Sched.com Conference Mobile Apps
25th USENIX Security Symposium has ended
Create Your Own Event
25th USENIX Security Symposium
Schedule
Simple
Expanded
Grid
By Venue
Speakers
Sponsors
Exhibitors
Attendees
Map
Search
or browse by date + venue
ASE '16
BoFs
CSET '16
FOCI '16
HotSec '16
Security '16
Social
WOOT '16
Popular
menu
Menu
Schedule
Speakers
Sponsors
Exhibitors
Attendees
Map
Search
Popular Events on Friday, August 12
#1
The Million-Key Question—Investigating the Origins of RSA Public Keys
#2
Authenticated Network Time Synchronization
#3
Internet Jones and the Raiders of the Lost Trackers: An Archaeological Study of Web Tracking from 1996 to 2016
#4
Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification
#5
You've Got Vulnerability: Exploring Effective Vulnerability Notifications
#6
Continental Breakfast
#7
Optimized Invariant Representation of Network Traffic for Detecting Unseen Malware Variants
#8
Lock It and Still Lose It —on the (In)Security of Automotive Remote Keyless Entry Systems
#9
Specification Mining for Intrusion Detection in Networked Control Systems
#10
Sanctum: Minimal Hardware Extensions for Strong Software Isolation
#11
Identifying and Characterizing Sybils in the Tor Network
#12
Security Competitions
#13
Daily Lightning Talks
#14
Fingerprinting Electronic Control Units for Vehicle Intrusion Detection
#15
Lunch (on your own)
#16
Break with Refreshments
#17
OblivP2P: An Oblivious Peer-to-Peer Content Sharing System
#18
AuthLoop: End-to-End Cryptographic Authentication for Telephony over Voice Channels
#19
k-fingerprinting: A Robust Scalable Website Fingerprinting Technique
#20
Finding and Fixing Security Bugs in Flash
#21
fTPM: A Software-Only Implementation of a TPM Chip
#22
Ariadne: A Minimal Approach to State Continuity
#23
You Are Who You Know and How You Behave: Attribute Inference Attacks via Users' Social Friends and Behaviors
#24
AMD x86 Memory Encryption Technologies
#25
Break with Refreshments
#26
On Demystifying the Android Application Framework: Re-Visiting Android Permission Specification Analysis
#27
Protecting Privacy of BLE Device Users
#28
Privacy in Epigenetics: Temporal Linkability of MicroRNA Expression Profiles
#29
Report from the Field: A CDN's Role in Repelling Attacks against Banking Industry Web Sites
#30
Mirror: Enabling Proofs of Data Replication and Retrievability in the Cloud
#31
ZKBoo: Faster Zero-Knowledge for Boolean Circuits
#32
The Cut-and-Choose Game and Its Application to Cryptographic Protocols
#33
Screen after Previous Screens: Spatial-Temporal Recreation of Android App Displays from Memory Images
#34
Harvesting Inconsistent Security Configurations in Custom Android ROMs via Differential Analysis
#35
Practical DIFC Enforcement on Android
Popular by Type
All Types
ASE '16
BoFs
CSET '16
FOCI '16
HotSec '16
Security '16
Social
WOOT '16
Popular by Day
All days
Monday, Aug 8
Tuesday, Aug 9
Wednesday, Aug 10
Thursday, Aug 11
Friday, Aug 12
Recently Active Attendees
P
pauldeman
Eric Eide
AG
Arnold Gatilao
SR
Stefan Richter
Jamie Gillespie (Co-Chair)
NE
Niyazi Elvan
nacalvas
Brian R
More →