


default search action
27th ESORICS 2022: Copenhagen, Denmark - Part II
- Vijayalakshmi Atluri
, Roberto Di Pietro
, Christian Damsgaard Jensen
, Weizhi Meng
:
Computer Security - ESORICS 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part II. Lecture Notes in Computer Science 13555, Springer 2022, ISBN 978-3-031-17145-1
Anonymity
- Isabel Wagner
:
A Machine Learning Approach to Detect Differential Treatment of Anonymous Users. 3-23 - Bill Moriarty, Chun-Fu (Richard) Chen, Shaohan Hu, Sean Moran, Marco Pistoia, Vincenzo Piuri, Pierangela Samarati:
Utility-Preserving Biometric Information Anonymization. 24-41 - Erin Kenney, Qiang Tang
, Chase Wu:
Anonymous Traceback for End-to-End Encryption. 42-62
Cloud Security
- Willy Susilo
, Yannan Li
, Fuchun Guo
, Jianchang Lai
, Ge Wu
:
Public Cloud Data Auditing Revisited: Removing the Tradeoff Between Proof Size and Storage Cost. 65-85 - Yubo Zheng, Peng Xu
, Wei Wang, Tianyang Chen, Willy Susilo
, Kaitai Liang, Hai Jin:
DEKS: A Secure Cloud-Based Searchable Service Can Make Attackers Pay. 86-104 - Xingkai Wang
, Zhenfu Cao
, Zhen Liu
, Kaitai Liang
:
Lighter is Better: A Lighter Multi-client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption. 105-125 - Peiyang Li, Ye Wang
, Zhuotao Liu
, Ke Xu, Qian Wang, Chao Shen, Qi Li:
Verifying the Quality of Outsourced Training on Clouds. 126-144 - Sunwoo Jang, Somin Song, Byungchul Tak, Sahil Suneja, Michael V. Le, Chuan Yue, Dan Williams:
SecQuant: Quantifying Container System Call Exposure. 145-166 - Martin Schwarzl, Pietro Borrello, Andreas Kogler, Kenton Varda, Thomas Schuster, Michael Schwarz, Daniel Gruss:
Robust and Scalable Process Isolation Against Spectre in the Cloud. 167-186
Access Control
- Mohammad Nur Nobi, Ram Krishnan, Yufei Huang, Ravi S. Sandhu:
Administration of Machine Learning Based Access Control. 189-210 - François Hublet
, David A. Basin
, Srdan Krstic
:
Real-Time Policy Enforcement with Metric First-Order Temporal Logic. 211-232 - Abdulla Aldoseri, David F. Oswald
, Robert Chiper:
A Tale of Four Gates - Privilege Escalation and Permission Bypasses on Android Through App Components. 233-251
Authentication
- Bertram Poettering
, Simon Rastikian:
Sequential Digital Signatures for Cryptographic Software-Update Authentication. 255-274 - John Chan, Phillip Rogaway:
On Committing Authenticated-Encryption. 275-294 - Jingwei Jiang, Ding Wang
, Guoyin Zhang, Zhiyuan Chen:
Quantum-Resistant Password-Based Threshold Single-Sign-On Authentication with Updatable Server Private Key. 295-316 - Alessia Michela Di Campi, Riccardo Focardi
, Flaminia L. Luccio
:
The Revenge of Password Crackers: Automated Training of Password Cracking Tools. 317-336 - Mingming Jiang
, Shengli Liu, Shuai Han, Dawu Gu:
Fuzzy Authenticated Key Exchange with Tight Security. 337-360 - Benjamin Dowling
, Felix Günther
, Alexandre Poirrier
:
Continuous Authentication in Secure Messaging. 361-381
Digital Signatures
- Yanbo Chen, Yunlei Zhao:
Half-Aggregation of Schnorr Signatures with Tight Reductions. 385-404 - Dario Fiore, Lydia Garms, Dimitris Kolonelos, Claudio Soriente, Ida Tucker:
Ring Signatures with User-Controlled Linkability. 405-426 - Jonathan Bootle
, Kaoutar Elkhiyaoui, Julia Hesse, Yacov Manevich:
DualDory: Logarithmic-Verifier Linkable Ring Signatures Through Preprocessing. 427-446 - Tuong Ngoc Nguyen
, Anh The Ta
, Huy Quoc Le
, Dung Hoang Duong
, Willy Susilo
, Fuchun Guo
, Kazuhide Fukushima
, Shinsaku Kiyomoto
:
Efficient Unique Ring Signatures from Lattices. 447-466 - Sri Aravinda Krishnan Thyagarajan
, Giulio Malavolta
, Fritz Schmid, Dominique Schröder:
Verifiable Timed Linkable Ring Signatures for Scalable Payments for Monero. 467-486 - Andreas Erwig, Siavash Riahi:
Deterministic Wallets for Adaptor Signatures. 487-506 - Mei Jiang
, Dung Hoang Duong
, Willy Susilo
:
Puncturable Signature: A Generic Construction and Instantiations. 507-527
IoT Security
- Xinhui Shao, Lan Luo, Zhen Ling, Huaiyu Yan, Yumeng Wei, Xinwen Fu
:
fASLR: Function-Based ASLR for Resource-Constrained IoT Systems. 531-548 - Hyunwoo Lee, Anand Mudgerikar, Ashish Kundu, Ninghui Li, Elisa Bertino:
An Infection-Identifying and Self-Evolving System for IoT Early Defense from Multi-Step Attacks. 549-568 - Ruoyu Li
, Qing Li
, Yucheng Huang, Wenbin Zhang, Peican Zhu
, Yong Jiang:
IoTEnsemble: Detection of Botnet Attacks on Internet of Things. 569-588 - Javaria Ahmad, Fengjun Li, Bo Luo
:
IoTPrivComp: A Measurement Study of Privacy Compliance in IoT Apps. 589-609 - Yuantian Miao, Chao Chen, Lei Pan, Shigang Liu, Seyit Camtepe, Jun Zhang, Yang Xiang:
No-Label User-Level Membership Inference for ASR Model Auditing. 610-628
Applications
- Véronique Cortier, Pierrick Gaudry, Quentin Yang
:
A Toolbox for Verifiable Tally-Hiding E-Voting Systems. 631-652 - Henri Devillez, Olivier Pereira, Thomas Peters:
How to Verifiably Encrypt Many Bits for an Election? 653-671 - Michael Backes, Pascal Berrang, Lucjan Hanzlik, Ivan Pryvalov:
A Framework for Constructing Single Secret Leader Election from MPC. 672-691 - Darius Suciu, Radu Sion, Michael Ferdman:
AppBastion: Protection from Untrusted Apps and OSes on ARM. 692-715 - Jesus Cumplido, Cristina Alcaraz, Javier López:
Collaborative Anomaly Detection System for Charging Stations. 716-736

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.