default search action
22nd ESORICS 2017: Oslo, Norway
- Simon N. Foley, Dieter Gollmann, Einar Snekkenes:
Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II. Lecture Notes in Computer Science 10493, Springer 2017, ISBN 978-3-319-66398-2 - Ivan Gazeau, Steve Kremer:
Automated Analysis of Equivalence Properties for Security Protocols Using Else Branches. 1-20 - Arthur Gervais, Alexandros Filios, Vincent Lenders, Srdjan Capkun:
Quantifying Web Adblocker Privacy. 21-42 - Essam Ghadafi:
More Efficient Structure-Preserving Signatures - Or: Bypassing the Type-III Lower Bounds. 43-61 - Kathrin Grosse, Nicolas Papernot, Praveen Manoharan, Michael Backes, Patrick D. McDaniel:
Adversarial Examples for Malware Detection. 62-79 - Berk Gülmezoglu, Andreas Zankl, Thomas Eisenbarth, Berk Sunar:
PerfWeb: How to Violate Web Privacy with Hardware Performance Events. 80-97 - Mordechai Guri, Yosef A. Solewicz, Andrey Daidakulov, Yuval Elovici:
Acoustic Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard-Drive Noise ('DiskFiltration'). 98-115 - Mario Heiderich, Christopher Späth, Jörg Schwenk:
DOMPurify: Client-Side Protection Against XSS and Markup Injection. 116-134 - Soyoung Kim, Sora Lee, Geumhwan Cho, Muhammad Ejaz Ahmed, Jaehoon (Paul) Jeong, Hyoungshick Kim:
Preventing DNS Amplification Attacks Using the History of DNS Queries with SDN. 135-152 - Amrit Kumar, Clément Fischer, Shruti Tople, Prateek Saxena:
A Traceability Analysis of Monero's Blockchain. 153-173 - David S. Leslie, Chris Sherfield, Nigel P. Smart:
Multi-rate Threshold FlipThem. 174-190 - Moritz Lipp, Daniel Gruss, Michael Schwarz, David Bidner, Clémentine Maurice, Stefan Mangard:
Practical Keystroke Timing Attacks in Sandboxed JavaScript. 191-209 - Weijie Liu, Debin Gao, Michael K. Reiter:
On-Demand Time Blurring to Support Side-Channel Defense. 210-228 - Siqi Ma, Ferdian Thung, David Lo, Cong Sun, Robert H. Deng:
VuRLE: Automatic Vulnerability Detection and Repair by Learning from Examples. 229-246 - Rajib Ranjan Maiti, Sandra Siby, Ragav Sridharan, Nils Ole Tippenhauer:
Link-Layer Device Type Classification on Encrypted Wireless Traffic with COTS Radios. 247-264 - Suryadipta Majumdar, Yosr Jarraya, Momen Oqaily, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
LeaPS: Learning-Based Proactive Security Auditing for Clouds. 265-285 - Xiaozhu Meng, Barton P. Miller, Kwang-Sung Jun:
Identifying Multiple Authors in a Binary Program. 286-304 - Shohei Miyama, Kenichi Kourai:
Secure IDS Offloading with Nested Virtualization and Deep VM Introspection. 305-323 - Philipp Morgner, Christian Müller, Matthias Ring, Björn M. Eskofier, Christian Riess, Frederik Armknecht, Zinaida Benenson:
Privacy Implications of Room Climate Data. 324-343 - Genki Osada, Kazumasa Omote, Takashi Nishide:
Network Intrusion Detection Based on Semi-supervised Variational Auto-Encoder. 344-361 - Panagiotis Papadopoulos, Giorgos Vasiliadis, Giorgos Christou, Evangelos P. Markatos, Sotiris Ioannidis:
No Sugar but All the Taste! Memory Encryption Without Architectural Support. 362-380 - Joachim Biskup, Marcel Preuß:
Inference-Proof Updating of a Weakened View Under the Modification of Input Parameters. 381-401 - Juan E. Rubio, Cristina Alcaraz, Javier López:
Preventing Advanced Persistent Threats in Complex Control Networks. 402-418 - Antonino Rullo, Edoardo Serra, Elisa Bertino, Jorge Lobo:
Shortfall-Based Optimal Placement of Security Resources for Mobile IoT Scenarios. 419-436 - Steffen Schulz, André Schaller, Florian Kohnhäuser, Stefan Katzenbeisser:
Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT Sensors. 437-455 - Shifeng Sun, Man Ho Au, Joseph K. Liu, Tsz Hon Yuen:
RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero. 456-474 - Iraklis Symeonidis, Abdelrahaman Aly, Mustafa A. Mustafa, Bart Mennink, Siemen Dhooghe, Bart Preneel:
SePCAR: A Secure and Privacy-Enhancing Protocol for Car Access Provision. 475-493 - Raymond K. H. Tai, Jack P. K. Ma, Yongjun Zhao, Sherman S. M. Chow:
Privacy-Preserving Decision Trees Evaluation via Linear Functions. 494-512 - Sam L. Thomas, Tom Chothia, Flavio D. Garcia:
Stringer: Measuring the Importance of Static Data Comparisons to Detect Backdoors and Undocumented Functionality. 513-531 - Kotoko Yamada, Nuttapong Attrapadung, Keita Emura, Goichiro Hanaoka, Keisuke Tanaka:
Generic Constructions for Fully Secure Revocable Attribute-Based Encryption. 532-551 - Yihua Zhang, Marina Blanton, Fattaneh Bayatbabolghani:
Enforcing Input Correctness via Certification in Garbled Circuit Evaluation. 552-569
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.