inundate
发表于 2025-3-26 23:40:21
http://reply.papertrans.cn/83/8280/827939/827939_31.png
Leisureliness
发表于 2025-3-27 03:53:03
http://reply.papertrans.cn/83/8280/827939/827939_32.png
表被动
发表于 2025-3-27 07:42:15
SILVER: Fine-Grained and Transparent Protection Domain Primitives in Commodity OS Kernelions in terms of security, granularity and flexibility, primarily due to the absence of secure resource management and communication methods. This paper presents SILVER, a framework that offers transparent protection domain primitives to achieve fine-grained access control and secure communication b
deadlock
发表于 2025-3-27 09:49:59
API Chaser: Anti-analysis Resistant Malware Analyzer in many malware countermeasures as their base. However, malware authors are now aware of the situation and they develop malware using several anti-analysis techniques to evade API monitoring. In this paper, we present our design and implementation of an API monitoring system, ., which is resistant
formula
发表于 2025-3-27 13:48:12
FIRMA: Malware Clustering and Network Signature Generation with Mixed Network Behaviorsnto families and generate behavioral signatures for their detection. Among these, network traffic is a powerful behavioral signature and network signatures are widely used by network administrators. In this paper we present FIRMA, a tool that given a large pool of network traffic obtained by executi
Affiliation
发表于 2025-3-27 17:57:55
http://reply.papertrans.cn/83/8280/827939/827939_36.png
歌剧等
发表于 2025-3-28 01:54:39
Detecting Traditional Packers, Decisivelyse more realistic assumptions about machine and attacker resources. While seminal results such as remain true for Turing machines, we show under more realistic assumptions, important tasks are decidable instead of undecidable. Specifically, we show that detecting traditional malware unpacking
Peak-Bone-Mass
发表于 2025-3-28 02:32:01
Side-Channel Attacks on the Yubikey 2 One-Time Password Generator the credentials, e.g., by guessing passwords using a dictionary, by eavesdropping on network traffic, or by installing malware on the system of the target user. To overcome this problem, numerous solutions incorporating a second factor in the authentication process have been proposed. A particularl
CURB
发表于 2025-3-28 09:10:36
http://reply.papertrans.cn/83/8280/827939/827939_39.png
大喘气
发表于 2025-3-28 13:14:57
Behavior Decomposition: Aspect-Level Browser Extension Clustering and Its Security Implications or safety scrutiny, which keeps users from differentiating benign extensions from malicious ones. In this paper, we propose an aspect-level behavior clustering approach to enhancing the safety management of extensions. We decompose an extension’s runtime behavior into several pieces, denoted as AEB