Posts

True2F: Backdoor-resistant authentication tokens

July 9, 2019
S&P2019 system secruity

Why Does Your Data Leak? Uncovering the Data Leakage in Cloud from Mobile Apps

July 9, 2019
S&P2019 cloud security

Resident Evil: Understanding Residential IP Proxy as a Dark Service

July 8, 2019
S&P2019 network secruity

Erpass

June 26, 2019

YODA: Enabling computationally intensive contracts on blockchains with Byzantine and Selfish nodes

May 14, 2019

Sajin Sasy, Sergey Gorbunov, Christopher W. Fletcher. ZeroTrace: Oblivious Memory Primitives from Intel SGX.

May 14, 2019

现代 C99, C11 标准下的 C 语言编程

April 13, 2019
c linux

Atom 的第一次尝试

April 9, 2019
atom editor

Windows Server Core 管理与 PowerShell 笔记(九)———— PowerShell 面向对象脚本语言

April 7, 2019
windows powershell

Windows Server Core 管理与 PowerShell 笔记(八)———— 计算机管理(进程、服务、日志)

April 7, 2019
windows powershell