RAID A

23 papers

YearTitle / Authors
2014A Comparative Evaluation of Implicit Authentication Schemes.
Hassan Khan, Aaron Atwater, Urs Hengartner
2014A Lightweight Formal Approach for Analyzing Security of Web Protocols.
Apurva Kumar
2014Count Me In: Viable Distributed Summary Statistics for Securing High-Speed Networks.
Johanna Amann, Seth Hall, Robin Sommer
2014Dynamic Reconstruction of Relocation Information for Stripped Binaries.
Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis
2014Evaluating the Effectiveness of Current Anti-ROP Defenses.
Felix Schuster, Thomas Tendyck, Jannik Pewny, Andreas Maaß, Martin Steegmanns, Moritz Contag, Thorsten Holz
2014Eyes of a Human, Eyes of a Program: Leveraging Different Views of the Web for Analysis and Detection.
Jacopo Corbetta, Luca Invernizzi, Christopher Krügel, Giovanni Vigna
2014Formal Analysis of Security Procedures in LTE - A Feasibility Study.
Noomene Ben Henda, Karl Norrman
2014GoldenEye: Efficiently and Effectively Unveiling Malware's Targeted Environment.
Zhaoyan Xu, Jialong Zhang, Guofei Gu, Zhiqiang Lin
2014Measuring Drive-by Download Defense in Depth.
Nathaniel Boggs, Senyao Du, Salvatore J. Stolfo
2014On Emulation-Based Network Intrusion Detection Systems.
Ali Abbasi, Jos Wetzels, Wouter Bokslag, Emmanuele Zambon, Sandro Etalle
2014Paint It Black: Evaluating the Effectiveness of Malware Blacklists.
Marc Kührer, Christian Rossow, Thorsten Holz
2014PillarBox: Combating Next-Generation Malware with Fast Forward-Secure Logging.
Kevin D. Bowers, Catherine Hart, Ari Juels, Nikos Triandopoulos
2014Protecting Web-Based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel.
Yinzhi Cao, Yan Shoshitaishvili, Kevin Borgolte, Christopher Krügel, Giovanni Vigna, Yan Chen
2014Quantitative Evaluation of Dynamic Platform Techniques as a Defensive Mechanism.
Hamed Okhravi, James Riordan, Kevin M. Carter
2014Research in Attacks, Intrusions and Defenses - 17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings
Angelos Stavrou, Herbert Bos, Georgios Portokalidis
2014Run Away If You Can: - Persistent Jamming Attacks against Channel Hopping Wi-Fi Devices in Dense Networks.
Il-Gu Lee, Hyunwoo Choi, Yongdae Kim, Seungwon Shin, Myungchul Kim
2014Some Vulnerabilities Are Different Than Others - Studying Vulnerabilities and Attack Surfaces in the Wild.
Kartik Nayak, Daniel Marino, Petros Efstathopoulos, Tudor Dumitras
2014Synthetic Data Generation and Defense in Depth Measurement of Web Applications.
Nathaniel Boggs, Hang Zhao, Senyao Du, Salvatore J. Stolfo
2014Towards a Masquerade Detection System Based on User's Tasks.
José Benito Camiña, Jorge Rodríguez-Ruiz, Raúl Monroy
2014Unsupervised Anomaly-Based Malware Detection Using Hardware Features.
Adrian Tang, Simha Sethumadhavan, Salvatore J. Stolfo
2014Wait a Minute! A fast, Cross-VM Attack on AES.
Gorka Irazoqui Apecechea, Mehmet Sinan Inci, Thomas Eisenbarth, Berk Sunar
2014Why Is CSP Failing? Trends and Challenges in CSP Adoption.
Michael Weissbacher, Tobias Lauinger, William K. Robertson
2014You Can't Be Me: Enabling Trusted Paths and User Sub-origins in Web Browsers.
Enrico Budianto, Yaoqi Jia, Xinshu Dong, Prateek Saxena, Zhenkai Liang