default search action
28th ESORICS 2023: The Hague, The Netherlands - Part IV
- Gene Tsudik, Mauro Conti, Kaitai Liang, Georgios Smaragdakis:
Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part IV. Lecture Notes in Computer Science 14347, Springer 2024, ISBN 978-3-031-51481-4
Machine Learning
- Bipin Paudel, George T. Amariucai:
Reinforcement Learning Approach to Generate Zero-Dynamics Attacks on Control Systems Without State Space Models. 3-22 - Yunlong Mao, Zexi Xin, Zhenyu Li, Jue Hong, Qingyou Yang, Sheng Zhong:
Secure Split Learning Against Property Inference, Data Reconstruction, and Feature Space Hijacking Attacks. 23-43 - Maria Rigaki, Sebastian García:
The Power of MEME: Adversarial Malware Creation with Model-Based Reinforcement Learning. 44-64 - Younghan Lee, Yungi Cho, Woorim Han, Ho Bae, Yunheung Paek:
FLGuard: Byzantine-Robust Federated Learning via Ensemble of Contrastive Models. 65-84 - Lorenz Hüther, Karsten Sohr, Bernhard J. Berger, Hendrik Rothe, Stefan Edelkamp:
Machine Learning for SAST: A Lightweight and Adaptable Approach. 85-104 - Mohamed Suliman, Douglas J. Leith:
Two Models are Better Than One: Federated Learning is Not Private for Google GBoard Next Word Prediction. 105-122 - Xi Yu, Liyao Xiang, Shiming Wang, Chengnian Long:
Privacy-Preserving Split Learning via Pareto Optimal Search. 123-142 - Torsten Krauß, Raphael Götz, Alexandra Dmitrienko:
Security of NVMe Offloaded Data in Large-Scale Machine Learning. 143-163 - Javier Rando, Fernando Pérez-Cruz, Briland Hitaj:
PassGPT: Password Modeling and (Guided) Generation with Large Language Models. 164-183 - Lukas Seidel, Sedick David Baker Effendi, Xavier Pinho, Konrad Rieck, Brink van der Merwe, Fabian Yamaguchi:
Learning Type Inference for Enhanced Dataflow Analysis. 184-203 - Ehud Aharoni, Moran Baruch, Pradip Bose, Alper Buyuktosunoglu, Nir Drucker, Subhankar Pal, Tomer Pelleg, Kanthi K. Sarpatwar, Hayim Shaul, Omri Soceanu, Roman Vaculín:
Efficient Pruning for Machine Learning Under Homomorphic Encryption. 204-225
Software and Systems Security
- Muaz Ali, Muhammad Muzammil, M. Faraz Karim, Ayesha Naeem, Rukhshan Haroon, Muhammad Haris, Huzaifah Nadeem, Waseem Sabir, Fahad Shaon, Fareed Zaffar, Vinod Yegneswaran, Ashish Gehani, Sazzadur Rahaman:
SoK: A Tale of Reduction, Security, and Correctness - Evaluating Program Debloating Paradigms and Their Compositions. 229-249 - Ziyi Zhou, Xuangan Xiao, Tianxiao Hou, Yikun Hu, Dawu Gu:
On the (In)Security of Manufacturer-Provided Remote Attestation Frameworks in Android. 250-270 - Zhe Chen, Haiqing Qiu, Xuhua Ding:
DScope: To Reliably and Securely Acquire Live Data from Kernel-Compromised ARM Devices. 271-289 - Guy Farrelly, Paul Quirk, Salil S. Kanhere, Seyit Camtepe, Damith C. Ranasinghe:
SplITS: Split Input-to-State Mapping for Effective Firmware Fuzzing. 290-310 - Luca Degani, Majid Salehi, Fabio Martinelli, Bruno Crispo:
μIPS: Software-Based Intrusion Prevention for Bare-Metal Embedded Systems. 311-331 - Pouriya Zarbafian, Vincent Gramoli:
Aion: Secure Transaction Ordering Using TEEs. 332-350 - Ghada Arfaoui, Thibaut Jacques, Marc Lacoste, Cristina Onete, Léo Robert:
Towards a Privacy-Preserving Attestation for Virtualized Networks. 351-370 - Yuejun Guo, Qiang Hu, Qiang Tang, Yves Le Traon:
An Empirical Study of the Imbalance Issue in Software Vulnerability Detection. 371-390 - Rui Sun, Yinggang Guo, Zicheng Wang, Qingkai Zeng:
AttnCall: Refining Indirect Call Targets in Binaries with Attention. 391-409 - Selasi Kwashie, Wei Kang, Sandeep Santhosh Kumar, Geoff Jarrad, Seyit Camtepe, Surya Nepal:
Acumen: Analysing the Impact of Organisational Change on Users' Access Entitlements. 410-430
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.