توضیحاتی در مورد کتاب :
مجموعه دو جلدی، LNCS 12308 12309، مجموعه مقالات بیست و پنجمین سمپوزیوم اروپایی تحقیقات در امنیت رایانه، ESORICS 2020 است که در سپتامبر 2020 برگزار شد. این کنفرانس قرار بود در گیلفورد، انگلستان برگزار شود. . با توجه به همه گیری COVID-19، کنفرانس به فرمت آنلاین تغییر کرد.
مجموع 72 مقاله کامل موجود در این مجموعه به دقت بررسی و از بین 366 مقاله ارسالی انتخاب شد. مقالات در بخش های موضوعی به نام های: پایگاه داده و امنیت وب سازماندهی شدند. امنیت سیستم؛ امنیت شبکه؛ امنیت نرم افزار؛ امنیت یادگیری ماشین؛ حریم خصوصی؛ مدل سازی رسمی؛ رمزنگاری کاربردی؛ تجزیه و تحلیل حملات؛ رمزنگاری پس کوانتومی؛ تجزیه و تحلیل امنیتی؛ و بلاک چین
فهرست مطالب :
Front Matter ....Pages i-xxviii
Front Matter ....Pages 1-1
Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection Establishment (Jianting Ning, Xinyi Huang, Geong Sen Poh, Shengmin Xu, Jia-Chng Loh, Jian Weng et al.)....Pages 3-22
Bulwark: Holistic and Verified Security Monitoring of Web Protocols (Lorenzo Veronese, Stefano Calzavara, Luca Compagna)....Pages 23-41
A Practical Model for Collaborative Databases: Securely Mixing, Searching and Computing (Shweta Agrawal, Rachit Garg, Nishant Kumar, Manoj Prabhakaran)....Pages 42-63
Front Matter ....Pages 65-65
Deduplication-Friendly Watermarking for Multimedia Data in Public Clouds (Weijing You, Bo Chen, Limin Liu, Jiwu Jing)....Pages 67-87
DANTE: A Framework for Mining and Monitoring Darknet Traffic (Dvir Cohen, Yisroel Mirsky, Manuel Kamp, Tobias Martin, Yuval Elovici, Rami Puzis et al.)....Pages 88-109
Efficient Quantification of Profile Matching Risk in Social Networks Using Belief Propagation (Anisa Halimi, Erman Ayday)....Pages 110-130
Front Matter ....Pages 131-131
Anonymity Preserving Byzantine Vector Consensus (Christian Cachin, Daniel Collins, Tyler Crain, Vincent Gramoli)....Pages 133-152
CANSentry: Securing CAN-Based Cyber-Physical Systems against Denial and Spoofing Attacks (Abdulmalik Humayed, Fengjun Li, Jingqiang Lin, Bo Luo)....Pages 153-173
Distributed Detection of APTs: Consensus vs. Clustering (Juan E. Rubio, Cristina Alcaraz, Ruben Rios, Rodrigo Roman, Javier Lopez)....Pages 174-192
Designing Reverse Firewalls for the Real World (Angèle Bossuat, Xavier Bultel, Pierre-Alain Fouque, Cristina Onete, Thyla van der Merwe)....Pages 193-213
Front Matter ....Pages 215-215
Follow the Blue Bird: A Study on Threat Data Published on Twitter (Fernando Alves, Ambrose Andongabo, Ilir Gashi, Pedro M. Ferreira, Alysson Bessani)....Pages 217-236
Dynamic and Secure Memory Transformation in Userspace (Robert Lyerly, Xiaoguang Wang, Binoy Ravindran)....Pages 237-256
Understanding the Security Risks of Docker Hub (Peiyu Liu, Shouling Ji, Lirong Fu, Kangjie Lu, Xuhong Zhang, Wei-Han Lee et al.)....Pages 257-276
DE-auth of the Blue! Transparent De-authentication Using Bluetooth Low Energy Beacon (Mauro Conti, Pier Paolo Tricomi, Gene Tsudik)....Pages 277-294
Similarity of Binaries Across Optimization Levels and Obfuscation (Jianguo Jiang, Gengwang Li, Min Yu, Gang Li, Chao Liu, Zhiqiang Lv et al.)....Pages 295-315
HART: Hardware-Assisted Kernel Module Tracing on Arm (Yunlan Du, Zhenyu Ning, Jun Xu, Zhilong Wang, Yueh-Hsun Lin, Fengwei Zhang et al.)....Pages 316-337
Zipper Stack: Shadow Stacks Without Shadow (Jinfeng Li, Liwei Chen, Qizhen Xu, Linan Tian, Gang Shi, Kai Chen et al.)....Pages 338-358
Restructured Cloning Vulnerability Detection Based on Function Semantic Reserving and Reiteration Screening (Weipeng Jiang, Bin Wu, Xingxin Yu, Rui Xue, Zhengmin Yu)....Pages 359-376
LegIoT: Ledgered Trust Management Platform for IoT (Jens Neureither, Alexandra Dmitrienko, David Koisser, Ferdinand Brasser, Ahmad-Reza Sadeghi)....Pages 377-396
Front Matter ....Pages 397-397
PrivColl: Practical Privacy-Preserving Collaborative Machine Learning (Yanjun Zhang, Guangdong Bai, Xue Li, Caitlin Curtis, Chen Chen, Ryan K. L. Ko)....Pages 399-418
An Efficient 3-Party Framework for Privacy-Preserving Neural Network Inference (Liyan Shen, Xiaojun Chen, Jinqiao Shi, Ye Dong, Binxing Fang)....Pages 419-439
Deep Learning Side-Channel Analysis on Large-Scale Traces (Loïc Masure, Nicolas Belleville, Eleonora Cagli, Marie-Angela Cornélie, Damien Couroussé, Cécile Dumas et al.)....Pages 440-460
Towards Poisoning the Neural Collaborative Filtering-Based Recommender Systems (Yihe Zhang, Jiadong Lou, Li Chen, Xu Yuan, Jin Li, Tom Johnsten et al.)....Pages 461-479
Data Poisoning Attacks Against Federated Learning Systems (Vale Tolpegin, Stacey Truex, Mehmet Emre Gursoy, Ling Liu)....Pages 480-501
Interpretable Probabilistic Password Strength Meters via Deep Learning (Dario Pasquini, Giuseppe Ateniese, Massimo Bernaschi)....Pages 502-522
Polisma - A Framework for Learning Attribute-Based Access Control Policies (Amani Abu Jabal, Elisa Bertino, Jorge Lobo, Mark Law, Alessandra Russo, Seraphin Calo et al.)....Pages 523-544
A Framework for Evaluating Client Privacy Leakages in Federated Learning (Wenqi Wei, Ling Liu, Margaret Loper, Ka-Ho Chow, Mehmet Emre Gursoy, Stacey Truex et al.)....Pages 545-566
Front Matter ....Pages 567-567
An Accountable Access Control Scheme for Hierarchical Content in Named Data Networks with Revocation (Nazatul Haque Sultan, Vijay Varadharajan, Seyit Camtepe, Surya Nepal)....Pages 569-590
PGC: Decentralized Confidential Payment System with Auditability (Yu Chen, Xuecheng Ma, Cong Tang, Man Ho Au)....Pages 591-610
Secure Cloud Auditing with Efficient Ownership Transfer (Jun Shen, Fuchun Guo, Xiaofeng Chen, Willy Susilo)....Pages 611-631
Front Matter ....Pages 633-633
Encrypt-to-Self: Securely Outsourcing Storage (Jeroen Pijnenburg, Bertram Poettering)....Pages 635-654
PGLP: Customizable and Rigorous Location Privacy Through Policy Graph (Yang Cao, Yonghui Xiao, Shun Takagi, Li Xiong, Masatoshi Yoshikawa, Yilin Shen et al.)....Pages 655-676
Where Are You Bob? Privacy-Preserving Proximity Testing with a Napping Party (Ivan Oleynikov, Elena Pagnin, Andrei Sabelfeld)....Pages 677-697
Front Matter ....Pages 699-699
Distributed PCFG Password Cracking (Radek Hranický, Lukáš Zobal, Ondřej Ryšavý, Dušan Kolář, Dávid Mikuš)....Pages 701-719
Your PIN Sounds Good! Augmentation of PIN Guessing Strategies via Audio Leakage (Matteo Cardaioli, Mauro Conti, Kiran Balagani, Paolo Gasti)....Pages 720-735
GDPR – Challenges for Reconciling Legal Rules with Technical Reality (Mirosław Kutyłowski, Anna Lauks-Dutka, Moti Yung)....Pages 736-755
Back Matter ....Pages 757-760
توضیحاتی در مورد کتاب به زبان اصلی :
The two volume set, LNCS 12308 + 12309, constitutes the proceedings of the 25th European Symposium on Research in Computer Security, ESORICS 2020, which was held in September 2020. The conference was planned to take place in Guildford, UK. Due to the COVID-19 pandemic, the conference changed to an online format.
The total of 72 full papers included in these proceedings was carefully reviewed and selected from 366 submissions. The papers were organized in topical sections named: database and Web security; system security; network security; software security; machine learning security; privacy; formal modelling; applied cryptography; analyzing attacks; post-quantum cryptogrphy; security analysis; and blockchain.