文件名称:IEEE Symposium on Security & Privacy 2010年论文集(Proceedings of IEEE Symposium on Security & Privacy 2010)
文件大小:19.94MB
文件格式:RAR
更新时间:2013-11-03 07:20:01
论文集 计算机安全 Security&Privacy IEEE Oakland
计算机安全界的*会议IEEE Symposium on Security & Privacy 2010年论文集。关于该会议,可参看相关的介绍: Oakland:95分,全称IEEE Symposium on Security & Privacy,每年都在Oakland召开。之所以不简称S&P,是为了跟一个magazine----IEEE Security & Privacy区分开来。被认为是计算机安全的最高会议,比ACM的CCS更受尊敬。该会自称接受一切与计算机安全的文章,但我感觉其以应用型为主,对理论性的文章尤其crypto-flavor的文章非常排斥。 请注意,本论文集仅为个人整理资料,严禁用于商业或其他用途。
【文件预览】:
IEEE Symposium on, Security & Privacy 2010
----SCiFI - A System for Secure Face Identification.pdf(559KB)
----Message from the Program Chairs.pdf(83KB)
----HyperSafe_ A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity.pdf(305KB)
----ConScript_ Specifying and Enforcing Fine-Grained Security Policies for JavaScript in the Browser.pdf(952KB)
----Author Index.pdf(80KB)
----Experimental Security Analysis of a Modern Automobile.pdf(1.73MB)
----Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes.pdf(468KB)
----A Symbolic Execution Framework for JavaScript.pdf(397KB)
----Investigation of Triangular Spamming_ A Stealthy and Efficient Spamming Technique.pdf(1.02MB)
----Table of Contents.pdf(134KB)
----Towards Static Flow-Based Declassification for Legacy and Untrusted Programs.pdf(534KB)
----On the Incoherencies in Web Browser Access Control Policies.pdf(1.28MB)
----Reconciling Belief and Vulnerability in Information Flow.pdf(402KB)
----Side-Channel Leaks in Web Applications_ A Reality Today, a Challenge Tomorrow.pdf(953KB)
----State of the Art_ Automated Black-Box Web Application Vulnerability Testing.pdf(352KB)
----Identifying Dormant Functionality in Malware Programs.pdf(305KB)
----Tamper Evident Microprocessors.pdf(1.78MB)
----How Good Are Humans at Solving CAPTCHAs_ A Large Scale Evaluation.pdf(2.47MB)
----Outside the Closed World_ On Using Machine Learning for Network Intrusion Detection.pdf(239KB)
----Inspector Gadget_ Automated Extraction of Proprietary Gadgets from Malware Binaries.pdf(964KB)
----TaintScope_ A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection.pdf(351KB)
----Bootstrapping Trust in Commodity Computers.pdf(285KB)
----A Proof-Carrying File System.pdf(639KB)
----Overcoming an Untrusted Computing Base_ Detecting and Removing Malicious Hardware Automatically.pdf(728KB)
----Noninterference through Secure Multi-execution.pdf(281KB)
----TrustVisor_ Efficient TCB Reduction and Attestation.pdf(282KB)
----Scalable Parametric Verification of Secure Systems_ How to Verify Reference Monitors without Worrying about Data Structure Size.pdf(348KB)
----Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures.pdf(420KB)
----Revocation Systems with Very Small Private Keys.pdf(279KB)
----Object Capabilities and Isolation of Untrusted Web Applications.pdf(333KB)
----Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors.pdf(773KB)
----All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask).pdf(271KB)
----A Practical Attack to De-anonymize Social Network Users.pdf(901KB)
----Reflections on the 30th Anniversary of the IEEE Symposium on Security and Privacy.pdf(164KB)
----Message from the General Chair.pdf(106KB)
----Chip and PIN is Broken.pdf(1.41MB)
----Crossing the “Valley of Death”_ Transitioning Research into Commercial Products_ A Personal Perspective.pdf(193KB)
----History of US Government Investments in Cybersecurity Research_ A Personal Perspective.pdf(240KB)