


default search action
28th ESORICS 2023: The Hague, The Netherlands - Part III
- Gene Tsudik, Mauro Conti

, Kaitai Liang
, Georgios Smaragdakis:
Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part III. Lecture Notes in Computer Science 14346, Springer 2024, ISBN 978-3-031-51478-4
Attacks
- Karthikeyan Bhargavan

, Abhishek Bichhawat
, Pedram Hosseyni
, Ralf Küsters
, Klaas Pruiksma
, Guido Schmitz
, Clara Waldmann
, Tim Würtele
:
Layered Symbolic Security Analysis in $\textsf {DY}^\star $. 3-21 - Daniel Weber, Fabian Thomas, Lukas Gerlach, Ruiyi Zhang

, Michael Schwarz:
Indirect Meltdown: Building Novel Side-Channel Attacks from Transient-Execution Attacks. 22-42 - Amit Cohen, Mahmood Sharif:

Accessorize in the Dark: A Security Analysis of Near-Infrared Face Recognition. 43-61 - Lukas Gerlach, Fabian Thomas, Robert Pietsch, Michael Schwarz:

A Rowhammer Reproduction Study Using the Blacksmith Fuzzer. 62-79 - Daniel Weber, Fabian Thomas, Lukas Gerlach, Ruiyi Zhang

, Michael Schwarz:
Reviving Meltdown 3a. 80-99 - Tristan Claverie, Gildas Avoine, Stéphanie Delaune, José Lopes-Esteves:

Tamarin-Based Analysis of Bluetooth Uncovers Two Practical Pairing Confusion Attacks. 100-119 - Sowoong Kim, Myeonggyun Han, Woongki Baek:

MARF: A Memory-Aware CLFLUSH-Based Intra- and Inter-CPU Side-Channel Attack. 120-140 - Tingting Rao, Yixin Su, Peng Xu

, Yubo Zheng, Wei Wang, Hai Jin:
You Reset I Attack! A Master Password Guessing Attack Against Honey Password Vaults. 141-161 - Jehyun Lee, Zhe Xin, Melanie Ng Pei See, Kanav Sabharwal, Giovanni Apruzzese

, Dinil Mon Divakaran:
Attacking Logo-Based Phishing Website Detectors with Adversarial Perturbations. 162-182 - Lin Li

, Chao Chen, Lei Pan, Yonghang Tai, Jun Zhang, Yang Xiang:
Hiding Your Signals: A Security Analysis of PPG-Based Biometric Authentication. 183-202 - Heitor Uchoa, Vipul Arora, Dennis Vermoen, Marco Ottavi, Nikolaos Alachiotis:

Exploring Genomic Sequence Alignment for Improving Side-Channel Analysis. 203-221 - Florian Helmschmidt, Pedram Hosseyni

, Ralf Küsters
, Klaas Pruiksma
, Clara Waldmann
, Tim Würtele
:
The Grant Negotiation and Authorization Protocol: Attacking, Fixing, and Verifying an Emerging Standard. 222-242 - Hubert Kario

:
Everlasting ROBOT: The Marvin Attack. 243-262 - Bowen Xu, Shijie Jia, Jingqiang Lin, Fangyu Zheng, Yuan Ma, Limin Liu, Xiaozhuo Gu, Li Song:

JWTKey: Automatic Cryptographic Vulnerability Detection in JWT Applications. 263-282
Blockchain
- Zhichun Lu, Ren Zhang

:
When is Slower Block Propagation More Profitable for Large Miners? 285-305 - Shaoyu Li, Shanghao Shi, Yang Xiao, Chaoyu Zhang, Y. Thomas Hou

, Wenjing Lou
:
Bijack: Breaking Bitcoin Network with TCP Vulnerabilities. 306-326 - Charalambos Mitropoulos, Thodoris Sotiropoulos, Sotiris Ioannidis, Dimitris Mitropoulos:

Syntax-Aware Mutation for Testing the Solidity Compiler. 327-347 - Sungwook Kim

, Sungju Kim
, Yulim Shin
, Sunmi Kim
, Jihye Kim
, Hyunok Oh
:
Efficient Transparent Polynomial Commitments for zk-SNARKs. 348-366 - Jianhuan Wang, Jichen Li, Zecheng Li, Xiaotie Deng, Bin Xiao:

n-MVTL Attack: Optimal Transaction Reordering Attack on DeFi. 367-386
Miscellaneous
- Reyhaneh Rabaninejad, Behzad Abdolmaleki, Giulio Malavolta, Antonis Michalas

, Amir Nabizadeh:
stoRNA: Stateless Transparent Proofs of Storage-time. 389-410 - Shang Song, Lin Liu, Rongmao Chen, Wei Peng, Yi Wang:

Secure Approximate Nearest Neighbor Search with Locality-Sensitive Hashing. 411-430 - Ofir Cohen

, Ron Bitton
, Asaf Shabtai
, Rami Puzis
:
ConGISATA: A Framework for Continuous Gamified Information Security Awareness Training and Assessment. 431-451 - Luca Arnaboldi

, David Aspinall, Christina Kolb, Sasa Radomirovic
:
Tactics for Account Access Graphs. 452-470 - Constantin Catalin Dragan

, François Dupressoir, Kristian Gjøsteen, Thomas Haines, Peter B. Rønne, Morten Rotvold Solberg:
Machine-Checked Proofs of Accountability: How to sElect Who is to Blame. 471-491

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














