


default search action
EuroS&P 2017: Paris, France
- 2017 IEEE European Symposium on Security and Privacy, EuroS&P 2017, Paris, France, April 26-28, 2017. IEEE 2017, ISBN 978-1-5090-5762-7

Side Channels
- Timothy Trippel, Ofir Weisse, Wenyuan Xu, Peter Honeyman, Kevin Fu:

WALNUT: Waging Doubt on the Integrity of MEMS Accelerometers with Acoustic Injection Attacks. 3-18 - Florian Tramèr

, Fan Zhang
, Huang Lin, Jean-Pierre Hubaux, Ari Juels, Elaine Shi:
Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge. 19-34 - Daniel Arp, Erwin Quiring

, Christian Wressnegger, Konrad Rieck:
Privacy Threats through Ultrasonic Side Channels on Mobile Devices. 35-47
Protocol Security
- Nikita Veshchikov, Sylvain Guilley:

Use of Simulators for Side-Channel Analysis. 51-59 - Marc Fischlin, Felix Günther:

Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates. 60-75 - Michael Backes, Jannik Dreier, Steve Kremer

, Robert Künnemann:
A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and Its Application to Fair Exchange. 76-91 - Joseph Lallemand, David A. Basin, Christoph Sprenger

:
Refining Authenticated Key Agreement with Strong Adversaries. 92-107
Applied Cryptography
- Giuseppe Ateniese

, Bernardo Magri
, Daniele Venturi, Ewerton R. Andrade
:
Redactable Blockchain - or - Rewriting History in Bitcoin and Friends. 111-126 - Angelo Massimo Perillo

, Giuseppe Persiano, Alberto Trombetta
:
Secure Queries on Encrypted Multi-writer Tables. 127-141 - Joël Alwen, Jeremiah Blocki

:
Towards Practical Attacks on Argon2i and Balloon Hashing. 142-157 - Yupeng Zhang, Jonathan Katz, Charalampos Papamanthou:

An Expressive (Zero-Knowledge) Set Accumulator. 158-173
Malware
- Dennis Andriesse, Asia Slowinska, Herbert Bos

:
Compiler-Agnostic Function Detection in Binaries. 177-189 - Yunhan Jack Jia, Qi Alfred Chen, Yikai Lin

, Chao Kong, Zhuoqing Morley Mao:
Open Doors for Bob and Mallory: Open Port Usage in Android Apps and Security Implications. 190-203 - Michael Backes, Mohammad Nauman

:
LUNA: Quantifying and Leveraging Uncertainty in Android Malware Analysis through Bayesian Machine Learning. 204-217 - Mordechai Guri, Yisroel Mirsky, Yuval Elovici:

9-1-1 DDoS: Attacks, Analysis and Mitigation. 218-232
Systematization
- Merve Sahin, Aurélien Francillon

, Payas Gupta, Mustaque Ahamad:
SoK: Fraud in Telephony Networks. 235-250 - Christian Mainka

, Vladislav Mladenov, Jörg Schwenk, Tobias Wich
:
SoK: Single Sign-On Security - An Evaluation of OpenID Connect. 251-266
Privacy-preserving Systems
- Jan Camenisch, Anja Lehmann:

Privacy-Preserving User-Auditable Pseudonym Systems. 269-284 - Michael T. Goodrich

, Evgenios M. Kornaropoulos
, Michael Mitzenmacher, Roberto Tamassia
:
Auditable Data Structures. 285-300 - Foteini Baldimtsi, Jan Camenisch, Maria Dubovitskaya, Anna Lysyanskaya, Leonid Reyzin, Kai Samelin, Sophia Yakoubov

:
Accumulators with Applications to Anonymity-Preserving Revocation. 301-315
Web Security and Privacy
- Georg Merzdovnik

, Markus Huber, Damjan Buhov, Nick Nikiforakis, Sebastian Neuner, Martin Schmiedecker, Edgar R. Weippl:
Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools. 319-333 - Michael Backes, Konrad Rieck, Malte Skoruppa, Ben Stock

, Fabian Yamaguchi:
Efficient and Flexible Discovery of PHP Application Vulnerabilities. 334-349 - Avinash Sudhodanan, Roberto Carbone

, Luca Compagna, Nicolas Dolgin, Alessandro Armando
, Umberto Morelli
:
Large-Scale Analysis & Detection of Authentication Cross-Site Request Forgeries. 350-365 - Roman Rogowski, Micah Morton, Forrest Li, Fabian Monrose, Kevin Z. Snow, Michalis Polychronakis:

Revisiting Browser Security in the Modern Era: New Data-Only Attacks and Defenses. 366-381
Human Aspects of Security and Privacy
- Ada Lerner

, Eric Zeng, Franziska Roesner:
Confidante: Usable Encrypted Email: A Case Study with Lawyers and Journalists. 385-400 - Florian Tramèr

, Vaggelis Atlidakis, Roxana Geambasu, Daniel J. Hsu, Jean-Pierre Hubaux, Mathias Humbert, Ari Juels, Huang Lin:
FairTest: Discovering Unwarranted Associations in Data-Driven Applications. 401-416 - Genevieve Gebhart, Tadayoshi Kohno:

Internet Censorship in Thailand: User Practices and Potential Threats. 417-432
Secure Messaging and Mobile Security
- Nadim Kobeissi

, Karthikeyan Bhargavan, Bruno Blanchet
:
Automated Verification for Secure Messaging Protocols and Their Implementations: A Symbolic and Computational Approach. 435-450 - Katriel Cohn-Gordon, Cas Cremers, Benjamin Dowling

, Luke Garratt, Douglas Stebila
:
A Formal Security Analysis of the Signal Messaging Protocol. 451-466 - Véronique Cortier, Alicia Filipiak, Jan Florent, Said Gharout, Jacques Traoré:

Designing and Proving an EMV-Compliant Payment Protocol for Mobile Devices. 467-480 - Michael Backes, Sven Bugiel, Oliver Schranz, Philipp von Styp-Rekowsky, Sebastian Weisgerber:

ARTist: The Android Runtime Instrumentation and Security Toolkit. 481-495
System Security
- Martín Ochoa

, Sebastian Banescu
, Cynthia Disenfeld, Gilles Barthe
, Vijay Ganesh
:
Reasoning about Probabilistic Defense Mechanisms against Remote Attacks. 499-513 - Xi Chen, Herbert Bos

, Cristiano Giuffrida
:
CodeArmor: Virtualizing the Code Space to Counter Disclosure Attacks. 514-529 - Charlie Jacomme

, Steve Kremer
, Guillaume Scerri:
Symbolic Models for Isolated Execution Environments. 530-545 - Siqi Zhao, Xuhua Ding

:
On the Effectiveness of Virtualization Based Memory Isolation on Multicore Platforms. 546-560
Network Security
- Kashyap Thimmaraju, Liron Schiff, Stefan Schmid

:
Outsmarting Network Security with SDN Teleportation. 563-578 - Maciej Korczynski, Samaneh Tajalizadehkhoob, Arman Noroozian, Maarten Wullink, Cristian Hesselman, Michel van Eeten:

Reputation Metrics Design to Improve Intermediary Incentives for Security of TLDs. 579-594 - Hyunwook Hong, Hyunwoo Choi, Dongkwan Kim

, Hongil Kim, Byeongdo Hong, Jiseong Noh, Yongdae Kim
:
When Cellular Networks Met IPv6: Security Problems of Middleboxes in IPv6 Cellular Networks. 595-609 - Karthikeyan Bhargavan, Ioana Boureanu

, Pierre-Alain Fouque
, Cristina Onete
, Benjamin Richard:
Content delivery over TLS: a cryptographic analysis of keyless SSL. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














