top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Computer Security – ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part III / / edited by Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya
Computer Security – ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part III / / edited by Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya
Autore Nicomette Vincent
Edizione [1st ed. 2026.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2026
Descrizione fisica 1 online resource (833 pages)
Disciplina 005.8
Altri autori (Persone) BenzekriAbdelmalek
Boulahia-CuppensNora
VaidyaJaideep
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Cryptography
Data encryption (Computer science)
Computer networks - Security measures
Computer networks
Computer systems
Data and Information Security
Cryptology
Security Services
Mobile and Network Security
Computer Communication Networks
Computer System Implementation
ISBN 3-032-07894-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto -- QUIC-Fuzz: An Effective Greybox Fuzzer For The QUIC Protocol. -- Systematic Assessment of Cache Timing Vulnerabilities on RISC-V Processors. -- No Root, No Problem: Automating Linux Least Privilege and Securing Ansible Deployments. -- NICraft: Malicious NIC Firmware-based Cache Side-channel Attack. -- Identifying Potential Timing Leakages from Hardware Design with Precondition Synthesis. -- LibAFLstar: Fast and State-aware Protocol Fuzzing. -- PUSH for Security: A PUF-Based Protocol to Prevent Session Hijacking. -- Hardening HSM Clusters: Resolving Key Sync Vulnerabilities for Robust CU Isolation. -- AcouListener: An Inaudible Acoustic Side-channel Attack on AR/VR Systems. -- Verifying DRAM Addressing in Software. -- Epistemology of Rowhammer Attacks: Threats to Rowhammer Research Validity. -- Personalized Password Guessing via Modeling Multiple Leaked Credentials of the Same User. -- WelkIR: Flow-Sensitive Pre-trained Embeddings from Compiler IR for Vulnerability Detection. -- Edge Coverage Feedback of Embedded Systems Fuzzing Based on Debugging Interfaces. -- Cache Demote for Fast Eviction Set Construction and Page Table Attribute Leakage. -- WaitWatcher & WaitGuard: Detecting Flush-Based Cache Side-Channels through Spurious Wakeups. -- T-Time: A Fine-grained Timing-based Controlled-Channel Attack against Intel TDX. -- Unraveling DoH Traces: Padding-Resilient Website Fingerprinting via HTTP/2 Key Frame Sequences. -- NLSaber: Enhancing Netlink Family Fuzzing via Automated Syscall Description Generation. -- The Hidden Dangers of Public Serverless Repositories: An Empirical Security Assessment. -- CapMan: Detecting and Mitigating Linux Capability Abuses at Runtime to Secure Privileged Containers. -- Digital Twin for Adaptive Adversary Emulation in IIoT Control Networks. -- Formal Security Analysis of ss2DNS. -- High-Efficiency Fuzzing Technique Using Hooked I/O System Calls for Targeted Input Analysis. -- VeriFLo: Verifiable Provenance with Fault Localization for Inter-domain Routing. -- The Polymorphism Maze: Understanding Diversities and Similarities in Malware Families. -- End-to-End Non-Profiled Side-Channel Analysis on Long Raw Traces.
Record Nr. UNINA-9911047682003321
Nicomette Vincent  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2026
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer Security – ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part I / / edited by Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya
Computer Security – ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part I / / edited by Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya
Autore Nicomette Vincent
Edizione [1st ed. 2026.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2026
Descrizione fisica 1 online resource (793 pages)
Disciplina 005.8
Altri autori (Persone) BenzekriAbdelmalek
Boulahia-CuppensNora
VaidyaJaideep
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Cryptography
Data encryption (Computer science)
Computer networks - Security measures
Computer networks
Computer systems
Data and Information Security
Cryptology
Security Services
Mobile and Network Security
Computer Communication Networks
Computer System Implementation
ISBN 3-032-07884-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto -- Time-Distributed Backdoor Attacks on Federated Spiking Learning. -- TATA: Benchmark NIDS Test Sets Assessment and Targeted Augmentation. -- Abuse-Resistant Evaluation of AI-as-a-Service via Function-Hiding Homomorphic Signatures. -- PriSM: A Privacy-friendly Support vector Machine. -- Towards Context-Aware Log Anomaly Detection Using Fine-Tuned Large Language Models. -- PROTEAN: Federated Intrusion Detection in Non-IID Environments through Prototype-Based Knowledge Sharing. -- KeTS: Kernel-based Trust Segmentation against Model Poisoning Attacks. -- Machine Learning Vulnerabilities in 6G: Adversarial Attacks and Their Impact on Channel Gain Prediction and Resource Allocation in UC-CF-mMIMO. -- FuncVul: An Effective Function Level Vulnerability Detection Model using LLM and Code Chunk. -- LUMIA: Linear probing for Unimodal and MultiModal Membership Inference Attacks leveraging internal LLM states. -- Membership Privacy Evaluation in Deep Spiking Neural Networks. -- DUMB and DUMBer: Is Adversarial Training Worth It in the Real World?. -- Countering Jailbreak Attacks with Two-Axis Pre-Detection and Conditional Warning Wrappers. -- How Dataset Diversity Affects Generalization in ML-based NIDS. -- Llama-based source code vulnerability detection: Prompt engineering vs Finetuning. -- DBBA: Diffusion-based Backdoor Attacks on Open-set Face Recognition Models. -- Evaluation of Autonomous Intrusion Response Agents In Adversarial and Normal Scenarios. -- Trigger-Based Fragile Model Watermarking for Image Transformation Networks. -- Let the Noise Speak: Harnessing Noise for a Unified Defense Against Adversarial and Backdoor Attacks. -- On the Adversarial Robustness of Graph Neural Networks with Graph Reduction. -- SecureT2I: No More Unauthorized Manipulation on AI Generated Images from Prompts. -- GANSec: Enhancing Supervised Wireless Anomaly Detection Robustness through Tailored Conditional GAN Augmentation. -- Fine-Grained Data Poisoning Attack to Local Differential Privacy Protocols for Key-Value Data. -- The DCR Delusion: Measuring the Privacy Risk of Synthetic Data. -- StructTransform: A Scalable Attack Surface for Safety-Aligned Large Language Models.
Record Nr. UNISA-996691666303316
Nicomette Vincent  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2026
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computer Security – ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part IV / / edited by Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya
Computer Security – ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part IV / / edited by Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya
Autore Nicomette Vincent
Edizione [1st ed. 2026.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2026
Descrizione fisica 1 online resource (753 pages)
Disciplina 005.8
Altri autori (Persone) BenzekriAbdelmalek
Boulahia-CuppensNora
VaidyaJaideep
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Cryptography
Data encryption (Computer science)
Computer networks - Security measures
Computer networks
Computer systems
Data and Information Security
Cryptology
Security Services
Mobile and Network Security
Computer Communication Networks
Computer System Implementation
ISBN 3-032-07901-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto -- Transparency and Consent Challenges in mHealth Apps: An Interdisciplinary Study of Privacy Policies, Data Sharing, and Dark Patterns. -- Don’t Hash Me Like That: Exposing and Mitigating Hash-Induced Unfairness in Local Differential Privacy. -- Functional Credentials: a Practical Construction for the European Digital Identity. -- Privacy-Preserving k-Nearest Neighbor Query: Faster and More Secure. -- Breaking verifiability and vote privacy in CHVote. -- Zero-Click SnailLoad: From Minimal to No User Interaction. -- Analysis of input-output mappings in coinjoin transactions with arbitrary values. -- Email Cloaking: Deceiving Users and Spam Email Detectors with Invisible HTML Settings. -- BlowPrint: Blow-Based Multi-Factor Biometrics for Smartphone User Authentication. -- GET-AID: Graph-Enhanced Transformer for Provenance-based Advanced Persistent Threats Investigation and Detection. -- The Economics of Deception: Structural Patterns of Rug Pull across DeFi Blockchains. -- Privacy-Preserving Trajectory Data Publication Via Differentially-Private Representation Learning. -- Fine-grained, privacy-augmenting, LI-compliance in the LAKE standard. -- RIPOST: Two-Phase Private Decomposition for Multidimensional Data. -- Correcting the Record on Leakage Abuse Attacks: Revisiting the Subgraph Attacks with Sound Evaluation. -- Efficient and Secure Sleepy Model for BFT Consensus. -- An Algebraic Approach to Asymmetric Delegation and Polymorphic Label Inference. -- An Efficient Security-enhanced Accountable Access Control for Named Data Networking. -- Dobby: A Privacy-Preserving Time Series Data Analytics System with Enforcement of Flexible Policies. -- A User-Centric, Privacy-Preserving, and Verifiable Ecosystem for Personal Data Management and Utilization. -- Imitater: An Efficient Shared Mempool Protocol with Application to Byzantine Fault Tolerance. -- Premining in the Shadows: How Hidden Blocks Weaken the Security of Proof-of-Work Chains.
Record Nr. UNINA-9911047656503321
Nicomette Vincent  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2026
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer Security – ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part II / / edited by Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya
Computer Security – ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part II / / edited by Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya
Autore Nicomette Vincent
Edizione [1st ed. 2026.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2026
Descrizione fisica 1 online resource (0 pages)
Disciplina 005.8
Altri autori (Persone) BenzekriAbdelmalek
Boulahia-CuppensNora
VaidyaJaideep
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Cryptography
Data encryption (Computer science)
Computer networks - Security measures
Computer networks
Computer systems
Data and Information Security
Cryptology
Security Services
Mobile and Network Security
Computer Communication Networks
Computer System Implementation
ISBN 3-032-07891-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto -- A Certified-Input Mixnet from Two-Party Mercurial Signatures on Randomizable Ciphertexts. -- Tetris! Traceable Extendable Threshold Ring Signatures and More. -- Efficient One-Pass Private Set Intersection from Pairings with Offline Preprocessing. -- Practical Robust Dynamic Searchable Symmetric Encryption Supporting Conjunctive Queries. -- Security Analysis of Covercrypt: A Quantum-Safe Hybrid Key Encapsulation Mechanism for Hidden Access Policies. -- Anamorphic Monero Transactions: the Threat of Bypassing Anti-Money Laundering Laws. -- Hyperion: Transparent End-to-End Verifiable Voting with Coercion Mitigation. -- Two-Factor Authenticated Key Exchange with Enhanced Security from Post-Quantum Assumptions. -- Concretely Efficient Parallel-accessible DORAM for 100K-sized Array. -- A Symbolic Analysis of Hash Functions Vulnerabilities in Maude-NPA. -- A post-quantum Distributed OPRF from the Legendre PRF. -- TERRA: Trojan-Resilient Reverse-Firewall for Cryptographic Applications. -- Reaction Attack on TFHE: Minimum Number of Oracle Queries and Nearly Optimum Attacking Scheme. -- Predicate-Private Asymmetric Searchable Encryption for Conjunctions from Lattices. -- DEBridge: Towards Secure and Practical Plausibly Deniable Encryption Based on USB Bridge Controller. -- Formalisation of KZG commitment schemes in EasyCrypt. -- UTRA: Universal Token Reusability Attack and Token Unforgeable Delegatable Order-Revealing Encryption. -- Enhanced Key Mismatch Attacks on Lattice-Based KEMs: Multi-bit Inference and Ciphertext Generalization. -- Code Encryption with Intel TME-MK for Control-Flow Enforcement. -- Optimized Privacy-Preserving Multi-Signatures from Discrete Logarithm Assumption. -- Polylogarithmic Polynomial Commitment Scheme over Galois Rings. -- Efficient Homomorphic Evaluation for Non-Polynomial Functions. -- Athena: Accelerating KeySwitch and Bootstrapping for Fully Homomorphic Encryption on CUDA GPU. -- Formally-verified Security against Forgery of Remote Attestation using SSProve. -- SafePath: Encryption-less On-demand Input Path Protection for Mobile Devices. -- Extending Groth16 for Disjunctive Statements.
Record Nr. UNINA-9911046554303321
Nicomette Vincent  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2026
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer Security – ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part II / / edited by Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya
Computer Security – ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part II / / edited by Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya
Autore Nicomette Vincent
Edizione [1st ed. 2026.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2026
Descrizione fisica 1 online resource (0 pages)
Disciplina 005.8
Altri autori (Persone) BenzekriAbdelmalek
Boulahia-CuppensNora
VaidyaJaideep
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Cryptography
Data encryption (Computer science)
Computer networks - Security measures
Computer networks
Computer systems
Data and Information Security
Cryptology
Security Services
Mobile and Network Security
Computer Communication Networks
Computer System Implementation
ISBN 3-032-07891-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto -- A Certified-Input Mixnet from Two-Party Mercurial Signatures on Randomizable Ciphertexts. -- Tetris! Traceable Extendable Threshold Ring Signatures and More. -- Efficient One-Pass Private Set Intersection from Pairings with Offline Preprocessing. -- Practical Robust Dynamic Searchable Symmetric Encryption Supporting Conjunctive Queries. -- Security Analysis of Covercrypt: A Quantum-Safe Hybrid Key Encapsulation Mechanism for Hidden Access Policies. -- Anamorphic Monero Transactions: the Threat of Bypassing Anti-Money Laundering Laws. -- Hyperion: Transparent End-to-End Verifiable Voting with Coercion Mitigation. -- Two-Factor Authenticated Key Exchange with Enhanced Security from Post-Quantum Assumptions. -- Concretely Efficient Parallel-accessible DORAM for 100K-sized Array. -- A Symbolic Analysis of Hash Functions Vulnerabilities in Maude-NPA. -- A post-quantum Distributed OPRF from the Legendre PRF. -- TERRA: Trojan-Resilient Reverse-Firewall for Cryptographic Applications. -- Reaction Attack on TFHE: Minimum Number of Oracle Queries and Nearly Optimum Attacking Scheme. -- Predicate-Private Asymmetric Searchable Encryption for Conjunctions from Lattices. -- DEBridge: Towards Secure and Practical Plausibly Deniable Encryption Based on USB Bridge Controller. -- Formalisation of KZG commitment schemes in EasyCrypt. -- UTRA: Universal Token Reusability Attack and Token Unforgeable Delegatable Order-Revealing Encryption. -- Enhanced Key Mismatch Attacks on Lattice-Based KEMs: Multi-bit Inference and Ciphertext Generalization. -- Code Encryption with Intel TME-MK for Control-Flow Enforcement. -- Optimized Privacy-Preserving Multi-Signatures from Discrete Logarithm Assumption. -- Polylogarithmic Polynomial Commitment Scheme over Galois Rings. -- Efficient Homomorphic Evaluation for Non-Polynomial Functions. -- Athena: Accelerating KeySwitch and Bootstrapping for Fully Homomorphic Encryption on CUDA GPU. -- Formally-verified Security against Forgery of Remote Attestation using SSProve. -- SafePath: Encryption-less On-demand Input Path Protection for Mobile Devices. -- Extending Groth16 for Disjunctive Statements.
Record Nr. UNISA-996691666003316
Nicomette Vincent  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2026
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computer Security – ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part IV / / edited by Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya
Computer Security – ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part IV / / edited by Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya
Autore Nicomette Vincent
Edizione [1st ed. 2026.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2026
Descrizione fisica 1 online resource (753 pages)
Disciplina 005.8
Altri autori (Persone) BenzekriAbdelmalek
Boulahia-CuppensNora
VaidyaJaideep
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Cryptography
Data encryption (Computer science)
Computer networks - Security measures
Computer networks
Computer systems
Data and Information Security
Cryptology
Security Services
Mobile and Network Security
Computer Communication Networks
Computer System Implementation
ISBN 3-032-07901-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto -- Transparency and Consent Challenges in mHealth Apps: An Interdisciplinary Study of Privacy Policies, Data Sharing, and Dark Patterns. -- Don’t Hash Me Like That: Exposing and Mitigating Hash-Induced Unfairness in Local Differential Privacy. -- Functional Credentials: a Practical Construction for the European Digital Identity. -- Privacy-Preserving k-Nearest Neighbor Query: Faster and More Secure. -- Breaking verifiability and vote privacy in CHVote. -- Zero-Click SnailLoad: From Minimal to No User Interaction. -- Analysis of input-output mappings in coinjoin transactions with arbitrary values. -- Email Cloaking: Deceiving Users and Spam Email Detectors with Invisible HTML Settings. -- BlowPrint: Blow-Based Multi-Factor Biometrics for Smartphone User Authentication. -- GET-AID: Graph-Enhanced Transformer for Provenance-based Advanced Persistent Threats Investigation and Detection. -- The Economics of Deception: Structural Patterns of Rug Pull across DeFi Blockchains. -- Privacy-Preserving Trajectory Data Publication Via Differentially-Private Representation Learning. -- Fine-grained, privacy-augmenting, LI-compliance in the LAKE standard. -- RIPOST: Two-Phase Private Decomposition for Multidimensional Data. -- Correcting the Record on Leakage Abuse Attacks: Revisiting the Subgraph Attacks with Sound Evaluation. -- Efficient and Secure Sleepy Model for BFT Consensus. -- An Algebraic Approach to Asymmetric Delegation and Polymorphic Label Inference. -- An Efficient Security-enhanced Accountable Access Control for Named Data Networking. -- Dobby: A Privacy-Preserving Time Series Data Analytics System with Enforcement of Flexible Policies. -- A User-Centric, Privacy-Preserving, and Verifiable Ecosystem for Personal Data Management and Utilization. -- Imitater: An Efficient Shared Mempool Protocol with Application to Byzantine Fault Tolerance. -- Premining in the Shadows: How Hidden Blocks Weaken the Security of Proof-of-Work Chains.
Record Nr. UNISA-996691665803316
Nicomette Vincent  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2026
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computer Security – ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part III / / edited by Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya
Computer Security – ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part III / / edited by Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya
Autore Nicomette Vincent
Edizione [1st ed. 2026.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2026
Descrizione fisica 1 online resource (833 pages)
Disciplina 005.8
Altri autori (Persone) BenzekriAbdelmalek
Boulahia-CuppensNora
VaidyaJaideep
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Cryptography
Data encryption (Computer science)
Computer networks - Security measures
Computer networks
Computer systems
Data and Information Security
Cryptology
Security Services
Mobile and Network Security
Computer Communication Networks
Computer System Implementation
ISBN 3-032-07894-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto -- QUIC-Fuzz: An Effective Greybox Fuzzer For The QUIC Protocol. -- Systematic Assessment of Cache Timing Vulnerabilities on RISC-V Processors. -- No Root, No Problem: Automating Linux Least Privilege and Securing Ansible Deployments. -- NICraft: Malicious NIC Firmware-based Cache Side-channel Attack. -- Identifying Potential Timing Leakages from Hardware Design with Precondition Synthesis. -- LibAFLstar: Fast and State-aware Protocol Fuzzing. -- PUSH for Security: A PUF-Based Protocol to Prevent Session Hijacking. -- Hardening HSM Clusters: Resolving Key Sync Vulnerabilities for Robust CU Isolation. -- AcouListener: An Inaudible Acoustic Side-channel Attack on AR/VR Systems. -- Verifying DRAM Addressing in Software. -- Epistemology of Rowhammer Attacks: Threats to Rowhammer Research Validity. -- Personalized Password Guessing via Modeling Multiple Leaked Credentials of the Same User. -- WelkIR: Flow-Sensitive Pre-trained Embeddings from Compiler IR for Vulnerability Detection. -- Edge Coverage Feedback of Embedded Systems Fuzzing Based on Debugging Interfaces. -- Cache Demote for Fast Eviction Set Construction and Page Table Attribute Leakage. -- WaitWatcher & WaitGuard: Detecting Flush-Based Cache Side-Channels through Spurious Wakeups. -- T-Time: A Fine-grained Timing-based Controlled-Channel Attack against Intel TDX. -- Unraveling DoH Traces: Padding-Resilient Website Fingerprinting via HTTP/2 Key Frame Sequences. -- NLSaber: Enhancing Netlink Family Fuzzing via Automated Syscall Description Generation. -- The Hidden Dangers of Public Serverless Repositories: An Empirical Security Assessment. -- CapMan: Detecting and Mitigating Linux Capability Abuses at Runtime to Secure Privileged Containers. -- Digital Twin for Adaptive Adversary Emulation in IIoT Control Networks. -- Formal Security Analysis of ss2DNS. -- High-Efficiency Fuzzing Technique Using Hooked I/O System Calls for Targeted Input Analysis. -- VeriFLo: Verifiable Provenance with Fault Localization for Inter-domain Routing. -- The Polymorphism Maze: Understanding Diversities and Similarities in Malware Families. -- End-to-End Non-Profiled Side-Channel Analysis on Long Raw Traces.
Record Nr. UNISA-996691663503316
Nicomette Vincent  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2026
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computer Security – ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part I / / edited by Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya
Computer Security – ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part I / / edited by Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya
Autore Nicomette Vincent
Edizione [1st ed. 2026.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2026
Descrizione fisica 1 online resource (793 pages)
Disciplina 005.8
Altri autori (Persone) BenzekriAbdelmalek
Boulahia-CuppensNora
VaidyaJaideep
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Cryptography
Data encryption (Computer science)
Computer networks - Security measures
Computer networks
Computer systems
Data and Information Security
Cryptology
Security Services
Mobile and Network Security
Computer Communication Networks
Computer System Implementation
ISBN 3-032-07884-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto -- Time-Distributed Backdoor Attacks on Federated Spiking Learning. -- TATA: Benchmark NIDS Test Sets Assessment and Targeted Augmentation. -- Abuse-Resistant Evaluation of AI-as-a-Service via Function-Hiding Homomorphic Signatures. -- PriSM: A Privacy-friendly Support vector Machine. -- Towards Context-Aware Log Anomaly Detection Using Fine-Tuned Large Language Models. -- PROTEAN: Federated Intrusion Detection in Non-IID Environments through Prototype-Based Knowledge Sharing. -- KeTS: Kernel-based Trust Segmentation against Model Poisoning Attacks. -- Machine Learning Vulnerabilities in 6G: Adversarial Attacks and Their Impact on Channel Gain Prediction and Resource Allocation in UC-CF-mMIMO. -- FuncVul: An Effective Function Level Vulnerability Detection Model using LLM and Code Chunk. -- LUMIA: Linear probing for Unimodal and MultiModal Membership Inference Attacks leveraging internal LLM states. -- Membership Privacy Evaluation in Deep Spiking Neural Networks. -- DUMB and DUMBer: Is Adversarial Training Worth It in the Real World?. -- Countering Jailbreak Attacks with Two-Axis Pre-Detection and Conditional Warning Wrappers. -- How Dataset Diversity Affects Generalization in ML-based NIDS. -- Llama-based source code vulnerability detection: Prompt engineering vs Finetuning. -- DBBA: Diffusion-based Backdoor Attacks on Open-set Face Recognition Models. -- Evaluation of Autonomous Intrusion Response Agents In Adversarial and Normal Scenarios. -- Trigger-Based Fragile Model Watermarking for Image Transformation Networks. -- Let the Noise Speak: Harnessing Noise for a Unified Defense Against Adversarial and Backdoor Attacks. -- On the Adversarial Robustness of Graph Neural Networks with Graph Reduction. -- SecureT2I: No More Unauthorized Manipulation on AI Generated Images from Prompts. -- GANSec: Enhancing Supervised Wireless Anomaly Detection Robustness through Tailored Conditional GAN Augmentation. -- Fine-Grained Data Poisoning Attack to Local Differential Privacy Protocols for Key-Value Data. -- The DCR Delusion: Measuring the Privacy Risk of Synthetic Data. -- StructTransform: A Scalable Attack Surface for Safety-Aligned Large Language Models.
Record Nr. UNINA-9911046532203321
Nicomette Vincent  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2026
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui