unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
“Security is not my field, I’m a stats guy”: A Qualitative Root Cause Analysis of Barriers to Adversarial Machine Learning Defenses in Industry
Authors: Jaron Mink, University of Illinois at Urbana-Champaign; Harjot Kaur, Leibniz University Han...
2023-4-5 05:28:57 | 阅读: 4 |
收藏
|
USENIX - www.usenix.org
defenses
aml
machine
yasemin
A Data-free Backdoor Injection Approach in Neural Networks
Authors: Peizhuo Lv, Chang Yue, Ruigang Liang, and Yunfei Yang...
2023-4-5 05:28:57 | 阅读: 6 |
收藏
|
USENIX - www.usenix.org
academy
sciences
injection
sklois
security
A Large Scale Study of the Ethereum Arbitrage Ecosystem
Authors: Robert McLaughlin, Christopher Kruegel, and Giovanni Vigna, University of California, Santa...
2023-4-5 05:28:57 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
arbitrage
exchanges
novel
stability
A Plot is Worth a Thousand Words: Model Information Stealing Attacks via Scientific Plots
Authors: Boyang Zhang and Xinlei He, CISPA Helmholtz Center for Information Security; Yun Shen, NetA...
2023-4-5 05:28:57 | 阅读: 4 |
收藏
|
USENIX - www.usenix.org
scientific
plots
helmholtz
plot
Abuse Vectors: A Framework for Conceptualizing IoT-Enabled Interpersonal Abuse
Authors: Sophie Stephenson and Majed Almansoori, University of Wisconsin--Madison; Pardis Emami-Naei...
2023-4-5 05:28:57 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
ipa
abusers
spying
wisconsin
survivors
Targeted Deanonymization via the Cache Side Channel: Attacks and Defenses
Authors: Mojtaba Zaheri, Yossi Oren, and Reza Curtmola, New Jersey Institute of TechnologyAbstract:...
2022-6-10 03:1:4 | 阅读: 8 |
收藏
|
USENIX - www.usenix.org
assumptions
hardware
bears
limiting
"They Look at Vulnerability and Use That to Abuse You'': Participatory Threat Modelling with Migrant Domestic Workers
Authors: Julia Słupska and Selina Cho, University of Oxford; Marissa Begonia, Voice of Domestic Work...
2022-6-10 03:1:4 | 阅读: 7 |
收藏
|
USENIX - www.usenix.org
mdws
security
threats
oxford
Blacklight: Scalable Defense for Neural Networks against Query-Based Black-Box Attacks
Authors: Huiying Li, Shawn Shan, and Emily Wenger, University of Chicago; Jiayun Zhang, Fudan Univer...
2022-6-10 03:1:4 | 阅读: 4 |
收藏
|
USENIX - www.usenix.org
blacklight
adversarial
efficiency
compute
network
Themis: Accelerating the Detection of Route Origin Hijacking by Distinguishing Legitimate and Illegitimate MOAS
Authors: Lancheng Qin, Tsinghua University; Dan Li, Tsinghua University and Zhongguancun Laboratory;...
2022-6-10 03:1:4 | 阅读: 7 |
收藏
|
USENIX - www.usenix.org
moas
conflicts
hijacking
tsinghua
themis
AutoDA: Automated Decision-based Iterative Adversarial Attacks
Authors: Qi-An Fu, Dept. of Comp. Sci. and Tech., Institute fo...
2022-6-10 03:1:4 | 阅读: 5 |
收藏
|
USENIX - www.usenix.org
tsinghua
joint
bnrist
comp
sci
SAPIC+: protocol verifiers of the world, unite!
Authors: Vincent Cheval, Inria Paris; Charlie Jacomme, CISPA Helmholtz Center for Information Securi...
2022-6-10 03:1:4 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
sapic
tamarin
security
translation
Where to Recruit for Security Development Studies: Comparing Six Software Developer Samples
Authors: Harjot Kaur, Leibniz University Hannover; Sabrina Amft, CISPA Helmholtz Center for Informat...
2022-6-10 03:1:4 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
security
development
studies
software
Ground Truth for Binary Disassembly is Not Easy
Authors: Chengbin Pang and Tiantai Zhang, Nanjing University; Ruotong Yu, University of Utah; Bing M...
2022-6-10 03:1:4 | 阅读: 6 |
收藏
|
USENIX - www.usenix.org
truth
ground
disassembly
approaches
empirical
Security at the End of the Tunnel: The Anatomy of VPN Mental Models Among Experts and Non-Experts in a Corporate Context
Authors: Veroniek Binkhorst, Technical University of Delft; Tobias Fiebig, Max-Planck-Institut für I...
2022-6-10 02:57:10 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
vpns
security
delft
mental
differ
GAROTA: Generalized Active Root-Of-Trust Architecture (for Tiny Embedded Devices)
Authors: Esmerald Aliaj, University of California, Irvine; Ivan De Oliveira Nunes, Rochester Institu...
2022-6-10 02:57:10 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
garota
rot
mcu
rots
software
A Large-scale and Longitudinal Measurement Study of DKIM Deployment
Authors: Chuhan Wang, Kaiwen Shen, and Minglei Guo, Tsinghua University; Yuxuan Zhao, North China In...
2022-6-10 02:57:10 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
dkim
measurement
tsinghua
security
datasets
Neither Access nor Control: A Longitudinal Investigation of the Efficacy of User Access-Control Solutions on Smartphones
Authors: Masoud Mehrabi Koushki, Yue Huang, Julia Rubin, and Konstantin Beznosov, University of Brit...
2022-6-10 02:57:10 | 阅读: 2 |
收藏
|
USENIX - www.usenix.org
efficacy
fpr
fnr
begins
Cheetah: Lean and Fast Secure Two-Party Deep Neural Network Inference
Authors: Zhicong Huang, Wen-jie Lu, Cheng Hong, and Jiansheng Ding, Alibaba GroupAbstract: Secure tw...
2022-6-10 02:57:10 | 阅读: 8 |
收藏
|
USENIX - www.usenix.org
cheetah
2pc
inference
nn
resnet50
Inferring Phishing Intention via Webpage Appearance and Dynamics: A Deep Vision Based Approach
Authors: Ruofan Liu, Yun Lin, Xianglin Yang, and Siang Hwee Ng, National University of Singapore; Di...
2022-6-10 02:57:10 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
phishing
webpages
webpage
intention
Electronic Monitoring Smartphone Apps: An Analysis of Risks from Technical, Human-Centered, and Legal Perspectives
Authors: Kentrell Owens, University of Washington; Anita Alem, Harvard Law School; Franziska Roesner...
2022-6-10 02:57:10 | 阅读: 3 |
收藏
|
USENIX - www.usenix.org
monitoring
electronic
reviews
smartphones
analysis
Previous
9
10
11
12
13
14
15
16
Next