default search action
28th ESORICS 2023: The Hague, The Netherlands - Part II
- Gene Tsudik, Mauro Conti, Kaitai Liang, Georgios Smaragdakis:
Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part II. Lecture Notes in Computer Science 14345, Springer 2024, ISBN 978-3-031-51475-3
Network, Web and Internet
- Vik Vanderlinden, Tom van Goethem, Mathy Vanhoef:
Time Will Tell: Exploiting Timing Leaks Using HTTP Response Headers. 3-22 - Radu Anghel, Swaathi Vetrivel, Elsa Turcios Rodriguez, Kaichi Sameshima, Daisuke Makita, Katsunari Yoshioka, Carlos Gañán, Yury Zhauniarovich:
Peering into the Darkness: The Use of UTRS in Combating DDoS Attacks. 23-41 - D. Galán, Víctor García, Santiago Escobar, Catherine A. Meadows, José Meseguer:
Protocol Dialects as Formal Patterns. 42-61 - Jonas Bushart, Christian Rossow:
ResolFuzz: Differential Fuzzing of DNS Resolvers. 62-80 - Anup Kiran Bhattacharjee, Stefano Cecconello, Fernando Kuipers, Georgios Smaragdakis:
Fingerprinting of Cellular Infrastructure Based on Broadcast Information. 81-101 - Konrad Wolsing, Dominik Kus, Eric Wagner, Jan Pennekamp, Klaus Wehrle, Martin Henze:
One IDS Is Not Enough! Exploring Ensemble Learning for Industrial Intrusion Detection. 102-122 - Md. Nazmul Hoq, Jia Wei Yao, Suryadipta Majumdar, Luis Suárez, Lingyu Wang, Amine Boukhtouta, Makan Pourzandi, Mourad Debbabi:
Evaluating the Security Posture of 5G Networks by Combining State Auditing and Event Monitoring. 123-144 - Gowri R. Chandran, Raine Nieminen, Thomas Schneider, Ajith Suresh:
PrivMail: A Privacy-Preserving Framework for Secure Emails. 145-165 - Weicheng Wang, Hyunwoo Lee, Yan Huang, Elisa Bertino, Ninghui Li:
Towards Efficient Privacy-Preserving Deep Packet Inspection. 166-192 - Christoph Coijanovic, Christiane Weis, Thorsten Strufe:
Panini - Anonymous Anycast and an Instantiation. 193-211 - Yajun Teng, Wei Wang, Jun Shao, Huiqing Wan, Heqing Huang, Yong Liu, Jingqiang Lin:
Curveball+: Exploring Curveball-Like Vulnerabilities of Implicit Certificate Validation. 212-234 - Piotr Bialczak, Wojciech Mazurczyk:
Malware Classification Using Open Set Recognition and HTTP Protocol Requests. 235-254 - Yifan Xia, Ping He, Xuhong Zhang, Peiyu Liu, Shouling Ji, Wenhai Wang:
Static Semantics Reconstruction for Enhancing JavaScript-WebAssembly Multilingual Malware Detection. 255-276 - Edoardo Di Paolo, Enrico Bassetti, Angelo Spognardi:
A New Model for Testing IPv6 Fragment Handling. 277-294
Privacy
- Tianyu Li, Li Xu, Zekeriya Erkin, Reginald L. Lagendijk:
Trajectory Hiding and Sharing for Supply Chains with Differential Privacy. 297-317 - Shirin Kalantari, Pieter Philippaerts, Yana Dimova, Danny Hughes, Wouter Joosen, Bart De Decker:
A User-Centric Approach to API Delegations - Enforcing Privacy Policies on OAuth Delegations. 318-337 - Iness Ben Guirat, Claudia Díaz, Karim Eldefrawy, Hadas Zeilberger:
Traffic Analysis by Adversaries with Partial Visibility. 338-358 - Efehan Guner, Mehmet Emre Gursoy:
Learning Markov Chain Models from Sequential Data Under Local Differential Privacy. 359-379 - Matthieu Meeus, Florent Guépin, Ana-Maria Cretu, Yves-Alexandre de Montjoye:
Achilles' Heels: Vulnerable Record Identification in Synthetic Data Publishing. 380-399 - François Hublet, David A. Basin, Srdan Krstic:
Enforcing the GDPR. 400-422
Remote
- Xavier Boyen, Qinyi Li:
Identity-Based Matchmaking Encryption with Enhanced Privacy - A Generic Construction with Practical Instantiations. 425-445 - Xin Li, Hong Zhu, Zhiqiang Zhang, Meiyi Xie:
Item-Oriented Personalized LDP for Discrete Distribution Estimation. 446-466 - Mengfei Ren, Haotian Zhang, Xiaolei Ren, Jiang Ming, Yu Lei:
Intelligent Zigbee Protocol Fuzzing via Constraint-Field Dependency Inference. 467-486 - Wei Lin, Qingli Guo, Jiawei Yin, Xiangyu Zuo, Rongqing Wang, Xiaorui Gong:
FSmell: Recognizing Inline Function in Binary Code. 487-506 - Wenqing Liu, An-I Andy Wang:
LFuzz: Exploiting Locality-Enabled Techniques for File-System Fuzzing. 507-525
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.