unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Racing on the Negative Force: Efficient Vulnerability Root-Cause Analysis through Reinforcement Learning on Counterexamples
Authors: Dandan Xu, SKLOIS, Institute of Information Engineeri...
2023-11-15 08:1:31 | 阅读: 4 |
收藏
|
USENIX - www.usenix.org
academy
sciences
crash
security
rca
SmartCookie: Blocking Large-Scale SYN Floods with a Split-Proxy Defense on Programmable Data Planes
Authors: Sophia Yoo, Xiaoqi Chen, and Jennifer Rexford, Princeton UniversityAbstract: Despite decade...
2023-11-15 08:1:31 | 阅读: 7 |
收藏
|
USENIX - www.usenix.org
defenses
benign
adaptive
security
hardware
When the User Is Inside the User Interface: An Empirical Study of UI Security Properties in Augmented Reality
Authors: Kaiming Cheng, Arkaprabha Bhattacharya, Michelle Lin, Jaewook Lee, Aroosh Kumar, Jeffery F....
2023-11-15 08:1:31 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
security
lee
experiences
proceedings
ACAI: Protecting Accelerator Execution with Arm Confidential Computing Architecture
Authors: Supraja Sridhara, Andrin Bertschi, Benedict Schlüter, Mark Kuhne, Fabio Aliberti, and Shwet...
2023-11-15 08:1:31 | 阅读: 4 |
收藏
|
USENIX - www.usenix.org
cca
security
acai
Devil in the Room: Triggering Audio Backdoors in the Physical World
Authors: Meng Chen, Zhejiang University; Xiangyu Xu, Southeast University; Li Lu, Zhongjie Ba, Feng...
2023-11-15 08:1:31 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
trojanroom
impulse
zhejiang
xu
observation
Opportunistic Data Flow Integrity for Real-time Cyber-physical Systems Using Worst Case Execution Time Reservation
Authors: Yujie Wang, Ao Li, Jinwen Wang, Sanjoy Baruah, and Ning Zhang, Washington University in St....
2023-11-15 08:1:31 | 阅读: 5 |
收藏
|
USENIX - www.usenix.org
dfi
worst
cps
security
memory
How WEIRD is Usable Privacy and Security Research?
Authors: Ayako A. Hasegawa and Daisuke Inoue, NICT; Mitsuaki Akiyama, NTTAbstract: In human factor f...
2023-11-15 08:1:31 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
weird
ups
western
papers
geographic
Accelerating Secure Collaborative Machine Learning with Protocol-Aware RDMA
Authors: Zhenghang Ren, Mingxuan Fan, Zilong Wang, Junxue Zhang, and Chaoliang Zeng, iSING Lab@The H...
2023-11-15 08:1:31 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
scml
cora
remote
hong
rdma
ABACuS: All-Bank Activation Counters for Scalable and Low Overhead RowHammer Mitigation
Authors: Ataberk Olgun, Yahya Can Tugrul, Nisa Bostanci, Ismail Emir Yuksel, Haocong Luo, Steve Rhyn...
2023-11-15 08:1:31 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
abacus
rowhammer
threshold
workloads
banks
On Data Fabrication in Collaborative Vehicular Perception: Attacks and Countermeasures
Authors: Qingzhao Zhang, Shuowei Jin, Ruiyang Zhu, Jiachen Sun, and Xumiao Zhang, University of Mich...
2023-11-15 08:1:31 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
malicious
perception
cavs
fabrication
vehicles
Understanding the Security and Privacy Implications of Online Toxic Content on Refugees
Authors: Arjun Arunasalam, Purdue University; Habiba Farrukh, University of California, Irvine; Eliz...
2023-11-15 08:1:31 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
refugees
toxic
purdue
barriers
Automated Large-Scale Analysis of Cookie Notice Compliance
Authors: Ahmed Bouhoula, Karel Kubicek, Amit Zac, Carlos Cotrini, and David Basin, ETH ZurichAbstrac...
2023-11-15 08:1:31 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
violations
studies
analysis
regulations
notices
A Taxonomy of C Decompiler Fidelity Issues
Authors: Luke Dramko and Jeremy Lacomis, Carnegie Mellon University; Edward J. Schwartz, Carnegie Me...
2023-11-15 08:1:31 | 阅读: 6 |
收藏
|
USENIX - www.usenix.org
decompiled
carnegie
mellon
decompiler
taxonomy
You Cannot Escape Me: Detecting Evasions of SIEM Rules in Enterprise Networks
Authors: Rafael Uetz, Marco Herzog, and Louis Hackländer, Fraunhofer FKIE; Simon Schwarz, University...
2023-11-15 08:1:31 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
amides
evasions
security
spots
network
Can Virtual Reality Protect Users from Keystroke Inference Attacks?
Authors: Zhuolin Yang, Zain Sarwar, Iris Hwang, Ronik Bhaskar, Ben Y. Zhao, and Haitao Zheng, Univer...
2023-11-15 08:1:31 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
typed
recognize
attacker
avatar
immersive
MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning
Authors: Zian Jia and Yun Xiong, Shanghai Key Laboratory of Data Science, School of Computer Science...
2023-11-15 08:1:31 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
provenance
graphs
shanghai
apts
fudan
Neural Network Semantic Backdoor Detection and Mitigation: A Causality-Based Approach
Authors: Bing Sun, Jun Sun, and Wayne Koh, Singapore Management University; Jie Shi, Huawei Singapor...
2023-11-15 08:1:31 | 阅读: 4 |
收藏
|
USENIX - www.usenix.org
semantic
backdoors
cars
neurons
accuracy
"I Don't Know If We're Doing Good. I Don't Know If We're Doing Bad": Investigating How Practitioners Scope, Motivate, and Conduct Privacy Work When De...
Authors: Hao-Ping (Hank) Lee, Carnegie Mellon University; Lan Gao and Stephanie Yang, Georgia Instit...
2023-11-15 08:1:31 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
exacerbated
carnegie
intrusions
mellon
Finding Traceability Attacks in the Bluetooth Low Energy Specification and Its Implementations
Authors: Jianliang Wu, Purdue University & Simon Fraser University; Patrick Traynor, University of F...
2023-11-15 08:1:31 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
reuse
formal
purdue
CAMP: Compiler and Allocator-based Heap Memory Protection
Authors: Zhenpeng Lin, Zheng Yu, Ziyi Guo, Simone Campanoni, Peter Dinda, and Xinyu Xing, Northweste...
2023-11-15 08:1:31 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
camp
memory
security
overhead
corruption
Previous
4
5
6
7
8
9
10
11
Next