找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: ICT Systems Security and Privacy Protection; 35th IFIP TC 11 Inte Marko Hölbl,Kai Rannenberg,Tatjana Welzer Conference proceedings 2020 IFI

[复制链接]
楼主: Opulent
发表于 2025-3-26 21:15:14 | 显示全部楼层
Leaky Controller: Cross-VM Memory Controller Covert Channel on Multi-core Systemsrently, conflicts in memory resource occur, resulting in observable timing variations during execution. Malicious tenants can intentionally manipulate the hardware platform to devise a covert channel, enabling them to steal the data of co-residing tenants. This paper presents two new microarchitectu
发表于 2025-3-27 02:10:43 | 显示全部楼层
Evaluation of Statistical Tests for Detecting Storage-Based Covert Channelsion. However, detecting the leakage of sensitive information in networked systems is still a challenging problem, especially when adversaries use covert channels to exfiltrate sensitive information to unauthorized parties. Presently, approaches for detecting timing-based covert channels have been st
发表于 2025-3-27 05:51:22 | 显示全部楼层
IE-Cache: Counteracting Eviction-Based Cache Side-Channel Attacks Through Indirect Evictionets by observing cache lines evicted by the co-running applications. A precondition for such attacks is that the attacker needs a set of cache lines mapped to memory addresses belonging to victim, called .. Attacker learns eviction set by loading the cache lines at random and then it observes their
发表于 2025-3-27 12:23:51 | 显示全部楼层
Refined Detection of SSH Brute-Force Attackers Using Machine Learningwork traffic analysis to identify attackers. Recent papers describe how to detect BF attacks using pure NetFlow data. However, our evaluation shows significant false-positive (FP) results of the current solution. To overcome the issue of high FP rate, we propose a machine learning (ML) approach to d
发表于 2025-3-27 14:15:59 | 显示全部楼层
发表于 2025-3-27 20:19:40 | 显示全部楼层
发表于 2025-3-28 01:06:29 | 显示全部楼层
Assisting Users to Create Stronger Passwords Using ContextBased MicroTrainingwords. Rather than a technical enforcing measure, CBMT is a framework that provides information security training to users when they are in a situation where the training is directly relevant. The study is carried out in two steps. First, a survey is used to measure how well users understand passwor
发表于 2025-3-28 05:49:06 | 显示全部楼层
Facilitating Privacy Attitudes and Behaviors with Affective Visual Design privacy policies, we are rarely aware of processing practices. Drawing on multidisciplinary research, we postulate that privacy policies presenting information in a way that triggers affective responses, together with individual characteristics, may influence privacy attitudes. Through an online qu
发表于 2025-3-28 09:35:39 | 显示全部楼层
发表于 2025-3-28 12:24:55 | 显示全部楼层
JavaScript Malware Detection Using Locality Sensitive HashingvaScript malware through static analysis. An experiment is conducted using a dataset containing 1.5M evenly distributed benign and malicious samples provided by the anti-malware company Cyren. Four different locality sensitive hashing algorithms are tested and evaluated: Nilsimsa, ssdeep, TLSH, and
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-23 05:36
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表