在好例子网,分享、交流、成长!
您当前所在位置:首页Others 开发实例一般编程问题 → Network and Distributed System Security Symposium (NDSS)2014论文全集

Network and Distributed System Security Symposium (NDSS)2014论文全集

一般编程问题

下载此实例
  • 开发语言:Others
  • 实例大小:56.19M
  • 下载次数:5
  • 浏览次数:147
  • 发布时间:2021-01-18
  • 实例类别:一般编程问题
  • 发 布 人:好学IT男
  • 文件格式:.zip
  • 所需积分:2
 

实例介绍

【实例简介】
整理NDSS2014论文,NDSS为安全界比较重要的会议
【实例截图】
【核心代码】
45521021-b193-4e88-bade-33ba6d43614b
└── 2014
├── Session 10 Security of Mobile Devices II
│   ├── AirBag Boosting Smartphone Resistance to Malware Infection.pdf
│   ├── A Machine-learning Approach for Classifying and Categorizing Android Sources and Sinks.pdf
│   ├── AppSealer Automatic Generation of Vulnerability-Specific Patches for Preventing Component Hijacking Attacks in Android Applications.pdf
│   ├── Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications.pdf
│   └── SMV-HUNTER Large Scale, Automated Detection of SSL TLS Man-in-the-Middle Vulnerabilities in Android Apps.pdf
├── Session 11 Malware
│   ├── Drebin Effective and Explainable Detection of Android Malware in Your Pocket.pdf
│   ├── Gyrus A Framework for User-Intent Monitoring of Text-Based Networked Applications.pdf
│   ├── Nazca Detecting Malware Distribution in Large-Scale Networks.pdf
│   ├── Neural Signatures of User-Centered Security An fMRI Study of Phishing, and Malware Warnings (1).pdf
│   ├── Neural Signatures of User-Centered Security An fMRI Study of Phishing, and Malware Warnings.pdf
│   └── Persistent Data-only Malware Function Hooks without Code.pdf
├── Session 12 Crypto II
│   ├── Efficient Private File Retrieval by Combining ORAM and PIR.pdf
│   ├── Practical Issues with TLS Client Certificate Authentication.pdf
│   ├── Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO Systems.pdf
│   └── Web PKI Closing the Gap between Guidelines and Practices.pdf
├── Session 1 Network Security
│   ├── 01_1_1.pdf
│   ├── 01_5.Amplification Hel Revisiting Network Protocols for DDoS Abuse.pdf
│   ├── 4.CyberProbe Towards Internet-Scale Active Detection of Malicious Servers.pdf
│   ├── Gaining Control of Cellular Traffic Accounting by Spurious TCP Retransmission.pdf
│   └── No Direction Home The True Cost of Routing Around Decoys.pdf
├── Session 2 Software and System Security
│   ├── 02_1_ROPecker A Generic and Practical Approach for Defending Against ROP Attacks.pdf
│   ├── 02_2_A Trusted Safety Verifier for Process Controller Code.pdf
│   ├── 02_3_AVATAR A Framework to Support Dynamic Security Analysis of Embedded Systems Firmwares.pdf
│   ├── 02_4_SafeDispatch Securing C++ Virtual Calls from Memory Corruption Attacks.pdf
│   └── 02_5_Hybrid-Bridge Efficiently Bridging the Semantic-Gap in VMI via Decoupled Execution and Training Memoization.pdf
├── Session 3 Security of Mobile Devices I
│   ├── AccelPrint Imperfections of Accelerometers Make Smartphones Trackable.pdf
│   ├── Breaking and Fixing Origin-Based Access Control in Hybrid Web Mobile Application Frameworks.pdf
│   ├── Inside Job Understanding and Mitigating the Threat of External Device Mis-Binding on Android.pdf
│   ├── Screenmilker How to Milk Your Android Screen for Secrets.pdf
│   └── Smartphones as Practical and Secure Location Verification Tokens for Payments.pdf
├── Session 4 Web Security
│   ├── Detecting Logic Vulnerabilities in E-Commerce Applications.pdf
│   ├── DSpin Detecting Automatically Spun Content on the Web.pdf
│   ├── Macaroons Cookies with Contextual Caveats for Decentralized Authorization in the Cloud.pdf
│   ├── Simulation of Built-in PHP Features for Precise Static Code Analysis.pdf
│   └── Toward Black-Box Detection of Logic Flaws in Web Applications.pdf
├── Session 5 Privacy
│   ├── Enhanced Certificate Transparency and End-to-End Encrypted Mail.pdf
│   ├── Privacy-Preserving Distributed Stream Monitoring.pdf
│   ├── Privacy through Pseudonymity in Mobile Telephony Systems.pdf
│   ├── Selling Off Privacy at Auction.pdf
│   └── The Sniper Attack Anonymously Deanonymizing and Disabling the Tor Network.pdf
├── Session 6 Authentication and Identity I
│   ├── From Very Weak to Very Strong Analyzing Password-Strength Meters.pdf
│   ├── On the Semantic Patterns of Passwords and their Security Impact.pdf
│   └── The Tangled Web of Password Reuse.pdf
├── Session 7 Crypto I
│   ├── Copker Computing with Private Keys without RAM.pdf
│   ├── Decentralized Anonymous Credentials.pdf
│   ├── Dynamic Searchable Encryption in Very-Large Databases Data Structures and Implementation.pdf
│   └── Practical Dynamic Searchable Encryption with Small Leakage.pdf
├── Session 8 Authentication and Identity II
│   ├── Authentication Using Pulse-Response Biometrics.pdf
│   ├── Hardening Persona Improving Federated Web Login.pdf
│   ├── Leveraging USB to Establish Host Identity Using Commodity Devices.pdf
│   └── Two-Factor Authentication Resilient to Server Compromise Using Mix-Bandwidth Devices.pdf
└── Session 9 New Applications, Attacks, and Security Economics
├── Auditable Version Control Systems.pdf
├── Botcoin Monetizing Stolen Cycles.pdf
├── PlaceAvoider Steering First-Person Cameras away from Sensitive Spaces.pdf
├── Power Attack An Increasing Threat to Data Centers.pdf
└── Scambaiter Understanding Targeted Nigerian Scams on Craigslist.pdf

13 directories, 56 files

标签:

实例下载地址

Network and Distributed System Security Symposium (NDSS)2014论文全集

不能下载?内容有错? 点击这里报错 + 投诉 + 提问

好例子网口号:伸出你的我的手 — 分享

网友评论

发表评论

(您的评论需要经过审核才能显示)

查看所有0条评论>>

小贴士

感谢您为本站写下的评论,您的评论对其它用户来说具有重要的参考价值,所以请认真填写。

  • 类似“顶”、“沙发”之类没有营养的文字,对勤劳贡献的楼主来说是令人沮丧的反馈信息。
  • 相信您也不想看到一排文字/表情墙,所以请不要反馈意义不大的重复字符,也请尽量不要纯表情的回复。
  • 提问之前请再仔细看一遍楼主的说明,或许是您遗漏了。
  • 请勿到处挖坑绊人、招贴广告。既占空间让人厌烦,又没人会搭理,于人于己都无利。

关于好例子网

本站旨在为广大IT学习爱好者提供一个非营利性互相学习交流分享平台。本站所有资源都可以被免费获取学习研究。本站资源来自网友分享,对搜索内容的合法性不具有预见性、识别性、控制性,仅供学习研究,请务必在下载后24小时内给予删除,不得用于其他任何用途,否则后果自负。基于互联网的特殊性,平台无法对用户传输的作品、信息、内容的权属或合法性、安全性、合规性、真实性、科学性、完整权、有效性等进行实质审查;无论平台是否已进行审查,用户均应自行承担因其传输的作品、信息、内容而可能或已经产生的侵权或权属纠纷等法律责任。本站所有资源不代表本站的观点或立场,基于网友分享,根据中国法律《信息网络传播权保护条例》第二十二与二十三条之规定,若资源存在侵权或相关问题请联系本站客服人员,点此联系我们。关于更多版权及免责申明参见 版权及免责申明

;
报警