default search action
14. RAID 2012: Amsterdam, The Netherlands
- Davide Balzarotti, Salvatore J. Stolfo, Marco Cova:
Research in Attacks, Intrusions, and Defenses - 15th International Symposium, RAID 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings. Lecture Notes in Computer Science 7462, Springer 2012, ISBN 978-3-642-33337-8
Virtualization
- Abhinav Srivastava, Himanshu Raj, Jonathon T. Giffin, Paul England:
Trusted VM Snapshots in Untrusted Cloud Infrastructures. 1-21 - Martim Carbone, Matthew Conover, Bruce Montague, Wenke Lee:
Secure and Robust Monitoring of Virtual Machines through Guest-Assisted Introspection. 22-41 - Shengzhi Zhang, Peng Liu:
Assessing the Trustworthiness of Drivers. 42-63
Attacks and Defenses
- Olivier Thonnard, Leyla Bilge, Gavin O'Gorman, Seán Kiernan, Martin Lee:
Industrial Espionage and Targeted Attacks: Understanding the Characteristics of an Escalating Threat. 64-85 - Victor van der Veen, Nitish dutt-Sharma, Lorenzo Cavallaro, Herbert Bos:
Memory Errors: The Past, the Present, and the Future. 86-106 - Dongkyun Ahn, Gyungho Lee:
A Memory Access Validation Scheme against Payload Injection Attacks. 107-126
Host and Network Security
- Jennifer Mankin, David R. Kaeli:
Dione: A Flexible Disk Monitoring and Analysis Framework. 127-146 - Zhi Xu, Hung-Yuan Hsu, Xin Chen, Sencun Zhu, Ali R. Hurson:
AK-PPM: An Authenticated Packet Attribution Scheme for Mobile Ad Hoc Networks. 147-168
Fraud Detection and Underground Economy
- Tobias Lauinger, Engin Kirda, Pietro Michiardi:
Paying for Piracy? An Analysis of One-Click Hosters' Controversial Reward Schemes. 169-189 - Samuel Marchal, Jérôme François, Radu State, Thomas Engel:
Proactive Discovery of Phishing Related Domain Names. 190-209 - Daisuke Mashima, Alvaro A. Cárdenas:
Evaluating Electricity Theft Detectors in Smart Grid Networks. 210-229
Web Security
- Jialong Zhang, Chao Yang, Zhaoyan Xu, Guofei Gu:
PoisonAmplifier: A Guided Approach of Discovering Compromised Websites through Reversing Search Poisoning Attacks. 230-253 - Sebastian Lekies, Nick Nikiforakis, Walter Tighzert, Frank Piessens, Martin Johns:
DEMACRO: Defense against Malicious Cross-Domain Requests. 254-273 - Timon Van Overveldt, Christopher Kruegel, Giovanni Vigna:
FlashDetect: ActionScript 3 Malware Detection. 274-293
Intrusion Detection
- Jie Chu, Zihui Ge, Richard Huber, Ping Ji, Jennifer Yates, Yung-Chao Yu:
ALERT-ID: Analyze Logs of the Network Element in Real Time for Intrusion Detection. 294-313 - B. Amann, Robin Sommer, Aashish Sharma, Seth Hall:
A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence. 314-333 - Victor C. Valgenti, Jatin Chhugani, Yan Sun, Nadathur Satish, Min Sik Kim, Changkyu Kim, Pradeep Dubey:
GPP-Grep: High-Speed Regular Expression Processing Engine on General Purpose Processors. 334-353 - Dina Hadziosmanovic, Lorenzo Simionato, Damiano Bolzoni, Emmanuele Zambon, Sandro Etalle:
N-Gram against the Machine: On the Feasibility of the N-Gram Network Analysis for Binary Protocols. 354-373
Poster Abstracts
- Shah Mahmood, Yvo Desmedt:
Online Social Networks, a Criminals Multipurpose Toolbox (Poster Abstract). 374-375 - Xiang Cui, Jinqiao Shi, Peng Liao, Chaoge Liu:
The Triple-Channel Model: Toward Robust and Efficient Advanced Botnets (Poster Abstract). 376-377 - Jinyu Wu, Lihua Yin, Binxing Fang:
Network Security Analysis Method Taking into Account the Usage Information (Poster Abstract). 378-379 - Shuyuan Jin, Zhi Yang, Xiang Cui:
Automatic Covert Channel Detection in Asbestos System (Poster Abstract). 380-381 - Dengke Qiao, Tingwen Liu, Yong Sun, Li Guo:
EFA for Efficient Regular Expression Matching in NIDS (Poster Abstract). 382-383 - Mark Vella, Sotirios Terzis, Marc Roper:
Distress Detection (Poster Abstract). 384-385 - Jenny Andrea Pinto Sánchez, Luis Javier García-Villalba:
Trie Data Structure to Compare Traffic Payload in a Supervised Anomaly Detection System (Poster Abstract). 386-387 - Ahmed F. Shosha, Joshua James, Chen-Ching Liu, Pavel Gladyshev:
Towards Automated Forensic Event Reconstruction of Malicious Code (Poster Abstract). 388-389 - Lukás Durfina, Jakub Kroustek, Petr Zemek, Bretislav Kábele:
Accurate Recovery of Functions in a Retargetable Decompiler(Poster Abstract). 390-392 - Hugo Villanúa Vega, Jorge Maestre Vidal, Jaime Daniel Mejía Castro, Luis Javier García-Villalba:
Improvement of an Anagram Based NIDS by Reducing the Storage Space of Bloom Filters (Poster Abstract). 393-394 - Jorge Maestre Vidal, Hugo Villanúa Vega, Jaime Daniel Mejía Castro, Luis Javier García-Villalba:
Concurrency Optimization for NIDS (Poster Abstract). 395-396 - Luis Javier García-Villalba, Jaime Daniel Mejía Castro, Ana Lucila Sandoval Orozco, Javier Martínez Puentes:
Malware Detection System by Payload Analysis of Network Traffic (Poster Abstract). 397-398
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.