[BOOK][B] Computer Security--ESORICS 2017
SN Foley, D Gollmann, E Snekkenes - 2017 - Springer
… at the 22nd European Symposium on Research in Computer Security, ESORICS 2017,
which was held in Oslo, Norway, … ESORICS 2017 would not have been possible without the …
which was held in Oslo, Norway, … ESORICS 2017 would not have been possible without the …
[BOOK][B] … Security: ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers
… Engineering, SECPRE 2017, held in Oslo, Norway, in September 2017, in conjunction with
the 22nd European Symposium on Research in Computer Security, ESORICS 2017. The …
the 22nd European Symposium on Research in Computer Security, ESORICS 2017. The …
[BOOK][B] Data privacy management, cryptocurrencies and blockchain technology
… We would also like to thank the ESORICS workshop chair Sokratis Katsikas and his team
as well as the ESORICS organizers for putting faith in us and in the topic of cryptocurrencies …
as well as the ESORICS organizers for putting faith in us and in the topic of cryptocurrencies …
[BOOK][B] Security and Trust Management
G Livraga, C Mitchell - 2017 - Springer
This volume contains the papers selected for presentation at the 13th International Workshop
on Security and Trust Management (STM 2017), held in Oslo, Norway, on September 14–…
on Security and Trust Management (STM 2017), held in Oslo, Norway, on September 14–…
[PDF][PDF] VuRLE: Automatic vulnerability detection and repair by learning from examples.(2017)
Vulnerability becomes a major threat to the security of many systems. Attackers can steal
private information and perform harmful actions by exploiting unpatched vulnerabilities. …
private information and perform harmful actions by exploiting unpatched vulnerabilities. …
Adversarial examples for malware detection
Abstract Machine learning models are known to lack robustness against inputs crafted by an
adversary. Such adversarial examples can, for instance, be derived from regular inputs by …
adversary. Such adversarial examples can, for instance, be derived from regular inputs by …
Vurle: Automatic vulnerability detection and repair by learning from examples
Vulnerability becomes a major threat to the security of many systems. Attackers can steal
private information and perform harmful actions by exploiting unpatched vulnerabilities. …
private information and perform harmful actions by exploiting unpatched vulnerabilities. …
Ringct 2.0: A compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency monero
In this work, we initially study the necessary properties and security requirements of Ring
Confidential Transaction (RingCT) protocol deployed in the popular anonymous cryptocurrency …
Confidential Transaction (RingCT) protocol deployed in the popular anonymous cryptocurrency …
Acoustic data exfiltration from speakerless air-gapped computers via covert hard-drive noise ('diskfiltration')
In the past, it has been shown that malware can exfiltrate data from air-gapped (isolated)
networks by transmitting ultrasonic signals via the computer’s speakers. However, such a …
networks by transmitting ultrasonic signals via the computer’s speakers. However, such a …
Source code authorship attribution using long short-term memory based networks
Abstract Machine learning approaches to source code authorship attribution attempt to find
statistical regularities in human-generated source code that can identify the author or authors …
statistical regularities in human-generated source code that can identify the author or authors …