[PDF][PDF] 区块链系统攻击与防御技术研究进展
田国华, 胡云瀚, 陈晓峰 - 软件学报, 2021 - jos.org.cn
区块链作为一种多技术融合的新兴服务架构, 因其去中心化, 不可篡改等特点,
受到了学术界和工业界的广泛关注. 然而, 由于区块链技术架构的复杂性, 针对区块链的攻击方式 …
受到了学术界和工业界的广泛关注. 然而, 由于区块链技术架构的复杂性, 针对区块链的攻击方式 …
One Server for the Price of Two: Simple and Fast {Single-Server} Private Information Retrieval
We present SimplePIR, the fastest single-server private information retrieval scheme known
to date. SimplePIR's security holds under the learning-with-errors assumption. To answer a …
to date. SimplePIR's security holds under the learning-with-errors assumption. To answer a …
Authenticated private information retrieval
This paper introduces protocols for authenticated private information retrieval. These
schemes enable a client to fetch a record from a remote database server such that (a) the …
schemes enable a client to fetch a record from a remote database server such that (a) the …
Private blocklist lookups with checklist
D Kogan, H Corrigan-Gibbs - 30th USENIX security symposium (USENIX …, 2021 - usenix.org
This paper presents Checklist, a system for private blocklist lookups. In Checklist, a client
can determine whether a particular string appears on a server-held blocklist of strings …
can determine whether a particular string appears on a server-held blocklist of strings …
{Near-Optimal} Oblivious {Key-Value} Stores for Efficient {PSI},{PSU} and {Volume-Hiding}{Multi-Maps}
In this paper, we study oblivious key-value stores (OKVS) that enable encoding n key-value
pairs into length m encodings while hiding the input keys. The goal is to obtain high rate …
pairs into length m encodings while hiding the input keys. The goal is to obtain high rate …
Password policies of most top websites fail to follow best practices
K Lee, S Sjöberg, A Narayanan - Eighteenth Symposium on Usable …, 2022 - usenix.org
We examined the policies of 120 of the most popular websites for when a user creates a
new password for their account. Despite well-established advice that has emerged from the …
new password for their account. Despite well-established advice that has emerged from the …
{Communication–Computation} trade-offs in {PIR}
Communication–Computation Trade-offs in PIR Page 1 This paper is included in the Proceedings
of the 30th USENIX Security Symposium. August 11–13, 2021 978-1-939133-24-3 Open access to …
of the 30th USENIX Security Symposium. August 11–13, 2021 978-1-939133-24-3 Open access to …
[PDF][PDF] The cyber security body of knowledge
D Basin - University of Bristol, ch. Formal Methods for, 2021 - cybok.org
The CyBOK project would like to understand how the CyBOK is being used and its uptake.
The project would like organisations using, or intending to use, CyBOK for the purposes of …
The project would like organisations using, or intending to use, CyBOK for the purposes of …
Driving {2FA} adoption at scale: Optimizing {Two-Factor} authentication notification design patterns
Two-factor authentication (2FA) is one of the primary mechanisms for defending end-user
accounts against phishing and password reuse attacks. Unfortunately, getting users to adopt …
accounts against phishing and password reuse attacks. Unfortunately, getting users to adopt …
Research progress on attack and defense techniques in block-chain system
田国华, 胡云瀚, 陈晓峰 - Journal of Software, 2021 - jos.org.cn
区块链作为一种多技术融合的新兴服务架构, 因其去中心化, 不可篡改等特点,
受到了学术界和工业界的广泛关注. 然而, 由于区块链技术架构的复杂性, 针对区块链的攻击方式 …
受到了学术界和工业界的广泛关注. 然而, 由于区块链技术架构的复杂性, 针对区块链的攻击方式 …