Media Summary: On the Practical Exploitability of Dual EC in Trust Agility in an Era of Transient Ties: Rethinking ALPACA: Application Layer Protocol Confusion - Analyzing and Mitigating Cracks in

Usenix Security 22 Tls Anvil Adapting Combinatorial Testing For Tls Libraries - Detailed Analysis & Overview

On the Practical Exploitability of Dual EC in Trust Agility in an Era of Transient Ties: Rethinking ALPACA: Application Layer Protocol Confusion - Analyzing and Mitigating Cracks in SymFit: Making the Common (Concrete) Case Fast for Binary-Code Concolic Execution Zhenxiao Qi, Jie Hu, Zhaoqi Xiao, and ...

Photo Gallery

USENIX Security '22 - TLS-Anvil: Adapting Combinatorial Testing for TLS Libraries
USENIX Security '14 - On the Practical Exploitability of Dual EC in TLS Implementations
USENIX Security '24 - Racing for TLS Certificate Validation: A Hijacker's Guide to the Android...
USENIX Security '24 - ENG25519: Faster TLS 1.3 handshake using optimized X25519 and Ed25519
USENIX Security '23 - HOLMES: Efficient Distribution Testing for Secure Collaborative Learning
USENIX Security '25 (Enigma Track) - Trust Agility in an Era of Transient Ties: Rethinking TLS...
USENIX Security '21 - ALPACA: Application Layer Protocol Confusion - Analyzing and Mitigating Cracks
USENIX Security '14 - Blanket Execution: Dynamic Similarity Testing for Program Binaries
USENIX Security '21 - SmarTest: Effectively Hunting Vulnerable Transaction Sequences in Smart...
Report Analysis with Anvil Web  |  TLS-Anvil  |  KoTeBi Project – BSI
USENIX Security '21 - Where's Crypto?: Automated Identification and Classification of Proprietary...
USENIX Security '23 - Sherlock on Specs: Building LTE Conformance Tests through Automated Reasoning
Sponsored
View Detailed Profile
USENIX Security '22 - TLS-Anvil: Adapting Combinatorial Testing for TLS Libraries

USENIX Security '22 - TLS-Anvil: Adapting Combinatorial Testing for TLS Libraries

USENIX Security

USENIX Security '14 - On the Practical Exploitability of Dual EC in TLS Implementations

USENIX Security '14 - On the Practical Exploitability of Dual EC in TLS Implementations

On the Practical Exploitability of Dual EC in

USENIX Security '24 - Racing for TLS Certificate Validation: A Hijacker's Guide to the Android...

USENIX Security '24 - Racing for TLS Certificate Validation: A Hijacker's Guide to the Android...

Racing for

USENIX Security '24 - ENG25519: Faster TLS 1.3 handshake using optimized X25519 and Ed25519

USENIX Security '24 - ENG25519: Faster TLS 1.3 handshake using optimized X25519 and Ed25519

ENG25519: Faster

USENIX Security '23 - HOLMES: Efficient Distribution Testing for Secure Collaborative Learning

USENIX Security '23 - HOLMES: Efficient Distribution Testing for Secure Collaborative Learning

USENIX Security

Sponsored
USENIX Security '25 (Enigma Track) - Trust Agility in an Era of Transient Ties: Rethinking TLS...

USENIX Security '25 (Enigma Track) - Trust Agility in an Era of Transient Ties: Rethinking TLS...

Trust Agility in an Era of Transient Ties: Rethinking

USENIX Security '21 - ALPACA: Application Layer Protocol Confusion - Analyzing and Mitigating Cracks

USENIX Security '21 - ALPACA: Application Layer Protocol Confusion - Analyzing and Mitigating Cracks

ALPACA: Application Layer Protocol Confusion - Analyzing and Mitigating Cracks in

USENIX Security '14 - Blanket Execution: Dynamic Similarity Testing for Program Binaries

USENIX Security '14 - Blanket Execution: Dynamic Similarity Testing for Program Binaries

Blanket Execution: Dynamic Similarity

USENIX Security '21 - SmarTest: Effectively Hunting Vulnerable Transaction Sequences in Smart...

USENIX Security '21 - SmarTest: Effectively Hunting Vulnerable Transaction Sequences in Smart...

USENIX Security

Report Analysis with Anvil Web  |  TLS-Anvil  |  KoTeBi Project – BSI

Report Analysis with Anvil Web  |  TLS-Anvil  |  KoTeBi Project – BSI

Watch this video to learn how to analyze

USENIX Security '21 - Where's Crypto?: Automated Identification and Classification of Proprietary...

USENIX Security '21 - Where's Crypto?: Automated Identification and Classification of Proprietary...

USENIX Security

USENIX Security '23 - Sherlock on Specs: Building LTE Conformance Tests through Automated Reasoning

USENIX Security '23 - Sherlock on Specs: Building LTE Conformance Tests through Automated Reasoning

USENIX Security

USENIX Security '24 - SymFit: Making the Common (Concrete) Case Fast for Binary-Code Concolic...

USENIX Security '24 - SymFit: Making the Common (Concrete) Case Fast for Binary-Code Concolic...

SymFit: Making the Common (Concrete) Case Fast for Binary-Code Concolic Execution Zhenxiao Qi, Jie Hu, Zhaoqi Xiao, and ...