usenix security '15 - conducting usable security studies: it's complicated
Published 8 years ago • 513 plays • Length 1:45:43Download video MP4
Download video MP3
Similar videos
-
20:57
usenix enigma 2016 - why is usable security hard, and what should we do about it?
-
26:23
usenix security '15 - recognizing functions in binaries with neural networks
-
1:28:40
usenix security '15 - transforming innovative security concepts into disruptive security companies
-
22:27
usenix security '15 - cashtags: protecting the input and display of sensitive data
-
1:19:58
usenix security '15 - preventing security bugs through software design
-
1:33:47
usenix security '15 - inherent cyber insecurity and our national security...
-
25:41
usenix security '15 - control-flow bending: on the effectiveness of control-flow integrity
-
25:22
usenix security '15 - raptor: routing attacks on privacy in tor
-
22:47
security, visibility and flexibility: the integrated access control experience
-
26:56
usenix security '17 - clkscrew: exposing the perils of security-oblivious energy management
-
27:35
usenix security '15 - you shouldn’t collect my secrets: thwarting sensitive keystroke leakage...
-
28:21
usenix security '17 - when the weakest link is strong...
-
27:37
usenix security '15 - a measurement study on co-residence threat inside the cloud
-
31:33
usenix security '15 - to pin or not to pin—helping app developers bullet proof their tls connections
-
29:42
usenix security '15 - investigating the computer security practices and needs of journalists
-
1:27:54
usenix security '15 - why johnny and janie can’t code safely: bringing software assurance...
-
29:31
usenix security '15 - the unexpected dangers of dynamic javascript
-
31:11
usenix security '17 - "i have no idea what i'm doing" - on the usability of deploying https