inundate 发表于 2025-3-26 23:40:21

http://reply.papertrans.cn/83/8280/827939/827939_31.png

Leisureliness 发表于 2025-3-27 03:53:03

http://reply.papertrans.cn/83/8280/827939/827939_32.png

表被动 发表于 2025-3-27 07:42:15

SILVER: Fine-Grained and Transparent Protection Domain Primitives in Commodity OS Kernelions in terms of security, granularity and flexibility, primarily due to the absence of secure resource management and communication methods. This paper presents SILVER, a framework that offers transparent protection domain primitives to achieve fine-grained access control and secure communication b

deadlock 发表于 2025-3-27 09:49:59

API Chaser: Anti-analysis Resistant Malware Analyzer in many malware countermeasures as their base. However, malware authors are now aware of the situation and they develop malware using several anti-analysis techniques to evade API monitoring. In this paper, we present our design and implementation of an API monitoring system, ., which is resistant

formula 发表于 2025-3-27 13:48:12

FIRMA: Malware Clustering and Network Signature Generation with Mixed Network Behaviorsnto families and generate behavioral signatures for their detection. Among these, network traffic is a powerful behavioral signature and network signatures are widely used by network administrators. In this paper we present FIRMA, a tool that given a large pool of network traffic obtained by executi

Affiliation 发表于 2025-3-27 17:57:55

http://reply.papertrans.cn/83/8280/827939/827939_36.png

歌剧等 发表于 2025-3-28 01:54:39

Detecting Traditional Packers, Decisivelyse more realistic assumptions about machine and attacker resources. While seminal results such as remain true for Turing machines, we show under more realistic assumptions, important tasks are decidable instead of undecidable. Specifically, we show that detecting traditional malware unpacking

Peak-Bone-Mass 发表于 2025-3-28 02:32:01

Side-Channel Attacks on the Yubikey 2 One-Time Password Generator the credentials, e.g., by guessing passwords using a dictionary, by eavesdropping on network traffic, or by installing malware on the system of the target user. To overcome this problem, numerous solutions incorporating a second factor in the authentication process have been proposed. A particularl

CURB 发表于 2025-3-28 09:10:36

http://reply.papertrans.cn/83/8280/827939/827939_39.png

大喘气 发表于 2025-3-28 13:14:57

Behavior Decomposition: Aspect-Level Browser Extension Clustering and Its Security Implications or safety scrutiny, which keeps users from differentiating benign extensions from malicious ones. In this paper, we propose an aspect-level behavior clustering approach to enhancing the safety management of extensions. We decompose an extension’s runtime behavior into several pieces, denoted as AEB
页: 1 2 3 [4] 5 6 7
查看完整版本: Titlebook: Research in Attacks, Intrusions, and Defenses; 16th International S Salvatore J. Stolfo,Angelos Stavrou,Charles V. Wri Conference proceedin