


default search action
17. RAID 2014: Gothenburg, Sweden
- Angelos Stavrou

, Herbert Bos, Georgios Portokalidis:
Research in Attacks, Intrusions and Defenses - 17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings. Lecture Notes in Computer Science 8688, Springer 2014, ISBN 978-3-319-11378-4
Malware and Defenses
- Marc Kührer, Christian Rossow, Thorsten Holz

:
Paint It Black: Evaluating the Effectiveness of Malware Blacklists. 1-21 - Zhaoyan Xu, Jialong Zhang, Guofei Gu, Zhiqiang Lin:

GoldenEye: Efficiently and Effectively Unveiling Malware's Targeted Environment. 22-45 - Kevin D. Bowers, Catherine Hart, Ari Juels, Nikos Triandopoulos:

PillarBox: Combating Next-Generation Malware with Fast Forward-Secure Logging. 46-67
Malware and Binary Analysis
- Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis:

Dynamic Reconstruction of Relocation Information for Stripped Binaries. 68-87 - Felix Schuster, Thomas Tendyck, Jannik Pewny, Andreas Maaß, Martin Steegmanns, Moritz Contag, Thorsten Holz

:
Evaluating the Effectiveness of Current Anti-ROP Defenses. 88-108 - Adrian Tang, Simha Sethumadhavan, Salvatore J. Stolfo:

Unsupervised Anomaly-Based Malware Detection Using Hardware Features. 109-129
Web
- Jacopo Corbetta, Luca Invernizzi, Christopher Krügel, Giovanni Vigna:

Eyes of a Human, Eyes of a Program: Leveraging Different Views of the Web for Analysis and Detection. 130-149 - Enrico Budianto, Yaoqi Jia, Xinshu Dong, Prateek Saxena, Zhenkai Liang

:
You Can't Be Me: Enabling Trusted Paths and User Sub-origins in Web Browsers. 150-171 - Nathaniel Boggs, Senyao Du, Salvatore J. Stolfo:

Measuring Drive-by Download Defense in Depth. 172-191
Web II
- Apurva Kumar:

A Lightweight Formal Approach for Analyzing Security of Web Protocols. 192-211 - Michael Weissbacher, Tobias Lauinger, William K. Robertson:

Why Is CSP Failing? Trends and Challenges in CSP Adoption. 212-233 - Nathaniel Boggs, Hang Zhao, Senyao Du, Salvatore J. Stolfo:

Synthetic Data Generation and Defense in Depth Measurement of Web Applications. 234-254
Authentication and Privacy
- Hassan Khan, Aaron Atwater, Urs Hengartner:

A Comparative Evaluation of Implicit Authentication Schemes. 255-275 - Yinzhi Cao, Yan Shoshitaishvili, Kevin Borgolte, Christopher Krügel, Giovanni Vigna, Yan Chen:

Protecting Web-Based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel. 276-298 - Gorka Irazoqui Apecechea, Mehmet Sinan Inci, Thomas Eisenbarth

, Berk Sunar:
Wait a Minute! A fast, Cross-VM Attack on AES. 299-319
Network Security
- Johanna Amann, Seth Hall, Robin Sommer:

Count Me In: Viable Distributed Summary Statistics for Securing High-Speed Networks. 320-340 - Noomene Ben Henda, Karl Norrman:

Formal Analysis of Security Procedures in LTE - A Feasibility Study. 341-361 - Il-Gu Lee, Hyunwoo Choi, Yongdae Kim

, Seungwon Shin, Myungchul Kim:
Run Away If You Can: - Persistent Jamming Attacks against Channel Hopping Wi-Fi Devices in Dense Networks. 362-383
Intrusion Detection and Vulnerability Analysis
- Ali Abbasi

, Jos Wetzels, Wouter Bokslag, Emmanuele Zambon
, Sandro Etalle:
On Emulation-Based Network Intrusion Detection Systems. 384-404 - Hamed Okhravi

, James Riordan, Kevin M. Carter:
Quantitative Evaluation of Dynamic Platform Techniques as a Defensive Mechanism. 405-425 - Kartik Nayak, Daniel Marino, Petros Efstathopoulos, Tudor Dumitras:

Some Vulnerabilities Are Different Than Others - Studying Vulnerabilities and Attack Surfaces in the Wild. 426-446 - José Benito Camiña

, Jorge Rodríguez-Ruiz
, Raúl Monroy
:
Towards a Masquerade Detection System Based on User's Tasks. 447-465

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














