unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Howard: A Dynamic Excavator for Reverse Engineering Data Structures
Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartph...
2023-12-27 13:18:12 | 阅读: 7 |
收藏
|
NDSS - www.ndss-symposium.org
kirda
engin
chan
hopper
zhou
No Loitering: Exploiting Lingering Vulnerabilities in Default COM Objects
Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartph...
2023-12-27 13:18:12 | 阅读: 6 |
收藏
|
NDSS - www.ndss-symposium.org
chan
kirda
engin
reverse
TIE: Principled Reverse Engineering of Types in Binary Programs
Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartph...
2023-12-27 13:18:12 | 阅读: 7 |
收藏
|
NDSS - www.ndss-symposium.org
kirda
engin
chan
security
kim
Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones
Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartph...
2023-12-27 13:18:12 | 阅读: 6 |
收藏
|
NDSS - www.ndss-symposium.org
chan
kirda
engin
hao
michael
A Security API for Distributed Social Networks
Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartph...
2023-12-27 13:18:12 | 阅读: 7 |
收藏
|
NDSS - www.ndss-symposium.org
chan
kirda
engin
thanassis
preserving
Location Privacy via Private Proximity Testing
Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartph...
2023-12-27 13:18:12 | 阅读: 6 |
收藏
|
NDSS - www.ndss-symposium.org
engin
kirda
chan
peng
hao
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartph...
2023-12-27 13:18:12 | 阅读: 7 |
收藏
|
NDSS - www.ndss-symposium.org
kirda
chan
engin
security
peng
Using Classification to Protect the Integrity of Spectrum Measurements in White Space Networks
Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartph...
2023-12-27 13:18:12 | 阅读: 3 |
收藏
|
NDSS - www.ndss-symposium.org
kirda
engin
chan
lee
song
Good Neighbor: Ad hoc Pairing of Nearby Wireless Devices by Multiple Antennas
Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartph...
2023-12-27 13:18:12 | 阅读: 5 |
收藏
|
NDSS - www.ndss-symposium.org
engin
chan
kirda
thanassis
song
Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extensions
Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartph...
2023-12-27 13:18:12 | 阅读: 5 |
收藏
|
NDSS - www.ndss-symposium.org
kirda
chan
engin
michael
jonathan
DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation
Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartph...
2023-12-27 13:18:12 | 阅读: 4 |
收藏
|
NDSS - www.ndss-symposium.org
engin
kirda
chan
kim
plane
Efficient Monitoring of Untrusted Kernel-Mode Execution
Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartph...
2023-12-27 13:18:12 | 阅读: 9 |
收藏
|
NDSS - www.ndss-symposium.org
kirda
chan
engin
avgerinos
dawn
Track Me If You Can: On the Effectiveness of Context-based Identifier Changes in Deployed Mobile Networks
Plain-Text Recovery Attacks Against Datagram TLSKenneth Paters...
2023-12-26 20:2:48 | 阅读: 7 |
收藏
|
NDSS - www.ndss-symposium.org
yan
wu
kim
hopper
jiang
You Can Run, but You Can’t Hide: Exposing Network Location for Targeted DoS Attacks in Cellular Networks
Plain-Text Recovery Attacks Against Datagram TLSKenneth Paters...
2023-12-26 20:2:48 | 阅读: 5 |
收藏
|
NDSS - www.ndss-symposium.org
yan
kim
wu
hopper
zhou
Weaponizing Femtocells: The Effect of Rogue Devices on Mobile Telecommunications
Plain-Text Recovery Attacks Against Datagram TLSKenneth Paters...
2023-12-26 20:2:48 | 阅读: 8 |
收藏
|
NDSS - www.ndss-symposium.org
yan
kim
wu
hopper
nicholas
Privacy-preserving Logarithmic-time Search on Encrypted Data in Cloud
Plain-Text Recovery Attacks Against Datagram TLSKenneth Paters...
2023-12-26 20:2:48 | 阅读: 3 |
收藏
|
NDSS - www.ndss-symposium.org
yan
wu
kim
nicholas
zhou
Large-Scale Privacy-Preserving Mapping of Human Genomic Sequences on Hybrid Clouds
Plain-Text Recovery Attacks Against Datagram TLSKenneth Paters...
2023-12-26 20:2:48 | 阅读: 6 |
收藏
|
NDSS - www.ndss-symposium.org
yan
wu
kim
jiang
hopper
Making argument systems for outsourced computation practical (sometimes)
Plain-Text Recovery Attacks Against Datagram TLSKenneth Paters...
2023-12-26 20:2:48 | 阅读: 6 |
收藏
|
NDSS - www.ndss-symposium.org
yan
kim
wu
jiang
zhou
Towards Practical Oblivious RAM
Plain-Text Recovery Attacks Against Datagram TLSKenneth Paters...
2023-12-26 20:2:48 | 阅读: 6 |
收藏
|
NDSS - www.ndss-symposium.org
yan
wu
kim
zhou
jiang
Plain-Text Recovery Attacks Against Datagram TLS
Plain-Text Recovery Attacks Against Datagram TLSKenneth Paters...
2023-12-26 20:2:48 | 阅读: 6 |
收藏
|
NDSS - www.ndss-symposium.org
yan
kim
wu
zhou
jiang
Previous
17
18
19
20
21
22
23
24
Next