unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Content Censorship in the InterPlanetary File System
Srivatsan Sridhar (Stanford University), Onur Ascigil (Lancast...
2024-1-16 20:29:1 | 阅读: 3 |
收藏
|
NDSS - www.ndss-symposium.org
ipfs
uclouvain
london
prevents
LARMix: Latency-Aware Routing in Mix Networks
Mahdi Rahimi (KU Leuven), Piyush Kumar Sharma (KU Leuven), Cla...
2024-1-16 20:29:1 | 阅读: 3 |
收藏
|
NDSS - www.ndss-symposium.org
larmix
leuven
anonymity
ku
adversarial
Facilitating Non-Intrusive In-Vivo Firmware Testing with Stateless Instrumentation
The following papers are currently accepted for NDSS Symposium 2024. Stay tuned for the final versi...
2024-1-16 20:29:1 | 阅读: 18 |
收藏
|
NDSS - www.ndss-symposium.org
tsinghua
sciences
academy
security
zhejiang
Crafter: Facial Feature Crafting against Inversion-based Identity Theft on Deep Models
Shiming Wang (Shanghai Jiao Tong University), Zhe Ji (Shanghai...
2024-1-16 20:29:1 | 阅读: 2 |
收藏
|
NDSS - www.ndss-symposium.org
tong
shanghai
jiao
adaptive
attacker
IDA: Hybrid Attestation with Support for Interrupts and TOCTOU
Summer CycleLDR: Secure and Efficient Linux Driver Runtime for Embedded TEE SystemsHuaiyu Yan,...
2024-1-16 20:29:1 | 阅读: 16 |
收藏
|
NDSS - www.ndss-symposium.org
tsinghua
sciences
academy
security
zhejiang
LDR: Secure and Efficient Linux Driver Runtime for Embedded TEE Systems
Huaiyu Yan (Southeast University), Zhen Ling (Southeast Univer...
2024-1-16 20:29:1 | 阅读: 4 |
收藏
|
NDSS - www.ndss-symposium.org
southeast
security
library
luo
fu
Bernoulli Honeywords
The following papers are currently accepted for NDSS Symposium 2024. Stay tuned for the final versi...
2024-1-16 20:29:1 | 阅读: 17 |
收藏
|
NDSS - www.ndss-symposium.org
tsinghua
sciences
academy
security
zhejiang
CrowdGuard: Federated Backdoor Detection in Federated Learning
Phillip Rieger (Technical University of Darmstadt), Torsten Kr...
2024-1-16 20:29:1 | 阅读: 5 |
收藏
|
NDSS - www.ndss-symposium.org
crowdguard
darmstadt
preserving
iid
adaptive
A Two-Layer Blockchain Sharding Protocol Leveraging Safety and Liveness for Enhanced Performance
The following papers are currently accepted for NDSS Symposium 2024. Stay tuned for the final versi...
2024-1-16 20:29:1 | 阅读: 7 |
收藏
|
NDSS - www.ndss-symposium.org
tsinghua
sciences
academy
security
zhejiang
MOCK: Optimizing Kernel Fuzzing Mutation with Context-aware Dependency
The following papers are currently accepted for NDSS Symposium 2024. Stay tuned for the final versi...
2024-1-16 20:29:1 | 阅读: 13 |
收藏
|
NDSS - www.ndss-symposium.org
tsinghua
sciences
academy
security
zhejiang
TrustSketch: Trustworthy Sketch-based Telemetry on Cloud Hosts
Summer CycleLDR: Secure and Efficient Linux Driver Runtime for Embedded TEE SystemsHuaiyu Yan,...
2024-1-16 20:29:1 | 阅读: 10 |
收藏
|
NDSS - www.ndss-symposium.org
tsinghua
sciences
academy
security
zhejiang
Eavesdropping on Black-box Mobile Devices via Audio Amplifier's EMR
Huiling Chen (College of Computer Science and Electronic Engin...
2024-1-16 20:29:1 | 阅读: 4 |
收藏
|
NDSS - www.ndss-symposium.org
electronic
hunan
college
changsha
sounds
LiDAR Spoofing Meets the New-Gen: Capability Improvements, Broken Assumptions, and New Attack Strategies
Takami Sato (University of California, Irvine), Yuki Hayakawa...
2024-1-16 20:29:1 | 阅读: 4 |
收藏
|
NDSS - www.ndss-symposium.org
lidar
detectors
keio
spoofing
measurement
Efficient and Timely Revocation of V2X Credentials
The following papers are currently accepted for NDSS Symposium 2024. Stay tuned for the final versi...
2024-1-16 20:29:1 | 阅读: 7 |
收藏
|
NDSS - www.ndss-symposium.org
tsinghua
sciences
academy
security
zhejiang
Enhance Stealthiness and Transferability of Adversarial Attacks with Class Activation Mapping Ensemble Attack
Hui Xia (Ocean University of China), Rui Zhang (Ocean Universi...
2024-1-16 20:29:1 | 阅读: 5 |
收藏
|
NDSS - www.ndss-symposium.org
adversarial
ocean
activation
outperforms
SigmaDiff: Semantics-Aware Deep Graph Matching for Pseudocode
The following papers are currently accepted for NDSS Symposium 2024. Stay tuned for the final versi...
2024-1-16 20:29:1 | 阅读: 22 |
收藏
|
NDSS - www.ndss-symposium.org
tsinghua
sciences
academy
security
zhejiang
ShapFuzz: Efficient Fuzzing via Shapley-Guided Byte Selection
The following papers are currently accepted for NDSS Symposium 2024. Stay tuned for the final versi...
2024-1-16 20:29:1 | 阅读: 12 |
收藏
|
NDSS - www.ndss-symposium.org
tsinghua
sciences
academy
security
zhejiang
LMSanitator: Defending Prompt-Tuning Against Task-Agnostic Backdoors
Chengkun Wei (Zhejiang University), Wenlong Meng (Zhejiang Uni...
2024-1-16 20:29:1 | 阅读: 4 |
收藏
|
NDSS - www.ndss-symposium.org
lmsanitator
zhejiang
backdoors
agnostic
tuning
HEIR: A Unified Representation for Cross-Scheme Compilation of Fully Homomorphic Computation
Summer CycleLDR: Secure and Efficient Linux Driver Runtime for Embedded TEE SystemsHuaiyu Yan,...
2024-1-16 20:29:1 | 阅读: 16 |
收藏
|
NDSS - www.ndss-symposium.org
tsinghua
sciences
academy
security
zhejiang
Secret-Shared Shuffle with Malicious Security
The following papers are currently accepted for NDSS Symposium 2024. Stay tuned for the final versi...
2024-1-16 20:29:1 | 阅读: 7 |
收藏
|
NDSS - www.ndss-symposium.org
tsinghua
sciences
academy
security
zhejiang
Previous
8
9
10
11
12
13
14
15
Next