原告 发表于 2025-3-23 11:16:22

MISHIMA: Multilateration of Internet Hosts Hidden Using Malicious Fast-Flux Agents (Short Paper)promised machines that act as proxies to hide the location of the host, commonly referred to as the “mothership,” to/from which they are proxying traffic. Fast-flux botnets pose a serious problem to botnet take-down efforts. The reason is that, while it is typically easy to identify and consequently

Pituitary-Gland 发表于 2025-3-23 15:36:14

Code Pointer Masking: Hardening Applications against Code Injection Attacksanaries and protects against attacks that are not addressed by state-of-the-art countermeasures of similar performance. By enforcing the correct semantics of code pointers, we thwart attacks that modify code pointers to divert the application’s control flow. We have implemented a prototype of our so

祖先 发表于 2025-3-23 21:27:15

Operating System Interface Obfuscation and the Revealing of Hidden Operationss—rely on knowledge of standard system call interfaces to reason about process execution behavior. In this work, we show how a rootkit can obfuscate a commodity kernel’s system call interfaces to degrade the effectiveness of these tools. Our attack, called ., allows user-level malware to invoke priv

星星 发表于 2025-3-23 23:01:23

http://reply.papertrans.cn/27/2693/269229/269229_14.png

费解 发表于 2025-3-24 02:22:47

An Assessment of Overt Malicious Activity Manifest in Residential Networkse” of the user populations (anti-virus and OS software updates) and potential risky behavior (accessing blacklisted URLs). We find that hygiene has little correlation with observed behavior, but risky behavior—which is quite prevalent—more than doubles the likelihood that a system will manifest security issues.

精美食品 发表于 2025-3-24 09:21:31

Timing Attacks on PIN Input in VoIP Networks (Short Paper)aper shows that a malicious intermediary can recover the inter-keystroke time delay for each PIN input even if the standard encryption mechanism has been applied. The inter-keystroke delay can leak information of what has been typed: Our experiments show that the average search space of a brute force attack on PIN can be reduced by around 80%.

Visual-Acuity 发表于 2025-3-24 11:02:21

Biting the Hand That Serves You: A Closer Look at Client-Side Flash Proxies for Cross-Domain Requestad to potential security problems. We comprehensively explore these problems and conduct a survey of five existing proxy implementation. Furthermore, we propose techniques to avoid the identified security pitfalls and to overcome the untrustworthy interface between the two technologies.

ACE-inhibitor 发表于 2025-3-24 16:18:33

http://reply.papertrans.cn/27/2693/269229/269229_18.png

杀子女者 发表于 2025-3-24 21:28:46

0302-9743 1.The 11 full papers presented together with two short papers were carefully reviewed and selected from 41intialsubmissions. The papers are organized in topical sections on network security, attacks, Web security, and host security.978-3-642-22423-2978-3-642-22424-9Series ISSN 0302-9743 Series E-ISSN 1611-3349

ABIDE 发表于 2025-3-25 02:41:09

http://reply.papertrans.cn/27/2693/269229/269229_20.png
页: 1 [2] 3 4 5 6
查看完整版本: Titlebook: Detection of Intrusions and Malware, and Vulnerability Assessment; 8th International Co Thorsten Holz,Herbert Bos Conference proceedings 20