Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3517208acmconferencesBook PagePublication PageseurosysConference Proceedingsconference-collections
EuroSec '22: Proceedings of the 15th European Workshop on Systems Security
ACM2022 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
EuroSys '22: Seventeenth European Conference on Computer Systems Rennes France April 5 - 8, 2022
ISBN:
978-1-4503-9255-6
Published:
05 April 2022
Sponsors:
Next Conference
March 30 - April 3, 2025
Rotterdam , Netherlands
Reflects downloads up to 30 Aug 2024Bibliometrics
Skip Abstract Section
Abstract

Each year, the workshop brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security of computer systems and networks. Over time, EuroSec has established itself as a forum for presenting and discussing novel ideas with the community, before they are further developed into full papers.

Skip Table Of Content Section
research-article
Open Access
Where the sidewalk ends: privacy of opportunistic backhaul

We explore the challenges of implementing a privacy-preserving opportunistic data collection network for resource-constrained edge IoT devices. Opportunistic networks require no fixed infrastructure and allow edge devices to piggy-back messages through ...

research-article
OUTOPIA: private user discovery on the internet

Before being able to communicate with one another over the Internet, users in messaging applications need to discover each other and learn their IP addresses. Today, this User Discovery process is closely coupled with the communication provider. As a ...

research-article
Open Access
Tiered trust for useful embedded systems security

Traditional embedded systems rely on custom C code deployed in a monolithic firmware image. In these systems, all code must be trusted completely, as any code can directly modify memory or hardware registers. More recently, some embedded OSes have ...

research-article
Public Access
A systematic analysis of the event-stream incident

On October 5, 2018, a GitHub user announced a critical security vulnerability in event-stream, a JavaScript package meant to simplify working with data-streams. The vulnerability, was introduced by a new maintainer, by including code designed to harvest ...

research-article
Open Access
On the effectiveness of same-domain memory deduplication

Memory deduplication, an OS memory optimization technique that merges identical pages into a single Copy-on-Write (CoW) page, has been shown to be susceptible to a variety of timing side channel attacks, all of which stem from the differences between ...

research-article
Look Ma, no constants: practical constant blinding in GraalVM

With the advent of JIT compilers, code-injection attacks have seen a revival in the form of JIT spraying. JIT spraying enables an attacker to inject gadgets into executable memory, effectively sidestepping W⊕X and ASLR.

In response to JIT spraying, ...

research-article
Towards securely migrating webassembly enclaves

To run services in Trusted Execution Environments and Secure Enclaves is an established approach to protect privacy-sensitive data or payment processing. The increased importance of service elasticity in e.g. cloud computing, but also between edge and ...

research-article
Open Access
RetTag: hardware-assisted return address integrity on RISC-V

Memory-corruption-based return address hijacking, such as Return-oriented Programming (ROP), is a prevalent attack technique that compromises the program's control flow integrity. So far, software-based defenses against these attacks either introduce ...

research-article
DeFIRED: decentralized authorization with receiver-revocable and refutable delegations

A lot of research has been done over the last few years regarding decentralized authorization and access control, with existing approaches like the WAVE framework removing the need to rely on centralized parties for the management of access policies. ...

Contributors
  • Vienna University of Technology
  • University of Illinois at Chicago
Index terms have been assigned to the content through auto-classification.

Recommendations

Acceptance Rates

Overall Acceptance Rate 241 of 1,308 submissions, 18%
YearSubmittedAcceptedRate
EuroSys '211813821%
EuroSys '202344318%
EuroSys '182624316%
EuroSys '161803821%
EuroSys '141472718%
EuroSys '131432820%
EuroSys '111612415%
Overall1,30824118%