RAID A

31 papers

YearTitle / Authors
2012A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence.
B. Amann, Robin Sommer, Aashish Sharma, Seth Hall
2012A Memory Access Validation Scheme against Payload Injection Attacks.
Dongkyun Ahn, Gyungho Lee
2012AK-PPM: An Authenticated Packet Attribution Scheme for Mobile Ad Hoc Networks.
Zhi Xu, Hung-Yuan Hsu, Xin Chen, Sencun Zhu, Ali R. Hurson
2012ALERT-ID: Analyze Logs of the Network Element in Real Time for Intrusion Detection.
Jie Chu, Zihui Ge, Richard Huber, Ping Ji, Jennifer Yates, Yung-Chao Yu
2012Accurate Recovery of Functions in a Retargetable Decompiler(Poster Abstract).
Lukás Durfina, Jakub Kroustek, Petr Zemek, Bretislav Kábele
2012Assessing the Trustworthiness of Drivers.
Shengzhi Zhang, Peng Liu
2012Automatic Covert Channel Detection in Asbestos System (Poster Abstract).
Shuyuan Jin, Zhi Yang, Xiang Cui
2012Concurrency Optimization for NIDS (Poster Abstract).
Jorge Maestre Vidal, Hugo Villanúa Vega, Jaime Daniel Mejía Castro, Luis Javier García-Villalba
2012DEMACRO: Defense against Malicious Cross-Domain Requests.
Sebastian Lekies, Nick Nikiforakis, Walter Tighzert, Frank Piessens, Martin Johns
2012Dione: A Flexible Disk Monitoring and Analysis Framework.
Jennifer Mankin, David R. Kaeli
2012Distress Detection (Poster Abstract).
Mark Vella, Sotirios Terzis, Marc Roper
2012EFA for Efficient Regular Expression Matching in NIDS (Poster Abstract).
Dengke Qiao, Tingwen Liu, Yong Sun, Li Guo
2012Evaluating Electricity Theft Detectors in Smart Grid Networks.
Daisuke Mashima, Alvaro A. Cárdenas
2012FlashDetect: ActionScript 3 Malware Detection.
Timon Van Overveldt, Christopher Kruegel, Giovanni Vigna
2012GPP-Grep: High-Speed Regular Expression Processing Engine on General Purpose Processors.
Victor C. Valgenti, Jatin Chhugani, Yan Sun, Nadathur Satish, Min Sik Kim, Changkyu Kim, Pradeep Dubey
2012Improvement of an Anagram Based NIDS by Reducing the Storage Space of Bloom Filters (Poster Abstract).
Hugo Villanúa Vega, Jorge Maestre Vidal, Jaime Daniel Mejía Castro, Luis Javier García-Villalba
2012Industrial Espionage and Targeted Attacks: Understanding the Characteristics of an Escalating Threat.
Olivier Thonnard, Leyla Bilge, Gavin O'Gorman, Seán Kiernan, Martin Lee
2012Malware Detection System by Payload Analysis of Network Traffic (Poster Abstract).
Luis Javier García-Villalba, Jaime Daniel Mejía Castro, Ana Lucila Sandoval Orozco, Javier Martínez Puentes
2012Memory Errors: The Past, the Present, and the Future.
Victor van der Veen, Nitish dutt-Sharma, Lorenzo Cavallaro, Herbert Bos
2012N-Gram against the Machine: On the Feasibility of the N-Gram Network Analysis for Binary Protocols.
Dina Hadziosmanovic, Lorenzo Simionato, Damiano Bolzoni, Emmanuele Zambon, Sandro Etalle
2012Network Security Analysis Method Taking into Account the Usage Information (Poster Abstract).
Jinyu Wu, Lihua Yin, Binxing Fang
2012Online Social Networks, a Criminals Multipurpose Toolbox (Poster Abstract).
Shah Mahmood, Yvo Desmedt
2012Paying for Piracy? An Analysis of One-Click Hosters' Controversial Reward Schemes.
Tobias Lauinger, Engin Kirda, Pietro Michiardi
2012PoisonAmplifier: A Guided Approach of Discovering Compromised Websites through Reversing Search Poisoning Attacks.
Jialong Zhang, Chao Yang, Zhaoyan Xu, Guofei Gu
2012Proactive Discovery of Phishing Related Domain Names.
Samuel Marchal, Jérôme François, Radu State, Thomas Engel
2012Research in Attacks, Intrusions, and Defenses - 15th International Symposium, RAID 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings
Davide Balzarotti, Salvatore J. Stolfo, Marco Cova
2012Secure and Robust Monitoring of Virtual Machines through Guest-Assisted Introspection.
Martim Carbone, Matthew Conover, Bruce Montague, Wenke Lee
2012The Triple-Channel Model: Toward Robust and Efficient Advanced Botnets (Poster Abstract).
Xiang Cui, Jinqiao Shi, Peng Liao, Chaoge Liu
2012Towards Automated Forensic Event Reconstruction of Malicious Code (Poster Abstract).
Ahmed F. Shosha, Joshua James, Chen-Ching Liu, Pavel Gladyshev
2012Trie Data Structure to Compare Traffic Payload in a Supervised Anomaly Detection System (Poster Abstract).
Jenny Andrea Pinto Sánchez, Luis Javier García-Villalba
2012Trusted VM Snapshots in Untrusted Cloud Infrastructures.
Abhinav Srivastava, Himanshu Raj, Jonathon T. Giffin, Paul England