-
The video for my talk, "SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks", is public. Thanks,
#usesec19@USENIXSecurityhttps://www.youtube.com/watch?time_continue=593&v=353WETEIXl0 … -
Videos from
#usesec19 are now available! Visit the technical sessions page, scroll to the talk or presentation you're interested in, and click "Available Media": https://www.usenix.org/conference/usenixsecurity19/technical-sessions …#openaccess -
Had a blast attending and presenting at Usenix Security! TL;DR: we built a graph of kernel structures (
) to study memory forensics techniques!
The good news? All the code is open source: https://github.com/pagabuc/kernographer …
#usesec19#memoryforensics pic.twitter.com/vdVtjKwnx2
-
This concludes
@USENIXSecurity 2019, the conference was great and I had lots of fun! Thanks a lot@nadiaheninger and@patrickgtraynor for putting together a great program!#usesec19 -
Next up: Emre is presenting our paper “AntiFuzz: Impeding Fuzzing Audits of Binary Executables“, which discusses some limitations of current fuzzers. Code is available at https://github.com/RUB-SysSec/antifuzz …, paper at https://www.usenix.org/conference/usenixsecurity19/presentation/guler …
#usesec19 pic.twitter.com/9EJmTH3u4P
Prikaži ovu nit -
I will present our work on location privacy in crowdsourcing applications that collect geo-located data at the Privacy session of
@USENIXSecurity this afternoon. Paper: https://arxiv.org/abs/1901.04923 w/ Spyros Boukoros,@MathiasOZ & Stefan Katzenbeisser#usesec19Prikaži ovu nit -
"Exploiting Unprotected I/O Operations in AMD’s Secure Encrypted Virtualization" https://www.usenix.org/conference/usenixsecurity19/presentation/li-mengyuan … Amazing to see a complete end to end implementation of the SEV I/O attack vector at
#usesec19 after I hypothesized about it some time ago https://nebelwelt.net/blog/20160922-AMD-SEV-attack-surface.html … -
And now Mario Werner is presenting our work on secure caches (ScatterCache) at
#usesec19. Mitigating cache attacks and maintaining performance with a practical hardware change. pic.twitter.com/B3ZlBZqSri
-
Current state of machine learning in security
#usesec19 pic.twitter.com/v6UPTWyJEc
-
It was a pleasure to kick off the side channel session with spoiler attack.
#usesec19@USENIXSecurity The paper: https://www.usenix.org/conference/usenixsecurity19/presentation/islam … JavaScript poc: https://github.com/UzL-ITS/Spoiler pic.twitter.com/icnapRtXJC
-
We're a bit proud: Today, some of our scientists are at the @USENIXSecurity and present 4 (!) papers they worked on. You can get an overview with abstracts and PDFs of the papers here https://bit.ly/2N52LQH@thorstenholz@jurajsomorovsky@ic0nz1@emrexgueler#usesec19 -
Presented today at USENIX Security 2019 – Tracing Transactions Across Cryptocurrency Ledgers – summarised for Bentham's Gaze by
@Haaroony https://www.benthamsgaze.org/2019/08/15/tracing-transactions-across-cryptocurrency-ledgers/ …#usesec19 pic.twitter.com/VH35jHzrjA
-
At
@USENIXSecurity, today@ambrademontis presented a super interesting paper on understanding transferability of adversarial attacks. Awesome findings and fundamental research! They also release the secML library, can’t wait to try it!@biggiobattista#adversarial#usesec19 pic.twitter.com/YHuZSLWoYf
-
Now
@cc0x1f is presenting our paper on transient execution attacks at#usesec19 https://www.usenix.org/conference/usenixsecurity19/presentation/canella …pic.twitter.com/canRHJz9S8
-
Very excited to be at
#usesec19 this week! Three of our papers are being presented in the "Protecting Users Everywhere" session (thread):Prikaži ovu nit -
Congratulations to Ian Goldberg and his coauthors for winning the
@USENIXSecurity Test of Time Award for their paper "A Secure Environment for Untrusted Helper Applications: Confining the Wily Hacker"!#usesec19 https://cs.uwaterloo.ca/news/ian-goldberg-colleagues-honoured-security-research-test-of-time …Prikaži ovu nit -
Hello USENIX Sec! I will be giving a lightning talk Wed night on our network traffic dataset of 45,000 consumer IoT devices, crowdsourced from real users in the past few months.
#usesec19@USENIXSecurity@Princeton_IoTPrikaži ovu nit -
Folks! I will be presenting tomorrow
@USENIXSecurity#HotSec19 at the end of the 11 AM session about the need to study subpopulations in large-scale security studies (and there are some pretty cool images, too!). I'll also be at#usesec19 all week! Drop a line and say hi! pic.twitter.com/GXMoxjhkLp
-
I hope you'll join us at
#usesec19 this year in Santa Clara, CA. The program is fantastic! https://twitter.com/USENIXSecurity/status/1154804842117943296 …
-
Usenix Security'19 program is awesome this year, as always! Really want to attend even w/o accepted paper:)
@USENIXSecurity#usesec19 https://www.usenix.org/conference/usenixsecurity19/technical-sessions …
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.