001449872 000__ 06603cam\a2200601\i\4500 001449872 001__ 1449872 001449872 003__ OCoLC 001449872 005__ 20230310004422.0 001449872 006__ m\\\\\o\\d\\\\\\\\ 001449872 007__ cr\cn\nnnunnun 001449872 008__ 220928s2022\\\\sz\a\\\\o\\\\\101\0\eng\d 001449872 020__ $$a9783031171437$$q(electronic bk.) 001449872 020__ $$a3031171438$$q(electronic bk.) 001449872 020__ $$z9783031171420 001449872 0247_ $$a10.1007/978-3-031-17143-7$$2doi 001449872 035__ $$aSP(OCoLC)1346150093 001449872 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dEBLCP$$dOCLCF$$dOCLCQ$$dUKAHL 001449872 049__ $$aISEA 001449872 050_4 $$aQA76.9.A25 001449872 08204 $$a005.8/2$$223/eng/20220928 001449872 1112_ $$aEuropean Symposium on Research in Computer Security$$n(27th :$$d2022 :$$cCopenhagen, Denmark : Online) 001449872 24510 $$aComputer security - ESORICS 2022 :$$b27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, proceedings.$$nPart III /$$cVijayalakshmi Atluri, Roberto Di Pietro, Christian D. Jensen, Weizhi Meng (eds.). 001449872 264_1 $$aCham :$$bSpringer,$$c[2022] 001449872 264_4 $$c©2022 001449872 300__ $$a1 online resource (xxiii, 789 pages) :$$billustrations (some color). 001449872 336__ $$atext$$btxt$$2rdacontent 001449872 337__ $$acomputer$$bc$$2rdamedia 001449872 338__ $$aonline resource$$bcr$$2rdacarrier 001449872 4901_ $$aLecture notes in computer science,$$x1611-3349 ;$$v13556 001449872 500__ $$aInternational conference proceedings. 001449872 500__ $$aIncludes author index. 001449872 5050_ $$aFormal Analysis -- A Formal Analysis of the FIDO2 Protocols -- Composable Security Treatment of ECVRF and Batch Verifications -- Effcient Proofs of Knowledge for Threshold Relations -- A tale of two models: formal verification of KEMTLS via Tamarin -- Web Security -- Browser-based CPU Fingerprinting -- Polymorphic Protocols at the Example of Mitigating Web Bots -- Unlinkable Delegation of WebAuthn Credentials -- Large Scale Analysis of DoH Deployment on the Internet -- Equivocal URLs: Understanding the Fragmented Space of URL Parser Implementations -- Exploring the Characteristics and Security Risks of Emerging Emoji Domain Names -- Hardware Security -- CPU Port Contention Without SMT -- Protocols for a Two-Tiered Trusted Computing Base -- Using Memristor Arrays as Physical Unclonable Functions -- Multiparty Computation -- SecureBiNN: 3-Party Secure Computation for Binarized Neural Network Inference -- MixedTechnique Multi-Party Computations Composed of Two-Party Computations -- PEA: Practical Private Epistasis Analysis using MPC -- ML Techniques -- Hide and Seek: on the Stealthiness of Attacks against Deep Learning Systems -- Precise Extraction of Deep Learning Models via Side-Channel Attacks on Edge/Endpoint Devices -- Real-time Adversarial Perturbations against Deep Reinforcement Learning Policies: Attacks and Defenses -- FLMJR: Improving Robustness of Federated Learning via Model Stability -- MaleficNet: Hiding Malware into Deep Neural Networks using Spread-Spectrum Channel Coding -- Long-Short History of Gradients is All You Need: Detecting Malicious and Unreliable Clients in Federated Learning -- MLFM: Machine Learning Meets Formal Method for Faster Identification of Security Breaches in Network Functions Virtualization (NFV) -- Cyber-Physical Systems Security -- Perspectives from a Comprehensive Evaluation of Reconstruction-based Anomaly Detection in Industrial Control Systems -- A Novel High-performance Implementation of CRYSTALS-Kyber with AI Accelerator -- From Click To Sink: utilizing AIS for command and control in maritime cyber attacks -- Effcient Hash-Based Redactable Signature for Smart Grid Applications -- Can Industrial Intrusion Detection Be SIMPLE -- For your Voice Only: Exploiting Side Channels in Voice Messaging for Environment Detection -- Towards Effcient Auditing for Real-Time Systems -- Network and Software Security -- Towards a Systematic and Automatic Use of State Machine Inference to Uncover Security Flaws and Fingerprint TLS Stacks -- PanoptiCANs - Adversary-resilient Architectures for Controller Area Networks -- Detecting Cross-Language Memory Management Issues in Rust -- Reach Me if You Can: On Native Vulnerability Reachability in Android Apps -- Extensible Virtual Call Integrity -- Posters -- Is your password sexist? A gamification-based analysis of the cultural context of leaked passwords -- A Fast, Practical and Simple Shortest Path Protocol for Multiparty Computation -- Audio Spoofing Detection Using Constant-Q Spectral Sketches and Parallel-Attention SE-ResNet -- MixCT: Mixing Confidential Transactions from Homomorphic Commitment -- Multi-Freq-LDPy: Multiple Frequency Estimation Under Local Differential Privacy in Python -- The Devil is in the GAN: Backdoor Attacks and Defenses in Deep Generative Models. . 001449872 506__ $$aAccess limited to authorized users. 001449872 520__ $$aThe three volume set LNCS 13554, 13555, 13556 constitutes the proceedings of the 27th European Symposium on Research in Computer Security, ESORICS 2022, which took place in September 2022. The conference took place in Copenhagen, Denmark, in a hybrid mode. The 104 full papers and 6 poster papers presented in these proceedings were carefully reviewed and selected from 562 submissions. They were organized in topical sections as follows: Part I: Blockchain security; privacy; crypto; attacks; sidechannels; Part II: Anonymity; cloud security; access control; authentication; digital signatures; IoT security; applications; Part III: Formal analysis; Web security; hardware security; multiparty computation; ML techniques; cyber-physical systems security; network and software security; posters. 001449872 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed September 28, 2022). 001449872 650_0 $$aComputer security$$vCongresses. 001449872 650_0 $$aData encryption (Computer science)$$vCongresses. 001449872 650_0 $$aComputer networks$$xSecurity measures$$vCongresses. 001449872 650_0 $$aData protection$$vCongresses. 001449872 655_0 $$aElectronic books. 001449872 655_7 $$aConference papers and proceedings.$$2fast$$0(OCoLC)fst01423772 001449872 655_7 $$aConference papers and proceedings.$$2lcgft 001449872 7001_ $$aAtluri, Vijay,$$d1956-$$eeditor. 001449872 7001_ $$aDi Pietro, Roberto$$c(Computer scientist),$$eeditor. 001449872 7001_ $$aJensen, Christian D.,$$eeditor. 001449872 7001_ $$aMeng, Weizhi,$$d1986-$$eeditor. 001449872 830_0 $$aLecture notes in computer science ;$$v13556.$$x1611-3349 001449872 852__ $$bebk 001449872 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-031-17143-7$$zOnline Access$$91397441.1 001449872 909CO $$ooai:library.usi.edu:1449872$$pGLOBAL_SET 001449872 980__ $$aBIB 001449872 980__ $$aEBOOK 001449872 982__ $$aEbook 001449872 983__ $$aOnline 001449872 994__ $$a92$$bISE