Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Toward proactive, adaptive defense: A survey on moving target defense
Reactive defense mechanisms, such as intrusion detection systems, have made significant
efforts to secure a system or network for the last several decades. However, the nature of …
efforts to secure a system or network for the last several decades. However, the nature of …
A survey on systems security metrics
Security metrics have received significant attention. However, they have not been
systematically explored based on the understanding of attack-defense interactions, which …
systematically explored based on the understanding of attack-defense interactions, which …
Collafl: Path sensitive fuzzing
Coverage-guided fuzzing is a widely used and effective solution to find software
vulnerabilities. Tracking code coverage and utilizing it to guide fuzzing are crucial to …
vulnerabilities. Tracking code coverage and utilizing it to guide fuzzing are crucial to …
Software grand exposure:{SGX} cache attacks are practical
Intel SGX isolates the memory of security-critical applications from the untrusted OS.
However, it has been speculated that SGX may be vulnerable to side-channel attacks …
However, it has been speculated that SGX may be vulnerable to side-channel attacks …
Branchscope: A new side-channel attack on directional branch predictor
We present BranchScope-a new side-channel attack where the attacker infers the direction
of an arbitrary conditional branch instruction in a victim program by manipulating the shared …
of an arbitrary conditional branch instruction in a victim program by manipulating the shared …
Everything old is new again: Binary security of {WebAssembly}
WebAssembly is an increasingly popular compilation target designed to run code in
browsers and on other platforms safely and securely, by strictly separating code and data …
browsers and on other platforms safely and securely, by strictly separating code and data …
{ERIM}: Secure, efficient in-process isolation with protection keys ({{{{{MPK}}}}})
Isolating sensitive state and data can increase the security and robustness of many
applications. Examples include protecting cryptographic keys against exploits like …
applications. Examples include protecting cryptographic keys against exploits like …
Sok: Eternal war in memory
Memory corruption bugs in software written in low-level languages like C or C++ are one of
the oldest problems in computer security. The lack of safety in these languages allows …
the oldest problems in computer security. The lack of safety in these languages allows …
Jump over ASLR: Attacking branch predictors to bypass ASLR
Address Space Layout Randomization (ASLR) is a widely-used technique that protects
systems against a range of attacks. ASLR works by randomizing the offset of key program …
systems against a range of attacks. ASLR works by randomizing the offset of key program …
Kaslr is dead: long live kaslr
Modern operating system kernels employ address space layout randomization (ASLR) to
prevent control-flow hijacking attacks and code-injection attacks. While kernel security relies …
prevent control-flow hijacking attacks and code-injection attacks. While kernel security relies …