CSET @ USENIX Security Symposium最新文献

筛选
英文 中文
The attacks aren't alright: Large-Scale Simulation of Fake Base Station Attacks and Detections 攻击并不可怕假基站攻击和检测的大规模模拟
CSET @ USENIX Security Symposium Pub Date : 2024-08-13 DOI: 10.1145/3675741.3675742
Thijs Heijligenberg, David Rupprecht, K. Kohls
{"title":"The attacks aren't alright: Large-Scale Simulation of Fake Base Station Attacks and Detections","authors":"Thijs Heijligenberg, David Rupprecht, K. Kohls","doi":"10.1145/3675741.3675742","DOIUrl":"https://doi.org/10.1145/3675741.3675742","url":null,"abstract":"","PeriodicalId":373184,"journal":{"name":"CSET @ USENIX Security Symposium","volume":"52 1","pages":"54-64"},"PeriodicalIF":0.0,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141919083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hardening the Internet of Things: Toward Designing Access Control For Resource Constrained IoT Devices 加固物联网:为资源受限的物联网设备设计访问控制
CSET @ USENIX Security Symposium Pub Date : 2024-08-13 DOI: 10.1145/3675741.3675744
Manuel Bessler, Paul Sangster, Radhika Upadrashta, TJ OConnor
{"title":"Hardening the Internet of Things: Toward Designing Access Control For Resource Constrained IoT Devices","authors":"Manuel Bessler, Paul Sangster, Radhika Upadrashta, TJ OConnor","doi":"10.1145/3675741.3675744","DOIUrl":"https://doi.org/10.1145/3675741.3675744","url":null,"abstract":"","PeriodicalId":373184,"journal":{"name":"CSET @ USENIX Security Symposium","volume":"2 3","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141919559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implementation of a Coverage-Guided Ruby Fuzzer 覆盖引导型 Ruby 模糊器的设计与实现
CSET @ USENIX Security Symposium Pub Date : 2024-08-13 DOI: 10.1145/3675741.3675749
Matt Schwager, Dominik Klemba, J. Dykstra
{"title":"Design and Implementation of a Coverage-Guided Ruby Fuzzer","authors":"Matt Schwager, Dominik Klemba, J. Dykstra","doi":"10.1145/3675741.3675749","DOIUrl":"https://doi.org/10.1145/3675741.3675749","url":null,"abstract":"","PeriodicalId":373184,"journal":{"name":"CSET @ USENIX Security Symposium","volume":"12 49","pages":"27-33"},"PeriodicalIF":0.0,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141919423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Measuring Cyber Essentials Security Policies 衡量网络基本安全政策
CSET @ USENIX Security Symposium Pub Date : 2024-08-13 DOI: 10.1145/3675741.3675747
Sándor Bartha, Russell Ballantine, David Aspinall
{"title":"Measuring Cyber Essentials Security Policies","authors":"Sándor Bartha, Russell Ballantine, David Aspinall","doi":"10.1145/3675741.3675747","DOIUrl":"https://doi.org/10.1145/3675741.3675747","url":null,"abstract":"","PeriodicalId":373184,"journal":{"name":"CSET @ USENIX Security Symposium","volume":"1 1","pages":"17-26"},"PeriodicalIF":0.0,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141919520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Accelerating Ransomware Defenses with Computational Storage Drive-Based API Call Sequence Classification 利用基于计算存储驱动器的 API 调用序列分类加速勒索软件防御
CSET @ USENIX Security Symposium Pub Date : 2024-08-13 DOI: 10.1145/3675741.3675743
Kurt Friday, Elias Bou-Harb
{"title":"Accelerating Ransomware Defenses with Computational Storage Drive-Based API Call Sequence Classification","authors":"Kurt Friday, Elias Bou-Harb","doi":"10.1145/3675741.3675743","DOIUrl":"https://doi.org/10.1145/3675741.3675743","url":null,"abstract":"","PeriodicalId":373184,"journal":{"name":"CSET @ USENIX Security Symposium","volume":"52 11","pages":"8-16"},"PeriodicalIF":0.0,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141919074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards a High Fidelity Training Environment for Autonomous Cyber Defense Agents 为自主网络防御代理开发高保真训练环境
CSET @ USENIX Security Symposium Pub Date : 2024-08-13 DOI: 10.1145/3675741.3675752
Sean Oesch, Amul Chaulagain, Brian Weber, Matthew Dixson, Amir Sadovnik, Benjamin Roberson, Cory L. Watson, Phillipe Austria
{"title":"Towards a High Fidelity Training Environment for Autonomous Cyber Defense Agents","authors":"Sean Oesch, Amul Chaulagain, Brian Weber, Matthew Dixson, Amir Sadovnik, Benjamin Roberson, Cory L. Watson, Phillipe Austria","doi":"10.1145/3675741.3675752","DOIUrl":"https://doi.org/10.1145/3675741.3675752","url":null,"abstract":"","PeriodicalId":373184,"journal":{"name":"CSET @ USENIX Security Symposium","volume":"49 9","pages":"91-99"},"PeriodicalIF":0.0,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141919125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards a High Fidelity Training Environment for Autonomous Cyber Defense Agents 为自主网络防御代理开发高保真训练环境
CSET @ USENIX Security Symposium Pub Date : 2024-08-13 DOI: 10.1145/3675741.3675752
Sean Oesch, Amul Chaulagain, Brian Weber, Matthew Dixson, Amir Sadovnik, Benjamin Roberson, Cory L. Watson, Phillipe Austria
{"title":"Towards a High Fidelity Training Environment for Autonomous Cyber Defense Agents","authors":"Sean Oesch, Amul Chaulagain, Brian Weber, Matthew Dixson, Amir Sadovnik, Benjamin Roberson, Cory L. Watson, Phillipe Austria","doi":"10.1145/3675741.3675752","DOIUrl":"https://doi.org/10.1145/3675741.3675752","url":null,"abstract":"","PeriodicalId":373184,"journal":{"name":"CSET @ USENIX Security Symposium","volume":"1 3","pages":"91-99"},"PeriodicalIF":0.0,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141919568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
NERDS: A Non-invasive Environment for Remote Developer Studies NERDS:用于远程开发人员研究的非侵入式环境
CSET @ USENIX Security Symposium Pub Date : 2024-08-13 DOI: 10.1145/3675741.3675750
Joseph Lewis, Kelsey R. Fulton
{"title":"NERDS: A Non-invasive Environment for Remote Developer Studies","authors":"Joseph Lewis, Kelsey R. Fulton","doi":"10.1145/3675741.3675750","DOIUrl":"https://doi.org/10.1145/3675741.3675750","url":null,"abstract":"Given the difficulties of secure development, studying software developers remains pivotal. However, conducting these studies remains a pain point for the security community as recruitment and retention can be incredibly difficult. In this work, we aim to make conducting security studies with software developers easier by building NERDS : a N on-invasive E nvironment for R emote D eveloper S tudies. NERDS allows for conducting remote studies while still providing researchers with a controlled environment. We describe our experiences building and deploying NERDS in two distinct secure software development studies. Our lessons learned can provide valuable insight to other researchers wanting to utilize NERDS . We provide NERDS as an open-source system.","PeriodicalId":373184,"journal":{"name":"CSET @ USENIX Security Symposium","volume":"2 7","pages":"74-82"},"PeriodicalIF":0.0,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141919541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
COMEX: Deeply Observing Application Behavior on Real Android Devices COMEX:深入观察真实 Android 设备上的应用程序行为
CSET @ USENIX Security Symposium Pub Date : 2024-08-13 DOI: 10.1145/3675741.3675745
Zeya Umayya, Dhruv Malik, Arpit Nandi, Akshat Kumar, Sareena Karapoola, Sambuddho Chakravarty
{"title":"COMEX: Deeply Observing Application Behavior on Real Android Devices","authors":"Zeya Umayya, Dhruv Malik, Arpit Nandi, Akshat Kumar, Sareena Karapoola, Sambuddho Chakravarty","doi":"10.1145/3675741.3675745","DOIUrl":"https://doi.org/10.1145/3675741.3675745","url":null,"abstract":"","PeriodicalId":373184,"journal":{"name":"CSET @ USENIX Security Symposium","volume":"47 12","pages":"100-109"},"PeriodicalIF":0.0,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141919156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hardening the Internet of Things: Toward Designing Access Control For Resource Constrained IoT Devices 加固物联网:为资源受限的物联网设备设计访问控制
CSET @ USENIX Security Symposium Pub Date : 2024-08-13 DOI: 10.1145/3675741.3675744
Manuel Bessler, Paul Sangster, Radhika Upadrashta, TJ OConnor
{"title":"Hardening the Internet of Things: Toward Designing Access Control For Resource Constrained IoT Devices","authors":"Manuel Bessler, Paul Sangster, Radhika Upadrashta, TJ OConnor","doi":"10.1145/3675741.3675744","DOIUrl":"https://doi.org/10.1145/3675741.3675744","url":null,"abstract":"","PeriodicalId":373184,"journal":{"name":"CSET @ USENIX Security Symposium","volume":"50 9","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141919116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信