没有合适的资源?快使用搜索试试~ 我知道了~
资源推荐
资源详情
资源评论
收起资源包目录
NDSS2015.rar (50个子文件)
NDSS15
FULL
Identifying Cross-origin Resource Status Using Application Cache.pdf 2.03MB
Knock Yourself Out Secure Authentication with Short Re-Usable Passwords.pdf 1.99MB
SeCReT Secure Channel between Rich Execution Environment and Trusted Execution Environment.pdf 2.23MB
On Your Social Network De-anonymizablity Quantification and Large Scale Evaluation with Seed Knowledge.pdf 2.3MB
EKHunter A Counter-Offensive Toolkit for Exploit Kit Infiltration.pdf 317KB
Preventing Use-after-free with Dangling Pointers Nullification.pdf 2.22MB
I Do Not Know What You Visited Last Summer Protecting users from stateful third-party web tracking with TrackingFree browser.pdf 3.15MB
Opaque Control-Flow Integrity.pdf 1.35MB
Integro Leveraging Victim Prediction for Robust Fake Account Detection in OSNs.pdf 1.69MB
Gracewipe Secure and Verifiable Deletion under Coercion.pdf 399KB
Mind Your Blocks On the Stealthiness of Malicious BGP Hijacks.pdf 3.07MB
Firmalice &8211; Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware.pdf 650KB
Principled Sampling for Anomaly Detection.pdf 716KB
Checking More and Alerting Less Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting.pdf 2.07MB
Parking Sensors Analyzing and Detecting Parked Domains.pdf 1.23MB
Integrated Circuit (IC) Decamouflaging Reverse Engineering Camouflaged ICs within Minutes.pdf 3.07MB
The Devil is in the Constants Bypassing Defenses in Browser JIT Engines.pdf 2.81MB
CopperDroid Automatic Reconstruction of Android Malware Behaviors.pdf 1.27MB
vfGuard Strict Protection for Virtual Function Calls in COTS C++ Binaries.pdf 1.44MB
StackArmor Comprehensive Protection From Stack-based Memory Error Vulnerabilities for Binaries.pdf 3.32MB
Poisoning Network Visibility in Software-Defined Networks New Attacks and Countermeasures.pdf 2.34MB
Machine Learning Classification over Encrypted Data.pdf 519KB
EdgeMiner Automatically Detecting Implicit Control Flow Transitions through the Android Framework.pdf 1.71MB
Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords.pdf 818KB
Verified Contributive Channel Bindings for Compound Authentication.pdf 2.48MB
VTint Protecting Virtual Function Tables&8217; Integrity.pdf 2.3MB
NSEC5 Provably Preventing DNSSEC Zone Enumeration.pdf 347KB
DEFY A Deniable Encrypted File System for Log-Structured Storage.pdf 1.86MB
Too LeJIT to Quit Extending JIT Spraying to ARM.pdf 3.06MB
No More Gotos Decompilation Using Pattern-Independent Control-Flow Structuring and Semantic-Preserving Transformations.pdf 1.57MB
SPHINX Detecting Security Attacks in Software-Defined Networks.pdf 1.23MB
Preventing Lunchtime Attacks Fighting Insider Threats With Eye Movement Biometrics.pdf 2.57MB
Upgrading HTTPS in mid-air An empirical study of strict transport security and key pinning.pdf 697KB
P2C Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions.pdf 2.34MB
Isomeron Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.pdf 1.53MB
Thwarting Cache Side-Channel Attacks Through Dynamic Software Diversity.pdf 1.48MB
Information Flow Analysis of Android Applications in DroidSafe.pdf 1.83MB
Exploiting and Protecting Dynamic Code Generation.pdf 473KB
DeepDroid Dynamically Enforcing Enterprise Policy on Android Devices.pdf 2.36MB
FreeSentry protecting against use-after-free vulnerabilities due to dangling pointers.pdf 1.23MB
Bloom Cookies Web Search Personalization without User Tracking.pdf 1.08MB
Phoneypot Data-driven Understanding of Telephony Threats.pdf 2.04MB
Seven Months&8217; Worth of Mistakes A Longitudinal Study of Typosquatting Abuse.pdf 986KB
Predicting Users&8217; Motivations behind Location Check-Ins and Utility Implications of Privacy Protection Mechanisms.pdf 2.64MB
Privacy Preserving Payments in Credit Networks Enabling trust with privacy in online marketplaces.pdf 1.84MB
ABY &8211; A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.pdf 426KB
What&8217;s in Your Dongle and Bank Account Mandatory and Discretionary Protection of Android External Resources.pdf 2.03MB
Securing the Software Defined Network Control Layer.pdf 682KB
Efficient RAM and control flow in verifiable outsourced computation.pdf 1.21MB
Run-time Monitoring and Formal Analysis of Information Flows in Chromium.pdf 1.2MB
共 50 条
- 1
资源评论
一诺倾城
- 粉丝: 0
- 资源: 16
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- YOLOV4-TINY权重文件
- 以下是一个使用贪心算法解决多机调度问题的基本步骤0.txt
- 基于大数据的房产估价是近年来随着技术的发展而兴起的一种新型估价方法.txt
- 企业供应链管理系统v3.rar
- 富芮坤FR8016HA蓝牙开发板使用手册+硬件PCB图+封装库+DEMO演示软件源代码.zip
- 基于YOLOv7的芯片表面缺陷检测系统
- 京东物流 数字化供应链综合研究报告2018.rar
- 基于YOLOv7的植物虫害识别&防治系统
- 2000.1-2023.8中国经济政策不确定性指数月度数据.xlsx
- Screenshot_2024-04-21-20-42-15-443_com.tencent.mm.jpg
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功