Zum Hauptinhalt springen
Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Computer Security – ESORICS 2025 -

Computer Security – ESORICS 2025

30th European Symposium on Research in Computer Security, Toulouse, France, September 22–24, 2025, Proceedings, Part III
Buch | Softcover
XXI, 546 Seiten
2025
Springer International Publishing (Verlag)
978-3-032-07893-3 (ISBN)
CHF 109,95 inkl. MwSt
  • Versand in 15-20 Tagen
  • Versandkostenfrei
  • Auch auf Rechnung
  • Artikel merken

This four-volume set LNCS 16053-16056 constitutes the refereed proceedings of the 30th European Symposium on Research in Computer Security, ESORICS 2025, held in Toulouse, France, during September 22 24, 2025.

The 100 full papers presented in these proceedings were carefully reviewed and selected from 600 submissions. They were organized in topical sections as follows: 

AI and Data-Centric Security, Systems and Hardware Security, Privacy, Cryptography and Secure Protocol Design, Blockchain and Financial Security, Privacy Policy and Identity Management, Adversarial and Backdoor Defenses. 

.- QUIC-Fuzz: An Effective Greybox Fuzzer For The QUIC Protocol.
.- Systematic Assessment of Cache Timing Vulnerabilities on RISC-V Processors.
.- No Root, No Problem: Automating Linux Least Privilege and Securing Ansible Deployments.
.- NICraft: Malicious NIC Firmware-based Cache Side-channel Attack.
.- Identifying Potential Timing Leakages from Hardware Design with Precondition Synthesis.
.- LibAFLstar: Fast and State-aware Protocol Fuzzing.
.- PUSH for Security: A PUF-Based Protocol to Prevent Session Hijacking.
.- Hardening HSM Clusters: Resolving Key Sync Vulnerabilities for Robust CU Isolation.
.- AcouListener: An Inaudible Acoustic Side-channel Attack on AR/VR Systems.
.- Verifying DRAM Addressing in Software.
.- Epistemology of Rowhammer Attacks: Threats to Rowhammer Research Validity.
.- Personalized Password Guessing via Modeling Multiple Leaked Credentials of the Same User.
.- WelkIR: Flow-Sensitive Pre-trained Embeddings from Compiler IR for Vulnerability Detection.
.- Edge Coverage Feedback of Embedded Systems Fuzzing Based on Debugging Interfaces.
.- Cache Demote for Fast Eviction Set Construction and Page Table Attribute Leakage.
.- WaitWatcher & WaitGuard: Detecting Flush-Based Cache Side-Channels through Spurious Wakeups.
.- T-Time: A Fine-grained Timing-based Controlled-Channel Attack against Intel TDX.
.- Unraveling DoH Traces: Padding-Resilient Website Fingerprinting via HTTP/2 Key Frame Sequences.
.- NLSaber: Enhancing Netlink Family Fuzzing via Automated Syscall Description Generation.
.- The Hidden Dangers of Public Serverless Repositories: An Empirical Security Assessment.
.- CapMan: Detecting and Mitigating Linux Capability Abuses at Runtime to Secure Privileged Containers.
.- Digital Twin for Adaptive Adversary Emulation in IIoT Control Networks.
.- Formal Security Analysis of ss2DNS.
.- High-Efficiency Fuzzing Technique Using Hooked I/O System Calls for Targeted Input Analysis.
.- VeriFLo: Verifiable Provenance with Fault Localization for Inter-domain Routing.
.- The Polymorphism Maze: Understanding Diversities and Similarities in Malware Families.
.- End-to-End Non-Profiled Side-Channel Analysis on Long Raw Traces.

Erscheinungsdatum
Reihe/Serie Lecture Notes in Computer Science
Zusatzinfo XXI, 546 p. 162 illus., 139 illus. in color.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Schlagworte AI and ML for security • applied cryptography • Attack and defenses • Hardware and cloud security • Network and Web Security • Privacy And Personal Data Protection • Security of AI and ML • Software and systems security
ISBN-10 3-032-07893-8 / 3032078938
ISBN-13 978-3-032-07893-3 / 9783032078933
Zustand Neuware
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
CHF 53,15
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
CHF 97,95