RAID A

22 papers

YearTitle / Authors
2017Android Malware Clustering Through Malicious Payload Mining.
Yuping Li, Jiyong Jang, Xin Hu, Xinming Ou
2017BEADS: Automated Attack Discovery in OpenFlow-Based SDN Systems.
Samuel Jero, Xiangyu Bu, Cristina Nita-Rotaru, Hamed Okhravi, Richard Skowyra, Sonia Fahmy
2017Breaking Fitness Records Without Moving: Reverse Engineering and Spoofing Fitbit.
Hossein Fereidooni, Jiska Classen, Tom Spink, Paul Patras, Markus Miettinen, Ahmad-Reza Sadeghi, Matthias Hollick, Mauro Conti
2017CFI CaRE: Hardware-Supported Call and Return Enforcement for Commercial Microcontrollers.
Thomas Nyman, Jan-Erik Ekberg, Lucas Davi, N. Asokan
2017Exploring the Ecosystem of Malicious Domain Registrations in the .eu TLD.
Thomas Vissers, Jan Spooren, Pieter Agten, Dirk Jumpertz, Peter Janssen, Marc Van Wesemael, Frank Piessens, Wouter Joosen, Lieven Desmet
2017Filtering for Malice Through the Data Ocean: Large-Scale PHA Install Detection at the Communication Service Provider Level.
Kai Chen, Tongxin Li, Bin Ma, Peng Wang, Xiaofeng Wang, Peiyuan Zong
2017ILAB: An Interactive Labelling Strategy for Intrusion Detection.
Anaël Beaugnon, Pierre Chifflier, Francis R. Bach
2017LAZARUS: Practical Side-Channel Resilient Kernel-Space Randomization.
David Gens, Orlando Arias, Dean Sullivan, Christopher Liebchen, Yier Jin, Ahmad-Reza Sadeghi
2017Lens on the Endpoint: Hunting for Malicious Software Through Endpoint Data Analysis.
Ahmet Salih Buyukkayhan, Alina Oprea, Zhou Li, William K. Robertson
2017Linking Amplification DDoS Attacks to Booter Services.
Johannes Krupp, Mohammad Karami, Christian Rossow, Damon McCoy, Michael Backes
2017Mining on Someone Else's Dime: Mitigating Covert Mining Operations in Clouds and Enterprises.
Rashid Tahir, Muhammad Huzaifa, Anupam Das, Mohammad Ahmad, Carl A. Gunter, Fareed Zaffar, Matthew Caesar, Nikita Borisov
2017Practical and Accurate Runtime Application Protection Against DoS Attacks.
Mohamed Elsabagh, Dan Fleck, Angelos Stavrou, Michael Kaplan, Thomas Bowen
2017Precisely and Scalably Vetting JavaScript Bridge in Android Hybrid Apps.
Guangliang Yang, Abner Mendoza, Jialong Zhang, Guofei Gu
2017Redemption: Real-Time Protection Against Ransomware at End-Hosts.
Amin Kharraz, Engin Kirda
2017Research in Attacks, Intrusions, and Defenses - 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings
Marc Dacier, Michael D. Bailey, Michalis Polychronakis, Manos Antonakakis
2017Scotch: Combining Software Guard Extensions and System Management Mode to Monitor Cloud Resource Usage.
Kevin Leach, Fengwei Zhang, Westley Weimer
2017Secure In-Cache Execution.
Yue Chen, Mustakimur Khandaker, Zhi Wang
2017Sgx-Lapd: Thwarting Controlled Side Channel Attacks via Enclave Verifiable Page Faults.
Yangchun Fu, Erick Bauman, Raul Quinonez, Zhiqiang Lin
2017Static Program Analysis as a Fuzzing Aid.
Bhargava Shastry, Markus Leutner, Tobias Fiebig, Kashyap Thimmaraju, Fabian Yamaguchi, Konrad Rieck, Stefan Schmid, Jean-Pierre Seifert, Anja Feldmann
2017Stealth Loader: Trace-Free Program Loading for API Obfuscation.
Yuhei Kawakoya, Eitaro Shioji, Yuto Otsuki, Makoto Iwamura, Takeshi Yada
2017Trapped by the UI: The Android Case.
Efthimios Alepis, Constantinos Patsakis
2017VDF: Targeted Evolutionary Fuzz Testing of Virtual Devices.
Andrew Henderson, Heng Yin, Guang Jin, Hao Han, Hongmei Deng