X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 14/Aug 21:32

USENIX Security ’23 – Are You Spying on Me? Large-Scale Analysis on IoT Data Exposure through Companion Apps

Authors/Presenters:uhong Nan, Sun Yat-sen University; Xueqiang Wang, University of Central Florida; Luyi Xing and Xiaojing Liao, Indiana University Bloomington; Ruoyu Wu and Jianliang Wu, Purdue University; Yifan Zhang and XiaoFeng Wang, Indiana University Bloomington Many thanks to USENIX for publishing…

Articles similaires

Sorry! Image not available at this time

USENIX Security ’23 – UnGANable: Defending Against GAN-based Face Manipulation

itsecuritynews.info - 06/Sep 00:33

Authors/Presenters:Zheng Li, Ning Yu, Ahmed Salem, Michael Backes, Mario Fritz, Yang Zhang Many thanks to USENIX for publishing their outstanding...

Sorry! Image not available at this time

USENIX Security ’23 – Ultimate SLH: Taking Speculative Load Hardening To The Next Level

itsecuritynews.info - 03/Sep 16:32

Authors/Presenters:Zhiyuan Zhang, Gilles Barthe, Chitchanok Chuengsatiansup, Peter Schwabe, Yuval Yarom Many thanks to USENIX for publishing their...

Sorry! Image not available at this time

USENIX Security ’23 – Ultimate SLH: Taking Speculative Load Hardening To The Next Level

itsecuritynews.info - 03/Sep 16:32

Authors/Presenters:Zhiyuan Zhang, Gilles Barthe, Chitchanok Chuengsatiansup, Peter Schwabe, Yuval Yarom Many thanks to USENIX for publishing their...

Sorry! Image not available at this time

USENIX Security ’23 – On the Feasibility of Malware Unpacking via Hardware-assisted Loop Profiling

itsecuritynews.info - 14/Sep 18:31

Authors/Presenters:Binlin Cheng, Erika A Leal, Haotian Zhang, Jiang Mingy Many thanks to USENIX for publishing their outstanding USENIX Security ’23...

Sorry! Image not available at this time

USENIX Security ’23 – On the Feasibility of Malware Unpacking via Hardware-assisted Loop Profiling

itsecuritynews.info - 14/Sep 18:31

Authors/Presenters:Binlin Cheng, Erika A Leal, Haotian Zhang, Jiang Mingy Many thanks to USENIX for publishing their outstanding USENIX Security ’23...

Sorry! Image not available at this time

USENIX Security ’23 – (M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channels

itsecuritynews.info - 07/Sep 18:32

Authors/Presenters:Ruiyi Zhang, Taehyun Kim, Daniel Weber, Michael Schwarz Many thanks to USENIX for publishing their outstanding USENIX Security...

Sorry! Image not available at this time

USENIX NSDI ’24 – Horus: Granular In-Network Task Scheduler for Cloud Datacenters

itsecuritynews.info - 16:32

Authors/Presenters:Parham Yassini, Khaled Diab, Saeed Zangeneh, Mohamed Hefeeda Our sincere thanks to USENIX, and the Presenters & Authors for...

Sorry! Image not available at this time

USENIX Security ’23 – Security Analysis of MongoDB Queryable Encryption

itsecuritynews.info - 13/Sep 19:32

Authors/Presenters:Zichen Gui, Kenneth G. Paterson, Tianxin Tang Many thanks to USENIX for publishing their outstanding USENIX Security ’23...

Sorry! Image not available at this time

USENIX Security ’23 – Multiview: Finding Blind Spots in Access-Deny Issues Diagnosis

itsecuritynews.info - 15/Sep 20:02

Authors/Presenters:Bingyu Shen, Tianyi Shan, Yuanyuan Zhou Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s...

Sorry! Image not available at this time

USENIX Security ’23 – Multiview: Finding Blind Spots in Access-Deny Issues Diagnosis

itsecuritynews.info - 15/Sep 20:02

Authors/Presenters:Bingyu Shen, Tianyi Shan, Yuanyuan Zhou Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s...