USENIX Security Courses
USENIX via YouTube Bamboozling Certificate Authorities with BGP
USENIX via YouTube Foreshadow - Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution
USENIX via YouTube TeEther - Gnawing at Ethereum to Automatically Exploit Smart Contracts
USENIX via YouTube Polisis - Automated Analysis and Presentation of Privacy Policies Using Deep Learning
USENIX via YouTube BlackIoT - IoT Botnet of High Wattage Devices Can Disrupt the Power Grid
USENIX via YouTube Who Is Answering My Queries - Understanding and Characterizing Interception of the DNS Resolution Path
USENIX via YouTube Analogy Cyber Security - From 0101 to Mixed Signals
USENIX via YouTube Modelling and Analysis of a Hierarchy of Distance Bounding Attacks
USENIX via YouTube SkillDetective - Automated Policy-Violation Detection of Voice Assistant Applications in the Wild
USENIX via YouTube