unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Detecting Stuffing of a User’s Credentials at Her Own Accounts
Authors: Ke Coby Wang and Michael K. Reiter, University of North Carolina at Chapel HillAbstract: We...
2020-4-16 08:15:41 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
stuffing
novel
passwords
coordinate
estimate
SpecFuzz: Bringing Spectre-type vulnerabilities to the surface
Authors: Oleksii Oleksenko and Bohdan Trach, TU Dresden; Mark Silberstein, Technion; Christof Fetzer...
2020-4-16 08:15:41 | 阅读: 4 |
收藏
|
USENIX - www.usenix.org
speculative
spectre
speculation
exposure
MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures
Authors: Yang Xiao, Institute of Information Engineering, Chin...
2020-4-16 08:15:41 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
beijing
academy
sciences
recurring
The Impact of Ad-Blockers on Product Search and Purchase Behavior: A Lab Experiment
Authors: Alisa Frik, International Computer Science Institute / UC Berkeley; Amelia Haviland and Ale...
2020-4-16 08:15:41 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
blockers
economic
consumers
welfare
security
Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale
Authors: Adam Oest and Penghui Zhang, Arizona State University; Brad Wardman, Eric Nunes, and Jakub...
2020-4-16 08:15:41 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
phishing
arizona
winner
adam
gaps
Cardpliance: PCI DSS Compliance of Android Applications
Authors: Samin Yaseer Mahmud and Akhil Acharya, North Carolina State University; Benjamin Andow, IBM...
2020-4-16 08:15:41 | 阅读: 6 |
收藏
|
USENIX - www.usenix.org
dss
security
358
carolina
north
Composition Kills: A Case Study of Email Sender Authentication
Authors: Jianjun Chen, International Computer Science Institute; Vern Paxson, University of Californ...
2020-4-16 08:15:41 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
security
identify
software
induce
High Accuracy and High Fidelity Extraction of Neural Networks
Authors: Matthew Jagielski, Northeastern University, Google Brain; Nicholas Carlini, David Berthelot...
2020-4-16 08:15:41 | 阅读: 4 |
收藏
|
USENIX - www.usenix.org
victim
extracting
accuracy
fidelity
classifier
'I have too much respect for my elders': Understanding South African Mobile Users' Perceptions of Privacy and Current Behaviors on Facebook and WhatsA...
Authors: Jake Reichel, Fleming Peck, Mikako Inaba, Bisrat Moges, and Brahmnoor Singh Chawla, Princet...
2020-4-16 08:15:41 | 阅读: 4 |
收藏
|
USENIX - www.usenix.org
constrained
security
heavily
resourced
begins
APEX: A Verified Architecture for Proofs of Execution on Remote Devices under Full Software Compromise
Authors: Ivan De Oliveira Nunes, UC Irvine; Karim Eldefrawy, S...
2020-4-16 08:15:41 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
software
irvine
actuation
cps
Data Recovery from “Scrubbed” NAND Flash Storage: Need for Analog Sanitization
Authors: Md Mehedi Hasan and Biswajit Ray, The University of Alabama in HuntsvilleAbstract: Digital...
2020-1-16 02:3:13 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
memory
scrubbing
analog
partial
Security Analysis of Unified Payments Interface and Payment Apps in India
Authors: Renuka Kumar, University of Michigan; Sreesh Kishore; Hao Lu and Atul Prakash, University o...
2020-1-16 02:3:13 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
upi
analysis
security
india
victim
FuzzGuard: Filtering out Unreachable Inputs in Directed Grey-box Fuzzing through Deep Learning
Authors: Peiyuan Zong, Tao Lv, Dawei Wang, Zizhuang Deng, Ruig...
2020-1-16 02:3:13 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
dgf
fuzzguard
buggy
unreachable
constraints
Pixel: Multi-signatures for Consensus
Authors: Manu Drijvers, DFINITY; Sergey Gorbunov, Algorand and University of Waterloo; Gregory Neven...
2020-1-16 02:3:13 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
blockchains
bandwidth
committee
posterior
algorand
ShadowMove: A Stealthy Lateral Movement Strategy
Authors: Amirreza Niakanlahiji, University of Illinois Springf...
2020-1-16 02:3:13 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
shadowmove
lateral
network
requiring
windows
Secure parallel computation on national scale volumes of data
Authors: Sahar Mazloom and Phi Hung Le, George Mason University; Samuel Ranellucci, Unbound Tech; S....
2020-1-16 02:3:13 | 阅读: 4 |
收藏
|
USENIX - www.usenix.org
computation
reduces
histograms
george
securely
Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It
Authors: Daniel Votipka, Kelsey R. Fulton, James Parker, Matthew Hou, Michelle L. Mazurek, and Micha...
2020-1-16 02:3:13 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
security
submissions
james
Montage: A Neural Network Language Model-Guided JavaScript Engine Fuzzer
Authors: Suyoung Lee, HyungSeok Han, Sang Kil Cha, and Sooel Son, KAISTAbstract: JavaScript (JS) eng...
2020-1-16 02:3:13 | 阅读: 5 |
收藏
|
USENIX - www.usenix.org
montage
nnlms
studies
prevalent
Big Numbers - Big Troubles: Systematically Analyzing Nonce Leakage in (EC)DSA Implementations
Authors: Samuel Weiser, David Schrammel, and Lukas Bodner, Graz University of Technology; Raphael Sp...
2020-1-16 02:3:13 | 阅读: 4 |
收藏
|
USENIX - www.usenix.org
leakage
dsa
analysis
systematic
moreover
(Mostly) Exitless VM Protection from Untrusted Hypervisor through Disaggregated Nested Virtualization
Authors: Zeyu Mi, Dingji Li, Haibo Chen, Binyu Zang, and Haibing Guan, Shanghai Key Laboratory for S...
2020-1-16 02:3:13 | 阅读: 7 |
收藏
|
USENIX - www.usenix.org
hypervisor
cloudvisor
exits
hardware
privileged
Previous
11
12
13
14
15
16
17
18
Next