Skip to main content
  • Conference proceedings
  • © 2014

Computer Security - ESORICS 2014

19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8712)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ESORICS: European Symposium on Research in Computer Security

Conference proceedings info: ESORICS 2014.

Buying options

eBook USD 69.99
Price excludes VAT (USA)
  • ISBN: 978-3-319-11203-9
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 89.99
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (30 papers)

  1. Front Matter

  2. Detecting Malicious Domains via Graph Inference

    • Pratyusa K. Manadhata, Sandeep Yadav, Prasad Rao, William Horne
    Pages 1-18
  3. Empirically Measuring WHOIS Misuse

    • Nektarios Leontiadis, Nicolas Christin
    Pages 19-36
  4. EncDNS: A Lightweight Privacy-Preserving Name Resolution Service

    • Dominik Herrmann, Karl-Peter Fuchs, Jens Lindemann, Hannes Federrath
    Pages 37-55
  5. Ubic: Bridging the Gap between Digital Cryptography and the Physical World

    • Mark Simkin, Dominique Schröder, Andreas Bulling, Mario Fritz
    Pages 56-75
  6. Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution over Untrusted Cache-enabled Networks

    • Moreno Ambrosin, Christoph Busold, Mauro Conti, Ahmad-Reza Sadeghi, Matthias Schunter
    Pages 76-93
  7. Local Password Validation Using Self-Organizing Maps

    • Diogo Mónica, Carlos Ribeiro
    Pages 94-111
  8. Verifiable Delegation of Computations with Storage-Verification Trade-off

    • Liang Feng Zhang, Reihaneh Safavi-Naini
    Pages 112-129
  9. Verifiable Computation over Large Database with Incremental Updates

    • Xiaofeng Chen, Jin Li, Jian Weng, Jianfeng Ma, Wenjing Lou
    Pages 148-162
  10. DroidMiner: Automated Mining and Characterization of Fine-grained Malicious Behaviors in Android Applications

    • Chao Yang, Zhaoyan Xu, Guofei Gu, Vinod Yegneswaran, Phillip Porras
    Pages 163-182
  11. Detecting Targeted Smartphone Malware with Behavior-Triggering Stochastic Models

    • Guillermo Suarez-Tangil, Mauro Conti, Juan E. Tapiador, Pedro Peris-Lopez
    Pages 183-201
  12. TrustDump: Reliable Memory Acquisition on Smartphones

    • He Sun, Kun Sun, Yuewu Wang, Jiwu Jing, Sushil Jajodia
    Pages 202-218
  13. A Framework to Secure Peripherals at Runtime

    • Fengwei Zhang, Haining Wang, Kevin Leach, Angelos Stavrou
    Pages 219-238
  14. StealthGuard: Proofs of Retrievability with Hidden Watchdogs

    • Monir Azraoui, Kaoutar Elkhiyaoui, Refik Molva, Melek Önen
    Pages 239-256
  15. An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme for Public Clouds Data Sharing

    • Kaitai Liang, Joseph K. Liu, Duncan S. Wong, Willy Susilo
    Pages 257-272
  16. Verifiable Computation on Outsourced Encrypted Data

    • Junzuo Lai, Robert H. Deng, Hweehwa Pang, Jian Weng
    Pages 273-291
  17. Verifiable Computation with Reduced Informational Costs and Computational Costs

    • Gang Xu, George T. Amariucai, Yong Guan
    Pages 292-309
  18. Detangling Resource Management Functions from the TCB in Privacy-Preserving Virtualization

    • Min Li, Zili Zha, Wanyu Zang, Meng Yu, Peng Liu, Kun Bai
    Pages 310-325
  19. Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage

    • Yujue Wang, Qianhong Wu, Duncan S. Wong, Bo Qin, Sherman S. M. Chow, Zhen Liu et al.
    Pages 326-343

Other Volumes

  1. Computer Security - ESORICS 2014

    19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I
  2. Computer Security - ESORICS 2014

    19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II

About this book

The two-volume set, LNCS 8712 and LNCS 8713 constitutes the refereed proceedings of the 19th European Symposium on Research in Computer Security, ESORICS 2014, held in Wroclaw, Poland, in September 2014 The 58 revised full papers presented were carefully reviewed and selected from 234 submissions. The papers address issues such as cryptography, formal methods and theory of security, security services, intrusion/anomaly detection and malware mitigation, security in hardware, systems security, network security, database and storage security, software and application security, human and societal aspects of security and privacy.

Keywords

  • anomaly detection
  • cryptography
  • database and storage security
  • formal methods and theory of security
  • human and societal aspects of security and privacy
  • intrusion detection
  • malware mitigation
  • mobile devices
  • network security
  • security and privacy
  • security and privacy
  • security in hardware
  • security services
  • software and application security
  • systems security

Editors and Affiliations

  • Department of Fundamental Problems of Technology, Wrocław University of Technology, Wrocław, Poland

    Mirosław Kutyłowski

  • MSIS Department, Rutgers University, USA

    Jaideep Vaidya

Bibliographic Information

  • Book Title: Computer Security - ESORICS 2014

  • Book Subtitle: 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I

  • Editors: Mirosław Kutyłowski, Jaideep Vaidya

  • Series Title: Lecture Notes in Computer Science

  • DOI: https://doi.org/10.1007/978-3-319-11203-9

  • Publisher: Springer Cham

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: Springer International Publishing Switzerland 2014

  • Softcover ISBN: 978-3-319-11202-2

  • eBook ISBN: 978-3-319-11203-9

  • Series ISSN: 0302-9743

  • Series E-ISSN: 1611-3349

  • Edition Number: 1

  • Number of Pages: XVI, 545

  • Number of Illustrations: 122 b/w illustrations

  • Topics: Data and Information Security, Cryptology, IT Operations

Buying options

eBook USD 69.99
Price excludes VAT (USA)
  • ISBN: 978-3-319-11203-9
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 89.99
Price excludes VAT (USA)