default search action
16. RAID 2013: Rodney Bay, St. Lucia
- Salvatore J. Stolfo, Angelos Stavrou, Charles V. Wright:
Research in Attacks, Intrusions, and Defenses - 16th International Symposium, RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013. Proceedings. Lecture Notes in Computer Science 8145, Springer 2013, ISBN 978-3-642-41283-7
Hardware-Level Security
- Patrick Stewin:
A Primitive for Revealing Stealthy Peripheral-Based Attacks on the Computing Platform's Main Memory. 1-20 - Mariano Graziano, Andrea Lanzi, Davide Balzarotti:
Hypervisor Memory Forensics. 21-40
Server-Level and OS-Level Security
- Jakob Fritz, Corrado Leita, Michalis Polychronakis:
Server-Side Code Injection Attacks: A Historical Perspective. 41-61 - Blaine Stancill, Kevin Z. Snow, Nathan Otterness, Fabian Monrose, Lucas Davi, Ahmad-Reza Sadeghi:
Check My Profile: Leveraging Static Analysis for Fast and Accurate Detection of ROP Gadgets. 62-81 - Richard Skowyra, Kelly Casteel, Hamed Okhravi, Nickolai Zeldovich, William W. Streilein:
Systematic Analysis of Defenses against Return-Oriented Programming. 82-102 - Xi Xiong, Peng Liu:
SILVER: Fine-Grained and Transparent Protection Domain Primitives in Commodity OS Kernel. 103-122
Malware
- Yuhei Kawakoya, Makoto Iwamura, Eitaro Shioji, Takeo Hariu:
API Chaser: Anti-analysis Resistant Malware Analyzer. 123-143 - M. Zubair Rafique, Juan Caballero:
FIRMA: Malware Clustering and Network Signature Generation with Mixed Network Behaviors. 144-163 - Christian Wressnegger, Frank Boldewin, Konrad Rieck:
Deobfuscating Embedded Malware Using Probable-Plaintext Attacks. 164-183 - Denis Bueno, Kevin J. Compton, Karem A. Sakallah, Michael D. Bailey:
Detecting Traditional Packers, Decisively. 184-203
Authentication and Credential Attacks
- David F. Oswald, Bastian Richter, Christof Paar:
Side-Channel Attacks on the Yubikey 2 One-Time Password Generator. 204-222 - Mitsuaki Akiyama, Takeshi Yagi, Kazufumi Aoki, Takeo Hariu, Youki Kadobayashi:
Active Credential Leakage for Observing Web-Based Attack Cycle. 223-243
Web and Network Privacy and Security
- Bin Zhao, Peng Liu:
Behavior Decomposition: Aspect-Level Browser Extension Clustering and Its Security Implications. 244-264 - Martin Johns, Sebastian Lekies:
Tamper-Resistant LikeJacking Protection. 265-285 - Arun Viswanathan, Kymie Tan, Clifford Neuman:
Deconstructing the Assessment of Anomaly-based Intrusion Detectors. 286-306
Mobile Security
- Kapil Singh:
Practical Context-Aware Permission Control for Hybrid Mobile Applications. 307-327 - Nan Jiang, Yu Jin, Ann Skudlark, Zhi-Li Zhang:
Understanding SMS Spam in a Large Cellular Network: Characteristics, Strategies and Defenses. 328-347 - Johannes Hoffmann, Stephan Neumann, Thorsten Holz:
Mobile Malware Detection Based on Energy Fingerprints - A Dead End? 348-368
Cloud and Anonymity Networks I
- Tobias Lauinger, Kaan Onarlioglu, Chaabane Abdelberi, Engin Kirda, William K. Robertson, Mohamed Ali Kâafar:
Holiday Pictures or Blockbuster Movies? Insights into Copyright Infringement in User Uploads to One-Click File Hosters. 369-389 - Yacin Nadji, Manos Antonakakis, Roberto Perdisci, Wenke Lee:
Connected Colors: Unveiling the Structure of Criminal Networks. 390-410
Cloud and Anonymity Networks II
- Vasilis Pappas, Vasileios P. Kemerlis, Angeliki Zavou, Michalis Polychronakis, Angelos D. Keromytis:
CloudFence: Data Flow Tracking as a Cloud Service. 411-431 - Christoph Egger, Johannes Schlumberger, Christopher Kruegel, Giovanni Vigna:
Practical Attacks against the I2P Network. 432-451
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.