


default search action
24th ESORICS 2019: Luxembourg
- Kazue Sako, Steve A. Schneider, Peter Y. A. Ryan:

Computer Security - ESORICS 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part I. Lecture Notes in Computer Science 11735, Springer 2019, ISBN 978-3-030-29958-3
Machine Learning
- Tilen Marc

, Miha Stopar, Jan Hartman, Manca Bizjak, Jolanda Modic
:
Privacy-Enhanced Machine Learning with Functional Encryption. 3-21 - Yifeng Zheng, Huayi Duan

, Cong Wang:
Towards Secure and Efficient Outsourcing of Machine Learning Classification. 22-40 - Sagar Sharma, Keke Chen:

Confidential Boosting with Random Linear Classifiers for Outsourced User-Generated Data. 41-65 - Huadi Zheng

, Qingqing Ye, Haibo Hu, Chengfang Fang, Jie Shi:
BDPL: A Boundary Differentially Private Layer Against Machine Learning Model Extraction Attacks. 66-83
Information Leakage
- Bryan C. Ward, Richard Skowyra, Chad Spensky, Jason Martin, Hamed Okhravi

:
The Leakage-Resilience Dilemma. 87-106 - Loïc Miller, Cristel Pelsser

:
A Taxonomy of Attacks Using BGP Blackholing. 107-127 - Yusuke Kawamoto

, Takao Murakami
:
Local Obfuscation Mechanisms for Hiding Probability Distributions. 128-148 - Jaybie A. de Guzman

, Kanchana Thilakarathna
, Aruna Seneviratne
:
A First Look into Privacy Leakage in 3D Mixed Reality Data. 149-169
Signatures and Re-encryption
- Duc Viet Le, Mahimna Kelkar, Aniket Kate:

Flexible Signatures: Making Authentication Suitable for Real-Time Environments. 173-193 - Maxime Buser, Joseph K. Liu, Ron Steinfeld, Amin Sakzad

, Shifeng Sun:
DGM: A Dynamic and Revocable Group Merkle Signature. 194-214 - Tran Viet Xuan Phuong, Willy Susilo

, Jongkil Kim
, Guomin Yang
, Dongxi Liu:
Puncturable Proxy Re-Encryption Supporting to Group Messaging Service. 215-233 - Hui Guo, Zhenfeng Zhang, Jing Xu, Mingyuan Xia:

Generic Traceable Proxy Re-encryption and Accountable Extension in Consensus Network. 234-256
Side Channels
- Philip Sperl

, Konstantin Böttinger
:
Side-Channel Aware Fuzzing. 259-278 - Michael Schwarz, Martin Schwarzl, Moritz Lipp, Jon Masters, Daniel Gruss

:
NetSpectre: Read Arbitrary Memory over Network. 279-299 - Gilles Barthe, Sonia Belaïd, Gaëtan Cassiers

, Pierre-Alain Fouque
, Benjamin Grégoire, François-Xavier Standaert
:
maskVerif: Automated Verification of Higher-Order Masking in Presence of Physical Defaults. 300-318 - Chris Novakovic

, David Parker
:
Automated Formal Analysis of Side-Channel Attacks on Probabilistic Systems. 319-337
Formal Modelling and Verification
- Duncan Mitchell, Johannes Kinder:

A Formal Model for Checking Cryptographic API Usage in JavaScript. 341-360 - Sergiu Bursuc, Steve Kremer

:
Contingent Payments on a Public Ledger: Models and Reductions for Automated Verification. 361-382 - Alexandre Debant, Stéphanie Delaune, Cyrille Wiedling:

Symbolic Analysis of Terrorist Fraud Resistance. 383-403 - Shan Chen

, Samuel Jero, Matthew Jagielski, Alexandra Boldyreva, Cristina Nita-Rotaru:
Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) vs. QUIC. 404-426
Attacks
- Vincent Haupert, Stephan Gabert:

Where to Look for What You See Is What You Sign? User Confusion in Transaction Security. 429-449 - Erwin Quiring

, Matthias Kirchner, Konrad Rieck:
On the Security and Applicability of Fragile Camera Fingerprints. 450-470 - Henry Turner, Giulio Lovisotto, Ivan Martinovic:

Attacking Speaker Recognition Systems with Phoneme Morphing. 471-492 - Weizhi Meng

, Wenjuan Li
, Lijun Jiang, Kim-Kwang Raymond Choo
, Chunhua Su:
Practical Bayesian Poisoning Attacks on Challenge-Based Collaborative Intrusion Detection Networks. 493-511 - Ilias Giechaskiel

, Youqian Zhang
, Kasper Bonne Rasmussen:
A Framework for Evaluating Security in the Presence of Signal Injection Attacks. 512-532
Secure Protocols
- Sébastien Gondron, Sebastian Mödersheim

:
Formalizing and Proving Privacy Properties of Voting Protocols Using Alpha-Beta Privacy. 535-555 - Max Curran, Xiao Liang

, Himanshu Gupta, Omkant Pandey, Samir R. Das:
ProCSA: Protecting Privacy in Crowdsourced Spectrum Allocation. 556-576 - Ihor Filimonov, Ross Horne

, Sjouke Mauw, Zach Smith:
Breaking Unlinkability of the ICAO 9303 Standard for e-Passports Using Bisimilarity. 577-594 - Kazuhiko Minematsu, Norifumi Kamiya

:
Symmetric-Key Corruption Detection: When XOR-MACs Meet Combinatorial Group Testing. 595-615
Useful Tools
- Siqi Ma

, Elisa Bertino, Surya Nepal
, Juanru Li, Diethelm Ostry, Robert H. Deng
, Sanjay Jha
:
Finding Flaws from Password Authentication Code in Android Apps. 619-637 - Yao Yao, Wei Zhou, Yan Jia, Lipeng Zhu, Peng Liu, Yuqing Zhang:

Identifying Privilege Separation Vulnerabilities in IoT Firmware with Symbolic Execution. 638-657 - Momen Oqaily, Yosr Jarraya, Mengyuan Zhang

, Lingyu Wang, Makan Pourzandi, Mourad Debbabi
:
iCAT: An Interactive Customizable Anonymization Tool. 658-680 - Emma Arfelt, David A. Basin, Søren Debois:

Monitoring the GDPR. 681-699
Blockchain and Smart Contracts
- Yevhen Zolotavkin, Veronika Kuchta:

Incentives for Harvesting Attack in Proof of Work Mining Pools. 703-725 - Zhen Liu, Khoa Nguyen

, Guomin Yang
, Huaxiong Wang, Duncan S. Wong:
A Lattice-Based Linkable Ring Signature Supporting Stealth Addresses. 726-746 - Konrad Weiss

, Julian Schütte
:
Annotary: A Concolic Execution System for Developing Secure Smart Contracts. 747-766 - Juan Guarnizo, Pawel Szalachowski:

PDFS: Practical Data Feed Service for Smart Contracts. 767-789 - Hung Dang, Dat Le Tien, Ee-Chien Chang

:
Towards a Marketplace for Secure Outsourced Computations. 790-808

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














