Stateful Protocol Composition (English)
- New search for: Hess, Andreas V.
- Further information on Hess, Andreas V.:
-
https://orcid.org/http://orcid.org/0000-0001-6312-6311
- New search for: Mödersheim, Sebastian A.
- Further information on Mödersheim, Sebastian A.:
-
https://orcid.org/http://orcid.org/0000-0002-6901-8319
- New search for: Brucker, Achim D.
- Further information on Brucker, Achim D.:
-
https://orcid.org/http://orcid.org/0000-0002-6355-1200
- New search for: Lopez, Javier
- New search for: Zhou, Jianying
- New search for: Soriano, Miguel
- New search for: Hess, Andreas V.
- Further information on Hess, Andreas V.:
-
https://orcid.org/http://orcid.org/0000-0001-6312-6311
- New search for: Mödersheim, Sebastian A.
- Further information on Mödersheim, Sebastian A.:
-
https://orcid.org/http://orcid.org/0000-0002-6901-8319
- New search for: Brucker, Achim D.
- Further information on Brucker, Achim D.:
-
https://orcid.org/http://orcid.org/0000-0002-6355-1200
In:
Computer Security
: 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I
;
Chapter: 21
;
427-446
;
2018
- Article/Chapter (Book) / Electronic Resource
-
Title:Stateful Protocol Composition
-
Additional title:Lect.Notes Computer
-
Contributors:Lopez, Javier ( editor ) / Zhou, Jianying ( editor ) / Soriano, Miguel ( editor ) / Hess, Andreas V. ( author ) / Mödersheim, Sebastian A. ( author ) / Brucker, Achim D. ( author )
-
Conference:European Symposium on Research in Computer Security ; 2018 ; Barcelona, Spain
-
Published in:Computer Security : 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I ; Chapter: 21 ; 427-446Lecture Notes in Computer Science ; 11098 ; 427-446Security and Cryptology ; 427-446
-
Publisher:
- New search for: Springer International Publishing
-
Place of publication:Cham
-
Publication date:2018-08-08
-
Size:20 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
CastSan: Efficient Detection of Polymorphic C++ Object Type Confusions with LLVMMuntean, Paul / Wuerl, Sebastian / Grossklags, Jens / Eckert, Claudia et al. | 2018
- 2
-
On Leveraging Coding Habits for Effective Binary Authorship AttributionAlrabaee, Saed / Shirani, Paria / Wang, Lingyu / Debbabi, Mourad / Hanna, Aiman et al. | 2018
- 3
-
Synthesis of a Permissive Security MonitorKhakpour, Narges / Skandylas, Charilaos et al. | 2018
- 4
-
MobileFindr: Function Similarity Identification for Reversing Mobile BinariesLiao, Yibin / Cai, Ruoyan / Zhu, Guodong / Yin, Yue / Li, Kang et al. | 2018
- 5
-
Strain: A Secure Auction for BlockchainsBlass, Erik-Oliver / Kerschbaum, Florian et al. | 2018
- 6
-
Channels: Horizontal Scaling and Confidentiality on Permissioned BlockchainsAndroulaki, Elli / Cachin, Christian / De Caro, Angelo / Kokoris-Kogias, Eleftherios et al. | 2018
- 7
-
Stay On-Topic: Generating Context-Specific Fake Restaurant ReviewsJuuti, Mika / Sun, Bo / Mori, Tatsuya / Asokan, N. et al. | 2018
- 8
-
Efficient Proof Composition for Verifiable ComputationKeuffer, Julien / Molva, Refik / Chabanne, Hervé et al. | 2018
- 9
-
Navigating the Samsung TrustZone and Cache-Attacks on the Keymaster TrustletLapid, Ben / Wool, Avishai et al. | 2018
- 10
-
Combination of Hardware and Software: An Efficient AES Implementation Resistant to Side-Channel Attacks on All Programmable SoCGe, Jingquan / Gao, Neng / Tu, Chenyang / Xiang, Ji / Liu, Zeyi / Yuan, Jun et al. | 2018
- 11
-
How Secure Is Green IT? The Case of Software-Based Energy Side ChannelsMantel, Heiko / Schickel, Johannes / Weber, Alexandra / Weber, Friedrich et al. | 2018
- 12
-
Phishing Attacks Modifications and EvolutionsCui, Qian / Jourdan, Guy-Vincent / Bochmann, Gregor V. / Onut, Iosif-Viorel / Flood, Jason et al. | 2018
- 13
-
SILK-TV: Secret Information Leakage from Keystroke Timing VideosBalagani, Kiran S. / Conti, Mauro / Gasti, Paolo / Georgiev, Martin / Gurtler, Tristan / Lain, Daniele / Miller, Charissa / Molas, Kendall / Samarin, Nikita / Saraci, Eugen et al. | 2018
- 14
-
A Formal Approach to Analyzing Cyber-Forensics EvidenceKarafili, Erisa / Cristani, Matteo / Viganò, Luca et al. | 2018
- 15
-
Beneath the Bonnet: A Breakdown of Diagnostic SecurityVan den Herrewegen, Jan / Garcia, Flavio D. et al. | 2018
- 16
-
Extending Automated Protocol State Learning for the 802.11 4-Way HandshakeMcMahon Stone, Chris / Chothia, Tom / de Ruiter, Joeri et al. | 2018
- 17
-
Automatic Detection of Various Malicious Traffic Using Side Channel Features on TCP PacketsStergiopoulos, George / Talavari, Alexander / Bitsikas, Evangelos / Gritzalis, Dimitris et al. | 2018
- 18
-
PwIN – Pwning Intel piN: Why DBI is Unsuitable for Security ApplicationsKirsch, Julian / Zhechev, Zhechko / Bierbaumer, Bruno / Kittel, Thomas et al. | 2018
- 19
-
POR for Security Protocol EquivalencesBaelde, David / Delaune, Stéphanie / Hirschi, Lucca et al. | 2018
- 20
-
Automated Identification of Desynchronisation Attacks on Shared SecretsMauw, Sjouke / Smith, Zach / Toro-Pozo, Jorge / Trujillo-Rasua, Rolando et al. | 2018
- 21
-
Stateful Protocol CompositionHess, Andreas V. / Mödersheim, Sebastian A. / Brucker, Achim D. et al. | 2018
- 22
-
Towards Understanding Privacy Implications of Adware and Potentially Unwanted ProgramsUrban, Tobias / Tatang, Dennis / Holz, Thorsten / Pohlmann, Norbert et al. | 2018
- 23
-
Anonymous Single-Sign-On for n Designated Services with TraceabilityHan, Jinguang / Chen, Liqun / Schneider, Steve / Treharne, Helen / Wesemeyer, Stephan et al. | 2018
- 24
-
Efficiently Deciding Equivalence for Standard Primitives and PhasesCortier, Véronique / Dallon, Antoine / Delaune, Stéphanie et al. | 2018
- 25
-
DigesTor: Comparing Passive Traffic Analysis Attacks on TorKohls, Katharina / Pöpper, Christina et al. | 2018
- 26
-
Deriving a Cost-Effective Digital Twin of an ICS to Facilitate Security EvaluationBitton, Ron / Gluck, Tomer / Stan, Orly / Inokuchi, Masaki / Ohta, Yoshinobu / Yamada, Yoshiyuki / Yagyu, Tomohiko / Elovici, Yuval / Shabtai, Asaf et al. | 2018
- 27
-
Tracking Advanced Persistent Threats in Critical Infrastructures Through Opinion DynamicsRubio, Juan E. / Roman, Rodrigo / Alcaraz, Cristina / Zhang, Yan et al. | 2018
- 28
-
Hide Your Hackable Smart Home from Remote Attacks: The Multipath Onion IoT GatewaysYang, Lei / Seasholtz, Chris / Luo, Bo / Li, Fengjun et al. | 2018
- 29
-
SCIoT: A Secure and sCalable End-to-End Management Framework for IoT DevicesAmbrosin, Moreno / Conti, Mauro / Ibrahim, Ahmad / Sadeghi, Ahmad-Reza / Schunter, Matthias et al. | 2018