Table of Contents for: Research in Attacks, Intrusions, and Def

 Staff view

You must be logged in to Tag Records

Research in Attacks, Intrusions, and Defenses [electronic resource] : 15th International Symposium, RAID 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings /

Davide Balzarotti, Salvatore J. Stolfo, Marco Cova (eds.).

Book Cover
Names: Balzarotti, Davide. | Stolfo, Salvatore J. | Cova, Marco.
Published: Berlin ; Springer, c2012.
Series: Lecture notes in computer science ; 7462.
LNCS sublibrary. SL 4, Security and cryptology.
Topics: Computer networks - Security measures - Congresses. | Computer networks - Access control - Congresses. | Computer security - Congresses.
Genres: Conference proceedings. | Electronic books.
Tags: Add


Spaces will separate tags.
Use quotes for multi-word tags.


Trusted VM Snapshots in Untrusted Cloud Infrastructures / Abhinav Srivastava, Himanshu Raj, Jonathon Giffin and Paul England -- Secure and Robust Monitoring of Virtual Machines through Guest-Assisted Introspection / Martim Carbone, Matthew Conover, Bruce Montague and Wenke Lee -- Assessing the Trustworthiness of Drivers / Shengzhi Zhang and Peng Liu -- Industrial Espionage and Targeted Attacks: Understanding the Characteristics of an Escalating Threat / Olivier Thonnard, Leyla Bilge, Gavin O'Gorman, Seán Kiernan and Martin Lee -- Memory Errors: The Past, the Present, and the Future / Victor van der Veen, Nitish dutt-Sharma, Lorenzo Cavallaro and Herbert Bos -- A Memory Access Validation Scheme against Payload Injection Attacks / Dongkyun Ahn and Gyungho Lee -- Dione: A Flexible Disk Monitoring and Analysis Framework / Jennifer Mankin and David Kaeli -- AK-PPM: An Authenticated Packet Attribution Scheme for Mobile Ad Hoc Networks / Zhi Xu, Hungyuan Hsu, Xin Chen, Sencun Zhu and Ali R. Hurson -- Paying for Piracy? An Analysis of One-Click Hosters' Controversial Reward Schemes / Tobias Lauinger, Engin Kirda and Pietro Michiardi --
Proactive Discovery of Phishing Related Domain Names / Samuel Marchal, Jérôme François, Radu State and Thomas Engel -- Evaluating Electricity Theft Detectors in Smart Grid Networks / Daisuke Mashima and Alvaro A. Cárdenas -- PoisonAmplifier: A Guided Approach of Discovering Compromised Websites through Reversing Search Poisoning Attacks / Jialong Zhang, Chao Yang, Zhaoyan Xu and Guofei Gu -- DEMACRO: Defense against Malicious Cross-Domain Requests / Sebastian Lekies, Nick Nikiforakis, Walter Tighzert, Frank Piessens and Martin Johns -- FlashDetect: ActionScript 3 Malware Detection / Timon Van Overveldt, Christopher Kruegel and Giovanni Vigna -- ALERT-ID: Analyze Logs of the Network Element in Real Time for Intrusion Detection / Jie Chu, Zihui Ge, Richard Huber, Ping Ji and Jennifer Yates, et al. -- A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence / Bernhard Amann, Robin Sommer, Aashish Sharma and Seth Hall -- GPP-Grep: High-Speed Regular Expression Processing Engine on General Purpose Processors / Victor C. Valgenti, Jatin Chhugani, Yan Sun, Nadathur Satish and Min Sik Kim, et al. --
N-Gram against the Machine: On the Feasibility of the N-Gram Network Analysis for Binary Protocols / Dina Hadžiosmanović, Lorenzo Simionato, Damiano Bolzoni, Emmanuele Zambon and Sandro Etalle -- Online Social Networks, a Criminals Multipurpose Toolbox (Poster Abstract) / Shah Mahmood and Yvo Desmedt -- The Triple-Channel Model: Toward Robust and Efficient Advanced Botnets (Poster Abstract) / Cui Xiang, Shi Jinqiao, Liao Peng and Liu Chaoge -- Network Security Analysis Method Taking into Account the Usage Information (Poster Abstract) / Wu Jinyu, Yin Lihua and Fang Binxing -- Automatic Covert Channel Detection in Asbestos System (Poster Abstract) / Shuyuan Jin, Zhi Yang and Xiang Cui -- EFA for Efficient Regular Expression Matching in NIDS (Poster Abstract) / Dengke Qiao, Tingwen Liu, Yong Sun and Li Guo -- Distress Detection (Poster Abstract) / Mark Vella, Sotirios Terzis and Marc Roper -- Trie Data Structure to Compare Traffic Payload in a Supervised Anomaly Detection System (Poster Abstract) / Jenny Andrea Pinto Sánchez and Luis Javier García Villalba --
Towards Automated Forensic Event Reconstruction of Malicious Code (Poster Abstract) / Ahmed F. Shosha, Joshua I. James, Chen-Ching Liu and Pavel Gladyshev -- Accurate Recovery of Functions in a Retargetable Decompiler(Poster Abstract) / Lukáš Ďurfina, Jakub Křoustek, Petr Zemek and Břetislav Kábele -- Improvement of an Anagram Based NIDS by Reducing the Storage Space of Bloom Filters (Poster Abstract) / Hugo Villanúa Vega, Jorge Maestre Vidal, Jaime Daniel Mejía Castro and Luis Javier García Villalba -- Concurrency Optimization for NIDS (Poster Abstract) / Jorge Maestre Vidal, Hugo Villanúa Vega, Jaime Daniel Mejía Castro and Luis Javier García Villalba -- Malware Detection System by Payload Analysis of Network Traffic (Poster Abstract) / Luis Javier García Villalba, Jaime Daniel Mejía Castro, Ana Lucila Sandoval Orozco and Javier Martínez Puentes.

Table of Contents for: Research in Attacks, Intrusions, and Def