日本综合一区二区|亚洲中文天堂综合|日韩欧美自拍一区|男女精品天堂一区|欧美自拍第6页亚洲成人精品一区|亚洲黄色天堂一区二区成人|超碰91偷拍第一页|日韩av夜夜嗨中文字幕|久久蜜综合视频官网|精美人妻一区二区三区

RELATEED CONSULTING
相關(guān)咨詢(xún)
選擇下列產(chǎn)品馬上在線溝通
服務(wù)時(shí)間:8:30-17:00
你可能遇到了下面的問(wèn)題
關(guān)閉右側(cè)工具欄

新聞中心

這里有您想知道的互聯(lián)網(wǎng)營(yíng)銷(xiāo)解決方案
BlackHatUSA2015文章中英文索引

著名的BlackHat 2015黑帽盛會(huì)早已結(jié)束,會(huì)議之后放出了近百篇會(huì)議文章或PPT,英文文章傳送門(mén)。這里對(duì)其中的文章英文標(biāo)題進(jìn)行了中文翻譯,方便大家快速找到感興趣的文章話(huà)題。

本人也不是專(zhuān)職翻譯,翻譯不好的地方還望見(jiàn)諒,這里權(quán)當(dāng)拋磚引玉。

BlackHat 2015黑客盛會(huì)文章和PPT集錦:

Title: Abusing XSLT For Practical Attacks

標(biāo)題:濫用XSLT進(jìn)行高效攻擊

Title: Take A Hacker To Work Day——How Federal Prosecutors Use The CFAA

標(biāo)題:帶著黑客去工作——論聯(lián)邦檢察官對(duì)CFAA的運(yùn)用

Title: Automated Human Vulnerability Scanning With AVA

標(biāo)題:基于AVA的人類(lèi)自動(dòng)化漏洞掃描

Title: Certifigate——Front Door Access To Pwning Millions Of Androids

標(biāo)題:證書(shū)漏洞——攻破無(wú)數(shù)安卓系統(tǒng)的前門(mén)路徑

Title: SMB: Sharing More Than Just Your Files

標(biāo)題:SMB協(xié)議:不只是共享你的文件

Title: Switches Get Stitches

標(biāo)題:讓網(wǎng)絡(luò)交換設(shè)備得到修補(bǔ)

Title: API Deobfuscator: Resolving Obfuscated API Functions In Modern Packers

標(biāo)題:API混淆代碼閱讀器——解析現(xiàn)代軟件殼中的混淆API功能

Title: Pen Testing A City

標(biāo)題:一座城市的滲透測(cè)試

Title: Commercial Spyware-Detecting The Undetectable

標(biāo)題:商業(yè)間諜軟件——檢測(cè)那些不可測(cè)的

Title: Exploiting Out-of-order Execution: Processor Side Channels to Enable Cross VM Code Execution

標(biāo)題:無(wú)序執(zhí)行命令的運(yùn)用——通過(guò)處理器旁道攻擊實(shí)現(xiàn)跨VM代碼執(zhí)行

Title: Behind the Mask: The Agenda, Tricks, and Tactics of the Federal Trade Commission as They Regulate Cybersecurity

標(biāo)題:面具的背后:聯(lián)邦貿(mào)易委員會(huì)規(guī)范網(wǎng)絡(luò)安全的議程,竅門(mén)和戰(zhàn)術(shù)

Title: Deep Learning on Disassembly

標(biāo)題:利用深度學(xué)習(xí)分析惡意軟件

Title: The Memory Sinkhole: An Architectural Privilege Escalation Vunerability /Unleashing an x86 Design Flaw Allowing Universal Privilege Escalation

標(biāo)題:記憶的深坑:一個(gè)設(shè)計(jì)上的通用權(quán)限升級(jí)漏洞/x86的設(shè)計(jì)缺陷導(dǎo)致通用提權(quán)

Title: Crash Pay: How to Own and Clone Contactless Payment Devices/ Crash and Pay: Owning and Cloning Payment Devices

標(biāo)題:如何擁有和克隆一個(gè)非接觸式支付設(shè)備

Title: Securing Your Bigdata Environment

標(biāo)題:保護(hù)你的大數(shù)據(jù)環(huán)境

Title: Breaking HTTPS with BGP Hijacking

標(biāo)題:通過(guò)BGP劫持擊破HTTPS

Title: Fuzzing Android System Services by Binder Call to Escalate Privilege

標(biāo)題:通過(guò)綁定調(diào)用挖掘Android系統(tǒng)服務(wù)漏洞提權(quán)

Title: Abusing Silent Mitigations: Understanding Weaknesses within Internet Explorer’s Isolated Heap and MemoryProtection

標(biāo)題:沉默緩解的濫用:了解IE瀏覽器堆棧和內(nèi)存保護(hù)的不足之處

Title: Abusing Windows Management Instrumentation (WMI) to Build a Persistent Asynchronous and Fileless Backdoor

標(biāo)題:濫用Windows管理診斷建立持久的異步無(wú)文件后門(mén)

Title: The Lifecycle of a Revolution

標(biāo)題:革命的生命周期

Title: Internet-Scale File Analysis

標(biāo)題:互聯(lián)網(wǎng)規(guī)模的文件分析

Title: These are not your Grand Daddy’s CPU Performance Counters: CPU Hardware Performance Counters for Security

標(biāo)題:這不是你爺爺?shù)腃PU性能計(jì)數(shù)器:CPU硬件安全性能計(jì)數(shù)器

Title: Taxonomic Modeling of Security Threats in Software Defined Networking

標(biāo)題:軟件定義的網(wǎng)絡(luò)中(SDN)安全威脅的分類(lèi)模型

Title: Thunderstrike 2: Sith Strike

標(biāo)題:Thunderstrike(病毒名稱(chēng)) 2: Sith方式的攻擊

Title: How Vulnerable Are We to Scams?

標(biāo)題:在騙局面前我們有多么弱?

Title: Hidden Risks of Biometric Identifiers and How to Avoid Them

標(biāo)題:生物統(tǒng)計(jì)鑒別的隱患及其防范措施

Title: Server Side Template Injection RCE for the Modern Web App

標(biāo)題:針對(duì)現(xiàn)代Web應(yīng)用程序的服務(wù)器端模板注入攻擊RCE

Title: Taking Event Correlation with You

標(biāo)題:讓事件與你同在

Title: Most Ransomware isn’t as Complex as You Might Think

標(biāo)題:大多數(shù)勒索軟件沒(méi)有你想象中的復(fù)雜

Title: Internet-facing PLCs—A New Back Orifice

標(biāo)題:面向互聯(lián)網(wǎng)的PLCs——一個(gè)新的后門(mén)

Title: Rocking the Pocket Book: Hacking Chemical Plant for Competition and Extortion

標(biāo)題:震動(dòng)的口袋書(shū):為了競(jìng)爭(zhēng)和敲詐,非法入侵化學(xué)工廠

Title: Using Static Binary Analysis to Find Vulnerabilities and Backdoors in Firmware

標(biāo)題:在固件中使用靜態(tài)二進(jìn)制分析尋找漏洞和后門(mén)

Title: How to Implement IT Security after a Cyber Meltdown

標(biāo)題:網(wǎng)絡(luò)崩潰后如何實(shí)現(xiàn)IT安全

Title: Harnessing Intelligence from Malware Repositories

標(biāo)題:從惡意軟件資料庫(kù)中提取情報(bào)

Title: Remote Physical Damage 101: Bread and Butter Attacks

標(biāo)題:遠(yuǎn)程物理?yè)p害101:黃油面包式的攻擊

Title: Optimized Fuzzing IOKit in iOS

標(biāo)題:iOS最佳模糊測(cè)試工具——IOKit

Title: Attacking Interoperability: An OLE Edition

標(biāo)題:攻擊互操作性:對(duì)象鏈接與嵌入的一個(gè)版本

Title: Graphic Content Ahead: Towards Automated Scalable Analysis of Graphical Images Embedded in Malware

標(biāo)題:圖形內(nèi)容前瞻:對(duì)嵌入惡意軟件內(nèi)的圖形圖像的自動(dòng)化、可擴(kuò)展性分析

Title: Big Game Hunting: The Peculiarities of Nation-State Malware Research

標(biāo)題:大型狩獵游戲:民族國(guó)家間惡意軟件的獨(dú)特性研究

Title: Faux Disk Encryption: Realities of Secure Storage on Mobile Devices

標(biāo)題:Faux磁盤(pán)加密:移動(dòng)設(shè)備存儲(chǔ)安全的實(shí)情

Title: Mobile Point of Scam: Attacking the Square Reader

標(biāo)題:手機(jī)詐騙的關(guān)鍵點(diǎn):攻擊移動(dòng)支付設(shè)備

Title: Red vs Blue: Modern Active Directory Attacks, Detection, and-Protection

標(biāo)題:紅與藍(lán):現(xiàn)代活動(dòng)目錄的攻擊,檢測(cè)和保護(hù)

Title: Defeating Pass-the-Hash: Separation of Powers

標(biāo)題:擊潰哈希傳遞攻擊:權(quán)力的分離

Title: Spread Spectrum Satcom Hacking: Attacking the GlobalStar Simplex Data Service

標(biāo)題:非法入侵?jǐn)U頻通信衛(wèi)星:攻擊全球星的單一數(shù)據(jù)服務(wù)

Title: Morgan Web: Timing Attacks Made Practical

標(biāo)題:摩根網(wǎng)絡(luò):時(shí)序攻擊成為現(xiàn)實(shí)

Title: CrackLord Maximizing Password Cracking

標(biāo)題:CrackLord使密碼破解得以最高效化

Title: Breaking Payloads with Runtime Code Stripping and Image Freezing

標(biāo)題:通過(guò)運(yùn)行時(shí)間代碼剝離和圖像凍結(jié)破解有效載荷

Title: Dom Flow: Untangling the Dom for More Easy Juicy Bugs

標(biāo)題:Dom流:解決DOM更易涉及隱私的漏洞問(wèn)題

Title: The NSA Playset: A Year of Toys and Tools

標(biāo)題:NSA(美國(guó)國(guó)安局)玩具:一年的玩具和工具

Title: This is DeepERENT: Tracking App Behaviors with (Nothing Changed) Phone for Evasive Android Malware

標(biāo)題:DeepERENT:規(guī)避安卓惡意軟件追蹤應(yīng)用程序的行為

Title: Winning the Online Banking War

標(biāo)題:贏得網(wǎng)銀戰(zhàn)爭(zhēng)的勝利

Title: GameOver Zeus: Bad guys and Backends

標(biāo)題:宙斯游戲結(jié)束:壞人和后端

Title: Staying Persistent in Software Defined Networks

標(biāo)題:在軟件定義的網(wǎng)絡(luò)(SDN)中保持持久性

Title: Repurposing OnionDuke: A Single Case Study around Reusing Nation State Malware

標(biāo)題:OnionDuke的再利用:關(guān)于國(guó)家惡意軟件再利用的一個(gè)案例分析

Title: Understanding and Managing Entropy Usage

標(biāo)題:理解和解決熵的使用

Title: Hi! This is Urgent Plz Fix ASAP: Critical Vulnerabilities and Bug Bounty Programs

標(biāo)題:嘿,這是迫切需要盡快修復(fù)的:重要的漏洞發(fā)現(xiàn)獎(jiǎng)勵(lì)制度

Title: The State of BGP Security: Internet Plumbing For Security Professionals

標(biāo)題:BGP的安全狀況:網(wǎng)絡(luò)需要安全專(zhuān)家

Title: When IoT Attacks: Hacking a Linux-Powered Rifle

標(biāo)題:在物聯(lián)網(wǎng)攻擊時(shí):入侵一把Linux驅(qū)動(dòng)的步槍

Title: Why Security Data Science Matters and How it’s Different?

標(biāo)題:數(shù)據(jù)安全技術(shù)的重要性及其獨(dú)特性

Title: The Tactical Application Security Program Getting Stuff Done

標(biāo)題:把事情做好的戰(zhàn)術(shù)型應(yīng)用安全程序

Title: Exploiting the DRAM Rowhammer Bug to Gain Kernel Privileges

標(biāo)題:利用DRAM Rowhammer漏洞獲取Kernel權(quán)限

Title: Attacking Your Trusted Core: Exploiting TrustZone on Android

標(biāo)題:攻擊你“信賴(lài)的核心”:在安卓系統(tǒng)上利用信任區(qū)域

Title: Attacking ECMA Script Engines with Redefinition

標(biāo)題:重新定義ECMA攻擊腳本引擎

Title: The Node. Js Highway—Attacks are at Full Throttle

標(biāo)題:Node. Js高速路——攻擊都是開(kāi)足馬力的

Title: My Bro The ELK: Obtaining Context from Security Events

標(biāo)題:我的兄弟“麋鹿”:從安全事件中獲取事件的背景

Title: WSUSpect: Compromising the Windows Enterprise via Windows Update

標(biāo)題:WSUSpect——通過(guò)更新Windows入侵Windows企業(yè)

Title: Subverting Satellite Receivers for Botnet and Profit

標(biāo)題:利益驅(qū)使被僵尸網(wǎng)絡(luò)破壞的衛(wèi)星信號(hào)接收

Title: Advanced IC Reverse Engineering Techniques: In Depth Analysis of a Modern Smart Card

標(biāo)題:先進(jìn)的集成電路逆向工程技術(shù):對(duì)現(xiàn)代智能卡的詳細(xì)分析

Title: Exploiting XXE Vulnerabilities in File Parsing/Upload Functionality

標(biāo)題:利用文件解析/上載功能中的XXE漏洞

Title: Targeted Takedowns: Minimizing Collateral Damage Using Passive DNS

標(biāo)題:有針對(duì)性的擊殺:使用被動(dòng)DNS將附帶損害最小化

Title: FileCry: The New Age of XXE

標(biāo)題:cry文件:XXE的新時(shí)代

Title: Review and Exploit Neglected Attack Surface in iOS 8

標(biāo)題:iOS 8中被忽視攻擊界面的研究和開(kāi)發(fā)利用

Title: The Applications of Deep Learning on Traffic Identification

標(biāo)題:深度學(xué)習(xí)技術(shù)在流量識(shí)別領(lǐng)域的應(yīng)用

Title: Writing Bad @$$ Malware for OS X

標(biāo)題:針對(duì)蘋(píng)果操作系統(tǒng)編寫(xiě)惡意軟件

Title: The Little Pump Gauge That Could: Attacks Against Gas Pump Monitoring Systems

標(biāo)題:可以對(duì)氣泵監(jiān)測(cè)系統(tǒng)進(jìn)行攻擊的小泵測(cè)量?jī)x

Title: ROPInjector: Using Return-Oriented Programming for Polymorphism and Antivirus Evasion

標(biāo)題:ROP注射:使用面向?qū)ο蟮亩鄳B(tài)性與反病毒規(guī)避程序設(shè)計(jì)

Title: Ah! Universal Android Rooting is Back

標(biāo)題:通用安卓Root回來(lái)了

Title: Understanding the Attack Surface and Attack Resilience of Project Spartan’s (Edge) New EdgeHTML Rendering Engine

標(biāo)題:了解斯巴達(dá)項(xiàng)目的新款EdgeHTML渲染引擎的攻擊界面和攻擊韌性

Title: Cloning 3G/4G SIM Cards With a PC and an Oscilloscope: Lessons Learned in Physical Security

標(biāo)題:用一臺(tái)計(jì)算機(jī)和示波器克隆3G/4G SIM卡:物理/實(shí)體安全的經(jīng)驗(yàn)教訓(xùn)

Title: From False Positives to Actionable Analysis: Behavioral Intrusion Detection Machine Learning And The SOC

標(biāo)題:從錯(cuò)誤的結(jié)果到可操作的分析:行為入侵檢測(cè)機(jī)器學(xué)習(xí)和SOC

Title: Bypass Control Flow Guard Comprehensively

標(biāo)題:全面繞過(guò)控制流的守衛(wèi)(CFG)

Title: Fingerprints On Mobile Devices: Abusing and Leaking

標(biāo)題:移動(dòng)設(shè)備的指紋:濫用和泄漏

Title: ZigBee Exploited—The Good, the Bad, and the Ugly

標(biāo)題: ZigBee的開(kāi)發(fā)利用——善,惡,丑


網(wǎng)頁(yè)名稱(chēng):BlackHatUSA2015文章中英文索引
URL鏈接:http://www.dlmjj.cn/article/djiijgi.html