_    ___ ___      _                               
/ \ |_ _/ _ \ ___| |_ _ __ ___ __ _ _ __ ___ ___
/ _ \ | | | | / __| __| '__/ _ \/ _` | '_ ` _ \/ __|
/ ___ \ | | |_| \__ \ |_| | | __/ (_| | | | | | \__ \
/_/ \_\___\___/|___/\__|_| \___|\__,_|_| |_| |_|___/
Twitch
Invidious (YT)

Invidious > Channel > USENIX

Trending
USENIX 37400 subscribers    RSS
View channel on YouTube
Videos
Playlists

YT 11 minutes 41 seconds
USENIX
USENIX Security '20 - A Formal Analysis of IEEE 802.11's WPA2: Countering the Kracks Caused by...
YT 12 minutes 25 seconds
USENIX
USENIX Security '20 - Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation...
YT 12 minutes 12 seconds
USENIX
USENIX Security '20 - Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade Attacks
YT 11 minutes 12 seconds
USENIX
USENIX Security '20 - You Are What You Broadcast: Identification of Mobile and IoT Devices...
YT 12 minutes 27 seconds
USENIX
USENIX Security '20 - Call Me Maybe: Eavesdropping Encrypted LTE Calls With ReVoLTE
YT 13 minutes 6 seconds
USENIX
USENIX Security '20 - A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web
YT 12 minutes 7 seconds
USENIX
USENIX Security '20 - Understanding security mistakes developers make: Qualitative analysis...
YT 10 minutes 48 seconds
USENIX
USENIX Security '20 - Empirical Measurement of Systemic 2FA Usability
YT 12 minutes 16 seconds
USENIX
USENIX Security '20 - What Twitter Knows: Characterizing Ad Targeting Practices, User Perceptions...
YT 12 minutes 21 seconds
USENIX
USENIX Security '20 - The Impact of Ad-Blockers on Product Search and Purchase Behavior
YT 11 minutes 8 seconds
USENIX
USENIX Security '20 - Symbolic execution with SymCC: Don't interpret, compile!
YT 11 minutes 57 seconds
USENIX
USENIX Security '20 - Sys: A Static/Symbolic Tool for Finding Good Bugs in Good (Browser) Code
YT 12 minutes 11 seconds
USENIX
USENIX Security '20 - Everything Old is New Again: Binary Security of WebAssembly
YT 11 minutes 56 seconds
USENIX
USENIX Security '20 - AURORA: Statistical Crash Analysis for Automated Root Cause Explanation
YT 11 minutes 18 seconds
USENIX
USENIX Security '20 - SmartVerif: Push the Limit of Automation Capability of Verifying Security...
YT 11 minutes 35 seconds
USENIX
USENIX Security '20 - BigMAC: Fine-Grained Policy Analysis of Android Firmware
YT 11 minutes 11 seconds
USENIX
USENIX Security '20 - From Needs to Actions to Secure Apps? The Effect of Requirements...
YT 12 minutes 17 seconds
USENIX
USENIX Security '20 - FANS: Fuzzing Android Native System Services via Automated Interface Analysis
YT 11 minutes 28 seconds
USENIX
USENIX Security '20 - Chaperone: Real-time Locking and Loss Prevention for Smartphones
YT 13 minutes 2 seconds
USENIX
USENIX Security '20 - Towards HTTPS Everywhere on Android: We Are Not There Yet
YT 12 minutes 34 seconds
USENIX
USENIX Security '20 - Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness...
YT 12 minutes 41 seconds
USENIX
USENIX Security '20 - PhishTime: Continuous Longitudinal Measurement of the Effectiveness...
YT 11 minutes 8 seconds
USENIX
USENIX Security '20 - Who's Calling? Characterizing Robocalls through Audio and Metadata Analysis
YT 12 minutes 45 seconds
USENIX
USENIX Security '20 - See No Evil: Phishing for Permissions with False Transparency
YT 12 minutes 41 seconds
USENIX
USENIX Security '20 - A different cup of TI? The added value of commercial threat intelligence
YT 13 minutes 40 seconds
USENIX
USENIX Security '20 - HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution...
YT 12 minutes 15 seconds
USENIX
USENIX Security '20 - CopyCat: Controlled Instruction-Level Attacks on Enclaves
YT 12 minutes 13 seconds
USENIX
USENIX Security '20 - An Off-Chip Attack on Hardware Enclaves via the Memory Bus
YT 10 minutes 57 seconds
USENIX
USENIX Security '20 - Civet: An Efficient Java Partitioning Framework for Hardware Enclaves
YT 11 minutes 34 seconds
USENIX
USENIX Security '20 - BesFS: A POSIX Filesystem for Enclaves with a Mechanized Safety Proof
YT 10 minutes 38 seconds
USENIX
USENIX Security '20 - EPIC: Every Packet Is Checked in the Data Plane of a Path-Aware Internet
YT 11 minutes 31 seconds
USENIX
USENIX Security '20 - ShadowMove: A Stealthy Lateral Movement Strategy
YT 10 minutes 5 seconds
USENIX
USENIX Security '20 - Poison Over Troubled Forwarders: A Cache Poisoning Attack Targeting DNS...
YT 12 minutes 32 seconds
USENIX
USENIX Security '20 - Programmable In-Network Security for Context-aware BYOD Policies
YT 12 minutes 37 seconds
USENIX
USENIX Security '20 - A Longitudinal and Comprehensive Study of the DANE Ecosystem in Email
YT 12 minutes
USENIX
USENIX Security '20 - NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities
YT 12 minutes 24 seconds
USENIX
USENIX Security '20- Shim Shimmeny: Evaluating the Security & Privacy Contributions of Link Shimming
YT 11 minutes 22 seconds
USENIX
USENIX Security '20 - Cached and Confused: Web Cache Deception in the Wild
YT 12 minutes
USENIX
USENIX Security '20 - A Tale of Two Headers: A Formal Analysis of Inconsistent Click-Jacking...
YT 11 minutes 12 seconds
USENIX
USENIX Security '20 - Retrofitting Fine Grain Isolation in the Firefox Renderer
YT 10 minutes 24 seconds
USENIX
USENIX Security '20 - Zero-delay Lightweight Defenses against Website Fingerprinting
YT 12 minutes 13 seconds
USENIX
USENIX Security '20 - Achieving Keyless CDNs with Conclaves
YT 12 minutes
USENIX
USENIX Security '20 - SENG, the SGX-Enforcing Network Gateway: Authorizing Communication...
YT 13 minutes 48 seconds
USENIX
USENIX Security '20 - APEX: A Verified Architecture for Proofs of Execution on Remote Devices...
YT 11 minutes 17 seconds
USENIX
USENIX Security '20 - PARTEMU: Enabling Dynamic Analysis of Real-World TrustZone Software...
YT 12 minutes 5 seconds
USENIX
USENIX Security '20 - PHMon: A Programmable Hardware Monitor and Its Security Use Cases
YT 11 minutes 33 seconds
USENIX
USENIX Security '20 - Horizontal Privilege Escalation in Trusted Applications
YT 10 minutes 41 seconds
USENIX
USENIX Security '20 - TeeRex: Discovery and Exploitation of Memory Corruption Vulnerabilities...
YT 1 hour 22 seconds
USENIX
USENIX Security '20 - Panel: The 2020 Election: Remote Voting, Disinformation, and Audit
YT 11 minutes 23 seconds
USENIX
USENIX Security '20 - Stealthy Tracking of Autonomous Vehicles with Cache Side Channels
YT 12 minutes 17 seconds
USENIX
USENIX Security '20 - Towards Robust LiDAR-based Perception in Autonomous Driving: General Black-box
YT 11 minutes 52 seconds
USENIX
USENIX Security '20 - SAVIOR: Securing Autonomous Vehicles with Robust Physical Invariants
YT 12 minutes 13 seconds
USENIX
USENIX Security '20 - From Control Model to Program: Investigating Robotic Aerial Vehicle Accidents
YT 11 minutes 41 seconds
USENIX
USENIX Security '20 - Drift with Devil: Security of Multi-Sensor Fusion based Localization...
YT 11 minutes 53 seconds
USENIX
USENIX Security '20 - Plug-N-Pwned: Comprehensive Vulnerability Analysis of OBD-II Dongles...
YT 12 minutes 32 seconds
USENIX
USENIX Security '20 - PCKV: Locally Differentially Private Correlated Key-Value Data Collection
YT 12 minutes 8 seconds
USENIX
USENIX Security '20 - Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow
YT 11 minutes 45 seconds
USENIX
USENIX Security '20 - Walking Onions: Scaling Anonymity Networks while Protecting Users
YT 12 minutes 10 seconds
USENIX
USENIX Security '20 - Differentially-Private Control-Flow Node Coverage for Software Usage Analysis
YT 12 minutes 17 seconds
USENIX
USENIX Security '20 - Visor: Privacy-Preserving Video Analytics as a Cloud Service
YT 12 minutes 13 seconds
USENIX
USENIX Security '20 - DELF: Safeguarding deletion correctness in Online Social Networks
YT 12 minutes 17 seconds
USENIX
USENIX Security '20 - Datalog Disassembly
YT 11 minutes 42 seconds
USENIX
USENIX Security '20 - KOOBE: Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write
YT 13 minutes 3 seconds
USENIX
USENIX Security '20 - Automatic Techniques to Systematically Discover New Heap Exploitation
YT 12 minutes 17 seconds
USENIX
USENIX Security '20 - The Industrial Age of Hacking
YT 9 minutes 34 seconds
USENIX
USENIX Security '20 - BScout: Direct Whole Patch Presence Test for Java Executables
YT 11 minutes 36 seconds
USENIX
USENIX Security '20 - MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures
YT 12 minutes 9 seconds
USENIX
USENIX Security '20 - Shattered Chain of Trust: Understanding Security Risks in Cross-Cloud IoT
YT 12 minutes 12 seconds
USENIX
USENIX Security '20 - HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation
YT 11 minutes 25 seconds
USENIX
USENIX Security '20 - Silhouette: Efficient Protected Shadow Stacks for Embedded Systems
YT 10 minutes 43 seconds
USENIX
USENIX Security '20 - P2IM: Scalable and Hardware-independent Firmware Testing via Automatic
YT 11 minutes 16 seconds
USENIX
USENIX Security '20 - COUNTERFOIL: Verifying Provenance of Integrated Circuits using Intrinsic
YT 12 minutes 7 seconds
USENIX
USENIX Security '20 - Hall Spoofing: A Non-Invasive DoS Attack on Grid-Tied Solar Inverter
YT 13 minutes 6 seconds
USENIX
USENIX Security '20 - Updates-Leak: Data Set Inference and Reconstruction Attacks in Online Learning
YT 10 minutes 28 seconds
USENIX
USENIX Security '20 - Exploring Connections Between Active Learning and Model Extraction
YT 11 minutes 38 seconds
USENIX
USENIX Security '20 - Hybrid Batch Attacks: Finding Black-box Adversarial Examples with Limited
YT 10 minutes 58 seconds
USENIX
USENIX Security '20 - High Accuracy and High Fidelity Extraction of Neural Networks
YT 11 minutes 15 seconds
USENIX
USENIX Security '20 - Adversarial Preprocessing: Understanding and Preventing Image-Scaling Attacks
YT 11 minutes 32 seconds
USENIX
USENIX Security '20 - TextShield: Robust Text Classification Based on Multimodal Embedding
YT 13 minutes 29 seconds
USENIX
USENIX Security '20 - Data Recovery from “Scrubbed” NAND Flash Storage: Need for Analog Sanitization
YT 11 minutes 9 seconds
USENIX
USENIX Security '20 - PKU Pitfalls: Attacks on PKU-based Memory Isolation Systems
YT 12 minutes 17 seconds
USENIX
USENIX Security '20 - Medusa: Microarchitectural Data Leakage via Automated Attack Synthesis
YT 10 minutes 31 seconds
USENIX
USENIX Security '20 - V0LTpwn: Attacking x86 Processor Integrity from Software
YT 12 minutes 50 seconds
USENIX
USENIX Security '20 - DeepHammer: Depleting the Intelligence of Deep Neural Networks through Target
YT 10 minutes 43 seconds
USENIX
USENIX Security '20 - SpecFuzz: Bringing Spectre-type vulnerabilities to the surface
YT 1 hour 4 minutes 16 seconds
USENIX
USENIX Security '20 - Panel: Digital Contact Tracing
YT 13 minutes 48 seconds
USENIX
USENIX Security '20 - Security Analysis of Unified Payments Interface and Payment Apps in India
YT 11 minutes 51 seconds
USENIX
USENIX Security '20 - Cardpliance: PCI DSS Compliance of Android Applications
YT 12 minutes 46 seconds
USENIX
USENIX Security '20 - The Ballot is Busted Before the Blockchain: A Security Analysis of Voatz
YT 12 minutes 29 seconds
USENIX
USENIX Security '20 - VoteAgain: A scalable coercion-resistant voting system
YT 10 minutes 42 seconds
USENIX
USENIX Security '20 - Boxer: Preventing fraud by scanning credit cards
YT 12 minutes 4 seconds
USENIX
USENIX Security '20 - Fawkes: Protecting Privacy against Unauthorized Deep Learning Models
YT 12 minutes 7 seconds
USENIX
USENIX Security '20 - Stolen Memories: Leveraging Model Memorization for Calibrated White-Box
YT 12 minutes 8 seconds
USENIX
USENIX Security '20 - Local Model Poisoning Attacks to Byzantine-Robust Federated Learning
YT 11 minutes 9 seconds
USENIX
USENIX Security '20 - Justinian's GAAvernor: Robust Distributed Learning with Gradient Aggregation
YT 11 minutes 35 seconds
USENIX
USENIX Security '20 - Interpretable Deep Learning under Fire
YT 11 minutes 53 seconds
USENIX
USENIX Security '20 - Donky: Domain Keys – Efficient In-Process Isolation for RISC-V and x86
YT 12 minutes 7 seconds
USENIX
USENIX Security '20 - (Mostly) Exitless VM Protection from Untrusted Hypervisor through Disaggregate
YT 12 minutes 33 seconds
USENIX
USENIX Security '20 - DECAF: Automatic, Adaptive De-bloating and Hardening of COTS Firmware
YT 12 minutes 11 seconds
USENIX
USENIX Security '20 - McTiny: Fast High-Confidence Post-Quantum Key Erasure for Tiny Network Servers
YT 11 minutes 56 seconds
USENIX
USENIX Security '20 - Temporal System Call Specialization for Attack Surface Reduction
YT 12 minutes 24 seconds
USENIX
USENIX Security '20 - Big Numbers - Big Troubles: Systematically Analyzing Nonce Leakage in (EC)DSA
YT 10 minutes 58 seconds
USENIX
USENIX Security '20 - Estonian Electronic Identity Card: Security Flaws in Key Management
YT 11 minutes 53 seconds
USENIX
USENIX Security '20 - The Unpatchable Silicon: A Full Break of the Bitstream Encryption of Xilinx
YT 12 minutes 17 seconds
USENIX
USENIX Security '20 - Automating the Development of Chosen Ciphertext Attacks
YT 12 minutes 43 seconds
USENIX
USENIX Security '20 - SHA-1 is a Shambles: First Chosen-Prefix Collision on SHA-1 and Application
YT 11 minutes 10 seconds
USENIX
USENIX Security '20 - A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis
YT 12 minutes 11 seconds
USENIX
USENIX Security '20 - An Observational Investigation of Reverse Engineers’ Processes
YT 13 minutes 30 seconds
USENIX
USENIX Security '20 - The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis
YT 12 minutes 19 seconds
USENIX
USENIX Security '20 - DatashareNetwork: A Decentralized Privacy-Preserving Search Engine
YT 11 minutes 54 seconds
USENIX
USENIX Security '20 - ""I am uncomfortable sharing what I can't see"": Privacy Concerns
YT 11 minutes 3 seconds
USENIX
USENIX Security '20 - 'I have too much respect for my elders': Understanding South African Mobile
YT 10 minutes 4 seconds
USENIX
USENIX Security '20 - RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache
YT 11 minutes 49 seconds
USENIX
USENIX Security '20 - Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote
YT 12 minutes 40 seconds
USENIX
USENIX Security '20 - Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures
YT 11 minutes 3 seconds
USENIX
USENIX Security '20 - Certified Side Channels
YT 12 minutes 35 seconds
USENIX
USENIX Security ’20 - NetWarden: Mitigating Network Covert Channels while Preserving Performance
YT 12 minutes 15 seconds
USENIX
USENIX Security '20 - TPM-FAIL: TPM meets Timing and Lattice Attacks
YT 12 minutes 4 seconds
USENIX
USENIX Security '20 - Scaling Verifiable Computation Using Efficient Set Accumulators
YT 10 minutes 54 seconds
USENIX
USENIX Security '20 - Pixel: Multi-signatures for Consensus
YT 12 minutes 44 seconds
USENIX
USENIX Security '20 - SANNS: Scaling Up Secure Approximate k-Nearest Neighbors Search
YT 12 minutes 35 seconds
USENIX
USENIX Security '20 - MIRAGE: Succinct Arguments for Randomized Algorithms with Applications
YT 12 minutes 21 seconds
USENIX
USENIX Security '20 - Secure Multi-party Computation of Differentially Private Median
YT 10 minutes 28 seconds
USENIX
USENIX Security '20 - That Was Then, This Is Now: A Security Evaluation of Password Generation
YT 12 minutes 57 seconds
USENIX
USENIX Security '20 - Composition Kills: A Case Study of Email Sender Authentication
YT 12 minutes 13 seconds
USENIX
USENIX Security '20 - Detecting Stuffing of a User’s Credentials at Her Own Accounts
YT 11 minutes 22 seconds
USENIX
USENIX Security '20 - Liveness is Not Enough: Enhancing Fingerprint Authentication with Behavioral
YT 12 minutes 17 seconds
USENIX
USENIX Security '20 - Human Distinguishable Visual Key Fingerprints
YT 10 minutes 18 seconds
USENIX
USENIX Security '20 - FuzzGuard: Filtering out Unreachable Inputs in Directed Grey-box Fuzzing
YT 11 minutes 54 seconds
USENIX
USENIX Security '20 - FuzzGen: Automatic Fuzzer Generation
YT 12 minutes 4 seconds
USENIX
USENIX Security '20 - ParmeSan: Sanitizer-guided Greybox Fuzzing
YT 12 minutes 5 seconds
USENIX
USENIX Security '20 - EcoFuzz: Adaptive Energy-Saving Greybox Fuzzing as a Variant
YT 10 minutes 59 seconds
USENIX
USENIX Security '20 - MUZZ: Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded
YT 12 minutes 21 seconds
USENIX
USENIX Security '20 - On Training Robust PDF Malware Classifiers
YT 12 minutes 18 seconds
USENIX
USENIX Security '20 - Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines
YT 12 minutes 51 seconds
USENIX
USENIX Security '20 - FIRMSCOPE: Automatic Uncovering of Privilege-Escalation Vulnerabilities
YT 12 minutes 16 seconds
USENIX
USENIX Security '20 - Automatic Hot Patch Generation for Android Kernels
YT 11 minutes 20 seconds
USENIX
USENIX Security '20 - iOS, Your OS, Everybody's OS: Vetting and Analyzing Network Services of iOS
YT 12 minutes 7 seconds
USENIX
USENIX Security '20 - SEAL: Attack Mitigation for Encrypted Databases via Adjustable Leakage
YT 12 minutes 20 seconds
USENIX
USENIX Security '20 - Pancake: Frequency Smoothing for Encrypted Data Stores
YT 11 minutes 32 seconds
USENIX
USENIX Security '20 - Droplet: Decentralized Authorization and Access Control for Encrypted Data
YT 11 minutes 34 seconds
USENIX
USENIX Security '20 - Secure parallel computation on national scale volumes of data
YT 12 minutes 18 seconds
USENIX
USENIX Security '20 - Delphi: A Cryptographic Inference Service for Neural Networks
YT 11 minutes 22 seconds
USENIX
USENIX Security '20 - Analysis of DTLS Implementations Using Protocol State Fuzzing
YT 12 minutes 17 seconds
USENIX
USENIX Security '20 - Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine
YT 11 minutes 23 seconds
USENIX
USENIX Security '20 - USBFuzz: A Framework for Fuzzing USB Drivers by Device Emulation
YT 11 minutes 58 seconds
USENIX
USENIX Security '20 - GREYONE: Data Flow Sensitive Fuzzing
YT 10 minutes 37 seconds
USENIX
USENIX Security '20 - Fuzzing Error Handling Code using Context-Sensitive Software Fault Injection
YT 12 minutes 14 seconds
USENIX
USENIX Security '20 - Montage: A Neural Network Language Model-Guided JavaScript Engine Fuzzer
YT 12 minutes 15 seconds
USENIX
USENIX Security '20 - Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable
YT 11 minutes 51 seconds
USENIX
USENIX Security '20 - SkillExplorer: Understanding the Behavior of Skills in Large Scale
YT 12 minutes 44 seconds
USENIX
USENIX Security '20 - Devil’s Whisper: A General Approach for Physical Adversarial Attacks
YT 12 minutes 59 seconds
USENIX
USENIX Security '20 - Void: A fast and light voice liveness detection system
YT 12 minutes 2 seconds
USENIX
USENIX Security '20 - Preech: A System for Privacy-Preserving Speech Transcription
YT 10 minutes 11 seconds
USENIX
USENIX Security '20 - BlockSci: Design and applications of a blockchain analysis platform
YT 11 minutes 51 seconds
USENIX
USENIX Security '20 - Remote Side-Channel Attacks on Anonymous Transactions
YT 12 minutes 12 seconds
USENIX
USENIX Security '20 - ETHBMC: A Bounded Model Checker for Smart Contracts
YT 10 minutes 19 seconds
USENIX
USENIX Security '20 - TXSPECTOR: Uncovering Attacks in Ethereum from Transactions
YT 10 minutes 19 seconds
USENIX
USENIX Security '20 - An Ever-evolving Game: Evaluation of Real-world Attacks and Defenses