default search action
EuroS&P 2017: Paris, France
- 2017 IEEE European Symposium on Security and Privacy, EuroS&P 2017, Paris, France, April 26-28, 2017. IEEE 2017, ISBN 978-1-5090-5762-7
Side Channels
- Timothy Trippel, Ofir Weisse, Wenyuan Xu, Peter Honeyman, Kevin Fu:
WALNUT: Waging Doubt on the Integrity of MEMS Accelerometers with Acoustic Injection Attacks. 3-18 - Florian Tramèr
, Fan Zhang
, Huang Lin, Jean-Pierre Hubaux, Ari Juels, Elaine Shi:
Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge. 19-34 - Daniel Arp, Erwin Quiring, Christian Wressnegger, Konrad Rieck:
Privacy Threats through Ultrasonic Side Channels on Mobile Devices. 35-47
Protocol Security
- Nikita Veshchikov, Sylvain Guilley:
Use of Simulators for Side-Channel Analysis. 51-59 - Marc Fischlin, Felix Günther:
Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates. 60-75 - Michael Backes, Jannik Dreier, Steve Kremer
, Robert Künnemann:
A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and Its Application to Fair Exchange. 76-91 - Joseph Lallemand, David A. Basin, Christoph Sprenger
:
Refining Authenticated Key Agreement with Strong Adversaries. 92-107
Applied Cryptography
- Giuseppe Ateniese, Bernardo Magri, Daniele Venturi, Ewerton R. Andrade
:
Redactable Blockchain - or - Rewriting History in Bitcoin and Friends. 111-126 - Angelo Massimo Perillo
, Giuseppe Persiano, Alberto Trombetta
:
Secure Queries on Encrypted Multi-writer Tables. 127-141 - Joël Alwen, Jeremiah Blocki
:
Towards Practical Attacks on Argon2i and Balloon Hashing. 142-157 - Yupeng Zhang, Jonathan Katz, Charalampos Papamanthou:
An Expressive (Zero-Knowledge) Set Accumulator. 158-173
Malware
- Dennis Andriesse, Asia Slowinska, Herbert Bos
:
Compiler-Agnostic Function Detection in Binaries. 177-189 - Yunhan Jack Jia, Qi Alfred Chen, Yikai Lin
, Chao Kong, Zhuoqing Morley Mao:
Open Doors for Bob and Mallory: Open Port Usage in Android Apps and Security Implications. 190-203 - Michael Backes, Mohammad Nauman
:
LUNA: Quantifying and Leveraging Uncertainty in Android Malware Analysis through Bayesian Machine Learning. 204-217 - Mordechai Guri, Yisroel Mirsky, Yuval Elovici:
9-1-1 DDoS: Attacks, Analysis and Mitigation. 218-232
Systematization
- Merve Sahin, Aurélien Francillon
, Payas Gupta, Mustaque Ahamad:
SoK: Fraud in Telephony Networks. 235-250 - Christian Mainka
, Vladislav Mladenov, Jörg Schwenk, Tobias Wich
:
SoK: Single Sign-On Security - An Evaluation of OpenID Connect. 251-266
Privacy-preserving Systems
- Jan Camenisch, Anja Lehmann:
Privacy-Preserving User-Auditable Pseudonym Systems. 269-284 - Michael T. Goodrich, Evgenios M. Kornaropoulos
, Michael Mitzenmacher, Roberto Tamassia
:
Auditable Data Structures. 285-300 - Foteini Baldimtsi, Jan Camenisch, Maria Dubovitskaya, Anna Lysyanskaya, Leonid Reyzin, Kai Samelin, Sophia Yakoubov
:
Accumulators with Applications to Anonymity-Preserving Revocation. 301-315
Web Security and Privacy
- Georg Merzdovnik
, Markus Huber, Damjan Buhov, Nick Nikiforakis, Sebastian Neuner, Martin Schmiedecker, Edgar R. Weippl:
Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools. 319-333 - Michael Backes, Konrad Rieck, Malte Skoruppa, Ben Stock
, Fabian Yamaguchi:
Efficient and Flexible Discovery of PHP Application Vulnerabilities. 334-349 - Avinash Sudhodanan, Roberto Carbone
, Luca Compagna, Nicolas Dolgin, Alessandro Armando
, Umberto Morelli
:
Large-Scale Analysis & Detection of Authentication Cross-Site Request Forgeries. 350-365 - Roman Rogowski, Micah Morton, Forrest Li, Fabian Monrose, Kevin Z. Snow, Michalis Polychronakis:
Revisiting Browser Security in the Modern Era: New Data-Only Attacks and Defenses. 366-381
Human Aspects of Security and Privacy
- Ada Lerner
, Eric Zeng, Franziska Roesner:
Confidante: Usable Encrypted Email: A Case Study with Lawyers and Journalists. 385-400 - Florian Tramèr
, Vaggelis Atlidakis, Roxana Geambasu, Daniel J. Hsu, Jean-Pierre Hubaux, Mathias Humbert, Ari Juels, Huang Lin:
FairTest: Discovering Unwarranted Associations in Data-Driven Applications. 401-416 - Genevieve Gebhart, Tadayoshi Kohno:
Internet Censorship in Thailand: User Practices and Potential Threats. 417-432
Secure Messaging and Mobile Security
- Nadim Kobeissi
, Karthikeyan Bhargavan, Bruno Blanchet
:
Automated Verification for Secure Messaging Protocols and Their Implementations: A Symbolic and Computational Approach. 435-450 - Katriel Cohn-Gordon, Cas Cremers, Benjamin Dowling
, Luke Garratt, Douglas Stebila
:
A Formal Security Analysis of the Signal Messaging Protocol. 451-466 - Véronique Cortier, Alicia Filipiak, Jan Florent, Said Gharout, Jacques Traoré:
Designing and Proving an EMV-Compliant Payment Protocol for Mobile Devices. 467-480 - Michael Backes, Sven Bugiel, Oliver Schranz, Philipp von Styp-Rekowsky, Sebastian Weisgerber:
ARTist: The Android Runtime Instrumentation and Security Toolkit. 481-495
System Security
- Martín Ochoa
, Sebastian Banescu
, Cynthia Disenfeld, Gilles Barthe
, Vijay Ganesh
:
Reasoning about Probabilistic Defense Mechanisms against Remote Attacks. 499-513 - Xi Chen, Herbert Bos
, Cristiano Giuffrida
:
CodeArmor: Virtualizing the Code Space to Counter Disclosure Attacks. 514-529 - Charlie Jacomme, Steve Kremer
, Guillaume Scerri:
Symbolic Models for Isolated Execution Environments. 530-545 - Siqi Zhao, Xuhua Ding
:
On the Effectiveness of Virtualization Based Memory Isolation on Multicore Platforms. 546-560
Network Security
- Kashyap Thimmaraju, Liron Schiff, Stefan Schmid
:
Outsmarting Network Security with SDN Teleportation. 563-578 - Maciej Korczynski, Samaneh Tajalizadehkhoob, Arman Noroozian, Maarten Wullink, Cristian Hesselman, Michel van Eeten:
Reputation Metrics Design to Improve Intermediary Incentives for Security of TLDs. 579-594 - Hyunwook Hong, Hyunwoo Choi, Dongkwan Kim, Hongil Kim, Byeongdo Hong, Jiseong Noh, Yongdae Kim
:
When Cellular Networks Met IPv6: Security Problems of Middleboxes in IPv6 Cellular Networks. 595-609 - Karthikeyan Bhargavan, Ioana Boureanu, Pierre-Alain Fouque
, Cristina Onete
, Benjamin Richard:
Content delivery over TLS: a cryptographic analysis of keyless SSL. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.