Computer Security - ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22-24, 2025, Proceedings, Part III (Lecture Notes in Computer Science)

個数:
  • 予約

Computer Security - ESORICS 2025 : 30th European Symposium on Research in Computer Security, Toulouse, France, September 22-24, 2025, Proceedings, Part III (Lecture Notes in Computer Science)

  • 現在予約受付中です。出版後の入荷・発送となります。
    重要:表示されている発売日は予定となり、発売が延期、中止、生産限定品で商品確保ができないなどの理由により、ご注文をお取消しさせていただく場合がございます。予めご了承ください。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 574 p.
  • 言語 ENG
  • 商品コード 9783032078933

Full Description

This four-volume set LNCS 16053-16056 constitutes the refereed proceedings of the 30th European Symposium on Research in Computer Security, ESORICS 2025, held in Toulouse, France, during September 22-24, 2025.

The 100 full papers presented in these proceedings were carefully reviewed and selected from 600 submissions. They were organized in topical sections as follows: 

AI and Data-Centric Security, Systems and Hardware Security, Privacy, Cryptography and Secure Protocol Design, Blockchain and Financial Security, Privacy Policy and Identity Management, Adversarial and Backdoor Defenses. 

Contents

.- QUIC-Fuzz: An Effective Greybox Fuzzer For The QUIC Protocol.
.- Systematic Assessment of Cache Timing Vulnerabilities on RISC-V Processors.
.- No Root, No Problem: Automating Linux Least Privilege and Securing Ansible Deployments.
.- NICraft: Malicious NIC Firmware-based Cache Side-channel Attack.
.- Identifying Potential Timing Leakages from Hardware Design with Precondition Synthesis.
.- LibAFLstar: Fast and State-aware Protocol Fuzzing.
.- PUSH for Security: A PUF-Based Protocol to Prevent Session Hijacking.
.- Hardening HSM Clusters: Resolving Key Sync Vulnerabilities for Robust CU Isolation.
.- AcouListener: An Inaudible Acoustic Side-channel Attack on AR/VR Systems.
.- Verifying DRAM Addressing in Software.
.- Epistemology of Rowhammer Attacks: Threats to Rowhammer Research Validity.
.- Personalized Password Guessing via Modeling Multiple Leaked Credentials of the Same User.
.- WelkIR: Flow-Sensitive Pre-trained Embeddings from Compiler IR for Vulnerability Detection.
.- Edge Coverage Feedback of Embedded Systems Fuzzing Based on Debugging Interfaces.
.- Cache Demote for Fast Eviction Set Construction and Page Table Attribute Leakage.
.- WaitWatcher & WaitGuard: Detecting Flush-Based Cache Side-Channels through Spurious Wakeups.
.- T-Time: A Fine-grained Timing-based Controlled-Channel Attack against Intel TDX.
.- Unraveling DoH Traces: Padding-Resilient Website Fingerprinting via HTTP/2 Key Frame Sequences.
.- NLSaber: Enhancing Netlink Family Fuzzing via Automated Syscall Description Generation.
.- The Hidden Dangers of Public Serverless Repositories: An Empirical Security Assessment.
.- CapMan: Detecting and Mitigating Linux Capability Abuses at Runtime to Secure Privileged Containers.
.- Digital Twin for Adaptive Adversary Emulation in IIoT Control Networks.
.- Formal Security Analysis of ss2DNS.
.- High-Efficiency Fuzzing Technique Using Hooked I/O System Calls for Targeted Input Analysis.
.- VeriFLo: Verifiable Provenance with Fault Localization for Inter-domain Routing.
.- The Polymorphism Maze: Understanding Diversities and Similarities in Malware Families.
.- End-to-End Non-Profiled Side-Channel Analysis on Long Raw Traces.

最近チェックした商品