Computer security - ESORICS 2023 Part 3

Crypto.- Network, web and internet.- Privacy.- Remote.- Attacks.- Blockchain.- Miscellaneous.- Machine learning.- Software and systems security.

Gespeichert in:
Bibliographische Detailangaben
Körperschaft: European Symposium on Research in Computer Security (VerfasserIn)
Weitere Verfasser: Tsudik, Gene (HerausgeberIn), Conti, Mauro (HerausgeberIn), Liang, Kaitai (HerausgeberIn), Smaragdakis, Georgios (HerausgeberIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: Cham Springer 2024
Schriftenreihe:Lecture notes in computer science 14346
Schlagworte:
Online Zugang:Cover
Inhaltsverzeichnis
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Indirect Meltdown: Building Novel Side-Channel Attacks from Transient-Execution Attacks 2024 Weber, Daniel
Tamarin-Based Analysis of Bluetooth Uncovers Two Practical Pairing Confusion Attacks 2024 Claverie, Tristan
Everlasting ROBOT: The Marvin Attack 2024 Kario, Hubert
The Grant Negotiation and Authorization Protocol: Attacking, Fixing, and Verifying an Emerging Standard 2024 Helmschmidt, Florian
Tactics for Account Access Graphs 2024 Arnaboldi, Luca
A Rowhammer Reproduction Study Using the Blacksmith Fuzzer 2024 Gerlach, Lukas
You Reset I Attack! A Master Password Guessing Attack Against Honey Password Vaults 2024 Rao, Tingting
JWTKey: Automatic Cryptographic Vulnerability Detection in JWT Applications 2024 Xu, Bowen
stoRNA: Stateless Transparent Proofs of Storage-time 2024 Rabaninejad, Reyhaneh
ConGISATA: A Framework for Continuous Gamified Information Security Awareness Training and Assessment 2024 Cohen, Ofir
Accessorize in the Dark: A Security Analysis of Near-Infrared Face Recognition 2024 Cohen, Amit
Layered Symbolic Security Analysis in DY* 2024 Bhargavan, Karthikeyan
Attacking Logo-Based Phishing Website Detectors with Adversarial Perturbations 2024 Lee, Jehyun
n-MVTL Attack: Optimal Transaction Reordering Attack on DeFi 2024 Wang, Jianhuan
Syntax-Aware Mutation for Testing the Solidity Compile 2024 Mitropoulos, Charalambos
Machine-Checked Proofs of Accountability: How to sElect Who is to Blame 2024 Dragan, Constantin Catlin
Reviving Meltdown 3a 2024 Weber, Daniel
MARF: A Memory-Aware CLFLUSH-Based Intra- and Inter-CPU Side-Channel Attack 2024 Kim, Sowoong
Exploring Genomic Sequence Alignment for Improving Side-Channel Analysis 2024 Uchoa, Heitor
Hiding Your Signals: A Security Analysis of PPG-Based Biometric Authentication 2024 Li, Lin
Alle Artikel auflisten