My Account Log in

1 option

Computer Security - ESORICS 2022 : 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part III / edited by Vijayalakshmi Atluri, Roberto Di Pietro, Christian D. Jensen, Weizhi Meng.

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024)
Format:
Book
Contributor:
Atluri, Vijayalakshmi., Editor.
Di Pietro, Roberto, Editor.
Jensen, Christian D., Editor.
Meng, Weizhi, Editor.
SpringerLink (Online service)
Series:
Computer Science (SpringerNature-11645)
Lecture notes in computer science 1611-3349 ; 13556
Lecture Notes in Computer Science, 1611-3349 ; 13556
Language:
English
Subjects (All):
Data protection.
Application software.
Computer networks-Security measures.
Computers, Special purpose.
Computer systems.
Data and Information Security.
Computer and Information Systems Applications.
Mobile and Network Security.
Special Purpose and Application-Based Systems.
Computer System Implementation.
Local Subjects:
Data and Information Security.
Computer and Information Systems Applications.
Mobile and Network Security.
Special Purpose and Application-Based Systems.
Computer System Implementation.
Physical Description:
1 online resource (XXIII, 789 pages) : 248 illustrations, 173 illustrations in color.
Edition:
1st ed. 2022.
Contained In:
Springer Nature eBook
Place of Publication:
Cham : Springer Nature Switzerland : Imprint: Springer, 2022.
System Details:
text file PDF
Summary:
The three volume set LNCS 13554, 13555, 13556 constitutes the proceedings of the 27th European Symposium on Research in Computer Security, ESORICS 2022, which took place in September 2022. The conference took place in Copenhagen, Denmark, in a hybrid mode. The 104 full papers and 6 poster papers presented in these proceedings were carefully reviewed and selected from 562 submissions. They were organized in topical sections as follows: Part I: Blockchain security; privacy; crypto; attacks; sidechannels; Part II: Anonymity; cloud security; access control; authentication; digital signatures; IoT security; applications; Part III: Formal analysis; Web security; hardware security; multiparty computation; ML techniques; cyber-physical systems security; network and software security; posters.
Contents:
Formal Analysis
A Formal Analysis of the FIDO2 Protocols
Composable Security Treatment of ECVRF and Batch Verifications
Effcient Proofs of Knowledge for Threshold Relations
A tale of two models: formal verification of KEMTLS via Tamarin
Web Security
Browser-based CPU Fingerprinting
Polymorphic Protocols at the Example of Mitigating Web Bots
Unlinkable Delegation of WebAuthn Credentials
Large Scale Analysis of DoH Deployment on the Internet
Equivocal URLs: Understanding the Fragmented Space of URL Parser Implementations
Exploring the Characteristics and Security Risks of Emerging Emoji Domain Names
Hardware Security
CPU Port Contention Without SMT
Protocols for a Two-Tiered Trusted Computing Base
Using Memristor Arrays as Physical Unclonable Functions
Multiparty Computation
SecureBiNN: 3-Party Secure Computation for Binarized Neural Network Inference
MixedTechnique Multi-Party Computations Composed of Two-Party Computations
PEA: Practical Private Epistasis Analysis using MPC
ML Techniques
Hide and Seek: on the Stealthiness of Attacks against Deep Learning Systems
Precise Extraction of Deep Learning Models via Side-Channel Attacks on Edge/Endpoint Devices
Real-time Adversarial Perturbations against Deep Reinforcement Learning Policies: Attacks and Defenses
FLMJR: Improving Robustness of Federated Learning via Model Stability
MaleficNet: Hiding Malware into Deep Neural Networks using Spread-Spectrum Channel Coding
Long-Short History of Gradients is All You Need: Detecting Malicious and Unreliable Clients in Federated Learning
MLFM: Machine Learning Meets Formal Method for Faster Identification of Security Breaches in Network Functions Virtualization (NFV)
Cyber-Physical Systems Security
Perspectives from a Comprehensive Evaluation of Reconstruction-based Anomaly Detection in Industrial Control Systems
A Novel High-performance Implementation of CRYSTALS-Kyber with AI Accelerator
From Click To Sink: utilizing AIS for command and control in maritime cyber attacks
Effcient Hash-Based Redactable Signature for Smart Grid Applications
Can Industrial Intrusion Detection Be SIMPLE
For your Voice Only: Exploiting Side Channels in Voice Messaging for Environment Detection
Towards Effcient Auditing for Real-Time Systems
Network and Software Security
Towards a Systematic and Automatic Use of State Machine Inference to Uncover Security Flaws and Fingerprint TLS Stacks
PanoptiCANs - Adversary-resilient Architectures for Controller Area Networks
Detecting Cross-Language Memory Management Issues in Rust
Reach Me if You Can: On Native Vulnerability Reachability in Android Apps
Extensible Virtual Call Integrity
Posters
Is your password sexist? A gamification-based analysis of the cultural context of leaked passwords
A Fast, Practical and Simple Shortest Path Protocol for Multiparty Computation
Audio Spoofing Detection Using Constant-Q Spectral Sketches and Parallel-Attention SE-ResNet
MixCT: Mixing Confidential Transactions from Homomorphic Commitment
Multi-Freq-LDPy: Multiple Frequency Estimation Under Local Differential Privacy in Python
The Devil is in the GAN: Backdoor Attacks and Defenses in Deep Generative Models. .
Other Format:
Printed edition:
ISBN:
978-3-031-17143-7
9783031171437
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

We want your feedback!

Thanks for using the Penn Libraries new search tool. We encourage you to submit feedback as we continue to improve the site.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account