Web Security

The Risks of WebGL: Analysis, Evaluation and DetectionAlex Belkin, Nethanel Gelernter and Israel Cidon Mime Artist: Bypassing Whitelisting for the Web with JavaScript Mimicry AttacksStefanos Chaliasos, George Metaxopoulos, George Argyros and Dimitris Mitropoulos Fingerprint Surface-based Detection of Web Bot DetectorsHugo Jonker, Benjamin Krumnow and Gabry Vlot Testing for Integrity Flaws in Web SessionsStefano Calzavara, Alvise … Continued

Privacy

GDPiRated – Stealing Personal Information On- and OfflineMatteo Cagnazzo, Norbert Pohlmann and Thorsten Holz Location Privacy-Preserving Mobile Crowd Sensing with Anonymous ReputationXun Yi, Kwok-Yan Lam, Elisa Bertino and Fang-Yu Rao OCRAM-assisted Sensitive Data Protection on ARM-based Platform Dawei Chu, Yuewu Wang, Lingguang Lei, Yanchu Li, Jiwu Jing and Kun Sun Privacy-Preserving Collaborative Medical Time Series … Continued

Security Models

SEPD: An Access Control Model for Resource Sharing in an IoT EnvironmentHenrique G. G. Pereira and Philip W. L. Fong Nighthawk: Transparent System Introspection from Ring -3Lei Zhou, Jidong Xiao, Kevin Leach, Westley Weimer, Fengwei Zhang and Guojun Wang Proactivizer: Transforming Existing Verification Tools into Efficient Solutions for Runtime Security EnforcementSuryadipta Majumdar, Azadeh Tabiban, Meisam … Continued

Software Security

Automatically Identifying Security Checks for Detecting Kernel Semantic BugsKangjie Lu, Aditya Pakki and Qiushi Wu Uncovering Information Flow Policy Violations in C ProgramsDarion Cassel, Yan Huang and Limin Jia BinEye: Towards Efficient Binary Authorship Characterization Using Deep LearningSaed Alrabaee, El Mouatez Karbab, Lingyu Wang and Mourad Debbabi Static Detection of Uninitialized Stack Variables in Binary … Continued

Useful Tools

Finding Flaws from Password Authentication Code in Android AppsSiqi Ma, Elisa Bertino, Robert Deng, Juanru Li, Diet Ostry, Surya Nepal and Sanjay Jha Identifying Privilege Separation Vulnerabilities in IoT Firmware with Symbolic ExecutionYao Yao, Wei Zhou, Yan Jia, Lipeng Zhu, Yuqing Zhang and Peng Liu iCAT: An Interactive Customizable Anonymization ToolMomen Oqaily, Yosr Jarraya, Lingyu … Continued

Attacks

Where to Look for What You See Is What You Sign? User Confusion in Transaction SecurityVincent Haupert and Stephan Gabert On the Security and Applicability of Fragile Camera FingerprintsErwin Quiring, Matthias Kirchner and Konrad Rieck Attacking speaker recognition systems with phoneme morphingHenry Turner, Giulio Lovisotto and Ivan Martinovic Practical Bayesian Poisoning Attacks on Challenge-based Collaborative … Continued

Side Channels

Side-Channel Aware FuzzingPhilip Sperl and Konstantin Böttinger NetSpectre: Read Arbitrary Memory over NetworkMichael Schwarz, Martin Schwarzl, Moritz Lipp, Jon Masters and Daniel Gruss maskVerif: Automated Verification of Higher-Order Masking in Presence of Physical DefaultsGilles Barthe, Sonia Belaïd, Gaëtan Cassiers, Pierre-Alain Fouque, Benjamin Grégoire and François-Xavier Standaert Automated Formal Analysis of Side-Channel Attacks on Probabilistic SystemsChris … Continued

Information Leakage

The Leakage-Resilience DilemmaBryan Ward, Richard Skowyra, Chad Spensky, Jason Martin and Hamed Okhravi A Taxonomy of Attacks using BGP BlackholingLoïc Miller and Cristel Pelsser Local Obfuscation Mechanisms for Hiding Probability DistributionsYusuke Kawamoto and Takao Murakami A First Look into Privacy Leakage in 3D Mixed Reality DataJaybie de Guzman, Kanchana Thilakarathna and Aruna Seneviratne

Questions?

✆ Contact the organizing committee: esorics2019 [at] uni [dot] lu

Questions?

✆ Contact the organizing committee: esorics2019 [at] uni [dot] lu

Questions?

✆ Contact the organizing committee: esorics2019 [at] uni [dot] lu

Questions?

✆ Contact the organizing committee: esorics2019 [at] uni [dot] lu