unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
HEIR: A Unified Representation for Cross-Scheme Compilation of Fully Homomorphic Computation
Song Bian (Beihang University), Zian Zhao (Beihang University)...
2024-1-16 20:29:1 | 阅读: 5 |
收藏
|
NDSS - www.ndss-symposium.org
fhe
beihang
stage
efficiency
homomorphic
GhostType: The Limits of Using Contactless Electromagnetic Interference to Inject Phantom Keys into Analog Circuits of Keyboards
Summer CycleLDR: Secure and Efficient Linux Driver Runtime for Embedded TEE SystemsHuaiyu Yan,...
2024-1-16 20:29:1 | 阅读: 15 |
收藏
|
NDSS - www.ndss-symposium.org
tsinghua
sciences
academy
security
zhejiang
Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time
Summer CycleLDR: Secure and Efficient Linux Driver Runtime for Embedded TEE SystemsHuaiyu Yan,...
2024-1-16 20:29:1 | 阅读: 18 |
收藏
|
NDSS - www.ndss-symposium.org
tsinghua
sciences
academy
security
zhejiang
Architecting Trigger-Action Platforms for Security, Performance and Functionality
Summer CycleLDR: Secure and Efficient Linux Driver Runtime for Embedded TEE SystemsHuaiyu Yan,...
2024-1-16 20:29:1 | 阅读: 19 |
收藏
|
NDSS - www.ndss-symposium.org
tsinghua
sciences
academy
security
zhejiang
File Hijacking Vulnerability: The Elephant in the Room
Summer CycleLDR: Secure and Efficient Linux Driver Runtime for Embedded TEE SystemsHuaiyu Yan,...
2024-1-16 20:29:1 | 阅读: 23 |
收藏
|
NDSS - www.ndss-symposium.org
tsinghua
sciences
academy
security
zhejiang
The Dark Side of E-Commerce: Dropshipping Abuse as a Business Model
Summer CycleLDR: Secure and Efficient Linux Driver Runtime for Embedded TEE SystemsHuaiyu Yan,...
2024-1-16 20:29:1 | 阅读: 14 |
收藏
|
NDSS - www.ndss-symposium.org
tsinghua
sciences
academy
security
zhejiang
Eavesdropping on Black-box Mobile Devices via Audio Amplifier’s EMR
read file error: read notes: is a directory...
2024-1-16 20:29:1 | 阅读: 9 |
收藏
|
NDSS - www.ndss-symposium.org
tsinghua
sciences
academy
security
zhejiang
IDA: Hybrid Attestation with Support for Interrupts and TOCTOU
Fatemeh Arkannezhad (UCLA), Justin Feng (UCLA), Nader Sehatbak...
2024-1-16 20:29:1 | 阅读: 6 |
收藏
|
NDSS - www.ndss-symposium.org
attestation
interrupts
overhead
toctou
ucla
GNNIC: Finding Long-Lost Sibling Functions with Abstract Similarity
The following papers are currently accepted for NDSS Symposium 2024. Stay tuned for the final versi...
2024-1-16 20:29:1 | 阅读: 6 |
收藏
|
NDSS - www.ndss-symposium.org
tsinghua
sciences
academy
security
zhejiang
Compromising Industrial Processes using Web-Based Programmable Logic Controller Malware
Summer CycleLDR: Secure and Efficient Linux Driver Runtime for Embedded TEE SystemsHuaiyu Yan,...
2024-1-16 20:29:1 | 阅读: 22 |
收藏
|
NDSS - www.ndss-symposium.org
tsinghua
sciences
academy
security
zhejiang
NODLINK: An Online System for Fine-Grained APT Attack Detection and Investigation
The following papers are currently accepted for NDSS Symposium 2024. Stay tuned for the final versi...
2024-1-16 20:29:1 | 阅读: 11 |
收藏
|
NDSS - www.ndss-symposium.org
tsinghua
sciences
academy
security
zhejiang
Architecting Trigger-Action Platforms for Security, Performance and Functionality
Deepak Sirone Jegan (University of Wisconsin-Madison), Michael...
2024-1-16 20:29:1 | 阅读: 4 |
收藏
|
NDSS - www.ndss-symposium.org
tap
cloud
guarantees
tapdance
madison
Attributions for ML-based ICS Anomaly Detection: From Theory to Practice
Clement Fung (Carnegie Mellon University), Eric Zeng (Carnegie...
2024-1-16 20:29:1 | 阅读: 3 |
收藏
|
NDSS - www.ndss-symposium.org
attribution
anomaly
identify
mellon
Bernoulli Honeywords
Ke Coby Wang (Duke University), Michael K. Reiter (Duke Univer...
2024-1-16 20:29:1 | 阅读: 3 |
收藏
|
NDSS - www.ndss-symposium.org
honeywords
honeyword
bernoulli
chosen
passwords
BreakSPF: How Shared Infrastructures Magnify SPF Vulnerabilities Across the Internet
Chuhan Wang (Tsinghua University), Yasuhiro Kuranaga (Tsinghua...
2024-1-16 20:29:1 | 阅读: 5 |
收藏
|
NDSS - www.ndss-symposium.org
tsinghua
spf
spoofing
breakspf
Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time
Xinfeng Li (Zhejiang University), Chen Yan (Zhejiang Universit...
2024-1-16 20:29:1 | 阅读: 4 |
收藏
|
NDSS - www.ndss-symposium.org
zhejiang
vrifle
asr
sounds
darmstadt
Unus pro omnibus: Multi-Client Searchable Encryption via Access Control
The following papers are currently accepted for NDSS Symposium 2024. Stay tuned for the final versi...
2024-1-16 20:29:1 | 阅读: 21 |
收藏
|
NDSS - www.ndss-symposium.org
tsinghua
sciences
academy
security
zhejiang
Compensating Removed Frequency Components: Thwarting Voice Spectrum Reduction Attacks
Shu Wang (George Mason University), Kun Sun (George Mason Univ...
2024-1-16 20:29:1 | 阅读: 3 |
收藏
|
NDSS - www.ndss-symposium.org
asr
spectrum
reduction
adversarial
mason
CP-IoT: A Cross-Platform Monitoring System for Smart Home
The following papers are currently accepted for NDSS Symposium 2024. Stay tuned for the final versi...
2024-1-16 20:29:1 | 阅读: 9 |
收藏
|
NDSS - www.ndss-symposium.org
tsinghua
sciences
academy
security
zhejiang
Compromising Industrial Processes using Web-Based Programmable Logic Controller Malware
Ryan Pickren (Georgia Institute of Technology), Tohid Shekari...
2024-1-16 20:29:1 | 阅读: 4 |
收藏
|
NDSS - www.ndss-symposium.org
plc
georgia
plcs
proposed
firmware
Previous
7
8
9
10
11
12
13
14
Next