RAID A

29 papers

YearTitle / Authors
2015A Formal Framework for Program Anomaly Detection.
Xiaokui Shu, Danfeng (Daphne) Yao, Barbara G. Ryder
2015AmpPot: Monitoring and Defending Against Amplification DDoS Attacks.
Lukas Krämer, Johannes Krupp, Daisuke Makita, Tomomi Nishizoe, Takashi Koide, Katsunari Yoshioka, Christian Rossow
2015AppSpear: Bytecode Decrypting and DEX Reassembling for Packed Android Malware.
Wenbo Yang, Yuanyuan Zhang, Juanru Li, Junliang Shu, Bodong Li, Wenjun Hu, Dawu Gu
2015BotWatcher - Transparent and Generic Botnet Tracking.
Thomas Barabosch, Adrian Dombeck, Khaled Yakdan, Elmar Gerhards-Padilla
2015Continuous Authentication on Mobile Devices Using Power Consumption, Touch Gestures and Physical Movement of Users.
Rahul Murmuria, Angelos Stavrou, Daniel Barbará, Dan Fleck
2015Counteracting Data-Only Malware with Code Pointer Examination.
Thomas Kittel, Sebastian Vogl, Julian Kirsch, Claudia Eckert
2015Demystifying the IP Blackspace.
Quentin Jacquemart, Pierre-Antoine Vervier, Guillaume Urvoy-Keller, Ernst W. Biersack
2015Elite: Automatic Orchestration of Elastic Detection Services to Secure Cloud Hosting.
Yangyi Chen, Vincent Bindschaedler, Xiaofeng Wang, Stefan Berger, Dimitrios E. Pendarakis
2015Ensemble Learning for Low-Level Hardware-Supported Malware Detection.
Khaled N. Khasawneh, Meltem Ozsoy, Caleb Donovick, Nael B. Abu-Ghazaleh, Dmitry V. Ponomarev
2015Evaluation of Intrusion Detection Systems in Virtualized Environments Using Attack Injection.
Aleksandar Milenkoski, Bryan D. Payne, Nuno Antunes, Marco Vieira, Samuel Kounev, Alberto Avritzer, Matthias Luft
2015Haetae: Scaling the Performance of Network Intrusion Detection with Many-Core Processors.
Jaehyun Nam, Muhammad Jamshed, Byungkwon Choi, Dongsu Han, KyoungSoo Park
2015Hardware-Assisted Fine-Grained Code-Reuse Attack Detection.
Pinghai Yuan, Qingkai Zeng, Xuhua Ding
2015HelDroid: Dissecting and Detecting Mobile Ransomware.
Nicoló Andronio, Stefano Zanero, Federico Maggi
2015Improving Accuracy of Static Integer Overflow Detection in Binary.
Yang Zhang, Xiaoshan Sun, Yi Deng, Liang Cheng, Shuke Zeng, Yu Fu, Dengguo Feng
2015Physical-Layer Detection of Hardware Keyloggers.
Ryan M. Gerdes, Saptarshi Mallick
2015Preventing Exploits in Microsoft Office Documents Through Content Randomization.
Charles Smutz, Angelos Stavrou
2015Privacy Risk Assessment on Online Photos.
Haitao Xu, Haining Wang, Angelos Stavrou
2015Privacy is Not an Option: Attacking the IPv6 Privacy Extension.
Johanna Ullrich, Edgar R. Weippl
2015Probabilistic Inference on Integrity for Access Behavior Based Malware Detection.
Weixuan Mao, Zhongmin Cai, Don Towsley, Xiaohong Guan
2015Providing Dynamic Control to Passive Network Security Monitoring.
Johanna Amann, Robin Sommer
2015Radmin: Early Detection of Application-Level Resource Exhaustion and Starvation Attacks.
Mohamed Elsabagh, Daniel Barbará, Dan Fleck, Angelos Stavrou
2015Research in Attacks, Intrusions, and Defenses - 18th International Symposium, RAID 2015, Kyoto, Japan, November 2-4, 2015, Proceedings
Herbert Bos, Fabian Monrose, Gregory Blanc
2015Reverse Engineering Intel Last-Level Cache Complex Addressing Using Performance Counters.
Clémentine Maurice, Nicolas Le Scouarnec, Christoph Neumann, Olivier Heen, Aurélien Francillon
2015SDN Rootkits: Subverting Network Operating Systems of Software-Defined Networks.
Christian Röpke, Thorsten Holz
2015Security Analysis of PHP Bytecode Protection Mechanisms.
Dario Weißer, Johannes Dahse, Thorsten Holz
2015Towards Automatic Inference of Kernel Object Semantics from Binary Code.
Junyuan Zeng, Zhiqiang Lin
2015WYSISNWIV: What You Scan Is Not What I Visit.
Qilang Yang, Dimitrios Damopoulos, Georgios Portokalidis
2015Xede: Practical Exploit Early Detection.
Meining Nie, Purui Su, Qi Li, Zhi Wang, Lingyun Ying, Jinlong Hu, Dengguo Feng
2015jÄk: Using Dynamic Analysis to Crawl and Test Modern Web Applications.
Giancarlo Pellegrino, Constantin Tschürtz, Eric Bodden, Christian Rossow