Music |
Video |
Movies |
Chart |
Show |
USENIX Enigma 2019 - Building Identity for an Open Perimeter (USENIX Enigma Conference) View | |
USENIX Enigma 2019 - If Red Teaming Is Easy: You're Doing It Wrong (USENIX Enigma Conference) View | |
USENIX Enigma 2019 - Something You Have and Someone You Know—Designing for Interpersonal Security (USENIX Enigma Conference) View | |
USENIX Enigma 2019 - Hardware Is the New Software: Finding Exploitable Bugs in Hardware Designs (USENIX Enigma Conference) View | |
USENIX Enigma 2018 - LISA: A Practical Zero Trust Architecture (USENIX Enigma Conference) View | |
USENIX Enigma 2019 - Rethinking the Detection of Child Sexual Abuse Imagery on the Internet (USENIX Enigma Conference) View | |
Identity as the New Perimeter (RSA Conference) View | |
USENIX Enigma 2020 - Stack Overflow: A Story of Two Security Tales (USENIX Enigma Conference) View | |
USENIX Security '19 - Less is More: Quantifying the Security Benefits of Debloating Web Applications (USENIX) View | |
USENIX Security '17 - Opening Remarks and Awards (USENIX) View |