


default search action
18. RAID 2015: Kyoto, Japan
- Herbert Bos

, Fabian Monrose, Gregory Blanc
:
Research in Attacks, Intrusions, and Defenses - 18th International Symposium, RAID 2015, Kyoto, Japan, November 2-4, 2015, Proceedings. Lecture Notes in Computer Science 9404, Springer 2015, ISBN 978-3-319-26361-8
Hardware
- Khaled N. Khasawneh, Meltem Ozsoy, Caleb Donovick

, Nael B. Abu-Ghazaleh
, Dmitry V. Ponomarev:
Ensemble Learning for Low-Level Hardware-Supported Malware Detection. 3-25 - Ryan M. Gerdes, Saptarshi Mallick:

Physical-Layer Detection of Hardware Keyloggers. 26-47 - Clémentine Maurice

, Nicolas Le Scouarnec, Christoph Neumann, Olivier Heen, Aurélien Francillon
:
Reverse Engineering Intel Last-Level Cache Complex Addressing Using Performance Counters. 48-65 - Pinghai Yuan, Qingkai Zeng, Xuhua Ding

:
Hardware-Assisted Fine-Grained Code-Reuse Attack Detection. 66-85
Networks
- Jaehyun Nam, Muhammad Jamshed, Byungkwon Choi, Dongsu Han

, KyoungSoo Park:
Haetae: Scaling the Performance of Network Intrusion Detection with Many-Core Processors. 89-110 - Quentin Jacquemart, Pierre-Antoine Vervier, Guillaume Urvoy-Keller, Ernst W. Biersack:

Demystifying the IP Blackspace. 111-132 - Johanna Amann, Robin Sommer:

Providing Dynamic Control to Passive Network Security Monitoring. 133-152
Hardening
- Weixuan Mao, Zhongmin Cai, Don Towsley

, Xiaohong Guan:
Probabilistic Inference on Integrity for Access Behavior Based Malware Detection. 155-176 - Thomas Kittel, Sebastian Vogl, Julian Kirsch, Claudia Eckert:

Counteracting Data-Only Malware with Code Pointer Examination. 177-197 - Meining Nie, Purui Su, Qi Li, Zhi Wang, Lingyun Ying, Jinlong Hu, Dengguo Feng:

Xede: Practical Exploit Early Detection. 198-221
Attack Detection I
- Charles Smutz, Angelos Stavrou

:
Preventing Exploits in Microsoft Office Documents Through Content Randomization. 225-246 - Yang Zhang, Xiaoshan Sun, Yi Deng, Liang Cheng, Shuke Zeng, Yu Fu, Dengguo Feng:

Improving Accuracy of Static Integer Overflow Detection in Binary. 247-269 - Xiaokui Shu, Danfeng (Daphne) Yao

, Barbara G. Ryder:
A Formal Framework for Program Anomaly Detection. 270-292
Web and Net
- Giancarlo Pellegrino

, Constantin Tschürtz, Eric Bodden
, Christian Rossow:
jÄk: Using Dynamic Analysis to Crawl and Test Modern Web Applications. 295-316 - Qilang Yang, Dimitrios Damopoulos, Georgios Portokalidis

:
WYSISNWIV: What You Scan Is Not What I Visit. 317-338 - Christian Röpke, Thorsten Holz

:
SDN Rootkits: Subverting Network Operating Systems of Software-Defined Networks. 339-356
Android
- Wenbo Yang, Yuanyuan Zhang, Juanru Li, Junliang Shu, Bodong Li, Wenjun Hu, Dawu Gu:

AppSpear: Bytecode Decrypting and DEX Reassembling for Packed Android Malware. 359-381 - Nicoló Andronio, Stefano Zanero

, Federico Maggi
:
HelDroid: Dissecting and Detecting Mobile Ransomware. 382-404 - Rahul Murmuria, Angelos Stavrou

, Daniel Barbará, Dan Fleck
:
Continuous Authentication on Mobile Devices Using Power Consumption, Touch Gestures and Physical Movement of Users. 405-424
Privacy
- Haitao Xu, Haining Wang, Angelos Stavrou

:
Privacy Risk Assessment on Online Photos. 427-447 - Johanna Ullrich

, Edgar R. Weippl:
Privacy is Not an Option: Attacking the IPv6 Privacy Extension. 448-468
Evaluating Solutions
- Aleksandar Milenkoski, Bryan D. Payne, Nuno Antunes

, Marco Vieira
, Samuel Kounev, Alberto Avritzer, Matthias Luft:
Evaluation of Intrusion Detection Systems in Virtualized Environments Using Attack Injection. 471-492 - Dario Weißer, Johannes Dahse, Thorsten Holz

:
Security Analysis of PHP Bytecode Protection Mechanisms. 493-514 - Mohamed Elsabagh

, Daniel Barbará, Dan Fleck
, Angelos Stavrou
:
Radmin: Early Detection of Application-Level Resource Exhaustion and Starvation Attacks. 515-537 - Junyuan Zeng, Zhiqiang Lin:

Towards Automatic Inference of Kernel Object Semantics from Binary Code. 538-561
Attack Detection II
- Thomas Barabosch, Adrian Dombeck, Khaled Yakdan, Elmar Gerhards-Padilla:

BotWatcher - Transparent and Generic Botnet Tracking. 565-587 - Yangyi Chen, Vincent Bindschaedler

, XiaoFeng Wang, Stefan Berger, Dimitrios E. Pendarakis:
Elite: Automatic Orchestration of Elastic Detection Services to Secure Cloud Hosting. 588-614 - Lukas Krämer, Johannes Krupp, Daisuke Makita, Tomomi Nishizoe, Takashi Koide, Katsunari Yoshioka, Christian Rossow:

AmpPot: Monitoring and Defending Against Amplification DDoS Attacks. 615-636

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














