The Book explore various aspects of computer security, including secure communication, data privacy, malware detection, and access control. The papers discuss topics like developing protocols for secure multi-party computation, designing secure key generation schemes, improving malware detection techniques by using static reachability analysis, and implementing accountability mechanisms for randomized computations. The authors also investigate ways to strengthen security in web browsers and other software applications by analyzing potential vulnerabilities and designing robust defense mechanisms against various attacks, such as timing channels, relay attacks, and DNS poisoning. Several papers also explore the use of formal methods and game theory to analyze the security of protocols and systems, providing a rigorous mathematical framework for understanding and proving their security properties.
You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary
Get the Book now from Amazon:
https://www.amazon.com/Computer-Security-ESORICS-2013-Proceedings/dp/364240202X?&linkCode=ll1&tag=cvthunderx-20&linkId=227f22cf34c4fa11f381b42bcb0c4418&language=en_US&ref_=as_li_ss_tl