THROB 发表于 2025-3-25 05:31:33

http://reply.papertrans.cn/83/8280/827937/827937_21.png

Eviction 发表于 2025-3-25 08:43:11

Filtering for Malice Through the Data Ocean: Large-Scale PHA Install Detection at the Communication tially-harmful apps (PHA), complementing the security protection at app stores. However a CSP-level scan faces an enormous challenge: hundreds of millions of apps are installed everyday; retaining their download traffic to construct their packages entails a huge burden on the CSP side, forces them t

Mhc-Molecule 发表于 2025-3-25 11:56:33

http://reply.papertrans.cn/83/8280/827937/827937_23.png

率直 发表于 2025-3-25 18:09:10

http://reply.papertrans.cn/83/8280/827937/827937_24.png

松鸡 发表于 2025-3-25 23:19:52

http://reply.papertrans.cn/83/8280/827937/827937_25.png

Vasodilation 发表于 2025-3-26 02:34:27

CFI CaRE: Hardware-Supported Call and Return Enforcement for Commercial Microcontrollerstion attacks play a predominant role as they allow remote compromise of IoT devices. Control-flow integrity (CFI) is a promising and generic defense technique against these attacks. However, given the nature of IoT deployments, existing protection mechanisms for traditional computing environments (i

notice 发表于 2025-3-26 08:21:33

http://reply.papertrans.cn/83/8280/827937/827937_27.png

pacifist 发表于 2025-3-26 08:54:45

BEADS: Automated Attack Discovery in OpenFlow-Based SDN Systemsus switches that do not obey the OpenFlow protocol and malicious hosts that do not obey the ARP protocol. We generated and tested almost 19,000 scenarios that consist of sending malformed messages or not properly delivering them, and found 831 unique bugs across four well-known SDN controllers: Ryu,

表示问 发表于 2025-3-26 13:02:39

http://reply.papertrans.cn/83/8280/827937/827937_29.png

GREG 发表于 2025-3-26 19:34:38

http://reply.papertrans.cn/83/8280/827937/827937_30.png
页: 1 2 [3] 4 5 6
查看完整版本: Titlebook: Research in Attacks, Intrusions, and Defenses; 20th International S Marc Dacier,Michael Bailey,Manos Antonakakis Conference proceedings 201