


default search action
16. RAID 2013: Rodney Bay, St. Lucia
- Salvatore J. Stolfo, Angelos Stavrou

, Charles V. Wright:
Research in Attacks, Intrusions, and Defenses - 16th International Symposium, RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013. Proceedings. Lecture Notes in Computer Science 8145, Springer 2013, ISBN 978-3-642-41283-7
Hardware-Level Security
- Patrick Stewin:

A Primitive for Revealing Stealthy Peripheral-Based Attacks on the Computing Platform's Main Memory. 1-20 - Mariano Graziano, Andrea Lanzi, Davide Balzarotti:

Hypervisor Memory Forensics. 21-40
Server-Level and OS-Level Security
- Jakob Fritz, Corrado Leita, Michalis Polychronakis:

Server-Side Code Injection Attacks: A Historical Perspective. 41-61 - Blaine Stancill, Kevin Z. Snow, Nathan Otterness, Fabian Monrose, Lucas Davi, Ahmad-Reza Sadeghi:

Check My Profile: Leveraging Static Analysis for Fast and Accurate Detection of ROP Gadgets. 62-81 - Richard Skowyra, Kelly Casteel, Hamed Okhravi

, Nickolai Zeldovich, William W. Streilein:
Systematic Analysis of Defenses against Return-Oriented Programming. 82-102 - Xi Xiong, Peng Liu:

SILVER: Fine-Grained and Transparent Protection Domain Primitives in Commodity OS Kernel. 103-122
Malware
- Yuhei Kawakoya, Makoto Iwamura, Eitaro Shioji, Takeo Hariu:

API Chaser: Anti-analysis Resistant Malware Analyzer. 123-143 - M. Zubair Rafique, Juan Caballero:

FIRMA: Malware Clustering and Network Signature Generation with Mixed Network Behaviors. 144-163 - Christian Wressnegger, Frank Boldewin, Konrad Rieck:

Deobfuscating Embedded Malware Using Probable-Plaintext Attacks. 164-183 - Denis Bueno, Kevin J. Compton, Karem A. Sakallah

, Michael D. Bailey:
Detecting Traditional Packers, Decisively. 184-203
Authentication and Credential Attacks
- David F. Oswald

, Bastian Richter, Christof Paar:
Side-Channel Attacks on the Yubikey 2 One-Time Password Generator. 204-222 - Mitsuaki Akiyama, Takeshi Yagi, Kazufumi Aoki, Takeo Hariu, Youki Kadobayashi:

Active Credential Leakage for Observing Web-Based Attack Cycle. 223-243
Web and Network Privacy and Security
- Bin Zhao

, Peng Liu:
Behavior Decomposition: Aspect-Level Browser Extension Clustering and Its Security Implications. 244-264 - Martin Johns

, Sebastian Lekies:
Tamper-Resistant LikeJacking Protection. 265-285 - Arun Viswanathan, Kymie Tan, Clifford Neuman:

Deconstructing the Assessment of Anomaly-based Intrusion Detectors. 286-306
Mobile Security
- Kapil Singh:

Practical Context-Aware Permission Control for Hybrid Mobile Applications. 307-327 - Nan Jiang, Yu Jin, Ann Skudlark, Zhi-Li Zhang:

Understanding SMS Spam in a Large Cellular Network: Characteristics, Strategies and Defenses. 328-347 - Johannes Hoffmann, Stephan Neumann, Thorsten Holz

:
Mobile Malware Detection Based on Energy Fingerprints - A Dead End? 348-368
Cloud and Anonymity Networks I
- Tobias Lauinger, Kaan Onarlioglu, Chaabane Abdelberi, Engin Kirda, William K. Robertson, Mohamed Ali Kâafar

:
Holiday Pictures or Blockbuster Movies? Insights into Copyright Infringement in User Uploads to One-Click File Hosters. 369-389 - Yacin Nadji, Manos Antonakakis, Roberto Perdisci, Wenke Lee:

Connected Colors: Unveiling the Structure of Criminal Networks. 390-410
Cloud and Anonymity Networks II
- Vasilis Pappas, Vasileios P. Kemerlis

, Angeliki Zavou, Michalis Polychronakis, Angelos D. Keromytis:
CloudFence: Data Flow Tracking as a Cloud Service. 411-431 - Christoph Egger, Johannes Schlumberger, Christopher Kruegel, Giovanni Vigna:

Practical Attacks against the I2P Network. 432-451

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














