These are my blogs

and also my life

论文笔记| True2F: Backdoor-resistant authentication tokens

2019-07-09 reading S&P2019 system secruity

Brief

  • author: Emma Dauterman, Henry Corrigan-Gibbs, David Mazières, Dan Boneh, Dominic Rizzo
  • From: Stanford and Google

Introduction

双因子认证是目前对抗弱密码等恶 ...

Read More

论文笔记| Why Does Your Data Leak? Uncovering the Data Leakage in Cloud from Mobile Apps

2019-07-09 reading S&P2019 云安全

Brief

  • author: Chaoshun Zuo, Zhiqiang Lin, Yinqian Zhang
  • IEEE S&P 2019

Introduction

  1. 系统评估移动终端使用云存储时候的数据泄露
  2. 编写程序自动化完成评估
  3. 对各种软件进行评估, ...
Read More

论文笔记| Resident Evil: Understanding Residential IP Proxy as a Dark Service

2019-07-08 reading S&P2019 网络安全

Brief

  • Meeting: S&P 2019
  • Authors: Xianghang Mi, Xuan Feng, Xiaojing Liao, Baojun Liu, XiaoFeng Wang, Feng Qian, Zhou Li, Sumayah Alrwais, Limin ...
Read More

论文笔记| YODA: Enabling computationally intensive contracts on blockchains with Byzantine and Selfish nodes

2019-05-14 reading 区块链

YODA: Enabling computationally intensive contracts on blockchains with Byzantine and Selfish nodes

  • Sourav Das, Vinay Joseph Ribeiro and Abhijeet ...
Read More

论文笔记| Sajin Sasy, Sergey Gorbunov, Christopher W. Fletcher. ZeroTrace: Oblivious Memory Primitives from Intel SGX.

2019-05-14 reading

Sajin Sasy, Sergey Gorbunov, Christopher W. Fletcher. ZeroTrace: Oblivious Memory Primitives from Intel SGX. Network and Distributed Systems Security ...

Read More

论文笔记| Understanding Open Ports in Android Applications: Discovery, Diagnosis, and Security Assessment

2019-04-07 reading 论文 安卓 security

Understanding Open Ports in Android Applications: Discovery, Diagnosis, and Security Assessment

  • 作者:Daoyuan Wu, Debin Gao, Rocky K. C. Chang, En He, ...

Read More

论文笔记| Giving State to the Stateless: Augmenting Trustworthy Computation with Ledgers

2019-03-28 reading 论文 SGX

Giving State to the Stateless: Augmenting Trustworthy Computation with Ledgers

Gabriel Kaptchuk, Matthew Green, Ian Miers

Network and Distributed ...

Read More

论文笔记| Measurement and Analysis of Hajime, a Peer-to-peer IoT Botnet

2019-03-26 reading 论文 僵尸网络

Measurement and Analysis of Hajime, a Peer-to-peer IoT Botnet

Stephen Herwig, Katura Harvey, George Hughey, Richard Roberts, Dave Levin

Network and ...

Read More

论文笔记| Countering Malicious Processes with Process-DNS Association.

2019-03-26 reading 论文 DNS

Countering Malicious Processes with Process-DNS Association.

Suphannee Sivakorn, Kangkook Jee, Yixin Sun, Lauri Korts-Pa¨r, Zhichun Li, Cristian ...

Read More

论文笔记| OBLIVIATE:A Data Oblivious File System for Intel SGX

2019-03-26 reading 论文 SGX

OBLIVIATE:A Data Oblivious File System for Intel SGX

Adil Ahmad, Kyungtae Kim, Muhammad Ihsanulhaq Sarfaraz, Byoungyoung Lee.

Ndss 2018

这篇主要讲了使用 SGX ...

Read More