_    ___ ___      _                               
/ \ |_ _/ _ \ ___| |_ _ __ ___ __ _ _ __ ___ ___
/ _ \ | | | | / __| __| '__/ _ \/ _` | '_ ` _ \/ __|
/ ___ \ | | |_| \__ \ |_| | | __/ (_| | | | | | \__ \
/_/ \_\___\___/|___/\__|_| \___|\__,_|_| |_| |_|___/
Twitch
Invidious (YT)

Invidious > Channel > IEEE Symposium on Security and Privacy

Trending
IEEE Symposium on Security and Privacy 9400 subscribers    RSS
View channel on YouTube
Videos
Playlists

YT 11 minutes 34 seconds
IEEE Symposium on Security and Privacy
IEEE S&P 2019—Opening Remarks—General Chair
YT 16 minutes 39 seconds
IEEE Symposium on Security and Privacy
IEEE S&P 2019—Opening Remarks—Program Chair
YT 21 minutes 11 seconds
IEEE Symposium on Security and Privacy
Spectre Attacks Exploiting Speculative Execution
YT 18 minutes 24 seconds
IEEE Symposium on Security and Privacy
SoK: The Challenges Pitfalls and Perils of Using Hardware Performance Counters for Security
YT 20 minutes 8 seconds
IEEE Symposium on Security and Privacy
Theory and Practice of Finding Eviction Sets
YT 20 minutes 8 seconds
IEEE Symposium on Security and Privacy
Exploiting Correcting Codes On the Effectiveness of ECC Memory Against Rowhammer Attacks
YT 20 minutes 1 second
IEEE Symposium on Security and Privacy
Self-Encrypting Deception: Weaknesses in the Encryption of Solid State Drives
YT 20 minutes 9 seconds
IEEE Symposium on Security and Privacy
RIDL: Rogue In-Flight Data Load
YT 19 minutes 40 seconds
IEEE Symposium on Security and Privacy
PERUN: Virtual Payment Hubs over Cryptographic Currencies
YT 20 minutes 11 seconds
IEEE Symposium on Security and Privacy
Redactable Blockchain in the Permissionless Setting
YT 19 minutes 46 seconds
IEEE Symposium on Security and Privacy
Proof Of Stake Sidechains
YT 18 minutes 14 seconds
IEEE Symposium on Security and Privacy
Ouroboros Crypsinous Privacy Preserving Proof of Stake
YT 18 minutes 28 seconds
IEEE Symposium on Security and Privacy
Lay Down the Common Metrics: Evaluating Proof of Work Consensus Protocols' Security
YT 17 minutes 26 seconds
IEEE Symposium on Security and Privacy
XCLAIM: Trustless Interoperable Cryptocurrency Backed Assets
YT 20 minutes 47 seconds
IEEE Symposium on Security and Privacy
Does Certificate Transparency Break the Web? Measuring Adoption and Error Rate
YT 19 minutes 48 seconds
IEEE Symposium on Security and Privacy
EmPoWeb: Empowering Web Applications with Browser Extensions
YT 20 minutes 14 seconds
IEEE Symposium on Security and Privacy
"If HTTPS Were Secure I wouldn't Need 2FA" End User and Administrator Mental Models of HTTPS
YT 18 minutes 48 seconds
IEEE Symposium on Security and Privacy
Fidelius: Protecting User Secrets from Compromised Browsers
YT 20 minutes 15 seconds
IEEE Symposium on Security and Privacy
Postcards from the Post HTTP World: Amplification of HTTPS Vulnerabilities in the Web Ecosystem
YT 21 minutes 59 seconds
IEEE Symposium on Security and Privacy
Towards Practical Differentialy Private Convex Optimization
YT 17 minutes 46 seconds
IEEE Symposium on Security and Privacy
PrivKV: Key Value Data Collection with Local Differential Privacy
YT 23 minutes 13 seconds
IEEE Symposium on Security and Privacy
Differentially Private Model Publishing For Deep Learning
YT 17 minutes 10 seconds
IEEE Symposium on Security and Privacy
KHyperLogLog: Estimating Reidentifiability and Joinability of Large Data at Scale Pern Hui Chia
YT 18 minutes 36 seconds
IEEE Symposium on Security and Privacy
Characterizing Pixel Tracking through the Lens of Disposable Email Services
YT 18 minutes 52 seconds
IEEE Symposium on Security and Privacy
Asm2Vec: Boosting Static Representation Robustness for Binary Clone Search...
YT 19 minutes 54 seconds
IEEE Symposium on Security and Privacy
Iodine: Fast Dynamic Taint Tracking Using Rollback free Optimistic Hybrid Analysis
YT 16 minutes 47 seconds
IEEE Symposium on Security and Privacy
CaSym: Cache Aware Symbolic Execution for Side Channel Detection and Mitigation
YT 23 minutes 4 seconds
IEEE Symposium on Security and Privacy
Towards Automated Safety Vetting of PLC Code in Real World Plants Mu Zhang
YT 20 minutes 25 seconds
IEEE Symposium on Security and Privacy
Using Safety Properties to Generate Vulnerability Patches
YT 20 minutes 27 seconds
IEEE Symposium on Security and Privacy
Reasoning Analytically About Password Cracking Software Alex Liu
YT 19 minutes 18 seconds
IEEE Symposium on Security and Privacy
True2F: Backdoor resistant authentication tokens Emma Dauterman
YT 16 minutes 48 seconds
IEEE Symposium on Security and Privacy
Beyond Credential Stuffing: Password Similarity Models using Neural Networks
YT 17 minutes 23 seconds
IEEE Symposium on Security and Privacy
The 9 Lives of Bleichenbachers CAT: New Cache ATtacks on TLS Implementations
YT 17 minutes 22 seconds
IEEE Symposium on Security and Privacy
An Extensive Formal Security Analysis of the OpenID Financial grade API Pedram Hosseyni
YT 7 minutes 33 seconds
IEEE Symposium on Security and Privacy
IEEE S&P 2019—Awards Ceremony
YT 17 minutes 24 seconds
IEEE Symposium on Security and Privacy
Short Text, Large Effect: Measuring the Impact of User Reviews on Android App Security & Privacy
YT 19 minutes 32 seconds
IEEE Symposium on Security and Privacy
Demystifying Hidden Privacy Settings in Mobile Apps
YT 19 minutes 9 seconds
IEEE Symposium on Security and Privacy
Security of GPS / INS based On-road Location Tracking Systems
YT 17 minutes 19 seconds
IEEE Symposium on Security and Privacy
Understanding the Security of ARM Debugging Features
YT 20 minutes 13 seconds
IEEE Symposium on Security and Privacy
Tap 'n Ghost: A Compilation of Novel Attack Techniques against Smartphone Touchscreens
YT 19 minutes 26 seconds
IEEE Symposium on Security and Privacy
SensorID: Sensor Calibration Fingerprinting for Smartphones
YT 19 minutes 38 seconds
IEEE Symposium on Security and Privacy
Certified Robustness to Adversarial Examples with Differential Privacy
YT 16 minutes 49 seconds
IEEE Symposium on Security and Privacy
Exploiting Unintended Feature leakage in Collaborative Learning Congzheng Song
YT 19 minutes
IEEE Symposium on Security and Privacy
Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks
YT 18 minutes 1 second
IEEE Symposium on Security and Privacy
Helen: Maliciously Secure Coopetitive Learning for Linear Models
YT 16 minutes 34 seconds
IEEE Symposium on Security and Privacy
Comprehensive Privacy Analysis of Deep Learning
YT 20 minutes 6 seconds
IEEE Symposium on Security and Privacy
Razzer: Finding Kernel Race Bugs through Fuzzing
YT 18 minutes 44 seconds
IEEE Symposium on Security and Privacy
ProFuzzer: On-the-fly Input Type Probing for Better Zero-day Vulnerability Discovery
YT 21 minutes 32 seconds
IEEE Symposium on Security and Privacy
Full speed Fuzzing: Reducing Fuzzing Overhead through Coverage-guided Tracing
YT 21 minutes 54 seconds
IEEE Symposium on Security and Privacy
NEUZZ: Efficient Fuzzing with Neural Program Smoothing
YT 19 minutes 40 seconds
IEEE Symposium on Security and Privacy
Fuzzing File Systems via Two-Dimensional Input Space Exploration
YT 18 minutes 13 seconds
IEEE Symposium on Security and Privacy
F-BLEAU: Fast Black-box Leakage Estimation
YT 21 minutes 24 seconds
IEEE Symposium on Security and Privacy
Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels
YT 22 minutes 11 seconds
IEEE Symposium on Security and Privacy
Port Contention for Fun and Profit
YT 19 minutes 47 seconds
IEEE Symposium on Security and Privacy
Attack Directories, Not Caches: Side Channel Attacks in a Non Inclusive World
YT 21 minutes 51 seconds
IEEE Symposium on Security and Privacy
Hard Drive of Hearing: Disks that Eavesdrop with a Synthesized Microphone
YT 23 minutes 45 seconds
IEEE Symposium on Security and Privacy
IEEE S&P 2019—40th Celebration Plenary Session: A Wild Ride Through Time
YT 1 hour 3 minutes 27 seconds
IEEE Symposium on Security and Privacy
IEEE S&P 2019—40th Celebration Plenary Session: Panel: Reflections on four decades of the symposium
YT 21 minutes 21 seconds
IEEE Symposium on Security and Privacy
IEEE S&P 2019—40th Celebration Plenary Session: Test of Time Awards
YT 38 minutes 20 seconds
IEEE Symposium on Security and Privacy
IEEE S&P 2019—TC Business Meeting
YT 11 minutes 42 seconds
IEEE Symposium on Security and Privacy
IEEE S&P 2019—40th IEEE Symposium on Security and Privacy—Closing Remarks
YT 20 minutes 34 seconds
IEEE Symposium on Security and Privacy
"Should I Worry?" A Cross Cultural Examination of Account Security Incident Response
YT 19 minutes 56 seconds
IEEE Symposium on Security and Privacy
Bitcoin vs. Bitcoin Cash: Coexistence or Downfall of Bitcoin Cash
YT 19 minutes 5 seconds
IEEE Symposium on Security and Privacy
Stealthy Porn: Understanding Real World Adversarial Images for Illicit Online Promotion
YT 20 minutes 12 seconds
IEEE Symposium on Security and Privacy
LBM: A Security Framework for Peripherals within the Linux Kernel
YT 19 minutes 1 second
IEEE Symposium on Security and Privacy
SoK: Shining Light on Shadow Stacks
YT 18 minutes 46 seconds
IEEE Symposium on Security and Privacy
Kiss from a Rogue: Evaluating Detectability of Pay-at-the-Pump Card Skimmers
YT 18 minutes 3 seconds
IEEE Symposium on Security and Privacy
Blind Certificate Authorities
YT 18 minutes 38 seconds
IEEE Symposium on Security and Privacy
Data Recovery on Encrypted Databases with k-Nearest Neighbor Query Leakage
YT 16 minutes 36 seconds
IEEE Symposium on Security and Privacy
Threshold ECDSA from ECDSA Assumptions: The Multiparty Case
YT 16 minutes 24 seconds
IEEE Symposium on Security and Privacy
On the Security of Two-Round Multi-Signatures
YT 22 minutes 5 seconds
IEEE Symposium on Security and Privacy
New Primitives for Actively-Secure MPC over Rings with Applications to Private Machine Learning
YT 20 minutes 58 seconds
IEEE Symposium on Security and Privacy
Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks
YT 19 minutes 23 seconds
IEEE Symposium on Security and Privacy
Breaking LTE on Layer Two
YT 21 minutes 22 seconds
IEEE Symposium on Security and Privacy
Touching the Untouchables: Dynamic Security Analysis of the LTE Control Plane
YT 18 minutes 44 seconds
IEEE Symposium on Security and Privacy
On the Feasibility of Rerouting-Based DDoS Defenses
YT 20 minutes 19 seconds
IEEE Symposium on Security and Privacy
Resident Evil: Understanding Residential IP Proxy as a Dark Service
YT 17 minutes 33 seconds
IEEE Symposium on Security and Privacy
Simple High-Level Code for Cryptographic Arithmetic -- With Proofs, Without Compromises
YT 18 minutes 50 seconds
IEEE Symposium on Security and Privacy
SoK: General Purpose Frameworks for Secure Multi-Party Computation
YT 17 minutes 25 seconds
IEEE Symposium on Security and Privacy
The Code That Never Ran: Modeling Attacks on Speculative Evaluation
YT 19 minutes 5 seconds
IEEE Symposium on Security and Privacy
Formally Verified Cryptographic Web Applications in WebAssembly
YT 19 minutes 34 seconds
IEEE Symposium on Security and Privacy
SoK: Sanitizing for Security Dokyung Song
YT 18 minutes 54 seconds
IEEE Symposium on Security and Privacy
Why Does Your Data Leak? Uncovering the Data Leakage in Cloud from Mobile Apps
YT 18 minutes 12 seconds
IEEE Symposium on Security and Privacy
Measuring and Analyzing Search Engine Poisoning of Linguistic Collisions
YT 19 minutes 5 seconds
IEEE Symposium on Security and Privacy
How Well Do My Results Generalize? Comparing Security and Privacy Survey Results from...
YT 22 minutes 2 seconds
IEEE Symposium on Security and Privacy
PhishFarm: A Scalable Framework for Measuring the Effectivness of Evasion Techniques Against...
YT 17 minutes 41 seconds
IEEE Symposium on Security and Privacy
SoK: Security Evaluation of Home Based IoT Deployment
YT 18 minutes 32 seconds
IEEE Symposium on Security and Privacy
Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party...
YT 20 minutes 18 seconds
IEEE Symposium on Security and Privacy
Drones' Cryptanalysis - Detecting Privacy Invasion Attacks Conducted by Drone
YT 20 minutes 58 seconds
IEEE Symposium on Security and Privacy
Dominance as a New Trusted Computing Primitive for the IoT