default search action
24th ESORICS 2019: Luxembourg
- Kazue Sako, Steve A. Schneider, Peter Y. A. Ryan:
Computer Security - ESORICS 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part II. Lecture Notes in Computer Science 11736, Springer 2019, ISBN 978-3-030-29961-3
Software Security
- Kangjie Lu, Aditya Pakki, Qiushi Wu:
Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs. 3-25 - Darion Cassel, Yan Huang, Limin Jia:
Uncovering Information Flow Policy Violations in C Programs (Extended Abstract). 26-46 - Saed Alrabaee, ElMouatez Billah Karbab, Lingyu Wang, Mourad Debbabi:
BinEye: Towards Efficient Binary Authorship Characterization Using Deep Learning. 47-67 - Behrad Garmany, Martin Stoffel, Robert Gawlik, Thorsten Holz:
Static Detection of Uninitialized Stack Variables in Binary Code. 68-87 - Nicolai Davidsson, Andre Pawlowski, Thorsten Holz:
Towards Automated Application-Specific Software Stacks. 88-109
Cryptographic Protocols
- Keita Emura, Shuichi Katsumata, Yohei Watanabe:
Identity-Based Encryption with Security Against the KGC: A Formal Model and Its Instantiation from Lattices. 113-133 - Jianghong Wei, Xiaofeng Chen, Jianfeng Wang, Xuexian Hu, Jianfeng Ma:
Forward-Secure Puncturable Identity-Based Encryption for Securing Cloud Emails. 134-150 - Martin R. Albrecht, Lorenzo Grassi, Léo Perrin, Sebastian Ramacher, Christian Rechberger, Dragos Rotaru, Arnab Roy, Markus Schofnegger:
Feistel Structures for MPC, and More. 151-171 - Nils Fleischhacker, Giulio Malavolta, Dominique Schröder:
Arithmetic Garbling from Bilinear Maps. 172-192
Security Models
- Henrique G. G. Pereira, Philip W. L. Fong:
SEPD: An Access Control Model for Resource Sharing in an IoT Environment. 195-216 - Lei Zhou, Jidong Xiao, Kevin Leach, Westley Weimer, Fengwei Zhang, Guojun Wang:
Nighthawk: Transparent System Introspection from Ring -3. 217-238 - Suryadipta Majumdar, Azadeh Tabiban, Meisam Mohammady, Alaa Oqaily, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Proactivizer: Transforming Existing Verification Tools into Efficient Solutions for Runtime Security Enforcement. 239-262 - Juan E. Rubio, Mark Manulis, Cristina Alcaraz, Javier López:
Enhancing Security and Dependability of Industrial Networks with Opinion Dynamics. 263-280
Searchable Encryption
- Cong Zuo, Shifeng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk:
Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy. 283-303 - Zhongjun Zhang, Jianfeng Wang, Yunling Wang, Yaping Su, Xiaofeng Chen:
Towards Efficient Verifiable Forward Secure Searchable Symmetric Encryption. 304-321 - Shabnam Kasra Kermanshahi, Joseph K. Liu, Ron Steinfeld, Surya Nepal:
Generic Multi-keyword Ranked Search on Encrypted Cloud Data. 322-343 - Florian Kerschbaum, Anselme Tueno:
An Efficiently Searchable Encrypted Data Structure for Range Queries. 344-364
Privacy
- Matteo Cagnazzo, Thorsten Holz, Norbert Pohlmann:
GDPiRated - Stealing Personal Information On- and Offline. 367-386 - Xun Yi, Kwok-Yan Lam, Elisa Bertino, Fang-Yu Rao:
Location Privacy-Preserving Mobile Crowd Sensing with Anonymous Reputation. 387-411 - Dawei Chu, Yuewu Wang, Lingguang Lei, Yanchu Li, Jiwu Jing, Kun Sun:
OCRAM-Assisted Sensitive Data Protection on ARM-Based Platform. 412-438 - Xiaoning Liu, Xun Yi:
Privacy-Preserving Collaborative Medical Time Series Analysis Based on Dynamic Time Warping. 439-460
Key Exchange Protocols
- Gildas Avoine, Sébastien Canard, Loïc Ferreira:
IoT-Friendly AKE: Forward Secrecy and Session Resumption Meet Symmetric-Key Cryptography. 463-483 - Junichi Tomida, Atsushi Fujioka, Akira Nagai, Koutarou Suzuki:
Strongly Secure Identity-Based Key Exchange with Single Pairing Operation. 484-503 - Yue Qin, Chi Cheng, Jintai Ding:
A Complete and Optimized Key Mismatch Attack on NIST Candidate NewHope. 504-520 - Jacqueline Brendel, Marc Fischlin, Felix Günther:
Breakdown Resilience of Key Exchange Protocols: NewHope, TLS 1.3, and Hybrids. 521-541
Web Security
- Alex Belkin, Nethanel Gelernter, Israel Cidon:
The Risks of WebGL: Analysis, Evaluation and Detection. 545-564 - Stefanos Chaliasos, George Metaxopoulos, George Argyros, Dimitris Mitropoulos:
Mime Artist: Bypassing Whitelisting for the Web with JavaScript Mimicry Attacks. 565-585 - Hugo Jonker, Benjamin Krumnow, Gabry Vlot:
Fingerprint Surface-Based Detection of Web Bot Detectors. 586-605 - Stefano Calzavara, Alvise Rabitti, Alessio Ragazzo, Michele Bugliesi:
Testing for Integrity Flaws in Web Sessions. 606-624
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.