ACM CCS2017论文集 PART2

时间:2021-01-23 09:48:02
【文件属性】:

文件名称:ACM CCS2017论文集 PART2

文件大小:78.47MB

文件格式:RAR

更新时间:2021-01-23 09:48:02

ACM CCS 2017

CCS2017论文集 PART2 The ACM Conference on Computer and Communications Security (CCS) is the flagship annual conference of the Special Interest Group on Security, Audit and Control (SIGSAC) of the Association for Computing Machinery (ACM).


【文件预览】:
CCS2017 PART2
----JITGuard_ Hardening Just-in-time Compilers with SGX.pdf(1.53MB)
----FAME_ Fast Attribute-based Message Encryption.pdf(2.09MB)
----FreeGuard_ A Faster Secure Heap Allocator.pdf(1.12MB)
----Generating Synthetic Decentralized Social Graphs with Local Differential Privacy.pdf(1.32MB)
----Generic Semantic Security against a Kleptographic Adversary.pdf(1.28MB)
----Fairness in an Unfair World_ Fair Multiparty Computation from Public Bulletin Boards.pdf(1.35MB)
----PeGaSus_ Data-Adaptive Differentially Private Stream Processing.pdf(1.6MB)
----FlashGuard_ Leveraging Intrinsic Flash Properties to Defend Against Encryption Ransomware.pdf(1.94MB)
----Evading Classifiers by Morphing in the Dark.pdf(1.35MB)
----IMF_ Inferred Model-based Fuzzer.pdf(1.31MB)
----Object Flow Integrity.pdf(1.53MB)
----Exploiting a Thermal Side Channel for Power Attacks in Multi-Tenant Data Centers.pdf(5.94MB)
----Oblivious Neural Network Predictions via MiniONN transformations.pdf(1.34MB)
----Full accounting for verifiable outsourcing.pdf(1.47MB)
----Most Websites Don’t Need to Vibrate_ A Cost-Benefit Approach to Improving Browser Security.pdf(1.43MB)
----Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection.pdf(2.51MB)
----Hindsight_ Understanding the Evolution of UI Vulnerabilities in Mobile Browsers.pdf(1.68MB)
----On the Power of Optical Contactless Probing_ Attacking Bitstream Encryption of FPGAs.pdf(1.77MB)
----POISED_ Spotting Twitter Spam Off the Beaten Paths.pdf(3.29MB)
----Nonmalleable Information Flow Control.pdf(1.38MB)
----No-Match Attacks and Robust Partnering Definitions — Defining Trivial Attacks for Security Protocols is Not Trivial.pdf(1.25MB)
----Implementing BP-Obfuscation Using Graph-Induced Encoding.pdf(1.66MB)
----Leaky Cauldron on the Dark Land_ Understanding Memory Side-Channel Hazards in SGX.pdf(1.3MB)
----Forward Secure Dynamic Searchable Symmetric Encryption with Efficient Updates.pdf(2.21MB)
----Machine Learning Models that Remember Too Much.pdf(2.71MB)
----Jasmin_ High-Assurance and High-Speed Cryptography.pdf(1.23MB)
----Keep me Updated_ An Empirical Study of Third-Party Library Updatability on Android.pdf(1.15MB)
----Global-Scale Secure Multiparty Computation.pdf(2.32MB)
----FirmUSB_ Vetting USB Device Firmware using Domain Informed Symbolic Execution.pdf(1.46MB)
----New Techniques for Structural Batch Verification in Bilinear Groups with Applications to Groth-Sahai Proofs.pdf(1.39MB)
----Ligero_ Lightweight Sublinear Arguments Without a Trusted Setup.pdf(1.44MB)
----May the Fourth Be With You_ A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519.pdf(1.14MB)
----Homomorphic Secret Sharing_ Optimizations and Applications.pdf(1.29MB)
----Herding Vulnerable Cats_ A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting.pdf(1.24MB)
----Faulds_ A Non-Parametric Iterative Classifier for Internet-Wide OS Fingerprinting.pdf(755KB)
----HACL__ A Verified Modern Cryptographic Library.pdf(1.42MB)
----Key Reinstallation Attacks_ Forcing Nonce Reuse in WPA2.pdf(1.27MB)
----Mass Discovery of Android Traffic Imprints through Instantiated Partial Execution.pdf(1.42MB)
----Malicious-Secure Private Set Intersection via Dual Execution.pdf(1.26MB)
----Hiding in Plain Sight_ A Longitudinal Study of Combosquatting Abuse.pdf(2.96MB)
----Hearing Your Voice Is Not Enough_ An Articulatory Gesture Based Liveness Detection for Voice Authentication.pdf(1.76MB)
----HexType_ Efficient Detection of Type Confusion Errors for C++.pdf(1.37MB)
----Efficient, Constant-Round and Actively Secure MPC_ Beyond the Three-Party Case.pdf(1.29MB)
----Fast Private Set Intersection from Homomorphic Encryption.pdf(1.35MB)
----Iron_ Functional Encryption using Intel SGX.pdf(1.56MB)
----Identity-Based Format-Preserving Encryption.pdf(755KB)
----How Unique is Your .onion_ An Analysis of the Fingerprintability of Tor Onion Services.pdf(4.63MB)
----Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives.pdf(1.33MB)
----Let’s go in for a closer look_ Observing passwords in their natural habitat.pdf(1.44MB)
----MagNet_ a Two-Pronged Defense against Adversarial Examples.pdf(1.54MB)

网友评论