International Workshop on Recent Advances in Intrusion Detection

Research in Attacks, Intrusions, and Defenses

18th International Symposium, RAID 2015, Kyoto, Japan,November 2-4, 2015. Proceedings

  • Herbert Bos
  • Fabian Monrose
  • Gregory Blanc
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9404)

Table of contents

  1. Front Matter
    Pages I-XIII
  2. Hardware

    1. Front Matter
      Pages 1-1
    2. Khaled N. Khasawneh, Meltem Ozsoy, Caleb Donovick, Nael Abu-Ghazaleh, Dmitry Ponomarev
      Pages 3-25
    3. Ryan M. Gerdes, Saptarshi Mallick
      Pages 26-47
    4. Clémentine Maurice, Nicolas Le Scouarnec, Christoph Neumann, Olivier Heen, Aurélien Francillon
      Pages 48-65
    5. Pinghai Yuan, Qingkai Zeng, Xuhua Ding
      Pages 66-85
  3. Networks

    1. Front Matter
      Pages 87-87
    2. Jaehyun Nam, Muhammad Jamshed, Byungkwon Choi, Dongsu Han, KyoungSoo Park
      Pages 89-110
    3. Quentin Jacquemart, Pierre-Antoine Vervier, Guillaume Urvoy-Keller, Ernst Biersack
      Pages 111-132
    4. Johanna Amann, Robin Sommer
      Pages 133-152
  4. Hardening

    1. Front Matter
      Pages 153-153
    2. Weixuan Mao, Zhongmin Cai, Don Towsley, Xiaohong Guan
      Pages 155-176
    3. Thomas Kittel, Sebastian Vogl, Julian Kirsch, Claudia Eckert
      Pages 177-197
    4. Meining Nie, Purui Su, Qi Li, Zhi Wang, Lingyun Ying, Jinlong Hu et al.
      Pages 198-221
  5. Attack Detection I

    1. Front Matter
      Pages 223-223
    2. Yang Zhang, Xiaoshan Sun, Yi Deng, Liang Cheng, Shuke Zeng, Yu Fu et al.
      Pages 247-269
    3. Xiaokui Shu, Danfeng (Daphne) Yao, Barbara G. Ryder
      Pages 270-292
  6. Web and Net

    1. Front Matter
      Pages 293-293
    2. Giancarlo Pellegrino, Constantin Tschürtz, Eric Bodden, Christian Rossow
      Pages 295-316

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 18th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2015, held in Kyoto, Japan, in November 2015.
The 28 full papers were carefully reviewed and selected from 119 submissions. This symposium brings together leading researchers and practitioners from academia, government, and industry to discuss novel security problems, solutions, and technologies related to intrusion detection, attacks, and defenses.

Keywords

computer and communication networks data security industry sectors security and privacy telecommunications anomaly detection automata theory botnet tracking electronics intrusion detection systems keylogger malware analysis mobile security network security obfuscation reverse engineering security services software security systems security virtualization

Editors and affiliations

  • Herbert Bos
    • 1
  • Fabian Monrose
    • 2
  • Gregory Blanc
    • 3
  1. 1.Vrije Universiteit AmsterdamAmsterdamThe Netherlands
  2. 2.University of North Carolina at Chapel HChapel-HillUSA
  3. 3.Université Paris-SaclayEvryFrance

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-26362-5
  • Copyright Information Springer International Publishing Switzerland 2015
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-26361-8
  • Online ISBN 978-3-319-26362-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book