USENIX2019.zip

上传者: var19951121 | 上传时间: 2021-08-25 10:24:09 | 文件大小: 49.41MB | 文件类型: ZIP
USENIX Security是信息安全领域四大顶级学术会议之一,每年涵盖的安全领域也非常多,包含:二进制安全、固件安全、取证分析、Web安全、隐私保护、恶意分析等。

文件下载

资源详情

[{"title":"( 25 个子文件 49.41MB ) USENIX2019.zip","children":[{"title":"USENIX19","children":[{"title":"Scalable Scanning and Automatic Classification of TLS Padding Oracle Vulnerabilities.pdf <span style='color:#111;'> 988.34KB </span>","children":null,"spread":false},{"title":"Rendered Private Making GLSL Execution Uniform to Prevent WebGL-based Browser Fingerprinting.pdf <span style='color:#111;'> 5.17MB </span>","children":null,"spread":false},{"title":"Back to the Whiteboard a Principled Approach for the Assessment and Design of Memory Forensic Techniques.pdf <span style='color:#111;'> 3.15MB </span>","children":null,"spread":false},{"title":"Point Break A Study of Bandwidth Denial-of-Service Attacks against Tor.pdf <span style='color:#111;'> 714.58KB </span>","children":null,"spread":false},{"title":"TESSERACT Eliminating Experimental Bias in Malware Classification across Space and Time.pdf <span style='color:#111;'> 7.17MB </span>","children":null,"spread":false},{"title":"Leaky Images Targeted Privacy Attacks in the Web.pdf <span style='color:#111;'> 190.20KB </span>","children":null,"spread":false},{"title":"BITE Bitcoin Lightweight Client Privacy using Trusted Execution.pdf <span style='color:#111;'> 402.66KB </span>","children":null,"spread":false},{"title":"Stack Overflow Considered Helpful Deep Learning Security Nudges Towards Stronger Cryptography.pdf <span style='color:#111;'> 6.48MB </span>","children":null,"spread":false},{"title":"The KNOB is Broken Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR Or EDR.pdf <span style='color:#111;'> 527.52KB </span>","children":null,"spread":false},{"title":"UWB-ED Distance Enlargement Attack Detection in Ultra-Wideband.pdf <span style='color:#111;'> 781.42KB </span>","children":null,"spread":false},{"title":"AntiFuzz Impeding Fuzzing Audits of Binary Executables.pdf <span style='color:#111;'> 417.83KB </span>","children":null,"spread":false},{"title":"XONN XNOR-based Oblivious Deep Neural Network Inference.pdf <span style='color:#111;'> 738.82KB </span>","children":null,"spread":false},{"title":"Robust Website Fingerprinting Through the Cache Occupancy Channel.pdf <span style='color:#111;'> 2.25MB </span>","children":null,"spread":false},{"title":"Johnny you are fired – Spoofing OpenPGP and SMIME Signatures in Emails.pdf <span style='color:#111;'> 441.31KB </span>","children":null,"spread":false},{"title":"A Billion Open Interfaces for Eve and Mallory MitM DoS and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link.pdf <span style='color:#111;'> 9.62MB </span>","children":null,"spread":false},{"title":"Reading the Tea leaves A Comparative Analysis of Threat Intelligence.pdf <span style='color:#111;'> 605.93KB </span>","children":null,"spread":false},{"title":"When the Signal is in the Noise Exploiting Diffix&039;s Sticky Noise.pdf <span style='color:#111;'> 524.21KB </span>","children":null,"spread":false},{"title":"The CrossPath Attack Disrupting the SDN Control Channel via Shared Links.pdf <span style='color:#111;'> 751.05KB </span>","children":null,"spread":false},{"title":"FastKitten Practical Smart Contracts on Bitcoin.pdf <span style='color:#111;'> 798.80KB </span>","children":null,"spread":false},{"title":"All Your Clicks Belong to Me Investigating Click Interception on the Web.pdf <span style='color:#111;'> 1.88MB </span>","children":null,"spread":false},{"title":"Fuzzification Anti-Fuzzing Techniques.pdf <span style='color:#111;'> 407.63KB </span>","children":null,"spread":false},{"title":"PAC it up Towards Pointer Integrity using ARM Pointer Authentication.pdf <span style='color:#111;'> 630.62KB </span>","children":null,"spread":false},{"title":"Evaluating the Contextual Integrity of Privacy Regulation Parents&039; IoT Toy Privacy Norms Versus COPPA.pdf <span style='color:#111;'> 7.03MB </span>","children":null,"spread":false},{"title":"Computer Security and Privacy in the Interactions Between Victim Service Providers and Human Trafficking Survivors.pdf <span style='color:#111;'> 145.52KB </span>","children":null,"spread":false},{"title":"Towards the Detection of Inconsistencies in Public Security Vulnerability Reports.pdf <span style='color:#111;'> 771.25KB </span>","children":null,"spread":false}],"spread":false}],"spread":true}]

评论信息

免责申明

【只为小站】的资源来自网友分享,仅供学习研究,请务必在下载后24小时内给予删除,不得用于其他任何用途,否则后果自负。基于互联网的特殊性,【只为小站】 无法对用户传输的作品、信息、内容的权属或合法性、合规性、真实性、科学性、完整权、有效性等进行实质审查;无论 【只为小站】 经营者是否已进行审查,用户均应自行承担因其传输的作品、信息、内容而可能或已经产生的侵权或权属纠纷等法律责任。
本站所有资源不代表本站的观点或立场,基于网友分享,根据中国法律《信息网络传播权保护条例》第二十二条之规定,若资源存在侵权或相关问题请联系本站客服人员,zhiweidada#qq.com,请把#换成@,本站将给予最大的支持与配合,做到及时反馈和处理。关于更多版权及免责申明参见 版权及免责申明