找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Detection of Intrusions and Malware, and Vulnerability Assessment; 8th International Co Thorsten Holz,Herbert Bos Conference proceedings 20

[復(fù)制鏈接]
樓主: APL
11#
發(fā)表于 2025-3-23 11:16:22 | 只看該作者
MISHIMA: Multilateration of Internet Hosts Hidden Using Malicious Fast-Flux Agents (Short Paper)promised machines that act as proxies to hide the location of the host, commonly referred to as the “mothership,” to/from which they are proxying traffic. Fast-flux botnets pose a serious problem to botnet take-down efforts. The reason is that, while it is typically easy to identify and consequently
12#
發(fā)表于 2025-3-23 15:36:14 | 只看該作者
Code Pointer Masking: Hardening Applications against Code Injection Attacksanaries and protects against attacks that are not addressed by state-of-the-art countermeasures of similar performance. By enforcing the correct semantics of code pointers, we thwart attacks that modify code pointers to divert the application’s control flow. We have implemented a prototype of our so
13#
發(fā)表于 2025-3-23 21:27:15 | 只看該作者
Operating System Interface Obfuscation and the Revealing of Hidden Operationss—rely on knowledge of standard system call interfaces to reason about process execution behavior. In this work, we show how a rootkit can obfuscate a commodity kernel’s system call interfaces to degrade the effectiveness of these tools. Our attack, called ., allows user-level malware to invoke priv
14#
發(fā)表于 2025-3-23 23:01:23 | 只看該作者
15#
發(fā)表于 2025-3-24 02:22:47 | 只看該作者
An Assessment of Overt Malicious Activity Manifest in Residential Networkse” of the user populations (anti-virus and OS software updates) and potential risky behavior (accessing blacklisted URLs). We find that hygiene has little correlation with observed behavior, but risky behavior—which is quite prevalent—more than doubles the likelihood that a system will manifest security issues.
16#
發(fā)表于 2025-3-24 09:21:31 | 只看該作者
Timing Attacks on PIN Input in VoIP Networks (Short Paper)aper shows that a malicious intermediary can recover the inter-keystroke time delay for each PIN input even if the standard encryption mechanism has been applied. The inter-keystroke delay can leak information of what has been typed: Our experiments show that the average search space of a brute force attack on PIN can be reduced by around 80%.
17#
發(fā)表于 2025-3-24 11:02:21 | 只看該作者
Biting the Hand That Serves You: A Closer Look at Client-Side Flash Proxies for Cross-Domain Requestad to potential security problems. We comprehensively explore these problems and conduct a survey of five existing proxy implementation. Furthermore, we propose techniques to avoid the identified security pitfalls and to overcome the untrustworthy interface between the two technologies.
18#
發(fā)表于 2025-3-24 16:18:33 | 只看該作者
19#
發(fā)表于 2025-3-24 21:28:46 | 只看該作者
0302-9743 1.The 11 full papers presented together with two short papers were carefully reviewed and selected from 41intialsubmissions. The papers are organized in topical sections on network security, attacks, Web security, and host security.978-3-642-22423-2978-3-642-22424-9Series ISSN 0302-9743 Series E-ISSN 1611-3349
20#
發(fā)表于 2025-3-25 02:41:09 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-7 20:48
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
汉沽区| 汾西县| 庄浪县| 新巴尔虎右旗| 武平县| 嘉兴市| 宜州市| 平定县| 贵定县| 邳州市| 博乐市| 波密县| 视频| 敖汉旗| 桓台县| 天门市| 遵义市| 洪江市| 吐鲁番市| 霸州市| 霍林郭勒市| 靖江市| 宜兴市| 台中县| 西畴县| 绿春县| 仙游县| 鄂州市| 桦川县| 湖北省| 肥城市| 曲周县| 清原| 灵山县| 华安县| 常州市| 金昌市| 清镇市| 巢湖市| 札达县| 太和县|