文件名称:ACM CCS2017论文集 PART3
文件大小:85.1MB
文件格式:RAR
更新时间:2021-01-23 09:52:16
ACM CCS 2017
ACM CCS2017论文集 PART3 The ACM Conference on Computer and Communications Security (CCS) is the flagship annual conference of the Special Interest Group on Security, Audit and Control (SIGSAC) of the Association for Computing Machinery (ACM).
【文件预览】:
CCS2017 PART3
----Practical Secure Aggregation for Privacy-Preserving Machine Learning.pdf(1.69MB)
----The TypTop System_ Personalized Typo-tolerant Password Checking.pdf(1.2MB)
----Unleashing the Walking Dead_ Understanding Cross-App Remote Infections on Mobile WebViews.pdf(1.87MB)
----Why Do Developers Get Password Storage Wrong_ A Qualitative Usability Study.pdf(2.36MB)
----Quantifying the Pressure of Legal Risks on Third-party Vulnerability Research.pdf(1.85MB)
----SGX-BigMatrix_ A Practical Encrypted Data Analytic Framework With Trusted Processors.pdf(1.35MB)
----Where the Wild Warnings Are_ Root Causes of Chrome HTTPS Certificate Errors.pdf(1.2MB)
----Presence Attestation_ The Missing Link In Dynamic Trust Bootstrapping.pdf(2.05MB)
----Rewriting History_ Changing the Archived Web from the Present.pdf(1.78MB)
----Querying for Queries_ Indexes of Queries for Efficient and Expressive IT-PIR.pdf(1.37MB)
----Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives.pdf(1.41MB)
----To BLISS-B or not to be - Attacking strongSwan’s Implementation of Post-Quantum Signatures.pdf(1.29MB)
----Synthesis of Probabilistic Privacy Enforcement.pdf(1.45MB)
----walk2friends_ Inferring Social Links from Mobility Profiles.pdf(2.28MB)
----Side-Channel Attacks on BLISS Lattice-Based Signatures_ Exploiting Branch Tracing Against strongSwan and Electromagnetic Emanations in Microcontrollers.pdf(1.77MB)
----T_Key_ Second-Factor Authentication From Secure Hash Chains.pdf(1.5MB)
----Use Privacy in Data-Driven Systems_ Theory and Experiments with Machine Learnt Programs.pdf(1.58MB)
----Vulnerable Implicit Service_ A Revisit.pdf(1.19MB)
----The Dynamics of Innocent Flesh on the Bone_ Code Reuse Ten Years Later.pdf(1.34MB)
----Provably-Secure Logic Locking_ From Theory To Practice.pdf(7.94MB)
----Zero-Knowledge Contingent Payments Revisited_ Attacks and Payments for Services.pdf(1.22MB)
----The Wolf of Name Street_ Hijacking Domains Through Their Nameservers.pdf(1.49MB)
----RAIN_ Refinable Attack Investigation with On-demand Inter-Process Information Flow Tracking.pdf(1.52MB)
----Stacco_ Differentially Analyzing Side-Channel Traces for Detecting SSL_TLS Vulnerabilities in Secure Enclaves.pdf(1.36MB)
----The Return of Coppersmith’s Attack_ Practical Factorization of Widely Used RSA Moduli.pdf(1.83MB)
----Rise of the HaCRS_ Augmenting Autonomous Cyber Reasoning Systems with Human Assistance.pdf(1.17MB)
----Pool_ Scalable On-Demand Secure Computation Service Against Malicious Adversaries.pdf(3.06MB)
----PtrSplit_ Supporting general pointers in automatic program partitioning.pdf(1.54MB)
----The ART of App Compartmentalization_ Compiler-based Library Privilege Separation on Stock Android.pdf(1.17MB)
----Revive_ Rebalancing Off-Blockchain Payment Networks.pdf(1.2MB)
----Verifying Security Policies in Multi-agent Workflows with Loops.pdf(1.16MB)
----SemFuzz_ Semantics-based Automatic Generation of Proof-of-Concept Exploits.pdf(1.96MB)
----Predicting the Risk of Cyber Incidents.pdf(1.32MB)
----Solidus_ Confidential Distributed Ledger Transactions via PVORM.pdf(1.32MB)
----Tail Attacks on Web Applications.pdf(1.28MB)
----Watch Me, but Don’t Touch Me! Contactless Control Flow Monitoring via Electromagnetic Emanations.pdf(4.73MB)
----Viden_ Attacker Identification on In-Vehicle Networks.pdf(1.66MB)
----VibWrite_ Towards Finger-input Authentication on Ubiquitous Surfaces via Physical Vibration.pdf(3.42MB)
----Practical UC-Secure Delegatable Credentials with Attributes and Their Application to Blockchain.pdf(1.4MB)
----TinyOLE_ Efficient Actively Secure Two-Party Computation from Oblivious Linear Function Evaluation.pdf(1.31MB)
----Practical Attacks Against Graph-based Clustering.pdf(1.81MB)
----S3ORAM_ A Computation-Efficient and Constant Client Bandwidth Blowup ORAM with Shamir Secret Sharing.pdf(1.6MB)
----SlowFuzz_ Automated Domain-Independent Detection of Algorithmic Complexity Vulnerabilities.pdf(1.06MB)
----The Waterfall of Liberty_ Decoy Routing Circumvention that Resists Routing Attacks.pdf(1.7MB)
----Practical Graphs for Optimal Side-Channel Resistant Memory-Hard Functions.pdf(1.33MB)
----Precise Detection of Side-Channel Vulnerabilities using Quantitative Cartesian Hoare Logic.pdf(1.34MB)
----Verified Correctness and Security of mbedTLS HMAC-DRBG.pdf(1.17MB)
----Scaling ORAM for Secure Computation.pdf(2.13MB)
----Standardizing Bad Cryptographic Practice - A teardown of the IEEE standard for protecting electronic-design intellectual property.pdf(1.86MB)
----Practical Multi-party Private Set Intersection from Symmetric-Key Techniques.pdf(1.24MB)
----Practical Quantum-Safe Voting from Lattices.pdf(1.33MB)