


default search action
23rd ESORICS 2018: Barcelona, Spain
- Javier López, Jianying Zhou, Miguel Soriano:

Computer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I. Lecture Notes in Computer Science 11098, Springer 2018, ISBN 978-3-319-99072-9
Software Security
- Paul Muntean, Sebastian Wuerl, Jens Grossklags, Claudia Eckert:

CastSan: Efficient Detection of Polymorphic C++ Object Type Confusions with LLVM. 3-25 - Saed Alrabaee, Paria Shirani

, Lingyu Wang, Mourad Debbabi
, Aiman Hanna:
On Leveraging Coding Habits for Effective Binary Authorship Attribution. 26-47 - Narges Khakpour

, Charilaos Skandylas:
Synthesis of a Permissive Security Monitor. 48-65 - Yibin Liao, Ruoyan Cai, Guodong Zhu, Yue Yin, Kang Li:

MobileFindr: Function Similarity Identification for Reversing Mobile Binaries. 66-83
Blockchain and Machine Learning
- Erik-Oliver Blass, Florian Kerschbaum:

Strain: A Secure Auction for Blockchains. 87-110 - Elli Androulaki, Christian Cachin, Angelo De Caro, Eleftherios Kokoris-Kogias:

Channels: Horizontal Scaling and Confidentiality on Permissioned Blockchains. 111-131 - Mika Juuti, Bo Sun, Tatsuya Mori

, N. Asokan:
Stay On-Topic: Generating Context-Specific Fake Restaurant Reviews. 132-151 - Julien Keuffer, Refik Molva, Hervé Chabanne:

Efficient Proof Composition for Verifiable Computation. 152-171
Hardware Security
- Ben Lapid, Avishai Wool

:
Navigating the Samsung TrustZone and Cache-Attacks on the Keymaster Trustlet. 175-196 - Jingquan Ge, Neng Gao, Chenyang Tu, Ji Xiang, Zeyi Liu, Jun Yuan:

Combination of Hardware and Software: An Efficient AES Implementation Resistant to Side-Channel Attacks on All Programmable SoC. 197-217 - Heiko Mantel, Johannes Schickel, Alexandra Weber, Friedrich Weber:

How Secure Is Green IT? The Case of Software-Based Energy Side Channels. 218-239
Attacks
- Qian Cui, Guy-Vincent Jourdan, Gregor von Bochmann, Iosif-Viorel Onut, Jason Flood:

Phishing Attacks Modifications and Evolutions. 243-262 - Kiran S. Balagani, Mauro Conti

, Paolo Gasti, Martin Georgiev, Tristan Gurtler, Daniele Lain, Charissa Miller, Kendall Molas, Nikita Samarin
, Eugen Saraci, Gene Tsudik, Lynn Wu:
SILK-TV: Secret Information Leakage from Keystroke Timing Videos. 263-280 - Erisa Karafili

, Matteo Cristani, Luca Viganò
:
A Formal Approach to Analyzing Cyber-Forensics Evidence. 281-301
Malware and Vulnerabilities
- Jan Van den Herrewegen, Flavio D. Garcia:

Beneath the Bonnet: A Breakdown of Diagnostic Security. 305-324 - Chris McMahon Stone, Tom Chothia, Joeri de Ruiter

:
Extending Automated Protocol State Learning for the 802.11 4-Way Handshake. 325-345 - George Stergiopoulos

, Alexander Talavari, Evangelos Bitsikas
, Dimitris Gritzalis:
Automatic Detection of Various Malicious Traffic Using Side Channel Features on TCP Packets. 346-362 - Julian Kirsch, Zhechko Zhechev, Bruno Bierbaumer, Thomas Kittel:

PwIN - Pwning Intel piN: Why DBI is Unsuitable for Security Applications. 363-382
Protocol Security
- David Baelde, Stéphanie Delaune, Lucca Hirschi:

POR for Security Protocol Equivalences - Beyond Action-Determinism. 385-405 - Sjouke Mauw, Zach Smith, Jorge Toro-Pozo

, Rolando Trujillo-Rasua
:
Automated Identification of Desynchronisation Attacks on Shared Secrets. 406-426 - Andreas V. Hess

, Sebastian Alexander Mödersheim
, Achim D. Brucker
:
Stateful Protocol Composition. 427-446
Privacy (I)
- Tobias Urban

, Dennis Tatang, Thorsten Holz
, Norbert Pohlmann:
Towards Understanding Privacy Implications of Adware and Potentially Unwanted Programs. 449-469 - Jinguang Han

, Liqun Chen
, Steve A. Schneider, Helen Treharne
, Stephan Wesemeyer
:
Anonymous Single-Sign-On for n Designated Services with Traceability. 470-490 - Véronique Cortier, Antoine Dallon, Stéphanie Delaune:

Efficiently Deciding Equivalence for Standard Primitives and Phases. 491-511 - Katharina Kohls, Christina Pöpper

:
DigesTor: Comparing Passive Traffic Analysis Attacks on Tor. 512-530
CPS and IoT Security
- Ron Bitton, Tomer Gluck, Orly Stan, Masaki Inokuchi, Yoshinobu Ohta, Yoshiyuki Yamada, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai:

Deriving a Cost-Effective Digital Twin of an ICS to Facilitate Security Evaluation. 533-554 - Juan E. Rubio

, Rodrigo Roman, Cristina Alcaraz
, Yan Zhang:
Tracking Advanced Persistent Threats in Critical Infrastructures Through Opinion Dynamics. 555-574 - Lei Yang, Chris Seasholtz, Bo Luo

, Fengjun Li
:
Hide Your Hackable Smart Home from Remote Attacks: The Multipath Onion IoT Gateways. 575-594 - Moreno Ambrosin

, Mauro Conti
, Ahmad Ibrahim, Ahmad-Reza Sadeghi, Matthias Schunter:
SCIoT: A Secure and sCalable End-to-End Management Framework for IoT Devices. 595-617

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














