Rezultati pretraživanja
  1. 27. ruj 2019.

    The video for my talk, "SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks", is public. Thanks,

  2. 27. ruj 2019.

    Videos from are now available! Visit the technical sessions page, scroll to the talk or presentation you're interested in, and click "Available Media":

  3. 29. kol 2019.

    Had a blast attending and presenting at Usenix Security! TL;DR: we built a graph of kernel structures (👇) to study memory forensics techniques! The good news? All the code is open source:

  4. 16. kol 2019.

    This concludes 2019, the conference was great and I had lots of fun! Thanks a lot and for putting together a great program!

  5. 16. kol 2019.

    Next up: Emre is presenting our paper “AntiFuzz: Impeding Fuzzing Audits of Binary Executables“, which discusses some limitations of current fuzzers. Code is available at , paper at

    Prikaži ovu nit
  6. 16. kol 2019.

    I will present our work on location privacy in crowdsourcing applications that collect geo-located data at the Privacy session of this afternoon. Paper: w/ Spyros Boukoros, & Stefan Katzenbeisser

    Prikaži ovu nit
  7. 15. kol 2019.

    "Exploiting Unprotected I/O Operations in AMD’s Secure Encrypted Virtualization" Amazing to see a complete end to end implementation of the SEV I/O attack vector at after I hypothesized about it some time ago

  8. 15. kol 2019.

    And now Mario Werner is presenting our work on secure caches (ScatterCache) at . Mitigating cache attacks and maintaining performance with a practical hardware change.

  9. 15. kol 2019.

    Current state of machine learning in security

  10. 15. kol 2019.

    It was a pleasure to kick off the side channel session with spoiler attack. The paper: JavaScript poc:

  11. ☺️We're a bit proud: Today, some of our scientists are at the and present 4 (!) papers they worked on. You can get an overview with abstracts and PDFs of the papers here

  12. 15. kol 2019.

    Presented today at USENIX Security 2019 – Tracing Transactions Across Cryptocurrency Ledgers – summarised for Bentham's Gaze by

    But we have recently seen a shift into entities performing cross-currency trades. For example, the WannaCry hackers laundered over $142,000 Bitcoin from ransoms across cryptocurrencies. The issue here is that cross-chain transactions appear to be indistinguishable from native transactions on-chain.
  13. 14. kol 2019.

    At , today presented a super interesting paper on understanding transferability of adversarial attacks. Awesome findings and fundamental research! They also release the secML library, can’t wait to try it!

  14. 14. kol 2019.
  15. 14. kol 2019.

    Very excited to be at this week! Three of our papers are being presented in the "Protecting Users Everywhere" session (thread):

    Prikaži ovu nit
  16. 14. kol 2019.

    Congratulations to Ian Goldberg and his coauthors for winning the Test of Time Award for their paper "A Secure Environment for Untrusted Helper Applications: Confining the Wily Hacker"!

    Prikaži ovu nit
  17. Hello USENIX Sec! I will be giving a lightning talk Wed night on our network traffic dataset of 45,000 consumer IoT devices, crowdsourced from real users in the past few months.

    Prikaži ovu nit
  18. 12. kol 2019.

    Folks! I will be presenting tomorrow at the end of the 11 AM session about the need to study subpopulations in large-scale security studies (and there are some pretty cool images, too!). I'll also be at all week! Drop a line and say hi!

  19. 26. srp 2019.

    I hope you'll join us at this year in Santa Clara, CA. The program is fantastic!

  20. 30. svi 2019.

    Usenix Security'19 program is awesome this year, as always! Really want to attend even w/o accepted paper:)

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.