These are my blogs
and also my life
论文笔记| True2F: Backdoor-resistant authentication tokens
2019-07-09 reading S&P2019 system secruity
Brief author: Emma Dauterman, Henry Corrigan-Gibbs, David Mazières, Dan Boneh, Dominic Rizzo From: Stanford and Google Introduction 双因子认证是目前对抗弱密码等恶意攻 ... Read More
论文笔记| Why Does Your Data Leak? Uncovering the Data Leakage in Cloud from Mobile Apps
2019-07-09 reading S&P2019 云安全
Brief author: Chaoshun Zuo, Zhiqiang Lin, Yinqian Zhang IEEE S&P 2019 Introduction 系统评估移动终端使用云存储时候的数据泄露 编写程序自动化完成评估 对各种软件进行评估,给出风险报告 Background 为什 ... Read More
论文笔记| Resident Evil: Understanding Residential IP Proxy as a Dark Service
2019-07-08 reading S&P2019 网络安全
Brief Meeting: S&P 2019 Authors: Xianghang Mi, Xuan Feng, Xiaojing Liao, Baojun Liu, XiaoFeng Wang, Feng Qian, Zhou Li, Sumayah Alrwais, Limin ... Read More
论文笔记| YODA: Enabling computationally intensive contracts on blockchains with Byzantine and Selfish nodes
2019-05-14 reading 区块链
YODA: Enabling computationally intensive contracts on blockchains with Byzantine and Selfish nodes Sourav Das, Vinay Joseph Ribeiro and Abhijeet Anand ... Read More
论文笔记| Sajin Sasy, Sergey Gorbunov, Christopher W. Fletcher. ZeroTrace: Oblivious Memory Primitives from Intel SGX.
2019-05-14 reading
Sajin Sasy, Sergey Gorbunov, Christopher W. Fletcher. ZeroTrace: Oblivious Memory Primitives from Intel SGX. Network and Distributed Systems Security ... Read More
论文笔记| Understanding Open Ports in Android Applications: Discovery, Diagnosis, and Security Assessment
2019-04-07 reading 论文 安卓 security
Understanding Open Ports in Android Applications: Discovery, Diagnosis, and Security Assessment 作者:Daoyuan Wu, Debin Gao, Rocky K. C. Chang, En He, ... Read More
论文笔记| Giving State to the Stateless: Augmenting Trustworthy Computation with Ledgers
2019-03-28 reading 论文 SGX
Giving State to the Stateless: Augmenting Trustworthy Computation with Ledgers Gabriel Kaptchuk, Matthew Green, Ian Miers Network and Distributed ... Read More
论文笔记| Measurement and Analysis of Hajime, a Peer-to-peer IoT Botnet
2019-03-26 reading 论文 僵尸网络
Measurement and Analysis of Hajime, a Peer-to-peer IoT Botnet Stephen Herwig, Katura Harvey, George Hughey, Richard Roberts, Dave Levin Network and ... Read More
论文笔记| Countering Malicious Processes with Process-DNS Association.
2019-03-26 reading 论文 DNS
Countering Malicious Processes with Process-DNS Association. Suphannee Sivakorn, Kangkook Jee, Yixin Sun, Lauri Korts-Pa¨r, Zhichun Li, Cristian ... Read More
论文笔记| OBLIVIATE:A Data Oblivious File System for Intel SGX
2019-03-26 reading 论文 SGX
OBLIVIATE:A Data Oblivious File System for Intel SGX Adil Ahmad, Kyungtae Kim, Muhammad Ihsanulhaq Sarfaraz, Byoungyoung Lee. Ndss 2018 这篇主要讲了使用 SGX 技 ... Read More