- Sponsor:
- sigops
EuroSec, the European Workshop on System Security, aims to foster discussion about all aspects of research in systems security. The outcome of such research ultimately determines whether we can trust our voting machines, medical equipment, bank transactions, phones, PCs, and indeed, all aspects of our daily lives that are controlled by computers.
We are happy to report that EuroSec received many interesting submissions, spanning four continents, and many aspects of systems security. In the end, the program committee accepted 35% of the papers for publication and all of the papers received at least three reviews from our program committee.
Proceeding Downloads
Differential privacy for collaborative security
Fighting global security threats with only a local view is inherently difficult. Internet network operators need to fight global phenomena such as botnets, but they are hampered by the fact that operators can observe only the traffic in their local ...
Practical protection for personal storage in the cloud
We present a storage management framework for Web 2.0 services that places users back in control of their data. Current Web services complicate data management due to data lock-in and lack usable protection mechanisms, which makes cross-service sharing ...
Improving the accuracy of network intrusion detection systems under load using selective packet discarding
Under conditions of heavy traffic load or sudden traffic bursts, the peak processing throughput of network intrusion detection systems (NIDS) may not be sufficient for inspecting all monitored traffic, and the packet capturing subsystem inevitably drops ...
Detecting Wikipedia vandalism via spatio-temporal analysis of revision metadata?
Blatantly unproductive edits undermine the quality of the collaboratively-edited encyclopedia, Wikipedia. They not only disseminate dishonest and offensive content, but force editors to waste time undoing such acts of vandalism. Language-processing has ...
Managing intrusion detection rule sets
The prevalent use of the signature-based approach in modern intrusion detection systems (IDS) emphasizes the importance of the efficient management of the employed signature sets. With the constant discovery of new threats and vulnerabilities, the ...
The robustness of a new CAPTCHA
CAPTCHA is a standard security technology that presents tests to tell computers and humans apart. In this paper, we examine the security of a new CAPTCHA that was deployed until very recently by Megaupload, a leading online storage and delivery website. ...
AESSE: a cold-boot resistant implementation of AES
Cold boot attacks exploit the fact that memory contents fade with time and that most of them can be retrieved after a short power-down (reboot). These attacks aim at retrieving encryption keys from memory to thwart disk drive encryption. We present a ...
- Proceedings of the Third European Workshop on System Security
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
EuroSec '20 | 15 | 7 | 47% |
EuroSec '19 | 25 | 9 | 36% |
EuroSec'18 | 19 | 8 | 42% |
EuroSec'17 | 24 | 10 | 42% |
EuroSec '16 | 16 | 7 | 44% |
EuroSec '14 | 14 | 6 | 43% |
Overall | 113 | 47 | 42% |