FAWN
发表于 2025-3-26 21:12:34
http://reply.papertrans.cn/25/2407/240605/240605_31.png
adduction
发表于 2025-3-27 04:02:22
Cross-Site Search Attacks: Unauthorized Queries over Private Datatract the information, using cleverly-designed cross-site queries..In this work, we present a systematic approach to the study of cross-site search attacks. We begin with a comprehensive taxonomy, clarifying the relationships between different types of cross-site search attacks, as well as relations
不开心
发表于 2025-3-27 05:46:12
Stronger Targeted Poisoning Attacks Against Malware Detectionhey inject a small amount of poisoning points into a training set of the machine learning model, aiming to degrade the overall accuracy of the model. . is a variant of data poisoning attacks that injects malicious data into the model to cause a misclassification of the . input data while keeping alm
Supplement
发表于 2025-3-27 11:19:09
STDNeut: Neutralizing Sensor, Telephony System and Device State Information on Emulated Android Enviironments. Hence, a defense mechanism needs to be incorporated in emulation based analysis platforms to mitigate the emulation-detection strategies opted by malware. In this paper, first we design an emulation-detection library that has configurable capabilities ranging from basic to advanced detect
千篇一律
发表于 2025-3-27 15:12:07
http://reply.papertrans.cn/25/2407/240605/240605_35.png
patriot
发表于 2025-3-27 17:55:51
http://reply.papertrans.cn/25/2407/240605/240605_36.png
远地点
发表于 2025-3-27 23:09:55
http://reply.papertrans.cn/25/2407/240605/240605_37.png
松果
发表于 2025-3-28 03:43:45
Trenchcoat: Human-Computable Hashing Algorithms for Password Generationdom” passwords, so they reuse or create similar passwords using a combination of predictable words, numbers, and symbols [.]. Previous password-generation or management protocols have imposed so large a cognitive load that users have abandoned them in favor of insecure yet simpler methods (., writin
口诀法
发表于 2025-3-28 09:06:50
Provably Secure Scalable Distributed Authentication for Cloudsabase. In case of server compromise the secrets are vulnerable to theft. A possible solution to this problem to apply distributed systems. We propose a mutual authentication protocol with key agreement, where identity verification is carried out by multiple servers applying secret sharing technology
Asymptomatic
发表于 2025-3-28 11:00:30
http://reply.papertrans.cn/25/2407/240605/240605_40.png