default search action
29th ESORICS 2024: Bydgoszcz, Poland - Part III
- Joaquín García-Alfaro, Rafal Kozik, Michal Choras, Sokratis K. Katsikas:
Computer Security - ESORICS 2024 - 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Part III. Lecture Notes in Computer Science 14984, Springer 2024, ISBN 978-3-031-70895-4
Software and Systems Security
- Yangyang Shi, Linan Tian, Liwei Chen, Yanqi Yang, Gang Shi:
Scheduled Execution-Based Binary Indirect Call Targets Refinement. 3-23 - Prashanthi Mallojula, Fengjun Li, Xiaojiang Du, Bo Luo:
Companion Apps or Backdoors? On the Security of Automotive Companion Apps. 24-44 - Michal Tereszkowski-Kaminski, Santanu Kumar Dash, Guillermo Suarez-Tangil:
A Study of Malicious Source Code Reuse Among GitHub, StackOverflow and Underground Forums. 45-66 - Yu Luo, Weifeng Xu, Dianxiang Xu:
Predicting Code Vulnerability Types via Heterogeneous GNN Learning. 67-87 - Shangtong Cao, Ningyu He, Yao Guo, Haoyu Wang:
WASMixer: Binary Obfuscation for WebAssembly. 88-109 - Pyeongju Ahn, Yeonseok Jang, Seunghoon Woo, Heejo Lee:
BloomFuzz: Unveiling Bluetooth L2CAP Vulnerabilities via State Cluster Fuzzing with Target-Oriented State Machines. 110-129 - Nanyu Zhong, Yueqi Chen, Yanyan Zou, Xinyu Xing, Jinwei Dong, Bingcheng Xian, Jiaxu Zhao, Menghao Li, Binghong Liu, Wei Huo:
TGRop: Top Gun of Return-Oriented Programming Automation. 130-152 - Jean-Loup Hatchikian-Houdot, Pierre Wilke, Frédéric Besson, Guillaume Hiet:
Formal Hardware/Software Models for Cache Locking Enabling Fast and Secure Code. 153-173 - Xinrong Liu, He Wang, Meng Xu, Yuqing Zhang:
SerdeSniffer: Enhancing Java Deserialization Vulnerability Detection with Function Summaries. 174-193 - Qirui Liu, Wenbo Shen, Jinmeng Zhou, Zhuoruo Zhang, Jiayi Hu, Shukai Ni, Kangjie Lu, Rui Chang:
Interp-flow Hijacking: Launching Non-control Data Attack via Hijacking eBPF Interpretation Flow. 194-214
Applied Cryptopgraphy
- Hojune Shin, Jina Choi, Dain Lee, Kyoungok Kim, Younho Lee:
Fully Homomorphic Training and Inference on Binary Decision Tree and Random Forest. 217-237 - Feixiang Zhao, Huaxiong Wang, Jian Weng:
Constant-Size Unbounded Multi-hop Fully Homomorphic Proxy Re-encryption from Lattices. 238-258 - Zhiwei Li, Jun Xu, Yanli Zou, Lei Hu:
Key Recovery Attack on CRYSTALS-Kyber and Saber KEMs in Key Reuse Scenario. 259-278 - Pascal Lafourcade, Lola-Baie Mallordy, Charles Olivier-Anclin, Léo Robert:
Secure Keyless Multi-party Storage Scheme. 279-298 - Xiangyu Hui, Sid Chi-Kin Chau:
tt LLRing: Logarithmic Linkable Ring Signatures with Transparent Setup. 299-319 - Maximilian Radoy, Sven Hebrok, Juraj Somorovsky:
In Search of Partitioning Oracle Attacks Against TLS Session Tickets. 320-340 - Huseyin Gokay, Foteini Baldimtsi, Giuseppe Ateniese:
Atomic Swaps for Boneh-Lynn-Shacham (BLS) Based Blockchains. 341-361 - Seoyeon Hwang, Stanislaw Jarecki, Zane Karl, Elina van Kempen, Gene Tsudik:
PsfIVA: Privacy-Preserving Identity Verification Methods for Accountless Users via Private List Intersection and Variants. 362-382 - Jiuheng Su, Zhili Chen, Haifeng Qian, Junqing Gong:
Efficient and Scalable Circuit-Based Protocol for Multi-party Private Set Intersection. 383-402 - Junping Wan, Danjie Li, Junbin Fang, Zoe L. Jiang:
LPFHE: Low-Complexity Polynomial CNNs for Secure Inference over FHE. 403-423 - Tjard Langhout, Huanhuan Chen, Kaitai Liang:
File-Injection Attacks on Searchable Encryption, Based on Binomial Structures. 424-443
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.