IEEE Symposium on Security & Privacy 2010年论文集(Proceedings of IEEE Symposium on Security & Privacy 2010)

时间:2013-11-03 07:20:01
【文件属性】:

文件名称:IEEE Symposium on Security & Privacy 2010年论文集(Proceedings of IEEE Symposium on Security & Privacy 2010)

文件大小:19.94MB

文件格式:RAR

更新时间:2013-11-03 07:20:01

论文集 计算机安全 Security&Privacy IEEE Oakland

计算机安全界的*会议IEEE Symposium on Security & Privacy 2010年论文集。关于该会议,可参看相关的介绍: Oakland:95分,全称IEEE Symposium on Security & Privacy,每年都在Oakland召开。之所以不简称S&P,是为了跟一个magazine----IEEE Security & Privacy区分开来。被认为是计算机安全的最高会议,比ACM的CCS更受尊敬。该会自称接受一切与计算机安全的文章,但我感觉其以应用型为主,对理论性的文章尤其crypto-flavor的文章非常排斥。 请注意,本论文集仅为个人整理资料,严禁用于商业或其他用途。


【文件预览】:
IEEE Symposium on, Security & Privacy 2010
----SCiFI - A System for Secure Face Identification.pdf(559KB)
----Message from the Program Chairs.pdf(83KB)
----HyperSafe_ A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity.pdf(305KB)
----ConScript_ Specifying and Enforcing Fine-Grained Security Policies for JavaScript in the Browser.pdf(952KB)
----Author Index.pdf(80KB)
----Experimental Security Analysis of a Modern Automobile.pdf(1.73MB)
----Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes.pdf(468KB)
----A Symbolic Execution Framework for JavaScript.pdf(397KB)
----Investigation of Triangular Spamming_ A Stealthy and Efficient Spamming Technique.pdf(1.02MB)
----Table of Contents.pdf(134KB)
----Towards Static Flow-Based Declassification for Legacy and Untrusted Programs.pdf(534KB)
----On the Incoherencies in Web Browser Access Control Policies.pdf(1.28MB)
----Reconciling Belief and Vulnerability in Information Flow.pdf(402KB)
----Side-Channel Leaks in Web Applications_ A Reality Today, a Challenge Tomorrow.pdf(953KB)
----State of the Art_ Automated Black-Box Web Application Vulnerability Testing.pdf(352KB)
----Identifying Dormant Functionality in Malware Programs.pdf(305KB)
----Tamper Evident Microprocessors.pdf(1.78MB)
----How Good Are Humans at Solving CAPTCHAs_ A Large Scale Evaluation.pdf(2.47MB)
----Outside the Closed World_ On Using Machine Learning for Network Intrusion Detection.pdf(239KB)
----Inspector Gadget_ Automated Extraction of Proprietary Gadgets from Malware Binaries.pdf(964KB)
----TaintScope_ A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection.pdf(351KB)
----Bootstrapping Trust in Commodity Computers.pdf(285KB)
----A Proof-Carrying File System.pdf(639KB)
----Overcoming an Untrusted Computing Base_ Detecting and Removing Malicious Hardware Automatically.pdf(728KB)
----Noninterference through Secure Multi-execution.pdf(281KB)
----TrustVisor_ Efficient TCB Reduction and Attestation.pdf(282KB)
----Scalable Parametric Verification of Secure Systems_ How to Verify Reference Monitors without Worrying about Data Structure Size.pdf(348KB)
----Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures.pdf(420KB)
----Revocation Systems with Very Small Private Keys.pdf(279KB)
----Object Capabilities and Isolation of Untrusted Web Applications.pdf(333KB)
----Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors.pdf(773KB)
----All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask).pdf(271KB)
----A Practical Attack to De-anonymize Social Network Users.pdf(901KB)
----Reflections on the 30th Anniversary of the IEEE Symposium on Security and Privacy.pdf(164KB)
----Message from the General Chair.pdf(106KB)
----Chip and PIN is Broken.pdf(1.41MB)
----Crossing the “Valley of Death”_ Transitioning Research into Commercial Products_ A Personal Perspective.pdf(193KB)
----History of US Government Investments in Cybersecurity Research_ A Personal Perspective.pdf(240KB)

网友评论

  • *会议论文,好厉害,楼主哪里下到的呀?
  • *论文,非看不可,很难得的资源
  • 这个是之前我们这边的doc下的,他说还可以
  • 整理的很好,安全研究方向的必看。感谢楼主!
  • 东西很全面,我也是找了很久都没找到,非常感谢楼主的分享
  • very good!在学校数字图书馆资源上也要找半天,在这全齐了!学安全的研究生要多看看!
  • 整理的很好,不需要一篇一篇找了,安全研究方向的需要经常看看前沿的东西
  • 安全类*会议ranking = 1 SP很偏重practice;CCS理论和practice兼重,但还是实际的多些;CRYPTO和ECRYPTO都是理论。
  • 太有用了,不用一篇篇去下了。*安全会议。
  • 安全会议里面最好的会,必看