unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
One Server for the Price of Two: Simple and Fast Single-Server Private Information Retrieval
Authors: Alexandra Henzinger, Matthew M. Hong, and Henry Corrigan-Gibbs, MIT; Sarah Meiklejohn, Goog...
2023-8-4 08:6:11 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
simplepir
database
retrieval
client
schemes
Egg Hunt in Tesla Infotainment: A First Look at Reverse Engineering of Qt Binaries
Authors: Haohuang Wen and Zhiqiang Lin, The Ohio State UniversityAbstract: As one of the most popula...
2023-8-4 08:6:11 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
qt
qtre
semantic
tesla
novel
"All of them claim to be the best": Multi-perspective study of VPN users and VPN providers
Authors: Reethika Ramesh, University of Michigan; Anjali Vyas, Cornell Tech; Roya Ensafi, University...
2023-8-4 08:6:11 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
mental
vpns
vyas
slides
TPatch: A Triggered Physical Adversarial Patch
Authors: Wenjun Zhu and Xiaoyu Ji, USSLAB, Zhejiang University; Yushi Cheng, BNRist, Tsinghua Univer...
2023-8-4 08:6:11 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
tpatch
adversarial
autonomous
zhejiang
driving
DynSQL: Stateful Fuzzing for Database Management Systems with Complex and Valid SQL Query Generation
Authors: Zu-Ming Jiang, ETH Zurich; Jia-Ju Bai, Tsinghua University; Zhendong Su, ETH ZurichAbstract...
2023-8-4 08:6:11 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
dbmss
fuzzers
dynsql
approaches
zurich
Investigating Verification Behavior and Perceptions of Visual Digital Certificates
Authors: Dañiel Gerhardt and Alexander Ponticello, CISPA Helmholtz Center for Information Security a...
2023-8-4 08:6:11 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
helmholtz
cispa
gerhardt
mediausenix
begins
Combating Robocalls with Phone Virtual Assistant Mediated Interaction
Authors: Sharbani Pandit, Georgia Institute of Technology; Krishanu Sarker, Georgia State University...
2023-8-4 08:6:11 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
georgia
robocalls
robocaller
usenix
spoofed
A comprehensive, formal and automated analysis of the EDHOC protocol
Authors: Charlie Jacomme, Inria Paris; Elise Klein, Steve Kremer, and Maïwenn Racouchot, Inria Nancy...
2023-8-4 08:6:11 | 阅读: 5 |
收藏
|
USENIX - www.usenix.org
analysis
weaknesses
wg
exchange
draft
Exploring User Reactions and Mental Models Towards Perceptual Manipulation Attacks in Mixed Reality
Authors: Kaiming Cheng, Jeffery F. Tian, Tadayoshi Kohno, and Franziska Roesner, University of Washi...
2023-8-4 08:6:11 | 阅读: 6 |
收藏
|
USENIX - www.usenix.org
pma
mr
perceptions
reactions
GLeeFuzz: Fuzzing WebGL Through Error Message Guided Mutation
Authors: Hui Peng, Purdue University; Zhihao Yao and Ardalan Amiri Sani, UC Irvine; Dave (Jing) Tian...
2023-8-4 08:6:11 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
webgl
chrome
mutation
remote
purdue
Learning Normality is Enough: A Software-based Mitigation against Inaudible Voice Attacks
Authors: Xinfeng Li, Xiaoyu Ji, and Chen Yan, USSLAB, Zhejiang University; Chaohao Li, USSLAB, Zheji...
2023-8-4 08:6:11 | 阅读: 4 |
收藏
|
USENIX - www.usenix.org
normdetect
zhejiang
usslab
inaudible
audios
GlitchHiker: Uncovering Vulnerabilities of Image Signal Transmission with IEMI
Authors: Qinhong Jiang, Xiaoyu Ji, Chen Yan, Zhixin Xie, Haina Lou, and Wenyuan Xu, Zhejiang Univers...
2023-8-4 08:6:11 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
detectors
involving
glitchhiker
widths
On the Feasibility of Malware Unpacking via Hardware-assisted Loop Profiling
Authors: Binlin Cheng, Shandong University & Hubei Normal University; Erika A Leal, Tulane Universit...
2023-8-4 08:6:11 | 阅读: 5 |
收藏
|
USENIX - www.usenix.org
hpcs
hardware
security
unpacking
tulane
Humans vs. Machines in Malware Classification
Authors: Simone Aonzo, EURECOM; Yufei Han, INRIA; Alessandro Mantovani and Davide Balzarotti, EURECO...
2023-8-4 08:6:11 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
machine
analysis
novices
humans
Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses
Authors: Vincent Cheval, Inria Paris; Cas Cremers and Alexander Dax, CISPA Helmholtz Center for Info...
2023-8-4 08:6:11 | 阅读: 1 |
收藏
|
USENIX - www.usenix.org
inria
security
gap
paris
weaknesses
Guarding Serverless Applications with Kalium
Authors: Deepak Sirone Jegan, University of Wisconsin-Madison; Liang Wang, Princeton University; Sid...
2023-8-4 08:6:11 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
security
kalium
wisconsin
overhead
microsoft
Eavesdropping Mobile App Activity via Radio-Frequency Energy Harvesting
Authors: Tao Ni, Shenzhen Research Institute, City University of Hong Kong, and Department of Comput...
2023-8-4 08:6:11 | 阅读: 4 |
收藏
|
USENIX - www.usenix.org
applistener
hong
kong
accuracy
novel
Are You Spying on Me? Large-Scale Analysis on IoT Data Exposure through Companion Apps
Authors: Yuhong Nan, Sun Yat-sen University; Xueqiang Wang, University of Central Florida; Luyi Xing...
2023-8-4 08:6:11 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
companion
exposure
wu
indiana
iotprofiler
“Employees Who Don’t Accept the Time Security Takes Are Not Aware Enough”: The CISO View of Human-Centred Security
Authors: Jonas Hielscher and Uta Menges, Ruhr University Bochum; Simon Parkin, TU Delft; Annette Klu...
2023-4-5 05:28:57 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
security
hcs
cisos
ruhr
behaviour
“Millions of people are watching you”: Understanding the Digital-Safety Needs and Practices of Creators
Authors: Patrawat Samermit, Anna Turner, Patrick Gage Kelley, Tara Matthews, Vanessia Wu, Sunny Cons...
2023-4-5 05:28:57 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
creators
threats
experiences
diverse
anna
Previous
8
9
10
11
12
13
14
15
Next