ACM CCS 2017论文集 PART1

时间:2021-01-23 09:47:01
【文件属性】:

文件名称:ACM CCS 2017论文集 PART1

文件大小:72.95MB

文件格式:RAR

更新时间:2021-01-23 09:47:01

ACM CCS 2017

ACM CCS 2017会议论文集 The ACM Conference on Computer and Communications Security (CCS) is the flagship annual conference of the Special Interest Group on Security, Audit and Control (SIGSAC) of the Association for Computing Machinery (ACM).


【文件预览】:
CCS2017 PART1
----Defending Against Key Exfiltration_ Efficiency Improvements for Big-Key Cryptography via Large-Alphabet Subkey Prediction.pdf(1.5MB)
----DEFTL_ Implementing Plausibly Deniable Encryption in Flash Translation Layer.pdf(2.77MB)
----Automated Crowdturfing Attacks and Defenses in Online Review Systems.pdf(2.36MB)
----Algorithm Substitution Attacks from a Steganographic Perspective.pdf(1.25MB)
----Efficient Public Trace-and-Revoke from Standard Assumptions.pdf(1.05MB)
----Concurrency and Privacy with Payment-Channel Networks.pdf(1.63MB)
----Deterministic, Stash-Free Write-Only ORAM.pdf(1.37MB)
----A Type System for Privacy Properties.pdf(1.21MB)
----Betrayal, Distrust, and Rationality_ Smart Counter-Collusion Contracts for Verifiable Cloud Computing.pdf(1.27MB)
----CCCP_ Closed Caption Crypto Phones to Resist MITM Attacks, Human Errors and Click-Through.pdf(1.88MB)
----A Comprehensive Symbolic Analysis of TLS 1.3.pdf(1.14MB)
----Deterministic Browser.pdf(1.09MB)
----A Formal Foundation for Secure Remote Execution of Enclaves.pdf(1.23MB)
----AUTHSCOPE_ Towards Automatic Discovery of Vulnerable Access Control in Online Services.pdf(805KB)
----Bolt_ Anonymous Payment Channels for Decentralized Currencies.pdf(1.35MB)
----Certified Verification of Algebraic Properties on Low-Level Mathematical Constructs in Cryptographic Programs.pdf(1.23MB)
----A Stitch in Time_ Supporting Android Developers in Writing Secure Code.pdf(1.15MB)
----A Touch of Evil_ High-Assurance Cryptographic Hardware from Untrusted Components.pdf(3.72MB)
----Better Bounds for Block Cipher Modes of Operation via Nonce-Based Key Derivation.pdf(1.39MB)
----Checking Open-Source License Violation and 1-day Security Risk at Large Scale.pdf(1.6MB)
----Composing Differential Privacy and Secure Computation_ A case study on scaling private record linkage.pdf(1.4MB)
----Code-reuse attacks for the Web_ Breaking Cross-Site Scripting Mitigations via Script Gadgets.pdf(1MB)
----DUPLO_ Unifying Cut-and-Choose for Garbled Circuits.pdf(1.3MB)
----Compressive Traffic Analysis_ A New Paradigm for Scalable Traffic Analysis.pdf(2.05MB)
----Data breaches, phishing, or malware_ Understanding the risks of stolen credentials.pdf(1.15MB)
----Cryptographically Secure Information Flow Control on Key-Value Stores.pdf(1.53MB)
----Economic Factors of Vulnerability Trade and Exploitation_ Empirical evidence from a prominent Russian cybercrime market.pdf(718KB)
----Designing New Operating Primitives to Improve Fuzzing Performance.pdf(1.42MB)
----Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation.pdf(1.37MB)
----Be Selfish and Avoid Dilemmas_ Fork After Withholding (FAW) Attacks on Bitcoin.pdf(2.4MB)
----Back to the drawing board_ Revisiting the design of optimal location privacy-preserving mechanisms.pdf(2.27MB)
----A Framework for Constructing Fast MPC over Arithmetic Circuits with Malicious Adversaries and an Honest-Majority.pdf(1.49MB)
----Capturing Malware Propagations with Code Injections and Code-Reuse attacks.pdf(1.19MB)
----A Large-Scale Empirical Study of Security Patches.pdf(1.75MB)
----Don’t Let One Rotten Apple Spoil the Whole Barrel_ Towards Automated Detection of Shadowed Domains.pdf(1.11MB)
----Directed Greybox Fuzzing.pdf(1.4MB)
----Attribute-Based Encryption in the Generic Group Model_ Automated Proofs and New Constructions.pdf(1.47MB)
----Distributed Measurement with Private Set-Union Cardinality.pdf(1.41MB)
----Certified Malware_ Measuring Breaches of Trust in the Windows Code-Signing PKI.pdf(1.52MB)
----DIFUZE_ Interface Aware Fuzzing for Kernel Drivers.pdf(1.03MB)
----Client-side Name Collision Vulnerability in the New gTLD Era_ A Systematic Study.pdf(1.01MB)
----DeepLog_ Anomaly Detection and Diagnosis from System Logs through Deep Learning.pdf(1.79MB)
----Detecting Structurally Anomalous Logins Within Enterprise Networks.pdf(1.43MB)
----BBA+_ Improving the Security and Applicability of Privacy-Preserving Point Collection.pdf(1.3MB)
----DolphinAttack_ Inaudible Voice Commands.pdf(1.58MB)
----Better Than Advertised_ Improved Collision-Resistance Guarantees for MD-Based Hash Functions.pdf(1.32MB)
----A Fast and Verified Software Stack for Secure Function Evaluation.pdf(1.38MB)
----Deep Models Under the GAN_ Information Leakage from Collaborative Deep Learning.pdf(2.96MB)
----5Gen-C_ Multi-input Functional Encryption and Program Obfuscation for Arithmetic Circuits.pdf(1.43MB)
----Deemon_ Detecting CSRF with Dynamic Analysis and Property Graphs.pdf(2.82MB)

网友评论

  • ??要密码。。