RAID A

21 papers

YearTitle / Authors
2011Automated Identification of Cryptographic Primitives in Binary Programs.
Felix Gröbert, Carsten Willems, Thorsten Holz
2011Banksafe Information Stealer Detection Inside the Web Browser.
Armin Buescher, Felix Leder, Thomas Siebert
2011Cross-Analysis of Botnet Victims: New Insights and Implications.
Seungwon Shin, Raymond Lin, Guofei Gu
2011Cross-Domain Collaborative Anomaly Detection: So Far Yet So Close.
Nathaniel Boggs, Sharath Hiremagalore, Angelos Stavrou, Salvatore J. Stolfo
2011Defending Embedded Systems with Software Symbiotes.
Ang Cui, Salvatore J. Stolfo
2011Detecting Environment-Sensitive Malware.
Martina Lindorfer, Clemens Kolbitsch, Paolo Milani Comparetti
2011Detecting Traffic Snooping in Tor Using Decoys.
Sambuddho Chakravarty, Georgios Portokalidis, Michalis Polychronakis, Angelos D. Keromytis
2011Die Free or Live Hard? Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers.
Chao Yang, Robert Chandler Harkreader, Guofei Gu
2011Dymo: Tracking Dynamic Code Identity.
Bob Gilbert, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna
2011IceShield: Detection and Mitigation of Malicious Websites with a Frozen DOM.
Mario Heiderich, Tilman Frosch, Thorsten Holz
2011KLIMAX: Profiling Memory Write Patterns to Detect Keystroke-Harvesting Malware.
Stefano Ortolani, Cristiano Giuffrida, Bruno Crispo
2011Minemu: The World's Fastest Taint Tracker.
Erik Bosman, Asia Slowinska, Herbert Bos
2011Modeling User Search Behavior for Masquerade Detection.
Malek Ben Salem, Salvatore J. Stolfo
2011On the Expressiveness of Return-into-libc Attacks.
Minh Tran, Mark Etheridge, Tyler K. Bletsch, Xuxian Jiang, Vincent W. Freeh, Peng Ning
2011Packed, Printable, and Polymorphic Return-Oriented Programming.
Kangjie Lu, Dabi Zou, Weiping Wen, Debin Gao
2011Recent Advances in Intrusion Detection - 14th International Symposium, RAID 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings
Robin Sommer, Davide Balzarotti, Gregor Maier
2011Revisiting Traffic Anomaly Detection Using Software Defined Networking.
Syed Akbar Mehdi, Junaid Khalid, Syed Ali Khayam
2011Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling Attack.
Sheila Becker, Jeff Seibert, Cristina Nita-Rotaru, Radu State
2011Shellzer: A Tool for the Dynamic Analysis of Malicious Shellcode.
Yanick Fratantonio, Christopher Kruegel, Giovanni Vigna
2011Spam Filtering in Twitter Using Sender-Receiver Relationship.
Jonghyuk Song, Sangho Lee, Jong Kim
2011What If You Can't Trust Your Network Card?
Loïc Duflot, Yves-Alexis Perez, Benjamin Morin