unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Stealthy Tracking of Autonomous Vehicles with Cache Side Channels
Authors: Mulong Luo, Andrew C. Myers, and G. Edward Suh, Cornell UniversityAbstract: Autonomous vehi...
2020-1-16 02:3:13 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
vehicle
software
autonomous
amcl
An Off-Chip Attack on Hardware Enclaves via the Memory Bus
Authors: Dayeol Lee, UC Berkeley; Dongha Jung, SK Hynix; Ian T. Fang, UC Berkeley; Chia-Che Tsai, Te...
2020-1-16 02:3:13 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
memory
membuster
victim
attacker
accesses
Void: A fast and light voice liveness detection system
Authors: Muhammad Ejaz Ahmed, Data61, CSIRO; Il-Youp Kwak, Chung-Ang University; Jun Ho Huh and Iljo...
2020-1-16 02:3:13 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
achieves
replay
voices
kim
recording
SmartVerif: Push the Limit of Automation Capability of Verifying Security Protocols by Dynamic Strategies
Authors: Yan Xiong, Cheng Su, Wenchao Huang, Fuyou Miao, Wansen Wang, and Hengyi Ouyang, University...
2020-1-16 02:3:13 | 阅读: 4 |
收藏
|
USENIX - www.usenix.org
smartverif
security
approaches
insight
probability
An Observational Investigation of Reverse Engineers’ Processes
Authors: Daniel Votipka and Seth Rabin, University of Maryland; Kristopher Micinski, Syracuse Univer...
2020-1-16 02:3:13 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
reverse
phases
analysis
maryland
varying
Cached and Confused: Web Cache Deception in the Wild
Authors: Seyed Ali Mirheidari, University of Trento; Sajjad Arshad, Northeastern University; Kaan On...
2020-1-16 02:3:13 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
wcd
caching
caches
trento
HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments
Authors: Ghada Dessouky, Tommaso Frassetto, and Ahmad-Reza Sadeghi, Technische Universität Darmstadt...
2019-10-31 01:55:26 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
hybcache
workload
isolated
resilient
selectively
GREYONE: Data Flow Sensitive Fuzzing
Authors: Shuitao Gan, State Key Laboratory of Mathematical Engineering and Advanced Computing; Chao...
2019-10-31 01:55:26 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
taint
greyone
analysis
fuzzers
cyberspace
PHMon: A Programmable Hardware Monitor and Its Security Use Cases
Authors: Leila Delshadtehrani, Sadullah Canakci, Boyou Zhou, Schuyler Eldridge, Ajay Joshi, and Manu...
2019-10-31 01:55:26 | 阅读: 4 |
收藏
|
USENIX - www.usenix.org
hardware
phmon
security
enforce
accelerated
TPM-FAIL: TPM meets Timing and Lattice Attacks
Authors: Daniel Moghimi and Berk Sunar, Worcester Polytechnic Institute, Worcester, MA, USA; Thomas...
2019-10-31 01:55:26 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
tpm
hardware
timing
analysis
Interpretable Deep Learning under Fire
Authors: Xinyang Zhang, Pennsylvania State University; Ningfei Wang, University of California Irvine...
2019-10-31 01:55:26 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
idlses
security
adv2
BesFS: A POSIX Filesystem for Enclaves with a Mechanized Safety Proof
Authors: Shweta Shinde, University of California, Berkeley; Shengyi Wang and Pinghai Yuan, National...
2019-10-31 01:55:26 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
besfs
enclave
sgx
tcb
singapore
P2IM: Scalable and Hardware-independent Firmware Testing via Automatic Peripheral Interface Modeling
Authors: Bo Feng, Alejandro Mera, and Long Lu, Northeastern UniversityAbstract: Dynamic testing or f...
2019-10-31 01:55:26 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
firmware
hardware
p2im
lu
peripheral
Automatic Hot Patch Generation for Android Kernels
Authors: Zhengzi Xu, Nanyang Technological University; Yulong Zhang, Longri Zheng, Liangzhao Xia, an...
2019-10-31 01:55:26 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
hot
kernels
vulmet
nanyang
cves
Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures
Authors: Mengjia Yan, Christopher W. Fletcher, and Josep Torrellas, University of Illinois at Urbana...
2019-10-31 01:55:26 | 阅读: 4 |
收藏
|
USENIX - www.usenix.org
dnn
gemm
accuracy
vgg
Civet: An Efficient Java Partitioning Framework for Hardware Enclaves
Authors: Chia-Che Tsai, Texas A&M University; Jeongseok Son, UC Berkeley; Bhushan Jain, The Universi...
2019-10-31 01:55:26 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
civet
taint
enclave
enclaves
"I am uncomfortable sharing what I can't see": Privacy Concerns of the Visually Impaired with Camera Based Assistive Applications
Authors: Taslima Akter, Indiana University Bloomington; Bryan Dosono, Syracuse University; Tousif Ah...
2019-10-31 01:55:26 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
assistants
bryan
bloomington
concerned
Delphi: A Cryptographic Inference Service for Neural Networks
Authors: Pratyush Mishra, Ryan Lehmkuhl, Akshayaram Srinivasan, Wenting Zheng, and Raluca Ada Popa,...
2019-10-31 01:55:26 | 阅读: 4 |
收藏
|
USENIX - www.usenix.org
network
delphi
proprietary
zheng
mediausenix
Previous
12
13
14
15
16
17
18
19
Next