RAID A

33 papers

YearTitle / Authors
2018BabelView: Evaluating the Impact of Code Injection Attacks in Mobile Webviews.
Claudio Rizzo, Lorenzo Cavallaro, Johannes Kinder
2018Backdoors: Definition, Deniability and Detection.
Sam L. Thomas, Aurélien Francillon
2018Before Toasters Rise Up: A View into the Emerging IoT Threat Landscape.
Pierre-Antoine Vervier, Yun Shen
2018Characterizing Eve: Analysing Cybercrime Actors in a Large Underground Forum.
Sergio Pastrana, Alice Hutchings, Andrew Caines, Paula Buttery
2018Control Plane Reflection Attacks in SDNs: New Attacks and Countermeasures.
Menghao Zhang, Guanyu Li, Lei Xu, Jun Bi, Guofei Gu, Jiasong Bai
2018CryptMe: Data Leakage Prevention for Unmodified Programs on ARM Devices.
Chen Cao, Le Guan, Ning Zhang, Neng Gao, Jingqiang Lin, Bo Luo, Peng Liu, Ji Xiang, Wenjing Lou
2018DNS Unchained: Amplified Application-Layer DoS Attacks Against DNS Authoritatives.
Jonas Bushart, Christian Rossow
2018Defeating Software Mitigations Against Rowhammer: A Surgical Precision Hammer.
Andrei Tatar, Cristiano Giuffrida, Herbert Bos, Kaveh Razavi
2018Dictionary Extraction and Detection of Algorithmically Generated Domain Names in Passive DNS Traffic.
Mayana Pereira, Shaun Coleman, Bin Yu, Martine De Cock, Anderson C. A. Nascimento
2018Error-Sensor: Mining Information from HTTP Error Traffic for Malware Intelligence.
Jialong Zhang, Jiyong Jang, Guofei Gu, Marc Ph. Stoecklin, Xin Hu
2018Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks.
Kang Liu, Brendan Dolan-Gavitt, Siddharth Garg
2018Furnace: Self-service Tenant VMI for the Cloud.
Micah Bushouse, Douglas S. Reeves
2018Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers.
Ishai Rosenberg, Asaf Shabtai, Lior Rokach, Yuval Elovici
2018GuidedPass: Helping Users to Create Strong and Memorable Passwords.
Simon S. Woo, Jelena Mirkovic
2018Hardware Assisted Randomization of Data.
Brian Belleville, Hyungon Moon, Jangseop Shin, Dongil Hwang, Joseph M. Nash, Seonhwa Jung, Yeoul Na, Stijn Volckaert, Per Larsen, Yunheung Paek, Michael Franz
2018Identifying Key Leakage of Bitcoin Users.
Michael Brengel, Christian Rossow
2018KASR: A Reliable and Practical Approach to Attack Surface Reduction of Commodity OS Kernels.
Zhi Zhang, Yueqiang Cheng, Surya Nepal, Dongxi Liu, Qingni Shen, Fethi A. Rabhi
2018Malicious IoT Implants: Tampering with Serial Communication over the Internet.
Philipp Morgner, Stefan Pfennig, Dennis Salzner, Zinaida Benenson
2018MicroStache: A Lightweight Execution Context for In-Process Safe Region Isolation.
Lucian Mogosanu, Ashay Rane, Nathan Dautenhahn
2018Next Generation P2P Botnets: Monitoring Under Adverse Conditions.
Leon Böck, Emmanouil Vasilomanolakis, Max Mühlhäuser, Shankar Karuppayah
2018OTTer: A Scalable High-Resolution Encrypted Traffic Identification Engine.
Eva Papadogiannaki, Constantinos Halevidis, Periklis Akritidis, Lazaros Koromilas
2018PartiSan: Fast and Flexible Sanitization via Run-Time Partitioning.
Julian Lettner, Dokyung Song, Taemin Park, Per Larsen, Stijn Volckaert, Michael Franz
2018PostScript Undead: Pwning the Web with a 35 Years Old Language.
Jens Müller, Vladislav Mladenov, Dennis Felsch, Jörg Schwenk
2018Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Could Affect Power Grids.
Johanna Ullrich, Nicholas Stifter, Aljosha Judmayer, Adrian Dabrowski, Edgar R. Weippl
2018Proteus: Detecting Android Emulators from Instruction-Level Profiles.
Onur Sahin, Ayse K. Coskun, Manuel Egele
2018RWGuard: A Real-Time Detection System Against Cryptographic Ransomware.
Shagufta Mehnaz, Anand Mudgerikar, Elisa Bertino
2018Reading Between the Lines: Content-Agnostic Detection of Spear-Phishing Emails.
Hugo Gascon, Steffen Ullrich, Benjamin Stritter, Konrad Rieck
2018Research in Attacks, Intrusions, and Defenses - 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings
Michael D. Bailey, Thorsten Holz, Manolis Stamatogiannakis, Sotiris Ioannidis
2018ShadowMonitor: An Effective In-VM Monitoring Framework with Hardware-Enforced Isolation.
Bin Shi, Lei Cui, Bo Li, Xudong Liu, Zhiyu Hao, Haiying Shen
2018Statistical Similarity of Critical Infrastructure Network Traffic Based on Nearest Neighbor Distances.
Jeong-Han Yun, Yoonho Hwang, Woomyo Lee, Hee-Kap Ahn, Sin-Kyu Kim
2018SybilBlind: Detecting Fake Users in Online Social Networks Without Manual Labels.
Binghui Wang, Le Zhang, Neil Zhenqiang Gong
2018Trusted Execution Path for Protecting Java Applications Against Deserialization of Untrusted Data.
Stefano Cristalli, Edoardo Vignati, Danilo Bruschi, Andrea Lanzi
2018τCFI: Type-Assisted Control Flow Integrity for x86-64 Binaries.
Paul Muntean, Matthias Fischer, Gang Tan, Zhiqiang Lin, Jens Grossklags, Claudia Eckert