Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/raid/raid2015.bht:"
@inproceedings{DBLP:conf/raid/AmannS15, author = {Johanna Amann and Robin Sommer}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {Providing Dynamic Control to Passive Network Security Monitoring}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {133--152}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_7}, doi = {10.1007/978-3-319-26362-5\_7}, timestamp = {Sun, 25 Oct 2020 22:56:09 +0100}, biburl = {https://dblp.org/rec/conf/raid/AmannS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/AndronioZM15, author = {Nicol{\'{o}} Andronio and Stefano Zanero and Federico Maggi}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {HelDroid: Dissecting and Detecting Mobile Ransomware}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {382--404}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_18}, doi = {10.1007/978-3-319-26362-5\_18}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/AndronioZM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BaraboschDYG15, author = {Thomas Barabosch and Adrian Dombeck and Khaled Yakdan and Elmar Gerhards{-}Padilla}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {BotWatcher - Transparent and Generic Botnet Tracking}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {565--587}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_26}, doi = {10.1007/978-3-319-26362-5\_26}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/BaraboschDYG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ChenBWBP15, author = {Yangyi Chen and Vincent Bindschaedler and XiaoFeng Wang and Stefan Berger and Dimitrios E. Pendarakis}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {Elite: Automatic Orchestration of Elastic Detection Services to Secure Cloud Hosting}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {588--614}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_27}, doi = {10.1007/978-3-319-26362-5\_27}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ChenBWBP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ElsabaghBFS15, author = {Mohamed Elsabagh and Daniel Barbar{\'{a}} and Dan Fleck and Angelos Stavrou}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {Radmin: Early Detection of Application-Level Resource Exhaustion and Starvation Attacks}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {515--537}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_24}, doi = {10.1007/978-3-319-26362-5\_24}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ElsabaghBFS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/GerdesM15, author = {Ryan M. Gerdes and Saptarshi Mallick}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {Physical-Layer Detection of Hardware Keyloggers}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {26--47}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_2}, doi = {10.1007/978-3-319-26362-5\_2}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/GerdesM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/JacquemartVUB15, author = {Quentin Jacquemart and Pierre{-}Antoine Vervier and Guillaume Urvoy{-}Keller and Ernst W. Biersack}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {Demystifying the {IP} Blackspace}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {111--132}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_6}, doi = {10.1007/978-3-319-26362-5\_6}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/JacquemartVUB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/KhasawnehODAP15, author = {Khaled N. Khasawneh and Meltem Ozsoy and Caleb Donovick and Nael B. Abu{-}Ghazaleh and Dmitry V. Ponomarev}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {Ensemble Learning for Low-Level Hardware-Supported Malware Detection}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {3--25}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_1}, doi = {10.1007/978-3-319-26362-5\_1}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/KhasawnehODAP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/KittelVKE15, author = {Thomas Kittel and Sebastian Vogl and Julian Kirsch and Claudia Eckert}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {Counteracting Data-Only Malware with Code Pointer Examination}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {177--197}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_9}, doi = {10.1007/978-3-319-26362-5\_9}, timestamp = {Fri, 15 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/KittelVKE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/KramerKMNKYR15, author = {Lukas Kr{\"{a}}mer and Johannes Krupp and Daisuke Makita and Tomomi Nishizoe and Takashi Koide and Katsunari Yoshioka and Christian Rossow}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {AmpPot: Monitoring and Defending Against Amplification DDoS Attacks}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {615--636}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_28}, doi = {10.1007/978-3-319-26362-5\_28}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/KramerKMNKYR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MaoCTG15, author = {Weixuan Mao and Zhongmin Cai and Don Towsley and Xiaohong Guan}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {Probabilistic Inference on Integrity for Access Behavior Based Malware Detection}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {155--176}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_8}, doi = {10.1007/978-3-319-26362-5\_8}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/MaoCTG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MauriceSNHF15, author = {Cl{\'{e}}mentine Maurice and Nicolas Le Scouarnec and Christoph Neumann and Olivier Heen and Aur{\'{e}}lien Francillon}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {Reverse Engineering Intel Last-Level Cache Complex Addressing Using Performance Counters}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {48--65}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_3}, doi = {10.1007/978-3-319-26362-5\_3}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/MauriceSNHF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MilenkoskiPAVKA15, author = {Aleksandar Milenkoski and Bryan D. Payne and Nuno Antunes and Marco Vieira and Samuel Kounev and Alberto Avritzer and Matthias Luft}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {Evaluation of Intrusion Detection Systems in Virtualized Environments Using Attack Injection}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {471--492}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_22}, doi = {10.1007/978-3-319-26362-5\_22}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/MilenkoskiPAVKA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/MurmuriaSBF15, author = {Rahul Murmuria and Angelos Stavrou and Daniel Barbar{\'{a}} and Dan Fleck}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {Continuous Authentication on Mobile Devices Using Power Consumption, Touch Gestures and Physical Movement of Users}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {405--424}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_19}, doi = {10.1007/978-3-319-26362-5\_19}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/MurmuriaSBF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/NamJCHP15, author = {Jaehyun Nam and Muhammad Jamshed and Byungkwon Choi and Dongsu Han and KyoungSoo Park}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {Haetae: Scaling the Performance of Network Intrusion Detection with Many-Core Processors}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {89--110}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_5}, doi = {10.1007/978-3-319-26362-5\_5}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/NamJCHP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/NieSLWYHF15, author = {Meining Nie and Purui Su and Qi Li and Zhi Wang and Lingyun Ying and Jinlong Hu and Dengguo Feng}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {Xede: Practical Exploit Early Detection}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {198--221}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_10}, doi = {10.1007/978-3-319-26362-5\_10}, timestamp = {Wed, 24 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/NieSLWYHF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/PellegrinoTBR15, author = {Giancarlo Pellegrino and Constantin Tsch{\"{u}}rtz and Eric Bodden and Christian Rossow}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {j{\"{A}}k: Using Dynamic Analysis to Crawl and Test Modern Web Applications}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {295--316}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_14}, doi = {10.1007/978-3-319-26362-5\_14}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/PellegrinoTBR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/RopkeH15, author = {Christian R{\"{o}}pke and Thorsten Holz}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {{SDN} Rootkits: Subverting Network Operating Systems of Software-Defined Networks}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {339--356}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_16}, doi = {10.1007/978-3-319-26362-5\_16}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/RopkeH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ShuYR15, author = {Xiaokui Shu and Danfeng (Daphne) Yao and Barbara G. Ryder}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {A Formal Framework for Program Anomaly Detection}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {270--292}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_13}, doi = {10.1007/978-3-319-26362-5\_13}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ShuYR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/SmutzS15, author = {Charles Smutz and Angelos Stavrou}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {Preventing Exploits in Microsoft Office Documents Through Content Randomization}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {225--246}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_11}, doi = {10.1007/978-3-319-26362-5\_11}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/SmutzS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/UllrichW15, author = {Johanna Ullrich and Edgar R. Weippl}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {Privacy is Not an Option: Attacking the IPv6 Privacy Extension}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {448--468}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_21}, doi = {10.1007/978-3-319-26362-5\_21}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/UllrichW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/WeisserDH15, author = {Dario Wei{\ss}er and Johannes Dahse and Thorsten Holz}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {Security Analysis of {PHP} Bytecode Protection Mechanisms}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {493--514}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_23}, doi = {10.1007/978-3-319-26362-5\_23}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/WeisserDH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/XuWS15, author = {Haitao Xu and Haining Wang and Angelos Stavrou}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {Privacy Risk Assessment on Online Photos}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {427--447}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_20}, doi = {10.1007/978-3-319-26362-5\_20}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/XuWS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/YangDP15, author = {Qilang Yang and Dimitrios Damopoulos and Georgios Portokalidis}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {{WYSISNWIV:} What You Scan Is Not What {I} Visit}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {317--338}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_15}, doi = {10.1007/978-3-319-26362-5\_15}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/YangDP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/YangZLSLHG15, author = {Wenbo Yang and Yuanyuan Zhang and Juanru Li and Junliang Shu and Bodong Li and Wenjun Hu and Dawu Gu}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {AppSpear: Bytecode Decrypting and {DEX} Reassembling for Packed Android Malware}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {359--381}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_17}, doi = {10.1007/978-3-319-26362-5\_17}, timestamp = {Wed, 21 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/YangZLSLHG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/YuanZD15, author = {Pinghai Yuan and Qingkai Zeng and Xuhua Ding}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {Hardware-Assisted Fine-Grained Code-Reuse Attack Detection}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {66--85}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_4}, doi = {10.1007/978-3-319-26362-5\_4}, timestamp = {Mon, 19 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/YuanZD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ZengL15, author = {Junyuan Zeng and Zhiqiang Lin}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {Towards Automatic Inference of Kernel Object Semantics from Binary Code}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {538--561}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_25}, doi = {10.1007/978-3-319-26362-5\_25}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/ZengL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ZhangSDCZFF15, author = {Yang Zhang and Xiaoshan Sun and Yi Deng and Liang Cheng and Shuke Zeng and Yu Fu and Dengguo Feng}, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {Improving Accuracy of Static Integer Overflow Detection in Binary}, booktitle = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, pages = {247--269}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5\_12}, doi = {10.1007/978-3-319-26362-5\_12}, timestamp = {Wed, 11 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/ZhangSDCZFF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/raid/2015, editor = {Herbert Bos and Fabian Monrose and Gregory Blanc}, title = {Research in Attacks, Intrusions, and Defenses - 18th International Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9404}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26362-5}, doi = {10.1007/978-3-319-26362-5}, isbn = {978-3-319-26361-8}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.