土坯 发表于 2025-3-26 21:43:11

Detection of Heap-Spraying Attacks Using String Trace Grapha . by tracing all string objects and string operations in JavaScript. The graph is used for detecting abnormal behaviors of JavaScript. We detect heap-spraying attacks with low false positive rate and overheads.

Neutropenia 发表于 2025-3-27 02:28:56

http://reply.papertrans.cn/47/4653/465280/465280_32.png

冷淡周边 发表于 2025-3-27 08:48:11

New Integrated Long-Term Glimpse of RC4correlations between two consecutive output keystreams and a state location, called long-term Glimpse. In this paper, we show a new long-term Glimpse and integrate both the new and the previous long-term Glimpse into a whole.

SOBER 发表于 2025-3-27 10:51:53

Conference proceedings 2015papers are organized in topical sections such as malware detection; mobile security; vulnerability analysis; applied cryptography; network security; cryptography; hardware security; and critical infrastructure security and policy.

cogent 发表于 2025-3-27 14:30:01

Before Unrooting your Android Phone, Patching up Permission System First!r wants to unroot his phone and get his phone under protection. The scheme can apply to any version of Android system. In order to facilitate the scheme’s deployment, we develop an app to automatically do the patching work. Moreover, the evaluation result shows that the scheme is small-footprint and only introduces 1.8 % overhead.

Mindfulness 发表于 2025-3-27 17:48:53

Improved Modular Multiplication for Optimal Prime Fieldshow that the proposed OPF-CIOC method outperforms the previous best known results in ACNS’14 by a factor of 5 %. Furthermore, our method is implemented in a regular way which helps to reduce the leakage of side-channel information.

注意力集中 发表于 2025-3-27 23:43:32

Reconstructing and Visualizing Evidence of Artifact from Firefox SessionStorageportant..In this paper, we experimented to retrieve the artifacts left by WebStorage feature for the Web browser for personal computer from the file system. In addition, we implemented a tool that constructs and visualizes the evidence from the artifacts.

健壮 发表于 2025-3-28 05:44:00

http://reply.papertrans.cn/47/4653/465280/465280_38.png

predict 发表于 2025-3-28 06:19:53

I’ve Got Your Number: on average), and a large portion of KakaoTalk users (around 73 %) uses their real names as display names. Finally, we suggest reasonable countermeasures to mitigate the discovered attacks, which have been confirmed and patched by the developers.

OTHER 发表于 2025-3-28 12:30:32

http://reply.papertrans.cn/47/4653/465280/465280_40.png
页: 1 2 3 [4] 5 6
查看完整版本: Titlebook: Information Security Applications; 15th International W Kyung-Hyune Rhee,Jeong Hyun Yi Conference proceedings 2015 Springer International P