_    ___ ___      _                               
/ \ |_ _/ _ \ ___| |_ _ __ ___ __ _ _ __ ___ ___
/ _ \ | | | | / __| __| '__/ _ \/ _` | '_ ` _ \/ __|
/ ___ \ | | |_| \__ \ |_| | | __/ (_| | | | | | \__ \
/_/ \_\___\___/|___/\__|_| \___|\__,_|_| |_| |_|___/
Twitch
Invidious (YT)

Invidious > Channel > USENIX

Trending
USENIX 37400 subscribers    RSS
View channel on YouTube
Videos
Playlists

YT 13 minutes 57 seconds
USENIX
USENIX Security '23 - PhyAuth: Physical-Layer Message Authentication for ZigBee Networks
YT 12 minutes 40 seconds
USENIX
USENIX Security '23 - Time for Change: How Clocks Break UWB Secure Ranging
YT 12 minutes 34 seconds
USENIX
USENIX Security '23 - Formal Analysis and Patching of BLE-SC Pairing
YT 13 minutes 55 seconds
USENIX
USENIX Security '23 - Framing Frames: Bypassing Wi-Fi Encryption by Manipulating Transmit Queues
YT 11 minutes 28 seconds
USENIX
USENIX Security '23 - Abuse Vectors: A Framework for Conceptualizing IoT-Enabled Interpersonal Abuse
YT 12 minutes 45 seconds
USENIX
USENIX Security '23 - The Digital-Safety Risks of Financial Technologies for Survivors of...
YT 12 minutes 13 seconds
USENIX
USENIX Security '23 - "It's the Equivalent of Feeling Like You're in Jail”: Lessons from Firsthand..
YT 12 minutes 55 seconds
USENIX
USENIX Security '23 - Sneaky Spy Devices and Defective Detectors: The Ecosystem of Intimate...
YT 9 minutes 57 seconds
USENIX
USENIX Security '23 - Towards a General Video-based Keystroke Inference Attack
YT 11 minutes 17 seconds
USENIX
USENIX Security '23 - Going through the motions: AR/VR keylogging from user head motions
YT 12 minutes 44 seconds
USENIX
USENIX Security '23 - Auditory Eyesight: Demystifying μs-Precision Keystroke Tracking Attacks on...
YT 11 minutes 2 seconds
USENIX
USENIX Security '23 - Watch your Watch: Inferring Personality Traits from Wearable Activity Trackers
YT 15 minutes 22 seconds
USENIX
USENIX Security '23 - Squint Hard Enough: Attacking Perceptual Hashing with Adversarial Machine...
YT 12 minutes 13 seconds
USENIX
USENIX Security '23 - How to Cover up Anomalous Accesses to Electronic Health Records
YT 13 minutes 45 seconds
USENIX
USENIX Security '23 - KENKU: Towards Efficient and Stealthy Black-box Adversarial Attacks against...
YT 10 minutes 47 seconds
USENIX
USENIX Security '23 - Tubes Among Us: Analog Attack on Automatic Speaker Identification
YT 12 minutes 5 seconds
USENIX
USENIX Security '23 - Efficient Unbalanced Private Set Intersection Cardinality and User-friendly...
YT 11 minutes 17 seconds
USENIX
USENIX Security '23 - Near-Optimal Oblivious Key-Value Stores for Efficient PSI, PSU and Volume...
YT 12 minutes 49 seconds
USENIX
USENIX Security '23 - Distance-Aware Private Set Intersection
YT 11 minutes 47 seconds
USENIX
USENIX Security '23 - Linear Private Set Union from Multi-Query Reverse Private Membership Test
YT 10 minutes 41 seconds
USENIX
USENIX Security '23 - Auditing Frameworks Need Resource Isolation: A Systematic Study on the...
YT 9 minutes 30 seconds
USENIX
USENIX Security '23 - AIRTAG: Towards Automated Attack Investigation by Unsupervised Learning...
YT 10 minutes 33 seconds
USENIX
USENIX Security '23 - Rethinking System Audit Architectures for High Event Coverage and...
YT 14 minutes 20 seconds
USENIX
USENIX Security '23 - Improving Logging to Reduce Permission Over-Granting Mistakes
YT 14 minutes 7 seconds
USENIX
USENIX Security '23 - Diving into Robocall Content with SnorCall
YT 12 minutes 12 seconds
USENIX
USENIX Security '23 - UCBlocker: Unwanted Call Blocking Using Anonymous Authentication
YT 14 minutes 7 seconds
USENIX
USENIX Security '23 - Combating Robocalls with Phone Virtual Assistant Mediated Interaction
YT 8 minutes 28 seconds
USENIX
USENIX Security '23 - BotScreen: Trust Everybody, but Cut the Aimbots Yourself
YT 11 minutes 40 seconds
USENIX
USENIX Security '23 - "If I could do this, I feel anyone could:" The Design and Evaluation...
YT 11 minutes 21 seconds
USENIX
USENIX Security '23 - Exploring Privacy and Incentives Considerations in Adoption of COVID-19...
YT 11 minutes 57 seconds
USENIX
USENIX Security '23 - Exploring Tenants' Preferences of Privacy Negotiation in Airbnb
YT 12 minutes 3 seconds
USENIX
USENIX Security '23 - Know Your Cybercriminal: Evaluating Attacker Preferences by Measuring...
YT 11 minutes 48 seconds
USENIX
USENIX Security '23 - HorusEye: A Realtime IoT Malicious Traffic Detection Framework using...
YT 12 minutes 15 seconds
USENIX
USENIX Security '23 - An Input-Agnostic Hierarchical Deep Learning Framework for Traffic...
YT 11 minutes 55 seconds
USENIX
USENIX Security '23 - Subverting Website Fingerprinting Defenses with Robust Traffic Representation
YT 11 minutes 57 seconds
USENIX
USENIX Security '23 - Rosetta: Enabling Robust TLS Encrypted Traffic Classification in Diverse...
YT 10 minutes 29 seconds
USENIX
USENIX Security '23 - Towards Targeted Obfuscation of Adversarial Unsafe Images using...
YT 11 minutes 36 seconds
USENIX
USENIX Security '23 - TPatch: A Triggered Physical Adversarial Patch
YT 12 minutes 7 seconds
USENIX
USENIX Security '23 - CAPatch: Physical Adversarial Patch against Image Captioning Systems
YT 12 minutes 50 seconds
USENIX
USENIX Security '23 - Hard-label Black-box Universal Adversarial Patch Attack
YT 13 minutes 11 seconds
USENIX
USENIX Security '23 - Anatomy of a High-Profile Data Breach: Dissecting the Aftermath of a Crypto...
YT 11 minutes 36 seconds
USENIX
USENIX Security '23 - Glimpse: On-Demand PoW Light Client with Constant-Size Storage for DeFi
YT 12 minutes 20 seconds
USENIX
USENIX Security '23 - Mixed Signals: Analyzing Ground-Truth Data on the Users and Economics...
YT 11 minutes 20 seconds
USENIX
USENIX Security '23 - Is Your Wallet Snitching On You? An Analysis on the Privacy Implications...
YT 12 minutes 41 seconds
USENIX
USENIX Security '23 - Capstone: A Capability-based Foundation for Trustless Secure Memory Access
YT 10 minutes 10 seconds
USENIX
USENIX Security '23 - FloatZone: Accelerating Memory Error Detection using the Floating Point Unit
YT 9 minutes 20 seconds
USENIX
USENIX Security '23 - PUMM: Preventing Use-After-Free Using Execution Unit Partitioning
YT 14 minutes 13 seconds
USENIX
USENIX Security '23 - MTSan: A Feasible and Practical Memory Sanitizer for Fuzzing COTS Binaries
YT 12 minutes 54 seconds
USENIX
USENIX Security '23 - Hidden Reality: Caution, Your Hand Gesture Inputs in the Immersive Virtual...
YT 13 minutes 38 seconds
USENIX
USENIX Security '23 - LocIn: Inferring Semantic Location from Spatial Maps in Mixed Reality
YT 9 minutes 29 seconds
USENIX
USENIX Security '23 - Unique Identification of 50,000+ Virtual Reality Users from Head & Hand...
YT 10 minutes 27 seconds
USENIX
USENIX Security '23 - Exploring User Reactions and Mental Models Towards Perceptual Manipulation...
YT 12 minutes 53 seconds
USENIX
USENIX Security '23 - Erebus: Access Control for Augmented Reality Systems
YT 11 minutes 42 seconds
USENIX
USENIX Security '23 - No Single Silver Bullet: Measuring the Accuracy of Password Strength Meters
YT 10 minutes 59 seconds
USENIX
USENIX Security '23 - Password Guessing Using Random Forest
YT 11 minutes 19 seconds
USENIX
USENIX Security '23 - Pass2Edit: A Multi-Step Generative Model for Guessing Edited Passwords
YT 11 minutes 15 seconds
USENIX
USENIX Security '23 - Improving Real-world Password Guessing Attacks via Bi-directional Transformers
YT 12 minutes 50 seconds
USENIX
USENIX Security '23 - Araña: Discovering and Characterizing Password Guessing Attacks in Practice
YT 12 minutes 31 seconds
USENIX
USENIX Security '23 - PoliGraph: Automated Privacy Policy Analysis using Knowledge Graphs
YT 15 minutes 9 seconds
USENIX
USENIX Security '23 - Calpric: Inclusive and Fine-grain Labeling of Privacy Policies with...
YT 12 minutes 24 seconds
USENIX
USENIX Security '23 - POLICYCOMP: Counterpart Comparison of Privacy Policies Uncovers...
YT 11 minutes 33 seconds
USENIX
USENIX Security '23 - Lalaine: Measuring and Characterizing Non-Compliance of Apple Privacy Labels
YT 11 minutes 44 seconds
USENIX
USENIX Security '23 - Automated Cookie Notice Analysis and Enforcement
YT 14 minutes 13 seconds
USENIX
USENIX Security '23 - Continuous Learning for Android Malware Detection
YT 15 minutes 26 seconds
USENIX
USENIX Security '23 - Humans vs. Machines in Malware Classification
YT 12 minutes 29 seconds
USENIX
USENIX Security '23 - Adversarial Training for Raw-Binary Malware Classifiers
YT 11 minutes 16 seconds
USENIX
USENIX Security '23 - Black-box Adversarial Example Attack towards FCG Based Android Malware...
YT 13 minutes 59 seconds
USENIX
USENIX Security '23 - Evading Provenance-Based ML Detectors with Adversarial System Action
YT 13 minutes
USENIX
USENIX Security '23 - TreeSync: Authenticated Group Management for Messaging Layer Security
YT 11 minutes 28 seconds
USENIX
USENIX Security '23 - Formal Analysis of Session-Handling in Secure Messaging: Lifting Security...
YT 10 minutes 59 seconds
USENIX
USENIX Security '23 - Cryptographic Administration for Secure Group Messaging
YT 13 minutes 21 seconds
USENIX
USENIX Security '23 - Wink: Deniable Secure Messaging
YT 13 minutes 30 seconds
USENIX
USENIX Security '23 - Three Lessons From Threema: Analysis of a Secure Messenger
YT 10 minutes 1 second
USENIX
USENIX Security '23 - MorFuzz: Fuzzing Processor via Runtime Instruction Morphing enhanced...
YT 11 minutes 11 seconds
USENIX
USENIX Security '23 - µFUZZ: Redesign of Parallel Fuzzing using Microservice Architecture
YT 10 minutes 59 seconds
USENIX
USENIX Security '23 - FISHFUZZ: Catch Deeper Bugs by Throwing Larger Nets
YT 12 minutes 11 seconds
USENIX
USENIX Security '23 - HyPFuzz: Formal-Assisted Processor Fuzzing
YT 11 minutes 14 seconds
USENIX
USENIX Security '23 - PolyFuzz: Holistic Greybox Fuzzing of Multi-Language Systems
YT 11 minutes 11 seconds
USENIX
USENIX Security '23 - VIPER: Spotting Syscall-Guard Variables for Data-Only Attacks
YT 10 minutes 51 seconds
USENIX
USENIX Security '23 - AURC: Detecting Errors in Program Code and Documentation
YT 12 minutes 4 seconds
USENIX
USENIX Security '23 - Not All Data are Created Equal: Data and Pointer Prioritization for Scalable..
YT 11 minutes 8 seconds
USENIX
USENIX Security '23 - SAFER: Efficient and Error-Tolerant Binary Instrumentation
YT 12 minutes 43 seconds
USENIX
USENIX Security '23 - Reassembly is Hard: A Reflection on Challenges and Strategies
YT 10 minutes 39 seconds
USENIX
USENIX Security '23 - Measuring Up to (Reasonable) Consumer Expectations: Providing an Empirical...
YT 13 minutes 50 seconds
USENIX
USENIX Security '23 - Are Consumers Willing to Pay for Security and Privacy of IoT Devices?
YT 12 minutes 38 seconds
USENIX
USENIX Security '23 - Examining Consumer Reviews to Understand Security and Privacy Issues in the...
YT 10 minutes 25 seconds
USENIX
USENIX Security '23 - Internet Service Providers' and Individuals' Attitudes, Barriers, and...
YT 17 minutes 53 seconds
USENIX
USENIX Security '23 - Detecting and Handling IoT Interaction Threats in Multi-Platform Multi...
YT 13 minutes 8 seconds
USENIX
USENIX Security '23 - Private Proof-of-Stake Blockchains using Differentially-Private Stake...
YT 13 minutes 13 seconds
USENIX
USENIX Security '23 - PrivateFL: Accurate, Differentially Private Federated Learning via...
YT 12 minutes 31 seconds
USENIX
USENIX Security '23 - What Are the Chances? Explaining the Epsilon Parameter in Differential Privacy
YT 13 minutes 13 seconds
USENIX
USENIX Security '23 - Tight Auditing of Differentially Private Machine Learning
YT 10 minutes 35 seconds
USENIX
USENIX Security '23 - PrivTrace: Differentially Private Trajectory Synthesis by Adaptive Markov...
YT 10 minutes 52 seconds
USENIX
USENIX Security '23 - Meta-Sift: How to Sift Out a Clean Subset in the Presence of Data Poisoning?
YT 15 minutes 3 seconds
USENIX
USENIX Security '23 - Towards A Proactive ML Approach for Detecting Backdoor Poison Samples
YT 13 minutes 15 seconds
USENIX
USENIX Security '23 - PORE: Provably Robust Recommender Systems against Data Poisoning Attacks
YT 12 minutes 6 seconds
USENIX
USENIX Security '23 - Every Vote Counts: Ranking-Based Training of Federated Learning to Resist...
YT 19 minutes 30 seconds
USENIX
USENIX Security '23 - Fine-grained Poisoning Attack to Local Differential Privacy Protocols for...
YT 12 minutes 37 seconds
USENIX
USENIX Security '23 - Your Exploit is Mine: Instantly Synthesizing Counterattack Smart Contract
YT 14 minutes
USENIX
USENIX Security '23 - Smart Learning to Find Dumb Contracts
YT 10 minutes 52 seconds
USENIX
USENIX Security '23 - Confusum Contractum: Confused Deputy Vulnerabilities in Ethereum Smart...
YT 11 minutes 12 seconds
USENIX
USENIX Security '23 - Panda: Security Analysis of Algorand Smart Contracts
YT 13 minutes 25 seconds
USENIX
USENIX Security '23 - Proxy Hunting: Understanding and Characterizing Proxy-based Upgradeable...
YT 11 minutes 15 seconds
USENIX
USENIX Security '23 - Fuzztruction: Using Fault Injection-based Fuzzing to Leverage Implicit...
YT 11 minutes 53 seconds
USENIX
USENIX Security '23 - FuzzJIT: Oracle-Enhanced Fuzzing for JavaScript Engine JIT Compiler
YT 11 minutes 8 seconds
USENIX
USENIX Security '23 - GLeeFuzz: Fuzzing WebGL Through Error Message Guided Mutation
YT 10 minutes 57 seconds
USENIX
USENIX Security '23 - autofz: Automated Fuzzer Composition at Runtime
YT 10 minutes 17 seconds
USENIX
USENIX Security '23 - CarpetFuzz: Automatic Program Option Constraint Extraction from...
YT 11 minutes 33 seconds
USENIX
USENIX Security '23 - SCARF – A Low-Latency Block Cipher for Secure Cache-Randomization
YT 13 minutes 7 seconds
USENIX
USENIX Security '23 - The Gates of Time: Improving Cache Attacks with Transient Execution
YT 12 minutes 18 seconds
USENIX
USENIX Security '23 - Synchronization Storage Channels (S2C): Timer-less Cache Side-Channel...
YT 12 minutes 26 seconds
USENIX
USENIX Security '23 - ClepsydraCache -- Preventing Cache Attacks with Time-Based Evictions
YT 12 minutes 45 seconds
USENIX
USENIX Security '23 - CacheQL: Quantifying and Localizing Cache Side-Channel Vulnerabilities in...
YT 12 minutes 58 seconds
USENIX
USENIX Security '23 - InfinityGauntlet: Expose Smartphone Fingerprint Authentication to...
YT 11 minutes 36 seconds
USENIX
USENIX Security '23 - A Study of Multi-Factor and Risk-Based Authentication Availability
YT 13 minutes 44 seconds
USENIX
USENIX Security '23 - A Large-Scale Measurement of Website Login Policies
YT 14 minutes 42 seconds
USENIX
USENIX Security '23 - Security and Privacy Failures in Popular 2FA Apps
YT 10 minutes 42 seconds
USENIX
USENIX Security '23 - Multi-Factor Key Derivation Function (MFKDF) for Fast, Flexible, Secure, &...
YT 14 minutes 20 seconds
USENIX
USENIX Security '23 - Log: It’s Big, It’s Heavy, It’s Filled with Personal Data! Measuring the...
YT 11 minutes 47 seconds
USENIX
USENIX Security '23 - CodexLeaks: Privacy Leaks from Code Generation Language Models in GitHub...
YT 12 minutes 54 seconds
USENIX
USENIX Security '23 - Freaky Leaky SMS: Extracting User Locations by Analyzing SMS Timings
YT 10 minutes 39 seconds
USENIX
USENIX Security '23 - The Writing on the Wall and 3D Digital Twins: Personal Information in..
YT 11 minutes 48 seconds
USENIX
USENIX Security '23 - Glaze: Protecting Artists from Style Mimicry by Text-to-Image Models
YT 12 minutes 22 seconds
USENIX
USENIX Security '23 - Lost at C: A User Study on the Security Implications of Large Language Model..
YT 13 minutes 16 seconds
USENIX
USENIX Security '23 - Two-in-One: A Model Hijacking Attack Against Text Generation Models
YT 10 minutes 38 seconds
USENIX
USENIX Security '23 - PTW: Pivotal Tuning Watermarking for Pre-Trained Image Generators
YT 13 minutes 7 seconds
USENIX
USENIX Security '23 - Lessons Lost: Incident Response in the Age of Cyber Insurance and Breach...
YT 12 minutes 15 seconds
USENIX
USENIX Security '23 - Bug Hunters’ Perspectives on the Challenges and Benefits of the Bug Bounty...
YT 12 minutes 5 seconds
USENIX
USENIX Security '23 - Work-From-Home and COVID-19: Trajectories of Endpoint Security Management...
YT 11 minutes 19 seconds
USENIX
USENIX Security '23 - “Employees Who Don’t Accept the Time Security Takes Are Not Aware Enough”:...
YT 11 minutes 14 seconds
USENIX
USENIX Security '23 - Aegis: Mitigating Targeted Bit-flip Attacks against Deep Neural Networks
YT 10 minutes 17 seconds
USENIX
USENIX Security '23 - Rethinking White-Box Watermarks on Deep Learning Models under Neural...
YT 11 minutes 57 seconds
USENIX
USENIX Security '23 - PELICAN: Exploiting Backdoors of Naturally Trained Deep Learning Models In...
YT 9 minutes
USENIX
USENIX Security '23 - IvySyn: Automated Vulnerability Discovery in Deep Learning Frameworks
YT 10 minutes 21 seconds
USENIX
USENIX Security '23 - Hey Kimya, Is My Smart Speaker Spying on Me? Taking Control of Sensor...
YT 11 minutes 58 seconds
USENIX
USENIX Security '23 - Spying through Your Voice Assistants: Realistic Voice Command Fingerprinting
YT 10 minutes 18 seconds
USENIX
USENIX Security '23 - QFA2SR: Query-Free Adversarial Transfer Attacks to Speaker Recognition Systems
YT 11 minutes 38 seconds
USENIX
USENIX Security '23 - Learning Normality is Enough: A Software-based Mitigation against Inaudible...
YT 11 minutes 16 seconds
USENIX
USENIX Security '23 - Powering for Privacy: Improving User Trust in Smart Speaker Microphones with..
YT 11 minutes 27 seconds
USENIX
USENIX Security '23 - To Cloud or not to Cloud: A Qualitative Study on Self-Hosters' Motivation...
YT 11 minutes 31 seconds
USENIX
USENIX Security '23 - “I wouldn't want my unsafe code to run my pacemaker”: An Interview Study on...
YT 12 minutes 59 seconds
USENIX
USENIX Security '23 - Pushed by Accident: A Mixed-Methods Study on Strategies of Handling Secret...
YT 13 minutes 16 seconds
USENIX
USENIX Security '23 - A Mixed-Methods Study of Security Practices of Smart Contract Developers
YT 12 minutes 45 seconds
USENIX
USENIX Security '23 - The Role of Professional Product Reviewers in Evaluating Security and Privacy
YT 12 minutes 8 seconds
USENIX
USENIX Security '23 - Network Responses to Russia's Invasion of Ukraine in 2022: A Cautionary Tale..
YT 12 minutes 28 seconds
USENIX
USENIX Security '23 - A Study of China's Censorship and Its Evasion Through the Lens of Online...
YT 12 minutes 29 seconds
USENIX
USENIX Security '23 - DeResistor: Toward Detection-Resistant Probing for Evasion of Internet...
YT 12 minutes 4 seconds
USENIX
USENIX Security '23 - Timeless Timing Attacks and Preload Defenses in Tor's DNS Cache
YT 12 minutes 18 seconds
USENIX
USENIX Security '23 - How the Great Firewall of China Detects and Blocks Fully Encrypted Traffic
YT 12 minutes 32 seconds
USENIX
USENIX Security '23 - A Data-free Backdoor Injection Approach in Neural Networks
YT 13 minutes 32 seconds
USENIX
USENIX Security '23 - Sparsity Brings Vulnerabilities: Exploring New Metrics in Backdoor Attacks
YT 12 minutes 47 seconds
USENIX
USENIX Security '23 - Aliasing Backdoor Attacks on Pre-trained Models
YT 13 minutes 45 seconds
USENIX
USENIX Security '23 - ASSET: Robust Backdoor Data Detection Across a Multiplicity of Deep Learning..
YT 9 minutes 4 seconds
USENIX
USENIX Security '23 - VILLAIN: Backdoor Attacks Against Vertical Split Learning
YT 11 minutes 58 seconds
USENIX
USENIX Security '23 - ARI: Attestation of Real-time Mission Execution Integrity
YT 10 minutes 51 seconds
USENIX
USENIX Security '23 - Design of Access Control Mechanisms in Systems-on-Chip with Formal...
YT 14 minutes 32 seconds
USENIX
USENIX Security '23 - HashTag: Hash-based Integrity Protection for Tagged Architectures
YT 8 minutes 21 seconds
USENIX
USENIX Security '23 - XCheck: Verifying Integrity of 3D Printed Patient-Specific Devices via...
YT 12 minutes 54 seconds
USENIX
USENIX Security '23 - Demystifying Pointer Authentication on Apple M1
YT 12 minutes 37 seconds
USENIX
USENIX Security '23 - DDRace: Finding Concurrency UAF Vulnerabilities in Linux Drivers with...
YT 12 minutes 51 seconds
USENIX
USENIX Security '23 - Automata-Guided Control-Flow-Sensitive Fuzz Driver Generation
YT 12 minutes 45 seconds
USENIX
USENIX Security '23 - Hoedur: Embedded Firmware Fuzzing using Multi-Stream Inputs
YT 13 minutes 13 seconds
USENIX
USENIX Security '23 - Forming Faster Firmware Fuzzers
YT 13 minutes 46 seconds
USENIX
USENIX Security '23 - ReUSB: Replay-Guided USB Driver Fuzzing
YT 11 minutes 47 seconds
USENIX
USENIX Security '23 - Exorcising "Wraith": Protecting LiDAR-based Object Detector in Automated...
YT 12 minutes 1 second
USENIX
USENIX Security '23 - Discovering Adversarial Driving Maneuvers against Autonomous Vehicles
YT 12 minutes 18 seconds
USENIX
USENIX Security '23 - Understand Users' Privacy Perception and Decision of V2X Communication in...
YT 14 minutes 8 seconds
USENIX
USENIX Security '23 - You Can't See Me: Physical Removal Attacks on LiDAR-based Autonomous...
YT 13 minutes 25 seconds
USENIX
USENIX Security '23 - PatchVerif: Discovering Faulty Patches in Robotic Vehicles
YT 14 minutes 9 seconds
USENIX
USENIX Security '23 - Fast IDentity Online with Anonymous Credentials (FIDO-AC)
YT 11 minutes 30 seconds
USENIX
USENIX Security '23 - How to Bind Anonymous Credentials to Humans
YT 16 minutes 43 seconds
USENIX
USENIX Security '23 - Inducing Authentication Failures to Bypass Credit Card PINs
YT 10 minutes 7 seconds
USENIX
USENIX Security '23 - An Empirical Study & Evaluation of Modern CAPTCHAs
YT 14 minutes 14 seconds
USENIX
USENIX Security '23 - Account Verification on Social Media: User Perceptions and Paid Enrollment
YT 12 minutes 10 seconds
USENIX
USENIX Security '23 - User Awareness and Behaviors Concerning Encrypted DNS Settings in Web Browsers
YT 13 minutes 20 seconds
USENIX
USENIX Security '23 - Two Sides of the Shield: Understanding Protective DNS adoption factors
YT 11 minutes 57 seconds
USENIX
USENIX Security '23 - The Maginot Line: Attacking the Boundary of DNS Caching Protection
YT 11 minutes 10 seconds
USENIX
USENIX Security '23 - Fourteen Years in the Life: A Root Server’s Perspective on DNS Resolve...
YT 12 minutes 13 seconds
USENIX
USENIX Security '23 - NRDelegationAttack: Complexity DDoS attack on DNS Recursive Resolvers
YT 13 minutes 17 seconds
USENIX
USENIX Security '23 - Inductive Graph Unlearning
YT 11 minutes 51 seconds
USENIX
USENIX Security '23 - GAP: Differentially Private Graph Neural Networks with Aggregation...
YT 9 minutes 47 seconds
USENIX
USENIX Security '23 - PrivGraph: Differentially Private Graph Data Publication by Exploiting...
YT 10 minutes 31 seconds
USENIX
USENIX Security '23 - On the Security Risks of Knowledge Graph Reasoning
YT 9 minutes 57 seconds
USENIX
USENIX Security '23 - The Case for Learned Provenance Graph Storage Systems
YT 13 minutes 37 seconds
USENIX
USENIX Security '23 - A Large Scale Study of the Ethereum Arbitrage Ecosystem
YT 11 minutes 39 seconds
USENIX
USENIX Security '23 - ACon^2: Adaptive Conformal Consensus for Provable Blockchain Oracles
YT 14 minutes 16 seconds
USENIX
USENIX Security '23 - Snapping Snap Sync: Practical Attacks on Go Ethereum Synchronising Nodes
YT 11 minutes 55 seconds
USENIX
USENIX Security '23 - Token Spammers, Rug Pulls, and Sniper Bots: An Analysis of the Ecosystem...
YT 11 minutes 20 seconds
USENIX
USENIX Security '23 - Automated Inference on Financial Security of Ethereum Smart Contracts
YT 13 minutes 11 seconds
USENIX
USENIX Security '23 - LibScan: Towards More Precise Third-Party Library Identification for...
YT 12 minutes 43 seconds
USENIX
USENIX Security '23 - Union under Duress: Understanding Hazards of Duplicate Resource Mismediation..
YT 12 minutes 37 seconds
USENIX
USENIX Security '23 - UVSCAN: Detecting Third-Party Component Usage Violations in IoT Firmware
YT 11 minutes 35 seconds
USENIX
USENIX Security '23 - Beyond Typosquatting: An In-depth Look at Package Confusion
YT 12 minutes 8 seconds
USENIX
USENIX Security '23 - SandDriller: A Fully-Automated Approach for Testing Language-Based...
YT 11 minutes 17 seconds
USENIX
USENIX Security '23 - Instructions Unclear: Undefined Behaviour in Cellular Network Specifications
YT 11 minutes 57 seconds
USENIX
USENIX Security '23 - MobileAtlas: Geographically Decoupled Measurements in Cellular Networks for...
YT 11 minutes 45 seconds
USENIX
USENIX Security '23 - Eavesdropping Mobile App Activity via Radio-Frequency Energy Harvesting
YT 11 minutes 45 seconds
USENIX
USENIX Security '23 - Sherlock on Specs: Building LTE Conformance Tests through Automated Reasoning
YT 11 minutes 1 second
USENIX
USENIX Security '23 - BASECOMP: A Comparative Analysis for Integrity Protection in Cellular...
YT 12 minutes 7 seconds
USENIX
USENIX Security '23 - Investigating Verification Behavior and Perceptions of Visual Digital...