ثريد: أفضل الأوراق العلمية المحكمة التي حازت على جائزة أفضل ورقة في أقوى المؤتمرات العالمية في الأمن السيبراني لعام ٢٠٢١
رابط الورقة + رابط اليوتيوب
1️⃣
رابط الورقة + رابط اليوتيوب
1️⃣
Weaponizing Middleboxes for TCP Reflected Amplification
By K. Bock et al.
Paper:
usenix.org
YouTube:
youtu.be
2️⃣
By K. Bock et al.
Paper:
usenix.org
YouTube:
youtu.be
2️⃣
Poisoning the Unlabeled Dataset of Semi-Supervised Learning
By Nicholas Carlini
Paper:
usenix.org
YouTube:
youtu.be
3️⃣
By Nicholas Carlini
Paper:
usenix.org
YouTube:
youtu.be
3️⃣
Rage Against the Machine Clear: A Systematic Analysis of Machine Clears and Their Implications for Transient Execution Attacks
By H. Ragab et al.
Paper:
usenix.org
YouTube:
youtu.be
4️⃣
By H. Ragab et al.
Paper:
usenix.org
YouTube:
youtu.be
4️⃣
An Analysis of Speculative Type Confusion Vulnerabilities in the Wild
By O. Kirzner et al.
Paper:
usenix.org
YouTube:
youtu.be
5️⃣
By O. Kirzner et al.
Paper:
usenix.org
YouTube:
youtu.be
5️⃣
CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing
By P. Zhang et al.
Paper:
public.asu.edu
YouTube:
youtu.be
7️⃣
By P. Zhang et al.
Paper:
public.asu.edu
YouTube:
youtu.be
7️⃣
Compositional Security for Reentrant Applications
By E. Cecchetti et al.
Paper:
cs.cornell.edu
YouTube:
youtu.be
8️⃣
By E. Cecchetti et al.
Paper:
cs.cornell.edu
YouTube:
youtu.be
8️⃣
Hardware-Software Contracts for Secure Speculation
By M. Guarnieri et al.
Paper:
spectector.github.io
YouTube:
youtu.be
9️⃣
By M. Guarnieri et al.
Paper:
spectector.github.io
YouTube:
youtu.be
9️⃣
XSinator[.]com: From a Formal Model to the Automatic Evaluation of Cross-Site Leaks in Web Browsers
By L. Knittel et al.
Paper:
xsinator.com
1️⃣2️⃣
By L. Knittel et al.
Paper:
xsinator.com
1️⃣2️⃣
جاري تحميل الاقتراحات...