The Research Horizon: Four Nearly Practical Concepts
暂无分享,去创建一个
[1] Yuchen Zhou,et al. Understanding and Monitoring Embedded Web Scripts , 2015, 2015 IEEE Symposium on Security and Privacy.
[2] John S. Heidemann,et al. Connection-Oriented DNS to Improve Privacy and Security , 2015, 2015 IEEE Symposium on Security and Privacy.
[3] Jörg Schwenk,et al. Lessons Learned From Previous SSL/TLS Attacks - A Brief Chronology Of Attacks And Weaknesses , 2013, IACR Cryptol. ePrint Arch..
[4] Matthew Dempsky. DNSCurve: Link-Level Security for the Domain Name System , 2010 .
[5] Robert N. M. Watson,et al. A taste of Capsicum , 2012, Commun. ACM.
[6] Robert N. M. Watson,et al. Capsicum: Practical Capabilities for UNIX , 2010, USENIX Security Symposium.
[7] Vern Paxson,et al. Ad Injection at Scale: Assessing Deceptive Advertisement Modifications , 2015, 2015 IEEE Symposium on Security and Privacy.
[8] Alfredo Pironti,et al. A Messy State of the Union: Taming the Composite State Machines of TLS , 2015, 2015 IEEE Symposium on Security and Privacy.
[9] Peter G. Neumann,et al. CHERI: A Hybrid Capability-System Architecture for Scalable Software Compartmentalization , 2015, 2015 IEEE Symposium on Security and Privacy.