Conferences

Search results

    TitleConferenceSpeaker(s)
    Adventures in Authentication and AuthorizationEnigma 2023Ian Haken
    Navigating the Sandbox BuffetEnigma 2023Maxime Serrano
    The Dirty Laundry of the Web PKIEnigma 2023Emily Stark
    When Malware Changed Its Mind: How "Split Personalities" Affect Malware Analysis and DetectionEnigma 2023Tudor Dumitras
    Spotting the Differences: Quirks of Machine Learning (in) SecurityEnigma 2023Fabrício Ceschin
    Fireside Chat: The State of Memory Safety Enigma 2023Amira Dhalla, Yael Grauer, Alex Gaynor, Josh Aas
    How the Internet Improves HumanityEnigma 2023Eric Goldman
    Characterizing and Measuring Misleading and Harmful Online Ad Content at ScaleEnigma 2023Eric Zeng
    A New Process to Tackle Misinformation on Social Media: Prevalence-Based GradationEnigma 2023Kamesh Shekar
    The Not Fake News HourEnigma 2023Riana Pfefferkorn
    What Public Interest AI Auditors Can Learn from Security Testing: Legislative and Practical WinsEnigma 2023Justin Brookman
    Why Is Our Security Research Failing? Five Practices to Change!Enigma 2023Marcus Botacin
    Understanding Trust and Security Processes in the Open Source Software EcosystemEnigma 2023Dominik Wermke
    Protecting Whistleblower InformationEnigma 2023Shanna Devine
    Open Source Software and Journalism: Field Notes from a Global PerspectiveEnigma 2023Harlo Holmes
    So You're Going to Blow the Whistle? Communications Dos and Don'ts for Whistleblowers.Enigma 2023Emily Schwartz
    Privacy Policies, by Lawyers, for Lawyers. What about Everyone Else? HotSec '19
    Enigma 2023
    Hannah Poteat, Holly Hogan, Miju Han, Emily Jones, Gabriela Zanfir-Fortuna
    Meaningful Hardware Privacy for a Smart and Augmented FutureEnigma 2023Marcus Hodges
    Technical Metamorphosis: The 3 Stages of DSAR AutomationEnigma 2023Alon Levy
    Building an Automated Machine for Discovering Privacy Violations at ScaleEnigma 2023Suchakra Sharma
    True Crime Journalism: CyberEnigma 2023Joseph Menn, Lily Hay Newman, Alfred Ng
    Myths and Lies in InfoSecEnigma 2023Adrian Sanabria
    The Slippery Slope of Cybersecurity AnalogiesEnigma 2023Josiah Dykstra
    The Very Hungry Defender: Metamorphosing Security Decision-Making by Incorporating Opportunity CostEnigma 2023Kelly Shortridge
    Citron: Distributed Range Lock Management with One-sided RDMAFAST '23Jian Gao, Youyou Lu, Minhui Xie, Qing Wang, Jiwu Shu

    Pages