usenix security '19 - less is more: quantifying the security benefits of debloating web applications
Published 4 years ago • 454 plays • Length 18:50Download video MP4
Download video MP3
Similar videos
-
20:43
usenix security '19 - razor: a framework for post-deployment software debloating
-
20:43
usenix security '19 - understanding and improving security and privacy in multi-user
-
12:17
usenix security '23 - animatedead: debloating web applications using concolic execution
-
21:31
usenix security '19 - discovering and understanding the security hazards in the
-
10:19
usenix security '23 - minimalist: semi-automated debloating of php web applications through...
-
19:54
usenix security '19 - detecting and characterizing lateral phishing at scale
-
54:57
usenix security '19 - the spies hacking our phones are going dark, and we're all in trouble
-
11:47
fawkes: protecting personal privacy against unauthorized deep learning models (usenix security 2020)
-
2:26
security awareness episode 6: vishing
-
49:18
usenix security '19 - evaluating mobile messengers for implementation vulnerabilities
-
26:51
usenix security '18 - gazelle: a low latency framework for secure neural network inference
-
21:30
usenix security '19 - identifying cache-based side channels through secret-augmented
-
19:42
usenix atc '23 - adaptive online cache capacity optimization via lightweight working set size...
-
1:42:14
usenix security '19 - security educational panel
-
30:10
usenix security '15 - linkdroid: reducing unregulated aggregation of app usage behaviors
-
12:07
usenix security '20 - understanding security mistakes developers make: qualitative analysis...
-
19:12
usenix security '19 - everyone is different: client-side diversification for defending
-
51:07
usenix security '19 - security research and public policy
-
25:32
usenix security '15 - zigzag: automatically hardening web applications against client-side...
-
19:11
usenix security '19 - iframes/popups are dangerous in mobile webview: studying and
-
30:44
usenix security '16 - hey, you have a problem: on the feasibility of large-scale web vulnerability