| | IEEE S&P’21 Program Committee Statement Regarding the “Hypocrite Commits” Paper [pdf] (ieee-security.org) |
|
2 points by Tomte on May 10, 2021 | past
|
| | EEE S&P’21 Statement Regarding The “Hypocrite Commits” [pdf] (ieee-security.org) |
|
1 point by neatze on May 8, 2021 | past
|
| | IEEE S&P’21 Program Committee Statement RegardingThe “Hypocrite Commits” Paper [pdf] (ieee-security.org) |
|
3 points by eplanit on May 8, 2021 | past
|
| | Ten Commandments of Commercial Security. Adi Shamir (1995) (ieee-security.org) |
|
2 points by dloss on Sept 10, 2020 | past
|
| | (How) Do People Change Their Passwords After a Breach? [pdf] (ieee-security.org) |
|
1 point by headalgorithm on June 1, 2020 | past
|
| | Self-encrypting deception: weaknesses in the encryption of solid state drives [pdf] (ieee-security.org) |
|
65 points by luu on Nov 20, 2019 | past | 18 comments
|
| | Practical Timing Side Channel Attacks Against Kernel Space ASLR [pdf] (ieee-security.org) |
|
1 point by godelmachine on May 31, 2018 | past
|
| | The Password Reset MitM Attack [pdf] (ieee-security.org) |
|
3 points by lainon on Dec 23, 2017 | past
|
| | The Impact of Copy&Paste on Android Application Security [pdf] (ieee-security.org) |
|
1 point by lainon on Aug 29, 2017 | past
|
| | The Password Reset MitM Attack [pdf] (ieee-security.org) |
|
1 point by based2 on July 5, 2017 | past
|
| | The Password Reset MitM Attack[pdf] (ieee-security.org) |
|
2 points by Deinos on July 3, 2017 | past
|
| | The Password Reset MitM Attack [pdf] (ieee-security.org) |
|
1 point by paultopia on June 21, 2017 | past | 1 comment
|
| | Password Typos and How to Correct Them Securely (2016) [pdf] (ieee-security.org) |
|
51 points by sillysaurus3 on June 16, 2017 | past | 13 comments
|
| | Obstacles to the Adoption of Secure Communication Tools [pdf] (ieee-security.org) |
|
1 point by sr2 on May 29, 2017 | past
|
| | Obstacles to the Adoption of Secure Communication Tools [pdf] (ieee-security.org) |
|
3 points by progval on May 26, 2017 | past
|
| | Security Impact of Copy&Paste from StackOverflow in Android Apps [pdf] (ieee-security.org) |
|
2 points by jor-el on May 24, 2017 | past
|
| | Finding and Preventing Bugs in JavaScript Bindings [pdf] (ieee-security.org) |
|
1 point by ingve on May 23, 2017 | past
|
| | An Analysis of Emission Defeat Devices in Modern Automobiles [pdf] (ieee-security.org) |
|
2 points by sr2 on May 22, 2017 | past
|
| | “Is Our Children’s Apps Learning?” [pdf] (ieee-security.org) |
|
2 points by edtechstrats on April 30, 2017 | past
|
| | Inferring User Routes and Locations Using Zero-Permission Mobile Sensors [pdf] (ieee-security.org) |
|
1 point by feelthepain on June 2, 2016 | past
|
| | LAVA: Large-Scale Automated Vulnerability Addition [pdf] (ieee-security.org) |
|
20 points by ingve on May 29, 2016 | past | 4 comments
|
| | Analog chip poisoning [pdf] (ieee-security.org) |
|
2 points by damc13 on May 27, 2016 | past
|
| | Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector [pdf] (ieee-security.org) |
|
3 points by jvdh on May 26, 2016 | past
|
| | A2: Analog Malicious Hardware [pdf] (ieee-security.org) |
|
4 points by petethomas on May 24, 2016 | past
|
| | Not-So-Random Numbers in Virtualized Linux and the Whirlwind RNG [pdf] (ieee-security.org) |
|
2 points by noyesno on Nov 3, 2015 | past
|
| | IEEE-Security.org has certificate only valid for *.sites.myregisteredsite.com (ieee-security.org) |
|
2 points by galapago on July 3, 2015 | past
|
| | Tracking Protection in Firefox for Privacy and Performance [pdf] (ieee-security.org) |
|
8 points by jsingleton on May 28, 2015 | past | 2 comments
|
| | The pitfalls of protocol design [pdf] (ieee-security.org) |
|
11 points by DyslexicAtheist on Sept 25, 2014 | past | 1 comment
|
| | Attacks Exploiting the HTML5 Screen Sharing API [pdf] (ieee-security.org) |
|
3 points by pmontra on June 26, 2014 | past
|
| | Stealing Webpages Rendered on Your Browser by Exploiting GPU Vulns [pdf] (ieee-security.org) |
|
10 points by ingenter on May 30, 2014 | past
|
|
|
More |