Search dblp for Publications

export results for "toc:db/conf/raid/raid2015.bht:"

 download as .bib file

@inproceedings{DBLP:conf/raid/AmannS15,
  author       = {Johanna Amann and
                  Robin Sommer},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {Providing Dynamic Control to Passive Network Security Monitoring},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {133--152},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_7},
  doi          = {10.1007/978-3-319-26362-5\_7},
  timestamp    = {Sun, 25 Oct 2020 22:56:09 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/AmannS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/AndronioZM15,
  author       = {Nicol{\'{o}} Andronio and
                  Stefano Zanero and
                  Federico Maggi},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {HelDroid: Dissecting and Detecting Mobile Ransomware},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {382--404},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_18},
  doi          = {10.1007/978-3-319-26362-5\_18},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/AndronioZM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BaraboschDYG15,
  author       = {Thomas Barabosch and
                  Adrian Dombeck and
                  Khaled Yakdan and
                  Elmar Gerhards{-}Padilla},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {BotWatcher - Transparent and Generic Botnet Tracking},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {565--587},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_26},
  doi          = {10.1007/978-3-319-26362-5\_26},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/BaraboschDYG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ChenBWBP15,
  author       = {Yangyi Chen and
                  Vincent Bindschaedler and
                  XiaoFeng Wang and
                  Stefan Berger and
                  Dimitrios E. Pendarakis},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {Elite: Automatic Orchestration of Elastic Detection Services to Secure
                  Cloud Hosting},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {588--614},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_27},
  doi          = {10.1007/978-3-319-26362-5\_27},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ChenBWBP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ElsabaghBFS15,
  author       = {Mohamed Elsabagh and
                  Daniel Barbar{\'{a}} and
                  Dan Fleck and
                  Angelos Stavrou},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {Radmin: Early Detection of Application-Level Resource Exhaustion and
                  Starvation Attacks},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {515--537},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_24},
  doi          = {10.1007/978-3-319-26362-5\_24},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ElsabaghBFS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GerdesM15,
  author       = {Ryan M. Gerdes and
                  Saptarshi Mallick},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {Physical-Layer Detection of Hardware Keyloggers},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {26--47},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_2},
  doi          = {10.1007/978-3-319-26362-5\_2},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/GerdesM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/JacquemartVUB15,
  author       = {Quentin Jacquemart and
                  Pierre{-}Antoine Vervier and
                  Guillaume Urvoy{-}Keller and
                  Ernst W. Biersack},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {Demystifying the {IP} Blackspace},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {111--132},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_6},
  doi          = {10.1007/978-3-319-26362-5\_6},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/JacquemartVUB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/KhasawnehODAP15,
  author       = {Khaled N. Khasawneh and
                  Meltem Ozsoy and
                  Caleb Donovick and
                  Nael B. Abu{-}Ghazaleh and
                  Dmitry V. Ponomarev},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {Ensemble Learning for Low-Level Hardware-Supported Malware Detection},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {3--25},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_1},
  doi          = {10.1007/978-3-319-26362-5\_1},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/KhasawnehODAP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/KittelVKE15,
  author       = {Thomas Kittel and
                  Sebastian Vogl and
                  Julian Kirsch and
                  Claudia Eckert},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {Counteracting Data-Only Malware with Code Pointer Examination},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {177--197},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_9},
  doi          = {10.1007/978-3-319-26362-5\_9},
  timestamp    = {Fri, 15 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/KittelVKE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/KramerKMNKYR15,
  author       = {Lukas Kr{\"{a}}mer and
                  Johannes Krupp and
                  Daisuke Makita and
                  Tomomi Nishizoe and
                  Takashi Koide and
                  Katsunari Yoshioka and
                  Christian Rossow},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {AmpPot: Monitoring and Defending Against Amplification DDoS Attacks},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {615--636},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_28},
  doi          = {10.1007/978-3-319-26362-5\_28},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/KramerKMNKYR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MaoCTG15,
  author       = {Weixuan Mao and
                  Zhongmin Cai and
                  Don Towsley and
                  Xiaohong Guan},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {Probabilistic Inference on Integrity for Access Behavior Based Malware
                  Detection},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {155--176},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_8},
  doi          = {10.1007/978-3-319-26362-5\_8},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/MaoCTG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MauriceSNHF15,
  author       = {Cl{\'{e}}mentine Maurice and
                  Nicolas Le Scouarnec and
                  Christoph Neumann and
                  Olivier Heen and
                  Aur{\'{e}}lien Francillon},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {Reverse Engineering Intel Last-Level Cache Complex Addressing Using
                  Performance Counters},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {48--65},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_3},
  doi          = {10.1007/978-3-319-26362-5\_3},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/MauriceSNHF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MilenkoskiPAVKA15,
  author       = {Aleksandar Milenkoski and
                  Bryan D. Payne and
                  Nuno Antunes and
                  Marco Vieira and
                  Samuel Kounev and
                  Alberto Avritzer and
                  Matthias Luft},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {Evaluation of Intrusion Detection Systems in Virtualized Environments
                  Using Attack Injection},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {471--492},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_22},
  doi          = {10.1007/978-3-319-26362-5\_22},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/MilenkoskiPAVKA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MurmuriaSBF15,
  author       = {Rahul Murmuria and
                  Angelos Stavrou and
                  Daniel Barbar{\'{a}} and
                  Dan Fleck},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {Continuous Authentication on Mobile Devices Using Power Consumption,
                  Touch Gestures and Physical Movement of Users},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {405--424},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_19},
  doi          = {10.1007/978-3-319-26362-5\_19},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/MurmuriaSBF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/NamJCHP15,
  author       = {Jaehyun Nam and
                  Muhammad Jamshed and
                  Byungkwon Choi and
                  Dongsu Han and
                  KyoungSoo Park},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {Haetae: Scaling the Performance of Network Intrusion Detection with
                  Many-Core Processors},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {89--110},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_5},
  doi          = {10.1007/978-3-319-26362-5\_5},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/NamJCHP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/NieSLWYHF15,
  author       = {Meining Nie and
                  Purui Su and
                  Qi Li and
                  Zhi Wang and
                  Lingyun Ying and
                  Jinlong Hu and
                  Dengguo Feng},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {Xede: Practical Exploit Early Detection},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {198--221},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_10},
  doi          = {10.1007/978-3-319-26362-5\_10},
  timestamp    = {Wed, 24 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/NieSLWYHF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/PellegrinoTBR15,
  author       = {Giancarlo Pellegrino and
                  Constantin Tsch{\"{u}}rtz and
                  Eric Bodden and
                  Christian Rossow},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {j{\"{A}}k: Using Dynamic Analysis to Crawl and Test Modern Web
                  Applications},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {295--316},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_14},
  doi          = {10.1007/978-3-319-26362-5\_14},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/PellegrinoTBR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/RopkeH15,
  author       = {Christian R{\"{o}}pke and
                  Thorsten Holz},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {{SDN} Rootkits: Subverting Network Operating Systems of Software-Defined
                  Networks},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {339--356},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_16},
  doi          = {10.1007/978-3-319-26362-5\_16},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/RopkeH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ShuYR15,
  author       = {Xiaokui Shu and
                  Danfeng (Daphne) Yao and
                  Barbara G. Ryder},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {A Formal Framework for Program Anomaly Detection},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {270--292},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_13},
  doi          = {10.1007/978-3-319-26362-5\_13},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ShuYR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/SmutzS15,
  author       = {Charles Smutz and
                  Angelos Stavrou},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {Preventing Exploits in Microsoft Office Documents Through Content
                  Randomization},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {225--246},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_11},
  doi          = {10.1007/978-3-319-26362-5\_11},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/SmutzS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/UllrichW15,
  author       = {Johanna Ullrich and
                  Edgar R. Weippl},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {Privacy is Not an Option: Attacking the IPv6 Privacy Extension},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {448--468},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_21},
  doi          = {10.1007/978-3-319-26362-5\_21},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/UllrichW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/WeisserDH15,
  author       = {Dario Wei{\ss}er and
                  Johannes Dahse and
                  Thorsten Holz},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {Security Analysis of {PHP} Bytecode Protection Mechanisms},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {493--514},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_23},
  doi          = {10.1007/978-3-319-26362-5\_23},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/WeisserDH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/XuWS15,
  author       = {Haitao Xu and
                  Haining Wang and
                  Angelos Stavrou},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {Privacy Risk Assessment on Online Photos},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {427--447},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_20},
  doi          = {10.1007/978-3-319-26362-5\_20},
  timestamp    = {Thu, 09 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/XuWS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/YangDP15,
  author       = {Qilang Yang and
                  Dimitrios Damopoulos and
                  Georgios Portokalidis},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {{WYSISNWIV:} What You Scan Is Not What {I} Visit},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {317--338},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_15},
  doi          = {10.1007/978-3-319-26362-5\_15},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/YangDP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/YangZLSLHG15,
  author       = {Wenbo Yang and
                  Yuanyuan Zhang and
                  Juanru Li and
                  Junliang Shu and
                  Bodong Li and
                  Wenjun Hu and
                  Dawu Gu},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {AppSpear: Bytecode Decrypting and {DEX} Reassembling for Packed Android
                  Malware},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {359--381},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_17},
  doi          = {10.1007/978-3-319-26362-5\_17},
  timestamp    = {Wed, 21 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/YangZLSLHG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/YuanZD15,
  author       = {Pinghai Yuan and
                  Qingkai Zeng and
                  Xuhua Ding},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {Hardware-Assisted Fine-Grained Code-Reuse Attack Detection},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {66--85},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_4},
  doi          = {10.1007/978-3-319-26362-5\_4},
  timestamp    = {Mon, 19 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/YuanZD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ZengL15,
  author       = {Junyuan Zeng and
                  Zhiqiang Lin},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {Towards Automatic Inference of Kernel Object Semantics from Binary
                  Code},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {538--561},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_25},
  doi          = {10.1007/978-3-319-26362-5\_25},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ZengL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ZhangSDCZFF15,
  author       = {Yang Zhang and
                  Xiaoshan Sun and
                  Yi Deng and
                  Liang Cheng and
                  Shuke Zeng and
                  Yu Fu and
                  Dengguo Feng},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {Improving Accuracy of Static Integer Overflow Detection in Binary},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {247--269},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_12},
  doi          = {10.1007/978-3-319-26362-5\_12},
  timestamp    = {Wed, 11 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/ZhangSDCZFF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/raid/2015,
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5},
  doi          = {10.1007/978-3-319-26362-5},
  isbn         = {978-3-319-26361-8},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics