Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Artificial Intelligence
Software Development
Cybersecurity
Transforming Digital Learning: Learning Design Meets Service Design
Matrix Algebra for Engineers
Anatomy: Know Your Abdomen
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore all talks and presentations from USENIX Security. Dive deep into the latest insights, research, and trends from the world's leading experts.
Explores a novel LTE signal injection attack, demonstrating higher success rates than fake base station attacks. Discusses implications and potential countermeasures for this physical signal overshadowing vulnerability.
Discover input validation vulnerabilities in robotic vehicle control systems using RVFuzzer, a testing tool that leverages control models to improve bug detection accuracy and efficiency.
Explore lessons from evaluating adversarial example defenses, common pitfalls, and recommendations for thorough defense assessments in machine learning security research.
Unveils a novel privacy attack exploiting shared images on popular websites, allowing attackers to track user visits and link identities across platforms without using scripts.
Explore FastKitten, a framework for executing complex smart contracts on Bitcoin using trusted computing environments, offering efficiency and low costs for multi-round applications.
Explore techniques to evaluate and mitigate unintended memorization in neural networks, focusing on privacy risks and practical strategies for deep learning practitioners.
Explore techniques to protect binary executables against automated bug-finding tools, focusing on impeding fuzzing, symbolic execution, and hybrid fuzzing approaches while maintaining performance.
Explore JEDI, a novel end-to-end encryption protocol for IoT systems, addressing security challenges in smart buildings and cities through key delegation and fine-grained access control.
Explore security and privacy challenges in multi-user smart homes, examining design principles and a prototype solution for respectful usage and user agency.
Empirical study on Bullet-Proof Hosting provider Maxided, analyzing business model, supply chain, customers, and finances. Reveals shifts in BPH landscape and potential intervention points for disrupting cybercrime-supporting services.
Innovative TLS vulnerability scanning methodology reveals widespread CBC padding oracle vulnerabilities, challenging assumptions about their exploitability and highlighting significant security risks in web infrastructure.
Explores honeypot smart contracts in Ethereum, their prevalence, and impact. Presents HoneyBadger tool for detecting honeypots, analyzing 2M+ contracts and identifying 690 honeypots with 240 victims.
Explores Tor's congestion issues, proposing KIST algorithm to improve network performance by optimizing socket management using real-time kernel information, reducing latency and increasing throughput.
Explore eclipse attacks on Bitcoin's P2P network, their impact on mining and consensus, and proposed countermeasures to enhance network security while maintaining decentralization.
Explores Control-Flow Bending attacks on Control-Flow Integrity defenses, revealing vulnerabilities in fine-grained CFI implementations and demonstrating the necessity of shadow stacks for enhanced security against memory corruption.
Get personalized course recommendations, track subjects and courses with reminders, and more.