Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/esorics/esorics2023-3.bht:"
@proceedings{DBLP:conf/esorics/2023-3, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14346}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-51479-1}, doi = {10.1007/978-3-031-51479-1}, isbn = {978-3-031-51478-4}, timestamp = {Thu, 18 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/2023-3.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ArnaboldiAKR23, author = {Luca Arnaboldi and David Aspinall and Christina Kolb and Sasa Radomirovic}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {Tactics for Account Access Graphs}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14346}, pages = {452--470}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-51479-1\_23}, doi = {10.1007/978-3-031-51479-1\_23}, timestamp = {Thu, 18 Jan 2024 08:27:16 +0100}, biburl = {https://dblp.org/rec/conf/esorics/ArnaboldiAKR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BhargavanBHKPSWW23, author = {Karthikeyan Bhargavan and Abhishek Bichhawat and Pedram Hosseyni and Ralf K{\"{u}}sters and Klaas Pruiksma and Guido Schmitz and Clara Waldmann and Tim W{\"{u}}rtele}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {Layered Symbolic Security Analysis in {\textdollar}{\textbackslash}textsf \{DY\}{\textbackslash}star {\textdollar}}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14346}, pages = {3--21}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-51479-1\_1}, doi = {10.1007/978-3-031-51479-1\_1}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/BhargavanBHKPSWW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ClaverieADL23, author = {Tristan Claverie and Gildas Avoine and St{\'{e}}phanie Delaune and Jos{\'{e}} Lopes{-}Esteves}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {Tamarin-Based Analysis of Bluetooth Uncovers Two Practical Pairing Confusion Attacks}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14346}, pages = {100--119}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-51479-1\_6}, doi = {10.1007/978-3-031-51479-1\_6}, timestamp = {Thu, 18 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/ClaverieADL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/CohenBSP23, author = {Ofir Cohen and Ron Bitton and Asaf Shabtai and Rami Puzis}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {ConGISATA: {A} Framework for Continuous Gamified Information Security Awareness Training and Assessment}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14346}, pages = {431--451}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-51479-1\_22}, doi = {10.1007/978-3-031-51479-1\_22}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/CohenBSP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/CohenS23, author = {Amit Cohen and Mahmood Sharif}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {Accessorize in the Dark: {A} Security Analysis of Near-Infrared Face Recognition}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14346}, pages = {43--61}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-51479-1\_3}, doi = {10.1007/978-3-031-51479-1\_3}, timestamp = {Thu, 18 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/CohenS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DraganDGHRS23, author = {Constantin Catalin Dragan and Fran{\c{c}}ois Dupressoir and Kristian Gj{\o}steen and Thomas Haines and Peter B. R{\o}nne and Morten Rotvold Solberg}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {Machine-Checked Proofs of Accountability: How to sElect Who is to Blame}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14346}, pages = {471--491}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-51479-1\_24}, doi = {10.1007/978-3-031-51479-1\_24}, timestamp = {Thu, 18 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/DraganDGHRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/GerlachTPS23, author = {Lukas Gerlach and Fabian Thomas and Robert Pietsch and Michael Schwarz}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {A Rowhammer Reproduction Study Using the Blacksmith Fuzzer}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14346}, pages = {62--79}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-51479-1\_4}, doi = {10.1007/978-3-031-51479-1\_4}, timestamp = {Thu, 18 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/GerlachTPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/HelmschmidtHKPWW23, author = {Florian Helmschmidt and Pedram Hosseyni and Ralf K{\"{u}}sters and Klaas Pruiksma and Clara Waldmann and Tim W{\"{u}}rtele}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {The Grant Negotiation and Authorization Protocol: Attacking, Fixing, and Verifying an Emerging Standard}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14346}, pages = {222--242}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-51479-1\_12}, doi = {10.1007/978-3-031-51479-1\_12}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/HelmschmidtHKPWW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Kario23, author = {Hubert Kario}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {Everlasting {ROBOT:} The Marvin Attack}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14346}, pages = {243--262}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-51479-1\_13}, doi = {10.1007/978-3-031-51479-1\_13}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/Kario23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KimHB23, author = {Sowoong Kim and Myeonggyun Han and Woongki Baek}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {{MARF:} {A} Memory-Aware CLFLUSH-Based Intra- and Inter-CPU Side-Channel Attack}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14346}, pages = {120--140}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-51479-1\_7}, doi = {10.1007/978-3-031-51479-1\_7}, timestamp = {Thu, 18 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/KimHB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KimKSKKO23, author = {Sungwook Kim and Sungju Kim and Yulim Shin and Sunmi Kim and Jihye Kim and Hyunok Oh}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {Efficient Transparent Polynomial Commitments for zk-SNARKs}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14346}, pages = {348--366}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-51479-1\_18}, doi = {10.1007/978-3-031-51479-1\_18}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/KimKSKKO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/LeeXSSAD23, author = {Jehyun Lee and Zhe Xin and Melanie Ng Pei See and Kanav Sabharwal and Giovanni Apruzzese and Dinil Mon Divakaran}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {Attacking Logo-Based Phishing Website Detectors with Adversarial Perturbations}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14346}, pages = {162--182}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-51479-1\_9}, doi = {10.1007/978-3-031-51479-1\_9}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/LeeXSSAD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/LiCPTZX23, author = {Lin Li and Chao Chen and Lei Pan and Yonghang Tai and Jun Zhang and Yang Xiang}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {Hiding Your Signals: {A} Security Analysis of PPG-Based Biometric Authentication}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14346}, pages = {183--202}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-51479-1\_10}, doi = {10.1007/978-3-031-51479-1\_10}, timestamp = {Fri, 01 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/LiCPTZX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/LiSXZHL23, author = {Shaoyu Li and Shanghao Shi and Yang Xiao and Chaoyu Zhang and Y. Thomas Hou and Wenjing Lou}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {Bijack: Breaking Bitcoin Network with {TCP} Vulnerabilities}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14346}, pages = {306--326}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-51479-1\_16}, doi = {10.1007/978-3-031-51479-1\_16}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/LiSXZHL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/LuZ23, author = {Zhichun Lu and Ren Zhang}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {When is Slower Block Propagation More Profitable for Large Miners?}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14346}, pages = {285--305}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-51479-1\_15}, doi = {10.1007/978-3-031-51479-1\_15}, timestamp = {Thu, 18 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/LuZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MitropoulosSIM23, author = {Charalambos Mitropoulos and Thodoris Sotiropoulos and Sotiris Ioannidis and Dimitris Mitropoulos}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {Syntax-Aware Mutation for Testing the Solidity Compiler}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14346}, pages = {327--347}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-51479-1\_17}, doi = {10.1007/978-3-031-51479-1\_17}, timestamp = {Thu, 18 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/MitropoulosSIM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/RabaninejadAMMN23, author = {Reyhaneh Rabaninejad and Behzad Abdolmaleki and Giulio Malavolta and Antonis Michalas and Amir Nabizadeh}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {stoRNA: Stateless Transparent Proofs of Storage-time}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14346}, pages = {389--410}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-51479-1\_20}, doi = {10.1007/978-3-031-51479-1\_20}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/RabaninejadAMMN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/RaoSXZWJ23, author = {Tingting Rao and Yixin Su and Peng Xu and Yubo Zheng and Wei Wang and Hai Jin}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {You Reset {I} Attack! {A} Master Password Guessing Attack Against Honey Password Vaults}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14346}, pages = {141--161}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-51479-1\_8}, doi = {10.1007/978-3-031-51479-1\_8}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/RaoSXZWJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/SongLCPW23, author = {Shang Song and Lin Liu and Rongmao Chen and Wei Peng and Yi Wang}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {Secure Approximate Nearest Neighbor Search with Locality-Sensitive Hashing}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14346}, pages = {411--430}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-51479-1\_21}, doi = {10.1007/978-3-031-51479-1\_21}, timestamp = {Sun, 21 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/SongLCPW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/UchoaAVOA23, author = {Heitor Uchoa and Vipul Arora and Dennis Vermoen and Marco Ottavi and Nikolaos Alachiotis}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {Exploring Genomic Sequence Alignment for Improving Side-Channel Analysis}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14346}, pages = {203--221}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-51479-1\_11}, doi = {10.1007/978-3-031-51479-1\_11}, timestamp = {Tue, 23 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/UchoaAVOA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/WangLLDX23, author = {Jianhuan Wang and Jichen Li and Zecheng Li and Xiaotie Deng and Bin Xiao}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {n-MVTL Attack: Optimal Transaction Reordering Attack on DeFi}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14346}, pages = {367--386}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-51479-1\_19}, doi = {10.1007/978-3-031-51479-1\_19}, timestamp = {Thu, 18 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/WangLLDX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/WeberTGZS23, author = {Daniel Weber and Fabian Thomas and Lukas Gerlach and Ruiyi Zhang and Michael Schwarz}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {Indirect Meltdown: Building Novel Side-Channel Attacks from Transient-Execution Attacks}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14346}, pages = {22--42}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-51479-1\_2}, doi = {10.1007/978-3-031-51479-1\_2}, timestamp = {Thu, 18 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/WeberTGZS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/WeberTGZS23a, author = {Daniel Weber and Fabian Thomas and Lukas Gerlach and Ruiyi Zhang and Michael Schwarz}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {Reviving Meltdown 3a}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14346}, pages = {80--99}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-51479-1\_5}, doi = {10.1007/978-3-031-51479-1\_5}, timestamp = {Thu, 18 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/WeberTGZS23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/XuJLZMLGS23, author = {Bowen Xu and Shijie Jia and Jingqiang Lin and Fangyu Zheng and Yuan Ma and Limin Liu and Xiaozhuo Gu and Li Song}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {JWTKey: Automatic Cryptographic Vulnerability Detection in {JWT} Applications}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14346}, pages = {263--282}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-51479-1\_14}, doi = {10.1007/978-3-031-51479-1\_14}, timestamp = {Thu, 18 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/XuJLZMLGS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.