Skip to main content
  • Conference proceedings
  • © 2009

Computer Security -- ESORICS 2009

14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5789)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ESORICS: European Symposium on Research in Computer Security

Conference proceedings info: ESORICS 2009.

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (42 papers)

  1. Front Matter

  2. Network Security I

    1. Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones

      • Thorsten Holz, Markus Engelberth, Felix Freiling
      Pages 1-18
    2. User-Centric Handling of Identity Agent Compromise

      • Daisuke Mashima, Mustaque Ahamad, Swagath Kannan
      Pages 19-36
    3. The Coremelt Attack

      • Ahren Studer, Adrian Perrig
      Pages 37-52
    4. Information Flow

      1. Type-Based Analysis of PIN Processing APIs
        • Matteo Centenaro, Riccardo Focardi, Flaminia L. Luccio, Graham Steel
        Pages 53-68
      2. Declassification with Explicit Reference Points
        • Alexander Lux, Heiko Mantel
        Pages 69-85
      3. Tracking Information Flow in Dynamic Tree Structures
        • Alejandro Russo, Andrei Sabelfeld, Andrey Chudnov
        Pages 86-103
  3. Network Security II

    1. Lightweight Opportunistic Tunneling (LOT)

      • Yossi Gilad, Amir Herzberg
      Pages 104-119
    2. Hide and Seek in Time — Robust Covert Timing Channels

      • Yali Liu, Dipak Ghosal, Frederik Armknecht, Ahmad-Reza Sadeghi, Steffen Schulz, Stefan Katzenbeisser
      Pages 120-135
    3. Authentic Time-Stamps for Archival Storage

      • Alina Oprea, Kevin D. Bowers
      Pages 136-151
    4. Language Based Security

      1. Towards a Theory of Accountability and Audit
        • Radha Jagadeesan, Alan Jeffrey, Corin Pitcher, James Riely
        Pages 152-167
      2. Reliable Evidence: Auditability by Typing
        • Nataliya Guts, Cédric Fournet, Francesco Zappa Nardelli
        Pages 168-183
      3. PCAL: Language Support for Proof-Carrying Authorization Systems
        • Avik Chaudhuri, Deepak Garg
        Pages 184-199
  4. Network Security III

    1. ReFormat: Automatic Reverse Engineering of Encrypted Messages

      • Zhi Wang, Xuxian Jiang, Weidong Cui, Xinyuan Wang, Mike Grace
      Pages 200-215
    2. Protocol Normalization Using Attribute Grammars

      • Drew Davidson, Randy Smith, Nic Doyle, Somesh Jha
      Pages 216-231
    3. Automatically Generating Models for Botnet Detection

      • Peter Wurzinger, Leyla Bilge, Thorsten Holz, Jan Goebel, Christopher Kruegel, Engin Kirda
      Pages 232-249
    4. Access Control

      1. Dynamic Enforcement of Abstract Separation of Duty Constraints
        • David Basin, Samuel J. Burri, Günter Karjoth
        Pages 250-267
      2. Requirements and Protocols for Inference-Proof Interactions in Information Systems
        • Joachim Biskup, Christian Gogolin, Jens Seiler, Torben Weibert
        Pages 285-302
    5. Privacy - I

      1. A Privacy Preservation Model for Facebook-Style Social Network Systems
        • Philip W. L. Fong, Mohd Anwar, Zhen Zhao
        Pages 303-320

Other Volumes

  1. Computer Security – ESORICS 2009

About this book

This book constitutes the proceedings of the 14th European Symposium on Research in Computer Security, ESORICS 2009, held in Saint-Malo, France, in September 2009.

The 42 papers included in the book were carefully reviewed and selected from 220 papers. The topics covered are network security, information flow, language based security, access control, privacy, distributed systems security, security primitives, web security, cryptography, protocols, and systems security and forensics.

Editors and Affiliations

  • Computer Science Department and MPI-SWS, Saarland University, Saarbrücken, Germany

    Michael Backes

  • Department of Computer Science, North Carolina State University, Raleigh, USA

    Peng Ning

Bibliographic Information

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access