Login / Signup
ESORICS (3)
2022
2024
2022
2024
Keyphrases
Publications
volume 14346, 2024
Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part III
ESORICS (3)
14346 (2024)
2023
Luca Arnaboldi
,
David Aspinall
,
Christina Kolb
,
Sasa Radomirovic
Tactics for Account Access Graphs.
ESORICS (3)
(2023)
Lin Li
,
Chao Chen
,
Lei Pan
,
Yonghang Tai
,
Jun Zhang
,
Yang Xiang
Hiding Your Signals: A Security Analysis of PPG-Based Biometric Authentication.
ESORICS (3)
(2023)
Heitor Uchoa
,
Vipul Arora
,
Dennis Vermoen
,
Marco Ottavi
,
Nikolaos Alachiotis
Exploring Genomic Sequence Alignment for Improving Side-Channel Analysis.
ESORICS (3)
(2023)
Shang Song
,
Lin Liu
,
Rongmao Chen
,
Wei Peng
,
Yi Wang
Secure Approximate Nearest Neighbor Search with Locality-Sensitive Hashing.
ESORICS (3)
(2023)
Florian Helmschmidt
,
Pedram Hosseyni
,
Ralf Küsters
,
Klaas Pruiksma
,
Clara Waldmann
,
Tim Würtele
The Grant Negotiation and Authorization Protocol: Attacking, Fixing, and Verifying an Emerging Standard.
ESORICS (3)
(2023)
Constantin Catalin Dragan
,
François Dupressoir
,
Kristian Gjøsteen
,
Thomas Haines
,
Peter B. Rønne
,
Morten Rotvold Solberg
Machine-Checked Proofs of Accountability: How to sElect Who is to Blame.
ESORICS (3)
(2023)
Tingting Rao
,
Yixin Su
,
Peng Xu
,
Yubo Zheng
,
Wei Wang
,
Hai Jin
You Reset I Attack! A Master Password Guessing Attack Against Honey Password Vaults.
ESORICS (3)
(2023)
Reyhaneh Rabaninejad
,
Behzad Abdolmaleki
,
Giulio Malavolta
,
Antonis Michalas
,
Amir Nabizadeh
stoRNA: Stateless Transparent Proofs of Storage-time.
ESORICS (3)
(2023)
Jehyun Lee
,
Zhe Xin
,
Melanie Ng Pei See
,
Kanav Sabharwal
,
Giovanni Apruzzese
,
Dinil Mon Divakaran
Attacking Logo-Based Phishing Website Detectors with Adversarial Perturbations.
ESORICS (3)
(2023)
Bowen Xu
,
Shijie Jia
,
Jingqiang Lin
,
Fangyu Zheng
,
Yuan Ma
,
Limin Liu
,
Xiaozhuo Gu
,
Li Song
JWTKey: Automatic Cryptographic Vulnerability Detection in JWT Applications.
ESORICS (3)
(2023)
Amit Cohen
,
Mahmood Sharif
Accessorize in the Dark: A Security Analysis of Near-Infrared Face Recognition.
ESORICS (3)
(2023)
Daniel Weber
,
Fabian Thomas
,
Lukas Gerlach
,
Ruiyi Zhang
,
Michael Schwarz
Indirect Meltdown: Building Novel Side-Channel Attacks from Transient-Execution Attacks.
ESORICS (3)
(2023)
Hubert Kario
Everlasting ROBOT: The Marvin Attack.
ESORICS (3)
(2023)
Sowoong Kim
,
Myeonggyun Han
,
Woongki Baek
MARF: A Memory-Aware CLFLUSH-Based Intra- and Inter-CPU Side-Channel Attack.
ESORICS (3)
(2023)
Sungwook Kim
,
Sungju Kim
,
Yulim Shin
,
Sunmi Kim
,
Jihye Kim
,
Hyunok Oh
Efficient Transparent Polynomial Commitments for zk-SNARKs.
ESORICS (3)
(2023)
Lukas Gerlach
,
Fabian Thomas
,
Robert Pietsch
,
Michael Schwarz
A Rowhammer Reproduction Study Using the Blacksmith Fuzzer.
ESORICS (3)
(2023)
Daniel Weber
,
Fabian Thomas
,
Lukas Gerlach
,
Ruiyi Zhang
,
Michael Schwarz
Reviving Meltdown 3a.
ESORICS (3)
(2023)
Karthikeyan Bhargavan
,
Abhishek Bichhawat
,
Pedram Hosseyni
,
Ralf Küsters
,
Klaas Pruiksma
,
Guido Schmitz
,
Clara Waldmann
,
Tim Würtele
Layered Symbolic Security Analysis in $\textsf {DY}^\star $.
ESORICS (3)
(2023)
Jianhuan Wang
,
Jichen Li
,
Zecheng Li
,
Xiaotie Deng
,
Bin Xiao
n-MVTL Attack: Optimal Transaction Reordering Attack on DeFi.
ESORICS (3)
(2023)
Ofir Cohen
,
Ron Bitton
,
Asaf Shabtai
,
Rami Puzis
ConGISATA: A Framework for Continuous Gamified Information Security Awareness Training and Assessment.
ESORICS (3)
(2023)
Zhichun Lu
,
Ren Zhang
When is Slower Block Propagation More Profitable for Large Miners?
ESORICS (3)
(2023)
Shaoyu Li
,
Shanghao Shi
,
Yang Xiao
,
Chaoyu Zhang
,
Y. Thomas Hou
,
Wenjing Lou
Bijack: Breaking Bitcoin Network with TCP Vulnerabilities.
ESORICS (3)
(2023)
Tristan Claverie
,
Gildas Avoine
,
Stéphanie Delaune
,
José Lopes-Esteves
Tamarin-Based Analysis of Bluetooth Uncovers Two Practical Pairing Confusion Attacks.
ESORICS (3)
(2023)
Charalambos Mitropoulos
,
Thodoris Sotiropoulos
,
Sotiris Ioannidis
,
Dimitris Mitropoulos
Syntax-Aware Mutation for Testing the Solidity Compiler.
ESORICS (3)
(2023)
2022
Thomas Rokicki
,
Clémentine Maurice
,
Michael Schwarz
CPU Port Contention Without SMT.
ESORICS (3)
(2022)
Kay Hamacher
,
Tobias Kussel
,
Thomas Schneider
,
Oleksandr Tkachenko
PEA: Practical Private Epistasis Analysis Using MPC.
ESORICS (3)
(2022)
Yuancheng Jiang
,
Gregory J. Duck
,
Roland H. C. Yap
,
Zhenkai Liang
,
Pinghai Yuan
Extensible Virtual Call Integrity.
ESORICS (3)
(2022)
Ahmed Amro
,
Vasileios Gkioulos
From Click to Sink: Utilizing AIS for Command and Control in Maritime Cyber Attacks.
ESORICS (3)
(2022)
Fei Zhu
,
Xun Yi
,
Alsharif Abuadbba
,
Junwei Luo
,
Surya Nepal
,
Xinyi Huang
Efficient Hash-Based Redactable Signature for Smart Grid Applications.
ESORICS (3)
(2022)
Qi Guo
,
Di Wu
,
Yong Qi
,
Saiyu Qi
,
Qian Li
FLMJR: Improving Robustness of Federated Learning via Model Stability.
ESORICS (3)
(2022)
Clement Fung
,
Shreya Srinarasi
,
Keane Lucas
,
Hay Bryan Phee
,
Lujo Bauer
Perspectives from a Comprehensive Evaluation of Reconstruction-based Anomaly Detection in Industrial Control Systems.
ESORICS (3)
(2022)
August See
,
Leon Fritz
,
Mathias Fischer
Polymorphic Protocols at the Example of Mitigating Web Bots.
ESORICS (3)
(2022)
Gennaro Avitabile
,
Vincenzo Botta
,
Daniele Friolo
,
Ivan Visconti
Efficient Proofs of Knowledge for Threshold Relations.
ESORICS (3)
(2022)
Luca Borzacchiello
,
Emilio Coppa
,
Davide Maiorca
,
Andrea Columbu
,
Camil Demetrescu
,
Giorgio Giacinto
Reach Me if You Can: On Native Vulnerability Reachability in Android Apps.
ESORICS (3)
(2022)
Zeyan Liu
,
Fengjun Li
,
Jingqiang Lin
,
Zhu Li
,
Bo Luo
Hide and Seek: On the Stealthiness of Attacks Against Deep Learning Systems.
ESORICS (3)
(2022)
Wenxing Zhu
,
Mengqi Wei
,
Xiangxue Li
,
Qiang Li
SecureBiNN: 3-Party Secure Computation for Binarized Neural Network Inference.
ESORICS (3)
(2022)
Buse G. A. Tekgul
,
Shelly Wang
,
Samuel Marchal
,
N. Asokan
Real-Time Adversarial Perturbations Against Deep Reinforcement Learning Policies: Attacks and Defenses.
ESORICS (3)
(2022)
Sebastián García
,
Joaquín Bogado
,
Karel Hynek
,
Dmitrii Vekshin
,
Tomás Cejka
,
Armin Wasicek
Large Scale Analysis of DoH Deployment on the Internet.
ESORICS (3)
(2022)
Matteo Cardaioli
,
Mauro Conti
,
Arpita Ravindranath
For Your Voice Only: Exploiting Side Channels in Voice Messaging for Environment Detection.
ESORICS (3)
(2022)
José Moreira
,
Mark Ryan
,
Flavio D. Garcia
Protocols for a Two-Tiered Trusted Computing Base.
ESORICS (3)
(2022)
Christian Badertscher
,
Peter Gazi
,
Iñigo Querejeta-Azurmendi
,
Alexander Russell
A Composable Security Treatment of ECVRF and Batch Verifications.
ESORICS (3)
(2022)
Héber Hwang Arcolezi
,
Jean-François Couchot
,
Sébastien Gambs
,
Catuscia Palamidessi
,
Majid Zolfaghari
Multi-Freq-LDPy: Multiple Frequency Estimation Under Local Differential Privacy in Python.
ESORICS (3)
(2022)
Zhuohua Li
,
Jincheng Wang
,
Mingshen Sun
,
John C. S. Lui
Detecting Cross-language Memory Management Issues in Rust.
ESORICS (3)
(2022)
Dorjan Hitaj
,
Giulio Pagnotta
,
Briland Hitaj
,
Luigi V. Mancini
,
Fernando Pérez-Cruz
MaleficNet: Hiding Malware into Deep Neural Networks Using Spread-Spectrum Channel Coding.
ESORICS (3)
(2022)
Mingxuan Liu
,
Yiming Zhang
,
Baojun Liu
,
Haixin Duan
Exploring the Characteristics and Security Risks of Emerging Emoji Domain Names.
ESORICS (3)
(2022)
Lipeng Wan
,
Fangyu Zheng
,
Guang Fan
,
Rong Wei
,
Lili Gao
,
Yuewu Wang
,
Jingqiang Lin
,
Jiankuo Dong
A Novel High-Performance Implementation of CRYSTALS-Kyber with AI Accelerator.
ESORICS (3)
(2022)
Ambrish Rawat
,
Killian Levacher
,
Mathieu Sinn
The Devil Is in the GAN: Backdoor Attacks and Defenses in Deep Generative Models.
ESORICS (3)
(2022)
Leon Trampert
,
Christian Rossow
,
Michael Schwarz
Browser-Based CPU Fingerprinting.
ESORICS (3)
(2022)
volume 13556, 2022
Computer Security - ESORICS 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part III
ESORICS (3)
13556 (2022)