Computer Security – ESORICS 2012

17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings

  • Sara Foresti
  • Moti Yung
  • Fabio Martinelli
Conference proceedings ESORICS 2012

DOI: 10.1007/978-3-642-33167-1

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7459)

Table of contents (50 papers)

  1. Front Matter
  2. Security and Data Protection in Real Systems

    1. Modeling and Enhancing Android’s Permission System
      Elli Fragkaki, Lujo Bauer, Limin Jia, David Swasey
      Pages 1-18
    2. Hardening Access Control and Data Protection in GFS-like File Systems
      James Kelley, Roberto Tamassia, Nikos Triandopoulos
      Pages 19-36
    3. Attack of the Clones: Detecting Cloned Applications on Android Markets
      Jonathan Crussell, Clint Gibler, Hao Chen
      Pages 37-54
    4. Boosting the Permissiveness of Dynamic Information-Flow Tracking by Testing
      Arnar Birgisson, Daniel Hedin, Andrei Sabelfeld
      Pages 55-72
  3. Formal Models for Cryptography and Access Control

    1. Effective Symbolic Protocol Analysis via Equational Irreducibility Conditions
      Serdar Erbatur, Santiago Escobar, Deepak Kapur, Zhiqiang Liu, Christopher Lynch, Catherine Meadows et al.
      Pages 73-90
    2. Deciding Security for a Fragment of ASLan
      Sebastian Mödersheim
      Pages 127-144
  4. Security and Privacy in Mobile and Wireless Networks

    1. A Probabilistic Framework for Localization of Attackers in MANETs
      Massimiliano Albanese, Alessandra De Benedictis, Sushil Jajodia, Paulo Shakarian
      Pages 145-162
    2. Robust Probabilistic Fake Packet Injection for Receiver-Location Privacy in WSN
      Ruben Rios, Jorge Cuellar, Javier Lopez
      Pages 163-180
    3. Privacy-Aware Message Exchanges for Geographically Routed Human Movement Networks
      Adam J. Aviv, Micah Sherr, Matt Blaze, Jonathan M. Smith
      Pages 181-198
  5. Counteracting Man-in-the-Middle Attacks

    1. Trust No One Else: Detecting MITM Attacks against SSL/TLS without Third-Parties
      Italo Dacosta, Mustaque Ahamad, Patrick Traynor
      Pages 199-216
    2. X.509 Forensics: Detecting and Localising the SSL/TLS Men-in-the-Middle
      Ralph Holz, Thomas Riedmaier, Nils Kammenhuber, Georg Carle
      Pages 217-234
    3. A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols
      Simon Eberz, Martin Strohmeier, Matthias Wilhelm, Ivan Martinovic
      Pages 235-252
  6. Network Security

    1. The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs
      Ahmad-Reza Sadeghi, Steffen Schulz, Vijay Varadharajan
      Pages 253-270
    2. Security of Patched DNS
      Amir Herzberg, Haya Shulman
      Pages 271-288
  7. Users Privacy and Anonymity

    1. Exploring Linkability of User Reviews
      Mishari Almishari, Gene Tsudik
      Pages 307-324
    2. Formal Analysis of Privacy in an eHealth Protocol
      Naipeng Dong, Hugo Jonker, Jun Pang
      Pages 325-342

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 17th European Symposium on Computer Security, ESORICS 2012, held in Pisa, Italy, in September 2012. The 50 papers included in the book were carefully reviewed and selected from 248 papers. The articles are organized in topical sections on security and data protection in real systems; formal models for cryptography and access control; security and privacy in mobile and wireless networks; counteracting man-in-the-middle attacks; network security; users privacy and anonymity; location privacy; voting protocols and anonymous communication; private computation in cloud systems; formal security models; identity based encryption and group signature; authentication; encryption key and password security; malware and phishing; and software security.

Keywords

Android authentication protocols cloud computing security and privacy wireless networks

Editors and affiliations

  • Sara Foresti
    • 1
  • Moti Yung
    • 2
  • Fabio Martinelli
    • 3
  1. 1.Dipartimento di InformaticaUniversità degli Studi di MilanoCremaItaly
  2. 2.Computer Science DepartmentColumbia UniversityNew YorkUS
  3. 3.Institute of Informatics and Telematics, Information Security GroupNational Research CouncilPisaItaly

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-33166-4
  • Online ISBN 978-3-642-33167-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349