没有合适的资源?快使用搜索试试~ 我知道了~
温馨提示
(我现在主要在CSDN上整理计算机安全、系统及通信方面的论文及相关理论书籍,如果对这方面内容感兴趣,可以访问:http://qysh123.download.csdn.net/ 查看我上传的所有资料。内容比较多,需要大家人工手动查找。另外,资料顺序并不按照时间排列,只是想起来了就上传。CSDN这套系统不敢恭维,也请大家见谅。) 计算机安全界会议USENIX Security Symposium 2009年的会议论文集,关于该会议,可参考下面的介绍: USENIX Security:91分。USENIX是systems research方面的重要组织,主办了systems方面的若干重要会议,如OSDI(操作系统的第二会议)等。USENIX Security Symposium则是systems security的著名会议,文章基本陷于hardcore systems类型。
资源推荐
资源详情
资源评论
收起资源包目录
USENIX Security Symposium 2009.rar (28个子文件)
USENIX Security Symposium 2009
Browser Security
The Multi-Principal OS Construction of the Gazelle Web Browser.pdf 255KB
Crying Wolf_ An Empirical Study of SSL Warning Effectiveness.pdf 490KB
Radio
CCCP_ Secure Remote Storage for Computational RFIDs.pdf 207KB
Physical-layer Identification of RFID Devices.pdf 913KB
Jamming-resistant Broadcast Communication without Shared Keys.pdf 625KB
Securing Web Apps
Nemesis_ Preventing Authentication & Access Control Vulnerabilities in Web Applications.pdf 443KB
Static Enforcement of Web Application Integrity Through Strong Typing.pdf 483KB
Slide_xBook_ Redesigning Privacy Control in Social Networking Platforms.pdf 1.84MB
xBook_ Redesigning Privacy Control in Social Networking Platforms.pdf 1.88MB
Applied Crypto
Vanish_ Increasing Data Privacy with Self-Destructing Data.pdf 794KB
VPriv_ Protecting Privacy in Location-Based Vehicular Services.pdf 388KB
Efficient Data Structures for Tamper-Evident Logging.pdf 216KB
Network Security
Improving Tor using a TCP-over-DTLS Tunnel.pdf 1.76MB
Detecting Spammers with SNARE_ Spatio-temporal Network-level Automatic Reputation Engine.pdf 539KB
Locating Prefix Hijackers using LOCK.pdf 219KB
JavaScript Security
GATEKEEPER_ Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code.pdf 835KB
Memory Safety for Low-Level Software Hardware Interactions.pdf 306KB
Cross-Origin JavaScript Capability Leaks_ Detection, Exploitation, and Defense.pdf 232KB
Proceedings, with Corrigendum, of all papers in this session sec09_javascript.pdf 1.38MB
Malware Detection and Protection
Protecting Confidential Data on Personal Computers with Storage Capsules.pdf 142KB
Effective and Efficient Malware Detection at the End Host.pdf 492KB
Return-Oriented Rootkits_ Bypassing Kernel Code Integrity Protection Mechanisms.pdf 362KB
Attacks on Privacy
Peeping Tom in the Neighborhood_ Keystroke Eavesdropping on Multi-User Systems.pdf 457KB
Compromising Electromagnetic Emanations of Wired and Wireless Keyboards.pdf 1.45MB
A Practical Congestion Attack on Tor Using Long Paths.pdf 1.42MB
Memory Safety
Baggy Bounds Checking_ An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors.pdf 1.04MB
NOZZLE_ A Defense Against Heap-spraying Code Injection Attacks.pdf 768KB
Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs.pdf 221KB
共 28 条
- 1
蛐蛐蛐
- 粉丝: 666
- 资源: 65
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功
- 1
- 2
前往页