Advertisement

Research in Attacks, Intrusions, and Defenses

21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings

  • Michael Bailey
  • Thorsten Holz
  • Manolis Stamatogiannakis
  • Sotiris Ioannidis
Conference proceedings RAID 2018

Part of the Lecture Notes in Computer Science book series (LNCS, volume 11050)

Also part of the Security and Cryptology book sub series (LNSC, volume 11050)

Table of contents

  1. Front Matter
    Pages I-XIV
  2. Attacks

    1. Front Matter
      Pages 1-1
    2. Onur Sahin, Ayse K. Coskun, Manuel Egele
      Pages 3-24
    3. Claudio Rizzo, Lorenzo Cavallaro, Johannes Kinder
      Pages 25-46
    4. Andrei Tatar, Cristiano Giuffrida, Herbert Bos, Kaveh Razavi
      Pages 47-66
  3. Intrusion Detection and Prevention

    1. Front Matter
      Pages 67-67
    2. Hugo Gascon, Steffen Ullrich, Benjamin Stritter, Konrad Rieck
      Pages 69-91
    3. Sam L. Thomas, Aurélien Francillon
      Pages 92-113
    4. Shagufta Mehnaz, Anand Mudgerikar, Elisa Bertino
      Pages 114-136
  4. DDoS Attacks

    1. Front Matter
      Pages 137-137
    2. Jonas Bushart, Christian Rossow
      Pages 139-160 Open Access
    3. Menghao Zhang, Guanyu Li, Lei Xu, Jun Bi, Guofei Gu, Jiasong Bai
      Pages 161-183
    4. Johanna Ullrich, Nicholas Stifter, Aljosha Judmayer, Adrian Dabrowski, Edgar Weippl
      Pages 184-203
  5. Passwords, Accounts, and Users

    1. Front Matter
      Pages 205-205
    2. Sergio Pastrana, Alice Hutchings, Andrew Caines, Paula Buttery
      Pages 207-227
    3. Binghui Wang, Le Zhang, Neil Zhenqiang Gong
      Pages 228-249
    4. Simon S. Woo, Jelena Mirkovic
      Pages 250-270
  6. Machine Learning for Computer Security

    1. Front Matter
      Pages 271-271
    2. Kang Liu, Brendan Dolan-Gavitt, Siddharth Garg
      Pages 273-294
    3. Mayana Pereira, Shaun Coleman, Bin Yu, Martine DeCock, Anderson Nascimento
      Pages 295-314
    4. Eva Papadogiannaki, Constantinos Halevidis, Periklis Akritidis, Lazaros Koromilas
      Pages 315-334
  7. Hardware-Assisted Security

    1. Front Matter
      Pages 335-335
    2. Brian Belleville, Hyungon Moon, Jangseop Shin, Dongil Hwang, Joseph M. Nash, Seonhwa Jung et al.
      Pages 337-358
    3. Lucian Mogosanu, Ashay Rane, Nathan Dautenhahn
      Pages 359-379
    4. Chen Cao, Le Guan, Ning Zhang, Neng Gao, Jingqiang Lin, Bo Luo et al.
      Pages 380-400
  8. Software Security

    1. Front Matter
      Pages 401-401
    2. Julian Lettner, Dokyung Song, Taemin Park, Per Larsen, Stijn Volckaert, Michael Franz
      Pages 403-422
    3. Paul Muntean, Matthias Fischer, Gang Tan, Zhiqiang Lin, Jens Grossklags, Claudia Eckert
      Pages 423-444
    4. Stefano Cristalli, Edoardo Vignati, Danilo Bruschi, Andrea Lanzi
      Pages 445-464
  9. Malware

    1. Front Matter
      Pages 465-465
    2. Jialong Zhang, Jiyong Jang, Guofei Gu, Marc Ph. Stoecklin, Xin Hu
      Pages 467-489
    3. Ishai Rosenberg, Asaf Shabtai, Lior Rokach, Yuval Elovici
      Pages 490-510
    4. Leon Böck, Emmanouil Vasilomanolakis, Max Mühlhäuser, Shankar Karuppayah
      Pages 511-531
  10. IoT/CPS Security

    1. Front Matter
      Pages 533-533
    2. Philipp Morgner, Stefan Pfennig, Dennis Salzner, Zinaida Benenson
      Pages 535-555
    3. Pierre-Antoine Vervier, Yun Shen
      Pages 556-576
    4. Jeong-Han Yun, Yoonho Hwang, Woomyo Lee, Hee-Kap Ahn, Sin-Kyu Kim
      Pages 577-599
  11. Security Measurements

    1. Front Matter
      Pages 601-601
    2. Jens Müller, Vladislav Mladenov, Dennis Felsch, Jörg Schwenk
      Pages 603-622
    3. Michael Brengel, Christian Rossow
      Pages 623-643 Open Access
  12. Defenses

    1. Front Matter
      Pages 645-645
    2. Micah Bushouse, Douglas Reeves
      Pages 647-669
    3. Bin Shi, Lei Cui, Bo Li, Xudong Liu, Zhiyu Hao, Haiying Shen
      Pages 670-690
    4. Zhi Zhang, Yueqiang Cheng, Surya Nepal, Dongxi Liu, Qingni Shen, Fethi Rabhi
      Pages 691-710
  13. Back Matter
    Pages 711-712

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 21st  International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2018, held in Heraklion, Crete, Greece, in September 2018.

The 32 revised full papers were carefully reviewed and selected from 145 submissions. They are organized in the following topical sections: attacks; intrusion detection and prevention; DDoS attacks; passwords, accounts, and users; machine learning for computer security; hardware-assisted security; software security; malware; IoT/CPS security; security measurements; and defenses.

Keywords

artificial intelligence computer crime computer networks computer operating systems cryptography data communication systems data security internet protocols malware privacy programming languages semantics social networking software and application security software engineering source codes telecommunication networks telecommunication traffic transmission control protocol world wide web

Editors and affiliations

  1. 1.University of Illinois at Urbana-ChampaignUrbanaUSA
  2. 2.Ruhr-Universität BochumBochumGermany
  3. 3.Vrije Universiteit AmsterdamAmsterdamThe Netherlands
  4. 4.Foundation for Research & Technology – HellasHeraklion, CreteGreece

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-030-00470-5
  • Copyright Information Springer Nature Switzerland AG 2018
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-030-00469-9
  • Online ISBN 978-3-030-00470-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site