Media Summary: Meng Xu and Taesoo Kim, Georgia Institute of Technology Due to the continued exploitation of Adobe Reader, malicious ... Join us for Kubernetes Forums Seoul, Sydney, Bengaluru and Delhi - learn more at kubecon.io Don't miss KubeCon + ... SoK: Automated TTP Extraction from CTI Reports – Are We There Yet? Marvin Büchel, Carl von Ossietzky Universität Oldenburg; ...

Usenix Security 19 In Toto Providing Farm To Table Guarantees For Bits And Bytes - Detailed Analysis & Overview

Meng Xu and Taesoo Kim, Georgia Institute of Technology Due to the continued exploitation of Adobe Reader, malicious ... Join us for Kubernetes Forums Seoul, Sydney, Bengaluru and Delhi - learn more at kubecon.io Don't miss KubeCon + ... SoK: Automated TTP Extraction from CTI Reports – Are We There Yet? Marvin Büchel, Carl von Ossietzky Universität Oldenburg; ... Spill the TeA: An Empirical Study of Trusted Application Rollback Prevention on Android Smartphones Marcel Busch, Philipp Mao, ... Don't miss out! Join us at our upcoming events: EnvoyCon Virtual on October 15 and KubeCon + CloudNativeCon North America ...

Photo Gallery

USENIX Security '19 - in-toto: Providing farm-to-table guarantees for bits and bytes
USENIX Security '23 - ZBCAN: A Zero-Byte CAN Defense System
Microsoft Fabric: OneLake Security Tutorial
USENIX Security '19 - Security Educational Panel
USENIX Security '21 - Osiris: Automated Discovery of Microarchitectural Side Channels
USENIX Security '17 - PlatPal: Detecting Malicious Documents with Platform Diversity
USENIX Security '23 - The Gates of Time: Improving Cache Attacks with Transient Execution
USENIX Security '23 - ACORN: Input Validation for Secure Aggregation
USENIX Security '23 - TRust: A Compilation Framework for In-process Isolation to Protect Safe...
Securing the Software Supply Chain with in-toto - Santiago Torres-Arias & Justin Cappos, NYU
USENIX Security '23 - Inception: Exposing New Attack Surfaces with Training in Transient Execution
USENIX Security '23 - Security and Privacy Failures in Popular 2FA Apps
Sponsored
Sponsored
View Detailed Profile
USENIX Security '19 - in-toto: Providing farm-to-table guarantees for bits and bytes

USENIX Security '19 - in-toto: Providing farm-to-table guarantees for bits and bytes

in-

USENIX Security '23 - ZBCAN: A Zero-Byte CAN Defense System

USENIX Security '23 - ZBCAN: A Zero-Byte CAN Defense System

USENIX Security

Sponsored
Microsoft Fabric: OneLake Security Tutorial

Microsoft Fabric: OneLake Security Tutorial

Things will never get less

USENIX Security '19 - Security Educational Panel

USENIX Security '19 - Security Educational Panel

Security

USENIX Security '21 - Osiris: Automated Discovery of Microarchitectural Side Channels

USENIX Security '21 - Osiris: Automated Discovery of Microarchitectural Side Channels

USENIX Security

Sponsored
USENIX Security '17 - PlatPal: Detecting Malicious Documents with Platform Diversity

USENIX Security '17 - PlatPal: Detecting Malicious Documents with Platform Diversity

Meng Xu and Taesoo Kim, Georgia Institute of Technology Due to the continued exploitation of Adobe Reader, malicious ...

USENIX Security '23 - The Gates of Time: Improving Cache Attacks with Transient Execution

USENIX Security '23 - The Gates of Time: Improving Cache Attacks with Transient Execution

USENIX Security

USENIX Security '23 - ACORN: Input Validation for Secure Aggregation

USENIX Security '23 - ACORN: Input Validation for Secure Aggregation

USENIX Security

USENIX Security '23 - TRust: A Compilation Framework for In-process Isolation to Protect Safe...

USENIX Security '23 - TRust: A Compilation Framework for In-process Isolation to Protect Safe...

USENIX Security

Securing the Software Supply Chain with in-toto - Santiago Torres-Arias & Justin Cappos, NYU

Securing the Software Supply Chain with in-toto - Santiago Torres-Arias & Justin Cappos, NYU

Join us for Kubernetes Forums Seoul, Sydney, Bengaluru and Delhi - learn more at kubecon.io Don't miss KubeCon + ...

USENIX Security '23 - Inception: Exposing New Attack Surfaces with Training in Transient Execution

USENIX Security '23 - Inception: Exposing New Attack Surfaces with Training in Transient Execution

USENIX Security

USENIX Security '23 - Security and Privacy Failures in Popular 2FA Apps

USENIX Security '23 - Security and Privacy Failures in Popular 2FA Apps

USENIX Security

USENIX Security '25 - SoK: Automated TTP Extraction from CTI Reports – Are We There Yet?

USENIX Security '25 - SoK: Automated TTP Extraction from CTI Reports – Are We There Yet?

SoK: Automated TTP Extraction from CTI Reports – Are We There Yet? Marvin Büchel, Carl von Ossietzky Universität Oldenburg; ...

USENIX Security '23 - SAFER: Efficient and Error-Tolerant Binary Instrumentation

USENIX Security '23 - SAFER: Efficient and Error-Tolerant Binary Instrumentation

USENIX Security

USENIX Security '24 - Spill the TeA: An Empirical Study of Trusted Application Rollback...

USENIX Security '24 - Spill the TeA: An Empirical Study of Trusted Application Rollback...

Spill the TeA: An Empirical Study of Trusted Application Rollback Prevention on Android Smartphones Marcel Busch, Philipp Mao, ...

in-toto: Securing the Entire Software Supply Chain - Santiago Torres, NYU

in-toto: Securing the Entire Software Supply Chain - Santiago Torres, NYU

Don't miss out! Join us at our upcoming events: EnvoyCon Virtual on October 15 and KubeCon + CloudNativeCon North America ...