Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Qintao Shen"'
Publikováno v:
Cybersecurity, Vol 7, Iss 1, Pp 1-15 (2024)
Abstract The exploitable heap layouts are used to determine the exploitability of heap vulnerabilities in general-purpose applications. Prior studies have focused on using fuzzing-based methods to generate more exploitable heap layouts. However, the
Externí odkaz:
https://doaj.org/article/79fc6dce17d64deca33144caa1bd55fa
Publikováno v:
AIP Advances, Vol 14, Iss 7, Pp 075212-075212-10 (2024)
This paper presents a numerical simulation study on the coupling of lasers and waterjets, focusing on the distribution of the spot power density. The analysis utilized a laser wavelength of 532 nm, chosen for its minimal energy attenuation in water.
Externí odkaz:
https://doaj.org/article/0047792ced5e4937aee22276997ad5dc
Publikováno v:
Information Security and Cryptology ISBN: 9783031265525
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::59536e776b3713d8ad19da8daf9babf9
https://doi.org/10.1007/978-3-031-26553-2_21
https://doi.org/10.1007/978-3-031-26553-2_21
Autor:
Kai Chen, Haixu Tang, Wenhao Wang, Xinyu Wang, XiaoFeng Wang, Yaosong Lu, Qintao Shen, Yi Chen, Hongbo Chen, Weijie Liu
Publikováno v:
DSN
Proc (Int Conf Dependable Syst Netw)
Proc (Int Conf Dependable Syst Netw)
A trusted execution environment (TEE) such as Intel Software Guard Extension (SGX) runs attestation to prove to a data owner the integrity of the initial state of an enclave, including the program to operate on her data. For this purpose, the data-pr
Publikováno v:
CCS
Recently Adversarial Examples (AEs) that deceive deep learning models have been a topic of intense research interest. Compared with the AEs in the digital space, the physical adversarial attack is considered as a more severe threat to the application
Control Flow Integrity (CFI) is one of the most promising technique to defend Code-Reuse Attacks (CRAs). Traditional CFI Systems and recent Context-Sensitive CFI use coarse control flow graphs (CFGs) to analyze whether the control flow hijack occurs,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::22423dc8418e586b12ca18e16d6391f8