unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
ppSAT: Towards Two-Party Private SAT Solving
Authors: Ning Luo, Samuel Judson, Timos Antonopoulos, and Ruzica Piskac, Yale University; Xiao Wang,...
2022-6-10 02:57:10 | 阅读: 4 |
收藏
|
USENIX - www.usenix.org
ppsat
solving
solver
2pc
sat
An Audit of Facebook's Political Ad Policy Enforcement
Authors: Victor Le Pochat, imec-DistriNet, KU Leuven; Laura Edelson, New York University; Tom Van Go...
2022-6-10 02:56:17 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
political
advertisers
facebook
distrinet
Helping hands: Measuring the impact of a large threat intelligence sharing community
Authors: Xander Bouwman, Delft University of Technology; Victor Le Pochat, imec-DistriNet, KU Leuven...
2022-6-10 02:56:17 | 阅读: 4 |
收藏
|
USENIX - www.usenix.org
ctc
imec
ku
blocklist
leuven
Back-Propagating System Dependency Impact for Attack Investigation
Authors: Pengcheng Fang, Case Western Reserve University; Peng Gao, Virginia Tech; Changlin Liu and...
2022-6-10 02:56:17 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
edges
causality
analysis
poi
western
SecSMT: Securing SMT Processors against Contention-Based Covert Channels
Authors: Mohammadkazem Taram, University of California San Diego; Xida Ren and Ashish Venkat, Univer...
2022-6-10 02:56:17 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
security
contention
presents
leakage
california
Increasing Adversarial Uncertainty to Scale Private Similarity Testing
Authors: Yiqing Hua and Armin Namavari, Cornell Tech and Cornell University; Kaishuo Cheng, Cornell...
2022-6-10 02:56:17 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
sbb
cornell
similarity
client
abusive
"How Do You Not Lose Friends?": Synthesizing a Design Space of Social Controls for Securing Shared Digital Resources Via Participatory Design Jams
Authors: Eyitemi Moju-Igbene, Hanan Abdi, Alan Lu, and Sauvik Das, Georgia Institute of TechnologyAb...
2022-6-10 02:56:17 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
behaviors
security
sauvik
designing
proceedings
Your Microphone Array Retains Your Identity: A Robust Voice Liveness Detection System for Smart Speakers
Authors: Yan Meng and Jiachun Li, Shanghai Jiao Tong University; Matthew Pillari, Arjun Deopujari, L...
2022-6-10 02:56:17 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
fingerprint
liveness
arrayid
shanghai
OVRseen: Auditing Network Traffic and Privacy Policies in Oculus VR
Authors: Rahmadi Trimananda, Hieu Le, Hao Cui, and Janice Tran...
2022-6-10 02:56:17 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
ovr
flows
network
california
oculus
Privacy and Integrity Preserving Computations with CRISP
Authors: Sylvain Chatel, Apostolos Pyrgelis, Juan Ramón Troncoso-Pastoriza, and Jean-Pierre Hubaux,...
2021-9-14 15:40:1 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
verifying
guarantees
generality
juan
papers
Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks
Authors: Kaiwen Shen, Chuhan Wang, and Minglei Guo, Tsinghua University; Xiaofeng Zheng, Tsinghua Un...
2021-9-14 15:40:1 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
tsinghua
qi
xin
security
xiaofeng
Demon in the Variant: Statistical Analysis of DNNs for Robust Backdoor Contamination Detection
Authors: Di Tang, Chinese University of Hong Kong; XiaoFeng Wang and Haixu Tang, Indiana University;...
2021-9-14 15:40:1 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
tact
variation
dominance
Automated Discovery of Denial-of-Service Vulnerabilities in Connected Vehicle Protocols
Authors: Shengtuo Hu, University of Michigan; Qi Alfred Chen, UC Irvine; Jiachen Sun, Yiheng Feng, Z...
2021-9-14 15:40:1 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
cv
network
cvanalyzer
vehicles
An Analysis of Speculative Type Confusion Vulnerabilities in the Wild
Authors: Ofek Kirzner and Adam Morrison, Tel Aviv UniversityDistinguished Paper Award Winner and F...
2021-9-14 15:40:1 | 阅读: 8 |
收藏
|
USENIX - www.usenix.org
spectre
confusion
memory
speculative
victim
PACStack: an Authenticated Call Stack
Authors: Hans Liljestrand, University of Waterloo; Thomas Nyman and Lachlan J. Gunn, Aalto Universit...
2021-9-14 15:40:1 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
hardware
stacks
shadow
aalto
security
Can Systems Explain Permissions Better? Understanding Users' Misperceptions under Smartphone Runtime Permission Model
Authors: Bingyu Shen, University of California, San Diego; Lili Wei, The Hong Kong University of Sci...
2021-9-14 15:40:1 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
diego
shen
california
hong
surveys
EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts
Authors: Michael Rodler, University of Duisburg-Essen; Wenting Li and Ghassan O. Karame, NEC Laborat...
2021-9-14 15:40:1 | 阅读: 5 |
收藏
|
USENIX - www.usenix.org
evmpatch
duisburg
blockchain
upgradable
equivalence
The Unpatchable Silicon: A Full Break of the Bitstream Encryption of Xilinx 7-Series FPGAs
Authors: Maik Ender and Amir Moradi, Horst Goertz Institute for IT Security, Ruhr University Bochum,...
2020-4-16 08:15:41 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
bitstream
security
encryption
ruhr
From Needs to Actions to Secure Apps? The Effect of Requirements and Developer Practices on App Security
Authors: Charles Weir, Lancaster University; Ben Hermann, Paderborn University; Sascha Fahl, Leibniz...
2020-4-16 08:15:41 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
security
assurance
developers
defect
tend
Datalog Disassembly
Authors: Antonio Flores-Montoya and Eric Schulte, GrammaTech Inc.Distinguished Paper Award WinnerAb...
2020-4-16 08:15:41 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
disassembly
ddisasm
analyses
experiments
datalog
Previous
10
11
12
13
14
15
16
17
Next