Search dblp for Publications

export results for "toc:db/conf/esorics/esorics2018-1.bht:"

 download as .bib file

@inproceedings{DBLP:conf/esorics/AlrabaeeS0DH18,
  author       = {Saed Alrabaee and
                  Paria Shirani and
                  Lingyu Wang and
                  Mourad Debbabi and
                  Aiman Hanna},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {On Leveraging Coding Habits for Effective Binary Authorship Attribution},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11098},
  pages        = {26--47},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99073-6\_2},
  doi          = {10.1007/978-3-319-99073-6\_2},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/AlrabaeeS0DH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AmbrosinC0SS18,
  author       = {Moreno Ambrosin and
                  Mauro Conti and
                  Ahmad Ibrahim and
                  Ahmad{-}Reza Sadeghi and
                  Matthias Schunter},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {SCIoT: {A} Secure and sCalable End-to-End Management Framework for
                  IoT Devices},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11098},
  pages        = {595--617},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99073-6\_29},
  doi          = {10.1007/978-3-319-99073-6\_29},
  timestamp    = {Thu, 13 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/AmbrosinC0SS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AndroulakiCCK18,
  author       = {Elli Androulaki and
                  Christian Cachin and
                  Angelo De Caro and
                  Eleftherios Kokoris{-}Kogias},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {Channels: Horizontal Scaling and Confidentiality on Permissioned Blockchains},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11098},
  pages        = {111--131},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99073-6\_6},
  doi          = {10.1007/978-3-319-99073-6\_6},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/AndroulakiCCK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BaeldeDH18,
  author       = {David Baelde and
                  St{\'{e}}phanie Delaune and
                  Lucca Hirschi},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {{POR} for Security Protocol Equivalences - Beyond Action-Determinism},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11098},
  pages        = {385--405},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99073-6\_19},
  doi          = {10.1007/978-3-319-99073-6\_19},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BaeldeDH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BalaganiCGGGLMM18,
  author       = {Kiran S. Balagani and
                  Mauro Conti and
                  Paolo Gasti and
                  Martin Georgiev and
                  Tristan Gurtler and
                  Daniele Lain and
                  Charissa Miller and
                  Kendall Molas and
                  Nikita Samarin and
                  Eugen Saraci and
                  Gene Tsudik and
                  Lynn Wu},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {{SILK-TV:} Secret Information Leakage from Keystroke Timing Videos},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11098},
  pages        = {263--280},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99073-6\_13},
  doi          = {10.1007/978-3-319-99073-6\_13},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BalaganiCGGGLMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BittonGSIOYYES18,
  author       = {Ron Bitton and
                  Tomer Gluck and
                  Orly Stan and
                  Masaki Inokuchi and
                  Yoshinobu Ohta and
                  Yoshiyuki Yamada and
                  Tomohiko Yagyu and
                  Yuval Elovici and
                  Asaf Shabtai},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {Deriving a Cost-Effective Digital Twin of an {ICS} to Facilitate Security
                  Evaluation},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11098},
  pages        = {533--554},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99073-6\_26},
  doi          = {10.1007/978-3-319-99073-6\_26},
  timestamp    = {Thu, 25 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BittonGSIOYYES18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BlassK18,
  author       = {Erik{-}Oliver Blass and
                  Florian Kerschbaum},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {Strain: {A} Secure Auction for Blockchains},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11098},
  pages        = {87--110},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99073-6\_5},
  doi          = {10.1007/978-3-319-99073-6\_5},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BlassK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/CortierDD18,
  author       = {V{\'{e}}ronique Cortier and
                  Antoine Dallon and
                  St{\'{e}}phanie Delaune},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {Efficiently Deciding Equivalence for Standard Primitives and Phases},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11098},
  pages        = {491--511},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99073-6\_24},
  doi          = {10.1007/978-3-319-99073-6\_24},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/CortierDD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/CuiJBOF18,
  author       = {Qian Cui and
                  Guy{-}Vincent Jourdan and
                  Gregor von Bochmann and
                  Iosif{-}Viorel Onut and
                  Jason Flood},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {Phishing Attacks Modifications and Evolutions},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11098},
  pages        = {243--262},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99073-6\_12},
  doi          = {10.1007/978-3-319-99073-6\_12},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/CuiJBOF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/GeGTXLY18,
  author       = {Jingquan Ge and
                  Neng Gao and
                  Chenyang Tu and
                  Ji Xiang and
                  Zeyi Liu and
                  Jun Yuan},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {Combination of Hardware and Software: An Efficient {AES} Implementation
                  Resistant to Side-Channel Attacks on All Programmable SoC},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11098},
  pages        = {197--217},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99073-6\_10},
  doi          = {10.1007/978-3-319-99073-6\_10},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/GeGTXLY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/HanCSTW18,
  author       = {Jinguang Han and
                  Liqun Chen and
                  Steve A. Schneider and
                  Helen Treharne and
                  Stephan Wesemeyer},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {Anonymous Single-Sign-On for n Designated Services with Traceability},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11098},
  pages        = {470--490},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99073-6\_23},
  doi          = {10.1007/978-3-319-99073-6\_23},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/HanCSTW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/HerrewegenG18,
  author       = {Jan Van den Herrewegen and
                  Flavio D. Garcia},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {Beneath the Bonnet: {A} Breakdown of Diagnostic Security},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11098},
  pages        = {305--324},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99073-6\_15},
  doi          = {10.1007/978-3-319-99073-6\_15},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/HerrewegenG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/HessMB18,
  author       = {Andreas V. Hess and
                  Sebastian Alexander M{\"{o}}dersheim and
                  Achim D. Brucker},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {Stateful Protocol Composition},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11098},
  pages        = {427--446},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99073-6\_21},
  doi          = {10.1007/978-3-319-99073-6\_21},
  timestamp    = {Tue, 07 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/HessMB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/JuutiSMA18,
  author       = {Mika Juuti and
                  Bo Sun and
                  Tatsuya Mori and
                  N. Asokan},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {Stay On-Topic: Generating Context-Specific Fake Restaurant Reviews},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11098},
  pages        = {132--151},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99073-6\_7},
  doi          = {10.1007/978-3-319-99073-6\_7},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/JuutiSMA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KarafiliC018,
  author       = {Erisa Karafili and
                  Matteo Cristani and
                  Luca Vigan{\`{o}}},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {A Formal Approach to Analyzing Cyber-Forensics Evidence},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11098},
  pages        = {281--301},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99073-6\_14},
  doi          = {10.1007/978-3-319-99073-6\_14},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/KarafiliC018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KeufferMC18,
  author       = {Julien Keuffer and
                  Refik Molva and
                  Herv{\'{e}} Chabanne},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {Efficient Proof Composition for Verifiable Computation},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11098},
  pages        = {152--171},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99073-6\_8},
  doi          = {10.1007/978-3-319-99073-6\_8},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/KeufferMC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KhakpourS18,
  author       = {Narges Khakpour and
                  Charilaos Skandylas},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {Synthesis of a Permissive Security Monitor},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11098},
  pages        = {48--65},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99073-6\_3},
  doi          = {10.1007/978-3-319-99073-6\_3},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/KhakpourS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KirschZB018,
  author       = {Julian Kirsch and
                  Zhechko Zhechev and
                  Bruno Bierbaumer and
                  Thomas Kittel},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {PwIN - Pwning Intel piN: Why {DBI} is Unsuitable for Security Applications},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11098},
  pages        = {363--382},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99073-6\_18},
  doi          = {10.1007/978-3-319-99073-6\_18},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/KirschZB018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KohlsP18,
  author       = {Katharina Kohls and
                  Christina P{\"{o}}pper},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {DigesTor: Comparing Passive Traffic Analysis Attacks on Tor},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11098},
  pages        = {512--530},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99073-6\_25},
  doi          = {10.1007/978-3-319-99073-6\_25},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/KohlsP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/LapidW18,
  author       = {Ben Lapid and
                  Avishai Wool},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {Navigating the Samsung TrustZone and Cache-Attacks on the Keymaster
                  Trustlet},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11098},
  pages        = {175--196},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99073-6\_9},
  doi          = {10.1007/978-3-319-99073-6\_9},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/LapidW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/LiaoCZY018,
  author       = {Yibin Liao and
                  Ruoyan Cai and
                  Guodong Zhu and
                  Yue Yin and
                  Kang Li},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {MobileFindr: Function Similarity Identification for Reversing Mobile
                  Binaries},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11098},
  pages        = {66--83},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99073-6\_4},
  doi          = {10.1007/978-3-319-99073-6\_4},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/LiaoCZY018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MantelSWW18,
  author       = {Heiko Mantel and
                  Johannes Schickel and
                  Alexandra Weber and
                  Friedrich Weber},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {How Secure Is Green IT? The Case of Software-Based Energy Side Channels},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11098},
  pages        = {218--239},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99073-6\_11},
  doi          = {10.1007/978-3-319-99073-6\_11},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/MantelSWW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MauwSTT18,
  author       = {Sjouke Mauw and
                  Zach Smith and
                  Jorge Toro{-}Pozo and
                  Rolando Trujillo{-}Rasua},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {Automated Identification of Desynchronisation Attacks on Shared Secrets},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11098},
  pages        = {406--426},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99073-6\_20},
  doi          = {10.1007/978-3-319-99073-6\_20},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/MauwSTT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MunteanWGE18,
  author       = {Paul Muntean and
                  Sebastian Wuerl and
                  Jens Grossklags and
                  Claudia Eckert},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {CastSan: Efficient Detection of Polymorphic {C++} Object Type Confusions
                  with {LLVM}},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11098},
  pages        = {3--25},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99073-6\_1},
  doi          = {10.1007/978-3-319-99073-6\_1},
  timestamp    = {Fri, 15 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/MunteanWGE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/RubioRAZ18,
  author       = {Juan E. Rubio and
                  Rodrigo Roman and
                  Cristina Alcaraz and
                  Yan Zhang},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {Tracking Advanced Persistent Threats in Critical Infrastructures Through
                  Opinion Dynamics},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11098},
  pages        = {555--574},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99073-6\_27},
  doi          = {10.1007/978-3-319-99073-6\_27},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/RubioRAZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/StergiopoulosTB18,
  author       = {George Stergiopoulos and
                  Alexander Talavari and
                  Evangelos Bitsikas and
                  Dimitris Gritzalis},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {Automatic Detection of Various Malicious Traffic Using Side Channel
                  Features on {TCP} Packets},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11098},
  pages        = {346--362},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99073-6\_17},
  doi          = {10.1007/978-3-319-99073-6\_17},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/StergiopoulosTB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/StoneCR18,
  author       = {Chris McMahon Stone and
                  Tom Chothia and
                  Joeri de Ruiter},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {Extending Automated Protocol State Learning for the 802.11 4-Way Handshake},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11098},
  pages        = {325--345},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99073-6\_16},
  doi          = {10.1007/978-3-319-99073-6\_16},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/StoneCR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/UrbanTHP18,
  author       = {Tobias Urban and
                  Dennis Tatang and
                  Thorsten Holz and
                  Norbert Pohlmann},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {Towards Understanding Privacy Implications of Adware and Potentially
                  Unwanted Programs},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11098},
  pages        = {449--469},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99073-6\_22},
  doi          = {10.1007/978-3-319-99073-6\_22},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/UrbanTHP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/YangSLL18,
  author       = {Lei Yang and
                  Chris Seasholtz and
                  Bo Luo and
                  Fengjun Li},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {Hide Your Hackable Smart Home from Remote Attacks: The Multipath Onion
                  IoT Gateways},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11098},
  pages        = {575--594},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99073-6\_28},
  doi          = {10.1007/978-3-319-99073-6\_28},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/YangSLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2018-1,
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11098},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99073-6},
  doi          = {10.1007/978-3-319-99073-6},
  isbn         = {978-3-319-99072-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2018-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics