default search action
27th ESORICS 2022: Copenhagen, Denmark - Part III
- Vijayalakshmi Atluri, Roberto Di Pietro, Christian Damsgaard Jensen, Weizhi Meng:
Computer Security - ESORICS 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part III. Lecture Notes in Computer Science 13556, Springer 2022, ISBN 978-3-031-17142-0
Formal Analysis
- Jingjing Guan, Hui Li, Haisong Ye, Ziming Zhao:
A Formal Analysis of the FIDO2 Protocols. 3-21 - Christian Badertscher, Peter Gazi, Iñigo Querejeta-Azurmendi, Alexander Russell:
A Composable Security Treatment of ECVRF and Batch Verifications. 22-41 - Gennaro Avitabile, Vincenzo Botta, Daniele Friolo, Ivan Visconti:
Efficient Proofs of Knowledge for Threshold Relations. 42-62 - Sofía Celi, Jonathan Hoyland, Douglas Stebila, Thom Wiggers:
A Tale of Two Models: Formal Verification of KEMTLS via Tamarin. 63-83
Web Security
- Leon Trampert, Christian Rossow, Michael Schwarz:
Browser-Based CPU Fingerprinting. 87-105 - August See, Leon Fritz, Mathias Fischer:
Polymorphic Protocols at the Example of Mitigating Web Bots. 106-124 - Nick Frymann, Daniel Gardham, Mark Manulis:
Unlinkable Delegation of WebAuthn Credentials. 125-144 - Sebastián García, Joaquín Bogado, Karel Hynek, Dmitrii Vekshin, Tomás Cejka, Armin Wasicek:
Large Scale Analysis of DoH Deployment on the Internet. 145-165 - Joshua Reynolds, Adam Bates, Michael D. Bailey:
Equivocal URLs: Understanding the Fragmented Space of URL Parser Implementations. 166-185 - Mingxuan Liu, Yiming Zhang, Baojun Liu, Haixin Duan:
Exploring the Characteristics and Security Risks of Emerging Emoji Domain Names. 186-206
Hardware Security
- Thomas Rokicki, Clémentine Maurice, Michael Schwarz:
CPU Port Contention Without SMT. 209-228 - José Moreira, Mark Ryan, Flavio D. Garcia:
Protocols for a Two-Tiered Trusted Computing Base. 229-249 - Florian Frank, Tolga Arul, Nikolaos Athanasios Anagnostopoulos, Stefan Katzenbeisser:
Using Memristor Arrays as Physical Unclonable Functions. 250-271
Multiparty Computation
- Wenxing Zhu, Mengqi Wei, Xiangxue Li, Qiang Li:
SecureBiNN: 3-Party Secure Computation for Binarized Neural Network Inference. 275-294 - Erik-Oliver Blass, Florian Kerschbaum:
Mixed-Technique Multi-Party Computations Composed of Two-Party Computations. 295-319 - Kay Hamacher, Tobias Kussel, Thomas Schneider, Oleksandr Tkachenko:
PEA: Practical Private Epistasis Analysis Using MPC. 320-339
ML Techniques
- Zeyan Liu, Fengjun Li, Jingqiang Lin, Zhu Li, Bo Luo:
Hide and Seek: On the Stealthiness of Attacks Against Deep Learning Systems. 343-363 - Younghan Lee, Sohee Jun, Yungi Cho, Woorim Han, Hyungon Moon, Yunheung Paek:
Precise Extraction of Deep Learning Models via Side-Channel Attacks on Edge/Endpoint Devices. 364-383 - Buse G. A. Tekgul, Shelly Wang, Samuel Marchal, N. Asokan:
Real-Time Adversarial Perturbations Against Deep Reinforcement Learning Policies: Attacks and Defenses. 384-404 - Qi Guo, Di Wu, Yong Qi, Saiyu Qi, Qian Li:
FLMJR: Improving Robustness of Federated Learning via Model Stability. 405-424 - Dorjan Hitaj, Giulio Pagnotta, Briland Hitaj, Luigi V. Mancini, Fernando Pérez-Cruz:
MaleficNet: Hiding Malware into Deep Neural Networks Using Spread-Spectrum Channel Coding. 425-444 - Ashish Gupta, Tie Luo, Mao V. Ngo, Sajal K. Das:
Long-Short History of Gradients Is All You Need: Detecting Malicious and Unreliable Clients in Federated Learning. 445-465 - Alaa Oqaily, Yosr Jarraya, Lingyu Wang, Makan Pourzandi, Suryadipta Majumdar:
MLFM: Machine Learning Meets Formal Method for Faster Identification of Security Breaches in Network Functions Virtualization (NFV). 466-489
Cyber-Physical Systems Security
- Clement Fung, Shreya Srinarasi, Keane Lucas, Hay Bryan Phee, Lujo Bauer:
Perspectives from a Comprehensive Evaluation of Reconstruction-based Anomaly Detection in Industrial Control Systems. 493-513 - Lipeng Wan, Fangyu Zheng, Guang Fan, Rong Wei, Lili Gao, Yuewu Wang, Jingqiang Lin, Jiankuo Dong:
A Novel High-Performance Implementation of CRYSTALS-Kyber with AI Accelerator. 514-534 - Ahmed Amro, Vasileios Gkioulos:
From Click to Sink: Utilizing AIS for Command and Control in Maritime Cyber Attacks. 535-553 - Fei Zhu, Xun Yi, Alsharif Abuadbba, Junwei Luo, Surya Nepal, Xinyi Huang:
Efficient Hash-Based Redactable Signature for Smart Grid Applications. 554-573 - Konrad Wolsing, Lea Thiemt, Christian van Sloun, Eric Wagner, Klaus Wehrle, Martin Henze:
Can Industrial Intrusion Detection Be SIMPLE? 574-594 - Matteo Cardaioli, Mauro Conti, Arpita Ravindranath:
For Your Voice Only: Exploiting Side Channels in Voice Messaging for Environment Detection. 595-613 - Ayoosh Bansal, Anant Kandikuppa, Chien-Ying Chen, Monowar Hasan, Adam Bates, Sibin Mohan:
Towards Efficient Auditing for Real-Time Systems. 614-634
Network and Software Security
- Aina Toky Rasoamanana, Olivier Levillain, Hervé Debar:
Towards a Systematic and Automatic Use of State Machine Inference to Uncover Security Flaws and Fingerprint TLS Stacks. 637-657 - Bogdan Groza, Lucian Popa, Tudor Andreica, Pal-Stefan Murvay, Asaf Shabtai, Yuval Elovici:
PanoptiCANs - Adversary-Resilient Architectures for Controller Area Networks. 658-679 - Zhuohua Li, Jincheng Wang, Mingshen Sun, John C. S. Lui:
Detecting Cross-language Memory Management Issues in Rust. 680-700 - Luca Borzacchiello, Emilio Coppa, Davide Maiorca, Andrea Columbu, Camil Demetrescu, Giorgio Giacinto:
Reach Me if You Can: On Native Vulnerability Reachability in Android Apps. 701-722 - Yuancheng Jiang, Gregory J. Duck, Roland H. C. Yap, Zhenkai Liang, Pinghai Yuan:
Extensible Virtual Call Integrity. 723-739
Posters
- Daniel Mølmark-O'Connor, Emmanouil Vasilomanolakis:
Is Your Password Sexist? a Gamification-Based Analysis of the Cultural Context of Leaked Passwords. 743-748 - Abdelrahaman Aly, Sara Cleemput:
A Fast, Practical and Simple Shortest Path Protocol for Multiparty Computation. 749-755 - Feng Yue, Jiale Chen, Zhaopin Su, Niansong Wang, Guofu Zhang:
Audio Spoofing Detection Using Constant-Q Spectral Sketches and Parallel-Attention SE-ResNet. 756-762 - Jiajun Du, Zhonghui Ge, Yu Long, Zhen Liu, Shifeng Sun, Xian Xu, Dawu Gu:
MixCT: Mixing Confidential Transactions from Homomorphic Commitment. 763-769 - Héber Hwang Arcolezi, Jean-François Couchot, Sébastien Gambs, Catuscia Palamidessi, Majid Zolfaghari:
Multi-Freq-LDPy: Multiple Frequency Estimation Under Local Differential Privacy in Python. 770-775 - Ambrish Rawat, Killian Levacher, Mathieu Sinn:
The Devil Is in the GAN: Backdoor Attacks and Defenses in Deep Generative Models. 776-783
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.