Skip to main content
  • Conference proceedings
  • © 2018

Research in Attacks, Intrusions, and Defenses

21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 11050)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): RAID: International Symposium on Research in Attacks, Intrusions, and Defenses

Conference proceedings info: RAID 2018.

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • ISBN: 978-3-030-00470-5
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 109.99
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (32 papers)

  1. Front Matter

    Pages I-XIV
  2. Attacks

    1. Front Matter

      Pages 1-1
    2. Proteus: Detecting Android Emulators from Instruction-Level Profiles

      • Onur Sahin, Ayse K. Coskun, Manuel Egele
      Pages 3-24
    3. BabelView: Evaluating the Impact of Code Injection Attacks in Mobile Webviews

      • Claudio Rizzo, Lorenzo Cavallaro, Johannes Kinder
      Pages 25-46
    4. Defeating Software Mitigations Against Rowhammer: A Surgical Precision Hammer

      • Andrei Tatar, Cristiano Giuffrida, Herbert Bos, Kaveh Razavi
      Pages 47-66
  3. Intrusion Detection and Prevention

    1. Front Matter

      Pages 67-67
    2. Reading Between the Lines: Content-Agnostic Detection of Spear-Phishing Emails

      • Hugo Gascon, Steffen Ullrich, Benjamin Stritter, Konrad Rieck
      Pages 69-91
    3. Backdoors: Definition, Deniability and Detection

      • Sam L. Thomas, Aurélien Francillon
      Pages 92-113
    4. RWGuard: A Real-Time Detection System Against Cryptographic Ransomware

      • Shagufta Mehnaz, Anand Mudgerikar, Elisa Bertino
      Pages 114-136
  4. DDoS Attacks

    1. Front Matter

      Pages 137-137
    2. DNS Unchained: Amplified Application-Layer DoS Attacks Against DNS Authoritatives

      • Jonas Bushart, Christian Rossow
      Pages 139-160Open Access
    3. Control Plane Reflection Attacks in SDNs: New Attacks and Countermeasures

      • Menghao Zhang, Guanyu Li, Lei Xu, Jun Bi, Guofei Gu, Jiasong Bai
      Pages 161-183
    4. Proof-of-Blackouts? How Proof-of-Work Cryptocurrencies Could Affect Power Grids

      • Johanna Ullrich, Nicholas Stifter, Aljosha Judmayer, Adrian Dabrowski, Edgar Weippl
      Pages 184-203
  5. Passwords, Accounts, and Users

    1. Front Matter

      Pages 205-205
    2. Characterizing Eve: Analysing Cybercrime Actors in a Large Underground Forum

      • Sergio Pastrana, Alice Hutchings, Andrew Caines, Paula Buttery
      Pages 207-227
    3. SybilBlind: Detecting Fake Users in Online Social Networks Without Manual Labels

      • Binghui Wang, Le Zhang, Neil Zhenqiang Gong
      Pages 228-249
    4. GuidedPass: Helping Users to Create Strong and Memorable Passwords

      • Simon S. Woo, Jelena Mirkovic
      Pages 250-270
  6. Machine Learning for Computer Security

    1. Front Matter

      Pages 271-271
    2. Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks

      • Kang Liu, Brendan Dolan-Gavitt, Siddharth Garg
      Pages 273-294
    3. Dictionary Extraction and Detection of Algorithmically Generated Domain Names in Passive DNS Traffic

      • Mayana Pereira, Shaun Coleman, Bin Yu, Martine DeCock, Anderson Nascimento
      Pages 295-314

Other Volumes

  1. Research in Attacks, Intrusions, and Defenses

    21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings

About this book

This book constitutes the refereed proceedings of the 21st  International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2018, held in Heraklion, Crete, Greece, in September 2018.

The 32 revised full papers were carefully reviewed and selected from 145 submissions. They are organized in the following topical sections: attacks; intrusion detection and prevention; DDoS attacks; passwords, accounts, and users; machine learning for computer security; hardware-assisted security; software security; malware; IoT/CPS security; security measurements; and defenses.

Keywords

  • artificial intelligence
  • computer crime
  • computer networks
  • computer operating systems
  • cryptography
  • data communication systems
  • data security
  • internet protocols
  • malware
  • privacy
  • programming languages
  • semantics
  • social networking
  • software and application security
  • software engineering
  • source codes
  • telecommunication networks
  • telecommunication traffic
  • transmission control protocol
  • world wide web

Editors and Affiliations

  • University of Illinois at Urbana-Champaign, Urbana, USA

    Michael Bailey

  • Ruhr-Universität Bochum, Bochum, Germany

    Thorsten Holz

  • Vrije Universiteit Amsterdam, Amsterdam, The Netherlands

    Manolis Stamatogiannakis

  • Foundation for Research & Technology – Hellas, Heraklion, Crete, Greece

    Sotiris Ioannidis

Bibliographic Information

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • ISBN: 978-3-030-00470-5
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 109.99
Price excludes VAT (USA)