default search action
29th ESORICS 2024: Bydgoszcz, Poland - Part IV
- Joaquín García-Alfaro, Rafal Kozik, Michal Choras, Sokratis K. Katsikas:
Computer Security - ESORICS 2024 - 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16-20, 2024, Proceedings, Part IV. Lecture Notes in Computer Science 14985, Springer 2024, ISBN 978-3-031-70902-9
Attacks and Defenses
- Jan Philipp Thoma, Florian Stolz, Tim Güneysu:
Cips: The Cache Intrusion Prevention System. 3-23 - Weijie Chen, Yu Zhao, Yinqian Zhang, Weizhong Qiang, Deqing Zou, Hai Jin:
ReminISCence: Trusted Monitoring Against Privileged Preemption Side-Channel Attacks. 24-44 - Lucien K. L. Ng, Panagiotis Chatzigiannis, Duc Viet Le, Mohsen Minaei, Ranjit Kumaresan, Mahdi Zamani:
A Plug-and-Play Long-Range Defense System for Proof-of-Stake Blockchains. 45-64 - Zhiqiang Hao, Chuanyi Li, Xiao Fu, Bin Luo, Xiaojiang Du:
Leveraging Hierarchies: HMCAT for Efficiently Mapping CTI to Attack Techniques. 65-85 - Volodymyr Bezsmertnyi, Jean-Michel Cioranesco, Thomas Eisenbarth:
Duplication-Based Fault Tolerance for RISC-V Embedded Software. 86-104 - Björn Ho, Huanhuan Chen, Zeshun Shi, Kaitai Liang:
Similar Data is Powerful: Enhancing Inference Attacks on SSE with Volume Leakages. 105-126 - Yifan Wu, Yinshuai Li, Hong Zhu, Yinqian Zhang:
SAEG: Stateful Automatic Exploit Generation. 127-145 - Shang Shang, Zhongjiang Yao, Yepeng Yao, Liya Su, Zijing Fan, Xiaodan Zhang, Zhengwei Jiang:
IntentObfuscator: A Jailbreaking Method via Confusing LLM with Prompts. 146-165 - Nan Hu, Hua Wu, Hangyu Zhao, Shanshan Ni, Guang Cheng:
Breaking Through the Diversity: Encrypted Video Identification Attack Based on QUIC Features. 166-186 - Jiahao Wu, Heng Pan, Penglai Cui, Yiwen Huang, Jianer Zhou, Peng He, Yanbiao Li, Zhenyu Li, Gaogang Xie:
Patronum: In-network Volumetric DDoS Detection and Mitigation with Programmable Switches. 187-207 - Swantje Lange, Francesco Gringoli, Matthias Hollick, Jiska Classen:
Wherever I May Roam: Stealthy Interception and Injection Attacks Through Roaming Agreements. 208-228 - Alessandro Palma, Marco Angelini:
It is Time To Steer: A Scalable Framework for Analysis-Driven Attack Graph Generation. 229-250 - Vincent Gramoli, Zhenliang Lu, Qiang Tang, Pouriya Zarbafian:
Resilience to Chain-Quality Attacks in Fair Separability. 251-270 - Youcef Korichi, Josée Desharnais, Sébastien Gambs, Nadia Tawbi:
Leveraging Transformer Architecture for Effective Trajectory-User Linking (TUL) Attack and Its Mitigation. 271-290 - Yungi Cho, Woorim Han, Miseon Yu, Younghan Lee, Ho Bae, Yunheung Paek:
VFLIP: A Backdoor Defense for Vertical Federated Learning via Identification and Purification. 291-312 - Marc-Antoine Faillon, Baptiste Bout, Julien Francq, Christopher Neal, Nora Boulahia-Cuppens, Frédéric Cuppens, Reda Yaich:
How to Better Fit Reinforcement Learning for Pentesting: A New Hierarchical Approach. 313-332 - Alpesh Bhudia, Daniel O'Keeffe, Darren Hurley-Smith:
Revoke: Mitigating Ransomware Attacks Against Ethereum Validators. 333-353 - Kane Walter, Surya Nepal, Salil S. Kanhere:
Exploiting Layerwise Feature Representation Similarity For Backdoor Defence in Federated Learning. 354-374
Miscellaneous
- Li-Chang Lai, Jiaxiang Liu, Xiaomu Shi, Ming-Hsien Tsai, Bow-Yaw Wang, Bo-Yin Yang:
Automatic Verification of Cryptographic Block Function Implementations with Logical Equivalence Checking. 377-395 - Changsong Jiang, Chunxiang Xu, Guomin Yang:
Device-Enhanced Secure Cloud Storage with Keyword Searchable Encryption and Deduplication. 396-413 - Luisa Siniscalchi, Ivan Visconti:
Incremental Time-Deniable Signatures. 414-434 - Yuxi Xue, Xingye Lu, Man Ho Au, Chengru Zhang:
Efficient Linkable Ring Signatures: New Framework and Post-quantum Instantiations. 435-456 - Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay:
"Ask and Thou Shall Receive": Reaction-Based Full Key Recovery Attacks on FHE. 457-477
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.