跳动 发表于 2025-3-23 10:29:31

http://reply.papertrans.cn/47/4602/460173/460173_11.png

inhumane 发表于 2025-3-23 15:12:19

Michael Eckel,Andreas Fuchs,Jürgen Repp,Markus Springer

枪支 发表于 2025-3-23 19:26:59

Leaky Controller: Cross-VM Memory Controller Covert Channel on Multi-core Systemsy. Both attacks are implemented on cross-core configurations. Furthermore, the cross-VM covert channel is successfully tested across three different Intel microarchitectures. Finally, a comparison against state-of-the-art covert channel attacks is provided, along with a discussion on potential mitig

的是兄弟 发表于 2025-3-24 02:14:06

http://reply.papertrans.cn/47/4602/460173/460173_14.png

custody 发表于 2025-3-24 05:31:16

http://reply.papertrans.cn/47/4602/460173/460173_15.png

原始 发表于 2025-3-24 08:29:46

Assisting Users to Create Stronger Passwords Using ContextBased MicroTrainingg module do understand the password creation guidelines to a higher degree than other users. Further, the experiment shows that users presented with password guidelines in the form of a CBMT learning module do create passwords that are longer and more secure than other users. The assessment of passw

刚毅 发表于 2025-3-24 13:06:41

http://reply.papertrans.cn/47/4602/460173/460173_17.png

hair-bulb 发表于 2025-3-24 17:15:05

RouAlign: Cross-Version Function Alignment and Routine Recovery with Graphlet Edge Embeddinghich can automatically align the trunk routine of assembly codes. We evaluated RouAlign on 65 groups of real-world programs, with over two million functions. RouAlign outperforms state-of-the-art binary comparing solutions by over 35% with a high precision of 92% on average in pairwise function reco

Meander 发表于 2025-3-24 21:14:40

Code Between the Lines: Semantic Analysis of Android Applications arbitrary applications, our system can predict precise, human-readable keywords and short phrases that indicate the main use-cases apps are designed for..We evaluate our solution on 67,040 real-world apps and find that with a precision between 69% and 84% we can identify keywords that also occur in

管理员 发表于 2025-3-24 23:13:58

http://reply.papertrans.cn/47/4602/460173/460173_20.png
页: 1 [2] 3 4 5 6
查看完整版本: Titlebook: ICT Systems Security and Privacy Protection; 35th IFIP TC 11 Inte Marko Hölbl,Kai Rannenberg,Tatjana Welzer Conference proceedings 2020 IFI