_    ___ ___      _                               
/ \ |_ _/ _ \ ___| |_ _ __ ___ __ _ _ __ ___ ___
/ _ \ | | | | / __| __| '__/ _ \/ _` | '_ ` _ \/ __|
/ ___ \ | | |_| \__ \ |_| | | __/ (_| | | | | | \__ \
/_/ \_\___\___/|___/\__|_| \___|\__,_|_| |_| |_|___/
Twitch
Invidious (YT)

Invidious > Channel > IEEE Symposium on Security and Privacy

Trending
IEEE Symposium on Security and Privacy 9400 subscribers    RSS
View channel on YouTube
Videos
Playlists

YT 1 minute 1 second
IEEE Symposium on Security and Privacy
MarkUs: Drop-in Use-after-free Prevention for Low-level Languages
YT 56 seconds
IEEE Symposium on Security and Privacy
ZEXE: Enabling Decentralized Private Computation
YT 1 minute
IEEE Symposium on Security and Privacy
Fuzzing JavaScript Engines with Aspect-preserving Mutation
YT 1 minute
IEEE Symposium on Security and Privacy
Tactical Provenance Analysis for Endpoint Detection and Response Systems
YT 1 minute
IEEE Symposium on Security and Privacy
PMP: Cost-effective Forced Execution with Probabilistic Memory Pre-planning
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
SoK: Differential Privacy as a Causal Property
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
Spectector: Principled Detection of Speculative Information Flows
YT 58 seconds
IEEE Symposium on Security and Privacy
Transparent Polynomial Delegation and its Applications to Zero Knowledge Proofs
YT 1 minute
IEEE Symposium on Security and Privacy
Privacy Risks of General-Purpose Language Models
YT 1 minute
IEEE Symposium on Security and Privacy
A Programming Framework for Differential Privacy with Accuracy Concentration Bounds
YT 1 minute 2 seconds
IEEE Symposium on Security and Privacy
RetroWrite: Statically Instrumenting COTS Binaries for Fuzzing and Sanitization
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
FLYCLIENT: Super Light Client for Cryptocurrencies
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
EverCrypt: A Fast, Verified, Cross-Platform Cryptographic Provider
YT 1 minute
IEEE Symposium on Security and Privacy
Cornucopia: Temporal Safety for CHERI Heaps
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
A Security Analysis of the Facebook Ad Library
YT 58 seconds
IEEE Symposium on Security and Privacy
Towards Effective Differential Privacy Communication for Users’ Data Sharing Decision and Comprehens
YT 58 seconds
IEEE Symposium on Security and Privacy
Towards Effective Differential Privacy Communication for Users’ Data Sharing Decision and Comprehens
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
Ex-vivo Dynamic Analysis Framework for Android Device Drivers
YT 1 minute
IEEE Symposium on Security and Privacy
Automatically Detecting Bystanders in Photos to Reduce Privacy Risks
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
This PIN Can Be Easily Guessed: Analyzing the Security of Smartphone Unlock PINs
YT 57 seconds
IEEE Symposium on Security and Privacy
Krace: Data Race Fuzzing for Kernel File Systems
YT 1 minute
IEEE Symposium on Security and Privacy
Formal Modeling and Proof in the CHERI Design and Implementation Process
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
Path Oblivious Heap
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
Path Oblivious Heap
YT 58 seconds
IEEE Symposium on Security and Privacy
Measuring Legal Compliance of Banners from IAB Europe’s Transparency and Consent Framework
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
SEIMI: Efficient and Secure SMAP-Enabled Intra-process Memory Isolation
YT 59 seconds
IEEE Symposium on Security and Privacy
SAVIOR: Towards Bug-driven Hybrid Testing
YT 59 seconds
IEEE Symposium on Security and Privacy
Semantic Understanding of Smart Contracts: Executable Operational Semantics of Solidity
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
Meddling Middlemen: Empirical Analysis of the Risks of Data Saving Mobile Browsers
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
Are Anonymity Seekers Just Like Everybody Else? An Analysis of Contributions to Wikipedia from Tor
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
Private Resource Allocators and Their Applications
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
Plundervolt: Software-based Fault Injection Attacks against Intel SGX
YT 1 minute 2 seconds
IEEE Symposium on Security and Privacy
AdGraph: A Graph-Based Approach to Ad and Tracker Blocking
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
How Not to Prove Your Election Outcome
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
Are We Susceptible to Rowhammer? An End-to-End Methodology for Cloud Providers
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
SEVurity: No Security Without Integrity
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
Detection of Electromagnetic Interference Attacks on Sensor Systems
YT 1 minute
IEEE Symposium on Security and Privacy
Full-band De-anonymization of Bluetooth Classic Devices
YT 1 minute
IEEE Symposium on Security and Privacy
A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network
YT 59 seconds
IEEE Symposium on Security and Privacy
Towards Scalable Threshold Cryptosystems
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
Understanding and Mitigating Security Risks of General Messaging Protocols on IoT Clouds
YT 1 minute 2 seconds
IEEE Symposium on Security and Privacy
Neutaint: Efficient Dynamic Taint Analysis with Neural Networks
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
Establishing Economic Incentives for Security Patching of IoT Consumer Products
YT 1 minute
IEEE Symposium on Security and Privacy
Message Time of Arrival Codes: A Fundamental Primitive for Secure Distance Measurement
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
Automatic Uncovering of Hidden Behaviors From Input Validation in Mobile Apps
YT 1 minute
IEEE Symposium on Security and Privacy
OHIE: Blockchain Scaling Made Simple
YT 1 minute
IEEE Symposium on Security and Privacy
Enabling Rack scale Confidential Computing using Heterogeneous Trusted Execution Environment
YT 1 minute
IEEE Symposium on Security and Privacy
Enabling Rack scale Confidential Computing using Heterogeneous Trusted Execution Environment
YT 1 minute
IEEE Symposium on Security and Privacy
JIT Leaks: Inducing Timing Side Channels through Just-in-Time Compilation
YT 1 minute
IEEE Symposium on Security and Privacy
Sync HotStuff: Simple and Practical Synchronous State Machine Replication
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
Intriguing Properties of Adversarial ML Attacks in the Problem Space
YT 1 minute
IEEE Symposium on Security and Privacy
Throwing Darts in the Dark: Detecting Bots with Limited Data using Neural Data Augmentation
YT 1 minute
IEEE Symposium on Security and Privacy
NetCAT: Practical Cache Attacks from the Network
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
RAMBleed: Reading Bits in Memory Without Accessing Them
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
SoK: A Minimalist Approach to Formalizing Analog Sensor Security
YT 58 seconds
IEEE Symposium on Security and Privacy
BIAS: Bluetooth Impersonation AttackS
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
TRRespass: Exploiting the Many Sides of Target Row Refresh Row Refresh
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
CrypTFlow: Secure TensorFlow Inference
YT 1 minute
IEEE Symposium on Security and Privacy
CAPSULe: Cross-FPGA Covert-Channel Attacks through Power Supply Unit Leakage
YT 56 seconds
IEEE Symposium on Security and Privacy
OAT Attesting Operation Integrity of Embedded Devices
YT 1 minute
IEEE Symposium on Security and Privacy
Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
TARDIS: Rolling Back The Clock On CMS-Targeting Cyber Attacks
YT 58 seconds
IEEE Symposium on Security and Privacy
SoK: Cyber Insurance -- Technical Challenges and a System Roadmap
YT 1 minute
IEEE Symposium on Security and Privacy
The Value of Collaboration in Convex Machine Learning with Differential Privacy
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
Transys: Leveraging Common Security Properties Across Hardware Designs
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
Gesture Authentication for Smartphones: Evaluation of Gesture Password Selection Policies
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
Kobold: Evaluating Decentralized Access Control for Remote NSXPC Methods on iOS
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
SPECCFI Mitigating Spectre Attacks Using CFI Informed Speculation
YT 1 minute
IEEE Symposium on Security and Privacy
High Precision Open World Website Fingerprinting
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
SPIDER: Enabling Fast Patch Propagation in Related Software Repositories
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
xMP Selective Memory Protection for Kernel and User Space
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
BinsecRel: Efficient Relational Symbolic Execution for Constant-Time at Binary-Level
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
TextExerciser: Feedback driven Text Input Exercising for Android Applications
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
A Tale of Sea and Sky: On the Security of Maritime VSAT Communications
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
Pangolin: Incremental Hybrid Fuzzing via Polyhedral Path Abstraction
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
An Analysis of Pre-installed Android Software
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
Ask the Experts: What Should Be on an IoT Privacy and Security Label
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
IJON: Exploring Deep State Spaces via Fuzzing
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
Towards a Natural Perspective of Smart Homes for Practical Security and Safety Analyses
YT 1 minute 2 seconds
IEEE Symposium on Security and Privacy
Replicated State Machines without Replicated Execution
YT 57 seconds
IEEE Symposium on Security and Privacy
Flaw Label: Exploiting IPv6 Flow Label
YT 1 minute
IEEE Symposium on Security and Privacy
ICLab: A Global, Longitudinal Internet Censorship Measurement Platform
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
Pseudorandom Black Swans: Cache Attacks on CTR_DRBG
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
Breaking and (Partially) Fixing Provably Secure Onion Routing
YT 57 seconds
IEEE Symposium on Security and Privacy
KARONTE: Detecting Insecure Multi-binary Interactions in Embedded Firmware
YT 56 seconds
IEEE Symposium on Security and Privacy
HopSkipJumpAttack: A Query-Efficient Decision-Based Attack
YT 1 minute
IEEE Symposium on Security and Privacy
Combating Dependence Explosion in Forensic Analysis Using Alternative Tag Propagation Semantics
YT 53 seconds
IEEE Symposium on Security and Privacy
SoK: Understanding the Prevailing Security Vulnerabilities in TrustZone-assisted TEE Systems
YT 1 minute
IEEE Symposium on Security and Privacy
The Many Kinds of Creepware Used for Interpersonal Attacks
YT 55 seconds
IEEE Symposium on Security and Privacy
Leveraging EM Side-Channel Information to Detect Rowhammer Attacks
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
Can Voters Detect Malicious Manipulation of Ballot Marking Devices?
YT 1 minute
IEEE Symposium on Security and Privacy
VerX: Safety Verification of Smart Contracts
YT 59 seconds
IEEE Symposium on Security and Privacy
Automated Reverse Engineering and Privacy Analysis of Modern Cars
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
ICAS: Integrated Circuit Attack Surface
YT 1 minute
IEEE Symposium on Security and Privacy
A Comparative Usability Study of FIDO2 Passwordless Authentication
YT 59 seconds
IEEE Symposium on Security and Privacy
Humpty Dumpty: Controlling Word Meanings via Corpus Poisoning
YT 1 minute
IEEE Symposium on Security and Privacy
HydRand: Efficient Continuous Distributed Randomness
YT 1 minute
IEEE Symposium on Security and Privacy
WaveSpy: Remote and Through wall Screen Attack via mmWave Sensing
YT 1 minute
IEEE Symposium on Security and Privacy
VeriSmart: A Highly Precise Safety Verifier for Ethereum Smart Contracts
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
Dragonblood Analyzing the Dragonfly Handshake of WPA3 and EAP pwd
YT 1 minute 1 second
IEEE Symposium on Security and Privacy
Unexpected Data Dependency Creation and Chaining A New Attack to SDN
YT 1 minute
IEEE Symposium on Security and Privacy
Browsing Unicity: On the Limits of Anonymizing Web Tracking Data