è«æãèªãã§å¹´ãè¶ãã¾ãããï¼
çºè¡¨å¹´ã»ã«ã³ãã¡ã¬ã³ã¹ã¯ç¹ã«éå®ãã¾ããï¼
åèï¼Top Crypto and Security Conferences Ranking
ã·ã¹ãã ç³»è«æç´¹ä» Advent Calendar 2015ããããï¼
SUN | MON | TUE | WED | THU | FRI | SAT |
---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | 5 | ||
6 | 7 | 8 | 9 RKX1209 | 10 | 11 ntddk | 12 |
13 | 14 unixfreaxjp | 15 akirakanaoka | 16 | 17 yuzuhara | 18 PINKSAWTOOTH | 19 hrk_______ |
20 olanleed | 21 | 22 | 23 TakeyukiUeda | 24 inaz2 | 25 |
- 12/9TaintPipe: Pipelined Symbolic Taint Analysis [Ming,et al. USENIX SEC' 15]ãèªã¿ã¾ããã¤ãã©ã¤ã³ã¢ãã«ãç¨ããã·ã³ããªãã¯ãã¤ã³ã解æã®é«éå - ãããã®æ¥è¨ ~ Out_Of_Range ~
- 12/11ããã¾ããé ãã¾ããï¼"AutoProbe: Towards Automatic Active Malicious Server Probing Using Dynamic Binary Analysis"ãèªã¿ã¾ãï¼ãã«ã¦ã§ã¢ã®åç解æã«åºã¥ãC&Cãµã¼ãã®æ¢ç´¢ | ä¸çãã¨ã§èªãã§ã
- 12/14ELFãã«ã¦ã§ã¢ã¯ã¼ã¯ã·ã§ãã#1 AVTokyo 2o15Swimming in the Sea of ELF - AV Tokyo 2015 Workshop #MalwareMustDie
- 12/15ACM CCS '15ã®Dell'Amico, et al., "Monte Carlo Strength Evaluation: Fast and Reliable Password Checking" ããã¾ã
- 12/17Trustworthy Whole-System Provenance for the Linux Kernel [Bates, et.al, USENIX SEC'15]ããã¾ãProvenanceã£ã¦çºé³ã§ããï¼Bates, et.al, Trustworthy Whole-System Provenance for the Linux Kernel [USENIX Security '15] - yuzuharaã®æ¥è¨
- 12/18ç 究ãã¼ãçºè¡¨ã¨ææã被ã£ãããå°ãé ããã¾ãã»ã»ã»A Survey on Heuristic Malware Detection Techniques - Twitterã«æ¸ããããªããã¨
- 12/19ãã«ã¦ã§ã¢è§£æã®ãªã«ãã§ãããããã¾ã¼ããããã°ãã¾ãï¼
- 12/20Lockheed Martinã®Cyber Kill ChainLockheed Martin - Cyber Kill Chain - Longbow
- 12/23SPRO '15 ã® llvm-obfuscator: software protection for the masses ããç´¹ä»ããã¦ããã ããã°è³ç¦ã®æ¬¡ç¬¬ã«ãããã¾ãSecurity - è«æç´¹ä»ï¼ãObfuscator-LLVMã大è¡ã®ããã®ã½ããã¦ã§ã¢ä¿è· - Qiita
- 12/24Heisenbyte: Thwarting Memory Disclosure Attacks using Destructive Code Reads (ACM CCS 2015)JIT-ROPç·©åææ³Heisenbyteã«ã¤ãã¦ã¾ã¨ãã¦ã¿ã - ãããããã¯ããã¸ã¼