Computer Security -- ESORICS 2015: 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II

Front Cover
GŁnther Pernul, Peter Y A Ryan, Edgar Weippl
Springer, Oct 9, 2015 - Computers - 665 pages

The two-volume set, LNCS 9326 and LNCS 9327 constitutes the refereed proceedings of the 20th European Symposium on Research in Computer Security, ESORICS 2015, held in Vienna, Austria, in September 2015.

The 59 revised full papers presented were carefully reviewed and selected from 298 submissions. The papers address issues such as networks and Web security; system security; crypto application and attacks; risk analysis; privacy; cloud security; protocols and attribute-based encryption; code analysis and side-channels; detection and monitoring; authentication; policies; and applied security.

 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Usable Web Privacy by Controlling Browser Fingerprinting
3
Privacy Attacks Exploiting CrossApp KeyEvent Injections
20
Enabling PrivacyAssured Similarity Retrieval over Millions of Encrypted Records
40
PrivacyPreserving Link Prediction in Decentralized Online Social Networks
61
PrivacyPreserving Observation in Public Spaces
81
Analysis and New Solutions
101
Cloud Security
120
Beyond Exact Matches
121
Detection and Monitoring
352
Accurate Specification for Robust Detection of Malicious Behavior in Mobile Environments
353
A Bytecode Interpreter for Secure Program Execution in Untrusted Main Memory
376
User Anomaly Detection Using Anomalous Samples from Other Users
396
Authentication
415
Towards AttackResistant PeerAssisted Indoor Localization
417
Leveraging RealLife Facts to Make Random Passwords More Memorable
438
Policies
478

Achieving Revocable FineGrained Encryption of Cloud Data
146
Batch Verifiable Computation of Polynomials on Outsourced Data
167
Practical PrivacyPreserving Outsourcing of Biometric Identification in the Cloud
186
Protocols and Attributebased Encryption
206
A Generalization to the Geometric Fragment
207
How to Get Rid of Nonces?
230
Attribute Based Broadcast Encryption with Short Ciphertext and Decryption Key
252
Accountable Authority CiphertextPolicy AttributeBased Encryption with WhiteBox Traceability and Public Auditing in the Cloud
270
Code Analysis and SideChannels
290
Toward Extracting Hidden Code from Packed Android Applications
291
Identifying Arbitrary Memory Access Vulnerabilities in PrivilegeSeparated Software
312
Proactively Establishing Secure Channels Between Wireless Devices Without Prior Knowledge
332
A Theory of Gray Security Policies
481
Factorization of Behavioral Integrity
500
Checking InteractionBased Declassification Policies for Android Using Symbolic Execution
520
Applied Security
539
Enhancing Java Runtime Environment for Smart Cards Against Runtime Attacks
540
Making Bitcoin Exchanges Transparent
561
Characterization and Detection
577
Stealing Voices to Fool Humans and Machines
599
A ForwardSecure AppendOnly Persistent Authenticated Data Structure
622
On the Fly Design and Cosimulation of Responses Against Simultaneous Attacks
642
Author Index
662
Copyright

Other editions - View all

Common terms and phrases

Bibliographic information