Computer Security – ESORICS 2013

18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings

  • Jason Crampton
  • Sushil Jajodia
  • Keith Mayes
Conference proceedings ESORICS 2013

DOI: 10.1007/978-3-642-40203-6

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8134)

Table of contents (43 papers)

  1. Front Matter
  2. Cryptography and Computation

    1. Practical Covertly Secure MPC for Dishonest Majority – Or: Breaking the SPDZ Limits
      Ivan Damgård, Marcel Keller, Enrique Larraia, Valerio Pastro, Peter Scholl, Nigel P. Smart
      Pages 1-18
    2. Practical and Employable Protocols for UC-Secure Circuit Evaluation over ℤn
      Jan Camenisch, Robert R. Enderlein, Victor Shoup
      Pages 19-37
    3. Privacy-Preserving Accountable Computation
      Michael Backes, Dario Fiore, Esfandiar Mohammadi
      Pages 38-56
  3. Measurement and Evaluation

    1. Verifying Web Browser Extensions’ Compliance with Private-Browsing Mode
      Benjamin S. Lerner, Liam Elberty, Neal Poole, Shriram Krishnamurthi
      Pages 57-74
    2. A Quantitative Evaluation of Privilege Separation in Web Browser Designs
      Xinshu Dong, Hong Hu, Prateek Saxena, Zhenkai Liang
      Pages 75-93
    3. Estimating Asset Sensitivity by Profiling Users
      Youngja Park, Christopher Gates, Stephen C. Gates
      Pages 94-110
  4. Applications of Cryptography

    1. Practical Secure Logging: Seekable Sequential Key Generators
      Giorgia Azzurra Marson, Bertram Poettering
      Pages 111-128
    2. Request-Based Comparable Encryption
      Jun Furukawa
      Pages 129-146
  5. Code Analysis

    1. HI-CFG: Construction by Binary Analysis and Application to Attack Polymorphism
      Dan Caselden, Alex Bazhanyuk, Mathias Payer, Stephen McCamant, Dawn Song
      Pages 164-181
    2. AnDarwin: Scalable Detection of Semantically Similar Android Applications
      Jonathan Crussell, Clint Gibler, Hao Chen
      Pages 182-199
  6. Network Security

    1. Vulnerable Delegation of DNS Resolution
      Amir Herzberg, Haya Shulman
      Pages 219-236
    2. Formal Approach for Route Agility against Persistent Attackers
      Jafar Haadi Jafarian, Ehab Al-Shaer, Qi Duan
      Pages 237-254
    3. Plug-and-Play IP Security
      Yossi Gilad, Amir Herzberg
      Pages 255-272
  7. Formal Models and Methods

    1. Managing the Weakest Link
      Aron Laszka, Benjamin Johnson, Pascal Schöttle, Jens Grossklags, Rainer Böhme
      Pages 273-290
    2. Automated Security Proofs for Almost-Universal Hash for MAC Verification
      Martin Gagné, Pascal Lafourcade, Yassine Lakhnech
      Pages 291-308
    3. Bounded Memory Protocols and Progressing Collaborative Systems
      Max Kanovich, Tajana Ban Kirigin, Vivek Nigam, Andre Scedrov
      Pages 309-326
    4. Universally Composable Key-Management
      Steve Kremer, Robert Künnemann, Graham Steel
      Pages 327-344

About these proceedings


This book constitutes the refereed proceedings of the 18th European Symposium on Computer Security, ESORICS 2013, held in Egham, UK, in September 2013.
The 43 papers included in the book were carefully reviewed and selected from 242 papers. The aim of ESORICS is to further the progress of research in computer security by establishing a European forum for bringing together researchers in this area, by promoting the exchange of ideas with system developers and by encouraging links with researchers in related areas. The papers cover all topics related to security, privacy and trust in computer systems and networks.


attacks cryptography mobile devices privacy preservation web browsers

Editors and affiliations

  • Jason Crampton
    • 1
  • Sushil Jajodia
    • 2
  • Keith Mayes
    • 1
  1. 1.Information Security GroupUniversity of London, Royal HollowayEgham HillUK
  2. 2.Center for Secure Information SystemsGeorge Mason UniversityFairfaxUSA

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2013
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-40202-9
  • Online ISBN 978-3-642-40203-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349