YoVDO

USENIX Security Courses

fTPM - A Software-Only Implementation of a TPM Chip
USENIX via YouTube
Fast, Lean, and Accurate - Modeling Password Guessability Using Neural Networks
USENIX via YouTube
Small World with High Risks - A Study of Security Threats in the npm Ecosystem
USENIX via YouTube
Tackling the Trust and Safety Crisis
USENIX via YouTube
Protecting Accounts from Credential Stuffing with Password Breach Alerting
USENIX via YouTube
WAVE - A Decentralized Authorization Framework with Transitive Delegation
USENIX via YouTube
In-toto - Providing Farm-to-Table Guarantees for Bits and Bytes
USENIX via YouTube
Reading the Tea Leaves - A Comparative Analysis of Threat Intelligence
USENIX via YouTube
From Privacy by Design to Data Protection by Design - The Challenges of Turning Good Practice into a Legal Obligation
USENIX via YouTube
Inadvertently Making Cyber Criminals Rich - A Comprehensive Study of Cryptojacking Campaigns at Internet Scale
USENIX via YouTube
< Prev Page 2 Next >