实例介绍
整理NDSS2014论文,NDSS为安全界比较重要的会议
【实例截图】
【核心代码】
45521021-b193-4e88-bade-33ba6d43614b
└── 2014
├── Session 10 Security of Mobile Devices II
│ ├── AirBag Boosting Smartphone Resistance to Malware Infection.pdf
│ ├── A Machine-learning Approach for Classifying and Categorizing Android Sources and Sinks.pdf
│ ├── AppSealer Automatic Generation of Vulnerability-Specific Patches for Preventing Component Hijacking Attacks in Android Applications.pdf
│ ├── Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications.pdf
│ └── SMV-HUNTER Large Scale, Automated Detection of SSL TLS Man-in-the-Middle Vulnerabilities in Android Apps.pdf
├── Session 11 Malware
│ ├── Drebin Effective and Explainable Detection of Android Malware in Your Pocket.pdf
│ ├── Gyrus A Framework for User-Intent Monitoring of Text-Based Networked Applications.pdf
│ ├── Nazca Detecting Malware Distribution in Large-Scale Networks.pdf
│ ├── Neural Signatures of User-Centered Security An fMRI Study of Phishing, and Malware Warnings (1).pdf
│ ├── Neural Signatures of User-Centered Security An fMRI Study of Phishing, and Malware Warnings.pdf
│ └── Persistent Data-only Malware Function Hooks without Code.pdf
├── Session 12 Crypto II
│ ├── Efficient Private File Retrieval by Combining ORAM and PIR.pdf
│ ├── Practical Issues with TLS Client Certificate Authentication.pdf
│ ├── Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO Systems.pdf
│ └── Web PKI Closing the Gap between Guidelines and Practices.pdf
├── Session 1 Network Security
│ ├── 01_1_1.pdf
│ ├── 01_5.Amplification Hel Revisiting Network Protocols for DDoS Abuse.pdf
│ ├── 4.CyberProbe Towards Internet-Scale Active Detection of Malicious Servers.pdf
│ ├── Gaining Control of Cellular Traffic Accounting by Spurious TCP Retransmission.pdf
│ └── No Direction Home The True Cost of Routing Around Decoys.pdf
├── Session 2 Software and System Security
│ ├── 02_1_ROPecker A Generic and Practical Approach for Defending Against ROP Attacks.pdf
│ ├── 02_2_A Trusted Safety Verifier for Process Controller Code.pdf
│ ├── 02_3_AVATAR A Framework to Support Dynamic Security Analysis of Embedded Systems Firmwares.pdf
│ ├── 02_4_SafeDispatch Securing C++ Virtual Calls from Memory Corruption Attacks.pdf
│ └── 02_5_Hybrid-Bridge Efficiently Bridging the Semantic-Gap in VMI via Decoupled Execution and Training Memoization.pdf
├── Session 3 Security of Mobile Devices I
│ ├── AccelPrint Imperfections of Accelerometers Make Smartphones Trackable.pdf
│ ├── Breaking and Fixing Origin-Based Access Control in Hybrid Web Mobile Application Frameworks.pdf
│ ├── Inside Job Understanding and Mitigating the Threat of External Device Mis-Binding on Android.pdf
│ ├── Screenmilker How to Milk Your Android Screen for Secrets.pdf
│ └── Smartphones as Practical and Secure Location Verification Tokens for Payments.pdf
├── Session 4 Web Security
│ ├── Detecting Logic Vulnerabilities in E-Commerce Applications.pdf
│ ├── DSpin Detecting Automatically Spun Content on the Web.pdf
│ ├── Macaroons Cookies with Contextual Caveats for Decentralized Authorization in the Cloud.pdf
│ ├── Simulation of Built-in PHP Features for Precise Static Code Analysis.pdf
│ └── Toward Black-Box Detection of Logic Flaws in Web Applications.pdf
├── Session 5 Privacy
│ ├── Enhanced Certificate Transparency and End-to-End Encrypted Mail.pdf
│ ├── Privacy-Preserving Distributed Stream Monitoring.pdf
│ ├── Privacy through Pseudonymity in Mobile Telephony Systems.pdf
│ ├── Selling Off Privacy at Auction.pdf
│ └── The Sniper Attack Anonymously Deanonymizing and Disabling the Tor Network.pdf
├── Session 6 Authentication and Identity I
│ ├── From Very Weak to Very Strong Analyzing Password-Strength Meters.pdf
│ ├── On the Semantic Patterns of Passwords and their Security Impact.pdf
│ └── The Tangled Web of Password Reuse.pdf
├── Session 7 Crypto I
│ ├── Copker Computing with Private Keys without RAM.pdf
│ ├── Decentralized Anonymous Credentials.pdf
│ ├── Dynamic Searchable Encryption in Very-Large Databases Data Structures and Implementation.pdf
│ └── Practical Dynamic Searchable Encryption with Small Leakage.pdf
├── Session 8 Authentication and Identity II
│ ├── Authentication Using Pulse-Response Biometrics.pdf
│ ├── Hardening Persona Improving Federated Web Login.pdf
│ ├── Leveraging USB to Establish Host Identity Using Commodity Devices.pdf
│ └── Two-Factor Authentication Resilient to Server Compromise Using Mix-Bandwidth Devices.pdf
└── Session 9 New Applications, Attacks, and Security Economics
├── Auditable Version Control Systems.pdf
├── Botcoin Monetizing Stolen Cycles.pdf
├── PlaceAvoider Steering First-Person Cameras away from Sensitive Spaces.pdf
├── Power Attack An Increasing Threat to Data Centers.pdf
└── Scambaiter Understanding Targeted Nigerian Scams on Craigslist.pdf
13 directories, 56 files
标签:
相关软件
小贴士
感谢您为本站写下的评论,您的评论对其它用户来说具有重要的参考价值,所以请认真填写。
- 类似“顶”、“沙发”之类没有营养的文字,对勤劳贡献的楼主来说是令人沮丧的反馈信息。
- 相信您也不想看到一排文字/表情墙,所以请不要反馈意义不大的重复字符,也请尽量不要纯表情的回复。
- 提问之前请再仔细看一遍楼主的说明,或许是您遗漏了。
- 请勿到处挖坑绊人、招贴广告。既占空间让人厌烦,又没人会搭理,于人于己都无利。
关于好例子网
本站旨在为广大IT学习爱好者提供一个非营利性互相学习交流分享平台。本站所有资源都可以被免费获取学习研究。本站资源来自网友分享,对搜索内容的合法性不具有预见性、识别性、控制性,仅供学习研究,请务必在下载后24小时内给予删除,不得用于其他任何用途,否则后果自负。基于互联网的特殊性,平台无法对用户传输的作品、信息、内容的权属或合法性、安全性、合规性、真实性、科学性、完整权、有效性等进行实质审查;无论平台是否已进行审查,用户均应自行承担因其传输的作品、信息、内容而可能或已经产生的侵权或权属纠纷等法律责任。本站所有资源不代表本站的观点或立场,基于网友分享,根据中国法律《信息网络传播权保护条例》第二十二与二十三条之规定,若资源存在侵权或相关问题请联系本站客服人员,点此联系我们。关于更多版权及免责申明参见 版权及免责申明
网友评论
我要评论