[{"title":"( 25 个子文件 49.41MB ) USENIX2019.zip","children":[{"title":"USENIX19","children":[{"title":"Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities.pdf <span style='color:#111;'> 988.34KB </span>","children":null,"spread":false},{"title":"Rendered Private Making GLSL Execution Uniform to Prevent WebGL-based Browser Fingerprinting.pdf <span style='color:#111;'> 5.17MB </span>","children":null,"spread":false},{"title":"Back to the Whiteboard a Principled Approach for the Assessment and Design of Memory Forensic Techniques.pdf <span style='color:#111;'> 3.15MB </span>","children":null,"spread":false},{"title":"Point Break A Study of Bandwidth Denial-of-Service Attacks against Tor.pdf <span style='color:#111;'> 714.58KB </span>","children":null,"spread":false},{"title":"TESSERACT Eliminating Experimental Bias in Malware Classification across Space and Time.pdf <span style='color:#111;'> 7.17MB </span>","children":null,"spread":false},{"title":"Leaky Images Targeted Privacy Attacks in the Web.pdf <span style='color:#111;'> 190.20KB </span>","children":null,"spread":false},{"title":"BITE Bitcoin Lightweight Client Privacy using Trusted Execution.pdf <span style='color:#111;'> 402.66KB </span>","children":null,"spread":false},{"title":"Stack Overflow Considered Helpful Deep Learning Security Nudges Towards Stronger Cryptography.pdf <span style='color:#111;'> 6.48MB </span>","children":null,"spread":false},{"title":"The KNOB is Broken Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR Or EDR.pdf <span style='color:#111;'> 527.52KB </span>","children":null,"spread":false},{"title":"UWB-ED Distance Enlargement Attack Detection in Ultra-Wideband.pdf <span style='color:#111;'> 781.42KB </span>","children":null,"spread":false},{"title":"AntiFuzz Impeding Fuzzing Audits of Binary Executables.pdf <span style='color:#111;'> 417.83KB </span>","children":null,"spread":false},{"title":"XONN XNOR-based Oblivious Deep Neural Network Inference.pdf <span style='color:#111;'> 738.82KB </span>","children":null,"spread":false},{"title":"Robust Website Fingerprinting Through the Cache Occupancy Channel.pdf <span style='color:#111;'> 2.25MB </span>","children":null,"spread":false},{"title":"Johnny you are fired – Spoofing OpenPGP and SMIME Signatures in Emails.pdf <span style='color:#111;'> 441.31KB </span>","children":null,"spread":false},{"title":"A Billion Open Interfaces for Eve and Mallory MitM DoS and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link.pdf <span style='color:#111;'> 9.62MB </span>","children":null,"spread":false},{"title":"Reading the Tea leaves A Comparative Analysis of Threat Intelligence.pdf <span style='color:#111;'> 605.93KB </span>","children":null,"spread":false},{"title":"When the Signal is in the Noise Exploiting Diffix&039;s Sticky Noise.pdf <span style='color:#111;'> 524.21KB </span>","children":null,"spread":false},{"title":"The CrossPath Attack Disrupting the SDN Control Channel via Shared Links.pdf <span style='color:#111;'> 751.05KB </span>","children":null,"spread":false},{"title":"FastKitten Practical Smart Contracts on Bitcoin.pdf <span style='color:#111;'> 798.80KB </span>","children":null,"spread":false},{"title":"All Your Clicks Belong to Me Investigating Click Interception on the Web.pdf <span style='color:#111;'> 1.88MB </span>","children":null,"spread":false},{"title":"Fuzzification Anti-Fuzzing Techniques.pdf <span style='color:#111;'> 407.63KB </span>","children":null,"spread":false},{"title":"PAC it up Towards Pointer Integrity using ARM Pointer Authentication.pdf <span style='color:#111;'> 630.62KB </span>","children":null,"spread":false},{"title":"Evaluating the Contextual Integrity of Privacy Regulation Parents&039; IoT Toy Privacy Norms Versus COPPA.pdf <span style='color:#111;'> 7.03MB </span>","children":null,"spread":false},{"title":"Computer Security and Privacy in the Interactions Between Victim Service Providers and Human Trafficking Survivors.pdf <span style='color:#111;'> 145.52KB </span>","children":null,"spread":false},{"title":"Towards the Detection of Inconsistencies in Public Security Vulnerability Reports.pdf <span style='color:#111;'> 771.25KB </span>","children":null,"spread":false}],"spread":false}],"spread":true}]