Hacker News
- Self-encrypting deception: weaknesses in the encryption of solid state drives [pdf] https://www.ieee-security.org/TC/SP2019/papers/310.pdf 18 comments
- Password Typos and How to Correct Them Securely (2016) [pdf] http://www.ieee-security.org/TC/SP2016/papers/0824a799.pdf 13 comments
- LAVA: Large-Scale Automated Vulnerability Addition [pdf] http://www.ieee-security.org/TC/SP2016/papers/0824a110.pdf 4 comments
- Tracking Protection in Firefox for Privacy and Performance [pdf] http://ieee-security.org/TC/SPW2015/W2SP/papers/W2SP_2015_submission_32.pdf 2 comments
- How They Did It: An Analysis of Emission Defeat Devices in Modern Automobiles [PDF] https://www.ieee-security.org/tc/sp2017/papers/101.pdf 5 comments netsec
- The pitfalls of protocol design. Attempting to write a formally verified PDF parser. http://www.ieee-security.org/tc/spw2014/papers/5103a198.pdf 9 comments compsci
- Stealing Webpages Rendered on Your Browser by Exploiting GPU Vulnerabilities [PDF] http://www.ieee-security.org/tc/sp2014/papers/stealingwebpagesrenderedonyourbrowserbyexploitinggpuvulnerabilities.pdf 19 comments netsec