


default search action
27th ESORICS 2022: Copenhagen, Denmark - Part III
- Vijayalakshmi Atluri
, Roberto Di Pietro
, Christian Damsgaard Jensen
, Weizhi Meng
:
Computer Security - ESORICS 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part III. Lecture Notes in Computer Science 13556, Springer 2022, ISBN 978-3-031-17142-0
Formal Analysis
- Jingjing Guan, Hui Li, Haisong Ye, Ziming Zhao:
A Formal Analysis of the FIDO2 Protocols. 3-21 - Christian Badertscher
, Peter Gazi, Iñigo Querejeta-Azurmendi, Alexander Russell
:
A Composable Security Treatment of ECVRF and Batch Verifications. 22-41 - Gennaro Avitabile
, Vincenzo Botta
, Daniele Friolo
, Ivan Visconti:
Efficient Proofs of Knowledge for Threshold Relations. 42-62 - Sofía Celi
, Jonathan Hoyland
, Douglas Stebila
, Thom Wiggers
:
A Tale of Two Models: Formal Verification of KEMTLS via Tamarin. 63-83
Web Security
- Leon Trampert
, Christian Rossow, Michael Schwarz:
Browser-Based CPU Fingerprinting. 87-105 - August See, Leon Fritz, Mathias Fischer:
Polymorphic Protocols at the Example of Mitigating Web Bots. 106-124 - Nick Frymann, Daniel Gardham, Mark Manulis
:
Unlinkable Delegation of WebAuthn Credentials. 125-144 - Sebastián García, Joaquín Bogado, Karel Hynek, Dmitrii Vekshin, Tomás Cejka, Armin Wasicek:
Large Scale Analysis of DoH Deployment on the Internet. 145-165 - Joshua Reynolds, Adam Bates
, Michael D. Bailey:
Equivocal URLs: Understanding the Fragmented Space of URL Parser Implementations. 166-185 - Mingxuan Liu, Yiming Zhang, Baojun Liu, Haixin Duan:
Exploring the Characteristics and Security Risks of Emerging Emoji Domain Names. 186-206
Hardware Security
- Thomas Rokicki
, Clémentine Maurice
, Michael Schwarz
:
CPU Port Contention Without SMT. 209-228 - José Moreira
, Mark Ryan
, Flavio D. Garcia
:
Protocols for a Two-Tiered Trusted Computing Base. 229-249 - Florian Frank
, Tolga Arul
, Nikolaos Athanasios Anagnostopoulos
, Stefan Katzenbeisser:
Using Memristor Arrays as Physical Unclonable Functions. 250-271
Multiparty Computation
- Wenxing Zhu, Mengqi Wei, Xiangxue Li, Qiang Li:
SecureBiNN: 3-Party Secure Computation for Binarized Neural Network Inference. 275-294 - Erik-Oliver Blass, Florian Kerschbaum:
Mixed-Technique Multi-Party Computations Composed of Two-Party Computations. 295-319 - Kay Hamacher
, Tobias Kussel
, Thomas Schneider
, Oleksandr Tkachenko
:
PEA: Practical Private Epistasis Analysis Using MPC. 320-339
ML Techniques
- Zeyan Liu
, Fengjun Li, Jingqiang Lin, Zhu Li, Bo Luo
:
Hide and Seek: On the Stealthiness of Attacks Against Deep Learning Systems. 343-363 - Younghan Lee
, Sohee Jun, Yungi Cho
, Woorim Han, Hyungon Moon, Yunheung Paek:
Precise Extraction of Deep Learning Models via Side-Channel Attacks on Edge/Endpoint Devices. 364-383 - Buse G. A. Tekgul, Shelly Wang, Samuel Marchal
, N. Asokan
:
Real-Time Adversarial Perturbations Against Deep Reinforcement Learning Policies: Attacks and Defenses. 384-404 - Qi Guo
, Di Wu
, Yong Qi
, Saiyu Qi
, Qian Li
:
FLMJR: Improving Robustness of Federated Learning via Model Stability. 405-424 - Dorjan Hitaj
, Giulio Pagnotta
, Briland Hitaj
, Luigi V. Mancini
, Fernando Pérez-Cruz
:
MaleficNet: Hiding Malware into Deep Neural Networks Using Spread-Spectrum Channel Coding. 425-444 - Ashish Gupta, Tie Luo, Mao V. Ngo, Sajal K. Das:
Long-Short History of Gradients Is All You Need: Detecting Malicious and Unreliable Clients in Federated Learning. 445-465 - Alaa Oqaily, Yosr Jarraya, Lingyu Wang, Makan Pourzandi, Suryadipta Majumdar:
MLFM: Machine Learning Meets Formal Method for Faster Identification of Security Breaches in Network Functions Virtualization (NFV). 466-489
Cyber-Physical Systems Security
- Clement Fung
, Shreya Srinarasi, Keane Lucas, Hay Bryan Phee, Lujo Bauer
:
Perspectives from a Comprehensive Evaluation of Reconstruction-based Anomaly Detection in Industrial Control Systems. 493-513 - Lipeng Wan, Fangyu Zheng, Guang Fan, Rong Wei, Lili Gao, Yuewu Wang, Jingqiang Lin, Jiankuo Dong:
A Novel High-Performance Implementation of CRYSTALS-Kyber with AI Accelerator. 514-534 - Ahmed Amro
, Vasileios Gkioulos:
From Click to Sink: Utilizing AIS for Command and Control in Maritime Cyber Attacks. 535-553 - Fei Zhu
, Xun Yi, Alsharif Abuadbba, Junwei Luo, Surya Nepal, Xinyi Huang:
Efficient Hash-Based Redactable Signature for Smart Grid Applications. 554-573 - Konrad Wolsing
, Lea Thiemt, Christian van Sloun
, Eric Wagner
, Klaus Wehrle, Martin Henze
:
Can Industrial Intrusion Detection Be SIMPLE? 574-594 - Matteo Cardaioli, Mauro Conti
, Arpita Ravindranath:
For Your Voice Only: Exploiting Side Channels in Voice Messaging for Environment Detection. 595-613 - Ayoosh Bansal
, Anant Kandikuppa, Chien-Ying Chen, Monowar Hasan
, Adam Bates
, Sibin Mohan
:
Towards Efficient Auditing for Real-Time Systems. 614-634
Network and Software Security
- Aina Toky Rasoamanana
, Olivier Levillain
, Hervé Debar
:
Towards a Systematic and Automatic Use of State Machine Inference to Uncover Security Flaws and Fingerprint TLS Stacks. 637-657 - Bogdan Groza
, Lucian Popa, Tudor Andreica, Pal-Stefan Murvay, Asaf Shabtai, Yuval Elovici:
PanoptiCANs - Adversary-Resilient Architectures for Controller Area Networks. 658-679 - Zhuohua Li
, Jincheng Wang, Mingshen Sun, John C. S. Lui:
Detecting Cross-language Memory Management Issues in Rust. 680-700 - Luca Borzacchiello
, Emilio Coppa
, Davide Maiorca
, Andrea Columbu, Camil Demetrescu
, Giorgio Giacinto
:
Reach Me if You Can: On Native Vulnerability Reachability in Android Apps. 701-722 - Yuancheng Jiang
, Gregory J. Duck, Roland H. C. Yap, Zhenkai Liang, Pinghai Yuan:
Extensible Virtual Call Integrity. 723-739
Posters
- Daniel Mølmark-O'Connor, Emmanouil Vasilomanolakis
:
Is Your Password Sexist? a Gamification-Based Analysis of the Cultural Context of Leaked Passwords. 743-748 - Abdelrahaman Aly, Sara Cleemput:
A Fast, Practical and Simple Shortest Path Protocol for Multiparty Computation. 749-755 - Feng Yue, Jiale Chen, Zhaopin Su, Niansong Wang, Guofu Zhang:
Audio Spoofing Detection Using Constant-Q Spectral Sketches and Parallel-Attention SE-ResNet. 756-762 - Jiajun Du, Zhonghui Ge, Yu Long, Zhen Liu, Shifeng Sun, Xian Xu, Dawu Gu:
MixCT: Mixing Confidential Transactions from Homomorphic Commitment. 763-769 - Héber Hwang Arcolezi
, Jean-François Couchot
, Sébastien Gambs, Catuscia Palamidessi
, Majid Zolfaghari
:
Multi-Freq-LDPy: Multiple Frequency Estimation Under Local Differential Privacy in Python. 770-775 - Ambrish Rawat, Killian Levacher, Mathieu Sinn:
The Devil Is in the GAN: Backdoor Attacks and Defenses in Deep Generative Models. 776-783

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.