EuroS&P A

40 papers

YearTitle / Authors
20172017 IEEE European Symposium on Security and Privacy, EuroS&P 2017, Paris, France, April 26-28, 2017
20179-1-1 DDoS: Attacks, Analysis and Mitigation.
Mordechai Guri, Yisroel Mirsky, Yuval Elovici
2017A Formal Security Analysis of the Signal Messaging Protocol.
Katriel Cohn-Gordon, Cas Cremers, Benjamin Dowling, Luke Garratt, Douglas Stebila
2017A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and Its Application to Fair Exchange.
Michael Backes, Jannik Dreier, Steve Kremer, Robert Künnemann
2017ARTist: The Android Runtime Instrumentation and Security Toolkit.
Michael Backes, Sven Bugiel, Oliver Schranz, Philipp von Styp-Rekowsky, Sebastian Weisgerber
2017Accumulators with Applications to Anonymity-Preserving Revocation.
Foteini Baldimtsi, Jan Camenisch, Maria Dubovitskaya, Anna Lysyanskaya, Leonid Reyzin, Kai Samelin, Sophia Yakoubov
2017An Expressive (Zero-Knowledge) Set Accumulator.
Yupeng Zhang, Jonathan Katz, Charalampos Papamanthou
2017Auditable Data Structures.
Michael T. Goodrich, Evgenios M. Kornaropoulos, Michael Mitzenmacher, Roberto Tamassia
2017Automated Verification for Secure Messaging Protocols and Their Implementations: A Symbolic and Computational Approach.
Nadim Kobeissi, Karthikeyan Bhargavan, Bruno Blanchet
2017Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools.
Georg Merzdovnik, Markus Huber, Damjan Buhov, Nick Nikiforakis, Sebastian Neuner, Martin Schmiedecker, Edgar R. Weippl
2017CodeArmor: Virtualizing the Code Space to Counter Disclosure Attacks.
Xi Chen, Herbert Bos, Cristiano Giuffrida
2017Compiler-Agnostic Function Detection in Binaries.
Dennis Andriesse, Asia Slowinska, Herbert Bos
2017Confidante: Usable Encrypted Email: A Case Study with Lawyers and Journalists.
Ada Lerner, Eric Zeng, Franziska Roesner
2017Content delivery over TLS: a cryptographic analysis of keyless SSL.
Karthikeyan Bhargavan, Ioana Boureanu, Pierre-Alain Fouque, Cristina Onete, Benjamin Richard
2017Designing and Proving an EMV-Compliant Payment Protocol for Mobile Devices.
Véronique Cortier, Alicia Filipiak, Jan Florent, Said Gharout, Jacques Traoré
2017Efficient and Flexible Discovery of PHP Application Vulnerabilities.
Michael Backes, Konrad Rieck, Malte Skoruppa, Ben Stock, Fabian Yamaguchi
2017FairTest: Discovering Unwarranted Associations in Data-Driven Applications.
Florian Tramèr, Vaggelis Atlidakis, Roxana Geambasu, Daniel J. Hsu, Jean-Pierre Hubaux, Mathias Humbert, Ari Juels, Huang Lin
2017Internet Censorship in Thailand: User Practices and Potential Threats.
Genevieve Gebhart, Tadayoshi Kohno
2017LUNA: Quantifying and Leveraging Uncertainty in Android Malware Analysis through Bayesian Machine Learning.
Michael Backes, Mohammad Nauman
2017Large-Scale Analysis & Detection of Authentication Cross-Site Request Forgeries.
Avinash Sudhodanan, Roberto Carbone, Luca Compagna, Nicolas Dolgin, Alessandro Armando, Umberto Morelli
2017On the Effectiveness of Virtualization Based Memory Isolation on Multicore Platforms.
Siqi Zhao, Xuhua Ding
2017Open Doors for Bob and Mallory: Open Port Usage in Android Apps and Security Implications.
Yunhan Jack Jia, Qi Alfred Chen, Yikai Lin, Chao Kong, Zhuoqing Morley Mao
2017Outsmarting Network Security with SDN Teleportation.
Kashyap Thimmaraju, Liron Schiff, Stefan Schmid
2017Privacy Threats through Ultrasonic Side Channels on Mobile Devices.
Daniel Arp, Erwin Quiring, Christian Wressnegger, Konrad Rieck
2017Privacy-Preserving User-Auditable Pseudonym Systems.
Jan Camenisch, Anja Lehmann
2017Reasoning about Probabilistic Defense Mechanisms against Remote Attacks.
Martín Ochoa, Sebastian Banescu, Cynthia Disenfeld, Gilles Barthe, Vijay Ganesh
2017Redactable Blockchain - or - Rewriting History in Bitcoin and Friends.
Giuseppe Ateniese, Bernardo Magri, Daniele Venturi, Ewerton R. Andrade
2017Refining Authenticated Key Agreement with Strong Adversaries.
Joseph Lallemand, David A. Basin, Christoph Sprenger
2017Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates.
Marc Fischlin, Felix Günther
2017Reputation Metrics Design to Improve Intermediary Incentives for Security of TLDs.
Maciej Korczynski, Samaneh Tajalizadehkhoob, Arman Noroozian, Maarten Wullink, Cristian Hesselman, Michel van Eeten
2017Revisiting Browser Security in the Modern Era: New Data-Only Attacks and Defenses.
Roman Rogowski, Micah Morton, Forrest Li, Fabian Monrose, Kevin Z. Snow, Michalis Polychronakis
2017Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge.
Florian Tramèr, Fan Zhang, Huang Lin, Jean-Pierre Hubaux, Ari Juels, Elaine Shi
2017Secure Queries on Encrypted Multi-writer Tables.
Angelo Massimo Perillo, Giuseppe Persiano, Alberto Trombetta
2017SoK: Fraud in Telephony Networks.
Merve Sahin, Aurélien Francillon, Payas Gupta, Mustaque Ahamad
2017SoK: Single Sign-On Security - An Evaluation of OpenID Connect.
Christian Mainka, Vladislav Mladenov, Jörg Schwenk, Tobias Wich
2017Symbolic Models for Isolated Execution Environments.
Charlie Jacomme, Steve Kremer, Guillaume Scerri
2017Towards Practical Attacks on Argon2i and Balloon Hashing.
Joël Alwen, Jeremiah Blocki
2017Use of Simulators for Side-Channel Analysis.
Nikita Veshchikov, Sylvain Guilley
2017WALNUT: Waging Doubt on the Integrity of MEMS Accelerometers with Acoustic Injection Attacks.
Timothy Trippel, Ofir Weisse, Wenyuan Xu, Peter Honeyman, Kevin Fu
2017When Cellular Networks Met IPv6: Security Problems of Middleboxes in IPv6 Cellular Networks.
Hyunwook Hong, Hyunwoo Choi, Dongkwan Kim, Hongil Kim, Byeongdo Hong, Jiseong Noh, Yongdae Kim