In many real-world scenarios, being able to infer specific software versions or variations of cryptographic libraries is critical to mounti...
This paper, titled "PortPrint: Identifying Inaccessible Code with Port Contention," addresses a critical challenge in security research: inferring spe...
Microarchitectural attacks threaten system security and privacy, especially if they can be mounted without native code execution. Recent re...
This paper introduces a significant new vector for microarchitectural attacks, expanding the landscape of "scriptless" side-channel vulnerabilities. B...
Detecting malicious software or hardware behavior during the operation of a computer system requires observables from one or more abstracti...
The submission, titled "Poster: A microarchitectural signals analysis platform to craft Hardware Security Counters," addresses a critical challenge in...
This poster proposes to address the critical challenge of "Isolating PIM from OS Level Adversaries," a topic of high relevance in contemporary system...
This talk overviews our recent work on TLBlur, a novel approach that leverages compiler instrumentation and the recent AEX-Notify hardware...
This talk outlines "TLBlur," a promising new approach to mitigating controlled-channel attacks against Intel SGX enclaves. The work leverages a novel...
Este artigo apresenta uma proposta teórico-conceitual para investigar metodologias criativas e epistemologias sonoras de culturas de música eletrônica...
This article, "MACETAMENTO NO BEAT PEGA HACKER," introduces a compelling theoretical-conceptual framework aimed at investigating the creative methodol...
This paper develops a secured enterprise network terminal security solution that seeks to safeguard the confidentiality, integrity, and availability o...
This paper, "Design Of an Enterprise Network Terminal Security Solution," addresses a highly pertinent and critical issue in contemporary network secu...
Amidst the rapid development of technology, website vulnerabilities are a major threat, opening up opportunities for hackers to hunt and st...
This paper addresses a highly relevant and critical topic: the security posture of the UNIPDU Jombang campus website. By employing a Vulnerability Ass...
Salah satu langkah preventif untuk meminimalisir dampak buruk serangan siber adalah dengan melakukan penilaian kerentanan yang hasilnya dapat dianalis...
This paper, titled "Vulnerability Analysis of FMIPA UNSRAT Website Based on Open Web Application Security Project Top 10 Framework," addresses a highl...
Steganografi merupakan teknik untuk menyembunyikan pesan rahasia dalam media digital guna menjaga kerahasiaan informasi. Penelitian ini menerapkan met...
This paper presents a focused investigation into the application of the Least Significant Bit (LSB) method for embedding secret messages within graysc...
Showing 11 to 20 of 24 results
By Sciaria
By Sciaria
By Sciaria
By Sciaria
By Sciaria
By Sciaria