共 81 条
[1]
Alahmadi BA, 2022, PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, P2783
[2]
Hijacking Bitcoin: Routing Attacks on Cryptocurrencies
[J].
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2017,
:375-392
[3]
Arp D, 2022, PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, P3971
[4]
Practical Traffic Analysis Attacks on Secure Messaging Applications
[J].
27TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2020),
2020,
[5]
FlowLens: Enabling Efficient Flow Classification for ML-based Network Security Applications
[J].
28TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2021),
2021,
[6]
Bartos K, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P807
[7]
Just the Tip of the Iceberg: Internet-Scale Exploitation of Routers for Cryptojacking
[J].
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19),
2019,
:449-464
[8]
Bilge L, 2012, 28TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2012), P129
[9]
Bitcoin, A Peer-to-Peer Electronic Cash System
[10]
Cao Y, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P209