FAWN 发表于 2025-3-26 21:12:34

http://reply.papertrans.cn/25/2407/240605/240605_31.png

adduction 发表于 2025-3-27 04:02:22

Cross-Site Search Attacks: Unauthorized Queries over Private Datatract the information, using cleverly-designed cross-site queries..In this work, we present a systematic approach to the study of cross-site search attacks. We begin with a comprehensive taxonomy, clarifying the relationships between different types of cross-site search attacks, as well as relations

不开心 发表于 2025-3-27 05:46:12

Stronger Targeted Poisoning Attacks Against Malware Detectionhey inject a small amount of poisoning points into a training set of the machine learning model, aiming to degrade the overall accuracy of the model. . is a variant of data poisoning attacks that injects malicious data into the model to cause a misclassification of the . input data while keeping alm

Supplement 发表于 2025-3-27 11:19:09

STDNeut: Neutralizing Sensor, Telephony System and Device State Information on Emulated Android Enviironments. Hence, a defense mechanism needs to be incorporated in emulation based analysis platforms to mitigate the emulation-detection strategies opted by malware. In this paper, first we design an emulation-detection library that has configurable capabilities ranging from basic to advanced detect

千篇一律 发表于 2025-3-27 15:12:07

http://reply.papertrans.cn/25/2407/240605/240605_35.png

patriot 发表于 2025-3-27 17:55:51

http://reply.papertrans.cn/25/2407/240605/240605_36.png

远地点 发表于 2025-3-27 23:09:55

http://reply.papertrans.cn/25/2407/240605/240605_37.png

松果 发表于 2025-3-28 03:43:45

Trenchcoat: Human-Computable Hashing Algorithms for Password Generationdom” passwords, so they reuse or create similar passwords using a combination of predictable words, numbers, and symbols [.]. Previous password-generation or management protocols have imposed so large a cognitive load that users have abandoned them in favor of insecure yet simpler methods (., writin

口诀法 发表于 2025-3-28 09:06:50

Provably Secure Scalable Distributed Authentication for Cloudsabase. In case of server compromise the secrets are vulnerable to theft. A possible solution to this problem to apply distributed systems. We propose a mutual authentication protocol with key agreement, where identity verification is carried out by multiple servers applying secret sharing technology

Asymptomatic 发表于 2025-3-28 11:00:30

http://reply.papertrans.cn/25/2407/240605/240605_40.png
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Cryptology and Network Security; 19th International C Stephan Krenn,Haya Shulman,Serge Vaudenay Conference proceedings 2020 Springer Nature