找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Detection of Intrusions and Malware, and Vulnerability Assessment; 8th International Co Thorsten Holz,Herbert Bos Conference proceedings 20

[復(fù)制鏈接]
樓主: APL
11#
發(fā)表于 2025-3-23 11:16:22 | 只看該作者
MISHIMA: Multilateration of Internet Hosts Hidden Using Malicious Fast-Flux Agents (Short Paper)promised machines that act as proxies to hide the location of the host, commonly referred to as the “mothership,” to/from which they are proxying traffic. Fast-flux botnets pose a serious problem to botnet take-down efforts. The reason is that, while it is typically easy to identify and consequently
12#
發(fā)表于 2025-3-23 15:36:14 | 只看該作者
Code Pointer Masking: Hardening Applications against Code Injection Attacksanaries and protects against attacks that are not addressed by state-of-the-art countermeasures of similar performance. By enforcing the correct semantics of code pointers, we thwart attacks that modify code pointers to divert the application’s control flow. We have implemented a prototype of our so
13#
發(fā)表于 2025-3-23 21:27:15 | 只看該作者
Operating System Interface Obfuscation and the Revealing of Hidden Operationss—rely on knowledge of standard system call interfaces to reason about process execution behavior. In this work, we show how a rootkit can obfuscate a commodity kernel’s system call interfaces to degrade the effectiveness of these tools. Our attack, called ., allows user-level malware to invoke priv
14#
發(fā)表于 2025-3-23 23:01:23 | 只看該作者
15#
發(fā)表于 2025-3-24 02:22:47 | 只看該作者
An Assessment of Overt Malicious Activity Manifest in Residential Networkse” of the user populations (anti-virus and OS software updates) and potential risky behavior (accessing blacklisted URLs). We find that hygiene has little correlation with observed behavior, but risky behavior—which is quite prevalent—more than doubles the likelihood that a system will manifest security issues.
16#
發(fā)表于 2025-3-24 09:21:31 | 只看該作者
Timing Attacks on PIN Input in VoIP Networks (Short Paper)aper shows that a malicious intermediary can recover the inter-keystroke time delay for each PIN input even if the standard encryption mechanism has been applied. The inter-keystroke delay can leak information of what has been typed: Our experiments show that the average search space of a brute force attack on PIN can be reduced by around 80%.
17#
發(fā)表于 2025-3-24 11:02:21 | 只看該作者
Biting the Hand That Serves You: A Closer Look at Client-Side Flash Proxies for Cross-Domain Requestad to potential security problems. We comprehensively explore these problems and conduct a survey of five existing proxy implementation. Furthermore, we propose techniques to avoid the identified security pitfalls and to overcome the untrustworthy interface between the two technologies.
18#
發(fā)表于 2025-3-24 16:18:33 | 只看該作者
19#
發(fā)表于 2025-3-24 21:28:46 | 只看該作者
0302-9743 1.The 11 full papers presented together with two short papers were carefully reviewed and selected from 41intialsubmissions. The papers are organized in topical sections on network security, attacks, Web security, and host security.978-3-642-22423-2978-3-642-22424-9Series ISSN 0302-9743 Series E-ISSN 1611-3349
20#
發(fā)表于 2025-3-25 02:41:09 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-8 00:00
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
贡嘎县| 沛县| 兴城市| 虞城县| 肇源县| 岢岚县| 定陶县| 万州区| 合作市| 西贡区| 普兰县| 固阳县| 陈巴尔虎旗| 深泽县| 兴化市| 青河县| 同仁县| 凭祥市| 辉县市| 正蓝旗| 平安县| 即墨市| 五原县| 辰溪县| 盘锦市| 东安县| 高陵县| 石城县| 珠海市| 丹阳市| 会同县| 志丹县| 宁安市| 监利县| 钦州市| 马尔康县| 乌拉特前旗| 天长市| 习水县| 黄石市| 东莞市|