ESORICS A

44 papers

YearTitle / Authors
2013A Cryptographic Analysis of OPACITY - (Extended Abstract).
Özgür Dagdelen, Marc Fischlin, Tommaso Gagliardoni, Giorgia Azzurra Marson, Arno Mittelbach, Cristina Onete
2013A Quantitative Evaluation of Privilege Separation in Web Browser Designs.
Xinshu Dong, Hong Hu, Prateek Saxena, Zhenkai Liang
2013ASICS: Authenticated Key Exchange Security Incorporating Certification Systems.
Colin Boyd, Cas Cremers, Michèle Feltz, Kenneth G. Paterson, Bertram Poettering, Douglas Stebila
2013AnDarwin: Scalable Detection of Semantically Similar Android Applications.
Jonathan Crussell, Clint Gibler, Hao Chen
2013Automated Certification of Authorisation Policy Resistance.
Andreas Griesmayer, Charles Morisset
2013Automated Security Proofs for Almost-Universal Hash for MAC Verification.
Martin Gagné, Pascal Lafourcade, Yassine Lakhnech
2013BISTRO: Binary Component Extraction and Embedding for Software Security Applications.
Zhui Deng, Xiangyu Zhang, Dongyan Xu
2013Ballot Secrecy and Ballot Independence Coincide.
Ben Smyth, David Bernhard
2013Bounded Memory Protocols and Progressing Collaborative Systems.
Max I. Kanovich, Tajana Ban Kirigin, Vivek Nigam, Andre Scedrov
2013CellFlood: Attacking Tor Onion Routers on the Cheap.
Marco Valerio Barbera, Vasileios P. Kemerlis, Vasilis Pappas, Angelos D. Keromytis
2013Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings
Jason Crampton, Sushil Jajodia, Keith Mayes
2013Current Events: Identifying Webpages by Tapping the Electrical Outlet.
Shane S. Clark, Hossen Asiful Mustafa, Benjamin Ransford, Jacob Sorber, Kevin Fu, Wenyuan Xu
2013Data-Confined HTML5 Applications.
Devdatta Akhawe, Frank Li, Warren He, Prateek Saxena, Dawn Song
2013Distributed Shuffling for Preserving Access Confidentiality.
Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati
2013Efficient Privacy-Enhanced Familiarity-Based Recommender System.
Arjan Jeckmans, Andreas Peter, Pieter H. Hartel
2013Election Verifiability or Ballot Privacy: Do We Need to Choose?
Edouard Cuvelier, Olivier Pereira, Thomas Peters
2013Eliminating Cache-Based Timing Attacks with Instruction-Based Scheduling.
Deian Stefan, Pablo Buiras, Edward Z. Yang, Amit Levy, David Terei, Alejandro Russo, David Mazières
2013Enforcing Privacy in the Presence of Others: Notions, Formalisations and Relations.
Naipeng Dong, Hugo Jonker, Jun Pang
2013Ensuring File Authenticity in Private DFA Evaluation on Encrypted Files in the Cloud.
Lei Wei, Michael K. Reiter
2013Estimating Asset Sensitivity by Profiling Users.
Youngja Park, Christopher S. Gates, Stephen C. Gates
2013Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption.
Jin Li, Xiaofeng Chen, Jingwei Li, Chunfu Jia, Jianfeng Ma, Wenjing Lou
2013Formal Approach for Route Agility against Persistent Attackers.
Jafar Haadi Jafarian, Ehab Al-Shaer, Qi Duan
2013HI-CFG: Construction by Binary Analysis and Application to Attack Polymorphism.
Dan Caselden, Alex Bazhanyuk, Mathias Payer, Stephen McCamant, Dawn Song
2013KQguard: Binary-Centric Defense against Kernel Queue Injection Attacks.
Jinpeng Wei, Feng Zhu, Calton Pu
2013Managing the Weakest Link - A Game-Theoretic Approach for the Mitigation of Insider Threats.
Aron Laszka, Benjamin Johnson, Pascal Schöttle, Jens Grossklags, Rainer Böhme
2013Measuring and Detecting Malware Downloads in Live Network Traffic.
Phani Vadrevu, Babak Rahbarinia, Roberto Perdisci, Kang Li, Manos Antonakakis
2013Mining Malware Specifications through Static Reachability Analysis.
Hugo Daniel Macedo, Tayssir Touili
2013Nowhere to Hide: Navigating around Privacy in Online Social Networks.
Mathias Humbert, Théophile Studer, Matthias Grossglauser, Jean-Pierre Hubaux
2013Patrol: Revealing Zero-Day Attack Paths through Network-Wide System Object Dependencies.
Jun Dai, Xiaoyan Sun, Peng Liu
2013Plug-and-Play IP Security - Anonymity Infrastructure instead of PKI.
Yossi Gilad, Amir Herzberg
2013Practical Covertly Secure MPC for Dishonest Majority - Or: Breaking the SPDZ Limits.
Ivan Damgård, Marcel Keller, Enrique Larraia, Valerio Pastro, Peter Scholl, Nigel P. Smart
2013Practical Secure Logging: Seekable Sequential Key Generators.
Giorgia Azzurra Marson, Bertram Poettering
2013Practical and Employable Protocols for UC-Secure Circuit Evaluation over ℤn.
Jan Camenisch, Robert R. Enderlein, Victor Shoup
2013Privacy-Preserving Accountable Computation.
Michael Backes, Dario Fiore, Esfandiar Mohammadi
2013Privacy-Preserving Matching of Community-Contributed Content.
Mishari Al Mishari, Paolo Gasti, Gene Tsudik, Ekin Oguz
2013Privacy-Preserving User Data Oriented Services for Groups with Dynamic Participation.
Dmitry Kononchuk, Zekeriya Erkin, Jan C. A. van der Lubbe, Reginald L. Lagendijk
2013Purpose Restrictions on Information Use.
Michael Carl Tschantz, Anupam Datta, Jeannette M. Wing
2013Range Extension Attacks on Contactless Smart Cards.
Yossef Oren, Dvir Schirman, Avishai Wool
2013Request-Based Comparable Encryption.
Jun Furukawa
2013Run-Time Enforcement of Information-Flow Properties on Android - (Extended Abstract).
Limin Jia, Jassim Aljuraidan, Elli Fragkaki, Lujo Bauer, Michael Stroucken, Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake
2013Symbolic Probabilistic Analysis of Off-Line Guessing.
Bruno Conchinha, David A. Basin, Carlos Caleiro
2013Universally Composable Key-Management.
Steve Kremer, Robert Künnemann, Graham Steel
2013Verifying Web Browser Extensions' Compliance with Private-Browsing Mode.
Benjamin S. Lerner, Liam Elberty, Neal Poole, Shriram Krishnamurthi
2013Vulnerable Delegation of DNS Resolution.
Amir Herzberg, Haya Schulmann