- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
This four-volume set LNCS 16053-16056 constitutes the refereed proceedings of the 30th European Symposium on Research in Computer Security, ESORICS 2025, held in Toulouse, France, during September 22-24, 2025.
The 100 full papers presented in these proceedings were carefully reviewed and selected from 600 submissions. They were organized in topical sections as follows:
AI and Data-Centric Security, Systems and Hardware Security, Privacy, Cryptography and Secure Protocol Design, Blockchain and Financial Security, Privacy Policy and Identity Management, Adversarial and Backdoor Defenses.
Contents
.- QUIC-Fuzz: An Effective Greybox Fuzzer For The QUIC Protocol.
.- Systematic Assessment of Cache Timing Vulnerabilities on RISC-V Processors.
.- No Root, No Problem: Automating Linux Least Privilege and Securing Ansible Deployments.
.- NICraft: Malicious NIC Firmware-based Cache Side-channel Attack.
.- Identifying Potential Timing Leakages from Hardware Design with Precondition Synthesis.
.- LibAFLstar: Fast and State-aware Protocol Fuzzing.
.- PUSH for Security: A PUF-Based Protocol to Prevent Session Hijacking.
.- Hardening HSM Clusters: Resolving Key Sync Vulnerabilities for Robust CU Isolation.
.- AcouListener: An Inaudible Acoustic Side-channel Attack on AR/VR Systems.
.- Verifying DRAM Addressing in Software.
.- Epistemology of Rowhammer Attacks: Threats to Rowhammer Research Validity.
.- Personalized Password Guessing via Modeling Multiple Leaked Credentials of the Same User.
.- WelkIR: Flow-Sensitive Pre-trained Embeddings from Compiler IR for Vulnerability Detection.
.- Edge Coverage Feedback of Embedded Systems Fuzzing Based on Debugging Interfaces.
.- Cache Demote for Fast Eviction Set Construction and Page Table Attribute Leakage.
.- WaitWatcher & WaitGuard: Detecting Flush-Based Cache Side-Channels through Spurious Wakeups.
.- T-Time: A Fine-grained Timing-based Controlled-Channel Attack against Intel TDX.
.- Unraveling DoH Traces: Padding-Resilient Website Fingerprinting via HTTP/2 Key Frame Sequences.
.- NLSaber: Enhancing Netlink Family Fuzzing via Automated Syscall Description Generation.
.- The Hidden Dangers of Public Serverless Repositories: An Empirical Security Assessment.
.- CapMan: Detecting and Mitigating Linux Capability Abuses at Runtime to Secure Privileged Containers.
.- Digital Twin for Adaptive Adversary Emulation in IIoT Control Networks.
.- Formal Security Analysis of ss2DNS.
.- High-Efficiency Fuzzing Technique Using Hooked I/O System Calls for Targeted Input Analysis.
.- VeriFLo: Verifiable Provenance with Fault Localization for Inter-domain Routing.
.- The Polymorphism Maze: Understanding Diversities and Similarities in Malware Families.
.- End-to-End Non-Profiled Side-Channel Analysis on Long Raw Traces.