These are my blogs
and also my life
论文笔记| True2F: Backdoor-resistant authentication tokens
2019-07-09 reading S&P2019 system secruity
Brief
- author: Emma Dauterman, Henry Corrigan-Gibbs, David Mazières, Dan Boneh, Dominic Rizzo
- From: Stanford and Google
Introduction
双因子认证是目前对抗弱密码等恶 ...
Read More
论文笔记| Why Does Your Data Leak? Uncovering the Data Leakage in Cloud from Mobile Apps
2019-07-09 reading S&P2019 云安全
Brief
- author: Chaoshun Zuo, Zhiqiang Lin, Yinqian Zhang
- IEEE S&P 2019
Introduction
Read More
- 系统评估移动终端使用云存储时候的数据泄露
- 编写程序自动化完成评估
- 对各种软件进行评估, ...
论文笔记| Resident Evil: Understanding Residential IP Proxy as a Dark Service
2019-07-08 reading S&P2019 网络安全
Brief
Read More
- Meeting: S&P 2019
- Authors: Xianghang Mi, Xuan Feng, Xiaojing Liao, Baojun Liu, XiaoFeng Wang, Feng Qian, Zhou Li, Sumayah Alrwais, Limin ...
论文笔记| YODA: Enabling computationally intensive contracts on blockchains with Byzantine and Selfish nodes
2019-05-14 reading 区块链
YODA: Enabling computationally intensive contracts on blockchains with Byzantine and Selfish nodes
Read More
- Sourav Das, Vinay Joseph Ribeiro and Abhijeet ...
论文笔记| Sajin Sasy, Sergey Gorbunov, Christopher W. Fletcher. ZeroTrace: Oblivious Memory Primitives from Intel SGX.
2019-05-14 reading
Sajin Sasy, Sergey Gorbunov, Christopher W. Fletcher. ZeroTrace: Oblivious Memory Primitives from Intel SGX. Network and Distributed Systems Security ...
Read More
论文笔记| Understanding Open Ports in Android Applications: Discovery, Diagnosis, and Security Assessment
2019-04-07 reading 论文 安卓 security
Understanding Open Ports in Android Applications: Discovery, Diagnosis, and Security Assessment
Read More
作者:Daoyuan Wu, Debin Gao, Rocky K. C. Chang, En He, ...
论文笔记| Giving State to the Stateless: Augmenting Trustworthy Computation with Ledgers
2019-03-28 reading 论文 SGX
Giving State to the Stateless: Augmenting Trustworthy Computation with Ledgers
Gabriel Kaptchuk, Matthew Green, Ian Miers
Network and Distributed ...
Read More
论文笔记| Measurement and Analysis of Hajime, a Peer-to-peer IoT Botnet
2019-03-26 reading 论文 僵尸网络
Measurement and Analysis of Hajime, a Peer-to-peer IoT Botnet
Stephen Herwig, Katura Harvey, George Hughey, Richard Roberts, Dave Levin
Network and ...
Read More
论文笔记| Countering Malicious Processes with Process-DNS Association.
2019-03-26 reading 论文 DNS
Countering Malicious Processes with Process-DNS Association.
Suphannee Sivakorn, Kangkook Jee, Yixin Sun, Lauri Korts-Pa¨r, Zhichun Li, Cristian ...
Read More
论文笔记| OBLIVIATE:A Data Oblivious File System for Intel SGX
2019-03-26 reading 论文 SGX
OBLIVIATE:A Data Oblivious File System for Intel SGX
Adil Ahmad, Kyungtae Kim, Muhammad Ihsanulhaq Sarfaraz, Byoungyoung Lee.
Ndss 2018
这篇主要讲了使用 SGX ...
Read More