Courses from 1000+ universities
Discover an easier way to explore affordable, credit-worthy online courses with our expanded community college catalog.
600 Free Google Certifications
Web Development
Software Development
Digital Marketing
Advanced Precalculus: Geometry, Trigonometry and Exponentials
Introduction to Animal Behaviour
Astronomy: Exploring Time and Space
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from USENIX Security. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explores Tor's congestion issues, proposing KIST algorithm to improve network performance by optimizing socket management using real-time kernel information, reducing latency and increasing throughput.
Explore eclipse attacks on Bitcoin's P2P network, their impact on mining and consensus, and proposed countermeasures to enhance network security while maintaining decentralization.
Explores Control-Flow Bending attacks on Control-Flow Integrity defenses, revealing vulnerabilities in fine-grained CFI implementations and demonstrating the necessity of shadow stacks for enhanced security against memory corruption.
Explores BLE device privacy vulnerabilities and introduces BLE-Guardian, a system protecting user privacy by controlling device discovery and access without modifying existing devices or protocols.
Explores k-fingerprinting, a robust website fingerprinting technique using random decision forests, demonstrating high accuracy in identifying visited web pages through encrypted connections.
Automated approach to detect ransomware through dynamic analysis, focusing on file tampering and desktop changes. Improves detection of evasive ransomware unnoticed by traditional antimalware solutions.
Explores model extraction attacks on machine learning systems, demonstrating vulnerabilities in publicly accessible ML interfaces and proposing potential countermeasures to protect confidential models.
Innovative approach to bypass face authentication using 3D models created from social media photos, exploiting virtual reality to simulate liveness and fool security systems.
Unveils vulnerabilities in automotive remote keyless entry systems, demonstrating how attackers can exploit flaws to gain unauthorized access to vehicles from major manufacturers.
Explore zxcvbn, an innovative password strength estimator that outperforms traditional methods. Learn its efficient design, accuracy, and easy implementation for enhanced online security.
Explore software-based TPM implementation using ARM TrustZone, overcoming hardware limitations to provide robust security features for trusted computing in mobile devices.
Neural networks for modeling password guessability: faster, smaller, and more accurate than existing methods. Enables real-time, client-side password strength evaluation with sub-second latency.
Analyzes security risks in npm ecosystem, revealing vulnerabilities due to dependencies, maintainer influence, and lack of maintenance. Discusses potential mitigations for the JavaScript community.
Exploring challenges in building safe, trustworthy tech products for billions globally, drawing from past mistakes and suggesting ways forward in this complex, multidisciplinary issue.
Explore a privacy-preserving protocol for detecting exposed credentials, its implementation as a cloud service, and its effectiveness in prompting users to update compromised passwords.
Get personalized course recommendations, track subjects and courses with reminders, and more.