IEEE Security and Privacy 2016/NITRD Panel Federal Cybersecurity and Privacy R&D Strategic Plans.mp4 | 213.23 MB |
IEEE Security and Privacy 2015/Protecting Private Keys against Memory Disclosure Attacks Using Hardware Transactional Memory.715390f9-723e-48d6-a2d9-8fce9adb8a6d.part | 205.05 MB |
IEEE Security and Privacy 2017/Securing Augmented Reality Output.84d6e03b-b9a3-43cb-99ad-5277a4f98362.part | 179.01 MB |
IEEE Security and Privacy 2016/S&P TC Business Meeting.mp4 | 170.96 MB |
IEEE Security and Privacy 2020/SSP 2020 Opening Remarks.mp4 | 160.03 MB |
IEEE Security and Privacy 2015/Missing the Point(er) On the Effectiveness of Code Pointer Integrity.mp4 | 105.65 MB |
IEEE Security and Privacy 2015/Temporal Lensing and Its Application in Pulsing Denial-of-Service Attacks.mp4 | 103.33 MB |
IEEE Security and Privacy 2016/Algorithmic Transparency via Quantitative Input Influence ....mp4 | 100.22 MB |
IEEE Security and Privacy 2016/Helping Johnny to Analyze Malware A Usability-Optimized Decompiler and Malware Analysis User Study.mp4 | 95.81 MB |
IEEE Security and Privacy 2016/A2 Analog Malicious Hardware.mp4 | 91.05 MB |
IEEE Security and Privacy 2016/Keeping Authorities Honest or Bust with Decentralized Witness Cosigning.mp4 | 88.34 MB |
IEEE Security and Privacy 2015/SurroundWeb Mitigating Privacy Concerns in a 3D Web Browser.mp4 | 86.72 MB |
IEEE Security and Privacy 2015/High System-Code Security with Low Overhead.mp4 | 86.56 MB |
IEEE Security and Privacy 2016/CaSE Cache-Assisted Secure Execution on ARM Processors.mp4 | 86.48 MB |
IEEE Security and Privacy 2016/PhotoProof Cryptographic Image Authentication for Any Set of Permissible Transformations.mp4 | 85.32 MB |
IEEE Security and Privacy 2016/Shreds Fine-grained Execution Units with Private Memory.mp4 | 84.8 MB |
IEEE Security and Privacy 2017/Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping.mp4 | 83.34 MB |
IEEE Security and Privacy 2016/Following Devil's Footprints Cross-Platform Analysis of Potentially Harmful Libraries ....mp4 | 81 MB |
IEEE Security and Privacy 2016/Key Confirmation in Key Exchange A Formal Treatment and Implications for TLS 1.3.mp4 | 79.8 MB |
IEEE Security and Privacy 2015/Secure Track Verification.mp4 | 79.42 MB |
IEEE Security and Privacy 2016/Staying Secure and Unprepared Understanding and Mitigating the Security Risks of Apple ZeroConf.mp4 | 79.19 MB |
IEEE Security and Privacy 2017/SoK Science, Security, and the Elusive Goal of Security as a Scientific Pursuit.mp4 | 78.69 MB |
IEEE Security and Privacy 2016/Multiple Handshakes Security of TLS 1.3 Candidates.mp4 | 78.39 MB |
IEEE Security and Privacy 2016/You Get Where You're Looking For The Impact Of Information Sources On Code Security.mp4 | 78.32 MB |
IEEE Security and Privacy 2015/Riposte An Anonymous Messaging System Handling Millions of Users.mp4 | 77.86 MB |
IEEE Security and Privacy 2016/A Tough call Mitigating Advanced Code-Reuse Attacks At The Binary Level.mp4 | 77.52 MB |
IEEE Security and Privacy 2016/Beauty and the Beast Diverting modern web browsers to build unique browser fingerprints.mp4 | 77.12 MB |
IEEE Security and Privacy 2016/Cinderella Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with ....mp4 | 77.05 MB |
IEEE Security and Privacy 2016/Verena End-to-End Integrity Protection for Web Applications.mp4 | 76.83 MB |
IEEE Security and Privacy 2016/TaoStore Overcoming Asynchronicity in Oblivious Data Storage.mp4 | 76.66 MB |
IEEE Security and Privacy 2016/Verifiable ASICs.mp4 | 76.26 MB |
IEEE Security and Privacy 2016/Security Analysis of Emerging Smart Home Applications.mp4 | 76.12 MB |
IEEE Security and Privacy 2016/pASSWORD tYPOS and How to Correct Them Securely.mp4 | 75.72 MB |
IEEE Security and Privacy 2016/A Practical Oblivious Map Data Structure with Secure Deletion and History Independence.mp4 | 75.72 MB |
IEEE Security and Privacy 2016/LAVA Large-scale Automated Vulnerability Addition.mp4 | 75.22 MB |
IEEE Security and Privacy 2016/On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud.mp4 | 75.18 MB |
IEEE Security and Privacy 2016/Synthesizing Plausible Privacy-Preserving Location Traces.mp4 | 75.16 MB |
IEEE Security and Privacy 2016/Automated Analysis and Verification of TLS 1.3 0-RTT, Resumption and Delayed Authentication.mp4 | 74.93 MB |
IEEE Security and Privacy 2016/MitM Attack by Name Collision Cause Analysis and Vulnerability Assessment in the New gTLD Era.mp4 | 74.8 MB |
IEEE Security and Privacy 2016/Data-Oriented Programming On the Expressiveness of Non-Control Data Attacks.mp4 | 74.6 MB |
IEEE Security and Privacy 2016/High-Speed Inter-domain Fault Localization.mp4 | 74.46 MB |
IEEE Security and Privacy 2016/Talos Neutralizing Vulnerabilities with Security Workarounds for Rapid Response.mp4 | 74.04 MB |
IEEE Security and Privacy 2016/The Cracked Cookie Jar HTTP Cookie Hijacking and the Exposure of Private Information.mp4 | 73.42 MB |
IEEE Security and Privacy 2015/S$A A Shared Cache Attack That Works across Cores and Defies VM Sandboxing ....mp4 | 73.1 MB |
IEEE Security and Privacy 2016/TriggerScope Towards Detecting Logic Bombs in Android Applications.mp4 | 72.91 MB |
IEEE Security and Privacy 2016/Downgrade Resilience in Key-Exchange Protocols.mp4 | 72.6 MB |
IEEE Security and Privacy 2016/Users Really Do Plug in USB Drives They Find.mp4 | 72.33 MB |
IEEE Security and Privacy 2016/Distillation as a Defense to Adversarial Perturbations against Deep Neural Networks.mp4 | 72.2 MB |
IEEE Security and Privacy 2016/Return to the Zombie Gadgets Undermining Destructive Code Reads via Code-Inference Attacks.mp4 | 70.61 MB |
IEEE Security and Privacy 2015/Towards Making Systems Forget with Machine Unlearning.mp4 | 70.46 MB |