Skip to main content
  • Conference proceedings
  • © 2017

Computer Security – ESORICS 2017

22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 10493)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ESORICS: European Symposium on Research in Computer Security

Conference proceedings info: ESORICS 2017.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (30 papers)

  1. Front Matter

    Pages I-XXI
  2. Quantifying Web Adblocker Privacy

    • Arthur Gervais, Alexandros Filios, Vincent Lenders, Srdjan Capkun
    Pages 21-42
  3. Adversarial Examples for Malware Detection

    • Kathrin Grosse, Nicolas Papernot, Praveen Manoharan, Michael Backes, Patrick McDaniel
    Pages 62-79
  4. PerfWeb: How to Violate Web Privacy with Hardware Performance Events

    • Berk Gulmezoglu, Andreas Zankl, Thomas Eisenbarth, Berk Sunar
    Pages 80-97
  5. Acoustic Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard-Drive Noise (‘DiskFiltration’)

    • Mordechai Guri, Yosef Solewicz, Andrey Daidakulov, Yuval Elovici
    Pages 98-115
  6. DOMPurify: Client-Side Protection Against XSS and Markup Injection

    • Mario Heiderich, Christopher Späth, Jörg Schwenk
    Pages 116-134
  7. Preventing DNS Amplification Attacks Using the History of DNS Queries with SDN

    • Soyoung Kim, Sora Lee, Geumhwan Cho, Muhammad Ejaz Ahmed, Jaehoon (Paul) Jeong, Hyoungshick Kim
    Pages 135-152
  8. A Traceability Analysis of Monero’s Blockchain

    • Amrit Kumar, Clément Fischer, Shruti Tople, Prateek Saxena
    Pages 153-173
  9. Multi-rate Threshold FlipThem

    • David Leslie, Chris Sherfield, Nigel P. Smart
    Pages 174-190
  10. Practical Keystroke Timing Attacks in Sandboxed JavaScript

    • Moritz Lipp, Daniel Gruss, Michael Schwarz, David Bidner, Clémentine Maurice, Stefan Mangard
    Pages 191-209
  11. On-Demand Time Blurring to Support Side-Channel Defense

    • Weijie Liu, Debin Gao, Michael K. Reiter
    Pages 210-228
  12. VuRLE: Automatic Vulnerability Detection and Repair by Learning from Examples

    • Siqi Ma, Ferdian Thung, David Lo, Cong Sun, Robert H. Deng
    Pages 229-246
  13. Link-Layer Device Type Classification on Encrypted Wireless Traffic with COTS Radios

    • Rajib Ranjan Maiti, Sandra Siby, Ragav Sridharan, Nils Ole Tippenhauer
    Pages 247-264
  14. LeaPS: Learning-Based Proactive Security Auditing for Clouds

    • Suryadipta Majumdar, Yosr Jarraya, Momen Oqaily, Amir Alimohammadifar, Makan Pourzandi, Lingyu Wang et al.
    Pages 265-285
  15. Identifying Multiple Authors in a Binary Program

    • Xiaozhu Meng, Barton P. Miller, Kwang-Sung Jun
    Pages 286-304
  16. Privacy Implications of Room Climate Data

    • Philipp Morgner, Christian Müller, Matthias Ring, Björn Eskofier, Christian Riess, Frederik Armknecht et al.
    Pages 324-343
  17. Network Intrusion Detection Based on Semi-supervised Variational Auto-Encoder

    • Genki Osada, Kazumasa Omote, Takashi Nishide
    Pages 344-361

Other Volumes

  1. Computer Security – ESORICS 2017

About this book

The two-volume set, LNCS 10492 and LNCS 10493 constitutes the refereed proceedings of the 22nd European Symposium on Research in Computer Security, ESORICS 2017, held in Oslo, Norway, in September 2017.

The 54 revised full papers presented were carefully reviewed and selected from 338 submissions. The papers address issues such as data protection; security protocols; systems; web and network security; privacy; threat modeling and detection; information flow; and security in emerging applications such as cryptocurrencies, the Internet of Things and automotive.

Editors and Affiliations

  • IMT Atlantique, Rennes, France

    Simon N. Foley

  • Hamburg University of Technology, Hamburg, Germany

    Dieter Gollmann

  • NTNU, Gjøvik, Norway

    Einar Snekkenes

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access