_    ___ ___      _                               
/ \ |_ _/ _ \ ___| |_ _ __ ___ __ _ _ __ ___ ___
/ _ \ | | | | / __| __| '__/ _ \/ _` | '_ ` _ \/ __|
/ ___ \ | | |_| \__ \ |_| | | __/ (_| | | | | | \__ \
/_/ \_\___\___/|___/\__|_| \___|\__,_|_| |_| |_|___/
Twitch
Invidious (YT)

Invidious > Channel > IEEE Symposium on Security and Privacy

Trending
IEEE Symposium on Security and Privacy 9400 subscribers    RSS
View channel on YouTube
Videos
Playlists

YT 51 minutes 36 seconds
IEEE Symposium on Security and Privacy
IEEE S&P 2022 Opening Session
YT 1 second

[Private video]
YT 18 minutes 31 seconds
IEEE Symposium on Security and Privacy
Jigsaw: Efficient and Scalable Path Constraints Fuzzing
YT 23 minutes 43 seconds
IEEE Symposium on Security and Privacy
BEACON : Directed Grey-Box Fuzzing with Provable Path Pruning
YT 20 minutes 14 seconds
IEEE Symposium on Security and Privacy
SAILFISH: Vetting Smart Contract State-Inconsistency Bugs in Seconds
YT 18 minutes 54 seconds
IEEE Symposium on Security and Privacy
ZeeStar: Private Smart Contracts by Homomorphic Encryption and Zero-knowledge Proofs
YT 15 minutes 39 seconds
IEEE Symposium on Security and Privacy
Quantifying Blockchain Extractable Value: How dark is the forest?
YT 20 minutes 7 seconds
IEEE Symposium on Security and Privacy
vSGX: Virtualizing SGX Enclaves on AMD SEV
YT 20 minutes 45 seconds
IEEE Symposium on Security and Privacy
A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP
YT 21 minutes 46 seconds
IEEE Symposium on Security and Privacy
RT-TEE: Real-time System Availability for Cyber-physical Systems using ARM TrustZone
YT 16 minutes 57 seconds
IEEE Symposium on Security and Privacy
A Secret-Free Hypervisor: Rethinking Isolation in the Age of Speculative Vulnerabilities
YT 17 minutes 56 seconds
IEEE Symposium on Security and Privacy
SMILE: Secure Memory Introspection for Live Enclave
YT 16 minutes 10 seconds
IEEE Symposium on Security and Privacy
SoK: Practical Foundations for Software Spectre Defenses
YT 20 minutes 52 seconds
IEEE Symposium on Security and Privacy
SpecHammer: Combining Spectre and Rowhammer for New Speculative Attacks
YT 19 minutes 14 seconds
IEEE Symposium on Security and Privacy
Spook.js: Attacking Chrome Strict Site Isolation via Speculative Execution
YT 19 minutes 16 seconds
IEEE Symposium on Security and Privacy
Blacksmith: Compromising Target Row Refresh by Rowhammering in the Frequency Domain
YT 18 minutes 42 seconds
IEEE Symposium on Security and Privacy
PROTRR: Principled yet Optimal In-DRAM Target Row Refresh
YT 18 minutes 10 seconds
IEEE Symposium on Security and Privacy
Automated Attack Synthesis by Extracting Finite State Machines from Protocol Specification Documents
YT 17 minutes 12 seconds
IEEE Symposium on Security and Privacy
ProVerif with Lemmas, Induction, Fast Subsumption, and Much More
YT 17 minutes 6 seconds
IEEE Symposium on Security and Privacy
Four Attacks and a Proof for Telegram
YT 18 minutes 29 seconds
IEEE Symposium on Security and Privacy
A Formal Security Analysis of the W3C Web Payment APIs: Attacks and Verification
YT 20 minutes 5 seconds
IEEE Symposium on Security and Privacy
Cats vs. Spectre: An Axiomatic Approach to Modeling Speculative Execution Attacks
YT 24 minutes 40 seconds
IEEE Symposium on Security and Privacy
TASHAROK—Using Mechanism Design for Enhancing Security Resource Allocation in Interdependent Systems
YT 16 minutes 11 seconds
IEEE Symposium on Security and Privacy
Statistical Quantification of Differential Privacy: A Local Approach
YT 17 minutes 31 seconds
IEEE Symposium on Security and Privacy
Locally Differentially Private Sparse Vector Aggregation
YT 16 minutes 45 seconds
IEEE Symposium on Security and Privacy
Differentially Private Histograms in the Shuffle Model from Fake Users
YT 19 minutes 42 seconds
IEEE Symposium on Security and Privacy
De-Identification's Impact on Minority Representation and Privacy Preservation in the US Census
YT 17 minutes 38 seconds
IEEE Symposium on Security and Privacy
Are We There Yet? Timing and Floating-Point Attacks on Differential Privacy Systems
YT 20 minutes 28 seconds
IEEE Symposium on Security and Privacy
Asleep at the Keyboard? Assessing the Security of GitHub Copilot's Code Contributions
YT 17 minutes 4 seconds
IEEE Symposium on Security and Privacy
Spinning Language Models: Risks of Propaganda-as-a-Service and Countermeasures
YT 17 minutes 14 seconds
IEEE Symposium on Security and Privacy
SoK: How Robust is Image Classification Deep Neural Network Watermarking?
YT 17 minutes 40 seconds
IEEE Symposium on Security and Privacy
Transcending TRANSCEND: Revisiting Malware Classification in the Presence of Concept Drift
YT 18 minutes 56 seconds
IEEE Symposium on Security and Privacy
Copy, Right? A Testing Framework for Copyright Protection of Deep Learning Models
YT 20 minutes 10 seconds
IEEE Symposium on Security and Privacy
Noise: A Library of Verified High-Performance Secure Channel Protocol Implementations
YT 18 minutes 4 seconds
IEEE Symposium on Security and Privacy
A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols
YT 16 minutes 31 seconds
IEEE Symposium on Security and Privacy
IronMask: Versatile Verification of Masking Security
YT 16 minutes 31 seconds
IEEE Symposium on Security and Privacy
SoK: Authentication in Augmented and Virtual Reality
YT 22 minutes 28 seconds
IEEE Symposium on Security and Privacy
Delay Wreaks Havoc on Your Smart Home: Delay-based Automation Interference Attacks
YT 21 minutes 53 seconds
IEEE Symposium on Security and Privacy
Peekaboo: A Hub-Based Approach to Enable Transparency in Data Processing within Smart Homes
YT 20 minutes 58 seconds
IEEE Symposium on Security and Privacy
ShadeWatcher: Recommendation-guided Cyber Threat Analysis using System Audit Records
YT 18 minutes 19 seconds
IEEE Symposium on Security and Privacy
SIRAJ: A Unified Framework for Aggregation of Malicious Entity Detectors
YT 19 minutes 1 second
IEEE Symposium on Security and Privacy
DeepCASE: Semi-Supervised Contextual Analysis of Security Events
YT 17 minutes 23 seconds
IEEE Symposium on Security and Privacy
DEPCOMM: Graph Summarization on System Audit Logs for Attack Investigation
YT 21 minutes 15 seconds
IEEE Symposium on Security and Privacy
Measuring and Mitigating the Risk of IP Reuse on Public Clouds
YT 16 minutes 5 seconds
IEEE Symposium on Security and Privacy
SecFloat: Accurate Floating-Point meets Secure 2-Party Computation
YT 16 minutes 52 seconds
IEEE Symposium on Security and Privacy
Multi-Server Verifiable Computation of Low-Degree Polynomials
YT 15 minutes 37 seconds
IEEE Symposium on Security and Privacy
Why Crypto-detectors Fail: A Systematic Evaluation of Cryptographic Misuse Detection Techniques
YT 21 minutes 56 seconds
IEEE Symposium on Security and Privacy
"They're not that hard to mitigate"—What Cryptographic Library Developers Think About Timing Attacks
YT 1 second

[Private video]
YT 22 minutes 33 seconds
IEEE Symposium on Security and Privacy
Phishing in Organizations: Findings from a Large-Scale and Long-Term Study
YT 19 minutes 18 seconds
IEEE Symposium on Security and Privacy
Investigating the Use of Email Encryption for an Entire University
YT 20 minutes 33 seconds
IEEE Symposium on Security and Privacy
Investigating Influencer VPN Ads on YouTube
YT 21 minutes 52 seconds
IEEE Symposium on Security and Privacy
How Does Usable Security Not End Up in Software Products? Results From a Qualitative Interview Study
YT 20 minutes 13 seconds
IEEE Symposium on Security and Privacy
Mitigating Information Leakage Vulnerabilities with Type-based Data Isolation
YT 19 minutes 31 seconds
IEEE Symposium on Security and Privacy
SYMBEXCEL: Automated Analysis and Understanding of Malicious Excel 4.0 Macros
YT 18 minutes 31 seconds
IEEE Symposium on Security and Privacy
Heapster: Analyzing the Security of Dynamic Allocators for Monolithic Firmware Images
YT 17 minutes 28 seconds
IEEE Symposium on Security and Privacy
SoK: Demystifying Binary Lifters Through the Lens of Downstream Applications
YT 19 minutes 4 seconds
IEEE Symposium on Security and Privacy
Graphics Peeping Unit: Exploiting EM Side-Channel Information of GPUs to Eavesdrop on Your Neighbors
YT 19 minutes 20 seconds
IEEE Symposium on Security and Privacy
Adversarial Prefetch: New Cross-Core Cache Side Channel Attacks
YT 19 minutes 41 seconds
IEEE Symposium on Security and Privacy
Finding and Exploiting CPU Features using MSR Templating
YT 16 minutes 42 seconds
IEEE Symposium on Security and Privacy
Augury: Using Data Memory-Dependent Prefetchers to Leak Data at Rest
YT 13 minutes 24 seconds
IEEE Symposium on Security and Privacy
MeshUp: Stateless Cache Side-channel Attack on CPU Mesh
YT 18 minutes 16 seconds
IEEE Symposium on Security and Privacy
Timing-Based Browsing Privacy Vulnerabilities Via Site Isolation
YT 20 minutes 45 seconds
IEEE Symposium on Security and Privacy
WtaGraph: Web Tracking and Advertising Detection using Graph Neural Networks
YT 17 minutes 25 seconds
IEEE Symposium on Security and Privacy
Surakav: Generating Realistic Traces for a Strong Website Fingerprinting Defense
YT 23 minutes
IEEE Symposium on Security and Privacy
Wobfuscator: Obfuscating JavaScript Malware via Opportunistic Translation to WebAssembly
YT 17 minutes 21 seconds
IEEE Symposium on Security and Privacy
The State of the SameSite: Studying the Usage, Effectiveness, and Adequacy of SameSite Cookies
YT 19 minutes 26 seconds
IEEE Symposium on Security and Privacy
Private Approximate Nearest Neighbor Search
YT 20 minutes 1 second
IEEE Symposium on Security and Privacy
Spiral: Fast, High-Rate Single-Server PIR via FHE Composition
YT 17 minutes 38 seconds
IEEE Symposium on Security and Privacy
SNARKBlock: Federated Anonymous Blocklisting from Hidden Common Input Aggregate Proofs
YT 20 minutes 12 seconds
IEEE Symposium on Security and Privacy
How to Attack and Generate Honeywords
YT 18 minutes 44 seconds
IEEE Symposium on Security and Privacy
Property Inference from Poisoning
YT 19 minutes 35 seconds
IEEE Symposium on Security and Privacy
Reconstructing Training Data with Informed Adversaries
YT 19 minutes 35 seconds
IEEE Symposium on Security and Privacy
DeepSteal: Advanced Model Extractions Leveraging Efficient Weight Stealing in Memories
YT 18 minutes 18 seconds
IEEE Symposium on Security and Privacy
Model Stealing Attacks Against Inductive Graph Neural Networks
YT 19 minutes 34 seconds
IEEE Symposium on Security and Privacy
Back to the Drawing Board: A Critical Evaluation of Poisoning Attacks on Federated Learning
YT 18 minutes 37 seconds
IEEE Symposium on Security and Privacy
Model Orthogonalization: Class Distance Hardening in Neural Networks for Better Security
YT 16 minutes 28 seconds
IEEE Symposium on Security and Privacy
Universal 3-Dimensional Perturbations for Black-Box Attacks on Video Recognition Systems
YT 20 minutes 38 seconds
IEEE Symposium on Security and Privacy
"Adversarial Examples" for Proof-of-Learning
YT 11 minutes 48 seconds
IEEE Symposium on Security and Privacy
Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings
YT 19 minutes 24 seconds
IEEE Symposium on Security and Privacy
IRQDebloat: Reducing Driver Attack Surface in Embedded Devices
YT 18 minutes
IEEE Symposium on Security and Privacy
Mind the Gap: Studying the Insecurity of Provably Secure Embedded Trusted Execution Architectures
YT 1 second

[Private video]
YT 18 minutes 51 seconds
IEEE Symposium on Security and Privacy
How Not to Protect Your IP - An Industry-Wide Break of IEEE 1735 Implementations
YT 1 second

[Private video]
YT 21 minutes 3 seconds
IEEE Symposium on Security and Privacy
WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens
YT 17 minutes 26 seconds
IEEE Symposium on Security and Privacy
Time-Print: Authenticating USB Flash Drives with Novel Timing Fingerprints
YT 19 minutes 8 seconds
IEEE Symposium on Security and Privacy
Device Fingerprinting with Peripheral Timestamps
YT 20 minutes 7 seconds
IEEE Symposium on Security and Privacy
PCR-Auth: Solving Authentication Puzzle Challenges with Encoded Palm Contact Responses
YT 15 minutes 13 seconds
IEEE Symposium on Security and Privacy
Arbitrary Modulation of Electromagnetic Noise from Unprivileged Software Impacting Emission Security
YT 21 minutes 30 seconds
IEEE Symposium on Security and Privacy
mmSpy: Spying Phone Calls using mmWave Radars
YT 14 minutes 43 seconds
IEEE Symposium on Security and Privacy
Attacks on Wireless Coexistence
YT 23 minutes 55 seconds
IEEE Symposium on Security and Privacy
Invisible Finger: Practical Electromagnetic Interference Attack on Touchscreen Electronic Devices
YT 18 minutes 37 seconds
IEEE Symposium on Security and Privacy
MatRiCT+: More Efficient Post-Quantum Private Blockchain Payments
YT 22 minutes 32 seconds
IEEE Symposium on Security and Privacy
Using Throughput-Centric Byzantine Broadcast to Tolerate Malicious Majority in Blockchains
YT 17 minutes 34 seconds
IEEE Symposium on Security and Privacy
Universal Atomic Swaps: Secure Exchange of Coins Across All Blockchains
YT 20 minutes 23 seconds
IEEE Symposium on Security and Privacy
Foundations of Dynamic BFT
YT 17 minutes
IEEE Symposium on Security and Privacy
COBRA: Dynamic Proactive Secret Sharing for Confidential BFT Services
YT 22 minutes 28 seconds
IEEE Symposium on Security and Privacy
Evaluating Physical-Layer BLE Location Tracking Attacks on Mobile Devices
YT 21 minutes 19 seconds
IEEE Symposium on Security and Privacy
IRShield: A Countermeasure Against Adversarial Physical-Layer Wireless Sensing
YT 20 minutes 44 seconds
IEEE Symposium on Security and Privacy
Anti-Tamper Radio: System-Level Tamper Detection for Computing Systems
YT 18 minutes 58 seconds
IEEE Symposium on Security and Privacy
Practical EMV Relay Protection
YT 16 minutes 58 seconds
IEEE Symposium on Security and Privacy
AccEar: Accelerometer Acoustic Eavesdropping with Unconstrained Vocabulary
YT 1 second

[Private video]
YT 1 second

[Private video]
YT 25 minutes 47 seconds
IEEE Symposium on Security and Privacy
HardLog: Practical Tamper-Proof System Auditing Using a Novel Audit Device
YT 20 minutes 44 seconds
IEEE Symposium on Security and Privacy
Anti-Tamper Radio: System-Level Tamper Detection for Computing Systems
YT 18 minutes 58 seconds
IEEE Symposium on Security and Privacy
Practical EMV Relay Protection
YT 16 minutes 58 seconds
IEEE Symposium on Security and Privacy
AccEar: Accelerometer Acoustic Eavesdropping with Unconstrained Vocabulary
YT 1 second

[Private video]
YT 1 second

[Private video]
YT 25 minutes 47 seconds
IEEE Symposium on Security and Privacy
HardLog: Practical Tamper-Proof System Auditing Using a Novel Audit Device
YT 24 minutes 55 seconds
IEEE Symposium on Security and Privacy
SwarmFlawFinder: Discovering and Exploiting Logic Flaws of Swarm Algorithms
YT 20 minutes 31 seconds
IEEE Symposium on Security and Privacy
PGPATCH: Policy-Guided Logic Bug Patching for Robotic Vehicles
YT 20 minutes 24 seconds
IEEE Symposium on Security and Privacy
Domains Do Change Their Spots: Quantifying Potential Abuse of Residual Trust
YT 18 minutes 15 seconds
IEEE Symposium on Security and Privacy
Scraping Sticky Leftovers: App User Information Left on Servers After Account Deletion
YT 20 minutes 9 seconds
IEEE Symposium on Security and Privacy
TROLLMAGNIFIER: Detecting State-Sponsored Troll Accounts on Reddit?
YT 17 minutes 30 seconds
IEEE Symposium on Security and Privacy
Analyzing Ground-Truth Data of Mobile Gambling Scam
YT 21 minutes 34 seconds
IEEE Symposium on Security and Privacy
K-Scheduler: Effective Seed Scheduling for Fuzzing with Graph Centrality Analysis
YT 22 minutes 21 seconds
IEEE Symposium on Security and Privacy
FuzzUSB: Hybrid Stateful Fuzzing of USB Gadget Stacks
YT 18 minutes 43 seconds
IEEE Symposium on Security and Privacy
Exploit the Last Straw That Breaks Android Systems
YT 18 minutes 5 seconds
IEEE Symposium on Security and Privacy
Deployment of Source Address Validation by Network Operators: A Randomized Control Trial
YT 19 minutes 7 seconds
IEEE Symposium on Security and Privacy
Exposed Infrastructures—Discovery, Attacks and Remediation of Insecure ICS Remote Management Devices
YT 21 minutes 55 seconds
IEEE Symposium on Security and Privacy
Privacy-from-Birth: Protecting Sensed Data from Malicious Sensors with VERSA
YT 14 minutes 27 seconds
IEEE Symposium on Security and Privacy
Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms
YT 20 minutes 29 seconds
IEEE Symposium on Security and Privacy
The Experts' Insights on the Peer Review Process of Evaluating Security Papers
YT 19 minutes 51 seconds
IEEE Symposium on Security and Privacy
SoK: Social Cybersecurity
YT 13 minutes 40 seconds
IEEE Symposium on Security and Privacy
Committed to Trust: A Qualitative Study on Security & Trust in Open Source Software Projects
YT 22 minutes 26 seconds
IEEE Symposium on Security and Privacy
Membership inference attacks from first principles
YT 20 minutes 16 seconds
IEEE Symposium on Security and Privacy
Bad Characters: Imperceptible NLP Attacks
YT 16 minutes 11 seconds
IEEE Symposium on Security and Privacy
LinkTeller: Recovering Private Edges from Graph Neural Networks via Influence Analysis
YT 18 minutes 56 seconds
IEEE Symposium on Security and Privacy
PICCOLO: Exposing Complex Backdoors in NLP Transformer Models
YT 22 minutes 7 seconds
IEEE Symposium on Security and Privacy
BadEncoder: Backdoor Attacks to Pre-trained Encoders in Self-Supervised Learning
YT 19 minutes 19 seconds
IEEE Symposium on Security and Privacy
CirC: Compiler infrastructure for proof systems, software verification, and more
YT 17 minutes 7 seconds
IEEE Symposium on Security and Privacy
HAMRAZ: Resilient Partitioning and Replication
YT 19 minutes 5 seconds
IEEE Symposium on Security and Privacy
Formal Model-Driven Discovery of Bluetooth Protocol Design Vulnerabilities
YT 18 minutes 8 seconds
IEEE Symposium on Security and Privacy
Publicly Accountable Robust Multi-Party Computation
YT 18 minutes 7 seconds
IEEE Symposium on Security and Privacy
Waldo: A Private Time-Series Database from Function Secret-Sharing
YT 18 minutes 32 seconds
IEEE Symposium on Security and Privacy
Hark: A Deep Learning System for Navigating Privacy Feedback at Scale
YT 21 minutes 8 seconds
IEEE Symposium on Security and Privacy
Sphinx: Enabling Privacy-Preserving Online Learning over the Cloud
YT 15 minutes 2 seconds
IEEE Symposium on Security and Privacy
DeepCoFFEA: Improved Flow Correlation Attacks on Tor via Metric Learning and Amplification
YT 15 minutes 2 seconds
IEEE Symposium on Security and Privacy
ShorTor: Improving Tor Network Latency via Multi-hop Overlay Routing
YT 19 minutes 54 seconds
IEEE Symposium on Security and Privacy
Sabre: Sender-Anonymous Messaging with Fast Audits
YT 28 minutes
IEEE Symposium on Security and Privacy
Security Foundations for Application-Based Covert Communication Channels
YT 16 minutes 15 seconds
IEEE Symposium on Security and Privacy
Repairing DoS Vulnerability of Real-World Regexes
YT 17 minutes 54 seconds
IEEE Symposium on Security and Privacy
GREBE: Unveiling Exploitation Potential for Linux Kernel Bugs
YT 17 minutes 39 seconds
IEEE Symposium on Security and Privacy
Goshawk: Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis
YT 1 second

[Private video]
YT 20 minutes 6 seconds
IEEE Symposium on Security and Privacy
"Desperate Times Call for Desperate Measures": User Concerns with Mobile Loan Apps in Kenya
YT 16 minutes 57 seconds
IEEE Symposium on Security and Privacy
SoK: The Dual Nature of Technology in Sexual Assault
YT 17 minutes 2 seconds
IEEE Symposium on Security and Privacy
SoK: Unifying and Applying At-Risk User Research
YT 15 minutes 57 seconds
IEEE Symposium on Security and Privacy
SPURT: Scalable Distributed Randomness Beacon with Transparent Setup
YT 20 minutes 48 seconds
IEEE Symposium on Security and Privacy
Practical Asynchronous Distributed Key Generation
YT 15 minutes 12 seconds
IEEE Symposium on Security and Privacy
Security Analysis of the MLS Key Derivation
YT 17 minutes 4 seconds
IEEE Symposium on Security and Privacy
Low-Bandwidth Threshold ECDSA via Pseudorandom Correlation Generators