没有合适的资源?快使用搜索试试~ 我知道了~
资源推荐
资源详情
资源评论
收起资源包目录
27th NDSS 2020.zip (88个子文件)
27th NDSS 2020
Mobile & Smartphone Security_Are You Going to Answer That_Measuring User Responses to Anti-Robocall Application Indicators.pdf 2.17MB
Censorship_Detecting Probe-resistant Proxies.pdf 527KB
Hardware & Speculative Attacks_ProtectIOn_Root-of-Trust for IO in Compromised Platforms.pdf 4.46MB
Network Defenses_Hold the Door! Fingerprinting Your Car Key to Prevent Keyless Entry Car Theft.pdf 12.93MB
Case Studies & Human Factors_A View from the Cockpit_Exploring Pilot Reactions to Attacks on Avionic Systems.pdf 2.84MB
Censorship_SymTCP_Eluding Stateful Deep Packet Inspection with Automated Discrepancy Discovery.pdf 540KB
Smart Home_SurfingAttack_Interactive Hidden Attack on Voice Assistants Using Ultrasonic Guided Waves.pdf 2.85MB
Privacy_Adversarial Classification Under Differential Privacy.pdf 4.31MB
Side Channels_Data-Driven Debugging for Functional Side Channels.pdf 5.37MB
Malware 1_Unicorn_Runtime Provenance-Based Detector for Advanced Persistent Threats.pdf 719KB
Private Computation and Learning_Trident_Efficient 4PC Framework for Privacy Preserving Machine Learning.pdf 596KB
Software Defenses_uRAI_Securing Embedded Systems with Return Address Integrity.pdf 1.39MB
Network Defenses_EASI_Edge-Based Sender Identification on Resource-Constrained Platforms for Automotive Networks.pdf 462KB
Blockchains and MPC_The Attack of the Clones Against Proof-of-Authority.pdf 724KB
Case Studies & Human Factors_Compliance Cautions_Investigating Security Issues Associated with U.S. Digital-Security Standards.pdf 930KB
Oblivious Computation_MACAO_A Maliciously-Secure and Client-Efficient Active ORAM Framework.pdf 593KB
Malware 1_You Are What You Do_Hunting Stealthy Malware via Data Provenance Analysis.pdf 2.06MB
Network Crime and Privacy_A Practical Approach for Taking Down Avalanche Botnets Under Real-World Constraints.pdf 451KB
Oblivious Computation_Metal_A Metadata-Hiding File-Sharing System.pdf 1.97MB
Web_Cross-Origin State Inference (COSI) Attacks_Leaking Web Site States through XS-Leaks.pdf 386KB
Program Analysis_DeepBinDiff_Learning Program-Wide Code Representations for Binary Diffing.pdf 1.13MB
Crypto_DISCO_Sidestepping RPKI's Deployment Barriers.pdf 555KB
Censorship_Measuring the Deployment of Network Censorship Filters at Global Scale.pdf 3.27MB
Blockchains and MPC_Broken Metre_Attacking Resource Metering in EVM.pdf 357KB
Oblivious Computation_Revisiting Leakage Abuse Attacks.pdf 783KB
Smart Home_Packet-Level Signatures for Smart Home Devices.pdf 794KB
Malware 2_UIScope_OcuLock_Exploring Human Visual System for Authentication in Virtual Reality Head-mounted Display.pdf 6.06MB
Network Attacks_Practical Traffic Analysis Attacks on Secure Messaging Applications.pdf 7.2MB
Mobile & Smartphone Security_Automated Cross-Platform Reverse Engineering of CAN Bus Commands From Mobile Apps.pdf 578KB
Crypto_Let's Revoke_Scalable Global Certificate Revocation.pdf 433KB
Network Attacks_Withdrawing the BGP Re-Routing Curtain_Understanding the Security Impact of BGP Poisoning through Real-World Measurements.pdf 5.8MB
Malware 2_Prevalence and Impact of Low-Entropy Packing Schemes in the Malware Ecosystem.pdf 460KB
Privacy_Towards Plausible Graph Anonymization.pdf 583KB
Future Networks_Automated Discovery of Cross-Plane Event-Based Vulnerabilities in Software-Defined Networking.pdf 679KB
Mobile & Smartphone Security_Learning-based Practical Smartphone Eavesdropping with Built-in Accelerometer.pdf 6.42MB
Malware 2_When Malware is Packin' Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features.pdf 467KB
Crypto_Proof of Storage-Time_Efficiently Checking Continuous Data Availability.pdf 802KB
Software Defenses_SODA_A Generic Online Detection Framework for Smart Contracts.pdf 946KB
Web_FUSE_Finding File Upload Bugs via Penetration Testing.pdf 477KB
Network Attacks_IMP4GT_IMPersonation Attacks in 4G NeTworks.pdf 543KB
Side Channels_ABSynthe_Automatic Blackbox Side-channel Synthesis on Commodity Microarchitectures.pdf 964KB
Fuzzing_HotFuzz_Discovering Algorithmic Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing.pdf 595KB
Side Channels_PhantomCache_Obfuscating Cache Conflicts with Localized Randomization.pdf 743KB
Hardware & Speculative Attacks_ConTExT_A Generic Approach for Mitigating Spectre.pdf 291KB
Blockchains and MPC_Bobtail_Improved Blockchain Security with Low-Variance Mining.pdf 690KB
Malware 1_Custos_Practical Tamper-Evident Auditing of Operating Systems Using Trusted Execution.pdf 620KB
Censorship_MassBrowser_Unblocking the Censored Web for the Masses, by the Masses.pdf 1.18MB
Fuzzing_HYPER-CUBE_High-Dimensional Hypervisor Fuzzing.pdf 353KB
Future Networks_SVLAN_Secure & Scalable Network Virtualization.pdf 1.78MB
Network Defenses_Poseidon_Mitigating Volumetric DDoS Attacks with Programmable Switches.pdf 669KB
Fuzzing_Not All Coverage Measurements Are Equal_Fuzzing by Coverage Accounting for Input Prioritization.pdf 1.34MB
Network Defenses_DefRec_Establishing Physical Function Virtualization to Disrupt Reconnaissance of Power Grids' Cyber-Physical Infrastructures.pdf 6.68MB
Privacy_Locally Differentially Private Frequency Estimation with Consistency.pdf 929KB
Malware 2_UIScope_Accurate, Instrumentation-free, and Visible Attack Investigation for GUI Applications.pdf 943KB
Network Crime and Privacy_On Using Application-Layer Middlebox Protocols for Peeking Behind NAT Gateways.pdf 348KB
Smart Home_Metamorph_Injecting Inaudible Commands into Over-the-air Voice Controlled Systems.pdf 2.78MB
Malware 2_UIScope_On the Resilience of Biometric Authentication Systems against Random Inputs.pdf 786KB
Blockchains and MPC_Finding Safety in Numbers with Secure Allegation Escrows.pdf 620KB
Oblivious Computation_Dynamic Searchable Encryption with Small Client Storage.pdf 601KB
Future Networks_When Match Fields Do Not Need to Match_Buffered Packets Hijacking in SDN.pdf 1.18MB
Blockchains and MPC_Snappy_Fast On-chain Payments with Practical Collaterals.pdf 712KB
Malware 1_OmegaLog_High-Fidelity Attack Investigation via Transparent Multi-layer Log Analysis.pdf 814KB
Malware 2_UIScope_Strong Authentication without Temper-Resistant Hardware and Application to Federated Identities.pdf 538KB
Case Studies & Human Factors_Into the Deep Web_Understanding E-commerce Fraud from Autonomous Chat with Cybercriminals.pdf 3.03MB
Web_Melting Pot of Origins_Compromising the Intermediary Web Services that Rehost Websites.pdf 998KB
Program Analysis_Precisely Characterizing Security Impact in a Flood of Patches via Symbolic Rule Comparison.pdf 710KB
Case Studies & Human Factors_Complex Security Policy_A Longitudinal Analysis of Deployed Content Security Policies.pdf 304KB
Web_Carnus_Exploring the Privacy Threats of Browser Extension Fingerprinting.pdf 796KB
Privacy_DESENSITIZATION_Privacy-Aware and Attack-Preserving Crash Report.pdf 1.08MB
Case Studies & Human Factors_Genotype Extraction and False Relative Attacks_Security Risks to Third-Party Genetic Genealogy Services Beyond Identity Inference.pdf 904KB
Private Computation and Learning_BLAZE_Blazing Fast Privacy-Preserving Machine Learning.pdf 689KB
Web_Deceptive Previews_A Study of the Link Preview Trustworthiness in Social Platforms.pdf 3.83MB
Private Computation and Learning_Secure Sublinear Time Differentially Private Median Computation.pdf 596KB
Network Crime and Privacy_Encrypted DNS_Privacy_A Traffic Analysis Perspective.pdf 809KB
Side Channels_Mind the Portability_A Warriors Guide through Realistic Profiled Side-channel Analysis.pdf 3.19MB
Oblivious Computation_Heterogeneous Private Information Retrieval.pdf 723KB
Censorship_Decentralized Control_A Case Study of Russia.pdf 3.3MB
Network Crime and Privacy_Designing a Better Browser for Tor with BLAST.pdf 396KB
Crypto_Post-Quantum Authentication in TLS 1.3_A Performance Study.pdf 704KB
Network Attacks_CDN Judo_Breaking the CDN DoS Protection with Itself.pdf 4.47MB
Mobile & Smartphone Security_TKPERM_Cross-platform Permission Knowledge Transfer to Detect Overprivileged Third-party Applications.pdf 3.84MB
Smart Home_Et Tu Alexa_When Commodity WiFi Devices Turn into Adversarial Motion Sensors.pdf 673KB
Fuzzing_HFL_Hybrid Fuzzing on the Linux Kernel.pdf 694KB
Network Defenses_BLAG_Improving the Accuracy of Blacklists.pdf 1.05MB
Hardware & Speculative Attacks_SPEECHMINER_A Framework for Investigating and Measuring Speculative Execution Vulnerabilities.pdf 532KB
Software Defenses_NoJITsu_Locking Down JavaScript Engines.pdf 352KB
Private Computation and Learning_CloudLeak_Large-Scale Deep Learning Models Stealing Through Adversarial Examples.pdf 1006KB
Mobile & Smartphone Security_FlowPrint_Semi-Supervised Mobile-App Fingerprinting on Encrypted Network Traffic.pdf 943KB
共 88 条
- 1
资源评论
baidu_41934213
- 粉丝: 0
- 资源: 2
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功