Computer Security – ESORICS 2011

16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14,2011. Proceedings

  • Vijay Atluri
  • Claudia Diaz
Conference proceedings ESORICS 2011

DOI: 10.1007/978-3-642-23822-2

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6879)

Table of contents (36 papers)

  1. Front Matter
  2. Wireless Security

    1. Secure Localization Using Dynamic Verifiers
      Nashad A. Safa, Saikat Sarkar, Reihaneh Safavi-Naini, Majid Ghaderi
      Pages 1-20
    2. Investigation of Signal and Message Manipulations on the Wireless Channel
      Christina Pöpper, Nils Ole Tippenhauer, Boris Danev, Srdjan Capkun
      Pages 40-59
  3. Web Security I

    1. Protecting Private Web Content from Embedded Scripts
      Yuchen Zhou, David Evans
      Pages 60-79
    2. Automatic and Precise Client-Side Protection against CSRF Attacks
      Philippe De Ryck, Lieven Desmet, Wouter Joosen, Frank Piessens
      Pages 100-116
  4. Web Security II

    1. Reclaiming the Blogosphere, TalkBack: A Secure LinkBack Protocol for Weblogs
      Elie Bursztein, Baptiste Gourdin, John C. Mitchell
      Pages 133-149
    2. A Systematic Analysis of XSS Sanitization in Web Application Frameworks
      Joel Weinberger, Prateek Saxena, Devdatta Akhawe, Matthew Finifter, Richard Shin, Dawn Song
      Pages 150-171
  5. Forensics, Biometrics and Software Protection

    1. Who Wrote This Code? Identifying the Authors of Program Binaries
      Nathan Rosenblum, Xiaojin Zhu, Barton P. Miller
      Pages 172-189
    2. Linear Obfuscation to Combat Symbolic Execution
      Zhi Wang, Jiang Ming, Chunfu Jia, Debin Gao
      Pages 210-226
    3. DriverGuard: A Fine-Grained Protection on I/O Flows
      Yueqiang Cheng, Xuhua Ding, Robert H. Deng
      Pages 227-244
  6. Access Control

    1. Socially Constructed Trust for Distributed Authorization
      Steve Barker, Valerio Genovese
      Pages 262-277
    2. Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles
      Zhen Liu, Zhenfu Cao, Qiong Huang, Duncan S. Wong, Tsz Hon Yuen
      Pages 278-297
  7. Cryptography and Protocol Analysis

    1. How to Aggregate the CL Signature Scheme
      Dominique Schröder
      Pages 298-314
    2. Adapting Helios for Provable Ballot Privacy
      David Bernhard, Véronique Cortier, Olivier Pereira, Ben Smyth, Bogdan Warinschi
      Pages 335-354

About these proceedings


This book constitutes the refereed proceedings of the 16th European Symposium on Computer Security, ESORICS 2011, held in Leuven, Belgium, in September 2011. The 36 papers included in the book were carefully reviewed and selected from 155 papers. The articles are organized in topical sections on wireless security; Web security; forensics, biometrics and software protection; access control; cryptography and protocol analysis; information flow, side channels, and vulnerability analysis; usability, trust, and economics of security and privacy; and privacy.


anonymity elliptic curve cryptography malware analysis sandbox software obfuscation

Editors and affiliations

  • Vijay Atluri
    • 1
  • Claudia Diaz
    • 2
  1. 1.MSIS Department and CIMICRutgers UniversityNewarkUSA
  2. 2.K.U. Leuven ESAT-COSICLeuven-HeverleeBelgium

Bibliographic information

  • Copyright Information Springer-Verlag GmbH Berlin Heidelberg 2011
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-23821-5
  • Online ISBN 978-3-642-23822-2
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349