YoVDO

IEEE Symposium on Security and Privacy Courses

Mitigating Information Leakage Vulnerabilities with Type-based Data Isolation
IEEE via YouTube
How Does Usable Security Not End Up in Software Products - Results From a Qualitative Interview Study
IEEE via YouTube
Investigating Influencer VPN Ads on YouTube
IEEE via YouTube
Noise - A Library of Verified High-Performance Secure Channel Protocol Implementations
IEEE via YouTube
Peekaboo - A Hub-Based Approach to Enable Transparency in Data Processing within Smart Homes
IEEE via YouTube
Delay Wreaks Havoc on Your Smart Home - Delay-based Automation Interference Attacks
IEEE via YouTube
TASHAROK - Using Mechanism Design for Enhancing Security Resource Allocation in Interdependent Systems
IEEE via YouTube
Cats vs. Spectre - An Axiomatic Approach to Modeling Speculative Execution Attacks
IEEE via YouTube
RT-TEE - Real-time System Availability for Cyber-physical Systems using ARM TrustZone
IEEE via YouTube
SAILFISH - Vetting Smart Contract State-Inconsistency Bugs in Seconds
IEEE via YouTube
< Prev Page 5 Next >