斗志 发表于 2025-3-28 18:15:51

http://reply.papertrans.cn/83/8280/827936/827936_41.png

提炼 发表于 2025-3-28 19:31:38

http://reply.papertrans.cn/83/8280/827936/827936_42.png

Complement 发表于 2025-3-29 02:22:57

0302-9743 n Gothenburg, Sweden, in September 2014. The 22 full papers were carefully reviewed and selected from 113 submissions, and are presented together with 10 poster abstracts. The papers address all current topics in computer security, including network security, authentication, malware, intrusion detec

泥瓦匠 发表于 2025-3-29 04:24:44

http://reply.papertrans.cn/83/8280/827936/827936_44.png

ARM 发表于 2025-3-29 09:30:30

http://reply.papertrans.cn/83/8280/827936/827936_45.png

协奏曲 发表于 2025-3-29 14:14:26

http://reply.papertrans.cn/83/8280/827936/827936_46.png

altruism 发表于 2025-3-29 19:26:36

PillarBox: Combating Next-Generation Malware with Fast Forward-Secure Logging and potentially even alerting rules on a compromised host. Using data from a large enterprise and on-host performance measurements, we show experimentally that PillarBox has minimal overhead and is practical for real-world systems.

Diluge 发表于 2025-3-29 21:43:19

Wait a Minute! A fast, Cross-VM Attack on AES. Therefore long term co-location, as required by other fine grain attacks in the literature, are not needed. The results of this study show that there is a great security risk to . implementation running on VMware cloud services when the deduplication is not disabled.

长处 发表于 2025-3-30 03:11:58

Adrian Tang,Simha Sethumadhavan,Salvatore J. Stolfo

含沙射影 发表于 2025-3-30 06:00:34

Jacopo Corbetta,Luca Invernizzi,Christopher Kruegel,Giovanni Vigna
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Research in Attacks, Intrusions and Defenses; 17th International S Angelos Stavrou,Herbert Bos,Georgios Portokalidis Conference proceedings