FAWN 发表于 2025-3-26 21:12:34
http://reply.papertrans.cn/25/2407/240605/240605_31.pngadduction 发表于 2025-3-27 04:02:22
Cross-Site Search Attacks: Unauthorized Queries over Private Datatract the information, using cleverly-designed cross-site queries..In this work, we present a systematic approach to the study of cross-site search attacks. We begin with a comprehensive taxonomy, clarifying the relationships between different types of cross-site search attacks, as well as relations不开心 发表于 2025-3-27 05:46:12
Stronger Targeted Poisoning Attacks Against Malware Detectionhey inject a small amount of poisoning points into a training set of the machine learning model, aiming to degrade the overall accuracy of the model. . is a variant of data poisoning attacks that injects malicious data into the model to cause a misclassification of the . input data while keeping almSupplement 发表于 2025-3-27 11:19:09
STDNeut: Neutralizing Sensor, Telephony System and Device State Information on Emulated Android Enviironments. Hence, a defense mechanism needs to be incorporated in emulation based analysis platforms to mitigate the emulation-detection strategies opted by malware. In this paper, first we design an emulation-detection library that has configurable capabilities ranging from basic to advanced detect千篇一律 发表于 2025-3-27 15:12:07
http://reply.papertrans.cn/25/2407/240605/240605_35.pngpatriot 发表于 2025-3-27 17:55:51
http://reply.papertrans.cn/25/2407/240605/240605_36.png远地点 发表于 2025-3-27 23:09:55
http://reply.papertrans.cn/25/2407/240605/240605_37.png松果 发表于 2025-3-28 03:43:45
Trenchcoat: Human-Computable Hashing Algorithms for Password Generationdom” passwords, so they reuse or create similar passwords using a combination of predictable words, numbers, and symbols [.]. Previous password-generation or management protocols have imposed so large a cognitive load that users have abandoned them in favor of insecure yet simpler methods (., writin口诀法 发表于 2025-3-28 09:06:50
Provably Secure Scalable Distributed Authentication for Cloudsabase. In case of server compromise the secrets are vulnerable to theft. A possible solution to this problem to apply distributed systems. We propose a mutual authentication protocol with key agreement, where identity verification is carried out by multiple servers applying secret sharing technologyAsymptomatic 发表于 2025-3-28 11:00:30
http://reply.papertrans.cn/25/2407/240605/240605_40.png