中国机械工程学会生产工程分会知识服务平台

会议文集


文集名Computer Security - ESORICS 2025
会议名30th European Symposium on Research in Computer Security (ESORICS 2025)
中译名《第三十届欧洲计算机安全研究专题研讨会,卷3》
会议日期September 22-24, 2025
会议地点Toulouse, France
出版年2026
馆藏号359413


题名作者出版年
QUIC-Fuzz: An Effective Greybox Fuzzer For The QUIC ProtocolKian Kai Ang; Damith C. Ranasinghe2026
Systematic Assessment of Cache Timing Vulnerabilities on RISC-V ProcessorsCedrick Austa; Jan Tobias Muhlberg; Jean-Michel Dricot2026
No Root, No Problem: Automating Linux Least Privilege and Securing Ansible DeploymentsEddie Billoir; Romain Laborde; Daniele Canavese; Yves Rutschle; Ahmad Samer Wazan; Abdelmalek Benzekri2026
NICraft: Malicious NIC Firmware-Based Cache Side-Channel AttackAmit Choudhari; Shorya Kumar; Christian Rossow2026
Identifying Potential Timing Leakages from Hardware Design with Precondition SynthesisMinu Chung; Hyungon Moon2026
LibAFLstar: Fast and State-Aware Protocol FuzzingCristian Daniele; Timme Bethe; Marcello Maugeri; Andrea Continella; Erik Poll2026
PUSH for Security: A PUF-Based Protocol to Prevent Session HijackingEmiliia Geloczi; Nico Mexis; Stefan Katzenbeisser2026
Hardening HSM Clusters: Resolving Key Sync Vulnerabilities for Robust CU IsolationSarat Chandra Prasad Gingupalli2026
AcouListener: An Inaudible Acoustic Side-Channel Attack on AR/VR SystemsFengliang He; Hong-Ning Dai; Hanyang Guo; Xiapu Luo; Jiadi Yu2026
Verifying DRAM Addressing in SoftwareMartin Heckel; Florian Adamsky; Jonas Juffinger; Fabian Rauscher; Daniel Gruss2026
Epistemology of Rowhammer Attacks: Threats to Rowhammer Research ValidityMartin Heckel; Hannes Weissteiner; Florian Adamsky; Daniel Gruss2026
Personalized Password Guessing via Modeling Multiple Leaked Credentials of the Same UserFugeng Huang; Jiahong Yang; Haibo Cheng; Wanting Li; Ping Wang2026
WelkIR: Flow-Sensitive Pre-trained Embeddings from Compiler IR for Vulnerability DetectionHao Huang; Xiuwei Shang; Junqi Zhang; Shaoyin Cheng; Weiming Zhang; Nenghai Yu2026
Edge Coverage Feedback of Embedded Systems Fuzzing Based on Debugging InterfacesWeihua Jiao; Qingbao Li; Xilong Li; Zhifeng Chen; Weiping Yao; Guimin Zhang; Fei Cao2026
Cache Demote for Fast Eviction Set Construction and Page Table Attribute LeakageTaehun Kim; Hyerean Jang; Youngjoo Shin2026
WaitWatcher and WaitGuard: Detecting Flush-Based Cache Side-Channels Through Spurious WakeupsLukas Lamster; Fabian Rauscher; Martin Unterguggenberger; Stefan Mangard2026
T-Time: A Fine-Grained Timing-Based Controlled-Channel Attack Against Intel TDXWoomin Lee; Taehun Kim; Seunghee Shin; Junbeom Hur; Youngjoo Shin2026
Unraveling DoH Traces: Padding-Resilient Website Fingerprinting via HTTP/2 Key Frame SequencesBaiyang Li; Yujia Zhu; Yuedong Zhang; Qingyun Liu; Li Guo2026
NLSaber: Enhancing Netlink Family Fuzzing via Automated Syscall Description GenerationLin Ma; Xingwei Lin; Ziming Zhang; Yajin Zhou2026
The Hidden Dangers of Public Serverless Repositories: An Empirical Security AssessmentEduard Marin; Jinwoo Kim; Alessio Pavoni; Mauro Conti; Roberto Di Pietro2026
12