[{"title":"(59个子文件60.85MB)NDSS2016.rar","children":[{"title":"NDSS16","children":[{"title":"FULL","children":[{"title":"LinkMirage EnablingPrivacy-preservingAnalyticsonSocialRelationships.pdf <span style='color:#111;'>1.20MB</span>","children":null,"spread":false},{"title":"WhenaTreeFalls UsingDiversityinEnsembleClassifierstoIdentifyEvasioninMalwareDetectors.pdf <span style='color:#111;'>800.12KB</span>","children":null,"spread":false},{"title":"ThePriceofFree PrivacyLeakageinPersonalizedMobileIn-AppsAds.pdf <span style='color:#111;'>373.77KB</span>","children":null,"spread":false},{"title":"discovRE EfficientCross-ArchitectureIdentificationofBugsinBinaryCode.pdf <span style='color:#111;'>1.84MB</span>","children":null,"spread":false},{"title":"PracticalAttacksAgainstPrivacyandAvailabilityin4GLTEMobileCommunicationSystems.pdf <span style='color:#111;'>6.10MB</span>","children":null,"spread":false},{"title":"It&8217;sFreeforaReasonExploringtheEcosystemofFreeLiveStreamingServices.pdf <span style='color:#111;'>2.11MB</span>","children":null,"spread":false},{"title":"CDN-on-Demand AnaffordableDDoSDefenseviaUntrustedClouds.pdf <span style='color:#111;'>644.92KB</span>","children":null,"spread":false},{"title":"GoingNativeUsingaLarge-ScaleAnalysisofAndroidAppstoCreateaPracticalNative-CodeSandboxingPolicy.pdf <span style='color:#111;'>417.34KB</span>","children":null,"spread":false},{"title":"Don&8217;tForgettoLocktheBackDoor ACharacterizationofIPv6NetworkSecurityPolicy.pdf <span style='color:#111;'>257.58KB</span>","children":null,"spread":false},{"title":"EnablingPracticalSoftware-definedNetworkingSecurityApplicationswithOFX.pdf <span style='color:#111;'>2.40MB</span>","children":null,"spread":false},{"title":"AretheseAdsSafeDetectingHiddenAttacksthroughtheMobileApp-WebInterfaces.pdf <span style='color:#111;'>1.58MB</span>","children":null,"spread":false},{"title":"VISIBLE Video-AssistedKeystrokeInferencefromTabletBacksideMotion.pdf <span style='color:#111;'>7.19MB</span>","children":null,"spread":false},{"title":"FreeforAll AssessingUserDataExposuretoAdvertisingLibrariesonAndroid.pdf <span style='color:#111;'>802.89KB</span>","children":null,"spread":false},{"title":"SPIFFY InducingCost-DetectabilityTradeoffsforPersistentLink-FloodingAttacks.pdf <span style='color:#111;'>1.05MB</span>","children":null,"spread":false},{"title":"AutomaticForgeryofCryptographicallyConsistentMessagestoIdentifySecurityVulnerabilitiesinMobileServices.pdf <span style='color:#111;'>443.05KB</span>","children":null,"spread":false},{"title":"CacheTriggerImpersonate EnablingContext-SensitiveHoneyclientAnalysisOn-the-Wire.pdf <span style='color:#111;'>476.61KB</span>","children":null,"spread":false},{"title":"AutomaticallyEvadingClassifiers ACaseStudyonPDFMalwareClassifiers.pdf <span style='color:#111;'>2.61MB</span>","children":null,"spread":false},{"title":"HarvestingRuntimeValuesinAndroidApplicationsThatFeatureAnti-AnalysisTechniques.pdf <span style='color:#111;'>766.15KB</span>","children":null,"spread":false},{"title":"EfficientPrivateStatisticswithSuccinctSketches.pdf <span style='color:#111;'>674.27KB</span>","children":null,"spread":false},{"title":"DependenceMakesYouVulnerable DifferentialPrivacyUnderDependentTuples.pdf <span style='color:#111;'>1.30MB</span>","children":null,"spread":false},{"title":"WebsiteFingerprintingatInternetScale.pdf <span style='color:#111;'>1.51MB</span>","children":null,"spread":false},{"title":"PitfallsinDesigningZero-EffortDeauthentication OpportunisticHumanObservationAttacks.pdf <span style='color:#111;'>739.14KB</span>","children":null,"spread":false},{"title":"FLEXDROID EnforcingIn-AppPrivilegeSeparationinAndroid.pdf <span style='color:#111;'>439.56KB</span>","children":null,"spread":false},{"title":"TowardsAutomatedDynamicAnalysisforLinux-basedEmbeddedFirmware.pdf <span style='color:#111;'>301.24KB</span>","children":null,"spread":false},{"title":"TrackingMobileWebUsersThroughMotionSensors AttacksandDefenses.pdf <span style='color:#111;'>456.08KB</span>","children":null,"spread":false},{"title":"Forwarding-LoopAttacksinContentDeliveryNetworks.pdf <span style='color:#111;'>475.48KB</span>","children":null,"spread":false},{"title":"EnablingClient-SideCrash-ResistancetoOvercomeDiversificationandInformationHiding.pdf <span style='color:#111;'>332.86KB</span>","children":null,"spread":false},{"title":"IntelliDroid ATargetedInputGeneratorfortheDynamicAnalysisofAndroidMalware.pdf <span style='color:#111;'>325.17KB</span>","children":null,"spread":false},{"title":"Who&8217;sinControlofYourControlSystem DeviceFingerprintingforCyber-PhysicalSystems.pdf <span style='color:#111;'>4.44MB</span>","children":null,"spread":false},{"title":"EquihashAsymmetricProof-of-WorkBasedontheGeneralizedBirthdayProblem.pdf <span style='color:#111;'>439.51KB</span>","children":null,"spread":false},{"title":"EnforcingKernelSecurityInvariantswithDataFlowIntegrity.pdf <span style='color:#111;'>504.42KB</span>","children":null,"spread":false},{"title":"MeasuringandMitigatingAS-levelAdversariesAgainstTor.pdf <span style='color:#111;'>1.21MB</span>","children":null,"spread":false},{"title":"CrossFireAnAnalysisofFirefoxExtension-ReuseVulnerabilities.pdf <span style='color:#111;'>395.06KB</span>","children":null,"spread":false},{"title":"Leakage-ResilientLayoutRandomizationforMobileDevices.pdf <span style='color:#111;'>380.97KB</span>","children":null,"spread":false},{"title":"LifeafterAppUninstallation AretheDataStillAlive DataResidueAttacksonAndroid.pdf <span style='color:#111;'>1.04MB</span>","children":null,"spread":false},{"title":"ProtectingC++DynamicDispatchThroughVTableInterleaving.pdf <span style='color:#111;'>559.02KB</span>","children":null,"spread":false},{"title":"DifferentiallyPrivatePasswordFrequencyLists.pdf <span style='color:#111;'>625.32KB</span>","children":null,"spread":false},{"title":"AttackPatternsforBlack-BoxSecurityTestingofMulti-PartyWebApplications.pdf <span style='color:#111;'>539.24KB</span>","children":null,"spread":false},{"title":"CentrallyBankedCryptocurrencies.pdf <span style='color:#111;'>433.84KB</span>","children":null,"spread":false},{"title":"Privacy-PreservingShortestPathComputation.pdf <span style='color:#111;'>3.44MB</span>","children":null,"spread":false},{"title":"Driller AugmentingFuzzingThroughSelectiveSymbolicExecution.pdf <span style='color:#111;'>351.39KB</span>","children":null,"spread":false},{"title":"DoYouSeeWhatISee DifferentialTreatmentofAnonymousUsers.pdf <span style='color:#111;'>1.97MB</span>","children":null,"spread":false},{"title":"WhoAreYou AStatisticalApproachtoMeasuringUserAuthenticity.pdf <span style='color:#111;'>763.88KB</span>","children":null,"spread":false},{"title":"VTrust RegainingTrustonVirtualCalls.pdf <span style='color:#111;'>722.25KB</span>","children":null,"spread":false},{"title":"OpenSGX AnOpenPlatformforSGXResearch.pdf <span style='color:#111;'>404.92KB</span>","children":null,"spread":false},{"title":"TLSintheWild AnInternet-wideAnalysisofTLS-basedProtocolsforElectronicCommunication.pdf <span style='color:#111;'>594.27KB</span>","children":null,"spread":false},{"title":"LO-PHI Low-ObservablePhysicalHostInstrumentationforMalwareAnalysis.pdf <span style='color:#111;'>315.18KB</span>","children":null,"spread":false},{"title":"AttackingtheNetworkTimeProtocol.pdf <span style='color:#111;'>1.20MB</span>","children":null,"spread":false},{"title":"SKEE AlightweightSecureKernel-levelExecutionEnvironmentforARM.pdf <span style='color:#111;'>563.03KB</span>","children":null,"spread":false},{"title":"ExtractMeIfYouCan AbusingPDFParsersinMalwareDetectors.pdf <span style='color:#111;'>500.30KB</span>","children":null,"spread":false},{"title":"KilledbyProxy AnalyzingClient-endTLSInterceptionSoftware.pdf <span style='color:#111;'>472.72KB</span>","children":null,"spread":false},{"title":"HowtoMakeASLRWintheCloneWars RuntimeRe-Randomization.pdf <span style='color:#111;'>906.21KB</span>","children":null,"spread":false},{"title":"SIBRA ScalableInternetBandwidthReservationArchitecture.pdf <span style='color:#111;'>1.54MB</span>","children":null,"spread":false},{"title":"ASimpleGenericAttackonTextCaptchas.pdf <span style='color:#111;'>810.56KB</span>","children":null,"spread":false},{"title":"WhatMobileAdsKnowAboutMobileUsers.pdf <span style='color:#111;'>2.94MB</span>","children":null,"spread":false},{"title":"YouareaGameBotUncoveringGameBotsinMMORPGsviaSelf-similarityintheWild.pdf <span style='color:#111;'>1.51MB</span>","children":null,"spread":false},{"title":"TowardsSDN-DefinedProgrammableBYOD(BringYourOwnDevice)Security.pdf <span style='color:#111;'>1.98MB</span>","children":null,"spread":false},{"title":"TranscriptCollisionAttacksBreakingAuthenticationinTLSIKEandSSH.pdf <span style='color:#111;'>2.21MB</span>","children":null,"spread":false},{"title":"ProTracer TowardsPracticalProvenanceTracingbyAlternatingBetweenLoggingandTainting.pdf <span style='color:#111;'>1.49MB</span>","children":null,"spread":false}],"spread":false}],"spread":true}],"spread":true}]