default search action
21st RAID 2018: Heraklion, Crete, Greece
- Michael D. Bailey, Thorsten Holz, Manolis Stamatogiannakis, Sotiris Ioannidis:
Research in Attacks, Intrusions, and Defenses - 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings. Lecture Notes in Computer Science 11050, Springer 2018, ISBN 978-3-030-00469-9
Attacks
- Onur Sahin, Ayse K. Coskun, Manuel Egele:
Proteus: Detecting Android Emulators from Instruction-Level Profiles. 3-24 - Claudio Rizzo, Lorenzo Cavallaro, Johannes Kinder:
BabelView: Evaluating the Impact of Code Injection Attacks in Mobile Webviews. 25-46 - Andrei Tatar, Cristiano Giuffrida, Herbert Bos, Kaveh Razavi:
Defeating Software Mitigations Against Rowhammer: A Surgical Precision Hammer. 47-66
Intrusion Detection and Prevention
- Hugo Gascon, Steffen Ullrich, Benjamin Stritter, Konrad Rieck:
Reading Between the Lines: Content-Agnostic Detection of Spear-Phishing Emails. 69-91 - Sam L. Thomas, Aurélien Francillon:
Backdoors: Definition, Deniability and Detection. 92-113 - Shagufta Mehnaz, Anand Mudgerikar, Elisa Bertino:
RWGuard: A Real-Time Detection System Against Cryptographic Ransomware. 114-136
DDoS Attacks
- Jonas Bushart, Christian Rossow:
DNS Unchained: Amplified Application-Layer DoS Attacks Against DNS Authoritatives. 139-160 - Menghao Zhang, Guanyu Li, Lei Xu, Jun Bi, Guofei Gu, Jiasong Bai:
Control Plane Reflection Attacks in SDNs: New Attacks and Countermeasures. 161-183 - Johanna Ullrich, Nicholas Stifter, Aljosha Judmayer, Adrian Dabrowski, Edgar R. Weippl:
Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Could Affect Power Grids. 184-203
Passwords, Accounts, and Users
- Sergio Pastrana, Alice Hutchings, Andrew Caines, Paula Buttery:
Characterizing Eve: Analysing Cybercrime Actors in a Large Underground Forum. 207-227 - Binghui Wang, Le Zhang, Neil Zhenqiang Gong:
SybilBlind: Detecting Fake Users in Online Social Networks Without Manual Labels. 228-249 - Simon S. Woo, Jelena Mirkovic:
GuidedPass: Helping Users to Create Strong and Memorable Passwords. 250-270
Machine Learning for Computer Security
- Kang Liu, Brendan Dolan-Gavitt, Siddharth Garg:
Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks. 273-294 - Mayana Pereira, Shaun Coleman, Bin Yu, Martine De Cock, Anderson C. A. Nascimento:
Dictionary Extraction and Detection of Algorithmically Generated Domain Names in Passive DNS Traffic. 295-314 - Eva Papadogiannaki, Constantinos Halevidis, Periklis Akritidis, Lazaros Koromilas:
OTTer: A Scalable High-Resolution Encrypted Traffic Identification Engine. 315-334
Hardware-Assisted Security
- Brian Belleville, Hyungon Moon, Jangseop Shin, Dongil Hwang, Joseph M. Nash, Seonhwa Jung, Yeoul Na, Stijn Volckaert, Per Larsen, Yunheung Paek, Michael Franz:
Hardware Assisted Randomization of Data. 337-358 - Lucian Mogosanu, Ashay Rane, Nathan Dautenhahn:
MicroStache: A Lightweight Execution Context for In-Process Safe Region Isolation. 359-379 - Chen Cao, Le Guan, Ning Zhang, Neng Gao, Jingqiang Lin, Bo Luo, Peng Liu, Ji Xiang, Wenjing Lou:
CryptMe: Data Leakage Prevention for Unmodified Programs on ARM Devices. 380-400
Software Security
- Julian Lettner, Dokyung Song, Taemin Park, Per Larsen, Stijn Volckaert, Michael Franz:
PartiSan: Fast and Flexible Sanitization via Run-Time Partitioning. 403-422 - Paul Muntean, Matthias Fischer, Gang Tan, Zhiqiang Lin, Jens Grossklags, Claudia Eckert:
τCFI: Type-Assisted Control Flow Integrity for x86-64 Binaries. 423-444 - Stefano Cristalli, Edoardo Vignati, Danilo Bruschi, Andrea Lanzi:
Trusted Execution Path for Protecting Java Applications Against Deserialization of Untrusted Data. 445-464
Malware
- Jialong Zhang, Jiyong Jang, Guofei Gu, Marc Ph. Stoecklin, Xin Hu:
Error-Sensor: Mining Information from HTTP Error Traffic for Malware Intelligence. 467-489 - Ishai Rosenberg, Asaf Shabtai, Lior Rokach, Yuval Elovici:
Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers. 490-510 - Leon Böck, Emmanouil Vasilomanolakis, Max Mühlhäuser, Shankar Karuppayah:
Next Generation P2P Botnets: Monitoring Under Adverse Conditions. 511-531
IoT/CPS Security
- Philipp Morgner, Stefan Pfennig, Dennis Salzner, Zinaida Benenson:
Malicious IoT Implants: Tampering with Serial Communication over the Internet. 535-555 - Pierre-Antoine Vervier, Yun Shen:
Before Toasters Rise Up: A View into the Emerging IoT Threat Landscape. 556-576 - Jeong-Han Yun, Yoonho Hwang, Woomyo Lee, Hee-Kap Ahn, Sin-Kyu Kim:
Statistical Similarity of Critical Infrastructure Network Traffic Based on Nearest Neighbor Distances. 577-599
Security Measurements
- Jens Müller, Vladislav Mladenov, Dennis Felsch, Jörg Schwenk:
PostScript Undead: Pwning the Web with a 35 Years Old Language. 603-622 - Michael Brengel, Christian Rossow:
Identifying Key Leakage of Bitcoin Users. 623-643
Defenses
- Micah Bushouse, Douglas S. Reeves:
Furnace: Self-service Tenant VMI for the Cloud. 647-669 - Bin Shi, Lei Cui, Bo Li, Xudong Liu, Zhiyu Hao, Haiying Shen:
ShadowMonitor: An Effective In-VM Monitoring Framework with Hardware-Enforced Isolation. 670-690 - Zhi Zhang, Yueqiang Cheng, Surya Nepal, Dongxi Liu, Qingni Shen, Fethi A. Rabhi:
KASR: A Reliable and Practical Approach to Attack Surface Reduction of Commodity OS Kernels. 691-710
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.