_    ___ ___      _                               
/ \ |_ _/ _ \ ___| |_ _ __ ___ __ _ _ __ ___ ___
/ _ \ | | | | / __| __| '__/ _ \/ _` | '_ ` _ \/ __|
/ ___ \ | | |_| \__ \ |_| | | __/ (_| | | | | | \__ \
/_/ \_\___\___/|___/\__|_| \___|\__,_|_| |_| |_|___/
Twitch
Invidious (YT)

Invidious > Channel > USENIX

Trending
USENIX 37400 subscribers    RSS
View channel on YouTube
Videos
Playlists

YT 1 hour 3 minutes 59 seconds
USENIX
USENIX Security '19 - Tackling the Trust and Safety Crisis
YT 19 minutes 43 seconds
USENIX
USENIX Security '19 - A Study of the Feasibility of Co-located App Attacks against BLE
YT 21 minutes 52 seconds
USENIX
USENIX Security '19 - The CrossPath Attack: Disrupting the SDN Control Channel via Shared Links
YT 19 minutes 26 seconds
USENIX
USENIX Security '19 - A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking
YT 22 minutes 23 seconds
USENIX
USENIX Security '19 - Hiding in Plain Signal: Physical Signal Overshadowing Attack on LTE
YT 21 minutes 20 seconds
USENIX
USENIX Security '19 - UWB-ED: Distance Enlargement Attack Detection in Ultra-Wideband
YT 20 minutes 13 seconds
USENIX
USENIX Security '19 - Computer Security and Privacy in the Interactions Between Victim
YT 19 minutes 57 seconds
USENIX
USENIX Security '19 - Clinical Computer Security for Victims of Intimate Partner Violence
YT 20 minutes 38 seconds
USENIX
USENIX Security '19 - Evaluating the Contextual Integrity of Privacy Regulation: Parents' IoT
YT 16 minutes 29 seconds
USENIX
USENIX Security '19 - Secure Multi-User Content Sharing for Augmented Reality Applications
YT 20 minutes 43 seconds
USENIX
USENIX Security '19 - Understanding and Improving Security and Privacy in Multi-User
YT 46 minutes 53 seconds
USENIX
USENIX Security '19 - Embracing the "Hack." A Better Strategy for Team-Defense
YT 49 minutes 18 seconds
USENIX
USENIX Security '19 - Evaluating Mobile Messengers for Implementation Vulnerabilities
YT 17 minutes 51 seconds
USENIX
USENIX Security '19 - PAC it up: Towards Pointer Integrity using ARM Pointer Authentication
YT 20 minutes 2 seconds
USENIX
USENIX Security '19 - Origin-sensitive Control Flow Integrity
YT 20 minutes 37 seconds
USENIX
USENIX Security '19 - HardFails: Insights into Software-Exploitable Hardware Bugs
YT 19 minutes 31 seconds
USENIX
USENIX Security '19 - A Systematic Evaluation of Transient Execution Attacks and Defenses
YT 20 minutes 6 seconds
USENIX
USENIX Security '19 - uXOM: Efficient eXecute-Only Memory on ARM Cortex-M
YT 20 minutes 36 seconds
USENIX
USENIX Security '19 - The Secret Sharer: Evaluating and Testing Unintended Memorization in
YT 21 minutes 14 seconds
USENIX
USENIX Security '19 - Improving Robustness of ML Classifiers against Realizable Evasio
YT 19 minutes 1 second
USENIX
USENIX Security '19 - ALOHA: Auxiliary Loss Optimization for Hypothesis Augmentation
YT 20 minutes 33 seconds
USENIX
USENIX Security '19 - Why Do Adversarial Attacks Transfer? Explaining Transferability of
YT 19 minutes 28 seconds
USENIX
USENIX Security '19 - Stack Overflow Considered Helpful! Deep Learning Security Nudges Towards
YT 51 minutes 7 seconds
USENIX
USENIX Security '19 - Security Research and Public Policy
YT 51 minutes 23 seconds
USENIX
USENIX Security '19 - From Privacy by Design to Data Protection by Design: The Challenges of
YT 23 minutes 23 seconds
USENIX
USENIX Security '19 - Wireless Attacks on Aircraft Instrument Landing Systems
YT 23 minutes 13 seconds
USENIX
USENIX Security '19 - Please Pay Inside: Evaluating Bluetooth-based Detection of Gas Pump Skimmers
YT 17 minutes 59 seconds
USENIX
USENIX Security '19 - CANvas: Fast and Inexpensive Automotive Network Mapping
YT 17 minutes 28 seconds
USENIX
USENIX Security '19 - Losing the Car Keys: Wireless PHY-Layer Insecurity in EV Charging
YT 21 minutes 36 seconds
USENIX
USENIX Security '19 - RVFuzzer: Finding Input Validation Bugs in Robotic Vehicles through
YT 21 minutes 7 seconds
USENIX
USENIX Security '19 - Seeing is Not Believing: Camouflage Attacks on Image Scaling Algorithms
YT 19 minutes 14 seconds
USENIX
USENIX Security '19 - CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning
YT 24 minutes 56 seconds
USENIX
USENIX Security '19 - Misleading Authorship Attribution of Source Code using Adversarial Learning
YT 18 minutes 44 seconds
USENIX
USENIX Security '19 - Terminal Brain Damage: Exposing the Graceless Degradation in Deep
YT 23 minutes 12 seconds
USENIX
USENIX Security '19 - CSI NN: Reverse Engineering of Neural Network Architectures
YT 54 minutes 57 seconds
USENIX
USENIX Security '19 - The Spies Hacking our Phones are Going Dark, and We're All in Trouble
YT 21 minutes 51 seconds
USENIX
USENIX Security '19 - simTPM: User-centric TPM for Mobile Devices
YT 19 minutes 29 seconds
USENIX
USENIX Security '19 - The Betrayal At Cloud City: An Empirical Analysis Of Cloud-Based Mobile
YT 20 minutes 32 seconds
USENIX
USENIX Security '19 - EnTrust: Regulating Sensor Access by Cooperating Programs
YT 17 minutes 37 seconds
USENIX
USENIX Security '19 - PolicyLint: Investigating Internal Privacy Policy Contradictions on Google
YT 18 minutes 14 seconds
USENIX
USENIX Security '19 - 50 Ways to Leak Your Data: An Exploration of Apps'
YT 19 minutes 1 second
USENIX
USENIX Security '19 - SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks
YT 17 minutes 7 seconds
USENIX
USENIX Security '19 - Robust Website Fingerprinting Through the Cache Occupancy Channel
YT 21 minutes 30 seconds
USENIX
USENIX Security '19 - Identifying Cache-Based Side Channels through Secret-Augmented
YT 22 minutes 41 seconds
USENIX
USENIX Security '19 - ScatterCache: Thwarting Cache Attacks via Cache Set Randomization
YT 20 minutes 41 seconds
USENIX
USENIX Security '19 - Pythia: Remote Oracles for the Masses
YT 48 minutes 15 seconds
USENIX
USENIX Security '19 - Lessons Learned from Evaluating the Robustness of Defenses to
YT 18 minutes 43 seconds
USENIX
USENIX Security '19 - HideMyApp: Hiding the Presence of Sensitive Apps on Android
YT 22 minutes 15 seconds
USENIX
USENIX Security '19 - TESSERACT: Eliminating Experimental Bias in Malware Classification
YT 17 minutes 43 seconds
USENIX
USENIX Security '19 - Devils in the Guidance: Predicting Logic Vulnerabilities in Payment
YT 19 minutes 4 seconds
USENIX
USENIX Security '19 - Understanding iOS-based Crowdturfing Through Hidden UI Analysis
YT 20 minutes 57 seconds
USENIX
USENIX Security '19 - BITE: Bitcoin Lightweight Client Privacy using Trusted Execution
YT 20 minutes 3 seconds
USENIX
USENIX Security '19 - FastKitten: Practical Smart Contracts on Bitcoin
YT 19 minutes 11 seconds
USENIX
USENIX Security '19 - StrongChain: Transparent and Collaborative Proof-of-Work Consensus
YT 18 minutes 35 seconds
USENIX
USENIX Security '19 - Tracing Transactions Across Cryptocurrency Ledgers
YT 20 minutes 29 seconds
USENIX
USENIX Security '19 - Reading the Tea leaves: A Comparative Analysis of Threat Intelligence
YT 18 minutes 38 seconds
USENIX
USENIX Security '19 - Towards the Detection of Inconsistencies in Public Security
YT 19 minutes 12 seconds
USENIX
USENIX Security '19 - Understanding and Securing Device Vulnerabilities through
YT 21 minutes 6 seconds
USENIX
USENIX Security '19 - ATTACK2VEC: Leveraging Temporal Word Embeddings to Understand the
YT 19 minutes 20 seconds
USENIX
USENIX Security '19 - All Your Clicks Belong to Me: Investigating Click Interception on the Web
YT 20 minutes 36 seconds
USENIX
USENIX Security '19 - What Are You Searching For? A Remote Keylogging Attack
YT 19 minutes 11 seconds
USENIX
USENIX Security '19 - Iframes/Popups Are Dangerous in Mobile WebView: Studying and
YT 21 minutes 17 seconds
USENIX
USENIX Security '19 - Small World with High Risks: A Study of Security Threats in the npm Ecosystem
YT 20 minutes 1 second
USENIX
USENIX Security '19 - Leaky Images: Targeted Privacy Attacks in the Web
YT 18 minutes 46 seconds
USENIX
USENIX Security '19 - “Johnny, you are fired!” – Spoofing OpenPGP and S/MIME Signatures in Emails
YT 20 minutes 24 seconds
USENIX
USENIX Security '19 - Scalable Scanning and Automatic Classification of TLS Padding Oracle
YT 19 minutes 40 seconds
USENIX
USENIX Security '19 - The KNOB is Broken: Exploiting Low Entropy in the Encryption Key
YT 19 minutes 36 seconds
USENIX
USENIX Security '19 - From IP ID to Device ID and KASLR Bypass
YT 19 minutes 57 seconds
USENIX
USENIX Security '19 - When the Signal is in the Noise: Exploiting Diffix's Sticky Noise
YT 19 minutes 6 seconds
USENIX
USENIX Security '19 - FIRM-AFL: High-Throughput Greybox Fuzzing of IoT Firmware via
YT 20 minutes 9 seconds
USENIX
USENIX Security '19 - Not Everything is Dark and Gloomy: Power Grid Protections Against IoT
YT 21 minutes 31 seconds
USENIX
USENIX Security '19 - Discovering and Understanding the Security Hazards in the
YT 17 minutes 50 seconds
USENIX
USENIX Security '19 - Looking from the Mirror: Evaluating IoT Device Security through
YT 17 minutes 38 seconds
USENIX
USENIX Security '19 - All Things Considered: An Analysis of IoT Devices on Home Networks
YT 21 minutes 1 second
USENIX
USENIX Security '19 - KEPLER: Facilitating Control-flow Hijacking Primitive Evaluation for Linux
YT 19 minutes 55 seconds
USENIX
USENIX Security '19 - PeX: A Permission Check Analysis Framework for Linux Kernel
YT 19 minutes 43 seconds
USENIX
USENIX Security '19 - ERIM: Secure, Efficient In-process Isolation with Protection Keys (MPK)
YT 22 minutes 3 seconds
USENIX
USENIX Security '19 - SafeHidden: An Efficient and Secure Information Hiding Technique Using
YT 21 minutes 34 seconds
USENIX
USENIX Security '19 - Exploiting Unprotected I/O Operations in AMD’s Secure Encrypted Virtualization
YT 19 minutes 54 seconds
USENIX
USENIX Security '19 - Detecting and Characterizing Lateral Phishing at Scale
YT 19 minutes 18 seconds
USENIX
USENIX Security '19 - High Precision Detection of Business Email Compromise
YT 18 minutes 16 seconds
USENIX
USENIX Security '19 - Cognitive Triaging of Phishing Attacks
YT 20 minutes 55 seconds
USENIX
USENIX Security '19 - Users Really Do Answer Telephone Scams
YT 21 minutes
USENIX
USENIX Security '19 - Platforms in Everything: Analyzing Ground-Truth Data on the Anatomy and
YT 51 minutes 41 seconds
USENIX
USENIX Security '19 - Baby Steps towards the Precipice: How the Web Became a Scary
YT 54 minutes 20 seconds
USENIX
USENIX Security '19 - Shining Light on Internet-based Crimes Against Children
YT 19 minutes 23 seconds
USENIX
USENIX Security '19 - Protecting Cloud Virtual Machines from Hypervisor and Host Operating
YT 20 minutes 14 seconds
USENIX
USENIX Security '19 - WAVE: A Decentralized Authorization Framework with Transitive Delegation
YT 21 minutes 12 seconds
USENIX
USENIX Security '19 - in-toto: Providing farm-to-table guarantees for bits and bytes
YT 19 minutes 24 seconds
USENIX
USENIX Security '19 - IODINE: Verifying Constant-Time Execution of Hardware
YT 19 minutes 18 seconds
USENIX
USENIX Security '19 - VRASED: A Verified Hardware/Software Co-Design for Remote Attestation
YT 21 minutes 10 seconds
USENIX
USENIX Security '19 - EverParse: Verified Secure Zero-Copy Parsers for Authenticated Message Formats
YT 18 minutes 58 seconds
USENIX
USENIX Security '19 - Mobile Private Contact Discovery at Scale
YT 20 minutes 15 seconds
USENIX
USENIX Security 19 - Blind Bernoulli Trials: A Noninteractive Protocol For Hidden-Weight Coin Flips
YT 19 minutes 13 seconds
USENIX
USENIX Security '19 - XONN: XNOR-based Oblivious Deep Neural Network Inference
YT 21 minutes 4 seconds
USENIX
USENIX Security '19 - JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT
YT 1 hour 42 minutes 14 seconds
USENIX
USENIX Security '19 - Security Educational Panel
YT 18 minutes 34 seconds
USENIX
USENIX Security '19 - Birthday, Name and Bifacial-security: Understanding Passwords
YT 20 minutes 55 seconds
USENIX
USENIX Security '19 - Protecting accounts from credential stuffing with password breach alerting
YT 20 minutes 48 seconds
USENIX
USENIX Security '19 - Probability Model Transforming Encoders Against Encoding Attacks
YT 20 minutes 41 seconds
USENIX
USENIX Security '19 - The Art of The Scam: Demystifying Honeypots in Ethereum Smart Contracts
YT 19 minutes 44 seconds
USENIX
USENIX Security '19 - The Anatomy of a Cryptocurrency Pump-and-Dump Scheme
YT 21 minutes 4 seconds
USENIX
USENIX Security '19 - Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of
YT 54 minutes 55 seconds
USENIX
USENIX Security '19 - Lessons Learned About Building Secure Software: It's About the Developers!
YT 20 minutes 22 seconds
USENIX
USENIX Security '19 - Rendered Private: Making GLSL Execution Uniform to Prevent WebGL-based
YT 19 minutes 34 seconds
USENIX
USENIX Security '19 - Site Isolation: Process Separation for Web Sites within the Browser
YT 19 minutes 12 seconds
USENIX
USENIX Security '19 - Everyone is Different: Client-side Diversification for Defending
YT 18 minutes 50 seconds
USENIX
USENIX Security '19 - Less is More: Quantifying the Security Benefits of Debloating Web Applications
YT 21 minutes 30 seconds
USENIX
USENIX Security '19 - The Web's Identity Crisis: Understanding the Effectiveness of Website Identity
YT 20 minutes 43 seconds
USENIX
USENIX Security '19 - RAZOR: A Framework for Post-deployment Software Debloating
YT 17 minutes 42 seconds
USENIX
USENIX Security '19 - Back to the Whiteboard: a Principled Approach for the Assessment and
YT 20 minutes 31 seconds
USENIX
USENIX Security '19 - Detecting Missing-Check Bugs via Semantic- and Context-Aware
YT 17 minutes
USENIX
USENIX Security '19 - DEEPVSA: Facilitating Value-set Analysis with Deep Learning for
YT 23 minutes 9 seconds
USENIX
USENIX Security '19 - CONFIRM: Evaluating Compatibility and Relevance of Control-flow
YT 20 minutes 43 seconds
USENIX
USENIX Security '19 - Point Break: A Study of Bandwidth Denial-of-Service Attacks against Tor
YT 21 minutes 15 seconds
USENIX
USENIX Security '19 - No Right to Remain Silent: Isolating Malicious Mixes
YT 20 minutes 23 seconds
USENIX
USENIX Security '19 - On (The Lack Of) Location Privacy in Crowdsourcing Applications
YT 20 minutes 56 seconds
USENIX
USENIX Security '19 - Utility-Optimized Local Differential Privacy Mechanisms for
YT 14 minutes 53 seconds
USENIX
USENIX Security '19 - Evaluating Differentially Private Machine Learning in Practice
YT 17 minutes 9 seconds
USENIX
USENIX Security '19 - Fuzzification: Anti-Fuzzing Techniques
YT 20 minutes 15 seconds
USENIX
USENIX Security '19 - AntiFuzz: Impeding Fuzzing Audits of Binary Executables
YT 20 minutes 5 seconds
USENIX
USENIX Security '19 - MOPT: Optimized Mutation Scheduling for Fuzzers
YT 19 minutes 4 seconds
USENIX
USENIX Security '19 - EnFuzz: Ensemble Fuzzing with Seed Synchronization among Diverse Fuzzers
YT 20 minutes 55 seconds
USENIX
USENIX Security '19 - GRIMOIRE: Synthesizing Structure while Fuzzing