X

Vous n'êtes pas connecté

Rubriques :

Maroc Maroc - ITSECURITYNEWS.INFO - A La Une - 14/Aug 21:32

USENIX Security ’23 – Are You Spying on Me? Large-Scale Analysis on IoT Data Exposure through Companion Apps

Authors/Presenters:uhong Nan, Sun Yat-sen University; Xueqiang Wang, University of Central Florida; Luyi Xing and Xiaojing Liao, Indiana University Bloomington; Ruoyu Wu and Jianliang Wu, Purdue University; Yifan Zhang and XiaoFeng Wang, Indiana University Bloomington Many thanks to USENIX for publishing…

Articles similaires

Sorry! Image not available at this time

USENIX Security ’23 – UnGANable: Defending Against GAN-based Face Manipulation

itsecuritynews.info - 06/Sep 00:33

Authors/Presenters:Zheng Li, Ning Yu, Ahmed Salem, Michael Backes, Mario Fritz, Yang Zhang Many thanks to USENIX for publishing their outstanding...

Sorry! Image not available at this time

USENIX Security ’23 – Ultimate SLH: Taking Speculative Load Hardening To The Next Level

itsecuritynews.info - 03/Sep 16:32

Authors/Presenters:Zhiyuan Zhang, Gilles Barthe, Chitchanok Chuengsatiansup, Peter Schwabe, Yuval Yarom Many thanks to USENIX for publishing their...

Sorry! Image not available at this time

USENIX Security ’23 – Ultimate SLH: Taking Speculative Load Hardening To The Next Level

itsecuritynews.info - 03/Sep 16:32

Authors/Presenters:Zhiyuan Zhang, Gilles Barthe, Chitchanok Chuengsatiansup, Peter Schwabe, Yuval Yarom Many thanks to USENIX for publishing their...

Sorry! Image not available at this time

USENIX Security ’23 – (M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channels

itsecuritynews.info - 07/Sep 18:32

Authors/Presenters:Ruiyi Zhang, Taehyun Kim, Daniel Weber, Michael Schwarz Many thanks to USENIX for publishing their outstanding USENIX Security...

Sorry! Image not available at this time

USENIX Security ’23 – RøB: Ransomware over Modern Web Browsers

itsecuritynews.info - 29/Aug 17:32

Authors/Presenters:Harun Oz, Ahmet Aris, Abbas Acar, Güliz Seray Tuncay, Leonardo Babun, Selcuk Uluagac Many thanks to USENIX for publishing their...

Sorry! Image not available at this time

USENIX Security ’23 – Pool-Party: Exploiting Browser Resource Pools For Web Tracking

itsecuritynews.info - 30/Aug 18:32

Authors/Presenters:Peter Snyder, Soroush Karami, Arthur Edelstein, Benjamin Livshits, Hamed Haddadi Many thanks to USENIX for publishing their...

Sorry! Image not available at this time

USENIX Security ’23 – Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels

itsecuritynews.info - 08/Sep 19:32

Authors/Presenters:Andreas Kogler, Jonas Juffinger, Lukas Giner, Lukas Gerlach, Martin Schwarzl, Michael Schwarz, Daniel Gruss, Stefan Mangard Many...

Sorry! Image not available at this time

USENIX Security ’23 – ProSpeCT: Provably Secure Speculation for the Constant-Time Policy

itsecuritynews.info - 04/Sep 15:32

Authors/Presenters:Lesly-Ann Daniel, Marton Bognar, Job Noorman, Sébastien Bardin, Tamara Rezk, Sophia Antipolis; Frank Piessens Many thanks to...

Sorry! Image not available at this time

USENIX Security ’23 – ProSpeCT: Provably Secure Speculation for the Constant-Time Policy

itsecuritynews.info - 04/Sep 15:32

Authors/Presenters:Lesly-Ann Daniel, Marton Bognar, Job Noorman, Sébastien Bardin, Tamara Rezk, Sophia Antipolis; Frank Piessens Many thanks to...

Sorry! Image not available at this time

Underground Demand for Malicious LLMs is Robust

itsecuritynews.info - 10/Sep 11:02

The underground market for malicious large language models (LLMs) is thriving, according to researchers from Indiana University Bloomington. They...