default search action
23rd ESORICS 2018: Barcelona, Spain
- Javier López, Jianying Zhou, Miguel Soriano:
Computer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I. Lecture Notes in Computer Science 11098, Springer 2018, ISBN 978-3-319-99072-9
Software Security
- Paul Muntean, Sebastian Wuerl, Jens Grossklags, Claudia Eckert:
CastSan: Efficient Detection of Polymorphic C++ Object Type Confusions with LLVM. 3-25 - Saed Alrabaee, Paria Shirani, Lingyu Wang, Mourad Debbabi, Aiman Hanna:
On Leveraging Coding Habits for Effective Binary Authorship Attribution. 26-47 - Narges Khakpour, Charilaos Skandylas:
Synthesis of a Permissive Security Monitor. 48-65 - Yibin Liao, Ruoyan Cai, Guodong Zhu, Yue Yin, Kang Li:
MobileFindr: Function Similarity Identification for Reversing Mobile Binaries. 66-83
Blockchain and Machine Learning
- Erik-Oliver Blass, Florian Kerschbaum:
Strain: A Secure Auction for Blockchains. 87-110 - Elli Androulaki, Christian Cachin, Angelo De Caro, Eleftherios Kokoris-Kogias:
Channels: Horizontal Scaling and Confidentiality on Permissioned Blockchains. 111-131 - Mika Juuti, Bo Sun, Tatsuya Mori, N. Asokan:
Stay On-Topic: Generating Context-Specific Fake Restaurant Reviews. 132-151 - Julien Keuffer, Refik Molva, Hervé Chabanne:
Efficient Proof Composition for Verifiable Computation. 152-171
Hardware Security
- Ben Lapid, Avishai Wool:
Navigating the Samsung TrustZone and Cache-Attacks on the Keymaster Trustlet. 175-196 - Jingquan Ge, Neng Gao, Chenyang Tu, Ji Xiang, Zeyi Liu, Jun Yuan:
Combination of Hardware and Software: An Efficient AES Implementation Resistant to Side-Channel Attacks on All Programmable SoC. 197-217 - Heiko Mantel, Johannes Schickel, Alexandra Weber, Friedrich Weber:
How Secure Is Green IT? The Case of Software-Based Energy Side Channels. 218-239
Attacks
- Qian Cui, Guy-Vincent Jourdan, Gregor von Bochmann, Iosif-Viorel Onut, Jason Flood:
Phishing Attacks Modifications and Evolutions. 243-262 - Kiran S. Balagani, Mauro Conti, Paolo Gasti, Martin Georgiev, Tristan Gurtler, Daniele Lain, Charissa Miller, Kendall Molas, Nikita Samarin, Eugen Saraci, Gene Tsudik, Lynn Wu:
SILK-TV: Secret Information Leakage from Keystroke Timing Videos. 263-280 - Erisa Karafili, Matteo Cristani, Luca Viganò:
A Formal Approach to Analyzing Cyber-Forensics Evidence. 281-301
Malware and Vulnerabilities
- Jan Van den Herrewegen, Flavio D. Garcia:
Beneath the Bonnet: A Breakdown of Diagnostic Security. 305-324 - Chris McMahon Stone, Tom Chothia, Joeri de Ruiter:
Extending Automated Protocol State Learning for the 802.11 4-Way Handshake. 325-345 - George Stergiopoulos, Alexander Talavari, Evangelos Bitsikas, Dimitris Gritzalis:
Automatic Detection of Various Malicious Traffic Using Side Channel Features on TCP Packets. 346-362 - Julian Kirsch, Zhechko Zhechev, Bruno Bierbaumer, Thomas Kittel:
PwIN - Pwning Intel piN: Why DBI is Unsuitable for Security Applications. 363-382
Protocol Security
- David Baelde, Stéphanie Delaune, Lucca Hirschi:
POR for Security Protocol Equivalences - Beyond Action-Determinism. 385-405 - Sjouke Mauw, Zach Smith, Jorge Toro-Pozo, Rolando Trujillo-Rasua:
Automated Identification of Desynchronisation Attacks on Shared Secrets. 406-426 - Andreas V. Hess, Sebastian Alexander Mödersheim, Achim D. Brucker:
Stateful Protocol Composition. 427-446
Privacy (I)
- Tobias Urban, Dennis Tatang, Thorsten Holz, Norbert Pohlmann:
Towards Understanding Privacy Implications of Adware and Potentially Unwanted Programs. 449-469 - Jinguang Han, Liqun Chen, Steve A. Schneider, Helen Treharne, Stephan Wesemeyer:
Anonymous Single-Sign-On for n Designated Services with Traceability. 470-490 - Véronique Cortier, Antoine Dallon, Stéphanie Delaune:
Efficiently Deciding Equivalence for Standard Primitives and Phases. 491-511 - Katharina Kohls, Christina Pöpper:
DigesTor: Comparing Passive Traffic Analysis Attacks on Tor. 512-530
CPS and IoT Security
- Ron Bitton, Tomer Gluck, Orly Stan, Masaki Inokuchi, Yoshinobu Ohta, Yoshiyuki Yamada, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai:
Deriving a Cost-Effective Digital Twin of an ICS to Facilitate Security Evaluation. 533-554 - Juan E. Rubio, Rodrigo Roman, Cristina Alcaraz, Yan Zhang:
Tracking Advanced Persistent Threats in Critical Infrastructures Through Opinion Dynamics. 555-574 - Lei Yang, Chris Seasholtz, Bo Luo, Fengjun Li:
Hide Your Hackable Smart Home from Remote Attacks: The Multipath Onion IoT Gateways. 575-594 - Moreno Ambrosin, Mauro Conti, Ahmad Ibrahim, Ahmad-Reza Sadeghi, Matthias Schunter:
SCIoT: A Secure and sCalable End-to-End Management Framework for IoT Devices. 595-617
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.