Vídeos de Usenix Enigma 2017
Aquí tenéis los charlas (vídeos y algunas diapositivas) de la edición de este año de la conferencia Usenix Enigma:
- Human Computation with an Application to Passwords
- Moving Account Recovery beyond Email and the "Secret" Question
- Secrets at Scale: Automated Bootstrapping of Secrets & Identity in the Cloud
- Inside "MOAR TLS:" How We Think about Encouraging External HTTPS Adoption on the Web
- Ghost in the Machine: Challenges in Embedded Binary Security
- LLC Cache Attacks: Applicability and Countermeasures
- IoT, a Cybercriminal's Paradise
- Hacking Sensors
- Test Driven Security in Continuous Integration
- As We May Code
- Leveraging the Power of Automated Reasoning in Security Analysis of Web Applications and Beyond
- Startups + Industry: How Everyone Can Win
- Behaviors and Patterns of Bulletproof and Anonymous Hosting Providers
- StreamAlert: A Serverless, Real-time Intrusion Detection Engine
- Neural and Behavioral Insights on Trust
- What Does the Brain Tell Us about Usable Security?
- Brains Can Be Hacked. Why Should You Care?
- Won't Somebody Please Think of the Journalists?
- Security in the Wild for Low-Profile Activists
- Why Philanthropy Is Critical for Cybersecurity
- Security for Vulnerable Populations—On the Interplay of Weapons of Influence and Life Domains in Predicting Older Adults' Susceptibility to Spear-Phishing Emails
- Beyond Warm & Fuzzy: Ethics as a Value Prop
- Legislative Engineering: Design Privacy Laws, Don't Just Draft Them
- The Paper Ballot Is Not Enough
- What Cybersecurity Can Learn from the Secret Service
- How WhatsApp Reduced Spam while Launching End-to-End Encryption
- Drawing the Foul: Operation of a DDoS Honeypot
- Putting Privacy Notices to the Test
- Understanding and Designing for End Users' Security Expectations
- Deviation from the Norms: The Necessity and Challenges of a Norms-based Approach to Digital Offense
- FeatureSmith: Learning to Detect Malware by Mining the Security Literature
- Classifiers under Attack
- Adversarial Examples in Machine Learning
- Cyber Security: A DARPA Perspective
- National Scale Cyber Security
- Green Sprouts: Encouraging Signs of Life from the Department of Defense’s 2016 Security Strategy
- Understanding and Securing DoD Weapon Systems
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec