Skip to main content
USENIX
Conferences
Students
Sign in
Overview
Workshop Organizers
At a Glance
Workshop Program
Co-Located Workshops
Activities
Birds-of-a-Feather Sessions
Sponsorship
Students and Grants
Questions?
Help Promote!
For Participants
Call for Papers
Past Workshops
sponsors
Bronze Sponsor
twitter
Tweets by @usenix
usenix conference policies
Event Code of Conduct
Conference Network Policy
Statement on Environmental Responsibility Policy
You are here
Home
ยป
Security Analysis
Tweet
connect with us
http://twitter.com/usenixsecurity
http://www.usenix.org/facebook
http://www.usenix.org/linkedin
http://www.usenix.org/gplus
http://www.usenix.org/youtube
Security Analysis
Presentations:
Attacking the Linux PRNG On Android: Weaknesses in Seeding of Entropic Pools and Low Boot-Time Entropy
Security Impact of High Resolution Smartphone Cameras
Inaudible Sound as a Covert Channel in Mobile Devices
An Experience Report on Extracting and Viewing Memory Events via Wireshark
connect with us