粘连 发表于 2025-3-28 17:13:06

A Reflective Covert Channel Attack Anchored on Trusted Web Services an average data transfer rate of 361 bits per second. Finally, we present the design, implementation and evaluation of a proof-of-concept defense that uses information-theoretic entropy of the DNS queries to detect this novel attack.

小步舞 发表于 2025-3-28 22:19:08

http://reply.papertrans.cn/103/10217/1021622/1021622_42.png

habile 发表于 2025-3-29 00:39:54

http://reply.papertrans.cn/103/10217/1021622/1021622_43.png

羊齿 发表于 2025-3-29 03:58:10

http://reply.papertrans.cn/103/10217/1021622/1021622_44.png

有杂色 发表于 2025-3-29 08:21:02

http://reply.papertrans.cn/103/10217/1021622/1021622_45.png

Amorous 发表于 2025-3-29 13:06:50

http://reply.papertrans.cn/103/10217/1021622/1021622_46.png

悦耳 发表于 2025-3-29 16:40:24

http://reply.papertrans.cn/103/10217/1021622/1021622_47.png

不知疲倦 发表于 2025-3-29 22:34:42

http://reply.papertrans.cn/103/10217/1021622/1021622_48.png

Largess 发表于 2025-3-30 03:45:19

TProv: Towards a Trusted Provenance-Aware Service Based on Trusted Computing the trustworthiness of provenance information, thus TProv decreases the overhead of the huge size of provenance information and the cost of operating trusted hardware, e.g. Trusted Platform Module. The experimental results reflect TProv’s effectiveness and efficiency.

separate 发表于 2025-3-30 08:05:18

http://reply.papertrans.cn/103/10217/1021622/1021622_50.png
页: 1 2 3 4 [5] 6 7 8
查看完整版本: Titlebook: Web Services – ICWS 2018; 25th International C Hai Jin,Qingyang Wang,Liang-Jie Zhang Conference proceedings 2018 Springer International Pub