unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
"I chose to fight, be brave, and to deal with it": Threat Experiences and Security Practices of Pakistani Content Creators
Authors: Lea Gröber, CISPA Helmholtz Center for Information Security and Saarland University; Waleed...
2024-5-3 03:57:42 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
creators
pakistan
helmholtz
cispa
lahore
Transferability of White-box Perturbations: Query-Efficient Adversarial Attacks against Commercial DNN Services
Authors: Meng Shen and Changyue Li, School of Cyberspace Science and Technology, Beijing Institute o...
2024-5-3 03:57:42 | 阅读: 4 |
收藏
|
USENIX - www.usenix.org
dsa
adversarial
beijing
cyberspace
SoK (or SoLK?): On the Quantitative Study of Sociodemographic Factors and Computer Security Behaviors
Authors: Miranda Wei, University of Washington; Jaron Mink, University of Illinois at Urbana-Champai...
2024-5-3 03:57:42 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
security
behaviors
guidelines
papers
Towards Generic Database Management System Fuzzing
Authors: Yupeng Yang and Yongheng Chen, Georgia Institute of Technology; Rui Zhong, Palo Alto Networ...
2024-5-3 03:57:42 | 阅读: 7 |
收藏
|
USENIX - www.usenix.org
relational
dbmss
buzzbee
limitations
georgia
Speculative Denial-of-Service Attacks In Ethereum
Authors: Aviv Yaish, The Hebrew University; Kaihua Qin and Liyi Zhou, Imperial College London, UC Be...
2024-5-3 03:57:42 | 阅读: 5 |
收藏
|
USENIX - www.usenix.org
mempurge
blockchain
turing
london
On the Difficulty of Defending Contrastive Learning against Backdoor Attacks
Authors: Changjiang Li, Stony Brook University; Ren Pang, Bochuan Cao, Zhaohan Xi, and Jinghui Chen,...
2024-5-3 03:57:42 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
contrastive
supervised
defenses
promising
'I feel physically safe but not politically safe": Understanding the Digital Threats and Safety Practices of OnlyFans Creators
Authors: Ananta Soneji, Arizona State University; Vaughn Hamilton, Max Planck Institute for Software...
2024-5-3 03:57:42 | 阅读: 5 |
收藏
|
USENIX - www.usenix.org
creators
onlyfans
arizona
vaughn
prominence
PINE: Efficient Verification of a Euclidean Norm Bound of a Secret-Shared Vector
Authors: Guy N. Rothblum, Apple; Eran Omri, Ariel University and Ariel Cyber Innovation Center; Juny...
2024-5-3 03:57:42 | 阅读: 5 |
收藏
|
USENIX - www.usenix.org
norm
overhead
dimensional
bounded
Query Recovery from Easy to Hard: Jigsaw Attack against SSE
Authors: Hao Nie and Wei Wang, Huazhong University of Science and Technology; Peng Xu, Huazhong Univ...
2024-5-3 03:57:42 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
huazhong
usenix
accuracy
begins
SHiFT: Semi-hosted Fuzz Testing for Embedded Applications
Authors: Alejandro Mera and Changming Liu, Northeastern University; Ruimin Sun, Florida Internationa...
2024-5-3 03:57:42 | 阅读: 6 |
收藏
|
USENIX - www.usenix.org
mcu
firmware
positives
emulation
security
CAMP: Compositional Amplification Attacks against DNS
Authors: Huayi Duan, Marco Bearzi, Jodok Vieli, David Basin, Adrian Perrig, and Si Liu, ETH Zürich;...
2024-5-3 03:57:42 | 阅读: 36 |
收藏
|
USENIX - www.usenix.org
camp
vieli
Rise of Inspectron: Automated Black-box Auditing of Cross-platform Electron Apps
Authors: Mir Masood Ali, Mohammad Ghasemisharif, Chris Kanich, and Jason Polakis, University of Illi...
2024-5-3 03:57:42 | 阅读: 6 |
收藏
|
USENIX - www.usenix.org
security
inspectron
developers
porting
masood
SoK: Security of Programmable Logic Controllers
Authors: Efrén López-Morales, Texas A&M University-Corpus Christi; Ulysse Planta, CISPA Helmholtz Ce...
2024-5-3 03:57:42 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
plcs
security
cispa
corpus
DVa: Extracting Victims and Abuse Vectors from Android Accessibility Malware
Authors: Haichuan Xu, Mingxuan Yao, and Runze Zhang, Georgia Institute of Technology; Mohamed Mousta...
2024-5-3 03:57:42 | 阅读: 8 |
收藏
|
USENIX - www.usenix.org
dva
a11y
victim
georgia
guided
"I'm not convinced that they don't collect more than is necessary": User-Controlled Data Minimization Design in Search Engines
Authors: Tanusree Sharma, University of Illinois at Urbana Champaign; Lin Kyi, Max Planck Institute...
2024-5-3 03:57:42 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
necessity
centered
urbana
principle
VoltSchemer: Use Voltage Noise to Manipulate Your Wireless Charger
Authors: Zihao Zhan and Yirui Yang, University of Florida; Haoqi Shan, University of Florida, CertiK...
2024-5-3 03:57:42 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
charging
chargers
voltschemer
threats
voltage
Towards Privacy-Preserving Social-Media SDKs on Android
Authors: Haoran Lu, Yichen Liu, Xiaojing Liao, and Luyi Xing, Indiana University BloomingtonAbstract...
2024-5-3 03:57:42 | 阅读: 5 |
收藏
|
USENIX - www.usenix.org
sdks
xldh
widespread
threats
preserving
SoK: State of the Krawlers – Evaluating the Effectiveness of Crawling Algorithms for Web Security Measurements
Authors: Aleksei Stafeev and Giancarlo Pellegrino, CISPA Helmholtz Center for Information SecurityAb...
2024-5-3 03:57:42 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
crawling
security
evaluations
begins
literature
CalcuLatency: Leveraging Cross-Layer Network Latency Measurements to Detect Proxy-Enabled Abuse
Authors: Reethika Ramesh, University of Michigan; Philipp Winter, Independent; Sam Korman and Roya E...
2024-5-3 03:57:42 | 阅读: 1 |
收藏
|
USENIX - www.usenix.org
proxy
network
measurement
proxies
AI Psychiatry: Forensic Investigation of Deep Learning Networks in Memory Images
Authors: David Oygenblik, Georgia Institute of Technology; Carter Yagemann, Ohio State University; J...
2024-5-3 03:57:42 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
memory
aip
georgia
refined
Previous
2
3
4
5
6
7
8
9
Next