default search action
11. RAID 2008: Cambridge, MA, USA
- Richard Lippmann, Engin Kirda, Ari Trachtenberg:
Recent Advances in Intrusion Detection, 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings. Lecture Notes in Computer Science 5230, Springer 2008, ISBN 978-3-540-87402-7
Rootkit Prevention
- Ryan D. Riley, Xuxian Jiang, Dongyan Xu:
Guest-Transparent Prevention of Kernel Rootkits with VMM-Based Memory Shadowing. 1-20 - Zhi Wang, Xuxian Jiang, Weidong Cui, Xinyuan Wang:
Countering Persistent Kernel Rootkits through Systematic Hook Discovery. 21-38
Malware Detection and Prevention
- Abhinav Srivastava, Jonathon T. Giffin:
Tamper-Resistant, Application-Aware Blocking of Malicious Network Connections. 39-58 - Daniel Ramsbrock, Xinyuan Wang, Xuxian Jiang:
A First Step towards Live Botmaster Traceback. 59-77 - Lorenzo Martignoni, Elizabeth Stinson, Matt Fredrikson, Somesh Jha, John C. Mitchell:
A Layered Architecture for Detecting Malicious Behaviors. 78-97 - Fanglu Guo, Peter Ferrie, Tzi-cker Chiueh:
A Study of the Packer Problem and Its Solutions. 98-115
High Performance Intrusion Detection and Evasion
- Giorgos Vasiliadis, Spyros Antonatos, Michalis Polychronakis, Evangelos P. Markatos, Sotiris Ioannidis:
Gnort: High Performance Network Intrusion Detection Using Graphics Processors. 116-134 - Holger Dreger, Anja Feldmann, Vern Paxson, Robin Sommer:
Predicting the Resource Consumption of Network Intrusion Detection Systems. 135-154 - Nabil Schear, David R. Albrecht, Nikita Borisov:
High-Speed Matching of Vulnerability Signatures. 155-174
Web Application Testing and Evasion
- Simon P. Chung, Aloysius K. Mok:
Swarm Attacks against Network-Level Emulation/Analysis. 175-190 - Sean McAllister, Engin Kirda, Christopher Kruegel:
Leveraging User Interactions for In-Depth Testing of Web Applications. 191-210 - Steven Gianvecchio, Haining Wang, Duminda Wijesekera, Sushil Jajodia:
Model-Based Covert Timing Channels: Automated Modeling and Evasion. 211-230
Alert Correlation and Worm Detection
- Senthilkumar G. Cheetancheri, John Mark Agosta, Karl N. Levitt, Shyhtsun Felix Wu, Jeff Rowe:
Optimal Cost, Collaborative, and Distributed Response to Zero-Day Worms - A Control Theoretic Approach. 231-250 - M. Patrick Collins, Michael K. Reiter:
On the Limits of Payload-Oblivious Network Attack Detection. 251-270 - Gaspar Modelo-Howard, Saurabh Bagchi, Guy Lebanon:
Determining Placement of Intrusion Detectors for a Distributed Application through Bayesian Network Modeling. 271-290 - Magnus Almgren, Ulf Lindqvist, Erland Jonsson:
A Multi-Sensor Model to Improve Automated Attack Detection. 291-310
Anomaly Detection and Network Traffic Analysis
- Mohamed Nassar, Radu State, Olivier Festor:
Monitoring SIP Traffic Using Support Vector Machines. 311-330 - Kevin S. Killourhy, Roy A. Maxion:
The Effect of Clock Resolution on Keystroke Dynamics. 331-350 - Ayesha Binte Ashfaq, Maria Joseph Robert, Asma Mumtaz, Muhammad Qasim Ali, Ali Sajjad, Syed Ali Khayam:
A Comparative Evaluation of Anomaly Detectors under Portscan Attacks. 351-371 - Humberto J. Abdelnur, Radu State, Olivier Festor:
Advanced Network Fingerprinting. 372-389
Posters
- Natalia Stakhanova, Chris Strasburg, Samik Basu, Johnny S. Wong:
On Evaluation of Response Cost for Intrusion Response Systems. 390-391 - Nathalie Dagorn:
WebIDS: A Cooperative Bayesian Anomaly-Based Intrusion Detection System for Web Applications (Extended Abstract). 392-393 - Benjamin I. P. Rubinstein, Blaine Nelson, Ling Huang, Anthony D. Joseph, Shing-hon Lau, Nina Taft, J. Doug Tygar:
Evading Anomaly Detection through Variance Injection Attacks on PCA. 394-395 - Christina Lioma, Marie-Francine Moens, Juan-Carlos Gomez, Jan De Beer, André Bergholz, Gerhard Paass, Patrick Horkan:
Anticipating Hidden Text Salting in Emails. 396-397 - Martin Rehák, Michal Pechoucek, Karel Bartos, Martin Grill, Pavel Celeda, Vojtech Krmicek:
Improving Anomaly Detection Error Rate by Collective Trust Modeling. 398-399 - Ashish Kamra, Elisa Bertino:
Database Intrusion Detection and Response. 400-401 - Deanna D. Caputo, Greg Stephens, Brad Stephenson, Megan Cormier, Minna Kim:
An Empirical Approach to Identify Information Misuse by Insiders (Extended Abstract). 402-403 - Junsup Lee, Sung Deok Cha:
Page-Based Anomaly Detection in Large Scale Web Clusters Using Adaptive MapReduce (Extended Abstract). 404-405 - Olivier Thonnard, Jouni Viinikka, Corrado Leita, Marc Dacier:
Automating the Analysis of Honeypot Data (Extended Abstract). 406-407 - Paul Rubel, Partha P. Pal, Michael Atighetchi, D. Paul Benjamin, Franklin Webber:
Anomaly and Specification Based Cognitive Approach for Mission-Level Detection and Response. 408-409 - Andrew Brown, Mark Ryan:
Monitoring the Execution of Third-Party Software on Mobile Devices. 410-411 - Sergey Bratus, Joshua Brody, David Kotz, Anna Shubina:
Streaming Estimation of Information-Theoretic Metrics for Anomaly Detection (Extended Abstract). 412-414 - Wei Lu, Ali A. Ghorbani:
Bots Behaviors vs. Human Behaviors on Large-Scale Communication Networks (Extended Abstract). 415-416 - Lorenzo Cavallaro, R. Sekar:
Anomalous Taint Detection. 417-418 - Divya Jain, K. Vasanta Lakshmi, Priti Shankar:
Deep Packet Inspection Using Message Passing Networks. 419-420 - Abhinav Srivastava, Andrea Lanzi, Jonathon T. Giffin:
System Call API Obfuscation (Extended Abstract). 421-422
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.