


default search action
19. RAID 2016: Paris, France
- Fabian Monrose, Marc Dacier, Gregory Blanc, Joaquín García-Alfaro

:
Research in Attacks, Intrusions, and Defenses - 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings. Lecture Notes in Computer Science 9854, Springer 2016, ISBN 978-3-319-45718-5
Systems Security
- Lazaros Koromilas, Giorgos Vasiliadis

, Elias Athanasopoulos, Sotiris Ioannidis:
GRIM: Leveraging GPUs for Kernel Integrity Monitoring. 3-23 - Marius Muench, Fabio Pagani, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna, Davide Balzarotti:

Taming Transactions: Towards Hardware-Assisted Control Flow Integrity Using Transactional Memory. 24-48 - Junyuan Zeng, Yangchun Fu, Zhiqiang Lin:

Automatic Uncovering of Tap Points from Kernel Executions. 49-70 - Yangchun Fu, Junghwan Rhee, Zhiqiang Lin, Zhichun Li, Hui Zhang, Guofei Jiang:

Detecting Stack Layout Corruptions with Robust Stack Unwinding. 71-94
Low-Level Attacks and Defenses
- Claudio Bozzato, Riccardo Focardi

, Francesco Palmarini, Graham Steel:
APDU-Level Attacks in PKCS#11 Devices. 97-117 - Tianwei Zhang, Yinqian Zhang, Ruby B. Lee:

CloudRadar: A Real-Time Side-Channel Attack Detection System in Clouds. 118-140
Measurement Studies
- Kurt Thomas, Rony Amira, Adi Ben-Yoash, Ori Folger, Amir Hardon, Ari Berger, Elie Bursztein, Michael D. Bailey:

The Abuse Sharing Economy: Understanding the Limits of Threat Exchanges. 143-164 - Akira Yokoyama, Kou Ishii, Rui Tanabe

, Yinmin Papa, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, Daisuke Inoue, Michael Brengel, Michael Backes, Christian Rossow:
SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion. 165-187 - Athanasios Kountouras, Panagiotis Kintis, Chaz Lever, Yizheng Chen, Yacin Nadji, David Dagon, Manos Antonakakis, Rodney Joffe:

Enabling Network Security Through Active DNS Datasets. 188-208
Malware Analysis
- Jeremy Blackthorne, Benjamin Kaiser, Bülent Yener:

A Formal Framework for Environmentally Sensitive Malware. 211-229 - Marcos Sebastián, Richard Rivera

, Platon Kotzias, Juan Caballero:
AVclass: A Tool for Massive Malware Labeling. 230-253 - Xunchao Hu, Aravind Prakash, Jinghan Wang, Rundong Zhou, Yao Cheng, Heng Yin

:
Semantics-Preserving Dissection of JavaScript Exploits via Dynamic JS-Binary Analysis. 254-276
Network Security
- Adrian Dabrowski

, Georg Petzl, Edgar R. Weippl:
The Messenger Shoots Back: Network Operator Based IMSI Catcher Detection. 279-302 - Michael Backes, Thorsten Holz

, Christian Rossow, Teemu Rytilahti, Milivoj Simeonovski, Ben Stock:
On the Feasibility of TTL-Based Filtering for DRDoS Mitigation. 303-322
Systematization of Knowledge and Experience Reports
- Alejandro Calleja, Juan E. Tapiador

, Juan Caballero:
A Look into 30 Years of Malware Development from a Software Metrics Perspective. 325-345 - Yury Zhauniarovich, Olga Gadyatskaya:

Small Changes, Big Changes: An Updated View on the Android Permission System. 346-367 - Arman Noroozian, Maciej Korczynski, Carlos Hernandez Gañán

, Daisuke Makita, Katsunari Yoshioka, Michel van Eeten:
Who Gets the Boot? Analyzing Victimization by DDoS-as-a-Service. 368-389
Web and Mobile Security
- Giancarlo Pellegrino

, Onur Catakoglu, Davide Balzarotti, Christian Rossow:
Uses and Abuses of Server-Side Requests. 393-414 - Sajjad Arshad, Amin Kharraz, William Robertson:

Identifying Extension-Based Ad Injection via Fine-Grained Web Content Provenance. 415-436 - Andrea Mambretti

, Kaan Onarlioglu, Collin Mulliner, William Robertson, Engin Kirda, Federico Maggi, Stefano Zanero
:
Trellis: Privilege Separation for Multi-user Applications Made Easy. 437-456 - Mingshen Sun, John C. S. Lui, Yajin Zhou:

Blender: Self-randomizing Address Space Layout for Android Apps. 457-480

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














