default search action
24th ESORICS 2019: Luxembourg
- Kazue Sako, Steve A. Schneider, Peter Y. A. Ryan:
Computer Security - ESORICS 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part I. Lecture Notes in Computer Science 11735, Springer 2019, ISBN 978-3-030-29958-3
Machine Learning
- Tilen Marc, Miha Stopar, Jan Hartman, Manca Bizjak, Jolanda Modic:
Privacy-Enhanced Machine Learning with Functional Encryption. 3-21 - Yifeng Zheng, Huayi Duan, Cong Wang:
Towards Secure and Efficient Outsourcing of Machine Learning Classification. 22-40 - Sagar Sharma, Keke Chen:
Confidential Boosting with Random Linear Classifiers for Outsourced User-Generated Data. 41-65 - Huadi Zheng, Qingqing Ye, Haibo Hu, Chengfang Fang, Jie Shi:
BDPL: A Boundary Differentially Private Layer Against Machine Learning Model Extraction Attacks. 66-83
Information Leakage
- Bryan C. Ward, Richard Skowyra, Chad Spensky, Jason Martin, Hamed Okhravi:
The Leakage-Resilience Dilemma. 87-106 - Loïc Miller, Cristel Pelsser:
A Taxonomy of Attacks Using BGP Blackholing. 107-127 - Yusuke Kawamoto, Takao Murakami:
Local Obfuscation Mechanisms for Hiding Probability Distributions. 128-148 - Jaybie A. de Guzman, Kanchana Thilakarathna, Aruna Seneviratne:
A First Look into Privacy Leakage in 3D Mixed Reality Data. 149-169
Signatures and Re-encryption
- Duc Viet Le, Mahimna Kelkar, Aniket Kate:
Flexible Signatures: Making Authentication Suitable for Real-Time Environments. 173-193 - Maxime Buser, Joseph K. Liu, Ron Steinfeld, Amin Sakzad, Shifeng Sun:
DGM: A Dynamic and Revocable Group Merkle Signature. 194-214 - Tran Viet Xuan Phuong, Willy Susilo, Jongkil Kim, Guomin Yang, Dongxi Liu:
Puncturable Proxy Re-Encryption Supporting to Group Messaging Service. 215-233 - Hui Guo, Zhenfeng Zhang, Jing Xu, Mingyuan Xia:
Generic Traceable Proxy Re-encryption and Accountable Extension in Consensus Network. 234-256
Side Channels
- Philip Sperl, Konstantin Böttinger:
Side-Channel Aware Fuzzing. 259-278 - Michael Schwarz, Martin Schwarzl, Moritz Lipp, Jon Masters, Daniel Gruss:
NetSpectre: Read Arbitrary Memory over Network. 279-299 - Gilles Barthe, Sonia Belaïd, Gaëtan Cassiers, Pierre-Alain Fouque, Benjamin Grégoire, François-Xavier Standaert:
maskVerif: Automated Verification of Higher-Order Masking in Presence of Physical Defaults. 300-318 - Chris Novakovic, David Parker:
Automated Formal Analysis of Side-Channel Attacks on Probabilistic Systems. 319-337
Formal Modelling and Verification
- Duncan Mitchell, Johannes Kinder:
A Formal Model for Checking Cryptographic API Usage in JavaScript. 341-360 - Sergiu Bursuc, Steve Kremer:
Contingent Payments on a Public Ledger: Models and Reductions for Automated Verification. 361-382 - Alexandre Debant, Stéphanie Delaune, Cyrille Wiedling:
Symbolic Analysis of Terrorist Fraud Resistance. 383-403 - Shan Chen, Samuel Jero, Matthew Jagielski, Alexandra Boldyreva, Cristina Nita-Rotaru:
Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) vs. QUIC. 404-426
Attacks
- Vincent Haupert, Stephan Gabert:
Where to Look for What You See Is What You Sign? User Confusion in Transaction Security. 429-449 - Erwin Quiring, Matthias Kirchner, Konrad Rieck:
On the Security and Applicability of Fragile Camera Fingerprints. 450-470 - Henry Turner, Giulio Lovisotto, Ivan Martinovic:
Attacking Speaker Recognition Systems with Phoneme Morphing. 471-492 - Weizhi Meng, Wenjuan Li, Lijun Jiang, Kim-Kwang Raymond Choo, Chunhua Su:
Practical Bayesian Poisoning Attacks on Challenge-Based Collaborative Intrusion Detection Networks. 493-511 - Ilias Giechaskiel, Youqian Zhang, Kasper Bonne Rasmussen:
A Framework for Evaluating Security in the Presence of Signal Injection Attacks. 512-532
Secure Protocols
- Sébastien Gondron, Sebastian Mödersheim:
Formalizing and Proving Privacy Properties of Voting Protocols Using Alpha-Beta Privacy. 535-555 - Max Curran, Xiao Liang, Himanshu Gupta, Omkant Pandey, Samir R. Das:
ProCSA: Protecting Privacy in Crowdsourced Spectrum Allocation. 556-576 - Ihor Filimonov, Ross Horne, Sjouke Mauw, Zach Smith:
Breaking Unlinkability of the ICAO 9303 Standard for e-Passports Using Bisimilarity. 577-594 - Kazuhiko Minematsu, Norifumi Kamiya:
Symmetric-Key Corruption Detection: When XOR-MACs Meet Combinatorial Group Testing. 595-615
Useful Tools
- Siqi Ma, Elisa Bertino, Surya Nepal, Juanru Li, Diethelm Ostry, Robert H. Deng, Sanjay Jha:
Finding Flaws from Password Authentication Code in Android Apps. 619-637 - Yao Yao, Wei Zhou, Yan Jia, Lipeng Zhu, Peng Liu, Yuqing Zhang:
Identifying Privilege Separation Vulnerabilities in IoT Firmware with Symbolic Execution. 638-657 - Momen Oqaily, Yosr Jarraya, Mengyuan Zhang, Lingyu Wang, Makan Pourzandi, Mourad Debbabi:
iCAT: An Interactive Customizable Anonymization Tool. 658-680 - Emma Arfelt, David A. Basin, Søren Debois:
Monitoring the GDPR. 681-699
Blockchain and Smart Contracts
- Yevhen Zolotavkin, Veronika Kuchta:
Incentives for Harvesting Attack in Proof of Work Mining Pools. 703-725 - Zhen Liu, Khoa Nguyen, Guomin Yang, Huaxiong Wang, Duncan S. Wong:
A Lattice-Based Linkable Ring Signature Supporting Stealth Addresses. 726-746 - Konrad Weiss, Julian Schütte:
Annotary: A Concolic Execution System for Developing Secure Smart Contracts. 747-766 - Juan Guarnizo, Pawel Szalachowski:
PDFS: Practical Data Feed Service for Smart Contracts. 767-789 - Hung Dang, Dat Le Tien, Ee-Chien Chang:
Towards a Marketplace for Secure Outsourced Computations. 790-808
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.