- Sponsor:
- sigops
No abstract available.
Proceeding Downloads
A connection pattern-based approach to detect network traffic anomalies in critical infrastructures
Recent trends in Critical Infrastructures (CIs), e.g., power plants and energy smart grids, showed an increased use of commodity, off-the-shelf Information and Communication Technologies (ICT) hardware and software. Although this enabled the ...
Improving Mac OS X security through gray box fuzzing technique
- Stefano Bianchi Mazzone,
- Mattia Pagnozzi,
- Aristide Fattori,
- Alessandro Reina,
- Andrea Lanzi,
- Danilo Bruschi
The kernel is the core of any operating system, and its security is of vital importance. A vulnerability, in any of its parts, compromises the whole system security model. Unprivileged users that find such vulnerabilities can easily crash the attacked ...
On measuring the impact of DDoS botnets
Miscreants use DDoS botnets to attack a victim via a large number of malware-infected hosts, combining the bandwidth of the individual PCs. Such botnets have thus a high potential to render targeted services unavailable. However, the actual impact of ...
A practical approach for generic bootkit detection and prevention
Bootkits are still the most powerful tool for attackers to stealthily infiltrate computer systems. In this paper we present a novel approach to detect and prevent bootkit attacks during the infection phase. Our approach relies on emulation and ...
Rage against the virtual machine: hindering dynamic analysis of Android malware
Antivirus companies, mobile application marketplaces, and the security research community, employ techniques based on dynamic code analysis to detect and analyze mobile malware. In this paper, we present a broad range of anti-analysis techniques that ...
The best of both worlds: a framework for the synergistic operation of host and cloud anomaly-based IDS for smartphones
Smartphone ownership and usage has seen massive growth in the past years. As a result, their users have attracted unwanted attention from malicious entities and face many security challenges, including malware and privacy issues. This paper concentrates ...
Index Terms
- Proceedings of the Seventh European Workshop on System Security
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
EuroSec '20 | 15 | 7 | 47% |
EuroSec '19 | 25 | 9 | 36% |
EuroSec'18 | 19 | 8 | 42% |
EuroSec'17 | 24 | 10 | 42% |
EuroSec '16 | 16 | 7 | 44% |
EuroSec '14 | 14 | 6 | 43% |
Overall | 113 | 47 | 42% |