


default search action
14. RAID 2011: Menlo Park, CA, USA
- Robin Sommer, Davide Balzarotti, Gregor Maier:

Recent Advances in Intrusion Detection - 14th International Symposium, RAID 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings. Lecture Notes in Computer Science 6961, Springer 2011, ISBN 978-3-642-23643-3
Application Security
- Erik Bosman, Asia Slowinska, Herbert Bos

:
Minemu: The World's Fastest Taint Tracker. 1-20 - Bob Gilbert, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna:

Dymo: Tracking Dynamic Code Identity. 21-40 - Felix Gröbert, Carsten Willems, Thorsten Holz

:
Automated Identification of Cryptographic Primitives in Binary Programs. 41-60
Malware
- Yanick Fratantonio, Christopher Kruegel, Giovanni Vigna:

Shellzer: A Tool for the Dynamic Analysis of Malicious Shellcode. 61-80 - Stefano Ortolani, Cristiano Giuffrida

, Bruno Crispo:
KLIMAX: Profiling Memory Write Patterns to Detect Keystroke-Harvesting Malware. 81-100 - Kangjie Lu, Dabi Zou, Weiping Wen, Debin Gao

:
Packed, Printable, and Polymorphic Return-Oriented Programming. 101-120 - Minh Tran, Mark Etheridge, Tyler K. Bletsch, Xuxian Jiang, Vincent W. Freeh, Peng Ning:

On the Expressiveness of Return-into-libc Attacks. 121-141
Anomaly Detection
- Nathaniel Boggs, Sharath Hiremagalore, Angelos Stavrou

, Salvatore J. Stolfo:
Cross-Domain Collaborative Anomaly Detection: So Far Yet So Close. 142-160 - Syed Akbar Mehdi, Junaid Khalid, Syed Ali Khayam:

Revisiting Traffic Anomaly Detection Using Software Defined Networking. 161-180 - Malek Ben Salem, Salvatore J. Stolfo:

Modeling User Search Behavior for Masquerade Detection. 181-200
Network Security
- Sheila Becker, Jeff Seibert, Cristina Nita-Rotaru, Radu State:

Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling Attack. 201-221 - Sambuddho Chakravarty, Georgios Portokalidis

, Michalis Polychronakis, Angelos D. Keromytis:
Detecting Traffic Snooping in Tor Using Decoys. 222-241 - Seungwon Shin, Raymond Lin, Guofei Gu:

Cross-Analysis of Botnet Victims: New Insights and Implications. 242-261
Web Security and Social Networks
- Armin Buescher, Felix Leder, Thomas Siebert:

Banksafe Information Stealer Detection Inside the Web Browser. 262-280 - Mario Heiderich, Tilman Frosch, Thorsten Holz

:
IceShield: Detection and Mitigation of Malicious Websites with a Frozen DOM. 281-300 - Jonghyuk Song, Sangho Lee, Jong Kim:

Spam Filtering in Twitter Using Sender-Receiver Relationship. 301-317 - Chao Yang, Robert Chandler Harkreader, Guofei Gu:

Die Free or Live Hard? Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers. 318-337
Sandboxing and Embedded Environments
- Martina Lindorfer, Clemens Kolbitsch, Paolo Milani Comparetti:

Detecting Environment-Sensitive Malware. 338-357 - Ang Cui, Salvatore J. Stolfo:

Defending Embedded Systems with Software Symbiotes. 358-377 - Loïc Duflot, Yves-Alexis Perez, Benjamin Morin:

What If You Can't Trust Your Network Card? 378-397

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














