Computer Security – ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part III / / edited by Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya
| Computer Security – ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part III / / edited by Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya |
| Autore | Nicomette Vincent |
| Edizione | [1st ed. 2026.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2026 |
| Descrizione fisica | 1 online resource (833 pages) |
| Disciplina | 005.8 |
| Altri autori (Persone) |
BenzekriAbdelmalek
Boulahia-CuppensNora VaidyaJaideep |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Data protection
Cryptography Data encryption (Computer science) Computer networks - Security measures Computer networks Computer systems Data and Information Security Cryptology Security Services Mobile and Network Security Computer Communication Networks Computer System Implementation |
| ISBN | 3-032-07894-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | -- QUIC-Fuzz: An Effective Greybox Fuzzer For The QUIC Protocol. -- Systematic Assessment of Cache Timing Vulnerabilities on RISC-V Processors. -- No Root, No Problem: Automating Linux Least Privilege and Securing Ansible Deployments. -- NICraft: Malicious NIC Firmware-based Cache Side-channel Attack. -- Identifying Potential Timing Leakages from Hardware Design with Precondition Synthesis. -- LibAFLstar: Fast and State-aware Protocol Fuzzing. -- PUSH for Security: A PUF-Based Protocol to Prevent Session Hijacking. -- Hardening HSM Clusters: Resolving Key Sync Vulnerabilities for Robust CU Isolation. -- AcouListener: An Inaudible Acoustic Side-channel Attack on AR/VR Systems. -- Verifying DRAM Addressing in Software. -- Epistemology of Rowhammer Attacks: Threats to Rowhammer Research Validity. -- Personalized Password Guessing via Modeling Multiple Leaked Credentials of the Same User. -- WelkIR: Flow-Sensitive Pre-trained Embeddings from Compiler IR for Vulnerability Detection. -- Edge Coverage Feedback of Embedded Systems Fuzzing Based on Debugging Interfaces. -- Cache Demote for Fast Eviction Set Construction and Page Table Attribute Leakage. -- WaitWatcher & WaitGuard: Detecting Flush-Based Cache Side-Channels through Spurious Wakeups. -- T-Time: A Fine-grained Timing-based Controlled-Channel Attack against Intel TDX. -- Unraveling DoH Traces: Padding-Resilient Website Fingerprinting via HTTP/2 Key Frame Sequences. -- NLSaber: Enhancing Netlink Family Fuzzing via Automated Syscall Description Generation. -- The Hidden Dangers of Public Serverless Repositories: An Empirical Security Assessment. -- CapMan: Detecting and Mitigating Linux Capability Abuses at Runtime to Secure Privileged Containers. -- Digital Twin for Adaptive Adversary Emulation in IIoT Control Networks. -- Formal Security Analysis of ss2DNS. -- High-Efficiency Fuzzing Technique Using Hooked I/O System Calls for Targeted Input Analysis. -- VeriFLo: Verifiable Provenance with Fault Localization for Inter-domain Routing. -- The Polymorphism Maze: Understanding Diversities and Similarities in Malware Families. -- End-to-End Non-Profiled Side-Channel Analysis on Long Raw Traces. |
| Record Nr. | UNINA-9911047682003321 |
Nicomette Vincent
|
||
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2026 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Computer Security – ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part I / / edited by Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya
| Computer Security – ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part I / / edited by Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya |
| Autore | Nicomette Vincent |
| Edizione | [1st ed. 2026.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2026 |
| Descrizione fisica | 1 online resource (793 pages) |
| Disciplina | 005.8 |
| Altri autori (Persone) |
BenzekriAbdelmalek
Boulahia-CuppensNora VaidyaJaideep |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Data protection
Cryptography Data encryption (Computer science) Computer networks - Security measures Computer networks Computer systems Data and Information Security Cryptology Security Services Mobile and Network Security Computer Communication Networks Computer System Implementation |
| ISBN | 3-032-07884-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | -- Time-Distributed Backdoor Attacks on Federated Spiking Learning. -- TATA: Benchmark NIDS Test Sets Assessment and Targeted Augmentation. -- Abuse-Resistant Evaluation of AI-as-a-Service via Function-Hiding Homomorphic Signatures. -- PriSM: A Privacy-friendly Support vector Machine. -- Towards Context-Aware Log Anomaly Detection Using Fine-Tuned Large Language Models. -- PROTEAN: Federated Intrusion Detection in Non-IID Environments through Prototype-Based Knowledge Sharing. -- KeTS: Kernel-based Trust Segmentation against Model Poisoning Attacks. -- Machine Learning Vulnerabilities in 6G: Adversarial Attacks and Their Impact on Channel Gain Prediction and Resource Allocation in UC-CF-mMIMO. -- FuncVul: An Effective Function Level Vulnerability Detection Model using LLM and Code Chunk. -- LUMIA: Linear probing for Unimodal and MultiModal Membership Inference Attacks leveraging internal LLM states. -- Membership Privacy Evaluation in Deep Spiking Neural Networks. -- DUMB and DUMBer: Is Adversarial Training Worth It in the Real World?. -- Countering Jailbreak Attacks with Two-Axis Pre-Detection and Conditional Warning Wrappers. -- How Dataset Diversity Affects Generalization in ML-based NIDS. -- Llama-based source code vulnerability detection: Prompt engineering vs Finetuning. -- DBBA: Diffusion-based Backdoor Attacks on Open-set Face Recognition Models. -- Evaluation of Autonomous Intrusion Response Agents In Adversarial and Normal Scenarios. -- Trigger-Based Fragile Model Watermarking for Image Transformation Networks. -- Let the Noise Speak: Harnessing Noise for a Unified Defense Against Adversarial and Backdoor Attacks. -- On the Adversarial Robustness of Graph Neural Networks with Graph Reduction. -- SecureT2I: No More Unauthorized Manipulation on AI Generated Images from Prompts. -- GANSec: Enhancing Supervised Wireless Anomaly Detection Robustness through Tailored Conditional GAN Augmentation. -- Fine-Grained Data Poisoning Attack to Local Differential Privacy Protocols for Key-Value Data. -- The DCR Delusion: Measuring the Privacy Risk of Synthetic Data. -- StructTransform: A Scalable Attack Surface for Safety-Aligned Large Language Models. |
| Record Nr. | UNISA-996691666303316 |
Nicomette Vincent
|
||
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2026 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Computer Security – ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part IV / / edited by Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya
| Computer Security – ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part IV / / edited by Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya |
| Autore | Nicomette Vincent |
| Edizione | [1st ed. 2026.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2026 |
| Descrizione fisica | 1 online resource (753 pages) |
| Disciplina | 005.8 |
| Altri autori (Persone) |
BenzekriAbdelmalek
Boulahia-CuppensNora VaidyaJaideep |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Data protection
Cryptography Data encryption (Computer science) Computer networks - Security measures Computer networks Computer systems Data and Information Security Cryptology Security Services Mobile and Network Security Computer Communication Networks Computer System Implementation |
| ISBN | 3-032-07901-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | -- Transparency and Consent Challenges in mHealth Apps: An Interdisciplinary Study of Privacy Policies, Data Sharing, and Dark Patterns. -- Don’t Hash Me Like That: Exposing and Mitigating Hash-Induced Unfairness in Local Differential Privacy. -- Functional Credentials: a Practical Construction for the European Digital Identity. -- Privacy-Preserving k-Nearest Neighbor Query: Faster and More Secure. -- Breaking verifiability and vote privacy in CHVote. -- Zero-Click SnailLoad: From Minimal to No User Interaction. -- Analysis of input-output mappings in coinjoin transactions with arbitrary values. -- Email Cloaking: Deceiving Users and Spam Email Detectors with Invisible HTML Settings. -- BlowPrint: Blow-Based Multi-Factor Biometrics for Smartphone User Authentication. -- GET-AID: Graph-Enhanced Transformer for Provenance-based Advanced Persistent Threats Investigation and Detection. -- The Economics of Deception: Structural Patterns of Rug Pull across DeFi Blockchains. -- Privacy-Preserving Trajectory Data Publication Via Differentially-Private Representation Learning. -- Fine-grained, privacy-augmenting, LI-compliance in the LAKE standard. -- RIPOST: Two-Phase Private Decomposition for Multidimensional Data. -- Correcting the Record on Leakage Abuse Attacks: Revisiting the Subgraph Attacks with Sound Evaluation. -- Efficient and Secure Sleepy Model for BFT Consensus. -- An Algebraic Approach to Asymmetric Delegation and Polymorphic Label Inference. -- An Efficient Security-enhanced Accountable Access Control for Named Data Networking. -- Dobby: A Privacy-Preserving Time Series Data Analytics System with Enforcement of Flexible Policies. -- A User-Centric, Privacy-Preserving, and Verifiable Ecosystem for Personal Data Management and Utilization. -- Imitater: An Efficient Shared Mempool Protocol with Application to Byzantine Fault Tolerance. -- Premining in the Shadows: How Hidden Blocks Weaken the Security of Proof-of-Work Chains. |
| Record Nr. | UNINA-9911047656503321 |
Nicomette Vincent
|
||
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2026 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Computer Security – ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part II / / edited by Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya
| Computer Security – ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part II / / edited by Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya |
| Autore | Nicomette Vincent |
| Edizione | [1st ed. 2026.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2026 |
| Descrizione fisica | 1 online resource (0 pages) |
| Disciplina | 005.8 |
| Altri autori (Persone) |
BenzekriAbdelmalek
Boulahia-CuppensNora VaidyaJaideep |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Data protection
Cryptography Data encryption (Computer science) Computer networks - Security measures Computer networks Computer systems Data and Information Security Cryptology Security Services Mobile and Network Security Computer Communication Networks Computer System Implementation |
| ISBN | 3-032-07891-1 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | -- A Certified-Input Mixnet from Two-Party Mercurial Signatures on Randomizable Ciphertexts. -- Tetris! Traceable Extendable Threshold Ring Signatures and More. -- Efficient One-Pass Private Set Intersection from Pairings with Offline Preprocessing. -- Practical Robust Dynamic Searchable Symmetric Encryption Supporting Conjunctive Queries. -- Security Analysis of Covercrypt: A Quantum-Safe Hybrid Key Encapsulation Mechanism for Hidden Access Policies. -- Anamorphic Monero Transactions: the Threat of Bypassing Anti-Money Laundering Laws. -- Hyperion: Transparent End-to-End Verifiable Voting with Coercion Mitigation. -- Two-Factor Authenticated Key Exchange with Enhanced Security from Post-Quantum Assumptions. -- Concretely Efficient Parallel-accessible DORAM for 100K-sized Array. -- A Symbolic Analysis of Hash Functions Vulnerabilities in Maude-NPA. -- A post-quantum Distributed OPRF from the Legendre PRF. -- TERRA: Trojan-Resilient Reverse-Firewall for Cryptographic Applications. -- Reaction Attack on TFHE: Minimum Number of Oracle Queries and Nearly Optimum Attacking Scheme. -- Predicate-Private Asymmetric Searchable Encryption for Conjunctions from Lattices. -- DEBridge: Towards Secure and Practical Plausibly Deniable Encryption Based on USB Bridge Controller. -- Formalisation of KZG commitment schemes in EasyCrypt. -- UTRA: Universal Token Reusability Attack and Token Unforgeable Delegatable Order-Revealing Encryption. -- Enhanced Key Mismatch Attacks on Lattice-Based KEMs: Multi-bit Inference and Ciphertext Generalization. -- Code Encryption with Intel TME-MK for Control-Flow Enforcement. -- Optimized Privacy-Preserving Multi-Signatures from Discrete Logarithm Assumption. -- Polylogarithmic Polynomial Commitment Scheme over Galois Rings. -- Efficient Homomorphic Evaluation for Non-Polynomial Functions. -- Athena: Accelerating KeySwitch and Bootstrapping for Fully Homomorphic Encryption on CUDA GPU. -- Formally-verified Security against Forgery of Remote Attestation using SSProve. -- SafePath: Encryption-less On-demand Input Path Protection for Mobile Devices. -- Extending Groth16 for Disjunctive Statements. |
| Record Nr. | UNINA-9911046554303321 |
Nicomette Vincent
|
||
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2026 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Computer Security – ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part II / / edited by Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya
| Computer Security – ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part II / / edited by Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya |
| Autore | Nicomette Vincent |
| Edizione | [1st ed. 2026.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2026 |
| Descrizione fisica | 1 online resource (0 pages) |
| Disciplina | 005.8 |
| Altri autori (Persone) |
BenzekriAbdelmalek
Boulahia-CuppensNora VaidyaJaideep |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Data protection
Cryptography Data encryption (Computer science) Computer networks - Security measures Computer networks Computer systems Data and Information Security Cryptology Security Services Mobile and Network Security Computer Communication Networks Computer System Implementation |
| ISBN | 3-032-07891-1 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | -- A Certified-Input Mixnet from Two-Party Mercurial Signatures on Randomizable Ciphertexts. -- Tetris! Traceable Extendable Threshold Ring Signatures and More. -- Efficient One-Pass Private Set Intersection from Pairings with Offline Preprocessing. -- Practical Robust Dynamic Searchable Symmetric Encryption Supporting Conjunctive Queries. -- Security Analysis of Covercrypt: A Quantum-Safe Hybrid Key Encapsulation Mechanism for Hidden Access Policies. -- Anamorphic Monero Transactions: the Threat of Bypassing Anti-Money Laundering Laws. -- Hyperion: Transparent End-to-End Verifiable Voting with Coercion Mitigation. -- Two-Factor Authenticated Key Exchange with Enhanced Security from Post-Quantum Assumptions. -- Concretely Efficient Parallel-accessible DORAM for 100K-sized Array. -- A Symbolic Analysis of Hash Functions Vulnerabilities in Maude-NPA. -- A post-quantum Distributed OPRF from the Legendre PRF. -- TERRA: Trojan-Resilient Reverse-Firewall for Cryptographic Applications. -- Reaction Attack on TFHE: Minimum Number of Oracle Queries and Nearly Optimum Attacking Scheme. -- Predicate-Private Asymmetric Searchable Encryption for Conjunctions from Lattices. -- DEBridge: Towards Secure and Practical Plausibly Deniable Encryption Based on USB Bridge Controller. -- Formalisation of KZG commitment schemes in EasyCrypt. -- UTRA: Universal Token Reusability Attack and Token Unforgeable Delegatable Order-Revealing Encryption. -- Enhanced Key Mismatch Attacks on Lattice-Based KEMs: Multi-bit Inference and Ciphertext Generalization. -- Code Encryption with Intel TME-MK for Control-Flow Enforcement. -- Optimized Privacy-Preserving Multi-Signatures from Discrete Logarithm Assumption. -- Polylogarithmic Polynomial Commitment Scheme over Galois Rings. -- Efficient Homomorphic Evaluation for Non-Polynomial Functions. -- Athena: Accelerating KeySwitch and Bootstrapping for Fully Homomorphic Encryption on CUDA GPU. -- Formally-verified Security against Forgery of Remote Attestation using SSProve. -- SafePath: Encryption-less On-demand Input Path Protection for Mobile Devices. -- Extending Groth16 for Disjunctive Statements. |
| Record Nr. | UNISA-996691666003316 |
Nicomette Vincent
|
||
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2026 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Computer Security – ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part IV / / edited by Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya
| Computer Security – ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part IV / / edited by Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya |
| Autore | Nicomette Vincent |
| Edizione | [1st ed. 2026.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2026 |
| Descrizione fisica | 1 online resource (753 pages) |
| Disciplina | 005.8 |
| Altri autori (Persone) |
BenzekriAbdelmalek
Boulahia-CuppensNora VaidyaJaideep |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Data protection
Cryptography Data encryption (Computer science) Computer networks - Security measures Computer networks Computer systems Data and Information Security Cryptology Security Services Mobile and Network Security Computer Communication Networks Computer System Implementation |
| ISBN | 3-032-07901-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | -- Transparency and Consent Challenges in mHealth Apps: An Interdisciplinary Study of Privacy Policies, Data Sharing, and Dark Patterns. -- Don’t Hash Me Like That: Exposing and Mitigating Hash-Induced Unfairness in Local Differential Privacy. -- Functional Credentials: a Practical Construction for the European Digital Identity. -- Privacy-Preserving k-Nearest Neighbor Query: Faster and More Secure. -- Breaking verifiability and vote privacy in CHVote. -- Zero-Click SnailLoad: From Minimal to No User Interaction. -- Analysis of input-output mappings in coinjoin transactions with arbitrary values. -- Email Cloaking: Deceiving Users and Spam Email Detectors with Invisible HTML Settings. -- BlowPrint: Blow-Based Multi-Factor Biometrics for Smartphone User Authentication. -- GET-AID: Graph-Enhanced Transformer for Provenance-based Advanced Persistent Threats Investigation and Detection. -- The Economics of Deception: Structural Patterns of Rug Pull across DeFi Blockchains. -- Privacy-Preserving Trajectory Data Publication Via Differentially-Private Representation Learning. -- Fine-grained, privacy-augmenting, LI-compliance in the LAKE standard. -- RIPOST: Two-Phase Private Decomposition for Multidimensional Data. -- Correcting the Record on Leakage Abuse Attacks: Revisiting the Subgraph Attacks with Sound Evaluation. -- Efficient and Secure Sleepy Model for BFT Consensus. -- An Algebraic Approach to Asymmetric Delegation and Polymorphic Label Inference. -- An Efficient Security-enhanced Accountable Access Control for Named Data Networking. -- Dobby: A Privacy-Preserving Time Series Data Analytics System with Enforcement of Flexible Policies. -- A User-Centric, Privacy-Preserving, and Verifiable Ecosystem for Personal Data Management and Utilization. -- Imitater: An Efficient Shared Mempool Protocol with Application to Byzantine Fault Tolerance. -- Premining in the Shadows: How Hidden Blocks Weaken the Security of Proof-of-Work Chains. |
| Record Nr. | UNISA-996691665803316 |
Nicomette Vincent
|
||
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2026 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Computer Security – ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part III / / edited by Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya
| Computer Security – ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part III / / edited by Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya |
| Autore | Nicomette Vincent |
| Edizione | [1st ed. 2026.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2026 |
| Descrizione fisica | 1 online resource (833 pages) |
| Disciplina | 005.8 |
| Altri autori (Persone) |
BenzekriAbdelmalek
Boulahia-CuppensNora VaidyaJaideep |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Data protection
Cryptography Data encryption (Computer science) Computer networks - Security measures Computer networks Computer systems Data and Information Security Cryptology Security Services Mobile and Network Security Computer Communication Networks Computer System Implementation |
| ISBN | 3-032-07894-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | -- QUIC-Fuzz: An Effective Greybox Fuzzer For The QUIC Protocol. -- Systematic Assessment of Cache Timing Vulnerabilities on RISC-V Processors. -- No Root, No Problem: Automating Linux Least Privilege and Securing Ansible Deployments. -- NICraft: Malicious NIC Firmware-based Cache Side-channel Attack. -- Identifying Potential Timing Leakages from Hardware Design with Precondition Synthesis. -- LibAFLstar: Fast and State-aware Protocol Fuzzing. -- PUSH for Security: A PUF-Based Protocol to Prevent Session Hijacking. -- Hardening HSM Clusters: Resolving Key Sync Vulnerabilities for Robust CU Isolation. -- AcouListener: An Inaudible Acoustic Side-channel Attack on AR/VR Systems. -- Verifying DRAM Addressing in Software. -- Epistemology of Rowhammer Attacks: Threats to Rowhammer Research Validity. -- Personalized Password Guessing via Modeling Multiple Leaked Credentials of the Same User. -- WelkIR: Flow-Sensitive Pre-trained Embeddings from Compiler IR for Vulnerability Detection. -- Edge Coverage Feedback of Embedded Systems Fuzzing Based on Debugging Interfaces. -- Cache Demote for Fast Eviction Set Construction and Page Table Attribute Leakage. -- WaitWatcher & WaitGuard: Detecting Flush-Based Cache Side-Channels through Spurious Wakeups. -- T-Time: A Fine-grained Timing-based Controlled-Channel Attack against Intel TDX. -- Unraveling DoH Traces: Padding-Resilient Website Fingerprinting via HTTP/2 Key Frame Sequences. -- NLSaber: Enhancing Netlink Family Fuzzing via Automated Syscall Description Generation. -- The Hidden Dangers of Public Serverless Repositories: An Empirical Security Assessment. -- CapMan: Detecting and Mitigating Linux Capability Abuses at Runtime to Secure Privileged Containers. -- Digital Twin for Adaptive Adversary Emulation in IIoT Control Networks. -- Formal Security Analysis of ss2DNS. -- High-Efficiency Fuzzing Technique Using Hooked I/O System Calls for Targeted Input Analysis. -- VeriFLo: Verifiable Provenance with Fault Localization for Inter-domain Routing. -- The Polymorphism Maze: Understanding Diversities and Similarities in Malware Families. -- End-to-End Non-Profiled Side-Channel Analysis on Long Raw Traces. |
| Record Nr. | UNISA-996691663503316 |
Nicomette Vincent
|
||
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2026 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Computer Security – ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part I / / edited by Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya
| Computer Security – ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part I / / edited by Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya |
| Autore | Nicomette Vincent |
| Edizione | [1st ed. 2026.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2026 |
| Descrizione fisica | 1 online resource (793 pages) |
| Disciplina | 005.8 |
| Altri autori (Persone) |
BenzekriAbdelmalek
Boulahia-CuppensNora VaidyaJaideep |
| Collana | Lecture Notes in Computer Science |
| Soggetto topico |
Data protection
Cryptography Data encryption (Computer science) Computer networks - Security measures Computer networks Computer systems Data and Information Security Cryptology Security Services Mobile and Network Security Computer Communication Networks Computer System Implementation |
| ISBN | 3-032-07884-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | -- Time-Distributed Backdoor Attacks on Federated Spiking Learning. -- TATA: Benchmark NIDS Test Sets Assessment and Targeted Augmentation. -- Abuse-Resistant Evaluation of AI-as-a-Service via Function-Hiding Homomorphic Signatures. -- PriSM: A Privacy-friendly Support vector Machine. -- Towards Context-Aware Log Anomaly Detection Using Fine-Tuned Large Language Models. -- PROTEAN: Federated Intrusion Detection in Non-IID Environments through Prototype-Based Knowledge Sharing. -- KeTS: Kernel-based Trust Segmentation against Model Poisoning Attacks. -- Machine Learning Vulnerabilities in 6G: Adversarial Attacks and Their Impact on Channel Gain Prediction and Resource Allocation in UC-CF-mMIMO. -- FuncVul: An Effective Function Level Vulnerability Detection Model using LLM and Code Chunk. -- LUMIA: Linear probing for Unimodal and MultiModal Membership Inference Attacks leveraging internal LLM states. -- Membership Privacy Evaluation in Deep Spiking Neural Networks. -- DUMB and DUMBer: Is Adversarial Training Worth It in the Real World?. -- Countering Jailbreak Attacks with Two-Axis Pre-Detection and Conditional Warning Wrappers. -- How Dataset Diversity Affects Generalization in ML-based NIDS. -- Llama-based source code vulnerability detection: Prompt engineering vs Finetuning. -- DBBA: Diffusion-based Backdoor Attacks on Open-set Face Recognition Models. -- Evaluation of Autonomous Intrusion Response Agents In Adversarial and Normal Scenarios. -- Trigger-Based Fragile Model Watermarking for Image Transformation Networks. -- Let the Noise Speak: Harnessing Noise for a Unified Defense Against Adversarial and Backdoor Attacks. -- On the Adversarial Robustness of Graph Neural Networks with Graph Reduction. -- SecureT2I: No More Unauthorized Manipulation on AI Generated Images from Prompts. -- GANSec: Enhancing Supervised Wireless Anomaly Detection Robustness through Tailored Conditional GAN Augmentation. -- Fine-Grained Data Poisoning Attack to Local Differential Privacy Protocols for Key-Value Data. -- The DCR Delusion: Measuring the Privacy Risk of Synthetic Data. -- StructTransform: A Scalable Attack Surface for Safety-Aligned Large Language Models. |
| Record Nr. | UNINA-9911046532203321 |
Nicomette Vincent
|
||
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2026 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Foundations and Practice of Security [[electronic resource] ] : 12th International Symposium, FPS 2019, Toulouse, France, November 5–7, 2019, Revised Selected Papers / / edited by Abdelmalek Benzekri, Michel Barbeau, Guang Gong, Romain Laborde, Joaquin Garcia-Alfaro
| Foundations and Practice of Security [[electronic resource] ] : 12th International Symposium, FPS 2019, Toulouse, France, November 5–7, 2019, Revised Selected Papers / / edited by Abdelmalek Benzekri, Michel Barbeau, Guang Gong, Romain Laborde, Joaquin Garcia-Alfaro |
| Edizione | [1st ed. 2020.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
| Descrizione fisica | 1 online resource (415 pages) : illustrations |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Computer security
Computers Computer communication systems Artificial intelligence Systems and Data Security Information Systems and Communication Service Computer Communication Networks Artificial Intelligence |
| ISBN | 3-030-45371-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Machine Learning Approaches -- PAC: Privacy-preserving Arrhythmia Classi cation with neural networks -- Ransomware Network Traffic Analysis for Pre-Encryption Alert -- Using Machine Learning to Detect Anomalies in Embedded Networks in Heavy Vehicles -- Selection and performance analysis of CICIDS2017 features importance -- Semantic Representation Based on Deep Learning for Spam Detection -- Interpreting Machine Learning Malware Detectors Which Leverage N-gram Analysis -- Labelled Network Capture Generation For Anomaly Detection -- Attack Prevention and Trustworthiness -- Lempel-Ziv Compression with Randomized Input-Output for Anti-Compression Side-Channel Attacks under HTTPS/TLS -- Secure Logging with Security against Adaptive Crash Attack -- Enroll, and Authentication will Follow: eID-based Enrollment for a Customized, Secure, and Frictionless Authentication Experience -- TATIS: Trustworthy APIs for Threat Intelligence Sharing with UMA and CP-ABE -- Protecting Android Apps from Repackaging Using Native Code -- Access Control Models and Cryptography -- Command Dependencies in Heuristic Safety Analysis of Access Control Models -- On Attribute Retrieval in ABAC -- Incorporating O -Line Attribute Delegation into Hierarchical Group and Attribute-Based Access Control -- U-EPS: An Ultra-small and Efficient Post-quantum Signature Scheme -- An Efficient Identification Scheme Based on Rank Metric -- Security Analysis of Auctionity: a blockchain based e-auction -- Dynamic Searchable Encryption with Access Control -- Short Papers -- Get-your-ID: Decentralized Proof of Identity -- Towards secure TMIS protocols -- Detecting Ransomware in Encrypted Web Traffic -- Digital forensics in vessel transportation systems -- A Privacy Protection Layer for Wearable Devices -- Validating the DFA Attack Resistance of AES -- A rejection-based approach for detecting SQL injection vulnerabilities in Web applications -- Lightweight IoT Mutual Authentication Scheme based on Transient Identities and Transactions History -- Towards Privacy-Aware Smart Surveillance. |
| Record Nr. | UNISA-996418214603316 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Foundations and Practice of Security : 12th International Symposium, FPS 2019, Toulouse, France, November 5–7, 2019, Revised Selected Papers / / edited by Abdelmalek Benzekri, Michel Barbeau, Guang Gong, Romain Laborde, Joaquin Garcia-Alfaro
| Foundations and Practice of Security : 12th International Symposium, FPS 2019, Toulouse, France, November 5–7, 2019, Revised Selected Papers / / edited by Abdelmalek Benzekri, Michel Barbeau, Guang Gong, Romain Laborde, Joaquin Garcia-Alfaro |
| Edizione | [1st ed. 2020.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
| Descrizione fisica | 1 online resource (415 pages) : illustrations |
| Disciplina | 005.8 |
| Collana | Security and Cryptology |
| Soggetto topico |
Data protection
Database management Computer networks Artificial intelligence Data and Information Security Database Management System Computer Communication Networks Artificial Intelligence |
| ISBN | 3-030-45371-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Machine Learning Approaches -- PAC: Privacy-preserving Arrhythmia Classi cation with neural networks -- Ransomware Network Traffic Analysis for Pre-Encryption Alert -- Using Machine Learning to Detect Anomalies in Embedded Networks in Heavy Vehicles -- Selection and performance analysis of CICIDS2017 features importance -- Semantic Representation Based on Deep Learning for Spam Detection -- Interpreting Machine Learning Malware Detectors Which Leverage N-gram Analysis -- Labelled Network Capture Generation For Anomaly Detection -- Attack Prevention and Trustworthiness -- Lempel-Ziv Compression with Randomized Input-Output for Anti-Compression Side-Channel Attacks under HTTPS/TLS -- Secure Logging with Security against Adaptive Crash Attack -- Enroll, and Authentication will Follow: eID-based Enrollment for a Customized, Secure, and Frictionless Authentication Experience -- TATIS: Trustworthy APIs for Threat Intelligence Sharing with UMA and CP-ABE -- Protecting Android Apps from Repackaging Using Native Code -- Access Control Models and Cryptography -- Command Dependencies in Heuristic Safety Analysis of Access Control Models -- On Attribute Retrieval in ABAC -- Incorporating O -Line Attribute Delegation into Hierarchical Group and Attribute-Based Access Control -- U-EPS: An Ultra-small and Efficient Post-quantum Signature Scheme -- An Efficient Identification Scheme Based on Rank Metric -- Security Analysis of Auctionity: a blockchain based e-auction -- Dynamic Searchable Encryption with Access Control -- Short Papers -- Get-your-ID: Decentralized Proof of Identity -- Towards secure TMIS protocols -- Detecting Ransomware in Encrypted Web Traffic -- Digital forensics in vessel transportation systems -- A Privacy Protection Layer for Wearable Devices -- Validating the DFA Attack Resistance of AES -- A rejection-based approach for detecting SQL injection vulnerabilities in Web applications -- Lightweight IoT Mutual Authentication Scheme based on Transient Identities and Transactions History -- Towards Privacy-Aware Smart Surveillance. |
| Record Nr. | UNINA-9910409672503321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||