_    ___ ___      _                               
/ \ |_ _/ _ \ ___| |_ _ __ ___ __ _ _ __ ___ ___
/ _ \ | | | | / __| __| '__/ _ \/ _` | '_ ` _ \/ __|
/ ___ \ | | |_| \__ \ |_| | | __/ (_| | | | | | \__ \
/_/ \_\___\___/|___/\__|_| \___|\__,_|_| |_| |_|___/
Twitch
Invidious (YT)

Invidious > Channel > IEEE Symposium on Security and Privacy

Trending
IEEE Symposium on Security and Privacy 9400 subscribers    RSS
View channel on YouTube
Videos
Playlists

YT 13 minutes 39 seconds
IEEE Symposium on Security and Privacy
#15 No Privacy Left Outside Ziqi Zhang
YT 17 minutes 29 seconds
IEEE Symposium on Security and Privacy
#144 TCP Spoofing Reliable Payload Transmission Past the Spoofed TCP Handshake Eric Pan
YT 13 minutes 12 seconds
IEEE Symposium on Security and Privacy
#498 Learn What You Want to Unlearn Unlearning Inversion Attacks against Machine Unlearning Hongsh
YT 13 minutes 43 seconds
IEEE Symposium on Security and Privacy
#518 LACMUS Latent Concept Masking for General Robustness Enhancement of DNNs Hongsheng Hu
YT 19 minutes 7 seconds
IEEE Symposium on Security and Privacy
6 Efficient Zero knowledge Arguments for Paillier Cryptosystem Rae Gong
YT 18 minutes 13 seconds
IEEE Symposium on Security and Privacy
6 Efficient Zero knowledge Arguments for Paillier Cryptosystem Rae Gong1
YT 10 minutes 58 seconds
IEEE Symposium on Security and Privacy
06 Zihao Li NURGLE zihao li
YT 12 minutes 6 seconds
IEEE Symposium on Security and Privacy
7B Ehsanul Kabir FLShield A Validation Based Federated Learning Framework to Defend Against Poisonin
YT 19 minutes 32 seconds
IEEE Symposium on Security and Privacy
9 Prune+PlumTree Finding Eviction Sets at Scale Tom Kissos
YT 18 minutes 14 seconds
IEEE Symposium on Security and Privacy
14 TuDoor Xiang Li
YT 18 minutes 14 seconds
IEEE Symposium on Security and Privacy
33 INVISILINE Invisible Plausibly Deniable Storage Sandeep Kiran Pinjala
YT 19 minutes 5 seconds
IEEE Symposium on Security and Privacy
43 P4Control Line Rate Cross Host Attack Prevention via In Network Information Flow Control Enabled
YT 10 minutes 21 seconds
IEEE Symposium on Security and Privacy
52 A Picture is Worth 500 Labels A Case Study of Demographic Disparities in Local Machine Learning M
YT 15 minutes 3 seconds
IEEE Symposium on Security and Privacy
77 UnTrustZone Systematic Accelerated Aging to Expose On chip Jubayer Mahmod
YT 11 minutes 6 seconds
IEEE Symposium on Security and Privacy
91 PIRANA Faster Multi query PIR via Constant weight Codes Jingyu Li
YT 9 minutes 17 seconds
IEEE Symposium on Security and Privacy
95 Preserving Node level Privacy in Graph Neural Networks ZH X
YT 19 minutes 48 seconds
IEEE Symposium on Security and Privacy
101 The Great Request Robbery Soheil Khodayari Soheil Khodayari
YT 15 minutes 10 seconds
IEEE Symposium on Security and Privacy
109 BULKOR:Enabling Bulk Loading for Path ORAM Xiang Li
YT 17 minutes 42 seconds
IEEE Symposium on Security and Privacy
111 Efficient and Generic Microarchitectural Hash Function Recovery Lukas Gerlach
YT 16 minutes
IEEE Symposium on Security and Privacy
116 Security Privacy and Data Sharing Challenges When Moving to the US Insights from a Qualitative s
YT 9 minutes 19 seconds
IEEE Symposium on Security and Privacy
154 Test time Poisoning Attacks Against Test time Adaptation Models Tianshuo Cong
YT 14 minutes 24 seconds
IEEE Symposium on Security and Privacy
164 SoK Security and Privacy of Blockchain Interoperability André Augusto
YT 19 minutes 49 seconds
IEEE Symposium on Security and Privacy
172 Don t Eject the Impostor Fast Three Party Computation With a Known Cheater Andreas Brüggeman
YT 13 minutes
IEEE Symposium on Security and Privacy
185 BadVFL backdoor attacks in vertical federated learning Mohammad Naseri
YT 15 minutes 26 seconds
IEEE Symposium on Security and Privacy
211 Multi Instance Adversarial Attack on GNN Based Malicious Domain Detection Mahmoud Khaled Ahm
YT 19 minutes 37 seconds
IEEE Symposium on Security and Privacy
220 Piano Extremely Simple Single Server PIR with Sublinear Server Computation Mingxun Zhou
YT 8 minutes 14 seconds
IEEE Symposium on Security and Privacy
227 Sabre Cutting through Adversarial Noise with Adaptive Spectral Filtering and Input Reconstructio
YT 15 minutes 29 seconds
IEEE Symposium on Security and Privacy
241 Backdooring Multimodal Learning 卡的不动弹
YT 13 minutes 36 seconds
IEEE Symposium on Security and Privacy
251 Text CRS A Generalized Certified Robustness Framework against Textual Adversarial Attacks Jane
YT 16 minutes 5 seconds
IEEE Symposium on Security and Privacy
252 SrcMarker Dual channel Source Code Watermarking via Scalable Code Transformations 杨博睿
YT 17 minutes 12 seconds
IEEE Symposium on Security and Privacy
262 A Representative Study on Human Detection of Artificially Generated Media Across Countries Joe
YT 14 minutes 59 seconds
IEEE Symposium on Security and Privacy
275 Don t Shoot the Messenger Localization Prevention of Satellite Internet Users Richard Mitev
YT 15 minutes 48 seconds
IEEE Symposium on Security and Privacy
276 Everyone for Themselves A Qualitative Study about Individual Security Setups of Open Source Sof
YT 13 minutes 8 seconds
IEEE Symposium on Security and Privacy
591 Where URLs Become Weapons Automated Discovery of SSRF Vulnerabilities in Web Applications Sam
YT 11 minutes 27 seconds
IEEE Symposium on Security and Privacy
280 NFCEraser A Security Threat of NFC Message Modification Caused by Quartz Crystal Oscillator Jo
YT 9 minutes 43 seconds
IEEE Symposium on Security and Privacy
282 Transferable Multimodal Attack on Vision Language Pre training Models haodi wang
YT 19 minutes 58 seconds
IEEE Symposium on Security and Privacy
284 Group Oblivious Message Retrieval Thomas
YT 19 minutes 4 seconds
IEEE Symposium on Security and Privacy
301 Scalable Verification of Zero Knowledge Protocols MIGUEL ISABEL MÁRQUEZ
YT 13 minutes 17 seconds
IEEE Symposium on Security and Privacy
305 LLMs Cannot Reliably Identify and Reason About Security Vulnerabilities Yet A Comprehensive Eva
YT 11 minutes 10 seconds
IEEE Symposium on Security and Privacy
307 Springproofs Efficient Inner Product Arguments for Vectors of Arbitrary Length Ming Su
YT 15 minutes 58 seconds
IEEE Symposium on Security and Privacy
335 Nightshade Prompt Specific Poisoning Attacks on Text to Image Generative Models Shawn Shan
YT 13 minutes 8 seconds
IEEE Symposium on Security and Privacy
339 NodeAwareSmoothing Yuni Lai Lena
YT 10 minutes 21 seconds
IEEE Symposium on Security and Privacy
398 Pulling Off The Mask Forensic Analysis of the Deceptive Creator Wallets Behind Smart Contract Fr
YT 16 minutes 23 seconds
IEEE Symposium on Security and Privacy
415 SoK Efficient Design and Implementation of Polynomial Hash Functions over Prime Fields Jan G
YT 12 minutes 18 seconds
IEEE Symposium on Security and Privacy
435 Measure Observe Remeasure An Interactive Paradigm for Differentially Private Exploratory Analysi
YT 15 minutes 56 seconds
IEEE Symposium on Security and Privacy
443 Targeted and Troublesome Zahra Moti Zahra Moti
YT 13 minutes 17 seconds
IEEE Symposium on Security and Privacy
446 Flash a comprehensive approach to intrusion detection via provenance graph representation learni
YT 19 minutes 43 seconds
IEEE Symposium on Security and Privacy
483 Pandora Principled Symbolic Validation of Intel SGX Enclave Runtimes Jo Van Bulck
YT 11 minutes 20 seconds
IEEE Symposium on Security and Privacy
520 BELT Old School Backdoor Attacks can Evade the State of the Art Defense with Backdoor Exclusivit
YT 9 minutes 56 seconds
IEEE Symposium on Security and Privacy
555 Patchy Performance Uncovering the Vulnerability Management Practices of IoT Centric Vendors S
YT 15 minutes 29 seconds
IEEE Symposium on Security and Privacy
574 Cohere Managing Differential Privacy in Large Scale Systems Nicolas Küchler
YT 16 minutes 39 seconds
IEEE Symposium on Security and Privacy
584 Break the Wall from bottom Automated Discovery of Protocol Level Evasion Vulnerabilities in Web
YT 15 minutes 27 seconds
IEEE Symposium on Security and Privacy
601 SHERPA Explainable Robust Algorithms for Privacy Preserved Federated Learning in Future Networks
YT 16 minutes 55 seconds
IEEE Symposium on Security and Privacy
605 Larger scale Nakamoto style Blockchains Don’t Necessarily Offer Better Security Jannik Albrech
YT 11 minutes 20 seconds
IEEE Symposium on Security and Privacy
617 PromptCARE Prompt Copyright Protection by Watermark Injection and Verification homeway yao
YT 16 minutes 42 seconds
IEEE Symposium on Security and Privacy
624 WeSee Using Malicious #VC Interrupts to Break AMD SEV SNP Supraja Sridhara
YT 19 minutes 43 seconds
IEEE Symposium on Security and Privacy
646 attackinng byzantine robustness in high dimensions kolluri aashish
YT 17 minutes 48 seconds
IEEE Symposium on Security and Privacy
646 SoK Prudent Evaluation Practices for Fuzzing Moritz Schloegel
YT 13 minutes 38 seconds
IEEE Symposium on Security and Privacy
665 Obelix Mitigating Side Channels Through Dynamic Obfuscation Jan
YT 20 minutes 16 seconds
IEEE Symposium on Security and Privacy
2024 05 22 02 41 48 H 264 Rui Xi
YT 15 minutes 4 seconds
IEEE Symposium on Security and Privacy
671 One for All and All for One GNN based Control Flow Attestation for Embedded Devices Richard M
YT 8 minutes 5 seconds
IEEE Symposium on Security and Privacy
699 CoreLocker Andrew Wang
YT 11 minutes 5 seconds
IEEE Symposium on Security and Privacy
2023 219 Formal Model Driven Analysis of Resilience of GossipSub to Attacks from Misbehaving Peers
YT 14 minutes 13 seconds
IEEE Symposium on Security and Privacy
694 LLMIF Augmented Large Language Model for Fuzzing IoT Devices Jincheng Wang
YT 16 minutes 20 seconds
IEEE Symposium on Security and Privacy
2024 11 NetShuffle Circumventing Censorship with Shuffle Proxies at the Edge Patrick Kon
YT 16 minutes 26 seconds
IEEE Symposium on Security and Privacy
2024 13 Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis
YT 17 minutes 2 seconds
IEEE Symposium on Security and Privacy
2024 18 A Practical Root Cause Analysis System with an Under Constrained State Mutation 박영기
YT 19 minutes 15 seconds
IEEE Symposium on Security and Privacy
2024 22 BUSted Microarchitectural Side Channel Attacks on the MCU Bus Interconnect Cristiano Rodri
YT 10 minutes 29 seconds
IEEE Symposium on Security and Privacy
2024 37 SoK Safer Digital Safety Research Involving At Risk Users Rosanna “Rosie” Bellini
YT 14 minutes 29 seconds
IEEE Symposium on Security and Privacy
2024 48 SwiftRange Vincent
YT 8 minutes 29 seconds
IEEE Symposium on Security and Privacy
2024 50 BAFFLE Mr HE Junda
YT 18 minutes 5 seconds
IEEE Symposium on Security and Privacy
2024 76 Formal Dolev Yao Models Meet Cryptographic Protocol Fuzz Testing Max Ammann
YT 15 minutes 5 seconds
IEEE Symposium on Security and Privacy
2024 100 The Dark Side of Scale Insecurity of Direct to Cell Satellite Mega Constellations 刘威
YT 8 minutes 52 seconds
IEEE Symposium on Security and Privacy
2024 102 BOUNCEATTACK A Query Efficient Decision based Adversarial Attack by Bouncing into the Wild
YT 19 minutes 37 seconds
IEEE Symposium on Security and Privacy
2024 124 LOKI Large scale Data Reconstruction Attack against Federated Learning through Model Manipu
YT 15 minutes 6 seconds
IEEE Symposium on Security and Privacy
2024 125 DeepTheft Stealing DNN Model Architectures through Power Side Channel Garrison Gao
YT 15 minutes 6 seconds
IEEE Symposium on Security and Privacy
2024 144 Withdrawing is believing Detecting Inconsistencies between Withdrawal Choices and Third par
YT 18 minutes 18 seconds
IEEE Symposium on Security and Privacy
2024 151 Shedding Light on CVSS Scoring Inconsistencies A User Centric Study on Evaluating Widespre
YT 18 minutes 48 seconds
IEEE Symposium on Security and Privacy
2024 158 Jaehan Kim PassREfinder Credential Stuffing Risk Prediction by Representing Password Reuse
YT 15 minutes 50 seconds
IEEE Symposium on Security and Privacy
2024 171 Private Analytics via Streaming, Sketching, and Silently Verifiable Proofs Mayank Rathee
YT 13 minutes 59 seconds
IEEE Symposium on Security and Privacy
2024 176 PolySphinx Extending the Sphinx Mix Format with Better Multicast Support Daniel Schadt
YT 12 minutes 43 seconds
IEEE Symposium on Security and Privacy
2024 196 The Times They Are A Changin Christos Tsoukaladelis
YT 8 minutes 11 seconds
IEEE Symposium on Security and Privacy
2024 205 FlowMur A Stealthy and Practical Audio Backdoor Attack with Limited Knowledge Jiahe Lan
YT 18 minutes 20 seconds
IEEE Symposium on Security and Privacy
2024 237 SoK Unintended Interactions among ML Defenses and Risks Vasisht Duddu
YT 7 minutes 44 seconds
IEEE Symposium on Security and Privacy
2024 319 FCert yantiing wang
YT 14 minutes 58 seconds
IEEE Symposium on Security and Privacy
2024 305 Pianist Scalable zkRollups via Fully Distributed Zero Knowledge Proofs Tianyi Liu
YT 13 minutes 18 seconds
IEEE Symposium on Security and Privacy
2024 265 eAudit A Fast, Scalable and Deployable Audit Data Collection System Hanke Kimm
YT 19 minutes 26 seconds
IEEE Symposium on Security and Privacy
2024 431 Routing Attacks on Cryptocurrency Mining Pools Muoi Tran
YT 19 minutes 1 second
IEEE Symposium on Security and Privacy
2024 467 ARMOR A Formally Verified Implementation of X 509 Certificate Chain Validation Joyanta De
YT 9 minutes 15 seconds
IEEE Symposium on Security and Privacy
2024 517 Understanding and Benchmarking the Commonality of Adversarial Examples cheng yushi
YT 19 minutes 20 seconds
IEEE Symposium on Security and Privacy
2024 519 From Individual Computation to Allied Optimization Remodeling Privacy Preserving Neural Inf
YT 17 minutes 16 seconds
IEEE Symposium on Security and Privacy
2024 471 Private Hierarchical Governance for Encrypted Messaging Armin Namavari
YT 18 minutes 7 seconds
IEEE Symposium on Security and Privacy
2024 637 Poisoned ChatGPT Finds Work for Idle Hands Exploring Developers Coding Practices with Inse
YT 15 minutes 29 seconds
IEEE Symposium on Security and Privacy
Backdooring Multimodal Learning
YT 9 minutes 16 seconds
IEEE Symposium on Security and Privacy
Chronos presentation sard Chen
YT 17 minutes 11 seconds
IEEE Symposium on Security and Privacy
MEA Defender Lv Peizhuo
YT 14 minutes 54 seconds
IEEE Symposium on Security and Privacy
GroVE 20mins S&P Asim Waheed
YT 18 minutes 45 seconds
IEEE Symposium on Security and Privacy
LowerBoundsRDP Tim Kutta
YT 20 minutes
IEEE Symposium on Security and Privacy
SP24 HD Florian Hantke
YT 19 minutes 20 seconds
IEEE Symposium on Security and Privacy
sp24 long recording Jannis Rautenstrauch
YT 16 minutes 16 seconds
IEEE Symposium on Security and Privacy
video Zhen Xiang
YT 7 minutes 58 seconds
IEEE Symposium on Security and Privacy
sokvideo v1 Max N
YT 10 minutes 59 seconds
IEEE Symposium on Security and Privacy
video1092237667 Hoang Nguyen Dai
YT 15 minutes 26 seconds
IEEE Symposium on Security and Privacy
211 Multi Instance Adversarial Attack on GNN Based Malicious Domain Detection Mahmoud Khaled Ahm
YT 13 minutes 18 seconds
IEEE Symposium on Security and Privacy
2024 265 eAudit A Fast, Scalable and Deployable Audit Data Collection System Hanke Kimm
YT 15 minutes 5 seconds
IEEE Symposium on Security and Privacy
2024 100 The Dark Side of Scale Insecurity of Direct to Cell Satellite Mega Constellations 刘威
YT 13 minutes 36 seconds
IEEE Symposium on Security and Privacy
251 Text CRS A Generalized Certified Robustness Framework against Textual Adversarial Attacks Jane
YT 10 minutes 21 seconds
IEEE Symposium on Security and Privacy
398 Pulling Off The Mask Forensic Analysis of the Deceptive Creator Wallets Behind Smart Contract Fr
YT 16 minutes 26 seconds
IEEE Symposium on Security and Privacy
2024 13 Holistic Concolic Execution for Dynamic Web Applications via Symbolic Interpreter Analysis
YT 17 minutes 29 seconds
IEEE Symposium on Security and Privacy
#144 TCP Spoofing Reliable Payload Transmission Past the Spoofed TCP Handshake Eric Pan
YT 8 minutes 5 seconds
IEEE Symposium on Security and Privacy
699 CoreLocker Andrew Wang
YT 15 minutes 56 seconds
IEEE Symposium on Security and Privacy
443 Targeted and Troublesome Zahra Moti Zahra Moti
YT 18 minutes 7 seconds
IEEE Symposium on Security and Privacy
2024 637 Poisoned ChatGPT Finds Work for Idle Hands Exploring Developers Coding Practices with Inse
YT 8 minutes 21 seconds
IEEE Symposium on Security and Privacy
132 Certifying Zero Knowledge Circuits with Refinement Types Junrui Liu
YT 17 minutes 2 seconds
IEEE Symposium on Security and Privacy
75 Serberus Protecting Cryptographic Code frrom Spectres at Compile Time Nicholas Hunter Mosier
YT 18 minutes 14 seconds
IEEE Symposium on Security and Privacy
14 TuDoor new Xiang Li
YT 13 minutes 18 seconds
IEEE Symposium on Security and Privacy
2024 25 MQTTactic Security Analysis and Verification for Logic Flaws in MQTT Implementations szx
YT 5 minutes 28 seconds
IEEE Symposium on Security and Privacy
183 Who Left the Door Open Investigating the Causes of Exposed IoT Devices in an Academic Network
YT 15 minutes 10 seconds
IEEE Symposium on Security and Privacy
320 Signing in Four Public Software Package Registries Quantity, Quality, and Influencing Factors
YT 16 minutes 48 seconds
IEEE Symposium on Security and Privacy
tor1 Zhongtang Luo
YT 11 minutes 56 seconds
IEEE Symposium on Security and Privacy
602 Rethinking IC Layout Vulnerability Simulation Based Hardware Trojan Threat Assessment with High
YT 18 minutes 55 seconds
IEEE Symposium on Security and Privacy
114 GAuV Xingyu Xie
YT 19 minutes 44 seconds
IEEE Symposium on Security and Privacy
431 Asterisk Super fast MPC with a Friend Protik Paul
YT 20 minutes 15 seconds
IEEE Symposium on Security and Privacy
gpuzip 20 yingchen wang
YT 18 minutes 57 seconds
IEEE Symposium on Security and Privacy
239 Nebula A Privacy First Platform for Data Backhaul Jean Luc Watson
YT 18 minutes 40 seconds
IEEE Symposium on Security and Privacy
582 Janus Safe Biometric Deduplication for Humanitarian Aid Distribution kasra EdalatNejad
YT 18 minutes 52 seconds
IEEE Symposium on Security and Privacy
270 An Analysis of Recent Advances in Deepfake Image Detection in an Evolving Threat Landscape sif
YT 9 minutes 11 seconds
IEEE Symposium on Security and Privacy
2024 531 Please Tell Me More Liu Han
YT 17 minutes 55 seconds
IEEE Symposium on Security and Privacy
S&PFinal Louis Henri
YT 12 minutes 21 seconds
IEEE Symposium on Security and Privacy
cut final presentation Sönke Huster
YT 14 minutes 16 seconds
IEEE Symposium on Security and Privacy
545video Irina Ford
YT 13 minutes 53 seconds
IEEE Symposium on Security and Privacy
Ati Priya Bajaj Len or index or count, anything but v1 Predicting Variable Names in Decompilation Ou
YT 17 minutes 4 seconds
IEEE Symposium on Security and Privacy
CanWeCastABallotAsIntendedAndBeReceiptFree Henri Devillez
YT 15 minutes 8 seconds
IEEE Symposium on Security and Privacy
2024 108 DeepShuffle A Lightweight Defense Framework against Adversarial Fault Injection Attacks on
YT 15 minutes 40 seconds
IEEE Symposium on Security and Privacy
311 Scalable Mixed Mode MPC Radhika Garg
YT 19 minutes 55 seconds
IEEE Symposium on Security and Privacy
2024 449 Undefined oriented Programming Detecting and Chaining Prototype Pollution Gadgets in Node
YT 15 minutes 54 seconds
IEEE Symposium on Security and Privacy
588 From Principle to Practice Vertical Data Minimization for Machine Learning Robin Staab
YT 8 minutes 37 seconds
IEEE Symposium on Security and Privacy
433 On SMS Phishing Tactics and Infrastructure Alex Nahapetyan
YT 15 minutes 29 seconds
IEEE Symposium on Security and Privacy
574 Cohere Managing Differential Privacy in Large Scale Systems Nicolas Küchler
YT 15 minutes 34 seconds
IEEE Symposium on Security and Privacy
02 Saiid El Hajj Chehade SINBAD 20 min Saiid El Hajj Chehade
YT 18 minutes 17 seconds
IEEE Symposium on Security and Privacy
272 SneakyPrompt Jailbreaking Text to image Generative Models Yuchen Yang
YT 12 minutes 43 seconds
IEEE Symposium on Security and Privacy
59 Hyena Balancing Packing, Reuse, and Rotations for Encrypted Inference Sarabjeet Singh
YT 14 minutes 24 seconds
IEEE Symposium on Security and Privacy
sp 2024 holepunch final Zachary Ratliff
YT 22 minutes 27 seconds
IEEE Symposium on Security and Privacy
Eureka Presentation Yu Wei
YT 19 minutes 58 seconds
IEEE Symposium on Security and Privacy
727 From Chatbots to Phishbots Phishing Scam Generation in Commercial Large Language Models Sayak
YT 11 minutes 21 seconds
IEEE Symposium on Security and Privacy
86 Understanding Parents' Perceptions and Practices Toward Children's Security and Privacy in Virtua
YT 19 minutes 56 seconds
IEEE Symposium on Security and Privacy
2024 567 More is Merrier Relax the Non Collusion Assumption in Multi Server PIR esnierde
YT 10 minutes 43 seconds
IEEE Symposium on Security and Privacy
Practical Attacks Against DNS Reputation Systems
YT 16 minutes 54 seconds
IEEE Symposium on Security and Privacy
308 SoK CollusionResistantMPSI Jelle Vos
YT 14 minutes 20 seconds
IEEE Symposium on Security and Privacy
2024 456 State aware Fuzzing on Trusted OS Designed for IoT Devices Qinying
YT 15 minutes 46 seconds
IEEE Symposium on Security and Privacy
2024 88 AFGEN Whole Function Fuzzing for Applications and Libraries Yuwei LIU 1
YT 18 minutes 43 seconds
IEEE Symposium on Security and Privacy
79 Leaky Address Masking Mathé Hertogh 1
YT 21 minutes 33 seconds
IEEE Symposium on Security and Privacy
243 MAWSEO Adversarial Wiki Search Poisoning for Illicit Online Promotion Zilong Lin
YT 19 minutes 26 seconds
IEEE Symposium on Security and Privacy
556 Pudding Private User Discovery in Anonymity Networks Ceren Kocaogullar
YT 14 minutes 54 seconds
IEEE Symposium on Security and Privacy
526 From Virtual Touch to Tesla Command Unlocking Unauthenticated Control Chains From Smart Glasses
YT 10 minutes 59 seconds
IEEE Symposium on Security and Privacy
2024 winter 448 Efficient Actively Secure DPF and RAM based 2PC with One Bit Leakage Wenhao Zhang
YT 17 minutes 56 seconds
IEEE Symposium on Security and Privacy
2024 62 Enforcing End to end Security for Remote Conferencing Triste L
YT 13 minutes 38 seconds
IEEE Symposium on Security and Privacy
258 ALIF Low Cost Adversarial Audio Attacks on Black Box Speech Platforms using Linguistic Features
YT 16 minutes 42 seconds
IEEE Symposium on Security and Privacy
2024 61 ERASAN Efficient Rust Address Sanitizer Jiun Min
YT 16 minutes 11 seconds
IEEE Symposium on Security and Privacy
2024 57 Counterexample Guided Directed Fuzzing via Likely Invariant Inference Shadow HUANG
YT 17 minutes 28 seconds
IEEE Symposium on Security and Privacy
24 Architectural Mimicry Innovative Instructions to Efficiently Address Control Flow Leakage in Dat
YT 11 minutes 12 seconds
IEEE Symposium on Security and Privacy
322 SoK SGX Fail How Stuff Gets eXposed Stephan van Schaik
YT 18 minutes 59 seconds
IEEE Symposium on Security and Privacy
2024 606 BOLT Privacy Preserving, Accurate and Efficient Inference for Transformers Qi Pang
YT 10 minutes 52 seconds
IEEE Symposium on Security and Privacy
706 A Security Analysis of Honey Vaults Fei Duan
YT 16 minutes 57 seconds
IEEE Symposium on Security and Privacy
#81 The Role of User Agent Interactions on Mobile Money Practices Karen Sowon
YT 12 minutes 20 seconds
IEEE Symposium on Security and Privacy
366 CaFA Cost aware, Feasible Attacks With Database Constraints Matan BT
YT 14 minutes 42 seconds
IEEE Symposium on Security and Privacy
2024 500 Exploring the Orthogonality and Linearity of Backdoor Attacks Kaiyuan Zhang
YT 15 minutes 31 seconds
IEEE Symposium on Security and Privacy
202 Ad Inventory Pooling in the Ad Tech Supply Chain Yash Vekaria
YT 9 minutes 41 seconds
IEEE Symposium on Security and Privacy
434 Casual Users and Rational Choices within Differential Privacy Narges Ashena
YT 15 minutes 9 seconds
IEEE Symposium on Security and Privacy
Practical Obfuscation of BLE Physical Layer Fingerprints on Mobile Devices Hadi Givehchian
YT 10 minutes 32 seconds
IEEE Symposium on Security and Privacy
2024 614 Few shot Unlearning Youngsik Yoon
YT 11 minutes 36 seconds
IEEE Symposium on Security and Privacy
117 Cheng Gongye Side Channel Assisted Reverse Engineering of Encrypted DNN Hardware Accelerator IP
YT 19 minutes 51 seconds
IEEE Symposium on Security and Privacy
ItsSimplexIEEES+P 20min Andrew Cullen
YT 16 minutes 42 seconds
IEEE Symposium on Security and Privacy
428 Understanding the Privacy Practices of Political Campaigns A Perspective from the 2020 US Electi
YT 19 minutes 56 seconds
IEEE Symposium on Security and Privacy
354 Tabbed Out Subverting the Android Custom Tab Security Model Philipp Beer
YT 14 minutes 27 seconds
IEEE Symposium on Security and Privacy
362 Thwarting Last Minute Voter Coercion Rosario Giustolisi
YT 19 minutes 36 seconds
IEEE Symposium on Security and Privacy
174 Automated Synthesis of Effect Graph Policies for Microservice Aware Stateful System Call Special
YT 11 minutes 2 seconds
IEEE Symposium on Security and Privacy
155 Specular Towards Secure, Trust minimized Optimistic Blockchain Execution Zhe Ye
YT 15 minutes 58 seconds
IEEE Symposium on Security and Privacy
2024 267 Wear's my Data Understanding the Cross Device Runtime Permission Model in Wearables Dogu
YT 12 minutes 31 seconds
IEEE Symposium on Security and Privacy
MPCitH without reputation IEEE S^0P online qw gao
YT 10 minutes 40 seconds
IEEE Symposium on Security and Privacy
153 APP Miner Detecting API Misuses via Automatically Mining API Path Patterns Jiasheng Jiang
YT 20 minutes 1 second
IEEE Symposium on Security and Privacy
104 Pryde A Modular Generalizable Workflow for Uncovering Evasion Attacks Against Stateful Firewall
YT 19 minutes 15 seconds
IEEE Symposium on Security and Privacy
S&P 2024 hvc Nicholas Ngai
YT 21 minutes 29 seconds
IEEE Symposium on Security and Privacy
MIMOCrypt Jun Luo John