default search action
20. RAID 2017: Atlanta, GA, USA
- Marc Dacier, Michael D. Bailey, Michalis Polychronakis, Manos Antonakakis:
Research in Attacks, Intrusions, and Defenses - 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings. Lecture Notes in Computer Science 10453, Springer 2017, ISBN 978-3-319-66331-9
Software Security
- Andrew Henderson, Heng Yin, Guang Jin, Hao Han, Hongmei Deng:
VDF: Targeted Evolutionary Fuzz Testing of Virtual Devices. 3-25 - Bhargava Shastry, Markus Leutner, Tobias Fiebig, Kashyap Thimmaraju, Fabian Yamaguchi, Konrad Rieck, Stefan Schmid, Jean-Pierre Seifert, Anja Feldmann:
Static Program Analysis as a Fuzzing Aid. 26-47 - Hossein Fereidooni, Jiska Classen, Tom Spink, Paul Patras, Markus Miettinen, Ahmad-Reza Sadeghi, Matthias Hollick, Mauro Conti:
Breaking Fitness Records Without Moving: Reverse Engineering and Spoofing Fitbit. 48-69
Intrusion Detection
- Ahmet Salih Buyukkayhan, Alina Oprea, Zhou Li, William K. Robertson:
Lens on the Endpoint: Hunting for Malicious Software Through Endpoint Data Analysis. 73-97 - Amin Kharraz, Engin Kirda:
Redemption: Real-Time Protection Against Ransomware at End-Hosts. 98-119 - Anaël Beaugnon, Pierre Chifflier, Francis R. Bach:
ILAB: An Interactive Labelling Strategy for Intrusion Detection. 120-140
Android Security
- Guangliang Yang, Abner Mendoza, Jialong Zhang, Guofei Gu:
Precisely and Scalably Vetting JavaScript Bridge in Android Hybrid Apps. 143-166 - Kai Chen, Tongxin Li, Bin Ma, Peng Wang, XiaoFeng Wang, Peiyuan Zong:
Filtering for Malice Through the Data Ocean: Large-Scale PHA Install Detection at the Communication Service Provider Level. 167-191 - Yuping Li, Jiyong Jang, Xin Hu, Xinming Ou:
Android Malware Clustering Through Malicious Payload Mining. 192-214
Systems Security
- Yuhei Kawakoya, Eitaro Shioji, Yuto Otsuki, Makoto Iwamura, Takeshi Yada:
Stealth Loader: Trace-Free Program Loading for API Obfuscation. 217-237 - David Gens, Orlando Arias, Dean Sullivan, Christopher Liebchen, Yier Jin, Ahmad-Reza Sadeghi:
LAZARUS: Practical Side-Channel Resilient Kernel-Space Randomization. 238-258 - Thomas Nyman, Jan-Erik Ekberg, Lucas Davi, N. Asokan:
CFI CaRE: Hardware-Supported Call and Return Enforcement for Commercial Microcontrollers. 259-284
Cybercrime
- Rashid Tahir, Muhammad Huzaifa, Anupam Das, Mohammad Ahmad, Carl A. Gunter, Fareed Zaffar, Matthew Caesar, Nikita Borisov:
Mining on Someone Else's Dime: Mitigating Covert Mining Operations in Clouds and Enterprises. 287-310 - Samuel Jero, Xiangyu Bu, Cristina Nita-Rotaru, Hamed Okhravi, Richard Skowyra, Sonia Fahmy:
BEADS: Automated Attack Discovery in OpenFlow-Based SDN Systems. 311-333 - Efthimios Alepis, Constantinos Patsakis:
Trapped by the UI: The Android Case. 334-354
Cloud Security
- Yangchun Fu, Erick Bauman, Raul Quinonez, Zhiqiang Lin:
Sgx-Lapd: Thwarting Controlled Side Channel Attacks via Enclave Verifiable Page Faults. 357-380 - Yue Chen, Mustakimur Khandaker, Zhi Wang:
Secure In-Cache Execution. 381-402 - Kevin Leach, Fengwei Zhang, Westley Weimer:
Scotch: Combining Software Guard Extensions and System Management Mode to Monitor Cloud Resource Usage. 403-424
Network Security
- Johannes Krupp, Mohammad Karami, Christian Rossow, Damon McCoy, Michael Backes:
Linking Amplification DDoS Attacks to Booter Services. 427-449 - Mohamed Elsabagh, Dan Fleck, Angelos Stavrou, Michael Kaplan, Thomas Bowen:
Practical and Accurate Runtime Application Protection Against DoS Attacks. 450-471 - Thomas Vissers, Jan Spooren, Pieter Agten, Dirk Jumpertz, Peter Janssen, Marc Van Wesemael, Frank Piessens, Wouter Joosen, Lieven Desmet:
Exploring the Ecosystem of Malicious Domain Registrations in the .eu TLD. 472-493
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.