default search action
17th ESORICS 2012: Pisa, Italy
- Sara Foresti, Moti Yung, Fabio Martinelli:
Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings. Lecture Notes in Computer Science 7459, Springer 2012, ISBN 978-3-642-33166-4
Security and Data Protection in Real Systems
- Elli Fragkaki, Lujo Bauer, Limin Jia, David Swasey:
Modeling and Enhancing Android's Permission System. 1-18 - James Kelley, Roberto Tamassia, Nikos Triandopoulos:
Hardening Access Control and Data Protection in GFS-like File Systems. 19-36 - Jonathan Crussell, Clint Gibler, Hao Chen:
Attack of the Clones: Detecting Cloned Applications on Android Markets. 37-54 - Arnar Birgisson, Daniel Hedin, Andrei Sabelfeld:
Boosting the Permissiveness of Dynamic Information-Flow Tracking by Testing. 55-72
Formal Models for Cryptography and Access Control
- Serdar Erbatur, Santiago Escobar, Deepak Kapur, Zhiqiang Liu, Christopher Lynch, Catherine Meadows, José Meseguer, Paliath Narendran, Sonia Santiago, Ralf Sasse:
Effective Symbolic Protocol Analysis via Equational Irreducibility Conditions. 73-90 - Henning Schnoor:
Deciding Epistemic and Strategic Properties of Cryptographic Protocols. 91-108 - Arif Akram Khan, Philip W. L. Fong:
Satisfiability and Feasibility in a Relationship-Based Workflow Authorization Model. 109-126 - Sebastian Mödersheim:
Deciding Security for a Fragment of ASLan. 127-144
Security and Privacy in Mobile and Wireless Networks
- Massimiliano Albanese, Alessandra De Benedictis, Sushil Jajodia, Paulo Shakarian:
A Probabilistic Framework for Localization of Attackers in MANETs. 145-162 - Ruben Rios, Jorge Cuéllar, Javier López:
Robust Probabilistic Fake Packet Injection for Receiver-Location Privacy in WSN. 163-180 - Adam J. Aviv, Micah Sherr, Matt Blaze, Jonathan M. Smith:
Privacy-Aware Message Exchanges for Geographically Routed Human Movement Networks. 181-198
Counteracting Man-in-the-Middle Attacks
- Italo Dacosta, Mustaque Ahamad, Patrick Traynor:
Trust No One Else: Detecting MITM Attacks against SSL/TLS without Third-Parties. 199-216 - Ralph Holz, Thomas Riedmaier, Nils Kammenhuber, Georg Carle:
X.509 Forensics: Detecting and Localising the SSL/TLS Men-in-the-Middle. 217-234 - Simon Eberz, Martin Strohmeier, Matthias Wilhelm, Ivan Martinovic:
A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols. 235-252
Network Security
- Ahmad-Reza Sadeghi, Steffen Schulz, Vijay Varadharajan:
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs. 253-270 - Amir Herzberg, Haya Schulmann:
Security of Patched DNS. 271-288 - Qijun Gu, Kyle Jones, Wanyu Zang, Meng Yu, Peng Liu:
Revealing Abuses of Channel Assignment Protocols in Multi-channel Wireless Networks: An Investigation Logic Approach. 289-306
Users Privacy and Anonymity
- Mishari Al Mishari, Gene Tsudik:
Exploring Linkability of User Reviews. 307-324 - Naipeng Dong, Hugo Jonker, Jun Pang:
Formal Analysis of Privacy in an eHealth Protocol. 325-342 - Jinkyu Koo, Xiaojun Lin, Saurabh Bagchi:
PRIVATUS: Wallet-Friendly Privacy Protection for Smart Meters. 343-360
Location Privacy
- Yao Zheng, Ming Li, Wenjing Lou, Y. Thomas Hou:
SHARP: Private Proximity Test and Secure Handshake with Cheat-Proof Location Tags. 361-378 - Tzipora Halevi, Di Ma, Nitesh Saxena, Tuo Xiang:
Secure Proximity Detection for NFC Devices Based on Ambient Sensor Data. 379-396 - Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou:
Enhancing Location Privacy for Electric Vehicles (at the Right time). 397-414 - Aanjhan Ranganathan, Nils Ole Tippenhauer, Boris Skoric, Dave Singelée, Srdjan Capkun:
Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System. 415-432
Voting Protocols and Anonymous Communication
- Yvo Desmedt, Pyrros Chaidos:
Applying Divertibility to Blind Ballot Copying in the Helios Internet Voting System. 433-450 - Jannik Dreier, Pascal Lafourcade, Yassine Lakhnech:
Defining Privacy for Weighted Votes, Single and Multi-voter Coercion. 451-468 - Alex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann:
TorScan: Tracing Long-Lived Connections and Differential Scanning Attacks. 469-486 - Karl-Peter Fuchs, Dominik Herrmann, Hannes Federrath:
Introducing the gMix Open Source Framework for Mix Implementations. 487-504
Private Computation in Cloud Systems
- Marina Blanton, Mikhail J. Atallah, Keith B. Frikken, Qutaibah M. Malluhi:
Secure and Efficient Outsourcing of Sequence Comparisons. 505-522 - Lei Wei, Michael K. Reiter:
Third-Party Private DFA Evaluation on Encrypted Files in the Cloud. 523-540 - Xiaofeng Chen, Jin Li, Jianfeng Ma, Qiang Tang, Wenjing Lou:
New Algorithms for Secure Outsourcing of Modular Exponentiations. 541-556
Formal Security Models
- Naveed Ahmed, Christian Damsgaard Jensen, Erik Zenner:
Towards Symbolic Encryption Schemes. 557-572 - Charanjit S. Jutla, Arnab Roy:
Decision Procedures for Simulatability. 573-590 - Deepak D'Souza, K. R. Raghavendra:
Model-Checking Bisimulation-Based Information Flow Properties for Infinite State Systems. 591-608
Identity Based Encryption and Group Signature
- Fuchun Guo, Yi Mu, Willy Susilo:
Identity-Based Traitor Tracing with Short Private Key and Short Ciphertext. 609-626 - David Galindo, Javier Herranz, Jorge L. Villar:
Identity-Based Encryption with Master Key-Dependent Message Security and Leakage-Resilience. 627-642 - Matthew K. Franklin, Haibin Zhang:
Unique Group Signatures. 643-660
Authentication
- Daisuke Moriyama, Shin'ichiro Matsuo, Miyako Ohkubo:
Relations among Notions of Privacy for RFID Authentication Protocols. 661-678 - Kin Ying Yu, Tsz Hon Yuen, Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui:
PE(AR)2: Privacy-Enhanced Anonymous Authentication with Reputation and Revocation. 679-696 - Flavio D. Garcia, Gerhard de Koning Gans, Roel Verdult, Milosch Meriac:
Dismantling iClass and iClass Elite. 697-715
Encryption Key and Password Security
- Markus Dürmuth, Tim Güneysu, Markus Kasper, Christof Paar, Tolga Yalçin, Ralf Zimmermann:
Evaluation of Standardized Password-Based Key Derivation against Parallel Processing Platforms. 716-733 - Cas Cremers, Michèle Feltz:
Beyond eCK: Perfect Forward Secrecy under Actor Compromise and Ephemeral-Key Reveal. 734-751 - Tibor Jager, Sebastian Schinzel, Juraj Somorovsky:
Bleichenbacher's Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption. 752-769 - Paolo Gasti, Kasper Bonne Rasmussen:
On the Security of Password Manager Database Formats. 770-787
Malware and Phishing
- Jack W. Stokes, John C. Platt, Helen J. Wang, Joe Faulhaber, Jonathan Keller, Mady Marinescu, Anil Thomas, Marius Gheorghescu:
Scalable Telemetry Classification for Automated Malware Detection. 788-805 - Philippe Beaucamps, Isabelle Gnaedig, Jean-Yves Marion:
Abstraction-Based Malware Analysis Using Rewriting and Model Checking. 806-823 - Rakesh M. Verma, Narasimha K. Shashidhar, Nabil Hossain:
Detecting Phishing Emails the Natural Language Way. 824-841
Software Security
- Mengtao Sun, Gang Tan:
JVM-Portable Sandboxing of Java's Native Libraries. 842-858 - Yongzheng Wu, Sai Sathyanarayan, Roland H. C. Yap, Zhenkai Liang:
Codejail: Application-Transparent Isolation of Libraries with Tight Program Interactions. 859-876 - Ziming Zhao, Gail-Joon Ahn, Hongxin Hu, Deepinder Mahi:
SocialImpact: Systematic Analysis of Underground Social Dynamics. 877-894
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.