中国机械工程学会生产工程分会知识服务平台

会议文集


文集名Computer Security - ESORICS 2022
会议名27th European Symposium on Research in Computer Security (ESORICS 2022)
中译名《第二十七届欧洲计算机安全研究专题研讨会,卷3》
机构Technical University of Denmark
会议日期September 26-30, 2022
会议地点Copenhagen, Denmark
出版年2022
馆藏号345150


题名作者出版年
A Formal Analysis of the FIDO2 ProtocolsJingjing Guan; Hui Li; Haisong Ye; Ziming Zhao2022
A Composable Security Treatment of ECVRF and Batch VerificationsChristian Badertscher; Peter Gazi; Inigo Querejeta-Azurmendi; Alexander Russell2022
Efficient Proofs of Knowledge for Threshold RelationsGennaro Avitabile; Vincenzo Botta; Daniele Friolo; Ivan Visconti2022
A Tale of Two Models: Formal Verification of KEMTLS via TamarinSofia Celi; Jonathan Hoyland; Douglas Stebila; Thom Wiggers2022
Browser-Based CPU FingerprintingLeon Trampert; Christian Rossow; Michael Schwarz2022
Polymorphic Protocols at the Example of Mitigating Web BotsAugust See; Leon Fritz; Mathias Fischer2022
Unlinkable Delegation of WebAuthn CredentialsNick Frymann; Daniel Gardham; Mark Manulis2022
Large Scale Analysis of DoH Deployment on the InternetSebastian Garcia; Joaquin Bogado; Karel Hynek; Dmitrii Vekshin; Tomas Cejka; Armin Wasicek2022
Equivocal URLs: Understanding the Fragmented Space of URL Parser ImplementationsJoshua Reynolds; Adam Bates; Michael Bailey2022
Exploring the Characteristics and Security Risks of Emerging Emoji Domain NamesMingxuan Liu; Yiming Zhang; Baojun Liu; Haixin Duan2022
CPU Port Contention Without SMTThomas Rokicki; Clementine Maurice; Michael Schwarz2022
Protocols for a Two-Tiered Trusted Computing BaseJose Moreira; Mark D. Ryan; Flavio D. Garcia2022
Using Memristor Arrays as Physical Unclonable FunctionsFlorian Frank; Tolga Arul; Nikolaos Athanasios Anagnostopoulos; Stefan Katzenbeisser2022
SecureBiNN: 3-Party Secure Computation for Binarized Neural Network InferenceWenxing Zhu; Mengqi Wei; Xiangxue Li; Qiang Li2022
Mixed-Technique Multi-Party Computations Composed of Two-Party ComputationsErik-Oliver Blass; Florian Kerschbaum2022
PEA: Practical Private Epistasis Analysis Using MPCKay Hamacher; Tobias Kussel; Thomas Schneider; Oleksandr Tkachenko2022
Hide and Seek: On the Stealthiness of Attacks Against Deep Learning SystemsZeyan Liu; Fengjun Li; Jingqiang Lin; Zhu Li; Bo Luo2022
Precise Extraction of Deep Learning Models via Side-Channel Attacks on Edge/Endpoint DevicesYounghan Lee; Sohee Jun; Yungi Cho; Woorim Han; Hyungon Moon; Yunheung Paek2022
Real-Time Adversarial Perturbations Against Deep Reinforcement Learning Policies: Attacks and DefensesBuse G. A. Tekgul; Shelly Wang; Samuel Marchal; N. Asokan2022
FLMJR: Improving Robustness of Federated Learning via Model StabilityQi Guo; Di Wu; Yong Qi; Saiyu Qi; Qian Li2022
123