default search action
28th ESORICS 2023: The Hague, The Netherlands - Part III
- Gene Tsudik, Mauro Conti, Kaitai Liang, Georgios Smaragdakis:
Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part III. Lecture Notes in Computer Science 14346, Springer 2024, ISBN 978-3-031-51478-4
Attacks
- Karthikeyan Bhargavan, Abhishek Bichhawat, Pedram Hosseyni, Ralf Küsters, Klaas Pruiksma, Guido Schmitz, Clara Waldmann, Tim Würtele:
Layered Symbolic Security Analysis in $\textsf {DY}^\star $. 3-21 - Daniel Weber, Fabian Thomas, Lukas Gerlach, Ruiyi Zhang, Michael Schwarz:
Indirect Meltdown: Building Novel Side-Channel Attacks from Transient-Execution Attacks. 22-42 - Amit Cohen, Mahmood Sharif:
Accessorize in the Dark: A Security Analysis of Near-Infrared Face Recognition. 43-61 - Lukas Gerlach, Fabian Thomas, Robert Pietsch, Michael Schwarz:
A Rowhammer Reproduction Study Using the Blacksmith Fuzzer. 62-79 - Daniel Weber, Fabian Thomas, Lukas Gerlach, Ruiyi Zhang, Michael Schwarz:
Reviving Meltdown 3a. 80-99 - Tristan Claverie, Gildas Avoine, Stéphanie Delaune, José Lopes-Esteves:
Tamarin-Based Analysis of Bluetooth Uncovers Two Practical Pairing Confusion Attacks. 100-119 - Sowoong Kim, Myeonggyun Han, Woongki Baek:
MARF: A Memory-Aware CLFLUSH-Based Intra- and Inter-CPU Side-Channel Attack. 120-140 - Tingting Rao, Yixin Su, Peng Xu, Yubo Zheng, Wei Wang, Hai Jin:
You Reset I Attack! A Master Password Guessing Attack Against Honey Password Vaults. 141-161 - Jehyun Lee, Zhe Xin, Melanie Ng Pei See, Kanav Sabharwal, Giovanni Apruzzese, Dinil Mon Divakaran:
Attacking Logo-Based Phishing Website Detectors with Adversarial Perturbations. 162-182 - Lin Li, Chao Chen, Lei Pan, Yonghang Tai, Jun Zhang, Yang Xiang:
Hiding Your Signals: A Security Analysis of PPG-Based Biometric Authentication. 183-202 - Heitor Uchoa, Vipul Arora, Dennis Vermoen, Marco Ottavi, Nikolaos Alachiotis:
Exploring Genomic Sequence Alignment for Improving Side-Channel Analysis. 203-221 - Florian Helmschmidt, Pedram Hosseyni, Ralf Küsters, Klaas Pruiksma, Clara Waldmann, Tim Würtele:
The Grant Negotiation and Authorization Protocol: Attacking, Fixing, and Verifying an Emerging Standard. 222-242 - Hubert Kario:
Everlasting ROBOT: The Marvin Attack. 243-262 - Bowen Xu, Shijie Jia, Jingqiang Lin, Fangyu Zheng, Yuan Ma, Limin Liu, Xiaozhuo Gu, Li Song:
JWTKey: Automatic Cryptographic Vulnerability Detection in JWT Applications. 263-282
Blockchain
- Zhichun Lu, Ren Zhang:
When is Slower Block Propagation More Profitable for Large Miners? 285-305 - Shaoyu Li, Shanghao Shi, Yang Xiao, Chaoyu Zhang, Y. Thomas Hou, Wenjing Lou:
Bijack: Breaking Bitcoin Network with TCP Vulnerabilities. 306-326 - Charalambos Mitropoulos, Thodoris Sotiropoulos, Sotiris Ioannidis, Dimitris Mitropoulos:
Syntax-Aware Mutation for Testing the Solidity Compiler. 327-347 - Sungwook Kim, Sungju Kim, Yulim Shin, Sunmi Kim, Jihye Kim, Hyunok Oh:
Efficient Transparent Polynomial Commitments for zk-SNARKs. 348-366 - Jianhuan Wang, Jichen Li, Zecheng Li, Xiaotie Deng, Bin Xiao:
n-MVTL Attack: Optimal Transaction Reordering Attack on DeFi. 367-386
Miscellaneous
- Reyhaneh Rabaninejad, Behzad Abdolmaleki, Giulio Malavolta, Antonis Michalas, Amir Nabizadeh:
stoRNA: Stateless Transparent Proofs of Storage-time. 389-410 - Shang Song, Lin Liu, Rongmao Chen, Wei Peng, Yi Wang:
Secure Approximate Nearest Neighbor Search with Locality-Sensitive Hashing. 411-430 - Ofir Cohen, Ron Bitton, Asaf Shabtai, Rami Puzis:
ConGISATA: A Framework for Continuous Gamified Information Security Awareness Training and Assessment. 431-451 - Luca Arnaboldi, David Aspinall, Christina Kolb, Sasa Radomirovic:
Tactics for Account Access Graphs. 452-470 - Constantin Catalin Dragan, François Dupressoir, Kristian Gjøsteen, Thomas Haines, Peter B. Rønne, Morten Rotvold Solberg:
Machine-Checked Proofs of Accountability: How to sElect Who is to Blame. 471-491
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.