文件名称:USENIX Security Symposium 2009年论文集(USENIX Security 2009)
文件大小:16.72MB
文件格式:RAR
更新时间:2014-05-01 04:13:09
论文集 计算机安全 USENIX 安全 security
(我现在主要在CSDN上整理计算机安全、系统及通信方面的论文及相关理论书籍,如果对这方面内容感兴趣,可以访问:http://qysh123.download.csdn.net/ 查看我上传的所有资料。内容比较多,需要大家人工手动查找。另外,资料顺序并不按照时间排列,只是想起来了就上传。CSDN这套系统不敢恭维,也请大家见谅。) 计算机安全界会议USENIX Security Symposium 2009年的会议论文集,关于该会议,可参考下面的介绍: USENIX Security:91分。USENIX是systems research方面的重要组织,主办了systems方面的若干重要会议,如OSDI(操作系统的第二会议)等。USENIX Security Symposium则是systems security的著名会议,文章基本陷于hardcore systems类型。
【文件预览】:
USENIX Security Symposium 2009
----Browser Security()
--------The Multi-Principal OS Construction of the Gazelle Web Browser.pdf(255KB)
--------Crying Wolf_ An Empirical Study of SSL Warning Effectiveness.pdf(490KB)
----Radio()
--------CCCP_ Secure Remote Storage for Computational RFIDs.pdf(207KB)
--------Physical-layer Identification of RFID Devices.pdf(913KB)
--------Jamming-resistant Broadcast Communication without Shared Keys.pdf(625KB)
----Securing Web Apps()
--------Nemesis_ Preventing Authentication & Access Control Vulnerabilities in Web Applications.pdf(443KB)
--------Static Enforcement of Web Application Integrity Through Strong Typing.pdf(483KB)
--------Slide_xBook_ Redesigning Privacy Control in Social Networking Platforms.pdf(1.84MB)
--------xBook_ Redesigning Privacy Control in Social Networking Platforms.pdf(1.88MB)
----Applied Crypto()
--------Vanish_ Increasing Data Privacy with Self-Destructing Data.pdf(794KB)
--------VPriv_ Protecting Privacy in Location-Based Vehicular Services.pdf(388KB)
--------Efficient Data Structures for Tamper-Evident Logging.pdf(216KB)
----Network Security()
--------Improving Tor using a TCP-over-DTLS Tunnel.pdf(1.76MB)
--------Detecting Spammers with SNARE_ Spatio-temporal Network-level Automatic Reputation Engine.pdf(539KB)
--------Locating Prefix Hijackers using LOCK.pdf(219KB)
----JavaScript Security()
--------GATEKEEPER_ Mostly Static Enforcement of Security and Reliability Policies for JavaScript Code.pdf(835KB)
--------Memory Safety for Low-Level Software Hardware Interactions.pdf(306KB)
--------Cross-Origin JavaScript Capability Leaks_ Detection, Exploitation, and Defense.pdf(232KB)
--------Proceedings, with Corrigendum, of all papers in this session sec09_javascript.pdf(1.38MB)
----Malware Detection and Protection()
--------Protecting Confidential Data on Personal Computers with Storage Capsules.pdf(142KB)
--------Effective and Efficient Malware Detection at the End Host.pdf(492KB)
--------Return-Oriented Rootkits_ Bypassing Kernel Code Integrity Protection Mechanisms.pdf(362KB)
----Attacks on Privacy()
--------Peeping Tom in the Neighborhood_ Keystroke Eavesdropping on Multi-User Systems.pdf(457KB)
--------Compromising Electromagnetic Emanations of Wired and Wireless Keyboards.pdf(1.45MB)
--------A Practical Congestion Attack on Tor Using Long Paths.pdf(1.42MB)
----Memory Safety()
--------Baggy Bounds Checking_ An Efficient and Backwards-Compatible Defense against Out-of-Bounds Errors.pdf(1.04MB)
--------NOZZLE_ A Defense Against Heap-spraying Code Injection Attacks.pdf(768KB)
--------Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs.pdf(221KB)