没有合适的资源?快使用搜索试试~ 我知道了~
资源推荐
资源详情
资源评论
收起资源包目录
2020.zip (89个子文件)
2020
Encrypted DNS Privacy A Traffic Analysis Perspective.pdf 809KB
Detecting Proberesistant Proxies.pdf 527KB
Deceptive Previews A Study of the Link Preview Trustworthiness in Social Platforms.pdf 3.83MB
A Practical Approach for Taking Down Avalanche Botnets Under RealWorld Constraints.pdf 451KB
NoJITsu Locking Down JavaScript Engines.pdf 352KB
OcuLock Exploring Human Visual System for Authentication in Virtual Reality Headmounted Display.pdf 6.06MB
DataDriven Debugging for Functional Side Channels.pdf 5.37MB
Unicorn Runtime ProvenanceBased Detector for Advanced Persistent Threats.pdf 719KB
Poseidon Mitigating Volumetric DDoS Attacks with Programmable Switches.pdf 669KB
Custos Practical TamperEvident Auditing of Operating Systems Using Trusted Execution.pdf 620KB
Mind the Portability A Warriors Guide through Realistic Profiled Sidechannel Analysis.pdf 3.19MB
Revisiting Leakage Abuse Attacks.pdf 783KB
Proof of StorageTime Efficiently Checking Continuous Data Availability.pdf 802KB
Locally Differentially Private Frequency Estimation with Consistency.pdf 929KB
Heterogeneous Private Information Retrieval.pdf 723KB
Metamorph Injecting Inaudible Commands into Overtheair Voice Controlled Systems.pdf 2.78MB
SODA A Generic Online Detection Framework for Smart Contracts.pdf 946KB
When Match Fields Do Not Need to Match Buffered Packets Hijacking in SDN.pdf 1.18MB
SVLAN Secure Scalable Network Virtualization.pdf 1.78MB
Et Tu Alexa When Commodity WiFi Devices Turn into Adversarial Motion Sensors.pdf 673KB
DefRec Establishing Physical Function Virtualization to Disrupt Reconnaissance of Power Grids CyberPhysical Infrastructures.pdf 6.68MB
Metal A MetadataHiding FileSharing System.pdf 1.97MB
Decentralized Control A Case Study of Russia.pdf 3.3MB
A View from the Cockpit Exploring Pilot Reactions to Attacks on Avionic Systems.pdf 2.84MB
DISCO Sidestepping RPKIs Deployment Barriers.pdf 555KB
CrossOrigin State Inference COSI Attacks Leaking Web Site States through XSLeaks.pdf 386KB
Strong Authentication without TemperResistant Hardware and Application to Federated Identities.pdf 538KB
HFL Hybrid Fuzzing on the Linux Kernel.pdf 694KB
You Are What You Do Hunting Stealthy Malware via Data Provenance Analysis.pdf 2.06MB
OmegaLog HighFidelity Attack Investigation via Transparent Multilayer Log Analysis.pdf 814KB
Trident Efficient PC Framework for Privacy Preserving Machine Learning.pdf 596KB
ProtectIOn RootofTrust for IO in Compromised Platforms.pdf 4.46MB
Towards Plausible Graph Anonymization.pdf 583KB
The Attack of the Clones Against ProofofAuthority.pdf 724KB
Learningbased Practical Smartphone Eavesdropping with Builtin Accelerometer.pdf 6.42MB
PacketLevel Signatures for Smart Home Devices.pdf 794KB
Finding Safety in Numbers with Secure Allegation Escrows.pdf 620KB
Carnus Exploring the Privacy Threats of Browser Extension Fingerprinting.pdf 796KB
Practical Traffic Analysis Attacks on Secure Messaging Applications.pdf 7.2MB
Genotype Extraction and False Relative Attacks Security Risks to ThirdParty Genetic Genealogy Services Beyond Identity Inference.pdf 904KB
Withdrawing the BGP ReRouting Curtain Understanding the Security Impact of BGP Poisoning through RealWorld Measurements.pdf 5.8MB
DeepBinDiff Learning ProgramWide Code Representations for Binary Diffing.pdf 1.13MB
UIScope Accurate Instrumentationfree and Visible Attack Investigation for GUI Applications.pdf 943KB
Precisely Characterizing Security Impact in a Flood of Patches via Symbolic Rule Comparison.pdf 710KB
Melting Pot of Origins Compromising the Intermediary Web Services that Rehost Websites.pdf 998KB
Automated Discovery of CrossPlane EventBased Vulnerabilities in SoftwareDefined Networking.pdf 679KB
Bobtail Improved Blockchain Security with LowVariance Mining.pdf 690KB
CloudLeak LargeScale Deep Learning Models Stealing Through Adversarial Examples.pdf 1006KB
On Using ApplicationLayer Middlebox Protocols for Peeking Behind NAT Gateways.pdf 348KB
SymTCP Eluding Stateful Deep Packet Inspection with Automated Discrepancy Discovery.pdf 540KB
HYPERCUBE HighDimensional Hypervisor Fuzzing.pdf 353KB
Dynamic Searchable Encryption with Small Client Storage.pdf 601KB
Prevalence and Impact of LowEntropy Packing Schemes in the Malware Ecosystem.pdf 460KB
MassBrowser Unblocking the Censored Web for the Masses by the Masses.pdf 1.18MB
PostQuantum Authentication in TLS A Performance Study.pdf 704KB
Broken Metre Attacking Resource Metering in EVM.pdf 357KB
Snappy Fast Onchain Payments with Practical Collaterals.pdf 712KB
FUSE Finding File Upload Bugs via Penetration Testing.pdf 477KB
Designing a Better Browser for Tor with BLAST.pdf 396KB
Secure Sublinear Time Differentially Private Median Computation.pdf 642KB
TKPERM Crossplatform Permission Knowledge Transfer to Detect Overprivileged Thirdparty Applications.pdf 3.84MB
ConTExT A Generic Approach for Mitigating Spectre.pdf 291KB
FlowPrint SemiSupervised MobileApp Fingerprinting on Encrypted Network Traffic.pdf 943KB
Thumbs.db 181KB
RAI Securing Embedded Systems with Return Address Integrity.pdf 1.39MB
Automated CrossPlatform Reverse Engineering of CAN Bus Commands From Mobile Apps.pdf 578KB
Into the Deep Web Understanding Ecommerce Fraud from Autonomous Chat with Cybercriminals.pdf 3.03MB
EASI EdgeBased Sender Identification on ResourceConstrained Platforms for Automotive Networks.pdf 462KB
ABSynthe Automatic Blackbox Sidechannel Synthesis on Commodity Microarchitectures.pdf 964KB
Lets Revoke Scalable Global Certificate Revocation.pdf 433KB
HotFuzz Discovering Algorithmic DenialofService Vulnerabilities Through Guided MicroFuzzing.pdf 595KB
When Malware is Packin Heat Limits of Machine Learning Classifiers Based on Static Analysis Features.pdf 467KB
Are You Going to Answer That Measuring User Responses to AntiRobocall Application Indicators.pdf 2.17MB
BLAZE Blazing Fast PrivacyPreserving Machine Learning.pdf 689KB
Adversarial Classification Under Differential Privacy.pdf 4.31MB
Not All Coverage Measurements Are Equal Fuzzing by Coverage Accounting for Input Prioritization.pdf 1.34MB
Measuring the Deployment of Network Censorship Filters at Global Scale.pdf 3.27MB
SPEECHMINER A Framework for Investigating and Measuring Speculative Execution Vulnerabilities.pdf 532KB
IMPGT IMPersonation Attacks in G NeTworks.pdf 543KB
On the Resilience of Biometric Authentication Systems against Random Inputs.pdf 786KB
Complex Security Policy A Longitudinal Analysis of Deployed Content Security Policies.pdf 304KB
PhantomCache Obfuscating Cache Conflicts with Localized Randomization.pdf 743KB
Hold the Door Fingerprinting Your Car Key to Prevent Keyless Entry Car Theft.pdf 12.93MB
MACAO A MaliciouslySecure and ClientEfficient Active ORAM Framework.pdf 593KB
Compliance Cautions Investigating Security Issues Associated with US DigitalSecurity Standards.pdf 930KB
CDN Judo Breaking the CDN DoS Protection with Itself.pdf 4.47MB
DESENSITIZATION PrivacyAware and AttackPreserving Crash Report.pdf 1.08MB
SurfingAttack Interactive Hidden Attack on Voice Assistants Using Ultrasonic Guided Waves.pdf 2.85MB
BLAG Improving the Accuracy of Blacklists.pdf 1.05MB
共 89 条
- 1
资源评论
water_likly
- 粉丝: 60
- 资源: 55
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功