在好例子网,分享、交流、成长!
您当前所在位置:首页Others 开发实例一般编程问题 → CCS 2013-ACM Conference on Computer and Communications Security ...

CCS 2013-ACM Conference on Computer and Communications Security ...

一般编程问题

下载此实例
  • 开发语言:Others
  • 实例大小:114.85M
  • 下载次数:2
  • 浏览次数:88
  • 发布时间:2021-12-03
  • 实例类别:一般编程问题
  • 发 布 人:js2021
  • 文件格式:.zip
  • 所需积分:2
 

实例介绍

【实例简介】
======================= 特别提醒大家: 由于我这里网络条件的原因,往往不能顺利上传到CSDN上,所以现在主要改在百度空间和网盘中进行更新,请感兴趣的朋友到这里下载我最新上传的论文集:http://hi.baidu.com/ictpapers 百度网盘速度较快,还不需要积分。 ======================= (我现在主要在CSDN上整理计算机安全、软件工程(可信软件)、系统及通信方面的论文及相关理论书籍,如果对这方面内容感兴趣,可以访问:http://download.csdn.net/user/qysh123 查看我上传的所有资料。内容比较多,需要大家人工手动查找。另外,资料顺序并不按照时间排列,只是想起来了就上传。请大家见谅。) 计算机及网络安全界的顶级会议,ACM Conference on Computer and Communications Security 2013年的会议论文集。欢迎大家下载、学习。 2013年CCS在德国柏林召开,主会一共录用了创纪录的105篇文章,共分为33个Session,印象中应该多篇来自大陆高校的论文(好像复旦大学有好几篇)。
【实例截图】
【核心代码】
4744300845214274966.zip
└── CCS 2013
├── FRONT MATTER.pdf
├── Keynote
│   ├── The cyber arms race.pdf
│   └── The science, engineering and business of cyber security.pdf
├── Session 10-A graphics, vision & security
│   ├── Cross-origin pixel stealing_ timing attacks using CSS filters.pdf
│   ├── Seeing double_ reconstructing obscured typed input from repeated compromising reflections.pdf
│   └── The robustness of hollow CAPTCHAs.pdf
├── Session 10-B authentication
│   ├── Anonymous credentials light.pdf
│   ├── Heart-to-heart (H2H)_ authentication for implanted medical devices.pdf
│   └── OAKE_ a new family of implicitly authenticated diffie-hellman protocols.pdf
├── Session 10-C privacy issues
│   ├── Addressing the concerns of the lacks family_ quantification of kin genomic privacy.pdf
│   ├── FPDetective_ dusting the web for fingerprinters.pdf
│   └── Hang with your buddies to resist intersection attacks.pdf
├── Session 11-A web and code security
│   ├── 25 million flows later_ large-scale detection of DOM-based XSS.pdf
│   ├── Content-based isolation_ rethinking isolation policy design on client systems.pdf
│   ├── deDacota_ toward preventing server-side XSS via automatic code and data separation.pdf
│   └── Diglossia_ detecting code injection attacks with precision and efficiency.pdf
├── Session 11-B crypto symbolic analysis
│   ├── Certified computer-aided cryptography_ efficient provably secure machine code from high-level implementations.pdf
│   ├── Computationally complete symbolic attacker and key exchange.pdf
│   ├── Deduction soundness_ prove one, get five for free.pdf
│   └── Fully automated analysis of padding-based encryption in the computational model.pdf
├── Session 11-C securitycryptographic utilities
│   ├── AUTOCRYPT_ enabling homomorphic computation on servers to protect sensitive web content.pdf
│   ├── Efficient targeted key subset retrieval in fractal hash sequences.pdf
│   ├── HIFS_ history independence for file systems.pdf
│   └── Protecting sensitive web content from client-side vulnerabilities with CRYPTONS.pdf
├── Session 1-A trusted systems
│   ├── A security framework for the analysis and design of software attestation.pdf
│   ├── BIOS chronomancy_ fixing the core root of trust for measurement.pdf
│   ├── Flexible and scalable digital signatures in TPM 2.0.pdf
│   └── OASIS_ on achieving a sanctuary for integrity and secrecy on untrusted platforms.pdf
├── Session 1-B how crypto breaks
│   ├── An empirical study of cryptographic misuse in android applications.pdf
│   ├── Detecting stealthy, distributed SSH brute-forcing.pdf
│   ├── Protocol misidentification made easy with format-transforming encryption.pdf
│   └── Rethinking SSL development in an appified world.pdf
├── Session 1-C malware
│   ├── A clinical study of risk factors related to malware infections.pdf
│   ├── Beheading hydras_ performing effective botnet takedowns.pdf
│   ├── Delta_ automatic identification of unknown web-based infection campaigns.pdf
│   └── Shady paths_ leveraging surfing crowds to detect malicious web pages.pdf
├── Session 2-A passwords
│   ├── Honeywords_ making password-cracking detectable.pdf
│   ├── Measuring password guessability for an entire university.pdf
│   ├── Quantifying the security of graphical passwords_ the case of android unlock patterns.pdf
│   └── SAuth_ protecting user accounts from password database leaks.pdf
├── Session 2-B control & information flow
│   ├── Formal verification of information flow security for a simple arm-based separation kernel.pdf
│   ├── Monitor integrity protection with space efficiency and separate compilation.pdf
│   ├── Relational abstract interpretation for the verification of 2-hypersafety properties.pdf
│   └── ShadowReplica_ efficient parallelization of dynamic data flow tracking.pdf
├── Session 2-C storage security
│   ├── Multi-cloud oblivious storage.pdf
│   ├── Policy-based secure deletion.pdf
│   ├── PoWerStore_ proofs of writing for efficient and robust storage.pdf
│   └── Secure data deletion from persistent media.pdf
├── Session 3-A oblivious RAM and oblivious computation
│   ├── Path ORAM_ an extremely simple oblivious RAM protocol.pdf
│   ├── PHANTOM_ practical oblivious computation in a secure processor.pdf
│   └── Practical dynamic proofs of retrievability.pdf
├── Session 3-B anonymous channels
│   ├── Cover your ACKs_ pitfalls of covert channel censorship circumvention.pdf
│   ├── PCTCP_ per-circuit TCP-over-IPsec transport for anonymous communication overlay networks.pdf
│   └── Users get routed_ traffic correlation on tor by realistic adversaries.pdf
├── Session 3-C protocol analysis & synthesis
│   ├── An analysis of the EMV channel establishment protocol.pdf
│   ├── On the security of TLS renegotiation.pdf
│   └── Using SMT solvers to automate design tasks for encryption and signature schemes.pdf
├── Session 4-A network security
│   ├── AVANT-GUARD_ scalable and vigilant switch flow management in software-defined networks.pdf
│   └── MinimaLT_ minimal-latency networking through better security.pdf
├── Session 4-B critical infrastructures
│   ├── Configuration-based IDS for advanced metering infrastructure.pdf
│   └── Impact of integrity attacks on real-time pricing in smart grids.pdf
├── Session 4-C attribute-based encryption
│   ├── Blackbox traceable CP-ABE_ how to catch people leaking their keys by selling decryption devices on ebay.pdf
│   └── Practical constructions and new proof methods for large universe attribute-based encryption.pdf
├── Session 5-A programming securely
│   ├── Chucky_ exposing missing checks in source code for vulnerability discovery.pdf
│   ├── Obfuscation resilient binary code reuse through trace-oriented programming.pdf
│   └── Scheduling black-box mutational fuzzing.pdf
├── Session 5-B secure multiparty computation
│   ├── An architecture for practical actively secure MPC with dishonest majority.pdf
│   ├── Fast two-party secure computation with minimal assumptions.pdf
│   └── More efficient oblivious transfer and extensions for faster secure computation.pdf
├── Session 5-C formal methods
│   ├── Automatic verification of protocols with lists of unbounded length.pdf
│   ├── Belief semantics of authorization logic.pdf
│   └── Relational abstraction in community-based secure collaboration.pdf
├── Session 6-A mobile security issues
│   ├── The impact of vendor customizations on android security.pdf
│   ├── Unauthorized origin crossing on mobile platforms_ threats and mitigation.pdf
│   ├── Vetting undesirable behaviors in android apps with permission use analysis.pdf
│   └── When kids' toys breach mobile phone security.pdf
├── Session 6-B randomness
│   ├── Delegatable pseudorandom functions and applications.pdf
│   ├── Ensuring high-quality randomness in cryptographic key generation.pdf
│   ├── Predictability of Android OpenSSL's pseudo random number generator.pdf
│   └── Security analysis of pseudo-random number generators with input_ dev random is not robust.pdf
├── Session 6-C hardware security
│   ├── Breaking and entering through the silicon.pdf
│   ├── FANCI_ identification of stealthy malicious logic using boolean functional analysis.pdf
│   ├── Low-fat pointers.pdf
│   └── Security analysis of integrated circuit camouflaging.pdf
├── Session 7-A web attacks
│   ├── mXSS attacks_ attacking well-secured web-applications by using innerHTML mutations.pdf
│   ├── Polyglots_ crossing origins by crossing formats.pdf
│   └── ViceROI_ catching click-spam in search ad networks.pdf
├── Session 7-B privacy-preserving protocols
│   ├── PICCO_ a general-purpose compiler for private distributed computation.pdf
│   ├── Privacy-preserving matrix factorization.pdf
│   └── When private set intersection meets big data_ an efficient and scalable protocol.pdf
├── Session 7-C systems' attack mitigation
│   ├── Düppel_ retrofitting commodity operating systems to mitigate cache side channels in the cloud.pdf
│   ├── Tappan Zee (north) bridge_ mining memory accesses for introspection.pdf
│   └── Towards reducing the attack surface of software backdoors.pdf
├── Session 8-A secure outsourcing protocols
│   ├── Outsourced symmetric private information retrieval.pdf
│   └── Verifiable delegation of computation on outsourced data.pdf
├── Session 8-B privacy models
│   ├── Geo-indistinguishability_ differential privacy for location-based systems.pdf
│   └── Membership privacy_ a unifying framework for privacy definitions.pdf
├── Session 8-C be aware & beware
│   ├── Control-Alt-Hack_ the design and evaluation of a card game for computer security awareness and education.pdf
│   └── Security analysis of a widely deployed locking system.pdf
├── Session 9-A crypto tools
│   ├── Elligator_ elliptic-curve points indistinguishable from uniform random strings.pdf
│   ├── How to keep a secret_ leakage deterring public-key cryptosystems.pdf
│   └── Zero-knowledge using garbled circuits_ how to prove non-algebraic statements efficiently.pdf
├── Session 9-B audit & code randomization
│   ├── ASIST_ architectural support for instruction set randomization.pdf
│   ├── Librando_ transparent code randomization for just-in-time compilers.pdf
│   └── LogGC_ garbage collecting audit log.pdf
└── Session 9-C mobile privacy
├── AppIntent_ analyzing sensitive data transmission in android for privacy leakage detection.pdf
├── Identity, location, disease and more_ inferring your secrets from android public resources.pdf
└── Preventing accidental data disclosure in modern operating systems.pdf

35 directories, 108 files

标签:

实例下载地址

CCS 2013-ACM Conference on Computer and Communications Security ...

不能下载?内容有错? 点击这里报错 + 投诉 + 提问

好例子网口号:伸出你的我的手 — 分享

网友评论

发表评论

(您的评论需要经过审核才能显示)

查看所有0条评论>>

小贴士

感谢您为本站写下的评论,您的评论对其它用户来说具有重要的参考价值,所以请认真填写。

  • 类似“顶”、“沙发”之类没有营养的文字,对勤劳贡献的楼主来说是令人沮丧的反馈信息。
  • 相信您也不想看到一排文字/表情墙,所以请不要反馈意义不大的重复字符,也请尽量不要纯表情的回复。
  • 提问之前请再仔细看一遍楼主的说明,或许是您遗漏了。
  • 请勿到处挖坑绊人、招贴广告。既占空间让人厌烦,又没人会搭理,于人于己都无利。

关于好例子网

本站旨在为广大IT学习爱好者提供一个非营利性互相学习交流分享平台。本站所有资源都可以被免费获取学习研究。本站资源来自网友分享,对搜索内容的合法性不具有预见性、识别性、控制性,仅供学习研究,请务必在下载后24小时内给予删除,不得用于其他任何用途,否则后果自负。基于互联网的特殊性,平台无法对用户传输的作品、信息、内容的权属或合法性、安全性、合规性、真实性、科学性、完整权、有效性等进行实质审查;无论平台是否已进行审查,用户均应自行承担因其传输的作品、信息、内容而可能或已经产生的侵权或权属纠纷等法律责任。本站所有资源不代表本站的观点或立场,基于网友分享,根据中国法律《信息网络传播权保护条例》第二十二与二十三条之规定,若资源存在侵权或相关问题请联系本站客服人员,点此联系我们。关于更多版权及免责申明参见 版权及免责申明

;
报警