| 中文标题 | 作者 | 论文ID | 分类简称 | 发布时间 |
|---|---|---|---|---|
| SWAT:加密数据存储中可调谐泄漏缓解的系统级方法 | Leqian Zheng, Lei Xu, Cong Wang, Sheng Wang, Yuke Hu, Zhan Qin, Feifei Li and Kui Ren | 2306.16851 | cs.CR | 2023-06-30 |
| VibHead:通过振动实现智能耳机的认证方案 | Feng Li, Jiayi Zhao, Huan Yang, Dongxiao Yu, Yuanfeng Zhou, Yiran Shen | 2306.17002 | cs.CR | 2023-06-30 |
| 诚实是最佳策略:关于苹果隐私标签的准确性与应用隐私政策的比较 | Mir Masood Ali and David G. Balash and Chris Kanich and Adam J. Aviv | 2306.17063 | cs.CR | 2023-06-30 |
| “TEE时间到了:一种为智能手机带来主权的新架构” | Friederike Groschupp, Mark Kuhne, Moritz Schneider, Ivan Puddu, Shweta Shinde, Srdjan Capkun | 2211.05206 | cs.CR | 2023-06-29 |
| Twitter最大黑客事件的钻石模型分析 | Chaitanya Rahalkar | 2306.15878 | cs.CR | 2023-06-29 |
| 快速与Frobenius:有限域上的有理同构评估 | Gustavo Banegas, Valerie Gilchrist (ULB), Ana"elle Le D''ev''ehat (GRACE), Benjamin Smith (GRACE) | 2306.16072 | cs.CR | 2023-06-29 |
| 推特能否用于获取可靠的对抗新型网络攻击的警报? | Dincy R Arikkat, Vinod P., Rafidha Rehiman K. A., Andrea Di Sorbo, Corrado A. Visaggio, Mauro Conti | 2306.16087 | cs.CR | 2023-06-29 |
| VERTICES: 两方垂直联合线性模型的高效实现与TTP辅助的秘密共享 | Mingxuan Fan, Yilun Jin, Liu Yang, Zhenghang Ren, Kai Chen | 2306.16139 | cs.CR | 2023-06-29 |
| 遥测的力量:揭示基于软件的针对Apple M1/M2系统的侧信道攻击 | Nikhil Chawla, Chen Liu, Abhishek Chakraborty, Igor Chervatyuk, Ke Sun, Thais Moreira Hamasaki, Henrique Kawakami | 2306.16391 | cs.CR | 2023-06-29 |
| 基于变可调鲁棒性的TCM型鲁棒隐写术的改进 | Jimin Zhang, Xianfeng Zhao, Xiaolei He | 2211.10095 | cs.CR | 2023-06-28 |
| 无人机群体的GPS欺骗攻击检测机制 | Pavlo Mykytyn, Marcin Brzozowski, Zoya Dyka, Peter Langendoerfer | 2301.12766 | cs.CR | 2023-06-28 |
| SPDH-Sign:朝着高效、后量子群组签名的方向 | Christopher Battarbee, Delaram Kahrobaei, Ludovic Perret, Siamak F. Shahandashti | 2304.12900 | cs.CR | 2023-06-28 |
| 无人机和飞机自组网中的安全调查:问题、威胁、攻击分析和解决方案 | Ozlem Ceviz, Pinar Sadioglu, Sevil Sen | 2306.14281 | cs.CR | 2023-06-28 |
| 使用非索引文档的高精度查询恢复攻击对可搜索加密的翻译 | Marc Damie, Florian Hahn, Andreas Peter | 2306.15302 | cs.CR | 2023-06-28 |
| PASNet:基于多项式架构搜索的基于两方计算的安全神经网络部署 | Hongwu Peng, Shanglin Zhou, Yukui Luo, Nuo Xu, Shijin Duan, Ran Ran, Jiahui Zhao, Chenghong Wang, Tong Geng, Wujie Wen, Xiaolin Xu and Caiwen Ding | 2306.15513 | cs.CR | 2023-06-28 |
| MTFS:一种用于恶意软件缓解的可移动目标防御启用文件系统 | Jan von der Assen, Alberto Huertas Celdr''an, Rinor Sefa, G''er^ome Bovet, Burkhard Stiller | 2306.15566 | cs.CR | 2023-06-28 |
| HyPFuzz:形式辅助的处理器模糊测试 | Chen Chen, Rahul Kande, Nathan Nguyen, Flemming Andersen, Aakash Tyagi, Ahmad-Reza Sadeghi, and Jeyavijayan Rajendran | 2304.02485 | cs.CR | 2023-06-27 |
| 社交媒体上的账户验证:用户认知与付费注册 | Madelyne Xiao, Mona Wang, Anunay Kulshrestha, Jonathan Mayer | 2304.14939 | cs.CR | 2023-06-27 |
| 数据中心的机器学习方法用于早期勒索软件检测和归因 | Aldin Vehabovic, Hadi Zanddizari, Nasir Ghani, Farooq Shaikh, Elias Bou-Harb, Morteza Safaei Pour and Jorge Crichigno | 2305.13287 | cs.CR | 2023-06-27 |
| HODOR:通过系统调用限制缩小Node.js上的攻击面 | Wenya Wang, Xingwei Lin, Jingyi Wang, Wang Gao, Dawu Gu, Wei Lv, Jiashui Wang | 2306.13984 | cs.CR | 2023-06-27 |
| 分布式勒索软件分析的联邦学习方法 | Aldin Vehabovic, Hadi Zanddizari, Farook Shaikh, Nasir Ghani, Morteza Safaei Pour, Elias Bou-Harb and Jorge Crichigno | 2306.14090 | cs.CR | 2023-06-27 |
| FastBCSD:用于二进制代码相似性检测的快速高效神经网络 | Chensen Huang, Guibo Zhu, Guojing Ge, Taihao Li, Jinqiao Wang | 2306.14168 | cs.CR | 2023-06-27 |
| BaseSAP:可编程区块链的模块化隐秘地址协议 | Anton Wahrst"atter, Matthew Solomon, Ben DiFrancesco, Vitalik Buterin and Davor Svetinovic | 2306.14272 | cs.CR | 2023-06-27 |
| 同态加密:对其在可搜索加密中的应用进行分析 | Ivone Amorim and Ivan Costa | 2306.14407 | cs.CR | 2023-06-27 |
| 云计算中外包数据库的同态加密的单一缓存:Silca | Dongfang Zhao | 2306.14436 | cs.CR | 2023-06-27 |