default search action
17. RAID 2014: Gothenburg, Sweden
- Angelos Stavrou, Herbert Bos, Georgios Portokalidis:
Research in Attacks, Intrusions and Defenses - 17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings. Lecture Notes in Computer Science 8688, Springer 2014, ISBN 978-3-319-11378-4
Malware and Defenses
- Marc Kührer, Christian Rossow, Thorsten Holz:
Paint It Black: Evaluating the Effectiveness of Malware Blacklists. 1-21 - Zhaoyan Xu, Jialong Zhang, Guofei Gu, Zhiqiang Lin:
GoldenEye: Efficiently and Effectively Unveiling Malware's Targeted Environment. 22-45 - Kevin D. Bowers, Catherine Hart, Ari Juels, Nikos Triandopoulos:
PillarBox: Combating Next-Generation Malware with Fast Forward-Secure Logging. 46-67
Malware and Binary Analysis
- Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis:
Dynamic Reconstruction of Relocation Information for Stripped Binaries. 68-87 - Felix Schuster, Thomas Tendyck, Jannik Pewny, Andreas Maaß, Martin Steegmanns, Moritz Contag, Thorsten Holz:
Evaluating the Effectiveness of Current Anti-ROP Defenses. 88-108 - Adrian Tang, Simha Sethumadhavan, Salvatore J. Stolfo:
Unsupervised Anomaly-Based Malware Detection Using Hardware Features. 109-129
Web
- Jacopo Corbetta, Luca Invernizzi, Christopher Krügel, Giovanni Vigna:
Eyes of a Human, Eyes of a Program: Leveraging Different Views of the Web for Analysis and Detection. 130-149 - Enrico Budianto, Yaoqi Jia, Xinshu Dong, Prateek Saxena, Zhenkai Liang:
You Can't Be Me: Enabling Trusted Paths and User Sub-origins in Web Browsers. 150-171 - Nathaniel Boggs, Senyao Du, Salvatore J. Stolfo:
Measuring Drive-by Download Defense in Depth. 172-191
Web II
- Apurva Kumar:
A Lightweight Formal Approach for Analyzing Security of Web Protocols. 192-211 - Michael Weissbacher, Tobias Lauinger, William K. Robertson:
Why Is CSP Failing? Trends and Challenges in CSP Adoption. 212-233 - Nathaniel Boggs, Hang Zhao, Senyao Du, Salvatore J. Stolfo:
Synthetic Data Generation and Defense in Depth Measurement of Web Applications. 234-254
Authentication and Privacy
- Hassan Khan, Aaron Atwater, Urs Hengartner:
A Comparative Evaluation of Implicit Authentication Schemes. 255-275 - Yinzhi Cao, Yan Shoshitaishvili, Kevin Borgolte, Christopher Krügel, Giovanni Vigna, Yan Chen:
Protecting Web-Based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel. 276-298 - Gorka Irazoqui Apecechea, Mehmet Sinan Inci, Thomas Eisenbarth, Berk Sunar:
Wait a Minute! A fast, Cross-VM Attack on AES. 299-319
Network Security
- Johanna Amann, Seth Hall, Robin Sommer:
Count Me In: Viable Distributed Summary Statistics for Securing High-Speed Networks. 320-340 - Noomene Ben Henda, Karl Norrman:
Formal Analysis of Security Procedures in LTE - A Feasibility Study. 341-361 - Il-Gu Lee, Hyunwoo Choi, Yongdae Kim, Seungwon Shin, Myungchul Kim:
Run Away If You Can: - Persistent Jamming Attacks against Channel Hopping Wi-Fi Devices in Dense Networks. 362-383
Intrusion Detection and Vulnerability Analysis
- Ali Abbasi, Jos Wetzels, Wouter Bokslag, Emmanuele Zambon, Sandro Etalle:
On Emulation-Based Network Intrusion Detection Systems. 384-404 - Hamed Okhravi, James Riordan, Kevin M. Carter:
Quantitative Evaluation of Dynamic Platform Techniques as a Defensive Mechanism. 405-425 - Kartik Nayak, Daniel Marino, Petros Efstathopoulos, Tudor Dumitras:
Some Vulnerabilities Are Different Than Others - Studying Vulnerabilities and Attack Surfaces in the Wild. 426-446 - José Benito Camiña, Jorge Rodríguez-Ruiz, Raúl Monroy:
Towards a Masquerade Detection System Based on User's Tasks. 447-465
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.