


default search action
21st ESORICS 2016: Heraklion, Greece
- Ioannis G. Askoxylakis, Sotiris Ioannidis, Sokratis K. Katsikas, Catherine Meadows:

Computer Security - ESORICS 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I. Lecture Notes in Computer Science 9878, Springer 2016, ISBN 978-3-319-45743-7
Network and Web Security
- Bharat Srinivasan, Payas Gupta, Manos Antonakakis, Mustaque Ahamad:

Understanding Cross-Channel Abuse with SMS-Spam Support Infrastructure Attribution. 3-26 - Marc Juarez

, Mohsen Imani, Mike Perry, Claudia Díaz, Matthew Wright
:
Toward an Efficient Website Fingerprinting Defense. 27-46 - Suryadipta Majumdar, Yosr Jarraya, Taous Madi, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang, Mourad Debbabi

:
Proactive Verification of Security Compliance for Clouds Through Pre-computation: Application to OpenStack. 47-66
Authentication
- Weining Yang, Ninghui Li, Ian M. Molloy, Youngja Park, Suresh N. Chari:

Comparing Password Ranking Algorithms on Real-World Password Datasets. 69-90 - Aldar C.-F. Chan

, Jun Wen Wong, Jianying Zhou
, Joseph Chee Ming Teo:
Scalable Two-Factor Authentication Using Historical Data. 91-110 - Ding Wang

, Ping Wang:
On the Implications of Zipf's Law in Passwords. 111-131
Encrypted Search
- Jun Zhou, Zhenfu Cao

, Xiaolei Dong:
PPOPM: More Efficient Privacy Preserving Outsourced Pattern Matching. 135-153 - Shifeng Sun, Joseph K. Liu, Amin Sakzad

, Ron Steinfeld, Tsz Hon Yuen
:
An Efficient Non-interactive Multi-client Searchable Encryption with Support for Boolean Queries. 154-172 - Aggelos Kiayias, Ozgur Oksuz, Alexander Russell

, Qiang Tang
, Bing Wang:
Efficient Encrypted Keyword Search for Multi-user Data Sharing. 173-195
Detection and Monitoring
- Gábor Pék, Zsombor Lázár, Zoltán Várnagy, Márk Félegyházi, Levente Buttyán:

Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis. 199-216 - Luka Malisa, Kari Kostiainen, Michael Och, Srdjan Capkun:

Mobile Application Impersonation Detection Using Dynamic User Interface Extraction. 217-237 - Qianru Wu, Qixu Liu, Yuqing Zhang, Peng Liu, Guanxing Wen:

A Machine Learning Approach for Detecting Third-Party Trackers on the Web. 238-258
Cryptography for Cloud Computing
- Céline Chevalier, Fabien Laguillaumie, Damien Vergnaud

:
Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis and Optimal Constructions. 261-278 - Nesrine Kaaniche

, Maryline Laurent
:
Attribute-Based Signatures for Supporting Anonymous Certification. 279-300 - Yongge Wang

, Qutaibah M. Malluhi:
Privacy Preserving Computation in Cloud Using Noise-Free Fully Homomorphic Encryption (FHE) Schemes. 301-323 - Jia Xu

, Anjia Yang
, Jianying Zhou
, Duncan S. Wong:
Lightweight Delegatable Proofs of Storage. 324-343 - Michael Backes, Amir Herzberg

, Aniket Kate, Ivan Pryvalov:
Anonymous RAM. 344-362 - Russell W. F. Lai, Tao Zhang, Sherman S. M. Chow

, Dominique Schröder
:
Efficient Sanitizable Signatures Without Random Oracles. 363-380
Operating Systems Security
- Carter Yagemann

, Wenliang Du:
Intentio Ex Machina: Android Intent Access Control via an Extensible Application Hook. 383-400 - Xiao Zhang, Yousra Aafer, Kailiang Ying, Wenliang Du:

Hey, You, Get Off of My Image: Detecting Data Residue in Android Images. 401-421 - Elias Athanasopoulos, Vasileios P. Kemerlis

, Georgios Portokalidis
, Angelos D. Keromytis:
NaClDroid: Native Code Isolation for Android Applications. 422-439 - Nico Weichbrodt, Anil Kurmus, Peter R. Pietzuch, Rüdiger Kapitza:

AsyncShock: Exploiting Synchronisation Bugs in Intel SGX Enclaves. 440-457 - Fabo Wang, Yuqing Zhang, Kai Wang, Peng Liu, Wenjie Wang:

Stay in Your Cage! A Sound Sandbox for Third-Party Libraries on Android. 458-476 - Bahman Rashidi

, Carol J. Fung, Anh Nguyen, Tam Vu:
Android Permission Recommendation Using Transitive Bayesian Inference Model. 477-497
Information Flow
- Nataliia Bielova

, Tamara Rezk:
Spot the Difference: Secure Multi-execution and Multiple Facets. 501-519 - Oliver Woizekowski, Ron van der Meyden

:
On Reductions from Multi-Domain Noninterference to the Two-Level Case. 520-537 - Marco Vassena, Pablo Buiras, Lucas Waye, Alejandro Russo

:
Flexible Manipulation of Labeled Values for Information-Flow Control Libraries. 538-557
Software Security
- Daniel Schoepe, Musard Balliu, Frank Piessens, Andrei Sabelfeld:

Let's Face It: Faceted Values for Taint Tracking. 561-580 - Spandan Veggalam, Sanjay Rawat

, István Haller, Herbert Bos
:
IFuzzer: An Evolutionary Interpreter Fuzzer Using Genetic Programming. 581-601 - Patrick Wollgast, Robert Gawlik, Behrad Garmany, Benjamin Kollenda, Thorsten Holz

:
Automated Multi-architectural Discovery of CFI-Resistant Code Gadgets. 602-620

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














