart Home Devices.eng.srt
27.3 kB
IEEE Security & Privacy 2024/SoK CollusionResistantMPSI - Jelle Vos.eng.srt
27.3 kB
IEEE Security & Privacy 2024/SoK Prudent Evaluation Practices for Fuzzing - Moritz Schloegel.eng.srt
27.3 kB
IEEE Security & Privacy 2024/415 - SoK Efficient Design and Implementation of Polynomial Hash Functions over Prime Fields - Jan G.eng.srt
27.3 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Fuzzing File Systems via Two-Dimensional Input Space Exploration.eng.srt
27.3 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/REGA Scalable Rowhammer Mitigation with Refresh-Generating Activations.eng.srt
27.3 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/User Perceptions and Experiences with Smart Home Updates.eng.srt
27.2 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/On the Anonymity Guarantees of Anonymous Proof-of-Stake Protocols.eng.srt
27.2 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/A Theory to Instruct Differentially-Private Learning via Clipping Bias Reduction.eng.srt
27.2 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/An Interactive Prover for Protocol Verification in the Computational Model.eng.srt
27.1 kB
IEEE Security & Privacy 2024/GroVE 20mins S&P - Asim Waheed.eng.srt
27.1 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/SoK Distributed Randomness Beacons.eng.srt
27.1 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Improving Developers' Understanding of Regex Denial of Service Tools.eng.srt
27.1 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/CrossTalk Speculative Data Leaks Across Cores Are Real.eng.srt
27.0 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/An Extensive Formal Security Analysis of the OpenID Financial grade API Pedram Hosseyni.eng.srt
27.0 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/mmSpoof Resilient Spoofing of Automotive Millimeter-wave Radars using Reflect Array.eng.srt
27.0 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Journey to the Center of the Cookie Ecosystem Unraveling Actors' Roles and Relationships.eng.srt
26.9 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Survivalism Systematic Analysis of Malware Living-Off-The-Land.eng.srt
26.8 kB
IEEE Security & Privacy 2024/2024 158 Jaehan Kim PassREfinder Credential Stuffing Risk Prediction by Representing Password Reuse.eng.srt
26.8 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/SecureCells A Secure Compartmentalized Architecture.eng.srt
26.7 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Learning to Reconstruct Statistical Learning Theory and Encrypted Database Attacks.eng.srt
26.7 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Less Is More Refinement Proofs for Probabilistic Proofs.eng.srt
26.7 kB
IEEE Security & Privacy 2024/From Principle to Practice Vertical Data Minimization for Machine Learning - Robin Staab.eng.srt
26.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/How Not to Prove Your Election Outcome.eng.txt
26.7 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/SoK Security and Privacy in the Age of Commercial Drones.eng.srt
26.7 kB
IEEE Security & Privacy 2024/S&PFinal - Louis Henri.eng.srt
26.6 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Waldo A Private Time-Series Database from Function Secret-Sharing.eng.srt
26.6 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Quantifying Blockchain Extractable Value How dark is the forest.eng.srt
26.6 kB
IEEE Security & Privacy 2024/A Representative Study on Human Detection of Artificially Generated Media Across Countries - Joe.eng.srt
26.6 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/DIANE Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices.eng.srt
26.5 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/RuleKeeper GDPR-Aware Personal Data Compliance for Web Frameworks.eng.srt
26.5 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/SoK Let the Privacy Games Begin A Unified Treatment of Data Inference Privacy in Machine Learning.eng.srt
26.5 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/CryptGPU Fast Privacy-Preserving Machine Learning on the GPU.eng.srt
26.5 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/TrojanModel A Practical Trojan Attack against Automatic Speech Recognition Systems.eng.srt
26.4 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Black Widow Blackbox Data-driven Web Scanning.eng.srt
26.4 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/High-Order Masking of Lattice Signatures in Quasilinear Time.eng.srt
26.4 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/BLEDiff - Scalable and Property-Agnostic Noncompliance Checking for BLE Implementations.eng.srt
26.4 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Inducing Wireless Chargers to Voice Out for Inaudible Command Attacks.eng.srt
26.4 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Disassembling ARM Binaries by Lightweight Superset Instruction Interpretation and Graph Modeling.eng.srt
26.3 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Why Does Your Data Leak Uncovering the Data Leakage in Cloud from Mobile Apps.eng.srt
26.3 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/SoK Anti-Facial Recognition Technology.eng.srt
26.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/How Not to Prove Your Election Outcome.eng.lrc
26.3 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Happer Unpacking Android Apps via a Hardware-Assisted Approach.eng.srt
26.3 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/A Security RISC Microarchitectural Attacks on Hardware RISC-V CPUs.eng.srt
26.3 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Threshold Signatures in the Multiverse.eng.srt
26.3 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Perceptions of Distributed Ledger Technology Key Management-Interviews with Finance Professionals.eng.srt
26.3 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/TeSec Accurate Server-side Attack Investigation for Web Applications.eng.srt
26.3 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Revealer Detecting and Exploiting Regular Expression Denial-of-Service Vulnerabilities.eng.srt
26.3 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/SoK Demystifying Binary Lifters Through the Lens of Downstream Applications.eng.srt
26.2 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Timing-Based Browsing Privacy Vulnerabilities Via Site Isolation.eng.srt
26.2 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Opening Remarks of the 2016 IEEE Symposium on Security & Privacy.eng.srt
26.2 kB
IEEE Security & Privacy 2024/2024 125 DeepTheft Stealing DNN Model Architectures through Power Side Channel - Garrison Gao.eng.srt
26.1 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Characterizing the Limits of POV Acoustic Eavesdropping from Smartphone Cameras.eng.srt
26.1 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Private Access Control for Function Secret Sharing.eng.srt
26.1 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Breaking the Specification Certified PDF.eng.srt
26.1 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/KHyperLogLog Estimating Reidentifiability and Joinability of Large Data at Scale Pern Hui Chia.eng.srt
26.0 kB
IEEE Security & Privacy 2024/2024 61 ERASAN Efficient Rust Address Sanitizer - Jiun Min.eng.srt
26.0 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Disguising Attacks with Explanation-Aware Backdoors.eng.srt
25.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Krace Data Race Fuzzing for Kernel File Systems.eng.srt
25.9 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Design and Evaluation of Inclusive Email Security Indicators for People with Visual Impairments.eng.srt
25.9 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Scatter and Split Securely Defeating Cache Contention and Occupancy Attacks.eng.srt
25.8 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/ImU Physical Impersonating Attack for Face Recognition System with Natural Style Changes.eng.srt
25.8 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/OmniLedger - A Secure, Scale-Out, Decentralized Ledger via Sharding.eng.srt
25.8 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/High-Frequency Trading on Decentralized On-Chain Exchanges.eng.srt
25.8 kB
IEEE Security & Privacy 2024/Break the Wall from bottom Automated Discovery of Protocol Level Evasion Vulnerabilities in Web.eng.srt
25.8 kB
IEEE Security & Privacy 2024/6 Efficient Zero knowledge Arguments for Paillier Cryptosystem - Rae Gong1.eng.srt
25.7 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Sound Verification of Security Protocols From Design to Interoperable Implementations.eng.srt
25.7 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/A Novel Dynamic Analysis Infrastructure to Instrument Untrusted Execution Flow Across User-Kernel.eng.srt
25.7 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Data Recovery on Encrypted Databases with k-Nearest Neighbor Query Leakage.eng.txt
25.6 kB
IEEE Security & Privacy 2024/6 Efficient Zero knowledge Arguments for Paillier Cryptosystem - Rae Gong.eng.srt
25.6 kB
IEEE Security & Privacy 2024/tor1 - Zhongtang Luo.eng.srt
25.5 kB
IEEE Security & Privacy 2024/2024 13 Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis.eng.srt
25.5 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Jigsaw Puzzle Selective Backdoor Attack to Subvert Malware Classifiers.eng.srt
25.5 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/SyzDescribe Principled, Automated, Static Generation of Syscall Descriptions for Kernel Drivers.eng.srt
25.4 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Precise Detection of Kernel Data Races with Probabilistic Lockset Analysis.eng.srt
25.4 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Uncovering User Interactions on Smartphones via Contactless Wireless Charging Side Channels.eng.srt
25.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Krace Data Race Fuzzing for Kernel File Systems.eng.txt
25.3 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/AEM Facilitating Cross-Version Exploitability Assessment of Linux Kernel Vulnerabilities.eng.srt
25.3 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/BlindHub Bitcoin-Compatible Privacy-Preserving Payment Channel Hubs Supporting Variable Amounts.eng.srt
25.3 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Data Recovery on Encrypted Databases with k-Nearest Neighbor Query Leakage.eng.lrc
25.2 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/The 9 Lives of Bleichenbachers CAT New Cache ATtacks on TLS Implementations.eng.srt
25.2 kB
IEEE Security & Privacy 2024/SneakyPrompt Jailbreaking Text to image Generative Models - Yuchen Yang.eng.srt
25.2 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Practical Program Modularization with Type-Based Dependence Analysis.eng.srt
25.1 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/DEPCOMM Graph Summarization on System Audit Logs for Attack Investigation.eng.srt
25.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Krace Data Race Fuzzing for Kernel File Systems.eng.lrc
25.1 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Tap 'n Ghost A Compilation of Novel Attack Techniques against Smartphone Touchscreens.eng.srt
25.1 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Invisible Probe Timing Attacks with PCIe Congestion Side-channel.eng.srt
25.0 kB
IEEE Security & Privacy 2024/Security Privacy and Data Sharing Challenges When Moving to the US Insights from a Qualitative s.eng.srt
25.0 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/SoK - Deep Packer Inspection - A Longitudinal Study of the Complexity of Run-Time Packers.eng.txt
25.0 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/ShadowNet A Secure and Efficient On-device Model Inference System for Convolutional Neural Networks.eng.srt
24.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/High Precision Open-World Website Fingerprinting.eng.tsv
24.9 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Exploiting Unintended Feature leakage in Collaborative Learning Congzheng Song.eng.srt
24.9 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Implementing and Proving the TLS 1.3 Record Layer.eng.srt
24.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SEVurity No Security Without Integrity - Breaking Integrity.eng.srt
24.9 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/An Interview on the Security and Privacy Development Practices in Turkish Software Startups.eng.srt
24.9 kB
IEEE Security & Privacy 2024/Targeted and Troublesome Zahra Moti - Zahra Moti.eng.srt
24.9 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/A First Look at Zoombombing.eng.srt
24.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/VerX Safety Verification of Smart Contracts.eng.txt
24.9 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/SoK Certified Robustness for Deep Neural Networks.eng.srt
24.9 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Keep the Dirt Tain'ted TreeKEM, Adaptively and Actively Secure Continuous Group Key Agreement.eng.srt
24.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Hijacking Transient Execution through Microarchitectural Load Value Injection.eng.txt
24.8 kB
IEEE Security & Privacy 2024/2024 637 Poisoned ChatGPT Finds Work for Idle Hands Exploring Developers - Coding Practices with Inse.eng.srt
24.8 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Half&Half Demystifying Intel’s Directional Branch Predictors for Fast, Secure Partitioned Execution.eng.srt
24.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Birds of a Feather A Hardware & Security Panel (Updated).eng.text
24.8 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/MPCAuth Multi-factor Authentication for Distributed-trust Systems.eng.srt
24.8 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/EC Embedded Systems Compartmentalization via Intra-Kernel Isolation.eng.srt
24.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SPIDER Enabling Fast Patch Propagation in Related Software Repositories.eng.txt
24.8 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/WebSpec Towards Machine-Checked Analysis of Browser Security Mechanisms.eng.srt
24.7 kB
IEEE Security & Privacy 2024/2024 519 From Individual Computation to Allied Optimization Remodeling Privacy Preserving Neural Inf.eng.srt
24.7 kB
IEEE Security & Privacy 2024/Measure Observe Remeasure An Interactive Paradigm for Differentially Private Exploratory Analysis.eng.srt
24.7 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/SoK - Deep Packer Inspection - A Longitudinal Study of the Complexity of Run-Time Packers.eng.lrc
24.7 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Blind Certificate Authorities.eng.srt
24.7 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/TEEzz Fuzzing Trusted Applications on COTS Android Devices.eng.srt
24.7 kB
IEEE Security & Privacy 2024/SoK Security and Privacy of Blockchain Interoperability - André Augusto.eng.srt
24.7 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Learning to Reconstruct Statistical Learning Theory and Encrypted Database Attacks.eng.vtt
24.7 kB
IEEE Security & Privacy 2024/Scalable Mixed Mode MPC - Radhika Garg.eng.srt
24.7 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Low-Cost Privilege Separation with Compile Time Compartmentalization for Embedded Systems.eng.srt
24.6 kB
IEEE Security & Privacy 2024/don't Shoot the Messenger - Localization Prevention of Satellite Internet Users - Richard Mitev.eng.srt
24.6 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/GraphSC - Parallel Secure Computation Made Easy.eng.txt
24.6 kB
IEEE Security & Privacy 2024/Thwarting Last Minute Voter Coercion - Rosario Giustolisi.eng.srt
24.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability.eng.txt
24.6 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations.eng.srt
24.6 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/CSIRowhammer - Cryptographic Security and Integrity against Rowhammer.eng.srt
24.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SoK Understanding the Prevailing Security Vulnerabilities in TrustZone-Assisted TEE Systems.eng.srt
24.5 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Beyond Phish Toward Detecting Fraudulent e-Commerce Websites at Scale.eng.srt
24.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Hijacking Transient Execution through Microarchitectural Load Value Injection.eng.lrc
24.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/VerX Safety Verification of Smart Contracts.eng.lrc
24.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Replicated State Machines without Replicated Execution.eng.srt
24.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SPIDER Enabling Fast Patch Propagation in Related Software Repositories.eng.lrc
24.4 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Waldo A Private Time-Series Database from Function Secret-Sharing.eng.vtt
24.4 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Scalable and Privacy-Preserving Federated Principal Component Analysis.eng.srt
24.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability.eng.lrc
24.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/High Precision Open-World Website Fingerprinting.eng.srt
24.4 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/LAMBRETTA Learning to Rank for Twitter Soft Moderation.eng.srt
24.3 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/On Efficient, High-Fidelity and Blind Suppression of Backdoor Effects in Trojaned ML Models.eng.srt
24.3 kB
IEEE Security & Privacy 2024/LLMs Cannot Reliably Identify and Reason About Security Vulnerabilities Yet - A Comprehensive Eva.eng.srt
24.3 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/SoK Taxonomy of Attacks on Open-Source Software Supply Chains.eng.srt
24.3 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/SoK Cryptographic Neural-Network Computation.eng.srt
24.3 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/GraphSC - Parallel Secure Computation Made Easy.eng.lrc
24.3 kB
IEEE Security & Privacy 2024/Ad Inventory Pooling in the Ad Tech Supply Chain - Yash Vekaria.eng.srt
24.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Path Oblivious Heap Optimal and Practical Oblivious Priority Queue.eng.txt
24.2 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Verena - End-to-End Integrity Protection for Web Applications.eng.txt
24.2 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/OmniLedger - A Secure, Scale-Out, Decentralized Ledger via Sharding.eng.tsv
24.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Krace Data Race Fuzzing for Kernel File Systems.eng.vtt
24.2 kB
IEEE Security & Privacy 2024/sp 2024 holepunch final - Zachary Ratliff.eng.srt
24.1 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Analyzing Leakage of Personally Identifiable Information in Language Models.eng.srt
24.1 kB
IEEE Security & Privacy 2024/Obelix Mitigating Side Channels Through Dynamic Obfuscation - Jan.eng.srt
24.1 kB
IEEE Security & Privacy 2024/UnTrustZone Systematic Accelerated Aging to Expose On chip - Jubayer Mahmod.eng.srt
24.0 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/No One Drinks From the Firehose How Organizations Filter and Prioritize Vulnerability Information.eng.srt
24.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Replicated State Machines without Replicated Execution.eng.txt
24.0 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Waldo A Private Time-Series Database from Function Secret-Sharing.eng.txt
24.0 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/When Function Signature Recovery Meets Compiler Optimization.eng.srt
24.0 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Verena - End-to-End Integrity Protection for Web Applications.eng.lrc
24.0 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Clockwork Finance Automated Analysis of Economic Security in Smart Contracts.eng.srt
23.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SPECTECTOR Principled Detection of Speculative Information Flows.eng.srt
23.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SoK Understanding the Prevailing Security Vulnerabilities in TrustZone-Assisted TEE Systems.eng.txt
23.9 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/AUC Accountable Universal Composability.eng.srt
23.9 kB
IEEE Security & Privacy 2024/The Role of User Agent Interactions on Mobile Money Practices - Karen Sowon.eng.srt
23.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Path Oblivious Heap Optimal and Practical Oblivious Priority Queue.eng.lrc
23.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Tale of Sea and Sky On the Security of Maritime VSAT Communications.eng.tsv
23.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Replicated State Machines without Replicated Execution.eng.lrc
23.8 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Waldo A Private Time-Series Database from Function Secret-Sharing.eng.lrc
23.8 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/VIDEZZO Dependency-aware Virtual Device Fuzzing.eng.srt
23.8 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Implementing and Proving the TLS 1.3 Record Layer.eng.txt
23.8 kB
IEEE Security & Privacy 2024/Understanding Parents' Perceptions and Practices Toward Children's Security and Privacy in Virtua.eng.srt
23.8 kB
IEEE Security & Privacy 2024/211 - Multi Instance Adversarial Attack on GNN Based Malicious Domain Detection - Mahmoud Khaled Ahm.eng.srt
23.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SoK Understanding the Prevailing Security Vulnerabilities in TrustZone-Assisted TEE Systems.eng.lrc
23.7 kB
IEEE Security & Privacy 2024/2024 196 The Times They Are A Changin - Christos Tsoukaladelis.eng.srt
23.6 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/OmniLedger - A Secure, Scale-Out, Decentralized Ledger via Sharding.eng.vtt
23.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Private Resource Allocators and Their Applications.eng.srt
23.6 kB
IEEE Security & Privacy 2024/2024 57 Counterexample Guided Directed Fuzzing via Likely Invariant Inference - Shadow HUANG.eng.srt
23.6 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/How IoT Re-using Threatens Your Sensitive Data Exploring the User-Data Disposal in Used IoT Devices.eng.srt
23.6 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Implementing and Proving the TLS 1.3 Record Layer.eng.lrc
23.6 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Foundations of Dynamic BFT.eng.srt
23.6 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/SelectFuzz Efficient Directed Fuzzing with Selective Path Exploration.eng.srt
23.6 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Defensive Technology Use by Political Activists During the Sudanese Revolution.eng.srt
23.5 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Locally Differentially Private Frequency Estimation Based on Convolution Framework.eng.srt
23.5 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures.eng.srt
23.5 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Man-in-the-Middle Attacks without Rogue AP When WPAs Meet ICMP Redirects.eng.srt
23.5 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/SoK Decentralized Finance (DeFi) Attacks.eng.srt
23.5 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation.eng.srt
23.5 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/XFL Naming Functions in Binaries with Extreme Multi-label Learning.eng.srt
23.4 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Did you mix me Formally Verifying Verifiable Mix Nets in Electronic Voting.eng.srt
23.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability.eng.srt
23.3 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Scaling JavaScript Abstract Interpretation to Detect and Exploit Node.js Taint-style Vulnerability.eng.srt
23.3 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Machine unlearning.eng.srt
23.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SoK Differential Privacy as a Causal Property.eng.txt
23.2 kB
IEEE Security & Privacy 2024/TuDoor - Xiang Li.eng.srt
23.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Tale of Sea and Sky On the Security of Maritime VSAT Communications.eng.srt
23.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/AdGraph A Graph-Based Approach to Ad and Tracker Blocking.eng.srt
23.2 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Towards a Rigorous Statistical Analysis of Empirical Password Datasets.eng.srt
23.2 kB
IEEE Security & Privacy 2024/TuDoor new - Xiang Li.eng.srt
23.2 kB
IEEE Security & Privacy 2024/2024 500 Exploring the Orthogonality and Linearity of Backdoor Attacks - Kaiyuan Zhang.eng.srt
23.1 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/SoK - Deep Packer Inspection - A Longitudinal Study of the Complexity of Run-Time Packers.eng.srt
23.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Towards a Natural Perspective of Smart Homes for Practical Security and Safety Analyses.eng.srt
23.1 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Using Safety Properties to Generate Vulnerability Patches.eng.srt
23.0 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Implementing and Proving the TLS 1.3 Record Layer.eng.vtt
23.0 kB
IEEE Security & Privacy 2024/2024 100 The Dark Side of Scale Insecurity of Direct to Cell Satellite Mega Constellations - 刘威.eng.srt
23.0 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Mew Enabling Large-Scale and Dynamic Link-Flooding Defenses on Programmable Switches.eng.srt
23.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SoK Differential Privacy as a Causal Property.eng.lrc
22.9 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/D-DAE Defense-Penetrating Model Extraction Attacks.eng.srt
22.9 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Manipulation Attacks in Local Differential Privacy.eng.srt
22.9 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Private Collaborative Data Cleaning via Non-Equi PSI.eng.srt
22.9 kB
IEEE Security & Privacy 2024/cut final presentation - Sönke Huster.eng.srt
22.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SEVurity No Security Without Integrity - Breaking Integrity.eng.txt
22.9 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/CrawlPhish Large-scale Analysis of Client-side Cloaking Techniques in Phishing.eng.srt
22.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Replicated State Machines without Replicated Execution.eng.vtt
22.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SoK Understanding the Prevailing Security Vulnerabilities in TrustZone-Assisted TEE Systems.eng.vtt
22.9 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/3DFed Adaptive and Extensible Framework for Covert Backdoor Attack in Federated Learning.eng.srt
22.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/NetCAT Practical Cache Attacks from the Network.eng.txt
22.8 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Finding Specification Blind Spots via Fuzz Testing.eng.srt
22.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SEVurity No Security Without Integrity - Breaking Integrity.eng.vtt
22.8 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Three-party Non-linear Computation without Preprocessing for Privacy-preserving Machine Learning.eng.srt
22.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SPECTECTOR Principled Detection of Speculative Information Flows.eng.txt
22.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/EverCrypt A Fast, Verified, Cross-Platform Cryptographic Provider.eng.txt
22.8 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/DevIOus Device-Driven Side-Channel Attacks on the IOMMU.eng.srt
22.8 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/QueryX Symbolic Query on Decompiled Code for Finding Bugs in COTS Binaries.eng.srt
22.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SEVurity No Security Without Integrity - Breaking Integrity.eng.lrc
22.7 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Weak Fiat-Shamir Attacks on Modern Proof Systems.eng.srt
22.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/The Many Kinds of Creepware Used for Interpersonal Attacks.eng.txt
22.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Krace Data Race Fuzzing for Kernel File Systems.eng.tsv
22.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SPECTECTOR Principled Detection of Speculative Information Flows.eng.lrc
22.6 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Attitudes towards Client-Side Scanning for CSAM, Terrorism, Drug Trafficking, Drug Use, Tax Evasion.eng.srt
22.6 kB
IEEE Security & Privacy 2024/One for All and All for One - GNN based Control Flow Attestation for Embedded Devices - Richard M.eng.srt
22.6 kB
IEEE Security & Privacy 2024/CaFA - Cost aware, Feasible Attacks With Database Constraints - Matan BT.eng.srt
22.5 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Stealthy Porn Understanding Real World Adversarial Images for I'llicit Online Promotion.eng.srt
22.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/EverCrypt A Fast, Verified, Cross-Platform Cryptographic Provider.eng.lrc
22.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/NetCAT Practical Cache Attacks from the Network.eng.lrc
22.5 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/SIRNN A Math Library for Secure RNN Inference.eng.srt
22.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/High Precision Open-World Website Fingerprinting.eng.vtt
22.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/The Many Kinds of Creepware Used for Interpersonal Attacks.eng.lrc
22.5 kB
IEEE Security & Privacy 2024/2024 144 Withdrawing is believing Detecting Inconsistencies between Withdrawal Choices and Third par.eng.srt
22.5 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms.eng.srt
22.4 kB
IEEE Security & Privacy 2024/SHERPA Explainable Robust Algorithms for Privacy Preserved Federated Learning in Future Networks.eng.srt
22.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Breaking and (Partially) Fixing Provably Secure Onion Routing.eng.txt
22.4 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Device Fingerprinting with Peripheral Timestamps.eng.srt
22.4 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/mmEcho A mmWave-based Acoustic Eavesdropping Method.eng.srt
22.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Kobold Evaluating Decentralized Access Control for Remote NSXPC Methods on iOS.eng.srt
22.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/FlyClient Super-Light Clients for Cryptocurrencies.eng.txt
22.3 kB
IEEE Security & Privacy 2024/Backdooring Multimodal Learning - 卡的不动弹.eng.srt
22.3 kB
IEEE Security & Privacy 2024/Backdooring Multimodal Learning.eng.srt
22.3 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Poltergeist Acoustic Manipulation of Image Stabilization towards Object Mis-Labeling.eng.srt
22.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/AdGraph A Graph-Based Approach to Ad and Tracker Blocking.eng.txt
22.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SPECTECTOR Principled Detection of Speculative Information Flows.eng.vtt
22.2 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Fingerprinting the Fingerprinters Learning to Detect Browser Fingerprinting Behaviors.eng.srt
22.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Towards a Natural Perspective of Smart Homes for Practical Security and Safety Analyses.eng.txt
22.2 kB
IEEE Security & Privacy 2024/Flash a comprehensive approach to intrusion detection via provenance graph representation learning.eng.srt
22.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Breaking and (Partially) Fixing Provably Secure Onion Routing.eng.lrc
22.1 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Verena - End-to-End Integrity Protection for Web Applications.eng.srt
22.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Security Analysis of the Facebook Ad Library.eng.srt
22.1 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Protected or Porous A Comparative Analysis of Threat Detection Capability of IoT Safeguards.eng.srt
22.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/AdGraph A Graph-Based Approach to Ad and Tracker Blocking.eng.lrc
22.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability.eng.vtt
22.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/FlyClient Super-Light Clients for Cryptocurrencies.eng.lrc
22.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SPIDER Enabling Fast Patch Propagation in Related Software Repositories.eng.srt
22.0 kB
IEEE Security & Privacy 2024/No Privacy Left Outside - Ziqi Zhang.eng.srt
22.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Towards a Natural Perspective of Smart Homes for Practical Security and Safety Analyses.eng.lrc
22.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Private Resource Allocators and Their Applications.eng.vtt
22.0 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Data Recovery on Encrypted Databases with k-Nearest Neighbor Query Leakage.eng.srt
22.0 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Discovering Java Deserialization Vulnerabilities via Structure-Aware Directed Greybox Fuzzing.eng.srt
22.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Automated Reverse Engineering and Privacy Analysis of Modern Cars.eng.txt
21.9 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Protecting Models Trained by Multi-party Learning with Differential Privacy.eng.srt
21.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/The Many Kinds of Creepware Used for Interpersonal Attacks.eng.srt
21.9 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Co-Inflow Coarse-grained Information Flow Control for Java-like Languages.eng.srt
21.9 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/CacheOut Leaking Data on Intel CPUs via Cache Evictions.eng.srt
21.8 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Cross Layer Attacks and How to Use Them (for DNS Cache Poisoning, Device Tracking and More).eng.srt
21.8 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/CANnon Reliable and Stealthy Remote Shutdown Attacks via Unaltered Automotive Microcontrollers.eng.srt
21.8 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Low-effort VR Headset User Authentication Using Head-reverberated Sounds with Replay Resistance.eng.srt
21.8 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/DepthFake Spoofing 3D Face Authentication with a 2D Photo.eng.srt
21.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability.eng.tsv
21.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SoK A Minimalist Approach to Formalizing Analog Sensor Security.eng.srt
21.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Automated Reverse Engineering and Privacy Analysis of Modern Cars.eng.srt
21.8 kB
IEEE Security & Privacy 2024/322 - SoK SGX Fail How Stuff Gets eXposed - Stephan van Schaik.eng.srt
21.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Automated Reverse Engineering and Privacy Analysis of Modern Cars.eng.lrc
21.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Tale of Sea and Sky On the Security of Maritime VSAT Communications.eng.vtt
21.7 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/SoK - Deep Packer Inspection - A Longitudinal Study of the Complexity of Run-Time Packers.eng.tsv
21.7 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/T-Fuzz Fuzzing by Program Transformation - Hui Peng.eng.tsv
21.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Transparent Polynomial Delegation and Its Applications to Zero Knowledge Proof.eng.txt
21.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/CrypTFlow - Secure TensorFlow Inference.eng.srt
21.7 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Security of the J-PAKE Password-Authenticated Key Exchange Protocol.eng.txt
21.7 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Foundations of Dynamic BFT.eng.vtt
21.7 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/SoK - Deep Packer Inspection - A Longitudinal Study of the Complexity of Run-Time Packers.eng.vtt
21.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/How Not to Prove Your Election Outcome.eng.tsv
21.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/FlyClient Super-Light Clients for Cryptocurrencies.eng.srt
21.6 kB
IEEE Security & Privacy 2024/2024 88 AFGEN Whole Function Fuzzing for Applications and Libraries - Yuwei LIU 1.eng.srt
21.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/AdGraph A Graph-Based Approach to Ad and Tracker Blocking.eng.vtt
21.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Programming Framework for Differential Privacy with Accuracy Concentration Bounds.eng.txt
21.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Towards a Natural Perspective of Smart Homes for Practical Security and Safety Analyses.eng.vtt
21.5 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Waldo A Private Time-Series Database from Function Secret-Sharing.eng.tsv
21.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Replicated State Machines without Replicated Execution.eng.tsv
21.4 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/WarpAttack Bypassing CFI through Compiler-Introduced Double-Fetches.eng.srt
21.4 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Security of the J-PAKE Password-Authenticated Key Exchange Protocol.eng.lrc
21.4 kB
IEEE Security & Privacy 2024/#498 Learn What You Want to Unlearn Unlearning Inversion Attacks against Machine Unlearning - Hongsh.eng.srt
21.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Transparent Polynomial Delegation and Its Applications to Zero Knowledge Proof.eng.lrc
21.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SoK Differential Privacy as a Causal Property.eng.srt
21.4 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Foundations of Dynamic BFT.eng.txt
21.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/HydRand Efficient Continuous Distributed Randomness.eng.srt
21.3 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Post-Quantum WireGuard.eng.srt
21.3 kB
IEEE Security & Privacy 2024/2024 48 SwiftRange - Vincent.eng.srt
21.3 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Accuracy-Privacy Trade-off in Deep Ensemble A Membership Inference Perspective.eng.srt
21.3 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/PrivKV Key Value Data Collection with Local Differential Privacy.eng.srt
21.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Programming Framework for Differential Privacy with Accuracy Concentration Bounds.eng.lrc
21.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SoK Understanding the Prevailing Security Vulnerabilities in TrustZone-Assisted TEE Systems.eng.tsv
21.3 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Hardware-Software Contracts for Secure Speculation.eng.srt
21.3 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Lockable Signatures for Blockchains Scriptless Scripts for all Signatures.eng.srt
21.2 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Low-Bandwidth Threshold ECDSA via Pseudorandom Correlation Generators.eng.txt
21.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/ZEXE Enabling Decentralized Private Computation.eng.txt
21.2 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Verena - End-to-End Integrity Protection for Web Applications.eng.tsv
21.2 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/UTOPIA Automatic Generation of Fuzz Driver using Unit Tests.eng.srt
21.2 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Foundations of Dynamic BFT.eng.lrc
21.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/TRRespass Exploiting the Many Sides of Target Row Refresh.eng.srt
21.1 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Implementing and Proving the TLS 1.3 Record Layer.eng.tsv
21.1 kB
IEEE Security & Privacy 2024/From Virtual Touch to Tesla Command Unlocking Unauthenticated Control Chains From Smart Glasses.eng.srt
21.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Security Analysis of the Facebook Ad Library.eng.txt
21.1 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Transfer Attacks Revisited A Large-Scale Empirical Study in Real Computer Vision Settings.eng.srt
21.1 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Tyr Finding Consensus Failure Bugs in Blockchain System with Behaviour Divergent Model.eng.srt
21.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Hijacking Transient Execution through Microarchitectural Load Value Injection.eng.srt
21.0 kB
IEEE Security & Privacy 2024/2024 265 eAudit - A Fast, Scalable and Deployable Audit Data Collection System - Hanke Kimm.eng.srt
21.0 kB
IEEE Security & Privacy 2024/LLMIF Augmented Large Language Model for Fuzzing IoT Devices - Jincheng Wang.eng.srt
21.0 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Low-Bandwidth Threshold ECDSA via Pseudorandom Correlation Generators.eng.lrc
21.0 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Low-Bandwidth Threshold ECDSA via Pseudorandom Correlation Generators.eng.srt
21.0 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Jolt Recovering TLS Signing Keys via Rowhammer Faults.eng.srt
21.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/ZEXE Enabling Decentralized Private Computation.eng.lrc
21.0 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/A Generic, Efficient, and Effortless Solver with Self-Supervised Learning for Breaking Text Captchas.eng.srt
20.9 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Verena - End-to-End Integrity Protection for Web Applications.eng.vtt
20.9 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Data Recovery on Encrypted Databases with k-Nearest Neighbor Query Leakage.eng.tsv
20.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Ex-vivo Dynamic Analysis Framework for Android Device Drivers.eng.txt
20.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Private Resource Allocators and Their Applications.eng.txt
20.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Security Analysis of the Facebook Ad Library.eng.lrc
20.9 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/MAD-HTLC Because HTLC is Crazy-Cheap to Attack.eng.srt
20.9 kB
IEEE Security & Privacy 2024/BULKOR:Enabling Bulk Loading for Path ORAM - Xiang Li.eng.srt
20.8 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/On the Just-In-Time Discovery of Profit-Generating Transactions in DeFi Protocols.eng.srt
20.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Private Resource Allocators and Their Applications.eng.lrc
20.8 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Bomberman Defining and Defeating Hardware Ticking Timebombs at Design-time.eng.srt
20.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Kobold Evaluating Decentralized Access Control for Remote NSXPC Methods on iOS.eng.txt
20.8 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Device Fingerprinting with Peripheral Timestamps.eng.vtt
20.8 kB
IEEE Security & Privacy 2024/Practical Attacks Against DNS Reputation Systems.eng.srt
20.8 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/IEEE S&P 2019 - Opening Remarks - General Chair.eng.srt
20.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/The Many Kinds of Creepware Used for Interpersonal Attacks.eng.vtt
20.7 kB
IEEE Security & Privacy 2024/GAuV - Xingyu Xie.eng.srt
20.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Are We Susceptible to Rowhammer An End-to-End Methodology for Cloud Providers.eng.srt
20.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/xMP Selective Memory Protection for Kernel and User Space.eng.srt
20.7 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Pegasus Bridging Polynomial and Non-polynomial Evaluations in Homomorphic Encryption.eng.srt
20.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Ex-vivo Dynamic Analysis Framework for Android Device Drivers.eng.lrc
20.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/NetCAT Practical Cache Attacks from the Network.eng.srt
20.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Hijacking Transient Execution through Microarchitectural Load Value Injection.eng.tsv
20.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/RAMBleed Reading Bits in Memory without Accessing Them.eng.srt
20.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/This PIN Can Be Easily Guessed Analyzing the Security of Smartphone Unlock PINs.eng.srt
20.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Meddling Middlemen Empirical Analysis of the Risks of Data-Saving Mobile Browsers.eng.txt
20.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/How Not to Prove Your Election Outcome.eng.srt
20.6 kB
IEEE Security & Privacy 2024/Ehsanul Kabir FLShield A Validation Based Federated Learning Framework to Defend Against Poisonin.eng.srt
20.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Kobold Evaluating Decentralized Access Control for Remote NSXPC Methods on iOS.eng.lrc
20.6 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Beyond Credential Stuffing Password Similarity Models using Neural Networks.eng.txt
20.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Breaking and (Partially) Fixing Provably Secure Onion Routing.eng.srt
20.6 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/ADI Adversarial Dominating Inputs in Vertical Federated Learning Systems.eng.txt
20.6 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Volttack Control IoT Devices by Manipulating Power Supply Voltage.eng.srt
20.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Kobold Evaluating Decentralized Access Control for Remote NSXPC Methods on iOS.eng.vtt
20.6 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/CRYLOGGER Detecting Crypto Misuses Dynamically.eng.srt
20.6 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/WIGHT Wired Ghost Touch Attack on Capacitive Touchscreens.eng.srt
20.6 kB
IEEE Security & Privacy 2024/2024 108 DeepShuffle A Lightweight Defense Framework against Adversarial Fault Injection Attacks on.eng.srt
20.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Security Analysis of the Facebook Ad Library.eng.vtt
20.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Automatic Uncovering of Hidden Behaviors from Input Validation in Mobile Apps.eng.txt
20.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SPIDER Enabling Fast Patch Propagation in Related Software Repositories.eng.tsv
20.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/RAMBleed Reading Bits in Memory without Accessing Them.eng.txt
20.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Automated Reverse Engineering and Privacy Analysis of Modern Cars.eng.vtt
20.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/CrypTFlow - Secure TensorFlow Inference.eng.txt
20.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/EverCrypt A Fast, Verified, Cross-Platform Cryptographic Provider.eng.srt
20.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Meddling Middlemen Empirical Analysis of the Risks of Data-Saving Mobile Browsers.eng.lrc
20.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/HydRand Efficient Continuous Distributed Randomness.eng.txt
20.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Meddling Middlemen Empirical Analysis of the Risks of Data-Saving Mobile Browsers.eng.srt
20.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Are Anonymity-Seekers Just like Everybody Else An Analysis of Contributions to Wikipedia from Tor.eng.txt
20.4 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/FIDO2, CTAP 2.1, and WebAuthn 2 Provable Security and Post-Quantum Instantiation.eng.srt
20.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Programming Framework for Differential Privacy with Accuracy Concentration Bounds.eng.srt
20.4 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/REDEEM MYSELF Purifying Backdoors in Deep Learning Models using Self Attention Distillation.eng.srt
20.4 kB
IEEE Security & Privacy 2024/#518 LACMUS Latent Concept Masking for General Robustness Enhancement of DNNs - Hongsheng Hu.eng.srt
20.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/CrypTFlow - Secure TensorFlow Inference.eng.vtt
20.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SPECTECTOR Principled Detection of Speculative Information Flows.eng.tsv
20.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/ICAS An Extensible Framework for Estimating the Susceptibility of IC Layouts to Additive Trojans.eng.srt
20.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SPIDER Enabling Fast Patch Propagation in Related Software Repositories.eng.vtt
20.3 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/FedRecover Recovering from Poisoning Attacks in Federated Learning using Historical Information.eng.srt
20.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/CrypTFlow - Secure TensorFlow Inference.eng.lrc
20.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/RAMBleed Reading Bits in Memory without Accessing Them.eng.lrc
20.3 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Beyond Credential Stuffing Password Similarity Models using Neural Networks.eng.lrc
20.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/HydRand Efficient Continuous Distributed Randomness.eng.lrc
20.3 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/ADI Adversarial Dominating Inputs in Vertical Federated Learning Systems.eng.lrc
20.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Are Anonymity-Seekers Just like Everybody Else An Analysis of Contributions to Wikipedia from Tor.eng.lrc
20.3 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/GraphSC - Parallel Secure Computation Made Easy.eng.srt
20.2 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Data Recovery on Encrypted Databases with k-Nearest Neighbor Query Leakage.eng.vtt
20.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Automatic Uncovering of Hidden Behaviors from Input Validation in Mobile Apps.eng.lrc
20.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/The Many Kinds of Creepware Used for Interpersonal Attacks.eng.tsv
20.2 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Proactive Threshold Wallets with Offline Devices.eng.srt
20.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SEVurity No Security Without Integrity - Breaking Integrity.eng.tsv
20.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/The State of the Uniform Attacks on Encrypted Databases beyond the Uniform Query Distribution.eng.txt
20.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Formal Modelling and Proof in the CHERI Design and Implementation Process.eng.srt
20.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SoK A Minimalist Approach to Formalizing Analog Sensor Security.eng.vtt
20.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/The State of the Uniform Attacks on Encrypted Databases beyond the Uniform Query Distribution.eng.srt
20.1 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Device Fingerprinting with Peripheral Timestamps.eng.txt
20.1 kB
IEEE Security & Privacy 2024/BadVFL backdoor attacks in vertical federated learning - Mohammad Naseri.eng.srt
20.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Intriguing Properties of Adversarial ML Attacks in the Problem Space.eng.txt
20.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Flaw Label Exploiting IPv6 Flow Label.eng.txt
20.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SoK A Minimalist Approach to Formalizing Analog Sensor Security.eng.txt
20.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Formal Modelling and Proof in the CHERI Design and Implementation Process.eng.txt
20.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/The State of the Uniform Attacks on Encrypted Databases beyond the Uniform Query Distribution.eng.lrc
20.0 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Device Fingerprinting with Peripheral Timestamps.eng.lrc
20.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Full-band De-anonymization of Bluetooth Classic Devices.eng.srt
20.0 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/PublicCheck Public Integrity Verification for Services of Run-time Deep Models.eng.srt
20.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/FlyClient Super-Light Clients for Cryptocurrencies.eng.vtt
20.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SoK Differential Privacy as a Causal Property.eng.vtt
19.9 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/GraphSC - Parallel Secure Computation Made Easy.eng.tsv
19.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/ZEXE Enabling Decentralized Private Computation.eng.srt
19.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Intriguing Properties of Adversarial ML Attacks in the Problem Space.eng.lrc
19.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Intriguing Properties of Adversarial ML Attacks in the Problem Space.eng.srt
19.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/xMP Selective Memory Protection for Kernel and User Space.eng.txt
19.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/AdGraph A Graph-Based Approach to Ad and Tracker Blocking.eng.tsv
19.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/OHIE Blockchain Scaling Made Simple.eng.srt
19.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Path Oblivious Heap Optimal and Practical Oblivious Priority Queue.eng.srt
19.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SoK A Minimalist Approach to Formalizing Analog Sensor Security.eng.lrc
19.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Full-band De-anonymization of Bluetooth Classic Devices.eng.txt
19.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SoK Differential Privacy as a Causal Property.eng.tsv
19.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Ask the Experts What Should Be on an IoT Privacy and Security Label.eng.txt
19.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/HydRand Efficient Continuous Distributed Randomness.eng.vtt
19.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Towards a Natural Perspective of Smart Homes for Practical Security and Safety Analyses.eng.tsv
19.8 kB
IEEE Security & Privacy 2024/2024 62 Enforcing End to end Security for Remote Conferencing - Triste L.eng.srt
19.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/TRRespass Exploiting the Many Sides of Target Row Refresh.eng.txt
19.8 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Reading Between the Lines An Extensive Evaluation of the Security and Privacy Implications.eng.srt
19.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Formal Modelling and Proof in the CHERI Design and Implementation Process.eng.lrc
19.8 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Learning to Reconstruct Statistical Learning Theory and Encrypted Database Attacks.eng.text
19.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Flaw Label Exploiting IPv6 Flow Label.eng.lrc
19.7 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/MeshUp Stateless Cache Side-channel Attack on CPU Mesh.eng.srt
19.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Krace Data Race Fuzzing for Kernel File Systems.eng.text
19.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/xMP Selective Memory Protection for Kernel and User Space.eng.lrc
19.7 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Continual Observation under User-level Differential Privacy.eng.srt
19.7 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/T-Fuzz Fuzzing by Program Transformation - Hui Peng.eng.srt
19.7 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/DeHiREC Detecting Hidden Voice Recorders via ADC Electromagnetic Radiation.eng.srt
19.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Pseudorandom Black Swans Cache Attacks on CTR DRBG.eng.srt
19.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/VerX Safety Verification of Smart Contracts.eng.tsv
19.7 kB
IEEE Security & Privacy 2024/Ati Priya Bajaj Len or index or count, anything but v1 Predicting Variable Names in Decompilation Ou.eng.srt
19.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Hijacking Transient Execution through Microarchitectural Load Value Injection.eng.vtt
19.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Full-band De-anonymization of Bluetooth Classic Devices.eng.lrc
19.7 kB
IEEE Security & Privacy 2024/BELT Old School Backdoor Attacks can Evade the State of the Art Defense with Backdoor Exclusivity.eng.srt
19.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Ask the Experts What Should Be on an IoT Privacy and Security Label.eng.lrc
19.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Semantic Understanding of Smart Contracts Executable Operational Semantics of Solidity.eng.txt
19.6 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/ShorTor Improving Tor Network Latency via Multi-hop Overlay Routing.eng.srt
19.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/TRRespass Exploiting the Many Sides of Target Row Refresh.eng.lrc
19.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SoK Cyber Insurance - Technical Challenges and a System Security Roadmap.eng.txt
19.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/TRRespass Exploiting the Many Sides of Target Row Refresh.eng.vtt
19.6 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/WIGHT Wired Ghost Touch Attack on Capacitive Touchscreens.eng.txt
19.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Cornucopia Temporal Safety for CHERI Heaps.eng.srt
19.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Automated Reverse Engineering and Privacy Analysis of Modern Cars.eng.tsv
19.5 kB
IEEE Security & Privacy 2024/2024 305 Pianist Scalable zkRollups via Fully Distributed Zero Knowledge Proofs - Tianyi Liu.eng.srt
19.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Cornucopia Temporal Safety for CHERI Heaps.eng.txt
19.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Humpty Dumpty Controlling Word Meanings via Corpus Poisoning.eng.txt
19.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Semantic Understanding of Smart Contracts Executable Operational Semantics of Solidity.eng.srt
19.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Are Anonymity-Seekers Just like Everybody Else An Analysis of Contributions to Wikipedia from Tor.eng.srt
19.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Path Oblivious Heap Optimal and Practical Oblivious Priority Queue.eng.tsv
19.5 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Low-Bandwidth Threshold ECDSA via Pseudorandom Correlation Generators.eng.vtt
19.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Semantic Understanding of Smart Contracts Executable Operational Semantics of Solidity.eng.lrc
19.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Combating Dependence Explosion in Forensic Analysis Using Alternative Tag Propagation Semantics.eng.srt
19.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/HopSkipJumpAttack A Query-Efficient Decision-Based Attack.eng.srt
19.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/VerX Safety Verification of Smart Contracts.eng.srt
19.4 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/ShorTor Improving Tor Network Latency via Multi-hop Overlay Routing.eng.txt
19.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SoK Cyber Insurance - Technical Challenges and a System Security Roadmap.eng.lrc
19.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/EverCrypt A Fast, Verified, Cross-Platform Cryptographic Provider.eng.tsv
19.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Ask the Experts What Should Be on an IoT Privacy and Security Label.eng.srt
19.4 kB
IEEE Security & Privacy 2024/545video - Irina Ford.eng.srt
19.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Pseudorandom Black Swans Cache Attacks on CTR DRBG.eng.txt
19.4 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Randomized Last-Level Caches Are Still Vulnerable to Cache Side-Channel Attacks But We Can Fix It.eng.srt
19.4 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/WIGHT Wired Ghost Touch Attack on Capacitive Touchscreens.eng.lrc
19.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Private Resource Allocators and Their Applications.eng.tsv
19.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/How Not to Prove Your Election Outcome.eng.vtt
19.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Cornucopia Temporal Safety for CHERI Heaps.eng.lrc
19.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/RAMBleed Reading Bits in Memory without Accessing Them.eng.vtt
19.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Humpty Dumpty Controlling Word Meanings via Corpus Poisoning.eng.lrc
19.3 kB
IEEE Security & Privacy 2024/2024 37 SoK Safer Digital Safety Research Involving At Risk Users - Rosanna Rosie Bellini.eng.srt
19.3 kB
IEEE Security & Privacy 2024/59 Hyena Balancing Packing, Reuse, and Rotations for Encrypted Inference - Sarabjeet Singh.eng.srt
19.3 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Runtime Recovery of Web Applications under Zero-Day ReDoS Attacks.eng.srt
19.3 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/ShorTor Improving Tor Network Latency via Multi-hop Overlay Routing.eng.lrc
19.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Pseudorandom Black Swans Cache Attacks on CTR DRBG.eng.lrc
19.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/xMP Selective Memory Protection for Kernel and User Space.eng.vtt
19.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Meddling Middlemen Empirical Analysis of the Risks of Data-Saving Mobile Browsers.eng.vtt
19.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Breaking and (Partially) Fixing Provably Secure Onion Routing.eng.vtt
19.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/EverCrypt A Fast, Verified, Cross-Platform Cryptographic Provider.eng.vtt
19.2 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Foundations of Dynamic BFT.eng.tsv
19.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/ICAS An Extensible Framework for Estimating the Susceptibility of IC Layouts to Additive Trojans.eng.vtt
19.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Towards Effective Differential Privacy Comms for Users' Data Sharing Decision and Comprehension.eng.srt
19.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Breaking and (Partially) Fixing Provably Secure Onion Routing.eng.tsv
19.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/RetroWrite Statically Instrumenting COTS Binaries for Fuzzing and Sanitization.eng.srt
19.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/ICAS An Extensible Framework for Estimating the Susceptibility of IC Layouts to Additive Trojans.eng.txt
19.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Binsec Rel Efficient Relational Symbolic Execution for Constant-Time at Binary-Level.eng.txt
19.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/FlyClient Super-Light Clients for Cryptocurrencies.eng.tsv
19.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SoK Cyber Insurance - Technical Challenges and a System Security Roadmap.eng.srt
19.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/OHIE Blockchain Scaling Made Simple.eng.txt
19.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Ex-vivo Dynamic Analysis Framework for Android Device Drivers.eng.srt
19.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Programming Framework for Differential Privacy with Accuracy Concentration Bounds.eng.vtt
19.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Towards Effective Differential Privacy Comms for Users' Data Sharing Decision and Comprehension.eng.txt
19.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Are We Susceptible to Rowhammer An End-to-End Methodology for Cloud Providers.eng.vtt
19.0 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/SGUARD Smart Contracts Made Vulnerability-Free.eng.srt
19.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/NetCAT Practical Cache Attacks from the Network.eng.vtt
19.0 kB
IEEE Security & Privacy 2024/2023 219 Formal Model Driven Analysis of Resilience of GossipSub to Attacks from Misbehaving Peers.eng.srt
19.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/ICAS An Extensible Framework for Estimating the Susceptibility of IC Layouts to Additive Trojans.eng.lrc
19.0 kB
IEEE Security & Privacy 2024/2024 25 MQTTactic Security Analysis and Verification for Logic Flaws in MQTT Implementations - szx.eng.srt
19.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Message Time of Arrival Codes A Fundamental Primitive for Secure Distance Measurement.eng.txt
18.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Influencing Photo Sharing Decisions on Social Media A Case of Paradoxical Findings.eng.txt
18.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/This PIN Can Be Easily Guessed Analyzing the Security of Smartphone Unlock PINs.eng.vtt
18.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/OHIE Blockchain Scaling Made Simple.eng.lrc
18.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Are We Susceptible to Rowhammer An End-to-End Methodology for Cloud Providers.eng.txt
18.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Binsec Rel Efficient Relational Symbolic Execution for Constant-Time at Binary-Level.eng.lrc
18.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Towards Effective Differential Privacy Comms for Users' Data Sharing Decision and Comprehension.eng.lrc
18.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/JIT Leaks Inducing Timing Side Channels through Just-In-Time Compilation.eng.txt
18.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/NetCAT Practical Cache Attacks from the Network.eng.tsv
18.9 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/WIGHT Wired Ghost Touch Attack on Capacitive Touchscreens.eng.vtt
18.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/The State of the Uniform Attacks on Encrypted Databases beyond the Uniform Query Distribution.eng.vtt
18.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/JIT Leaks Inducing Timing Side Channels through Just-In-Time Compilation.eng.srt
18.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Sync HotStuff Simple and Practical Synchronous State Machine Replication.eng.srt
18.8 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Compositional Security for Reentrant Applications.eng.srt
18.8 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Compositional Non-Interference for Fine-Grained Concurrent Programs.eng.srt
18.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability.eng.text
18.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Message Time of Arrival Codes A Fundamental Primitive for Secure Distance Measurement.eng.lrc
18.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Influencing Photo Sharing Decisions on Social Media A Case of Paradoxical Findings.eng.lrc
18.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Security Analysis of the Facebook Ad Library.eng.tsv
18.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Leveraging EM Side-Channel Information to Detect Rowhammer Attacks.eng.srt
18.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Humpty Dumpty Controlling Word Meanings via Corpus Poisoning.eng.srt
18.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Are We Susceptible to Rowhammer An End-to-End Methodology for Cloud Providers.eng.lrc
18.7 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/GraphSC - Parallel Secure Computation Made Easy.eng.vtt
18.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Full-band De-anonymization of Bluetooth Classic Devices.eng.vtt
18.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Fuzzing JavaScript Engines with Aspect-Preserving Mutation.eng.txt
18.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Intriguing Properties of Adversarial ML Attacks in the Problem Space.eng.vtt
18.7 kB
IEEE Security & Privacy 2024/video1092237667 - Hoang Nguyen Dai.eng.srt
18.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/JIT Leaks Inducing Timing Side Channels through Just-In-Time Compilation.eng.lrc
18.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Replicated State Machines without Replicated Execution.eng.text
18.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/CrypTFlow - Secure TensorFlow Inference.eng.tsv
18.7 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Detecting AI Trojans Using Meta Neural Analysis.eng.srt
18.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Programming Framework for Differential Privacy with Accuracy Concentration Bounds.eng.tsv
18.7 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/PLA-LiDAR Physical Laser Attacks against LiDAR-based 3D Object Detection in Autonomous Vehicle.eng.srt
18.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/PMP Cost-Effective Forced Execution with Probabilistic Memory Pre-planning.eng.srt
18.6 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Waldo A Private Time-Series Database from Function Secret-Sharing.eng.text
18.6 kB
IEEE Security & Privacy 2024/A Picture is Worth 500 Labels A Case Study of Demographic Disparities in Local Machine Learning M.eng.srt
18.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/HopSkipJumpAttack A Query-Efficient Decision-Based Attack.eng.txt
18.6 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/SQUIP Exploiting the Scheduler Queue Contention Side Channel.eng.srt
18.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Dragonblood Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd.eng.srt
18.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Sync HotStuff Simple and Practical Synchronous State Machine Replication.eng.txt
18.6 kB
IEEE Security & Privacy 2024/Text CRS A Generalized Certified Robustness Framework against Textual Adversarial Attacks - Jane.eng.srt
18.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/ZEXE Enabling Decentralized Private Computation.eng.vtt
18.5 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Trouble Over-The-Air An Analysis of FOTA Apps in the Android Ecosystem.eng.srt
18.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Fuzzing JavaScript Engines with Aspect-Preserving Mutation.eng.lrc
18.5 kB
IEEE Security & Privacy 2024/Where URLs Become Weapons - Automated Discovery of SSRF Vulnerabilities in Web Applications - Sam.eng.srt
18.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SoK Understanding the Prevailing Security Vulnerabilities in TrustZone-Assisted TEE Systems.eng.text
18.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Are Anonymity-Seekers Just like Everybody Else An Analysis of Contributions to Wikipedia from Tor.eng.vtt
18.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/HopSkipJumpAttack A Query-Efficient Decision-Based Attack.eng.lrc
18.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Combating Dependence Explosion in Forensic Analysis Using Alternative Tag Propagation Semantics.eng.txt
18.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Kobold Evaluating Decentralized Access Control for Remote NSXPC Methods on iOS.eng.tsv
18.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/This PIN Can Be Easily Guessed Analyzing the Security of Smartphone Unlock PINs.eng.txt
18.4 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Device Fingerprinting with Peripheral Timestamps.eng.tsv
18.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/OHIE Blockchain Scaling Made Simple.eng.vtt
18.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Sync HotStuff Simple and Practical Synchronous State Machine Replication.eng.lrc
18.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Pseudorandom Black Swans Cache Attacks on CTR DRBG.eng.vtt
18.4 kB
IEEE Security & Privacy 2024/2024 62 Enforcing End to end Security for Remote Conferencing - Triste L.eng.txt
18.4 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Low-Bandwidth Threshold ECDSA via Pseudorandom Correlation Generators.eng.tsv
18.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Formal Modelling and Proof in the CHERI Design and Implementation Process.eng.vtt
18.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Meddling Middlemen Empirical Analysis of the Risks of Data-Saving Mobile Browsers.eng.tsv
18.4 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/ShorTor Improving Tor Network Latency via Multi-hop Overlay Routing.eng.vtt
18.3 kB
IEEE Security & Privacy 2024/2024 62 Enforcing End to end Security for Remote Conferencing - Triste L.eng.vtt
18.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Cornucopia Temporal Safety for CHERI Heaps.eng.vtt
18.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Path Oblivious Heap Optimal and Practical Oblivious Priority Queue.eng.vtt
18.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Automatically Detecting Bystanders in Photos to Reduce Privacy Risks.eng.srt
18.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/This PIN Can Be Easily Guessed Analyzing the Security of Smartphone Unlock PINs.eng.lrc
18.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Comparative Usability Study of FIDO2 Passwordless Authentication.eng.srt
18.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Combating Dependence Explosion in Forensic Analysis Using Alternative Tag Propagation Semantics.eng.lrc
18.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Ask the Experts What Should Be on an IoT Privacy and Security Label.eng.vtt
18.3 kB
IEEE Security & Privacy 2024/2024 62 Enforcing End to end Security for Remote Conferencing - Triste L.eng.lrc
18.2 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/OmniLedger - A Secure, Scale-Out, Decentralized Ledger via Sharding.eng.text
18.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Semantic Understanding of Smart Contracts Executable Operational Semantics of Solidity.eng.vtt
18.2 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Limits of I O Based Ransomware Detection An Imitation Based Attack.eng.srt
18.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/RAMBleed Reading Bits in Memory without Accessing Them.eng.tsv
18.2 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Understanding the (In)Security of Cross-side Face Verification Systems in Mobile Apps.eng.srt
18.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Are Anonymity-Seekers Just like Everybody Else An Analysis of Contributions to Wikipedia from Tor.eng.tsv
18.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/HydRand Efficient Continuous Distributed Randomness.eng.tsv
18.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Tale of Sea and Sky On the Security of Maritime VSAT Communications.eng.text
18.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Message Time of Arrival Codes A Fundamental Primitive for Secure Distance Measurement.eng.srt
18.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Transparent Polynomial Delegation and Its Applications to Zero Knowledge Proof.eng.srt
18.1 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/T-Fuzz Fuzzing by Program Transformation - Hui Peng.eng.vtt
18.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Influencing Photo Sharing Decisions on Social Media A Case of Paradoxical Findings.eng.srt
18.1 kB
IEEE Security & Privacy 2024/Cheng Gongye Side Channel Assisted Reverse Engineering of Encrypted DNN Hardware Accelerator IP.eng.srt
18.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Throwing Darts in the Dark Detecting Bots with Limited Data using Neural Data Augmentation.eng.srt
18.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/ZEXE Enabling Decentralized Private Computation.eng.tsv
18.1 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Implementing and Proving the TLS 1.3 Record Layer.eng.text
18.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SoK Cyber Insurance - Technical Challenges and a System Security Roadmap.eng.vtt
18.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Binsec Rel Efficient Relational Symbolic Execution for Constant-Time at Binary-Level.eng.srt
18.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers.eng.srt
18.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/HopSkipJumpAttack A Query-Efficient Decision-Based Attack.eng.vtt
18.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SoK A Minimalist Approach to Formalizing Analog Sensor Security.eng.tsv
18.0 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/SoK - Deep Packer Inspection - A Longitudinal Study of the Complexity of Run-Time Packers.eng.text
18.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Combating Dependence Explosion in Forensic Analysis Using Alternative Tag Propagation Semantics.eng.vtt
18.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/RetroWrite Statically Instrumenting COTS Binaries for Fuzzing and Sanitization.eng.vtt
17.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/VerX Safety Verification of Smart Contracts.eng.vtt
17.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Towards Effective Differential Privacy Comms for Users' Data Sharing Decision and Comprehension.eng.vtt
17.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/RetroWrite Statically Instrumenting COTS Binaries for Fuzzing and Sanitization.eng.txt
17.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Intriguing Properties of Adversarial ML Attacks in the Problem Space.eng.tsv
17.9 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/A2L Anonymous Atomic Locks for Scalability in Payment Channel Hubs.eng.srt
17.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/The State of the Uniform Attacks on Encrypted Databases beyond the Uniform Query Distribution.eng.tsv
17.9 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/MagBackdoor Beware of Your Loudspeaker as A Backdoor For Magnetic Injection Attacks.eng.srt
17.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Dragonblood Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd.eng.txt
17.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/High Precision Open-World Website Fingerprinting.eng.text
17.9 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Security of the J-PAKE Password-Authenticated Key Exchange Protocol.eng.srt
17.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers.eng.txt
17.9 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Multi-Server Verifiable Computation of Low-Degree Polynomials.eng.srt
17.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Neutain't Efficient Dynamic Tain't Analysis with Neural Networks.eng.srt
17.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/ICLab A Global, Longitudinal Internet Censorship Measurement Platform.eng.srt
17.8 kB
IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Verena - End-to-End Integrity Protection for Web Applications.eng.text
17.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/RetroWrite Statically Instrumenting COTS Binaries for Fuzzing and Sanitization.eng.lrc
17.8 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/On The Empirical Effectiveness of Unrealistic Adversarial Hardening Against Realistic Attacks.eng.srt
17.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SPECTECTOR Principled Detection of Speculative Information Flows.eng.text
17.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SPECCFI Mitigating Spectre Attacks Using CFI Informed Speculation.eng.srt
17.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Dragonblood Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd.eng.lrc
17.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Ex-vivo Dynamic Analysis Framework for Android Device Drivers.eng.vtt
17.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers.eng.lrc
17.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/xMP Selective Memory Protection for Kernel and User Space.eng.tsv
17.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Private Resource Allocators and Their Applications.eng.text
17.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Full-band De-anonymization of Bluetooth Classic Devices.eng.tsv
17.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Humpty Dumpty Controlling Word Meanings via Corpus Poisoning.eng.vtt
17.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/KARONTE Detecting Insecure Multi-binary Interactions in Embedded Firmware.eng.srt
17.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/TRRespass Exploiting the Many Sides of Target Row Refresh.eng.tsv
17.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Ex-vivo Dynamic Analysis Framework for Android Device Drivers.eng.tsv
17.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Sync HotStuff Simple and Practical Synchronous State Machine Replication.eng.vtt
17.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Automatically Detecting Bystanders in Photos to Reduce Privacy Risks.eng.txt
17.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/JIT Leaks Inducing Timing Side Channels through Just-In-Time Compilation.eng.vtt
17.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Ask the Experts What Should Be on an IoT Privacy and Security Label.eng.tsv
17.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/IJON Exploring Deep State Spaces via Fuzzing.eng.srt
17.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/The Many Kinds of Creepware Used for Interpersonal Attacks.eng.text
17.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SEIMI Efficient and Secure SMAP-Enabled Intra-process Memory Isolation.eng.srt
17.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/ICAS An Extensible Framework for Estimating the Susceptibility of IC Layouts to Additive Trojans.eng.tsv
17.5 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Security of the J-PAKE Password-Authenticated Key Exchange Protocol.eng.tsv
17.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SoK Cyber Insurance - Technical Challenges and a System Security Roadmap.eng.tsv
17.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/IJON Exploring Deep State Spaces via Fuzzing.eng.txt
17.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Automatically Detecting Bystanders in Photos to Reduce Privacy Risks.eng.lrc
17.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SPECCFI Mitigating Spectre Attacks Using CFI Informed Speculation.eng.txt
17.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Leveraging EM Side-Channel Information to Detect Rowhammer Attacks.eng.txt
17.4 kB
IEEE Security & Privacy 2024/2024 614 Few shot Unlearning - Youngsik Yoon.eng.srt
17.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/KARONTE Detecting Insecure Multi-binary Interactions in Embedded Firmware.eng.txt
17.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Transparent Polynomial Delegation and Its Applications to Zero Knowledge Proof.eng.tsv
17.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/AdGraph A Graph-Based Approach to Ad and Tracker Blocking.eng.text
17.4 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/ConDySTA Context-Aware Dynamic Supplement to Static Tain't Analysis.eng.srt
17.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Cornucopia Temporal Safety for CHERI Heaps.eng.tsv
17.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Semantic Understanding of Smart Contracts Executable Operational Semantics of Solidity.eng.tsv
17.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Leveraging EM Side-Channel Information to Detect Rowhammer Attacks.eng.vtt
17.3 kB
IEEE Security & Privacy 2024/PIRANA - Faster Multi query PIR via Constant weight Codes - Jingyu Li.eng.srt
17.3 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Investigating Package Related Security Threats in Software Registries.eng.srt
17.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/IJON Exploring Deep State Spaces via Fuzzing.eng.lrc
17.3 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/A2L Anonymous Atomic Locks for Scalability in Payment Channel Hubs.eng.txt
17.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Transys Leveraging Common Security Properties across Hardware Designs.eng.txt
17.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Automatic Uncovering of Hidden Behaviors from Input Validation in Mobile Apps.eng.srt
17.3 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/How Did That Get In My Phone Unwanted App Distribution on Android Devices.eng.srt
17.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SPECCFI Mitigating Spectre Attacks Using CFI Informed Speculation.eng.lrc
17.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Dragonblood Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd.eng.vtt
17.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/VeriSmart A Highly Precise Safety Verifier for Ethereum Smart Contracts.eng.srt
17.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Leveraging EM Side-Channel Information to Detect Rowhammer Attacks.eng.lrc
17.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SEVurity No Security Without Integrity - Breaking Integrity.eng.text
17.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Towards a Natural Perspective of Smart Homes for Practical Security and Safety Analyses.eng.text
17.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/TARDIS Rolling Back the Clock on CMS-Targeting Cyber Attacks.eng.srt
17.3 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Real-World Snapshots vs. Theory Questioning the t-Probing Security Model.eng.srt
17.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Comparative Usability Study of FIDO2 Passwordless Authentication.eng.vtt
17.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/PMP Cost-Effective Forced Execution with Probabilistic Memory Pre-planning.eng.vtt
17.3 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/On the Evolution of (Hateful) Memes by Means of Multimodal Contrastive Learning.eng.srt
17.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Pseudorandom Black Swans Cache Attacks on CTR DRBG.eng.tsv
17.3 kB
IEEE Security & Privacy 2024/MPCitH without reputation IEEE S0P online - qw gao.eng.srt
17.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Comparative Usability Study of FIDO2 Passwordless Authentication.eng.txt
17.2 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/ShorTor Improving Tor Network Latency via Multi-hop Overlay Routing.eng.tsv
17.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/KARONTE Detecting Insecure Multi-binary Interactions in Embedded Firmware.eng.lrc
17.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Humpty Dumpty Controlling Word Meanings via Corpus Poisoning.eng.tsv
17.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Gesture Authentication for Smartphones Evaluation of Gesture Password Selection Policies.eng.srt
17.2 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/A2L Anonymous Atomic Locks for Scalability in Payment Channel Hubs.eng.lrc
17.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Message Time of Arrival Codes A Fundamental Primitive for Secure Distance Measurement.eng.vtt
17.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Influencing Photo Sharing Decisions on Social Media A Case of Paradoxical Findings.eng.vtt
17.2 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/WIGHT Wired Ghost Touch Attack on Capacitive Touchscreens.eng.tsv
17.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Browsing Unicity On the Limits of Anonymizing Web Tracking Data.eng.txt
17.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Transys Leveraging Common Security Properties across Hardware Designs.eng.lrc
17.2 kB
IEEE Security & Privacy 2024/Transferable Multimodal Attack on Vision Language Pre training Models - haodi wang.eng.srt
17.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Comparative Usability Study of FIDO2 Passwordless Authentication.eng.lrc
17.1 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Adversary Instantiation Lower bounds for differentially private machine learning.eng.srt
17.1 kB
IEEE Security & Privacy 2024/APP Miner Detecting API Misuses via Automatically Mining API Path Patterns - Jiasheng Jiang.eng.srt
17.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network.eng.srt
17.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Automatically Detecting Bystanders in Photos to Reduce Privacy Risks.eng.vtt
17.1 kB
IEEE Security & Privacy 2024/Rethinking IC Layout Vulnerability Simulation Based Hardware Trojan Threat Assessment with High.eng.srt
17.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Transys Leveraging Common Security Properties across Hardware Designs.eng.srt
17.1 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Discop Provably Secure Steganography in Practice Based on Distribution Copies.eng.srt
17.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Browsing Unicity On the Limits of Anonymizing Web Tracking Data.eng.lrc
17.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Automated Reverse Engineering and Privacy Analysis of Modern Cars.eng.text
17.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Formal Modelling and Proof in the CHERI Design and Implementation Process.eng.tsv
17.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Towards Effective Differential Privacy Comms for Users' Data Sharing Decision and Comprehension.eng.tsv
17.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Pangolin Incremental Hybrid Fuzzing with Polyhedral Path Abstraction.eng.srt
17.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Browsing Unicity On the Limits of Anonymizing Web Tracking Data.eng.srt
16.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/OHIE Blockchain Scaling Made Simple.eng.tsv
16.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Neutain't Efficient Dynamic Tain't Analysis with Neural Networks.eng.txt
16.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Binsec Rel Efficient Relational Symbolic Execution for Constant-Time at Binary-Level.eng.vtt
16.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Influencing Photo Sharing Decisions on Social Media A Case of Paradoxical Findings.eng.tsv
16.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Message Time of Arrival Codes A Fundamental Primitive for Secure Distance Measurement.eng.tsv
16.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Are We Susceptible to Rowhammer An End-to-End Methodology for Cloud Providers.eng.tsv
16.8 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Linking Bluetooth LE & Classic and Implications for Privacy-Preserving Bluetooth-Based Protocols.eng.srt
16.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers.eng.vtt
16.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Detection of Electromagnetic Interference Attacks on Sensor Systems.eng.srt
16.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/CrypTFlow - Secure TensorFlow Inference.eng.text
16.8 kB
IEEE Security & Privacy 2024/Specular Towards Secure, Trust minimized Optimistic Blockchain Execution - Zhe Ye.eng.srt
16.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Pangolin Incremental Hybrid Fuzzing with Polyhedral Path Abstraction.eng.txt
16.8 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/ADI Adversarial Dominating Inputs in Vertical Federated Learning Systems.eng.srt
16.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Fuzzing JavaScript Engines with Aspect-Preserving Mutation.eng.srt
16.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Flaw Label Exploiting IPv6 Flow Label.eng.srt
16.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Neutain't Efficient Dynamic Tain't Analysis with Neural Networks.eng.lrc
16.7 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Beyond Credential Stuffing Password Similarity Models using Neural Networks.eng.srt
16.7 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/A2L Anonymous Atomic Locks for Scalability in Payment Channel Hubs.eng.vtt
16.7 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Foundations of Dynamic BFT.eng.text
16.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/JIT Leaks Inducing Timing Side Channels through Just-In-Time Compilation.eng.tsv
16.6 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Beyond Credential Stuffing Password Similarity Models using Neural Networks.eng.tsv
16.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Pangolin Incremental Hybrid Fuzzing with Polyhedral Path Abstraction.eng.lrc
16.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Transparent Polynomial Delegation and Its Applications to Zero Knowledge Proof.eng.vtt
16.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SPECCFI Mitigating Spectre Attacks Using CFI Informed Speculation.eng.vtt
16.6 kB
IEEE Security & Privacy 2024/NFCEraser A Security Threat of NFC Message Modification Caused by Quartz Crystal Oscillator - Jo.eng.srt
16.6 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Crowd-GPS-Sec - Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks.eng.txt
16.6 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Device Fingerprinting with Peripheral Timestamps.eng.text
16.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Sync HotStuff Simple and Practical Synchronous State Machine Replication.eng.tsv
16.5 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/ADI Adversarial Dominating Inputs in Vertical Federated Learning Systems.eng.tsv
16.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Automatic Uncovering of Hidden Behaviors from Input Validation in Mobile Apps.eng.tsv
16.5 kB
IEEE Security & Privacy 2024/2024 62 Enforcing End to end Security for Remote Conferencing - Triste L.eng.tsv
16.5 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Security of the J-PAKE Password-Authenticated Key Exchange Protocol.eng.vtt
16.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/IJON Exploring Deep State Spaces via Fuzzing.eng.vtt
16.5 kB
IEEE Security & Privacy 2024/MEA Defender - Lv Peizhuo.eng.srt
16.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/This PIN Can Be Easily Guessed Analyzing the Security of Smartphone Unlock PINs.eng.tsv
16.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Binsec Rel Efficient Relational Symbolic Execution for Constant-Time at Binary-Level.eng.tsv
16.5 kB
IEEE Security & Privacy 2024/Practical Obfuscation of BLE Physical Layer Fingerprints on Mobile Devices - Hadi Givehchian.eng.txt
16.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/KARONTE Detecting Insecure Multi-binary Interactions in Embedded Firmware.eng.vtt
16.5 kB
IEEE Security & Privacy 2024/NodeAwareSmoothing - Yuni Lai Lena.eng.srt
16.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Neutain't Efficient Dynamic Tain't Analysis with Neural Networks.eng.vtt
16.4 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Adversary Instantiation Lower bounds for differentially private machine learning.eng.txt
16.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/HopSkipJumpAttack A Query-Efficient Decision-Based Attack.eng.tsv
16.4 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Multi-Server Verifiable Computation of Low-Degree Polynomials.eng.vtt
16.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/ICLab A Global, Longitudinal Internet Censorship Measurement Platform.eng.vtt
16.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Unexpected Data Dependency Creation and Chaining A New Attack to SDN.eng.srt
16.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/RetroWrite Statically Instrumenting COTS Binaries for Fuzzing and Sanitization.eng.tsv
16.4 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Crowd-GPS-Sec - Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks.eng.lrc
16.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Flaw Label Exploiting IPv6 Flow Label.eng.tsv
16.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Throwing Darts in the Dark Detecting Bots with Limited Data using Neural Data Augmentation.eng.vtt
16.3 kB
IEEE Security & Privacy 2024/Practical Obfuscation of BLE Physical Layer Fingerprints on Mobile Devices - Hadi Givehchian.eng.lrc
16.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Security Analysis of the Facebook Ad Library.eng.text
16.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Combating Dependence Explosion in Forensic Analysis Using Alternative Tag Propagation Semantics.eng.tsv
16.3 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Adversary Instantiation Lower bounds for differentially private machine learning.eng.lrc
16.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SoK Differential Privacy as a Causal Property.eng.text
16.3 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Data Privacy in Trigger-Action IoT Systems.eng.srt
16.3 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/SoK All You Ever Wanted to Know About Binary Disassembly But Were Afraid to Ask.eng.srt
16.3 kB
IEEE Security & Privacy 2024/Pulling Off The Mask Forensic Analysis of the Deceptive Creator Wallets Behind Smart Contract Fr.eng.srt
16.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/ICLab A Global, Longitudinal Internet Censorship Measurement Platform.eng.txt
16.3 kB
IEEE Security & Privacy 2024/Patchy Performance - Uncovering the Vulnerability Management Practices of IoT Centric Vendors.eng.srt
16.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Hijacking Transient Execution through Microarchitectural Load Value Injection.eng.text
16.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/How Not to Prove Your Election Outcome.eng.text
16.2 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Continuous Intrusion Characterizing the Security of Continuous Integration Services.eng.srt
16.2 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Discop Provably Secure Steganography in Practice Based on Distribution Copies.eng.txt
16.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Understanding and Mitigating Security Risks of General Messaging Protocols on IoT Clouds.eng.srt
16.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/ICLab A Global, Longitudinal Internet Censorship Measurement Platform.eng.lrc
16.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network.eng.txt
16.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SEIMI Efficient and Secure SMAP-Enabled Intra-process Memory Isolation.eng.vtt
16.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/VeriSmart A Highly Precise Safety Verifier for Ethereum Smart Contracts.eng.txt
16.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/PMP Cost-Effective Forced Execution with Probabilistic Memory Pre-planning.eng.txt
16.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SEIMI Efficient and Secure SMAP-Enabled Intra-process Memory Isolation.eng.txt
16.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SPIDER Enabling Fast Patch Propagation in Related Software Repositories.eng.text
16.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network.eng.lrc
16.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Kobold Evaluating Decentralized Access Control for Remote NSXPC Methods on iOS.eng.text
16.0 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Discop Provably Secure Steganography in Practice Based on Distribution Copies.eng.lrc
16.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Gesture Authentication for Smartphones Evaluation of Gesture Password Selection Policies.eng.vtt
16.0 kB
IEEE Security & Privacy 2024/2024 456 State aware Fuzzing on Trusted OS Designed for IoT Devices - Qinying.eng.srt
16.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/PMP Cost-Effective Forced Execution with Probabilistic Memory Pre-planning.eng.lrc
16.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/VeriSmart A Highly Precise Safety Verifier for Ethereum Smart Contracts.eng.lrc
16.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Dragonblood Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd.eng.tsv
16.0 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Who is Real Bob Adversarial Attacks on Speaker Recognition Systems.eng.srt
16.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Meddling Middlemen Empirical Analysis of the Risks of Data-Saving Mobile Browsers.eng.text
15.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/VeriSmart A Highly Precise Safety Verifier for Ethereum Smart Contracts.eng.vtt
15.9 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Adversary Instantiation Lower bounds for differentially private machine learning.eng.vtt
15.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Gesture Authentication for Smartphones Evaluation of Gesture Password Selection Policies.eng.txt
15.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SEIMI Efficient and Secure SMAP-Enabled Intra-process Memory Isolation.eng.lrc
15.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Automatic Uncovering of Hidden Behaviors from Input Validation in Mobile Apps.eng.vtt
15.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/The Value of Collaboration in Convex Machine Learning with Differential Privacy.eng.srt
15.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/TARDIS Rolling Back the Clock on CMS-Targeting Cyber Attacks.eng.vtt
15.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Browsing Unicity On the Limits of Anonymizing Web Tracking Data.eng.vtt
15.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Unexpected Data Dependency Creation and Chaining A New Attack to SDN.eng.txt
15.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Tactical Provenance Analysis our Endpoint Detection and Response Systems.eng.srt
15.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/RAMBleed Reading Bits in Memory without Accessing Them.eng.text
15.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Comparative Usability Study of FIDO2 Passwordless Authentication.eng.tsv
15.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/BIAS Bluetooth Impersonation AttackS.eng.srt
15.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Pangolin Incremental Hybrid Fuzzing with Polyhedral Path Abstraction.eng.vtt
15.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/EverCrypt A Fast, Verified, Cross-Platform Cryptographic Provider.eng.text
15.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Transys Leveraging Common Security Properties across Hardware Designs.eng.vtt
15.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network.eng.vtt
15.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SoK A Minimalist Approach to Formalizing Analog Sensor Security.eng.text
15.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Gesture Authentication for Smartphones Evaluation of Gesture Password Selection Policies.eng.lrc
15.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Are Anonymity-Seekers Just like Everybody Else An Analysis of Contributions to Wikipedia from Tor.eng.text
15.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Tactical Provenance Analysis our Endpoint Detection and Response Systems.eng.txt
15.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/HydRand Efficient Continuous Distributed Randomness.eng.text
15.8 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Data Recovery on Encrypted Databases with k-Nearest Neighbor Query Leakage.eng.text
15.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/ICAS An Extensible Framework for Estimating the Susceptibility of IC Layouts to Additive Trojans.eng.text
15.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers.eng.tsv
15.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Fuzzing JavaScript Engines with Aspect-Preserving Mutation.eng.tsv
15.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Unexpected Data Dependency Creation and Chaining A New Attack to SDN.eng.lrc
15.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/TARDIS Rolling Back the Clock on CMS-Targeting Cyber Attacks.eng.txt
15.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Automatically Detecting Bystanders in Photos to Reduce Privacy Risks.eng.tsv
15.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/FlyClient Super-Light Clients for Cryptocurrencies.eng.text
15.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Detection of Electromagnetic Interference Attacks on Sensor Systems.eng.txt
15.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Breaking and (Partially) Fixing Provably Secure Onion Routing.eng.text
15.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Tactical Provenance Analysis our Endpoint Detection and Response Systems.eng.lrc
15.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Programming Framework for Differential Privacy with Accuracy Concentration Bounds.eng.text
15.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/TARDIS Rolling Back the Clock on CMS-Targeting Cyber Attacks.eng.lrc
15.6 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Multi-Server Verifiable Computation of Low-Degree Polynomials.eng.txt
15.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Fuzzing JavaScript Engines with Aspect-Preserving Mutation.eng.vtt
15.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/An Analysis of Pre-installed Android Software.eng.srt
15.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Intriguing Properties of Adversarial ML Attacks in the Problem Space.eng.text
15.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/IJON Exploring Deep State Spaces via Fuzzing.eng.tsv
15.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Flaw Label Exploiting IPv6 Flow Label.eng.vtt
15.6 kB
IEEE Security & Privacy 2024/Chronos presentation - sard Chen.eng.srt
15.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Detection of Electromagnetic Interference Attacks on Sensor Systems.eng.lrc
15.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Leveraging EM Side-Channel Information to Detect Rowhammer Attacks.eng.tsv
15.5 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Beyond Credential Stuffing Password Similarity Models using Neural Networks.eng.vtt
15.5 kB
IEEE Security & Privacy 2024/2024 winter 448 Efficient Actively Secure DPF and RAM based 2PC with One Bit Leakage - Wenhao Zhang.eng.srt
15.5 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/ADI Adversarial Dominating Inputs in Vertical Federated Learning Systems.eng.vtt
15.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Detection of Electromagnetic Interference Attacks on Sensor Systems.eng.vtt
15.5 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Android Custom Permissions Demystified From Privilege Escalation to Design Shortcomings.eng.srt
15.5 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Multi-Server Verifiable Computation of Low-Degree Polynomials.eng.lrc
15.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SPECCFI Mitigating Spectre Attacks Using CFI Informed Speculation.eng.tsv
15.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/The State of the Uniform Attacks on Encrypted Databases beyond the Uniform Query Distribution.eng.text
15.5 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/A2L Anonymous Atomic Locks for Scalability in Payment Channel Hubs.eng.tsv
15.5 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Discop Provably Secure Steganography in Practice Based on Distribution Copies.eng.vtt
15.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/TRRespass Exploiting the Many Sides of Target Row Refresh.eng.text
15.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Enabling Rack-scale Confidential Computing Using Heterogeneous Trusted Execution Environment.eng.srt
15.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Full-band De-anonymization of Bluetooth Classic Devices.eng.text
15.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/The Last Mile High-Assurance and High-Speed Cryptographic Implementations.eng.srt
15.4 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Low-Bandwidth Threshold ECDSA via Pseudorandom Correlation Generators.eng.text
15.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/xMP Selective Memory Protection for Kernel and User Space.eng.text
15.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/KARONTE Detecting Insecure Multi-binary Interactions in Embedded Firmware.eng.tsv
15.4 kB
IEEE Security & Privacy 2024/On SMS Phishing Tactics and Infrastructure - Alex Nahapetyan.eng.srt
15.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/WaveSpy Remote and Through-wall Screen Attack via mmWave Sensing.eng.srt
15.3 kB
IEEE Security & Privacy 2024/Practical Obfuscation of BLE Physical Layer Fingerprints on Mobile Devices - Hadi Givehchian.eng.srt
15.3 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Learning Differentially Private Mechanisms.eng.txt
15.3 kB
IEEE Security & Privacy 2024/Test time Poisoning Attacks Against Test time Adaptation Models - Tianshuo Cong.eng.srt
15.3 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Crowd-GPS-Sec - Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks.eng.srt
15.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Unexpected Data Dependency Creation and Chaining A New Attack to SDN.eng.vtt
15.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SoK Cyber Insurance - Technical Challenges and a System Security Roadmap.eng.text
15.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/The Value of Collaboration in Convex Machine Learning with Differential Privacy.eng.txt
15.3 kB
IEEE Security & Privacy 2024/Preserving Node level Privacy in Graph Neural Networks - ZH X.eng.srt
15.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Ask the Experts What Should Be on an IoT Privacy and Security Label.eng.text
15.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/OAT Attesting Operation Integrity of Embedded Devices.eng.srt
15.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/An Analysis of Pre-installed Android Software.eng.txt
15.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Browsing Unicity On the Limits of Anonymizing Web Tracking Data.eng.tsv
15.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/BIAS Bluetooth Impersonation AttackS.eng.txt
15.2 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Learning Differentially Private Mechanisms.eng.lrc
15.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/The Value of Collaboration in Convex Machine Learning with Differential Privacy.eng.lrc
15.1 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/AccEar Accelerometer Acoustic Eavesdropping with Unconstrained Vocabulary.eng.srt
15.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Throwing Darts in the Dark Detecting Bots with Limited Data using Neural Data Augmentation.eng.txt
15.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/The Last Mile High-Assurance and High-Speed Cryptographic Implementations.eng.txt
15.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Cornucopia Temporal Safety for CHERI Heaps.eng.text
15.1 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Improving Password Guessing via Representation Learning.eng.srt
15.1 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Improving Password Guessing via Representation Learning.eng.txt
15.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Transys Leveraging Common Security Properties across Hardware Designs.eng.tsv
15.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/An Analysis of Pre-installed Android Software.eng.lrc
15.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/BIAS Bluetooth Impersonation AttackS.eng.lrc
15.1 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/GraphSC - Parallel Secure Computation Made Easy.eng.text
15.0 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Learning Differentially Private Mechanisms.eng.srt
15.0 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/One Engine to Fuzz 'em All Generic Language Processor Testing with Semantic Validation.eng.srt
15.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Throwing Darts in the Dark Detecting Bots with Limited Data using Neural Data Augmentation.eng.lrc
15.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Understanding and Mitigating Security Risks of General Messaging Protocols on IoT Clouds.eng.vtt
15.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/The Last Mile High-Assurance and High-Speed Cryptographic Implementations.eng.lrc
15.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Pseudorandom Black Swans Cache Attacks on CTR DRBG.eng.text
15.0 kB
IEEE Security & Privacy 2024/sokvideo v1 - Max N.eng.srt
15.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Semantic Understanding of Smart Contracts Executable Operational Semantics of Solidity.eng.text
15.0 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/ShorTor Improving Tor Network Latency via Multi-hop Overlay Routing.eng.text
14.9 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Improving Password Guessing via Representation Learning.eng.lrc
14.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Understanding and Mitigating Security Risks of General Messaging Protocols on IoT Clouds.eng.txt
14.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Pangolin Incremental Hybrid Fuzzing with Polyhedral Path Abstraction.eng.tsv
14.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Neutain't Efficient Dynamic Tain't Analysis with Neural Networks.eng.tsv
14.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Tactical Provenance Analysis our Endpoint Detection and Response Systems.eng.vtt
14.9 kB
IEEE Security & Privacy 2024/2024 176 PolySphinx Extending the Sphinx Mix Format with Better Multicast Support - Daniel Schadt.eng.srt
14.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/ZEXE Enabling Decentralized Private Computation.eng.text
14.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Humpty Dumpty Controlling Word Meanings via Corpus Poisoning.eng.text
14.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/PMP Cost-Effective Forced Execution with Probabilistic Memory Pre-planning.eng.tsv
14.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/RetroWrite Statically Instrumenting COTS Binaries for Fuzzing and Sanitization.eng.text
14.8 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Leaking Arbitrarily Many Secrets Any-out-of-Many Proofs and Applications to RingCT Protocols.eng.srt
14.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Understanding and Mitigating Security Risks of General Messaging Protocols on IoT Clouds.eng.lrc
14.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/The Value of Collaboration in Convex Machine Learning with Differential Privacy.eng.vtt
14.8 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/DIFUZZRTL Differential Fuzz Testing to Find CPU Bugs.eng.srt
14.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Towards Effective Differential Privacy Comms for Users' Data Sharing Decision and Comprehension.eng.text
14.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/BIAS Bluetooth Impersonation AttackS.eng.vtt
14.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/NetCAT Practical Cache Attacks from the Network.eng.text
14.7 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/An I O Separation Model for Formal Verification of Kernel Implementations.eng.srt
14.7 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/DynPTA Combining Static and Dynamic Analysis for Practical Selective Data Protection.eng.srt
14.7 kB
IEEE Security & Privacy 2024/A Security Analysis of Honey Vaults - Fei Duan.eng.srt
14.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Enabling Rack-scale Confidential Computing Using Heterogeneous Trusted Execution Environment.eng.txt
14.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Influencing Photo Sharing Decisions on Social Media A Case of Paradoxical Findings.eng.text
14.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Are We Susceptible to Rowhammer An End-to-End Methodology for Cloud Providers.eng.text
14.6 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Adversary Instantiation Lower bounds for differentially private machine learning.eng.tsv
14.6 kB
IEEE Security & Privacy 2024/Practical Obfuscation of BLE Physical Layer Fingerprints on Mobile Devices - Hadi Givehchian.eng.tsv
14.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/WaveSpy Remote and Through-wall Screen Attack via mmWave Sensing.eng.txt
14.6 kB
IEEE Security & Privacy 2024/Casual Users and Rational Choices within Differential Privacy - Narges Ashena.eng.srt
14.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Message Time of Arrival Codes A Fundamental Primitive for Secure Distance Measurement.eng.text
14.6 kB
IEEE Security & Privacy 2024/Practical Obfuscation of BLE Physical Layer Fingerprints on Mobile Devices - Hadi Givehchian.eng.vtt
14.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/OHIE Blockchain Scaling Made Simple.eng.text
14.6 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/DynPTA Combining Static and Dynamic Analysis for Practical Selective Data Protection.eng.txt
14.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Enabling Rack-scale Confidential Computing Using Heterogeneous Trusted Execution Environment.eng.lrc
14.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/ICLab A Global, Longitudinal Internet Censorship Measurement Platform.eng.tsv
14.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/An Analysis of Pre-installed Android Software.eng.vtt
14.6 kB
IEEE Security & Privacy 2024/Sabre Cutting through Adversarial Noise with Adaptive Spectral Filtering and Input Reconstructio.eng.srt
14.5 kB
IEEE Security & Privacy 2024/2024 62 Enforcing End to end Security for Remote Conferencing - Triste L.eng.text
14.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/WaveSpy Remote and Through-wall Screen Attack via mmWave Sensing.eng.lrc
14.5 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/WIGHT Wired Ghost Touch Attack on Capacitive Touchscreens.eng.text
14.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Path Oblivious Heap Optimal and Practical Oblivious Priority Queue.eng.text
14.5 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/DynPTA Combining Static and Dynamic Analysis for Practical Selective Data Protection.eng.lrc
14.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/This PIN Can Be Easily Guessed Analyzing the Security of Smartphone Unlock PINs.eng.text
14.4 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Opening Remarks of the 2015 IEEE Symposium on Security & Privacy.eng.srt
14.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Sync HotStuff Simple and Practical Synchronous State Machine Replication.eng.text
14.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Comparative Usability Study of FIDO2 Passwordless Authentication.eng.text
14.4 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Goshawk Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis.eng.txt
14.4 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Goshawk Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis.eng.srt
14.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Measuring Legal Compliance of Banners from IAB Europe's Transparancy and Consent Framework.eng.txt
14.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/The Last Mile High-Assurance and High-Speed Cryptographic Implementations.eng.vtt
14.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Gesture Authentication for Smartphones Evaluation of Gesture Password Selection Policies.eng.tsv
14.3 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Spectral-DP Differentially Private Deep Learning through Spectral Perturbation and Filtering.eng.srt
14.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network.eng.tsv
14.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Enabling Rack-scale Confidential Computing Using Heterogeneous Trusted Execution Environment.eng.vtt
14.3 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/T-Fuzz Fuzzing by Program Transformation - Hui Peng.eng.text
14.3 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Crowd-GPS-Sec - Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks.eng.vtt
14.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/JIT Leaks Inducing Timing Side Channels through Just-In-Time Compilation.eng.text
14.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SAVIOR Towards Bug-Driven Hybrid Testing.eng.srt
14.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/VeriSmart A Highly Precise Safety Verifier for Ethereum Smart Contracts.eng.tsv
14.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SEIMI Efficient and Secure SMAP-Enabled Intra-process Memory Isolation.eng.tsv
14.3 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Goshawk Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis.eng.lrc
14.3 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Android Custom Permissions Demystified From Privilege Escalation to Design Shortcomings.eng.txt
14.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Ex-vivo Dynamic Analysis Framework for Android Device Drivers.eng.text
14.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Measuring Legal Compliance of Banners from IAB Europe's Transparancy and Consent Framework.eng.lrc
14.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/VerX Safety Verification of Smart Contracts.eng.text
14.2 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Android Custom Permissions Demystified From Privilege Escalation to Design Shortcomings.eng.vtt
14.2 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Multi-Server Verifiable Computation of Low-Degree Polynomials.eng.tsv
14.2 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Improving Password Guessing via Representation Learning.eng.vtt
14.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/WaveSpy Remote and Through-wall Screen Attack via mmWave Sensing.eng.vtt
14.2 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Crowd-GPS-Sec - Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks.eng.tsv
14.2 kB
IEEE Security & Privacy 2024/CoreLocker - Andrew Wang.eng.srt
14.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Unexpected Data Dependency Creation and Chaining A New Attack to SDN.eng.tsv
14.1 kB
IEEE Security & Privacy 2024/2024 176 PolySphinx Extending the Sphinx Mix Format with Better Multicast Support - Daniel Schadt.eng.txt
14.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SAVIOR Towards Bug-Driven Hybrid Testing.eng.txt
14.1 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Android Custom Permissions Demystified From Privilege Escalation to Design Shortcomings.eng.lrc
14.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/HopSkipJumpAttack A Query-Efficient Decision-Based Attack.eng.text
14.1 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Learning Differentially Private Mechanisms.eng.vtt
14.1 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/AccEar Accelerometer Acoustic Eavesdropping with Unconstrained Vocabulary.eng.vtt
14.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/MarkUs Drop-in Use-After-Free Prevention for Low-Level Languages.eng.txt
14.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/TARDIS Rolling Back the Clock on CMS-Targeting Cyber Attacks.eng.tsv
14.0 kB
IEEE Security & Privacy 2024/2024 531 Please Tell Me More - Liu Han.eng.srt
14.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Combating Dependence Explosion in Forensic Analysis Using Alternative Tag Propagation Semantics.eng.text
14.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Tactical Provenance Analysis our Endpoint Detection and Response Systems.eng.tsv
14.0 kB
IEEE Security & Privacy 2024/2024 176 PolySphinx Extending the Sphinx Mix Format with Better Multicast Support - Daniel Schadt.eng.lrc
14.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SAVIOR Towards Bug-Driven Hybrid Testing.eng.lrc
14.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Establishing Economic Incentives for Security Patching of IoT Consumer Products.eng.srt
14.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/MarkUs Drop-in Use-After-Free Prevention for Low-Level Languages.eng.lrc
14.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/MarkUs Drop-in Use-After-Free Prevention for Low-Level Languages.eng.srt
13.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Detection of Electromagnetic Interference Attacks on Sensor Systems.eng.tsv
13.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Dragonblood Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd.eng.text
13.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/OAT Attesting Operation Integrity of Embedded Devices.eng.vtt
13.9 kB
IEEE Security & Privacy 2024/2024 176 PolySphinx Extending the Sphinx Mix Format with Better Multicast Support - Daniel Schadt.eng.vtt
13.9 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/AccEar Accelerometer Acoustic Eavesdropping with Unconstrained Vocabulary.eng.txt
13.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Formal Modelling and Proof in the CHERI Design and Implementation Process.eng.text
13.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Automatically Detecting Bystanders in Photos to Reduce Privacy Risks.eng.text
13.8 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Discop Provably Secure Steganography in Practice Based on Distribution Copies.eng.tsv
13.8 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/DynPTA Combining Static and Dynamic Analysis for Practical Selective Data Protection.eng.vtt
13.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Binsec Rel Efficient Relational Symbolic Execution for Constant-Time at Binary-Level.eng.text
13.8 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/AccEar Accelerometer Acoustic Eavesdropping with Unconstrained Vocabulary.eng.lrc
13.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Measuring Legal Compliance of Banners from IAB Europe's Transparancy and Consent Framework.eng.srt
13.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/TextExerciser Feedback-Driven Text Input Exercising for Android Applications.eng.srt
13.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Towards Scalable Threshold Cryptosystems.eng.srt
13.7 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Response-Hiding Encrypted Ranges Revisiting Security via Parametrized Leakage-Abuse Attacks.eng.srt
13.7 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Spectral-DP Differentially Private Deep Learning through Spectral Perturbation and Filtering.eng.txt
13.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/IJON Exploring Deep State Spaces via Fuzzing.eng.text
13.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers.eng.text
13.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/The Value of Collaboration in Convex Machine Learning with Differential Privacy.eng.tsv
13.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Leveraging EM Side-Channel Information to Detect Rowhammer Attacks.eng.text
13.6 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Spectral-DP Differentially Private Deep Learning through Spectral Perturbation and Filtering.eng.lrc
13.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/BIAS Bluetooth Impersonation AttackS.eng.tsv
13.5 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Learning Differentially Private Mechanisms.eng.tsv
13.5 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/A2L Anonymous Atomic Locks for Scalability in Payment Channel Hubs.eng.text
13.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/PMP Cost-Effective Forced Execution with Probabilistic Memory Pre-planning.eng.text
13.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/An Analysis of Pre-installed Android Software.eng.tsv
13.5 kB
IEEE Security & Privacy 2024/Certifying Zero Knowledge Circuits with Refinement Types - Junrui Liu.eng.srt
13.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Throwing Darts in the Dark Detecting Bots with Limited Data using Neural Data Augmentation.eng.tsv
13.4 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Skyfire - Data-Driven Seed Generation for Fuzzing.eng.srt
13.4 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Improving Password Guessing via Representation Learning.eng.tsv
13.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SPECCFI Mitigating Spectre Attacks Using CFI Informed Speculation.eng.text
13.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Understanding and Mitigating Security Risks of General Messaging Protocols on IoT Clouds.eng.tsv
13.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/The Last Mile High-Assurance and High-Speed Cryptographic Implementations.eng.tsv
13.4 kB
IEEE Security & Privacy 2024/PromptCARE Prompt Copyright Protection by Watermark Injection and Verification - homeway yao.eng.srt
13.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SAVIOR Towards Bug-Driven Hybrid Testing.eng.vtt
13.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/OAT Attesting Operation Integrity of Embedded Devices.eng.txt
13.4 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Goshawk Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis.eng.vtt
13.3 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/AI-Guardian Defeating Adversarial Attacks using Backdoors.eng.srt
13.3 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Spectral-DP Differentially Private Deep Learning through Spectral Perturbation and Filtering.eng.vtt
13.3 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Skyfire - Data-Driven Seed Generation for Fuzzing.eng.txt
13.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/KARONTE Detecting Insecure Multi-binary Interactions in Embedded Firmware.eng.text
13.3 kB
IEEE Security & Privacy 2024/2024 50 BAFFLE - Mr HE Junda.eng.srt
13.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Towards Scalable Threshold Cryptosystems.eng.txt
13.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/OAT Attesting Operation Integrity of Embedded Devices.eng.lrc
13.2 kB
IEEE Security & Privacy 2024/Springproofs Efficient Inner Product Arguments for Vectors of Arbitrary Length - Ming Su.eng.srt
13.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Towards Scalable Threshold Cryptosystems.eng.lrc
13.1 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Skyfire - Data-Driven Seed Generation for Fuzzing.eng.lrc
13.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Browsing Unicity On the Limits of Anonymizing Web Tracking Data.eng.text
13.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/MarkUs Drop-in Use-After-Free Prevention for Low-Level Languages.eng.vtt
13.1 kB
IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Security of the J-PAKE Password-Authenticated Key Exchange Protocol.eng.text
13.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/TextExerciser Feedback-Driven Text Input Exercising for Android Applications.eng.txt
13.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Establishing Economic Incentives for Security Patching of IoT Consumer Products.eng.txt
13.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Enabling Rack-scale Confidential Computing Using Heterogeneous Trusted Execution Environment.eng.tsv
13.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Plundervolt Software-Based Fault Injection Attacks against Intel SGX.eng.srt
13.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/TextExerciser Feedback-Driven Text Input Exercising for Android Applications.eng.lrc
13.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Establishing Economic Incentives for Security Patching of IoT Consumer Products.eng.vtt
12.9 kB
IEEE Security & Privacy 2024/2024 517 Understanding and Benchmarking the Commonality of Adversarial Examples - cheng yushi.eng.srt
12.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Establishing Economic Incentives for Security Patching of IoT Consumer Products.eng.lrc
12.9 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/DynPTA Combining Static and Dynamic Analysis for Practical Selective Data Protection.eng.tsv
12.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Pangolin Incremental Hybrid Fuzzing with Polyhedral Path Abstraction.eng.text
12.9 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Ed25519 Signature Schemes Theory and Practice.eng.srt
12.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/WaveSpy Remote and Through-wall Screen Attack via mmWave Sensing.eng.tsv
12.9 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Response-Hiding Encrypted Ranges Revisiting Security via Parametrized Leakage-Abuse Attacks.eng.txt
12.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Measuring Legal Compliance of Banners from IAB Europe's Transparancy and Consent Framework.eng.vtt
12.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Transparent Polynomial Delegation and Its Applications to Zero Knowledge Proof.eng.text
12.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/TextExerciser Feedback-Driven Text Input Exercising for Android Applications.eng.vtt
12.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Towards Scalable Threshold Cryptosystems.eng.vtt
12.8 kB
IEEE Security & Privacy 2024/ALIF Low Cost Adversarial Audio Attacks on Black Box Speech Platforms using Linguistic Features.eng.srt
12.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Neutain't Efficient Dynamic Tain't Analysis with Neural Networks.eng.text
12.8 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Response-Hiding Encrypted Ranges Revisiting Security via Parametrized Leakage-Abuse Attacks.eng.lrc
12.8 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Adversary Instantiation Lower bounds for differentially private machine learning.eng.text
12.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/ICLab A Global, Longitudinal Internet Censorship Measurement Platform.eng.text
12.7 kB
IEEE Security & Privacy 2024/Practical Obfuscation of BLE Physical Layer Fingerprints on Mobile Devices - Hadi Givehchian.eng.text
12.7 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Multi-Server Verifiable Computation of Low-Degree Polynomials.eng.text
12.7 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Response-Hiding Encrypted Ranges Revisiting Security via Parametrized Leakage-Abuse Attacks.eng.vtt
12.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Transys Leveraging Common Security Properties across Hardware Designs.eng.text
12.7 kB
IEEE Security & Privacy 2024/2024 176 PolySphinx Extending the Sphinx Mix Format with Better Multicast Support - Daniel Schadt.eng.tsv
12.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Gesture Authentication for Smartphones Evaluation of Gesture Password Selection Policies.eng.text
12.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Fuzzing JavaScript Engines with Aspect-Preserving Mutation.eng.text
12.6 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/AccEar Accelerometer Acoustic Eavesdropping with Unconstrained Vocabulary.eng.tsv
12.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SAVIOR Towards Bug-Driven Hybrid Testing.eng.tsv
12.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/MarkUs Drop-in Use-After-Free Prevention for Low-Level Languages.eng.tsv
12.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Flaw Label Exploiting IPv6 Flow Label.eng.text
12.5 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Android Custom Permissions Demystified From Privilege Escalation to Design Shortcomings.eng.tsv
12.5 kB
IEEE Security & Privacy 2024/ALIF Low Cost Adversarial Audio Attacks on Black Box Speech Platforms using Linguistic Features.eng.txt
12.5 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Beyond Credential Stuffing Password Similarity Models using Neural Networks.eng.text
12.5 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Goshawk Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis.eng.tsv
12.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network.eng.text
12.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Measuring Legal Compliance of Banners from IAB Europe's Transparancy and Consent Framework.eng.tsv
12.4 kB
IEEE Security & Privacy 2024/2024 205 FlowMur A Stealthy and Practical Audio Backdoor Attack with Limited Knowledge - Jiahe Lan.eng.srt
12.4 kB
IEEE Security & Privacy 2024/ALIF Low Cost Adversarial Audio Attacks on Black Box Speech Platforms using Linguistic Features.eng.lrc
12.4 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/DICE Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis.eng.srt
12.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SEIMI Efficient and Secure SMAP-Enabled Intra-process Memory Isolation.eng.text
12.4 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Skyfire - Data-Driven Seed Generation for Fuzzing.eng.vtt
12.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/VeriSmart A Highly Precise Safety Verifier for Ethereum Smart Contracts.eng.text
12.3 kB
IEEE Security & Privacy 2024/Zihao Li NURGLE - zihao li.eng.srt
12.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Automatic Uncovering of Hidden Behaviors from Input Validation in Mobile Apps.eng.text
12.3 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/ADI Adversarial Dominating Inputs in Vertical Federated Learning Systems.eng.text
12.3 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/AI-Guardian Defeating Adversarial Attacks using Backdoors.eng.vtt
12.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Unexpected Data Dependency Creation and Chaining A New Attack to SDN.eng.text
12.2 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/AI-Guardian Defeating Adversarial Attacks using Backdoors.eng.txt
12.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/TARDIS Rolling Back the Clock on CMS-Targeting Cyber Attacks.eng.text
12.2 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Tactical Provenance Analysis our Endpoint Detection and Response Systems.eng.text
12.1 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/AI-Guardian Defeating Adversarial Attacks using Backdoors.eng.lrc
12.1 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Spectral-DP Differentially Private Deep Learning through Spectral Perturbation and Filtering.eng.tsv
12.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Detection of Electromagnetic Interference Attacks on Sensor Systems.eng.text
12.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Plundervolt Software-Based Fault Injection Attacks against Intel SGX.eng.txt
12.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Plundervolt Software-Based Fault Injection Attacks against Intel SGX.eng.vtt
12.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Plundervolt Software-Based Fault Injection Attacks against Intel SGX.eng.lrc
12.0 kB
IEEE Security & Privacy 2024/2024 319 FCert - yantiing wang.eng.srt
12.0 kB
IEEE Security & Privacy 2024/ALIF Low Cost Adversarial Audio Attacks on Black Box Speech Platforms using Linguistic Features.eng.vtt
11.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/OAT Attesting Operation Integrity of Embedded Devices.eng.tsv
11.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Towards Scalable Threshold Cryptosystems.eng.tsv
11.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/BIAS Bluetooth Impersonation AttackS.eng.text
11.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Understanding and Mitigating Security Risks of General Messaging Protocols on IoT Clouds.eng.text
11.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/The Value of Collaboration in Convex Machine Learning with Differential Privacy.eng.text
11.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/TextExerciser Feedback-Driven Text Input Exercising for Android Applications.eng.tsv
11.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/An Analysis of Pre-installed Android Software.eng.text
11.7 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Improving Password Guessing via Representation Learning.eng.text
11.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Throwing Darts in the Dark Detecting Bots with Limited Data using Neural Data Augmentation.eng.text
11.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Establishing Economic Incentives for Security Patching of IoT Consumer Products.eng.tsv
11.6 kB
IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Crowd-GPS-Sec - Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks.eng.text
11.6 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Learning Differentially Private Mechanisms.eng.text
11.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/The Last Mile High-Assurance and High-Speed Cryptographic Implementations.eng.text
11.6 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Can Voters Detect Malicious Manipulation of Ballot Marking Devices.eng.txt
11.4 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Response-Hiding Encrypted Ranges Revisiting Security via Parametrized Leakage-Abuse Attacks.eng.tsv
11.4 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Skyfire - Data-Driven Seed Generation for Fuzzing.eng.tsv
11.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Enabling Rack-scale Confidential Computing Using Heterogeneous Trusted Execution Environment.eng.text
11.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Can Voters Detect Malicious Manipulation of Ballot Marking Devices.eng.lrc
11.3 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Discop Provably Secure Steganography in Practice Based on Distribution Copies.eng.text
11.3 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/DynPTA Combining Static and Dynamic Analysis for Practical Selective Data Protection.eng.text
11.2 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/AccEar Accelerometer Acoustic Eavesdropping with Unconstrained Vocabulary.eng.text
11.2 kB
IEEE Security & Privacy 2024/2024 176 PolySphinx Extending the Sphinx Mix Format with Better Multicast Support - Daniel Schadt.eng.text
11.1 kB
IEEE Security & Privacy 2024/ALIF Low Cost Adversarial Audio Attacks on Black Box Speech Platforms using Linguistic Features.eng.tsv
11.1 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/WaveSpy Remote and Through-wall Screen Attack via mmWave Sensing.eng.text
11.0 kB
IEEE Security & Privacy 2024/2024 102 BOUNCEATTACK A Query Efficient Decision based Adversarial Attack by Bouncing into the Wild.eng.srt
11.0 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/MarkUs Drop-in Use-After-Free Prevention for Low-Level Languages.eng.text
10.9 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/AI-Guardian Defeating Adversarial Attacks using Backdoors.eng.tsv
10.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SAVIOR Towards Bug-Driven Hybrid Testing.eng.text
10.8 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Plundervolt Software-Based Fault Injection Attacks against Intel SGX.eng.tsv
10.7 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Android Custom Permissions Demystified From Privilege Escalation to Design Shortcomings.eng.text
10.7 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Can Voters Detect Malicious Manipulation of Ballot Marking Devices.eng.srt
10.6 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Spectral-DP Differentially Private Deep Learning through Spectral Perturbation and Filtering.eng.text
10.5 kB
IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Goshawk Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis.eng.text
10.5 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Red Belly a Deterministic Scalable Open Permissioned Blockchain.eng.srt
10.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Measuring Legal Compliance of Banners from IAB Europe's Transparancy and Consent Framework.eng.text
10.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/TextExerciser Feedback-Driven Text Input Exercising for Android Applications.eng.text
10.3 kB
IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/IEEE S&P 2019 - Awards Ceremony.eng.srt
10.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Towards Scalable Threshold Cryptosystems.eng.text
10.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/OAT Attesting Operation Integrity of Embedded Devices.eng.text
10.3 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Establishing Economic Incentives for Security Patching of IoT Consumer Products.eng.text
10.1 kB
IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Response-Hiding Encrypted Ranges Revisiting Security via Parametrized Leakage-Abuse Attacks.eng.text
9.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Can Voters Detect Malicious Manipulation of Ballot Marking Devices.eng.vtt
9.9 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Can Voters Detect Malicious Manipulation of Ballot Marking Devices.eng.tsv
9.8 kB
IEEE Security & Privacy 2024/ALIF Low Cost Adversarial Audio Attacks on Black Box Speech Platforms using Linguistic Features.eng.text
9.6 kB
IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Skyfire - Data-Driven Seed Generation for Fuzzing.eng.text
9.4 kB
IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/AI-Guardian Defeating Adversarial Attacks using Backdoors.eng.text
9.4 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Plundervolt Software-Based Fault Injection Attacks against Intel SGX.eng.text
9.3 kB
IEEE logo.jpg
8.5 kB
IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Can Voters Detect Malicious Manipulation of Ballot Marking Devices.eng.text
8.1 kB
IEEE Security & Privacy 2024/Who Left the Door Open Investigating the Causes of Exposed IoT Devices in an Academic Network.eng.srt
6.3 kB
IEEE Security and Privacy thank you.txt
1.0 kB
HEADER.md
621 Bytes
随机展示
相关说明
本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!
>