并排上下 发表于 2025-3-25 03:45:38

http://reply.papertrans.cn/24/2339/233872/233872_21.png

intrude 发表于 2025-3-25 10:28:40

http://reply.papertrans.cn/24/2339/233872/233872_22.png

连锁 发表于 2025-3-25 11:41:24

http://reply.papertrans.cn/24/2339/233872/233872_23.png

下级 发表于 2025-3-25 18:26:36

http://reply.papertrans.cn/24/2339/233872/233872_24.png

Facet-Joints 发表于 2025-3-25 21:23:49

Efficient Pruning for Machine Learning Under Homomorphic Encryptioners confidentiality of the model and the data, but at the cost of large latency and memory requirements. Pruning neural network (NN) parameters improves latency and memory in plaintext ML but has little impact if directly applied to HE-based PPML..We introduce a framework called . that comprises new

情爱 发表于 2025-3-26 03:54:59

http://reply.papertrans.cn/24/2339/233872/233872_26.png

foreign 发表于 2025-3-26 04:31:59

On the (In)Security of Manufacturer-Provided Remote Attestation Frameworks in Androidroduced Manufacturer-provided Android Remote Attestation (MARA) frameworks. The MARA framework helps an app conduct a series of integrity checks, signs the check results, and sends them to remote servers for a remote attestation. Nonetheless, we observe that real-world MARA frameworks often adopt tw

Alveoli 发表于 2025-3-26 09:22:17

http://reply.papertrans.cn/24/2339/233872/233872_28.png

FEMUR 发表于 2025-3-26 15:17:36

: Split Input-to-State Mapping for Effective Firmware Fuzzingmated testing methods rehost firmware in emulators and attempt to facilitate inputs from a diversity of methods (interrupt driven, status polling) and a plethora of devices (such as modems and GPS units). Despite recent progress to tackle peripheral input generation challenges in rehosting, a firmwa

偏狂症 发表于 2025-3-26 17:28:07

IPS: Software-Based Intrusion Prevention for Bare-Metal Embedded Systemsk many security primitives, including the well-known Address Space Layout Randomization (ASLR) and Data Execution Prevention (DEP), and their integrity can be compromised using a single vulnerability. Proposed defenses have not yet been deployed due to their requirements for firmware source code ava
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Computer Security – ESORICS 2023; 28th European Sympos Gene Tsudik,Mauro Conti,Georgios Smaragdakis Conference proceedings 2024 The Editor(