ESORICS A

51 papers

YearTitle / Authors
2012A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols.
Simon Eberz, Martin Strohmeier, Matthias Wilhelm, Ivan Martinovic
2012A Probabilistic Framework for Localization of Attackers in MANETs.
Massimiliano Albanese, Alessandra De Benedictis, Sushil Jajodia, Paulo Shakarian
2012Abstraction-Based Malware Analysis Using Rewriting and Model Checking.
Philippe Beaucamps, Isabelle Gnaedig, Jean-Yves Marion
2012Applying Divertibility to Blind Ballot Copying in the Helios Internet Voting System.
Yvo Desmedt, Pyrros Chaidos
2012Attack of the Clones: Detecting Cloned Applications on Android Markets.
Jonathan Crussell, Clint Gibler, Hao Chen
2012Beyond eCK: Perfect Forward Secrecy under Actor Compromise and Ephemeral-Key Reveal.
Cas Cremers, Michèle Feltz
2012Bleichenbacher's Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption.
Tibor Jager, Sebastian Schinzel, Juraj Somorovsky
2012Boosting the Permissiveness of Dynamic Information-Flow Tracking by Testing.
Arnar Birgisson, Daniel Hedin, Andrei Sabelfeld
2012Codejail: Application-Transparent Isolation of Libraries with Tight Program Interactions.
Yongzheng Wu, Sai Sathyanarayan, Roland H. C. Yap, Zhenkai Liang
2012Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings
Sara Foresti, Moti Yung, Fabio Martinelli
2012Deciding Epistemic and Strategic Properties of Cryptographic Protocols.
Henning Schnoor
2012Deciding Security for a Fragment of ASLan.
Sebastian Mödersheim
2012Decision Procedures for Simulatability.
Charanjit S. Jutla, Arnab Roy
2012Defining Privacy for Weighted Votes, Single and Multi-voter Coercion.
Jannik Dreier, Pascal Lafourcade, Yassine Lakhnech
2012Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System.
Aanjhan Ranganathan, Nils Ole Tippenhauer, Boris Skoric, Dave Singelée, Srdjan Capkun
2012Detecting Phishing Emails the Natural Language Way.
Rakesh M. Verma, Narasimha K. Shashidhar, Nabil Hossain
2012Dismantling iClass and iClass Elite.
Flavio D. Garcia, Gerhard de Koning Gans, Roel Verdult, Milosch Meriac
2012Effective Symbolic Protocol Analysis via Equational Irreducibility Conditions.
Serdar Erbatur, Santiago Escobar, Deepak Kapur, Zhiqiang Liu, Christopher Lynch, Catherine Meadows, José Meseguer, Paliath Narendran, Sonia Santiago, Ralf Sasse
2012Enhancing Location Privacy for Electric Vehicles (at the Right time).
Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou
2012Evaluation of Standardized Password-Based Key Derivation against Parallel Processing Platforms.
Markus Dürmuth, Tim Güneysu, Markus Kasper, Christof Paar, Tolga Yalçin, Ralf Zimmermann
2012Exploring Linkability of User Reviews.
Mishari Al Mishari, Gene Tsudik
2012Formal Analysis of Privacy in an eHealth Protocol.
Naipeng Dong, Hugo Jonker, Jun Pang
2012Hardening Access Control and Data Protection in GFS-like File Systems.
James Kelley, Roberto Tamassia, Nikos Triandopoulos
2012Identity-Based Encryption with Master Key-Dependent Message Security and Leakage-Resilience.
David Galindo, Javier Herranz, Jorge L. Villar
2012Identity-Based Traitor Tracing with Short Private Key and Short Ciphertext.
Fuchun Guo, Yi Mu, Willy Susilo
2012Introducing the gMix Open Source Framework for Mix Implementations.
Karl-Peter Fuchs, Dominik Herrmann, Hannes Federrath
2012JVM-Portable Sandboxing of Java's Native Libraries.
Mengtao Sun, Gang Tan
2012Model-Checking Bisimulation-Based Information Flow Properties for Infinite State Systems.
Deepak D'Souza, K. R. Raghavendra
2012Modeling and Enhancing Android's Permission System.
Elli Fragkaki, Lujo Bauer, Limin Jia, David Swasey
2012New Algorithms for Secure Outsourcing of Modular Exponentiations.
Xiaofeng Chen, Jin Li, Jianfeng Ma, Qiang Tang, Wenjing Lou
2012On the Security of Password Manager Database Formats.
Paolo Gasti, Kasper Bonne Rasmussen
2012PE(AR)2: Privacy-Enhanced Anonymous Authentication with Reputation and Revocation.
Kin Ying Yu, Tsz Hon Yuen, Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui
2012PRIVATUS: Wallet-Friendly Privacy Protection for Smart Meters.
Jinkyu Koo, Xiaojun Lin, Saurabh Bagchi
2012Privacy-Aware Message Exchanges for Geographically Routed Human Movement Networks.
Adam J. Aviv, Micah Sherr, Matt Blaze, Jonathan M. Smith
2012Relations among Notions of Privacy for RFID Authentication Protocols.
Daisuke Moriyama, Shin'ichiro Matsuo, Miyako Ohkubo
2012Revealing Abuses of Channel Assignment Protocols in Multi-channel Wireless Networks: An Investigation Logic Approach.
Qijun Gu, Kyle Jones, Wanyu Zang, Meng Yu, Peng Liu
2012Robust Probabilistic Fake Packet Injection for Receiver-Location Privacy in WSN.
Ruben Rios, Jorge Cuéllar, Javier López
2012SHARP: Private Proximity Test and Secure Handshake with Cheat-Proof Location Tags.
Yao Zheng, Ming Li, Wenjing Lou, Y. Thomas Hou
2012Satisfiability and Feasibility in a Relationship-Based Workflow Authorization Model.
Arif Akram Khan, Philip W. L. Fong
2012Scalable Telemetry Classification for Automated Malware Detection.
Jack W. Stokes, John C. Platt, Helen J. Wang, Joe Faulhaber, Jonathan Keller, Mady Marinescu, Anil Thomas, Marius Gheorghescu
2012Secure Proximity Detection for NFC Devices Based on Ambient Sensor Data.
Tzipora Halevi, Di Ma, Nitesh Saxena, Tuo Xiang
2012Secure and Efficient Outsourcing of Sequence Comparisons.
Marina Blanton, Mikhail J. Atallah, Keith B. Frikken, Qutaibah M. Malluhi
2012Security of Patched DNS.
Amir Herzberg, Haya Schulmann
2012SocialImpact: Systematic Analysis of Underground Social Dynamics.
Ziming Zhao, Gail-Joon Ahn, Hongxin Hu, Deepinder Mahi
2012The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs.
Ahmad-Reza Sadeghi, Steffen Schulz, Vijay Varadharajan
2012Third-Party Private DFA Evaluation on Encrypted Files in the Cloud.
Lei Wei, Michael K. Reiter
2012TorScan: Tracing Long-Lived Connections and Differential Scanning Attacks.
Alex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann
2012Towards Symbolic Encryption Schemes.
Naveed Ahmed, Christian Damsgaard Jensen, Erik Zenner
2012Trust No One Else: Detecting MITM Attacks against SSL/TLS without Third-Parties.
Italo Dacosta, Mustaque Ahamad, Patrick Traynor
2012Unique Group Signatures.
Matthew K. Franklin, Haibin Zhang
2012X.509 Forensics: Detecting and Localising the SSL/TLS Men-in-the-Middle.
Ralph Holz, Thomas Riedmaier, Nils Kammenhuber, Georg Carle