USENIX2014.rar

上传者: var19951121 | 上传时间: 2022-04-20 11:47:30 | 文件大小: 58.29MB | 文件类型: RAR
USENIX Security是信息安全领域四大顶级学术会议之一,每年涵盖的安全领域也非常多,包含:二进制安全、固件安全、取证分析、Web安全、隐私保护、恶意分析等。

文件下载

资源详情

[{"title":"( 67 个子文件 58.29MB ) USENIX2014.rar","children":[{"title":"USENIX14","children":[{"title":"Telepathwords Preventing Weak Passwords by Reading Users’ Minds.pdf <span style='color:#111;'> 792.45KB </span>","children":null,"spread":false},{"title":"ASM A Programmable Interface for Extending Android Security.pdf <span style='color:#111;'> 372.62KB </span>","children":null,"spread":false},{"title":"SSOScan Automated Testing of Web Applications for Single Sign-On Vulnerabilities.pdf <span style='color:#111;'> 631.65KB </span>","children":null,"spread":false},{"title":"Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture.pdf <span style='color:#111;'> 506.96KB </span>","children":null,"spread":false},{"title":"Cardinal Pill Testing of System Virtual Machines.pdf <span style='color:#111;'> 375.86KB </span>","children":null,"spread":false},{"title":"Oxymoron Making Fine-Grained Memory Randomization Practical by Allowing Code Sharing.pdf <span style='color:#111;'> 1.02MB </span>","children":null,"spread":false},{"title":"A Large-Scale Empirical Analysis of Chinese Web Passwords.pdf <span style='color:#111;'> 469.94KB </span>","children":null,"spread":false},{"title":"An Internet-Wide View of Internet-Wide Scanning.pdf <span style='color:#111;'> 478.26KB </span>","children":null,"spread":false},{"title":"iSeeYou Disabling the MacBook Webcam Indicator LED.pdf <span style='color:#111;'> 1.52MB </span>","children":null,"spread":false},{"title":"BareCloud Bare-metal Analysis-based Evasive Malware Detection.pdf <span style='color:#111;'> 386.08KB </span>","children":null,"spread":false},{"title":"Static Detection of Second-Order Vulnerabilities in Web Applications.pdf <span style='color:#111;'> 362.89KB </span>","children":null,"spread":false},{"title":"Precise Client-side Protection against DOM-based Cross-Site Scripting.pdf <span style='color:#111;'> 307.21KB </span>","children":null,"spread":false},{"title":"Optimizing Seed Selection for Fuzzing.pdf <span style='color:#111;'> 368.67KB </span>","children":null,"spread":false},{"title":"From the Aether to the Ethernet—Attacking the Internet using Broadcast Digital Television.pdf <span style='color:#111;'> 691.40KB </span>","children":null,"spread":false},{"title":"When Governments Hack Opponents A Look at Actors and Technology.pdf <span style='color:#111;'> 5.22MB </span>","children":null,"spread":false},{"title":"Understanding the Dark Side of Domain Parking.pdf <span style='color:#111;'> 1.44MB </span>","children":null,"spread":false},{"title":"The Long Taile of Typosquatting Domain Names.pdf <span style='color:#111;'> 1.88MB </span>","children":null,"spread":false},{"title":"Privacy in Pharmacogenetics An End-to-End Case Study of Personalized Warfarin Dosing.pdf <span style='color:#111;'> 405.55KB </span>","children":null,"spread":false},{"title":"Towards Detecting Anomalous User Behavior in Online Social Networks.pdf <span style='color:#111;'> 488.91KB </span>","children":null,"spread":false},{"title":"XRay Enhancing the Web’s Transparency with Differential Correlation.pdf <span style='color:#111;'> 456.81KB </span>","children":null,"spread":false},{"title":"On the Effective Prevention of TLS Man-in-the-Middle Attacks in Web Applications.pdf <span style='color:#111;'> 906.06KB </span>","children":null,"spread":false},{"title":"Never Been KIST Tor’s Congestion Management Blossoms with Kernel-Informed Socket Transport.pdf <span style='color:#111;'> 790.14KB </span>","children":null,"spread":false},{"title":"Burst ORAM Minimizing ORAM Response Times for Bursty Access Patterns.pdf <span style='color:#111;'> 3.61MB </span>","children":null,"spread":false},{"title":"SpanDex Secure Password Tracking for Android.pdf <span style='color:#111;'> 449.25KB </span>","children":null,"spread":false},{"title":"The Emperor’s New Password Manager Security Analysis of Web-based Password Managers.pdf <span style='color:#111;'> 609.88KB </span>","children":null,"spread":false},{"title":"Blanket Execution Dynamic Similarity Testing for Program Binaries and Components.pdf <span style='color:#111;'> 497.65KB </span>","children":null,"spread":false},{"title":"Automatically Detecting Vulnerable Websites Before They Turn Malicious.pdf <span style='color:#111;'> 938.48KB </span>","children":null,"spread":false},{"title":"A Large-Scale Analysis of the Security of Embedded Firmwares.pdf <span style='color:#111;'> 674.96KB </span>","children":null,"spread":false},{"title":"Towards Reliable Storage of 56-bit Secrets in Human Memory.pdf <span style='color:#111;'> 417.39KB </span>","children":null,"spread":false},{"title":"Brahmastra Driving Apps to Test the Security of Third-Party Components.pdf <span style='color:#111;'> 1.50MB </span>","children":null,"spread":false},{"title":"Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens.pdf <span style='color:#111;'> 753.19KB </span>","children":null,"spread":false},{"title":"Password Portfolios and the Finite-Effort User Sustainably Managing Large Numbers of Accounts.pdf <span style='color:#111;'> 449.62KB </span>","children":null,"spread":false},{"title":"X-Force Force-Executing Binary Programs for Security Applications.pdf <span style='color:#111;'> 998.04KB </span>","children":null,"spread":false},{"title":"SDDR Light-Weight Secure Mobile Encounters.pdf <span style='color:#111;'> 2.17MB </span>","children":null,"spread":false},{"title":"JIGSAW Protecting Resource Access by Inferring Programmer Expectations.pdf <span style='color:#111;'> 485.51KB </span>","children":null,"spread":false},{"title":"Gyrophone Recognizing Speech from Gyroscope Signals.pdf <span style='color:#111;'> 3.32MB </span>","children":null,"spread":false},{"title":"LibFTE A Toolkit for Constructing Practical Format-Abiding Encryption Schemes.pdf <span style='color:#111;'> 2.02MB </span>","children":null,"spread":false},{"title":"TRUESET Faster Verifiable Set Computations.pdf <span style='color:#111;'> 2.38MB </span>","children":null,"spread":false},{"title":"BYTEWEIGHT Learning to Recognize Functions in Binary Code.pdf <span style='color:#111;'> 462.35KB </span>","children":null,"spread":false},{"title":"Man vs. Machine Practical Adversarial Detection of Malicious Crowdsourcing Workers.pdf <span style='color:#111;'> 779.87KB </span>","children":null,"spread":false},{"title":"Stitching the Gadgets On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection.pdf <span style='color:#111;'> 731.55KB </span>","children":null,"spread":false},{"title":"Password Managers Attacks and Defenses.pdf <span style='color:#111;'> 347.94KB </span>","children":null,"spread":false},{"title":"ROP is Still Dangerous Breaking Modern Defenses.pdf <span style='color:#111;'> 429.66KB </span>","children":null,"spread":false},{"title":"A Bayesian Approach to Privacy Enforcement in Smartphones.pdf <span style='color:#111;'> 1.97MB </span>","children":null,"spread":false},{"title":"Dynamic Hooks Hiding Control Flow Changes within Non-Control Data.pdf <span style='color:#111;'> 406.20KB </span>","children":null,"spread":false},{"title":"TapDance End-to-Middle Anticensorship without Flow Blocking.pdf <span style='color:#111;'> 572.15KB </span>","children":null,"spread":false},{"title":"On the Practical Exploitability of Dual EC in TLS Implementations.pdf <span style='color:#111;'> 356.61KB </span>","children":null,"spread":false},{"title":"ZØ An Optimizing Distributing Zero-Knowledge Compiler.pdf <span style='color:#111;'> 585.55KB </span>","children":null,"spread":false},{"title":"Revisiting SSLTLS Implementations New Bleichenbacher Side Channels and Attacks.pdf <span style='color:#111;'> 625.44KB </span>","children":null,"spread":false},{"title":"FLUSH+RELOAD A High Resolution Low Noise L3 Cache Side-Channel Attack.pdf <span style='color:#111;'> 322.35KB </span>","children":null,"spread":false},{"title":"Effective Attacks and Provable Defenses for Website Fingerprinting.pdf <span style='color:#111;'> 300.46KB </span>","children":null,"spread":false},{"title":"Scheduler-based Defenses against Cross-VM Side-channels.pdf <span style='color:#111;'> 673.17KB </span>","children":null,"spread":false},{"title":"Hulk Eliciting Malicious Behavior in Browser Extensions.pdf <span style='color:#111;'> 1.91MB </span>","children":null,"spread":false},{"title":"On the Feasibility of Large-Scale Infections of iOS Devices.pdf <span style='color:#111;'> 529.06KB </span>","children":null,"spread":false},{"title":"A Look at Targeted Attacks Through the Lense of an NGO.pdf <span style='color:#111;'> 507.46KB </span>","children":null,"spread":false},{"title":"Faster Private Set Intersection Based on OT Extension.pdf <span style='color:#111;'> 355.00KB </span>","children":null,"spread":false},{"title":"Enforcing Forward-Edge Control-Flow Integrity in GCC &amp; LLVM.pdf <span style='color:#111;'> 313.58KB </span>","children":null,"spread":false},{"title":"ret2dir Rethinking Kernel Isolation.pdf <span style='color:#111;'> 437.13KB </span>","children":null,"spread":false},{"title":"Peeking into Your App without Actually Seeing It UI State Inference and Novel Android Attacks.pdf <span style='color:#111;'> 636.14KB </span>","children":null,"spread":false},{"title":"Exit from Hell Reducing the Impact of Amplification DDoS Attacks.pdf <span style='color:#111;'> 2.13MB </span>","children":null,"spread":false},{"title":"Size Does Matter Why Using Gadget-Chain Length to Prevent Code-Reuse Attacks is Hard.pdf <span style='color:#111;'> 525.75KB </span>","children":null,"spread":false},{"title":"DSCRETE Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse.pdf <span style='color:#111;'> 770.86KB </span>","children":null,"spread":false},{"title":"Security Analysis of a Full-Body Scanner.pdf <span style='color:#111;'> 3.91MB </span>","children":null,"spread":false},{"title":"Privee An Architecture for Automatically Analyzing Web Privacy Policies.pdf <span style='color:#111;'> 751.69KB </span>","children":null,"spread":false},{"title":"Targeted Threat Index Characterizing and Quantifying Politically-Motivated Targeted Malware.pdf <span style='color:#111;'> 3.73MB </span>","children":null,"spread":false},{"title":"Preventing Cryptographic Key Leakage in Cloud Virtual Machines.pdf <span style='color:#111;'> 496.92KB </span>","children":null,"spread":false},{"title":"Mimesis Aegis A Mimicry Privacy Shield–A System’s Approach to Data Privacy on Public Cloud.pdf <span style='color:#111;'> 860.43KB </span>","children":null,"spread":false}],"spread":false}],"spread":true}]

评论信息

免责申明

【只为小站】的资源来自网友分享,仅供学习研究,请务必在下载后24小时内给予删除,不得用于其他任何用途,否则后果自负。基于互联网的特殊性,【只为小站】 无法对用户传输的作品、信息、内容的权属或合法性、合规性、真实性、科学性、完整权、有效性等进行实质审查;无论 【只为小站】 经营者是否已进行审查,用户均应自行承担因其传输的作品、信息、内容而可能或已经产生的侵权或权属纠纷等法律责任。
本站所有资源不代表本站的观点或立场,基于网友分享,根据中国法律《信息网络传播权保护条例》第二十二条之规定,若资源存在侵权或相关问题请联系本站客服人员,zhiweidada#qq.com,请把#换成@,本站将给予最大的支持与配合,做到及时反馈和处理。关于更多版权及免责申明参见 版权及免责申明