unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Credit Karma: Understanding Security Implications of Exposed Cloud Services through Automated Capability Inference
Authors: Xueqiang Wang, University of Central Florida; Yuqiong...
2023-8-4 08:6:11 | 阅读: 5 |
收藏
|
USENIX - www.usenix.org
cloud
security
privileged
spear
Back to School: On the (In)Security of Academic VPNs
Authors: Ka Lok Wu, The Chinese University of Hong Kong; Man Hong Hue, The Chinese University of Hon...
2023-8-4 08:6:11 | 阅读: 4 |
收藏
|
USENIX - www.usenix.org
hong
kong
ends
sze
kin
“If sighted people know, I should be able to know:” Privacy Perceptions of Bystanders with Visual Impairments around Camera-based Technology
Authors: Yuhang Zhao, University of Wisconsin—Madison; Yaxing Yao, University of Maryland, Baltimore...
2023-8-4 08:6:11 | 阅读: 5 |
收藏
|
USENIX - www.usenix.org
bvi
visually
cameras
bystanders
impaired
The Writing on the Wall and 3D Digital Twins: Personal Information in (not so) Private Real Estate
Authors: Rachel McAmis and Tadayoshi Kohno, University of WashingtonAbstract: Online real estate com...
2023-8-4 08:6:11 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
tours
analysis
homes
slides
artifacts
Assessing Anonymity Techniques Employed in German Court Decisions: A De-Anonymization Experiment
Authors: Dominic Deuber and Michael Keuchen, Friedrich-Alexander-Universität Erlangen-Nürnberg; Nico...
2023-8-4 08:6:11 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
court
anonymity
persons
empirical
That Person Moves Like A Car: Misclassification Attack Detection for Autonomous Systems Using Spatiotemporal Consistency
Authors: Yanmao Man, University of Arizona; Raymond Muller, Purdue University; Ming Li, University o...
2023-8-4 08:6:11 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
odt
percepguard
consistency
arizona
noise
Glowing in the Dark: Uncovering IPv6 Address Discovery and Scanning Strategies in the Wild
Authors: Hammas Bin Tanveer, The University of Iowa; Rachee Singh, Microsoft and Cornell University;...
2023-8-4 08:6:11 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
scanners
subnet
experiment
portions
proceedings
A Research Framework and Initial Study of Browser Security for the Visually Impaired
Authors: Elaine Lau and Zachary Peterson, Cal Poly, San Luis ObispoAbstract: The growth of web-based...
2023-8-4 08:6:11 | 阅读: 7 |
收藏
|
USENIX - www.usenix.org
visually
impaired
security
population
conducting
Strategies and Vulnerabilities of Participants in Venezuelan Influence Operations
Authors: Ruben Recabarren, Bogdan Carbunar, Nestor Hernandez, and Ashfaq Ali Shafin, Florida Interna...
2023-8-4 08:6:11 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
influence
operatives
opposition
promote
POLICYCOMP: Counterpart Comparison of Privacy Policies Uncovers Overbroad Personal Data Collection Practices
read file error: read notes: is a directory...
2023-8-4 08:6:11 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
overbroad
pdcps
tong
developers
shanghai
Access Denied: Assessing Physical Risks to Internet Access Networks
Authors: Alexander Marder, CAIDA / UC San Diego; Zesen Zhang, UC San Diego; Ricky Mok and Ramakrishn...
2023-8-4 08:6:11 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
diego
caida
regional
network
outages
FuzzJIT: Oracle-Enhanced Fuzzing for JavaScript Engine JIT Compiler
Authors: Junjie Wang, College of Intelligence and Computing, Tianjin University; Zhiyi Zhang, CodeSa...
2023-8-4 08:6:11 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
college
compilers
tianjin
fuzzjit
junjie
Squint Hard Enough: Attacking Perceptual Hashing with Adversarial Machine Learning
Authors: Jonathan Prokos, Johns Hopkins University; Neil Fendley, Johns Hopkins University Applied P...
2023-8-4 08:6:11 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
perceptual
hopkins
johns
hashing
illicit
CipherH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations
Authors: Sen Deng, Southern University of Science and Technology; Mengyuan Li, The Ohio State Univer...
2023-8-4 08:6:11 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
ciphertext
memory
southern
analysis
encryption
PrivTrace: Differentially Private Trajectory Synthesis by Adaptive Markov Models
Authors: Haiming Wang, Zhejiang University; Zhikun Zhang, CISPA Helmholtz Center for Information Sec...
2023-8-4 08:6:11 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
markov
helmholtz
cispa
zhejiang
privtrace
The Maginot Line: Attacking the Boundary of DNS Caching Protection
Authors: Xiang Li, Chaoyi Lu, and Baojun Liu, Tsinghua University; Qifan Zhang and Zhou Li, Universi...
2023-8-4 08:6:11 | 阅读: 6 |
收藏
|
USENIX - www.usenix.org
software
tsinghua
cdnses
cdns
"My Privacy for their Security": Employees' Privacy Perspectives and Expectations when using Enterprise Security Software
Authors: Jonah Stegman, Patrick J. Trottier, Caroline Hillier, and Hassan Khan, University of Guelph...
2023-8-4 08:6:11 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
ess
security
employers
Security and Privacy Failures in Popular 2FA Apps
Authors: Conor Gilsenan, UC Berkeley / ICSI; Fuzail Shakir and Noura Alomar, UC Berkeley; Serge Egel...
2023-8-4 08:6:11 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
totp
backup
security
berkeley
100k
xNIDS: Explaining Deep Learning-based Network Intrusion Detection Systems for Active Intrusion Responses
Authors: Feng Wei, University at Buffalo; Hongda Li, Palo Alto Networks; Ziming Zhao and Hongxin Hu,...
2023-8-4 08:6:11 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
nids
xnids
network
explaining
fidelity
Every Signature is Broken: On the Insecurity of Microsoft Office’s OOXML Signatures
Authors: Simon Rohlmann, Vladislav Mladenov, Christian Mainka, Daniel Hirschberger, and Jörg Schwenk...
2023-8-4 08:6:11 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
microsoft
odf
analysis
attackers
Previous
7
8
9
10
11
12
13
14
Next