001440111 000__ 06686cam\a2200769\a\4500 001440111 001__ 1440111 001440111 003__ OCoLC 001440111 005__ 20230309004542.0 001440111 006__ m\\\\\o\\d\\\\\\\\ 001440111 007__ cr\un\nnnunnun 001440111 008__ 211002s2021\\\\sz\\\\\\o\\\\\101\0\eng\d 001440111 019__ $$a1287775679 001440111 020__ $$a9783030884185$$q(electronic bk.) 001440111 020__ $$a303088418X$$q(electronic bk.) 001440111 020__ $$z9783030884178 001440111 0247_ $$a10.1007/978-3-030-88418-5$$2doi 001440111 035__ $$aSP(OCoLC)1272993441 001440111 040__ $$aEBLCP$$beng$$epn$$cEBLCP$$dGW5XE$$dOCLCF$$dDCT$$dOCLCO$$dN$T$$dOCLCO$$dOCLCQ$$dCOM$$dOCLCO$$dOCLCQ 001440111 049__ $$aISEA 001440111 050_4 $$aQA76.9.A25 001440111 08204 $$a005.8/2$$223 001440111 1112_ $$aEuropean Symposium on Research in Computer Security$$n(26th :$$d2021 :$$cOnline) 001440111 24510 $$aComputer security -- ESORICS 2021 :$$b26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings.$$nPart I /$$cElisa Bertino, Haya Shulman, Michael Waidner (eds.). 001440111 2463_ $$aESORICS 2021 001440111 260__ $$aCham :$$bSpringer,$$c2021. 001440111 300__ $$a1 online resource (798 pages) 001440111 336__ $$atext$$btxt$$2rdacontent 001440111 337__ $$acomputer$$bc$$2rdamedia 001440111 338__ $$aonline resource$$bcr$$2rdacarrier 001440111 347__ $$atext file 001440111 347__ $$bPDF 001440111 4901_ $$aLecture notes in computer science ;$$v12972 001440111 4901_ $$aLNCS sublibrary, SL 4, Security and cryptology 001440111 500__ $$a"Due to the COVID-19 pandemic the conference and the workshops took place digitally."--Preface 001440111 500__ $$a9 Conclusion. 001440111 500__ $$aIncludes author index. 001440111 5050_ $$aIntro -- Preface -- Organization -- Keynotes -- Algorithms and the Law -- The Politics and Technology of (Hardware) Trojans -- Increasing Trust in ML Through Governance -- The Science of Computer Science: An Offensive Research Perspective -- Contents -- Part I -- Contents -- Part II -- Network Security -- More Efficient Post-quantum KEMTLS with Pre-distributed Public Keys -- 1 Introduction -- 1.1 Pre-distributed Keys -- 2 Preliminaries -- 3 KEMTLS with Pre-distributed Long-Term Keys -- 3.1 Proactive Client Authentication -- 4 Security Analysis -- 5 Instantiation and Evaluation 001440111 5058_ $$a5.1 Choice of Primitives -- 5.2 Implementation -- 5.3 Handshake Sizes -- 5.4 Handshake Times -- 6 Discussion -- A KEMTLS -- References -- How to (Legally) Keep Secrets from Mobile Operators -- 1 Introduction -- 1.1 Our Contributions -- 1.2 Related Work -- 2 Preliminaries -- 3 LIKE Protocols -- 4 Security Model -- 5 Our Protocol -- 6 Security -- 7 Proof-of-Concept Implementation -- 8 Conclusion -- A Model Complements -- B Proof Sketches -- References -- A Formal Security Analysis of Session Resumption Across Hostnames -- 1 Introduction -- 2 Preliminaries -- 2.1 Building Blocks 001440111 5058_ $$a2.2 Multi-Stage Key Exchange -- 3 Breaking the Security of Session Resumption Across Hostnames in TLS 1.3 -- 3.1 Modeling TLS 1.3 Session Resumption as an MSKE Protocol -- 3.2 The Attack -- 4 Secure SRAH Protocols -- 4.1 Constructing Secure SRAH Protocols -- References -- Attacks -- Caught in the Web: DoS Vulnerabilities in Parsers for Structured Data -- 1 Introduction -- 2 Motivation -- 3 Characteristics of the Vulnerability -- 3.1 Topologies -- 3.2 Traversals -- 3.3 Triggers -- 4 Modelling the Analysis -- 4.1 Preliminaries -- 4.2 Analysis Specification -- 5 Experimental Setup and Evaluation 001440111 5058_ $$a5.1 Approach -- 5.2 Implementation -- 5.3 Libraries for Analysis -- 5.4 Triggers or Entry Points -- 5.5 Evaluation -- 6 Results and Discussion -- 6.1 PDF Vulnerabilities -- 6.2 Scalable Vector Graphics (SVG) Vulnerability -- 6.3 YAML Vulnerability -- 6.4 Newly Discovered Security Vulnerabilities -- 6.5 Threats to Validity -- 7 Related Work -- 7.1 Detecting Algorithmic Complexity Vulnerabilities -- 7.2 Traversals/Performance Bugs -- 8 Conclusion -- References -- PoW-How: An Enduring Timing Side-Channel to Evade Online Malware Sandboxes -- 1 Introduction -- 2 Background 001440111 5058_ $$a2.1 Malware and Malware Analysis -- 2.2 PoW for Malware Analysis Evasion -- 2.3 Side-Channel Measurement -- 3 Our Approach: PoW-How -- 3.1 Threat Model -- 3.2 System Design -- 3.3 Performance Profiling -- 3.4 Threshold Estimation -- 3.5 Malware Integration and Testing -- 4 Evaluation -- 4.1 Threshold Estimation and PoW Algorithm Choice -- 4.2 Case Study: Known Malware -- 4.3 Case Study: Fresh Malware Sample -- 5 Security Analysis -- 6 Countermeasures -- 7 Discussion -- 7.1 Ethical Considerations -- 7.2 Bare-Metal Environments -- 7.3 Economical Denial of Sustainability -- 8 Related Work 001440111 506__ $$aAccess limited to authorized users. 001440111 520__ $$aThe two volume set LNCS 12972 + 12973 constitutes the proceedings of the 26th European Symposium on Research in Computer Security, ESORICS 2021, which took place during October 4-8, 2021. The conference was originally planned to take place in Darmstadt, Germany, but changed to an online event due to the COVID-19 pandemic. The 71 full papers presented in this book were carefully reviewed and selected from 351 submissions. They were organized in topical sections as follows: Part I: network security; attacks; fuzzing; malware; user behavior and underground economy; blockchain; machine learning; automotive; anomaly detection; Part II: encryption; cryptography; privacy; differential privacy; zero knowledge; key exchange; multi-party computation. 001440111 650_0 $$aComputer security$$vCongresses. 001440111 650_0 $$aData encryption (Computer science)$$vCongresses. 001440111 650_0 $$aComputer networks$$xSecurity measures$$vCongresses. 001440111 650_0 $$aData protection$$vCongresses. 001440111 650_6 $$aSécurité informatique$$vCongrès. 001440111 650_6 $$aChiffrement (Informatique)$$vCongrès. 001440111 650_6 $$aRéseaux d'ordinateurs$$xSécurité$$xMesures$$vCongrès. 001440111 650_6 $$aProtection de l'information (Informatique)$$vCongrès. 001440111 655_7 $$aConference papers and proceedings.$$2fast$$0(OCoLC)fst01423772 001440111 655_7 $$aConference papers and proceedings.$$2lcgft 001440111 655_7 $$aActes de congrès.$$2rvmgf 001440111 655_0 $$aElectronic books. 001440111 7001_ $$aBertino, Elisa. 001440111 7001_ $$aShulman, Haya. 001440111 7001_ $$aWaidner, Michael. 001440111 77608 $$iPrint version:$$aBertino, Elisa.$$tComputer Security - ESORICS 2021.$$dCham : Springer International Publishing AG, ©2021$$z9783030884178 001440111 830_0 $$aLecture notes in computer science ;$$v12972. 001440111 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 001440111 852__ $$bebk 001440111 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-030-88418-5$$zOnline Access$$91397441.1 001440111 909CO $$ooai:library.usi.edu:1440111$$pGLOBAL_SET 001440111 980__ $$aBIB 001440111 980__ $$aEBOOK 001440111 982__ $$aEbook 001440111 983__ $$aOnline 001440111 994__ $$a92$$bISE