持久 发表于 2025-3-28 15:49:07
Compartmentation Policies for Android Apps: A Combinatorial Optimization Approachoth within and across app boundaries. This gives rise to various security and privacy risks, including not only intentional collusion attacks via permission re-delegation but also inadvertent disclosure of information and service misuse through confused deputy attacks. In this paper, we revisit the高脚酒杯 发表于 2025-3-28 19:44:43
Android Botnets: What URLs are Telling Uss. Due to its popularity, Android mobile Operating System became the most targeted platform. In spite of rising numbers, there is a significant gap in understanding the nature of mobile botnets and their communication characteristics. In this paper, we address this gap and provide a deep analysis of蔑视 发表于 2025-3-28 23:14:10
http://reply.papertrans.cn/67/6629/662884/662884_43.pngTRUST 发表于 2025-3-29 03:14:28
DisARM: Mitigating Buffer Overflow Attacks on Embedded Devicesas social security numbers and health records. This makes these devices a lucrative target for attacks exploiting vulnerabilities to inject malicious code or reuse existing code to alter the execution of their software. Existing defense techniques have major drawbacks such as requiring source code o可转变 发表于 2025-3-29 07:14:02
RouteMap: A Route and Map Based Graphical Password Scheme for Better Multiple Password Memorythe literature such as PassPoints, DAS, Cued Click Points, GeoPass and so on. These schemes reported promising performance in their studies in the aspects of security and usability, however, we notice that these GP schemes may suffer from the issue of multiple password memory. In our first user stud责怪 发表于 2025-3-29 12:23:22
Indicators of Malicious SSL Connectionssh between benign and malicious connections as the content cannot be inspected. Therefore, we propose and evaluate a set of indicators for malicious SSL connections, which is based on the unencrypted part of SSL (i.e., the SSL handshake protocol). We provide strong evidence for the strength of our i使人烦燥 发表于 2025-3-29 17:43:00
Multi-constrained Orientation Field Modeling and Its Application for Fingerprint Indexingks. Orientation field is able to be reconstructed by either non-parameterized or parameterized methods. In this paper, we propose a new parameterized approach for orientation field modeling. The proposed algorithm minimizes a composite model including three constraints corresponding to a least squarBROTH 发表于 2025-3-29 23:01:32
A Framework for Policy Similarity Evaluation and Migration Based on Change Detectionand scenarios, enterprises no longer function in isolation. Being able to measure policy similarity and integrate heterogeneous policies appropriately is an essential step towards secure interoperation. Existing approaches for measuring policy similarity are based on computing similarity between difPIZZA 发表于 2025-3-30 00:39:36
MT-ABAC: A Multi-Tenant Attribute-Based Access Control Model with Tenant Trustuiring resources to be shared across tenant boundaries. Currently, cloud IaaS providers focus on multi-tenant isolation, and offer limited or no cross-tenant access capabilities in their IaaS APIs. In this paper, we present a novel attribute-based access control (ABAC) model to enable collaborationgentle 发表于 2025-3-30 06:31:21
Dandelion - Revealing Malicious Groups of Interest in Large Mobile Networkso approximately . groups of interest a day. To demonstrate Dandelion’s value, we show how our system has provided the critical information necessary to human analysts in detecting and mitigating previously unknown mobile attacks.