Skip to main content
  • Conference proceedings
  • © 2012

Computer Security -- ESORICS 2012

17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012, Proceedings

  • Fast-track conference proceedings
  • Sate-of-the-art research
  • Up-to-date results

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7459)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ESORICS: European Symposium on Research in Computer Security

Conference proceedings info: ESORICS 2012.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (50 papers)

  1. Front Matter

  2. Security and Data Protection in Real Systems

    1. Modeling and Enhancing Android’s Permission System

      • Elli Fragkaki, Lujo Bauer, Limin Jia, David Swasey
      Pages 1-18
    2. Hardening Access Control and Data Protection in GFS-like File Systems

      • James Kelley, Roberto Tamassia, Nikos Triandopoulos
      Pages 19-36
    3. Attack of the Clones: Detecting Cloned Applications on Android Markets

      • Jonathan Crussell, Clint Gibler, Hao Chen
      Pages 37-54
    4. Boosting the Permissiveness of Dynamic Information-Flow Tracking by Testing

      • Arnar Birgisson, Daniel Hedin, Andrei Sabelfeld
      Pages 55-72
  3. Formal Models for Cryptography and Access Control

    1. Effective Symbolic Protocol Analysis via Equational Irreducibility Conditions

      • Serdar Erbatur, Santiago Escobar, Deepak Kapur, Zhiqiang Liu, Christopher Lynch, Catherine Meadows et al.
      Pages 73-90
    2. Deciding Security for a Fragment of ASLan

      • Sebastian Mödersheim
      Pages 127-144
  4. Security and Privacy in Mobile and Wireless Networks

    1. A Probabilistic Framework for Localization of Attackers in MANETs

      • Massimiliano Albanese, Alessandra De Benedictis, Sushil Jajodia, Paulo Shakarian
      Pages 145-162
    2. Robust Probabilistic Fake Packet Injection for Receiver-Location Privacy in WSN

      • Ruben Rios, Jorge Cuellar, Javier Lopez
      Pages 163-180
    3. Privacy-Aware Message Exchanges for Geographically Routed Human Movement Networks

      • Adam J. Aviv, Micah Sherr, Matt Blaze, Jonathan M. Smith
      Pages 181-198
  5. Counteracting Man-in-the-Middle Attacks

    1. Trust No One Else: Detecting MITM Attacks against SSL/TLS without Third-Parties

      • Italo Dacosta, Mustaque Ahamad, Patrick Traynor
      Pages 199-216
    2. X.509 Forensics: Detecting and Localising the SSL/TLS Men-in-the-Middle

      • Ralph Holz, Thomas Riedmaier, Nils Kammenhuber, Georg Carle
      Pages 217-234
    3. A Practical Man-In-The-Middle Attack on Signal-Based Key Generation Protocols

      • Simon Eberz, Martin Strohmeier, Matthias Wilhelm, Ivan Martinovic
      Pages 235-252
  6. Network Security

    1. The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs

      • Ahmad-Reza Sadeghi, Steffen Schulz, Vijay Varadharajan
      Pages 253-270
    2. Security of Patched DNS

      • Amir Herzberg, Haya Shulman
      Pages 271-288
  7. Users Privacy and Anonymity

    1. Exploring Linkability of User Reviews

      • Mishari Almishari, Gene Tsudik
      Pages 307-324
    2. Formal Analysis of Privacy in an eHealth Protocol

      • Naipeng Dong, Hugo Jonker, Jun Pang
      Pages 325-342

Other Volumes

  1. Computer Security – ESORICS 2012

About this book

This book constitutes the refereed proceedings of the 17th European Symposium on Computer Security, ESORICS 2012, held in Pisa, Italy, in September 2012. The 50 papers included in the book were carefully reviewed and selected from 248 papers. The articles are organized in topical sections on security and data protection in real systems; formal models for cryptography and access control; security and privacy in mobile and wireless networks; counteracting man-in-the-middle attacks; network security; users privacy and anonymity; location privacy; voting protocols and anonymous communication; private computation in cloud systems; formal security models; identity based encryption and group signature; authentication; encryption key and password security; malware and phishing; and software security.

Editors and Affiliations

  • Dipartimento di Informatica, Università degli Studi di Milano, Crema, Italy

    Sara Foresti

  • Computer Science Department, Columbia University, New York, US

    Moti Yung

  • Institute of Informatics and Telematics, Information Security Group, National Research Council, Pisa, Italy

    Fabio Martinelli

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access