unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
That Doesn't Go There: Attacks on Shared State in Multi-User Augmented Reality Applications
Authors: Carter Slocum, Yicheng Zhang, Erfan Shayegani, Pedram Zaree, and Nael Abu-Ghazaleh, Univers...
2024-5-3 03:57:42 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
security
erfan
usenix
committed
Page-Oriented Programming: Subverting Control-Flow Integrity of Commodity Operating System Kernels with Non-Writable Code Pages
Authors: Seunghun Han, The Affiliated Institute of ETRI, Chungnam National University; Seong-Joong K...
2024-5-3 03:57:42 | 阅读: 4 |
收藏
|
USENIX - www.usenix.org
remapping
kim
affiliated
chungnam
etri
Dissecting Privacy Perspectives of Websites Around the World: "Aceptar Todo, Alle Akzeptieren, Accept All..."
Authors: Aysun Ogut, Berke Turanlioglu, Doruk Can Metiner, Albert Levi, Cemal Yilmaz, and Orcun Ceti...
2023-11-15 08:1:31 | 阅读: 7 |
收藏
|
USENIX - www.usenix.org
informed
florida
regulations
laws
notices
ResolverFuzz: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response Fuzzing
Authors: Qifan Zhang and Xuesong Bai, University of California, Irvine; Xiang Li, Tsinghua Universit...
2023-11-15 08:1:31 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
resolver
tsinghua
stateful
Go Go Gadget Hammer: Flipping Nested Pointers for Arbitrary Data Leakage
Authors: Youssef Tobah, University of Michigan; Andrew Kwong, UNC Chapel Hill; Ingab Kang, Universit...
2023-11-15 08:1:31 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
rowhammer
memory
victim
flips
flip
Voice App Developer Experiences with Alexa and Google Assistant: Juggling Risks, Liability, and Security
Authors: William Seymour, King's College London; Noura Abdi, Liverpool Hope University; Kopo M. Ramo...
2023-11-15 08:1:31 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
developers
london
security
king
college
Understanding How to Inform Blind and Low-Vision Users about Data Privacy through Privacy Question Answering Assistants
Authors: Yuanyuan Feng, University of Vermont; Abhilasha Ravichander, Allen Institute for Artificial...
2023-11-15 08:1:31 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
blv
assistants
carnegie
mellon
Ahoy SAILR! There is No Need to DREAM of C: A Compiler-Aware Structuring Algorithm for Binary Decompilation
Authors: Zion Leonahenahe Basque, Ati Priya Bajaj, Wil Gibbs, Jude O'Kain, Derron Miao, Tiffany Bao,...
2023-11-15 08:1:31 | 阅读: 4 |
收藏
|
USENIX - www.usenix.org
gotos
sailr
inducing
decompiler
spurious
Scalable Multi-Party Computation Protocols for Machine Learning in the Honest-Majority Setting
Authors: Fengrun Liu, University of Science and Technology of China & Shanghai Qi Zhi Institute; Xia...
2023-11-15 08:1:31 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
parties
shanghai
zhi
mersenne
yu
Hermes: Unlocking Security Analysis of Cellular Network Protocols by Synthesizing Finite State Machines from Natural Language Specifications
Authors: Abdullah Al Ishtiaq, Sarkar Snigdha Sarathi Das, Syed Md Mukit Rashid, Ali Ranjbar, Kai Tu,...
2023-11-15 08:1:31 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
transition
4g
formal
formulas
FFXE: Dynamic Control Flow Graph Recovery for Embedded Firmware Binaries
Authors: Ryan Tsang, Asmita, and Doreen Joseph, University of California, Davis; Soheil Salehi, Univ...
2023-11-15 08:1:31 | 阅读: 8 |
收藏
|
USENIX - www.usenix.org
firmware
analysis
security
software
california
Racing on the Negative Force: Efficient Vulnerability Root-Cause Analysis through Reinforcement Learning on Counterexamples
Authors: Dandan Xu, SKLOIS, Institute of Information Engineeri...
2023-11-15 08:1:31 | 阅读: 5 |
收藏
|
USENIX - www.usenix.org
academy
sciences
crash
security
rca
Sync+Sync: A Covert Channel Built on fsync with Storage
Authors: Qisheng Jiang and Chundong Wang, ShanghaiTech UniversityAbstract: Scientists have built a v...
2023-11-15 08:1:31 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
fsync
memory
covert
ordinary
WEBRR: A Forensic System for Replaying and Investigating Web-Based Attacks in The Modern Web
Authors: Joey Allen, Palo Alto Networks; Zheng Yang, Feng Xiao, and Matthew Landen, Georgia Institut...
2023-11-15 08:1:31 | 阅读: 1 |
收藏
|
USENIX - www.usenix.org
replay
webrr
georgia
replaying
analysis
AutoFHE: Automated Adaption of CNNs for Efficient Evaluation over FHE
Authors: Wei Ao and Vishnu Naresh Boddeti, Michigan State UniversityAbstract: Secure inference of de...
2023-11-15 08:1:31 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
accuracy
inference
degree
autofhe
polynomial
Unleashing the Power of Type-Based Call Graph Construction by Using Regional Pointer Information
Authors: Yuandao Cai, Yibo Jin, and Charles Zhang, The Hong Kong University of Science and Technolog...
2023-11-15 08:1:31 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
kelp
analysis
stage
precise
rst
The Effect of Design Patterns on (Present and Future) Cookie Consent Decisions
Authors: Nataliia Bielova, Inria research centre at Université Côte d'Azur; Laura Litvine and Anysia...
2023-11-15 08:1:31 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
banners
designs
outcome
faced
Your Firmware Has Arrived: A Study of Firmware Update Vulnerabilities
Authors: Yuhao Wu, Jinwen Wang, Yujie Wang, Shixuan Zhai, and Zihan Li, Washington University in St....
2023-11-15 08:1:31 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
firmware
chkup
analysis
washington
Closed-Form Bounds for DP-SGD against Record-level Inference Attacks
This paper is currently under embargo. The final paper PDF and...
2023-11-15 08:1:31 | 阅读: 4 |
收藏
|
USENIX - www.usenix.org
microsoft
security
boris
giovanni
m365
RECORD: A RECeption-Only Region Determination Attack on LEO Satellite Users
Authors: Eric Jedermann, RPTU Kaiserslautern-Landau; Martin Strohmeier and Vincent Lenders, armasuis...
2023-11-15 08:1:31 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
satellite
km
leo
narrow
iridium
Previous
3
4
5
6
7
8
9
10
Next