NDSS 2020论文集.7z

上传者: z695516174 | 上传时间: 2021-02-25 09:40:23 | 文件大小: 123.62MB | 文件类型: 7Z
NDSS 2020 论文集,一共88篇,文件名字也已改为文章名字,并按照会议的Technical Session进行归类,目前该文档包括11个Session。

文件下载

资源详情

[{"title":"( 88 个子文件 123.62MB ) NDSS 2020论文集.7z","children":[{"title":"NDSS 2020","children":[{"title":"Session 1B Fuzzing","children":[{"title":"HFL Hybrid Fuzzing on the Linux Kernel.pdf <span style='color:#111;'> 693.55KB </span>","children":null,"spread":false},{"title":"HYPER-CUBE High-Dimensional Hypervisor Fuzzing.pdf <span style='color:#111;'> 353.48KB </span>","children":null,"spread":false},{"title":"Not All Coverage Measurements Are Equal Fuzzing by Coverage Accounting for Input Prioritization.pdf <span style='color:#111;'> 1.34MB </span>","children":null,"spread":false},{"title":"HotFuzz Discovering Algorithmic Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing.pdf <span style='color:#111;'> 594.65KB </span>","children":null,"spread":false}],"spread":true},{"title":"Session 5B Side Channels","children":[{"title":"ABSynthe Automatic Blackbox Side-channel Synthesis on Commodity Microarchitectures.pdf <span style='color:#111;'> 963.66KB </span>","children":null,"spread":false},{"title":"Data-Driven Debugging for Functional Side Channels.pdf <span style='color:#111;'> 5.37MB </span>","children":null,"spread":false},{"title":"Mind the Portability A Warriors Guide through Realistic Profiled Side-channel Analysis.pdf <span style='color:#111;'> 3.19MB </span>","children":null,"spread":false},{"title":"PhantomCache Obfuscating Cache Conflicts with Localized Randomization.pdf <span style='color:#111;'> 743.21KB </span>","children":null,"spread":false}],"spread":true},{"title":"Session 11A Hardware & Speculative Attacks","children":[{"title":"ProtectIOn Root-of-Trust for IO in Compromised Platforms.pdf <span style='color:#111;'> 4.46MB </span>","children":null,"spread":false},{"title":"ConTExT A Generic Approach for Mitigating Spectre.pdf <span style='color:#111;'> 291.29KB </span>","children":null,"spread":false},{"title":"SPEECHMINER A Framework for Investigating and Measuring Speculative Execution Vulnerabilities.pdf <span style='color:#111;'> 531.51KB </span>","children":null,"spread":false}],"spread":true},{"title":"Session 10B Crypto","children":[{"title":"Let's Revoke Scalable Global Certificate Revocation.pdf <span style='color:#111;'> 432.54KB </span>","children":null,"spread":false},{"title":"DISCO Sidestepping RPKI's Deployment Barriers.pdf <span style='color:#111;'> 554.63KB </span>","children":null,"spread":false},{"title":"Proof of Storage-Time Efficiently Checking Continuous Data Availability.pdf <span style='color:#111;'> 801.77KB </span>","children":null,"spread":false},{"title":"Post-Quantum Authentication in TLS 1.3 A Performance Study.pdf <span style='color:#111;'> 704.04KB </span>","children":null,"spread":false}],"spread":true},{"title":"Session 6A Network Defenses","children":[{"title":"Poseidon Mitigating Volumetric DDoS Attacks with Programmable Switches.pdf <span style='color:#111;'> 668.93KB </span>","children":null,"spread":false},{"title":"EASI Edge-Based Sender Identification on Resource-Constrained Platforms for Automotive Networks.pdf <span style='color:#111;'> 461.59KB </span>","children":null,"spread":false},{"title":"DefRec Establishing Physical Function Virtualization to Disrupt Reconnaissance of Power Grids' Cyber-Physical Infrastructures.pdf <span style='color:#111;'> 6.68MB </span>","children":null,"spread":false},{"title":"Hold the Door Fingerprinting Your Car Key to Prevent Keyless Entry Car Theft.pdf <span style='color:#111;'> 12.93MB </span>","children":null,"spread":false},{"title":"BLAG Improving the Accuracy of Blacklists.pdf <span style='color:#111;'> 1.05MB </span>","children":null,"spread":false}],"spread":true},{"title":"Session 4A Future Networks","children":[{"title":"Automated Discovery of Cross-Plane Event-Based Vulnerabilities in Software-Defined Networking.pdf <span style='color:#111;'> 679.11KB </span>","children":null,"spread":false},{"title":"When Match Fields Do Not Need to Match Buffered Packets Hijacking in SDN.pdf <span style='color:#111;'> 1.18MB </span>","children":null,"spread":false},{"title":"SVLAN Secure & Scalable Network Virtualization.pdf <span style='color:#111;'> 1.78MB </span>","children":null,"spread":false}],"spread":true},{"title":"Session 4B Software Defenses","children":[{"title":"NoJITsu Locking Down JavaScript Engines.pdf <span style='color:#111;'> 351.89KB </span>","children":null,"spread":false},{"title":"SODA A Generic Online Detection Framework for Smart Contracts.pdf <span style='color:#111;'> 945.95KB </span>","children":null,"spread":false},{"title":"µRAI Securing Embedded Systems with Return Address Integrity.pdf <span style='color:#111;'> 1.39MB </span>","children":null,"spread":false}],"spread":true},{"title":"Session 1A Web","children":[{"title":"Deceptive Previews A Study of the Link Preview Trustworthiness in Social Platforms.pdf <span style='color:#111;'> 3.83MB </span>","children":null,"spread":false},{"title":"Carnus Exploring the Privacy Threats of Browser Extension Fingerprinting.pdf <span style='color:#111;'> 796.03KB </span>","children":null,"spread":false},{"title":"Melting Pot of Origins Compromising the Intermediary Web Services that Rehost Websites.pdf <span style='color:#111;'> 998.08KB </span>","children":null,"spread":false},{"title":"FUSE Finding File Upload Bugs via Penetration Testing.pdf <span style='color:#111;'> 477.07KB </span>","children":null,"spread":false},{"title":"Cross-Origin State Inference (COSI) Attacks Leaking Web Site States through XS-Leaks.pdf <span style='color:#111;'> 385.71KB </span>","children":null,"spread":false}],"spread":true},{"title":"Session 3B Blockchains and MPC","children":[{"title":"Snappy Fast On-chain Payments with Practical Collaterals.pdf <span style='color:#111;'> 712.50KB </span>","children":null,"spread":false},{"title":"Finding Safety in Numbers with Secure Allegation Escrows.pdf <span style='color:#111;'> 620.02KB </span>","children":null,"spread":false},{"title":"Bobtail Improved Blockchain Security with Low-Variance Mining.pdf <span style='color:#111;'> 690.22KB </span>","children":null,"spread":false},{"title":"Broken Metre Attacking Resource Metering in EVM.pdf <span style='color:#111;'> 356.93KB </span>","children":null,"spread":false},{"title":"The Attack of the Clones Against Proof-of-Authority.pdf <span style='color:#111;'> 723.84KB </span>","children":null,"spread":false}],"spread":true},{"title":"Session 8A Malware 1","children":[{"title":"Custos Practical Tamper-Evident Auditing of Operating Systems Using Trusted Execution.pdf <span style='color:#111;'> 619.84KB </span>","children":null,"spread":false},{"title":"You Are What You Do Hunting Stealthy Malware via Data Provenance Analysis.pdf <span style='color:#111;'> 2.06MB </span>","children":null,"spread":false},{"title":"Unicorn Runtime Provenance-Based Detector for Advanced Persistent Threats.pdf <span style='color:#111;'> 718.74KB </span>","children":null,"spread":false},{"title":"OmegaLog High-Fidelity Attack Investigation via Transparent Multi-layer Log Analysis.pdf <span style='color:#111;'> 813.61KB </span>","children":null,"spread":false}],"spread":true},{"title":"Session 5A Network Crime and Privacy","children":[{"title":"A Practical Approach for Taking Down Avalanche Botnets Under Real-World Constraints.pdf <span style='color:#111;'> 451.35KB </span>","children":null,"spread":false},{"title":"On Using Application-Layer Middlebox Protocols for Peeking Behind NAT Gateways.pdf <span style='color:#111;'> 347.50KB </span>","children":null,"spread":false},{"title":"Designing a Better Browser for Tor with BLAST.pdf <span style='color:#111;'> 395.86KB </span>","children":null,"spread":false},{"title":"Encrypted DNS -- Privacy A Traffic Analysis Perspective.pdf <span style='color:#111;'> 808.86KB </span>","children":null,"spread":false}],"spread":true},{"title":"Session 7B Program Analysis","children":[{"title":"Precisely Characterizing Security Impact in a Flood of Patches via Symbolic Rule Comparison.pdf <span style='color:#111;'> 710.38KB </span>","children":null,"spread":false},{"title":"DeepBinDiff Learning Program-Wide Code Representations for Binary Diffing.pdf <span style='color:#111;'> 1.13MB </span>","children":null,"spread":false}],"spread":true},{"title":"Session 8B Private Computation and Learning","children":[{"title":"Trident Efficient 4PC Framework for Privacy Preserving Machine Learning.pdf <span style='color:#111;'> 596.16KB </span>","children":null,"spread":false},{"title":"CloudLeak Large-Scale Deep Learning Models Stealing Through Adversarial Examples.pdf <span style='color:#111;'> 1006.34KB </span>","children":null,"spread":false},{"title":"Secure Sublinear Time Differentially Private Median Computation.pdf <span style='color:#111;'> 642.29KB </span>","children":null,"spread":false},{"title":"BLAZE Blazing Fast Privacy-Preserving Machine Learning.pdf <span style='color:#111;'> 688.73KB </span>","children":null,"spread":false}],"spread":true},{"title":"Session 2B “Smart” Home","children":[{"title":"Metamorph Injecting Inaudible Commands into Over-the-air Voice Controlled Systems.pdf <span style='color:#111;'> 2.78MB </span>","children":null,"spread":false},{"title":"Et Tu Alexa When Commodity WiFi Devices Turn into Adversarial Motion Sensors.pdf <span style='color:#111;'> 673.18KB </span>","children":null,"spread":false},{"title":"Packet-Level Signatures for Smart Home Devices.pdf <span style='color:#111;'> 794.32KB </span>","children":null,"spread":false},{"title":"SurfingAttack Interactive Hidden Attack on Voice Assistants Using Ultrasonic Guided Waves.pdf <span style='color:#111;'> 2.85MB </span>","children":null,"spread":false}],"spread":false},{"title":"Session 10A Case Studies & Human Factors","children":[{"title":"Genotype Extraction and False Relative Attacks Security Risks to Third-Party Genetic Genealogy Services Beyond Identity Inference.pdf <span style='color:#111;'> 903.77KB </span>","children":null,"spread":false},{"title":"A View from the Cockpit Exploring Pilot Reactions to Attacks on Avionic Systems.pdf <span style='color:#111;'> 2.84MB </span>","children":null,"spread":false},{"title":"Compliance Cautions Investigating Security Issues Associated with U.S. Digital-Security Standards.pdf <span style='color:#111;'> 929.64KB </span>","children":null,"spread":false},{"title":"Complex Security Policy A Longitudinal Analysis of Deployed Content Security Policies.pdf <span style='color:#111;'> 304.26KB </span>","children":null,"spread":false},{"title":"Into the Deep Web Understanding E-commerce Fraud from Autonomous Chat with Cybercriminals.pdf <span style='color:#111;'> 3.03MB </span>","children":null,"spread":false}],"spread":false},{"title":"Session 7A Network Attacks","children":[{"title":"Withdrawing the BGP Re-Routing Curtain Understanding the Security Impact of BGP Poisoning through Real-World Measurements.pdf <span style='color:#111;'> 5.80MB </span>","children":null,"spread":false},{"title":"Practical Traffic Analysis Attacks on Secure Messaging Applications.pdf <span style='color:#111;'> 7.20MB </span>","children":null,"spread":false},{"title":"IMP4GT IMPersonation Attacks in 4G NeTworks.pdf <span style='color:#111;'> 543.39KB </span>","children":null,"spread":false},{"title":"CDN Judo Breaking the CDN DoS Protection with Itself.pdf <span style='color:#111;'> 4.47MB </span>","children":null,"spread":false}],"spread":false},{"title":"Session 9A Malware 2","children":[{"title":"UIScope Accurate, Instrumentation-free, and Visible Attack Investigation for GUI Applications.pdf <span style='color:#111;'> 942.56KB </span>","children":null,"spread":false},{"title":"When Malware is Packin' Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features.pdf <span style='color:#111;'> 467.34KB </span>","children":null,"spread":false},{"title":"Prevalence and Impact of Low-Entropy Packing Schemes in the Malware Ecosystem.pdf <span style='color:#111;'> 459.75KB </span>","children":null,"spread":false}],"spread":false},{"title":"Session 3A Mobile & Smartphone Security","children":[{"title":"TKPERM Cross-platform Permission Knowledge Transfer to Detect Overprivileged Third-party Applications.pdf <span style='color:#111;'> 3.84MB </span>","children":null,"spread":false},{"title":"Are You Going to Answer That Measuring User Responses to Anti-Robocall Application Indicators.pdf <span style='color:#111;'> 2.17MB </span>","children":null,"spread":false},{"title":"Learning-based Practical Smartphone Eavesdropping with Built-in Accelerometer.pdf <span style='color:#111;'> 6.42MB </span>","children":null,"spread":false},{"title":"Automated Cross-Platform Reverse Engineering of CAN Bus Commands From Mobile Apps.pdf <span style='color:#111;'> 577.59KB </span>","children":null,"spread":false},{"title":"FlowPrint Semi-Supervised Mobile-App Fingerprinting on Encrypted Network Traffic.pdf <span style='color:#111;'> 942.58KB </span>","children":null,"spread":false}],"spread":false},{"title":"Session 9B Authentication","children":[{"title":"OcuLock Exploring Human Visual System for Authentication in Virtual Reality Head-mounted Display.pdf <span style='color:#111;'> 6.06MB </span>","children":null,"spread":false},{"title":"Strong Authentication without Temper-Resistant Hardware and Application to Federated Identities.pdf <span style='color:#111;'> 538.43KB </span>","children":null,"spread":false},{"title":"On the Resilience of Biometric Authentication Systems against Random Inputs.pdf <span style='color:#111;'> 786.42KB </span>","children":null,"spread":false}],"spread":false},{"title":"Session 6B Oblivious Computation","children":[{"title":"Metal A Metadata-Hiding File-Sharing System.pdf <span style='color:#111;'> 1.97MB </span>","children":null,"spread":false},{"title":"Revisiting Leakage Abuse Attacks.pdf <span style='color:#111;'> 782.54KB </span>","children":null,"spread":false},{"title":"Heterogeneous Private Information Retrieval.pdf <span style='color:#111;'> 722.75KB </span>","children":null,"spread":false},{"title":"Dynamic Searchable Encryption with Small Client Storage.pdf <span style='color:#111;'> 601.09KB </span>","children":null,"spread":false},{"title":"MACAO A Maliciously-Secure and Client-Efficient Active ORAM Framework.pdf <span style='color:#111;'> 592.91KB </span>","children":null,"spread":false}],"spread":false},{"title":"Session 11B Privacy","children":[{"title":"Locally Differentially Private Frequency Estimation with Consistency.pdf <span style='color:#111;'> 928.70KB </span>","children":null,"spread":false},{"title":"Towards Plausible Graph Anonymization.pdf <span style='color:#111;'> 582.57KB </span>","children":null,"spread":false},{"title":"Adversarial Classification Under Differential Privacy.pdf <span style='color:#111;'> 4.31MB </span>","children":null,"spread":false},{"title":"DESENSITIZATION Privacy-Aware and Attack-Preserving Crash Report.pdf <span style='color:#111;'> 1.08MB </span>","children":null,"spread":false}],"spread":false},{"title":"Session 2A Censorship","children":[{"title":"Decentralized Control A Case Study of Russia.pdf <span style='color:#111;'> 3.30MB </span>","children":null,"spread":false},{"title":"Detecting Probe-resistant Proxies.pdf <span style='color:#111;'> 526.61KB </span>","children":null,"spread":false},{"title":"SymTCP Eluding Stateful Deep Packet Inspection with Automated Discrepancy Discovery.pdf <span style='color:#111;'> 539.82KB </span>","children":null,"spread":false},{"title":"Measuring the Deployment of Network Censorship Filters at Global Scale.pdf <span style='color:#111;'> 3.27MB </span>","children":null,"spread":false},{"title":"MassBrowser Unblocking the Censored Web for the Masses, by the Masses.pdf <span style='color:#111;'> 1.18MB </span>","children":null,"spread":false}],"spread":false}],"spread":false}],"spread":true}]

评论信息

免责申明

【只为小站】的资源来自网友分享,仅供学习研究,请务必在下载后24小时内给予删除,不得用于其他任何用途,否则后果自负。基于互联网的特殊性,【只为小站】 无法对用户传输的作品、信息、内容的权属或合法性、合规性、真实性、科学性、完整权、有效性等进行实质审查;无论 【只为小站】 经营者是否已进行审查,用户均应自行承担因其传输的作品、信息、内容而可能或已经产生的侵权或权属纠纷等法律责任。
本站所有资源不代表本站的观点或立场,基于网友分享,根据中国法律《信息网络传播权保护条例》第二十二条之规定,若资源存在侵权或相关问题请联系本站客服人员,zhiweidada#qq.com,请把#换成@,本站将给予最大的支持与配合,做到及时反馈和处理。关于更多版权及免责申明参见 版权及免责申明