Advertisement

Research in Attacks, Intrusions, and Defenses

18th International Symposium, RAID 2015, Kyoto, Japan,November 2-4, 2015. Proceedings

  • Herbert Bos
  • Fabian Monrose
  • Gregory Blanc
Conference proceedings RAID 2015

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9404)

Also part of the Security and Cryptology book sub series (LNSC, volume 9404)

Table of contents

  1. Front Matter
    Pages I-XIII
  2. Hardware

    1. Front Matter
      Pages 1-1
    2. Khaled N. Khasawneh, Meltem Ozsoy, Caleb Donovick, Nael Abu-Ghazaleh, Dmitry Ponomarev
      Pages 3-25
    3. Ryan M. Gerdes, Saptarshi Mallick
      Pages 26-47
    4. Clémentine Maurice, Nicolas Le Scouarnec, Christoph Neumann, Olivier Heen, Aurélien Francillon
      Pages 48-65
    5. Pinghai Yuan, Qingkai Zeng, Xuhua Ding
      Pages 66-85
  3. Networks

    1. Front Matter
      Pages 87-87
    2. Jaehyun Nam, Muhammad Jamshed, Byungkwon Choi, Dongsu Han, KyoungSoo Park
      Pages 89-110
    3. Quentin Jacquemart, Pierre-Antoine Vervier, Guillaume Urvoy-Keller, Ernst Biersack
      Pages 111-132
    4. Johanna Amann, Robin Sommer
      Pages 133-152
  4. Hardening

    1. Front Matter
      Pages 153-153
    2. Weixuan Mao, Zhongmin Cai, Don Towsley, Xiaohong Guan
      Pages 155-176
    3. Thomas Kittel, Sebastian Vogl, Julian Kirsch, Claudia Eckert
      Pages 177-197
    4. Meining Nie, Purui Su, Qi Li, Zhi Wang, Lingyun Ying, Jinlong Hu et al.
      Pages 198-221
  5. Attack Detection I

    1. Front Matter
      Pages 223-223
    2. Yang Zhang, Xiaoshan Sun, Yi Deng, Liang Cheng, Shuke Zeng, Yu Fu et al.
      Pages 247-269
    3. Xiaokui Shu, Danfeng (Daphne) Yao, Barbara G. Ryder
      Pages 270-292
  6. Web and Net

    1. Front Matter
      Pages 293-293
    2. Giancarlo Pellegrino, Constantin Tschürtz, Eric Bodden, Christian Rossow
      Pages 295-316
    3. Qilang Yang, Dimitrios Damopoulos, Georgios Portokalidis
      Pages 317-338
  7. Android

    1. Front Matter
      Pages 357-357
    2. Wenbo Yang, Yuanyuan Zhang, Juanru Li, Junliang Shu, Bodong Li, Wenjun Hu et al.
      Pages 359-381
    3. Nicoló Andronio, Stefano Zanero, Federico Maggi
      Pages 382-404
    4. Rahul Murmuria, Angelos Stavrou, Daniel Barbará, Dan Fleck
      Pages 405-424
  8. Privacy

    1. Front Matter
      Pages 425-425
    2. Haitao Xu, Haining Wang, Angelos Stavrou
      Pages 427-447
    3. Johanna Ullrich, Edgar Weippl
      Pages 448-468
  9. Evaluating Solutions

    1. Front Matter
      Pages 469-469
    2. Aleksandar Milenkoski, Bryan D. Payne, Nuno Antunes, Marco Vieira, Samuel Kounev, Alberto Avritzer et al.
      Pages 471-492
    3. Dario Weißer, Johannes Dahse, Thorsten Holz
      Pages 493-514
    4. Mohamed Elsabagh, Daniel Barbará, Dan Fleck, Angelos Stavrou
      Pages 515-537
  10. Attack Detection II

    1. Front Matter
      Pages 563-563
    2. Thomas Barabosch, Adrian Dombeck, Khaled Yakdan, Elmar Gerhards-Padilla
      Pages 565-587
    3. Yangyi Chen, Vincent Bindschaedler, XiaoFeng Wang, Stefan Berger, Dimitrios Pendarakis
      Pages 588-614
    4. Lukas Krämer, Johannes Krupp, Daisuke Makita, Tomomi Nishizoe, Takashi Koide, Katsunari Yoshioka et al.
      Pages 615-636
  11. Back Matter
    Pages 637-638

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 18th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2015, held in Kyoto, Japan, in November 2015.
The 28 full papers were carefully reviewed and selected from 119 submissions. This symposium brings together leading researchers and practitioners from academia, government, and industry to discuss novel security problems, solutions, and technologies related to intrusion detection, attacks, and defenses.

Keywords

computer and communication networks data security industry sectors security and privacy telecommunications anomaly detection automata theory botnet tracking electronics intrusion detection systems keylogger malware analysis mobile security network security obfuscation reverse engineering security services software security systems security virtualization

Editors and affiliations

  • Herbert Bos
    • 1
  • Fabian Monrose
    • 2
  • Gregory Blanc
    • 3
  1. 1.Vrije Universiteit AmsterdamAmsterdamThe Netherlands
  2. 2.University of North Carolina at Chapel HChapel-HillUSA
  3. 3.Université Paris-SaclayEvryFrance

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-26362-5
  • Copyright Information Springer International Publishing Switzerland 2015
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-26361-8
  • Online ISBN 978-3-319-26362-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site