unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
FirmSolo: Enabling dynamic analysis of binary Linux-based IoT kernel modules
Authors: Ioannis Angelakopoulos, Gianluca Stringhini, and Manuel Egele, Boston UniversityAbstract: T...
2023-8-4 08:6:11 | 阅读: 9 |
收藏
|
USENIX - www.usenix.org
firmware
analysis
firmsolo
firmadyne
triforceafl
(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channels
Authors: Ruiyi Zhang, CISPA Helmholtz Center for Information Security; Taehyun Kim, Independent; Dan...
2023-8-4 08:6:11 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
requiring
timing
cispa
A Study of Multi-Factor and Risk-Based Authentication Availability
Authors: Anthony Gavazzi, Ryan Williams, Engin Kirda, and Long Lu, Northeastern University; Andre Ki...
2023-8-4 08:6:11 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
rba
sso
pba
Person Re-identification in 3D Space: A WiFi Vision-based Approach
Authors: Yili Ren and Yichao Wang, Florida State University; Sheng Tan, Trinity University; Yingying...
2023-8-4 08:6:11 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
florida
evaluation
commitment
yili
relies
Pspray: Timing Side-Channel based Linux Kernel Heap Exploitation Technique
Authors: Yoochan Lee and Jinhan Kwak, Seoul National University; Junesoo Kang and Yuseok Jeon, UNIST...
2023-8-4 08:6:11 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
pspray
attacker
overhead
lee
Device Tracking via Linux’s New TCP Source Port Selection Algorithm
Authors: Moshe Kol, Amit Klein, and Yossi Gilad, Hebrew University of JerusalemAbstract: We describe...
2023-8-4 08:6:11 | 阅读: 5 |
收藏
|
USENIX - www.usenix.org
collisions
security
yossi
modes
network
The Space of Adversarial Strategies
Authors: Ryan Sheatsley, Blaine Hoak, Eric Pauley, and Patrick McDaniel, University of Wisconsin-Mad...
2023-8-4 08:6:11 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
adversarial
machine
handful
worst
UnGANable: Defending Against GAN-based Face Manipulation
Authors: Zheng Li, CISPA Helmholtz Center for Information Security; Ning Yu, Salesforce Research; Ah...
2023-8-4 08:6:11 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
inversion
unganable
gan
cloaked
helmholtz
Improving Logging to Reduce Permission Over-Granting Mistakes
Authors: Bingyu Shen, Tianyi Shan, and Yuanyuan Zhou, University of California, San DiegoAbstract: A...
2023-8-4 08:6:11 | 阅读: 5 |
收藏
|
USENIX - www.usenix.org
deny
sysadmins
seclog
developers
conducted
V-Cloak: Intelligibility-, Naturalness- & Timbre-Preserving Real-Time Voice Anonymization
Authors: Jiangyi Deng, Fei Teng, and Yanjiao Chen, Zhejiang University; Xiaofu Chen and Zhaohui Wang...
2023-8-4 08:6:11 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
cloak
anonymity
asv
PatchVerif: Discovering Faulty Patches in Robotic Vehicles
Authors: Hyungsub Kim, Muslum Ozgur Ozmen, Z. Berkay Celik, Antonio Bianchi, and Dongyan Xu, Purdue...
2023-8-4 08:6:11 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
patchverif
behavioral
software
faulty
rvs
DISTDET: A Cost-Effective Distributed Cyber Threat Detection System
Authors: Feng Dong, School of Cyber Science and Engineering, H...
2023-8-4 08:6:11 | 阅读: 6 |
收藏
|
USENIX - www.usenix.org
reduction
distdet
provenance
alarms
software
The Impostor Among US(B): Off-Path Injection Attacks on USB Communications
Authors: Robert Dumitru, The University of Adelaide and Defence Science and Technology Group; Daniel...
2023-8-4 08:6:11 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
victim
defence
interpreted
yuval
yarom
Fuzztruction: Using Fault Injection-based Fuzzing to Leverage Implicit Domain Knowledge
Authors: Nils Bars, Moritz Schloegel, Tobias Scharnowski, and Nico Schiller, Ruhr-Universität Bochum...
2023-8-4 08:6:11 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
winner
propose
award
uncovered
CacheQL: Quantifying and Localizing Cache Side-Channel Vulnerabilities in Production Software
Authors: Yuanyuan Yuan, Zhibo Liu, and Shuai Wang, The Hong Kong University of Science and Technolog...
2023-8-4 08:6:11 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
cacheql
software
traces
criteria
How fast do you heal? A taxonomy for post-compromise security in secure-channel establishment
Authors: Olivier Blazy, LIX, CNRS, Inria, École Polytechnique, Institut Polytechnique de Paris, Fran...
2023-8-4 08:6:11 | 阅读: 4 |
收藏
|
USENIX - www.usenix.org
security
pcs
france
clermont
NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems
Authors: Zixuan Wang, UC San Diego; Mohammadkazem Taram, Purdue University and UC San Diego; Daniel...
2023-8-4 08:6:11 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
nvram
diego
nvcache
dimm
hardware
Automated Security Analysis of Exposure Notification Systems
Authors: Kevin Morio and Ilkan Esiyok, CISPA Helmholtz Center for Information Security; Dennis Jacks...
2023-8-4 08:6:11 | 阅读: 5 |
收藏
|
USENIX - www.usenix.org
robert
security
centralised
gaen
Content-Type: multipart/oracle - Tapping into Format Oracles in Email End-to-End Encryption
Authors: Fabian Ising, Münster University of Applied Sciences and National Research Center for Appli...
2023-8-4 08:6:11 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
münster
attacker
sciences
impractical
e2ee
HOMESPY: The Invisible Sniffer of Infrared Remote Control of Smart TVs
Authors: Kong Huang, YuTong Zhou, and Ke Zhang, The Chinese University of Hong Kong; Jiacen Xu, Univ...
2023-8-4 08:6:11 | 阅读: 5 |
收藏
|
USENIX - www.usenix.org
signals
sniffed
remote
hong
conditioner
Previous
6
7
8
9
10
11
12
13
Next