craven 发表于 2025-3-28 15:13:21
http://reply.papertrans.cn/47/4659/465887/465887_41.pngCLASH 发表于 2025-3-28 22:34:55
Secure and Private Outsourcing of Shape-Based Feature Extractionncrypted form, such that its own employees can query the encrypted data using weak devices (both computationally and storage-wise). Or a weak client wants to outsource an expensive computational task without revealing to the servers either the inputs or the computed outputs. The framework requires tCOWER 发表于 2025-3-28 23:58:53
Time-Stealer: A Stealthy Threat for Virtualization Scheduler and Its Countermeasuresle customer virtual machines (VMs) onto the same physical server with hardware virtualization technology. Xen is widely used in virtualization which charges VMs by wall clock time rather than resources consumed. Under this model, manipulation of the scheduler vulnerability may allow theft-of-service钻孔 发表于 2025-3-29 03:47:38
http://reply.papertrans.cn/47/4659/465887/465887_44.png返老还童 发表于 2025-3-29 07:53:17
A Covert Channel Using Event Channel State on Xen Hypervisor work has been done to resist covert channels, new covert channels still emerge in various manners. In this paper, we introduce event channel mechanism in detail. Then we develop a covert channel called CCECS(Covert Channel using Event Channel State) and implement it on Xen hypervisor. Finally we qu豪华 发表于 2025-3-29 12:47:50
Type-Based Analysis of Protected Storage in the TPMcryptographic keys and other sensitive values in its shielded memory and act as . (RTS). The TPM interacts with applications via a predefined set of commands (an API). In this paper, we give an abstraction model for the TPM 2.0 specification concentrating on Protected Storage part. With identificatiAmbiguous 发表于 2025-3-29 18:10:42
http://reply.papertrans.cn/47/4659/465887/465887_47.png消耗 发表于 2025-3-29 22:22:25
http://reply.papertrans.cn/47/4659/465887/465887_48.pngKeratin 发表于 2025-3-30 00:01:15
Efficient eCK-Secure Authenticated Key Exchange Protocols in the Standard Modelleakage of various kinds of secret information like the long-term private key and session-specific secret state. In this paper, we study the open problem on constructing eCK secure AKE protocol without random oracles and NAXOS like trick. A generic construction GC-KKN satisfying those requirements i极小 发表于 2025-3-30 05:30:53
XLRF: A Cross-Layer Intrusion Recovery Framework for Damage Assessment and Recovery Plan Generationness continuity. Existing intrusion recovery approaches mostly focus on a single abstraction layer. OS level recovery cannot fully meet the correctness criteria defined by business process semantics, while business workflow level recovery usually results in . recovery plans. In this paper, we propos