文件名称:ISOC Network and Distributed System Security Symposium(NDSS) 2010年论文集
文件大小:9.4MB
文件格式:RAR
更新时间:2014-02-07 05:00:18
论文集 计算机安全 NDSS 网络安全 北大
(我现在主要在CSDN上整理计算机安全、系统及通信方面的论文及相关理论书籍,如果对这方面内容感兴趣,可以访问:http://qysh123.download.csdn.net/ 查看我上传的所有资料。内容比较多,需要大家人工手动查找。另外,资料顺序并不按照时间排列,只是想起来了就上传。CSDN这套系统不敢恭维,也请大家见谅。) 计算机安全界的会议ISOC Network and Distributed System Security Symposium (NDSS)2010年的文章,ISOC是互联网领域最专业组织之一,NDSS也是安全界较为重要的国际会议。特别值得一提的是北大的王铁磊同学,继2009年在NDSS上发表一篇文章之后,2010年在SP上获得了最佳学生论文奖。值得我们学习的榜样啊!
【文件预览】:
2010
----Spam()
--------Improving Spam Blacklisting Through Dynamic Thresholding and Speculative Aggregation.pdf(573KB)
--------Botnet Judo_ Fighting Spam with Itself.pdf(1.72MB)
--------On Network-level Clusters for Spam Detection.pdf(716KB)
----Intrusion Detection and Attack Analysis()
--------A Systematic Characterization of IM Threats using Honeypots.pdf(337KB)
--------Large-Scale Automatic Classification of Phishing Pages.pdf(195KB)
--------Effective Anomaly Detection with Scarce Training Data.pdf(551KB)
----Languages and Systems Security()
--------Where Do You Want to Go Today_ Escalating Privileges by Pathname Manipulation.pdf(233KB)
--------Preventing Capability Leaks in Secure JavaScript Subsets.pdf(259KB)
--------Joe-E_ A Security-Oriented Subset of Java.pdf(314KB)
----Web Security and Privacy()
--------Adnostic_ Privacy Preserving Targeted Advertising.pdf(266KB)
--------Protecting Browsers from Extension Vulnerabilities.pdf(439KB)
--------FLAX_ Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications.pdf(879KB)
----Anonymity and Cryptographic Systems()
--------A3_ An Extensible Platform for Application-Aware Anonymity.pdf(411KB)
--------Contractual Anonymity.pdf(262KB)
--------When Good Randomness Goes Bad_ Virtual Machine Reset Vulnerabilities and Hedging Deployed.pdf(296KB)
----Malware()
--------Automatic Reverse Engineering of Data Structures from Binary Execution.pdf(367KB)
--------Binary Code Extraction and Interface Identification for Security Applications.pdf(421KB)
--------Efficient Detection of Split Personalities in Malware.pdf(154KB)
----Security Protocols and Policies()
--------A Security Evaluation of DNSSEC with NSEC3.pdf(362KB)
--------On the Safety of Enterprise Policy Deployment.pdf(314KB)
--------InvisiType_ Object-Oriented Security Policies.pdf(376KB)
----Distributed Systems and Networks()
--------Server-side Verification of Client Behavior in Online Games.pdf(289KB)
--------Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs.pdf(942KB)
--------Stealth DoS Attacks on Secure Channels.pdf(690KB)