实例介绍
(我现在主要在CSDN上整理计算机安全、软件工程(可信软件)、系统及通信方面的论文及相关理论书籍,如果对这方面内容感兴趣,可以访问:http://download.csdn.net/user/qysh123 查看我上传的所有资料。内容比较多,需要大家人工手动查找。另外,资料顺序并不按照时间排列,只是想起来了就上传。请大家见谅。) 计算机及网络安全界的顶级会议,ACM Conference on Computer and Communications Security 2012年的会议论文集。欢迎大家下载、学习。2012年CCS共收录包括Keynote address在内的21个session共计82篇论文。
【实例截图】
【核心代码】
4744300845214289853.zip
└── CCS 2012
├── Advertising security & privacy
│ ├── Knowing your enemy_ understanding and detecting malicious web advertising.pdf
│ ├── Non-tracking web analytics.pdf
│ └── Privacy-aware personalization for mobile advertising.pdf
├── Anonymity & censorship
│ ├── CensorSpoofer_ asymmetric communication using IP spoofing for censorship-resistant web browsing.pdf
│ ├── Enhancing Tor's performance using real-time traffic classification.pdf
│ ├── Routing around decoys.pdf
│ ├── SkypeMorph_ protocol obfuscation for Tor bridges.pdf
│ └── StegoTorus_ a camouflage proxy for the Tor anonymity system.pdf
├── Applied cryptography I
│ ├── Full proof cryptography_ verifiable compilation of efficient zero-knowledge protocols.pdf
│ ├── Machine-generated algorithms, proofs and software for the batch verification of digital signature schemes.pdf
│ ├── Practical yet universally composable two-server password-authenticated secret sharing.pdf
│ ├── Publicly verifiable delegation of large polynomials and matrix computations, with applications.pdf
│ └── Secure two-party computation in sublinear (amortized) time.pdf
├── Applied cryptography II
│ ├── Dynamic searchable symmetric encryption.pdf
│ ├── PrivateFS_ a parallel oblivious file system.pdf
│ └── Verifiable data streaming.pdf
├── Badware
│ ├── Before we knew it_ an empirical study of zero-day attacks in the real world.pdf
│ ├── Manufacturing compromise_ the emergence of exploit-as-a-service.pdf
│ ├── Priceless_ the role of payments in abuse-advertised goods.pdf
│ └── Vanity, cracks and malware_ insights into the anti-copy protection ecosystem.pdf
├── Cloud security
│ ├── Cross-VM side channels and their use to extract private keys.pdf
│ ├── Hourglass schemes_ how to prove that cloud files are encrypted.pdf
│ ├── Resource-freeing attacks_ improve your cloud performance (at your neighbor's expense).pdf
│ ├── Self-service cloud computing.pdf
│ └── Single round access privacy on outsourced storage.pdf
├── Infrastructure security & privacy
│ ├── GPS software attacks.pdf
│ ├── How secure are power network signature based time stamps.pdf
│ ├── Minimizing private data disclosures in the smart grid.pdf
│ ├── Neighborhood watch_ security and privacy analysis of automatic meter reading systems.pdf
│ └── SABOT_ specification-based payload generation for programmable logic controllers.pdf
├── Intrusions & abuse
│ ├── Blacksheep_ detecting compromised hosts in homogeneous crowds.pdf
│ ├── Innocent by association_ early recognition of legitimate users.pdf
│ ├── Kargus_ a highly-scalable software-based intrusion detection system.pdf
│ └── Populated IP addresses_ classification and applications.pdf
├── Keynote address
│ └── On the foundations of trust in networks of humans and computers.pdf
├── Mobile security
│ ├── CHEX_ statically vetting Android apps for component hijacking vulnerabilities.pdf
│ ├── Mobile data charging_ new attacks and countermeasures.pdf
│ ├── New privacy issues in mobile telephony_ fix and verification.pdf
│ ├── PScout_ analyzing the Android permission specification.pdf
│ └── Using probabilistic generative models for ranking risks of Android apps.pdf
├── Network Security
│ ├── Collaborative TCP sequence number inference attack_ how to crack sequence number under a second.pdf
│ ├── DCast_ sustaining collaboration in overlay multicast despite rational collusion.pdf
│ ├── PeerPress_ utilizing enemies' P2P strength against them.pdf
│ ├── Provable security of S-BGP and other path vector protocols_ model, analysis and extensions.pdf
│ └── Towards a bayesian network game framework for evaluating DDoS attacks and defense.pdf
├── Payments, votes & reputation
│ ├── Double-spending fast payments in bitcoin.pdf
│ ├── Measuring vote privacy, revisited.pdf
│ ├── PERM_ practical reputation-based blacklisting without TTPS.pdf
│ └── Revoke and let live_ a secure key revocation api for cryptographic devices.pdf
├── Privacy
│ ├── Deanonymizing mobility traces_ using social network as a side-channel.pdf
│ ├── Differentially private sequential data publication via variable-length n-grams.pdf
│ ├── On significance of the least significant bits for differential privacy.pdf
│ ├── Protecting location privacy_ optimal strategy against localization attacks.pdf
│ └── Touching from a distance_ website fingerprinting attacks and defenses.pdf
├── Secure computation
│ ├── Foundations of garbled circuits.pdf
│ ├── Salus_ a system for server-aided secure function evaluation.pdf
│ └── Secure two-party computations in ANSI C.pdf
├── Software security
│ ├── Adaptive defenses for commodity software through virtual application partitioning.pdf
│ ├── Aligot_ cryptographic function identification in obfuscated binary programs.pdf
│ ├── An historical examination of open source releases and their vulnerabilities.pdf
│ ├── Binary stirring_ self-randomizing instruction addresses of legacy x86 binary code.pdf
│ └── Leveraging choice to automate authorization hook placement.pdf
├── Systems security
│ ├── A software-hardware architecture for self-protecting data.pdf
│ ├── Fides_ selectively hardening software application components against kernel-level or process-level malware.pdf
│ └── Vigilare_ toward snoop-based kernel integrity monitor.pdf
├── Theory
│ ├── Intransitive noninterference in nondeterministic systems.pdf
│ ├── On the parameterized complexity of the workflow satisfiability problem.pdf
│ ├── Precise enforcement of progress-sensitive security.pdf
│ └── TreeDroid_ a tree automaton based approach to enforcing data processing policies.pdf
├── Transport layer security
│ ├── A cross-protocol attack on the TLS protocol.pdf
│ ├── The most dangerous code in the world_ validating SSL certificates in non-browser software.pdf
│ └── Why eve and mallory love android_ an analysis of android SSL (in)security.pdf
├── Usability, authentication & trust
│ ├── Operating system framed in case of mistaken identity .pdf
│ ├── OTO_ online trust oracle for user-centric trust establishment.pdf
│ ├── Strengthening user authentication through opportunistic cryptographic identity assertions.pdf
│ └── The devil is in the (implementation) details_ an empirical analysis of OAuth SSO systems.pdf
├── Verification
│ ├── Computational soundness without protocol restrictions.pdf
│ ├── Computational verification of C protocol implementations by symbolic execution.pdf
│ └── Verified security of redundancy-free encryption from Rabin and RSA.pdf
└── Web security
├── FlowFox_ a web browser with flexible and precise information flow control.pdf
├── Scriptless attacks_ stealing the pie without touching the sill.pdf
└── You are what you include_ large-scale evaluation of remote javascript inclusions.pdf
22 directories, 82 files
标签:
CCS 2012-ACM Conference on Computer and Communications Security ...
小贴士
感谢您为本站写下的评论,您的评论对其它用户来说具有重要的参考价值,所以请认真填写。
- 类似“顶”、“沙发”之类没有营养的文字,对勤劳贡献的楼主来说是令人沮丧的反馈信息。
- 相信您也不想看到一排文字/表情墙,所以请不要反馈意义不大的重复字符,也请尽量不要纯表情的回复。
- 提问之前请再仔细看一遍楼主的说明,或许是您遗漏了。
- 请勿到处挖坑绊人、招贴广告。既占空间让人厌烦,又没人会搭理,于人于己都无利。
关于好例子网
本站旨在为广大IT学习爱好者提供一个非营利性互相学习交流分享平台。本站所有资源都可以被免费获取学习研究。本站资源来自网友分享,对搜索内容的合法性不具有预见性、识别性、控制性,仅供学习研究,请务必在下载后24小时内给予删除,不得用于其他任何用途,否则后果自负。基于互联网的特殊性,平台无法对用户传输的作品、信息、内容的权属或合法性、安全性、合规性、真实性、科学性、完整权、有效性等进行实质审查;无论平台是否已进行审查,用户均应自行承担因其传输的作品、信息、内容而可能或已经产生的侵权或权属纠纷等法律责任。本站所有资源不代表本站的观点或立场,基于网友分享,根据中国法律《信息网络传播权保护条例》第二十二与二十三条之规定,若资源存在侵权或相关问题请联系本站客服人员,点此联系我们。关于更多版权及免责申明参见 版权及免责申明
网友评论
我要评论