Hacker News new | past | comments | ask | show | jobs | submit | from login
IEEE S&P’21 Program Committee Statement Regarding the “Hypocrite Commits” Paper [pdf] (ieee-security.org)
2 points by Tomte on May 10, 2021 | past
EEE S&P’21 Statement Regarding The “Hypocrite Commits” [pdf] (ieee-security.org)
1 point by neatze on May 8, 2021 | past
IEEE S&P’21 Program Committee Statement RegardingThe “Hypocrite Commits” Paper [pdf] (ieee-security.org)
3 points by eplanit on May 8, 2021 | past
Ten Commandments of Commercial Security. Adi Shamir (1995) (ieee-security.org)
2 points by dloss on Sept 10, 2020 | past
(How) Do People Change Their Passwords After a Breach? [pdf] (ieee-security.org)
1 point by headalgorithm on June 1, 2020 | past
Self-encrypting deception: weaknesses in the encryption of solid state drives [pdf] (ieee-security.org)
65 points by luu on Nov 20, 2019 | past | 18 comments
Practical Timing Side Channel Attacks Against Kernel Space ASLR [pdf] (ieee-security.org)
1 point by godelmachine on May 31, 2018 | past
The Password Reset MitM Attack [pdf] (ieee-security.org)
3 points by lainon on Dec 23, 2017 | past
The Impact of Copy&Paste on Android Application Security [pdf] (ieee-security.org)
1 point by lainon on Aug 29, 2017 | past
The Password Reset MitM Attack [pdf] (ieee-security.org)
1 point by based2 on July 5, 2017 | past
The Password Reset MitM Attack[pdf] (ieee-security.org)
2 points by Deinos on July 3, 2017 | past
The Password Reset MitM Attack [pdf] (ieee-security.org)
1 point by paultopia on June 21, 2017 | past | 1 comment
Password Typos and How to Correct Them Securely (2016) [pdf] (ieee-security.org)
51 points by sillysaurus3 on June 16, 2017 | past | 13 comments
Obstacles to the Adoption of Secure Communication Tools [pdf] (ieee-security.org)
1 point by sr2 on May 29, 2017 | past
Obstacles to the Adoption of Secure Communication Tools [pdf] (ieee-security.org)
3 points by progval on May 26, 2017 | past
Security Impact of Copy&Paste from StackOverflow in Android Apps [pdf] (ieee-security.org)
2 points by jor-el on May 24, 2017 | past
Finding and Preventing Bugs in JavaScript Bindings [pdf] (ieee-security.org)
1 point by ingve on May 23, 2017 | past
An Analysis of Emission Defeat Devices in Modern Automobiles [pdf] (ieee-security.org)
2 points by sr2 on May 22, 2017 | past
“Is Our Children’s Apps Learning?” [pdf] (ieee-security.org)
2 points by edtechstrats on April 30, 2017 | past
Inferring User Routes and Locations Using Zero-Permission Mobile Sensors [pdf] (ieee-security.org)
1 point by feelthepain on June 2, 2016 | past
LAVA: Large-Scale Automated Vulnerability Addition [pdf] (ieee-security.org)
20 points by ingve on May 29, 2016 | past | 4 comments
Analog chip poisoning [pdf] (ieee-security.org)
2 points by damc13 on May 27, 2016 | past
Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector [pdf] (ieee-security.org)
3 points by jvdh on May 26, 2016 | past
A2: Analog Malicious Hardware [pdf] (ieee-security.org)
4 points by petethomas on May 24, 2016 | past
Not-So-Random Numbers in Virtualized Linux and the Whirlwind RNG [pdf] (ieee-security.org)
2 points by noyesno on Nov 3, 2015 | past
IEEE-Security.org has certificate only valid for *.sites.myregisteredsite.com (ieee-security.org)
2 points by galapago on July 3, 2015 | past
Tracking Protection in Firefox for Privacy and Performance [pdf] (ieee-security.org)
8 points by jsingleton on May 28, 2015 | past | 2 comments
The pitfalls of protocol design [pdf] (ieee-security.org)
11 points by DyslexicAtheist on Sept 25, 2014 | past | 1 comment
Attacks Exploiting the HTML5 Screen Sharing API [pdf] (ieee-security.org)
3 points by pmontra on June 26, 2014 | past
Stealing Webpages Rendered on Your Browser by Exploiting GPU Vulns [pdf] (ieee-security.org)
10 points by ingenter on May 30, 2014 | past

Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: