Description |
1 online resource (xvii, 665 pages) : color illustrations |
Series |
Lecture Notes in Computer Science, 0302-9743 ; 9327 |
|
LNCS sublibrary. SL 4, Security and cryptology |
|
Lecture notes in computer science ; 9327. 0302-9743
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Intro; Foreword; Organization; Contents -- Part II; Contents -- Part I; Privacy; FP-Block: Usable Web Privacy by Controlling Browser Fingerprinting; 1 Introduction; 2 Related Work; 2.1 Fingerprinting; 2.2 Countermeasures; 3 Determining the Fingerprint Surface; 3.1 Limitations of Preventing Fingerprint Tracking; 3.2 Fingerprint Vectors; 3.3 Fingerprint Surface; 4 Design; 4.1 Balancing Usability vs. Privacy; 4.2 Generating Web Identities; 5 Development and Implementation; 5.1 Development; 5.2 Implementation; 6 Experiments and Validation; 7 Conclusions; References |
|
Mind-Reading: Privacy Attacks Exploiting Cross-App KeyEvent Injections1 Introduction; 2 Background and Adversary Model; 2.1 IME and Personalized User Dictionary; 2.2 Adversary Model; 3 Vulnerability Analysis; 3.1 Android KeyEvent Processing Flow; 3.2 Cross-App KeyEvent Injection Vulnerability; 4 Attack; 4.1 Enumerating Entries from Dictionary; 4.2 Attack in Stealthy Mode; 4.3 Case Study of IMEs for Non-Latin Languages; 5 Evaluation; 5.1 Scope of Attack; 5.2 Experiment on Word Completion Attack Mode; 5.3 Experiment on Next-Word Prediction Attack Mode; 6 Defense; 7 Related Works; 8 Conclusion |
|
2 Related Work3 System Model and Privacy Goals; 3.1 Network Abstraction; 3.2 Training Goal; 3.3 Prediction Goal; 4 Methodology; 4.1 ADMM; 4.2 Two-Tier Training; 4.3 Complexity Analysis; 4.4 Protecting Prior Knowledge; 5 Experimentation and Evaluation; 5.1 Wikipedia RfA Dataset; 5.2 Experimental Setup; 5.3 Evaluation Metrics; 5.4 Results; 6 Conclusion; A Appendix: Link Reconstruction Attack; A.1 Experimental Setup; A.2 Results; References; Privacy-Preserving Observation in Public Spaces; 1 Introduction; 2 Related Work; 2.1 Privacy-Preserving Billing; 2.2 Threat Model; 3 Collusion Attack |
|
3.1 Model3.2 Collusion Strategy; 3.3 Analysis; 4 Privacy-Preserving Spot Checking; 4.1 Setup and Registration; 4.2 Security Properties; 4.3 Protocol; 4.4 Optimization; 4.5 Efficiency Analysis; 4.6 Rate Limiting; 4.7 Disposal; 5 Example Application; 6 Conclusions; A Privacy vs. Penalty Analysis; A.1 Variables; A.2 Analysis; References; Privacy-Preserving Context-Aware Recommender Systems: Analysis and New Solutions; 1 Introduction; 1.1 State-of-the-Art; 1.2 Our Contribution; 1.3 Organization; 2 Analysis of JPH Protocols; 2.1 Preliminary of JPH Protocols; 2.2 JPH Online Protocol |
Summary |
The two-volume set, LNCS 9326 and LNCS 9327 constitutes the refereed proceedings of the 20th European Symposium on Research in Computer Security, ESORICS 2015, held in Vienna, Austria, in September 2015. The 59 revised full papers presented were carefully reviewed and selected from 298 submissions. The papers address issues such as networks and Web security; system security; crypto application and attacks; risk analysis; privacy; cloud security; protocols and attribute-based encryption; code analysis and side-channels; detection and monitoring; authentication; policies; and applied security |
Notes |
English |
Subject |
Computer security -- Congresses
|
|
Computer science.
|
|
Computer security
|
|
Data encryption (Computer science)
|
|
Algorithms.
|
|
Computers and civilization.
|
|
Management information systems.
|
|
Electronic Data Processing
|
|
Computer Security
|
|
Algorithms
|
|
Management Information Systems
|
|
algorithms.
|
|
Algorithms
|
|
Computer science
|
|
Computer security
|
|
Computers and civilization
|
|
Data encryption (Computer science)
|
|
Management information systems
|
Genre/Form |
dictionaries.
|
|
proceedings (reports)
|
|
Dictionaries
|
|
Conference papers and proceedings
|
|
Dictionaries.
|
|
Conference papers and proceedings.
|
|
Dictionnaires.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Pernul, Günther, 1961- editor.
|
|
Ryan, Peter, 1957- editor
|
|
Weippl, Edgar R., editor.
|
ISBN |
9783319241777 |
|
331924177X |
|