[BOOK][B] Computer Security--ESORICS 2017

SN Foley, D Gollmann, E Snekkenes - 2017 - Springer
… at the 22nd European Symposium on Research in Computer Security, ESORICS 2017,
which was held in Oslo, Norway, … ESORICS 2017 would not have been possible without the …

[BOOK][B] … Security: ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers

SK Katsikas, F Cuppens, N Cuppens… - 2018 - books.google.com
… Engineering, SECPRE 2017, held in Oslo, Norway, in September 2017, in conjunction with
the 22nd European Symposium on Research in Computer Security, ESORICS 2017. The …

[BOOK][B] Data privacy management, cryptocurrencies and blockchain technology

… We would also like to thank the ESORICS workshop chair Sokratis Katsikas and his team
as well as the ESORICS organizers for putting faith in us and in the topic of cryptocurrencies …

[BOOK][B] Security and Trust Management

G Livraga, C Mitchell - 2017 - Springer
This volume contains the papers selected for presentation at the 13th International Workshop
on Security and Trust Management (STM 2017), held in Oslo, Norway, on September 14–…

[PDF][PDF] VuRLE: Automatic vulnerability detection and repair by learning from examples.(2017)

MA SIQI, F THUNG, D LO, C SUN, RH DENG - … security ESORICS 2017: 22nd … - core.ac.uk
Vulnerability becomes a major threat to the security of many systems. Attackers can steal
private information and perform harmful actions by exploiting unpatched vulnerabilities. …

Adversarial examples for malware detection

K Grosse, N Papernot, P Manoharan, M Backes… - … –ESORICS 2017: 22nd …, 2017 - Springer
Abstract Machine learning models are known to lack robustness against inputs crafted by an
adversary. Such adversarial examples can, for instance, be derived from regular inputs by …

Vurle: Automatic vulnerability detection and repair by learning from examples

S Ma, F Thung, D Lo, C Sun, RH Deng - … Security–ESORICS 2017: 22nd …, 2017 - Springer
Vulnerability becomes a major threat to the security of many systems. Attackers can steal
private information and perform harmful actions by exploiting unpatched vulnerabilities. …

Ringct 2.0: A compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency monero

SF Sun, MH Au, JK Liu, TH Yuen - … Security–ESORICS 2017: 22nd …, 2017 - Springer
In this work, we initially study the necessary properties and security requirements of Ring
Confidential Transaction (RingCT) protocol deployed in the popular anonymous cryptocurrency …

Acoustic data exfiltration from speakerless air-gapped computers via covert hard-drive noise ('diskfiltration')

M Guri, Y Solewicz, A Daidakulov, Y Elovici - … –ESORICS 2017: 22nd …, 2017 - Springer
In the past, it has been shown that malware can exfiltrate data from air-gapped (isolated)
networks by transmitting ultrasonic signals via the computer’s speakers. However, such a …

Source code authorship attribution using long short-term memory based networks

B Alsulami, E Dauber, R Harang, S Mancoridis… - … –ESORICS 2017: 22nd …, 2017 - Springer
Abstract Machine learning approaches to source code authorship attribution attempt to find
statistical regularities in human-generated source code that can identify the author or authors …