找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Information Security Applications; 15th International W Kyung-Hyune Rhee,Jeong Hyun Yi Conference proceedings 2015 Springer International P

[復制鏈接]
樓主: Autopsy
31#
發(fā)表于 2025-3-26 21:43:11 | 只看該作者
Detection of Heap-Spraying Attacks Using String Trace Grapha . by tracing all string objects and string operations in JavaScript. The graph is used for detecting abnormal behaviors of JavaScript. We detect heap-spraying attacks with low false positive rate and overheads.
32#
發(fā)表于 2025-3-27 02:28:56 | 只看該作者
33#
發(fā)表于 2025-3-27 08:48:11 | 只看該作者
New Integrated Long-Term Glimpse of RC4correlations between two consecutive output keystreams and a state location, called long-term Glimpse. In this paper, we show a new long-term Glimpse and integrate both the new and the previous long-term Glimpse into a whole.
34#
發(fā)表于 2025-3-27 10:51:53 | 只看該作者
Conference proceedings 2015papers are organized in topical sections such as malware detection; mobile security; vulnerability analysis; applied cryptography; network security; cryptography; hardware security; and critical infrastructure security and policy.
35#
發(fā)表于 2025-3-27 14:30:01 | 只看該作者
Before Unrooting your Android Phone, Patching up Permission System First!r wants to unroot his phone and get his phone under protection. The scheme can apply to any version of Android system. In order to facilitate the scheme’s deployment, we develop an app to automatically do the patching work. Moreover, the evaluation result shows that the scheme is small-footprint and only introduces 1.8?% overhead.
36#
發(fā)表于 2025-3-27 17:48:53 | 只看該作者
Improved Modular Multiplication for Optimal Prime Fieldshow that the proposed OPF-CIOC method outperforms the previous best known results in ACNS’14 by a factor of 5?%. Furthermore, our method is implemented in a regular way which helps to reduce the leakage of side-channel information.
37#
發(fā)表于 2025-3-27 23:43:32 | 只看該作者
Reconstructing and Visualizing Evidence of Artifact from Firefox SessionStorageportant..In this paper, we experimented to retrieve the artifacts left by WebStorage feature for the Web browser for personal computer from the file system. In addition, we implemented a tool that constructs and visualizes the evidence from the artifacts.
38#
發(fā)表于 2025-3-28 05:44:00 | 只看該作者
39#
發(fā)表于 2025-3-28 06:19:53 | 只看該作者
I’ve Got Your Number: on average), and a large portion of KakaoTalk users (around 73?%) uses their real names as display names. Finally, we suggest reasonable countermeasures to mitigate the discovered attacks, which have been confirmed and patched by the developers.
40#
發(fā)表于 2025-3-28 12:30:32 | 只看該作者
 關于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學 Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點評 投稿經(jīng)驗總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學 Yale Uni. Stanford Uni.
QQ|Archiver|手機版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-20 17:44
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權所有 All rights reserved
快速回復 返回頂部 返回列表
荣昌县| 腾冲县| 突泉县| 平凉市| 三穗县| 阳山县| 将乐县| 霍州市| 个旧市| 灵川县| 宝清县| 九江县| 静宁县| 贵德县| 行唐县| 繁峙县| 噶尔县| 图们市| 福鼎市| 淮滨县| 宜良县| 通化县| 金乡县| 德江县| 五峰| 景谷| 扎鲁特旗| 罗城| 怀宁县| 奉化市| 周口市| 绥江县| 永兴县| 璧山县| 崇仁县| 左权县| 宁河县| 轮台县| 甘孜县| 延川县| 搜索|