LEADER 05347nam 22007455 450 001 996691663503316 005 20251018130402.0 010 $a3-032-07894-6 024 7 $a10.1007/978-3-032-07894-0 035 $a(MiAaPQ)EBC32364131 035 $a(Au-PeEL)EBL32364131 035 $a(CKB)41663624200041 035 $a(DE-He213)978-3-032-07894-0 035 $a(EXLCZ)9941663624200041 100 $a20251018d2026 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aComputer Security ? ESORICS 2025 $e30th European Symposium on Research in Computer Security, Toulouse, France, September 22?24, 2025, Proceedings, Part III /$fedited by Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya 205 $a1st ed. 2026. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2026. 215 $a1 online resource (833 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v16055 311 08$a3-032-07893-8 327 $a -- QUIC-Fuzz: An Effective Greybox Fuzzer For The QUIC Protocol. -- Systematic Assessment of Cache Timing Vulnerabilities on RISC-V Processors. -- No Root, No Problem: Automating Linux Least Privilege and Securing Ansible Deployments. -- NICraft: Malicious NIC Firmware-based Cache Side-channel Attack. -- Identifying Potential Timing Leakages from Hardware Design with Precondition Synthesis. -- LibAFLstar: Fast and State-aware Protocol Fuzzing. -- PUSH for Security: A PUF-Based Protocol to Prevent Session Hijacking. -- Hardening HSM Clusters: Resolving Key Sync Vulnerabilities for Robust CU Isolation. -- AcouListener: An Inaudible Acoustic Side-channel Attack on AR/VR Systems. -- Verifying DRAM Addressing in Software. -- Epistemology of Rowhammer Attacks: Threats to Rowhammer Research Validity. -- Personalized Password Guessing via Modeling Multiple Leaked Credentials of the Same User. -- WelkIR: Flow-Sensitive Pre-trained Embeddings from Compiler IR for Vulnerability Detection. -- Edge Coverage Feedback of Embedded Systems Fuzzing Based on Debugging Interfaces. -- Cache Demote for Fast Eviction Set Construction and Page Table Attribute Leakage. -- WaitWatcher & WaitGuard: Detecting Flush-Based Cache Side-Channels through Spurious Wakeups. -- T-Time: A Fine-grained Timing-based Controlled-Channel Attack against Intel TDX. -- Unraveling DoH Traces: Padding-Resilient Website Fingerprinting via HTTP/2 Key Frame Sequences. -- NLSaber: Enhancing Netlink Family Fuzzing via Automated Syscall Description Generation. -- The Hidden Dangers of Public Serverless Repositories: An Empirical Security Assessment. -- CapMan: Detecting and Mitigating Linux Capability Abuses at Runtime to Secure Privileged Containers. -- Digital Twin for Adaptive Adversary Emulation in IIoT Control Networks. -- Formal Security Analysis of ss2DNS. -- High-Efficiency Fuzzing Technique Using Hooked I/O System Calls for Targeted Input Analysis. -- VeriFLo: Verifiable Provenance with Fault Localization for Inter-domain Routing. -- The Polymorphism Maze: Understanding Diversities and Similarities in Malware Families. -- End-to-End Non-Profiled Side-Channel Analysis on Long Raw Traces. 330 $aThis four-volume set LNCS 16053-16056 constitutes the refereed proceedings of the 30th European Symposium on Research in Computer Security, ESORICS 2025, held in Toulouse, France, during September 22?24, 2025. The 100 full papers presented in these proceedings were carefully reviewed and selected from 600 submissions. They were organized in topical sections as follows: AI and Data-Centric Security, Systems and Hardware Security, Privacy, Cryptography and Secure Protocol Design, Blockchain and Financial Security, Privacy Policy and Identity Management, Adversarial and Backdoor Defenses. . 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v16055 606 $aData protection 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer networks$xSecurity measures 606 $aComputer networks 606 $aComputer systems 606 $aData and Information Security 606 $aCryptology 606 $aSecurity Services 606 $aMobile and Network Security 606 $aComputer Communication Networks 606 $aComputer System Implementation 615 0$aData protection. 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aComputer networks$xSecurity measures. 615 0$aComputer networks. 615 0$aComputer systems. 615 14$aData and Information Security. 615 24$aCryptology. 615 24$aSecurity Services. 615 24$aMobile and Network Security. 615 24$aComputer Communication Networks. 615 24$aComputer System Implementation. 676 $a005.8 700 $aNicomette$b Vincent$01860745 701 $aBenzekri$b Abdelmalek$01860746 701 $aBoulahia-Cuppens$b Nora$01860747 701 $aVaidya$b Jaideep$01276751 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996691663503316 996 $aComputer Security ? ESORICS 2025$94466483 997 $aUNISA