Vídeos De Usenix 17
Además del material de USENIX 17, ya están disponibles también los vídeos de las charlas.
Aquí tenéis la lista completa:
- Opening Remarks and Awards
- When Your Threat Model Is “Everything”: Defensive Security in Modern Newsrooms
- How Double-Fetch Situations turn into Double-Fetch Vulnerabilities…
- Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts
- Ninja: Towards Transparent Tracing and Debugging on ARM
- Prime+Abort: A Timer-Free High-Precision L3 Cache Attack using Intel TSX
- On the effectiveness of mitigations against floating-point timing channels
- Constant-Time Callees with Variable-Time Callers
- Neural Nets Can Learn Function Type Signatures From Binaries
- CAnât Touch This…
- Efficient Protection of Path-Sensitive Control Security
- Digtool: A Virtualization-Based Framework for Detecting Kernel Vulnerabilities
- kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels
- Venerable Variadic Vulnerabilities Vanquished
- Towards Practical Tools for Side Channel Aware Software Engineering…
- Strong and Efficient Cache Side-Channel Protection…
- CacheD: Identifying Cache-Based Timing Channels in Production Software
- An Ant in a World of Grasshoppers
- From Problems to Patterns to Practice…
- BinSim: Trace-based Semantic Binary Diffing…
- PlatPal: Detecting Malicious Documents with Platform Diversity
- Malton: Towards On-Device Non-Invasive Mobile Malware Analysis for ART
- Global Measurement of DNS Manipulation
- Characterizing the Nature and Dynamics of Tor Exit Blocking
- DeTor: Provably Avoiding Geographic Regions in Tor
- SmartAuth: User-Centered Authorization for the Internet of Things
- AWare: Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings
- 6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices
- Identifier Binding Attacks and Defenses in Software-Defined Networks
- HELP: Helper-Enabled In-Band Device Pairingâ¦
- Attacking the Brain: Races in the SDN Control Plane
- Detecting Credential Spearphishing in Enterprise Settings
- SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data
- When the Weakest Link is Strong…
- Hacking in Darkness: Return-oriented Programming against Secure Enclaves
- vTZ: Virtualizing ARM TrustZone
- Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing
- AuthentiCall: Efficient Identity and Content Authentication for Phone Calls
- Picking Up My Tab…
- TrustBase: An Architecture to Repair and Strengthen…
- Transcend: Detecting Concept Drift in Malware Classification Models
- Syntia: Synthesizing the Semantics of Obfuscated Code
- Predicting the Resilience of Obfuscated Code…
- Differential Privacy: From Theory to Deployment
- OSS-Fuzz - Google’s continuous fuzzing service for open source software
- Extension Breakdown…
- CCSP: Controlled Relaxation of Content Security Policies…
- Same-Origin Policy: Evaluation in Modern Browsers
- Locally Differentially Private Protocols for Frequency Estimation
- BLENDER: Enabling Local Search with a Hybrid Differential Privacy Model
- Computer Security, Privacy, and DNA Sequencing…
- BootStomp: On the Security of Bootloaders in Mobile Devices
- Seeing Through The Same Lens…
- Oscar: A Practical Page-Permissions-Based Scheme…
- PDF Mirage: Content Masking Attack Against Information-Based Online Services
- Loophole: Timing Attacks on Shared Event Loops in Chrome
- Game of Registrars…
- Speeding up detection of SHA-1 collision attacks…
- Phoenix: Rebirth of a Cryptographic Password-Hardening Service
- Vale: Verifying High-Performance Cryptographic Assembly Code
- Exploring User Perceptions of Discrimination in Online Targeted Advertising
- Measuring the Insecurity of Mobile Deep Links of Android
- How the Web Tangled Itself
- Towards Efficient Heap Overflow Discovery
- DR. CHECKER: A Soundy Analysis for Linux Kernel Drivers
- Dead Store Elimination (Still) Considered Harmful
- Telling Your Secrets without Page Faults…
- CLKSCREW: Exposing the Perils of Security-Oblivious Energy Management
- AutoLock: Why Cache Attacks on ARM Are Harder Than You Think
- USENIX Security â17 - Understanding the Mirai Botnet
- MPI: Multiple Perspective Attack Investigation…
- Detecting Android Root Exploits by Learning from Root Providers
- USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs
- Reverse Engineering x86 Processor Microcode
- See No Evil, Hear No Evil, Feel No Evil
- The Loopix Anonymity System
- MCMix: Anonymous Messaging via Secure Multiparty Computation
- ORide: A Privacy-Preserving yet Accountable Ride-Hailing Service
- Adaptive Android Kernel Live Patching
- CHAINIAC: Proactive Software-Update Transparency…
- ROTE: Rollback Protection for Trusted Execution
- A Longitudinal, End-to-End View of the DNSSEC Ecosystem
- Measuring HTTPS Adoption on the Web
- “I Have No Idea What I’m Doing” - On the Usability of Deploying HTTPS
- Beauty and the Burst: Remote Identification of Encrypted Video Streams
- Walkie-Talkie…
- A Privacy Analysis of Cross-device Tracking
- SmartPool: Practical Decentralized Pooled Mining
- REM: Resource-Efficient Mining for Blockchains
- Ensuring Authorized Updates in Multi-user Database-Backed Applications
- Qapla: Policy compliance for database-backed systems
- Data Hemorrhage, Inequality, and You…
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec