LEADER 06378nam 22008895 450 001 9910595027703321 005 20241216134225.0 010 $a9783031171406 010 $a3031171403 024 7 $a10.1007/978-3-031-17140-6 035 $a(CKB)5840000000091654 035 $a(MiAaPQ)EBC7101948 035 $a(Au-PeEL)EBL7101948 035 $a(DE-He213)978-3-031-17140-6 035 $a(PPN)264953304 035 $a(EXLCZ)995840000000091654 100 $a20220924d2022 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aComputer Security ? ESORICS 2022 $e27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26?30, 2022, Proceedings, Part I /$fedited by Vijayalakshmi Atluri, Roberto Di Pietro, Christian D. Jensen, Weizhi Meng 205 $a1st ed. 2022. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2022. 215 $a1 online resource (749 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v13554 311 08$a9783031171390 311 08$a303117139X 327 $aBlockchain Security -- A Blockchain-based Long-Term Time-Stamping Scheme -- Post-Quantum Verifiable Random Function from Symmetric Primitives in PoS Blockchain -- Opportunistic Algorithmic Double-Spending: How I learned to stop worrying and love the Fork -- Zero-History Confidential Chains with Zero-Knowledge Contracts: A New Normal for Decentralized Ledgers -- Secure Hierarchical Deterministic Wallet Supporting Stealth Address -- Zero-Knowledge Age Restriction for GNU Taler -- Privacy -- Privacy Leakage in Privacy-Preserving Neural Network Inference -- Enhancing User Privacy in Mobile Devices Through Prediction of Privacy Preferences -- One vote is enough for analysing privacy -- Local Differential Privacy for Federated Learning -- XSPIR: Effcient Symmetrically Private Information Retrieval from Ring-LWE -- Scaling Up GAEN Pseudorandom Processes: Preparing for a More Extensive Pandemic -- Crypto -- Generic Construction of Trace-and-Revoke Inner Product Functional Encryption -- Spatial Encryption Revisited: From Delegatable Multiple Inner Product Encryption and More -- Public Key Authenticated Encryption with Keyword Search from LWE -- An Effcient Query Recovery Attack Against a Graph Encryption Scheme -- New Unbounded Verifiable Data Streaming for Batch Query with Almost Optimal Overhead -- A Formal Model for Credential Hopping Attacks -- No-directional and Backward-leak Uni-directional Updatable Encryption are Equivalent -- Effcient Circuits for Permuting and Mapping Packed Values Across Leveled Homomorphic Ciphertexts -- Towards Practical Homomorphic Time-Lock Puzzles: Applicability and Verifiability -- Attacks -- Kallima: A Clean-label Framework for Textual Backdoor Attacks -- Two Types of Novel DoS Attacks against CDNs Based on HTTP/2 Flow Control Mechanism -- EVExchange: A Relay Attack on Electric Vehicle Charging System -- Turrin Smart RPKI Validation: Avoiding Errors and Preventing Hijacks -- Cyber Network Resilience against Self-Propagating Malware Attacks -- INC: In-Network Classification of Botnet Propagation at Line Rate -- GAME: Generative-Based Adaptive Model Extraction Attack -- AttacKG: Constructing Technique Knowledge Graph from Cyber Threat Intelligence Reports -- SeInspect: Defending Model Stealing via Heterogeneous Semantic Inspection -- Sidechannels We can hear your PIN drop: A new acoustic side channel attack to profile PIN pads keys -- VAL: Volume and Access Pattern Leakage-abuse Attack with Leaked Documents -- Light the Signal: Optimization of Signal Leakage Attacks against LWE-Based Key Exchange -- BLEWhisperer: Exploiting BLE Advertisements for Data Exfiltration. 330 $aThe three volume set LNCS 13554, 13555, 13556 constitutes the proceedings of the 27th European Symposium on Research in Computer Security, ESORICS 2022, which took place in September 2022. The conference took place in Copenhagen, Denmark, in a hybrid mode. The 104 full papers and 6 poster papers presented in these proceedings were carefully reviewed and selected from 562 submissions. They were organized in topical sections as follows: Part I: Blockchain security; privacy; crypto; attacks; sidechannels; Part II: Anonymity; cloud security; access control; authentication; digital signatures; IoT security; applications; Part III: Formal analysis; Web security; hardware security; multiparty computation; ML techniques; cyber-physical systems security; network and software security; posters. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v13554 606 $aData protection 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer networks$xSecurity measures 606 $aComputer networks 606 $aComputer systems 606 $aData and Information Security 606 $aCryptology 606 $aSecurity Services 606 $aMobile and Network Security 606 $aComputer Communication Networks 606 $aComputer System Implementation 606 $aSeguretat informātica$2thub 606 $aXifratge (Informātica)$2thub 606 $aXarxes d'ordinadors$2thub 606 $aProtecciķ de dades$2thub 608 $aCongressos$2thub 608 $aCongressos$2thub 608 $aLlibres electrōnics$2thub 615 0$aData protection. 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aComputer networks$xSecurity measures. 615 0$aComputer networks. 615 0$aComputer systems. 615 14$aData and Information Security. 615 24$aCryptology. 615 24$aSecurity Services. 615 24$aMobile and Network Security. 615 24$aComputer Communication Networks. 615 24$aComputer System Implementation. 615 7$aSeguretat informātica 615 7$aXifratge (Informātica) 615 7$aXarxes d'ordinadors 615 7$aProtecciķ de dades 676 $a005.8 676 $a005.8 702 $aAtluri$b Vijayalakshmi 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910595027703321 996 $aComputer security - ESORICS 2022$93018506 997 $aUNINA