Skip to main content
  • Conference proceedings
  • © 2012

Computer Security -- ESORICS 2012

17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012, Proceedings

  • Fast-track conference proceedings

  • Sate-of-the-art research

  • Up-to-date results

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7459)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ESORICS: European Symposium on Research in Computer Security

Conference proceedings info: ESORICS 2012.

Buying options

eBook USD 89.00
Price excludes VAT (USA)
  • ISBN: 978-3-642-33167-1
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 119.99
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (50 papers)

  1. Front Matter

  2. Security and Data Protection in Real Systems

    1. Modeling and Enhancing Android’s Permission System

      • Elli Fragkaki, Lujo Bauer, Limin Jia, David Swasey
      Pages 1-18Open Access
    2. Hardening Access Control and Data Protection in GFS-like File Systems

      • James Kelley, Roberto Tamassia, Nikos Triandopoulos
      Pages 19-36Open Access
    3. Attack of the Clones: Detecting Cloned Applications on Android Markets

      • Jonathan Crussell, Clint Gibler, Hao Chen
      Pages 37-54Open Access
    4. Boosting the Permissiveness of Dynamic Information-Flow Tracking by Testing

      • Arnar Birgisson, Daniel Hedin, Andrei Sabelfeld
      Pages 55-72Open Access
  3. Formal Models for Cryptography and Access Control

    1. Effective Symbolic Protocol Analysis via Equational Irreducibility Conditions

      • Serdar Erbatur, Santiago Escobar, Deepak Kapur, Zhiqiang Liu, Christopher Lynch, Catherine Meadows et al.
      Pages 73-90Open Access
    2. Satisfiability and Feasibility in a Relationship-Based Workflow Authorization Model

      • Arif Akram Khan, Philip W. L. Fong
      Pages 109-126Open Access
    3. Deciding Security for a Fragment of ASLan

      • Sebastian Mödersheim
      Pages 127-144Open Access
  4. Security and Privacy in Mobile and Wireless Networks

    1. A Probabilistic Framework for Localization of Attackers in MANETs

      • Massimiliano Albanese, Alessandra De Benedictis, Sushil Jajodia, Paulo Shakarian
      Pages 145-162Open Access
    2. Robust Probabilistic Fake Packet Injection for Receiver-Location Privacy in WSN

      • Ruben Rios, Jorge Cuellar, Javier Lopez
      Pages 163-180Open Access
    3. Privacy-Aware Message Exchanges for Geographically Routed Human Movement Networks

      • Adam J. Aviv, Micah Sherr, Matt Blaze, Jonathan M. Smith
      Pages 181-198Open Access
  5. Counteracting Man-in-the-Middle Attacks

    1. Trust No One Else: Detecting MITM Attacks against SSL/TLS without Third-Parties

      • Italo Dacosta, Mustaque Ahamad, Patrick Traynor
      Pages 199-216Open Access
    2. X.509 Forensics: Detecting and Localising the SSL/TLS Men-in-the-Middle

      • Ralph Holz, Thomas Riedmaier, Nils Kammenhuber, Georg Carle
      Pages 217-234Open Access
    3. A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols

      • Simon Eberz, Martin Strohmeier, Matthias Wilhelm, Ivan Martinovic
      Pages 235-252Open Access
  6. Network Security

    1. The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs

      • Ahmad-Reza Sadeghi, Steffen Schulz, Vijay Varadharajan
      Pages 253-270Open Access
    2. Security of Patched DNS

      • Amir Herzberg, Haya Shulman
      Pages 271-288Open Access
    3. Revealing Abuses of Channel Assignment Protocols in Multi-channel Wireless Networks: An Investigation Logic Approach

      • Qijun Gu, Kyle Jones, Wanyu Zang, Meng Yu, Peng Liu
      Pages 289-306Open Access
  7. Users Privacy and Anonymity

    1. Exploring Linkability of User Reviews

      • Mishari Almishari, Gene Tsudik
      Pages 307-324Open Access
    2. Formal Analysis of Privacy in an eHealth Protocol

      • Naipeng Dong, Hugo Jonker, Jun Pang
      Pages 325-342Open Access

Other Volumes

  1. Computer Security – ESORICS 2012

    17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings

About this book

This book constitutes the refereed proceedings of the 17th European Symposium on Computer Security, ESORICS 2012, held in Pisa, Italy, in September 2012. The 50 papers included in the book were carefully reviewed and selected from 248 papers. The articles are organized in topical sections on security and data protection in real systems; formal models for cryptography and access control; security and privacy in mobile and wireless networks; counteracting man-in-the-middle attacks; network security; users privacy and anonymity; location privacy; voting protocols and anonymous communication; private computation in cloud systems; formal security models; identity based encryption and group signature; authentication; encryption key and password security; malware and phishing; and software security.

Keywords

  • Android
  • authentication protocols
  • cloud computing
  • security and privacy
  • wireless networks

Editors and Affiliations

  • Dipartimento di Informatica, Università degli Studi di Milano, Crema, Italy

    Sara Foresti

  • Computer Science Department, Columbia University, New York, US

    Moti Yung

  • Institute of Informatics and Telematics, Information Security Group, National Research Council, Pisa, Italy

    Fabio Martinelli

Bibliographic Information

Buying options

eBook USD 89.00
Price excludes VAT (USA)
  • ISBN: 978-3-642-33167-1
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 119.99
Price excludes VAT (USA)