These are my blogs

and also my life

论文笔记| True2F: Backdoor-resistant authentication tokens

2019-07-09 reading S&P2019 system secruity

Brief author: Emma Dauterman, Henry Corrigan-Gibbs, David Mazières, Dan Boneh, Dominic Rizzo From: Stanford and Google Introduction 双因子认证是目前对抗弱密码等恶意攻 ... Read More

论文笔记| Why Does Your Data Leak? Uncovering the Data Leakage in Cloud from Mobile Apps

2019-07-09 reading S&P2019 云安全

Brief author: Chaoshun Zuo, Zhiqiang Lin, Yinqian Zhang IEEE S&P 2019 Introduction 系统评估移动终端使用云存储时候的数据泄露 编写程序自动化完成评估 对各种软件进行评估,给出风险报告 Background 为什 ... Read More

论文笔记| Resident Evil: Understanding Residential IP Proxy as a Dark Service

2019-07-08 reading S&P2019 网络安全

Brief Meeting: S&P 2019 Authors: Xianghang Mi, Xuan Feng, Xiaojing Liao, Baojun Liu, XiaoFeng Wang, Feng Qian, Zhou Li, Sumayah Alrwais, Limin ... Read More

论文笔记| YODA: Enabling computationally intensive contracts on blockchains with Byzantine and Selfish nodes

2019-05-14 reading 区块链

YODA: Enabling computationally intensive contracts on blockchains with Byzantine and Selfish nodes Sourav Das, Vinay Joseph Ribeiro and Abhijeet Anand ... Read More

论文笔记| Sajin Sasy, Sergey Gorbunov, Christopher W. Fletcher. ZeroTrace: Oblivious Memory Primitives from Intel SGX.

2019-05-14 reading

Sajin Sasy, Sergey Gorbunov, Christopher W. Fletcher. ZeroTrace: Oblivious Memory Primitives from Intel SGX. Network and Distributed Systems Security ... Read More

论文笔记| Understanding Open Ports in Android Applications: Discovery, Diagnosis, and Security Assessment

2019-04-07 reading 论文 安卓 security

Understanding Open Ports in Android Applications: Discovery, Diagnosis, and Security Assessment 作者:Daoyuan Wu, Debin Gao, Rocky K. C. Chang, En He, ... Read More

论文笔记| Giving State to the Stateless: Augmenting Trustworthy Computation with Ledgers

2019-03-28 reading 论文 SGX

Giving State to the Stateless: Augmenting Trustworthy Computation with Ledgers Gabriel Kaptchuk, Matthew Green, Ian Miers Network and Distributed ... Read More

论文笔记| Measurement and Analysis of Hajime, a Peer-to-peer IoT Botnet

2019-03-26 reading 论文 僵尸网络

Measurement and Analysis of Hajime, a Peer-to-peer IoT Botnet Stephen Herwig, Katura Harvey, George Hughey, Richard Roberts, Dave Levin Network and ... Read More

论文笔记| Countering Malicious Processes with Process-DNS Association.

2019-03-26 reading 论文 DNS

Countering Malicious Processes with Process-DNS Association. Suphannee Sivakorn, Kangkook Jee, Yixin Sun, Lauri Korts-Pa¨r, Zhichun Li, Cristian ... Read More

论文笔记| OBLIVIATE:A Data Oblivious File System for Intel SGX

2019-03-26 reading 论文 SGX

OBLIVIATE:A Data Oblivious File System for Intel SGX Adil Ahmad, Kyungtae Kim, Muhammad Ihsanulhaq Sarfaraz, Byoungyoung Lee. Ndss 2018 这篇主要讲了使用 SGX 技 ... Read More