_    ___ ___      _                               
/ \ |_ _/ _ \ ___| |_ _ __ ___ __ _ _ __ ___ ___
/ _ \ | | | | / __| __| '__/ _ \/ _` | '_ ` _ \/ __|
/ ___ \ | | |_| \__ \ |_| | | __/ (_| | | | | | \__ \
/_/ \_\___\___/|___/\__|_| \___|\__,_|_| |_| |_|___/
Twitch
Invidious (YT)

Invidious > Channel > IEEE Symposium on Security and Privacy

Trending
IEEE Symposium on Security and Privacy 9400 subscribers    RSS
View channel on YouTube
Videos
Playlists

YT 1 minute
IEEE Symposium on Security and Privacy
Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Security
YT 1 minute
IEEE Symposium on Security and Privacy
Sabre: Sender-Anonymous Messaging with Fast Audits
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
Exposed Infrastructures: Discovery, Attacks, & Remediation of Insecure ICS Remote Management Devices
YT 51 seconds
IEEE Symposium on Security and Privacy
SnarkBlock: Scalable Anonymous Blocklisting
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
HEAPSTER:Analyzing the Security of Dynamic Allocators for Monolithic Firmware Images
YT 1 minute 3 seconds
IEEE Symposium on Security and Privacy
Private Approximate Nearest Neighbor Search
YT 1 minute 2 seconds
IEEE Symposium on Security and Privacy
Effective Seed Scheduling for Fuzzing with Graph Centrality Analysis
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
Low-Bandwidth Threshold ECDSA via Pseudorandom Correlation Generators
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
Graphics Peeping Unit: Exploiting EM Side-Channel Information of GPUs to Eavesdrop on Your Neighbors
YT 1 minute 7 seconds
IEEE Symposium on Security and Privacy
SAILFISH: Vetting Smart Contract State-Inconsistency Bugs in Seconds
YT 1 minute 5 seconds
IEEE Symposium on Security and Privacy
GREBE: Unveiling Exploitation Potential for Linux Kernel Bugs
YT 1 minute 2 seconds
IEEE Symposium on Security and Privacy
Phishing in Organizations: Findings from a Large-Scale and Long-Term Study
YT 58 seconds
IEEE Symposium on Security and Privacy
AccEar: Accelerometer Acoustic Eavesdropping with Unconstrained Vocabulary
YT 1 minute
IEEE Symposium on Security and Privacy
ShorTor: Improving Tor Network Latency via Multi-hop Overlay Routing
YT 58 seconds
IEEE Symposium on Security and Privacy
DeepCASE: Semi-Supervised Contextual Analysis of Security Events
YT 58 seconds
IEEE Symposium on Security and Privacy
Security Analysis of the MLS Key Distribution
YT 1 minute
IEEE Symposium on Security and Privacy
SIRAJ: A Unified Framework for Aggregation of Malicious Entity Detectors
YT 1 minute 5 seconds
IEEE Symposium on Security and Privacy
COBRA: Dynamic Proactive Secret Sharing for Confidential BFT Services
YT 1 minute 2 seconds
IEEE Symposium on Security and Privacy
Security Foundations for Application-Based Covert Communication Channels
YT 54 seconds
IEEE Symposium on Security and Privacy
Spook.js: Attacking Chrome Strict Site Isolation via Speculative Execution
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
MatRiCT+: More Efficient Post-Quantum Private Blockchain Payments
YT 59 seconds
IEEE Symposium on Security and Privacy
IRShield: A Countermeasure Against Adversarial Physical-Layer Wireless Sensing
YT 31 seconds
IEEE Symposium on Security and Privacy
A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols
YT 59 seconds
IEEE Symposium on Security and Privacy
Sphinx: Enabling Privacy-Preserving Online Learning over the Cloud
YT 1 minute 2 seconds
IEEE Symposium on Security and Privacy
Back to the Drawing Board: A Critical Analysis of Poisoning Attacks on Production Federated Learning
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
Surakav: Generating Realistic Traces for a Strong Website Fingerprinting Defense
YT 1 minute
IEEE Symposium on Security and Privacy
HardLog: Practical Tamper-Proof System Auditing Using a Novel Audit Device
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
Wobfuscator: Obfuscating JavaScript Malware via Opportunistic Translation to WebAssembly
YT 1 minute 2 seconds
IEEE Symposium on Security and Privacy
SecFloat: Accurate Floating-Point meets Secure 2-Party Computation
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
Towards Automated Auditing for Account and Session Management Flaws in Single Sign-On Deployments
YT 1 minute
IEEE Symposium on Security and Privacy
LinkTeller: Recovering Private Edges from Graph Neural Networks via Influence Analysis
YT 57 seconds
IEEE Symposium on Security and Privacy
Evaluating Physical-Layer BLE Location Tracking Attacks on Mobile Devices
YT 1 minute 4 seconds
IEEE Symposium on Security and Privacy
How to Attack and Generate Honeywords
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
Universal Atomic Swaps: Secure Exchange of Coins Across All Blockchains
YT 1 minute
IEEE Symposium on Security and Privacy
SoK: Authentication in Augmented and Virtual Reality
YT 1 minute 3 seconds
IEEE Symposium on Security and Privacy
How Not to Protect Your IP - An Industry-Wide Break of IEEE 1735 Implementations
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
Repairing DoS Vulnerability of Real-World Regexes
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
Measuring and Mitigating the Risk of IP Reuse on Public Clouds
YT 58 seconds
IEEE Symposium on Security and Privacy
CirC: Compiler infrastructure for proof systems, software verification, and more
YT 1 second

[Private video]
YT 59 seconds
IEEE Symposium on Security and Privacy
Model Stealing Attacks Against Inductive Graph Neural Networks
YT 59 seconds
IEEE Symposium on Security and Privacy
SoK: Demystifying Binary Lifters Through the Lens of Downstream Applications
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
Practical EMV Relay Protection
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
DeepSteal Advanced Model Extractions Leveraging Efficient Weight Stealing in Memories
YT 58 seconds
IEEE Symposium on Security and Privacy
Universal 3-Dimensional Perturbations for Black-Box Attacks on Video Recognition Systems
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
mmSpy: Spying Phone Calls using mmWave Radars
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
"Desperate Times Call for Desperate Measures": User Concerns with Mobile Loan Apps in Kenya
YT 1 minute
IEEE Symposium on Security and Privacy
Invisible Finger: Practical Electromagnetic Interference Attack on Touchscreen-based Devices
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
Asleep at the Keyboard? Assessing the Security of GitHub Copilot's Code Contributions
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
Automated Attack Synthesis by Extracting Finite State Machines from Protocol Specification Documents
YT 59 seconds
IEEE Symposium on Security and Privacy
Differentially Private Histograms in the Shuffle Model from Fake Users
YT 1 minute
IEEE Symposium on Security and Privacy
Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques
YT 1 minute 2 seconds
IEEE Symposium on Security and Privacy
Investigating Influencer VPN Ads on YouTube
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
PCR-Auth: Solving Authentication Puzzle Challenges with Encoded Palm Contact Responses
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
Hardening Circuit-Design IP Against Reverse-Engineering Attacks
YT 1 minute
IEEE Symposium on Security and Privacy
TROLLMAGNIFIER: Detecting State-Sponsored Troll Accounts on Reddit
YT 1 minute 8 seconds
IEEE Symposium on Security and Privacy
Robbery on DevOps: Understanding and Mitigating Illicit Cryptomining in Continuous Integration
YT 59 seconds
IEEE Symposium on Security and Privacy
Publicly Accountable Robust Multi-Party Computation
YT 59 seconds
IEEE Symposium on Security and Privacy
BadEncoder: Backdoor Attacks to Pre-trained Encoders in Self-Supervised Learning
YT 1 minute
IEEE Symposium on Security and Privacy
Scraping Sticky Leftovers: App User Information Left on Servers After Account Deletion
YT 57 seconds
IEEE Symposium on Security and Privacy
Are We There Yet? Timing and Floating-Point Attacks on Differential Privacy Systems
YT 1 minute 8 seconds
IEEE Symposium on Security and Privacy
Foundations of Dynamic BFT
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
Formal Model-Driven Discovery of Bluetooth Protocol Design Vulnerabilities
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
SoK: Social Cybersecurity
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
The State of the SameSite: Studying the Usage, Effectiveness, and Adequacy of SameSite Cookies
YT 1 minute 5 seconds
IEEE Symposium on Security and Privacy
Noise-SDR Arbitrary Modulation of Electromagnetic Noise from Unprivileged Software
YT 53 seconds
IEEE Symposium on Security and Privacy
Attacks on Wireless Coexistence
YT 1 minute 2 seconds
IEEE Symposium on Security and Privacy
Hamraz: Resilient Object Partitioning and Replication
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
SoK: A Framework for Unifying At-Risk User Research
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
Quantifying Blockchain Extractable Value: How dark is the forest?
YT 1 minute
IEEE Symposium on Security and Privacy
Bad Characters: Imperceptible NLP Attacks
YT 58 seconds
IEEE Symposium on Security and Privacy
Four Attacks and a Proof for Telegram
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
ProVerif with Lemmas, Induction, Fast Subsumption, and Much More
YT 1 minute
IEEE Symposium on Security and Privacy
A Secret-Free Hypervisor: Rethinking Isolation in the Age of Speculative Vulnerabilities
YT 1 minute
IEEE Symposium on Security and Privacy
ZeeStar: Private Smart Contracts by Homomorphic Encryption and Zero-knowledge Proofs
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
27 Years and 81 Million Opportunities Later: Investigating Email Encryption for an Entire University
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
How Does Usable Security (Not) End Up in Software Products?
YT 1 second

[Private video]
YT 1 minute
IEEE Symposium on Security and Privacy
"Adversarial Examples" for Proof-of-Learning
YT 52 seconds
IEEE Symposium on Security and Privacy
They’re not that hard to mitigate: What Cryptographic Library Developers Think About Timing Attacks
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
Analyzing Ground-Truth Data of Mobile Gambling Scams
YT 1 second

[Private video]
YT 1 minute
IEEE Symposium on Security and Privacy
Domains Do Change Their Spots: Quantifying Potential Abuse of Residual Trust
YT 1 minute 4 seconds
IEEE Symposium on Security and Privacy
Deployment of Source Address Validation by Network Operators: A Randomized Control Trial
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
vSGX: Virtualizing SGX Enclaves on AMD SEV
YT 1 minute 3 seconds
IEEE Symposium on Security and Privacy
A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP
YT 55 seconds
IEEE Symposium on Security and Privacy
Waldo: A Private Time-Series Database from Function Secret Sharing
YT 1 minute
IEEE Symposium on Security and Privacy
BEACON: Directed Grey-Box Fuzzing with Provable Path Pruning
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
Noise⋆: A Library of Verified High-Performance Secure Channel Protocol Implementations
YT 1 minute 3 seconds
IEEE Symposium on Security and Privacy
FuzzUSB: Hybrid Stateful Fuzzing of USB Gadget Stacks
YT 1 minute 6 seconds
IEEE Symposium on Security and Privacy
Privacy-from-Birth: Protecting Sensed Data from Malicious Sensors with VERSA
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
DEPCOMM Graph Summarization on System Audit Logs for Attack Investigation
YT 1 minute
IEEE Symposium on Security and Privacy
Finding and Exploiting CPU Features using MSR Templating
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
Timing-Based Browsing Privacy Vulnerabilities Via Site Isolation
YT 1 minute 6 seconds
IEEE Symposium on Security and Privacy
Using Throughput-Centric Byzantine Broadcast to Tolerate Malicious Majority in Blockchains
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
WtaGraph: Web Tracking and Advertising Detection using Graph Neural Networks
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
PGPATCH: Policy-Guided Logic Bug Patching for Robotic Vehicles
YT 59 seconds
IEEE Symposium on Security and Privacy
Augury: Using Data Memory-Dependent Prefetchers to Leak Data at Rest
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
SpecHammer: Combining Spectre and Rowhammer for New Speculative Attacks
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
Experts’ Insights on the Peer Review Process of Evaluating Security Papers
YT 1 minute
IEEE Symposium on Security and Privacy
PICCOLO: Exposing Complex Backdoors in NLP Transformer Models
YT 1 minute
IEEE Symposium on Security and Privacy
Hark: A Deep Learning System for Navigating Privacy Feedback at Scale
YT 38 seconds
IEEE Symposium on Security and Privacy
MeshUp: Stateless Cache Side-channel Attack on CPU Mesh
YT 1 minute
IEEE Symposium on Security and Privacy
PICCOLO: Exposing Complex Backdoors in NLP Transformer Models
YT 1 minute
IEEE Symposium on Security and Privacy
Hark: A Deep Learning System for Navigating Privacy Feedback at Scale
YT 38 seconds
IEEE Symposium on Security and Privacy
MeshUp: Stateless Cache Side-channel Attack on CPU Mesh
YT 58 seconds
IEEE Symposium on Security and Privacy
Cats vs. Spectre: An Axiomatic Approach to Modeling Speculative Execution Attacks
YT 1 minute
IEEE Symposium on Security and Privacy
PROTRR: Principled yet Optimal In-DRAM Target Row Refresh
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
Delay Wreaks Havoc on Your Smart Home: Delay-based Automation Interference Attacks
YT 1 minute 3 seconds
IEEE Symposium on Security and Privacy
DeepCoFFEA: Improved Flow Correlation Attacks on Tor via Metric Learning and Amplification
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
Deidentifcation’s Impact on Minority Representation and Privacy Preservation in the US Census
YT 57 seconds
IEEE Symposium on Security and Privacy
Locally Differentially Private Vector Aggregation
YT 55 seconds
IEEE Symposium on Security and Privacy
Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings
YT 59 seconds
IEEE Symposium on Security and Privacy
SwarmFlawFinder: Discovering and Exploiting Logic Flaws of Swarm Algorithms
YT 1 minute 3 seconds
IEEE Symposium on Security and Privacy
SPURT: Scalable Distributed Randomness Beacon with Transparent Setup
YT 1 minute 14 seconds
IEEE Symposium on Security and Privacy
Reconstructing Training Data with Informed Adversaries
YT 59 seconds
IEEE Symposium on Security and Privacy
SoK: Practical Foundations for Software Spectre Defenses
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
Transcending Transcend: Revisiting Malware Classification in the Presence of Concept Drift
YT 1 minute 7 seconds
IEEE Symposium on Security and Privacy
Practical Asynchronous Distributed Key Generation
YT 59 seconds
IEEE Symposium on Security and Privacy
A Formal Security Analysis of the W3C Web Payment APIs: Attacks and Verification
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
JIGSAW: Efficient and Scalable Path Constraints Fuzzing
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
Anti-Tamper Radio: System-Level Tamper Detection for Computing Systems
YT 1 minute
IEEE Symposium on Security and Privacy
SoK: How Robust is Image Classification Deep Neural Network Watermarking
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
Exploit the Last Straw That Breaks Android Systems
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
Copy, Right? A Testing Framework for Copyright Protection of Deep Learning Models
YT 57 seconds
IEEE Symposium on Security and Privacy
Time-Print: Authenticating USB Flash Drives with Novel Timing Fingerprints
YT 1 minute
IEEE Symposium on Security and Privacy
WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens
YT 1 minute
IEEE Symposium on Security and Privacy
Statistical Quantification of Differential Privacy: A Local Approach
YT 1 minute
IEEE Symposium on Security and Privacy
SMILE: Secure Memory Introspection for Live Enclave
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
RT-TEE: Real-time System Availability for Cyber-physical Systems using ARM TrustZone
YT 52 seconds
IEEE Symposium on Security and Privacy
Committed to Trust: A Qualitative Study on Security & Trust in Open Source Software Projects
YT 1 minute
IEEE Symposium on Security and Privacy
Peekaboo: A Hub-Based Approach to Enable Transparency in Data Processing within Smart Homes
YT 1 minute 2 seconds
IEEE Symposium on Security and Privacy
TASHAROK—Using Mechanism Design for Enhancing Security Resource Allocation in Interdependent Systems
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
Finding SMM Privilege-Escalation in UEFI Firmware with Protocol-Centric Static Analysis
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
SYMBEXCEL: Automated Analysis and Understanding of Malicious Excel 4.0 Macros
YT 56 seconds
IEEE Symposium on Security and Privacy
SoK: The Dual Nature of Technology in Sexual Abuse
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
Multi-Server Verifiable Computation of Low-Degree Polynomials
YT 1 minute 3 seconds
IEEE Symposium on Security and Privacy
Property Inference from Poisoning
YT 1 minute 3 seconds
IEEE Symposium on Security and Privacy
IronMask: Versatile Verification of Masking Security
YT 1 minute 2 seconds
IEEE Symposium on Security and Privacy
Spiral: Fast, High-Rate Single-Server PIR via FHE Composition
YT 1 minute 2 seconds
IEEE Symposium on Security and Privacy
IRQDebloat: Reducing Driver Attack Surface in Embedded Devices
YT 1 minute
IEEE Symposium on Security and Privacy
ShadeWatcher: Recommendation-guided Cyber Threat Analysis using System Audit Records
YT 57 seconds
IEEE Symposium on Security and Privacy
Goshawk: Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
Adversarial Prefetch: New Cross Core Cache Side Channel Attacks
YT 48 seconds
IEEE Symposium on Security and Privacy
Mind the Gap: Studying the Insecurity of Provably Secure Embedded Trusted Execution Architectures
YT 1 minute 2 seconds
IEEE Symposium on Security and Privacy
Adversarial Prefetch: New Cross-Core Cache Side Channel Attacks
YT 54 seconds
IEEE Symposium on Security and Privacy
Device Fingerprinting with Peripheral Timestamps
YT 1 minute 3 seconds
IEEE Symposium on Security and Privacy
Spinning Language Models: Risks of Propaganda-As-A-Service and Countermeasures
YT 1 minute
IEEE Symposium on Security and Privacy
Blacksmith: Scalable Rowhammering in the Frequency Domain