Skip to main content
  • Conference proceedings
  • © 2020

Computer Security – ESORICS 2020

25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14–18, 2020, Proceedings, Part II

Editors:

(view affiliations)

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 12309)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ESORICS: European Symposium on Research in Computer Security

Conference proceedings info: ESORICS 2020.

Buying options

eBook
USD 89.00
Price excludes VAT (USA)
  • ISBN: 978-3-030-59013-0
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD 119.99
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (36 papers)

  1. Front Matter

    Pages i-xxviii
  2. Formal Modelling

    1. Front Matter

      Pages 1-1
    2. Automatic Generation of Sources Lemmas in Tamarin: Towards Automatic Proofs of Security Protocols

      • Véronique Cortier, Stéphanie Delaune, Jannik Dreier
      Pages 3-22
    3. When Is a Test Not a Proof?

      • Eleanor McMurtry, Olivier Pereira, Vanessa Teague
      Pages 23-41
    4. Hardware Fingerprinting for the ARINC 429 Avionic Bus

      • Nimrod Gilboa-Markevich, Avishai Wool
      Pages 42-62
  3. Applied Cryptography I

    1. Front Matter

      Pages 63-63
    2. Semantic Definition of Anonymity in Identity-Based Encryption and Its Relation to Indistinguishability-Based Definition

      • Goichiro Hanaoka, Misaki Komatsu, Kazuma Ohara, Yusuke Sakai, Shota Yamada
      Pages 65-85
    3. Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption

      • Willy Susilo, Dung Hoang Duong, Huy Quoc Le, Josef Pieprzyk
      Pages 107-127
  4. Analyzing Attacks

    1. Front Matter

      Pages 129-129
    2. Linear Attack on Round-Reduced DES Using Deep Learning

      • Botao Hou, Yongqiang Li, Haoyue Zhao, Bin Wu
      Pages 131-145
    3. Detection by Attack: Detecting Adversarial Samples by Undercover Attack

      • Qifei Zhou, Rong Zhang, Bo Wu, Weiping Li, Tong Mo
      Pages 146-164
    4. Big Enough to Care Not Enough to Scare! Crawling to Attack Recommender Systems

      • Fabio Aiolli, Mauro Conti, Stjepan Picek, Mirko Polato
      Pages 165-184
    5. Active Re-identification Attacks on Periodically Released Dynamic Social Graphs

      • Xihui Chen, Ema Këpuska, Sjouke Mauw, Yunior Ramírez-Cruz
      Pages 185-205
  5. System Security II

    1. Front Matter

      Pages 207-207
    2. Fooling Primality Tests on Smartcards

      • Vladimir Sedlacek, Jan Jancar, Petr Svenda
      Pages 209-229
    3. An Optimizing Protocol Transformation for Constructor Finite Variant Theories in Maude-NPA

      • Damián Aparicio-Sánchez, Santiago Escobar, Raúl Gutiérrez, Julia Sapiña
      Pages 230-250
    4. On the Privacy Risks of Compromised Trigger-Action Platforms

      • Yu-Hsi Chiang, Hsu-Chun Hsiao, Chia-Mu Yu, Tiffany Hyun-Jin Kim
      Pages 251-271
    5. Plenty of Phish in the Sea: Analyzing Potential Pre-attack Surfaces

      • Tobias Urban, Matteo Große-Kampmann, Dennis Tatang, Thorsten Holz, Norbert Pohlmann
      Pages 272-291
  6. Post-quantum Cryptography

    1. Front Matter

      Pages 293-293

Other Volumes

  1. Computer Security – ESORICS 2020

    25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14–18, 2020, Proceedings, Part I
  2. Computer Security – ESORICS 2020

    25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14–18, 2020, Proceedings, Part II
  3. Computer Security

    ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17–18, 2020, Revised Selected Papers

About this book

The two volume set, LNCS 12308 + 12309, constitutes the proceedings of the 25th European Symposium on Research in Computer Security, ESORICS 2020, which was held in September 2020. The conference was planned to take place in Guildford, UK. Due to the COVID-19 pandemic, the conference changed to an online format.

The total of 72 full papers included in these proceedings was carefully reviewed and selected from 366 submissions. The papers were organized in topical sections named: database and Web security; system security; network security; software security; machine learning security; privacy; formal modelling; applied cryptography; analyzing attacks; post-quantum cryptogrphy; security analysis; and blockchain. 

Keywords

  • artificial intelligence
  • authentication
  • computer crime
  • cryptography
  • data communication systems
  • data security
  • databases
  • engineering
  • network protocols
  • network security
  • privacy
  • public key cryptography
  • security systems
  • signal processing
  • software engineering
  • telecommunication networks
  • telecommunication systems

Editors and Affiliations

  • University of Surrey, Guildford, UK

    Liqun Chen, Steve Schneider

  • Purdue University, West Lafayette, USA

    Ninghui Li

  • Delft University of Technology, Delft, The Netherlands

    Kaitai Liang

Bibliographic Information

Buying options

eBook
USD 89.00
Price excludes VAT (USA)
  • ISBN: 978-3-030-59013-0
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD 119.99
Price excludes VAT (USA)