default search action
25th ESORICS 2020: Guildford, UK - Part I
- Liqun Chen, Ninghui Li, Kaitai Liang, Steve A. Schneider:
Computer Security - ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part I. Lecture Notes in Computer Science 12308, Springer 2020, ISBN 978-3-030-58950-9
Database and Web Security
- Jianting Ning, Xinyi Huang, Geong Sen Poh, Shengmin Xu, Jia-Ch'ng Loh, Jian Weng, Robert H. Deng:
Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection Establishment. 3-22 - Lorenzo Veronese, Stefano Calzavara, Luca Compagna:
Bulwark: Holistic and Verified Security Monitoring of Web Protocols. 23-41 - Shweta Agrawal, Rachit Garg, Nishant Kumar, Manoj Prabhakaran:
A Practical Model for Collaborative Databases: Securely Mixing, Searching and Computing. 42-63
System Security I
- Weijing You, Bo Chen, Limin Liu, Jiwu Jing:
Deduplication-Friendly Watermarking for Multimedia Data in Public Clouds. 67-87 - Dvir Cohen, Yisroel Mirsky, Manuel Kamp, Tobias Martin, Yuval Elovici, Rami Puzis, Asaf Shabtai:
DANTE: A Framework for Mining and Monitoring Darknet Traffic. 88-109 - Anisa Halimi, Erman Ayday:
Efficient Quantification of Profile Matching Risk in Social Networks Using Belief Propagation. 110-130
Network Security I
- Christian Cachin, Daniel Collins, Tyler Crain, Vincent Gramoli:
Anonymity Preserving Byzantine Vector Consensus. 133-152 - Abdulmalik Humayed, Fengjun Li, Jingqiang Lin, Bo Luo:
CANSentry: Securing CAN-Based Cyber-Physical Systems against Denial and Spoofing Attacks. 153-173 - Juan E. Rubio, Cristina Alcaraz, Ruben Rios, Rodrigo Roman, Javier López:
Distributed Detection of APTs: Consensus vs. Clustering. 174-192 - Angèle Bossuat, Xavier Bultel, Pierre-Alain Fouque, Cristina Onete, Thyla van der Merwe:
Designing Reverse Firewalls for the Real World. 193-213
Software Security
- Fernando Alves, Ambrose Andongabo, Ilir Gashi, Pedro M. Ferreira, Alysson Bessani:
Follow the Blue Bird: A Study on Threat Data Published on Twitter. 217-236 - Robert Lyerly, Xiaoguang Wang, Binoy Ravindran:
Dynamic and Secure Memory Transformation in Userspace. 237-256 - Peiyu Liu, Shouling Ji, Lirong Fu, Kangjie Lu, Xuhong Zhang, Wei-Han Lee, Tao Lu, Wenzhi Chen, Raheem Beyah:
Understanding the Security Risks of Docker Hub. 257-276 - Mauro Conti, Pier Paolo Tricomi, Gene Tsudik:
DE-auth of the Blue! Transparent De-authentication Using Bluetooth Low Energy Beacon. 277-294 - Jianguo Jiang, Gengwang Li, Min Yu, Gang Li, Chao Liu, Zhiqiang Lv, Bin Lv, Weiqing Huang:
Similarity of Binaries Across Optimization Levels and Obfuscation. 295-315 - Yunlan Du, Zhenyu Ning, Jun Xu, Zhilong Wang, Yueh-Hsun Lin, Fengwei Zhang, Xinyu Xing, Bing Mao:
HART: Hardware-Assisted Kernel Module Tracing on Arm. 316-337 - Jinfeng Li, Liwei Chen, Qizhen Xu, Linan Tian, Gang Shi, Kai Chen, Dan Meng:
Zipper Stack: Shadow Stacks Without Shadow. 338-358 - Weipeng Jiang, Bin Wu, Xingxin Yu, Rui Xue, Zhengmin Yu:
Restructured Cloning Vulnerability Detection Based on Function Semantic Reserving and Reiteration Screening. 359-376 - Jens Neureither, Alexandra Dmitrienko, David Koisser, Ferdinand Brasser, Ahmad-Reza Sadeghi:
LegIoT: Ledgered Trust Management Platform for IoT. 377-396
Machine Learning Security
- Yanjun Zhang, Guangdong Bai, Xue Li, Caitlin Curtis, Chen Chen, Ryan K. L. Ko:
PrivColl: Practical Privacy-Preserving Collaborative Machine Learning. 399-418 - Liyan Shen, Xiaojun Chen, Jinqiao Shi, Ye Dong, Binxing Fang:
An Efficient 3-Party Framework for Privacy-Preserving Neural Network Inference. 419-439 - Loïc Masure, Nicolas Belleville, Eleonora Cagli, Marie-Angela Cornelie, Damien Couroussé, Cécile Dumas, Laurent Maingault:
Deep Learning Side-Channel Analysis on Large-Scale Traces - A Case Study on a Polymorphic AES. 440-460 - Yihe Zhang, Jiadong Lou, Li Chen, Xu Yuan, Jin Li, Tom Johnsten, Nian-Feng Tzeng:
Towards Poisoning the Neural Collaborative Filtering-Based Recommender Systems. 461-479 - Vale Tolpegin, Stacey Truex, Mehmet Emre Gursoy, Ling Liu:
Data Poisoning Attacks Against Federated Learning Systems. 480-501 - Dario Pasquini, Giuseppe Ateniese, Massimo Bernaschi:
Interpretable Probabilistic Password Strength Meters via Deep Learning. 502-522 - Amani Abu Jabal, Elisa Bertino, Jorge Lobo, Mark Law, Alessandra Russo, Seraphin B. Calo, Dinesh C. Verma:
Polisma - A Framework for Learning Attribute-Based Access Control Policies. 523-544 - Wenqi Wei, Ling Liu, Margaret Loper, Ka Ho Chow, Mehmet Emre Gursoy, Stacey Truex, Yanzhao Wu:
A Framework for Evaluating Client Privacy Leakages in Federated Learning. 545-566
Network Security II
- Nazatul Haque Sultan, Vijay Varadharajan, Seyit Camtepe, Surya Nepal:
An Accountable Access Control Scheme for Hierarchical Content in Named Data Networks with Revocation. 569-590 - Yu Chen, Xuecheng Ma, Cong Tang, Man Ho Au:
PGC: Decentralized Confidential Payment System with Auditability. 591-610 - Jun Shen, Fuchun Guo, Xiaofeng Chen, Willy Susilo:
Secure Cloud Auditing with Efficient Ownership Transfer. 611-631
Privacy
- Jeroen Pijnenburg, Bertram Poettering:
Encrypt-to-Self: Securely Outsourcing Storage. 635-654 - Yang Cao, Yonghui Xiao, Shun Takagi, Li Xiong, Masatoshi Yoshikawa, Yilin Shen, Jinfei Liu, Hongxia Jin, Xiaofeng Xu:
PGLP: Customizable and Rigorous Location Privacy Through Policy Graph. 655-676 - Ivan Oleynikov, Elena Pagnin, Andrei Sabelfeld:
Where Are You Bob? Privacy-Preserving Proximity Testing with a Napping Party. 677-697
Password and Policy
- Radek Hranický, Lukás Zobal, Ondrej Rysavý, Dusan Kolár, Dávid Mikus:
Distributed PCFG Password Cracking. 701-719 - Matteo Cardaioli, Mauro Conti, Kiran S. Balagani, Paolo Gasti:
Your PIN Sounds Good! Augmentation of PIN Guessing Strategies via Audio Leakage. 720-735 - Miroslaw Kutylowski, Anna Lauks-Dutka, Moti Yung:
GDPR - Challenges for Reconciling Legal Rules with Technical Reality. 736-755
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.