找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Detection of Intrusions and Malware, and Vulnerability Assessment; 8th International Co Thorsten Holz,Herbert Bos Conference proceedings 20

[復(fù)制鏈接]
樓主: APL
11#
發(fā)表于 2025-3-23 11:16:22 | 只看該作者
MISHIMA: Multilateration of Internet Hosts Hidden Using Malicious Fast-Flux Agents (Short Paper)promised machines that act as proxies to hide the location of the host, commonly referred to as the “mothership,” to/from which they are proxying traffic. Fast-flux botnets pose a serious problem to botnet take-down efforts. The reason is that, while it is typically easy to identify and consequently
12#
發(fā)表于 2025-3-23 15:36:14 | 只看該作者
Code Pointer Masking: Hardening Applications against Code Injection Attacksanaries and protects against attacks that are not addressed by state-of-the-art countermeasures of similar performance. By enforcing the correct semantics of code pointers, we thwart attacks that modify code pointers to divert the application’s control flow. We have implemented a prototype of our so
13#
發(fā)表于 2025-3-23 21:27:15 | 只看該作者
Operating System Interface Obfuscation and the Revealing of Hidden Operationss—rely on knowledge of standard system call interfaces to reason about process execution behavior. In this work, we show how a rootkit can obfuscate a commodity kernel’s system call interfaces to degrade the effectiveness of these tools. Our attack, called ., allows user-level malware to invoke priv
14#
發(fā)表于 2025-3-23 23:01:23 | 只看該作者
15#
發(fā)表于 2025-3-24 02:22:47 | 只看該作者
An Assessment of Overt Malicious Activity Manifest in Residential Networkse” of the user populations (anti-virus and OS software updates) and potential risky behavior (accessing blacklisted URLs). We find that hygiene has little correlation with observed behavior, but risky behavior—which is quite prevalent—more than doubles the likelihood that a system will manifest security issues.
16#
發(fā)表于 2025-3-24 09:21:31 | 只看該作者
Timing Attacks on PIN Input in VoIP Networks (Short Paper)aper shows that a malicious intermediary can recover the inter-keystroke time delay for each PIN input even if the standard encryption mechanism has been applied. The inter-keystroke delay can leak information of what has been typed: Our experiments show that the average search space of a brute force attack on PIN can be reduced by around 80%.
17#
發(fā)表于 2025-3-24 11:02:21 | 只看該作者
Biting the Hand That Serves You: A Closer Look at Client-Side Flash Proxies for Cross-Domain Requestad to potential security problems. We comprehensively explore these problems and conduct a survey of five existing proxy implementation. Furthermore, we propose techniques to avoid the identified security pitfalls and to overcome the untrustworthy interface between the two technologies.
18#
發(fā)表于 2025-3-24 16:18:33 | 只看該作者
19#
發(fā)表于 2025-3-24 21:28:46 | 只看該作者
0302-9743 1.The 11 full papers presented together with two short papers were carefully reviewed and selected from 41intialsubmissions. The papers are organized in topical sections on network security, attacks, Web security, and host security.978-3-642-22423-2978-3-642-22424-9Series ISSN 0302-9743 Series E-ISSN 1611-3349
20#
發(fā)表于 2025-3-25 02:41:09 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-7 20:48
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
马公市| 杭锦后旗| 拉萨市| 行唐县| 阳城县| 湄潭县| 周口市| 大洼县| 峨山| 江都市| 凤冈县| 卓尼县| 马尔康县| 饶河县| 榆树市| 乾安县| 西充县| 桂林市| 临汾市| 昌吉市| 兴安县| 怀仁县| 西昌市| 江孜县| 施秉县| 盐山县| 朝阳市| 四平市| 潞城市| 大连市| 泗阳县| 江都市| 普陀区| 穆棱市| 石城县| 安义县| 新干县| 长泰县| 锡林郭勒盟| 赤水市| 沈丘县|