


default search action
14. RAID 2011: Menlo Park, CA, USA
- Robin Sommer, Davide Balzarotti, Gregor Maier:
Recent Advances in Intrusion Detection - 14th International Symposium, RAID 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings. Lecture Notes in Computer Science 6961, Springer 2011, ISBN 978-3-642-23643-3
Application Security
- Erik Bosman, Asia Slowinska, Herbert Bos
:
Minemu: The World's Fastest Taint Tracker. 1-20 - Bob Gilbert, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna:
Dymo: Tracking Dynamic Code Identity. 21-40 - Felix Gröbert, Carsten Willems, Thorsten Holz
:
Automated Identification of Cryptographic Primitives in Binary Programs. 41-60
Malware
- Yanick Fratantonio, Christopher Kruegel, Giovanni Vigna:
Shellzer: A Tool for the Dynamic Analysis of Malicious Shellcode. 61-80 - Stefano Ortolani, Cristiano Giuffrida
, Bruno Crispo:
KLIMAX: Profiling Memory Write Patterns to Detect Keystroke-Harvesting Malware. 81-100 - Kangjie Lu, Dabi Zou, Weiping Wen, Debin Gao
:
Packed, Printable, and Polymorphic Return-Oriented Programming. 101-120 - Minh Tran, Mark Etheridge, Tyler K. Bletsch, Xuxian Jiang, Vincent W. Freeh, Peng Ning:
On the Expressiveness of Return-into-libc Attacks. 121-141
Anomaly Detection
- Nathaniel Boggs, Sharath Hiremagalore, Angelos Stavrou
, Salvatore J. Stolfo:
Cross-Domain Collaborative Anomaly Detection: So Far Yet So Close. 142-160 - Syed Akbar Mehdi, Junaid Khalid, Syed Ali Khayam:
Revisiting Traffic Anomaly Detection Using Software Defined Networking. 161-180 - Malek Ben Salem, Salvatore J. Stolfo:
Modeling User Search Behavior for Masquerade Detection. 181-200
Network Security
- Sheila Becker, Jeff Seibert, Cristina Nita-Rotaru, Radu State:
Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling Attack. 201-221 - Sambuddho Chakravarty, Georgios Portokalidis
, Michalis Polychronakis, Angelos D. Keromytis:
Detecting Traffic Snooping in Tor Using Decoys. 222-241 - Seungwon Shin, Raymond Lin, Guofei Gu:
Cross-Analysis of Botnet Victims: New Insights and Implications. 242-261
Web Security and Social Networks
- Armin Buescher, Felix Leder, Thomas Siebert:
Banksafe Information Stealer Detection Inside the Web Browser. 262-280 - Mario Heiderich, Tilman Frosch, Thorsten Holz
:
IceShield: Detection and Mitigation of Malicious Websites with a Frozen DOM. 281-300 - Jonghyuk Song, Sangho Lee, Jong Kim:
Spam Filtering in Twitter Using Sender-Receiver Relationship. 301-317 - Chao Yang, Robert Chandler Harkreader, Guofei Gu:
Die Free or Live Hard? Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers. 318-337
Sandboxing and Embedded Environments
- Martina Lindorfer, Clemens Kolbitsch, Paolo Milani Comparetti:
Detecting Environment-Sensitive Malware. 338-357 - Ang Cui, Salvatore J. Stolfo:
Defending Embedded Systems with Software Symbiotes. 358-377 - Loïc Duflot, Yves-Alexis Perez, Benjamin Morin:
What If You Can't Trust Your Network Card? 378-397

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.