LOADING....!!!!!

发表论文

实验室已发布论文信息

今天你读Paper了吗

论文列表

A review of hardware timing channel detection and mitigation

Hardware timing channels are likely to leak information and easily ignored, which has gradually become the target of attacker. However, there are few investigations systematically analyse hardware timing channel detection and mitigation. In this article, we perform in-depth analysis for the detection technologies such as taint analysis, fuzzing, symbolic analysis and information statistics. ...

Read More

APTSID: An Ensemble learning method for APT attack stage identification

It is of great significance to identify security risks based on network traffic behavior. The application of AI technology for cyberspace brings more progress. Advanced Persistent Threat (APT) is known as one of the most sophisticated and potent security threats. It is still a big challenge for APT due to its long-term, concealed, and targeted APT attacks characteristic. ...

Read More

Website Fingerprinting Attack Through Persistent Attack of Student

Illegal users usually use Tor to hide their malicious behavior for browsing website. Website fingerprinting (WF) attack can help local network administrator to prevent illegal behavior of anonymous users. Although a lot of researches have improved website fingerprinting attacks, they still cannot address....

Read More

Leveraging Application Complexity Partition for Android Malware Detection

With the widespread use of Android applications, malicious applications seriously threaten information security and personal privacy of people. In this article, we leverage application complexity partition for Android malware detection to deal with different android application complexity characteristics in fine-grain. ...

Read More

Blockchain-Based Mechanism for Electronic Healthy Records Sharing Using Fine-grained Authorization

Nowadays, there is a growing demand for sharing electronic health records among many people and industries, particularly among hospitals and patients. The sharing of health records necessitates dealing with massive amounts of data, including sensitive information, as well as data search. In our work, we present a blockchain scheme ...

Read More

A Survey on Methodologies and Techniques for IPv6 Network Alias Resolution

With the promotion and use of IPv6 worldwide, the demand of research on IPv6 alias resolution is increasing. Understanding and resolving aliases in IPv6 addresses is vital on research of IPv6. In this paper, we discuss the definition of alias address and alias prefix. By classifying, organizing, and summarizing the alias ...

Read More

SpotFuzz: Fuzzing Based on Program Hot-Spots

AFL is the most widely used coverage-guided fuzzer, which relies on rough execution information to assign seeds energy, which can lead to waste. We track the program executed by AFL and discover that the hit counts of each edge might vary greatly when using different seeds as inputs...

Read More
想你所想,让我们开始吧!