Skip to main content
  • Conference proceedings
  • © 2019

Computer Security – ESORICS 2019

24th European Symposium on Research in Computer Security, Luxembourg, September 23–27, 2019, Proceedings, Part II

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 11736)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ESORICS: European Symposium on Research in Computer Security

Conference proceedings info: ESORICS 2019.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (29 papers)

  1. Front Matter

    Pages i-xxvi
  2. Software Security

    1. Front Matter

      Pages 1-1
    2. BinEye: Towards Efficient Binary Authorship Characterization Using Deep Learning

      • Saed Alrabaee, ElMouatez Billah Karbab, Lingyu Wang, Mourad Debbabi
      Pages 47-67
    3. Static Detection of Uninitialized Stack Variables in Binary Code

      • Behrad Garmany, Martin Stoffel, Robert Gawlik, Thorsten Holz
      Pages 68-87
    4. Towards Automated Application-Specific Software Stacks

      • Nicolai Davidsson, Andre Pawlowski, Thorsten Holz
      Pages 88-109
  3. Cryptographic Protocols

    1. Front Matter

      Pages 111-111
    2. Forward-Secure Puncturable Identity-Based Encryption for Securing Cloud Emails

      • Jianghong Wei, Xiaofeng Chen, Jianfeng Wang, Xuexian Hu, Jianfeng Ma
      Pages 134-150
    3. Feistel Structures for MPC, and More

      • Martin R. Albrecht, Lorenzo Grassi, Léo Perrin, Sebastian Ramacher, Christian Rechberger, Dragos Rotaru et al.
      Pages 151-171
    4. Arithmetic Garbling from Bilinear Maps

      • Nils Fleischhacker, Giulio Malavolta, Dominique Schröder
      Pages 172-192
  4. Security Models

    1. Front Matter

      Pages 193-193
    2. SEPD: An Access Control Model for Resource Sharing in an IoT Environment

      • Henrique G. G. Pereira, Philip W. L. Fong
      Pages 195-216
    3. Nighthawk: Transparent System Introspection from Ring -3

      • Lei Zhou, Jidong Xiao, Kevin Leach, Westley Weimer, Fengwei Zhang, Guojun Wang
      Pages 217-238
    4. Proactivizer: Transforming Existing Verification Tools into Efficient Solutions for Runtime Security Enforcement

      • Suryadipta Majumdar, Azadeh Tabiban, Meisam Mohammady, Alaa Oqaily, Yosr Jarraya, Makan Pourzandi et al.
      Pages 239-262
    5. Enhancing Security and Dependability of Industrial Networks with Opinion Dynamics

      • Juan E. Rubio, Mark Manulis, Cristina Alcaraz, Javier Lopez
      Pages 263-280
  5. Searchable Encryption

    1. Front Matter

      Pages 281-281
    2. Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy

      • Cong Zuo, Shi-Feng Sun, Joseph K. Liu, Jun Shao, Josef Pieprzyk
      Pages 283-303
    3. Towards Efficient Verifiable Forward Secure Searchable Symmetric Encryption

      • Zhongjun Zhang, Jianfeng Wang, Yunling Wang, Yaping Su, Xiaofeng Chen
      Pages 304-321

Other Volumes

  1. Computer Security – ESORICS 2019

About this book

The two volume set, LNCS 11735 and 11736, constitutes the proceedings of the 24th European Symposium on Research in Computer Security, ESORIC 2019, held in Luxembourg, in September 2019. The total of 67 full papers included in these proceedings was carefully reviewed and selected from 344 submissions. The papers were organized in topical sections named as follows:
Part I: machine learning; information leakage; signatures and re-encryption; side channels; formal modelling and verification; attacks; secure protocols; useful tools; blockchain and smart contracts.
Part II: software security; cryptographic protocols; security models; searchable encryption; privacy; key exchange protocols; and web security.

Editors and Affiliations

  • NEC Corporation, Kawasaki, Japan

    Kazue Sako

  • University of Surrey, Guildford, UK

    Steve Schneider

  • University of Luxembourg, Esch-sur-Alzette, Luxembourg

    Peter Y. A. Ryan

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access