د. المثنى العقيل
د. المثنى العقيل

@Almuthanna_KSA

13 تغريدة 7 قراءة Jan 02, 2022
ثريد: أفضل الأوراق العلمية المحكمة التي حازت على جائزة أفضل ورقة في أقوى المؤتمرات العالمية في الأمن السيبراني لعام ٢٠٢١
رابط الورقة + رابط اليوتيوب
1️⃣
Weaponizing Middleboxes for TCP Reflected Amplification
By K. Bock et al.
Paper:
usenix.org
YouTube:
youtu.be
2️⃣
Poisoning the Unlabeled Dataset of Semi-Supervised Learning
By Nicholas Carlini
Paper:
usenix.org
YouTube:
youtu.be
3️⃣
Rage Against the Machine Clear: A Systematic Analysis of Machine Clears and Their Implications for Transient Execution Attacks
By H. Ragab et al.
Paper:
usenix.org
YouTube:
youtu.be
4️⃣
An Analysis of Speculative Type Confusion Vulnerabilities in the Wild
By O. Kirzner et al.
Paper:
usenix.org
YouTube:
youtu.be
5️⃣
You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion
By R. Schuster et al.
Paper:
arxiv.org
YouTube:
youtu.be
6️⃣
CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing
By P. Zhang et al.
Paper:
public.asu.edu
YouTube:
youtu.be
7️⃣
Compositional Security for Reentrant Applications
By E. Cecchetti et al.
Paper:
cs.cornell.edu
YouTube:
youtu.be
8️⃣
Hardware-Software Contracts for Secure Speculation
By M. Guarnieri et al.
Paper:
spectector.github.io
YouTube:
youtu.be
9️⃣
On the (in)security of ElGamal in OpenPGP
By L. Feo et al.
Paper:
eprint.iacr.org
🔟
On the Rényi Differential Privacy of the Shuffle Model
By A. Girgis et al.
Paper:
dl.acm.org
One Glitch to Rule Them All: Fault Injection Attacks Against AMD’s Secure Encrypted Virtualization
By R. Burhen et al.
Paper:
arxiv.org
1️⃣1️⃣
XSinator[.]com: From a Formal Model to the Automatic Evaluation of Cross-Site Leaks in Web Browsers
By L. Knittel et al.
Paper:
xsinator.com
1️⃣2️⃣

جاري تحميل الاقتراحات...