


default search action
11. RAID 2008: Cambridge, MA, USA
- Richard Lippmann, Engin Kirda, Ari Trachtenberg:

Recent Advances in Intrusion Detection, 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings. Lecture Notes in Computer Science 5230, Springer 2008, ISBN 978-3-540-87402-7
Rootkit Prevention
- Ryan D. Riley

, Xuxian Jiang, Dongyan Xu:
Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing. 1-20 - Zhi Wang, Xuxian Jiang, Weidong Cui, Xinyuan Wang:

Countering Persistent Kernel Rootkits through Systematic Hook Discovery. 21-38
Malware Detection and Prevention
- Abhinav Srivastava, Jonathon T. Giffin:

Tamper-Resistant, Application-Aware Blocking of Malicious Network Connections. 39-58 - Daniel Ramsbrock, Xinyuan Wang, Xuxian Jiang:

A First Step towards Live Botmaster Traceback. 59-77 - Lorenzo Martignoni, Elizabeth Stinson, Matt Fredrikson

, Somesh Jha, John C. Mitchell:
A Layered Architecture for Detecting Malicious Behaviors. 78-97 - Fanglu Guo, Peter Ferrie, Tzi-cker Chiueh:

A Study of the Packer Problem and Its Solutions. 98-115
High Performance Intrusion Detection and Evasion
- Giorgos Vasiliadis

, Spyros Antonatos
, Michalis Polychronakis, Evangelos P. Markatos, Sotiris Ioannidis:
Gnort: High Performance Network Intrusion Detection Using Graphics Processors. 116-134 - Holger Dreger, Anja Feldmann, Vern Paxson, Robin Sommer:

Predicting the Resource Consumption of Network Intrusion Detection Systems. 135-154 - Nabil Schear, David R. Albrecht, Nikita Borisov

:
High-Speed Matching of Vulnerability Signatures. 155-174
Web Application Testing and Evasion
- Simon P. Chung, Aloysius K. Mok:

Swarm Attacks against Network-Level Emulation/Analysis. 175-190 - Sean McAllister, Engin Kirda, Christopher Kruegel:

Leveraging User Interactions for In-Depth Testing of Web Applications. 191-210 - Steven Gianvecchio, Haining Wang, Duminda Wijesekera, Sushil Jajodia:

Model-Based Covert Timing Channels: Automated Modeling and Evasion. 211-230
Alert Correlation and Worm Detection
- Senthilkumar G. Cheetancheri, John Mark Agosta, Karl N. Levitt, Shyhtsun Felix Wu, Jeff Rowe:

Optimal Cost, Collaborative, and Distributed Response to Zero-Day Worms - A Control Theoretic Approach. 231-250 - M. Patrick Collins, Michael K. Reiter:

On the Limits of Payload-Oblivious Network Attack Detection. 251-270 - Gaspar Modelo-Howard, Saurabh Bagchi, Guy Lebanon:

Determining Placement of Intrusion Detectors for a Distributed Application through Bayesian Network Modeling. 271-290 - Magnus Almgren

, Ulf Lindqvist
, Erland Jonsson:
A Multi-Sensor Model to Improve Automated Attack Detection. 291-310
Anomaly Detection and Network Traffic Analysis
- Mohamed Nassar

, Radu State, Olivier Festor:
Monitoring SIP Traffic Using Support Vector Machines. 311-330 - Kevin S. Killourhy, Roy A. Maxion:

The Effect of Clock Resolution on Keystroke Dynamics. 331-350 - Ayesha Binte Ashfaq, Maria Joseph Robert, Asma Mumtaz, Muhammad Qasim Ali, Ali Sajjad, Syed Ali Khayam:

A Comparative Evaluation of Anomaly Detectors under Portscan Attacks. 351-371 - Humberto J. Abdelnur, Radu State, Olivier Festor:

Advanced Network Fingerprinting. 372-389
Posters
- Natalia Stakhanova, Chris Strasburg, Samik Basu, Johnny S. Wong:

On Evaluation of Response Cost for Intrusion Response Systems. 390-391 - Nathalie Dagorn:

WebIDS: A Cooperative Bayesian Anomaly-Based Intrusion Detection System for Web Applications (Extended Abstract). 392-393 - Benjamin I. P. Rubinstein

, Blaine Nelson, Ling Huang, Anthony D. Joseph
, Shing-hon Lau, Nina Taft, J. Doug Tygar:
Evading Anomaly Detection through Variance Injection Attacks on PCA. 394-395 - Christina Lioma

, Marie-Francine Moens, Juan-Carlos Gomez
, Jan De Beer, André Bergholz, Gerhard Paass, Patrick Horkan:
Anticipating Hidden Text Salting in Emails. 396-397 - Martin Rehák, Michal Pechoucek

, Karel Bartos, Martin Grill, Pavel Celeda
, Vojtech Krmicek:
Improving Anomaly Detection Error Rate by Collective Trust Modeling. 398-399 - Ashish Kamra, Elisa Bertino:

Database Intrusion Detection and Response. 400-401 - Deanna D. Caputo, Greg Stephens, Brad Stephenson, Megan Cormier, Minna Kim:

An Empirical Approach to Identify Information Misuse by Insiders (Extended Abstract). 402-403 - Junsup Lee, Sung Deok Cha:

Page-Based Anomaly Detection in Large Scale Web Clusters Using Adaptive MapReduce (Extended Abstract). 404-405 - Olivier Thonnard, Jouni Viinikka, Corrado Leita, Marc Dacier

:
Automating the Analysis of Honeypot Data (Extended Abstract). 406-407 - Paul Rubel, Partha P. Pal

, Michael Atighetchi, D. Paul Benjamin, Franklin Webber:
Anomaly and Specification Based Cognitive Approach for Mission-Level Detection and Response. 408-409 - Andrew Brown, Mark Ryan

:
Monitoring the Execution of Third-Party Software on Mobile Devices. 410-411 - Sergey Bratus, Joshua Brody, David Kotz

, Anna Shubina:
Streaming Estimation of Information-Theoretic Metrics for Anomaly Detection (Extended Abstract). 412-414 - Wei Lu

, Ali A. Ghorbani:
Bots Behaviors vs. Human Behaviors on Large-Scale Communication Networks (Extended Abstract). 415-416 - Lorenzo Cavallaro

, R. Sekar:
Anomalous Taint Detection. 417-418 - Divya Jain, K. Vasanta Lakshmi, Priti Shankar:

Deep Packet Inspection Using Message Passing Networks. 419-420 - Abhinav Srivastava, Andrea Lanzi, Jonathon T. Giffin:

System Call API Obfuscation (Extended Abstract). 421-422

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














