Book Volume 9404 2015

Research in Attacks, Intrusions, and Defenses

18th International Symposium, RAID 2015, Kyoto, Japan,November 2-4, 2015. Proceedings

Editors:

ISBN: 978-3-319-26361-8 (Print) 978-3-319-26362-5 (Online)

Table of contents (28 chapters)

previous Page of 2
  1. Front Matter

    Pages I-XIII

  2. Hardware

    1. Front Matter

      Pages 1-1

    2. No Access

      Chapter

      Pages 3-25

      Ensemble Learning for Low-Level Hardware-Supported Malware Detection

    3. No Access

      Chapter

      Pages 26-47

      Physical-Layer Detection of Hardware Keyloggers

    4. No Access

      Chapter

      Pages 48-65

      Reverse Engineering Intel Last-Level Cache Complex Addressing Using Performance Counters

    5. No Access

      Chapter

      Pages 66-85

      Hardware-Assisted Fine-Grained Code-Reuse Attack Detection

  3. Networks

    1. Front Matter

      Pages 87-87

    2. No Access

      Chapter

      Pages 89-110

      Haetae: Scaling the Performance of Network Intrusion Detection with Many-Core Processors

    3. No Access

      Chapter

      Pages 111-132

      Demystifying the IP Blackspace

    4. No Access

      Chapter

      Pages 133-152

      Providing Dynamic Control to Passive Network Security Monitoring

  4. Hardening

    1. Front Matter

      Pages 153-153

    2. No Access

      Chapter

      Pages 155-176

      Probabilistic Inference on Integrity for Access Behavior Based Malware Detection

    3. No Access

      Chapter

      Pages 177-197

      Counteracting Data-Only Malware with Code Pointer Examination

    4. No Access

      Chapter

      Pages 198-221

      Xede: Practical Exploit Early Detection

  5. Attack Detection I

    1. Front Matter

      Pages 223-223

    2. No Access

      Chapter

      Pages 225-246

      Preventing Exploits in Microsoft Office Documents Through Content Randomization

    3. No Access

      Chapter

      Pages 247-269

      Improving Accuracy of Static Integer Overflow Detection in Binary

    4. No Access

      Chapter

      Pages 270-292

      A Formal Framework for Program Anomaly Detection

  6. Web and Net

    1. Front Matter

      Pages 293-293

    2. No Access

      Chapter

      Pages 295-316

      jÄk: Using Dynamic Analysis to Crawl and Test Modern Web Applications

    3. No Access

      Chapter

      Pages 317-338

      WYSISNWIV: What You Scan Is Not What I Visit

    4. No Access

      Chapter

      Pages 339-356

      SDN Rootkits: Subverting Network Operating Systems of Software-Defined Networks

  7. Android

    1. Front Matter

      Pages 357-357

    2. No Access

      Chapter

      Pages 359-381

      AppSpear: Bytecode Decrypting and DEX Reassembling for Packed Android Malware

    3. No Access

      Chapter

      Pages 382-404

      HelDroid: Dissecting and Detecting Mobile Ransomware

    4. No Access

      Chapter

      Pages 405-424

      Continuous Authentication on Mobile Devices Using Power Consumption, Touch Gestures and Physical Movement of Users

  8. Privacy

    1. Front Matter

      Pages 425-425

    2. No Access

      Chapter

      Pages 427-447

      Privacy Risk Assessment on Online Photos

previous Page of 2