Skip to main content
  • Conference proceedings
  • © 2018

Research in Attacks, Intrusions, and Defenses

21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 11050)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): RAID: International Symposium on Research in Attacks, Intrusions, and Defenses

Conference proceedings info: RAID 2018.

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • ISBN: 978-3-030-00470-5
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 109.99
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (32 papers)

  1. Machine Learning for Computer Security

    1. OTTer: A Scalable High-Resolution Encrypted Traffic Identification Engine

      • Eva Papadogiannaki, Constantinos Halevidis, Periklis Akritidis, Lazaros Koromilas
      Pages 315-334
  2. Hardware-Assisted Security

    1. Front Matter

      Pages 335-335
    2. Hardware Assisted Randomization of Data

      • Brian Belleville, Hyungon Moon, Jangseop Shin, Dongil Hwang, Joseph M. Nash, Seonhwa Jung et al.
      Pages 337-358
    3. MicroStache: A Lightweight Execution Context for In-Process Safe Region Isolation

      • Lucian Mogosanu, Ashay Rane, Nathan Dautenhahn
      Pages 359-379
    4. CryptMe: Data Leakage Prevention for Unmodified Programs on ARM Devices

      • Chen Cao, Le Guan, Ning Zhang, Neng Gao, Jingqiang Lin, Bo Luo et al.
      Pages 380-400
  3. Software Security

    1. Front Matter

      Pages 401-401
    2. PartiSan: Fast and Flexible Sanitization via Run-Time Partitioning

      • Julian Lettner, Dokyung Song, Taemin Park, Per Larsen, Stijn Volckaert, Michael Franz
      Pages 403-422
    3. $$\tau $$ CFI: Type-Assisted Control Flow Integrity for x86-64 Binaries

      • Paul Muntean, Matthias Fischer, Gang Tan, Zhiqiang Lin, Jens Grossklags, Claudia Eckert
      Pages 423-444
    4. Trusted Execution Path for Protecting Java Applications Against Deserialization of Untrusted Data

      • Stefano Cristalli, Edoardo Vignati, Danilo Bruschi, Andrea Lanzi
      Pages 445-464
  4. Malware

    1. Front Matter

      Pages 465-465
    2. Error-Sensor: Mining Information from HTTP Error Traffic for Malware Intelligence

      • Jialong Zhang, Jiyong Jang, Guofei Gu, Marc Ph. Stoecklin, Xin Hu
      Pages 467-489
    3. Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers

      • Ishai Rosenberg, Asaf Shabtai, Lior Rokach, Yuval Elovici
      Pages 490-510
    4. Next Generation P2P Botnets: Monitoring Under Adverse Conditions

      • Leon Böck, Emmanouil Vasilomanolakis, Max Mühlhäuser, Shankar Karuppayah
      Pages 511-531
  5. IoT/CPS Security

    1. Front Matter

      Pages 533-533
    2. Malicious IoT Implants: Tampering with Serial Communication over the Internet

      • Philipp Morgner, Stefan Pfennig, Dennis Salzner, Zinaida Benenson
      Pages 535-555
    3. Before Toasters Rise Up: A View into the Emerging IoT Threat Landscape

      • Pierre-Antoine Vervier, Yun Shen
      Pages 556-576
    4. Statistical Similarity of Critical Infrastructure Network Traffic Based on Nearest Neighbor Distances

      • Jeong-Han Yun, Yoonho Hwang, Woomyo Lee, Hee-Kap Ahn, Sin-Kyu Kim
      Pages 577-599
  6. Security Measurements

    1. Front Matter

      Pages 601-601
    2. PostScript Undead: Pwning the Web with a 35 Years Old Language

      • Jens Müller, Vladislav Mladenov, Dennis Felsch, Jörg Schwenk
      Pages 603-622
    3. Identifying Key Leakage of Bitcoin Users

      • Michael Brengel, Christian Rossow
      Pages 623-643Open Access

Other Volumes

  1. Research in Attacks, Intrusions, and Defenses

    21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings

About this book

This book constitutes the refereed proceedings of the 21st  International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2018, held in Heraklion, Crete, Greece, in September 2018.

The 32 revised full papers were carefully reviewed and selected from 145 submissions. They are organized in the following topical sections: attacks; intrusion detection and prevention; DDoS attacks; passwords, accounts, and users; machine learning for computer security; hardware-assisted security; software security; malware; IoT/CPS security; security measurements; and defenses.

Keywords

  • artificial intelligence
  • computer crime
  • computer networks
  • computer operating systems
  • cryptography
  • data communication systems
  • data security
  • internet protocols
  • malware
  • privacy
  • programming languages
  • semantics
  • social networking
  • software and application security
  • software engineering
  • source codes
  • telecommunication networks
  • telecommunication traffic
  • transmission control protocol
  • world wide web

Editors and Affiliations

  • University of Illinois at Urbana-Champaign, Urbana, USA

    Michael Bailey

  • Ruhr-Universität Bochum, Bochum, Germany

    Thorsten Holz

  • Vrije Universiteit Amsterdam, Amsterdam, The Netherlands

    Manolis Stamatogiannakis

  • Foundation for Research & Technology – Hellas, Heraklion, Crete, Greece

    Sotiris Ioannidis

Bibliographic Information

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • ISBN: 978-3-030-00470-5
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 109.99
Price excludes VAT (USA)