سلام،
هفدهمین کنفرانس USENIX Security تموم شد و مقالات های ارایه شد در 16 ماه August امسال در دسترس عموم قرار گرفت..
موضوعات ارایه شده میتونید در فایل زیر ببینید :
کد:
https://www.usenix.org/sites/default/files/sec17_contents.pdf
برای دانلود مقالات هم میتونید به این صفحه مراجعه کنید:
کد:
https://www.usenix.org/node/203932
موضوعات کلی و یک سری از موضوعات مربوط به وب، امنیت نرم افزار و بدافزار جدا کردم:
نقل قول: Bug Finding I
How Double-Fetch Situations turn into Double-Fetch Vulnerabilities: A Study of Double Fetches in the Linux Kernel
Postmortem Program Analysis with Hardware-Enhanced Post-Crash Artifacts
Ninja: Towards Transparent Tracing and Debugging on ARM
Side-Channel Attacks I
...
Systems Security I
Neural Nets Can Learn Function Type Signatures From Binaries
CAn’t Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory
Efficient Protection of Path-Sensitive Control Security
Bug Finding II
Digtool: A Virtualization-Based Framework for Detecting Kernel Vulnerabilities
kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels
Venerable Variadic Vulnerabilities Vanquished
Side-Channel Countermeasures
...
Malware and Binary Analysis
BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking
PlatPal: Detecting Malicious Documents with Platform Diversity
Malton: Towards On-Device Non-Invasive Mobile Malware Analysis for ART
Censorship
...
Embedded Systems
...
Networking Security
...
Targeted Attacks
...
Trusted Hardware
...
Authentication
...
Malware and Obfuscation
Transcend: Detecting Concept Drift in Malware Classification Models
Syntia: Synthesizing the Semantics of Obfuscated Code
Predicting the Resilience of Obfuscated Code Against Symbolic Execution Attacks via Machine Learning
Web Security I
Extension Breakdown: Security Analysis of Browsers Extension Resources Control Policies
CCSP: Controlled Relaxation of Content Security Policies by Runtime Policy Composition
Same-Origin Policy: Evaluation in Modern Browsers
Privacy
...
Systems Security II
BootStomp: On the Security of Bootloaders in Mobile Devices
Seeing Through The Same Lens: Introspecting Guest Address Space At Native Speed
Oscar: A Practical Page-Permissions-Based Scheme for Thwarting Dangling Pointers
Web Security II
PDF Mirage: Content Masking Attack Against Information-Based Online Services
Loophole: Timing Attacks on Shared Event Loops in Chrome
Game of Registrars: An Empirical Analysis of Post-Expiration Domain Name Takeovers
Applied Cryptography
...
Web Security III
Exploring User Perceptions of Discrimination in Online Targeted Advertising
Measuring the Insecurity of Mobile Deep Links of Android
How the Web Tangled Itself: Uncovering the History of Client-Side Web (In)Security
Software Security
Towards Efficient Heap Overflow Discovery
DR. CHECKER: A Soundy Analysis for Linux Kernel Drivers
Dead Store Elimination (Still) Considered Harmful
Side-Channel Attacks II
...
Understanding Attacks
...
Hardware Security
...
Privacy & Anonymity Systems
...
Software Integrity
...
Crypto Deployment
...
Privacy Attacks & Defense
...
Blockchains
...
Databases
...