文件名称:SS 2011-USENIX Security Symposium 2011年论文集
文件大小:28.86MB
文件格式:RAR
更新时间:2014-09-28 07:37:22
USENIX 网络安全 计算机安全 Security 2011
(我现在主要在CSDN上整理计算机安全、软件工程(可信软件)、系统及通信方面的论文及相关理论书籍,如果对这方面内容感兴趣,可以访问:http://qysh123.download.csdn.net/ 查看我上传的所有资料。内容比较多,需要大家人工手动查找。另外,资料顺序并不按照时间排列,只是想起来了就上传。请大家见谅。) 计算机安全界会议USENIX Security Symposium 2011年的会议论文集,关于该会议,可参考下面的介绍: USENIX Security:91分。USENIX是systems research方面的重要组织,主办了systems方面的若干重要会议,如OSDI(操作系统的第二会议)等。USENIX Security Symposium则是systems security的著名会议,文章基本陷于hardcore systems类型。
【文件预览】:
SS 2011-USENIX Security Symposium 2011
----Analysis of Deployed Systems()
--------Dark Clouds on the Horizon_ Using Cloud Storage as Attack Vector and Online Slack Space.pdf(322KB)
--------Why (Special Agent) Johnny (Still) Can't Encrypt_ A Security Analysis of the APCO Project 25 Two-Way Radio System.pdf(9.16MB)
--------Comprehensive Experimental Analyses of Automotive Attack Surfaces.pdf(1.14MB)
----Web Security()
--------ZOZZLE_ Fast and Precise In-Browser JavaScript Malware Detection.pdf(2.28MB)
--------Toward Secure Embedded Web Interfaces.pdf(1.06MB)
--------Fast and Precise Sanitizer Analysis with BEK.pdf(460KB)
----Dealing with Malware and Bots()
--------BOTMAGNIFIER_ Locating Spambots on the Internet.pdf(287KB)
--------JACKSTRAWS_ Picking Command and Control Connections from Bot Traffic.pdf(394KB)
--------Detecting Malware Domains at the Upper DNS Hierarchy.pdf(1.14MB)
----Forensic Analysis()
--------mCarve_ Carving Attributed Dump Sets.pdf(258KB)
--------Forensic Triage for Mobile Phones with DEC0DE.pdf(991KB)
--------SHELLOS_ Enabling Fast Detection and Forensic Analysis of Code Injection Attacks.pdf(523KB)
----Static and Dynamic Analysis()
--------ADsafety_ Type-Based Verification of JavaScript Sandboxing.pdf(225KB)
--------Static Detection of Access Control Vulnerabilities in Web Applications.pdf(651KB)
--------MACE_ Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery.pdf(211KB)
----Applied Cryptography()
--------Outsourcing the Decryption of ABE Ciphertexts.pdf(900KB)
--------Faster Secure Two-Party Computation Using Garbled Circuits.pdf(415KB)
--------Differential Privacy Under Fire.pdf(278KB)
----Understanding Attacks()
--------Q_ Exploit Hardening Made Easy.pdf(685KB)
--------SMS of Death_ From Analyzing to Attacking Mobile Phones on a Large Scale.pdf(368KB)
--------Cloaking Malware with the Trusted Platform Module.pdf(256KB)
----Securing Smart Phones()
--------A Study of Android Application Security.pdf(461KB)
--------Permission Re-Delegation_ Attacks and Defenses.pdf(1004KB)
--------QUIRE_ Lightweight Provenance for Smart Phone Operating Systems.pdf(1.2MB)
----Defenses and New Directions()
--------Secure In-Band Wireless Pairing.pdf(428KB)
--------Bubble Trouble_ Off-Line De-Anonymization of Bubble Forms.pdf(423KB)
--------TRESOR Runs Encryption Securely Outside RAM.pdf(268KB)
----Understanding the Underground Economy()
--------Show Me the Money_ Characterizing Spam-advertised Revenue.pdf(1.86MB)
--------Dirty Jobs_ The Role of Freelance Labor in Web Service Abuse.pdf(350KB)
--------Measuring Pay-per-Install_ The Commoditization of Malware Distribution.pdf(1.32MB)
----Privacy- and Freedom-Enhancing Technologies()
--------PIR-Tor_ Scalable Anonymous Communication Using Private Information Retrieval.pdf(517KB)
--------Telex_ Anticensorship in the Network Infrastructure.pdf(2.37MB)
--------The Phantom Tollbooth_ Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion.pdf(636KB)