YoVDO

IEEE Symposium on Security and Privacy Courses

Program-Adaptive Mutational Fuzzing
IEEE via YouTube
Every Second Counts - Quantifying the Negative Externalities of Cybercrime via Typosquatting
IEEE via YouTube
Cross-Architecture Bug Search in Binary Executables
IEEE via YouTube
Micro-Policies - Formally Verified, Tag-Based Security Monitors
IEEE via YouTube
SoK - Deep Packer Inspection - A Longitudinal Study of the Complexity of Run-Time Packers
IEEE via YouTube
What the App is That? Deception and Countermeasures in the Android User Interface
IEEE via YouTube
Signing Me onto Your Accounts through Facebook and Google - A Traffic-Guided Security Study of Commercially Deployed Single-Sign-On Web Services
IEEE via YouTube
Low-Bandwidth Threshold ECDSA via Pseudorandom Correlation Generators
IEEE via YouTube
Security Analysis of the MLS Key Derivation
IEEE via YouTube
Goshawk - Hunting Memory Corruptions via Structure-Aware and Object-Centric Memory Operation Synopsis
IEEE via YouTube
< Prev Page 15 Next >