USENIX Security(@USENIXSecurity) 's Twitter Profileg
USENIX Security

@USENIXSecurity

USENIX Security '23 is SOLD OUT. The event has reached maximum physical capacity, and we will not be able to accommodate any additional registrations.

ID:58631128

linkhttps://www.usenix.org/conference/usenixsecurity23 calendar_today20-07-2009 23:40:33

3,1K Tweets

12,1K Followers

153 Following

Follow People
USENIX Security(@USENIXSecurity) 's Twitter Profile Photo

content available from USENIX: 'zxcvbn: Low-Budget Password Strength Estimation' from USENIX Security '16: youtube.com/watch?v=vf37jh…

account_circle
USENIX Security(@USENIXSecurity) 's Twitter Profile Photo

content available from USENIX: 'Bamboozling Certificate Authorities with BGP' from USENIX Security '18: youtube.com/watch?v=oESNgl…

account_circle
USENIX Security(@USENIXSecurity) 's Twitter Profile Photo

content available from USENIX: 'The KNOB is Broken: Exploiting Low Entropy in the Encryption Key' from USENIX Security '19: youtube.com/watch?v=v9Xg9X…

account_circle
USENIX Security(@USENIXSecurity) 's Twitter Profile Photo

content available from USENIX: 'LTrack: Stealthy Tracking of Mobile Phones in LTE' from USENIX Security '22: youtube.com/watch?v=Kv4DQb…

account_circle
USENIX Security(@USENIXSecurity) 's Twitter Profile Photo

content available from USENIX: 'ATLAS: A Sequence-based Learning Approach for Attack Investigation' from USENIX Security '21: youtube.com/watch?v=wkGPZC…

account_circle
USENIX Security(@USENIXSecurity) 's Twitter Profile Photo

content available from USENIX: 'Lock It and Still Lose It —on the (In)Security of Automotive Remote Keyless' from USENIX Security '16: youtube.com/watch?v=lFU2ex…

account_circle
USENIX Security(@USENIXSecurity) 's Twitter Profile Photo

content available from USENIX: 'Local Model Poisoning Attacks to Byzantine-Robust Federated Learning' from USENIX Security '20: youtube.com/watch?v=SQ12Up…

account_circle
USENIX Security(@USENIXSecurity) 's Twitter Profile Photo

content available from USENIX: 'An Experimental Study of GPS Spoofing and Takeover Attacks on UAVs' from USENIX Security '22: youtube.com/watch?v=s1swSF…

account_circle
USENIX Security(@USENIXSecurity) 's Twitter Profile Photo

content available from USENIX: 'Who Are You (I Really Wanna Know)? Detecting Audio DeepFakes Through Vocal' from USENIX Security '22: youtube.com/watch?v=4X2Vjp…

account_circle
USENIX Security(@USENIXSecurity) 's Twitter Profile Photo

content available from USENIX: 'Stealing Machine Learning Models via Prediction APIs' from USENIX Security '16: youtube.com/watch?v=BD7RcR…

account_circle
USENIX Security(@USENIXSecurity) 's Twitter Profile Photo

content available from USENIX: 'Lamphone: Passive Sound Recovery from a Desk Lamp's Light Bulb Vibrations' from USENIX Security '22: youtube.com/watch?v=62jC4C…

account_circle
USENIX Security(@USENIXSecurity) 's Twitter Profile Photo

content available from USENIX: 'Steal This Movie: Automatically Bypassing DRM Protection in Streaming Media' from USENIX Security '13: youtube.com/watch?v=lxka_4…

account_circle
USENIX Security(@USENIXSecurity) 's Twitter Profile Photo

content available from USENIX: 'Virtual U: Defeating Face Liveness Detection by Building Virtual Models...' from USENIX Security '16: youtube.com/watch?v=wSBYqQ…

account_circle
USENIX Security(@USENIXSecurity) 's Twitter Profile Photo

content available from USENIX: 'Small World with High Risks: A Study of Security Threats in the npm Ecosystem' from USENIX Security '19: youtube.com/watch?v=8_2SdH…

account_circle
USENIX Security(@USENIXSecurity) 's Twitter Profile Photo

content available from USENIX: 'Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of' from USENIX Security '19: youtube.com/watch?v=EhmekY…

account_circle
USENIX Security(@USENIXSecurity) 's Twitter Profile Photo

content available from USENIX: 'SHA-1 is a Shambles: First Chosen-Prefix Collision on SHA-1 and Application' from USENIX Security '20: youtube.com/watch?v=NZyGUI…

account_circle
USENIX Security(@USENIXSecurity) 's Twitter Profile Photo

content available from USENIX: 'In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer...' from USENIX Security '22: youtube.com/watch?v=bNXpin…

account_circle
USENIX Security(@USENIXSecurity) 's Twitter Profile Photo

content available from USENIX: 'The Unpatchable Silicon: A Full Break of the Bitstream Encryption of Xilinx' from USENIX Security '20: youtube.com/watch?v=IBhOKS…

account_circle
USENIX Security(@USENIXSecurity) 's Twitter Profile Photo

content available from USENIX: 'Fuzzing Hardware Like Software' from USENIX Security '22: youtube.com/watch?v=cVfWoh…

account_circle