实例介绍
(我现在主要在CSDN上整理计算机安全、软件工程(可信软件)、系统及通信方面的论文及相关理论书籍,如果对这方面内容感兴趣,可以访问:http://qysh123.download.csdn.net/ 查看我上传的所有资料。内容比较多,需要大家人工手动查找。另外,资料顺序并不按照时间排列,只是想起来了就上传。请大家见谅。) 计算机及网络安全界的顶级会议,ACM Conference on Computer and Communications Security 2011年的会议论文集。欢迎大家下载、学习。2011年CCS共收录包括keynote address在内的17个session共计62篇论文。
【实例截图】
【核心代码】
4744300845214180192.rar
└── CCS 2011
├── Anonymous communications
│ ├── Cirripede _ circumvention infrastructure using router redirection with plausible deniability.pdf
│ ├── Forensic investigation of the OneSwarm anonymous filesharing system.pdf
│ ├── Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting.pdf
│ └── Trust-based anonymous communication _ adversary models and routing algorithms.pdf
├── Applied cryptography
│ ├── Ciphers that securely encipher their own keys.pdf
│ ├── How to break XML encryption.pdf
│ ├── Password-protected secret sharing.pdf
│ └── Practical delegation of computation using multiple servers.pdf
├── Authentication and access control
│ ├── An efficient user verification system via mouse movements.pdf
│ ├── Automatic error finding in access-control policies.pdf
│ ├── Policy auditing over incomplete logs _ theory, implementation and applications.pdf
│ └── Text-based CAPTCHA strengths and weaknesses.pdf
├── Cloud computing
│ ├── How to tell if your cloud files are vulnerable to drive crashes.pdf
│ ├── Proofs of ownership in remote storage systems.pdf
│ └── Sedic _ privacy-aware data intensive computing on hybrid clouds.pdf
├── Composability of cryptographic protocols
│ ├── A composable computational soundness notion.pdf
│ ├── Composability of bellare-rogaway key exchange protocols.pdf
│ └── Composition theorems without pre-established session identifiers.pdf
├── Formal methods and verification
│ ├── Extracting and verifying cryptographic models from C protocol code by symbolic execution.pdf
│ ├── Information-flow types for homomorphic encryptions.pdf
│ ├── Modular code-based cryptographic verification.pdf
│ └── Trace equivalence decision _ negative tests and non-determinism.pdf
├── Hardware, SCADA, and physical security
│ ├── On the requirements for successful GPS spoofing attacks.pdf
│ ├── On the vulnerability of FPGA bitstream encryption against power analysis attacks _ extracting keys from xilinx Virtex-II FPGAs.pdf
│ ├── PaperSpeckle _ microscopic fingerprinting of paper.pdf
│ └── Protecting consumer privacy from electric load monitoring.pdf
├── Keynote address
│ ├── Cryptographic primitives for building secure and privacy respecting protocols.pdf
│ └── Reflections on the evolution of internet threats _ the growing imperative for a cyber secure society.pdf
├── Making secure computation practical
│ ├── Automatically optimizing secure computation.pdf
│ ├── Countering GATTACA _ efficient and secure testing of fully-sequenced human genomes.pdf
│ ├── Practical PIR for electronic commerce.pdf
│ └── VMCrypt _ modular software architecture for scalable secure computation.pdf
├── Malware and intrusion detection
│ ├── BitShred _ feature hashing malware for scalable triage and semantic analysis.pdf
│ ├── Deobfuscation of virtualization-obfuscated software _ a semantics-based approach.pdf
│ ├── MIDeA _ a multi-parallel intrusion detection architecture.pdf
│ └── The power of procrastination _ detection and mitigation of execution-stalling malicious code.pdf
├── Privacy and mobile security
│ ├── Android permissions demystified.pdf
│ ├── Auctions in do-not-track compliant internet advertising.pdf
│ ├── Privacy and accountability for location-based aggregate statistics.pdf
│ └── These aren't the droids you're looking for _ retrofitting android to protect data from imperious applications.pdf
├── Securing web applications
│ ├── Context-sensitive auto-sanitization in web templating languages using type qualifiers.pdf
│ ├── Fortifying web-based applications automatically.pdf
│ ├── SCRIPTGARD _ automatic context-sensitive sanitization for large-scale legacy web applications.pdf
│ └── WAPTEC _ whitebox analysis of web applications for parameter tampering exploit construction.pdf
├── Side-channel attacks and defenses
│ ├── iSpy _ automatic reconstruction of typed input from compromising reflections.pdf
│ ├── Predictive mitigation of timing channels in interactive systems.pdf
│ ├── (sp)iPhone _ decoding vibrations from nearby keyboards using mobile phone accelerometers.pdf
│ └── Televisions, video privacy, and powerline electromagnetic interference.pdf
├── System security
│ ├── Combining control-flow integrity and static analysis for efficient and validated data sandboxing.pdf
│ ├── Unicorn _ two-factor attestation for data security.pdf
│ └── VIPER _ verifying the integrity of PERipherals' firmware.pdf
├── Virtual machines and hypervisors
│ ├── AmazonIA _ when elasticity snaps back.pdf
│ ├── Eliminating the hypervisor attack surface for a more secure cloud.pdf
│ ├── Process out-grafting _ an efficient out-of-VM approach for fine-grained process execution monitoring.pdf
│ └── SICE _ a hardware-level strongly isolated computing environment for x86 multi-core platforms.pdf
├── Web security
│ ├── App isolation _ get the security of multiple browsers with just one.pdf
│ ├── Automated black-box detection of side-channel vulnerabilities in web applications.pdf
│ ├── Crouching tiger - hidden payload _ security risks of scalable vectors graphics.pdf
│ └── Fear the EAR _ discovering and mitigating execution after redirect vulnerabilities.pdf
└── Wild woolly web
├── Cloak and dagger _ dynamics of web search cloaking.pdf
├── Fashion crimes _ trending-term exploitation on the web.pdf
└── SURF _ detecting and measuring search poisoning.pdf
18 directories, 62 files
标签:
CCS 2011-ACM Conference on Computer and Communications Security ...
小贴士
感谢您为本站写下的评论,您的评论对其它用户来说具有重要的参考价值,所以请认真填写。
- 类似“顶”、“沙发”之类没有营养的文字,对勤劳贡献的楼主来说是令人沮丧的反馈信息。
- 相信您也不想看到一排文字/表情墙,所以请不要反馈意义不大的重复字符,也请尽量不要纯表情的回复。
- 提问之前请再仔细看一遍楼主的说明,或许是您遗漏了。
- 请勿到处挖坑绊人、招贴广告。既占空间让人厌烦,又没人会搭理,于人于己都无利。
关于好例子网
本站旨在为广大IT学习爱好者提供一个非营利性互相学习交流分享平台。本站所有资源都可以被免费获取学习研究。本站资源来自网友分享,对搜索内容的合法性不具有预见性、识别性、控制性,仅供学习研究,请务必在下载后24小时内给予删除,不得用于其他任何用途,否则后果自负。基于互联网的特殊性,平台无法对用户传输的作品、信息、内容的权属或合法性、安全性、合规性、真实性、科学性、完整权、有效性等进行实质审查;无论平台是否已进行审查,用户均应自行承担因其传输的作品、信息、内容而可能或已经产生的侵权或权属纠纷等法律责任。本站所有资源不代表本站的观点或立场,基于网友分享,根据中国法律《信息网络传播权保护条例》第二十二与二十三条之规定,若资源存在侵权或相关问题请联系本站客服人员,点此联系我们。关于更多版权及免责申明参见 版权及免责申明
网友评论
我要评论