IEEE Security & Privacy
File List
- IEEE Security & Privacy 2020/SSP 2020 Opening Remarks.mp4 96.0 MB
- IEEE Security & Privacy 2022/LangSec Keynote Trojan Source and Bad Characters Invisible Hacks and Reluctant Patching.mp4 66.4 MB
- IEEE Security & Privacy 2022/Invisible Finger Practical Electromagnetic Interference Attack on Touchscreen Electronic Devices.mp4 50.2 MB
- IEEE Security & Privacy 2022/IEEE S&P 2022 Opening Session.mp4 49.2 MB
- IEEE Security & Privacy 2015/Temporal Lensing and Its Application in Pulsing Denial-of-Service Attacks.mp4 49.2 MB
- IEEE Security & Privacy 2015/Missing the Point(er) - On the Effectiveness of Code Pointer Integrity.mp4 48.1 MB
- IEEE Security & Privacy 2019/IEEE S&P 2019 - 40th Celebration Plenary Session Panel Reflections on four decades of the symposium.mp4 44.2 MB
- IEEE Security & Privacy 2016/NITRD Panel - Federal Cybersecurity and Privacy R&D Strategic Plans.mp4 43.5 MB
- IEEE Security & Privacy 2015/SurroundWeb - Mitigating Privacy Concerns in a 3D Web Browser.mp4 42.6 MB
- IEEE Security & Privacy 2023/IEEE S&P 2023 Short Talks.mp4 39.7 MB
- IEEE Security & Privacy 2019/IEEE S&P 2019 - TC Business Meeting.mp4 39.0 MB
- IEEE Security & Privacy 2017/Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping.mp4 38.9 MB
- IEEE Security & Privacy 2015/Secure Track Verification.mp4 38.4 MB
- IEEE Security & Privacy 2015/High System-Code Security with Low Overhead.mp4 38.4 MB
- IEEE Security & Privacy 2022/Security Foundations for Application-Based Covert Communication Channels.mp4 37.6 MB
- IEEE Security & Privacy 2015/Riposte - An Anonymous Messaging System Handling Millions of Users.mp4 37.2 MB
- IEEE Security & Privacy 2015/Forward Secure Asynchronous Messaging from Puncturable Encryption.mp4 36.7 MB
- IEEE Security & Privacy 2022/Practical EMV Relay Protection.mp4 36.1 MB
- IEEE Security & Privacy 2015/Cross-Architecture Bug Search in Binary Executables.mp4 36.0 MB
- IEEE Security & Privacy 2024/2024 431 Routing Attacks on Cryptocurrency Mining Pools - Muoi Tran.mp4 35.5 MB
- IEEE Security & Privacy 2017/SoK - Science, Security, and the Elusive Goal of Security as a Scientific Pursuit.mp4 34.9 MB
- IEEE Security & Privacy 2022/SoK The Dual Nature of Technology in Sexual Assault.mp4 34.3 MB
- IEEE Security & Privacy 2015/The Attack of the Clones - A Study of the Impact of Shared Code on Vulnerability Patching.mp4 34.0 MB
- IEEE Security & Privacy 2022/Peekaboo A Hub-Based Approach to Enable Transparency in Data Processing within Smart Homes.mp4 33.9 MB
- IEEE Security & Privacy 2016/S&P TC Business Meeting.mp4 33.5 MB
- IEEE Security & Privacy 2015/S$A - A Shared Cache Attack That Works across Cores and Defies VM Sandboxing.mp4 32.8 MB
- IEEE Security & Privacy 2022/SwarmFlawFinder Discovering and Exploiting Logic Flaws of Swarm Algorithms.mp4 32.0 MB
- IEEE Security & Privacy 2015/GenoGuard - Protecting Genomic Data against Brute-Force Attacks.mp4 30.9 MB
- IEEE Security & Privacy 2022/Practical Asynchronous Distributed Key Generation.mp4 30.9 MB
- IEEE Security & Privacy 2017/VUDDY - A Scalable Approach for Vulnerable Code Clone Discovery.mp4 30.5 MB
- IEEE Security & Privacy 2015/Security of the J-PAKE Password-Authenticated Key Exchange Protocol.mp4 30.3 MB
- IEEE Security & Privacy 2015/Towards Making Systems Forget with Machine Unlearning.mp4 30.0 MB
- IEEE Security & Privacy 2022/Evaluating Physical-Layer BLE Location Tracking Attacks on Mobile Devices.mp4 29.8 MB
- IEEE Security & Privacy 2017/Backward-bounded DSE - Targeting Infeasibility Questions on Obfuscated Codes.mp4 29.7 MB
- IEEE Security & Privacy 2022/TASHAROK-Using Mechanism Design for Enhancing Security Resource Allocation in Interdependent Systems.mp4 29.6 MB
- IEEE Security & Privacy 2022/Anti-Tamper Radio System-Level Tamper Detection for Computing Systems.mp4 29.3 MB
- IEEE Security & Privacy 2017/IKP - Turning a PKI Around with Decentralized Automated Incentives.mp4 29.2 MB
- IEEE Security & Privacy 2024/MIMOCrypt - Jun Luo John.mp4 29.2 MB
- IEEE Security & Privacy 2015/Understanding and Monitoring Embedded Web Scripts.mp4 29.1 MB
- IEEE Security & Privacy 2017/SymCerts - Practical Symbolic Execution For Exposing Noncompliance in X.509 Certificate Validation.mp4 29.0 MB
- IEEE Security & Privacy 2022/SoK Unifying and Applying At-Risk User Research.mp4 28.8 MB
- IEEE Security & Privacy 2022/IRShield A Countermeasure Against Adversarial Physical-Layer Wireless Sensing.mp4 28.8 MB
- IEEE Security & Privacy 2015/SoK - Deep Packer Inspection - A Longitudinal Study of the Complexity of Run-Time Packers.mp4 28.6 MB
- IEEE Security & Privacy 2015/On Subnormal Floating Point and Abnormal Timing.mp4 28.6 MB
- IEEE Security & Privacy 2022/HardLog Practical Tamper-Proof System Auditing Using a Novel Audit Device.mp4 28.5 MB
- IEEE Security & Privacy 2015/Micro-Policies - Formally Verified, Tag-Based Security Monitors.mp4 28.4 MB
- IEEE Security & Privacy 2015/ADSNARK - Nearly Practical and Privacy-Preserving Proofs on Authenticated Data.mp4 28.4 MB
- IEEE Security & Privacy 2022/They're not that hard to mitigate -What Cryptographic Library Developers Think About Timing Attacks.mp4 28.4 MB
- IEEE Security & Privacy 2022/Domains Do Change Their Spots Quantifying Potential Abuse of Residual Trust.mp4 28.4 MB
- IEEE Security & Privacy 2015/SoK - Research Perspectives and Challenges for Bitcoin and Cryptocurrencies.mp4 28.4 MB
- IEEE Security & Privacy 2015/Counterfeit Object-oriented Programming.mp4 28.4 MB
- IEEE Security & Privacy 2015/What the App is That Deception and Countermeasures in the Android User Interface.mp4 28.1 MB
- IEEE Security & Privacy 2022/A Formal Security Analysis of the W3C Web Payment APIs Attacks and Verification.mp4 28.1 MB
- IEEE Security & Privacy 2022/Noise A Library of Verified High-Performance Secure Channel Protocol Implementations.mp4 27.8 MB
- IEEE Security & Privacy 2017/Hijacking Bitcoin - Routing Attacks on Cryptocurrencies.mp4 27.7 MB
- IEEE Security & Privacy 2019/LBM A Security Framework for Peripherals within the Linux Kernel.mp4 27.6 MB
- IEEE Security & Privacy 2017/SmarPer - Context-Aware and Automatic Runtime-Permissions for Mobile Devices.mp4 27.4 MB
- IEEE Security & Privacy 2019/Hard Drive of Hearing Disks that Eavesdrop with a Synthesized Microphone.mp4 27.4 MB
- IEEE Security & Privacy 2022/How Does Usable Security Not End Up in Software Products Results From a Qualitative Interview Study.mp4 27.3 MB
- IEEE Security & Privacy 2015/Post-Quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors Problem.mp4 27.2 MB
- IEEE Security & Privacy 2022/Measuring and Mitigating the Risk of IP Reuse on Public Clouds.mp4 26.9 MB
- IEEE Security & Privacy 2022/A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols.mp4 26.6 MB
- IEEE Security & Privacy 2017/Cloak and Dagger - From Two Permissions to Complete Control of the UI Feedback Loop.mp4 26.5 MB
- IEEE Security & Privacy 2019/Drones' Cryptanalysis - Detecting Privacy Invasion Attacks Conducted by Drone.mp4 26.2 MB
- IEEE Security & Privacy 2019/Why Does Your Data Leak Uncovering the Data Leakage in Cloud from Mobile Apps.mp4 26.1 MB
- IEEE Security & Privacy 2017/Scalable Bias-Resistant Distributed Randomness.mp4 25.9 MB
- IEEE Security & Privacy 2017/Is Interaction Necessary for Distributed Private Learning.mp4 25.8 MB
- IEEE Security & Privacy 2022/Mitigating Information Leakage Vulnerabilities with Type-based Data Isolation.mp4 25.8 MB
- IEEE Security & Privacy 2017/SysPal System-guided Pattern Locks for Android.mp4 25.5 MB
- IEEE Security & Privacy 2017/vSQL - Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases.mp4 25.4 MB
- IEEE Security & Privacy 2015/Privacy and Access Control for Outsourced Personal Records.mp4 25.4 MB
- IEEE Security & Privacy 2021/An Interactive Prover for Protocol Verification in the Computational Model.mp4 25.4 MB
- IEEE Security & Privacy 2017/A Lustrum of Malware Network Communication - Evolution and Insights.mp4 25.4 MB
- IEEE Security & Privacy 2017/Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate.mp4 25.3 MB
- IEEE Security & Privacy 2015/Bitcoin over Tor isn't a Good Idea.mp4 25.2 MB
- IEEE Security & Privacy 2019/Security of GPS INS based On-road Location Tracking Systems.mp4 25.2 MB
- IEEE Security & Privacy 2020/Birds of a Feather A Hardware & Security Panel (Updated).mp4 25.2 MB
- IEEE Security & Privacy 2017/HVLearn - Automated Black-box Analysis of Hostname Verification in SSL TLS Implementations.mp4 25.1 MB
- IEEE Security & Privacy 2019/Formally Verified Cryptographic Web Applications in WebAssembly.mp4 25.0 MB
- IEEE Security & Privacy 2022/Spook.js Attacking Chrome Strict Site Isolation via Speculative Execution.mp4 25.0 MB
- IEEE Security & Privacy 2017/CRLite - A Scalable System for Pushing All TLS Revocations to All Browsers.mp4 24.9 MB
- IEEE Security & Privacy 2024/Eureka Presentation - Yu Wei.mp4 24.9 MB
- IEEE Security & Privacy 2019/SoK Shining Light on Shadow Stacks.mp4 24.9 MB
- IEEE Security & Privacy 2022/Heapster Analyzing the Security of Dynamic Allocators for Monolithic Firmware Images.mp4 24.8 MB
- IEEE Security & Privacy 2015/Malicious-Client Security in Blind Seer - A Scalable Private DBMS.mp4 24.7 MB
- IEEE Security & Privacy 2015/Readactor - Practical Code Randomization Resilient to Memory Disclosure.mp4 24.7 MB
- IEEE Security & Privacy 2017/XHOUND - Quantifying the Fingerprintability of Browser Extensions.mp4 24.6 MB
- IEEE Security & Privacy 2022/ShadeWatcher Recommendation-guided Cyber Threat Analysis using System Audit Records.mp4 24.6 MB
- IEEE Security & Privacy 2017/Protecting Bare-metal Embedded Systems with Privilege Overlays.mp4 24.6 MB
- IEEE Security & Privacy 2022/K-Scheduler Effective Seed Scheduling for Fuzzing with Graph Centrality Analysis.mp4 24.5 MB
- IEEE Security & Privacy 2015/Program-Adaptive Mutational Fuzzing.mp4 24.4 MB
- IEEE Security & Privacy 2022/vSGX Virtualizing SGX Enclaves on AMD SEV.mp4 24.4 MB
- IEEE Security & Privacy 2022/Investigating Influencer VPN Ads on YouTube.mp4 24.4 MB
- IEEE Security & Privacy 2019/If HTTPS Were Secure I wouldn't Need 2FA End User and Administrator Mental Models of HTTPS.mp4 24.4 MB
- IEEE Security & Privacy 2019/Breaking LTE on Layer Two.mp4 24.4 MB
- IEEE Security & Privacy 2019/Dangerous Skills Understanding and Mitigating Security Risks of Voice-Controlled Third-Party.mp4 24.1 MB
- IEEE Security & Privacy 2017/Counter-RAPTOR - Safeguarding Tor Against Active Routing Attacks.mp4 24.1 MB
- IEEE Security & Privacy 2017/Identifying Personal DNA Methylation Profiles by Genotype Inference.mp4 24.0 MB
- IEEE Security & Privacy 2022/Reconstructing Training Data with Informed Adversaries.mp4 24.0 MB
- IEEE Security & Privacy 2019/Data Recovery on Encrypted Databases with k-Nearest Neighbor Query Leakage.mp4 24.0 MB
- IEEE Security & Privacy 2022/SPURT Scalable Distributed Randomness Beacon with Transparent Setup.mp4 24.0 MB
- IEEE Security & Privacy 2015/A Messy State of the Union - Taming the Composite State Machines of TLS.mp4 23.9 MB
- IEEE Security & Privacy 2017/A Framework for Universally Composable Diffie-Hellman Key Exchange.mp4 23.8 MB
- IEEE Security & Privacy 2022/Delay Wreaks Havoc on Your Smart Home Delay-based Automation Interference Attacks.mp4 23.7 MB
- IEEE Security & Privacy 2017/SoK - Cryptographically Protected Database Search.mp4 23.7 MB
- IEEE Security & Privacy 2022/Formal Model-Driven Discovery of Bluetooth Protocol Design Vulnerabilities.mp4 23.7 MB
- IEEE Security & Privacy 2019/New Primitives for Actively-Secure MPC over Rings with Applications to Private Machine Learning.mp4 23.7 MB
- IEEE Security & Privacy 2024/2024 62 Enforcing End to end Security for Remote Conferencing - Triste L.mp4 23.6 MB
- IEEE Security & Privacy 2019/Dominance as a New Trusted Computing Primitive for the IoT.mp4 23.6 MB
- IEEE Security & Privacy 2015/Caelus - Verifying the Consistency of Cloud Services with Battery-Powered Devices.mp4 23.5 MB
- IEEE Security & Privacy 2015/Using Hardware Features for Increased Debugging Transparency.mp4 23.5 MB
- IEEE Security & Privacy 2017/Pyramid - Enhancing Selectivity in Big Data Protection with Count Featurization.mp4 23.5 MB
- IEEE Security & Privacy 2017/Side-Channel Attacks on Shared Search Indexes.mp4 23.4 MB
- IEEE Security & Privacy 2022/SIRAJ A Unified Framework for Aggregation of Malicious Entity Detectors.mp4 23.4 MB
- IEEE Security & Privacy 2022/Desperate Times Call for Desperate Measures - User Concerns with Mobile Loan Apps in Kenya.mp4 23.3 MB
- IEEE Security & Privacy 2022/IRQDebloat Reducing Driver Attack Surface in Embedded Devices.mp4 23.2 MB
- IEEE Security & Privacy 2017/IoT Goes Nuclear - Creating a Zigbee Chain Reaction.mp4 23.2 MB
- IEEE Security & Privacy 2017/Implementing and Proving the TLS 1.3 Record Layer.mp4 23.2 MB
- IEEE Security & Privacy 2023/Examining Zero-Shot Vulnerability Repair with Large Language Models.mp4 23.2 MB
- IEEE Security & Privacy 2017/Optimized Honest-Majority MPC for Malicious Adversaries - Breaking 1 Billion-Gate Second Barrier.mp4 23.2 MB
- IEEE Security & Privacy 2017/How They Did It - An Analysis of Emission Defeat Devices in Modern Automobiles.mp4 23.1 MB
- IEEE Security & Privacy 2017/One TPM to Bind Them All - Fixing TPM2.0 for Provably Secure Anonymous Attestation.mp4 23.1 MB
- IEEE Security & Privacy 2023/Space Odyssey An Experimental Software Security Analysis of Satellites.mp4 23.1 MB
- IEEE Security & Privacy 2022/Deployment of Source Address Validation by Network Operators A Randomized Control Trial.mp4 23.1 MB
- IEEE Security & Privacy 2017/Finding and Preventing Bugs in JavaScript Bindings.mp4 23.1 MB
- IEEE Security & Privacy 2022/RT-TEE Real-time System Availability for Cyber-physical Systems using ARM TrustZone.mp4 23.0 MB
- IEEE Security & Privacy 2017/From Trash to Treasure - Timing-Sensitive Garbage Collection.mp4 23.0 MB
- IEEE Security & Privacy 2015/Every Second Counts - Quantifying the Negative Externalities of Cybercrime via Typosquatting.mp4 23.0 MB
- IEEE Security & Privacy 2019/How Well Do My Results Generalize Comparing Security and Privacy Survey Results from.mp4 22.9 MB
- IEEE Security & Privacy 2015/Virtual Proofs of Reality and their Physical Implementation.mp4 22.9 MB
- IEEE Security & Privacy 2017/Hardening Java's Access Control by Abolishing Implicit Privilege Elevation.mp4 22.8 MB
- IEEE Security & Privacy 2023/WarpAttack Bypassing CFI through Compiler-Introduced Double-Fetches.mp4 22.7 MB
- IEEE Security & Privacy 2019/Touching the Untouchables Dynamic Security Analysis of the LTE Control Plane.mp4 22.7 MB
- IEEE Security & Privacy 2022/ProVerif with Lemmas, Induction, Fast Subsumption, and Much More.mp4 22.7 MB
- IEEE Security & Privacy 2022/DeepSteal Advanced Model Extractions Leveraging Efficient Weight Stealing in Memories.mp4 22.6 MB
- IEEE Security & Privacy 2015/CHERI - A Hybrid Capability-System Architecture for Scalable Software Compartmentalization.mp4 22.6 MB
- IEEE Security & Privacy 2017/Norax - Enabling Execute-Only Memory for COTS Binaries on AArch64.mp4 22.5 MB
- IEEE Security & Privacy 2022/Copy, Right A Testing Framework for Copyright Protection of Deep Learning Models.mp4 22.5 MB
- IEEE Security & Privacy 2022/DeepCASE Semi-Supervised Contextual Analysis of Security Events.mp4 22.4 MB
- IEEE Security & Privacy 2022/Sphinx Enabling Privacy-Preserving Online Learning over the Cloud.mp4 22.4 MB
- IEEE Security & Privacy 2019/ProFuzzer On-the-fly Input Type Probing for Better Zero-day Vulnerability Discovery.mp4 22.3 MB
- IEEE Security & Privacy 2019/SensorID Sensor Calibration Fingerprinting for Smartphones.mp4 22.3 MB
- IEEE Security & Privacy 2022/Time-Print Authenticating USB Flash Drives with Novel Timing Fingerprints.mp4 22.3 MB
- IEEE Security & Privacy 2024/Cohere Managing Differential Privacy in Large Scale Systems - Nicolas Küchler.mp4 22.3 MB
- IEEE Security & Privacy 2015/How Secure and Quick is QUIC Provable Security and Performance Analyses.mp4 22.2 MB
- IEEE Security & Privacy 2022/Privacy-from-Birth Protecting Sensed Data from Malicious Sensors with VERSA.mp4 22.2 MB
- IEEE Security & Privacy 2017/To Catch a Ratter - Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild.mp4 22.2 MB
- IEEE Security & Privacy 2023/Inducing Wireless Chargers to Voice Out for Inaudible Command Attacks.mp4 22.2 MB
- IEEE Security & Privacy 2022/Membership inference attacks from first principles.mp4 22.1 MB
- IEEE Security & Privacy 2022/SoK Social Cybersecurity.mp4 22.1 MB
- IEEE Security & Privacy 2015/Geppetto - Versatile Verifiable Computation.mp4 22.1 MB
- IEEE Security & Privacy 2020/Birds of a Feather Sharing Cybersecurity Research Artifacts To Accelerate Progress.mp4 22.1 MB
- IEEE Security & Privacy 2015/Connection-Oriented DNS to Improve Privacy and Security.mp4 22.1 MB
- IEEE Security & Privacy 2022/Repairing DoS Vulnerability of Real-World Regexes.mp4 22.1 MB
- IEEE Security & Privacy 2022/Asleep at the Keyboard Assessing the Security of GitHub Copilot's Code Contributions.mp4 22.1 MB
- IEEE Security & Privacy 2022/CirC Compiler infrastructure for proof systems, software verification, and more.mp4 22.0 MB
- IEEE Security & Privacy 2015/Effective Real-Time Android Application Auditing.mp4 22.0 MB
- IEEE Security & Privacy 2019/Asm2Vec Boosting Static Representation Robustness for Binary Clone Search.mp4 22.0 MB
- IEEE Security & Privacy 2017/Leakage-Abuse Attacks on Order-Revealing Encryption.mp4 21.9 MB
- IEEE Security & Privacy 2017/An Experimental Security Analysis of an Industrial Robot Controller.mp4 21.8 MB
- IEEE Security & Privacy 2016/Verifiable ASICs.mp4 21.8 MB
- IEEE Security & Privacy 2022/Blacksmith Compromising Target Row Refresh by Rowhammering in the Frequency Domain.mp4 21.7 MB
- IEEE Security & Privacy 2022/Finding and Exploiting CPU Features using MSR Templating.mp4 21.7 MB
- IEEE Security & Privacy 2019/Synesthesia Detecting Screen Content via Remote Acoustic Side Channels.mp4 21.6 MB
- IEEE Security & Privacy 2015/Vetting SSL Usage in Applications with SSLINT.mp4 21.5 MB
- IEEE Security & Privacy 2017/NEZHA - Efficient Domain-independent Differential Testing.mp4 21.5 MB
- IEEE Security & Privacy 2015/GraphSC - Parallel Secure Computation Made Easy.mp4 21.4 MB
- IEEE Security & Privacy 2023/Discop Provably Secure Steganography in Practice Based on Distribution Copies.mp4 21.4 MB
- IEEE Security & Privacy 2019/Learning to Reconstruct Statistical Learning Theory and Encrypted Database Attacks.mp4 21.4 MB
- IEEE Security & Privacy 2015/Securing Multiparty Online Services Via Certification of Symbolic Transactions.mp4 21.3 MB
- IEEE Security & Privacy 2015/ObliVM - A Programming Framework for Secure Computation.mp4 21.3 MB
- IEEE Security & Privacy 2019/Simple High-Level Code for Cryptographic Arithmetic - With Proofs, Without Compromises.mp4 21.2 MB
- IEEE Security & Privacy 2015/VC3 - Trustworthy Data Analytics in the Cloud Using SGX.mp4 21.2 MB
- IEEE Security & Privacy 2019/Spectre Attacks Exploiting Speculative Execution.mp4 21.2 MB
- IEEE Security & Privacy 2017/Stack Overflow Considered Harmful - The Impact of Copy&Paste on Android Application Security.mp4 21.2 MB
- IEEE Security & Privacy 2015/Protecting Private Keys against Memory Disclosure Attacks Using Hardware Transactional Memory.mp4 21.2 MB
- IEEE Security & Privacy 2024/From Chatbots to Phishbots Phishing Scam Generation in Commercial Large Language Models - Sayak.mp4 21.1 MB
- IEEE Security & Privacy 2023/Certifiably Robust Object Detection against Patch Hiding Attacks via Patch-agnostic Masking.mp4 21.1 MB
- IEEE Security & Privacy 2019/SoK General Purpose Frameworks for Secure Multi-Party Computation.mp4 21.1 MB
- IEEE Security & Privacy 2022/Phishing in Organizations Findings from a Large-Scale and Long-Term Study.mp4 21.0 MB
- IEEE Security & Privacy 2022/mmSpy Spying Phone Calls using mmWave Radars.mp4 20.9 MB
- IEEE Security & Privacy 2016/Keeping Authorities - Honest or Bust - with Decentralized Witness Cosigning.mp4 20.9 MB
- IEEE Security & Privacy 2019/Reasoning Analytically About Password Cracking Software Alex Liu.mp4 20.9 MB
- IEEE Security & Privacy 2023/SCAPHY Detecting Modern ICS Attacks by Correlating Behaviors in SCADA and PHYsical.mp4 20.9 MB
- IEEE Security & Privacy 2023/Confident Monte Carlo Rigorous Analysis of Guessing Curves for Probabilistic Password Models.mp4 20.9 MB
- IEEE Security & Privacy 2019/SoK Sanitizing for Security Dokyung Song.mp4 20.9 MB
- IEEE Security & Privacy 2022/How to Attack and Generate Honeywords.mp4 20.8 MB
- IEEE Security & Privacy 2015/The Miner's Dilemma.mp4 20.8 MB
- IEEE Security & Privacy 2023/LAMBRETTA Learning to Rank for Twitter Soft Moderation.mp4 20.8 MB
- IEEE Security & Privacy 2023/Is Cryptographic Deniability Sufficient Non-Expert Perceptions of Deniability in Secure Messaging.mp4 20.7 MB
- IEEE Security & Privacy 2022/Publicly Accountable Robust Multi-Party Computation.mp4 20.7 MB
- IEEE Security & Privacy 2022/BadEncoder Backdoor Attacks to Pre-trained Encoders in Self-Supervised Learning.mp4 20.6 MB
- IEEE Security & Privacy 2024/2024 05 22 02 41 48 H 264 - Rui Xi.mp4 20.6 MB
- IEEE Security & Privacy 2022/Wobfuscator Obfuscating JavaScript Malware via Opportunistic Translation to WebAssembly.mp4 20.6 MB
- IEEE Security & Privacy 2022/SoK How Robust is Image Classification Deep Neural Network Watermarking.mp4 20.5 MB
- IEEE Security & Privacy 2023/SNAP Efficient Extraction of Private Properties with Poisoning.mp4 20.5 MB
- IEEE Security & Privacy 2019/Comprehensive Privacy Analysis of Deep Learning.mp4 20.4 MB
- IEEE Security & Privacy 2019/The Code That Never Ran Modeling Attacks on Speculative Evaluation.mp4 20.4 MB
- IEEE Security & Privacy 2022/PGPATCH Policy-Guided Logic Bug Patching for Robotic Vehicles.mp4 20.4 MB
- IEEE Security & Privacy 2019/Exploiting Correcting Codes On the Effectiveness of ECC Memory Against Rowhammer Attacks.mp4 20.3 MB
- IEEE Security & Privacy 2015/TinyGarble - Highly Compressed and Scalable Sequential Garbled Circuits.mp4 20.3 MB
- IEEE Security & Privacy 2019/SoK Security Evaluation of Home Based IoT Deployment.mp4 20.3 MB
- IEEE Security & Privacy 2022/SYMBEXCEL Automated Analysis and Understanding of Malicious Excel 4.0 Macros.mp4 20.2 MB
- IEEE Security & Privacy 2022/FuzzUSB Hybrid Stateful Fuzzing of USB Gadget Stacks.mp4 20.2 MB
- IEEE Security & Privacy 2019/Stealthy Porn Understanding Real World Adversarial Images for I'llicit Online Promotion.mp4 20.2 MB
- IEEE Security & Privacy 2023/PyFET Forensically Equivalent Transformation for Python Binary Decompilation.mp4 20.2 MB
- IEEE Security & Privacy 2019/Using Safety Properties to Generate Vulnerability Patches.mp4 20.1 MB
- IEEE Security & Privacy 2016/Users Really Do Plug in USB Drives They Find.mp4 20.1 MB
- IEEE Security & Privacy 2016/A2 - Analog Malicious Hardware.mp4 20.1 MB
- IEEE Security & Privacy 2017/Verifying and Synthesizing Constant-Resource Implementations with Types.mp4 20.1 MB
- IEEE Security & Privacy 2019/Characterizing Pixel Tracking through the Lens of Disposable Email Services.mp4 20.0 MB
- IEEE Security & Privacy 2019/The 9 Lives of Bleichenbachers CAT New Cache ATtacks on TLS Implementations.mp4 20.0 MB
- IEEE Security & Privacy 2016/CaSE - Cache-Assisted Secure Execution on ARM Processors.mp4 20.0 MB
- IEEE Security & Privacy 2017/Securing Augmented Reality Output.mp4 20.0 MB
- IEEE Security & Privacy 2023/Deep perceptual hashing algorithms with hidden dual purpose client-side scanning facial recognition.mp4 20.0 MB
- IEEE Security & Privacy 2022/Spinning Language Models Risks of Propaganda-as-a-Service and Countermeasures.mp4 19.9 MB
- IEEE Security & Privacy 2017/Augur - Internet-Wide Detection of Connectivity Disruptions.mp4 19.9 MB
- IEEE Security & Privacy 2022/PICCOLO Exposing Complex Backdoors in NLP Transformer Models.mp4 19.8 MB
- IEEE Security & Privacy 2015/A Generic Approach to Automatic Deobfuscation of Executable Code.mp4 19.7 MB
- IEEE Security & Privacy 2022/Exposed Infrastructures-Discovery, Attacks and Remediation of Insecure ICS Remote Management Devices.mp4 19.7 MB
- IEEE Security & Privacy 2022/Back to the Drawing Board A Critical Evaluation of Poisoning Attacks on Federated Learning.mp4 19.6 MB
- IEEE Security & Privacy 2017/SecureML - A System for Scalable Privacy-Preserving Machine Learning.mp4 19.5 MB
- IEEE Security & Privacy 2024/MAWSEO Adversarial Wiki Search Poisoning for Illicit Online Promotion - Zilong Lin.mp4 19.5 MB
- IEEE Security & Privacy 2019/Towards Practical Differentialy Private Convex Optimization.mp4 19.5 MB
- IEEE Security & Privacy 2019/Ouroboros Crypsinous Privacy Preserving Proof of Stake.mp4 19.5 MB
- IEEE Security & Privacy 2019/True2F Backdoor resistant authentication tokens Emma Dauterman.mp4 19.5 MB
- IEEE Security & Privacy 2016/Algorithmic Transparency via Quantitative Input Influence.mp4 19.5 MB
- IEEE Security & Privacy 2022/Sabre Sender-Anonymous Messaging with Fast Audits.mp4 19.5 MB
- IEEE Security & Privacy 2017/IVD - Automatic Learning and Enforcement of Authorization Rules in Online Social Networks.mp4 19.5 MB
- IEEE Security & Privacy 2019/Threshold ECDSA from ECDSA Assumptions The Multiparty Case.mp4 19.4 MB
- IEEE Security & Privacy 2019/Attack Directories, Not Caches Side Channel Attacks in a Non Inclusive World.mp4 19.4 MB
- IEEE Security & Privacy 2022/Transcending TRANSCEND Revisiting Malware Classification in the Presence of Concept Drift.mp4 19.4 MB
- IEEE Security & Privacy 2017/Multi-touch Authentication Using Hand Geometry and Behavioral Information.mp4 19.4 MB
- IEEE Security & Privacy 2023/Not Yet Another Digital ID Privacy-preserving Humanitarian Aid Distribution.mp4 19.4 MB
- IEEE Security & Privacy 2015/Last-Level Cache Side-Channel Attacks are Practical.mp4 19.4 MB
- IEEE Security & Privacy 2022/De-Identification's Impact on Minority Representation and Privacy Preservation in the US Census.mp4 19.4 MB
- IEEE Security & Privacy 2022/Spiral Fast, High-Rate Single-Server PIR via FHE Composition.mp4 19.4 MB
- IEEE Security & Privacy 2017/SoK - Exploiting Network Printers.mp4 19.3 MB
- IEEE Security & Privacy 2017/Towards Evaluating the Robustness of Neural Networks.mp4 19.3 MB
- IEEE Security & Privacy 2022/Bad Characters Imperceptible NLP Attacks.mp4 19.3 MB
- IEEE Security & Privacy 2017/CoSMeDis - A Distributed Social Media Platform with Formally Verified Confidentiality Guarantees.mp4 19.3 MB
- IEEE Security & Privacy 2020/MarkUs Drop-in Use-After-Free Prevention for Low-Level Languages.mp4 19.3 MB
- IEEE Security & Privacy 2017/Comparing the Usability of Cryptographic APIs.mp4 19.3 MB
- IEEE Security & Privacy 2019/Does Certificate Transparency Break the Web Measuring Adoption and Error Rate.mp4 19.2 MB
- IEEE Security & Privacy 2019/Iodine Fast Dynamic Tain't Tracking Using Rollback free Optimistic Hybrid Analysis.mp4 19.2 MB
- IEEE Security & Privacy 2022/Graphics Peeping Unit Exploiting EM Side-Channel Information of GPUs to Eavesdrop on Your Neighbors.mp4 19.2 MB
- IEEE Security & Privacy 2022/MatRiCT More Efficient Post-Quantum Private Blockchain Payments.mp4 19.2 MB
- IEEE Security & Privacy 2022/GREBE Unveiling Exploitation Potential for Linux Kernel Bugs.mp4 19.1 MB
- IEEE Security & Privacy 2022/A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP.mp4 19.1 MB
- IEEE Security & Privacy 2019/Theory and Practice of Finding Eviction Sets.mp4 19.0 MB
- IEEE Security & Privacy 2022/SMILE Secure Memory Introspection for Live Enclave.mp4 19.0 MB
- IEEE Security & Privacy 2024/LLMs Cannot Reliably Identify and Reason About Security Vulnerabilities Yet - A Comprehensive Eva.mp4 19.0 MB
- IEEE Security & Privacy 2019/KHyperLogLog Estimating Reidentifiability and Joinability of Large Data at Scale Pern Hui Chia.mp4 19.0 MB
- IEEE Security & Privacy 2019/Should I Worry A Cross Cultural Examination of Account Security Incident Response.mp4 18.9 MB
- IEEE Security & Privacy 2016/High-Speed Inter-domain Fault Localization.mp4 18.9 MB
- IEEE Security & Privacy 2017/Machine-Checked Proofs of Privacy for Electronic Voting Protocols.mp4 18.9 MB
- IEEE Security & Privacy 2022/How Not to Protect Your IP - An Industry-Wide Break of IEEE 1735 Implementations.mp4 18.9 MB
- IEEE Security & Privacy 2019/PhishFarm A Scalable Framework for Measuring the Effectivness of Evasion Techniques Against.mp4 18.9 MB
- IEEE Security & Privacy 2017/Your Exploit is Mine - Automatic Shellcode Transplant for Remote Exploits.mp4 18.8 MB
- IEEE Security & Privacy 2022/Waldo A Private Time-Series Database from Function Secret-Sharing.mp4 18.8 MB
- IEEE Security & Privacy 2022/Universal 3-Dimensional Perturbations for Black-Box Attacks on Video Recognition Systems.mp4 18.8 MB
- IEEE Security & Privacy 2019/CaSym Cache Aware Symbolic Execution for Side Channel Detection and Mitigation.mp4 18.8 MB
- IEEE Security & Privacy 2024/2024 519 From Individual Computation to Allied Optimization Remodeling Privacy Preserving Neural Inf.mp4 18.7 MB
- IEEE Security & Privacy 2022/WIGHT Wired Ghost Touch Attack on Capacitive Touchscreens.mp4 18.4 MB
- IEEE Security & Privacy 2015/Cracking-Resistant Password Vaults Using Natural Language Encoders.mp4 18.4 MB
- IEEE Security & Privacy 2019/NEUZZ Efficient Fuzzing with Neural Program Smoothing.mp4 18.4 MB
- IEEE Security & Privacy 2022/Model Stealing Attacks Against Inductive Graph Neural Networks.mp4 18.4 MB
- IEEE Security & Privacy 2023/Practical Timing Side-Channel Attacks on Memory Compression.mp4 18.4 MB
- IEEE Security & Privacy 2022/Locally Differentially Private Sparse Vector Aggregation.mp4 18.3 MB
- IEEE Security & Privacy 2020/Combating Dependence Explosion in Forensic Analysis Using Alternative Tag Propagation Semantics.mp4 18.3 MB
- IEEE Security & Privacy 2017/Catena - Efficient Non-equivocation via Bitcoin.mp4 18.3 MB
- IEEE Security & Privacy 2022/Adversarial Examples - for Proof-of-Learning.mp4 18.2 MB
- IEEE Security & Privacy 2022/Cats vs. Spectre An Axiomatic Approach to Modeling Speculative Execution Attacks.mp4 18.2 MB
- IEEE Security & Privacy 2022/Mind the Gap Studying the Insecurity of Provably Secure Embedded Trusted Execution Architectures.mp4 18.1 MB
- IEEE Security & Privacy 2022/Augury Using Data Memory-Dependent Prefetchers to Leak Data at Rest.mp4 18.1 MB
- IEEE Security & Privacy 2016/TaoStore - Overcoming Asynchronicity in Oblivious Data Storage.mp4 18.0 MB
- IEEE Security & Privacy 2019/Towards Automated Safety Vetting of PLC Code in Real World Plants Mu Zhang.mp4 18.0 MB
- IEEE Security & Privacy 2022/Private Nearest Neighbor Search with Sublinear Communication and Malicious Security.mp4 17.9 MB
- IEEE Security & Privacy 2018/A Machine Learning Approach to Prevent Malicious Calls Over Telephony Networks.mp4 17.9 MB
- IEEE Security & Privacy 2022/Foundations of Dynamic BFT.mp4 17.9 MB
- IEEE Security & Privacy 2023/Breaking Security-Critical Voice Authentication.mp4 17.9 MB
- IEEE Security & Privacy 2022/TROLLMAGNIFIER Detecting State-Sponsored Troll Accounts on Reddit.mp4 17.9 MB
- IEEE Security & Privacy 2019/XCLAIM Trustless Interoperable Cryptocurrency Backed Assets.mp4 17.9 MB
- IEEE Security & Privacy 2019/Understanding the Security of ARM Debugging Features.mp4 17.9 MB
- IEEE Security & Privacy 2022/Security Analysis of the MLS Key Derivation.mp4 17.8 MB
- IEEE Security & Privacy 2019/An Extensive Formal Security Analysis of the OpenID Financial grade API Pedram Hosseyni.mp4 17.8 MB
- IEEE Security & Privacy 2022/The Experts' Insights on the Peer Review Process of Evaluating Security Papers.mp4 17.8 MB
- IEEE Security & Privacy 2023/On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security.mp4 17.8 MB
- IEEE Security & Privacy 2023/LazyTAP On-Demand Data Minimization for Trigger-Action Applications.mp4 17.7 MB
- IEEE Security & Privacy 2015/SoK - Secure Messaging.mp4 17.7 MB
- IEEE Security & Privacy 2024/Efficient and Generic Microarchitectural Hash Function Recovery - Lukas Gerlach.mp4 17.7 MB
- IEEE Security & Privacy 2015/Automatic Inference of Search Patterns for Tain't-Style Vulnerabilities.mp4 17.6 MB
- IEEE Security & Privacy 2018/Routing Around Congestion - Defeating DDoS Attacks and Adverse Network Conditions via Reactive.mp4 17.6 MB
- IEEE Security & Privacy 2015/Ad Injection at Scale - Assessing Deceptive Advertisement Modifications.mp4 17.6 MB
- IEEE Security & Privacy 2019/Fidelius Protecting User Secrets from Compromised Browsers.mp4 17.6 MB
- IEEE Security & Privacy 2019/Beyond Credential Stuffing Password Similarity Models using Neural Networks.mp4 17.6 MB
- IEEE Security & Privacy 2016/Security Analysis of Emerging Smart Home Applications.mp4 17.5 MB
- IEEE Security & Privacy 2021/SoK Quantifying Cyber Risk.mp4 17.5 MB
- IEEE Security & Privacy 2016/MitM Attack by Name Collision - Cause Analysis and Vulnerability Assessment in the New gTLD Era.mp4 17.5 MB
- IEEE Security & Privacy 2018/A Formal Treatment of Accountable Proxying over TLS.mp4 17.5 MB
- IEEE Security & Privacy 2022/SpecHammer Combining Spectre and Rowhammer for New Speculative Attacks.mp4 17.5 MB
- IEEE Security & Privacy 2016/Verena - End-to-End Integrity Protection for Web Applications.mp4 17.4 MB
- IEEE Security & Privacy 2023/AUC Accountable Universal Composability.mp4 17.4 MB
- IEEE Security & Privacy 2023/Security and Privacy Challenges, Advice, and Opportunities at Cybercafes in Kenya.mp4 17.4 MB
- IEEE Security & Privacy 2018/Blue Note - How Intentional Acoustic Interference Damages Availablity and Integrity -.mp4 17.4 MB
- IEEE Security & Privacy 2022/Timing-Based Browsing Privacy Vulnerabilities Via Site Isolation.mp4 17.4 MB
- IEEE Security & Privacy 2019/Proof Of Stake Sidechains.mp4 17.4 MB
- IEEE Security & Privacy 2023/On the (In)security of Peer-to-Peer Decentralized Machine Learning.mp4 17.3 MB
- IEEE Security & Privacy 2023/Typing High-Speed Cryptography against Spectre v1.mp4 17.3 MB
- IEEE Security & Privacy 2020/ICAS An Extensible Framework for Estimating the Susceptibility of IC Layouts to Additive Trojans.mp4 17.3 MB
- IEEE Security & Privacy 2022/Goshawk Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis.mp4 17.3 MB
- IEEE Security & Privacy 2016/PhotoProof - Cryptographic Image Authentication for Any Set of Permissible Transformations.mp4 17.2 MB
- IEEE Security & Privacy 2022/Attacks on Wireless Coexistence.mp4 17.2 MB
- IEEE Security & Privacy 2017/Obstacles to the Adoption of Secure Communication Tools.mp4 17.2 MB
- IEEE Security & Privacy 2023/TELEPATH A Minecraft-based Covert Communication System.mp4 17.1 MB
- IEEE Security & Privacy 2018/The Cards Aren't Alright - Detecting Counterfeit Gift Cards Using Encoding Jitter.mp4 17.1 MB
- IEEE Security & Privacy 2016/Helping Johnny to Analyze Malware - A Usability-Optimized Decompiler and Malware Analysis User Study.mp4 17.1 MB
- IEEE Security & Privacy 2019/SoK The Challenges Pitfalls and Perils of Using Hardware Performance Counters for Security.mp4 17.1 MB
- IEEE Security & Privacy 2022/Statistical Quantification of Differential Privacy A Local Approach.mp4 17.0 MB
- IEEE Security & Privacy 2015/Leave Me Alone - App-Level Protection against Runtime Information Gathering on Android.mp4 17.0 MB
- IEEE Security & Privacy 2022/PROTRR Principled yet Optimal In-DRAM Target Row Refresh.mp4 17.0 MB
- IEEE Security & Privacy 2019/Redactable Blockchain in the Permissionless Setting.mp4 16.9 MB
- IEEE Security & Privacy 2019/Measuring and Analyzing Search Engine Poisoning of Linguistic Collisions.mp4 16.9 MB
- IEEE Security & Privacy 2016/On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud.mp4 16.9 MB
- IEEE Security & Privacy 2023/AEM Facilitating Cross-Version Exploitability Assessment of Linux Kernel Vulnerabilities.mp4 16.9 MB
- IEEE Security & Privacy 2016/Distillation as a Defense to Adversarial Perturbations against Deep Neural Networks.mp4 16.8 MB
- IEEE Security & Privacy 2019/Razzer Finding Kernel Race Bugs through Fuzzing.mp4 16.8 MB
- IEEE Security & Privacy 2024/don't Eject the Impostor - Fast Three Party Computation With a Known Cheater - Andreas Brüggeman.mp4 16.8 MB
- IEEE Security & Privacy 2022/ZeeStar Private Smart Contracts by Homomorphic Encryption and Zero-knowledge Proofs.mp4 16.7 MB
- IEEE Security & Privacy 2023/No Privacy in the Electronics Repair Industry.mp4 16.6 MB
- IEEE Security & Privacy 2019/On the Security of Two-Round Multi-Signatures.mp4 16.6 MB
- IEEE Security & Privacy 2016/Following Devil's Footprints - Cross-Platform Analysis of Potentially Harmful Libraries.mp4 16.6 MB
- IEEE Security & Privacy 2020/Kobold Evaluating Decentralized Access Control for Remote NSXPC Methods on iOS.mp4 16.6 MB
- IEEE Security & Privacy 2016/Beauty and the Beast - Diverting modern web browsers to build unique browser fingerprints.mp4 16.5 MB
- IEEE Security & Privacy 2023/ADI Adversarial Dominating Inputs in Vertical Federated Learning Systems.mp4 16.5 MB
- IEEE Security & Privacy 2018/On the Economics of Offline Password Cracking.mp4 16.5 MB
- IEEE Security & Privacy 2019/F-BLEAU Fast Black-box Leakage Estimation.mp4 16.5 MB
- IEEE Security & Privacy 2023/Scalable and Privacy-Preserving Federated Principal Component Analysis.mp4 16.4 MB
- IEEE Security & Privacy 2019/Fuzzing File Systems via Two-Dimensional Input Space Exploration.mp4 16.4 MB
- IEEE Security & Privacy 2023/Collaborative Ad Transparency Promises and Limitations.mp4 16.4 MB
- IEEE Security & Privacy 2021/SoK An Overview of FHE Compilers and Tools.mp4 16.4 MB
- IEEE Security & Privacy 2022/SoK Practical Foundations for Software Spectre Defenses.mp4 16.4 MB
- IEEE Security & Privacy 2018/Another Flip in the Wall of Rowhammer Defenses.mp4 16.4 MB
- IEEE Security & Privacy 2019/Exploiting Unintended Feature leakage in Collaborative Learning Congzheng Song.mp4 16.4 MB
- IEEE Security & Privacy 2022/Model Orthogonalization Class Distance Hardening in Neural Networks for Better Security.mp4 16.3 MB
- IEEE Security & Privacy 2018/Enabling Autonomous IoT Device Pairing using Different Sensor Types.mp4 16.3 MB
- IEEE Security & Privacy 2024/2024 500 Exploring the Orthogonality and Linearity of Backdoor Attacks - Kaiyuan Zhang.mp4 16.3 MB
- IEEE Security & Privacy 2024/gpuzip 20 - yingchen wang.mp4 16.3 MB
- IEEE Security & Privacy 2019/Differentially Private Model Publishing For Deep Learning.mp4 16.3 MB
- IEEE Security & Privacy 2022/Exploit the Last Straw That Breaks Android Systems.mp4 16.2 MB
- IEEE Security & Privacy 2022/SNARKBlock Federated Anonymous Blocklisting from Hidden Common Input Aggregate Proofs.mp4 16.2 MB
- IEEE Security & Privacy 2024/2024 467 ARMOR A Formally Verified Implementation of X 509 Certificate Chain Validation - Joyanta De.mp4 16.2 MB
- IEEE Security & Privacy 2019/RIDL Rogue In-Flight Data Load.mp4 16.2 MB
- IEEE Security & Privacy 2016/Cinderella - Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with.mp4 16.2 MB
- IEEE Security & Privacy 2024/Asterisk Super fast MPC with a Friend - Protik Paul.mp4 16.1 MB
- IEEE Security & Privacy 2024/2024 57 Counterexample Guided Directed Fuzzing via Likely Invariant Inference - Shadow HUANG.mp4 16.1 MB
- IEEE Security & Privacy 2024/S&P 2024 hvc - Nicholas Ngai.mp4 16.1 MB
- IEEE Security & Privacy 2016/Staying Secure and Unprepared - Understanding and Mitigating the Security Risks of Apple ZeroConf.mp4 16.1 MB
- IEEE Security & Privacy 2024/ItsSimplexIEEESP 20min - Andrew Cullen.mp4 16.1 MB
- IEEE Security & Privacy 2024/Backdooring Multimodal Learning - 卡的不动弹.mp4 16.1 MB
- IEEE Security & Privacy 2024/Backdooring Multimodal Learning.mp4 16.1 MB
- IEEE Security & Privacy 2023/RAB Provable Robustness Against Backdoor Attacks.mp4 16.1 MB
- IEEE Security & Privacy 2023/Bitcoin-Enhanced Proof-of-Stake Security Possibilities and Impossibilities.mp4 16.1 MB
- IEEE Security & Privacy 2017/Spotless Sandboxes - Evading Malware Analysis Systems using Wear-and-Tear Artifacts.mp4 16.0 MB
- IEEE Security & Privacy 2023/GraphSPD Graph-Based Security Patch Detection with Enriched Code Semantics.mp4 16.0 MB
- IEEE Security & Privacy 2019/PrivKV Key Value Data Collection with Local Differential Privacy.mp4 16.0 MB
- IEEE Security & Privacy 2024/The Great Request Robbery Soheil Khodayari - Soheil Khodayari.mp4 15.9 MB
- IEEE Security & Privacy 2016/Talos - Neutralizing Vulnerabilities with Security Workarounds for Rapid Response.mp4 15.9 MB
- IEEE Security & Privacy 2016/pASSWORD tYPOS and How to Correct Them Securely.mp4 15.9 MB
- IEEE Security & Privacy 2024/Pudding Private User Discovery in Anonymity Networks - Ceren Kocaogullar.mp4 15.8 MB
- IEEE Security & Privacy 2016/A Practical Oblivious Map Data Structure with Secure Deletion and History Independence.mp4 15.8 MB
- IEEE Security & Privacy 2016/TriggerScope - Towards Detecting Logic Bombs in Android Applications.mp4 15.8 MB
- IEEE Security & Privacy 2022/Property Inference from Poisoning.mp4 15.8 MB
- IEEE Security & Privacy 2018/Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels.mp4 15.8 MB
- IEEE Security & Privacy 2016/The Cracked Cookie Jar - HTTP Cookie Hijacking and the Exposure of Private Information.mp4 15.8 MB
- IEEE Security & Privacy 2024/Pandora - Principled Symbolic Validation of Intel SGX Enclave Runtimes - Jo Van Bulck.mp4 15.8 MB
- IEEE Security & Privacy 2023/A Theory to Instruct Differentially-Private Learning via Clipping Bias Reduction.mp4 15.8 MB
- IEEE Security & Privacy 2022/Are We There Yet Timing and Floating-Point Attacks on Differential Privacy Systems.mp4 15.8 MB
- IEEE Security & Privacy 2023/Spectral-DP Differentially Private Deep Learning through Spectral Perturbation and Filtering.mp4 15.7 MB
- IEEE Security & Privacy 2022/DEPCOMM Graph Summarization on System Audit Logs for Attack Investigation.mp4 15.7 MB
- IEEE Security & Privacy 2020/SoK A Minimalist Approach to Formalizing Analog Sensor Security.mp4 15.7 MB
- IEEE Security & Privacy 2016/Synthesizing Plausible Privacy-Preserving Location Traces.mp4 15.7 MB
- IEEE Security & Privacy 2023/Analyzing Leakage of Personally Identifiable Information in Language Models.mp4 15.7 MB
- IEEE Security & Privacy 2023/A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations.mp4 15.7 MB
- IEEE Security & Privacy 2023/High-Order Masking of Lattice Signatures in Quasilinear Time.mp4 15.6 MB
- IEEE Security & Privacy 2018/FuturesMEX - Secure, Distributed Futures Market Exchange.mp4 15.6 MB
- IEEE Security & Privacy 2023/Perceptions of Distributed Ledger Technology Key Management-Interviews with Finance Professionals.mp4 15.5 MB
- IEEE Security & Privacy 2023/Characterizing the Limits of POV Acoustic Eavesdropping from Smartphone Cameras.mp4 15.5 MB
- IEEE Security & Privacy 2018/EyeTell - Video-Assisted Touchscreen Keystroke Inference from Eye Movements.mp4 15.5 MB
- IEEE Security & Privacy 2024/TuDoor new - Xiang Li.mp4 15.5 MB
- IEEE Security & Privacy 2022/Using Throughput-Centric Byzantine Broadcast to Tolerate Malicious Majority in Blockchains.mp4 15.5 MB
- IEEE Security & Privacy 2024/INVISILINE Invisible Plausibly Deniable Storage - Sandeep Kiran Pinjala.mp4 15.4 MB
- IEEE Security & Privacy 2015/Controlled-Channel Attacks - Deterministic Side Channels for Untrusted Operating Systems.mp4 15.4 MB
- IEEE Security & Privacy 2024/TuDoor - Xiang Li.mp4 15.4 MB
- IEEE Security & Privacy 2023/Threshold BBS Signatures for Distributed Anonymous Credential Issuance.mp4 15.4 MB
- IEEE Security & Privacy 2023/Blue Is the New Black (Market) Privacy Leaks and Re-Victimization from Police-Auctioned Cellphones.mp4 15.4 MB
- IEEE Security & Privacy 2023/Private Eye On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing.mp4 15.4 MB
- IEEE Security & Privacy 2018/When Your Fitness Tracker Betrays You - Quantifying the Predictability.mp4 15.3 MB
- IEEE Security & Privacy 2021/Bomberman Defining and Defeating Hardware Ticking Timebombs at Design-time.mp4 15.3 MB
- IEEE Security & Privacy 2024/2024 76 Formal Dolev Yao Models Meet Cryptographic Protocol Fuzz Testing - Max Ammann.mp4 15.3 MB
- IEEE Security & Privacy 2022/PCR-Auth Solving Authentication Puzzle Challenges with Encoded Palm Contact Responses.mp4 15.3 MB
- IEEE Security & Privacy 2017/Skyfire - Data-Driven Seed Generation for Fuzzing.mp4 15.3 MB
- IEEE Security & Privacy 2023/SecureCells A Secure Compartmentalized Architecture.mp4 15.2 MB
- IEEE Security & Privacy 2023/Shedding Light on Inconsistencies in Grid Cybersecurity Disconnects and Recommendations.mp4 15.2 MB
- IEEE Security & Privacy 2018/On Enforcing the Digital Immunity of a Large Humanitarian Organization.mp4 15.2 MB
- IEEE Security & Privacy 2018/Hackers vs. Testers - A Comparison of Software Vulnerability Discovery Processes.mp4 15.2 MB
- IEEE Security & Privacy 2024/MEA Defender - Lv Peizhuo.mp4 15.2 MB
- IEEE Security & Privacy 2022/Committed to Trust A Qualitative Study on Security & Trust in Open Source Software Projects.mp4 15.2 MB
- IEEE Security & Privacy 2023/Hide and Seek with Spectres Efficient discovery of speculative vulnerabilities with random testing.mp4 15.2 MB
- IEEE Security & Privacy 2023/Detection of Inconsistencies in Privacy Practices of Browser Extensions.mp4 15.2 MB
- IEEE Security & Privacy 2016/Downgrade Resilience in Key-Exchange Protocols.mp4 15.2 MB
- IEEE Security & Privacy 2018/Double-efficient zkSNARKs Without Trusted Setup.mp4 15.2 MB
- IEEE Security & Privacy 2016/Shreds - Fine-grained Execution Units with Private Memory.mp4 15.2 MB
- IEEE Security & Privacy 2018/xJsnark - A Framework for Efficient Verifiable Computation.mp4 15.1 MB
- IEEE Security & Privacy 2023/mmEcho A mmWave-based Acoustic Eavesdropping Method.mp4 15.1 MB
- IEEE Security & Privacy 2023/Deepfake Text Detection Limitations and Opportunities.mp4 15.1 MB
- IEEE Security & Privacy 2022/The State of the SameSite Studying the Usage, Effectiveness, and Adequacy of SameSite Cookies.mp4 15.1 MB
- IEEE Security & Privacy 2024/2024 449 Undefined oriented Programming - Detecting and Chaining Prototype Pollution Gadgets in Node.mp4 15.1 MB
- IEEE Security & Privacy 2023/WeRLman To Tackle Whale (Transactions), Go Deep (RL).mp4 15.1 MB
- IEEE Security & Privacy 2016/Key Confirmation in Key Exchange - A Formal Treatment and Implications for TLS 1.3.mp4 15.1 MB
- IEEE Security & Privacy 2018/Distance-Bounding Protocols - Verification without Time and Location.mp4 15.0 MB
- IEEE Security & Privacy 2018/Tracking Ransomware End-to-end.mp4 15.0 MB
- IEEE Security & Privacy 2022/SAILFISH Vetting Smart Contract State-Inconsistency Bugs in Seconds.mp4 15.0 MB
- IEEE Security & Privacy 2017/Under the Shadow of Sunshine - Understanding & Detecting Bulletproof Hosting.mp4 15.0 MB
- IEEE Security & Privacy 2018/Towards Security and Privacy for Multi User Augmented Reality.mp4 15.0 MB
- IEEE Security & Privacy 2019/IEEE S&P 2019 - Opening Remarks - Program Chair.mp4 15.0 MB
- IEEE Security & Privacy 2023/Understanding the Security and Privacy Attitudes of Smart Home Users on Reddit.mp4 15.0 MB
- IEEE Security & Privacy 2023/SoK History is a Vast Early Warning System Auditing the Provenance of System Intrusions.mp4 15.0 MB
- IEEE Security & Privacy 2016/Inferring User Routes and Locations using Zero-Permission Mobile Sensors.mp4 15.0 MB
- IEEE Security & Privacy 2022/Multi-Server Verifiable Computation of Low-Degree Polynomials.mp4 15.0 MB
- IEEE Security & Privacy 2018/vRAM - Faster Verifiable RAM With Program-Independent Preprocessing.mp4 15.0 MB
- IEEE Security & Privacy 2023/FLUTE Fast and Secure Lookup Table Evaluations.mp4 14.9 MB
- IEEE Security & Privacy 2016/Data-Oriented Programming - On the Expressiveness of Non-Control Data Attacks.mp4 14.9 MB
- IEEE Security & Privacy 2024/ALIF Low Cost Adversarial Audio Attacks on Black Box Speech Platforms using Linguistic Features.mp4 14.9 MB
- IEEE Security & Privacy 2023/Half&Half Demystifying Intel’s Directional Branch Predictors for Fast, Secure Partitioned Execution.mp4 14.9 MB
- IEEE Security & Privacy 2022/AccEar Accelerometer Acoustic Eavesdropping with Unconstrained Vocabulary.mp4 14.9 MB
- IEEE Security & Privacy 2016/LAVA - Large-scale Automated Vulnerability Addition.mp4 14.9 MB
- IEEE Security & Privacy 2022/Analyzing Ground-Truth Data of Mobile Gambling Scam.mp4 14.8 MB
- IEEE Security & Privacy 2016/SoK - Everyone Hates Robocalls - A Survey of Techniques against Telephone Spam.mp4 14.8 MB
- IEEE Security & Privacy 2018/The Rise of the Citizen Developer - Assessing the Security Impact of Online App Generators.mp4 14.8 MB
- IEEE Security & Privacy 2016/Return to the Zombie Gadgets - Undermining Destructive Code Reads via Code-Inference Attacks.mp4 14.8 MB
- IEEE Security & Privacy 2023/When and Why Do People Want Ad Targeting Explanations Evidence from a Mixed-Methods Field Study.mp4 14.8 MB
- IEEE Security & Privacy 2022/Hark A Deep Learning System for Navigating Privacy Feedback at Scale.mp4 14.7 MB
- IEEE Security & Privacy 2020/HydRand Efficient Continuous Distributed Randomness.mp4 14.7 MB
- IEEE Security & Privacy 2024/43 P4Control Line Rate Cross Host Attack Prevention via In Network Information Flow Control Enabled.mp4 14.7 MB
- IEEE Security & Privacy 2024/2024 567 More is Merrier Relax the Non Collusion Assumption in Multi Server PIR - esnierde.mp4 14.7 MB
- IEEE Security & Privacy 2023/Blue's Clues Practical Discovery of Non-Discoverable Bluetooth Devices.mp4 14.7 MB
- IEEE Security & Privacy 2022/Scraping Sticky Leftovers App User Information Left on Servers After Account Deletion.mp4 14.7 MB
- IEEE Security & Privacy 2022/WtaGraph Web Tracking and Advertising Detection using Graph Neural Networks.mp4 14.6 MB
- IEEE Security & Privacy 2018/Angora - Efficient Fuzzing by Principled Search.mp4 14.6 MB
- IEEE Security & Privacy 2023/Attitudes towards Client-Side Scanning for CSAM, Terrorism, Drug Trafficking, Drug Use, Tax Evasion.mp4 14.6 MB
- IEEE Security & Privacy 2023/WaVe A Verifiably Secure WebAssembly Sandboxing Runtime.mp4 14.6 MB
- IEEE Security & Privacy 2024/2024 637 Poisoned ChatGPT Finds Work for Idle Hands Exploring Developers - Coding Practices with Inse.mp4 14.6 MB
- IEEE Security & Privacy 2016/Automated Analysis and Verification of TLS 1.3 - 0-RTT, Resumption and Delayed Authentication.mp4 14.6 MB
- IEEE Security & Privacy 2016/SoK - Towards Grounding Censorship Circumvention in Empiricism.mp4 14.5 MB
- IEEE Security & Privacy 2019/EmPoWeb Empowering Web Applications with Browser Extensions.mp4 14.5 MB
- IEEE Security & Privacy 2023/SoK Let the Privacy Games Begin A Unified Treatment of Data Inference Privacy in Machine Learning.mp4 14.5 MB
- IEEE Security & Privacy 2016/Domain-Z - 28 Registrations Later.mp4 14.5 MB
- IEEE Security & Privacy 2022/COBRA Dynamic Proactive Secret Sharing for Confidential BFT Services.mp4 14.5 MB
- IEEE Security & Privacy 2023/SPHINCSC Compressing SPHINCS With (Almost) No Cost.mp4 14.5 MB
- IEEE Security & Privacy 2021/Poltergeist Acoustic Manipulation of Image Stabilization towards Object Mis-Labeling.mp4 14.5 MB
- IEEE Security & Privacy 2018/Enumerating Active IPv6 Hosts for Large-scale Security Scans via DNSSEC-signed Reverse Zones.mp4 14.5 MB
- IEEE Security & Privacy 2018/Static Evaluation of Noninterference using Approximate Model Counting.mp4 14.5 MB
- IEEE Security & Privacy 2016/A Tough call - Mitigating Advanced Code-Reuse Attacks At The Binary Level.mp4 14.5 MB
- IEEE Security & Privacy 2023/Always Contribute Back A Qualitative Study on Security Challenges of the Open Source Supply Chain.mp4 14.4 MB
- IEEE Security & Privacy 2023/Teaching and Learning Cybersecurity and AI Ethics in High School.mp4 14.4 MB
- IEEE Security & Privacy 2018/PIR with Compressed Queries and Amortized Query Processing.mp4 14.4 MB
- IEEE Security & Privacy 2023/PCspooF Compromising the Safety of Time-Triggered Ethernet.mp4 14.3 MB
- IEEE Security & Privacy 2019/Helen Maliciously Secure Coopetitive Learning for Linear Models.mp4 14.3 MB
- IEEE Security & Privacy 2024/2024 237 SoK Unintended Interactions among ML Defenses and Risks - Vasisht Duddu.mp4 14.3 MB
- IEEE Security & Privacy 2024/2024 196 The Times They Are A Changin - Christos Tsoukaladelis.mp4 14.3 MB
- IEEE Security & Privacy 2018/Protecting the Stack with Metadata Policies and Tagged Hardware.mp4 14.3 MB
- IEEE Security & Privacy 2018/Compiler-assisted Code Randomization.mp4 14.3 MB
- IEEE Security & Privacy 2023/Adaptive Risk-Limiting Comparison Audits.mp4 14.2 MB
- IEEE Security & Privacy 2024/2024 606 BOLT Privacy Preserving, Accurate and Efficient Inference for Transformers - Qi Pang.mp4 14.2 MB
- IEEE Security & Privacy 2022/Automated Attack Synthesis by Extracting Finite State Machines from Protocol Specification Documents.mp4 14.2 MB
- IEEE Security & Privacy 2023/Characterizing Everyday Misuse of Smart Home Devices.mp4 14.2 MB
- IEEE Security & Privacy 2024/Leaky Address Masking - Mathé Hertogh 1.mp4 14.2 MB
- IEEE Security & Privacy 2024/2024 158 Jaehan Kim PassREfinder Credential Stuffing Risk Prediction by Representing Password Reuse.mp4 14.1 MB
- IEEE Security & Privacy 2023/IPvSeeYou Exploiting Leaked Identifiers in IPv6 for Street-Level Geolocation.mp4 14.1 MB
- IEEE Security & Privacy 2023/DeHiREC Detecting Hidden Voice Recorders via ADC Electromagnetic Radiation.mp4 14.1 MB
- IEEE Security & Privacy 2023/ShadowNet A Secure and Efficient On-device Model Inference System for Convolutional Neural Networks.mp4 14.1 MB
- IEEE Security & Privacy 2023/The Leaky Web Automated Discovery of Cross-Site Information Leaks in Browsers and the Web.mp4 14.1 MB
- IEEE Security & Privacy 2016/Multiple Handshakes Security of TLS 1.3 Candidates.mp4 14.1 MB
- IEEE Security & Privacy 2023/3DFed Adaptive and Extensible Framework for Covert Backdoor Attack in Federated Learning.mp4 14.1 MB
- IEEE Security & Privacy 2023/User Perceptions and Experiences with Smart Home Updates.mp4 14.1 MB
- IEEE Security & Privacy 2019/Bitcoin vs. Bitcoin Cash Coexistence or Downfall of Bitcoin Cash.mp4 14.1 MB
- IEEE Security & Privacy 2018/Manipulating Machine Learning - Poisoning Attacks & Countermeasures.mp4 14.1 MB
- IEEE Security & Privacy 2019/Postcards from the Post HTTP World Amplification of HTTPS Vulnerabilities in the Web Ecosystem.mp4 14.1 MB
- IEEE Security & Privacy 2022/SecFloat Accurate Floating-Point meets Secure 2-Party Computation.mp4 14.1 MB
- IEEE Security & Privacy 2023/MEGA Malleable Encryption Goes Awry.mp4 14.1 MB
- IEEE Security & Privacy 2023/SoK Cryptographic Neural-Network Computation.mp4 14.0 MB
- IEEE Security & Privacy 2022/SoK Authentication in Augmented and Virtual Reality.mp4 14.0 MB
- IEEE Security & Privacy 2024/The Role of User Agent Interactions on Mobile Money Practices - Karen Sowon.mp4 14.0 MB
- IEEE Security & Privacy 2022/Jigsaw Efficient and Scalable Path Constraints Fuzzing.mp4 14.0 MB
- IEEE Security & Privacy 2022/Adversarial Prefetch New Cross-Core Cache Side Channel Attacks.mp4 14.0 MB
- IEEE Security & Privacy 2018/OmniLedger - A Secure, Scale-Out, Decentralized Ledger via Sharding.mp4 14.0 MB
- IEEE Security & Privacy 2023/SoK A Critical Evaluation of Efficient Website Fingerprinting Defenses.mp4 14.0 MB
- IEEE Security & Privacy 2023/ELSA Secure Aggregation for Federated Learning with Malicious Actors.mp4 14.0 MB
- IEEE Security & Privacy 2016/Prepose - Privacy, Security, and Reliability for Gesture-Based Programming.mp4 13.9 MB
- IEEE Security & Privacy 2018/Study and Mitigation of Origin Stripping Vulnerabilities in Hybrid-postMessage Enabled Mobile Apps.mp4 13.9 MB
- IEEE Security & Privacy 2023/D-DAE Defense-Penetrating Model Extraction Attacks.mp4 13.9 MB
- IEEE Security & Privacy 2018/Bulletproofs - Short Proofs for Confidential Transactions and More.mp4 13.9 MB
- IEEE Security & Privacy 2018/Mobile Application Web API Reconnaissance.mp4 13.9 MB
- IEEE Security & Privacy 2024/SP24 HD - Florian Hantke.mp4 13.9 MB
- IEEE Security & Privacy 2023/PublicCheck Public Integrity Verification for Services of Run-time Deep Models.mp4 13.9 MB
- IEEE Security & Privacy 2023/Practical Program Modularization with Type-Based Dependence Analysis.mp4 13.9 MB
- IEEE Security & Privacy 2024/6 Efficient Zero knowledge Arguments for Paillier Cryptosystem - Rae Gong1.mp4 13.9 MB
- IEEE Security & Privacy 2020/SEIMI Efficient and Secure SMAP-Enabled Intra-process Memory Isolation.mp4 13.9 MB
- IEEE Security & Privacy 2024/6 Efficient Zero knowledge Arguments for Paillier Cryptosystem - Rae Gong.mp4 13.8 MB
- IEEE Security & Privacy 2023/RoFL Robustness of Secure Federated Learning.mp4 13.8 MB
- IEEE Security & Privacy 2018/T-Fuzz Fuzzing by Program Transformation - Hui Peng.mp4 13.8 MB
- IEEE Security & Privacy 2018/Learning from Mutants - Using Code Mutation to Learn and Monitor Invariants of a CPS.mp4 13.7 MB
- IEEE Security & Privacy 2023/mmSpoof Resilient Spoofing of Automotive Millimeter-wave Radars using Reflect Array.mp4 13.7 MB
- IEEE Security & Privacy 2018/Sonar - Detecting SS7 Redirection Attacks With Audio-Based Distance Bounding.mp4 13.7 MB
- IEEE Security & Privacy 2023/TEEzz Fuzzing Trusted Applications on COTS Android Devices.mp4 13.7 MB
- IEEE Security & Privacy 2023/Multi-Round Single-Server Secure Aggregation with Applications to Private Federated Learning.mp4 13.7 MB
- IEEE Security & Privacy 2018/Implementing Conjunction Obfuscation under Entropic Ring LWE.mp4 13.7 MB
- IEEE Security & Privacy 2021/Method Confusion Attack on the Bluetooth Pairing Process.mp4 13.7 MB
- IEEE Security & Privacy 2023/Threshold Signatures in the Multiverse.mp4 13.6 MB
- IEEE Security & Privacy 2024/Automated Synthesis of Effect Graph Policies for Microservice Aware Stateful System Call Special.mp4 13.6 MB
- IEEE Security & Privacy 2020/The Many Kinds of Creepware Used for Interpersonal Attacks.mp4 13.6 MB
- IEEE Security & Privacy 2018/Speechless - Analyzing the Threat to Speech Privacy from Smartphone Motion Sensors.mp4 13.6 MB
- IEEE Security & Privacy 2023/SoK Certified Robustness for Deep Neural Networks.mp4 13.6 MB
- IEEE Security & Privacy 2018/Racing in Hyperspace - Closing Hyper Threading Side Channels on SGX.mp4 13.6 MB
- IEEE Security & Privacy 2018/EnclaveDB - A Secure Database using SGX.mp4 13.6 MB
- IEEE Security & Privacy 2023/Towards a Rigorous Statistical Analysis of Empirical Password Datasets.mp4 13.6 MB
- IEEE Security & Privacy 2018/Grand Pwning Unit - Accelerating Microarchitectural Attacks with the GPU.mp4 13.6 MB
- IEEE Security & Privacy 2022/A Secret-Free Hypervisor Rethinking Isolation in the Age of Speculative Vulnerabilities.mp4 13.5 MB
- IEEE Security & Privacy 2021/PLATYPUS Software-based Power Side-Channel Attacks on x86.mp4 13.5 MB
- IEEE Security & Privacy 2023/REDEEM MYSELF Purifying Backdoors in Deep Learning Models using Self Attention Distillation.mp4 13.5 MB
- IEEE Security & Privacy 2021/OSPREY Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary.mp4 13.5 MB
- IEEE Security & Privacy 2023/BLEDiff - Scalable and Property-Agnostic Noncompliance Checking for BLE Implementations.mp4 13.4 MB
- IEEE Security & Privacy 2023/OWL Compositional Verification of Security Protocols via an Information-Flow Type System.mp4 13.4 MB
- IEEE Security & Privacy 2024/2024 22 BUSted Microarchitectural Side Channel Attacks on the MCU Bus Interconnect - Cristiano Rodri.mp4 13.4 MB
- IEEE Security & Privacy 2020/Intriguing Properties of Adversarial ML Attacks in the Problem Space.mp4 13.4 MB
- IEEE Security & Privacy 2023/One Key to Rule Them All Secure Group Pairing for Heterogeneous IoT Devices.mp4 13.4 MB
- IEEE Security & Privacy 2023/Scaling JavaScript Abstract Interpretation to Detect and Exploit Node.js Taint-style Vulnerability.mp4 13.4 MB
- IEEE Security & Privacy 2018/Privacy Risks with Facebook's PII-based Targeting.mp4 13.4 MB
- IEEE Security & Privacy 2023/VIDEZZO Dependency-aware Virtual Device Fuzzing.mp4 13.4 MB
- IEEE Security & Privacy 2024/Saiid El Hajj Chehade SINBAD 20 min - Saiid El Hajj Chehade.mp4 13.4 MB
- IEEE Security & Privacy 2022/Differentially Private Histograms in the Shuffle Model from Fake Users.mp4 13.3 MB
- IEEE Security & Privacy 2016/Back in Black - Towards Formal, Black Box Analysis of Sanitizers and Filters.mp4 13.3 MB
- IEEE Security & Privacy 2020/A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network.mp4 13.3 MB
- IEEE Security & Privacy 2024/211 - Multi Instance Adversarial Attack on GNN Based Malicious Domain Detection - Mahmoud Khaled Ahm.mp4 13.3 MB
- IEEE Security & Privacy 2023/SyzDescribe Principled, Automated, Static Generation of Syscall Descriptions for Kernel Drivers.mp4 13.3 MB
- IEEE Security & Privacy 2024/SHERPA Explainable Robust Algorithms for Privacy Preserved Federated Learning in Future Networks.mp4 13.3 MB
- IEEE Security & Privacy 2023/Private Collaborative Data Cleaning via Non-Equi PSI.mp4 13.3 MB
- IEEE Security & Privacy 2016/SoK - (State of) The Art of War - Offensive Techniques in Binary Analysis.mp4 13.3 MB
- IEEE Security & Privacy 2020/Leveraging EM Side-Channel Information to Detect Rowhammer Attacks.mp4 13.3 MB
- IEEE Security & Privacy 2024/Targeted and Troublesome Zahra Moti - Zahra Moti.mp4 13.3 MB
- IEEE Security & Privacy 2024/Group Oblivious Message Retrieval - Thomas.mp4 13.3 MB
- IEEE Security & Privacy 2024/SrcMarker Dual channel Source Code Watermarking via Scalable Code Transformations - 杨博睿.mp4 13.2 MB
- IEEE Security & Privacy 2024/Break the Wall from bottom Automated Discovery of Protocol Level Evasion Vulnerabilities in Web.mp4 13.2 MB
- IEEE Security & Privacy 2023/Silph A Framework for Scalable and Accurate Generation of Hybrid MPC Protocols.mp4 13.2 MB
- IEEE Security & Privacy 2021/SoK Hate, Harassment, and the Changing Landscape of Online Abuse.mp4 13.2 MB
- IEEE Security & Privacy 2016/You Get Where You're Looking For - The Impact Of Information Sources On Code Security.mp4 13.2 MB
- IEEE Security & Privacy 2022/Quantifying Blockchain Extractable Value How dark is the forest.mp4 13.2 MB
- IEEE Security & Privacy 2023/SoK Decentralized Finance (DeFi) Attacks.mp4 13.2 MB
- IEEE Security & Privacy 2021/Randomized Last-Level Caches Are Still Vulnerable to Cache Side-Channel Attacks But We Can Fix It.mp4 13.2 MB
- IEEE Security & Privacy 2023/Mew Enabling Large-Scale and Dynamic Link-Flooding Defenses on Programmable Switches.mp4 13.2 MB
- IEEE Security & Privacy 2023/WebSpec Towards Machine-Checked Analysis of Browser Security Mechanisms.mp4 13.2 MB
- IEEE Security & Privacy 2023/Uncovering User Interactions on Smartphones via Contactless Wireless Charging Side Channels.mp4 13.1 MB
- IEEE Security & Privacy 2016/Seeking Nonsense, Looking for Trouble - Efficient Promotional-Infection Detection through.mp4 13.1 MB
- IEEE Security & Privacy 2020/Birds of a Feather A Hardware & Security Panel (Deprecated).mp4 13.1 MB
- IEEE Security & Privacy 2018/Computer Security and Privacy for Refugees in the United States.mp4 13.1 MB
- IEEE Security & Privacy 2018/Crowd-GPS-Sec - Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks.mp4 13.0 MB
- IEEE Security & Privacy 2023/Weak Fiat-Shamir Attacks on Modern Proof Systems.mp4 13.0 MB
- IEEE Security & Privacy 2023/From 5G Sniffing to Harvesting Leakages of Privacy-Preserving Messengers.mp4 13.0 MB
- IEEE Security & Privacy 2023/UTOPIA Automatic Generation of Fuzz Driver using Unit Tests.mp4 13.0 MB
- IEEE Security & Privacy 2022/Investigating the Use of Email Encryption for an Entire University.mp4 13.0 MB
- IEEE Security & Privacy 2017/Membership Inference Attacks against Machine Learning Models.mp4 12.9 MB
- IEEE Security & Privacy 2024/2024 144 Withdrawing is believing Detecting Inconsistencies between Withdrawal Choices and Third par.mp4 12.9 MB
- IEEE Security & Privacy 2016/Cache Storage Channels - Alias-Driven Attacks and Verified Countermeasures.mp4 12.9 MB
- IEEE Security & Privacy 2023/Beyond Phish Toward Detecting Fraudulent e-Commerce Websites at Scale.mp4 12.9 MB
- IEEE Security & Privacy 2023/Sound Verification of Security Protocols From Design to Interoperable Implementations.mp4 12.9 MB
- IEEE Security & Privacy 2023/No One Drinks From the Firehose How Organizations Filter and Prioritize Vulnerability Information.mp4 12.9 MB
- IEEE Security & Privacy 2018/Locally Differentially Private Frequent Itemset Mining.mp4 12.9 MB
- IEEE Security & Privacy 2023/A Generic, Efficient, and Effortless Solver with Self-Supervised Learning for Breaking Text Captchas.mp4 12.9 MB
- IEEE Security & Privacy 2024/NodeAwareSmoothing - Yuni Lai Lena.mp4 12.8 MB
- IEEE Security & Privacy 2023/Skilled or Gullible Gender Stereotypes Related to Computer Security and Privacy.mp4 12.8 MB
- IEEE Security & Privacy 2016/A Method for Verifying Privacy-Type Properties - The Unbounded Case.mp4 12.8 MB
- IEEE Security & Privacy 2023/RuleKeeper GDPR-Aware Personal Data Compliance for Web Frameworks.mp4 12.7 MB
- IEEE Security & Privacy 2023/SoK Taxonomy of Attacks on Open-Source Software Supply Chains.mp4 12.7 MB
- IEEE Security & Privacy 2023/Disassembling ARM Binaries by Lightweight Superset Instruction Interpretation and Graph Modeling.mp4 12.7 MB
- IEEE Security & Privacy 2019/IEEE S&P 2019 - Opening Remarks - General Chair.mp4 12.7 MB
- IEEE Security & Privacy 2023/Disguising Attacks with Explanation-Aware Backdoors.mp4 12.7 MB
- IEEE Security & Privacy 2023/DVFS Frequently Leaks Secrets Hertzbleed Attacks Beyond SIKE, Cryptography, and CPU-Only Data.mp4 12.7 MB
- IEEE Security & Privacy 2023/Less Is More Refinement Proofs for Probabilistic Proofs.mp4 12.6 MB
- IEEE Security & Privacy 2024/From Virtual Touch to Tesla Command Unlocking Unauthenticated Control Chains From Smart Glasses.mp4 12.6 MB
- IEEE Security & Privacy 2024/#144 TCP Spoofing Reliable Payload Transmission Past the Spoofed TCP Handshake - Eric Pan.mp4 12.6 MB
- IEEE Security & Privacy 2018/SoK - Plug & Pray - Today - Understanding USB Insecurity in Versions 1 through C.mp4 12.6 MB
- IEEE Security & Privacy 2023/Discovering Java Deserialization Vulnerabilities via Structure-Aware Directed Greybox Fuzzing.mp4 12.6 MB
- IEEE Security & Privacy 2020/OHIE Blockchain Scaling Made Simple.mp4 12.6 MB
- IEEE Security & Privacy 2023/Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation.mp4 12.6 MB
- IEEE Security & Privacy 2021/SoK All You Ever Wanted to Know About Binary Disassembly But Were Afraid to Ask.mp4 12.5 MB
- IEEE Security & Privacy 2024/2024 11 NetShuffle Circumventing Censorship with Shuffle Proxies at the Edge - Patrick Kon.mp4 12.5 MB
- IEEE Security & Privacy 2023/Protected or Porous A Comparative Analysis of Threat Detection Capability of IoT Safeguards.mp4 12.5 MB
- IEEE Security & Privacy 2016/Hawk - The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts.mp4 12.5 MB
- IEEE Security & Privacy 2019/Kiss from a Rogue Evaluating Detectability of Pay-at-the-Pump Card Skimmers.mp4 12.5 MB
- IEEE Security & Privacy 2023/Improving Developers' Understanding of Regex Denial of Service Tools.mp4 12.4 MB
- IEEE Security & Privacy 2021/STOCHFUZZ Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic.mp4 12.4 MB
- IEEE Security & Privacy 2020/SEVurity No Security Without Integrity - Breaking Integrity.mp4 12.4 MB
- IEEE Security & Privacy 2024/GAuV - Xingyu Xie.mp4 12.4 MB
- IEEE Security & Privacy 2018/Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage.mp4 12.4 MB
- IEEE Security & Privacy 2023/Design and Evaluation of Inclusive Email Security Indicators for People with Visual Impairments.mp4 12.4 MB
- IEEE Security & Privacy 2022/Universal Atomic Swaps Secure Exchange of Coins Across All Blockchains.mp4 12.4 MB
- IEEE Security & Privacy 2016/Sending out an SMS - Characterizing the Security of the SMS Ecosystem with Public Gateways.mp4 12.4 MB
- IEEE Security & Privacy 2024/2024 18 A Practical Root Cause Analysis System with an Under Constrained State Mutation - 박영기.mp4 12.4 MB
- IEEE Security & Privacy 2021/DynPTA Combining Static and Dynamic Analysis for Practical Selective Data Protection.mp4 12.3 MB
- IEEE Security & Privacy 2023/Private Access Control for Function Secret Sharing.mp4 12.3 MB
- IEEE Security & Privacy 2024/Text CRS A Generalized Certified Robustness Framework against Textual Adversarial Attacks - Jane.mp4 12.3 MB
- IEEE Security & Privacy 2024/Understanding the Privacy Practices of Political Campaigns A Perspective from the 2020 US Election.mp4 12.3 MB
- IEEE Security & Privacy 2023/Practically-Exploitable Cryptographic Vulnerabilities in Matrix.mp4 12.3 MB
- IEEE Security & Privacy 2016/No Pardon for the Interruption - New Inference Attacks on Android Through Interrupt Timing Analysis.mp4 12.3 MB
- IEEE Security & Privacy 2023/How IoT Re-using Threatens Your Sensitive Data Exploring the User-Data Disposal in Used IoT Devices.mp4 12.2 MB
- IEEE Security & Privacy 2023/Clockwork Finance Automated Analysis of Economic Security in Smart Contracts.mp4 12.2 MB
- IEEE Security & Privacy 2024/Tabbed Out Subverting the Android Custom Tab Security Model - Philipp Beer.mp4 12.2 MB
- IEEE Security & Privacy 2023/An Interview on the Security and Privacy Development Practices in Turkish Software Startups.mp4 12.2 MB
- IEEE Security & Privacy 2018/Stealing Hyperparameters in Machine Learning.mp4 12.2 MB
- IEEE Security & Privacy 2023/Leveraging Sandboxes for a Minimally Invasive Browser Fingerprinting Defense.mp4 12.2 MB
- IEEE Security & Privacy 2022/Device Fingerprinting with Peripheral Timestamps.mp4 12.2 MB
- IEEE Security & Privacy 2021/SoK Security and Privacy in the Age of Commercial Drones.mp4 12.2 MB
- IEEE Security & Privacy 2023/Vulnerability Discovery for All Experiences of Marginalization in Vulnerability Discovery.mp4 12.2 MB
- IEEE Security & Privacy 2020/Pseudorandom Black Swans Cache Attacks on CTR DRBG.mp4 12.2 MB
- IEEE Security & Privacy 2023/TeSec Accurate Server-side Attack Investigation for Web Applications.mp4 12.2 MB
- IEEE Security & Privacy 2020/xMP Selective Memory Protection for Kernel and User Space.mp4 12.2 MB
- IEEE Security & Privacy 2018/Surveylance - Automatically Detecting Online Survey Scams.mp4 12.1 MB
- IEEE Security & Privacy 2021/Epochal Signatures for Deniable Group Chats.mp4 12.1 MB
- IEEE Security & Privacy 2018/Opening Remarks of the 39th IEEE Symposium on Security & Privacy.mp4 12.1 MB
- IEEE Security & Privacy 2023/TrojanModel A Practical Trojan Attack against Automatic Speech Recognition Systems.mp4 12.1 MB
- IEEE Security & Privacy 2016/I Think They're Trying to Tell Me Something - Advice Sources and Selection for Digital Security.mp4 12.1 MB
- IEEE Security & Privacy 2021/Using Selective Memoization to Defeat Regular Expression Denial of Service (ReDoS).mp4 12.1 MB
- IEEE Security & Privacy 2024/Signing in Four Public Software Package Registries Quantity, Quality, and Influencing Factors.mp4 12.1 MB
- IEEE Security & Privacy 2023/QueryX Symbolic Query on Decompiled Code for Finding Bugs in COTS Binaries.mp4 12.1 MB
- IEEE Security & Privacy 2021/Breaking the Specification Certified PDF.mp4 12.1 MB
- IEEE Security & Privacy 2024/Security Privacy and Data Sharing Challenges When Moving to the US Insights from a Qualitative s.mp4 12.1 MB
- IEEE Security & Privacy 2023/REGA Scalable Rowhammer Mitigation with Refresh-Generating Activations.mp4 12.0 MB
- IEEE Security & Privacy 2023/BlindHub Bitcoin-Compatible Privacy-Preserving Payment Channel Hubs Supporting Variable Amounts.mp4 12.0 MB
- IEEE Security & Privacy 2023/MagBackdoor Beware of Your Loudspeaker as A Backdoor For Magnetic Injection Attacks.mp4 12.0 MB
- IEEE Security & Privacy 2021/Happer Unpacking Android Apps via a Hardware-Assisted Approach.mp4 12.0 MB
- IEEE Security & Privacy 2023/Tyr Finding Consensus Failure Bugs in Blockchain System with Behaviour Divergent Model.mp4 12.0 MB
- IEEE Security & Privacy 2020/Establishing Economic Incentives for Security Patching of IoT Consumer Products.mp4 12.0 MB
- IEEE Security & Privacy 2024/don't Shoot the Messenger - Localization Prevention of Satellite Internet Users - Richard Mitev.mp4 12.0 MB
- IEEE Security & Privacy 2024/2024 108 DeepShuffle A Lightweight Defense Framework against Adversarial Fault Injection Attacks on.mp4 12.0 MB
- IEEE Security & Privacy 2019/Lay Down the Common Metrics Evaluating Proof of Work Consensus Protocols' Security.mp4 12.0 MB
- IEEE Security & Privacy 2023/Scatter and Split Securely Defeating Cache Contention and Occupancy Attacks.mp4 11.9 MB
- IEEE Security & Privacy 2020/Are We Susceptible to Rowhammer An End-to-End Methodology for Cloud Providers.mp4 11.9 MB
- IEEE Security & Privacy 2022/Why Crypto-detectors Fail A Systematic Evaluation of Cryptographic Misuse Detection Techniques.mp4 11.9 MB
- IEEE Security & Privacy 2024/Practical Attacks Against DNS Reputation Systems.mp4 11.9 MB
- IEEE Security & Privacy 2024/415 - SoK Efficient Design and Implementation of Polynomial Hash Functions over Prime Fields - Jan G.mp4 11.9 MB
- IEEE Security & Privacy 2024/attackinng byzantine robustness in high dimensions - kolluri aashish.mp4 11.9 MB
- IEEE Security & Privacy 2021/Merkle2 A Low-Latency Transparency Log System.mp4 11.9 MB
- IEEE Security & Privacy 2018/Anonymity Trilemma - Strong Anonymity, Low Bandwidth Overhead, Low Latency - Choose Two.mp4 11.9 MB
- IEEE Security & Privacy 2020/SAVIOR Towards Bug-Driven Hybrid Testing.mp4 11.9 MB
- IEEE Security & Privacy 2022/BEACON - Directed Grey-Box Fuzzing with Provable Path Pruning.mp4 11.9 MB
- IEEE Security & Privacy 2019/Demystifying Hidden Privacy Settings in Mobile Apps.mp4 11.8 MB
- IEEE Security & Privacy 2023/SQUIP Exploiting the Scheduler Queue Contention Side Channel.mp4 11.8 MB
- IEEE Security & Privacy 2023/Investigating Package Related Security Threats in Software Registries.mp4 11.8 MB
- IEEE Security & Privacy 2024/Nightshade Prompt Specific Poisoning Attacks on Text to Image Generative Models - Shawn Shan.mp4 11.8 MB
- IEEE Security & Privacy 2023/Jigsaw Puzzle Selective Backdoor Attack to Subvert Malware Classifiers.mp4 11.8 MB
- IEEE Security & Privacy 2022/Four Attacks and a Proof for Telegram.mp4 11.8 MB
- IEEE Security & Privacy 2023/FIDO2, CTAP 2.1, and WebAuthn 2 Provable Security and Post-Quantum Instantiation.mp4 11.8 MB
- IEEE Security & Privacy 2018/SoK - Keylogging Side Channels.mp4 11.7 MB
- IEEE Security & Privacy 2023/EC Embedded Systems Compartmentalization via Intra-Kernel Isolation.mp4 11.7 MB
- IEEE Security & Privacy 2021/Security of Multi-Sensor Fusion based Perception in Autonomous Driving Under Physical-World Attacks.mp4 11.7 MB
- IEEE Security & Privacy 2024/2024 100 The Dark Side of Scale Insecurity of Direct to Cell Satellite Mega Constellations - 刘威.mp4 11.7 MB
- IEEE Security & Privacy 2020/Flaw Label Exploiting IPv6 Flow Label.mp4 11.7 MB
- IEEE Security & Privacy 2023/On Efficient, High-Fidelity and Blind Suppression of Backdoor Effects in Trojaned ML Models.mp4 11.7 MB
- IEEE Security & Privacy 2018/Secure Device Bootstrapping without Secrets Resistant to Signal Manipulation Attacks.mp4 11.7 MB
- IEEE Security & Privacy 2024/2024 456 State aware Fuzzing on Trusted OS Designed for IoT Devices - Qinying.mp4 11.7 MB
- IEEE Security & Privacy 2023/It’s (DOM) Clobbering Time Attack Techniques, Prevalence, and Defenses.mp4 11.7 MB
- IEEE Security & Privacy 2024/SoK Security and Privacy of Blockchain Interoperability - André Augusto.mp4 11.6 MB
- IEEE Security & Privacy 2018/Understanding Linux Malware.mp4 11.6 MB
- IEEE Security & Privacy 2022/Low-Bandwidth Threshold ECDSA via Pseudorandom Correlation Generators.mp4 11.6 MB
- IEEE Security & Privacy 2024/2024 61 ERASAN Efficient Rust Address Sanitizer - Jiun Min.mp4 11.6 MB
- IEEE Security & Privacy 2023/SoK Distributed Randomness Beacons.mp4 11.6 MB
- IEEE Security & Privacy 2022/LinkTeller Recovering Private Edges from Graph Neural Networks via Influence Analysis.mp4 11.6 MB
- IEEE Security & Privacy 2018/Impossibility of Precise and Sound Termination-Sensitive Security Enforcements.mp4 11.5 MB
- IEEE Security & Privacy 2020/RAMBleed Reading Bits in Memory without Accessing Them.mp4 11.5 MB
- IEEE Security & Privacy 2018/FPGA-Based Remote Power Side-Channel Attacks.mp4 11.5 MB
- IEEE Security & Privacy 2023/Low-effort VR Headset User Authentication Using Head-reverberated Sounds with Replay Resistance.mp4 11.5 MB
- IEEE Security & Privacy 2024/SneakyPrompt Jailbreaking Text to image Generative Models - Yuchen Yang.mp4 11.5 MB
- IEEE Security & Privacy 2016/Revisiting Square Root ORAM - Efficient Random Access in Multi-Party Computation.mp4 11.5 MB
- IEEE Security & Privacy 2024/No Privacy Left Outside - Ziqi Zhang.mp4 11.5 MB
- IEEE Security & Privacy 2024/video - Zhen Xiang.mp4 11.5 MB
- IEEE Security & Privacy 2023/MPCAuth Multi-factor Authentication for Distributed-trust Systems.mp4 11.5 MB
- IEEE Security & Privacy 2024/59 Hyena Balancing Packing, Reuse, and Rotations for Encrypted Inference - Sarabjeet Singh.mp4 11.4 MB
- IEEE Security & Privacy 2024/Serberus Protecting Cryptographic Code frrom Spectres at Compile Time - Nicholas Hunter Mosier.mp4 11.4 MB
- IEEE Security & Privacy 2024/Larger scale Nakamoto style Blockchains Don’t Necessarily Offer Better Security - Jannik Albrech.mp4 11.4 MB
- IEEE Security & Privacy 2023/Volttack Control IoT Devices by Manipulating Power Supply Voltage.mp4 11.4 MB
- IEEE Security & Privacy 2022/HAMRAZ Resilient Partitioning and Replication.mp4 11.4 MB
- IEEE Security & Privacy 2023/DevIOus Device-Driven Side-Channel Attacks on the IOMMU.mp4 11.4 MB
- IEEE Security & Privacy 2020/Humpty Dumpty Controlling Word Meanings via Corpus Poisoning.mp4 11.4 MB
- IEEE Security & Privacy 2018/Tracking Certificate Misissuance in the Wild.mp4 11.3 MB
- IEEE Security & Privacy 2021/A Novel Dynamic Analysis Infrastructure to Instrument Untrusted Execution Flow Across User-Kernel.mp4 11.3 MB
- IEEE Security & Privacy 2023/Jolt Recovering TLS Signing Keys via Rowhammer Faults.mp4 11.3 MB
- IEEE Security & Privacy 2018/A Tale of Two Studies - The Best and Worst of YubiKey Usability.mp4 11.3 MB
- IEEE Security & Privacy 2021/Fingerprinting the Fingerprinters Learning to Detect Browser Fingerprinting Behaviors.mp4 11.3 MB
- IEEE Security & Privacy 2024/2024 471 Private Hierarchical Governance for Encrypted Messaging - Armin Namavari.mp4 11.3 MB
- IEEE Security & Privacy 2023/Protecting Models Trained by Multi-party Learning with Differential Privacy.mp4 11.2 MB
- IEEE Security & Privacy 2023/Man-in-the-Middle Attacks without Rogue AP When WPAs Meet ICMP Redirects.mp4 11.2 MB
- IEEE Security & Privacy 2021/CanDID Bootstrapping Decentralized Identity from Legacy Providers.mp4 11.2 MB
- IEEE Security & Privacy 2021/Self-Supervised Euphemism Detection and Identification for Content Moderation.mp4 11.2 MB
- IEEE Security & Privacy 2023/DepthFake Spoofing 3D Face Authentication with a 2D Photo.mp4 11.2 MB
- IEEE Security & Privacy 2024/BULKOR:Enabling Bulk Loading for Path ORAM - Xiang Li.mp4 11.2 MB
- IEEE Security & Privacy 2021/Cross-Domain Access Control Encryption - Arbitrary-policy, Constant-size, Efficient.mp4 11.2 MB
- IEEE Security & Privacy 2023/XFL Naming Functions in Binaries with Extreme Multi-label Learning.mp4 11.2 MB
- IEEE Security & Privacy 2020/TextExerciser Feedback-Driven Text Input Exercising for Android Applications.mp4 11.1 MB
- IEEE Security & Privacy 2024/Rethinking IC Layout Vulnerability Simulation Based Hardware Trojan Threat Assessment with High.mp4 11.1 MB
- IEEE Security & Privacy 2024/Obelix Mitigating Side Channels Through Dynamic Obfuscation - Jan.mp4 11.1 MB
- IEEE Security & Privacy 2020/The State of the Uniform Attacks on Encrypted Databases beyond the Uniform Query Distribution.mp4 11.1 MB
- IEEE Security & Privacy 2020/Ask the Experts What Should Be on an IoT Privacy and Security Label.mp4 11.1 MB
- IEEE Security & Privacy 2024/Springproofs Efficient Inner Product Arguments for Vectors of Arbitrary Length - Ming Su.mp4 11.1 MB
- IEEE Security & Privacy 2024/2024 124 LOKI Large scale Data Reconstruction Attack against Federated Learning through Model Manipu.mp4 11.1 MB
- IEEE Security & Privacy 2022/Arbitrary Modulation of Electromagnetic Noise from Unprivileged Software Impacting Emission Security.mp4 11.1 MB
- IEEE Security & Privacy 2024/UnTrustZone Systematic Accelerated Aging to Expose On chip - Jubayer Mahmod.mp4 11.0 MB
- IEEE Security & Privacy 2020/Path Oblivious Heap Optimal and Practical Oblivious Priority Queue.mp4 11.0 MB
- IEEE Security & Privacy 2024/2024 48 SwiftRange - Vincent.mp4 11.0 MB
- IEEE Security & Privacy 2018/Oblix - An Efficient Oblivious Search Index.mp4 11.0 MB
- IEEE Security & Privacy 2024/Janus Safe Biometric Deduplication for Humanitarian Aid Distribution - kasra EdalatNejad.mp4 11.0 MB
- IEEE Security & Privacy 2016/HDFI - Hardware-Assisted Data-Flow Isolation.mp4 11.0 MB
- IEEE Security & Privacy 2021/Did you mix me Formally Verifying Verifiable Mix Nets in Electronic Voting.mp4 11.0 MB
- IEEE Security & Privacy 2023/FedRecover Recovering from Poisoning Attacks in Federated Learning using Historical Information.mp4 11.0 MB
- IEEE Security & Privacy 2021/Adversarial Watermarking Transformer Towards Tracing Text Provenance with Data Hiding.mp4 11.0 MB
- IEEE Security & Privacy 2016/Dedup Est Machina - Memory Deduplication as an Advanced Exploitation Vector.mp4 11.0 MB
- IEEE Security & Privacy 2024/9 PrunePlumTree - Finding Eviction Sets at Scale - Tom Kissos.mp4 11.0 MB
- IEEE Security & Privacy 2024/2024 25 MQTTactic Security Analysis and Verification for Logic Flaws in MQTT Implementations - szx.mp4 10.9 MB
- IEEE Security & Privacy 2019/Certified Robustness to Adversarial Examples with Differential Privacy.mp4 10.9 MB
- IEEE Security & Privacy 2024/An Analysis of Recent Advances in Deepfake Image Detection in an Evolving Threat Landscape - sif.mp4 10.9 MB
- IEEE Security & Privacy 2020/A Security Analysis of the Facebook Ad Library.mp4 10.9 MB
- IEEE Security & Privacy 2024/LLMIF Augmented Large Language Model for Fuzzing IoT Devices - Jincheng Wang.mp4 10.9 MB
- IEEE Security & Privacy 2023/Accuracy-Privacy Trade-off in Deep Ensemble A Membership Inference Perspective.mp4 10.9 MB
- IEEE Security & Privacy 2024/2024 267 Wear's my Data - Understanding the Cross Device Runtime Permission Model in Wearables - Dogu.mp4 10.9 MB
- IEEE Security & Privacy 2019/On the Feasibility of Rerouting-Based DDoS Defenses.mp4 10.9 MB
- IEEE Security & Privacy 2024/One for All and All for One - GNN based Control Flow Attestation for Embedded Devices - Richard M.mp4 10.8 MB
- IEEE Security & Privacy 2020/Influencing Photo Sharing Decisions on Social Media A Case of Paradoxical Findings.mp4 10.8 MB
- IEEE Security & Privacy 2018/FP-Stalker - Tracking Browser Fingerprint Evolutions - Antoine Vastel.mp4 10.8 MB
- IEEE Security & Privacy 2020/SPECTECTOR Principled Detection of Speculative Information Flows.mp4 10.8 MB
- IEEE Security & Privacy 2020/Throwing Darts in the Dark Detecting Bots with Limited Data using Neural Data Augmentation.mp4 10.8 MB
- IEEE Security & Privacy 2020/A Tale of Sea and Sky On the Security of Maritime VSAT Communications.mp4 10.8 MB
- IEEE Security & Privacy 2020/Automatic Uncovering of Hidden Behaviors from Input Validation in Mobile Apps.mp4 10.8 MB
- IEEE Security & Privacy 2021/Co-Inflow Coarse-grained Information Flow Control for Java-like Languages.mp4 10.8 MB
- IEEE Security & Privacy 2023/CSIRowhammer - Cryptographic Security and Integrity against Rowhammer.mp4 10.8 MB
- IEEE Security & Privacy 2023/Precise Detection of Kernel Data Races with Probabilistic Lockset Analysis.mp4 10.7 MB
- IEEE Security & Privacy 2022/Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms.mp4 10.7 MB
- IEEE Security & Privacy 2020/Automated Reverse Engineering and Privacy Analysis of Modern Cars.mp4 10.7 MB
- IEEE Security & Privacy 2024/S&PFinal - Louis Henri.mp4 10.7 MB
- IEEE Security & Privacy 2019/Short Text, Large Effect Measuring the Impact of User Reviews on Android App Security & Privacy.mp4 10.7 MB
- IEEE Security & Privacy 2023/Three-party Non-linear Computation without Preprocessing for Privacy-preserving Machine Learning.mp4 10.7 MB
- IEEE Security & Privacy 2021/On the Anonymity Guarantees of Anonymous Proof-of-Stake Protocols.mp4 10.7 MB
- IEEE Security & Privacy 2021/Post-Quantum WireGuard.mp4 10.7 MB
- IEEE Security & Privacy 2023/Understanding the (In)Security of Cross-side Face Verification Systems in Mobile Apps.mp4 10.6 MB
- IEEE Security & Privacy 2020/SPECCFI Mitigating Spectre Attacks Using CFI Informed Speculation.mp4 10.6 MB
- IEEE Security & Privacy 2023/Limits of I O Based Ransomware Detection An Imitation Based Attack.mp4 10.6 MB
- IEEE Security & Privacy 2020/Transys Leveraging Common Security Properties across Hardware Designs.mp4 10.6 MB
- IEEE Security & Privacy 2020/AdGraph A Graph-Based Approach to Ad and Tracker Blocking.mp4 10.5 MB
- IEEE Security & Privacy 2024/2024 517 Understanding and Benchmarking the Commonality of Adversarial Examples - cheng yushi.mp4 10.5 MB
- IEEE Security & Privacy 2023/A Security RISC Microarchitectural Attacks on Hardware RISC-V CPUs.mp4 10.5 MB
- IEEE Security & Privacy 2022/Surakav Generating Realistic Traces for a Strong Website Fingerprinting Defense.mp4 10.5 MB
- IEEE Security & Privacy 2024/Nebula A Privacy First Platform for Data Backhaul - Jean Luc Watson.mp4 10.5 MB
- IEEE Security & Privacy 2020/Private Resource Allocators and Their Applications.mp4 10.5 MB
- IEEE Security & Privacy 2021/Machine unlearning.mp4 10.4 MB
- IEEE Security & Privacy 2020/Pangolin Incremental Hybrid Fuzzing with Polyhedral Path Abstraction.mp4 10.4 MB
- IEEE Security & Privacy 2020/Ex-vivo Dynamic Analysis Framework for Android Device Drivers.mp4 10.4 MB
- IEEE Security & Privacy 2024/MPCitH without reputation IEEE S0P online - qw gao.mp4 10.4 MB
- IEEE Security & Privacy 2021/ARBITRAR - User-Guided API Misuse Detection.mp4 10.4 MB
- IEEE Security & Privacy 2024/WeSee Using Malicious #VC Interrupts to Break AMD SEV SNP - Supraja Sridhara.mp4 10.4 MB
- IEEE Security & Privacy 2020/Tactical Provenance Analysis our Endpoint Detection and Response Systems.mp4 10.4 MB
- IEEE Security & Privacy 2020/Unexpected Data Dependency Creation and Chaining A New Attack to SDN.mp4 10.3 MB
- IEEE Security & Privacy 2020/VeriSmart A Highly Precise Safety Verifier for Ethereum Smart Contracts.mp4 10.3 MB
- IEEE Security & Privacy 2021/Detecting AI Trojans Using Meta Neural Analysis.mp4 10.3 MB
- IEEE Security & Privacy 2021/When Function Signature Recovery Meets Compiler Optimization.mp4 10.3 MB
- IEEE Security & Privacy 2020/The Last Mile High-Assurance and High-Speed Cryptographic Implementations.mp4 10.3 MB
- IEEE Security & Privacy 2023/SelectFuzz Efficient Directed Fuzzing with Selective Path Exploration.mp4 10.3 MB
- IEEE Security & Privacy 2024/2024 176 PolySphinx Extending the Sphinx Mix Format with Better Multicast Support - Daniel Schadt.mp4 10.3 MB
- IEEE Security & Privacy 2021/Linking Bluetooth LE & Classic and Implications for Privacy-Preserving Bluetooth-Based Protocols.mp4 10.3 MB
- IEEE Security & Privacy 2021/Compositional Non-Interference for Fine-Grained Concurrent Programs.mp4 10.2 MB
- IEEE Security & Privacy 2020/Cornucopia Temporal Safety for CHERI Heaps.mp4 10.2 MB
- IEEE Security & Privacy 2021/The EMV Standard Break, Fix, Verify.mp4 10.2 MB
- IEEE Security & Privacy 2024/Ehsanul Kabir FLShield A Validation Based Federated Learning Framework to Defend Against Poisonin.mp4 10.2 MB
- IEEE Security & Privacy 2023/Finding Specification Blind Spots via Fuzz Testing.mp4 10.2 MB
- IEEE Security & Privacy 2024/GroVE 20mins S&P - Asim Waheed.mp4 10.2 MB
- IEEE Security & Privacy 2021/Which Privacy and Security Attributes Most Impact Consumers' Risk Perception and Willingness to.mp4 10.2 MB
- IEEE Security & Privacy 2022/SoK Demystifying Binary Lifters Through the Lens of Downstream Applications.mp4 10.2 MB
- IEEE Security & Privacy 2021/Android Custom Permissions Demystified From Privilege Escalation to Design Shortcomings.mp4 10.1 MB
- IEEE Security & Privacy 2023/Continual Observation under User-level Differential Privacy.mp4 10.1 MB
- IEEE Security & Privacy 2023/AI-Guardian Defeating Adversarial Attacks using Backdoors.mp4 10.1 MB
- IEEE Security & Privacy 2020/Browsing Unicity On the Limits of Anonymizing Web Tracking Data.mp4 10.1 MB
- IEEE Security & Privacy 2021/One Engine to Fuzz 'em All Generic Language Processor Testing with Semantic Validation.mp4 10.1 MB
- IEEE Security & Privacy 2020/Plundervolt Software-Based Fault Injection Attacks against Intel SGX.mp4 10.1 MB
- IEEE Security & Privacy 2021/Keep the Dirt Tain'ted TreeKEM, Adaptively and Actively Secure Continuous Group Key Agreement.mp4 10.1 MB
- IEEE Security & Privacy 2018/DEEPSEC - Deciding Equivalence Properties in Security Protocols - Theory and Practice.mp4 10.0 MB
- IEEE Security & Privacy 2021/CacheOut Leaking Data on Intel CPUs via Cache Evictions.mp4 10.0 MB
- IEEE Security & Privacy 2024/2024 125 DeepTheft Stealing DNN Model Architectures through Power Side Channel - Garrison Gao.mp4 10.0 MB
- IEEE Security & Privacy 2023/Low-Cost Privilege Separation with Compile Time Compartmentalization for Embedded Systems.mp4 10.0 MB
- IEEE Security & Privacy 2020/Neutain't Efficient Dynamic Tain't Analysis with Neural Networks.mp4 9.9 MB
- IEEE Security & Privacy 2021/Reading Between the Lines An Extensive Evaluation of the Security and Privacy Implications.mp4 9.9 MB
- IEEE Security & Privacy 2021/Doing good by fighting fraud Ethical anti-fraud systems for mobile payments.mp4 9.9 MB
- IEEE Security & Privacy 2021/Trust, But Verify A Longitudinal Analysis Of Android OEM Compliance and Customization.mp4 9.9 MB
- IEEE Security & Privacy 2021/Good Bot, Bad Bot Characterizing Automated Browsing Activity.mp4 9.9 MB
- IEEE Security & Privacy 2023/Continuous Intrusion Characterizing the Security of Continuous Integration Services.mp4 9.9 MB
- IEEE Security & Privacy 2020/PMP Cost-Effective Forced Execution with Probabilistic Memory Pre-planning.mp4 9.8 MB
- IEEE Security & Privacy 2020/Dragonblood Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd.mp4 9.8 MB
- IEEE Security & Privacy 2018/AI2 - Safety and Robustness Certification of Neural Networks.mp4 9.8 MB
- IEEE Security & Privacy 2024/Scalable Mixed Mode MPC - Radhika Garg.mp4 9.8 MB
- IEEE Security & Privacy 2021/Bookworm Game Automatic Discovery of LTE Vulnerabilities Through Documentation Analysis.mp4 9.8 MB
- IEEE Security & Privacy 2016/Cloak of Visibility - Detecting When Machines Browse a Different Web.mp4 9.7 MB
- IEEE Security & Privacy 2022/MeshUp Stateless Cache Side-channel Attack on CPU Mesh.mp4 9.7 MB
- IEEE Security & Privacy 2024/A Security Analysis of Honey Vaults - Fei Duan.mp4 9.7 MB
- IEEE Security & Privacy 2019/Blind Certificate Authorities.mp4 9.7 MB
- IEEE Security & Privacy 2020/Binsec Rel Efficient Relational Symbolic Execution for Constant-Time at Binary-Level.mp4 9.7 MB
- IEEE Security & Privacy 2021/HackEd A Pedagogical Analysis of Online Vulnerability Discovery Exercises.mp4 9.7 MB
- IEEE Security & Privacy 2020/Krace Data Race Fuzzing for Kernel File Systems.mp4 9.7 MB
- IEEE Security & Privacy 2020/VerX Safety Verification of Smart Contracts.mp4 9.7 MB
- IEEE Security & Privacy 2021/CrossTalk Speculative Data Leaks Across Cores Are Real.mp4 9.7 MB
- IEEE Security & Privacy 2020/WaveSpy Remote and Through-wall Screen Attack via mmWave Sensing.mp4 9.7 MB
- IEEE Security & Privacy 2021/Compositional Security for Reentrant Applications.mp4 9.6 MB
- IEEE Security & Privacy 2024/Pulling Off The Mask Forensic Analysis of the Deceptive Creator Wallets Behind Smart Contract Fr.mp4 9.6 MB
- IEEE Security & Privacy 2024/2024 13 Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis.mp4 9.6 MB
- IEEE Security & Privacy 2021/Improving Password Guessing via Representation Learning.mp4 9.6 MB
- IEEE Security & Privacy 2020/High Precision Open-World Website Fingerprinting.mp4 9.6 MB
- IEEE Security & Privacy 2024/Everyone for Themselves - A Qualitative Study about Individual Security Setups of Open Source Sof.mp4 9.6 MB
- IEEE Security & Privacy 2021/Learning Differentially Private Mechanisms.mp4 9.6 MB
- IEEE Security & Privacy 2024/2024 305 Pianist Scalable zkRollups via Fully Distributed Zero Knowledge Proofs - Tianyi Liu.mp4 9.6 MB
- IEEE Security & Privacy 2021/Ed25519 Signature Schemes Theory and Practice.mp4 9.6 MB
- IEEE Security & Privacy 2020/Transparent Polynomial Delegation and Its Applications to Zero Knowledge Proof.mp4 9.5 MB
- IEEE Security & Privacy 2020/Fuzzing JavaScript Engines with Aspect-Preserving Mutation.mp4 9.5 MB
- IEEE Security & Privacy 2021/Real-World Snapshots vs. Theory Questioning the t-Probing Security Model.mp4 9.5 MB
- IEEE Security & Privacy 2021/Lightweight Techniques for Private Heavy Hitters.mp4 9.5 MB
- IEEE Security & Privacy 2021/CANnon Reliable and Stealthy Remote Shutdown Attacks via Unaltered Automotive Microcontrollers.mp4 9.5 MB
- IEEE Security & Privacy 2020/Breaking and (Partially) Fixing Provably Secure Onion Routing.mp4 9.5 MB
- IEEE Security & Privacy 2020/FlyClient Super-Light Clients for Cryptocurrencies.mp4 9.5 MB
- IEEE Security & Privacy 2021/Lockable Signatures for Blockchains Scriptless Scripts for all Signatures.mp4 9.5 MB
- IEEE Security & Privacy 2020/Understanding and Mitigating Security Risks of General Messaging Protocols on IoT Clouds.mp4 9.5 MB
- IEEE Security & Privacy 2020/SoK Understanding the Prevailing Security Vulnerabilities in TrustZone-Assisted TEE Systems.mp4 9.5 MB
- IEEE Security & Privacy 2024/2023 219 Formal Model Driven Analysis of Resilience of GossipSub to Attacks from Misbehaving Peers.mp4 9.5 MB
- IEEE Security & Privacy 2020/How Not to Prove Your Election Outcome.mp4 9.4 MB
- IEEE Security & Privacy 2020/HopSkipJumpAttack A Query-Efficient Decision-Based Attack.mp4 9.4 MB
- IEEE Security & Privacy 2024/NFCEraser A Security Threat of NFC Message Modification Caused by Quartz Crystal Oscillator - Jo.mp4 9.4 MB
- IEEE Security & Privacy 2024/2024 151 Shedding Light on CVSS Scoring Inconsistencies - A User Centric Study on Evaluating Widespre.mp4 9.4 MB
- IEEE Security & Privacy 2015/Opening Remarks of the 2015 IEEE Symposium on Security & Privacy.mp4 9.4 MB
- IEEE Security & Privacy 2020/TARDIS Rolling Back the Clock on CMS-Targeting Cyber Attacks.mp4 9.4 MB
- IEEE Security & Privacy 2024/tor1 - Zhongtang Luo.mp4 9.4 MB
- IEEE Security & Privacy 2022/DeepCoFFEA Improved Flow Correlation Attacks on Tor via Metric Learning and Amplification.mp4 9.4 MB
- IEEE Security & Privacy 2020/Towards Effective Differential Privacy Comms for Users' Data Sharing Decision and Comprehension.mp4 9.3 MB
- IEEE Security & Privacy 2021/Trouble Over-The-Air An Analysis of FOTA Apps in the Android Ecosystem.mp4 9.3 MB
- IEEE Security & Privacy 2020/Towards a Natural Perspective of Smart Homes for Practical Security and Safety Analyses.mp4 9.3 MB
- IEEE Security & Privacy 2024/Cheng Gongye Side Channel Assisted Reverse Engineering of Encrypted DNN Hardware Accelerator IP.mp4 9.3 MB
- IEEE Security & Privacy 2020/Replicated State Machines without Replicated Execution.mp4 9.3 MB
- IEEE Security & Privacy 2021/Is Private Learning Possible with Instance Encoding.mp4 9.3 MB
- IEEE Security & Privacy 2020/OAT Attesting Operation Integrity of Embedded Devices.mp4 9.3 MB
- IEEE Security & Privacy 2019/Port Contention for Fun and Profit.mp4 9.3 MB
- IEEE Security & Privacy 2024/Flash a comprehensive approach to intrusion detection via provenance graph representation learning.mp4 9.3 MB
- IEEE Security & Privacy 2023/PLA-LiDAR Physical Laser Attacks against LiDAR-based 3D Object Detection in Autonomous Vehicle.mp4 9.2 MB
- IEEE Security & Privacy 2021/ConDySTA Context-Aware Dynamic Supplement to Static Tain't Analysis.mp4 9.2 MB
- IEEE Security & Privacy 2024/2024 88 AFGEN Whole Function Fuzzing for Applications and Libraries - Yuwei LIU 1.mp4 9.2 MB
- IEEE Security & Privacy 2021/CryptGPU Fast Privacy-Preserving Machine Learning on the GPU.mp4 9.2 MB
- IEEE Security & Privacy 2020/EverCrypt A Fast, Verified, Cross-Platform Cryptographic Provider.mp4 9.2 MB
- IEEE Security & Privacy 2024/Pryde - A Modular Generalizable Workflow for Uncovering Evasion Attacks Against Stateful Firewall.mp4 9.2 MB
- IEEE Security & Privacy 2024/sp24 long recording - Jannis Rautenstrauch.mp4 9.2 MB
- IEEE Security & Privacy 2021/SmartPulse Automated Checking of Temporal Properties in Smart Contracts.mp4 9.2 MB
- IEEE Security & Privacy 2020/A Programming Framework for Differential Privacy with Accuracy Concentration Bounds.mp4 9.2 MB
- IEEE Security & Privacy 2024/Where URLs Become Weapons - Automated Discovery of SSRF Vulnerabilities in Web Applications - Sam.mp4 9.2 MB
- IEEE Security & Privacy 2021/DICE Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis.mp4 9.1 MB
- IEEE Security & Privacy 2019/Resident Evil Understanding Residential IP Proxy as a Dark Service.mp4 9.1 MB
- IEEE Security & Privacy 2022/ShorTor Improving Tor Network Latency via Multi-hop Overlay Routing.mp4 9.1 MB
- IEEE Security & Privacy 2024/Architectural Mimicry - Innovative Instructions to Efficiently Address Control Flow Leakage in Dat.mp4 9.1 MB
- IEEE Security & Privacy 2021/A Secure and Formally Verified Linux KVM Hypervisor.mp4 9.1 MB
- IEEE Security & Privacy 2020/Semantic Understanding of Smart Contracts Executable Operational Semantics of Solidity.mp4 9.1 MB
- IEEE Security & Privacy 2020/This PIN Can Be Easily Guessed Analyzing the Security of Smartphone Unlock PINs.mp4 9.1 MB
- IEEE Security & Privacy 2021/Runtime Recovery of Web Applications under Zero-Day ReDoS Attacks.mp4 9.0 MB
- IEEE Security & Privacy 2024/2024 50 BAFFLE - Mr HE Junda.mp4 9.0 MB
- IEEE Security & Privacy 2021/Data Privacy in Trigger-Action IoT Systems.mp4 9.0 MB
- IEEE Security & Privacy 2023/Locally Differentially Private Frequency Estimation Based on Convolution Framework.mp4 8.9 MB
- IEEE Security & Privacy 2021/Cross Layer Attacks and How to Use Them (for DNS Cache Poisoning, Device Tracking and More).mp4 8.9 MB
- IEEE Security & Privacy 2020/Enabling Rack-scale Confidential Computing Using Heterogeneous Trusted Execution Environment.mp4 8.9 MB
- IEEE Security & Privacy 2021/DIFUZZRTL Differential Fuzz Testing to Find CPU Bugs.mp4 8.9 MB
- IEEE Security & Privacy 2020/Sync HotStuff Simple and Practical Synchronous State Machine Replication.mp4 8.9 MB
- IEEE Security & Privacy 2021/Systematic Analysis of Randomization-based Protected Cache Architectures.mp4 8.9 MB
- IEEE Security & Privacy 2024/322 - SoK SGX Fail How Stuff Gets eXposed - Stephan van Schaik.mp4 8.9 MB
- IEEE Security & Privacy 2020/TRRespass Exploiting the Many Sides of Target Row Refresh.mp4 8.9 MB
- IEEE Security & Privacy 2020/A Comparative Usability Study of FIDO2 Passwordless Authentication.mp4 8.9 MB
- IEEE Security & Privacy 2021/Proactive Threshold Wallets with Offline Devices.mp4 8.8 MB
- IEEE Security & Privacy 2023/Rethinking Searchable Symmetric Encryption.mp4 8.8 MB
- IEEE Security & Privacy 2022/Transfer Attacks Revisited A Large-Scale Empirical Study in Real Computer Vision Settings.mp4 8.8 MB
- IEEE Security & Privacy 2023/SoK Anti-Facial Recognition Technology.mp4 8.8 MB
- IEEE Security & Privacy 2020/SoK Differential Privacy as a Causal Property.mp4 8.8 MB
- IEEE Security & Privacy 2021/High-Frequency Trading on Decentralized On-Chain Exchanges.mp4 8.8 MB
- IEEE Security & Privacy 2024/Piano Extremely Simple Single Server PIR with Sublinear Server Computation - Mingxun Zhou.mp4 8.8 MB
- IEEE Security & Privacy 2019/Full speed Fuzzing Reducing Fuzzing Overhead through Coverage-guided Tracing.mp4 8.8 MB
- IEEE Security & Privacy 2021/Bitcoin-Compatible Virtual Channels.mp4 8.8 MB
- IEEE Security & Privacy 2022/IronMask Versatile Verification of Masking Security.mp4 8.8 MB
- IEEE Security & Privacy 2024/APP Miner Detecting API Misuses via Automatically Mining API Path Patterns - Jiasheng Jiang.mp4 8.7 MB
- IEEE Security & Privacy 2021/SIRNN A Math Library for Secure RNN Inference.mp4 8.7 MB
- IEEE Security & Privacy 2024/2024 102 BOUNCEATTACK A Query Efficient Decision based Adversarial Attack by Bouncing into the Wild.mp4 8.7 MB
- IEEE Security & Privacy 2024/cut final presentation - Sönke Huster.mp4 8.7 MB
- IEEE Security & Privacy 2020/Formal Modelling and Proof in the CHERI Design and Implementation Process.mp4 8.7 MB
- IEEE Security & Privacy 2021/Wolverine Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and.mp4 8.7 MB
- IEEE Security & Privacy 2020/Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability.mp4 8.6 MB
- IEEE Security & Privacy 2021/Many-out-of-Many - Proofs and Applications to Anonymous Zether.mp4 8.6 MB
- IEEE Security & Privacy 2021/Compact Certificates of Collective Knowledge.mp4 8.6 MB
- IEEE Security & Privacy 2024/BELT Old School Backdoor Attacks can Evade the State of the Art Defense with Backdoor Exclusivity.mp4 8.5 MB
- IEEE Security & Privacy 2021/Survivalism Systematic Analysis of Malware Living-Off-The-Land.mp4 8.5 MB
- IEEE Security & Privacy 2021/NTFUZZ Enabling Type-Aware Kernel Fuzzing on Windows with Static Binary Analysis.mp4 8.5 MB
- IEEE Security & Privacy 2024/SoK CollusionResistantMPSI - Jelle Vos.mp4 8.5 MB
- IEEE Security & Privacy 2021/DP-Sniper Black-Box Discovery of Differential Privacy Violations using Classifiers.mp4 8.5 MB
- IEEE Security & Privacy 2020/Meddling Middlemen Empirical Analysis of the Risks of Data-Saving Mobile Browsers.mp4 8.5 MB
- IEEE Security & Privacy 2021/CrawlPhish Large-scale Analysis of Client-side Cloaking Techniques in Phishing.mp4 8.4 MB
- IEEE Security & Privacy 2020/CrypTFlow - Secure TensorFlow Inference.mp4 8.4 MB
- IEEE Security & Privacy 2021/Hardware-Software Contracts for Secure Speculation.mp4 8.4 MB
- IEEE Security & Privacy 2021/Detecting Filter List Evasion With Event-Loop-Turn Granularity JavaScript Signatures.mp4 8.4 MB
- IEEE Security & Privacy 2019/Self-Encrypting Deception Weaknesses in the Encryption of Solid State Drives.mp4 8.4 MB
- IEEE Security & Privacy 2024/2024 171 Private Analytics via Streaming, Sketching, and Silently Verifiable Proofs - Mayank Rathee.mp4 8.4 MB
- IEEE Security & Privacy 2024/Transferable Multimodal Attack on Vision Language Pre training Models - haodi wang.mp4 8.4 MB
- IEEE Security & Privacy 2024/Thwarting Last Minute Voter Coercion - Rosario Giustolisi.mp4 8.3 MB
- IEEE Security & Privacy 2023/ImU Physical Impersonating Attack for Face Recognition System with Natural Style Changes.mp4 8.3 MB
- IEEE Security & Privacy 2024/2024 265 eAudit - A Fast, Scalable and Deployable Audit Data Collection System - Hanke Kimm.mp4 8.3 MB
- IEEE Security & Privacy 2021/Electromagnetic Covert Channels Can Be Super Resilient.mp4 8.3 MB
- IEEE Security & Privacy 2021/An I O Separation Model for Formal Verification of Kernel Implementations.mp4 8.3 MB
- IEEE Security & Privacy 2021/Black Widow Blackbox Data-driven Web Scanning.mp4 8.2 MB
- IEEE Security & Privacy 2020/ICLab A Global, Longitudinal Internet Censorship Measurement Platform.mp4 8.2 MB
- IEEE Security & Privacy 2021/Diogenes Lightweight Scalable RSA Modulus Generation with a Dishonest Majority.mp4 8.2 MB
- IEEE Security & Privacy 2024/Scalable Verification of Zero Knowledge Protocols - MIGUEL ISABEL MÁRQUEZ.mp4 8.1 MB
- IEEE Security & Privacy 2021/Red Belly a Deterministic Scalable Open Permissioned Blockchain.mp4 8.1 MB
- IEEE Security & Privacy 2020/KARONTE Detecting Insecure Multi-binary Interactions in Embedded Firmware.mp4 8.1 MB
- IEEE Security & Privacy 2021/Defensive Technology Use by Political Activists During the Sudanese Revolution.mp4 8.1 MB
- IEEE Security & Privacy 2024/Sabre Cutting through Adversarial Noise with Adaptive Spectral Filtering and Input Reconstructio.mp4 8.1 MB
- IEEE Security & Privacy 2024/2024 winter 448 Efficient Actively Secure DPF and RAM based 2PC with One Bit Leakage - Wenhao Zhang.mp4 8.1 MB
- IEEE Security & Privacy 2021/Revealer Detecting and Exploiting Regular Expression Denial-of-Service Vulnerabilities.mp4 8.1 MB
- IEEE Security & Privacy 2024/From Principle to Practice Vertical Data Minimization for Machine Learning - Robin Staab.mp4 8.1 MB
- IEEE Security & Privacy 2020/Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers.mp4 8.1 MB
- IEEE Security & Privacy 2020/NetCAT Practical Cache Attacks from the Network.mp4 8.0 MB
- IEEE Security & Privacy 2021/They Would do Better if They Worked Together The Case of Interaction Problems Between Password.mp4 8.0 MB
- IEEE Security & Privacy 2021/On the Just-In-Time Discovery of Profit-Generating Transactions in DeFi Protocols.mp4 8.0 MB
- IEEE Security & Privacy 2021/Who is Real Bob Adversarial Attacks on Speaker Recognition Systems.mp4 8.0 MB
- IEEE Security & Privacy 2024/A Representative Study on Human Detection of Artificially Generated Media Across Countries - Joe.mp4 8.0 MB
- IEEE Security & Privacy 2020/Can Voters Detect Malicious Manipulation of Ballot Marking Devices.mp4 8.0 MB
- IEEE Security & Privacy 2021/CRYLOGGER Detecting Crypto Misuses Dynamically.mp4 8.0 MB
- IEEE Security & Privacy 2020/Are Anonymity-Seekers Just like Everybody Else An Analysis of Contributions to Wikipedia from Tor.mp4 7.9 MB
- IEEE Security & Privacy 2024/2024 614 Few shot Unlearning - Youngsik Yoon.mp4 7.9 MB
- IEEE Security & Privacy 2024/LowerBoundsRDP - Tim Kutta.mp4 7.9 MB
- IEEE Security & Privacy 2021/SoK Computer-Aided Cryptography.mp4 7.9 MB
- IEEE Security & Privacy 2024/Test time Poisoning Attacks Against Test time Adaptation Models - Tianshuo Cong.mp4 7.9 MB
- IEEE Security & Privacy 2021/Zero Knowledge for Everything and Everyone Fast ZK Processor with Cached ORAM for ANSI C Programs.mp4 7.9 MB
- IEEE Security & Privacy 2020/IJON Exploring Deep State Spaces via Fuzzing.mp4 7.9 MB
- IEEE Security & Privacy 2020/Automatically Detecting Bystanders in Photos to Reduce Privacy Risks.mp4 7.9 MB
- IEEE Security & Privacy 2024/PIRANA - Faster Multi query PIR via Constant weight Codes - Jingyu Li.mp4 7.8 MB
- IEEE Security & Privacy 2024/CaFA - Cost aware, Feasible Attacks With Database Constraints - Matan BT.mp4 7.8 MB
- IEEE Security & Privacy 2024/Ad Inventory Pooling in the Ad Tech Supply Chain - Yash Vekaria.mp4 7.8 MB
- IEEE Security & Privacy 2021/High-Assurance Cryptography in the Spectre Era.mp4 7.7 MB
- IEEE Security & Privacy 2024/Practical Obfuscation of BLE Physical Layer Fingerprints on Mobile Devices - Hadi Givehchian.mp4 7.6 MB
- IEEE Security & Privacy 2020/Detection of Electromagnetic Interference Attacks on Sensor Systems.mp4 7.6 MB
- IEEE Security & Privacy 2021/How Did That Get In My Phone Unwanted App Distribution on Android Devices.mp4 7.6 MB
- IEEE Security & Privacy 2021/Hear No Evil, See Kenansville Efficient and Transferable Black-Box Attacks on Automatic.mp4 7.6 MB
- IEEE Security & Privacy 2021/Proof-of-Learning Definitions and Practice.mp4 7.6 MB
- IEEE Security & Privacy 2023/On the Evolution of (Hateful) Memes by Means of Multimodal Contrastive Learning.mp4 7.5 MB
- IEEE Security & Privacy 2024/#498 Learn What You Want to Unlearn Unlearning Inversion Attacks against Machine Unlearning - Hongsh.mp4 7.5 MB
- IEEE Security & Privacy 2024/SoK Prudent Evaluation Practices for Fuzzing - Moritz Schloegel.mp4 7.5 MB
- IEEE Security & Privacy 2020/Hijacking Transient Execution through Microarchitectural Load Value Injection.mp4 7.5 MB
- IEEE Security & Privacy 2020/SPIDER Enabling Fast Patch Propagation in Related Software Repositories.mp4 7.5 MB
- IEEE Security & Privacy 2024/Preserving Node level Privacy in Graph Neural Networks - ZH X.mp4 7.4 MB
- IEEE Security & Privacy 2020/Full-band De-anonymization of Bluetooth Classic Devices.mp4 7.4 MB
- IEEE Security & Privacy 2020/Measuring Legal Compliance of Banners from IAB Europe's Transparancy and Consent Framework.mp4 7.4 MB
- IEEE Security & Privacy 2020/BIAS Bluetooth Impersonation AttackS.mp4 7.4 MB
- IEEE Security & Privacy 2024/#518 LACMUS Latent Concept Masking for General Robustness Enhancement of DNNs - Hongsheng Hu.mp4 7.4 MB
- IEEE Security & Privacy 2023/On The Empirical Effectiveness of Unrealistic Adversarial Hardening Against Realistic Attacks.mp4 7.4 MB
- IEEE Security & Privacy 2024/Ati Priya Bajaj Len or index or count, anything but v1 Predicting Variable Names in Decompilation Ou.mp4 7.4 MB
- IEEE Security & Privacy 2020/JIT Leaks Inducing Timing Side Channels through Just-In-Time Compilation.mp4 7.3 MB
- IEEE Security & Privacy 2020/RetroWrite Statically Instrumenting COTS Binaries for Fuzzing and Sanitization.mp4 7.2 MB
- IEEE Security & Privacy 2021/A First Look at Zoombombing.mp4 7.1 MB
- IEEE Security & Privacy 2021/A Decentralized and Encrypted National Gun Registry.mp4 7.1 MB
- IEEE Security & Privacy 2019/PERUN Virtual Payment Hubs over Cryptographic Currencies.mp4 7.0 MB
- IEEE Security & Privacy 2020/ZEXE Enabling Decentralized Private Computation.mp4 7.0 MB
- IEEE Security & Privacy 2024/CanWeCastABallotAsIntendedAndBeReceiptFree - Henri Devillez.mp4 6.9 MB
- IEEE Security & Privacy 2020/The Value of Collaboration in Convex Machine Learning with Differential Privacy.mp4 6.9 MB
- IEEE Security & Privacy 2021/Ebb-and-Flow Protocols A Resolution of the Availability-Finality Dilemma.mp4 6.9 MB
- IEEE Security & Privacy 2020/SoK Cyber Insurance - Technical Challenges and a System Security Roadmap.mp4 6.9 MB
- IEEE Security & Privacy 2021/A2L Anonymous Atomic Locks for Scalability in Payment Channel Hubs.mp4 6.8 MB
- IEEE Security & Privacy 2021/Invisible Probe Timing Attacks with PCIe Congestion Side-channel.mp4 6.8 MB
- IEEE Security & Privacy 2020/Gesture Authentication for Smartphones Evaluation of Gesture Password Selection Policies.mp4 6.8 MB
- IEEE Security & Privacy 2023/Leaking Arbitrarily Many Secrets Any-out-of-Many Proofs and Applications to RingCT Protocols.mp4 6.8 MB
- IEEE Security & Privacy 2021/Response-Hiding Encrypted Ranges Revisiting Security via Parametrized Leakage-Abuse Attacks.mp4 6.7 MB
- IEEE Security & Privacy 2024/545video - Irina Ford.mp4 6.7 MB
- IEEE Security & Privacy 2016/Opening Remarks of the 2016 IEEE Symposium on Security & Privacy.mp4 6.7 MB
- IEEE Security & Privacy 2021/Manipulation Attacks in Local Differential Privacy.mp4 6.7 MB
- IEEE Security & Privacy 2020/An Analysis of Pre-installed Android Software.mp4 6.7 MB
- IEEE Security & Privacy 2021/Adversary Instantiation Lower bounds for differentially private machine learning.mp4 6.7 MB
- IEEE Security & Privacy 2024/PromptCARE Prompt Copyright Protection by Watermark Injection and Verification - homeway yao.mp4 6.6 MB
- IEEE Security & Privacy 2021/BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures.mp4 6.6 MB
- IEEE Security & Privacy 2024/A Picture is Worth 500 Labels A Case Study of Demographic Disparities in Local Machine Learning M.mp4 6.6 MB
- IEEE Security & Privacy 2021/Pegasus Bridging Polynomial and Non-polynomial Evaluations in Homomorphic Encryption.mp4 6.6 MB
- IEEE Security & Privacy 2024/Understanding Parents' Perceptions and Practices Toward Children's Security and Privacy in Virtua.mp4 6.5 MB
- IEEE Security & Privacy 2024/2024 531 Please Tell Me More - Liu Han.mp4 6.5 MB
- IEEE Security & Privacy 2021/A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer.mp4 6.4 MB
- IEEE Security & Privacy 2021/MAD-HTLC Because HTLC is Crazy-Cheap to Attack.mp4 6.4 MB
- IEEE Security & Privacy 2024/BadVFL backdoor attacks in vertical federated learning - Mohammad Naseri.mp4 6.4 MB
- IEEE Security & Privacy 2024/Casual Users and Rational Choices within Differential Privacy - Narges Ashena.mp4 6.3 MB
- IEEE Security & Privacy 2024/sp 2024 holepunch final - Zachary Ratliff.mp4 6.2 MB
- IEEE Security & Privacy 2021/Journey to the Center of the Cookie Ecosystem Unraveling Actors' Roles and Relationships.mp4 6.0 MB
- IEEE Security & Privacy 2024/On SMS Phishing Tactics and Infrastructure - Alex Nahapetyan.mp4 5.9 MB
- IEEE Security & Privacy 2024/Patchy Performance - Uncovering the Vulnerability Management Practices of IoT Centric Vendors.mp4 5.9 MB
- IEEE Security & Privacy 2019/Tap 'n Ghost A Compilation of Novel Attack Techniques against Smartphone Touchscreens.mp4 5.8 MB
- IEEE Security & Privacy 2024/Zihao Li NURGLE - zihao li.mp4 5.8 MB
- IEEE Security & Privacy 2021/DIANE Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices.mp4 5.7 MB
- IEEE Security & Privacy 2024/CoreLocker - Andrew Wang.mp4 5.7 MB
- IEEE Security & Privacy 2024/Specular Towards Secure, Trust minimized Optimistic Blockchain Execution - Zhe Ye.mp4 5.5 MB
- IEEE Security & Privacy 2024/Measure Observe Remeasure An Interactive Paradigm for Differentially Private Exploratory Analysis.mp4 5.3 MB
- IEEE Security & Privacy 2024/Certifying Zero Knowledge Circuits with Refinement Types - Junrui Liu.mp4 5.3 MB
- IEEE Security & Privacy 2021/SoK The Faults in our ASRs An Overview of Attacks against Automatic Speech Recognition and.mp4 5.2 MB
- IEEE Security & Privacy 2024/video1092237667 - Hoang Nguyen Dai.mp4 5.1 MB
- IEEE Security & Privacy 2024/Who Left the Door Open Investigating the Causes of Exposed IoT Devices in an Academic Network.mp4 5.0 MB
- IEEE Security & Privacy 2020/Message Time of Arrival Codes A Fundamental Primitive for Secure Distance Measurement.mp4 5.0 MB
- IEEE Security & Privacy 2024/2024 319 FCert - yantiing wang.mp4 5.0 MB
- IEEE Security & Privacy 2024/2024 37 SoK Safer Digital Safety Research Involving At Risk Users - Rosanna Rosie Bellini.mp4 4.8 MB
- IEEE Security & Privacy 2024/2024 205 FlowMur A Stealthy and Practical Audio Backdoor Attack with Limited Knowledge - Jiahe Lan.mp4 4.7 MB
- IEEE Security & Privacy 2024/Chronos presentation - sard Chen.mp4 4.7 MB
- IEEE Security & Privacy 2024/sokvideo v1 - Max N.mp4 4.6 MB
- IEEE Security & Privacy 2021/SGUARD Smart Contracts Made Vulnerability-Free.mp4 4.5 MB
- IEEE Security & Privacy 2020/Towards Scalable Threshold Cryptosystems.mp4 4.4 MB
- IEEE Security & Privacy 2019/IEEE S&P 2019 - Awards Ceremony.mp4 3.9 MB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SSP 2020 Opening Remarks.eng.json 3.1 MB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Birds of a Feather A Hardware & Security Panel (Deprecated).eng.json 1.7 MB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Birds of a Feather Sharing Cybersecurity Research Artifacts To Accelerate Progress.eng.json 1.5 MB
- IEEE Security & Privacy 2019/Neural Cleanse Identifying and Mitigating Backdoor Attacks in Neural Networks.mp4 1.5 MB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Birds of a Feather A Hardware & Security Panel (Updated).eng.json 1.2 MB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Learning to Reconstruct Statistical Learning Theory and Encrypted Database Attacks.eng.json 1.1 MB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/OmniLedger - A Secure, Scale-Out, Decentralized Ledger via Sharding.eng.json 1002.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/High Precision Open-World Website Fingerprinting.eng.json 999.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Krace Data Race Fuzzing for Kernel File Systems.eng.json 982.0 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Waldo A Private Time-Series Database from Function Secret-Sharing.eng.json 931.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Tale of Sea and Sky On the Security of Maritime VSAT Communications.eng.json 930.6 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Implementing and Proving the TLS 1.3 Record Layer.eng.json 919.4 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Verena - End-to-End Integrity Protection for Web Applications.eng.json 899.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability.eng.json 877.0 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/SoK - Deep Packer Inspection - A Longitudinal Study of the Complexity of Run-Time Packers.eng.json 876.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SEVurity No Security Without Integrity - Breaking Integrity.eng.json 875.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Replicated State Machines without Replicated Execution.eng.json 874.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/How Not to Prove Your Election Outcome.eng.json 862.8 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Data Recovery on Encrypted Databases with k-Nearest Neighbor Query Leakage.eng.json 849.6 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/T-Fuzz Fuzzing by Program Transformation - Hui Peng.eng.json 846.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Automated Reverse Engineering and Privacy Analysis of Modern Cars.eng.json 839.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SPIDER Enabling Fast Patch Propagation in Related Software Repositories.eng.json 837.9 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/GraphSC - Parallel Secure Computation Made Easy.eng.json 829.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SoK Understanding the Prevailing Security Vulnerabilities in TrustZone-Assisted TEE Systems.eng.json 828.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/FlyClient Super-Light Clients for Cryptocurrencies.eng.json 825.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Private Resource Allocators and Their Applications.eng.json 818.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Hijacking Transient Execution through Microarchitectural Load Value Injection.eng.json 817.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SPECTECTOR Principled Detection of Speculative Information Flows.eng.json 799.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/AdGraph A Graph-Based Approach to Ad and Tracker Blocking.eng.json 798.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/The Many Kinds of Creepware Used for Interpersonal Attacks.eng.json 793.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Breaking and (Partially) Fixing Provably Secure Onion Routing.eng.json 793.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Path Oblivious Heap Optimal and Practical Oblivious Priority Queue.eng.json 793.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Towards a Natural Perspective of Smart Homes for Practical Security and Safety Analyses.eng.json 789.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/NetCAT Practical Cache Attacks from the Network.eng.json 785.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/RAMBleed Reading Bits in Memory without Accessing Them.eng.json 782.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Kobold Evaluating Decentralized Access Control for Remote NSXPC Methods on iOS.eng.json 782.6 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Low-Bandwidth Threshold ECDSA via Pseudorandom Correlation Generators.eng.json 782.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Security Analysis of the Facebook Ad Library.eng.json 776.4 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Foundations of Dynamic BFT.eng.json 775.6 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Device Fingerprinting with Peripheral Timestamps.eng.json 775.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/EverCrypt A Fast, Verified, Cross-Platform Cryptographic Provider.eng.json 765.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SoK Differential Privacy as a Causal Property.eng.json 760.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/VerX Safety Verification of Smart Contracts.eng.json 758.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/CrypTFlow - Secure TensorFlow Inference.eng.json 754.0 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Security of the J-PAKE Password-Authenticated Key Exchange Protocol.eng.json 748.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Programming Framework for Differential Privacy with Accuracy Concentration Bounds.eng.json 744.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Are Anonymity-Seekers Just like Everybody Else An Analysis of Contributions to Wikipedia from Tor.eng.json 739.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/ZEXE Enabling Decentralized Private Computation.eng.json 738.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Meddling Middlemen Empirical Analysis of the Risks of Data-Saving Mobile Browsers.eng.json 735.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/This PIN Can Be Easily Guessed Analyzing the Security of Smartphone Unlock PINs.eng.json 730.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/HydRand Efficient Continuous Distributed Randomness.eng.json 722.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Full-band De-anonymization of Bluetooth Classic Devices.eng.json 721.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/TRRespass Exploiting the Many Sides of Target Row Refresh.eng.json 721.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Transparent Polynomial Delegation and Its Applications to Zero Knowledge Proof.eng.json 720.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Intriguing Properties of Adversarial ML Attacks in the Problem Space.eng.json 720.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/xMP Selective Memory Protection for Kernel and User Space.eng.json 718.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/The State of the Uniform Attacks on Encrypted Databases beyond the Uniform Query Distribution.eng.json 717.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Humpty Dumpty Controlling Word Meanings via Corpus Poisoning.eng.json 715.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Ex-vivo Dynamic Analysis Framework for Android Device Drivers.eng.json 715.6 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/ShorTor Improving Tor Network Latency via Multi-hop Overlay Routing.eng.json 714.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SoK A Minimalist Approach to Formalizing Analog Sensor Security.eng.json 708.1 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/WIGHT Wired Ghost Touch Attack on Capacitive Touchscreens.eng.json 706.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Pseudorandom Black Swans Cache Attacks on CTR DRBG.eng.json 702.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Ask the Experts What Should Be on an IoT Privacy and Security Label.eng.json 701.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Are We Susceptible to Rowhammer An End-to-End Methodology for Cloud Providers.eng.json 690.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/OHIE Blockchain Scaling Made Simple.eng.json 687.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/ICAS An Extensible Framework for Estimating the Susceptibility of IC Layouts to Additive Trojans.eng.json 686.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Cornucopia Temporal Safety for CHERI Heaps.eng.json 681.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Message Time of Arrival Codes A Fundamental Primitive for Secure Distance Measurement.eng.json 676.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/JIT Leaks Inducing Timing Side Channels through Just-In-Time Compilation.eng.json 676.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Automatic Uncovering of Hidden Behaviors from Input Validation in Mobile Apps.eng.json 667.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SoK Cyber Insurance - Technical Challenges and a System Security Roadmap.eng.json 666.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Flaw Label Exploiting IPv6 Flow Label.eng.json 666.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Sync HotStuff Simple and Practical Synchronous State Machine Replication.eng.json 666.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/HopSkipJumpAttack A Query-Efficient Decision-Based Attack.eng.json 665.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Dragonblood Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd.eng.json 665.5 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/ADI Adversarial Dominating Inputs in Vertical Federated Learning Systems.eng.json 665.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Formal Modelling and Proof in the CHERI Design and Implementation Process.eng.json 665.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Semantic Understanding of Smart Contracts Executable Operational Semantics of Solidity.eng.json 662.4 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Beyond Credential Stuffing Password Similarity Models using Neural Networks.eng.json 659.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Combating Dependence Explosion in Forensic Analysis Using Alternative Tag Propagation Semantics.eng.json 657.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers.eng.json 654.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/RetroWrite Statically Instrumenting COTS Binaries for Fuzzing and Sanitization.eng.json 647.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Binsec Rel Efficient Relational Symbolic Execution for Constant-Time at Binary-Level.eng.json 647.5 KB
- IEEE Security & Privacy 2024/2024 62 Enforcing End to end Security for Remote Conferencing - Triste L.eng.json 647.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Influencing Photo Sharing Decisions on Social Media A Case of Paradoxical Findings.eng.json 647.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Towards Effective Differential Privacy Comms for Users' Data Sharing Decision and Comprehension.eng.json 644.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/KARONTE Detecting Insecure Multi-binary Interactions in Embedded Firmware.eng.json 644.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Leveraging EM Side-Channel Information to Detect Rowhammer Attacks.eng.json 636.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Browsing Unicity On the Limits of Anonymizing Web Tracking Data.eng.json 632.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SPECCFI Mitigating Spectre Attacks Using CFI Informed Speculation.eng.json 632.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Fuzzing JavaScript Engines with Aspect-Preserving Mutation.eng.json 631.6 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/A2L Anonymous Atomic Locks for Scalability in Payment Channel Hubs.eng.json 627.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Automatically Detecting Bystanders in Photos to Reduce Privacy Risks.eng.json 622.8 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Adversary Instantiation Lower bounds for differentially private machine learning.eng.json 618.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/IJON Exploring Deep State Spaces via Fuzzing.eng.json 612.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Transys Leveraging Common Security Properties across Hardware Designs.eng.json 610.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Neutain't Efficient Dynamic Tain't Analysis with Neural Networks.eng.json 607.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Comparative Usability Study of FIDO2 Passwordless Authentication.eng.json 607.7 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Multi-Server Verifiable Computation of Low-Degree Polynomials.eng.json 605.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/PMP Cost-Effective Forced Execution with Probabilistic Memory Pre-planning.eng.json 601.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network.eng.json 598.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/ICLab A Global, Longitudinal Internet Censorship Measurement Platform.eng.json 591.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SEIMI Efficient and Secure SMAP-Enabled Intra-process Memory Isolation.eng.json 583.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Pangolin Incremental Hybrid Fuzzing with Polyhedral Path Abstraction.eng.json 582.6 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Crowd-GPS-Sec - Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks.eng.json 582.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Detection of Electromagnetic Interference Attacks on Sensor Systems.eng.json 581.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/An Analysis of Pre-installed Android Software.eng.json 580.3 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Discop Provably Secure Steganography in Practice Based on Distribution Copies.eng.json 577.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Unexpected Data Dependency Creation and Chaining A New Attack to SDN.eng.json 573.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Throwing Darts in the Dark Detecting Bots with Limited Data using Neural Data Augmentation.eng.json 571.8 KB
- IEEE Security & Privacy 2024/Practical Obfuscation of BLE Physical Layer Fingerprints on Mobile Devices - Hadi Givehchian.eng.json 570.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/TARDIS Rolling Back the Clock on CMS-Targeting Cyber Attacks.eng.json 570.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Tactical Provenance Analysis our Endpoint Detection and Response Systems.eng.json 561.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Gesture Authentication for Smartphones Evaluation of Gesture Password Selection Policies.eng.json 554.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/VeriSmart A Highly Precise Safety Verifier for Ethereum Smart Contracts.eng.json 552.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Understanding and Mitigating Security Risks of General Messaging Protocols on IoT Clouds.eng.json 542.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/The Value of Collaboration in Convex Machine Learning with Differential Privacy.eng.json 542.0 KB
- IEEE Security & Privacy 2024/2024 176 PolySphinx Extending the Sphinx Mix Format with Better Multicast Support - Daniel Schadt.eng.json 539.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/The Last Mile High-Assurance and High-Speed Cryptographic Implementations.eng.json 538.2 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Learning Differentially Private Mechanisms.eng.json 536.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/WaveSpy Remote and Through-wall Screen Attack via mmWave Sensing.eng.json 532.8 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Improving Password Guessing via Representation Learning.eng.json 532.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/BIAS Bluetooth Impersonation AttackS.eng.json 525.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Enabling Rack-scale Confidential Computing Using Heterogeneous Trusted Execution Environment.eng.json 521.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SAVIOR Towards Bug-Driven Hybrid Testing.eng.json 516.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Measuring Legal Compliance of Banners from IAB Europe's Transparancy and Consent Framework.eng.json 514.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/MarkUs Drop-in Use-After-Free Prevention for Low-Level Languages.eng.json 513.1 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/DynPTA Combining Static and Dynamic Analysis for Practical Selective Data Protection.eng.json 512.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Towards Scalable Threshold Cryptosystems.eng.json 498.5 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/AccEar Accelerometer Acoustic Eavesdropping with Unconstrained Vocabulary.eng.json 491.8 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Android Custom Permissions Demystified From Privilege Escalation to Design Shortcomings.eng.json 483.2 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Goshawk Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis.eng.json 482.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/OAT Attesting Operation Integrity of Embedded Devices.eng.json 481.2 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Spectral-DP Differentially Private Deep Learning through Spectral Perturbation and Filtering.eng.json 475.9 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Skyfire - Data-Driven Seed Generation for Fuzzing.eng.json 468.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/TextExerciser Feedback-Driven Text Input Exercising for Android Applications.eng.json 463.1 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Response-Hiding Encrypted Ranges Revisiting Security via Parametrized Leakage-Abuse Attacks.eng.json 463.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Establishing Economic Incentives for Security Patching of IoT Consumer Products.eng.json 459.3 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/AI-Guardian Defeating Adversarial Attacks using Backdoors.eng.json 455.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Plundervolt Software-Based Fault Injection Attacks against Intel SGX.eng.json 446.7 KB
- IEEE Security & Privacy 2024/ALIF Low Cost Adversarial Audio Attacks on Black Box Speech Platforms using Linguistic Features.eng.json 439.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Can Voters Detect Malicious Manipulation of Ballot Marking Devices.eng.json 401.6 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/NITRD Panel - Federal Cybersecurity and Privacy R&D Strategic Plans.eng.srt 179.0 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/LangSec Keynote Trojan Source and Bad Characters Invisible Hacks and Reluctant Patching.eng.srt 134.4 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/IEEE S&P 2019 - 40th Celebration Plenary Session Panel Reflections on four decades of the symposium.eng.srt 105.9 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/S&P TC Business Meeting.eng.srt 98.3 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/IEEE S&P 2022 Opening Session.eng.srt 90.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SSP 2020 Opening Remarks.eng.srt 88.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SSP 2020 Opening Remarks.eng.txt 83.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SSP 2020 Opening Remarks.eng.lrc 82.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SSP 2020 Opening Remarks.eng.vtt 82.3 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/IEEE S&P 2023 Short Talks.eng.srt 79.2 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/CHERI - A Hybrid Capability-System Architecture for Scalable Software Compartmentalization.eng.srt 77.3 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/SoK - Science, Security, and the Elusive Goal of Security as a Scientific Pursuit.eng.srt 75.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SSP 2020 Opening Remarks.eng.tsv 73.6 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Routing Around Congestion - Defeating DDoS Attacks and Adverse Network Conditions via Reactive.eng.srt 73.5 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Cloak and Dagger - From Two Permissions to Complete Control of the UI Feedback Loop.eng.srt 72.0 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/On Subnormal Floating Point and Abnormal Timing.eng.srt 69.6 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Towards Evaluating the Robustness of Neural Networks.eng.srt 67.9 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/A2 - Analog Malicious Hardware.eng.srt 67.6 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate.eng.srt 66.2 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/A Practical Oblivious Map Data Structure with Secure Deletion and History Independence.eng.srt 66.0 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Computer Security and Privacy for Refugees in the United States.eng.srt 64.9 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Double-efficient zkSNARKs Without Trusted Setup.eng.srt 64.5 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Protecting the Stack with Metadata Policies and Tagged Hardware.eng.srt 64.3 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/SoK - Research Perspectives and Challenges for Bitcoin and Cryptocurrencies.eng.srt 64.2 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/IEEE S&P 2019 - TC Business Meeting.eng.srt 64.0 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/EnclaveDB - A Secure Database using SGX.eng.srt 63.9 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/The Cards Aren't Alright - Detecting Counterfeit Gift Cards Using Encoding Jitter.eng.srt 63.9 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Hackers vs. Testers - A Comparison of Software Vulnerability Discovery Processes.eng.srt 62.9 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Verifiable ASICs.eng.srt 62.8 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Data-Oriented Programming - On the Expressiveness of Non-Control Data Attacks.eng.srt 62.7 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/TriggerScope - Towards Detecting Logic Bombs in Android Applications.eng.srt 62.6 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/The Cracked Cookie Jar - HTTP Cookie Hijacking and the Exposure of Private Information.eng.srt 62.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SSP 2020 Opening Remarks.eng.text 62.6 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Riposte - An Anonymous Messaging System Handling Millions of Users.eng.srt 62.4 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Ad Injection at Scale - Assessing Deceptive Advertisement Modifications.eng.srt 61.9 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/LAVA - Large-scale Automated Vulnerability Addition.eng.srt 61.6 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Missing the Point(er) - On the Effectiveness of Code Pointer Integrity.eng.srt 61.4 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Another Flip in the Wall of Rowhammer Defenses.eng.srt 60.8 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Precise and Scalable Detection of Double-Fetch Bugs in OS Kernels.eng.srt 60.1 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Enumerating Active IPv6 Hosts for Large-scale Security Scans via DNSSEC-signed Reverse Zones.eng.srt 60.1 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/When Your Fitness Tracker Betrays You - Quantifying the Predictability.eng.srt 60.0 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Towards Security and Privacy for Multi User Augmented Reality.eng.srt 59.6 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Scalable Bias-Resistant Distributed Randomness.eng.srt 59.2 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Keeping Authorities - Honest or Bust - with Decentralized Witness Cosigning.eng.srt 59.0 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Blue Note - How Intentional Acoustic Interference Damages Availablity and Integrity -.eng.srt 59.0 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/A Lustrum of Malware Network Communication - Evolution and Insights.eng.srt 58.9 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/SoK - Cryptographically Protected Database Search.eng.srt 58.3 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Geppetto - Versatile Verifiable Computation.eng.srt 57.5 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/IKP - Turning a PKI Around with Decentralized Automated Incentives.eng.srt 57.4 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/PIR with Compressed Queries and Amortized Query Processing.eng.srt 57.4 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Bulletproofs - Short Proofs for Confidential Transactions and More.eng.srt 57.4 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/HVLearn - Automated Black-box Analysis of Hostname Verification in SSL TLS Implementations.eng.srt 57.3 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Virtual Proofs of Reality and their Physical Implementation.eng.srt 57.3 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Is Interaction Necessary for Distributed Private Learning.eng.srt 57.2 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/A Formal Treatment of Accountable Proxying over TLS.eng.srt 57.1 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Catena - Efficient Non-equivocation via Bitcoin.eng.srt 56.9 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Norax - Enabling Execute-Only Memory for COTS Binaries on AArch64.eng.srt 56.8 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Tracking Ransomware End-to-end.eng.srt 56.4 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Helping Johnny to Analyze Malware - A Usability-Optimized Decompiler and Malware Analysis User Study.eng.srt 56.3 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Hardening Java's Access Control by Abolishing Implicit Privilege Elevation.eng.srt 56.2 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Beauty and the Beast - Diverting modern web browsers to build unique browser fingerprints.eng.srt 56.1 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Spotless Sandboxes - Evading Malware Analysis Systems using Wear-and-Tear Artifacts.eng.srt 56.0 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Backward-bounded DSE - Targeting Infeasibility Questions on Obfuscated Codes.eng.srt 55.8 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Securing Augmented Reality Output.eng.srt 55.6 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/How Secure and Quick is QUIC Provable Security and Performance Analyses.eng.srt 55.5 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Enabling Autonomous IoT Device Pairing using Different Sensor Types.eng.srt 55.4 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/From Trash to Treasure - Timing-Sensitive Garbage Collection.eng.srt 55.2 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/xJsnark - A Framework for Efficient Verifiable Computation.eng.srt 55.2 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Pyramid - Enhancing Selectivity in Big Data Protection with Count Featurization.eng.srt 55.0 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/A Messy State of the Union - Taming the Composite State Machines of TLS.eng.srt 55.0 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Hawk - The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts.eng.srt 54.5 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Learning from Mutants - Using Code Mutation to Learn and Monitor Invariants of a CPS.eng.srt 54.5 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Security Analysis of Emerging Smart Home Applications.eng.srt 54.1 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Leakage-Abuse Attacks on Order-Revealing Encryption.eng.srt 54.1 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Synthesizing Plausible Privacy-Preserving Location Traces.eng.srt 54.0 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/How They Did It - An Analysis of Emission Defeat Devices in Modern Automobiles.eng.srt 53.7 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Tracking Certificate Misissuance in the Wild.eng.srt 53.7 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/vRAM - Faster Verifiable RAM With Program-Independent Preprocessing.eng.srt 53.7 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/The Miner's Dilemma.eng.srt 53.4 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/SoK - Everyone Hates Robocalls - A Survey of Techniques against Telephone Spam.eng.srt 53.3 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/GenoGuard - Protecting Genomic Data against Brute-Force Attacks.eng.srt 52.8 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Program-Adaptive Mutational Fuzzing.eng.srt 52.7 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/VC3 - Trustworthy Data Analytics in the Cloud Using SGX.eng.srt 52.6 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Understanding Linux Malware.eng.srt 52.6 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/CaSE - Cache-Assisted Secure Execution on ARM Processors.eng.srt 52.5 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Algorithmic Transparency via Quantitative Input Influence.eng.srt 52.5 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Grand Pwning Unit - Accelerating Microarchitectural Attacks with the GPU.eng.srt 52.5 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/SymCerts - Practical Symbolic Execution For Exposing Noncompliance in X.509 Certificate Validation.eng.srt 52.3 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Back in Black - Towards Formal, Black Box Analysis of Sanitizers and Filters.eng.srt 52.3 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Counterfeit Object-oriented Programming.eng.srt 52.2 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Privacy and Access Control for Outsourced Personal Records.eng.srt 52.2 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Hijacking Bitcoin - Routing Attacks on Cryptocurrencies.eng.srt 52.1 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/SmarPer - Context-Aware and Automatic Runtime-Permissions for Mobile Devices.eng.srt 52.0 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Opening Remarks of the 39th IEEE Symposium on Security & Privacy.eng.srt 51.9 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Privacy Risks with Facebook's PII-based Targeting.eng.srt 51.8 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Membership inference attacks from first principles.eng.srt 51.8 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Last-Level Cache Side-Channel Attacks are Practical.eng.srt 51.6 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Protecting Bare-metal Embedded Systems with Privilege Overlays.eng.srt 51.6 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Distance-Bounding Protocols - Verification without Time and Location.eng.srt 51.5 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Comparing the Usability of Cryptographic APIs.eng.srt 51.5 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/SoK - Exploiting Network Printers.eng.srt 51.4 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/SoK - Keylogging Side Channels.eng.srt 51.3 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Forward Secure Asynchronous Messaging from Puncturable Encryption.eng.srt 51.2 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Shreds - Fine-grained Execution Units with Private Memory.eng.srt 51.1 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Following Devil's Footprints - Cross-Platform Analysis of Potentially Harmful Libraries.eng.srt 51.0 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/pASSWORD tYPOS and How to Correct Them Securely.eng.srt 50.9 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/The Rise of the Citizen Developer - Assessing the Security Impact of Online App Generators.eng.srt 50.6 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/You Get Where You're Looking For - The Impact Of Information Sources On Code Security.eng.srt 50.6 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Cross-Architecture Bug Search in Binary Executables.eng.srt 50.4 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage.eng.srt 50.4 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/NEZHA - Efficient Domain-independent Differential Testing.eng.srt 50.4 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/A Framework for Universally Composable Diffie-Hellman Key Exchange.eng.srt 50.3 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Speechless - Analyzing the Threat to Speech Privacy from Smartphone Motion Sensors.eng.srt 50.2 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Finding and Preventing Bugs in JavaScript Bindings.eng.srt 50.1 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/On Enforcing the Digital Immunity of a Large Humanitarian Organization.eng.srt 50.1 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/ADSNARK - Nearly Practical and Privacy-Preserving Proofs on Authenticated Data.eng.srt 49.9 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Micro-Policies - Formally Verified, Tag-Based Security Monitors.eng.srt 49.9 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/On the Economics of Offline Password Cracking.eng.srt 49.7 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Prepose - Privacy, Security, and Reliability for Gesture-Based Programming.eng.srt 49.7 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/FP-Stalker - Tracking Browser Fingerprint Evolutions - Antoine Vastel.eng.srt 49.6 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud.eng.srt 49.6 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping.eng.srt 49.4 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/IoT Goes Nuclear - Creating a Zigbee Chain Reaction.eng.srt 49.3 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/One TPM to Bind Them All - Fixing TPM2.0 for Provably Secure Anonymous Attestation.eng.srt 49.3 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Security Foundations for Application-Based Covert Communication Channels.eng.srt 49.2 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Optimized Honest-Majority MPC for Malicious Adversaries - Breaking 1 Billion-Gate Second Barrier.eng.srt 49.2 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/S$A - A Shared Cache Attack That Works across Cores and Defies VM Sandboxing.eng.srt 49.0 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Return to the Zombie Gadgets - Undermining Destructive Code Reads via Code-Inference Attacks.eng.srt 49.0 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/A Tale of Two Studies - The Best and Worst of YubiKey Usability.eng.srt 48.9 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Manipulating Machine Learning - Poisoning Attacks & Countermeasures.eng.srt 48.9 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Oblix - An Efficient Oblivious Search Index.eng.srt 48.7 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/MitM Attack by Name Collision - Cause Analysis and Vulnerability Assessment in the New gTLD Era.eng.srt 48.6 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Identifying Personal DNA Methylation Profiles by Genotype Inference.eng.srt 48.6 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/vSQL - Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases.eng.srt 48.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Birds of a Feather A Hardware & Security Panel (Deprecated).eng.srt 48.2 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Distillation as a Defense to Adversarial Perturbations against Deep Neural Networks.eng.srt 48.1 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Evaluating Physical-Layer BLE Location Tracking Attacks on Mobile Devices.eng.srt 48.0 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Implementing Conjunction Obfuscation under Entropic Ring LWE.eng.srt 47.7 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Invisible Finger Practical Electromagnetic Interference Attack on Touchscreen Electronic Devices.eng.srt 47.5 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Malicious-Client Security in Blind Seer - A Scalable Private DBMS.eng.srt 47.5 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/HDFI - Hardware-Assisted Data-Flow Isolation.eng.srt 47.5 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Users Really Do Plug in USB Drives They Find.eng.srt 47.4 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Bitcoin over Tor isn't a Good Idea.eng.srt 47.2 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/XHOUND - Quantifying the Fingerprintability of Browser Extensions.eng.srt 47.0 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Mobile Application Web API Reconnaissance.eng.srt 46.9 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/What the App is That Deception and Countermeasures in the Android User Interface.eng.srt 46.8 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Post-Quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors Problem.eng.srt 46.8 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/HardLog Practical Tamper-Proof System Auditing Using a Novel Audit Device.eng.srt 46.3 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/FuturesMEX - Secure, Distributed Futures Market Exchange.eng.srt 46.0 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/A Machine Learning Approach to Prevent Malicious Calls Over Telephony Networks.eng.srt 45.9 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Stack Overflow Considered Harmful - The Impact of Copy&Paste on Android Application Security.eng.srt 45.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Birds of a Feather Sharing Cybersecurity Research Artifacts To Accelerate Progress.eng.srt 45.8 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Domain-Z - 28 Registrations Later.eng.srt 45.8 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Sonar - Detecting SS7 Redirection Attacks With Audio-Based Distance Bounding.eng.srt 45.8 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Obstacles to the Adoption of Secure Communication Tools.eng.srt 45.6 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Temporal Lensing and Its Application in Pulsing Denial-of-Service Attacks.eng.srt 45.6 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/SoK - Plug & Pray - Today - Understanding USB Insecurity in Versions 1 through C.eng.srt 45.3 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/CirC Compiler infrastructure for proof systems, software verification, and more.eng.srt 45.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Birds of a Feather A Hardware & Security Panel (Deprecated).eng.txt 45.1 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/CoSMeDis - A Distributed Social Media Platform with Formally Verified Confidentiality Guarantees.eng.srt 45.1 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/VUDDY - A Scalable Approach for Vulnerable Code Clone Discovery.eng.srt 45.1 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/ObliVM - A Programming Framework for Secure Computation.eng.srt 44.9 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Cinderella - Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with.eng.srt 44.9 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Spectre Attacks Exploiting Speculative Execution.eng.srt 44.8 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Side-Channel Attacks on Shared Search Indexes.eng.srt 44.8 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Key Confirmation in Key Exchange - A Formal Treatment and Implications for TLS 1.3.eng.srt 44.8 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Every Second Counts - Quantifying the Negative Externalities of Cybercrime via Typosquatting.eng.srt 44.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Birds of a Feather A Hardware & Security Panel (Deprecated).eng.lrc 44.8 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Measuring and Mitigating the Risk of IP Reuse on Public Clouds.eng.srt 44.7 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Asleep at the Keyboard Assessing the Security of GitHub Copilot's Code Contributions.eng.srt 44.7 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/SecureML - A System for Scalable Privacy-Preserving Machine Learning.eng.srt 44.7 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Stealing Hyperparameters in Machine Learning.eng.srt 44.6 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/TASHAROK-Using Mechanism Design for Enhancing Security Resource Allocation in Interdependent Systems.eng.srt 44.6 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/CRLite - A Scalable System for Pushing All TLS Revocations to All Browsers.eng.srt 44.6 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/SoK - (State of) The Art of War - Offensive Techniques in Binary Analysis.eng.srt 44.6 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Augur - Internet-Wide Detection of Connectivity Disruptions.eng.srt 44.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Birds of a Feather A Hardware & Security Panel (Deprecated).eng.vtt 44.4 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Effective Real-Time Android Application Auditing.eng.srt 44.4 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Anonymity Trilemma - Strong Anonymity, Low Bandwidth Overhead, Low Latency - Choose Two.eng.srt 44.4 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Study and Mitigation of Origin Stripping Vulnerabilities in Hybrid-postMessage Enabled Mobile Apps.eng.srt 44.1 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Domains Do Change Their Spots Quantifying Potential Abuse of Residual Trust.eng.srt 43.9 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Automated Attack Synthesis by Extracting Finite State Machines from Protocol Specification Documents.eng.srt 43.8 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/New Primitives for Actively-Secure MPC over Rings with Applications to Private Machine Learning.eng.srt 43.6 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/SoK Social Cybersecurity.eng.srt 43.5 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/PhotoProof - Cryptographic Image Authentication for Any Set of Permissible Transformations.eng.srt 43.5 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/SoK - Towards Grounding Censorship Circumvention in Empiricism.eng.srt 43.5 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Cache Storage Channels - Alias-Driven Attacks and Verified Countermeasures.eng.srt 43.5 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/T-Fuzz Fuzzing by Program Transformation - Hui P.eng.srt 43.4 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Automated Analysis and Verification of TLS 1.3 - 0-RTT, Resumption and Delayed Authentication.eng.srt 43.4 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/SwarmFlawFinder Discovering and Exploiting Logic Flaws of Swarm Algorithms.eng.srt 43.4 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Fidelius Protecting User Secrets from Compromised Browsers.eng.srt 43.4 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/A Generic Approach to Automatic Deobfuscation of Executable Code.eng.srt 43.3 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Full speed Fuzzing Reducing Fuzzing Overhead through Coverage-guided Tracing.eng.srt 43.1 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/SpecHammer Combining Spectre and Rowhammer for New Speculative Attacks.eng.srt 42.9 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Using Hardware Features for Increased Debugging Transparency.eng.srt 42.9 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Wobfuscator Obfuscating JavaScript Malware via Opportunistic Translation to WebAssembly.eng.srt 42.8 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Counter-RAPTOR - Safeguarding Tor Against Active Routing Attacks.eng.srt 42.8 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Mitigating Information Leakage Vulnerabilities with Type-based Data Isolation.eng.srt 42.7 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Your Exploit is Mine - Automatic Shellcode Transplant for Remote Exploits.eng.srt 42.5 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/EyeTell - Video-Assisted Touchscreen Keystroke Inference from Eye Movements.eng.srt 42.4 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/SurroundWeb - Mitigating Privacy Concerns in a 3D Web Browser.eng.srt 42.4 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Privacy-from-Birth Protecting Sensed Data from Malicious Sensors with VERSA.eng.srt 42.4 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Phishing in Organizations Findings from a Large-Scale and Long-Term Study.eng.srt 42.4 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Multiple Handshakes Security of TLS 1.3 Candidates.eng.srt 42.3 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/An Experimental Security Analysis of an Industrial Robot Controller.eng.srt 42.1 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/To Catch a Ratter - Monitoring the Behavior of Amateur DarkComet RAT Operators in the Wild.eng.srt 42.0 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Bad Characters Imperceptible NLP Attacks.eng.srt 42.0 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Racing in Hyperspace - Closing Hyper Threading Side Channels on SGX.eng.srt 41.8 KB
- IEEE Security & Privacy 2024/S&P 2024 hvc - Nicholas Ngai.eng.srt 41.8 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/High System-Code Security with Low Overhead.eng.srt 41.7 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Talos - Neutralizing Vulnerabilities with Security Workarounds for Rapid Response.eng.srt 41.7 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Impossibility of Precise and Sound Termination-Sensitive Security Enforcements.eng.srt 41.7 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/A Method for Verifying Privacy-Type Properties - The Unbounded Case.eng.srt 41.6 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Machine-Checked Proofs of Privacy for Electronic Voting Protocols.eng.srt 41.5 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Delay Wreaks Havoc on Your Smart Home Delay-based Automation Interference Attacks.eng.srt 41.5 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Membership Inference Attacks against Machine Learning Models.eng.srt 41.5 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Static Evaluation of Noninterference using Approximate Model Counting.eng.srt 41.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Birds of a Feather Sharing Cybersecurity Research Artifacts To Accelerate Progress.eng.vtt 41.3 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Reconstructing Training Data with Informed Adversaries.eng.srt 41.2 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Investigating Influencer VPN Ads on YouTube.eng.srt 41.1 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Readactor - Practical Code Randomization Resilient to Memory Disclosure.eng.srt 41.1 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/SysPal System-guided Pattern Locks for Android.eng.srt 40.9 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/TaoStore - Overcoming Asynchronicity in Oblivious Data Storage.eng.srt 40.8 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/FPGA-Based Remote Power Side-Channel Attacks.eng.srt 40.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Birds of a Feather A Hardware & Security Panel (Deprecated).eng.tsv 40.6 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/They're not that hard to mitigate -What Cryptographic Library Developers Think About Timing Attacks.eng.srt 40.6 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/True2F Backdoor resistant authentication tokens Emma Dauterman.eng.srt 40.5 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/PhishFarm A Scalable Framework for Measuring the Effectivness of Evasion Techniques Against.eng.srt 40.4 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/DEEPSEC - Deciding Equivalence Properties in Security Protocols - Theory and Practice.eng.srt 40.4 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Surveylance - Automatically Detecting Online Survey Scams.eng.srt 40.3 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/The Attack of the Clones - A Study of the Impact of Shared Code on Vulnerability Patching.eng.srt 40.2 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/De-Identification's Impact on Minority Representation and Privacy Preservation in the US Census.eng.srt 39.9 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Scraping Sticky Leftovers App User Information Left on Servers After Account Deletion.eng.srt 39.9 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/mmSpy Spying Phone Calls using mmWave Radars.eng.srt 39.8 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Controlled-Channel Attacks - Deterministic Side Channels for Untrusted Operating Systems.eng.srt 39.8 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Leave Me Alone - App-Level Protection against Runtime Information Gathering on Android.eng.srt 39.7 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/How Does Usable Security Not End Up in Software Products Results From a Qualitative Interview Study.eng.srt 39.7 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Verifying and Synthesizing Constant-Resource Implementations with Types.eng.srt 39.6 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Inferring User Routes and Locations using Zero-Permission Mobile Sensors.eng.srt 39.6 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Practical Asynchronous Distributed Key Generation.eng.srt 39.6 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Peekaboo A Hub-Based Approach to Enable Transparency in Data Processing within Smart Homes.eng.srt 39.5 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Should I Worry A Cross Cultural Examination of Account Security Incident Response.eng.srt 39.5 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Vetting SSL Usage in Applications with SSLINT.eng.srt 39.2 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Protecting Private Keys against Memory Disclosure Attacks Using Hardware Transactional Memory.eng.srt 39.2 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Understanding and Monitoring Embedded Web Scripts.eng.srt 39.2 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Cats vs. Spectre An Axiomatic Approach to Modeling Speculative Execution Attacks.eng.srt 38.8 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/DeepSteal Advanced Model Extractions Leveraging Efficient Weight Stealing in Memories.eng.srt 38.7 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Finding and Exploiting CPU Features using MSR Templating.eng.srt 38.7 KB
- IEEE Security & Privacy 2024/2024 567 More is Merrier Relax the Non Collusion Assumption in Multi Server PIR - esnierde.eng.srt 38.7 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/How Not to Protect Your IP - An Industry-Wide Break of IEEE 1735 Implementations.eng.srt 38.6 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Spiral Fast, High-Rate Single-Server PIR via FHE Composition.eng.srt 38.6 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Private Nearest Neighbor Search with Sublinear Communication and Malicious Security.eng.srt 38.6 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Using Throughput-Centric Byzantine Broadcast to Tolerate Malicious Majority in Blockchains.eng.srt 38.6 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Examining Zero-Shot Vulnerability Repair with Large Language Models.eng.srt 38.5 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/The Experts' Insights on the Peer Review Process of Evaluating Security Papers.eng.srt 38.4 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/ZeeStar Private Smart Contracts by Homomorphic Encryption and Zero-knowledge Proofs.eng.srt 38.3 KB
- IEEE Security & Privacy 2024/2024 124 LOKI Large scale Data Reconstruction Attack against Federated Learning through Model Manipu.eng.srt 38.3 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Towards Making Systems Forget with Machine Unlearning.eng.srt 38.2 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP.eng.srt 38.2 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/TROLLMAGNIFIER Detecting State-Sponsored Troll Accounts on Reddit.eng.srt 38.2 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/WtaGraph Web Tracking and Advertising Detection using Graph Neural Networks.eng.srt 38.1 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Dominance as a New Trusted Computing Primitive for the IoT.eng.srt 38.1 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/MatRiCT More Efficient Post-Quantum Private Blockchain Payments.eng.srt 38.1 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/BEACON - Directed Grey-Box Fuzzing with Provable Path Pruning.eng.srt 38.0 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Compiler-assisted Code Randomization.eng.srt 38.0 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Iodine Fast Dynamic Tain't Tracking Using Rollback free Optimistic Hybrid Analysis.eng.srt 37.8 KB
- IEEE Security & Privacy 2024/don't Eject the Impostor - Fast Three Party Computation With a Known Cheater - Andreas Brüggeman.eng.srt 37.7 KB
- IEEE Security & Privacy 2024/gpuzip 20 - yingchen wang.eng.srt 37.6 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Sphinx Enabling Privacy-Preserving Online Learning over the Cloud.eng.srt 37.6 KB
- IEEE Security & Privacy 2024/ItsSimplexIEEESP 20min - Andrew Cullen.eng.srt 37.6 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Waldo A Private Time-Series Database from Function Secret-Sharing.eng.eng.srt 37.6 KB
- IEEE Security & Privacy 2024/43 P4Control Line Rate Cross Host Attack Prevention via In Network Information Flow Control Enabled.eng.srt 37.5 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Back to the Drawing Board A Critical Evaluation of Poisoning Attacks on Federated Learning.eng.srt 37.5 KB
- IEEE Security & Privacy 2024/MAWSEO Adversarial Wiki Search Poisoning for Illicit Online Promotion - Zilong Lin.eng.srt 37.4 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Anti-Tamper Radio System-Level Tamper Detection for Computing Systems.eng.srt 37.4 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/IVD - Automatic Learning and Enforcement of Authorization Rules in Online Social Networks.eng.srt 37.3 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/RIDL Rogue In-Flight Data Load.eng.srt 37.3 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/TinyGarble - Highly Compressed and Scalable Sequential Garbled Circuits.eng.srt 37.2 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Postcards from the Post HTTP World Amplification of HTTPS Vulnerabilities in the Web Ecosystem.eng.srt 37.1 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/SAILFISH Vetting Smart Contract State-Inconsistency Bugs in Seconds.eng.srt 37.1 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/IRShield A Countermeasure Against Adversarial Physical-Layer Wireless Sensing.eng.srt 37.1 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Multi-touch Authentication Using Hand Geometry and Behavioral Information.eng.srt 37.1 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/vSGX Virtualizing SGX Enclaves on AMD SEV.eng.srt 37.0 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Proof Of Stake Sidechains.eng.srt 37.0 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Angora - Efficient Fuzzing by Principled Search.eng.srt 37.0 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Formally Verified Cryptographic Web Applications in WebAssembly.eng.srt 36.9 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/BadEncoder Backdoor Attacks to Pre-trained Encoders in Self-Supervised Learning.eng.srt 36.9 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/SoK An Overview of FHE Compilers and Tools.eng.srt 36.8 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Blacksmith Compromising Target Row Refresh by Rowhammering in the Frequency Domain.eng.srt 36.8 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Transcending TRANSCEND Revisiting Malware Classification in the Presence of Concept Drift.eng.srt 36.7 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/PCR-Auth Solving Authentication Puzzle Challenges with Encoded Palm Contact Responses.eng.srt 36.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Birds of a Feather Sharing Cybersecurity Research Artifacts To Accelerate Progress.eng.txt 36.6 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Desperate Times Call for Desperate Measures - User Concerns with Mobile Loan Apps in Kenya.eng.srt 36.5 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Heapster Analyzing the Security of Dynamic Allocators for Monolithic Firmware Images.eng.srt 36.5 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Noise A Library of Verified High-Performance Secure Channel Protocol Implementations.eng.srt 36.5 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/XCLAIM Trustless Interoperable Cryptocurrency Backed Assets.eng.srt 36.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Birds of a Feather Sharing Cybersecurity Research Artifacts To Accelerate Progress.eng.lrc 36.3 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/SYMBEXCEL Automated Analysis and Understanding of Malicious Excel 4.0 Macros.eng.srt 36.3 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Sabre Sender-Anonymous Messaging with Fast Audits.eng.srt 36.3 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Caelus - Verifying the Consistency of Cloud Services with Battery-Powered Devices.eng.srt 36.2 KB
- IEEE Security & Privacy 2024/Automated Synthesis of Effect Graph Policies for Microservice Aware Stateful System Call Special.eng.srt 36.2 KB
- IEEE Security & Privacy 2024/Tabbed Out Subverting the Android Custom Tab Security Model - Philipp Beer.eng.srt 36.2 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Does Certificate Transparency Break the Web Measuring Adoption and Error Rate.eng.srt 36.1 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/FuzzUSB Hybrid Stateful Fuzzing of USB Gadget Stacks.eng.srt 36.1 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Investigating the Use of Email Encryption for an Entire University.eng.srt 36.0 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Secure Track Verification.eng.srt 36.0 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Downgrade Resilience in Key-Exchange Protocols.eng.srt 35.9 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Hark A Deep Learning System for Navigating Privacy Feedback at Scale.eng.srt 35.9 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/If HTTPS Were Secure I wouldn't Need 2FA End User and Administrator Mental Models of HTTPS.eng.srt 35.6 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Adversarial Prefetch New Cross-Core Cache Side Channel Attacks.eng.srt 35.5 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/ELSA Secure Aggregation for Federated Learning with Malicious Actors.eng.srt 35.4 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/RAB Provable Robustness Against Backdoor Attacks.eng.srt 35.4 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/I Think They're Trying to Tell Me Something - Advice Sources and Selection for Digital Security.eng.srt 35.3 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/A Tough call - Mitigating Advanced Code-Reuse Attacks At The Binary Level.eng.srt 35.3 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Hard Drive of Hearing Disks that Eavesdrop with a Synthesized Microphone.eng.srt 35.3 KB
- IEEE Security & Privacy 2024/Pryde - A Modular Generalizable Workflow for Uncovering Evasion Attacks Against Stateful Firewall.eng.srt 35.2 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Secure Device Bootstrapping without Secrets Resistant to Signal Manipulation Attacks.eng.srt 35.2 KB
- IEEE Security & Privacy 2024/Nebula A Privacy First Platform for Data Backhaul - Jean Luc Watson.eng.srt 35.2 KB
- IEEE Security & Privacy 2024/Pandora - Principled Symbolic Validation of Intel SGX Enclave Runtimes - Jo Van Bulck.eng.srt 35.1 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Learning to Reconstruct Statistical Learning Theory and Encrypted Database Attacks.eng.txt 35.1 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/PGPATCH Policy-Guided Logic Bug Patching for Robotic Vehicles.eng.srt 35.1 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/SoK Shining Light on Shadow Stacks.eng.srt 35.1 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Kiss from a Rogue Evaluating Detectability of Pay-at-the-Pump Card Skimmers.eng.srt 35.1 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Cloak of Visibility - Detecting When Machines Browse a Different Web.eng.srt 35.0 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/SoK General Purpose Frameworks for Secure Multi-Party Computation.eng.srt 35.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Birds of a Feather A Hardware & Security Panel (Deprecated).eng.text 34.9 KB
- IEEE Security & Privacy 2024/LowerBoundsRDP - Tim Kutta.eng.srt 34.9 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/IRQDebloat Reducing Driver Attack Surface in Embedded Devices.eng.srt 34.8 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/SoK Hate, Harassment, and the Changing Landscape of Online Abuse.eng.srt 34.8 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/How Well Do My Results Generalize Comparing Security and Privacy Survey Results from.eng.srt 34.8 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/PERUN Virtual Payment Hubs over Cryptographic Currencies.eng.srt 34.7 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Teaching and Learning Cybersecurity and AI Ethics in High School.eng.srt 34.7 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/SecFloat Accurate Floating-Point meets Secure 2-Party Computation.eng.srt 34.7 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Staying Secure and Unprepared - Understanding and Mitigating the Security Risks of Apple ZeroConf.eng.srt 34.7 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/The State of the SameSite Studying the Usage, Effectiveness, and Adequacy of SameSite Cookies.eng.srt 34.7 KB
- IEEE Security & Privacy 2024/Asterisk Super fast MPC with a Friend - Protik Paul.eng.srt 34.6 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Simple High-Level Code for Cryptographic Arithmetic - With Proofs, Without Compromises.eng.srt 34.5 KB
- IEEE Security & Privacy 2024/attackinng byzantine robustness in high dimensions - kolluri aashish.eng.srt 34.5 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Learning to Reconstruct Statistical Learning Theory and Encrypted Database Attacks.eng.lrc 34.5 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Self-Encrypting Deception Weaknesses in the Encryption of Solid State Drives.eng.srt 34.5 KB
- IEEE Security & Privacy 2024/Group Oblivious Message Retrieval - Thomas.eng.srt 34.4 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Automatic Inference of Search Patterns for Tain't-Style Vulnerabilities.eng.srt 34.4 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/PICCOLO Exposing Complex Backdoors in NLP Transformer Models.eng.srt 34.4 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/SoK Unifying and Applying At-Risk User Research.eng.srt 34.4 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Locally Differentially Private Frequent Itemset Mining.eng.srt 34.3 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/SoK - Secure Messaging.eng.srt 34.3 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Attack Directories, Not Caches Side Channel Attacks in a Non Inclusive World.eng.srt 34.3 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/A Decentralized and Encrypted National Gun Registry.eng.srt 34.3 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols.eng.srt 34.3 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/RT-TEE Real-time System Availability for Cyber-physical Systems using ARM TrustZone.eng.srt 34.3 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Publicly Accountable Robust Multi-Party Computation.eng.srt 34.2 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Reasoning Analytically About Password Cracking Software Alex Liu.eng.srt 34.1 KB
- IEEE Security & Privacy 2024/sp24 long recording - Jannis Rautenstrauch.eng.srt 34.0 KB
- IEEE Security & Privacy 2024/2024 151 Shedding Light on CVSS Scoring Inconsistencies - A User Centric Study on Evaluating Widespre.eng.srt 34.0 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Threshold BBS Signatures for Distributed Anonymous Credential Issuance.eng.srt 34.0 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/WaVe A Verifiably Secure WebAssembly Sandboxing Runtime.eng.srt 34.0 KB
- IEEE Security & Privacy 2024/An Analysis of Recent Advances in Deepfake Image Detection in an Evolving Threat Landscape - sif.eng.srt 34.0 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Adversarial Examples - for Proof-of-Learning.eng.srt 34.0 KB
- IEEE Security & Privacy 2024/Scalable Verification of Zero Knowledge Protocols - MIGUEL ISABEL MÁRQUEZ.eng.srt 33.9 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Neural Cleanse Identifying and Mitigating Backdoor Attacks in Neural Networks.eng.srt 33.9 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/No Pardon for the Interruption - New Inference Attacks on Android Through Interrupt Timing Analysis.eng.srt 33.9 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Synesthesia Detecting Screen Content via Remote Acoustic Side Channels.eng.srt 33.9 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/EmPoWeb Empowering Web Applications with Browser Extensions.eng.srt 33.8 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/RoFL Robustness of Secure Federated Learning.eng.srt 33.8 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/How to Attack and Generate Honeywords.eng.srt 33.8 KB
- IEEE Security & Privacy 2024/The Great Request Robbery Soheil Khodayari - Soheil Khodayari.eng.srt 33.8 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Cracking-Resistant Password Vaults Using Natural Language Encoders.eng.srt 33.8 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/A Formal Security Analysis of the W3C Web Payment APIs Attacks and Verification.eng.srt 33.7 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/LBM A Security Framework for Peripherals within the Linux Kernel.eng.srt 33.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Birds of a Feather A Hardware & Security Panel (Updated).eng.srt 33.7 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/ShadeWatcher Recommendation-guided Cyber Threat Analysis using System Audit Records.eng.srt 33.7 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Vulnerability Discovery for All Experiences of Marginalization in Vulnerability Discovery.eng.srt 33.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Birds of a Feather Sharing Cybersecurity Research Artifacts To Accelerate Progress.eng.tsv 33.5 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Theory and Practice of Finding Eviction Sets.eng.srt 33.5 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Security and Privacy Challenges, Advice, and Opportunities at Cybercafes in Kenya.eng.srt 33.5 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Copy, Right A Testing Framework for Copyright Protection of Deep Learning Models.eng.srt 33.4 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/High-Speed Inter-domain Fault Localization.eng.srt 33.4 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Space Odyssey An Experimental Software Security Analysis of Satellites.eng.srt 33.4 KB
- IEEE Security & Privacy 2024/Cohere Managing Differential Privacy in Large Scale Systems - Nicolas Küchler.eng.srt 33.3 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Doing good by fighting fraud Ethical anti-fraud systems for mobile payments.eng.srt 33.3 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/PROTRR Principled yet Optimal In-DRAM Target Row Refresh.eng.srt 33.1 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Formal Model-Driven Discovery of Bluetooth Protocol Design Vulnerabilities.eng.srt 33.1 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Property Inference from Poisoning.eng.srt 33.1 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Locally Differentially Private Sparse Vector Aggregation.eng.srt 33.0 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/NEUZZ Efficient Fuzzing with Neural Program Smoothing.eng.srt 33.0 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Towards Practical Differentialy Private Convex Optimization.eng.srt 33.0 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/AI2 - Safety and Robustness Certification of Neural Networks.eng.srt 33.0 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Deployment of Source Address Validation by Network Operators A Randomized Control Trial.eng.srt 32.9 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Mind the Gap Studying the Insecurity of Provably Secure Embedded Trusted Execution Architectures.eng.srt 32.9 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/SNARKBlock Federated Anonymous Blocklisting from Hidden Common Input Aggregate Proofs.eng.srt 32.9 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Revisiting Square Root ORAM - Efficient Random Access in Multi-Party Computation.eng.srt 32.9 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Statistical Quantification of Differential Privacy A Local Approach.eng.srt 32.9 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Redactable Blockchain in the Permissionless Setting.eng.srt 32.8 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Spook.js Attacking Chrome Strict Site Isolation via Speculative Execution.eng.srt 32.8 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Diogenes Lightweight Scalable RSA Modulus Generation with a Dishonest Majority.eng.srt 32.7 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Universal Atomic Swaps Secure Exchange of Coins Across All Blockchains.eng.srt 32.7 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Graphics Peeping Unit Exploiting EM Side-Channel Information of GPUs to Eavesdrop on Your Neighbors.eng.srt 32.7 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Blue's Clues Practical Discovery of Non-Discoverable Bluetooth Devices.eng.srt 32.7 KB
- IEEE Security & Privacy 2024/Pudding Private User Discovery in Anonymity Networks - Ceren Kocaogullar.eng.srt 32.6 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Bitcoin-Compatible Virtual Channels.eng.srt 32.5 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Spinning Language Models Risks of Propaganda-as-a-Service and Countermeasures.eng.srt 32.5 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Blue Is the New Black (Market) Privacy Leaks and Re-Victimization from Police-Auctioned Cellphones.eng.srt 32.5 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Towards Automated Safety Vetting of PLC Code in Real World Plants Mu Zhang.eng.srt 32.5 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Sending out an SMS - Characterizing the Security of the SMS Ecosystem with Public Gateways.eng.srt 32.5 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/SoK How Robust is Image Classification Deep Neural Network Watermarking.eng.srt 32.5 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/SoK Authentication in Augmented and Virtual Reality.eng.srt 32.4 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Differentially Private Model Publishing For Deep Learning.eng.srt 32.2 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Is Private Learning Possible with Instance Encoding.eng.srt 32.1 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Threshold ECDSA from ECDSA Assumptions The Multiparty Case.eng.srt 32.1 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/SoK Computer-Aided Cryptography.eng.srt 32.0 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Asm2Vec Boosting Static Representation Robustness for Binary Clone Search.eng.srt 32.0 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Ouroboros Crypsinous Privacy Preserving Proof of Stake.eng.srt 32.0 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/K-Scheduler Effective Seed Scheduling for Fuzzing with Graph Centrality Analysis.eng.srt 32.0 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Is Cryptographic Deniability Sufficient Non-Expert Perceptions of Deniability in Secure Messaging.eng.srt 31.9 KB
- IEEE Security & Privacy 2024/MIMOCrypt - Jun Luo John.eng.srt 31.9 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Hide and Seek with Spectres Efficient discovery of speculative vulnerabilities with random testing.eng.srt 31.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Birds of a Feather A Hardware & Security Panel (Updated).eng.txt 31.8 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/HackEd A Pedagogical Analysis of Online Vulnerability Discovery Exercises.eng.srt 31.7 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Seeking Nonsense, Looking for Trouble - Efficient Promotional-Infection Detection through.eng.srt 31.7 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Adversarial Watermarking Transformer Towards Tracing Text Provenance with Data Hiding.eng.srt 31.7 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Trust, But Verify A Longitudinal Analysis Of Android OEM Compliance and Customization.eng.srt 31.7 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Under the Shadow of Sunshine - Understanding & Detecting Bulletproof Hosting.eng.srt 31.6 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/SoK A Critical Evaluation of Efficient Website Fingerprinting Defenses.eng.srt 31.6 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/CaSym Cache Aware Symbolic Execution for Side Channel Detection and Mitigation.eng.srt 31.6 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Exploit the Last Straw That Breaks Android Systems.eng.srt 31.6 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/SmartPulse Automated Checking of Temporal Properties in Smart Contracts.eng.srt 31.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Birds of a Feather A Hardware & Security Panel (Updated).eng.lrc 31.5 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Why Crypto-detectors Fail A Systematic Evaluation of Cryptographic Misuse Detection Techniques.eng.srt 31.5 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/ProVerif with Lemmas, Induction, Fast Subsumption, and Much More.eng.srt 31.5 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/STOCHFUZZ Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic.eng.srt 31.5 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/SensorID Sensor Calibration Fingerprinting for Smartphones.eng.srt 31.4 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/SoK Practical Foundations for Software Spectre Defenses.eng.srt 31.4 KB
- IEEE Security & Privacy 2024/Serberus Protecting Cryptographic Code frrom Spectres at Compile Time - Nicholas Hunter Mosier.eng.srt 31.4 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/DeepCASE Semi-Supervised Contextual Analysis of Security Events.eng.srt 31.4 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Jigsaw Efficient and Scalable Path Constraints Fuzzing.eng.srt 31.4 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/HAMRAZ Resilient Partitioning and Replication.eng.srt 31.4 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Helen Maliciously Secure Coopetitive Learning for Linear Models.eng.srt 31.4 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Compact Certificates of Collective Knowledge.eng.srt 31.3 KB
- IEEE Security & Privacy 2024/2024 471 Private Hierarchical Governance for Encrypted Messaging - Armin Namavari.eng.srt 31.3 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/COBRA Dynamic Proactive Secret Sharing for Confidential BFT Services.eng.srt 31.3 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Epochal Signatures for Deniable Group Chats.eng.srt 31.3 KB
- IEEE Security & Privacy 2024/2024 606 BOLT Privacy Preserving, Accurate and Efficient Inference for Transformers - Qi Pang.eng.srt 31.3 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Four Attacks and a Proof for Telegram.eng.srt 31.2 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Exploiting Correcting Codes On the Effectiveness of ECC Memory Against Rowhammer Attacks.eng.srt 31.2 KB
- IEEE Security & Privacy 2024/From Chatbots to Phishbots Phishing Scam Generation in Commercial Large Language Models - Sayak.eng.srt 31.2 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Silph A Framework for Scalable and Accurate Generation of Hybrid MPC Protocols.eng.srt 31.1 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/IronMask Versatile Verification of Masking Security.eng.srt 31.1 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/SoK Sanitizing for Security Dokyung Song.eng.srt 31.0 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/MEGA Malleable Encryption Goes Awry.eng.srt 31.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Birds of a Feather A Hardware & Security Panel (Updated).eng.vtt 31.0 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Characterizing Pixel Tracking through the Lens of Disposable Email Services.eng.srt 31.0 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/SPURT Scalable Distributed Randomness Beacon with Transparent Setup.eng.srt 31.0 KB
- IEEE Security & Privacy 2024/Piano Extremely Simple Single Server PIR with Sublinear Server Computation - Mingxun Zhou.eng.srt 31.0 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Private Eye On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing.eng.srt 30.9 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/High-Assurance Cryptography in the Spectre Era.eng.srt 30.9 KB
- IEEE Security & Privacy 2024/2024 11 NetShuffle Circumventing Censorship with Shuffle Proxies at the Edge - Patrick Kon.eng.srt 30.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/High Precision Open-World Website Fingerprinting.eng.txt 30.8 KB
- IEEE Security & Privacy 2024/INVISILINE Invisible Plausibly Deniable Storage - Sandeep Kiran Pinjala.eng.srt 30.8 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Self-Supervised Euphemism Detection and Identification for Content Moderation.eng.srt 30.8 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Measuring and Analyzing Search Engine Poisoning of Linguistic Collisions.eng.srt 30.8 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Differentially Private Histograms in the Shuffle Model from Fake Users.eng.srt 30.7 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Shedding Light on Inconsistencies in Grid Cybersecurity Disconnects and Recommendations.eng.srt 30.7 KB
- IEEE Security & Privacy 2024/Efficient and Generic Microarchitectural Hash Function Recovery - Lukas Gerlach.eng.srt 30.7 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Certified Robustness to Adversarial Examples with Differential Privacy.eng.srt 30.7 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Zero Knowledge for Everything and Everyone Fast ZK Processor with Cached ORAM for ANSI C Programs.eng.srt 30.6 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Augury Using Data Memory-Dependent Prefetchers to Leak Data at Rest.eng.srt 30.6 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Drones' Cryptanalysis - Detecting Privacy Invasion Attacks Conducted by Drone.eng.srt 30.5 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Bookworm Game Automatic Discovery of LTE Vulnerabilities Through Documentation Analysis.eng.srt 30.3 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/SoK History is a Vast Early Warning System Auditing the Provenance of System Intrusions.eng.srt 30.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/High Precision Open-World Website Fingerprinting.eng.lrc 30.3 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Short Text, Large Effect Measuring the Impact of User Reviews on Android App Security & Privacy.eng.srt 30.3 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Security of GPS INS based On-road Location Tracking Systems.eng.srt 30.2 KB
- IEEE Security & Privacy 2024/Eureka Presentation - Yu Wei.eng.srt 30.2 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/SoK The Faults in our ASRs An Overview of Attacks against Automatic Speech Recognition and.eng.srt 30.2 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Model Orthogonalization Class Distance Hardening in Neural Networks for Better Security.eng.srt 30.1 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Practical EMV Relay Protection.eng.srt 30.1 KB
- IEEE Security & Privacy 2024/2024 449 Undefined oriented Programming - Detecting and Chaining Prototype Pollution Gadgets in Node.eng.srt 30.1 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/CanDID Bootstrapping Decentralized Identity from Legacy Providers.eng.srt 30.1 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Skilled or Gullible Gender Stereotypes Related to Computer Security and Privacy.eng.srt 30.0 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/FLUTE Fast and Secure Lookup Table Evaluations.eng.srt 30.0 KB
- IEEE Security & Privacy 2024/Everyone for Themselves - A Qualitative Study about Individual Security Setups of Open Source Sof.eng.srt 30.0 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Arbitrary Modulation of Electromagnetic Noise from Unprivileged Software Impacting Emission Security.eng.srt 30.0 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/The Code That Never Ran Modeling Attacks on Speculative Evaluation.eng.srt 30.0 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Certifiably Robust Object Detection against Patch Hiding Attacks via Patch-agnostic Masking.eng.srt 29.9 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Port Contention for Fun and Profit.eng.srt 29.9 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Breaking LTE on Layer Two.eng.srt 29.9 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Understanding the Security of ARM Debugging Features.eng.srt 29.9 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/SCAPHY Detecting Modern ICS Attacks by Correlating Behaviors in SCADA and PHYsical.eng.srt 29.9 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/OWL Compositional Verification of Security Protocols via an Information-Flow Type System.eng.srt 29.9 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/PCspooF Compromising the Safety of Time-Triggered Ethernet.eng.srt 29.8 KB
- IEEE Security & Privacy 2024/2024 237 SoK Unintended Interactions among ML Defenses and Risks - Vasisht Duddu.eng.srt 29.8 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Systematic Analysis of Randomization-based Protected Cache Architectures.eng.srt 29.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Birds of a Feather Sharing Cybersecurity Research Artifacts To Accelerate Progress.eng.text 29.7 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer.eng.srt 29.7 KB
- IEEE Security & Privacy 2024/Larger scale Nakamoto style Blockchains Don’t Necessarily Offer Better Security - Jannik Albrech.eng.srt 29.7 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/A Secret-Free Hypervisor Rethinking Isolation in the Age of Speculative Vulnerabilities.eng.srt 29.7 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Connection-Oriented DNS to Improve Privacy and Security.eng.srt 29.6 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Surakav Generating Realistic Traces for a Strong Website Fingerprinting Defense.eng.srt 29.6 KB
- IEEE Security & Privacy 2024/Understanding the Privacy Practices of Political Campaigns A Perspective from the 2020 US Election.eng.srt 29.6 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/SoK Security Evaluation of Home Based IoT Deployment.eng.srt 29.5 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/LinkTeller Recovering Private Edges from Graph Neural Networks via Influence Analysis.eng.srt 29.5 KB
- IEEE Security & Privacy 2024/Leaky Address Masking - Mathé Hertogh 1.eng.srt 29.5 KB
- IEEE Security & Privacy 2024/2024 467 ARMOR A Formally Verified Implementation of X 509 Certificate Chain Validation - Joyanta De.eng.srt 29.5 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/One Key to Rule Them All Secure Group Pairing for Heterogeneous IoT Devices.eng.srt 29.4 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Not Yet Another Digital ID Privacy-preserving Humanitarian Aid Distribution.eng.srt 29.4 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Demystifying Hidden Privacy Settings in Mobile Apps.eng.srt 29.3 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Multi-Round Single-Server Secure Aggregation with Applications to Private Federated Learning.eng.srt 29.3 KB
- IEEE Security & Privacy 2024/2024 18 A Practical Root Cause Analysis System with an Under Constrained State Mutation - 박영기.eng.srt 29.2 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Dedup Est Machina - Memory Deduplication as an Advanced Exploitation Vector.eng.srt 29.2 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Universal 3-Dimensional Perturbations for Black-Box Attacks on Video Recognition Systems.eng.srt 29.1 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Many-out-of-Many - Proofs and Applications to Anonymous Zether.eng.srt 29.1 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/SoK The Dual Nature of Technology in Sexual Assault.eng.srt 29.0 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/On the Feasibility of Rerouting-Based DDoS Defenses.eng.srt 29.0 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Electromagnetic Covert Channels Can Be Super Resilient.eng.srt 28.9 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security.eng.srt 28.9 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Using Selective Memoization to Defeat Regular Expression Denial of Service (ReDoS).eng.srt 28.9 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Lay Down the Common Metrics Evaluating Proof of Work Consensus Protocols' Security.eng.srt 28.9 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Security Analysis of the MLS Key Derivation.eng.srt 28.9 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Deep perceptual hashing algorithms with hidden dual purpose client-side scanning facial recognition.eng.srt 28.9 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/OmniLedger - A Secure, Scale-Out, Decentralized Ledger via Sharding.eng.txt 28.8 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/ProFuzzer On-the-fly Input Type Probing for Better Zero-day Vulnerability Discovery.eng.srt 28.8 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Practically-Exploitable Cryptographic Vulnerabilities in Matrix.eng.srt 28.8 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Lightweight Techniques for Private Heavy Hitters.eng.srt 28.8 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Hear No Evil, See Kenansville Efficient and Transferable Black-Box Attacks on Automatic.eng.srt 28.8 KB
- IEEE Security & Privacy 2024/SP24 HD - Florian Hantke.eng.srt 28.7 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/PyFET Forensically Equivalent Transformation for Python Binary Decompilation.eng.srt 28.7 KB
- IEEE Security & Privacy 2024/2024 76 Formal Dolev Yao Models Meet Cryptographic Protocol Fuzz Testing - Max Ammann.eng.srt 28.7 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/ARBITRAR - User-Guided API Misuse Detection.eng.srt 28.6 KB
- IEEE Security & Privacy 2024/2024 05 22 02 41 48 H 264 - Rui Xi.eng.srt 28.6 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Touching the Untouchables Dynamic Security Analysis of the LTE Control Plane.eng.srt 28.6 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/TELEPATH A Minecraft-based Covert Communication System.eng.srt 28.6 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Model Stealing Attacks Against Inductive Graph Neural Networks.eng.srt 28.5 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Razzer Finding Kernel Race Bugs through Fuzzing.eng.srt 28.5 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Confident Monte Carlo Rigorous Analysis of Guessing Curves for Probabilistic Password Models.eng.srt 28.5 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/IEEE S&P 2019 - Opening Remarks - Program Chair.eng.srt 28.5 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Detecting Filter List Evasion With Event-Loop-Turn Granularity JavaScript Signatures.eng.srt 28.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Tale of Sea and Sky On the Security of Maritime VSAT Communications.eng.txt 28.5 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Typing High-Speed Cryptography against Spectre v1.eng.srt 28.4 KB
- IEEE Security & Privacy 2024/2024 171 Private Analytics via Streaming, Sketching, and Silently Verifiable Proofs - Mayank Rathee.eng.srt 28.4 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Good Bot, Bad Bot Characterizing Automated Browsing Activity.eng.srt 28.4 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/OmniLedger - A Secure, Scale-Out, Decentralized Ledger via Sharding.eng.lrc 28.4 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Breaking Security-Critical Voice Authentication.eng.srt 28.4 KB
- IEEE Security & Privacy 2024/SrcMarker Dual channel Source Code Watermarking via Scalable Code Transformations - 杨博睿.eng.srt 28.4 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/The Leaky Web Automated Discovery of Cross-Site Information Leaks in Browsers and the Web.eng.srt 28.4 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Resident Evil Understanding Residential IP Proxy as a Dark Service.eng.srt 28.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Birds of a Feather A Hardware & Security Panel (Updated).eng.tsv 28.3 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Exposed Infrastructures-Discovery, Attacks and Remediation of Insecure ICS Remote Management Devices.eng.srt 28.2 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/WeRLman To Tackle Whale (Transactions), Go Deep (RL).eng.srt 28.2 KB
- IEEE Security & Privacy 2024/Janus Safe Biometric Deduplication for Humanitarian Aid Distribution - kasra EdalatNejad.eng.srt 28.1 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Repairing DoS Vulnerability of Real-World Regexes.eng.srt 28.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Tale of Sea and Sky On the Security of Maritime VSAT Communications.eng.lrc 28.1 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Comprehensive Privacy Analysis of Deep Learning.eng.srt 28.0 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Time-Print Authenticating USB Flash Drives with Novel Timing Fingerprints.eng.srt 28.0 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/OSPREY Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary.eng.srt 28.0 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/They Would do Better if They Worked Together The Case of Interaction Problems Between Password.eng.srt 28.0 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/LazyTAP On-Demand Data Minimization for Trigger-Action Applications.eng.srt 28.0 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Adaptive Risk-Limiting Comparison Audits.eng.srt 27.9 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Attacks on Wireless Coexistence.eng.srt 27.9 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/SMILE Secure Memory Introspection for Live Enclave.eng.srt 27.9 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Securing Multiparty Online Services Via Certification of Symbolic Transactions.eng.srt 27.9 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/SoK Quantifying Cyber Risk.eng.srt 27.9 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Analyzing Ground-Truth Data of Mobile Gambling Scam.eng.srt 27.9 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Security of Multi-Sensor Fusion based Perception in Autonomous Driving Under Physical-World Attacks.eng.srt 27.8 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Are We There Yet Timing and Floating-Point Attacks on Differential Privacy Systems.eng.srt 27.8 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/GREBE Unveiling Exploitation Potential for Linux Kernel Bugs.eng.srt 27.8 KB
- IEEE Security & Privacy 2024/9 PrunePlumTree - Finding Eviction Sets at Scale - Tom Kissos.eng.srt 27.8 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/On the Security of Two-Round Multi-Signatures.eng.srt 27.7 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Leveraging Sandboxes for a Minimally Invasive Browser Fingerprinting Defense.eng.srt 27.7 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Learning to Reconstruct Statistical Learning Theory and Encrypted Database Attacks.eng.tsv 27.7 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/DVFS Frequently Leaks Secrets Hertzbleed Attacks Beyond SIKE, Cryptography, and CPU-Only Data.eng.srt 27.7 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/IPvSeeYou Exploiting Leaked Identifiers in IPv6 for Street-Level Geolocation.eng.srt 27.7 KB
- IEEE Security & Privacy 2024/Architectural Mimicry - Innovative Instructions to Efficiently Address Control Flow Leakage in Dat.eng.srt 27.7 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/A Secure and Formally Verified Linux KVM Hypervisor.eng.srt 27.7 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Collaborative Ad Transparency Promises and Limitations.eng.srt 27.6 KB
- IEEE Security & Privacy 2024/video - Zhen Xiang.eng.srt 27.6 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/T-Fuzz Fuzzing by Program Transformation - Hui Peng.eng.txt 27.6 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/SPHINCSC Compressing SPHINCS With (Almost) No Cost.eng.srt 27.6 KB
- IEEE Security & Privacy 2024/Nightshade Prompt Specific Poisoning Attacks on Text to Image Generative Models - Shawn Shan.eng.srt 27.5 KB
- IEEE Security & Privacy 2024/#144 TCP Spoofing Reliable Payload Transmission Past the Spoofed TCP Handshake - Eric Pan.eng.srt 27.5 KB
- IEEE Security & Privacy 2024/Signing in Four Public Software Package Registries Quantity, Quality, and Influencing Factors.eng.srt 27.5 KB
- IEEE Security & Privacy 2024/2024 267 Wear's my Data - Understanding the Cross Device Runtime Permission Model in Wearables - Dogu.eng.srt 27.5 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Rethinking Searchable Symmetric Encryption.eng.srt 27.5 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Proof-of-Learning Definitions and Practice.eng.srt 27.5 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/The EMV Standard Break, Fix, Verify.eng.srt 27.5 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/NTFUZZ Enabling Type-Aware Kernel Fuzzing on Windows with Static Binary Analysis.eng.srt 27.4 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Which Privacy and Security Attributes Most Impact Consumers' Risk Perception and Willingness to.eng.srt 27.4 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/PLATYPUS Software-based Power Side-Channel Attacks on x86.eng.srt 27.4 KB
- IEEE Security & Privacy 2024/WeSee Using Malicious #VC Interrupts to Break AMD SEV SNP - Supraja Sridhara.eng.srt 27.4 KB
- IEEE Security & Privacy 2024/2024 22 BUSted Microarchitectural Side Channel Attacks on the MCU Bus Interconnect - Cristiano Rodri.eng.srt 27.3 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Practical Timing Side-Channel Attacks on Memory Compression.eng.srt 27.3 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/When and Why Do People Want Ad Targeting Explanations Evidence from a Mixed-Methods Field Study.eng.srt 27.3 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Committed to Trust A Qualitative Study on Security & Trust in Open Source Software Projects.eng.srt 27.3 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/No Privacy in the Electronics Repair Industry.eng.srt 27.3 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Method Confusion Attack on the Bluetooth Pairing Process.eng.srt 27.2 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/DP-Sniper Black-Box Discovery of Differential Privacy Violations using Classifiers.eng.srt 27.1 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/DeepCoFFEA Improved Flow Correlation Attacks on Tor via Metric Learning and Amplification.eng.srt 27.1 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Cross-Domain Access Control Encryption - Arbitrary-policy, Constant-size, Efficient.eng.srt 27.1 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Bitcoin-Enhanced Proof-of-Stake Security Possibilities and Impossibilities.eng.srt 27.1 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/From 5G Sniffing to Harvesting Leakages of Privacy-Preserving Messengers.eng.srt 27.1 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/T-Fuzz Fuzzing by Program Transformation - Hui Peng.eng.lrc 27.1 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Bitcoin vs. Bitcoin Cash Coexistence or Downfall of Bitcoin Cash.eng.srt 27.1 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/SIRAJ A Unified Framework for Aggregation of Malicious Entity Detectors.eng.srt 27.1 KB
- IEEE Security & Privacy 2024/Saiid El Hajj Chehade SINBAD 20 min - Saiid El Hajj Chehade.eng.srt 27.0 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/On the (In)security of Peer-to-Peer Decentralized Machine Learning.eng.srt 27.0 KB
- IEEE Security & Privacy 2024/CanWeCastABallotAsIntendedAndBeReceiptFree - Henri Devillez.eng.srt 27.0 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Deepfake Text Detection Limitations and Opportunities.eng.srt 27.0 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Wolverine Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and.eng.srt 26.9 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Dangerous Skills Understanding and Mitigating Security Risks of Voice-Controlled Third-Party.eng.srt 26.9 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Understanding the Security and Privacy Attitudes of Smart Home Users on Reddit.eng.srt 26.9 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/F-BLEAU Fast Black-box Leakage Estimation.eng.srt 26.9 KB
- IEEE Security & Privacy 2024/2024 431 Routing Attacks on Cryptocurrency Mining Pools - Muoi Tran.eng.srt 26.8 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/GraphSPD Graph-Based Security Patch Detection with Enriched Code Semantics.eng.srt 26.8 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/It’s (DOM) Clobbering Time Attack Techniques, Prevalence, and Defenses.eng.srt 26.8 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/SNAP Efficient Extraction of Private Properties with Poisoning.eng.srt 26.8 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Detection of Inconsistencies in Privacy Practices of Browser Extensions.eng.srt 26.7 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Always Contribute Back A Qualitative Study on Security Challenges of the Open Source Supply Chain.eng.srt 26.7 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Ebb-and-Flow Protocols A Resolution of the Availability-Finality Dilemma.eng.srt 26.7 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/SoK The Challenges Pitfalls and Perils of Using Hardware Performance Counters for Security.eng.srt 26.7 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Merkle2 A Low-Latency Transparency Log System.eng.srt 26.7 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Characterizing Everyday Misuse of Smart Home Devices.eng.srt 26.7 KB
- IEEE Security & Privacy 2024/SoK CollusionResistantMPSI - Jelle Vos.eng.srt 26.7 KB
- IEEE Security & Privacy 2024/SoK Prudent Evaluation Practices for Fuzzing - Moritz Schloegel.eng.srt 26.7 KB
- IEEE Security & Privacy 2024/415 - SoK Efficient Design and Implementation of Polynomial Hash Functions over Prime Fields - Jan G.eng.srt 26.6 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Fuzzing File Systems via Two-Dimensional Input Space Exploration.eng.srt 26.6 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/REGA Scalable Rowhammer Mitigation with Refresh-Generating Activations.eng.srt 26.6 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/User Perceptions and Experiences with Smart Home Updates.eng.srt 26.6 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/On the Anonymity Guarantees of Anonymous Proof-of-Stake Protocols.eng.srt 26.5 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/A Theory to Instruct Differentially-Private Learning via Clipping Bias Reduction.eng.srt 26.5 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/An Interactive Prover for Protocol Verification in the Computational Model.eng.srt 26.5 KB
- IEEE Security & Privacy 2024/GroVE 20mins S&P - Asim Waheed.eng.srt 26.4 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/SoK Distributed Randomness Beacons.eng.srt 26.4 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Improving Developers' Understanding of Regex Denial of Service Tools.eng.srt 26.4 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/CrossTalk Speculative Data Leaks Across Cores Are Real.eng.srt 26.4 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/An Extensive Formal Security Analysis of the OpenID Financial grade API Pedram Hosseyni.eng.srt 26.4 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/mmSpoof Resilient Spoofing of Automotive Millimeter-wave Radars using Reflect Array.eng.srt 26.3 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Journey to the Center of the Cookie Ecosystem Unraveling Actors' Roles and Relationships.eng.srt 26.3 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Survivalism Systematic Analysis of Malware Living-Off-The-Land.eng.srt 26.1 KB
- IEEE Security & Privacy 2024/2024 158 Jaehan Kim PassREfinder Credential Stuffing Risk Prediction by Representing Password Reuse.eng.srt 26.1 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/SecureCells A Secure Compartmentalized Architecture.eng.srt 26.1 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Learning to Reconstruct Statistical Learning Theory and Encrypted Database Attacks.eng.srt 26.1 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Less Is More Refinement Proofs for Probabilistic Proofs.eng.srt 26.1 KB
- IEEE Security & Privacy 2024/From Principle to Practice Vertical Data Minimization for Machine Learning - Robin Staab.eng.srt 26.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/How Not to Prove Your Election Outcome.eng.txt 26.1 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/SoK Security and Privacy in the Age of Commercial Drones.eng.srt 26.0 KB
- IEEE Security & Privacy 2024/S&PFinal - Louis Henri.eng.srt 26.0 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Waldo A Private Time-Series Database from Function Secret-Sharing.eng.srt 26.0 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Quantifying Blockchain Extractable Value How dark is the forest.eng.srt 26.0 KB
- IEEE Security & Privacy 2024/A Representative Study on Human Detection of Artificially Generated Media Across Countries - Joe.eng.srt 25.9 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/DIANE Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices.eng.srt 25.9 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/RuleKeeper GDPR-Aware Personal Data Compliance for Web Frameworks.eng.srt 25.9 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/SoK Let the Privacy Games Begin A Unified Treatment of Data Inference Privacy in Machine Learning.eng.srt 25.9 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/CryptGPU Fast Privacy-Preserving Machine Learning on the GPU.eng.srt 25.8 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/TrojanModel A Practical Trojan Attack against Automatic Speech Recognition Systems.eng.srt 25.8 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Black Widow Blackbox Data-driven Web Scanning.eng.srt 25.8 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/High-Order Masking of Lattice Signatures in Quasilinear Time.eng.srt 25.8 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/BLEDiff - Scalable and Property-Agnostic Noncompliance Checking for BLE Implementations.eng.srt 25.8 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Inducing Wireless Chargers to Voice Out for Inaudible Command Attacks.eng.srt 25.7 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Disassembling ARM Binaries by Lightweight Superset Instruction Interpretation and Graph Modeling.eng.srt 25.7 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Why Does Your Data Leak Uncovering the Data Leakage in Cloud from Mobile Apps.eng.srt 25.7 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/SoK Anti-Facial Recognition Technology.eng.srt 25.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/How Not to Prove Your Election Outcome.eng.lrc 25.7 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Happer Unpacking Android Apps via a Hardware-Assisted Approach.eng.srt 25.7 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/A Security RISC Microarchitectural Attacks on Hardware RISC-V CPUs.eng.srt 25.7 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Threshold Signatures in the Multiverse.eng.srt 25.7 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Perceptions of Distributed Ledger Technology Key Management-Interviews with Finance Professionals.eng.srt 25.7 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/TeSec Accurate Server-side Attack Investigation for Web Applications.eng.srt 25.7 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Revealer Detecting and Exploiting Regular Expression Denial-of-Service Vulnerabilities.eng.srt 25.6 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/SoK Demystifying Binary Lifters Through the Lens of Downstream Applications.eng.srt 25.6 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Timing-Based Browsing Privacy Vulnerabilities Via Site Isolation.eng.srt 25.6 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Opening Remarks of the 2016 IEEE Symposium on Security & Privacy.eng.srt 25.6 KB
- IEEE Security & Privacy 2024/2024 125 DeepTheft Stealing DNN Model Architectures through Power Side Channel - Garrison Gao.eng.srt 25.5 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Characterizing the Limits of POV Acoustic Eavesdropping from Smartphone Cameras.eng.srt 25.5 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Private Access Control for Function Secret Sharing.eng.srt 25.5 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Breaking the Specification Certified PDF.eng.srt 25.5 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/KHyperLogLog Estimating Reidentifiability and Joinability of Large Data at Scale Pern Hui Chia.eng.srt 25.4 KB
- IEEE Security & Privacy 2024/2024 61 ERASAN Efficient Rust Address Sanitizer - Jiun Min.eng.srt 25.4 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Disguising Attacks with Explanation-Aware Backdoors.eng.srt 25.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Krace Data Race Fuzzing for Kernel File Systems.eng.srt 25.3 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Design and Evaluation of Inclusive Email Security Indicators for People with Visual Impairments.eng.srt 25.3 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Scatter and Split Securely Defeating Cache Contention and Occupancy Attacks.eng.srt 25.2 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/ImU Physical Impersonating Attack for Face Recognition System with Natural Style Changes.eng.srt 25.2 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/OmniLedger - A Secure, Scale-Out, Decentralized Ledger via Sharding.eng.srt 25.2 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/High-Frequency Trading on Decentralized On-Chain Exchanges.eng.srt 25.2 KB
- IEEE Security & Privacy 2024/Break the Wall from bottom Automated Discovery of Protocol Level Evasion Vulnerabilities in Web.eng.srt 25.2 KB
- IEEE Security & Privacy 2024/6 Efficient Zero knowledge Arguments for Paillier Cryptosystem - Rae Gong1.eng.srt 25.1 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Sound Verification of Security Protocols From Design to Interoperable Implementations.eng.srt 25.1 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/A Novel Dynamic Analysis Infrastructure to Instrument Untrusted Execution Flow Across User-Kernel.eng.srt 25.1 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Data Recovery on Encrypted Databases with k-Nearest Neighbor Query Leakage.eng.txt 25.0 KB
- IEEE Security & Privacy 2024/6 Efficient Zero knowledge Arguments for Paillier Cryptosystem - Rae Gong.eng.srt 25.0 KB
- IEEE Security & Privacy 2024/tor1 - Zhongtang Luo.eng.srt 24.9 KB
- IEEE Security & Privacy 2024/2024 13 Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis.eng.srt 24.9 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Jigsaw Puzzle Selective Backdoor Attack to Subvert Malware Classifiers.eng.srt 24.9 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/SyzDescribe Principled, Automated, Static Generation of Syscall Descriptions for Kernel Drivers.eng.srt 24.8 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Precise Detection of Kernel Data Races with Probabilistic Lockset Analysis.eng.srt 24.8 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Uncovering User Interactions on Smartphones via Contactless Wireless Charging Side Channels.eng.srt 24.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Krace Data Race Fuzzing for Kernel File Systems.eng.txt 24.7 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/AEM Facilitating Cross-Version Exploitability Assessment of Linux Kernel Vulnerabilities.eng.srt 24.7 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/BlindHub Bitcoin-Compatible Privacy-Preserving Payment Channel Hubs Supporting Variable Amounts.eng.srt 24.7 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Data Recovery on Encrypted Databases with k-Nearest Neighbor Query Leakage.eng.lrc 24.7 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/The 9 Lives of Bleichenbachers CAT New Cache ATtacks on TLS Implementations.eng.srt 24.6 KB
- IEEE Security & Privacy 2024/SneakyPrompt Jailbreaking Text to image Generative Models - Yuchen Yang.eng.srt 24.6 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Practical Program Modularization with Type-Based Dependence Analysis.eng.srt 24.6 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/DEPCOMM Graph Summarization on System Audit Logs for Attack Investigation.eng.srt 24.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Krace Data Race Fuzzing for Kernel File Systems.eng.lrc 24.5 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Tap 'n Ghost A Compilation of Novel Attack Techniques against Smartphone Touchscreens.eng.srt 24.5 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Invisible Probe Timing Attacks with PCIe Congestion Side-channel.eng.srt 24.4 KB
- IEEE Security & Privacy 2024/Security Privacy and Data Sharing Challenges When Moving to the US Insights from a Qualitative s.eng.srt 24.4 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/SoK - Deep Packer Inspection - A Longitudinal Study of the Complexity of Run-Time Packers.eng.txt 24.4 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/ShadowNet A Secure and Efficient On-device Model Inference System for Convolutional Neural Networks.eng.srt 24.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/High Precision Open-World Website Fingerprinting.eng.tsv 24.3 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Exploiting Unintended Feature leakage in Collaborative Learning Congzheng Song.eng.srt 24.3 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Implementing and Proving the TLS 1.3 Record Layer.eng.srt 24.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SEVurity No Security Without Integrity - Breaking Integrity.eng.srt 24.3 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/An Interview on the Security and Privacy Development Practices in Turkish Software Startups.eng.srt 24.3 KB
- IEEE Security & Privacy 2024/Targeted and Troublesome Zahra Moti - Zahra Moti.eng.srt 24.3 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/A First Look at Zoombombing.eng.srt 24.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/VerX Safety Verification of Smart Contracts.eng.txt 24.3 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/SoK Certified Robustness for Deep Neural Networks.eng.srt 24.3 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Keep the Dirt Tain'ted TreeKEM, Adaptively and Actively Secure Continuous Group Key Agreement.eng.srt 24.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Hijacking Transient Execution through Microarchitectural Load Value Injection.eng.txt 24.2 KB
- IEEE Security & Privacy 2024/2024 637 Poisoned ChatGPT Finds Work for Idle Hands Exploring Developers - Coding Practices with Inse.eng.srt 24.2 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Half&Half Demystifying Intel’s Directional Branch Predictors for Fast, Secure Partitioned Execution.eng.srt 24.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Birds of a Feather A Hardware & Security Panel (Updated).eng.text 24.2 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/MPCAuth Multi-factor Authentication for Distributed-trust Systems.eng.srt 24.2 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/EC Embedded Systems Compartmentalization via Intra-Kernel Isolation.eng.srt 24.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SPIDER Enabling Fast Patch Propagation in Related Software Repositories.eng.txt 24.2 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/WebSpec Towards Machine-Checked Analysis of Browser Security Mechanisms.eng.srt 24.2 KB
- IEEE Security & Privacy 2024/2024 519 From Individual Computation to Allied Optimization Remodeling Privacy Preserving Neural Inf.eng.srt 24.1 KB
- IEEE Security & Privacy 2024/Measure Observe Remeasure An Interactive Paradigm for Differentially Private Exploratory Analysis.eng.srt 24.1 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/SoK - Deep Packer Inspection - A Longitudinal Study of the Complexity of Run-Time Packers.eng.lrc 24.1 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Blind Certificate Authorities.eng.srt 24.1 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/TEEzz Fuzzing Trusted Applications on COTS Android Devices.eng.srt 24.1 KB
- IEEE Security & Privacy 2024/SoK Security and Privacy of Blockchain Interoperability - André Augusto.eng.srt 24.1 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Learning to Reconstruct Statistical Learning Theory and Encrypted Database Attacks.eng.vtt 24.1 KB
- IEEE Security & Privacy 2024/Scalable Mixed Mode MPC - Radhika Garg.eng.srt 24.1 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Low-Cost Privilege Separation with Compile Time Compartmentalization for Embedded Systems.eng.srt 24.1 KB
- IEEE Security & Privacy 2024/don't Shoot the Messenger - Localization Prevention of Satellite Internet Users - Richard Mitev.eng.srt 24.0 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/GraphSC - Parallel Secure Computation Made Easy.eng.txt 24.0 KB
- IEEE Security & Privacy 2024/Thwarting Last Minute Voter Coercion - Rosario Giustolisi.eng.srt 24.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability.eng.txt 24.0 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/A Real-World Hardware Trojan Detection Case Study Across Four Modern CMOS Technology Generations.eng.srt 24.0 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/CSIRowhammer - Cryptographic Security and Integrity against Rowhammer.eng.srt 24.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SoK Understanding the Prevailing Security Vulnerabilities in TrustZone-Assisted TEE Systems.eng.srt 24.0 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Beyond Phish Toward Detecting Fraudulent e-Commerce Websites at Scale.eng.srt 24.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Hijacking Transient Execution through Microarchitectural Load Value Injection.eng.lrc 23.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/VerX Safety Verification of Smart Contracts.eng.lrc 23.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Replicated State Machines without Replicated Execution.eng.srt 23.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SPIDER Enabling Fast Patch Propagation in Related Software Repositories.eng.lrc 23.9 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Waldo A Private Time-Series Database from Function Secret-Sharing.eng.vtt 23.8 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Scalable and Privacy-Preserving Federated Principal Component Analysis.eng.srt 23.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability.eng.lrc 23.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/High Precision Open-World Website Fingerprinting.eng.srt 23.8 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/LAMBRETTA Learning to Rank for Twitter Soft Moderation.eng.srt 23.8 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/On Efficient, High-Fidelity and Blind Suppression of Backdoor Effects in Trojaned ML Models.eng.srt 23.7 KB
- IEEE Security & Privacy 2024/LLMs Cannot Reliably Identify and Reason About Security Vulnerabilities Yet - A Comprehensive Eva.eng.srt 23.7 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/SoK Taxonomy of Attacks on Open-Source Software Supply Chains.eng.srt 23.7 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/SoK Cryptographic Neural-Network Computation.eng.srt 23.7 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/GraphSC - Parallel Secure Computation Made Easy.eng.lrc 23.7 KB
- IEEE Security & Privacy 2024/Ad Inventory Pooling in the Ad Tech Supply Chain - Yash Vekaria.eng.srt 23.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Path Oblivious Heap Optimal and Practical Oblivious Priority Queue.eng.txt 23.7 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Verena - End-to-End Integrity Protection for Web Applications.eng.txt 23.6 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/OmniLedger - A Secure, Scale-Out, Decentralized Ledger via Sharding.eng.tsv 23.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Krace Data Race Fuzzing for Kernel File Systems.eng.vtt 23.6 KB
- IEEE Security & Privacy 2024/sp 2024 holepunch final - Zachary Ratliff.eng.srt 23.6 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Analyzing Leakage of Personally Identifiable Information in Language Models.eng.srt 23.5 KB
- IEEE Security & Privacy 2024/Obelix Mitigating Side Channels Through Dynamic Obfuscation - Jan.eng.srt 23.5 KB
- IEEE Security & Privacy 2024/UnTrustZone Systematic Accelerated Aging to Expose On chip - Jubayer Mahmod.eng.srt 23.5 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/No One Drinks From the Firehose How Organizations Filter and Prioritize Vulnerability Information.eng.srt 23.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Replicated State Machines without Replicated Execution.eng.txt 23.5 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Waldo A Private Time-Series Database from Function Secret-Sharing.eng.txt 23.5 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/When Function Signature Recovery Meets Compiler Optimization.eng.srt 23.4 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Verena - End-to-End Integrity Protection for Web Applications.eng.lrc 23.4 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Clockwork Finance Automated Analysis of Economic Security in Smart Contracts.eng.srt 23.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SPECTECTOR Principled Detection of Speculative Information Flows.eng.srt 23.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SoK Understanding the Prevailing Security Vulnerabilities in TrustZone-Assisted TEE Systems.eng.txt 23.4 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/AUC Accountable Universal Composability.eng.srt 23.4 KB
- IEEE Security & Privacy 2024/The Role of User Agent Interactions on Mobile Money Practices - Karen Sowon.eng.srt 23.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Path Oblivious Heap Optimal and Practical Oblivious Priority Queue.eng.lrc 23.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Tale of Sea and Sky On the Security of Maritime VSAT Communications.eng.tsv 23.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Replicated State Machines without Replicated Execution.eng.lrc 23.3 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Waldo A Private Time-Series Database from Function Secret-Sharing.eng.lrc 23.3 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/VIDEZZO Dependency-aware Virtual Device Fuzzing.eng.srt 23.3 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Implementing and Proving the TLS 1.3 Record Layer.eng.txt 23.3 KB
- IEEE Security & Privacy 2024/Understanding Parents' Perceptions and Practices Toward Children's Security and Privacy in Virtua.eng.srt 23.2 KB
- IEEE Security & Privacy 2024/211 - Multi Instance Adversarial Attack on GNN Based Malicious Domain Detection - Mahmoud Khaled Ahm.eng.srt 23.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SoK Understanding the Prevailing Security Vulnerabilities in TrustZone-Assisted TEE Systems.eng.lrc 23.2 KB
- IEEE Security & Privacy 2024/2024 196 The Times They Are A Changin - Christos Tsoukaladelis.eng.srt 23.1 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/OmniLedger - A Secure, Scale-Out, Decentralized Ledger via Sharding.eng.vtt 23.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Private Resource Allocators and Their Applications.eng.srt 23.1 KB
- IEEE Security & Privacy 2024/2024 57 Counterexample Guided Directed Fuzzing via Likely Invariant Inference - Shadow HUANG.eng.srt 23.1 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/How IoT Re-using Threatens Your Sensitive Data Exploring the User-Data Disposal in Used IoT Devices.eng.srt 23.0 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Implementing and Proving the TLS 1.3 Record Layer.eng.lrc 23.0 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Foundations of Dynamic BFT.eng.srt 23.0 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/SelectFuzz Efficient Directed Fuzzing with Selective Path Exploration.eng.srt 23.0 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Defensive Technology Use by Political Activists During the Sudanese Revolution.eng.srt 23.0 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Locally Differentially Private Frequency Estimation Based on Convolution Framework.eng.srt 23.0 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures.eng.srt 23.0 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Man-in-the-Middle Attacks without Rogue AP When WPAs Meet ICMP Redirects.eng.srt 23.0 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/SoK Decentralized Finance (DeFi) Attacks.eng.srt 22.9 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation.eng.srt 22.9 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/XFL Naming Functions in Binaries with Extreme Multi-label Learning.eng.srt 22.8 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Did you mix me Formally Verifying Verifiable Mix Nets in Electronic Voting.eng.srt 22.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability.eng.srt 22.8 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Scaling JavaScript Abstract Interpretation to Detect and Exploit Node.js Taint-style Vulnerability.eng.srt 22.8 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Machine unlearning.eng.srt 22.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SoK Differential Privacy as a Causal Property.eng.txt 22.7 KB
- IEEE Security & Privacy 2024/TuDoor - Xiang Li.eng.srt 22.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Tale of Sea and Sky On the Security of Maritime VSAT Communications.eng.srt 22.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/AdGraph A Graph-Based Approach to Ad and Tracker Blocking.eng.srt 22.6 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Towards a Rigorous Statistical Analysis of Empirical Password Datasets.eng.srt 22.6 KB
- IEEE Security & Privacy 2024/TuDoor new - Xiang Li.eng.srt 22.6 KB
- IEEE Security & Privacy 2024/2024 500 Exploring the Orthogonality and Linearity of Backdoor Attacks - Kaiyuan Zhang.eng.srt 22.6 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/SoK - Deep Packer Inspection - A Longitudinal Study of the Complexity of Run-Time Packers.eng.srt 22.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Towards a Natural Perspective of Smart Homes for Practical Security and Safety Analyses.eng.srt 22.5 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Using Safety Properties to Generate Vulnerability Patches.eng.srt 22.5 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Implementing and Proving the TLS 1.3 Record Layer.eng.vtt 22.5 KB
- IEEE Security & Privacy 2024/2024 100 The Dark Side of Scale Insecurity of Direct to Cell Satellite Mega Constellations - 刘威.eng.srt 22.5 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Mew Enabling Large-Scale and Dynamic Link-Flooding Defenses on Programmable Switches.eng.srt 22.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SoK Differential Privacy as a Causal Property.eng.lrc 22.4 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/D-DAE Defense-Penetrating Model Extraction Attacks.eng.srt 22.4 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Manipulation Attacks in Local Differential Privacy.eng.srt 22.4 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Private Collaborative Data Cleaning via Non-Equi PSI.eng.srt 22.4 KB
- IEEE Security & Privacy 2024/cut final presentation - Sönke Huster.eng.srt 22.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SEVurity No Security Without Integrity - Breaking Integrity.eng.txt 22.4 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/CrawlPhish Large-scale Analysis of Client-side Cloaking Techniques in Phishing.eng.srt 22.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Replicated State Machines without Replicated Execution.eng.vtt 22.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SoK Understanding the Prevailing Security Vulnerabilities in TrustZone-Assisted TEE Systems.eng.vtt 22.3 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/3DFed Adaptive and Extensible Framework for Covert Backdoor Attack in Federated Learning.eng.srt 22.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/NetCAT Practical Cache Attacks from the Network.eng.txt 22.3 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Finding Specification Blind Spots via Fuzz Testing.eng.srt 22.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SEVurity No Security Without Integrity - Breaking Integrity.eng.vtt 22.3 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Three-party Non-linear Computation without Preprocessing for Privacy-preserving Machine Learning.eng.srt 22.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SPECTECTOR Principled Detection of Speculative Information Flows.eng.txt 22.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/EverCrypt A Fast, Verified, Cross-Platform Cryptographic Provider.eng.txt 22.2 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/DevIOus Device-Driven Side-Channel Attacks on the IOMMU.eng.srt 22.2 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/QueryX Symbolic Query on Decompiled Code for Finding Bugs in COTS Binaries.eng.srt 22.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SEVurity No Security Without Integrity - Breaking Integrity.eng.lrc 22.1 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Weak Fiat-Shamir Attacks on Modern Proof Systems.eng.srt 22.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/The Many Kinds of Creepware Used for Interpersonal Attacks.eng.txt 22.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Krace Data Race Fuzzing for Kernel File Systems.eng.tsv 22.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SPECTECTOR Principled Detection of Speculative Information Flows.eng.lrc 22.1 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Attitudes towards Client-Side Scanning for CSAM, Terrorism, Drug Trafficking, Drug Use, Tax Evasion.eng.srt 22.1 KB
- IEEE Security & Privacy 2024/One for All and All for One - GNN based Control Flow Attestation for Embedded Devices - Richard M.eng.srt 22.0 KB
- IEEE Security & Privacy 2024/CaFA - Cost aware, Feasible Attacks With Database Constraints - Matan BT.eng.srt 22.0 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Stealthy Porn Understanding Real World Adversarial Images for I'llicit Online Promotion.eng.srt 22.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/EverCrypt A Fast, Verified, Cross-Platform Cryptographic Provider.eng.lrc 22.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/NetCAT Practical Cache Attacks from the Network.eng.lrc 22.0 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/SIRNN A Math Library for Secure RNN Inference.eng.srt 22.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/High Precision Open-World Website Fingerprinting.eng.vtt 21.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/The Many Kinds of Creepware Used for Interpersonal Attacks.eng.lrc 21.9 KB
- IEEE Security & Privacy 2024/2024 144 Withdrawing is believing Detecting Inconsistencies between Withdrawal Choices and Third par.eng.srt 21.9 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms.eng.srt 21.9 KB
- IEEE Security & Privacy 2024/SHERPA Explainable Robust Algorithms for Privacy Preserved Federated Learning in Future Networks.eng.srt 21.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Breaking and (Partially) Fixing Provably Secure Onion Routing.eng.txt 21.9 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Device Fingerprinting with Peripheral Timestamps.eng.srt 21.8 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/mmEcho A mmWave-based Acoustic Eavesdropping Method.eng.srt 21.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Kobold Evaluating Decentralized Access Control for Remote NSXPC Methods on iOS.eng.srt 21.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/FlyClient Super-Light Clients for Cryptocurrencies.eng.txt 21.8 KB
- IEEE Security & Privacy 2024/Backdooring Multimodal Learning - 卡的不动弹.eng.srt 21.8 KB
- IEEE Security & Privacy 2024/Backdooring Multimodal Learning.eng.srt 21.8 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Poltergeist Acoustic Manipulation of Image Stabilization towards Object Mis-Labeling.eng.srt 21.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/AdGraph A Graph-Based Approach to Ad and Tracker Blocking.eng.txt 21.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SPECTECTOR Principled Detection of Speculative Information Flows.eng.vtt 21.7 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Fingerprinting the Fingerprinters Learning to Detect Browser Fingerprinting Behaviors.eng.srt 21.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Towards a Natural Perspective of Smart Homes for Practical Security and Safety Analyses.eng.txt 21.7 KB
- IEEE Security & Privacy 2024/Flash a comprehensive approach to intrusion detection via provenance graph representation learning.eng.srt 21.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Breaking and (Partially) Fixing Provably Secure Onion Routing.eng.lrc 21.6 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Verena - End-to-End Integrity Protection for Web Applications.eng.srt 21.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Security Analysis of the Facebook Ad Library.eng.srt 21.6 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Protected or Porous A Comparative Analysis of Threat Detection Capability of IoT Safeguards.eng.srt 21.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/AdGraph A Graph-Based Approach to Ad and Tracker Blocking.eng.lrc 21.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability.eng.vtt 21.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/FlyClient Super-Light Clients for Cryptocurrencies.eng.lrc 21.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SPIDER Enabling Fast Patch Propagation in Related Software Repositories.eng.srt 21.5 KB
- IEEE Security & Privacy 2024/No Privacy Left Outside - Ziqi Zhang.eng.srt 21.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Towards a Natural Perspective of Smart Homes for Practical Security and Safety Analyses.eng.lrc 21.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Private Resource Allocators and Their Applications.eng.vtt 21.5 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Data Recovery on Encrypted Databases with k-Nearest Neighbor Query Leakage.eng.srt 21.5 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Discovering Java Deserialization Vulnerabilities via Structure-Aware Directed Greybox Fuzzing.eng.srt 21.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Automated Reverse Engineering and Privacy Analysis of Modern Cars.eng.txt 21.4 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Protecting Models Trained by Multi-party Learning with Differential Privacy.eng.srt 21.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/The Many Kinds of Creepware Used for Interpersonal Attacks.eng.srt 21.4 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Co-Inflow Coarse-grained Information Flow Control for Java-like Languages.eng.srt 21.3 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/CacheOut Leaking Data on Intel CPUs via Cache Evictions.eng.srt 21.3 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Cross Layer Attacks and How to Use Them (for DNS Cache Poisoning, Device Tracking and More).eng.srt 21.3 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/CANnon Reliable and Stealthy Remote Shutdown Attacks via Unaltered Automotive Microcontrollers.eng.srt 21.3 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Low-effort VR Headset User Authentication Using Head-reverberated Sounds with Replay Resistance.eng.srt 21.3 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/DepthFake Spoofing 3D Face Authentication with a 2D Photo.eng.srt 21.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability.eng.tsv 21.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SoK A Minimalist Approach to Formalizing Analog Sensor Security.eng.srt 21.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Automated Reverse Engineering and Privacy Analysis of Modern Cars.eng.srt 21.3 KB
- IEEE Security & Privacy 2024/322 - SoK SGX Fail How Stuff Gets eXposed - Stephan van Schaik.eng.srt 21.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Automated Reverse Engineering and Privacy Analysis of Modern Cars.eng.lrc 21.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Tale of Sea and Sky On the Security of Maritime VSAT Communications.eng.vtt 21.2 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/SoK - Deep Packer Inspection - A Longitudinal Study of the Complexity of Run-Time Packers.eng.tsv 21.2 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/T-Fuzz Fuzzing by Program Transformation - Hui Peng.eng.tsv 21.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Transparent Polynomial Delegation and Its Applications to Zero Knowledge Proof.eng.txt 21.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/CrypTFlow - Secure TensorFlow Inference.eng.srt 21.2 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Security of the J-PAKE Password-Authenticated Key Exchange Protocol.eng.txt 21.2 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Foundations of Dynamic BFT.eng.vtt 21.2 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/SoK - Deep Packer Inspection - A Longitudinal Study of the Complexity of Run-Time Packers.eng.vtt 21.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/How Not to Prove Your Election Outcome.eng.tsv 21.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/FlyClient Super-Light Clients for Cryptocurrencies.eng.srt 21.1 KB
- IEEE Security & Privacy 2024/2024 88 AFGEN Whole Function Fuzzing for Applications and Libraries - Yuwei LIU 1.eng.srt 21.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/AdGraph A Graph-Based Approach to Ad and Tracker Blocking.eng.vtt 21.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Programming Framework for Differential Privacy with Accuracy Concentration Bounds.eng.txt 21.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Towards a Natural Perspective of Smart Homes for Practical Security and Safety Analyses.eng.vtt 21.0 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Waldo A Private Time-Series Database from Function Secret-Sharing.eng.tsv 20.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Replicated State Machines without Replicated Execution.eng.tsv 20.9 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/WarpAttack Bypassing CFI through Compiler-Introduced Double-Fetches.eng.srt 20.9 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Security of the J-PAKE Password-Authenticated Key Exchange Protocol.eng.lrc 20.9 KB
- IEEE Security & Privacy 2024/#498 Learn What You Want to Unlearn Unlearning Inversion Attacks against Machine Unlearning - Hongsh.eng.srt 20.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Transparent Polynomial Delegation and Its Applications to Zero Knowledge Proof.eng.lrc 20.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SoK Differential Privacy as a Causal Property.eng.srt 20.9 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Foundations of Dynamic BFT.eng.txt 20.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/HydRand Efficient Continuous Distributed Randomness.eng.srt 20.8 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Post-Quantum WireGuard.eng.srt 20.8 KB
- IEEE Security & Privacy 2024/2024 48 SwiftRange - Vincent.eng.srt 20.8 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Accuracy-Privacy Trade-off in Deep Ensemble A Membership Inference Perspective.eng.srt 20.8 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/PrivKV Key Value Data Collection with Local Differential Privacy.eng.srt 20.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Programming Framework for Differential Privacy with Accuracy Concentration Bounds.eng.lrc 20.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SoK Understanding the Prevailing Security Vulnerabilities in TrustZone-Assisted TEE Systems.eng.tsv 20.8 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Hardware-Software Contracts for Secure Speculation.eng.srt 20.8 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Lockable Signatures for Blockchains Scriptless Scripts for all Signatures.eng.srt 20.7 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Low-Bandwidth Threshold ECDSA via Pseudorandom Correlation Generators.eng.txt 20.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/ZEXE Enabling Decentralized Private Computation.eng.txt 20.7 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Verena - End-to-End Integrity Protection for Web Applications.eng.tsv 20.7 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/UTOPIA Automatic Generation of Fuzz Driver using Unit Tests.eng.srt 20.7 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Foundations of Dynamic BFT.eng.lrc 20.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/TRRespass Exploiting the Many Sides of Target Row Refresh.eng.srt 20.6 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Implementing and Proving the TLS 1.3 Record Layer.eng.tsv 20.6 KB
- IEEE Security & Privacy 2024/From Virtual Touch to Tesla Command Unlocking Unauthenticated Control Chains From Smart Glasses.eng.srt 20.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Security Analysis of the Facebook Ad Library.eng.txt 20.6 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Transfer Attacks Revisited A Large-Scale Empirical Study in Real Computer Vision Settings.eng.srt 20.6 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Tyr Finding Consensus Failure Bugs in Blockchain System with Behaviour Divergent Model.eng.srt 20.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Hijacking Transient Execution through Microarchitectural Load Value Injection.eng.srt 20.6 KB
- IEEE Security & Privacy 2024/2024 265 eAudit - A Fast, Scalable and Deployable Audit Data Collection System - Hanke Kimm.eng.srt 20.5 KB
- IEEE Security & Privacy 2024/LLMIF Augmented Large Language Model for Fuzzing IoT Devices - Jincheng Wang.eng.srt 20.5 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Low-Bandwidth Threshold ECDSA via Pseudorandom Correlation Generators.eng.lrc 20.5 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Low-Bandwidth Threshold ECDSA via Pseudorandom Correlation Generators.eng.srt 20.5 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Jolt Recovering TLS Signing Keys via Rowhammer Faults.eng.srt 20.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/ZEXE Enabling Decentralized Private Computation.eng.lrc 20.5 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/A Generic, Efficient, and Effortless Solver with Self-Supervised Learning for Breaking Text Captchas.eng.srt 20.4 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Verena - End-to-End Integrity Protection for Web Applications.eng.vtt 20.4 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Data Recovery on Encrypted Databases with k-Nearest Neighbor Query Leakage.eng.tsv 20.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Ex-vivo Dynamic Analysis Framework for Android Device Drivers.eng.txt 20.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Private Resource Allocators and Their Applications.eng.txt 20.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Security Analysis of the Facebook Ad Library.eng.lrc 20.4 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/MAD-HTLC Because HTLC is Crazy-Cheap to Attack.eng.srt 20.4 KB
- IEEE Security & Privacy 2024/BULKOR:Enabling Bulk Loading for Path ORAM - Xiang Li.eng.srt 20.3 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/On the Just-In-Time Discovery of Profit-Generating Transactions in DeFi Protocols.eng.srt 20.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Private Resource Allocators and Their Applications.eng.lrc 20.3 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Bomberman Defining and Defeating Hardware Ticking Timebombs at Design-time.eng.srt 20.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Kobold Evaluating Decentralized Access Control for Remote NSXPC Methods on iOS.eng.txt 20.3 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Device Fingerprinting with Peripheral Timestamps.eng.vtt 20.3 KB
- IEEE Security & Privacy 2024/Practical Attacks Against DNS Reputation Systems.eng.srt 20.3 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/IEEE S&P 2019 - Opening Remarks - General Chair.eng.srt 20.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/The Many Kinds of Creepware Used for Interpersonal Attacks.eng.vtt 20.2 KB
- IEEE Security & Privacy 2024/GAuV - Xingyu Xie.eng.srt 20.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Are We Susceptible to Rowhammer An End-to-End Methodology for Cloud Providers.eng.srt 20.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/xMP Selective Memory Protection for Kernel and User Space.eng.srt 20.2 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Pegasus Bridging Polynomial and Non-polynomial Evaluations in Homomorphic Encryption.eng.srt 20.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Ex-vivo Dynamic Analysis Framework for Android Device Drivers.eng.lrc 20.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/NetCAT Practical Cache Attacks from the Network.eng.srt 20.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Hijacking Transient Execution through Microarchitectural Load Value Injection.eng.tsv 20.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/RAMBleed Reading Bits in Memory without Accessing Them.eng.srt 20.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/This PIN Can Be Easily Guessed Analyzing the Security of Smartphone Unlock PINs.eng.srt 20.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Meddling Middlemen Empirical Analysis of the Risks of Data-Saving Mobile Browsers.eng.txt 20.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/How Not to Prove Your Election Outcome.eng.srt 20.1 KB
- IEEE Security & Privacy 2024/Ehsanul Kabir FLShield A Validation Based Federated Learning Framework to Defend Against Poisonin.eng.srt 20.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Kobold Evaluating Decentralized Access Control for Remote NSXPC Methods on iOS.eng.lrc 20.1 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Beyond Credential Stuffing Password Similarity Models using Neural Networks.eng.txt 20.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Breaking and (Partially) Fixing Provably Secure Onion Routing.eng.srt 20.1 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/ADI Adversarial Dominating Inputs in Vertical Federated Learning Systems.eng.txt 20.1 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Volttack Control IoT Devices by Manipulating Power Supply Voltage.eng.srt 20.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Kobold Evaluating Decentralized Access Control for Remote NSXPC Methods on iOS.eng.vtt 20.1 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/CRYLOGGER Detecting Crypto Misuses Dynamically.eng.srt 20.1 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/WIGHT Wired Ghost Touch Attack on Capacitive Touchscreens.eng.srt 20.1 KB
- IEEE Security & Privacy 2024/2024 108 DeepShuffle A Lightweight Defense Framework against Adversarial Fault Injection Attacks on.eng.srt 20.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Security Analysis of the Facebook Ad Library.eng.vtt 20.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Automatic Uncovering of Hidden Behaviors from Input Validation in Mobile Apps.eng.txt 20.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SPIDER Enabling Fast Patch Propagation in Related Software Repositories.eng.tsv 20.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/RAMBleed Reading Bits in Memory without Accessing Them.eng.txt 20.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Automated Reverse Engineering and Privacy Analysis of Modern Cars.eng.vtt 20.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/CrypTFlow - Secure TensorFlow Inference.eng.txt 20.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/EverCrypt A Fast, Verified, Cross-Platform Cryptographic Provider.eng.srt 20.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Meddling Middlemen Empirical Analysis of the Risks of Data-Saving Mobile Browsers.eng.lrc 20.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/HydRand Efficient Continuous Distributed Randomness.eng.txt 20.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Meddling Middlemen Empirical Analysis of the Risks of Data-Saving Mobile Browsers.eng.srt 20.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Are Anonymity-Seekers Just like Everybody Else An Analysis of Contributions to Wikipedia from Tor.eng.txt 19.9 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/FIDO2, CTAP 2.1, and WebAuthn 2 Provable Security and Post-Quantum Instantiation.eng.srt 19.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Programming Framework for Differential Privacy with Accuracy Concentration Bounds.eng.srt 19.9 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/REDEEM MYSELF Purifying Backdoors in Deep Learning Models using Self Attention Distillation.eng.srt 19.9 KB
- IEEE Security & Privacy 2024/#518 LACMUS Latent Concept Masking for General Robustness Enhancement of DNNs - Hongsheng Hu.eng.srt 19.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/CrypTFlow - Secure TensorFlow Inference.eng.vtt 19.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SPECTECTOR Principled Detection of Speculative Information Flows.eng.tsv 19.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/ICAS An Extensible Framework for Estimating the Susceptibility of IC Layouts to Additive Trojans.eng.srt 19.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SPIDER Enabling Fast Patch Propagation in Related Software Repositories.eng.vtt 19.9 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/FedRecover Recovering from Poisoning Attacks in Federated Learning using Historical Information.eng.srt 19.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/CrypTFlow - Secure TensorFlow Inference.eng.lrc 19.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/RAMBleed Reading Bits in Memory without Accessing Them.eng.lrc 19.8 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Beyond Credential Stuffing Password Similarity Models using Neural Networks.eng.lrc 19.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/HydRand Efficient Continuous Distributed Randomness.eng.lrc 19.8 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/ADI Adversarial Dominating Inputs in Vertical Federated Learning Systems.eng.lrc 19.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Are Anonymity-Seekers Just like Everybody Else An Analysis of Contributions to Wikipedia from Tor.eng.lrc 19.8 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/GraphSC - Parallel Secure Computation Made Easy.eng.srt 19.8 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Data Recovery on Encrypted Databases with k-Nearest Neighbor Query Leakage.eng.vtt 19.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Automatic Uncovering of Hidden Behaviors from Input Validation in Mobile Apps.eng.lrc 19.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/The Many Kinds of Creepware Used for Interpersonal Attacks.eng.tsv 19.7 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Proactive Threshold Wallets with Offline Devices.eng.srt 19.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SEVurity No Security Without Integrity - Breaking Integrity.eng.tsv 19.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/The State of the Uniform Attacks on Encrypted Databases beyond the Uniform Query Distribution.eng.txt 19.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Formal Modelling and Proof in the CHERI Design and Implementation Process.eng.srt 19.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SoK A Minimalist Approach to Formalizing Analog Sensor Security.eng.vtt 19.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/The State of the Uniform Attacks on Encrypted Databases beyond the Uniform Query Distribution.eng.srt 19.7 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Device Fingerprinting with Peripheral Timestamps.eng.txt 19.6 KB
- IEEE Security & Privacy 2024/BadVFL backdoor attacks in vertical federated learning - Mohammad Naseri.eng.srt 19.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Intriguing Properties of Adversarial ML Attacks in the Problem Space.eng.txt 19.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Flaw Label Exploiting IPv6 Flow Label.eng.txt 19.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SoK A Minimalist Approach to Formalizing Analog Sensor Security.eng.txt 19.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Formal Modelling and Proof in the CHERI Design and Implementation Process.eng.txt 19.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/The State of the Uniform Attacks on Encrypted Databases beyond the Uniform Query Distribution.eng.lrc 19.5 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Device Fingerprinting with Peripheral Timestamps.eng.lrc 19.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Full-band De-anonymization of Bluetooth Classic Devices.eng.srt 19.5 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/PublicCheck Public Integrity Verification for Services of Run-time Deep Models.eng.srt 19.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/FlyClient Super-Light Clients for Cryptocurrencies.eng.vtt 19.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SoK Differential Privacy as a Causal Property.eng.vtt 19.5 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/GraphSC - Parallel Secure Computation Made Easy.eng.tsv 19.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/ZEXE Enabling Decentralized Private Computation.eng.srt 19.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Intriguing Properties of Adversarial ML Attacks in the Problem Space.eng.lrc 19.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Intriguing Properties of Adversarial ML Attacks in the Problem Space.eng.srt 19.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/xMP Selective Memory Protection for Kernel and User Space.eng.txt 19.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/AdGraph A Graph-Based Approach to Ad and Tracker Blocking.eng.tsv 19.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/OHIE Blockchain Scaling Made Simple.eng.srt 19.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Path Oblivious Heap Optimal and Practical Oblivious Priority Queue.eng.srt 19.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SoK A Minimalist Approach to Formalizing Analog Sensor Security.eng.lrc 19.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Full-band De-anonymization of Bluetooth Classic Devices.eng.txt 19.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SoK Differential Privacy as a Causal Property.eng.tsv 19.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Ask the Experts What Should Be on an IoT Privacy and Security Label.eng.txt 19.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/HydRand Efficient Continuous Distributed Randomness.eng.vtt 19.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Towards a Natural Perspective of Smart Homes for Practical Security and Safety Analyses.eng.tsv 19.3 KB
- IEEE Security & Privacy 2024/2024 62 Enforcing End to end Security for Remote Conferencing - Triste L.eng.srt 19.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/TRRespass Exploiting the Many Sides of Target Row Refresh.eng.txt 19.3 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Reading Between the Lines An Extensive Evaluation of the Security and Privacy Implications.eng.srt 19.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Formal Modelling and Proof in the CHERI Design and Implementation Process.eng.lrc 19.3 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Learning to Reconstruct Statistical Learning Theory and Encrypted Database Attacks.eng.text 19.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Flaw Label Exploiting IPv6 Flow Label.eng.lrc 19.3 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/MeshUp Stateless Cache Side-channel Attack on CPU Mesh.eng.srt 19.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Krace Data Race Fuzzing for Kernel File Systems.eng.text 19.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/xMP Selective Memory Protection for Kernel and User Space.eng.lrc 19.3 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Continual Observation under User-level Differential Privacy.eng.srt 19.2 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/T-Fuzz Fuzzing by Program Transformation - Hui Peng.eng.srt 19.2 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/DeHiREC Detecting Hidden Voice Recorders via ADC Electromagnetic Radiation.eng.srt 19.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Pseudorandom Black Swans Cache Attacks on CTR DRBG.eng.srt 19.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/VerX Safety Verification of Smart Contracts.eng.tsv 19.2 KB
- IEEE Security & Privacy 2024/Ati Priya Bajaj Len or index or count, anything but v1 Predicting Variable Names in Decompilation Ou.eng.srt 19.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Hijacking Transient Execution through Microarchitectural Load Value Injection.eng.vtt 19.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Full-band De-anonymization of Bluetooth Classic Devices.eng.lrc 19.2 KB
- IEEE Security & Privacy 2024/BELT Old School Backdoor Attacks can Evade the State of the Art Defense with Backdoor Exclusivity.eng.srt 19.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Ask the Experts What Should Be on an IoT Privacy and Security Label.eng.lrc 19.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Semantic Understanding of Smart Contracts Executable Operational Semantics of Solidity.eng.txt 19.2 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/ShorTor Improving Tor Network Latency via Multi-hop Overlay Routing.eng.srt 19.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/TRRespass Exploiting the Many Sides of Target Row Refresh.eng.lrc 19.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SoK Cyber Insurance - Technical Challenges and a System Security Roadmap.eng.txt 19.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/TRRespass Exploiting the Many Sides of Target Row Refresh.eng.vtt 19.1 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/WIGHT Wired Ghost Touch Attack on Capacitive Touchscreens.eng.txt 19.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Cornucopia Temporal Safety for CHERI Heaps.eng.srt 19.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Automated Reverse Engineering and Privacy Analysis of Modern Cars.eng.tsv 19.1 KB
- IEEE Security & Privacy 2024/2024 305 Pianist Scalable zkRollups via Fully Distributed Zero Knowledge Proofs - Tianyi Liu.eng.srt 19.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Cornucopia Temporal Safety for CHERI Heaps.eng.txt 19.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Humpty Dumpty Controlling Word Meanings via Corpus Poisoning.eng.txt 19.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Semantic Understanding of Smart Contracts Executable Operational Semantics of Solidity.eng.srt 19.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Are Anonymity-Seekers Just like Everybody Else An Analysis of Contributions to Wikipedia from Tor.eng.srt 19.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Path Oblivious Heap Optimal and Practical Oblivious Priority Queue.eng.tsv 19.0 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Low-Bandwidth Threshold ECDSA via Pseudorandom Correlation Generators.eng.vtt 19.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Semantic Understanding of Smart Contracts Executable Operational Semantics of Solidity.eng.lrc 19.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Combating Dependence Explosion in Forensic Analysis Using Alternative Tag Propagation Semantics.eng.srt 19.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/HopSkipJumpAttack A Query-Efficient Decision-Based Attack.eng.srt 19.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/VerX Safety Verification of Smart Contracts.eng.srt 19.0 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/ShorTor Improving Tor Network Latency via Multi-hop Overlay Routing.eng.txt 19.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SoK Cyber Insurance - Technical Challenges and a System Security Roadmap.eng.lrc 19.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/EverCrypt A Fast, Verified, Cross-Platform Cryptographic Provider.eng.tsv 18.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Ask the Experts What Should Be on an IoT Privacy and Security Label.eng.srt 18.9 KB
- IEEE Security & Privacy 2024/545video - Irina Ford.eng.srt 18.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Pseudorandom Black Swans Cache Attacks on CTR DRBG.eng.txt 18.9 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Randomized Last-Level Caches Are Still Vulnerable to Cache Side-Channel Attacks But We Can Fix It.eng.srt 18.9 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/WIGHT Wired Ghost Touch Attack on Capacitive Touchscreens.eng.lrc 18.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Private Resource Allocators and Their Applications.eng.tsv 18.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/How Not to Prove Your Election Outcome.eng.vtt 18.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Cornucopia Temporal Safety for CHERI Heaps.eng.lrc 18.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/RAMBleed Reading Bits in Memory without Accessing Them.eng.vtt 18.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Humpty Dumpty Controlling Word Meanings via Corpus Poisoning.eng.lrc 18.9 KB
- IEEE Security & Privacy 2024/2024 37 SoK Safer Digital Safety Research Involving At Risk Users - Rosanna Rosie Bellini.eng.srt 18.8 KB
- IEEE Security & Privacy 2024/59 Hyena Balancing Packing, Reuse, and Rotations for Encrypted Inference - Sarabjeet Singh.eng.srt 18.8 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Runtime Recovery of Web Applications under Zero-Day ReDoS Attacks.eng.srt 18.8 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/ShorTor Improving Tor Network Latency via Multi-hop Overlay Routing.eng.lrc 18.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Pseudorandom Black Swans Cache Attacks on CTR DRBG.eng.lrc 18.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/xMP Selective Memory Protection for Kernel and User Space.eng.vtt 18.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Meddling Middlemen Empirical Analysis of the Risks of Data-Saving Mobile Browsers.eng.vtt 18.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Breaking and (Partially) Fixing Provably Secure Onion Routing.eng.vtt 18.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/EverCrypt A Fast, Verified, Cross-Platform Cryptographic Provider.eng.vtt 18.7 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Foundations of Dynamic BFT.eng.tsv 18.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/ICAS An Extensible Framework for Estimating the Susceptibility of IC Layouts to Additive Trojans.eng.vtt 18.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Towards Effective Differential Privacy Comms for Users' Data Sharing Decision and Comprehension.eng.srt 18.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Breaking and (Partially) Fixing Provably Secure Onion Routing.eng.tsv 18.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/RetroWrite Statically Instrumenting COTS Binaries for Fuzzing and Sanitization.eng.srt 18.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/ICAS An Extensible Framework for Estimating the Susceptibility of IC Layouts to Additive Trojans.eng.txt 18.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Binsec Rel Efficient Relational Symbolic Execution for Constant-Time at Binary-Level.eng.txt 18.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/FlyClient Super-Light Clients for Cryptocurrencies.eng.tsv 18.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SoK Cyber Insurance - Technical Challenges and a System Security Roadmap.eng.srt 18.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/OHIE Blockchain Scaling Made Simple.eng.txt 18.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Ex-vivo Dynamic Analysis Framework for Android Device Drivers.eng.srt 18.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Programming Framework for Differential Privacy with Accuracy Concentration Bounds.eng.vtt 18.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Towards Effective Differential Privacy Comms for Users' Data Sharing Decision and Comprehension.eng.txt 18.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Are We Susceptible to Rowhammer An End-to-End Methodology for Cloud Providers.eng.vtt 18.6 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/SGUARD Smart Contracts Made Vulnerability-Free.eng.srt 18.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/NetCAT Practical Cache Attacks from the Network.eng.vtt 18.5 KB
- IEEE Security & Privacy 2024/2023 219 Formal Model Driven Analysis of Resilience of GossipSub to Attacks from Misbehaving Peers.eng.srt 18.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/ICAS An Extensible Framework for Estimating the Susceptibility of IC Layouts to Additive Trojans.eng.lrc 18.5 KB
- IEEE Security & Privacy 2024/2024 25 MQTTactic Security Analysis and Verification for Logic Flaws in MQTT Implementations - szx.eng.srt 18.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Message Time of Arrival Codes A Fundamental Primitive for Secure Distance Measurement.eng.txt 18.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Influencing Photo Sharing Decisions on Social Media A Case of Paradoxical Findings.eng.txt 18.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/This PIN Can Be Easily Guessed Analyzing the Security of Smartphone Unlock PINs.eng.vtt 18.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/OHIE Blockchain Scaling Made Simple.eng.lrc 18.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Are We Susceptible to Rowhammer An End-to-End Methodology for Cloud Providers.eng.txt 18.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Binsec Rel Efficient Relational Symbolic Execution for Constant-Time at Binary-Level.eng.lrc 18.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Towards Effective Differential Privacy Comms for Users' Data Sharing Decision and Comprehension.eng.lrc 18.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/JIT Leaks Inducing Timing Side Channels through Just-In-Time Compilation.eng.txt 18.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/NetCAT Practical Cache Attacks from the Network.eng.tsv 18.4 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/WIGHT Wired Ghost Touch Attack on Capacitive Touchscreens.eng.vtt 18.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/The State of the Uniform Attacks on Encrypted Databases beyond the Uniform Query Distribution.eng.vtt 18.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/JIT Leaks Inducing Timing Side Channels through Just-In-Time Compilation.eng.srt 18.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Sync HotStuff Simple and Practical Synchronous State Machine Replication.eng.srt 18.4 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Compositional Security for Reentrant Applications.eng.srt 18.4 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Compositional Non-Interference for Fine-Grained Concurrent Programs.eng.srt 18.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability.eng.text 18.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Message Time of Arrival Codes A Fundamental Primitive for Secure Distance Measurement.eng.lrc 18.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Influencing Photo Sharing Decisions on Social Media A Case of Paradoxical Findings.eng.lrc 18.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Security Analysis of the Facebook Ad Library.eng.tsv 18.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Leveraging EM Side-Channel Information to Detect Rowhammer Attacks.eng.srt 18.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Humpty Dumpty Controlling Word Meanings via Corpus Poisoning.eng.srt 18.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Are We Susceptible to Rowhammer An End-to-End Methodology for Cloud Providers.eng.lrc 18.3 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/GraphSC - Parallel Secure Computation Made Easy.eng.vtt 18.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Full-band De-anonymization of Bluetooth Classic Devices.eng.vtt 18.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Fuzzing JavaScript Engines with Aspect-Preserving Mutation.eng.txt 18.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Intriguing Properties of Adversarial ML Attacks in the Problem Space.eng.vtt 18.3 KB
- IEEE Security & Privacy 2024/video1092237667 - Hoang Nguyen Dai.eng.srt 18.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/JIT Leaks Inducing Timing Side Channels through Just-In-Time Compilation.eng.lrc 18.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Replicated State Machines without Replicated Execution.eng.text 18.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/CrypTFlow - Secure TensorFlow Inference.eng.tsv 18.2 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Detecting AI Trojans Using Meta Neural Analysis.eng.srt 18.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Programming Framework for Differential Privacy with Accuracy Concentration Bounds.eng.tsv 18.2 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/PLA-LiDAR Physical Laser Attacks against LiDAR-based 3D Object Detection in Autonomous Vehicle.eng.srt 18.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/PMP Cost-Effective Forced Execution with Probabilistic Memory Pre-planning.eng.srt 18.2 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Waldo A Private Time-Series Database from Function Secret-Sharing.eng.text 18.2 KB
- IEEE Security & Privacy 2024/A Picture is Worth 500 Labels A Case Study of Demographic Disparities in Local Machine Learning M.eng.srt 18.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/HopSkipJumpAttack A Query-Efficient Decision-Based Attack.eng.txt 18.2 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/SQUIP Exploiting the Scheduler Queue Contention Side Channel.eng.srt 18.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Dragonblood Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd.eng.srt 18.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Sync HotStuff Simple and Practical Synchronous State Machine Replication.eng.txt 18.1 KB
- IEEE Security & Privacy 2024/Text CRS A Generalized Certified Robustness Framework against Textual Adversarial Attacks - Jane.eng.srt 18.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/ZEXE Enabling Decentralized Private Computation.eng.vtt 18.1 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Trouble Over-The-Air An Analysis of FOTA Apps in the Android Ecosystem.eng.srt 18.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Fuzzing JavaScript Engines with Aspect-Preserving Mutation.eng.lrc 18.1 KB
- IEEE Security & Privacy 2024/Where URLs Become Weapons - Automated Discovery of SSRF Vulnerabilities in Web Applications - Sam.eng.srt 18.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SoK Understanding the Prevailing Security Vulnerabilities in TrustZone-Assisted TEE Systems.eng.text 18.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Are Anonymity-Seekers Just like Everybody Else An Analysis of Contributions to Wikipedia from Tor.eng.vtt 18.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/HopSkipJumpAttack A Query-Efficient Decision-Based Attack.eng.lrc 18.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Combating Dependence Explosion in Forensic Analysis Using Alternative Tag Propagation Semantics.eng.txt 18.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Kobold Evaluating Decentralized Access Control for Remote NSXPC Methods on iOS.eng.tsv 18.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/This PIN Can Be Easily Guessed Analyzing the Security of Smartphone Unlock PINs.eng.txt 18.0 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Device Fingerprinting with Peripheral Timestamps.eng.tsv 18.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/OHIE Blockchain Scaling Made Simple.eng.vtt 18.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Sync HotStuff Simple and Practical Synchronous State Machine Replication.eng.lrc 18.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Pseudorandom Black Swans Cache Attacks on CTR DRBG.eng.vtt 18.0 KB
- IEEE Security & Privacy 2024/2024 62 Enforcing End to end Security for Remote Conferencing - Triste L.eng.txt 18.0 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Low-Bandwidth Threshold ECDSA via Pseudorandom Correlation Generators.eng.tsv 18.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Formal Modelling and Proof in the CHERI Design and Implementation Process.eng.vtt 18.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Meddling Middlemen Empirical Analysis of the Risks of Data-Saving Mobile Browsers.eng.tsv 17.9 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/ShorTor Improving Tor Network Latency via Multi-hop Overlay Routing.eng.vtt 17.9 KB
- IEEE Security & Privacy 2024/2024 62 Enforcing End to end Security for Remote Conferencing - Triste L.eng.vtt 17.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Cornucopia Temporal Safety for CHERI Heaps.eng.vtt 17.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Path Oblivious Heap Optimal and Practical Oblivious Priority Queue.eng.vtt 17.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Automatically Detecting Bystanders in Photos to Reduce Privacy Risks.eng.srt 17.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/This PIN Can Be Easily Guessed Analyzing the Security of Smartphone Unlock PINs.eng.lrc 17.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Comparative Usability Study of FIDO2 Passwordless Authentication.eng.srt 17.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Combating Dependence Explosion in Forensic Analysis Using Alternative Tag Propagation Semantics.eng.lrc 17.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Ask the Experts What Should Be on an IoT Privacy and Security Label.eng.vtt 17.8 KB
- IEEE Security & Privacy 2024/2024 62 Enforcing End to end Security for Remote Conferencing - Triste L.eng.lrc 17.8 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/OmniLedger - A Secure, Scale-Out, Decentralized Ledger via Sharding.eng.text 17.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Semantic Understanding of Smart Contracts Executable Operational Semantics of Solidity.eng.vtt 17.8 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Limits of I O Based Ransomware Detection An Imitation Based Attack.eng.srt 17.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/RAMBleed Reading Bits in Memory without Accessing Them.eng.tsv 17.8 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Understanding the (In)Security of Cross-side Face Verification Systems in Mobile Apps.eng.srt 17.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Are Anonymity-Seekers Just like Everybody Else An Analysis of Contributions to Wikipedia from Tor.eng.tsv 17.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/HydRand Efficient Continuous Distributed Randomness.eng.tsv 17.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Tale of Sea and Sky On the Security of Maritime VSAT Communications.eng.text 17.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Message Time of Arrival Codes A Fundamental Primitive for Secure Distance Measurement.eng.srt 17.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Transparent Polynomial Delegation and Its Applications to Zero Knowledge Proof.eng.srt 17.7 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/T-Fuzz Fuzzing by Program Transformation - Hui Peng.eng.vtt 17.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Influencing Photo Sharing Decisions on Social Media A Case of Paradoxical Findings.eng.srt 17.7 KB
- IEEE Security & Privacy 2024/Cheng Gongye Side Channel Assisted Reverse Engineering of Encrypted DNN Hardware Accelerator IP.eng.srt 17.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Throwing Darts in the Dark Detecting Bots with Limited Data using Neural Data Augmentation.eng.srt 17.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/ZEXE Enabling Decentralized Private Computation.eng.tsv 17.7 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Implementing and Proving the TLS 1.3 Record Layer.eng.text 17.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SoK Cyber Insurance - Technical Challenges and a System Security Roadmap.eng.vtt 17.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Binsec Rel Efficient Relational Symbolic Execution for Constant-Time at Binary-Level.eng.srt 17.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers.eng.srt 17.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/HopSkipJumpAttack A Query-Efficient Decision-Based Attack.eng.vtt 17.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SoK A Minimalist Approach to Formalizing Analog Sensor Security.eng.tsv 17.6 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/SoK - Deep Packer Inspection - A Longitudinal Study of the Complexity of Run-Time Packers.eng.text 17.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Combating Dependence Explosion in Forensic Analysis Using Alternative Tag Propagation Semantics.eng.vtt 17.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/RetroWrite Statically Instrumenting COTS Binaries for Fuzzing and Sanitization.eng.vtt 17.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/VerX Safety Verification of Smart Contracts.eng.vtt 17.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Towards Effective Differential Privacy Comms for Users' Data Sharing Decision and Comprehension.eng.vtt 17.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/RetroWrite Statically Instrumenting COTS Binaries for Fuzzing and Sanitization.eng.txt 17.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Intriguing Properties of Adversarial ML Attacks in the Problem Space.eng.tsv 17.5 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/A2L Anonymous Atomic Locks for Scalability in Payment Channel Hubs.eng.srt 17.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/The State of the Uniform Attacks on Encrypted Databases beyond the Uniform Query Distribution.eng.tsv 17.5 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/MagBackdoor Beware of Your Loudspeaker as A Backdoor For Magnetic Injection Attacks.eng.srt 17.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Dragonblood Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd.eng.txt 17.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/High Precision Open-World Website Fingerprinting.eng.text 17.5 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Security of the J-PAKE Password-Authenticated Key Exchange Protocol.eng.srt 17.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers.eng.txt 17.4 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Multi-Server Verifiable Computation of Low-Degree Polynomials.eng.srt 17.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Neutain't Efficient Dynamic Tain't Analysis with Neural Networks.eng.srt 17.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/ICLab A Global, Longitudinal Internet Censorship Measurement Platform.eng.srt 17.4 KB
- IEEE Security & Privacy 2016/IEEE Security & Privacy 2016 captions/Verena - End-to-End Integrity Protection for Web Applications.eng.text 17.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/RetroWrite Statically Instrumenting COTS Binaries for Fuzzing and Sanitization.eng.lrc 17.4 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/On The Empirical Effectiveness of Unrealistic Adversarial Hardening Against Realistic Attacks.eng.srt 17.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SPECTECTOR Principled Detection of Speculative Information Flows.eng.text 17.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SPECCFI Mitigating Spectre Attacks Using CFI Informed Speculation.eng.srt 17.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Dragonblood Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd.eng.lrc 17.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Ex-vivo Dynamic Analysis Framework for Android Device Drivers.eng.vtt 17.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers.eng.lrc 17.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/xMP Selective Memory Protection for Kernel and User Space.eng.tsv 17.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Private Resource Allocators and Their Applications.eng.text 17.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Full-band De-anonymization of Bluetooth Classic Devices.eng.tsv 17.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Humpty Dumpty Controlling Word Meanings via Corpus Poisoning.eng.vtt 17.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/KARONTE Detecting Insecure Multi-binary Interactions in Embedded Firmware.eng.srt 17.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/TRRespass Exploiting the Many Sides of Target Row Refresh.eng.tsv 17.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Ex-vivo Dynamic Analysis Framework for Android Device Drivers.eng.tsv 17.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Sync HotStuff Simple and Practical Synchronous State Machine Replication.eng.vtt 17.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Automatically Detecting Bystanders in Photos to Reduce Privacy Risks.eng.txt 17.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/JIT Leaks Inducing Timing Side Channels through Just-In-Time Compilation.eng.vtt 17.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Ask the Experts What Should Be on an IoT Privacy and Security Label.eng.tsv 17.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/IJON Exploring Deep State Spaces via Fuzzing.eng.srt 17.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/The Many Kinds of Creepware Used for Interpersonal Attacks.eng.text 17.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SEIMI Efficient and Secure SMAP-Enabled Intra-process Memory Isolation.eng.srt 17.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/ICAS An Extensible Framework for Estimating the Susceptibility of IC Layouts to Additive Trojans.eng.tsv 17.1 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Security of the J-PAKE Password-Authenticated Key Exchange Protocol.eng.tsv 17.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SoK Cyber Insurance - Technical Challenges and a System Security Roadmap.eng.tsv 17.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/IJON Exploring Deep State Spaces via Fuzzing.eng.txt 17.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Automatically Detecting Bystanders in Photos to Reduce Privacy Risks.eng.lrc 17.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SPECCFI Mitigating Spectre Attacks Using CFI Informed Speculation.eng.txt 17.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Leveraging EM Side-Channel Information to Detect Rowhammer Attacks.eng.txt 17.0 KB
- IEEE Security & Privacy 2024/2024 614 Few shot Unlearning - Youngsik Yoon.eng.srt 17.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/KARONTE Detecting Insecure Multi-binary Interactions in Embedded Firmware.eng.txt 17.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Transparent Polynomial Delegation and Its Applications to Zero Knowledge Proof.eng.tsv 17.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/AdGraph A Graph-Based Approach to Ad and Tracker Blocking.eng.text 17.0 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/ConDySTA Context-Aware Dynamic Supplement to Static Tain't Analysis.eng.srt 17.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Cornucopia Temporal Safety for CHERI Heaps.eng.tsv 16.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Semantic Understanding of Smart Contracts Executable Operational Semantics of Solidity.eng.tsv 16.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Leveraging EM Side-Channel Information to Detect Rowhammer Attacks.eng.vtt 16.9 KB
- IEEE Security & Privacy 2024/PIRANA - Faster Multi query PIR via Constant weight Codes - Jingyu Li.eng.srt 16.9 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Investigating Package Related Security Threats in Software Registries.eng.srt 16.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/IJON Exploring Deep State Spaces via Fuzzing.eng.lrc 16.9 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/A2L Anonymous Atomic Locks for Scalability in Payment Channel Hubs.eng.txt 16.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Transys Leveraging Common Security Properties across Hardware Designs.eng.txt 16.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Automatic Uncovering of Hidden Behaviors from Input Validation in Mobile Apps.eng.srt 16.9 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/How Did That Get In My Phone Unwanted App Distribution on Android Devices.eng.srt 16.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SPECCFI Mitigating Spectre Attacks Using CFI Informed Speculation.eng.lrc 16.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Dragonblood Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd.eng.vtt 16.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/VeriSmart A Highly Precise Safety Verifier for Ethereum Smart Contracts.eng.srt 16.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Leveraging EM Side-Channel Information to Detect Rowhammer Attacks.eng.lrc 16.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SEVurity No Security Without Integrity - Breaking Integrity.eng.text 16.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Towards a Natural Perspective of Smart Homes for Practical Security and Safety Analyses.eng.text 16.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/TARDIS Rolling Back the Clock on CMS-Targeting Cyber Attacks.eng.srt 16.9 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Real-World Snapshots vs. Theory Questioning the t-Probing Security Model.eng.srt 16.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Comparative Usability Study of FIDO2 Passwordless Authentication.eng.vtt 16.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/PMP Cost-Effective Forced Execution with Probabilistic Memory Pre-planning.eng.vtt 16.8 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/On the Evolution of (Hateful) Memes by Means of Multimodal Contrastive Learning.eng.srt 16.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Pseudorandom Black Swans Cache Attacks on CTR DRBG.eng.tsv 16.8 KB
- IEEE Security & Privacy 2024/MPCitH without reputation IEEE S0P online - qw gao.eng.srt 16.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Comparative Usability Study of FIDO2 Passwordless Authentication.eng.txt 16.8 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/ShorTor Improving Tor Network Latency via Multi-hop Overlay Routing.eng.tsv 16.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/KARONTE Detecting Insecure Multi-binary Interactions in Embedded Firmware.eng.lrc 16.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Humpty Dumpty Controlling Word Meanings via Corpus Poisoning.eng.tsv 16.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Gesture Authentication for Smartphones Evaluation of Gesture Password Selection Policies.eng.srt 16.8 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/A2L Anonymous Atomic Locks for Scalability in Payment Channel Hubs.eng.lrc 16.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Message Time of Arrival Codes A Fundamental Primitive for Secure Distance Measurement.eng.vtt 16.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Influencing Photo Sharing Decisions on Social Media A Case of Paradoxical Findings.eng.vtt 16.8 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/WIGHT Wired Ghost Touch Attack on Capacitive Touchscreens.eng.tsv 16.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Browsing Unicity On the Limits of Anonymizing Web Tracking Data.eng.txt 16.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Transys Leveraging Common Security Properties across Hardware Designs.eng.lrc 16.8 KB
- IEEE Security & Privacy 2024/Transferable Multimodal Attack on Vision Language Pre training Models - haodi wang.eng.srt 16.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Comparative Usability Study of FIDO2 Passwordless Authentication.eng.lrc 16.7 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Adversary Instantiation Lower bounds for differentially private machine learning.eng.srt 16.7 KB
- IEEE Security & Privacy 2024/APP Miner Detecting API Misuses via Automatically Mining API Path Patterns - Jiasheng Jiang.eng.srt 16.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network.eng.srt 16.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Automatically Detecting Bystanders in Photos to Reduce Privacy Risks.eng.vtt 16.7 KB
- IEEE Security & Privacy 2024/Rethinking IC Layout Vulnerability Simulation Based Hardware Trojan Threat Assessment with High.eng.srt 16.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Transys Leveraging Common Security Properties across Hardware Designs.eng.srt 16.7 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Discop Provably Secure Steganography in Practice Based on Distribution Copies.eng.srt 16.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Browsing Unicity On the Limits of Anonymizing Web Tracking Data.eng.lrc 16.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Automated Reverse Engineering and Privacy Analysis of Modern Cars.eng.text 16.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Formal Modelling and Proof in the CHERI Design and Implementation Process.eng.tsv 16.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Towards Effective Differential Privacy Comms for Users' Data Sharing Decision and Comprehension.eng.tsv 16.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Pangolin Incremental Hybrid Fuzzing with Polyhedral Path Abstraction.eng.srt 16.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Browsing Unicity On the Limits of Anonymizing Web Tracking Data.eng.srt 16.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/OHIE Blockchain Scaling Made Simple.eng.tsv 16.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Neutain't Efficient Dynamic Tain't Analysis with Neural Networks.eng.txt 16.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Binsec Rel Efficient Relational Symbolic Execution for Constant-Time at Binary-Level.eng.vtt 16.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Influencing Photo Sharing Decisions on Social Media A Case of Paradoxical Findings.eng.tsv 16.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Message Time of Arrival Codes A Fundamental Primitive for Secure Distance Measurement.eng.tsv 16.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Are We Susceptible to Rowhammer An End-to-End Methodology for Cloud Providers.eng.tsv 16.4 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Linking Bluetooth LE & Classic and Implications for Privacy-Preserving Bluetooth-Based Protocols.eng.srt 16.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers.eng.vtt 16.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Detection of Electromagnetic Interference Attacks on Sensor Systems.eng.srt 16.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/CrypTFlow - Secure TensorFlow Inference.eng.text 16.4 KB
- IEEE Security & Privacy 2024/Specular Towards Secure, Trust minimized Optimistic Blockchain Execution - Zhe Ye.eng.srt 16.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Pangolin Incremental Hybrid Fuzzing with Polyhedral Path Abstraction.eng.txt 16.4 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/ADI Adversarial Dominating Inputs in Vertical Federated Learning Systems.eng.srt 16.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Fuzzing JavaScript Engines with Aspect-Preserving Mutation.eng.srt 16.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Flaw Label Exploiting IPv6 Flow Label.eng.srt 16.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Neutain't Efficient Dynamic Tain't Analysis with Neural Networks.eng.lrc 16.3 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Beyond Credential Stuffing Password Similarity Models using Neural Networks.eng.srt 16.3 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/A2L Anonymous Atomic Locks for Scalability in Payment Channel Hubs.eng.vtt 16.3 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Foundations of Dynamic BFT.eng.text 16.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/JIT Leaks Inducing Timing Side Channels through Just-In-Time Compilation.eng.tsv 16.3 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Beyond Credential Stuffing Password Similarity Models using Neural Networks.eng.tsv 16.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Pangolin Incremental Hybrid Fuzzing with Polyhedral Path Abstraction.eng.lrc 16.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Transparent Polynomial Delegation and Its Applications to Zero Knowledge Proof.eng.vtt 16.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SPECCFI Mitigating Spectre Attacks Using CFI Informed Speculation.eng.vtt 16.2 KB
- IEEE Security & Privacy 2024/NFCEraser A Security Threat of NFC Message Modification Caused by Quartz Crystal Oscillator - Jo.eng.srt 16.2 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Crowd-GPS-Sec - Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks.eng.txt 16.2 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Device Fingerprinting with Peripheral Timestamps.eng.text 16.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Sync HotStuff Simple and Practical Synchronous State Machine Replication.eng.tsv 16.2 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/ADI Adversarial Dominating Inputs in Vertical Federated Learning Systems.eng.tsv 16.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Automatic Uncovering of Hidden Behaviors from Input Validation in Mobile Apps.eng.tsv 16.1 KB
- IEEE Security & Privacy 2024/2024 62 Enforcing End to end Security for Remote Conferencing - Triste L.eng.tsv 16.1 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Security of the J-PAKE Password-Authenticated Key Exchange Protocol.eng.vtt 16.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/IJON Exploring Deep State Spaces via Fuzzing.eng.vtt 16.1 KB
- IEEE Security & Privacy 2024/MEA Defender - Lv Peizhuo.eng.srt 16.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/This PIN Can Be Easily Guessed Analyzing the Security of Smartphone Unlock PINs.eng.tsv 16.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Binsec Rel Efficient Relational Symbolic Execution for Constant-Time at Binary-Level.eng.tsv 16.1 KB
- IEEE Security & Privacy 2024/Practical Obfuscation of BLE Physical Layer Fingerprints on Mobile Devices - Hadi Givehchian.eng.txt 16.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/KARONTE Detecting Insecure Multi-binary Interactions in Embedded Firmware.eng.vtt 16.1 KB
- IEEE Security & Privacy 2024/NodeAwareSmoothing - Yuni Lai Lena.eng.srt 16.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Neutain't Efficient Dynamic Tain't Analysis with Neural Networks.eng.vtt 16.1 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Adversary Instantiation Lower bounds for differentially private machine learning.eng.txt 16.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/HopSkipJumpAttack A Query-Efficient Decision-Based Attack.eng.tsv 16.0 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Multi-Server Verifiable Computation of Low-Degree Polynomials.eng.vtt 16.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/ICLab A Global, Longitudinal Internet Censorship Measurement Platform.eng.vtt 16.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Unexpected Data Dependency Creation and Chaining A New Attack to SDN.eng.srt 16.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/RetroWrite Statically Instrumenting COTS Binaries for Fuzzing and Sanitization.eng.tsv 16.0 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Crowd-GPS-Sec - Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks.eng.lrc 16.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Flaw Label Exploiting IPv6 Flow Label.eng.tsv 16.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Throwing Darts in the Dark Detecting Bots with Limited Data using Neural Data Augmentation.eng.vtt 16.0 KB
- IEEE Security & Privacy 2024/Practical Obfuscation of BLE Physical Layer Fingerprints on Mobile Devices - Hadi Givehchian.eng.lrc 16.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Security Analysis of the Facebook Ad Library.eng.text 15.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Combating Dependence Explosion in Forensic Analysis Using Alternative Tag Propagation Semantics.eng.tsv 15.9 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Adversary Instantiation Lower bounds for differentially private machine learning.eng.lrc 15.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SoK Differential Privacy as a Causal Property.eng.text 15.9 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Data Privacy in Trigger-Action IoT Systems.eng.srt 15.9 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/SoK All You Ever Wanted to Know About Binary Disassembly But Were Afraid to Ask.eng.srt 15.9 KB
- IEEE Security & Privacy 2024/Pulling Off The Mask Forensic Analysis of the Deceptive Creator Wallets Behind Smart Contract Fr.eng.srt 15.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/ICLab A Global, Longitudinal Internet Censorship Measurement Platform.eng.txt 15.9 KB
- IEEE Security & Privacy 2024/Patchy Performance - Uncovering the Vulnerability Management Practices of IoT Centric Vendors.eng.srt 15.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Hijacking Transient Execution through Microarchitectural Load Value Injection.eng.text 15.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/How Not to Prove Your Election Outcome.eng.text 15.8 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Continuous Intrusion Characterizing the Security of Continuous Integration Services.eng.srt 15.8 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Discop Provably Secure Steganography in Practice Based on Distribution Copies.eng.txt 15.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Understanding and Mitigating Security Risks of General Messaging Protocols on IoT Clouds.eng.srt 15.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/ICLab A Global, Longitudinal Internet Censorship Measurement Platform.eng.lrc 15.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network.eng.txt 15.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SEIMI Efficient and Secure SMAP-Enabled Intra-process Memory Isolation.eng.vtt 15.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/VeriSmart A Highly Precise Safety Verifier for Ethereum Smart Contracts.eng.txt 15.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/PMP Cost-Effective Forced Execution with Probabilistic Memory Pre-planning.eng.txt 15.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SEIMI Efficient and Secure SMAP-Enabled Intra-process Memory Isolation.eng.txt 15.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SPIDER Enabling Fast Patch Propagation in Related Software Repositories.eng.text 15.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network.eng.lrc 15.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Kobold Evaluating Decentralized Access Control for Remote NSXPC Methods on iOS.eng.text 15.6 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Discop Provably Secure Steganography in Practice Based on Distribution Copies.eng.lrc 15.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Gesture Authentication for Smartphones Evaluation of Gesture Password Selection Policies.eng.vtt 15.6 KB
- IEEE Security & Privacy 2024/2024 456 State aware Fuzzing on Trusted OS Designed for IoT Devices - Qinying.eng.srt 15.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/PMP Cost-Effective Forced Execution with Probabilistic Memory Pre-planning.eng.lrc 15.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/VeriSmart A Highly Precise Safety Verifier for Ethereum Smart Contracts.eng.lrc 15.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Dragonblood Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd.eng.tsv 15.6 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Who is Real Bob Adversarial Attacks on Speaker Recognition Systems.eng.srt 15.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Meddling Middlemen Empirical Analysis of the Risks of Data-Saving Mobile Browsers.eng.text 15.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/VeriSmart A Highly Precise Safety Verifier for Ethereum Smart Contracts.eng.vtt 15.6 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Adversary Instantiation Lower bounds for differentially private machine learning.eng.vtt 15.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Gesture Authentication for Smartphones Evaluation of Gesture Password Selection Policies.eng.txt 15.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SEIMI Efficient and Secure SMAP-Enabled Intra-process Memory Isolation.eng.lrc 15.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Automatic Uncovering of Hidden Behaviors from Input Validation in Mobile Apps.eng.vtt 15.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/The Value of Collaboration in Convex Machine Learning with Differential Privacy.eng.srt 15.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/TARDIS Rolling Back the Clock on CMS-Targeting Cyber Attacks.eng.vtt 15.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Browsing Unicity On the Limits of Anonymizing Web Tracking Data.eng.vtt 15.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Unexpected Data Dependency Creation and Chaining A New Attack to SDN.eng.txt 15.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Tactical Provenance Analysis our Endpoint Detection and Response Systems.eng.srt 15.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/RAMBleed Reading Bits in Memory without Accessing Them.eng.text 15.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Comparative Usability Study of FIDO2 Passwordless Authentication.eng.tsv 15.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/BIAS Bluetooth Impersonation AttackS.eng.srt 15.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Pangolin Incremental Hybrid Fuzzing with Polyhedral Path Abstraction.eng.vtt 15.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/EverCrypt A Fast, Verified, Cross-Platform Cryptographic Provider.eng.text 15.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Transys Leveraging Common Security Properties across Hardware Designs.eng.vtt 15.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network.eng.vtt 15.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SoK A Minimalist Approach to Formalizing Analog Sensor Security.eng.text 15.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Gesture Authentication for Smartphones Evaluation of Gesture Password Selection Policies.eng.lrc 15.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Are Anonymity-Seekers Just like Everybody Else An Analysis of Contributions to Wikipedia from Tor.eng.text 15.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Tactical Provenance Analysis our Endpoint Detection and Response Systems.eng.txt 15.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/HydRand Efficient Continuous Distributed Randomness.eng.text 15.4 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Data Recovery on Encrypted Databases with k-Nearest Neighbor Query Leakage.eng.text 15.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/ICAS An Extensible Framework for Estimating the Susceptibility of IC Layouts to Additive Trojans.eng.text 15.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers.eng.tsv 15.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Fuzzing JavaScript Engines with Aspect-Preserving Mutation.eng.tsv 15.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Unexpected Data Dependency Creation and Chaining A New Attack to SDN.eng.lrc 15.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/TARDIS Rolling Back the Clock on CMS-Targeting Cyber Attacks.eng.txt 15.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Automatically Detecting Bystanders in Photos to Reduce Privacy Risks.eng.tsv 15.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/FlyClient Super-Light Clients for Cryptocurrencies.eng.text 15.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Detection of Electromagnetic Interference Attacks on Sensor Systems.eng.txt 15.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Breaking and (Partially) Fixing Provably Secure Onion Routing.eng.text 15.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Tactical Provenance Analysis our Endpoint Detection and Response Systems.eng.lrc 15.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Programming Framework for Differential Privacy with Accuracy Concentration Bounds.eng.text 15.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/TARDIS Rolling Back the Clock on CMS-Targeting Cyber Attacks.eng.lrc 15.3 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Multi-Server Verifiable Computation of Low-Degree Polynomials.eng.txt 15.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Fuzzing JavaScript Engines with Aspect-Preserving Mutation.eng.vtt 15.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/An Analysis of Pre-installed Android Software.eng.srt 15.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Intriguing Properties of Adversarial ML Attacks in the Problem Space.eng.text 15.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/IJON Exploring Deep State Spaces via Fuzzing.eng.tsv 15.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Flaw Label Exploiting IPv6 Flow Label.eng.vtt 15.2 KB
- IEEE Security & Privacy 2024/Chronos presentation - sard Chen.eng.srt 15.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Detection of Electromagnetic Interference Attacks on Sensor Systems.eng.lrc 15.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Leveraging EM Side-Channel Information to Detect Rowhammer Attacks.eng.tsv 15.2 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Beyond Credential Stuffing Password Similarity Models using Neural Networks.eng.vtt 15.2 KB
- IEEE Security & Privacy 2024/2024 winter 448 Efficient Actively Secure DPF and RAM based 2PC with One Bit Leakage - Wenhao Zhang.eng.srt 15.2 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/ADI Adversarial Dominating Inputs in Vertical Federated Learning Systems.eng.vtt 15.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Detection of Electromagnetic Interference Attacks on Sensor Systems.eng.vtt 15.1 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Android Custom Permissions Demystified From Privilege Escalation to Design Shortcomings.eng.srt 15.1 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Multi-Server Verifiable Computation of Low-Degree Polynomials.eng.lrc 15.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SPECCFI Mitigating Spectre Attacks Using CFI Informed Speculation.eng.tsv 15.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/The State of the Uniform Attacks on Encrypted Databases beyond the Uniform Query Distribution.eng.text 15.1 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/A2L Anonymous Atomic Locks for Scalability in Payment Channel Hubs.eng.tsv 15.1 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Discop Provably Secure Steganography in Practice Based on Distribution Copies.eng.vtt 15.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/TRRespass Exploiting the Many Sides of Target Row Refresh.eng.text 15.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Enabling Rack-scale Confidential Computing Using Heterogeneous Trusted Execution Environment.eng.srt 15.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Full-band De-anonymization of Bluetooth Classic Devices.eng.text 15.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/The Last Mile High-Assurance and High-Speed Cryptographic Implementations.eng.srt 15.0 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Low-Bandwidth Threshold ECDSA via Pseudorandom Correlation Generators.eng.text 15.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/xMP Selective Memory Protection for Kernel and User Space.eng.text 15.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/KARONTE Detecting Insecure Multi-binary Interactions in Embedded Firmware.eng.tsv 15.0 KB
- IEEE Security & Privacy 2024/On SMS Phishing Tactics and Infrastructure - Alex Nahapetyan.eng.srt 15.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/WaveSpy Remote and Through-wall Screen Attack via mmWave Sensing.eng.srt 15.0 KB
- IEEE Security & Privacy 2024/Practical Obfuscation of BLE Physical Layer Fingerprints on Mobile Devices - Hadi Givehchian.eng.srt 15.0 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Learning Differentially Private Mechanisms.eng.txt 14.9 KB
- IEEE Security & Privacy 2024/Test time Poisoning Attacks Against Test time Adaptation Models - Tianshuo Cong.eng.srt 14.9 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Crowd-GPS-Sec - Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks.eng.srt 14.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Unexpected Data Dependency Creation and Chaining A New Attack to SDN.eng.vtt 14.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SoK Cyber Insurance - Technical Challenges and a System Security Roadmap.eng.text 14.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/The Value of Collaboration in Convex Machine Learning with Differential Privacy.eng.txt 14.9 KB
- IEEE Security & Privacy 2024/Preserving Node level Privacy in Graph Neural Networks - ZH X.eng.srt 14.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Ask the Experts What Should Be on an IoT Privacy and Security Label.eng.text 14.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/OAT Attesting Operation Integrity of Embedded Devices.eng.srt 14.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/An Analysis of Pre-installed Android Software.eng.txt 14.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Browsing Unicity On the Limits of Anonymizing Web Tracking Data.eng.tsv 14.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/BIAS Bluetooth Impersonation AttackS.eng.txt 14.8 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Learning Differentially Private Mechanisms.eng.lrc 14.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/The Value of Collaboration in Convex Machine Learning with Differential Privacy.eng.lrc 14.8 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/AccEar Accelerometer Acoustic Eavesdropping with Unconstrained Vocabulary.eng.srt 14.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Throwing Darts in the Dark Detecting Bots with Limited Data using Neural Data Augmentation.eng.txt 14.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/The Last Mile High-Assurance and High-Speed Cryptographic Implementations.eng.txt 14.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Cornucopia Temporal Safety for CHERI Heaps.eng.text 14.7 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Improving Password Guessing via Representation Learning.eng.srt 14.7 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Improving Password Guessing via Representation Learning.eng.txt 14.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Transys Leveraging Common Security Properties across Hardware Designs.eng.tsv 14.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/An Analysis of Pre-installed Android Software.eng.lrc 14.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/BIAS Bluetooth Impersonation AttackS.eng.lrc 14.7 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/GraphSC - Parallel Secure Computation Made Easy.eng.text 14.7 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Learning Differentially Private Mechanisms.eng.srt 14.6 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/One Engine to Fuzz 'em All Generic Language Processor Testing with Semantic Validation.eng.srt 14.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Throwing Darts in the Dark Detecting Bots with Limited Data using Neural Data Augmentation.eng.lrc 14.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Understanding and Mitigating Security Risks of General Messaging Protocols on IoT Clouds.eng.vtt 14.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/The Last Mile High-Assurance and High-Speed Cryptographic Implementations.eng.lrc 14.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Pseudorandom Black Swans Cache Attacks on CTR DRBG.eng.text 14.6 KB
- IEEE Security & Privacy 2024/sokvideo v1 - Max N.eng.srt 14.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Semantic Understanding of Smart Contracts Executable Operational Semantics of Solidity.eng.text 14.6 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/ShorTor Improving Tor Network Latency via Multi-hop Overlay Routing.eng.text 14.6 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Improving Password Guessing via Representation Learning.eng.lrc 14.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Understanding and Mitigating Security Risks of General Messaging Protocols on IoT Clouds.eng.txt 14.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Pangolin Incremental Hybrid Fuzzing with Polyhedral Path Abstraction.eng.tsv 14.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Neutain't Efficient Dynamic Tain't Analysis with Neural Networks.eng.tsv 14.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Tactical Provenance Analysis our Endpoint Detection and Response Systems.eng.vtt 14.5 KB
- IEEE Security & Privacy 2024/2024 176 PolySphinx Extending the Sphinx Mix Format with Better Multicast Support - Daniel Schadt.eng.srt 14.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/ZEXE Enabling Decentralized Private Computation.eng.text 14.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Humpty Dumpty Controlling Word Meanings via Corpus Poisoning.eng.text 14.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/PMP Cost-Effective Forced Execution with Probabilistic Memory Pre-planning.eng.tsv 14.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/RetroWrite Statically Instrumenting COTS Binaries for Fuzzing and Sanitization.eng.text 14.5 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Leaking Arbitrarily Many Secrets Any-out-of-Many Proofs and Applications to RingCT Protocols.eng.srt 14.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Understanding and Mitigating Security Risks of General Messaging Protocols on IoT Clouds.eng.lrc 14.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/The Value of Collaboration in Convex Machine Learning with Differential Privacy.eng.vtt 14.4 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/DIFUZZRTL Differential Fuzz Testing to Find CPU Bugs.eng.srt 14.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Towards Effective Differential Privacy Comms for Users' Data Sharing Decision and Comprehension.eng.text 14.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/BIAS Bluetooth Impersonation AttackS.eng.vtt 14.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/NetCAT Practical Cache Attacks from the Network.eng.text 14.4 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/An I O Separation Model for Formal Verification of Kernel Implementations.eng.srt 14.4 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/DynPTA Combining Static and Dynamic Analysis for Practical Selective Data Protection.eng.srt 14.4 KB
- IEEE Security & Privacy 2024/A Security Analysis of Honey Vaults - Fei Duan.eng.srt 14.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Enabling Rack-scale Confidential Computing Using Heterogeneous Trusted Execution Environment.eng.txt 14.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Influencing Photo Sharing Decisions on Social Media A Case of Paradoxical Findings.eng.text 14.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Are We Susceptible to Rowhammer An End-to-End Methodology for Cloud Providers.eng.text 14.3 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Adversary Instantiation Lower bounds for differentially private machine learning.eng.tsv 14.3 KB
- IEEE Security & Privacy 2024/Practical Obfuscation of BLE Physical Layer Fingerprints on Mobile Devices - Hadi Givehchian.eng.tsv 14.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/WaveSpy Remote and Through-wall Screen Attack via mmWave Sensing.eng.txt 14.3 KB
- IEEE Security & Privacy 2024/Casual Users and Rational Choices within Differential Privacy - Narges Ashena.eng.srt 14.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Message Time of Arrival Codes A Fundamental Primitive for Secure Distance Measurement.eng.text 14.3 KB
- IEEE Security & Privacy 2024/Practical Obfuscation of BLE Physical Layer Fingerprints on Mobile Devices - Hadi Givehchian.eng.vtt 14.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/OHIE Blockchain Scaling Made Simple.eng.text 14.3 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/DynPTA Combining Static and Dynamic Analysis for Practical Selective Data Protection.eng.txt 14.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Enabling Rack-scale Confidential Computing Using Heterogeneous Trusted Execution Environment.eng.lrc 14.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/ICLab A Global, Longitudinal Internet Censorship Measurement Platform.eng.tsv 14.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/An Analysis of Pre-installed Android Software.eng.vtt 14.2 KB
- IEEE Security & Privacy 2024/Sabre Cutting through Adversarial Noise with Adaptive Spectral Filtering and Input Reconstructio.eng.srt 14.2 KB
- IEEE Security & Privacy 2024/2024 62 Enforcing End to end Security for Remote Conferencing - Triste L.eng.text 14.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/WaveSpy Remote and Through-wall Screen Attack via mmWave Sensing.eng.lrc 14.2 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/WIGHT Wired Ghost Touch Attack on Capacitive Touchscreens.eng.text 14.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Path Oblivious Heap Optimal and Practical Oblivious Priority Queue.eng.text 14.1 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/DynPTA Combining Static and Dynamic Analysis for Practical Selective Data Protection.eng.lrc 14.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/This PIN Can Be Easily Guessed Analyzing the Security of Smartphone Unlock PINs.eng.text 14.1 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Opening Remarks of the 2015 IEEE Symposium on Security & Privacy.eng.srt 14.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Sync HotStuff Simple and Practical Synchronous State Machine Replication.eng.text 14.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Comparative Usability Study of FIDO2 Passwordless Authentication.eng.text 14.1 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Goshawk Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis.eng.txt 14.1 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Goshawk Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis.eng.srt 14.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Measuring Legal Compliance of Banners from IAB Europe's Transparancy and Consent Framework.eng.txt 14.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/The Last Mile High-Assurance and High-Speed Cryptographic Implementations.eng.vtt 14.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Gesture Authentication for Smartphones Evaluation of Gesture Password Selection Policies.eng.tsv 14.0 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Spectral-DP Differentially Private Deep Learning through Spectral Perturbation and Filtering.eng.srt 14.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network.eng.tsv 14.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Enabling Rack-scale Confidential Computing Using Heterogeneous Trusted Execution Environment.eng.vtt 14.0 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/T-Fuzz Fuzzing by Program Transformation - Hui Peng.eng.text 14.0 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Crowd-GPS-Sec - Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks.eng.vtt 14.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/JIT Leaks Inducing Timing Side Channels through Just-In-Time Compilation.eng.text 14.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SAVIOR Towards Bug-Driven Hybrid Testing.eng.srt 13.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/VeriSmart A Highly Precise Safety Verifier for Ethereum Smart Contracts.eng.tsv 13.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SEIMI Efficient and Secure SMAP-Enabled Intra-process Memory Isolation.eng.tsv 13.9 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Goshawk Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis.eng.lrc 13.9 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Android Custom Permissions Demystified From Privilege Escalation to Design Shortcomings.eng.txt 13.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Ex-vivo Dynamic Analysis Framework for Android Device Drivers.eng.text 13.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Measuring Legal Compliance of Banners from IAB Europe's Transparancy and Consent Framework.eng.lrc 13.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/VerX Safety Verification of Smart Contracts.eng.text 13.9 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Android Custom Permissions Demystified From Privilege Escalation to Design Shortcomings.eng.vtt 13.9 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Multi-Server Verifiable Computation of Low-Degree Polynomials.eng.tsv 13.9 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Improving Password Guessing via Representation Learning.eng.vtt 13.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/WaveSpy Remote and Through-wall Screen Attack via mmWave Sensing.eng.vtt 13.8 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Crowd-GPS-Sec - Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks.eng.tsv 13.8 KB
- IEEE Security & Privacy 2024/CoreLocker - Andrew Wang.eng.srt 13.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Unexpected Data Dependency Creation and Chaining A New Attack to SDN.eng.tsv 13.8 KB
- IEEE Security & Privacy 2024/2024 176 PolySphinx Extending the Sphinx Mix Format with Better Multicast Support - Daniel Schadt.eng.txt 13.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SAVIOR Towards Bug-Driven Hybrid Testing.eng.txt 13.8 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Android Custom Permissions Demystified From Privilege Escalation to Design Shortcomings.eng.lrc 13.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/HopSkipJumpAttack A Query-Efficient Decision-Based Attack.eng.text 13.8 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Learning Differentially Private Mechanisms.eng.vtt 13.8 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/AccEar Accelerometer Acoustic Eavesdropping with Unconstrained Vocabulary.eng.vtt 13.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/MarkUs Drop-in Use-After-Free Prevention for Low-Level Languages.eng.txt 13.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/TARDIS Rolling Back the Clock on CMS-Targeting Cyber Attacks.eng.tsv 13.7 KB
- IEEE Security & Privacy 2024/2024 531 Please Tell Me More - Liu Han.eng.srt 13.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Combating Dependence Explosion in Forensic Analysis Using Alternative Tag Propagation Semantics.eng.text 13.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Tactical Provenance Analysis our Endpoint Detection and Response Systems.eng.tsv 13.7 KB
- IEEE Security & Privacy 2024/2024 176 PolySphinx Extending the Sphinx Mix Format with Better Multicast Support - Daniel Schadt.eng.lrc 13.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SAVIOR Towards Bug-Driven Hybrid Testing.eng.lrc 13.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Establishing Economic Incentives for Security Patching of IoT Consumer Products.eng.srt 13.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/MarkUs Drop-in Use-After-Free Prevention for Low-Level Languages.eng.lrc 13.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/MarkUs Drop-in Use-After-Free Prevention for Low-Level Languages.eng.srt 13.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Detection of Electromagnetic Interference Attacks on Sensor Systems.eng.tsv 13.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Dragonblood Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd.eng.text 13.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/OAT Attesting Operation Integrity of Embedded Devices.eng.vtt 13.5 KB
- IEEE Security & Privacy 2024/2024 176 PolySphinx Extending the Sphinx Mix Format with Better Multicast Support - Daniel Schadt.eng.vtt 13.5 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/AccEar Accelerometer Acoustic Eavesdropping with Unconstrained Vocabulary.eng.txt 13.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Formal Modelling and Proof in the CHERI Design and Implementation Process.eng.text 13.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Automatically Detecting Bystanders in Photos to Reduce Privacy Risks.eng.text 13.5 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Discop Provably Secure Steganography in Practice Based on Distribution Copies.eng.tsv 13.5 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/DynPTA Combining Static and Dynamic Analysis for Practical Selective Data Protection.eng.vtt 13.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Binsec Rel Efficient Relational Symbolic Execution for Constant-Time at Binary-Level.eng.text 13.4 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/AccEar Accelerometer Acoustic Eavesdropping with Unconstrained Vocabulary.eng.lrc 13.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Measuring Legal Compliance of Banners from IAB Europe's Transparancy and Consent Framework.eng.srt 13.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/TextExerciser Feedback-Driven Text Input Exercising for Android Applications.eng.srt 13.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Towards Scalable Threshold Cryptosystems.eng.srt 13.4 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Response-Hiding Encrypted Ranges Revisiting Security via Parametrized Leakage-Abuse Attacks.eng.srt 13.4 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Spectral-DP Differentially Private Deep Learning through Spectral Perturbation and Filtering.eng.txt 13.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/IJON Exploring Deep State Spaces via Fuzzing.eng.text 13.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers.eng.text 13.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/The Value of Collaboration in Convex Machine Learning with Differential Privacy.eng.tsv 13.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Leveraging EM Side-Channel Information to Detect Rowhammer Attacks.eng.text 13.2 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Spectral-DP Differentially Private Deep Learning through Spectral Perturbation and Filtering.eng.lrc 13.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/BIAS Bluetooth Impersonation AttackS.eng.tsv 13.2 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Learning Differentially Private Mechanisms.eng.tsv 13.2 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/A2L Anonymous Atomic Locks for Scalability in Payment Channel Hubs.eng.text 13.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/PMP Cost-Effective Forced Execution with Probabilistic Memory Pre-planning.eng.text 13.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/An Analysis of Pre-installed Android Software.eng.tsv 13.2 KB
- IEEE Security & Privacy 2024/Certifying Zero Knowledge Circuits with Refinement Types - Junrui Liu.eng.srt 13.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Throwing Darts in the Dark Detecting Bots with Limited Data using Neural Data Augmentation.eng.tsv 13.1 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Skyfire - Data-Driven Seed Generation for Fuzzing.eng.srt 13.1 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Improving Password Guessing via Representation Learning.eng.tsv 13.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SPECCFI Mitigating Spectre Attacks Using CFI Informed Speculation.eng.text 13.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Understanding and Mitigating Security Risks of General Messaging Protocols on IoT Clouds.eng.tsv 13.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/The Last Mile High-Assurance and High-Speed Cryptographic Implementations.eng.tsv 13.1 KB
- IEEE Security & Privacy 2024/PromptCARE Prompt Copyright Protection by Watermark Injection and Verification - homeway yao.eng.srt 13.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SAVIOR Towards Bug-Driven Hybrid Testing.eng.vtt 13.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/OAT Attesting Operation Integrity of Embedded Devices.eng.txt 13.0 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Goshawk Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis.eng.vtt 13.0 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/AI-Guardian Defeating Adversarial Attacks using Backdoors.eng.srt 13.0 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Spectral-DP Differentially Private Deep Learning through Spectral Perturbation and Filtering.eng.vtt 13.0 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Skyfire - Data-Driven Seed Generation for Fuzzing.eng.txt 13.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/KARONTE Detecting Insecure Multi-binary Interactions in Embedded Firmware.eng.text 12.9 KB
- IEEE Security & Privacy 2024/2024 50 BAFFLE - Mr HE Junda.eng.srt 12.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Towards Scalable Threshold Cryptosystems.eng.txt 12.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/OAT Attesting Operation Integrity of Embedded Devices.eng.lrc 12.9 KB
- IEEE Security & Privacy 2024/Springproofs Efficient Inner Product Arguments for Vectors of Arbitrary Length - Ming Su.eng.srt 12.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Towards Scalable Threshold Cryptosystems.eng.lrc 12.8 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Skyfire - Data-Driven Seed Generation for Fuzzing.eng.lrc 12.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Browsing Unicity On the Limits of Anonymizing Web Tracking Data.eng.text 12.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/MarkUs Drop-in Use-After-Free Prevention for Low-Level Languages.eng.vtt 12.8 KB
- IEEE Security & Privacy 2015/IEEE Security & Privacy 2015 captions/Security of the J-PAKE Password-Authenticated Key Exchange Protocol.eng.text 12.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/TextExerciser Feedback-Driven Text Input Exercising for Android Applications.eng.txt 12.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Establishing Economic Incentives for Security Patching of IoT Consumer Products.eng.txt 12.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Enabling Rack-scale Confidential Computing Using Heterogeneous Trusted Execution Environment.eng.tsv 12.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Plundervolt Software-Based Fault Injection Attacks against Intel SGX.eng.srt 12.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/TextExerciser Feedback-Driven Text Input Exercising for Android Applications.eng.lrc 12.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Establishing Economic Incentives for Security Patching of IoT Consumer Products.eng.vtt 12.6 KB
- IEEE Security & Privacy 2024/2024 517 Understanding and Benchmarking the Commonality of Adversarial Examples - cheng yushi.eng.srt 12.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Establishing Economic Incentives for Security Patching of IoT Consumer Products.eng.lrc 12.6 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/DynPTA Combining Static and Dynamic Analysis for Practical Selective Data Protection.eng.tsv 12.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Pangolin Incremental Hybrid Fuzzing with Polyhedral Path Abstraction.eng.text 12.6 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Ed25519 Signature Schemes Theory and Practice.eng.srt 12.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/WaveSpy Remote and Through-wall Screen Attack via mmWave Sensing.eng.tsv 12.6 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Response-Hiding Encrypted Ranges Revisiting Security via Parametrized Leakage-Abuse Attacks.eng.txt 12.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Measuring Legal Compliance of Banners from IAB Europe's Transparancy and Consent Framework.eng.vtt 12.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Transparent Polynomial Delegation and Its Applications to Zero Knowledge Proof.eng.text 12.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/TextExerciser Feedback-Driven Text Input Exercising for Android Applications.eng.vtt 12.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Towards Scalable Threshold Cryptosystems.eng.vtt 12.5 KB
- IEEE Security & Privacy 2024/ALIF Low Cost Adversarial Audio Attacks on Black Box Speech Platforms using Linguistic Features.eng.srt 12.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Neutain't Efficient Dynamic Tain't Analysis with Neural Networks.eng.text 12.5 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Response-Hiding Encrypted Ranges Revisiting Security via Parametrized Leakage-Abuse Attacks.eng.lrc 12.5 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Adversary Instantiation Lower bounds for differentially private machine learning.eng.text 12.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/ICLab A Global, Longitudinal Internet Censorship Measurement Platform.eng.text 12.4 KB
- IEEE Security & Privacy 2024/Practical Obfuscation of BLE Physical Layer Fingerprints on Mobile Devices - Hadi Givehchian.eng.text 12.4 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Multi-Server Verifiable Computation of Low-Degree Polynomials.eng.text 12.4 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Response-Hiding Encrypted Ranges Revisiting Security via Parametrized Leakage-Abuse Attacks.eng.vtt 12.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Transys Leveraging Common Security Properties across Hardware Designs.eng.text 12.4 KB
- IEEE Security & Privacy 2024/2024 176 PolySphinx Extending the Sphinx Mix Format with Better Multicast Support - Daniel Schadt.eng.tsv 12.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Gesture Authentication for Smartphones Evaluation of Gesture Password Selection Policies.eng.text 12.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Fuzzing JavaScript Engines with Aspect-Preserving Mutation.eng.text 12.3 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/AccEar Accelerometer Acoustic Eavesdropping with Unconstrained Vocabulary.eng.tsv 12.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SAVIOR Towards Bug-Driven Hybrid Testing.eng.tsv 12.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/MarkUs Drop-in Use-After-Free Prevention for Low-Level Languages.eng.tsv 12.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Flaw Label Exploiting IPv6 Flow Label.eng.text 12.2 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Android Custom Permissions Demystified From Privilege Escalation to Design Shortcomings.eng.tsv 12.2 KB
- IEEE Security & Privacy 2024/ALIF Low Cost Adversarial Audio Attacks on Black Box Speech Platforms using Linguistic Features.eng.txt 12.2 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/Beyond Credential Stuffing Password Similarity Models using Neural Networks.eng.text 12.2 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Goshawk Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis.eng.tsv 12.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network.eng.text 12.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Measuring Legal Compliance of Banners from IAB Europe's Transparancy and Consent Framework.eng.tsv 12.1 KB
- IEEE Security & Privacy 2024/2024 205 FlowMur A Stealthy and Practical Audio Backdoor Attack with Limited Knowledge - Jiahe Lan.eng.srt 12.1 KB
- IEEE Security & Privacy 2024/ALIF Low Cost Adversarial Audio Attacks on Black Box Speech Platforms using Linguistic Features.eng.lrc 12.1 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/DICE Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis.eng.srt 12.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SEIMI Efficient and Secure SMAP-Enabled Intra-process Memory Isolation.eng.text 12.1 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Skyfire - Data-Driven Seed Generation for Fuzzing.eng.vtt 12.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/VeriSmart A Highly Precise Safety Verifier for Ethereum Smart Contracts.eng.text 12.1 KB
- IEEE Security & Privacy 2024/Zihao Li NURGLE - zihao li.eng.srt 12.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Automatic Uncovering of Hidden Behaviors from Input Validation in Mobile Apps.eng.text 12.0 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/ADI Adversarial Dominating Inputs in Vertical Federated Learning Systems.eng.text 12.0 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/AI-Guardian Defeating Adversarial Attacks using Backdoors.eng.vtt 12.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Unexpected Data Dependency Creation and Chaining A New Attack to SDN.eng.text 12.0 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/AI-Guardian Defeating Adversarial Attacks using Backdoors.eng.txt 12.0 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/TARDIS Rolling Back the Clock on CMS-Targeting Cyber Attacks.eng.text 11.9 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Tactical Provenance Analysis our Endpoint Detection and Response Systems.eng.text 11.9 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/AI-Guardian Defeating Adversarial Attacks using Backdoors.eng.lrc 11.9 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Spectral-DP Differentially Private Deep Learning through Spectral Perturbation and Filtering.eng.tsv 11.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Detection of Electromagnetic Interference Attacks on Sensor Systems.eng.text 11.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Plundervolt Software-Based Fault Injection Attacks against Intel SGX.eng.txt 11.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Plundervolt Software-Based Fault Injection Attacks against Intel SGX.eng.vtt 11.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Plundervolt Software-Based Fault Injection Attacks against Intel SGX.eng.lrc 11.7 KB
- IEEE Security & Privacy 2024/2024 319 FCert - yantiing wang.eng.srt 11.7 KB
- IEEE Security & Privacy 2024/ALIF Low Cost Adversarial Audio Attacks on Black Box Speech Platforms using Linguistic Features.eng.vtt 11.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/OAT Attesting Operation Integrity of Embedded Devices.eng.tsv 11.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Towards Scalable Threshold Cryptosystems.eng.tsv 11.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/BIAS Bluetooth Impersonation AttackS.eng.text 11.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Understanding and Mitigating Security Risks of General Messaging Protocols on IoT Clouds.eng.text 11.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/The Value of Collaboration in Convex Machine Learning with Differential Privacy.eng.text 11.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/TextExerciser Feedback-Driven Text Input Exercising for Android Applications.eng.tsv 11.5 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/An Analysis of Pre-installed Android Software.eng.text 11.4 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Improving Password Guessing via Representation Learning.eng.text 11.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Throwing Darts in the Dark Detecting Bots with Limited Data using Neural Data Augmentation.eng.text 11.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Establishing Economic Incentives for Security Patching of IoT Consumer Products.eng.tsv 11.4 KB
- IEEE Security & Privacy 2018/IEEE Security & Privacy 2018 captions/Crowd-GPS-Sec - Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks.eng.text 11.3 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Learning Differentially Private Mechanisms.eng.text 11.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/The Last Mile High-Assurance and High-Speed Cryptographic Implementations.eng.text 11.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Can Voters Detect Malicious Manipulation of Ballot Marking Devices.eng.txt 11.2 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Response-Hiding Encrypted Ranges Revisiting Security via Parametrized Leakage-Abuse Attacks.eng.tsv 11.2 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Skyfire - Data-Driven Seed Generation for Fuzzing.eng.tsv 11.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Enabling Rack-scale Confidential Computing Using Heterogeneous Trusted Execution Environment.eng.text 11.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Can Voters Detect Malicious Manipulation of Ballot Marking Devices.eng.lrc 11.1 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Discop Provably Secure Steganography in Practice Based on Distribution Copies.eng.text 11.0 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/DynPTA Combining Static and Dynamic Analysis for Practical Selective Data Protection.eng.text 10.9 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/AccEar Accelerometer Acoustic Eavesdropping with Unconstrained Vocabulary.eng.text 10.9 KB
- IEEE Security & Privacy 2024/2024 176 PolySphinx Extending the Sphinx Mix Format with Better Multicast Support - Daniel Schadt.eng.text 10.8 KB
- IEEE Security & Privacy 2024/ALIF Low Cost Adversarial Audio Attacks on Black Box Speech Platforms using Linguistic Features.eng.tsv 10.8 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/WaveSpy Remote and Through-wall Screen Attack via mmWave Sensing.eng.text 10.8 KB
- IEEE Security & Privacy 2024/2024 102 BOUNCEATTACK A Query Efficient Decision based Adversarial Attack by Bouncing into the Wild.eng.srt 10.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/MarkUs Drop-in Use-After-Free Prevention for Low-Level Languages.eng.text 10.6 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/AI-Guardian Defeating Adversarial Attacks using Backdoors.eng.tsv 10.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/SAVIOR Towards Bug-Driven Hybrid Testing.eng.text 10.6 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Plundervolt Software-Based Fault Injection Attacks against Intel SGX.eng.tsv 10.5 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Android Custom Permissions Demystified From Privilege Escalation to Design Shortcomings.eng.text 10.4 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Can Voters Detect Malicious Manipulation of Ballot Marking Devices.eng.srt 10.3 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/Spectral-DP Differentially Private Deep Learning through Spectral Perturbation and Filtering.eng.text 10.2 KB
- IEEE Security & Privacy 2022/IEEE Security & Privacy 2022 captions/Goshawk Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis.eng.text 10.2 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Red Belly a Deterministic Scalable Open Permissioned Blockchain.eng.srt 10.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Measuring Legal Compliance of Banners from IAB Europe's Transparancy and Consent Framework.eng.text 10.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/TextExerciser Feedback-Driven Text Input Exercising for Android Applications.eng.text 10.1 KB
- IEEE Security & Privacy 2019/IEEE Security & Privacy 2019 captions/IEEE S&P 2019 - Awards Ceremony.eng.srt 10.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Towards Scalable Threshold Cryptosystems.eng.text 10.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/OAT Attesting Operation Integrity of Embedded Devices.eng.text 10.1 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Establishing Economic Incentives for Security Patching of IoT Consumer Products.eng.text 9.9 KB
- IEEE Security & Privacy 2021/IEEE Security & Privacy 2021 captions/Response-Hiding Encrypted Ranges Revisiting Security via Parametrized Leakage-Abuse Attacks.eng.text 9.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Can Voters Detect Malicious Manipulation of Ballot Marking Devices.eng.vtt 9.7 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Can Voters Detect Malicious Manipulation of Ballot Marking Devices.eng.tsv 9.6 KB
- IEEE Security & Privacy 2024/ALIF Low Cost Adversarial Audio Attacks on Black Box Speech Platforms using Linguistic Features.eng.text 9.4 KB
- IEEE Security & Privacy 2017/IEEE Security & Privacy 2017 captions/Skyfire - Data-Driven Seed Generation for Fuzzing.eng.text 9.2 KB
- IEEE Security & Privacy 2023/IEEE Security & Privacy 2023 captions/AI-Guardian Defeating Adversarial Attacks using Backdoors.eng.text 9.2 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Plundervolt Software-Based Fault Injection Attacks against Intel SGX.eng.text 9.1 KB
- IEEE logo.jpg 8.3 KB
- IEEE Security & Privacy 2020/IEEE Security & Privacy 2020 captions/Can Voters Detect Malicious Manipulation of Ballot Marking Devices.eng.text 7.9 KB
- IEEE Security & Privacy 2024/Who Left the Door Open Investigating the Causes of Exposed IoT Devices in an Academic Network.eng.srt 6.1 KB
- IEEE Security and Privacy thank you.txt 1.0 KB
- HEADER.md 621 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.