[{"title":"( 50 个子文件 82.18MB ) NDSS2015.rar","children":[{"title":"NDSS15","children":[{"title":"FULL","children":[{"title":"Identifying Cross-origin Resource Status Using Application Cache.pdf <span style='color:#111;'> 2.03MB </span>","children":null,"spread":false},{"title":"Knock Yourself Out Secure Authentication with Short Re-Usable Passwords.pdf <span style='color:#111;'> 1.99MB </span>","children":null,"spread":false},{"title":"SeCReT Secure Channel between Rich Execution Environment and Trusted Execution Environment.pdf <span style='color:#111;'> 2.23MB </span>","children":null,"spread":false},{"title":"On Your Social Network De-anonymizablity Quantification and Large Scale Evaluation with Seed Knowledge.pdf <span style='color:#111;'> 2.30MB </span>","children":null,"spread":false},{"title":"EKHunter A Counter-Offensive Toolkit for Exploit Kit Infiltration.pdf <span style='color:#111;'> 316.92KB </span>","children":null,"spread":false},{"title":"Preventing Use-after-free with Dangling Pointers Nullification.pdf <span style='color:#111;'> 2.22MB </span>","children":null,"spread":false},{"title":"I Do Not Know What You Visited Last Summer Protecting users from stateful third-party web tracking with TrackingFree browser.pdf <span style='color:#111;'> 3.15MB </span>","children":null,"spread":false},{"title":"Opaque Control-Flow Integrity.pdf <span style='color:#111;'> 1.35MB </span>","children":null,"spread":false},{"title":"Integro Leveraging Victim Prediction for Robust Fake Account Detection in OSNs.pdf <span style='color:#111;'> 1.69MB </span>","children":null,"spread":false},{"title":"Gracewipe Secure and Verifiable Deletion under Coercion.pdf <span style='color:#111;'> 398.57KB </span>","children":null,"spread":false},{"title":"Mind Your Blocks On the Stealthiness of Malicious BGP Hijacks.pdf <span style='color:#111;'> 3.07MB </span>","children":null,"spread":false},{"title":"Firmalice &8211; Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware.pdf <span style='color:#111;'> 649.97KB </span>","children":null,"spread":false},{"title":"Principled Sampling for Anomaly Detection.pdf <span style='color:#111;'> 715.72KB </span>","children":null,"spread":false},{"title":"Checking More and Alerting Less Detecting Privacy Leakages via Enhanced Data-flow Analysis and Peer Voting.pdf <span style='color:#111;'> 2.07MB </span>","children":null,"spread":false},{"title":"Parking Sensors Analyzing and Detecting Parked Domains.pdf <span style='color:#111;'> 1.23MB </span>","children":null,"spread":false},{"title":"Integrated Circuit (IC) Decamouflaging Reverse Engineering Camouflaged ICs within Minutes.pdf <span style='color:#111;'> 3.07MB </span>","children":null,"spread":false},{"title":"The Devil is in the Constants Bypassing Defenses in Browser JIT Engines.pdf <span style='color:#111;'> 2.81MB </span>","children":null,"spread":false},{"title":"CopperDroid Automatic Reconstruction of Android Malware Behaviors.pdf <span style='color:#111;'> 1.27MB </span>","children":null,"spread":false},{"title":"vfGuard Strict Protection for Virtual Function Calls in COTS C++ Binaries.pdf <span style='color:#111;'> 1.44MB </span>","children":null,"spread":false},{"title":"StackArmor Comprehensive Protection From Stack-based Memory Error Vulnerabilities for Binaries.pdf <span style='color:#111;'> 3.32MB </span>","children":null,"spread":false},{"title":"Poisoning Network Visibility in Software-Defined Networks New Attacks and Countermeasures.pdf <span style='color:#111;'> 2.34MB </span>","children":null,"spread":false},{"title":"Machine Learning Classification over Encrypted Data.pdf <span style='color:#111;'> 519.41KB </span>","children":null,"spread":false},{"title":"EdgeMiner Automatically Detecting Implicit Control Flow Transitions through the Android Framework.pdf <span style='color:#111;'> 1.71MB </span>","children":null,"spread":false},{"title":"Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords.pdf <span style='color:#111;'> 817.73KB </span>","children":null,"spread":false},{"title":"Verified Contributive Channel Bindings for Compound Authentication.pdf <span style='color:#111;'> 2.48MB </span>","children":null,"spread":false},{"title":"VTint Protecting Virtual Function Tables&8217; Integrity.pdf <span style='color:#111;'> 2.30MB </span>","children":null,"spread":false},{"title":"NSEC5 Provably Preventing DNSSEC Zone Enumeration.pdf <span style='color:#111;'> 347.42KB </span>","children":null,"spread":false},{"title":"DEFY A Deniable Encrypted File System for Log-Structured Storage.pdf <span style='color:#111;'> 1.86MB </span>","children":null,"spread":false},{"title":"Too LeJIT to Quit Extending JIT Spraying to ARM.pdf <span style='color:#111;'> 3.06MB </span>","children":null,"spread":false},{"title":"No More Gotos Decompilation Using Pattern-Independent Control-Flow Structuring and Semantic-Preserving Transformations.pdf <span style='color:#111;'> 1.57MB </span>","children":null,"spread":false},{"title":"SPHINX Detecting Security Attacks in Software-Defined Networks.pdf <span style='color:#111;'> 1.23MB </span>","children":null,"spread":false},{"title":"Preventing Lunchtime Attacks Fighting Insider Threats With Eye Movement Biometrics.pdf <span style='color:#111;'> 2.57MB </span>","children":null,"spread":false},{"title":"Upgrading HTTPS in mid-air An empirical study of strict transport security and key pinning.pdf <span style='color:#111;'> 697.33KB </span>","children":null,"spread":false},{"title":"P2C Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions.pdf <span style='color:#111;'> 2.34MB </span>","children":null,"spread":false},{"title":"Isomeron Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming.pdf <span style='color:#111;'> 1.53MB </span>","children":null,"spread":false},{"title":"Thwarting Cache Side-Channel Attacks Through Dynamic Software Diversity.pdf <span style='color:#111;'> 1.48MB </span>","children":null,"spread":false},{"title":"Information Flow Analysis of Android Applications in DroidSafe.pdf <span style='color:#111;'> 1.83MB </span>","children":null,"spread":false},{"title":"Exploiting and Protecting Dynamic Code Generation.pdf <span style='color:#111;'> 473.41KB </span>","children":null,"spread":false},{"title":"DeepDroid Dynamically Enforcing Enterprise Policy on Android Devices.pdf <span style='color:#111;'> 2.36MB </span>","children":null,"spread":false},{"title":"FreeSentry protecting against use-after-free vulnerabilities due to dangling pointers.pdf <span style='color:#111;'> 1.23MB </span>","children":null,"spread":false},{"title":"Bloom Cookies Web Search Personalization without User Tracking.pdf <span style='color:#111;'> 1.08MB </span>","children":null,"spread":false},{"title":"Phoneypot Data-driven Understanding of Telephony Threats.pdf <span style='color:#111;'> 2.04MB </span>","children":null,"spread":false},{"title":"Seven Months&8217; Worth of Mistakes A Longitudinal Study of Typosquatting Abuse.pdf <span style='color:#111;'> 986.20KB </span>","children":null,"spread":false},{"title":"Predicting Users&8217; Motivations behind Location Check-Ins and Utility Implications of Privacy Protection Mechanisms.pdf <span style='color:#111;'> 2.64MB </span>","children":null,"spread":false},{"title":"Privacy Preserving Payments in Credit Networks Enabling trust with privacy in online marketplaces.pdf <span style='color:#111;'> 1.84MB </span>","children":null,"spread":false},{"title":"ABY &8211; A Framework for Efficient Mixed-Protocol Secure Two-Party Computation.pdf <span style='color:#111;'> 425.89KB </span>","children":null,"spread":false},{"title":"What&8217;s in Your Dongle and Bank Account Mandatory and Discretionary Protection of Android External Resources.pdf <span style='color:#111;'> 2.03MB </span>","children":null,"spread":false},{"title":"Securing the Software Defined Network Control Layer.pdf <span style='color:#111;'> 681.68KB </span>","children":null,"spread":false},{"title":"Efficient RAM and control flow in verifiable outsourced computation.pdf <span style='color:#111;'> 1.21MB </span>","children":null,"spread":false},{"title":"Run-time Monitoring and Formal Analysis of Information Flows in Chromium.pdf <span style='color:#111;'> 1.20MB </span>","children":null,"spread":false}],"spread":false}],"spread":true}],"spread":true}]