文件名称:IEEE Security & Privacy 2013
文件大小:38.12MB
文件格式:RAR
更新时间:2016-06-24 15:20:21
sp2013
A package includes all the papers of sp2013, plus an composition of them.
【文件预览】:
SP2013
----Finding the Linchpins of the Dark Web a Study on Topologically Dedicated Hosts on Malicious Web Infrastructures.pdf(717KB)
----Lucky Thirteen Breaking the TLS and DTLS Record Protocols.pdf(359KB)
----All Your IFCException Are Belong To Us.pdfAll Your IFCException Are Belong To Us.pdf(309KB)
----seL4 from General Purpose to a Proof of Information Flow Enforcement.pdf(684KB)
----Efficient Garbling from a FixedKey Blockcipher.pdf(446KB)
----ObliviStore High Performance Oblivious Cloud Storage.pdf(608KB)
----Ally Friendly Jamming How to Jam Your Enemy and Maintain Your Own Wireless Connectivity at the Same Time.pdf(578KB)
----The Crossfire Attack.pdf(827KB)
----An Ideal-Security Protocol for Order-Preserving Encoding.pdf(750KB)
----Just-In-Time Code Reuse On the Effectiveness of Fine-Grained Address Space Layout Randomization.pdf(722KB)
----SoK Eternal War in Memory.pdf(332KB)
----SoK Secure Data Deletion.pdf(213KB)
----Circuit Structures for Improving Efficiency of Security and Privacy Tools.pdf(533KB)
----PUFs in Security Protocols Attack Models and Security Evaluations.pdf(241KB)
----Design, Implementation and Verification of an eXtensible and Modular Hypervisor Framework .pdf(405KB)
----Practical Control Flow Integrity & Randomization for Binary Executables.pdf(323KB)
----Caveat Coercitor Coercion-Evidence in Electronic Voting.pdf(291KB)
----Zerocoin Anonymous Distributed E-Cash from Bitcoin.pdf(779KB)
----On Limitations of Friendly Jamming for Confidentiality.pdf(804KB)
----Declarative, Temporal, and Practical Programming with Capabilities.pdf(306KB)
----Program, IEEE Symposium on Security and Privacy 2013.pdf(86KB)
----SoK The Evolution of Sybil Defense via Social Networks.pdf(668KB)
----Towards Practical Reactive Security Audit Using Extended Static Checkers.pdf(256KB)
----Ghost Talk Mitigating EMI Signal Injection Attacks against Analog Sensors.pdf(5.25MB)
----A Scanner Darkly Protecting User Privacy From Perceptual Applications.pdf(1.36MB)
----SoK SSL and HTTPS Revisiting Past Challenges and Evaluating Certificate Trust Model Enhancements.pdf(234KB)
----The Parrot is Dead Observing Unobservable Network Communications.pdf(258KB)
----A Hybrid Architecture for Interactive Verifiable Computation.pdf(597KB)
----PrivExec Private Execution as an Operating System Service.pdf(217KB)
----SoK P2PWNED — Modeling and Evaluating the Resilience of Peer-to-Peer Botnets page 097.pdf(395KB)
----sp2013.pdf(17.94MB)
----Practical Timing Side Channel Attacks Against Kernel Space ASLR.pdf(1.65MB)
----Pinocchio Nearly Practical Veriable Computation.pdf(531KB)
----Welcome to the Entropics BootTime Entropy in Embedded Devices.pdf(760KB)
----Anon-Pass Practical Anonymous Subscriptions.pdf(735KB)
----Privacy-Preserving Ridge Regression on Hundreds of Millions of Records.pdf(351KB)
----Implementing TLS with Verified Cryptographic Security.pdf(307KB)
----Trawling for Tor Hidden Services Detection, Measurement, Deanonymization.pdf(470KB)
----Hiding Information in Flash Memory.pdf(460KB)
----Cookieless Monster Exploring the Ecosystem of Web-based Device Fingerprinting.pdf(267KB)