Computer Security – ESORICS 2022
Springer International Publishing (Verlag)
978-3-031-17145-1 (ISBN)
The 104 full papers and 6 poster papers presented in these proceedings were carefully reviewed and selected from 562 submissions. They were organized in topical sections as follows:
Part I: Blockchain security; privacy; crypto; attacks; sidechannels;Part II: Anonymity; cloud security; access control; authentication; digital signatures; IoT security; applications;
Part III: Formal analysis; Web security; hardware security; multiparty computation; ML techniques; cyber-physical systems security; network and software security; posters.Anonymity.- A Machine Learning Approach to Detect Differential Treatment of Anonymous Users.- Utility-Preserving Biometric Information Anonymization.- Anonymous Traceback for End-to-End Encryption.- Cloud Security.- Public Cloud Data Auditing Revisited: Removing the Tradeoff Between Proof Size and Storage Cost.- DEKS: a Secure Cloud-based Searchable Service can Make Attackers Pay.- Lighter Is Better: A Lighter Multi-Client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption.- Verifying the Quality of Outsourced Training on Clouds.- SecQuant: Quantifying Container System Call Exposure.- Dynamic Process Isolation.- Access Control.- Administration of Machine Learning Based Access Control.- Real-time Policy Enforcement with Metric First-Order Temporal Logic.- A Tale of Four Gates - Privilege Escalation and Permission Bypasses on Android through App Components.- Authentication.- Sequential Digital Signatures for Cryptographic Software-Update Authentication.- On Committing Authenticated Encryption.- Quantum-Resistant Password Based Threshold Single-Sign-On Authentication with Updatable Server Private Key.- The Revenge of Password Crackers: Automated Training of Password Cracking Tools.- Fuzzy Authenticated Key Exchange with Tight Security.- Continuous Authentication in Secure Messaging.- Digital Signatures.- Half-Aggregation of Schnorr Signatures with Tight Reductions.- Ring Signatures with User-Controlled Linkability.- DualDory: Logarithmic-verifier linkable ring signatures through preprocessing.- Effcient Unique Ring Signatures From Lattices.- Kiyomoto Verifiable Timed Linkable Ring Signatures For Scalable Payments for Monero.- Deterministic Wallets for Adaptor Signatures.- Puncturable Signature: A Generic Construction and Instantiations.- IoT Security.- fASLR: Function-Based ASLR for Resource-Constrained IoT Systems.- An Infection-Identifying and Self-Evolving System for IoT Early Defense from Multi-Step Attacks.- IoTEnsemble: Detection of Botnet Attacks on Internet of Things.- IoTPrivComp: A Measurement Study of Privacy Compliance in IoT Apps.- No-Label User-Level Membership Inference for ASR Model Auditing.- Applications.- A toolbox for verifiable tally-hiding e-voting systems.- How to Verifiably Encrypt Many Bits for an Election.- A framework for constructing Single Secret Leader Election from MPC.- AppBastion: Protection from Untrusted Apps and OSes on ARM.- Collaborative anomaly detection system for charging stations.
Erscheinungsdatum | 25.09.2022 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | XXII, 741 p. 88 illus. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 1133 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Schlagworte | Access Control • Applications • authentication • Computer Networks • Computer Science • Computer Security • conference proceedings • cryptography • Data Security • distributed computer systems • Distributed Systems • Informatics • Network Protocols • Network Security • parallel processing systems • privacy • Research • Security and Privacy • Signal Processing • Software engineering |
ISBN-10 | 3-031-17145-4 / 3031171454 |
ISBN-13 | 978-3-031-17145-1 / 9783031171451 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich