daredevil 发表于 2025-3-26 23:01:42

http://reply.papertrans.cn/24/2339/233873/233873_31.png

Project 发表于 2025-3-27 02:46:50

http://reply.papertrans.cn/24/2339/233873/233873_32.png

Dysplasia 发表于 2025-3-27 07:59:39

Everlasting ROBOT: The Marvin Attackmmon. We have successfully attacked multiple implementations using only timing of decryption operation and shown that many others are vulnerable. To perform the attack we used more statistically rigorous techniques like the sign test, Wilcoxon signed-rank test, and bootstrapping of median of pairwis

Terrace 发表于 2025-3-27 11:58:08

http://reply.papertrans.cn/24/2339/233873/233873_34.png

委托 发表于 2025-3-27 13:41:15

When is Slower Block Propagation More Profitable for Large Miners?their revenues. Their indifference inspires a theory that slower block propagation is beneficial for some miners. In this study, we analyze and confirm this counterintuitive theory. Specifically, by modeling inadvertent slower blocks, we show that a mining coalition that controls more than a third o

粗鲁性质 发表于 2025-3-27 18:47:27

Bijack: Breaking Bitcoin Network with TCP Vulnerabilitiesrs have been uncovered such as BGP hijacking in the network layer and eclipse attack in the application layer, one significant attack vector that resides in the transport layer is largely overlooked. In this paper, we investigate the TCP vulnerabilities of the Bitcoin system and their consequences.

Cabg318 发表于 2025-3-28 01:41:52

Syntax-Aware Mutation for Testing the Solidity Compiler addresses a challenge of existing fuzzers when dealing with structured inputs: the generation of inputs that get past the parser checks of the system under test. To do so, . introduces a novel . that breaks into three strategies, each of them making different kind of changes in the inputs. Contrary

骄傲 发表于 2025-3-28 03:51:18

http://reply.papertrans.cn/24/2339/233873/233873_38.png

judiciousness 发表于 2025-3-28 07:30:58

https://doi.org/10.1007/978-3-319-52861-8 in practice using off-the-shelf implementations for the genuine communicating parties, and a custom BR/EDR machine-in-the-middle framework for the attacker. Our attacks have been reported by Bluetooth SIG as CVEs.

红肿 发表于 2025-3-28 13:44:30

http://reply.papertrans.cn/24/2339/233873/233873_40.png
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Computer Security – ESORICS 2023; 28th European Sympos Gene Tsudik,Mauro Conti,Georgios Smaragdakis Conference proceedings 2024 The Editor(