长垣产业园区科技文献服务平台
主页
文献资源
外文期刊
外文会议
中文期刊
专业机构
起重机械
智能制造
高级检索
关于我们
版权声明
使用帮助
会议文集
文集名
Computer Security - ESORICS 2023
会议名
28th European Symposium on Research in Computer Security (ESORICS 2023)
中译名
《第二十八届欧洲计算机安全研究专题研讨会,卷3》
会议日期
September 25-29, 2023
会议地点
The Hague, The Netherlands
出版年
2024
馆藏号
350878
题名
作者
出版年
Layered Symbolic Security Analysis in DY
Karthikeyan Bhargavan; Abhishek Bichhawat; Pedram Hosseyni; Ralf Kusters; Klaas Pruiksma; Guido Schmitz; Clara Waldmann; Tim Wurtele
2024
Indirect Meltdown: Building Novel Side-Channel Attacks from Transient-Execution Attacks
Daniel Weber; Fabian Thomas; Lukas Gerlach; Ruiyi Zhang; Michael Schwarz
2024
Accessorize in the Dark: A Security Analysis of Near-Infrared Face Recognition
Amit Cohen; Mahmood Sharif
2024
A Rowhammer Reproduction Study Using the Blacksmith Fuzzer
Lukas Gerlach; Fabian Thomas; Robert Pietsch; Michael Schwarz
2024
Reviving Meltdown 3a
Daniel Weber; Fabian Thomas; Lukas Gerlach; Ruiyi Zhang; Michael Schwarz
2024
Tamarin-Based Analysis of Bluetooth Uncovers Two Practical Pairing Confusion Attacks
Tristan Claverie; Gildas Avoine; Stephanie Delaune; Jose Lopes Esteves
2024
MARF: A Memory-Aware CLFLUSH-Based Intra- and Inter-CPU Side-Channel Attack
Sowoong Kim; Myeonggyun Han; Woongki Baek
2024
You Reset I Attack! A Master Password Guessing Attack Against Honey Password Vaults
Tingting Rao; Yixin Su; Peng Xu; Yubo Zheng; Wei Wang; Hai Jin
2024
Attacking Logo-Based Phishing Website Detectors with Adversarial Perturbations
Jehyun Lee; Zhe Xin; Melanie Ng Pei See; Kanav Sabharwal; Giovanni Apruzzese; Dinil Mon Divakaran
2024
Hiding Your Signals: A Security Analysis of PPG-Based Biometric Authentication
Lin Li; Chao Chen; Lei Pan; Yonghang Tai; Jun Zhang; Yang Xiang
2024
Exploring Genomic Sequence Alignment for Improving Side-Channel Analysis
Heitor Uchoa; Vipul Arora; Dennis Vermoen; Marco Ottavi; Nikolaos Alachiotis
2024
The Grant Negotiation and Authorization Protocol: Attacking, Fixing, and Verifying an Emerging Standard
Florian Helmschmidt; Pedram Hosseyni; Ralf Kusters; Klaas Pruiksma; Clara Waldmann; Tim Wurtele
2024
Everlasting ROBOT: The Marvin Attack
Hubert Kario
2024
JWTKey: Automatic Cryptographic Vulnerability Detection in JWT Applications
Bowen Xu; Shijie Jia; Jingqiang Lin; Fangyu Zheng; Yuan Ma; Limin Liu; Xiaozhuo Gu; Li Song
2024
When is Slower Block Propagation More Profitable for Large Miners?
Zhichun Lu; Ren Zhang
2024
Bijack: Breaking Bitcoin Network with TCP Vulnerabilities
Shaoyu Li; Shanghao Shi; Yang Xiao; Chaoyu Zhang; Y. Thomas Hou; Wenjing Lou
2024
Syntax-Aware Mutation for Testing the Solidity Compiler
Charalambos Mitropoulos; Thodoris Sotiropoulos; Sotiris Ioannidis; Dimitris Mitropoulos
2024
Efficient Transparent Polynomial Commitments for zk-SNARKs
Sungwook Kim; Sungju Kim; Yulim Shin; Sunmi Kim; Jihye Kim; Hyunok Oh
2024
n-MVTL Attack: Optimal Transaction Reordering Attack on DeFi
Jianhuan Wang; Jichen Li; Zecheng Li; Xiaotie Deng; Bin Xiao
2024
stoRNA: Stateless Transparent Proofs of Storage-time
Reyhaneh Rabaninejad; Behzad Abdolmaleki; Giulio Malavolta; Antonis Michalas; Amir Nabizadeh
2024
1
2
国家科技图书文献中心
全球文献资源网
京ICP备05055788号-26
机械工业信息研究院 2018-2024