


default search action
22nd ESORICS 2017: Oslo, Norway
- Simon N. Foley, Dieter Gollmann, Einar Snekkenes:

Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II. Lecture Notes in Computer Science 10493, Springer 2017, ISBN 978-3-319-66398-2 - Ivan Gazeau, Steve Kremer

:
Automated Analysis of Equivalence Properties for Security Protocols Using Else Branches. 1-20 - Arthur Gervais, Alexandros Filios, Vincent Lenders

, Srdjan Capkun:
Quantifying Web Adblocker Privacy. 21-42 - Essam Ghadafi

:
More Efficient Structure-Preserving Signatures - Or: Bypassing the Type-III Lower Bounds. 43-61 - Kathrin Grosse, Nicolas Papernot, Praveen Manoharan, Michael Backes, Patrick D. McDaniel:

Adversarial Examples for Malware Detection. 62-79 - Berk Gülmezoglu

, Andreas Zankl
, Thomas Eisenbarth
, Berk Sunar:
PerfWeb: How to Violate Web Privacy with Hardware Performance Events. 80-97 - Mordechai Guri, Yosef A. Solewicz, Andrey Daidakulov, Yuval Elovici:

Acoustic Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard-Drive Noise ('DiskFiltration'). 98-115 - Mario Heiderich, Christopher Späth, Jörg Schwenk:

DOMPurify: Client-Side Protection Against XSS and Markup Injection. 116-134 - Soyoung Kim, Sora Lee, Geumhwan Cho

, Muhammad Ejaz Ahmed, Jaehoon (Paul) Jeong, Hyoungshick Kim:
Preventing DNS Amplification Attacks Using the History of DNS Queries with SDN. 135-152 - Amrit Kumar, Clément Fischer, Shruti Tople, Prateek Saxena:

A Traceability Analysis of Monero's Blockchain. 153-173 - David S. Leslie

, Chris Sherfield, Nigel P. Smart:
Multi-rate Threshold FlipThem. 174-190 - Moritz Lipp, Daniel Gruss

, Michael Schwarz, David Bidner, Clémentine Maurice
, Stefan Mangard
:
Practical Keystroke Timing Attacks in Sandboxed JavaScript. 191-209 - Weijie Liu

, Debin Gao
, Michael K. Reiter:
On-Demand Time Blurring to Support Side-Channel Defense. 210-228 - Siqi Ma

, Ferdian Thung, David Lo
, Cong Sun
, Robert H. Deng
:
VuRLE: Automatic Vulnerability Detection and Repair by Learning from Examples. 229-246 - Rajib Ranjan Maiti

, Sandra Siby
, Ragav Sridharan
, Nils Ole Tippenhauer
:
Link-Layer Device Type Classification on Encrypted Wireless Traffic with COTS Radios. 247-264 - Suryadipta Majumdar, Yosr Jarraya, Momen Oqaily, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang, Mourad Debbabi

:
LeaPS: Learning-Based Proactive Security Auditing for Clouds. 265-285 - Xiaozhu Meng

, Barton P. Miller, Kwang-Sung Jun:
Identifying Multiple Authors in a Binary Program. 286-304 - Shohei Miyama, Kenichi Kourai

:
Secure IDS Offloading with Nested Virtualization and Deep VM Introspection. 305-323 - Philipp Morgner, Christian Müller

, Matthias Ring
, Björn M. Eskofier
, Christian Riess
, Frederik Armknecht
, Zinaida Benenson:
Privacy Implications of Room Climate Data. 324-343 - Genki Osada, Kazumasa Omote, Takashi Nishide:

Network Intrusion Detection Based on Semi-supervised Variational Auto-Encoder. 344-361 - Panagiotis Papadopoulos

, Giorgos Vasiliadis
, Giorgos Christou, Evangelos P. Markatos, Sotiris Ioannidis:
No Sugar but All the Taste! Memory Encryption Without Architectural Support. 362-380 - Joachim Biskup, Marcel Preuß:

Inference-Proof Updating of a Weakened View Under the Modification of Input Parameters. 381-401 - Juan E. Rubio, Cristina Alcaraz

, Javier López:
Preventing Advanced Persistent Threats in Complex Control Networks. 402-418 - Antonino Rullo

, Edoardo Serra
, Elisa Bertino, Jorge Lobo
:
Shortfall-Based Optimal Placement of Security Resources for Mobile IoT Scenarios. 419-436 - Steffen Schulz, André Schaller, Florian Kohnhäuser, Stefan Katzenbeisser:

Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT Sensors. 437-455 - Shifeng Sun, Man Ho Au

, Joseph K. Liu, Tsz Hon Yuen
:
RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero. 456-474 - Iraklis Symeonidis

, Abdelrahaman Aly, Mustafa A. Mustafa
, Bart Mennink, Siemen Dhooghe
, Bart Preneel
:
SePCAR: A Secure and Privacy-Enhancing Protocol for Car Access Provision. 475-493 - Raymond K. H. Tai, Jack P. K. Ma

, Yongjun Zhao
, Sherman S. M. Chow
:
Privacy-Preserving Decision Trees Evaluation via Linear Functions. 494-512 - Sam L. Thomas, Tom Chothia, Flavio D. Garcia:

Stringer: Measuring the Importance of Static Data Comparisons to Detect Backdoors and Undocumented Functionality. 513-531 - Kotoko Yamada, Nuttapong Attrapadung, Keita Emura

, Goichiro Hanaoka, Keisuke Tanaka:
Generic Constructions for Fully Secure Revocable Attribute-Based Encryption. 532-551 - Yihua Zhang, Marina Blanton

, Fattaneh Bayatbabolghani:
Enforcing Input Correctness via Certification in Garbled Circuit Evaluation. 552-569

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














