default search action
18. RAID 2015: Kyoto, Japan
- Herbert Bos, Fabian Monrose, Gregory Blanc:
Research in Attacks, Intrusions, and Defenses - 18th International Symposium, RAID 2015, Kyoto, Japan, November 2-4, 2015, Proceedings. Lecture Notes in Computer Science 9404, Springer 2015, ISBN 978-3-319-26361-8
Hardware
- Khaled N. Khasawneh, Meltem Ozsoy, Caleb Donovick, Nael B. Abu-Ghazaleh, Dmitry V. Ponomarev:
Ensemble Learning for Low-Level Hardware-Supported Malware Detection. 3-25 - Ryan M. Gerdes, Saptarshi Mallick:
Physical-Layer Detection of Hardware Keyloggers. 26-47 - Clémentine Maurice, Nicolas Le Scouarnec, Christoph Neumann, Olivier Heen, Aurélien Francillon:
Reverse Engineering Intel Last-Level Cache Complex Addressing Using Performance Counters. 48-65 - Pinghai Yuan, Qingkai Zeng, Xuhua Ding:
Hardware-Assisted Fine-Grained Code-Reuse Attack Detection. 66-85
Networks
- Jaehyun Nam, Muhammad Jamshed, Byungkwon Choi, Dongsu Han, KyoungSoo Park:
Haetae: Scaling the Performance of Network Intrusion Detection with Many-Core Processors. 89-110 - Quentin Jacquemart, Pierre-Antoine Vervier, Guillaume Urvoy-Keller, Ernst W. Biersack:
Demystifying the IP Blackspace. 111-132 - Johanna Amann, Robin Sommer:
Providing Dynamic Control to Passive Network Security Monitoring. 133-152
Hardening
- Weixuan Mao, Zhongmin Cai, Don Towsley, Xiaohong Guan:
Probabilistic Inference on Integrity for Access Behavior Based Malware Detection. 155-176 - Thomas Kittel, Sebastian Vogl, Julian Kirsch, Claudia Eckert:
Counteracting Data-Only Malware with Code Pointer Examination. 177-197 - Meining Nie, Purui Su, Qi Li, Zhi Wang, Lingyun Ying, Jinlong Hu, Dengguo Feng:
Xede: Practical Exploit Early Detection. 198-221
Attack Detection I
- Charles Smutz, Angelos Stavrou:
Preventing Exploits in Microsoft Office Documents Through Content Randomization. 225-246 - Yang Zhang, Xiaoshan Sun, Yi Deng, Liang Cheng, Shuke Zeng, Yu Fu, Dengguo Feng:
Improving Accuracy of Static Integer Overflow Detection in Binary. 247-269 - Xiaokui Shu, Danfeng (Daphne) Yao, Barbara G. Ryder:
A Formal Framework for Program Anomaly Detection. 270-292
Web and Net
- Giancarlo Pellegrino, Constantin Tschürtz, Eric Bodden, Christian Rossow:
jÄk: Using Dynamic Analysis to Crawl and Test Modern Web Applications. 295-316 - Qilang Yang, Dimitrios Damopoulos, Georgios Portokalidis:
WYSISNWIV: What You Scan Is Not What I Visit. 317-338 - Christian Röpke, Thorsten Holz:
SDN Rootkits: Subverting Network Operating Systems of Software-Defined Networks. 339-356
Android
- Wenbo Yang, Yuanyuan Zhang, Juanru Li, Junliang Shu, Bodong Li, Wenjun Hu, Dawu Gu:
AppSpear: Bytecode Decrypting and DEX Reassembling for Packed Android Malware. 359-381 - Nicoló Andronio, Stefano Zanero, Federico Maggi:
HelDroid: Dissecting and Detecting Mobile Ransomware. 382-404 - Rahul Murmuria, Angelos Stavrou, Daniel Barbará, Dan Fleck:
Continuous Authentication on Mobile Devices Using Power Consumption, Touch Gestures and Physical Movement of Users. 405-424
Privacy
- Haitao Xu, Haining Wang, Angelos Stavrou:
Privacy Risk Assessment on Online Photos. 427-447 - Johanna Ullrich, Edgar R. Weippl:
Privacy is Not an Option: Attacking the IPv6 Privacy Extension. 448-468
Evaluating Solutions
- Aleksandar Milenkoski, Bryan D. Payne, Nuno Antunes, Marco Vieira, Samuel Kounev, Alberto Avritzer, Matthias Luft:
Evaluation of Intrusion Detection Systems in Virtualized Environments Using Attack Injection. 471-492 - Dario Weißer, Johannes Dahse, Thorsten Holz:
Security Analysis of PHP Bytecode Protection Mechanisms. 493-514 - Mohamed Elsabagh, Daniel Barbará, Dan Fleck, Angelos Stavrou:
Radmin: Early Detection of Application-Level Resource Exhaustion and Starvation Attacks. 515-537 - Junyuan Zeng, Zhiqiang Lin:
Towards Automatic Inference of Kernel Object Semantics from Binary Code. 538-561
Attack Detection II
- Thomas Barabosch, Adrian Dombeck, Khaled Yakdan, Elmar Gerhards-Padilla:
BotWatcher - Transparent and Generic Botnet Tracking. 565-587 - Yangyi Chen, Vincent Bindschaedler, XiaoFeng Wang, Stefan Berger, Dimitrios E. Pendarakis:
Elite: Automatic Orchestration of Elastic Detection Services to Secure Cloud Hosting. 588-614 - Lukas Krämer, Johannes Krupp, Daisuke Makita, Tomomi Nishizoe, Takashi Koide, Katsunari Yoshioka, Christian Rossow:
AmpPot: Monitoring and Defending Against Amplification DDoS Attacks. 615-636
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.