Table of contents

  1. Front Matter
    Pages I-XIII
  2. Systems Security

    1. Front Matter
      Pages 1-1
    2. Lazaros Koromilas, Giorgos Vasiliadis, Elias Athanasopoulos, Sotiris Ioannidis
      Pages 3-23
    3. Marius Muench, Fabio Pagani, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna, Davide Balzarotti
      Pages 24-48
    4. Junyuan Zeng, Yangchun Fu, Zhiqiang Lin
      Pages 49-70
    5. Yangchun Fu, Junghwan Rhee, Zhiqiang Lin, Zhichun Li, Hui Zhang, Guofei Jiang
      Pages 71-94
  3. Low-Level Attacks and Defenses

    1. Front Matter
      Pages 95-95
    2. Claudio Bozzato, Riccardo Focardi, Francesco Palmarini, Graham Steel
      Pages 97-117
    3. Tianwei Zhang, Yinqian Zhang, Ruby B. Lee
      Pages 118-140
  4. Measurement Studies

    1. Front Matter
      Pages 141-141
    2. Kurt Thomas, Rony Amira, Adi Ben-Yoash, Ori Folger, Amir Hardon, Ari Berger et al.
      Pages 143-164
    3. Akira Yokoyama, Kou Ishii, Rui Tanabe, Yinmin Papa, Katsunari Yoshioka, Tsutomu Matsumoto et al.
      Pages 165-187
    4. Athanasios Kountouras, Panagiotis Kintis, Chaz Lever, Yizheng Chen, Yacin Nadji, David Dagon et al.
      Pages 188-208
  5. Malware Analysis

    1. Front Matter
      Pages 209-209
    2. Jeremy Blackthorne, Benjamin Kaiser, Bülent Yener
      Pages 211-229
    3. Marcos Sebastián, Richard Rivera, Platon Kotzias, Juan Caballero
      Pages 230-253
    4. Xunchao Hu, Aravind Prakash, Jinghan Wang, Rundong Zhou, Yao Cheng, Heng Yin
      Pages 254-276
  6. Network Security

    1. Front Matter
      Pages 277-277
    2. Adrian Dabrowski, Georg Petzl, Edgar R. Weippl
      Pages 279-302
    3. Michael Backes, Thorsten Holz, Christian Rossow, Teemu Rytilahti, Milivoj Simeonovski, Ben Stock
      Pages 303-322

About these proceedings

Introduction

This book constitutes the refereed proceedings oft he 19th International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2016, held in Evry, France, in September 2016.

The 21 full papers presented were carefully reviewed and selected from 85 submissions. They are organized around the following topics: systems security; low-level attacks and defenses; measurement studies; malware analysis; network security; systematization of knowledge and experience reports; Web and mobile security.

Keywords

authentication browser security malware analysis network security system monitoring algorithm analysis and problem complexity cloud computing computer communication networks information systems applications intrusion and attack detection IP spoofing obfuscation reputation systems rootkit detection sandbox evasion side-channel attacks software engineering systems and data security vulnerability analysis Web application security

Editors and affiliations

  • Fabian Monrose
    • 1
  • Marc Dacier
    • 2
  • Gregory Blanc
    • 3
  • Joaquin Garcia-Alfaro
    • 4
  1. 1.University of North Carolina at Chapel H Chapel-HillUSA
  2. 2.Qatar Computing Research Institute DohaQatar
  3. 3.Université Paris-Saclay EvryFrance
  4. 4.TELECOM SudParis EVRYFrance

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-45719-2
  • Copyright Information Springer International Publishing Switzerland 2016
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-45718-5
  • Online ISBN 978-3-319-45719-2
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book