YoVDO

USENIX Security Courses

QSYM - A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing
USENIX via YouTube
Malicious Management Unit - Why Stopping Cache Attacks in Software is Harder Than You Think
USENIX via YouTube
NetHide - Secure and Practical Network Topology Obfuscation
USENIX via YouTube
Erays - Reverse Engineering Ethereum's Opaque Smart Contracts
USENIX via YouTube
Why Do Keynote Speakers Keep Suggesting That Improving Security Is Possible
USENIX via YouTube
Lamphone - Passive Sound Recovery from a Desk Lamp's Light Bulb Vibrations
USENIX via YouTube
Are Your Sensitive Attributes Private? Novel Model Inversion Attribute Inference Attacks on Classification Models
USENIX via YouTube
Who Are You - I Really Wanna Know - Detecting Audio DeepFakes Through Vocal Tract Reconstruction
USENIX via YouTube
ROP is Still Dangerous - Breaking Modern Defenses
USENIX via YouTube
Risky Business - Investigating the Security Practices of Vendors on an Online Anonymous Market Using Ground-Truth Data
USENIX via YouTube
< Prev Page 5 Next >