| USENIX Enigma/Enigma 2016/Presentations/enigma16_slides_armageddon.pdf |
1.4 MB |
| USENIX Enigma/Enigma 2016/Presentations/enigma16_slides_debeauvoir.pdf |
5.5 MB |
| USENIX Enigma/Enigma 2016/Presentations/enigma16_slides_freeman.pdf |
14.8 MB |
| USENIX Enigma/Enigma 2016/Presentations/enigma16_slides_genovese.pdf |
5.8 MB |
| USENIX Enigma/Enigma 2016/Presentations/enigma16_slides_halderman.pdf |
7.6 MB |
| USENIX Enigma/Enigma 2016/Presentations/enigma16_slides_heiderich.pdf |
131 KB |
| USENIX Enigma/Enigma 2016/Presentations/enigma16_slides_kohno.pdf |
1 MB |
| USENIX Enigma/Enigma 2016/Presentations/enigma16_slides_savage.pdf |
20.9 MB |
| USENIX Enigma/Enigma 2016/Presentations/enigma16_slides_stepanovich.pdf |
6.5 MB |
| USENIX Enigma/Enigma 2016/Presentations/enigma16_slides_weaver.pdf |
3.6 MB |
| USENIX Enigma/Enigma 2016/Presentations/enigma_2016_slides_rivest.pdf |
64 KB |
| USENIX Enigma/Enigma 2016/Presentations/enigma_slides_brown.pdf |
6.1 MB |
| USENIX Enigma/Enigma 2016/Presentations/enigma_slides_felt.pdf |
1.5 MB |
| USENIX Enigma/Enigma 2016/Presentations/enigma_slides_fu.pdf |
30.5 MB |
| USENIX Enigma/Enigma 2016/Presentations/enigma_slides_galperin.pdf |
7.9 MB |
| USENIX Enigma/Enigma 2016/Presentations/enigma_slides_hawkes.pdf |
84 KB |
| USENIX Enigma/Enigma 2016/Presentations/enigma_slides_joyce.pdf |
1.1 MB |
| USENIX Enigma/Enigma 2016/Presentations/enigma_slides_majkowski.pdf |
2.3 MB |
| USENIX Enigma/Enigma 2016/Presentations/enigma_slides_mccoy.pdf |
8.4 MB |
| USENIX Enigma/Enigma 2016/Presentations/enigma_slides_nighswander.pdf |
17.8 MB |
| USENIX Enigma/Enigma 2016/Presentations/enigma_slides_oberheide.pdf |
3.3 MB |
| USENIX Enigma/Enigma 2016/Presentations/enigma_slides_payne.pdf |
6.1 MB |
| USENIX Enigma/Enigma 2016/Presentations/enigma_slides_peterson.pdf |
59.6 MB |
| USENIX Enigma/Enigma 2016/Presentations/enigma_slides_rozier.pdf |
52.1 MB |
| USENIX Enigma/Enigma 2016/Presentations/enigma_slides_serebryany.pdf |
357 KB |
| USENIX Enigma/Enigma 2016/Presentations/enigma_slides_smith.pdf |
6.3 MB |
| USENIX Enigma/Enigma 2016/Presentations/enigma_slides_sullivan.pdf |
2.9 MB |
| USENIX Enigma/Enigma 2016/Presentations/enigma_slides_teague.pdf |
1.9 MB |
| USENIX Enigma/Enigma 2016/Presentations/enigma_slides_vigna.pdf |
18.9 MB |
| USENIX Enigma/Enigma 2016/Presentations/enigma_slides_wurster.pdf |
1.7 MB |
| USENIX Enigma/Enigma 2016/Presentations/enigma_slides_zhu-yan.pdf |
3.4 MB |
| USENIX Enigma/Enigma 2016/Presentations/rubin.enigma.pdf |
7.1 MB |
| USENIX Enigma/Enigma 2016/Video/David Freeman of LinkedIn on His Enigma Conference Talk.mp4 |
6.9 MB |
| USENIX Enigma/Enigma 2016/Video/David Freeman of LinkedIn on His Enigma Conference Talk.srt |
1 KB |
| USENIX Enigma/Enigma 2016/Video/Elie Bursztein of Google Previews His Enigma Talk.mp4 |
3.6 MB |
| USENIX Enigma/Enigma 2016/Video/Elie Bursztein of Google Previews His Enigma Talk.srt |
1 KB |
| USENIX Enigma/Enigma 2016/Video/Enigma Conference Speaker Nicholas Weaver Discusses His Talk.mp4 |
7.3 MB |
| USENIX Enigma/Enigma 2016/Video/Enigma Conference Speaker Nicholas Weaver Discusses His Talk.srt |
1 KB |
| USENIX Enigma/Enigma 2016/Video/Eva Galperin of the EFF on Her Enigma Conference Talk.mp4 |
4.1 MB |
| USENIX Enigma/Enigma 2016/Video/Eva Galperin of the EFF on Her Enigma Conference Talk.srt |
2 KB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - A Million Hit Points and Infinite Charisma How Games Can Fix....mp4 |
158.4 MB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - A Million Hit Points and Infinite Charisma How Games Can Fix....srt |
37 KB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - Building a Competitive Hacking Team.mp4 |
175 MB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - Building a Competitive Hacking Team.srt |
43 KB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - Building a DDoS Mitigation Pipeline.mp4 |
44.3 MB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - Building a DDoS Mitigation Pipeline.srt |
38 KB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - Bullet-Proof Credit Card Processing.mp4 |
99.1 MB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - Bullet-Proof Credit Card Processing.srt |
44 KB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - Capture the Flag An Owner s Manual.mp4 |
185.4 MB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - Capture the Flag An Owner s Manual.srt |
40 KB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - Computer Security and the Internet of Things.mp4 |
125.9 MB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - Computer Security and the Internet of Things.srt |
40 KB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - Data Integrity Based Attacks in Investigative Domains.mp4 |
167.5 MB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - Data Integrity Based Attacks in Investigative Domains.srt |
41 KB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - Defending, Detecting, and Responding to Hardware and Firmware Attacks.mp4 |
96 MB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - Defending, Detecting, and Responding to Hardware and Firmware Attacks.srt |
46 KB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - Dolla Dolla Bill Y all Cybercrime Cashouts.mp4 |
171.1 MB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - Dolla Dolla Bill Y all Cybercrime Cashouts.srt |
43 KB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - Drops for Stuff An Analysis of Reshipping Mule Scams.mp4 |
174.6 MB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - Drops for Stuff An Analysis of Reshipping Mule Scams.srt |
34 KB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - From Concept to Deployment - the Life (and Death) of Security Features.mp4 |
149.5 MB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - From Concept to Deployment - the Life (and Death) of Security Features.srt |
32 KB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - Hacking Health Security in Healthcare IT Systems.mp4 |
138.2 MB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - Hacking Health Security in Healthcare IT Systems.srt |
42 KB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - Internet Voting What Could Go Wrong.mp4 |
182.3 MB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - Internet Voting What Could Go Wrong.srt |
38 KB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - Keys Under Doormats Mandating Insecurity....mp4 |
220.5 MB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - Keys Under Doormats Mandating Insecurity....srt |
41 KB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - Lessons Learned While Protecting Gmail.mp4 |
218.1 MB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - Lessons Learned While Protecting Gmail.srt |
52 KB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - Medical Device Security.mp4 |
166.9 MB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - Medical Device Security.srt |
39 KB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - Modern Automotive Security History, Disclosure, and Consequences.mp4 |
93.3 MB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - Modern Automotive Security History, Disclosure, and Consequences.srt |
45 KB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - NSA TAO Chief on Disrupting Nation State Hackers.mp4 |
359.8 MB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - NSA TAO Chief on Disrupting Nation State Hackers.srt |
57 KB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - PKI at Scale Using Short-lived Certificates.mp4 |
74.8 MB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - PKI at Scale Using Short-lived Certificates.srt |
44 KB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - Panopticlick Fingerprinting Your Web Presence.mp4 |
204.1 MB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - Panopticlick Fingerprinting Your Web Presence.srt |
37 KB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - Protecting High Risk Users.mp4 |
205.7 MB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - Protecting High Risk Users.srt |
53 KB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - Sanitize, Fuzz, and Harden Your C++ Code.mp4 |
132.3 MB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - Sanitize, Fuzz, and Harden Your C++ Code.srt |
30 KB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - Security and Usability from the Frontlines of Enterprise IT.mp4 |
185.1 MB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - Security and Usability from the Frontlines of Enterprise IT.srt |
48 KB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - Server-side Second Factors....mp4 |
133.5 MB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - Server-side Second Factors....srt |
32 KB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - Several Horror Stories about the Encrypted Web.mp4 |
105.6 MB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - Several Horror Stories about the Encrypted Web.srt |
45 KB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - Social Media Self-Defense A Guide to Stopping Stalkers.mp4 |
144.8 MB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - Social Media Self-Defense A Guide to Stopping Stalkers.srt |
31 KB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - The Global Conversation on Encryption.mp4 |
173.6 MB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - The Global Conversation on Encryption.srt |
38 KB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - The Golden Age of Bulk Surveillance.mp4 |
130.2 MB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - The Golden Age of Bulk Surveillance.srt |
33 KB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - Timeless Debugging.mp4 |
132.3 MB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - Timeless Debugging.srt |
37 KB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - ToStaticHTML for Everyone! About DOMPurify.mp4 |
169 MB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - ToStaticHTML for Everyone! About DOMPurify.srt |
42 KB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - Trust Beyond the First Hop-What Really Happens to Data Sent to HTTPS Websites.mp4 |
174.4 MB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - Trust Beyond the First Hop-What Really Happens to Data Sent to HTTPS Websites.srt |
32 KB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - Usable Security-The Source Awakens.mp4 |
135.7 MB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - Usable Security-The Source Awakens.srt |
28 KB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - Verification, Auditing, and Evidence If We Didn Not Notice Anything Wrong..mp4 |
222.2 MB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - Verification, Auditing, and Evidence If We Didn Not Notice Anything Wrong.srt |
38 KB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - We Need Something Better-Building STAR Vote.mp4 |
217.9 MB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - We Need Something Better-Building STAR Vote.srt |
30 KB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - What Makes Software Exploitation Hard.mp4 |
222.1 MB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - What Makes Software Exploitation Hard.srt |
36 KB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - Why Is Usable Security Hard, and What Should We Do about it.mp4 |
176.9 MB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 - Why Is Usable Security Hard, and What Should We Do about it.srt |
37 KB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 Opening Video.mp4 |
12.3 MB |
| USENIX Enigma/Enigma 2016/Video/USENIX Enigma 2016 Trailer.mp4 |
4.9 MB |
| USENIX Enigma/Enigma 2016/Video/Why Enigma.mp4 |
9 MB |
| USENIX Enigma/Enigma 2016/Video/Why Enigma.srt |
3 KB |
| USENIX Enigma/Enigma 2017/USENIX Enigma 2017 - Adversarial Examples in Machine Learning.mp4 |
23.3 MB |
| USENIX Enigma/Enigma 2017/USENIX Enigma 2017 - As We May Code.mp4 |
41.5 MB |
| USENIX Enigma/Enigma 2017/USENIX Enigma 2017 - Behaviors and Patterns of Bulletproof and Anonymous Hosting Providers.mp4 |
24.9 MB |
| USENIX Enigma/Enigma 2017/USENIX Enigma 2017 - Beyond Warm & Fuzzy Ethics as a Value Prop.mp4 |
33 MB |
| USENIX Enigma/Enigma 2017/USENIX Enigma 2017 - Brains Can Be Hacked. Why Should You Care.mp4 |
23.3 MB |
| USENIX Enigma/Enigma 2017/USENIX Enigma 2017 - Classifiers under Attack.mp4 |
21.8 MB |
| USENIX Enigma/Enigma 2017/USENIX Enigma 2017 - Cyber Security A DARPA Perspective.mp4 |
27.7 MB |
| USENIX Enigma/Enigma 2017/USENIX Enigma 2017 - Deviation from the Norms The Necessity and Challenges ....mp4 |
46 MB |
| USENIX Enigma/Enigma 2017/USENIX Enigma 2017 - Drawing the Foul Operation of a DDoS Honeypot.mp4 |
24.1 MB |
| USENIX Enigma/Enigma 2017/USENIX Enigma 2017 - FeatureSmith Learning to Detect Malware by Mining the Security Literature.mp4 |
27.5 MB |
| USENIX Enigma/Enigma 2017/USENIX Enigma 2017 - Ghost in the Machine Challenges in Embedded Binary Security.mp4 |
22.8 MB |
| USENIX Enigma/Enigma 2017/USENIX Enigma 2017 - Green Sprouts Encouraging Signs of Life from the Department of ....mp4 |
61.7 MB |
| USENIX Enigma/Enigma 2017/USENIX Enigma 2017 - Hacking Sensors.mp4 |
24.5 MB |
| USENIX Enigma/Enigma 2017/USENIX Enigma 2017 - How WhatsApp Reduced Spam while Launching End-to-End Encryption.mp4 |
37.6 MB |
| USENIX Enigma/Enigma 2017/USENIX Enigma 2017 - Human Computation with an Application to Passwords.mp4 |
26.2 MB |
| USENIX Enigma/Enigma 2017/USENIX Enigma 2017 - Inside MOAR TLS How We Think about Encouraging External ....mp4 |
48.1 MB |
| USENIX Enigma/Enigma 2017/USENIX Enigma 2017 - IoT, a Cybercriminals Paradise.mp4 |
20.5 MB |
| USENIX Enigma/Enigma 2017/USENIX Enigma 2017 - LLC Cache Attacks Applicability and Countermeasures.mp4 |
21.9 MB |
| USENIX Enigma/Enigma 2017/USENIX Enigma 2017 - Legislative Engineering Design Privacy Laws, Dont Just Draft Them.mp4 |
42.9 MB |
| USENIX Enigma/Enigma 2017/USENIX Enigma 2017 - Leveraging the Power of Automated Reasoning in ....mp4 |
33.5 MB |
| USENIX Enigma/Enigma 2017/USENIX Enigma 2017 - Moving Account Recovery beyond Email and the Secret Question.mp4 |
46.9 MB |
| USENIX Enigma/Enigma 2017/USENIX Enigma 2017 - National Scale Cyber Security.mp4 |
57.7 MB |
| USENIX Enigma/Enigma 2017/USENIX Enigma 2017 - Neural and Behavioral Insights on Trust.mp4 |
52 MB |
| USENIX Enigma/Enigma 2017/USENIX Enigma 2017 - Putting Privacy Notices to the Test.mp4 |
25.5 MB |
| USENIX Enigma/Enigma 2017/USENIX Enigma 2017 - Secrets at Scale Automated Bootstrapping of Secrets & Identity in the Cloud.mp4 |
23 MB |
| USENIX Enigma/Enigma 2017/USENIX Enigma 2017 - Security for Vulnerable Populations - On the Interplay of ....mp4 |
73.2 MB |
| USENIX Enigma/Enigma 2017/USENIX Enigma 2017 - Security in the Wild for Low-Profile Activists.mp4 |
77.8 MB |
| USENIX Enigma/Enigma 2017/USENIX Enigma 2017 - Startups + Industry How Everyone Can Win.mp4 |
76.2 MB |
| USENIX Enigma/Enigma 2017/USENIX Enigma 2017 - StreamAlert A Serverless, Real-time Intrusion Detection Engine.mp4 |
21.7 MB |
| USENIX Enigma/Enigma 2017/USENIX Enigma 2017 - Test Driven Security in Continuous Integration.mp4 |
38.6 MB |
| USENIX Enigma/Enigma 2017/USENIX Enigma 2017 - The Paper Ballot Is Not Enough.mp4 |
41.5 MB |
| USENIX Enigma/Enigma 2017/USENIX Enigma 2017 - Understanding and Designing for End Users Security Expectations.mp4 |
28.5 MB |
| USENIX Enigma/Enigma 2017/USENIX Enigma 2017 - Understanding and Securing DoD Weapon Systems.mp4 |
23.9 MB |
| USENIX Enigma/Enigma 2017/USENIX Enigma 2017 - What Cybersecurity Can Learn from the Secret Service.mp4 |
40.4 MB |
| USENIX Enigma/Enigma 2017/USENIX Enigma 2017 - What Does the Brain Tell Us about Usable Security.mp4 |
23 MB |
| USENIX Enigma/Enigma 2017/USENIX Enigma 2017 - Why Philanthropy Is Critical for Cybersecurity.mp4 |
75.7 MB |
| USENIX Enigma/Enigma 2017/USENIX Enigma 2017 - Wont Somebody Please Think of the Journalists.mp4 |
38 MB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - Anatomy of Account Takeover.en.transcribed.srt |
43 KB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - Anatomy of Account Takeover.mp4 |
20.9 MB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - Being Creative, Securely.en.transcribed.srt |
59 KB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - Being Creative, Securely.mp4 |
37.6 MB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - Bits & Bytes, Flesh & Blood, and Saving Real Lives via Clinical Simulations.en.transcribed.srt |
64 KB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - Bits & Bytes, Flesh & Blood, and Saving Real Lives via Clinical Simulations.mp4 |
43.6 MB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - Combining the Power of Builders and Breakers.en.transcribed.srt |
60 KB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - Combining the Power of Builders and Breakers.mp4 |
44.5 MB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - Compliance != Security (Except When It Might Be).en.transcribed.srt |
64 KB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - Compliance != Security (Except When It Might Be).mp4 |
22.9 MB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - Crypto Crumple Zones Protecting Encryption in a Time of Political Uncertainty.en.transcribed.srt |
65 KB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - Crypto Crumple Zones Protecting Encryption in a Time of Political Uncertainty.mp4 |
21.6 MB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - Cryptographically Secure Data Analysis for Social Good.en.transcribed.srt |
70 KB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - Cryptographically Secure Data Analysis for Social Good.mp4 |
38.5 MB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - Cyber Strategy The Evolving Nature of Cyber Power and Coercion.en.transcribed.srt |
51 KB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - Cyber Strategy The Evolving Nature of Cyber Power and Coercion.mp4 |
31.8 MB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - Developing a Science of Internet Censorship Resistance Opportunities and ....en.transcribed.srt |
53 KB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - Developing a Science of Internet Censorship Resistance Opportunities and ....mp4 |
19.4 MB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - Differential Privacy at Scale Uber and Berkeley Collaboration.en.transcribed.srt |
67 KB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - Differential Privacy at Scale Uber and Berkeley Collaboration.mp4 |
22.6 MB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - Emerging Cryptography.en.transcribed.srt |
56 KB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - Emerging Cryptography.mp4 |
32.3 MB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - Gig Work and the Digital Security Divide.en.transcribed.srt |
57 KB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - Gig Work and the Digital Security Divide.mp4 |
26.3 MB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - Going Nuclear Programmatic Protections against....en.transcribed.srt |
62 KB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - Going Nuclear Programmatic Protections against....mp4 |
34.5 MB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - Hacking the Law Are Bug Bounties a True Safe Harbor.en.transcribed.srt |
51 KB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - Hacking the Law Are Bug Bounties a True Safe Harbor.mp4 |
38.3 MB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - Hats off to DevSecOps.en.transcribed.srt |
65 KB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - Hats off to DevSecOps.mp4 |
39.7 MB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - Insecurity in Information Technology.en.transcribed.srt |
54 KB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - Insecurity in Information Technology.mp4 |
37.9 MB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - IoE, Connecting Regulation to Risk.en.transcribed.srt |
62 KB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - IoE, Connecting Regulation to Risk.mp4 |
36.9 MB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - LISA A Practical Zero Trust Architecture.en.transcribed.srt |
68 KB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - LISA A Practical Zero Trust Architecture.mp4 |
22.8 MB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - Least Privilege Security Gain without Developer Pain.en.transcribed.srt |
51 KB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - Least Privilege Security Gain without Developer Pain.mp4 |
27 MB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - Modern Mind Control Public Opinion Manipulation in Our Online World.en.transcribed.srt |
66 KB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - Modern Mind Control Public Opinion Manipulation in Our Online World.mp4 |
36.7 MB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - Privacy @ Instagram.en.transcribed.srt |
41 KB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - Privacy @ Instagram.mp4 |
16.9 MB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - Protecting Financial Stability against Cyber ....en.transcribed.srt |
67 KB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - Protecting Financial Stability against Cyber ....mp4 |
25.4 MB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - Protecting Firefox Data with Content Signatures.en.transcribed.srt |
54 KB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - Protecting Firefox Data with Content Signatures.mp4 |
20.2 MB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - Rage against the Ghost in the Machine.en.transcribed.srt |
57 KB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - Rage against the Ghost in the Machine.mp4 |
45.4 MB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - Security Technology Adoption; Building Hardware Is Just the Start - YouTube.en.transcribed.srt |
45 KB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - Security Technology Adoption_ Building Hardware Is Just the Start - YouTube.mp4 |
21.2 MB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - Social Cybersecurity Reshaping Security ....en.transcribed.srt |
59 KB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - Social Cybersecurity Reshaping Security ....mp4 |
27.9 MB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - Some Thoughts on Deep Learning and Infosec.en.transcribed.srt |
55 KB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - Some Thoughts on Deep Learning and Infosec.mp4 |
21.9 MB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - Stranger Things Who’s Listening When the Device Is Always On.en.transcribed.srt |
50 KB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - Stranger Things Who’s Listening When the Device Is Always On.mp4 |
35 MB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - Surfing the Motivation Wave to Create Security Behavior Change.en.transcribed.srt |
62 KB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - Surfing the Motivation Wave to Create Security Behavior Change.mp4 |
28.6 MB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - The Evolving Architecture of the Web and Its Impact on Security, ....en.transcribed.srt |
40 KB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - The Evolving Architecture of the Web and Its Impact on Security, ....mp4 |
17.9 MB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - The Future of Cyber-Autonomy.en.transcribed.srt |
65 KB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - The Future of Cyber-Autonomy.mp4 |
34.2 MB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - The Great Cryptographic Divide.en.transcribed.srt |
63 KB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - The Great Cryptographic Divide.mp4 |
57.5 MB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - The Impact of Third-party Code on Android App Security.en.transcribed.srt |
48 KB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - The Impact of Third-party Code on Android App Security.mp4 |
17.2 MB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - The Web Tracking Arms Race Past, Present, and Future.en.transcribed.srt |
71 KB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - The Web Tracking Arms Race Past, Present, and Future.mp4 |
34.2 MB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - We Gave You This Internet, Now Play by Our Rules.en.transcribed.srt |
62 KB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - We Gave You This Internet, Now Play by Our Rules.mp4 |
32.7 MB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - What Would You Do With a Nation-State Cyber Army.en.transcribed.srt |
52 KB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - What Would You Do With a Nation-State Cyber Army.mp4 |
24.3 MB |
| USENIX Enigma/Enigma 2018/USENIX Enigma 2018 - When Malware is Packin’ Heat.mp4 |
32.3 MB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - Abusability Testing Considering the Ways Your Technology Might Be Used.en.transcribed.srt |
63 KB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - Abusability Testing Considering the Ways Your Technology Might Be Used.mp4 |
22.3 MB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - Building Identity for an Open Perimeter.en.transcribed.srt |
54 KB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - Building Identity for an Open Perimeter.mp4 |
23.9 MB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - Building a Secure Data Market on Blockchain.en.transcribed.srt |
71 KB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - Building a Secure Data Market on Blockchain.mp4 |
31.2 MB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - Callisto A Cryptographic Approach to #MeToo.en.transcribed.srt |
55 KB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - Callisto A Cryptographic Approach to #MeToo.mp4 |
17.4 MB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - Convincing the Loser Securing Elections against Modern Threats.en.transcribed.srt |
60 KB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - Convincing the Loser Securing Elections against Modern Threats.mp4 |
23.2 MB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - Countering Adversarial Cyber Campaigns.en.transcribed.srt |
49 KB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - Countering Adversarial Cyber Campaigns.mp4 |
22.6 MB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - Cryptocurrency Burn It with Fire.en.transcribed.srt |
52 KB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - Cryptocurrency Burn It with Fire.mp4 |
25.6 MB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - Digital Authoritarianism, Data Protection, and the Battle.en.transcribed.srt |
80 KB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - Digital Authoritarianism, Data Protection, and the Battle.mp4 |
23.9 MB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - Grey Science.en.transcribed.srt |
59 KB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - Grey Science.mp4 |
17.8 MB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - Hardware Is the New Software Finding Exploitable Bugs in Hardware Designs.en.transcribed.srt |
59 KB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - Hardware Is the New Software Finding Exploitable Bugs in Hardware Designs.mp4 |
16.5 MB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - Hardware Security Modules The Ultimate Black Boxes.en.transcribed.srt |
71 KB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - Hardware Security Modules The Ultimate Black Boxes.mp4 |
17.3 MB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - How to Predict Which Vulnerabilities Will Be Exploited.en.transcribed.srt |
50 KB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - How to Predict Which Vulnerabilities Will Be Exploited.mp4 |
25.7 MB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - If Red Teaming Is Easy You're Doing It Wrong.en.transcribed.srt |
51 KB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - If Red Teaming Is Easy You're Doing It Wrong.mp4 |
28.3 MB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - Insider Attack Resistance in the Android Ecosystem.en.transcribed.srt |
59 KB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - Insider Attack Resistance in the Android Ecosystem.mp4 |
18.3 MB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - It's Not Our Data Do We Want to Create a World of No Surprises.en.transcribed.srt |
59 KB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - It's Not Our Data Do We Want to Create a World of No Surprises.mp4 |
26.1 MB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - Learning from the Dark Web Dimension of Data.en.transcribed.srt |
50 KB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - Learning from the Dark Web Dimension of Data.mp4 |
21.2 MB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - Mobile App Privacy Analysis at Scale.en.transcribed.srt |
67 KB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - Mobile App Privacy Analysis at Scale.mp4 |
25.8 MB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - Moving Fast and Breaking Things Security Misconfigurations.en.transcribed.srt |
60 KB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - Moving Fast and Breaking Things Security Misconfigurations.mp4 |
19.2 MB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - Mr. Lord Goes to Washington, or Applying Security outside the Tech World.en.transcribed.srt |
66 KB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - Mr. Lord Goes to Washington, or Applying Security outside the Tech World.mp4 |
22.2 MB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - Next Steps For Browser Privacy Pursuing Privacy Protections Beyond Extensions.en.transcribed.srt |
57 KB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - Next Steps For Browser Privacy Pursuing Privacy Protections Beyond Extensions.mp4 |
17.5 MB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - Physical OPSEC as a Metaphor for Infosec.en.transcribed.srt |
52 KB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - Physical OPSEC as a Metaphor for Infosec.mp4 |
17.8 MB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - Privacy Engineering Not Just for Privacy Engineers.en.transcribed.srt |
38 KB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - Privacy Engineering Not Just for Privacy Engineers.mp4 |
15 MB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - Provable Security at AWS.en.transcribed.srt |
50 KB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - Provable Security at AWS.mp4 |
20.2 MB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - Rethinking the Detection of Child Sexual Abuse Imagery on the Internet.en.transcribed.srt |
44 KB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - Rethinking the Detection of Child Sexual Abuse Imagery on the Internet.mp4 |
20.3 MB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - Something You Have and Someone You Know-Designing for Interpersonal Security.en.transcribed.srt |
59 KB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - Something You Have and Someone You Know-Designing for Interpersonal Security.mp4 |
23.5 MB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - Stethoscope Securely Configuring Devices without Systems Management.en.transcribed.srt |
55 KB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - Stethoscope Securely Configuring Devices without Systems Management.mp4 |
17.5 MB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - The Kids Aren't Alright-Security and Privacy in the K–12 Classroom.en.transcribed.srt |
44 KB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - The Kids Aren't Alright-Security and Privacy in the K–12 Classroom.mp4 |
22.2 MB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - The Offline Dimension of Online Crime.en.transcribed.srt |
63 KB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - The Offline Dimension of Online Crime.mp4 |
19.2 MB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - The URLephant in the Room.en.transcribed.srt |
57 KB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - The URLephant in the Room.mp4 |
22.5 MB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - Usage of Behavioral Biometric Technologies to Defend Against Bots.en.transcribed.srt |
61 KB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - Usage of Behavioral Biometric Technologies to Defend Against Bots.mp4 |
26.5 MB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - User Agent 2.0 What Can the Browser Do for the User.en.transcribed.srt |
66 KB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - User Agent 2.0 What Can the Browser Do for the User.mp4 |
25.6 MB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - Using Architecture and Abstractions to Design a Security Layer for TLS.en.transcribed.srt |
73 KB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - Using Architecture and Abstractions to Design a Security Layer for TLS.mp4 |
28.8 MB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - When the Magic Wears Off Flaws in ML for Security Evaluations.mp4 |
26.7 MB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - Where Is the Web Closed.en.transcribed.srt |
51 KB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - Where Is the Web Closed.mp4 |
15.7 MB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - Why Even Experienced and Highly Intelligent Developers.en.transcribed.srt |
42 KB |
| USENIX Enigma/Enigma 2019/USENIX Enigma 2019 - Why Even Experienced and Highly Intelligent Developers.mp4 |
28.7 MB |
| USENIX Enigma/Enigma Interviews/USENIX presents Enigma Interviews (8 23 17) - featuring Eva Galperin and Alex Stamos.mp4 |
426.1 MB |
| USENIX Enigma/Enigma Interviews/USENIX presents Enigma Interviews 2 (11 29 17) - featuring Stefan Savage and Deirdre Mulligan.mp4 |
347.3 MB |
| USENIX Enigma/Enigma logo.jpg |
4 KB |
| USENIX Enigma/USENIX Enigma thank you.txt |
737 B |