直言不讳 发表于 2025-3-28 15:17:26

Compiler-based Attack Origin Tracking with Dynamic Taint Analysisracking engine. Our results show that control-flow hijacking attempts can be reliably detected. Compared to previous approaches based on Dynamic Binary Instrumentation, our compiler-based static instrumentation introduces less run-time overhead: on average 3.52x for SPEC CPU2017 benchmarks and 1.56x for the real-world web server NginX.

狂怒 发表于 2025-3-28 22:15:25

http://reply.papertrans.cn/47/4654/465391/465391_42.png

ear-canal 发表于 2025-3-29 02:40:36

http://reply.papertrans.cn/47/4654/465391/465391_43.png

Basal-Ganglia 发表于 2025-3-29 06:05:12

Designated-Verifier Linkable Ring Signaturesuity and provide the capability to the designated verifier to add ‘noise’ using simulated signatures that are publicly verifiable, thus increasing overall privacy. More formally, we model unforgeability, anonymity, linkability and non-transferability for DVLRS and provide a secure construction in th

Negotiate 发表于 2025-3-29 10:37:04

http://reply.papertrans.cn/47/4654/465391/465391_45.png

颠簸地移动 发表于 2025-3-29 13:18:54

http://reply.papertrans.cn/47/4654/465391/465391_46.png

Tortuous 发表于 2025-3-29 18:48:30

http://reply.papertrans.cn/47/4654/465391/465391_47.png

sacrum 发表于 2025-3-29 21:52:09

http://reply.papertrans.cn/47/4654/465391/465391_48.png

吸引人的花招 发表于 2025-3-30 03:53:06

Improved Lattice Enumeration Algorithms by Primal and Dual Reordering Methodsf lattice algorithms to solve SVP: search algorithms and reduction algorithms. The original enumeration algorithm (ENUM) is one of the former algorithms which run in exponential time due to the exhaustive search. Further, ENUM is used as a subroutine for the BKZ algorithm, which is one of the most p

Patrimony 发表于 2025-3-30 05:06:00

Compiler-based Attack Origin Tracking with Dynamic Taint Analysisackers. However, most of them only abort the protected application after attack detection, producing no further information for attack analysis. Solely restarting the application leaves it open for repeated attack attempts. We propose ., a compiler-based CFI approach that utilizes dynamic taint anal
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Information Security and Cryptology – ICISC 2021; 24th International C Jong Hwan Park,Seung-Hyun Seo Conference proceedings 2022 The Editor