找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Computer Security – ESORICS 2017; 22nd European Sympos Simon N. Foley,Dieter Gollmann,Einar Snekkenes Conference proceedings 2017 Springer

[复制链接]
楼主: 淹没
发表于 2025-3-25 03:52:12 | 显示全部楼层
,A Traceability Analysis of Monero’s Blockchain,In light of our findings, we discuss mitigations to strengthen Monero against these attacks. We shared our findings with the Monero development team and the general community. This has resulted into several discussions and proposals for fixes.
发表于 2025-3-25 07:50:33 | 显示全部楼层
Practical Keystroke Timing Attacks in Sandboxed JavaScript,ck runs in a background tab, possibly in a minimized browser window, displaying a malicious online advertisement. We show that we can observe the exact inter-keystroke timings for a user’s PIN or password, infer URLs entered by the user, and distinguish different users time-sharing a computer. Our a
发表于 2025-3-25 15:04:29 | 显示全部楼层
发表于 2025-3-25 16:10:45 | 显示全部楼层
发表于 2025-3-25 23:43:58 | 显示全部楼层
发表于 2025-3-26 03:30:46 | 显示全部楼层
LeaPS: Learning-Based Proactive Security Auditing for Clouds,ty auditing of cloud operations. We integrate LeaPS to OpenStack, a popular cloud platform, and perform extensive experiments in both simulated and real cloud environments that show a practical response time (e.g., 6 ms to audit a cloud of 100,000 VMs) and a significant improvement (e.g., about 50%
发表于 2025-3-26 06:30:43 | 显示全部楼层
Identifying Multiple Authors in a Binary Program, level, our approach for identifying external template library code, and a new approach to capture correlations between the authors of basic blocks in a binary. Our experiments show strong evidence that programming styles can be recovered at the basic block level and it is practical to identify mult
发表于 2025-3-26 09:26:29 | 显示全部楼层
Secure IDS Offloading with Nested Virtualization and Deep VM Introspection,btain the internal state of target VMs inside the VM for running a virtualized system. We have implemented V-Met in Xen and confirmed that the performance of offloaded legacy IDSes was comparable to that in traditional IDS offloading.
发表于 2025-3-26 14:10:02 | 显示全部楼层
Privacy Implications of Room Climate Data,ing the set of actions allows to achieve even higher prediction rates. For example, we discriminate standing and walking occupants with 95.1% accuracy. Our results provide evidence that even the leakage of such ‘inconspicuous’ data as temperature and relative humidity can seriously violate privacy.
发表于 2025-3-26 20:23:52 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-5 05:59
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表