RAID A

22 papers

YearTitle / Authors
2016A Formal Framework for Environmentally Sensitive Malware.
Jeremy Blackthorne, Benjamin Kaiser, Bülent Yener
2016A Look into 30 Years of Malware Development from a Software Metrics Perspective.
Alejandro Calleja, Juan E. Tapiador, Juan Caballero
2016APDU-Level Attacks in PKCS#11 Devices.
Claudio Bozzato, Riccardo Focardi, Francesco Palmarini, Graham Steel
2016AVclass: A Tool for Massive Malware Labeling.
Marcos Sebastián, Richard Rivera, Platon Kotzias, Juan Caballero
2016Automatic Uncovering of Tap Points from Kernel Executions.
Junyuan Zeng, Yangchun Fu, Zhiqiang Lin
2016Blender: Self-randomizing Address Space Layout for Android Apps.
Mingshen Sun, John C. S. Lui, Yajin Zhou
2016CloudRadar: A Real-Time Side-Channel Attack Detection System in Clouds.
Tianwei Zhang, Yinqian Zhang, Ruby B. Lee
2016Detecting Stack Layout Corruptions with Robust Stack Unwinding.
Yangchun Fu, Junghwan Rhee, Zhiqiang Lin, Zhichun Li, Hui Zhang, Guofei Jiang
2016Enabling Network Security Through Active DNS Datasets.
Athanasios Kountouras, Panagiotis Kintis, Chaz Lever, Yizheng Chen, Yacin Nadji, David Dagon, Manos Antonakakis, Rodney Joffe
2016GRIM: Leveraging GPUs for Kernel Integrity Monitoring.
Lazaros Koromilas, Giorgos Vasiliadis, Elias Athanasopoulos, Sotiris Ioannidis
2016Identifying Extension-Based Ad Injection via Fine-Grained Web Content Provenance.
Sajjad Arshad, Amin Kharraz, William Robertson
2016On the Feasibility of TTL-Based Filtering for DRDoS Mitigation.
Michael Backes, Thorsten Holz, Christian Rossow, Teemu Rytilahti, Milivoj Simeonovski, Ben Stock
2016Research in Attacks, Intrusions, and Defenses - 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings
Fabian Monrose, Marc Dacier, Gregory Blanc, Joaquín García-Alfaro
2016SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion.
Akira Yokoyama, Kou Ishii, Rui Tanabe, Yinmin Papa, Katsunari Yoshioka, Tsutomu Matsumoto, Takahiro Kasama, Daisuke Inoue, Michael Brengel, Michael Backes, Christian Rossow
2016Semantics-Preserving Dissection of JavaScript Exploits via Dynamic JS-Binary Analysis.
Xunchao Hu, Aravind Prakash, Jinghan Wang, Rundong Zhou, Yao Cheng, Heng Yin
2016Small Changes, Big Changes: An Updated View on the Android Permission System.
Yury Zhauniarovich, Olga Gadyatskaya
2016Taming Transactions: Towards Hardware-Assisted Control Flow Integrity Using Transactional Memory.
Marius Muench, Fabio Pagani, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna, Davide Balzarotti
2016The Abuse Sharing Economy: Understanding the Limits of Threat Exchanges.
Kurt Thomas, Rony Amira, Adi Ben-Yoash, Ori Folger, Amir Hardon, Ari Berger, Elie Bursztein, Michael D. Bailey
2016The Messenger Shoots Back: Network Operator Based IMSI Catcher Detection.
Adrian Dabrowski, Georg Petzl, Edgar R. Weippl
2016Trellis: Privilege Separation for Multi-user Applications Made Easy.
Andrea Mambretti, Kaan Onarlioglu, Collin Mulliner, William Robertson, Engin Kirda, Federico Maggi, Stefano Zanero
2016Uses and Abuses of Server-Side Requests.
Giancarlo Pellegrino, Onur Catakoglu, Davide Balzarotti, Christian Rossow
2016Who Gets the Boot? Analyzing Victimization by DDoS-as-a-Service.
Arman Noroozian, Maciej Korczynski, Carlos Hernandez Gañán, Daisuke Makita, Katsunari Yoshioka, Michel van Eeten