default search action
EuroS&P 2018: London, UK
- 2018 IEEE European Symposium on Security and Privacy, EuroS&P 2018, London, United Kingdom, April 24-26, 2018. IEEE 2018, ISBN 978-1-5386-4228-3
Language-Based Security and Access Control
- Laurent Simon, David Chisnall, Ross J. Anderson:
What You Get is What You C: Controlling Side Effects in Mainstream C Compilers. 1-15 - Toby C. Murray, Robert Sison, Kai Engelhardt:
COVERN: A Logic for Compositional Verification of Information Flow Control. 16-30 - Carlos Cotrini, Thilo Weghorn, David A. Basin:
Mining ABAC Rules from Sparse Logs. 31-46
Security and Privacy Analysis
- Anupama Aggarwal, Bimal Viswanath, Liang Zhang, Saravana Kumar, Ayush Shah, Ponnurangam Kumaraguru:
I Spy with My Little Eye: Analysis and Detection of Spying Browser Extensions. 47-61 - Pascal Berrang, Mathias Humbert, Yang Zhang, Irina Lehmann, Roland Eils, Michael Backes:
Dissecting Privacy Risks in Biomedical Data. 62-76 - Patrick Speicher, Marcel Steinmetz, Robert Künnemann, Milivoj Simeonovski, Giancarlo Pellegrino, Jörg Hoffmann, Michael Backes:
Formally Reasoning about the Cost and Efficacy of Securing the Email Infrastructure. 77-91
Network and Communication Security
- Chiara Bodei, Pierpaolo Degano, Letterio Galletta, Riccardo Focardi, Mauro Tempesta, Lorenzo Veronese:
Language-Independent Synthesis of Firewall Policies. 92-106 - Martin Strohmeier, Matthew Smith, Vincent Lenders, Ivan Martinovic:
The Real First Class? Inferring Confidential Corporate Mergers and Government Relations from Air Traffic Communication. 107-121 - Teemu Rytilahti, Dennis Tatang, Janosch Kopper, Thorsten Holz:
Masters of Time: An Overview of the NTP Ecosystem. 122-136 - Chen Chen, Daniele Enrico Asoni, Adrian Perrig, David Barrera, George Danezis, Carmela Troncoso:
TARANET: Traffic-Analysis Resistant Anonymity at the Network Layer. 137-152
System Security
- Kaan Onarlioglu, William K. Robertson, Engin Kirda:
Eraser: Your Data Won't Be Back. 153-166 - Micah Morton, Jan Werner, Panagiotis Kintis, Kevin Z. Snow, Manos Antonakakis, Michalis Polychronakis, Fabian Monrose:
Security Risks in Asynchronous Web Servers: When Performance Optimizations Amplify the Impact of Data-Oriented Attacks. 167-182 - Amit Vasudevan, Sagar Chaki:
Have Your PI and Eat it Too: Practical Security on a Low-Cost Ubiquitous Computing Platform. 183-198 - Christian Vaas, Mika Juuti, N. Asokan, Ivan Martinovic:
Get in Line: Ongoing Co-presence Verification of a Vehicle Formation Based on Driving Trajectories. 199-213
Software Security
- Mario Werner, Thomas Unterluggauer, David Schaffenrath, Stefan Mangard:
Sponge-Based Control-Flow Protection for IoT Devices. 214-226 - Enes Göktas, Benjamin Kollenda, Philipp Koppe, Erik Bosman, Georgios Portokalidis, Thorsten Holz, Herbert Bos, Cristiano Giuffrida:
Position-Independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure. 227-242 - Jon Stephens, Babak Yadegari, Christian S. Collberg, Saumya Debray, Carlos Scheidegger:
Probabilistic Obfuscation Through Covert Channels. 243-257
Applied Cryptography 1
- Wei Bai, Ciara Lynton, Charalampos Papamanthou, Michelle L. Mazurek:
Understanding User Tradeoffs for Search in Encrypted Communication. 258-272 - David Derler, Sebastian Ramacher, Daniel Slamanig:
Short Double- and N-Times-Authentication-Preventing Signatures from ECDSA and More. 273-287 - Charles V. Wright, Mayank Varia:
Crypto Crumple Zones: Enabling Limited Access without Mass Surveillance. 288-306
Session Side Channels and Fault Attacks
- Lucas Bang, Nicolás Rosner, Tevfik Bultan:
Online Synthesis of Adaptive Side-Channel Attacks Based On Noisy Observations. 307-322 - Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Keito Sasaoka, Takeshi Yagi, Tatsuya Mori:
User Blocking Considered Harmful? An Attacker-Controllable Side Channel to Identify Social Accounts. 323-337 - Damian Poddebniak, Juraj Somorovsky, Sebastian Schinzel, Manfred Lochter, Paul Rösler:
Attacking Deterministic Signature Schemes Using Fault Attacks. 338-352
Applied Cryptography 2
- Joppe W. Bos, Léo Ducas, Eike Kiltz, Tancrède Lepoint, Vadim Lyubashevsky, John M. Schanck, Peter Schwabe, Gregor Seiler, Damien Stehlé:
CRYSTALS - Kyber: A CCA-Secure Module-Lattice-Based KEM. 353-367 - Benjamin Harsha, Jeremiah Blocki:
Just In Time Hashing. 368-383 - Luke Valenta, Nick Sullivan, Antonio Sanso, Nadia Heninger:
In Search of CurveSwap: Measuring Elliptic Curve Implementations in the Wild. 384-398
Systematization of Knowledge
- Nicolas Papernot, Patrick D. McDaniel, Arunesh Sinha, Michael P. Wellman:
SoK: Security and Privacy in Machine Learning. 399-414
Protocol Security
- Paul Rösler, Christian Mainka, Jörg Schwenk:
More is Less: On the End-to-End Security of Group Chats in Signal, WhatsApp, and Threema. 415-429 - Véronique Cortier, David Galindo, Mathieu Turuani:
A Formal Analysis of the Neuchatel e-Voting Protocol. 430-442 - Marjan Skrobot, Jean Lancrenon:
On Composability of Game-Based Password Authenticated Key Exchange. 443-457
Security and Learning
- Ziyun Zhu, Tudor Dumitras:
ChainSmith: Automatically Learning the Semantics of Malicious Campaigns by Mining Threat Intelligence Reports. 458-472 - Ke Xu, Yingjiu Li, Robert H. Deng, Kai Chen:
DeepRefiner: Multi-layer Android Malware Detection System Applying Deep Neural Networks. 473-487 - Erwin Quiring, Daniel Arp, Konrad Rieck:
Forgotten Siblings: Unifying Attacks on Machine Learning and Digital Watermarking. 488-502
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.