2017 安全文库

2017-00001: [paper] SoK: Systematic Classification of Side-Channel Attacks on Mobile Devices

2017-00002: [article] 2016’s Mobile Threat Landscape Brings Diversity, Scale, and Scope - TrendLabs Security Intelligence Blog

2017-00003: [article] Reversing the Parrot SkyController Firmware

2017-00004: [article] Exploiting IoT enabled BLE smart bulb security - IoT Exploitation and Mobile Security Pentesting by Attify

2017-00005: [article] Danfoss Wireless Thermostat Hacking – Part One | Hacking at Home

2017-00006: [Thesis] ON GENERATING GADGET CHAINS FOR RETURN-ORIENTED PROGRAMMING

2017-00007: [paper] SoK: Exploiting Network Printers

2017-00008: [Thesis] IMPROVING MOBILE-MALWARE INVESTIGATIONS WITH STATIC AND DYNAMIC CODE ANALYSIS TECHNIQUES

2017-00009: [paper] REV.NG : A Unified Binary Analysis Framework to Recover CFGs and Function Boundaries

2017-00010: [paper] Reverse engineering a Java Card memory management algorithm

2017-00011: [article] 利用漏洞解锁锤子T1/2手机的bootloader

2017-00012: [article] Owning a Locked OnePlus 3/3T: Bootloader Vulnerabilities

2017-00013: [paper] Cold Boot Attacks are Still Hot: Security Analysis of Memory Scramblers in Modern Processors

2017-00014: [paper] Ramblr: Making Reassembly Great Again

2017-00015: [paper] Show Me the Money! Finding Flawed Implementations of Third-party In-app Payment in Android Apps

2017-00016: [paper] Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit

2017-00017: [paper] ASLR^Cache: Practical Cache Attacks on the MMU

2017-00018: [paper] GRIFFIN: Guarding Control Flows Using Intel Processor Trace

2017-00019: [paper] Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping

2017-00020: [paper] SPAIN: Security Patch Analysis for Binaries Towards Understanding the Pain and Pills

2017-00021: [paper] Collusive Data Leak and More: Large-scale Threat Analysis of Inter-app Communications

2017-00022: [paper] LibD: Scalable and Precise Third-party Library Detection in Android Markets

2017-00023: [paper] Android Privacy C(R)ache: Reading your External Storage and Sensors for Fun and Profit

2017-00024: [paper] Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targeted Stack Spraying

2017-00025: [paper] WindowGuard: Systematic Protection of GUI Security in Android

2017-00026: [paper] Nail: A Practical Tool for Parsing and Generating Data Formats

2017-00027: [paper] Operating Systems for Low-End Devices in the Internet of Things: a Survey

2017-00028: [book] SEI CERT C Coding Standard: Rules for Developing Safe, Reliable, and Secure Systems (2016 Edition)

2017-00029: [book] SEI CERT C++ Coding Standard: Rules for Developing Safe, Reliable, and Secure Systems in C++ (2016 Edition)

2017-00030: [slides] From off-the-shelf embedded devices to research platforms. Two case studies: a PLC and a SSD

2017-00031: [article] How I Hacked an Android App to Get Free Beer

2017-00032: [paper] Travioli: A Dynamic Analysis for Detecting Data-Structure Traversals

2017-00033: [paper] Strict Virtual Call Integrity Checking for C++ Binaries

你可能感兴趣的:(2017 安全文库)