找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Information Security Applications; 15th International W Kyung-Hyune Rhee,Jeong Hyun Yi Conference proceedings 2015 Springer International P

[复制链接]
楼主: Autopsy
发表于 2025-3-26 21:43:11 | 显示全部楼层
Detection of Heap-Spraying Attacks Using String Trace Grapha . by tracing all string objects and string operations in JavaScript. The graph is used for detecting abnormal behaviors of JavaScript. We detect heap-spraying attacks with low false positive rate and overheads.
发表于 2025-3-27 02:28:56 | 显示全部楼层
发表于 2025-3-27 08:48:11 | 显示全部楼层
New Integrated Long-Term Glimpse of RC4correlations between two consecutive output keystreams and a state location, called long-term Glimpse. In this paper, we show a new long-term Glimpse and integrate both the new and the previous long-term Glimpse into a whole.
发表于 2025-3-27 10:51:53 | 显示全部楼层
Conference proceedings 2015papers are organized in topical sections such as malware detection; mobile security; vulnerability analysis; applied cryptography; network security; cryptography; hardware security; and critical infrastructure security and policy.
发表于 2025-3-27 14:30:01 | 显示全部楼层
Before Unrooting your Android Phone, Patching up Permission System First!r wants to unroot his phone and get his phone under protection. The scheme can apply to any version of Android system. In order to facilitate the scheme’s deployment, we develop an app to automatically do the patching work. Moreover, the evaluation result shows that the scheme is small-footprint and only introduces 1.8 % overhead.
发表于 2025-3-27 17:48:53 | 显示全部楼层
Improved Modular Multiplication for Optimal Prime Fieldshow that the proposed OPF-CIOC method outperforms the previous best known results in ACNS’14 by a factor of 5 %. Furthermore, our method is implemented in a regular way which helps to reduce the leakage of side-channel information.
发表于 2025-3-27 23:43:32 | 显示全部楼层
Reconstructing and Visualizing Evidence of Artifact from Firefox SessionStorageportant..In this paper, we experimented to retrieve the artifacts left by WebStorage feature for the Web browser for personal computer from the file system. In addition, we implemented a tool that constructs and visualizes the evidence from the artifacts.
发表于 2025-3-28 05:44:00 | 显示全部楼层
发表于 2025-3-28 06:19:53 | 显示全部楼层
I’ve Got Your Number: on average), and a large portion of KakaoTalk users (around 73 %) uses their real names as display names. Finally, we suggest reasonable countermeasures to mitigate the discovered attacks, which have been confirmed and patched by the developers.
发表于 2025-3-28 12:30:32 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-5 17:07
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表