Search dblp for Publications

export results for "toc:db/conf/esorics/esorics2023-3.bht:"

 download as .bib file

@proceedings{DBLP:conf/esorics/2023-3,
  editor       = {Gene Tsudik and
                  Mauro Conti and
                  Kaitai Liang and
                  Georgios Smaragdakis},
  title        = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14346},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-51479-1},
  doi          = {10.1007/978-3-031-51479-1},
  isbn         = {978-3-031-51478-4},
  timestamp    = {Thu, 18 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/2023-3.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ArnaboldiAKR23,
  author       = {Luca Arnaboldi and
                  David Aspinall and
                  Christina Kolb and
                  Sasa Radomirovic},
  editor       = {Gene Tsudik and
                  Mauro Conti and
                  Kaitai Liang and
                  Georgios Smaragdakis},
  title        = {Tactics for Account Access Graphs},
  booktitle    = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14346},
  pages        = {452--470},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-51479-1\_23},
  doi          = {10.1007/978-3-031-51479-1\_23},
  timestamp    = {Thu, 18 Jan 2024 08:27:16 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/ArnaboldiAKR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BhargavanBHKPSWW23,
  author       = {Karthikeyan Bhargavan and
                  Abhishek Bichhawat and
                  Pedram Hosseyni and
                  Ralf K{\"{u}}sters and
                  Klaas Pruiksma and
                  Guido Schmitz and
                  Clara Waldmann and
                  Tim W{\"{u}}rtele},
  editor       = {Gene Tsudik and
                  Mauro Conti and
                  Kaitai Liang and
                  Georgios Smaragdakis},
  title        = {Layered Symbolic Security Analysis in {\textdollar}{\textbackslash}textsf
                  \{DY\}{\textbackslash}star {\textdollar}},
  booktitle    = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14346},
  pages        = {3--21},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-51479-1\_1},
  doi          = {10.1007/978-3-031-51479-1\_1},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/BhargavanBHKPSWW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ClaverieADL23,
  author       = {Tristan Claverie and
                  Gildas Avoine and
                  St{\'{e}}phanie Delaune and
                  Jos{\'{e}} Lopes{-}Esteves},
  editor       = {Gene Tsudik and
                  Mauro Conti and
                  Kaitai Liang and
                  Georgios Smaragdakis},
  title        = {Tamarin-Based Analysis of Bluetooth Uncovers Two Practical Pairing
                  Confusion Attacks},
  booktitle    = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14346},
  pages        = {100--119},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-51479-1\_6},
  doi          = {10.1007/978-3-031-51479-1\_6},
  timestamp    = {Thu, 18 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/ClaverieADL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/CohenBSP23,
  author       = {Ofir Cohen and
                  Ron Bitton and
                  Asaf Shabtai and
                  Rami Puzis},
  editor       = {Gene Tsudik and
                  Mauro Conti and
                  Kaitai Liang and
                  Georgios Smaragdakis},
  title        = {ConGISATA: {A} Framework for Continuous Gamified Information Security
                  Awareness Training and Assessment},
  booktitle    = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14346},
  pages        = {431--451},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-51479-1\_22},
  doi          = {10.1007/978-3-031-51479-1\_22},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/CohenBSP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/CohenS23,
  author       = {Amit Cohen and
                  Mahmood Sharif},
  editor       = {Gene Tsudik and
                  Mauro Conti and
                  Kaitai Liang and
                  Georgios Smaragdakis},
  title        = {Accessorize in the Dark: {A} Security Analysis of Near-Infrared Face
                  Recognition},
  booktitle    = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14346},
  pages        = {43--61},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-51479-1\_3},
  doi          = {10.1007/978-3-031-51479-1\_3},
  timestamp    = {Thu, 18 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/CohenS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/DraganDGHRS23,
  author       = {Constantin Catalin Dragan and
                  Fran{\c{c}}ois Dupressoir and
                  Kristian Gj{\o}steen and
                  Thomas Haines and
                  Peter B. R{\o}nne and
                  Morten Rotvold Solberg},
  editor       = {Gene Tsudik and
                  Mauro Conti and
                  Kaitai Liang and
                  Georgios Smaragdakis},
  title        = {Machine-Checked Proofs of Accountability: How to sElect Who is to
                  Blame},
  booktitle    = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14346},
  pages        = {471--491},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-51479-1\_24},
  doi          = {10.1007/978-3-031-51479-1\_24},
  timestamp    = {Thu, 18 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/DraganDGHRS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/GerlachTPS23,
  author       = {Lukas Gerlach and
                  Fabian Thomas and
                  Robert Pietsch and
                  Michael Schwarz},
  editor       = {Gene Tsudik and
                  Mauro Conti and
                  Kaitai Liang and
                  Georgios Smaragdakis},
  title        = {A Rowhammer Reproduction Study Using the Blacksmith Fuzzer},
  booktitle    = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14346},
  pages        = {62--79},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-51479-1\_4},
  doi          = {10.1007/978-3-031-51479-1\_4},
  timestamp    = {Thu, 18 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/GerlachTPS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/HelmschmidtHKPWW23,
  author       = {Florian Helmschmidt and
                  Pedram Hosseyni and
                  Ralf K{\"{u}}sters and
                  Klaas Pruiksma and
                  Clara Waldmann and
                  Tim W{\"{u}}rtele},
  editor       = {Gene Tsudik and
                  Mauro Conti and
                  Kaitai Liang and
                  Georgios Smaragdakis},
  title        = {The Grant Negotiation and Authorization Protocol: Attacking, Fixing,
                  and Verifying an Emerging Standard},
  booktitle    = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14346},
  pages        = {222--242},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-51479-1\_12},
  doi          = {10.1007/978-3-031-51479-1\_12},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/HelmschmidtHKPWW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Kario23,
  author       = {Hubert Kario},
  editor       = {Gene Tsudik and
                  Mauro Conti and
                  Kaitai Liang and
                  Georgios Smaragdakis},
  title        = {Everlasting {ROBOT:} The Marvin Attack},
  booktitle    = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14346},
  pages        = {243--262},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-51479-1\_13},
  doi          = {10.1007/978-3-031-51479-1\_13},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/Kario23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KimHB23,
  author       = {Sowoong Kim and
                  Myeonggyun Han and
                  Woongki Baek},
  editor       = {Gene Tsudik and
                  Mauro Conti and
                  Kaitai Liang and
                  Georgios Smaragdakis},
  title        = {{MARF:} {A} Memory-Aware CLFLUSH-Based Intra- and Inter-CPU Side-Channel
                  Attack},
  booktitle    = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14346},
  pages        = {120--140},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-51479-1\_7},
  doi          = {10.1007/978-3-031-51479-1\_7},
  timestamp    = {Thu, 18 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/KimHB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KimKSKKO23,
  author       = {Sungwook Kim and
                  Sungju Kim and
                  Yulim Shin and
                  Sunmi Kim and
                  Jihye Kim and
                  Hyunok Oh},
  editor       = {Gene Tsudik and
                  Mauro Conti and
                  Kaitai Liang and
                  Georgios Smaragdakis},
  title        = {Efficient Transparent Polynomial Commitments for zk-SNARKs},
  booktitle    = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14346},
  pages        = {348--366},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-51479-1\_18},
  doi          = {10.1007/978-3-031-51479-1\_18},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/KimKSKKO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/LeeXSSAD23,
  author       = {Jehyun Lee and
                  Zhe Xin and
                  Melanie Ng Pei See and
                  Kanav Sabharwal and
                  Giovanni Apruzzese and
                  Dinil Mon Divakaran},
  editor       = {Gene Tsudik and
                  Mauro Conti and
                  Kaitai Liang and
                  Georgios Smaragdakis},
  title        = {Attacking Logo-Based Phishing Website Detectors with Adversarial Perturbations},
  booktitle    = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14346},
  pages        = {162--182},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-51479-1\_9},
  doi          = {10.1007/978-3-031-51479-1\_9},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/LeeXSSAD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/LiCPTZX23,
  author       = {Lin Li and
                  Chao Chen and
                  Lei Pan and
                  Yonghang Tai and
                  Jun Zhang and
                  Yang Xiang},
  editor       = {Gene Tsudik and
                  Mauro Conti and
                  Kaitai Liang and
                  Georgios Smaragdakis},
  title        = {Hiding Your Signals: {A} Security Analysis of PPG-Based Biometric
                  Authentication},
  booktitle    = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14346},
  pages        = {183--202},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-51479-1\_10},
  doi          = {10.1007/978-3-031-51479-1\_10},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/LiCPTZX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/LiSXZHL23,
  author       = {Shaoyu Li and
                  Shanghao Shi and
                  Yang Xiao and
                  Chaoyu Zhang and
                  Y. Thomas Hou and
                  Wenjing Lou},
  editor       = {Gene Tsudik and
                  Mauro Conti and
                  Kaitai Liang and
                  Georgios Smaragdakis},
  title        = {Bijack: Breaking Bitcoin Network with {TCP} Vulnerabilities},
  booktitle    = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14346},
  pages        = {306--326},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-51479-1\_16},
  doi          = {10.1007/978-3-031-51479-1\_16},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/LiSXZHL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/LuZ23,
  author       = {Zhichun Lu and
                  Ren Zhang},
  editor       = {Gene Tsudik and
                  Mauro Conti and
                  Kaitai Liang and
                  Georgios Smaragdakis},
  title        = {When is Slower Block Propagation More Profitable for Large Miners?},
  booktitle    = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14346},
  pages        = {285--305},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-51479-1\_15},
  doi          = {10.1007/978-3-031-51479-1\_15},
  timestamp    = {Thu, 18 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/LuZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MitropoulosSIM23,
  author       = {Charalambos Mitropoulos and
                  Thodoris Sotiropoulos and
                  Sotiris Ioannidis and
                  Dimitris Mitropoulos},
  editor       = {Gene Tsudik and
                  Mauro Conti and
                  Kaitai Liang and
                  Georgios Smaragdakis},
  title        = {Syntax-Aware Mutation for Testing the Solidity Compiler},
  booktitle    = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14346},
  pages        = {327--347},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-51479-1\_17},
  doi          = {10.1007/978-3-031-51479-1\_17},
  timestamp    = {Thu, 18 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/MitropoulosSIM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/RabaninejadAMMN23,
  author       = {Reyhaneh Rabaninejad and
                  Behzad Abdolmaleki and
                  Giulio Malavolta and
                  Antonis Michalas and
                  Amir Nabizadeh},
  editor       = {Gene Tsudik and
                  Mauro Conti and
                  Kaitai Liang and
                  Georgios Smaragdakis},
  title        = {stoRNA: Stateless Transparent Proofs of Storage-time},
  booktitle    = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14346},
  pages        = {389--410},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-51479-1\_20},
  doi          = {10.1007/978-3-031-51479-1\_20},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/RabaninejadAMMN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/RaoSXZWJ23,
  author       = {Tingting Rao and
                  Yixin Su and
                  Peng Xu and
                  Yubo Zheng and
                  Wei Wang and
                  Hai Jin},
  editor       = {Gene Tsudik and
                  Mauro Conti and
                  Kaitai Liang and
                  Georgios Smaragdakis},
  title        = {You Reset {I} Attack! {A} Master Password Guessing Attack Against
                  Honey Password Vaults},
  booktitle    = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14346},
  pages        = {141--161},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-51479-1\_8},
  doi          = {10.1007/978-3-031-51479-1\_8},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/RaoSXZWJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/SongLCPW23,
  author       = {Shang Song and
                  Lin Liu and
                  Rongmao Chen and
                  Wei Peng and
                  Yi Wang},
  editor       = {Gene Tsudik and
                  Mauro Conti and
                  Kaitai Liang and
                  Georgios Smaragdakis},
  title        = {Secure Approximate Nearest Neighbor Search with Locality-Sensitive
                  Hashing},
  booktitle    = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14346},
  pages        = {411--430},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-51479-1\_21},
  doi          = {10.1007/978-3-031-51479-1\_21},
  timestamp    = {Sun, 21 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/SongLCPW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/UchoaAVOA23,
  author       = {Heitor Uchoa and
                  Vipul Arora and
                  Dennis Vermoen and
                  Marco Ottavi and
                  Nikolaos Alachiotis},
  editor       = {Gene Tsudik and
                  Mauro Conti and
                  Kaitai Liang and
                  Georgios Smaragdakis},
  title        = {Exploring Genomic Sequence Alignment for Improving Side-Channel Analysis},
  booktitle    = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14346},
  pages        = {203--221},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-51479-1\_11},
  doi          = {10.1007/978-3-031-51479-1\_11},
  timestamp    = {Tue, 23 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/UchoaAVOA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/WangLLDX23,
  author       = {Jianhuan Wang and
                  Jichen Li and
                  Zecheng Li and
                  Xiaotie Deng and
                  Bin Xiao},
  editor       = {Gene Tsudik and
                  Mauro Conti and
                  Kaitai Liang and
                  Georgios Smaragdakis},
  title        = {n-MVTL Attack: Optimal Transaction Reordering Attack on DeFi},
  booktitle    = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14346},
  pages        = {367--386},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-51479-1\_19},
  doi          = {10.1007/978-3-031-51479-1\_19},
  timestamp    = {Thu, 18 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/WangLLDX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/WeberTGZS23,
  author       = {Daniel Weber and
                  Fabian Thomas and
                  Lukas Gerlach and
                  Ruiyi Zhang and
                  Michael Schwarz},
  editor       = {Gene Tsudik and
                  Mauro Conti and
                  Kaitai Liang and
                  Georgios Smaragdakis},
  title        = {Indirect Meltdown: Building Novel Side-Channel Attacks from Transient-Execution
                  Attacks},
  booktitle    = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14346},
  pages        = {22--42},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-51479-1\_2},
  doi          = {10.1007/978-3-031-51479-1\_2},
  timestamp    = {Thu, 18 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/WeberTGZS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/WeberTGZS23a,
  author       = {Daniel Weber and
                  Fabian Thomas and
                  Lukas Gerlach and
                  Ruiyi Zhang and
                  Michael Schwarz},
  editor       = {Gene Tsudik and
                  Mauro Conti and
                  Kaitai Liang and
                  Georgios Smaragdakis},
  title        = {Reviving Meltdown 3a},
  booktitle    = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14346},
  pages        = {80--99},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-51479-1\_5},
  doi          = {10.1007/978-3-031-51479-1\_5},
  timestamp    = {Thu, 18 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/WeberTGZS23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/XuJLZMLGS23,
  author       = {Bowen Xu and
                  Shijie Jia and
                  Jingqiang Lin and
                  Fangyu Zheng and
                  Yuan Ma and
                  Limin Liu and
                  Xiaozhuo Gu and
                  Li Song},
  editor       = {Gene Tsudik and
                  Mauro Conti and
                  Kaitai Liang and
                  Georgios Smaragdakis},
  title        = {JWTKey: Automatic Cryptographic Vulnerability Detection in {JWT} Applications},
  booktitle    = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14346},
  pages        = {263--282},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-51479-1\_14},
  doi          = {10.1007/978-3-031-51479-1\_14},
  timestamp    = {Thu, 18 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/XuJLZMLGS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics