Sorry, there was a problem with that video search. Don't worry, we'll fix it shortly!
Search Results
USENIX Security '18 - Understanding the Reproducibility of Crowd-reported Security Vulnerabilities
USENIX Security '18 - Understanding the Reproducibility of Crowd-reported Security Vulnerabilities
USENIX Security '18 - The Battle for New York: A Case Study of Applied Digital Threat Modeling...
USENIX Security '18 - The Law and Economics of Bug Bounties
USENIX Security '18 - Discovering Flaws in Security-Focused Static Analysis Tools...
USENIX Security '18 - Analysis of Privacy Protections in Fitness Tracking Social Networks...
USENIX Security '18 - Precise and Accurate Patch Presence Test for Binaries
USENIX Security '18 - End-to-End Measurements of Email Spoofing Attacks
USENIX Security '18 - FUZE: Towards Facilitating Exploit Generation for Kernel UAF Vulnerabilities
USENIX Security '18 - Unveiling and Quantifying Facebook Exploitation of Sensitive Personal Data...
USENIX Security '18 - BlackIoT: IoT Botnet of High Wattage Devices Can Disrupt the Power Grid
USENIX Security '19 - AntiFuzz: Impeding Fuzzing Audits of Binary Executables