Presentaciones Usenix 2018
La 27 edición de la conferencia sobre seguridad USENIX 2018 se acaba de celebrar en Baltimore, MD esta pasada semana. Lo que característica a esta conferencia es que es una conferencia sobre seguridad desde ámbito académico.
El número de presentaciones es bastante amplio y ya podemos acceder tanto a la investigación académica, así, como las diapositivas de la mayoría de dichas presentaciones:
-
Why Do Keynote Speakers Keep Suggesting That Improving Security Is Possible? Keynote
-
Fear the Reaper: Characterization and Fast Detection of Card Skimmers
-
BlackIoT: IoT Botnet of High Wattage Devices Can Disrupt the Power Grid
-
CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition
-
HeapHopper: Bringing Bounded Model Checking to Heap Implementation Security
-
Fp-Scanner: The Privacy Implications of Browser Fingerprint Inconsistencies
-
Who Left Open the Cookie Jar? A Comprehensive Evaluation of Third-Party Cookie Policies
-
Effective Detection of Multimedia Protocol Tunneling using Machine Learning
-
Quack: Scalable Remote Measurement of Application-Layer Censorship
-
Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse
-
The Rewards and Costs of Stronger Passwords in a University: Linking Password Lifetime to Strength
-
Rethinking Access Control and Authentication for the Home Internet of Things (IoT)
-
ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem
-
Charm: Facilitating Dynamic Analysis of Device Drivers of Mobile Systems
-
Inception: System-Wide Security Testing of Real-World Embedded Systems Software
-
Acquisitional Rule-based Engine for Discovering Internet-of-Thing Devices
-
Donna Dodson, Chief Cybersecurity Advisor, National Institute of Standards and Technology
-
Freezing the Web: A Study of ReDoS Vulnerabilities in JavaScript-based Web Servers
-
NAVEX: Precise and Scalable Exploit Generation for Dynamic Web Applications
-
Rampart: Protecting Web Applications from CPU-Exhaustion Denial-of-Service Attacks
-
BurnBox: Self-Revocable Encryption in a World Of Compelled Access
-
Unveiling and Quantifying Facebook Exploitation of Sensitive Personal Data for Advertising Purposes
-
AttriGuard: A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning
-
Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning
-
Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels
-
One&Done: A Single-Decryption EM-Based Attack on OpenSSL’s Constant-Time Blinded RSA
-
DATA – Differential Address Trace Analysis: Finding Address-based Side-Channels in Binaries
-
Chipmunk or Pepe? Using Acoustical Analysis to Detect Voice-Channel Fraud at Scale
-
The Battle for New York: A Case Study of Applied Digital Threat Modeling at the Enterprise Level
-
SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection
-
MoonShine: Optimizing OS Fuzzer Seed Selection with Trace Distillation
-
QSYM : A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing
-
FUZE: Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities
-
The Broken Shield: Measuring Revocation Effectiveness in the Windows Code-Signing PKI
-
Debloating Software through Piece-Wise Compilation and Loading
-
Understanding the Reproducibility of Crowd-reported Security Vulnerabilities
-
Malicious Management Unit: Why Stopping Cache Attacks in Software is Harder Than You Think
-
Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks
-
Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution
-
Plug and Prey? Measuring the Commoditization of Cybercrime via Online Anonymous Markets
-
Schrödinger’s RAT: Profiling the Stakeholders in the Remote Access Trojan Ecosystem
-
The aftermath of a crypto-ransomware attack at a large academic institution
-
From Spam to Speech: Policing the Next Generation of “Unwanted Traffic”
-
Amit Elazari Bar On, Doctoral Candidate, Berkeley Law, Center for Long-Term Cybersecurity Grantee
-
We Still Don’t Have Secure Cross-Domain Requests: an Empirical Study of CORS
-
End-Users Get Maneuvered: Empirical Analysis of Redirection Hijacking in Content Delivery Networks
-
SAD THUG: Structural Anomaly Detection for Transmissions of High-value Information Using Graphics
-
FANCI : Feature-based Automated NXDomain Classification and Intelligence
-
An Empirical Study of Web Resource Manipulation in Real-world Mobile Applications
-
Fast and Service-preserving Recovery from Malware Infections Using CRIU
-
Susan Landau, Bridge Professor of Cyber Security and Policy, Tufts University
-
The Guard’s Dilemma: Efficient Code-Reuse Attacks Against Intel SGX
-
A Bad Dream: Subverting Trusted Platform Module While You Are Sleeping
-
Discovering Flaws in Security-Focused Static Analysis Tools for Android using Systematic Mutation
-
With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning
-
When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks
-
teEther: Gnawing at Ethereum to Automatically Exploit Smart Contracts
-
Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts
-
Erays: Reverse Engineering Ethereum’s Opaque Smart Contracts
-
DelegaTEE: Brokered Delegation Using Trusted Execution Environments
-
Security Namespace: Making Linux Security Frameworks Available to Containers
-
Vetting Single Sign-On SDK Implementations via Symbolic Reasoning
-
WPSE: Fortifying Web Protocols via Browser-Side Security Monitoring
-
Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the Computer
-
All Your GPS Are Belong To Us: Towards Stealthy Manipulation of Road Navigation Systems
-
Modelling and Analysis of a Hierarchy of Distance Bounding Attacks
-
Off-Path TCP Exploit: How Wireless Routers Can Jeopardize Your Secrets
-
Formal Security Analysis of Neural Networks using Symbolic Intervals
-
Turning Your Weakness Into a Strength: Watermarking Deep Neural Networks by Backdooring
-
A4NT: Author Attribute Anonymity by Adversarial Training of Neural Machine Translation
-
GAZELLE: A Low Latency Framework for Secure Neural Network Inference
-
FlowCog: Context-aware Semantics Extraction and Analysis of Information Flow Leaks in Android Apps
-
Enabling Refinable Cross-Host Attack Investigation with Efficient Data Flow Tagging and Tracking
-
Dependence-Preserving Data Compaction for Scalable Forensic Analysis
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec