unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Security and Privacy Analysis of Samsung's Crowd-Sourced Bluetooth Location Tracking System
Authors: Tingfeng Yu, James Henderson, Alwen Tiu, and Thomas Haines, School of Computing, The Austra...
2023-11-15 08:1:31 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
feasibility
samsung
beacon
papers
slides
A High Coverage Cybersecurity Scale Predictive of User Behavior
Authors: Yukiko Sawaya, KDDI Research Inc.; Sarah Lu, Massachusetts Institute of Technology; Takamas...
2023-11-15 08:1:31 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
security
measuring
esbs
scales
hypothesis
Devil in the Room: Triggering Audio Backdoors in the Physical World
Authors: Meng Chen, Zhejiang University; Xiangyu Xu, Southeast University; Li Lu, Zhongjie Ba, Feng...
2023-11-15 08:1:31 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
trojanroom
zhejiang
impulse
5m
lu
NetShaper: A Differentially Private Network Side-Channel Mitigation System
Authors: Amir Sabzi, Rut Vora, Swati Goswami, Margo Seltzer, Mathias Lécuyer, and Aastha Mehta, Univ...
2023-11-15 08:1:31 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
netshaper
network
shaping
guarantees
margo
Atropos: Effective Fuzzing of Web Applications for Server-Side Vulnerabilities
Authors: Emre Güler and Sergej Schumilo, Ruhr University Bochum; Moritz Schloegel, Nils Bars, Philip...
2023-11-15 08:1:31 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
php
atropos
security
helmholtz
Practical Security Analysis of Zero-Knowledge Proof Circuits
Authors: Hongbo Wen, University of California, Santa Barbara; Jon Stephens, The University of Texas...
2023-11-15 08:1:31 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
veridise
texas
barbara
santa
FraudWhistler: A Resilient, Robust and Plug-and-play Adversarial Example Detection Method for Speaker Recognition
Authors: Kun Wang, Zhejiang University; Xiangyu Xu, Southeast University; Li Lu, Zhongjie Ba, Feng L...
2023-11-15 08:1:31 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
speaker
adversarial
zhejiang
instability
Splitting the Difference on Adversarial Training
Authors: Matan Levi and Aryeh Kontorovich, Ben-Gurion University of the NegevAbstract: The existence...
2023-11-15 08:1:31 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
accuracy
optimal
adversarial
robustness
perturbed
"Belt and suspenders" or "just red tape"?: Investigating Early Artifacts and User Perceptions of IoT App Security Certification
Authors: Prianka Mandal, Amit Seal Ami, Victor Olaiya, Sayyed Hadi Razmjo, and Adwait Nadkarni, Will...
2023-11-15 08:1:31 | 阅读: 5 |
收藏
|
USENIX - www.usenix.org
certi
ed
consumers
cation
regulators
Swipe Left for Identity Theft: An Analysis of User Data Privacy Risks on Location-based Dating Apps
Authors: Karel Dhondt, Victor Le Pochat, Yana Dimova, Wouter J...
2023-11-15 08:1:31 | 阅读: 10 |
收藏
|
USENIX - www.usenix.org
lbd
karel
mental
tension
volckaert
Two Shuffles Make a RAM: Improved Constant Overhead Zero Knowledge RAM
Authors: Yibin Yang, Georgia Institute of Technology; David Heath, University of Illinois Urbana-Cha...
2023-11-15 08:1:31 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
memory
zk
vole
arithmetic
gates
Dancer in the Dark: Synthesizing and Evaluating Polyglots for Blind Cross-Site Scripting
Authors: Robin Kirchner, Technische Universität Braunschweig; Jonas Möller, Technische Universität B...
2023-11-15 08:1:31 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
technische
bxss
polyglots
CAMP: Compiler and Allocator-based Heap Memory Protection
Authors: Zhenpeng Lin, Zheng Yu, Ziyi Guo, Simone Campanoni, Peter Dinda, and Xinyu Xing, Northweste...
2023-11-15 08:1:31 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
memory
camp
security
overhead
corruption
Quantifying Privacy Risks of Prompts in Visual Prompt Learning
Authors: Yixin Wu, Rui Wen, and Michael Backes, CISPA Helmholtz Center for Information Security; Pas...
2023-11-15 08:1:31 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
inference
membership
prompts
downstream
trained
TAP: Transparent and Privacy-Preserving Data Services
Authors: Daniel Reijsbergen and Aung Maw, Singapore University of Technology and Design; Zheng Yang,...
2023-8-4 08:6:11 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
tap
verifiable
merkle2
proofs
limitations
PUMM: Preventing Use-After-Free Using Execution Unit Partitioning
Authors: Carter Yagemann, The Ohio State University; Simon P. Chung, Brendan Saltaformaggio, and Wen...
2023-8-4 08:6:11 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
memory
overhead
synthetic
pumm
commitment
Remote Attacks on Speech Recognition Systems Using Sound from Power Supply
Authors: Lanqing Yang, Xinqi Chen, Xiangyong Jian, Leping Yang, Yijie Li, Qianfei Ren, Yi-Chao Chen,...
2023-8-4 08:6:11 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
sr
singattack
victim
security
yang
ClepsydraCache -- Preventing Cache Attacks with Time-Based Evictions
Authors: Jan Philipp Thoma, Ruhr University Bochum; Christian Niesler, University of Duisburg-Essen;...
2023-8-4 08:6:11 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
ttl
bochum
ruhr
essen
Side-Channel Attacks on Optane Persistent Memory
Authors: Sihang Liu, University of Virginia; Suraaj Kanniwadi, Cornell University; Martin Schwarzl,...
2023-8-4 08:6:11 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
optane
memory
pmemkv
covert
cloud
Fourteen Years in the Life: A Root Server’s Perspective on DNS Resolver Security
Authors: Alden Hilton, Sandia National Laboratories; Casey Deccio, Brigham Young University; Jacob D...
2023-8-4 08:6:11 | 阅读: 4 |
收藏
|
USENIX - www.usenix.org
security
resolvers
sandia
dnssec
Previous
5
6
7
8
9
10
11
12
Next