


default search action
14. RAID 2012: Amsterdam, The Netherlands
- Davide Balzarotti, Salvatore J. Stolfo, Marco Cova:

Research in Attacks, Intrusions, and Defenses - 15th International Symposium, RAID 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings. Lecture Notes in Computer Science 7462, Springer 2012, ISBN 978-3-642-33337-8
Virtualization
- Abhinav Srivastava, Himanshu Raj, Jonathon T. Giffin, Paul England:

Trusted VM Snapshots in Untrusted Cloud Infrastructures. 1-21 - Martim Carbone, Matthew Conover, Bruce Montague, Wenke Lee:

Secure and Robust Monitoring of Virtual Machines through Guest-Assisted Introspection. 22-41 - Shengzhi Zhang

, Peng Liu:
Assessing the Trustworthiness of Drivers. 42-63
Attacks and Defenses
- Olivier Thonnard, Leyla Bilge, Gavin O'Gorman, Seán Kiernan, Martin Lee

:
Industrial Espionage and Targeted Attacks: Understanding the Characteristics of an Escalating Threat. 64-85 - Victor van der Veen, Nitish dutt-Sharma, Lorenzo Cavallaro

, Herbert Bos
:
Memory Errors: The Past, the Present, and the Future. 86-106 - Dongkyun Ahn, Gyungho Lee:

A Memory Access Validation Scheme against Payload Injection Attacks. 107-126
Host and Network Security
- Jennifer Mankin, David R. Kaeli:

Dione: A Flexible Disk Monitoring and Analysis Framework. 127-146 - Zhi Xu, Hung-Yuan Hsu, Xin Chen, Sencun Zhu, Ali R. Hurson

:
AK-PPM: An Authenticated Packet Attribution Scheme for Mobile Ad Hoc Networks. 147-168
Fraud Detection and Underground Economy
- Tobias Lauinger, Engin Kirda, Pietro Michiardi:

Paying for Piracy? An Analysis of One-Click Hosters' Controversial Reward Schemes. 169-189 - Samuel Marchal

, Jérôme François
, Radu State, Thomas Engel:
Proactive Discovery of Phishing Related Domain Names. 190-209 - Daisuke Mashima, Alvaro A. Cárdenas:

Evaluating Electricity Theft Detectors in Smart Grid Networks. 210-229
Web Security
- Jialong Zhang, Chao Yang, Zhaoyan Xu, Guofei Gu:

PoisonAmplifier: A Guided Approach of Discovering Compromised Websites through Reversing Search Poisoning Attacks. 230-253 - Sebastian Lekies, Nick Nikiforakis, Walter Tighzert, Frank Piessens, Martin Johns

:
DEMACRO: Defense against Malicious Cross-Domain Requests. 254-273 - Timon Van Overveldt, Christopher Kruegel, Giovanni Vigna:

FlashDetect: ActionScript 3 Malware Detection. 274-293
Intrusion Detection
- Jie Chu, Zihui Ge, Richard Huber, Ping Ji, Jennifer Yates, Yung-Chao Yu:

ALERT-ID: Analyze Logs of the Network Element in Real Time for Intrusion Detection. 294-313 - B. Amann, Robin Sommer, Aashish Sharma, Seth Hall:

A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence. 314-333 - Victor C. Valgenti, Jatin Chhugani, Yan Sun, Nadathur Satish, Min Sik Kim, Changkyu Kim, Pradeep Dubey:

GPP-Grep: High-Speed Regular Expression Processing Engine on General Purpose Processors. 334-353 - Dina Hadziosmanovic, Lorenzo Simionato, Damiano Bolzoni, Emmanuele Zambon

, Sandro Etalle:
N-Gram against the Machine: On the Feasibility of the N-Gram Network Analysis for Binary Protocols. 354-373
Poster Abstracts
- Shah Mahmood

, Yvo Desmedt:
Online Social Networks, a Criminals Multipurpose Toolbox (Poster Abstract). 374-375 - Xiang Cui, Jinqiao Shi, Peng Liao, Chaoge Liu:

The Triple-Channel Model: Toward Robust and Efficient Advanced Botnets (Poster Abstract). 376-377 - Jinyu Wu, Lihua Yin, Binxing Fang:

Network Security Analysis Method Taking into Account the Usage Information (Poster Abstract). 378-379 - Shuyuan Jin, Zhi Yang, Xiang Cui:

Automatic Covert Channel Detection in Asbestos System (Poster Abstract). 380-381 - Dengke Qiao, Tingwen Liu

, Yong Sun, Li Guo:
EFA for Efficient Regular Expression Matching in NIDS (Poster Abstract). 382-383 - Mark Vella, Sotirios Terzis

, Marc Roper
:
Distress Detection (Poster Abstract). 384-385 - Jenny Andrea Pinto Sánchez, Luis Javier García-Villalba

:
Trie Data Structure to Compare Traffic Payload in a Supervised Anomaly Detection System (Poster Abstract). 386-387 - Ahmed F. Shosha, Joshua James

, Chen-Ching Liu, Pavel Gladyshev
:
Towards Automated Forensic Event Reconstruction of Malicious Code (Poster Abstract). 388-389 - Lukás Durfina, Jakub Kroustek, Petr Zemek, Bretislav Kábele:

Accurate Recovery of Functions in a Retargetable Decompiler(Poster Abstract). 390-392 - Hugo Villanúa Vega, Jorge Maestre Vidal

, Jaime Daniel Mejía Castro, Luis Javier García-Villalba
:
Improvement of an Anagram Based NIDS by Reducing the Storage Space of Bloom Filters (Poster Abstract). 393-394 - Jorge Maestre Vidal

, Hugo Villanúa Vega, Jaime Daniel Mejía Castro, Luis Javier García-Villalba
:
Concurrency Optimization for NIDS (Poster Abstract). 395-396 - Luis Javier García-Villalba

, Jaime Daniel Mejía Castro, Ana Lucila Sandoval Orozco
, Javier Martínez Puentes:
Malware Detection System by Payload Analysis of Network Traffic (Poster Abstract). 397-398

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














