A privacidade não é mais como antigamente.

Notas

Avisos

Aulas

Artigos a serem Apresentados

Artigo Aluno Slides Data
Shattered Trust: When Replacement Smartphone Components Attack Guilherme slides 24/11
dr0wned - Cyber-Physical Attack with Additive Manufacturing Jean slides 22/11
From random block corruption to privilege escalation: A filesystem attack vector for rowhammer-like attacks Marcio & Guilherme slides 29/11
Leveraging Flawed Tutorials for Seeding Large-Scale Web Vulnerability Discovery - - -
unCaptcha: A Low-Resource Defeat of reCaptcha's Audio Challenge Patrik slides 17/11
Artigo Aluno Slides Data
Cloud identity management: A survey on privacy strategies - - -
Security, privacy and trust in Internet of Things: The road ahead Joceleide slides 22/11
Securing Modbus Transactions Using Hash-Based Message Authentication Codes and Stream Transmission Control Protocol Matheus slides 17/11
Artigo Aluno Slides Data
SmartAuth: User-Centered Authorization for the Internet of Things Joceleide & Patrik slides 24/11
Towards Efficient Heap Overflow Discovery - - -
Understanding the Mirai Botnet Marcio slides 22/11
Measuring HTTPS Adoption on the Web - - -
Exploring User Perceptions of Discrimination in Online Targeted Advertising - - -
Measuring the Insecurity of Mobile Deep Links of Android - - -
How the Web Tangled Itself: Uncovering the History of Client-Side Web (In)Security - - -
Game of Registrars: An Empirical Analysis of Post-Expiration Domain Name Takeovers Matheus & Massucatto slides 29/11
Loophole: Timing Attacks on Shared Event Loops in Chrome - - -

Avaliação

Leituras Extremamente Recomendadas