Schedule
December 10, 2025
Broken Security and Privacy Governance at Web Scale
Nurullah Demir
December 03, 2025
Hop: A Modern Transport and Remote Access Protocol
Paul Flammarion
November 19, 2025
A Haystack Full of Needles: Detecting and Understanding Botnets in the Wild
Georgios Smaragdakis
November 12, 2025
Beyond Whack‑A‑Mole: Disrupting Online Crime and Harms through Law Enforcement and Industry Efforts
Anh Vu
November 05, 2025
Securing Systems Foundations: The Design and Verification of a Virtual Firmware Monitor
Charly Castes
October 29, 2025
Security All The Way Down
Dale Schumacher
October 22, 2025
Global Cyber Conflict
Igor Tsyganskiy
October 08, 2025
Self Protocol: A Production Ready zkPassport Protocol
Marek Olszewski
October 01, 2025
Preventing AI model-weight exfiltration with FPGAs and inference verification — with live demo!
Jacob Lagerros
September 24, 2025
Maintaining a Secure Internet
Stijn Pletinckx
September 17, 2025
Ten Years of ZMap: A Retrospective of a Decade of Open-Source Development
Phillip Stephens
September 03, 2025
Understanding Opaque Data Practices and Risks in Online Marketing and User Personalization
Yash Vekaria
August 13, 2025
AI-Native Detection & Response for Non-Email Communications
Nyah Check
July 30, 2025
Real-world experiences from integrating frontier AI models into cybersecurity
Kurt Thomas
July 23, 2025
You've Got the Wrong Use Case
Alan Karp
July 16, 2025
Rethinking Support for CISOs’ Security Decisions
Kimberly Ruth
July 09, 2025
Scalable Oblivious Computation for Next-Generation Private Systems, Databases, and AI: Preventing Leakage-Abuse and Software Side-Channel Attacks
Ioannis Demertzis
July 02, 2025
Risks and Opportunities Related to Security in Virtual and Augmented Reality
Jeremy Bailenson
June 18, 2025
Optimal Threshold Signatures in Bitcoin
Sindura Saraswathi
June 11, 2025
Narratives Without Borders: Mapping Cross Platform Discourse to Reveal Hidden Pathways of Narrative Migration
Patrick Gerard
June 04, 2025
Private Quantile Estimation in the Two-Server Model
Jacob John Imola
May 28, 2025
Towards Secure-by-Default Windows Kerberos Delegation
Donovan Julian Jasper
May 21, 2025
Evolving Internet Censorship Mechanisms in China
Ali Zohaib
May 07, 2025
Myco: Unlocking Polylogarithmic Accesses in Metadata-Private Messaging
Darya Kaviani
April 23, 2025
Are Samples Extracted from LLMs Memorized?
Chawin Sitawarin
April 16, 2025
Enforcing Speculative Non-Interference with Hardware-Software Codesign
Nicholas Hunter Mosier
April 09, 2025
Using Human-Centered Approaches to Co-design & Evaluate Real-Time Online Safety Interventions with Youth
Zainab Agha
April 02, 2025
GlucOS: Security, correctness, and simplicity for ML-based automated insulin delivery
Sam King
March 19, 2025
Deterministic Client: Enforcing Determinism on Untrusted Machine Code
Zachary Yedida
March 12, 2025
Samplable Anonymous Aggregation for Private Federated Data Analysis
Kunal Talwar
March 05, 2025
Making the Case for Network Observation
Jackson Sippe
February 19, 2025
HateDay: Insights from a Global Hate Speech Dataset Representative of a Day on Twitter
Manuel Tonneau
February 12, 2025
What’s new about the Great Firewall of China?
Alex Zhang
January 29, 2025
My Journey and Perspective on Internet Censorship in China
Toby
January 22, 2025
Using SBOMs to Mitigate the Lemons Market
L Jean Camp
January 15, 2025
GGFAST: Automating Generation of Flexible Network Traffic Classifiers
Julien Piet
January 08, 2025
Fingerprinting at the Frontier: How Edge Cases and Ambiguities can help Identify and Attribute Targeted Digital Attacks Against Civil Society
Bill Marczak
December 18, 2024
Protecting the Vulnerable: Child Safety and Misinformation in the Digital Age
Ihsan Ayyub Qazi
December 11, 2024
RTL2MμPATH: Multi-μPATH Synthesis with Applications to Hardware Security Verification.
Yao Hsiao
December 04, 2024
Computer Security: The Mess We're In, How We Got Here, and What to Do About It
November 20, 2024
Privacy in Web Advertising: Opportunities, Challenges, and a Call to Action
Roxana Geambasu
November 06, 2024
Vision Paper:Proof-Carrying Code Completions(PC3)
Parnian Kamran
October 23, 2024
Verifying complex elections
Vanessa Teague
October 09, 2024
Counterexamples in Safe Rust
Muhammad Hassnain
October 02, 2024
Designing for Security and Privacy beyond WEIRD
Taha
August 07, 2024
Peer2PIR: Private queries for IPFS
Miti Mazmudar
July 24, 2024
Jolt: Proof Systems for Real-world Programs
Arasu Arun
June 26, 2024
Real-World Opportunities and Challenges in Deploying Anonymous Analytics
Tanya Verma
June 05, 2024
Practical Online Learning of In-Network ML Models with Labeling Agents
Qizheng Zhang
May 29, 2024
Social Lunch
May 22, 2024
Designing protocols that actually get deployed
Eric Rescorla
May 15, 2024
VerITAS: Verifying Image Transformations at Scale
Trisha Datta
May 08, 2024
May 01, 2024
Sidekick: In-Network Assistance for Secure End-to-End Transport Protocols
Gina Yuan
April 24, 2024
The best cyber professionals are unicorns. Some methods for growing unicorns
Richard Buckland
April 17, 2024
The Mythical LLM-Month: Creating Trustworthy Copilots for Cybersecurity
Claudionor Coelho
April 10, 2024
Creating a Hobby ISP: Connecting to the Internet
Ian Foster
April 03, 2024