


default search action
29th ESORICS 2024: Bydgoszcz, Poland - Part III
- Joaquín García-Alfaro

, Rafal Kozik
, Michal Choras
, Sokratis K. Katsikas
:
Computer Security - ESORICS 2024 - 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Part III. Lecture Notes in Computer Science 14984, Springer 2024, ISBN 978-3-031-70895-4
Software and Systems Security
- Yangyang Shi, Linan Tian, Liwei Chen, Yanqi Yang, Gang Shi:

Scheduled Execution-Based Binary Indirect Call Targets Refinement. 3-23 - Prashanthi Mallojula, Fengjun Li, Xiaojiang Du, Bo Luo:

Companion Apps or Backdoors? On the Security of Automotive Companion Apps. 24-44 - Michal Tereszkowski-Kaminski

, Santanu Kumar Dash
, Guillermo Suarez-Tangil
:
A Study of Malicious Source Code Reuse Among GitHub, StackOverflow and Underground Forums. 45-66 - Yu Luo

, Weifeng Xu
, Dianxiang Xu
:
Predicting Code Vulnerability Types via Heterogeneous GNN Learning. 67-87 - Shangtong Cao, Ningyu He, Yao Guo, Haoyu Wang:

WASMixer: Binary Obfuscation for WebAssembly. 88-109 - Pyeongju Ahn, Yeonseok Jang, Seunghoon Woo, Heejo Lee:

BloomFuzz: Unveiling Bluetooth L2CAP Vulnerabilities via State Cluster Fuzzing with Target-Oriented State Machines. 110-129 - Nanyu Zhong

, Yueqi Chen, Yanyan Zou
, Xinyu Xing, Jinwei Dong, Bingcheng Xian, Jiaxu Zhao, Menghao Li, Binghong Liu, Wei Huo
:
TGRop: Top Gun of Return-Oriented Programming Automation. 130-152 - Jean-Loup Hatchikian-Houdot

, Pierre Wilke
, Frédéric Besson
, Guillaume Hiet
:
Formal Hardware/Software Models for Cache Locking Enabling Fast and Secure Code. 153-173 - Xinrong Liu, He Wang, Meng Xu, Yuqing Zhang:

SerdeSniffer: Enhancing Java Deserialization Vulnerability Detection with Function Summaries. 174-193 - Qirui Liu

, Wenbo Shen
, Jinmeng Zhou
, Zhuoruo Zhang
, Jiayi Hu
, Shukai Ni
, Kangjie Lu
, Rui Chang
:
Interp-flow Hijacking: Launching Non-control Data Attack via Hijacking eBPF Interpretation Flow. 194-214
Applied Cryptopgraphy
- Hojune Shin, Jina Choi, Dain Lee, Kyoungok Kim, Younho Lee

:
Fully Homomorphic Training and Inference on Binary Decision Tree and Random Forest. 217-237 - Feixiang Zhao, Huaxiong Wang, Jian Weng:

Constant-Size Unbounded Multi-hop Fully Homomorphic Proxy Re-encryption from Lattices. 238-258 - Zhiwei Li, Jun Xu, Yanli Zou, Lei Hu:

Key Recovery Attack on CRYSTALS-Kyber and Saber KEMs in Key Reuse Scenario. 259-278 - Pascal Lafourcade

, Lola-Baie Mallordy
, Charles Olivier-Anclin
, Léo Robert
:
Secure Keyless Multi-party Storage Scheme. 279-298 - Xiangyu Hui, Sid Chi-Kin Chau

:
tt LLRing: Logarithmic Linkable Ring Signatures with Transparent Setup. 299-319 - Maximilian Radoy

, Sven Hebrok
, Juraj Somorovsky
:
In Search of Partitioning Oracle Attacks Against TLS Session Tickets. 320-340 - Huseyin Gokay, Foteini Baldimtsi

, Giuseppe Ateniese
:
Atomic Swaps for Boneh-Lynn-Shacham (BLS) Based Blockchains. 341-361 - Seoyeon Hwang, Stanislaw Jarecki, Zane Karl, Elina van Kempen, Gene Tsudik:

PsfIVA: Privacy-Preserving Identity Verification Methods for Accountless Users via Private List Intersection and Variants. 362-382 - Jiuheng Su, Zhili Chen, Haifeng Qian, Junqing Gong:

Efficient and Scalable Circuit-Based Protocol for Multi-party Private Set Intersection. 383-402 - Junping Wan, Danjie Li, Junbin Fang

, Zoe L. Jiang:
LPFHE: Low-Complexity Polynomial CNNs for Secure Inference over FHE. 403-423 - Tjard Langhout, Huanhuan Chen, Kaitai Liang:

File-Injection Attacks on Searchable Encryption, Based on Binomial Structures. 424-443

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














