会议文集


文集名Computer Security - ESORICS 2023
会议名28th European Symposium on Research in Computer Security (ESORICS 2023)
中译名《第二十八届欧洲计算机安全研究专题研讨会,卷3》
会议日期September 25-29, 2023
会议地点The Hague, The Netherlands
出版年2024
馆藏号350878


题名作者出版年
Layered Symbolic Security Analysis in DYKarthikeyan Bhargavan; Abhishek Bichhawat; Pedram Hosseyni; Ralf Kusters; Klaas Pruiksma; Guido Schmitz; Clara Waldmann; Tim Wurtele2024
Indirect Meltdown: Building Novel Side-Channel Attacks from Transient-Execution AttacksDaniel Weber; Fabian Thomas; Lukas Gerlach; Ruiyi Zhang; Michael Schwarz2024
Accessorize in the Dark: A Security Analysis of Near-Infrared Face RecognitionAmit Cohen; Mahmood Sharif2024
A Rowhammer Reproduction Study Using the Blacksmith FuzzerLukas Gerlach; Fabian Thomas; Robert Pietsch; Michael Schwarz2024
Reviving Meltdown 3aDaniel Weber; Fabian Thomas; Lukas Gerlach; Ruiyi Zhang; Michael Schwarz2024
Tamarin-Based Analysis of Bluetooth Uncovers Two Practical Pairing Confusion AttacksTristan Claverie; Gildas Avoine; Stephanie Delaune; Jose Lopes Esteves2024
MARF: A Memory-Aware CLFLUSH-Based Intra- and Inter-CPU Side-Channel AttackSowoong Kim; Myeonggyun Han; Woongki Baek2024
You Reset I Attack! A Master Password Guessing Attack Against Honey Password VaultsTingting Rao; Yixin Su; Peng Xu; Yubo Zheng; Wei Wang; Hai Jin2024
Attacking Logo-Based Phishing Website Detectors with Adversarial PerturbationsJehyun Lee; Zhe Xin; Melanie Ng Pei See; Kanav Sabharwal; Giovanni Apruzzese; Dinil Mon Divakaran2024
Hiding Your Signals: A Security Analysis of PPG-Based Biometric AuthenticationLin Li; Chao Chen; Lei Pan; Yonghang Tai; Jun Zhang; Yang Xiang2024
Exploring Genomic Sequence Alignment for Improving Side-Channel AnalysisHeitor Uchoa; Vipul Arora; Dennis Vermoen; Marco Ottavi; Nikolaos Alachiotis2024
The Grant Negotiation and Authorization Protocol: Attacking, Fixing, and Verifying an Emerging StandardFlorian Helmschmidt; Pedram Hosseyni; Ralf Kusters; Klaas Pruiksma; Clara Waldmann; Tim Wurtele2024
Everlasting ROBOT: The Marvin AttackHubert Kario2024
JWTKey: Automatic Cryptographic Vulnerability Detection in JWT ApplicationsBowen Xu; Shijie Jia; Jingqiang Lin; Fangyu Zheng; Yuan Ma; Limin Liu; Xiaozhuo Gu; Li Song2024
When is Slower Block Propagation More Profitable for Large Miners?Zhichun Lu; Ren Zhang2024
Bijack: Breaking Bitcoin Network with TCP VulnerabilitiesShaoyu Li; Shanghao Shi; Yang Xiao; Chaoyu Zhang; Y. Thomas Hou; Wenjing Lou2024
Syntax-Aware Mutation for Testing the Solidity CompilerCharalambos Mitropoulos; Thodoris Sotiropoulos; Sotiris Ioannidis; Dimitris Mitropoulos2024
Efficient Transparent Polynomial Commitments for zk-SNARKsSungwook Kim; Sungju Kim; Yulim Shin; Sunmi Kim; Jihye Kim; Hyunok Oh2024
n-MVTL Attack: Optimal Transaction Reordering Attack on DeFiJianhuan Wang; Jichen Li; Zecheng Li; Xiaotie Deng; Bin Xiao2024
stoRNA: Stateless Transparent Proofs of Storage-timeReyhaneh Rabaninejad; Behzad Abdolmaleki; Giulio Malavolta; Antonis Michalas; Amir Nabizadeh2024
12