


default search action
21st RAID 2018: Heraklion, Crete, Greece
- Michael D. Bailey, Thorsten Holz

, Manolis Stamatogiannakis, Sotiris Ioannidis:
Research in Attacks, Intrusions, and Defenses - 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings. Lecture Notes in Computer Science 11050, Springer 2018, ISBN 978-3-030-00469-9 
Attacks
- Onur Sahin, Ayse K. Coskun, Manuel Egele:

Proteus: Detecting Android Emulators from Instruction-Level Profiles. 3-24 - Claudio Rizzo, Lorenzo Cavallaro

, Johannes Kinder
:
BabelView: Evaluating the Impact of Code Injection Attacks in Mobile Webviews. 25-46 - Andrei Tatar, Cristiano Giuffrida

, Herbert Bos
, Kaveh Razavi:
Defeating Software Mitigations Against Rowhammer: A Surgical Precision Hammer. 47-66 
Intrusion Detection and Prevention
- Hugo Gascon, Steffen Ullrich, Benjamin Stritter, Konrad Rieck:

Reading Between the Lines: Content-Agnostic Detection of Spear-Phishing Emails. 69-91 - Sam L. Thomas, Aurélien Francillon:

Backdoors: Definition, Deniability and Detection. 92-113 - Shagufta Mehnaz, Anand Mudgerikar, Elisa Bertino:

RWGuard: A Real-Time Detection System Against Cryptographic Ransomware. 114-136 
DDoS Attacks
- Jonas Bushart, Christian Rossow:

DNS Unchained: Amplified Application-Layer DoS Attacks Against DNS Authoritatives. 139-160 - Menghao Zhang

, Guanyu Li, Lei Xu, Jun Bi, Guofei Gu, Jiasong Bai:
Control Plane Reflection Attacks in SDNs: New Attacks and Countermeasures. 161-183 - Johanna Ullrich

, Nicholas Stifter, Aljosha Judmayer, Adrian Dabrowski
, Edgar R. Weippl:
Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Could Affect Power Grids. 184-203 
Passwords, Accounts, and Users
- Sergio Pastrana

, Alice Hutchings
, Andrew Caines
, Paula Buttery:
Characterizing Eve: Analysing Cybercrime Actors in a Large Underground Forum. 207-227 - Binghui Wang, Le Zhang, Neil Zhenqiang Gong:

SybilBlind: Detecting Fake Users in Online Social Networks Without Manual Labels. 228-249 - Simon S. Woo, Jelena Mirkovic:

GuidedPass: Helping Users to Create Strong and Memorable Passwords. 250-270 
Machine Learning for Computer Security
- Kang Liu, Brendan Dolan-Gavitt

, Siddharth Garg:
Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks. 273-294 - Mayana Pereira, Shaun Coleman, Bin Yu, Martine De Cock, Anderson C. A. Nascimento

:
Dictionary Extraction and Detection of Algorithmically Generated Domain Names in Passive DNS Traffic. 295-314 - Eva Papadogiannaki, Constantinos Halevidis, Periklis Akritidis, Lazaros Koromilas:

OTTer: A Scalable High-Resolution Encrypted Traffic Identification Engine. 315-334 
Hardware-Assisted Security
- Brian Belleville, Hyungon Moon, Jangseop Shin, Dongil Hwang, Joseph M. Nash, Seonhwa Jung, Yeoul Na, Stijn Volckaert

, Per Larsen, Yunheung Paek, Michael Franz:
Hardware Assisted Randomization of Data. 337-358 - Lucian Mogosanu, Ashay Rane, Nathan Dautenhahn:

MicroStache: A Lightweight Execution Context for In-Process Safe Region Isolation. 359-379 - Chen Cao, Le Guan, Ning Zhang, Neng Gao, Jingqiang Lin, Bo Luo

, Peng Liu, Ji Xiang, Wenjing Lou:
CryptMe: Data Leakage Prevention for Unmodified Programs on ARM Devices. 380-400 
Software Security
- Julian Lettner

, Dokyung Song
, Taemin Park, Per Larsen, Stijn Volckaert
, Michael Franz:
PartiSan: Fast and Flexible Sanitization via Run-Time Partitioning. 403-422 - Paul Muntean

, Matthias Fischer, Gang Tan
, Zhiqiang Lin
, Jens Grossklags
, Claudia Eckert:
τCFI: Type-Assisted Control Flow Integrity for x86-64 Binaries. 423-444 - Stefano Cristalli

, Edoardo Vignati
, Danilo Bruschi, Andrea Lanzi:
Trusted Execution Path for Protecting Java Applications Against Deserialization of Untrusted Data. 445-464 
Malware
- Jialong Zhang, Jiyong Jang, Guofei Gu, Marc Ph. Stoecklin, Xin Hu:

Error-Sensor: Mining Information from HTTP Error Traffic for Malware Intelligence. 467-489 - Ishai Rosenberg, Asaf Shabtai, Lior Rokach, Yuval Elovici:

Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers. 490-510 - Leon Böck, Emmanouil Vasilomanolakis

, Max Mühlhäuser, Shankar Karuppayah:
Next Generation P2P Botnets: Monitoring Under Adverse Conditions. 511-531 
IoT/CPS Security
- Philipp Morgner, Stefan Pfennig, Dennis Salzner, Zinaida Benenson:

Malicious IoT Implants: Tampering with Serial Communication over the Internet. 535-555 - Pierre-Antoine Vervier, Yun Shen:

Before Toasters Rise Up: A View into the Emerging IoT Threat Landscape. 556-576 - Jeong-Han Yun, Yoonho Hwang, Woomyo Lee, Hee-Kap Ahn

, Sin-Kyu Kim:
Statistical Similarity of Critical Infrastructure Network Traffic Based on Nearest Neighbor Distances. 577-599 
Security Measurements
- Jens Müller, Vladislav Mladenov, Dennis Felsch, Jörg Schwenk:

PostScript Undead: Pwning the Web with a 35 Years Old Language. 603-622 - Michael Brengel, Christian Rossow:

Identifying Key Leakage of Bitcoin Users. 623-643 
Defenses
- Micah Bushouse

, Douglas S. Reeves
:
Furnace: Self-service Tenant VMI for the Cloud. 647-669 - Bin Shi, Lei Cui, Bo Li, Xudong Liu, Zhiyu Hao, Haiying Shen:

ShadowMonitor: An Effective In-VM Monitoring Framework with Hardware-Enforced Isolation. 670-690 - Zhi Zhang

, Yueqiang Cheng, Surya Nepal, Dongxi Liu, Qingni Shen, Fethi A. Rabhi:
KASR: A Reliable and Practical Approach to Attack Surface Reduction of Commodity OS Kernels. 691-710 

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














