esthetician 发表于 2025-3-26 21:15:14

Leaky Controller: Cross-VM Memory Controller Covert Channel on Multi-core Systemsrently, conflicts in memory resource occur, resulting in observable timing variations during execution. Malicious tenants can intentionally manipulate the hardware platform to devise a covert channel, enabling them to steal the data of co-residing tenants. This paper presents two new microarchitectu

CHARM 发表于 2025-3-27 02:10:43

Evaluation of Statistical Tests for Detecting Storage-Based Covert Channelsion. However, detecting the leakage of sensitive information in networked systems is still a challenging problem, especially when adversaries use covert channels to exfiltrate sensitive information to unauthorized parties. Presently, approaches for detecting timing-based covert channels have been st

ambivalence 发表于 2025-3-27 05:51:22

IE-Cache: Counteracting Eviction-Based Cache Side-Channel Attacks Through Indirect Evictionets by observing cache lines evicted by the co-running applications. A precondition for such attacks is that the attacker needs a set of cache lines mapped to memory addresses belonging to victim, called .. Attacker learns eviction set by loading the cache lines at random and then it observes their

植物学 发表于 2025-3-27 12:23:51

Refined Detection of SSH Brute-Force Attackers Using Machine Learningwork traffic analysis to identify attackers. Recent papers describe how to detect BF attacks using pure NetFlow data. However, our evaluation shows significant false-positive (FP) results of the current solution. To overcome the issue of high FP rate, we propose a machine learning (ML) approach to d

Champion 发表于 2025-3-27 14:15:59

http://reply.papertrans.cn/47/4602/460173/460173_35.png

Volatile-Oils 发表于 2025-3-27 20:19:40

http://reply.papertrans.cn/47/4602/460173/460173_36.png

我不明白 发表于 2025-3-28 01:06:29

Assisting Users to Create Stronger Passwords Using ContextBased MicroTrainingwords. Rather than a technical enforcing measure, CBMT is a framework that provides information security training to users when they are in a situation where the training is directly relevant. The study is carried out in two steps. First, a survey is used to measure how well users understand passwor

Gudgeon 发表于 2025-3-28 05:49:06

Facilitating Privacy Attitudes and Behaviors with Affective Visual Design privacy policies, we are rarely aware of processing practices. Drawing on multidisciplinary research, we postulate that privacy policies presenting information in a way that triggers affective responses, together with individual characteristics, may influence privacy attitudes. Through an online qu

Bricklayer 发表于 2025-3-28 09:35:39

http://reply.papertrans.cn/47/4602/460173/460173_39.png

evasive 发表于 2025-3-28 12:24:55

JavaScript Malware Detection Using Locality Sensitive HashingvaScript malware through static analysis. An experiment is conducted using a dataset containing 1.5M evenly distributed benign and malicious samples provided by the anti-malware company Cyren. Four different locality sensitive hashing algorithms are tested and evaluated: Nilsimsa, ssdeep, TLSH, and
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: ICT Systems Security and Privacy Protection; 35th IFIP TC 11 Inte Marko Hölbl,Kai Rannenberg,Tatjana Welzer Conference proceedings 2020 IFI