Search dblp for Publications

export results for "stream:conf/raid:"

 download as .bib file

@inproceedings{DBLP:conf/raid/0001DACW23,
  author       = {Yizheng Chen and
                  Zhoujie Ding and
                  Lamya Alowain and
                  Xinyun Chen and
                  David A. Wagner},
  title        = {DiverseVul: {A} New Vulnerable Source Code Dataset for Deep Learning
                  Based Vulnerability Detection},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {654--668},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607242},
  doi          = {10.1145/3607199.3607242},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/0001DACW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/AbbadiniFORP23,
  author       = {Marco Abbadini and
                  Dario Facchinetti and
                  Gianluca Oldani and
                  Matthew Rossi and
                  Stefano Paraboschi},
  title        = {NatiSand: Native Code Sandboxing for JavaScript Runtimes},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {639--653},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607233},
  doi          = {10.1145/3607199.3607233},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/AbbadiniFORP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/AlamBPR23,
  author       = {Md Tanvirul Alam and
                  Dipkamal Bhusal and
                  Youngja Park and
                  Nidhi Rastogi},
  title        = {Looking Beyond IoCs: Automatically Extracting Attack Patterns from
                  External {CTI}},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {92--108},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607208},
  doi          = {10.1145/3607199.3607208},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/AlamBPR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/AlecciABCLOT23,
  author       = {Marco Alecci and
                  Luca Attanasio and
                  Alessandro Brighente and
                  Mauro Conti and
                  Eleonora Losiouk and
                  Hideki Ochiai and
                  Federico Turrin},
  title        = {Beware of Pickpockets: {A} Practical Attack against Blocking Cards},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {195--206},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607243},
  doi          = {10.1145/3607199.3607243},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/AlecciABCLOT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/AlecciCMMP23,
  author       = {Marco Alecci and
                  Mauro Conti and
                  Francesco Marchiori and
                  Luca Martinelli and
                  Luca Pajola},
  title        = {Your Attack Is Too {DUMB:} Formalizing Attacker Scenarios for Adversarial
                  Transferability},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {315--329},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607227},
  doi          = {10.1145/3607199.3607227},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/AlecciCMMP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/AlsadiSYEG23,
  author       = {Arwa Abdulkarim Al Alsadi and
                  Kaichi Sameshima and
                  Katsunari Yoshioka and
                  Michel van Eeten and
                  Carlos Hernandez Ga{\~{n}}{\'{a}}n},
  title        = {Bin there, target that: Analyzing the target selection of IoT vulnerabilities
                  in malware binaries},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {513--526},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607241},
  doi          = {10.1145/3607199.3607241},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/AlsadiSYEG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/AnwarZYL23,
  author       = {Md Sakib Anwar and
                  Chaoshun Zuo and
                  Carter Yagemann and
                  Zhiqiang Lin},
  title        = {Extracting Threat Intelligence From Cheat Binaries For Anti-Cheating},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {17--31},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607211},
  doi          = {10.1145/3607199.3607211},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/AnwarZYL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BaskaranZMY23,
  author       = {Supraja Baskaran and
                  Lianying Zhao and
                  Mohammad Mannan and
                  Amr M. Youssef},
  title        = {Measuring the Leakage and Exploitability of Authentication Secrets
                  in Super-apps: The WeChat Case},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {727--743},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607236},
  doi          = {10.1145/3607199.3607236},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/BaskaranZMY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BaumanDHL23,
  author       = {Erick Bauman and
                  Jun Duan and
                  Kevin W. Hamlen and
                  Zhiqiang Lin},
  title        = {Renewable Just-In-Time Control-Flow Integrity},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {580--594},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607239},
  doi          = {10.1145/3607199.3607239},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/BaumanDHL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BoltonL0HF23,
  author       = {Connor Bolton and
                  Yan Long and
                  Jun Han and
                  Josiah D. Hester and
                  Kevin Fu},
  title        = {Characterizing and Mitigating Touchtone Eavesdropping in Smartphone
                  Motion Sensors},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {164--178},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607203},
  doi          = {10.1145/3607199.3607203},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/BoltonL0HF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BoucherPSAC23,
  author       = {Nicholas Boucher and
                  Luca Pajola and
                  Ilia Shumailov and
                  Ross J. Anderson and
                  Mauro Conti},
  title        = {Boosting Big Brother: Attacking Search Engines with Encodings},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {700--713},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607220},
  doi          = {10.1145/3607199.3607220},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/BoucherPSAC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BundtDAOR23,
  author       = {Joshua Bundt and
                  Michael Davinroy and
                  Ioannis Agadakos and
                  Alina Oprea and
                  William K. Robertson},
  title        = {Black-box Attacks Against Neural Binary Function Detection},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {1--16},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607200},
  doi          = {10.1145/3607199.3607200},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/BundtDAOR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BytesRDM0T23,
  author       = {Andrei Bytes and
                  Prashant Hari Narayan Rajput and
                  Constantine Doumanidis and
                  Michail Maniatakos and
                  Jianying Zhou and
                  Nils Ole Tippenhauer},
  title        = {FieldFuzz: In Situ Blackbox Fuzzing of Proprietary Industrial Automation
                  Runtimes via the Network},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {499--512},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607226},
  doi          = {10.1145/3607199.3607226},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/BytesRDM0T23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Camara0AUZ23,
  author       = {Xabier S{\'{a}}ez de C{\'{a}}mara and
                  Jose Luis Flores and
                  Crist{\'{o}}bal Arellano and
                  Aitor Urbieta and
                  Urko Zurutuza},
  title        = {Federated Explainability for Network Anomaly Characterization},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {346--365},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607234},
  doi          = {10.1145/3607199.3607234},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/Camara0AUZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/CaoL23,
  author       = {Tong Cao and
                  Xin Li},
  title        = {Temporary Block Withholding Attacks on Filecoin's Expected Consensus},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {109--122},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607213},
  doi          = {10.1145/3607199.3607213},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/CaoL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Chen0GWY23,
  author       = {Bocheng Chen and
                  Guangjing Wang and
                  Hanqing Guo and
                  Yuanda Wang and
                  Qiben Yan},
  title        = {Understanding Multi-Turn Toxic Behaviors in Open-Domain Chatbots},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {282--296},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607237},
  doi          = {10.1145/3607199.3607237},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/Chen0GWY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ChenLCLXH23,
  author       = {Jingting Chen and
                  Feng Li and
                  Qingfang Chen and
                  Ping Li and
                  Lili Xu and
                  Wei Huo},
  title        = {EBugDec: Detecting Inconsistency Bugs caused by {RFC} Evolution in
                  Protocol Implementations},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {412--425},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607222},
  doi          = {10.1145/3607199.3607222},
  timestamp    = {Mon, 30 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/ChenLCLXH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ChenLXW23,
  author       = {Zeyu Chen and
                  Daiping Liu and
                  Jidong Xiao and
                  Haining Wang},
  title        = {All Use-After-Free Vulnerabilities Are Not Created Equal: An Empirical
                  Study on Their Characteristics and Detectability},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {623--638},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607229},
  doi          = {10.1145/3607199.3607229},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ChenLXW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ChowdhuryN23,
  author       = {Abdullahi Chowdhury and
                  Hung X. Nguyen},
  title        = {CoZure: Context Free Grammar Co-Pilot Tool for Finding New Lateral
                  Movements in Azure Active Directory},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {426--439},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607228},
  doi          = {10.1145/3607199.3607228},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ChowdhuryN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/DrichelM23,
  author       = {Arthur Drichel and
                  Ulrike Meyer},
  title        = {False Sense of Security: Leveraging {XAI} to Analyze the Reasoning
                  and True Performance of Context-less {DGA} Classifiers},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {330--345},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607231},
  doi          = {10.1145/3607199.3607231},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/DrichelM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GaidisMSMAK23,
  author       = {Alexander J. Gaidis and
                  Joao Moreira and
                  Ke Sun and
                  Alyssa Milburn and
                  Vaggelis Atlidakis and
                  Vasileios P. Kemerlis},
  title        = {FineIBT: Fine-grain Control-flow Enforcement with Indirect Branch
                  Tracking},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {527--546},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607219},
  doi          = {10.1145/3607199.3607219},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/GaidisMSMAK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Guo0WCY023,
  author       = {Hanqing Guo and
                  Guangjing Wang and
                  Yuanda Wang and
                  Bocheng Chen and
                  Qiben Yan and
                  Li Xiao},
  title        = {PhantomSound: Black-Box, Query-Efficient Audio Adversarial Attack
                  via Split-Second Phoneme Injection},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {366--380},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607240},
  doi          = {10.1145/3607199.3607240},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/Guo0WCY023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GustafsonGRJC0F23,
  author       = {Eric Gustafson and
                  Paul Grosen and
                  Nilo Redini and
                  Saagar Jha and
                  Andrea Continella and
                  Ruoyu Wang and
                  Kevin Fu and
                  Sara Rampazzi and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Shimware: Toward Practical Security Retrofitting for Monolithic Firmware
                  Images},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {32--45},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607217},
  doi          = {10.1145/3607199.3607217},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/GustafsonGRJC0F23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/HangLWX23,
  author       = {Zijun Hang and
                  Yuliang Lu and
                  Yongjie Wang and
                  Yi Xie},
  title        = {Flow-MAE: Leveraging Masked AutoEncoder for Accurate, Efficient and
                  Robust Malicious Traffic Classification},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {297--314},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607206},
  doi          = {10.1145/3607199.3607206},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/HangLWX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/HeF23,
  author       = {Qiuye He and
                  Song Fang},
  title        = {Phantom-CSI Attacks against Wireless Liveness Detection},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {440--454},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607245},
  doi          = {10.1145/3607199.3607245},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/HeF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/HertoghWOMABG23,
  author       = {Math{\'{e}} Hertogh and
                  Manuel Wiesinger and
                  Sebastian {\"{O}}sterlund and
                  Marius Muench and
                  Nadav Amit and
                  Herbert Bos and
                  Cristiano Giuffrida},
  title        = {Quarantine: Mitigating Transient Execution Attacks with Physical Domain
                  Isolation},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {207--221},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607248},
  doi          = {10.1145/3607199.3607248},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/HertoghWOMABG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/KawakoyaAIO23,
  author       = {Yuhei Kawakoya and
                  Shu Akabane and
                  Makoto Iwamura and
                  Takeshi Okamoto},
  title        = {Xunpack: Cross-Architecture Unpacking for Linux IoT Malware},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {471--484},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607214},
  doi          = {10.1145/3607199.3607214},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/KawakoyaAIO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/KimCLBP23,
  author       = {Hyunjun Kim and
                  Yungi Cho and
                  Younghan Lee and
                  Ho Bae and
                  Yunheung Paek},
  title        = {Exploring Clustered Federated Learning's Vulnerability against Property
                  Inference Attack},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {236--249},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607218},
  doi          = {10.1145/3607199.3607218},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/KimCLBP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/KimPK23,
  author       = {Taeyoung Kim and
                  Seonhye Park and
                  Hyoungshick Kim},
  title        = {Why Johnny Can't Use Secure Docker Images: Investigating the Usability
                  Challenges in Using Docker Image Vulnerability Scanners through Heuristic
                  Evaluation},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {669--685},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607244},
  doi          = {10.1145/3607199.3607244},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/KimPK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/KingSJELH23,
  author       = {Isaiah J. King and
                  Xiaokui Shu and
                  Jiyong Jang and
                  Kevin Eykholt and
                  Taesung Lee and
                  H. Howie Huang},
  title        = {EdgeTorrent: Real-time Temporal Graph Representations for Intrusion
                  Detection},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {77--91},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607201},
  doi          = {10.1145/3607199.3607201},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/KingSJELH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/KoYJJGKJ23,
  author       = {Myeongseob Ko and
                  Xinyu Yang and
                  Zhengjie Ji and
                  Hoang Anh Just and
                  Peng Gao and
                  Anoop Kumar and
                  Ruoxi Jia},
  title        = {PrivMon: {A} Stream-Based System for Real-Time Privacy Attack Detection
                  for Machine Learning Models},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {264--281},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607232},
  doi          = {10.1145/3607199.3607232},
  timestamp    = {Tue, 19 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/KoYJJGKJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/LanvinGHMMT23,
  author       = {Maxime Lanvin and
                  Pierre{-}Fran{\c{c}}ois Gimenez and
                  Yufei Han and
                  Fr{\'{e}}d{\'{e}}ric Majorczyk and
                  Ludovic M{\'{e}} and
                  Eric Totel},
  title        = {Towards Understanding Alerts raised by Unsupervised Network Intrusion
                  Detection Systems},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {135--150},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607247},
  doi          = {10.1145/3607199.3607247},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/LanvinGHMMT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/LiCPZZ023,
  author       = {Lin Li and
                  Chao Chen and
                  Lei Pan and
                  Leo Yu Zhang and
                  Jun Zhang and
                  Yang Xiang},
  title        = {SigA: rPPG-based Authentication for Virtual Reality Head-mounted Display},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {686--699},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607209},
  doi          = {10.1145/3607199.3607209},
  timestamp    = {Fri, 24 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/LiCPZZ023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/NaKS23,
  author       = {Seung Ho Na and
                  Kwanwoo Kim and
                  Seungwon Shin},
  title        = {Witnessing Erosion of Membership Inference Defenses: Understanding
                  Effects of Data Drift in Membership Privacy},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {250--263},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607224},
  doi          = {10.1145/3607199.3607224},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/NaKS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ParkK23,
  author       = {Jaemin Park and
                  Brent ByungHoon Kang},
  title        = {EnclaveVPN: Toward Optimized Utilization of Enclave Page Cache and
                  Practical Performance of Data Plane for Security-Enhanced Cloud {VPN}},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {397--411},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607210},
  doi          = {10.1145/3607199.3607210},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ParkK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ParkKL23,
  author       = {Sangbin Park and
                  Youngjoon Kim and
                  Dong Hoon Lee},
  title        = {{SCVMON:} Data-oriented attack recovery for RVs based on safety-critical
                  variable monitoring},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {547--563},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607221},
  doi          = {10.1145/3607199.3607221},
  timestamp    = {Thu, 14 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/ParkKL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/RosselMS23,
  author       = {Jost Rossel and
                  Vladislav Mladenov and
                  Juraj Somorovsky},
  title        = {Security Analysis of the 3MF Data Format},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {179--194},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607216},
  doi          = {10.1145/3607199.3607216},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/RosselMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/SpahnHHKV23,
  author       = {Noah Spahn and
                  Nils Hanke and
                  Thorsten Holz and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Container Orchestration Honeypot: Observing Attacks in the Wild},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {381--396},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607205},
  doi          = {10.1145/3607199.3607205},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/SpahnHHKV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/TandonWWABHM23,
  author       = {Rajat Tandon and
                  Haoda Wang and
                  Nicolaas Weideman and
                  Shushan Arakelyan and
                  Genevieve Bartlett and
                  Christophe Hauser and
                  Jelena Mirkovic},
  title        = {Leader: Defense Against Exploit-Based Denial-of-Service Attacks on
                  Web Applications},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {744--758},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607238},
  doi          = {10.1145/3607199.3607238},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/TandonWWABHM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/TarkhaniM23,
  author       = {Zahra Tarkhani and
                  Anil Madhavapeddy},
  title        = {Information Flow Tracking for Heterogeneous Compartmentalized Software},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {564--579},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607235},
  doi          = {10.1145/3607199.3607235},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/TarkhaniM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/TrampertSR23,
  author       = {Leon Trampert and
                  Ben Stock and
                  Sebastian Roth},
  title        = {Honey, {I} Cached our Security Tokens Re-usage of Security Tokens
                  in the Wild},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {714--726},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607223},
  doi          = {10.1145/3607199.3607223},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/TrampertSR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/WangWZNHZ23,
  author       = {Yu Wang and
                  Jinting Wu and
                  Haodong Zheng and
                  Zhenyu Ning and
                  Boyuan He and
                  Fengwei Zhang},
  title        = {Raft: Hardware-assisted Dynamic Information Flow Tracking for Runtime
                  Protection on {RISC-V}},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {595--608},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607246},
  doi          = {10.1145/3607199.3607246},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/WangWZNHZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/WongMYC23,
  author       = {Harry W. H. Wong and
                  Jack P. K. Ma and
                  Hoover H. F. Yin and
                  Sherman S. M. Chow},
  title        = {How (Not) to Build Threshold EdDSA},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {123--134},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607230},
  doi          = {10.1145/3607199.3607230},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/WongMYC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Xie00023,
  author       = {Zhixin Xie and
                  Chen Yan and
                  Xiaoyu Ji and
                  Wenyuan Xu},
  title        = {BitDance: Manipulating {UART} Serial Communication with {IEMI}},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {63--76},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607249},
  doi          = {10.1145/3607199.3607249},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/Xie00023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Xu0D23,
  author       = {Xuening Xu and
                  Chenglong Fu and
                  Xiaojiang Du},
  title        = {MP-Mediator: Detecting and Handling the New Stealthy Delay Attacks
                  on IoT Events and Commands},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {46--62},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607225},
  doi          = {10.1145/3607199.3607225},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/Xu0D23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/XuL0L23,
  author       = {Shengjie Xu and
                  Eric Liu and
                  Wei Huang and
                  David Lie},
  title        = {{MIFP:} Selective Fat-Pointer Bounds Compression for Accurate Bounds
                  Checking},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {609--622},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607212},
  doi          = {10.1145/3607199.3607212},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/XuL0L23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/XueH023,
  author       = {Zihan Xue and
                  Jinchi Han and
                  Wei Song},
  title        = {{CTPP:} {A} Fast and Stealth Algorithm for Searching Eviction Sets
                  on Intel Processors},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {151--163},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607202},
  doi          = {10.1145/3607199.3607202},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/XueH023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/YinLR23,
  author       = {Haikuo Yin and
                  Brandon Lou and
                  Peter L. Reiher},
  title        = {A Method for Summarizing and Classifying Evasive Malware},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {455--470},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607207},
  doi          = {10.1145/3607199.3607207},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/YinLR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/YuWFF023,
  author       = {Donghui Yu and
                  Jianqiang Wang and
                  Haoran Fang and
                  Ya Fang and
                  Yuanyuan Zhang},
  title        = {SEnFuzzer: Detecting {SGX} Memory Corruption via Information Feedback
                  and Tailored Interface Analysis},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {485--498},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607215},
  doi          = {10.1145/3607199.3607215},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/YuWFF023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ZhangL0CGDC23,
  author       = {Liwei Zhang and
                  Linghui Li and
                  Xiaoyong Li and
                  Binsi Cai and
                  Yali Gao and
                  Ruobin Dou and
                  Luying Chen},
  title        = {Efficient Membership Inference Attacks against Federated Learning
                  via Bias Differences},
  booktitle    = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  pages        = {222--235},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199.3607204},
  doi          = {10.1145/3607199.3607204},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ZhangL0CGDC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/raid/2023,
  title        = {Proceedings of the 26th International Symposium on Research in Attacks,
                  Intrusions and Defenses, {RAID} 2023, Hong Kong, China, October 16-18,
                  2023},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3607199},
  doi          = {10.1145/3607199},
  timestamp    = {Tue, 17 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/0002LLMYLZ22,
  author       = {Yang Shi and
                  Junqing Liang and
                  Mianhong Li and
                  Tianchen Ma and
                  Guodong Ye and
                  Jiangfeng Li and
                  Qinpei Zhao},
  title        = {Threshold EdDSA Signature for Blockchain-based Decentralized Finance
                  Applications},
  booktitle    = {25th International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022},
  pages        = {129--142},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3545948.3545977},
  doi          = {10.1145/3545948.3545977},
  timestamp    = {Thu, 20 Oct 2022 10:46:43 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/0002LLMYLZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/AbusnainaAAAJNM22,
  author       = {Ahmed Abusnaina and
                  Afsah Anwar and
                  Sultan Alshamrani and
                  Abdulrahman Alabduljabbar and
                  RhongHo Jang and
                  DaeHun Nyang and
                  David Mohaisen},
  title        = {Systematically Evaluating the Robustness of ML-based IoT Malware Detection
                  Systems},
  booktitle    = {25th International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022},
  pages        = {308--320},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3545948.3545960},
  doi          = {10.1145/3545948.3545960},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/AbusnainaAAAJNM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BaruaF22,
  author       = {Anomadarshi Barua and
                  Mohammad Abdullah Al Faruque},
  title        = {{HALC:} {A} Real-time In-sensor Defense against the Magnetic Spoofing
                  Attack on Hall Sensors},
  booktitle    = {25th International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022},
  pages        = {185--199},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3545948.3545964},
  doi          = {10.1145/3545948.3545964},
  timestamp    = {Thu, 20 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/BaruaF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/CloostersPWDJSD22,
  author       = {Tobias Cloosters and
                  David Paa{\ss}en and
                  Jianqiang Wang and
                  Oussama Draissi and
                  Patrick Jauernig and
                  Emmanuel Stapf and
                  Lucas Davi and
                  Ahmad{-}Reza Sadeghi},
  title        = {RiscyROP: Automated Return-Oriented Programming Attacks on {RISC-V}
                  and {ARM64}},
  booktitle    = {25th International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022},
  pages        = {30--42},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3545948.3545997},
  doi          = {10.1145/3545948.3545997},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/CloostersPWDJSD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/FengLS22,
  author       = {Yebo Feng and
                  Jun Li and
                  Devkishen Sisodia},
  title        = {CJ-Sniffer: Measurement and Content-Agnostic Detection of Cryptojacking
                  Traffic},
  booktitle    = {25th International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022},
  pages        = {482--494},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3545948.3545973},
  doi          = {10.1145/3545948.3545973},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/FengLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/FranzenHAKG22,
  author       = {Fabian Franzen and
                  Tobias Holl and
                  Manuel Andreas and
                  Julian Kirsch and
                  Jens Grossklags},
  title        = {Katana: Robust, Automated, Binary-Only Forensic Analysis of Linux
                  Memory Snapshots},
  booktitle    = {25th International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022},
  pages        = {214--231},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3545948.3545980},
  doi          = {10.1145/3545948.3545980},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/FranzenHAKG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/FuLQZZYLD22,
  author       = {Zhuoqun Fu and
                  Mingxuan Liu and
                  Yue Qin and
                  Jia Zhang and
                  Yuan Zou and
                  Qilei Yin and
                  Qi Li and
                  Haixin Duan},
  title        = {Encrypted Malware Traffic Detection via Graph-based Network Analysis},
  booktitle    = {25th International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022},
  pages        = {495--509},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3545948.3545983},
  doi          = {10.1145/3545948.3545983},
  timestamp    = {Tue, 14 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/FuLQZZYLD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/HasanGP22,
  author       = {Md. Mehedi Hasan and
                  Seyedhamed Ghavamnia and
                  Michalis Polychronakis},
  title        = {Decap: Deprivileging Programs by Reducing Their Capabilities},
  booktitle    = {25th International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022},
  pages        = {395--408},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3545948.3545978},
  doi          = {10.1145/3545948.3545978},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/HasanGP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/HeWXFWLC022,
  author       = {Xu He and
                  Shu Wang and
                  Yunlong Xing and
                  Pengbin Feng and
                  Haining Wang and
                  Qi Li and
                  Songqing Chen and
                  Kun Sun},
  title        = {BinProv: Binary Code Provenance Identification without Disassembly},
  booktitle    = {25th International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022},
  pages        = {350--363},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3545948.3545956},
  doi          = {10.1145/3545948.3545956},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/HeWXFWLC022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/HuHD22,
  author       = {Zhenghao Hu and
                  Yu Hu and
                  Brendan Dolan{-}Gavitt},
  title        = {Towards Deceptive Defense in Software Security with Chaff Bugs},
  booktitle    = {25th International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022},
  pages        = {43--55},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3545948.3545981},
  doi          = {10.1145/3545948.3545981},
  timestamp    = {Thu, 20 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/HuHD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/JangAYTCK22,
  author       = {Daehee Jang and
                  Ammar Askar and
                  Insu Yun and
                  Stephen Tong and
                  Yiqin Cai and
                  Taesoo Kim},
  title        = {Fuzzing@Home: Distributed Fuzzing on Untrusted Heterogeneous Clients},
  booktitle    = {25th International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022},
  pages        = {1--16},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3545948.3545971},
  doi          = {10.1145/3545948.3545971},
  timestamp    = {Thu, 20 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/JangAYTCK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/JeongKH22,
  author       = {Hoyong Jeong and
                  Hodong Kim and
                  Junbeom Hur},
  title        = {Exploiting Metaobjects to Reinforce Data Leakage Attacks},
  booktitle    = {25th International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022},
  pages        = {17--29},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3545948.3545965},
  doi          = {10.1145/3545948.3545965},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/JeongKH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/JiangSK22,
  author       = {Jianyu Jiang and
                  Claudio Soriente and
                  Ghassan Karame},
  title        = {On the Challenges of Detecting Side-Channel Attacks in {SGX}},
  booktitle    = {25th International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022},
  pages        = {86--98},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3545948.3545972},
  doi          = {10.1145/3545948.3545972},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/JiangSK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/KalantariZB0SD22,
  author       = {Faezeh Kalantari and
                  Mehrnoosh Zaeifi and
                  Tiffany Bao and
                  Ruoyu Wang and
                  Yan Shoshitaishvili and
                  Adam Doup{\'{e}}},
  title        = {Context-Auditor: Context-sensitive Content Injection Mitigation},
  booktitle    = {25th International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022},
  pages        = {431--445},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3545948.3545992},
  doi          = {10.1145/3545948.3545992},
  timestamp    = {Thu, 20 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/KalantariZB0SD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MaLW0H0L22,
  author       = {Baihe Ma and
                  Xiaojie Lin and
                  Xu Wang and
                  Bin Liu and
                  Ying He and
                  Wei Ni and
                  Ren Ping Liu},
  title        = {New Cloaking Region Obfuscation for Road Network-Indistinguishability
                  and Location Privacy},
  booktitle    = {25th International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022},
  pages        = {160--170},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3545948.3545982},
  doi          = {10.1145/3545948.3545982},
  timestamp    = {Fri, 14 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/MaLW0H0L22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/NatatsukaI0ASM22,
  author       = {Atsuko Natatsuka and
                  Ryo Iijima and
                  Takuya Watanabe and
                  Mitsuaki Akiyama and
                  Tetsuya Sakai and
                  Tatsuya Mori},
  title        = {Understanding the Behavior Transparency of Voice Assistant Applications
                  Using the ChatterBox Framework},
  booktitle    = {25th International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022},
  pages        = {143--159},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3545948.3545970},
  doi          = {10.1145/3545948.3545970},
  timestamp    = {Thu, 20 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/NatatsukaI0ASM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Ou0G0022,
  author       = {Haoran Ou and
                  Yong Fang and
                  Yongyan Guo and
                  Wenbo Guo and
                  Cheng Huang},
  title        = {Viopolicy-Detector: An Automated Approach to Detecting {GDPR} Suspected
                  Compliance Violations in Websites},
  booktitle    = {25th International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022},
  pages        = {409--430},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3545948.3545952},
  doi          = {10.1145/3545948.3545952},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/Ou0G0022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Pham0H22,
  author       = {Duy{-}Phuc Pham and
                  Damien Marion and
                  Annelie Heuser},
  title        = {{ULTRA:} Ultimate Rootkit Detection over the Air},
  booktitle    = {25th International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022},
  pages        = {232--251},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3545948.3545962},
  doi          = {10.1145/3545948.3545962},
  timestamp    = {Thu, 20 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/Pham0H22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/PhilippaertsPJ22,
  author       = {Pieter Philippaerts and
                  Davy Preuveneers and
                  Wouter Joosen},
  title        = {OAuch: Exploring Security Compliance in the OAuth 2.0 Ecosystem},
  booktitle    = {25th International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022},
  pages        = {460--481},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3545948.3545955},
  doi          = {10.1145/3545948.3545955},
  timestamp    = {Tue, 06 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/PhilippaertsPJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/SabahNBC22,
  author       = {Mashael Al Sabah and
                  Mohamed Nabeel and
                  Yazan Boshmaf and
                  Euijin Choo},
  title        = {Content-Agnostic Detection of Phishing Domains using Certificate Transparency
                  and Passive {DNS}},
  booktitle    = {25th International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022},
  pages        = {446--459},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3545948.3545958},
  doi          = {10.1145/3545948.3545958},
  timestamp    = {Thu, 20 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/SabahNBC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Schwarz22,
  author       = {Fabian Schwarz},
  title        = {TrustedGateway: TEE-Assisted Routing and Firewall Enforcement Using
                  {ARM} TrustZone},
  booktitle    = {25th International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022},
  pages        = {56--71},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3545948.3545961},
  doi          = {10.1145/3545948.3545961},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/Schwarz22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/SunSRWZ22,
  author       = {Menghan Sun and
                  Zirui Song and
                  Xiaoxi Ren and
                  Daoyuan Wu and
                  Kehuan Zhang},
  title        = {LiCA: {A} Fine-grained and Path-sensitive Linux Capability Analysis
                  Framework},
  booktitle    = {25th International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022},
  pages        = {364--379},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3545948.3545966},
  doi          = {10.1145/3545948.3545966},
  timestamp    = {Thu, 20 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/SunSRWZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/TchanaWB22,
  author       = {Alain Tchana and
                  Lavoisier Lavoisier Wapet and
                  Y{\'{e}}rom{-}David Bromberg},
  title        = {Odile: {A} scalable tracing tool for non-rooted and on-device Android
                  phones},
  booktitle    = {25th International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022},
  pages        = {252--262},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3545948.3545951},
  doi          = {10.1145/3545948.3545951},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/TchanaWB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ThomaG22,
  author       = {Jan Philipp Thoma and
                  Tim G{\"{u}}neysu},
  title        = {Write Me and I'll Tell You Secrets - Write-After-Write Effects On
                  Intel CPUs},
  booktitle    = {25th International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022},
  pages        = {72--85},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3545948.3545987},
  doi          = {10.1145/3545948.3545987},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/ThomaG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/TorresJS22,
  author       = {Christof Ferreira Torres and
                  Hugo Jonker and
                  Radu State},
  title        = {Elysium: Context-Aware Bytecode-Level Patching to Automatically Heal
                  Vulnerable Smart Contracts},
  booktitle    = {25th International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022},
  pages        = {115--128},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3545948.3545975},
  doi          = {10.1145/3545948.3545975},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/TorresJS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/UsuiOKIM22,
  author       = {Toshinori Usui and
                  Yuto Otsuki and
                  Yuhei Kawakoya and
                  Makoto Iwamura and
                  Kanta Matsuura},
  title        = {Script Tainting Was Doomed From The Start (By Type Conversion): Converting
                  Script Engines into Dynamic Taint Analysis Frameworks},
  booktitle    = {25th International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022},
  pages        = {380--394},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3545948.3545969},
  doi          = {10.1145/3545948.3545969},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/UsuiOKIM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/WangFWZ0Y22,
  author       = {Dabao Wang and
                  Hang Feng and
                  Siwei Wu and
                  Yajin Zhou and
                  Lei Wu and
                  Xingliang Yuan},
  title        = {Penny Wise and Pound Foolish: Quantifying the Risk of Unlimited Approval
                  of {ERC20} Tokens on Ethereum},
  booktitle    = {25th International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022},
  pages        = {99--114},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3545948.3545963},
  doi          = {10.1145/3545948.3545963},
  timestamp    = {Thu, 20 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/WangFWZ0Y22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/WangLSL22,
  author       = {Jincheng Wang and
                  Zhuohua Li and
                  Mingshen Sun and
                  John C. S. Lui},
  title        = {Zigbee's Network Rejoin Procedure for IoT Systems: Vulnerabilities
                  and Implications},
  booktitle    = {25th International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022},
  pages        = {292--307},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3545948.3545953},
  doi          = {10.1145/3545948.3545953},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/WangLSL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/WeidemanWKZWTMH22,
  author       = {Nicolaas Weideman and
                  Haoda Wang and
                  Tyler Kann and
                  Spencer Zahabizadeh and
                  Wei{-}Cheng Wu and
                  Rajat Tandon and
                  Jelena Mirkovic and
                  Christophe Hauser},
  title        = {Harm-DoS: Hash Algorithm Replacement for Mitigating Denial-of-Service
                  Vulnerabilities in Binary Executables},
  booktitle    = {25th International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022},
  pages        = {276--291},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3545948.3545967},
  doi          = {10.1145/3545948.3545967},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/WeidemanWKZWTMH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Wolsing0SH22,
  author       = {Konrad Wolsing and
                  Eric Wagner and
                  Antoine Saillard and
                  Martin Henze},
  title        = {{IPAL:} Breaking up Silos of Protocol-dependent and Domain-specific
                  Industrial Intrusion Detection Systems},
  booktitle    = {25th International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022},
  pages        = {510--525},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3545948.3545968},
  doi          = {10.1145/3545948.3545968},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/Wolsing0SH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/WonWL22,
  author       = {Jun Yeon Won and
                  Haohuang Wen and
                  Zhiqiang Lin},
  title        = {What You See is Not What You Get: Revealing Hidden Memory Mapping
                  for Peripheral Modeling},
  booktitle    = {25th International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022},
  pages        = {200--213},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3545948.3545957},
  doi          = {10.1145/3545948.3545957},
  timestamp    = {Thu, 20 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/WonWL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/YangDMVACRK22,
  author       = {Shuiqiao Yang and
                  Bao Gia Doan and
                  Paul Montague and
                  Olivier Y. de Vel and
                  Tamas Abraham and
                  Seyit Camtepe and
                  Damith C. Ranasinghe and
                  Salil S. Kanhere},
  title        = {Transferable Graph Backdoor Attack},
  booktitle    = {25th International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022},
  pages        = {321--332},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3545948.3545976},
  doi          = {10.1145/3545948.3545976},
  timestamp    = {Thu, 20 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/YangDMVACRK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/YazdaniHHRDSJ22,
  author       = {Ramin Yazdani and
                  Alden Hilton and
                  Jeroen van der Ham and
                  Roland van Rijswijk{-}Deij and
                  Casey T. Deccio and
                  Anna Sperotto and
                  Mattijs Jonker},
  title        = {Mirrors in the Sky: On the Potential of Clouds in {DNS} Reflection-based
                  Denial-of-Service Attacks},
  booktitle    = {25th International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022},
  pages        = {263--275},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3545948.3545959},
  doi          = {10.1145/3545948.3545959},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/YazdaniHHRDSJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Zhang00M22,
  author       = {Qingzhao Zhang and
                  Xiao Zhu and
                  Mu Zhang and
                  Z. Morley Mao},
  title        = {Automated Runtime Mitigation for Misconfiguration Vulnerabilities
                  in Industrial Control Systems},
  booktitle    = {25th International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022},
  pages        = {333--349},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3545948.3545954},
  doi          = {10.1145/3545948.3545954},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/Zhang00M22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ZhangR22,
  author       = {Youqian Zhang and
                  Kasper Rasmussen},
  title        = {Detection of Electromagnetic Signal Injection Attacks on Actuator
                  Systems},
  booktitle    = {25th International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022},
  pages        = {171--184},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3545948.3545949},
  doi          = {10.1145/3545948.3545949},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ZhangR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/raid/2022,
  title        = {25th International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2022, Limassol, Cyprus, October 26-28, 2022},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3545948},
  doi          = {10.1145/3545948},
  isbn         = {978-1-4503-9704-9},
  timestamp    = {Thu, 20 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/AberaBGJKS21,
  author       = {Tigist Abera and
                  Ferdinand Brasser and
                  Lachlan J. Gunn and
                  Patrick Jauernig and
                  David Koisser and
                  Ahmad{-}Reza Sadeghi},
  editor       = {Leyla Bilge and
                  Tudor Dumitras},
  title        = {GrandDetAuto: Detecting Malicious Nodes in Large-Scale Autonomous
                  Networks},
  booktitle    = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions
                  and Defenses, San Sebastian, Spain, October 6-8, 2021},
  pages        = {220--234},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3471621.3471868},
  doi          = {10.1145/3471621.3471868},
  timestamp    = {Fri, 08 Oct 2021 09:46:25 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/AberaBGJKS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/CableGID21,
  author       = {Jack Cable and
                  Drew Mylander Gregory and
                  Liz Izhikevich and
                  Zakir Durumeric},
  editor       = {Leyla Bilge and
                  Tudor Dumitras},
  title        = {Stratosphere: Finding Vulnerable Cloud Storage Buckets},
  booktitle    = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions
                  and Defenses, San Sebastian, Spain, October 6-8, 2021},
  pages        = {399--411},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3471621.3473500},
  doi          = {10.1145/3471621.3473500},
  timestamp    = {Thu, 25 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/CableGID21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/CastellanosOCA021,
  author       = {John Henry Castellanos and
                  Mart{\'{\i}}n Ochoa and
                  Alvaro A. C{\'{a}}rdenas and
                  Owen Arden and
                  Jianying Zhou},
  editor       = {Leyla Bilge and
                  Tudor Dumitras},
  title        = {AttkFinder: Discovering Attack Vectors in {PLC} Programs using Information
                  Flow Analysis},
  booktitle    = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions
                  and Defenses, San Sebastian, Spain, October 6-8, 2021},
  pages        = {235--250},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3471621.3471864},
  doi          = {10.1145/3471621.3471864},
  timestamp    = {Fri, 08 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/CastellanosOCA021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Chinprutthiwong21,
  author       = {Phakpoom Chinprutthiwong and
                  Raj Vardhan and
                  Guangliang Yang and
                  Yangyong Zhang and
                  Guofei Gu},
  editor       = {Leyla Bilge and
                  Tudor Dumitras},
  title        = {The Service Worker Hiding in Your Browser: The Next Web Attack Target?},
  booktitle    = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions
                  and Defenses, San Sebastian, Spain, October 6-8, 2021},
  pages        = {312--323},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3471621.3471845},
  doi          = {10.1145/3471621.3471845},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/Chinprutthiwong21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/DengZX0L21,
  author       = {Gelei Deng and
                  Yuan Zhou and
                  Yuan Xu and
                  Tianwei Zhang and
                  Yang Liu},
  editor       = {Leyla Bilge and
                  Tudor Dumitras},
  title        = {An Investigation of Byzantine Threats in Multi-Robot Systems},
  booktitle    = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions
                  and Defenses, San Sebastian, Spain, October 6-8, 2021},
  pages        = {17--32},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3471621.3471867},
  doi          = {10.1145/3471621.3471867},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/DengZX0L21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/DingMGSCZ21,
  author       = {Aolin Ding and
                  Praveen Murthy and
                  Luis Garcia and
                  Pengfei Sun and
                  Matthew Chan and
                  Saman A. Zonouz},
  editor       = {Leyla Bilge and
                  Tudor Dumitras},
  title        = {Mini-Me, You Complete Me! Data-Driven Drone Security via DNN-based
                  Approximate Computing},
  booktitle    = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions
                  and Defenses, San Sebastian, Spain, October 6-8, 2021},
  pages        = {428--441},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3471621.3471869},
  doi          = {10.1145/3471621.3471869},
  timestamp    = {Mon, 17 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/DingMGSCZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GDFAS21,
  author       = {Sri Shaila G and
                  Ahmad Darki and
                  Michalis Faloutsos and
                  Nael B. Abu{-}Ghazaleh and
                  Manu Sridharan},
  editor       = {Leyla Bilge and
                  Tudor Dumitras},
  title        = {DisCo: Combining Disassemblers for Improved Performance},
  booktitle    = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions
                  and Defenses, San Sebastian, Spain, October 6-8, 2021},
  pages        = {148--161},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3471621.3471851},
  doi          = {10.1145/3471621.3471851},
  timestamp    = {Fri, 08 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/GDFAS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GatlinBESLWY21,
  author       = {Jacob Gatlin and
                  Sofia Belikovetsky and
                  Yuval Elovici and
                  Anthony Skjellum and
                  Joshua Lubell and
                  Paul Witherell and
                  Mark Yampolskiy},
  editor       = {Leyla Bilge and
                  Tudor Dumitras},
  title        = {Encryption is Futile: Reconstructing 3D-Printed Models Using the Power
                  Side-Channel},
  booktitle    = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions
                  and Defenses, San Sebastian, Spain, October 6-8, 2021},
  pages        = {135--147},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3471621.3471850},
  doi          = {10.1145/3471621.3471850},
  timestamp    = {Fri, 08 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/GatlinBESLWY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GravaniHCS21,
  author       = {Spyridoula Gravani and
                  Mohammad Hedayati and
                  John Criswell and
                  Michael L. Scott},
  editor       = {Leyla Bilge and
                  Tudor Dumitras},
  title        = {Fast Intra-kernel Isolation and Security with IskiOS},
  booktitle    = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions
                  and Defenses, San Sebastian, Spain, October 6-8, 2021},
  pages        = {119--134},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3471621.3471849},
  doi          = {10.1145/3471621.3471849},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/GravaniHCS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Huang0LLD21,
  author       = {Jin Huang and
                  Junjie Zhang and
                  Jialun Liu and
                  Chuang Li and
                  Rui Dai},
  editor       = {Leyla Bilge and
                  Tudor Dumitras},
  title        = {UFuzzer: Lightweight Detection of PHP-Based Unrestricted File Upload
                  Vulnerabilities Via Static-Fuzzing Co-Analysis},
  booktitle    = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions
                  and Defenses, San Sebastian, Spain, October 6-8, 2021},
  pages        = {78--90},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3471621.3471859},
  doi          = {10.1145/3471621.3471859},
  timestamp    = {Sun, 12 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/Huang0LLD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/IfeSMS21,
  author       = {Colin C. Ife and
                  Yun Shen and
                  Steven J. Murdoch and
                  Gianluca Stringhini},
  editor       = {Leyla Bilge and
                  Tudor Dumitras},
  title        = {Marked for Disruption: Tracing the Evolution of Malware Delivery Operations
                  Targeted for Takedown},
  booktitle    = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions
                  and Defenses, San Sebastian, Spain, October 6-8, 2021},
  pages        = {340--353},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3471621.3471844},
  doi          = {10.1145/3471621.3471844},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/IfeSMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/JiYA021,
  author       = {Tianxi Ji and
                  Emre Yilmaz and
                  Erman Ayday and
                  Pan Li},
  editor       = {Leyla Bilge and
                  Tudor Dumitras},
  title        = {The Curse of Correlations for Robust Fingerprinting of Relational
                  Databases},
  booktitle    = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions
                  and Defenses, San Sebastian, Spain, October 6-8, 2021},
  pages        = {412--427},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3471621.3471853},
  doi          = {10.1145/3471621.3471853},
  timestamp    = {Thu, 14 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/JiYA021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/KumarS21,
  author       = {Sandeep Kumar and
                  Smruti R. Sarangi},
  editor       = {Leyla Bilge and
                  Tudor Dumitras},
  title        = {SecureFS: {A} Secure File System for Intel {SGX}},
  booktitle    = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions
                  and Defenses, San Sebastian, Spain, October 6-8, 2021},
  pages        = {91--102},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3471621.3471840},
  doi          = {10.1145/3471621.3471840},
  timestamp    = {Fri, 08 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/KumarS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/LikajKP21,
  author       = {Xhelal Likaj and
                  Soheil Khodayari and
                  Giancarlo Pellegrino},
  editor       = {Leyla Bilge and
                  Tudor Dumitras},
  title        = {Where We Stand (or Fall): An Analysis of {CSRF} Defenses in Web Frameworks},
  booktitle    = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions
                  and Defenses, San Sebastian, Spain, October 6-8, 2021},
  pages        = {370--385},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3471621.3471846},
  doi          = {10.1145/3471621.3471846},
  timestamp    = {Fri, 08 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/LikajKP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Liu0DV0FL21,
  author       = {Xuanyu Liu and
                  Qiang Zeng and
                  Xiaojiang Du and
                  Siva Likitha Valluru and
                  Chenglong Fu and
                  Xiao Fu and
                  Bin Luo},
  editor       = {Leyla Bilge and
                  Tudor Dumitras},
  title        = {SniffMislead: Non-Intrusive Privacy Protection against Wireless Packet
                  Sniffers in Smart Homes},
  booktitle    = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions
                  and Defenses, San Sebastian, Spain, October 6-8, 2021},
  pages        = {33--47},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3471621.3471856},
  doi          = {10.1145/3471621.3471856},
  timestamp    = {Fri, 03 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/Liu0DV0FL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MaierT21,
  author       = {Dominik Christian Maier and
                  Fabian Toepfer},
  editor       = {Leyla Bilge and
                  Tudor Dumitras},
  title        = {{BSOD:} Binary-only Scalable fuzzing Of device Drivers},
  booktitle    = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions
                  and Defenses, San Sebastian, Spain, October 6-8, 2021},
  pages        = {48--61},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3471621.3471863},
  doi          = {10.1145/3471621.3471863},
  timestamp    = {Fri, 14 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/MaierT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Mi0GB21,
  author       = {Xianya Mi and
                  Sanjay Rawat and
                  Cristiano Giuffrida and
                  Herbert Bos},
  editor       = {Leyla Bilge and
                  Tudor Dumitras},
  title        = {LeanSym: Efficient Hybrid Fuzzing Through Conservative Constraint
                  Debloating},
  booktitle    = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions
                  and Defenses, San Sebastian, Spain, October 6-8, 2021},
  pages        = {62--77},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3471621.3471852},
  doi          = {10.1145/3471621.3471852},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/Mi0GB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MunteanVLTG021,
  author       = {Paul Muntean and
                  Richard Viehoever and
                  Zhiqiang Lin and
                  Gang Tan and
                  Jens Grossklags and
                  Claudia Eckert},
  editor       = {Leyla Bilge and
                  Tudor Dumitras},
  title        = {iTOP: Automating Counterfeit Object-Oriented Programming Attacks},
  booktitle    = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions
                  and Defenses, San Sebastian, Spain, October 6-8, 2021},
  pages        = {162--176},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3471621.3471847},
  doi          = {10.1145/3471621.3471847},
  timestamp    = {Fri, 08 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/MunteanVLTG021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/NabeelASKWY21,
  author       = {Mohamed Nabeel and
                  Enes Altinisik and
                  Haipei Sun and
                  Issa Khalil and
                  Wendy Hui Wang and
                  Ting Yu},
  editor       = {Leyla Bilge and
                  Tudor Dumitras},
  title        = {{CADUE:} Content-Agnostic Detection of Unwanted Emails for Enterprise
                  Security},
  booktitle    = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions
                  and Defenses, San Sebastian, Spain, October 6-8, 2021},
  pages        = {205--219},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3471621.3471862},
  doi          = {10.1145/3471621.3471862},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/NabeelASKWY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/NisiGFB21,
  author       = {Dario Nisi and
                  Mariano Graziano and
                  Yanick Fratantonio and
                  Davide Balzarotti},
  editor       = {Leyla Bilge and
                  Tudor Dumitras},
  title        = {Lost in the Loader: The Many Faces of the Windows {PE} File Format},
  booktitle    = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions
                  and Defenses, San Sebastian, Spain, October 6-8, 2021},
  pages        = {177--192},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3471621.3471848},
  doi          = {10.1145/3471621.3471848},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/NisiGFB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/OngunSOTTNSOP21,
  author       = {Talha Ongun and
                  Jack W. Stokes and
                  Jonathan Bar Or and
                  Ke Tian and
                  Farid Tajaddodianfar and
                  Joshua Neil and
                  Christian Seifert and
                  Alina Oprea and
                  John C. Platt},
  editor       = {Leyla Bilge and
                  Tudor Dumitras},
  title        = {Living-Off-The-Land Command Detection Using Active Learning},
  booktitle    = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions
                  and Defenses, San Sebastian, Spain, October 6-8, 2021},
  pages        = {442--455},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3471621.3471858},
  doi          = {10.1145/3471621.3471858},
  timestamp    = {Fri, 08 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/OngunSOTTNSOP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/RoesslerAPMPKPB21,
  author       = {Nick Roessler and
                  Lucas Atayde and
                  Imani Palmer and
                  Derrick Paul McKee and
                  Jai Pandey and
                  Vasileios P. Kemerlis and
                  Mathias Payer and
                  Adam Bates and
                  Jonathan M. Smith and
                  Andr{\'{e}} DeHon and
                  Nathan Dautenhahn},
  editor       = {Leyla Bilge and
                  Tudor Dumitras},
  title        = {{\(\mu\)}SCOPE: {A} Methodology for Analyzing Least-Privilege Compartmentalization
                  in Large Software Artifacts},
  booktitle    = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions
                  and Defenses, San Sebastian, Spain, October 6-8, 2021},
  pages        = {296--311},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3471621.3471839},
  doi          = {10.1145/3471621.3471839},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/RoesslerAPMPKPB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/RuaroZDPBCZKV21,
  author       = {Nicola Ruaro and
                  Kyle Zeng and
                  Lukas Dresel and
                  Mario Polino and
                  Tiffany Bao and
                  Andrea Continella and
                  Stefano Zanero and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Leyla Bilge and
                  Tudor Dumitras},
  title        = {SyML: Guiding Symbolic Execution Toward Vulnerable States Through
                  Pattern Learning},
  booktitle    = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions
                  and Defenses, San Sebastian, Spain, October 6-8, 2021},
  pages        = {456--468},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3471621.3471865},
  doi          = {10.1145/3471621.3471865},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/RuaroZDPBCZKV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ShermanSR21,
  author       = {Imani N. Sherman and
                  Jack W. Stokes and
                  Elissa M. Redmiles},
  editor       = {Leyla Bilge and
                  Tudor Dumitras},
  title        = {Designing Media Provenance Indicators to Combat Fake Media},
  booktitle    = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions
                  and Defenses, San Sebastian, Spain, October 6-8, 2021},
  pages        = {324--339},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3471621.3471860},
  doi          = {10.1145/3471621.3471860},
  timestamp    = {Fri, 08 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ShermanSR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/TatangZH21,
  author       = {Dennis Tatang and
                  Florian Zettl and
                  Thorsten Holz},
  editor       = {Leyla Bilge and
                  Tudor Dumitras},
  title        = {The Evolution of DNS-based Email Authentication: Measuring Adoption
                  and Finding Flaws},
  booktitle    = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions
                  and Defenses, San Sebastian, Spain, October 6-8, 2021},
  pages        = {354--369},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3471621.3471842},
  doi          = {10.1145/3471621.3471842},
  timestamp    = {Fri, 08 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/TatangZH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ThomaFKGB21,
  author       = {Jan Philipp Thoma and
                  Jakob Feldtkeller and
                  Markus Krausz and
                  Tim G{\"{u}}neysu and
                  Daniel J. Bernstein},
  editor       = {Leyla Bilge and
                  Tudor Dumitras},
  title        = {BasicBlocker: {ISA} Redesign to Make Spectre-Immune CPUs Faster},
  booktitle    = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions
                  and Defenses, San Sebastian, Spain, October 6-8, 2021},
  pages        = {103--118},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3471621.3471857},
  doi          = {10.1145/3471621.3471857},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ThomaFKGB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/WangLWDC21,
  author       = {Junnan Wang and
                  Qixu Liu and
                  Di Wu and
                  Ying Dong and
                  Xiang Cui},
  editor       = {Leyla Bilge and
                  Tudor Dumitras},
  title        = {Crafting Adversarial Example to Bypass Flow-{\&}ML- based Botnet
                  Detector via {RL}},
  booktitle    = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions
                  and Defenses, San Sebastian, Spain, October 6-8, 2021},
  pages        = {193--204},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3471621.3471841},
  doi          = {10.1145/3471621.3471841},
  timestamp    = {Fri, 08 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/WangLWDC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Xu0B21,
  author       = {Yuan Xu and
                  Tianwei Zhang and
                  Yungang Bao},
  editor       = {Leyla Bilge and
                  Tudor Dumitras},
  title        = {Analysis and Mitigation of Function Interaction Risks in Robot Apps},
  booktitle    = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions
                  and Defenses, San Sebastian, Spain, October 6-8, 2021},
  pages        = {1--16},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3471621.3471854},
  doi          = {10.1145/3471621.3471854},
  timestamp    = {Fri, 08 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/Xu0B21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/YampolskiyGGSY21,
  author       = {Mark Yampolskiy and
                  Lynne Graves and
                  Jacob Gatlin and
                  Anthony Skjellum and
                  Moti Yung},
  editor       = {Leyla Bilge and
                  Tudor Dumitras},
  title        = {What Did You Add to My Additive Manufacturing Data?: Steganographic
                  Attacks on 3D Printing Files},
  booktitle    = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions
                  and Defenses, San Sebastian, Spain, October 6-8, 2021},
  pages        = {266--281},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3471621.3471843},
  doi          = {10.1145/3471621.3471843},
  timestamp    = {Fri, 08 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/YampolskiyGGSY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Zhang21,
  author       = {Zicheng Zhang},
  editor       = {Leyla Bilge and
                  Tudor Dumitras},
  title        = {On the Usability (In)Security of In-App Browsing Interfaces in Mobile
                  Apps},
  booktitle    = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions
                  and Defenses, San Sebastian, Spain, October 6-8, 2021},
  pages        = {386--398},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3471621.3471625},
  doi          = {10.1145/3471621.3471625},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/Zhang21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ZhangASHG21,
  author       = {Yangyong Zhang and
                  Sunpreet S. Arora and
                  Maliheh Shirvanian and
                  Jianwei Huang and
                  Guofei Gu},
  editor       = {Leyla Bilge and
                  Tudor Dumitras},
  title        = {Practical Speech Re-use Prevention in Voice-driven Services},
  booktitle    = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions
                  and Defenses, San Sebastian, Spain, October 6-8, 2021},
  pages        = {282--295},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3471621.3471855},
  doi          = {10.1145/3471621.3471855},
  timestamp    = {Fri, 08 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ZhangASHG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ZhangD21,
  author       = {Shaohu Zhang and
                  Anupam Das},
  editor       = {Leyla Bilge and
                  Tudor Dumitras},
  title        = {HandLock: Enabling 2-FA for Smart Home Voice Assistants using Inaudible
                  Acoustic Signal},
  booktitle    = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions
                  and Defenses, San Sebastian, Spain, October 6-8, 2021},
  pages        = {251--265},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3471621.3471866},
  doi          = {10.1145/3471621.3471866},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ZhangD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/raid/2021,
  editor       = {Leyla Bilge and
                  Tudor Dumitras},
  title        = {{RAID} '21: 24th International Symposium on Research in Attacks, Intrusions
                  and Defenses, San Sebastian, Spain, October 6-8, 2021},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3471621},
  doi          = {10.1145/3471621},
  isbn         = {978-1-4503-9058-3},
  timestamp    = {Fri, 08 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/0003YLOKR20,
  author       = {Xiaoguang Wang and
                  SengMing Yeoh and
                  Robert Lyerly and
                  Pierre Olivier and
                  Sang{-}Hoon Kim and
                  Binoy Ravindran},
  editor       = {Manuel Egele and
                  Leyla Bilge},
  title        = {A Framework for Software Diversification with {ISA} Heterogeneity},
  booktitle    = {23rd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020},
  pages        = {427--442},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/raid2020/presentation/wang-xiaoguang},
  timestamp    = {Thu, 17 Jun 2021 16:04:48 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/0003YLOKR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/0017YL0Z20,
  author       = {Jun Zhao and
                  Qiben Yan and
                  Xudong Liu and
                  Bo Li and
                  Guangsheng Zuo},
  editor       = {Manuel Egele and
                  Leyla Bilge},
  title        = {Cyber Threat Intelligence Modeling Based on Heterogeneous Graph Convolutional
                  Network},
  booktitle    = {23rd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020},
  pages        = {241--256},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/raid2020/presentation/zhao},
  timestamp    = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/0017YL0Z20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Ah-FatHMBN20,
  author       = {Patrick Ah{-}Fat and
                  Michael Huth and
                  Rob Mead and
                  Tim Burrell and
                  Joshua Neil},
  editor       = {Manuel Egele and
                  Leyla Bilge},
  title        = {Effective Detection of Credential Thefts from Windows Memory: Learning
                  Access Behaviours to Local Security Authority Subsystem Service},
  booktitle    = {23rd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020},
  pages        = {181--194},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/raid2020/presentation/ah-fat},
  timestamp    = {Mon, 11 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/Ah-FatHMBN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BhattacharyyaSK20,
  author       = {Atri Bhattacharyya and
                  Andr{\'{e}}s S{\'{a}}nchez and
                  Esmaeil Mohammadian Koruyeh and
                  Nael B. Abu{-}Ghazaleh and
                  Chengyu Song and
                  Mathias Payer},
  editor       = {Manuel Egele and
                  Leyla Bilge},
  title        = {SpecROP: Speculative Exploitation of {ROP} Chains},
  booktitle    = {23rd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020},
  pages        = {1--16},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/raid2020/presentation/bhattacharyya},
  timestamp    = {Thu, 17 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/BhattacharyyaSK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BowmanLJH20,
  author       = {Benjamin Bowman and
                  Craig Laprade and
                  Yuede Ji and
                  H. Howie Huang},
  editor       = {Manuel Egele and
                  Leyla Bilge},
  title        = {Detecting Lateral Movement in Enterprise Computer Networks with Unsupervised
                  Graph {AI}},
  booktitle    = {23rd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020},
  pages        = {257--268},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/raid2020/presentation/bowman},
  timestamp    = {Thu, 17 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/BowmanLJH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BuyukkayhanGLO020,
  author       = {Ahmet Salih Buyukkayhan and
                  Can Gemicioglu and
                  Tobias Lauinger and
                  Alina Oprea and
                  William Robertson and
                  Engin Kirda},
  editor       = {Manuel Egele and
                  Leyla Bilge},
  title        = {What's in an Exploit? An Empirical Analysis of Reflected Server {XSS}
                  Exploitation Techniques},
  booktitle    = {23rd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020},
  pages        = {107--120},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/raid2020/presentation/buyukkayhan},
  timestamp    = {Thu, 17 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/BuyukkayhanGLO020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/CarminatiSPZ20,
  author       = {Michele Carminati and
                  Luca Santini and
                  Mario Polino and
                  Stefano Zanero},
  editor       = {Manuel Egele and
                  Leyla Bilge},
  title        = {Evasion Attacks against Banking Fraud Detection Systems},
  booktitle    = {23rd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020},
  pages        = {285--300},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/raid2020/presentation/carminati},
  timestamp    = {Thu, 17 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/CarminatiSPZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ChenAFWL20,
  author       = {Yaohui Chen and
                  Mansour Ahmadi and
                  Reza Mirzazade Farkhani and
                  Boyu Wang and
                  Long Lu},
  editor       = {Manuel Egele and
                  Leyla Bilge},
  title        = {{MEUZZ:} Smart Seed Scheduling for Hybrid Fuzzing},
  booktitle    = {23rd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020},
  pages        = {77--92},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/raid2020/presentation/chen},
  timestamp    = {Thu, 17 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ChenAFWL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ChoiKA0X20,
  author       = {Hongjun Choi and
                  Sayali Kate and
                  Yousra Aafer and
                  Xiangyu Zhang and
                  Dongyan Xu},
  editor       = {Manuel Egele and
                  Leyla Bilge},
  title        = {Software-based Realtime Recovery from Sensor Attacks on Robotic Vehicles},
  booktitle    = {23rd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020},
  pages        = {349--364},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/raid2020/presentation/choi},
  timestamp    = {Thu, 17 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ChoiKA0X20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/DeMarinisWJFK20,
  author       = {Nicholas DeMarinis and
                  Kent Williams{-}King and
                  Di Jin and
                  Rodrigo Fonseca and
                  Vasileios P. Kemerlis},
  editor       = {Manuel Egele and
                  Leyla Bilge},
  title        = {sysfilter: Automated System Call Filtering for Commodity Software},
  booktitle    = {23rd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020},
  pages        = {459--474},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/raid2020/presentation/demarinis},
  timestamp    = {Thu, 17 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/DeMarinisWJFK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/FungYB20,
  author       = {Clement Fung and
                  Chris J. M. Yoon and
                  Ivan Beschastnikh},
  editor       = {Manuel Egele and
                  Leyla Bilge},
  title        = {The Limitations of Federated Learning in Sybil Settings},
  booktitle    = {23rd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020},
  pages        = {301--316},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/raid2020/presentation/fung},
  timestamp    = {Thu, 17 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/FungYB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GhavamniaPBP20,
  author       = {Seyedhamed Ghavamnia and
                  Tapti Palit and
                  Azzedine Benameur and
                  Michalis Polychronakis},
  editor       = {Manuel Egele and
                  Leyla Bilge},
  title        = {Confine: Automated System Call Policy Generation for Container Attack
                  Surface Reduction},
  booktitle    = {23rd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020},
  pages        = {443--458},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/raid2020/presentation/ghavanmnia},
  timestamp    = {Thu, 17 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/GhavamniaPBP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/HeXJZ0C20,
  author       = {Yun He and
                  Yihua Xu and
                  Xiaoqi Jia and
                  Shengzhi Zhang and
                  Peng Liu and
                  Shuai Chang},
  editor       = {Manuel Egele and
                  Leyla Bilge},
  title        = {EnclavePDP: {A} General Framework to Verify Data Integrity in Cloud
                  Using Intel {SGX}},
  booktitle    = {23rd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020},
  pages        = {195--208},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/raid2020/presentation/he},
  timestamp    = {Thu, 17 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/HeXJZ0C20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/HossenTRI0H20,
  author       = {Md. Imran Hossen and
                  Yazhou Tu and
                  Md Fazle Rabby and
                  Md. Nazmul Islam and
                  Hui Cao and
                  Xiali Hei},
  editor       = {Manuel Egele and
                  Leyla Bilge},
  title        = {An Object Detection based Solver for Google's Image reCAPTCHA v2},
  booktitle    = {23rd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020},
  pages        = {269--284},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/raid2020/presentation/hossen},
  timestamp    = {Thu, 10 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/HossenTRI0H20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/IbdahLEBM20,
  author       = {Duha Ibdah and
                  Nada Lachtar and
                  Abdulrahman Abu Elkhail and
                  Anys Bacha and
                  Hafiz Malik},
  editor       = {Manuel Egele and
                  Leyla Bilge},
  title        = {Dark Firmware: {A} Systematic Approach to Exploring Application Security
                  Risks in the Presence of Untrusted Firmware},
  booktitle    = {23rd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020},
  pages        = {413--426},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/raid2020/presentation/ibdah},
  timestamp    = {Thu, 17 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/IbdahLEBM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/JiaTMGSL20,
  author       = {Yaoqi Jia and
                  Shruti Tople and
                  Tarik Moataz and
                  Deli Gong and
                  Prateek Saxena and
                  Zhenkai Liang},
  editor       = {Manuel Egele and
                  Leyla Bilge},
  title        = {Robust {P2P} Primitives Using {SGX} Enclaves},
  booktitle    = {23rd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020},
  pages        = {209--224},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/raid2020/presentation/jia},
  timestamp    = {Thu, 17 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/JiaTMGSL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/KoishybayevK20,
  author       = {Igibek Koishybayev and
                  Alexandros Kapravelos},
  editor       = {Manuel Egele and
                  Leyla Bilge},
  title        = {Mininode: Reducing the Attack Surface of Node.js Applications},
  booktitle    = {23rd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020},
  pages        = {121--134},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/raid2020/presentation/koishybayev},
  timestamp    = {Thu, 17 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/KoishybayevK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/KozlovYKBFPI20,
  author       = {Fedor Kozlov and
                  Isabella Yuen and
                  Jakub Kowalczyk and
                  Daniel Bernhardt and
                  David Freeman and
                  Paul Pearce and
                  Ivan Ivanov},
  editor       = {Manuel Egele and
                  Leyla Bilge},
  title        = {Evaluating Changes to Fake Account Verification Systems},
  booktitle    = {23rd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020},
  pages        = {135--148},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/raid2020/presentation/kozlov},
  timestamp    = {Thu, 17 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/KozlovYKBFPI20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MaierEMH20,
  author       = {Dominik Christian Maier and
                  Henrik Erb and
                  Patrick Mullan and
                  Vincent Haupert},
  editor       = {Manuel Egele and
                  Leyla Bilge},
  title        = {Camera Fingerprinting Authentication Revisited},
  booktitle    = {23rd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020},
  pages        = {31--46},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/raid2020/presentation/maier},
  timestamp    = {Fri, 14 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/MaierEMH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ManLG20,
  author       = {Yanmao Man and
                  Ming Li and
                  Ryan M. Gerdes},
  editor       = {Manuel Egele and
                  Leyla Bilge},
  title        = {GhostImage: Remote Perception Attacks against Camera-based Image Classification
                  Systems},
  booktitle    = {23rd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020},
  pages        = {317--332},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/raid2020/presentation/man},
  timestamp    = {Sun, 12 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/ManLG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/NguyenBBGL20,
  author       = {Manh{-}Dung Nguyen and
                  S{\'{e}}bastien Bardin and
                  Richard Bonichon and
                  Roland Groz and
                  Matthieu Lemerre},
  editor       = {Manuel Egele and
                  Leyla Bilge},
  title        = {Binary-level Directed Fuzzing for Use-After-Free Vulnerabilities},
  booktitle    = {23rd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020},
  pages        = {47--62},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/raid2020/presentation/nguyen},
  timestamp    = {Thu, 17 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/NguyenBBGL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/PalutkeRWF20,
  author       = {Ralph Palutke and
                  Simon Ruderich and
                  Matthias Wild and
                  Felix C. Freiling},
  editor       = {Manuel Egele and
                  Leyla Bilge},
  title        = {HyperLeech: Stealthy System Virtualization with Minimal Target Impact
                  through DMA-Based Hypervisor Injection},
  booktitle    = {23rd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020},
  pages        = {165--179},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/raid2020/presentation/palutke},
  timestamp    = {Thu, 17 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/PalutkeRWF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/PetersonJHCN20,
  author       = {Anthony Peterson and
                  Samuel Jero and
                  Md. Endadul Hoque and
                  David R. Choffnes and
                  Cristina Nita{-}Rotaru},
  editor       = {Manuel Egele and
                  Leyla Bilge},
  title        = {aBBRate: Automating {BBR} Attack Exploration Using a Model-Based Approach},
  booktitle    = {23rd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020},
  pages        = {225--240},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/raid2020/presentation/peterson},
  timestamp    = {Thu, 17 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/PetersonJHCN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/RokonIDPF20,
  author       = {Md Omar Faruk Rokon and
                  Risul Islam and
                  Ahmad Darki and
                  Evangelos E. Papalexakis and
                  Michalis Faloutsos},
  editor       = {Manuel Egele and
                  Leyla Bilge},
  title        = {SourceFinder: Finding Malware Source-Code from Publicly Available
                  Repositories in GitHub},
  booktitle    = {23rd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020},
  pages        = {149--163},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/raid2020/presentation/omar},
  timestamp    = {Thu, 17 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/RokonIDPF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Salehi0C20,
  author       = {Majid Salehi and
                  Danny Hughes and
                  Bruno Crispo},
  editor       = {Manuel Egele and
                  Leyla Bilge},
  title        = {{\(\mu\)}SBS: Static Binary Sanitization of Bare-metal Embedded Devices
                  for Fault Observability},
  booktitle    = {23rd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020},
  pages        = {381--395},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/raid2020/presentation/salehi},
  timestamp    = {Thu, 17 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/Salehi0C20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/TakahashiKVYI20,
  author       = {Takeshi Takahashi and
                  Christopher Kruegel and
                  Giovanni Vigna and
                  Katsunari Yoshioka and
                  Daisuke Inoue},
  editor       = {Manuel Egele and
                  Leyla Bilge},
  title        = {Tracing and Analyzing Web Access Paths Based on User-Side Data Collection:
                  How Do Users Reach Malicious URLs?},
  booktitle    = {23rd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020},
  pages        = {93--106},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/raid2020/presentation/takahashi},
  timestamp    = {Mon, 30 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/TakahashiKVYI20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/TileriaBS20,
  author       = {Marcos Tileria and
                  Jorge Blasco and
                  Guillermo Suarez{-}Tangil},
  editor       = {Manuel Egele and
                  Leyla Bilge},
  title        = {WearFlow: Expanding Information Flow Analysis To Companion Apps in
                  Wear {OS}},
  booktitle    = {23rd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020},
  pages        = {63--75},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/raid2020/presentation/tileria},
  timestamp    = {Thu, 17 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/TileriaBS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ValenzaCA20,
  author       = {Andrea Valenza and
                  Gabriele Costa and
                  Alessandro Armando},
  editor       = {Manuel Egele and
                  Leyla Bilge},
  title        = {Never Trust Your Victim: Weaponizing Vulnerabilities in Security Scanners},
  booktitle    = {23rd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020},
  pages        = {17--29},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/raid2020/presentation/valenza},
  timestamp    = {Tue, 05 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ValenzaCA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/WangC0020,
  author       = {Shu Wang and
                  Jiahao Cao and
                  Kun Sun and
                  Qi Li},
  editor       = {Manuel Egele and
                  Leyla Bilge},
  title        = {{SIEVE:} Secure In-Vehicle Automatic Speech Recognition Systems},
  booktitle    = {23rd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020},
  pages        = {365--379},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/raid2020/presentation/wang-shu},
  timestamp    = {Thu, 17 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/WangC0020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/WuNKPX20,
  author       = {Jianliang Wu and
                  Yuhong Nan and
                  Vireshwar Kumar and
                  Mathias Payer and
                  Dongyan Xu},
  editor       = {Manuel Egele and
                  Leyla Bilge},
  title        = {BlueShield: Detecting Spoofing Attacks in Bluetooth Low Energy Networks},
  booktitle    = {23rd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020},
  pages        = {397--411},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/raid2020/presentation/wu},
  timestamp    = {Thu, 17 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/WuNKPX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Yang000YD20,
  author       = {Zeyu Yang and
                  Liang He and
                  Peng Cheng and
                  Jiming Chen and
                  David K. Y. Yau and
                  Linkang Du},
  editor       = {Manuel Egele and
                  Leyla Bilge},
  title        = {PLC-Sleuth: Detecting and Localizing {PLC} Intrusions Using Control
                  Invariants},
  booktitle    = {23rd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020},
  pages        = {333--348},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/raid2020/presentation/yang},
  timestamp    = {Tue, 09 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/Yang000YD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/raid/2020,
  editor       = {Manuel Egele and
                  Leyla Bilge},
  title        = {23rd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2020, San Sebastian, Spain, October 14-15, 2020},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/raid2020},
  isbn         = {978-1-939133-18-2},
  timestamp    = {Thu, 17 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/0001HKSGA19,
  author       = {Daiki Chiba and
                  Ayako Akiyama Hasegawa and
                  Takashi Koide and
                  Yuta Sawabe and
                  Shigeki Goto and
                  Mitsuaki Akiyama},
  title        = {DomainScouter: Understanding the Risks of Deceptive IDNs},
  booktitle    = {22nd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September
                  23-25, 2019},
  pages        = {413--426},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/raid2019/presentation/chiba},
  timestamp    = {Wed, 10 Feb 2021 22:02:04 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/0001HKSGA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/AbdoMQZBA19,
  author       = {Ahmed Abdo and
                  Sakib Md. Bin Malek and
                  Zhiyun Qian and
                  Qi Zhu and
                  Matthew J. Barth and
                  Nael B. Abu{-}Ghazaleh},
  title        = {Application level attacks on Connected Vehicle Protocols},
  booktitle    = {22nd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September
                  23-25, 2019},
  pages        = {459--471},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/raid2019/presentation/abdo},
  timestamp    = {Mon, 22 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/AbdoMQZBA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Ali-GombeSCR19,
  author       = {Aisha I. Ali{-}Gombe and
                  Sneha Sudhakaran and
                  Andrew Case and
                  Golden G. Richard III},
  title        = {DroidScraper: {A} Tool for Android In-Memory Object Recovery and Reconstruction},
  booktitle    = {22nd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September
                  23-25, 2019},
  pages        = {547--559},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/raid2019/presentation/ali-gombe},
  timestamp    = {Wed, 10 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/Ali-GombeSCR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/AydayYY19,
  author       = {Erman Ayday and
                  Emre Yilmaz and
                  Arif Yilmaz},
  title        = {Robust Optimization-Based Watermarking Scheme for Sequential Data},
  booktitle    = {22nd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September
                  23-25, 2019},
  pages        = {323--336},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/raid2019/presentation/ayday},
  timestamp    = {Thu, 14 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/AydayYY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/AzarFKRHDGS19,
  author       = {Kimia Zamiri Azar and
                  Farnoud Farahmand and
                  Hadi Mardani Kamali and
                  Shervin Roshanisefat and
                  Houman Homayoun and
                  William Diehl and
                  Kris Gaj and
                  Avesta Sasan},
  title        = {{COMA:} Communication and Obfuscation Management Architecture},
  booktitle    = {22nd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September
                  23-25, 2019},
  pages        = {181--195},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/raid2019/presentation/azar},
  timestamp    = {Wed, 10 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/AzarFKRHDGS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BarronMN19,
  author       = {Timothy Barron and
                  Najmeh Miramirkhani and
                  Nick Nikiforakis},
  title        = {Now You See It, Now You Don't: {A} Large-scale Analysis of Early Domain
                  Deletions},
  booktitle    = {22nd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September
                  23-25, 2019},
  pages        = {383--397},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/raid2019/presentation/barron},
  timestamp    = {Wed, 10 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/BarronMN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/CaoYS0XH19,
  author       = {Jiahao Cao and
                  Zijie Yang and
                  Kun Sun and
                  Qi Li and
                  Mingwei Xu and
                  Peiyi Han},
  title        = {Fingerprinting {SDN} Applications via Encrypted Control Traffic},
  booktitle    = {22nd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September
                  23-25, 2019},
  pages        = {501--515},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/raid2019/presentation/cao},
  timestamp    = {Wed, 10 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/CaoYS0XH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ChengHLZLLR19,
  author       = {Zhen Cheng and
                  Xinrui Hou and
                  Runhuai Li and
                  Yajin Zhou and
                  Xiapu Luo and
                  Jinku Li and
                  Kui Ren},
  title        = {Towards a First Step to Understand the Cryptocurrency Stealing Attack
                  on Ethereum},
  booktitle    = {22nd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September
                  23-25, 2019},
  pages        = {47--60},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/raid2019/presentation/cheng},
  timestamp    = {Wed, 10 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/ChengHLZLLR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ChungLTZKIK19,
  author       = {Key{-}whan Chung and
                  Xiao Li and
                  Peicheng Tang and
                  Zeran Zhu and
                  Zbigniew T. Kalbarczyk and
                  Ravishankar K. Iyer and
                  Thenkurussi Kesavadas},
  title        = {Smart Malware that Uses Leaked Control Data of Robotic Applications:
                  The Case of Raven-II Surgical Robots},
  booktitle    = {22nd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September
                  23-25, 2019},
  pages        = {337--351},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/raid2019/presentation/chung},
  timestamp    = {Wed, 10 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/ChungLTZKIK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/DavanianQQY19,
  author       = {Ali Davanian and
                  Zhenxiao Qi and
                  Yu Qu and
                  Heng Yin},
  title        = {{DECAF++:} Elastic Whole-System Dynamic Taint Analysis},
  booktitle    = {22nd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September
                  23-25, 2019},
  pages        = {31--45},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/raid2019/presentation/davanian},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/DavanianQQY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/DiaoZZ0XPLWZ019,
  author       = {Wenrui Diao and
                  Yue Zhang and
                  Li Zhang and
                  Zhou Li and
                  Fenghao Xu and
                  Xiaorui Pan and
                  Xiangyu Liu and
                  Jian Weng and
                  Kehuan Zhang and
                  XiaoFeng Wang},
  title        = {Kindness is a Risky Business: On the Usage of the Accessibility APIs
                  in Android},
  booktitle    = {22nd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September
                  23-25, 2019},
  pages        = {261--275},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/raid2019/presentation/diao},
  timestamp    = {Wed, 10 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/DiaoZZ0XPLWZ019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/DuanGHY19,
  author       = {Yue Duan and
                  Lian Gao and
                  Jie Hu and
                  Heng Yin},
  title        = {Automatic Generation of Non-intrusive Updates for Third-Party Libraries
                  in Android Applications},
  booktitle    = {22nd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September
                  23-25, 2019},
  pages        = {277--292},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/raid2019/presentation/duan},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/DuanGHY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ErinfolamiQP19,
  author       = {Rukayat Ayomide Erinfolami and
                  Anh Quach and
                  Aravind Prakash},
  title        = {On Design Inference from Binaries Compiled using Modern {C++} Defenses},
  booktitle    = {22nd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September
                  23-25, 2019},
  pages        = {15--30},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/raid2019/presentation/erinfolami},
  timestamp    = {Wed, 10 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/ErinfolamiQP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GhaeiniCBBG0STZ19,
  author       = {Hamid Reza Ghaeini and
                  Matthew Chan and
                  Raad Bahmani and
                  Ferdinand Brasser and
                  Luis Garcia and
                  Jianying Zhou and
                  Ahmad{-}Reza Sadeghi and
                  Nils Ole Tippenhauer and
                  Saman A. Zonouz},
  title        = {PAtt: Physics-based Attestation of Control Systems},
  booktitle    = {22nd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September
                  23-25, 2019},
  pages        = {165--180},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/raid2019/presentation/ghaeini},
  timestamp    = {Mon, 17 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/GhaeiniCBBG0STZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GhietteGD19,
  author       = {Vincent Ghi{\"{e}}tte and
                  Harm Griffioen and
                  Christian Doerr},
  title        = {Fingerprinting Tooling used for {SSH} Compromisation Attempts},
  booktitle    = {22nd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September
                  23-25, 2019},
  pages        = {61--71},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/raid2019/presentation/ghiette},
  timestamp    = {Wed, 10 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/GhietteGD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GustafsonMSRMFB19,
  author       = {Eric Gustafson and
                  Marius Muench and
                  Chad Spensky and
                  Nilo Redini and
                  Aravind Machiry and
                  Yanick Fratantonio and
                  Davide Balzarotti and
                  Aur{\'{e}}lien Francillon and
                  Yung Ryn Choe and
                  Christopher Kruegel and
                  Giovanni Vigna},
  title        = {Toward the Analysis of Embedded Firmware through Automated Re-hosting},
  booktitle    = {22nd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September
                  23-25, 2019},
  pages        = {135--150},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/raid2019/presentation/gustafson},
  timestamp    = {Wed, 10 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/GustafsonMSRMFB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/IacovazziFE19,
  author       = {Alfonso Iacovazzi and
                  Daniel Frassinelli and
                  Yuval Elovici},
  title        = {The {DUSTER} Attack: Tor Onion Service Attribution Based on Flow Watermarking
                  with Track Hiding},
  booktitle    = {22nd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September
                  23-25, 2019},
  pages        = {213--225},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/raid2019/presentation/iacovazzi},
  timestamp    = {Wed, 10 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/IacovazziFE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/KharrazDB0K19,
  author       = {Amin Kharraz and
                  Brandon L. Daley and
                  Graham Z. Baker and
                  William Robertson and
                  Engin Kirda},
  title        = {{USBESAFE:} An End-Point Solution to Protect Against USB-Based Attacks},
  booktitle    = {22nd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September
                  23-25, 2019},
  pages        = {89--103},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/raid2019/presentation/kharraz},
  timestamp    = {Wed, 10 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/KharrazDB0K19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/LiD0RME19,
  author       = {Richard Li and
                  Min Du and
                  David Johnson and
                  Robert Ricci and
                  Jacobus E. van der Merwe and
                  Eric Eide},
  title        = {Fluorescence: Detecting Kernel-Resident Malware in Clouds},
  booktitle    = {22nd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September
                  23-25, 2019},
  pages        = {367--382},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/raid2019/presentation/li-richard},
  timestamp    = {Wed, 10 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/LiD0RME19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/LinN19,
  author       = {Chih{-}Yuan Lin and
                  Simin Nadjm{-}Tehrani},
  title        = {Timing Patterns and Correlations in Spontaneous {SCADA} Traffic for
                  Anomaly Detection},
  booktitle    = {22nd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September
                  23-25, 2019},
  pages        = {73--88},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/raid2019/presentation/lin},
  timestamp    = {Wed, 10 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/LinN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/LuoSXW19,
  author       = {Wu Luo and
                  Qingni Shen and
                  Yutang Xia and
                  Zhonghai Wu},
  title        = {Container-IMA: {A} privacy-preserving Integrity Measurement Architecture
                  for Containers},
  booktitle    = {22nd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September
                  23-25, 2019},
  pages        = {487--500},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/raid2019/presentation/luo},
  timestamp    = {Wed, 10 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/LuoSXW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/NisiBF19,
  author       = {Dario Nisi and
                  Antonio Bianchi and
                  Yanick Fratantonio},
  title        = {Exploring Syscall-Based Semantics Reconstruction of Android Applications},
  booktitle    = {22nd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September
                  23-25, 2019},
  pages        = {517--531},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/raid2019/presentation/nisi},
  timestamp    = {Wed, 10 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/NisiBF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/SaburCHKKV19,
  author       = {Abdulhakim Sabur and
                  Ankur Chowdhary and
                  Dijiang Huang and
                  Myong H. Kang and
                  Anya Kim and
                  Alexander Velazquez},
  title        = {{S3:} {A} DFW-based Scalable Security State Analysis Framework for
                  Large-Scale Data Center Networks},
  booktitle    = {22nd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September
                  23-25, 2019},
  pages        = {473--485},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/raid2019/presentation/sabur},
  timestamp    = {Wed, 10 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/SaburCHKKV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/SivanBS19,
  author       = {Nir Sivan and
                  Ron Bitton and
                  Asaf Shabtai},
  title        = {Analysis of Location Data Leakage in the Internet Traffic of Android-based
                  Mobile Devices},
  booktitle    = {22nd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September
                  23-25, 2019},
  pages        = {243--260},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/raid2019/presentation/sivan},
  timestamp    = {Wed, 10 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/SivanBS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/SolomosIIK19,
  author       = {Konstantinos Solomos and
                  Panagiotis Ilia and
                  Sotiris Ioannidis and
                  Nicolas Kourtellis},
  title        = {{TALON:} An Automated Framework for Cross-Device Tracking Detection},
  booktitle    = {22nd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September
                  23-25, 2019},
  pages        = {227--241},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/raid2019/presentation/solomos},
  timestamp    = {Wed, 10 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/SolomosIIK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/SongL19,
  author       = {Wei Song and
                  Peng Liu},
  title        = {Dynamically Finding Minimal Eviction Sets Can Be Quicker Than You
                  Think for Side-Channel Attacks against the {LLC}},
  booktitle    = {22nd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September
                  23-25, 2019},
  pages        = {427--442},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/raid2019/presentation/song},
  timestamp    = {Thu, 09 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/SongL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/SunTYLL19,
  author       = {Xiaoqing Sun and
                  Mingkai Tong and
                  Jiahai Yang and
                  Xinran Liu and
                  Heng Liu},
  title        = {HinDom: {A} Robust Malicious Domain Detection System based on Heterogeneous
                  Information Network with Transductive Classification},
  booktitle    = {22nd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September
                  23-25, 2019},
  pages        = {399--412},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/raid2019/presentation/sun},
  timestamp    = {Fri, 14 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/SunTYLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ToffaliniLB0C19,
  author       = {Flavio Toffalini and
                  Eleonora Losiouk and
                  Andrea Biondo and
                  Jianying Zhou and
                  Mauro Conti},
  title        = {ScaRR: Scalable Runtime Remote Attestation for Complex Systems},
  booktitle    = {22nd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September
                  23-25, 2019},
  pages        = {121--134},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/raid2019/presentation/toffalini},
  timestamp    = {Wed, 10 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/ToffaliniLB0C19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/TopleJS19,
  author       = {Shruti Tople and
                  Yaoqi Jia and
                  Prateek Saxena},
  title        = {{PRO-ORAM:} Practical Read-Only Oblivious {RAM}},
  booktitle    = {22nd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September
                  23-25, 2019},
  pages        = {197--211},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/raid2019/presentation/tople},
  timestamp    = {Wed, 10 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/TopleJS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/WangDSYS19,
  author       = {Jinghan Wang and
                  Yue Duan and
                  Wei Song and
                  Heng Yin and
                  Chengyu Song},
  title        = {Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics
                  in Greybox Fuzzing},
  booktitle    = {22nd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September
                  23-25, 2019},
  pages        = {1--15},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/raid2019/presentation/wang},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/WangDSYS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/WangMZLMMCG19,
  author       = {Jianqiang Wang and
                  Siqi Ma and
                  Yuanyuan Zhang and
                  Juanru Li and
                  Zheyu Ma and
                  Long Mai and
                  Tiancheng Chen and
                  Dawu Gu},
  title        = {{NLP-EYE:} Detecting Memory Corruptions via Semantic-Aware Memory
                  Operation Function Identification},
  booktitle    = {22nd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September
                  23-25, 2019},
  pages        = {309--321},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/raid2019/presentation/wang-0},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/WangMZLMMCG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/WangZL19,
  author       = {Wubing Wang and
                  Yinqian Zhang and
                  Zhiqiang Lin},
  title        = {Time and Order: Towards Automatically Identifying Side-Channel Vulnerabilities
                  in Enclave Binaries},
  booktitle    = {22nd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September
                  23-25, 2019},
  pages        = {443--457},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/raid2019/presentation/wang-wubing},
  timestamp    = {Wed, 10 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/WangZL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/WeiserMSG19,
  author       = {Samuel Weiser and
                  Luca Mayr and
                  Michael Schwarz and
                  Daniel Gruss},
  title        = {SGXJail: Defeating Enclave Malware via Confinement},
  booktitle    = {22nd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September
                  23-25, 2019},
  pages        = {353--366},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/raid2019/presentation/weiser},
  timestamp    = {Wed, 10 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/WeiserMSG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/YuanHY0Z19,
  author       = {Lun{-}Pin Yuan and
                  Wenjun Hu and
                  Ting Yu and
                  Peng Liu and
                  Sencun Zhu},
  title        = {Towards Large-Scale Hunting for Android Negative-Day Malware},
  booktitle    = {22nd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September
                  23-25, 2019},
  pages        = {533--545},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/raid2019/presentation/yuan},
  timestamp    = {Tue, 05 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/YuanHY0Z19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ZhangCDGWZ19,
  author       = {Li Zhang and
                  Jiongyi Chen and
                  Wenrui Diao and
                  Shanqing Guo and
                  Jian Weng and
                  Kehuan Zhang},
  title        = {CryptoREX: Large-scale Analysis of Cryptographic Misuse in IoT Devices},
  booktitle    = {22nd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September
                  23-25, 2019},
  pages        = {151--164},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/raid2019/presentation/zhang-li},
  timestamp    = {Wed, 10 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/ZhangCDGWZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ZhaoZQFF19,
  author       = {Shijun Zhao and
                  Qianying Zhang and
                  Yu Qin and
                  Wei Feng and
                  Dengguo Feng},
  title        = {Minimal Kernel: An Operating System Architecture for {TEE} to Resist
                  Board Level Physical Attacks},
  booktitle    = {22nd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September
                  23-25, 2019},
  pages        = {105--120},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/raid2019/presentation/zhao},
  timestamp    = {Wed, 10 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/ZhaoZQFF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ZuoYL019,
  author       = {Fei Zuo and
                  Bokai Yang and
                  Xiaopeng Li and
                  Qiang Zeng},
  title        = {Exploiting the Inherent Limitation of {L0} Adversarial Examples},
  booktitle    = {22nd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September
                  23-25, 2019},
  pages        = {293--307},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/raid2019/presentation/zuo},
  timestamp    = {Fri, 06 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ZuoYL019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/raid/2019,
  title        = {22nd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September
                  23-25, 2019},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/raid2019},
  timestamp    = {Wed, 10 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/0007MFS18,
  author       = {Jens M{\"{u}}ller and
                  Vladislav Mladenov and
                  Dennis Felsch and
                  J{\"{o}}rg Schwenk},
  editor       = {Michael D. Bailey and
                  Thorsten Holz and
                  Manolis Stamatogiannakis and
                  Sotiris Ioannidis},
  title        = {PostScript Undead: Pwning the Web with a 35 Years Old Language},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 21st International
                  Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11050},
  pages        = {603--622},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00470-5\_28},
  doi          = {10.1007/978-3-030-00470-5\_28},
  timestamp    = {Mon, 20 Nov 2023 09:00:29 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/0007MFS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/0017DG18,
  author       = {Kang Liu and
                  Brendan Dolan{-}Gavitt and
                  Siddharth Garg},
  editor       = {Michael D. Bailey and
                  Thorsten Holz and
                  Manolis Stamatogiannakis and
                  Sotiris Ioannidis},
  title        = {Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural
                  Networks},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 21st International
                  Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11050},
  pages        = {273--294},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00470-5\_13},
  doi          = {10.1007/978-3-030-00470-5\_13},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/0017DG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BellevilleMSHNJ18,
  author       = {Brian Belleville and
                  Hyungon Moon and
                  Jangseop Shin and
                  Dongil Hwang and
                  Joseph M. Nash and
                  Seonhwa Jung and
                  Yeoul Na and
                  Stijn Volckaert and
                  Per Larsen and
                  Yunheung Paek and
                  Michael Franz},
  editor       = {Michael D. Bailey and
                  Thorsten Holz and
                  Manolis Stamatogiannakis and
                  Sotiris Ioannidis},
  title        = {Hardware Assisted Randomization of Data},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 21st International
                  Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11050},
  pages        = {337--358},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00470-5\_16},
  doi          = {10.1007/978-3-030-00470-5\_16},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/BellevilleMSHNJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BockVMK18,
  author       = {Leon B{\"{o}}ck and
                  Emmanouil Vasilomanolakis and
                  Max M{\"{u}}hlh{\"{a}}user and
                  Shankar Karuppayah},
  editor       = {Michael D. Bailey and
                  Thorsten Holz and
                  Manolis Stamatogiannakis and
                  Sotiris Ioannidis},
  title        = {Next Generation {P2P} Botnets: Monitoring Under Adverse Conditions},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 21st International
                  Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11050},
  pages        = {511--531},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00470-5\_24},
  doi          = {10.1007/978-3-030-00470-5\_24},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/BockVMK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BrengelR18,
  author       = {Michael Brengel and
                  Christian Rossow},
  editor       = {Michael D. Bailey and
                  Thorsten Holz and
                  Manolis Stamatogiannakis and
                  Sotiris Ioannidis},
  title        = {Identifying Key Leakage of Bitcoin Users},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 21st International
                  Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11050},
  pages        = {623--643},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00470-5\_29},
  doi          = {10.1007/978-3-030-00470-5\_29},
  timestamp    = {Wed, 03 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/BrengelR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BushartR18,
  author       = {Jonas Bushart and
                  Christian Rossow},
  editor       = {Michael D. Bailey and
                  Thorsten Holz and
                  Manolis Stamatogiannakis and
                  Sotiris Ioannidis},
  title        = {{DNS} Unchained: Amplified Application-Layer DoS Attacks Against {DNS}
                  Authoritatives},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 21st International
                  Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11050},
  pages        = {139--160},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00470-5\_7},
  doi          = {10.1007/978-3-030-00470-5\_7},
  timestamp    = {Wed, 03 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/BushartR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BushouseR18,
  author       = {Micah Bushouse and
                  Douglas S. Reeves},
  editor       = {Michael D. Bailey and
                  Thorsten Holz and
                  Manolis Stamatogiannakis and
                  Sotiris Ioannidis},
  title        = {Furnace: Self-service Tenant {VMI} for the Cloud},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 21st International
                  Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11050},
  pages        = {647--669},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00470-5\_30},
  doi          = {10.1007/978-3-030-00470-5\_30},
  timestamp    = {Thu, 13 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/BushouseR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/CaoGZGLLLXL18,
  author       = {Chen Cao and
                  Le Guan and
                  Ning Zhang and
                  Neng Gao and
                  Jingqiang Lin and
                  Bo Luo and
                  Peng Liu and
                  Ji Xiang and
                  Wenjing Lou},
  editor       = {Michael D. Bailey and
                  Thorsten Holz and
                  Manolis Stamatogiannakis and
                  Sotiris Ioannidis},
  title        = {CryptMe: Data Leakage Prevention for Unmodified Programs on {ARM}
                  Devices},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 21st International
                  Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11050},
  pages        = {380--400},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00470-5\_18},
  doi          = {10.1007/978-3-030-00470-5\_18},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/CaoGZGLLLXL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/CristalliVBL18,
  author       = {Stefano Cristalli and
                  Edoardo Vignati and
                  Danilo Bruschi and
                  Andrea Lanzi},
  editor       = {Michael D. Bailey and
                  Thorsten Holz and
                  Manolis Stamatogiannakis and
                  Sotiris Ioannidis},
  title        = {Trusted Execution Path for Protecting Java Applications Against Deserialization
                  of Untrusted Data},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 21st International
                  Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11050},
  pages        = {445--464},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00470-5\_21},
  doi          = {10.1007/978-3-030-00470-5\_21},
  timestamp    = {Thu, 13 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/CristalliVBL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GasconUSR18,
  author       = {Hugo Gascon and
                  Steffen Ullrich and
                  Benjamin Stritter and
                  Konrad Rieck},
  editor       = {Michael D. Bailey and
                  Thorsten Holz and
                  Manolis Stamatogiannakis and
                  Sotiris Ioannidis},
  title        = {Reading Between the Lines: Content-Agnostic Detection of Spear-Phishing
                  Emails},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 21st International
                  Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11050},
  pages        = {69--91},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00470-5\_4},
  doi          = {10.1007/978-3-030-00470-5\_4},
  timestamp    = {Fri, 07 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/GasconUSR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/LettnerSPLVF18,
  author       = {Julian Lettner and
                  Dokyung Song and
                  Taemin Park and
                  Per Larsen and
                  Stijn Volckaert and
                  Michael Franz},
  editor       = {Michael D. Bailey and
                  Thorsten Holz and
                  Manolis Stamatogiannakis and
                  Sotiris Ioannidis},
  title        = {PartiSan: Fast and Flexible Sanitization via Run-Time Partitioning},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 21st International
                  Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11050},
  pages        = {403--422},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00470-5\_19},
  doi          = {10.1007/978-3-030-00470-5\_19},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/LettnerSPLVF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MehnazMB18,
  author       = {Shagufta Mehnaz and
                  Anand Mudgerikar and
                  Elisa Bertino},
  editor       = {Michael D. Bailey and
                  Thorsten Holz and
                  Manolis Stamatogiannakis and
                  Sotiris Ioannidis},
  title        = {RWGuard: {A} Real-Time Detection System Against Cryptographic Ransomware},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 21st International
                  Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11050},
  pages        = {114--136},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00470-5\_6},
  doi          = {10.1007/978-3-030-00470-5\_6},
  timestamp    = {Fri, 07 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/MehnazMB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MogosanuRD18,
  author       = {Lucian Mogosanu and
                  Ashay Rane and
                  Nathan Dautenhahn},
  editor       = {Michael D. Bailey and
                  Thorsten Holz and
                  Manolis Stamatogiannakis and
                  Sotiris Ioannidis},
  title        = {MicroStache: {A} Lightweight Execution Context for In-Process Safe
                  Region Isolation},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 21st International
                  Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11050},
  pages        = {359--379},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00470-5\_17},
  doi          = {10.1007/978-3-030-00470-5\_17},
  timestamp    = {Fri, 07 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/MogosanuRD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MorgnerPSB18,
  author       = {Philipp Morgner and
                  Stefan Pfennig and
                  Dennis Salzner and
                  Zinaida Benenson},
  editor       = {Michael D. Bailey and
                  Thorsten Holz and
                  Manolis Stamatogiannakis and
                  Sotiris Ioannidis},
  title        = {Malicious IoT Implants: Tampering with Serial Communication over the
                  Internet},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 21st International
                  Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11050},
  pages        = {535--555},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00470-5\_25},
  doi          = {10.1007/978-3-030-00470-5\_25},
  timestamp    = {Fri, 07 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/MorgnerPSB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MunteanFTLGE18,
  author       = {Paul Muntean and
                  Matthias Fischer and
                  Gang Tan and
                  Zhiqiang Lin and
                  Jens Grossklags and
                  Claudia Eckert},
  editor       = {Michael D. Bailey and
                  Thorsten Holz and
                  Manolis Stamatogiannakis and
                  Sotiris Ioannidis},
  title        = {{\(\tau\)}CFI: Type-Assisted Control Flow Integrity for x86-64 Binaries},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 21st International
                  Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11050},
  pages        = {423--444},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00470-5\_20},
  doi          = {10.1007/978-3-030-00470-5\_20},
  timestamp    = {Tue, 08 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/MunteanFTLGE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/PapadogiannakiH18,
  author       = {Eva Papadogiannaki and
                  Constantinos Halevidis and
                  Periklis Akritidis and
                  Lazaros Koromilas},
  editor       = {Michael D. Bailey and
                  Thorsten Holz and
                  Manolis Stamatogiannakis and
                  Sotiris Ioannidis},
  title        = {OTTer: {A} Scalable High-Resolution Encrypted Traffic Identification
                  Engine},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 21st International
                  Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11050},
  pages        = {315--334},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00470-5\_15},
  doi          = {10.1007/978-3-030-00470-5\_15},
  timestamp    = {Fri, 07 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/PapadogiannakiH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/PastranaHCB18,
  author       = {Sergio Pastrana and
                  Alice Hutchings and
                  Andrew Caines and
                  Paula Buttery},
  editor       = {Michael D. Bailey and
                  Thorsten Holz and
                  Manolis Stamatogiannakis and
                  Sotiris Ioannidis},
  title        = {Characterizing Eve: Analysing Cybercrime Actors in a Large Underground
                  Forum},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 21st International
                  Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11050},
  pages        = {207--227},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00470-5\_10},
  doi          = {10.1007/978-3-030-00470-5\_10},
  timestamp    = {Thu, 13 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/PastranaHCB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/PereiraCYCN18,
  author       = {Mayana Pereira and
                  Shaun Coleman and
                  Bin Yu and
                  Martine De Cock and
                  Anderson C. A. Nascimento},
  editor       = {Michael D. Bailey and
                  Thorsten Holz and
                  Manolis Stamatogiannakis and
                  Sotiris Ioannidis},
  title        = {Dictionary Extraction and Detection of Algorithmically Generated Domain
                  Names in Passive {DNS} Traffic},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 21st International
                  Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11050},
  pages        = {295--314},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00470-5\_14},
  doi          = {10.1007/978-3-030-00470-5\_14},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/PereiraCYCN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/RizzoCK18,
  author       = {Claudio Rizzo and
                  Lorenzo Cavallaro and
                  Johannes Kinder},
  editor       = {Michael D. Bailey and
                  Thorsten Holz and
                  Manolis Stamatogiannakis and
                  Sotiris Ioannidis},
  title        = {BabelView: Evaluating the Impact of Code Injection Attacks in Mobile
                  Webviews},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 21st International
                  Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11050},
  pages        = {25--46},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00470-5\_2},
  doi          = {10.1007/978-3-030-00470-5\_2},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/RizzoCK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/RosenbergSRE18,
  author       = {Ishai Rosenberg and
                  Asaf Shabtai and
                  Lior Rokach and
                  Yuval Elovici},
  editor       = {Michael D. Bailey and
                  Thorsten Holz and
                  Manolis Stamatogiannakis and
                  Sotiris Ioannidis},
  title        = {Generic Black-Box End-to-End Attack Against State of the Art {API}
                  Call Based Malware Classifiers},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 21st International
                  Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11050},
  pages        = {490--510},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00470-5\_23},
  doi          = {10.1007/978-3-030-00470-5\_23},
  timestamp    = {Fri, 07 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/RosenbergSRE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/SahinCE18,
  author       = {Onur Sahin and
                  Ayse K. Coskun and
                  Manuel Egele},
  editor       = {Michael D. Bailey and
                  Thorsten Holz and
                  Manolis Stamatogiannakis and
                  Sotiris Ioannidis},
  title        = {Proteus: Detecting Android Emulators from Instruction-Level Profiles},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 21st International
                  Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11050},
  pages        = {3--24},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00470-5\_1},
  doi          = {10.1007/978-3-030-00470-5\_1},
  timestamp    = {Tue, 23 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/SahinCE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ShiCLLHS18,
  author       = {Bin Shi and
                  Lei Cui and
                  Bo Li and
                  Xudong Liu and
                  Zhiyu Hao and
                  Haiying Shen},
  editor       = {Michael D. Bailey and
                  Thorsten Holz and
                  Manolis Stamatogiannakis and
                  Sotiris Ioannidis},
  title        = {ShadowMonitor: An Effective In-VM Monitoring Framework with Hardware-Enforced
                  Isolation},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 21st International
                  Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11050},
  pages        = {670--690},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00470-5\_31},
  doi          = {10.1007/978-3-030-00470-5\_31},
  timestamp    = {Mon, 06 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ShiCLLHS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/TatarGBR18,
  author       = {Andrei Tatar and
                  Cristiano Giuffrida and
                  Herbert Bos and
                  Kaveh Razavi},
  editor       = {Michael D. Bailey and
                  Thorsten Holz and
                  Manolis Stamatogiannakis and
                  Sotiris Ioannidis},
  title        = {Defeating Software Mitigations Against Rowhammer: {A} Surgical Precision
                  Hammer},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 21st International
                  Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11050},
  pages        = {47--66},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00470-5\_3},
  doi          = {10.1007/978-3-030-00470-5\_3},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/TatarGBR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ThomasF18,
  author       = {Sam L. Thomas and
                  Aur{\'{e}}lien Francillon},
  editor       = {Michael D. Bailey and
                  Thorsten Holz and
                  Manolis Stamatogiannakis and
                  Sotiris Ioannidis},
  title        = {Backdoors: Definition, Deniability and Detection},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 21st International
                  Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11050},
  pages        = {92--113},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00470-5\_5},
  doi          = {10.1007/978-3-030-00470-5\_5},
  timestamp    = {Fri, 07 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ThomasF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/UllrichSJDW18,
  author       = {Johanna Ullrich and
                  Nicholas Stifter and
                  Aljosha Judmayer and
                  Adrian Dabrowski and
                  Edgar R. Weippl},
  editor       = {Michael D. Bailey and
                  Thorsten Holz and
                  Manolis Stamatogiannakis and
                  Sotiris Ioannidis},
  title        = {Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Could Affect
                  Power Grids},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 21st International
                  Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11050},
  pages        = {184--203},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00470-5\_9},
  doi          = {10.1007/978-3-030-00470-5\_9},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/UllrichSJDW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/VervierS18,
  author       = {Pierre{-}Antoine Vervier and
                  Yun Shen},
  editor       = {Michael D. Bailey and
                  Thorsten Holz and
                  Manolis Stamatogiannakis and
                  Sotiris Ioannidis},
  title        = {Before Toasters Rise Up: {A} View into the Emerging IoT Threat Landscape},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 21st International
                  Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11050},
  pages        = {556--576},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00470-5\_26},
  doi          = {10.1007/978-3-030-00470-5\_26},
  timestamp    = {Fri, 07 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/VervierS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/WangZG18,
  author       = {Binghui Wang and
                  Le Zhang and
                  Neil Zhenqiang Gong},
  editor       = {Michael D. Bailey and
                  Thorsten Holz and
                  Manolis Stamatogiannakis and
                  Sotiris Ioannidis},
  title        = {SybilBlind: Detecting Fake Users in Online Social Networks Without
                  Manual Labels},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 21st International
                  Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11050},
  pages        = {228--249},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00470-5\_11},
  doi          = {10.1007/978-3-030-00470-5\_11},
  timestamp    = {Thu, 10 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/WangZG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/WooM18,
  author       = {Simon S. Woo and
                  Jelena Mirkovic},
  editor       = {Michael D. Bailey and
                  Thorsten Holz and
                  Manolis Stamatogiannakis and
                  Sotiris Ioannidis},
  title        = {GuidedPass: Helping Users to Create Strong and Memorable Passwords},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 21st International
                  Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11050},
  pages        = {250--270},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00470-5\_12},
  doi          = {10.1007/978-3-030-00470-5\_12},
  timestamp    = {Fri, 07 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/WooM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/YunHLAK18,
  author       = {Jeong{-}Han Yun and
                  Yoonho Hwang and
                  Woomyo Lee and
                  Hee{-}Kap Ahn and
                  Sin{-}Kyu Kim},
  editor       = {Michael D. Bailey and
                  Thorsten Holz and
                  Manolis Stamatogiannakis and
                  Sotiris Ioannidis},
  title        = {Statistical Similarity of Critical Infrastructure Network Traffic
                  Based on Nearest Neighbor Distances},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 21st International
                  Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11050},
  pages        = {577--599},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00470-5\_27},
  doi          = {10.1007/978-3-030-00470-5\_27},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/YunHLAK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ZhangCNLSR18,
  author       = {Zhi Zhang and
                  Yueqiang Cheng and
                  Surya Nepal and
                  Dongxi Liu and
                  Qingni Shen and
                  Fethi A. Rabhi},
  editor       = {Michael D. Bailey and
                  Thorsten Holz and
                  Manolis Stamatogiannakis and
                  Sotiris Ioannidis},
  title        = {{KASR:} {A} Reliable and Practical Approach to Attack Surface Reduction
                  of Commodity {OS} Kernels},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 21st International
                  Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11050},
  pages        = {691--710},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00470-5\_32},
  doi          = {10.1007/978-3-030-00470-5\_32},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ZhangCNLSR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ZhangJGS018,
  author       = {Jialong Zhang and
                  Jiyong Jang and
                  Guofei Gu and
                  Marc Ph. Stoecklin and
                  Xin Hu},
  editor       = {Michael D. Bailey and
                  Thorsten Holz and
                  Manolis Stamatogiannakis and
                  Sotiris Ioannidis},
  title        = {Error-Sensor: Mining Information from {HTTP} Error Traffic for Malware
                  Intelligence},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 21st International
                  Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11050},
  pages        = {467--489},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00470-5\_22},
  doi          = {10.1007/978-3-030-00470-5\_22},
  timestamp    = {Fri, 07 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ZhangJGS018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ZhangLXBGB18,
  author       = {Menghao Zhang and
                  Guanyu Li and
                  Lei Xu and
                  Jun Bi and
                  Guofei Gu and
                  Jiasong Bai},
  editor       = {Michael D. Bailey and
                  Thorsten Holz and
                  Manolis Stamatogiannakis and
                  Sotiris Ioannidis},
  title        = {Control Plane Reflection Attacks in SDNs: New Attacks and Countermeasures},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 21st International
                  Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11050},
  pages        = {161--183},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00470-5\_8},
  doi          = {10.1007/978-3-030-00470-5\_8},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/ZhangLXBGB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/raid/2018,
  editor       = {Michael D. Bailey and
                  Thorsten Holz and
                  Manolis Stamatogiannakis and
                  Sotiris Ioannidis},
  title        = {Research in Attacks, Intrusions, and Defenses - 21st International
                  Symposium, {RAID} 2018, Heraklion, Crete, Greece, September 10-12,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11050},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00470-5},
  doi          = {10.1007/978-3-030-00470-5},
  isbn         = {978-3-030-00469-9},
  timestamp    = {Mon, 20 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/AlepisP17,
  author       = {Efthimios Alepis and
                  Constantinos Patsakis},
  editor       = {Marc Dacier and
                  Michael D. Bailey and
                  Michalis Polychronakis and
                  Manos Antonakakis},
  title        = {Trapped by the {UI:} The Android Case},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 20th International
                  Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10453},
  pages        = {334--354},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66332-6\_15},
  doi          = {10.1007/978-3-319-66332-6\_15},
  timestamp    = {Mon, 20 Nov 2023 09:00:29 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/AlepisP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BeaugnonCB17,
  author       = {Ana{\"{e}}l Beaugnon and
                  Pierre Chifflier and
                  Francis R. Bach},
  editor       = {Marc Dacier and
                  Michael D. Bailey and
                  Michalis Polychronakis and
                  Manos Antonakakis},
  title        = {{ILAB:} An Interactive Labelling Strategy for Intrusion Detection},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 20th International
                  Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10453},
  pages        = {120--140},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66332-6\_6},
  doi          = {10.1007/978-3-319-66332-6\_6},
  timestamp    = {Mon, 09 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/BeaugnonCB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BuyukkayhanOLR17,
  author       = {Ahmet Salih Buyukkayhan and
                  Alina Oprea and
                  Zhou Li and
                  William K. Robertson},
  editor       = {Marc Dacier and
                  Michael D. Bailey and
                  Michalis Polychronakis and
                  Manos Antonakakis},
  title        = {Lens on the Endpoint: Hunting for Malicious Software Through Endpoint
                  Data Analysis},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 20th International
                  Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10453},
  pages        = {73--97},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66332-6\_4},
  doi          = {10.1007/978-3-319-66332-6\_4},
  timestamp    = {Mon, 03 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/BuyukkayhanOLR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ChenK017,
  author       = {Yue Chen and
                  Mustakimur Khandaker and
                  Zhi Wang},
  editor       = {Marc Dacier and
                  Michael D. Bailey and
                  Michalis Polychronakis and
                  Manos Antonakakis},
  title        = {Secure In-Cache Execution},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 20th International
                  Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10453},
  pages        = {381--402},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66332-6\_17},
  doi          = {10.1007/978-3-319-66332-6\_17},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ChenK017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ChenLMWWZ17,
  author       = {Kai Chen and
                  Tongxin Li and
                  Bin Ma and
                  Peng Wang and
                  XiaoFeng Wang and
                  Peiyuan Zong},
  editor       = {Marc Dacier and
                  Michael D. Bailey and
                  Michalis Polychronakis and
                  Manos Antonakakis},
  title        = {Filtering for Malice Through the Data Ocean: Large-Scale {PHA} Install
                  Detection at the Communication Service Provider Level},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 20th International
                  Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10453},
  pages        = {167--191},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66332-6\_8},
  doi          = {10.1007/978-3-319-66332-6\_8},
  timestamp    = {Wed, 15 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/ChenLMWWZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ElsabaghFSKB17,
  author       = {Mohamed Elsabagh and
                  Dan Fleck and
                  Angelos Stavrou and
                  Michael Kaplan and
                  Thomas Bowen},
  editor       = {Marc Dacier and
                  Michael D. Bailey and
                  Michalis Polychronakis and
                  Manos Antonakakis},
  title        = {Practical and Accurate Runtime Application Protection Against DoS
                  Attacks},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 20th International
                  Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10453},
  pages        = {450--471},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66332-6\_20},
  doi          = {10.1007/978-3-319-66332-6\_20},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ElsabaghFSKB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/FereidooniCSPMS17,
  author       = {Hossein Fereidooni and
                  Jiska Classen and
                  Tom Spink and
                  Paul Patras and
                  Markus Miettinen and
                  Ahmad{-}Reza Sadeghi and
                  Matthias Hollick and
                  Mauro Conti},
  editor       = {Marc Dacier and
                  Michael D. Bailey and
                  Michalis Polychronakis and
                  Manos Antonakakis},
  title        = {Breaking Fitness Records Without Moving: Reverse Engineering and Spoofing
                  Fitbit},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 20th International
                  Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10453},
  pages        = {48--69},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66332-6\_3},
  doi          = {10.1007/978-3-319-66332-6\_3},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/FereidooniCSPMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/FuBQL17,
  author       = {Yangchun Fu and
                  Erick Bauman and
                  Raul Quinonez and
                  Zhiqiang Lin},
  editor       = {Marc Dacier and
                  Michael D. Bailey and
                  Michalis Polychronakis and
                  Manos Antonakakis},
  title        = {Sgx-Lapd: Thwarting Controlled Side Channel Attacks via Enclave Verifiable
                  Page Faults},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 20th International
                  Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10453},
  pages        = {357--380},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66332-6\_16},
  doi          = {10.1007/978-3-319-66332-6\_16},
  timestamp    = {Wed, 18 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/FuBQL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GensASLJS17,
  author       = {David Gens and
                  Orlando Arias and
                  Dean Sullivan and
                  Christopher Liebchen and
                  Yier Jin and
                  Ahmad{-}Reza Sadeghi},
  editor       = {Marc Dacier and
                  Michael D. Bailey and
                  Michalis Polychronakis and
                  Manos Antonakakis},
  title        = {{LAZARUS:} Practical Side-Channel Resilient Kernel-Space Randomization},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 20th International
                  Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10453},
  pages        = {238--258},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66332-6\_11},
  doi          = {10.1007/978-3-319-66332-6\_11},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/GensASLJS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/HendersonYJH017,
  author       = {Andrew Henderson and
                  Heng Yin and
                  Guang Jin and
                  Hao Han and
                  Hongmei Deng},
  editor       = {Marc Dacier and
                  Michael D. Bailey and
                  Michalis Polychronakis and
                  Manos Antonakakis},
  title        = {{VDF:} Targeted Evolutionary Fuzz Testing of Virtual Devices},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 20th International
                  Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10453},
  pages        = {3--25},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66332-6\_1},
  doi          = {10.1007/978-3-319-66332-6\_1},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/HendersonYJH017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/JeroBNOSF17,
  author       = {Samuel Jero and
                  Xiangyu Bu and
                  Cristina Nita{-}Rotaru and
                  Hamed Okhravi and
                  Richard Skowyra and
                  Sonia Fahmy},
  editor       = {Marc Dacier and
                  Michael D. Bailey and
                  Michalis Polychronakis and
                  Manos Antonakakis},
  title        = {{BEADS:} Automated Attack Discovery in OpenFlow-Based {SDN} Systems},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 20th International
                  Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10453},
  pages        = {311--333},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66332-6\_14},
  doi          = {10.1007/978-3-319-66332-6\_14},
  timestamp    = {Wed, 19 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/JeroBNOSF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/KawakoyaSOIY17,
  author       = {Yuhei Kawakoya and
                  Eitaro Shioji and
                  Yuto Otsuki and
                  Makoto Iwamura and
                  Takeshi Yada},
  editor       = {Marc Dacier and
                  Michael D. Bailey and
                  Michalis Polychronakis and
                  Manos Antonakakis},
  title        = {Stealth Loader: Trace-Free Program Loading for {API} Obfuscation},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 20th International
                  Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10453},
  pages        = {217--237},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66332-6\_10},
  doi          = {10.1007/978-3-319-66332-6\_10},
  timestamp    = {Wed, 18 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/KawakoyaSOIY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/KharrazK17,
  author       = {Amin Kharraz and
                  Engin Kirda},
  editor       = {Marc Dacier and
                  Michael D. Bailey and
                  Michalis Polychronakis and
                  Manos Antonakakis},
  title        = {Redemption: Real-Time Protection Against Ransomware at End-Hosts},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 20th International
                  Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10453},
  pages        = {98--119},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66332-6\_5},
  doi          = {10.1007/978-3-319-66332-6\_5},
  timestamp    = {Wed, 18 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/KharrazK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/KruppKRM017,
  author       = {Johannes Krupp and
                  Mohammad Karami and
                  Christian Rossow and
                  Damon McCoy and
                  Michael Backes},
  editor       = {Marc Dacier and
                  Michael D. Bailey and
                  Michalis Polychronakis and
                  Manos Antonakakis},
  title        = {Linking Amplification DDoS Attacks to Booter Services},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 20th International
                  Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10453},
  pages        = {427--449},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66332-6\_19},
  doi          = {10.1007/978-3-319-66332-6\_19},
  timestamp    = {Wed, 18 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/KruppKRM017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/LeachZW17,
  author       = {Kevin Leach and
                  Fengwei Zhang and
                  Westley Weimer},
  editor       = {Marc Dacier and
                  Michael D. Bailey and
                  Michalis Polychronakis and
                  Manos Antonakakis},
  title        = {Scotch: Combining Software Guard Extensions and System Management
                  Mode to Monitor Cloud Resource Usage},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 20th International
                  Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10453},
  pages        = {403--424},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66332-6\_18},
  doi          = {10.1007/978-3-319-66332-6\_18},
  timestamp    = {Wed, 18 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/LeachZW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/LiJHO17,
  author       = {Yuping Li and
                  Jiyong Jang and
                  Xin Hu and
                  Xinming Ou},
  editor       = {Marc Dacier and
                  Michael D. Bailey and
                  Michalis Polychronakis and
                  Manos Antonakakis},
  title        = {Android Malware Clustering Through Malicious Payload Mining},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 20th International
                  Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10453},
  pages        = {192--214},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66332-6\_9},
  doi          = {10.1007/978-3-319-66332-6\_9},
  timestamp    = {Thu, 14 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/LiJHO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/NymanEDA17,
  author       = {Thomas Nyman and
                  Jan{-}Erik Ekberg and
                  Lucas Davi and
                  N. Asokan},
  editor       = {Marc Dacier and
                  Michael D. Bailey and
                  Michalis Polychronakis and
                  Manos Antonakakis},
  title        = {{CFI} CaRE: Hardware-Supported Call and Return Enforcement for Commercial
                  Microcontrollers},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 20th International
                  Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10453},
  pages        = {259--284},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66332-6\_12},
  doi          = {10.1007/978-3-319-66332-6\_12},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/NymanEDA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ShastryLFTYRSSF17,
  author       = {Bhargava Shastry and
                  Markus Leutner and
                  Tobias Fiebig and
                  Kashyap Thimmaraju and
                  Fabian Yamaguchi and
                  Konrad Rieck and
                  Stefan Schmid and
                  Jean{-}Pierre Seifert and
                  Anja Feldmann},
  editor       = {Marc Dacier and
                  Michael D. Bailey and
                  Michalis Polychronakis and
                  Manos Antonakakis},
  title        = {Static Program Analysis as a Fuzzing Aid},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 20th International
                  Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10453},
  pages        = {26--47},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66332-6\_2},
  doi          = {10.1007/978-3-319-66332-6\_2},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ShastryLFTYRSSF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/TahirHDAGZCB17,
  author       = {Rashid Tahir and
                  Muhammad Huzaifa and
                  Anupam Das and
                  Mohammad Ahmad and
                  Carl A. Gunter and
                  Fareed Zaffar and
                  Matthew Caesar and
                  Nikita Borisov},
  editor       = {Marc Dacier and
                  Michael D. Bailey and
                  Michalis Polychronakis and
                  Manos Antonakakis},
  title        = {Mining on Someone Else's Dime: Mitigating Covert Mining Operations
                  in Clouds and Enterprises},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 20th International
                  Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10453},
  pages        = {287--310},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66332-6\_13},
  doi          = {10.1007/978-3-319-66332-6\_13},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/TahirHDAGZCB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/VissersSAJJWPJD17,
  author       = {Thomas Vissers and
                  Jan Spooren and
                  Pieter Agten and
                  Dirk Jumpertz and
                  Peter Janssen and
                  Marc Van Wesemael and
                  Frank Piessens and
                  Wouter Joosen and
                  Lieven Desmet},
  editor       = {Marc Dacier and
                  Michael D. Bailey and
                  Michalis Polychronakis and
                  Manos Antonakakis},
  title        = {Exploring the Ecosystem of Malicious Domain Registrations in the .eu
                  {TLD}},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 20th International
                  Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10453},
  pages        = {472--493},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66332-6\_21},
  doi          = {10.1007/978-3-319-66332-6\_21},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/VissersSAJJWPJD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/YangMZG17,
  author       = {Guangliang Yang and
                  Abner Mendoza and
                  Jialong Zhang and
                  Guofei Gu},
  editor       = {Marc Dacier and
                  Michael D. Bailey and
                  Michalis Polychronakis and
                  Manos Antonakakis},
  title        = {Precisely and Scalably Vetting JavaScript Bridge in Android Hybrid
                  Apps},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 20th International
                  Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10453},
  pages        = {143--166},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66332-6\_7},
  doi          = {10.1007/978-3-319-66332-6\_7},
  timestamp    = {Thu, 11 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/YangMZG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/raid/2017,
  editor       = {Marc Dacier and
                  Michael D. Bailey and
                  Michalis Polychronakis and
                  Manos Antonakakis},
  title        = {Research in Attacks, Intrusions, and Defenses - 20th International
                  Symposium, {RAID} 2017, Atlanta, GA, USA, September 18-20, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10453},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66332-6},
  doi          = {10.1007/978-3-319-66332-6},
  isbn         = {978-3-319-66331-9},
  timestamp    = {Mon, 20 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/0001HRRSS16,
  author       = {Michael Backes and
                  Thorsten Holz and
                  Christian Rossow and
                  Teemu Rytilahti and
                  Milivoj Simeonovski and
                  Ben Stock},
  editor       = {Fabian Monrose and
                  Marc Dacier and
                  Gregory Blanc and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {On the Feasibility of TTL-Based Filtering for DRDoS Mitigation},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 19th International
                  Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9854},
  pages        = {303--322},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45719-2\_14},
  doi          = {10.1007/978-3-319-45719-2\_14},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/0001HRRSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ArshadKR16,
  author       = {Sajjad Arshad and
                  Amin Kharraz and
                  William Robertson},
  editor       = {Fabian Monrose and
                  Marc Dacier and
                  Gregory Blanc and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Identifying Extension-Based Ad Injection via Fine-Grained Web Content
                  Provenance},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 19th International
                  Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9854},
  pages        = {415--436},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45719-2\_19},
  doi          = {10.1007/978-3-319-45719-2\_19},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ArshadKR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BlackthorneKY16,
  author       = {Jeremy Blackthorne and
                  Benjamin Kaiser and
                  B{\"{u}}lent Yener},
  editor       = {Fabian Monrose and
                  Marc Dacier and
                  Gregory Blanc and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {A Formal Framework for Environmentally Sensitive Malware},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 19th International
                  Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9854},
  pages        = {211--229},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45719-2\_10},
  doi          = {10.1007/978-3-319-45719-2\_10},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/BlackthorneKY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BozzatoFPS16,
  author       = {Claudio Bozzato and
                  Riccardo Focardi and
                  Francesco Palmarini and
                  Graham Steel},
  editor       = {Fabian Monrose and
                  Marc Dacier and
                  Gregory Blanc and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {APDU-Level Attacks in PKCS{\#}11 Devices},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 19th International
                  Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9854},
  pages        = {97--117},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45719-2\_5},
  doi          = {10.1007/978-3-319-45719-2\_5},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/BozzatoFPS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/CallejaTC16,
  author       = {Alejandro Calleja and
                  Juan E. Tapiador and
                  Juan Caballero},
  editor       = {Fabian Monrose and
                  Marc Dacier and
                  Gregory Blanc and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {A Look into 30 Years of Malware Development from a Software Metrics
                  Perspective},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 19th International
                  Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9854},
  pages        = {325--345},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45719-2\_15},
  doi          = {10.1007/978-3-319-45719-2\_15},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/CallejaTC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/DabrowskiPW16,
  author       = {Adrian Dabrowski and
                  Georg Petzl and
                  Edgar R. Weippl},
  editor       = {Fabian Monrose and
                  Marc Dacier and
                  Gregory Blanc and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {The Messenger Shoots Back: Network Operator Based {IMSI} Catcher Detection},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 19th International
                  Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9854},
  pages        = {279--302},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45719-2\_13},
  doi          = {10.1007/978-3-319-45719-2\_13},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/DabrowskiPW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/FuRLL0J16,
  author       = {Yangchun Fu and
                  Junghwan Rhee and
                  Zhiqiang Lin and
                  Zhichun Li and
                  Hui Zhang and
                  Guofei Jiang},
  editor       = {Fabian Monrose and
                  Marc Dacier and
                  Gregory Blanc and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Detecting Stack Layout Corruptions with Robust Stack Unwinding},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 19th International
                  Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9854},
  pages        = {71--94},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45719-2\_4},
  doi          = {10.1007/978-3-319-45719-2\_4},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/FuRLL0J16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/HuPWZCY16,
  author       = {Xunchao Hu and
                  Aravind Prakash and
                  Jinghan Wang and
                  Rundong Zhou and
                  Yao Cheng and
                  Heng Yin},
  editor       = {Fabian Monrose and
                  Marc Dacier and
                  Gregory Blanc and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Semantics-Preserving Dissection of JavaScript Exploits via Dynamic
                  JS-Binary Analysis},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 19th International
                  Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9854},
  pages        = {254--276},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45719-2\_12},
  doi          = {10.1007/978-3-319-45719-2\_12},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/HuPWZCY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/KoromilasVAI16,
  author       = {Lazaros Koromilas and
                  Giorgos Vasiliadis and
                  Elias Athanasopoulos and
                  Sotiris Ioannidis},
  editor       = {Fabian Monrose and
                  Marc Dacier and
                  Gregory Blanc and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {{GRIM:} Leveraging GPUs for Kernel Integrity Monitoring},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 19th International
                  Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9854},
  pages        = {3--23},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45719-2\_1},
  doi          = {10.1007/978-3-319-45719-2\_1},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/KoromilasVAI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/KountourasKLCND16,
  author       = {Athanasios Kountouras and
                  Panagiotis Kintis and
                  Chaz Lever and
                  Yizheng Chen and
                  Yacin Nadji and
                  David Dagon and
                  Manos Antonakakis and
                  Rodney Joffe},
  editor       = {Fabian Monrose and
                  Marc Dacier and
                  Gregory Blanc and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Enabling Network Security Through Active {DNS} Datasets},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 19th International
                  Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9854},
  pages        = {188--208},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45719-2\_9},
  doi          = {10.1007/978-3-319-45719-2\_9},
  timestamp    = {Thu, 27 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/KountourasKLCND16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MambrettiOMRKMZ16,
  author       = {Andrea Mambretti and
                  Kaan Onarlioglu and
                  Collin Mulliner and
                  William Robertson and
                  Engin Kirda and
                  Federico Maggi and
                  Stefano Zanero},
  editor       = {Fabian Monrose and
                  Marc Dacier and
                  Gregory Blanc and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Trellis: Privilege Separation for Multi-user Applications Made Easy},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 19th International
                  Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9854},
  pages        = {437--456},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45719-2\_20},
  doi          = {10.1007/978-3-319-45719-2\_20},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/MambrettiOMRKMZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MuenchPSKVB16,
  author       = {Marius Muench and
                  Fabio Pagani and
                  Yan Shoshitaishvili and
                  Christopher Kruegel and
                  Giovanni Vigna and
                  Davide Balzarotti},
  editor       = {Fabian Monrose and
                  Marc Dacier and
                  Gregory Blanc and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Taming Transactions: Towards Hardware-Assisted Control Flow Integrity
                  Using Transactional Memory},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 19th International
                  Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9854},
  pages        = {24--48},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45719-2\_2},
  doi          = {10.1007/978-3-319-45719-2\_2},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/MuenchPSKVB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/NoroozianKGMYE16,
  author       = {Arman Noroozian and
                  Maciej Korczynski and
                  Carlos Hernandez Ga{\~{n}}{\'{a}}n and
                  Daisuke Makita and
                  Katsunari Yoshioka and
                  Michel van Eeten},
  editor       = {Fabian Monrose and
                  Marc Dacier and
                  Gregory Blanc and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Who Gets the Boot? Analyzing Victimization by DDoS-as-a-Service},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 19th International
                  Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9854},
  pages        = {368--389},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45719-2\_17},
  doi          = {10.1007/978-3-319-45719-2\_17},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/NoroozianKGMYE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/PellegrinoCBR16,
  author       = {Giancarlo Pellegrino and
                  Onur Catakoglu and
                  Davide Balzarotti and
                  Christian Rossow},
  editor       = {Fabian Monrose and
                  Marc Dacier and
                  Gregory Blanc and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Uses and Abuses of Server-Side Requests},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 19th International
                  Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9854},
  pages        = {393--414},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45719-2\_18},
  doi          = {10.1007/978-3-319-45719-2\_18},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/PellegrinoCBR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/SebastianRKC16,
  author       = {Marcos Sebasti{\'{a}}n and
                  Richard Rivera and
                  Platon Kotzias and
                  Juan Caballero},
  editor       = {Fabian Monrose and
                  Marc Dacier and
                  Gregory Blanc and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {AVclass: {A} Tool for Massive Malware Labeling},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 19th International
                  Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9854},
  pages        = {230--253},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45719-2\_11},
  doi          = {10.1007/978-3-319-45719-2\_11},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/SebastianRKC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/SunLZ16,
  author       = {Mingshen Sun and
                  John C. S. Lui and
                  Yajin Zhou},
  editor       = {Fabian Monrose and
                  Marc Dacier and
                  Gregory Blanc and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Blender: Self-randomizing Address Space Layout for Android Apps},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 19th International
                  Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9854},
  pages        = {457--480},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45719-2\_21},
  doi          = {10.1007/978-3-319-45719-2\_21},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/SunLZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ThomasABFHBBB16,
  author       = {Kurt Thomas and
                  Rony Amira and
                  Adi Ben{-}Yoash and
                  Ori Folger and
                  Amir Hardon and
                  Ari Berger and
                  Elie Bursztein and
                  Michael D. Bailey},
  editor       = {Fabian Monrose and
                  Marc Dacier and
                  Gregory Blanc and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {The Abuse Sharing Economy: Understanding the Limits of Threat Exchanges},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 19th International
                  Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9854},
  pages        = {143--164},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45719-2\_7},
  doi          = {10.1007/978-3-319-45719-2\_7},
  timestamp    = {Mon, 20 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/ThomasABFHBBB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/YokoyamaITPYMKI16,
  author       = {Akira Yokoyama and
                  Kou Ishii and
                  Rui Tanabe and
                  Yinmin Papa and
                  Katsunari Yoshioka and
                  Tsutomu Matsumoto and
                  Takahiro Kasama and
                  Daisuke Inoue and
                  Michael Brengel and
                  Michael Backes and
                  Christian Rossow},
  editor       = {Fabian Monrose and
                  Marc Dacier and
                  Gregory Blanc and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence
                  for Sandbox Evasion},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 19th International
                  Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9854},
  pages        = {165--187},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45719-2\_8},
  doi          = {10.1007/978-3-319-45719-2\_8},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/YokoyamaITPYMKI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ZengFL16,
  author       = {Junyuan Zeng and
                  Yangchun Fu and
                  Zhiqiang Lin},
  editor       = {Fabian Monrose and
                  Marc Dacier and
                  Gregory Blanc and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Automatic Uncovering of Tap Points from Kernel Executions},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 19th International
                  Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9854},
  pages        = {49--70},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45719-2\_3},
  doi          = {10.1007/978-3-319-45719-2\_3},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ZengFL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ZhangZL16,
  author       = {Tianwei Zhang and
                  Yinqian Zhang and
                  Ruby B. Lee},
  editor       = {Fabian Monrose and
                  Marc Dacier and
                  Gregory Blanc and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {CloudRadar: {A} Real-Time Side-Channel Attack Detection System in
                  Clouds},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 19th International
                  Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9854},
  pages        = {118--140},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45719-2\_6},
  doi          = {10.1007/978-3-319-45719-2\_6},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ZhangZL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ZhauniarovichG16,
  author       = {Yury Zhauniarovich and
                  Olga Gadyatskaya},
  editor       = {Fabian Monrose and
                  Marc Dacier and
                  Gregory Blanc and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Small Changes, Big Changes: An Updated View on the Android Permission
                  System},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 19th International
                  Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9854},
  pages        = {346--367},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45719-2\_16},
  doi          = {10.1007/978-3-319-45719-2\_16},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ZhauniarovichG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/raid/2016,
  editor       = {Fabian Monrose and
                  Marc Dacier and
                  Gregory Blanc and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Research in Attacks, Intrusions, and Defenses - 19th International
                  Symposium, {RAID} 2016, Paris, France, September 19-21, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9854},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45719-2},
  doi          = {10.1007/978-3-319-45719-2},
  isbn         = {978-3-319-45718-5},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/AmannS15,
  author       = {Johanna Amann and
                  Robin Sommer},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {Providing Dynamic Control to Passive Network Security Monitoring},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {133--152},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_7},
  doi          = {10.1007/978-3-319-26362-5\_7},
  timestamp    = {Sun, 25 Oct 2020 22:56:09 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/AmannS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/AndronioZM15,
  author       = {Nicol{\'{o}} Andronio and
                  Stefano Zanero and
                  Federico Maggi},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {HelDroid: Dissecting and Detecting Mobile Ransomware},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {382--404},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_18},
  doi          = {10.1007/978-3-319-26362-5\_18},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/AndronioZM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BaraboschDYG15,
  author       = {Thomas Barabosch and
                  Adrian Dombeck and
                  Khaled Yakdan and
                  Elmar Gerhards{-}Padilla},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {BotWatcher - Transparent and Generic Botnet Tracking},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {565--587},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_26},
  doi          = {10.1007/978-3-319-26362-5\_26},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/BaraboschDYG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ChenBWBP15,
  author       = {Yangyi Chen and
                  Vincent Bindschaedler and
                  XiaoFeng Wang and
                  Stefan Berger and
                  Dimitrios E. Pendarakis},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {Elite: Automatic Orchestration of Elastic Detection Services to Secure
                  Cloud Hosting},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {588--614},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_27},
  doi          = {10.1007/978-3-319-26362-5\_27},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ChenBWBP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ElsabaghBFS15,
  author       = {Mohamed Elsabagh and
                  Daniel Barbar{\'{a}} and
                  Dan Fleck and
                  Angelos Stavrou},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {Radmin: Early Detection of Application-Level Resource Exhaustion and
                  Starvation Attacks},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {515--537},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_24},
  doi          = {10.1007/978-3-319-26362-5\_24},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ElsabaghBFS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GerdesM15,
  author       = {Ryan M. Gerdes and
                  Saptarshi Mallick},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {Physical-Layer Detection of Hardware Keyloggers},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {26--47},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_2},
  doi          = {10.1007/978-3-319-26362-5\_2},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/GerdesM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/JacquemartVUB15,
  author       = {Quentin Jacquemart and
                  Pierre{-}Antoine Vervier and
                  Guillaume Urvoy{-}Keller and
                  Ernst W. Biersack},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {Demystifying the {IP} Blackspace},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {111--132},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_6},
  doi          = {10.1007/978-3-319-26362-5\_6},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/JacquemartVUB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/KhasawnehODAP15,
  author       = {Khaled N. Khasawneh and
                  Meltem Ozsoy and
                  Caleb Donovick and
                  Nael B. Abu{-}Ghazaleh and
                  Dmitry V. Ponomarev},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {Ensemble Learning for Low-Level Hardware-Supported Malware Detection},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {3--25},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_1},
  doi          = {10.1007/978-3-319-26362-5\_1},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/KhasawnehODAP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/KittelVKE15,
  author       = {Thomas Kittel and
                  Sebastian Vogl and
                  Julian Kirsch and
                  Claudia Eckert},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {Counteracting Data-Only Malware with Code Pointer Examination},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {177--197},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_9},
  doi          = {10.1007/978-3-319-26362-5\_9},
  timestamp    = {Fri, 15 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/KittelVKE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/KramerKMNKYR15,
  author       = {Lukas Kr{\"{a}}mer and
                  Johannes Krupp and
                  Daisuke Makita and
                  Tomomi Nishizoe and
                  Takashi Koide and
                  Katsunari Yoshioka and
                  Christian Rossow},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {AmpPot: Monitoring and Defending Against Amplification DDoS Attacks},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {615--636},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_28},
  doi          = {10.1007/978-3-319-26362-5\_28},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/KramerKMNKYR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MaoCTG15,
  author       = {Weixuan Mao and
                  Zhongmin Cai and
                  Don Towsley and
                  Xiaohong Guan},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {Probabilistic Inference on Integrity for Access Behavior Based Malware
                  Detection},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {155--176},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_8},
  doi          = {10.1007/978-3-319-26362-5\_8},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/MaoCTG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MauriceSNHF15,
  author       = {Cl{\'{e}}mentine Maurice and
                  Nicolas Le Scouarnec and
                  Christoph Neumann and
                  Olivier Heen and
                  Aur{\'{e}}lien Francillon},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {Reverse Engineering Intel Last-Level Cache Complex Addressing Using
                  Performance Counters},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {48--65},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_3},
  doi          = {10.1007/978-3-319-26362-5\_3},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/MauriceSNHF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MilenkoskiPAVKA15,
  author       = {Aleksandar Milenkoski and
                  Bryan D. Payne and
                  Nuno Antunes and
                  Marco Vieira and
                  Samuel Kounev and
                  Alberto Avritzer and
                  Matthias Luft},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {Evaluation of Intrusion Detection Systems in Virtualized Environments
                  Using Attack Injection},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {471--492},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_22},
  doi          = {10.1007/978-3-319-26362-5\_22},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/MilenkoskiPAVKA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MurmuriaSBF15,
  author       = {Rahul Murmuria and
                  Angelos Stavrou and
                  Daniel Barbar{\'{a}} and
                  Dan Fleck},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {Continuous Authentication on Mobile Devices Using Power Consumption,
                  Touch Gestures and Physical Movement of Users},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {405--424},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_19},
  doi          = {10.1007/978-3-319-26362-5\_19},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/MurmuriaSBF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/NamJCHP15,
  author       = {Jaehyun Nam and
                  Muhammad Jamshed and
                  Byungkwon Choi and
                  Dongsu Han and
                  KyoungSoo Park},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {Haetae: Scaling the Performance of Network Intrusion Detection with
                  Many-Core Processors},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {89--110},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_5},
  doi          = {10.1007/978-3-319-26362-5\_5},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/NamJCHP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/NieSLWYHF15,
  author       = {Meining Nie and
                  Purui Su and
                  Qi Li and
                  Zhi Wang and
                  Lingyun Ying and
                  Jinlong Hu and
                  Dengguo Feng},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {Xede: Practical Exploit Early Detection},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {198--221},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_10},
  doi          = {10.1007/978-3-319-26362-5\_10},
  timestamp    = {Wed, 24 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/NieSLWYHF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/PellegrinoTBR15,
  author       = {Giancarlo Pellegrino and
                  Constantin Tsch{\"{u}}rtz and
                  Eric Bodden and
                  Christian Rossow},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {j{\"{A}}k: Using Dynamic Analysis to Crawl and Test Modern Web
                  Applications},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {295--316},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_14},
  doi          = {10.1007/978-3-319-26362-5\_14},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/PellegrinoTBR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/RopkeH15,
  author       = {Christian R{\"{o}}pke and
                  Thorsten Holz},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {{SDN} Rootkits: Subverting Network Operating Systems of Software-Defined
                  Networks},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {339--356},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_16},
  doi          = {10.1007/978-3-319-26362-5\_16},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/RopkeH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ShuYR15,
  author       = {Xiaokui Shu and
                  Danfeng (Daphne) Yao and
                  Barbara G. Ryder},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {A Formal Framework for Program Anomaly Detection},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {270--292},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_13},
  doi          = {10.1007/978-3-319-26362-5\_13},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ShuYR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/SmutzS15,
  author       = {Charles Smutz and
                  Angelos Stavrou},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {Preventing Exploits in Microsoft Office Documents Through Content
                  Randomization},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {225--246},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_11},
  doi          = {10.1007/978-3-319-26362-5\_11},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/SmutzS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/UllrichW15,
  author       = {Johanna Ullrich and
                  Edgar R. Weippl},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {Privacy is Not an Option: Attacking the IPv6 Privacy Extension},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {448--468},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_21},
  doi          = {10.1007/978-3-319-26362-5\_21},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/UllrichW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/WeisserDH15,
  author       = {Dario Wei{\ss}er and
                  Johannes Dahse and
                  Thorsten Holz},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {Security Analysis of {PHP} Bytecode Protection Mechanisms},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {493--514},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_23},
  doi          = {10.1007/978-3-319-26362-5\_23},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/WeisserDH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/XuWS15,
  author       = {Haitao Xu and
                  Haining Wang and
                  Angelos Stavrou},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {Privacy Risk Assessment on Online Photos},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {427--447},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_20},
  doi          = {10.1007/978-3-319-26362-5\_20},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/XuWS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/YangDP15,
  author       = {Qilang Yang and
                  Dimitrios Damopoulos and
                  Georgios Portokalidis},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {{WYSISNWIV:} What You Scan Is Not What {I} Visit},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {317--338},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_15},
  doi          = {10.1007/978-3-319-26362-5\_15},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/YangDP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/YangZLSLHG15,
  author       = {Wenbo Yang and
                  Yuanyuan Zhang and
                  Juanru Li and
                  Junliang Shu and
                  Bodong Li and
                  Wenjun Hu and
                  Dawu Gu},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {AppSpear: Bytecode Decrypting and {DEX} Reassembling for Packed Android
                  Malware},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {359--381},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_17},
  doi          = {10.1007/978-3-319-26362-5\_17},
  timestamp    = {Wed, 21 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/YangZLSLHG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/YuanZD15,
  author       = {Pinghai Yuan and
                  Qingkai Zeng and
                  Xuhua Ding},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {Hardware-Assisted Fine-Grained Code-Reuse Attack Detection},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {66--85},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_4},
  doi          = {10.1007/978-3-319-26362-5\_4},
  timestamp    = {Mon, 19 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/YuanZD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ZengL15,
  author       = {Junyuan Zeng and
                  Zhiqiang Lin},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {Towards Automatic Inference of Kernel Object Semantics from Binary
                  Code},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {538--561},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_25},
  doi          = {10.1007/978-3-319-26362-5\_25},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ZengL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ZhangSDCZFF15,
  author       = {Yang Zhang and
                  Xiaoshan Sun and
                  Yi Deng and
                  Liang Cheng and
                  Shuke Zeng and
                  Yu Fu and
                  Dengguo Feng},
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {Improving Accuracy of Static Integer Overflow Detection in Binary},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  pages        = {247--269},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5\_12},
  doi          = {10.1007/978-3-319-26362-5\_12},
  timestamp    = {Wed, 11 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/ZhangSDCZFF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/raid/2015,
  editor       = {Herbert Bos and
                  Fabian Monrose and
                  Gregory Blanc},
  title        = {Research in Attacks, Intrusions, and Defenses - 18th International
                  Symposium, {RAID} 2015, Kyoto, Japan, November 2-4, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9404},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26362-5},
  doi          = {10.1007/978-3-319-26362-5},
  isbn         = {978-3-319-26361-8},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/AbbasiWBZE14,
  author       = {Ali Abbasi and
                  Jos Wetzels and
                  Wouter Bokslag and
                  Emmanuele Zambon and
                  Sandro Etalle},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {On Emulation-Based Network Intrusion Detection Systems},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {384--404},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_19},
  doi          = {10.1007/978-3-319-11379-1\_19},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/AbbasiWBZE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/AmannHS14,
  author       = {Johanna Amann and
                  Seth Hall and
                  Robin Sommer},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {Count Me In: Viable Distributed Summary Statistics for Securing High-Speed
                  Networks},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {320--340},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_16},
  doi          = {10.1007/978-3-319-11379-1\_16},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/AmannHS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ApececheaIES14,
  author       = {Gorka Irazoqui Apecechea and
                  Mehmet Sinan Inci and
                  Thomas Eisenbarth and
                  Berk Sunar},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {Wait a Minute! {A} fast, Cross-VM Attack on {AES}},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {299--319},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_15},
  doi          = {10.1007/978-3-319-11379-1\_15},
  timestamp    = {Fri, 08 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/ApececheaIES14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BoggsDS14,
  author       = {Nathaniel Boggs and
                  Senyao Du and
                  Salvatore J. Stolfo},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {Measuring Drive-by Download Defense in Depth},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {172--191},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_9},
  doi          = {10.1007/978-3-319-11379-1\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/BoggsDS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BoggsZDS14,
  author       = {Nathaniel Boggs and
                  Hang Zhao and
                  Senyao Du and
                  Salvatore J. Stolfo},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {Synthetic Data Generation and Defense in Depth Measurement of Web
                  Applications},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {234--254},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_12},
  doi          = {10.1007/978-3-319-11379-1\_12},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/BoggsZDS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BowersHJT14,
  author       = {Kevin D. Bowers and
                  Catherine Hart and
                  Ari Juels and
                  Nikos Triandopoulos},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {PillarBox: Combating Next-Generation Malware with Fast Forward-Secure
                  Logging},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {46--67},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_3},
  doi          = {10.1007/978-3-319-11379-1\_3},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/BowersHJT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BudiantoJDSL14,
  author       = {Enrico Budianto and
                  Yaoqi Jia and
                  Xinshu Dong and
                  Prateek Saxena and
                  Zhenkai Liang},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {You Can't Be Me: Enabling Trusted Paths and User Sub-origins in Web
                  Browsers},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {150--171},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_8},
  doi          = {10.1007/978-3-319-11379-1\_8},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/BudiantoJDSL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/CaminaRM14,
  author       = {Jos{\'{e}} Benito Cami{\~{n}}a and
                  Jorge Rodr{\'{\i}}guez{-}Ruiz and
                  Ra{\'{u}}l Monroy},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {Towards a Masquerade Detection System Based on User's Tasks},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {447--465},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_22},
  doi          = {10.1007/978-3-319-11379-1\_22},
  timestamp    = {Fri, 06 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/CaminaRM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/CaoSBKVC14,
  author       = {Yinzhi Cao and
                  Yan Shoshitaishvili and
                  Kevin Borgolte and
                  Christopher Kr{\"{u}}gel and
                  Giovanni Vigna and
                  Yan Chen},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {Protecting Web-Based Single Sign-on Protocols against Relying Party
                  Impersonation Attacks through a Dedicated Bi-directional Authenticated
                  Secure Channel},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {276--298},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_14},
  doi          = {10.1007/978-3-319-11379-1\_14},
  timestamp    = {Fri, 20 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/CaoSBKVC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/CorbettaIKV14,
  author       = {Jacopo Corbetta and
                  Luca Invernizzi and
                  Christopher Kr{\"{u}}gel and
                  Giovanni Vigna},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {Eyes of a Human, Eyes of a Program: Leveraging Different Views of
                  the Web for Analysis and Detection},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {130--149},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_7},
  doi          = {10.1007/978-3-319-11379-1\_7},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/CorbettaIKV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/HendaN14,
  author       = {Noomene Ben Henda and
                  Karl Norrman},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {Formal Analysis of Security Procedures in {LTE} - {A} Feasibility
                  Study},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {341--361},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_17},
  doi          = {10.1007/978-3-319-11379-1\_17},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/HendaN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/KhanAH14,
  author       = {Hassan Khan and
                  Aaron Atwater and
                  Urs Hengartner},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {A Comparative Evaluation of Implicit Authentication Schemes},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {255--275},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_13},
  doi          = {10.1007/978-3-319-11379-1\_13},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/KhanAH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/KuhrerRH14,
  author       = {Marc K{\"{u}}hrer and
                  Christian Rossow and
                  Thorsten Holz},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {Paint It Black: Evaluating the Effectiveness of Malware Blacklists},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {1--21},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_1},
  doi          = {10.1007/978-3-319-11379-1\_1},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/KuhrerRH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Kumar14,
  author       = {Apurva Kumar},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {A Lightweight Formal Approach for Analyzing Security of Web Protocols},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {192--211},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_10},
  doi          = {10.1007/978-3-319-11379-1\_10},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/Kumar14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/LeeCKSK14,
  author       = {Il{-}Gu Lee and
                  Hyunwoo Choi and
                  Yongdae Kim and
                  Seungwon Shin and
                  Myungchul Kim},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {Run Away If You Can: - Persistent Jamming Attacks against Channel
                  Hopping Wi-Fi Devices in Dense Networks},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {362--383},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_18},
  doi          = {10.1007/978-3-319-11379-1\_18},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/LeeCKSK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/NayakMED14,
  author       = {Kartik Nayak and
                  Daniel Marino and
                  Petros Efstathopoulos and
                  Tudor Dumitras},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {Some Vulnerabilities Are Different Than Others - Studying Vulnerabilities
                  and Attack Surfaces in the Wild},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {426--446},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_21},
  doi          = {10.1007/978-3-319-11379-1\_21},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/NayakMED14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/OkhraviRC14,
  author       = {Hamed Okhravi and
                  James Riordan and
                  Kevin M. Carter},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {Quantitative Evaluation of Dynamic Platform Techniques as a Defensive
                  Mechanism},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {405--425},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_20},
  doi          = {10.1007/978-3-319-11379-1\_20},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/OkhraviRC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/PappasPK14,
  author       = {Vasilis Pappas and
                  Michalis Polychronakis and
                  Angelos D. Keromytis},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {Dynamic Reconstruction of Relocation Information for Stripped Binaries},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {68--87},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_4},
  doi          = {10.1007/978-3-319-11379-1\_4},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/PappasPK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/SchusterTPMSCH14,
  author       = {Felix Schuster and
                  Thomas Tendyck and
                  Jannik Pewny and
                  Andreas Maa{\ss} and
                  Martin Steegmanns and
                  Moritz Contag and
                  Thorsten Holz},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {Evaluating the Effectiveness of Current Anti-ROP Defenses},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {88--108},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_5},
  doi          = {10.1007/978-3-319-11379-1\_5},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/SchusterTPMSCH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/TangSS14,
  author       = {Adrian Tang and
                  Simha Sethumadhavan and
                  Salvatore J. Stolfo},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {Unsupervised Anomaly-Based Malware Detection Using Hardware Features},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {109--129},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_6},
  doi          = {10.1007/978-3-319-11379-1\_6},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/TangSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/WeissbacherLR14,
  author       = {Michael Weissbacher and
                  Tobias Lauinger and
                  William K. Robertson},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {Why Is {CSP} Failing? Trends and Challenges in {CSP} Adoption},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {212--233},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_11},
  doi          = {10.1007/978-3-319-11379-1\_11},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/WeissbacherLR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/XuZGL14,
  author       = {Zhaoyan Xu and
                  Jialong Zhang and
                  Guofei Gu and
                  Zhiqiang Lin},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {GoldenEye: Efficiently and Effectively Unveiling Malware's Targeted
                  Environment},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {22--45},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_2},
  doi          = {10.1007/978-3-319-11379-1\_2},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/XuZGL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/raid/2014,
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1},
  doi          = {10.1007/978-3-319-11379-1},
  isbn         = {978-3-319-11378-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/AkiyamaYAHK13,
  author       = {Mitsuaki Akiyama and
                  Takeshi Yagi and
                  Kazufumi Aoki and
                  Takeo Hariu and
                  Youki Kadobayashi},
  editor       = {Salvatore J. Stolfo and
                  Angelos Stavrou and
                  Charles V. Wright},
  title        = {Active Credential Leakage for Observing Web-Based Attack Cycle},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 16th International
                  Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8145},
  pages        = {223--243},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41284-4\_12},
  doi          = {10.1007/978-3-642-41284-4\_12},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/AkiyamaYAHK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BuenoCSB13,
  author       = {Denis Bueno and
                  Kevin J. Compton and
                  Karem A. Sakallah and
                  Michael D. Bailey},
  editor       = {Salvatore J. Stolfo and
                  Angelos Stavrou and
                  Charles V. Wright},
  title        = {Detecting Traditional Packers, Decisively},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 16th International
                  Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8145},
  pages        = {184--203},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41284-4\_10},
  doi          = {10.1007/978-3-642-41284-4\_10},
  timestamp    = {Mon, 20 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/BuenoCSB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/EggerSKV13,
  author       = {Christoph Egger and
                  Johannes Schlumberger and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Salvatore J. Stolfo and
                  Angelos Stavrou and
                  Charles V. Wright},
  title        = {Practical Attacks against the {I2P} Network},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 16th International
                  Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8145},
  pages        = {432--451},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41284-4\_22},
  doi          = {10.1007/978-3-642-41284-4\_22},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/EggerSKV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/FritzLP13,
  author       = {Jakob Fritz and
                  Corrado Leita and
                  Michalis Polychronakis},
  editor       = {Salvatore J. Stolfo and
                  Angelos Stavrou and
                  Charles V. Wright},
  title        = {Server-Side Code Injection Attacks: {A} Historical Perspective},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 16th International
                  Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8145},
  pages        = {41--61},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41284-4\_3},
  doi          = {10.1007/978-3-642-41284-4\_3},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/FritzLP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GrazianoLB13,
  author       = {Mariano Graziano and
                  Andrea Lanzi and
                  Davide Balzarotti},
  editor       = {Salvatore J. Stolfo and
                  Angelos Stavrou and
                  Charles V. Wright},
  title        = {Hypervisor Memory Forensics},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 16th International
                  Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8145},
  pages        = {21--40},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41284-4\_2},
  doi          = {10.1007/978-3-642-41284-4\_2},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/GrazianoLB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/HoffmannNH13,
  author       = {Johannes Hoffmann and
                  Stephan Neumann and
                  Thorsten Holz},
  editor       = {Salvatore J. Stolfo and
                  Angelos Stavrou and
                  Charles V. Wright},
  title        = {Mobile Malware Detection Based on Energy Fingerprints - {A} Dead End?},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 16th International
                  Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8145},
  pages        = {348--368},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41284-4\_18},
  doi          = {10.1007/978-3-642-41284-4\_18},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/HoffmannNH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Jiang0SZ13,
  author       = {Nan Jiang and
                  Yu Jin and
                  Ann Skudlark and
                  Zhi{-}Li Zhang},
  editor       = {Salvatore J. Stolfo and
                  Angelos Stavrou and
                  Charles V. Wright},
  title        = {Understanding {SMS} Spam in a Large Cellular Network: Characteristics,
                  Strategies and Defenses},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 16th International
                  Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8145},
  pages        = {328--347},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41284-4\_17},
  doi          = {10.1007/978-3-642-41284-4\_17},
  timestamp    = {Wed, 27 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/Jiang0SZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/JohnsL13,
  author       = {Martin Johns and
                  Sebastian Lekies},
  editor       = {Salvatore J. Stolfo and
                  Angelos Stavrou and
                  Charles V. Wright},
  title        = {Tamper-Resistant LikeJacking Protection},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 16th International
                  Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8145},
  pages        = {265--285},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41284-4\_14},
  doi          = {10.1007/978-3-642-41284-4\_14},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/JohnsL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/KawakoyaISH13,
  author       = {Yuhei Kawakoya and
                  Makoto Iwamura and
                  Eitaro Shioji and
                  Takeo Hariu},
  editor       = {Salvatore J. Stolfo and
                  Angelos Stavrou and
                  Charles V. Wright},
  title        = {{API} Chaser: Anti-analysis Resistant Malware Analyzer},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 16th International
                  Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8145},
  pages        = {123--143},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41284-4\_7},
  doi          = {10.1007/978-3-642-41284-4\_7},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/KawakoyaISH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/LauingerOAKRK13,
  author       = {Tobias Lauinger and
                  Kaan Onarlioglu and
                  Chaabane Abdelberi and
                  Engin Kirda and
                  William K. Robertson and
                  Mohamed Ali K{\^{a}}afar},
  editor       = {Salvatore J. Stolfo and
                  Angelos Stavrou and
                  Charles V. Wright},
  title        = {Holiday Pictures or Blockbuster Movies? Insights into Copyright Infringement
                  in User Uploads to One-Click File Hosters},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 16th International
                  Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8145},
  pages        = {369--389},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41284-4\_19},
  doi          = {10.1007/978-3-642-41284-4\_19},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/LauingerOAKRK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/NadjiAPL13,
  author       = {Yacin Nadji and
                  Manos Antonakakis and
                  Roberto Perdisci and
                  Wenke Lee},
  editor       = {Salvatore J. Stolfo and
                  Angelos Stavrou and
                  Charles V. Wright},
  title        = {Connected Colors: Unveiling the Structure of Criminal Networks},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 16th International
                  Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8145},
  pages        = {390--410},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41284-4\_20},
  doi          = {10.1007/978-3-642-41284-4\_20},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/NadjiAPL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/OswaldRP13,
  author       = {David F. Oswald and
                  Bastian Richter and
                  Christof Paar},
  editor       = {Salvatore J. Stolfo and
                  Angelos Stavrou and
                  Charles V. Wright},
  title        = {Side-Channel Attacks on the Yubikey 2 One-Time Password Generator},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 16th International
                  Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8145},
  pages        = {204--222},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41284-4\_11},
  doi          = {10.1007/978-3-642-41284-4\_11},
  timestamp    = {Mon, 10 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/OswaldRP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/PappasKZPK13,
  author       = {Vasilis Pappas and
                  Vasileios P. Kemerlis and
                  Angeliki Zavou and
                  Michalis Polychronakis and
                  Angelos D. Keromytis},
  editor       = {Salvatore J. Stolfo and
                  Angelos Stavrou and
                  Charles V. Wright},
  title        = {CloudFence: Data Flow Tracking as a Cloud Service},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 16th International
                  Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8145},
  pages        = {411--431},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41284-4\_21},
  doi          = {10.1007/978-3-642-41284-4\_21},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/PappasKZPK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/RafiqueC13,
  author       = {M. Zubair Rafique and
                  Juan Caballero},
  editor       = {Salvatore J. Stolfo and
                  Angelos Stavrou and
                  Charles V. Wright},
  title        = {{FIRMA:} Malware Clustering and Network Signature Generation with
                  Mixed Network Behaviors},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 16th International
                  Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8145},
  pages        = {144--163},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41284-4\_8},
  doi          = {10.1007/978-3-642-41284-4\_8},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/RafiqueC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Singh13,
  author       = {Kapil Singh},
  editor       = {Salvatore J. Stolfo and
                  Angelos Stavrou and
                  Charles V. Wright},
  title        = {Practical Context-Aware Permission Control for Hybrid Mobile Applications},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 16th International
                  Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8145},
  pages        = {307--327},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41284-4\_16},
  doi          = {10.1007/978-3-642-41284-4\_16},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/Singh13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/SkowyraCOZS13,
  author       = {Richard Skowyra and
                  Kelly Casteel and
                  Hamed Okhravi and
                  Nickolai Zeldovich and
                  William W. Streilein},
  editor       = {Salvatore J. Stolfo and
                  Angelos Stavrou and
                  Charles V. Wright},
  title        = {Systematic Analysis of Defenses against Return-Oriented Programming},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 16th International
                  Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8145},
  pages        = {82--102},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41284-4\_5},
  doi          = {10.1007/978-3-642-41284-4\_5},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/SkowyraCOZS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/StancillSOMDS13,
  author       = {Blaine Stancill and
                  Kevin Z. Snow and
                  Nathan Otterness and
                  Fabian Monrose and
                  Lucas Davi and
                  Ahmad{-}Reza Sadeghi},
  editor       = {Salvatore J. Stolfo and
                  Angelos Stavrou and
                  Charles V. Wright},
  title        = {Check My Profile: Leveraging Static Analysis for Fast and Accurate
                  Detection of {ROP} Gadgets},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 16th International
                  Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8145},
  pages        = {62--81},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41284-4\_4},
  doi          = {10.1007/978-3-642-41284-4\_4},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/StancillSOMDS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Stewin13,
  author       = {Patrick Stewin},
  editor       = {Salvatore J. Stolfo and
                  Angelos Stavrou and
                  Charles V. Wright},
  title        = {A Primitive for Revealing Stealthy Peripheral-Based Attacks on the
                  Computing Platform's Main Memory},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 16th International
                  Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8145},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41284-4\_1},
  doi          = {10.1007/978-3-642-41284-4\_1},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/Stewin13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ViswanathanTN13,
  author       = {Arun Viswanathan and
                  Kymie Tan and
                  Clifford Neuman},
  editor       = {Salvatore J. Stolfo and
                  Angelos Stavrou and
                  Charles V. Wright},
  title        = {Deconstructing the Assessment of Anomaly-based Intrusion Detectors},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 16th International
                  Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8145},
  pages        = {286--306},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41284-4\_15},
  doi          = {10.1007/978-3-642-41284-4\_15},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ViswanathanTN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/WressneggerBR13,
  author       = {Christian Wressnegger and
                  Frank Boldewin and
                  Konrad Rieck},
  editor       = {Salvatore J. Stolfo and
                  Angelos Stavrou and
                  Charles V. Wright},
  title        = {Deobfuscating Embedded Malware Using Probable-Plaintext Attacks},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 16th International
                  Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8145},
  pages        = {164--183},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41284-4\_9},
  doi          = {10.1007/978-3-642-41284-4\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/WressneggerBR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Xiong013,
  author       = {Xi Xiong and
                  Peng Liu},
  editor       = {Salvatore J. Stolfo and
                  Angelos Stavrou and
                  Charles V. Wright},
  title        = {{SILVER:} Fine-Grained and Transparent Protection Domain Primitives
                  in Commodity {OS} Kernel},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 16th International
                  Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8145},
  pages        = {103--122},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41284-4\_6},
  doi          = {10.1007/978-3-642-41284-4\_6},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/Xiong013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ZhaoL13,
  author       = {Bin Zhao and
                  Peng Liu},
  editor       = {Salvatore J. Stolfo and
                  Angelos Stavrou and
                  Charles V. Wright},
  title        = {Behavior Decomposition: Aspect-Level Browser Extension Clustering
                  and Its Security Implications},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 16th International
                  Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8145},
  pages        = {244--264},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41284-4\_13},
  doi          = {10.1007/978-3-642-41284-4\_13},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ZhaoL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/raid/2013,
  editor       = {Salvatore J. Stolfo and
                  Angelos Stavrou and
                  Charles V. Wright},
  title        = {Research in Attacks, Intrusions, and Defenses - 16th International
                  Symposium, {RAID} 2013, Rodney Bay, St. Lucia, October 23-25, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8145},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41284-4},
  doi          = {10.1007/978-3-642-41284-4},
  isbn         = {978-3-642-41283-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/AhnL12,
  author       = {Dongkyun Ahn and
                  Gyungho Lee},
  editor       = {Davide Balzarotti and
                  Salvatore J. Stolfo and
                  Marco Cova},
  title        = {A Memory Access Validation Scheme against Payload Injection Attacks},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 15th International
                  Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7462},
  pages        = {107--126},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33338-5\_6},
  doi          = {10.1007/978-3-642-33338-5\_6},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/AhnL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/AmannSSH12,
  author       = {B. Amann and
                  Robin Sommer and
                  Aashish Sharma and
                  Seth Hall},
  editor       = {Davide Balzarotti and
                  Salvatore J. Stolfo and
                  Marco Cova},
  title        = {A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time
                  Intelligence},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 15th International
                  Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7462},
  pages        = {314--333},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33338-5\_16},
  doi          = {10.1007/978-3-642-33338-5\_16},
  timestamp    = {Thu, 08 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/AmannSSH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/CarboneCML12,
  author       = {Martim Carbone and
                  Matthew Conover and
                  Bruce Montague and
                  Wenke Lee},
  editor       = {Davide Balzarotti and
                  Salvatore J. Stolfo and
                  Marco Cova},
  title        = {Secure and Robust Monitoring of Virtual Machines through Guest-Assisted
                  Introspection},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 15th International
                  Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7462},
  pages        = {22--41},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33338-5\_2},
  doi          = {10.1007/978-3-642-33338-5\_2},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/CarboneCML12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ChuGHJYY12,
  author       = {Jie Chu and
                  Zihui Ge and
                  Richard Huber and
                  Ping Ji and
                  Jennifer Yates and
                  Yung{-}Chao Yu},
  editor       = {Davide Balzarotti and
                  Salvatore J. Stolfo and
                  Marco Cova},
  title        = {{ALERT-ID:} Analyze Logs of the Network Element in Real Time for Intrusion
                  Detection},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 15th International
                  Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7462},
  pages        = {294--313},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33338-5\_15},
  doi          = {10.1007/978-3-642-33338-5\_15},
  timestamp    = {Tue, 25 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ChuGHJYY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/CuiSLL12,
  author       = {Xiang Cui and
                  Jinqiao Shi and
                  Peng Liao and
                  Chaoge Liu},
  editor       = {Davide Balzarotti and
                  Salvatore J. Stolfo and
                  Marco Cova},
  title        = {The Triple-Channel Model: Toward Robust and Efficient Advanced Botnets
                  (Poster Abstract)},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 15th International
                  Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7462},
  pages        = {376--377},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33338-5\_20},
  doi          = {10.1007/978-3-642-33338-5\_20},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/CuiSLL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/DurfinaKZK12,
  author       = {Luk{\'{a}}s Durfina and
                  Jakub Kroustek and
                  Petr Zemek and
                  Bretislav K{\'{a}}bele},
  editor       = {Davide Balzarotti and
                  Salvatore J. Stolfo and
                  Marco Cova},
  title        = {Accurate Recovery of Functions in a Retargetable Decompiler(Poster
                  Abstract)},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 15th International
                  Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7462},
  pages        = {390--392},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33338-5\_27},
  doi          = {10.1007/978-3-642-33338-5\_27},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/DurfinaKZK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Garcia-VillalbaCOP12,
  author       = {Luis Javier Garc{\'{\i}}a{-}Villalba and
                  Jaime Daniel Mej{\'{\i}}a Castro and
                  Ana Lucila Sandoval Orozco and
                  Javier Mart{\'{\i}}nez Puentes},
  editor       = {Davide Balzarotti and
                  Salvatore J. Stolfo and
                  Marco Cova},
  title        = {Malware Detection System by Payload Analysis of Network Traffic (Poster
                  Abstract)},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 15th International
                  Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7462},
  pages        = {397--398},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33338-5\_30},
  doi          = {10.1007/978-3-642-33338-5\_30},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/Garcia-VillalbaCOP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/HadziosmanovicSBZE12,
  author       = {Dina Hadziosmanovic and
                  Lorenzo Simionato and
                  Damiano Bolzoni and
                  Emmanuele Zambon and
                  Sandro Etalle},
  editor       = {Davide Balzarotti and
                  Salvatore J. Stolfo and
                  Marco Cova},
  title        = {N-Gram against the Machine: On the Feasibility of the N-Gram Network
                  Analysis for Binary Protocols},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 15th International
                  Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7462},
  pages        = {354--373},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33338-5\_18},
  doi          = {10.1007/978-3-642-33338-5\_18},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/HadziosmanovicSBZE12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/JinYC12,
  author       = {Shuyuan Jin and
                  Zhi Yang and
                  Xiang Cui},
  editor       = {Davide Balzarotti and
                  Salvatore J. Stolfo and
                  Marco Cova},
  title        = {Automatic Covert Channel Detection in Asbestos System (Poster Abstract)},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 15th International
                  Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7462},
  pages        = {380--381},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33338-5\_22},
  doi          = {10.1007/978-3-642-33338-5\_22},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/JinYC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/LauingerKM12,
  author       = {Tobias Lauinger and
                  Engin Kirda and
                  Pietro Michiardi},
  editor       = {Davide Balzarotti and
                  Salvatore J. Stolfo and
                  Marco Cova},
  title        = {Paying for Piracy? An Analysis of One-Click Hosters' Controversial
                  Reward Schemes},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 15th International
                  Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7462},
  pages        = {169--189},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33338-5\_9},
  doi          = {10.1007/978-3-642-33338-5\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/LauingerKM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/LekiesNTPJ12,
  author       = {Sebastian Lekies and
                  Nick Nikiforakis and
                  Walter Tighzert and
                  Frank Piessens and
                  Martin Johns},
  editor       = {Davide Balzarotti and
                  Salvatore J. Stolfo and
                  Marco Cova},
  title        = {{DEMACRO:} Defense against Malicious Cross-Domain Requests},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 15th International
                  Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7462},
  pages        = {254--273},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33338-5\_13},
  doi          = {10.1007/978-3-642-33338-5\_13},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/LekiesNTPJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MahmoodD12,
  author       = {Shah Mahmood and
                  Yvo Desmedt},
  editor       = {Davide Balzarotti and
                  Salvatore J. Stolfo and
                  Marco Cova},
  title        = {Online Social Networks, a Criminals Multipurpose Toolbox (Poster Abstract)},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 15th International
                  Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7462},
  pages        = {374--375},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33338-5\_19},
  doi          = {10.1007/978-3-642-33338-5\_19},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/MahmoodD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MankinK12,
  author       = {Jennifer Mankin and
                  David R. Kaeli},
  editor       = {Davide Balzarotti and
                  Salvatore J. Stolfo and
                  Marco Cova},
  title        = {Dione: {A} Flexible Disk Monitoring and Analysis Framework},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 15th International
                  Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7462},
  pages        = {127--146},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33338-5\_7},
  doi          = {10.1007/978-3-642-33338-5\_7},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/MankinK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MarchalFSE12,
  author       = {Samuel Marchal and
                  J{\'{e}}r{\^{o}}me Fran{\c{c}}ois and
                  Radu State and
                  Thomas Engel},
  editor       = {Davide Balzarotti and
                  Salvatore J. Stolfo and
                  Marco Cova},
  title        = {Proactive Discovery of Phishing Related Domain Names},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 15th International
                  Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7462},
  pages        = {190--209},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33338-5\_10},
  doi          = {10.1007/978-3-642-33338-5\_10},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/MarchalFSE12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MashimaC12,
  author       = {Daisuke Mashima and
                  Alvaro A. C{\'{a}}rdenas},
  editor       = {Davide Balzarotti and
                  Salvatore J. Stolfo and
                  Marco Cova},
  title        = {Evaluating Electricity Theft Detectors in Smart Grid Networks},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 15th International
                  Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7462},
  pages        = {210--229},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33338-5\_11},
  doi          = {10.1007/978-3-642-33338-5\_11},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/MashimaC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/OverveldtKV12,
  author       = {Timon Van Overveldt and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Davide Balzarotti and
                  Salvatore J. Stolfo and
                  Marco Cova},
  title        = {FlashDetect: ActionScript 3 Malware Detection},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 15th International
                  Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7462},
  pages        = {274--293},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33338-5\_14},
  doi          = {10.1007/978-3-642-33338-5\_14},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/OverveldtKV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/QiaoLSG12,
  author       = {Dengke Qiao and
                  Tingwen Liu and
                  Yong Sun and
                  Li Guo},
  editor       = {Davide Balzarotti and
                  Salvatore J. Stolfo and
                  Marco Cova},
  title        = {{EFA} for Efficient Regular Expression Matching in {NIDS} (Poster
                  Abstract)},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 15th International
                  Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7462},
  pages        = {382--383},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33338-5\_23},
  doi          = {10.1007/978-3-642-33338-5\_23},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/QiaoLSG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/SanchezG12,
  author       = {Jenny Andrea Pinto S{\'{a}}nchez and
                  Luis Javier Garc{\'{\i}}a{-}Villalba},
  editor       = {Davide Balzarotti and
                  Salvatore J. Stolfo and
                  Marco Cova},
  title        = {Trie Data Structure to Compare Traffic Payload in a Supervised Anomaly
                  Detection System (Poster Abstract)},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 15th International
                  Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7462},
  pages        = {386--387},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33338-5\_25},
  doi          = {10.1007/978-3-642-33338-5\_25},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/SanchezG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ShoshaJLG12,
  author       = {Ahmed F. Shosha and
                  Joshua James and
                  Chen{-}Ching Liu and
                  Pavel Gladyshev},
  editor       = {Davide Balzarotti and
                  Salvatore J. Stolfo and
                  Marco Cova},
  title        = {Towards Automated Forensic Event Reconstruction of Malicious Code
                  (Poster Abstract)},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 15th International
                  Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7462},
  pages        = {388--389},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33338-5\_26},
  doi          = {10.1007/978-3-642-33338-5\_26},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ShoshaJLG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/SrivastavaRGE12,
  author       = {Abhinav Srivastava and
                  Himanshu Raj and
                  Jonathon T. Giffin and
                  Paul England},
  editor       = {Davide Balzarotti and
                  Salvatore J. Stolfo and
                  Marco Cova},
  title        = {Trusted {VM} Snapshots in Untrusted Cloud Infrastructures},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 15th International
                  Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7462},
  pages        = {1--21},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33338-5\_1},
  doi          = {10.1007/978-3-642-33338-5\_1},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/SrivastavaRGE12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ThonnardBOKL12,
  author       = {Olivier Thonnard and
                  Leyla Bilge and
                  Gavin O'Gorman and
                  Se{\'{a}}n Kiernan and
                  Martin Lee},
  editor       = {Davide Balzarotti and
                  Salvatore J. Stolfo and
                  Marco Cova},
  title        = {Industrial Espionage and Targeted Attacks: Understanding the Characteristics
                  of an Escalating Threat},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 15th International
                  Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7462},
  pages        = {64--85},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33338-5\_4},
  doi          = {10.1007/978-3-642-33338-5\_4},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ThonnardBOKL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ValgentiCSSKKD12,
  author       = {Victor C. Valgenti and
                  Jatin Chhugani and
                  Yan Sun and
                  Nadathur Satish and
                  Min Sik Kim and
                  Changkyu Kim and
                  Pradeep Dubey},
  editor       = {Davide Balzarotti and
                  Salvatore J. Stolfo and
                  Marco Cova},
  title        = {GPP-Grep: High-Speed Regular Expression Processing Engine on General
                  Purpose Processors},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 15th International
                  Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7462},
  pages        = {334--353},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33338-5\_17},
  doi          = {10.1007/978-3-642-33338-5\_17},
  timestamp    = {Wed, 30 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ValgentiCSSKKD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/VeendCB12,
  author       = {Victor van der Veen and
                  Nitish dutt{-}Sharma and
                  Lorenzo Cavallaro and
                  Herbert Bos},
  editor       = {Davide Balzarotti and
                  Salvatore J. Stolfo and
                  Marco Cova},
  title        = {Memory Errors: The Past, the Present, and the Future},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 15th International
                  Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7462},
  pages        = {86--106},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33338-5\_5},
  doi          = {10.1007/978-3-642-33338-5\_5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/VeendCB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/VegaVCG12,
  author       = {Hugo Villan{\'{u}}a Vega and
                  Jorge Maestre Vidal and
                  Jaime Daniel Mej{\'{\i}}a Castro and
                  Luis Javier Garc{\'{\i}}a{-}Villalba},
  editor       = {Davide Balzarotti and
                  Salvatore J. Stolfo and
                  Marco Cova},
  title        = {Improvement of an Anagram Based {NIDS} by Reducing the Storage Space
                  of Bloom Filters (Poster Abstract)},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 15th International
                  Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7462},
  pages        = {393--394},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33338-5\_28},
  doi          = {10.1007/978-3-642-33338-5\_28},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/VegaVCG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/VellaTR12,
  author       = {Mark Vella and
                  Sotirios Terzis and
                  Marc Roper},
  editor       = {Davide Balzarotti and
                  Salvatore J. Stolfo and
                  Marco Cova},
  title        = {Distress Detection (Poster Abstract)},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 15th International
                  Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7462},
  pages        = {384--385},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33338-5\_24},
  doi          = {10.1007/978-3-642-33338-5\_24},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/VellaTR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/VidalVCG12,
  author       = {Jorge Maestre Vidal and
                  Hugo Villan{\'{u}}a Vega and
                  Jaime Daniel Mej{\'{\i}}a Castro and
                  Luis Javier Garc{\'{\i}}a{-}Villalba},
  editor       = {Davide Balzarotti and
                  Salvatore J. Stolfo and
                  Marco Cova},
  title        = {Concurrency Optimization for {NIDS} (Poster Abstract)},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 15th International
                  Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7462},
  pages        = {395--396},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33338-5\_29},
  doi          = {10.1007/978-3-642-33338-5\_29},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/VidalVCG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/WuYF12,
  author       = {Jinyu Wu and
                  Lihua Yin and
                  Binxing Fang},
  editor       = {Davide Balzarotti and
                  Salvatore J. Stolfo and
                  Marco Cova},
  title        = {Network Security Analysis Method Taking into Account the Usage Information
                  (Poster Abstract)},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 15th International
                  Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7462},
  pages        = {378--379},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33338-5\_21},
  doi          = {10.1007/978-3-642-33338-5\_21},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/WuYF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/XuHCZH12,
  author       = {Zhi Xu and
                  Hung{-}Yuan Hsu and
                  Xin Chen and
                  Sencun Zhu and
                  Ali R. Hurson},
  editor       = {Davide Balzarotti and
                  Salvatore J. Stolfo and
                  Marco Cova},
  title        = {{AK-PPM:} An Authenticated Packet Attribution Scheme for Mobile Ad
                  Hoc Networks},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 15th International
                  Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7462},
  pages        = {147--168},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33338-5\_8},
  doi          = {10.1007/978-3-642-33338-5\_8},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/XuHCZH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ZhangL12,
  author       = {Shengzhi Zhang and
                  Peng Liu},
  editor       = {Davide Balzarotti and
                  Salvatore J. Stolfo and
                  Marco Cova},
  title        = {Assessing the Trustworthiness of Drivers},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 15th International
                  Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7462},
  pages        = {42--63},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33338-5\_3},
  doi          = {10.1007/978-3-642-33338-5\_3},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ZhangL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ZhangYXG12,
  author       = {Jialong Zhang and
                  Chao Yang and
                  Zhaoyan Xu and
                  Guofei Gu},
  editor       = {Davide Balzarotti and
                  Salvatore J. Stolfo and
                  Marco Cova},
  title        = {PoisonAmplifier: {A} Guided Approach of Discovering Compromised Websites
                  through Reversing Search Poisoning Attacks},
  booktitle    = {Research in Attacks, Intrusions, and Defenses - 15th International
                  Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7462},
  pages        = {230--253},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33338-5\_12},
  doi          = {10.1007/978-3-642-33338-5\_12},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/ZhangYXG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/raid/2012,
  editor       = {Davide Balzarotti and
                  Salvatore J. Stolfo and
                  Marco Cova},
  title        = {Research in Attacks, Intrusions, and Defenses - 15th International
                  Symposium, {RAID} 2012, Amsterdam, The Netherlands, September 12-14,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7462},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33338-5},
  doi          = {10.1007/978-3-642-33338-5},
  isbn         = {978-3-642-33337-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BeckerSNS11,
  author       = {Sheila Becker and
                  Jeff Seibert and
                  Cristina Nita{-}Rotaru and
                  Radu State},
  editor       = {Robin Sommer and
                  Davide Balzarotti and
                  Gregor Maier},
  title        = {Securing Application-Level Topology Estimation Networks: Facing the
                  Frog-Boiling Attack},
  booktitle    = {Recent Advances in Intrusion Detection - 14th International Symposium,
                  {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6961},
  pages        = {201--221},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23644-0\_11},
  doi          = {10.1007/978-3-642-23644-0\_11},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/BeckerSNS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BoggsHSS11,
  author       = {Nathaniel Boggs and
                  Sharath Hiremagalore and
                  Angelos Stavrou and
                  Salvatore J. Stolfo},
  editor       = {Robin Sommer and
                  Davide Balzarotti and
                  Gregor Maier},
  title        = {Cross-Domain Collaborative Anomaly Detection: So Far Yet So Close},
  booktitle    = {Recent Advances in Intrusion Detection - 14th International Symposium,
                  {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6961},
  pages        = {142--160},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23644-0\_8},
  doi          = {10.1007/978-3-642-23644-0\_8},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/BoggsHSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BosmanSB11,
  author       = {Erik Bosman and
                  Asia Slowinska and
                  Herbert Bos},
  editor       = {Robin Sommer and
                  Davide Balzarotti and
                  Gregor Maier},
  title        = {Minemu: The World's Fastest Taint Tracker},
  booktitle    = {Recent Advances in Intrusion Detection - 14th International Symposium,
                  {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6961},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23644-0\_1},
  doi          = {10.1007/978-3-642-23644-0\_1},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/BosmanSB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BuescherLS11,
  author       = {Armin Buescher and
                  Felix Leder and
                  Thomas Siebert},
  editor       = {Robin Sommer and
                  Davide Balzarotti and
                  Gregor Maier},
  title        = {Banksafe Information Stealer Detection Inside the Web Browser},
  booktitle    = {Recent Advances in Intrusion Detection - 14th International Symposium,
                  {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6961},
  pages        = {262--280},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23644-0\_14},
  doi          = {10.1007/978-3-642-23644-0\_14},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/BuescherLS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ChakravartyPPK11,
  author       = {Sambuddho Chakravarty and
                  Georgios Portokalidis and
                  Michalis Polychronakis and
                  Angelos D. Keromytis},
  editor       = {Robin Sommer and
                  Davide Balzarotti and
                  Gregor Maier},
  title        = {Detecting Traffic Snooping in Tor Using Decoys},
  booktitle    = {Recent Advances in Intrusion Detection - 14th International Symposium,
                  {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6961},
  pages        = {222--241},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23644-0\_12},
  doi          = {10.1007/978-3-642-23644-0\_12},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ChakravartyPPK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/CuiS11,
  author       = {Ang Cui and
                  Salvatore J. Stolfo},
  editor       = {Robin Sommer and
                  Davide Balzarotti and
                  Gregor Maier},
  title        = {Defending Embedded Systems with Software Symbiotes},
  booktitle    = {Recent Advances in Intrusion Detection - 14th International Symposium,
                  {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6961},
  pages        = {358--377},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23644-0\_19},
  doi          = {10.1007/978-3-642-23644-0\_19},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/CuiS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/DuflotPM11,
  author       = {Lo{\"{\i}}c Duflot and
                  Yves{-}Alexis Perez and
                  Benjamin Morin},
  editor       = {Robin Sommer and
                  Davide Balzarotti and
                  Gregor Maier},
  title        = {What If You Can't Trust Your Network Card?},
  booktitle    = {Recent Advances in Intrusion Detection - 14th International Symposium,
                  {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6961},
  pages        = {378--397},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23644-0\_20},
  doi          = {10.1007/978-3-642-23644-0\_20},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/DuflotPM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/FratantonioKV11,
  author       = {Yanick Fratantonio and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Robin Sommer and
                  Davide Balzarotti and
                  Gregor Maier},
  title        = {Shellzer: {A} Tool for the Dynamic Analysis of Malicious Shellcode},
  booktitle    = {Recent Advances in Intrusion Detection - 14th International Symposium,
                  {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6961},
  pages        = {61--80},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23644-0\_4},
  doi          = {10.1007/978-3-642-23644-0\_4},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/FratantonioKV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GilbertKKV11,
  author       = {Bob Gilbert and
                  Richard A. Kemmerer and
                  Christopher Kruegel and
                  Giovanni Vigna},
  editor       = {Robin Sommer and
                  Davide Balzarotti and
                  Gregor Maier},
  title        = {Dymo: Tracking Dynamic Code Identity},
  booktitle    = {Recent Advances in Intrusion Detection - 14th International Symposium,
                  {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6961},
  pages        = {21--40},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23644-0\_2},
  doi          = {10.1007/978-3-642-23644-0\_2},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/GilbertKKV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GrobertWH11,
  author       = {Felix Gr{\"{o}}bert and
                  Carsten Willems and
                  Thorsten Holz},
  editor       = {Robin Sommer and
                  Davide Balzarotti and
                  Gregor Maier},
  title        = {Automated Identification of Cryptographic Primitives in Binary Programs},
  booktitle    = {Recent Advances in Intrusion Detection - 14th International Symposium,
                  {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6961},
  pages        = {41--60},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23644-0\_3},
  doi          = {10.1007/978-3-642-23644-0\_3},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/GrobertWH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/HeiderichFH11,
  author       = {Mario Heiderich and
                  Tilman Frosch and
                  Thorsten Holz},
  editor       = {Robin Sommer and
                  Davide Balzarotti and
                  Gregor Maier},
  title        = {IceShield: Detection and Mitigation of Malicious Websites with a Frozen
                  {DOM}},
  booktitle    = {Recent Advances in Intrusion Detection - 14th International Symposium,
                  {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6961},
  pages        = {281--300},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23644-0\_15},
  doi          = {10.1007/978-3-642-23644-0\_15},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/HeiderichFH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/LindorferKC11,
  author       = {Martina Lindorfer and
                  Clemens Kolbitsch and
                  Paolo Milani Comparetti},
  editor       = {Robin Sommer and
                  Davide Balzarotti and
                  Gregor Maier},
  title        = {Detecting Environment-Sensitive Malware},
  booktitle    = {Recent Advances in Intrusion Detection - 14th International Symposium,
                  {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6961},
  pages        = {338--357},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23644-0\_18},
  doi          = {10.1007/978-3-642-23644-0\_18},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/LindorferKC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/LuZWG11,
  author       = {Kangjie Lu and
                  Dabi Zou and
                  Weiping Wen and
                  Debin Gao},
  editor       = {Robin Sommer and
                  Davide Balzarotti and
                  Gregor Maier},
  title        = {Packed, Printable, and Polymorphic Return-Oriented Programming},
  booktitle    = {Recent Advances in Intrusion Detection - 14th International Symposium,
                  {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6961},
  pages        = {101--120},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23644-0\_6},
  doi          = {10.1007/978-3-642-23644-0\_6},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/LuZWG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MehdiKK11,
  author       = {Syed Akbar Mehdi and
                  Junaid Khalid and
                  Syed Ali Khayam},
  editor       = {Robin Sommer and
                  Davide Balzarotti and
                  Gregor Maier},
  title        = {Revisiting Traffic Anomaly Detection Using Software Defined Networking},
  booktitle    = {Recent Advances in Intrusion Detection - 14th International Symposium,
                  {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6961},
  pages        = {161--180},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23644-0\_9},
  doi          = {10.1007/978-3-642-23644-0\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/MehdiKK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/OrtolaniGC11,
  author       = {Stefano Ortolani and
                  Cristiano Giuffrida and
                  Bruno Crispo},
  editor       = {Robin Sommer and
                  Davide Balzarotti and
                  Gregor Maier},
  title        = {{KLIMAX:} Profiling Memory Write Patterns to Detect Keystroke-Harvesting
                  Malware},
  booktitle    = {Recent Advances in Intrusion Detection - 14th International Symposium,
                  {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6961},
  pages        = {81--100},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23644-0\_5},
  doi          = {10.1007/978-3-642-23644-0\_5},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/OrtolaniGC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/SalemS11,
  author       = {Malek Ben Salem and
                  Salvatore J. Stolfo},
  editor       = {Robin Sommer and
                  Davide Balzarotti and
                  Gregor Maier},
  title        = {Modeling User Search Behavior for Masquerade Detection},
  booktitle    = {Recent Advances in Intrusion Detection - 14th International Symposium,
                  {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6961},
  pages        = {181--200},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23644-0\_10},
  doi          = {10.1007/978-3-642-23644-0\_10},
  timestamp    = {Wed, 15 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/SalemS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ShinLG11,
  author       = {Seungwon Shin and
                  Raymond Lin and
                  Guofei Gu},
  editor       = {Robin Sommer and
                  Davide Balzarotti and
                  Gregor Maier},
  title        = {Cross-Analysis of Botnet Victims: New Insights and Implications},
  booktitle    = {Recent Advances in Intrusion Detection - 14th International Symposium,
                  {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6961},
  pages        = {242--261},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23644-0\_13},
  doi          = {10.1007/978-3-642-23644-0\_13},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ShinLG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/SongLK11,
  author       = {Jonghyuk Song and
                  Sangho Lee and
                  Jong Kim},
  editor       = {Robin Sommer and
                  Davide Balzarotti and
                  Gregor Maier},
  title        = {Spam Filtering in Twitter Using Sender-Receiver Relationship},
  booktitle    = {Recent Advances in Intrusion Detection - 14th International Symposium,
                  {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6961},
  pages        = {301--317},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23644-0\_16},
  doi          = {10.1007/978-3-642-23644-0\_16},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/SongLK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/TranEBJFN11,
  author       = {Minh Tran and
                  Mark Etheridge and
                  Tyler K. Bletsch and
                  Xuxian Jiang and
                  Vincent W. Freeh and
                  Peng Ning},
  editor       = {Robin Sommer and
                  Davide Balzarotti and
                  Gregor Maier},
  title        = {On the Expressiveness of Return-into-libc Attacks},
  booktitle    = {Recent Advances in Intrusion Detection - 14th International Symposium,
                  {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6961},
  pages        = {121--141},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23644-0\_7},
  doi          = {10.1007/978-3-642-23644-0\_7},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/TranEBJFN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/YangHG11,
  author       = {Chao Yang and
                  Robert Chandler Harkreader and
                  Guofei Gu},
  editor       = {Robin Sommer and
                  Davide Balzarotti and
                  Gregor Maier},
  title        = {Die Free or Live Hard? Empirical Evaluation and New Design for Fighting
                  Evolving Twitter Spammers},
  booktitle    = {Recent Advances in Intrusion Detection - 14th International Symposium,
                  {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6961},
  pages        = {318--337},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23644-0\_17},
  doi          = {10.1007/978-3-642-23644-0\_17},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/YangHG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/raid/2011,
  editor       = {Robin Sommer and
                  Davide Balzarotti and
                  Gregor Maier},
  title        = {Recent Advances in Intrusion Detection - 14th International Symposium,
                  {RAID} 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6961},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23644-0},
  doi          = {10.1007/978-3-642-23644-0},
  isbn         = {978-3-642-23643-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/AntonakakisDLPLB10,
  author       = {Manos Antonakakis and
                  David Dagon and
                  Xiapu Luo and
                  Roberto Perdisci and
                  Wenke Lee and
                  Justin Bellmor},
  editor       = {Somesh Jha and
                  Robin Sommer and
                  Christian Kreibich},
  title        = {A Centralized Monitoring Infrastructure for Improving {DNS} Security},
  booktitle    = {Recent Advances in Intrusion Detection, 13th International Symposium,
                  {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6307},
  pages        = {18--37},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15512-3\_2},
  doi          = {10.1007/978-3-642-15512-3\_2},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/AntonakakisDLPLB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BalduzziPHKBK10,
  author       = {Marco Balduzzi and
                  Christian Platzer and
                  Thorsten Holz and
                  Engin Kirda and
                  Davide Balzarotti and
                  Christopher Kruegel},
  editor       = {Somesh Jha and
                  Robin Sommer and
                  Christian Kreibich},
  title        = {Abusing Social Networks for Automated User Profiling},
  booktitle    = {Recent Advances in Intrusion Detection, 13th International Symposium,
                  {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6307},
  pages        = {422--441},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15512-3\_22},
  doi          = {10.1007/978-3-642-15512-3\_22},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/BalduzziPHKBK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BowenPKSKS10,
  author       = {Brian M. Bowen and
                  Pratap V. Prabhu and
                  Vasileios P. Kemerlis and
                  Stelios Sidiroglou and
                  Angelos D. Keromytis and
                  Salvatore J. Stolfo},
  editor       = {Somesh Jha and
                  Robin Sommer and
                  Christian Kreibich},
  title        = {BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based
                  Hosts for Crimeware Detection},
  booktitle    = {Recent Advances in Intrusion Detection, 13th International Symposium,
                  {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6307},
  pages        = {118--137},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15512-3\_7},
  doi          = {10.1007/978-3-642-15512-3\_7},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/BowenPKSKS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/CallegariGGPP10,
  author       = {Christian Callegari and
                  Loris Gazzarrini and
                  Stefano Giordano and
                  Michele Pagano and
                  Teresa Pepe},
  editor       = {Somesh Jha and
                  Robin Sommer and
                  Christian Kreibich},
  title        = {Detecting Network Anomalies in Backbone Networks},
  booktitle    = {Recent Advances in Intrusion Detection, 13th International Symposium,
                  {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6307},
  pages        = {490--491},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15512-3\_28},
  doi          = {10.1007/978-3-642-15512-3\_28},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/CallegariGGPP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/CovaLTKD10,
  author       = {Marco Cova and
                  Corrado Leita and
                  Olivier Thonnard and
                  Angelos D. Keromytis and
                  Marc Dacier},
  editor       = {Somesh Jha and
                  Robin Sommer and
                  Christian Kreibich},
  title        = {An Analysis of Rogue {AV} Campaigns},
  booktitle    = {Recent Advances in Intrusion Detection, 13th International Symposium,
                  {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6307},
  pages        = {442--463},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15512-3\_23},
  doi          = {10.1007/978-3-642-15512-3\_23},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/CovaLTKD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/CucurullAN10,
  author       = {Jordi Cucurull and
                  Mikael Asplund and
                  Simin Nadjm{-}Tehrani},
  editor       = {Somesh Jha and
                  Robin Sommer and
                  Christian Kreibich},
  title        = {Anomaly Detection and Mitigation for Disaster Area Networks},
  booktitle    = {Recent Advances in Intrusion Detection, 13th International Symposium,
                  {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6307},
  pages        = {339--359},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15512-3\_18},
  doi          = {10.1007/978-3-642-15512-3\_18},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/CucurullAN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/DrasarVKC10,
  author       = {Martin Drasar and
                  Jan Vykopal and
                  Radek Krejc{\'{\i}} and
                  Pavel Celeda},
  editor       = {Somesh Jha and
                  Robin Sommer and
                  Christian Kreibich},
  title        = {Aspect-Based Attack Detection in Large-Scale Networks},
  booktitle    = {Recent Advances in Intrusion Detection, 13th International Symposium,
                  {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6307},
  pages        = {488--489},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15512-3\_27},
  doi          = {10.1007/978-3-642-15512-3\_27},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/DrasarVKC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GiuraM10,
  author       = {Paul Giura and
                  Nasir D. Memon},
  editor       = {Somesh Jha and
                  Robin Sommer and
                  Christian Kreibich},
  title        = {NetStore: An Efficient Storage Infrastructure for Network Forensics
                  and Monitoring},
  booktitle    = {Recent Advances in Intrusion Detection, 13th International Symposium,
                  {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6307},
  pages        = {277--296},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15512-3\_15},
  doi          = {10.1007/978-3-642-15512-3\_15},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/GiuraM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/HadziosmanovicBH10,
  author       = {Dina Hadziosmanovic and
                  Damiano Bolzoni and
                  Pieter H. Hartel},
  editor       = {Somesh Jha and
                  Robin Sommer and
                  Christian Kreibich},
  title        = {{MEDUSA:} Mining Events to Detect Undesirable uSer Actions in {SCADA}},
  booktitle    = {Recent Advances in Intrusion Detection, 13th International Symposium,
                  {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6307},
  pages        = {500--501},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15512-3\_33},
  doi          = {10.1007/978-3-642-15512-3\_33},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/HadziosmanovicBH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/HaqAKK10,
  author       = {Irfan Ul Haq and
                  Sardar Ali and
                  Hassan Khan and
                  Syed Ali Khayam},
  editor       = {Somesh Jha and
                  Robin Sommer and
                  Christian Kreibich},
  title        = {What Is the Impact of {P2P} Traffic on Anomaly Detection?},
  booktitle    = {Recent Advances in Intrusion Detection, 13th International Symposium,
                  {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6307},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15512-3\_1},
  doi          = {10.1007/978-3-642-15512-3\_1},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/HaqAKK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/HsuHC10,
  author       = {Ching{-}Hsiang Hsu and
                  Chun{-}Ying Huang and
                  Kuan{-}Ta Chen},
  editor       = {Somesh Jha and
                  Robin Sommer and
                  Christian Kreibich},
  title        = {Fast-Flux Bot Detection in Real Time},
  booktitle    = {Recent Advances in Intrusion Detection, 13th International Symposium,
                  {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6307},
  pages        = {464--483},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15512-3\_24},
  doi          = {10.1007/978-3-642-15512-3\_24},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/HsuHC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/JiangCD10,
  author       = {Jianchun Jiang and
                  Weifeng Chen and
                  Liping Ding},
  editor       = {Somesh Jha and
                  Robin Sommer and
                  Christian Kreibich},
  title        = {On Estimating Cyber Adversaries' Capabilities: {A} Bayesian Model
                  Approach},
  booktitle    = {Recent Advances in Intrusion Detection, 13th International Symposium,
                  {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6307},
  pages        = {502--504},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15512-3\_34},
  doi          = {10.1007/978-3-642-15512-3\_34},
  timestamp    = {Thu, 09 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/JiangCD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/KamraB10,
  author       = {Ashish Kamra and
                  Elisa Bertino},
  editor       = {Somesh Jha and
                  Robin Sommer and
                  Christian Kreibich},
  title        = {Privilege States Based Access Control for Fine-Grained Intrusion Response},
  booktitle    = {Recent Advances in Intrusion Detection, 13th International Symposium,
                  {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6307},
  pages        = {402--421},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15512-3\_21},
  doi          = {10.1007/978-3-642-15512-3\_21},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/KamraB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/KillourhyM10,
  author       = {Kevin S. Killourhy and
                  Roy A. Maxion},
  editor       = {Somesh Jha and
                  Robin Sommer and
                  Christian Kreibich},
  title        = {Why Did My Detector Do \emph{That}?! - Predicting Keystroke-Dynamics
                  Error Rates},
  booktitle    = {Recent Advances in Intrusion Detection, 13th International Symposium,
                  {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6307},
  pages        = {256--276},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15512-3\_14},
  doi          = {10.1007/978-3-642-15512-3\_14},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/KillourhyM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/KochR10,
  author       = {Robert Koch and
                  Gabi Dreo Rodosek},
  editor       = {Somesh Jha and
                  Robin Sommer and
                  Christian Kreibich},
  title        = {Security System for Encrypted Environments {(S2E2)}},
  booktitle    = {Recent Advances in Intrusion Detection, 13th International Symposium,
                  {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6307},
  pages        = {505--507},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15512-3\_35},
  doi          = {10.1007/978-3-642-15512-3\_35},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/KochR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/KongZL10,
  author       = {Ying Kong and
                  Yuqing Zhang and
                  Qixu Liu},
  editor       = {Somesh Jha and
                  Robin Sommer and
                  Christian Kreibich},
  title        = {Eliminating Human Specification in Static Analysis},
  booktitle    = {Recent Advances in Intrusion Detection, 13th International Symposium,
                  {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6307},
  pages        = {494--495},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15512-3\_30},
  doi          = {10.1007/978-3-642-15512-3\_30},
  timestamp    = {Thu, 18 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/KongZL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/LiLGR10,
  author       = {Peng Li and
                  Limin Liu and
                  Debin Gao and
                  Michael K. Reiter},
  editor       = {Somesh Jha and
                  Robin Sommer and
                  Christian Kreibich},
  title        = {On Challenges in Evaluating Malware Clustering},
  booktitle    = {Recent Advances in Intrusion Detection, 13th International Symposium,
                  {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6307},
  pages        = {238--255},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15512-3\_13},
  doi          = {10.1007/978-3-642-15512-3\_13},
  timestamp    = {Mon, 23 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/LiLGR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MartignoniFPC10,
  author       = {Lorenzo Martignoni and
                  Aristide Fattori and
                  Roberto Paleari and
                  Lorenzo Cavallaro},
  editor       = {Somesh Jha and
                  Robin Sommer and
                  Christian Kreibich},
  title        = {Live and Trustworthy Forensic Analysis of Commodity Production Systems},
  booktitle    = {Recent Advances in Intrusion Detection, 13th International Symposium,
                  {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6307},
  pages        = {297--316},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15512-3\_16},
  doi          = {10.1007/978-3-642-15512-3\_16},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/MartignoniFPC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MathewPNU10,
  author       = {Sunu Mathew and
                  Michalis Petropoulos and
                  Hung Q. Ngo and
                  Shambhu J. Upadhyaya},
  editor       = {Somesh Jha and
                  Robin Sommer and
                  Christian Kreibich},
  title        = {A Data-Centric Approach to Insider Attack Detection in Database Systems},
  booktitle    = {Recent Advances in Intrusion Detection, 13th International Symposium,
                  {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6307},
  pages        = {382--401},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15512-3\_20},
  doi          = {10.1007/978-3-642-15512-3\_20},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/MathewPNU10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MokhovPD10,
  author       = {Serguei A. Mokhov and
                  Joey Paquet and
                  Mourad Debbabi},
  editor       = {Somesh Jha and
                  Robin Sommer and
                  Christian Kreibich},
  title        = {Towards Automatic Deduction and Event Reconstruction Using Forensic
                  Lucid and Probabilities to Encode the {IDS} Evidence},
  booktitle    = {Recent Advances in Intrusion Detection, 13th International Symposium,
                  {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6307},
  pages        = {508--509},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15512-3\_36},
  doi          = {10.1007/978-3-642-15512-3\_36},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/MokhovPD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/NiksefatASS10,
  author       = {Salman Niksefat and
                  Mohammad Mehdi Ahaniha and
                  Babak Sadeghiyan and
                  Mehdi Shajari},
  editor       = {Somesh Jha and
                  Robin Sommer and
                  Christian Kreibich},
  title        = {Toward Specification-Based Intrusion Detection for Web Applications},
  booktitle    = {Recent Advances in Intrusion Detection, 13th International Symposium,
                  {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6307},
  pages        = {510--511},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15512-3\_37},
  doi          = {10.1007/978-3-642-15512-3\_37},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/NiksefatASS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/OlinerKA10,
  author       = {Adam J. Oliner and
                  Ashutosh V. Kulkarni and
                  Alex Aiken},
  editor       = {Somesh Jha and
                  Robin Sommer and
                  Christian Kreibich},
  title        = {Community Epidemic Detection Using Time-Correlated Anomalies},
  booktitle    = {Recent Advances in Intrusion Detection, 13th International Symposium,
                  {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6307},
  pages        = {360--381},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15512-3\_19},
  doi          = {10.1007/978-3-642-15512-3\_19},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/OlinerKA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/OrtolaniGC10,
  author       = {Stefano Ortolani and
                  Cristiano Giuffrida and
                  Bruno Crispo},
  editor       = {Somesh Jha and
                  Robin Sommer and
                  Christian Kreibich},
  title        = {Bait Your Hook: {A} Novel Detection Technique for Keyloggers},
  booktitle    = {Recent Advances in Intrusion Detection, 13th International Symposium,
                  {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6307},
  pages        = {198--217},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15512-3\_11},
  doi          = {10.1007/978-3-642-15512-3\_11},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/OrtolaniGC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/RheeRXJ10,
  author       = {Junghwan Rhee and
                  Ryan D. Riley and
                  Dongyan Xu and
                  Xuxian Jiang},
  editor       = {Somesh Jha and
                  Robin Sommer and
                  Christian Kreibich},
  title        = {Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic
                  Kernel Memory},
  booktitle    = {Recent Advances in Intrusion Detection, 13th International Symposium,
                  {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6307},
  pages        = {178--197},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15512-3\_10},
  doi          = {10.1007/978-3-642-15512-3\_10},
  timestamp    = {Thu, 17 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/RheeRXJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/RoundyM10,
  author       = {Kevin A. Roundy and
                  Barton P. Miller},
  editor       = {Somesh Jha and
                  Robin Sommer and
                  Christian Kreibich},
  title        = {Hybrid Analysis and Control of Malware},
  booktitle    = {Recent Advances in Intrusion Detection, 13th International Symposium,
                  {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6307},
  pages        = {317--338},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15512-3\_17},
  doi          = {10.1007/978-3-642-15512-3\_17},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/RoundyM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/SqalliAA10,
  author       = {Mohammed H. Sqalli and
                  Raed Al{-}Shaikh and
                  Ezzat Ahmed},
  editor       = {Somesh Jha and
                  Robin Sommer and
                  Christian Kreibich},
  title        = {A Distributed Honeynet at {KFUPM:} {A} Case Study},
  booktitle    = {Recent Advances in Intrusion Detection, 13th International Symposium,
                  {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6307},
  pages        = {486--487},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15512-3\_26},
  doi          = {10.1007/978-3-642-15512-3\_26},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/SqalliAA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/SrivastavaG10,
  author       = {Abhinav Srivastava and
                  Jonathon T. Giffin},
  editor       = {Somesh Jha and
                  Robin Sommer and
                  Christian Kreibich},
  title        = {Automatic Discovery of Parasitic Malware},
  booktitle    = {Recent Advances in Intrusion Detection, 13th International Symposium,
                  {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6307},
  pages        = {97--117},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15512-3\_6},
  doi          = {10.1007/978-3-642-15512-3\_6},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/SrivastavaG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/StaffordL10,
  author       = {Shad Stafford and
                  Jun Li},
  editor       = {Somesh Jha and
                  Robin Sommer and
                  Christian Kreibich},
  title        = {Behavior-Based Worm Detectors Compared},
  booktitle    = {Recent Advances in Intrusion Detection, 13th International Symposium,
                  {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6307},
  pages        = {38--57},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15512-3\_3},
  doi          = {10.1007/978-3-642-15512-3\_3},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/StaffordL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/TakurouM10,
  author       = {Hosoi Takurou and
                  Kanta Matsuura},
  editor       = {Somesh Jha and
                  Robin Sommer and
                  Christian Kreibich},
  title        = {Evaluation of the Common Dataset Used in Anti-Malware Engineering
                  Workshop 2009},
  booktitle    = {Recent Advances in Intrusion Detection, 13th International Symposium,
                  {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6307},
  pages        = {496--497},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15512-3\_31},
  doi          = {10.1007/978-3-642-15512-3\_31},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/TakurouM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/VasiliadisI10,
  author       = {Giorgos Vasiliadis and
                  Sotiris Ioannidis},
  editor       = {Somesh Jha and
                  Robin Sommer and
                  Christian Kreibich},
  title        = {GrAVity: {A} Massively Parallel Antivirus Engine},
  booktitle    = {Recent Advances in Intrusion Detection, 13th International Symposium,
                  {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6307},
  pages        = {79--96},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15512-3\_5},
  doi          = {10.1007/978-3-642-15512-3\_5},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/VasiliadisI10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/WangSG10,
  author       = {Jiang Wang and
                  Angelos Stavrou and
                  Anup K. Ghosh},
  editor       = {Somesh Jha and
                  Robin Sommer and
                  Christian Kreibich},
  title        = {HyperCheck: {A} Hardware-Assisted Integrity Monitor},
  booktitle    = {Recent Advances in Intrusion Detection, 13th International Symposium,
                  {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6307},
  pages        = {158--177},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15512-3\_9},
  doi          = {10.1007/978-3-642-15512-3\_9},
  timestamp    = {Fri, 18 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/WangSG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/WangZG10,
  author       = {Yipeng Wang and
                  Zhibin Zhang and
                  Li Guo},
  editor       = {Somesh Jha and
                  Robin Sommer and
                  Christian Kreibich},
  title        = {Inferring Protocol State Machine from Real-World Trace},
  booktitle    = {Recent Advances in Intrusion Detection, 13th International Symposium,
                  {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6307},
  pages        = {498--499},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15512-3\_32},
  doi          = {10.1007/978-3-642-15512-3\_32},
  timestamp    = {Fri, 31 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/WangZG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/WhelanK10,
  author       = {Ryan Whelan and
                  David R. Kaeli},
  editor       = {Somesh Jha and
                  Robin Sommer and
                  Christian Kreibich},
  title        = {Toward Whole-System Dynamic Analysis for ARM-Based Mobile Devices},
  booktitle    = {Recent Advances in Intrusion Detection, 13th International Symposium,
                  {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6307},
  pages        = {512--513},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15512-3\_38},
  doi          = {10.1007/978-3-642-15512-3\_38},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/WhelanK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/WrightCBRRC10,
  author       = {Charles V. Wright and
                  Christopher Connelly and
                  Timothy M. Braje and
                  Jesse C. Rabek and
                  Lee M. Rossey and
                  Robert K. Cunningham},
  editor       = {Somesh Jha and
                  Robin Sommer and
                  Christian Kreibich},
  title        = {Generating Client Workloads and High-Fidelity Network Traffic for
                  Controllable, Repeatable Experiments in Computer Security},
  booktitle    = {Recent Advances in Intrusion Detection, 13th International Symposium,
                  {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6307},
  pages        = {218--237},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15512-3\_12},
  doi          = {10.1007/978-3-642-15512-3\_12},
  timestamp    = {Fri, 11 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/WrightCBRRC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/XingZC10,
  author       = {Luyi Xing and
                  Yuqing Zhang and
                  Shenlong Chen},
  editor       = {Somesh Jha and
                  Robin Sommer and
                  Christian Kreibich},
  title        = {A Client-Based and Server-Enhanced Defense Mechanism for Cross-Site
                  Request Forgery},
  booktitle    = {Recent Advances in Intrusion Detection, 13th International Symposium,
                  {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6307},
  pages        = {484--485},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15512-3\_25},
  doi          = {10.1007/978-3-642-15512-3\_25},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/XingZC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/XuBWJ10,
  author       = {Yunjing Xu and
                  Michael D. Bailey and
                  Eric Vander Weele and
                  Farnam Jahanian},
  editor       = {Somesh Jha and
                  Robin Sommer and
                  Christian Kreibich},
  title        = {CANVuS: Context-Aware Network Vulnerability Scanning},
  booktitle    = {Recent Advances in Intrusion Detection, 13th International Symposium,
                  {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6307},
  pages        = {138--157},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15512-3\_8},
  doi          = {10.1007/978-3-642-15512-3\_8},
  timestamp    = {Mon, 20 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/XuBWJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/XuMY10,
  author       = {Kui Xu and
                  Qiang Ma and
                  Danfeng (Daphne) Yao},
  editor       = {Somesh Jha and
                  Robin Sommer and
                  Christian Kreibich},
  title        = {Detecting the Onset of Infection for Secure Hosts},
  booktitle    = {Recent Advances in Intrusion Detection, 13th International Symposium,
                  {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6307},
  pages        = {492--493},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15512-3\_29},
  doi          = {10.1007/978-3-642-15512-3\_29},
  timestamp    = {Thu, 09 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/XuMY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/YangKGS10,
  author       = {Liu Yang and
                  Rezwana Karim and
                  Vinod Ganapathy and
                  Randy Smith},
  editor       = {Somesh Jha and
                  Robin Sommer and
                  Christian Kreibich},
  title        = {Improving NFA-Based Signature Matching Using Ordered Binary Decision
                  Diagrams},
  booktitle    = {Recent Advances in Intrusion Detection, 13th International Symposium,
                  {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6307},
  pages        = {58--78},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15512-3\_4},
  doi          = {10.1007/978-3-642-15512-3\_4},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/YangKGS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ZhangQH10,
  author       = {FuYong Zhang and
                  DeYu Qi and
                  JingLin Hu},
  editor       = {Somesh Jha and
                  Robin Sommer and
                  Christian Kreibich},
  title        = {Using {IRP} for Malware Detection},
  booktitle    = {Recent Advances in Intrusion Detection, 13th International Symposium,
                  {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6307},
  pages        = {514--515},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15512-3\_39},
  doi          = {10.1007/978-3-642-15512-3\_39},
  timestamp    = {Wed, 08 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/ZhangQH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/raid/2010,
  editor       = {Somesh Jha and
                  Robin Sommer and
                  Christian Kreibich},
  title        = {Recent Advances in Intrusion Detection, 13th International Symposium,
                  {RAID} 2010, Ottawa, Ontario, Canada, September 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6307},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15512-3},
  doi          = {10.1007/978-3-642-15512-3},
  isbn         = {978-3-642-15511-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BolzoniEH09,
  author       = {Damiano Bolzoni and
                  Sandro Etalle and
                  Pieter H. Hartel},
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {Panacea: Automating Attack Classification for Anomaly-Based Network
                  Intrusion Detection Systems},
  booktitle    = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0\_1},
  doi          = {10.1007/978-3-642-04342-0\_1},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/BolzoniEH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/CaballeroLPS09,
  author       = {Juan Caballero and
                  Zhenkai Liang and
                  Pongsin Poosankam and
                  Dawn Song},
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {Towards Generating High Coverage Vulnerability-Based Signatures with
                  Protocol-Level Constraint-Guided Exploration},
  booktitle    = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  pages        = {161--181},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0\_9},
  doi          = {10.1007/978-3-642-04342-0\_9},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/CaballeroLPS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Cretu-CiocarlieSLS09,
  author       = {Gabriela F. Cretu{-}Ciocarlie and
                  Angelos Stavrou and
                  Michael E. Locasto and
                  Salvatore J. Stolfo},
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {Adaptive Anomaly Detection via Self-calibration and Dynamic Updating},
  booktitle    = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  pages        = {41--60},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0\_3},
  doi          = {10.1007/978-3-642-04342-0\_3},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/Cretu-CiocarlieSLS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/CuiSPS09,
  author       = {Ang Cui and
                  Yingbo Song and
                  Pratap V. Prabhu and
                  Salvatore J. Stolfo},
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {Brave New World: Pervasive Insecurity of Embedded Network Devices},
  booktitle    = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  pages        = {378--380},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0\_32},
  doi          = {10.1007/978-3-642-04342-0\_32},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/CuiSPS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/DemayTT09,
  author       = {Jonathan{-}Christofer Demay and
                  Eric Totel and
                  Fr{\'{e}}d{\'{e}}ric Tronel},
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {Automatic Software Instrumentation for the Detection of Non-control-data
                  Attacks},
  booktitle    = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  pages        = {348--349},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0\_19},
  doi          = {10.1007/978-3-642-04342-0\_19},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/DemayTT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Erete09,
  author       = {Ikpeme Erete},
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {Browser-Based Intrusion Prevention System},
  booktitle    = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  pages        = {371--373},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0\_29},
  doi          = {10.1007/978-3-642-04342-0\_29},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/Erete09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/EreteYP09,
  author       = {Ikpeme Erete and
                  Vinod Yegneswaran and
                  Phillip A. Porras},
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {ALICE@home: Distributed Framework for Detecting Malicious Sites},
  booktitle    = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  pages        = {362--364},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0\_25},
  doi          = {10.1007/978-3-642-04342-0\_25},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/EreteYP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/FrancoisASF09,
  author       = {J{\'{e}}r{\^{o}}me Fran{\c{c}}ois and
                  Humberto J. Abdelnur and
                  Radu State and
                  Olivier Festor},
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {Automated Behavioral Fingerprinting},
  booktitle    = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  pages        = {182--201},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0\_10},
  doi          = {10.1007/978-3-642-04342-0\_10},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/FrancoisASF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GeorgeTM09,
  author       = {Laurent George and
                  Val{\'{e}}rie Viet Triem Tong and
                  Ludovic M{\'{e}}},
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {Blare Tools: {A} Policy-Based Intrusion Detection System Automatically
                  Set by the Security Policy},
  booktitle    = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  pages        = {355--356},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0\_22},
  doi          = {10.1007/978-3-642-04342-0\_22},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/GeorgeTM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GiroireCTSP09,
  author       = {Fr{\'{e}}d{\'{e}}ric Giroire and
                  Jaideep Chandrashekar and
                  Nina Taft and
                  Eve M. Schooler and
                  Dina Papagiannaki},
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {Exploiting Temporal Persistence to Detect Covert Botnet Channels},
  booktitle    = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  pages        = {326--345},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0\_17},
  doi          = {10.1007/978-3-642-04342-0\_17},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/GiroireCTSP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GriffinSHC09,
  author       = {Kent Griffin and
                  Scott Schneider and
                  Xin Hu and
                  Tzi{-}cker Chiueh},
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {Automatic Generation of String Signatures for Malware Detection},
  booktitle    = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  pages        = {101--120},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0\_6},
  doi          = {10.1007/978-3-642-04342-0\_6},
  timestamp    = {Thu, 28 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/GriffinSHC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/HulbojJ09,
  author       = {Milosz Marian Hulboj and
                  Ryszard Erazm Jurga},
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {{CERN} Investigation of Network Behaviour and Anomaly Detection},
  booktitle    = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  pages        = {353--354},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0\_21},
  doi          = {10.1007/978-3-642-04342-0\_21},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/HulbojJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/InoueSEYN09,
  author       = {Daisuke Inoue and
                  Mio Suzuki and
                  Masashi Eto and
                  Katsunari Yoshioka and
                  Koji Nakao},
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {{DAEDALUS:} Novel Application of Large-Scale Darknet Monitoring for
                  Practical Protection of Live Networks},
  booktitle    = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  pages        = {381--382},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0\_33},
  doi          = {10.1007/978-3-642-04342-0\_33},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/InoueSEYN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/JacobDF09,
  author       = {Gr{\'{e}}goire Jacob and
                  Herv{\'{e}} Debar and
                  Eric Filiol},
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {Malware Behavioral Detection by Attribute-Automata Using Abstraction
                  from Platform and Language},
  booktitle    = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  pages        = {81--100},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0\_5},
  doi          = {10.1007/978-3-642-04342-0\_5},
  timestamp    = {Thu, 28 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/JacobDF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/JavedASK09,
  author       = {Mobin Javed and
                  Ayesha Binte Ashfaq and
                  M. Zubair Shafiq and
                  Syed Ali Khayam},
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {On the Inefficient Use of Entropy for Anomaly Detection},
  booktitle    = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  pages        = {369--370},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0\_28},
  doi          = {10.1007/978-3-642-04342-0\_28},
  timestamp    = {Wed, 27 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/JavedASK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/LiGFLL09,
  author       = {Yang Li and
                  Li Guo and
                  Binxing Fang and
                  Xiangtao Liu and
                  Lin Qi},
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {An Experimental Study on Instance Selection Schemes for Efficient
                  Network Anomaly Detection},
  booktitle    = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  pages        = {346--347},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0\_18},
  doi          = {10.1007/978-3-642-04342-0\_18},
  timestamp    = {Thu, 22 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/LiGFLL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/LiGR09,
  author       = {Peng Li and
                  Debin Gao and
                  Michael K. Reiter},
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {Automatically Adapting a Trained Anomaly Detector to Software Patches},
  booktitle    = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  pages        = {142--160},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0\_8},
  doi          = {10.1007/978-3-642-04342-0\_8},
  timestamp    = {Mon, 23 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/LiGR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/LiuYZC09,
  author       = {Lei Liu and
                  Guanhua Yan and
                  Xinwen Zhang and
                  Songqing Chen},
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {VirusMeter: Preventing Your Cellphone from Spies},
  booktitle    = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  pages        = {244--264},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0\_13},
  doi          = {10.1007/978-3-642-04342-0\_13},
  timestamp    = {Fri, 01 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/LiuYZC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/LuYPL09,
  author       = {Long Lu and
                  Vinod Yegneswaran and
                  Phillip A. Porras and
                  Wenke Lee},
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {{BLADE:} Slashing the Invisible Channel of Drive-by Download Malware},
  booktitle    = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  pages        = {350--352},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0\_20},
  doi          = {10.1007/978-3-642-04342-0\_20},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/LuYPL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/LuchaupSEJ09,
  author       = {Daniel Luchaup and
                  Randy Smith and
                  Cristian Estan and
                  Somesh Jha},
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {Multi-byte Regular Expression Matching with Speculation},
  booktitle    = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  pages        = {284--303},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0\_15},
  doi          = {10.1007/978-3-642-04342-0\_15},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/LuchaupSEJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MaggiRKV09,
  author       = {Federico Maggi and
                  William K. Robertson and
                  Christopher Kr{\"{u}}gel and
                  Giovanni Vigna},
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {Protecting a Moving Target: Addressing Web Application Concept Drift},
  booktitle    = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  pages        = {21--40},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0\_2},
  doi          = {10.1007/978-3-642-04342-0\_2},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/MaggiRKV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Massicotte09,
  author       = {Fr{\'{e}}d{\'{e}}ric Massicotte},
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {Packet Space Analysis of Intrusion Detection Signatures},
  booktitle    = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  pages        = {365--366},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0\_26},
  doi          = {10.1007/978-3-642-04342-0\_26},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/Massicotte09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Montigny-LeboeufCM09,
  author       = {Annie De Montigny{-}Leboeuf and
                  Mathieu Couture and
                  Fr{\'{e}}d{\'{e}}ric Massicotte},
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {Traffic Behaviour Characterization Using NetMate},
  booktitle    = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  pages        = {367--368},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0\_27},
  doi          = {10.1007/978-3-642-04342-0\_27},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/Montigny-LeboeufCM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/NoreenMSF09,
  author       = {Sadia Noreen and
                  Shafaq Murtaza and
                  M. Zubair Shafiq and
                  Muddassar Farooq},
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {Using Formal Grammar and Genetic Operators to Evolve Malware},
  booktitle    = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  pages        = {374--375},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0\_30},
  doi          = {10.1007/978-3-642-04342-0\_30},
  timestamp    = {Wed, 27 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/NoreenMSF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/RehakSFPGSBE09,
  author       = {Martin Reh{\'{a}}k and
                  Eugen Staab and
                  Volker Fusenig and
                  Michal Pechoucek and
                  Martin Grill and
                  Jan Stiborek and
                  Karel Bartos and
                  Thomas Engel},
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {Runtime Monitoring and Dynamic Reconfiguration for Intrusion Detection
                  Systems},
  booktitle    = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  pages        = {61--80},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0\_4},
  doi          = {10.1007/978-3-642-04342-0\_4},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/RehakSFPGSBE09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/RozenbergGEF09,
  author       = {Boris Rozenberg and
                  Ehud Gudes and
                  Yuval Elovici and
                  Yuval Fledel},
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {Method for Detecting Unknown Malicious Executables},
  booktitle    = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  pages        = {376--377},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0\_31},
  doi          = {10.1007/978-3-642-04342-0\_31},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/RozenbergGEF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ShabtaiKE09,
  author       = {Asaf Shabtai and
                  Uri Kanonov and
                  Yuval Elovici},
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {Detection, Alert and Response to Malicious Behavior in Mobile Devices:
                  Knowledge-Based Approach},
  booktitle    = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  pages        = {357--358},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0\_23},
  doi          = {10.1007/978-3-642-04342-0\_23},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ShabtaiKE09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ShafiqTMF09,
  author       = {M. Zubair Shafiq and
                  S. Momina Tabish and
                  Fauzan Mirza and
                  Muddassar Farooq},
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {PE-Miner: Mining Structural Information to Detect Malicious Executables
                  in Realtime},
  booktitle    = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  pages        = {121--141},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0\_7},
  doi          = {10.1007/978-3-642-04342-0\_7},
  timestamp    = {Wed, 27 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/ShafiqTMF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/VasiliadisPAMI09,
  author       = {Giorgos Vasiliadis and
                  Michalis Polychronakis and
                  Spyros Antonatos and
                  Evangelos P. Markatos and
                  Sotiris Ioannidis},
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {Regular Expression Matching on Graphics Hardware for Intrusion Detection},
  booktitle    = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  pages        = {265--283},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0\_14},
  doi          = {10.1007/978-3-642-04342-0\_14},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/VasiliadisPAMI09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/WangGK09,
  author       = {Wei Wang and
                  Thomas Guyet and
                  Svein J. Knapskog},
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {Autonomic Intrusion Detection System},
  booktitle    = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  pages        = {359--361},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0\_24},
  doi          = {10.1007/978-3-642-04342-0\_24},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/WangGK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/XuanCB09,
  author       = {Chaoting Xuan and
                  John A. Copeland and
                  Raheem A. Beyah},
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {Toward Revealing Kernel Malware Behavior in Virtual Execution Environments},
  booktitle    = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  pages        = {304--325},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0\_16},
  doi          = {10.1007/978-3-642-04342-0\_16},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/XuanCB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/YanEG09,
  author       = {Guanhua Yan and
                  Stephan J. Eidenbenz and
                  Emanuele Galli},
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {SMS-Watchdog: Profiling Social Behaviors of {SMS} Users for Anomaly
                  Detection},
  booktitle    = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  pages        = {202--223},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0\_11},
  doi          = {10.1007/978-3-642-04342-0\_11},
  timestamp    = {Wed, 11 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/YanEG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ZahidSKF09,
  author       = {Saira Zahid and
                  Muhammad Shahzad and
                  Syed Ali Khayam and
                  Muddassar Farooq},
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {Keystroke-Based User Identification on Smart Phones},
  booktitle    = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  pages        = {224--243},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0\_12},
  doi          = {10.1007/978-3-642-04342-0\_12},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ZahidSKF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/raid/2009,
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0},
  doi          = {10.1007/978-3-642-04342-0},
  isbn         = {978-3-642-04341-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/AbdelnurSF08,
  author       = {Humberto J. Abdelnur and
                  Radu State and
                  Olivier Festor},
  editor       = {Richard Lippmann and
                  Engin Kirda and
                  Ari Trachtenberg},
  title        = {Advanced Network Fingerprinting},
  booktitle    = {Recent Advances in Intrusion Detection, 11th International Symposium,
                  {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5230},
  pages        = {372--389},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87403-4\_20},
  doi          = {10.1007/978-3-540-87403-4\_20},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/AbdelnurSF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/AlmgrenLJ08,
  author       = {Magnus Almgren and
                  Ulf Lindqvist and
                  Erland Jonsson},
  editor       = {Richard Lippmann and
                  Engin Kirda and
                  Ari Trachtenberg},
  title        = {A Multi-Sensor Model to Improve Automated Attack Detection},
  booktitle    = {Recent Advances in Intrusion Detection, 11th International Symposium,
                  {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5230},
  pages        = {291--310},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87403-4\_16},
  doi          = {10.1007/978-3-540-87403-4\_16},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/AlmgrenLJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/AshfaqRMASK08,
  author       = {Ayesha Binte Ashfaq and
                  Maria Joseph Robert and
                  Asma Mumtaz and
                  Muhammad Qasim Ali and
                  Ali Sajjad and
                  Syed Ali Khayam},
  editor       = {Richard Lippmann and
                  Engin Kirda and
                  Ari Trachtenberg},
  title        = {A Comparative Evaluation of Anomaly Detectors under Portscan Attacks},
  booktitle    = {Recent Advances in Intrusion Detection, 11th International Symposium,
                  {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5230},
  pages        = {351--371},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87403-4\_19},
  doi          = {10.1007/978-3-540-87403-4\_19},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/AshfaqRMASK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BratusBKS08,
  author       = {Sergey Bratus and
                  Joshua Brody and
                  David Kotz and
                  Anna Shubina},
  editor       = {Richard Lippmann and
                  Engin Kirda and
                  Ari Trachtenberg},
  title        = {Streaming Estimation of Information-Theoretic Metrics for Anomaly
                  Detection (Extended Abstract)},
  booktitle    = {Recent Advances in Intrusion Detection, 11th International Symposium,
                  {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5230},
  pages        = {412--414},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87403-4\_32},
  doi          = {10.1007/978-3-540-87403-4\_32},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/BratusBKS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BrownR08,
  author       = {Andrew Brown and
                  Mark Ryan},
  editor       = {Richard Lippmann and
                  Engin Kirda and
                  Ari Trachtenberg},
  title        = {Monitoring the Execution of Third-Party Software on Mobile Devices},
  booktitle    = {Recent Advances in Intrusion Detection, 11th International Symposium,
                  {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5230},
  pages        = {410--411},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87403-4\_31},
  doi          = {10.1007/978-3-540-87403-4\_31},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/BrownR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/CaputoSSCK08,
  author       = {Deanna D. Caputo and
                  Greg Stephens and
                  Brad Stephenson and
                  Megan Cormier and
                  Minna Kim},
  editor       = {Richard Lippmann and
                  Engin Kirda and
                  Ari Trachtenberg},
  title        = {An Empirical Approach to Identify Information Misuse by Insiders (Extended
                  Abstract)},
  booktitle    = {Recent Advances in Intrusion Detection, 11th International Symposium,
                  {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5230},
  pages        = {402--403},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87403-4\_27},
  doi          = {10.1007/978-3-540-87403-4\_27},
  timestamp    = {Tue, 21 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/CaputoSSCK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/CavallaroS08,
  author       = {Lorenzo Cavallaro and
                  R. Sekar},
  editor       = {Richard Lippmann and
                  Engin Kirda and
                  Ari Trachtenberg},
  title        = {Anomalous Taint Detection},
  booktitle    = {Recent Advances in Intrusion Detection, 11th International Symposium,
                  {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5230},
  pages        = {417--418},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87403-4\_34},
  doi          = {10.1007/978-3-540-87403-4\_34},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/CavallaroS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/CheetancheriALWR08,
  author       = {Senthilkumar G. Cheetancheri and
                  John Mark Agosta and
                  Karl N. Levitt and
                  Shyhtsun Felix Wu and
                  Jeff Rowe},
  editor       = {Richard Lippmann and
                  Engin Kirda and
                  Ari Trachtenberg},
  title        = {Optimal Cost, Collaborative, and Distributed Response to Zero-Day
                  Worms - {A} Control Theoretic Approach},
  booktitle    = {Recent Advances in Intrusion Detection, 11th International Symposium,
                  {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5230},
  pages        = {231--250},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87403-4\_13},
  doi          = {10.1007/978-3-540-87403-4\_13},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/CheetancheriALWR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ChungM08,
  author       = {Simon P. Chung and
                  Aloysius K. Mok},
  editor       = {Richard Lippmann and
                  Engin Kirda and
                  Ari Trachtenberg},
  title        = {Swarm Attacks against Network-Level Emulation/Analysis},
  booktitle    = {Recent Advances in Intrusion Detection, 11th International Symposium,
                  {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5230},
  pages        = {175--190},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87403-4\_10},
  doi          = {10.1007/978-3-540-87403-4\_10},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ChungM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/CollinsR08,
  author       = {M. Patrick Collins and
                  Michael K. Reiter},
  editor       = {Richard Lippmann and
                  Engin Kirda and
                  Ari Trachtenberg},
  title        = {On the Limits of Payload-Oblivious Network Attack Detection},
  booktitle    = {Recent Advances in Intrusion Detection, 11th International Symposium,
                  {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5230},
  pages        = {251--270},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87403-4\_14},
  doi          = {10.1007/978-3-540-87403-4\_14},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/CollinsR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Dagorn08,
  author       = {Nathalie Dagorn},
  editor       = {Richard Lippmann and
                  Engin Kirda and
                  Ari Trachtenberg},
  title        = {WebIDS: {A} Cooperative Bayesian Anomaly-Based Intrusion Detection
                  System for Web Applications (Extended Abstract)},
  booktitle    = {Recent Advances in Intrusion Detection, 11th International Symposium,
                  {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5230},
  pages        = {392--393},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87403-4\_22},
  doi          = {10.1007/978-3-540-87403-4\_22},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/Dagorn08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/DregerFPS08,
  author       = {Holger Dreger and
                  Anja Feldmann and
                  Vern Paxson and
                  Robin Sommer},
  editor       = {Richard Lippmann and
                  Engin Kirda and
                  Ari Trachtenberg},
  title        = {Predicting the Resource Consumption of Network Intrusion Detection
                  Systems},
  booktitle    = {Recent Advances in Intrusion Detection, 11th International Symposium,
                  {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5230},
  pages        = {135--154},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87403-4\_8},
  doi          = {10.1007/978-3-540-87403-4\_8},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/DregerFPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GianvecchioWWJ08,
  author       = {Steven Gianvecchio and
                  Haining Wang and
                  Duminda Wijesekera and
                  Sushil Jajodia},
  editor       = {Richard Lippmann and
                  Engin Kirda and
                  Ari Trachtenberg},
  title        = {Model-Based Covert Timing Channels: Automated Modeling and Evasion},
  booktitle    = {Recent Advances in Intrusion Detection, 11th International Symposium,
                  {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5230},
  pages        = {211--230},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87403-4\_12},
  doi          = {10.1007/978-3-540-87403-4\_12},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/GianvecchioWWJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GuoFC08,
  author       = {Fanglu Guo and
                  Peter Ferrie and
                  Tzi{-}cker Chiueh},
  editor       = {Richard Lippmann and
                  Engin Kirda and
                  Ari Trachtenberg},
  title        = {A Study of the Packer Problem and Its Solutions},
  booktitle    = {Recent Advances in Intrusion Detection, 11th International Symposium,
                  {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5230},
  pages        = {98--115},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87403-4\_6},
  doi          = {10.1007/978-3-540-87403-4\_6},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/GuoFC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/JainLS08,
  author       = {Divya Jain and
                  K. Vasanta Lakshmi and
                  Priti Shankar},
  editor       = {Richard Lippmann and
                  Engin Kirda and
                  Ari Trachtenberg},
  title        = {Deep Packet Inspection Using Message Passing Networks},
  booktitle    = {Recent Advances in Intrusion Detection, 11th International Symposium,
                  {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5230},
  pages        = {419--420},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87403-4\_35},
  doi          = {10.1007/978-3-540-87403-4\_35},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/JainLS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/KamraB08,
  author       = {Ashish Kamra and
                  Elisa Bertino},
  editor       = {Richard Lippmann and
                  Engin Kirda and
                  Ari Trachtenberg},
  title        = {Database Intrusion Detection and Response},
  booktitle    = {Recent Advances in Intrusion Detection, 11th International Symposium,
                  {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5230},
  pages        = {400--401},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87403-4\_26},
  doi          = {10.1007/978-3-540-87403-4\_26},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/KamraB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/KillourhyM08,
  author       = {Kevin S. Killourhy and
                  Roy A. Maxion},
  editor       = {Richard Lippmann and
                  Engin Kirda and
                  Ari Trachtenberg},
  title        = {The Effect of Clock Resolution on Keystroke Dynamics},
  booktitle    = {Recent Advances in Intrusion Detection, 11th International Symposium,
                  {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5230},
  pages        = {331--350},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87403-4\_18},
  doi          = {10.1007/978-3-540-87403-4\_18},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/KillourhyM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/LeeC08,
  author       = {Junsup Lee and
                  Sung Deok Cha},
  editor       = {Richard Lippmann and
                  Engin Kirda and
                  Ari Trachtenberg},
  title        = {Page-Based Anomaly Detection in Large Scale Web Clusters Using Adaptive
                  MapReduce (Extended Abstract)},
  booktitle    = {Recent Advances in Intrusion Detection, 11th International Symposium,
                  {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5230},
  pages        = {404--405},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87403-4\_28},
  doi          = {10.1007/978-3-540-87403-4\_28},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/LeeC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/LiomaMGBBPH08,
  author       = {Christina Lioma and
                  Marie{-}Francine Moens and
                  Juan{-}Carlos Gomez and
                  Jan De Beer and
                  Andr{\'{e}} Bergholz and
                  Gerhard Paass and
                  Patrick Horkan},
  editor       = {Richard Lippmann and
                  Engin Kirda and
                  Ari Trachtenberg},
  title        = {Anticipating Hidden Text Salting in Emails},
  booktitle    = {Recent Advances in Intrusion Detection, 11th International Symposium,
                  {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5230},
  pages        = {396--397},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87403-4\_24},
  doi          = {10.1007/978-3-540-87403-4\_24},
  timestamp    = {Tue, 11 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/LiomaMGBBPH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/LuG08,
  author       = {Wei Lu and
                  Ali A. Ghorbani},
  editor       = {Richard Lippmann and
                  Engin Kirda and
                  Ari Trachtenberg},
  title        = {Bots Behaviors vs. Human Behaviors on Large-Scale Communication Networks
                  (Extended Abstract)},
  booktitle    = {Recent Advances in Intrusion Detection, 11th International Symposium,
                  {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5230},
  pages        = {415--416},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87403-4\_33},
  doi          = {10.1007/978-3-540-87403-4\_33},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/LuG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MartignoniSFJM08,
  author       = {Lorenzo Martignoni and
                  Elizabeth Stinson and
                  Matt Fredrikson and
                  Somesh Jha and
                  John C. Mitchell},
  editor       = {Richard Lippmann and
                  Engin Kirda and
                  Ari Trachtenberg},
  title        = {A Layered Architecture for Detecting Malicious Behaviors},
  booktitle    = {Recent Advances in Intrusion Detection, 11th International Symposium,
                  {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5230},
  pages        = {78--97},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87403-4\_5},
  doi          = {10.1007/978-3-540-87403-4\_5},
  timestamp    = {Thu, 28 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/MartignoniSFJM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/McAllisterKK08,
  author       = {Sean McAllister and
                  Engin Kirda and
                  Christopher Kruegel},
  editor       = {Richard Lippmann and
                  Engin Kirda and
                  Ari Trachtenberg},
  title        = {Leveraging User Interactions for In-Depth Testing of Web Applications},
  booktitle    = {Recent Advances in Intrusion Detection, 11th International Symposium,
                  {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5230},
  pages        = {191--210},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87403-4\_11},
  doi          = {10.1007/978-3-540-87403-4\_11},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/McAllisterKK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Modelo-HowardBL08,
  author       = {Gaspar Modelo{-}Howard and
                  Saurabh Bagchi and
                  Guy Lebanon},
  editor       = {Richard Lippmann and
                  Engin Kirda and
                  Ari Trachtenberg},
  title        = {Determining Placement of Intrusion Detectors for a Distributed Application
                  through Bayesian Network Modeling},
  booktitle    = {Recent Advances in Intrusion Detection, 11th International Symposium,
                  {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5230},
  pages        = {271--290},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87403-4\_15},
  doi          = {10.1007/978-3-540-87403-4\_15},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/Modelo-HowardBL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/NassarSF08,
  author       = {Mohamed Nassar and
                  Radu State and
                  Olivier Festor},
  editor       = {Richard Lippmann and
                  Engin Kirda and
                  Ari Trachtenberg},
  title        = {Monitoring {SIP} Traffic Using Support Vector Machines},
  booktitle    = {Recent Advances in Intrusion Detection, 11th International Symposium,
                  {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5230},
  pages        = {311--330},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87403-4\_17},
  doi          = {10.1007/978-3-540-87403-4\_17},
  timestamp    = {Fri, 12 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/NassarSF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/RamsbrockWJ08,
  author       = {Daniel Ramsbrock and
                  Xinyuan Wang and
                  Xuxian Jiang},
  editor       = {Richard Lippmann and
                  Engin Kirda and
                  Ari Trachtenberg},
  title        = {A First Step towards Live Botmaster Traceback},
  booktitle    = {Recent Advances in Intrusion Detection, 11th International Symposium,
                  {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5230},
  pages        = {59--77},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87403-4\_4},
  doi          = {10.1007/978-3-540-87403-4\_4},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/RamsbrockWJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/RehakPBGCK08,
  author       = {Martin Reh{\'{a}}k and
                  Michal Pechoucek and
                  Karel Bartos and
                  Martin Grill and
                  Pavel Celeda and
                  Vojtech Krmicek},
  editor       = {Richard Lippmann and
                  Engin Kirda and
                  Ari Trachtenberg},
  title        = {Improving Anomaly Detection Error Rate by Collective Trust Modeling},
  booktitle    = {Recent Advances in Intrusion Detection, 11th International Symposium,
                  {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5230},
  pages        = {398--399},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87403-4\_25},
  doi          = {10.1007/978-3-540-87403-4\_25},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/RehakPBGCK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/RileyJX08,
  author       = {Ryan D. Riley and
                  Xuxian Jiang and
                  Dongyan Xu},
  editor       = {Richard Lippmann and
                  Engin Kirda and
                  Ari Trachtenberg},
  title        = {Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory
                  Shadowing},
  booktitle    = {Recent Advances in Intrusion Detection, 11th International Symposium,
                  {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5230},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87403-4\_1},
  doi          = {10.1007/978-3-540-87403-4\_1},
  timestamp    = {Thu, 17 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/RileyJX08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/RubelPABW08,
  author       = {Paul Rubel and
                  Partha P. Pal and
                  Michael Atighetchi and
                  D. Paul Benjamin and
                  Franklin Webber},
  editor       = {Richard Lippmann and
                  Engin Kirda and
                  Ari Trachtenberg},
  title        = {Anomaly and Specification Based Cognitive Approach for Mission-Level
                  Detection and Response},
  booktitle    = {Recent Advances in Intrusion Detection, 11th International Symposium,
                  {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5230},
  pages        = {408--409},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87403-4\_30},
  doi          = {10.1007/978-3-540-87403-4\_30},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/RubelPABW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/RubinsteinNHJLTT08,
  author       = {Benjamin I. P. Rubinstein and
                  Blaine Nelson and
                  Ling Huang and
                  Anthony D. Joseph and
                  Shing{-}hon Lau and
                  Nina Taft and
                  J. Doug Tygar},
  editor       = {Richard Lippmann and
                  Engin Kirda and
                  Ari Trachtenberg},
  title        = {Evading Anomaly Detection through Variance Injection Attacks on {PCA}},
  booktitle    = {Recent Advances in Intrusion Detection, 11th International Symposium,
                  {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5230},
  pages        = {394--395},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87403-4\_23},
  doi          = {10.1007/978-3-540-87403-4\_23},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/RubinsteinNHJLTT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/SchearAB08,
  author       = {Nabil Schear and
                  David R. Albrecht and
                  Nikita Borisov},
  editor       = {Richard Lippmann and
                  Engin Kirda and
                  Ari Trachtenberg},
  title        = {High-Speed Matching of Vulnerability Signatures},
  booktitle    = {Recent Advances in Intrusion Detection, 11th International Symposium,
                  {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5230},
  pages        = {155--174},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87403-4\_9},
  doi          = {10.1007/978-3-540-87403-4\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/SchearAB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/SrivastavaG08,
  author       = {Abhinav Srivastava and
                  Jonathon T. Giffin},
  editor       = {Richard Lippmann and
                  Engin Kirda and
                  Ari Trachtenberg},
  title        = {Tamper-Resistant, Application-Aware Blocking of Malicious Network
                  Connections},
  booktitle    = {Recent Advances in Intrusion Detection, 11th International Symposium,
                  {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5230},
  pages        = {39--58},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87403-4\_3},
  doi          = {10.1007/978-3-540-87403-4\_3},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/SrivastavaG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/SrivastavaLG08,
  author       = {Abhinav Srivastava and
                  Andrea Lanzi and
                  Jonathon T. Giffin},
  editor       = {Richard Lippmann and
                  Engin Kirda and
                  Ari Trachtenberg},
  title        = {System Call {API} Obfuscation (Extended Abstract)},
  booktitle    = {Recent Advances in Intrusion Detection, 11th International Symposium,
                  {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5230},
  pages        = {421--422},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87403-4\_36},
  doi          = {10.1007/978-3-540-87403-4\_36},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/SrivastavaLG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/StakhanovaSBW08,
  author       = {Natalia Stakhanova and
                  Chris Strasburg and
                  Samik Basu and
                  Johnny S. Wong},
  editor       = {Richard Lippmann and
                  Engin Kirda and
                  Ari Trachtenberg},
  title        = {On Evaluation of Response Cost for Intrusion Response Systems},
  booktitle    = {Recent Advances in Intrusion Detection, 11th International Symposium,
                  {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5230},
  pages        = {390--391},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87403-4\_21},
  doi          = {10.1007/978-3-540-87403-4\_21},
  timestamp    = {Wed, 27 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/StakhanovaSBW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ThonnardVLD08,
  author       = {Olivier Thonnard and
                  Jouni Viinikka and
                  Corrado Leita and
                  Marc Dacier},
  editor       = {Richard Lippmann and
                  Engin Kirda and
                  Ari Trachtenberg},
  title        = {Automating the Analysis of Honeypot Data (Extended Abstract)},
  booktitle    = {Recent Advances in Intrusion Detection, 11th International Symposium,
                  {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5230},
  pages        = {406--407},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87403-4\_29},
  doi          = {10.1007/978-3-540-87403-4\_29},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/ThonnardVLD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/VasiliadisAPMI08,
  author       = {Giorgos Vasiliadis and
                  Spyros Antonatos and
                  Michalis Polychronakis and
                  Evangelos P. Markatos and
                  Sotiris Ioannidis},
  editor       = {Richard Lippmann and
                  Engin Kirda and
                  Ari Trachtenberg},
  title        = {Gnort: High Performance Network Intrusion Detection Using Graphics
                  Processors},
  booktitle    = {Recent Advances in Intrusion Detection, 11th International Symposium,
                  {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5230},
  pages        = {116--134},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87403-4\_7},
  doi          = {10.1007/978-3-540-87403-4\_7},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/VasiliadisAPMI08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/WangJCW08,
  author       = {Zhi Wang and
                  Xuxian Jiang and
                  Weidong Cui and
                  Xinyuan Wang},
  editor       = {Richard Lippmann and
                  Engin Kirda and
                  Ari Trachtenberg},
  title        = {Countering Persistent Kernel Rootkits through Systematic Hook Discovery},
  booktitle    = {Recent Advances in Intrusion Detection, 11th International Symposium,
                  {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5230},
  pages        = {21--38},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87403-4\_2},
  doi          = {10.1007/978-3-540-87403-4\_2},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/WangJCW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/raid/2008,
  editor       = {Richard Lippmann and
                  Engin Kirda and
                  Ari Trachtenberg},
  title        = {Recent Advances in Intrusion Detection, 11th International Symposium,
                  {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5230},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87403-4},
  doi          = {10.1007/978-3-540-87403-4},
  isbn         = {978-3-540-87402-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BaileyOAMJN07,
  author       = {Michael D. Bailey and
                  Jon Oberheide and
                  Jon Andersen and
                  Zhuoqing Morley Mao and
                  Farnam Jahanian and
                  Jose Nazario},
  editor       = {Christopher Kr{\"{u}}gel and
                  Richard Lippmann and
                  Andrew J. Clark},
  title        = {Automated Classification and Analysis of Internet Malware},
  booktitle    = {Recent Advances in Intrusion Detection, 10th International Symposium,
                  {RAID} 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4637},
  pages        = {178--197},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74320-0\_10},
  doi          = {10.1007/978-3-540-74320-0\_10},
  timestamp    = {Mon, 20 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/BaileyOAMJN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ChungM07,
  author       = {Simon P. Chung and
                  Aloysius K. Mok},
  editor       = {Christopher Kr{\"{u}}gel and
                  Richard Lippmann and
                  Andrew J. Clark},
  title        = {Advanced Allergy Attacks: Does a Corpus Really Help?},
  booktitle    = {Recent Advances in Intrusion Detection, 10th International Symposium,
                  {RAID} 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4637},
  pages        = {236--255},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74320-0\_13},
  doi          = {10.1007/978-3-540-74320-0\_13},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ChungM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/CollinsR07,
  author       = {M. Patrick Collins and
                  Michael K. Reiter},
  editor       = {Christopher Kr{\"{u}}gel and
                  Richard Lippmann and
                  Andrew J. Clark},
  title        = {Hit-List Worm Detection and Bot Identification in Large Networks Using
                  Protocol Graphs},
  booktitle    = {Recent Advances in Intrusion Detection, 10th International Symposium,
                  {RAID} 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4637},
  pages        = {276--295},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74320-0\_15},
  doi          = {10.1007/978-3-540-74320-0\_15},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/CollinsR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/CovaBFV07,
  author       = {Marco Cova and
                  Davide Balzarotti and
                  Viktoria Felmetsger and
                  Giovanni Vigna},
  editor       = {Christopher Kr{\"{u}}gel and
                  Richard Lippmann and
                  Andrew J. Clark},
  title        = {Swaddler: An Approach for the Anomaly-Based Detection of State Violations
                  in Web Applications},
  booktitle    = {Recent Advances in Intrusion Detection, 10th International Symposium,
                  {RAID} 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4637},
  pages        = {63--86},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74320-0\_4},
  doi          = {10.1007/978-3-540-74320-0\_4},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/CovaBFV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/InghamI07,
  author       = {Kenneth L. Ingham and
                  Hajime Inoue},
  editor       = {Christopher Kr{\"{u}}gel and
                  Richard Lippmann and
                  Andrew J. Clark},
  title        = {Comparing Anomaly Detection Techniques for {HTTP}},
  booktitle    = {Recent Advances in Intrusion Detection, 10th International Symposium,
                  {RAID} 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4637},
  pages        = {42--62},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74320-0\_3},
  doi          = {10.1007/978-3-540-74320-0\_3},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/InghamI07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/JiangW07,
  author       = {Xuxian Jiang and
                  Xinyuan Wang},
  editor       = {Christopher Kr{\"{u}}gel and
                  Richard Lippmann and
                  Andrew J. Clark},
  title        = {"Out-of-the-Box" Monitoring of VM-Based High-Interaction Honeypots},
  booktitle    = {Recent Advances in Intrusion Detection, 10th International Symposium,
                  {RAID} 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4637},
  pages        = {198--218},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74320-0\_11},
  doi          = {10.1007/978-3-540-74320-0\_11},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/JiangW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/LangeDB07,
  author       = {John R. Lange and
                  Peter A. Dinda and
                  Fabi{\'{a}}n E. Bustamante},
  editor       = {Christopher Kr{\"{u}}gel and
                  Richard Lippmann and
                  Andrew J. Clark},
  title        = {Vortex: Enabling Cooperative Selective Wormholing for Network Security
                  Systems},
  booktitle    = {Recent Advances in Intrusion Detection, 10th International Symposium,
                  {RAID} 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4637},
  pages        = {317--336},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74320-0\_17},
  doi          = {10.1007/978-3-540-74320-0\_17},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/LangeDB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/LiWC07,
  author       = {Zhuowei Li and
                  XiaoFeng Wang and
                  Jong Youl Choi},
  editor       = {Christopher Kr{\"{u}}gel and
                  Richard Lippmann and
                  Andrew J. Clark},
  title        = {SpyShield: Preserving Privacy from Spy Add-Ons},
  booktitle    = {Recent Advances in Intrusion Detection, 10th International Symposium,
                  {RAID} 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4637},
  pages        = {296--316},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74320-0\_16},
  doi          = {10.1007/978-3-540-74320-0\_16},
  timestamp    = {Wed, 02 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/LiWC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MaggiZ07,
  author       = {Federico Maggi and
                  Stefano Zanero},
  editor       = {Christopher Kr{\"{u}}gel and
                  Richard Lippmann and
                  Andrew J. Clark},
  title        = {On the Use of Different Statistical Tests for Alert Correlation -
                  Short Paper},
  booktitle    = {Recent Advances in Intrusion Detection, 10th International Symposium,
                  {RAID} 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4637},
  pages        = {167--177},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74320-0\_9},
  doi          = {10.1007/978-3-540-74320-0\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/MaggiZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MaloofS07,
  author       = {Marcus A. Maloof and
                  Gregory D. Stephens},
  editor       = {Christopher Kr{\"{u}}gel and
                  Richard Lippmann and
                  Andrew J. Clark},
  title        = {elicit: {A} System for Detecting Insiders Who Violate Need-to-Know},
  booktitle    = {Recent Advances in Intrusion Detection, 10th International Symposium,
                  {RAID} 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4637},
  pages        = {146--166},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74320-0\_8},
  doi          = {10.1007/978-3-540-74320-0\_8},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/MaloofS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MutzRVK07,
  author       = {Darren Mutz and
                  William K. Robertson and
                  Giovanni Vigna and
                  Richard A. Kemmerer},
  editor       = {Christopher Kr{\"{u}}gel and
                  Richard Lippmann and
                  Andrew J. Clark},
  title        = {Exploiting Execution Context for the Detection of Anomalous System
                  Calls},
  booktitle    = {Recent Advances in Intrusion Detection, 10th International Symposium,
                  {RAID} 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4637},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74320-0\_1},
  doi          = {10.1007/978-3-540-74320-0\_1},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/MutzRVK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/PolychronakisAM07,
  author       = {Michalis Polychronakis and
                  Kostas G. Anagnostakis and
                  Evangelos P. Markatos},
  editor       = {Christopher Kr{\"{u}}gel and
                  Richard Lippmann and
                  Andrew J. Clark},
  title        = {Emulation-Based Detection of Non-self-contained Polymorphic Shellcode},
  booktitle    = {Recent Advances in Intrusion Detection, 10th International Symposium,
                  {RAID} 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4637},
  pages        = {87--106},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74320-0\_5},
  doi          = {10.1007/978-3-540-74320-0\_5},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/PolychronakisAM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/SharifSGL07,
  author       = {Monirul Islam Sharif and
                  Kapil Singh and
                  Jonathon T. Giffin and
                  Wenke Lee},
  editor       = {Christopher Kr{\"{u}}gel and
                  Richard Lippmann and
                  Andrew J. Clark},
  title        = {Understanding Precision in Host Based Intrusion Detection},
  booktitle    = {Recent Advances in Intrusion Detection, 10th International Symposium,
                  {RAID} 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4637},
  pages        = {21--41},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74320-0\_2},
  doi          = {10.1007/978-3-540-74320-0\_2},
  timestamp    = {Wed, 11 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/SharifSGL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ToddRBMR07,
  author       = {Adam D. Todd and
                  Richard A. Raines and
                  Rusty O. Baldwin and
                  Barry E. Mullins and
                  Steven K. Rogers},
  editor       = {Christopher Kr{\"{u}}gel and
                  Richard Lippmann and
                  Andrew J. Clark},
  title        = {Alert Verification Evasion Through Server Response Forging},
  booktitle    = {Recent Advances in Intrusion Detection, 10th International Symposium,
                  {RAID} 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4637},
  pages        = {256--275},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74320-0\_14},
  doi          = {10.1007/978-3-540-74320-0\_14},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ToddRBMR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/VallentinSLLPT07,
  author       = {Matthias Vallentin and
                  Robin Sommer and
                  Jason Lee and
                  Craig Leres and
                  Vern Paxson and
                  Brian Tierney},
  editor       = {Christopher Kr{\"{u}}gel and
                  Richard Lippmann and
                  Andrew J. Clark},
  title        = {The {NIDS} Cluster: Scalable, Stateful Network Intrusion Detection
                  on Commodity Hardware},
  booktitle    = {Recent Advances in Intrusion Detection, 10th International Symposium,
                  {RAID} 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4637},
  pages        = {107--126},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74320-0\_6},
  doi          = {10.1007/978-3-540-74320-0\_6},
  timestamp    = {Mon, 22 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/VallentinSLLPT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/WangTLB07,
  author       = {Shiau{-}Huey Wang and
                  Chinyang Henry Tseng and
                  Karl N. Levitt and
                  Matt Bishop},
  editor       = {Christopher Kr{\"{u}}gel and
                  Richard Lippmann and
                  Andrew J. Clark},
  title        = {Cost-Sensitive Intrusion Responses for Mobile Ad Hoc Networks},
  booktitle    = {Recent Advances in Intrusion Detection, 10th International Symposium,
                  {RAID} 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4637},
  pages        = {127--145},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74320-0\_7},
  doi          = {10.1007/978-3-540-74320-0\_7},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/WangTLB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/WilhelmC07,
  author       = {Jeffrey Wilhelm and
                  Tzi{-}cker Chiueh},
  editor       = {Christopher Kr{\"{u}}gel and
                  Richard Lippmann and
                  Andrew J. Clark},
  title        = {A Forced Sampled Execution Approach to Kernel Rootkit Identification},
  booktitle    = {Recent Advances in Intrusion Detection, 10th International Symposium,
                  {RAID} 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4637},
  pages        = {219--235},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74320-0\_12},
  doi          = {10.1007/978-3-540-74320-0\_12},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/WilhelmC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/raid/2007,
  editor       = {Christopher Kr{\"{u}}gel and
                  Richard Lippmann and
                  Andrew J. Clark},
  title        = {Recent Advances in Intrusion Detection, 10th International Symposium,
                  {RAID} 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4637},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74320-0},
  doi          = {10.1007/978-3-540-74320-0},
  isbn         = {978-3-540-74319-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ArnesVVK06,
  author       = {Andr{\'{e}} {\AA}rnes and
                  Fredrik Valeur and
                  Giovanni Vigna and
                  Richard A. Kemmerer},
  editor       = {Diego Zamboni and
                  Christopher Kr{\"{u}}gel},
  title        = {Using Hidden Markov Models to Evaluate the Risks of Intrusions},
  booktitle    = {Recent Advances in Intrusion Detection, 9th International Symposium,
                  {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4219},
  pages        = {145--164},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11856214\_8},
  doi          = {10.1007/11856214\_8},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ArnesVVK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BaecherKHDF06,
  author       = {Paul Baecher and
                  Markus Koetter and
                  Thorsten Holz and
                  Maximillian Dornseif and
                  Felix C. Freiling},
  editor       = {Diego Zamboni and
                  Christopher Kr{\"{u}}gel},
  title        = {The Nepenthes Platform: An Efficient Approach to Collect Malware},
  booktitle    = {Recent Advances in Intrusion Detection, 9th International Symposium,
                  {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4219},
  pages        = {165--184},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11856214\_9},
  doi          = {10.1007/11856214\_9},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/BaecherKHDF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BruijnSRHXB06,
  author       = {Willem de Bruijn and
                  Asia Slowinska and
                  Kees van Reeuwijk and
                  Tom{\'{a}}s Hrub{\'{y}} and
                  Li Xu and
                  Herbert Bos},
  editor       = {Diego Zamboni and
                  Christopher Kr{\"{u}}gel},
  title        = {SafeCard: {A} Gigabit {IPS} on the Network Card},
  booktitle    = {Recent Advances in Intrusion Detection, 9th International Symposium,
                  {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4219},
  pages        = {311--330},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11856214\_16},
  doi          = {10.1007/11856214\_16},
  timestamp    = {Wed, 02 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/BruijnSRHXB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ChungM06,
  author       = {Simon P. Chung and
                  Aloysius K. Mok},
  editor       = {Diego Zamboni and
                  Christopher Kr{\"{u}}gel},
  title        = {Allergy Attack Against Automatic Signature Generation},
  booktitle    = {Recent Advances in Intrusion Detection, 9th International Symposium,
                  {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4219},
  pages        = {61--80},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11856214\_4},
  doi          = {10.1007/11856214\_4},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ChungM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GaoRS06,
  author       = {Debin Gao and
                  Michael K. Reiter and
                  Dawn Xiaodong Song},
  editor       = {Diego Zamboni and
                  Christopher Kr{\"{u}}gel},
  title        = {Behavioral Distance Measurement Using Hidden Markov Models},
  booktitle    = {Recent Advances in Intrusion Detection, 9th International Symposium,
                  {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4219},
  pages        = {19--40},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11856214\_2},
  doi          = {10.1007/11856214\_2},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/GaoRS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GiffinJM06,
  author       = {Jonathon T. Giffin and
                  Somesh Jha and
                  Barton P. Miller},
  editor       = {Diego Zamboni and
                  Christopher Kr{\"{u}}gel},
  title        = {Automated Discovery of Mimicry Attacks},
  booktitle    = {Recent Advances in Intrusion Detection, 9th International Symposium,
                  {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4219},
  pages        = {41--60},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11856214\_3},
  doi          = {10.1007/11856214\_3},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/GiffinJM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GonzalezP06,
  author       = {Jos{\'{e}} M. Gonz{\'{a}}lez and
                  Vern Paxson},
  editor       = {Diego Zamboni and
                  Christopher Kr{\"{u}}gel},
  title        = {Enhancing Network Intrusion Detection with Integrated Sampling and
                  Filtering},
  booktitle    = {Recent Advances in Intrusion Detection, 9th International Symposium,
                  {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4219},
  pages        = {272--289},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11856214\_14},
  doi          = {10.1007/11856214\_14},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/GonzalezP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/HansenTM06,
  author       = {Jeffery P. Hansen and
                  Kymie M. C. Tan and
                  Roy A. Maxion},
  editor       = {Diego Zamboni and
                  Christopher Kr{\"{u}}gel},
  title        = {Anomaly Detector Performance Evaluation Using a Parameterized Environment},
  booktitle    = {Recent Advances in Intrusion Detection, 9th International Symposium,
                  {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4219},
  pages        = {106--126},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11856214\_6},
  doi          = {10.1007/11856214\_6},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/HansenTM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/LeitaDM06,
  author       = {Corrado Leita and
                  Marc Dacier and
                  Fr{\'{e}}d{\'{e}}ric Massicotte},
  editor       = {Diego Zamboni and
                  Christopher Kr{\"{u}}gel},
  title        = {Automatic Handling of Protocol Dependencies and Reaction to 0-Day
                  Attacks with ScriptGen Based Honeypots},
  booktitle    = {Recent Advances in Intrusion Detection, 9th International Symposium,
                  {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4219},
  pages        = {185--205},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11856214\_10},
  doi          = {10.1007/11856214\_10},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/LeitaDM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MehtaBZCW06,
  author       = {Vaibhav Mehta and
                  Constantinos Bartzis and
                  Haifeng Zhu and
                  Edmund M. Clarke and
                  Jeannette M. Wing},
  editor       = {Diego Zamboni and
                  Christopher Kr{\"{u}}gel},
  title        = {Ranking Attack Graphs},
  booktitle    = {Recent Advances in Intrusion Detection, 9th International Symposium,
                  {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4219},
  pages        = {127--144},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11856214\_7},
  doi          = {10.1007/11856214\_7},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/MehtaBZCW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/NewsomeKS06,
  author       = {James Newsome and
                  Brad Karp and
                  Dawn Xiaodong Song},
  editor       = {Diego Zamboni and
                  Christopher Kr{\"{u}}gel},
  title        = {Paragraph: Thwarting Signature Learning by Training Maliciously},
  booktitle    = {Recent Advances in Intrusion Detection, 9th International Symposium,
                  {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4219},
  pages        = {81--105},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11856214\_5},
  doi          = {10.1007/11856214\_5},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/NewsomeKS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/RajabMT06,
  author       = {Moheeb Abu Rajab and
                  Fabian Monrose and
                  Andreas Terzis},
  editor       = {Diego Zamboni and
                  Christopher Kr{\"{u}}gel},
  title        = {Fast and Evasive Attacks: Highlighting the Challenges Ahead},
  booktitle    = {Recent Advances in Intrusion Detection, 9th International Symposium,
                  {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4219},
  pages        = {206--225},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11856214\_11},
  doi          = {10.1007/11856214\_11},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/RajabMT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/SinhaJP06,
  author       = {Sushant Sinha and
                  Farnam Jahanian and
                  Jignesh M. Patel},
  editor       = {Diego Zamboni and
                  Christopher Kr{\"{u}}gel},
  title        = {{WIND:} Workload-Aware INtrusion Detection},
  booktitle    = {Recent Advances in Intrusion Detection, 9th International Symposium,
                  {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4219},
  pages        = {290--310},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11856214\_15},
  doi          = {10.1007/11856214\_15},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/SinhaJP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/TreinenT06,
  author       = {James J. Treinen and
                  Ramakrishna Thurimella},
  editor       = {Diego Zamboni and
                  Christopher Kr{\"{u}}gel},
  title        = {A Framework for the Application of Association Rule Mining in Large
                  Intrusion Detection Infrastructures},
  booktitle    = {Recent Advances in Intrusion Detection, 9th International Symposium,
                  {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4219},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11856214\_1},
  doi          = {10.1007/11856214\_1},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/TreinenT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/TsengWKL06,
  author       = {Chinyang Henry Tseng and
                  Shiau{-}Huey Wang and
                  Calvin Ko and
                  Karl N. Levitt},
  editor       = {Diego Zamboni and
                  Christopher Kr{\"{u}}gel},
  title        = {{DEMEM:} Distributed Evidence-Driven Message Exchange Intrusion Detection
                  Model for {MANET}},
  booktitle    = {Recent Advances in Intrusion Detection, 9th International Symposium,
                  {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4219},
  pages        = {249--271},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11856214\_13},
  doi          = {10.1007/11856214\_13},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/TsengWKL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/WangPS06,
  author       = {Ke Wang and
                  Janak J. Parekh and
                  Salvatore J. Stolfo},
  editor       = {Diego Zamboni and
                  Christopher Kr{\"{u}}gel},
  title        = {Anagram: {A} Content Anomaly Detector Resistant to Mimicry Attack},
  booktitle    = {Recent Advances in Intrusion Detection, 9th International Symposium,
                  {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4219},
  pages        = {226--248},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11856214\_12},
  doi          = {10.1007/11856214\_12},
  timestamp    = {Thu, 24 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/WangPS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/raid/2005,
  editor       = {Alfonso Valdes and
                  Diego Zamboni},
  title        = {Recent Advances in Intrusion Detection, 8th International Symposium,
                  {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3858},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11663812},
  doi          = {10.1007/11663812},
  isbn         = {3-540-31778-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/raid/2006,
  editor       = {Diego Zamboni and
                  Christopher Kr{\"{u}}gel},
  title        = {Recent Advances in Intrusion Detection, 9th International Symposium,
                  {RAID} 2006, Hamburg, Germany, September 20-22, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4219},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11856214},
  doi          = {10.1007/11856214},
  isbn         = {3-540-39723-X},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BosH05,
  author       = {Herbert Bos and
                  Kaiming Huang},
  editor       = {Alfonso Valdes and
                  Diego Zamboni},
  title        = {Towards Software-Based Signature Detection for Intrusion Prevention
                  on the Network Card},
  booktitle    = {Recent Advances in Intrusion Detection, 8th International Symposium,
                  {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3858},
  pages        = {102--123},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11663812\_6},
  doi          = {10.1007/11663812\_6},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/BosH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ChinchaniB05,
  author       = {Ramkumar Chinchani and
                  Eric van den Berg},
  editor       = {Alfonso Valdes and
                  Diego Zamboni},
  title        = {A Fast Static Analysis Approach to Detect Exploit Code Inside Network
                  Flows},
  booktitle    = {Recent Advances in Intrusion Detection, 8th International Symposium,
                  {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3858},
  pages        = {284--308},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11663812\_15},
  doi          = {10.1007/11663812\_15},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ChinchaniB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ChungM05,
  author       = {Simon P. Chung and
                  Aloysius K. Mok},
  editor       = {Alfonso Valdes and
                  Diego Zamboni},
  title        = {On Random-Inspection-Based Intrusion Detection},
  booktitle    = {Recent Advances in Intrusion Detection, 8th International Symposium,
                  {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3858},
  pages        = {165--184},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11663812\_9},
  doi          = {10.1007/11663812\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ChungM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GaoRS05,
  author       = {Debin Gao and
                  Michael K. Reiter and
                  Dawn Xiaodong Song},
  editor       = {Alfonso Valdes and
                  Diego Zamboni},
  title        = {Behavioral Distance for Intrusion Detection},
  booktitle    = {Recent Advances in Intrusion Detection, 8th International Symposium,
                  {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3858},
  pages        = {63--81},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11663812\_4},
  doi          = {10.1007/11663812\_4},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/GaoRS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GiffinDJLM05,
  author       = {Jonathon T. Giffin and
                  David Dagon and
                  Somesh Jha and
                  Wenke Lee and
                  Barton P. Miller},
  editor       = {Alfonso Valdes and
                  Diego Zamboni},
  title        = {Environment-Sensitive Intrusion Detection},
  booktitle    = {Recent Advances in Intrusion Detection, 8th International Symposium,
                  {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3858},
  pages        = {185--206},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11663812\_10},
  doi          = {10.1007/11663812\_10},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/GiffinDJLM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GuoC05,
  author       = {Fanglu Guo and
                  Tzi{-}cker Chiueh},
  editor       = {Alfonso Valdes and
                  Diego Zamboni},
  title        = {Sequence Number-Based {MAC} Address Spoof Detection},
  booktitle    = {Recent Advances in Intrusion Detection, 8th International Symposium,
                  {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3858},
  pages        = {309--329},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11663812\_16},
  doi          = {10.1007/11663812\_16},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/GuoC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/HongW05,
  author       = {Seung{-}Sun Hong and
                  Shyhtsun Felix Wu},
  editor       = {Alfonso Valdes and
                  Diego Zamboni},
  title        = {On Interactive Internet Traffic Replay},
  booktitle    = {Recent Advances in Intrusion Detection, 8th International Symposium,
                  {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3858},
  pages        = {247--264},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11663812\_13},
  doi          = {10.1007/11663812\_13},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/HongW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/JiangXWS05,
  author       = {Xuxian Jiang and
                  Dongyan Xu and
                  Helen J. Wang and
                  Eugene H. Spafford},
  editor       = {Alfonso Valdes and
                  Diego Zamboni},
  title        = {Virtual Playgrounds for Worm Behavior Investigation},
  booktitle    = {Recent Advances in Intrusion Detection, 8th International Symposium,
                  {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3858},
  pages        = {1--21},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11663812\_1},
  doi          = {10.1007/11663812\_1},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/JiangXWS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/KrugelKMRV05,
  author       = {Christopher Kr{\"{u}}gel and
                  Engin Kirda and
                  Darren Mutz and
                  William K. Robertson and
                  Giovanni Vigna},
  editor       = {Alfonso Valdes and
                  Diego Zamboni},
  title        = {Polymorphic Worm Detection Using Structural Information of Executables},
  booktitle    = {Recent Advances in Intrusion Detection, 8th International Symposium,
                  {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3858},
  pages        = {207--226},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11663812\_11},
  doi          = {10.1007/11663812\_11},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/KrugelKMRV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/LocastoWKS05,
  author       = {Michael E. Locasto and
                  Ke Wang and
                  Angelos D. Keromytis and
                  Salvatore J. Stolfo},
  editor       = {Alfonso Valdes and
                  Diego Zamboni},
  title        = {{FLIPS:} Hybrid Adaptive Intrusion Prevention},
  booktitle    = {Recent Advances in Intrusion Detection, 8th International Symposium,
                  {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3858},
  pages        = {82--101},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11663812\_5},
  doi          = {10.1007/11663812\_5},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/LocastoWKS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MuelderMB05,
  author       = {Chris Muelder and
                  Kwan{-}Liu Ma and
                  Tony Bartoletti},
  editor       = {Alfonso Valdes and
                  Diego Zamboni},
  title        = {Interactive Visualization for Network and Port Scan Detection},
  booktitle    = {Recent Advances in Intrusion Detection, 8th International Symposium,
                  {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3858},
  pages        = {265--283},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11663812\_14},
  doi          = {10.1007/11663812\_14},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/MuelderMB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/PietraszekB05,
  author       = {Tadeusz Pietraszek and
                  Chris Vanden Berghe},
  editor       = {Alfonso Valdes and
                  Diego Zamboni},
  title        = {Defending Against Injection Attacks Through Context-Sensitive String
                  Evaluation},
  booktitle    = {Recent Advances in Intrusion Detection, 8th International Symposium,
                  {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3858},
  pages        = {124--145},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11663812\_7},
  doi          = {10.1007/11663812\_7},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/PietraszekB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/SufatrioY05,
  author       = {Sufatrio and
                  Roland H. C. Yap},
  editor       = {Alfonso Valdes and
                  Diego Zamboni},
  title        = {Improving Host-Based {IDS} with Argument Abstraction to Prevent Mimicry
                  Attacks},
  booktitle    = {Recent Advances in Intrusion Detection, 8th International Symposium,
                  {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3858},
  pages        = {146--164},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11663812\_8},
  doi          = {10.1007/11663812\_8},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/SufatrioY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/TotelMM05,
  author       = {Eric Totel and
                  Fr{\'{e}}d{\'{e}}ric Majorczyk and
                  Ludovic M{\'{e}}},
  editor       = {Alfonso Valdes and
                  Diego Zamboni},
  title        = {{COTS} Diversity Based Intrusion Detection and Application to Web
                  Servers},
  booktitle    = {Recent Advances in Intrusion Detection, 8th International Symposium,
                  {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3858},
  pages        = {43--62},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11663812\_3},
  doi          = {10.1007/11663812\_3},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/TotelMM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/TsengSBKL05,
  author       = {Chinyang Henry Tseng and
                  Tao Song and
                  Poornima Balasubramanyam and
                  Calvin Ko and
                  Karl N. Levitt},
  editor       = {Alfonso Valdes and
                  Diego Zamboni},
  title        = {A Specification-Based Intrusion Detection Model for {OLSR}},
  booktitle    = {Recent Advances in Intrusion Detection, 8th International Symposium,
                  {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3858},
  pages        = {330--350},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11663812\_17},
  doi          = {10.1007/11663812\_17},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/TsengSBKL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/WangCS05,
  author       = {Ke Wang and
                  Gabriela F. Cretu and
                  Salvatore J. Stolfo},
  editor       = {Alfonso Valdes and
                  Diego Zamboni},
  title        = {Anomalous Payload-Based Worm Detection and Signature Generation},
  booktitle    = {Recent Advances in Intrusion Detection, 8th International Symposium,
                  {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3858},
  pages        = {227--246},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11663812\_12},
  doi          = {10.1007/11663812\_12},
  timestamp    = {Thu, 24 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/WangCS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/WongBSW05,
  author       = {Cynthia Wong and
                  Stan Bielski and
                  Ahren Studer and
                  Chenxi Wang},
  editor       = {Alfonso Valdes and
                  Diego Zamboni},
  title        = {Empirical Analysis of Rate Limiting Mechanisms},
  booktitle    = {Recent Advances in Intrusion Detection, 8th International Symposium,
                  {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3858},
  pages        = {22--42},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11663812\_2},
  doi          = {10.1007/11663812\_2},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/WongBSW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BlumSV04,
  author       = {Avrim Blum and
                  Dawn Xiaodong Song and
                  Shobha Venkataraman},
  editor       = {Erland Jonsson and
                  Alfonso Valdes and
                  Magnus Almgren},
  title        = {Detection of Interactive Stepping Stones: Algorithms and Confidence
                  Bounds},
  booktitle    = {Recent Advances in Intrusion Detection: 7th International Symposium,
                  {RAID} 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3224},
  pages        = {258--277},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30143-1\_14},
  doi          = {10.1007/978-3-540-30143-1\_14},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/BlumSV04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/DagonQGLGLO04,
  author       = {David Dagon and
                  Xinzhou Qin and
                  Guofei Gu and
                  Wenke Lee and
                  Julian B. Grizzard and
                  John G. Levine and
                  Henry L. Owen},
  editor       = {Erland Jonsson and
                  Alfonso Valdes and
                  Magnus Almgren},
  title        = {HoneyStat: Local Worm Detection Using Honeypots},
  booktitle    = {Recent Advances in Intrusion Detection: 7th International Symposium,
                  {RAID} 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3224},
  pages        = {39--58},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30143-1\_3},
  doi          = {10.1007/978-3-540-30143-1\_3},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/DagonQGLGLO04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GehaniK04,
  author       = {Ashish Gehani and
                  Gershon Kedem},
  editor       = {Erland Jonsson and
                  Alfonso Valdes and
                  Magnus Almgren},
  title        = {RheoStat: Real-Time Risk Management},
  booktitle    = {Recent Advances in Intrusion Detection: 7th International Symposium,
                  {RAID} 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3224},
  pages        = {296--314},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30143-1\_16},
  doi          = {10.1007/978-3-540-30143-1\_16},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/GehaniK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/HernackiBL04,
  author       = {Brian Hernacki and
                  Jeremy Bennett and
                  Thomas Lofgren},
  editor       = {Erland Jonsson and
                  Alfonso Valdes and
                  Magnus Almgren},
  title        = {Symantec Deception Server Experience with a Commercial Deception System},
  booktitle    = {Recent Advances in Intrusion Detection: 7th International Symposium,
                  {RAID} 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3224},
  pages        = {188--202},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30143-1\_10},
  doi          = {10.1007/978-3-540-30143-1\_10},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/HernackiBL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/HuM04,
  author       = {Ruiqi Hu and
                  Aloysius K. Mok},
  editor       = {Erland Jonsson and
                  Alfonso Valdes and
                  Magnus Almgren},
  title        = {Detecting Unknown Massive Mailing Viruses Using Proactive Methods},
  booktitle    = {Recent Advances in Intrusion Detection: 7th International Symposium,
                  {RAID} 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3224},
  pages        = {82--101},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30143-1\_5},
  doi          = {10.1007/978-3-540-30143-1\_5},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/HuM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/HuangL04,
  author       = {Yi{-}an Huang and
                  Wenke Lee},
  editor       = {Erland Jonsson and
                  Alfonso Valdes and
                  Magnus Almgren},
  title        = {Attack Analysis and Detection for Ad Hoc Routing Protocols},
  booktitle    = {Recent Advances in Intrusion Detection: 7th International Symposium,
                  {RAID} 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3224},
  pages        = {125--145},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30143-1\_7},
  doi          = {10.1007/978-3-540-30143-1\_7},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/HuangL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/LamC04,
  author       = {Lap{-}Chung Lam and
                  Tzi{-}cker Chiueh},
  editor       = {Erland Jonsson and
                  Alfonso Valdes and
                  Magnus Almgren},
  title        = {Automatic Extraction of Accurate Application-Specific Sandboxing Policy},
  booktitle    = {Recent Advances in Intrusion Detection: 7th International Symposium,
                  {RAID} 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3224},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30143-1\_1},
  doi          = {10.1007/978-3-540-30143-1\_1},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/LamC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/OkaOAK04,
  author       = {Mizuki Oka and
                  Yoshihiro Oyama and
                  Hirotake Abe and
                  Kazuhiko Kato},
  editor       = {Erland Jonsson and
                  Alfonso Valdes and
                  Magnus Almgren},
  title        = {Anomaly Detection Using Layered Networks Based on Eigen Co-occurrence
                  Matrix},
  booktitle    = {Recent Advances in Intrusion Detection: 7th International Symposium,
                  {RAID} 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3224},
  pages        = {223--237},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30143-1\_12},
  doi          = {10.1007/978-3-540-30143-1\_12},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/OkaOAK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Pietraszek04,
  author       = {Tadeusz Pietraszek},
  editor       = {Erland Jonsson and
                  Alfonso Valdes and
                  Magnus Almgren},
  title        = {Using Adaptive Alert Classification to Reduce False Positives in Intrusion
                  Detection},
  booktitle    = {Recent Advances in Intrusion Detection: 7th International Symposium,
                  {RAID} 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3224},
  pages        = {102--124},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30143-1\_6},
  doi          = {10.1007/978-3-540-30143-1\_6},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/Pietraszek04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/SchechterJB04,
  author       = {Stuart E. Schechter and
                  Jaeyeon Jung and
                  Arthur W. Berger},
  editor       = {Erland Jonsson and
                  Alfonso Valdes and
                  Magnus Almgren},
  title        = {Fast Detection of Scanning Worm Infections},
  booktitle    = {Recent Advances in Intrusion Detection: 7th International Symposium,
                  {RAID} 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3224},
  pages        = {59--81},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30143-1\_4},
  doi          = {10.1007/978-3-540-30143-1\_4},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/SchechterJB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/SongKAZL04,
  author       = {Tao Song and
                  Calvin Ko and
                  Jim Alves{-}Foss and
                  Cui Zhang and
                  Karl N. Levitt},
  editor       = {Erland Jonsson and
                  Alfonso Valdes and
                  Magnus Almgren},
  title        = {Formal Reasoning About Intrusion Detection Systems},
  booktitle    = {Recent Advances in Intrusion Detection: 7th International Symposium,
                  {RAID} 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3224},
  pages        = {278--295},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30143-1\_15},
  doi          = {10.1007/978-3-540-30143-1\_15},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/SongKAZL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ViinikkaD04,
  author       = {Jouni Viinikka and
                  Herv{\'{e}} Debar},
  editor       = {Erland Jonsson and
                  Alfonso Valdes and
                  Magnus Almgren},
  title        = {Monitoring {IDS} Background Noise Using {EWMA} Control Charts and
                  Alert Information},
  booktitle    = {Recent Advances in Intrusion Detection: 7th International Symposium,
                  {RAID} 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3224},
  pages        = {166--187},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30143-1\_9},
  doi          = {10.1007/978-3-540-30143-1\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ViinikkaD04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/WangS04,
  author       = {Ke Wang and
                  Salvatore J. Stolfo},
  editor       = {Erland Jonsson and
                  Alfonso Valdes and
                  Magnus Almgren},
  title        = {Anomalous Payload-Based Network Intrusion Detection},
  booktitle    = {Recent Advances in Intrusion Detection: 7th International Symposium,
                  {RAID} 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3224},
  pages        = {203--222},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30143-1\_11},
  doi          = {10.1007/978-3-540-30143-1\_11},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/WangS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/XieKORZ04,
  author       = {Yinglian Xie and
                  Hyang{-}Ah Kim and
                  David R. O'Hallaron and
                  Michael K. Reiter and
                  Hui Zhang},
  editor       = {Erland Jonsson and
                  Alfonso Valdes and
                  Magnus Almgren},
  title        = {Seurat: {A} Pointillist Approach to Anomaly Detection},
  booktitle    = {Recent Advances in Intrusion Detection: 7th International Symposium,
                  {RAID} 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3224},
  pages        = {238--257},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30143-1\_13},
  doi          = {10.1007/978-3-540-30143-1\_13},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/XieKORZ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/XuDC04,
  author       = {Haizhi Xu and
                  Wenliang Du and
                  Steve J. Chapin},
  editor       = {Erland Jonsson and
                  Alfonso Valdes and
                  Magnus Almgren},
  title        = {Context Sensitive Anomaly Monitoring of Process Control Flow to Detect
                  Mimicry Attacks and Impossible Paths},
  booktitle    = {Recent Advances in Intrusion Detection: 7th International Symposium,
                  {RAID} 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3224},
  pages        = {21--38},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30143-1\_2},
  doi          = {10.1007/978-3-540-30143-1\_2},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/XuDC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/YegneswaranBP04,
  author       = {Vinod Yegneswaran and
                  Paul Barford and
                  David Plonka},
  editor       = {Erland Jonsson and
                  Alfonso Valdes and
                  Magnus Almgren},
  title        = {On the Design and Use of Internet Sinks for Network Abuse Monitoring},
  booktitle    = {Recent Advances in Intrusion Detection: 7th International Symposium,
                  {RAID} 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3224},
  pages        = {146--165},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30143-1\_8},
  doi          = {10.1007/978-3-540-30143-1\_8},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/YegneswaranBP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/raid/2004,
  editor       = {Erland Jonsson and
                  Alfonso Valdes and
                  Magnus Almgren},
  title        = {Recent Advances in Intrusion Detection: 7th International Symposium,
                  {RAID} 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3224},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/b100714},
  doi          = {10.1007/B100714},
  isbn         = {3-540-23123-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BalepinMRL03,
  author       = {Ivan Balepin and
                  Sergei Maltsev and
                  Jeff Rowe and
                  Karl N. Levitt},
  editor       = {Giovanni Vigna and
                  Erland Jonsson and
                  Christopher Kr{\"{u}}gel},
  title        = {Using Specification-Based Intrusion Detection for Automated Response},
  booktitle    = {Recent Advances in Intrusion Detection, 6th International Symposium,
                  {RAID} 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2820},
  pages        = {136--154},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45248-5\_8},
  doi          = {10.1007/978-3-540-45248-5\_8},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/BalepinMRL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ChoH03,
  author       = {Sung{-}Bae Cho and
                  Sang{-}Jun Han},
  editor       = {Giovanni Vigna and
                  Erland Jonsson and
                  Christopher Kr{\"{u}}gel},
  title        = {Two Sophisticated Techniques to Improve HMM-Based Intrusion Detection
                  Systems},
  booktitle    = {Recent Advances in Intrusion Detection, 6th International Symposium,
                  {RAID} 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2820},
  pages        = {207--219},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45248-5\_12},
  doi          = {10.1007/978-3-540-45248-5\_12},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ChoH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GuptaS03,
  author       = {Ajay Gupta and
                  R. Sekar},
  editor       = {Giovanni Vigna and
                  Erland Jonsson and
                  Christopher Kr{\"{u}}gel},
  title        = {An Approach for Detecting Self-propagating Email Using Anomaly Detection},
  booktitle    = {Recent Advances in Intrusion Detection, 6th International Symposium,
                  {RAID} 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2820},
  pages        = {55--72},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45248-5\_4},
  doi          = {10.1007/978-3-540-45248-5\_4},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/GuptaS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/KruegelMRV03,
  author       = {Christopher Kr{\"{u}}gel and
                  Darren Mutz and
                  William K. Robertson and
                  Fredrik Valeur},
  editor       = {Giovanni Vigna and
                  Erland Jonsson and
                  Christopher Kr{\"{u}}gel},
  title        = {Topology-Based Detection of Anomalous {BGP} Messages},
  booktitle    = {Recent Advances in Intrusion Detection, 6th International Symposium,
                  {RAID} 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2820},
  pages        = {17--35},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45248-5\_2},
  doi          = {10.1007/978-3-540-45248-5\_2},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/KruegelMRV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/KruegelT03,
  author       = {Christopher Kr{\"{u}}gel and
                  Thomas Toth},
  editor       = {Giovanni Vigna and
                  Erland Jonsson and
                  Christopher Kr{\"{u}}gel},
  title        = {Using Decision Trees to Improve Signature-Based Intrusion Detection},
  booktitle    = {Recent Advances in Intrusion Detection, 6th International Symposium,
                  {RAID} 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2820},
  pages        = {173--191},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45248-5\_10},
  doi          = {10.1007/978-3-540-45248-5\_10},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/KruegelT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MahoneyC03,
  author       = {Matthew V. Mahoney and
                  Philip K. Chan},
  editor       = {Giovanni Vigna and
                  Erland Jonsson and
                  Christopher Kr{\"{u}}gel},
  title        = {An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for
                  Network Anomaly Detection},
  booktitle    = {Recent Advances in Intrusion Detection, 6th International Symposium,
                  {RAID} 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2820},
  pages        = {220--237},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45248-5\_13},
  doi          = {10.1007/978-3-540-45248-5\_13},
  timestamp    = {Wed, 14 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/MahoneyC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MorinD03,
  author       = {Benjamin Morin and
                  Herv{\'{e}} Debar},
  editor       = {Giovanni Vigna and
                  Erland Jonsson and
                  Christopher Kr{\"{u}}gel},
  title        = {Correlation of Intrusion Symptoms: An Application of Chronicles},
  booktitle    = {Recent Advances in Intrusion Detection, 6th International Symposium,
                  {RAID} 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2820},
  pages        = {94--112},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45248-5\_6},
  doi          = {10.1007/978-3-540-45248-5\_6},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/MorinD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/QinL03,
  author       = {Xinzhou Qin and
                  Wenke Lee},
  editor       = {Giovanni Vigna and
                  Erland Jonsson and
                  Christopher Kr{\"{u}}gel},
  title        = {Statistical Causality Analysis of {INFOSEC} Alert Data},
  booktitle    = {Recent Advances in Intrusion Detection, 6th International Symposium,
                  {RAID} 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2820},
  pages        = {73--93},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45248-5\_5},
  doi          = {10.1007/978-3-540-45248-5\_5},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/QinL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/RamadasOT03,
  author       = {Manikantan Ramadas and
                  Shawn Ostermann and
                  Brett C. Tjaden},
  editor       = {Giovanni Vigna and
                  Erland Jonsson and
                  Christopher Kr{\"{u}}gel},
  title        = {Detecting Anomalous Network Traffic with Self-organizing Maps},
  booktitle    = {Recent Advances in Intrusion Detection, 6th International Symposium,
                  {RAID} 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2820},
  pages        = {36--54},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45248-5\_3},
  doi          = {10.1007/978-3-540-45248-5\_3},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/RamadasOT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/SchaelickeSMF03,
  author       = {Lambert Schaelicke and
                  Thomas Slabach and
                  Branden J. Moore and
                  Curt Freeland},
  editor       = {Giovanni Vigna and
                  Erland Jonsson and
                  Christopher Kr{\"{u}}gel},
  title        = {Characterizing the Performance of Network Intrusion Detection Sensors},
  booktitle    = {Recent Advances in Intrusion Detection, 6th International Symposium,
                  {RAID} 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2820},
  pages        = {155--172},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45248-5\_9},
  doi          = {10.1007/978-3-540-45248-5\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/SchaelickeSMF03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Taleck03,
  author       = {Greg Taleck},
  editor       = {Giovanni Vigna and
                  Erland Jonsson and
                  Christopher Kr{\"{u}}gel},
  title        = {Ambiguity Resolution via Passive {OS} Fingerprinting},
  booktitle    = {Recent Advances in Intrusion Detection, 6th International Symposium,
                  {RAID} 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2820},
  pages        = {192--206},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45248-5\_11},
  doi          = {10.1007/978-3-540-45248-5\_11},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/Taleck03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/TylutkiL03,
  author       = {Marcus Tylutki and
                  Karl N. Levitt},
  editor       = {Giovanni Vigna and
                  Erland Jonsson and
                  Christopher Kr{\"{u}}gel},
  title        = {Mitigating Distributed Denial of Service Attacks Using a Proportional-Integral-Derivative
                  Controller},
  booktitle    = {Recent Advances in Intrusion Detection, 6th International Symposium,
                  {RAID} 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2820},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45248-5\_1},
  doi          = {10.1007/978-3-540-45248-5\_1},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/TylutkiL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/UndercofferJP03,
  author       = {Jeffrey Undercoffer and
                  Anupam Joshi and
                  John Pinkston},
  editor       = {Giovanni Vigna and
                  Erland Jonsson and
                  Christopher Kr{\"{u}}gel},
  title        = {Modeling Computer Attacks: An Ontology for Intrusion Detection},
  booktitle    = {Recent Advances in Intrusion Detection, 6th International Symposium,
                  {RAID} 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2820},
  pages        = {113--135},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45248-5\_7},
  doi          = {10.1007/978-3-540-45248-5\_7},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/UndercofferJP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/raid/2003,
  editor       = {Giovanni Vigna and
                  Erland Jonsson and
                  Christopher Kr{\"{u}}gel},
  title        = {Recent Advances in Intrusion Detection, 6th International Symposium,
                  {RAID} 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2820},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/b13476},
  doi          = {10.1007/B13476},
  isbn         = {3-540-40878-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/2003.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ApapHHES02,
  author       = {Frank Apap and
                  Andrew Honig and
                  Shlomo Hershkop and
                  Eleazar Eskin and
                  Salvatore J. Stolfo},
  editor       = {Andreas Wespi and
                  Giovanni Vigna and
                  Luca Deri},
  title        = {Detecting Malicious Software by Monitoring Anomalous Windows Registry
                  Accesses},
  booktitle    = {Recent Advances in Intrusion Detection, 5th International Symposium,
                  {RAID} 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2516},
  pages        = {36--53},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36084-0\_3},
  doi          = {10.1007/3-540-36084-0\_3},
  timestamp    = {Sat, 07 Sep 2019 11:59:24 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ApapHHES02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/DebarM02,
  author       = {Herv{\'{e}} Debar and
                  Benjamin Morin},
  editor       = {Andreas Wespi and
                  Giovanni Vigna and
                  Luca Deri},
  title        = {Evaluation of the Diagnostic Capabilities of Commercial Intrusion
                  Detection Systems},
  booktitle    = {Recent Advances in Intrusion Detection, 5th International Symposium,
                  {RAID} 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2516},
  pages        = {177--198},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36084-0\_10},
  doi          = {10.1007/3-540-36084-0\_10},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/DebarM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/DonohoFSPCS02,
  author       = {David L. Donoho and
                  Ana Georgina Flesia and
                  Umesh Shankar and
                  Vern Paxson and
                  Jason Coit and
                  Stuart Staniford},
  editor       = {Andreas Wespi and
                  Giovanni Vigna and
                  Luca Deri},
  title        = {Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive
                  Streams by Exploiting Maximum Tolerable Delay},
  booktitle    = {Recent Advances in Intrusion Detection, 5th International Symposium,
                  {RAID} 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2516},
  pages        = {17--35},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36084-0\_2},
  doi          = {10.1007/3-540-36084-0\_2},
  timestamp    = {Thu, 08 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/DonohoFSPCS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Goldman02,
  author       = {Robert P. Goldman},
  editor       = {Andreas Wespi and
                  Giovanni Vigna and
                  Luca Deri},
  title        = {A Stochastic Model for Intrusions},
  booktitle    = {Recent Advances in Intrusion Detection, 5th International Symposium,
                  {RAID} 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2516},
  pages        = {199--218},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36084-0\_11},
  doi          = {10.1007/3-540-36084-0\_11},
  timestamp    = {Thu, 08 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/Goldman02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GorodetskiK02,
  author       = {Vladimir I. Gorodetski and
                  Igor V. Kotenko},
  editor       = {Andreas Wespi and
                  Giovanni Vigna and
                  Luca Deri},
  title        = {Attacks Against Computer Network: Formal Grammar-Based Framework and
                  Simulation Tool},
  booktitle    = {Recent Advances in Intrusion Detection, 5th International Symposium,
                  {RAID} 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2516},
  pages        = {219--238},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36084-0\_12},
  doi          = {10.1007/3-540-36084-0\_12},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/GorodetskiK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/HallW02,
  author       = {Mike Hall and
                  Kevin Wiley},
  editor       = {Andreas Wespi and
                  Giovanni Vigna and
                  Luca Deri},
  title        = {Capacity Verification for High Speed Network Intrusion Detection Systems},
  booktitle    = {Recent Advances in Intrusion Detection, 5th International Symposium,
                  {RAID} 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2516},
  pages        = {239--251},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36084-0\_13},
  doi          = {10.1007/3-540-36084-0\_13},
  timestamp    = {Thu, 08 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/HallW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Johnston02,
  author       = {Steven R. Johnston},
  editor       = {Andreas Wespi and
                  Giovanni Vigna and
                  Luca Deri},
  title        = {Development of a Legal Framework for Intrusion Detection},
  booktitle    = {Recent Advances in Intrusion Detection, 5th International Symposium,
                  {RAID} 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2516},
  pages        = {138--157},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36084-0\_8},
  doi          = {10.1007/3-540-36084-0\_8},
  timestamp    = {Thu, 08 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/Johnston02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/JustRCDLMR02,
  author       = {James E. Just and
                  James C. Reynolds and
                  Larry A. Clough and
                  Melissa Danforth and
                  Karl N. Levitt and
                  Ryan Maglich and
                  Jeff Rowe},
  editor       = {Andreas Wespi and
                  Giovanni Vigna and
                  Luca Deri},
  title        = {Learning Unknown Attacks - {A} Start},
  booktitle    = {Recent Advances in Intrusion Detection, 5th International Symposium,
                  {RAID} 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2516},
  pages        = {158--176},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36084-0\_9},
  doi          = {10.1007/3-540-36084-0\_9},
  timestamp    = {Thu, 08 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/JustRCDLMR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/LeeCTBSZ02,
  author       = {Wenke Lee and
                  Jo{\~{a}}o B. D. Cabrera and
                  Ashley Thomas and
                  Niranjan Balwalli and
                  Sunmeet Saluja and
                  Yi Zhang},
  editor       = {Andreas Wespi and
                  Giovanni Vigna and
                  Luca Deri},
  title        = {Performance Adaptation in Real-Time Intrusion Detection Systems},
  booktitle    = {Recent Advances in Intrusion Detection, 5th International Symposium,
                  {RAID} 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2516},
  pages        = {252--273},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36084-0\_14},
  doi          = {10.1007/3-540-36084-0\_14},
  timestamp    = {Thu, 08 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/LeeCTBSZ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/LippmannWS02,
  author       = {Richard Lippmann and
                  Seth E. Webster and
                  Douglas Stetson},
  editor       = {Andreas Wespi and
                  Giovanni Vigna and
                  Luca Deri},
  title        = {The Effect of Identifying Vulnerabilities and Patching Software on
                  the Utility of Network Intrusion Detection},
  booktitle    = {Recent Advances in Intrusion Detection, 5th International Symposium,
                  {RAID} 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2516},
  pages        = {307--326},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36084-0\_17},
  doi          = {10.1007/3-540-36084-0\_17},
  timestamp    = {Thu, 08 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/LippmannWS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MorinMDD02,
  author       = {Benjamin Morin and
                  Ludovic M{\'{e}} and
                  Herv{\'{e}} Debar and
                  Mireille Ducass{\'{e}}},
  editor       = {Andreas Wespi and
                  Giovanni Vigna and
                  Luca Deri},
  title        = {{M2D2:} {A} Formal Data Model for {IDS} Alert Correlation},
  booktitle    = {Recent Advances in Intrusion Detection, 5th International Symposium,
                  {RAID} 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2516},
  pages        = {115--127},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36084-0\_7},
  doi          = {10.1007/3-540-36084-0\_7},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/MorinMDD02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/NingCR02,
  author       = {Peng Ning and
                  Yun Cui and
                  Douglas S. Reeves},
  editor       = {Andreas Wespi and
                  Giovanni Vigna and
                  Luca Deri},
  title        = {Analyzing Intensive Intrusion Alerts via Correlation},
  booktitle    = {Recent Advances in Intrusion Detection, 5th International Symposium,
                  {RAID} 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2516},
  pages        = {74--94},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36084-0\_5},
  doi          = {10.1007/3-540-36084-0\_5},
  timestamp    = {Thu, 08 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/NingCR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/PorrasFV02,
  author       = {Phillip A. Porras and
                  Martin W. Fong and
                  Alfonso Valdes},
  editor       = {Andreas Wespi and
                  Giovanni Vigna and
                  Luca Deri},
  title        = {A Mission-Impact-Based Approach to {INFOSEC} Alarm Correlation},
  booktitle    = {Recent Advances in Intrusion Detection, 5th International Symposium,
                  {RAID} 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2516},
  pages        = {95--114},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36084-0\_6},
  doi          = {10.1007/3-540-36084-0\_6},
  timestamp    = {Thu, 08 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/PorrasFV02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/TanKM02,
  author       = {Kymie M. C. Tan and
                  Kevin S. Killourhy and
                  Roy A. Maxion},
  editor       = {Andreas Wespi and
                  Giovanni Vigna and
                  Luca Deri},
  title        = {Undermining an Anomaly-Based Intrusion Detection System Using Common
                  Exploits},
  booktitle    = {Recent Advances in Intrusion Detection, 5th International Symposium,
                  {RAID} 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2516},
  pages        = {54--73},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36084-0\_4},
  doi          = {10.1007/3-540-36084-0\_4},
  timestamp    = {Thu, 08 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/TanKM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/TothK02,
  author       = {Thomas Toth and
                  Christopher Kr{\"{u}}gel},
  editor       = {Andreas Wespi and
                  Giovanni Vigna and
                  Luca Deri},
  title        = {Accurate Buffer Overflow Detection via Abstract Payload Execution},
  booktitle    = {Recent Advances in Intrusion Detection, 5th International Symposium,
                  {RAID} 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2516},
  pages        = {274--291},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36084-0\_15},
  doi          = {10.1007/3-540-36084-0\_15},
  timestamp    = {Thu, 08 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/TothK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Yung02,
  author       = {Kwong H. Yung},
  editor       = {Andreas Wespi and
                  Giovanni Vigna and
                  Luca Deri},
  title        = {Detecting Long Connection Chains of Interactive Terminal Sessions},
  booktitle    = {Recent Advances in Intrusion Detection, 5th International Symposium,
                  {RAID} 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2516},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36084-0\_1},
  doi          = {10.1007/3-540-36084-0\_1},
  timestamp    = {Thu, 08 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/Yung02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ZimmermannMB02,
  author       = {Jacob Zimmermann and
                  Ludovic M{\'{e}} and
                  Christophe Bidan},
  editor       = {Andreas Wespi and
                  Giovanni Vigna and
                  Luca Deri},
  title        = {Introducing Reference Flow Control for Detecting Intrusion Symptoms
                  at the {OS} Level},
  booktitle    = {Recent Advances in Intrusion Detection, 5th International Symposium,
                  {RAID} 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2516},
  pages        = {292--306},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36084-0\_16},
  doi          = {10.1007/3-540-36084-0\_16},
  timestamp    = {Thu, 08 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ZimmermannMB02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/raid/2002,
  editor       = {Andreas Wespi and
                  Giovanni Vigna and
                  Luca Deri},
  title        = {Recent Advances in Intrusion Detection, 5th International Symposium,
                  {RAID} 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2516},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36084-0},
  doi          = {10.1007/3-540-36084-0},
  isbn         = {3-540-00020-8},
  timestamp    = {Sat, 07 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/2002.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/AlmgrenL01,
  author       = {Magnus Almgren and
                  Ulf Lindqvist},
  editor       = {Wenke Lee and
                  Ludovic M{\'{e}} and
                  Andreas Wespi},
  title        = {Application-Integrated Data Collection for Security Monitoring},
  booktitle    = {Recent Advances in Intrusion Detection, 4th International Symposium,
                  {RAID} 2001 Davis, CA, USA, October 10-12, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2212},
  pages        = {22--36},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45474-8\_2},
  doi          = {10.1007/3-540-45474-8\_2},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/AlmgrenL01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/CunninghamS01,
  author       = {Robert K. Cunningham and
                  Craig S. Stevenson},
  editor       = {Wenke Lee and
                  Ludovic M{\'{e}} and
                  Andreas Wespi},
  title        = {Accurately Detecting Source Code of Attacks That Increase Privilege},
  booktitle    = {Recent Advances in Intrusion Detection, 4th International Symposium,
                  {RAID} 2001 Davis, CA, USA, October 10-12, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2212},
  pages        = {104--116},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45474-8\_7},
  doi          = {10.1007/3-540-45474-8\_7},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/CunninghamS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/DebarW01,
  author       = {Herv{\'{e}} Debar and
                  Andreas Wespi},
  editor       = {Wenke Lee and
                  Ludovic M{\'{e}} and
                  Andreas Wespi},
  title        = {Aggregation and Correlation of Intrusion-Detection Alerts},
  booktitle    = {Recent Advances in Intrusion Detection, 4th International Symposium,
                  {RAID} 2001 Davis, CA, USA, October 10-12, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2212},
  pages        = {85--103},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45474-8\_6},
  doi          = {10.1007/3-540-45474-8\_6},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/DebarW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Johnston01,
  author       = {Steven R. Johnston},
  editor       = {Wenke Lee and
                  Ludovic M{\'{e}} and
                  Andreas Wespi},
  title        = {The Impact of Privacy and Data Protection Legislation on the Sharing
                  of Intrusion Detection Information},
  booktitle    = {Recent Advances in Intrusion Detection, 4th International Symposium,
                  {RAID} 2001 Davis, CA, USA, October 10-12, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2212},
  pages        = {150--171},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45474-8\_10},
  doi          = {10.1007/3-540-45474-8\_10},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/Johnston01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/KoBRTL01,
  author       = {Calvin Ko and
                  Paul Brutch and
                  Jeff Rowe and
                  Guy Tsafnat and
                  Karl N. Levitt},
  editor       = {Wenke Lee and
                  Ludovic M{\'{e}} and
                  Andreas Wespi},
  title        = {System Health and Intrusion Monitoring Using a Hierarchy of Constraints},
  booktitle    = {Recent Advances in Intrusion Detection, 4th International Symposium,
                  {RAID} 2001 Davis, CA, USA, October 10-12, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2212},
  pages        = {190--204},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45474-8\_12},
  doi          = {10.1007/3-540-45474-8\_12},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/KoBRTL01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/PouzolD01,
  author       = {Jean{-}Philippe Pouzol and
                  Mireille Ducass{\'{e}}},
  editor       = {Wenke Lee and
                  Ludovic M{\'{e}} and
                  Andreas Wespi},
  title        = {From Declarative Signatures to Misuse {IDS}},
  booktitle    = {Recent Advances in Intrusion Detection, 4th International Symposium,
                  {RAID} 2001 Davis, CA, USA, October 10-12, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2212},
  pages        = {1--21},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45474-8\_1},
  doi          = {10.1007/3-540-45474-8\_1},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/PouzolD01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/SterneDWBSHR01,
  author       = {Daniel F. Sterne and
                  Kelly Djahandari and
                  Brett Wilson and
                  Bill Babson and
                  Dan Schnackenberg and
                  Harley Holliday and
                  Travis Reid},
  editor       = {Wenke Lee and
                  Ludovic M{\'{e}} and
                  Andreas Wespi},
  title        = {Autonomic Response to Distributed Denial of Service Attacks},
  booktitle    = {Recent Advances in Intrusion Detection, 4th International Symposium,
                  {RAID} 2001 Davis, CA, USA, October 10-12, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2212},
  pages        = {134--149},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45474-8\_9},
  doi          = {10.1007/3-540-45474-8\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/SterneDWBSHR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/UppuluriS01,
  author       = {Prem Uppuluri and
                  R. Sekar},
  editor       = {Wenke Lee and
                  Ludovic M{\'{e}} and
                  Andreas Wespi},
  title        = {Experiences with Specification-Based Intrusion Detection},
  booktitle    = {Recent Advances in Intrusion Detection, 4th International Symposium,
                  {RAID} 2001 Davis, CA, USA, October 10-12, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2212},
  pages        = {172--189},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45474-8\_11},
  doi          = {10.1007/3-540-45474-8\_11},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/UppuluriS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ValdesS01,
  author       = {Alfonso Valdes and
                  Keith Skinner},
  editor       = {Wenke Lee and
                  Ludovic M{\'{e}} and
                  Andreas Wespi},
  title        = {Probabilistic Alert Correlation},
  booktitle    = {Recent Advances in Intrusion Detection, 4th International Symposium,
                  {RAID} 2001 Davis, CA, USA, October 10-12, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2212},
  pages        = {54--68},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45474-8\_4},
  doi          = {10.1007/3-540-45474-8\_4},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ValdesS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/VignaKB01,
  author       = {Giovanni Vigna and
                  Richard A. Kemmerer and
                  Per Blix},
  editor       = {Wenke Lee and
                  Ludovic M{\'{e}} and
                  Andreas Wespi},
  title        = {Designing a Web of Highly-Configurable Intrusion Detection Sensors},
  booktitle    = {Recent Advances in Intrusion Detection, 4th International Symposium,
                  {RAID} 2001 Davis, CA, USA, October 10-12, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2212},
  pages        = {69--84},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45474-8\_5},
  doi          = {10.1007/3-540-45474-8\_5},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/VignaKB01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/WelzH01,
  author       = {Marc G. Welz and
                  Andrew Hutchison},
  editor       = {Wenke Lee and
                  Ludovic M{\'{e}} and
                  Andreas Wespi},
  title        = {Interfacing Trusted Applications with Intrusion Detection Systems},
  booktitle    = {Recent Advances in Intrusion Detection, 4th International Symposium,
                  {RAID} 2001 Davis, CA, USA, October 10-12, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2212},
  pages        = {37--53},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45474-8\_3},
  doi          = {10.1007/3-540-45474-8\_3},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/WelzH01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/WilliamsABGL01,
  author       = {Paul D. Williams and
                  Kevin P. Anchor and
                  John L. Bebo and
                  Gregg H. Gunsch and
                  Gary B. Lamont},
  editor       = {Wenke Lee and
                  Ludovic M{\'{e}} and
                  Andreas Wespi},
  title        = {{CDIS:} Towards a Computer Immune System for Detecting Network Intrusions},
  booktitle    = {Recent Advances in Intrusion Detection, 4th International Symposium,
                  {RAID} 2001 Davis, CA, USA, October 10-12, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2212},
  pages        = {117--133},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45474-8\_8},
  doi          = {10.1007/3-540-45474-8\_8},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/WilliamsABGL01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/raid/2001,
  editor       = {Wenke Lee and
                  Ludovic M{\'{e}} and
                  Andreas Wespi},
  title        = {Recent Advances in Intrusion Detection, 4th International Symposium,
                  {RAID} 2001 Davis, CA, USA, October 10-12, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2212},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45474-8},
  doi          = {10.1007/3-540-45474-8},
  isbn         = {3-540-42702-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/2001.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Alessandri00,
  author       = {Dominique Alessandri},
  editor       = {Herv{\'{e}} Debar and
                  Ludovic M{\'{e}} and
                  Shyhtsun Felix Wu},
  title        = {Using Rule-Based Activity Descriptions to Evaluate Intrusion-Detection
                  Systems},
  booktitle    = {Recent Advances in Intrusion Detection, Third International Workshop,
                  {RAID} 2000, Toulouse, France, October 2-4, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1907},
  pages        = {183--196},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-39945-3\_12},
  doi          = {10.1007/3-540-39945-3\_12},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/Alessandri00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BiskupF00,
  author       = {Joachim Biskup and
                  Ulrich Flegel},
  editor       = {Herv{\'{e}} Debar and
                  Ludovic M{\'{e}} and
                  Shyhtsun Felix Wu},
  title        = {Transaction-Based Pseudonyms in Audit Data for Privacy Respecting
                  Intrusion Detection},
  booktitle    = {Recent Advances in Intrusion Detection, Third International Workshop,
                  {RAID} 2000, Toulouse, France, October 2-4, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1907},
  pages        = {28--48},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-39945-3\_3},
  doi          = {10.1007/3-540-39945-3\_3},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/BiskupF00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/CuppensO00,
  author       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Rodolphe Ortalo},
  editor       = {Herv{\'{e}} Debar and
                  Ludovic M{\'{e}} and
                  Shyhtsun Felix Wu},
  title        = {{LAMBDA:} {A} Language to Model a Database for Detection of Attacks},
  booktitle    = {Recent Advances in Intrusion Detection, Third International Workshop,
                  {RAID} 2000, Toulouse, France, October 2-4, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1907},
  pages        = {197--216},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-39945-3\_13},
  doi          = {10.1007/3-540-39945-3\_13},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/CuppensO00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/FlackA00,
  author       = {Chapman Flack and
                  Mikhail J. Atallah},
  editor       = {Herv{\'{e}} Debar and
                  Ludovic M{\'{e}} and
                  Shyhtsun Felix Wu},
  title        = {Better Logging through Formality},
  booktitle    = {Recent Advances in Intrusion Detection, Third International Workshop,
                  {RAID} 2000, Toulouse, France, October 2-4, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1907},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-39945-3\_1},
  doi          = {10.1007/3-540-39945-3\_1},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/FlackA00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GhoshMS00,
  author       = {Anup K. Ghosh and
                  Christoph C. Michael and
                  Michael Schatz},
  editor       = {Herv{\'{e}} Debar and
                  Ludovic M{\'{e}} and
                  Shyhtsun Felix Wu},
  title        = {A Real-Time Intrusion Detection System Based on Learning Program Behavior},
  booktitle    = {Recent Advances in Intrusion Detection, Third International Workshop,
                  {RAID} 2000, Toulouse, France, October 2-4, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1907},
  pages        = {93--109},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-39945-3\_7},
  doi          = {10.1007/3-540-39945-3\_7},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/GhoshMS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/KuriNMH00,
  author       = {Josu{\'{e}} Kuri and
                  Gonzalo Navarro and
                  Ludovic M{\'{e}} and
                  Laurent Heye},
  editor       = {Herv{\'{e}} Debar and
                  Ludovic M{\'{e}} and
                  Shyhtsun Felix Wu},
  title        = {A Pattern Matching Based Filter for Audit Reduction and Fast Detection
                  of Potential Intrusions},
  booktitle    = {Recent Advances in Intrusion Detection, Third International Workshop,
                  {RAID} 2000, Toulouse, France, October 2-4, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1907},
  pages        = {17--27},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-39945-3\_2},
  doi          = {10.1007/3-540-39945-3\_2},
  timestamp    = {Wed, 28 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/KuriNMH00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/LeeNYPDTS00,
  author       = {Wenke Lee and
                  Rahul A. Nimbalkar and
                  Kam K. Yee and
                  Sunil B. Patil and
                  Pragneshkumar H. Desai and
                  Thuan T. Tran and
                  Salvatore J. Stolfo},
  editor       = {Herv{\'{e}} Debar and
                  Ludovic M{\'{e}} and
                  Shyhtsun Felix Wu},
  title        = {A Data Mining and {CIDF} Based Approach for Detecting Novel and Distributed
                  Intrusions},
  booktitle    = {Recent Advances in Intrusion Detection, Third International Workshop,
                  {RAID} 2000, Toulouse, France, October 2-4, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1907},
  pages        = {49--65},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-39945-3\_4},
  doi          = {10.1007/3-540-39945-3\_4},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/LeeNYPDTS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/LippmannHFKD00,
  author       = {Richard Lippmann and
                  Joshua W. Haines and
                  David J. Fried and
                  Jonathan Korba and
                  Kumar Das},
  editor       = {Herv{\'{e}} Debar and
                  Ludovic M{\'{e}} and
                  Shyhtsun Felix Wu},
  title        = {Analysis and Results of the 1999 {DARPA} Off-Line Intrusion Detection
                  Evaluation},
  booktitle    = {Recent Advances in Intrusion Detection, Third International Workshop,
                  {RAID} 2000, Toulouse, France, October 2-4, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1907},
  pages        = {162--182},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-39945-3\_11},
  doi          = {10.1007/3-540-39945-3\_11},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/LippmannHFKD00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MarrakchiMVM00,
  author       = {Zakia Marrakchi and
                  Ludovic M{\'{e}} and
                  Bernard Vivinis and
                  Benjamin Morin},
  editor       = {Herv{\'{e}} Debar and
                  Ludovic M{\'{e}} and
                  Shyhtsun Felix Wu},
  title        = {Flexible Intrusion Detection Using Variable-Length Behavior Modeling
                  in Distributed Environment: Application to {CORBA} Objects},
  booktitle    = {Recent Advances in Intrusion Detection, Third International Workshop,
                  {RAID} 2000, Toulouse, France, October 2-4, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1907},
  pages        = {130--144},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-39945-3\_9},
  doi          = {10.1007/3-540-39945-3\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/MarrakchiMVM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/McHugh00,
  author       = {John McHugh},
  editor       = {Herv{\'{e}} Debar and
                  Ludovic M{\'{e}} and
                  Shyhtsun Felix Wu},
  title        = {The 1998 Lincoln Laboratory {IDS} Evaluation},
  booktitle    = {Recent Advances in Intrusion Detection, Third International Workshop,
                  {RAID} 2000, Toulouse, France, October 2-4, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1907},
  pages        = {145--161},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-39945-3\_10},
  doi          = {10.1007/3-540-39945-3\_10},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/McHugh00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MichaelG00,
  author       = {Christoph C. Michael and
                  Anup K. Ghosh},
  editor       = {Herv{\'{e}} Debar and
                  Ludovic M{\'{e}} and
                  Shyhtsun Felix Wu},
  title        = {Using Finite Automata to Mine Execution Data for Intrusion Detection:
                  {A} Preliminary Report},
  booktitle    = {Recent Advances in Intrusion Detection, Third International Workshop,
                  {RAID} 2000, Toulouse, France, October 2-4, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1907},
  pages        = {66--79},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-39945-3\_5},
  doi          = {10.1007/3-540-39945-3\_5},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/MichaelG00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/RiordanA00,
  author       = {James Riordan and
                  Dominique Alessandri},
  editor       = {Herv{\'{e}} Debar and
                  Ludovic M{\'{e}} and
                  Shyhtsun Felix Wu},
  title        = {Target Naming and Service Apoptosis},
  booktitle    = {Recent Advances in Intrusion Detection, Third International Workshop,
                  {RAID} 2000, Toulouse, France, October 2-4, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1907},
  pages        = {217--226},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-39945-3\_14},
  doi          = {10.1007/3-540-39945-3\_14},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/RiordanA00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ValdesS00,
  author       = {Alfonso Valdes and
                  Keith Skinner},
  editor       = {Herv{\'{e}} Debar and
                  Ludovic M{\'{e}} and
                  Shyhtsun Felix Wu},
  title        = {Adaptive, Model-Based Monitoring for Cyber Attack Detection},
  booktitle    = {Recent Advances in Intrusion Detection, Third International Workshop,
                  {RAID} 2000, Toulouse, France, October 2-4, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1907},
  pages        = {80--92},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-39945-3\_6},
  doi          = {10.1007/3-540-39945-3\_6},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ValdesS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/WespiDD00,
  author       = {Andreas Wespi and
                  Marc Dacier and
                  Herv{\'{e}} Debar},
  editor       = {Herv{\'{e}} Debar and
                  Ludovic M{\'{e}} and
                  Shyhtsun Felix Wu},
  title        = {Intrusion Detection Using Variable-Length Audit Trail Patterns},
  booktitle    = {Recent Advances in Intrusion Detection, Third International Workshop,
                  {RAID} 2000, Toulouse, France, October 2-4, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1907},
  pages        = {110--129},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-39945-3\_8},
  doi          = {10.1007/3-540-39945-3\_8},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/WespiDD00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/raid/2000,
  editor       = {Herv{\'{e}} Debar and
                  Ludovic M{\'{e}} and
                  Shyhtsun Felix Wu},
  title        = {Recent Advances in Intrusion Detection, Third International Workshop,
                  {RAID} 2000, Toulouse, France, October 2-4, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1907},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-39945-3},
  doi          = {10.1007/3-540-39945-3},
  isbn         = {3-540-41085-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/2000.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Axelsson99,
  author       = {Stefan Axelsson},
  title        = {On a Difficulty of Intrusion Detection},
  booktitle    = {Recent Advances in Intrusion Detection, Second International Workshop,
                  {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999},
  year         = {1999},
  url          = {http://www.raid-symposium.org/raid99/PAPERS/Axelsson.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/Axelsson99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BakerCHM99,
  author       = {David W. Baker and
                  Steven M. Christey and
                  William H. Hill and
                  David E. Mann},
  title        = {The Development of a Common Vulnerability Enumeration},
  booktitle    = {Recent Advances in Intrusion Detection, Second International Workshop,
                  {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999},
  year         = {1999},
  url          = {http://www.raid-symposium.org/raid99/PAPERS/Hill.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/BakerCHM99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Bishop99,
  author       = {Matt Bishop},
  title        = {Vulnerability Analysis: An Extended Abstract},
  booktitle    = {Recent Advances in Intrusion Detection, Second International Workshop,
                  {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999},
  year         = {1999},
  url          = {http://www.raid-symposium.org/raid99/PAPERS/Bishop.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/Bishop99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ChampionD99,
  author       = {Terrence G. Champion and
                  Robert Durst},
  title        = {Air Force Intrusion Detection System Evaluation Environment},
  booktitle    = {Recent Advances in Intrusion Detection, Second International Workshop,
                  {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999},
  year         = {1999},
  url          = {http://www.raid-symposium.org/raid99/PAPERS/Champion.pdf},
  timestamp    = {Mon, 13 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/ChampionD99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ChungGL99,
  author       = {Christina Yip Chung and
                  Michael Gertz and
                  Karl N. Levitt},
  title        = {Misuse Detection in Database Systems Through User Profiling},
  booktitle    = {Recent Advances in Intrusion Detection, Second International Workshop,
                  {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999},
  year         = {1999},
  url          = {http://www.raid-symposium.org/raid99/PAPERS/Chung.pdf},
  timestamp    = {Mon, 07 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/ChungGL99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/CosendaiDS99,
  author       = {Yves Cosendai and
                  Marc Dacier and
                  Paolo Scotton},
  title        = {Intrusion Detection Mechanism to Detect Reachability Attacks in {PNNI}
                  Networks},
  booktitle    = {Recent Advances in Intrusion Detection, Second International Workshop,
                  {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999},
  year         = {1999},
  url          = {http://www.raid-symposium.org/raid99/PAPERS/Cosendai.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/CosendaiDS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Farley99,
  author       = {Tim Farley},
  title        = {Lessons Learned in Commercial {IDS} Development},
  booktitle    = {Recent Advances in Intrusion Detection, Second International Workshop,
                  {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999},
  year         = {1999},
  url          = {http://www.raid-symposium.org/raid99/PAPERS/Farley.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/Farley99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/FeiertagSLHPCBRW99,
  author       = {Richard J. Feiertag and
                  Stuart Staniford{-}Chen and
                  Karl N. Levitt and
                  Mark R. Heckman and
                  Dave Peticolas and
                  Rick Crawford and
                  Lee A. Benzinger and
                  Sue Rho and
                  Stephen Wu},
  title        = {Intrusion Detection Inter-component Adaptive Negotiation},
  booktitle    = {Recent Advances in Intrusion Detection, Second International Workshop,
                  {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999},
  year         = {1999},
  url          = {http://www.raid-symposium.org/raid99/PAPERS/Feiertag.pdf},
  timestamp    = {Tue, 09 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/FeiertagSLHPCBRW99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GormanR99,
  author       = {David Gorman and
                  Mary Ruhl},
  title        = {Intrusion Detection for Telephony Signalling},
  booktitle    = {Recent Advances in Intrusion Detection, Second International Workshop,
                  {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999},
  year         = {1999},
  url          = {http://www.raid-symposium.org/raid99/PAPERS/Gorman.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/GormanR99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/KelseyS99,
  author       = {John Kelsey and
                  Bruce Schneier},
  title        = {Minimizing Bandwidth for Remote Access to Cryptographically Protected
                  Audit Logs},
  booktitle    = {Recent Advances in Intrusion Detection, Second International Workshop,
                  {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999},
  year         = {1999},
  url          = {http://www.raid-symposium.org/raid99/PAPERS/Kelsey.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/KelseyS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/LeeS99,
  author       = {Wenke Lee and
                  Salvatore J. Stolfo},
  title        = {Combining Knowledge Discovery and Knowledge Engineering to Build IDSs},
  booktitle    = {Recent Advances in Intrusion Detection, Second International Workshop,
                  {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999},
  year         = {1999},
  url          = {http://www.raid-symposium.org/raid99/PAPERS/Lee\_Stolfo.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/LeeS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/LippmannC99,
  author       = {Richard Lippmann and
                  Robert K. Cunningham},
  title        = {Improving Intrusion Detection Performance using Keyword Selection
                  and Neural Networks},
  booktitle    = {Recent Advances in Intrusion Detection, Second International Workshop,
                  {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999},
  year         = {1999},
  url          = {http://www.raid-symposium.org/raid99/PAPERS/Lippmann1.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/LippmannC99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/LippmannCFGKWZ99,
  author       = {Richard Lippmann and
                  Robert K. Cunningham and
                  David J. Fried and
                  Isaac Graf and
                  Kris R. Kendall and
                  Seth E. Webster and
                  Marc A. Zissman},
  title        = {Results of the {DARPA} 1998 Offline Intrusion Detection Evaluation},
  booktitle    = {Recent Advances in Intrusion Detection, Second International Workshop,
                  {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999},
  year         = {1999},
  url          = {http://www.raid-symposium.org/raid99/PAPERS/Lippmann\_DARPA.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/LippmannCFGKWZ99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/LundinJ99,
  author       = {Emilie Lundin and
                  Erland Jonsson},
  title        = {Privacy vs. Intrusion Detection Analysis},
  booktitle    = {Recent Advances in Intrusion Detection, Second International Workshop,
                  {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999},
  year         = {1999},
  url          = {http://www.raid-symposium.org/raid99/PAPERS/Lundin.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/LundinJ99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ManganarisCZH99,
  author       = {Stefanos Manganaris and
                  Marvin Christensen and
                  Dan Zerkle and
                  Keith Hermiz},
  title        = {A Data Mining Analysis of {RTID} Alarms},
  booktitle    = {Recent Advances in Intrusion Detection, Second International Workshop,
                  {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999},
  year         = {1999},
  url          = {http://www.raid-symposium.org/raid99/PAPERS/Manganaris.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/ManganarisCZH99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Mansfield99,
  author       = {Glenn Mansfield},
  title        = {Towards trapping wily intruders in the large},
  booktitle    = {Recent Advances in Intrusion Detection, Second International Workshop,
                  {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999},
  year         = {1999},
  url          = {http://www.raid-symposium.org/raid99/PAPERS/Mansfield.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/Mansfield99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/MellM99,
  author       = {Peter Mell and
                  Mark McLarnon},
  title        = {Mobile Agent Attack Resistant Distributed Hierarchical Intrusion Detection
                  Systems},
  booktitle    = {Recent Advances in Intrusion Detection, Second International Workshop,
                  {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999},
  year         = {1999},
  url          = {http://www.raid-symposium.org/raid99/PAPERS/Mell.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/MellM99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Mutaf99,
  author       = {Pars Mutaf},
  title        = {Defending against a Denial-of-Service Attack on {TCP}},
  booktitle    = {Recent Advances in Intrusion Detection, Second International Workshop,
                  {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999},
  year         = {1999},
  url          = {http://www.raid-symposium.org/raid99/PAPERS/ParsMutaf.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/Mutaf99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/OngTTT99,
  author       = {Tiang Hwee Ong and
                  Chung Pheng Tan and
                  Yong Tai Tan and
                  Christopher Ting},
  title        = {{SNMS} - Shadow Network Management System},
  booktitle    = {Recent Advances in Intrusion Detection, Second International Workshop,
                  {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999},
  year         = {1999},
  url          = {http://www.raid-symposium.org/raid99/PAPERS/ChungPheng.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/OngTTT99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Paxson99,
  author       = {Vern Paxson},
  title        = {Defending against network {IDS} evasion},
  booktitle    = {Recent Advances in Intrusion Detection, Second International Workshop,
                  {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999},
  year         = {1999},
  url          = {http://www.raid-symposium.org/raid99/PAPERS/Paxson.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/Paxson99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/QianliX99,
  author       = {Qianli Zhang and
                  Xing Li},
  title        = {Session State Transition Based Large Network {IDS}},
  booktitle    = {Recent Advances in Intrusion Detection, Second International Workshop,
                  {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999},
  year         = {1999},
  url          = {http://www.raid-symposium.org/raid99/PAPERS/Qianli.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/QianliX99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/QueirozCP99,
  author       = {Jose Duarte de Queiroz and
                  Luiz F. Rust da Costa Carmo and
                  Luci Pirmez},
  title        = {Micael: An Autonomous Mobile Agent System to Protect New Generation
                  Networked Applications},
  booktitle    = {Recent Advances in Intrusion Detection, Second International Workshop,
                  {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999},
  year         = {1999},
  url          = {http://www.raid-symposium.org/raid99/PAPERS/Queiroz.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/QueirozCP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Rowe99,
  author       = {Jeff Rowe},
  title        = {Intrusion Detection and Isolation Protocol: Automated Response to
                  Attacks},
  booktitle    = {Recent Advances in Intrusion Detection, Second International Workshop,
                  {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999},
  year         = {1999},
  url          = {http://www.raid-symposium.org/raid99/PAPERS/Rowe.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/Rowe99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/SchwartzbardG99,
  author       = {Aaron Schwartzbard and
                  Anup K. Ghosh},
  title        = {A Study in the Feasibility of Performing Host-Based Anomaly Detection
                  on Windows {NT}},
  booktitle    = {Recent Advances in Intrusion Detection, Second International Workshop,
                  {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999},
  year         = {1999},
  timestamp    = {Thu, 08 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/SchwartzbardG99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/SeleznyovP99,
  author       = {Alexandr Seleznyov and
                  Seppo Puuronen},
  title        = {Anomaly Intrusion Detection Systems: Handling Temporal Relations Between
                  Events},
  booktitle    = {Recent Advances in Intrusion Detection, Second International Workshop,
                  {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999},
  year         = {1999},
  url          = {http://www.raid-symposium.org/raid99/PAPERS/Seleznyov.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/SeleznyovP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/SongSU99,
  author       = {Dug Song and
                  G. Shaffer and
                  M. Undy},
  title        = {Nidsbench - a Network Intrusion Detection Test Suite},
  booktitle    = {Recent Advances in Intrusion Detection, Second International Workshop,
                  {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999},
  year         = {1999},
  url          = {http://www.raid-symposium.org/raid99/PAPERS/Song.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/SongSU99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/SpaffordZ99,
  author       = {Eugene H. Spafford and
                  Diego Zamboni},
  title        = {New directions for the {AAFID} architecture},
  booktitle    = {Recent Advances in Intrusion Detection, Second International Workshop,
                  {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999},
  year         = {1999},
  url          = {http://www.raid-symposium.org/raid99/PAPERS/Zamboni.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/SpaffordZ99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Staniford-Chen99,
  author       = {Stuart Staniford{-}Chen},
  title        = {{IDS} Standards: Lessons Learned to Date},
  booktitle    = {Recent Advances in Intrusion Detection, Second International Workshop,
                  {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999},
  year         = {1999},
  url          = {http://www.raid-symposium.org/raid99/PAPERS/StanifordChen.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/Staniford-Chen99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/TingOTN99,
  author       = {Christopher Ting and
                  Tiang Hwee Ong and
                  Yong Tai Tan and
                  Pek Yong Ng},
  title        = {Intrusion Detection, Internet Law Enforcement and Insurance Coverage
                  to Accelerate the Proliferation of Internet Business Singapore},
  booktitle    = {Recent Advances in Intrusion Detection, Second International Workshop,
                  {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999},
  year         = {1999},
  url          = {http://www.raid-symposium.org/raid99/PAPERS/Ting.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/TingOTN99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/Wee99,
  author       = {Christopher Wee},
  title        = {Audit logs: to keep or not to keep?},
  booktitle    = {Recent Advances in Intrusion Detection, Second International Workshop,
                  {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999},
  year         = {1999},
  url          = {http://www.raid-symposium.org/raid99/PAPERS/Wee.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/Wee99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/WespiD99,
  author       = {Andreas Wespi and
                  Herv{\'{e}} Debar},
  title        = {Building an Intrusion-Detection System to Detect Suspicious Process
                  Behavior},
  booktitle    = {Recent Advances in Intrusion Detection, Second International Workshop,
                  {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999},
  year         = {1999},
  url          = {http://www.raid-symposium.org/raid99/PAPERS/Wespi.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/WespiD99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/YuillWGH99,
  author       = {Jim Yuill and
                  Shyhtsun Felix Wu and
                  Fengmin Gong and
                  Ming{-}Yuh Huang},
  title        = {Intrusion Detection for an On-Going Attack},
  booktitle    = {Recent Advances in Intrusion Detection, Second International Workshop,
                  {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999},
  year         = {1999},
  url          = {http://www.raid-symposium.org/raid99/PAPERS/Yuill.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/YuillWGH99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/raid/1999,
  title        = {Recent Advances in Intrusion Detection, Second International Workshop,
                  {RAID} 1999, West Lafayette, Indiana, USA, September 7-9, 1999},
  year         = {1999},
  url          = {http://www.raid-symposium.org/raid99/},
  timestamp    = {Thu, 08 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/1999.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics