IEEE Symposium on Security and Privacy Courses
IEEE via YouTube Every Second Counts - Quantifying the Negative Externalities of Cybercrime via Typosquatting
IEEE via YouTube Cross-Architecture Bug Search in Binary Executables
IEEE via YouTube Micro-Policies - Formally Verified, Tag-Based Security Monitors
IEEE via YouTube SoK - Deep Packer Inspection - A Longitudinal Study of the Complexity of Run-Time Packers
IEEE via YouTube What the App is That? Deception and Countermeasures in the Android User Interface
IEEE via YouTube Signing Me onto Your Accounts through Facebook and Google - A Traffic-Guided Security Study of Commercially Deployed Single-Sign-On Web Services
IEEE via YouTube Low-Bandwidth Threshold ECDSA via Pseudorandom Correlation Generators
IEEE via YouTube Security Analysis of the MLS Key Derivation
IEEE via YouTube Goshawk - Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis
IEEE via YouTube