default search action
21st ESORICS 2016: Heraklion, Greece
- Ioannis G. Askoxylakis, Sotiris Ioannidis, Sokratis K. Katsikas, Catherine Meadows:
Computer Security - ESORICS 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I. Lecture Notes in Computer Science 9878, Springer 2016, ISBN 978-3-319-45743-7
Network and Web Security
- Bharat Srinivasan, Payas Gupta, Manos Antonakakis, Mustaque Ahamad:
Understanding Cross-Channel Abuse with SMS-Spam Support Infrastructure Attribution. 3-26 - Marc Juarez, Mohsen Imani, Mike Perry, Claudia Díaz, Matthew Wright:
Toward an Efficient Website Fingerprinting Defense. 27-46 - Suryadipta Majumdar, Yosr Jarraya, Taous Madi, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Proactive Verification of Security Compliance for Clouds Through Pre-computation: Application to OpenStack. 47-66
Authentication
- Weining Yang, Ninghui Li, Ian M. Molloy, Youngja Park, Suresh N. Chari:
Comparing Password Ranking Algorithms on Real-World Password Datasets. 69-90 - Aldar C.-F. Chan, Jun Wen Wong, Jianying Zhou, Joseph Chee Ming Teo:
Scalable Two-Factor Authentication Using Historical Data. 91-110 - Ding Wang, Ping Wang:
On the Implications of Zipf's Law in Passwords. 111-131
Encrypted Search
- Jun Zhou, Zhenfu Cao, Xiaolei Dong:
PPOPM: More Efficient Privacy Preserving Outsourced Pattern Matching. 135-153 - Shifeng Sun, Joseph K. Liu, Amin Sakzad, Ron Steinfeld, Tsz Hon Yuen:
An Efficient Non-interactive Multi-client Searchable Encryption with Support for Boolean Queries. 154-172 - Aggelos Kiayias, Ozgur Oksuz, Alexander Russell, Qiang Tang, Bing Wang:
Efficient Encrypted Keyword Search for Multi-user Data Sharing. 173-195
Detection and Monitoring
- Gábor Pék, Zsombor Lázár, Zoltán Várnagy, Márk Félegyházi, Levente Buttyán:
Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis. 199-216 - Luka Malisa, Kari Kostiainen, Michael Och, Srdjan Capkun:
Mobile Application Impersonation Detection Using Dynamic User Interface Extraction. 217-237 - Qianru Wu, Qixu Liu, Yuqing Zhang, Peng Liu, Guanxing Wen:
A Machine Learning Approach for Detecting Third-Party Trackers on the Web. 238-258
Cryptography for Cloud Computing
- Céline Chevalier, Fabien Laguillaumie, Damien Vergnaud:
Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis and Optimal Constructions. 261-278 - Nesrine Kaaniche, Maryline Laurent:
Attribute-Based Signatures for Supporting Anonymous Certification. 279-300 - Yongge Wang, Qutaibah M. Malluhi:
Privacy Preserving Computation in Cloud Using Noise-Free Fully Homomorphic Encryption (FHE) Schemes. 301-323 - Jia Xu, Anjia Yang, Jianying Zhou, Duncan S. Wong:
Lightweight Delegatable Proofs of Storage. 324-343 - Michael Backes, Amir Herzberg, Aniket Kate, Ivan Pryvalov:
Anonymous RAM. 344-362 - Russell W. F. Lai, Tao Zhang, Sherman S. M. Chow, Dominique Schröder:
Efficient Sanitizable Signatures Without Random Oracles. 363-380
Operating Systems Security
- Carter Yagemann, Wenliang Du:
Intentio Ex Machina: Android Intent Access Control via an Extensible Application Hook. 383-400 - Xiao Zhang, Yousra Aafer, Kailiang Ying, Wenliang Du:
Hey, You, Get Off of My Image: Detecting Data Residue in Android Images. 401-421 - Elias Athanasopoulos, Vasileios P. Kemerlis, Georgios Portokalidis, Angelos D. Keromytis:
NaClDroid: Native Code Isolation for Android Applications. 422-439 - Nico Weichbrodt, Anil Kurmus, Peter R. Pietzuch, Rüdiger Kapitza:
AsyncShock: Exploiting Synchronisation Bugs in Intel SGX Enclaves. 440-457 - Fabo Wang, Yuqing Zhang, Kai Wang, Peng Liu, Wenjie Wang:
Stay in Your Cage! A Sound Sandbox for Third-Party Libraries on Android. 458-476 - Bahman Rashidi, Carol J. Fung, Anh Nguyen, Tam Vu:
Android Permission Recommendation Using Transitive Bayesian Inference Model. 477-497
Information Flow
- Nataliia Bielova, Tamara Rezk:
Spot the Difference: Secure Multi-execution and Multiple Facets. 501-519 - Oliver Woizekowski, Ron van der Meyden:
On Reductions from Multi-Domain Noninterference to the Two-Level Case. 520-537 - Marco Vassena, Pablo Buiras, Lucas Waye, Alejandro Russo:
Flexible Manipulation of Labeled Values for Information-Flow Control Libraries. 538-557
Software Security
- Daniel Schoepe, Musard Balliu, Frank Piessens, Andrei Sabelfeld:
Let's Face It: Faceted Values for Taint Tracking. 561-580 - Spandan Veggalam, Sanjay Rawat, István Haller, Herbert Bos:
IFuzzer: An Evolutionary Interpreter Fuzzer Using Genetic Programming. 581-601 - Patrick Wollgast, Robert Gawlik, Behrad Garmany, Benjamin Kollenda, Thorsten Holz:
Automated Multi-architectural Discovery of CFI-Resistant Code Gadgets. 602-620
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.