usenix security '15 - why johnny and janie can’t code safely: bringing software assurance...
Published 8 years ago • 551 plays • Length 1:27:54Download video MP4
Download video MP3
Similar videos
-
1:19:58
usenix security '15 - preventing security bugs through software design
-
27:30
usenix security '15 - compiler-instrumented, dynamic secret-redaction of legacy processes...
-
25:29
usenix security '15 - automatic generation of data-oriented exploits
-
5:19
soups 2020 - why can't johnny fix vulnerabilities: a usability evaluation of static analysis tools
-
30:34
usenix security '15 - circuit fingerprinting attacks: passive deanonymization of tor hidden services
-
11:08
usenix security '20 - symbolic execution with symcc: don't interpret, compile!
-
29:31
usenix security '15 - the unexpected dangers of dynamic javascript
-
21:07
usenix enigma 2017 — what cybersecurity can learn from the secret service
-
40:49
introducing io devices into trusted execution environments - jun nakajima, intel corporation
-
21:43
usenix enigma 2016 - what makes software exploitation hard?
-
1:45:43
usenix security '15 - conducting usable security studies: it's complicated
-
30:24
usenix security '15 - reassembleable disassembling
-
21:16
usenix security '14 - privacy in pharmacogenetics: an end-to-end case study of personalized warfarin
-
12:13
usenix security '21 - exposing new vulnerabilities of error handling mechanism in can
-
23:44
usenix security '15 - the pythia prf service
-
12:05
usenix security '21 - automatic firmware emulation through invalidity-guided knowledge inference
-
12:11
usenix security '23 - jinn: hijacking safe programs with trojans
-
1:33:47
usenix security '15 - inherent cyber insecurity and our national security...
-
19:17
usenix enigma 2017 — as we may code
-
13:14
usenix security '23 - zbcan: a zero-byte can defense system
-
26:06
usenix security '15 - towards discovering and understanding task hijacking in android