Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2592791acmconferencesBook PagePublication PageseurosysConference Proceedingsconference-collections
EuroSec '14: Proceedings of the Seventh European Workshop on System Security
ACM2014 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
EuroSys 2014: Ninth Eurosys Conference 2014 Amsterdam The Netherlands 13 April 2014
ISBN:
978-1-4503-2715-2
Published:
13 April 2014
Sponsors:
Next Conference
March 30 - April 3, 2025
Rotterdam , Netherlands
Reflects downloads up to 05 Feb 2025Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
research-article
A connection pattern-based approach to detect network traffic anomalies in critical infrastructures
Article No.: 1, Pages 1–6https://doi.org/10.1145/2592791.2592792

Recent trends in Critical Infrastructures (CIs), e.g., power plants and energy smart grids, showed an increased use of commodity, off-the-shelf Information and Communication Technologies (ICT) hardware and software. Although this enabled the ...

research-article
Improving Mac OS X security through gray box fuzzing technique
Article No.: 2, Pages 1–6https://doi.org/10.1145/2592791.2592793

The kernel is the core of any operating system, and its security is of vital importance. A vulnerability, in any of its parts, compromises the whole system security model. Unprivileged users that find such vulnerabilities can easily crash the attacked ...

research-article
On measuring the impact of DDoS botnets
Article No.: 3, Pages 1–6https://doi.org/10.1145/2592791.2592794

Miscreants use DDoS botnets to attack a victim via a large number of malware-infected hosts, combining the bandwidth of the individual PCs. Such botnets have thus a high potential to render targeted services unavailable. However, the actual impact of ...

research-article
A practical approach for generic bootkit detection and prevention
Article No.: 4, Pages 1–6https://doi.org/10.1145/2592791.2592795

Bootkits are still the most powerful tool for attackers to stealthily infiltrate computer systems. In this paper we present a novel approach to detect and prevent bootkit attacks during the infection phase. Our approach relies on emulation and ...

research-article
Rage against the virtual machine: hindering dynamic analysis of Android malware
Article No.: 5, Pages 1–6https://doi.org/10.1145/2592791.2592796

Antivirus companies, mobile application marketplaces, and the security research community, employ techniques based on dynamic code analysis to detect and analyze mobile malware. In this paper, we present a broad range of anti-analysis techniques that ...

research-article
The best of both worlds: a framework for the synergistic operation of host and cloud anomaly-based IDS for smartphones
Article No.: 6, Pages 1–6https://doi.org/10.1145/2592791.2592797

Smartphone ownership and usage has seen massive growth in the past years. As a result, their users have attracted unwanted attention from malicious entities and face many security challenges, including malware and privacy issues. This paper concentrates ...

Contributors
  • EURECOM- Graduate School and Research Center in Digital Sciences
  • IMDEA Software Institute
Index terms have been assigned to the content through auto-classification.
Please enable JavaScript to view thecomments powered by Disqus.

Recommendations

Acceptance Rates

EuroSec '14 Paper Acceptance Rate 6 of 14 submissions, 43%;
Overall Acceptance Rate 47 of 113 submissions, 42%
YearSubmittedAcceptedRate
EuroSec '2015747%
EuroSec '1925936%
EuroSec'1819842%
EuroSec'17241042%
EuroSec '1616744%
EuroSec '1414643%
Overall1134742%