M2G Posted October 30, 2013 Report Posted October 30, 2013 This book constitutes the refereed proceedings of the 18th European Symposium on Computer Security, ESORICS 2013, held in Egham, UK, in September 2013. The 43 papers included in the book were carefully reviewed and selected from 242 papers. The aim of ESORICS is to further the progress of research in computer security by establishing a European forum for bringing together researchers in this area, by promoting the exchange of ideas with system developers and by encouraging links with researchers in related areas. The papers cover all topics related to security, privacy and trust in computer systems and networks.Adica cartea de aici:Computer Security -- ESORICS 2013 - 18th European Symposium on Research in Computer Security,Download aici:kscse13Warning: Foarte tehnic 1 Quote
Nytro Posted October 30, 2013 Report Posted October 30, 2013 Table of ContentsCryptography and ComputationPractical Covertly Secure MPC for Dishonest Majority –Or: Breaking the SPDZ Limits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1Ivan Damg?ard, Marcel Keller, Enrique Larraia, Valerio Pastro,Peter Scholl, and Nigel P. SmartPractical and Employable Protocols for UC-Secure Circuit Evaluationover Zn . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19Jan Camenisch, Robert R. Enderlein, and Victor ShoupPrivacy-Preserving Accountable Computation . . . . . . . . . . . . . . . . . . . . . . . 38Michael Backes, Dario Fiore, and Esfandiar MohammadiMeasurement and EvaluationVerifying Web Browser Extensions’ Compliance with Private-BrowsingMode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57Benjamin S. Lerner, Liam Elberty, Neal Poole, andShriram KrishnamurthiA Quantitative Evaluation of Privilege Separation in Web BrowserDesigns . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75Xinshu Dong, Hong Hu, Prateek Saxena, and Zhenkai LiangEstimating Asset Sensitivity by Profiling Users . . . . . . . . . . . . . . . . . . . . . . 94Youngja Park, Christopher Gates, and Stephen C. GatesApplications of CryptographyPractical Secure Logging: Seekable Sequential Key Generators . . . . . . . . . 111Giorgia Azzurra Marson and Bertram PoetteringRequest-Based Comparable Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129Jun FurukawaEnsuring File Authenticity in Private DFA Evaluation on EncryptedFiles in the Cloud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147Lei Wei and Michael K. ReiterXIV Table of ContentsCode AnalysisHI-CFG: Construction by Binary Analysis and Application to AttackPolymorphism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164Dan Caselden, Alex Bazhanyuk, Mathias Payer,Stephen McCamant, and Dawn SongAnDarwin: Scalable Detection of Semantically Similar AndroidApplications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182Jonathan Crussell, Clint Gibler, and Hao ChenBISTRO: Binary Component Extraction and Embedding for SoftwareSecurity Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200Zhui Deng, Xiangyu Zhang, and Dongyan XuNetwork SecurityVulnerable Delegation of DNS Resolution . . . . . . . . . . . . . . . . . . . . . . . . . . . 219Amir Herzberg and Haya ShulmanFormal Approach for Route Agility against Persistent Attackers . . . . . . . . 237Jafar Haadi Jafarian, Ehab Al-Shaer, and Qi DuanPlug-and-Play IP Security: Anonymity Infrastructure instead of PKI . . . 255Yossi Gilad and Amir HerzbergFormal Models and MethodsManaging the Weakest Link: A Game-Theoretic Approach for theMitigation of Insider Threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273Aron Laszka, Benjamin Johnson, Pascal Sch¨ottle,Jens Grossklags, and Rainer B¨ohmeAutomated Security Proofs for Almost-Universal Hash for MACVerification. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291Martin Gagn´e, Pascal Lafourcade, and Yassine LakhnechBounded Memory Protocols and Progressing Collaborative Systems . . . . 309Max Kanovich, Tajana Ban Kirigin, Vivek Nigam, andAndre ScedrovUniversally Composable Key-Management . . . . . . . . . . . . . . . . . . . . . . . . . . 327Steve Kremer, Robert K¨unnemann, and Graham SteelTable of Contents XVProtocol AnalysisA Cryptographic Analysis of OPACITY (Extended Abstract) . . . . . . . . . . 345¨ Ozg¨ur Dagdelen, Marc Fischlin, Tommaso Gagliardoni,Giorgia Azzurra Marson, Arno Mittelbach, and Cristina OneteSymbolic Probabilistic Analysis of Off-Line Guessing . . . . . . . . . . . . . . . . . 363Bruno Conchinha, David Basin, and Carlos CaleiroASICS: Authenticated Key Exchange Security IncorporatingCertification Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381Colin Boyd, Cas Cremers, Mich`ele Feltz, Kenneth G. Paterson,Bertram Poettering, and Douglas StebilaPrivacy Enhancing Models and TechnologiesEfficient Privacy-Enhanced Familiarity-Based Recommender System . . . . 400Arjan Jeckmans, Andreas Peter, and Pieter HartelPrivacy-Preserving User Data Oriented Services for Groups withDynamic Participation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 418Dmitry Kononchuk, Zekeriya Erkin, Jan C.A. van der Lubbe, andReginald L. LagendijkPrivacy-Preserving Matching of Community-Contributed Content . . . . . . 443Mishari Almishari, Paolo Gasti, Gene Tsudik, and Ekin OguzE-voting and PrivacyBallot Secrecy and Ballot Independence Coincide . . . . . . . . . . . . . . . . . . . . 463Ben Smyth and David BernhardElection Verifiability or Ballot Privacy: Do We Need to Choose? . . . . . . . 481´ Edouard Cuvelier, Olivier Pereira, and Thomas PetersEnforcing Privacy in the Presence of Others: Notions, Formalisationsand Relations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 499Naipeng Dong, Hugo Jonker, and Jun PangMalware DetectionMining Malware Specifications through Static Reachability Analysis . . . . 517Hugo Daniel Macedo and Tayssir TouiliPatrol: Revealing Zero-Day Attack Paths through Network-WideSystem Object Dependencies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 536Jun Dai, Xiaoyan Sun, and Peng LiuXVI Table of ContentsMeasuring and Detecting Malware Downloads in Live NetworkTraffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 556Phani Vadrevu, Babak Rahbarinia, Roberto Perdisci, Kang Li, andManos AntonakakisAccess ControlAutomated Certification of Authorisation Policy Resistance . . . . . . . . . . . 574Andreas Griesmayer and Charles MorissetFine-Grained Access Control System Based on OutsourcedAttribute-Based Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 592Jin Li, Xiaofeng Chen, Jingwei Li, Chunfu Jia, Jianfeng Ma, andWenjing LouPurpose Restrictions on Information Use . . . . . . . . . . . . . . . . . . . . . . . . . . . . 610Michael Carl Tschantz, Anupam Datta, and Jeannette M. WingDistributed Shuffling for Preserving Access Confidentiality . . . . . . . . . . . . 628Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi,Gerardo Pelosi, and Pierangela SamaratiAttacksRange Extension Attacks on Contactless Smart Cards . . . . . . . . . . . . . . . . 646Yossef Oren, Dvir Schirman, and Avishai WoolCellFlood: Attacking Tor Onion Routers on the Cheap . . . . . . . . . . . . . . . . 664Marco Valerio Barbera, Vasileios P. Kemerlis, Vasilis Pappas, andAngelos D. KeromytisNowhere to Hide: Navigating around Privacy in Online SocialNetworks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 682Mathias Humbert, Th´eophile Studer, Matthias Grossglauser, andJean-Pierre HubauxCurrent Events: Identifying Webpages by Tapping the ElectricalOutlet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 700Shane S. Clark, Hossen Mustafa, Benjamin Ransford, Jacob Sorber,Kevin Fu, and Wenyuan XuLanguage-Based ProtectionEliminating Cache-Based Timing Attacks with Instruction-BasedScheduling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 718Deian Stefan, Pablo Buiras, Edward Z. Yang, Amit Levy,David Terei, Alejandro Russo, and David Mazi`eresTable of Contents XVIIData-Confined HTML5 Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 736Devdatta Akhawe, Frank Li, Warren He, Prateek Saxena, andDawn SongKQguard: Binary-Centric Defense against Kernel Queue InjectionAttacks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 755Jinpeng Wei, Feng Zhu, and Calton PuRun-Time Enforcement of Information-Flow Properties on Android(Extended Abstract) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 775Limin Jia, Jassim Aljuraidan, Elli Fragkaki, Lujo Bauer,Michael Stroucken, Kazuhide Fukushima, Shinsaku Kiyomoto, andYutaka MiyakeAuthor Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 793Da, not bad Quote