RAID A

23 papers

YearTitle / Authors
2013A Primitive for Revealing Stealthy Peripheral-Based Attacks on the Computing Platform's Main Memory.
Patrick Stewin
2013API Chaser: Anti-analysis Resistant Malware Analyzer.
Yuhei Kawakoya, Makoto Iwamura, Eitaro Shioji, Takeo Hariu
2013Active Credential Leakage for Observing Web-Based Attack Cycle.
Mitsuaki Akiyama, Takeshi Yagi, Kazufumi Aoki, Takeo Hariu, Youki Kadobayashi
2013Behavior Decomposition: Aspect-Level Browser Extension Clustering and Its Security Implications.
Bin Zhao, Peng Liu
2013Check My Profile: Leveraging Static Analysis for Fast and Accurate Detection of ROP Gadgets.
Blaine Stancill, Kevin Z. Snow, Nathan Otterness, Fabian Monrose, Lucas Davi, Ahmad-Reza Sadeghi
2013CloudFence: Data Flow Tracking as a Cloud Service.
Vasilis Pappas, Vasileios P. Kemerlis, Angeliki Zavou, Michalis Polychronakis, Angelos D. Keromytis
2013Connected Colors: Unveiling the Structure of Criminal Networks.
Yacin Nadji, Manos Antonakakis, Roberto Perdisci, Wenke Lee
2013Deconstructing the Assessment of Anomaly-based Intrusion Detectors.
Arun Viswanathan, Kymie Tan, Clifford Neuman
2013Deobfuscating Embedded Malware Using Probable-Plaintext Attacks.
Christian Wressnegger, Frank Boldewin, Konrad Rieck
2013Detecting Traditional Packers, Decisively.
Denis Bueno, Kevin J. Compton, Karem A. Sakallah, Michael D. Bailey
2013FIRMA: Malware Clustering and Network Signature Generation with Mixed Network Behaviors.
M. Zubair Rafique, Juan Caballero
2013Holiday Pictures or Blockbuster Movies? Insights into Copyright Infringement in User Uploads to One-Click File Hosters.
Tobias Lauinger, Kaan Onarlioglu, Chaabane Abdelberi, Engin Kirda, William K. Robertson, Mohamed Ali Kâafar
2013Hypervisor Memory Forensics.
Mariano Graziano, Andrea Lanzi, Davide Balzarotti
2013Mobile Malware Detection Based on Energy Fingerprints - A Dead End?
Johannes Hoffmann, Stephan Neumann, Thorsten Holz
2013Practical Attacks against the I2P Network.
Christoph Egger, Johannes Schlumberger, Christopher Kruegel, Giovanni Vigna
2013Practical Context-Aware Permission Control for Hybrid Mobile Applications.
Kapil Singh
2013Research in Attacks, Intrusions, and Defenses - 16th International Symposium, RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013. Proceedings
Salvatore J. Stolfo, Angelos Stavrou, Charles V. Wright
2013SILVER: Fine-Grained and Transparent Protection Domain Primitives in Commodity OS Kernel.
Xi Xiong, Peng Liu
2013Server-Side Code Injection Attacks: A Historical Perspective.
Jakob Fritz, Corrado Leita, Michalis Polychronakis
2013Side-Channel Attacks on the Yubikey 2 One-Time Password Generator.
David F. Oswald, Bastian Richter, Christof Paar
2013Systematic Analysis of Defenses against Return-Oriented Programming.
Richard Skowyra, Kelly Casteel, Hamed Okhravi, Nickolai Zeldovich, William W. Streilein
2013Tamper-Resistant LikeJacking Protection.
Martin Johns, Sebastian Lekies
2013Understanding SMS Spam in a Large Cellular Network: Characteristics, Strategies and Defenses.
Nan Jiang, Yu Jin, Ann Skudlark, Zhi-Li Zhang