Skip to main content
  • Conference proceedings
  • © 2016

Research in Attacks, Intrusions, and Defenses

19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9854)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): RAID: International Symposium on Research in Attacks, Intrusions, and Defenses

Conference proceedings info: RAID 2016.

Buying options

eBook USD 64.99
Price excludes VAT (USA)
  • ISBN: 978-3-319-45719-2
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 84.99
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (21 papers)

  1. Front Matter

    Pages I-XIII
  2. Systems Security

    1. Front Matter

      Pages 1-1
    2. GRIM: Leveraging GPUs for Kernel Integrity Monitoring

      • Lazaros Koromilas, Giorgos Vasiliadis, Elias Athanasopoulos, Sotiris Ioannidis
      Pages 3-23
    3. Taming Transactions: Towards Hardware-Assisted Control Flow Integrity Using Transactional Memory

      • Marius Muench, Fabio Pagani, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna, Davide Balzarotti
      Pages 24-48
    4. Automatic Uncovering of Tap Points from Kernel Executions

      • Junyuan Zeng, Yangchun Fu, Zhiqiang Lin
      Pages 49-70
    5. Detecting Stack Layout Corruptions with Robust Stack Unwinding

      • Yangchun Fu, Junghwan Rhee, Zhiqiang Lin, Zhichun Li, Hui Zhang, Guofei Jiang
      Pages 71-94
  3. Low-Level Attacks and Defenses

    1. Front Matter

      Pages 95-95
    2. APDU-Level Attacks in PKCS#11 Devices

      • Claudio Bozzato, Riccardo Focardi, Francesco Palmarini, Graham Steel
      Pages 97-117
    3. CloudRadar: A Real-Time Side-Channel Attack Detection System in Clouds

      • Tianwei Zhang, Yinqian Zhang, Ruby B. Lee
      Pages 118-140
  4. Measurement Studies

    1. Front Matter

      Pages 141-141
    2. The Abuse Sharing Economy: Understanding the Limits of Threat Exchanges

      • Kurt Thomas, Rony Amira, Adi Ben-Yoash, Ori Folger, Amir Hardon, Ari Berger et al.
      Pages 143-164
    3. SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion

      • Akira Yokoyama, Kou Ishii, Rui Tanabe, Yinmin Papa, Katsunari Yoshioka, Tsutomu Matsumoto et al.
      Pages 165-187
    4. Enabling Network Security Through Active DNS Datasets

      • Athanasios Kountouras, Panagiotis Kintis, Chaz Lever, Yizheng Chen, Yacin Nadji, David Dagon et al.
      Pages 188-208
  5. Malware Analysis

    1. Front Matter

      Pages 209-209
    2. A Formal Framework for Environmentally Sensitive Malware

      • Jeremy Blackthorne, Benjamin Kaiser, Bülent Yener
      Pages 211-229
    3. AVclass: A Tool for Massive Malware Labeling

      • Marcos Sebastián, Richard Rivera, Platon Kotzias, Juan Caballero
      Pages 230-253
    4. Semantics-Preserving Dissection of JavaScript Exploits via Dynamic JS-Binary Analysis

      • Xunchao Hu, Aravind Prakash, Jinghan Wang, Rundong Zhou, Yao Cheng, Heng Yin
      Pages 254-276
  6. Network Security

    1. Front Matter

      Pages 277-277
    2. The Messenger Shoots Back: Network Operator Based IMSI Catcher Detection

      • Adrian Dabrowski, Georg Petzl, Edgar R. Weippl
      Pages 279-302
    3. On the Feasibility of TTL-Based Filtering for DRDoS Mitigation

      • Michael Backes, Thorsten Holz, Christian Rossow, Teemu Rytilahti, Milivoj Simeonovski, Ben Stock
      Pages 303-322

Other Volumes

  1. Research in Attacks, Intrusions, and Defenses

    19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings

About this book

This book constitutes the refereed proceedings oft he 19th International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2016, held in Evry, France, in September 2016.

The 21 full papers presented were carefully reviewed and selected from 85 submissions. They are organized around the following topics: systems security; low-level attacks and defenses; measurement studies; malware analysis; network security; systematization of knowledge and experience reports; Web and mobile security.

Keywords

  • authentication
  • browser security
  • malware analysis
  • network security
  • system monitoring
  • algorithm analysis and problem complexity
  • cloud computing
  • computer communication networks
  • information systems applications
  • intrusion and attack detection
  • IP spoofing
  • obfuscation
  • reputation systems
  • rootkit detection
  • sandbox evasion
  • side-channel attacks
  • software engineering
  • systems and data security
  • vulnerability analysis
  • Web application security

Editors and Affiliations

  • University of North Carolina at Chapel H , Chapel-Hill, USA

    Fabian Monrose

  • Qatar Computing Research Institute , Doha, Qatar

    Marc Dacier

  • Université Paris-Saclay , Evry, France

    Gregory Blanc

  • TELECOM SudParis , EVRY, France

    Joaquin Garcia-Alfaro

Bibliographic Information

Buying options

eBook USD 64.99
Price excludes VAT (USA)
  • ISBN: 978-3-319-45719-2
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 84.99
Price excludes VAT (USA)