International Workshop on Recent Advances in Intrusion Detection

Research in Attacks, Intrusions, and Defenses

18th International Symposium, RAID 2015, Kyoto, Japan,November 2-4, 2015. Proceedings

  • Herbert Bos
  • Fabian Monrose
  • Gregory Blanc
Conference proceedings

DOI: 10.1007/978-3-319-26362-5

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9404)

Table of contents (28 papers)

  1. Front Matter
    Pages I-XIII
  2. Hardware

    1. Front Matter
      Pages 1-1
    2. Ensemble Learning for Low-Level Hardware-Supported Malware Detection
      Khaled N. Khasawneh, Meltem Ozsoy, Caleb Donovick, Nael Abu-Ghazaleh, Dmitry Ponomarev
      Pages 3-25
    3. Physical-Layer Detection of Hardware Keyloggers
      Ryan M. Gerdes, Saptarshi Mallick
      Pages 26-47
    4. Reverse Engineering Intel Last-Level Cache Complex Addressing Using Performance Counters
      Clémentine Maurice, Nicolas Le Scouarnec, Christoph Neumann, Olivier Heen, Aurélien Francillon
      Pages 48-65
    5. Hardware-Assisted Fine-Grained Code-Reuse Attack Detection
      Pinghai Yuan, Qingkai Zeng, Xuhua Ding
      Pages 66-85
  3. Networks

    1. Front Matter
      Pages 87-87
    2. Haetae: Scaling the Performance of Network Intrusion Detection with Many-Core Processors
      Jaehyun Nam, Muhammad Jamshed, Byungkwon Choi, Dongsu Han, KyoungSoo Park
      Pages 89-110
    3. Demystifying the IP Blackspace
      Quentin Jacquemart, Pierre-Antoine Vervier, Guillaume Urvoy-Keller, Ernst Biersack
      Pages 111-132
    4. Providing Dynamic Control to Passive Network Security Monitoring
      Johanna Amann, Robin Sommer
      Pages 133-152
  4. Hardening

    1. Front Matter
      Pages 153-153
    2. Probabilistic Inference on Integrity for Access Behavior Based Malware Detection
      Weixuan Mao, Zhongmin Cai, Don Towsley, Xiaohong Guan
      Pages 155-176
    3. Counteracting Data-Only Malware with Code Pointer Examination
      Thomas Kittel, Sebastian Vogl, Julian Kirsch, Claudia Eckert
      Pages 177-197
    4. Xede: Practical Exploit Early Detection
      Meining Nie, Purui Su, Qi Li, Zhi Wang, Lingyun Ying, Jinlong Hu et al.
      Pages 198-221
  5. Attack Detection I

    1. Front Matter
      Pages 223-223
    2. Improving Accuracy of Static Integer Overflow Detection in Binary
      Yang Zhang, Xiaoshan Sun, Yi Deng, Liang Cheng, Shuke Zeng, Yu Fu et al.
      Pages 247-269
    3. A Formal Framework for Program Anomaly Detection
      Xiaokui Shu, Danfeng (Daphne) Yao, Barbara G. Ryder
      Pages 270-292
  6. Web and Net

    1. Front Matter
      Pages 293-293
    2. jÄk: Using Dynamic Analysis to Crawl and Test Modern Web Applications
      Giancarlo Pellegrino, Constantin Tschürtz, Eric Bodden, Christian Rossow
      Pages 295-316

About these proceedings


This book constitutes the refereed proceedings of the 18th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2015, held in Kyoto, Japan, in November 2015.
The 28 full papers were carefully reviewed and selected from 119 submissions. This symposium brings together leading researchers and practitioners from academia, government, and industry to discuss novel security problems, solutions, and technologies related to intrusion detection, attacks, and defenses.


computer and communication networks data security industry sectors security and privacy telecommunications anomaly detection automata theory botnet tracking electronics intrusion detection systems keylogger malware analysis mobile security network security obfuscation reverse engineering security services software security systems security virtualization

Editors and affiliations

  • Herbert Bos
    • 1
  • Fabian Monrose
    • 2
  • Gregory Blanc
    • 3
  1. 1.Vrije Universiteit AmsterdamAmsterdamThe Netherlands
  2. 2.University of North Carolina at Chapel HChapel-HillUSA
  3. 3.Université Paris-SaclayEvryFrance

Bibliographic information

  • Copyright Information Springer International Publishing Switzerland 2015
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-26361-8
  • Online ISBN 978-3-319-26362-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349