Skip to main content
  • Conference proceedings
  • © 2020

Computer Security – ESORICS 2020

25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14–18, 2020, Proceedings, Part I

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 12308)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ESORICS: European Symposium on Research in Computer Security

Conference proceedings info: ESORICS 2020.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (36 papers)

  1. Front Matter

    Pages i-xxviii
  2. Database and Web Security

    1. Front Matter

      Pages 1-1
    2. Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection Establishment

      • Jianting Ning, Xinyi Huang, Geong Sen Poh, Shengmin Xu, Jia-Chng Loh, Jian Weng et al.
      Pages 3-22
    3. Bulwark: Holistic and Verified Security Monitoring of Web Protocols

      • Lorenzo Veronese, Stefano Calzavara, Luca Compagna
      Pages 23-41
    4. A Practical Model for Collaborative Databases: Securely Mixing, Searching and Computing

      • Shweta Agrawal, Rachit Garg, Nishant Kumar, Manoj Prabhakaran
      Pages 42-63
  3. System Security I

    1. Front Matter

      Pages 65-65
    2. Deduplication-Friendly Watermarking for Multimedia Data in Public Clouds

      • Weijing You, Bo Chen, Limin Liu, Jiwu Jing
      Pages 67-87
    3. DANTE: A Framework for Mining and Monitoring Darknet Traffic

      • Dvir Cohen, Yisroel Mirsky, Manuel Kamp, Tobias Martin, Yuval Elovici, Rami Puzis et al.
      Pages 88-109
  4. Network Security I

    1. Front Matter

      Pages 131-131
    2. Anonymity Preserving Byzantine Vector Consensus

      • Christian Cachin, Daniel Collins, Tyler Crain, Vincent Gramoli
      Pages 133-152
    3. CANSentry: Securing CAN-Based Cyber-Physical Systems against Denial and Spoofing Attacks

      • Abdulmalik Humayed, Fengjun Li, Jingqiang Lin, Bo Luo
      Pages 153-173
    4. Distributed Detection of APTs: Consensus vs. Clustering

      • Juan E. Rubio, Cristina Alcaraz, Ruben Rios, Rodrigo Roman, Javier Lopez
      Pages 174-192
    5. Designing Reverse Firewalls for the Real World

      • Angèle Bossuat, Xavier Bultel, Pierre-Alain Fouque, Cristina Onete, Thyla van der Merwe
      Pages 193-213
  5. Software Security

    1. Front Matter

      Pages 215-215
    2. Follow the Blue Bird: A Study on Threat Data Published on Twitter

      • Fernando Alves, Ambrose Andongabo, Ilir Gashi, Pedro M. Ferreira, Alysson Bessani
      Pages 217-236
    3. Dynamic and Secure Memory Transformation in Userspace

      • Robert Lyerly, Xiaoguang Wang, Binoy Ravindran
      Pages 237-256
    4. Understanding the Security Risks of Docker Hub

      • Peiyu Liu, Shouling Ji, Lirong Fu, Kangjie Lu, Xuhong Zhang, Wei-Han Lee et al.
      Pages 257-276
    5. DE-auth of the Blue! Transparent De-authentication Using Bluetooth Low Energy Beacon

      • Mauro Conti, Pier Paolo Tricomi, Gene Tsudik
      Pages 277-294
    6. Similarity of Binaries Across Optimization Levels and Obfuscation

      • Jianguo Jiang, Gengwang Li, Min Yu, Gang Li, Chao Liu, Zhiqiang Lv et al.
      Pages 295-315

Other Volumes

  1. Computer Security – ESORICS 2020

About this book

The two volume set, LNCS 12308 + 12309, constitutes the proceedings of the 25th European Symposium on Research in Computer Security, ESORICS 2020, which was held in September 2020. The conference was planned to take place in Guildford, UK. Due to the COVID-19 pandemic, the conference changed to an online format.

The total of 72 full papers included in these proceedings was carefully reviewed and selected from 366 submissions. The papers were organized in topical sections named: database and Web security; system security; network security; software security; machine learning security; privacy; formal modelling; applied cryptography; analyzing attacks; post-quantum cryptogrphy; security analysis; and blockchain. 

Editors and Affiliations

  • University of Surrey, Guildford, UK

    Liqun Chen, Steve Schneider

  • Purdue University, West Lafayette, USA

    Ninghui Li

  • Delft University of Technology, Delft, The Netherlands

    Kaitai Liang

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access