ISH 发表于 2025-3-21 18:40:14

书目名称Computer Security – ESORICS 2023影响因子(影响力)<br>        http://impactfactor.cn/if/?ISSN=BK0233873<br><br>        <br><br>书目名称Computer Security – ESORICS 2023影响因子(影响力)学科排名<br>        http://impactfactor.cn/ifr/?ISSN=BK0233873<br><br>        <br><br>书目名称Computer Security – ESORICS 2023网络公开度<br>        http://impactfactor.cn/at/?ISSN=BK0233873<br><br>        <br><br>书目名称Computer Security – ESORICS 2023网络公开度学科排名<br>        http://impactfactor.cn/atr/?ISSN=BK0233873<br><br>        <br><br>书目名称Computer Security – ESORICS 2023被引频次<br>        http://impactfactor.cn/tc/?ISSN=BK0233873<br><br>        <br><br>书目名称Computer Security – ESORICS 2023被引频次学科排名<br>        http://impactfactor.cn/tcr/?ISSN=BK0233873<br><br>        <br><br>书目名称Computer Security – ESORICS 2023年度引用<br>        http://impactfactor.cn/ii/?ISSN=BK0233873<br><br>        <br><br>书目名称Computer Security – ESORICS 2023年度引用学科排名<br>        http://impactfactor.cn/iir/?ISSN=BK0233873<br><br>        <br><br>书目名称Computer Security – ESORICS 2023读者反馈<br>        http://impactfactor.cn/5y/?ISSN=BK0233873<br><br>        <br><br>书目名称Computer Security – ESORICS 2023读者反馈学科排名<br>        http://impactfactor.cn/5yr/?ISSN=BK0233873<br><br>        <br><br>

平静生活 发表于 2025-3-21 22:39:51

http://reply.papertrans.cn/24/2339/233873/233873_2.png

数量 发表于 2025-3-22 02:53:07

http://reply.papertrans.cn/24/2339/233873/233873_3.png

星星 发表于 2025-3-22 07:36:32

You Reset I Attack! A Master Password Guessing Attack Against Honey Password Vaults decoy vault by decrypting and comparing the old and new versions of a password vault. To prove this, we propose a new master password guessing attack (MPGA) to break all the existing honey password vault schemes. Experimental results show that MPGA can easily distinguish real and decoy vaults with

Cosmopolitan 发表于 2025-3-22 10:50:16

Attacking Logo-Based Phishing Website Detectors with Adversarial Perturbationss of state-of-the-art phishing detectors; and (ii) user studies to gauge whether our adversarial logos can deceive human eyes. The results show that our proposed attack is capable of crafting perturbed logos subtle enough to evade various DL models—achieving an evasion rate of up to 95%. Moreover, u

卷发 发表于 2025-3-22 15:53:08

Hiding Your Signals: A Security Analysis of PPG-Based Biometric Authenticationte is 60% in inter-pulse-interval-based security protocols. Further, we propose an active defence strategy to hide the physiological signals of the face to resist the attack. It reduces the success rate of rPPG spoofing attacks in user authentication to 5%. The bit hit rate was reduced to 50%, which

卷发 发表于 2025-3-22 20:21:35

http://reply.papertrans.cn/24/2339/233873/233873_7.png

非实体 发表于 2025-3-23 00:40:59

JWTKey: Automatic Cryptographic Vulnerability Detection in JWT Applicationsrecise detection and overhead. Running on 358 open source JWT applications from GitHub, . discovered that 65.92% of the JWT applications have at least one cryptographic vulnerability. The comparative experiments with CryptoGuard demonstrate the effectiveness of our design. We disclose the findings t

Decrepit 发表于 2025-3-23 03:07:39

http://reply.papertrans.cn/24/2339/233873/233873_9.png

恶名声 发表于 2025-3-23 05:36:56

Syntax-Aware Mutation for Testing the Solidity Compilerle releases, and compare . with (1) ., a grammar-aware fuzzer, (2) ., a text-mutation fuzzer and (3) two grammar-blind fuzzers with advanced test input generation schedules: . and . .. . identified 19 bugs in total (7 of which were previously unknown to Solidity developers), while the other fuzzers
页: [1] 2 3 4 5 6
查看完整版本: Titlebook: Computer Security – ESORICS 2023; 28th European Sympos Gene Tsudik,Mauro Conti,Georgios Smaragdakis Conference proceedings 2024 The Editor(