


default search action
EuroS&P 2018: London, UK
- 2018 IEEE European Symposium on Security and Privacy, EuroS&P 2018, London, United Kingdom, April 24-26, 2018. IEEE 2018, ISBN 978-1-5386-4228-3

Language-Based Security and Access Control
- Laurent Simon, David Chisnall

, Ross J. Anderson:
What You Get is What You C: Controlling Side Effects in Mainstream C Compilers. 1-15 - Toby C. Murray, Robert Sison

, Kai Engelhardt:
COVERN: A Logic for Compositional Verification of Information Flow Control. 16-30 - Carlos Cotrini, Thilo Weghorn, David A. Basin:

Mining ABAC Rules from Sparse Logs. 31-46
Security and Privacy Analysis
- Anupama Aggarwal, Bimal Viswanath, Liang Zhang, Saravana Kumar, Ayush Shah, Ponnurangam Kumaraguru:

I Spy with My Little Eye: Analysis and Detection of Spying Browser Extensions. 47-61 - Pascal Berrang, Mathias Humbert, Yang Zhang

, Irina Lehmann, Roland Eils
, Michael Backes:
Dissecting Privacy Risks in Biomedical Data. 62-76 - Patrick Speicher, Marcel Steinmetz

, Robert Künnemann, Milivoj Simeonovski, Giancarlo Pellegrino, Jörg Hoffmann, Michael Backes:
Formally Reasoning about the Cost and Efficacy of Securing the Email Infrastructure. 77-91
Network and Communication Security
- Chiara Bodei, Pierpaolo Degano, Letterio Galletta

, Riccardo Focardi
, Mauro Tempesta, Lorenzo Veronese:
Language-Independent Synthesis of Firewall Policies. 92-106 - Martin Strohmeier

, Matthew Smith, Vincent Lenders
, Ivan Martinovic:
The Real First Class? Inferring Confidential Corporate Mergers and Government Relations from Air Traffic Communication. 107-121 - Teemu Rytilahti, Dennis Tatang, Janosch Kopper, Thorsten Holz

:
Masters of Time: An Overview of the NTP Ecosystem. 122-136 - Chen Chen, Daniele Enrico Asoni, Adrian Perrig, David Barrera, George Danezis, Carmela Troncoso:

TARANET: Traffic-Analysis Resistant Anonymity at the Network Layer. 137-152
System Security
- Kaan Onarlioglu, William K. Robertson, Engin Kirda:

Eraser: Your Data Won't Be Back. 153-166 - Micah Morton, Jan Werner, Panagiotis Kintis, Kevin Z. Snow, Manos Antonakakis, Michalis Polychronakis, Fabian Monrose:

Security Risks in Asynchronous Web Servers: When Performance Optimizations Amplify the Impact of Data-Oriented Attacks. 167-182 - Amit Vasudevan, Sagar Chaki:

Have Your PI and Eat it Too: Practical Security on a Low-Cost Ubiquitous Computing Platform. 183-198 - Christian Vaas, Mika Juuti, N. Asokan

, Ivan Martinovic:
Get in Line: Ongoing Co-presence Verification of a Vehicle Formation Based on Driving Trajectories. 199-213
Software Security
- Mario Werner, Thomas Unterluggauer, David Schaffenrath, Stefan Mangard:

Sponge-Based Control-Flow Protection for IoT Devices. 214-226 - Enes Göktas, Benjamin Kollenda, Philipp Koppe, Erik Bosman, Georgios Portokalidis

, Thorsten Holz
, Herbert Bos
, Cristiano Giuffrida
:
Position-Independent Code Reuse: On the Effectiveness of ASLR in the Absence of Information Disclosure. 227-242 - Jon Stephens

, Babak Yadegari, Christian S. Collberg, Saumya Debray, Carlos Scheidegger:
Probabilistic Obfuscation Through Covert Channels. 243-257
Applied Cryptography 1
- Wei Bai, Ciara Lynton, Charalampos Papamanthou, Michelle L. Mazurek:

Understanding User Tradeoffs for Search in Encrypted Communication. 258-272 - David Derler

, Sebastian Ramacher
, Daniel Slamanig
:
Short Double- and N-Times-Authentication-Preventing Signatures from ECDSA and More. 273-287 - Charles V. Wright, Mayank Varia:

Crypto Crumple Zones: Enabling Limited Access without Mass Surveillance. 288-306
Session Side Channels and Fault Attacks
- Lucas Bang, Nicolás Rosner, Tevfik Bultan:

Online Synthesis of Adaptive Side-Channel Attacks Based On Noisy Observations. 307-322 - Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama, Keito Sasaoka, Takeshi Yagi, Tatsuya Mori

:
User Blocking Considered Harmful? An Attacker-Controllable Side Channel to Identify Social Accounts. 323-337 - Damian Poddebniak, Juraj Somorovsky, Sebastian Schinzel, Manfred Lochter, Paul Rösler

:
Attacking Deterministic Signature Schemes Using Fault Attacks. 338-352
Applied Cryptography 2
- Joppe W. Bos, Léo Ducas, Eike Kiltz

, Tancrède Lepoint, Vadim Lyubashevsky
, John M. Schanck, Peter Schwabe, Gregor Seiler, Damien Stehlé
:
CRYSTALS - Kyber: A CCA-Secure Module-Lattice-Based KEM. 353-367 - Benjamin Harsha, Jeremiah Blocki

:
Just In Time Hashing. 368-383 - Luke Valenta, Nick Sullivan, Antonio Sanso, Nadia Heninger:

In Search of CurveSwap: Measuring Elliptic Curve Implementations in the Wild. 384-398
Systematization of Knowledge
- Nicolas Papernot, Patrick D. McDaniel, Arunesh Sinha

, Michael P. Wellman
:
SoK: Security and Privacy in Machine Learning. 399-414
Protocol Security
- Paul Rösler

, Christian Mainka
, Jörg Schwenk:
More is Less: On the End-to-End Security of Group Chats in Signal, WhatsApp, and Threema. 415-429 - Véronique Cortier, David Galindo

, Mathieu Turuani:
A Formal Analysis of the Neuchatel e-Voting Protocol. 430-442 - Marjan Skrobot

, Jean Lancrenon:
On Composability of Game-Based Password Authenticated Key Exchange. 443-457
Security and Learning
- Ziyun Zhu, Tudor Dumitras:

ChainSmith: Automatically Learning the Semantics of Malicious Campaigns by Mining Threat Intelligence Reports. 458-472 - Ke Xu, Yingjiu Li, Robert H. Deng

, Kai Chen:
DeepRefiner: Multi-layer Android Malware Detection System Applying Deep Neural Networks. 473-487 - Erwin Quiring

, Daniel Arp, Konrad Rieck:
Forgotten Siblings: Unifying Attacks on Machine Learning and Digital Watermarking. 488-502

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














