usenix security '23 - spectrem: exploiting electromagnetic emanations during transient execution
Published 8 months ago • 72 plays • Length 10:17Download video MP4
Download video MP3
Similar videos
-
11:59
usenix security '23 - inception: exposing new attack surfaces with training in transient execution
-
12:59
usenix security '23 - pushed by accident: a mixed-methods study on strategies of handling secret...
-
11:32
usenix security '23 - automated security analysis of exposure notification systems
-
11:20
usenix security '23 - the most dangerous codec in the world: finding and exploiting...
-
15:03
usenix security '23 - verizexe: decentralized private computation with universal setup
-
20:14
osdi '20 - efficiently mitigating transient execution attacks using the unmapped speculation...
-
10:17
usenix security '23 - carpetfuzz: automatic program option constraint extraction from...
-
12:34
usenix security '23 - formal analysis and patching of ble-sc pairing
-
53:23
offensivecon18 - vitaly nikolenko - concolic testing for kernel fuzzing and vulnerability discovery
-
21:11
srecon23 asia/pacific - better observability with no code changes
-
21:46
usenix security '18 - man-in-the-machine: exploiting ill-secured communication inside the computer
-
12:29
usenix security '23 - deresistor: toward detection-resistant probing for evasion of internet...
-
11:48
usenix security '23 - horuseye: a realtime iot malicious traffic detection framework using...
-
11:08
usenix security '20 - symbolic execution with symcc: don't interpret, compile!
-
11:15
usenix security '23 - fuzztruction: using fault injection-based fuzzing to leverage implicit...
-
11:06
usenix security '23 - a comprehensive, formal and automated analysis of the edhoc protocol
-
10:19
usenix security '23 - cipherh: automated detection of ciphertext side-channel vulnerabilities in...
-
13:13
usenix security '23 - forming faster firmware fuzzers
-
12:51
usenix security '23 - nautilus: automated restful api vulnerability detection
-
13:29
usenix security '22 - open to a fault: on the passive compromise of tls keys via transient errors