Computer security -- ESORICS 2020 : 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020, Proceedings.: 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020, Proceedings. Part II (2020)
- Record Type:
- Book
- Title:
- Computer security -- ESORICS 2020 : 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020, Proceedings.: 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020, Proceedings. Part II (2020)
- Main Title:
- Computer security -- ESORICS 2020 : 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020, Proceedings.
- Other Titles:
- ESORICS 2020
- Further Information:
- Note: Liqun Chen, Ninghui Li, Kaitai Liang, Steve Schneider (eds.).
- Other Names:
- Chen, Liqun
(Computer scientist), Li, Ninghui
Liang, Kaitai
Schneider, S. A (Steve A.)
European Symposium on Research in Computer Security, 25th - Contents:
- Intro -- Preface -- Organization -- Keynotes -- Decentralising Information and Communications Technology: Paradigm Shift or Cypherpunk Reverie? -- Lattices and Zero-Knowledge -- Accountability in Computing -- Contents -- Part II -- Contents -- Part I -- Formal Modelling -- Automatic Generation of Sources Lemmas in Tamarin: Towards Automatic Proofs of Security Protocols -- 1 Introduction -- 2 Overview -- 3 Tamarin Syntax and Semantics -- 3.1 Term Algebra -- 3.2 Transition System -- 3.3 Execution Traces -- 3.4 Properties -- 4 Automatically Generated Sources Lemmas -- 4.1 Definitions 4.2 Algorithm -- 4.3 Dealing with Composed Rules -- 5 Implementation and Experimental Evaluation -- 6 Conclusion -- A Proofs of Theorems 1 and 2 -- References -- When Is a Test Not a Proof? -- 1 Introduction -- 1.1 Addressing the Problem -- 1.2 Our Contribution -- 2 The Jakobsson-Juels PET -- 2.1 Plaintext Equivalence Test -- 2.2 Why the PET Is Not a Proof -- 3 Flaws in a Practical Implementation of the PEP -- 3.1 Use of Zero Knowledge Proofs (ZKPs) -- 3.2 Making Equivalent Ciphertexts Look Different -- 3.3 Making Encryptions of Different Messages Look Equivalent 3.4 Summary and Implications of These Vulnerabilities -- 4 Why this Undermines Universal Verifiability in JCJ/Civitas and Other Protocols -- 4.1 JCJ/Civitas -- 4.2 A Linear-Time Enhancement to JCJ -- 4.3 Introduction to Cryptography Textbook -- 4.4 Pretty Good Democracy -- 4.5 Selections -- 4.6 Cobra -- 4.7 Caveat Coercitor -- 4.8Intro -- Preface -- Organization -- Keynotes -- Decentralising Information and Communications Technology: Paradigm Shift or Cypherpunk Reverie? -- Lattices and Zero-Knowledge -- Accountability in Computing -- Contents -- Part II -- Contents -- Part I -- Formal Modelling -- Automatic Generation of Sources Lemmas in Tamarin: Towards Automatic Proofs of Security Protocols -- 1 Introduction -- 2 Overview -- 3 Tamarin Syntax and Semantics -- 3.1 Term Algebra -- 3.2 Transition System -- 3.3 Execution Traces -- 3.4 Properties -- 4 Automatically Generated Sources Lemmas -- 4.1 Definitions 4.2 Algorithm -- 4.3 Dealing with Composed Rules -- 5 Implementation and Experimental Evaluation -- 6 Conclusion -- A Proofs of Theorems 1 and 2 -- References -- When Is a Test Not a Proof? -- 1 Introduction -- 1.1 Addressing the Problem -- 1.2 Our Contribution -- 2 The Jakobsson-Juels PET -- 2.1 Plaintext Equivalence Test -- 2.2 Why the PET Is Not a Proof -- 3 Flaws in a Practical Implementation of the PEP -- 3.1 Use of Zero Knowledge Proofs (ZKPs) -- 3.2 Making Equivalent Ciphertexts Look Different -- 3.3 Making Encryptions of Different Messages Look Equivalent 3.4 Summary and Implications of These Vulnerabilities -- 4 Why this Undermines Universal Verifiability in JCJ/Civitas and Other Protocols -- 4.1 JCJ/Civitas -- 4.2 A Linear-Time Enhancement to JCJ -- 4.3 Introduction to Cryptography Textbook -- 4.4 Pretty Good Democracy -- 4.5 Selections -- 4.6 Cobra -- 4.7 Caveat Coercitor -- 4.8 Universally Verifiable Auctions -- 5 Correcting the Problems to Achieve UV -- 5.1 The Fiat-Shamir Transform -- 5.2 The Correct Plaintext Equivalence Proof -- 5.3 Security Proof for the Corrected PEP -- 6 Discussion and Conclusion -- References Hardware Fingerprinting for the ARINC 429 Avionic Bus -- 1 Introduction -- 1.1 Background -- 1.2 Related Work -- 1.3 Contributions -- 2 Preliminaries -- 2.1 The ARINC 429 Standard -- 2.2 The Adversary Model -- 3 The Data Set -- 4 The Hardware Fingerprinting Approach -- 4.1 IDS Overview -- 4.2 Anomaly Detection per Segment -- 4.3 Voting -- 4.4 Suspicion Counter -- 5 Signal Segmentation -- 6 Feature Sets -- 7 Detection Based on a Single Word -- 7.1 Methodology -- 7.2 Identifying a Rogue Transmitter -- 8 Modeling the Suspicion Counter -- 9 Performance of the Complete Method -- 10 Conclusions … (more)
- Publisher Details:
- Cham : Springer
- Publication Date:
- 2020
- Copyright Date:
- 2020
- Extent:
- 1 online resource (760 pages)
- Subjects:
- 005.8
Computer security -- Congresses
Computer networks -- Security measures -- Congresses
Application software
Software engineering
Network security
Network hardware
Information retrieval
Expert systems / knowledge-based systems
Software Engineering
Computer security
Computers -- Networking -- Security
Computers -- Hardware -- Network Hardware
Computers -- Information Technology
Computers -- Expert Systems
Computers -- Software Development & Engineering -- General
Computers -- Security -- General
Application software
Computer networks -- Security measures
Computer security
Software engineering
Electronic books
Electronic books
Conference papers and proceedings - Languages:
- English
- ISBNs:
- 9783030590130
- Related ISBNs:
- 9783030590123
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.551853
- Ingest File:
- 04_031.xml