امتیاز موضوع:
  • 1 رأی - میانگین امتیازات: 5
  • 1
  • 2
  • 3
  • 4
  • 5
جلسات فنی USENIX Security
نویسنده پیام
nImaarek آفلاین
badtrip
****

ارسال‌ها: 144
موضوع‌ها: 61
تاریخ عضویت: مهر ۱۳۸۹

تشکرها : 310
( 317 تشکر در 108 ارسال )
ارسال: #1
جلسات فنی USENIX Security
سلام،

هفدهمین کنفرانس USENIX Security تموم شد و مقالات های ارایه شد در 16 ماه August امسال در دسترس عموم قرار گرفت..

موضوعات ارایه شده میتونید در فایل زیر ببینید :

کد:
https://www.usenix.org/sites/default/files/sec17_contents.pdf

برای دانلود مقالات هم میتونید به این صفحه مراجعه کنید:

کد:
https://www.usenix.org/node/203932

موضوعات کلی و یک سری از موضوعات مربوط به وب، امنیت نرم افزار و بدافزار جدا کردم:
نقل قول: Bug Finding I
 How Double-Fetch Situations turn into Double-Fetch Vulnerabilities: A Study of Double Fetches in the Linux Kernel
 Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts
 Ninja: Towards Transparent Tracing and Debugging on ARM


Side-Channel Attacks I
 ...


Systems Security I
 Neural Nets Can Learn Function Type Signatures From Binaries
 CAn’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory
 Efficient Protection of Path-Sensitive Control Security
 
 
Bug Finding II
 Digtool: A Virtualization-Based Framework for Detecting Kernel Vulnerabilities
 kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels
 Venerable Variadic Vulnerabilities Vanquished


Side-Channel Countermeasures
 ...
 
 
Malware and Binary Analysis
 BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking
 PlatPal: Detecting Malicious Documents with Platform Diversity
 Malton: Towards On-Device Non-Invasive Mobile Malware Analysis for ART


Censorship
 ...


Embedded Systems
 ...
 
 
Networking Security
 ...
 
 
Targeted Attacks
 ...
 
 
Trusted Hardware
 ...
 
 
Authentication
 ...
 
 
Malware and Obfuscation
 Transcend: Detecting Concept Drift in Malware Classification Models
 Syntia: Synthesizing the Semantics of Obfuscated Code
 Predicting the Resilience of Obfuscated Code Against Symbolic Execution Attacks via Machine Learning

 
Web Security I
 Extension Breakdown: Security Analysis of Browsers Extension Resources Control Policies
 CCSP: Controlled Relaxation of Content Security Policies by Runtime Policy Composition
 Same-Origin Policy: Evaluation in Modern Browsers
 
 
Privacy
 ...
 
 
Systems Security II
 BootStomp: On the Security of Bootloaders in Mobile Devices
 Seeing Through The Same Lens: Introspecting Guest Address Space At Native Speed
 Oscar: A Practical Page-Permissions-Based Scheme for Thwarting Dangling Pointers

 
Web Security II
 PDF Mirage: Content Masking Attack Against Information-Based Online Services
 Loophole: Timing Attacks on Shared Event Loops in Chrome
 Game of Registrars: An Empirical Analysis of Post-Expiration Domain Name Takeovers
 
 
Applied Cryptography
 ...
 
 
Web Security III
 Exploring User Perceptions of Discrimination in Online Targeted Advertising
 Measuring the Insecurity of Mobile Deep Links of Android
 How the Web Tangled Itself: Uncovering the History of Client-Side Web (In)Security
 
 
Software Security
 Towards Efficient Heap Overflow Discovery
 DR. CHECKER: A Soundy Analysis for Linux Kernel Drivers
 Dead Store Elimination (Still) Considered Harmful
 
 
Side-Channel Attacks II
 ...
 
 
Understanding Attacks
 ...
 
 
Hardware Security
 ...
 
 
Privacy & Anonymity Systems
 ...
 
 
Software Integrity
 ...
 
 
Crypto Deployment
 ...
 
 
Privacy Attacks & Defense
 ...
 
 
Blockchains
 ...
 
 
Databases
 ...

One Ring to rule them all, One Ring to find them, One Ring to bring them all and in the darkness bind them

Tell me, what you think about me
Give anonymous feedback
۲۷-مرداد-۱۳۹۶, ۲۲:۰۸:۴۵
وب سایت ارسال‌ها
پاسخ
تشکر شده توسط : babyy, Ghoghnus, lord_viper


موضوعات مرتبط با این موضوع...
موضوع نویسنده پاسخ بازدید آخرین ارسال
  سوال در مورد Kaspersky Internet Security 2010 h0x00i 3 2,920 ۳۰-دى-۱۳۸۹, ۱۲:۲۸:۵۸
آخرین ارسال: ΛΛ Θ l-l $ Σ Ω

پرش به انجمن:


کاربرانِ درحال بازدید از این موضوع: 1 مهمان

صفحه‌ی تماس | IranVig | بازگشت به بالا | | بایگانی | پیوند سایتی RSS