Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1007/978-3-031-70903-6guideproceedingsBook PagePublication PagesConference Proceedingsacm-pubtype
Computer Security – ESORICS 2024: 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16–20, 2024, Proceedings, Part IV
2024 Proceeding
  • Editors:
  • Joaquin Garcia-Alfaro,
  • Rafał Kozik,
  • Michał Choraś,
  • Sokratis Katsikas
Publisher:
  • Springer-Verlag
  • Berlin, Heidelberg
Conference:
European Symposium on Research in Computer SecurityBydgoszcz, Poland16 September 2024
ISBN:
978-3-031-70902-9
Published:
18 September 2024

Reflects downloads up to 02 Oct 2024Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
front-matter
Front Matter
Pages i–xvii
back-matter
Back Matter
Article
Front Matter
Page 1
Article
Cips: The Cache Intrusion Prevention System
Abstract

Caches are an essential component in the performance-driven memory hierarchy of modern CPUs. However, they are also known to be vulnerable against a variety of timing side-channel attacks like Prime+Probe, Flush+Reload, and others. These allow ...

Article
ReminISCence: Trusted Monitoring Against Privileged Preemption Side-Channel Attacks
Abstract

Trusted Execution Environments (TEEs) have long served as a prominent security measure for ensuring isolation and data privacy in cloud environments. However, their security foundations face challenges from numerous side-channel threats, ...

Article
A Plug-and-Play Long-Range Defense System for Proof-of-Stake Blockchains
Abstract

In recent years, many blockchain systems have progressively transitioned to proof-of-stake (PoS) consensus algorithms. These algorithms are not only more energy efficient than proof-of-work but are also well-studied and widely accepted within the ...

Article
Leveraging Hierarchies: HMCAT for Efficiently Mapping CTI to Attack Techniques
Abstract

With the advancement of cyber technology, proactive security methods such as adversary emulation and leveraging Cyber Threat Intelligence (CTI) have become increasingly essential. Currently, some methods have achieved automatic mapping of ...

Article
Duplication-Based Fault Tolerance for RISC-V Embedded Software
Abstract

Embedded devices play critical roles in security and safety, demanding robust protection against fault injection attacks. Among the myriad of fault effects, the instruction skip fault model stands out due to its recurrent manifestation in silicon ...

Article
Similar Data is Powerful: Enhancing Inference Attacks on SSE with Volume Leakages
Abstract

Searchable symmetric encryption (SSE) schemes provide users with the ability to perform keyword searches on encrypted databases without the need for decryption. While this functionality is advantageous, it introduces the potential for inadvertent ...

Article
SAEG: Stateful Automatic Exploit Generation
Abstract

The field of Automatic Exploit Generation (AEG) plays a pivotal role in the assessment of software vulnerabilities, automating the analysis for exploit creation. Although AEG systems are instrumental in probing for vulnerabilities, they often lack ...

Article
IntentObfuscator: A Jailbreaking Method via Confusing LLM with Prompts
Abstract

In the era of Large Language Models (LLMs), developers establish content review conditions to comply with legal, policy, and societal requirements, aiming to prevent the generation of sensitive or restricted content due to considerations like ...

Article
Breaking Through the Diversity: Encrypted Video Identification Attack Based on QUIC Features
Abstract

Video traffic is increasingly dominating the Internet, and most video platforms encrypt their transmissions to ensure content security and user privacy. However, attackers can still leverage traffic analysis methods to identify the being-watching ...

Article
Patronum: In-network Volumetric DDoS Detection and Mitigation with Programmable Switches
Abstract

Distributed Denial-of-Service (DDoS) attacks continue to pose a significant threat to the Internet. While middlebox-based defenses offer high performance, they are costly and lack flexibility. Software-based defenses, on the other hand, provide ...

Article
Wherever I May Roam: Stealthy Interception and Injection Attacks Through Roaming Agreements
Abstract

Cellular network users can be attacked through Rogue Base Stations (RBSes). 3G introduced network authentication as a mitigation. However, roaming partnerships between network operators allow requesting authentication vectors. This feature opens ...

Article
It is Time To Steer: A Scalable Framework for Analysis-Driven Attack Graph Generation
Abstract

Attack Graph (AG) represents the best-suited solution to support cyber risk assessment for multi-step attacks on computer networks, although their generation suffers from poor scalability due to their combinatorial complexity. Current solutions ...

Article
Resilience to Chain-Quality Attacks in Fair Separability
Abstract

In recent years, a new research area called order-fairness has emerged within State Machine Replication (SMR). Its goal is to prevent malicious processes from reordering transactions, ensuring that the SMR output reflects the local orderings ...

Article
Leveraging Transformer Architecture for Effective Trajectory-User Linking (TUL) Attack and Its Mitigation
Abstract

Trajectories, a specific type of mobility data, can be used for many useful data mining tasks. However, these trajectories also raises important privacy concerns due to their strong inference potential. In this work, we propose TUL-STEO, a novel ...

Article
VFLIP: A Backdoor Defense for Vertical Federated Learning via Identification and Purification
Abstract

Vertical Federated Learning (VFL) focuses on handling vertically partitioned data over FL participants. Recent studies have discovered a significant vulnerability in VFL to backdoor attacks which specifically target the distinct characteristics of ...

Article
How to Better Fit Reinforcement Learning for Pentesting: A New Hierarchical Approach
Abstract

In response to the rapidly evolving landscape of Information Technology (IT) and Operational Technology (OT) systems, automated vulnerability assessment is gaining prominence. While traditional scripted approaches are common, supervised and ...

Article
Revoke: Mitigating Ransomware Attacks Against Ethereum Validators
Abstract

Recent research has shown the viability of ransomware attacks on Ethereum Proof-of-Stake (PoS) validators, whereby an attacker that compromises a validator can threaten to perform slashable actions unless a ransom is paid. Given the size of ...

Article
Exploiting Layerwise Feature Representation Similarity For Backdoor Defence in Federated Learning
Abstract

Federated learning is an emerging paradigm for distributed machine learning that enables clients to collaboratively train models while maintaining data privacy. However, this approach introduces vulnerabilities, notably the risk of backdoor ...

Article
Front Matter
Page 375
Article
Automatic Verification of Cryptographic Block Function Implementations with Logical Equivalence Checking
Abstract

Given a fixed-size block, cryptographic block functions generate outputs by a sequence of bitwise operations. Block functions are widely used in the design of hash functions and stream ciphers. Their correct implementations hence are crucial to ...

Article
Device-Enhanced Secure Cloud Storage with Keyword Searchable Encryption and Deduplication
Abstract

We observe that server-aided message-locked encryption (MLE) and server-aided public key encryption with keyword search (PEKS) can be integrated into one cloud storage system to support both deduplication and keyword search over encrypted ...

Article
Incremental Time-Deniable Signatures
Abstract

Digital signatures guarantee long-term public verifiability and non-repudiation. However, in some applications, signatures can be stored by several actors and, later on (e.g., if leaked after an attack), those signatures could be adversarially ...

Article
Efficient Linkable Ring Signatures: New Framework and Post-quantum Instantiations
Abstract

In this paper, we introduce a new framework for constructing linkable ring signatures (LRS). Our framework is based purely on signatures of knowledge (SoK) which allows one to issue signatures on behalf of any NP-statement using the corresponding ...

Article
“Ask and Thou Shall Receive”: Reaction-Based Full Key Recovery Attacks on FHE
Abstract

Fully Homomorphic Encryption (FHE) promises to secure our data on the untrusted cloud by allowing arbitrary computations on encrypted data. However, the malleability and flexibility provided by FHE schemes also open up arenas for integrity issues ...

Contributors
  • Polytechnic Institute of Paris
  • Bydgoszcz University of Science and Technology
  • Bydgoszcz University of Science and Technology
  • Norwegian University of Science and Technology

Index Terms

  1. Computer Security – ESORICS 2024: 29th European Symposium on Research in Computer Security, Bydgoszcz, Poland, September 16–20, 2024, Proceedings, Part IV
          Index terms have been assigned to the content through auto-classification.
          Please enable JavaScript to view thecomments powered by Disqus.

          Recommendations