


default search action
30th ESORICS 2025: Toulouse, France - Part III
- Vincent Nicomette

, Abdelmalek Benzekri
, Nora Boulahia-Cuppens
, Jaideep Vaidya
:
Computer Security - ESORICS 2025 - 30th European Symposium on Research in Computer Security, Toulouse, France, September 22-24, 2025, Proceedings, Part III. Lecture Notes in Computer Science 16055, Springer 2026, ISBN 978-3-032-07893-3 - Kian Kai Ang, Damith C. Ranasinghe:

QUIC-Fuzz: An Effective Greybox Fuzzer For The QUIC Protocol. 1-22 - Cédrick Austa

, Jan Tobias Mühlberg
, Jean-Michel Dricot
:
Systematic Assessment of Cache Timing Vulnerabilities on RISC-V Processors. 23-42 - Eddie Billoir

, Romain Laborde
, Daniele Canavese
, Yves Rütschlé
, Ahmad Samer Wazan
, Abdelmalek Benzekri
:
No Root, No Problem: Automating Linux Least Privilege and Securing Ansible Deployments. 43-63 - Amit Choudhari, Shorya Kumar, Christian Rossow:

NICraft: Malicious NIC Firmware-Based Cache Side-Channel Attack. 64-83 - Minu Chung

, Hyungon Moon
:
Identifying Potential Timing Leakages from Hardware Design with Precondition Synthesis. 84-104 - Cristian Daniele

, Timme Bethe, Marcello Maugeri
, Andrea Continella
, Erik Poll
:
LibAFLstar: Fast and State-Aware Protocol Fuzzing. 105-123 - Emiliia Gelóczi

, Nico Mexis
, Stefan Katzenbeisser:
PUSH for Security: A PUF-Based Protocol to Prevent Session Hijacking. 124-143 - Sarat Chandra Prasad Gingupalli:

Hardening HSM Clusters: Resolving Key Sync Vulnerabilities for Robust CU Isolation. 144-163 - Fengliang He, Hong-Ning Dai, Hanyang Guo, Xiapu Luo, Jiadi Yu:

AcouListener: An Inaudible Acoustic Side-Channel Attack on AR/VR Systems. 164-183 - Martin Heckel, Florian Adamsky, Jonas Juffinger, Fabian Rauscher, Daniel Gruss:

Verifying DRAM Addressing in Software. 184-203 - Martin Heckel, Hannes Weissteiner, Florian Adamsky, Daniel Gruss:

Epistemology of Rowhammer Attacks: Threats to Rowhammer Research Validity. 204-223 - Fugeng Huang, Jiahong Yang, Haibo Cheng

, Wenting Li
, Ping Wang
:
Personalized Password Guessing via Modeling Multiple Leaked Credentials of the Same User. 224-242 - Hao Huang, Xiuwei Shang, Junqi Zhang, Shaoyin Cheng, Weiming Zhang, Nenghai Yu:

WelkIR: Flow-Sensitive Pre-trained Embeddings from Compiler IR for Vulnerability Detection. 243-262 - Weihua Jiao

, Qingbao Li, Xilong Li, Zhifeng Chen, Weiping Yao, Guimin Zhang, Fei Cao:
Edge Coverage Feedback of Embedded Systems Fuzzing Based on Debugging Interfaces. 263-282 - Taehun Kim, Hyerean Jang, Youngjoo Shin:

Cache Demote for Fast Eviction Set Construction and Page Table Attribute Leakage. 283-302 - Lukas Lamster

, Fabian Rauscher
, Martin Unterguggenberger
, Stefan Mangard
:
WaitWatcher and WaitGuard: Detecting Flush-Based Cache Side-Channels Through Spurious Wakeups. 303-322 - Woomin Lee, Taehun Kim, Seunghee Shin, Junbeom Hur, Youngjoo Shin:

T-Time: A Fine-Grained Timing-Based Controlled-Channel Attack Against Intel TDX. 323-341 - Baiyang Li, Yujia Zhu, Yuedong Zhang, Qingyun Liu, Li Guo:

Unraveling DoH Traces: Padding-Resilient Website Fingerprinting via HTTP/2 Key Frame Sequences. 342-360 - Lin Ma

, Xingwei Lin
, Ziming Zhang, Yajin Zhou
:
NLSaber: Enhancing Netlink Family Fuzzing via Automated Syscall Description Generation. 361-381 - Eduard Marin, Jinwoo Kim, Alessio Pavoni, Mauro Conti, Roberto Di Pietro:

The Hidden Dangers of Public Serverless Repositories: An Empirical Security Assessment. 382-401 - Alireza Moghaddas Borhan, Hugo Kermabon-Bobinnec, Lingyu Wang, Yosr Jarraya, Suryadipta Majumdar:

CapMan: Detecting and Mitigating Linux Capability Abuses at Runtime to Secure Privileged Containers. 402-422 - Javier Parada

, Cristina Alcaraz
, Javier López
, Juan Caubet
, Rodrigo Román
:
Digital Twin for Adaptive Adversary Emulation in IIoT Control Networks. 423-442 - Ali Sadeghi Jahromi, AbdelRahman Abdou, Paul C. van Oorschot:

Formal Security Analysis of ss2DNS. 443-463 - Wenju Sun, Xi Xiao, Qiben Yan, Guangwu Hu, Qing Li, Chuan Chen:

High-Efficiency Fuzzing Technique Using Hooked I/O System Calls for Targeted Input Analysis. 464-483 - Utku Tefek, Ertem Esiner, Felix Kottmann, Deming Chen:

VeriFLo: Verifiable Provenance with Fault Localization for Inter-domain Routing. 484-504 - Antonino Vitale, Simone Aonzo

, Savino Dambra
, Nanda Rani
, Lorenzo Ippolito
, Platon Kotzias
, Juan Caballero
, Davide Balzarotti
:
The Polymorphism Maze: Understanding Diversities and Similarities in Malware Families. 505-525 - Jintong Yu, Yuxuan Wang, Shipei Qu

, Yubo Zhao, Yipeng Shi, Pei Cao, Xiangjun Lu, Chi Zhang, Dawu Gu, Cheng Hong:
End-to-End Non-profiled Side-Channel Analysis on Long Raw Traces. 526-544

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














