Login / Signup
ESORICS (2)
2014
2018
2020
2024
2014
2024
Keyphrases
Publications
volume 14345, 2024
Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part II
ESORICS (2)
14345 (2024)
2023
Yifan Xia
,
Ping He
,
Xuhong Zhang
,
Peiyu Liu
,
Shouling Ji
,
Wenhai Wang
Static Semantics Reconstruction for Enhancing JavaScript-WebAssembly Multilingual Malware Detection.
ESORICS (2)
(2023)
Edoardo Di Paolo
,
Enrico Bassetti
,
Angelo Spognardi
A New Model for Testing IPv6 Fragment Handling.
ESORICS (2)
(2023)
D. Galán
,
Víctor García
,
Santiago Escobar
,
Catherine A. Meadows
,
José Meseguer
Protocol Dialects as Formal Patterns.
ESORICS (2)
(2023)
Weicheng Wang
,
Hyunwoo Lee
,
Yan Huang
,
Elisa Bertino
,
Ninghui Li
Towards Efficient Privacy-Preserving Deep Packet Inspection.
ESORICS (2)
(2023)
Md. Nazmul Hoq
,
Jia Wei Yao
,
Suryadipta Majumdar
,
Luis Suárez
,
Lingyu Wang
,
Amine Boukhtouta
,
Makan Pourzandi
,
Mourad Debbabi
Evaluating the Security Posture of 5G Networks by Combining State Auditing and Event Monitoring.
ESORICS (2)
(2023)
Xin Li
,
Hong Zhu
,
Zhiqiang Zhang
,
Meiyi Xie
Item-Oriented Personalized LDP for Discrete Distribution Estimation.
ESORICS (2)
(2023)
Xavier Boyen
,
Qinyi Li
Identity-Based Matchmaking Encryption with Enhanced Privacy - A Generic Construction with Practical Instantiations.
ESORICS (2)
(2023)
Christoph Coijanovic
,
Christiane Weis
,
Thorsten Strufe
Panini - Anonymous Anycast and an Instantiation.
ESORICS (2)
(2023)
Matthieu Meeus
,
Florent Guépin
,
Ana-Maria Cretu
,
Yves-Alexandre de Montjoye
Achilles' Heels: Vulnerable Record Identification in Synthetic Data Publishing.
ESORICS (2)
(2023)
Wenqing Liu
,
An-I Andy Wang
LFuzz: Exploiting Locality-Enabled Techniques for File-System Fuzzing.
ESORICS (2)
(2023)
Wei Lin
,
Qingli Guo
,
Jiawei Yin
,
Xiangyu Zuo
,
Rongqing Wang
,
Xiaorui Gong
FSmell: Recognizing Inline Function in Binary Code.
ESORICS (2)
(2023)
Vik Vanderlinden
,
Tom van Goethem
,
Mathy Vanhoef
Time Will Tell: Exploiting Timing Leaks Using HTTP Response Headers.
ESORICS (2)
(2023)
Gowri R. Chandran
,
Raine Nieminen
,
Thomas Schneider
,
Ajith Suresh
PrivMail: A Privacy-Preserving Framework for Secure Emails.
ESORICS (2)
(2023)
Konrad Wolsing
,
Dominik Kus
,
Eric Wagner
,
Jan Pennekamp
,
Klaus Wehrle
,
Martin Henze
One IDS Is Not Enough! Exploring Ensemble Learning for Industrial Intrusion Detection.
ESORICS (2)
(2023)
Anup Kiran Bhattacharjee
,
Stefano Cecconello
,
Fernando Kuipers
,
Georgios Smaragdakis
Fingerprinting of Cellular Infrastructure Based on Broadcast Information.
ESORICS (2)
(2023)
Yajun Teng
,
Wei Wang
,
Jun Shao
,
Huiqing Wan
,
Heqing Huang
,
Yong Liu
,
Jingqiang Lin
Curveball+: Exploring Curveball-Like Vulnerabilities of Implicit Certificate Validation.
ESORICS (2)
(2023)
Mengfei Ren
,
Haotian Zhang
,
Xiaolei Ren
,
Jiang Ming
,
Yu Lei
Intelligent Zigbee Protocol Fuzzing via Constraint-Field Dependency Inference.
ESORICS (2)
(2023)
Shirin Kalantari
,
Pieter Philippaerts
,
Yana Dimova
,
Danny Hughes
,
Wouter Joosen
,
Bart De Decker
A User-Centric Approach to API Delegations - Enforcing Privacy Policies on OAuth Delegations.
ESORICS (2)
(2023)
Jonas Bushart
,
Christian Rossow
ResolFuzz: Differential Fuzzing of DNS Resolvers.
ESORICS (2)
(2023)
Radu Anghel
,
Swaathi Vetrivel
,
Elsa Turcios Rodriguez
,
Kaichi Sameshima
,
Daisuke Makita
,
Katsunari Yoshioka
,
Carlos Gañán
,
Yury Zhauniarovich
Peering into the Darkness: The Use of UTRS in Combating DDoS Attacks.
ESORICS (2)
(2023)
Iness Ben Guirat
,
Claudia Díaz
,
Karim Eldefrawy
,
Hadas Zeilberger
Traffic Analysis by Adversaries with Partial Visibility.
ESORICS (2)
(2023)
Efehan Guner
,
Mehmet Emre Gursoy
Learning Markov Chain Models from Sequential Data Under Local Differential Privacy.
ESORICS (2)
(2023)
Piotr Bialczak
,
Wojciech Mazurczyk
Malware Classification Using Open Set Recognition and HTTP Protocol Requests.
ESORICS (2)
(2023)
François Hublet
,
David A. Basin
,
Srdan Krstic
Enforcing the GDPR.
ESORICS (2)
(2023)
Tianyu Li
,
Li Xu
,
Zekeriya Erkin
,
Reginald L. Lagendijk
Trajectory Hiding and Sharing for Supply Chains with Differential Privacy.
ESORICS (2)
(2023)
2022
Yuantian Miao
,
Chao Chen
,
Lei Pan
,
Shigang Liu
,
Seyit Camtepe
,
Jun Zhang
,
Yang Xiang
No-Label User-Level Membership Inference for ASR Model Auditing.
ESORICS (2)
(2022)
Benjamin Dowling
,
Felix Günther
,
Alexandre Poirrier
Continuous Authentication in Secure Messaging.
ESORICS (2)
(2022)
Sunwoo Jang
,
Somin Song
,
Byungchul Tak
,
Sahil Suneja
,
Michael V. Le
,
Chuan Yue
,
Dan Williams
SecQuant: Quantifying Container System Call Exposure.
ESORICS (2)
(2022)
François Hublet
,
David A. Basin
,
Srdan Krstic
Real-Time Policy Enforcement with Metric First-Order Temporal Logic.
ESORICS (2)
(2022)
Michael Backes
,
Pascal Berrang
,
Lucjan Hanzlik
,
Ivan Pryvalov
A Framework for Constructing Single Secret Leader Election from MPC.
ESORICS (2)
(2022)
Alessia Michela Di Campi
,
Riccardo Focardi
,
Flaminia L. Luccio
The Revenge of Password Crackers: Automated Training of Password Cracking Tools.
ESORICS (2)
(2022)
Abdulla Aldoseri
,
David F. Oswald
,
Robert Chiper
A Tale of Four Gates - Privilege Escalation and Permission Bypasses on Android Through App Components.
ESORICS (2)
(2022)
Martin Schwarzl
,
Pietro Borrello
,
Andreas Kogler
,
Kenton Varda
,
Thomas Schuster
,
Michael Schwarz
,
Daniel Gruss
Robust and Scalable Process Isolation Against Spectre in the Cloud.
ESORICS (2)
(2022)
Jingwei Jiang
,
Ding Wang
,
Guoyin Zhang
,
Zhiyuan Chen
Quantum-Resistant Password-Based Threshold Single-Sign-On Authentication with Updatable Server Private Key.
ESORICS (2)
(2022)
Mingming Jiang
,
Shengli Liu
,
Shuai Han
,
Dawu Gu
Fuzzy Authenticated Key Exchange with Tight Security.
ESORICS (2)
(2022)
Erin Kenney
,
Qiang Tang
,
Chase Wu
Anonymous Traceback for End-to-End Encryption.
ESORICS (2)
(2022)
Andreas Erwig
,
Siavash Riahi
Deterministic Wallets for Adaptor Signatures.
ESORICS (2)
(2022)
Xinhui Shao
,
Lan Luo
,
Zhen Ling
,
Huaiyu Yan
,
Yumeng Wei
,
Xinwen Fu
fASLR: Function-Based ASLR for Resource-Constrained IoT Systems.
ESORICS (2)
(2022)
Henri Devillez
,
Olivier Pereira
,
Thomas Peters
How to Verifiably Encrypt Many Bits for an Election?
ESORICS (2)
(2022)
Yubo Zheng
,
Peng Xu
,
Wei Wang
,
Tianyang Chen
,
Willy Susilo
,
Kaitai Liang
,
Hai Jin
DEKS: A Secure Cloud-Based Searchable Service Can Make Attackers Pay.
ESORICS (2)
(2022)
Bertram Poettering
,
Simon Rastikian
Sequential Digital Signatures for Cryptographic Software-Update Authentication.
ESORICS (2)
(2022)
Mei Jiang
,
Dung Hoang Duong
,
Willy Susilo
Puncturable Signature: A Generic Construction and Instantiations.
ESORICS (2)
(2022)
Peiyang Li
,
Ye Wang
,
Zhuotao Liu
,
Ke Xu
,
Qian Wang
,
Chao Shen
,
Qi Li
Verifying the Quality of Outsourced Training on Clouds.
ESORICS (2)
(2022)
Bill Moriarty
,
Chun-Fu (Richard) Chen
,
Shaohan Hu
,
Sean Moran
,
Marco Pistoia
,
Vincenzo Piuri
,
Pierangela Samarati
Utility-Preserving Biometric Information Anonymization.
ESORICS (2)
(2022)
Sri Aravinda Krishnan Thyagarajan
,
Giulio Malavolta
,
Fritz Schmid
,
Dominique Schröder
Verifiable Timed Linkable Ring Signatures for Scalable Payments for Monero.
ESORICS (2)
(2022)
Véronique Cortier
,
Pierrick Gaudry
,
Quentin Yang
A Toolbox for Verifiable Tally-Hiding E-Voting Systems.
ESORICS (2)
(2022)
Isabel Wagner
A Machine Learning Approach to Detect Differential Treatment of Anonymous Users.
ESORICS (2)
(2022)
Javaria Ahmad
,
Fengjun Li
,
Bo Luo
IoTPrivComp: A Measurement Study of Privacy Compliance in IoT Apps.
ESORICS (2)
(2022)
volume 13555, 2022
Computer Security - ESORICS 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part II
ESORICS (2)
13555 (2022)