USENIX Security Courses
USENIX via YouTube Malicious Management Unit - Why Stopping Cache Attacks in Software is Harder Than You Think
USENIX via YouTube NetHide - Secure and Practical Network Topology Obfuscation
USENIX via YouTube Erays - Reverse Engineering Ethereum's Opaque Smart Contracts
USENIX via YouTube Why Do Keynote Speakers Keep Suggesting That Improving Security Is Possible
USENIX via YouTube Lamphone - Passive Sound Recovery from a Desk Lamp's Light Bulb Vibrations
USENIX via YouTube Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models
USENIX via YouTube Who Are You - I Really Wanna Know - Detecting Audio DeepFakes Through Vocal Tract Reconstruction
USENIX via YouTube ROP is Still Dangerous - Breaking Modern Defenses
USENIX via YouTube Risky Business - Investigating the Security Practices of Vendors on an Online Anonymous Market Using Ground-Truth Data
USENIX via YouTube