Research in Attacks, Intrusions, and Defenses

19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings

  • Monrose Fabian 
  • Dacier Marc 
  • Blanc Gregory 
  • Garcia-Alfaro Joaquin 
Conference proceedings RAID 2016

DOI: 10.1007/978-3-319-45719-2

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9854)

Table of contents (21 papers)

  1. Front Matter
    Pages I-XIII
  2. Systems Security

    1. Front Matter
      Pages 1-1
    2. GRIM: Leveraging GPUs for Kernel Integrity Monitoring
      Lazaros Koromilas, Giorgos Vasiliadis, Elias Athanasopoulos, Sotiris Ioannidis
      Pages 3-23
    3. Taming Transactions: Towards Hardware-Assisted Control Flow Integrity Using Transactional Memory
      Marius Muench, Fabio Pagani, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna, Davide Balzarotti
      Pages 24-48
    4. Automatic Uncovering of Tap Points from Kernel Executions
      Junyuan Zeng, Yangchun Fu, Zhiqiang Lin
      Pages 49-70
    5. Detecting Stack Layout Corruptions with Robust Stack Unwinding
      Yangchun Fu, Junghwan Rhee, Zhiqiang Lin, Zhichun Li, Hui Zhang, Guofei Jiang
      Pages 71-94
  3. Low-Level Attacks and Defenses

    1. Front Matter
      Pages 95-95
    2. APDU-Level Attacks in PKCS#11 Devices
      Claudio Bozzato, Riccardo Focardi, Francesco Palmarini, Graham Steel
      Pages 97-117
    3. CloudRadar: A Real-Time Side-Channel Attack Detection System in Clouds
      Tianwei Zhang, Yinqian Zhang, Ruby B. Lee
      Pages 118-140
  4. Measurement Studies

    1. Front Matter
      Pages 141-141
    2. The Abuse Sharing Economy: Understanding the Limits of Threat Exchanges
      Kurt Thomas, Rony Amira, Adi Ben-Yoash, Ori Folger, Amir Hardon, Ari Berger et al.
      Pages 143-164
    3. SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion
      Akira Yokoyama, Kou Ishii, Rui Tanabe, Yinmin Papa, Katsunari Yoshioka, Tsutomu Matsumoto et al.
      Pages 165-187
    4. Enabling Network Security Through Active DNS Datasets
      Athanasios Kountouras, Panagiotis Kintis, Chaz Lever, Yizheng Chen, Yacin Nadji, David Dagon et al.
      Pages 188-208
  5. Malware Analysis

    1. Front Matter
      Pages 209-209
    2. A Formal Framework for Environmentally Sensitive Malware
      Jeremy Blackthorne, Benjamin Kaiser, Bülent Yener
      Pages 211-229
    3. AVclass: A Tool for Massive Malware Labeling
      Marcos Sebastián, Richard Rivera, Platon Kotzias, Juan Caballero
      Pages 230-253
    4. Semantics-Preserving Dissection of JavaScript Exploits via Dynamic JS-Binary Analysis
      Xunchao Hu, Aravind Prakash, Jinghan Wang, Rundong Zhou, Yao Cheng, Heng Yin
      Pages 254-276
  6. Network Security

    1. Front Matter
      Pages 277-277
    2. The Messenger Shoots Back: Network Operator Based IMSI Catcher Detection
      Adrian Dabrowski, Georg Petzl, Edgar R. Weippl
      Pages 279-302
    3. On the Feasibility of TTL-Based Filtering for DRDoS Mitigation
      Michael Backes, Thorsten Holz, Christian Rossow, Teemu Rytilahti, Milivoj Simeonovski, Ben Stock
      Pages 303-322

About these proceedings

Introduction

This book constitutes the refereed proceedings oft he 19th International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2016, held in Evry, France, in September 2016.

The 21 full papers presented were carefully reviewed and selected from 85 submissions. They are organized around the following topics: systems security; low-level attacks and defenses; measurement studies; malware analysis; network security; systematization of knowledge and experience reports; Web and mobile security.

Keywords

authentication browser security malware analysis network security system monitoring algorithm analysis and problem complexity cloud computing computer communication networks information systems applications intrusion and attack detection IP spoofing obfuscation reputation systems rootkit detection sandbox evasion side-channel attacks software engineering systems and data security vulnerability analysis Web application security

Editors and affiliations

  • Monrose Fabian 
    • 1
  • Dacier Marc 
    • 2
  • Blanc Gregory 
    • 3
  • Garcia-Alfaro Joaquin 
    • 4
  1. 1.University of North Carolina at Chapel H Chapel-HillUSA
  2. 2.Qatar Computing Research Institute DohaQatar
  3. 3.Université Paris-Saclay EvryFrance
  4. 4.TELECOM SudParis EVRYFrance

Bibliographic information

  • Copyright Information Springer International Publishing Switzerland 2016
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-45718-5
  • Online ISBN 978-3-319-45719-2
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349