Attacks - Attacks -

Attacks

Where to Look for What You See Is What You Sign? User Confusion in Transaction Security
Vincent Haupert and Stephan Gabert

On the Security and Applicability of Fragile Camera Fingerprints
Erwin Quiring, Matthias Kirchner and Konrad Rieck

Attacking speaker recognition systems with phoneme morphing
Henry Turner, Giulio Lovisotto and Ivan Martinovic

Practical Bayesian Poisoning Attacks on Challenge-based Collaborative Intrusion Detection Networks
Weizhi Meng, Wenjuan Li, Lijun Jiang, Kim-Kwang Raymond Choo and Chunhua Su

A Framework for Evaluating Security in the Presence of Signal Injection Attacks
Ilias Giechaskiel, Youqian Zhang and Kasper Rasmussen


Questions?

✆ Contact the organizing committee: esorics2019 [at] uni [dot] lu

Questions?

✆ Contact the organizing committee: esorics2019 [at] uni [dot] lu

Questions?

✆ Contact the organizing committee: esorics2019 [at] uni [dot] lu

Questions?

✆ Contact the organizing committee: esorics2019 [at] uni [dot] lu