文件名称:SP 2013-IEEE Symposium on Security & Privacy 2013年论文集
文件大小:38.93MB
文件格式:ZIP
更新时间:2016-06-28 04:19:49
IEEE 2013 网络安全 SP Security
(我现在主要在CSDN上整理计算机安全、软件工程(可信软件)、系统及通信方面的论文及相关理论书籍,如果对这方面内容感兴趣,可以访问:http://download.csdn.net/user/qysh123 查看我上传的所有资料。内容比较多,需要大家人工手动查找。另外,资料顺序并不按照时间排列,只是想起来了就上传。请大家见谅。) 计算机、网络安全界的*会议IEEE Symposium on Security & Privacy 2013年论文集。关于该会议,可参看相关的介绍: Oakland:95分,全称IEEE Symposium on Security & Privacy,每年都在Oakland召开。之所以不简称S&P,是为了跟一个magazine----IEEE Security & Privacy区分开来。被认为是计算机安全的最高会议,比ACM的CCS更受尊敬。该会自称接受一切与计算机安全的文章,但我感觉其以应用型为主,对理论性的文章尤其crypto-flavor的文章非常排斥。 这里一共收录了2013年SP的13个Session,共计38篇论文,其中包括5片SoK(systematization of knowledge,意为对已有的知识和技术进行系统化总结的文章)论文。这里特别感谢CSDN ID为triumphyuan的网友提供资源。欢迎大家下载。
【文件预览】:
SP 2013
----Finding the Linchpins of the Dark Web a Study on Topologically Dedicated Hosts on Malicious Web Infrastructures.pdf(717KB)
----Lucky Thirteen Breaking the TLS and DTLS Record Protocols.pdf(359KB)
----All Your IFCException Are Belong To Us.pdfAll Your IFCException Are Belong To Us.pdf(309KB)
----seL4 from General Purpose to a Proof of Information Flow Enforcement.pdf(684KB)
----Efficient Garbling from a FixedKey Blockcipher.pdf(446KB)
----ObliviStore High Performance Oblivious Cloud Storage.pdf(608KB)
----Ally Friendly Jamming How to Jam Your Enemy and Maintain Your Own Wireless Connectivity at the Same Time.pdf(578KB)
----The Crossfire Attack.pdf(827KB)
----An Ideal-Security Protocol for Order-Preserving Encoding.pdf(750KB)
----Just-In-Time Code Reuse On the Effectiveness of Fine-Grained Address Space Layout Randomization.pdf(722KB)
----SoK Eternal War in Memory.pdf(332KB)
----SoK Secure Data Deletion.pdf(213KB)
----Circuit Structures for Improving Efficiency of Security and Privacy Tools.pdf(533KB)
----PUFs in Security Protocols Attack Models and Security Evaluations.pdf(241KB)
----Design, Implementation and Verification of an eXtensible and Modular Hypervisor Framework .pdf(405KB)
----Practical Control Flow Integrity & Randomization for Binary Executables.pdf(323KB)
----Caveat Coercitor Coercion-Evidence in Electronic Voting.pdf(291KB)
----Zerocoin Anonymous Distributed E-Cash from Bitcoin.pdf(779KB)
----On Limitations of Friendly Jamming for Confidentiality.pdf(804KB)
----Declarative, Temporal, and Practical Programming with Capabilities.pdf(306KB)
----Program, IEEE Symposium on Security and Privacy 2013.pdf(86KB)
----SoK The Evolution of Sybil Defense via Social Networks.pdf(668KB)
----Towards Practical Reactive Security Audit Using Extended Static Checkers.pdf(256KB)
----Ghost Talk Mitigating EMI Signal Injection Attacks against Analog Sensors.pdf(5.25MB)
----A Scanner Darkly Protecting User Privacy From Perceptual Applications.pdf(1.36MB)
----SoK SSL and HTTPS Revisiting Past Challenges and Evaluating Certificate Trust Model Enhancements.pdf(234KB)
----The Parrot is Dead Observing Unobservable Network Communications.pdf(258KB)
----A Hybrid Architecture for Interactive Verifiable Computation.pdf(597KB)
----PrivExec Private Execution as an Operating System Service.pdf(217KB)
----SoK P2PWNED — Modeling and Evaluating the Resilience of Peer-to-Peer Botnets page 097.pdf(395KB)
----sp2013.pdf(17.94MB)
----Practical Timing Side Channel Attacks Against Kernel Space ASLR.pdf(1.65MB)
----Pinocchio Nearly Practical Veriable Computation.pdf(531KB)
----Welcome to the Entropics BootTime Entropy in Embedded Devices.pdf(760KB)
----Anon-Pass Practical Anonymous Subscriptions.pdf(735KB)
----Privacy-Preserving Ridge Regression on Hundreds of Millions of Records.pdf(351KB)
----Implementing TLS with Verified Cryptographic Security.pdf(307KB)
----Trawling for Tor Hidden Services Detection, Measurement, Deanonymization.pdf(470KB)
----Hiding Information in Flash Memory.pdf(460KB)
----Cookieless Monster Exploring the Ecosystem of Web-based Device Fingerprinting.pdf(267KB)