Research in Attacks, Intrusions and Defenses

17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings

  • Angelos Stavrou
  • Herbert Bos
  • Georgios Portokalidis

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8688)

Table of contents

  1. Front Matter
  2. Malware and Defenses

    1. Marc Kührer, Christian Rossow, Thorsten Holz
      Pages 1-21
    2. Zhaoyan Xu, Jialong Zhang, Guofei Gu, Zhiqiang Lin
      Pages 22-45
    3. Kevin D. Bowers, Catherine Hart, Ari Juels, Nikos Triandopoulos
      Pages 46-67
  3. Malware and Binary Analysis

    1. Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis
      Pages 68-87
    2. Felix Schuster, Thomas Tendyck, Jannik Pewny, Andreas Maaß, Martin Steegmanns, Moritz Contag et al.
      Pages 88-108
    3. Adrian Tang, Simha Sethumadhavan, Salvatore J. Stolfo
      Pages 109-129
  4. Web

    1. Jacopo Corbetta, Luca Invernizzi, Christopher Kruegel, Giovanni Vigna
      Pages 130-149
    2. Enrico Budianto, Yaoqi Jia, Xinshu Dong, Prateek Saxena, Zhenkai Liang
      Pages 150-171
    3. Nathaniel Boggs, Senyao Du, Salvatore J. Stolfo
      Pages 172-191
  5. Web II

    1. Michael Weissbacher, Tobias Lauinger, William Robertson
      Pages 212-233
    2. Nathaniel Boggs, Hang Zhao, Senyao Du, Salvatore J. Stolfo
      Pages 234-254
  6. Authentication and Privacy

    1. Hassan Khan, Aaron Atwater, Urs Hengartner
      Pages 255-275
    2. Yinzhi Cao, Yan Shoshitaishvili, Kevin Borgolte, Christopher Kruegel, Giovanni Vigna, Yan Chen
      Pages 276-298
    3. Gorka Irazoqui, Mehmet Sinan Inci, Thomas Eisenbarth, Berk Sunar
      Pages 299-319
  7. Network Security

    1. Noomene Ben Henda, Karl Norrman
      Pages 341-361
    2. Il-Gu Lee, Hyunwoo Choi, Yongdae Kim, Seungwon Shin, Myungchul Kim
      Pages 362-383
  8. Intrusion Detection and Vulnerability Analysis

    1. Ali Abbasi, Jos Wetzels, Wouter Bokslag, Emmanuele Zambon, Sandro Etalle
      Pages 384-404

About these proceedings

Introduction

This book constitutes the proceedings of the 17th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2014, held in Gothenburg, Sweden, in September 2014. The 22 full papers were carefully reviewed and selected from 113 submissions, and are presented together with 10 poster abstracts. The papers address all current topics in computer security, including network security, authentication, malware, intrusion detection, browser security, web application security, wireless security, vulnerability analysis.

Keywords

anomaly detection malware mitigation mobile security network security security and privacy security services software and application security systems security vulnerability management wireless security

Editors and affiliations

  • Angelos Stavrou
    • 1
  • Herbert Bos
    • 2
  • Georgios Portokalidis
    • 3
  1. 1.George Mason UniversityFairfaxUSA
  2. 2.VU University AmsterdamThe Netherlands
  3. 3.Stevens Institute of TechnologyUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-11379-1
  • Copyright Information Springer International Publishing Switzerland 2014
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-11378-4
  • Online ISBN 978-3-319-11379-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book