Computer Security - ESORICS 2025, Kartoniert / Broschiert
Computer Security - ESORICS 2025
- 30th European Symposium on Research in Computer Security, Toulouse, France, September 22-24, 2025, Proceedings, Part III
(soweit verfügbar beim Lieferanten)
- Herausgeber:
- Vincent Nicomette, Abdelmalek Benzekri, Nora Boulahia-Cuppens, Jaideep Vaidya
- Verlag:
- Springer, 10/2025
- Einband:
- Kartoniert / Broschiert
- Sprache:
- Englisch
- ISBN-13:
- 9783032078933
- Artikelnummer:
- 12440043
- Umfang:
- 568 Seiten
- Gewicht:
- 850 g
- Maße:
- 235 x 155 mm
- Stärke:
- 31 mm
- Erscheinungstermin:
- 18.10.2025
- Hinweis
-
Achtung: Artikel ist nicht in deutscher Sprache!
Weitere Ausgaben von Computer Security - ESORICS 2025 |
Preis |
|---|---|
| Buch, Kartoniert / Broschiert, Englisch | EUR 81,04* |
| Buch, Kartoniert / Broschiert, Englisch | EUR 81,04* |
Klappentext
.- QUIC-Fuzz: An Effective Greybox Fuzzer For The QUIC Protocol. .- Systematic Assessment of Cache Timing Vulnerabilities on RISC-V Processors. .- No Root, No Problem: Automating Linux Least Privilege and Securing Ansible Deployments. .- NICraft: Malicious NIC Firmware-based Cache Side-channel Attack. .- Identifying Potential Timing Leakages from Hardware Design with Precondition Synthesis. .- LibAFLstar: Fast and State-aware Protocol Fuzzing. .- PUSH for Security: A PUF-Based Protocol to Prevent Session Hijacking. .- Hardening HSM Clusters: Resolving Key Sync Vulnerabilities for Robust CU Isolation. .- AcouListener: An Inaudible Acoustic Side-channel Attack on AR/VR Systems. .- Verifying DRAM Addressing in Software. .- Epistemology of Rowhammer Attacks: Threats to Rowhammer Research Validity. .- Personalized Password Guessing via Modeling Multiple Leaked Credentials of the Same User. .- WelkIR: Flow-Sensitive Pre-trained Embeddings from Compiler IR for Vulnerability Detection. .- Edge Coverage Feedback of Embedded Systems Fuzzing Based on Debugging Interfaces. .- Cache Demote for Fast Eviction Set Construction and Page Table Attribute Leakage. .- WaitWatcher & WaitGuard: Detecting Flush-Based Cache Side-Channels through Spurious Wakeups. .- T-Time: A Fine-grained Timing-based Controlled-Channel Attack against Intel TDX. .- Unraveling DoH Traces: Padding-Resilient Website Fingerprinting via HTTP/2 Key Frame Sequences. .- NLSaber: Enhancing Netlink Family Fuzzing via Automated Syscall Description Generation. .- The Hidden Dangers of Public Serverless Repositories: An Empirical Security Assessment. .- CapMan: Detecting and Mitigating Linux Capability Abuses at Runtime to Secure Privileged Containers. .- Digital Twin for Adaptive Adversary Emulation in IIoT Control Networks. .- Formal Security Analysis of ss2DNS. .- High-Efficiency Fuzzing Technique Using Hooked I/O System Calls for Targeted Input Analysis. .- VeriFLo: Verifiable Provenance with Fault Localization for Inter-domain Routing. .- The Polymorphism Maze: Understanding Diversities and Similarities in Malware Families. .- End-to-End Non-Profiled Side-Channel Analysis on Long Raw Traces.