Видео:

USENIX Enigma 2019 Cryptocurrency: Burn It With Fire

Blockchains and Cryptocurrencies: Burn It With Fire (Nicholas Weaver)

The entire cryptocurrency and blockchain ecology is rife with frauds, criminalities, and tulip-mania style hype and needs to be ...

USENIX Enigma 2019 - The URLephant in the Room

Emily Stark, Google In a security professional's ideal world, every web user would carefully inspect their browser's URL bar on ...

USENIX Enigma 2019 - Countering Adversarial Cyber Campaigns

Max Smeets, Stanford University Over the course of the last three decades, and increasingly over the past eight years, state and ...

USENIX Enigma 2019 - The Offline Dimension of Online Crime

Jonathan Lusthaus, University of Oxford The conventional wisdom is that cybercrime is a largely anonymous activity that exists ...

USENIX Enigma 2019 - How to Predict Which Vulnerabilities Will Be Exploited

Tudor Dumitras, University of Maryland, College Park The rate at which software vulnerabilities are discovered is growing: the ...

USENIX Enigma 2019 - Moving Fast and Breaking Things: Security Misconfigurations

Kevin Borgolte, Princeton University Nowadays, security incidents have become a familiar "nuisance," and they regularly lead to ...

USENIX Enigma 2019 - Hardware Is the New Software: Finding Exploitable Bugs in Hardware Designs

Cynthia Sturton, University of North Carolina at Chapel Hill Bugs in hardware designs can create vulnerabilities that open the ...

USENIX Enigma 2019 - The Kids Aren't Alright—Security and Privacy in the K–12 Classroom

Alex Smolen, Clever Many of the security and privacy mechanisms we build - permission prompts, security warnings, privacy ...

USENIX Enigma 2019 - Provable Security at AWS

Neha Rungta, Amazon Web Services Using automated reasoning technology, the application of mathematical logic to help ...

USENIX Enigma 2019 - Abusability Testing: Considering the Ways Your Technology Might Be Used

Ashkan Soltani, Independent Researcher and Consultant Sign up to find out more about Enigma at usenix

USENIX Enigma 2020 - Stack Overflow: A Story of Two Security Tales

Stack Overflow: A Story of Two Security Tales Felix Fischer, Technical University of Munich Stack Overflow helps software ...

USENIX Enigma 2016 - Security and Usability from the Frontlines of Enterprise IT

Jon Oberheide, Co-Founder and CTO, Duo Security When you think about security and usability, IT is probably not the first thing to ...

USENIX Enigma 2019 - If Red Teaming Is Easy: You're Doing It Wrong

Aaron Grattafiori, Facebook Red Teaming is a popular topic for both internal security teams, and for external contractors to ...

USENIX Enigma 2019 - When the Magic Wears Off: Flaws in ML for Security Evaluations

Lorenzo Cavallaro, King's College London Academic research on machine learning-based malware classification appears to ...

USENIX Enigma 2019 - Convincing the Loser: Securing Elections against Modern Threats

Ben Adida, VotingWorks What does it take to build a secure voting system that people actually use? Because a democracy is only ...

How Does Enigma Securities Bring Liquidity For The Major Crypto Assets?

What is the market for liquidity for the major cryptocurrency assets? How can retail and institutional investors enter the market?

USENIX Enigma 2018 - Gig Work and the Digital Security Divide

Kendra Albert, Clinical Fellow, Harvard Law School This is a joint work with Elizabeth Anne Watkins. Computer security often ...

USENIX ATC '19 - The Semantics of Transactions and Weak Memory in x86, Power, ARM, and C++

Nathan Chong, Arm; Tyler Sorensen and John Wickerson, Imperial College London Best Paper at PLDI 2018 Weak memory ...

USENIX Security '19 - ATTACK2VEC: Leveraging Temporal Word Embeddings to Understand the

ATTACK2VEC: Leveraging Temporal Word Embeddings to Understand the Evolution of Cyberattacks Yun Shen, Symantec ...

Fire Fights Back Against Firefighter

ATTACK2VEC: Leveraging Temporal Word Embeddings to Understand the Evolution of Cyberattacks Yun Shen, Symantec ......

Smoke From Australian Wildfires Blackens the Noon-Day Sky

ATTACK2VEC: Leveraging Temporal Word Embeddings to Understand the Evolution of Cyberattacks Yun Shen, Symantec ......

Truck Engulfed in Flames Rolls into Fire Truck

ATTACK2VEC: Leveraging Temporal Word Embeddings to Understand the Evolution of Cyberattacks Yun Shen, Symantec ......

Something Strange Falling From the Sky

ATTACK2VEC: Leveraging Temporal Word Embeddings to Understand the Evolution of Cyberattacks Yun Shen, Symantec ......