_    ___ ___      _                               
/ \ |_ _/ _ \ ___| |_ _ __ ___ __ _ _ __ ___ ___
/ _ \ | | | | / __| __| '__/ _ \/ _` | '_ ` _ \/ __|
/ ___ \ | | |_| \__ \ |_| | | __/ (_| | | | | | \__ \
/_/ \_\___\___/|___/\__|_| \___|\__,_|_| |_| |_|___/
Twitch
Invidious (YT)

Invidious > Channel > IEEE Symposium on Security and Privacy

Trending
IEEE Symposium on Security and Privacy 9400 subscribers    RSS
View channel on YouTube
Videos
Playlists

YT 14 minutes 35 seconds
IEEE Symposium on Security and Privacy
Cross-Domain Access Control Encryption -- Arbitrary-policy, Constant-size, Efficient
YT 15 minutes 12 seconds
IEEE Symposium on Security and Privacy
SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and ...
YT 14 minutes 50 seconds
IEEE Symposium on Security and Privacy
A Decentralized and Encrypted National Gun Registry
YT 13 minutes 7 seconds
IEEE Symposium on Security and Privacy
Survivalism: Systematic Analysis of Malware Living-Off-The-Land
YT 14 minutes 58 seconds
IEEE Symposium on Security and Privacy
ConDySTA: Context-Aware Dynamic Supplement to Static Taint Analysis
YT 14 minutes 11 seconds
IEEE Symposium on Security and Privacy
Hear “No Evil”, See “Kenansville”: Efficient and Transferable Black-Box Attacks on Automatic ...
YT 15 minutes 21 seconds
IEEE Symposium on Security and Privacy
Defensive Technology Use by Political Activists During the Sudanese Revolution
YT 13 minutes 25 seconds
IEEE Symposium on Security and Privacy
Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems
YT 15 minutes 1 second
IEEE Symposium on Security and Privacy
Good Bot, Bad Bot: Characterizing Automated Browsing Activity
YT 15 minutes 4 seconds
IEEE Symposium on Security and Privacy
"Many-out-of-Many" Proofs and Applications to Anonymous Zether
YT 14 minutes 16 seconds
IEEE Symposium on Security and Privacy
DIANE: Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices
YT 15 minutes
IEEE Symposium on Security and Privacy
Systematic Analysis of Randomization-based Protected Cache Architectures
YT 14 minutes 53 seconds
IEEE Symposium on Security and Privacy
Red Belly: a Deterministic Scalable Open Permissioned Blockchain
YT 15 minutes 13 seconds
IEEE Symposium on Security and Privacy
Learning Differentially Private Mechanisms
YT 14 minutes 53 seconds
IEEE Symposium on Security and Privacy
Compact Certificates of Collective Knowledge
YT 15 minutes
IEEE Symposium on Security and Privacy
Adversary Instantiation: Lower bounds for differentially private machine learning
YT 11 minutes 19 seconds
IEEE Symposium on Security and Privacy
Pegasus: Bridging Polynomial and Non-polynomial Evaluations in Homomorphic Encryption
YT 15 minutes
IEEE Symposium on Security and Privacy
NTFUZZ: Enabling Type-Aware Kernel Fuzzing on Windows with Static Binary Analysis
YT 14 minutes 10 seconds
IEEE Symposium on Security and Privacy
A2L: Anonymous Atomic Locks for Scalability in Payment Channel Hubs
YT 12 minutes 54 seconds
IEEE Symposium on Security and Privacy
Trouble Over-The-Air: An Analysis of FOTA Apps in the Android Ecosystem
YT 13 minutes 36 seconds
IEEE Symposium on Security and Privacy
Improving Password Guessing via Representation Learning
YT 15 minutes 52 seconds
IEEE Symposium on Security and Privacy
SoK: Quantifying Cyber Risk
YT 15 minutes
IEEE Symposium on Security and Privacy
ARBITRAR : User-Guided API Misuse Detection
YT 15 minutes 1 second
IEEE Symposium on Security and Privacy
Runtime Recovery of Web Applications under Zero-Day ReDoS Attacks
YT 14 minutes 56 seconds
IEEE Symposium on Security and Privacy
Doing good by fighting fraud: Ethical anti-fraud systems for mobile payments
YT 15 minutes 10 seconds
IEEE Symposium on Security and Privacy
Merkle^2: A Low-Latency Transparency Log System
YT 15 minutes 15 seconds
IEEE Symposium on Security and Privacy
Revealer: Detecting and Exploiting Regular Expression Denial-of-Service Vulnerabilities
YT 16 minutes 47 seconds
IEEE Symposium on Security and Privacy
Bookworm Game: Automatic Discovery of LTE Vulnerabilities Through Documentation Analysis
YT 14 minutes 48 seconds
IEEE Symposium on Security and Privacy
Proactive Threshold Wallets with Offline Devices
YT 15 minutes 1 second
IEEE Symposium on Security and Privacy
Detecting AI Trojans Using Meta Neural Analysis
YT 14 minutes 54 seconds
IEEE Symposium on Security and Privacy
Bomberman: Defining and Defeating Hardware Ticking Timebombs at Design-time
YT 15 minutes 33 seconds
IEEE Symposium on Security and Privacy
DynPTA: Combining Static and Dynamic Analysis for Practical Selective Data Protection
YT 14 minutes 41 seconds
IEEE Symposium on Security and Privacy
Lockable Signatures for Blockchains: Scriptless Scripts for all Signatures
YT 15 minutes 8 seconds
IEEE Symposium on Security and Privacy
A Secure and Formally Verified Linux KVM Hypervisor
YT 16 minutes 12 seconds
IEEE Symposium on Security and Privacy
Adversarial Watermarking Transformer: Towards Tracing Text Provenance with Data Hiding
YT 14 minutes 46 seconds
IEEE Symposium on Security and Privacy
CacheOut: Leaking Data on Intel CPUs via Cache Evictions
YT 14 minutes 41 seconds
IEEE Symposium on Security and Privacy
Android Custom Permissions Demystified: From Privilege Escalation to Design Shortcomings
YT 15 minutes 1 second
IEEE Symposium on Security and Privacy
Detecting Filter List Evasion With Event-Loop-Turn Granularity JavaScript Signatures
YT 14 minutes 50 seconds
IEEE Symposium on Security and Privacy
Which Privacy and Security Attributes Most Impact Consumers' Risk Perception and Willingness to ...
YT 14 minutes 31 seconds
IEEE Symposium on Security and Privacy
Linking Bluetooth LE & Classic and Implications for Privacy-Preserving Bluetooth-Based Protocols
YT 15 minutes 34 seconds
IEEE Symposium on Security and Privacy
Diogenes: Lightweight Scalable RSA Modulus Generation with a Dishonest Majority
YT 15 minutes 15 seconds
IEEE Symposium on Security and Privacy
An I/O Separation Model for Formal Verification of Kernel Implementations
YT 15 minutes 8 seconds
IEEE Symposium on Security and Privacy
Method Confusion Attack on the Bluetooth Pairing Process
YT 14 minutes 39 seconds
IEEE Symposium on Security and Privacy
Hardware-Software Contracts for Secure Speculation
YT 14 minutes 23 seconds
IEEE Symposium on Security and Privacy
Ed25519 Signature Schemes: Theory and Practice
YT 15 minutes 26 seconds
IEEE Symposium on Security and Privacy
Co-Inflow: Coarse-grained Information Flow Control for Java-like Languages
YT 13 minutes 31 seconds
IEEE Symposium on Security and Privacy
DIFUZZRTL: Differential Fuzz Testing to Find CPU Bugs
YT 12 minutes 44 seconds
IEEE Symposium on Security and Privacy
Journey to the Center of the Cookie Ecosystem: Unraveling Actors' Roles and Relationships
YT 11 minutes 16 seconds
IEEE Symposium on Security and Privacy
Response-Hiding Encrypted Ranges: Revisiting Security via Parametrized Leakage-Abuse Attacks
YT 10 minutes 33 seconds
IEEE Symposium on Security and Privacy
SGUARD: Smart Contracts Made Vulnerability-Free
YT 15 minutes
IEEE Symposium on Security and Privacy
SoK: Hate, Harassment, and the Changing Landscape of Online Abuse
YT 15 minutes
IEEE Symposium on Security and Privacy
Zero Knowledge for Everything and Everyone: Fast ZK Processor with Cached ORAM for ANSI C Programs
YT 14 minutes 31 seconds
IEEE Symposium on Security and Privacy
Compositional Non-Interference for Fine-Grained Concurrent Programs
YT 14 minutes 57 seconds
IEEE Symposium on Security and Privacy
Wolverine: Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and ...
YT 13 minutes 44 seconds
IEEE Symposium on Security and Privacy
An Interactive Prover for Protocol Verification in the Computational Model
YT 12 minutes 39 seconds
IEEE Symposium on Security and Privacy
DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis
YT 15 minutes 26 seconds
IEEE Symposium on Security and Privacy
Data Privacy in Trigger-Action IoT Systems
YT 15 minutes
IEEE Symposium on Security and Privacy
Fingerprinting the Fingerprinters: Learning to Detect Browser Fingerprinting Behaviors
YT 14 minutes 31 seconds
IEEE Symposium on Security and Privacy
Real-World Snapshots vs. Theory: Questioning the t-Probing Security Model.
YT 14 minutes 54 seconds
IEEE Symposium on Security and Privacy
CryptGPU: Fast Privacy-Preserving Machine Learning on the GPU
YT 15 minutes 6 seconds
IEEE Symposium on Security and Privacy
CANnon: Reliable and Stealthy Remote Shutdown Attacks via Unaltered Automotive Microcontrollers
YT 12 minutes 37 seconds
IEEE Symposium on Security and Privacy
How Did That Get In My Phone? Unwanted App Distribution on Android Devices
YT 14 minutes 42 seconds
IEEE Symposium on Security and Privacy
They Would do Better if They Worked Together: The Case of Interaction Problems Between Password ...
YT 14 minutes 59 seconds
IEEE Symposium on Security and Privacy
Proof-of-Learning: Definitions and Practice
YT 14 minutes 39 seconds
IEEE Symposium on Security and Privacy
SoK: Computer-Aided Cryptography
YT 14 minutes 37 seconds
IEEE Symposium on Security and Privacy
High-Assurance Cryptography in the Spectre Era
YT 14 minutes 20 seconds
IEEE Symposium on Security and Privacy
Invisible Probe: Timing Attacks with PCIe Congestion Side-channel
YT 14 minutes 57 seconds
IEEE Symposium on Security and Privacy
The EMV Standard: Break, Fix, Verify
YT 12 minutes 47 seconds
IEEE Symposium on Security and Privacy
MAD-HTLC: Because HTLC is Crazy-Cheap to Attack
YT 13 minutes 47 seconds
IEEE Symposium on Security and Privacy
CrossTalk: Speculative Data Leaks Across Cores Are Real
YT 15 minutes 26 seconds
IEEE Symposium on Security and Privacy
SIRNN: A Math Library for Secure RNN Inference
YT 14 minutes 9 seconds
IEEE Symposium on Security and Privacy
Trust, But Verify: A Longitudinal Analysis Of Android OEM Compliance and Customization
YT 15 minutes 1 second
IEEE Symposium on Security and Privacy
OSPREY: Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary
YT 14 minutes 55 seconds
IEEE Symposium on Security and Privacy
On the Anonymity Guarantees of Anonymous Proof-of-Stake Protocols
YT 15 minutes 30 seconds
IEEE Symposium on Security and Privacy
Ebb-and-Flow Protocols: A Resolution of the Availability-Finality Dilemma
YT 14 minutes 58 seconds
IEEE Symposium on Security and Privacy
Using Selective Memoization to Defeat Regular Expression Denial of Service (ReDoS)
YT 14 minutes
IEEE Symposium on Security and Privacy
Compositional Security for Reentrant Applications
YT 14 minutes 55 seconds
IEEE Symposium on Security and Privacy
Machine unlearning
YT 14 minutes 25 seconds
IEEE Symposium on Security and Privacy
SoK: All You Ever Wanted to Know About Binary Disassembly But Were Afraid to Ask
YT 15 minutes 35 seconds
IEEE Symposium on Security and Privacy
Electromagnetic Covert Channels Can Be Super Resilient
YT 14 minutes 59 seconds
IEEE Symposium on Security and Privacy
A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer
YT 15 minutes 29 seconds
IEEE Symposium on Security and Privacy
SoK: Fully Homomorphic Encryption Compilers
YT 15 minutes
IEEE Symposium on Security and Privacy
STOCHFUZZ: Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic ...
YT 13 minutes 47 seconds
IEEE Symposium on Security and Privacy
Poltergeist: Acoustic Manipulation of Image Stabilization towards Object Mis-Labeling
YT 15 minutes 9 seconds
IEEE Symposium on Security and Privacy
Is Private Learning Possible with Instance Encoding?
YT 14 minutes 47 seconds
IEEE Symposium on Security and Privacy
Security of Multi-Sensor Fusion based Perception in Autonomous Driving Under Physical-World Attacks
YT 15 minutes
IEEE Symposium on Security and Privacy
High-Frequency Trading on Decentralized On-Chain Exchanges
YT 13 minutes 4 seconds
IEEE Symposium on Security and Privacy
On the Just-In-Time Discovery of Profit-Generating Transactions in DeFi Protocols
YT 14 minutes 4 seconds
IEEE Symposium on Security and Privacy
Lightweight Techniques for Private Heavy Hitters
YT 14 minutes 57 seconds
IEEE Symposium on Security and Privacy
HackEd: A Pedagogical Analysis of Online Vulnerability Discovery Exercises
YT 14 minutes 23 seconds
IEEE Symposium on Security and Privacy
SoK: Security and Privacy in the Age of Commercial Drones
YT 16 minutes 46 seconds
IEEE Symposium on Security and Privacy
Epochal Signatures for Deniable Group Chats
YT 13 minutes 30 seconds
IEEE Symposium on Security and Privacy
A First Look at Zoombombing
YT 14 minutes 45 seconds
IEEE Symposium on Security and Privacy
Manipulation Attacks in Local Differential Privacy
YT 14 minutes 15 seconds
IEEE Symposium on Security and Privacy
One Engine to Fuzz 'em All: Generic Language Processor Testing with Semantic Validation
YT 14 minutes 34 seconds
IEEE Symposium on Security and Privacy
When Function Signature Recovery Meets Compiler Optimization
YT 14 minutes 42 seconds
IEEE Symposium on Security and Privacy
Randomized Last-Level Caches Are Still Vulnerable to Cache Side-Channel Attacks! But We Can Fix It
YT 16 minutes 26 seconds
IEEE Symposium on Security and Privacy
Self-Supervised Euphemism Detection and Identification for Content Moderation
YT 14 minutes 58 seconds
IEEE Symposium on Security and Privacy
Breaking the Specification: Certified PDF
YT 12 minutes 23 seconds
IEEE Symposium on Security and Privacy
BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures
YT 14 minutes 28 seconds
IEEE Symposium on Security and Privacy
CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing
YT 15 minutes 1 second
IEEE Symposium on Security and Privacy
PLATYPUS: Software-based Power Side-Channel Attacks on x86
YT 14 minutes 58 seconds
IEEE Symposium on Security and Privacy
Bitcoin-Compatible Virtual Channels
YT 15 minutes 1 second
IEEE Symposium on Security and Privacy
CRYLOGGER: Detecting Crypto Misuses Dynamically
YT 14 minutes 56 seconds
IEEE Symposium on Security and Privacy
Post-Quantum WireGuard
YT 15 minutes 55 seconds
IEEE Symposium on Security and Privacy
SmartPulse: Automated Checking of Temporal Properties in Smart Contracts
YT 14 minutes 57 seconds
IEEE Symposium on Security and Privacy
Did you mix me? Formally Verifying Verifiable Mix Nets in Electronic Voting
YT 15 minutes
IEEE Symposium on Security and Privacy
A Novel Dynamic Analysis Infrastructure to Instrument Untrusted Execution Flow Across User-Kernel...
YT 15 minutes 30 seconds
IEEE Symposium on Security and Privacy
Keep the Dirt: Tainted TreeKEM, Adaptively and Actively Secure Continuous Group Key Agreement
YT 14 minutes 29 seconds
IEEE Symposium on Security and Privacy
Reading Between the Lines: An Extensive Evaluation of the Security and Privacy Implications ...
YT 14 minutes 52 seconds
IEEE Symposium on Security and Privacy
CanDID: Bootstrapping Decentralized Identity from Legacy Providers
YT 13 minutes 14 seconds
IEEE Symposium on Security and Privacy
Black Widow: Blackbox Data-driven Web Scanning
YT 14 minutes 44 seconds
IEEE Symposium on Security and Privacy
DP-Sniper: Black-Box Discovery of Differential Privacy Violations using Classifiers
YT 13 minutes 18 seconds
IEEE Symposium on Security and Privacy
Cross Layer Attacks and How to Use Them (for DNS Cache Poisoning, Device Tracking and More)
YT 14 minutes 45 seconds
IEEE Symposium on Security and Privacy
Happer: Unpacking Android Apps via a Hardware-Assisted Approach
YT 56 minutes 54 seconds
IEEE Symposium on Security and Privacy
Opening Remarks 2021
YT 51 minutes 10 seconds
IEEE Symposium on Security and Privacy
Closing Remarks 2021
YT 49 minutes 41 seconds
IEEE Symposium on Security and Privacy
Ethics in Security and Privacy Research Panel
YT 20 minutes 42 seconds
IEEE Symposium on Security and Privacy
Intel Hardware Security Academic Award
YT 43 minutes 47 seconds
IEEE Symposium on Security and Privacy
Short Talks On Tuesday
YT 53 minutes 58 seconds
IEEE Symposium on Security and Privacy
Short Talks On Wednesday